Digital Watermarking Research Papers - Academia.edu (original) (raw)
In this paper, a new multi-attribute and high capacity imagebased watermarking technique for relational data is proposed. The embedding process causes low distortion into the data considering the usability restrictions defined over the... more
In this paper, a new multi-attribute and high capacity imagebased watermarking technique for relational data is proposed. The embedding process causes low distortion into the data considering the usability restrictions defined over the marked relation. The conducted experiments show the high resilience of the proposed technique against tuple deletion and tuple addition attacks. An interesting trend of the extracted watermark is analyzed when, within certain limits, if the number of embedded marks is small, the watermark signal far from being compromised, discretely improves in the case of tuple addition attacks. According to the results, marking 13% of the attributes and under an attack of 100% of tuples addition, 96% of the watermark is extracted. Also, while previous techniques embed up to 61% of the watermark, under the same conditions, we guarantee to embed 99.96% of the marks.
Watermarking is an important field of copyright of various electronic multimedia such as images. For images, a digital watermark is the processing of embedding information that is important for protection into the host image to obtain the... more
Watermarking is an important field of copyright of various electronic multimedia such as images. For images, a digital watermark is the processing of embedding information that is important for protection into the host image to obtain the watermark image. This paper presents watermarking methods based on hamming code. The experimental results show the improvements of the proposed watermarking methods over the existing methods.
A novel feature region selection method for robust digital image watermarking is proposed in this paper. This method aims to select a nonoverlapping feature region set, which has the greatest robustness against various attacks and can... more
A novel feature region selection method for robust digital image watermarking is proposed in this paper. This method aims to select a nonoverlapping feature region set, which has the greatest robustness against various attacks and can preserve image quality as much as possible after watermarked. It first performs a simulated attacking procedure using some predefined attacks to evaluate the robustness of every candidate feature region. According to the evaluation results, it then adopts a track-with-pruning procedure to search a minimal primary feature set which can resist the most predefined attacks. In order to enhance its resistance to undefined attacks under the constraint of preserving image quality, the primary feature set is then extended by adding into some auxiliary feature regions. This work is formulated as a multidimensional knapsack problem and solved by a genetic algorithm based approach. The experimental results for StirMark attacks on some benchmark images support our expectation that the primary feature set can resist all the predefined attacks and its extension can enhance the robustness against undefined attacks. Comparing with some well-known feature-based methods, the proposed method exhibits better performance in robust digital watermarking.
An approach to watermarking digital signals using frequency modulation-'Chirp Coding'-is considered. The principles underlying this approach are based on the use of a matched filter to reconstruct a 'chirp stream'code... more
An approach to watermarking digital signals using frequency modulation-'Chirp Coding'-is considered. The principles underlying this approach are based on the use of a matched filter to reconstruct a 'chirp stream'code that is uniquely robust. The method is generic in the sense that it can, in principle, be used for a variety of different signal (the authentication of speech and biomedical signals, for example). Further, by generating a bit stream that is signal dependent, chirp coding provides a method of self-authentication, ...
— In this time, due to fast improvement in communication technology through a internet accessing is easier. The main disturbance of digital content is to protect distribution and unauthorized copying. Audio watermarking has been proposed... more
— In this time, due to fast improvement in communication technology through a internet accessing is easier. The main disturbance of digital content is to protect distribution and unauthorized copying. Audio watermarking has been proposed as solution to this issue. Audio watermarking is a technique that hides copyright information into audiosignal without affecting original quality of audio signal. In this paper proposes audio watermarking technique to embedding and extraction procedure in DCT domain.
