Academic literature on the topic 'Static image watermarking'

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the lists of relevant articles, books, theses, conference reports, and other scholarly sources on the topic 'Static image watermarking.'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Journal articles on the topic "Static image watermarking"

1

Singh, Shweta, Ayush Sharma, and Alankrita Aggarwal. "Performance Comparison of Image Processing Techniques on Various Filters." International Journal of Security and Privacy in Pervasive Computing 13, no. 3 (July 2021): 34–42. http://dx.doi.org/10.4018/ijsppc.2021070103.

Full text
Abstract:
Image processing plays a crucial role in a large number of applications including fields of medical, watermarking in images, spatial data analysis applications. When images are static, generally, users can get good performance, though processing of real-time images are dependent on various parameters like efficacy of algorithm and filtering techniques. Researchers have observed high variation in performance during processing of real-life images; therefore, efficient filtering techniques play a vital role in determining the implemented processing algorithm's performance as well as the quality of captured images taken into consideration. Thus, the focus of this study is to discuss various widely used filtering techniques and efficient performance analysis in outdoor environmental scenarios. A real-time efficiency system is made to conclude each filter type's effectiveness in different environmental conditions with comparison and evaluation, highlighting merits and demerits of different algorithms based on application needs along with external factors.
APA, Harvard, Vancouver, ISO, and other styles
2

Rashid, Aqsa, Nadeem Salamat, and V. B. Surya Prasath. "Dynamic Increased Capacity Approach Steganography in Spatial Domain." Traitement du Signal 37, no. 4 (October 10, 2020): 671–78. http://dx.doi.org/10.18280/ts.370417.

Full text
Abstract:
Information security using image steganography is the process of concealing secret information within an image. The conventional methods are static approaches having fixed capacity in term of embedding rate. To solve the problem of static behavior and fixed capacity, we proposed a method that is dynamic approach and increased capacity for embedding rate. Novel algorithm can be used by the data storage industry to design new data storage devices. Other possible applications of this research work will be its usage in other areas such as Watermarking, Document Tracking Tool, Document Authentication Tool, and General Communication etc. Experimental results demonstrate that our proposed steganography algorithm produces the best performance among state-of-the-art algorithms in evaluation of subjective visual assessment as well as objective error metrics.
APA, Harvard, Vancouver, ISO, and other styles
3

Naoe, Kensuke, Hideyasu Sasaki, and Yoshiyasu Takefuji. "Secure Key Generation for Static Visual Watermarking by Machine Learning in Intelligent Systems and Services." International Journal of Systems and Service-Oriented Engineering 1, no. 1 (January 2010): 46–61. http://dx.doi.org/10.4018/ijssoe.2010010103.

Full text
Abstract:
The Service-Oriented Architecture (SOA) demands supportive technologies and new requirements for mobile collaboration across multiple platforms. One of its representative solutions is intelligent information security of enterprise resources for collaboration systems and services. Digital watermarking became a key technology for protecting copyrights. In this article, the authors propose a method of key generation scheme for static visual digital watermarking by using machine learning technology, neural network as its exemplary approach for machine learning method. The proposed method is to provide intelligent mobile collaboration with secure data transactions using machine learning approaches, herein neural network approach as an exemplary technology. First, the proposed method of key generation is to extract certain type of bit patterns in the forms of visual features out of visual objects or data as training data set for machine learning of digital watermark. Second, the proposed method of watermark extraction is processed by presenting visual features of the target visual image into extraction key or herein is a classifier generated in advance by the training approach of machine learning technology. Third, the training approach is to generate the extraction key, which is conditioned to generate watermark signal patterns, only if proper visual features are presented to the classifier. In the proposed method, this classifier which is generated by the machine learning process is used as watermark extraction key. The proposed method is to contribute to secure visual information hiding without losing any detailed data of visual objects or any additional resources of hiding visual objects as molds to embed hidden visual objects. In the experiments, they have shown that our proposed method is robust to high pass filtering and JPEG compression. The proposed method is limited in its applications on the positions of the feature sub-blocks, especially on geometric attacks like shrinking or rotation of the image.
APA, Harvard, Vancouver, ISO, and other styles
4

Vijaya Kumar, A. "A New System for Fake Profile Recognition in Social Networks." Informatica : Journal of Applied Machines Electrical Electronics Computer Science and Communication Systems 01, no. 01 (December 1, 2020): 38–43. http://dx.doi.org/10.47812/ijamecs2010106.

