Filters








43 Hits in 5.5 sec

Robust optimum detection of transform domain multiplicative watermarks

Qiang Cheng, T.S. Huang
2003 IEEE Transactions on Signal Processing  
Although some work has been done on optimum detection of watermarks, the uncertainty of watermark signal strengths and real statistical behavior of multimedia contents have not been taken into account  ...  The locally most powerful detection method is then extended to DFT domain multiplicative watermarking, with the magnitudes of coefficients modeled by the Weibull distributions.  ...  More accurate performance analysis is a line of future research. Watermarks are embedded into the DFT domain by modifying a set of full-frame DFT coefficients of the image.  ... 
doi:10.1109/tsp.2003.809374 fatcat:kik4b42zp5btthdj4ysin52oay

Digital Watermarking Of Visual Data: State Of The Art And New Trends

M. Barni
2000 Zenodo  
Publication in the conference proceedings of EUSIPCO, Tampere, Finland, 2000  ...  add the watermark to the coefficients of a full-frame transform (DFT, DCT, Mellin, Radon, Fresnell) of the image: these do not allow to localize precisely the watermarking disturb over the image, and  ...  In [34] , De Rosa et al. derive the optimum decoder for a multiplicative/additive watermark embedded in the magnitude of DFT coefficients according to the rule y i = x i + m i x i (6) where the watermark  ... 
doi:10.5281/zenodo.37684 fatcat:on25dlrz4vfljhl6wcgpqfrfva

Video Watermarking Scheme with High Payload and Robustness against Geometric Distortion [chapter]

Huajian Liu, Yiyao Li, Martin Steinebach
2013 Lecture Notes in Computer Science  
Besides copyright protection, digital video watermarking is also applied in non-security applications like second screen annotation, where high robustness against geometric distortions and high watermark  ...  Experimental results demonstrate that the proposed scheme achieves satisfactory robustness against all kinds of attacks, including geometric distortions and frame dropping and swapping.  ...  As both DCT and DFT are linear and invertible transforms, a linear relationship exists between block DCT coefficients and DFT coefficients of the full frame [13] .  ... 
doi:10.1007/978-3-642-40779-6_7 fatcat:bfpdmyjoabefpgaprx2xtzzzze

A Robust Frame-Based Technique For Video Watermarking

R. Caldelli¡, M. Barni, A. Piva
2000 Zenodo  
Publication in the conference proceedings of EUSIPCO, Tampere, Finland, 2000  ...  Watermarking of Still Images The watermark casting is carried out, as described in [8] , extracting the brightness of the to-be-marked frame, computing its full-frame DFT (Discrete Fourier Transform)  ...  Thanks to the good robustness the watermarking algorithm had already shown in the case of still images against usual image processing as linear/non-linear filtering, noise addition, JPEG compression, etc  ... 
doi:10.5281/zenodo.37644 fatcat:tymzrvgeffdhrgbl2r6ee4r2di

A M.A.P. Identification Criterion For Dct Based Watermarking

M. Barni, F. Bartolini, V. Cappellini, A. Piva, F. Rigacci
1998 Zenodo  
Publication in the conference proceedings of EUSIPCO, Rhodes, Greece, 1998  ...  ACKNOWLEDGEMENTS This work was partially supported by the \Progetto Finalizzato Beni Culturali" (Finalized Project for Cultural Heritage) of the Italian National Research Council (CNR).  ...  of the image full frame DCT coecients.  ... 
doi:10.5281/zenodo.36645 fatcat:ijcyuiqnh5glnlq3cvoyqq3mxu

Data Embedding In Speech Signals Using Perceptual Masking

Ariel Sagi, D. Malah
2004 Zenodo  
Publication in the conference proceedings of EUSIPCO, Viena, Austria, 2004  ...  The speech signal, x, is divided into non-overlapping frames of length N. The l-th frame is denoted by x l with ele- ments {x l p = x lN+p ; 0 ≤ p ≤ N − 1}.  ...  Data embedding According to SCS, the transmitted signal elements are additively composed of the host signal and the watermark signal, i.e., s n = x n + w n .  ... 
doi:10.5281/zenodo.38653 fatcat:gqqzm7tyorfllgdkfdqo3yd34e

Copyright protection of remote sensing imagery by means of digital watermarking

Mauro Barni, Franco Bartolini, Vito Cappellini, Enrico Magli, Gabriella Olmo, R. Zanini, Hiroyuki Fujisada, Joan B. Lurie, Konradin Weber
2001 Sensors, Systems, and Next-Generation Satellites V  
; ii discussion of a case study where the performance of two popular, state-of-the-art watermarking techniques are evaluated by the light of the requirements at the previous point.  ...  On the basis of these motivations, the contribution of this work is twofold: i assessment of the requirements imposed by the characteristics of remotely sensed images on watermark-based copyright protection  ...  ; ii transformed domain techniques add the watermark to the coe cients of a full-frame transform DFT, DCT, Mellin, Radon, Fresnell of the image; and iii hybrid techniques mainly using block-wise DCT, and  ... 
doi:10.1117/12.450706 fatcat:bgxnsno72zd6roanhjhcwjmrl4

Watermarking-based protection of remote sensing images: requirements and possible solutions

