A copy of this work was available on the public web and has been preserved in the Wayback Machine. The capture dates from 2006; you can also visit the original URL.
The file type is application/pdf
.
Filters
WATERMARKING USING DECIMAL SEQUENCES
2005
Cryptologia
This paper introduces the use of decimal sequences in a code division multiple access (CDMA) based watermarking system to hide information for authentication in black and white images. ...
The advantage of using d-sequences over PN sequences is that one can choose from a variety of prime numbers which provides a more flexible system. ...
CONCLUSIONS This paper presents techniques of watermarking using decimal sequences. ...
doi:10.1080/0161-110591893762
fatcat:dgpd76zstnaklhlhu7i4vzbniq
Decimal Sequence based Imperceptible Audio Watermarking
2012
International Journal of Computer Applications
The main objective of this paper is to development of an audio watermarking algorithm which obtain high watermark data rate and high quality of audio at the same time General Terms Decimal Sequence, Audio ...
Watermarking. ...
Decimal sequences can be used for rational and irrational numbers to generatepseudorandom noise sequences. ...
doi:10.5120/7178-9838
fatcat:x5tfdizt5ffjfedjwgdxkkcfkm
Augmented Watermarking
2006
Cryptologia
The receiver first detects the watermark, computes the random sequence for which the watermark serves as the seed, and then subtracts out this random sequence. ...
We introduce the concept of augmented watermarking in which in addition to the hidden watermark placed within the image an explicit watermark-dependent random sequence (noise) is added to it. ...
Figure 5 presents the various steps for augmented watermarking using decimal sequences; the results for PN sequences are similar. ...
doi:10.1080/01611190500541824
fatcat:jsafdi35yzcidecphwlxov7tsy
Logo Steganography Using Digital Watermarking
2015
IJARCCE
With appropriate alterations to the embedding and extraction methods, we can encapsulate logo watermark in the image by the use of watermark embedder. ...
In this paper, we systematically review proposed attacks on watermarks. We use enlightened watermark detector which can extract the watermark even in the presence of geometric attacks. ...
Different algorithms for the use of decimal sequences have been formulated for use in black and white images. ...
doi:10.17148/ijarcce.2015.43126
fatcat:onoz6whl5vgcxe2lxujopg55qm
A reversible watermarking for DNA sequence using an adaptive least square prediction error expansion
2020
Nonlinear Theory and Its Applications IEICE
In this paper, we address a reversible watermarking method for noncoding DNA sequences using an adaptive prediction error expansion based on least square predictor. ...
In particular, there is a need for a reversible DNA watermarking technology capable of DNA storage and forgery prevention of DNA sequence, and analyzing biological mutation processes by watermark while ...
This method converts a binary base sequence into a decimal number in 2-bit units as Chen's method, and then obtains a histogram of the decimal sequence. ...
doi:10.1587/nolta.11.2
fatcat:gca4fznyirb63m4d5nu2csbt5e
From single watermark to dual watermark: A new approach for image watermarking
2012
Computers & electrical engineering
This paper proposes an effective approach to embed dual watermarks by extending the single watermarking algorithms in Xie and Shen (2005) [1] and Xie and Shen (2006) [2] for numerical and logo watermarking ...
than the original single watermarking algorithms on which they are based. ...
Experimental results
Numerical sequence watermarking In the first set of experiments, we use a random sequence as primary watermark and a sequence of all '1's as the secondary watermark. ...
doi:10.1016/j.compeleceng.2011.11.012
fatcat:7tv5b7e64vfjxa35oapkmmcrhi
A new Watermarking Technique for Secure Database
[article]
2013
arXiv
pre-print
However, the increasing use of relational database systems in many real-life applications created an ever increasing need for watermarking database systems. ...
Approach: In this study, we proposed an efficient database watermarking algorithm based on inserting binary image watermarks in non-numeric mutli-word attributes of selected database tuples. ...
Find the decimal equivalent of the string. Let the decimal equivalent be d ii. ...
arXiv:1304.7094v1
fatcat:rggtrpydlzbc7nssuljfspwave
A slice based approach to recognize and extract free-form volumetric features in a CAD mesh model
2016
Computer-Aided Design and Applications
Modifications will change embedded watermarks. Consequently, detection is realized by analyzing changes. ...
This paper presents a novel means of detecting entities in engineering drawings created by other designers that employs semi-fragile watermark technologies. ...
