نتایج جستجو برای: low order bits embedding

تعداد نتایج: 2071507  

Journal: :Signal, Image and Video Processing 2014
Mohammad Reza Akbarzadeh Lari Sedigheh Ghofrani Desmond C. McLernon

In this paper we propose a precise and robust watermarking scheme based on the technique called amplitude modulation. A watermark is embedded in a color image by modifying the pixel values in the blue channel. At the receiver, the watermark bits are retrieved using a prediction system, by a linear combination of nearby pixel values around the embedded pixels, and without having the original ima...

2015
Mohammad Reza Akbarzadeh

In this paper we propose a precise and robust watermarking scheme based on the technique called amplitude modulation. A watermark is embedded in a color image by modifying the pixel values in the blue channel. At the receiver, the watermark bits are retrieved using a prediction system, by a linear combination of nearby pixel values around the embedded pixels, and without having the original ima...

Journal: :CoRR 2013
Nan Li Elena Dubrova

This paper presents a new feedback shift registerbased method for embedding deterministic test patterns on-chip suitable for complementing conventional BIST techniques for infield testing. Our experimental results on 8 real designs show that the presented approach outperforms the bit-flipping approach by 24.7% on average. We also show that it is possible to exploit the uneven distribution of do...

2006
Chuen-Ching Wang Yih-Chuan Lin Shu-Chung Yi Po-Yu Chen

This paper proposes a content authentication scheme for MPEG-4 FGS (fine-granular scalability) video based on digital fragile watermarking using BitplaneCoding Watermarking (BCW). In embedding procedure, the watermark information is embedded into every 8×8 block of residual bit-planes in the enhancement layer while encoding to MPEG-4 FGS video stream. The watermark bit is modulated by modifying...

2008
A. S. Abdul-Ahad Baran Çürüklü Waleed A. Mahmoud

In this paper, an algorithm is developed to invisibly watermark a cover object (color image) using watermark object (iconic image). The algorithm is based on the distances among the addresses of values of the cover object. These distances use to make the embedding. The order of manipulating these distances are specified by the values of the watermark data which is dealt with serially. The algor...

2016
Mahsa AFSHARIZADEH Majid MOHAMMADI

In prediction-based reversible watermarking schemes, watermark bits are embedded in the prediction errors. An accurate prediction results in smaller prediction errors, more efficient embedding, and less distortion for the watermarked image. In this paper, an accurate prediction is made using artificial neural networks. Before the embedding operation, 2 neural networks are trained by the pixel v...

2004
Yongqing Xin Simon Liao

In image watermarking, the watermark’s vulnerability to geometric transformations has long been a difficult problem. Using invariant image features to carry the watermark is an effective approach to addressing this problem. In this paper, a multibit geometrically robust image watermarking algorithm using Zernike moments (ZMs) and pseudo-Zernike moments (PZMs) is proposed. Unlike its counterpart...

2013
M. Hamghalam S. Mirzakuchaki

Steganalytic techniques are used to detect whether an image contains a hidden message. By analyzing different image features between stego-images (the image within which information is hidden) and cover-images (the Image in which information is to be hidden), a steganalytic system is able to detect stego-images. In this paper, we present a new method in LSB embedding by avoiding the change of s...

2002
Marc VAN DROOGENBROECK Jérôme DELVAUX

Many information hiding techniques have recently been analyzed as they could help manage part of the digital rights. Among the general framework of information hiding, the focus has been put on steganography and on watermarking techniques. This paper proposes an entropy based technique for data embedding in images with a specific target, sometimes referred to as feature location: inclusion of a...

Journal: :Security and Communication Networks 2022

In this paper, a reversible data-hiding scheme in encrypted, vector quantization (VQ) encoded images is proposed. During image encryption, VQ-encoded image, including codebook and index table, encrypted by content owner with stream-cipher permutation to protect the privacy of contents. As for additional-data embedding, baseline method first proposed its corresponding optimized then given. By gr...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید