74 research outputs found

    Blind Video Watermarking Scheme for Mpeg-4 Videos with Parity Sequences in Transform Domain

    Get PDF
    High quality video broad casting is of high demand both with DVB-2 (Digital Video Broad casting) and Internet services. But these broadcasted data is distributed without protection. Invisible mode of video watermarking is one of the solutions, here in this paper a novel approach of data embedding scheme is proposed for MPEG-4 videos with different parity check codes and processed in transform domain. A subjective and objective analysis is performed to examine the proposed approach. Experimental results on various videos have shown that LDPC (Low density parity check) code with Gold spreading sequence in transform domain outperforms when compared against the other methods

    A shape-preserving data embedding algorithm for NURBS curves and surfaces

    Full text link

    Digital Watermarking: Digital Data Hiding techniques for BMP Images

    Get PDF
    Purpose: This research evaluates the digital watermarking technology further for hide/retrieved data into the BMP file by manipulating the contents their pixel value using least significant bits (LSB) approach. Methodology: Various experiments have been applied on the pixel value of the BMP file to hide/store the maximum data. With a condition the size and the quality of the BMP file will not change. The trail and error methods have been used or applied to check the various sizes with various qualities. Findings: The study finds that the any digital data can be hiding into the BMP file by manipulating the contents of the Red Green Blue (RGB) value by applying least significant approach. Originality/Value: Due to the growing usage of multimedia content on the internet, serious issues have emerged. Counterfeiting, forgery fraud and pirating of this content are rising. The research is a mechanism which can help resolve the ownership issues for digital data

    Digital Watermarking: Digital Data Hiding techniques for BMP Images

    Get PDF
    Purpose: This research evaluates the digital watermarking technology further for hide/retrieved data into the BMP file by manipulating the contents their pixel value using least significant bits (LSB) approach. Methodology: Various experiments have been applied on the pixel value of the BMP file to hide/store the maximum data. With a condition the size and the quality of the BMP file will not change. The trail and error methods have been used or applied to check the various sizes with various qualities. Findings: The study finds that the any digital data can be hiding into the BMP file by manipulating the contents of the Red Green Blue (RGB) value by applying least significant approach. Originality/Value: Due to the growing usage of multimedia content on the internet, serious issues have emerged. Counterfeiting, forgery fraud and pirating of this content are rising. The research is a mechanism which can help resolve the ownership issues for digital data

    An Asymmetric Public Detection Watermarking Technique

    No full text
    International audienceThe new watermarking technique presented in this paper is an example of an asymmetric public detection scheme

    Visual Privacy Protection Methods: A Survey

    Get PDF
    Recent advances in computer vision technologies have made possible the development of intelligent monitoring systems for video surveillance and ambient-assisted living. By using this technology, these systems are able to automatically interpret visual data from the environment and perform tasks that would have been unthinkable years ago. These achievements represent a radical improvement but they also suppose a new threat to individual’s privacy. The new capabilities of such systems give them the ability to collect and index a huge amount of private information about each individual. Next-generation systems have to solve this issue in order to obtain the users’ acceptance. Therefore, there is a need for mechanisms or tools to protect and preserve people’s privacy. This paper seeks to clarify how privacy can be protected in imagery data, so as a main contribution a comprehensive classification of the protection methods for visual privacy as well as an up-to-date review of them are provided. A survey of the existing privacy-aware intelligent monitoring systems and a valuable discussion of important aspects of visual privacy are also provided.This work has been partially supported by the Spanish Ministry of Science and Innovation under project “Sistema de visión para la monitorización de la actividad de la vida diaria en el hogar” (TIN2010-20510-C04-02) and by the European Commission under project “caring4U - A study on people activity in private spaces: towards a multisensor network that meets privacy requirements” (PIEF-GA-2010-274649). José Ramón Padilla López and Alexandros Andre Chaaraoui acknowledge financial support by the Conselleria d'Educació, Formació i Ocupació of the Generalitat Valenciana (fellowship ACIF/2012/064 and ACIF/2011/160 respectively)

    A Robust Speaking Face Modelling Approach Based on Multilevel Fusion

    Get PDF
    corecore