Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
Filters








1,311 Hits in 2.3 sec

WATERMARKING USING DECIMAL SEQUENCES

Navneet Mandhani, Subhash Kak
2005 Cryptologia  
This paper introduces the use of decimal sequences in a code division multiple access (CDMA) based watermarking system to hide information for authentication in black and white images.  ...  The advantage of using d-sequences over PN sequences is that one can choose from a variety of prime numbers which provides a more flexible system.  ...  CONCLUSIONS This paper presents techniques of watermarking using decimal sequences.  ... 
doi:10.1080/0161-110591893762 fatcat:dgpd76zstnaklhlhu7i4vzbniq

Decimal Sequence based Imperceptible Audio Watermarking

Chanchal Ghosh, Angshuman Majumdar
2012 International Journal of Computer Applications  
The main objective of this paper is to development of an audio watermarking algorithm which obtain high watermark data rate and high quality of audio at the same time General Terms Decimal Sequence, Audio  ...  Watermarking.  ...  Decimal sequences can be used for rational and irrational numbers to generatepseudorandom noise sequences.  ... 
doi:10.5120/7178-9838 fatcat:x5tfdizt5ffjfedjwgdxkkcfkm

Augmented Watermarking

Kiranmayi Penumarthi, Subhash Kak
2006 Cryptologia  
The receiver first detects the watermark, computes the random sequence for which the watermark serves as the seed, and then subtracts out this random sequence.  ...  We introduce the concept of augmented watermarking in which in addition to the hidden watermark placed within the image an explicit watermark-dependent random sequence (noise) is added to it.  ...  Figure 5 presents the various steps for augmented watermarking using decimal sequences; the results for PN sequences are similar.  ... 
doi:10.1080/01611190500541824 fatcat:jsafdi35yzcidecphwlxov7tsy

Logo Steganography Using Digital Watermarking

Krishan Kumar
2015 IJARCCE  
With appropriate alterations to the embedding and extraction methods, we can encapsulate logo watermark in the image by the use of watermark embedder.  ...  In this paper, we systematically review proposed attacks on watermarks. We use enlightened watermark detector which can extract the watermark even in the presence of geometric attacks.  ...  Different algorithms for the use of decimal sequences have been formulated for use in black and white images.  ... 
doi:10.17148/ijarcce.2015.43126 fatcat:onoz6whl5vgcxe2lxujopg55qm

A reversible watermarking for DNA sequence using an adaptive least square prediction error expansion

Suk-Hwan Lee, Eung-Joo Lee, Ki-Ryong Kwon
2020 Nonlinear Theory and Its Applications IEICE  
In this paper, we address a reversible watermarking method for noncoding DNA sequences using an adaptive prediction error expansion based on least square predictor.  ...  In particular, there is a need for a reversible DNA watermarking technology capable of DNA storage and forgery prevention of DNA sequence, and analyzing biological mutation processes by watermark while  ...  This method converts a binary base sequence into a decimal number in 2-bit units as Chen's method, and then obtains a histogram of the decimal sequence.  ... 
doi:10.1587/nolta.11.2 fatcat:gca4fznyirb63m4d5nu2csbt5e

From single watermark to dual watermark: A new approach for image watermarking

Hong Shen, Bo Chen
2012 Computers & electrical engineering  
This paper proposes an effective approach to embed dual watermarks by extending the single watermarking algorithms in Xie and Shen (2005) [1] and Xie and Shen (2006) [2] for numerical and logo watermarking  ...  than the original single watermarking algorithms on which they are based.  ...  Experimental results Numerical sequence watermarking In the first set of experiments, we use a random sequence as primary watermark and a sequence of all '1's as the secondary watermark.  ... 
doi:10.1016/j.compeleceng.2011.11.012 fatcat:7tv5b7e64vfjxa35oapkmmcrhi

A new Watermarking Technique for Secure Database [article]

Jun Ziang Pinn, A. Fr. Zung
2013 arXiv   pre-print
However, the increasing use of relational database systems in many real-life applications created an ever increasing need for watermarking database systems.  ...  Approach: In this study, we proposed an efficient database watermarking algorithm based on inserting binary image watermarks in non-numeric mutli-word attributes of selected database tuples.  ...  Find the decimal equivalent of the string. Let the decimal equivalent be d ii.  ... 
arXiv:1304.7094v1 fatcat:rggtrpydlzbc7nssuljfspwave

A slice based approach to recognize and extract free-form volumetric features in a CAD mesh model

Nepal Adhikary, B. Gurumoorthy
2016 Computer-Aided Design and Applications  
Modifications will change embedded watermarks. Consequently, detection is realized by analyzing changes.  ...  This paper presents a novel means of detecting entities in engineering drawings created by other designers that employs semi-fragile watermark technologies.  ...  In the experiment, different values of k ranging from one to five decimal digits are used to determine effects on watermark extraction outcomes.  ... 
doi:10.1080/16864360.2016.1150703 fatcat:3fxsgtb6rrdrnbgljhjpcrvx7e

