Search results for " Watermark"

showing 10 items of 21 documents

Watermarking for ontologies

2011

In this paper, we study watermarking methods to prove the ownership of an ontology. Different from existing approaches, we propose to watermark not by altering existing statements, but by removing them. Thereby, our approach does not introduce false statements into the ontology. We show how ownership of ontologies can be established with provably tight probability bounds, even if only parts of the ontology are being re-used. We finally demonstrate the viability of our approach on real-world ontologies.

021110 strategic defence & security studiesInformation retrievalOpen worldComputer scienceOntology-based data integrationProcess ontologyData_MISCELLANEOUS0211 other engineering and technologiesWatermark02 engineering and technologyOntology (information science)computer.software_genre020204 information systems0202 electrical engineering electronic engineering information engineeringData miningDigital watermarkingSecurity parametercomputerISWC 2011: Proceedings of the 10th International Semantic Web Conference
researchProduct

FLUMO: FLexible Underwater MOdem

2019

The last years have seen a growing interest in underwater acoustic communications because of its applications in marine research, oceanography, marine commercial operations, the offshore oil industry and defense. High-speed communication in the underwater acoustic channel has been challenging because of limited bandwidth, extended multipath, refractive properties of the medium, severe fading, rapid time variation and large Doppler shifts. In this paper, we show an implementation of a flexible Software-Defined Acoustic (SDA) underwater modem, where modulation parameters are completely tunable to optimize performance. In particular, we develop the system architecture following two key ideas. …

extended multipathSDAOrthogonal frequency-division multiplexingComputer sciencemarine commercial operationsUnderwater; acoustic ; software defined ; modem; JANUS; SDA; FSK; RedPitaya; WatermarkSettore ING-INF/01 - ElettronicaacousticFSKmodulate signalsDemodulationcontrolled testbedsUnderwaterunderwater acoustic channelOFDMFrequency-shift keyingFLUMOunderwater acoustic communicationsBandwidth (signal processing)Frequency shift keyingflexible Software-Definedoffshore oil industrysoftware definedRedPitayaflexible underwater MOdemmodulated signalsmodulation parameterstunable systemrefractive propertiesMultipath propagationStandardssystem architectureDoppler shiftsunderwater acoustic communicationhigh-speed communicationflexible systemElectronic engineeringDoppler shiftFadingoceanographymodemSettore ING-INF/03 - Telecomunicazionirapid time variationField programmable gate arraysmarine researchmodemsJANUSWatermarkSystems architectureUnderwater
researchProduct

A Digital Watermarking Algorithm Based on Quantization of the DCT: Application on Medical Imaging

2013

International audience; The objective of this paper is to elaborate a new watermarking algorithm applied to the medical imaging. This algorithm must be invisible, robust and has a rate, relatively high, integrating data. The proposed method uses the standard JPEG compression for the integration of medical data. The insertion block is inserted just after the quantization phase. To control identification and eventually the correction (if possible) of the inserted data, we use a series of turbocodes to recover the inserted data, after application of several attacks. The simulation studies are applied on MRI medicals images.

business.industry[INFO.INFO-TI] Computer Science [cs]/Image Processing [eess.IV][INFO.INFO-TI]Computer Science [cs]/Image Processing [eess.IV][ INFO.INFO-TI ] Computer Science [cs]/Image ProcessingMedical imagingJpeg compressionDiscrete cosine transformTurbo codeComputer visionArtificial intelligencebusinessQuantization (image processing)Digital watermarkingAlgorithmTransform codingData compressionMathematics
researchProduct

Blind Robust 3-D Mesh Watermarking Based on Mesh Saliency and QIM Quantization for Copyright Protection

2019

International audience; Due to the recent demand of 3-D models in several applications like medical imaging, video games, among others, the necessity of implementing 3-D mesh watermarking schemes aiming to protect copyright has increased considerably. The majority of robust 3-D watermark-ing techniques have essentially focused on the robustness against attacks while the imperceptibility of these techniques is still a real issue. In this context, a blind robust 3-D mesh watermarking method based on mesh saliency and Quantization Index Modulation (QIM) for Copyright protection is proposed. The watermark is embedded by quantifying the vertex norms of the 3-D mesh using QIM scheme since it offe…

business.industryComputer scienceWatermark robustness[INFO.INFO-TS] Computer Science [cs]/Signal and Image ProcessingData_MISCELLANEOUS[INFO.INFO-CV]Computer Science [cs]/Computer Vision and Pattern Recognition [cs.CV]020207 software engineeringQuantization index modulationWatermark02 engineering and technologyVertex (geometry)[INFO.INFO-TS]Computer Science [cs]/Signal and Image Processing0202 electrical engineering electronic engineering information engineering020201 artificial intelligence & image processingComputer visionArtificial intelligencebusinessQuantization (image processing)Digital watermarkingSmoothingComputingMilieux_MISCELLANEOUS
researchProduct

