Informacja

Drogi użytkowniku, aplikacja do prawidłowego działania wymaga obsługi JavaScript. Proszę włącz obsługę JavaScript w Twojej przeglądarce.

Wyszukujesz frazę "watermarking" wg kryterium: Temat


Tytuł:
On domain selection for additive, blind image watermarking
Autorzy:
Lipiński, P.
Powiązania:
https://bibliotekanauki.pl/articles/201264.pdf
Data publikacji:
2012
Wydawca:
Polska Akademia Nauk. Czytelnia Czasopism PAN
Tematy:
watermarking
digital watermarking
robust watermarking
Opis:
Recently, a variety of digital watermarking schemes have been developed for copyright protection of digital images. In robust watermarking, which is used in copyright protection, transform-based algorithms are used to ensure resilience of the watermark to common signal processing attacks. The most frequently used watermarking algorithms for additive watermark embedding involve DCT, DFT, SVD and DWT domains. In this article we verify which domain is optimal for robust, the additive watermark embedding scheme. We demonstrate that in additive watermark embedding the embedding domain plays more important role than the embedding formula.
Źródło:
Bulletin of the Polish Academy of Sciences. Technical Sciences; 2012, 60, 2; 317-321
0239-7528
Pojawia się w:
Bulletin of the Polish Academy of Sciences. Technical Sciences
Dostawca treści:
Biblioteka Nauki
Artykuł
Tytuł:
Watermarking software in practical applications
Autorzy:
Lipiński, P.
Powiązania:
https://bibliotekanauki.pl/articles/202385.pdf
Data publikacji:
2011
Wydawca:
Polska Akademia Nauk. Czytelnia Czasopism PAN
Tematy:
watermarking
digital watermarking
robust watermarking
steganography
Opis:
In the recent years, several digital watermarking applications have been developed for copyright protection of digital images. In this article we have tested how they perform in practical applications. We have identified the most common operations performed by professional photographers and web developers, and tested the robustness of watermarks embedded using the applications for copyright watermarking. Our aim was to prove that commercially available software does not meet the requirements of photography and web industry. We have also identified areas in which the software should be improved in order to meet current and future requirements of the industry.
Źródło:
Bulletin of the Polish Academy of Sciences. Technical Sciences; 2011, 59, 1; 21-25
0239-7528
Pojawia się w:
Bulletin of the Polish Academy of Sciences. Technical Sciences
Dostawca treści:
Biblioteka Nauki
Artykuł
Tytuł:
A Multi-Level Robust and Perceptually Transparent Blind Audio Watermarking Scheme Using Wavelets
Autorzy:
Husain, F.
Farooq, O.
Khan, E.
Powiązania:
https://bibliotekanauki.pl/articles/176447.pdf
Data publikacji:
2014
Wydawca:
Polska Akademia Nauk. Czytelnia Czasopism PAN
Tematy:
digital audio watermarking
robustness
single-level watermarking
multi-level watermarking
payload capacity
Opis:
In this paper, a robust and perceptually transparent single-level and multi-level blind audio watermark- ing scheme using wavelets is proposed. A randomly generated binary sequence is used as a watermark, and wavelet function coding is used to embed the watermark sequence in audio signals. Multi-level wa- termarking is used to enhance payload capacity and can be used for a different level of security. The robustness of the scheme is evaluated by applying different attacks such as filtering, sampling rate al- teration, compression, noise addition, amplitude scaling, and cropping. The simulation results obtained show that the proposed watermarking scheme is resilient to various attacks except cropping. Perceptual transparency of watermark is measured by using Perceptual Evaluation of Audio Quality (PEAQ) ba- sic model of ITU-R (PEAQ ITU-R BS.1387) on Speech Quality Assessing Material (SQAM) given by European Broadcasting Union (EBU). Average Objective Difference Grade (ODG) measured for this method is −0.067 and −0.080 for single-level and multi-level watermarked audio signals, respectively. In the proposed single-level digital audio watermarking scheme, the payload capacity is increased by 19.05% as compared to the single-level Chirp-Based Digital Audio Watermarking (CB-DAWM) scheme.