Image Watermarking Technique Based on Two-Dimensional Chaotic Stream Encryption [chapter]

Hanping Hu, Yongqiang Chen
2005 Lecture Notes in Computer Science  
This paper proposes a kind of wavelet domain image digital watermarking technique using two-dimensional chaotic stream encryption and human visual model.  ...  A stream encryption algorithm based on two-dimensional Logistic chaotic map is researched and realized for meaningful grayscale watermarking image.  ...  The grayscale face image and Lena image are used as examples in our experiments.  ... 
doi:10.1007/11596042_84 fatcat:dnzmc3czpnbojldllstqdzvilq

An Improved Method of Content Based Image Watermarking

A.K. Parthasarathy, S. Kak
2007 IEEE transactions on broadcasting  
We use decimal sequences for watermarking instead of pseudo random sequences, providing us with a greater flexibility in the choice of sequence.  ...  This mask is used to embed a decimal sequence [2]-[4] while keeping its amplitude below the distortion sensitivity of the image pixel.  ...  We use decimal sequences for watermarking instead of pseudo random sequences, providing us with a greater flexibility in the choice of sequence.  ... 
doi:10.1109/tbc.2007.894947 fatcat:p7lgheagczcw3nmxmo2uuqqvt4

Embedding and Retrieving Private Metadata in Electrocardiograms

Suleyman S. Kozat, Michail Vlachos, Claudio Lucchese, Helga Van Herle, Philip S. Yu
2008 Journal of medical systems  
, (b) it allows not only the embedding but also the efficient retrieval of the embedded data, (c) it provides resilience and fault tolerance by employing multistage watermarks (both robust and fragile)  ...  Our methodology builds upon watermarking notions, and presents the following desirable characteristics: (a) it does not distort important ECG characteristics, which are essential for proper medical diagnosis  ...  (c) Decimation attack. Decimate down to 50% of sequence length. (d) Decimation attack. Decimate to 25% of sequence length. (d) Cropping attack. 20% cropping. (f) Cropping attack. 40% cropping.  ... 
doi:10.1007/s10916-008-9185-1 pmid:19697691 fatcat:xcwl4op6nncpdknqbcxr27gcm4

A Low Distortion Audio Self-Recovery Algorithm Robust to Discordant Size Content Replacement Attack

Juan Jose Gomez-Ricardez, Jose Juan Garcia-Hernandez
2021 Computers  
The procedure of decimation–interpolation was taken because it is a linear and time-invariant operation and is useful in digital audio.  ...  Before applying the source-channel encoding, a decimation technique was performed to reduce by one-half the number of samples in the original signal.  ...  Data Availability Statement: The dataset used in this work is fully available in [21] . Conflicts of Interest: The authors declare no conflict of interest.  ... 
doi:10.3390/computers10070087 fatcat:kifd6habdrb5nd7diiherojxoi

An accurate billing mechanism for multimedia communications

J.G. Gomes, M.C.Q. de Farias, S.K. Mitra, M. Carli
2003 2003 International Conference on Multimedia and Expo. ICME '03. Proceedings (Cat. No.03TH8698)  
Sequence A Sequence B Advertisement Advertisement Watermark Watermark Watermark Embedding Transmission Detect Key Frames Detect Watermark Advertisement Time Fig. 1.  ...  WATERMARK EMBEDDING PROCEDURE In this paper, we use a watermarking system for billing purposes.  ... 
doi:10.1109/icme.2003.1221256 dblp:conf/icmcs/GomesFMC03 fatcat:h7fm7erstnfllh6ywcpz5qe43i

A Multi-Level Robust and Perceptually Transparent Blind Audio Watermarking Scheme Using Wavelets

Farooq Husain, Omar Farooq, Ekram Khan
2015 Archives of Acoustics  
A randomly generated binary sequence is used as a watermark, and wavelet function coding is used to embed the watermark sequence in audio signals.  ...  Multi-level watermarking is used to enhance payload capacity and can be used for a different level of security.  ...  Generation of wavelet-based watermark In the proposed watermarking scheme, watermark data are generated using a random binary sequence which is phase-coded using a wavelet function of different orders  ... 
doi:10.2478/aoa-2014-0057 fatcat:lbfvjubhhjdibn6g25swfclqye

Embedding of Blink Frequency in Electrooculography Signal using Difference Expansion based Reversible Watermarking Technique [article]

Nilanjan Dey, Prasenjit Maji, Poulami Das, Shouvik Biswas, Achintya Das, Sheli Sinha Chaudhuri
2013 arXiv   pre-print
In the current work, various features are studied and two major features related to blink frequency are used to generate the watermark.  ...  In this proposed method, the calculated diagnostic parametric values of the original Electrooculography (EOG) signal are embedded as a watermark by using Difference Expansion (DE) algorithm based reversible  ...  BER between Watermark Bit Sequence and Extracted Watermark Bit Sequence is 0.  ... 
arXiv:1304.2310v1 fatcat:2k5jcg2wzvb5dijznkumjbjigm
« Previous Showing results 1 — 15 out of 1,311 results