Filters








1,072 Hits in 2.9 sec

Secured Data Hiding based on Compression Function and Quantization

Ajit Danti, G. R. Manjula
2012 International Journal of Applied Information Systems  
In this paper, Quantization Index Modulation and the compression function of µ-Law standards for quantization are used.  ...  The scalar and the vector methods along with a secret key for data hiding will make the method more secure and efficient. The experimental results demonstrate the robustness of the proposed approach.  ...  Yargıc "Hidden data transmission in mixed excitation linear prediction coded speech using quantization index modulation" Published in IET Information Security, Received on 3rd June 2009, Revised on 3rd  ... 
doi:10.5120/ijais12-450109 fatcat:guwgd7svdrgoneyyezsxzxol6i

A Sequential Quantization Strategy for Data Embedding and Integrity Verification

Yiu-ming Cheung, Hao-tian Wu
2007 IEEE transactions on circuits and systems for video technology (Print)  
Index Terms-Fragile watermarking, mesh authentication, reversible data hiding, sequential quantization strategy (SQS).  ...  Quantization-based embedding has been used for integrity verification in semi-fragile watermarking.  ...  We analyze the condition of detecting the changes of the modulated host values in a special case when the security is emphasized.  ... 
doi:10.1109/tcsvt.2007.903553 fatcat:vjvpdwuxgvhvtbimwnkuqexn24

Quantization Watermarking Schemes for MPEG-4 General Audio Coding [chapter]

Liu Shu-chang, Li Jin-tao
2002 Lecture Notes in Computer Science  
Quantization Watermarking or Quantization Index Modulation is usually used for uniform scalar quantizarion.  ...  After a brief review of audio watermarking, this paper mainly introduces the watermarking techniques, whose aim is to embed watermark in the quantized MDCT coefficients of AAC or the index value of TwinVQ  ...  (The frame size is 1024) The advantages of the proposed watermarking scheme are blind-detection, more secure than pure Parity Modulation, and difficult to remove without significantly audio quality degrading  ... 
doi:10.1007/3-540-36228-2_55 fatcat:klzizjezlbfy5kg5tuovd7rxhi

Watermarking of JPEG2000 Compressed Images with Improved Encryption

Kukoo Anna Mathew
2013 International Journal of Computer Applications Technology and Research  
On the whole 3 watermarking schemes are used: Spread Spectrum, Scalar Costa Scheme Quantization Index Modulation, and Rational Dither Modulation.  ...  Among the solutions for these issues, digital watermarking techniques are used. A range of watermarking methods has been projected.  ...  Prins et al. in [10] projected a robust quantization index modulation (QIM) based watermarking technique, which embeds the watermark in the encrypted domain.  ... 
doi:10.7753/ijcatr0203.1007 fatcat:dkddrre2jfegzepfaiiyz5w7yi

Digital Image Watermarking Of Compressed Image Using Jpeg 2000 And Encryption Technique

Prof. Mrs. R. J. Shelke
2015 Zenodo  
The planned method can examine the PSNR and the securit y of the proposed algorithm,using the watermarking scheme:Spread Spectrum (SS) and Scala r Costa Scheme Quantization Index Modulation https://www.ijiert.org  ...  Thus it is necessary to choose an encryption scheme that is both secure and will allow watermark ing in a predictable manner in the compressed encrypted domain.  ...  In this paper, we are using the Spread Spectrum Watermarking Scheme and Scalar Costa Scheme Quantization Index Modulation (SCS-QIM). [1] , [4] , [7] .  ... 
doi:10.5281/zenodo.1467582 fatcat:o26lzxzqcbcolp223lcl5uvcze

Robust multirate lattice quantization index modulation watermarking resilient to multiple description transmission channel

Suh-Yin Lee
2007 Optical Engineering: The Journal of SPIE  
The proposed multirate lattice quantization index modulation ͑MRL-QIM͒ encodes two watermark bits into each of the four co-set points of a lattice ͑so-called multirate͒.  ...  However, it is quite damaging to the traditional quantization-based watermarking technique for payload detection.  ...  The Proposed Multirate Lattice Quantization Index Modulation "MRL-QIM… Watermarking In this section, a multirate lattice quantization index modulation ͑MRL-QIM͒ watermarking scheme is described.  ... 
doi:10.1117/1.2715597 fatcat:4ea7rvzg5zdgpiua7psbg3xwhy

Asymmetric Watermarking Schemes [chapter]

Joachim J. Eggers, Jonathan K. Su, Bernd Girod
2000 Sicherheit in Netzen und Medienströmen  
This leads to a security problem if the detectors are implemented in consumer devices that are spread all over the world. Therefore, the development of asymmetric schemes becomes important.  ...  However, almost all of them are symmetric, meaning the key used for watermark embedding must be available at the watermark detector.  ...  Acknowledgement We thank Teddy Furon for the frequent email discussion concerning the topic of asymmetric watermarking schemes.  ... 
doi:10.1007/978-3-642-58346-9_11 fatcat:e7uytl3unbddbkkl5adgg2g3ny

