Search results for " Watermark"

showing 10 items of 21 documents

Robust Light Field Watermarking by 4D Wavelet Transform

2020

Unlike common 2D images, the light field representation of a scene delivers spatial and angular description which is of paramount importance for 3D reconstruction. Despite the numerous methods proposed for 2D image watermarking, such methods do not address the angular information of the light field. Hence the exploitation of such methods may cause severe destruction of the angular information. In this paper, we propose a novel method for light field watermarking with extensive consideration of the spatial and angular information. Considering the 4D innate of the light field, the proposed method incorporates 4D wavelet for the purpose of watermarking and converts the heavily-correlated chann…

General Computer ScienceComputer scienceComputingMethodologies_IMAGEPROCESSINGANDCOMPUTERVISION4D waveletImage processing02 engineering and technologyGaussian noisesymbols.namesakeWaveletRobustness (computer science)Computer Science::Multimedia0202 electrical engineering electronic engineering information engineeringDiscrete cosine transformMedian filterlight fieldplenoptic imageGeneral Materials ScienceComputer visionDigital watermarkingbusiness.industry3D reconstructionGeneral EngineeringWavelet transformDCT020207 software engineeringcomputer.file_formatÒpticaGaussian noiseJPEG 2000symbolsRGB color model020201 artificial intelligence & image processingArtificial intelligenceDigital watermarkinglcsh:Electrical engineering. Electronics. Nuclear engineeringbusinesscomputerlcsh:TK1-9971Light fieldImatges Processament Tècniques digitalsIEEE Access
researchProduct

Progressive transmission of secured images with authentication using decompositions into monovariate functions

2014

International audience; We propose a progressive transmission approach of an image authenticated using an overlapping subimage that can be removed to restore the original image. Our approach is different from most visible water- marking approaches that allow one to later remove the watermark, because the mark is not directly introduced in the two-dimensional image space. Instead, it is rather applied to an equivalent monovariate representation of the image. Precisely, the approach is based on our progressive transmission approach that relies on a modified Kolmogorov spline network, and therefore inherits its advantages: resilience to packet losses during transmis- sion and support of hetero…

Signal processing[ INFO.INFO-TS ] Computer Science [cs]/Signal and Image ProcessingComputingMethodologies_IMAGEPROCESSINGANDCOMPUTERVISION02 engineering and technology[ SPI.SIGNAL ] Engineering Sciences [physics]/Signal and Image processing01 natural sciencesImage encryption010309 optics[INFO.INFO-TS]Computer Science [cs]/Signal and Image Processing0103 physical sciences0202 electrical engineering electronic engineering information engineeringComputer visionElectrical and Electronic EngineeringDigital watermarkingImage resolutionMathematicsSignal processingAuthenticationNetwork packetbusiness.industryWatermarkAtomic and Molecular Physics and OpticsComputer Science ApplicationsSpline (mathematics)Binary dataKolmogorov superposition theorem020201 artificial intelligence & image processingArtificial intelligencebusinessVisible watermarking[SPI.SIGNAL]Engineering Sciences [physics]/Signal and Image processing
researchProduct

"Towards a "fingerprint" of paper network; separating forgeries from genuine by the properties of fibre structure"

2014

A novel method is introduced for distinguishing counterfeit banknotes from genuine samples. The method is based on analyzing differences in the networks of paper fibers. The main tool is a curvelet-based algorithm for measuring the distribution of overall fiber orientation and quantifying its anisotropy. The use of a couple or more appropriate parameters makes it possible to distinguish forgeries from genuine samples as concentrated point clouds in a two- or three-dimensional parameter space. Furthermore, the techniques of making watermarks is investigated by comparing genuine and counterfeit €50 banknotes. In addition, the so-called wire markings are shown to differ significantly from each…

Structure (mathematical logic)Engineeringta114business.industryFiber orientationPoint cloudFingerprint recognitionCounterfeitFingerprintCurveletComputer visionArtificial intelligencebusinessta216Digital watermarking
researchProduct

Invisible Graffiti on Your Buildings: Blind and Squaring-Proof Watermarking of Geographical Databases

