To see the other types of publications on this topic, follow the link: Watermarking algorithms.

Journal articles on the topic 'Watermarking algorithms'

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the top 50 journal articles for your research on the topic 'Watermarking algorithms.'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Browse journal articles on a wide variety of disciplines and organise your bibliography correctly.

1

Wu, Shun Wei. "Research on Intelligent Image Watermarking Schemes Based on Optimization Algorithm." Advanced Materials Research 1006-1007 (August 2014): 792–96. http://dx.doi.org/10.4028/www.scientific.net/amr.1006-1007.792.

Full text
Abstract:
Watermarking algorithms are the one of the effective methods to protect the copyright of digital products. There are many types of watermarking algorithms, in this paper, methods based on optimization algorithms, also named computational intelligence, are surveyed. The detail procedure of watermark embedding and the watermarking extraction is described, and the basic theory application of computational intelligence is also analyzed. Finally, the advice of these types of watermarking algorithm is given.
APA, Harvard, Vancouver, ISO, and other styles
2

Xin, Yongqing, and Mirosław Pawlak. "M-Ary Phase Modulation for Digital Watermarking." International Journal of Applied Mathematics and Computer Science 18, no. 1 (2008): 93–104. http://dx.doi.org/10.2478/v10006-008-0009-8.

Full text
Abstract:
M-Ary Phase Modulation for Digital WatermarkingIn spread spectrum based watermarking schemes, it is a challenging task to embed multiple bits of information into the host signal.M-ary modulation has been proposed as an effective approach to multibit watermarking. It has been proved that anM-ary modulation based watermarking system outperforms significantly a binary modulation based watermarking system. However, in the existingM-ary modulation based algorithms, the value ofMis restricted to be less than 256, because asMincreases, the computation workload for data extraction advances exponential
APA, Harvard, Vancouver, ISO, and other styles
3

Lin, Lixuan. "Research on Digital Watermarking Algorithm for Anti-geometric Attack." MATEC Web of Conferences 267 (2019): 02007. http://dx.doi.org/10.1051/matecconf/201926702007.

Full text
Abstract:
For the problem that the traditional digital watermarking algorithm is less robustness against geometric attacks, this paper introduces the related content of digital watermarking technology, which combs digital watermarking technology, digital watermarking attack technology and digital watermarking evaluation method, and summarizes the improved algorithms proposed in recent years. Next, the traditional wavelet transform algorithm and the improved algorithm based on DCT transform are selected for comparison experiments. The latter combines Arnold scrambling and SVD decomposition, which has bet
APA, Harvard, Vancouver, ISO, and other styles
4

Fan, Li Jun. "Research on the Zero-Bit Watermarking Algorithms Based on the Matrix Decomposition for Digital Images." Applied Mechanics and Materials 738-739 (March 2015): 674–77. http://dx.doi.org/10.4028/www.scientific.net/amm.738-739.674.

Full text
Abstract:
Due to the problem that the many digital images can be modified more and more easily, watermarking algorithms are proposed. There are many types of digital watermarking algorithms, such as robust digital watermarking algorithms, watermarking schemes for authentication, and reversible digital watermarking algorithms. However, there are some special images, such as the digital medical images for remote treatment, the military images for tracking object, and the remote sensing images, and they are so sensitive to any modification that we should authenticate the copyright by special technique. And
APA, Harvard, Vancouver, ISO, and other styles
5

Peng, Yu Lou, Yi Gang He, and Bin Lin. "Functional Watermarking Algorithm Based on Contourlet Transform and ECC." Applied Mechanics and Materials 103 (September 2011): 187–93. http://dx.doi.org/10.4028/www.scientific.net/amm.103.187.

Full text
Abstract:
User-defined functional watermarking algorithm was presented based on contourlet transform field and Ellipse Curve Cryptography(ECC) spatial field. First the edge and direction information of image was obtained by contourlet transform, the discrete functional watermarking was embedded into high frequency parts, and the embedding data was avoided to the image edge. ECC encrypts embedding coordinate’s series. Watermarking changes little original image because of less function data, and attends to zero watermarking algorithms. The results show that the algorithm is invisible to watermarking and a
APA, Harvard, Vancouver, ISO, and other styles
6

Tan, Yanli, and Yongqiang Zhao. "Digital Watermarking Image Compression Method Based on Symmetric Encryption Algorithms." Symmetry 11, no. 12 (2019): 1505. http://dx.doi.org/10.3390/sym11121505.