In recent years there has been an increased interest in audio steganography and watermarking. This is due primarily to two reasons. First, an acute need to improve our national security capabilities in light of terrorist and criminal... more
In recent years there has been an increased interest in audio steganography and watermarking. This is due primarily to two reasons. First, an acute need to improve our national security capabilities in light of terrorist and criminal activity has driven new ideas and experimentation. Secondly, the explosive proliferation of digital media has forced the music industry to rethink how they
Digital watermarking is a technique to secure privacy of digital information and it’s an important research area. There is a high risk in piracy with technology developments. Therefore, digital watermarking methods are necessary to solve... more
Digital watermarking is a technique to secure privacy of digital information and it’s an important research area. There is a high risk in piracy with technology developments. Therefore, digital watermarking methods are necessary to solve the problem of content authentication and copyright protection. Digital data is available such as images and videos. The increased value of digital content makes new challenges to secure the digital media. Several digital watermarking methods are actually proposed in special domain and transforms domain. Spatial domain methods still have relatively low-bit capacity. Frequency domain-based methods are more robust and can embed more bits for watermark. watermarking in the frequency domain includes: Discrete Cosine Transform (DCT) and Discrete Wavelet Transform (DWT). In this work, digital watermarking method for embedding and extraction copyright protection based on DWT and DCT is proposed. The two methods taking benefit from the advantages of both techniques and make one hybrid method. The combined method is applied on two-dimensional images (original cover image and watermark image). This watermarking method provides good performance and strong robustness.
Banknotes are a type of negotiable instrument which are issued by the RBI and payable to bearer on demand. It is one of the most frequently used things in our daily life for purchasing and exchanging of things. So it has more chance to... more
Banknotes are a type of negotiable instrument which are issued by the RBI and payable to bearer on demand. It is one of the most frequently used things in our daily life for purchasing and exchanging of things. So it has more chance to being counterfeited. In India, there are more cases of the counterfeit of the banknotes. Therefore in order to prevent its counterfeit, the security features are incorporated into the banknotes either during its manufacturing and its preparation. These features secure the banknotes from counterfeiting. There are number of security features that can seen under the normal light condition and help the layman to identified and find the difference between the genuine and counterfeited one. This paper makes efforts to security features which are present in our new banknotes. By adding new security features in the banknotes, government reduce the chance of counterfeiting of bank notes.
Abstract— Recently, the attention of researchers has Audio because of the audio capability to hide data. There is some research to hide data in audio using watermarking technique. Some of them tried to use the watermark technique to... more
Abstract— Recently, the attention of researchers has Audio because of the audio capability to hide data. There is some research to hide data in audio using watermarking technique. Some of them tried to use the watermark technique to protect the audio file of any tampering. The current research defined in this chapter issue by using cheap audio watermarking and preserves audio files from any tampering. It will discuss more on previous study on tamper detection. The method provides both embedding and extraction solutions. ... Keywords— LSB, DCT, Audio ...
A Knight Tour problem is an ancient puzzle which remains as a focus of current researcher. The objective of a Knight Tour algorithm is to find out a solution with construct a closed moving path by a knight for visiting each square of a... more
A Knight Tour problem is an ancient puzzle which remains as a focus of current researcher. The objective of a Knight Tour algorithm is to find out a solution with construct a closed moving path by a knight for visiting each square of a chessboard by only once. This paper proposes a new structural Knight Tour algorithm by four knights moving all together with heuristic preset rules. This new proposed method fulfills any board size of 4n+2 where n>1 with lower execution time and without the needs of any brute force method and backtracking method.
Technologies for making high-quality copies of documents are getting more available, cheaper, and more efficient. As a result, the counterfeiting business engenders huge losses, ranging to 5% to 8% of worldwide sales of brand products,... more
Technologies for making high-quality copies of documents are getting more available, cheaper, and more efficient. As a result, the counterfeiting business engenders huge losses, ranging to 5% to 8% of worldwide sales of brand products, and endangers the reputation and value of the brands themselves. Moreover, the growth of the Internet drives the business of counterfeited documents (fake IDs, university diplomas, checks, and so on), which can be bought easily and anonymously from hundreds of companies on the Web. The incredible progress of digital imaging equipment has put in question the very possibility of verifying the authenticity of documents: how can we discern genuine documents from seemingly "perfect" copies? This paper proposes a solution based on creating digital images with specific properties, called a Copy-detection patterns (CDP), that is printed on arbitrary documents, packages, etc. CDPs make an optimal use of an "information loss principle": every time an image is printed or scanned, some information is lost about the original digital image. That principle applies even for the highest quality scanning, digital imaging, printing or photocopying equipment today, and will likely remain true for tomorrow. By measuring the amount of information contained in a scanned CDP, the CDP detector can take a decision on the authenticity of the document.
