Academic literature on the topic 'Transform domain watermark'

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the lists of relevant articles, books, theses, conference reports, and other scholarly sources on the topic 'Transform domain watermark.'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Journal articles on the topic "Transform domain watermark"

1

Mukhammad Solikhin, Yohanssen Pratama, Purnama Pasaribu, Josua Rumahorbo, and Bona Simanullang. "Analisis Watermarking Menggunakan Metode Discrete Cosine Transform (DCT) dan Discrete Fourier Transform (DFT)." Jurnal Sistem Cerdas 5, no. 3 (2022): 155–70. http://dx.doi.org/10.37396/jsc.v5i3.192.

Full text
Abstract:
Digital image watermarking is the insertion of watermarks into digital image media. Several types of watermarking methods used are Discrete Cosine Transform (DCT) and Discrete Fourier Transform (DFT). Both of these watermarking methods work in the frequency domain (transform). Digital image watermarking using the frequency domain is carried out on the frequency coefficient. This study used 30 digital image data as material for digital image watermaking analysis with 10 data each in binary, grayscale and color digital images in jpg, png and bmp formats. Digital images in the binary and grayscale domains are conversions from digital images in the true color (RGB) domain. Digital image watermarking includes three main processes, namely embedding the watermarked image on the original digital image, extracting the watermarked image and measuring the correlation between the two digital images. Correlation aims to measure two variables that have the same relationship. The technology used in this research work is MATLAB (Matrix Laboratory) as a high-performance programming language for computing in solving problems with solutions expressed in mathematical notation. The results of the discussion prove that the watermarking process in terms of color, for DCT, RGB is better and binary is better for DFT. And the watermaking process, in terms of the type of watermark inserted, for both DCT and DFT, a good watermark is an invisible watermark.
APA, Harvard, Vancouver, ISO, and other styles
2

Zhang, Kaixuan. "Blind Digital Watermark Based on Discrete Fourier Transformation." Highlights in Science, Engineering and Technology 1 (June 14, 2022): 441–52. http://dx.doi.org/10.54097/hset.v1i.501.

Full text
Abstract:
The policy and security of digital images are concerned by all artists. Embedding blind digital watermarks to images is an effective solution to such problem. The existing blind digital watermark techniques for images are usually based on the spatial domain method, such as some build-in tools in some software like Photoshop. Those methods' imperceptibility is good, but the robustness is dissatisfactory. Therefore, blind digital watermark based on the frequency domain is becoming popular nowadays. The use of the frequency domain-based techniques can not only keep the imperceptibility but also ensure good robustness and non-removability. According to the reasons mentioned above, this thesis presents a frequency domain-based blind digital watermark technique. This method uses basic discrete Fourier transformation to transform an image to the frequency domain and then embeds a digital watermark. To increase the security, we also introduce some methods to encode watermarks before embedding them to the images. We conduct some experiments by applying the technique to some images with different watermarks. In the experiments, it can embed blind watermarks with the least effect on the quality of the original image and can also successfully extract watermarks from the watermarked image. The results show this technique is highly useable. We also conduct some experiments to simulate the attacks. This technique also shows great robustness after many kinds of different attacking methods.
APA, Harvard, Vancouver, ISO, and other styles
3

Budiman, Donny, Andriyan B. Suksmono, and Donny Danudirdjo. "Fibonacci Sequence – based FFT and DCT Performance Comparison in Audio Watermarking." International Journal of Engineering & Technology 8, no. 1.9 (2019): 209–14. http://dx.doi.org/10.14419/ijet.v8i1.9.26401.

