The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
In this paper, a new method for blind image water-marking using DWT coefficients of host image and TurboCodes is proposed. To achieve robustness against JPEG compression the watermark is encoded via Turbo Code encoder before embedding. This encoding results in a redundancy that is used at receiver end for detection and correction of errors. Then we apply DWT by three level and watermark bits are embedded...
The present paper introduces a new insertion/detection technique for MPEG-4 AVC stream protection by means of watermarking techniques. The embedding process relies on the ST-DM (Spread Transform - Dither Modulation) principles and adapts/extends the Watson's perceptual model so as to cope with the compressed domain peculiarities. In contrast to the state-of-the art techniques considering only binary...
Based on China AVS standard, this paper proposed a method of built-in video watermark technology. Authentication information was generated from I frame as the watermark, and is embedded into selected positions of later P-, B-frames. An algorithm was designed and introduced in this paper to verify the video modification status via abstracted watermark. Dependent on feature of credible encoding/decoding...
As the sophistication and proliferation of digital media continues to increase, so to do methods which seek to compromise data integrity. Digital authentication can be a critical component to ensuring reliability and security in digital video surveillance platforms. A robust method of encoding video can provide authentication ensuring that data has not been compromised and is still reliable. By watermarking...
This paper proposes a reversible visible watermarking method which are contour style. According to the fact that it has informational redundancy in a nature images usually, it is possible to embed watermarking image in the corresponding area of original image. Based on the cryptography method, users can view the original image after remove the visible watermarking by the proposed method. The proposed...
The current explosion of digital media creates threats towards the security in multimedia data broadcasting. Watermarking technique becomes a prospective solution to this coercion by means of Intellectual Property Right Protection, Authentication and Integrity Verification of digital media. In this paper we introduce an approach that enables us to develop a low power, real time, reliable and secure...
This paper presents a novel error-resilient strategy which employs a reversible watermarking technique to protect the H.264/AVC video content. The proposed scheme adopts reversible watermarking to embed an error detection codeword within every Macro block (MB). The watermark is then extracted at the decoder and used to detect the corrupted MBs to be concealed. The proposed scheme further manages to...
In this paper, a novel bipolar time-spread (TS) echo hiding based watermarking method is proposed for stereo audio signals, to overcome the low robustness problem in the traditional TS echo hiding method. At the embedding, echo signals with opposite polarities are added to both channels of the host audio signal. This improves the imperceptibility of the watermarking scheme, since added watermarks...
Biometrics based personal identification techniques have intrinsic advantages over traditional personal identification techniques but the security of biometric data is a major issue. The biometric based verification system works properly only if the verification system can guarantee that the biometric data has come from the genuine person at the time of enrollment. We introduced application in which...
Internet is a global system of interconnected computer networks that helps users reach to all digital data, such as multimedia files. So, this leads to plagiarization, violation of copyrights and data over the Internet. Thus, the digital intellectual property becomes a big issue of the Internet sharing system. Various techniques have been proposed to protect these violations; unfortunately, they became...
Data hiding has become important since the rising of internet and multimedia services. Issues about authentication and error concealment of digital images get considerable attention in applications of military, tele-medical, and surveillance systems without local storage device. Due to the crucial time and space restriction under these circumstances, images of a specific time are usually non-reproducible...
This article is a theoretical study on binary Tardos' fingerprinting codes embedded using watermarking schemes. Our approach is derived from and encompasses both security and robustness constraints. We assume here that the coalition has estimated the symbols of the fingerprinting code by the way of a security attack, the quality of the estimation relying on the security of the watermarking scheme...
This paper presents a new approach for digital image watermarking and for transmission of watermarked images over bursty wireless channels. In this approach, biorthogonal wavelet transform based method is proposed for digital image watermarking and turbocoded JPEG2000 is proposed for correction of transmission errors due to the bursty wireless channels. The proposed approach is corroborated with implementation...
Data hiding is a type of information hiding technology. A data hiding method based on H.264 encoded video sequences is presented in this paper. The proposed method uses the parity of the coefficients after transformation and quantization to hide the desirable data. The digital data hidden by this approach can be recovered correctly by data recovering process and extracted directly from the encoded...
A time-domain audio watermarking algorithm based on low-frequency amplitude modification was proposed by Lie in 2006. The algorithm has acceptable robustness against common attacks and it also achieves synchronization. However Lie's method has two disadvantages: the coded watermark was produced by convolutional codes which are not the best option for very noisy channels like watermarking ones and...
This paper presents an image authentication scheme to verify the integrity of images. The method protects a group of n images mutually by applying a threshold mechanism to manipulate the recovery data. The authentication code and the recovery data are embedded using a modified reversible contrast mapping watermarking scheme. The proposed method not only can detect and locate the tampering activities...
Digital watermarking has been a practical and interesting research topic in the last decade. Recently, a newly developed branch called reversible data hiding has emerged. It has attracted more and more attention in both researches and applications. With the definition of reversible data hiding, secret message can be hidden by schemes offered by algorithm designers. On the other hand, at the data extraction...
The decoding error rate of watermarking codes on the binary symmetric channel with bit-error probability f is an important performance index of watermarking system. The current information-theoretic models are mainly for gray scale images. This paper provides a theoretical model to analyze the watermarking code for dispersed ordered dithered halftone images using Hilbert curve decomposition. The analytical...
This paper presents a fragile, blind and erasable watermark with low video quality degradations, the watermarking is done after the H.264 compression process. The framework computes a watermark, embeds the watermark and generates a new H.264 bit stream. The payload of the watermark consists of the encrypted hash value and a certificate with the public key. Some skipped macroblocks of the H.264 video...
A new method using an error correcting code to reduce the probability of detection error for a digital watermark is proposed. The performance of the method is evaluated with a digital watermark for a 2D image as an example. In the method, only minimum weight codewords of the code are used as embedded information and two different decoding algorithms are used to reduce the probability of detection...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.