A copy of this work was available on the public web and has been preserved in the Wayback Machine. The capture dates from 2018; you can also visit the original URL.
The file type is application/pdf
.
Filters
Maximum-Likelihood Estimation of Recording Position Based on Audio Watermarking
2007
Third International Conference on Intelligent Information Hiding and Multimedia Signal Processing (IIH-MSP 2007)
The error model is constructed based on watermarking strengths, which are calculated by a watermark detection algorithm. ...
In this paper, we propose a maximum-likelihood method for estimating a recording position inside several loudspeakers as a brand-new application of digital audio watermarking, which could be useful for ...
The system which we have proposed in [3, 4] estimates the position based on time of arrival (TOA) of watermarking signals. ...
doi:10.1109/iih-msp.2007.221
dblp:conf/iih-msp/NakashimaTB07
fatcat:ig222twidzhdnbpmknncmxbsqu
Robust Digital Watermarking for High-definition Video using Steerable Pyramid Transform, Two Dimensional Fast Fourier Transform and Ensemble Position-based Error Correcting
2018
KSII Transactions on Internet and Information Systems
Thus, we use an ensemble position-based error correcting algorithm to estimate the errors and correct them. ...
A secret key is used to generate a matrix of random numbers for the security of watermark information. The matrix is transformed by inverse steerable pyramid transform (SPT). ...
Ensemble Position-based Error Correcting The EPbEC algorithm uses binary positions of data to correct errors. ...
doi:10.3837/tiis.2018.07.024
fatcat:z3gcshyk3nblhl2xb3tjvyscqi
Informed position based watermarking
Proceedings. 17th Brazilian Symposium on Computer Graphics and Image Processing
In contrast, in position based watermarking, the information is given by the watermark position in the image. ...
In this work we propose improvements to the preliminary investigation on position based watermarking [7] by proposing an informed insertion approach. ...
This is the main advantage and motivation behind position based watermarking (PBW). ...
doi:10.1109/sibgra.2004.1352941
dblp:conf/sibgrapi/ViniciusBM04
fatcat:zykqc7w22zdfzeizunvqs42qgi
Research on Anti-counterfeiting Technology Based on QR Code image Watermarking Algorithm
2017
International Journal of Multimedia and Ubiquitous Engineering
In this paper, a new anti-counterfeiting scheme and a high robustness digital watermarking algorithm based on DWT and SVD were proposed. ...
In order to achieve the purpose of anti-counterfeiting, we could verify its authenticity by checking watermark information and scanning information. ...
Afterwards we obtained watermark information through watermark detection tools, and got the information contained in QR code by two-dimensional bar code scanning tools. ...
doi:10.14257/ijmue.2017.12.5.05
fatcat:jofpec2gt5d3jbttib6wfcmkcq
Research of Multiple Text Watermarks Technique in Electric Power System Texts
2013
Sensors & Transducers
Aiming at the reliable transmission security problems of electric power system texts, multiple text watermarking algorithm is first applied into protecting it. ...
The experiments show that multiple text watermarking algorithm can protect the data effectively aiming at different purpose which achieves its application value. ...
And watermarking information can be detected and extracted correctly. 2) Attack based on the content. ...
doaj:a38680b71ddb49bda4e9e4b3548c0511
fatcat:oiwoumfutzhvnevml4626hmwjy
Robust Watermarking Algorithm for Building Information Modeling Based on Element Perturbation and Invisible Characters
2023
Applied Sciences
Then, the watermark information after dislocation is embedded into the data. ...
Taking into consideration both data availability and the need for watermark invisibility, the algorithm classifies the BIM elements based on their mobility, and perturbs the movable elements while embedding ...
Informed Consent Statement: Not applicable. Acknowledgments: The authors would like to sincerely thank all the groups that provided data and support for this study. ...
doi:10.3390/app132312957
fatcat:tmji37v73zfonjln6afs6t5uwq
Hop Horse-Image Authentication Scheme
2015
International Journal of Multimedia and Ubiquitous Engineering
The watermark information is generated automatically from the input data and hidden into the Least Significant Bits (LSBs) of specified pixels according to innovative criteria. ...
The hidden watermark is completely invisible, achieving Peak Signal to Noise Ratio (PSNR) more than 67 decibels (dB) for grayscale images that vary in size and content. ...
Watermarking: Information Hiding After generating the watermark information, the positions of the pixel that corresponds to the watermark array elements are realized. ...
doi:10.14257/ijmue.2015.10.5.08
fatcat:tolqowxjorhijf6ig5jrwi4g2y
Research on Lossless Digital Watermarking Technology of Electronic Chart
2017
DEStech Transactions on Computer Science and Engineering
A framework model of lossless digital watermarking based on the content feature of the electronic chart is put forward in the paper, as well as a zero-bit dynamical extension technology based on the gradient ...