Full text
Abstract:
Audio watermarking is a manner to hide watermark into the audio for copyright protection. Recently, there are many techniques based on audio watermarking. Frequency domain based audio watermarking is one of audio watermarking technique that has good watermark robustness against many attacks, good watermarked audio quality, and also high watermark payload. In this paper, FFT and DCT performance will be compared as transform technique for data hiding in audio. Host audio is first transformed into frequency domain in frame-based by FFT or DCT, then watermark is embedded into the frequency domain signal by Fibonacci sequence rule. Different than DCT which can embed watermark on full frame, in FFT, only a half of frame that can be embedded by watermark due to FFT properties. After embedding, the frequency domain signal is transformed to time domain by IFFT or IDCT to get watermarked audio. The simulation result of frequency based audio watermarking comparing FFT and DCT transform method shows that watermark payload for perfect robustness at no attack condition could reach up to 70 bps for FFT and 500 bps for DCT. With good watermarked audio quality due to ODG > -1 and SNR > 30 dB. Due to this performance, DCT is a recommended transform method for audio watermarking technique to obtain high imperceptibility, strong robustness and high capacity than FFT. Â
APA, Harvard, Vancouver, ISO, and other styles
4

Togu Novriansyah Turnip, Tegar Arifin Prasetyo, Nevi Aktasia Banjarnahor, Winda Mariana Pasaribu, and Sopian Manurung. "Application of Double Pictures to Audio Watermarking using Discrete Cosine Transform (DCT) and Singular Value Decomposition (SVD) Methods." Journal of Applied Technology and Informatics Indonesia 1, no. 2 (2022): 7–13. http://dx.doi.org/10.54074/jati.v1i2.32.

Full text
Abstract:
One way to control the development of arbitrary distribution of audio is to apply audio watermarking. Audio Watermarking is used to identify the ownership rights of audio files by embedding a watermark while paying attention to the audio quality and the watermark's resistance to amplify, resampling, and invert attacks. Discrete Cosine Transform (DCT) and Singular Value Decomposition (SVD) methods are frequency-domain methods that have a good robustness. The DCT and SVD methods are combined with inserting and extracting watermarks using two images as watermarks. From the test results, the effect of inserting an audio watermark with two images does not significantly impact the durability of the watermark and the quality of the audio inserted with the watermark. However, the alpha value has a significant effect. The higher the alpha value, the lower the audio SNR value by an average of 1.93 dB from an alpha value of 0.0008 and 0.001 for each type of classical, jazz, and rock audio genre.
APA, Harvard, Vancouver, ISO, and other styles
5

Liu, Yanwei, Jinxia Liu, Antonios Argyriou, Siwei Ma, Liming Wang, and Zhen Xu. "360-Degree VR Video Watermarking Based on Spherical Wavelet Transform." ACM Transactions on Multimedia Computing, Communications, and Applications 17, no. 1 (2021): 1–23. http://dx.doi.org/10.1145/3425605.

Full text
Abstract:
Similar to conventional video, the increasingly popular 360 virtual reality (VR) video requires copyright protection mechanisms. The classic approach for copyright protection is the introduction of a digital watermark into the video sequence. Due to the nature of spherical panorama, traditional watermarking schemes that are dedicated to planar media cannot work efficiently for 360 VR video. In this article, we propose a spherical wavelet watermarking scheme to accommodate 360 VR video. With our scheme, the watermark is first embedded into the spherical wavelet transform domain of the 360 VR video. The spherical geometry of the 360 VR video is used as the host space for the watermark so that the proposed watermarking scheme is compatible with the multiple projection formats of 360 VR video. Second, the just noticeable difference model, suitable for head-mounted displays (HMDs), is used to control the imperceptibility of the watermark on the viewport. Third, besides detecting the watermark from the spherical projection, the proposed watermarking scheme also supports detecting watermarks robustly from the viewport projection. The watermark in the spherical domain can protect not only the 360 VR video but also its corresponding viewports. The experimental results show that the embedded watermarks are reliably extracted both from the spherical and the viewport projections of the 360 VR video, and the robustness of the proposed scheme to various copyright attacks is significantly better than that of the competing planar-domain approaches when detecting the watermark from viewport projection.
APA, Harvard, Vancouver, ISO, and other styles
6

Thomas, Reji, Vibisha V, Tabassum A, and Thanuja S. "Digital Watermarking." International Research Journal of Computer Science 10, no. 05 (2023): 124–29. http://dx.doi.org/10.26562/irjcs.2023.v1005.04.

