Journal articles on the topic 'DUAL WATERMARKING'

To see the other types of publications on this topic, follow the link: DUAL WATERMARKING.

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the top 50 journal articles for your research on the topic 'DUAL WATERMARKING.'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Browse journal articles on a wide variety of disciplines and organise your bibliography correctly.

1

Ye, Zhengmao, Hang Yin, and Yongmao Ye. "Security Authentication of Dual Chaotic Image Watermarking in Spatial Domain with Spatial and Frequency Domain Characteristics Analysis." Applied System Innovation 1, no. 4 (October 17, 2018): 40. http://dx.doi.org/10.3390/asi1040040.

Full text
Abstract:
This article presents an advanced dual chaotic watermarking scheme to improve information security. To ensure confidentiality in digital image transmission, a secure dual watermarking scheme is proposed by applying the chaotic logistic system and hyper-chaotic dynamical system. Chaotic watermarking was conducted in the spatial domain, where suboptimal secure hashing with a variable length was selected in preprocessing stages. The secret key was generated by the chaotic sequence for pixel shuffling using a chaotic logistic map, so that a controlled amount of distortion was inserted into the host digital image. Watermarking was proceeded after the chaotic watermark had been embedded into the shuffled image. To strengthen the security, the hyper-chaotic system was used to generate chaotic blocks for block scrambling in order to achieve dual chaotic watermarking. Characteristics analysis was conducted for multiple examples in both spatial and frequency domains. Potential effects induced by the chaotic driving parameter on processing time and integrity authentication of chaotic dual watermarking were also analyzed in detail.
APA, Harvard, Vancouver, ISO, and other styles
2

Athalye, Mrs S. S., Mr Pranav Gurav, Mr Rohan Chavan, and Mr Rohit Pashte. "Study on Dual Watermarking." International Journal of Engineering Trends and Technology 20, no. 6 (February 25, 2015): 260–62. http://dx.doi.org/10.14445/22315381/ijett-v20p251.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Gao, Zhan Wei, Yong Mei Zhang, Cong Liu, Jie Geng, and De Kai Ba. "Dual Video Watermarking Scheme Based on Transform Domain." Applied Mechanics and Materials 155-156 (February 2012): 815–19. http://dx.doi.org/10.4028/www.scientific.net/amm.155-156.815.

Full text
Abstract:
The single watermark algorithms always merely have single function. In order to overcome the drawback, this paper proposed a dual video watermarking scheme based on transform domain. To implement the video copyright and integrality authentication, this paper embedded robust watermarking and fragile watermark. At the same time, this scheme made good use of the wavelet transform to embed the two different kinds of watermarking in the same video respectively. The fragile watermarking is to serve the robust watermarking. Experiments demonstrate this scheme can not only protect the copyright of the video effectively, but also protect against some attacks, such as shearing attack, JPEG lossy compression attack, noise attack etc. This scheme has better robustness and invisibility.
APA, Harvard, Vancouver, ISO, and other styles
4

Priya, Mrs A. Lakshmi, and S. Letitia. "Dual Watermarking in Cyber Security." JOURNAL OF ADVANCES IN CHEMISTRY 13, no. 10 (March 4, 2017): 5923–26. http://dx.doi.org/10.24297/jac.v13i10.5834.

Full text
Abstract:
Cyber security is generally a conservatory of the conventional information system security that is aimed at protecting cyber threats, like cyber terrorism, cyber warfare, and cyber espionage to corrupt digital information. This leads to increase the researches in cyber security. This paper proposes the application of dual watermarking in cyber technology, focusing on forgery detection. The rest of the paper presents a brief overview of cyber security and the role of digital dual watermarking.
APA, Harvard, Vancouver, ISO, and other styles
5

Ghai, Deepika, Hemant Kumar Gianey, Arpit Jain, and Raminder Singh Uppal. "Quantum and dual-tree complex wavelet transform-based image watermarking." International Journal of Modern Physics B 34, no. 04 (January 21, 2020): 2050009. http://dx.doi.org/10.1142/s0217979220500095.

