To see the other types of publications on this topic, follow the link: SECURE WATERMARKING.

Dissertations / Theses on the topic 'SECURE WATERMARKING'

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the top 30 dissertations / theses for your research on the topic 'SECURE WATERMARKING.'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Browse dissertations / theses on a wide variety of disciplines and organise your bibliography correctly.

1

Noorkami, Maneli. "Secure and Robust Compressed-Domain Video Watermarking for H.264." Diss., Georgia Institute of Technology, 2007. http://hdl.handle.net/1853/16267.

Full text
Abstract:
The objective of this thesis is to present a robust watermarking algorithm for H.264 and to address challenges in compressed-domain video watermarking. To embed a perceptually invisible watermark in highly compressed H.264 video, we use a human visual model. We extend Watson's human visual model developed for 8x8 DCT block to the 4x4 block used in H.264. In addition, we use P-frames to increase the watermark payload. The challenge in embedding the watermark in P-frames is that the video bit rate can increase significantly. By using the structure of the encoder, we significantly reduce the incr
APA, Harvard, Vancouver, ISO, and other styles
2

Schäfer, Marcel [Verfasser], Michael [Akademischer Betreuer] Waidner, Rüdiger [Akademischer Betreuer] Grimm, and Martin [Akademischer Betreuer] Steinebach. "Collusion Secure Fingerprint Watermarking / Marcel Schäfer. Betreuer: Michael Waidner ; Rüdiger Grimm ; Martin Steinebach." Darmstadt : Universitäts- und Landesbibliothek Darmstadt, 2016. http://d-nb.info/1112332782/34.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Schäfer, Marcel [Verfasser], Michael Akademischer Betreuer] Waidner, Rüdiger [Akademischer Betreuer] Grimm, and Martin [Akademischer Betreuer] [Steinebach. "Collusion Secure Fingerprint Watermarking / Marcel Schäfer. Betreuer: Michael Waidner ; Rüdiger Grimm ; Martin Steinebach." Darmstadt : Universitäts- und Landesbibliothek Darmstadt, 2016. http://nbn-resolving.de/urn:nbn:de:tuda-tuprints-52449.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Okada, Mitsuo. "Asymmetric and Pseudo-Blind Digital Watermarking for Fair and Privacy-Secure Digital Content Trading." 京都大学 (Kyoto University), 2011. http://hdl.handle.net/2433/147349.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Adamo, Oluwayomi Bamidele. "VLSI Architecture and FPGA Prototyping of a Secure Digital Camera for Biometric Application." Thesis, University of North Texas, 2006. https://digital.library.unt.edu/ark:/67531/metadc5393/.

Full text
Abstract:
This thesis presents a secure digital camera (SDC) that inserts biometric data into images found in forms of identification such as the newly proposed electronic passport. However, putting biometric data in passports makes the data vulnerable for theft, causing privacy related issues. An effective solution to combating unauthorized access such as skimming (obtaining data from the passport's owner who did not willingly submit the data) or eavesdropping (intercepting information as it moves from the chip to the reader) could be judicious use of watermarking and encryption at the source end of t
APA, Harvard, Vancouver, ISO, and other styles
6

Al-Nu'aimi, Abdallah S. N. A. "Design, Implementation and Performance Evaluation of Robust and Secure Watermarking Techniques for Digital Coloured Images. Designing new adaptive and robust imaging techniques for embedding and extracting 2D watermarks in the spatial and transform domain using imaging and signal processing techniques." Thesis, University of Bradford, 2009. http://hdl.handle.net/10454/4255.

Full text
Abstract:
The tremendous spreading of multimedia via Internet motivates the watermarking as a new promising technology for copyright protection. This work is concerned with the design and development of novel algorithms in the spatial and transform domains for robust and secure watermarking of coloured images. These algorithms are adaptive, content-dependent and compatible with the Human Visual System (HVS). The host channels have the ability to host a large information payload. Furthermore, it has enough capacity to accept multiple watermarks. Abstract This work achieves several contributions in the
APA, Harvard, Vancouver, ISO, and other styles
7

Al-Nu'aimi, Abdallah Saleem Na. "Design, implementation and performance evaluation of robust and secure watermarking techniques for digital coloured images : designing new adaptive and robust imaging techniques for embedding and extracting 2D watermarks in the spatial and transform domain using imaging and signal processing techniques." Thesis, University of Bradford, 2009. http://hdl.handle.net/10454/4255.

