Dissertations / Theses on the topic 'SECURE WATERMARKING'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the top 30 dissertations / theses for your research on the topic 'SECURE WATERMARKING.'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Browse dissertations / theses on a wide variety of disciplines and organise your bibliography correctly.
Noorkami, Maneli. "Secure and Robust Compressed-Domain Video Watermarking for H.264." Diss., Georgia Institute of Technology, 2007. http://hdl.handle.net/1853/16267.
Full textSchäfer, Marcel [Verfasser], Michael [Akademischer Betreuer] Waidner, Rüdiger [Akademischer Betreuer] Grimm, and Martin [Akademischer Betreuer] Steinebach. "Collusion Secure Fingerprint Watermarking / Marcel Schäfer. Betreuer: Michael Waidner ; Rüdiger Grimm ; Martin Steinebach." Darmstadt : Universitäts- und Landesbibliothek Darmstadt, 2016. http://d-nb.info/1112332782/34.
Full textSchäfer, Marcel [Verfasser], Michael Akademischer Betreuer] Waidner, Rüdiger [Akademischer Betreuer] Grimm, and Martin [Akademischer Betreuer] [Steinebach. "Collusion Secure Fingerprint Watermarking / Marcel Schäfer. Betreuer: Michael Waidner ; Rüdiger Grimm ; Martin Steinebach." Darmstadt : Universitäts- und Landesbibliothek Darmstadt, 2016. http://nbn-resolving.de/urn:nbn:de:tuda-tuprints-52449.
Full textOkada, Mitsuo. "Asymmetric and Pseudo-Blind Digital Watermarking for Fair and Privacy-Secure Digital Content Trading." 京都大学 (Kyoto University), 2011. http://hdl.handle.net/2433/147349.
Full textAdamo, Oluwayomi Bamidele. "VLSI Architecture and FPGA Prototyping of a Secure Digital Camera for Biometric Application." Thesis, University of North Texas, 2006. https://digital.library.unt.edu/ark:/67531/metadc5393/.
Full textAl-Nu'aimi, Abdallah S. N. A. "Design, Implementation and Performance Evaluation of Robust and Secure Watermarking Techniques for Digital Coloured Images. Designing new adaptive and robust imaging techniques for embedding and extracting 2D watermarks in the spatial and transform domain using imaging and signal processing techniques." Thesis, University of Bradford, 2009. http://hdl.handle.net/10454/4255.
Full textAl-Nu'aimi, Abdallah Saleem Na. "Design, implementation and performance evaluation of robust and secure watermarking techniques for digital coloured images : designing new adaptive and robust imaging techniques for embedding and extracting 2D watermarks in the spatial and transform domain using imaging and signal processing techniques." Thesis, University of Bradford, 2009. http://hdl.handle.net/10454/4255.
Full textBellafqira, Reda. "Chiffrement homomorphe et recherche par le contenu sécurisé de données externalisées et mutualisées : Application à l'imagerie médicale et l'aide au diagnostic." Thesis, Ecole nationale supérieure Mines-Télécom Atlantique Bretagne Pays de la Loire, 2017. http://www.theses.fr/2017IMTA0063.
Full textCloud computing has emerged as a successful paradigm allowing individuals and companies to store and process large amounts of data without a need to purchase and maintain their own networks and computer systems. In healthcare for example, different initiatives aim at sharing medical images and Personal Health Records (PHR) in between health professionals or hospitals with the help of the cloud. In such an environment, data security (confidentiality, integrity and traceability) is a major issue. In this context that these thesis works, it concerns in particular the securing of Content Based Image Retrieval (CBIR) techniques and machine learning (ML) which are at the heart of diagnostic decision support systems. These techniques make it possible to find similar images to an image not yet interpreted. The goal is to define approaches that can exploit secure externalized data and enable a cloud to provide a diagnostic support. Several mechanisms allow the processing of encrypted data, but most are dependent on interactions between different entities (the user, the cloud or a trusted third party) and must be combined judiciously so as to not leak information. During these three years of thesis, we initially focused on securing an outsourced CBIR system under the constraint of no interaction between the users and the service provider (cloud). In a second step, we have developed a secure machine learning approach based on multilayer perceptron (MLP), whose learning phase can be outsourced in a secure way, the challenge being to ensure the convergence of the MLP. All the data and parameters of the model are encrypted using homomorphic encryption. Because these systems need to use information from multiple sources, each of which outsources its encrypted data under its own key, we are interested in the problem of sharing encrypted data. A problem known by the "Proxy Re-Encryption" (PRE) schemes. In this context, we have proposed the first PRE scheme that allows both the sharing and the processing of encrypted data. We also worked on watermarking scheme over encrypted data in order to trace and verify the integrity of data in this shared environment. The embedded message is accessible whether or not the image is encrypted and provides several services
Almohammad, Adel. "Steganography-based secret and reliable communications : improving steganographic capacity and imperceptibility." Thesis, Brunel University, 2010. http://bura.brunel.ac.uk/handle/2438/4634.