Full text
Abstract:
Nowadays, multimedia applications are extensively utilized and communicated over Internet. Due to the use of public networks for communication, the multimedia data are prone to various security attacks. In the past few decades, image watermarking has been extensively utilized to handle this issue. Its main objective is to embed a watermark into a host multimedia data without affecting its presentation. However, the existing methods are not so effective against multiplicative attacks. Therefore, in this paper, a novel quantum-based image watermarking technique is proposed. It initially computes the dual-tree complex wavelet transform coefficients of an input cover image. The watermark image is then scrambled using Arnold transform. Thereafter, in the lower coefficient input the watermark image is embedded using quantum-based singular value decomposition (SVD). Finally, the covered image is obtained by applying the inverse dual-tree complex wavelet transform on the obtained coefficients. Comparative analyses are carried out by considering the proposed and the existing watermarking techniques. It has been found that the proposed technique outperforms existing watermarking techniques in terms of various performance metrics.
APA, Harvard, Vancouver, ISO, and other styles
6

Abraham, Jobin. "A Multi-purpose Dual Watermarking Scheme." International Journal of Computer Applications 77, no. 8 (September 18, 2013): 1–4. http://dx.doi.org/10.5120/13411-1066.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Zhang, Zhengwei, Lifa Wu, Huabo Li, Haiguang Lai, and Chenghui Zheng. "Dual Watermarking Algorithm for Medical Image." Journal of Medical Imaging and Health Informatics 7, no. 3 (June 1, 2017): 607–22. http://dx.doi.org/10.1166/jmihi.2017.2056.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

Al-Haj, Ali. "A dual transform audio watermarking algorithm." Multimedia Tools and Applications 73, no. 3 (August 30, 2013): 1897–912. http://dx.doi.org/10.1007/s11042-013-1645-z.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

Phin, Ch’ng Chen, Nurul Hidayah Ab Rahman, and Noraini Che Pa. "A Digital Image Watermarking System: An Application of Dual Layer Watermarking Technique." JOIV : International Journal on Informatics Visualization 1, no. 4-2 (November 16, 2017): 199. http://dx.doi.org/10.30630/joiv.1.4-2.78.

Full text
Abstract:
Watermarking is a method to digitally sign a product to provide authentication and prevent copyright infringement to proving the ownership of a product and provides integrity for companies to protect their product. In this study, dual layer watermark that applies two different watermarking techniques at each layer is presented. The first layer applies the LSB Substitution technique while the second layer uses the Discrete Wavelet Transform (DWT) technique. This implies greater integrity as it contains of two signatures in providing authentication.
APA, Harvard, Vancouver, ISO, and other styles
10

Xi, Xu, Xinchang Zhang, Weidong Liang, Qinchuan Xin, and Pengcheng Zhang. "Dual Zero-Watermarking Scheme for Two-Dimensional Vector Map Based on Delaunay Triangle Mesh and Singular Value Decomposition." Applied Sciences 9, no. 4 (February 14, 2019): 642. http://dx.doi.org/10.3390/app9040642.

Full text
Abstract:
Digital watermarking is important for the copyright protection of electronic data, but embedding watermarks into vector maps could easily lead to changes in map precision. Zero-watermarking, a method that does not embed watermarks into maps, could avoid altering vector maps but often lack of robustness. This study proposes a dual zero-watermarking scheme that improves watermark robustness for two-dimensional (2D) vector maps. The proposed scheme first extracts the feature vertices and non-feature vertices of the vector map with the Douglas-Peucker algorithm and subsequently constructs the Delaunay Triangulation Mesh (DTM) to form a topological feature sequence of feature vertices as well as the Singular Value Decomposition (SVD) matrix to form intrinsic feature sequence of non-feature vertices. Next, zero-watermarks are obtained by executing exclusive disjunction (XOR) with the encrypted watermark image under the Arnold scramble algorithm. The experimental results show that the scheme that synthesizes both the feature and non-feature information improves the watermark capacity. Making use of complementary information between feature and non-feature vertices considerably improves the overall robustness of the watermarking scheme. The proposed dual zero-watermarking scheme combines the advantages of individual watermarking schemes and is robust against such attacks as geometric attacks, vertex attacks and object attacks.
APA, Harvard, Vancouver, ISO, and other styles
11

Sivananthamaitrey, P., and P. Rajesh Kumar. "Multipurpose Watermarking Based on SWT and SVD." International Journal of Engineering & Technology 7, no. 3.29 (August 24, 2018): 65. http://dx.doi.org/10.14419/ijet.v7i3.29.18463.

