Loading...
Search for: digital-watermarking
0.005 seconds
Total 55 records

    Color PCA eigenimages and their application to compression and watermarking

    , Article Image and Vision Computing ; Volume 26, Issue 7 , 2008 , Pages 878-890 ; 02628856 (ISSN) Abadpour, A ; Kasaei, S ; Sharif University of Technology
    Elsevier Ltd  2008
    Abstract
    From the birth of multi-spectral imaging techniques, there has been a tendency to consider and process this new type of data as a set of parallel gray-scale images, instead of an ensemble of an n-D realization. However, it has been proved that using vector-based tools leads to a more appropriate understanding of color images and thus more efficient algorithms for processing them. Such tools are able to take into consideration the high correlation of the color components and thus to successfully carry out energy compaction. In this paper, a novel method is proposed to utilize the principal component analysis in the neighborhoods of an image in order to extract the corresponding eigenimages.... 

    A new method for steganography in html files

    , Article Int. Conf. on Industrial Electronics, Technology and Automation, IETA 2005, Int. Conf. on Telecommunications and Networking, TeNe 2005, and the Int. Conf. on Engineering Education, Instructional Technology, Assessment, and E-Learning, EIAE 2005 ; 2006 , Pages 247-251 ; 140205260X (ISBN); 9781402052606 (ISBN) Shahreza, M. S ; Sharif University of Technology
    Kluwer Academic Publishers  2006
    Abstract
    In line with the expansion of the Internet, the issue of information security has gained special importance. Many methods have been provided in order to establish hidden communications. In the meanwhile, steganography is one of a relatively new method. A method is introduced in this paper for exchanging information by steganography on HTML pages. The main idea in this method is to hide coded data in the ID attribute of the HTML document tags. Since numerous HTML pages are on the web, this method can be widely used. The suggested method is implemented by using the Java language. © 2006 Springer  

    Towards energy optimization of transparent watermarks using entropy masking

    , Article IASTED International Conference on Internet and Multimedia Systems and Applications, EuroIMSA 2005, Grindelwald, 21 February 2005 through 23 February 2005 ; 2005 , Pages 259-264 ; 0889864861 (ISBN) Haghighi, M. S ; Ghaemmaghami, S ; Hamza M. H ; Sharif University of Technology
    2005
    Abstract
    An invisible image watermarking scheme tends to insert the mark in a transparent manner, with the highest possible energy. Several watermarking algorithms use human visual models as perceptual masks to maximize the power of watermark. We take advantage of inhibitory and excitatory characteristics of eye receptors which yield an extra capacity, for amplifying watermark power, while still satisfying imperceptibility constraint. Spatial-domain image entropy is used as a measure of strength of inhibitory effect. The principle of our idea is based on the decomposition of mark sequence into two parts, corresponding to two complementary sets of pixels in spatial-domain. These sets are determined... 

    Watermarking of still images in wavelet domain based on entropy masking model

    , Article TENCON 2005 - 2005 IEEE Region 10 Conference, Melbourne, 21 November 2005 through 24 November 2005 ; Volume 2007 , 2005 ; 21593442 (ISSN); 0780393112 (ISBN); 9780780393110 (ISBN) Akhbari, B ; Ghaemmaghami, S ; Sharif University of Technology
    Institute of Electrical and Electronics Engineers Inc  2005
    Abstract
    A new robust image adaptive digital watermarking algorithm in wavelet transform domain is proposed in this paper. The proposed method exploits Human Visual System (HVS) characteristics and entropy masking concept to determine image adaptive thresholds for selection of perceptually significant coefficients. The mark is embedded in the coefficients of all subbands including the LL subband. Experimental results show that the proposed method significantly improves watermarking performance over conventional methods, in the terms of invisibility and robustness  

    A new watermarking algorithm based on human visual system for content integrity verification of region of interest

    , Article Computing and Informatics ; Volume 31, Issue 4 , 2012 , Pages 877-899 ; 13359150 (ISSN) Fatemizadeh, E ; Maneshi, M ; Sharif University of Technology
    2012
    Abstract
    This paper proposes a semi-fragile, robust-to-JPEG2000 compression watermarking method which is based on the Human Visual System (HVS). This method is designed to verify the content integrity of Region of Interest (ROI) in tele-radiology images. The design of watermarking systems based on HVS leads to the possibility of embedding watermarks in places that are not obvious to the human eye. In this way, notwithstanding increased capacity and robustness, it becomes possible to hide more watermarks. Based on perceptual model of HVS, we propose a new watermarking scheme that embeds the watermarks using a replacement method. Thus, the proposed method not only detects the watermarks but also... 

