Academic literature on the topic 'WATERMARKED DATABASE'

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the lists of relevant articles, books, theses, conference reports, and other scholarly sources on the topic 'WATERMARKED DATABASE.'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Journal articles on the topic "WATERMARKED DATABASE"

1

Lin, Chia-Chen, Thai-Son Nguyen, and Chin-Chen Chang. "LRW-CRDB: Lossless Robust Watermarking Scheme for Categorical Relational Databases." Symmetry 13, no. 11 (November 17, 2021): 2191. http://dx.doi.org/10.3390/sym13112191.

Full text
Abstract:
In 2002, Agrawal and Kiernan defined six basic requirements, including preventing illegal watermark embedding and authentication, reversibility, robustness, and others, which must be satisfied when a reversible watermark is designed for relational databases. To meet these requirements, in this paper, a lossless watermarking scheme for a categorical relational database called LRW-CRDB (lossless robust watermarking for categorical relational databases) is proposed. In our LRW-CRDB scheme, the database owner needs to generate two secret embedding keys, K1 and K2, in advance. Then, two reference sets are generated based on two different secret embedding keys and a symmetry-based data hiding strategy, and then these are used for the watermark embedding phases. Experimental results confirmed that our LRW-CRDB scheme successfully detects 100% of hidden watermarks, even when more than 95% of the watermarked relational database has been deleted. In other words, the robustness of our proposed LRW-CRDB scheme outperforms other existing schemes under a variety of possible attacks, such as alteration, sorting, deletion, and mix-match attacks.
APA, Harvard, Vancouver, ISO, and other styles
2

Hsieh, Shang-Lin, Chun-Che Chen, and Wen-Shan Shen. "Combining Digital Watermarking and Fingerprinting Techniques to Identify Copyrights for Color Images." Scientific World Journal 2014 (2014): 1–14. http://dx.doi.org/10.1155/2014/454867.

Full text
Abstract:
This paper presents a copyright identification scheme for color images that takes advantage of the complementary nature of watermarking and fingerprinting. It utilizes an authentication logo and the extracted features of the host image to generate a fingerprint, which is then stored in a database and also embedded in the host image to produce a watermarked image. When a dispute over the copyright of a suspect image occurs, the image is first processed by watermarking. If the watermark can be retrieved from the suspect image, the copyright can then be confirmed; otherwise, the watermark then serves as the fingerprint and is processed by fingerprinting. If a match in the fingerprint database is found, then the suspect image will be considered a duplicated one. Because the proposed scheme utilizes both watermarking and fingerprinting, it is more robust than those that only adopt watermarking, and it can also obtain the preliminary result more quickly than those that only utilize fingerprinting. The experimental results show that when the watermarked image suffers slight attacks, watermarking alone is enough to identify the copyright. The results also show that when the watermarked image suffers heavy attacks that render watermarking incompetent, fingerprinting can successfully identify the copyright, hence demonstrating the effectiveness of the proposed scheme.
APA, Harvard, Vancouver, ISO, and other styles
3

Chang, Chin-Chen, Thai-Son Nguyen, and Chia-Chen Lin. "A Blind Reversible Robust Watermarking Scheme for Relational Databases." Scientific World Journal 2013 (2013): 1–12. http://dx.doi.org/10.1155/2013/717165.

Full text
Abstract:
Protecting the ownership and controlling the copies of digital data have become very important issues in Internet-based applications. Reversible watermark technology allows the distortion-free recovery of relational databases after the embedded watermark data are detected or verified. In this paper, we propose a new, blind, reversible, robust watermarking scheme that can be used to provide proof of ownership for the owner of a relational database. In the proposed scheme, a reversible data-embedding algorithm, which is referred to as “histogram shifting of adjacent pixel difference” (APD), is used to obtain reversibility. The proposed scheme can detect successfully 100% of the embedded watermark data, even if as much as 80% of the watermarked relational database is altered. Our extensive analysis and experimental results show that the proposed scheme is robust against a variety of data attacks, for example, alteration attacks, deletion attacks, mix-match attacks, and sorting attacks.
APA, Harvard, Vancouver, ISO, and other styles
4

Thanki, Rohit, Surekha Borra, and Ashish Kothari. "Fragile Watermarking Framework for Tamper Detection of Color Biometric Images." International Journal of Digital Crime and Forensics 13, no. 2 (March 2021): 35–56. http://dx.doi.org/10.4018/ijdcf.2021030103.