In the experiment, different values of k ranging from one to five decimal digits are used to determine effects on watermark extraction outcomes. ...
doi:10.1080/16864360.2016.1150703
fatcat:3fxsgtb6rrdrnbgljhjpcrvx7e
Image Watermarking Technique Based on Two-Dimensional Chaotic Stream Encryption
[chapter]
2005
Lecture Notes in Computer Science
This paper proposes a kind of wavelet domain image digital watermarking technique using two-dimensional chaotic stream encryption and human visual model. ...
A stream encryption algorithm based on two-dimensional Logistic chaotic map is researched and realized for meaningful grayscale watermarking image. ...
The grayscale face image and Lena image are used as examples in our experiments. ...
doi:10.1007/11596042_84
fatcat:dnzmc3czpnbojldllstqdzvilq
An Improved Method of Content Based Image Watermarking
2007
IEEE transactions on broadcasting
We use decimal sequences for watermarking instead of pseudo random sequences, providing us with a greater flexibility in the choice of sequence. ...
This mask is used to embed a decimal sequence [2]-[4] while keeping its amplitude below the distortion sensitivity of the image pixel. ...
We use decimal sequences for watermarking instead of pseudo random sequences, providing us with a greater flexibility in the choice of sequence. ...
doi:10.1109/tbc.2007.894947
fatcat:p7lgheagczcw3nmxmo2uuqqvt4
Embedding and Retrieving Private Metadata in Electrocardiograms
2008
Journal of medical systems
, (b) it allows not only the embedding but also the efficient retrieval of the embedded data, (c) it provides resilience and fault tolerance by employing multistage watermarks (both robust and fragile) ...
Our methodology builds upon watermarking notions, and presents the following desirable characteristics: (a) it does not distort important ECG characteristics, which are essential for proper medical diagnosis ...
(c) Decimation attack. Decimate down to 50% of sequence length. (d) Decimation attack. Decimate to 25% of sequence length. (d) Cropping attack. 20% cropping. (f) Cropping attack. 40% cropping. ...
doi:10.1007/s10916-008-9185-1
pmid:19697691
fatcat:xcwl4op6nncpdknqbcxr27gcm4
A Low Distortion Audio Self-Recovery Algorithm Robust to Discordant Size Content Replacement Attack
2021
Computers
The procedure of decimation–interpolation was taken because it is a linear and time-invariant operation and is useful in digital audio. ...
Before applying the source-channel encoding, a decimation technique was performed to reduce by one-half the number of samples in the original signal. ...
Data Availability Statement: The dataset used in this work is fully available in [21] .
Conflicts of Interest: The authors declare no conflict of interest. ...
doi:10.3390/computers10070087
fatcat:kifd6habdrb5nd7diiherojxoi
An accurate billing mechanism for multimedia communications
2003
2003 International Conference on Multimedia and Expo. ICME '03. Proceedings (Cat. No.03TH8698)
Sequence A
Sequence B
Advertisement
Advertisement
Watermark
Watermark
Watermark Embedding
Transmission
Detect
Key Frames
Detect
Watermark
Advertisement
Time
Fig. 1. ...
WATERMARK EMBEDDING PROCEDURE In this paper, we use a watermarking system for billing purposes. ...
doi:10.1109/icme.2003.1221256
dblp:conf/icmcs/GomesFMC03
fatcat:h7fm7erstnfllh6ywcpz5qe43i
A Multi-Level Robust and Perceptually Transparent Blind Audio Watermarking Scheme Using Wavelets
2015
Archives of Acoustics
A randomly generated binary sequence is used as a watermark, and wavelet function coding is used to embed the watermark sequence in audio signals. ...
Multi-level watermarking is used to enhance payload capacity and can be used for a different level of security. ...
Generation of wavelet-based watermark In the proposed watermarking scheme, watermark data are generated using a random binary sequence which is phase-coded using a wavelet function of different orders ...
doi:10.2478/aoa-2014-0057
fatcat:lbfvjubhhjdibn6g25swfclqye
Embedding of Blink Frequency in Electrooculography Signal using Difference Expansion based Reversible Watermarking Technique
[article]
2013
arXiv
pre-print
In the current work, various features are studied and two major features related to blink frequency are used to generate the watermark. ...
In this proposed method, the calculated diagnostic parametric values of the original Electrooculography (EOG) signal are embedded as a watermark by using Difference Expansion (DE) algorithm based reversible ...
BER between Watermark Bit Sequence and Extracted Watermark Bit Sequence is 0. ...
arXiv:1304.2310v1
fatcat:2k5jcg2wzvb5dijznkumjbjigm
« Previous
Showing results 1 — 15 out of 1,311 results