Search results for " Watermark"
showing 10 items of 21 documents
Plenoptic image watermarking to preserve copyright
2017
Common camera loses a huge amount of information obtainable from scene as it does not record the value of individual rays passing a point and it merely keeps the summation of intensities of all the rays passing a point. Plenoptic images can be exploited to provide a 3D representation of the scene and watermarking such images can be helpful to protect the ownership of these images. In this paper we propose a method for watermarking the plenoptic images to achieve this aim. The performance of the proposed method is validated by experimental results and a compromise is held between imperceptibility and robustness.
"Towards a "fingerprint" of paper network; separating forgeries from genuine by the properties of fibre structure"
2014
A novel method is introduced for distinguishing counterfeit banknotes from genuine samples. The method is based on analyzing differences in the networks of paper fibers. The main tool is a curvelet-based algorithm for measuring the distribution of overall fiber orientation and quantifying its anisotropy. The use of a couple or more appropriate parameters makes it possible to distinguish forgeries from genuine samples as concentrated point clouds in a two- or three-dimensional parameter space. Furthermore, the techniques of making watermarks is investigated by comparing genuine and counterfeit €50 banknotes. In addition, the so-called wire markings are shown to differ significantly from each…
A robust blind 3-D mesh watermarking based on wavelet transform for copyright protection
2019
Nowadays, three-dimensional meshes have been extensively used in several applications such as, industrial, medical, computer-aided design (CAD) and entertainment due to the processing capability improvement of computers and the development of the network infrastructure. Unfortunately, like digital images and videos, 3-D meshes can be easily modified, duplicated and redistributed by unauthorized users. Digital watermarking came up while trying to solve this problem. In this paper, we propose a blind robust watermarking scheme for three-dimensional semiregular meshes for Copyright protection. The watermark is embedded by modifying the norm of the wavelet coefficient vectors associated with th…
Automatic Identification of Watermarks and Watermarking Robustness Using Machine Learning Techniques
2021
The goal of this article is to propose a framework for automatic identification of watermarks from modified host images. The framework can be used with any watermark embedding/extraction system and is based on models built using machine learning (ML) techniques. Any supervised ML approach can be theoretically chosen. An important part of our framework consists in building a stand-alone module, independent of the watermarking system, for generating two types of watermarks datasets. The first type of datasets, that we will name artificially datasets, is generated from the original images by adding noise with an imposed maximum level of noise. The second type contains altered watermarked image…
New Representations for Multidimensional Functions Based on Kolmogorov Superposition Theorem. Applications on Image Processing
2012
Mastering the sorting of the data in signal (nD) can lead to multiple applications like new compression, transmission, watermarking, encryption methods and even new processing methods for image. Some authors in the past decades have proposed to use these approaches for image compression, indexing, median filtering, mathematical morphology, encryption. A mathematical rigorous way for doing such a study has been introduced by Andrei Nikolaievitch Kolmogorov (1903-1987) in 1957 and recent results have provided constructive ways and practical algorithms for implementing the Kolmogorov theorem. We propose in this paper to present those algorithms and some preliminary results obtained by our team…
A Robust Blind 3-D Mesh Watermarking Technique Based on SCS Quantization and Mesh Saliency for Copyright Protection
2019
Due to the recent demand of 3-D meshes in a wide range of applications such as video games, medical imaging, film special effect making, computer-aided design (CAD), among others, the necessity of implementing 3-D mesh watermarking schemes aiming to protect copyright has increased in the last decade. Nowadays, the majority of robust 3-D watermarking approaches have mainly focused on the robustness against attacks while the imperceptibility of these techniques is still a serious challenge. In this context, a blind robust 3-D mesh watermarking method based on mesh saliency and scalar Costa scheme (SCS) for Copyright protection is proposed. The watermark is embedded by quantifying the vertex n…
Doppler Estimation and Correction for JANUS Underwater Communications
2020
In recent years, underwater communications have seen a growing interest pushed by marine research, oceanography, marine commercial operations, offshore oil industry and defense applications. Generally, underwater communications employ audio signals which can propagate relatively far but are also significantly affected by Doppler distortions. In fact, physical properties of the water and spatial changes due to tides, currents and waves can cause channel variations or unwanted movements of the transmitter or receiver. This study shows how to compensate for the Doppler effect in transmission employing the JANUS standard, a popular modulation scheme for underwater communication. Differently for…
Invisible Graffiti on Your Buildings: Blind and Squaring-Proof Watermarking of Geographical Databases
2007
Due to the ease of digital copy, watermarking is crucial to protect the intellectual property of rights owners. We propose an effective watermarking method for vectorial geographical databases, with the focus on the buildings layer. Embedded watermarks survive common geographical filters, including the essential squaring and simplification transformations, as well as deliberate removal attempts, e.g. by noise addition, cropping or over-watermarking. Robustness against the squaring transformation is not adressed by existing approaches. The impact on the quality of the datasets, defined as a composition of point accuracy and angular quality, is assessed through an extensive series of experime…
Progressive transmission of secured images with authentication using decompositions into monovariate functions
2014
International audience; We propose a progressive transmission approach of an image authenticated using an overlapping subimage that can be removed to restore the original image. Our approach is different from most visible water- marking approaches that allow one to later remove the watermark, because the mark is not directly introduced in the two-dimensional image space. Instead, it is rather applied to an equivalent monovariate representation of the image. Precisely, the approach is based on our progressive transmission approach that relies on a modified Kolmogorov spline network, and therefore inherits its advantages: resilience to packet losses during transmis- sion and support of hetero…
Query-preserving watermarking of relational databases and XML documents
2011
Watermarking allows robust and unobtrusive insertion of information in a digital document. During the last few years, techniques have been proposed for watermarking relational databases or Xml documents, where information insertion must preserve a specific measure on data (for example the mean and variance of numerical attributes). In this article we investigate the problem of watermarking databases or Xml while preserving a set of parametric queries in a specified language, up to an acceptable distortion. We first show that unrestricted databases can not be watermarked while preserving trivial parametric queries. We then exhibit query languages and classes of structures that allow guarante…