The research presented in this thesis revolves around the digital watermarking and its application to medical images. Digital watermarking is an evolving technology, which has great promise for addressing multimedia information security.... more
The research presented in this thesis revolves around the digital watermarking and its application to medical images. Digital watermarking is an evolving technology, which has great promise for addressing multimedia information security. Digital medical images, on the other hand, are the outcome of the advanced imaging technology that has enabled modern health care to seamlessly offer many distant medical services. Thereby, with the remote access and distribution, medical images are subject to many complex and new legal and ethical issues. Under this circumstance, while the security need of the medical images is critical, the conventional tools seem to fall short of providing necessary protection. Digital watermarking has thus been studied to address this problem for this research.
Several research gaps have been identified. They are: (i) requirements for the watermarking of medical images are not well defined; (ii) there is no known construction of a complete or formal watermarking model that helps identify and evaluate the state-of-the-art watermarking scheme for an application; (iii) watermarking properties are not well defined and some of them (e.g., robustness, security) are naturally misinterpreted in practice; (iv) security levels of existing watermarking schemes are mostly unknown; and (iv) there is no watermark embedding scheme available which is equally suitable for various medical image modalities.
This research has started with a comprehensive literature review on digital watermarking schemes and their applications to medical images. A general watermarking model for digital image applications has then been developed and a set of fundamental watermarking properties (e.g., perceptual similarity, robustness, etc.) has been defined. Models for a set of expected attacks in digital image application scenarios have been developed using the proposed watermarking model. The current state of watermarking security has been reviewed and the need for complete security analysis of watermarking schemes has been identified. To this, three new counterfeiting attack models have been developed and validated for some image authentication schemes. Thereby, the watermarking based self-authentication schemes have been shown to violate the systematic definition of security.
For defending against the counterfeiting weaknesses and proposed attacks, a set of fundamental requirements has been determined and a tentative construction of a self-authentication scheme is proposed. Considering that construction, a novel medical image embedding scheme is developed that avoids the limitations of existing schemes. A watermarking capacity control framework is developed and validated using the asymptotic analysis. Experimental results demonstrate that the proposed scheme has higher capacity-distortion performance and more efficient capacity control ability than some prominent existing schemes. Being irreversible and general RONI (region of non-interest) based, the proposed scheme would help provide continuous security protection and minimize legal-ethical impacts, and thereby could be commercially viable in the future for different medical image applications.
This research advances knowledge in the area of digital image watermarking and its applications. Developing a formal model and defining fundamental parameters and possible attacks presented in this thesis, are the first steps toward a unified and intuitive watermarking theory. The developed model would allow a unified treatment of all practically meaningful variants of digital image watermarking schemes. The developed new attack models and their uses in rigorously analysing security of watermarking schemes can be used as principles to determine the security levels of watermarking schemes. The proposed watermarking scheme for medical images and its validation create knowledge of an efficient embedding approach, which can be used for different applications such as content authentication, tampering detection and localization, and annotation. Further, the generalized notion of watermarking capacity control and the use of asymptotic analysis for studying computational aspects of watermarking schemes would create a new era in watermarking research.
In summary, the findings, theoretical development and analyses, and experimental evidence of this research represent a comprehensive source of information, which can be assimilated and disseminated towards standardizing future research in the formal modelling, complete security analysis and computational aspects, of watermarking schemes.
