Publish in OALib Journal

ISSN: 2333-9721

APC: Only $99


Search Results: 1 - 10 of 773 matches for " watermarking "
All listed articles are free for downloading (OA Articles)
Page 1 /773
Display every page Item
A Comprehensive Analysis of Digital Watermarking
Muhammad Aamir Qureshi,Ran Tao
Information Technology Journal , 2006,
Abstract: Copyright protection of digital contents has become more and more important in accordance with the development of digital technology. As a solution of this predicament, digital watermark technology is drawing attention and various watermarking methods have been presented and studied. Digital watermarking provides protection of intellectual property in the digital world. Just as plagiarism runs rampant in the physical world, unauthorized copying of data whether it be audio, visual, or video exists in the digital world. Digital watermarking attempts to copyright the digital data that is freely available on the World Wide Web to protect owner`s rights. As opposed to traditional, printed watermarks, digital watermarks are transparent signatures. They are integrated within digital files as noise, or random information that already exists in the file. Thus, detection and removal of the watermark becomes more difficult. Typically, watermarks are dispersed throughout the entire digital file such that manipulation of one portion of the file does not alter the underlying watermark. However, it is difficult to decide which method is better than others, because the measure for evaluating their performance has not been established yet. Recently, digital contents can be easily accessed by using computer networks and the problem of protecting multimedia information becomes more and more important. To resolve various problems occurring in these upcoming areas and future emerging disciplines, digital watermark technology is now drawing attention as a new method and technique of protecting copyrights for digital data. Digita1 watermark is realized by embedding information data with an insensible form for human audio/visual systems. It must be difficult for an attacker to remove watermark purposely. In this paper an outline of watermarking and analysis of the various techniques used in the area of image watermarking is presented.
A Dynamic Multiple Watermarking Algorithm Based on DWT and HVS  [PDF]
Li Zhang, Xilan Yan, Hongsong Li, Minrong Chen
Int'l J. of Communications, Network and System Sciences (IJCNS) , 2012, DOI: 10.4236/ijcns.2012.58059
Abstract: In this paper, a dynamic robust multiple watermarking algorithm is proposed based on Discrete Wavelet Transform (DWT) and Human Visual System (HVS). Watermark image is transformed by Arnold transform. Original image is divided into blocks with 8 by 8 and each block is transformed by DWT. By adopting the Just Noticeable Difference (JND) of HVS and changing low frequency coefficients, binary string message can be embedded into the decomposed original image. Watermark can be extracted blindly. Experimental results have shown that the proposed watermarking has robust against many attacks such as JPEG compressing, cropping, additive noise, line removal, median filter and related attacks with sinStirMark.
A Semiblind Reversible Watermarking Scheme for Authentication and Fusion of Facial Thermograms
R. Velumani,V. Seenivasagam
Asian Journal of Scientific Research , 2013,
Abstract: Thermography is a noninvasive procedure for acquiring the thermal profile of a subject in the diagnosis and surgical procedures. The superimposition of thermograms with corresponding visual image of the subjects is a technique followed by clinicians to relate the thermal image with the surface anatomy to localize the diseased parts. Authentication is an essential security aspect in healthcare systems to avoid medical errors. This study focuses on the fusion and authentication of thermograms. The semiblind reversible watermarking system proposed in this study presents a watermarking scheme that embeds the visual facial image of the patient within the facial thermogram in an invisible manner to both authenticate and protect the privacy of the patient. The watermark is extracted later to identify the patient and to generate a composite image for cross reference. The experimental results illustrated for different pathologies demonstrate the efficacy of the proposed technique.
Robust Watermarking of Cartographic Images
Filippo Salucco,Alessandro Piva,Franco Bartolini,Mauro Barni
EURASIP Journal on Advances in Signal Processing , 2002, DOI: 10.1155/s1687617202000549
Abstract: We present a method (Text-Based Geometric Normalization ¢ € ”TBGN) which, by exploiting the particular content of cartographic images, namely text content, permits to cope with global geometric transformations. First, text is extracted from the to-be-marked map, then text orientation and size are exploited to normalize the image geometry prior to watermark insertion. Watermarking is performed by means of any of the existing algorithms ensuring good robustness against image processing tools. At the decoder side, text is extracted again from the map and used to normalize image geometry. Owing to the robustness of text features with respect to common image manipulations, and to the likely spreading of text all across the digital map, the proposed system exhibits an excellent robustness.