Full text
Abstract:
Dual digital watermarking has emerged as a successful solution for copyright protection, tamper detection and localization. However, several problems related to the robustness, capacity, tampered area detection still mystifying. This paper presents a high capacity dual watermarking mechanism for digital color image. An invisible robust watermark is embedded in the Green component of the host image by using a hybrid combination of Stationary Wavelet Transform (SWT) and Singular Value Decomposition (SVD) for copyright protection. A fragile invisible watermark based on the Least Significant Bit (LSB) replacement approach is embedded in the Blue component of the image for tamper detection and localization. The proposed technique focuses on robustness and imperceptibility while maximizing embedding capacity that makes this technique a multipurpose watermarking scheme.
APA, Harvard, Vancouver, ISO, and other styles
12

Tumula, Sridevi. "A Novel Video Watermarking Algorithm using DTCWT." International Journal for Research in Applied Science and Engineering Technology 9, no. VI (June 20, 2021): 1629–34. http://dx.doi.org/10.22214/ijraset.2021.35324.

Full text
Abstract:
In this paper a new novel color video watermarking algorithm has been proposed using Dual Tree Complex Wavelet Transform (DTCWT). Digital watermarking is an emerging technology for copyright protection for digital multimedia data. Now-a-days a lot of digital data are exchanged in the internet, so to protect the digital multimedia data, digital watermarking is used, the data may be an image or video or an audio data. The main objective of this paper is to maintain perceptivity of digital video and design a robust watermarking algorithm and maintaining the tradeoff between robustness and perceptivity.
APA, Harvard, Vancouver, ISO, and other styles
13

Rangel-Espinoza, Kevin, Eduardo Fragoso-Navarro, Clara Cruz-Ramos, Rogelio Reyes-Reyes, Mariko Nakano-Miyatake, and Héctor M. Pérez-Meana. "Adaptive removable visible watermarking technique using dual watermarking for digital color images." Multimedia Tools and Applications 77, no. 11 (June 19, 2017): 13047–74. http://dx.doi.org/10.1007/s11042-017-4931-3.

Full text
APA, Harvard, Vancouver, ISO, and other styles
14

Kwitt, Roland, Peter Meerwald, and Andreas Uhl. "Blind Detection of Additive Spread-Spectrum Watermarking in the Dual-Tree Complex Wavelet Transform Domain." International Journal of Digital Crime and Forensics 2, no. 2 (April 2010): 34–46. http://dx.doi.org/10.4018/jdcf.2010040103.

Full text
Abstract:
In this paper, the authors adapt two blind detector structures for additive spread-spectrum image watermarking to the host signal characteristics of the Dual-Tree Complex Wavelet Transform (DT-CWT) domain coefficients. The research is motivated by the superior perceptual characteristics of the DT-CWT and its active use in watermarking. To improve the numerous existing watermarking schemes in which the host signal is modeled by a Gaussian distribution, the authors show that the Generalized Gaussian nature of Dual-Tree detail subband statistics can be exploited for better detector performance. This paper finds that the Rao detector is more practical than the likelihood-ratio test for their detection problem. The authors experimentally investigate the robustness of the proposed detectors under JPEG and JPEG2000 attacks and assess the perceptual quality of the watermarked images. The results demonstrate that their alterations allow significantly better blind watermark detection performance in the DT-CWT domain than the widely used linear-correlation detector. As only the detection side has to be modified, the proposed methods can be easily adopted in existing DT-CWT watermarking schemes.
APA, Harvard, Vancouver, ISO, and other styles
15

Reyes-Ruiz, Laura, duardo Fragoso-Navarro, Francisco Garcia-Ugalde, Oswaldo Juarez-Sandoval, Manuel Cedillo-Hernandez, and Mariko Nakano-Miyatake. "Robust Dual Digital Watermark Applied to Antique Digitized Cinema Images: Resistant to Print-Scan Attack." Journal of Image and Graphics 11, no. 1 (March 2023): 61–71. http://dx.doi.org/10.18178/joig.11.1.61-71.

Full text
Abstract:
Nowadays, advances in information and communication technologies along with easy access to electronic devices such as smartphones have achieved an agile and efficient storing, edition, and distribution of digital multimedia files. However, lack of regulation has led to several problems associated with intellectual property authentication and copyright protection. Furthermore, the problem becomes complex in a scenario of illegal printed exploitation, which involves printing and scanning processes. To solve these problems, several digital watermarking in combination with cryptographic algorithms has been proposed. In this paper, a strategy of robust watermarking is defined consisting of the administration and detection of unauthorized use of digitized cinematographic images from Mexican cultural heritage. The proposed strategy is based on the combination of two types of digital watermarking, one of visible-camouflaged type based on spatial domain and another of invisible type based on frequency domain, together with a particle swarm optimization. The experimental results show the high performance of the proposed algorithm faced to printing-scanning processes or digital-analogue attack, and common image geometric and image processing attacks such as JPEG compression. Additionally, the imperceptibility of the watermark is evaluated by PSNR and compared with other previously proposed algorithms.
APA, Harvard, Vancouver, ISO, and other styles
16

MINAMOTO, TERUYA, and RYUJI OHURA. "A DIGITAL IMAGE WATERMARKING FOR AUTHENTICATION BASED ON THE DUAL-TREE COMPLEX DISCRETE WAVELET TRANSFORM AND INTERVAL ARITHMETIC." International Journal of Wavelets, Multiresolution and Information Processing 11, no. 04 (July 2013): 1360005. http://dx.doi.org/10.1142/s0219691313600059.