Rumah makan Lesehan Damai merupakan salah satu rumah makan yang ada di kota Makassar. Saat ini seluruh transaksi masih di lakukan secara manual. Dimana semua proses pembelian dan penjualan masih menggunakan faktur dan nota yang di catat... more
Rumah makan Lesehan Damai merupakan salah satu rumah makan yang ada di kota Makassar. Saat ini seluruh transaksi masih di lakukan secara manual. Dimana semua proses pembelian dan penjualan masih menggunakan faktur dan nota yang di catat dan di arsipkan tanpa menggunakan komputer. Namun secara bertahap terus dikembangkan sebagai upaya pemenuhan kebutuhan informasi bagi manajemen yang kadang kala diperlukan secara cepat dan mendadak, padahal untuk mendapatkan informasi yang akurat diperlukan waktu proses yang relatif lama untuk menghimpunnya yang kadang kala menjadikan informasi tersebut menjadi kehilangan relevansinya serta tidak sesuai lagi dengan kondisi pada saat diperlukan.
Kebutuhan akan informasi yang cepat dan tepat serta akurat semakin dibutuhkan oleh rumah makan ini, itu dikarenakan peningkatan penjualan yang semakin menunjukan angka di atas seratus persen setiap bulannya, kenyataan ini semakin membuat pihak manajemen puncak pada rumah makan ini terus berusaha untuk mengembangkan suatu sistem informasi baru, ini dikarenakan sistem informasi yang ada sekarang sudah tidak relevan lagi dengan kondisi rumah makan saat ini dimana sistem yang ada masih mengandalkan transaksi – transaksi manual baik itu transaksi penjualan maupun transaksi pembelian bahan makanan.
Transaksi – transaksi secara manual yang selama digunakan memiliki beberapa kelemahan utama yaitu sulitnya karyawan dalam mengumpulkan, menganalisi dan membuat kesimpulan tentang perkembangan rumah makan ini. Ini dikarenakan retur pembelian bahan makanan dan faktur penjualan menu masih di arsipkan secara manual, sehingga dibutuhkan waktu yang cukup banyak untuk menganalisa data tersebut untuk dijadikan acuan dalam pengambilan keputusan.
Sistem informasi transaksi adalah suatu solusi untuk permasalahan diatas, sehingga pihak manajemen puncak dapat mengetahui informasi dan penjualan setiap waktu. Dengan akan digunakannya sistem informasi baru ini diharapkan mampu memberikan solusi yang tepat untuk mengatasi masalah di atas. Sistem informasi yang akan dibangun memiliki beberapa keunggulan yang mampu mengatasi semua masalah di atas. Dimana sistem baru ini sudah menggunakan komputer sebagai media utama dalam melakukan transaksi pembelian dan penjualan. Sehingga kecepatan, ketepatan dan keakuratan informasi yang dibutuhkan pihak manajemen bisa direalisasikan. Transaksi – transaksi yang dilakukan baik itu transaksi pembelian ataupun penjualan sudah dilakukan secara komputerisasi sehingga semua order pembelian dan faktur – faktur penjualan direkam didalam komputer sehingga memudahkan pihak manajemen puncak untuk menganalisa informasi yang dihasilkan dari proses transaksi pembelian dan penjualan untuk dijadikan acuan dalam pengambilan keputusan. Sedangkan faktur – faktur penjualan dan order pembelian yang diarsipkan secara manual hanya dijadikan backup apabila terjadi sesuatu yang tak diinginkan terhadap sistem infromasi berbasis komputer ini.
Sistem informasi berbasis komputer yang akan dirancang dibagun menggunakan bahasa pemrograman Visual Basic yang memiliki beberapa keunggulan dibandingkan bahasa pemrogrman lain yaitu kemudahannya dalam melakukan koneksi dengan database manapun baik itu database yang mendukung arsitektur client server ataupun stand alone. Visual basic merupakan bahasa pemrograman yang mudah dipahami karena kemiripannya dengan bahasa manusia. Serta memiliki fitur – fitur unggulan dalam mengembangkan aplikasi dan merupakan salah satu bahasa pemrograman yang paling banyak digunakan oleh para programmer.