Based on an in-depth analysis of the content feature of the S-57 electronic chart, the lossless digital watermarking technology is concretized. ...
When the digital watermark information is extracted, the embedded watermark information can be obtained based on the cipher code key, and meanwhile, the back-up copy of the watermark information can be ...
doi:10.12783/dtcse/cece2017/14573
fatcat:xolhfkmgxbg3bow7ymuet3h74e
Image Watermark Similarity Calculation of GIS Vector Data
2012
Procedia Engineering
This paper based on these focused research: the extracted watermark's position correction methods on the basis of the original watermark; the non-equal length strings similarity calculation methods, formed ...
In recent years, digital watermarking is playing an increasingly important role in the geographical information copyright protection. ...
This paper based on these focused research: the extracted watermark's position correction methods on the basis of the original watermark; the non-equal length strings similarity calculation methods, formed ...
doi:10.1016/j.proeng.2012.01.136
fatcat:bw5kaptib5dlva5dmtsqkqa3im
Quantum Steganography Application in the Electrical Network for Quantum Image and Watermark with Self-Adaptive
2021
Journal of Information Hiding and Privacy Protection
A novel quantum watermark algorithm is proposed in the paper, based on the shared group key value of the communication parties and the transmission of the selected carrier map pixel gray higher than 8 ...
Based on secure quantum communication protocol, and flexible steganography, secret information is embedded in quantum images in covert communication. ...
Based on the secret key, the secret information which should be embedded in the corresponding position of the quantum image carrier is embedded by embedder. ...
doi:10.32604/jihpp.2021.025602
fatcat:24nxvsf2b5ccpfq7xnftrlrjgi
Extension of Structural Watermarks Based on Balanced Incomplete Block Designs
2011
Journal of Information Hiding and Multimedia Signal Processing
Experimental results show the properties of the proposed watermarks based on true positive and false positive rates under Gaussian noise. ...
The corresponding recognition rules for the new set of watermarks are designed based on the structure information contained. ...
The goal is to obtain a large number of BIBD-based watermarks which still keep the structural information of BIBD. ...
dblp:journals/jihmsp/YangLCL11
fatcat:caxcd6xrm5fv7j7adczn3tu6fq
Digital Watermarking Algorithm for Tampering Localization
2017
DEStech Transactions on Engineering and Technology Research
In this paper, a novel reversible data embedding based on Integer Wavelet Transform for tamper-proof watermarks is proposed. ...
Otherwise, the tampered positions can be localized explicitly and directly in the reconstructed host image even if the watermarked image was attacked by an invisible tampering. ...
The overhead information like location map, position or side information are embedded or needed; what is more, all of them are not capable to localize the tampered area. ...
doi:10.12783/dtetr/mcemic2016/9509
fatcat:npnqdwmxmrgjned5xeb6frk7ty
TDCM: An IP watermarking algorithm based on two dimensional chaotic mapping
2015
Computer Science and Information Systems
The first dimensional sequence is used to determine random watermark positions and the second dimensional sequence is to control watermark number in each position. ...
The resistance to attacks and robustness of the watermark are encouraging as well. ...
As secret key is employed to control the position where IP watermark information is embedded in real time, design of its sequence directly determines the concealment of watermark position. ...
doi:10.2298/csis141017028l
fatcat:hmeksbedanavlf2bt2yq3c5f7e
A digital watermarking approach based on DCT domain combining QR code and chaotic theory
2014
2014 Eleventh International Conference on Wireless and Optical Communications Networks (WOCN)
This paper proposes a robust watermarking approach based on Discrete Cosine Transform domain that combines Quick Response Code and chaotic system. ...
Figure 5 (a), shows the original carrier image the image after block based Arnold scrambling is shown in Figure 5 The original QR Code image which content is the text watermark information is shown ...
The Proposed Approach Currently the digital watermarking approaches can be divided into two categories: the spatial domain based and the transform domain based. ...
doi:10.1109/wocn.2014.6923098
dblp:conf/wocn/KangLY14
fatcat:5l3jj2rw5jdkfhaccay2ldr76a
Medical Image Verification Watermarking for Healthcare Information Management
2017
Journal of multimedia information system
Anand et al. [3] proposed a watermarking method that puts data between medical images for watermarking of medical images. ...
As a result, we can computerize and manage the medical images, related clinical information, and ADT effectively through the nexus between PACS and HIS (hospital information system) [1-2]. ...
The position information of the LSB corresponds to the lowest bit finds the copyrighter's position by a school logo. ...
doi:10.9717/jmis.2017.4.4.205
dblp:journals/jmmis/ChoiLK17
fatcat:q4iqga3frfbtldjpr5t57irnd4
« Previous
Showing results 1 — 15 out of 22,179 results