The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Loss less data hiding, also known as reversible data hiding, is a newly developed research field and relating applications in digital rights management (DRM). Secret information can be hidden into original image at the encoder, and then image containing secret data is delivered to the decoder. For decoding, original image and secret information need to be perfectly recovered from the received image...
In this paper, we propose a new watermark-assisted method for the analysis of audio source signals present in a mixture. This work is motivated by the issue of quality-constrained source parameters estimation in under-determined mixtures where the blind approach is not efficient. Our method uses a specific coder-decoder configuration where the separated source signals are assumed to be known at the...
Digital watermarking has been an effective means for copyright protection and digital rights management (DRM). One of the current trends for researches in this field would focus on reversible data hiding. Considering the ease of implementation and employing the inherent characteristics of original images, we propose our reversible data hiding algorithm with the rhombus relationships of original pixels...
We propose decoding algorithms that introduce asynchronous dynamics and a stochastic algorithm for spread spectrum digital watermarking. A synchronous deterministic decoder was used for existing decoding algorithms based on Bayes' estimation. Adopting asynchronous dynamics makes it possible to suppress the occurrences of oscillatory solutions and introducing a stochastic algorithm makes it possible...
In this paper, we propose an improved multiplicative spread spectrum (IMSS) embedding scheme for data hiding by exploiting the multiplicative characteristic to maintain the attractive property of having good quality in IMSS and reducing the interference effect of the host signal in the original multiplicative spread spectrum (MSS) embedding to improve the decoding performance. We first derive the...
In this paper we address the issue of the trade-off between the tampering rate and the reconstruction quality of image authentication systems. We adopt the fountain coding paradigm and design an adaptive content reconstruction scheme. The scheme conforms the reconstruction quality of individual image fragments both to the local texture properties and to the specified requirements. Experimental evaluation...
A new framework is proposed to embed watermark through alternating frequency components of the black plane of a printed CMYK image according to the watermark message, and then decode the watermark with an infrared (IR) scanner. This framework leverages the facts that a given color can be produced by multiple combinations of CMYK quadruplets and the standard four-color printing materials have very...
Malicious packet dropping attack is a major security threat to the data traffic in the sensor network, since it reduces the legal network throughput and may hinder the propagation of sensitive data. Dealing with this attack is challenging since the unreliable wireless communication feature and resource constraints of the sensor network may cause communication failure and mislead to the incorrect decision...
This paper presents a novel image adaptive data hiding system using properties of the discrete wavelet transform and which is ready to use in combination with JPEG 2000. Image adaptive watermarking schemes determine the embedding samples and strength from the image statistics. We propose to use the energy of wavelet coefficients at high frequencies to measure the amount of distortion that can be tolerated...
In applications to secured diffusion of digital images, several watermarking solutions have been studied in the field of Data Hiding. For this aim, the main idea consists in embedding an information in the digital media with good properties in terms of robustness, capacity and invisibility (perceptual transparency and statistical undetectability). Recent studies has highlighted the importance of statistical...
Digital audio watermarking has received increasing interest in the last years due to the wide range of applications it can be used for. This contribution presents a novel blind watermarking scheme designed to work in the very specific scenario in which the watermarked audio is played back by a loudspeaker and picked up by the microphone of a mobile device. The proposed scheme is robust against the...
Network intruders try to hide their identity by relaying their traffic through a number of intermediate hosts, called stepping stones. Network flow watermarks have been used to detect such attacks by inserting a special timing pattern into one flow by means of artificial delays and detecting relayed flows by searching for the same pattern. We study the application of coding schemes to improve the...
This paper presents several watermarking methods preventing the estimation of the secret key by an adversary. The constraints for secure embedding using distribution matching, where the decoding regions rely implicitly on the distribution of the host signal, are first formulated. In order to perform informed coding, different decoding regions are associated with the same message using an appropriate...
In this work Weber's law is followed for designing a perceptually-shaped side-informed data hiding scheme. The resulting method is a generalized version of a logarithmic quantization algorithm previously proposed by the authors. Closed formulas for analyzing the embedding power and decoding error probability of this new method are provided, and experimental results showing its good behavior against...
Digital audio watermarking is adopted for many multimedia applications such as copyright management, music indexing, broadcast monitoring, etc. The watermarking techniques must ensure an imperceptible watermark and a reliable transmission with a maximized robustness to a various range of perturbations depending on the application purposes. This paper deals with an improved error correction strategy...
This work discusses a fast generation procedure of authentication codes, for multimedia content cryptography, whose length (and computational complexity) can be tuned accordingly to the specific mobile application and service. In this work, we propose a digital algorithm to generate a pair of long (asymmetric) keys from one short primitive key. According to our results, the devised procedure provides...
We propose a system to embed watermark message into audio signal, which can be used for copyright protection. It uses spread spectrum theory to generate a watermark that resistants to different removal attempts. We exploit the psychoacoustic auditory model to guarantee the audio signal's perceptual quality after the watermark embedding procedure. Recovery is performed without knowledge of the original...
JPEG-LS is generally used to compress bio-medical or high dynamic range images. These compressed images sometime needs to be encrypted for confidentiality. In addition, the secured JPEG-LS compressed images may need to be watermarked to detect copyright violation, track different users handling the image, prove ownership or for authentication purpose. In the proposed technique, watermark is embedded...
Research into the issue of the rights protection of digital data is of critical importance since legal measures have proved ineffective against digital piracy. Digital watermarking tops the list of technical countermeasures. Its process involves the incorporation of a set of some data in the item to be protected; this set of data is called watermark. The accuracy of the item is slightly degraded but...
Data encryption is vital for e-commerce. Here we introduce a technique for hiding sensitive credit card information in an arbitrary background image without the sensitive data getting exposed in public domains. The paper also makes an attempt to combine Cryptographic and Steganographic technique to provide a reliable security solution for credit card transactions. The proposed technique utilizes a...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.