Results 1 - 10
of
13
A Technique for Image Data Hiding and Reconstruction without Host Image
- Proceeding of SPIE EI ’99, Security and Watermarking f Multimedia Contents
, 1999
"... A new technique for embedding image data that can be recovered in the absence of the original host image, is presented. The data to be embedded, referred to as the signature data, is inserted into the host image in the DCT domain. The signature DCT coefficients are encoded using a lattice coding sch ..."
Abstract
-
Cited by 11 (0 self)
- Add to MetaCart
A new technique for embedding image data that can be recovered in the absence of the original host image, is presented. The data to be embedded, referred to as the signature data, is inserted into the host image in the DCT domain. The signature DCT coefficients are encoded using a lattice coding scheme before embedding. Each block of host DCT coefficients is first checked for its texture content and the signatured codes are appropriately inserted depending on a local texture measure. Experimental results indicate that high quality embedding is possible, with no visible distortions. Signature images can be recovered even when the embedded data is subject to significant lossy JPEG compression.
A Source and Channel Coding Approach to Data Hiding with Application to Hiding Speech
- in Video,” Proceeding of IEEE ICIP ‘98
, 1998
"... ..."
(Show Context)
Nothing But a Kiss: A Novel and Accurate Approach to Assessing The Performance of Multidimensional Distortion-Compensated Dither Modulation
- in Proc. of the 5th International Workshop on Information Hiding, Lecture Notes in Computer Science, (Noorwijkerhout, The
, 2002
"... A considerable amount of attention has been lately paid to a number of data hiding methods based on quantization, seeking to achieve in practice the results predicted by Costa for a channel with side information at the encoder. In this paper we analyze a multidimensional extension of the implemen ..."
Abstract
-
Cited by 6 (4 self)
- Add to MetaCart
A considerable amount of attention has been lately paid to a number of data hiding methods based on quantization, seeking to achieve in practice the results predicted by Costa for a channel with side information at the encoder. In this paper we analyze a multidimensional extension of the implementation of Costa's result known as DC-QIM. The presented analysis is based on measuring the probabilities of decoding error in the presence of two important kinds of additive channel distortions. DC-QIM is able to achieve a probability of decoding error of less than 1e-02 for 0 dB of watermark to noise ratio and only 20 samples per hidden bit. Empirical results supporting our analysis are given both for synthetic data and real images.
A source and channel-coding framework for vector-based data hiding in video
- IEEE Transactions on Circuits and Systems for Video Technology
, 2000
"... ..."
On the secrecy rate of interference networks using structured codes
- in Proceedings of the IEEE International Symposium on Information Theory (ISIT 2009), (Seoul, South Korea
, 2009
"... Abstract — This paper shows that structured transmission schemes are a good choice for secret communication over interference networks with an eavesdropper. Structured transmission is shown to exploit channel asymmetries and thus perform better than randomly generated codebooks for such channels. Fo ..."
Abstract
-
Cited by 6 (2 self)
- Add to MetaCart
(Show Context)
Abstract — This paper shows that structured transmission schemes are a good choice for secret communication over interference networks with an eavesdropper. Structured transmission is shown to exploit channel asymmetries and thus perform better than randomly generated codebooks for such channels. For a class of interference channels, we show that an equivocation sumrate that is within two bits of the maximum possible legitimate communication sum-rate is achievable using lattice codes. 1 I.
Digital Watermarking for Protection of Intellectual Property
, 2005
"... Digital watermarking techniques have been developed to protect the copyright of media signals. This chapter aims to provide a universal review and background about the watermarking definition, concept and the main contributions in this field. The chapter starts with a general view of digital data, t ..."
Abstract
-
Cited by 6 (0 self)
- Add to MetaCart
Digital watermarking techniques have been developed to protect the copyright of media signals. This chapter aims to provide a universal review and background about the watermarking definition, concept and the main contributions in this field. The chapter starts with a general view of digital data, the Internet and the products of these two, namely, the multimedia and the e-commerce. Then, it provides the reader with some initial background and history of digital watermarking. The chapter presents an extensive and deep literature review of the field of digital watermarking and watermarking algorithms. It also highlights the future prospective of the digital watermarking.
