A copy of this work was available on the public web and has been preserved in the Wayback Machine. The capture dates from 2018; you can also visit the original URL.
The file type is application/pdf
.
Filters
Intelligent Extraction of a Digital Watermark from a Distorted Image
2008
IEICE transactions on information and systems
We present a novel approach to developing Machine Learning (ML) based decoding models for extracting a watermark in the presence of attacks. ...
Experimental results show that the proposed ML based decoding scheme can adapt to suit the watermark application by learning the alterations in the feature space incurred by the attack employed. ...
pendent component analysis based watermarking. Fridrich et al. [5] exploit the learning capabilities of SVM for improving blind steganalysis. ...
doi:10.1093/ietisy/e91-d.7.2072
fatcat:awme6qsa3rh6jkgalb7pfe2cay
A Study on Watermarking Schemes for Image Authentication
2010
International Journal of Computer Applications
In particular, the concept of content-based image watermarking is reviewed in details. ...
This paper presents an overview of the various concepts and research works in the field of image watermark authentication. ...
Independent Component Analysis (ICA) DCT and DWT are the two transformation techniques that are widely used in the watermark embedding process. ...
doi:10.5120/658-925
fatcat:sxx7sjxbbra6pjng2xorleoizi
Semantic Segmentation under a Complex Background for Machine Vision Detection Based on Modified UPerNet with Component Analysis Modules
2020
Mathematical Problems in Engineering
The basic network of the encoder is selected for the semantic segmentation, and the UPerNet is modified based on the component analysis module. ...
The method also shows good performance in vision-based detection of 2019 Chinese Yuan features. ...
Taking banknote detection as an example, we set up the semantic segmentation model by the component analysis modules (before/after modification) to vision-based detection of 2019 Chinese Yuan (CNY) feature ...
doi:10.1155/2020/6903130
fatcat:lpqlxgaeqnehhessvp3nkcrb4i
Communication and information theory in watermarking: a survey
2001
Multimedia Systems and Applications IV
After a brief introduction, some popular approaches are classified into different groups and an overview of various algorithms and analysis is provided. ...
This paper presents a review of some influential work in the area of digital watermarking using communications and information-theoretic analysis. ...
Game-Based Analysis In game-based analysis, no severe restrictions are initially set on the type of data embedding, extraction or attack. ...
doi:10.1117/12.448206
fatcat:toifhppzkzciphua75u2ardqyu
Statistical analysis of watermarking schemes for copyright protection of images
1999
Proceedings of the IEEE
Finally, the modeling techniques studied are applied to the analysis of two watermarking schemes, one of them defined in the spatial domain, and the other in the direct cosine transform (DCT) domain. ...
Watermarks may encode a message, and the performance of the watermarking system is evaluated using as a measure the probability of false alarm, the probability of detection when the presence of the watermark ...
An equivalent expression for this Neyman-Pearson test is (30) where is the Gaussian pdf that has just been derived in the analysis of the ML watermark decoder. ...
doi:10.1109/5.771069
fatcat:qaphy6zwcraa3pkdje7jmnsdte
A Video Watermarking Scheme Resistant to Synchronization Attacks Based on Statistics and Shot Segmentation
2007
Seventh International Conference on Intelligent Systems Design and Applications (ISDA 2007)
One of the challenges of blind watermark detection is synchronization. In this paper, a new video watermarking procedure for resistant synchronization is proposed. ...
It is shown that this kind of watermark is more resilient against temporal synchronization attacks. Experimental results from an implementation of the algorithm are presented. ...
A motion-vector-based watermark algorithm has been proposed in 1997 by Kutter et al. in an MPEG-4 proposal [3] . ...
doi:10.1109/isda.2007.4389674
fatcat:5phuori7ynaldcq7osjkwwahga
A Video Watermarking Scheme Resistant to Synchronization Attacks Based on Statistics and Shot Segmentation
2007
Seventh International Conference on Intelligent Systems Design and Applications (ISDA 2007)
One of the challenges of blind watermark detection is synchronization. In this paper, a new video watermarking procedure for resistant synchronization is proposed. ...
It is shown that this kind of watermark is more resilient against temporal synchronization attacks. Experimental results from an implementation of the algorithm are presented. ...
A motion-vector-based watermark algorithm has been proposed in 1997 by Kutter et al. in an MPEG-4 proposal [3] . ...
doi:10.1109/isda.2007.151
dblp:conf/isda/ZhangXZS07
fatcat:wdaj5cogfbgjznq6dmxfcaxz74
Spread Spectrum Watermarking: Principles and Applications in Fading Channel
[chapter]
2012
Watermarking - Volume 1
Proposed GA based attack estimation The goal of this SS watermarking method is to embed data on each signal point based on its data hiding capacity and subsequently reliable decoding even after fading-like ...