Full text
Abstract:
We propose a new digital image watermarking method for authentication based on the dual-tree complex discrete wavelet transform (DT-CDWT) and interval arithmetic (IA). This method is a kind of content-based watermarking, because it generates a watermark from the host image and authenticates the test image by comparing two types of watermarks constructed using the test image. We describe our watermarking and authentication procedure in detail and present experimental results demonstrating that our method produces high-quality watermarked images and can locate the areas that have been tampered with.
APA, Harvard, Vancouver, ISO, and other styles
17

Mathur, Etti, and Manish Mathuria. "Review of Dual Watermarking on Digital Image." International Journal of Computer Applications 163, no. 9 (April 17, 2017): 11–13. http://dx.doi.org/10.5120/ijca2017913733.

Full text
APA, Harvard, Vancouver, ISO, and other styles
18

Bhardwaj, Swapnil, Kirat Chabra, Madhurima, and Saru Dhir. "Dual Watermarking Technique for Protection of Images." Indian Journal of Public Health Research & Development 10, no. 5 (2019): 857. http://dx.doi.org/10.5958/0976-5506.2019.01189.6.

Full text
APA, Harvard, Vancouver, ISO, and other styles
19

INAMDAR, VANDANA S., and PRITI P. REGE. "Dual watermarking technique with multiple biometric watermarks." Sadhana 39, no. 1 (February 2014): 3–26. http://dx.doi.org/10.1007/s12046-013-0208-3.

Full text
APA, Harvard, Vancouver, ISO, and other styles
20

Shi, Yanjiao, Miao Qi, Yugen Yi, Ming Zhang, and Jun Kong. "Object based dual watermarking for video authentication." Optik 124, no. 19 (October 2013): 3827–34. http://dx.doi.org/10.1016/j.ijleo.2012.11.078.

Full text
APA, Harvard, Vancouver, ISO, and other styles
21

Fan, Yu Cheng, and Hen Wai Tsao. "A dual pyramid watermarking for JPEG-2000." International Journal of High Performance Computing and Networking 5, no. 1/2 (2007): 84. http://dx.doi.org/10.1504/ijhpcn.2007.015767.

Full text
APA, Harvard, Vancouver, ISO, and other styles
22

Wang, Yuan-Gen, Zhe-Ming Lu, Liang Fan, and Yun Zheng. "Robust dual watermarking algorithm for AVS video." Signal Processing: Image Communication 24, no. 4 (April 2009): 333–44. http://dx.doi.org/10.1016/j.image.2009.03.004.

Full text
APA, Harvard, Vancouver, ISO, and other styles
23

Huang, Tongyuan, Jia Xu, Yuling Yang, and Baoru Han. "Robust Zero-Watermarking Algorithm for Medical Images Using Double-Tree Complex Wavelet Transform and Hessenberg Decomposition." Mathematics 10, no. 7 (April 2, 2022): 1154. http://dx.doi.org/10.3390/math10071154.

Full text
Abstract:
With the rapid development of smart medical care, copyright security for medical images is becoming increasingly important. To improve medical images storage and transmission safety, this paper proposes a robust zero-watermarking algorithm for medical images by fusing Dual-Tree Complex Wavelet Transform (DTCWT), Hessenberg decomposition, and Multi-level Discrete Cosine Transform (MDCT). First, the low-frequency sub-band of the medical image is obtained through the DTCWT and MDCT. Then Hessenberg decomposition is used to construct the visual feature vector. Meanwhile, the encryption of the watermarking image by combining cryptographic algorithms, third-party concepts, and chaotic sequences enhances the algorithm’s security. In the proposed algorithm, zero-watermarking technology is utilized to assure the medical images’ completeness. Compared with the existing algorithms, the proposed algorithm has good robustness and invisibility and can efficiently extract the watermarking image and resist different attacks.
APA, Harvard, Vancouver, ISO, and other styles
24

Liu, Feng. "A Dual-Watermarking Scheme Robust to Affine Transformation." Journal of Physics: Conference Series 1856, no. 1 (April 1, 2021): 012062. http://dx.doi.org/10.1088/1742-6596/1856/1/012062.