Full text
Abstract:
A digital watermarking image compression method based on symmetrical encryption algorithm is proposed in this study. First, the original image and scrambled watermarking image are processed by wavelet transform, and then the watermarking image processed by the Arnold replacement method is transformed into a meaningless image in the time domain to achieve the effect of encryption. Watermarking is generated by embedding the watermarking image into the important coefficients of the wavelet transform. As an inverse process of watermarking embedding, watermarking extraction needs to be reconstructe
APA, Harvard, Vancouver, ISO, and other styles
7

LEUNG, H. Y., L. M. CHENG, and L. L. CHENG. "ROBUST WATERMARKING SCHEMES USING SELECTIVE CURVELET COEFFICIENTS BASED ON A HVS MODEL." International Journal of Wavelets, Multiresolution and Information Processing 08, no. 06 (2010): 941–59. http://dx.doi.org/10.1142/s0219691310003870.

Full text
Abstract:
In this paper, six robust non-blind watermarking schemes based on curvelet transform are proposed. Single band watermarking method was proposed in Ref. 1. This paper develops the single band watermarking method and adds Human Vision System (HVS) to form six different multi-bands watermarking methods. With the increasing redundancy of watermark, the robustness of the algorithm will be investigated and comparative studies with the single band watermarking will be shown. The experimental results demonstrate that the proposed algorithms have great robustness against various imaging attacks.
APA, Harvard, Vancouver, ISO, and other styles
8

LU, HAIPING, YUN Q. SHI, ALEX C. KOT, and LIHUI CHEN. "BINARY IMAGE WATERMARKING THROUGH BLURRING AND BIASED BINARIZATION." International Journal of Image and Graphics 05, no. 01 (2005): 67–87. http://dx.doi.org/10.1142/s0219467805001665.

Full text
Abstract:
Digital watermarking has been proposed for the protection of digital medias. This paper presents two watermarking algorithms for binary images. Both algorithms involve a blurring preprocessing and a biased binarization. After the blurring, the first algorithm embeds a watermark by modifying the DC components of the Discrete Cosine Transform (DCT), followed by a biased binarization, and the second one embeds a watermark by directly biasing the binarization threshold of the blurred image, controlled by a loop. Experimental results show the imperceptibility and robustness aspects of both algorith
APA, Harvard, Vancouver, ISO, and other styles
9

Nawaz, Saqib Ali, Jingbing Li, Uzair Aslam Bhatti, et al. "A Novel Hybrid Discrete Cosine Transform Speeded Up Robust Feature-Based Secure Medical Image Watermarking Algorithm." Journal of Medical Imaging and Health Informatics 10, no. 11 (2020): 2588–99. http://dx.doi.org/10.1166/jmihi.2020.3220.

Full text
Abstract:
With the advancement of networks and multimedia, digital watermarking technology has received worldwide attention as an effective method of copyright protection. Improving the anti-geometric attack ability of digital watermarking algorithms using image feature-based algorithms have received extensive attention. This paper proposes a novel robust watermarking algorithm based on SURF-DCT perceptual hashing (Speeded Up Robust Features and Discrete Cosine Transform), namely blind watermarking. We design and implement a meaningful binary watermark embedding and extraction algorithm based on the SUR
APA, Harvard, Vancouver, ISO, and other styles
10

Duda, Sylwia, Dominik Fijałek, and Grzegorz Kozieł. "Comparative analysis of medical images watermarking methods." Journal of Computer Sciences Institute 17 (December 30, 2020): 379–83. http://dx.doi.org/10.35784/jcsi.2372.

Full text
Abstract:
The article is devoted to the analysis of watermarking algorithms in terms of their use in marking medical images. The algorithms based on the Integer Wavelet Transform (IWT), Discrete Cosine Transform (DCT), and Singular Value Decomposition (SVD) were compared. The algorithms were implemented using the combinations: IWT, IWT-DCT, and IWT-SVD. As part of the research, the level of disturbances caused by embedding the watermark was checked using subjective and objective methods. The attack resistance of the watermarked images was tested and the steganographic capacity was measured. All algorith
APA, Harvard, Vancouver, ISO, and other styles
11

Podilchuk, C. I., and E. J. Delp. "Digital watermarking: algorithms and applications." IEEE Signal Processing Magazine 18, no. 4 (2001): 33–46. http://dx.doi.org/10.1109/79.939835.

Full text
APA, Harvard, Vancouver, ISO, and other styles
12

Dittmann, J., P. Wohlmacher, and K. Nahrstedt. "Using cryptographic and. watermarking algorithms." IEEE Multimedia 8, no. 4 (2001): 54–65. http://dx.doi.org/10.1109/93.959103.

Full text
APA, Harvard, Vancouver, ISO, and other styles
13

Yu, Xiaoyan, Chengyou Wang, and Xiao Zhou. "A Survey on Robust Video Watermarking Algorithms for Copyright Protection." Applied Sciences 8, no. 10 (2018): 1891. http://dx.doi.org/10.3390/app8101891.