Full textSoderi, S. (Simone). "Evaluation of industrial wireless communications systems’ security." Doctoral thesis, Oulun yliopisto, 2016. http://urn.fi/urn:isbn:9789526212463.
Full textTiivistelmä Langattoman tietoliikenteen maailmanlaajuista suosiota kiihdytti alun perin mahdollisuus korvata tietoliikennejärjestelmissä käytetyt kaapelit langattomilla ratkaisuilla. Ilmiö lisäsi myös tarvetta kehittää alan turvatekniikkaa monialaisen tutkimuksen pohjalta. Vaikka langattomat ratkaisut merkitsevät pienempiä asennuskustannuksia ja tarjoavat mahdollisuuksia luoda uudenlaisia palveluja, järjestelmien loppukäyttäjät edellyttävät kuitenkin niiden turvallisuuden olevan vastaavalla tasolla kuin langallisissa verkoissa. Myös teollisuuden langattomien tietoliikennejärjestelmen turvallisuus riippuu pitkälti viestintäkanavien turvallisuudesta. Väitöksen tavoitteena on kehittää uusia menetelmiä, joilla teollisuuden langattomat tietoliikennejärjestelmät voitaisiin turvata. Väitöksessä kehitetään toimenpiteitä tietoliikennejärjestelmien luottamuksellisuuteen ja koskemattomuuteen kohdistuvia hyökkäyksiä vastaan ja toteutetaan turvallisuusarviointi, joka kattaa järjestelmän protokollakerroksen sekä sähkömagneettisen ja fyysisen kerroksen. Väitöksen ensimmäisessä osassa hyödynnetään HIP–protokollaa (Host Identity Protocol) liikennevälineen sisäisen tietoliikennejärjestelmän turvallisuuden varmistamisessa. Lisäksi siinä kuvataan simulaatiot ja mittaushankkeet, joiden tavoitteena on arvioida käytetyn protokollan turvallisuusvaikutuksia esteettömän (line–of–sight, LOS) ja esteellisen (non–line–of–sight, NLOS) näköyhteyden tapauksissa. Sähkömagneettinen analyysi on tärkeä vaihe turvajärjestelmien kehitysprosessissa. Järjestelmissä käytetään yhä enemmän pieniä integroituja piirejä, mikä voi myös altistaa ne sähkömagneettisille (electromagnetic, EM) häiriöille. Väitöksessä tutkitaan lähikenttä–kaukokenttä -muunnokseen perustuvan arviointimenetelmän avulla sähkömagneettisen vuotosäteilyn tasoa. Lisäksi perehdytään testattavan laitteen (device under test, DUT) virtuaaliseen EM–liitäntään ja kuvataan, miten vastaavaa liitäntää voidaan hyödyntää palvelunestohyökkäyksissä. Väitöksessä tutkitaan myös tehokasta häirintämallia ja validoidaan teoreettisten laskelmien tulokset kokeellisesti. Lopuksi väitöksessä keskitytään tietoliikennejärjestelmän fyysisen kerroksen turvallisuuteen ja kehitetään kaksi algoritmia. Aktiivisen radiotaajuisen tunnistusmenetelmän avulla voidaan vaihtaa julkisia avaimia turvallista tietoliikenneyhteyttä muodostettaessa. Lisäksi esitellään vesileimausmenetelmään perustuva fyysisen kerroksen salausmenetelmä, WBPLSec. WBPLSec luo vastaanottimen ympärille suoja–alueen, minkä ansiosta se vaikuttaa analyysin ja tutkimustulosten perusteella olevan tehokas menetelmä toteuttaa fyysisen kerroksen suojaus
Schäfer, Marcel. "Collusion Secure Fingerprint Watermarking." Phd thesis, 2016. https://tuprints.ulb.tu-darmstadt.de/5244/1/Dissertationsschrift_tuprintversion2_15Jan2016.pdf.
