8 research outputs found

    Optimizing Robustness and Invisibility in Digital Image Watermarking: A SVM-Based Multi-Level DWT and SVD Approach

    Get PDF
    This research introduces a new digital image watermarking approach that utilizes discrete wave transformation (DWT), Support vector machine, and singular value decomposition. The method improves robustness under various assault situations by using the SVM classifier during watermark extraction. Multi-level DWT splits the host picture into sub-bands when embedding, and the coefficients are used as input for SVM. After SVD, the scaling factor embeds the watermark. Comparing the proposed approach to existing research under various attacks, the experimental findings demonstrate that it strikes an equilibrium between robustness and invisibility for watermarks of varying sizes. Support Vector Machine is a contemporary category of machine learning techniques that is extensively employed for the purpose of solving classification problems

    Color Image Watermarking Based on Radon Transform and Jordan Decomposition

    Get PDF
    Digital watermarking has been widely used for ownership identification and copyright protection. In this chapter, a color image watermarking method based on Radon transform (RT) and Jordan decomposition (JD) is proposed. Initially, the host color image is converted into L*a*b* color space. Then, the b* channel is selected and it is divided into 16 × 16 non-overlapping blocks. RT is applied to each of these blocks. JD is applied to the selected RT coefficients of each block represented in m × n matrix. Watermark data is embedded in the coefficients of the similarity transform matrix obtained from JD using a new quantization equation. Experimental results indicate that the proposed method is highly robust against various attacks such as noise addition, cropping, filtering, blurring, rotation, JPEG compression etc. In addition, it provides high quality watermarked images. Moreover, it shows superior performance than the state-of-the-art methods reported recently in terms of imperceptibility and robustness

    Application Analyses of Visual Information Processing Techniques in E-Commerce

    Get PDF
    Digital visual information plays a very important role in E-Commerce (EC). Their usage brings forth many novel research topics for digital visual information processing skills and software. Some issues of application analysis of image/video information processing techniques suitable for EC are described in the paper. Visual design for goods or services trading, image retrieval based on visual contents, applications of images to the trade safety on the Internet, 3-dimensional display, virtual reality for goods browsing, inquiry based on image and video contents, trade safety and copyright protection of digital works based on digital watermarking are mainly discussed which are considered as the technological solutions that could enhance EC

    Image and Video Forensics

    Get PDF
    Nowadays, images and videos have become the main modalities of information being exchanged in everyday life, and their pervasiveness has led the image forensics community to question their reliability, integrity, confidentiality, and security. Multimedia contents are generated in many different ways through the use of consumer electronics and high-quality digital imaging devices, such as smartphones, digital cameras, tablets, and wearable and IoT devices. The ever-increasing convenience of image acquisition has facilitated instant distribution and sharing of digital images on digital social platforms, determining a great amount of exchange data. Moreover, the pervasiveness of powerful image editing tools has allowed the manipulation of digital images for malicious or criminal ends, up to the creation of synthesized images and videos with the use of deep learning techniques. In response to these threats, the multimedia forensics community has produced major research efforts regarding the identification of the source and the detection of manipulation. In all cases (e.g., forensic investigations, fake news debunking, information warfare, and cyberattacks) where images and videos serve as critical evidence, forensic technologies that help to determine the origin, authenticity, and integrity of multimedia content can become essential tools. This book aims to collect a diverse and complementary set of articles that demonstrate new developments and applications in image and video forensics to tackle new and serious challenges to ensure media authenticity
    corecore