A copy of this work was available on the public web and has been preserved in the Wayback Machine. The capture dates from 2018; you can also visit the original URL.
The file type is application/pdf
.
Filters
Encoded Hybrid DWT based Watermarking Scheme based on Singular Matrix Decomposition
2015
International Journal of Computer Applications
We proposed Encoded Hybrid Digital Watermarking Scheme (EHDWS) to improve image quality which is based on Discrete Wavelet Transform (DWT), Singular Value Decomposition (SVD) and Bose Chaudhuri-Hocquenghem ...
Watermark extracting scheme is used to obtain both extracted watermark image for authentication purpose and extracted host image from watermarked image to obtain original image. ...
multi scale for Peppers and 53.0487
db PSNR in single scale and 50.76746 db PSNR in multi scale
for Baboon which is greatest among all the existing approach i. ...
doi:10.5120/19388-0946
fatcat:dkeerzeuszhbvkggvljcuay7ke
Joint Data Hiding-Source Coding Of Still Images
2006
Zenodo
The hybrid scheme proposed in Fig.4 offers a wide range of multi-source coding systems. ...
In addition to this setup, we embed a digital watermark M to the input source X with a distortion constraint between the input source and the watermarked embedded signal W such that E[(X − W ) 2 ] ≤ D ...
doi:10.5281/zenodo.52756
fatcat:nghzoazjwrat5c4dnzyahwftqm
Guest Editorial: Robust and Secure Data Hiding Techniques for Telemedicine Applications
2017
Multimedia tools and applications
In Hybrid NSCT domain multiple watermarking for medical images (10.1007/s11042-016-3885-1). ...
Singh et al. presents a hybrid technique of multiple watermarking for medical images using nonsubsampled contourlet transform (NSCT), discrete cosine transform (DCT), multi-resolution singular value decomposition ...
Singh and Maheshkar present a region based hybrid medical image watermarking (MIW) technique using fusion of IWT and SVD. ...
doi:10.1007/s11042-017-4507-2
fatcat:cymtubngl5eiljunlbwupt22qi
Joint data hiding and source coding with partially available side information
2006
Security, Steganography, and Watermarking of Multimedia Contents VIII
decoder. ...
The setup contains the cascade of the generalized versions of CCSI and RDSI where there exists two different side information, one available only at the encoder and the other at the decoder. ...
The hybrid scheme proposed in Fig.6 offers a wide range of multi-source coding systems. ...
doi:10.1117/12.643005
dblp:conf/sswmc/DikiciIB06
fatcat:r5vrop4qdfhxxepc4fhoxaf6sy
Secure hybrid robust watermarking resistant against tampering and copy attack
2003
Signal Processing
In this paper, we propose a hybrid watermarking method joining a robust and a fragile or semi-fragile watermark, and thus combining copyright protection and tamper prooÿng. ...
In addition, the fragile information is inserted in a way which preserves robustness and reliability of the robust part. ...
Herrigel and Y. Rytsar (DCT), M. Kutter and F. Jordan (AlpVision), F. Perez-Gonzalez and F. ...
doi:10.1016/s0165-1684(03)00172-5
fatcat:w6f3zromybhvtkoqkpbvf7mgfu
SECURITY TECHNIQUE BASED ON WATERMARKING AND CHAOTIC ENCRYPTION FOR DIGITAL IMAGE
2021
Journal of Southwest Jiaotong University
The original picture, the watermark photo, can be recovered and decoded using the permitted techniques. ...
This research proposed a hybrid encoding approach with watermark embedding that provides excellent security. ...
in the cover image and shows the encrypted cover image, encrypted cover image Histogram, and decode the en-cover image; (d) extracts and decode the watermark image
CHUANG, C. ...
doi:10.35741/issn.0258-2724.56.4.33
fatcat:gpoiy5s6w5dylihbolog3awwqy
Cross-Attention Watermarking of Large Language Models
[article]
2024
arXiv
pre-print
Exploration of different training strategies for optimizing the watermarking and of the challenges and implications of applying this approach in real-world scenarios clarified the tradeoff between watermark ...
robustness and text quality. ...
These pooled features are passed through a multi-layer perceptron, and a binary vector is extracted. ...
arXiv:2401.06829v1
fatcat:uazjtjwcbfah5l6dln5xsnecdy
Increasing watermarking robustness using turbo codes
2009
2009 IEEE International Symposium on Intelligent Signal Processing
of the turbo coded watermark from the watermarked, possibly corrupted image, and turbo decoding of the watermark. ...