Full text
Abstract:
The billions of users all over the world are spending online social network, such as Twitter, Facebook, Tumbler and LinkedIn. The flaws in this social media may indications to abuse user’s information and execute an attack of identity cloning. In this work mainly focuses, a new method for hiding data to hide precise details in profile pictures to learn botnets and fake profiles. In this paper, presents an ordering and investigation of recognition mechanisms of genetic copy attacks on online network of social, purely established on attribute likeness, friend network likeness, and profile inquiry for a time interval and record of Internet Protocol sequences. This work, proposals an algorithm for transform discrete wavelet for hiding the data. So, the system can prevent the replica attacks and offer the whole user data privacy protective. Similarly, when users upload the profile image or photos it would be first watermarked and then updated. Java static watermarking systems and algorithms is been used for watermarking procedure. Here tracking any fake users updating the same profile picture given easier and tracking their IP address also became easier. Also, our system raises certain features which can be investigated to the users through process of registration. Thus, providing secure authentication. Hence avoiding clone attacks in social media became easier.
APA, Harvard, Vancouver, ISO, and other styles

Dissertations / Theses on the topic "Static image watermarking"

1

Číka, Petr. "Digitální vodoznačení obrazu." Doctoral thesis, Vysoké učení technické v Brně. Fakulta elektrotechniky a komunikačních technologií, 2009. http://www.nusl.cz/ntk/nusl-233465.

Full text
Abstract:
Digital image watermarking has developed for the purpose of protecting intellectual property rights to multimedia data. The focus of this thesis is searching for an alternative solution of digital image watermarking methods. A detailed analysis of watermarking methods particularly in the frequency domain, and the modification of these methods are the main aim of this work. Improved performance in watermark extraction is one of the main goals. First, the common static image watermarking methods, possible attacks on the watermarked data and techniques for objective measurement of watermarked image quality are shortly introduced. Techniques which use the space domain for watermarking ar described in the next part of this work. It is about techniques which insert the watermark into the least significant bits of an image both in the RGB domain and in the YUV domain. The main part of the thesis depicts modified and newly developed static image watermarking methods in the frequency domain. These methods use various transforms and error-correction codes, by means of which the watermark robustness increases. All the methods developed are tested in MATLAB. Results together with tables and graphs are one part of work. The end of the thesis is devoted to a comparison of all the developed methods and their evaluation.
APA, Harvard, Vancouver, ISO, and other styles

Book chapters on the topic "Static image watermarking"

1

Naoe, Kensuke, Hideyasu Sasaki, and Yoshiyasu Takefuji. "Secure Key Generation for Static Visual Watermarking by Machine Learning in Intelligent Systems and Services." In Machine Learning, 631–46. IGI Global, 2012. http://dx.doi.org/10.4018/978-1-60960-818-7.ch316.

Full text
Abstract:
The Service-Oriented Architecture (SOA) demands supportive technologies and new requirements for mobile collaboration across multiple platforms. One of its representative solutions is intelligent information security of enterprise resources for collaboration systems and services. Digital watermarking became a key technology for protecting copyrights. In this article, the authors propose a method of key generation scheme for static visual digital watermarking by using machine learning technology, neural network as its exemplary approach for machine learning method. The proposed method is to provide intelligent mobile collaboration with secure data transactions using machine learning approaches, herein neural network approach as an exemplary technology. First, the proposed method of key generation is to extract certain type of bit patterns in the forms of visual features out of visual objects or data as training data set for machine learning of digital watermark. Second, the proposed method of watermark extraction is processed by presenting visual features of the target visual image into extraction key or herein is a classifier generated in advance by the training approach of machine learning technology. Third, the training approach is to generate the extraction key, which is conditioned to generate watermark signal patterns, only if proper visual features are presented to the classifier. In the proposed method, this classifier which is generated by the machine learning process is used as watermark extraction key. The proposed method is to contribute to secure visual information hiding without losing any detailed data of visual objects or any additional resources of hiding visual objects as molds to embed hidden visual objects. In the experiments, they have shown that our proposed method is robust to high pass filtering and JPEG compression. The proposed method is limited in its applications on the positions of the feature sub-blocks, especially on geometric attacks like shrinking or rotation of the image.
APA, Harvard, Vancouver, ISO, and other styles
2

Chareyron, Gaël, Jérôme Da Rugna, and Alain Trémeau. "Color in Image Watermarking." In Advanced Techniques in Multimedia Watermarking, 36–56. IGI Global, 2010. http://dx.doi.org/10.4018/978-1-61520-903-3.ch003.

