36 Hits in 9.5 sec

A Bayesian Approach to Affine Transformation Resistant Image and Video Watermarking [chapter]

Gabriella Csurka, Frédéric Deguillaume, Joseph J. K. Ó Ruanaidh, Thierry Pun
2000 Lecture Notes in Computer Science  
This paper proposes a new approach for assessing the presence of a digital watermark in images and videos.  ...  To do that, the Bayesian approach allows the deduction of the relative logprobability of the presence of a watermark in an image given only the key.  ...  Acknowledgments We are grateful to Shelby Pereira and Svyatoslav Voloshynovskyy for a number of interesting discussions on the subject, and to Dr A.  ... 
doi:10.1007/10719724_19 fatcat:iz332c3jbnh5zpti7ehsjiqo5y

Confronting the Synchronization Problem of Semantic Region Under Geometric Attacks

Paraskevi Tzouveli, Klimis Ntalianis, Stefanos Kollias
2006 2006 IEEE International Conference on Multimedia and Expo  
In this paper, an affine invariant watermarking scheme, robust to geometric attacks, is proposed and applied to face regions.  ...  Initially, face regions are unsupervisedly extracted from an initial image and a normalization procedure, invariant to geometric attacks is applied on each of these regions using a set of specific moment  ...  This approach can be used as a public watermarking scheme, providing robustness to general affine geometric attacks.  ... 
doi:10.1109/icme.2006.262788 dblp:conf/icmcs/TzouveliNK06 fatcat:lt3q5jlaebecrhzwn72so2ypii

Secure self-recovery watermarking scheme for error concealment and tampering detection

Pedro Garcia Freitas, Ronaldo Rigoni, Mylène C. Q. Farias
2016 Journal of the Brazilian Computer Society  
In this paper, we present a method for protecting and restoring lost or tampered information in images or videos using secure watermarks.  ...  The proposed method consists of a combination of techniques that are able to detect image and video manipulations.  ...  MCQF is the research adviser and was responsible to guide the research, the writing, and the revising of this manuscript. All authors read and approved the final version of this work.  ... 
doi:10.1186/s13173-016-0046-3 fatcat:odcigyj7snc6bhr4dm2mgjhgse

A Residual Chaotic System for Image Security and Digital Video Watermarking

Guoxiang Tong, Zhehua Liang, Fengjun Xiao, Naixue Xiong
2021 IEEE Access  
The invisibility is good, the watermark capacity has been significantly improved, and the video bit-rate growth rate is in a good range.  ...  The watermark can resist attacks such as noise and the bit error rate under re-encoding and Gaussian low-pass filtering attacks.  ...  In addition to traditional standards, literature [29] proposed a method for image encryption, using affine transformation and bit manipulation.  ... 
doi:10.1109/access.2021.3108196 fatcat:7l5e5pvxi5hijceddkliuslshq

Table of contents

2009 2009 IEEE International Conference on Acoustics, Speech and Signal Processing  
Guixing Wu, Research In Motion, Canada; En-hui Yang, University of Waterloo, Canada; Da-Ke He, Research In Motion, Canada IFS-P2.3: MULTI-FLOW ATTACK RESISTANT WATERMARKS FOR NETWORK FLOWS ...........  ...  .......................................... 1285 Yi Wang, Richard Schultz, Ronald Fevig, University of North Dakota, United States IVMSP-P10.10: A NEW METHOD TO FIND AN OPTIMAL WARPING FUNCTION IN IMAGE  ... 
doi:10.1109/icassp.2009.4959504 fatcat:r7zbfhjwpzervj575dmonc7w7u

2019 Index IEEE Transactions on Circuits and Systems for Video Technology Vol. 29

2019 IEEE transactions on circuits and systems for video technology (Print)  
., +, TCSVT June 2019 1806-1818 Affine transforms A Face Alignment Accelerator Based on Optimized Coarse-to-Fine Shape Searching.  ...  ., +, TCSVT Oct. 2019 3083-3094 Image watermarking Random Matching Pursuit for Image Watermarking.  ... 
doi:10.1109/tcsvt.2019.2959179 fatcat:2bdmsygnonfjnmnvmb72c63tja

Association of Moving Objects Across Visual Sensor Networks

Muhammad J. Mirza, Nadeem Anjum
2012 Journal of Multimedia  
Although two complementary watermarks are embedded simultaneously to provide higher detection response, each watermark could resist a specific class of attacks.  ...  SIFT feature is a type of local invariant feature, which is propose by Lowe et al. and proved to be invariant to image scale and rotation, also robust to a substantial range of affine distortion, change  ...  At last, a case study from the developed prototype system shows the feasibility and flexibility of this method under distributed CAD environment.  ... 
doi:10.4304/jmm.7.1.2-8 fatcat:4cc7sala7ffixohi3ccvothajm

Anti-collusion fingerprinting for multimedia

W. Trappe, Min Wu, Z.J. Wang, K.J. Ray Liu
2003 IEEE Transactions on Signal Processing  
These fingerprints are typically embedded into the content using watermarking techniques that are designed to be robust to a variety of attacks.  ...  We demonstrate the performance of our ACC for fingerprinting multimedia and identifying colluders through experiments using Gaussian signals and real images.  ...  Another approach to constructing BIBDs is to use -dimensional projective and affine geometry over , where is of prime power. Projective and affine geometries yield and BIBDs [34] , [36] .  ... 
doi:10.1109/tsp.2003.809378 fatcat:ewt2b3fvvjazllqcx6nxpt6m7e

