A copy of this work was available on the public web and has been preserved in the Wayback Machine. The capture dates from 2010; you can also visit the original URL.
The file type is application/pdf
.
Filters
A Novel Self-adaptation Differential Energy Video Watermarking Scheme in Copyright Protection
2009
Journal of Multimedia
This paper proposes a novel self-adaptation differential energy watermarking based on the Watson visual model, which inserts robust watermark into video streaming according to the differential energy theory ...
And it also can be self-adaptive cheesed that the region should be embed watermarks according to the relationship between the energy adjustable threshold and their differential energy. ...
This paper presents a novel differential energy watermarking based on Watson visual model applied at the video streaming. ...
doi:10.4304/jmm.4.3.153-160
fatcat:bnng6psipvbcpgz4h2nfzjpqbu
Review of Robust Video Watermarking Algorithms
[article]
2010
arXiv
pre-print
Applications of video watermarking in copy control, broadcast monitoring, fingerprinting, video authentication, copyright protection etc is immensely rising. ...
In this paper, we introduce the notion of Video Watermarking and the features required to design a robust watermarked video for a valuable application. ...
In [29] a novel self-adaptation differential energy watermarking based on the Watson visual model is proposed that inserts robust watermark into video streaming according to the differential energy theory ...
arXiv:1004.1770v1
fatcat:4jic3lc26zbzvdbbhxeictdetm
INFORMATION-THEORETIC DATA-HIDING: RECENT ACHIEVEMENTS AND OPEN PROBLEMS
2005
International Journal of Image and Graphics
In this paper we introduce and develop a framework for visual data-hiding technologies that aim at resolving emerging problems of modern multimedia networking. ...
Finally, we demonstrate the possible extensions of this theory for watermark-assisted multimedia processing and indicate its perspectives for distributed communications. ...
Robust watermarking is mainly used for copyright protection, content tracking and content self-labeling. ...
doi:10.1142/s0219467805001641
fatcat:fwt723y6znaoportlfewwvgdly
Design of a Hybrid Digital Watermarking Algorithm with High Robustness
2020
Journal of Web Engineering
As an important information security scheme, digital watermarking technology provides a powerful solution to the protection of multimedia works. ...
The copyright of media works urgently needs to be protected. ...
[3] present another approach applying self-adaptive differential evolution (SDE) based on optimized DWT-SVD. ...
doi:10.13052/jwe1540-9589.19567
fatcat:aukivekgvre2xjtbayay27nrya
A Secure Watermarking and Tempering Detection Technique Using 2 Level DWT
2014
International Journal of Web Science and Engineeringfor Smart Devices
Digital Watermarking is a vital field for copyrights of a variety of electronic documents and media. ...
This paper present a review on digital watermarking their classification, application, techniques, attacks and also tampering detection in digital watermarking. ...
This is a large problem in fingerprinting, copy control or copyright protection. ...
doi:10.21742/ijwsesd.2014.1.1.02
fatcat:ikzt26fknzgqvb4vdxh4qehsay
StegoWall: blind statistical detection of hidden data
2002
Security and Watermarking of Multimedia Contents IV
The multimedia industry as well as the research community recognize the urgent necessity for network security and copyright protection, or rather the lack of adequate law for digital multimedia protection ...
The basic idea of our complex approach is to exploit all information about hidden data statistics to perform its detection based on a stochastic framework. ...
Therefore, for example, if the copyright of images or videos is protected by someone using some unknown or proprietary digital watermarking technology, the practical proof of ownership or data origin seems ...
doi:10.1117/12.465324
dblp:conf/sswmc/VoloshynovskiyH02
fatcat:6o2jvywucnhsrglikw4eez5m6q
ENCRYPTION BASED WATERMARKING TECHNIQUE FOR SECURITY OF MEDICAL IMAGE
2022
Zenodo
This paper proposes an encryption-based image watermarking scheme for medical images using a customized quantization of wavelet coefficient and a crypto system based on the chaotic cipher of Singular Value ...
The high frequency wavelet coefficients are selected to carry these scrambled-watermarks by using adaptive quantization low bit modulation (LBM). ...
video, or image to protect the copyright, benefit of the investor and legal rights of owners. ...
doi:10.5281/zenodo.6378802
fatcat:dbaiahbasncpxchjg6qhx6xkki
International Conference on Image Processing
1996
Proceedings of 3rd IEEE International Conference on Image Processing
ISBrj 0 -7 8 0 3 -3 2 5 9 -8 ( c a s e b o u n d ) I S B N 3 -7 8 0 3 -3 2 6 0 -1 ( m i c r o f i c h e ) L i b r a r yof C o n g r e s s : 9 6 -7 5 5 5 7 I S B N 0 -7 8 0 3 -3 2 5 8 -x ~~f t b o u~d ) ...