Full text
Abstract:
The paper introduces the digital watermarking technology which is a data hiding technique that embeds a message into a multimedia work such as an image or text or other digital object. The proposed technique has several important applications; the majorly important is the digital copyrights protection. The digital watermarking system as any other data hiding technique has its own requirements that make the digital watermark strong as possible. Technologies of digital watermarking are mainly classified depending on their domain to spatial domain watermarks, Watermarks belonging to frequency (transform) domain and wavelet domain watermarks. The digital watermarks suffer from different types of attacks that include either state-of-the-art watermarking attacks or watermark estimation attacks. The recovery from these attacks requires strong detection techniques; the digital watermark agent provides a professional solution for these attacks.
APA, Harvard, Vancouver, ISO, and other styles
7

Budiman, Gelar, Andriyan Bayu Suksmono, and Donny Danudirdjo. "FFT-Based Data Hiding on Audio in LWT-Domain Using Spread Spectrum Technique." Elektronika ir Elektrotechnika 26, no. 3 (2020): 20–27. http://dx.doi.org/10.5755/j01.eie.26.3.23950.

Full text
Abstract:
Audio watermarking is a process to hide digital data without being seen or heard by the sense of sight or hearing. Watermaking is applied to insert the copyright on digital media, such as an image file, an audio file or a video file. In this paper, we propose watermarking procedure to embed spread spectrum watermark into frequency domain of adaptive selected subband from host audio. Lifting Wavelet Transform (LWT) is used to decompose the host audio into several subbands, and then Fast Fourier Transform (FFT) transforms selected several subbands with lowest energy. The watermark image is converted into one-dimensional signal, then it is modulated by imperceptible pseudo-noise (PN) code with controlled gain. Next, the frequency domain of audio is added by modulated and imperceptible watermark prior to transforming it to time domain by Inverse FFT (IFFT) obtaining watermarked subbands. Finally, the watermarked subbands are combined with other unused subbands by inverse LWT (ILWT) becoming the perfect version of watermarked audio. The result of this method has good robustness against most attacks from stirmark benchmark experiments, good imperceptibility with Signal to Noise Ratio (SNR) more than 30 dB and payload 172.66 bps.
APA, Harvard, Vancouver, ISO, and other styles
8

Liu, Li, and Ji Chun Tan. "Multiple Watermarks Embedding Simultaneously to Identify Image Status Based on Fractional Fourier Transform." Advanced Materials Research 341-342 (September 2011): 758–62. http://dx.doi.org/10.4028/www.scientific.net/amr.341-342.758.

Full text
Abstract:
A new method of multiple watermarks embedding simultaneously to identify image status based on once and twice discrete fractional Fourier transform (DFRT) is presented. Random series watermark, chirp watermark and annotation watermark are embedded simultaneously in fractional Fourier transform domain to identify digital tamper detection, scanning detection, duplicate detection. According to the extracting situation of three kinds of watermarks from an image and the twice DFRT amplitude spectrum, we can know whether the image is tampered, scanned or duplicated. It provides a convenient way to identify the status of the image and will be an all-sided and comprehensive anti-counterfeiting technology.
APA, Harvard, Vancouver, ISO, and other styles
9

Omura, Hajime, and Teruya Minamoto. "Image quality degradation assessment based on the dual-tree complex discrete wavelet transform for evaluating watermarked images." International Journal of Wavelets, Multiresolution and Information Processing 15, no. 05 (2017): 1750046. http://dx.doi.org/10.1142/s0219691317500461.

Full text
Abstract:
We propose a new image quality degradation assessment method based on the dual-tree complex discrete wavelet transform (DT-CDWT) for evaluating the image quality of watermarked images. The peak signal-to-noise ratio (PSNR) and structural similarity (SSIM) are widely used to evaluate image quality degradation resulting from embedding a digital watermark. The majority of digital image watermarking methods embed a digital watermark in the spatial or frequency domain of an original image. They evaluate image quality degradation using only the spatial domain in spite of the fact that the majority of digital image watermarking methods embed a digital watermark in the spatial or frequency domain. As a result, they do not always fairly evaluate the image quality degradation. Therefore, our method evaluates image quality degradation of the watermarked images using features in the spatial and frequency domains. To extract the features, we defined three indices: 1-norm estimation using bit-planes in the spatial domain, the sharpness, and 1-norm estimation based on the DT-CDWT domains. We describe our image quality assessment method in detail and present experimental results demonstrating that there is a strong positive correlation between the result obtained by our method and a subjective evaluation, in comparison with PSNR and SSIM.
APA, Harvard, Vancouver, ISO, and other styles
10

Hadad, Abbas Abd-Alhussein, Hiyam N. Khalid, Zainab S. Naser, and Mustafa Sabah Taha. "A Robust Color Image Watermarking Scheme Based on Discrete Wavelet Transform Domain and Discrete Slantlet Transform Technique." Ingénierie des systèmes d information 27, no. 2 (2022): 313–19. http://dx.doi.org/10.18280/isi.270215.

