Spelling suggestions: "subject:"watermark"" "subject:"atermark""
1 |
Watermark-removal method based on Eigen-image energyHsu, Te-Cheng 29 June 2012 (has links)
Most watermark-removal methods treat watermarks as noise and apply denoising approaches to remove them. However, denoising methods remove not only this watermark energy, but also some of the energy of the original image. A trade-off therefore exists: if not enough of the watermark energy is removed, then the watermark will still be detected, but if too much is removed, the image quality will be noticeably poor.
To solve this problem, the relationship among the energies of the original image, the watermark and the watermarked image is initially determined using stochastic models. Then, the energy of the watermark is estimated using just-noticeable-distortion (JND). Finally, the watermark energy is removed from the watermarked image based on the energy distribution of its Eigen-images.
The experimental results show that the proposed approach yields a mean peak signal-to-noise ratio (PSNR) of the predicted images that is 2.2dB higher than that obtained using the adaptive Wiener filter, and a mean normalized correlation (NC) value of the extracted watermarks that is 0.27 lower than that obtained using the adaptive Wiener filter. In removing watermark energy from 100 randomly selected watermarked images in which watermarks were embedded using the ¡¥Broken Arrows (BA)¡¦ algorithm proposed for the second Breaking Our Watermarking System (BOWS-2) contest, the mean PSNR of 100 predicted images is 24.1dB and the proposed approach successfully removed watermarks from 90 of these images. This result exceeds the minimum requirement of PSNR 20dB for the BOWS-2 contest. Clearly, the proposed approach is a very effective watermark-removal approach for removing watermarks.
|
2 |
Occurrence of Erwinia Salicis in cricket-bat willow (Salix alba var caerulea)Davis, Jacqueline M. L. January 1995 (has links)
No description available.
|
3 |
Error Detection and Correction for H.264/AVC Using Hybrid WatermarkingYou, Yuan-syun 19 July 2007 (has links)
none
|
4 |
Eigen-Image-Based Watermarking AttackLu, Yi-chun 01 July 2006 (has links)
The rapid development of Internet introduces a new set of challenging problem regarding security. To prevent unauthorized copying of digital production from distributing is one of the significant problems. Digital watermarking is a potential method for protecting the ownership rights on digital audio, image and video data. An attack succeeds in defeating a watermarked article if it impairs the watermarking information beyond acceptable limits while maintaining the perceptual quality of the attacked article. Namely, attacks on digital watermarked article must consider both watermarking information survival and the distortion of the attacked stego-media.
Current attack benchmarks do not exploit as much knowledge of the watermarked image as possible, also they do not consider the distortion of the attacked stego-media. In this paper, various attacks on digital watermarking have been investigated, and a categorization of different attacks was roughly given; Besides, an Eigen-image-based (ED-based) attack is proposed to deliberately impair the watermarking information without excessively distorting the attacked stego-media, that is not currently included in those benchmark tools.
|
5 |
Digital Watermarking with Progressive DetectionChang, Kai-Hsiang 08 August 2000 (has links)
In this thesis, we proposed two frequency-based
watermarking algorithms. One is DCT-based method.
Embedding watermark in the multi-areas and multi-
frequency bands to ensure we can get a less
distorted watermark sequence under unintentional
circumstance. The other is DWT-based method. The
parent-children relationship and the feature of
bit-plane coding in the EZW algorithm are
exploited to embed watermark. It makes that we
can know the watermark exist or not in the
progressive transmission system. The experimental
results show that the proposed methods both can
resist unintentional attacks. The DWT-based
method also has a better progressive detection
capability.
|
6 |
Digital image watermarking methods for copyright protection and authenticationWoo, Chaw-Seng January 2007 (has links)
The ease of digital media modification and dissemination necessitates content protection beyond encryption. Information hidden as digital watermarks in multimedia enables protection mechanism in decrypted contents. The aims of this research are three-fold: (i) to investigate the strength and limitations of current watermarking schemes, (ii) to design and develop new schemes to overcome the limitations, and (iii) to evaluate the new schemes using application scenarios of copyright protection, tamper detection and authentication. We focus on geometrically robust watermarking and semi-fragile watermarking for digital images. Additionally, hybrid schemes that combine the strength of both robust and semi-fragile watermarks are studied. Robust watermarks are well suited for copyright protection because they stay intact with the image under various manipulations. We investigated two major approaches of robust watermarking. In the synchronization approach, we employed motion estimation for watermark resynchronization. We also developed a novel watermark resynchronization method that has low computational cost using scale normalization and flowline curvature. In another approach, we firstly analyzed and improved a blind watermark detection method. The new method reduces significantly the computational cost of its watermark embedding. Secondly, we created a geometric invariant domain using a combination of transforms, and adapted the blind watermark detection method that we improved. It totally eliminates the need of resynchronization in watermark detection, which is a very desirable achievement that can hardly be found in existing schemes. On the other hand, semi-fragile watermarks are good at content authentication because they can differentiate minor image enhancements from major manipulations. New capabilities of semi-fragile watermarks are identified. Then, we developed a semi-fragile watermarking method in wavelet domain that offers content authentication and tamper localization. Unlike others, our scheme overcomes a major challenge called cropping attack and provides approximate content recovery without resorting to an original image. Hybrid schemes combine robust and semi-fragile watermarks to offer deductive information in digital media forensics. We firstly carried out a pilot study by combining robust and fragile watermarks. Then, we performed a comparative analysis on two implementation methods of a hybrid watermarking scheme. The first method has the robust watermark and the fragile watermark overlapped while the second method uses non-overlapping robust and fragile watermarks. Based on the results of the comparative analysis, we merge our geometric invariant domain with our semi-fragile watermark to produce a hybrid scheme. This hybrid scheme fulfilled the copyright protection, tamper detection, and content authentication objectives when evaluated in an investigation scenario.