Full text
Abstract:
With the development and popularization of the Internet and the rise of various live broadcast platforms, digital videos have penetrated into all aspects of people’s life. At the same time, all kinds of pirated videos are also flooding the Internet, which seriously infringe the rights and interests of video copyright owners and hinder the healthy development of the video industry. Therefore, robust video watermarking algorithms for copyright protection have emerged as these times require. In this paper, we review robust video watermarking algorithms for copyright protection based on original v
APA, Harvard, Vancouver, ISO, and other styles
14

GAO, TIEGANG, and QIAOLUN GU. "REVERSIBLE WATERMARKING ALGORITHM BASED ON WAVELET LIFTING SCHEME." International Journal of Wavelets, Multiresolution and Information Processing 06, no. 04 (2008): 643–52. http://dx.doi.org/10.1142/s0219691308002550.

Full text
Abstract:
Nowadays, digital watermarking algorithms are widely applied to ownership protection and tampering detection of digital images. In this paper, a new reversible watermarking algorithm based on wavelet lifting scheme is proposed. In the algorithm, the image is firstly divided into some no-overlapping blocks, and then the wavelet lifting scheme where on every block, is performed watermarking data is embedded into the image according to the attribute of the subband of every block. In order to guarantee the security of algorithm, chaotic system is used to shuffle the position of blocks. The interes
APA, Harvard, Vancouver, ISO, and other styles
15

Samee, M. K., and J. Götze. "Channel equalization using watermark as a training sequence." Advances in Radio Science 9 (August 1, 2011): 179–85. http://dx.doi.org/10.5194/ars-9-179-2011.

Full text
Abstract:
Abstract. In this paper blind equalization algorithms based on digital watermarking are presented. Training sequence is sent along with the data in the form of watermark. Robust CDMA based watermarking algorithm is used to watermark the data. Watermark, which is spread over the data, does not consume extra bandwidth. So with the help of extracted watermark channel can be equalized just by using simple mean square algorithm. Two algorithms for equalization are proposed in this paper. In algorithm I the receiver does not require to know training sequence in advance. Using algorithm II, the sende
APA, Harvard, Vancouver, ISO, and other styles
16

Kannan, S. Thabasu, and S. Azhagu Senthil. "Evaluvation of Multiresolution Watermarking Algorithm." International Journal of Advanced Research in Computer Science and Software Engineering 7, no. 8 (2017): 85. http://dx.doi.org/10.23956/ijarcsse.v7i8.29.

Full text
Abstract:
Now-a-days watermarking plays a pivotal role in most of the industries for providing security to their own as well as hired or leased data. This paper its main aim is to study the multiresolution watermarking algorithms and also choosing the effective and efficient one for improving the resistance in data compression. Computational savings from such a multiresolution watermarking framework is obvious. The multiresolutional property makes our watermarking scheme robust to image/video down sampling operation by a power of two in either space or time. There is no common framework for multiresolut
APA, Harvard, Vancouver, ISO, and other styles
17

Chang, Yu Hong. "Robust Digital Watermarking Algorithm on Combination of Fractal and Wavelet." Applied Mechanics and Materials 401-403 (September 2013): 1462–65. http://dx.doi.org/10.4028/www.scientific.net/amm.401-403.1462.

Full text
Abstract:
To improve the robustness of watermarking algorithms, this paper proposes a robust digital watermarking algorithm based on combination of fractal and wavelet. By key the algorithm transfers watermark information into self-similar fractal images, discretes Haar wavelet to host image, and embeds two fractal watermark image after fractal into Haar wavelet sub-band. Simulation results show that the algorithm has good robustness to image distortion as noise, JPEG compression, shear, filtering, etc.
APA, Harvard, Vancouver, ISO, and other styles
18

Ko, Lu-Ting, Jwu-E. Chen, Yaw-Shih Shieh, Hsi-Chin Hsin, and Tze-Yun Sung. "Nested Quantization Index Modulation for Reversible Watermarking and Its Application to Healthcare Information Management Systems." Computational and Mathematical Methods in Medicine 2012 (2012): 1–8. http://dx.doi.org/10.1155/2012/839161.

Full text
Abstract:
Digital watermarking has attracted lots of researches to healthcare information management systems for access control, patients' data protection, and information retrieval. The well-known quantization index modulation-(QIM-) based watermarking has its limitations as the host image will be destroyed; however, the recovery of medical images is essential to avoid misdiagnosis. In this paper, we propose the nested QIM-based watermarking, which is preferable to the QIM-based watermarking for the medical image applications. As the host image can be exactly reconstructed by the nested QIM-based water
APA, Harvard, Vancouver, ISO, and other styles
19

Zhang, Zhengwei, Mingjian Zhang, and Liuyang Wang. "Reversible Image Watermarking Algorithm Based on Quadratic Difference Expansion." Mathematical Problems in Engineering 2020 (January 9, 2020): 1–8. http://dx.doi.org/10.1155/2020/1806024.