In this paper we present a watermarking system that uses the biorthogonal discrete wavelet transform, DWT and the message is encoded before embedding. ...
Hybrid techniques, based on compression schemes, embed the watermark using a thresholding scheme and variable strength [6] . ...
doi:10.1109/wisp.2009.5286535
fatcat:5yfaph3n3rce7d5tucpslskdhy
Watermarking in halftone images with parity-matched error diffusion
2011
Signal Processing
In this paper, a halftone watermarking technique of high watermark rate, robustness, and watermark-rate flexibility is presented. ...
image as the reference for the decoding. ...
hybrid pixel-based data hiding and block-based watermarking [19] . ...
doi:10.1016/j.sigpro.2010.06.017
fatcat:buayvmjclzcu5iggcxiz7u3jn4
Watermarking techniques for electronic delivery of remote sensing images
2002
Optical Engineering: The Journal of SPIE
An overview of watermarking is given, and the requirements, imposed by the remote sensing scenario on watermarking techniques, are discussed. ...
As an example, the effect of watermarking on image classification is analyzed. ...
rescanning, noise addition, and, to a limited extent, geometric manipulations. ...
doi:10.1117/1.1496787
fatcat:jn2lcoo2lzf6zlrtrdo5ni6ini
Damaged Watermarks Detection in Frequency Domain as a Primary Method for Video Concealment
2011
Advances in Electrical and Electronic Engineering
The modified algorithm based on the detection and filtration of damaged watermark blocks encapsulated to the transmitted video was developed. ...
At the beginning, three main groups of video concealment methods, divided by encoder/decoder collaboration, are briefly described. ...
Hybrid Method of Video Concealment The hybrid method utilizes spatial and temporal redundancy in video signal. ...
doi:10.15598/aeee.v9i5.540
fatcat:yrrpxnajhjazfo72mrkhbl5uhm
Survey of Bio-inspired Computing for Information Hiding
2015
Journal of Information Hiding and Multimedia Signal Processing
The applications of bio-inspired optimization for information hiding or watermarking have emerged in early 2000's. ...
Due to the flexibility of algorithm designs, parameter selections, and performance metrics, the uses of bio-inspired optimization techniques provide effective solutions for information hiding. ...
At the other end, the watermark is either extracted by a decoder, illustrated in Fig. 2(b ). In addition to the test media (X), the original media and/or a key may be needed. ...
dblp:journals/jihmsp/HuangCCC15
fatcat:2vi6spsmhze3pafz5efahbol44
A VIDEO WATERMARKING ALGORITHM BASED ON TURBO CODES IN THE MULTI-TRANSFORM DOMAIN
2014
ICTACT Journal on Image and Video Processing
In this work, a robust watermarking algorithm is presented for video copyright protection. The algorithm is based on hybrid transforms using the combination of DWT and DCT. ...
Following that, the watermark information which is sorted by the pseudo-random and encoded by Turbo codes is embedded into the DCT domain. ...
Sixthly, the extracted watermark sequence is decoded by Turbo code decoder and scrambled pseudo random inversely by pseudo random to get the original watermark. ...
doi:10.21917/ijivp.2014.0127
fatcat:d54dgcvyfzhc5asykdpqv7im74
INFORMATION-THEORETIC DATA-HIDING: RECENT ACHIEVEMENTS AND OPEN PROBLEMS
2005
International Journal of Image and Graphics
Finally, we demonstrate the possible extensions of this theory for watermark-assisted multimedia processing and indicate its perspectives for distributed communications. ...
In particular, Gel'fand-Pinsker channel coding with side information at the encoder and Wyner-Ziv source coding with side information at the decoder are used for this purpose. ...
The authors are thankful to Yuriy Rytsar for many helpful and interesting discussions. ...
doi:10.1142/s0219467805001641
fatcat:fwt723y6znaoportlfewwvgdly
A Survey on Robust Video Watermarking Algorithms for Copyright Protection
2018
Applied Sciences
Basic models and properties of video watermarking algorithms are described, and the evaluation indexes corresponding to each property are also introduced. ...
In this paper, we review robust video watermarking algorithms for copyright protection based on original videos and compressed videos. ...
algorithms in hybrid domain. ...
doi:10.3390/app8101891
fatcat:qctjt6d5jfeh3e7k2cwrmmyste
« Previous
Showing results 1 — 15 out of 836 results