Full text
APA, Harvard, Vancouver, ISO, and other styles
25

Jing Li, and Mingxia Shi. "Dual Zero-Watermarking Scheme for Image Copyright Protection." INTERNATIONAL JOURNAL ON Advances in Information Sciences and Service Sciences 5, no. 7 (April 15, 2013): 372–80. http://dx.doi.org/10.4156/aiss.vol5.issue7.44.

Full text
APA, Harvard, Vancouver, ISO, and other styles
26

Yinglan, Fang, Han Bing, Zhang Yongmei, and Tian Lin. "RESEARCH OF DUAL WATERMARKING TECHNOLOGY FOR DIGITAL IMAGE." International Journal on Smart Sensing and Intelligent Systems 9, no. 4 (2016): 2167–85. http://dx.doi.org/10.21307/ijssis-2017-958.

Full text
APA, Harvard, Vancouver, ISO, and other styles
27

Jin, C., Z. G. Qu, Z. M. Zhang, and Y. Jiang. "Web dual watermarking technology using an XML document." IET Information Security 1, no. 1 (2007): 37. http://dx.doi.org/10.1049/iet-ifs:20060083.

Full text
APA, Harvard, Vancouver, ISO, and other styles
28

Song, Chunlin, Sud Sudirman, and Madjid Merabti. "A robust region-adaptive dual image watermarking technique." Journal of Visual Communication and Image Representation 23, no. 3 (April 2012): 549–68. http://dx.doi.org/10.1016/j.jvcir.2012.01.017.

Full text
APA, Harvard, Vancouver, ISO, and other styles
29

Kumar, Chandan, Amit Kumar Singh, and Pardeep Kumar. "Dual watermarking: An approach for securing digital documents." Multimedia Tools and Applications 79, no. 11-12 (December 23, 2019): 7339–54. http://dx.doi.org/10.1007/s11042-019-08314-5.

Full text
APA, Harvard, Vancouver, ISO, and other styles
30

Singh, Amit Kumar, Basant Kumar, Mayank Dave, and Anand Mohan. "Robust and Imperceptible Dual Watermarking for Telemedicine Applications." Wireless Personal Communications 80, no. 4 (September 30, 2014): 1415–33. http://dx.doi.org/10.1007/s11277-014-2091-6.

Full text
APA, Harvard, Vancouver, ISO, and other styles
31

Mahala, Santanu, Biswapati Jana, and Abuzar Mahammad. "Dual Image Based Watermarking Scheme for Image Authentication." International Journal of Renewable Energy Exchange 10, no. 11 (November 21, 2022): 136–43. http://dx.doi.org/10.58443/ijrex.10.11.2022.136-143.

Full text
APA, Harvard, Vancouver, ISO, and other styles
32

Bamal, Roopam, and Singara Singh Kasana. "Dual hybrid medical watermarking using walsh-slantlet transform." Multimedia Tools and Applications 78, no. 13 (January 15, 2019): 17899–927. http://dx.doi.org/10.1007/s11042-018-6820-9.

Full text
APA, Harvard, Vancouver, ISO, and other styles
33

SADH, ROOPAM, NISHCHOL MISHRA, and SANJEEV SHARMA. "Dual plane multiple spatial watermarking with self-encryption." Sadhana 41, no. 1 (January 2016): 1–14. http://dx.doi.org/10.1007/s12046-015-0458-3.

Full text
APA, Harvard, Vancouver, ISO, and other styles
34

Shi, Hui, Ming-chu Li, Cheng Guo, and Ru Tan. "A region-adaptive semi-fragile dual watermarking scheme." Multimedia Tools and Applications 75, no. 1 (October 17, 2014): 465–95. http://dx.doi.org/10.1007/s11042-014-2301-y.

Full text
APA, Harvard, Vancouver, ISO, and other styles
35

Qian, Qing, Hong-Xia Wang, Yi Hu, Lin-Na Zhou, and Jin-Feng Li. "A dual fragile watermarking scheme for speech authentication." Multimedia Tools and Applications 75, no. 21 (August 8, 2015): 13431–50. http://dx.doi.org/10.1007/s11042-015-2801-4.

