Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
Filters








836 Hits in 3.8 sec

Encoded Hybrid DWT based Watermarking Scheme based on Singular Matrix Decomposition

Nikhil Nigam, Yogendra Kumar Jain
2015 International Journal of Computer Applications  
We proposed Encoded Hybrid Digital Watermarking Scheme (EHDWS) to improve image quality which is based on Discrete Wavelet Transform (DWT), Singular Value Decomposition (SVD) and Bose Chaudhuri-Hocquenghem  ...  Watermark extracting scheme is used to obtain both extracted watermark image for authentication purpose and extracted host image from watermarked image to obtain original image.  ...  multi scale for Peppers and 53.0487 db PSNR in single scale and 50.76746 db PSNR in multi scale for Baboon which is greatest among all the existing approach i.  ... 
doi:10.5120/19388-0946 fatcat:dkeerzeuszhbvkggvljcuay7ke

Joint Data Hiding-Source Coding Of Still Images

A. Baskurt, Cagatay Dikici, Khalid Idrissi
2006 Zenodo  
The hybrid scheme proposed in Fig.4 offers a wide range of multi-source coding systems.  ...  In addition to this setup, we embed a digital watermark M to the input source X with a distortion constraint between the input source and the watermarked embedded signal W such that E[(X − W ) 2 ] ≤ D  ... 
doi:10.5281/zenodo.52756 fatcat:nghzoazjwrat5c4dnzyahwftqm

Guest Editorial: Robust and Secure Data Hiding Techniques for Telemedicine Applications

Amit Kumar Singh, Basant Kumar, Sanjay Kumar Singh, Mayank Dave, Vivek Kumar Singh, Pardeep Kumar, S. P. Ghrera, Pradeep Kumar Gupta, Anand Mohan
2017 Multimedia tools and applications  
In Hybrid NSCT domain multiple watermarking for medical images (10.1007/s11042-016-3885-1).  ...  Singh et al. presents a hybrid technique of multiple watermarking for medical images using nonsubsampled contourlet transform (NSCT), discrete cosine transform (DCT), multi-resolution singular value decomposition  ...  Singh and Maheshkar present a region based hybrid medical image watermarking (MIW) technique using fusion of IWT and SVD.  ... 
doi:10.1007/s11042-017-4507-2 fatcat:cymtubngl5eiljunlbwupt22qi

Joint data hiding and source coding with partially available side information

Çağatay Dikici, Khalid Idrissi, Atilla Baskurt, Edward J. Delp III, Ping Wah Wong
2006 Security, Steganography, and Watermarking of Multimedia Contents VIII  
decoder.  ...  The setup contains the cascade of the generalized versions of CCSI and RDSI where there exists two different side information, one available only at the encoder and the other at the decoder.  ...  The hybrid scheme proposed in Fig.6 offers a wide range of multi-source coding systems.  ... 
doi:10.1117/12.643005 dblp:conf/sswmc/DikiciIB06 fatcat:r5vrop4qdfhxxepc4fhoxaf6sy

Secure hybrid robust watermarking resistant against tampering and copy attack

F. Deguillaume, S. Voloshynovskiy, T. Pun
2003 Signal Processing  
In this paper, we propose a hybrid watermarking method joining a robust and a fragile or semi-fragile watermark, and thus combining copyright protection and tamper prooÿng.  ...  In addition, the fragile information is inserted in a way which preserves robustness and reliability of the robust part.  ...  Herrigel and Y. Rytsar (DCT), M. Kutter and F. Jordan (AlpVision), F. Perez-Gonzalez and F.  ... 
doi:10.1016/s0165-1684(03)00172-5 fatcat:w6f3zromybhvtkoqkpbvf7mgfu

SECURITY TECHNIQUE BASED ON WATERMARKING AND CHAOTIC ENCRYPTION FOR DIGITAL IMAGE

Faten H. Mohammed Sediq Al-Kadei
2021 Journal of Southwest Jiaotong University  
The original picture, the watermark photo, can be recovered and decoded using the permitted techniques.  ...  This research proposed a hybrid encoding approach with watermark embedding that provides excellent security.  ...  in the cover image and shows the encrypted cover image, encrypted cover image Histogram, and decode the en-cover image; (d) extracts and decode the watermark image CHUANG, C.  ... 
doi:10.35741/issn.0258-2724.56.4.33 fatcat:gpoiy5s6w5dylihbolog3awwqy

Cross-Attention Watermarking of Large Language Models [article]

Folco Bertini Baldassini, Huy H. Nguyen, Ching-Chung Chang, Isao Echizen
2024 arXiv   pre-print
Exploration of different training strategies for optimizing the watermarking and of the challenges and implications of applying this approach in real-world scenarios clarified the tradeoff between watermark  ...  robustness and text quality.  ...  These pooled features are passed through a multi-layer perceptron, and a binary vector is extracted.  ... 
arXiv:2401.06829v1 fatcat:uazjtjwcbfah5l6dln5xsnecdy

