Search results for "digital watermarking"

showing 10 items of 18 documents

Watermarking for ontologies

2011

In this paper, we study watermarking methods to prove the ownership of an ontology. Different from existing approaches, we propose to watermark not by altering existing statements, but by removing them. Thereby, our approach does not introduce false statements into the ontology. We show how ownership of ontologies can be established with provably tight probability bounds, even if only parts of the ontology are being re-used. We finally demonstrate the viability of our approach on real-world ontologies.

021110 strategic defence & security studiesInformation retrievalOpen worldComputer scienceOntology-based data integrationProcess ontologyData_MISCELLANEOUS0211 other engineering and technologiesWatermark02 engineering and technologyOntology (information science)computer.software_genre020204 information systems0202 electrical engineering electronic engineering information engineeringData miningDigital watermarkingSecurity parametercomputerISWC 2011: Proceedings of the 10th International Semantic Web Conference
researchProduct

A Digital Watermarking Algorithm Based on Quantization of the DCT: Application on Medical Imaging

2013

International audience; The objective of this paper is to elaborate a new watermarking algorithm applied to the medical imaging. This algorithm must be invisible, robust and has a rate, relatively high, integrating data. The proposed method uses the standard JPEG compression for the integration of medical data. The insertion block is inserted just after the quantization phase. To control identification and eventually the correction (if possible) of the inserted data, we use a series of turbocodes to recover the inserted data, after application of several attacks. The simulation studies are applied on MRI medicals images.

business.industry[INFO.INFO-TI] Computer Science [cs]/Image Processing [eess.IV][INFO.INFO-TI]Computer Science [cs]/Image Processing [eess.IV][ INFO.INFO-TI ] Computer Science [cs]/Image ProcessingMedical imagingJpeg compressionDiscrete cosine transformTurbo codeComputer visionArtificial intelligencebusinessQuantization (image processing)Digital watermarkingAlgorithmTransform codingData compressionMathematics
researchProduct

Blind Robust 3-D Mesh Watermarking Based on Mesh Saliency and QIM Quantization for Copyright Protection

2019

International audience; Due to the recent demand of 3-D models in several applications like medical imaging, video games, among others, the necessity of implementing 3-D mesh watermarking schemes aiming to protect copyright has increased considerably. The majority of robust 3-D watermark-ing techniques have essentially focused on the robustness against attacks while the imperceptibility of these techniques is still a real issue. In this context, a blind robust 3-D mesh watermarking method based on mesh saliency and Quantization Index Modulation (QIM) for Copyright protection is proposed. The watermark is embedded by quantifying the vertex norms of the 3-D mesh using QIM scheme since it offe…

business.industryComputer scienceWatermark robustness[INFO.INFO-TS] Computer Science [cs]/Signal and Image ProcessingData_MISCELLANEOUS[INFO.INFO-CV]Computer Science [cs]/Computer Vision and Pattern Recognition [cs.CV]020207 software engineeringQuantization index modulationWatermark02 engineering and technologyVertex (geometry)[INFO.INFO-TS]Computer Science [cs]/Signal and Image Processing0202 electrical engineering electronic engineering information engineering020201 artificial intelligence & image processingComputer visionArtificial intelligencebusinessQuantization (image processing)Digital watermarkingSmoothingComputingMilieux_MISCELLANEOUS
researchProduct

Ownership protection of plenoptic images by robust and reversible watermarking

2018

Abstract Plenoptic images are highly demanded for 3D representation of broad scenes. Contrary to the images captured by conventional cameras, plenoptic images carry a considerable amount of angular information, which is very appealing for 3D reconstruction and display of the scene. Plenoptic images are gaining increasing importance in areas like medical imaging, manufacturing control, metrology, or even entertainment business. Thus, the adaptation and refinement of watermarking techniques to plenoptic images is a matter of raising interest. In this paper a new method for plenoptic image watermarking is proposed. A secret key is used to specify the location of logo insertion. Employing discr…