2007

Due to the ease of digital copy, watermarking is crucial to protect the intellectual property of rights owners. We propose an effective watermarking method for vectorial geographical databases, with the focus on the buildings layer. Embedded watermarks survive common geographical filters, including the essential squaring and simplification transformations, as well as deliberate removal attempts, e.g. by noise addition, cropping or over-watermarking. Robustness against the squaring transformation is not adressed by existing approaches. The impact on the quality of the datasets, defined as a composition of point accuracy and angular quality, is assessed through an extensive series of experime…

Theoretical computer scienceDatabaseOrientation (computer vision)CentroidComputingMilieux_LEGALASPECTSOFCOMPUTINGcomputer.software_genreTransformation (function)Robustness (computer science)Noise (video)Focus (optics)Quantization (image processing)computerDigital watermarkingMathematics
researchProduct

New Representations for Multidimensional Functions Based on Kolmogorov Superposition Theorem. Applications on Image Processing

2012

Mastering the sorting of the data in signal (nD) can lead to multiple applications like new compression, transmission, watermarking, encryption methods and even new processing methods for image. Some authors in the past decades have proposed to use these approaches for image compression, indexing, median filtering, mathematical morphology, encryption. A mathematical rigorous way for doing such a study has been introduced by Andrei Nikolaievitch Kolmogorov (1903-1987) in 1957 and recent results have provided constructive ways and practical algorithms for implementing the Kolmogorov theorem. We propose in this paper to present those algorithms and some preliminary results obtained by our team…

Theoretical computer science[ INFO.INFO-TS ] Computer Science [cs]/Signal and Image Processingbusiness.industry[INFO.INFO-TS] Computer Science [cs]/Signal and Image ProcessingSortingimage progressive transmissionImage processingimage encryption[ SPI.SIGNAL ] Engineering Sciences [physics]/Signal and Image processingMathematical morphologyEncryptionimage watermarkingimage compressionImage (mathematics)multi-variables function representation[INFO.INFO-TS]Computer Science [cs]/Signal and Image ProcessingKolmogorov superposition theoremMedian filterbusinessDigital watermarkingAlgorithm[SPI.SIGNAL]Engineering Sciences [physics]/Signal and Image processingImage compressionMathematics[SPI.SIGNAL] Engineering Sciences [physics]/Signal and Image processing
researchProduct

Query-preserving watermarking of relational databases and XML documents

2011

Watermarking allows robust and unobtrusive insertion of information in a digital document. During the last few years, techniques have been proposed for watermarking relational databases or Xml documents, where information insertion must preserve a specific measure on data (for example the mean and variance of numerical attributes). In this article we investigate the problem of watermarking databases or Xml while preserving a set of parametric queries in a specified language, up to an acceptable distortion. We first show that unrestricted databases can not be watermarked while preserving trivial parametric queries. We then exhibit query languages and classes of structures that allow guarante…

[INFO.INFO-DB]Computer Science [cs]/Databases [cs.DB]Theoretical computer scienceInformation retrievalcomputer.internet_protocolRelational databaseComputer science0102 computer and information sciences02 engineering and technologyQuery language01 natural sciencesVC dimension[ INFO.INFO-DB ] Computer Science [cs]/Databases [cs.DB]Computational learning theory010201 computation theory & mathematicsBounded function0202 electrical engineering electronic engineering information engineering[INFO.INFO-DB] Computer Science [cs]/Databases [cs.DB]Graph (abstract data type)020201 artificial intelligence & image processingcomputerDigital watermarkingComputingMilieux_MISCELLANEOUSXMLInformation SystemsParametric statisticsProceedings of the twenty-second ACM SIGMOD-SIGACT-SIGART symposium on Principles of database systems
researchProduct

Blind Robust 3-D Mesh Watermarking Based on Mesh Saliency and QIM Quantization for Copyright Protection

