A copy of this work was available on the public web and has been preserved in the Wayback Machine. The capture dates from 2017; you can also visit the original URL.
The file type is application/pdf
.
Filters
Robust audio watermarking using perceptual masking
1998
Signal Processing
Our audio-dependent watermarking procedure directly exploits temporal and frequency perceptual masking to guarantee that the embedded watermark is inaudible and robust. ...
The watermark is constructed by breaking each audio clip into smaller segments and adding a perceptually shaped pseudo-random sequence. ...
Our watermarking procedure directly exploits both frequency and temporal masking characteristics to embed an inaudible and robust watermark. ...
doi:10.1016/s0165-1684(98)00014-0
fatcat:pc6u7zxe7zaetp7yvmxz66k2xi
Multimedia data-embedding and watermarking technologies
1998
Proceedings of the IEEE
Data-embedding and watermarking algorithms embed text, binary streams, audio, image, or video in a host audio, image, or video signal. ...
In this paper, we review recent developments in transparent data embedding and watermarking for audio, image, and video. ...
In [4] and [87] , the authors present an audio watermarking algorithm that exploits temporal and frequency masking (see Section IV-A) to embed robust and inaudible data. ...
doi:10.1109/5.687830
fatcat:dtyaqys2xrdrpkq2tri77kzrzi
Multimedia Data-Embedding and Watermarking Technologies Manuscript received July 15, 1997; revised January 15, 1998. The Guest Editor coordinating the review of this paper and approving it for publication was A. M. Tekalp. This work was supported in part by the Air Force Office of Scientific Research under Grant AF/F49620-94-1-0461 and in part by the Advanced Research Project Agency under Grant AF/F49620-93-1-0558.Publisher Item Identifier S 0018-9219(98)03519-1
[chapter]
2002
Readings in Multimedia Computing and Networking
Data-embedding and watermarking algorithms embed text, binary streams, audio, image, or video in a host audio, image, or video signal. ...
In this paper, we review recent developments in transparent data embedding and watermarking for audio, image, and video. ...
In [4] and [87] , the authors present an audio watermarking algorithm that exploits temporal and frequency masking (see Section IV-A) to embed robust and inaudible data. ...
doi:10.1016/b978-155860651-7/50098-x
fatcat:pr7j4jk4q5hxjltrqcs2uakkaq
Digital Audio watermarking using perceptual masking: A Review
2013
IOSR Journal of Electronics and Communication Engineering
The procedure directly exploits temporal and frequency perceptual masking to guarantee that the embedded watermark is inaudible and robust. ...
The watermark is constructed by breaking each audio clip into smaller segments and adding a perceptually shaped pseudo-random sequence. ...
Watermarking procedure directly exploits both frequency and temporal masking characteristics to embed an inaudible and robust watermark Frequency masking refers to masking between frequency components ...
doi:10.9790/2834-0467378
fatcat:r4ajnhraojatln5tx2rmg3ia7a
Perceptual watermarks for digital images and video
1999
Security and Watermarking of Multimedia Contents
Even more elaborate visual models are used to develop schemes that not only take advantage of frequency characteristics but also adapt to the local image characteristics, providing extremely robust as ...
Such techniques usually take advantage of frequency selectivity and weighing to provide some perceptual criteria in the watermarking process. ...
ACKNOWLEDGEMENTS The authors would like to thank Professor Ahmed Tewfik, Bin Zhu, Mitchell Swanson, Mei Kobayashi and Benson Chau for providing an advanced copy of [2] , as well as example images from ...
doi:10.1117/12.344700
dblp:conf/sswmc/WolfgangPD99
fatcat:e6vabfq3pzbzzersfcxz5oeug4
Perceptual watermarks for digital images and video
1999
Proceedings of the IEEE
Even more elaborate visual models are used to develop schemes that not only take advantage of frequency characteristics but also adapt to the local image characteristics, providing extremely robust as ...
Such techniques usually take advantage of frequency selectivity and weighing to provide some perceptual criteria in the watermarking process. ...
ACKNOWLEDGEMENTS The authors would like to thank Professor Ahmed Tewfik, Bin Zhu, Mitchell Swanson, Mei Kobayashi and Benson Chau for providing an advanced copy of [2] , as well as example images from ...
doi:10.1109/5.771067
fatcat:ltzt4ch7anbzjpqot7v5hqwdli
Data hiding in image and video. II. Designs and applications
2003
IEEE Transactions on Image Processing
The proposed algorithm can be used for a variety of applications such as copy control, access control, robust annotation, and content-based authentication. ...
Index Terms-Data hiding, digital watermarking, multilevel embedding, video data hiding. ...