Full text
Abstract:
To improve the visual quality and embedding rate of existing reversible image watermarking algorithms, a reversible image watermarking algorithm based on quadratic difference expansion is proposed. First, the pixel points with grayscale values 0 and 255 in the original image are removed, and then, the half-scrambled watermark information is embedded into the original image using linear difference expansion. Finally, the remaining half of the watermark information is embedded into the previously generated watermarked image by the quadratic difference expansion, meanwhile the removed pixel point
APA, Harvard, Vancouver, ISO, and other styles
20

Ren, Na, Yazhou Zhao, Changqing Zhu, Qifei Zhou, and Dingjie Xu. "Copyright Protection Based on Zero Watermarking and Blockchain for Vector Maps." ISPRS International Journal of Geo-Information 10, no. 5 (2021): 294. http://dx.doi.org/10.3390/ijgi10050294.

Full text
Abstract:
Zero watermarking does not alter the original information contained in vector map data and provides perfect imperceptibility. The use of zero watermarking for data copyright protection has become a significant trend in digital watermarking research. However, zero watermarking encounters tremendous obstacles to its development and application because of its requirement to store copyright information with a third party and its difficulty in confirming copyright ownership. Aiming at the shortcomings of the existing zero watermarking technology, this paper proposes a new zero watermarking construc
APA, Harvard, Vancouver, ISO, and other styles
21

Ekici, Özgür, Bülent Sankur, Barış Coşkun, Umut Naci, and Mahmut Akcay. "Comparative evaluation of semifragile watermarking algorithms." Journal of Electronic Imaging 13, no. 1 (2004): 209. http://dx.doi.org/10.1117/1.1633285.

Full text
APA, Harvard, Vancouver, ISO, and other styles
22

Huang, Hsiang-Cheh, Jeng-Shyang Pan, Yu-Hsiu Huang, Feng-Hsing Wang, and Kuang-Chih Huang. "Progressive Watermarking Techniques Using Genetic Algorithms." Circuits, Systems & Signal Processing 26, no. 5 (2007): 671–87. http://dx.doi.org/10.1007/s00034-006-0104-z.

Full text
APA, Harvard, Vancouver, ISO, and other styles
23

Banitalebi-Dehkordi, Amin, Mehdi Banitalebi-Dehkordi, Jamshid Abouei, and Said Nader-Esfahani. "An Improvement Technique Based on Structural Similarity Thresholding for Digital Watermarking." Advances in Computer Engineering 2014 (December 18, 2014): 1–8. http://dx.doi.org/10.1155/2014/580697.

Full text
Abstract:
Digital watermarking is extensively used in ownership authentication and copyright protection. In this paper, we propose an efficient thresholding scheme to improve the watermark embedding procedure in an image. For the proposed algorithm, watermark casting is performed separately in each block of an image, and embedding in each block continues until a certain structural similarity threshold is reached. Numerical evaluations demonstrate that our scheme improves the imperceptibility of the watermark when the capacity remains fixed, and at the same time, robustness against attacks is assured. Th
APA, Harvard, Vancouver, ISO, and other styles
24

Liu, Jinhua, Qiu Tu, and Xinye Xu. "Quantization-Based Image Watermarking by Using a Normalization Scheme in the Wavelet Domain." Information 9, no. 8 (2018): 194. http://dx.doi.org/10.3390/info9080194.

Full text
Abstract:
To improve the invisibility and robustness of quantization-based image watermarking algorithms, we developed an improved quantization image watermarking method based on the wavelet transform and normalization strategy used in this study. In the process of watermark encoding, the sorting strategy of wavelet coefficients is used to calculate the quantization step size. Its robustness lies in the normalization-based watermark embedding and the control of its amount of modification on each wavelet coefficient by utilizing the proper quantization parameter in a high entropy image region. In waterma
APA, Harvard, Vancouver, ISO, and other styles
25

Lipiński, P. "On domain selection for additive, blind image watermarking." Bulletin of the Polish Academy of Sciences: Technical Sciences 60, no. 2 (2012): 317–21. http://dx.doi.org/10.2478/v10175-012-0042-5.

Full text
Abstract:
Abstract. Recently, a variety of digital watermarking schemes have been developed for copyright protection of digital images. In robust watermarking, which is used in copyright protection, transform-based algorithms are used to ensure resilience of the watermark to common signal processing attacks. The most frequently used watermarking algorithms for additive watermark embedding involve DCT, DFT, SVD and DWT domains. In this article we verify which domain is optimal for robust, the additive watermark embedding scheme. We demonstrate that in additive watermark embedding the embedding domain pla
APA, Harvard, Vancouver, ISO, and other styles
26

Hien, Thai Duy, Zensho Nakao, and Yen-Wei Chen. "Intelligent Logo Watermarking Based on Independent Component Analysis." Journal of Advanced Computational Intelligence and Intelligent Informatics 8, no. 4 (2004): 390–96. http://dx.doi.org/10.20965/jaciii.2004.p0390.

