Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
Filters








22,179 Hits in 0.92 sec

Maximum-Likelihood Estimation of Recording Position Based on Audio Watermarking

Yuta Nakashima, Ryuki Tachibana, Noboru Babaguchi
2007 Third International Conference on Intelligent Information Hiding and Multimedia Signal Processing (IIH-MSP 2007)  
The error model is constructed based on watermarking strengths, which are calculated by a watermark detection algorithm.  ...  In this paper, we propose a maximum-likelihood method for estimating a recording position inside several loudspeakers as a brand-new application of digital audio watermarking, which could be useful for  ...  The system which we have proposed in [3, 4] estimates the position based on time of arrival (TOA) of watermarking signals.  ... 
doi:10.1109/iih-msp.2007.221 dblp:conf/iih-msp/NakashimaTB07 fatcat:ig222twidzhdnbpmknncmxbsqu

Robust Digital Watermarking for High-definition Video using Steerable Pyramid Transform, Two Dimensional Fast Fourier Transform and Ensemble Position-based Error Correcting

2018 KSII Transactions on Internet and Information Systems  
Thus, we use an ensemble position-based error correcting algorithm to estimate the errors and correct them.  ...  A secret key is used to generate a matrix of random numbers for the security of watermark information. The matrix is transformed by inverse steerable pyramid transform (SPT).  ...  Ensemble Position-based Error Correcting The EPbEC algorithm uses binary positions of data to correct errors.  ... 
doi:10.3837/tiis.2018.07.024 fatcat:z3gcshyk3nblhl2xb3tjvyscqi

Informed position based watermarking

P.V.K. Borges, J. Mayer
Proceedings. 17th Brazilian Symposium on Computer Graphics and Image Processing  
In contrast, in position based watermarking, the information is given by the watermark position in the image.  ...  In this work we propose improvements to the preliminary investigation on position based watermarking [7] by proposing an informed insertion approach.  ...  This is the main advantage and motivation behind position based watermarking (PBW).  ... 
doi:10.1109/sibgra.2004.1352941 dblp:conf/sibgrapi/ViniciusBM04 fatcat:zykqc7w22zdfzeizunvqs42qgi

Research on Anti-counterfeiting Technology Based on QR Code image Watermarking Algorithm

De Li, XueLi Gao, YuChao Sun, LiHua Cui
2017 International Journal of Multimedia and Ubiquitous Engineering  
In this paper, a new anti-counterfeiting scheme and a high robustness digital watermarking algorithm based on DWT and SVD were proposed.  ...  In order to achieve the purpose of anti-counterfeiting, we could verify its authenticity by checking watermark information and scanning information.  ...  Afterwards we obtained watermark information through watermark detection tools, and got the information contained in QR code by two-dimensional bar code scanning tools.  ... 
doi:10.14257/ijmue.2017.12.5.05 fatcat:jofpec2gt5d3jbttib6wfcmkcq

Research of Multiple Text Watermarks Technique in Electric Power System Texts

Xiao-Xi XING, Qing CHEN, Lian-Xi FU
2013 Sensors & Transducers  
Aiming at the reliable transmission security problems of electric power system texts, multiple text watermarking algorithm is first applied into protecting it.  ...  The experiments show that multiple text watermarking algorithm can protect the data effectively aiming at different purpose which achieves its application value.  ...  And watermarking information can be detected and extracted correctly. 2) Attack based on the content.  ... 
doaj:a38680b71ddb49bda4e9e4b3548c0511 fatcat:oiwoumfutzhvnevml4626hmwjy

Robust Watermarking Algorithm for Building Information Modeling Based on Element Perturbation and Invisible Characters

Qianwen Zhou, Changqing Zhu, Na Ren
2023 Applied Sciences  
Then, the watermark information after dislocation is embedded into the data.  ...  Taking into consideration both data availability and the need for watermark invisibility, the algorithm classifies the BIM elements based on their mobility, and perturbs the movable elements while embedding  ...  Informed Consent Statement: Not applicable. Acknowledgments: The authors would like to sincerely thank all the groups that provided data and support for this study.  ... 
doi:10.3390/app132312957 fatcat:tmji37v73zfonjln6afs6t5uwq

Hop Horse-Image Authentication Scheme

Mona A. M. Fouad, Ahmed Mokhtar A. Mansour
2015 International Journal of Multimedia and Ubiquitous Engineering  
The watermark information is generated automatically from the input data and hidden into the Least Significant Bits (LSBs) of specified pixels according to innovative criteria.  ...  The hidden watermark is completely invisible, achieving Peak Signal to Noise Ratio (PSNR) more than 67 decibels (dB) for grayscale images that vary in size and content.  ...  Watermarking: Information Hiding After generating the watermark information, the positions of the pixel that corresponds to the watermark array elements are realized.  ... 
doi:10.14257/ijmue.2015.10.5.08 fatcat:tolqowxjorhijf6ig5jrwi4g2y

Research on Lossless Digital Watermarking Technology of Electronic Chart

Yun-han WANG, Zi-ning YAN, Liang KOU
2017 DEStech Transactions on Computer Science and Engineering  
A framework model of lossless digital watermarking based on the content feature of the electronic chart is put forward in the paper, as well as a zero-bit dynamical extension technology based on the gradient  ...  Based on an in-depth analysis of the content feature of the S-57 electronic chart, the lossless digital watermarking technology is concretized.  ...  When the digital watermark information is extracted, the embedded watermark information can be obtained based on the cipher code key, and meanwhile, the back-up copy of the watermark information can be  ... 
doi:10.12783/dtcse/cece2017/14573 fatcat:xolhfkmgxbg3bow7ymuet3h74e