Full text
APA, Harvard, Vancouver, ISO, and other styles
36

Mokashi, Bhargavi, Vandana S. Bhat, Jagadeesh D. Pujari, S. Roopashree, T. R. Mahesh, and D. Stalin Alex. "Efficient Hybrid Blind Watermarking in DWT-DCT-SVD with Dual Biometric Features for Images." Contrast Media & Molecular Imaging 2022 (September 8, 2022): 1–14. http://dx.doi.org/10.1155/2022/2918126.

Full text
Abstract:
In the modern era of virtual computers over the notional environment of computer networks, the protection of influential documents is a major concern. To bring out this motto, digital watermarking with biometric features plays a crucial part. It utilizes advanced technology of cuffing data into digital media, i.e., text, image, video, or audio files. The strategy of cuffing an image inside another image by applying biometric features namely signature and fingerprint using watermarking techniques is the key purpose of this study. To accomplish this, a combined watermarking strategy consisting of Discrete Wavelet Transform, Discrete Cosine Transform, and Singular Value Decomposition (DWT-DCT-SVD) is projected for authentication of image that is foolproof against attacks. Here, singular values of watermark1 (fingerprint) and watermark2 (signature) are obtained by applying DWT-DCT-SVD. Affixing both the singular values of watermarks, we acquire the transformed watermark. Later, the same is applied to cover image to extract the singular values. Then we add these values to the cover image and transformed watermark to obtain a final watermarked image containing both signature and fingerprint. To upgrade the reliability, sturdiness, and originality of the image, a fusion of watermarking techniques along with dual biometric features is exhibited. The experimental results conveyed that the proposed scheme achieved an average PSNR value of about 40 dB, an average SSIM value of 0.99, and an embedded watermark resilient to various attacks in the watermarked image.
APA, Harvard, Vancouver, ISO, and other styles
37

Chen, Sheng, Xianyi Chen, and Huijuan Fu. "General Framework of Reversible Watermarking Based on Asymmetric Histogram Shifting of Prediction Error." Advances in Multimedia 2017 (2017): 1–9. http://dx.doi.org/10.1155/2017/6359248.

Full text
Abstract:
This paper presents a general framework for the reversible watermarking based on asymmetric histogram shifting of prediction error, which is inspired by reversible watermarking of prediction error. Different from the conventional algorithms using single-prediction scheme to create symmetric histogram, the proposed method employs a multi-prediction scheme, which calculates multiple prediction values for the pixels. Then, the suitable value would be selected by two dual asymmetric selection functions to construct two asymmetric error histograms. Finally, the watermark is embedded in the two error histograms separately utilizing a complementary embedding strategy. The proposed framework provides a new perspective for the research of reversible watermarking, which brings about many benefits for the information security.
APA, Harvard, Vancouver, ISO, and other styles
38

Padma, U. R., and Jayachitra. "SELF-EMBEDDING VIDEO WATERMARKING USING DUAL ORTHOGONAL COMPLEX CONTOURLET TRANSFORM WITH AUTOCORRELATION SYSTEM." International Journal of Research -GRANTHAALAYAH 3, no. 4 (April 30, 2015): 89–98. http://dx.doi.org/10.29121/granthaalayah.v3.i4.2015.3025.

Full text
Abstract:
This paper presents a novel non-blind watermarking algorithm using dual orthogonal complex contourlet transform. The dual orthogonal complex contourlet transform is preferred for watermarking because of its ability to capture the directional edges and contours superior to other transforms such as cosine transform, wavelet transform, etc. Digital image and video in their raw form require an enormous amount of storage capacity and the huge data systems also contain a lot of redundant information.Compression also increases the capacity of the communication channel. Image Compression using SPIHT Set Partitioning in Hierarchical Trees algorithm based on Huffman coding technique. SPIHT algorithm is the lossless compression algorithms reduce file size with no loss in image quality and comparing the final results in terms of bit error rate, PSNR and MSE.
APA, Harvard, Vancouver, ISO, and other styles
39

Wahyu Adi, Prajanto, Farah Zakiyah Rahmanti, and Edy Winarno. "Robust Watermarking through Dual Band IWT and Chinese Remainder Theorem." Bulletin of Electrical Engineering and Informatics 7, no. 4 (December 1, 2018): 561–69. http://dx.doi.org/10.11591/eei.v7i4.690.

