18 Hits in 10.1 sec

High-Performance Self-Synchronous Blind Audio Watermarking in a Unified FFT Framework

Hwai-Tsu Hu, Tung-Tsun Lee
2019 IEEE Access  
This paper presents a blind audio watermarking method that uses two different schemes to hide binary bits and auxiliary information within separate ranges of a fast Fourier transform (FFT) sequence.  ...  INDEX TERMS Synchronous blind audio watermarking, fast Fourier transform, adaptive vector norm modulation, improved spread spectrum, robust audio segment extractor.  ...  In the case of 128 kbps MPEG-1 layer 3 compression, FFT-AVNM-(I) and FFT-AVNM-(II) successfully retrieved watermarks without any errors.  ... 
doi:10.1109/access.2019.2893646 fatcat:fwtdy4lwunchxmbrtz3zub37n4

Audio Watermarking for Security and Non-Security Applications

Maha Charfeddine, Eya Mezghani, Salma Masmoudi, Chokri Ben Amar, Hesham Alhumyani
2022 IEEE Access  
The watermarking can be used in reality in several types of applications that target two different contexts; the first for security applications and the second for non-security ones.  ...  Thus, in order to guarantee principally the protection of intellectual properties of this digital content, watermarking has appeared as a solution.  ...  ACKNOWLEDGMENT This research was supported by Taif University Researchers Supporting Project number (TURSP-2020/216), Taif University, Taif, Saudi Arabia for supporting this work.  ... 
doi:10.1109/access.2022.3145950 fatcat:kkawupgcjrdotpag3uwhycgxou

A Secured Frame Selection Based Video Watermarking Technique to Address Quality Loss of Data: Combining Graph Based Transform, Singular Valued Decomposition, and Hyperchaotic Encryption

Chirag Sharma, Bagga Amandeep, Rajeev Sobti, Tarun Kumar Lohani, Mohammad Shabaz, Manjit Kaur
2021 Security and Communication Networks  
The watermark cannot be embedded in every frame of the video as it adds to the size of the video and watermark can be easily retrieved by an intruder.  ...  The advancement of Internet technologies has led to the availability of audios, images, and videos in different forms.  ...  All videos are of the same resolution and selection of frame I s done in real time.e videos are encoded to standardized MPEG-4 format using codec x264.  ... 
doi:10.1155/2021/5536170 fatcat:6e3zeni3tffmvd4bqidemmqbse

Audio Signal Processing Using Time-Frequency Approaches: Coding, Classification, Fingerprinting, and Watermarking

K Umapathy, B Ghoraani, S Krishnan
2010 EURASIP Journal on Advances in Signal Processing  
In this digital era, compression, intelligent indexing for content-based retrieval, classification, and protection of digital audio content are few of the areas that encapsulate a majority of the audio  ...  In this paper, we present a comprehensive array of TF methodologies that successfully address applications in all of the above mentioned areas.  ...  Acknowledgments Portions of this paper reprinted, with permission, from [39, 69, 71] [25] , others are reproduced from the book chapter mentioned in [26] , and finally portions are reproduced from  ... 
doi:10.1155/2010/451695 fatcat:u2smg3zf7fedne5e5ankvmepee

A DWT-DCT-Based Audio Watermarking Method Using Singular Value Decomposition and Quantization

Pranab Kumar Dhar, Tetsuya Shimamura
2013 Journal of Signal Processing  
Watermark information is embedded into the largest singular value of the DCT coefficients obtained from the DWT coefficients of each audio frame by quantization.  ...  In addition, audio quality evaluation tests indicate the high imperceptibility of the watermark in the audio signal. The performance analysis of the proposed method shows low error probability rates.  ...  Acknowledgment This work was supported by Ministry of Education, Culture, Sports, Science, and Technology (MEXT), Japan.  ... 
doi:10.2299/jsp.17.69 fatcat:dnvw2p2f5fhinksbedfle4wcve

LSB Data Hiding in Digital Media: A Survey

Dang Tran, Hans-Jürgen Zepernick, Thi Chu
2022 EAI Endorsed Transactions on Industrial Networks and Intelligent Systems  
Given the classification of data hiding methods with respect to audio, image, video, and 3D media, a comprehensive survey of LSB data hiding for each of these four digital media is provided.  ...  In particular, landmark studies, state-of-the-art approaches, and applications of LSB data hiding are described for each of the four digital media.  ...  This work has been supported in part by The Knowledge Foundation, Sweden, through the ViaTecH project (Contract 20170056).  ... 
doi:10.4108/eai.5-4-2022.173783 fatcat:iupulvy6lrbwtglrvukb6gzrue

Association of Moving Objects Across Visual Sensor Networks

Muhammad J. Mirza, Nadeem Anjum
2012 Journal of Multimedia  
Quality (BER) of retrieved watermark in which different values of the two scaling factors Γ and Δ.  ...  Quality of retrieved watermark under various JPEG compression ratios for the proposed algorithm Watermarked Image Compress Rate(%) 91.7 93.8 94.9 95.8 Retrieved Image BER(%) 9.52 11.57  ...  Abstract-This paper proposes an OWL-S framework for distributed CAD system based on the combination of semantic web service and CAD technology.  ... 
doi:10.4304/jmm.7.1.2-8 fatcat:4cc7sala7ffixohi3ccvothajm

