scholarly journals Digital Image Watermarking: An Overview

2016 ◽  
Vol 9 (1) ◽  
pp. 07-11 ◽  
Author(s):  
H. B Kumar

Multimedia security is extremely significant concern for the internet technology because of the ease of the duplication, distribution and manipulation of the multimedia data. The digital watermarking is a field of information hiding which hide the crucial information in the original data for protection illegal duplication and distribution of multimedia data. The image watermarking techniques may divide on the basis of domain like spatial domain or transform domain or on the basis of wavelets. The spatial domain techniques directly work on the pixels and the frequency domain works on the transform coefficients of the image. This paper presents classification of watermarking, stages in watermarking, watermarking approaches and its applications.

Author(s):  
R. Kanthavel

Multimedia data in various forms is now readily available because of the widespread usage of Internet technology. Unauthorized individuals abuse multimedia material, for which they should not have access to, by disseminating it over several web pages, to defraud the original copyright owners. Numerous patient records have been compromised during the surge in COVID-19 incidents. Adding a watermark to any medical or defense documents is recommended since it protects the integrity of the information. This proposed work is recognized as a new unique method since an innovative technique is being implemented. The resilience of the watermarked picture is quite crucial in the context of steganography. As a result, the emphasis of this research study is on the resilience of watermarked picture methods. Moreover, the two-stage authentication for watermarking is built with key generation in the section on robust improvement. The Fast Fourier transform (FFT) is used in the entire execution process of the suggested framework in order to make computing more straightforward. With the Singular Value Decomposition (SVD) accumulation of processes, the overall suggested architecture becomes more resilient and efficient. A numerous quality metrics are utilized to find out how well the created technique is performing in terms of evaluation. In addition, several signal processing attacks are used to assess the effectiveness of the watermarking strategy.


2018 ◽  
Vol 4 (3) ◽  
pp. 5
Author(s):  
Garima Bhargava ◽  
Arun Jhapate

Digital watermarking was introduced as a result of rapid advancement of networked multimedia systems. It had been developed to enforce copyright technologies for cover of copyright possession. This technology is first used for still images however recently they need been developed for different multimedia objects like audio, video etc. Watermarking, that belong to the information hiding field, has seen plenty of research interest. There's a lot of work begin conducted in numerous branches in this field. The image watermarking techniques might divide on the idea of domain like spatial domain or transform domain or on the basis of wavelets. The copyright protection, capacity, security, strength etc are a number of the necessary factors that are taken in account whereas the watermarking system is intended. This paper aims to produce a detailed survey of all watermarking techniques specially focuses on image watermarking types and its applications in today’s world.


2020 ◽  
Vol 34 (04) ◽  
pp. 2050009 ◽  
Author(s):  
Deepika Ghai ◽  
Hemant Kumar Gianey ◽  
Arpit Jain ◽  
Raminder Singh Uppal

Nowadays, multimedia applications are extensively utilized and communicated over Internet. Due to the use of public networks for communication, the multimedia data are prone to various security attacks. In the past few decades, image watermarking has been extensively utilized to handle this issue. Its main objective is to embed a watermark into a host multimedia data without affecting its presentation. However, the existing methods are not so effective against multiplicative attacks. Therefore, in this paper, a novel quantum-based image watermarking technique is proposed. It initially computes the dual-tree complex wavelet transform coefficients of an input cover image. The watermark image is then scrambled using Arnold transform. Thereafter, in the lower coefficient input the watermark image is embedded using quantum-based singular value decomposition (SVD). Finally, the covered image is obtained by applying the inverse dual-tree complex wavelet transform on the obtained coefficients. Comparative analyses are carried out by considering the proposed and the existing watermarking techniques. It has been found that the proposed technique outperforms existing watermarking techniques in terms of various performance metrics.


1993 ◽  
Vol 23 (4) ◽  
pp. 843-858 ◽  
Author(s):  
A. Jablensky ◽  
H. Hugler ◽  
M. Von Cranach ◽  
K. Kalinov

SynopsisA meta-analysis was carried out on 53 cases of dementia praecox (DP) and 134 cases of manic-depressive insanity (MDI) originally diagnosed by Kraepelin or his collaborators in Munich in 1908. The original case material was coded in terms of Present State Examination syndromes and analysed statistically for internal consistency and discrimination between the two diagnostic entities. Kraepelin's DP and MDI were found to define homogeneous groups of disorders which could be clearly distinguished from one another. A CATEGO re-classification of the cases revealed an 80·2% concordance rate between Kraepelin's diagnoses and ICD-9. Cluster analysis of the original data reproduced closely Kraepelin's dichotomous classification of the psychoses but suggested that DP was a narrower concept than schizophrenia today, while MDI was a composite group including both ‘typical’ manic-depressive illnesses and schizoaffective disorders.


2004 ◽  
Vol 34 (1) ◽  
pp. 37-52
Author(s):  
Wiktor Jassem ◽  
Waldemar Grygiel

The mid-frequencies and bandwidths of formants 1–5 were measured at targets, at plus 0.01 s and at minus 0.01 s off the targets of vowels in a 100-word list read by five male and five female speakers, for a total of 3390 10-variable spectrum specifications. Each of the six Polish vowel phonemes was represented approximately the same number of times. The 3390* 10 original-data matrix was processed by probabilistic neural networks to produce a classification of the spectra with respect to (a) vowel phoneme, (b) identity of the speaker, and (c) speaker gender. For (a) and (b), networks with added input information from another independent variable were also used, as well as matrices of the numerical data appropriately normalized. Mean scores for classification with respect to phonemes in a multi-speaker design in the testing sets were around 95%, and mean speaker-dependent scores for the phonemes varied between 86% and 100%, with two speakers scoring 100% correct. The individual voices were identified between 95% and 96% of the time, and classifications of the spectra for speaker gender were practically 100% correct.


Author(s):  
Zihan Yuan ◽  
Qingtang Su ◽  
Decheng Liu ◽  
Xueting Zhang ◽  
Tao Yao

Sign in / Sign up

Export Citation Format

Share Document