11 resultados para digital watermarking

em Deakin Research Online - Australia


Relevância:

100.00% 100.00%

Publicador:

Resumo:

Owners and vendors are increasingly publishing their materials in digital form. Because such materials can be exactly copied, a mechanism is required that will protect the legitimate owners of these works, by providing proof of original ownership. Digital watermarking has now become one accepted method of establishing ownership of digital materials. The owner of a work embeds a pattern, called a digital watermark, in the content. This embedded watermark is normally undetectable, but its presence can be demonstrated by the owner of the work or his agent, thereby proving ownership. Digital watermarking has been used for many types of multimedia content, primarily audio, video and flat images. Recently, interest has been shown in applying digital watermarking schemes to 3D surfaces, in various formats. In this paper, we examine a method whereby a digital watermark can be embedded in a Bezier surface. A prototype watermarking method for such surfaces is presented, with some experimental results, and a discussion of directions for future research.

Relevância:

70.00% 70.00%

Publicador:

Resumo:

This paper presents a novel rank-based method for image watermarking. In the watermark embedding process, the host image is divided into blocks, followed by the 2-D discrete cosine transform (DCT). For each image block, a secret key is employed to randomly select a set of DCT coefficients suitable for watermark embedding. Watermark bits are inserted into an image block by modifying the set of DCT coefficients using a rank-based embedding rule. In the watermark detection process, the corresponding detection matrices are formed from the received image using the secret key. Afterward, the watermark bits are extracted by checking the ranks of the detection matrices. Since the proposed watermarking method only uses two DCT coefficients to hide one watermark bit, it can achieve very high embedding capacity. Moreover, our method is free of host signal interference. This desired feature and the usage of an error buffer in watermark embedding result in high robustness against attacks. Theoretical analysis and experimental results demonstrate the effectiveness of the proposed method.

Relevância:

40.00% 40.00%

Publicador:

Resumo:

This paper presents a novel patchwork-based embedding and decoding scheme for digital audio watermarking. At the embedding stage, an audio segment is divided into two subsegments and the discrete cosine transform (DCT) coefficients of the subsegments are computed. The DCT coefficients related to a specified frequency region are then partitioned into a number of frame pairs. The DCT frame pairs suitable for watermark embedding are chosen by a selection criterion and watermarks are embedded into the selected DCT frame pairs by modifying their coefficients, controlled by a secret key. The modifications are conducted in such a way that the selection criterion used at the embedding stage can be applied at the decoding stage to identify the watermarked DCT frame pairs. At the decoding stage, the secret key is utilized to extract watermarks from the watermarked DCT frame pairs. Compared with existing patchwork watermarking methods, the proposed scheme does not require information of which frame pairs of the watermarked audio signal enclose watermarks and is more robust to conventional attacks.

Relevância:

40.00% 40.00%

Publicador:

Resumo:

This research presents a novel rank based image watermarking method and improved moment based and histogram based image watermarking methods. A high-frequency component modification step is also proposed to compensate the side effect of commonly used Gaussian pre-filtering. The proposed methods outperform the latest image watermarking methods.

Relevância:

30.00% 30.00%

Publicador:

Resumo:

This paper deals with the problem of digital audio watermarking using echo hiding. Compared to many other methods for audio watermarking, echo hiding techniques exhibit advantages in terms of relatively simple encoding and decoding, and robustness against common attacks. The low security issue existing in most echo hiding techniques is overcome in the timespread echo method by using pseudonoise (PN) sequence as a secret key. In this paper, we propose a novel sequence, in conjunction with a new decoding function, to improve the imperceptibility and the robustness of time-spread echo based audio watermarking. Theoretical analysis and simulation examples illustrate the effectiveness of the proposed sequence and decoding function.

Relevância:

30.00% 30.00%

Publicador:

Resumo:

In Piva et al's watermarking scheme for electronic copyright management system (ECMS), authors were considered trusted potentially, so a dishonest author could authorize more than one distributor to sell her one document, named "One Document to Multi-distributor" problem, which would damage the benefit of the distributors. To resolve the problem, in this paper, we propose an enhanced watermarking protocol based on Piva et al's scheme by introducing document nature code (DNC) and register records table. In addition, our protocol offers the distributor an efficient means to verify his right to an authorized digital document.

Relevância:

30.00% 30.00%

Publicador:

Resumo:

In the existing watermarking protocols, a trusted third party (TTP) is introduced to guarantee that a protocol is fair to both the seller and buyer in a digital content transaction. However, the TTP decreases the security and affects the protocol implementation. To address this issue, in this article a secure buyer–seller watermarking protocol without the assistance of a TTP is proposed in which there are only two participants, a seller and a buyer. Based on the idea of sharing a secret, a watermark embedded in digital content to trace piracy is composed of two pieces of secret information, one produced by the seller and one by the buyer. Since neither knows the exact watermark, the buyer cannot remove the watermark from watermarked digital content, and at the same time the seller cannot fabricate piracy to frame an innocent buyer. In other words, the proposed protocol can trace piracy and protect the customer’s rights. In addition, because no third party is introduced into the proposed protocol, the problem of a seller (or a buyer) colluding with a third party to cheat the buyer (or the seller), namely, the conspiracy problem, can be avoided.

Relevância:

30.00% 30.00%

Publicador:

Resumo:

A trusted third party introduced in watermarking protocols would decrease the security and affect the implementation of the protocols. In this paper, a new watermarking protocol with an un trusted third party (UTTP) was proposed. Based on the idea of all-o>nothing disclosure of secret (ANDOS), all of the buyer, the seller and the third party didn't know the exact watermark, which was embedded in a digital content for tracing piracy. The proposed protocol pro vided mechanisms to trace piracy and protect customer's right, fn addition, the problem that a seller colluded with UTTP to frame the buyer, namely, the conspiracy problem, could be avoided.

Relevância:

30.00% 30.00%

Publicador:

Resumo:

A robust audio watermarking method based on the time-spread (TS) echo hiding scheme is proposed. Compared with existing TS watermarking methods, the approach is more robust as it exploits the characteristics of host signals in the encoding stage. Theoretical analysis and simulation examples demonstrate the effectiveness and advantages of the method.

Relevância:

30.00% 30.00%

Publicador:

Resumo:

High embedding capacity is desired in digital image watermarking. In this paper, we propose a novel rank-based image watermarking method to achieve high embedding capacity. We first divide the host image into blocks. Then the 2-D discrete cosine transform (DCT) and zigzag scanning is used to construct the coefficient sets with a secret key. After that, the DCT coefficient sets are modified using a rank-based embedding strategy to insert the watermark bits. A buffer is also introduced during the embedding phase to enhance the robustness. At the decoding step, the watermark bits are extracted by checking the ranks of the detection matrices. The proposed method is host signal interference (HSI) free, invariant to amplitude scaling and constant luminance change, and robust against other common signal processing attacks. Experimental results demonstrate the effectiveness of the proposed method.