Full textHsu, Hsiao-Cheng, and 許孝成. "Wavelet Base Secure Spread Spectrum Image Watermarking." Thesis, 2003. http://ndltd.ncl.edu.tw/handle/45502910987963543672.
Full text國立中興大學
電機工程學系
91
The digital watermarks should be hided and invisible by the human visual system. The spread spectrum techniques are used to achieve the goal. The original image is transformed form spatial domain to frequency domain by using discrete wavelet transform (DWT). We insert the spread spectrum PN-code and use modulo-2 operator to secure the watermark. The watermark is embedded into the LL3 sub-band after 3 times DWT. A multilevel detection is proposed to effectively watermark which can increase the retrieval performance. Form the experimental result, the proposed method is robust even under heavy attacks. For example, big compression ratio for JPEG and JPEG 2000, the retrieval watermarks still survive.
Sun, Jia-Hao, and 孫家豪. "Secure Client Side Watermarking with Limited Key Size." Thesis, 2014. http://ndltd.ncl.edu.tw/handle/01833772426116541218.
Full text國立臺灣大學
資訊工程學研究所
102
Digital watermarking techniques enable digital-content owners to protect their property rights by embedding right-related messages into the host content before delivery. With the rapid growth of E-commerce, digital-content broadcasting has become the main stream of product delivering, which makes watermark embedding a must for protecting the owner''s property rights. In such a large service system, security, computational efficiency, and communicational overhead are the most challenging issues to service providers. In other words, there is an urgent need for developing robust and efficient watermark schemes for securing a digital content delivering system. In this paper, a novel secure client side watermarking scheme is proposed. We illustrate the reasons why a traditional watermarking scheme may not suit for a large digital-content broadcasting service and the ways how to fix the associated problems, in the proposed approach. Since the newly proposed scheme can support both visible and invisible watermarks, it is applicable to Cloud-based digital-content broadcasting services, such as Bookstores in Amazon and Google, iTunes in Apple, and Streaming Media in Netflix.
Sun, Cheng-Chung, and 孫正忠. "Secure Spread Spectrum Watermarking based on Trellis Coding." Thesis, 2003. http://ndltd.ncl.edu.tw/handle/17443224180632437492.
Full text國立臺灣科技大學
電子工程系
91
ABSTRACT Digital watermarking is a technique that aims at hiding a message signal in a multimedia signal (e.g. speech, image, video signal, etc.) for copyright claim, authentication, device control, and broadcast monitoring, etc. In this thesis, we focus on the topic of embedding watermarks into still images. We hope that the embedded watermark induces low impairment to the original image. We also hope that the embedded watermark possesses enough robustness against tampering (intentional or unintentional) su®ered when it is stored or transmitted. We propose to scramble the watermark with pseudo-noise (PN) or orthogonal codes before it is embedded into an image. In terms of the communication scenario, this operation has the e®ect of spectrum spreading, which turns the watermark signal into additive white Gaussian noise (AWGN). In the extraction of the watermark, the aforementioned PN codes are applied once more to the watermarked image, in the meantime spectrum-spreading the original image and thus turning it into AWGN. This original-image-turned AWGN makes some watermark bits been detected incorrectly. In fact, there are some things more that are turned into AWGN, in addition to the original image. The e®ects of tampering operations such as quantization, compression, filtering, or even jamming, are reduced to AWGN as well. It is natural to consider the possibility of incorporating error correction coding (ECC) into the watermarking scheme to facilitate reduction of the watermark bit error rate (BER). We expect that among the various ECC techniques, trellis based schemes (e.g. trellis-coded modulation (TCM) and turbo code) should be adopted. Due to the similarity between the PN/orthogonal coded watermarking and the spread-spectrum communication, it is natural that, following similar derivations regarding data BER in the latter, we derive certain explicit quantitative relationship regarding the trade-o® between the watermark BER and the distortion su®ered by the original image. Finally, we want to point out that the PN codes can be used as keys for secrecy purpose. If we design a scheme to properly set the accessibility of the PN codes to various users of the watermarked images, this thesis may lead to a work that provides the functions of secrecy and authentication, in addition to copyright claim. Keywords : watermark, pseudo-noise code, trellis-coded modulation, turbo code, spread spectrum
SINHA, ASHISH. "SECURE WATERMARKING OF DIGITAL DATA FOR COPYRIGHT PROTECTION." Thesis, 2022. http://dspace.dtu.ac.in:8080/jspui/handle/repository/19167.
