EBookClubs

Read Books & Download eBooks Full Online

EBookClubs

Read Books & Download eBooks Full Online

Book Development of a Robust Blind Digital Video Watermarking Algorithm Using Discrete Wavelet Transform

Download or read book Development of a Robust Blind Digital Video Watermarking Algorithm Using Discrete Wavelet Transform written by Ahmed A. Baha'a Al-Deen and published by . This book was released on 2007 with total page 172 pages. Available in PDF, EPUB and Kindle. Book excerpt: Video watermarking technology enables us to hide an imperceptible, robust, and secure data in digital or analog video. This data can be used for tracking, fingerprinting, copyright infringement detection or any other application that requires some hidden data. Video watermarking can be achieved by either applying still image technologies to each frame of the movie or by using dedicated methods which exploit inherent features of the video sequence. There is a complex trade-off between three requirements in digital watermarking: robustness against noise and attacks, imperceptibility or invisibility, and capacity, which represent the amount of data, i.e., the number of bits encoded by the watermark. However, these three requirements conflict with each other. Increasing the watermark strength makes the system more robust but unfortunately decreases the perceptual quality. Whereas, increasing the capacity of the watermark decreases the robustness.In the production chain, video compression is usually applied before broadcasting or before transferring the video to other devices. In order to be robust against format conversions, the watermark has to be inserted before compression. Therefore, uncompressed video format has been used in the research undertaken. On the other hand, a random key is used to choose the frames to be watermarked to increase the security level of the algorithm and discourage piracy. The aim of this research is to develop a video watermarking algorithm to embed a binary image inside the uncoded video stream that acts as a logo. A mid-band discrete wavelet transform coefficients of the selected frames are chosen to be the hosted region in the frequency domain. An inverse transformation should be taken in order to get the desired watermarked video shot. In extraction process the watermark is extracted from the marked video directly without access to the original video. The experiment results showed that the proposed scheme provides better quality watermarked videos in term of watermark invisibility to human eyes. Results also indicated that obtaining average peak signal to noise ratio (PSNR) equals 41.59dB as compared with 38.48dB in the case of direct embedding. In addition, the scheme is robust against video processing operations, such as MPEG compression which could be successfully recovered. In conclusion, modifying the wavelet coefficients depending only on the logo object's pixels highly improve the invisibility and at the same time providing a good robustness level.

Book Color Image Watermarking

    Book Details:
  • Author : Qingtang Su
  • Publisher : Walter de Gruyter GmbH & Co KG
  • Release : 2016-12-05
  • ISBN : 3110487632
  • Pages : 223 pages

Download or read book Color Image Watermarking written by Qingtang Su and published by Walter de Gruyter GmbH & Co KG. This book was released on 2016-12-05 with total page 223 pages. Available in PDF, EPUB and Kindle. Book excerpt: This book presents watermarking algorithms derived from signal processing methods such as wavelet transform, matrix decomposition and cosine transform to address the limitations of current technologies. For each algorithm, mathematical foundations are explained with analysis conducted to evaluate performances on robotness and efficiency. Combining theories and practice, it is suitable for information security researchers and industrial engineers.

Book Digital Image Watermarking

Download or read book Digital Image Watermarking written by Surekha Borra and published by CRC Press. This book was released on 2018-12-07 with total page 150 pages. Available in PDF, EPUB and Kindle. Book excerpt: The Book presents an overview of newly developed watermarking techniques in various independent and hybrid domains Covers the basics of digital watermarking, its types, domain in which it is implemented and the application of machine learning algorithms onto digital watermarking Reviews hardware implementation of watermarking Discusses optimization problems and solutions in watermarking with a special focus on bio-inspired algorithms Includes a case study along with its MATLAB code and simulation results

Book Intelligent System Design

Download or read book Intelligent System Design written by Suresh Chandra Satapathy and published by Springer Nature. This book was released on 2020-08-10 with total page 865 pages. Available in PDF, EPUB and Kindle. Book excerpt: This book presents a collection of high-quality, peer-reviewed research papers from the 6th International Conference on Information System Design and Intelligent Applications (INDIA 2019), held at Lendi Institute of Engineering & Technology, India, from 1 to 2 November 2019. It covers a wide range of topics in computer science and information technology, including data mining and data warehousing, high-performance computing, parallel and distributed computing, computational intelligence, soft computing, big data, cloud computing, grid computing and cognitive computing.

