blind extraction
Recently Published Documents


TOTAL DOCUMENTS

123
(FIVE YEARS 21)

H-INDEX

14
(FIVE YEARS 2)

Author(s):  
Jakub Janský ◽  
Zbyněk Koldovský ◽  
Jiří Málek ◽  
Tomáš Kounovský ◽  
Jaroslav Čmejla

AbstractIn this paper, we propose a novel algorithm for blind source extraction (BSE) of a moving acoustic source recorded by multiple microphones. The algorithm is based on independent vector extraction (IVE) where the contrast function is optimized using the auxiliary function-based technique and where the recently proposed constant separating vector (CSV) mixing model is assumed. CSV allows for movements of the extracted source within the analyzed batch of recordings. We provide a practical explanation of how the CSV model works when extracting a moving acoustic source. Then, the proposed algorithm is experimentally verified on the task of blind extraction of a moving speaker. The algorithm is compared with state-of-the-art blind methods and with an adaptive BSE algorithm which processes data in a sequential manner. The results confirm that the proposed algorithm can extract the moving speaker better than the BSE methods based on the conventional mixing model and that it achieves improved extraction accuracy than the adaptive method.


2021 ◽  
Vol 2128 (1) ◽  
pp. 012019
Author(s):  
A R Elshazly ◽  
Mohamed E. Nasr ◽  
M M Fouad ◽  
Fathi E. Abdel-Samie

Abstract Copyright protection and ownership verification of digital audio tracks have become increasingly important to be enabled by digital watermarking techniques. A novel high payload intelligent audio watermarking scheme with RGB color watermark image is proposed in this paper. The color watermark image is encrypted using Arnold chaotic map and passed through an adaptive scaling filter to scale the image to match the required payload. The encoding process is performed on the scaled encrypted version of the watermark image. A portion of the audio signal is used to embed a synchronization code and the other one is decomposed into short frames. These frames are processed with a two-level discrete wavelet transform (DWT), followed by a singular value decomposition (SVD) process on the approximation coefficients. The encoded watermark is inserted into the diagonal matrix using quantization index modulation (QIM). The inverse process of SVD and DWT is applied to obtain the marked audio signal. Blind extraction of the hidden information from the marked audio signal is performed in the reverse order of the embedding process. Experiments show that security, high payload, transparency and imperceptibility of the algorithm are satisfied. The robustness against several kinds of audio signal processing attacks is shown. Performance evaluation tests with SNR, BER, and FSIM are conducted.


Sensors ◽  
2021 ◽  
Vol 21 (23) ◽  
pp. 7845
Author(s):  
Mostafa M. Abdel-Aziz ◽  
Khalid M. Hosny ◽  
Nabil A. Lashin ◽  
Mostafa M. Fouda

This paper proposes a new blind, color image watermarking method using fast Walsh–Hadamard transformation (FWHT) and multi-channel fractional Legendre–Fourier moments (MFrLFMs). The input host color image is first split into 4 × 4 non-interfering blocks, and the MFrLFMs are computed for each block, where proper MFrLFMs coefficients are selected and FWHT is applied on the selected coefficients. The scrambled binary watermark has been inserted in the quantized selected MFrLFMs coefficients. The proposed method is a blind extraction, as the original host image is not required to extract the watermark. The proposed method is evaluated over many visual imperceptibility terms such as peak signal-to-noise ratio (PSNR), normalized correlation (NC), and bit error rate. The robustness of the proposed method is tested over several geometrical attacks such as scaling, rotation, cropping, and translation with different parameter values. The most widely recognized image processing attacks are also considered, e.g., compressing and adding noise attacks. A set of combination attacks are also tested to analyze the robustness of the proposed scheme versus several attacks. The proposed model’s experimental and numerical results for invisibility and robustness were superior to the results of similar watermarking methods.


Electronics ◽  
2021 ◽  
Vol 10 (14) ◽  
pp. 1655
Author(s):  
Zhongze Lv ◽  
Ying Huang ◽  
Hu Guan ◽  
Jie Liu ◽  
Shuwu Zhang ◽  
...  

Video watermarking plays a vital role in protecting the video copyright. The quantization-based methods are widely used in the existing watermarking algorithms, owing to their low computational complexity and completely blind extraction. However, most of them work poorly in resisting scaling attacks, by which the quantization value may fall outside the original quantization interval. For addressing this issue, an adaptive quantization index modulation method is proposed. The property that is associated with the ratio of the DC coefficient before and after scaling the video resolution motivates us to select the DC coefficient as the quantization value and set the size of the quantization interval by the video resolution to maintain the synchronization between them before and after scaling. Moreover, a strategy taking advantage of the high decoding reliability of the QRCode is proposed to terminate the extraction in advance, and both the embedding and the extracting process are performed in the spatial domain, which all contribute to further enhance the execution efficiency. The experimental results show that our algorithm outperforms the state-of-the-art method in terms of imperceptibility, robustness, and computational cost.


Information ◽  
2021 ◽  
Vol 12 (6) ◽  
pp. 253
Author(s):  
Amal Khalifa

Secure communication is becoming an urgent need in a digital world where tera bytes of sensitive information are sent back and forth over public networks. In this paper, we combine the power of both encryption and Steganography to build a secure channel of communication between two parties. The proposed method uses DNA sequence data as a cover to hide the secret message. The hiding process is performed in phases that start with a complementary substitution operation followed by a random insertion process. Furthermore, and before the hiding process takes place, the message is encrypted to secure its contents. Here, we propose an XOR cipher that is also based on how DNA data is digitally represented and stored. A fixed-size header is embedded right before the message itself to facilitate the blind extraction process. The experimental results showed an outstanding performance of the proposed technique, in comparison with other methods, in terms of capacity, security, as well as blind extraction.


2021 ◽  
Vol 147 ◽  
pp. 110950
Author(s):  
Yin Li ◽  
Fagang Li ◽  
Shanxiang Lyu ◽  
Meng Xu ◽  
Shiyuan Wang

2021 ◽  
Vol 13 (2) ◽  
pp. 15-26
Author(s):  
Xuecheng Gong ◽  
Wanggen Li ◽  
Wang Jing

Digital watermark technology hides copyright information in digital images, effectively protecting the copyright of digital images. At present, the color image digital watermarking algorithm still has defects such as the inability to balance robustness, invisibility and the weak anti-attack ability. Aiming at the above problems, this paper studies the digital watermarking method based on discrete wavelet transform and discrete cosine transform. Then this paper proposes a color image blind digital watermarking algorithm based on QR code. First, convert the color image from RGB space to YCbCr space, extract the Y component and perform the second-level discrete wavelet transform. secondly, block the LL2 subband and perform the discrete cosine transform. finally, use the embedding method to convert the watermark information after the Arnold transform embedded in the block. The experimental results show that the PSNR of the color image embedded with the QR code is 56.7159 without being attacked. After being attacked, its PSNR and NC values are respectively 30dB and 0.95 or more, which proves that the algorithm has good robustness and can achieve watermarking blind extraction.


Sign in / Sign up

Export Citation Format

Share Document