Full textBlythe, Paul A. "Biometric authentication system for secure digital cameras." 2005. http://wwwlib.umi.com/cr/binghamton/main.
Full text"Digital video watermarking techniques for secure multimedia creation and delivery." 2004. http://library.cuhk.edu.hk/record=b5891980.
Full textThesis (M.Phil.)--Chinese University of Hong Kong, 2004.
Includes bibliographical references (leaves 111-130).
Abstracts in English and Chinese.
Abstract --- p.i
Acknowledgement --- p.iv
Chapter 1 --- Introduction --- p.1
Chapter 1.1 --- Background --- p.1
Chapter 1.2 --- Research Objective --- p.3
Chapter 1.3 --- Contributions --- p.4
Chapter 1.4 --- The Structure of this Thesis --- p.6
Chapter 2 --- Literature Review --- p.7
Chapter 2.1 --- Security in Multimedia Communications --- p.8
Chapter 2.2 --- Cryptography --- p.11
Chapter 2.3 --- Digital Watermarking --- p.14
Chapter 2.4 --- Essential Ingredients for Video Watermarking --- p.16
Chapter 2.4.1 --- Fidelity --- p.16
Chapter 2.4.2 --- Robustness --- p.17
Chapter 2.4.3 --- Use of Keys --- p.19
Chapter 2.4.4 --- Blind Detection --- p.20
Chapter 2.4.5 --- Capacity and Speed --- p.20
Chapter 2.4.6 --- Statistical Imperceptibility --- p.21
Chapter 2.4.7 --- Low Error Probability --- p.21
Chapter 2.4.8 --- Real-time Detector Complexity --- p.21
Chapter 2.5 --- Review on Video Watermarking Techniques --- p.22
Chapter 2.5.1 --- Video Watermarking --- p.25
Chapter 2.5.2 --- Spatial Domain Watermarks --- p.26
Chapter 2.5.3 --- Frequency Domain Watermarks --- p.30
Chapter 2.5.4 --- Watermarks Based on MPEG Coding Struc- tures --- p.35
Chapter 2.6 --- Comparison between Different Watermarking Schemes --- p.38
Chapter 3 --- Novel Watermarking Schemes --- p.42
Chapter 3.1 --- A Scene-based Video Watermarking Scheme --- p.42
Chapter 3.1.1 --- Watermark Preprocess --- p.44
Chapter 3.1.2 --- Video Preprocess --- p.46
Chapter 3.1.3 --- Watermark Embedding --- p.48
Chapter 3.1.4 --- Watermark Detection --- p.50
Chapter 3.2 --- Theoretical Analysis --- p.52
Chapter 3.2.1 --- Performance --- p.52
Chapter 3.2.2 --- Capacity --- p.56
Chapter 3.3 --- A Hybrid Watermarking Scheme --- p.60
Chapter 3.3.1 --- Visual-audio Hybrid Watermarking --- p.61
Chapter 3.3.2 --- Hybrid Approach with Different Water- marking Schemes --- p.69
Chapter 3.4 --- A Genetic Algorithm-based Video Watermarking Scheme --- p.73
Chapter 3.4.1 --- Watermarking Scheme --- p.75
Chapter 3.4.2 --- Problem Modelling --- p.76
Chapter 3.4.3 --- Chromosome Encoding --- p.79
Chapter 3.4.4 --- Genetic Operators --- p.80
Chapter 4 --- Experimental Results --- p.85
Chapter 4.1 --- Test on Robustness --- p.85
Chapter 4.1.1 --- Experiment with Frame Dropping --- p.87
Chapter 4.1.2 --- Experiment with Frame Averaging and Sta- tistical Analysis --- p.89
Chapter 4.1.3 --- Experiment with Lossy Compression --- p.90
Chapter 4.1.4 --- Test of Robustness with StirMark 4.0 --- p.92
Chapter 4.1.5 --- Overall Comparison --- p.98
Chapter 4.2 --- Test on Fidelity --- p.100
Chapter 4.2.1 --- Parameter(s) Setting --- p.101
Chapter 4.2.2 --- Evaluate with PSNR --- p.101
Chapter 4.2.3 --- Evaluate with MAD --- p.102
Chapter 4.3 --- Other Features of the Scheme --- p.105
Chapter 4.4 --- Conclusion --- p.106
Chapter 5 --- Conclusion --- p.108
Bibliography --- p.110
Kuo, Chun-Ting, and 郭俊廷. "Minimally, Just Noticeable Distortion and Secure Model for Image Watermarking." Thesis, 2001. http://ndltd.ncl.edu.tw/handle/69082799041319943853.
