Articles de revues sur le sujet « DUAL WATERMARKING »

Pour voir les autres types de publications sur ce sujet consultez le lien suivant : DUAL WATERMARKING.

Créez une référence correcte selon les styles APA, MLA, Chicago, Harvard et plusieurs autres

Choisissez une source :

Consultez les 50 meilleurs articles de revues pour votre recherche sur le sujet « DUAL WATERMARKING ».

À côté de chaque source dans la liste de références il y a un bouton « Ajouter à la bibliographie ». Cliquez sur ce bouton, et nous générerons automatiquement la référence bibliographique pour la source choisie selon votre style de citation préféré : APA, MLA, Harvard, Vancouver, Chicago, etc.

Vous pouvez aussi télécharger le texte intégral de la publication scolaire au format pdf et consulter son résumé en ligne lorsque ces informations sont inclues dans les métadonnées.

Parcourez les articles de revues sur diverses disciplines et organisez correctement votre bibliographie.

1

Ye, Zhengmao, Hang Yin et Yongmao Ye. « Security Authentication of Dual Chaotic Image Watermarking in Spatial Domain with Spatial and Frequency Domain Characteristics Analysis ». Applied System Innovation 1, no 4 (17 octobre 2018) : 40. http://dx.doi.org/10.3390/asi1040040.

Texte intégral
Résumé :
This article presents an advanced dual chaotic watermarking scheme to improve information security. To ensure confidentiality in digital image transmission, a secure dual watermarking scheme is proposed by applying the chaotic logistic system and hyper-chaotic dynamical system. Chaotic watermarking was conducted in the spatial domain, where suboptimal secure hashing with a variable length was selected in preprocessing stages. The secret key was generated by the chaotic sequence for pixel shuffling using a chaotic logistic map, so that a controlled amount of distortion was inserted into the host digital image. Watermarking was proceeded after the chaotic watermark had been embedded into the shuffled image. To strengthen the security, the hyper-chaotic system was used to generate chaotic blocks for block scrambling in order to achieve dual chaotic watermarking. Characteristics analysis was conducted for multiple examples in both spatial and frequency domains. Potential effects induced by the chaotic driving parameter on processing time and integrity authentication of chaotic dual watermarking were also analyzed in detail.
Styles APA, Harvard, Vancouver, ISO, etc.
2

Athalye, Mrs S. S., Mr Pranav Gurav, Mr Rohan Chavan et Mr Rohit Pashte. « Study on Dual Watermarking ». International Journal of Engineering Trends and Technology 20, no 6 (25 février 2015) : 260–62. http://dx.doi.org/10.14445/22315381/ijett-v20p251.

Texte intégral
Styles APA, Harvard, Vancouver, ISO, etc.
3

Gao, Zhan Wei, Yong Mei Zhang, Cong Liu, Jie Geng et De Kai Ba. « Dual Video Watermarking Scheme Based on Transform Domain ». Applied Mechanics and Materials 155-156 (février 2012) : 815–19. http://dx.doi.org/10.4028/www.scientific.net/amm.155-156.815.

Texte intégral
Résumé :
The single watermark algorithms always merely have single function. In order to overcome the drawback, this paper proposed a dual video watermarking scheme based on transform domain. To implement the video copyright and integrality authentication, this paper embedded robust watermarking and fragile watermark. At the same time, this scheme made good use of the wavelet transform to embed the two different kinds of watermarking in the same video respectively. The fragile watermarking is to serve the robust watermarking. Experiments demonstrate this scheme can not only protect the copyright of the video effectively, but also protect against some attacks, such as shearing attack, JPEG lossy compression attack, noise attack etc. This scheme has better robustness and invisibility.
Styles APA, Harvard, Vancouver, ISO, etc.
4

Priya, Mrs A. Lakshmi, et S. Letitia. « Dual Watermarking in Cyber Security ». JOURNAL OF ADVANCES IN CHEMISTRY 13, no 10 (4 mars 2017) : 5923–26. http://dx.doi.org/10.24297/jac.v13i10.5834.

Texte intégral
Résumé :
Cyber security is generally a conservatory of the conventional information system security that is aimed at protecting cyber threats, like cyber terrorism, cyber warfare, and cyber espionage to corrupt digital information. This leads to increase the researches in cyber security. This paper proposes the application of dual watermarking in cyber technology, focusing on forgery detection. The rest of the paper presents a brief overview of cyber security and the role of digital dual watermarking.
Styles APA, Harvard, Vancouver, ISO, etc.
5

Ghai, Deepika, Hemant Kumar Gianey, Arpit Jain et Raminder Singh Uppal. « Quantum and dual-tree complex wavelet transform-based image watermarking ». International Journal of Modern Physics B 34, no 04 (21 janvier 2020) : 2050009. http://dx.doi.org/10.1142/s0217979220500095.