Mauro Barni, Franco Bartolini, Vito Cappellini, Enrico Magli, Gabriella Olmo, Mark S. Schmalz
2001 Mathematics of Data/Image Coding, Compression, and Encryption IV, with Applications  
Along with the increase of market potential, the need arises for the protection of the image products from non-authorized use.  ...  On the basis of these motivations, the contribution of this work is twofold: i assessment o f the requirements imposed by the characteristics of remotely sensed images on watermark-based copyright protection  ...  ; ii transformed domain techniques add the watermark to the coe cients of a full-frame transform DFT, DCT, Mellin, Radon, Fresnell of the image; and iii hybrid techniques mainly using block-wise DCT, and  ... 
doi:10.1117/12.449582 fatcat:izwqftji3jhvdisvohixcgfg6q

Watermark embedding: hiding a signal within a cover image

M. Barni, C.I. Podilchuk, F. Bartolini, E.J. Delp
2001 IEEE Communications Magazine  
the channel), and watermark retrieval (information decoding at the receiver side).  ...  By focusing on the case of image watermarking, we first discuss the choice of the image features the watermark is superimposcd to.  ...  Techniques operating in the full-frame frequency domain, be it the DCT or the DFT domain, tend to adopt a multiplicative embedding rule.  ... 
doi:10.1109/35.940048 fatcat:ovpunvldabahnhqlvzi3rvibym

Watermarking techniques for electronic delivery of remote sensing images

Franco Bartolini
2002 Optical Engineering: The Journal of SPIE  
As an example, the effect of watermarking on image classification is analyzed.  ...  This paper studies the applicability of watermarking techniques to remote sensing imagery.  ...  ; (ii) transformed domain techniques add the watermark to the coefficients of a full-frame transform (DFT, DCT, Mellin, Radon, Fresnell) of the image; and (iii) hybrid techniques (mainly using block-wise  ... 
doi:10.1117/1.1496787 fatcat:jn2lcoo2lzf6zlrtrdo5ni6ini

Optimal adaptive diversity watermarking with channel state estimation

Sviatoslav V. Voloshynovskiy, Frederic Deguillaume, Shelby Pereira, Thierry Pun, Ping W. Wong, Edward J. Delp III
2001 Security and Watermarking of Multimedia Contents III  
A generalized watermarking channel is considered that includes geometrical attacks, fading and additive non-Gaussian noise.  ...  This work advocates the formulation of digital watermarking as a communication problem. We consider watermarking as communication with side information available for both encoder and decoder.  ...  like block DCT, full-frame FFT and DCT, wavelet or Radon transforms T = I for the coordinate domain, and h :; : denotes the embedding function.  ... 
doi:10.1117/12.435452 dblp:conf/sswmc/VoloshynovskiyD01 fatcat:otsomo2jjffttgyckeck3bgbny

Bandwidth Extension of Telephone Speech Aided by Data Embedding

Ariel Sagi, David Malah
2006 EURASIP Journal on Advances in Signal Processing  
A system for bandwidth extension of telephone speech, aided by data embedding, is presented.  ...  600 information bits/second and with a bit error rate of approximately 3 · 10 −4 .  ...  Thanks are also due to the students of the Signal and Image Processing Lab (SIPL) who volunteered to participate in the listening tests.  ... 
doi:10.1155/2007/64921 fatcat:22iiolfdd5fkdlhswunynewtuu

Multimedia watermarking techniques

F. Hartung, M. Kutter
1999 Proceedings of the IEEE  
The basic concepts of watermarking systems are outlined and illustrated with proposed watermarking methods for images, video, audio, text documents, and other media.  ...  Finally, a few remarks are made about the state of the art and possible future developments in watermarking technology.  ...  The addition can take place in the spatial domain, or in transform domains such as the discrete Fourier transform (DFT) domain [113] , the full-image DCT domain [3] , [27] , [105] , the block-wise  ... 
doi:10.1109/5.771066 fatcat:e3hxw7y2s5hrdmvjrzjabognpi

Perceptual watermarks for digital images and video

Raymond B. Wolfgang, Christine I. Podilchuk, Edward J. Delp III, Ping W. Wong, Edward J. Delp III
1999 Security and Watermarking of Multimedia Contents  
However, in order to provide transparency (invisibility of the watermark) and robustness to attack, more sophisticated use of perceptual information in the watermarking process is required.  ...  In this paper, we describe digital image watermarking techniques, known as perceptually based watermarks, that are designed to exploit aspects of the human visual system.  ...  ACKNOWLEDGEMENTS The authors would like to thank Professor Ahmed Tewfik, Bin Zhu, Mitchell Swanson, Mei Kobayashi and Benson Chau for providing an advanced copy of [2] , as well as example images from  ... 
doi:10.1117/12.344700 dblp:conf/sswmc/WolfgangPD99 fatcat:e6vabfq3pzbzzersfcxz5oeug4

Perceptual watermarks for digital images and video

R.B. Wolfgang, C.I. Podilchuk, E.J. Delp
1999 Proceedings of the IEEE  
However, in order to provide transparency (invisibility of the watermark) and robustness to attack, more sophisticated use of perceptual information in the watermarking process is required.  ...  In this paper, we describe digital image watermarking techniques, known as perceptually based watermarks, that are designed to exploit aspects of the human visual system.  ...  ACKNOWLEDGEMENTS The authors would like to thank Professor Ahmed Tewfik, Bin Zhu, Mitchell Swanson, Mei Kobayashi and Benson Chau for providing an advanced copy of [2] , as well as example images from  ... 
doi:10.1109/5.771067 fatcat:ltzt4ch7anbzjpqot7v5hqwdli
« Previous Showing results 1 — 15 out of 43 results