Full text
Abstract:
Application of fragile watermarking on biometric images stored at a server or cloud ensures proper authentication and tamper detection when access to the servers was shared. In this paper, a hybrid domain fragile watermarking technique for authenticity of color biometric images, using hybridization of various transforms such as discrete cosine transform (DCT), fast discrete curvelet transform (FDCuT), and singular value decomposition (SVD) is proposed. The hybrid transform coefficients are modified according to the scrambled color watermark to obtain watermarked color biometric image. The security of this technique is strengthened with the usage of Arnold scrambling, and by using multiple secret keys. The proposed technique is analyzed on FEI Brazilian face database. The experimental results show that this technique performs better than the existing fragile watermarking techniques.
APA, Harvard, Vancouver, ISO, and other styles
5

RM, Deepa. "Database Security with Fingerprint Masking." International Journal for Research in Applied Science and Engineering Technology 10, no. 7 (July 31, 2022): 3191–96. http://dx.doi.org/10.22214/ijraset.2022.45769.

Full text
Abstract:
Abstract: Information in numerous areas including medication, business, and science wasso crucial, in which directories are utilized efficiently for information sharing.Nevertheless, the directories confront the danger to be pirated, taken or even misused, which might lead to many of protection risks regarding ownership rights, informationtampering as well as secrecy safeguards. Watermarking is the technology which is used to secure the database from the various attacks.It is also used to hide the content from the un authorized users. The majority of state-of-the- art techniques alter the initial information to a big level, lead to information quality wreckage,and then can't attain balance that is good between robustness from malicious strikes as well as information restoration. we suggest a reversible and robust watermarking method with Genetic Algorithm and Histogram ShiftingWatermarking (GAHSW) to relation the numerical data. This algorithm used to get the unique key for the database as well as the watermarked place. Experimental evaluation show the usefulness and methods within theterminology of robustness from malicious strikes as well as upkeep of information quality.We have achieved the security level on comparing with existing system
APA, Harvard, Vancouver, ISO, and other styles
6

Sankpal, Priya R., and P. A. Vijaya. "Performance Evaluation of Nested Watermarked Scheme using Objective Image Quality Metrics." Journal of University of Shanghai for Science and Technology 23, no. 06 (June 7, 2021): 306–14. http://dx.doi.org/10.51201/jusst/21/05273.

Full text
Abstract:
In this digital era, extensive usage of the internet has resulted in images being subjected to various distortions during processing and transmitting over open networks. For watermarking applications, watermarked image quality is evaluated in comparison to the original image. In the last decade literature, many performance metrics have been used, comprising of both subjective and objective quality metrics. The subjective image quality metrics are generally time-consuming and expensive in contrast to objective image quality metrics. This paper attempted an investigation for measuring the performance of nested watermarking schemes and objective image quality metrics which included Peak Signal to Noise Ratio (PNSR), Mean Square Error (MSE), Correlation Coefficient (CC), Normalized Correlation Coefficient (NCC), and Structural Similarity Index (SSIM). For the proposed nested watermarking method, these objective image quality metrics were evaluated using a combination of Discrete Wavelet Transforms (DWT) and Singular values (SVD) in the four frequency bands. Performance of objective metrics can be judged based on their sensitiveness to watermarking artifacts. It is clear from the results obtained, for most watermarking applications SSIM provides better insight into the performance of the algorithm used whereas PNSR fails for certain watermark artifacts. The findings drawn in this paper are based on the experimentation of a nested watermarking algorithm using a DICOM image database.
APA, Harvard, Vancouver, ISO, and other styles
7

Lee, Yong-Joon, and Won-Shik Na. "E-Passport Advanced Security Technique Using Biometric Information Watermarking." Journal of Computational and Theoretical Nanoscience 18, no. 5 (May 1, 2021): 1540–49. http://dx.doi.org/10.1166/jctn.2021.9614.

