Filters








143 Hits in 7.3 sec

A Novel Self-adaptation Differential Energy Video Watermarking Scheme in Copyright Protection

Tanfeng Sun, Xinghao Jiang, Shusen Shi, Zhigao Lin, Guanglei Fu
2009 Journal of Multimedia  
This paper proposes a novel self-adaptation differential energy watermarking based on the Watson visual model, which inserts robust watermark into video streaming according to the differential energy theory  ...  And it also can be self-adaptive cheesed that the region should be embed watermarks according to the relationship between the energy adjustable threshold and their differential energy.  ...  This paper presents a novel differential energy watermarking based on Watson visual model applied at the video streaming.  ... 
doi:10.4304/jmm.4.3.153-160 fatcat:bnng6psipvbcpgz4h2nfzjpqbu

Review of Robust Video Watermarking Algorithms [article]

Neeta Deshpande, Archana Rajurkar, R Manthalkar
2010 arXiv   pre-print
Applications of video watermarking in copy control, broadcast monitoring, fingerprinting, video authentication, copyright protection etc is immensely rising.  ...  In this paper, we introduce the notion of Video Watermarking and the features required to design a robust watermarked video for a valuable application.  ...  In [29] a novel self-adaptation differential energy watermarking based on the Watson visual model is proposed that inserts robust watermark into video streaming according to the differential energy theory  ... 
arXiv:1004.1770v1 fatcat:4jic3lc26zbzvdbbhxeictdetm

INFORMATION-THEORETIC DATA-HIDING: RECENT ACHIEVEMENTS AND OPEN PROBLEMS

SVIATOSLAV VOLOSHYNOVSKIY, FREDERIC DEGUILLAUME, OLEKSIY KOVAL, THIERRY PUN
2005 International Journal of Image and Graphics  
In this paper we introduce and develop a framework for visual data-hiding technologies that aim at resolving emerging problems of modern multimedia networking.  ...  Finally, we demonstrate the possible extensions of this theory for watermark-assisted multimedia processing and indicate its perspectives for distributed communications.  ...  Robust watermarking is mainly used for copyright protection, content tracking and content self-labeling.  ... 
doi:10.1142/s0219467805001641 fatcat:fwt723y6znaoportlfewwvgdly

Design of a Hybrid Digital Watermarking Algorithm with High Robustness

Yi Xie, Yulin Wang, Maode Ma
2020 Journal of Web Engineering  
As an important information security scheme, digital watermarking technology provides a powerful solution to the protection of multimedia works.  ...  The copyright of media works urgently needs to be protected.  ...  [3] present another approach applying self-adaptive differential evolution (SDE) based on optimized DWT-SVD.  ... 
doi:10.13052/jwe1540-9589.19567 fatcat:aukivekgvre2xjtbayay27nrya

A Secure Watermarking and Tempering Detection Technique Using 2 Level DWT

Madhuri Rajawat, Dheerendra S. Tomar
2014 International Journal of Web Science and Engineeringfor Smart Devices  
Digital Watermarking is a vital field for copyrights of a variety of electronic documents and media.  ...  This paper present a review on digital watermarking their classification, application, techniques, attacks and also tampering detection in digital watermarking.  ...  This is a large problem in fingerprinting, copy control or copyright protection.  ... 
doi:10.21742/ijwsesd.2014.1.1.02 fatcat:ikzt26fknzgqvb4vdxh4qehsay

StegoWall: blind statistical detection of hidden data

Sviatoslav V. Voloshynovskiy, Alexander Herrigel, Yuri B. Rytsar, Thierry Pun, Edward J. Delp III, Ping W. Wong
2002 Security and Watermarking of Multimedia Contents IV  
The multimedia industry as well as the research community recognize the urgent necessity for network security and copyright protection, or rather the lack of adequate law for digital multimedia protection  ...  The basic idea of our complex approach is to exploit all information about hidden data statistics to perform its detection based on a stochastic framework.  ...  Therefore, for example, if the copyright of images or videos is protected by someone using some unknown or proprietary digital watermarking technology, the practical proof of ownership or data origin seems  ... 
doi:10.1117/12.465324 dblp:conf/sswmc/VoloshynovskiyH02 fatcat:6o2jvywucnhsrglikw4eez5m6q

ENCRYPTION BASED WATERMARKING TECHNIQUE FOR SECURITY OF MEDICAL IMAGE

Abderrahmane Daham, Mohamed Ouslim
2022 Zenodo  
This paper proposes an encryption-based image watermarking scheme for medical images using a customized quantization of wavelet coefficient and a crypto system based on the chaotic cipher of Singular Value  ...  The high frequency wavelet coefficients are selected to carry these scrambled-watermarks by using adaptive quantization low bit modulation (LBM).  ...  video, or image to protect the copyright, benefit of the investor and legal rights of owners.  ... 
doi:10.5281/zenodo.6378802 fatcat:dbaiahbasncpxchjg6qhx6xkki