Full text
Abstract:
We present new intelligent logo watermarking based on independent component analysis (ICA) in which a binary logo watermark is embedded in a host image in a wavelet domain. To improve robustness, an image adaptive watermarking algorithm is applied by a stochastic approach based on a noise visibility function (NVF). The algorithm design, evaluation, and experimentation are described. Experimental results show that the logo watermark is perfectly extracted by ICA with excellent invisibility and with robustness against various image and digital processing operators and almost all compression algo
APA, Harvard, Vancouver, ISO, and other styles
27

Zhang, Zheng Bao, and Chao Jia. "Digital Image Zero-Watermarking Algorithm Based on Improved Wavelet Moment." Applied Mechanics and Materials 347-350 (August 2013): 3232–36. http://dx.doi.org/10.4028/www.scientific.net/amm.347-350.3232.

Full text
Abstract:
Lots of anti-RST attacks watermarking algorithms have been proposed, but few solutions for local geometric attacks, in this paper it proposed a new algorithm combined with the the Wavelet Moment for an anti-geometric attacks. Since wavelet moment was proposed, it is widely used in the field of computer vision, image processing, but the large amount of computation must be improved to be applied to digital watermarking technology so that it can adapt to the real-time detection of digital watermarking. By image rotation, scaling, translation, shear, local distortions, filtering attack operations
APA, Harvard, Vancouver, ISO, and other styles
28

Boussif, Mohamed, Nourredinne Aloui, and Adnene Cherif. "New Watermarking/Encryption Method for Medical Imaging FULL Protection in m-Health." International Journal of Electrical and Computer Engineering (IJECE) 7, no. 6 (2017): 3385. http://dx.doi.org/10.11591/ijece.v7i6.pp3385-3394.

Full text
Abstract:
In this paper, we present a new method for medical images security dedicated to m-Health based on a combination between a novel semi reversible watermarking approach robust to JPEG compression, a new proposed fragile watermarking and a new proposed encryption algorithm. The purpose of the combination of these three proposed algorithms (encryption, robust and fragile watermarking) is to ensure the full protection of medical image, its information and its report in terms of confidentiality and reliability (authentication and integrity). A hardware implementation to evaluate our system is done us
APA, Harvard, Vancouver, ISO, and other styles
29

Deng, Xiao Hong, Zhi Gang Chen, Xiao Heng Deng, and An Feng Liu. "A Study of Watermarking Application in Medical Digital Images." Applied Mechanics and Materials 195-196 (August 2012): 529–33. http://dx.doi.org/10.4028/www.scientific.net/amm.195-196.529.

Full text
Abstract:
Watermarking, as a new technology, has been applied widely in medical images field for its advantages. This paper emphasizes on these works as follows: firstly analyzes the secure requirements of medical images and watermarking functions from the practical applications view, and then reviews some typical algorithms of the existing watermarking and presents a universal evaluating scheme for medical digital images watermarking, finally, some further works are proposed. The purpose for this paper is to study the present watermarking methods and promote the new schemes emergence effectively.
APA, Harvard, Vancouver, ISO, and other styles
30

Wang, Yingying, Chengsong Yang, Changqing Zhu, and Kaimeng Ding. "An Efficient Robust Multiple Watermarking Algorithm for Vector Geographic Data." Information 9, no. 12 (2018): 296. http://dx.doi.org/10.3390/info9120296.

Full text
Abstract:
Vector geographic data play an important role in location information services. Digital watermarking has been widely used in protecting vector geographic data from being easily duplicated by digital forensics. Because the production and application of vector geographic data refer to many units and departments, the demand for multiple watermarking technology is increasing. However, multiple watermarking algorithm for vector geographic data draw less attention, and there are many urgent problems to be solved. Therefore, an efficient robust multiple watermark algorithm for vector geographic data
APA, Harvard, Vancouver, ISO, and other styles
31

Wazirali, Raniyah, Rami Ahmad, Ahmed Al-Amayreh, Mohammad Al-Madi, and Ala’ Khalifeh. "Secure Watermarking Schemes and Their Approaches in the IoT Technology: An Overview." Electronics 10, no. 14 (2021): 1744. http://dx.doi.org/10.3390/electronics10141744.

Full text
Abstract:
Information security is considered one of the most important issues in various infrastructures related to the field of data communication where most of the modern studies focus on finding effective and low-weight secure approaches. Digital watermarking is a trend in security techniques that hides data by using data embedding and data extraction processes. Watermarking technology is integrated into different frames without adding an overheard as in the conventional encryption. Therefore, it is efficient to be used in data encryption for applications that run over limited resources such as the I
APA, Harvard, Vancouver, ISO, and other styles
32

Nazir, Hira, Imran Sarwar Bajwa, Muhammad Samiullah, Waheed Anwar, and Muhammad Moosa. "Robust Secure Color Image Watermarking Using 4D Hyperchaotic System, DWT, HbD, and SVD Based on Improved FOA Algorithm." Security and Communication Networks 2021 (February 28, 2021): 1–17. http://dx.doi.org/10.1155/2021/6617944.