Full text
Abstract:
The tremendous spreading of multimedia via Internet motivates the watermarking as a new promising technology for copyright protection. This work is concerned with the design and development of novel algorithms in the spatial and transform domains for robust and secure watermarking of coloured images. These algorithms are adaptive, content-dependent and compatible with the Human Visual System (HVS). The host channels have the ability to host a large information payload. Furthermore, it has enough capacity to accept multiple watermarks. Abstract This work achieves several contributions in the ar
APA, Harvard, Vancouver, ISO, and other styles
8

Bellafqira, Reda. "Chiffrement homomorphe et recherche par le contenu sécurisé de données externalisées et mutualisées : Application à l'imagerie médicale et l'aide au diagnostic." Thesis, Ecole nationale supérieure Mines-Télécom Atlantique Bretagne Pays de la Loire, 2017. http://www.theses.fr/2017IMTA0063.

Full text
Abstract:
La mutualisation et l'externalisation de données concernent de nombreux domaines y compris celui de la santé. Au-delà de la réduction des coûts de maintenance, l'intérêt est d'améliorer la prise en charge des patients par le déploiement d'outils d'aide au diagnostic fondés sur la réutilisation des données. Dans un tel environnement, la sécurité des données (confidentialité, intégrité et traçabilité) est un enjeu majeur. C'est dans ce contexte que s'inscrivent ces travaux de thèse. Ils concernent en particulier la sécurisation des techniques de recherche d'images par le contenu (CBIR) et de « m
APA, Harvard, Vancouver, ISO, and other styles
9

Almohammad, Adel. "Steganography-based secret and reliable communications : improving steganographic capacity and imperceptibility." Thesis, Brunel University, 2010. http://bura.brunel.ac.uk/handle/2438/4634.

Full text
Abstract:
Unlike encryption, steganography hides the very existence of secret information rather than hiding its meaning only. Image based steganography is the most common system used since digital images are widely used over the Internet and Web. However, the capacity is mostly limited and restricted by the size of cover images. In addition, there is a tradeoff between both steganographic capacity and stego image quality. Therefore, increasing steganographic capacity and enhancing stego image quality are still challenges, and this is exactly our research main aim. Related to this, we also investigate h
APA, Harvard, Vancouver, ISO, and other styles
10

Soderi, S. (Simone). "Evaluation of industrial wireless communications systems’ security." Doctoral thesis, Oulun yliopisto, 2016. http://urn.fi/urn:isbn:9789526212463.

Full text
Abstract:
Abstract The worldwide success of wireless communications was originally fueled by the possibility to replace existing cables with wireless solutions. This phenomenon imposed the development of security engineering as a multidisciplinary field. Although wireless solutions can reduce installation costs and allow introducing new services, the end–users expect it to have the same level of security as they would normally have with wired solutions. Secure communications is an important part of the overall security of industrial wireless communications systems (IWCS). The aim of this thesis is to de
APA, Harvard, Vancouver, ISO, and other styles
11

Schäfer, Marcel. "Collusion Secure Fingerprint Watermarking." Phd thesis, 2016. https://tuprints.ulb.tu-darmstadt.de/5244/1/Dissertationsschrift_tuprintversion2_15Jan2016.pdf.

Full text
Abstract:
Identifying perpetrators via watermarking technology has proven of value in media copyright infringements. To enable tracing back unauthorizedly re-distributed media copies that were manipulated by a collusion attack, collusion secure fingerprinting codes are embedded into the copies via watermarking technology. Fingerprinting codes are mathematical codes designed to resist collusion attacks by means of probabilistically generated codewords and suitable tracing algorithms. However, embedding fingerprinting codes as watermark messages is challenging. This is because of its enormous code lengt
APA, Harvard, Vancouver, ISO, and other styles
12

Hsu, Hsiao-Cheng, and 許孝成. "Wavelet Base Secure Spread Spectrum Image Watermarking." Thesis, 2003. http://ndltd.ncl.edu.tw/handle/45502910987963543672.

Full text
Abstract:
碩士<br>國立中興大學<br>電機工程學系<br>91<br>The digital watermarks should be hided and invisible by the human visual system. The spread spectrum techniques are used to achieve the goal. The original image is transformed form spatial domain to frequency domain by using discrete wavelet transform (DWT). We insert the spread spectrum PN-code and use modulo-2 operator to secure the watermark. The watermark is embedded into the LL3 sub-band after 3 times DWT. A multilevel detection is proposed to effectively watermark which can increase the retrieval performance. Form the experimental result, the proposed meth
APA, Harvard, Vancouver, ISO, and other styles
13

Sun, Jia-Hao, and 孫家豪. "Secure Client Side Watermarking with Limited Key Size." Thesis, 2014. http://ndltd.ncl.edu.tw/handle/01833772426116541218.

