899 results on '"Digital Watermarking Alliance"'
Search Results
352. Crop-resistant digital watermarking for image based on structured coding
- Author
-
Xin Wang, Xiang-xiang Zhou, Zhong-hai Yin, and Yi-na Han
- Subjects
Digital Watermarking Alliance ,business.industry ,Computer science ,Computer vision ,Watermark ,Artificial intelligence ,business ,Digital watermarking ,Image based ,Coding (social sciences) - Published
- 2009
- Full Text
- View/download PDF
353. Ongoing Innovation in Digital Watermarking
- Author
-
R. Samtani
- Subjects
Digital rights management ,General Computer Science ,Steganography ,business.industry ,Digital Watermarking Alliance ,Computer science ,Data_MISCELLANEOUS ,ComputerApplications_COMPUTERSINOTHERSYSTEMS ,ComputingMilieux_LEGALASPECTSOFCOMPUTING ,Computer security ,computer.software_genre ,Digital media ,business ,Digital watermarking ,computer - Abstract
Watermarking-based applications can help content owners balance business requirements with consumer choice.
- Published
- 2009
- Full Text
- View/download PDF
354. Multimedia watermarking techniques
- Author
-
Martin Kutter and Frank Hartung
- Subjects
Multimedia ,Computer science ,Digital Watermarking Alliance ,Data_MISCELLANEOUS ,Data security ,ComputingMilieux_LEGALASPECTSOFCOMPUTING ,Watermark ,computer.software_genre ,Copy protection ,Robustness (computer science) ,LTS1 ,State (computer science) ,Controlling Chaos and Bifurcations in Engineering Systems ,Electrical and Electronic Engineering ,Host (network) ,Digital watermarking ,computer - Abstract
Multimedia watermarking technology has evolved very quickly during the last few years. A digital watermark is information that is imperceptibly and robustly embedded in the host data such that it cannot be removed. A watermark typically contains information about the origin, status, or recipient of the host data. In this tutorial paper, the requirements and applications for watermarking are reviewed. Applications include copyright protection, data monitoring, and data tracking. The basic concepts of watermarking systems are outlined and illustrated with proposed watermarking methods for images, video, audio, text documents, and other media. Robustness and security aspects are discussed in detail. Finally, a few remarks are made about the state of the art and possible future developments in watermarking technology.
- Published
- 1999
- Full Text
- View/download PDF
355. The use of watermarks in the protection of digital multimedia products
- Author
-
George Voyatzis and Ioannis Pitas
- Subjects
Multimedia ,Digital Watermarking Alliance ,Computer science ,media_common.quotation_subject ,Data_MISCELLANEOUS ,Information and Computer Science ,ComputingMilieux_LEGALASPECTSOFCOMPUTING ,Watermark ,computer.software_genre ,Computer security ,Copy protection ,Digital image ,Originality ,Embedding ,Electrical and Electronic Engineering ,computer ,Digital watermarking ,media_common - Abstract
The watermarking of digital images, audio, video, and multimedia products in general has been proposed for resolving copyright ownership and verifying originality of content. This paper studies the contribution of watermarking for developing protection schemes. A general watermarking framework (GWF) is studied and the fundamental demands are listed. The watermarking algorithms, namely watermark generation, embedding, and detection, are analyzed and necessary conditions for a reliable and efficient protection are stated. Although the GWF satisfies the majority of requirements for copyright protection and content verification, there are unsolved problems inside a pure watermarking framework. Particular solutions, based on product registration and related network services, are suggested to overcome such problems.
- Published
- 1999
- Full Text
- View/download PDF
356. Digital watermarking for telltale tamper proofing and authentication
- Author
-
Dimitrios Hatzinakos and Deepa Kundur
- Subjects
Computer science ,business.industry ,Digital Watermarking Alliance ,ComputingMethodologies_IMAGEPROCESSINGANDCOMPUTERVISION ,Image processing ,Watermark ,computer.file_format ,JPEG ,Copy protection ,Wavelet ,Computer vision ,Artificial intelligence ,Electrical and Electronic Engineering ,business ,computer ,Digital watermarking ,Transform coding - Abstract
In this paper, we consider the problem of digital watermarking to ensure the credibility of multimedia. We specifically address the problem of fragile digital watermarking for the tamper proofing of still images. Applications of our problem include authentication for courtroom evidence, insurance claims, and journalistic photography. We present a novel fragile watermarking approach which embeds a watermark in the discrete wavelet domain of the image by quantizing the corresponding coefficients. Tamper detection is possible in localized spatial and frequency regions. Unlike previously proposed techniques, this novel approach provides information on specific frequencies of the image that have been modified. This allows the user to make application-dependent decisions concerning whether an image, which is JPEG compressed for instance, still has credibility. Analysis is provided to evaluate the performance of the technique to varying system parameters. In addition, we compare the performance of the proposed method to existing fragile watermarking techniques to demonstrate the success and potential of the method for practical multimedia tamper proofing and authentication.
- Published
- 1999
- Full Text
- View/download PDF
357. A watermarking technique based on one-way hash functions
- Author
-
Kuo-Feng Hwang, Chin-Chen Chang, and Min-Shiang Hwang
- Subjects
business.industry ,Digital Watermarking Alliance ,Computer science ,Data_MISCELLANEOUS ,Hash function ,ComputingMilieux_LEGALASPECTSOFCOMPUTING ,Cryptography ,Computer security ,computer.software_genre ,Image (mathematics) ,Digital image ,Media Technology ,Cryptographic hash function ,Cryptosystem ,Computer vision ,Artificial intelligence ,Electrical and Electronic Engineering ,business ,Digital watermarking ,computer - Abstract
Digital watermarking techniques have been proposed for the copyright protection of digital images. A digital watermarking technique is a technique for embedding invisible watermarks in a digital image. The watermarks must be designed to be unrecognizable by unauthorized people and to be identified by the legal copyright owner of the image. In this paper, we proposed a new copyright watermarking scheme. Our scheme is based on one-way hash functions, which are widely used in cryptosystems. The main goal of our method is to design a secure watermarking scheme.
