Sign in to use this feature.

Years

Between: -

Subjects

remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline

Journals

Article Types

Countries / Regions

Search Results (38)

Search Parameters:
Keywords = video watermark

Order results
Result details
Results per page
Select all
Export citation of selected articles as:
24 pages, 1751 KiB  
Article
Robust JND-Guided Video Watermarking via Adaptive Block Selection and Temporal Redundancy
by Antonio Cedillo-Hernandez, Lydia Velazquez-Garcia, Manuel Cedillo-Hernandez, Ismael Dominguez-Jimenez and David Conchouso-Gonzalez
Mathematics 2025, 13(15), 2493; https://doi.org/10.3390/math13152493 - 3 Aug 2025
Viewed by 199
Abstract
This paper introduces a robust and imperceptible video watermarking framework designed for blind extraction in dynamic video environments. The proposed method operates in the spatial domain and combines multiscale perceptual analysis, adaptive Just Noticeable Difference (JND)-based quantization, and temporal redundancy via multiframe embedding. [...] Read more.
This paper introduces a robust and imperceptible video watermarking framework designed for blind extraction in dynamic video environments. The proposed method operates in the spatial domain and combines multiscale perceptual analysis, adaptive Just Noticeable Difference (JND)-based quantization, and temporal redundancy via multiframe embedding. Watermark bits are embedded selectively in blocks with high perceptual masking using a QIM strategy, and the corresponding DCT coefficients are estimated directly from the spatial domain to reduce complexity. To enhance resilience, each bit is redundantly inserted across multiple keyframes selected based on scene transitions. Extensive simulations over 21 benchmark videos (CIF, 4CIF, HD) validate that the method achieves superior performance in robustness and perceptual quality, with an average Bit Error Rate (BER) of 1.03%, PSNR of 50.1 dB, SSIM of 0.996, and VMAF of 97.3 under compression, noise, cropping, and temporal desynchronization. The system outperforms several recent state-of-the-art techniques in both quality and speed, requiring no access to the original video during extraction. These results confirm the method’s viability for practical applications such as copyright protection and secure video streaming. Full article
(This article belongs to the Section E: Applied Mathematics)
Show Figures

Figure 1

25 pages, 2242 KiB  
Article
Next-Gen Video Watermarking with Augmented Payload: Integrating KAZE and DWT for Superior Robustness and High Transparency
by Himanshu Agarwal, Shweta Agarwal, Farooq Husain and Rajeev Kumar
AppliedMath 2025, 5(2), 53; https://doi.org/10.3390/appliedmath5020053 - 6 May 2025
Viewed by 1693
Abstract
Background: The issue of digital piracy is increasingly prevalent, with its proliferation further fueled by the widespread use of social media outlets such as WhatsApp, Snapchat, Instagram, Pinterest, and X. These platforms have become hotspots for the unauthorized sharing of copyrighted materials without [...] Read more.
Background: The issue of digital piracy is increasingly prevalent, with its proliferation further fueled by the widespread use of social media outlets such as WhatsApp, Snapchat, Instagram, Pinterest, and X. These platforms have become hotspots for the unauthorized sharing of copyrighted materials without due recognition to the original creators. Current techniques for digital watermarking are inadequate; they frequently choose less-than-ideal locations for embedding watermarks. This often results in a compromise on maintaining critical relationships within the data. Purpose: This research aims to tackle the growing problem of digital piracy, which represents a major risk to rights holders in various sectors, most notably those involved in entertainment. The goal is to devise a robust watermarking approach that effectively safeguards intellectual property rights and guarantees rightful earnings for those who create content. Approach: To address the issues at hand, this study presents an innovative technique for digital video watermarking. Utilizing the 2D-DWT along with the KAZE feature detection algorithm, which incorporates the Accelerated Segment Test with Zero Eigenvalue, scrutinize and pinpoint data points that exhibit circular symmetry. The KAZE algorithm pinpoints a quintet of stable features within the brightness aspect of video frames to act as central embedding sites. This research selects the chief embedding site by identifying the point of greatest intensity on a specific arc segment on a circle’s edge, while three other sites are chosen based on principles of circular symmetry. Following these procedures, the proposed method subjects videos to several robustness tests to simulate potential disturbances. The efficacy of the proposed approach is quantified using established objective metrics that confirm strong correlation and outstanding visual fidelity in watermarked videos. Moreover, statistical validation through t-tests corroborates the effectiveness of the watermarking strategy in maintaining integrity under various types of assaults. This fortifies the team’s confidence in its practical deployment. Full article
Show Figures

