A copy of this work was available on the public web and has been preserved in the Wayback Machine. The capture dates from 2019; you can also visit the original URL.
The file type is application/pdf
.
Filters
Improved binary feature matching through fusion of hamming distance and fragile bit weight
2013
Proceedings of the 3rd ACM international workshop on Interactive multimedia on mobile & portable devices - IMMPD '13
Previous research ignoring the fact that the signs of fragile bits are not stable through image transform. ...
One bit in binary feature is deemed fragile if its sign of value reverses easily across the local image patch that has changed slightly. ...
In mark string, fragile bits are represented with ones and the others are represented with zeros. ...
doi:10.1145/2505483.2505492
dblp:conf/mm/ZhuangZLT13
fatcat:ubmzb7tvnvcmlach3lg7wyrntu
Hamming Code Based Watermarking Scheme for 3D Model Verification
2014
Mathematical Problems in Engineering
An adaptive watermark is generated from each cover model by using the hamming code technique. A simple least significant bit (LSB) substitution technique is employed for watermark embedding. ...
In this paper, a public hamming code based fragile watermarking technique is proposed for 3D objects verification. ...
There is a code with parity bits and 2 − − 1 data bits for each integer, where must satisfy ≥ 2. ...
doi:10.1155/2014/241093
fatcat:nlher53adzgvrc56ntug2x7olq
An Image Watermarking Method Based on Mean-Removed Vector Quantization for Multiple Purposes
2005
IAPR International Workshop on Machine Vision Applications
Unlike the normal VQ encoder, the embedding process for each watermark bit can be performed by searching the best match codeword p r for each input residual vector under the constraints that the ke y 3 ...
Here, a small visually meaningful binary image V with siz e a×b is replicated periodically to obtain the binary fragile watermark W F with siz e A w ×B w that is large enough for embedding. ...
dblp:conf/mva/LuS05
fatcat:g6sczboamnb6fgdkqrbqfdxw44
Multipurpose image watermarking algorithm based on multistage vector quantization
2005
IEEE Transactions on Image Processing
In the proposed method, the fragile watermark and the robust watermark are embedded in mean indices and residual indices using different techniques, and both of them can be blindly extracted. ...
Most of these algorithms are designed for only one purpose. ...
His current research interests include data mining, information security and image processing. ...
doi:10.1109/tip.2005.847324
pmid:15971780
fatcat:4rpbm3wymje6dbi3cospv4qeje
A modular framework for color image watermarking
2016
Signal Processing
We present an algorithm for fragile watermarking of color, or multi-channel, images either in uncompressed format, in lossless compressed format, or in compressed format with locally compressed units ( ...
The watermark bits may be embedded with various methods, in particular the use of syndrome coding has proven flexible and effective. ...
Werbrouck for their careful reading of this paper and their useful suggestions which greatly improved the content of this work. ...
doi:10.1016/j.sigpro.2015.07.018
fatcat:mat3wvn6pfa3dbtuzu4vjddt4e
Cryptanalysis of a Hamming Code and Logistic-Map based Pixel-Level Active Forgery Detection Scheme
2022
International Journal of Advanced Computer Science and Applications
In this paper, we analyze the security of a fragile watermarking scheme for tamper detection in images recently proposed by S. Prasad et al. ...
Experimental results shows that the scheme could not withstand the attack and watermarked images were manipulated without triggering any alarm in the extraction scheme. ...
ACKNOWLEDGMENT The authors would like to thank the deanship of research at the Islamic University of Madinah, Kingdom of Saudi Arabia for supporting this research. ...
doi:10.14569/ijacsa.2022.0130278
fatcat:cfhsmokonva63n4ufdobo4l5jq
Verification of iris image authenticity using fragile watermarking
2016
Bulletin of the Polish Academy of Sciences: Technical Sciences
Hence, it is called fragile watermarking to differentiate this method from regular watermarking that should present some robustness against image alterations. ...
But, by using the BATH dataset comprising 32 000 iris images collected for 1 600 distinct eyes, we verify that the proposed alterations have no impact on iris recognition reliability, although statistically ...
This can be explained by a smaller area that must be searched for the iris when the image is being segmented. ...
doi:10.1515/bpasts-2016-0090
fatcat:rduf3xcfere6rbl35tkde46npi
Improved embedding efficiency and AWGN robustness for SS watermarks via pre-coding
2008
Security, Forensics, Steganography, and Watermarking of Multimedia Contents X
Our pre-coding method encodes p bits as a 2 p × 1 binary vector with a single nonzero entry whose index indicates the value of the embedded bits. ...