Full text
Abstract:
CRT was a widely used algorithm in the development of watermarking methods. The algorithm produced good image quality but it had low robustness against compression and filtering. This paper proposed a new watermarking scheme through dual band IWT to improve the robustness and preserving the image quality. The high frequency sub band was used to index the embedding location on the low frequency sub band. In robustness test, the CRT method resulted average NC value of 0.7129, 0.4846, and 0.6768 while the proposed method had higher NC value of 0.7902, 0.7473, and 0.8163 in corresponding Gaussian filter, JPEG, and JPEG2000 compression test. Meanwhile the both CRT and proposed method had similar average SSIM value of 0.9979 and 0.9960 respectively in term of image quality. The result showed that the proposed method was able to improve the robustness and maintaining the image quality.
APA, Harvard, Vancouver, ISO, and other styles
40

Singh, Ranjeet Kumar, and Dilip Kumar Shaw. "A Hybrid Concept of Cryptography and Dual Watermarking (LSB_DCT) for Data Security." International Journal of Information Security and Privacy 12, no. 1 (January 2018): 1–12. http://dx.doi.org/10.4018/ijisp.2018010101.

Full text
Abstract:
Now a days, in communication technology safety of digital data in the form of text, image, and video, audio is a biggest problem. With the rapid development of the network multimedia systems, security is the biggest issue. Digital watermarking is one of the solutions to these problems. It hides some secret data into the original image and this information is use for image authentication and security. This paper Focus an application using Hybrid approach of Cryptography technique and dual watermarking for the purpose of Providing highly security and authentication of digital data. This paper use cryptography and QR Code in combined approach of LSB and DCT Digital image water marking technique. The Experimental results are given in the form of table and graph. This algorithm provides more security and data authentication compare to other image data security approach.
APA, Harvard, Vancouver, ISO, and other styles
41

Nawaz, Saqib Ali, Jingbing Li, Uzair Aslam Bhatti, Anum Mehmood, Raza Ahmed, Zeeshan, and Qurat Ul Ain. "A Novel Hybrid Discrete Cosine Transform Speeded Up Robust Feature-Based Secure Medical Image Watermarking Algorithm." Journal of Medical Imaging and Health Informatics 10, no. 11 (November 1, 2020): 2588–99. http://dx.doi.org/10.1166/jmihi.2020.3220.

Full text
Abstract:
With the advancement of networks and multimedia, digital watermarking technology has received worldwide attention as an effective method of copyright protection. Improving the anti-geometric attack ability of digital watermarking algorithms using image feature-based algorithms have received extensive attention. This paper proposes a novel robust watermarking algorithm based on SURF-DCT perceptual hashing (Speeded Up Robust Features and Discrete Cosine Transform), namely blind watermarking. We design and implement a meaningful binary watermark embedding and extraction algorithm based on the SURF feature descriptor and discrete-cosine transform domain digital image watermarking algorithm. The algorithm firstly uses the affine transformation with a feature matrix and chaotic encryption technology to preprocess the watermark image, enhance the confidentiality of the watermark, and perform block and DCT coefficients extraction on the carrier image, and then uses the positive and negative quantization rules to modify the DCT coefficients. The embedding of the watermark is completed, and the blind extraction of the watermark realized. Correlation values are more than 90% in most of the attacks. It provides better results against different noise attacks and also better performance against rotation. Transparency and high computational efficiency, coupled with dual functions of copyright protection and content authentication, is the advantage of the proposed algorithm.
APA, Harvard, Vancouver, ISO, and other styles
42

YE Tianyu, 叶天语. "A Selfembedding Image Watermarking Scheme with Dual Purpose." ACTA PHOTONICA SINICA 41, no. 7 (2012): 859–67. http://dx.doi.org/10.3788/gzxb20124107.0859.

Full text
APA, Harvard, Vancouver, ISO, and other styles
43

YE Tianyu, 叶天语. "A Selfembedding Image Watermarking Scheme with Dual Purpose." ACTA PHOTONICA SINICA 41, no. 7 (2012): 859–67. http://dx.doi.org/10.3788/gzxb20124107.859.

Full text
APA, Harvard, Vancouver, ISO, and other styles
44

Hu, Hwai-Tsu, and Wei-Hsi Chen. "A dual cepstrum-based watermarking scheme with self-synchronization." Signal Processing 92, no. 4 (April 2012): 1109–16. http://dx.doi.org/10.1016/j.sigpro.2011.11.001.

Full text
APA, Harvard, Vancouver, ISO, and other styles
45

Hu, Ming-Chiang, Der-Chyuan Lou, and Ming-Chang Chang. "Dual-wrapped digital watermarking scheme for image copyright protection." Computers & Security 26, no. 4 (June 2007): 319–30. http://dx.doi.org/10.1016/j.cose.2006.11.007.