- Published
- 1999
- Full Text
- View/download PDF
358. Copyright Protection of Digital Contents and its Technologies. Application of Digital Watermarking Technologies
- Author
-
Norishige Morimoto
- Subjects
Multimedia ,Digital Watermarking Alliance ,Computer science ,Media Technology ,Electrical and Electronic Engineering ,computer.software_genre ,Digital watermarking ,computer ,Computer Science Applications - Published
- 1999
- Full Text
- View/download PDF
359. Protecting digital image copyrights: a framework
- Author
-
Ioannis Pitas and George Voyatzis
- Subjects
Copy protection ,Digital image ,Digital Watermarking Alliance ,Computer science ,Data_MISCELLANEOUS ,ComputingMilieux_LEGALASPECTSOFCOMPUTING ,Image processing ,Computer security ,computer.software_genre ,Computer Graphics and Computer-Aided Design ,computer ,Digital watermarking ,Software - Abstract
Digital watermarks offer a way to counter copyright piracy on the global network. We summarize the fundamental concepts of watermarking and describe a general framework for a copyright protection system. Watermarks efficiently protect copyright when basic demands can be satisfied. However, the demand for watermarks to remain robust under digital image-processing operations has not yet been fully satisfied. Robustness to geometrical distortions is an essential remaining problem for schemes that do not use the original images in the detection procedure. Furthermore, new watermarking schemes must take into account optimizations of current processing algorithms and the development of new algorithms. Better future compression techniques, for example, must not destroy watermarks embedded at any earlier time.
- Published
- 1999
- Full Text
- View/download PDF
360. Comments on 'An SVD-Based Watermarking Scheme for Protecting Rightful Ownership'
- Author
-
R. Rykaczewski
- Subjects
Scheme (programming language) ,Theoretical computer science ,business.industry ,Digital Watermarking Alliance ,Computer science ,Computer security ,computer.software_genre ,Computer Science Applications ,Public-key cryptography ,Digital signature ,Signal Processing ,Singular value decomposition ,Media Technology ,Electrical and Electronic Engineering ,business ,computer ,Digital watermarking ,computer.programming_language - Abstract
For original paper see ibid., vol. 4, no. 1, p. 121-8 (2002). It is shown that the watermarking algorithm presented in the above paper (R. Liu et al., 2002) can be easily discredited and ipso facto cannot be used for protecting rightful ownership
- Published
- 2007
- Full Text
- View/download PDF
361. Digital watermarking of text, image, and video documents
- Author
-
J. K. Su, Frank Hartung, and Bernd Girod
- Subjects
Relation (database) ,Digital Watermarking Alliance ,Computer science ,Data_MISCELLANEOUS ,General Engineering ,ComputingMilieux_LEGALASPECTSOFCOMPUTING ,Watermark ,Computer security ,computer.software_genre ,Communications system ,Computer Graphics and Computer-Aided Design ,Human-Computer Interaction ,Spread spectrum ,Robustness (computer science) ,Information hiding ,computer ,Digital watermarking - Abstract
The ease of reproduction, distribution, and manipulation of digital documents creates problems for authorized parties that wish to prevent illegal use of such documents. To this end, digital watermarking has been proposed as a last line of defense. A digital watermark is an imperceptible, robust, secure message embedded directly into a document. The watermark is imperceptible both perceptually and statistically. Robustness means that the watermark cannot be removed or modified unless the document is altered to the point of no value. The watermark is secure if unauthorized parties cannot erase or modify it. Current watermarking schemes may be viewed as spread-spectrum communications systems, which transmit a message redundantly using a low-amplitude, pseudo-noise carrier signal. An example highlights the basic mechanisms and properties of spread spectrum and their relation to watermarking. Finally, specific issues in watermarking of text, images, and video are discussed, along with watermarking examples.
- Published
- 1998
- Full Text
- View/download PDF
362. Digital watermarking makes its mark
- Author
-
Hal Berghel
- Subjects
Fuel Technology ,Digital Watermarking Alliance ,Computer science ,business.industry ,Energy Engineering and Power Technology ,Watermark ,Computer vision ,Artificial intelligence ,business ,Digital watermarking - Published
- 1998
- Full Text
- View/download PDF
363. A generic digital watermarking model
- Author
-
Eckhard Koch, Jian Zhao, and Publica
- Subjects
Scheme (programming language) ,Basis (linear algebra) ,Steganography ,Computer science ,Digital Watermarking Alliance ,General Engineering ,security ,Computer security ,computer.software_genre ,Computer Graphics and Computer-Aided Design ,Variety (cybernetics) ,Human-Computer Interaction ,Spread spectrum ,Computer Science::Multimedia ,copyright protection ,Data mining ,Noise (video) ,steganography ,computer ,Digital watermarking ,digital watermarking ,Computer Science::Cryptography and Security ,computer.programming_language - Abstract
This paper presents a generic model of digital watermarking techniques based on the following principles: steganography, spread spectrum communications technology, and perceptibility restriction and noise theory. Concepts and functional modules are developed in this paper to describe an abstract scheme of digital watermarking methods. This generic model provides a common basis to study many existing watermarking systems and to evaluate their performance and characteristics. A variety of watermarking methods can be derived from this generic model and several of them are discussed in this paper.
- Published
- 1998
- Full Text
- View/download PDF
364. Multimedia data-embedding and watermarking technologies
- Author
-
Mitchell D. Swanson, M. Kobayashi, and Ahmed H. Tewfik
- Subjects
Audio signal ,Source data ,Steganography ,Multimedia ,Digital Watermarking Alliance ,Computer science ,ComputingMilieux_LEGALASPECTSOFCOMPUTING ,computer.software_genre ,Information protection policy ,Copy protection ,Electrical and Electronic Engineering ,Host (network) ,Digital watermarking ,computer - Abstract
We review developments in transparent data embedding and watermarking for audio, image, and video. Data-embedding and watermarking algorithms embed text, binary streams, audio, image, or video in a host audio, image, or video signal. The embedded data are perceptually inaudible or invisible to maintain the quality of the source data. The embedded data can add features to the host multimedia signal, e.g., multilingual soundtracks in a movie, or provide copyright protection. We discuss the reliability of data-embedding procedures and their ability to deliver new services such as viewing a movie in a given rated version from a single multicast stream. We also discuss the issues and problems associated with copy and copyright protection and assess the viability of current watermarking algorithms as a means for protecting copyrighted data.
