Academic literature on the topic 'Watermark'

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the lists of relevant articles, books, theses, conference reports, and other scholarly sources on the topic 'Watermark.'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Journal articles on the topic "Watermark"

1

Palani, Aberna, and Agilandeeswari Loganathan. "Multi-image Feature Map-Based Watermarking Techniques Using Transformer." International Journal of Electrical and Electronics Research 11, no. 2 (May 30, 2023): 339–44. http://dx.doi.org/10.37391/ijeer.110214.

Full text
Abstract:
Nowadays, protecting multimedia data is a significant challenge because of the advancement of technology and software. The embedding process heavily relies on watermarking to accomplish multimedia security in terms of content authentication, proof of ownership, and tamper detection. Our objective is to develop an invariant watermark that can survive different signal-processing attacks. We presented a unique hybrid technique (DWT-QR-SWT) and multi-image invariant features generated as a watermark using a Transformer encoder-decoder model. The encoded image features are subsampled using PCA in order to decrease the dimensionality of the watermark image. The first two images are used as watermark1 and the next two images as watermark2 to produce multi-watermark feature maps. To embed the watermark, a hybrid DWT-QR decomposition has been applied to the original image1. On the primary watermarked image, two Level Stationary Wavelet Transform (SWT) were applied to embed the secondary watermark2. At the extraction phase, the tampered image is recovered by passing the extracted watermark image as input to the transformer decoder. A multi-image watermark increases data embedding capabilities and also achieves two-level content authentication, tamper detection, localization, and recovery. With a PSNR of 59.05 dB, the testing result demonstrates great resilience and improved imperceptibility.
APA, Harvard, Vancouver, ISO, and other styles
2

Hassan, Mohammed. "WATERMARK TECHNIQUE FOR AUTHENTICATION OF VISIBLY WATERMARK IMAGES." Journal of Al-Rafidain University College For Sciences ( Print ISSN: 1681-6870 ,Online ISSN: 2790-2293 ), no. 2 (October 24, 2021): 121–38. http://dx.doi.org/10.55562/jrucs.v25i2.447.

Full text
Abstract:
With the rapid spread of computer networks and the wide use of multimedia technologies, many watermarking techniques are now under development and investigation for protecting owner's intellectual rights. Watermarks can be divided into two types, visible and invisible watermarks, physical visible watermarks have been used for centuries. Now days it is used in digital library, in video broad casting, and other multimedia services. The visible watermark may face several problems. Among these problems, watermark removal and unauthorized insertion are two main concern. This paper proposes a method of invisible watermark to overcome these problems. The watermarking process based on hiding a selected watermark object, that holds a little a mount of information relative to the source object, inside the cover image which has to be authenticated. The processes are based on using invisible watermarks to protect visibly watermarked images which are done by using different techniques. The experiments have shown that the proposed algorithm can provide a very effective protection for watermarked images.
APA, Harvard, Vancouver, ISO, and other styles
3

Mokashi, Bhargavi, Vandana S. Bhat, Jagadeesh D. Pujari, S. Roopashree, T. R. Mahesh, and D. Stalin Alex. "Efficient Hybrid Blind Watermarking in DWT-DCT-SVD with Dual Biometric Features for Images." Contrast Media & Molecular Imaging 2022 (September 8, 2022): 1–14. http://dx.doi.org/10.1155/2022/2918126.

Full text
Abstract:
In the modern era of virtual computers over the notional environment of computer networks, the protection of influential documents is a major concern. To bring out this motto, digital watermarking with biometric features plays a crucial part. It utilizes advanced technology of cuffing data into digital media, i.e., text, image, video, or audio files. The strategy of cuffing an image inside another image by applying biometric features namely signature and fingerprint using watermarking techniques is the key purpose of this study. To accomplish this, a combined watermarking strategy consisting of Discrete Wavelet Transform, Discrete Cosine Transform, and Singular Value Decomposition (DWT-DCT-SVD) is projected for authentication of image that is foolproof against attacks. Here, singular values of watermark1 (fingerprint) and watermark2 (signature) are obtained by applying DWT-DCT-SVD. Affixing both the singular values of watermarks, we acquire the transformed watermark. Later, the same is applied to cover image to extract the singular values. Then we add these values to the cover image and transformed watermark to obtain a final watermarked image containing both signature and fingerprint. To upgrade the reliability, sturdiness, and originality of the image, a fusion of watermarking techniques along with dual biometric features is exhibited. The experimental results conveyed that the proposed scheme achieved an average PSNR value of about 40 dB, an average SSIM value of 0.99, and an embedded watermark resilient to various attacks in the watermarked image.
APA, Harvard, Vancouver, ISO, and other styles
4

Juarez-Sandoval, Oswaldo Ulises, Laura Josefina Reyes-Ruiz, Francisco Garcia-Ugalde, Manuel Cedillo-Hernandez, Jazmin Ramirez-Hernandez, and Robert Morelos-Zaragoza. "Additional Information Delivery to Image Content via Improved Unseen–Visible Watermarking." Electronics 10, no. 18 (September 7, 2021): 2186. http://dx.doi.org/10.3390/electronics10182186.