Źródło:
Archives of Acoustics; 2014, 39, 4; 529-539
0137-5075
Pojawia się w:
Archives of Acoustics
Dostawca treści:
Biblioteka Nauki
Artykuł
Tytuł:
Robust Audio Watermarks in Frequency Domain
Autorzy:
Dymarski, P.
Markiewicz, R.
Powiązania:
https://bibliotekanauki.pl/articles/308461.pdf
Data publikacji:
2014
Wydawca:
Instytut Łączności - Państwowy Instytut Badawczy
Tematy:
annotation watermarking
audio watermarking
digital signature
dirty paper codes
LDPC
Opis:
In this paper an audio watermarking technique is presented, using log-spectrum, dirty paper codes and LDPC for watermark embedding. This technique may be used as a digital communication channel, transmitting data at about 40 b/s. It may be also applied for hiding a digital signature, e.g., for copyright protection purposes. Robustness of the watermarks against audio signal compression, resampling and transmitting through an acoustic channel is tested.
Źródło:
Journal of Telecommunications and Information Technology; 2014, 2; 12-21
1509-4553
1899-8852
Pojawia się w:
Journal of Telecommunications and Information Technology
Dostawca treści:
Biblioteka Nauki
Artykuł
Tytuł:
Digital Fingerprinting Based on Quaternion Encryption Scheme for Gray-Tone Images
Autorzy:
Czaplewski, B.
Dzwonkowski, M.
Rykaczewski, R.
Powiązania:
https://bibliotekanauki.pl/articles/308836.pdf
Data publikacji:
2014
Wydawca:
Instytut Łączności - Państwowy Instytut Badawczy
Tematy:
cryptography
multimedia
security
watermarking
Opis:
In this paper a new idea of digital images fingerprinting is proposed. The method is based on quaternion encryption in the Cipher Block Chaining (CBC) mode. Quaternions are hyper-complex numbers of rank 4 and thus often applied to mechanics in three-dimensional space. The encryption algorithm described in the paper is designed for graytone images but can easily be adopted for color ones. For the encryption purpose, the algorithm uses the rotation of data vectors presented as quaternions in a three-dimensional space around another quaternion (key). On the receiver's side, a small amount of unnoticeable by human eye errors occurs in the decrypted images. These errors are used as a user's digital figerprint for the purpose of traitor tracing in case of copyright violation. A computer-based simulation was performed to scrutinize the potential presented quaternion encryption scheme for the implementation of digital fingerprinting. The obtained results are shown at the end of this paper.
Źródło:
Journal of Telecommunications and Information Technology; 2014, 2; 3-11
1509-4553
1899-8852
Pojawia się w:
Journal of Telecommunications and Information Technology
Dostawca treści:
Biblioteka Nauki
Artykuł
Tytuł:
Awavelet based watermarking approach in concatenated square block image for high security
Autorzy:
Sridhar, B.
Powiązania:
https://bibliotekanauki.pl/articles/384976.pdf
Data publikacji:
2018
Wydawca:
Sieć Badawcza Łukasiewicz - Przemysłowy Instytut Automatyki i Pomiarów
Tematy:
authentication
concatenation
copyright
watermarking
wavelet
Opis:
Watermarking in digital contents has gained the more attraction in research community. In this approach copyright information is concealed in to the concatenated square region of an image under wavelet domain, initially original image is undergoing an alternative pixel sharing approach and one of the shares undergo the circular column shift further, concatenates those shares. Next, square region is obtained by capturing the half of the row value in the last part of first share and the first part of second share which forms a square image. To enrich the robustness of the technique, watermarking is under consideration only in the folded square under wavelet. Further, the reverse process is carried out to generate the watermarked image. To show ownership, original and watermarked image have undergone the same operation and acquire the copyright information. Experimental results indicate that the proposed approach is robust against image processing attacks.