- Published
- 1998
- Full Text
- View/download PDF
365. Resolving rightful ownerships with invisible watermarking techniques: limitations, attacks, and implications
- Author
-
Boon-Lock Yeo, Nasir Memon, Minerva M. Yeung, and Scott Craver
- Subjects
Computer Networks and Communications ,Digital Watermarking Alliance ,business.industry ,Computer science ,Data_MISCELLANEOUS ,ComputingMilieux_LEGALASPECTSOFCOMPUTING ,Cryptography ,Image processing ,Computer security ,computer.software_genre ,Digital image ,Electrical and Electronic Engineering ,business ,Digital watermarking ,computer - Abstract
Digital watermarks have been proposed as a means for copyright protection of multimedia data. We address the capability of invisible watermarking schemes to resolve copyright ownership. We show that, in certain applications, rightful ownership cannot be resolved by current watermarking schemes alone. Specifically, we attack existing techniques by providing counterfeit watermarking schemes that can be performed on a watermarked image to allow multiple claims of rightful ownership. In the absence of standardization and specific requirements imposed on watermarking procedures, anyone can claim ownership of any watermarked image. In order to protect against the counterfeiting techniques that we develop, we examine the properties necessary for resolving ownership via invisible watermarking. We introduce and study invertibility and quasi-invertibility of invisible watermarking techniques. We propose noninvertible watermarking schemes, and subsequently give examples of techniques that we believe to be nonquasi-invertible and hence invulnerable against more sophisticated attacks proposed in the paper. The attacks and results presented in the paper, and the remedies proposed, further imply that we have to carefully reevaluate the current approaches and techniques in invisible watermarking of digital images based on application domains, and rethink the promises, applications and implications of such digital means of copyright protection.
- Published
- 1998
- Full Text
- View/download PDF
366. Image Processing Technologies for Security. Improvement of a Digital Watermarking Method by Patchwork
- Author
-
Arata Sato, Shinji Ozawa, and Junji Onishi
- Subjects
Multimedia ,Digital Watermarking Alliance ,Computer science ,Media Technology ,Image processing ,Electrical and Electronic Engineering ,computer.software_genre ,computer ,Digital watermarking ,Computer Science Applications - Abstract
電子透かし技術のひとつである統計的手法を用いたパッチワークは, 1つのブロック領域に1ビットの情報しか埋め込むことができない.本論文では, 任意に期待値を4種類作ることにより, 1つのブロック領域に一度に2ビットの情報を埋め込む方法を提案する.
- Published
- 1998
- Full Text
- View/download PDF
367. Watermarking cyberspace
- Author
-
Hal Berghel
- Subjects
General Computer Science ,Computer science ,business.industry ,Digital Watermarking Alliance ,Internet privacy ,Cyberspace ,business ,Computer security ,computer.software_genre ,Digital watermarking ,computer - Published
- 1997
- Full Text
- View/download PDF
368. Data hiding for multimedia personalization, interaction, and protection
- Author
-
M. Swanson and Ahmed H. Tewfik
- Subjects
Information privacy ,Multimedia ,business.industry ,Digital Watermarking Alliance ,Computer science ,Applied Mathematics ,Digital data ,ComputingMilieux_LEGALASPECTSOFCOMPUTING ,Cryptography ,computer.software_genre ,Digital media ,Personalization ,Information hiding ,Signal Processing ,Electrical and Electronic Engineering ,business ,computer ,Digital watermarking - Abstract
The advantages of digital media have opened up many new possibilities to hide data (information) within audio, image and video files. In order to provide copyright protection digital watermarking has been proposed as a means of identifying the owner or distributor of digital data. Data hiding and watermarking research builds on ideas and concepts developed in cryptography, communications theory, algorithm design, and signal processing. The data hiding problem is inherently more difficult than any of the problems that have traditionally been addressed in these fields. All data hiding algorithms combine and extend, in a sense, many of the solutions developed in these areas.
- Published
- 1997
- Full Text
- View/download PDF
369. Localization Watermarking for Authentication of Text Images in Quran with Spiral Manner Numbering
- Author
-
Jasni Mohamad Zain, Afifah Nailah Muhammad, Syifak Izhar Hisham, and Gran Badshah
- Subjects
Numbering system ,Computer science ,Digital Watermarking Alliance ,Operating time ,Embedding ,Watermark ,Android (operating system) ,Computer security ,computer.software_genre ,computer ,Digital watermarking ,Numbering - Abstract
The phenomenon of widespread usage of smart phone has encouraged many android applications to be produced, by free or paid. Nowadays, with the trend of communicating through social networking applications and social networking sites, Muslims tend to share the image of verse from the Quran applications to the sites. Several concerns regarding security and copy control of the verse text image have aroused, and among the solution to this issue is watermarking. This paper has conducted a research proposing an authentication fragile watermark with spiral manner which shows a good numbering system of embedding. The watermarking scheme is imperceptible and can embed high capacity of data. The average Peak-signal-of-Noise-Ratio (PSNR) value of embedded image is 67.06dB and the average operating time is 1.29 seconds. Subsequently, it proposed a localization and restoration watermarking scheme to be applied in the Quran application as a function before sharing.
- Published
- 2013
- Full Text
- View/download PDF
370. Chaos based invertible authentication of medical images
- Author
-
Muhammad Tahir Naseem, Ijaz Mansoor Qureshi, Atta-ur-Rahman, and Muhammad Zeeshan Muzaffar
- Subjects
Authentication ,Digital Watermarking Alliance ,business.industry ,Computer science ,Image quality ,Data_MISCELLANEOUS ,ComputingMethodologies_IMAGEPROCESSINGANDCOMPUTERVISION ,Watermark ,Information hiding ,Key (cryptography) ,Computer vision ,Message authentication code ,Artificial intelligence ,business ,Digital watermarking - Abstract
Digital image watermarking is used as a data hiding method to enhance medical confidentiality, integrity and data security. Extreme care should be done in medical image watermarking because the added additional information should not degrade the image quality. In this paper we are presenting a fragile and reversible watermarking based on chaotic key. ROI and NROI part of image are separated and data is embedded in NROI part of image based on a chaotic key. Image quality is measured with a well known figure-of-merit such as PSNR. Our results show that the watermark is highly secure, fragile and imperceptible after embedding.
- Published
- 2013
- Full Text
- View/download PDF
371. A survey on digital tracing traitors schemes
- Author
-
Chokri Ben Amar, Faten Chaabane, and Maha Charfeddine
- Subjects
Copying ,business.industry ,Computer science ,Digital Watermarking Alliance ,Digital content ,Tracing ,Peer-to-peer ,computer.software_genre ,Computer security ,Code (cryptography) ,The Internet ,business ,computer ,Digital watermarking - Abstract
The encroachment of Internet and Peer to Peer networks has really facilitated our daily lives and works but it contributes to another dangerous phenomenon which is copying a digital content without having authorization, called piracy. To handle this phenomenon, several techniques of tracing traitors were proposed, by combining in the same time a fingerprinting technique to a watermarking one. In this paper, we first present basic notions for multimedia traceability framework: Anti Collusion code (ACC) and the watermarking technique. We show a study of available tracing traitors' schemes and we propose a comparison of accusation ability and computational costs of these techniques. Next we describe our future contribution in this target.
