نتایج جستجو برای: watermark 200ss

تعداد نتایج: 3536  

Unintentional attacks on watermarking schemes lead to degrade the watermarking channel, while intentional attacks try to access the watermarking channel. Therefore, watermarking schemes should be robust and secure against unintentional and intentional attacks respectively. Usual security attack on watermarking schemes is the Known Message Attack (KMA). Most popular watermarking scheme with stru...

2006
Ersin Elbasi Ahmet M. Eskicioglu

A semi-blind image watermarking scheme embeds a pseudo random sequence in all the high pass DWT coefficients above a given threshold T1. The attacked DWT coefficients are then correlated with the original watermark. For watermark detection, all the coefficients higher than another threshold T2 (>T1) are chosen for correlation with the original watermark. This idea was extended to embed the same...

2014
B K Sujatha

Digital ImageWatermarking is a process of embedding a copy righted information inside the digital image such a way that intruder is not able to trace the information. In this paper a simple visual cryptography based robust digital image watermarking scheme is presented. Watermark Robustness is obtained by using repetition codes and Security of the watermark by visual cryptography. In this metho...

2013
Mahesh Sanghavi Rajeev Mathur Archana Rajurkar

Many researchers in the past literatures have proven that watermarking is the remarkable technique for ownership proof and copyright protection. Especially in video, it takes ample time to embed watermark & also for the extraction due to redundancy of watermark embedding. Solution to this problem is to embed the watermark in any one frame, which may be decided at random, but due to frame droppi...

2001
Kai Fung Tsang Oscar C. Au

Watermark attacks are first categorized and explained with examples in this paper. We then propose a new image watermark attack called "Pixel Reallocation Attack". The proposed attack is a hybrid approach, which aims to decorrelate the embedded watermark with the original watermark. Since many watermarking detections are by correlating the testing image with the target watermark, it will not wo...

2013
Soumik Das Monalisa Banerjee Atal Chaudhuri

Ownership authentication and copyright protection of image has achieved a sharp attention due to easy and global availability of internet services. Illegal copying and misappropriation of digital image leads cyber crime in an epidemic form. Invisible watermarking technique is one of the leading solutions towards violation of ownership authentication problem without deteriorating the quality of ...

2001
Steven Schimmel

The aim of this project is to remove the motion related artifacts of the current watermarking algorithm, known as the ‘dirty window problem’. It was observed that part of the dirty window problem originated from watermark artifacts in still images. Therefore, two possible improvements of the current algorithm are suggested that will lower the visibility of the watermark in still images: adjusti...

2004
Yuanjun Dai Lihe Zhang Yixian Yang

In this paper, we propose a video Watermarking technology to hide copyright information by a slight modification of the motion vector, in MPEG2 video bitstream. In this method, watermark is embedded in the motion residual of large value motion vector, then the motion residual are regularized into a modified bitstream, from which the watermark information can be retrieved easily and exactly. Fro...

2013
Qiming Liu

This paper proposed a novel blind color digital watermarking algorithm based on Integer Discrete Wavelet Transform (IDWT) and Human Visual System (HVS). Firstly, color watermark image was processed into one dimension digital information, and color host image was converted into YIQ color space. Then, according to the features of HVS, encrypted watermark was embedded adaptively into the Y luminan...

2002
Oscar C. Au Peter Hon-Wah Wong

We proposed a blind watermarking technique to embed the watermark in JPEG compressed domain. Low frequency DCT coeffi cients are extracted to form an M-dimensional vector. Watermarking is achieved by modifying this vector in order to point to the centroid of a particular cell. This cell is determined according to the extract ed vector, private keys and the watermark. A dual-key system is used t...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید