Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
Filters








1,105 Hits in 4.4 sec

Improved binary feature matching through fusion of hamming distance and fragile bit weight

Dongye Zhuang, Dongming Zhang, Jintao Li, Qi Tian
2013 Proceedings of the 3rd ACM international workshop on Interactive multimedia on mobile & portable devices - IMMPD '13  
Previous research ignoring the fact that the signs of fragile bits are not stable through image transform.  ...  One bit in binary feature is deemed fragile if its sign of value reverses easily across the local image patch that has changed slightly.  ...  In mark string, fragile bits are represented with ones and the others are represented with zeros.  ... 
doi:10.1145/2505483.2505492 dblp:conf/mm/ZhuangZLT13 fatcat:ubmzb7tvnvcmlach3lg7wyrntu

Hamming Code Based Watermarking Scheme for 3D Model Verification

Jen-Tse Wang, Yi-Ching Chang, Chun-Yuan Yu, Shyr-Shen Yu
2014 Mathematical Problems in Engineering  
An adaptive watermark is generated from each cover model by using the hamming code technique. A simple least significant bit (LSB) substitution technique is employed for watermark embedding.  ...  In this paper, a public hamming code based fragile watermarking technique is proposed for 3D objects verification.  ...  There is a code with parity bits and 2 − − 1 data bits for each integer, where must satisfy ≥ 2.  ... 
doi:10.1155/2014/241093 fatcat:nlher53adzgvrc56ntug2x7olq

An Image Watermarking Method Based on Mean-Removed Vector Quantization for Multiple Purposes

Zhe-Ming Lu, Zhen Sun
2005 IAPR International Workshop on Machine Vision Applications  
Unlike the normal VQ encoder, the embedding process for each watermark bit can be performed by searching the best match codeword p r for each input residual vector under the constraints that the ke y 3  ...  Here, a small visually meaningful binary image V with siz e a×b is replicated periodically to obtain the binary fragile watermark W F with siz e A w ×B w that is large enough for embedding.  ... 
dblp:conf/mva/LuS05 fatcat:g6sczboamnb6fgdkqrbqfdxw44

Multipurpose image watermarking algorithm based on multistage vector quantization

Zhe-Ming Lu, Dian-Guo Xu, Sheng-He Sun
2005 IEEE Transactions on Image Processing  
In the proposed method, the fragile watermark and the robust watermark are embedded in mean indices and residual indices using different techniques, and both of them can be blindly extracted.  ...  Most of these algorithms are designed for only one purpose.  ...  His current research interests include data mining, information security and image processing.  ... 
doi:10.1109/tip.2005.847324 pmid:15971780 fatcat:4rpbm3wymje6dbi3cospv4qeje

A modular framework for color image watermarking

Marco Botta, Davide Cavagnino, Victor Pomponiu
2016 Signal Processing  
We present an algorithm for fragile watermarking of color, or multi-channel, images either in uncompressed format, in lossless compressed format, or in compressed format with locally compressed units (  ...  The watermark bits may be embedded with various methods, in particular the use of syndrome coding has proven flexible and effective.  ...  Werbrouck for their careful reading of this paper and their useful suggestions which greatly improved the content of this work.  ... 
doi:10.1016/j.sigpro.2015.07.018 fatcat:mat3wvn6pfa3dbtuzu4vjddt4e

Cryptanalysis of a Hamming Code and Logistic-Map based Pixel-Level Active Forgery Detection Scheme

Oussama Benrhouma
2022 International Journal of Advanced Computer Science and Applications  
In this paper, we analyze the security of a fragile watermarking scheme for tamper detection in images recently proposed by S. Prasad et al.  ...  Experimental results shows that the scheme could not withstand the attack and watermarked images were manipulated without triggering any alarm in the extraction scheme.  ...  ACKNOWLEDGMENT The authors would like to thank the deanship of research at the Islamic University of Madinah, Kingdom of Saudi Arabia for supporting this research.  ... 
doi:10.14569/ijacsa.2022.0130278 fatcat:cfhsmokonva63n4ufdobo4l5jq

Verification of iris image authenticity using fragile watermarking

A. Czajka, W. Kasprzak, A. Wilkowski
2016 Bulletin of the Polish Academy of Sciences: Technical Sciences  
Hence, it is called fragile watermarking to differentiate this method from regular watermarking that should present some robustness against image alterations.  ...  But, by using the BATH dataset comprising 32 000 iris images collected for 1 600 distinct eyes, we verify that the proposed alterations have no impact on iris recognition reliability, although statistically  ...  This can be explained by a smaller area that must be searched for the iris when the image is being segmented.  ... 
doi:10.1515/bpasts-2016-0090 fatcat:rduf3xcfere6rbl35tkde46npi

Improved embedding efficiency and AWGN robustness for SS watermarks via pre-coding

H. Oktay Altun, Orhan Bulan, Gaurav Sharma, Mark F. Bocko, Edward J. Delp III, Ping Wah Wong, Jana Dittmann, Nasir D. Memon
2008 Security, Forensics, Steganography, and Watermarking of Multimedia Contents X  
Our pre-coding method encodes p bits as a 2 p × 1 binary vector with a single nonzero entry whose index indicates the value of the embedded bits.  ...  Experimental evaluation of the method using a set theoretic embedding framework for the watermark insertion validates our analysis.  ...  Conventional LSB embedding with K bits can require an embedding (Hamming) distortion as high as K 2 bits.  ... 
doi:10.1117/12.767412 dblp:conf/sswmc/AltunB0B08 fatcat:n3r3qh7cs5forehxumkoxp7lva