- Published
- 2013
- Full Text
- View/download PDF
372. Edge detection methods in palm-print identification
- Author
-
O. A. Akinsowon and B. K. Alese
- Subjects
Multimedia ,Computer science ,Character (computing) ,Digital Watermarking Alliance ,Data_MISCELLANEOUS ,computer.software_genre ,Data modeling ,Robustness (computer science) ,Embedding ,Algorithm design ,Data mining ,computer ,Digital watermarking ,Decoding methods - Abstract
Digital watermarking technology is currently mainly focused on image, video and audio, text-based digital watermarking technology is very few. This paper analyzes several of common text digital watermarking technologies, designes and implementes a text digital watermarking algorithm of character-based scaling. This algorithm greatly improves the embedding capacity and robustness, and has some practical value.
- Published
- 2013
- Full Text
- View/download PDF
373. Secure and Oblivious Information Hiding in Binary Image
- Author
-
Zheng Huang, Kefei Chen, and Weidong Kou
- Subjects
Computer science ,Digital Watermarking Alliance ,business.industry ,Binary image ,Watermark ,Image (mathematics) ,Computer Science::Computer Vision and Pattern Recognition ,Information hiding ,Computer Science::Multimedia ,Human visual system model ,Key (cryptography) ,Computer vision ,Artificial intelligence ,business ,Digital watermarking ,Computer Science::Cryptography and Security - Abstract
This paper proposes effective digital watermarking scheme to hide information in binary image. The original image is not needed when retrieving the digital watermark and a key is used to protect the hidden information. In order to produce little annoying noise as possible to the binary image, this scheme uses the features of Human Visual System in binary image. Finally we give details on how to implement this algorithm efficiently.
- Published
- 2013
- Full Text
- View/download PDF
374. The study on digital watermarking based on word document
- Author
-
You Fucheng and Chen Li
- Subjects
Information retrieval ,Computer science ,Digital Watermarking Alliance ,Speech recognition ,Digital watermarking ,Word (computer architecture) - Published
- 2013
- Full Text
- View/download PDF
375. A Watermarking Application for Authentication of Holy Quran
- Author
-
Fatih Ertam, Engin Avci, and Turker Tuncer
- Subjects
Steganography tools ,Authentication ,Steganography ,Cover (telecommunications) ,Computer science ,Digital Watermarking Alliance ,business.industry ,Cryptography ,Data_CODINGANDINFORMATIONTHEORY ,Information security ,Computer security ,computer.software_genre ,business ,Digital watermarking ,computer - Abstract
Nowadays, with the development of technology transfer to the information transmitted safely started to carry more importance to reach the desired aim. The science of information security is composed of steganography, watermarking, cryptography and authentication. Steganography is one of the subset of information security. In steganography objective data on the desired data to hide any cover. Thus, a computer file that appears cover data and data can be transmitted to the recipient in a hidden way. Digital watermarks may be used to verify the authenticity or integrity of the carrier signal or to show the identity of its owners. In this study, the fragile watermarking techniques will use pages of the Quran by using steganography methods. Our aim is to authenticate the raffle and to prevent the unauthorized distribution of printed or modified in establishing the digital samples. XOR, LSB and Border watermarking techniques will be used. The success rates of these techniques, PSNR will be analyzed according to the ratio.
- Published
- 2013
- Full Text
- View/download PDF
376. A New Fragile Digital Watermarking Technique for a PDF Digital Holy Quran
- Author
-
Amal E. Alduwaikh, Mohammad A. AlAhmad, and Imad Fakhri Taha Alshaikhli
- Subjects
Authentication ,Multimedia ,Computer science ,business.industry ,Digital Watermarking Alliance ,Feature extraction ,Hash function ,ComputingMilieux_LEGALASPECTSOFCOMPUTING ,Watermark ,computer.software_genre ,Digital media ,Feature (computer vision) ,business ,computer ,Digital watermarking - Abstract
Digital media manipulation has become easily performed at personal level with the rapidly growth of Technology. Presenting an issue of protecting digital media integrity. Watermarking has become a popular solution for copyright and integrity issues. This paper presents an invisible fragile watermarking technique for protecting the integrity of a PDF Digital Holy Quran. This watermark is generated using DCT algorithm for feature extracting along with a Gear hash function to provide tampering detection.
- Published
- 2013
- Full Text
- View/download PDF
377. Research on Graphic Digital Text Watermarking Research Framework
- Author
-
Rui Lu, Jin Zhang, Xiaoli Gong, Xiaowei Liu, and Zhenlu Chen
- Subjects
Information retrieval ,Digital text ,Pixel ,Conceptual framework ,Character (computing) ,Digital Watermarking Alliance ,Computer science ,Data_MISCELLANEOUS ,Line (text file) ,Paragraph ,Digital watermarking - Abstract
This paper proposes a research framework for graphic digital text Watermarking algorithms and methods. We summarized graphic text watermarking after a brief review of digital text watermarking, and propose the research framework which consists of 8 levels, pixel, line, etymon, character, row, paragraph, page, and chapter. And we give the details of pixel level details and review most graphic text watermarking of this level as the example. At last we also figure out distribution of nowadays algorithms and discuss further research’s possibility.
- Published
- 2013
- Full Text
- View/download PDF
378. Towards transferable watermarks in buyer-seller watermarking protocols
- Author
-
Bjorn Terelius
- Subjects
Computer science ,Digital Watermarking Alliance ,Digital content ,Data_MISCELLANEOUS ,TheoryofComputation_GENERAL ,ComputingMilieux_LEGALASPECTSOFCOMPUTING ,Watermark ,Computer security ,computer.software_genre ,Peer to peer computing ,ComputingMilieux_COMPUTERSANDSOCIETY ,Protocol (object-oriented programming) ,computer ,Digital watermarking - Abstract
Buyer-seller watermarking protocols are protocols that let a seller embed a watermark which uniquely identifies the buyer of each sold copy of some work without allowing the seller to learn the watermark. The purpose of such protocols is to deter buyers from illegally redistributing the work while protecting the buyer from being framed by dishonest sellers. Existing buyer-seller watermarking schemes require that every buyer receives his or her copy directly from the seller. We consider the problem of extending buyer-seller watermarking to allow (controlled) redistribution between buyers while maintaining a watermark that uniquely identifies each recipient. An efficient and secure protocol of this type could allow distribution of digital content in peer-to-peer networks while protecting the owner's copyright. We give a proof-of-concept protocol which only requires limited interaction with the original seller to change the watermark.