Enhanced Nested Video Watermarking Using Wavelets and Geometric Warping
T.Jayamalar,V. Radha
International Journal of Multimedia & Its Applications , 2011,
Abstract: The amount of information created in the current era of information explosion is increasing in aoverwhelming fashion. This increase in content has increased the awareness to protect the intellectualproperty. This paper presents one such method to protect Video content. The proposed watermarkinghybrid scheme combines visual cryptography and wavelets to create a nested watermark, which isembedded into the raw uncompressed video signal using geometric warping technology. A block selectionalgorithm is used to select relevant area for embedding so as to improve robustness. The experimentalresults showed that the proposed system shows significant improvement in terms of capacity and robustnessagainst various attacks.
Audio Watermarking with Error Correction
Aman Chadha,Sandeep Gangundi,Rishabh Goel,Hiren Dave
International Journal of Advanced Computer Sciences and Applications , 2011,
Abstract: In recent times, communication through the internet has tremendously facilitated the distribution of multimedia data. Although this is indubitably a boon, one of its repercussions is that it has also given impetus to the notorious issue of online music piracy. Unethical attempts can also be made to deliberately alter such copyrighted data and thus, misuse it. Copyright violation by means of unauthorized distribution, as well as unauthorized tampering of copyrighted audio data is an important technological and research issue. Audio watermarking has been proposed as a solution to tackle this issue. The main purpose of audio watermarking is to protect against possible threats to the audio data and in case of copyright violation or unauthorized tampering, authenticity of such data can be disputed by virtue of audio watermarking.
Man Kan Dan,Dr. T. Meyappan
International Journal of Computers & Technology , 2012,
Abstract: Embedding a hidden stream of bits in a file is called Digital watermarking. The file could be an image, audio, video or text. Nowadays, a digital watermarking has many applications such as broadcast monitoring, owner identification, proof of ownership, transaction tracking, content authentication, copy control, device control and file reconstruction. It is intended to complement cryptographic processes. It is a visible or preferably invisible, identification code that is permanently embedded in the data and remains present within the data after any decryption process. The focus of this paper will detail digital watermarking for multimedia applications and covered by definition of digital watermarking, purpose, techniques and types of watermarking attacks briefly discussed.
Método Robusto de Marca de Agua para Audio con Transformada Haar
Acevedo M, Marco A.;López Bonilla, José Luis;Linares y Miranda, Roberto;
Computación y Sistemas , 2005,
Abstract: this work shows a robust watermarking method to be introduced in audio files. the new in this method is the use of the wavelet haar transform in combination with patcwork algorithm in the frequency domain. this combination makes the watermarking robust against compression, filtering and resampling. we use matlab to implement the tests of audio files.
Review on Text Document Watermarking
Namrata Rajendra Shah,Aishwarya Vishwakarma
International Journal of Engineering and Advanced Technology , 2012,
Abstract: Digital watermarking is the concept of hidingdigital signal into digital document such that it cannot bedetected and removed easily. That digital signal is calledwatermark. Text document watermarking is the process ofhiding digital data into text document such that it preservesownership of document. This paper focuses on watermarkingprocess and various techniques including their benefits andlimitations.
Robustness of an Edge Image using DCT & Quantization
Jaishree Jain,Tanu Shree Gupta
International Journal of Electronics and Computer Science Engineering , 2012,
Abstract: The interest in data hiding has raised with the recent activity in digital copyright protection schemes. One way to protect the ownership of a digital image is to secretly embed data in the content of the image identifying the owner. In particular we will describe how one can use watermarking to hide information in a digital image. Multiple watermarking is used for embedding multiple watermarks into the host single to provide authentication without bearing on the optical quality of the image. Some digital watermarking techniques ensure the host-signal noise while associating the watermark in chronological sequence on experienced image data. Our aim is to embed an watermark which contains information into an edge image and find out that if there will be any attack on images such as .jpeg then the information embedded in an image will not be change that is the attack will survive on such images.
Page 1 /773
Display every page Item

Copyright © 2008-2017 Open Access Library. All rights reserved.