Filters








3,964 Hits in 3.0 sec

Informed Embedding for Multi-bit Watermarks [chapter]

Matt L. Miller, Gwenaël J. Doërr, Ingemar J. Cox
2003 Lecture Notes in Computer Science  
Our purpose in the present paper is to develop a method of informed embedding that is suitable for watermarks with large data payloads.  ...  Informed embedding is the practice of tailoring each watermarking pattern according to the cover Work in which it is to be embedded.  ...  Conclusions We have presented a new method of informed embedding that is suitable for multi-bit watermarks, and tested its performance on a watermark with moderately large payload.  ... 
doi:10.1007/3-540-36617-2_2 fatcat:v5p6mwstq5ethfn3rgtfemtx2a

Multi-Bit Embedding in Asymmetric Digital Watermarking without Exposing Secret Information

M. OKADA, H. KIKUCHI, Y. OKABE
2008 IEICE transactions on information and systems  
However, when applying for multi-bit information embedding, size of a ciphertext of the secret information increase along with the number of bits to be embedded. a plaintext to be encrypted, r be a random  ...  The methods mentioned above are considered for only the case of single-bit information embedding.  ... 
doi:10.1093/ietisy/e91-d.5.1348 fatcat:6rlvcryn6je4nmjvn6asmpxnhq

Double Reversible Watermarking Algorithm for Image Tamper Detection

Zhengwei Zhang, Lifa Wu, Haiguang Lai, Huabo Li, Chenghui Zheng
2016 Journal of Information Hiding and Multimedia Signal Processing  
Meanwhile, logistic chaotic mapping is used to generate the first authentication watermark. Then, the mean pixel values of each sub-block are calculated for the second authentication watermark.  ...  Since existing methods show low tamper detection efficiency and inaccurate positioning, a dual reversible watermarking algorithm with tamper detection based on the multi-scale decomposition is proposed  ...  watermark occupy 8 bits; and the remaining 3 bits are used for storing overflow graph information.  ... 
dblp:journals/jihmsp/ZhangWLLZ16 fatcat:dviw6qd2vbc2pc7h2s44pzkuwa

A Multi-Level Robust and Perceptually Transparent Blind Audio Watermarking Scheme Using Wavelets

Farooq Husain, Omar Farooq, Ekram Khan
2015 Archives of Acoustics  
Multi-level watermarking is used to enhance payload capacity and can be used for a different level of security.  ...  Average Objective Difference Grade (ODG) measured for this method is -0.067 and -0.080 for single-level and multi-level watermarked audio signals, respectively.  ...  In the echo addition method, the watermark information bits are embedded in delayed attenuated versions of the original audio signals.  ... 
doi:10.2478/aoa-2014-0057 fatcat:lbfvjubhhjdibn6g25swfclqye

Intelligent Watermarking with Multi-objective Population Based Incremental Learning

Bassem S. Rabil, Robert Sabourin, Eric Granger
2010 2010 Sixth International Conference on Intelligent Information Hiding and Multimedia Signal Processing  
In this paper, we propose a multi-objective Population Based Incremental Learning module for an intelligent watermarking system for grayscale images to optimize embedding watermarks that satisfy the trade-off  ...  The multi-objective formulation provides set of non-dominated solutions rather than single solution, which allows tuning the quality and robustness for several attacks, without the need for an expensive  ...  The capacity of watermark embedding can be calculated by dividing watermark number of bits 16,384 by the number of host image 8x8 blocks 4096 yielding 4 watermark bits to be embedded in each image block  ... 
doi:10.1109/iihmsp.2010.40 dblp:conf/iih-msp/RabilSG10 fatcat:26mbbrszyjcm3bezylqhotvgzq

Scrambling-Based Watermarking For Mpeg-4 Video

Boris Vassaux, Philippe Ngueyen, Severine Baudry, Patrick Bas, J.M. Chassery
2002 Zenodo  
WATERMARK EMBEDDING The embedding scheme is based on a spread-spectrum technique, more precisely the multi-layer technique [4] .  ...  The second consists in summing the three consecutive correlation computation for each embedded bit.  ... 
doi:10.5281/zenodo.53633 fatcat:nr4otoxjcrem7jvisrvhxjcqmq

Multi-Biometric Watermarking Scheme Based on Interactive Segmentation Process

Rasha Thabit
2019 Periodica Polytechnica Electrical Engineering and Computer Science  
This paper presents a new multi-biometric watermarking (MBW) scheme in which the features of the fingerprint image and some personal information are embedded in the iris image.  ...  the watermark embedding process, the limited embedding capacity, and the lack of robustness against unintentional attacks.  ...  Then, the processes of embedding and extracting watermark bits are illustrated. Thereafter, the complete algorithms of the proposed multi-biometric watermarking scheme are elucidated.  ... 
doi:10.3311/ppee.14219 fatcat:fgcqbk2rpzbhpegdzvrnfdyzra