Full text
Abstract:
Watermarking is primarily used to prevent unauthorized copying of digital data by inserting a watermark as a symbol of ownership in the digital data. The purpose of this work is to increase the imperceptibility and robustness of watermarked image by utilizing the Discrete Wavelet Transform (DWT) domain and Discrete Slantlet Transform (DST) technique. In compared to existing methodologies, the strategies used in this work considerably increased the robustness, imperceptibility, and protection of the watermarked image against JPEG compression and other types of noise attacks. The proposed method's robustness was determined by comparing the image's Normalized Cross-Correlation (NCC) value before and after the watermarking operation. The proposed method increased the NCC value to greater than 0.7 and the Peak Signal-to-Noise Ratio (PSNR) value to greater than 59 decibels (dB). Additionally, the proposed approach does not require knowledge of the original image in order to extract the watermarks.
APA, Harvard, Vancouver, ISO, and other styles
More sources

Dissertations / Theses on the topic "Transform domain watermark"

1

Al-Nu'aimi, Abdallah Saleem Na. "Design, implementation and performance evaluation of robust and secure watermarking techniques for digital coloured images : designing new adaptive and robust imaging techniques for embedding and extracting 2D watermarks in the spatial and transform domain using imaging and signal processing techniques." Thesis, University of Bradford, 2009. http://hdl.handle.net/10454/4255.

Full text
Abstract:
The tremendous spreading of multimedia via Internet motivates the watermarking as a new promising technology for copyright protection. This work is concerned with the design and development of novel algorithms in the spatial and transform domains for robust and secure watermarking of coloured images. These algorithms are adaptive, content-dependent and compatible with the Human Visual System (HVS). The host channels have the ability to host a large information payload. Furthermore, it has enough capacity to accept multiple watermarks. Abstract This work achieves several contributions in the area of coloured images watermarking. The most challenging problem is to get a robust algorithm that can overcome geometric attacks, which is solved in this work. Also, the search for a very secure algorithm has been achieved via using double secret keys. In addition, the problem of multiple claims of ownership is solved here using an unusual approach. Furthermore, this work differentiates between terms, which are usually confusing the researchers and lead to misunderstanding in most of the previous algorithms. One of the drawbacks in most of the previous algorithms is that the watermark consists of a small numbers of bits without strict meaning. This work overcomes this weakness III in using meaningful images and text with large amounts of data. Contrary to what is found in literature, this work shows that the green-channel is better than the blue-channel to host the watermarks. A more general and comprehensive test bed besides a broad band of performance evaluation is used to fairly judge the algorithms.
APA, Harvard, Vancouver, ISO, and other styles
2

Al-Nu'aimi, Abdallah S. N. A. "Design, Implementation and Performance Evaluation of Robust and Secure Watermarking Techniques for Digital Coloured Images. Designing new adaptive and robust imaging techniques for embedding and extracting 2D watermarks in the spatial and transform domain using imaging and signal processing techniques." Thesis, University of Bradford, 2009. http://hdl.handle.net/10454/4255.