Full text
Abstract:
碩士<br>國立臺灣大學<br>資訊工程學研究所<br>102<br>Digital watermarking techniques enable digital-content owners to protect their property rights by embedding right-related messages into the host content before delivery. With the rapid growth of E-commerce, digital-content broadcasting has become the main stream of product delivering, which makes watermark embedding a must for protecting the owner&apos;&apos;s property rights. In such a large service system, security, computational efficiency, and communicational overhead are the most challenging issues to service providers. In other words, there is an urgent
APA, Harvard, Vancouver, ISO, and other styles
14

Sun, Cheng-Chung, and 孫正忠. "Secure Spread Spectrum Watermarking based on Trellis Coding." Thesis, 2003. http://ndltd.ncl.edu.tw/handle/17443224180632437492.

Full text
Abstract:
碩士<br>國立臺灣科技大學<br>電子工程系<br>91<br>ABSTRACT Digital watermarking is a technique that aims at hiding a message signal in a multimedia signal (e.g. speech, image, video signal, etc.) for copyright claim, authentication, device control, and broadcast monitoring, etc. In this thesis, we focus on the topic of embedding watermarks into still images. We hope that the embedded watermark induces low impairment to the original image. We also hope that the embedded watermark possesses enough robustness against tampering (intentional or unintentional) su®ered when it is stored or trans
APA, Harvard, Vancouver, ISO, and other styles
15

SINHA, ASHISH. "SECURE WATERMARKING OF DIGITAL DATA FOR COPYRIGHT PROTECTION." Thesis, 2022. http://dspace.dtu.ac.in:8080/jspui/handle/repository/19167.

Full text
Abstract:
The exponential growth of technologies, media to access the same and simplification of the related processes has spurred an unprecedented growth in this domain. When the digital media is generated, transmitted and distributed over multiple devices and interconnecting networks, maintenance of its authenticity and ensuring the intellectual rights of the owners and authorized users is of utmost significance. With the progressive evolution in technology and distribution networks, prevention of widespread dissemination of sensitive and private information is an arduous challenge. The at
APA, Harvard, Vancouver, ISO, and other styles
16

Blythe, Paul A. "Biometric authentication system for secure digital cameras." 2005. http://wwwlib.umi.com/cr/binghamton/main.

Full text
APA, Harvard, Vancouver, ISO, and other styles
17

"Digital video watermarking techniques for secure multimedia creation and delivery." 2004. http://library.cuhk.edu.hk/record=b5891980.

Full text
Abstract:
Chan Pik-Wah.<br>Thesis (M.Phil.)--Chinese University of Hong Kong, 2004.<br>Includes bibliographical references (leaves 111-130).<br>Abstracts in English and Chinese.<br>Abstract --- p.i<br>Acknowledgement --- p.iv<br>Chapter 1 --- Introduction --- p.1<br>Chapter 1.1 --- Background --- p.1<br>Chapter 1.2 --- Research Objective --- p.3<br>Chapter 1.3 --- Contributions --- p.4<br>Chapter 1.4 --- The Structure of this Thesis --- p.6<br>Chapter 2 --- Literature Review --- p.7<br>Chapter 2.1 --- Security in Multimedia Communications --- p.8<br>Chapter 2.2 --- Cryptography --- p.11<br>Cha
APA, Harvard, Vancouver, ISO, and other styles
18

Kuo, Chun-Ting, and 郭俊廷. "Minimally, Just Noticeable Distortion and Secure Model for Image Watermarking." Thesis, 2001. http://ndltd.ncl.edu.tw/handle/69082799041319943853.

Full text
Abstract:
碩士<br>東海大學<br>資訊科學系<br>89<br>The characteristic of Internet is easy to get, to copy and to modify media, so it is easy for anyone to get the digital multimedia without via the legal way. The protection of the intellectual property for digital media is very necessary. The digital watermarking can provide a good solution for protecting the intellectual property of digital multimedia. The general watermarking techniques can not make good decision between the quality of image and the robustness of the watermark. In order to solve the problem, we employ the just noticeable distortion (JN
APA, Harvard, Vancouver, ISO, and other styles
19

Takahashi, Fábio Haruo Touceira. "Integration and optimization of collusion secure fingerprinting in image watermarking." Master's thesis, 2012. http://hdl.handle.net/10216/68411.