2019

International audience; Due to the recent demand of 3-D models in several applications like medical imaging, video games, among others, the necessity of implementing 3-D mesh watermarking schemes aiming to protect copyright has increased considerably. The majority of robust 3-D watermark-ing techniques have essentially focused on the robustness against attacks while the imperceptibility of these techniques is still a real issue. In this context, a blind robust 3-D mesh watermarking method based on mesh saliency and Quantization Index Modulation (QIM) for Copyright protection is proposed. The watermark is embedded by quantifying the vertex norms of the 3-D mesh using QIM scheme since it offe…

business.industryComputer scienceWatermark robustness[INFO.INFO-TS] Computer Science [cs]/Signal and Image ProcessingData_MISCELLANEOUS[INFO.INFO-CV]Computer Science [cs]/Computer Vision and Pattern Recognition [cs.CV]020207 software engineeringQuantization index modulationWatermark02 engineering and technologyVertex (geometry)[INFO.INFO-TS]Computer Science [cs]/Signal and Image Processing0202 electrical engineering electronic engineering information engineering020201 artificial intelligence & image processingComputer visionArtificial intelligencebusinessQuantization (image processing)Digital watermarkingSmoothingComputingMilieux_MISCELLANEOUS
researchProduct

Plenoptic image watermarking to preserve copyright

2017

Common camera loses a huge amount of information obtainable from scene as it does not record the value of individual rays passing a point and it merely keeps the summation of intensities of all the rays passing a point. Plenoptic images can be exploited to provide a 3D representation of the scene and watermarking such images can be helpful to protect the ownership of these images. In this paper we propose a method for watermarking the plenoptic images to achieve this aim. The performance of the proposed method is validated by experimental results and a compromise is held between imperceptibility and robustness.

business.industryData_MISCELLANEOUSComputingMethodologies_IMAGEPROCESSINGANDCOMPUTERVISION020207 software engineering02 engineering and technologyÒpticaImage (mathematics)GeographyRobustness (computer science)0202 electrical engineering electronic engineering information engineering020201 artificial intelligence & image processingPoint (geometry)Computer visionArtificial intelligencebusinessRepresentation (mathematics)Digital watermarkingThree-Dimensional Imaging, Visualization, and Display 2017
researchProduct

A Digital Watermarking Algorithm Based on Quantization of the DCT: Application on Medical Imaging

2013

International audience; The objective of this paper is to elaborate a new watermarking algorithm applied to the medical imaging. This algorithm must be invisible, robust and has a rate, relatively high, integrating data. The proposed method uses the standard JPEG compression for the integration of medical data. The insertion block is inserted just after the quantization phase. To control identification and eventually the correction (if possible) of the inserted data, we use a series of turbocodes to recover the inserted data, after application of several attacks. The simulation studies are applied on MRI medicals images.

business.industry[INFO.INFO-TI] Computer Science [cs]/Image Processing [eess.IV][INFO.INFO-TI]Computer Science [cs]/Image Processing [eess.IV][ INFO.INFO-TI ] Computer Science [cs]/Image ProcessingMedical imagingJpeg compressionDiscrete cosine transformTurbo codeComputer visionArtificial intelligencebusinessQuantization (image processing)Digital watermarkingAlgorithmTransform codingData compressionMathematics
researchProduct

FLUMO: FLexible Underwater MOdem

2019

The last years have seen a growing interest in underwater acoustic communications because of its applications in marine research, oceanography, marine commercial operations, the offshore oil industry and defense. High-speed communication in the underwater acoustic channel has been challenging because of limited bandwidth, extended multipath, refractive properties of the medium, severe fading, rapid time variation and large Doppler shifts. In this paper, we show an implementation of a flexible Software-Defined Acoustic (SDA) underwater modem, where modulation parameters are completely tunable to optimize performance. In particular, we develop the system architecture following two key ideas. …

extended multipathSDAOrthogonal frequency-division multiplexingComputer sciencemarine commercial operationsUnderwater; acoustic ; software defined ; modem; JANUS; SDA; FSK; RedPitaya; WatermarkSettore ING-INF/01 - ElettronicaacousticFSKmodulate signalsDemodulationcontrolled testbedsUnderwaterunderwater acoustic channelOFDMFrequency-shift keyingFLUMOunderwater acoustic communicationsBandwidth (signal processing)Frequency shift keyingflexible Software-Definedoffshore oil industrysoftware definedRedPitayaflexible underwater MOdemmodulated signalsmodulation parameterstunable systemrefractive propertiesMultipath propagationStandardssystem architectureDoppler shiftsunderwater acoustic communicationhigh-speed communicationflexible systemElectronic engineeringDoppler shiftFadingoceanographymodemSettore ING-INF/03 - Telecomunicazionirapid time variationField programmable gate arraysmarine researchmodemsJANUSWatermarkSystems architectureUnderwater
researchProduct