Figure 1

15 pages, 1990 KiB  
Article
Watermark and Trademark Prompts Boost Video Action Recognition in Visual-Language Models
by Longbin Jin, Hyuntaek Jung, Hyo Jin Jon and Eun Yi Kim
Mathematics 2025, 13(9), 1365; https://doi.org/10.3390/math13091365 - 22 Apr 2025
Viewed by 696
Abstract
Large-scale Visual-Language Models have demonstrated powerful adaptability in video recognition tasks. However, existing methods typically rely on fine-tuning or text prompt tuning. In this paper, we propose a visual-only prompting method that employs watermark and trademark prompts to bridge the distribution gap of [...] Read more.
Large-scale Visual-Language Models have demonstrated powerful adaptability in video recognition tasks. However, existing methods typically rely on fine-tuning or text prompt tuning. In this paper, we propose a visual-only prompting method that employs watermark and trademark prompts to bridge the distribution gap of spatial-temporal video data with Visual-Language Models. Our watermark prompts, designed by a trainable prompt generator, are customized for each video clip. Unlike conventional visual prompts that often exhibit noise signals, watermark prompts are intentionally designed to be imperceptible, ensuring they are not misinterpreted as an adversarial attack. The trademark prompts, bespoke for each video domain, establish the identity of specific video types. Integrating watermark prompts into video frames and prepending trademark prompts to per-frame embeddings significantly boosts the capability of the Visual-Language Model to understand video. Notably, our approach improves the adaptability of the CLIP model to various video action recognition datasets, achieving performance gains of 16.8%, 18.4%, and 13.8% on HMDB-51, UCF-101, and the egocentric dataset EPIC-Kitchen-100, respectively. Additionally, our visual-only prompting method demonstrates competitive performance compared with existing fine-tuning and adaptation methods while requiring fewer learnable parameters. Moreover, through extensive ablation studies, we find the optimal balance between imperceptibility and adaptability. Code will be made available. Full article
(This article belongs to the Special Issue Artificial Intelligence: Deep Learning and Computer Vision)
Show Figures

Figure 1

13 pages, 2646 KiB  
Article
Audio Watermarking System in Real-Time Applications
by Carlos Jair Santin-Cruz and Gordana Jovanovic Dolecek
Informatics 2025, 12(1), 1; https://doi.org/10.3390/informatics12010001 - 25 Dec 2024
Viewed by 1747
Abstract
Watermarking is widely employed to protect audio files. Previous research has focused on developing systems that balance performance criteria, including robustness, imperceptibility, and capacity. Most existing systems are designed to work with pre-recorded audio signals, where the characteristics of the host signal are [...] Read more.
Watermarking is widely employed to protect audio files. Previous research has focused on developing systems that balance performance criteria, including robustness, imperceptibility, and capacity. Most existing systems are designed to work with pre-recorded audio signals, where the characteristics of the host signal are known in advance. In such cases, processing time is not a critical factor, as these systems generally do not account for real-time signal acquisition or report tests for real-time signal acquisition nor report the elapsed time between signal acquisition and watermarking output, known as latency. However, the increasing prevalence of audio sharing through real-time streams or video calls is a pressing issue requiring low-latency systems. This work introduces a low-latency watermarking system that utilizes a spread spectrum technique, a method that spreads the signal energy across a wide frequency band while embedding the watermark additively in the time domain to minimize latency. The system’s performance was evaluated by simulating real-time audio streams using two distinct methods. The results demonstrate that the proposed system achieves minimal latency during embedding, addressing the urgent need for such systems. Full article
Show Figures

