Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
Filters








736 Hits in 3.4 sec

Intelligent Extraction of a Digital Watermark from a Distorted Image

A. KHAN, S. F. TAHIR, T.-S. CHOI
2008 IEICE transactions on information and systems  
We present a novel approach to developing Machine Learning (ML) based decoding models for extracting a watermark in the presence of attacks.  ...  Experimental results show that the proposed ML based decoding scheme can adapt to suit the watermark application by learning the alterations in the feature space incurred by the attack employed.  ...  pendent component analysis based watermarking. Fridrich et al. [5] exploit the learning capabilities of SVM for improving blind steganalysis.  ... 
doi:10.1093/ietisy/e91-d.7.2072 fatcat:awme6qsa3rh6jkgalb7pfe2cay

A Study on Watermarking Schemes for Image Authentication

S. Radharani, Dr. M.L. Valarmathi
2010 International Journal of Computer Applications  
In particular, the concept of content-based image watermarking is reviewed in details.  ...  This paper presents an overview of the various concepts and research works in the field of image watermark authentication.  ...  Independent Component Analysis (ICA) DCT and DWT are the two transformation techniques that are widely used in the watermark embedding process.  ... 
doi:10.5120/658-925 fatcat:sxx7sjxbbra6pjng2xorleoizi

Semantic Segmentation under a Complex Background for Machine Vision Detection Based on Modified UPerNet with Component Analysis Modules

Jian Huang, Guixiong Liu, Bodi Wang
2020 Mathematical Problems in Engineering  
The basic network of the encoder is selected for the semantic segmentation, and the UPerNet is modified based on the component analysis module.  ...  The method also shows good performance in vision-based detection of 2019 Chinese Yuan features.  ...  Taking banknote detection as an example, we set up the semantic segmentation model by the component analysis modules (before/after modification) to vision-based detection of 2019 Chinese Yuan (CNY) feature  ... 
doi:10.1155/2020/6903130 fatcat:lpqlxgaeqnehhessvp3nkcrb4i

Communication and information theory in watermarking: a survey

Adrian Sequeira, Deepa Kundur, Andrew G. Tescher, Bhaskaran Vasudev, V. Michael Bove, Jr.
2001 Multimedia Systems and Applications IV  
After a brief introduction, some popular approaches are classified into different groups and an overview of various algorithms and analysis is provided.  ...  This paper presents a review of some influential work in the area of digital watermarking using communications and information-theoretic analysis.  ...  Game-Based Analysis In game-based analysis, no severe restrictions are initially set on the type of data embedding, extraction or attack.  ... 
doi:10.1117/12.448206 fatcat:toifhppzkzciphua75u2ardqyu

Statistical analysis of watermarking schemes for copyright protection of images

J.R. Hernandez, F. Perez-Gonzalez
1999 Proceedings of the IEEE  
Finally, the modeling techniques studied are applied to the analysis of two watermarking schemes, one of them defined in the spatial domain, and the other in the direct cosine transform (DCT) domain.  ...  Watermarks may encode a message, and the performance of the watermarking system is evaluated using as a measure the probability of false alarm, the probability of detection when the presence of the watermark  ...  An equivalent expression for this Neyman-Pearson test is (30) where is the Gaussian pdf that has just been derived in the analysis of the ML watermark decoder.  ... 
doi:10.1109/5.771069 fatcat:qaphy6zwcraa3pkdje7jmnsdte

A Video Watermarking Scheme Resistant to Synchronization Attacks Based on Statistics and Shot Segmentation

Li-he Zhang, Gang Xu, Ji-jun Zhou, Lin-jie Shen
2007 Seventh International Conference on Intelligent Systems Design and Applications (ISDA 2007)  
One of the challenges of blind watermark detection is synchronization. In this paper, a new video watermarking procedure for resistant synchronization is proposed.  ...  It is shown that this kind of watermark is more resilient against temporal synchronization attacks. Experimental results from an implementation of the algorithm are presented.  ...  A motion-vector-based watermark algorithm has been proposed in 1997 by Kutter et al. in an MPEG-4 proposal [3] .  ... 
doi:10.1109/isda.2007.4389674 fatcat:5phuori7ynaldcq7osjkwwahga

A Video Watermarking Scheme Resistant to Synchronization Attacks Based on Statistics and Shot Segmentation

Li-he Zhang, Gang Xu, Ji-jun Zhou, Lin-jie Shen
2007 Seventh International Conference on Intelligent Systems Design and Applications (ISDA 2007)  
One of the challenges of blind watermark detection is synchronization. In this paper, a new video watermarking procedure for resistant synchronization is proposed.  ...  It is shown that this kind of watermark is more resilient against temporal synchronization attacks. Experimental results from an implementation of the algorithm are presented.  ...  A motion-vector-based watermark algorithm has been proposed in 1997 by Kutter et al. in an MPEG-4 proposal [3] .  ... 
doi:10.1109/isda.2007.151 dblp:conf/isda/ZhangXZS07 fatcat:wdaj5cogfbgjznq6dmxfcaxz74

Spread Spectrum Watermarking: Principles and Applications in Fading Channel [chapter]