Experimental evaluation of the method using a set theoretic embedding framework for the watermark insertion validates our analysis. ...
Conventional LSB embedding with K bits can require an embedding (Hamming) distortion as high as K 2 bits. ...
doi:10.1117/12.767412
dblp:conf/sswmc/AltunB0B08
fatcat:n3r3qh7cs5forehxumkoxp7lva
Improvement of a hamming code and logistic-map based pixel-level active forgery detection scheme
2022
International Journal of Advanced and Applied Sciences
With possession of the keys watermarked images could be manipulated without being detected by the extraction scheme. ...
We proved in a previous work that the scheme suffers from security flaws and we exploited those flaws to attack the scheme resulting in the revelation of the secret keys used in the embedding process. ...
Acknowledgment The authors would like to thank the deanship of research at the Islamic University of Madinah for supporting this research. ...
doi:10.21833/ijaas.2022.09.016
fatcat:7cvkw3iugnhoropzu3wyxkxj7m
High-Capacity Reversible Data Hiding Method for JPEG Images
2018
Journal of Software
This paper presents a reversible data hiding method for JPEG images by combining (7, 4) the Hamming code and improving Huang et al.'s data hiding technique. Huang et al.' ...
The experimental results show that the proposed method allows for maximum embedding capability while maintaining acceptable image quality. ...
s HS-based RDH method [18] by combining it with (7, 4) Hamming code. The experimental results show that our RDH method has a higher embedding ability, and also provides good image quality. ...
doi:10.17706/jsw.13.1.1-17
fatcat:uyv5yakssjfgdbeeyvrg5oaoiq
Motion-embedded residual error for packet loss recovery of video transmission and encryption
2006
Visual Communications and Image Processing 2006
This study proposes an embedded block hash searching scheme at the decoder side to achieve motion estimation and recover the lost packets, while maintaining format compliance and cryptographic provable ...
Traditional cryptographic encryption can achieve provable security but is unfortunately sensitive to a single bit error, which will cause an unreliable packet to be dropped to create packet loss. ...
With the search range, the block hash is extracted from each macroblock belonging to Φ ψ , and compared with the extracted hash MH j,k,l by calculating the Hamming distance. ...
doi:10.1117/12.641922
fatcat:6ya7qtggnnh35ghmfddje3bvru
StegoNPR: Information Hiding in Painterly Renderings
[article]
2013
Computer Graphics and Visual Computing
We present a novel steganographic technique for concealing information within an image. ...
This enables us to deliver a robust channel for conveying short (e.g. 30 character) strings covertly within a painterly rendering. ...
Plotting bit dropout across the channel with quantization level 4, with (a) and without (b) LBC error correction. Plotting bit errors vs. bytes encoded for the 5 test images. ...
doi:10.2312/localchapterevents.tpcg.tpcg13.065-071
dblp:conf/tpcg/LordC13
fatcat:j2yhkyqsqrcq5nsn373gixerhe
Binary Speaker Embedding
[article]
2016
arXiv
pre-print
We therefore propose an improved Hamming distance learning approach, where the hash function is learned by a variable-sized block training that projects each dimension of the original i-vectors to variable-sized ...
In this paper, we investigate binary speaker embedding, which transforms i-vectors to binary vectors (codes) by a hash function. ...
LDA can partly solve this problem, but it is the nature of the continuous representation that makes it fragile with corruptions. ...
arXiv:1510.05937v2
fatcat:chovtj7ttje6zeqtws5qxkfuhm
A Novel Video Copyright Protection Scheme Based on Blockchain and Double Watermarking
2021
Security and Communication Networks
We use the image correlation coefficient method to extract video keyframes. ...
The traditional copyright protection system has some problems, such as difficulty confirming copyright, monitoring infringement, and obtaining evidence for rights protection. ...
Moreover, it embeds the fragile watermark into the least significant bit of the image RGB color space. ...
doi:10.1155/2021/6493306
fatcat:j3e4d6sjsjaibdzlnxbymq7p3y
Steganography Techniques for Medical Images: A Recommender Paper
2023
Zenodo
Image steganography is the process of concealing secret media within any format of the transmitter. In image steganography, a cover image is used in both the embedding and extracting processes. ...
We also have presented advantages and weaknesses along with some applications i.e., LSB, PNSR, DWT, 3D images steganography. ...
ACKNOWLEDGEMENT Special thank goes to University of Okara for providing the IT services, Lab and Servers provisions for smoothly writing the manuscript. ...
doi:10.5281/zenodo.8340602
fatcat:pxi2lyiicnbwnaba7eg7tzaxwa
« Previous
Showing results 1 — 15 out of 1,105 results