This book focuses on threats, especially contaminants, to drinking water and the supply system, especially in municipalities but also in industrial and even residential settings. The safety, security, and suitability landscape can be... more
This book focuses on threats, especially contaminants, to drinking water and the supply system, especially in municipalities but also in industrial and even residential settings. The safety, security, and suitability landscape can be described as dynamic and complex stemming from necessity and hence culpability due to the emerging threats and risks, vis-a-vis globalization resulting in new forms of contaminants being used due to new technologies. The book provides knowledge and guidance for engineers, scientists, designers, researchers, and students who are involved in water, sustainability, and study of security issues. This book starts out with basics of water usage, current statistics, and an overview of water resources. The book then introduces different scenarios of safety and security and areas that researchers need to focus. Following that, the book presents different types of contaminants – inadvertent, intentional, or incidental. The next section presents different methodologies of contamination sensing/detection and remediation strategies as per guidance and standards set globally. The book then concludes with selected chapters on water management, including critical infrastructure that is critical to maintaining safe water supplies to cities and municipalities. Each chapter includes descriptive information for professionals in their respective fields. The breadth of chapters offers insights into how science (physical, natural, and social) and technology can support new developments to manage the complexity resident within the evolving threat and risk landscape.
—A Knight Tour problem is an ancient puzzle which remains as a focus of current researcher. The objective of a Knight Tour algorithm is to find out a solution with construct a closed moving path by a knight for visiting each square of a... more
—A Knight Tour problem is an ancient puzzle which remains as a focus of current researcher. The objective of a Knight Tour algorithm is to find out a solution with construct a closed moving path by a knight for visiting each square of a chessboard by only once. This paper proposes a new structural Knight Tour algorithm by four knights moving all together with heuristic preset rules. This new proposed method fulfills any board size of 4n+2 where n>1 with lower execution time and without the needs of any brute force method and backtracking method.
The current inadequate drinking water services and sanitation problems have incited the need for a better management strategy by the country's water and sanitation organizations. In this study, a logical review of the water supply and... more
The current inadequate drinking water services and sanitation problems have incited the need for a better management strategy by the country's water and sanitation organizations. In this study, a logical review of the water supply and sanitation origin and management structures was done to suggest a plausible management option in Nigeria. The paper also revealed that the overall management practices of these organizations at the three tiers of governments (federal, states and local) is very poor and uncoordinated which have resulted in low level of water and sanitation coverage. Thus, in order to ameliorate these problems, the study recommends sector wide reforms with the aim of radical improvement in the management processes of these organizations. Other
proposed improvement strategies include: private sector participation, effective and reasonable tariff regime for effective cost recovery, increment in political support and leadership commitment, introduction of benchmarking amongst the utilities to encourage healthy competition, strengthening of the legislative and institutional framework- that will enhance the autonomy of these organizations, improvement in the issues of accountability, transparency and stakeholders involvement in the activities of these organizations. It is hoped that the adoption and implementation of these strategies will lead to attainment of improved and sustainable water supply and sanitation coverage that will meet current and future demands.
Nowadays data leakage is a major issue which is causing a great loss in the IT world. That's why it should be protected thus decreasing the loss. A huge amount of data is being transferred on a daily basis, so it must be protected. To... more
Nowadays data leakage is a major issue which is causing a great loss in the IT world. That's why it should be protected thus decreasing the loss. A huge amount of data is being transferred on a daily basis, so it must be protected. To prevent these problems lot of surveys has been done and a lot of detection systems have been created. In this paper, we are discussing abo ut some of the techniques of data leakage detection.