Texte intégral
Résumé :
Nowadays, multimedia applications are extensively utilized and communicated over Internet. Due to the use of public networks for communication, the multimedia data are prone to various security attacks. In the past few decades, image watermarking has been extensively utilized to handle this issue. Its main objective is to embed a watermark into a host multimedia data without affecting its presentation. However, the existing methods are not so effective against multiplicative attacks. Therefore, in this paper, a novel quantum-based image watermarking technique is proposed. It initially computes the dual-tree complex wavelet transform coefficients of an input cover image. The watermark image is then scrambled using Arnold transform. Thereafter, in the lower coefficient input the watermark image is embedded using quantum-based singular value decomposition (SVD). Finally, the covered image is obtained by applying the inverse dual-tree complex wavelet transform on the obtained coefficients. Comparative analyses are carried out by considering the proposed and the existing watermarking techniques. It has been found that the proposed technique outperforms existing watermarking techniques in terms of various performance metrics.
Styles APA, Harvard, Vancouver, ISO, etc.
6

Abraham, Jobin. « A Multi-purpose Dual Watermarking Scheme ». International Journal of Computer Applications 77, no 8 (18 septembre 2013) : 1–4. http://dx.doi.org/10.5120/13411-1066.

Texte intégral
Styles APA, Harvard, Vancouver, ISO, etc.
7

Zhang, Zhengwei, Lifa Wu, Huabo Li, Haiguang Lai et Chenghui Zheng. « Dual Watermarking Algorithm for Medical Image ». Journal of Medical Imaging and Health Informatics 7, no 3 (1 juin 2017) : 607–22. http://dx.doi.org/10.1166/jmihi.2017.2056.

Texte intégral
Styles APA, Harvard, Vancouver, ISO, etc.
8

Al-Haj, Ali. « A dual transform audio watermarking algorithm ». Multimedia Tools and Applications 73, no 3 (30 août 2013) : 1897–912. http://dx.doi.org/10.1007/s11042-013-1645-z.

Texte intégral
Styles APA, Harvard, Vancouver, ISO, etc.
9

Phin, Ch’ng Chen, Nurul Hidayah Ab Rahman et Noraini Che Pa. « A Digital Image Watermarking System : An Application of Dual Layer Watermarking Technique ». JOIV : International Journal on Informatics Visualization 1, no 4-2 (16 novembre 2017) : 199. http://dx.doi.org/10.30630/joiv.1.4-2.78.

Texte intégral
Résumé :
Watermarking is a method to digitally sign a product to provide authentication and prevent copyright infringement to proving the ownership of a product and provides integrity for companies to protect their product. In this study, dual layer watermark that applies two different watermarking techniques at each layer is presented. The first layer applies the LSB Substitution technique while the second layer uses the Discrete Wavelet Transform (DWT) technique. This implies greater integrity as it contains of two signatures in providing authentication.
Styles APA, Harvard, Vancouver, ISO, etc.
10

Xi, Xu, Xinchang Zhang, Weidong Liang, Qinchuan Xin et Pengcheng Zhang. « Dual Zero-Watermarking Scheme for Two-Dimensional Vector Map Based on Delaunay Triangle Mesh and Singular Value Decomposition ». Applied Sciences 9, no 4 (14 février 2019) : 642. http://dx.doi.org/10.3390/app9040642.

Texte intégral
Résumé :
Digital watermarking is important for the copyright protection of electronic data, but embedding watermarks into vector maps could easily lead to changes in map precision. Zero-watermarking, a method that does not embed watermarks into maps, could avoid altering vector maps but often lack of robustness. This study proposes a dual zero-watermarking scheme that improves watermark robustness for two-dimensional (2D) vector maps. The proposed scheme first extracts the feature vertices and non-feature vertices of the vector map with the Douglas-Peucker algorithm and subsequently constructs the Delaunay Triangulation Mesh (DTM) to form a topological feature sequence of feature vertices as well as the Singular Value Decomposition (SVD) matrix to form intrinsic feature sequence of non-feature vertices. Next, zero-watermarks are obtained by executing exclusive disjunction (XOR) with the encrypted watermark image under the Arnold scramble algorithm. The experimental results show that the scheme that synthesizes both the feature and non-feature information improves the watermark capacity. Making use of complementary information between feature and non-feature vertices considerably improves the overall robustness of the watermarking scheme. The proposed dual zero-watermarking scheme combines the advantages of individual watermarking schemes and is robust against such attacks as geometric attacks, vertex attacks and object attacks.
Styles APA, Harvard, Vancouver, ISO, etc.
11

Sivananthamaitrey, P., et P. Rajesh Kumar. « Multipurpose Watermarking Based on SWT and SVD ». International Journal of Engineering & ; Technology 7, no 3.29 (24 août 2018) : 65. http://dx.doi.org/10.14419/ijet.v7i3.29.18463.