Full text
Abstract:
In a practical watermark scenario, watermarks are used to provide auxiliary information; in this way, an analogous digital approach called unseen–visible watermark has been introduced to deliver auxiliary information. In this algorithm, the embedding stage takes advantage of the visible and invisible watermarking to embed an owner logotype or barcodes as watermarks; in the exhibition stage, the equipped functions of the display devices are used to reveal the watermark to the naked eyes, eliminating any watermark exhibition algorithm. In this paper, a watermark complement strategy for unseen–visible watermarking is proposed to improve the embedding stage, reducing the histogram distortion and the visual degradation of the watermarked image. The presented algorithm exhibits the following contributions: first, the algorithm can be applied to any class of images with large smooth regions of low or high intensity; second, a watermark complement strategy is introduced to reduce the visual degradation and histogram distortion of the watermarked image; and third, an embedding error measurement is proposed. Evaluation results show that the proposed strategy has high performance in comparison with other algorithms, providing a high visual quality of the exhibited watermark and preserving its robustness in terms of readability and imperceptibility against geometric and processing attacks.
APA, Harvard, Vancouver, ISO, and other styles
5

Togu Novriansyah Turnip, Tegar Arifin Prasetyo, Nevi Aktasia Banjarnahor, Winda Mariana Pasaribu, and Sopian Manurung. "Application of Double Pictures to Audio Watermarking using Discrete Cosine Transform (DCT) and Singular Value Decomposition (SVD) Methods." Journal of Applied Technology and Informatics Indonesia 1, no. 2 (February 8, 2022): 7–13. http://dx.doi.org/10.54074/jati.v1i2.32.

Full text
Abstract:
One way to control the development of arbitrary distribution of audio is to apply audio watermarking. Audio Watermarking is used to identify the ownership rights of audio files by embedding a watermark while paying attention to the audio quality and the watermark's resistance to amplify, resampling, and invert attacks. Discrete Cosine Transform (DCT) and Singular Value Decomposition (SVD) methods are frequency-domain methods that have a good robustness. The DCT and SVD methods are combined with inserting and extracting watermarks using two images as watermarks. From the test results, the effect of inserting an audio watermark with two images does not significantly impact the durability of the watermark and the quality of the audio inserted with the watermark. However, the alpha value has a significant effect. The higher the alpha value, the lower the audio SNR value by an average of 1.93 dB from an alpha value of 0.0008 and 0.001 for each type of classical, jazz, and rock audio genre.
APA, Harvard, Vancouver, ISO, and other styles
6

Zhang, Kaixuan. "Blind Digital Watermark Based on Discrete Fourier Transformation." Highlights in Science, Engineering and Technology 1 (June 14, 2022): 441–52. http://dx.doi.org/10.54097/hset.v1i.501.

Full text
Abstract:
The policy and security of digital images are concerned by all artists. Embedding blind digital watermarks to images is an effective solution to such problem. The existing blind digital watermark techniques for images are usually based on the spatial domain method, such as some build-in tools in some software like Photoshop. Those methods' imperceptibility is good, but the robustness is dissatisfactory. Therefore, blind digital watermark based on the frequency domain is becoming popular nowadays. The use of the frequency domain-based techniques can not only keep the imperceptibility but also ensure good robustness and non-removability. According to the reasons mentioned above, this thesis presents a frequency domain-based blind digital watermark technique. This method uses basic discrete Fourier transformation to transform an image to the frequency domain and then embeds a digital watermark. To increase the security, we also introduce some methods to encode watermarks before embedding them to the images. We conduct some experiments by applying the technique to some images with different watermarks. In the experiments, it can embed blind watermarks with the least effect on the quality of the original image and can also successfully extract watermarks from the watermarked image. The results show this technique is highly useable. We also conduct some experiments to simulate the attacks. This technique also shows great robustness after many kinds of different attacking methods.
APA, Harvard, Vancouver, ISO, and other styles
7

Peng, Li Sen, Yong Qiang Chen, and Han Ping Hu. "A Video Watermark Method Based on Chaotic Encryption." Applied Mechanics and Materials 44-47 (December 2010): 3383–87. http://dx.doi.org/10.4028/www.scientific.net/amm.44-47.3383.

Full text
Abstract:
An effective and integrated video watermark scheme mainly includes watermark generation, watermark embedding, watermark detecting, and watermark attack. The watermark data come from a meaningful binary image encrypted by two-dimensional chaotic stream encryption to improve watermark security. In the procedure of watermark embedding, watermarks are embedded into the random selected video frames through modifying the DCT coefficients. After robust and frame processes, watermarks can be mainly extracted and identified through watermark extracting algorithm. The experimental results show that the proposed video watermark method has some performances of security, imperceptibility and robustness.
APA, Harvard, Vancouver, ISO, and other styles
8

Li, Li, Rui Bai, Shanqing Zhang, Chin-Chen Chang, and Mengtao Shi. "Screen-Shooting Resilient Watermarking Scheme via Learned Invariant Keypoints and QT." Sensors 21, no. 19 (September 30, 2021): 6554. http://dx.doi.org/10.3390/s21196554.

