scholarly journals Security for Watermark Image

2013 ◽  
Vol 3 (1) ◽  
pp. 77-82
Author(s):  
Prof. Dr. K. N Barbole ◽  
Prof. S.D. Satav

This paper through security will improve the capacity of invisible watermarked data. The watermark image hiding secret bits of information with a digital content as a cover. Most important objectives of information hiding research are that secret information is embedding as much as possible without the perception of the carrier is affected. A hiding information algorithm of LSB bit based on high frequency domain in color image is proposed, which has high imperceptibility and high capacity of information hiding

2015 ◽  
Vol 2015 ◽  
pp. 1-10 ◽  
Author(s):  
Minghai Yao ◽  
Miao Qi ◽  
Yugen Yi ◽  
Yanjiao Shi ◽  
Jun Kong

A novel biometric authentication information hiding method based on the sparse representation is proposed for enhancing the security of biometric information transmitted in the network. In order to make good use of abundant information of the cover image, the sparse representation method is adopted to exploit the correlation between the cover and biometric images. Thus, the biometric image is divided into two parts. The first part is the reconstructed image, and the other part is the residual image. The biometric authentication image cannot be restored by any one part. The residual image and sparse representation coefficients are embedded into the cover image. Then, for the sake of causing much less attention of attackers, the visual attention mechanism is employed to select embedding location and embedding sequence of secret information. Finally, the reversible watermarking algorithm based on histogram is utilized for embedding the secret information. For verifying the validity of the algorithm, the PolyU multispectral palmprint and the CASIA iris databases are used as biometric information. The experimental results show that the proposed method exhibits good security, invisibility, and high capacity.


2021 ◽  
Vol 1802 (3) ◽  
pp. 032027
Author(s):  
Zhenjie Bao ◽  
Yadong Jin ◽  
Yue Liu ◽  
Jingyun Hu

Complexity ◽  
2020 ◽  
Vol 2020 ◽  
pp. 1-12
Author(s):  
Xi-Yan Li ◽  
Xia-Bing Zhou ◽  
Qing-Lei Zhou ◽  
Shi-Jing Han ◽  
Zheng Liu

With the development of cloud computing, high-capacity reversible data hiding in an encrypted image (RDHEI) has attracted increasing attention. The main idea of RDHEI is that an image owner encrypts a cover image, and then a data hider embeds secret information in the encrypted image. With the information hiding key, a receiver can extract the embedded data from the hidden image; with the encryption key, the receiver reconstructs the original image. In this paper, we can embed data in the form of random bits or scanned documents. The proposed method takes full advantage of the spatial correlation in the original images to vacate the room for embedding information before image encryption. By jointly using Sudoku and Arnold chaos encryption, the encrypted images retain the vacated room. Before the data hiding phase, the secret information is preprocessed by a halftone, quadtree, and S-BOX transformation. The experimental results prove that the proposed method not only realizes high-capacity reversible data hiding in encrypted images but also reconstructs the original image completely.


Geophysics ◽  
1987 ◽  
Vol 52 (11) ◽  
pp. 1457-1465 ◽  
Author(s):  
E. F. Laine

Cross‐borehole seismic velocity and high‐frequency electromagnetic (EM) attenuation data were obtained to construct tomographic images of heavy oil sands in a steam‐flood environment. First‐arrival seismic data were used to construct a tomographic color image of a 10 m by 8 m vertical plane between the two boreholes. Two high‐frequency (17 and 15 MHz) EM transmission tomographs were constructed of a 20 m by 8 m vertical plane. The velocity tomograph clearly shows a shale layer with oil sands above it and below it. The EM tomographs show a more complex geology of oil sands with shale inclusions. The deepest EM tomograph shows the upper part of an active steam zone and suggests steam chanelling just below the shale layer. These results show the detailed structure of the entire plane between boreholes and may provide a better means to understand the process for in situ heavy oil recovery in a steam‐flood environment.


Author(s):  
Feng Liu ◽  
Pengpeng Luo ◽  
Zhujuan Ma ◽  
Cheng Zhang ◽  
Yiwen Zhang ◽  
...  

Radio Science ◽  
2008 ◽  
Vol 43 (4) ◽  
pp. n/a-n/a
Author(s):  
Jie Yang ◽  
Mary C. Taylor ◽  
Yu Zhang ◽  
Tapan K. Sarkar

2018 ◽  
Vol 16 (07) ◽  
pp. 1850060 ◽  
Author(s):  
Ri-Gui Zhou ◽  
Peng Liu Yang ◽  
Xing Ao Liu ◽  
Hou Ian

Most of the studied quantum encryption algorithms are based on square images. In this paper, based on the improved novel quantum representation of color digital images model (INCQI), a quantum color image watermarking scheme is proposed. First, INCQI improved from NCQI is used to represent the carrier and watermark images with the size [Formula: see text] and [Formula: see text], respectively. Secondly, before embedding, the watermarking needs to be preprocessed. That is, the watermark image with the size of [Formula: see text] with 24-qubits color information is disordered by the fast bit-plane scramble algorithm, and then further expanded to an image with the size [Formula: see text] with 6-qubits pixel information by the nearest-neighbor interpolation method. Finally, the dual embedded algorithm is executed and a key image with 3-qubits information is generated for retrieving the original watermark image. The extraction process of the watermark image is the inverse process of its embedding, including inverse embedding, inverse expand and inverse scrambling operations. To show that our method has a better performance in visual quality and histogram graph, a simulation of different carrier and watermark images are conducted on the classical computer’s MATLAB.


Sign in / Sign up

Export Citation Format

Share Document