Texte intégral
Résumé :
Dual digital watermarking has emerged as a successful solution for copyright protection, tamper detection and localization. However, several problems related to the robustness, capacity, tampered area detection still mystifying. This paper presents a high capacity dual watermarking mechanism for digital color image. An invisible robust watermark is embedded in the Green component of the host image by using a hybrid combination of Stationary Wavelet Transform (SWT) and Singular Value Decomposition (SVD) for copyright protection. A fragile invisible watermark based on the Least Significant Bit (LSB) replacement approach is embedded in the Blue component of the image for tamper detection and localization. The proposed technique focuses on robustness and imperceptibility while maximizing embedding capacity that makes this technique a multipurpose watermarking scheme.
Styles APA, Harvard, Vancouver, ISO, etc.
12

Tumula, Sridevi. « A Novel Video Watermarking Algorithm using DTCWT ». International Journal for Research in Applied Science and Engineering Technology 9, no VI (20 juin 2021) : 1629–34. http://dx.doi.org/10.22214/ijraset.2021.35324.

Texte intégral
Résumé :
In this paper a new novel color video watermarking algorithm has been proposed using Dual Tree Complex Wavelet Transform (DTCWT). Digital watermarking is an emerging technology for copyright protection for digital multimedia data. Now-a-days a lot of digital data are exchanged in the internet, so to protect the digital multimedia data, digital watermarking is used, the data may be an image or video or an audio data. The main objective of this paper is to maintain perceptivity of digital video and design a robust watermarking algorithm and maintaining the tradeoff between robustness and perceptivity.
Styles APA, Harvard, Vancouver, ISO, etc.
13

Rangel-Espinoza, Kevin, Eduardo Fragoso-Navarro, Clara Cruz-Ramos, Rogelio Reyes-Reyes, Mariko Nakano-Miyatake et Héctor M. Pérez-Meana. « Adaptive removable visible watermarking technique using dual watermarking for digital color images ». Multimedia Tools and Applications 77, no 11 (19 juin 2017) : 13047–74. http://dx.doi.org/10.1007/s11042-017-4931-3.

Texte intégral
Styles APA, Harvard, Vancouver, ISO, etc.
14

Kwitt, Roland, Peter Meerwald et Andreas Uhl. « Blind Detection of Additive Spread-Spectrum Watermarking in the Dual-Tree Complex Wavelet Transform Domain ». International Journal of Digital Crime and Forensics 2, no 2 (avril 2010) : 34–46. http://dx.doi.org/10.4018/jdcf.2010040103.

Texte intégral
Résumé :
In this paper, the authors adapt two blind detector structures for additive spread-spectrum image watermarking to the host signal characteristics of the Dual-Tree Complex Wavelet Transform (DT-CWT) domain coefficients. The research is motivated by the superior perceptual characteristics of the DT-CWT and its active use in watermarking. To improve the numerous existing watermarking schemes in which the host signal is modeled by a Gaussian distribution, the authors show that the Generalized Gaussian nature of Dual-Tree detail subband statistics can be exploited for better detector performance. This paper finds that the Rao detector is more practical than the likelihood-ratio test for their detection problem. The authors experimentally investigate the robustness of the proposed detectors under JPEG and JPEG2000 attacks and assess the perceptual quality of the watermarked images. The results demonstrate that their alterations allow significantly better blind watermark detection performance in the DT-CWT domain than the widely used linear-correlation detector. As only the detection side has to be modified, the proposed methods can be easily adopted in existing DT-CWT watermarking schemes.
Styles APA, Harvard, Vancouver, ISO, etc.
15

Reyes-Ruiz, Laura, duardo Fragoso-Navarro, Francisco Garcia-Ugalde, Oswaldo Juarez-Sandoval, Manuel Cedillo-Hernandez et Mariko Nakano-Miyatake. « Robust Dual Digital Watermark Applied to Antique Digitized Cinema Images : Resistant to Print-Scan Attack ». Journal of Image and Graphics 11, no 1 (mars 2023) : 61–71. http://dx.doi.org/10.18178/joig.11.1.61-71.

