Search results for "Watermark"
showing 10 items of 31 documents
Robust Light Field Watermarking by 4D Wavelet Transform
2020
Unlike common 2D images, the light field representation of a scene delivers spatial and angular description which is of paramount importance for 3D reconstruction. Despite the numerous methods proposed for 2D image watermarking, such methods do not address the angular information of the light field. Hence the exploitation of such methods may cause severe destruction of the angular information. In this paper, we propose a novel method for light field watermarking with extensive consideration of the spatial and angular information. Considering the 4D innate of the light field, the proposed method incorporates 4D wavelet for the purpose of watermarking and converts the heavily-correlated chann…
A Channel-Aware Adaptive System for Underwater Acoustic Communications
2021
In recent years, underwater communications have seen a growing interest pushed by marine research, oceanography, marine commercial operations, offshore oil industry and defense applications. Generally, underwater communications employ audio signals which can propagate relatively far. However, acoustic underwater channels are very challenging, because of limited bandwidth, long propagation delays, extended multipath, severe attenuation, rapid time variation and large Doppler shifts. A plethora of underwater communication techniques have been developed for dealing with such a complexity, mostly tailoring specific applications scenarios which can not be considered as one-size-fits-all solution…
A Watermarking of Medical Image : New Approach Based On "Multi-Layer" Method
2011
In order to contribute to security sharing and transmission of medical images, this paper propose a new approach for Watermarking image based on the techniques of Code Division Multiple Access (CDMA), Discrete Wavelet transform (DWT) and Error Correcting Code (ECC). The motivation of this approach is to improve the quantity of data integration with the conservation of the image visual quality. Therefore, this work permits to the user the capacity to correct the possible alterations if it exists. IRM and Echographic medical image are used to experiment this approach.
The design and implementation of Neuma, a collaborative Digital Scores Library - Requirements, architecture, and models
2012
This paper presents the design and implementation of the Neuma platform, a digital library devoted to the preservation and dissemination of symbolic music content (scores). Neuma is open to musicologists, musicians, and music publishers. It consists of a repository dedicated to the storage of large collections of digital scores, where users/applications can upload their documents. It also proposes services to publish, annotate, query, transform, and analyze scores. The long-term goal of the project is to enable an open and collaborative space where musician communities will be able to share music in symbolic notation. The project is organized around the French IRPMF institute (BnF–CNRS) whi…
Progressive transmission of secured images with authentication using decompositions into monovariate functions
2014
International audience; We propose a progressive transmission approach of an image authenticated using an overlapping subimage that can be removed to restore the original image. Our approach is different from most visible water- marking approaches that allow one to later remove the watermark, because the mark is not directly introduced in the two-dimensional image space. Instead, it is rather applied to an equivalent monovariate representation of the image. Precisely, the approach is based on our progressive transmission approach that relies on a modified Kolmogorov spline network, and therefore inherits its advantages: resilience to packet losses during transmis- sion and support of hetero…
"Towards a "fingerprint" of paper network; separating forgeries from genuine by the properties of fibre structure"
2014
A novel method is introduced for distinguishing counterfeit banknotes from genuine samples. The method is based on analyzing differences in the networks of paper fibers. The main tool is a curvelet-based algorithm for measuring the distribution of overall fiber orientation and quantifying its anisotropy. The use of a couple or more appropriate parameters makes it possible to distinguish forgeries from genuine samples as concentrated point clouds in a two- or three-dimensional parameter space. Furthermore, the techniques of making watermarks is investigated by comparing genuine and counterfeit €50 banknotes. In addition, the so-called wire markings are shown to differ significantly from each…
Robust Communications for the Underwater Internet of Things
2023
In recent years, the emergence of numerous applications and activities involving the underwater world have given rise to a new class of technologies that takes the name of Internet of Underwater Things (IoUT). Submarine activities such as remote control, pollution monitoring, data collection, disaster detection or even early warning and assisted navigation are just some of the main applications that require the use of underwater communication systems capable of providing connectivity between static and mobile nodes deployed at different depths. Generally, underwater communications employ audio signals which can propagate relatively far but are also significantly affected by Doppler distorti…
Invisible Graffiti on Your Buildings: Blind and Squaring-Proof Watermarking of Geographical Databases
2007
Due to the ease of digital copy, watermarking is crucial to protect the intellectual property of rights owners. We propose an effective watermarking method for vectorial geographical databases, with the focus on the buildings layer. Embedded watermarks survive common geographical filters, including the essential squaring and simplification transformations, as well as deliberate removal attempts, e.g. by noise addition, cropping or over-watermarking. Robustness against the squaring transformation is not adressed by existing approaches. The impact on the quality of the datasets, defined as a composition of point accuracy and angular quality, is assessed through an extensive series of experime…
New Representations for Multidimensional Functions Based on Kolmogorov Superposition Theorem. Applications on Image Processing
2012
Mastering the sorting of the data in signal (nD) can lead to multiple applications like new compression, transmission, watermarking, encryption methods and even new processing methods for image. Some authors in the past decades have proposed to use these approaches for image compression, indexing, median filtering, mathematical morphology, encryption. A mathematical rigorous way for doing such a study has been introduced by Andrei Nikolaievitch Kolmogorov (1903-1987) in 1957 and recent results have provided constructive ways and practical algorithms for implementing the Kolmogorov theorem. We propose in this paper to present those algorithms and some preliminary results obtained by our team…
Geographical Database Watermarking by Polygon Elongation (Technical Report)
2007
Due to the ease of digital copy, watermarking is crucial to protect the intellectual property of rights owners. We propose an effective watermarking method for vectorial geographical databases, with the focus on the buildings layer. Embedded watermarks survive common geographical filters, including the essential squaring and simplification transformations, as well as deliberate removal attempts, e.g. by noise addition, cropping or over-watermarking. The impact on the quality of the datasets, defined as a composition of point accuracy and angular quality, is assessed through an extensive series of experiments. Our method is based on a quantization of the distance between the centroid of the …