- Published
- 2013
- Full Text
- View/download PDF
379. An enhanced Kashida-based watermarking approach for Arabic text-documents
- Author
-
Omar Tayan, Muhammad Nomani Kabir, and Yasser M. Alginahi
- Subjects
Kashida ,Multimedia ,Digital Watermarking Alliance ,business.industry ,Computer science ,Digital content ,computer.software_genre ,Key (cryptography) ,Data Protection Act 1998 ,The Internet ,business ,computer ,Digital watermarking ,Information exchange - Abstract
Rapid advancements in communication technologies have enabled the digital community to benefit from the advantages of fast and simple digital information exchange over the internet. Such benefits, however, come in-hand with the problems and threats associated with ensuring digital copyright protection preventing digital counterfeiting, proof-of-authentication, tamper-detection, and content-originality verification for multimedia digital content. These issues have been largely addressed in the literature for the case of image, audio, and video, with notably less emphasis on addressing the challenge of text media. With text being the predominant communication medium on the internet, it is clear that more attention is required to secure and protect text document. In this work, invisible watermarking technique based on Kashida-marks is proposed. The watermarking key is predefined whereby a Kashida (redundant Arabic character extension) is placed for a bit 1 and omitted for a bit O. By going through the document, Kashidas are inserted before a specific list of characters (***) until the end of the key is reached. If the end of the document is not reached then we repeat the key-embedding for the remainder of the document in a round robin fashion until the end. In comparison to other Kashida methods in the literature, our proposed technique proved to achieve our goal of document protection and authenticity with enhanced robustness and improved perceptual similarity with the original cover-text.
- Published
- 2013
- Full Text
- View/download PDF
380. Frame background influence based invisible watermarking to visible video watermarking
- Author
-
Ta Minh Thanh and Pham Thanh Hiep
- Subjects
Scheme (programming language) ,Cross-correlation ,Computer science ,business.industry ,Digital Watermarking Alliance ,Data_MISCELLANEOUS ,Frame (networking) ,ComputingMilieux_LEGALASPECTSOFCOMPUTING ,Video sequence ,Video processing ,Embedding ,Computer vision ,Artificial intelligence ,business ,computer ,Digital watermarking ,computer.programming_language - Abstract
In this paper, we propose a novel watermarking scheme where both visible and invisible watermarking are embedded into video sequences. Our invisible watermarking is implemented based on the influence of background after embedding the visible watermarking by the adaptive cross correlation (ACC) method. By doing so, our method can be used to achieve two purposes: 1) to announce the ownership of video and 2) to distinguish the legal user. Experimental results showed that our proposed method is suitable for digital e-commerce business and is robust against slight geometrical attacks and video processing attacks.
- Published
- 2013
- Full Text
- View/download PDF
381. H. 264 video standard based zero watermarking technology
- Author
-
Kai Huang and Gui Feng
- Subjects
Theoretical computer science ,Digital Watermarking Alliance ,Computer science ,business.industry ,Data_MISCELLANEOUS ,Digital video ,Watermark ,Video encoding ,Discrete cosine transform ,Computer vision ,Artificial intelligence ,business ,Quantization (image processing) ,Digital watermarking - Abstract
Combined with the H.264/AVC video encoding standard, a new digital video watermarking technology — zero watermarking technology was proposed in the paper. It breaks traditional idea of digital watermarking technique; the important characteristics of video data were used to construct the watermark information. In this paper we construct zero watermark information based on the characteristics of DCT quantization coefficients by intra-prediction. The algorithm is not only real-time but also simple and efficient. Experimental results show that the constructed watermark information had ability of unique identification the host media and robustness against a variety of tampering attacks. And it also can reduce the impact of interpretation attacks by introducing the time-stamp mechanism.
- Published
- 2013
- Full Text
- View/download PDF
382. A Study of DWT and SVD Based Watermarking Algorithms for Patient Privacy in Medical Images
- Author
-
Sachin Mehta, Balakrishnan Prabhakaran, Rajarathnam Nallusamy, and Ranjeet Vinayak Marawar
- Subjects
Information privacy ,Digital Watermarking Alliance ,business.industry ,Computer science ,Data_MISCELLANEOUS ,Watermark ,Robustness (computer science) ,Singular value decomposition ,Code (cryptography) ,Embedding ,Computer vision ,Artificial intelligence ,business ,Digital watermarking ,Algorithm - Abstract
Information and Communication Technologies (ICT) are being adopted widely to improve citizen's health care. Health information systems (HIS) of different hospitals exchange electronic medical records including digital medical images of patients. Medical images and accompanying reports have special requirement of protecting the privacy of the patient by not revealing personal particulars especially when they are transmitted over networks. To increase the security of medical images and preserve patients' privacy, digital watermarking has been proposed. In this paper, we study the performance of three different watermarking algorithms (DWT, SVD and DWT-SVD based watermarking algorithms). We have created two different watermarks with same watermark information but with different characteristics - one is QR Code as watermark image which is capable of carrying large information in small space, while the other one is a normal text image watermark and embedded inside medical images. We, then, have assessed the quality of watermarked images obtained after embedding the watermarks using both objective (PSNR) as well as subjective (opinions from physicians, a radiologist and a medical physicist) methods and found that watermarking has not resulted in loss of medical information. Further, we have conducted several experiments to evaluate the performance of these algorithms in terms of robustness, capacity, and embedding time. Experimental results show that DWT based method is suitable for medical applications where embedding time and imperceptibility are prime concerns while SVD based methods are suitable for medical applications where robustness and capacity are the main concerns.
- Published
- 2013
- Full Text
- View/download PDF
383. A Novel Approach to Enhance Robustness in Digital Image Watermarking Using Multiple Bit-Planes of Intermediate Significant Bits
- Author
-
Ali Sharifara, Morteza Bashardoost, and Mohd Shafry Mohd Rahim
- Subjects
Digital image ,Least significant bit ,Digital Watermarking Alliance ,Computer science ,Robustness (computer science) ,business.industry ,Human visual system model ,Embedding ,Watermark ,Computer vision ,Artificial intelligence ,business ,Image (mathematics) - Abstract
The main aim of this paper is to introduce a novel approach to preserve digital images' copyrights. Hence as ISB scheme was selected in relation to the approach in an attempt conquer the issues of robustness and imperceptibility in watermarked imagery. According to the literature review, embedding the aimed secret bits (Watermark) is a problematic issue inside a host image (normal 8-bit, grey-scale) in a sense to make it undetectable by the HVS (Human Visual System) in addition to the matter that it is predicted to receive any attacks. The suggested method here represents an improved scheme for the embedding of ISB which maintains the robustness and cultivates the rate of security by employing repeated bits in various bit planes over an irregular order and it develops the LSB technique specifically in circumstances where robustness and imperceptibility are main points of assessment.