Figure 1

33 pages, 3827 KiB  
Review
Distinguishing Reality from AI: Approaches for Detecting Synthetic Content
by David Ghiurău and Daniela Elena Popescu
Computers 2025, 14(1), 1; https://doi.org/10.3390/computers14010001 - 24 Dec 2024
Cited by 9 | Viewed by 8689
Abstract
The advancement of artificial intelligence (AI) technologies, including generative pre-trained transformers (GPTs) and generative models for text, image, audio, and video creation, has revolutionized content generation, creating unprecedented opportunities and critical challenges. This paper systematically examines the characteristics, methodologies, and challenges associated with [...] Read more.
The advancement of artificial intelligence (AI) technologies, including generative pre-trained transformers (GPTs) and generative models for text, image, audio, and video creation, has revolutionized content generation, creating unprecedented opportunities and critical challenges. This paper systematically examines the characteristics, methodologies, and challenges associated with detecting the synthetic content across multiple modalities, to safeguard digital authenticity and integrity. Key detection approaches reviewed include stylometric analysis, watermarking, pixel prediction techniques, dual-stream networks, machine learning models, blockchain, and hybrid approaches, highlighting their strengths and limitations, as well as their detection accuracy, independent accuracy of 80% for stylometric analysis and up to 92% using multiple modalities in hybrid approaches. The effectiveness of these techniques is explored in diverse contexts, from identifying deepfakes and synthetic media to detecting AI-generated scientific texts. Ethical concerns, such as privacy violations, algorithmic bias, false positives, and overreliance on automated systems, are also critically discussed. Furthermore, the paper addresses legal and regulatory frameworks, including intellectual property challenges and emerging legislation, emphasizing the need for robust governance to mitigate misuse. Real-world examples of detection systems are analyzed to provide practical insights into implementation challenges. Future directions include developing generalizable and adaptive detection models, hybrid approaches, fostering collaboration between stakeholders, and integrating ethical safeguards. By presenting a comprehensive overview of AIGC detection, this paper aims to inform stakeholders, researchers, policymakers, and practitioners on addressing the dual-edged implications of AI-driven content creation. Full article
Show Figures

Graphical abstract

23 pages, 35878 KiB  
Article
A Novel Face Swapping Detection Scheme Using the Pseudo Zernike Transform Based Robust Watermarking
by Zhimao Lai, Zhuangxi Yao, Guanyu Lai, Chuntao Wang and Renhai Feng
Electronics 2024, 13(24), 4955; https://doi.org/10.3390/electronics13244955 - 16 Dec 2024
Cited by 1 | Viewed by 1416
Abstract
The rapid advancement of Artificial Intelligence Generated Content (AIGC) has significantly accelerated the evolution of Deepfake technology, thereby introducing escalating social risks due to its potential misuse. In response to these adverse effects, researchers have developed defensive measures, including passive detection and proactive [...] Read more.
The rapid advancement of Artificial Intelligence Generated Content (AIGC) has significantly accelerated the evolution of Deepfake technology, thereby introducing escalating social risks due to its potential misuse. In response to these adverse effects, researchers have developed defensive measures, including passive detection and proactive forensics. Although passive detection has achieved some success in identifying Deepfakes, it encounters challenges such as poor generalization and decreased accuracy, particularly when confronted with anti-forensic techniques and adversarial noise. As a result, proactive forensics, which offers a more resilient defense mechanism, has garnered considerable scholarly interest. However, existing proactive forensic methodologies often fall short in terms of visual quality, detection accuracy, and robustness. To address these deficiencies, we propose a novel proactive forensic approach that utilizes pseudo-Zernike moment robust watermarking. This method is specifically designed to enhance the detection and analysis of face swapping by transforming facial data into a binary bit stream and embedding this information within the non-facial regions of video frames. Our approach facilitates the detection of Deepfakes while preserving the visual integrity of the video content. Comprehensive experimental evaluations have demonstrated the robustness of this method against standard signal processing operations and its superior performance in detecting Deepfake manipulations. Full article
(This article belongs to the Special Issue Network Security Management in Heterogeneous Networks)
Show Figures