Full text東海大學
資訊科學系
89
The characteristic of Internet is easy to get, to copy and to modify media, so it is easy for anyone to get the digital multimedia without via the legal way. The protection of the intellectual property for digital media is very necessary. The digital watermarking can provide a good solution for protecting the intellectual property of digital multimedia. The general watermarking techniques can not make good decision between the quality of image and the robustness of the watermark. In order to solve the problem, we employ the just noticeable distortion (JND) of the human visual system (HVS) to calculate the embedded information of each pixel of the image. The minimally noticeable distortion (MND) of each pixel is used to increase the capacity of information of the embedded watermark. To increase the robustness, we also use the image block classification scheme to classify the original image, and decide the embedded information according to content feature of the block. If the content feature of block is belongs to high frequency, that are met sensitive to human vision, more information is embedded. On the other hand, if the content feature of block is belongs to low frequency, that is sensitive to human vision, the appropriate information is embedded to hold the quality of the image. To increase the invisibility and the security, the pseudo random number generator is used to spread the watermark. However, the pseudo random number generator does not provide enough security and spreading effect. In this paper, we use the accumulated generating operation to produce the spreading function, and add it to the watermark to spread watermark. Besides, the security of personal key, which gets good spreading effect and the security of operation is provided. In this paper, the protection of multimedia in the Internet, and deal with the improvement of watermarking techniques is focused. We rely on the characteristics of HVS to make good decision between the quality of image and robustness of watermark, and get the better robustness without affecting the visual quality of image. Besides, we use the accumulated generating operation of Grey system theory to spread watermark, and the security of watermark is then increasing. From several experiment results, our image watermarking technique can resist the JPEG compression, noise attack, sharpen attack, and increase the robustness. Keywords:Image watermarking, Minimally noticeable distortion, Just noticeable distortion, image block classification, Grey system theory
Takahashi, Fábio Haruo Touceira. "Integration and optimization of collusion secure fingerprinting in image watermarking." Master's thesis, 2012. http://hdl.handle.net/10216/68411.
Full textTese de mestrado integrado. Engenharia Electrotécnica e de Computadores. Faculdade de Engenharia. Universidade do Porto. 2012
Zhong, Wen-Lan, and 鍾文藍. "A Robust and Secure Watermarking Scheme with Chinese Remainder Theorem." Thesis, 2016. http://ndltd.ncl.edu.tw/handle/81798336912532684380.
Full text國立臺灣大學
資訊工程學研究所
104
With the rapid growth of e-commerce, consumers getting used to buy goods from e-trading websites, and buying digital media such as music, images, and videos directly online become more and more popular. To protect the digital products, digital watermarking is a commonly adopted approach. According to some relative researches, general watermarking schemes are not robust enough while undergoing the geometric attacks. Facing this challenge, the well-performed moment-based watermarking techniques are utilized to against these attacks. Moreover, in our commerce model, content owners sell or delegate their products to e-commerce service providers (or reselling agents) and these delegations are responsible for embedding watermarks into the content. Nevertheless, if content owner does not trust the delegations, doing encryption is helpful in protecting treasurable contents in advance. Therefore, we include an effective cryptosystem into our watermarking procedures. Since additive homomorphism is a must for directly conducting watermark embedding in the encryption domain, the well-known additive homomorphic cryptosystem: Paillier is taken into account. Finally, the encrypted content size will be enlarged, with the aid of Chinese Remainder Theorem, we will show how to deal with this commonly faced troublesome issue in doing encryption.
Takahashi, Fábio Haruo Touceira. "Integration and optimization of collusion secure fingerprinting in image watermarking." Dissertação, 2012. http://hdl.handle.net/10216/68411.