Ownership protection of plenoptic images by robust and reversible watermarking

2018

Abstract Plenoptic images are highly demanded for 3D representation of broad scenes. Contrary to the images captured by conventional cameras, plenoptic images carry a considerable amount of angular information, which is very appealing for 3D reconstruction and display of the scene. Plenoptic images are gaining increasing importance in areas like medical imaging, manufacturing control, metrology, or even entertainment business. Thus, the adaptation and refinement of watermarking techniques to plenoptic images is a matter of raising interest. In this paper a new method for plenoptic image watermarking is proposed. A secret key is used to specify the location of logo insertion. Employing discr…

Computer scienceComputingMethodologies_IMAGEPROCESSINGANDCOMPUTERVISION0211 other engineering and technologies02 engineering and technologysymbols.namesakeRobustness (computer science)0202 electrical engineering electronic engineering information engineeringDiscrete cosine transformMedian filterComputer visionElectrical and Electronic EngineeringDigital watermarking021110 strategic defence & security studiesbusiness.industryMechanical EngineeringWatermarkÒpticaPeak signal-to-noise ratioAtomic and Molecular Physics and OpticsElectronic Optical and Magnetic MaterialsGaussian noiseHuman visual system modelsymbols020201 artificial intelligence & image processingArtificial intelligencebusinessImatges Processament Tècniques digitalsOptics and Lasers in Engineering
researchProduct

A blind Robust Image Watermarking Approach exploiting the DFT Magnitude

2019

Due to the current progress in Internet, digital contents (video, audio and images) are widely used. Distribution of multimedia contents is now faster and it allows for easy unauthorized reproduction of information. Digital watermarking came up while trying to solve this problem. Its main idea is to embed a watermark into a host digital content without affecting its quality. Moreover, watermarking can be used in several applications such as authentication, copy control, indexation, Copyright protection, etc. In this paper, we propose a blind robust image watermarking approach as a solution to the problem of copyright protection of digital images. The underlying concept of our method is to a…

FOS: Computer and information sciencesComputer Science - Cryptography and SecurityComputer sciencebusiness.industryComputer Vision and Pattern Recognition (cs.CV)Gaussian blurComputer Science - Computer Vision and Pattern RecognitionComputingMethodologies_IMAGEPROCESSINGANDCOMPUTERVISIONWatermarkFilter (signal processing)Discrete Fourier transformsymbols.namesakeDigital imageGaussian noisesymbolsDiscrete cosine transformComputer visionArtificial intelligencebusinessDigital watermarkingCryptography and Security (cs.CR)Histogram equalization
researchProduct

Robust Light Field Watermarking by 4D Wavelet Transform

2020

Unlike common 2D images, the light field representation of a scene delivers spatial and angular description which is of paramount importance for 3D reconstruction. Despite the numerous methods proposed for 2D image watermarking, such methods do not address the angular information of the light field. Hence the exploitation of such methods may cause severe destruction of the angular information. In this paper, we propose a novel method for light field watermarking with extensive consideration of the spatial and angular information. Considering the 4D innate of the light field, the proposed method incorporates 4D wavelet for the purpose of watermarking and converts the heavily-correlated chann…

General Computer ScienceComputer scienceComputingMethodologies_IMAGEPROCESSINGANDCOMPUTERVISION4D waveletImage processing02 engineering and technologyGaussian noisesymbols.namesakeWaveletRobustness (computer science)Computer Science::Multimedia0202 electrical engineering electronic engineering information engineeringDiscrete cosine transformMedian filterlight fieldplenoptic imageGeneral Materials ScienceComputer visionDigital watermarkingbusiness.industry3D reconstructionGeneral EngineeringWavelet transformDCT020207 software engineeringcomputer.file_formatÒpticaGaussian noiseJPEG 2000symbolsRGB color model020201 artificial intelligence & image processingArtificial intelligenceDigital watermarkinglcsh:Electrical engineering. Electronics. Nuclear engineeringbusinesscomputerlcsh:TK1-9971Light fieldImatges Processament Tècniques digitalsIEEE Access
researchProduct