Book Digital Watermarking and Steganography

Download or read book Digital Watermarking and Steganography written by Frank Y. Shih and published by CRC Press. This book was released on 2017-12-19 with total page 211 pages. Available in PDF, EPUB and Kindle. Book excerpt: Every day millions of people capture, store, transmit, and manipulate digital data. Unfortunately free access digital multimedia communication also provides virtually unprecedented opportunities to pirate copyrighted material. Providing the theoretical background needed to develop and implement advanced techniques and algorithms, Digital Watermarking and Steganography: Demonstrates how to develop and implement methods to guarantee the authenticity of digital media Explains the categorization of digital watermarking techniques based on characteristics as well as applications Presents cutting-edge techniques such as the GA-based breaking algorithm on the frequency-domain steganalytic system The popularity of digital media continues to soar. The theoretical foundation presented within this valuable reference will facilitate the creation on new techniques and algorithms to combat present and potential threats against information security.

Book Using the Discrete Wavelet Transform to Haar d Code a Blind Digital Watermark

Download or read book Using the Discrete Wavelet Transform to Haar d Code a Blind Digital Watermark written by Evelyn Brannock and published by . This book was released on 2009 with total page 198 pages. Available in PDF, EPUB and Kindle. Book excerpt: Safeguarding creative content in a digital form has become increasingly difficult. It is progressively easier to copy, modify and redistribute digital media, which causes great declines in business profits. For example, the International Federation of the Phonographic Industry estimates that in 2001 the worldwide sales of pirated music CDs were 475 million US dollars. While a large amount of time and money is committed to creating intellectual property, legal means have not proven to be sufficient for the protection of this property. Digital watermarking is a steganographic technique that has been proposed as a possible solution to this problem. A digital watermark hides embedded information about the origin, status, owner and/or destination of the data, often without the knowledge of the viewer or user. This dissertation examines a technique for digital watermarking which utilizes properties of the Discrete Wavelet Transform (DWT). Research has been done in this field, but which wavelet family is superior is not adequately addressed. This dissertation studies the influence of the wavelet family when using a blind, nonvisible watermark in digital media. The digital watermarking algorithm uses a database of multiple images with diverse properties. Various watermarks are embedded. Eight different families of wavelets with dissimilar properties are compared. How effective is each wavelet? To objectively measure the success of the algorithm, the influence of the mother wavelet, the imperceptibility of the embedded watermark and the readability of the extracted watermark, the Peak Signal-to-Noise Ratio and the Image Quality Index for each wavelet family and image are obtained. Two common categories of digital watermarking attacks are removing the watermark and rendering the watermark undetectable. To simulate and examine the effect of attacks on the images, noise is added to the image data. Also, to test the effect of reducing an image in size, each image containing the embedded watermark is compressed. The dissertation asks the questions: "Is the wavelet family chosen to implement the algorithm for a blind, nonvisible watermark in digital images of consequence? If so, which family is superior?" This dissertation conclusively shows that the Haar transform is the best for blind, non-visible digital watermarking.

