A copy of this work was available on the public web and has been preserved in the Wayback Machine. The capture dates from 2020; you can also visit the original URL.
The file type is application/pdf
.
Filters
A Stochastic Approach to Content Adaptive Digital Image Watermarking
[chapter]
2000
Lecture Notes in Computer Science
We show that the problem of the watermark estimation is equivalent to image denoising and derive content adaptive criteria. ...
In order to determine the optimal NVF, we rst consider the watermark as noise. Using a classical MAP image denoising approach, we show h o w to estimate the "noise". ...
16 Mihcak, A. Lanterman and Profs. P. Moulin and Y. Bresler for fruitfull and helpfull discussions during his staying at University of Illinois at Urbana-Champaign. ...
doi:10.1007/10719724_16
fatcat:nhmwe47envfqjm4wvh7bhanssa
Steganography: a class of secure and robust algorithms
[article]
2011
arXiv
pre-print
Thanks to a complete formalization of the approach we prove security against watermark-only attacks of a large class of steganographic algorithms. ...
Finally a complete study of robustness is given in frequency DWT and DCT domains. ...
Definition 10 (Watermarked content) Let dec(u, m, M ) be a decomposition function, f be a mode, S be a strategy adapter, q be a positive natural number, y be a digital media, and (u M , u m , u p , φ M ...
arXiv:1112.1260v1
fatcat:zzzuocqt6ndtxivk6xfonsgnwa
StegoWall: blind statistical detection of hidden data
2002
Security and Watermarking of Multimedia Contents IV
The basic idea of our complex approach is to exploit all information about hidden data statistics to perform its detection based on a stochastic framework. ...
Solving this problem calls for the development of an architecture for blind stochastic hidden data detection in order to prevent unauthorized data exchange. ...
INTRODUCTION New possibilities of digital imaging and data hiding open wide prospects in modern imaging science, content management and secure communications. ...
doi:10.1117/12.465324
dblp:conf/sswmc/VoloshynovskiyH02
fatcat:6o2jvywucnhsrglikw4eez5m6q
Optical/digital identification/verification system based on digital watermarking technology
2000
Optoelectronic and Hybrid Optical/Digital Systems for Image and Signal Processing
The detection system must be able to scan an analogue driver license or passport, convert the image of this document into a digital representation and then apply the watermark verification algorithm to ...
The approach combines optical and digital image processing techniques. ...
A unified stochastic approach to solve this problem is proposed in [9] where it is shown that some known empirical models are the particular cases of the developed approach. ...
doi:10.1117/12.388440
fatcat:ve5dmak6gzgzvgg2eoqdryq4bq
Content Adaptive Watermarking Based On A Stochastic Multiresolution Image Modeling
2015
Zenodo
Conclusion We proposed a new approach for content adaptive image watermarking, taking into account edge and texture masking as well as the multiresolution sensitivity of the HVS. ...
Such an attack would create considerable visible distortions in the attacked image. This paper proposes a new content adaptive w avelet domain robust watermarking technique. ...
doi:10.5281/zenodo.37487
fatcat:ac5bid4d7zbozedyryodrntks4
Optimal adaptive diversity watermarking with channel state estimation
2001
Security and Watermarking of Multimedia Contents III
This work advocates the formulation of digital watermarking as a communication problem. We consider watermarking as communication with side information available for both encoder and decoder. ...
A generalized watermarking channel is considered that includes geometrical attacks, fading and additive non-Gaussian noise. ...
This work has been partially supported by the European project CERTIMARK and by DCT-Digital Copyright Technologies Switzerland. ...
doi:10.1117/12.435452
dblp:conf/sswmc/VoloshynovskiyD01
fatcat:otsomo2jjffttgyckeck3bgbny
The Collaboration of Noise Reduction and Human Vision System Models for a Visible Watermarking Algorithm
2007
2007 IEEE International Conference on Image Processing
A novel visible watermarking algorithm based on noise reduction and Human Visible System (HVS) model approach is presented in this study. ...
Instead of three types of block classification-textures, edges and smooth areas, the computation of Noise Visibility Function (NVF) characterizes the local image properties to determine the optimal watermark ...
In our content adaptive scheme, a stochastic image model for watermark embedding is adopted by using the NVF which characterizes the local image properties. ...
doi:10.1109/icip.2007.4379299
dblp:conf/icip/TsaiL07
fatcat:wg2uvs5hxvd7hkkgd3po2krriy
New watermark-removal method based on Eigen-image energy
2011
IET Information Security
The experimental results show that the proposed approach yields a mean peak signal-to-noise ratio (PSNR) of the predicted images that is 2.2 dB higher than that obtained using the adaptive Wiener filter ...