Increasing watermarking robustness using turbo codes

Corina Nafornita, Alexandru Isar, Maria Kovaci
2009 2009 IEEE International Symposium on Intelligent Signal Processing  
of the turbo coded watermark from the watermarked, possibly corrupted image, and turbo decoding of the watermark.  ...  In this paper we present a watermarking system that uses the biorthogonal discrete wavelet transform, DWT and the message is encoded before embedding.  ...  Hybrid techniques, based on compression schemes, embed the watermark using a thresholding scheme and variable strength [6] .  ... 
doi:10.1109/wisp.2009.5286535 fatcat:5yfaph3n3rce7d5tucpslskdhy

Watermarking in halftone images with parity-matched error diffusion

Jing-Ming Guo, Soo-Chang Pei, Hua Lee
2011 Signal Processing  
In this paper, a halftone watermarking technique of high watermark rate, robustness, and watermark-rate flexibility is presented.  ...  image as the reference for the decoding.  ...  hybrid pixel-based data hiding and block-based watermarking [19] .  ... 
doi:10.1016/j.sigpro.2010.06.017 fatcat:buayvmjclzcu5iggcxiz7u3jn4

Watermarking techniques for electronic delivery of remote sensing images

Franco Bartolini
2002 Optical Engineering: The Journal of SPIE  
An overview of watermarking is given, and the requirements, imposed by the remote sensing scenario on watermarking techniques, are discussed.  ...  As an example, the effect of watermarking on image classification is analyzed.  ...  rescanning, noise addition, and, to a limited extent, geometric manipulations.  ... 
doi:10.1117/1.1496787 fatcat:jn2lcoo2lzf6zlrtrdo5ni6ini

Damaged Watermarks Detection in Frequency Domain as a Primary Method for Video Concealment

Robert Hudec, Martin Bojmir, Miroslav Benco
2011 Advances in Electrical and Electronic Engineering  
The modified algorithm based on the detection and filtration of damaged watermark blocks encapsulated to the transmitted video was developed.  ...  At the beginning, three main groups of video concealment methods, divided by encoder/decoder collaboration, are briefly described.  ...  Hybrid Method of Video Concealment The hybrid method utilizes spatial and temporal redundancy in video signal.  ... 
doi:10.15598/aeee.v9i5.540 fatcat:yrrpxnajhjazfo72mrkhbl5uhm

Survey of Bio-inspired Computing for Information Hiding

Hsiang-Cheh Huang, Feng-Cheng Chang, Yueh-Hong Chen, Shu-Chuan Chu
2015 Journal of Information Hiding and Multimedia Signal Processing  
The applications of bio-inspired optimization for information hiding or watermarking have emerged in early 2000's.  ...  Due to the flexibility of algorithm designs, parameter selections, and performance metrics, the uses of bio-inspired optimization techniques provide effective solutions for information hiding.  ...  At the other end, the watermark is either extracted by a decoder, illustrated in Fig. 2(b ). In addition to the test media (X), the original media and/or a key may be needed.  ... 
dblp:journals/jihmsp/HuangCCC15 fatcat:2vi6spsmhze3pafz5efahbol44

A VIDEO WATERMARKING ALGORITHM BASED ON TURBO CODES IN THE MULTI-TRANSFORM DOMAIN

Gaoyan Lv, Yongping Zhang, Fanzhi Kong, Zhongkun He
2014 ICTACT Journal on Image and Video Processing  
In this work, a robust watermarking algorithm is presented for video copyright protection. The algorithm is based on hybrid transforms using the combination of DWT and DCT.  ...  Following that, the watermark information which is sorted by the pseudo-random and encoded by Turbo codes is embedded into the DCT domain.  ...  Sixthly, the extracted watermark sequence is decoded by Turbo code decoder and scrambled pseudo random inversely by pseudo random to get the original watermark.  ... 
doi:10.21917/ijivp.2014.0127 fatcat:d54dgcvyfzhc5asykdpqv7im74

INFORMATION-THEORETIC DATA-HIDING: RECENT ACHIEVEMENTS AND OPEN PROBLEMS

SVIATOSLAV VOLOSHYNOVSKIY, FREDERIC DEGUILLAUME, OLEKSIY KOVAL, THIERRY PUN
2005 International Journal of Image and Graphics  
Finally, we demonstrate the possible extensions of this theory for watermark-assisted multimedia processing and indicate its perspectives for distributed communications.  ...  In particular, Gel'fand-Pinsker channel coding with side information at the encoder and Wyner-Ziv source coding with side information at the decoder are used for this purpose.  ...  The authors are thankful to Yuriy Rytsar for many helpful and interesting discussions.  ... 
doi:10.1142/s0219467805001641 fatcat:fwt723y6znaoportlfewwvgdly

A Survey on Robust Video Watermarking Algorithms for Copyright Protection

Xiaoyan Yu, Chengyou Wang, Xiao Zhou
2018 Applied Sciences  
Basic models and properties of video watermarking algorithms are described, and the evaluation indexes corresponding to each property are also introduced.  ...  In this paper, we review robust video watermarking algorithms for copyright protection based on original videos and compressed videos.  ...  algorithms in hybrid domain.  ... 
doi:10.3390/app8101891 fatcat:qctjt6d5jfeh3e7k2cwrmmyste
« Previous Showing results 1 — 15 out of 836 results