The fitness function `F' depends on both data hiding capacity `C' and detection error probability p e that corresponds to BER for watermark decoding. ...
Book two deals with audio watermarking and describes an array of chapters on performance analysis of algorithms. ...
doi:10.5772/38359
fatcat:dmoi2t37c5cxflvfg6t54ub7pa
AN INVESTIGATION OF DIFFERENT VIDEO WATERMARKING TECHNIQUES
2017
International Journal on Smart Sensing and Intelligent Systems
Watermarking is an advanced technology that identifies to solve the problem of illegal manipulation and distribution of digital data. ...
Also, comprehensive review of the literature on the evolution of various video watermarking techniques to achieve robustness and to maintain the quality of watermarked video sequences. ...
In this paper, the author proposed a novel video watermarking scheme to watermark the original video based on locating motion region, using the independent component analysis (ICA) and the quantization ...
doi:10.21307/ijssis-2017-217
fatcat:wamzxdqkifgc7l7f4k2y6ihsxa
Support Vector Machine Based Intelligent Watermark Decoding For Anticipated Attack
2008
Zenodo
In order to validate SVM based decoding scheme, we have taken Gaussian noise as a test case. We generate a data set using 125 images and 25 different keys. ...
Polynomial kernel of SVM has achieved 100 percent accuracy on test data. ...
Recently, Zhang et al [8] , in their work have used Independent Component Analysis to extract watermark correctly without using the original image. ...
doi:10.5281/zenodo.1080808
fatcat:3qdhexrca5efbg3x3uzz3zom7a
Watermarking on Compressed Image: A New Perspective
[chapter]
2012
Watermarking - Volume 1
Detection of the watermark information is based on a cross-correlation between the watermarked content and the watermark pattern. ...
When the discrete cosine transformation is applied, each color component is transformed independently. ...
Book two deals with audio watermarking and describes an array of chapters on performance analysis of algorithms. ...
doi:10.5772/38161
fatcat:vzhe4hn6pjht5bsx5edm3kx7pe
DCT-domain watermarking techniques for still images: detector performance analysis and a new structure
2000
IEEE Transactions on Image Processing
As a result of our work, analytical expressions for performance measures such as the probability of error in watermark decoding and probabilities of false alarm and detection in watermark detection are ...
Two tests are involved in the ownership verification stage: watermark decoding, in which the message carried by the watermark is extracted, and watermark detection, which decides whether a given image ...
One relevant by-product of the rigorous analysis presented in this paper has been the discovery of new detector and decoder structures that outperform the existing ones, usually based in the calculation ...
doi:10.1109/83.817598
pmid:18255372
fatcat:azh3pqmvcvgzhnw4xadxucv7cu
Performance analysis of a 2-D-multipulse amplitude modulation scheme for data hiding and watermarking of still images
1998
IEEE Journal on Selected Areas in Communications
Two topics are covered in the analysis: the ownership verification process, also called watermark detection test, and the data-hiding process. ...
The main contribution of this paper is the introduction of an analytical point of view to the estimation of performance measurements. ...
One solution is doubling the pulse size in order to guarantee the required in watermark detection and BER in data decoding. ...
doi:10.1109/49.668974
fatcat:uutijpf6q5byjlhrv4ooip3mom
Watermarking digital images for copyright protection
1996
IEE Proceedings - Vision Image and Signal Processing
A watermark is an invisible mark placed on an image that is designed to identify both the source of an image as well as its intended recipient. ...
The authors present an overview of watermarking techniques and demonstrate a solution to one of the key problems in image watermarking, namely how to hide robust invisible labels inside grey scale or colour ...
Only the components that are most significant to image intelligibility are marked. A transform-based watermarking algorithm is described in more detail in Section 4. ...
doi:10.1049/ip-vis:19960711
fatcat:scvindvhfzbmbgbfsys3cf2kx4
Digital image watermarking: its formal model, fundamental properties and possible attacks
2014
EURASIP Journal on Advances in Signal Processing
Considering possible inputs, outputs, and component functions, the initial construction of a basic watermarking model is developed further to incorporate the use of keys. ...
On the basis of our proposed model, fundamental watermarking properties are defined and their importance exemplified for different image applications. ...
The generated watermark is embedded into the cover object by the watermark embedding, sometimes based on an embedding key. ...
doi:10.1186/1687-6180-2014-135
fatcat:mx7kw7tqvzadrhmozmwj37lbxu
« Previous
Showing results 1 — 15 out of 736 results