Full text
Abstract:
The tremendous spreading of multimedia via Internet motivates the watermarking as a new promising technology for copyright protection. This work is concerned with the design and development of novel algorithms in the spatial and transform domains for robust and secure watermarking of coloured images. These algorithms are adaptive, content-dependent and compatible with the Human Visual System (HVS). The host channels have the ability to host a large information payload. Furthermore, it has enough capacity to accept multiple watermarks. Abstract This work achieves several contributions in the area of coloured images watermarking. The most challenging problem is to get a robust algorithm that can overcome geometric attacks, which is solved in this work. Also, the search for a very secure algorithm has been achieved via using double secret keys. In addition, the problem of multiple claims of ownership is solved here using an unusual approach. Furthermore, this work differentiates between terms, which are usually confusing the researchers and lead to misunderstanding in most of the previous algorithms. One of the drawbacks in most of the previous algorithms is that the watermark consists of a small numbers of bits without strict meaning. This work overcomes this weakness III in using meaningful images and text with large amounts of data. Contrary to what is found in literature, this work shows that the green-channel is better than the blue-channel to host the watermarks. A more general and comprehensive test bed besides a broad band of performance evaluation is used to fairly judge the algorithms.
APA, Harvard, Vancouver, ISO, and other styles

Book chapters on the topic "Transform domain watermark"

1

Shao, Yafei, Guowei Wu, and Xinggang Lin. "Optimal Detection of Transform Domain Additive Watermark by Using Low Density Diversity." In Digital Watermarking. Springer Berlin Heidelberg, 2003. http://dx.doi.org/10.1007/3-540-36617-2_10.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Huang, Xingliang, and Bo Zhang. "Robust Detection of Transform Domain Additive Watermarks." In Digital Watermarking. Springer Berlin Heidelberg, 2005. http://dx.doi.org/10.1007/11551492_10.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Prathap, Ivy, and R. Anitha. "Watermark Detection in Spatial and Transform Domains Based on Tree Structured Wavelet Transform." In Communications in Computer and Information Science. Springer Berlin Heidelberg, 2014. http://dx.doi.org/10.1007/978-3-662-44966-0_22.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Ye, Tianyu. "Robust Zero-Watermark Algorithms in Hybrid Transform Domains Based on the Parity of Norm’s Highest Digit." In Lecture Notes in Electrical Engineering. Springer Berlin Heidelberg, 2011. http://dx.doi.org/10.1007/978-3-642-19706-2_10.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Kwon, O.-Hyung, and Rae-Hong Park. "Watermarking for Still Images Using a Computation of the Watermark Weighting Factor and the Human Visual System in the DCT Domain." In Advances in Multimedia and Interactive Technologies. IGI Global, 2013. http://dx.doi.org/10.4018/978-1-4666-2217-3.ch013.

Full text
Abstract:
In this chapter, the authors propose a Discrete Cosine Transform (DCT)-based watermarking method using the calculation of the watermark weighting factor and the Human Visual System (HVS) for the given peak signal to noise ratio of still image as well as the specified length of watermarks to be inserted. Using the energy relationship of the DCT, they derive the equation that directly computes the watermark weighting factor in the DCT domain. In addition, the authors propose a digital watermarking method for still images, in which the HVS is used in the DCT domain. The modulation transfer function of the HVS model is employed to increase the invisibility of the inserted watermark in images. Experimental results show that the proposed watermarking method is an effective objective evaluation method to compare the performances of watermarking algorithms.
APA, Harvard, Vancouver, ISO, and other styles
6

Rangel-Espinoza Kevin, Cruz-Ramos Clara, Nakano Mariko, Reyes-Reyes Rogelio, and Perez-Meana Hector. "Removable Visible Watermarking System for Video Sequences." In Frontiers in Artificial Intelligence and Applications. IOS Press, 2018. https://doi.org/10.3233/978-1-61499-900-3-173.

Full text
Abstract:
This paper proposed a removable visible watermark system for video sequences using dual watermarking technique, embedding both visible and invisible watermarks into the video sequence. The visible watermark is embedded into every frame of the video sequence in the Discrete Cosine Transform (DCT) domain, considering the Human Visual System (HVS) model. The invisible watermark is embedded into every intra-frame during the MPEG encoding, using the Quantization Index Modulation-Dither Modulation (QIM-DM) technique. In the proposed scheme, two user's keys are introduced to ensure that only authorized users can remove the visible watermark to obtain clear video sequence. The experimental results show the desirable performance of the proposed scheme, in which unauthorized users cannot remove the visible watermark. The process is carried out through a totally blind manner without any extra information.
APA, Harvard, Vancouver, ISO, and other styles
7

Nikolaidis, Nikos, and Alexia Giannoula. "Robust Zero-Bit and Multi-Bit Audio Watermarking Using Correlation Detection and Chaotic Signals." In Digital Audio Watermarking Techniques and Technologies. IGI Global, 2008. http://dx.doi.org/10.4018/978-1-59904-513-9.ch004.