Full text
Abstract:
This paper proposes a screen-shooting resilient watermarking scheme via learned invariant keypoints and QT; that is, if the watermarked image is displayed on the screen and captured by a camera, the watermark can be still extracted from the photo. A screen-shooting resilient watermarking algorithm should meet the following two basic requirements: robust keypoints and a robust watermark algorithm. In our case, we embedded watermarks by combining the feature region filtering model to SuperPoint (FRFS) neural networks, quaternion discrete Fourier transform (QDFT), and tensor decomposition (TD). First we applied FRFS to locate the embedding feature regions which are decided by the keypoints that survive screen-shooting. Second, we structured watermark embedding regions centered at keypoints. Third, the watermarks were embedded by the QDFT and TD (QT) algorithm, which is robust for capturing process attacks. In a partial shooting scenario, the watermark is repeatedly embedded into different regions in an image to enhance robustness. Finally, we extracted the watermarks from at least one region at the extraction stage. The experimental results showed that the proposed scheme is very robust for camera shooting (including partial shooting) different shooting scenarios, and special attacks. Moreover, the efficient mechanism of screen-shooting resilient watermarking could have propietary protection and leak tracing applications.
APA, Harvard, Vancouver, ISO, and other styles
9

Mareen, Hannes, Niels Van Kets, Peter Lambert, and Glenn Van Wallendael. "Fast Fallback Watermark Detection Using Perceptual Hashes." Electronics 10, no. 10 (May 13, 2021): 1155. http://dx.doi.org/10.3390/electronics10101155.

Full text
Abstract:
Forensic watermarking is often used to enable the tracing of digital pirates that leak copyright-protected videos. However, existing watermarking methods have a limited robustness and may be vulnerable to targeted attacks. Our previous work proposed a fallback detection method that uses secondary watermarks rather than the primary watermarks embedded by existing methods. However, the previously proposed fallback method is slow and requires access to all watermarked videos. This paper proposes to make the fallback watermark detection method faster using perceptual hashes instead of uncompressed secondary watermark signals. These perceptual hashes can be calculated prior to detection, such that the actual detection process is sped up with a factor of approximately 26,000 to 92,000. In this way, the proposed method tackles the main criticism about practical usability of the slow fallback method. The fast detection comes at the cost of a modest decrease in robustness, although the fast fallback detection method can still outperform the existing primary watermark method. In conclusion, the proposed method enables fast and more robust detection of watermarks that were embedded by existing watermarking methods.
APA, Harvard, Vancouver, ISO, and other styles
10

D HARIKA and SYED NOORULLAH. "IMPLEMENTATION OF IMAGE AUTHENTICATION USING DIGITAL WATERMARKING WITH BIOMETRIC." international journal of engineering technology and management sciences 7, no. 1 (2023): 154–67. http://dx.doi.org/10.46647/ijetms.2023.v07i01.023.

Full text
Abstract:
The rapid global development of E-commerce in terms of digitalization and distribution of digital contents in the form of image, audio, video, increases the possibility of unrestricted duplication and broadcasting of copyrighted data and the protection of crucial documents is highly significant. Digital watermarking inserts watermark into the cover or host data by unnoticeable modification. In this work digital watermarking with biometric features is done. In this work a technique to implement the hiding of an image inside another image using biometric features namely signature and fingerprint using watermarking techniques is done. To accomplish this, a hybrid watermarking scheme consisting of Discrete Wavelet Transform, Discrete Cosine Transform and Singular Value Decomposition (DWT-DCT-SVD) is proposed for image authentication that is robust against attacks. Here, singular values of watermark1 (fingerprint) and watermark2 (signature) are obtained by applying DWT-DCT-SVD. By adding both the singular values of watermarks we acquire the transformed watermark. To improve the security, robustness and provide authenticity for the image, a two-step watermarking method is demonstrated. The evaluation parameters like PSNR (Peak Signal to Noise Ratio), SSIM (Structured Similarity Index Method), normalized correlation coefficient (NCC) are used for image quality assessment.
APA, Harvard, Vancouver, ISO, and other styles
More sources

Dissertations / Theses on the topic "Watermark"

1

Lam, Ioi Tun. "Biometric watermark embedding in document images." Thesis, University of Macau, 2009. http://umaclib3.umac.mo/record=b2130131.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Xu, Xin. "Digital watermark technology in security applications." Thesis, University of Plymouth, 2008. http://hdl.handle.net/10026.1/335.