Computer scienceComputingMethodologies_IMAGEPROCESSINGANDCOMPUTERVISION0211 other engineering and technologies02 engineering and technologysymbols.namesakeRobustness (computer science)0202 electrical engineering electronic engineering information engineeringDiscrete cosine transformMedian filterComputer visionElectrical and Electronic EngineeringDigital watermarking021110 strategic defence & security studiesbusiness.industryMechanical EngineeringWatermarkÒpticaPeak signal-to-noise ratioAtomic and Molecular Physics and OpticsElectronic Optical and Magnetic MaterialsGaussian noiseHuman visual system modelsymbols020201 artificial intelligence & image processingArtificial intelligencebusinessImatges Processament Tècniques digitalsOptics and Lasers in Engineering
researchProduct

A blind Robust Image Watermarking Approach exploiting the DFT Magnitude

2019

Due to the current progress in Internet, digital contents (video, audio and images) are widely used. Distribution of multimedia contents is now faster and it allows for easy unauthorized reproduction of information. Digital watermarking came up while trying to solve this problem. Its main idea is to embed a watermark into a host digital content without affecting its quality. Moreover, watermarking can be used in several applications such as authentication, copy control, indexation, Copyright protection, etc. In this paper, we propose a blind robust image watermarking approach as a solution to the problem of copyright protection of digital images. The underlying concept of our method is to a…

FOS: Computer and information sciencesComputer Science - Cryptography and SecurityComputer sciencebusiness.industryComputer Vision and Pattern Recognition (cs.CV)Gaussian blurComputer Science - Computer Vision and Pattern RecognitionComputingMethodologies_IMAGEPROCESSINGANDCOMPUTERVISIONWatermarkFilter (signal processing)Discrete Fourier transformsymbols.namesakeDigital imageGaussian noisesymbolsDiscrete cosine transformComputer visionArtificial intelligencebusinessDigital watermarkingCryptography and Security (cs.CR)Histogram equalization
researchProduct

Robust Light Field Watermarking by 4D Wavelet Transform

2020

Unlike common 2D images, the light field representation of a scene delivers spatial and angular description which is of paramount importance for 3D reconstruction. Despite the numerous methods proposed for 2D image watermarking, such methods do not address the angular information of the light field. Hence the exploitation of such methods may cause severe destruction of the angular information. In this paper, we propose a novel method for light field watermarking with extensive consideration of the spatial and angular information. Considering the 4D innate of the light field, the proposed method incorporates 4D wavelet for the purpose of watermarking and converts the heavily-correlated chann…

General Computer ScienceComputer scienceComputingMethodologies_IMAGEPROCESSINGANDCOMPUTERVISION4D waveletImage processing02 engineering and technologyGaussian noisesymbols.namesakeWaveletRobustness (computer science)Computer Science::Multimedia0202 electrical engineering electronic engineering information engineeringDiscrete cosine transformMedian filterlight fieldplenoptic imageGeneral Materials ScienceComputer visionDigital watermarkingbusiness.industry3D reconstructionGeneral EngineeringWavelet transformDCT020207 software engineeringcomputer.file_formatÒpticaGaussian noiseJPEG 2000symbolsRGB color model020201 artificial intelligence & image processingArtificial intelligenceDigital watermarkinglcsh:Electrical engineering. Electronics. Nuclear engineeringbusinesscomputerlcsh:TK1-9971Light fieldImatges Processament Tècniques digitalsIEEE Access
researchProduct

Combining Haar Wavelet and Karhunen Loeve Transforms for Medical Images Watermarking

2014

This paper presents a novel watermarking method, applied to the medical imaging domain, used to embed the patient’s data into the corresponding image or set of images used for the diagnosis. The main objective behind the proposed technique is to perform the watermarking of the medical images in such a way that the three main attributes of the hidden information (i.e., imperceptibility, robustness, and integration rate) can be jointly ameliorated as much as possible. These attributes determine the effectiveness of the watermark, resistance to external attacks, and increase the integration rate. In order to improve the robustness, a combination of the characteristics of Discrete Wavelet and K…

