SWT and Spread Spectrum Coding Based Copyright Protection Technique for Digital Images

Author(s):  
P. V. Nagarjuna ◽  
Dharmender Tyagi ◽  
Reddy B. Ramachandra
2013 ◽  
pp. 691-712
Author(s):  
Dumitru Dan Burdescu ◽  
Liana Stanescu ◽  
Marian Cristian Mihaescu

The rapid growth of digital multimedia technologies brings tremendous attention to the field of digital authentication. Digital watermarking has become widely recognized as an effective measure for copyright protection of multimedia data. The owner or the distributor of the digital images can insert a unique watermark into copies for different customers or receivers, which will be helpful to identify the source of illegal copies. In this chapter the authors present two original spatial authentication techniques for digital images. These new algorithms yield an invisible watermark that is robust to various kinds of attacks. The main principle is the utilization of a virtual (2D or 3D) graph embedded into the digital images. Then, the colors of some vertices of the virtual graph are slightly modified for obtaining the watermark. The proposed techniques modify pixels or voxels of the object by a spatial watermark insertion scheme. These techniques can be used for all kinds of digital images, color or black and white, and the new algorithms produce an invisible robust watermark. The techniques lower the computational complexity that normally rises with the traditional watermarking algorithms. This approach reduces computation and implementation complexity of the algorithms. These techniques seem to replace advantages of the transform domain techniques with those of the spatial domain techniques.


2019 ◽  
Vol 2019 ◽  
pp. 1-26 ◽  
Author(s):  
Gaoyuan Zhang ◽  
Congzheng Han ◽  
Baofeng Ji ◽  
Congyu Shi ◽  
Ping Xie ◽  
...  

In this paper, we pay our attention towards the noncoherent demodulation aspect of binary phase shift keying (BPSK) receivers for IEEE 802.15.4 wireless sensor networks (WSNs), and a carrier frequency offset invariant as well as error-floor free multiple-symbol differential detection (MSDD) strategy is proposed over the flat fading channel. This detector is an alternative to the multiple-symbol detector that has been considered almost exclusively in the past. In this new configuration, the receivers do not perform chip-level precompensation as in conventional scheme but bit-level postcompensation. That is, the bit-level autocorrelation operation is first implemented with the “raw” chip sample, and then the carrier frequency offset effect (CFOE) embedded in the achieved statistic is compensated. Correspondingly, the cumulative error in the detection metric is decreased so much that the pervasive error floor for the conventional MSDD scheme is suppressed. Also, complexity efficient estimators for the MSDD scheme are reinvestigated, analyzed, and summarized. Simulation results demonstrate that this new detection strategy may achieve rather more encouraging gain from differential and spread spectrum coding than the conventional single differential coherent detection (SDCD) scheme. The pervasive error floor is also eliminated as compared with conventional MSDD scheme even if the most simple estimator is configured under large bit observation length. Then, much transmitting energy may be saved for each chip symbol, which is practically desired for transmit-only nodes in WSNs.


Author(s):  
Josef Pieprzyk

Internet and its widespread usage for multimedia document distribution put the copyright issue in a complete new setting. Multimedia documents, specifically those installed on a web page, are no longer passive as they typically include active applets. Copyright protection safeguards the intellectual property (IP) of multimedia documents, which are either sold or distributed free of charge. In this Chapter, the basic tools for copyright protection are discussed. First, general concepts and the vocabulary used in copyright protection of multimedia documents are discussed. Later, taxonomy of watermarking and fingerprinting techniques are studied. This part is concluded by a review of the literature dealing with IP security. The main part of the chapter discusses the generic watermarking scheme and illustrates it on three specific examples: collusion-free watermarking, spread spectrum watermarking, and software fingerprinting. Future trends and conclusions close the chapter.


Sign in / Sign up

Export Citation Format

Share Document