Full text
Abstract:
With the rising emphasis on security and the number of fraud related crimes around the world, authorities are looking for new technologies to tighten security of identity. Among many modern electronic technologies, digital watermarking has unique advantages to enhance the document authenticity. At the current status of the development, digital watermarking technologies are not as matured as other competing technologies to support identity authentication systems. This work presents improvements in performance of two classes of digital watermarking techniques and investigates the issue of watermark synchronisation. Optimal performance can be obtained if the spreading sequences are designed to be orthogonal to the cover vector. In this thesis, two classes of orthogonalisation methods that generate binary sequences quasi-orthogonal to the cover vector are presented. One method, namely "Sorting and Cancelling" generates sequences that have a high level of orthogonality to the cover vector. The Hadamard Matrix based orthogonalisation method, namely "Hadamard Matrix Search" is able to realise overlapped embedding, thus the watermarking capacity and image fidelity can be improved compared to using short watermark sequences. The results are compared with traditional pseudo-randomly generated binary sequences. The advantages of both classes of orthogonalisation inethods are significant. Another watermarking method that is introduced in the thesis is based on writing-on-dirty-paper theory. The method is presented with biorthogonal codes that have the best robustness. The advantage and trade-offs of using biorthogonal codes with this watermark coding methods are analysed comprehensively. The comparisons between orthogonal and non-orthogonal codes that are used in this watermarking method are also made. It is found that fidelity and robustness are contradictory and it is not possible to optimise them simultaneously. Comparisons are also made between all proposed methods. The comparisons are focused on three major performance criteria, fidelity, capacity and robustness. aom two different viewpoints, conclusions are not the same. For fidelity-centric viewpoint, the dirty-paper coding methods using biorthogonal codes has very strong advantage to preserve image fidelity and the advantage of capacity performance is also significant. However, from the power ratio point of view, the orthogonalisation methods demonstrate significant advantage on capacity and robustness. The conclusions are contradictory but together, they summarise the performance generated by different design considerations. The synchronisation of watermark is firstly provided by high contrast frames around the watermarked image. The edge detection filters are used to detect the high contrast borders of the captured image. By scanning the pixels from the border to the centre, the locations of detected edges are stored. The optimal linear regression algorithm is used to estimate the watermarked image frames. Estimation of the regression function provides rotation angle as the slope of the rotated frames. The scaling is corrected by re-sampling the upright image to the original size. A theoretically studied method that is able to synchronise captured image to sub-pixel level accuracy is also presented. By using invariant transforms and the "symmetric phase only matched filter" the captured image can be corrected accurately to original geometric size. The method uses repeating watermarks to form an array in the spatial domain of the watermarked image and the the array that the locations of its elements can reveal information of rotation, translation and scaling with two filtering processes.
APA, Harvard, Vancouver, ISO, and other styles
3

Woo, Chaw-Seng. "Digital image watermarking methods for copyright protection and authentication." Thesis, Queensland University of Technology, 2007. https://eprints.qut.edu.au/16457/1/Chaw-Seng_Woo_Thesis.pdf.

Full text
Abstract:
The ease of digital media modification and dissemination necessitates content protection beyond encryption. Information hidden as digital watermarks in multimedia enables protection mechanism in decrypted contents. The aims of this research are three-fold: (i) to investigate the strength and limitations of current watermarking schemes, (ii) to design and develop new schemes to overcome the limitations, and (iii) to evaluate the new schemes using application scenarios of copyright protection, tamper detection and authentication. We focus on geometrically robust watermarking and semi-fragile watermarking for digital images. Additionally, hybrid schemes that combine the strength of both robust and semi-fragile watermarks are studied. Robust watermarks are well suited for copyright protection because they stay intact with the image under various manipulations. We investigated two major approaches of robust watermarking. In the synchronization approach, we employed motion estimation for watermark resynchronization. We also developed a novel watermark resynchronization method that has low computational cost using scale normalization and flowline curvature. In another approach, we firstly analyzed and improved a blind watermark detection method. The new method reduces significantly the computational cost of its watermark embedding. Secondly, we created a geometric invariant domain using a combination of transforms, and adapted the blind watermark detection method that we improved. It totally eliminates the need of resynchronization in watermark detection, which is a very desirable achievement that can hardly be found in existing schemes. On the other hand, semi-fragile watermarks are good at content authentication because they can differentiate minor image enhancements from major manipulations. New capabilities of semi-fragile watermarks are identified. Then, we developed a semi-fragile watermarking method in wavelet domain that offers content authentication and tamper localization. Unlike others, our scheme overcomes a major challenge called cropping attack and provides approximate content recovery without resorting to an original image. Hybrid schemes combine robust and semi-fragile watermarks to offer deductive information in digital media forensics. We firstly carried out a pilot study by combining robust and fragile watermarks. Then, we performed a comparative analysis on two implementation methods of a hybrid watermarking scheme. The first method has the robust watermark and the fragile watermark overlapped while the second method uses non-overlapping robust and fragile watermarks. Based on the results of the comparative analysis, we merge our geometric invariant domain with our semi-fragile watermark to produce a hybrid scheme. This hybrid scheme fulfilled the copyright protection, tamper detection, and content authentication objectives when evaluated in an investigation scenario.
APA, Harvard, Vancouver, ISO, and other styles
4

Woo, Chaw-Seng. "Digital image watermarking methods for copyright protection and authentication." Queensland University of Technology, 2007. http://eprints.qut.edu.au/16457/.

