1,682 Hits in 7.1 sec

Robust Blind Image Watermarking with Independent Component Analysis: A Embedding Algorithm [chapter]

Juan José Murillo-Fuentes, Rafael Boloix-Tortosa
2005 Lecture Notes in Computer Science  
The authors propose a new solution to the blind robust watermarking of digital images. In this approach we embed the watermark into the independent components of the image.  ...  Since independent components are related to the edges of the image, this method has a little perceptual impact on the watermarked image.  ...  Conclusions In this paper we propose a new blind robust image watermarking algorithm, where we embed the watermark into the independent components of the image.  ... 
doi:10.1007/11494669_135 fatcat:saqvtmioyvc75p5ijeu74jafya

Embedding QR Code in the Wavelet Domain of Image for Metadata Hiding

Yoo Gilsang, Kim Hyeoncheol
2016 Indian Journal of Science and Technology  
Independent Component Analysis was applied to the watermark signal and to insert the QR code to the low frequency band of the host image.  ...  Methods/Statistical Analysis: This paper provides new QR code watermarking technique that is included in the low-frequency sub-bands through the haar wavelet transformation to CIE XYZ color space of the  ...  Most of the ICA methods are used to blind separate the host image [15] [16] [17] [18] . In 19 , a watermark was inserted based on the discrete wavelet transform and Independent Component Analysis.  ... 
doi:10.17485/ijst/2016/v9i29/94759 fatcat:25fdzmi7pjc3pnuxuqiddvp7w4

Independent component analysis in the blind watermarking of digital images

J.J. Murillo-Fuentes
2007 Neurocomputing  
We propose a new method for the blind robust watermarking of digital images based on independent component analysis (ICA).  ...  On the one hand, each user can define its own ICA-based transformation. These transformations behave as "private-keys" of the method.  ...  Conclusions We have proposed a new approach to the robust blind watermarking of digital images based on the ICA image processing in [3, 15] .  ... 
doi:10.1016/j.neucom.2006.06.011 fatcat:ifwgxf2tyre6ro3qmf22zygu5i

Hybrid embedding strategy for a blind audio watermarking system using EMD and ISA techniques

Nawal El Hamdouni, Abdellah Adib, Sonia Djaziri Larbi, Monia Turki
2010 2010 4th International Symposium on Communications, Control and Signal Processing (ISCCSP)  
It is based on a new approach to embed/extract the watermark by combining the Empirical Mode Decomposition (EMD) [4] and the Blind Source Separation (SSS) based on the Independent Subspaces Analysis (ISA  ...  In this paper, a new digital audio watermarking scheme is discussed to increase the information transmitted in a communication context [7] .  ...  The second main purpose of this paper is the design of a watermark blind extractor based on the combination of the Independent Component Analysis (leA) [5] and the Independent Subspace Analysis (lSA)  ... 
doi:10.1109/isccsp.2010.5463381 fatcat:c3s5ffkzlfaw7dcyhxw2ciq6ji

Improved Watermark Extraction Exploiting Undeterminated Source Separation Methods [chapter]

Mohammed Khalil, Nawal El Hamdouni, Abdellah Adib
2012 Lecture Notes in Computer Science  
The proposed method considers the detection problem of the watermark as a matter of Blind Source Separation (BSS) between the audio signal and the watermark one.  ...  The resulting technique called UISA (Underdetermined Independent Subspace Analysis) permits extracting the embedded watermark with low binary error rate and high bit rate.  ...  We focus on designing a blind detector using a new BSS technique called UISA [7] .  ... 
doi:10.1007/978-3-642-31254-0_32 fatcat:iakze3zxifd3ll334ohay5k6my

Content-Based Watermarking for Image Authentication Using Independent Component Analysis

Latha Parameswaran, K. Anbumani
2008 Informatica (Ljubljana, Tiskana izd.)  
This paper proposes a novel approach to content-based watermarking for image authentication that is based on Independent Component Analysis (ICA).  ...  Frobenius norm of the mixing matrix is adopted as the content-based feature. This is embedded as the watermark in a mid-frequency DCT coefficient of the block.  ...  Conclusion This paper has discussed a new blind content-based watermarking scheme for image authentication using ICA and DCT.  ... 
dblp:journals/informaticaSI/ParameswaranA08 fatcat:yl3d32kdorg5bmlrxcusqgn66a


B. Sridhar
2017 International Journal on Smart Sensing and Intelligent Systems  
Also, comprehensive review of the literature on the evolution of various video watermarking techniques to achieve robustness and to maintain the quality of watermarked video sequences.  ...  The extensive literature collected related to the performance improvement of video watermarking techniques is critically reviewed and presented in this paper.  ...  In this paper, the author proposed a novel video watermarking scheme to watermark the original video based on locating motion region, using the independent component analysis (ICA) and the quantization  ... 
doi:10.21307/ijssis-2017-217 fatcat:wamzxdqkifgc7l7f4k2y6ihsxa

Blind PDF Document Watermarking Robust Against PCA and ICA Attacks

Makram W. Hatoum, Rony Darazi, Jean-François Couchot
2018 Proceedings of the 15th International Joint Conference on e-Business and Telecommunications  
Principal Component Analysis (PCA) and Independent Component Analysis (ICA). This security breach can be harnessed by an opponent to copy, remove, or modify the embedded watermark.  ...  In this position paper, a CAR-STDM (Component Analysis Resistant-STDM) is designed and its application on PDF documents is presented.  ...  Among Blind Source Separation (BSS) techniques, we focus here on Principal Component Analysis (PCA) and Independent Component Analysis (ICA) recalled hereafter.  ... 
doi:10.5220/0006899605860593 dblp:conf/icete/HatoumDC18 fatcat:baxijjyrtndylgcyre24gpsiya