Full text
Abstract:
There has been significant research in security of e-passport. E-passport combine the security technologies such as smartcard, PKI, and biometric, so that these technologies can prevent unauthorized copies and counterfeits. We propose an e-passport security technology in which biometric watermarking is used to prevent the copy of biometric information in the e-passport. The biometric watermarking embeds the invisible date of acquisition into the original data so that the human visual system cannot perceive its invisibly watermarked information. Then the biometric sample, having its unauthorized copy, is retrieved at the moment of reading the e-passport from the issuing database. The previous e-passport security technology placed an emphasis on both access control readers and anti-cloning chip features, and it is expected that the proposed feature, copy protection of biometric information, will be demanded as the cases of biometric recognition to verify personal identity information has increased. This study proposed test results through issuing and deciphering of watermarks for e-passports, and it is expected that it can be used as standards for protecting biometric information.
APA, Harvard, Vancouver, ISO, and other styles
8

Lee, Yong-Joon, and Won-Shik Na. "E-Passport Advanced Security Technique Using Biometric Information Watermarking." Journal of Computational and Theoretical Nanoscience 18, no. 5 (May 1, 2021): 1540–49. http://dx.doi.org/10.1166/jctn.2021.9614.

Full text
Abstract:
There has been significant research in security of e-passport. E-passport combine the security technologies such as smartcard, PKI, and biometric, so that these technologies can prevent unauthorized copies and counterfeits. We propose an e-passport security technology in which biometric watermarking is used to prevent the copy of biometric information in the e-passport. The biometric watermarking embeds the invisible date of acquisition into the original data so that the human visual system cannot perceive its invisibly watermarked information. Then the biometric sample, having its unauthorized copy, is retrieved at the moment of reading the e-passport from the issuing database. The previous e-passport security technology placed an emphasis on both access control readers and anti-cloning chip features, and it is expected that the proposed feature, copy protection of biometric information, will be demanded as the cases of biometric recognition to verify personal identity information has increased. This study proposed test results through issuing and deciphering of watermarks for e-passports, and it is expected that it can be used as standards for protecting biometric information.
APA, Harvard, Vancouver, ISO, and other styles
9

Zainal, Nasharuddin, Seri Mastura Mustaza, and Wan Noormaheran Wan Hussin. "Image Watermarking Technique for Digital Al-Quran based on Fibonacci Transform via DWT." Jurnal Kejuruteraan 34, no. 3 (May 30, 2022): 485–93. http://dx.doi.org/10.17576/jkukm-2022-34(3)-15.

Full text
Abstract:
Advent growth in information and communication technologies has accelerated the needs to secure digital media. Demands for digital media when on the move urged Quran readers to install the Quran mobile apps on their device. However, there is no secure mechanism to legalize its content credential. On the other hand, mobile developer finds difficulty in getting access to readily authentic Quran database sources. Malaysia government has introduced Smart Quran mobile apps without any counterfeit protection. Correspondingly, the contents are vulnerable to hacking, falsification which consequently endangering Islamic institutional prestige. There is also a lack of credible authorization institutions to verify authenticity of the digital Quran that could possibly deviate the Muslim faith by reciting falsified content and meaning. To fill the void, this paper explores the utilization of an image watermarking to preserve the Quran digital image. The study presents new blind RGB image watermarking using Fibonacci Transform via Discrete Wavelet Transform (DWT) and manipulates the R component of the Al-Quran image. The second level of LL decomposition of the cover image will then be substituted by the Fibonacci-transformed watermarked version. DWT embedding is achieved through alpha blending technique. Final watermarked image is obtained once RGB conversion is performed. The efficiency of the method is assessed towards 10 samples. Verification is conducted via the extraction of the endorsed license image. The results demonstrate enhanced robustness and imperceptibility with average PSNR and SSIM of 92.13 dB and 0.99 respectively. Forgery cases of digital Quran applications are therefore tackled.
APA, Harvard, Vancouver, ISO, and other styles
10

Li, Yan, Junwei Wang, and Xiangyang Luo. "A reversible database watermarking method non-redundancy shifting-based histogram gaps." International Journal of Distributed Sensor Networks 16, no. 5 (May 2020): 155014772092176. http://dx.doi.org/10.1177/1550147720921769.

