513 Hits in 4.2 sec

A Stochastic Approach to Content Adaptive Digital Image Watermarking [chapter]

Sviatoslav Voloshynovskiy, Alexander Herrigel, Nazanin Baumgaertner, Thierry Pun
2000 Lecture Notes in Computer Science  
We show that the problem of the watermark estimation is equivalent to image denoising and derive content adaptive criteria.  ...  In order to determine the optimal NVF, we rst consider the watermark as noise. Using a classical MAP image denoising approach, we show h o w to estimate the "noise".  ...  16 Mihcak, A. Lanterman and Profs. P. Moulin and Y. Bresler for fruitfull and helpfull discussions during his staying at University of Illinois at Urbana-Champaign.  ... 
doi:10.1007/10719724_16 fatcat:nhmwe47envfqjm4wvh7bhanssa

Steganography: a class of secure and robust algorithms [article]

Jacques M. Bahi and Jean-François Couchot and Christophe Guyeux
2011 arXiv   pre-print
Thanks to a complete formalization of the approach we prove security against watermark-only attacks of a large class of steganographic algorithms.  ...  Finally a complete study of robustness is given in frequency DWT and DCT domains.  ...  Definition 10 (Watermarked content) Let dec(u, m, M ) be a decomposition function, f be a mode, S be a strategy adapter, q be a positive natural number, y be a digital media, and (u M , u m , u p , φ M  ... 
arXiv:1112.1260v1 fatcat:zzzuocqt6ndtxivk6xfonsgnwa

StegoWall: blind statistical detection of hidden data

Sviatoslav V. Voloshynovskiy, Alexander Herrigel, Yuri B. Rytsar, Thierry Pun, Edward J. Delp III, Ping W. Wong
2002 Security and Watermarking of Multimedia Contents IV  
The basic idea of our complex approach is to exploit all information about hidden data statistics to perform its detection based on a stochastic framework.  ...  Solving this problem calls for the development of an architecture for blind stochastic hidden data detection in order to prevent unauthorized data exchange.  ...  INTRODUCTION New possibilities of digital imaging and data hiding open wide prospects in modern imaging science, content management and secure communications.  ... 
doi:10.1117/12.465324 dblp:conf/sswmc/VoloshynovskiyH02 fatcat:6o2jvywucnhsrglikw4eez5m6q

Optical/digital identification/verification system based on digital watermarking technology

Alexander Herrigel, Sviatoslav V. Voloshynovskiy, Zenon D. Hrytskiv, Simon B. Gurevich, Zinovii T. Nazarchuk, Leonid I. Muravsky
2000 Optoelectronic and Hybrid Optical/Digital Systems for Image and Signal Processing  
The detection system must be able to scan an analogue driver license or passport, convert the image of this document into a digital representation and then apply the watermark verification algorithm to  ...  The approach combines optical and digital image processing techniques.  ...  A unified stochastic approach to solve this problem is proposed in [9] where it is shown that some known empirical models are the particular cases of the developed approach.  ... 
doi:10.1117/12.388440 fatcat:ve5dmak6gzgzvgg2eoqdryq4bq

Content Adaptive Watermarking Based On A Stochastic Multiresolution Image Modeling

Sviatoslav Voloshynovskiy, Frederic Deguillaume, Thierry Pun Cui
2015 Zenodo  
Conclusion We proposed a new approach for content adaptive image watermarking, taking into account edge and texture masking as well as the multiresolution sensitivity of the HVS.  ...  Such an attack would create considerable visible distortions in the attacked image. This paper proposes a new content adaptive w avelet domain robust watermarking technique.  ... 
doi:10.5281/zenodo.37487 fatcat:ac5bid4d7zbozedyryodrntks4

Optimal adaptive diversity watermarking with channel state estimation

Sviatoslav V. Voloshynovskiy, Frederic Deguillaume, Shelby Pereira, Thierry Pun, Ping W. Wong, Edward J. Delp III
2001 Security and Watermarking of Multimedia Contents III  
This work advocates the formulation of digital watermarking as a communication problem. We consider watermarking as communication with side information available for both encoder and decoder.  ...  A generalized watermarking channel is considered that includes geometrical attacks, fading and additive non-Gaussian noise.  ...  This work has been partially supported by the European project CERTIMARK and by DCT-Digital Copyright Technologies Switzerland.  ... 
doi:10.1117/12.435452 dblp:conf/sswmc/VoloshynovskiyD01 fatcat:otsomo2jjffttgyckeck3bgbny

The Collaboration of Noise Reduction and Human Vision System Models for a Visible Watermarking Algorithm

Min-Jen Tsai, Chih-Wen Lin
2007 2007 IEEE International Conference on Image Processing  
A novel visible watermarking algorithm based on noise reduction and Human Visible System (HVS) model approach is presented in this study.  ...  Instead of three types of block classification-textures, edges and smooth areas, the computation of Noise Visibility Function (NVF) characterizes the local image properties to determine the optimal watermark  ...  In our content adaptive scheme, a stochastic image model for watermark embedding is adopted by using the NVF which characterizes the local image properties.  ... 
doi:10.1109/icip.2007.4379299 dblp:conf/icip/TsaiL07 fatcat:wg2uvs5hxvd7hkkgd3po2krriy

