The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
The digital image data transmission and storage in today's cyberspace has increase with privacy and security concerns. Digital media collected from different sources such as surveillance systems, forensic databases, medical images are very sensitive hence security concerns regarding the safe transmission and authentication of such digital data across secured and unsecured communication channels needs...
This paper deals with a novel steganographic technique which demonstrates the colour image authentication technique in frequency domain based on the Discrete Fourier Transform (DFT). The DFT is applied on sub-image block called mask of size 2 × 2 for frequency components of corresponding spatial component. This transforms process done from beginning to end mask in row major order of the carrier image...
Since the pioneering studies of Peterson and Watson, the perceptual masking for raw image has been playing an always increasing role in image processing: compression, filtering, indexing, watermarking, fingerprinting are just examples of application fields exploiting the human visual system peculiarities in order to increase their practical impact. The present study establishes the first accurate...
In this paper, we present a novel technique for quickly generating large-scale digital watermarks. Generally, digital watermark can be embedded in any copyright image whose size is not larger than it. But nowadays, more and more high-resolution pictures call for larger and larger watermark templates, while most traditional watermarking algorithms work slowly on templates of large scale. To solve this...
Biometrics is the detailed measurements of the human body. Biometrics deals with automated methods of identifying a person or verifying the identity of a person based on physiological or behavioural characteristics. Protection of biometric data is gaining interest and digital watermarking techniques are used to protect the biometric data from either accidental or intentional attacks. Among the various...
In this paper, a new watermark retrieval method is proposed to be used in the digital watermarking based on the modification of image pixels in order to improve the accuracy of the retrieval watermark and simultaneously enhance the robustness of the embedded watermark. Conceptually, different color spaces usually display different discriminating energy. The watermark embedded in blue component of...
In this paper, we present a generic watermarking framework that employs perceptual modeling to embed a watermark in such a way that it cannot be perceived. Our approach consists in building computational models which take into account the most common properties of the HVS (Human Visual System) that can be exploited for watermarking. We describe two ways a perceptual model can be incorporated into...
This paper presents an improving method used in the watermark retrieval process of digital watermarking for color image based on the modification of image pixels. Based on the prior knowledge of the embedded watermark pattern, some errors from the watermark bit prediction process can be reduced simply by changing the predicted bit value in accordance with all predicted bits value within the prediction...
For medical treatments, the integrity of the medical images, the authenticity of corresponding medical records, and the privacy of the patients are crucial requirements for the diagnosis of patient's disease. Therefore, how to retain the validity between images and medical records is an important topic for researches and real applications. In this paper, we apply the concept and implementation in...
This paper presents a video watermarking technique able to resist geometric attacks. The proposed method performs imperceptible watermarking of video in the spatio-temporal domain. Before embedding or detecting the watermark in the video, the location of the most appropriate triangles used for positioning the watermark must be found. For this reason, the interest points in each frame are first found...
Digital watermarking is an effective and popular technique for discouraging illegal copying and distribution of copyrighted digital image information, which in turn provides an alternative solution for image authentication. This paper proposes an innovative watermarking scheme in which some pixels are randomly selected from original image, so that all of them have a valid 3 × 3 neighborhoods. A binary...
The image information disguising technology is a new technology in information security domain in recent years. Using the S- rough sets theory and element migration's dynamic and randomness, in view of the image information disguising technology, proposed the image increase disguising and decrease disguising concept, has given image information disguising characteristic theorem based on the S- rough...
Time lapse technique is a cinematography technique whereby each film frame is captured at a rate much slower than it will be played back. When replayed at normal speed, time appears to be moving faster and thus lapsing. Processes that would normally appear stable to the human eye, such as the motion of the sun and stars in the sky, blooming flowers, plant growing, rotting fruits etc become very pronounced...
Digital video contents now become easily available through Internet and various medium. Easy availability made digital video more popular than analog media. And it attains a sharp attention regarding its ownership. The ownership integrity can be easily violated using different video editing software. In this regard we are proposing a chip level framework in accordance with our already proposed LSB...
This article proposes a reversible high-capacity watermarking algorithm for the H.264/AVC video standard. The technique applies the concept of Differential Expansion (DE) on the pixel values of the IPCM macroblocks generated by the H.264/AVC encoder. To ensure a high watermark payload, the algorithm performs the embedding in multiple layers. Initial experimental results showed that the technique not...
A loss less and visible watermarking algorithm is proposed. The carrier image can restored loss less. The exterior appearance is like to mark by use of image addition technique. The visible watermarking can replace the mark. Because of self-recovery, it offers the original data to the validated user. The Hash function of RH arithmetic operator is constructed by Rijndael encryption algorithm. By using...
In this paper, a novel robust grayscale watermarking algorithm based on Two-Levels DCT and Two-Levels SVD is proposed. The watermark signal is (32× 32 × 8) bit gray image. First, the original image is divided into blocks according to the size of the watermark, each block corresponds to each pixel value of watermark. Second, the DCT is applied in each block twice and form new blocks. Then, SVD on the...
IPTV provides information services, video contents and broadcast services using high-speed network. It is in the limelight after its commercialization and vitalizations. For protecting and authenticating the transmitted contents, IPTV system is equipped with a combination of CAS and DRM system for VOD contents but the system is too complicated and the construction is too costly. To address this problem,...
Growth of the Internet and networked multimedia systems has emphasized the need for copyright protection of the media. Media can be images, audio clips, videos and etc. Digital watermarking is today extensively used for many applications such as authentication of ownership or identification of illegal copies. Digital watermark is an invisible or maybe visible structure added to the original media...
A reversible data hiding technique with high capacity of data embedding is presented in this paper. Using both difference expansion and histogram shifting methods at the same time we have improved Luo et al.'s method to increase the amount of data that can be embedded into the host image. First the image is examined for possible overflow/underflow problem that might occur during embedding; then if...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.