• Aucun résultat trouvé

Watermarking schemes

Key Length Estimation of Zero-Bit Watermarking Schemes

Key Length Estimation of Zero-Bit Watermarking Schemes

... of Watermarking Secu- rity which is more in line with the cryptographic ...zero-bit watermarking schemes based on normalized correlation by estimating the region of equivalent ...these schemes ...

6

Optimization of Natural Watermarking Using Transportation Theory

Optimization of Natural Watermarking Using Transportation Theory

... the distortion point of view. This new method uses results of transportation theory: it consists in computing the optimal way to match the distribution of host contents to a distribu- tion of marked contents (given the ...

7

A robust image watermarking technique based on quantization noise visibility thresholds

A robust image watermarking technique based on quantization noise visibility thresholds

... Digital watermarking was born. Since its inception, many watermarking techniques have appeared, in all pos- sible transformed ...in watermarking literature concerns the human visual system ...based ...

64

Practical Key Length of Watermarking Systems

Practical Key Length of Watermarking Systems

... the watermarking schemes, the information leakage is not null, and as the ad- versary keeps on observing, the equivocation decreases down to 0 (discrete ...

5

Audio asymmetric watermarking technique

Audio asymmetric watermarking technique

... 1. INTRODUCTION To build a copy protection system for consumer electronic devices, we are looking for a technique, which could embed in an original content a signal commonly called watermark. Compliant devices such as ...

5

A constructive and unifying framework for zero-bit watermarking

A constructive and unifying framework for zero-bit watermarking

... zero-bit watermarking, a watermark, carrying no hidden message, is inserted in a piece of ...famous watermarking schemes are indeed solution to this ‘fundamental’ ...

28

Blind image watermarking using discrete cosine and discrete wavelet transforms

Blind image watermarking using discrete cosine and discrete wavelet transforms

... domain watermarking schemes like those based on the discrete Fourier Transform (DFT) [Pun2006; Solachidis2001 ], the discrete cosine transform (DCT) [Hernandez2000; Chu2003 ] and the discrete wavelet ...

88

Towards Robust and Secure Watermarking

Towards Robust and Secure Watermarking

... new watermarking schemes with a security oriented point of view, and then evaluating their robustness compared to state-of-the-art but unsecure tech- ...robust watermarking technique and to propose ...

8

TCQ Practical Evaluation in the Hyper-Cube Watermarking Framework

TCQ Practical Evaluation in the Hyper-Cube Watermarking Framework

... 161, rue Ada, 34392 Montpellier cedex 05, France contact: marc.chaumont@lirmm.fr ABSTRACT The Hyper-Cube watermarking has shown a high potential for high-rate robust watermarking. In this paper, we carry on ...

7

Towards Provably Robust Watermarking

Towards Provably Robust Watermarking

... Abstract. Watermarking techniques are used to help identifying copies of publicly released ...of watermarking schemes against arbitrary attackers, and the for- malization of those results in ...

17

Audio watermarking via EMD

Audio watermarking via EMD

... Fig. 2. Data structure . where is the number of IMFs and denotes the final residual. The IMFs are nearly orthogonal to each other, and all have nearly zero means. The number of extrema is decreased when going from one ...

7

Watermarking security

Watermarking security

... some watermarking schemes have bigger detection areas (for a given probability of false alarm) or more efficient embedders so that the watermarked feature vector f ...

31

A numerically stable fragile watermarking scheme for authenticating 3D models

A numerically stable fragile watermarking scheme for authenticating 3D models

... 4.2. Discussion on detecting attacks In this section we discuss the performance of this scheme on detecting the modifications on the model. The modifications men- tioned in this section include adding noise, ...

13

Robust drift-free bit-rate preserving H.264 watermarking

Robust drift-free bit-rate preserving H.264 watermarking

... bit-rate. This technique is robust against slight shift, moderate downscaling and re-compression. To keep the watermark artifacts invisible and to ensure the robustness, fidelity and robustness filters were used. In ...

40

PRIMITIVE MULTIPLE SCHEMES

PRIMITIVE MULTIPLE SCHEMES

... If dim(X) ≥ 2, the main difference with the case of curves is the presence of obstructions : given X n they are – Obstruction to the extension of a vector bundle on X n−1 to a vector bundle on X n . – Obstruction to the ...

55

Towards a Simplified Perceptual Quality Metric for Watermarking Applications

Towards a Simplified Perceptual Quality Metric for Watermarking Applications

... IRCCyN-IVC, Polytech’Nantes, rue Ch. Pauc, 44306, Nantes, FRANCE Abstract This work is motivated by the limitations of statistical quality met- rics to assess the quality of images distorted in distinct frequency range. ...

10

Adversarial frontier stitching for remote neural network watermarking

Adversarial frontier stitching for remote neural network watermarking

... (i.e., watermarking) the model using those trivial points that would significantly degrade model accuracy, the stitching algorithm first (c) identifies specific data points by the decision frontier (both ...

13

A Multi-purpose Objective Quality Metric for Image Watermarking

A Multi-purpose Objective Quality Metric for Image Watermarking

... 2. ENHANCED QUALITY METRIC The previously proposed CPA metric omitted the contrast mask- ing property of the HVS for simplicity. The contrast masking is an important feature when modeling HVS behavior, it ba- sically ...

6

Intersection theory on punctual Hilbert schemes and graded Hilbert schemes

Intersection theory on punctual Hilbert schemes and graded Hilbert schemes

... Abstract The rational Chow ring A ∗ (S [n] , Q) of the Hilbert scheme S [n] parametrising the length n zero-dimensional subschemes of a toric surface S can be described with the help of equivariant techniques. In this ...

17

2013 — Intelligent watermarking of long streams of document images

2013 — Intelligent watermarking of long streams of document images

... consider watermarking as stochastic optimization prob- lem and apply EC to such end (optimization of embedding ...of watermarking systems is that the objective functions are usually noisy ...a ...

260

Show all 571 documents...

Sujets connexes