Filters








114 Hits in 7.8 sec

Robust audio watermarking using perceptual masking

Mitchell D Swanson, Bin Zhu, Ahmed H Tewfik, Laurence Boney
1998 Signal Processing  
Our audio-dependent watermarking procedure directly exploits temporal and frequency perceptual masking to guarantee that the embedded watermark is inaudible and robust.  ...  The watermark is constructed by breaking each audio clip into smaller segments and adding a perceptually shaped pseudo-random sequence.  ...  Our watermarking procedure directly exploits both frequency and temporal masking characteristics to embed an inaudible and robust watermark.  ... 
doi:10.1016/s0165-1684(98)00014-0 fatcat:pc6u7zxe7zaetp7yvmxz66k2xi

Multimedia data-embedding and watermarking technologies

M.D. Swanson, M. Kobayashi, A.H. Tewfik
1998 Proceedings of the IEEE  
Data-embedding and watermarking algorithms embed text, binary streams, audio, image, or video in a host audio, image, or video signal.  ...  In this paper, we review recent developments in transparent data embedding and watermarking for audio, image, and video.  ...  In [4] and [87] , the authors present an audio watermarking algorithm that exploits temporal and frequency masking (see Section IV-A) to embed robust and inaudible data.  ... 
doi:10.1109/5.687830 fatcat:dtyaqys2xrdrpkq2tri77kzrzi

Multimedia Data-Embedding and Watermarking Technologies Manuscript received July 15, 1997; revised January 15, 1998. The Guest Editor coordinating the review of this paper and approving it for publication was A. M. Tekalp. This work was supported in part by the Air Force Office of Scientific Research under Grant AF/F49620-94-1-0461 and in part by the Advanced Research Project Agency under Grant AF/F49620-93-1-0558.Publisher Item Identifier S 0018-9219(98)03519-1 [chapter]

MITCHELL D. SWANSON, MEI KOBAYASHI, AHMED H. TEWFIK
2002 Readings in Multimedia Computing and Networking  
Data-embedding and watermarking algorithms embed text, binary streams, audio, image, or video in a host audio, image, or video signal.  ...  In this paper, we review recent developments in transparent data embedding and watermarking for audio, image, and video.  ...  In [4] and [87] , the authors present an audio watermarking algorithm that exploits temporal and frequency masking (see Section IV-A) to embed robust and inaudible data.  ... 
doi:10.1016/b978-155860651-7/50098-x fatcat:pr7j4jk4q5hxjltrqcs2uakkaq

Digital Audio watermarking using perceptual masking: A Review

Ms. Anupama Barai
2013 IOSR Journal of Electronics and Communication Engineering  
The procedure directly exploits temporal and frequency perceptual masking to guarantee that the embedded watermark is inaudible and robust.  ...  The watermark is constructed by breaking each audio clip into smaller segments and adding a perceptually shaped pseudo-random sequence.  ...  Watermarking procedure directly exploits both frequency and temporal masking characteristics to embed an inaudible and robust watermark Frequency masking refers to masking between frequency components  ... 
doi:10.9790/2834-0467378 fatcat:r4ajnhraojatln5tx2rmg3ia7a

Perceptual watermarks for digital images and video

Raymond B. Wolfgang, Christine I. Podilchuk, Edward J. Delp III, Ping W. Wong, Edward J. Delp III
1999 Security and Watermarking of Multimedia Contents  
Even more elaborate visual models are used to develop schemes that not only take advantage of frequency characteristics but also adapt to the local image characteristics, providing extremely robust as  ...  Such techniques usually take advantage of frequency selectivity and weighing to provide some perceptual criteria in the watermarking process.  ...  ACKNOWLEDGEMENTS The authors would like to thank Professor Ahmed Tewfik, Bin Zhu, Mitchell Swanson, Mei Kobayashi and Benson Chau for providing an advanced copy of [2] , as well as example images from  ... 
doi:10.1117/12.344700 dblp:conf/sswmc/WolfgangPD99 fatcat:e6vabfq3pzbzzersfcxz5oeug4

Perceptual watermarks for digital images and video

R.B. Wolfgang, C.I. Podilchuk, E.J. Delp
1999 Proceedings of the IEEE  
Even more elaborate visual models are used to develop schemes that not only take advantage of frequency characteristics but also adapt to the local image characteristics, providing extremely robust as  ...  Such techniques usually take advantage of frequency selectivity and weighing to provide some perceptual criteria in the watermarking process.  ...  ACKNOWLEDGEMENTS The authors would like to thank Professor Ahmed Tewfik, Bin Zhu, Mitchell Swanson, Mei Kobayashi and Benson Chau for providing an advanced copy of [2] , as well as example images from  ... 
doi:10.1109/5.771067 fatcat:ltzt4ch7anbzjpqot7v5hqwdli

Data hiding in image and video. II. Designs and applications

Min Wu, Heather Yu, Bede Liu
2003 IEEE Transactions on Image Processing  
The proposed algorithm can be used for a variety of applications such as copy control, access control, robust annotation, and content-based authentication.  ...  Index Terms-Data hiding, digital watermarking, multilevel embedding, video data hiding.  ...  We handle frame jitter by first partitioning the video into temporal segments, and each consists of similar consecutive frames.  ... 
doi:10.1109/tip.2003.810589 pmid:18237945 fatcat:j2thouyz6vbxlleqvb7zyosnfu