Full text
Abstract:
The ease of digital media modification and dissemination necessitates content protection beyond encryption. Information hidden as digital watermarks in multimedia enables protection mechanism in decrypted contents. The aims of this research are three-fold: (i) to investigate the strength and limitations of current watermarking schemes, (ii) to design and develop new schemes to overcome the limitations, and (iii) to evaluate the new schemes using application scenarios of copyright protection, tamper detection and authentication. We focus on geometrically robust watermarking and semi-fragile watermarking for digital images. Additionally, hybrid schemes that combine the strength of both robust and semi-fragile watermarks are studied. Robust watermarks are well suited for copyright protection because they stay intact with the image under various manipulations. We investigated two major approaches of robust watermarking. In the synchronization approach, we employed motion estimation for watermark resynchronization. We also developed a novel watermark resynchronization method that has low computational cost using scale normalization and flowline curvature. In another approach, we firstly analyzed and improved a blind watermark detection method. The new method reduces significantly the computational cost of its watermark embedding. Secondly, we created a geometric invariant domain using a combination of transforms, and adapted the blind watermark detection method that we improved. It totally eliminates the need of resynchronization in watermark detection, which is a very desirable achievement that can hardly be found in existing schemes. On the other hand, semi-fragile watermarks are good at content authentication because they can differentiate minor image enhancements from major manipulations. New capabilities of semi-fragile watermarks are identified. Then, we developed a semi-fragile watermarking method in wavelet domain that offers content authentication and tamper localization. Unlike others, our scheme overcomes a major challenge called cropping attack and provides approximate content recovery without resorting to an original image. Hybrid schemes combine robust and semi-fragile watermarks to offer deductive information in digital media forensics. We firstly carried out a pilot study by combining robust and fragile watermarks. Then, we performed a comparative analysis on two implementation methods of a hybrid watermarking scheme. The first method has the robust watermark and the fragile watermark overlapped while the second method uses non-overlapping robust and fragile watermarks. Based on the results of the comparative analysis, we merge our geometric invariant domain with our semi-fragile watermark to produce a hybrid scheme. This hybrid scheme fulfilled the copyright protection, tamper detection, and content authentication objectives when evaluated in an investigation scenario.
APA, Harvard, Vancouver, ISO, and other styles
5

Jiang, Feng. "Efficient Public-Key Watermark Techniques for Authentication." Thesis, Purdue University, 2018. http://pqdtopen.proquest.com/#viewpdf?dispub=10618833.

Full text
Abstract:

The security of digital media content has received significant attention as the usage of multimediahas increased in today's society. Digital watermarking is widely applied for digital image copyright protection and authentication. The extraction and verification of the watermark can be used for many applications, for example, authenticating the image. In some situations, the authentication should be accessible to all, thus public-key watermarking would be necessary.

In addition, many essential image-embedded documents are kept in a physical format and used widely for authentication purposes. These documents include the personal ID, license, passport, immigration document, commercial ticket with identity information, personal medical report, etc.

A digital watermarking system with high embedding capacity, robust to various attacks, high extraction efficiency is needed for such practical use. A public-key watermarking system is proposed for such applications. The embedded watermark/message can be extracted and verified publicly using a public-key. The watermark extraction process is efficient and blind. The watermark can be only embedded by the document issuer. The watermark embedded is robust against not only common digital signal processing attacks, geometric attacks but also the print-scan process. Differing from existing watermarking approaches, the watermark is embedded according to the result of proposed object weight map detection and automatic object segmentation. Higher watermark robustness and embedding capacity are achieved. Our simulation results demonstrate that the proposed approach is effective and is able to be applied to various applications.

APA, Harvard, Vancouver, ISO, and other styles
6

Al, Faleh Al Hiary Hazem Ali Abd. "Paper-based watermark extraction with image processing." Thesis, University of Leeds, 2008. http://etheses.whiterose.ac.uk/1355/.

Full text
Abstract:
This thesis presents frameworks for the digitisation, localisation, extraction and graphical representation of paper-based watermark designs embedded in paper texture. There is a growing need for this among librarians and antiquarians to aid with identification, wider accessibility, and providing a further level of document imaging for preservation. The proposed approaches are designed to handle manuscripts with interference such as recto and verso writing, and defects such as non-uniform paper structure, physical damage, etc. A back-lighting scanning technique is used for capturing images of paper, followed by a selection of intelligent image processing operations, rather than alternatives such as radioactive techniques. This technique requires low cost equipment, and produces a fast and safe solution to capturing all details on paper, including watermarks, and laid and chain lines patterns. Two approaches are presented: the first takes a bottom-up approach and deploys image processing operations to enhance, filter, and extract the watermark, and convert it into a graphical representation. These operations determine a suitable configuration of parameters to allow optimal content processing, in addition to the detection and extraction of chain lines. The second approach uses a model of the back-lighting effect to locate a watermark in pages of archaic documents. It removes recto information, and highlights remaining ‘hidden’ data, and then presents a statistical approach to locate watermarks from a known lexicon. Work is further presented on reconstructing features of the paper mould by aggregating the success of the foregoing steps: this permits an analysis of ‘twin’ watermarks. Results are presented from comprehensively scanned eighteenth and nineteenth century manuscripts, including two unusual copies of the Quran, an Islamic Prayer, and various historical documents.
APA, Harvard, Vancouver, ISO, and other styles
7

Davis, Jacqueline M. L. "Occurrence of Erwinia Salicis in cricket-bat willow (Salix alba var caerulea)." Thesis, University of East Anglia, 1995. http://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.296345.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

Noorkami, Maneli. "Secure and Robust Compressed-Domain Video Watermarking for H.264." Diss., Georgia Institute of Technology, 2007. http://hdl.handle.net/1853/16267.