    EWA: An exemplar-based watermarking attack

    , Article 2011 International Conference on Information Technology and Multimedia: "Ubiquitous ICT for Sustainable and Green Living", ICIM 2011, 14 November 2011 through 16 November 2011 ; Nov , 2011 , Page(s): 1 - 5 ; 9781457709890 (ISBN) Taherinia, A. H ; Jamzad, M ; Sharif University of Technology
    2011
    Abstract
    In this paper, we used image inpainting as a means for reconstruction of small damaged portions of a watermarked image so that the hidden watermark is not detectable afterwards. Our new watermarking attack algorithm extends the exemplar-based inpainting method, and then we apply it to intended noisy watermarked images to alter the watermark detection process. Our approach is completely free from any pre-assumption on the watermarking algorithm or any other parameters that is used during the watermark embedding procedure. The average PSNR/SSIM of the watermarked image after applying the proposed attack is more than 35/0.98 and the average NC for extracted watermark is lowers than 0.5, so... 

    Framework for robust blind image watermarking based on classification of attacks

    , Article Multimedia Tools and Applications ; 2016 , Pages 1-21 ; 13807501 (ISSN) Heidari, M ; Samavi, S ; Soroushmehr, S. M. R ; Shirani, S ; Karimi, N ; Najarian, K ; Sharif University of Technology
    Springer New York LLC  2016
    Abstract
    With the widespread internet usage, digital contents are easily distributed throughout the world. To eliminate concerns of producers and owners of digital contents, watermarking techniques are extensively being used. Robustness against intentional and unintentional attacks is a major quality of watermarking systems. Since different attacks tend to target different parts of the frequency spectrum, in this paper we propose a framework for blind watermarking which determines the type of attack that the image has gone through before extracting the watermark. Within this framework, we propose an attack classification method to identify the region of the frequency spectrum that is less damaged.... 

    An algorithm for modeling print and scan operations used for watermarking

    , Article Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), 10 November 2008 through 12 November 2008 ; Volume 5450 LNCS , 2009 , Pages 254-265 ; 03029743 (ISSN) ; 3642044379 (ISBN); 9783642044373 (ISBN) Amiri, S.H ; Jamzad, M ; Sharif University of Technology
    Abstract
    Watermarking is a suitable approach for digital image authentication. Robustness regarding attacks that aim to remove the watermark is one of the most important challenges in watermarking, in general. Several different attacks are reported that aim to make it difficult or impossible for the real owner of the digital watermarked image to extract the watermark. Some of such common attacks are noise addition, compression, scaling, rotation, clipping, cropping, etc. In this paper we address the issue of print and scan attack by introducing a method to model the scanner and printer. Then we will simulate the print and scan attack on the digital images to evaluate its robustness. In addition, we... 

    Framework for robust blind image watermarking based on classification of attacks

    , Article Multimedia Tools and Applications ; Volume 76, Issue 22 , 2017 , Pages 23459-23479 ; 13807501 (ISSN) Heidari, M ; Samavi, S ; Soroushmehr, S. M. R ; Shirani, S ; Karimi, N ; Najarian, K ; Sharif University of Technology
    Abstract
    With the widespread internet usage, digital contents are easily distributed throughout the world. To eliminate concerns of producers and owners of digital contents, watermarking techniques are extensively being used. Robustness against intentional and unintentional attacks is a major quality of watermarking systems. Since different attacks tend to target different parts of the frequency spectrum, in this paper we propose a framework for blind watermarking which determines the type of attack that the image has gone through before extracting the watermark. Within this framework, we propose an attack classification method to identify the region of the frequency spectrum that is less damaged.... 

    A robust image watermarking method in wavelet domain using genetic algorithm

    , Article Proceedings - International Conference on Availability, Reliability and Security, ARES 2009, 16 March 2009 through 19 March 2009, Fukuoka, Fukuoka Prefecture ; 2009 , Pages 612-617 ; 9780769535647 (ISBN) Amiri, H ; Jamzad, M ; Sharif University of Technology
    2009
    Abstract
    Robustness against attacks is an important requirement in image watermarking. This paper presents a robust watermarking algorithm in wavelet transform domain. Firstly, original image is decomposed into its subbands using three level wavelet transform, then, significant coefficients with the same position in HL, LH and HH subbands of the last level are extracted to make a triplet. To embed a watermark bit into a triplet, the standard deviation of triplet coefficients magnitude is set to zero for zero bit or increased for a one bit. Three constant are used to increase the standard deviations of a triplet coefficients. The value of these constants affects the robustness of algorithm and the... 