- Published
- 2013
- Full Text
- View/download PDF
384. Research on Polymorphism in Digital Text Watermarking
- Author
-
Zhenlu Chen, Xiaowei Liu, Qingcheng Li, Yuanyuan Cheng, and Jin Zhang
- Subjects
Theoretical computer science ,Digital Watermarking Alliance ,Computer science ,Data_MISCELLANEOUS ,Watermark ,computer.software_genre ,Watermarking attack ,Robustness (computer science) ,Embedding ,Algorithm design ,Data mining ,Sensitivity (control systems) ,computer ,Digital watermarking - Abstract
Nowadays, the issues such as the thin algorithm, attack sensitivity, narrow applications restrict the development of text watermark technology. This paper purposes to coordinate multi-watermarking algorithms to work collaboratively by polymorphism watermarking algorithm: on the one hand, this paper hopes to seek the positive direction of watermarking development by way of expanding the embedding space, on the other hand, this paper hopes to use polymorphism watermarking to enhance the robustness of the system. At first, we extract the relevant classification characteristics on the basis of summarizing the existing algorithms. Then we discuss the defining polymorphism watermarking algorithm, and focus on the cooperative relations of the watermark information. By algorithm design, implementation and verification, the polymorphism watermarking algorithm proves to be effective to solve the issues including both limitation of the watermark embedding space and the attack sensitivity of a single algorithm.
- Published
- 2013
- Full Text
- View/download PDF
385. Review of Digital Watermarking for 2D-Vector Map
- Author
-
Fan Yang, Chonglong Wu, and Jinxia Wu
- Subjects
Focus (computing) ,Authentication ,Geographic information system ,business.industry ,Computer science ,Digital Watermarking Alliance ,Process (computing) ,ComputingMilieux_LEGALASPECTSOFCOMPUTING ,computer.software_genre ,Field (computer science) ,Vector map ,Data mining ,business ,Digital watermarking ,computer - Abstract
Vector map is widely used in geographic information system, the military surveying and mapping, etc. The security problem such as copyright authentication, integrity verification, user tracking, and so on, is increasingly prominent in the process of distribution and use of data. Digital watermarking technique is applied in vector map data, becoming an important auxiliary means to solve these problems. Based on the characteristics of vector map and digital watermarking technology, we propose a general module for vector map copyright protection. The function module mainly includes: the vector map watermarking embedded location selection module, watermarking embedded module, copyright decision module or integrity decision module. And for each function module we summarize the vector map watermarking technology research at present, analyze the research route and the main problems, and the possible future research directions in this field and focus are discussed.
- Published
- 2013
- Full Text
- View/download PDF
386. Watermarking and encryption scheme to secure multimedia information
- Author
-
Tarek Farah, Houcemeddine Hermassi, Rhoouma Rhoouma, and Safya Belghith
- Subjects
Steganography ,Computer science ,Digital Watermarking Alliance ,business.industry ,Cryptography ,Watermark ,Computer security ,computer.software_genre ,Encryption ,Watermarking attack ,Probabilistic encryption ,business ,computer ,Digital watermarking - Abstract
Thanks to the development of information technology, fraud has multiplied, and many protection techniques have emerged to improve the security of our information, such as encryption, steganography and watermarking. In this paper we will present a novel scheme to secure multimedia information. Our aim is to increase the security of transmitted signals. First we improved an encryption algorithm based on chaotic iteration of the Logistics map. Then, we developed an algorithm to watermark information by using DCT method to insert message. Simulations and discussions of our method are presented to prove the efficiency of our proposition.
- Published
- 2013
- Full Text
- View/download PDF
387. Video game watermarking
- Author
-
Marcel Schäfer, Sascha Zmudzinski, André Schmitz, Martin Steinebach, Waldemar Berchtold, Huajian Liu, Fábio Touceira Takahashi, and Jonas Wieneke
- Subjects
Multimedia ,Computer science ,Digital Watermarking Alliance ,Hash function ,ComputingMilieux_LEGALASPECTSOFCOMPUTING ,Watermark ,computer.software_genre ,Computer security ,Copy protection ,Collusion ,Information leakage ,Video game ,Digital watermarking ,computer - Abstract
The publishers of video games suffer from illegal piracy and information leakage caused by end-consumers, "release groups" or insiders shortly after or even before the official release of a new video game. Mechanisms to prevent or at least postpone this illegal redistribution are DRM or copy protection mechanisms. However, these mechanisms are very unpopular, because they restrict the customers in playing the game and demand a high administration effort from the developers and/or distributors. Even worse, most copy protection mechanisms have proven to be insecure as "patches" for circumvention usually are available quickly and easy to get. To satisfy the challenges of security and usability, this work introduces the idea of using digital watermarking to protect all available and suitable media types and software binaries contained in a video game. A three-layered watermarking deployment approach along the production chain is proposed to detect leakage in the release phase as well as during the development process of a boxed video game. The proposed approach features both copyright watermarking and collusion secure fingerprints embedded as transaction watermark messages in components of video games. We discuss the corresponding new challenges and opportunities. In addition, a prototype watermarking algorithm is presented to demonstrate the adaption necessity of classical image watermarking when applied to video games to satisfy the requirements for transparency, security as well as performance. The watermark capacity is significantly increased while inter-media and inter-file embedding is enabled and the associated synchronization challenge is solved by robust hashes.
- Published
- 2013
- Full Text
- View/download PDF
388. Protecting Android applications with steganography-based software watermarking
- Author
-
Soon Ki Jung, Dongkyun Kim, Hyunho Ji, Jiman Hong, Joonhyouk Jang, and Jinman Jung
- Subjects
Steganography tools ,Steganography ,Computer science ,Digital Watermarking Alliance ,business.industry ,Data_MISCELLANEOUS ,ComputingMilieux_LEGALASPECTSOFCOMPUTING ,Watermark ,computer.file_format ,Computer security ,computer.software_genre ,Software watermarking ,Software ,Embedded system ,Executable ,Android (operating system) ,business ,Digital watermarking ,computer - Abstract
In this paper, we propose a steganography-based software watermarking scheme to protect Android applications from software piracy. Considering the resource limitations in mobile devices, it is difficult to apply previous software watermarking schemes in mobile applications. To decrease the watermarking overhead in a watermarking scheme, such as a slowdown in the execution of applications after embedding a watermark, we proposed a different approach that applies steganography-based techniques in software watermarking. The proposed scheme embeds watermarks by reordering the sequence of instructions in the basic blocks in Dalvik executable files.