Texte intégral
Résumé :
Nowadays, advances in information and communication technologies along with easy access to electronic devices such as smartphones have achieved an agile and efficient storing, edition, and distribution of digital multimedia files. However, lack of regulation has led to several problems associated with intellectual property authentication and copyright protection. Furthermore, the problem becomes complex in a scenario of illegal printed exploitation, which involves printing and scanning processes. To solve these problems, several digital watermarking in combination with cryptographic algorithms has been proposed. In this paper, a strategy of robust watermarking is defined consisting of the administration and detection of unauthorized use of digitized cinematographic images from Mexican cultural heritage. The proposed strategy is based on the combination of two types of digital watermarking, one of visible-camouflaged type based on spatial domain and another of invisible type based on frequency domain, together with a particle swarm optimization. The experimental results show the high performance of the proposed algorithm faced to printing-scanning processes or digital-analogue attack, and common image geometric and image processing attacks such as JPEG compression. Additionally, the imperceptibility of the watermark is evaluated by PSNR and compared with other previously proposed algorithms.
Styles APA, Harvard, Vancouver, ISO, etc.
16

MINAMOTO, TERUYA, et RYUJI OHURA. « A DIGITAL IMAGE WATERMARKING FOR AUTHENTICATION BASED ON THE DUAL-TREE COMPLEX DISCRETE WAVELET TRANSFORM AND INTERVAL ARITHMETIC ». International Journal of Wavelets, Multiresolution and Information Processing 11, no 04 (juillet 2013) : 1360005. http://dx.doi.org/10.1142/s0219691313600059.

Texte intégral
Résumé :
We propose a new digital image watermarking method for authentication based on the dual-tree complex discrete wavelet transform (DT-CDWT) and interval arithmetic (IA). This method is a kind of content-based watermarking, because it generates a watermark from the host image and authenticates the test image by comparing two types of watermarks constructed using the test image. We describe our watermarking and authentication procedure in detail and present experimental results demonstrating that our method produces high-quality watermarked images and can locate the areas that have been tampered with.
Styles APA, Harvard, Vancouver, ISO, etc.
17

Mathur, Etti, et Manish Mathuria. « Review of Dual Watermarking on Digital Image ». International Journal of Computer Applications 163, no 9 (17 avril 2017) : 11–13. http://dx.doi.org/10.5120/ijca2017913733.

Texte intégral
Styles APA, Harvard, Vancouver, ISO, etc.
18

Bhardwaj, Swapnil, Kirat Chabra, Madhurima et Saru Dhir. « Dual Watermarking Technique for Protection of Images ». Indian Journal of Public Health Research & ; Development 10, no 5 (2019) : 857. http://dx.doi.org/10.5958/0976-5506.2019.01189.6.

Texte intégral
Styles APA, Harvard, Vancouver, ISO, etc.
19

INAMDAR, VANDANA S., et PRITI P. REGE. « Dual watermarking technique with multiple biometric watermarks ». Sadhana 39, no 1 (février 2014) : 3–26. http://dx.doi.org/10.1007/s12046-013-0208-3.

Texte intégral
Styles APA, Harvard, Vancouver, ISO, etc.
20

Shi, Yanjiao, Miao Qi, Yugen Yi, Ming Zhang et Jun Kong. « Object based dual watermarking for video authentication ». Optik 124, no 19 (octobre 2013) : 3827–34. http://dx.doi.org/10.1016/j.ijleo.2012.11.078.

Texte intégral
Styles APA, Harvard, Vancouver, ISO, etc.
21

Fan, Yu Cheng, et Hen Wai Tsao. « A dual pyramid watermarking for JPEG-2000 ». International Journal of High Performance Computing and Networking 5, no 1/2 (2007) : 84. http://dx.doi.org/10.1504/ijhpcn.2007.015767.

Texte intégral
Styles APA, Harvard, Vancouver, ISO, etc.
22

Wang, Yuan-Gen, Zhe-Ming Lu, Liang Fan et Yun Zheng. « Robust dual watermarking algorithm for AVS video ». Signal Processing : Image Communication 24, no 4 (avril 2009) : 333–44. http://dx.doi.org/10.1016/j.image.2009.03.004.

Texte intégral
Styles APA, Harvard, Vancouver, ISO, etc.
23

Huang, Tongyuan, Jia Xu, Yuling Yang et Baoru Han. « Robust Zero-Watermarking Algorithm for Medical Images Using Double-Tree Complex Wavelet Transform and Hessenberg Decomposition ». Mathematics 10, no 7 (2 avril 2022) : 1154. http://dx.doi.org/10.3390/math10071154.

Texte intégral
Résumé :
With the rapid development of smart medical care, copyright security for medical images is becoming increasingly important. To improve medical images storage and transmission safety, this paper proposes a robust zero-watermarking algorithm for medical images by fusing Dual-Tree Complex Wavelet Transform (DTCWT), Hessenberg decomposition, and Multi-level Discrete Cosine Transform (MDCT). First, the low-frequency sub-band of the medical image is obtained through the DTCWT and MDCT. Then Hessenberg decomposition is used to construct the visual feature vector. Meanwhile, the encryption of the watermarking image by combining cryptographic algorithms, third-party concepts, and chaotic sequences enhances the algorithm’s security. In the proposed algorithm, zero-watermarking technology is utilized to assure the medical images’ completeness. Compared with the existing algorithms, the proposed algorithm has good robustness and invisibility and can efficiently extract the watermarking image and resist different attacks.
Styles APA, Harvard, Vancouver, ISO, etc.
24

Liu, Feng. « A Dual-Watermarking Scheme Robust to Affine Transformation ». Journal of Physics : Conference Series 1856, no 1 (1 avril 2021) : 012062. http://dx.doi.org/10.1088/1742-6596/1856/1/012062.