Comprehensive Feature-based Robust Video Fingerprinting Using Tensor Model [article]

Xiushan Nie, Yilong Yin, Jiande Sun
2016 arXiv   pre-print
The robust video fingerprinting framework is resistant not only to single-mode modifications, but also to the combination of them.  ...  Most existing video fingerprinting methods use a single feature or concatenating different features to generate video fingerprints, and show a good performance under single-mode modifications such as noise  ...  Watermarking is a traditional technology used to detect copies of images or videos. It embeds imperceptible watermarks into the media to prove its authenticity.  ... 
arXiv:1601.07270v1 fatcat:3xu4pojk3nemhezmxzzvtnyjge

2021 Index IEEE Transactions on Image Processing Vol. 30

2021 IEEE Transactions on Image Processing  
Departments and other items may also be covered if they have been judged to have archival value. The Author Index contains the primary entry for each item, listed under the first author's name.  ...  The primary entry includes the coauthors' names, the title of the paper or other item, and its location, specified by the publication abbreviation, year, month, and inclusive pagination.  ...  Wang, L., +, TIP 2021 7541-7553 Affine transforms Affine Transformation-Based Deep Frame Prediction.  ... 
doi:10.1109/tip.2022.3142569 fatcat:z26yhwuecbgrnb2czhwjlf73qu

Bridging Socially Enhanced Virtual Communities

Venugopal Rao
2013 IOSR Journal of Computer Engineering  
It is achieved by discovering present relevant businesses and prospective business alliances by developing a semi-automated approach.  ...  The communication and interactions across the companies has become a common phenomenon.  ...  help given to us in the completion of our project titled, 'Video Watermarking scheme based on DWT and PCA for copyright protection'.  ... 
doi:10.9790/0661-0940104 fatcat:zejgpenvqzb7rkchkznv5igfwm

Unmasking Clever Hans predictors and assessing what machines really learn

Sebastian Lapuschkin, Stephan Wäldchen, Alexander Binder, Grégoire Montavon, Wojciech Samek, Klaus-Robert Müller
2019 Nature Communications  
Furthermore, our work intends to add a voice of caution to the ongoing excitement about machine intelligence and pledges to evaluate and judge some of these recent successes in a more nuanced manner.  ...  This showcases a spectrum of problem-solving behaviors ranging from naive and short-sighted, to well-informed and strategic.  ...  In b), the watermark has been edited out. The artificially created images c) and d) show a sports car on a lush green meadow with and without an added copyright watermark.  ... 
doi:10.1038/s41467-019-08987-4 pmid:30858366 pmcid:PMC6411769 fatcat:2r376sf72revhhwqiagj7j25mm

2021 Index IEEE Transactions on Neural Networks and Learning Systems Vol. 32

2021 IEEE Transactions on Neural Networks and Learning Systems  
Departments and other items may also be covered if they have been judged to have archival value. The Author Index contains the primary entry for each item, listed under the first author's name.  ...  The primary entry includes the coauthors' names, the title of the paper or other item, and its location, specified by the publication abbreviation, year, month, and inclusive pagination.  ...  Hou, R., +, TNNLS Oct. 2021 4460-4474 Image Set Classification Using a Distance-Based Kernel Over Affine Grassmann Manifold.  ... 
doi:10.1109/tnnls.2021.3134132 fatcat:2e7comcq2fhrziselptjubwjme

Sliding bifurcations in resonant inverters

Enrique Ponce, Luis Benadero, Abdelali El Aroudi, Luis Martinez-Salamero
2017 2017 14th International Multi-Conference on Systems, Signals & Devices (SSD)  
Paper Reference: (CSP-4-6) 1570331991 Title: Watermarking for integrity, authentication and security of Medical Imaging Author(s): Amine Mestiri (Tunisia) Abstract -Image watermarking has been generally  ...  In this paper, we propose a hybrid system of reversible Digital Watermarking H-GAWM for medical images.  ... 
doi:10.1109/ssd.2017.8167001 dblp:conf/IEEEssd/PonceBAM17 fatcat:6lbol63imjffhezjv6yc6cnheu

Bayesian structural content abstraction for image authentication

Wei Feng, Zhi-Qiang Liu
Proceedings 7th International Conference on Signal Processing, 2004. Proceedings. ICSP '04. 2004.  
In this paper, we propose a structural content abstraction scheme within the Bayesian framework, based on which an implicit and reliable image authentication scheme can be established.  ...  Although the numerous existing algorithms can detect and locate malicious alterations to the protected image, unfortunately, most are still too fragile to resist various content-preserving manipulations  ...  , affine transformation, enhancing and blurring etc., while detecting "content altering" modifications (i.e., COs), such as object adding, removal and replacement etc.  ... 
doi:10.1109/icosp.2004.1442245 fatcat:uvrog7pvwzbbzhvgx7xpxpswoe
« Previous Showing results 1 — 15 out of 36 results