Full text
APA, Harvard, Vancouver, ISO, and other styles
46

Tang, Lin-Lin, Chun Ta Huang, Jeng-Shyang Pan, and Chang-Yong Liu. "Dual watermarking algorithm based on the Fractional Fourier Transform." Multimedia Tools and Applications 74, no. 12 (June 8, 2013): 4397–413. http://dx.doi.org/10.1007/s11042-013-1531-8.

Full text
APA, Harvard, Vancouver, ISO, and other styles
47

Mo, Jia, Zhaofeng Ma, Yixian Yang, and Xinxin Niu. "A Quantum Watermarking Protocol Based on Bell Dual Basis." International Journal of Theoretical Physics 52, no. 11 (June 19, 2013): 3813–19. http://dx.doi.org/10.1007/s10773-013-1687-z.

Full text
APA, Harvard, Vancouver, ISO, and other styles
48

Nan, Hai, Bin Fang, Weibin Yang, Jiye Qian, Ming Li, Yi Liu, and Yushu Zhang. "Cryptanalysis and Improvement of the Robust and Blind Watermarking Scheme for Dual Color Image." Mathematical Problems in Engineering 2015 (2015): 1–10. http://dx.doi.org/10.1155/2015/526174.

Full text
Abstract:
With more color images being widely used on the Internet, the research on embedding color watermark image into color host image has been receiving more attention. Recently, Su et al. have proposed a robust and blind watermarking scheme for dual color image, in which the main innovation is the using of two-level DCT. However, it has been demonstrated in this paper that the original scheme in Su’s study is not secure and can be attacked by our proposed method. In addition, some errors in the original scheme have been pointed out. Also, an improvement measure is presented to enhance the security of the original watermarking scheme. The proposed method has been confirmed by both theoretical analysis and experimental results.
APA, Harvard, Vancouver, ISO, and other styles
49

Liu, Jing, Jingbing Li, Jixin Ma, Naveed Sadiq, Uzair Bhatti, and Yang Ai. "A Robust Multi-Watermarking Algorithm for Medical Images Based on DTCWT-DCT and Henon Map." Applied Sciences 9, no. 4 (February 18, 2019): 700. http://dx.doi.org/10.3390/app9040700.

Full text
Abstract:
To resolve the contradiction between existing watermarking methods—which are not compatible with the watermark’s ability to resist geometric attacks—and robustness, a robust multi-watermarking algorithm suitable for medical images is proposed. First, the visual feature vector of the medical image was obtained by dual-tree complex wavelet transform and discrete cosine transform (DTCWT-DCT) to perform multi-watermark embedding and extraction. Then, the multi-watermark was preprocessed using the henon map chaotic encryption technology to strengthen the security of watermark information, and combined with the concept of zero watermark to make the watermark able to resist both conventional and geometric attacks. Experimental results show that the proposed algorithm can effectively extract watermark information; it implements zero watermarking and blind extraction. Compared with existing watermark technology, it has good performance in terms of its robustness and resistance to geometric attacks and conventional attacks, especially in geometric attacks.
APA, Harvard, Vancouver, ISO, and other styles
50

Bander Albarakati, Abdullah Basuhail, Gibrael Abo Samra, Bander Albarakati, Abdullah Basuhail, Gibrael Abo Samra. "A Fuzzy Controlled Image Watermarking Based on a Dual Transform Technique." journal of king abdulaziz university computing and information technology sciences 5, no. 1 (May 27, 2016): 83–92. http://dx.doi.org/10.4197/comp.5-1.6.

Full text
Abstract:
This paper presents a new watermarking technique using hybrid image transforms that aims to be very robust against attacks. It also aims to reduce the amount of distortion created from embedding the watermark as much as possible, and have good capacity. The proposed system uses a hybrid watermarking technique that is based on Non-Subsampled Contourlet Transform and Discrete Wavelet Transform. In addition, the proposed system makes use of the fuzzy logic to automatically choose the strength of the embedded watermark. Furthermore, the system uses Spread Spectrum Code Division Multiple Access to embed and recover the watermark after transforming the image. To enhance recoverability of the watermarks, the system uses a high level of redundancy in the embedding process, which allows a powerful Error Correcting Code to be used in the recovery process. The fuzzy logic is used to help the system in producing watermarked images that reserve their quality and not be heavily altered after embedding the watermark. Experiments were performed to measure the quality of the proposed system using JPEG compression attacks. The results showed that the proposed system is robust and has good capacity and imperceptibly although it suffers from being computationally complex.
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!

To the bibliography