Calway
Steve Mann
Josef Bigiin
Reiner Lenz, Kazuhiro Homma"
Roland Wilson
19A2: Watermarking, copyright protection and access control
of multimedia services
Transparent robust image watermarking ...
Almeida 19A6: Adaptive CodingA shape-adaptive transform for object-based coding Unscreening using a hybrid filtering approach A novel selective coding scheme based on layered structure Synthesized data ...
doi:10.1109/icip.1996.560353
fatcat:le3ysy6wxrfr7nq56ueropy7tu
Guest Editorial: Multimedia for Predictive Analytics
2017
Multimedia tools and applications
We would like to express our gratitude to all the authors who have submitted their work for publication in this special issue. ...
Borko Furht, Editor-in-Chief, Multimedia Tools and Applications (MTAP), for his support, encouragement and guidance throughout the process. ...
In CyVOD: A Novel Trinity Multimedia Social Network Scheme (https://doi.org/10.1007/s11042-016-4162-z). ...
doi:10.1007/s11042-017-5107-x
fatcat:mgp6pimnbzcypneluv43dujqcm
Watermark-Based Authentication
[chapter]
2010
Studies in Computational Intelligence
In this paper, the authors introduce two techniques for self-embedding an image in itself as a means for protecting the image content. ...
Watson mask [70] and a tuned energy gain. ...
doi:10.1007/978-3-642-11756-5_16
fatcat:rxlbydycbrfzhpa3sa5ycukaq4
2019 Index IEEE Transactions on Circuits and Systems for Video Technology Vol. 29
2019
IEEE transactions on circuits and systems for video technology (Print)
Porikli, F., +, TCSVT Sept. 2019 2535-2537 Copyright protection IR Feature Embedded BOF Indexing Method for Near-Duplicate Video Retrieval. ...
Tao, J., +, TCSVT Feb. 2019 594-600
Data mining
A Novel High-Capacity Reversible Data Hiding Scheme for Encrypted
JPEG Bitstreams. ...
doi:10.1109/tcsvt.2019.2959179
fatcat:2bdmsygnonfjnmnvmb72c63tja
New Fault Injection Approach for Network on Chip
2013
IOSR Journal of Electronics and Communication Engineering
Smart antennas allow the energy to be transmitted or received in a particular direction as opposed to disseminating energy in all directions. ...
The main architectural scheme of the proposed approach. The rest of this paper is organized as follows. ...
PROPOSED WATERMARKING SCHEME This project presented an efficient video watermarking technique using discrete cosine transform (DCT) to protect the copyright protection of digital images. ...
doi:10.9790/2834-0520106
fatcat:snatuoexlzd7bedziejtum6npe
A 3D Simplification Method based on Dual Point Sampling
2013
Journal of Multimedia
Digital watermarking has been widely used in copyright protection for digital images, but most of the watermarking algorithm can't resist print-and-scan process. ...
The watermark information is embedded in a halftone process for image screening with phase modulation method. The watermark is extracted by a template, which is optimized using the PSO algorithm. ...
the watermark after image suffered from JPEG compression. In [22] , Wang et al. proposed a wavelet-tree-based blind watermarking scheme for copyright protection. ...
doi:10.4304/jmm.8.3.191-197
fatcat:z5gmzeiwqfadlakggntajifdru
Cell Segmentation in Cervical Smear Images using Polar Coordinates GVF Snake with Radiating Edge Map
2013
Journal of Multimedia
Digital watermarking has been widely used in copyright protection for digital images, but most of the watermarking algorithm can't resist print-and-scan process. ...
The watermark information is embedded in a halftone process for image screening with phase modulation method. The watermark is extracted by a template, which is optimized using the PSO algorithm. ...
the watermark after image suffered from JPEG compression. In [22] , Wang et al. proposed a wavelet-tree-based blind watermarking scheme for copyright protection. ...
doi:10.4304/jmm.8.3.213-219
fatcat:fb5tm3tguvgmxblj3eygm7pqmu
Proceedings of 3rd IEEE International Conference on Image Processing
1996
Proceedings of 3rd IEEE International Conference on Image Processing ICIP-96
and locality: uncertainty revisited Jean-Pierre Antoine Klas Nordberg, Gb'19A2: Watermarking, copyright protection and access control of multimedia services Transparent robust image watermarking Mitchell ...
Almeida 19A6: Adaptive Coding A shape-adaptive transform for object-based coding Unscreening using a hybrid filtering approach A novel selective coding scheme based on layered structure Synthesized data ...
doi:10.1109/icip.1996.559416
fatcat:jb4cdydgf5edtdljfuzj423ozu
« Previous
Showing results 1 — 15 out of 143 results