We handle frame jitter by first partitioning the video into temporal segments, and each consists of similar consecutive frames. ...
doi:10.1109/tip.2003.810589
pmid:18237945
fatcat:j2thouyz6vbxlleqvb7zyosnfu
Information Hiding and Its Criteria for Evaluation
2017
IEICE transactions on information and systems
In this paper, we describe the activities of the IHC Committee and its evaluation criteria for digital watermarking of still images, videos, and audio. ...
To make the evaluation more concrete and improve the practicality of digital watermarking, watermarking schemes must use common evaluation criteria. ...
Therefore, if the watermarks are embedded in lower frequency components by QIM, the stegoimage has robustness against JPEG compression. ...
doi:10.1587/transinf.2016mui0001
fatcat:dhzx7e3z4nbvrlix37ksmcfkwy
Incorporation of perceptually adaptive QIM with singular value decomposition for blind audio watermarking
2014
EURASIP Journal on Advances in Signal Processing
This paper presents a novel approach for blind audio watermarking. ...
Experimental results confirm that the combination of the DWPT, SVD, and adaptive QIM achieves imperceptible data hiding with satisfying robustness and payload capacity. ...
Acknowledgements This work was supported by the National Science Council, Taiwan, ROC, under grants NSC101-2221-E-197-033 and NSC102-2221-E-197-020. ...
doi:10.1186/1687-6180-2014-12
fatcat:lywt3xdfozdz7afcwppvdeh57a
Robust Multiple Image Watermarking Based on Spread Transform
[chapter]
2012
Watermarking - Volume 2
It embeds MSB of watermarks in low frequency components and LSB in high frequency component. ...
Segmented watermarking The host data is partitioned into disjoint segments a priory and each watermark is embedded into its specific share. ...
Robust Multiple Image Watermarking Based on Spread Transform, Watermarking -Volume 2, Dr. ...
doi:10.5772/37546
fatcat:yd6yvy4nejegff5yw3ctmnjpeq
Analysis of impact of audio modifications on the robustness of watermark for non-blind architecture
2013
Multimedia tools and applications
The aim of this paper is to assess the robustness of the non-blind audio content watermarking scheme proposed by the authors. ...
Some possible attack simulations on the embedded watermarks are reviewed, and the robustness of the proposed approach is evaluated in the context of the influence of lossy compression on the watermark ...
and the source are credited. ...
doi:10.1007/s11042-013-1636-0
fatcat:6cifzt47gjdxvhqilznakuzbgy
Spatially localized image-dependent watermarking for statistical invisibility and collusion resistance
2005
IEEE transactions on multimedia
Index Terms-Image feature extraction, linear collusion, robust digital video watermarking, statistical invisibility. ...
In this paper, we develop a novel video watermarking framework based on the collusion-resistant design rules formulated in a companion paper. ...
The algorithm is scene-based and partitions the video into logical instead of arbitrary temporal segments. ...
doi:10.1109/tmm.2004.840614
fatcat:d6jrzdflozem3mz4y23kp25sli
Comparison of two speech content authentication approaches
2002
Security and Watermarking of Multimedia Contents IV
The second method embeds fragile watermarks into the speech signal in the frequency domain. If the speech signal is tampered, the secret watermark sequence is also modified. ...
The receiver detects the fragile watermark from received data and compares it to the original secret sequence. ...
Lu et al. 23 proposed an audio watermarking scheme by using the FFT domain uniform quantization scheme with an adaptive quantization step size. ...
doi:10.1117/12.465272
dblp:conf/sswmc/WuK02
fatcat:g33zh3o73nhdnbr2wly7wsxqky
Cell Segmentation in Cervical Smear Images using Polar Coordinates GVF Snake with Radiating Edge Map
2013
Journal of Multimedia
Print-and-scan attack is a challenging problem for most of digital watermarks. ...
The experimental results show the halftone watermarking algorithm optimized using PSO has better performance, it is robust under smearing attack and cropping attack, and has good resistance to print-and-scan ...
We also thank the anonymous reviewers for their suggestions and feedback that helped us to improve the quality of this paper. ...
doi:10.4304/jmm.8.3.213-219
fatcat:fb5tm3tguvgmxblj3eygm7pqmu
A 3D Simplification Method based on Dual Point Sampling
2013
Journal of Multimedia
Print-and-scan attack is a challenging problem for most of digital watermarks. ...
The experimental results show the halftone watermarking algorithm optimized using PSO has better performance, it is robust under smearing attack and cropping attack, and has good resistance to print-and-scan ...
We also thank the anonymous reviewers for their suggestions and feedback that helped us to improve the quality of this paper. ...
doi:10.4304/jmm.8.3.191-197
fatcat:z5gmzeiwqfadlakggntajifdru
« Previous
Showing results 1 — 15 out of 114 results