290 Hits in 7.2 sec

Blind Image Watermark Decoder in UDTCWT Domain using Weibull Mixtures based Vector HMT

Panpan Niu, Xin Shen, Tongtong Wei, Hongying Yang, Xiangyang Wang
2020 IEEE Access  
Finally, an image watermark decoder for multiplicative watermarking is developed using the Weibull mixtures based vector HMT and ML test.  ...  By modeling the robust undecimated dual tree complex Wavelet transform (UDTCWT) coefficient magnitudes with the Weibull mixtures based vector hidden Markov trees (HMT) and employing maximum likelihood  ...  Our scheme presents a blind watermarking decoder based on the statistical model, which is developed using UDTCWT magnitude and Weibull mixtures based vector HMT model.  ... 
doi:10.1109/access.2020.2978119 fatcat:fmzpxzom3vbn7jnx3dv3cn4v5i

Multiscale Fragile Watermarking Based on the Gaussian Mixture Model

H. Yuan, X.-P. Zhang
2006 IEEE Transactions on Image Processing  
In this paper, a new multiscale fragile watermarking scheme based on the Gaussian mixture model (GMM) is presented.  ...  Compared with conventional fragile watermark techniques, this new statistical model based method modifies only a small amount of image data such that the distortion on the host image is imperceptible.  ...  Multiscale Fragile Watermarking Based on the Gaussian Mixture Model Hua Yuan and Xiao-Ping Zhang, Senior Member, IEEE Abstract-In this paper, a new multiscale fragile watermarking scheme based on the Gaussian  ... 
doi:10.1109/tip.2006.877310 pmid:17022280 fatcat:wmicgecjizbhhji3y6q6kbld2y

Content-Based Watermarking for Image Authentication Using Independent Component Analysis

Latha Parameswaran, K. Anbumani
2008 Informatica (Ljubljana, Tiskana izd.)  
This paper proposes a novel approach to content-based watermarking for image authentication that is based on Independent Component Analysis (ICA).  ...  Frobenius norm of the mixing matrix is adopted as the content-based feature. This is embedded as the watermark in a mid-frequency DCT coefficient of the block.  ...  In [27] a watermarking technique based on the quadtree is proposed. This scheme embeds a Gaussian sequence watermark into low-frequency band of the wavelet transform.  ... 
dblp:journals/informaticaSI/ParameswaranA08 fatcat:yl3d32kdorg5bmlrxcusqgn66a

Voice biometric watermarking of 3D models

Rakhi C. Motwani, Sergiu M. Dascalu, Frederick C. Harris
2010 2010 2nd International Conference on Computer Engineering and Technology  
A voice print is generated using a Gaussian mixture model representation of Mel-frequency cepstral coding coefficients of an individual's speech. This voice print is inserted as the watermark.  ...  This paper proposes a voicebased biometric watermark for 3D graphics for the purpose of owner identification, traitor tracing and access control schemes.  ...  [Volume 2] Conclusion This paper proposes a novel watermarking scheme for copyright protection of 3D models based on voice biometrics.  ... 
doi:10.1109/iccet.2010.5485658 fatcat:m6v72lsopvcqnlb5qnxrcfllwa

A Wavelet Based Hybrid SVD Algorithm for Digital Image Watermarking

Ramakrishnan, Gopalakrishnan, Balasamy
2011 Signal & Image Processing An International Journal  
In this paper we propose a hybrid image watermarking algorithm which satisfies both imperceptibility and robustness requirements.  ...  Further to increase and control the strength of the watermark, we use a scale factor. An optimal watermark embedding method is developed to achieve minimum watermarking distortion.  ...  A novel multiscale fragile watermarking method that embeds watermarks at multiscale wavelet subspaces is presented, based on statistical modeling of the image in the wavelet domain.  ... 
doi:10.5121/sipij.2011.2313 fatcat:lcgmb7pcdvhlnc4eny3cb45ql4

Wavelet Based Multipurpose Color Image Watermarking by Using Dual Watermarks with Human Vision System Models

2008 IEICE Transactions on Fundamentals of Electronics Communications and Computer Sciences  
In this study, we propose a complete architecture based on digital watermarking techniques to solve the issue of copyright protection and authentication for digital contents.  ...  host and watermark images in the discrete wavelet transform (DWT) domain is considered with Human Vision System (HVS) models.  ...  Hua Yuan and Xiao-Ping Zhang [18] proposed a semi-fragile watermarking method based on image modeling using the Gaussian mixture model (GMM) in the wavelet domain.  ... 
doi:10.1093/ietfec/e91-a.6.1426 fatcat:brcqpjsx7rfqhgkk3ljdsmit2q

Improved watermark detection for spread-spectrum based watermarking using independent component analysis

Hafiz Malik, Ashfaq Khokhar, Rashid Ansari
2005 Proceedings of the 5th ACM workshop on Digital rights management - DRM '05  
This paper presents an efficient blind watermark detection/decoding scheme for spread spectrum (SS) based watermarking, exploiting the fact that in SS-based embedding schemes the embedded watermark and  ...  The proposed scheme employs the theory of independent component analysis (ICA) and posed the watermark detection as a blind source separation problem.  ...  In this paper we develop a novel independent component analysis (ICA) based watermark detection method for SS-based watermarking.  ... 
doi:10.1145/1102546.1102564 dblp:conf/drm/MalikKA05 fatcat:q37exgw5zzaevnirqvn5mhauf4

