Filters








47 Hits in 3.0 sec

Comparative Analysis of Normalization based Image Watermarking Techniques

T. Sridevi, K. Swapna, V.Vijay Kumar
2011 International Journal of Computer Applications  
Watermarking is done using five methods DCT Zigzag, DCT blocks, DWT, Zernike transform, SVD-DCT. Similarity measures are calculated in order to compare the five watermarking schemes.  ...  This paper presents a comparative study of watermarking schemes. The embedding of watermark is performed after the image normalization.  ...  The central moment is calculated using And the covariance matrix based on the central moments is constructed as: Based on the covariance matrix, the rotation angle φ is calculated using The two eigenvalues  ... 
doi:10.5120/3279-4461 fatcat:wp7juc7wfngzfnelwstxdmq6c4

A Feature-Based Invariant Watermarking Scheme Using Zernike Moments

Say Wei Foo, Qi Dong
2010 Zenodo  
In this paper, a novel feature-based image watermarking scheme is proposed. Zernike moments which have invariance properties are adopted in the scheme.  ...  Zernike transform is then applied to the patches to calculate local Zernike moments. Dither modulation is adopted to quantize the magnitudes of the Zernike moments followed by false alarm analysis.  ...  Other than the orders to be used, some Zernike moments are more suitable for robust watermarking than others.  ... 
doi:10.5281/zenodo.1061980 fatcat:3dntudv5wvapdbrggada3jecie

Special issue on multimedia analysis and security

Shiguo Lian, Sergio Velastin
2010 Multimedia tools and applications  
He is on the editor board of several international journals. He is the guest editor of more than 10 international journals.  ...  Borko Furht for providing the opportunity to edit this special issue on Multimedia Analysis and Security, and Ms. Laura A. Lander, Ms. Maria Mhanilet de Leon, and Ms.  ...  Zernike moments.  ... 
doi:10.1007/s11042-010-0595-y fatcat:uoryf3tunrbrnmywyvlhi44fvu

Using Low-Order Auditory Zernike Moments for Robust Music Identification in the Compressed Domain [chapter]
English

Wei Li, Bilei Zhu, Chuan Xiao, Yaduo Liu
2014 Gate to Computer Science and Research  
Section 9.3 details the steps of deriving MDCT low-order Zernike moment-based audio ngerprint and the searching strategy.  ...  Experimental results show that this low-order Zernike moment-based audio feature achieves high robustness against common audio signal degradations like recompression, noise contamination, echo adding,  ... 
doi:10.15579/gcsr.vol1.ch9 fatcat:7zcw63r6lvdbzferqus5voenda

Low-order auditory Zernike moment: a novel approach for robust music identification in the compressed domain

Wei Li, Chuan Xiao, Yaduo Liu
2013 EURASIP Journal on Advances in Signal Processing  
As a first attempt, we propose in this paper utilizing compressed domain auditory Zernike moment adapted from image processing techniques as the key feature to devise a novel robust audio identification  ...  However, most previously reported methods work on the raw audio format in spite of the fact that nowadays compressed format audio, especially MP3 music, has grown into the dominant way to store music on  ...  Section 3 details the steps of deriving MDCT low-order Zernike moment-based audio fingerprint and the searching strategy.  ... 
doi:10.1186/1687-6180-2013-132 fatcat:4dyw36gtnnfvzfn4al5lh77y4a

A blind video watermarking scheme resistant to rotation and collusion attacks

Amlan Karmakar, Amit Phadikar, Baisakhi Sur Phadikar, Goutam Kr. Maity
2016 Journal of King Saud University: Computer and Information Sciences  
Then Zernike moments of those square blocks are calculated.  ...  In this paper, Discrete Cosine Transform (DCT) based blind video watermarking algorithm is proposed, which is perceptually invisible and robust against rotation and collusion attacks.  ...  The orthogonal radial polynomial R mn (r) can be expressed as: R mn ðrÞ ¼ X mÀjnj 2 s¼0 ðÀ1Þ Based on the Eqs. (6)-(8), the Zernike moment of order n with repetition 'm' of a digital image f(x, y) is  ... 
doi:10.1016/j.jksuci.2014.06.019 fatcat:qkemo7k6yvcdzoxx3irjs3d6wi

Empirical Analysis of Rotation Invariance in Moment Coefficients

Sukhjeet K.Ranade, Supriya Anand
2015 International Journal of Computer Applications  
This paper presents an empirical study of some popularly used moment functions to find out the robust coefficients under rotation.  ...  The selected robust coefficients are used in face recognition under in-plane rotation.  ...  PZMs have been used in face recognition [11] , optical character recognition [12] ,content based image retrieval [13] , image watermarking [14] , palm print verification [15] , audio watermarking  ... 
doi:10.5120/21143-4198 fatcat:mce64uclq5f7tfem2hn4szuxni

Audio Music Monitoring: Analyzing Current Techniques for Song Recognition and Identification

E.D. Nishan W. Senevirathna, Lakshman Jayaratne
2015 GSTF International Journal on Computing  
To index music, most of the researchers use content based information retrieval mechanism since content based classification doesn't need any additional information rather than audio features embedded  ...  The most valuable application of this audio recognition is copyright infringement detection.  ...  d) Auditory Zernike moment All of the discussed methods so far consist with a major drawback i.e. they are working on raw (uncompressed) audio formats like wav.  ... 
doi:10.7603/s40601-014-0015-7 fatcat:hmb4lmhl3bggvmhtvjs5zg4uei