Figure 1

23 pages, 4649 KiB  
Article
A Decentralized Digital Watermarking Framework for Secure and Auditable Video Data in Smart Vehicular Networks
by Xinyun Liu, Ronghua Xu and Yu Chen
Future Internet 2024, 16(11), 390; https://doi.org/10.3390/fi16110390 - 24 Oct 2024
Cited by 5 | Viewed by 1753
Abstract
Thanks to the rapid advancements in Connected and Automated Vehicles (CAVs) and vehicular communication technologies, the concept of the Internet of Vehicles (IoVs) combined with Artificial Intelligence (AI) and big data promotes the vision of an Intelligent Transportation System (ITS). An ITS is [...] Read more.
Thanks to the rapid advancements in Connected and Automated Vehicles (CAVs) and vehicular communication technologies, the concept of the Internet of Vehicles (IoVs) combined with Artificial Intelligence (AI) and big data promotes the vision of an Intelligent Transportation System (ITS). An ITS is critical in enhancing road safety, traffic efficiency, and the overall driving experience by enabling a comprehensive data exchange platform. However, the open and dynamic nature of IoV networks brings significant performance and security challenges to IoV data acquisition, storage, and usage. To comprehensively tackle these challenges, this paper proposes a Decentralized Digital Watermarking framework for smart Vehicular networks (D2WaVe). D2WaVe consists of two core components: FIAE-GAN, a novel feature-integrated and attention-enhanced robust image watermarking model based on a Generative Adversarial Network (GAN), and BloVA, a Blockchain-based Video frames Authentication scheme. By leveraging an encoder–noise–decoder framework, trained FIAE-GAN watermarking models can achieve the invisibility and robustness of watermarks that can be embedded in video frames to verify the authenticity of video data. BloVA ensures the integrity and auditability of IoV data in the storing and sharing stages. Experimental results based on a proof-of-concept prototype implementation validate the feasibility and effectiveness of our D2WaVe scheme for securing and auditing video data exchange in smart vehicular networks. Full article
Show Figures

Figure 1

28 pages, 1628 KiB  
Article
A Video Dual-Domain Blind Watermarking Algorithm Based on Hadamard Transform
by Yucheng Liang, Ke Niu, Yingnan Zhang, Yifei Meng and Fangmeng Hu
Mathematics 2024, 12(18), 2938; https://doi.org/10.3390/math12182938 - 21 Sep 2024
Cited by 1 | Viewed by 1259
Abstract
Addressing the compatibility challenges surrounding the robustness and reversibility of existing video watermarking techniques, this study introduces a novel video dual-domain blind watermarking algorithm leveraging the Hadamard transform. Specifically tailored for H.264 video copyright protection, the algorithm initially organizes video frames and identifies [...] Read more.
Addressing the compatibility challenges surrounding the robustness and reversibility of existing video watermarking techniques, this study introduces a novel video dual-domain blind watermarking algorithm leveraging the Hadamard transform. Specifically tailored for H.264 video copyright protection, the algorithm initially organizes video frames and identifies key frames for watermark embedding. Prior to embedding, the robust watermark undergoes coding preprocessing to optimize its integration. Subsequently, a 4×4 block is expanded based on the selected embedding position within the frame, followed by the application of the Hadamard transform to the enlarged block. The 1-bit robust watermark information is then embedded via the coefficient pair located in the first row of the Hadamard coefficient matrix corresponding to the expanded block. Additionally, a reversible watermark, designed to mitigate the distortions introduced during robust embedding, is generated and embedded into the remaining coefficients of the coefficient matrix using reversible embedding techniques. During watermark extraction, the dual-domain watermark can be retrieved exclusively through reversible extraction methodologies by analyzing the size relationship of coefficient pairs, eliminating the need for access to the original video data. To bolster the algorithm’s robustness, a majority-subordinate voting system is devised and implemented, effectively enhancing its resilience. Experimental findings demonstrate that, compared to similar approaches, this algorithm not only enhances the reversibility of video restoration but also exhibits superior robustness and meets the requirements for imperceptibility. Full article
(This article belongs to the Section E1: Mathematics and Computer Science)
Show Figures