Quantization-based semi-fragile publickey watermarking for secure image authentication
- Proc. SPIE
, 2005
"... authentication ..."
(Show Context)
Detectability and Annoyance Value of MPEG-2 Artifacts Infacts Inserted into Uncompressed Video Sequences
- in Proceedings of Human Vision and Electronic Imaging V
, 2000
"... Many approaches have been proposed recently for estimating the perceLe dfideOC y of digitally compreENW andreW(# structe vide clips. Se ep meps.E re( on the accurate eurateN3 ofde)W11#E thre1#EHN3 basically assuming that pe rceW e d qualityde e( significantly onthe e rror threWCWEH To te) that assum ..."
Abstract
-
Cited by 4 (1 self)
- Add to MetaCart
Many approaches have been proposed recently for estimating the perceLe dfideOC y of digitally compreENW andreW(# structe vide clips. Se ep meps.E re( on the accurate eurateN3 ofde)W11#E thre1#EHN3 basically assuming that pe rceW e d qualityde e( significantly onthe e rror threWCWEH To te) that assumption, we deN3O3E an eEe rime t tomeO(#W the actualdeualECN threlECN ofsome MPEG-2 artifacts in typical vide se3W)EHNN Ine ach of the te(clips,we brieC reCEHN a reC33 with a te( stimuluscreE(1 using an MPEG-2eEG deG The location,time and streW#L ofthe artifact weC varie b e we( te) vide1# Atthe ee of eE h clip,e ach subjeN provide adeCNOOEH re onse and, for the de)#C1E artifacts, location and annoyance information. From the data, we de)L1EHNC the dee)L1E thre)L1E fore ach artifact. Using the thre)EHNLL we compute a pe1)#WEHNLL we ightee rror meW(L1 In this pape r, we deC(C1 e the e e rime t inmore deeO# summarize the e e rime talreEN(L includingthe threCN(E calculations, and compare the we ight...
On the Study of Watermarking Application in WWW - Modeling, Performance Analysis, and Applications of Digital Image Watermarking Systems
, 1999
"... As the Internet becomes more and more populous, people concern more about the copyright protection issue for digital data such as images and audio. Digital watermarking technique can hide data in images or audio to indicate the data owner or recipient. Therefore, it can protect the copyright. Motiva ..."
Abstract
-
Cited by 2 (1 self)
- Add to MetaCart
As the Internet becomes more and more populous, people concern more about the copyright protection issue for digital data such as images and audio. Digital watermarking technique can hide data in images or audio to indicate the data owner or recipient. Therefore, it can protect the copyright. Motivated by copyright protection in the Internet, we propose an Internet Image Library (IIL) using watermarks to protect the copyright. With this watermarking application -- IIL in mind, we analyze and propose new watermark systems to meet this application. A lot of...
A Source and Channel Coding Framework for Vector Based Data Hiding in Video
- in Video", IEEE Trans. Circuits and Systems for Video Technology, 2000, Accepted
, 2000
"... : Digital data hiding is a technology being developed for multimedia services, where significant amounts of secure data is invisibly hidden inside a host data source by the owner, for retrieval only by those authorized. The hidden data should be recoverable even after the host has undergone standard ..."
Abstract
-
Cited by 2 (0 self)
- Add to MetaCart
(Show Context)
: Digital data hiding is a technology being developed for multimedia services, where significant amounts of secure data is invisibly hidden inside a host data source by the owner, for retrieval only by those authorized. The hidden data should be recoverable even after the host has undergone standard transformations such as compression. In this work, we present a source and channel coding framework for data hiding, allowing any trade-off between the visibility of distortions introduced, the amount of data embedded, and the degree of robustness to noise. The secure data is source coded by vector quantization, and the indices obtained in the process are embedded in the host video using orthogonal transform domain vector perturbations. Transform coefficients of the host are grouped into vectors and perturbed using noise-resilient channel codes derived from multidimensional lattices. The perturbations are constrained by a maximum allowable mean-squared error that can be introduced in the ho...