Full text
Abstract:
Estágio realizado na Fraunhofer SIT - e orientado pelo Dr. Huajian Liu e pelo Dr. Marcel Schäfer<br>Tese de mestrado integrado. Engenharia Electrotécnica e de Computadores. Faculdade de Engenharia. Universidade do Porto. 2012
APA, Harvard, Vancouver, ISO, and other styles
20

Zhong, Wen-Lan, and 鍾文藍. "A Robust and Secure Watermarking Scheme with Chinese Remainder Theorem." Thesis, 2016. http://ndltd.ncl.edu.tw/handle/81798336912532684380.

Full text
Abstract:
碩士<br>國立臺灣大學<br>資訊工程學研究所<br>104<br>With the rapid growth of e-commerce, consumers getting used to buy goods from e-trading websites, and buying digital media such as music, images, and videos directly online become more and more popular. To protect the digital products, digital watermarking is a commonly adopted approach. According to some relative researches, general watermarking schemes are not robust enough while undergoing the geometric attacks. Facing this challenge, the well-performed moment-based watermarking techniques are utilized to against these attacks. Moreover, in our commerce mo
APA, Harvard, Vancouver, ISO, and other styles
21

Takahashi, Fábio Haruo Touceira. "Integration and optimization of collusion secure fingerprinting in image watermarking." Dissertação, 2012. http://hdl.handle.net/10216/68411.

Full text
Abstract:
Estágio realizado na Fraunhofer SIT - e orientado pelo Dr. Huajian Liu e pelo Dr. Marcel Schäfer<br>Tese de mestrado integrado. Engenharia Electrotécnica e de Computadores. Faculdade de Engenharia. Universidade do Porto. 2012
APA, Harvard, Vancouver, ISO, and other styles
22

Chen, Tsai-Hsing, and 陳再興. "A Secure Watermarking Technique for the Object-Oriented Video Coding System." Thesis, 2003. http://ndltd.ncl.edu.tw/handle/69338590472098370286.

Full text
Abstract:
碩士<br>中華大學<br>資訊工程學系碩士班<br>91<br>The conventional public watermarking systems address the problems of invisible watermark embedding technique and robust resistance for various kinds of attacks including the compression, filtering, and geometric transformation etc. However, some emerging counterfeit attacks make the authentication process difficult and then the rightful ownership is hard to be claimed. Therefore, the watermark encryption problem should be considered in developing the public watermarking system to resist the counterfeit attacks. In this thesis, a two-stage watermark embedding te
APA, Harvard, Vancouver, ISO, and other styles
23

MONIKA. "DWT BASED DUAL WATERMARKING SCHEME FOR RIGHTFUL OWNERSHIP AND SECURE IMAGE AUTHENTICATION." Thesis, 2013. http://dspace.dtu.ac.in:8080/jspui/handle/repository/16128.

Full text
Abstract:
The availability of versatile multimedia processing software and the far-reaching coverage of the interconnected networks have facilitated flawless copying, manipulations and distribution of the digital multimedia (digital video, audio, text, and images). The ever advancing storage and retrieval technologies have also smoothed the way for large-scale multimedia database applications. However, abuses of these facilities and technologies pose pressing threats to multimedia security management in general, and multimedia copyright protection and content integrity verification in particu
APA, Harvard, Vancouver, ISO, and other styles
24

Lai, Chin-Jen, and 賴致仁. "H.264 video watermarking with secret image sharing." Thesis, 2008. http://ndltd.ncl.edu.tw/handle/78848435908125686563.

Full text
Abstract:
碩士<br>國立宜蘭大學<br>資訊工程研究所碩士班<br>96<br>H.264 is a new advanced standard. The applications of video on Internet or wireless networks become very popular nowadays. However, these digital contents can be easily modified and copied by end users. Hence copyright protection, copy control and integrity verification has become important issues in recent years. Digital watermarking is a means of claiming ownership of a data source. Therefore, digital watermarking can solve the problem. In the proposed system, watermark will be through pre-processing. In order to enhance security of system, our system use
APA, Harvard, Vancouver, ISO, and other styles
25

Yi-Lin, Liu, and 劉怡伶. "Digital watermarking based on visual secret sharing scheme and wavelet transform." Thesis, 2008. http://ndltd.ncl.edu.tw/handle/43142958106004968141.