Texte intégral
Styles APA, Harvard, Vancouver, ISO, etc.
25

Jing Li, et Mingxia Shi. « Dual Zero-Watermarking Scheme for Image Copyright Protection ». INTERNATIONAL JOURNAL ON Advances in Information Sciences and Service Sciences 5, no 7 (15 avril 2013) : 372–80. http://dx.doi.org/10.4156/aiss.vol5.issue7.44.

Texte intégral
Styles APA, Harvard, Vancouver, ISO, etc.
26

Yinglan, Fang, Han Bing, Zhang Yongmei et Tian Lin. « RESEARCH OF DUAL WATERMARKING TECHNOLOGY FOR DIGITAL IMAGE ». International Journal on Smart Sensing and Intelligent Systems 9, no 4 (2016) : 2167–85. http://dx.doi.org/10.21307/ijssis-2017-958.

Texte intégral
Styles APA, Harvard, Vancouver, ISO, etc.
27

Jin, C., Z. G. Qu, Z. M. Zhang et Y. Jiang. « Web dual watermarking technology using an XML document ». IET Information Security 1, no 1 (2007) : 37. http://dx.doi.org/10.1049/iet-ifs:20060083.

Texte intégral
Styles APA, Harvard, Vancouver, ISO, etc.
28

Song, Chunlin, Sud Sudirman et Madjid Merabti. « A robust region-adaptive dual image watermarking technique ». Journal of Visual Communication and Image Representation 23, no 3 (avril 2012) : 549–68. http://dx.doi.org/10.1016/j.jvcir.2012.01.017.

Texte intégral
Styles APA, Harvard, Vancouver, ISO, etc.
29

Kumar, Chandan, Amit Kumar Singh et Pardeep Kumar. « Dual watermarking : An approach for securing digital documents ». Multimedia Tools and Applications 79, no 11-12 (23 décembre 2019) : 7339–54. http://dx.doi.org/10.1007/s11042-019-08314-5.

Texte intégral
Styles APA, Harvard, Vancouver, ISO, etc.
30

Singh, Amit Kumar, Basant Kumar, Mayank Dave et Anand Mohan. « Robust and Imperceptible Dual Watermarking for Telemedicine Applications ». Wireless Personal Communications 80, no 4 (30 septembre 2014) : 1415–33. http://dx.doi.org/10.1007/s11277-014-2091-6.

Texte intégral
Styles APA, Harvard, Vancouver, ISO, etc.
31

Mahala, Santanu, Biswapati Jana et Abuzar Mahammad. « Dual Image Based Watermarking Scheme for Image Authentication ». International Journal of Renewable Energy Exchange 10, no 11 (21 novembre 2022) : 136–43. http://dx.doi.org/10.58443/ijrex.10.11.2022.136-143.

Texte intégral
Styles APA, Harvard, Vancouver, ISO, etc.
32

Bamal, Roopam, et Singara Singh Kasana. « Dual hybrid medical watermarking using walsh-slantlet transform ». Multimedia Tools and Applications 78, no 13 (15 janvier 2019) : 17899–927. http://dx.doi.org/10.1007/s11042-018-6820-9.

Texte intégral
Styles APA, Harvard, Vancouver, ISO, etc.
33

SADH, ROOPAM, NISHCHOL MISHRA et SANJEEV SHARMA. « Dual plane multiple spatial watermarking with self-encryption ». Sadhana 41, no 1 (janvier 2016) : 1–14. http://dx.doi.org/10.1007/s12046-015-0458-3.

Texte intégral
Styles APA, Harvard, Vancouver, ISO, etc.
34

Shi, Hui, Ming-chu Li, Cheng Guo et Ru Tan. « A region-adaptive semi-fragile dual watermarking scheme ». Multimedia Tools and Applications 75, no 1 (17 octobre 2014) : 465–95. http://dx.doi.org/10.1007/s11042-014-2301-y.

Texte intégral
Styles APA, Harvard, Vancouver, ISO, etc.
35

Qian, Qing, Hong-Xia Wang, Yi Hu, Lin-Na Zhou et Jin-Feng Li. « A dual fragile watermarking scheme for speech authentication ». Multimedia Tools and Applications 75, no 21 (8 août 2015) : 13431–50. http://dx.doi.org/10.1007/s11042-015-2801-4.