- Published
- 2013
- Full Text
- View/download PDF
389. Robust watermarking of AES encrypted images for DRM systems
- Author
-
V. C. Prasad and S. Maheswari
- Subjects
Digital Watermarking Alliance ,business.industry ,Computer science ,Data_MISCELLANEOUS ,ComputingMilieux_LEGALASPECTSOFCOMPUTING ,Cryptography ,Watermark ,computer.software_genre ,Encryption ,Computer security ,Watermarking attack ,Filesystem-level encryption ,Computer vision ,Artificial intelligence ,On-the-fly encryption ,business ,computer ,Digital watermarking - Abstract
Digital image capturing, processing and distribution has showed a remarkable growth over recent years. This media content is sometimes distributed in encrypted format and watermarking of these media items for proof of ownership, media authentication needs to be carried out in encrypted domain to improve image security. Therefore it is sometimes necessary to embed watermark in encrypted media items for ownership declaration or copyright management purposes. DRM system is one such example where there is a challenge to watermark these encrypted data as the encryption would have randomized the incoming data. In this paper, a block cipher called AES-128 bit key encryption algorithm and DCT combined with DWT based watermarking algorithm to watermark the encrypted image were proposed which increases robustness of the watermark. These method embeds the binary watermark in encrypted image and decryption is done after extraction of watermark.
- Published
- 2013
- Full Text
- View/download PDF
390. A new approach combining speech chaotic encryption with fragile image watermarking for audio securing and intrusion detection
- Author
-
Seddik Hassene and Bouslehi Hamdi
- Subjects
Theoretical computer science ,business.industry ,Computer science ,Digital Watermarking Alliance ,Data_MISCELLANEOUS ,Speech coding ,ComputingMilieux_LEGALASPECTSOFCOMPUTING ,Watermark ,Intrusion detection system ,Encryption ,Watermarking attack ,Computer vision ,Artificial intelligence ,business ,Digital watermarking ,Digital audio - Abstract
Digital watermarks have been created to be a protection technique of copy rights on digital audio, image, and video. A watermarking can be fragile and robust according to our needs. An attack in watermarking technology is any process that can impact the detection of the watermark. In this paper we studied the evaluating of extracted signal quality before and after attack with the SNR value calculated between extracted signals. This evaluation serves to present the fragility of our watermarking whose the mark is an audio sequence encrypted by a chaotic encryption algorithm method and tested by using various types of attacks. The fragility of watermarking is used as a tool to control intrusion.
- Published
- 2013
391. Digital Watermarking with copyright authentication for image communication
- Author
-
K. Raval and S. Zafar
- Subjects
Multimedia ,Digital Watermarking Alliance ,Computer science ,business.industry ,ComputingMethodologies_IMAGEPROCESSINGANDCOMPUTERVISION ,Watermark ,computer.software_genre ,Uncompressed video ,Digital image ,Digital image processing ,Computer vision ,Artificial intelligence ,business ,computer ,Digital watermarking ,Digital signal processing ,Image compression - Abstract
The advancing world of digital multimedia communication is faces problems related to security and authenticity of digital data. In the context of multimedia communication, digital images and videos have numerous applications in entertainment world like TV channel broadcasting. Digital Watermarking algorithms used to protect the copyright of digital images and to verify multimedia data security. Most watermarking algorithms transform the host image and embedding of the watermark information by robust way. Uncompressed digital images need a lot storage capacity and bandwidth so efficient image transmission need image compression. The solution is becoming more complex with the growth of data. We propose Digital Watermarking by proposed transform Algorithm based on DCT-DWT watermarking. By this method we can do secure image transmission.
- Published
- 2013
- Full Text
- View/download PDF
392. Properties of digital image watermarking
- Author
-
Teddy Surya Gunawan, Mohammad Abdullatif, Akram M. Zeki, and Jalel Chebil
- Subjects
Digital image watermarking ,Authentication ,Evaluation system ,business.industry ,Digital Watermarking Alliance ,Computer science ,Data_MISCELLANEOUS ,ComputingMilieux_LEGALASPECTSOFCOMPUTING ,Broadcasting ,Image (mathematics) ,Watermarking attack ,Computer vision ,Artificial intelligence ,business ,Digital watermarking - Abstract
Digital image watermarking techniques have been developed widely in recent years to maintain the broadcasting media and content authentication, broadcast monitoring, copy control, and many other applications. Therefore, many studies have used digital image watermarking to solve these problem. This paper highlights digital image watermarking. It starts with a basic model of digital image watermarking, it discusses the main requirements and applications. Moreover, it reviews some of the techniques and algorithm used in image watermarking. In addition, digital image watermarking attacks are discussed. Lastly, Watermarking evaluation system is described.
- Published
- 2013
- Full Text
- View/download PDF
393. Improved image copyright protection scheme exploiting visual cryptography in wavelet domain
- Author
-
G. Boato, A. Meneghetti, and F.G.B. De Natale
- Subjects
Discrete wavelet transform ,Theoretical computer science ,Channel (digital image) ,Digital Watermarking Alliance ,Computer science ,business.industry ,Data_MISCELLANEOUS ,ComputingMilieux_LEGALASPECTSOFCOMPUTING ,Watermark ,Cryptography ,Visual cryptography ,Wavelet ,Computer engineering ,business ,Digital watermarking - Abstract
The last few years have seen a massive increment in the use of the Internet as a channel for sharing and transmitting data, thus requiring the need for copyright protection schemes able to preserve the ownership of the data. The idea of embedding a watermark directly in the data is however unacceptable in various fields of application, due to the intrinsic degradation introduced by non reversible watermarking schemes. Hence some zero watermarking schemes have been developed. In this work we propose an optimization of a recent watermarking method based on visual cryptography, by improving results against most commont types of attacks and achieving a higher perceptual quality of the extracted mark.
- Published
- 2013
- Full Text
- View/download PDF
394. Digital watermarking techniques and security issues in the information and communication society
- Author
-
Jordi Nin, Sergio Ricciardi, Universitat Politècnica de Catalunya. Departament d'Arquitectura de Computadors, Universitat Politècnica de Catalunya. CAP - Grup de Computació d'Altes Prestacions, and Universitat Politècnica de Catalunya. CBA - Sistemes de Comunicacions i Arquitectures de Banda Ampla
- Subjects
Digital rights management ,Multimedia ,business.industry ,Computer science ,Digital Watermarking Alliance ,Watermark ,ComputingMilieux_LEGALASPECTSOFCOMPUTING ,Image security ,Watermarking ,computer.software_genre ,Computer security ,Copy protection ,Informàtica::Seguretat informàtica [Àrees temàtiques de la UPC] ,Marcatge digital ,Embedding ,The Internet ,Digital watermarking ,Fingerprinting ,Digital right management systems ,business ,computer ,Watermark attack techniques - Abstract
Digital watermarking is the process of embedding information into a noise-tolerant digital signal such as image or audio data. Such information is embedded in a way difficult to be removed in order to easily identify relevant information for many different purposes, such as the copyright ownership of the media, source tracking, piracy deterrence, etc. There is an extensive literature about watermarking algorithms and methods as well as possible attack techniques. In this work we collect a part of this vast literature in order to make easier for a non-expert reader about watermarking to have a high-level overview on new trends and technologies related to multimedia watermark algorithms and attacks.