Full text
Abstract:
Digital rights management of audio signals through robust watermarking has received significant attention during the last years. Two approaches for blind robust watermarking of audio signals are presented in this chapter. Both approaches use chaotic maps for the generation of the watermark signals and a correlation-based watermark detection procedure. The first method is a zero-bit method that embeds high-frequency chaotic watermarks in the low frequencies of the Discrete Fourier Transform (DFT) domain, thus achieving reliable detection and robustness to a number of attacks. The second method operates on the temporal domain and robustly embeds multiple bits of information in the host signal. Experimental results are provided to demonstrate the performance of the two methods.
APA, Harvard, Vancouver, ISO, and other styles
8

Prasada Rao Borra, Surya, Kongara Ramanjaneyulu, and K. Raja Rajeswari. "A Robust and Oblivious Watermarking Method Using Maximum Wavelet Coefficient Modulation and Genetic Algorithm." In Modeling and Simulation in Engineering - Selected Problems. IntechOpen, 2020. http://dx.doi.org/10.5772/intechopen.93832.

Full text
Abstract:
An image watermarking method using Discrete Wavelet Transform (DWT) and Genetic Algorithm (GA) is presented for applications like content authentication and copyright protection. This method is robust to various image attacks. For watermark detection/extraction, the cover image is not essential. Gray scale images of size 512 × 512 as cover image and binary images of size 64 × 64 as watermark are used in the simulation of the proposed method. Watermark embedding is done in the DWT domain. 3rd and 2nd level detail sub-band coefficients are selected for further processing. Selected coefficients are arranged in different blocks. The size of the block and the number blocks depends on the size of the watermark. One watermark bit is embedded in each block. Then, inverse DWT operation is performed to get the required watermarked image. This watermarked image is used for transmission and distribution purposes. In case of any dispute over the ownership, the hidden watermark is decoded to solve the problem. Threshold-based method is used for watermark extraction. Control parameters are identified and optimized based on GA for targeted performance in terms of PSNR and NCC. Performance comparison is done with the existing works and substantial improvement is witnessed.
APA, Harvard, Vancouver, ISO, and other styles
9

Soualmi, Abdallah, Adel Alti, and Lamri Laouamer. "Multiple Blind Watermarking Framework for Security and Integrity of Medical Images in E-Health Applications." In Research Anthology on Securing Medical Systems and Records. IGI Global, 2022. http://dx.doi.org/10.4018/978-1-6684-6311-6.ch025.

Full text
Abstract:
Nowadays, e-health applications carry the most advanced information and communication technologies for ensuring quality, remote healthcare services, and support diagnostics. These applications are sharing and transmitting of medical data over the internet, which makes them serious targets for alteration and illegal access. Image watermarking presents a compelling solution for protecting patient's information and ensures medical image integrity. This paper gives a new secure framework to protect medical data based on blind multiple watermarking schemes. The proposed approach consists of combining LWT (lifting wavelet transform), QR decomposition, and Arnold chaotic map in transform domain for the first watermark, while for the second watermark is encrusted in the spatial domain. During the de-watermarking process, both extracted watermarks are compared to detect any alterations during transmitting. The experimentation results demonstrate that the suggested method achieves good image fidelity and alters detection and robustness contra different kinds of attacks.
APA, Harvard, Vancouver, ISO, and other styles
10

Ghosal, Sudipta Kr, and Jyotsna Kumar Mandal. "Genetic-Algorithm-Based Optimization of Fragile Watermarking in Discrete Hartley Transform Domain." In Handbook of Research on Natural Computing for Optimization Problems. IGI Global, 2016. http://dx.doi.org/10.4018/978-1-5225-0058-2.ch005.