Full text
Abstract:
This chapter summarizes the state-of-the-art color techniques used in the emerging field of image watermarking. It is now well understood that a color approach is required when it comes to deal with security, steganography and watermarking applications of multimedia contents. Indeed, consumers and business expectations are focused on the protection of their contents, which are here color images and videos. In the past few years, several gray-level image watermarking schemes have been proposed but their application to color image is often inadequate since they usually work with the luminance or with individual color channel. Unfortunately, color cannot be considered as a simple RGB decomposition and all of its intrinsic information must be integrated in the watermarking process. Therefore, it is the chapter objective to present, first, the major difficulties associated with the treatment of color images, and second, the state-of-the-art methods used in the field of color image watermarking.
APA, Harvard, Vancouver, ISO, and other styles
3

Maity, Santi P., and Claude Delpha. "Optimization in Digital Watermarking Techniques." In Digital Rights Management, 1493–529. IGI Global, 2013. http://dx.doi.org/10.4018/978-1-4666-2136-7.ch076.

Full text
Abstract:
Digital watermarking (DWM) becomes a multidisciplinary research area involving theory of communications, signal processing, multimedia coding, information theory, cryptography, computer science and game theory etc. This chapter looks digital watermarking as an optimization problem from different combination of these areas. The goal is to resolve the conflicting requirements of different parameters and properties of digital watermarking. The chapter also presents a review of recent advances in the state-of-the-art algorithms for optimized watermarking techniques. Optimized watermarking methods are then discussed from the rigorous mathematical analysis to theoretical derivations of algorithms with the aid of soft computing techniques. The design and implementation of optimized watermarking methods for the image, video and sound signals are discussed in the context of various diverse applications. Finally, the scope of future research in this area is highlighted.
APA, Harvard, Vancouver, ISO, and other styles
4

Maity, Santi P., and Claude Delpha. "Optimization in Digital Watermarking Techniques." In Advanced Techniques in Multimedia Watermarking, 369–406. IGI Global, 2010. http://dx.doi.org/10.4018/978-1-61520-903-3.ch015.

Full text
Abstract:
Digital watermarking (DWM) becomes a multidisciplinary research area involving theory of communications, signal processing, multimedia coding, information theory, cryptography, computer science and game theory etc. This chapter looks digital watermarking as an optimization problem from different combination of these areas. The goal is to resolve the conflicting requirements of different parameters and properties of digital watermarking. The chapter also presents a review of recent advances in the state-of-the-art algorithms for optimized watermarking techniques. Optimized watermarking methods are then discussed from the rigorous mathematical analysis to theoretical derivations of algorithms with the aid of soft computing techniques. The design and implementation of optimized watermarking methods for the image, video and sound signals are discussed in the context of various diverse applications. Finally, the scope of future research in this area is highlighted.
APA, Harvard, Vancouver, ISO, and other styles
5

Chiu, Dickson K. W., Yuexuan Wang, Patrick Hung, Vivying S. Y. Cheng, Kai-Kin Chan, Eleanna Kafeza, Wei-Feng Tung, Yi Zhuang, and Nan Jiang. "Governance of Cross-Organizational Healthcare Document Exchange through Watermarking Services and Alerts." In Mobile and Web Innovations in Systems and Service-Oriented Engineering, 274–99. IGI Global, 2013. http://dx.doi.org/10.4018/978-1-4666-2470-2.ch015.

Full text
Abstract:
There is an increasing demand for sharing documents for process integration among organizations. Web services technology has recently been widely proposed and gradually adopted as a platform for supporting such an integration. There are no holistic solutions thus far that are able to tackle the various protection issues, specifically regarding the security and privacy protection requirements in cross-organizational progress integration. This paper proposes the exchange of documents through a Document / Image Exchange Platform (DIEP), replacing traditional ad-hoc and manual exchange practices. The authors show how the contemporary technologies of Web services under a Service-Oriented Architecture (SOA), together with watermarking, can help protect document exchanges with layered implementation architecture. Furthermore, to facilitate governance and regulation compliance against protection policy violation attempts, the management and the affected parties are notified with alerts for warning and possible handling. The authors discuss the applicability of the proposed platform with a physician towards security and privacy protection requirements based on the Health Insurance Portability and Accountability Act (HIPAA) in the United States, which imposes national regulations to protect individuals’ healthcare information. The proposed approach aims at facilitating the whole governance process from technical to management level with a single unified platform.
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!

To the bibliography