Full textTese de mestrado integrado. Engenharia Electrotécnica e de Computadores. Faculdade de Engenharia. Universidade do Porto. 2012
Chen, Tsai-Hsing, and 陳再興. "A Secure Watermarking Technique for the Object-Oriented Video Coding System." Thesis, 2003. http://ndltd.ncl.edu.tw/handle/69338590472098370286.
Full text中華大學
資訊工程學系碩士班
91
The conventional public watermarking systems address the problems of invisible watermark embedding technique and robust resistance for various kinds of attacks including the compression, filtering, and geometric transformation etc. However, some emerging counterfeit attacks make the authentication process difficult and then the rightful ownership is hard to be claimed. Therefore, the watermark encryption problem should be considered in developing the public watermarking system to resist the counterfeit attacks. In this thesis, a two-stage watermark embedding technology is developed to construct a secure watermarking technique for the object-oriented video coding system. In the first stage, the MD5 secure hash algorithm and the RSA cryptographic technique are applied to hide the watermarks into the image feature coefficients such that the watermarks may be encrypted securely. In the second stage, another watermark is embedded during the SPIHT encoding process for the partitioned video objects. By specifying the encoding priorities of the partitioned objects and the bitplane-by-bitplane shifting of these objects according to their encoding priorities, the watermark may be inserted into the empty bitplanes. Through the two-stage watermark extraction and similarity measure processes, the rightful ownership can be authenticated. Furthermore, by comparing the extracted watermarks among the wavelet subbands, the image regions that are modified by the counterfeiter may be identified. In addition, the JND functions generated by the Human Visual System (HVS) are utilized to embed the watermarks with the largest strength under the visual invisible requirement.
MONIKA. "DWT BASED DUAL WATERMARKING SCHEME FOR RIGHTFUL OWNERSHIP AND SECURE IMAGE AUTHENTICATION." Thesis, 2013. http://dspace.dtu.ac.in:8080/jspui/handle/repository/16128.
Full textLai, Chin-Jen, and 賴致仁. "H.264 video watermarking with secret image sharing." Thesis, 2008. http://ndltd.ncl.edu.tw/handle/78848435908125686563.
Full text國立宜蘭大學
資訊工程研究所碩士班
96
H.264 is a new advanced standard. The applications of video on Internet or wireless networks become very popular nowadays. However, these digital contents can be easily modified and copied by end users. Hence copyright protection, copy control and integrity verification has become important issues in recent years. Digital watermarking is a means of claiming ownership of a data source. Therefore, digital watermarking can solve the problem. In the proposed system, watermark will be through pre-processing. In order to enhance security of system, our system used Torus Automorphisms to encrypt the watermark first. Afterward the encrypted watermark used Secret Image Sharing technology to produce several sharing image. The sharing image embedded different I Frame respectively. Our system compute the energy of block which the I Frame after transformed and quantized. We design embedding algorithm for high energy block and low energy block respectively. Each pixel of the watermark is to decide singular values of mapped block which be calculate by Singular Value Decomposition (SVD). The experimental results demonstrate, the proposed algorithm can robustly survive common image processing, such as gaussian noise, mean filter etc. Our system can extract the watermark without original video sequence. The watermark pre-processing enhanced security of our system.
Yi-Lin, Liu, and 劉怡伶. "Digital watermarking based on visual secret sharing scheme and wavelet transform." Thesis, 2008. http://ndltd.ncl.edu.tw/handle/43142958106004968141.
Full text中國文化大學
資訊管理研究所
96
The intellectual property rights protection is an important issue for digital data, and watermarking is a possible solution to resolving the dispute about the ownership. In this paper, we design a digital watermarking scheme based on visual cryptography. Applying visual cryptography, we split the digital watermark into two shares. One of the share is embedded into the wavelet coefficients of the original image by means of modular op-erations, and the other one is held by the author to verify the ownership of the original image. When proving the ownership, we extract the embedded share and combine with the author’s share. If the watermark is appeared, then the ownership is proved. The merit of our scheme is that we can verify the ownership without the original image and watermark. Moreover, the security of our scheme is assured by visual cryptography. Fi-nally, the experimental results show that our scheme is robust enough to resist some common attacks.