Full text
Abstract:
In relational databases, embedding watermarks in integer data using traditional histogram shifting method has the problem of large data distortion. To solve this problem, a reversible database watermarking method without redundant shifting distortion is proposed, taking advantage of a large number of gaps in the integer histogram. This method embeds the watermark bit by bit on the basis of grouping. First, an integer data histogram is constructed with the absolute value of the prediction error of the data as a variable. Second, the positional relationship between each column and the gap in the histogram is analyzed to find out all the columns adjacent to the gap. Third, the highest column is selected as the embedded point. Finally, a watermark bit is embedded on the group by the histogram non-redundant shifting method. Experimental results show that compared with existing reversible database watermarking methods, such as genetic algorithm and histogram shift watermarking and histogram gap–based watermarking, the proposed method has no data distortion caused by the shifting redundant histogram columns after embedding watermarks on forest cover type data set and effectively reduces the data distortion rate after embedding watermarks.
APA, Harvard, Vancouver, ISO, and other styles

Dissertations / Theses on the topic "WATERMARKED DATABASE"

1

Кучма, Олександр Русланович, and Oleksandr Kuchma. "Розроблення модуля забезпечення приховування даних на основі стеганографічного методу найменш значущого біту." Master's thesis, ТНТУ, 2021. http://elartu.tntu.edu.ua/handle/lib/36794.

Full text
Abstract:
Розроблення модуля забезпечення приховування даних на основі стеганографічного методу найменш значущого біту // Дипломна робота ОР «Магістр» // Кучма Олександр Русланович // Тернопільський національний технічний університет імені Івана Пулюя, факультет комп’ютерно- інформаційних систем і програмної інженерії, кафедра кібербезпеки, група СБм-61 // Тернопіль, 2019 // С. 93, рис. – 34 , табл. – 26 , додат. – 5.
Пояснювальна записка містить результати розроблення модуля «Вбудовування інформації в зображенні методом найменш значущого біту». Проведено аналіз предметної області, розроблені моделі бізнес-процесів об’єкта проектування, розроблені специфікації бізнес-вимог, функціональних та не функціональних вимог, спроектовані логічна та фізична моделі бази даних. Виконаний математичний опис задачі для вирішення на ПК та розроблений додаток за допомогою середовища програмування Microsoft Visual Studio 2010. Наведені результати тестування програмного продукту та вимоги щодо його розгортання. Результати роботи можуть бути використані для підтвердження авторського права, для приховування інформації в цифрових зображеннях.
Explanatory note contains the results of the development module "Embedding information in an image using the least significant bit. The analysis domain, the model business processes of the project, developed the specification of business requirements, functional and non functional requirements, designed logical and physical database models. The mathematical description of the problem for solution on the PC application developed using the programming environment Microsoft Visual Studio 2010. The results of software testing and requirements for its deployment. The results may be used to confirm the copyright for hiding information in digital images.
ПЕРЕЛІК УМОВНИХ СКОРОЧЕНЬ ... 7 ВСТУП ... 8 РОЗДІЛ 1... 10 1.1 Коротка характеристика підприємства... 10 Базою підприємства виступає Інтернет-магазин «TradeBox»... 10 1.2 Аналіз предметної області ... 11 Заголовки ... 13 Потоковий контейнер ... 13 Фіксований контейнер ... 13 1.3. Аналіз існуючого програмного продукту, що реалізують функцію предметної області ... 16 РОЗДІЛ 2... 21 2.1. Глосарій проекту ... 21 2.2. Розроблення варіанту використання ... 23 2.2.1. Розроблення діаграми варіантів використання. ... 24 2.2.2. Специфікація варіантів використання ... 25 2.2.3. Розкадровка варіантів використання ... 34 2.3. Специфікація функціональних і не функціональних вимог ... 42 РОЗДІЛ 3... 46 3.1 Математична постановка задачі ... 46 3.2. Проектування структури бази даних ... 50 3.3. Опис архітектури додатку. ... 52 3.3.1 Розроблення діаграми класів, що реалізують бізнес-логіку програмної системи. ... 52 3.3.2. Розроблення діаграми використання елементів графічного інтерфейсу користувача. ... 53 3.4. Тестування додатку. ... 53 3.5. Розгортання програмного продукту. ... 55 3.5.1. Системні мінімальні характеристики ... 55 3.5.2. Вимоги до програмного забезпечення клієнтської частини. ... 55 3.5.3. Спосіб виклику програми, запуск програми. ... 56 РОЗДІЛ 4 ОХОРОНА ПРАЦІ ТА БЕЗПЕКА В НАДЗВИЧАЙНИХ СИТУАЦІЯХ ... 57 4.1 Охорона праці ... 57 4.2 Підвищення стійкості роботи об'єктів господарської діяльності в воєнний час... 59 СПИСОК ВИКОРИСТАНИХ ДЖЕРЕЛ ... 65 ДОДАТКИ ... 66 ДОДАТОК А ... 67 ДОДАТОК Б ... 69 ДОДАТОК В ... 91 ДОДАТОК Д ... 92 ДОДАТОК Е ... 93
APA, Harvard, Vancouver, ISO, and other styles
2

VERMA, ARPIT. "ROBUST DATABASE WATERMARKING TECHNIQUE FOR NUMERICAL DATA." Thesis, 2016. http://dspace.dtu.ac.in:8080/jspui/handle/repository/15033.

