Filters








649 Hits in 4.9 sec

DLWIoT: Deep Learning-based Watermarking for Authorized IoT Onboarding [article]

Spyridon Mastorakis, Xin Zhong, Pei-Chi Huang, Reza Tourani
2020 arXiv   pre-print
To address this problem, in this paper, we present a framework, called Deep Learning-based Watermarking for authorized IoT onboarding (DLWIoT), featuring a robust and fully automated image watermarking  ...  DLWIoT embeds user credentials into carrier images (e.g., QR codes printed on IoT devices), thus enables IoT onboarding only by authorized users.  ...  ACKNOWLEDGEMENTS This work is partially supported by a pilot award from the Center for Research in Human Movement Variability and the NIH (P20GM109090), the National Science Foundation under award CNS-  ... 
arXiv:2010.10334v1 fatcat:visgey5yk5hh3fpfb36gzyw2g4

Optical/digital identification/verification system based on digital watermarking technology

Alexander Herrigel, Sviatoslav V. Voloshynovskiy, Zenon D. Hrytskiv, Simon B. Gurevich, Zinovii T. Nazarchuk, Leonid I. Muravsky
2000 Optoelectronic and Hybrid Optical/Digital Systems for Image and Signal Processing  
The detection system must be able to scan an analogue driver license or passport, convert the image of this document into a digital representation and then apply the watermark verification algorithm to  ...  During verification the reference number is extracted and compared with the reference number printed in the in the identification document.  ...  Due to the content adaptive features of the proposed method watermark is perceptually invisible and the cover and stego images are undistinguishable that makes possible to preserve the quality of the cover  ... 
doi:10.1117/12.388440 fatcat:ve5dmak6gzgzvgg2eoqdryq4bq

A Print-Scan Resilient Watermarking based on Fourier Transform and Image Restoration

R. Riad, H. Douzi, M. El, R. Harba, F. Ros
2015 International Journal of Computer Applications  
The print-scan operation is still challenging in the watermarking community, some watermarking techniques were proposed in the literature to deal with this operation.  ...  These watermarking techniques are still very sensitive to degradations produced by the print-scan process.  ...  Watermarked images were printed and scanned. The printscan device is an HP LaserJet Pro 400 printer and an HP Scanjet 5550c scanner. Images were scanned with 300 dpi.  ... 
doi:10.5120/ijca2015906192 fatcat:4unudkcrwje3tk2qfwxs5uj744

A Steganography Approach for Printed Image Based on Image Complexity and Template Matching

Caiyin Wang, Chao Li
2014 Open Automation and Control Systems Journal  
And the robustness and the invisibility of watermark are also satisfactory in printed images.  ...  Robustness and invisibility against distortions caused by image processing and printing are the essential properties for image watermarking to be applicable in real-world applications.  ...  digital image, image halftoning, plate making, printing, scanning printed image and extracting secure data.  ... 
doi:10.2174/1874444301406010084 fatcat:eeymvkg34bd4jax5zlvft4adii

Printed Document Integrity Verification Using Barcode

Affandi Husain, Majid Bakhtiari, Anazida Zainal
2014 Jurnal Teknologi  
This paper discuss several techniques for printed document security such as watermarking and barcode as well as the usability of two dimensional barcode in document authentication and data compression  ...  But some of the techniques are not suitable for public use due to its complexity, hard to obtain special materials to secure the document and expensive.  ...  OCR recognizes visible characters in the scanned image as text and convert it to editable text to be stored into computer.  ... 
doi:10.11113/jt.v70.2857 fatcat:qrsco74fxbba7l7zuu2focdbum

Analysis of Digital Image Watermarking Techniques through Hybrid Methods

Mahbuba Begum, Mohammad Shorif Uddin
2020 Advances in Multimedia  
For designing an efficient and robust digital image watermarking system, the trade-off among imperceptibility, robustness, capacity, and security must be maintained.  ...  In this paper, we have presented an analytical study of the existing hybrid digital image watermarking methods.  ...  Conflicts of Interest Authors' Contributions M.B. studied and drafted the whole paper; M.S.U. initiated the concept, supervised the study, and fine-tuned the manuscript.  ... 
doi:10.1155/2020/7912690 fatcat:k4sjofwfobhyndgqwg2dy267pe

Digital watermarks: Shedding light on the invisible

M.M. Yeung, Boon-Lock Yeo, M. Holliman
1998 IEEE Micro  
(HP Laserjet IIIsi) and scanning 0.2147 19.04 0.5558 19.00 Printing (QMS 3825) and scanning 0.1362 19.00 0.5089 21.13 Printing, photocopying, and scanning 0.1518 12.54 0.6907 11.81 Stirmark  ...  (HP Laserjet IIIsi) and scanning 0.2216 17.94 0.7739 19.14 Printing (QMS 3825) and scanning 0.2066 16.94 0.7587 16.28 Printing, photocopying, and scanning 0.1352 12.69 0.5303 13.53 Stirmark  ... 
doi:10.1109/40.743682 fatcat:ekmnipplh5hwha2ap3ev4wkodu