Book A Digital Image Watermarking Technique on Multiple Transform Methods

Download or read book A Digital Image Watermarking Technique on Multiple Transform Methods written by Meekyeong Kim and published by . This book was released on 2017 with total page 60 pages. Available in PDF, EPUB and Kindle. Book excerpt: Copyright protection of digital content has emerged as one of the most pressing issues in the digital content marketplace. Digital watermarking may provide an effective method for identifying the copyright ownership of digital content such as images, audio and video against unauthorized use and distribution. The basic idea of digital watermarking involves embedding or hiding the copyright and ownership information of digital content imperceptibly as a watermark within the content itself. Our study proposes the development of an efficient digital image watermarking algorithm based on a multiple transform method that combines the benefits of the frequency decomposition ability of the discrete wavelet transform (DWT) and the unpredictable random distribution property of the discrete fractional random transform (DFRNT), while using a 2D barcode to improve the algorithm's robustness, imperceptibility, security and extraction performance. As the first step in developing the proposed system, we implement our watermark generation process by adopting a two-dimensional (2D) barcode as an information hiding method and a self-designed block code pattern in order to ensure the extraction performance of watermarks. A generated 2D barcode is then converted through block code encoding and scrambling conversion, which increase the hidden computational complexity of information, thus bolstering the security of the algorithm. The 2D barcode and block code also feature a self-error-correction function that can correct the bit error in the process of extracting watermark. Next, we implement the multiple transform process by adopting the DWT-DFRNT transform method in order to ensure the robustness and security of the watermarking algorithm. A host image is used as the input signal into 2D-DWT and is decomposed into four frequency sub-bands. The generated sub-band's coefficients are used as input data into DFRNT. Using the quantization technique, we then embed the generated watermark image into the DWT-DFRNT transformed image, transforming the quantized signal through the inverse DFRNT (IDFRNT) and the inverse DWT (IDWT) sequentially. Finally, the watermarked image signal is generated as the output. Experimental results present that our proposed algorithm improves extraction performance by accurately extracting the hidden information in the 2D barcode from the detected watermark. The findings also show that combining the dual transform method, DWT and DFRNT, improves the security and robustness of the watermarking algorithm in defending against basic image signal processing and common attacks.

Book Robust and Secured Digital Audio Watermarking

Download or read book Robust and Secured Digital Audio Watermarking written by Krunal N. Patel and published by Springer Nature. This book was released on 2020-10-25 with total page 104 pages. Available in PDF, EPUB and Kindle. Book excerpt: This book discusses digital audio watermarking copyright assurance. The author first outlines the topic of watermarking data that can be used for copyright assurance that incorporates text messages, copyright audio, handwritten text, logo and cell phone numbers. The objective of this book is to propose a new algorithm that can embed and extract the watermarking information. The execution of the newly proposed algorithm is surveyed by testing data utilizing a group of various audio file types and against various attacks. The book also presents a new digital watermark algorithm that preserves the copyright property of the audio files. To do this, the author uses two techniques -- DWT and SVD -- with the combination of other techniques (DFT and DSSS) to enhance security and also provide high robustness and imperceptibility against various malicious attacks.

Book Watermarking Techniques for Copyright Protection of Videos

Download or read book Watermarking Techniques for Copyright Protection of Videos written by Ashish M. Kothari and published by Springer. This book was released on 2018-06-22 with total page 128 pages. Available in PDF, EPUB and Kindle. Book excerpt: The book provides copyright protection approaches for videos using watermarking. The various watermarking techniques using various transforms such as discrete cosine transform (DCT), discrete wavelet transform (DWT) and singular value decomposition (SVD) for videos are presented. The book also provides video watermarking approach using compressive sensing (CS) theory. The presented watermarking techniques are designed and implemented using color digital videos. The performance of the presented techniques is evaluated using Peak Signal to Noise Ratio (PSNR) and Normalized Correlation (NC).

Book Medical Image Watermarking

Download or read book Medical Image Watermarking written by Amit Kumar Singh and published by Springer. This book was released on 2017-08-11 with total page 263 pages. Available in PDF, EPUB and Kindle. Book excerpt: This book presents medical image watermarking techniques and algorithms for telemedicine and other emerging applications. This book emphasizes on medical image watermarking to ensure the authenticity of transmitted medical information. It begins with an introduction of digital watermarking, important characteristics, novel applications, different watermarking attacks and standard benchmark tools. This book also covers spatial and transform domain medical image watermarking techniques and their merits and limitations. The authors have developed improved/novel watermarking techniques for telemedicine applications that offer higher robustness, better perceptual quality and increased embedding capacity and secure watermark. The suggested methods may find potential applications in the prevention of patient identity theft and health data management issues which is a growing concern in telemedicine applications. This book provides a sound platform for understanding the medical image watermarking paradigm for researchers in the field and advanced-level students. Industry professionals working in this field, as well as other emerging applications demanding robust and secure watermarking will find this book useful as a reference.