Full text
Abstract:
The objective of this thesis is to present a robust watermarking algorithm for H.264 and to address challenges in compressed-domain video watermarking. To embed a perceptually invisible watermark in highly compressed H.264 video, we use a human visual model. We extend Watson's human visual model developed for 8x8 DCT block to the 4x4 block used in H.264. In addition, we use P-frames to increase the watermark payload. The challenge in embedding the watermark in P-frames is that the video bit rate can increase significantly. By using the structure of the encoder, we significantly reduce the increase in video bit rate due to watermarking. Our method also exploits both temporal and texture masking. We build a theoretical framework for watermark detection using a likelihood ratio test. This framework is used to develop two different video watermark detection algorithms; one detects the watermark only from watermarked coefficients and one detects the watermark from all the ac coefficients in the video. These algorithms can be used in different video watermark detection applications where the detector knows and does not know the precise location of watermarked coefficients. Both watermark detection schemes obtain video watermark detection with controllable detection performance. Furthermore, control of the detector's performance lies completely with the detector and does not place any burden on the watermark embedding system. Therefore, if the video has been attacked, the detector can maintain the same detection performance by using more frames to obtain its detection response. This is not the case with images, since there is a limited number of coefficients that can be watermarked in each image before the watermark is visible.
APA, Harvard, Vancouver, ISO, and other styles
9

Wu, Pianhui. "Research on digital image watermark encryption based on hyperchaos." Thesis, University of Derby, 2013. http://hdl.handle.net/10545/305004.

Full text
Abstract:
The digital watermarking technique embeds meaningful information into one or more watermark images hidden in one image, in which it is known as a secret carrier. It is difficult for a hacker to extract or remove any hidden watermark from an image, and especially to crack so called digital watermark. The combination of digital watermarking technique and traditional image encryption technique is able to greatly improve anti-hacking capability, which suggests it is a good method for keeping the integrity of the original image. The research works contained in this thesis include: (1)A literature review the hyperchaotic watermarking technique is relatively more advantageous, and becomes the main subject in this programme. (2)The theoretical foundation of watermarking technologies, including the human visual system (HVS), the colour space transform, discrete wavelet transform (DWT), the main watermark embedding algorithms, and the mainstream methods for improving watermark robustness and for evaluating watermark embedding performance. (3) The devised hyperchaotic scrambling technique it has been applied to colour image watermark that helps to improve the image encryption and anti-cracking capabilities. The experiments in this research prove the robustness and some other advantages of the invented technique. This thesis focuses on combining the chaotic scrambling and wavelet watermark embedding to achieve a hyperchaotic digital watermark to encrypt digital products, with the human visual system (HVS) and other factors taken into account. This research is of significant importance and has industrial application value.
APA, Harvard, Vancouver, ISO, and other styles
10

Barr, Mohammad. "Robust logo watermarking." Thesis, De Montfort University, 2018. http://hdl.handle.net/2086/16550.

Full text
Abstract:
Digital image watermarking is used to protect the copyright of digital images. In this thesis, a novel blind logo image watermarking technique for RGB images is proposed. The proposed technique exploits the error correction capabilities of the Human Visual System (HVS). It embeds two different watermarks in the wavelet/multiwavelet domains. The two watermarks are embedded in different sub-bands, are orthogonal, and serve different purposes. One is a high capacity multi-bit watermark used to embed the logo, and the other is a 1-bit watermark which is used for the detection and reversal of geometrical attacks. The two watermarks are both embedded using a spread spectrum approach, based on a pseudo-random noise (PN) sequence and a unique secret key. Robustness against geometric attacks such as Rotation, Scaling, and Translation (RST) is achieved by embedding the 1-bit watermark in the Wavelet Transform Modulus Maxima (WTMM) coefficients of the wavelet transform. Unlike normal wavelet coefficients, WTMM coefficients are shift invariant, and this important property is used to facilitate the detection and reversal of RST attacks. The experimental results show that the proposed watermarking technique has better distortion parameter detection capabilities, and compares favourably against existing techniques in terms of robustness against geometrical attacks such as rotation, scaling, and translation.
APA, Harvard, Vancouver, ISO, and other styles
More sources

Books on the topic "Watermark"

1

Brodsky, Joseph. Watermark. New York: Farrar, Straus & Giroux, 1993.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
2

Brodsky, Joseph. Watermark. New York: Farrar, Straus & Giroux, 1992.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
3

Brodsky, Joseph. Watermark. London: HamishHamilton, 1992.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
4

Brodsky, Joseph. Watermark. London: Penguin, 1997.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
5

Kallmaker, Karin. Watermark. London: Silver Moon, 2000.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
6

Brodsky, Joseph. Watermark. Venice [Italy]: Peter Koch, 2006.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
7

Watermark. Tallahassee, Fla: Naiad Press, 1999.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
8