Comparison of multiple watermarking techniques using genetic algorithms

N. Mohananthini, G. Yamuna
2016 Journal of Electrical Systems and Information Technology  
The SVD-based watermarking algorithms add the watermark information to the singular values of the diagonal matrix achieving robustness requirements.  ...  The proposed method is comparison of multiple-watermarking techniques based on Discrete Wavelet Transform and Singular Value Decomposition using Genetic algorithm.  ...  Nasir et al. (2008) proposed a novel and robust colour image watermarking technique in spatial domain based on embedding four identical watermarks into the blue component of the host image.  ... 
doi:10.1016/j.jesit.2015.11.009 fatcat:rvu2hj4fjzcr3lveaic7nfn2ie

Fast intelligent watermarking of heterogeneous image streams through mixture modeling of PSO populations

Eduardo Vellasques, Robert Sabourin, Eric Granger
2013 Applied Soft Computing  
In this paper, we propose a dynamic particle swarm optimization (DPSO) technique which relies on a memory of Gaussian mixture models (GMMs) of solutions in the optimization space.  ...  This technique is employed in the optimization of embedding parameters of a multi-level (robust/fragile) bi-tonal watermarking system in high data rate applications.  ...  A mixture containing Gaussian elements is known as a Gaussian mixture model (GMM). The approach proposed in this paper builds a mixture model comprising both, the parameter and fitness space.  ... 
doi:10.1016/j.asoc.2012.08.040 fatcat:22ozrxp74vd6dpuvpyu33bszam

Improving digital image watermarking by means of optimal channel selection

Thien Huynh-The, Oresti Banos, Sungyoung Lee, Yongik Yoon, Thuong Le-Tien
2016 Expert systems with applications  
This paper presents an improved digital image watermarking model based on a coefficient quantization technique that intelligently encodes the owner's information for each color channel to improve imperceptibility  ...  On the other hand, the strength of the watermark is controlled by a factor to achieve an acceptable tradeoff between robustness and imperceptibility.  ...  Also using a binary image as watermark, Run et al. (2011) developed a blind watermarking scheme using a quantization technique based on Wavelet Tree Analysis (WTA).  ... 
doi:10.1016/j.eswa.2016.06.015 fatcat:qo5tyrjvqrgmxnpfhuozlya3ya

Performance Analysis of Image Watermarking Using Contourlet Transform and Extraction Using Independent Component Analysis

S. Saju, G. Thirugnanam
2016 Journal of Computers  
However, DWT based watermarking schemes are found to be less robust against image processing attacks and the shift variance of Wavelet Packet Transform causes inaccurate extraction.  ...  Simulation results show that contourlet based watermarking scheme is robust against attacks such as Salt and Pepper noise, Median filtering and rotation.  ...  Furthermore, it is an important issue to develop a robust watermarking scheme with a better tradeoff between robustness and imperceptibility [1] .  ... 
doi:10.17706/jcp.11.3.258-265 fatcat:yemhhhsdkzefphww33xrjcwx4a

Guest Editorial: Intelligent Processing for Citizen Security

Andrzej Dziech, Remigiusz Baran, Mikołaj Leszczuk
2015 Multimedia tools and applications  
against JPEG compression, additive Gaussian noise and image scaling.  ...  In BDual watermarking algorithm based on the fractional Fourier transform^(10.1007/s11042-013-1531-8), a novel approach which embeds two different watermarks into each image is presented.  ... 
doi:10.1007/s11042-015-2684-4 fatcat:go76wbmoyfdkjlc2lcen75azmu

Advances in deep learning for real-time image and video reconstruction and processing

Pourya Shamsolmoali, M. Emre Celebi, Ruili Wang
2020 Journal of Real-Time Image Processing  
Image reconstruction based deep learning can be efficiently performed by using neural networks, in which, weights are determined based on training data.  ...  Thus, it is very important to develop a robust method that can improve reconstruction accuracy while maintaining real-time operation.  ...  The paper "Efficient Image Encryption Scheme Based on Generalized Logistic Map for Real-Time Image Processing", proposes an encryption scheme with an efficient permutation technique based on a modular  ... 
doi:10.1007/s11554-020-01026-2 fatcat:23jzdzkoxfdnrjfeew7bpwy7fm

Independent component analysis in the blind watermarking of digital images

J.J. Murillo-Fuentes
2007 Neurocomputing  
We propose a new method for the blind robust watermarking of digital images based on independent component analysis (ICA).  ...  On the one hand, each user can define its own ICA-based transformation. These transformations behave as "private-keys" of the method.  ...  Conclusions We have proposed a new approach to the robust blind watermarking of digital images based on the ICA image processing in [3, 15] .  ... 
doi:10.1016/j.neucom.2006.06.011 fatcat:ifwgxf2tyre6ro3qmf22zygu5i

A New Approach to Image Copy Detection Based on Extended Feature Sets

Jen-Hao Hsiao, Chu-Song Chen, Lee-Feng Chien, Ming-Syan Chen
2007 IEEE Transactions on Image Processing  
Conventional image copy detection research concentrates on finding features that are robust enough to resist various kinds of image attacks.  ...  In our approach, virtual prior attacks are applied to copyrighted images to generate novel features, which serve as training data.  ...  Dunne for his work on polishing the writing.  ... 
doi:10.1109/tip.2007.900099 pmid:17688212 fatcat:jb5cuf4htbefdmim3g4rsarnhq
« Previous Showing results 1 — 15 out of 290 results