    Improvement to a semi-fragile watermarking scheme against a proposed counterfeiting attack

    , Article 11th International Conference on Advanced Communication Technology, ICACT 2009, Phoenix Park, 15 February 2009 through 18 February 2009 ; Volume 3 , 2009 , Pages 1928-1932 ; 17389445 (ISSN); 9788955191387 (ISBN) Kourkchi, H ; Ghaemmaghami, S ; Sharif University of Technology
    2009
    Abstract
    One of the main properties of digital watermarking methods is their security against attacks. In this paper, a novel attack against an adaptive semi-fragile image watermarking is proposed. In this attack, watermarking key and watermark are estimated by using several watermarked images. In order to improve the watermarking scheme against the proposed attack, the entropy of image blocks is utilized. Using entropy is compatible with Human Visual System (HVS); therefore it is suitable to determine the weight of watermark in image blocks. Since entropy is a sensitive feature, it is used to improve the watermarking method performance against the proposed attack. It is shown that this modification... 

    A collusion-resistant video watermarking scheme

    , Article 8th International Workshop on Information Hiding, IH 2006, Alexandria, VA, 10 June 2006 through 12 June 2006 ; Volume 4437 LNCS , 2007 , Pages 343-354 ; 03029743 (ISSN); 9783540741237 (ISBN) Houmansadr, A ; Ghaemmaghami, S ; Sharif University of Technology
    Springer Verlag  2007
    Abstract
    A video watermarking scheme is proposed in this paper using the concept of the secret sharing scheme. The owner's mark is split into twin shares, where the shares are inserted into the video frames in the spatial domain in a simple manner. The detection algorithm uses a linear function applied to the twin shares to reconstruct the secret. This makes the watermarked video sequence robust against pirate attacks, such as frame averaging and frame swapping. Due to the compatibility of the exploited secret sharing scheme to geometrical distortions, the watermarking system is also robust to this kind of processing schemes. On account of insertion of various marks into different frames, which are... 

    Audio watermarking for covert communication through telephone system

    , Article 6th IEEE International Symposium on Signal Processing and Information Technology, ISSPIT 2006, Vancouver, BC, 27 August 2006 through 30 August 2006 ; 2006 , Pages 955-959 ; 0780397541 (ISBN); 9780780397545 (ISBN) Tavakoli, E ; Vosoughi Vahdat, B ; Shamsollahi, M. B ; Sameni, R ; Sharif University of Technology
    Institute of Electrical and Electronics Engineers Inc  2006
    Abstract
    In this paper, a novel service that uses audio watermarking for covert communication through telephone system is presented. This system is suitable for ISDN and PSIN networks and it can be modified for using in mobile systems. We use a Direct sequence spread spectrum algorithem with perceptual modeling of HAS for embedding watermark into the audio or speed signals. The watermark is robust against telephone channel attacks such as AWGN , Low pass filtering, D/A-A/D conversion, Downsampling down to 64 slips and A-Law or μ-Law conversion. This system is also robust against audio format conversion such as wave (windows PCM) format to mp3 (down o 64 kbps compression. © 2006 IEEE  

    A new method for real-time steganography

    , Article 8th International Conference on Signal Processing, ICSP 2006, Guilin, 16 November 2006 through 20 November 2006 ; Volume 4 , 2006 ; 0780397371 (ISBN); 9780780397378 (ISBN) Shirali Shahreza, M ; Sharif University of Technology
    Institute of Electrical and Electronics Engineers Inc  2006
    Abstract
    The hidden, real-time sending and display of information, esp. in public places, has since long received attention and faced many challenges. Therefore, different methods have been proposed so far for hiding information in different cover media. In this paper I propose a new method for the real-time hiding of information without need to any storage cover media. This method is based on the real-time hiding of information in output screens of the instrument (such as screens shown by the monitor). This method of steganography is very similar to the two discussions of image steganography and video steganography. The idea suggested in this paper was simulated on a PC computer by using the Pascal... 

    Achieving higher perceptual quality and robustness in watermarking using Julian set patterns

    , Article IEE Proceedings: Information Security ; Volume 153, Issue 4 , 2006 , Pages 167-172 ; 17470722 (ISSN) Yaghmaee, F ; Jamzad, M ; Sharif University of Technology
    2006
    Abstract
    Some of the most important classes of watermark detection methods in image watermarking are correlation-based algorithms. In these methods usually a pseudorandom noise pattern is embedded in the host image. The receiver can regenerate this pattern by having a key that is the seed of a random number generator. After that if the correlation between this pattern and the image that is assumed to have the watermark is higher than a predefined threshold, it means that the watermark exists and vice versa. Here, we show the advantage of using the Julian set patterns as a watermark, instead of the commonly used pseudorandom noise pattern. Julian set patterns can be regenerated in receiver with few... 