Improvement of a hamming code and logistic-map based pixel-level active forgery detection scheme

Oussama Benrhouma, Faculty of Computer and Information Systems, Islamic University of Madinah, Madinah, Saudi Arabia
2022 International Journal of Advanced and Applied Sciences  
With possession of the keys watermarked images could be manipulated without being detected by the extraction scheme.  ...  We proved in a previous work that the scheme suffers from security flaws and we exploited those flaws to attack the scheme resulting in the revelation of the secret keys used in the embedding process.  ...  Acknowledgment The authors would like to thank the deanship of research at the Islamic University of Madinah for supporting this research.  ... 
doi:10.21833/ijaas.2022.09.016 fatcat:7cvkw3iugnhoropzu3wyxkxj7m

High-Capacity Reversible Data Hiding Method for JPEG Images

Chin-Cheng Chang, Ran Tang, Chia-Chen Lin, Wan-Li Lyu
2018 Journal of Software  
This paper presents a reversible data hiding method for JPEG images by combining (7, 4) the Hamming code and improving Huang et al.'s data hiding technique. Huang et al.'  ...  The experimental results show that the proposed method allows for maximum embedding capability while maintaining acceptable image quality.  ...  s HS-based RDH method [18] by combining it with (7, 4) Hamming code. The experimental results show that our RDH method has a higher embedding ability, and also provides good image quality.  ... 
doi:10.17706/jsw.13.1.1-17 fatcat:uyv5yakssjfgdbeeyvrg5oaoiq

Motion-embedded residual error for packet loss recovery of video transmission and encryption

Shih-Wei Sun, Jan-Ru Chen, Chun-Shien Lu, Pao-Chi Chang, Kuo-Chin Fan, John G. Apostolopoulos, Amir Said
2006 Visual Communications and Image Processing 2006  
This study proposes an embedded block hash searching scheme at the decoder side to achieve motion estimation and recover the lost packets, while maintaining format compliance and cryptographic provable  ...  Traditional cryptographic encryption can achieve provable security but is unfortunately sensitive to a single bit error, which will cause an unreliable packet to be dropped to create packet loss.  ...  With the search range, the block hash is extracted from each macroblock belonging to Φ ψ , and compared with the extracted hash MH j,k,l by calculating the Hamming distance.  ... 
doi:10.1117/12.641922 fatcat:6ya7qtggnnh35ghmfddje3bvru

StegoNPR: Information Hiding in Painterly Renderings [article]

Craig Lord, John Collomosse
2013 Computer Graphics and Visual Computing  
We present a novel steganographic technique for concealing information within an image.  ...  This enables us to deliver a robust channel for conveying short (e.g. 30 character) strings covertly within a painterly rendering.  ...  Plotting bit dropout across the channel with quantization level 4, with (a) and without (b) LBC error correction. Plotting bit errors vs. bytes encoded for the 5 test images.  ... 
doi:10.2312/localchapterevents.tpcg.tpcg13.065-071 dblp:conf/tpcg/LordC13 fatcat:j2yhkyqsqrcq5nsn373gixerhe

Binary Speaker Embedding [article]

Lantian Li and Dong Wang and Chao Xing and Kaimin Yu and Thomas Fang Zheng
2016 arXiv   pre-print
We therefore propose an improved Hamming distance learning approach, where the hash function is learned by a variable-sized block training that projects each dimension of the original i-vectors to variable-sized  ...  In this paper, we investigate binary speaker embedding, which transforms i-vectors to binary vectors (codes) by a hash function.  ...  LDA can partly solve this problem, but it is the nature of the continuous representation that makes it fragile with corruptions.  ... 
arXiv:1510.05937v2 fatcat:chovtj7ttje6zeqtws5qxkfuhm

A Novel Video Copyright Protection Scheme Based on Blockchain and Double Watermarking

Jingjing Zheng, Shuhua Teng, Peirong Li, Wei Ou, Donghao Zhou, Jun Ye, Honghao Gao
2021 Security and Communication Networks  
We use the image correlation coefficient method to extract video keyframes.  ...  The traditional copyright protection system has some problems, such as difficulty confirming copyright, monitoring infringement, and obtaining evidence for rights protection.  ...  Moreover, it embeds the fragile watermark into the least significant bit of the image RGB color space.  ... 
doi:10.1155/2021/6493306 fatcat:j3e4d6sjsjaibdzlnxbymq7p3y

Steganography Techniques for Medical Images: A Recommender Paper

Inam Ul Haq, Ahmad Ali, Bilal Shabbir Qaisar, Hafiz Muhammad Adnan, Mubasher Hussain, Muhammad Nauman
2023 Zenodo  
Image steganography is the process of concealing secret media within any format of the transmitter. In image steganography, a cover image is used in both the embedding and extracting processes.  ...  We also have presented advantages and weaknesses along with some applications i.e., LSB, PNSR, DWT, 3D images steganography.  ...  ACKNOWLEDGEMENT Special thank goes to University of Okara for providing the IT services, Lab and Servers provisions for smoothly writing the manuscript.  ... 
doi:10.5281/zenodo.8340602 fatcat:pxi2lyiicnbwnaba7eg7tzaxwa
« Previous Showing results 1 — 15 out of 1,105 results