- Published
- 2013
395. ICA-Based Image and Video Watermarking
- Author
-
Jiande Sun and Ju Liu
- Subjects
business.industry ,Digital Watermarking Alliance ,Computer science ,ComputingMethodologies_IMAGEPROCESSINGANDCOMPUTERVISION ,Pattern recognition ,Video processing ,Blind signal separation ,Independent component analysis ,ComputingMethodologies_PATTERNRECOGNITION ,Human visual system model ,Unsupervised learning ,Video denoising ,Artificial intelligence ,business ,Digital watermarking - Abstract
With the development of computer science and information transmission, image and video have been applied more and more. Extraction of features match to human visual system and compact representation of images and videos are the key points in the field of image and video analysis. As an unsupervised learning method, Independent Component Analysis (ICA) has been used widely in image and video processing, because it is proved to match human visual system in image and video understanding. In this chapter, ICA model and FastICA algorithm are introduced firstly. And then several ICA-based image and video processing models are presented, and various independent features corresponding to these models are introduced. Finally, the similarity between the ICA- and watermarking-models is analyzed, and some representative ICA-based image and video watermarking algorithms are presented.
- Published
- 2013
- Full Text
- View/download PDF
396. Distortion-Free Authentication Watermarking
- Author
-
Sukriti Bhattacharya and Agostino Cortesi
- Subjects
Watermarking ,Abstract Interpretation ,Databases ,Authentication ,Settore INF/01 - Informatica ,business.industry ,Relational database ,Digital Watermarking Alliance ,Computer science ,Data_MISCELLANEOUS ,Internet privacy ,Abstract interpretation ,Audio watermark ,Computer engineering ,Distortion free ,Distortion ,Computer Science::Multimedia ,business ,Digital watermarking ,Computer Science::Cryptography and Security - Abstract
In this paper we introduce a distortion free watermarking technique that strengthen the verification of integrity of the relational databases by using a public zero distortion authentication mechanism based on the Abstract Interpretation framework.
- Published
- 2013
- Full Text
- View/download PDF
397. A Unified Approach towards Multimedia Watermarking
- Author
-
Tuqa Manasrah, Samir Abou El-Seoud, Lama Rajab, Ahmad A. Mohammad, Ali Al-Haj, and Tahani Al-Khatib
- Subjects
Multimedia ,Computer science ,Digital Watermarking Alliance ,computer.software_genre ,computer ,Digital watermarking - Abstract
The tremendous advancement of digital technology has increased the ease with which digital multimedia signals (image, video, audio) are stored, transmitted, and reproduced. Consequently, the content providers and owners are faced with problems of protection against copyright violation and other forms of abuse to their digital property. Digital watermarking has been proposed in the last decade as a solution to prevent illegal and malicious copying and distribution of digital media by embedding an unnoticeable information into the media content. This chapter describes three imperceptible and robust watermarking algorithms for different types of multimedia objects (image, video, audio). The three algorithms are based on cascading two powerful mathematical transforms; the Discrete Wavelet Transform (DWT), and the Singular Value Decomposition (SVD). The two transforms are different, and thus provide complementary levels of robustness against the same attack. In the proposed dual-transform algorithms, the watermark bits are not embedded directly on the wavelet coefficients, but rather on the elements of singular values of the DWT sub-bands of the multimedia object. Effectiveness of the proposed algorithms is demonstrated through extensive experimentation.
- Published
- 2013
- Full Text
- View/download PDF
398. Enhancing Security in Medical Image Communication with JPEG2000 Compression and Lossless Watermarking
- Author
-
A. Umamageswari and G. R. Suresh
- Subjects
Authentication ,Computer science ,business.industry ,Digital Watermarking Alliance ,Hash function ,ComputingMethodologies_IMAGEPROCESSINGANDCOMPUTERVISION ,Encryption ,MD5 ,DICOM ,Region of interest ,Computer vision ,Artificial intelligence ,business ,Digital watermarking - Abstract
Medical image content authentication is very important, since medical image contents are more and more widely distributed. Reversible watermarking becomes a promising technique to embed the information into medical images. In this paper, we define the Region of Interest (ROI) in an image and trying to embed data in Region of Non Interest. When medical image shared through network, for the compression purpose we proposed the JPEG2000 algorithm and to improve the integrity and Authenticity hash value of the image is found by using MD5 and encrypted using RSA to form the DS (Digital Signature). DS and patient information is embedded into DICOM images. Strict authentication can be achieved by providing high security in accessing the secured medical images by medical experts which are available in the websites using Kerberos technique.
- Published
- 2013
- Full Text
- View/download PDF
399. Authentication of Certificate in E-Learning Using Secret Key Digital Watermarking
- Author
-
Sunil Karforma and Soumendu Banerjee
- Subjects
Authentication ,Digital Watermarking Alliance ,Computer science ,business.industry ,E-learning (theory) ,Internet privacy ,Key (cryptography) ,business ,Certificate ,Computer security ,computer.software_genre ,Digital watermarking ,computer - Published
- 2016
- Full Text
- View/download PDF
400. A novel technique for digital image watermarking in spatial domain
- Author
-
Amit Singh, Anand Mohan, Nomit Sharma, and Mayank Dave
- Subjects
Theoretical computer science ,Digital Watermarking Alliance ,Computer science ,business.industry ,Data_MISCELLANEOUS ,ComputingMilieux_LEGALASPECTSOFCOMPUTING ,Watermark ,Signal ,Copy protection ,Digital image ,Least significant bit ,Frequency domain ,Computer vision ,Artificial intelligence ,business ,Digital watermarking - Abstract
Information technology has eased the duplication, manipulation and distribution of digital data in recent times which has resulted in the demand for safe ownership of digital images. A very crucial concern for the content owners and distributors is copyright protection and content authentication. The solution to these problems is Digital Watermarking. The watermarking is the process of embedding a signal in to other signal robustly and invisibly at the same time, the embedded signal is called watermark and the other signal is called cover or host signal. In this paper we presents a brief overview of digital image watermarking techniques in spatial and frequency domain, proposed a watermarking algorithm in spatial domain by using the Least Significant Bit (LSB) method. Every technique has some advantages and disadvantages but the LSB method is to very good compromise between performance, robustness, computational cost and quality of embedding.
- Published
- 2012
- Full Text
- View/download PDF
Catalog
Discovery Service for Jio Institute Digital Library
For full access to our library's resources, please sign in.