Video Watermarking of Which Embedded Information Depends on the Distance between Two Signal Positions
スポンサーリンク
概要
- 論文の詳細を見る
One of the important topics of watermarking technique is a robustness against geometrical transformations. In the previous schemes, a template matching is performed or an additional signal is embedded for the recovery of a synchronization loss. However, the former requires the original template, and the latter degrades the quality of image because both a watermark and a synchronization signal must be embedded. In the proposed scheme only a synchronization signal is embedded for the recovery of both a watermark and a synchronization loss. Then the embedded information depends on the distance between two embedded signal positions. The distance is not changed seriously by random geometrical transformations like StirMark attack unless the embedded signal is disturbed. Therefore, a watermark can be extracted correctly from such geometrically transformed image if the synchronization signal can be recovered.
- 社団法人電子情報通信学会の論文
- 2003-12-01
著者
-
TANAKA Hatsukazu
Faculty of Engineering, Kobe University
-
Tanaka H
Kobe Univ. Kobe‐shi Jpn
-
KURIBAYASHI Minoru
Faculty of Engineering, Kobe University
-
Tanaka Hatsukazu
Faculty Of Engineering Kobe University
-
Kuribayashi Minoru
Division Of Information And Media Science Graduate School Of Science And Technology Kobe University
-
Kuribayashi Minoru
Faculty Of Engineering Kobe University
-
Kuribayashi Minoru
Department Of Electrical & Electronics Engineering Faculty Of Engineering Kobe University
-
Kuribayashi Minoru
Dept. Of Electrical And Electronics Engineering Faculty Of Engineering Kobe University
関連論文
- Image Size Invariant Visual Cryptography (Special Section on Information Theory and Its Applications)
- Fingerprinting Protocol Based on Distributed Providers Using Oblivious Transfer(Cryptography,Information Theory and Its Applications)
- A New Content Broadcasting System Applying Watermarking Technique
- Reversible Watermark Based on Adaptive Embedding
- Size-Reduced Visual Secret Sharing Scheme(Discrete Mathematics and Its Applications)
- Transitive Signature Scheme for Directed Trees
- Polynomial Representation of a Visual Secret Sharing Scheme and Its Application
- Fingerprinting Protocol for On-Line Trade Using Information Gap between Buyer and Merchant
- Improvement of watermark detection ability based on blockwise image compensation for geometrical distortions
- A Watermarking Scheme Applicable for Fingerprinting Protocol
- How to generate cyclically permutable codes from cyclic codes
- A Watermarking Scheme Based on the Characteristic of Addition among DCT Coefficients
- A New Anonymous Fingerprinting Scheme with High Enciphering Rate
- A Code Construction for M-Choose-T Communication over the Multiple-Access Adder Channel
- Fingerprinting protocol for images based on additive homomorphic property
- Video Watermarking of Which Embedded Information Depends on the Distance between Two Signal Positions
- A New Approach to Constructing a Provably Secure Variant of Schnorr's Identification Scheme
- Watermarking Schemes Using the Addition Property among DCT Coefficients
- A New Key Generation Method for Broadcasting System with Expiration Date
- On the Generation of Cyclic Sets from Cyclic Codes
- A Search Algorithm for Bases of Calderbank-Shor-Steane Type Quantum Error-Correcting Codes(Coding Theory)(Regular Section)
- A New Method of Measuring the Blocking Effects of Images Based on Cepstral Information
- Identity-Based Non-interactive Key Sharing (Special Section on Cryptography and Information Security)
- On the Security of the ElGamal-Type Signature Scheme with Small Parameters (Special Section on Cryptography and Information Security)
- On the Security of the Improved Knapsack Cryptosystem (Special Section on Information Theory and Its Applications)