Texte intégral
Styles APA, Harvard, Vancouver, ISO, etc.
36

Mokashi, Bhargavi, Vandana S. Bhat, Jagadeesh D. Pujari, S. Roopashree, T. R. Mahesh et D. Stalin Alex. « Efficient Hybrid Blind Watermarking in DWT-DCT-SVD with Dual Biometric Features for Images ». Contrast Media & ; Molecular Imaging 2022 (8 septembre 2022) : 1–14. http://dx.doi.org/10.1155/2022/2918126.

Texte intégral
Résumé :
In the modern era of virtual computers over the notional environment of computer networks, the protection of influential documents is a major concern. To bring out this motto, digital watermarking with biometric features plays a crucial part. It utilizes advanced technology of cuffing data into digital media, i.e., text, image, video, or audio files. The strategy of cuffing an image inside another image by applying biometric features namely signature and fingerprint using watermarking techniques is the key purpose of this study. To accomplish this, a combined watermarking strategy consisting of Discrete Wavelet Transform, Discrete Cosine Transform, and Singular Value Decomposition (DWT-DCT-SVD) is projected for authentication of image that is foolproof against attacks. Here, singular values of watermark1 (fingerprint) and watermark2 (signature) are obtained by applying DWT-DCT-SVD. Affixing both the singular values of watermarks, we acquire the transformed watermark. Later, the same is applied to cover image to extract the singular values. Then we add these values to the cover image and transformed watermark to obtain a final watermarked image containing both signature and fingerprint. To upgrade the reliability, sturdiness, and originality of the image, a fusion of watermarking techniques along with dual biometric features is exhibited. The experimental results conveyed that the proposed scheme achieved an average PSNR value of about 40 dB, an average SSIM value of 0.99, and an embedded watermark resilient to various attacks in the watermarked image.
Styles APA, Harvard, Vancouver, ISO, etc.
37

Chen, Sheng, Xianyi Chen et Huijuan Fu. « General Framework of Reversible Watermarking Based on Asymmetric Histogram Shifting of Prediction Error ». Advances in Multimedia 2017 (2017) : 1–9. http://dx.doi.org/10.1155/2017/6359248.

Texte intégral
Résumé :
This paper presents a general framework for the reversible watermarking based on asymmetric histogram shifting of prediction error, which is inspired by reversible watermarking of prediction error. Different from the conventional algorithms using single-prediction scheme to create symmetric histogram, the proposed method employs a multi-prediction scheme, which calculates multiple prediction values for the pixels. Then, the suitable value would be selected by two dual asymmetric selection functions to construct two asymmetric error histograms. Finally, the watermark is embedded in the two error histograms separately utilizing a complementary embedding strategy. The proposed framework provides a new perspective for the research of reversible watermarking, which brings about many benefits for the information security.
Styles APA, Harvard, Vancouver, ISO, etc.
38

Padma, U. R., et Jayachitra. « SELF-EMBEDDING VIDEO WATERMARKING USING DUAL ORTHOGONAL COMPLEX CONTOURLET TRANSFORM WITH AUTOCORRELATION SYSTEM ». International Journal of Research -GRANTHAALAYAH 3, no 4 (30 avril 2015) : 89–98. http://dx.doi.org/10.29121/granthaalayah.v3.i4.2015.3025.

Texte intégral
Résumé :
This paper presents a novel non-blind watermarking algorithm using dual orthogonal complex contourlet transform. The dual orthogonal complex contourlet transform is preferred for watermarking because of its ability to capture the directional edges and contours superior to other transforms such as cosine transform, wavelet transform, etc. Digital image and video in their raw form require an enormous amount of storage capacity and the huge data systems also contain a lot of redundant information.Compression also increases the capacity of the communication channel. Image Compression using SPIHT Set Partitioning in Hierarchical Trees algorithm based on Huffman coding technique. SPIHT algorithm is the lossless compression algorithms reduce file size with no loss in image quality and comparing the final results in terms of bit error rate, PSNR and MSE.
Styles APA, Harvard, Vancouver, ISO, etc.
39

Wahyu Adi, Prajanto, Farah Zakiyah Rahmanti et Edy Winarno. « Robust Watermarking through Dual Band IWT and Chinese Remainder Theorem ». Bulletin of Electrical Engineering and Informatics 7, no 4 (1 décembre 2018) : 561–69. http://dx.doi.org/10.11591/eei.v7i4.690.