Show-through watermarking of duplex printed documents

Gaurav Sharma, Shen-ge Wang, Edward J. Delp III, Ping W. Wong
2004 Security, Steganography, and Watermarking of Multimedia Contents VI  
Watermark information is embedded in halftones used to print images on either side.  ...  Threshold arrays for the halftone screens are designed to allow incorporation of a variety of halftone patterns while minimizing artifacts in images printed using these halftones.  ...  The printed halftone image must be scanned with sufficient resolution to resolve the halftone dots and the detection must then be performed using the scanned image.  ... 
doi:10.1117/12.525550 dblp:conf/sswmc/SharmaW04 fatcat:rx6e23cosrhdhf6x7zuccaykra

Facial Identity Encryption with Kinoform and Phase-Key Watermarking for Homeland Security Agencies [chapter]

Muhammad Naveed Iqbal Qureshi, Jin-Tae Kim, Sang-Woong Lee
2012 Lecture Notes in Computer Science  
In order to maintain confidentiality of any classified documents, especially, facial identity; their security and integrity are essential requirements for all law enforcement and homeland security agencies  ...  We propose a new method to make the facial identity more secure and intact by using encrypted kinoform facial identity tags for sensitive image document such as passport, identity card, security clearance  ...  The detection takes an image I' and declares it to be watermarked if and only if I' belongs to W.  ... 
doi:10.1007/978-3-642-32498-7_40 fatcat:kpykfe7jcrb7hcl3zekkaon5vi

Front Matter: Volume 9028

2014 Media Watermarking, Security, and Forensics 2014  
He presented a clever way to detect inconsistency in lighting from shading and shadows in an image.  ...  The valuable feedback and comments they received planted the seeds for more research to advance the state-of-the-art of watermarking, security, and forensics.  ...  The papers will be judged based on their originality, creativity, clarity, and potential impact on the field of watermarking, security, and forensics.  ... 
doi:10.1117/12.2062933 fatcat:2izmjrpvkvhvrmpjq3spyzrbiu

Watermarking Digital Images Based on a Content Based Image Retrieval Technique [article]

Dimitrios K. Tsolis, Spyros Sioutas, Theodore S. Papatheodorou
2008 arXiv   pre-print
The problem is that the detection of a watermark in a digital image library containing thousands of images means that the watermark detection algorithm is necessary to apply all the keys to the digital  ...  The proposed watermarking algorithm combine's the advantages of both "detectable" and "readable" watermarks. The result is a fast and robust watermarking algorithm.  ...  Using a flatbed scanner the images were scanned back to their digital form and delivered to the watermark detector. The detector output is presented in the following table.  ... 
arXiv:0810.3058v1 fatcat:wxspldqdxvd4pgi6edqbrgho2i

Image-based data interfaces revisited: Barcodes and watermarks for the mobile and digital worlds

Gaurav Sharma
2016 2016 8th International Conference on Communication Systems and Networks (COMSNETS)  
T he ubiquitous availability of image sensors in smartphones and other mobile computing devices makes feasible new applications for both barcodes that encode data as image patterns and watermarks that  ...  hide data in images.  ...  The data-embedding and error correction coding often need to account for the fact that the original image content needs to be preserved in the watermarked version with high quality.  ... 
doi:10.1109/comsnets.2016.7440021 dblp:conf/comsnets/Sharma16 fatcat:gaqvbmw75neyliziifkdudppym

Research on Anti-Duplication Technique of Security Printing for Office Documents

Jie Li, Peng Cao, Yuan Huang
2021 International Journal of Computer Applications  
value in promoting the security of printing systems.  ...  This paper can solve the problems in security printing and copying, authentication and retrospection of documents printed such as official documents, legal instruments and certificates, and have application  ...  distinguish the original and the copy, which can be particularly used to trace the source of the copy and plays an important role in the security of printing system.  ... 
doi:10.5120/ijca2021921732 fatcat:ak6dfslgazhsvgdm6r3jpddz64

Identity Document and banknote security forensics: a survey [article]

Albert Berenguel Centeno, Oriol Ramos Terrades, Josep Lladós Canet, Cristina Cañero Morales
2019 arXiv   pre-print
Therefore, from non-experienced to professionals in security documents, can be introduced or deepen its knowledge in anti-counterfeiting measures.  ...  Aiming to detect these counterfeits, the present survey covers a wide range of anti-counterfeiting security features, categorizing them into three components: security substrate, security inks and security  ...  Printing a digital watermark to a physical ID card and its posterior scanning for authentication may introduce random noises into the images, named printing and scanning distortion (PS).  ... 
arXiv:1910.08993v1 fatcat:6onl6iprozbm3m7r3rea6xlnfq

`Print and Scan' Resilient Data Hiding in Images

Kaushal Solanki, Upamanyu Madhow, B. S. Manjunath, Shiv Chandrasekaran, Ibrahim El-Khalil
2006 IEEE Transactions on Information Forensics and Security  
Print-scan resilient data hiding finds important applications in document security and image copyright protection.  ...  This paper proposes methods to hide information into images that achieve robustness against printing and scanning with blind decoding.  ...  ACKNOWLEDGMENT We thank the anonymous reviewers for their careful reading and insightful comments, which greatly helped improve the clarity of the paper. We would also like to thank J.  ... 
doi:10.1109/tifs.2006.885032 fatcat:q2kzcdjiwzh57iyyk5xdaesy5i
« Previous Showing results 1 — 15 out of 649 results