Diagnostic ImagingArticle SubjectComputer scienceWavelet Analysislcsh:Medicine02 engineering and technologyGeneral Biochemistry Genetics and Molecular BiologyWaveletRobustness (computer science)[ INFO.INFO-TI ] Computer Science [cs]/Image Processing0202 electrical engineering electronic engineering information engineeringDigital watermarkingComputer SecurityBlock (data storage)Karhunen–Loève theoremGeneral Immunology and Microbiologybusiness.industryVisibility (geometry)lcsh:RReproducibility of Results020207 software engineeringPattern recognitionWatermarkGeneral MedicineHaar wavelet[INFO.INFO-TI] Computer Science [cs]/Image Processing [eess.IV][INFO.INFO-TI]Computer Science [cs]/Image Processing [eess.IV]020201 artificial intelligence & image processingArtificial intelligencebusinessAlgorithmsResearch Article
researchProduct

Novel Iris Biometric Watermarking Based on Singular Value Decomposition and Discrete Cosine Transform

2014

Published version of an article in the journal: Mathematical Problems in Engineering. Also available from the publisher at: http://dx.doi.org/10.1155/2014/926170 A novel iris biometric watermarking scheme is proposed focusing on iris recognition instead of the traditional watermark for increasing the security of the digital products. The preprocess of iris image is to be done firstly, which generates the iris biometric template from person's eye images. And then the templates are to be on discrete cosine transform; the value of the discrete cosine is encoded to BCH error control coding. The host image is divided into four areas equally correspondingly. The BCH codes are embedded in the sing…

BiometricsArticle SubjectGeneral MathematicsIris recognitionComputingMethodologies_IMAGEPROCESSINGANDCOMPUTERVISIONEngineering (all)Robustness (computer science)Computer Science::MultimediaDiscrete cosine transformMathematics (all)Computer visionDigital watermarkingTransform codingMathematicsComputer Science::Cryptography and Securitybusiness.industrylcsh:MathematicsVDP::Technology: 500::Mechanical engineering: 570General EngineeringWatermarkVDP::Technology: 500::Information and communication technology: 550lcsh:QA1-939ComputingMethodologies_PATTERNRECOGNITIONlcsh:TA1-2040Computer Science::Computer Vision and Pattern RecognitionArtificial intelligencebusinesslcsh:Engineering (General). Civil engineering (General)BCH codeMathematics (all); Engineering (all)Mathematical Problems in Engineering
researchProduct

Plenoptic image watermarking to preserve copyright

2017

Common camera loses a huge amount of information obtainable from scene as it does not record the value of individual rays passing a point and it merely keeps the summation of intensities of all the rays passing a point. Plenoptic images can be exploited to provide a 3D representation of the scene and watermarking such images can be helpful to protect the ownership of these images. In this paper we propose a method for watermarking the plenoptic images to achieve this aim. The performance of the proposed method is validated by experimental results and a compromise is held between imperceptibility and robustness.

business.industryData_MISCELLANEOUSComputingMethodologies_IMAGEPROCESSINGANDCOMPUTERVISION020207 software engineering02 engineering and technologyÒpticaImage (mathematics)GeographyRobustness (computer science)0202 electrical engineering electronic engineering information engineering020201 artificial intelligence & image processingPoint (geometry)Computer visionArtificial intelligencebusinessRepresentation (mathematics)Digital watermarkingThree-Dimensional Imaging, Visualization, and Display 2017
researchProduct

"Towards a "fingerprint" of paper network; separating forgeries from genuine by the properties of fibre structure"

2014

A novel method is introduced for distinguishing counterfeit banknotes from genuine samples. The method is based on analyzing differences in the networks of paper fibers. The main tool is a curvelet-based algorithm for measuring the distribution of overall fiber orientation and quantifying its anisotropy. The use of a couple or more appropriate parameters makes it possible to distinguish forgeries from genuine samples as concentrated point clouds in a two- or three-dimensional parameter space. Furthermore, the techniques of making watermarks is investigated by comparing genuine and counterfeit €50 banknotes. In addition, the so-called wire markings are shown to differ significantly from each…

Structure (mathematical logic)Engineeringta114business.industryFiber orientationPoint cloudFingerprint recognitionCounterfeitFingerprintCurveletComputer visionArtificial intelligencebusinessta216Digital watermarking
researchProduct