Źródło:
Journal of Automation Mobile Robotics and Intelligent Systems; 2018, 12, 3; 68-72
1897-8649
2080-2145
Pojawia się w:
Journal of Automation Mobile Robotics and Intelligent Systems
Dostawca treści:
Biblioteka Nauki
Artykuł
Tytuł:
A Fingerprint-Based Digital Images Watermarking for Identity Authentication
Autorzy:
Wójtowicz, W.
Powiązania:
https://bibliotekanauki.pl/articles/106264.pdf
Data publikacji:
2014
Wydawca:
Uniwersytet Marii Curie-Skłodowskiej. Wydawnictwo Uniwersytetu Marii Curie-Skłodowskiej
Tematy:
watermarking
fingerprint
biometric watermark
verification methods
Opis:
In this paper the combination of fingerprint verification methods with watermarking technology to provide copyright protection and authentication of digital images is proposed. The goal of this study is to investigate how watermarking processing affects the quality of biometric watermarks. Performed experiments showed that extracted fingerprint images have roughly equal verification performance even if some watermarked images undergo additional degradation. Proposed methodology will be improved using more sophisticated fingerprint verification methods and subsequently incorporated into multimodal watermarking schemes.
Źródło:
Annales Universitatis Mariae Curie-Skłodowska. Sectio AI, Informatica; 2014, 14, 1; 85-96
1732-1360
2083-3628
Pojawia się w:
Annales Universitatis Mariae Curie-Skłodowska. Sectio AI, Informatica
Dostawca treści:
Biblioteka Nauki
Artykuł
Tytuł:
Przezroczystość danych ukrytych w sygnale audio
Transparency of data hidden in sound signal
Autorzy:
Kozieł, G.
Powiązania:
https://bibliotekanauki.pl/articles/152192.pdf
Data publikacji:
2012
Wydawca:
Stowarzyszenie Inżynierów i Techników Mechaników Polskich
Tematy:
steganografia
znakowanie sygnałów
steganography
signals watermarking
Opis:
W artykule zaprezentowane zostały dwie metody ukrywania danych w sygnale dźwiękowym. W metodach tych do ukrywania wykorzystywana jest modyfikacja miar statystycznych w dziedzinie wybranej transformaty. Artykuł zawiera również badania dotyczące stopnia przezroczystości oferowanego przez opisane metody. Udowodnione zostało, że możliwe jest wprowadzanie dodatkowych danych do sygnału za pomocą wymienionych metod bez wprowadzania zauważalnych zmian.
Steganographic techniques are used to hide additional data inside signals. They are widely used. With these techniques it is possible to watermark signals, realize hidden communication or attach additional control data to signals. It is very important to obtain significant level of hidden data transparency. This paper presents comparison of two steganographical methods. Both of them use modifications of statistical measures to hide additional data inside signals. To avoid obtaining similar results while hiding the same data with the same method parameters, the Monte Carlo method was applied. It enables obtaining random solutions. The signals containing hidden data obtained with the presented methods were compared to examine the introduced interference level. The various objective measures were applied. The results show that the described methods offer a low level of the introduced interference. One of the methods uses the wavelet transform as a base transformation, whereas the second one - the Fourier transform. From the investigations performed one can draw a conclusion that application of the wavelet transform allows obtaining a greater level of transparency and bigger information capacity.