Full text
Abstract:
碩士<br>中國文化大學<br>資訊管理研究所<br>96<br>The intellectual property rights protection is an important issue for digital data, and watermarking is a possible solution to resolving the dispute about the ownership. In this paper, we design a digital watermarking scheme based on visual cryptography. Applying visual cryptography, we split the digital watermark into two shares. One of the share is embedded into the wavelet coefficients of the original image by means of modular op-erations, and the other one is held by the author to verify the ownership of the original image. When proving the ownership, we ex
APA, Harvard, Vancouver, ISO, and other styles
26

Das, Chinmayee, and Swetalina Panigrahi. "Hardware Implementation of a Secured Digital Camera with Built In Watermarking and Encryption Facility." Thesis, 2012. http://ethesis.nitrkl.ac.in/3527/1/Hardware_Implementation_of_Secure_Digital_Camera_with_Built_in_Watermarking_and_Encryption_Facility_by_108EI008%2C_108EI037.pdf.

Full text
Abstract:
The objective is to design an efficient hardware implementation of a secure digital camera for real time digital rights management (DRM) in embedded systems incorporating watermarking and encryption. This emerging field addresses issues related to the ownership and intellectual property rights of digital content. A novel invisible watermarking algorithm is proposed which uses median of each image block to calculate the embedding factor. The performance of the proposed algorithm is compared with the earlier proposed permutation and CRT based algorithms. It is seen that the watermark is successf
APA, Harvard, Vancouver, ISO, and other styles
27

Jian, Jh-Jie, and 簡智傑. "A Color Image Watermarking Scheme Based on Secret Sharing and Wavelet Transform." Thesis, 2006. http://ndltd.ncl.edu.tw/handle/76655231388999552208.

Full text
Abstract:
碩士<br>大同大學<br>資訊工程學系(所)<br>94<br>This thesis proposes a copyright protection scheme for color images using image secret sharing, Just-Noticeable-Distortion (JND) model and wavelet transform. The scheme contains two phases: the watermark embedding phase and the watermark extracting phase. In the watermark embedding phase, the color space of the color host image is first converted from RGB to YCbCr. Then a special sampling plane is created from the YCbCr color space. Next, the discrete wavelet transform is used to extract the features from the sampling plane. Then, a principal share image is gen
APA, Harvard, Vancouver, ISO, and other styles
28

Wei, Huang Hsin, and 黃信維. "Multi-Secret Digital Watermarking Based on Visual Cryptography and Discrete Wavelet Transform." Thesis, 2010. http://ndltd.ncl.edu.tw/handle/51403398244750839979.

Full text
Abstract:
碩士<br>嶺東科技大學<br>資訊科技應用研究所<br>98<br>This dissertation proposes a digital watermarking technique that will safeguard the digital image owners’ copyright. This technique bases on the discrete wavelet transform at watermark insertion and visual cryptography sharing mechanism to propose the “pixel extended model” and “dual watermark sharing method” design to protect both the share image and the personal key share image. The process breaks up the share image and hides the pieces in the wavelet coefficient, and the owner keeps another share image as the key. All owners have dual watermark authentica
APA, Harvard, Vancouver, ISO, and other styles
29

柯宏叡. "The Watermarking Scheme Applied on the Intellectual Property Recognition Using the Secret Sharing Technique." Thesis, 2003. http://ndltd.ncl.edu.tw/handle/4upzk7.

Full text
APA, Harvard, Vancouver, ISO, and other styles
30

Tzung-De, Lin, and 林宗德. "A RGB Color Watermarking for Grayscale Image based on (2, 2) Threshold Secret Sharing Schemes." Thesis, 2013. http://ndltd.ncl.edu.tw/handle/72969245393546146077.

Full text
Abstract:
碩士<br>國立彰化師範大學<br>工業教育與技術學系<br>101<br>Due to the combination of computer and communication technology, more and more digital data are transmitted and exchanged on network. It has created an environment that the digital information is easy to spread, copy, and modify. This has led to the need for effective copyright protection techniques. In the past studies, the watermark by visual cryptography for grayscale is only binary, grayscale, or a four-color image. So this studies embed RGB color watermark in a grayscale image based on (2, 2) threshold secret sharing schemes. We propose two strategies
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!