Figure 1

22 pages, 7227 KiB  
Article
Robust Reversible Watermarking Scheme in Video Compression Domain Based on Multi-Layer Embedding
by Yifei Meng, Ke Niu, Yingnan Zhang, Yucheng Liang and Fangmeng Hu
Electronics 2024, 13(18), 3734; https://doi.org/10.3390/electronics13183734 - 20 Sep 2024
Viewed by 1410
Abstract
Most of the existing research on video watermarking schemes focus on improving the robustness of watermarking. However, in application scenarios such as judicial forensics and telemedicine, the distortion caused by watermark embedding on the original video is unacceptable. To solve this problem, this [...] Read more.
Most of the existing research on video watermarking schemes focus on improving the robustness of watermarking. However, in application scenarios such as judicial forensics and telemedicine, the distortion caused by watermark embedding on the original video is unacceptable. To solve this problem, this paper proposes a robust reversible watermarking (RRW)scheme based on multi-layer embedding in the video compression domain. Firstly, the watermarking data are divided into several sub-secrets by using Shamir’s (t, n)-threshold secret sharing. After that, the chroma sub-block with more complex texture information is filtered out in the I-frame of each group of pictures (GOP), and the sub-secret is embedded in that frame by modifying the discrete cosine transform (DCT) coefficients within the sub-block. Finally, the auxiliary information required to recover the coefficients is embedded into the motion vector of the P-frame of each GOP by a reversible steganography algorithm. In the absence of an attack, the receiver can recover the DCT coefficients by extracting the auxiliary information in the vectors, ultimately recovering the video correctly. The watermarking scheme demonstrates strong robustness even when it suffers from malicious attacks such as recompression attacks and requantization attacks. The experimental results demonstrate that the watermarking scheme proposed in this paper exhibits reversibility and high visual quality. Moreover, the scheme surpasses other comparable methods in the robustness test session. Full article
(This article belongs to the Special Issue Advances in Algorithm Optimization and Computational Intelligence)
Show Figures

Figure 1

19 pages, 9544 KiB  
Article
Hadamard Error-Correcting Codes and Their Application in Digital Watermarking
by Michael Windisch, Jakob Wassermann, Monica Leba and Olimpiu Stoicuta
Sensors 2024, 24(10), 3062; https://doi.org/10.3390/s24103062 - 11 May 2024
Viewed by 2705
Abstract
In communication technologies such as digital watermarking, wireless sensor networks (WSNs), and visual light communication (VLC), error-correcting codes are crucial. The Enhanced Hadamard Error-Correcting Code (EHC), which is based on 2D Hadamard Basis Images, is a novel error correction technique that is presented [...] Read more.
In communication technologies such as digital watermarking, wireless sensor networks (WSNs), and visual light communication (VLC), error-correcting codes are crucial. The Enhanced Hadamard Error-Correcting Code (EHC), which is based on 2D Hadamard Basis Images, is a novel error correction technique that is presented in this study. This technique is used to evaluate the effectiveness of the video watermarking scheme. Even with highly sophisticated embedding techniques, watermarks usually fail to resist such comprehensive attacks because of the extraordinarily high compression rate of approximately 1:200 that is frequently employed in video dissemination. It can only be used in conjunction with a sufficient error-correcting coding method. This study compares the efficacy of the well-known Reed–Solomon Code with this novel technique, the Enhanced Hadamard Error-Correcting Code (EHC), in maintaining watermarks in embedded videos. The main idea behind this newly created multidimensional Enhanced Hadamard Error-Correcting Code is to use a 1D Hadamard decoding approach on the 2D base pictures after they have been transformed into a collection of one-dimensional rows. Following that, the image is rebuilt, allowing for a more effective 2D decoding procedure. Using this technique, it is possible to exceed the theoretical error-correcting capacity threshold of ⌊dmin12⌋ bits, where dmin is the Hamming distance. It may be possible to achieve better results by converting the 2D EHC into a 3D format. The new Enhanced Hadamard Code is used in a video watermarking coding scheme to show its viability and efficacy. The original video is broken down using a multi-level interframe wavelet transform during the video watermarking embedding process. Low-pass filtering is applied to the video stream in order to extract a certain frequency range. The watermark is subsequently incorporated using this filtered section. Either the Reed–Solomon Correcting Code or the Enhanced Hadamard Code is used to protect the watermarks. The experimental results show that EHC far outperforms the RS Code and is very resilient against severe MPEG compression. Full article
(This article belongs to the Section Communications)
Show Figures

