Ograniczanie wyników
Czasopisma help
Autorzy help
Lata help
Preferencje help
Widoczny [Schowaj] Abstrakt
Liczba wyników

Znaleziono wyników: 30

Liczba wyników na stronie
first rewind previous Strona / 2 next fast forward last
Wyniki wyszukiwania
Wyszukiwano:
w słowach kluczowych:  watermarking
help Sortuj według:

help Ogranicz wyniki do:
first rewind previous Strona / 2 next fast forward last
PL
W artykule przedstawiamy metodę ukrywania danych w obrazach z użyciem sieci generatywnych - GAN (Generative Adversarial Networks), do generowania obrazów zawierających ukryte dane. Proponowana metoda pozwala na efektywne ukrywanie danych w obrazach, co może znaleźć zastosowanie w wielu dziedzinach, takich jak ochrona prywatności, steganografia, czy znakowanie wodne. Przedstawione w artykule wyniki stanowią podstawę do dalszych badań nad ulepszaniem metody i jej zastosowaniem w praktyce.
EN
This paper presents a method for hiding data in images using Generative Adversarial Networks (GAN) to generate images with secret data. The proposed method makes it possible to hide data in images effectively, which can find applications in many fields, such as privacy protection, steganography, and watermarking. The results presented in the article provide a basis for further research on improving the method and its application in practice.
PL
W artykule przedstawiono innowacyjny algorytm ukrywania danych w obrazach oparty na klasyfikacji. Metoda pozwala na niezauważalne dla ludzkiego oka ukrycie danych, a jednocześnie zapewnia możliwość ich późniejszego wykrycia i rozpoznania bez konieczności posiadania klucza lub oryginalnego obrazu. Przeprowadzone eksperymenty potwierdzają skuteczność i niezawodność tej metody w porównaniu z innymi algorytmami. Proponowane rozwiązanie może się przyczynić do rozwoju takich dziedzin jak: bezpieczeństwo informacyjne, ochrona prywatności, autoryzacja i znakowanie wodne.
EN
The article presents an innovative algorithm for data hiding in images based on classification. The method allows imperceptible data hiding to the human eye while also providing the ability to later detect and recognise the hidden data without needing a key or the original image. The conducted experiments confirm the effectiveness and reliability of this method compared to other algorithms. The proposed solution can contribute to developing fields such as information security, privacy protection, authentication, and watermarking.
EN
In order to solve the security problems associated with medical information and improve the robustness of watermarking algorithms for medical images, a unique approach to watermarking based on block operations is presented. This study considers the medical images as the cover image, with the watermark logo considered secret information that needs to be protected over the wireless transmission in telemedicine. In the embedding phase, input with the discrete fractional Fourier transform is first applied to the input, and then level 2 wavelet decomposition is carried out to determine the optimal sub-band tree. For each tree node on level 2, the approximated and detailed coefficient is determined through the feature analysis perspective. The novelty of the adopted methodology is its simplified transformation and embedding process. Upon receiving a complex matrix, it separates the real part from imaginary part where block transformation is carried out for embedding the watermark pixels. In the extraction phase, just a reverse operation is performed. The watermarking evaluation is performed by simulating various image processing attacks on watermarked medical images. The simulation outcome demonstrates the effectiveness of that proposed watermarking scheme against various attacks. The proposed watermarking technique is robust under various attacks based on image statistics such as PSNR, BER, and the correlation coefficient.
EN
The article is devoted to the analysis of watermarking algorithms in terms of their use in marking medical images. The algorithms based on the Integer Wavelet Transform (IWT), Discrete Cosine Transform (DCT), and Singular Value Decomposition (SVD) were compared. The algorithms were implemented using the combinations: IWT, IWT-DCT, and IWT-SVD. As part of the research, the level of disturbances caused by embedding the watermark was checked using subjective and objective methods. The attack resistance of the watermarked images was tested and the steganographic capacity was measured. All algorithms are based on IWT, however, each has different advantages. The algorithm based on the IWT showed the highest capacity. The most resistant to attacks is IWT-SVD, and the lowest level of interference was obtained for the IWT-DCT algorithm.