Źródło:
Pomiary Automatyka Kontrola; 2012, R. 58, nr 11, 11; 972-974
0032-4140
Pojawia się w:
Pomiary Automatyka Kontrola
Dostawca treści:
Biblioteka Nauki
Artykuł
Tytuł:
Analiza porównawcza metod znakowania wodnego obrazów medycznych
Comparative analysis of medical images watermarking methods
Autorzy:
Duda, Sylwia
Fijałek, Dominik
Kozieł, Grzegorz
Powiązania:
https://bibliotekanauki.pl/articles/1427642.pdf
Data publikacji:
2020
Wydawca:
Politechnika Lubelska. Instytut Informatyki
Tematy:
watermarking
IWT
DCT
SVD
znakowanie wodne
Opis:
Artykuł poświęcono analizie algorytmów znakowania wodnego pod kątem wykorzystania w znakowaniu obrazów medycznych. Porównano algorytmy oparte o całkowitą transformatę falkową (IWT), dyskretną transformatę kosinusową (DCT) i rozkład według wartości osobliwych (SVD). Zaimplementowano algorytmy stosując kombinacje: IWT, IWT-DCT i IWT-SVD. W ramach badań sprawdzono poziom zakłóceń spowodowanych osadzaniem znaku wodnego przy pomocy metod subiektywnych i obiektywnych. Przeprowadzono badania odporności oznakowanych obrazów na ataki i zmierzono pojemność steganograficzną. Wszystkie algorytmy bazują na IWT, jednakże każdy z nich ma inne zalety. Największą pojemność wykazał algorytm oparty o IWT. Najodporniejszy na ataki jest IWT-SVD, a najmniejszy poziom zakłóceń uzyskano dla algorytmu IWT-DCT.
The article is devoted to the analysis of watermarking algorithms in terms of their use in marking medical images. The algorithms based on the Integer Wavelet Transform (IWT), Discrete Cosine Transform (DCT), and Singular Value Decomposition (SVD) were compared. The algorithms were implemented using the combinations: IWT, IWT-DCT, and IWT-SVD. As part of the research, the level of disturbances caused by embedding the watermark was checked using subjective and objective methods. The attack resistance of the watermarked images was tested and the steganographic capacity was measured. All algorithms are based on IWT, however, each has different advantages. The algorithm based on the IWT showed the highest capacity. The most resistant to attacks is IWT-SVD, and the lowest level of interference was obtained for the IWT-DCT algorithm.
Źródło:
Journal of Computer Sciences Institute; 2020, 17; 379-383
2544-0764
Pojawia się w:
Journal of Computer Sciences Institute
Dostawca treści:
Biblioteka Nauki
Artykuł
Tytuł:
Enhancement of Ground-to-Aircraft Communication Using Audio Watermarking
Autorzy:
Dymarski, Przemysław
Powiązania:
https://bibliotekanauki.pl/articles/307854.pdf
Data publikacji:
2019
Wydawca:
Instytut Łączności - Państwowy Instytut Badawczy
Tematy:
audio watermarking
aviation radio services
SEL-CAL
Opis:
This paper presents research on improving the intelligibility of spoken messages transmitted to aircraft from a ground station. The proposed solution is based on the selective calling (SELCAL) system and the audio watermarking technique. The most important elements of a spoken message (commands, numerical values) are transmitted as a watermark embedded in the speech signal and are displayed to the cockpit crew. The synchronization signal is embedded in SELCAL duo-tones. The proposed system is resistant to resampling and channel noise (at SNR > 25 dB).
Źródło:
Journal of Telecommunications and Information Technology; 2019, 1; 93-102
1509-4553
1899-8852
Pojawia się w:
Journal of Telecommunications and Information Technology
Dostawca treści:
Biblioteka Nauki
Artykuł
Tytuł:
Security of Electronic Patient Record using Imperceptible DCT-SVD based Audio Watermarking Technique
Autorzy:
Kanhe, Aniruddha
Gnanasekaran, Aghila
Powiązania:
https://bibliotekanauki.pl/articles/226601.pdf
Data publikacji:
2019
Wydawca:
Polska Akademia Nauk. Czytelnia Czasopism PAN
Tematy:
watermarking
DCT-SVD
Parkinson’s Disease
EPR
Opis:
A robust and highly imperceptible audio watermarking technique is presented to secure the electronic patient record of Parkinson’s Disease (PD) affected patient. The proposed DCT-SVD based watermarking technique introduces minimal changes in speech such that the accuracy in classification of PD affected person’s speech and healthy person’s speech is retained. To achieve high imperceptibility the voiced part of the speech is considered for embedding the watermark. It is shown that the proposed watermarking technique is robust to common signal processing attacks. The practicability of the proposed technique is tested: by creating an android application to record & watermark the speech signal. The classification of PD affected speech is done using Support Vector Machine (SVM) classifier in cloud server.