Book Multimedia Watermarking

    Book Details:
  • Author : Aditya Kumar Sahu
  • Publisher : Springer Nature
  • Release :
  • ISBN : 9819998034
  • Pages : 143 pages

Download or read book Multimedia Watermarking written by Aditya Kumar Sahu and published by Springer Nature. This book was released on with total page 143 pages. Available in PDF, EPUB and Kindle. Book excerpt:

Book ICDSMLA 2020

Download or read book ICDSMLA 2020 written by Amit Kumar and published by Springer Nature. This book was released on 2021-11-08 with total page 1600 pages. Available in PDF, EPUB and Kindle. Book excerpt: This book gathers selected high-impact articles from the 2nd International Conference on Data Science, Machine Learning & Applications 2020. It highlights the latest developments in the areas of artificial intelligence, machine learning, soft computing, human–computer interaction and various data science and machine learning applications. It brings together scientists and researchers from different universities and industries around the world to showcase a broad range of perspectives, practices and technical expertise.

Book Multimedia Security  Steganography and Digital Watermarking Techniques for Protection of Intellectual Property

Download or read book Multimedia Security Steganography and Digital Watermarking Techniques for Protection of Intellectual Property written by Lu, Chun-Shien and published by IGI Global. This book was released on 2004-07-31 with total page 268 pages. Available in PDF, EPUB and Kindle. Book excerpt: Multimedia security has become a major research topic, yielding numerous academic papers in addition to many watermarking-related companies. In this emerging area, there are many challenging research issues that deserve sustained study towards an effective and practical system. This book explores the myriad of issues regarding multimedia security, including perceptual fidelity analysis, image, audio, and 3D mesh object watermarking, medical watermarking, error detection (authentication) and concealment, fingerprinting, digital signature and digital right management.

Book Combined Robust and Fragile Watermarking Algorithms for Still Images

Download or read book Combined Robust and Fragile Watermarking Algorithms for Still Images written by Taha Dawood Jassim and published by . This book was released on 2014 with total page 0 pages. Available in PDF, EPUB and Kindle. Book excerpt:

Book Combined Robust and Fragile Watermarking Algorithms for Still Images

Download or read book Combined Robust and Fragile Watermarking Algorithms for Still Images written by Taha Dawood Jassim and published by . This book was released on 2014 with total page pages. Available in PDF, EPUB and Kindle. Book excerpt:

Book Digital Watermarking

Download or read book Digital Watermarking written by Ton Kalker and published by Springer. This book was released on 2004-02-12 with total page 614 pages. Available in PDF, EPUB and Kindle. Book excerpt: We are happy to present to you the proceedings of the 2nd International Workshop on Digital Watermarking, IWDW 2003. Since its modern re-appearance in the academic community in the early 1990s, great progress has been made in understanding both the capabilities and the weaknesses of digital watermarking. On the theoretical side, we all are now well aware of the fact that digital waterma- ing is best viewed as a form of communication using side information. In the case of digital watermarking the side information in question is the document to be wat- marked. This insight has led to a better understanding of the limits of the capacity and robustness of digital watermarking algorithms. It has also led to new and improved watermarking algorithms, both in terms of capacity and imperceptibility. Similarly, the role of human perception, and models thereof, has been greatly enhanced in the study and design of digital watermarking algorithms and systems. On the practical side, applications of watermarking are not yet abundant. The original euphoria on the role of digital watermarking in copy protection and copyright prot- tion has not resulted in widespread usage in practical systems. With hindsight, a n- ber of reasons can be given for this lack of practical applications.

Book Lossless Information Hiding in Images

Download or read book Lossless Information Hiding in Images written by Zhe-Ming Lu and published by Syngress. This book was released on 2016-11-14 with total page 434 pages. Available in PDF, EPUB and Kindle. Book excerpt: Lossless Information Hiding in Images introduces many state-of-the-art lossless hiding schemes, most of which come from the authors' publications in the past five years. After reading this book, readers will be able to immediately grasp the status, the typical algorithms, and the trend of the field of lossless information hiding. Lossless information hiding is a technique that enables images to be authenticated and then restored to their original forms by removing the watermark and replacing overridden images. This book focuses on the lossless information hiding in our most popular media, images, classifying them in three categories, i.e., spatial domain based, transform domain based, and compressed domain based. Furthermore, the compressed domain based methods are classified into VQ based, BTC based, and JPEG/JPEG2000 based. Focuses specifically on lossless information hiding for images Covers the most common visual medium, images, and the most common compression schemes, JPEG and JPEG 2000 Includes recent state-of-the-art techniques in the field of lossless image watermarking Presents many lossless hiding schemes, most of which come from the authors' publications in the past five years