Robust Image Hashing Based on Local Features for Image Authentication

Yan ZHAO, Qian ZHAO
2017 DEStech Transactions on Computer Science and Engineering  
In this paper, an image hashing method based on local features is proposed. At first the input image is pre-processed and divided into un-overlapped blocks.  ...  Experimental results show that this method is robust against most content-preserving attacks. Collision probability of this method is smaller than other methods.  ...  Table 1 lists the Zernike moments features from orders 0 through 5. The total number of Zernike moments is named by Tn (n is the order).  ... 
doi:10.12783/dtcse/smce2017/12413 fatcat:gsrmd2md6rfbte54pjoqfhdcbe

An Improved Non-Repudiate Scheme-Feature Marking Voice Signal Communication

Remya A R, A Sreekumar, Supriya M H, Tibin Thomas
2014 International Journal of Computer Network and Information Security  
to distinguish one from the other.  ...  Thus, the digital watermark can be defined as a type of indicator secretly embedded in a noise tolerant signal such as image, audio or video data.  ...  An audio watermarking scheme presented in the paper [2] utilizes pseudo-Zernike moment and synchronization code of the audio signal in the embedding as well as in the extraction scheme.  ... 
doi:10.5815/ijcnis.2014.02.01 fatcat:dhivzhdt7zc2tgb6ot6nb5wjoq

Semi-Fragile Image Authentication based on CFD and 3-Bit Quantization [article]

Aleksey Zhuvikin and Valery Korzhik and Guillermo Morales-Luna
2016 arXiv   pre-print
We discuss a semi-fragile watermarking system for digital images tolerant to JPEG/JPEG2000 compression. Recently we have published a selective authentication method based on Zernike moments.  ...  In order to embed a watermark (WM) into the image, some areas of the Haar wavelet transform coefficients are used.  ...  Unfortunately, last method requires a rather complex calculation of the Zernike moments that increase significantly the time of WM embedding.  ... 
arXiv:1608.02291v1 fatcat:lkbzgfk3q5g2rj6qmhnzhj7zjq

A Comprehensive Survey on Three-Dimensional Mesh Watermarking

Kai Wang, Guillaume Lavoue, Florence Denis, Atilla Baskurt
2008 IEEE transactions on multimedia  
Finally, some future working directions are pointed out especially on the ways of devising robust and blind algorithms and on some new probably promising watermarking feature spaces.  ...  First, the particular difficulties encountered while applying watermarking on 3-D meshes are discussed.  ...  For example, in the case of digital images, 2-D moment invariants [76] and 2-D Zernike moments [77] have already been used to build geometrically invariant, robust and blind watermarks.  ... 
doi:10.1109/tmm.2008.2007350 fatcat:dvivcwdgbfdd3f25zcx56vnfne

Semi-fragile Image Authentication based on CFD and 3-bit Quantization

Aleksey Zhuvikin, Valery Korzhik, Valery Korzhik, Guillermo Morales-Luna, Guillermo Morales-Luna
2017 Indian Journal of Science and Technology  
We discuss a semi-fragile watermarking system for digital images tolerant to JPEG/JPEG2000 compression. Recently we have published a selective authentication method based on Zernike moments.  ...  In order to embed watermark (WM) into the image, some areas of the Haar wavelet transform coefficients are used.  ...  Unfortunately, last method requires a rather complex calculation of the Zernike moments that increase significantly the time of WM embedding.  ... 
doi:10.17485/ijst/2016/v9i48/109167 fatcat:zzxud4zdqbbmhe2x6azcpiber4

Adaptive Digital Watermarking Scheme Based on Support Vector Machines and Optimized Genetic Algorithm

Xiaoyi Zhou, Chunjie Cao, Jixin Ma, Longjuan Wang
2018 Mathematical Problems in Engineering  
After various attacks (such as cropping, JPEG compression, Gaussian low-pass filtering (3,0.5), histogram equalization, and contrast increasing (0.5,0.6)) on the watermarked image, the extracted watermark  ...  An improved scheme to increase the robustness of embedded information on the basis of discrete cosine transform (DCT) domain is proposed in this study.  ...  [15] introduce a robust watermarking algorithm based on SVM regression.  ... 
doi:10.1155/2018/2685739 fatcat:26nd4a36vnherhpqvg6imz2gtu

Alpha Channel Fragile Watermarking for Color Image Integrity Protection

Barbara Bonafè, Marco Botta, Davide Cavagnino, Victor Pomponiu
2017 Journal of Imaging  
The security of the algorithm is based on a secret key defining the embedding space in which the watermark is inserted by means of the Karhunen-Loève transform (KLT) and a genetic algorithm (GA).  ...  As a consequence, the resulting watermarked images have a very high peak signal-to-noise ratio.  ...  Other features exploited by some watermarking algorithms are the singular values and vectors of singular value decomposition (SVD), and the various types of moment-based transformations, such as Zernike  ... 
doi:10.3390/jimaging3040053 fatcat:lzfizsr4zjee3e46kgyv7eda5i
« Previous Showing results 1 — 15 out of 47 results