Full text
Abstract:
In the recent past, a different set of algorithms for watermarking and securing the color images have been developed by using transformation, decomposition, and optimization techniques for watermark embedding and extraction. In this paper, we propose an optimized and robust watermarking algorithm coupled with a 4D hyperchaotic system, and its performance is analyzed by extending and differentiating the existing work. Our contribution in the presented work is watermarking and securing the color images by an optimized algorithm that uses transformation technique such as Discrete Wavelet Transfor
APA, Harvard, Vancouver, ISO, and other styles
33

Leng, Xiao Xu, Jun Xiao, Deng Yu Li, and Zhen Ya Shen. "Study on the Digital Image Zero-Watermarking Technology." Advanced Materials Research 765-767 (September 2013): 1113–17. http://dx.doi.org/10.4028/www.scientific.net/amr.765-767.1113.

Full text
Abstract:
Recently more and more researches in the information security field have been focused on the digital image zero-watermarking technology which is an important mean for protecting the digital multimedia copyright. In this paper, first the research background of image zero-watermarking is analyzed; and then the typical algorithms are presented and discussed; finally the performance of these typical algorithms are analyzed and experimented.
APA, Harvard, Vancouver, ISO, and other styles
34

Santoyo-Garcia, Hector, Eduardo Fragoso-Navarro, Rogelio Reyes-Reyes, Clara Cruz-Ramos, and Mariko Nakano-Miyatake. "Visible Watermarking Technique Based on Human Visual System for Single Sensor Digital Cameras." Security and Communication Networks 2017 (2017): 1–18. http://dx.doi.org/10.1155/2017/7903198.

Full text
Abstract:
In this paper we propose a visible watermarking algorithm, in which a visible watermark is embedded into the Bayer Colour Filter Array (CFA) domain. The Bayer CFA is the most common raw image representation for images captured by single sensor digital cameras equipped in almost all mobile devices. In proposed scheme, the captured image is watermarked before it is compressed and stored in the storage system. Then this method enforces the rightful ownership of the watermarked image, since there is no other version of the image rather than the watermarked one. We also take into consideration the
APA, Harvard, Vancouver, ISO, and other styles
35

Xiao, Shaozhang, Zhengwei Zhang, Yue Zhang, and Changhui Yu. "Multipurpose Watermarking Algorithm for Medical Images." Scientific Programming 2020 (September 1, 2020): 1–13. http://dx.doi.org/10.1155/2020/8848885.

Full text
Abstract:
Considering the existing medical image watermarking algorithms, a single function often has limitations, and a multipurpose watermarking algorithm for medical images is proposed. First, medical images are divided into regions of interest (ROIs) and regions of noninterest (RONIs). Then, the authentication watermark produced for each subblock of the ROI is embedded into the corresponding mapping subblock. The visible watermark is embedded into the RONI, and, finally, the watermark information and constructed authentication information in each subblock of the ROI are embedded into the correspondi
APA, Harvard, Vancouver, ISO, and other styles
36

Kiernan, Jerry, Rakesh Agrawal, and Peter J. Haas. "Watermarking relational data: framework, algorithms and analysis." VLDB Journal The International Journal on Very Large Data Bases 12, no. 2 (2003): 157–69. http://dx.doi.org/10.1007/s00778-003-0097-x.

Full text
APA, Harvard, Vancouver, ISO, and other styles
37

Myles, Ginger, Christian Collberg, Zachary Heidepriem, and Armand Navabi. "The evaluation of two software watermarking algorithms." Software: Practice and Experience 35, no. 10 (2005): 923–38. http://dx.doi.org/10.1002/spe.657.

Full text
APA, Harvard, Vancouver, ISO, and other styles
38

HUBER, STEFAN, MARTIN HELD, PETER MEERWALD, and ROLAND KWITT. "TOPOLOGY-PRESERVING WATERMARKING OF VECTOR GRAPHICS." International Journal of Computational Geometry & Applications 24, no. 01 (2014): 61–86. http://dx.doi.org/10.1142/s0218195914500034.

Full text
Abstract:
Watermarking techniques for vector graphics dislocate vertices in order to embed imperceptible, yet detectable, statistical features into the input data. The embedding process may result in a change of the topology of the input data, e.g., by introducing self-intersections, which is undesirable or even disastrous for many applications. In this paper we present a watermarking framework for two-dimensional vector graphics that employs conventional watermarking techniques but still provides the guarantee that the topology of the input data is preserved. The geometric part of this framework comput
APA, Harvard, Vancouver, ISO, and other styles
39

Jansirani, G., and A, Senthilkumar. "A Detailed Survey of Digital Watermarking Applications and Its Techniques." International Journal of Advanced Research in Computer Science and Software Engineering 7, no. 7 (2017): 96. http://dx.doi.org/10.23956/ijarcsse.v7i7.104.