Information Hiding and Its Criteria for Evaluation

Keiichi IWAMURA, Masaki KAWAMURA, Minoru KURIBAYASHI, Motoi IWATA, Hyunho KANG, Seiichi GOHSHI, Akira NISHIMURA
2017 IEICE transactions on information and systems  
In this paper, we describe the activities of the IHC Committee and its evaluation criteria for digital watermarking of still images, videos, and audio.  ...  To make the evaluation more concrete and improve the practicality of digital watermarking, watermarking schemes must use common evaluation criteria.  ...  Therefore, if the watermarks are embedded in lower frequency components by QIM, the stegoimage has robustness against JPEG compression.  ... 
doi:10.1587/transinf.2016mui0001 fatcat:dhzx7e3z4nbvrlix37ksmcfkwy

Incorporation of perceptually adaptive QIM with singular value decomposition for blind audio watermarking

Hwai-Tsu Hu, Hsien-Hsin Chou, Chu Yu, Ling-Yuan Hsu
2014 EURASIP Journal on Advances in Signal Processing  
This paper presents a novel approach for blind audio watermarking.  ...  Experimental results confirm that the combination of the DWPT, SVD, and adaptive QIM achieves imperceptible data hiding with satisfying robustness and payload capacity.  ...  Acknowledgements This work was supported by the National Science Council, Taiwan, ROC, under grants NSC101-2221-E-197-033 and NSC102-2221-E-197-020.  ... 
doi:10.1186/1687-6180-2014-12 fatcat:lywt3xdfozdz7afcwppvdeh57a

Robust Multiple Image Watermarking Based on Spread Transform [chapter]

Jaishree Jain, Vijendra Rai
2012 Watermarking - Volume 2  
It embeds MSB of watermarks in low frequency components and LSB in high frequency component.  ...  Segmented watermarking The host data is partitioned into disjoint segments a priory and each watermark is embedded into its specific share.  ...  Robust Multiple Image Watermarking Based on Spread Transform, Watermarking -Volume 2, Dr.  ... 
doi:10.5772/37546 fatcat:yd6yvy4nejegff5yw3ctmnjpeq

Analysis of impact of audio modifications on the robustness of watermark for non-blind architecture

Janusz Cichowski, Andrzej Czyżewski, Bożena Kostek
2013 Multimedia tools and applications  
The aim of this paper is to assess the robustness of the non-blind audio content watermarking scheme proposed by the authors.  ...  Some possible attack simulations on the embedded watermarks are reviewed, and the robustness of the proposed approach is evaluated in the context of the influence of lossy compression on the watermark  ...  and the source are credited.  ... 
doi:10.1007/s11042-013-1636-0 fatcat:6cifzt47gjdxvhqilznakuzbgy

Spatially localized image-dependent watermarking for statistical invisibility and collusion resistance

K. Su, D. Kundur, D. Hatzinakos
2005 IEEE transactions on multimedia  
Index Terms-Image feature extraction, linear collusion, robust digital video watermarking, statistical invisibility.  ...  In this paper, we develop a novel video watermarking framework based on the collusion-resistant design rules formulated in a companion paper.  ...  The algorithm is scene-based and partitions the video into logical instead of arbitrary temporal segments.  ... 
doi:10.1109/tmm.2004.840614 fatcat:d6jrzdflozem3mz4y23kp25sli

Comparison of two speech content authentication approaches

Chung-Ping Wu, C.-C. Jay Kuo, Edward J. Delp III, Ping W. Wong
2002 Security and Watermarking of Multimedia Contents IV  
The second method embeds fragile watermarks into the speech signal in the frequency domain. If the speech signal is tampered, the secret watermark sequence is also modified.  ...  The receiver detects the fragile watermark from received data and compares it to the original secret sequence.  ...  Lu et al. 23 proposed an audio watermarking scheme by using the FFT domain uniform quantization scheme with an adaptive quantization step size.  ... 
doi:10.1117/12.465272 dblp:conf/sswmc/WuK02 fatcat:g33zh3o73nhdnbr2wly7wsxqky

Cell Segmentation in Cervical Smear Images using Polar Coordinates GVF Snake with Radiating Edge Map

Xu Chuanyun, Zhang Yang, Wang Sen
2013 Journal of Multimedia  
Print-and-scan attack is a challenging problem for most of digital watermarks.  ...  The experimental results show the halftone watermarking algorithm optimized using PSO has better performance, it is robust under smearing attack and cropping attack, and has good resistance to print-and-scan  ...  We also thank the anonymous reviewers for their suggestions and feedback that helped us to improve the quality of this paper.  ... 
doi:10.4304/jmm.8.3.213-219 fatcat:fb5tm3tguvgmxblj3eygm7pqmu

A 3D Simplification Method based on Dual Point Sampling

Juan Cao, Yitian Zhao, Ran Song, Yingchun Zhang
2013 Journal of Multimedia  
Print-and-scan attack is a challenging problem for most of digital watermarks.  ...  The experimental results show the halftone watermarking algorithm optimized using PSO has better performance, it is robust under smearing attack and cropping attack, and has good resistance to print-and-scan  ...  We also thank the anonymous reviewers for their suggestions and feedback that helped us to improve the quality of this paper.  ... 
doi:10.4304/jmm.8.3.191-197 fatcat:z5gmzeiwqfadlakggntajifdru
« Previous Showing results 1 — 15 out of 114 results