Denoising and copy attacks resilient watermarking by exploiting prior knowledge at detector

Chun Shien Lu, Hong-Yuan Liao, M. Kutter
2002 IEEE Transactions on Image Processing  
We prove that the proposed scheme can resist two famous denoising-based attacks, which h a ve successfully cracked many existing watermarking schemes.  ...  Watermarking with both oblivious detection and high robustness capabilities is still a challenging problem.  ...  In order to achieve the above mentioned goal, the I C A -based (Independent Component Analysis) sparse code shrinkage (SCS) technique 9] is employed to model the denoising problem.  ... 
doi:10.1109/83.988961 pmid:18244631 fatcat:4egtgiaivrg4bnx5n5ifz53pvi

Watermarking Based on Independent Component Analysis in Spatial Domain

Abolfazl Hajisami, Alireza Rahmati, Massoud Babaie-Zadeh
2011 2011 UkSim 13th International Conference on Computer Modelling and Simulation  
This paper proposes an image watermarking scheme for copyright protection based on Independent Component Analysis (ICA).  ...  Experimental results show that the new method has better quality than famous methods [1], [2], [3] in spatial or frequency domain and is robust against various attacks.  ...  Meher, "A new digital watermarking technique using independent component analysis," EURASIP Journal on Advances in Signal Processing, vol. 2008, 2008.  ... 
doi:10.1109/uksim.2011.63 dblp:conf/uksim/HajisamiRB11 fatcat:lsf2lcoxyrcw3l5eunznkgvl7y

Watermark Detection and Extraction Using Independent Component Analysis Method

Dan Yu, Farook Sattar, Kai-Kuang Ma
2002 EURASIP Journal on Advances in Signal Processing  
This paper proposes a new image watermarking technique, which adopts Independent Component Analysis (ICA) for watermark detection and extraction process (i.e., dewatermarking).  ...  The evaluations illustrate the validity and good performance of the proposed watermark detection and extraction scheme based on ICA.  ...  The authors are very thankful to the reviewer for his valuable suggestions, especially for referring the paper in [9] and suggesting us to consider more common and prominent attacks for performance analysis  ... 
doi:10.1155/s111086570200046x fatcat:yspqp4uzwfa6rfwiycbfupcl5a

A Comprehensive Survey on Three-Dimensional Mesh Watermarking

Kai Wang, Guillaume Lavoue, Florence Denis, Atilla Baskurt
2008 IEEE transactions on multimedia  
Finally, some future working directions are pointed out especially on the ways of devising robust and blind algorithms and on some new probably promising watermarking feature spaces.  ...  Then we give a presentation and an analysis of the existing algorithms by distinguishing them between fragile techniques and robust techniques.  ...  . • Robust Techniques in Transform Domain Based on Multiresolution Analysis Based on the regular wavelet analysis tool presented in the subsection concerning fragile techniques in transform domain (Section  ... 
doi:10.1109/tmm.2008.2007350 fatcat:dvivcwdgbfdd3f25zcx56vnfne

Three-Dimensional Meshes Watermarking: Review and Attack-Centric Investigation [chapter]

Kai Wang, Guillaume Lavoué, Florence Denis, Atilla Baskurt
2007 Lecture Notes in Computer Science  
This paper gives a synthetic review of 3D mesh watermarking techniques, which are deemed to be a potential effective solution to the above problem.  ...  We begin with a discussion on the particular difficulties encountered while applying watermarking on 3D meshes.  ...  Spectral Techniques Most of the successful image watermarking algorithms are based on spectral analysis.  ... 
doi:10.1007/978-3-540-77370-2_4 fatcat:ntppw24a45hbnguvrbli7b2dfm

A Blind Video Watermarking Scheme Based on 3D Discrete Wavelet Transform

Majid Masoumi
2012 International Journal of Innovation Management and Technology  
In this paper a novel digital watermarking method for video based on multi-resolution wavelet decomposition is proposed.  ...  The core idea behind our proposed technique is to use the scene change analysis to embed the watermark into DWT coefficients of detected motion scene frames.  ...  Hence a new video watermarking scheme is proposed to overcome this problem, too.  ... 
doi:10.7763/ijimt.2012.v3.281 fatcat:ksovtxpyifcrnfauvs5dygqcre

Efficient video watermarking with SWT and empirical PCA based decoding

Teena M. Thomas
2014 IOSR Journal of Computer Engineering  
This paper presents a novel technique for embedding a image/data into video frames.  ...  In our paper, to embed the watermark, stationary wavelet transform (SWT) is used in combination with principal component analysis (PCA) in order to increase the robustness against many attacks, to increase  ...  Related Work In this section we briefly describe the three related topics:1)A Block Based Novel Digital Video Watermarking Scheme Using Dct 2) A New Scheme For Robust Blind Digital Video Watermarking 3  ... 
doi:10.9790/0661-16590814 fatcat:rm5mgnwqx5be3csra55chyfwla
« Previous Showing results 1 — 15 out of 1,682 results