Figure 1

20 pages, 1159 KiB  
Article
Image Watermarking Using Discrete Wavelet Transform and Singular Value Decomposition for Enhanced Imperceptibility and Robustness
by Mahbuba Begum, Sumaita Binte Shorif, Mohammad Shorif Uddin, Jannatul Ferdush, Tony Jan, Alistair Barros and Md Whaiduzzaman
Algorithms 2024, 17(1), 32; https://doi.org/10.3390/a17010032 - 12 Jan 2024
Cited by 7 | Viewed by 4974
Abstract
Digital multimedia elements such as text, image, audio, and video can be easily manipulated because of the rapid rise of multimedia technology, making data protection a prime concern. Hence, copyright protection, content authentication, and integrity verification are today’s new challenging issues. To address [...] Read more.
Digital multimedia elements such as text, image, audio, and video can be easily manipulated because of the rapid rise of multimedia technology, making data protection a prime concern. Hence, copyright protection, content authentication, and integrity verification are today’s new challenging issues. To address these issues, digital image watermarking techniques have been proposed by several researchers. Image watermarking can be conducted through several transformations, such as discrete wavelet transform (DWT), singular value decomposition (SVD), orthogonal matrix Q and upper triangular matrix R (QR) decomposition, and non-subsampled contourlet transform (NSCT). However, a single transformation cannot simultaneously satisfy all the design requirements of image watermarking, which makes a platform to design a hybrid invisible image watermarking technique in this work. The proposed work combines four-level (4L) DWT and two-level (2L) SVD. The Arnold map initially encrypts the watermark image, and 2L SVD is applied to it to extract the s components of the watermark image. A 4L DWT is applied to the host image to extract the LL sub-band, and then 2L SVD is applied to extract s components that are embedded into the host image to generate the watermarked image. The dynamic-sized watermark maintains a balanced visual impact and non-blind watermarking preserves the quality and integrity of the host image. We have evaluated the performance after applying several intentional and unintentional attacks and found high imperceptibility and improved robustness with enhanced security to the system than existing state-of-the-art methods. Full article
Show Figures

Figure 1

19 pages, 24555 KiB  
Article
A Robust Video Watermarking Algorithm Based on Two-Dimensional Discrete Fourier Transform
by Xiao Yang, Zhenzhen Zhang, Yueshuang Jiao and Zichen Li
Electronics 2023, 12(15), 3271; https://doi.org/10.3390/electronics12153271 - 30 Jul 2023
Cited by 2 | Viewed by 1738
Abstract
Due to the continuous development and popularity of digital video technology, the copyright protection of digital video content has become an increasingly prominent issue. Digital video watermarking, as an effective means of digital copyright protection, has attracted widespread attention from academia and industry. [...] Read more.
Due to the continuous development and popularity of digital video technology, the copyright protection of digital video content has become an increasingly prominent issue. Digital video watermarking, as an effective means of digital copyright protection, has attracted widespread attention from academia and industry. The two-dimensional discrete Fourier transform (2D-DFT) template-based method has the advantages of good real-time performance and robustness, but the embedding capacity is small and cannot resist frame-dropping attack. To address this problem, a new template construction method is proposed in this paper, which can extend the embedding capacity from 1 bit each group of pictures (GOP) to theoretically n bits each GOP. In addition, by changing the GOP pattern, the method gains the ability to resist frame-dropping attacks. Experimental results show that the proposed method can achieve larger watermark capacity while maintaining strong robustness against image-processing attacks, geometric attacks, video-processing attacks and compression attacks. Full article
(This article belongs to the Section Computer Science & Engineering)
Show Figures

Figure 1

14 pages, 2215 KiB  
Article
Anti-Recompression Video Watermarking Algorithm Based on H.264/AVC
by Di Fan, Huiyuan Zhao, Changying Zhang, Hongyun Liu and Xiaoming Wang
Mathematics 2023, 11(13), 2913; https://doi.org/10.3390/math11132913 - 29 Jun 2023
Cited by 5 | Viewed by 1508
Abstract
The problem of information security and copyright protection of video is becoming increasingly prominent. The current video watermarking algorithm does not have strong anti-compression, which has a significant impact on the visual effect of video. To solve this problem, this paper proposes a [...] Read more.
The problem of information security and copyright protection of video is becoming increasingly prominent. The current video watermarking algorithm does not have strong anti-compression, which has a significant impact on the visual effect of video. To solve this problem, this paper proposes a video watermarking algorithm based on H.264/AVC. The algorithm combines the non-zero quantization coefficient and the energy factor to select the appropriate chroma subblock, and then an optimized modulation is designed to embed the watermark into its DCT quantization coefficients in order to minimize the number of modifications of the subblocks. The invisibility and robustness experiments of the algorithm are conducted in the paper, and the Structural Similarity Indexes are above 0.99, and the False Bit Rates are all below 0.03. The results show that the algorithm has good invisibility, anti-compression performance and obvious advantages compared with other similar methods. Full article
Show Figures