Źródło:
International Journal of Electronics and Telecommunications; 2019, 65, 1; 19-24
2300-1933
Pojawia się w:
International Journal of Electronics and Telecommunications
Dostawca treści:
Biblioteka Nauki
Artykuł
Tytuł:
Wytwarzanie znaku wodnego w czasie rzeczywistym
Watermark generation in real time
Autorzy:
Bogdan, B.
Łopatka, J.
Powiązania:
https://bibliotekanauki.pl/articles/208358.pdf
Data publikacji:
2006
Wydawca:
Wojskowa Akademia Techniczna im. Jarosława Dąbrowskiego
Tematy:
telekomunikacja
znak wodny
DSP
MPEG
telecommunication
watermarking
Opis:
Artykuł przedstawia jedną z metod generacji oraz opis funkcjonalny generatora znaku wodnego, działającego w czasie rzeczywistym. Generator ten jest jednym z elementów systemu znakowania sygnału akustycznego dla potrzeb transmisji danych w kanałach akustycznych. W artykule przedstawiono budowę generatora, sposób wytwarzania znaku wodnego oraz dodawania go do sygnału akustycznego z wykorzystaniem techniki DSP.
The paper presents a method of watermark signal generation and functional description of a real time watermark signal generator. This generator was designed for transmission of a hidden signature over transmission channels. Generator structure, inner structure of a watermark signal, and the used model of psycho-acoustic mask are described.
Źródło:
Biuletyn Wojskowej Akademii Technicznej; 2006, 55, sp.; 83-91
1234-5865
Pojawia się w:
Biuletyn Wojskowej Akademii Technicznej
Dostawca treści:
Biblioteka Nauki
Artykuł
Tytuł:
Digital watermarking scheme based on curvelet transform and multiple chaotic maps
Autorzy:
Xiao, Yi
Xu, Ya-Chen
Zhou, Nan-Run
Lin, Zhen-Rong
Powiązania:
https://bibliotekanauki.pl/articles/27310097.pdf
Data publikacji:
2023
Wydawca:
Politechnika Wrocławska. Oficyna Wydawnicza Politechniki Wrocławskiej
Tematy:
digital watermarking
curvelet transform
multiple chaotic map
Opis:
The rapid development of digital products brings security issues. Digital watermarking technology is an important means to handle these problems. To enhance the imperceptibility of watermark and locate the possible tampering as well, a digital watermarking scheme based on curvelet transform is presented by combining with multiple chaotic maps. The host image is decomposed into three parts, i.e., coarse layer, detail layer and fine layer, with curvelet transform, and a robust watermark is embedded into the coarse layer for copyright protection of digital products. In addition, an authentication watermark is embedded into the fine layer to detect and locate the illegal changes. Simulation results show that the proposed digital watermarking scheme possesses acceptable robustness and security.
Źródło:
Optica Applicata; 2023, 53, 2; 291--305
0078-5466
1899-7015
Pojawia się w:
Optica Applicata
Dostawca treści:
Biblioteka Nauki
Artykuł
Tytuł:
Security issues on digital watermarking algorithms
Autorzy:
Wójtowicz, W.
Ogiela, M. R.