New watermark-removal method based on Eigen-image energy

T.-C. Hsu, W.-S. Hsieh, J.Y. Chiang, T.-S. Su
2011 IET Information Security  
The experimental results show that the proposed approach yields a mean peak signal-to-noise ratio (PSNR) of the predicted images that is 2.2 dB higher than that obtained using the adaptive Wiener filter  ...  To solve this problem, the relationships among the energies of the original image, the watermark and the watermarked image are initially determined using stochastic models.  ...  Section 4 elucidates a new watermark-removal approach that is based on the characteristic of the energy distribution of the Eigen-images of an image in Section 2 and the stochastic assumptions made in  ... 
doi:10.1049/iet-ifs.2008.0055 fatcat:thchpnyhbvbw3la4dpx7xdq5je

Robustness and security assessment of image watermarking techniques by a stochastic approach

V. Conotter, G. Boato, C. Fontanari, F. G. B. De Natale, Jaakko T. Astola, Karen O. Egiazarian, Nasser M. Nasrabadi, Syed A. Rizvi
2009 Image Processing: Algorithms and Systems VII  
In this paper we propose to evaluate both robustness and security of digital image watermarking techniques by considering the perceptual quality of un-marked images in terms of Weightened PSNR.  ...  Security assessment is provided by a stochastic search of the minimum degradation that needs to be introduced in order to obtain an un-marked version of the image as close as possible to the given one.  ...  INTRODUCTION As far as copyright protection and authentication of digital media contents are concerned, digital watermarking is a hot field of research for the multimedia community as it is a potentially  ... 
doi:10.1117/12.807357 dblp:conf/ipas/ConotterBFN09 fatcat:3d5rsl46xjabjmdqquxhstmqkm

Generalized watermarking attack based on watermark estimation and perceptual remodulation

Sviatoslav V. Voloshynovskiy, Shelby Pereira, Alexander Herrigel, Nazanin Baumgartner, Thierry Pun, Ping W. Wong, Edward J. Delp III
2000 Security and Watermarking of Multimedia Contents II  
Digital image watermarking has become a popular technique for authentication and copyright protection.  ...  In contrast to the known Stirmark attack, which degrades the quality of the image while destroying the watermark, this paper presents a new approach which is based on the estimation of a watermark and  ...  Stochastic models of cover image Stochastic models of cover image applied to content adaptive watermarking were considered in our previous work [9] .  ... 
doi:10.1117/12.384990 dblp:conf/sswmc/VoloshynovskiyP00 fatcat:lqnippgwdbghpb24ysc73z424m

Practical, Real-Time, and Robust Watermarking on the Spatial Domain for High-Definition Video Contents

K.-S. KIM, H.-Y. LEE, D.-H. IM, H.-K. LEE
2008 IEICE transactions on information and systems  
Commercial markets employ digital right manageme (DRM) systems to protect valuable high-definition (HD) quality videos DRM system uses watermarking to provide copyright protection and own ership authentication  ...  We propose a real-time vide watermarking scheme for HD video in the uncompressed domain.  ...  In DRM systems, digital watermarking is an important tool that protects the digital contents. Figure 1 shows a basic structure of a DRM system.  ... 
doi:10.1093/ietisy/e91-d.5.1359 fatcat:435wqqmls5a45npxgzemejsbjq

A visible watermarking algorithm based on the content and contrast aware (COCOA) technique

Min-Jen Tsai
2009 Journal of Visual Communication and Image Representation  
A novel visible watermarking algorithm based on the content and contrast aware (COCOA) technique with the consideration of Human Visual System (HVS) model is presented in this study.  ...  In order to determine the optimal watermark locations and strength at the watermark embedding stage, the COCOA visible watermarking utilizes the global and local characteristics of the host and watermark  ...  Yi-Chong Zeng who verifies the ICA watermark recovery simulation comparison for this study.  ... 
doi:10.1016/j.jvcir.2009.03.011 fatcat:rubevjlqa5cmrdrpp27iccfdzm

The use of computational intelligence in digital watermarking: Review, challenges, and new trends

Darwish, A. Abraham
2011 Neural Network World  
-Y., Groza, V., A dynamic fuzzy logic approach to adaptive HVS-based watermarking.  ...  A watermark hidden in an image can be extracted from the original watermark due to the frequently used rounding approach.  ... 
doi:10.14311/nnw.2011.21.017 fatcat:bygr6l7srzhijduwlh2or4zekm

Image Water-Marking/De-Watermarking using Spatial Domain Technique

2019 International Journal of Engineering and Advanced Technology  
While watermarking is employed for hiding multimedia data using images.  ...  In the proposed dissertation work the images will be used as multimedia data. The proposed method involves the encryption of data to be hid.  ...  of content or images and to increase the robustness of image.  ... 
doi:10.35940/ijeat.b3568.129219 fatcat:ic3vx7ugxrecrjjouaf6obpbti


2005 International Journal of Image and Graphics  
Secondly, we formulate digital data-hiding into visual content as communications with side information and advocate an appropriate informationtheoretic framework for the analysis of different data-hiding  ...  In this paper we introduce and develop a framework for visual data-hiding technologies that aim at resolving emerging problems of modern multimedia networking.  ...  The authors are thankful to Yuriy Rytsar for many helpful and interesting discussions.  ... 
doi:10.1142/s0219467805001641 fatcat:fwt723y6znaoportlfewwvgdly
« Previous Showing results 1 — 15 out of 513 results