scholarly journals Digital Watermarks with Adaptive Information Ring Width in the Issue of Hidden Transmission of a Control Signal in the Multi-Target Robotic System

2020 ◽  
Vol 24 (2) ◽  
pp. 136-152
Author(s):  
O. O. Shumskaya ◽  
A. О. Iskhakova

Purpose of research. The article is devoted to the issue of ensuring the safe transmission of control signals between the elements of a multi-agent robotic system. The purpose of the work is to provide hidden data transmission with the possibility of unambiguous extraction of control signals.Methods. To solve the task set, an algorithm based on the methods of digital watermarks and digital steganography was proposed. The method of forming a digital watermark in the form of a ring with symmetry allows not only ensuring maximum imperceptibility of embedding (insignificant distortion of the container during concealment), but also to protect the transmitted signal from such complex distortions as image rotation. The steganographic concealment method allows regulating the intensity of embedding using the force factor; it is computationally simple and straightforward. The proposed approach to identifying and understanding the transmitted signal differs from modern methods of cryptography and steganalysis in that it does not require 100% correct signal extraction. After several modifications, the method allows minimizing the time spent on formation (adaptive width of the ring with signal bits) and embedding of a digital watermark (minimization of the processed area of the container for embedding).Results. The proposed approach makes it possible to transmit control signals in a hidden way within the framework of the transmission of digital objects; the conducted experiments have shown that the control signal is unambiguously understood even with such distortions as a decrease or increase in contrast or brightness, image rotation, and compression.Conclusion. Application of the proposed technique for transmitting control signals in a multi-agent robotic system will male it possible to receive the necessary information timely and safe, with a minimum probability of loss.

2021 ◽  
Vol 3 (2 (111)) ◽  
pp. 45-56
Author(s):  
Oleksandr Makoveichuk ◽  
Igor Ruban ◽  
Nataliia Bolohova ◽  
Andriy Kovalenko ◽  
Vitalii Martovytskyi ◽  
...  

A technique for increasing the stability of methods for applying digital watermark into digital images is presented. A technique for increasing the stability of methods for applying digital watermarks into digital images, based on pseudo-holographic coding and additional filtering of a digital watermark, has been developed. The technique described in this work using pseudo-holographic coding of digital watermarks is effective for all types of attacks that were considered, except for image rotation. The paper presents a statistical indicator for assessing the stability of methods for applying digital watermarks. The indicator makes it possible to comprehensively assess the resistance of the method to a certain number of attacks. An experimental study was carried out according to the proposed method. This technique is most effective when part of the image is lost. When pre-filtering a digital watermark, the most effective is the third filtering method, which is averaging over a cell with subsequent binarization. The least efficient is the first method, which is binarization and finding the statistical mode over the cell. For an affine type attack, which is an image rotation, this technique is effective only when the rotation is compensated. To estimate the rotation angle, an affine transformation matrix is found, which is obtained from a consistent set of corresponding ORB-descriptors. Using this method allows to accurately extract a digital watermark for the entire range of angles. A comprehensive assessment of the methodology for increasing the stability of the method of applying a digital watermark based on Wavelet transforms has shown that this method is 20 % better at counteracting various types of attacks


2018 ◽  
Vol 42 (3) ◽  
pp. 483-494
Author(s):  
A. A. Sirota ◽  
M. A. Dryuchenko ◽  
E. Yu. Mitrofanova

In this paper, we present a digital watermarking method and associated algorithms that use a heteroassociative compressive transformation to embed a digital watermark bit sequence into blocks (fragments) of container images. A principal feature of the proposed method is the use of the heteroassociative compressing transformation – a mutual mapping with the compression of two neighboring image regions of an arbitrary shape. We also present the results of our experiments, namely the dependencies of quality indicators of thus created digital watermarks, which show the container distortion level, and the probability of digital watermark extraction error. In the final section, we analyze the performance of the proposed digital watermarking algorithms under various distortions and transformations aimed at destroying the hidden data, and compare these algorithms with the existing ones.


Author(s):  
M. Azrai M. Norrazi ◽  
Wee Yang Ricky Yap ◽  
Ibrahim M. H. Sanhoury ◽  
Mahdi Tousizadeh ◽  
Mohd. Muhaimin Mahmood ◽  
...  

2019 ◽  
Vol 150 ◽  
pp. 687-694 ◽  
Author(s):  
O.V. Darintsev ◽  
B.S. Yudintsev ◽  
A.Yu. Alekseev ◽  
D.R. Bogdanov ◽  
A.B. Migranov

2005 ◽  
Vol 32 (7) ◽  
pp. 649 ◽  
Author(s):  
Helena Bender

Overabundant wild populations of herbivores often present challenges to primary industry, competing with stock, and damaging crops and property. Eastern grey kangaroos (Macropus giganteus) are one of seven macropodid species that are considered a problem in agriculture in Australia. Most deterrent devices available commercially use sounds that do not occur in nature (i.e. artificial sounds), which often have a short-lived or no effect on the target species, whereas trials with biologically significant sounds are often more effective and provide greater resistance to habituation. I used a playback trial of an eastern grey kangaroo foot thump, a biologically significant signal that is given in response to a predator and is usually followed by flight. I determined its effectiveness compared with a recording of background noise (control) for deterring kangaroos over a seven-week period. Kangaroos significantly increased their vigilance levels in response to the foot thump, but not in response to the control signal. Just over 60% of kangaroos took flight in response to the foot thump and the control signals, but more kangaroos took flight in the first 3 s when the foot thump was played. The foot thump shows potential as a deterrent of eastern grey kangaroos for primary industry, and is less likely to suffer from habituation because it is a natural sound.


2021 ◽  
Author(s):  
Venkatesh S ◽  
Saravanakumar R ◽  
SureshKumar M ◽  
sivakumar B ◽  
veeramakali T

Abstract Some technologies are technologically advanced to provide security from illegal copying. Two complementary methods are encryption and watermarking. Encryption safeguards the information throughout the communication from the sender to the receiver. The data might present a distorted image after receipt and subsequent decryption. Watermarking complements encryption through embedding data openly into the image. Therefore, the watermark continuously remains existing in the data. A digital watermark is a category of indication secretly entrenched in a noise-tolerant signal similar to audio or else image information. It is indeed applied to distinguish copyright possession of such signal. Computer-aided hiding of the given digitized information in a carrier is known as watermarking. Digital watermarks possibly will be employed to validate the authenticity or integrity of a carrier signal or to determine source uniqueness. It is evidently applied for determining copyright contraventions and aimed at banknote verification. Analogous to traditional watermarks, digital watermarks are unique only beneath certain conditions. Once a digital watermark varies a carrier in a manner that it turns out to be noticeable, formerly it is of no use. The media will be visible by traditional watermarks (similar to images or else video) but the signal might be pictures, video, audio, texts or 3D models in digital watermarking. A signal can transmit some different watermarks at the equivalent time. Image watermarking is achieved in this study using two methods known as Hidden Markov Tree–Contourlet Wavelet Transform (HMT-CWT) and Haar wavelet transform – Discrete Fourier transform (HWT-DFT). In the next HWT-DFT method, a video is given as an input and it is split into two halves (audio and image). The audio is de-watermarked through Spectral Centroid Wavelet Transform and enhanced by utilizing Firefly procedure. The images is handled through HWT in addition to DFT. Then the output watermarked images and audio combined together to form a watermarked video. The obtained video is de-watermarked to produce the original copy of the video. The process of getting back the original copy by removing the watermark from the video is called as de-watermarking.


Sign in / Sign up

Export Citation Format

Share Document