Full text
Abstract:
The recent progress in the digital multimedia technologies has offered many facilities in the transmission, reproduction and manipulation of data. However, this advance has also brought the problem such as copyright protection for content providers. Digital watermarking is one of the proposed solutions for copyright protection of multimedia. A watermark embeds an imperceptible signal into data such as audio, image and video, which indicates whether or not the content is copyrighted. The Watermark is an informational bearing signal and it is an image or pattern identification that appears various shades of lightness/darkness. Watermark used on government document, currency. Watermark also used as security features of passport and other documents. Watermarking consist of embedding watermark with another signal like image, video signal. This process should not degrade the quality of signal. The watermarking communication channel is power limited and band limited. Due to requirement of imperceptible watermark, the power limit arise. And due to low pass multimedia signal like image, audio and video, the bandwidth limit arise. The Watermark signal is either unintentional or malicious interface, which distort the watermark. Claiming ownership rights on database is crucial issue in today's internet based application and in content distribution application. In this thesis we implement various techniques of database watermarking. In this we firstly encrypt the primary key and with the help of encrypted primary key we select the two tuple and then watermark it with the help of another tuple this method is also reversible.
APA, Harvard, Vancouver, ISO, and other styles

Book chapters on the topic "WATERMARKED DATABASE"

1

Pérez Gort, Maikel Lázaro, Martina Olliaro, and Agostino Cortesi. "A Quantile-Based Watermarking Approach for Distortion Minimization." In Foundations and Practice of Security, 162–76. Cham: Springer International Publishing, 2022. http://dx.doi.org/10.1007/978-3-031-08147-7_11.

Full text
Abstract:
AbstractDistortion-based watermarking techniques embed the watermark by performing tolerable changes in the digital assets being protected. For relational data, mark insertion can be performed over the different data types of the database relations’ attributes. An important goal for distortion-based approaches is to minimize as much as possible the changes that the watermark embedding provokes into data, preserving their usability, watermark robustness, and capacity. This paper proposes a quantile-based watermarking technique for numerical cover type focused on preserving the distribution of attributes used as mark carriers. The experiments performed to validate our proposal show a significant distortion reduction compared to traditional approaches while maintaining watermark capacity levels. Also, positive achievements regarding robustness are visible, evidencing our technique’s resilience against subset attacks.
APA, Harvard, Vancouver, ISO, and other styles
2

El-Bakry, Hazem, and Mohamed Hamada. "A Novel Watermark Technique for Relational Databases." In Artificial Intelligence and Computational Intelligence, 226–32. Berlin, Heidelberg: Springer Berlin Heidelberg, 2010. http://dx.doi.org/10.1007/978-3-642-16527-6_29.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

El-Bakry, Hazem M., and Mohamed Hamada. "A Developed WaterMark Technique for Distributed Database Security." In Advances in Intelligent and Soft Computing, 173–80. Berlin, Heidelberg: Springer Berlin Heidelberg, 2010. http://dx.doi.org/10.1007/978-3-642-16626-6_19.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Chen, Lu, Jiao Sun, and Wei Xu. "FAWA: Fast Adversarial Watermark Attack on Optical Character Recognition (OCR) Systems." In Machine Learning and Knowledge Discovery in Databases, 547–63. Cham: Springer International Publishing, 2021. http://dx.doi.org/10.1007/978-3-030-67664-3_33.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Allison, Robert W., and James Hart. "The Watermark Initiative. A Practical Model for an Integrated System of Independant Paper and Watermark Databases on World Wide Web." In Bibliologia, 255–74. Turnhout: Brepols Publishers, 1999. http://dx.doi.org/10.1484/m.bib-eb.3.4859.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Chang, Chin-Chen, Thai-Son Nguyen, and Chia-Chen Lin. "A Blind Robust Reversible Watermark Scheme for Textual Relational Databases with Virtual Primary Key." In Digital-Forensics and Watermarking, 75–89. Cham: Springer International Publishing, 2015. http://dx.doi.org/10.1007/978-3-319-19321-2_6.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Tsai, Chwei-Shyong, and Chin-Chen Chang. "Embedding Robust Gray-Level Watermark in an Image Using Discrete Cosine Transformation." In Distributed Multimedia Databases, 206–23. IGI Global, 2002. http://dx.doi.org/10.4018/978-1-930708-29-7.ch013.