    A novel video watermarking method using visual cryptography

    , Article IEEE International Conference on Engineering of Intelligent Systems, ICEIS 2006, Islamabad, 22 April 2006 through 23 April 2006 ; 2006 ; 1424404568 (ISBN); 9781424404568 (ISBN) Houmansadr, A ; Ghaemmaghami, S ; Sharif University of Technology
    2006
    Abstract
    In this paper we propose a novel approach to insertion of watermark in the video sequences. The proposed scheme is based on visual cryptography and performs temporal scrambling for watermark embedding. Watermark, which may be a visible logo, is frequently split and inserted into video frames. Watermark detection can be verified by the human eye. Inserted watermark is expected to resist collusion attack, which is a major concern in video watermarking. Experimental results show that the proposed method provides a high resilience against some non-hostile video processing schemes, such as geometrical distortions. © 2006 IEEE  

    A hierarchical approach to SVD-based fragile watermarking for image authentication

    , Article 2005 Fifth International Conference on Information, Communications and Signal Processing, Bangkok, 6 December 2005 through 9 December 2005 ; Volume 2005 , 2005 , Pages 870-876 ; 0780392833 (ISBN); 9780780392830 (ISBN) Taheri, S ; Ghaemmaghami, S ; Sharif University of Technology
    2005
    Abstract
    One of the main properties of fragile watermarking schemes is to indicate the location of changes made to the image, i.e. tamper localization, In addition to detection of watermarked image modifications. In this paper, the localization property Is added to the SVD(Singular Value Decomposition) based fragile watermarking scheme proposed by Byun et al. To do this, a hierarchical watermarking structure is used, where the Image is partitioned into blocks In a multilevel hierarchy, and then the SVD-based algorithm Is employed at each level to Insert authenticating data In sub-blocks. In the verification process, blocks at the lowest hierarchical level can detect modifications made to the... 

    Computing watermark capacity in images according to their quad tree

    , Article 5th IEEE International Symposium on Signal Processing and Information Technology, Athens, 18 December 2005 through 21 December 2005 ; Volume 2005 , 2005 , Pages 823-826 Yaghmaee, F ; Jamzad, M ; Sharif University of Technology
    2005
    Abstract
    Determining the capacity of watermark for images is a complex task. This capacity may be influenced by many factors such as the content of image and also the strength of watermark. In some recent works the image content has been considered for calculation of watermark capacity. One such approach is to use the Noise Visibility Function (NVF) introduced in [3]. In this paper we introduced a new method for finding NVF according to the quad tree representation of image instead of using pixel neighborhood data. Our experimental results showed that the depth of a pixel in image quad tree represents much information about the pixel and its maximum allowable distortion compared to pixel neighborhood... 

    Using julian set patterns for higher robustness in correlation based watermarking methods

    , Article 5th IEEE International Symposium on Signal Processing and Information Technology, Athens, 18 December 2005 through 21 December 2005 ; Volume 2005 , 2005 , Pages 358-362 Yaghmaee, F ; Jamzad, M ; Sharif University of Technology
    2005
    Abstract
    Some of the most important classes of watermark detection methods in image watermarking are correlation based algorithms. In these methods usually a pseudorandom pattern is embedded in host image. Receiver can regenerate this pattern by having a key that is the seed of a random number generator. After that if the correlation between this pattern and the image that is assumed to have the watermark is higher than a predefined threshold, this means that the watermark exists and vise versa. In this paper we showed the advantage of using the Julian set patterns as a watermark, instead of commonly used pseudorandom noisy pattern. Julian set patterns can be regenerate in receiver with few... 

    Robustness enhancement of content-based watermarks using entropy masking effect

    , Article 4th International Workshop on Digital Watermarking, IWDW 2005, Siena, 15 September 2005 through 17 September 2005 ; Volume 3710 LNCS , 2005 , Pages 444-458 ; 03029743 (ISSN); 354028768X (ISBN); 9783540287681 (ISBN) Sadr, A. H ; Ghaemmaghami, S ; Sharif University of Technology
    2005
    Abstract
    Image-Adaptive watermarking systems exploit visual models to adapt the watermark to local properties of the host image. This leads to a watermark power enhancement, hence an improved resilience against different attacks, while keeping the mark imperceptible. Visual models consider different properties of the human visual system, such as frequency sensitivity, luminance sensitivity and contrast masking. Entropy masking is another human visual system's characteristic, which rarely has been addressed in visual models. In this paper we have utilized this masking effect to improve the robustness of Image-Adaptive watermarks while keeping their transparency. Experimental results show a significant...