Figure 1

15 pages, 11302 KiB  
Article
Digital Image Identification and Verification Using Maximum and Preliminary Score Approach with Watermarking for Security and Validation Enhancement
by Shrikant Upadhyay, Mohit Kumar, Aditi Upadhyay, Sahil Verma, Kavita, A. S. M. Sanwar Hosen, In-Ho Ra, Maninder Kaur and Satnam Singh
Electronics 2023, 12(7), 1609; https://doi.org/10.3390/electronics12071609 - 29 Mar 2023
Cited by 5 | Viewed by 2482
Abstract
Digital face approaches possess currently received awesome attention because of their huge wide variety of digital audio, and visual programs. Digitized snapshots are progressively more communicated using an un-relaxed medium together with cyberspace. Consequently, defence, clinical, medical, and exceptional supervised photographs are essentially [...] Read more.
Digital face approaches possess currently received awesome attention because of their huge wide variety of digital audio, and visual programs. Digitized snapshots are progressively more communicated using an un-relaxed medium together with cyberspace. Consequently, defence, clinical, medical, and exceptional supervised photographs are essentially blanketed towards trying to employ it; such controls ought to damage such choices constructed totally based on those pictures. So, to shield the originality of digital audio/visual snapshots, several approaches proposed. Such techniques incorporate traditional encoding, breakable and nominal breakable watermarking with virtual impressions which are based upon the material of image content. Over the last few decades, various holistic approaches are proposed for improving image identification and verification. In this paper, a combination of both the feature level and score level of different techniques were used. Image is one of the identities of a person which reflects its emotions, feeling, age etc. which also helps to gather an information about a person without knowing their name, caste, and age and this could be not of much importance when it is used for domestic or framing applications. To secure the originality of digital audio/visual impressions many methods come into pictures and are proposed which include digital signatures, watermarking, cryptography, and fragile depend upon face contents. The objective of this research article is to identify & verify real-time video images using feature and score levels using watermarking that will help to judge the authenticity of any images at the initial stage by extracting the features which are evaluated by following an algorithm known as Viterbi and where input data is changed initially into an embedded treat or state then the matrix is evaluated of achieved transformation and on this basis preliminary score estimation will be generated after many iterations for each image that will help in validation. Finally, the tested image will be verified using several approaches to protect and provide security to the original image being verified. This approach may be useful for different surveillance applications for real-time image identification and verification. Also, measurement of accuracy was done by reconfiguring the HMM to identify the constant segmentation and feature removal of the image was settled by initializing parameters and teaching the image feature using the algorithm “Viterbi”. Full article
Show Figures

Figure 1

21 pages, 1524 KiB  
Article
A Survey on Compression Domain Image and Video Data Processing and Analysis Techniques
by Yuhang Dong and W. David Pan
Information 2023, 14(3), 184; https://doi.org/10.3390/info14030184 - 15 Mar 2023
Cited by 12 | Viewed by 4966
Abstract
A tremendous amount of image and video data are being generated and shared in our daily lives. Image and video data are typically stored and transmitted in compressed form in order to reduce storage space and transmission time. The processing and analysis of [...] Read more.
A tremendous amount of image and video data are being generated and shared in our daily lives. Image and video data are typically stored and transmitted in compressed form in order to reduce storage space and transmission time. The processing and analysis of compressed image and video data can greatly reduce input data size and eliminate the need for decompression and recompression, thereby achieving significant savings in memory and computation time. There exists a body of research on compression domain data processing and analysis. This survey focuses on the work related to image and video data. The papers cited are categorized based on their target applications, including image and video resizing and retrieval, information hiding and watermark embedding, image and video enhancement and segmentation, object and motion detection, as well as pattern classification, among several other applications. Key methods used for these applications are explained and discussed. Comparisons are drawn among similar approaches. We then point out possible directions of further research. Full article
(This article belongs to the Special Issue Knowledge Management and Digital Humanities)
Show Figures

Figure 1

Back to TopTop