Watermark. Dublin: Stinging Fly Press, 2005.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
9

McClintock, Grant. Watermark. New York: Lyons Press, 1998.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
10

Watermark. New York: Marsh Hawk Press, 2005.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
More sources

Book chapters on the topic "Watermark"

1

Lin, Yiqing, and Waleed H. Abdulla. "Introduction." In Audio Watermark, 1–13. Cham: Springer International Publishing, 2014. http://dx.doi.org/10.1007/978-3-319-07974-5_1.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Lin, Yiqing, and Waleed H. Abdulla. "Principles of Psychoacoustics." In Audio Watermark, 15–49. Cham: Springer International Publishing, 2014. http://dx.doi.org/10.1007/978-3-319-07974-5_2.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Lin, Yiqing, and Waleed H. Abdulla. "Audio Watermarking Techniques." In Audio Watermark, 51–94. Cham: Springer International Publishing, 2014. http://dx.doi.org/10.1007/978-3-319-07974-5_3.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Lin, Yiqing, and Waleed H. Abdulla. "Proposed Audio Watermarking Scheme." In Audio Watermark, 95–121. Cham: Springer International Publishing, 2014. http://dx.doi.org/10.1007/978-3-319-07974-5_4.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Lin, Yiqing, and Waleed H. Abdulla. "Performance Evaluation of Audio Watermarking." In Audio Watermark, 123–57. Cham: Springer International Publishing, 2014. http://dx.doi.org/10.1007/978-3-319-07974-5_5.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Lin, Yiqing, and Waleed H. Abdulla. "Perceptual Evaluation Using Objective Quality Measures." In Audio Watermark, 159–75. Cham: Springer International Publishing, 2014. http://dx.doi.org/10.1007/978-3-319-07974-5_6.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Mehrabi, Hamid Reza. "Digital Watermark." In Research and Advanced Technology for Digital Libraries, 49–58. Berlin, Heidelberg: Springer Berlin Heidelberg, 2001. http://dx.doi.org/10.1007/3-540-44796-2_5.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

Liu, Xinwei, Jian Liu, Yang Bai, Jindong Gu, Tao Chen, Xiaojun Jia, and Xiaochun Cao. "Watermark Vaccine: Adversarial Attacks to Prevent Watermark Removal." In Lecture Notes in Computer Science, 1–17. Cham: Springer Nature Switzerland, 2022. http://dx.doi.org/10.1007/978-3-031-19781-9_1.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

Wang, Feng-Hsing, Jeng-Shyang Pan, and Lakhmi C. Jain. "Genetic Watermark Modification." In Innovations in Digital Watermarking Techniques, 119–27. Berlin, Heidelberg: Springer Berlin Heidelberg, 2009. http://dx.doi.org/10.1007/978-3-642-03187-8_8.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

D’Angelo, Angela, Giacomo Cancelli, and Mauro Barni. "Watermark-Based Authentication." In Studies in Computational Intelligence, 365–402. Berlin, Heidelberg: Springer Berlin Heidelberg, 2010. http://dx.doi.org/10.1007/978-3-642-11756-5_16.

Full text
APA, Harvard, Vancouver, ISO, and other styles

Conference papers on the topic "Watermark"

1

Guo, Shangwei, Tianwei Zhang, Han Qiu, Yi Zeng, Tao Xiang, and Yang Liu. "Fine-tuning Is Not Enough: A Simple yet Effective Watermark Removal Attack for DNN Models." In Thirtieth International Joint Conference on Artificial Intelligence {IJCAI-21}. California: International Joint Conferences on Artificial Intelligence Organization, 2021. http://dx.doi.org/10.24963/ijcai.2021/500.

Full text
Abstract:
Watermarking has become the tendency in protecting the intellectual property of DNN models. Recent works, from the adversary's perspective, attempted to subvert watermarking mechanisms by designing watermark removal attacks. However, these attacks mainly adopted sophisticated fine-tuning techniques, which have certain fatal drawbacks or unrealistic assumptions. In this paper, we propose a novel watermark removal attack from a different perspective. Instead of just fine-tuning the watermarked models, we design a simple yet powerful transformation algorithm by combining imperceptible pattern embedding and spatial-level transformations, which can effectively and blindly destroy the memorization of watermarked models to the watermark samples. We also introduce a lightweight fine-tuning strategy to preserve the model performance. Our solution requires much less resource or knowledge about the watermarking scheme than prior works. Extensive experimental results indicate that our attack can bypass state-of-the-art watermarking solutions with very high success rates. Based on our attack, we propose watermark augmentation techniques to enhance the robustness of existing watermarks.
APA, Harvard, Vancouver, ISO, and other styles
2

Nitsuwat, Supot, and J. Srisomphun. "Security in CAI Materials by Embedding Digital Watermarks." In 2003 Informing Science + IT Education Conference. Informing Science Institute, 2003. http://dx.doi.org/10.28945/2626.