Full text
Abstract:
This paper describes the significance of digital water marking process. Watermarking is a process of hiding information in multimedia content like images and videos. Now a day it is major research area. Digital watermarking is one of the best solutions to protect content in web, content authentication and managing copyright information. Watermarking has been proposed for a long while to embed the secret information with images to stop reduces unauthorized access of the content. Watermarking and image compression is quiet different area. Rest of this paper we are going to elaborate what are all
APA, Harvard, Vancouver, ISO, and other styles
40

Ben Jabra, Saoussen, and Ezzeddine Zagrouba. "A Robust Embedding Scheme and an Efficient Evaluation Protocol for 3D Meshes Watermarking." International Journal of Computer Vision and Image Processing 1, no. 2 (2011): 13–29. http://dx.doi.org/10.4018/ijcvip.2011040102.

Full text
Abstract:
This paper proposes two main contributions. In the first one, a 3D mesh watermarking using Maximally Stable Meshes detection and multi-signatures embedding is presented. The originality of this scheme is to detect the attack type applied on marked mesh. In plus, it is robust against numerous attacks, blind and invisible. The proposed scheme uses the Maximally Stable meshes (MSMs) to insert signature. After MSMs detection using an extension of Maximally Stable Efficient Regions, three MSMs are selected to be marked. Then, three different signatures are embedded using three different watermarkin
APA, Harvard, Vancouver, ISO, and other styles
41

Yadav, Navneet, and Navdeep Goel. "An Effective Image-Adaptive Hybrid Watermarking Scheme with Transform Coefficients." International Journal of Image and Graphics 20, no. 01 (2020): 2050002. http://dx.doi.org/10.1142/s0219467820500023.

Full text
Abstract:
Robust and invisible watermarking provides a feasible solution to prove the ownership of the genuine content owner. Different watermarking algorithms have been presented by the researchers in the past but no algorithm could be termed as perfect. Proposed work puts forward a novel image-adaptive method of embedding a binary watermark in the image in a transparent manner. Discrete wavelet transform (DWT), singular value decomposition (SVD) and discrete cosine transform (DCT) are used together in the proposed hybrid watermarking scheme. Image-adaptive nature of the scheme is reflected in the usag
APA, Harvard, Vancouver, ISO, and other styles
42

Zhao, Jian, Shuaishuai Fan, Jian Jia, et al. "Texture Directionality-Based Digital Watermarking in Nonsubsample Shearlet Domain." Mathematical Problems in Engineering 2017 (2017): 1–14. http://dx.doi.org/10.1155/2017/6581279.

Full text
Abstract:
Digital watermarking is a technique used to protect an author’s copyright and has become widespread due to the rapid development of multimedia technologies. In this paper, a novel watermarking algorithm using the nonsubsample shearlet transform is proposed, which combines the directional edge features of an image. A shearlet provides an optimal multiresolution and multidirectional representation of an image based on distributed discontinuities such as edges, which ensures that the embedded watermark does not blur the image. In the proposed algorithm, the nonsubsample shearlet transform is used
APA, Harvard, Vancouver, ISO, and other styles
43

Zhang, Qiu Yu, Yi Bo Huang, and Jia Bin Deng. "A Real-Time Audio Watermarking Algorithm Based on MCLT." Advanced Materials Research 255-260 (May 2011): 2042–46. http://dx.doi.org/10.4028/www.scientific.net/amr.255-260.2042.

Full text
Abstract:
With the fast developing portable digital audio player, the copyright protection of music faces a severe challenge. Audio watermarking is an efficient approach to solve this problem. In order to improve the performance of real-time processing, a new real-time audio watermarking based on fast MCLT is presented. Algorithms, which use of quantitative method, can be realized watermark blind detection. The experiment results show that the algorithm, which is utilized in the copyright protection, meet the timely processing requirements. Embedded of watermark audio have obviously robustness and trans
APA, Harvard, Vancouver, ISO, and other styles
44

Wang, Fei, Zhaoxin Xie, and Zuo Chen. "High Capacity Reversible Watermarking for Audio by Histogram Shifting and Predicted Error Expansion." Scientific World Journal 2014 (2014): 1–7. http://dx.doi.org/10.1155/2014/656251.

Full text
Abstract:
Being reversible, the watermarking information embedded in audio signals can be extracted while the original audio data can achieve lossless recovery. Currently, the few reversible audio watermarking algorithms are confronted with following problems: relatively low SNR (signal-to-noise) of embedded audio; a large amount of auxiliary embedded location information; and the absence of accurate capacity control capability. In this paper, we present a novel reversible audio watermarking scheme based on improved prediction error expansion and histogram shifting. First, we use differential evolution
APA, Harvard, Vancouver, ISO, and other styles
45

Gao, Zhan Wei, Yong Mei Zhang, Cong Liu, Jie Geng, and De Kai Ba. "Dual Video Watermarking Scheme Based on Transform Domain." Applied Mechanics and Materials 155-156 (February 2012): 815–19. http://dx.doi.org/10.4028/www.scientific.net/amm.155-156.815.