Full text
Abstract:
Digital watermarking is an effective technique to protect the intellectual property rights of digital images. In general, a gray-level image can provide more perceptual information; moreover, the size of each pixel in the gray-level image is bigger. Commonly, gray-level digital watermarks are more robust. In this chapter, the proposed watermarking scheme adopts a gray-level image as the watermark. In addition, discrete cosine transformation (DCT) technique and quantization method are applied to strengthen the robustness of the watermarking system. Both original image and digital watermark, processed by DCT transformation, can build a quantization table to reduce the information size of the digital watermark. After quantized watermark is embedded into the middle frequency bands of the transformed original image, the quality of the watermarked image is always visually acceptable because of the effectiveness of the quantization technique. The experimental results show that the embedded watermark can resist image cropping, JPEG lossy compression, and destructive processes such as image blurring and sharpening.
APA, Harvard, Vancouver, ISO, and other styles
8

Li, Yingjiu, Huiping Guo, and Shuhong Wang. "A Multiple-Bits Watermark for Relational Data." In Database Technologies, 2223–44. IGI Global, 2009. http://dx.doi.org/10.4018/978-1-60566-058-5.ch135.

Full text
Abstract:
At the heart of the information economy, commercially and publicly useful databases must be sufficiently protected from pirated copying. Complementary to the Database Protection Act, database watermarking techniques are designed to thwart pirated copying by embedding ownerspecific information into databases so that the ownership of pirated copies of protected databases can be claimed if the embedded information is detected. This article presents a robust watermarking scheme for embedding a multiple-bits watermark to numerical attributes in database relations. The scheme is robust in the sense that it provides an upper bound for the probability that a valid watermark is detected from unmarked data, or a fictitious secret key is discovered from pirated data. This upper bound is independent of the size of the data. The scheme is extended to database relations without primary-key attributes to thwart attribute-related attacks. The scheme is also extended to multiple watermarks for defending additive attacks and for proving joint ownership.
APA, Harvard, Vancouver, ISO, and other styles
9

Lu, Chun-Shien, Hong-Yuan Mark Liao, Jan-Ru Chen, and Kuo-Chin Fan. "Watermarking on Compressed/Uncompressed Video Using Communications with Side Information Mechanism." In Distributed Multimedia Databases, 173–89. IGI Global, 2002. http://dx.doi.org/10.4018/978-1-930708-29-7.ch011.

Full text
Abstract:
Digital watermarking has been proposed as very useful technology in the protection of digital data such as image, audio, video, formatted documents (PDF or PS), and 3D objects. In the literature, most of the existing watermarking approaches are conducted on images. However, video is even more useful and should be protected with higher priority. In particular, video sequences usually contain rich properties that images do not have. On the other hand, the types of attacks applied on a video are much different from those applied on an image. In this chapter, we will focus ourselves specifically on video watermarking. The content of this chapter is divided into two parts. In the first part, the existing video watermarking techniques are briefly reviewed. We have pointed out their advantages and disadvantages to realize what can be done about video watermarking. In the second part, we propose a compressed domain video watermarking scheme for copyright protection. For the sake of real-time video watermark detection, our method is directly conducted in the MPEG-2 bitstream. More specifically, watermarks are inserted into the VLC domain. We shall discuss how to select proper data in a video bitstream to embed watermarks while preserving perceptual fidelity. In addition, video watermarks are embedded by a new proposed watermarking technique, which is based on the concept of communications with side information. The power of our method is reflected by its robust capability against attacks. Future work will also be pointed out to further improve the current scheme
APA, Harvard, Vancouver, ISO, and other styles
10

"Description." In The Burley Manuscript, edited by Peter Redford. Manchester University Press, 2016. http://dx.doi.org/10.7228/manchester/9781526104489.003.0003.