Full text
Abstract:
In this chapter, a fragile watermarking scheme based on One-Dimensional Discrete Hartley Transform (1D-DHT) has been proposed to verify the authenticity of color images. One-Dimensional Discrete Hartley Transform (1D-DHT) converts each 1 x 2 sub-matrix of pixel components into transform domain. Watermark (along with a message digest MD) bits are embedded into the transformed components in varying proportion. To minimize the quality distortion, genetic algorithm (GA) based optimization is applied which yields the optimized component corresponding to each embedded component. Applying One-Dimensional Inverse Discrete Hartley Transform (1D-IDHT) on 1 x 2 sub-matrices of embedded components re-generates the pixel components in spatial domain. The reverse approach is followed by the recipient to retrieve back the watermark (along with the message digest MD) which in turn is compared against the re-computed Message Digest (MD') for authentication. Simulation results demonstrate that the proposed technique offers variable payload and less distortion as compared to existing schemes.
APA, Harvard, Vancouver, ISO, and other styles

Conference papers on the topic "Transform domain watermark"

1

Zhang, Yu, and Guangmin Sun. "A Watermark Algorithm Based on Space-domain and Transform-domain." In 2019 IEEE 9th International Conference on Electronics Information and Emergency Communication (ICEIEC). IEEE, 2019. http://dx.doi.org/10.1109/iceiec.2019.8784574.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Yongqiang, Chen, and Hu Hanping. "Gray Image Watermark Algorithm in Integer Wavelet Transform Domain." In 2010 International Conference on Electrical and Control Engineering (ICECE). IEEE, 2010. http://dx.doi.org/10.1109/icece.2010.277.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Khelifi, Fouad, Ahmed Bouridane, and Fatih Kurugollu. "On the Optimum Multiplicative Watermark Detection in the Transform Domain." In 2006 International Conference on Image Processing. IEEE, 2006. http://dx.doi.org/10.1109/icip.2006.312590.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Guangyong Gao. "A blind grayscale watermark algorithm based on chaos and mixed transform domain." In 2nd International Conference on Computer and Automation Engineering (ICCAE 2010). IEEE, 2010. http://dx.doi.org/10.1109/iccae.2010.5451305.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Mairgiotis, Antonis, Christos Koliopanos, and Lisimachos P. Kondi. "Rao based watermark detector through two-level hierarchical prior in transform domain." In PCI 2017: 21st PAN-HELLENIC CONFERENCE ON INFORMATICS. ACM, 2017. http://dx.doi.org/10.1145/3139367.3139444.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Zhu, Xiang-Wei, and Liang Xiao. "Research of Blind Watermark Detection Algorithm Based on Wavelet and Contourlet Transform Domain." In 2009 International Conference on E-Business and Information System Security (EBISS). IEEE, 2009. http://dx.doi.org/10.1109/ebiss.2009.5138034.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Liu, Jing, Fei Gao, and Hui Zhang. "A Blind Watermark Algorithm in Mixed Transform Domain Based on Chaotic Sequence Locating." In 2008 3rd International Conference on Innovative Computing Information and Control. IEEE, 2008. http://dx.doi.org/10.1109/icicic.2008.9.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

Dong, Shusen, Jianfei Li, and Shouxun Liu. "Frequency domain digital watermark algorithm implemented in spatial domain based on correlation coefficient and quadratic DCT transform." In 2016 International Conference on Progress in Informatics and Computing (PIC). IEEE, 2016. http://dx.doi.org/10.1109/pic.2016.7949570.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

Elshazly, A. R., M. E. Nasr, M. M. Fuad, and F. E. Abd El-Samie. "Synchronized double watermark audio watermarking scheme based on a transform domain for stereo signals." In 2016 Fourth International Japan-Egypt Conference on Electronics, Communications and Computers (JEC-ECC). IEEE, 2016. http://dx.doi.org/10.1109/jec-ecc.2016.7518966.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

Ghosh, Sudip, Somsubhra Talapatra, Sudipta Chakraborty, Navonil Chatterjee, Hafizur Rahaman, and Santi P. Maity. "VLSI Architecture for Spread Spectrum Image Watermarking in Walsh-Hadamard Transform Domain Using Binary Watermark." In 2012 3rd International Conference on Computer and Communication Technology (ICCCT 2012). IEEE, 2012. http://dx.doi.org/10.1109/iccct.2012.54.

Full text
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!

To the bibliography