Full text
Abstract:
Computer-based instruction assistance (CAI) plays very important role in e-leaming system. Distancelearning students can remotely access this kind of course materials. However, being an electronic form has created a growing need to protect them against illegal manipulation and duplication. Therefore, the more robust techniques are needed. Digital watermarking has been proposed as a solution to the problem of copyright protection of multimedia for many decades. This technique can also be applied to the educational frameworks. In this paper, before the CAI will be distributed, double watermarks have been embedded into all still images in the CAI materials. Firstly, the visible watermark, e.g., university’s logo, is inserted directly on image pixel’s intensity to exhibit an ownership of the CAI. The fragile invisible watermark is then embedded again on these watermarked images. Because of the special characteristic of the latter if there is any attempt to change or remove the visible logo, it can be clearly detected. We also proposed the extracting method to reveal secret information using for verifying our right on the materials. The experiments using different kinds of attacks on the materials are also conducted. Finally, the discussion of the experimental results and conclusion of the paper are also given.
APA, Harvard, Vancouver, ISO, and other styles
3

Marques, Douglas Aurélio, Karina M. Magalhães, and Ricardo R. Dahab. "RAWVec – A Method for Watermarking Vector Maps." In Simpósio Brasileiro de Segurança da Informação e de Sistemas Computacionais. Sociedade Brasileira de Computação - SBC, 2007. http://dx.doi.org/10.5753/sbseg.2007.20921.

Full text
Abstract:
The information used in geographic information system (GIS) and in spatial data is represented by digital vector maps, which are expensive to produce, but easy to copy. Watermarks have been used for a long time in other digital media for both authentication and tracing. This work presents a new method for embedding watermarks, in the form of a bitmap image, into digital vector maps. The detection of the watermark is accomplished by extracting the embedded image and comparing it with the original one.
APA, Harvard, Vancouver, ISO, and other styles
4

Thongkor, Kharittha, and Thumrongrat Amornraksa. "Improved watermark extraction for printed and scanned watermarked document." In 2011 International Symposium on Intelligent Signal Processing and Communications Systems (ISPACS 2011). IEEE, 2011. http://dx.doi.org/10.1109/ispacs.2011.6146097.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

LI, QIUYAN, QINGHUA MENG, WENJU GAO, SHUFAN YANG, and MING JIANG. "DIGITAL WATERMARK." In Proceedings of the Third International Conference on WAA. World Scientific Publishing Company, 2003. http://dx.doi.org/10.1142/9789812796769_0155.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Seadle, Michael, J. R. Deller, and Aparna Gurijala. "Why watermark?" In the second ACM/IEEE-CS joint conference. New York, New York, USA: ACM Press, 2002. http://dx.doi.org/10.1145/544220.544299.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Fujii, H., H. Sakamoto, S. Irie, and H. Yamashita. "Watermark resolution." In IEEE International Conference on Multimedia and Expo, 2001. ICME 2001. IEEE, 2001. http://dx.doi.org/10.1109/icme.2001.1237721.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

Liu, Yang, Zhen Zhu, and Xiang Bai. "WDNet: Watermark-Decomposition Network for Visible Watermark Removal." In 2021 IEEE Winter Conference on Applications of Computer Vision (WACV). IEEE, 2021. http://dx.doi.org/10.1109/wacv48630.2021.00373.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

Jia, Xiaojun, Xingxing Wei, Xiaochun Cao, and Xiaoguang Han. "Adv-watermark: A Novel Watermark Perturbation for Adversarial Examples." In MM '20: The 28th ACM International Conference on Multimedia. New York, NY, USA: ACM, 2020. http://dx.doi.org/10.1145/3394171.3413976.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

Chen, Jianbo, Xinwei Liu, Siyuan Liang, Xiaojun Jia, and Yuan Xun. "Universal Watermark Vaccine: Universal Adversarial Perturbations for Watermark Protection." In 2023 IEEE/CVF Conference on Computer Vision and Pattern Recognition Workshops (CVPRW). IEEE, 2023. http://dx.doi.org/10.1109/cvprw59228.2023.00228.

Full text
APA, Harvard, Vancouver, ISO, and other styles

Reports on the topic "Watermark"

1

Ahmed, Farid, and Ira S. Moskowitz. The Binary Phase Only Filter as an Image Watermark. Fort Belvoir, VA: Defense Technical Information Center, January 2004. http://dx.doi.org/10.21236/ada465428.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Cheng, Samuel, Heather Yu, and Zixiang Xiong. Error Concealment of MPEG-2 AAC Audio Using Modulo Watermarks. Fort Belvoir, VA: Defense Technical Information Center, January 2002. http://dx.doi.org/10.21236/ada413996.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Fletcher, John. Geologic Map of the Mitchel Range and Waterman Hills. Geological Society of America, 1999. http://dx.doi.org/10.1130/1999-fletcher-watermanhills.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Bank's Property - Works of Art - General - Watermark portrait of Her Majesty the Queen, prepared by Portals Ltd. of London and presented to the Bank in 1954. Reserve Bank of Australia, March 2022. http://dx.doi.org/10.47688/rba_archives_pn-002448.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Field and laboratory data from an earthquake history study of the Waterman Point Fault, Kitsap County, Washington. US Geological Survey, 2003. http://dx.doi.org/10.3133/mf2423.

Full text
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!

To the bibliography