Texte intégral
Résumé :
CRT was a widely used algorithm in the development of watermarking methods. The algorithm produced good image quality but it had low robustness against compression and filtering. This paper proposed a new watermarking scheme through dual band IWT to improve the robustness and preserving the image quality. The high frequency sub band was used to index the embedding location on the low frequency sub band. In robustness test, the CRT method resulted average NC value of 0.7129, 0.4846, and 0.6768 while the proposed method had higher NC value of 0.7902, 0.7473, and 0.8163 in corresponding Gaussian filter, JPEG, and JPEG2000 compression test. Meanwhile the both CRT and proposed method had similar average SSIM value of 0.9979 and 0.9960 respectively in term of image quality. The result showed that the proposed method was able to improve the robustness and maintaining the image quality.
Styles APA, Harvard, Vancouver, ISO, etc.
40

Singh, Ranjeet Kumar, et Dilip Kumar Shaw. « A Hybrid Concept of Cryptography and Dual Watermarking (LSB_DCT) for Data Security ». International Journal of Information Security and Privacy 12, no 1 (janvier 2018) : 1–12. http://dx.doi.org/10.4018/ijisp.2018010101.

Texte intégral
Résumé :
Now a days, in communication technology safety of digital data in the form of text, image, and video, audio is a biggest problem. With the rapid development of the network multimedia systems, security is the biggest issue. Digital watermarking is one of the solutions to these problems. It hides some secret data into the original image and this information is use for image authentication and security. This paper Focus an application using Hybrid approach of Cryptography technique and dual watermarking for the purpose of Providing highly security and authentication of digital data. This paper use cryptography and QR Code in combined approach of LSB and DCT Digital image water marking technique. The Experimental results are given in the form of table and graph. This algorithm provides more security and data authentication compare to other image data security approach.
Styles APA, Harvard, Vancouver, ISO, etc.
41

Nawaz, Saqib Ali, Jingbing Li, Uzair Aslam Bhatti, Anum Mehmood, Raza Ahmed, Zeeshan et Qurat Ul Ain. « A Novel Hybrid Discrete Cosine Transform Speeded Up Robust Feature-Based Secure Medical Image Watermarking Algorithm ». Journal of Medical Imaging and Health Informatics 10, no 11 (1 novembre 2020) : 2588–99. http://dx.doi.org/10.1166/jmihi.2020.3220.

Texte intégral
Résumé :
With the advancement of networks and multimedia, digital watermarking technology has received worldwide attention as an effective method of copyright protection. Improving the anti-geometric attack ability of digital watermarking algorithms using image feature-based algorithms have received extensive attention. This paper proposes a novel robust watermarking algorithm based on SURF-DCT perceptual hashing (Speeded Up Robust Features and Discrete Cosine Transform), namely blind watermarking. We design and implement a meaningful binary watermark embedding and extraction algorithm based on the SURF feature descriptor and discrete-cosine transform domain digital image watermarking algorithm. The algorithm firstly uses the affine transformation with a feature matrix and chaotic encryption technology to preprocess the watermark image, enhance the confidentiality of the watermark, and perform block and DCT coefficients extraction on the carrier image, and then uses the positive and negative quantization rules to modify the DCT coefficients. The embedding of the watermark is completed, and the blind extraction of the watermark realized. Correlation values are more than 90% in most of the attacks. It provides better results against different noise attacks and also better performance against rotation. Transparency and high computational efficiency, coupled with dual functions of copyright protection and content authentication, is the advantage of the proposed algorithm.
Styles APA, Harvard, Vancouver, ISO, etc.
42

YE Tianyu, 叶天语. « A Selfembedding Image Watermarking Scheme with Dual Purpose ». ACTA PHOTONICA SINICA 41, no 7 (2012) : 859–67. http://dx.doi.org/10.3788/gzxb20124107.0859.

Texte intégral
Styles APA, Harvard, Vancouver, ISO, etc.
43

YE Tianyu, 叶天语. « A Selfembedding Image Watermarking Scheme with Dual Purpose ». ACTA PHOTONICA SINICA 41, no 7 (2012) : 859–67. http://dx.doi.org/10.3788/gzxb20124107.859.

Texte intégral
Styles APA, Harvard, Vancouver, ISO, etc.
44

Hu, Hwai-Tsu, et Wei-Hsi Chen. « A dual cepstrum-based watermarking scheme with self-synchronization ». Signal Processing 92, no 4 (avril 2012) : 1109–16. http://dx.doi.org/10.1016/j.sigpro.2011.11.001.

Texte intégral
Styles APA, Harvard, Vancouver, ISO, etc.
45

Hu, Ming-Chiang, Der-Chyuan Lou et Ming-Chang Chang. « Dual-wrapped digital watermarking scheme for image copyright protection ». Computers & ; Security 26, no 4 (juin 2007) : 319–30. http://dx.doi.org/10.1016/j.cose.2006.11.007.