Anti-forensic Approach to Remove StegoContent from Images and Videos

P. P. Amritha, M. Sethumadhavan, R. Krishnan, Saibal Kumar Pal
2019 Journal of Cyber Security and Mobility  
Amritha et al. similarity metric values of cleaned images and videos are found to be in the range 30dB-40dB and 0.81-0.99 respectively.  ...  Traditionally the removal of such content necessitated the knowledge of the steganographic algorithm used.  ...  Active steganalysis, extraction of a hidden message with little or no prior information, is formulated as a blind system identification problem within this framework.  ... 
doi:10.13052/jcsm2245-1439.831 fatcat:tjclcuazszcajj24kdxyblgabi

Comprehensive review of audio steganalysis methods

Hamzeh Ghasemzadeh, Mohammad H. Kayvanrad
2018 IET Signal Processing  
The stream nature of audio signals, their popularity, and their wide spread usage make them very suitable media for steganography.  ...  Finally, the paper provides some possible directions for future researches on audio steganalysis.  ...  Acknowledgments The authors would like to thank the anonymous reviewers for their constructive comments and valuable contributions.  ... 
doi:10.1049/iet-spr.2016.0651 fatcat:oubhbdn7xfczbc663wieibv72m

A Blind EMD-based Audio Watermarking using Quantization

Chinmay Maiti, Chandra Bibhas, Dhara
International Journal of Advanced Engineering Research and Technology   unpublished
In the proposed algorithm, the first IMF has been considered for embedding the watermark.  ...  The size of the watermark is equal to the number of segments of the host audio signal. The watermark is extracted from watermarked audio signal blindly in the extraction process.  ...  Due to the embedding of the watermark, the extremes of the IMF signal get modified and hence, the original host signal cannot be retrieved, i.e., proposed watermark method is a lossy method.  ... 

Digital watermarking and data hiding in multimedia

Abdulaziz, Nidhal Kadhim, 1958-
182 decoded for consumption according to usage rights associated with the content (quoted from a web paper by Leonardo Chiariglione, Convener, MPEG; (  ...  References 183 References ACKNOWLEDGMENTS The author would like to thank University of Southern California, Signal and Image processing Institute (USC-SIPI) Image Database for using their classic  ...  Figure 7 . 4 - 74 (a) shows the PSNR of the retrieved watermark image Logo watermarked frames for the first 16 frames of the video for a video rate of 500 kbits/second, (b) is for video rate 750 kbits/  ... 
doi:10.4225/03/59d44ace2f9d5 fatcat:6ah66x7prbbhvp4mu2yplgtzey

Multimedia Internet of Things: A Comprehensive Survey

Ali Nauman, Yazdan Ahmad Qadri, Muhammad Amjad, Yousaf Bin Zikria, Muhammad Khalil Afzal, Sung Won Kim
2020 IEEE Access  
The immense increase in multimedia-on-demand traffic that refers to audio, video, and images, has drastically shifted the vision of the Internet of Things (IoT) from scalar to Multimedia Internet of Things  ...  We explore the importance of Quality-of-Experience (QoE) and Quality-of-Service (QoS) for multimedia transmission over IoT.  ...  The master node is capable of retrieving data from sTune and assigns the slave nodes to process the sliced video data in parallel.  ... 
doi:10.1109/access.2020.2964280 fatcat:ilihkpik65bdvblyal6rp7tb2y

Welcome Messages

2019 2019 International Symposium on Intelligent Signal Processing and Communication Systems (ISPACS)  
This paper proposes a novel power allocation scheme for MU-MIMO systems, which minimizes the variance of channel capacities of each spatial stream of all users to achieve user fairness in terms of video  ...  The application of the H-BTC images range from image compression and retrieval, indexing, reconstruction, classification and so on.  ...  Block noise was generated in the input video sequences by encoding them with H.264/MPEG-4 AVC, followed by cropping.  ... 
doi:10.1109/ispacs48206.2019.8986291 fatcat:gu4zaxsqkncp5n2ebj5fybk7ce

Full-reference objective quality metrics for video watermarking, video segmentation and 3D model watermarking

Elisa Drelie Gelasca
in the face of mistakes and feelings, dies slowly.  ...  He who becomes the slave of habit, who follows the same routes every day, who never changes pace, who does not risk and change the color of his clothes, who does not speak and does not experience, dies  ...  Motivations The task of extracting objects in video sequences emerges in many applications such as object-based video coding (e.g. MPEG-4) and content-based video indexing and retrieval (e.g.  ... 
doi:10.5075/epfl-thesis-3411 fatcat:j7334ilp4bgo7ignsgthdhehuq

ICDT 2012 PROGRAM COMMITTEE ICDT Advisory Committee ICDT 2012 Technical Program Committee

Chamonix, Mont Blanc, France, Michael Grottke, Javier Del, Ser Lorente, Gerard Damm, Alcatel Lucent, Dan Usa, Romascanu, Israel Avaya, Drechsler (+87 others)
Purnomo Sidi Priambodo   unpublished
We hope that ICDT 2012 was a successful international forum for the exchange of ideas and results between academia and industry and for the promotion of progress in the field of digital communications.  ...  The complexity of the systems requires an early stage adoption of advanced paradigms for adaptive and self-adaptive features.  ...  The authors at Lund University are members of the Lund Center for Control of Complex Engineering Systems. The work is partly funded by the Swedish Research Council, grant VR 2010-5864.  ... 
« Previous Showing results 1 — 15 out of 18 results