The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Digital watermarking is a technique that is widely used to protect rightful ownership of digital images. In this paper, we proposed a hybrid watermarking scheme for stereo images copyright protection. According to the property of stereo images, similar block pairs are located by using a certain key. Then, each block pair is transformed into DCT domain and DCT coefficients are extracted from the anti-diagonal...
A novel robust video watermarking scheme is proposed in this paper, in which crowdsourcing technique is used to extract the most important regions from the original video. In fact, these regions are obtained by interacting with users and analyzing their behaviors while using an interactive interface where the summaries of the videos are given. The obtained regions are then detected in the mosaic frame...
The power of modern image matching approaches is still fundamentally limited by the abrupt scale changes in images. In this paper, we propose a scale-invariant image matching approach to tackling the very large scale variation of views. Drawing inspiration from the scale space theory, we start with encoding the image’s scale space into a compact multi-scale representation. Then, rather than trying...
Digital images have become very important in our daily lives and some other important areas such as medicine, journalism and it can be also used as forensic evidence. However, the simplicity of using digital images with freely available software tools makes the authenticity of images questionable. The most common image forgery type is copy move forgery because it can be done easily but the detection...
Current light field compression techniques lack robustness to handle both rate-distortion optimized motion compensation as well as latency during the encoding and decoding process. This paper focuses on a contribution approach that uses advanced frame prediction with affine and translational motion models and optimized view prediction structures. This method allows a significant compression performance...
This work presents an image watermarking method with blind detection based on amplitude modulation. Basically, the watermark embedding is performed by modifying the pixel values in the blue channel of an image, while the watermark retrieval is achieved by using a prediction technique based on a linear combination of nearby pixel values around the embedded pixels. The experimental results obtained...
A speeding up robust identification scheme for JPEG images is proposed in this paper. The aim of the identification is to robustly identify JPEG images that are generated from the same original image, under various compression conditions such as differences in compression ratios and initial quantization matrices. The conventional scheme that we focus on uses visually protected features to achieve...
As the usage areas of the images increase, the functions of various image editing software are increasing. Easy-to-use software has caused the images to be tampered with easily. Many Copy-Move Forgery Detection (CMFD) algorithms have been developed against these attacks. In literature CMFD methods are divided into block based and keypoint based methods. In this paper, recent works in keypoint based...
Video steganography is a technique used for secret communication. In video steganography, the secret information is concealed in a video file. An MP4 video steganography method that hides audio and image data in wavelet domain is proposed in this paper. A video file consists of I-frame, P-frame, and B-frame. An I-frame, or intra frame, is decoded independently without referencing other frames. P-frames...
Distortion of the cover image by noise due to errors during data transmission is a major concern in telemedicine especially with respect to reversible watermarking. The safe reconstruction of the patient information as well that of the cover image is significant. In the interest of recovering maximum information in noisy environment, reversible watermarking technique using error control codes is employed...
Main problem frequently encountered in all schemes transform domain watermarking technique is the robustness and imperceptibility. Due to achieved optimal result most algorithms of image watermarking using combination two or more transformation domain. This paper proposed Discrete Cosine Transform (DCT) and Singular Value Decomposition (SVD) to embed binary watermark to color Image. Before the message...
This paper introduced a watermarking method using the CRT and Canny Algorithm that able to improve the imperceptibility of watermarked image and preserving the robustness of watermark image as well. The classical CRT algorithm is spread the watermark bits evenly on the image area. It causes significant degradation when the embedding location lies on the least significant region or in the homogeny...
Discrete Tchebichef Transform (DTT) is a transformation that has been widely applied in image processing, but still not widely applied in image watermarking. Based on the previous research results, DTT has advantages to reduce computational complexity, so that computation can be done faster and efficiently than the Discrete Cosine Transform (DCT). DTT also have similar properties with DCT, such as...
Audio Steganography is the technique of hiding any secret information behind a cover audio file without impairing its quality. Data hiding in audio signals has various applications such as secret communications and concealing data that may influence the security and safety of governments and personnel and has possible important applications in 5G communication systems. This paper proposes an efficient...
With the widespread use of digital images almost every field so authentication of them has become increasingly important. So researchers proposed various methods to cope with this issue recently. We proposed a new fast and effective method to cope with the digital image copy move forgery. In this method the keypoints and their descriptors are extracted from the input image by using Scale Invariant...
The evolution of the video surveillance systems generates questions concerning protection of individual privacy. In this paper, we design ASePPI, an Adaptive Scrambling enabling Privacy Protection and Intelligibility method operating in the H.264/AVC stream with the aim to be robust against de-anonymization attacks targeting the restoration of the original image and the re-identification of people...
A new digital image multi-watermarking approach is proposed. Firstly watermark is synthesized by composing, conversion and scrambling of original multiple watermarks. Then watermark is embedded in middle frequency sub-bands of host image in wavelet domain, and the embedded intensity of watermark is determined adaptively by noise visibility function. Finally, extraction process adopts independent component...
In the modern world, the problem of copyright protection by watermarks and trade preserving secrets is very acute. There is a large number of steganography methods that allow us to solve this problem. The most resistant to statistical attacks are the methods that operate with the frequency domain of the container, but small container distortions lead to an error in the lower bits of the reverse transform...
Due to the very fast growth of data in the last few decades, it is very important to provide new methods to secure these data. In this paper, we propose a new approach which will be able to mark digital images with an invisible and undetectable information, known as “watermark”. The originality of our approach, is based on orthogonal polynomial basis transform which consists of decomposing an image...
Video watermarking is the approach of adding insensible data to video content in order to protect the owner's right. One of the main important issues in watermarking operation is the watermarking robustness. The basic requirement in watermarking is resisting in front of distortion and initial attacks, which is commonly examined based on the data processing standards. Many methods have been proposed...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.