Texte intégral
Styles APA, Harvard, Vancouver, ISO, etc.
46

Tang, Lin-Lin, Chun Ta Huang, Jeng-Shyang Pan et Chang-Yong Liu. « Dual watermarking algorithm based on the Fractional Fourier Transform ». Multimedia Tools and Applications 74, no 12 (8 juin 2013) : 4397–413. http://dx.doi.org/10.1007/s11042-013-1531-8.

Texte intégral
Styles APA, Harvard, Vancouver, ISO, etc.
47

Mo, Jia, Zhaofeng Ma, Yixian Yang et Xinxin Niu. « A Quantum Watermarking Protocol Based on Bell Dual Basis ». International Journal of Theoretical Physics 52, no 11 (19 juin 2013) : 3813–19. http://dx.doi.org/10.1007/s10773-013-1687-z.

Texte intégral
Styles APA, Harvard, Vancouver, ISO, etc.
48

Nan, Hai, Bin Fang, Weibin Yang, Jiye Qian, Ming Li, Yi Liu et Yushu Zhang. « Cryptanalysis and Improvement of the Robust and Blind Watermarking Scheme for Dual Color Image ». Mathematical Problems in Engineering 2015 (2015) : 1–10. http://dx.doi.org/10.1155/2015/526174.

Texte intégral
Résumé :
With more color images being widely used on the Internet, the research on embedding color watermark image into color host image has been receiving more attention. Recently, Su et al. have proposed a robust and blind watermarking scheme for dual color image, in which the main innovation is the using of two-level DCT. However, it has been demonstrated in this paper that the original scheme in Su’s study is not secure and can be attacked by our proposed method. In addition, some errors in the original scheme have been pointed out. Also, an improvement measure is presented to enhance the security of the original watermarking scheme. The proposed method has been confirmed by both theoretical analysis and experimental results.
Styles APA, Harvard, Vancouver, ISO, etc.
49

Liu, Jing, Jingbing Li, Jixin Ma, Naveed Sadiq, Uzair Bhatti et Yang Ai. « A Robust Multi-Watermarking Algorithm for Medical Images Based on DTCWT-DCT and Henon Map ». Applied Sciences 9, no 4 (18 février 2019) : 700. http://dx.doi.org/10.3390/app9040700.

Texte intégral
Résumé :
To resolve the contradiction between existing watermarking methods—which are not compatible with the watermark’s ability to resist geometric attacks—and robustness, a robust multi-watermarking algorithm suitable for medical images is proposed. First, the visual feature vector of the medical image was obtained by dual-tree complex wavelet transform and discrete cosine transform (DTCWT-DCT) to perform multi-watermark embedding and extraction. Then, the multi-watermark was preprocessed using the henon map chaotic encryption technology to strengthen the security of watermark information, and combined with the concept of zero watermark to make the watermark able to resist both conventional and geometric attacks. Experimental results show that the proposed algorithm can effectively extract watermark information; it implements zero watermarking and blind extraction. Compared with existing watermark technology, it has good performance in terms of its robustness and resistance to geometric attacks and conventional attacks, especially in geometric attacks.
Styles APA, Harvard, Vancouver, ISO, etc.
50

Bander Albarakati, Abdullah Basuhail, Gibrael Abo Samra, Bander Albarakati, Abdullah Basuhail, Gibrael Abo Samra. « A Fuzzy Controlled Image Watermarking Based on a Dual Transform Technique ». journal of king abdulaziz university computing and information technology sciences 5, no 1 (27 mai 2016) : 83–92. http://dx.doi.org/10.4197/comp.5-1.6.

Texte intégral
Résumé :
This paper presents a new watermarking technique using hybrid image transforms that aims to be very robust against attacks. It also aims to reduce the amount of distortion created from embedding the watermark as much as possible, and have good capacity. The proposed system uses a hybrid watermarking technique that is based on Non-Subsampled Contourlet Transform and Discrete Wavelet Transform. In addition, the proposed system makes use of the fuzzy logic to automatically choose the strength of the embedded watermark. Furthermore, the system uses Spread Spectrum Code Division Multiple Access to embed and recover the watermark after transforming the image. To enhance recoverability of the watermarks, the system uses a high level of redundancy in the embedding process, which allows a powerful Error Correcting Code to be used in the recovery process. The fuzzy logic is used to help the system in producing watermarked images that reserve their quality and not be heavily altered after embedding the watermark. Experiments were performed to measure the quality of the proposed system using JPEG compression attacks. The results showed that the proposed system is robust and has good capacity and imperceptibly although it suffers from being computationally complex.
Styles APA, Harvard, Vancouver, ISO, etc.
Nous offrons des réductions sur tous les plans premium pour les auteurs dont les œuvres sont incluses dans des sélections littéraires thématiques. Contactez-nous pour obtenir un code promo unique!

Vers la bibliographie