International Conference on Image Processing

1996 Proceedings of 3rd IEEE International Conference on Image Processing  
ISBrj 0 -7 8 0 3 -3 2 5 9 -8 ( c a s e b o u n d ) I S B N 3 -7 8 0 3 -3 2 6 0 -1 ( m i c r o f i c h e ) L i b r a r yof C o n g r e s s : 9 6 -7 5 5 5 7 I S B N 0 -7 8 0 3 -3 2 5 8 -x ~~f t b o u~d )  ...  Calway Steve Mann Josef Bigiin Reiner Lenz, Kazuhiro Homma" Roland Wilson 19A2: Watermarking, copyright protection and access control of multimedia services Transparent robust image watermarking  ...  Almeida 19A6: Adaptive CodingA shape-adaptive transform for object-based coding Unscreening using a hybrid filtering approach A novel selective coding scheme based on layered structure Synthesized data  ... 
doi:10.1109/icip.1996.560353 fatcat:le3ysy6wxrfr7nq56ueropy7tu

Guest Editorial: Multimedia for Predictive Analytics

Sanjay Kumar Singh, Amit Kumar Singh, Basant Kumar, Subir Kumar Sarkar, Karm Veer Arya
2017 Multimedia tools and applications  
We would like to express our gratitude to all the authors who have submitted their work for publication in this special issue.  ...  Borko Furht, Editor-in-Chief, Multimedia Tools and Applications (MTAP), for his support, encouragement and guidance throughout the process.  ...  In CyVOD: A Novel Trinity Multimedia Social Network Scheme (https://doi.org/10.1007/s11042-016-4162-z).  ... 
doi:10.1007/s11042-017-5107-x fatcat:mgp6pimnbzcypneluv43dujqcm

Watermark-Based Authentication [chapter]

Angela D'Angelo, Giacomo Cancelli, Mauro Barni
2010 Studies in Computational Intelligence  
In this paper, the authors introduce two techniques for self-embedding an image in itself as a means for protecting the image content.  ...  Watson mask [70] and a tuned energy gain.  ... 
doi:10.1007/978-3-642-11756-5_16 fatcat:rxlbydycbrfzhpa3sa5ycukaq4

2019 Index IEEE Transactions on Circuits and Systems for Video Technology Vol. 29

2019 IEEE transactions on circuits and systems for video technology (Print)  
Porikli, F., +, TCSVT Sept. 2019 2535-2537 Copyright protection IR Feature Embedded BOF Indexing Method for Near-Duplicate Video Retrieval.  ...  Tao, J., +, TCSVT Feb. 2019 594-600 Data mining A Novel High-Capacity Reversible Data Hiding Scheme for Encrypted JPEG Bitstreams.  ... 
doi:10.1109/tcsvt.2019.2959179 fatcat:2bdmsygnonfjnmnvmb72c63tja

New Fault Injection Approach for Network on Chip

Tapas Patel
2013 IOSR Journal of Electronics and Communication Engineering  
Smart antennas allow the energy to be transmitted or received in a particular direction as opposed to disseminating energy in all directions.  ...  The main architectural scheme of the proposed approach. The rest of this paper is organized as follows.  ...  PROPOSED WATERMARKING SCHEME This project presented an efficient video watermarking technique using discrete cosine transform (DCT) to protect the copyright protection of digital images.  ... 
doi:10.9790/2834-0520106 fatcat:snatuoexlzd7bedziejtum6npe

A 3D Simplification Method based on Dual Point Sampling

Juan Cao, Yitian Zhao, Ran Song, Yingchun Zhang
2013 Journal of Multimedia  
Digital watermarking has been widely used in copyright protection for digital images, but most of the watermarking algorithm can't resist print-and-scan process.  ...  The watermark information is embedded in a halftone process for image screening with phase modulation method. The watermark is extracted by a template, which is optimized using the PSO algorithm.  ...  the watermark after image suffered from JPEG compression. In [22] , Wang et al. proposed a wavelet-tree-based blind watermarking scheme for copyright protection.  ... 
doi:10.4304/jmm.8.3.191-197 fatcat:z5gmzeiwqfadlakggntajifdru

Cell Segmentation in Cervical Smear Images using Polar Coordinates GVF Snake with Radiating Edge Map

Xu Chuanyun, Zhang Yang, Wang Sen
2013 Journal of Multimedia  
Digital watermarking has been widely used in copyright protection for digital images, but most of the watermarking algorithm can't resist print-and-scan process.  ...  The watermark information is embedded in a halftone process for image screening with phase modulation method. The watermark is extracted by a template, which is optimized using the PSO algorithm.  ...  the watermark after image suffered from JPEG compression. In [22] , Wang et al. proposed a wavelet-tree-based blind watermarking scheme for copyright protection.  ... 
doi:10.4304/jmm.8.3.213-219 fatcat:fb5tm3tguvgmxblj3eygm7pqmu

Proceedings of 3rd IEEE International Conference on Image Processing

1996 Proceedings of 3rd IEEE International Conference on Image Processing ICIP-96  
and locality: uncertainty revisited Jean-Pierre Antoine Klas Nordberg, Gb'19A2: Watermarking, copyright protection and access control of multimedia services Transparent robust image watermarking Mitchell  ...  Almeida 19A6: Adaptive Coding A shape-adaptive transform for object-based coding Unscreening using a hybrid filtering approach A novel selective coding scheme based on layered structure Synthesized data  ... 
doi:10.1109/icip.1996.559416 fatcat:jb4cdydgf5edtdljfuzj423ozu
« Previous Showing results 1 — 15 out of 143 results