Powiązania:
https://bibliotekanauki.pl/articles/106206.pdf
Data publikacji:
2012
Wydawca:
Uniwersytet Marii Curie-Skłodowskiej. Wydawnictwo Uniwersytetu Marii Curie-Skłodowskiej
Tematy:
digital watermarking
security
steganography
Discrete Wavelet Transform
DWT
Opis:
This paper gives a general introduction to the digital watermarking procedures and their security aspects. The first issue is to clarify unifying and differentiating properties of steganography and watermarking. Then the most important aspects of digital watermarking are reviewed by studying application, requirement and design problems. We put emphasis on the importance of digital watermark as an effective technology to protect intellectual property rights and legitimate use of digital images. In the paper we provide an overview of the most popular digital watermarking methods for still images available today. The watermarking algorithms are divided into two major categories of spatial and transform domains. Because of outstanding robustness and imperceptibility the transform domain algorithms are the mainstream of research. Popular transforms of images include the DFT (Discrete Fourier Transform) ([1, 2, 3, 4, 5]), DCT (Discrete Cosine Transform) ([1, 3, 6, 5]) and DWT (Discrete Wavelet Transform) ([1, 3, 4, 7, 6, 5]). In the paper we emphasize the advantageous features of DWT such as local time-frequency and multi-scale analysis, preserving the quality of host image and ensuring high robustness of watermark. Finally, we present three algorithms which are based on the combination of DWT and some other transformations like DFT ([4]), DCT ([6]) and the Arnold transform ([7, 6]). Finally, we discuss security requirements and possible attacks on the watermarking systems.
Źródło:
Annales Universitatis Mariae Curie-Skłodowska. Sectio AI, Informatica; 2012, 12, 4; 123-139
1732-1360
2083-3628
Pojawia się w:
Annales Universitatis Mariae Curie-Skłodowska. Sectio AI, Informatica
Dostawca treści:
Biblioteka Nauki
Artykuł
Tytuł:
Hybrid watermarking scheme based on singular value decomposition ghost imaging
Autorzy:
Wu, Jun-Yun
Huang, Wei-Liang
Wen, Ru-Hong
Gong, Li-Hua
Powiązania:
https://bibliotekanauki.pl/articles/1835818.pdf
Data publikacji:
2020
Wydawca:
Politechnika Wrocławska. Oficyna Wydawnicza Politechniki Wrocławskiej
Tematy:
digital watermarking
SVD ghost imaging
discrete wavelet transform
imperceptibility
Opis:
A hybrid watermarking algorithm with an optical watermark image based on singular value decomposition (SVD) ghost imaging is designed. Simultaneously, the blended watermarking algorithm is designed based on 4-level discrete wavelet transform (DWT), discrete cosine transform (DCT) and singular value decomposition (SVD). The 4-level diagonal sub-band image is obtained by performing 4-level two-dimensional wavelet transform on the original image, and the coefficient matrix is produced by applying the discrete cosine transform on the 4-level diagonal sub-band image. Then, three matrices are obtained by performing the singular value decomposition on the coefficient matrix. In addition, the optical watermark image is encrypted by an SVD ghost imaging system. The system could generate a secret key, and unauthorized users could not decrypt and reconstruct the original watermark image without this key. Later the encrypted watermark image is generated into the other three matrices by singular value decomposition. Afterwards, the encrypted watermark is embedded in the host image by mutual operation of different matrices in the algorithm. Simulation results validate the feasibility of the proposed hybrid watermarking scheme.
Źródło:
Optica Applicata; 2020, 50, 4; 633--647
0078-5466
1899-7015
Pojawia się w:
Optica Applicata
Dostawca treści:
Biblioteka Nauki
Artykuł

Ta witryna wykorzystuje pliki cookies do przechowywania informacji na Twoim komputerze. Pliki cookies stosujemy w celu świadczenia usług na najwyższym poziomie, w tym w sposób dostosowany do indywidualnych potrzeb. Korzystanie z witryny bez zmiany ustawień dotyczących cookies oznacza, że będą one zamieszczane w Twoim komputerze. W każdym momencie możesz dokonać zmiany ustawień dotyczących cookies