Das, Chinmayee, and Swetalina Panigrahi. "Hardware Implementation of a Secured Digital Camera with Built In Watermarking and Encryption Facility." Thesis, 2012. http://ethesis.nitrkl.ac.in/3527/1/Hardware_Implementation_of_Secure_Digital_Camera_with_Built_in_Watermarking_and_Encryption_Facility_by_108EI008%2C_108EI037.pdf.
Full textJian, Jh-Jie, and 簡智傑. "A Color Image Watermarking Scheme Based on Secret Sharing and Wavelet Transform." Thesis, 2006. http://ndltd.ncl.edu.tw/handle/76655231388999552208.
Full text大同大學
資訊工程學系(所)
94
This thesis proposes a copyright protection scheme for color images using image secret sharing, Just-Noticeable-Distortion (JND) model and wavelet transform. The scheme contains two phases: the watermark embedding phase and the watermark extracting phase. In the watermark embedding phase, the color space of the color host image is first converted from RGB to YCbCr. Then a special sampling plane is created from the YCbCr color space. Next, the discrete wavelet transform is used to extract the features from the sampling plane. Then, a principal share image is generated according to the features and the watermark. Finally, the JND value and the discrete wavelet transform are used to embed the principal share image in the color host image to generate the watermarked image. In the watermark extracting phase, the principal share image is first retrieved from the suspect image. Then, an expanded watermark is reconstructed using the features of the suspect image features and the retrieved principal share image. Finally, the recovered watermark is obtained after the reduction of the expanded watermark. The recovered watermark is then verified against the original watermark to examine the copyright. The experimental results show that the proposed scheme can resist several attacks such as cropping, blurring, sharpening, scaling, JPEG compression, brightness adjustment and contrast adjustment.
Wei, Huang Hsin, and 黃信維. "Multi-Secret Digital Watermarking Based on Visual Cryptography and Discrete Wavelet Transform." Thesis, 2010. http://ndltd.ncl.edu.tw/handle/51403398244750839979.
Full text嶺東科技大學
資訊科技應用研究所
98
This dissertation proposes a digital watermarking technique that will safeguard the digital image owners’ copyright. This technique bases on the discrete wavelet transform at watermark insertion and visual cryptography sharing mechanism to propose the “pixel extended model” and “dual watermark sharing method” design to protect both the share image and the personal key share image. The process breaks up the share image and hides the pieces in the wavelet coefficient, and the owner keeps another share image as the key. All owners have dual watermark authentication, and through this method, the number of ownerships can be expanded. From security point of view, without the personal key share images, even if the hidden share images were retrieved to obtain the original share image, the watermark information remains unavailable. Applying the “four points distinguishing law” and rotating stacking the share image blocks deciphering rule, the owner’s dual watermarks can be extracted to verify the ownership.
柯宏叡. "The Watermarking Scheme Applied on the Intellectual Property Recognition Using the Secret Sharing Technique." Thesis, 2003. http://ndltd.ncl.edu.tw/handle/4upzk7.
Full textTzung-De, Lin, and 林宗德. "A RGB Color Watermarking for Grayscale Image based on (2, 2) Threshold Secret Sharing Schemes." Thesis, 2013. http://ndltd.ncl.edu.tw/handle/72969245393546146077.
Full text國立彰化師範大學
工業教育與技術學系
101
Due to the combination of computer and communication technology, more and more digital data are transmitted and exchanged on network. It has created an environment that the digital information is easy to spread, copy, and modify. This has led to the need for effective copyright protection techniques. In the past studies, the watermark by visual cryptography for grayscale is only binary, grayscale, or a four-color image. So this studies embed RGB color watermark in a grayscale image based on (2, 2) threshold secret sharing schemes. We propose two strategies: one is combined of binarzation and Toral automorphism, and the other is combined of “Neighboring relations” and Toral Automorphism. In the experiment, the attack resilience was evaluated, it contains clipping 10%, clipping 20%, clipping 30%, blurring, noise, sharpening, scaling, JPEG QF=90, JPEG QF=50, and JPEG QF=10. The approach of “Neighbor relations” reduces the destruction of the image that is em-bedded information. The watermark`s NC under the clipping 10% and clipping 20% attack were 0.857 and 0.808, in the rest of the NC were above 0.934. Finally, the study also added horizontal/vertical distortions and rotation attack in this experiment. The results show that the proposal method can effectively resist the horizontal/vertical distortion at-tacks and the rotation attack below 15 degrees.