The research focused on the management of stormwater and sewage generated in a developed urban area - Federal University of Technology, Akure, Ondo State, Nigeria. This involved the design of sanitary sewers, stormwater collection... more
The research focused on the management of stormwater and sewage generated in a
developed urban area - Federal University of Technology, Akure, Ondo State, Nigeria. This involved the design of sanitary sewers, stormwater collection networks and a central sewage treatment plant. The total estimate of the wastewater generated from various locations was 5.067 million litres per day based on the population of approximately 26,131. The existing sewage disposal system in use in the institution was the septic tank-soakaway arrangement for individual buildings. The design of the sanitary sewers and stormwater collection networks are based on the principles of hydraulics. The results obtained were used to analyze and design the drains and pipe sizes for the open channels and the closed conduits respectively. The size of the drains for stormwater collection networks was designed with the assumption of 0.75 and 1 meter width. Also, calculations were made for square drain (depth equals width)
to be able to select practicable sizes. For optimum size solution, pipe size of 100 mm was found to be suitable for wastewater conveyance from the office areas. The sizes of pipes calculated for flows from residential quarters are too small, hence available commercial pipe sizes were selected. Wastewater samples were collected at various locations and were determined through laboratory tests to ascertain the concentrations of significant physical, chemical and biological content of the wastewater for proper selection of appropriate treatment processes. A BOD concentration of 350 mg/l and 353 mg/l obtained for residential and office areas respectively translated to high pollution load requires treatment before ultimate discharge into the receiving stream. The proposed sewage treatment plant was sited
at the lowest topographical level, far enough from the office and residential quarters. This would allow flow by gravity from the various points. The sewage treatment plant components selected include screen chamber, grit chamber, skimming tank and rectangular/circular primary settling/sedimentation tank (PST), which are designed to optimal dimensions.
This issue (DOI: 10.13140/RG.2.2.10242.07361) includes the following articles; P1151637518, Author="Géraud Azehoun-Pazou and Kokou Assogba", Title="Automatic Recognition of Lesion-like Regions in Black Skin Medical Images" P1151636515,... more
This issue (DOI: 10.13140/RG.2.2.10242.07361) includes the following articles; P1151637518, Author="Géraud Azehoun-Pazou and Kokou Assogba", Title="Automatic Recognition of Lesion-like Regions in Black Skin Medical Images" P1151636515, Author="Khalid A. Al-Afandy and EL-Sayed M. EL-Rabaie and Fathi E. Abd El-Samie and Osama S. Faragallah and Ahmed ELmhalaway and A. M. Shehata", Title="Robust Color Image Watermarking Technique Using DWT and Homomorphic based SVD" P1151638519, Author="TALLURI. SUNIL KUMAR and T.V.RAJINIKANTH and B. ESWARA REDDY", Title="Region Based Integrated Approach for Image Retrieval" P1151616490, Author="Rafika Ben Salem and Karim Saheb Ettabaa and Mohamed Ali Hamdi", Title="Spectral-Spatial Classification of Hyperspectral Image based on Oversampling and Multi-Feature Kernels"
International Conference on Information and Communications Technology 2018 (ICOIACT-2018)
In the beginning of the 21st century, we find ourselves awakening to a water crisis. The signs are everywhere. 25,000 humans a day die from lack of food and water. 6000 lives are lost each day to water borne diseases. Such losses... more
In the beginning of the 21st century, we find ourselves awakening to a water crisis. The signs are everywhere. 25,000 humans a day die from lack of food and water. 6000 lives are lost each day to water borne diseases. Such losses reflect more than disordered supply and demand, and more than inequitable distribution or lacking access to this most essential resource. Rather, they reflect a lack of will and a lack of knowledge to manage water use and abuse in an intelligent way.
In this technologically competitive world it is very important to protect the data against piracy. Past few years there is an enormous growth in accessing of internet data without knowing the originality of the information, authorization,... more
In this technologically competitive world it is very important to protect the data against piracy. Past few years there is an enormous growth in accessing of internet data without knowing the originality of the information, authorization, authentication and accessing rights. The data uploaded in internet will be safe is a big question mark. To ensure that data is authenticated and secured and have legal access there are many techniques used. The most powerful technique which is used to protect the information from unauthorized users is Digital Watermarking. Digital watermarking is very efficient in Data security and robustness. Digital water marking is the promising solution for safeguard the information.