PL
Artykuł poświęcono analizie algorytmów znakowania wodnego pod kątem wykorzystania w znakowaniu obrazów medycznych. Porównano algorytmy oparte o całkowitą transformatę falkową (IWT), dyskretną transformatę kosinusową (DCT) i rozkład według wartości osobliwych (SVD). Zaimplementowano algorytmy stosując kombinacje: IWT, IWT-DCT i IWT-SVD. W ramach badań sprawdzono poziom zakłóceń spowodowanych osadzaniem znaku wodnego przy pomocy metod subiektywnych i obiektywnych. Przeprowadzono badania odporności oznakowanych obrazów na ataki i zmierzono pojemność steganograficzną. Wszystkie algorytmy bazują na IWT, jednakże każdy z nich ma inne zalety. Największą pojemność wykazał algorytm oparty o IWT. Najodporniejszy na ataki jest IWT-SVD, a najmniejszy poziom zakłóceń uzyskano dla algorytmu IWT-DCT.
EN
A robust and highly imperceptible audio watermarking technique is presented to secure the electronic patient record of Parkinson’s Disease (PD) affected patient. The proposed DCT-SVD based watermarking technique introduces minimal changes in speech such that the accuracy in classification of PD affected person’s speech and healthy person’s speech is retained. To achieve high imperceptibility the voiced part of the speech is considered for embedding the watermark. It is shown that the proposed watermarking technique is robust to common signal processing attacks. The practicability of the proposed technique is tested: by creating an android application to record & watermark the speech signal. The classification of PD affected speech is done using Support Vector Machine (SVM) classifier in cloud server.
EN
Digital speech copyright protection and forgery identification are the prevalent issues in our advancing digital world. In speech forgery, voiced part of the speech signal is copied and pasted to a specific location which alters the meaning of the speech signal. Watermarking can be used to safe guard the copyrights of the owner. To detect copy-move forgeries a transform domain watermarking method is proposed. In the proposed method, watermarking is achieved through Discrete Cosine Transform (DCT) and Quantization Index Modulation (QIM) rule. Hash bits are also inserted in watermarked voice segments to detect Copy-Move Forgery (CMF) in speech signals. Proposed method is evaluated on two databases and achieved good imperceptibility. It exhibits robustness in detecting the watermark and forgeries against signal processing attacks such as resample, low-pass filtering, jittering, compression and cropping. The proposed work contributes for forensics analysis in speech signals. This proposed work also compared with the some of the state-of-art methods.
EN
Watermarking in digital contents has gained the more attraction in research community. In this approach copyright information is concealed in to the concatenated square region of an image under wavelet domain, initially original image is undergoing an alternative pixel sharing approach and one of the shares undergo the circular column shift further, concatenates those shares. Next, square region is obtained by capturing the half of the row value in the last part of first share and the first part of second share which forms a square image. To enrich the robustness of the technique, watermarking is under consideration only in the folded square under wavelet. Further, the reverse process is carried out to generate the watermarked image. To show ownership, original and watermarked image have undergone the same operation and acquire the copyright information. Experimental results indicate that the proposed approach is robust against image processing attacks.
EN
The applications of different dimension of multimedia have been grown rapidly on daily basis. Digital media brings about the changes in the conveniences to the people, The cons of this technology is security threat if that security issue exist there is no meaning of conveniences We have segmented the proposed work in such a way unlike conventional approach the module of work includes sub-plotting the image in three directional coordinates plot(x), plot (g), plot(y). The security of information may have the distinct dimension in growing effective techniques to discourage the unauthenticated technique of duplication of virtual signals. Digital watermarking is the mathematical technique of embedding information right into a virtual signal in a way that it is difficult to eliminate. in order to overcome this, robust dwt watermarking approach is proposed. We've contemplated a way a good way to use t the temporary statistics to apply the inversion of dwt in row way and decompose the picture in the same length of width and height. Robustness can be defined as a watermark to stay unaffected even if digital content is passed thru diverse approaches and attacks. we've got proposed invisible sturdy watermarking for you to proved to be is the most accurate method. in conjunction with conventional technique embed a watermark containing key facts consisting of authentication codes.We have considered different dynamic conditions where the copyright and basic constituent of distributed images/photos is violated. Handiest one picture in active mode and all different is inactive mode. Since the images/pics posted on social networks or any networks are normally changed and/or compressed to the original template supplied through the carrier carriers, we suggest a digital photo watermarking based on dwt coefficients modification for use for such snapshots/images. we've got carry out the watermarking with proposed approach for the bilateral method which means for encrypting the digital information and for retrieval of the original information from the encoded dataset have alerted the convention concept of Dwt by adding an Adaptive filter into it for extracting the data.The contemplated approach has reduced the noise and unnecessary constituent to provide better efficiency and retrieve the accurate original image without distorting the pixel vectors.