Robust and Blind Watermarking of Relational Database Systems

Ali Al-Haj, Ashraf Odeh
2008 Journal of Computer Science  
Results: The algorithm is robust as it resists attempts to remove or degrade the embedded watermark and it is blind as it does not require the original database in order to extract the embedded watermark  ...  However, the increasing use of relational database systems in many real-life applications created an ever increasing need for watermarking database systems.  ...  The watermark image is embedded in non-numeric, multi-word, attributes of a selected number of tuples of the database.  ... 
doi:10.3844/jcssp.2008.1024.1029 fatcat:pkjd3aorxvgllitypt7xhjfo5m

Dual Watermarking Algorithm Exploiting The Logarithmic Characteristic Of The Human Eye''S Sensitivity To Luminance

Stephen Marshall, Zhe Wang
2006 Zenodo  
WATERMARK EMBEDDING SCHEME There are two types of watermark: single-bit watermark and multi-bit watermark.  ...  The watermark used was a 16 bit multi bit watermark. Watermarks of more than 16 bits were found to have worse robustness performance than the 16 bit watermark.  ... 
doi:10.5281/zenodo.53361 fatcat:rav2rdlk2ffxjo3lehcrlukm64

Self-recovery reversible image watermarking algorithm

Zhengwei Zhang, He Sun, Shangbing Gao, Shenghua Jin, Muhammad Khurram Khan
2018 PLoS ONE  
Finally, the recovery watermark generated by homogeneous blocks and error-correcting codes is embedded into the corresponding smooth block by mapping; watermark information generated by non-homogeneous  ...  First of all, the original image is divided into homogeneous blocks and non-homogeneous blocks through multi-scale decomposition, and the feature information of each block is calculated as the recovery  ...  For the image block of size 4×4, the lowest two bits of pixels can be embedded with 32-bit information using the LSB algorithm.  ... 
doi:10.1371/journal.pone.0199143 pmid:29920528 pmcid:PMC6007907 fatcat:2rgydojlrnbzfnzm4xjigr346y

New Watermarking Scheme for Security and Transmission of Medical Images for PocketNeuro Project

M. S. Bouhlel, J. C. Lapayre, C. Chemak
2007 Radioengineering  
For the purpose of increasing the image Watermarking robustness against attacks for an image transmission and to perform a large data payload, we encode with Turbo-Code image-embedded bits information.  ...  This system is capable of embedding medical information inside diagnostic images for security purposes.  ...  Acknowledgements The authors extend their thanks both to the Besançon Institute of Sciences and Technologies of Information (ISTI), for initiating this project and the European Union for financing this  ... 
doaj:8e55745fb1e24166882f35970d6e639d fatcat:5bh3kcxh5vh2hanqhi3lgevwy4

An efficient buyer-seller watermarking protocol based on composite signal representation

Mina Deng, Tiziano Bianchi, Alessandro Piva, Bart Preneel
2009 Proceedings of the 11th ACM workshop on Multimedia and security - MM&Sec '09  
Buyer-seller watermarking protocols integrate watermarking techniques with cryptography, for copyright protection, piracy tracing, and privacy protection.  ...  In this paper, we propose an efficient buyerseller watermarking protocol based on homomorphic public-key cryptosystem and composite signal representation in the encrypted domain.  ...  The work reported reflects only the authors' views; the European Community is not liable for any use that may be made of the information contained herein.  ... 
doi:10.1145/1597817.1597820 dblp:conf/mmsec/DengBPP09 fatcat:tqf57ub4sjdvbn3k3u4gdfy354

A new Watermarking Technique for Secure Database [article]

Jun Ziang Pinn, A. Fr. Zung
2013 arXiv   pre-print
Results: The algorithm is robust as it resists attempts to remove or degrade the embedded watermark and it is blind as it does not require the original database in order to extract the embedded watermark  ...  Digital multimedia watermarking technology was suggested in the last decade to embed copyright information in digital objects such images, audio and video.  ...  This technique does not provide a mechanism for multi-bit watermarks.  ... 
arXiv:1304.7094v1 fatcat:rggtrpydlzbc7nssuljfspwave

A Novel Multiple Watch marking for Relational Databases using Multi-Media

Xuemin Zhao, Lingling Li, Qingtao Wu
2012 Physics Procedia  
As a tool for interests in both storing and managing data, relational database is widely used in many information systems.  ...  We propose a novel multiple watermarking scheme, which embeds multi-media watermarks into relational database.  ...  In this paper, we study a novel multiple watermark for relational databases using multi-media.  ... 
doi:10.1016/j.phpro.2012.03.144 fatcat:oa6fhioqlvg3bk7wl2jx7ps54u

Research on Robustness of 2D DWT-Based Watermarking in Intermediate Viewpoint by 3D Warping

Scott Park, Hyun-Jun Choi, Won-Jae Yang, Dong-Wook Kim, Young-Ho Seo
2014 Journal of information and communication convergence engineering  
This paper investigates the robustness of watermarking techniques for stereo or multi-view images generated from texture and depth images.  ...  The proposed watermarking techniques were found to yield bit error rates of about 3%-16% when they were applied to stereo images generated from texture and depth images.  ...  of the arbitrary viewpoint produced by DIBR; the watermark is embedded by extracting the information corresponding to the objects in the selected part.  ... 
doi:10.6109/jicce.2014.12.3.173 fatcat:rrijufnf3fgobagxgdbqkzhble
« Previous Showing results 1 — 15 out of 3,964 results