Full text
Abstract:
The physical qualities of the miscellany are described, attention being given to paper size and weight, handwriting and watermarks. On this basis, the collection may be divided into five sections, useful for the analysis of provenance. Items in the manuscript are analysed by type (verse, letter, translation, etc) and language (English, Latin, Italian, French and Spanish), and the results are presented graphically. The database used in this analysis is described, and a case presented for the use of similar databases in relation to other miscellanies, that are hard to catalogue conventionally.
APA, Harvard, Vancouver, ISO, and other styles

Conference papers on the topic "WATERMARKED DATABASE"

1

Chareyron, Gael, Jerome Da Rugna, Hubert Konik, and Alain Tremeau. "Online system for managing watermarked-images database." In Electronic Imaging 2005, edited by Simone Santini, Raimondo Schettini, and Theo Gevers. SPIE, 2005. http://dx.doi.org/10.1117/12.586167.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Shen, Maolin, Yingzhou Zhang, Yunlong Di, and YuXin Sun. "Database Traceability Algorithm Based On Zero Watermark." In 2020 International Conference on Cyber-Enabled Distributed Computing and Knowledge Discovery (CyberC). IEEE, 2020. http://dx.doi.org/10.1109/cyberc49757.2020.00047.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Qin, Zhu, Yang Ying, Le Jia-jin, and Luo Yi-shu. "Watermark Based Copyright Protection of Outsourced Database." In 2006 10th International Database Engineering and Applications Symposium (IDEAS'06). IEEE, 2006. http://dx.doi.org/10.1109/ideas.2006.53.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Liu, Yi, and Juan Wang. "DWT Based Blind Watermark in Relational Database." In 2nd International Conference on Computer Science and Electronics Engineering (ICCSEE 2013). Paris, France: Atlantis Press, 2013. http://dx.doi.org/10.2991/iccsee.2013.703.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Zhuang, Xiaodan, Xi Luo, and Letian He. "Document Database Watermark Algorithm Based on Connected Graph." In 2022 International Conference on Computing, Communication, Perception and Quantum Technology (CCPQT). IEEE, 2022. http://dx.doi.org/10.1109/ccpqt56151.2022.00044.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Di, Guandong, Xiao Wang, and Hequn Xian. "Watermark Scheme of Database Based on Fuzzy C-Means." In the 2nd International Conference. New York, New York, USA: ACM Press, 2019. http://dx.doi.org/10.1145/3358528.3358598.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Pamboukian, Sergio Vicente D., and Hae Yong Kim. "Reversible Data Hiding and Reversible Authentication Watermarking for Binary Images." In Simpósio Brasileiro de Segurança da Informação e de Sistemas Computacionais. Sociedade Brasileira de Computação - SBC, 2006. http://dx.doi.org/10.5753/sbseg.2006.20942.

Full text
Abstract:
Data hiding is a technique used to embed a sequence of bits in a host image with small visual deterioration and the means to extract it afterwards. Reversible data hiding allows, in addition, recovering the original coverimage exactly. Several reversible data hiding techniques have been developed but none of them seems to be appropriate for binary images. This paper proposes a reversible data hiding for binary images. The proposed technique selects a set of low-visibility pixels and uses the Golomb code to compress the predictions of these pixels. This compressed data and the net payload data are embedded into the image. Images watermarked by the proposed technique have excellent visual quality, because only low-visibility pixels are flipped. Then, we use the proposed data hiding to reversibly authenticate binary images and documents. This technique has many potential practical uses, including lossless authenticated FAX transmission and reversible content protection of binary document databases.
APA, Harvard, Vancouver, ISO, and other styles
8

"A DISTORTION FREE WATERMARK FRAMEWORK FOR RELATIONAL DATABASES." In 4th International Conference on Software and Data Technologies. SciTePress - Science and and Technology Publications, 2009. http://dx.doi.org/10.5220/0002256402290234.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

Chen, Xiaoyun, Pengfei Chen, Yanshan He, and Longjie Li. "A Self-Resilience Digital Image Watermark Based on Relational Database." In 2008 International Symposium on Knowledge Acquisition and Modeling (KAM). IEEE, 2008. http://dx.doi.org/10.1109/kam.2008.90.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

Chang, Chin-Chen, Thai-Son Nguyen, and Chia-Chen Lin. "A Reversible Database Watermark Scheme for Textual and Numerical Datasets." In 2021 IEEE/ACIS 22nd International Conference on Software Engineering, Artificial Intelligence, Networking and Parallel/Distributed Computing (SNPD). IEEE, 2021. http://dx.doi.org/10.1109/snpd51163.2021.9704991.

Full text
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!

To the bibliography