Combining Haar Wavelet and Karhunen Loeve Transforms for Medical Images Watermarking

2014

This paper presents a novel watermarking method, applied to the medical imaging domain, used to embed the patient’s data into the corresponding image or set of images used for the diagnosis. The main objective behind the proposed technique is to perform the watermarking of the medical images in such a way that the three main attributes of the hidden information (i.e., imperceptibility, robustness, and integration rate) can be jointly ameliorated as much as possible. These attributes determine the effectiveness of the watermark, resistance to external attacks, and increase the integration rate. In order to improve the robustness, a combination of the characteristics of Discrete Wavelet and K…

Diagnostic ImagingArticle SubjectComputer scienceWavelet Analysislcsh:Medicine02 engineering and technologyGeneral Biochemistry Genetics and Molecular BiologyWaveletRobustness (computer science)[ INFO.INFO-TI ] Computer Science [cs]/Image Processing0202 electrical engineering electronic engineering information engineeringDigital watermarkingComputer SecurityBlock (data storage)Karhunen–Loève theoremGeneral Immunology and Microbiologybusiness.industryVisibility (geometry)lcsh:RReproducibility of Results020207 software engineeringPattern recognitionWatermarkGeneral MedicineHaar wavelet[INFO.INFO-TI] Computer Science [cs]/Image Processing [eess.IV][INFO.INFO-TI]Computer Science [cs]/Image Processing [eess.IV]020201 artificial intelligence & image processingArtificial intelligencebusinessAlgorithmsResearch Article
researchProduct

Novel Iris Biometric Watermarking Based on Singular Value Decomposition and Discrete Cosine Transform

2014

Published version of an article in the journal: Mathematical Problems in Engineering. Also available from the publisher at: http://dx.doi.org/10.1155/2014/926170 A novel iris biometric watermarking scheme is proposed focusing on iris recognition instead of the traditional watermark for increasing the security of the digital products. The preprocess of iris image is to be done firstly, which generates the iris biometric template from person's eye images. And then the templates are to be on discrete cosine transform; the value of the discrete cosine is encoded to BCH error control coding. The host image is divided into four areas equally correspondingly. The BCH codes are embedded in the sing…

BiometricsArticle SubjectGeneral MathematicsIris recognitionComputingMethodologies_IMAGEPROCESSINGANDCOMPUTERVISIONEngineering (all)Robustness (computer science)Computer Science::MultimediaDiscrete cosine transformMathematics (all)Computer visionDigital watermarkingTransform codingMathematicsComputer Science::Cryptography and Securitybusiness.industrylcsh:MathematicsVDP::Technology: 500::Mechanical engineering: 570General EngineeringWatermarkVDP::Technology: 500::Information and communication technology: 550lcsh:QA1-939ComputingMethodologies_PATTERNRECOGNITIONlcsh:TA1-2040Computer Science::Computer Vision and Pattern RecognitionArtificial intelligencebusinesslcsh:Engineering (General). Civil engineering (General)BCH codeMathematics (all); Engineering (all)Mathematical Problems in Engineering
researchProduct

A Channel-Aware Adaptive Modem for Underwater Acoustic Communications

2021

Acoustic underwater channels are very challenging, because of limited bandwidth, long propagation delays, extended multipath, severe attenuation, rapid time variation and large Doppler shifts. A plethora of underwater communication techniques have been developed for dealing with such a complexity, mostly tailoring specific applications scenarios which can not be considered as one-size-fits-all solutions. Indeed, the design of environment-specific solutions is especially critical for modulations with high spectral efficiency, which are very sensitive to channel characteristics. In this paper, we design and implement a software-defined modem able to dynamically estimate the acoustic channel c…

software radioGeneral Computer ScienceSettore ING-INF/03 - TelecomunicazioniOrthogonal frequency-division multiplexingComputer scienceBandwidth (signal processing)General EngineeringChannel estimationData_CODINGANDINFORMATIONTHEORYChannel estimation JANUS modems OFDM software radio underwater communication watermarkTK1-9971Delay spreadmodemsJANUSInterference (communication)underwater communicationModulationElectronic engineeringGeneral Materials ScienceElectrical engineering. Electronics. Nuclear engineeringUnderwater acoustic communicationMultipath propagationOFDMCommunication channelIEEE Access
researchProduct