To solve this problem, the relationships among the energies of the original image, the watermark and the watermarked image are initially determined using stochastic models. ...
Section 4 elucidates a new watermark-removal approach that is based on the characteristic of the energy distribution of the Eigen-images of an image in Section 2 and the stochastic assumptions made in ...
doi:10.1049/iet-ifs.2008.0055
fatcat:thchpnyhbvbw3la4dpx7xdq5je
Robustness and security assessment of image watermarking techniques by a stochastic approach
2009
Image Processing: Algorithms and Systems VII
In this paper we propose to evaluate both robustness and security of digital image watermarking techniques by considering the perceptual quality of un-marked images in terms of Weightened PSNR. ...
Security assessment is provided by a stochastic search of the minimum degradation that needs to be introduced in order to obtain an un-marked version of the image as close as possible to the given one. ...
INTRODUCTION As far as copyright protection and authentication of digital media contents are concerned, digital watermarking is a hot field of research for the multimedia community as it is a potentially ...
doi:10.1117/12.807357
dblp:conf/ipas/ConotterBFN09
fatcat:3d5rsl46xjabjmdqquxhstmqkm
Generalized watermarking attack based on watermark estimation and perceptual remodulation
2000
Security and Watermarking of Multimedia Contents II
Digital image watermarking has become a popular technique for authentication and copyright protection. ...
In contrast to the known Stirmark attack, which degrades the quality of the image while destroying the watermark, this paper presents a new approach which is based on the estimation of a watermark and ...
Stochastic models of cover image Stochastic models of cover image applied to content adaptive watermarking were considered in our previous work [9] . ...
doi:10.1117/12.384990
dblp:conf/sswmc/VoloshynovskiyP00
fatcat:lqnippgwdbghpb24ysc73z424m
Practical, Real-Time, and Robust Watermarking on the Spatial Domain for High-Definition Video Contents
2008
IEICE transactions on information and systems
Commercial markets employ digital right manageme (DRM) systems to protect valuable high-definition (HD) quality videos DRM system uses watermarking to provide copyright protection and own ership authentication ...
We propose a real-time vide watermarking scheme for HD video in the uncompressed domain. ...
In DRM systems, digital watermarking is an important tool that protects the digital contents. Figure 1 shows a basic structure of a DRM system. ...
doi:10.1093/ietisy/e91-d.5.1359
fatcat:435wqqmls5a45npxgzemejsbjq
A visible watermarking algorithm based on the content and contrast aware (COCOA) technique
2009
Journal of Visual Communication and Image Representation
A novel visible watermarking algorithm based on the content and contrast aware (COCOA) technique with the consideration of Human Visual System (HVS) model is presented in this study. ...
In order to determine the optimal watermark locations and strength at the watermark embedding stage, the COCOA visible watermarking utilizes the global and local characteristics of the host and watermark ...
Yi-Chong Zeng who verifies the ICA watermark recovery simulation comparison for this study. ...
doi:10.1016/j.jvcir.2009.03.011
fatcat:rubevjlqa5cmrdrpp27iccfdzm
The use of computational intelligence in digital watermarking: Review, challenges, and new trends
2011
Neural Network World
-Y., Groza, V., A dynamic fuzzy logic approach to adaptive HVS-based
watermarking. ...
A watermark hidden in an image can be extracted from the original watermark
due to the frequently used rounding approach. ...
doi:10.14311/nnw.2011.21.017
fatcat:bygr6l7srzhijduwlh2or4zekm
Image Water-Marking/De-Watermarking using Spatial Domain Technique
2019
International Journal of Engineering and Advanced Technology
While watermarking is employed for hiding multimedia data using images. ...
In the proposed dissertation work the images will be used as multimedia data. The proposed method involves the encryption of data to be hid. ...
of content or images and to increase the robustness of image. ...
doi:10.35940/ijeat.b3568.129219
fatcat:ic3vx7ugxrecrjjouaf6obpbti
INFORMATION-THEORETIC DATA-HIDING: RECENT ACHIEVEMENTS AND OPEN PROBLEMS
2005
International Journal of Image and Graphics
Secondly, we formulate digital data-hiding into visual content as communications with side information and advocate an appropriate informationtheoretic framework for the analysis of different data-hiding ...
In this paper we introduce and develop a framework for visual data-hiding technologies that aim at resolving emerging problems of modern multimedia networking. ...
The authors are thankful to Yuriy Rytsar for many helpful and interesting discussions. ...
doi:10.1142/s0219467805001641
fatcat:fwt723y6znaoportlfewwvgdly
« Previous
Showing results 1 — 15 out of 513 results