Santi P., Seba Maity, Jaya Sil, Claude Delph
2012 Watermarking - Volume 1  
Proposed GA based attack estimation The goal of this SS watermarking method is to embed data on each signal point based on its data hiding capacity and subsequently reliable decoding even after fading-like  ...  The fitness function `F' depends on both data hiding capacity `C' and detection error probability p e that corresponds to BER for watermark decoding.  ...  Book two deals with audio watermarking and describes an array of chapters on performance analysis of algorithms.  ... 
doi:10.5772/38359 fatcat:dmoi2t37c5cxflvfg6t54ub7pa

AN INVESTIGATION OF DIFFERENT VIDEO WATERMARKING TECHNIQUES

B. Sridhar
2017 International Journal on Smart Sensing and Intelligent Systems  
Watermarking is an advanced technology that identifies to solve the problem of illegal manipulation and distribution of digital data.  ...  Also, comprehensive review of the literature on the evolution of various video watermarking techniques to achieve robustness and to maintain the quality of watermarked video sequences.  ...  In this paper, the author proposed a novel video watermarking scheme to watermark the original video based on locating motion region, using the independent component analysis (ICA) and the quantization  ... 
doi:10.21307/ijssis-2017-217 fatcat:wamzxdqkifgc7l7f4k2y6ihsxa

Support Vector Machine Based Intelligent Watermark Decoding For Anticipated Attack

Syed Fahad Tahir, Asifullah Khan, Abdul Majid, Anwar M. Mirza
2008 Zenodo  
In order to validate SVM based decoding scheme, we have taken Gaussian noise as a test case. We generate a data set using 125 images and 25 different keys.  ...  Polynomial kernel of SVM has achieved 100 percent accuracy on test data.  ...  Recently, Zhang et al [8] , in their work have used Independent Component Analysis to extract watermark correctly without using the original image.  ... 
doi:10.5281/zenodo.1080808 fatcat:3qdhexrca5efbg3x3uzz3zom7a

Watermarking on Compressed Image: A New Perspective [chapter]

Santi P., Claude Delph
2012 Watermarking - Volume 1  
Detection of the watermark information is based on a cross-correlation between the watermarked content and the watermark pattern.  ...  When the discrete cosine transformation is applied, each color component is transformed independently.  ...  Book two deals with audio watermarking and describes an array of chapters on performance analysis of algorithms.  ... 
doi:10.5772/38161 fatcat:vzhe4hn6pjht5bsx5edm3kx7pe

DCT-domain watermarking techniques for still images: detector performance analysis and a new structure

J.R. Hernandez, M. Amado, F. Perez-Gonzalez
2000 IEEE Transactions on Image Processing  
As a result of our work, analytical expressions for performance measures such as the probability of error in watermark decoding and probabilities of false alarm and detection in watermark detection are  ...  Two tests are involved in the ownership verification stage: watermark decoding, in which the message carried by the watermark is extracted, and watermark detection, which decides whether a given image  ...  One relevant by-product of the rigorous analysis presented in this paper has been the discovery of new detector and decoder structures that outperform the existing ones, usually based in the calculation  ... 
doi:10.1109/83.817598 pmid:18255372 fatcat:azh3pqmvcvgzhnw4xadxucv7cu

Performance analysis of a 2-D-multipulse amplitude modulation scheme for data hiding and watermarking of still images

J.R. Hernandez, F. Perez-Gonzalez, J.M. Rodriguez, G. Nieto
1998 IEEE Journal on Selected Areas in Communications  
Two topics are covered in the analysis: the ownership verification process, also called watermark detection test, and the data-hiding process.  ...  The main contribution of this paper is the introduction of an analytical point of view to the estimation of performance measurements.  ...  One solution is doubling the pulse size in order to guarantee the required in watermark detection and BER in data decoding.  ... 
doi:10.1109/49.668974 fatcat:uutijpf6q5byjlhrv4ooip3mom

Watermarking digital images for copyright protection

J.J.K. Ó Ruanaidh, W.J. Dowling, F.M. Boland
1996 IEE Proceedings - Vision Image and Signal Processing  
A watermark is an invisible mark placed on an image that is designed to identify both the source of an image as well as its intended recipient.  ...  The authors present an overview of watermarking techniques and demonstrate a solution to one of the key problems in image watermarking, namely how to hide robust invisible labels inside grey scale or colour  ...  Only the components that are most significant to image intelligibility are marked. A transform-based watermarking algorithm is described in more detail in Section 4.  ... 
doi:10.1049/ip-vis:19960711 fatcat:scvindvhfzbmbgbfsys3cf2kx4

Digital image watermarking: its formal model, fundamental properties and possible attacks

Hussain Nyeem, Wageeh Boles, Colin Boyd
2014 EURASIP Journal on Advances in Signal Processing  
Considering possible inputs, outputs, and component functions, the initial construction of a basic watermarking model is developed further to incorporate the use of keys.  ...  On the basis of our proposed model, fundamental watermarking properties are defined and their importance exemplified for different image applications.  ...  The generated watermark is embedded into the cover object by the watermark embedding, sometimes based on an embedding key.  ... 
doi:10.1186/1687-6180-2014-135 fatcat:mx7kw7tqvzadrhmozmwj37lbxu
« Previous Showing results 1 — 15 out of 736 results