Image Watermark Similarity Calculation of GIS Vector Data

Sha-Sha Li, Wei Zhou, An-Bo Li
2012 Procedia Engineering  
This paper based on these focused research: the extracted watermark's position correction methods on the basis of the original watermark; the non-equal length strings similarity calculation methods, formed  ...  In recent years, digital watermarking is playing an increasingly important role in the geographical information copyright protection.  ...  This paper based on these focused research: the extracted watermark's position correction methods on the basis of the original watermark; the non-equal length strings similarity calculation methods, formed  ... 
doi:10.1016/j.proeng.2012.01.136 fatcat:bw5kaptib5dlva5dmtsqkqa3im

Quantum Steganography Application in the Electrical Network for Quantum Image and Watermark with Self-Adaptive

Jie Shen, Wenqi Dong, Jing Wang, Yang Wang, Haiyan Li
2021 Journal of Information Hiding and Privacy Protection  
A novel quantum watermark algorithm is proposed in the paper, based on the shared group key value of the communication parties and the transmission of the selected carrier map pixel gray higher than 8  ...  Based on secure quantum communication protocol, and flexible steganography, secret information is embedded in quantum images in covert communication.  ...  Based on the secret key, the secret information which should be embedded in the corresponding position of the quantum image carrier is embedded by embedder.  ... 
doi:10.32604/jihpp.2021.025602 fatcat:24nxvsf2b5ccpfq7xnftrlrjgi

Extension of Structural Watermarks Based on Balanced Incomplete Block Designs

Zhi-Fang Yang, Po-Chen Lee, Wei-Hung Chen, Jia-Guu Leu
2011 Journal of Information Hiding and Multimedia Signal Processing  
Experimental results show the properties of the proposed watermarks based on true positive and false positive rates under Gaussian noise.  ...  The corresponding recognition rules for the new set of watermarks are designed based on the structure information contained.  ...  The goal is to obtain a large number of BIBD-based watermarks which still keep the structural information of BIBD.  ... 
dblp:journals/jihmsp/YangLCL11 fatcat:caxcd6xrm5fv7j7adczn3tu6fq

Digital Watermarking Algorithm for Tampering Localization

Q. Chen, P.P. Xie, Y.Z. Hao
2017 DEStech Transactions on Engineering and Technology Research  
In this paper, a novel reversible data embedding based on Integer Wavelet Transform for tamper-proof watermarks is proposed.  ...  Otherwise, the tampered positions can be localized explicitly and directly in the reconstructed host image even if the watermarked image was attacked by an invisible tampering.  ...  The overhead information like location map, position or side information are embedded or needed; what is more, all of them are not capable to localize the tampered area.  ... 
doi:10.12783/dtetr/mcemic2016/9509 fatcat:npnqdwmxmrgjned5xeb6frk7ty

TDCM: An IP watermarking algorithm based on two dimensional chaotic mapping

Wei Liang, Keshou Wu, Yong Xie, Jiajun Duan
2015 Computer Science and Information Systems  
The first dimensional sequence is used to determine random watermark positions and the second dimensional sequence is to control watermark number in each position.  ...  The resistance to attacks and robustness of the watermark are encouraging as well.  ...  As secret key is employed to control the position where IP watermark information is embedded in real time, design of its sequence directly determines the concealment of watermark position.  ... 
doi:10.2298/csis141017028l fatcat:hmeksbedanavlf2bt2yq3c5f7e

A digital watermarking approach based on DCT domain combining QR code and chaotic theory

Qingbo Kang, Ke Li, Jichun Yang
2014 2014 Eleventh International Conference on Wireless and Optical Communications Networks (WOCN)  
This paper proposes a robust watermarking approach based on Discrete Cosine Transform domain that combines Quick Response Code and chaotic system.  ...  Figure 5 (a), shows the original carrier image the image after block based Arnold scrambling is shown in Figure 5 The original QR Code image which content is the text watermark information is shown  ...  The Proposed Approach Currently the digital watermarking approaches can be divided into two categories: the spatial domain based and the transform domain based.  ... 
doi:10.1109/wocn.2014.6923098 dblp:conf/wocn/KangLY14 fatcat:5l3jj2rw5jdkfhaccay2ldr76a

Medical Image Verification Watermarking for Healthcare Information Management

Un-Sook Choi, Suk-Hwan Lee, Ki-Ryong Kwon
2017 Journal of multimedia information system  
Anand et al. [3] proposed a watermarking method that puts data between medical images for watermarking of medical images.  ...  As a result, we can computerize and manage the medical images, related clinical information, and ADT effectively through the nexus between PACS and HIS (hospital information system) [1-2].  ...  The position information of the LSB corresponds to the lowest bit finds the copyrighter's position by a school logo.  ... 
doi:10.9717/jmis.2017.4.4.205 dblp:journals/jmmis/ChoiLK17 fatcat:q4iqga3frfbtldjpr5t57irnd4
« Previous Showing results 1 — 15 out of 22,179 results