EN
This paper proposes and evaluates a watermarking-based approach to certify the authenticity of iris images when they are captured by a genuine equipment. In the proposed method, the iris images are secretly signed before being used in biometric processes, and the resulting signature is embedded into the JPEG carrier image in the DCT domain in a data-dependent way. Any alteration of the original (certified) image makes the signature no longer corresponding to this image and this change can be quickly identified at the receiver site. Hence, it is called fragile watermarking to differentiate this method from regular watermarking that should present some robustness against image alterations. There is no need to attach any auxiliary signature data, hence the existing, already standardized transmission channels and storage protocols may be used. The embedding procedure requires to remove some part of the original information. But, by using the BATH dataset comprising 32 000 iris images collected for 1 600 distinct eyes, we verify that the proposed alterations have no impact on iris recognition reliability, although statistically significant, small differences in genuine score distributions are observed when the watermark is embedded to both the enrollment and verification iris images. This is a unique evaluation of how the watermark embedding of digital signatures into the ISO CROPPED iris images (during the enrollment, verification or both) influences the reliability of a well-established, commercial iris recognition methodology. Without loss in generality, this approach is targeted to biometric-enabled ID documents that deploy iris data to authenticate the holder of the document.
EN
The paper shows relations between Cayley-Dickson hypercomplex algebras and the theory of 2D and 3D signals. Basics concerning properties of quaternions and octonions and chosen applications are described. The latest results of research in the domain of complex and hypercomplex multidimensional analytic signals are presented.
PL
Pokazano związki pomiędzy hiper zespolonymi algebrami Cayleya-Dicksona a teorią sygnałów 2- i 3-wymiarowych. Przypomniano podstawowe własności kwaternionów i oktonionów oraz opisano ich przykładowe zastosowania. Przedstawiono uzyskane ostatnio wyniki w dziedzinie zespolonych i hiper zespolonych analitycznych sygnałów wielowymiarowych.
EN
One of the steganography areas is digital watermarking. In this paper, the technique of comparative analysis of embedding information methods into an image was proposed. A comprehensive analysis of the most relevant steganographic methods of hiding information was made. Own method of embedding information in still images was synthesized. The possibility of studied methods to adapt to the real channels was evaluated for the first time. The robustness and security of steganographic systems based on the proposed method were also demonstrated.
PL
Jednym z obszarów steganografii jest osadzanie cyfrowych znaków wodnych. W niniejszej pracy zaproponowano metodykę analizy porównawczej metod osadzania informacji w obrazach. Została dokonana wszechstronna analiza najnowszych metod ukrywania informacji za pomocą steganografii. Opracowano własną metodę osadzania informacji w nieruchomych obrazach. Oceniono możliwość adaptowania się metod do charakterystyk rzeczywistych kanałów komunikacyjnych. Wykazano wiarygodność i bezpieczeństwo systemów steganograficznych wykorzystujących proponowaną metodę.
PL
Artykuł prezentuje przegląd współczesnych metod steganograficznych stosowanych w różnych zastosowaniach steganografii, takich jak: znakowanie wodne, tajna komunikacja, odciski palca, tworzenie ukrytych wolumenów danych. Każda grupa zastosowań została scharakteryzowana pod kątem wymagań kluczowych ze względu na pełnione funkcje.
EN
Some modern steganographic techniques are presented in the article. These methods can be used for various purposes: hidden communication, watermark-ing, fingerprinting, hidden data volumes creation. The most important requirements for each of the above applications were examined and are presented.
EN
In this paper a new idea of digital images fingerprinting is proposed. The method is based on quaternion encryption in the Cipher Block Chaining (CBC) mode. Quaternions are hyper-complex numbers of rank 4 and thus often applied to mechanics in three-dimensional space. The encryption algorithm described in the paper is designed for graytone images but can easily be adopted for color ones. For the encryption purpose, the algorithm uses the rotation of data vectors presented as quaternions in a three-dimensional space around another quaternion (key). On the receiver's side, a small amount of unnoticeable by human eye errors occurs in the decrypted images. These errors are used as a user's digital figerprint for the purpose of traitor tracing in case of copyright violation. A computer-based simulation was performed to scrutinize the potential presented quaternion encryption scheme for the implementation of digital fingerprinting. The obtained results are shown at the end of this paper.
EN
In this paper the combination of fingerprint verification methods with watermarking technology to provide copyright protection and authentication of digital images is proposed. The goal of this study is to investigate how watermarking processing affects the quality of biometric watermarks. Performed experiments showed that extracted fingerprint images have roughly equal verification performance even if some watermarked images undergo additional degradation. Proposed methodology will be improved using more sophisticated fingerprint verification methods and subsequently incorporated into multimodal watermarking schemes.