|
7 |
Data Hiding Technique based on Fractal Orthonormal BasisTsai, Kuen-long 13 October 2005 (has links)
Digital multimedia can be distributed via the internet efficiently with superior compression technologies. The chance of distributing digital intellectual properties, such as image, music, films, and software, being large-scale unauthorized copied and distributed are much increasing one possible and practical solution for the copyright protection is information hiding technology. Information hiding technology embeds a special data into multimedia data for copyright protection. However, the embedded data may be damaged by malicious attacks or common signal processing.
In this thesis, an information hiding technique based on Fractal Orthonormal Basis is proposed. First, the original image is divided into NxN Range blocks, each range block is substituted by several Domain blocks (Fractal Orthonormal Basis), then the watermark information is embedded into the coefficients of the fractal orthonormal basis.
Besides, our technique will be compare with the other two watermarking algorithm (using DCT and DWT). After the attacks of cropping, down-scaling, median filter, smoothing, noise, JPEG, SPIHT and EZW compression, the Fractal Orthonormal Basis watermarking technique shows better result of capacity, transparency and robustness. In addition, we only store parts of compression fractal codes and the permutation seed, and these can be the secret key for the security.
|
8 |
VLSI Design and Implementation of Embedded Zerotree Wavelet Image CODEC with Digital WatermarkingTai, Yu-Chin 07 August 2000 (has links)
The paper proposes that Embedded Zreotree Wavelet
algorithm and the architecture of the modified
EZW algorithm will have the property of regularity,
modularity ,and scalablity, and also posses the
function , which can allow a detected watermark
to be embedded. The methods to realize the
algorithm and the function of watermark are to
analyze the theory of algorithm and the order
of output and input data and then to use queue
and stack, the unit of memory, and the control
of circuit.
The modified EZW architecture needs a half less
memory units than the original one, and functions
nearly as effective as the original architecture.
Besides, this paper points out that the whole
architecture of the transform CODEC system can
be applied properly to HDTV, MPEG-4 system, or
QoS network.
|
9 |
Robust logo watermarkingBarr, Mohammad January 2018 (has links)
Digital image watermarking is used to protect the copyright of digital images. In this thesis, a novel blind logo image watermarking technique for RGB images is proposed. The proposed technique exploits the error correction capabilities of the Human Visual System (HVS). It embeds two different watermarks in the wavelet/multiwavelet domains. The two watermarks are embedded in different sub-bands, are orthogonal, and serve different purposes. One is a high capacity multi-bit watermark used to embed the logo, and the other is a 1-bit watermark which is used for the detection and reversal of geometrical attacks. The two watermarks are both embedded using a spread spectrum approach, based on a pseudo-random noise (PN) sequence and a unique secret key. Robustness against geometric attacks such as Rotation, Scaling, and Translation (RST) is achieved by embedding the 1-bit watermark in the Wavelet Transform Modulus Maxima (WTMM) coefficients of the wavelet transform. Unlike normal wavelet coefficients, WTMM coefficients are shift invariant, and this important property is used to facilitate the detection and reversal of RST attacks. The experimental results show that the proposed watermarking technique has better distortion parameter detection capabilities, and compares favourably against existing techniques in terms of robustness against geometrical attacks such as rotation, scaling, and translation.
|
10 |
Secure and Robust Compressed-Domain Video Watermarking for H.264Noorkami, Maneli 05 June 2007 (has links)
The objective of this thesis is to present a robust watermarking algorithm for H.264 and to address challenges in compressed-domain video watermarking. To embed a perceptually invisible watermark in highly compressed H.264 video, we use a human visual model. We extend Watson's human visual model developed for 8x8 DCT block to the 4x4 block used in H.264. In addition, we use P-frames to increase the watermark payload. The challenge in embedding the watermark in P-frames is that the video bit rate can increase significantly. By using the structure of the encoder, we significantly reduce the increase in video bit rate due to watermarking. Our method also exploits both temporal and texture
masking.
We build a theoretical framework for watermark detection using a likelihood ratio test. This framework is used to develop two different video watermark detection algorithms; one detects the watermark only from watermarked coefficients and one detects the watermark from all the ac coefficients in the video. These algorithms can be used in different video watermark detection applications where the detector knows and does not know the precise location of watermarked coefficients. Both watermark detection schemes obtain video watermark detection with controllable detection performance. Furthermore, control of the detector's performance lies completely with the detector and does not place any burden on the watermark embedding system. Therefore, if the video has been attacked, the detector can maintain the same detection performance by using more frames to obtain its detection response. This is not the case with images, since there is a limited number of coefficients that can be watermarked in each image before the watermark is visible.
|
Page generated in 0.0609 seconds