Combined Hashing/Watermarking Method For Image Authentication

Vlado Kitanovski, Dimitar Taskovski, Sofija Bogdanova
2007 Zenodo  
To increase security of the system the watermark is generated using the image hash as a key. Quantized Index Modulation of DCT coefficients is used for watermark embedding.  ...  Watermark detection is performed without use of the original image. Experimental results demonstrate the effectiveness of the presented method in terms of robustness and fragility.  ...  Quantized Index Modulation of DCT coefficients is used to embed the watermark. Watermark detection is performed without using the original image.  ... 
doi:10.5281/zenodo.1063009 fatcat:tv4xxjin2bhsdcbd4ajowctyau

Application of Audio Watermarking Procedures for Mix Music

Youngseok Lee, Jongweon Kim
2016 International Journal of Security and Its Applications  
In experimental results, applied watermarking technologies cannot be applicable to mix music and three technologies fail to extract watermarks from mix music.  ...  This results is from mix music that does not contain full watermark information. Therefore applicable watermarking technology should development for mix music.  ...  Quantization Index Modulation Lattice. The signal is Quantized to the Nearest 'o' or 'x' Depending on the Watermark bit.  ... 
doi:10.14257/ijsia.2016.10.2.10 fatcat:2yacyn4vtnetfo543zhdjrwewa

A NEW WATERMARKING SCHME AGAINST LOCAL ATTACKS

Neethu Raveendran.K .
2014 International Journal of Research in Engineering and Technology  
Lastly, Logarithmic quantization index modulation (LQIM) watermarking embedding method is used to embed watermarking sequence bit by bit into leaf nodes of binary space partition tree.  ...  This method overcomes the drawbacks of feature based watermarking method. The watermark Extraction is similar to Watermark Embedding.  ...  Partition tree; and 3) embedding watermark information by Logarithmic Quantization Index Modulation watermark embedding method.  ... 
doi:10.15623/ijret.2014.0305077 fatcat:mavrneaedvfkxi66p5qbu6eayq

Rational dither modulation watermarking using a perceptual model

Qiao Li, Ingemar Cox
2005 2005 IEEE 7th Workshop on Multimedia Signal Processing  
Quantization index modulation (QIM) is a computationally efficient method of informed watermarking.  ...  Previously, we proposed using a modification of Watson's perceptual model to adaptively adjust the quantization index step size.  ...  INTRODUCTION Quantization index modulation is a method to perform watermarking that was originally proposed by Chen and Wornell [1] .  ... 
doi:10.1109/mmsp.2005.248616 dblp:conf/mmsp/LiC05 fatcat:nap5x4a35ngh7lubjet3s2ukqi

Digital Video Watermarking Techniques: A Review

Arti Bhardwaj
2017 International Journal Of Engineering And Computer Science  
Digital Watermarking can be used to secure these illegal redistribution and reallocation. Digital Watermarking was invented against illegal work, owners' authentication and security.  ...  We survey on properties of video watermarking, classification of video marking techniques, application and watermark attacks.  ...  We use a modified version of Quantization Index Modulation (QIM) algorithm to store the watermarks.  ... 
doi:10.18535/ijecs/v6i5.23 fatcat:22fgkdnxdjemhbql3oftonnw2i

A Normalization-Based Robust Watermarking Scheme Using Zernike Moments

Say Wei Foo, Qi Dong
2009 Zenodo  
Dither modulation is adopted to quantize the magnitudes of Zernike moments according to the watermark bit stream. The watermark extracting method is a blind method.  ...  Security analysis and false alarm analysis are then performed. The quality degradation of watermarked image caused by the embedded watermark is visually transparent.  ...  The dither modulation [21] , which is a special form of quantization index modulation for signal quantization, is adopted to quantize the magnitudes of Zernike moments in and embed watermark bits.  ... 
doi:10.5281/zenodo.1061474 fatcat:p7xnkjcnsnaupgiazqpodkjv2e

Security of DM Quantization Watermarking Schemes: A Practical Study for Digital Images [chapter]

Patrick Bas, Jarmo Hurri
2005 Lecture Notes in Computer Science  
In this paper, the security of Dither Modulation Quantization Index Modulation schemes for digital images is analyzed. Both pixel and DCT coefficient quantization schemes are investigated.  ...  The results reported in this paper demonstrate how changes in natural image statistics can be used to detect watermarks and devise attacks.  ...  DM Quantization schemes Principles of DM quantization The class of Quantization Index Modulation (QIM) watermarking schemes was first presented by Chen and Wornell [5] .  ... 
doi:10.1007/11551492_15 fatcat:rru3cru2ifccbmjxgafgblwyly

A robust digital watermarking technique with improved performance under JPEG compression

Fang Fang, Songxin Tan, Andrew G. Tescher
2006 Applications of Digital Image Processing XXIX  
An effective watermarking system based on a quantization index modulation (QIM) algorithm in the frequency domain is proposed to achieve copyright protection.  ...  In the second step the QIM algorithm is used to insert a watermark into the image, and then a secure key is recorded. For detection, the embedded watermark is easily extracted using the secure key.  ...  In the extraction step, we use these secure keys information to detect the embedded watermark.  ... 
doi:10.1117/12.680143 fatcat:bwhobluzkzdkfjhkd77n7ibw2i
« Previous Showing results 1 — 15 out of 1,072 results