Full text
Abstract:
The single watermark algorithms always merely have single function. In order to overcome the drawback, this paper proposed a dual video watermarking scheme based on transform domain. To implement the video copyright and integrality authentication, this paper embedded robust watermarking and fragile watermark. At the same time, this scheme made good use of the wavelet transform to embed the two different kinds of watermarking in the same video respectively. The fragile watermarking is to serve the robust watermarking. Experiments demonstrate this scheme can not only protect the copyright of the
APA, Harvard, Vancouver, ISO, and other styles
46

Padma, U. R., and Jayachitra. "SELF-EMBEDDING VIDEO WATERMARKING USING DUAL ORTHOGONAL COMPLEX CONTOURLET TRANSFORM WITH AUTOCORRELATION SYSTEM." International Journal of Research -GRANTHAALAYAH 3, no. 4 (2015): 89–98. http://dx.doi.org/10.29121/granthaalayah.v3.i4.2015.3025.

Full text
Abstract:
This paper presents a novel non-blind watermarking algorithm using dual orthogonal complex contourlet transform. The dual orthogonal complex contourlet transform is preferred for watermarking because of its ability to capture the directional edges and contours superior to other transforms such as cosine transform, wavelet transform, etc. Digital image and video in their raw form require an enormous amount of storage capacity and the huge data systems also contain a lot of redundant information.Compression also increases the capacity of the communication channel. Image Compression using SPIHT S
APA, Harvard, Vancouver, ISO, and other styles
47

Al-Boeridi, Omar N., Hong Ren Wu, and Ron Van Schyndel. "Three-Dimensional Video Watermarking – A Review and Open Challenges." International Journal of Information, Communication Technology and Applications 2, no. 1 (2016): 47–65. http://dx.doi.org/10.17972/ijicta20162122.

Full text
Abstract:
Intellectual property (IP) protection of three-dimensional (3-D) media is an important issue for both academic and wider communities to combat the illegal distribution and pirating of this visual medium. Digital watermarking has been used to address various challenges in media IP protection. The challenge central to 3-D video as well as other audio-visual signal watermarking is that given a fixed level of perceptual transparency, a watermarking system cannot simultaneously achieve a high degree of robustness and a high watermark payload. The majority of published research reports in this field
APA, Harvard, Vancouver, ISO, and other styles
48

AGARWAL, RASHMI, and M. S. SANTHANAM. "DIGITAL WATERMARKING IN THE SINGULAR VECTOR DOMAIN." International Journal of Image and Graphics 08, no. 03 (2008): 351–68. http://dx.doi.org/10.1142/s0219467808003131.

Full text
Abstract:
Many current watermarking algorithms insert data in the spatial or transform domains like the discrete cosine, the discrete Fourier, and the discrete wavelet transforms. In this paper, we present a data-hiding algorithm that exploits the singular value decomposition (SVD) representation of the data. We compute the SVD of the host image and the watermark and embed the watermark in the singular vectors of the host image. The proposed method leads to an imperceptible scheme for digital images, both in grey scale and color and is quite robust against attacks like noise and JPEG compression.
APA, Harvard, Vancouver, ISO, and other styles
49

Song, Mengli, Huijun Wang, Jianbin Wu, Xinrong Yan, Linfeng Yuan, and Yameng Tu. "A robust watermarking hybrid algorithm for color image." MATEC Web of Conferences 336 (2021): 07012. http://dx.doi.org/10.1051/matecconf/202133607012.

Full text
Abstract:
In order to improve the anti-attack performance of the watermark to meet the requirements of copyright protection and content forensics. This paper proposes a digital watermarking hybrid algorithm based on color images. The specific process is to adopt the idea of multi-algorithm layered embedding, choose the algorithm based on discrete cosine transform (DCT) algorithm, discrete wavelet transform_singular value decomposition (DWT_SVD) algorithm, and hologram algorithm, these three algorithms with robust complementary functions, then embed the same watermark image into the color image R, G and
APA, Harvard, Vancouver, ISO, and other styles
50

Yu, Xiaoyan, Chengyou Wang, and Xiao Zhou. "A Robust Color Image Watermarking Algorithm Based on APDCBT and SSVD." Symmetry 11, no. 10 (2019): 1227. http://dx.doi.org/10.3390/sym11101227.

Full text
Abstract:
With the wide application of color images, watermarking for the copyright protection of color images has become a research hotspot. In this paper, a robust color image watermarking algorithm based on all phase discrete cosine biorthogonal transform (APDCBT) and shuffled singular value decomposition (SSVD) is proposed. The host image is transformed by the 8 × 8 APDCBT to obtain the direct current (DC) coefficient matrix, and then, the singular value decomposition (SVD) is performed on the DC matrix to embed the watermark. The SSVD and Fibonacci transform are mainly used at the watermark preproc
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!