EN
Recently, a variety of digital watermarking schemes have been developed for copyright protection of digital images. In robust watermarking, which is used in copyright protection, transform-based algorithms are used to ensure resilience of the watermark to common signal processing attacks. The most frequently used watermarking algorithms for additive watermark embedding involve DCT, DFT, SVD and DWT domains. In this article we verify which domain is optimal for robust, the additive watermark embedding scheme. We demonstrate that in additive watermark embedding the embedding domain plays more important role than the embedding formula.
EN
The problem of real time requirements especially refers to digital video watermarking algorithms. This paper contains a description of the algorithm consisting of real time coding process in the luminance component in the spatial domain and not real time decoding process in the two dimensional Cepstrum domain. The algorithm makes the single I-frame robust against the following attacks: MJPEG compression, cropping, affine transform (two-dimensional shearing, rotation, translation). Also the Receiver Operating Curves have been performed for the above mentioned attacks. Watermarked digital stream is robust against desynchronization attack.
PL
Wymóg pracy w czasie rzeczywistym jest szczególnie ważny w znakowaniu wodnym cyfrowych strumieni wideo. Artykuł zawiera opis algorytmu znakującego w czasie rzeczywistym macierzy luminancji w dziedzinie przestrzeni. Proces dekodowania odbywa się w dwuwymiarowej przestrzeni Cepstralnej. Metoda znakująca uodparnia pojedynczą I-klatkę na ataki: kompresji MJPEG, przycinanie, przekształcenia afiniczne (dwuwymiarowe skręcenie, rotację, translację). Ponadto algorytm jest odporny na atak desynchronizacji. Dla przeprowadzonych ataków obliczono Charakterystyki Operacyjne ukazujące efektywność metody.
17
Content available remote Ślepe znakowanie cyfrowych obrazów ruchomych
PL
Dynamiczny rozwój współczesnych systemów dystrybucji cyfrowych danych, zwłaszcza wideo, zdjęć, muzyki oraz tekstu wymusza gwałtowny rozwój technik umożliwiających ich kontrole. Znane są one pod nazwą systemu DRM (Digital Rights Management). Jedną z dostępnych technologii wykorzystywanych w DRM jest znakowanie. Szczególnie ważne jest zapewnienie wysokiej odporności oznaczonych multimediów na ataki uniemożliwiające odczyt dodatkowej informacji o autorze. Dodatkowo użyte przekształcenia oryginalnych obrazów ruchomych muszą być bezwzględnie niedostrzegalne.
EN
Dynamic development of the present digital data distribution systems, especially the ones concerning video, photos, music and texts, forces the violent development of technologies enabling their controlling. They are known under the name of the DRM (Digital Rights Management) system. One of the available technologies used in DRM system is marking. Particularly important is ensuring high resistance to attacks that try to make the read-out of any supplementary information about the author impossible. Additionaly used results of original moving images processing must be utterly imperceptible.
EN
The paper presents a practical implementation of the non-classified data hiding system (NDHS) understood as a military platform for information warfare that takes advantage of the hidden data transmission for voice connections in order to gain informational lead over a potential enemy. The NDHS performs here as a botnet network that is managed by the hidden transmission controller referred to as the master resident. Research studies are dedicated to investigation of various connections in heterogeneous links as well as functionalities of such components as hidden protocol bridges and the master resident.
19
EN
Structural image features are exploited to construct perceptual image hashes in this work. The image is first preprocessed and divided into overlapped blocks. Correlation between each image block and a reference pattern is calculated. The intermediate hash is obtained from the correlation coefficients. These coefficients are finally mapped to the interval [0, 100], and scrambled to generate the hash sequence. A key component of the hashingmethod is a specially defined similarity metric to measure the "distance" between hashes. This similarity metric is sensitive to visually unacceptable alterations in small regions of the image, enabling the detection of small area tampering in the image. The hash is robust against content-preserving processing such as JPEG compression, moderate noise contamination, watermark embedding, re-scaling, brightness and contrast adjustment, and low-pass filtering. It has very low collision probability. Experiments are conducted to show performance of the proposed method.
20
Content available Watermarking software in practical applications
EN
In the recent years, several digital watermarking applications have been developed for copyright protection of digital images. In this article we have tested how they perform in practical applications. We have identified the most common operations performed by professional photographers and web developers, and tested the robustness of watermarks embedded using the applications for copyright watermarking. Our aim was to prove that commercially available software does not meet the requirements of photography and web industry. We have also identified areas in which the software should be improved in order to meet current and future requirements of the industry.
first rewind previous Strona / 2 next fast forward last
JavaScript jest wyłączony w Twojej przeglądarce internetowej. Włącz go, a następnie odśwież stronę, aby móc w pełni z niej korzystać.