By Topic

Circuits and Systems for Video Technology, IEEE Transactions on

Issue 8 • Date Aug. 2003

Filter Results

Displaying Results 1 - 15 of 15
  • Digital watermarking of low bit-rate advanced simple profile MPEG-4 compressed video

    Publication Year: 2003 , Page(s): 787 - 800
    Cited by:  Papers (30)  |  Patents (4)
    Save to Project icon | Request Permissions | Click to expandAbstract | PDF file iconPDF (1472 KB) |  | HTML iconHTML  

    A novel MPEG-4 compressed domain video watermarking method is proposed and its performance is studied at video bit rates ranging from 128 to 768 kb/s. The spatial spread-spectrum watermark is embedded directly into compressed MPEG-4 bitstreams by modifying DCT coefficients. A synchronization template combats geometric attacks, such as cropping, scaling, and rotation. The method also features a gai... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Audio watermarking techniques using sinusoidal patterns based on pseudorandom sequences

    Publication Year: 2003 , Page(s): 801 - 812
    Cited by:  Papers (21)
    Save to Project icon | Request Permissions | Click to expandAbstract | PDF file iconPDF (607 KB) |  | HTML iconHTML  

    The spread-spectrum watermarking (SSW) technology has become an important technique that is not only widely used for still image and video watermarking, but is also used for audio watermarking. However, some technical problems, such as requiring watermark shaping to reduce audible noise, have greatly limited its application. We present a novel audio watermarking scheme using SSW technology by whic... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Texture-based watermarking of 3D video objects

    Publication Year: 2003 , Page(s): 853 - 866
    Cited by:  Papers (24)
    Save to Project icon | Request Permissions | Click to expandAbstract | PDF file iconPDF (751 KB) |  | HTML iconHTML  

    We describe a novel framework for watermarking three-dimensional (3D) video objects via their texture information. Unlike classical algorithms dealing with 3D objects that operate on meshes in order to protect the object itself, the main goal of our work is to retrieve information originally hidden in the textured image of the object from resulting images or videos having used the 3D synthetic obj... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Joint security and robustness enhancement for quantization based data embedding

    Publication Year: 2003 , Page(s): 831 - 841
    Cited by:  Papers (21)
    Save to Project icon | Request Permissions | Click to expandAbstract | PDF file iconPDF (1120 KB) |  | HTML iconHTML  

    The paper studies joint security and robustness enhancement of quantization-based data embedding for multimedia authentication applications. We present an analysis showing that through a nontrivial run lookup table (LUT) that maps quantized multimedia features randomly to binary data, the probability of detection error can be considerably smaller than the traditional quantization embedding. We qua... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A capacity estimation technique for JPEG-to-JPEG image watermarking

    Publication Year: 2003 , Page(s): 746 - 752
    Cited by:  Papers (13)
    Save to Project icon | Request Permissions | Click to expandAbstract | PDF file iconPDF (468 KB)  

    In JPEG-to-JPEG image watermarking (J2J), the input is a JPEG image file. After watermark embedding, the image is JPEG-compressed such that the output file is also a JPEG file. We use the human visual system (HVS) model to estimate the J2J data hiding capacity of JPEG images, or the maximum number of bits that can be embedded in JPEG-compressed images. A.B. Watson's HVS model (Proc. SPIE Human Vis... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Hybrid pixel-based data hiding and block-based watermarking for error-diffused halftone images

    Publication Year: 2003 , Page(s): 867 - 884
    Cited by:  Papers (32)
    Save to Project icon | Request Permissions | Click to expandAbstract | PDF file iconPDF (4602 KB) |  | HTML iconHTML  

    A low computational complexity noise-balanced error diffusion (NBEDF) technique is proposed for embedding watermarks into error-diffused images. The visual decoding pattern can be perceived when two or more similar NBEDF images are overlaid, even in a high activity region. Also, with the modified improved version of NBEDF, two halftone images can be made from two totally different gray-tone images... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A novel echo-hiding scheme with backward and forward kernels

    Publication Year: 2003 , Page(s): 885 - 889
    Cited by:  Papers (39)
    Save to Project icon | Request Permissions | Click to expandAbstract | PDF file iconPDF (329 KB) |  | HTML iconHTML  

    The paper presents a novel echo-hiding method for audio watermarking. The method is quite different from previous echo-hiding methods since it presents a new echo kernel which introduces a forward kernel as well as a backward kernel. The new kernel, a combination of the backward and forward kernels, can enhance considerably the watermark detection rate. Thus, it is possible to reduce echo amplitud... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • RST-invariant digital image watermarking based on log-polar mapping and phase correlation

    Publication Year: 2003 , Page(s): 753 - 765
    Cited by:  Papers (49)  |  Patents (3)
    Save to Project icon | Request Permissions | Click to expandAbstract | PDF file iconPDF (900 KB) |  | HTML iconHTML  

    Based on log-polar mapping (LPM) and phase correlation, the paper presents a novel digital image watermarking scheme that is invariant to rotation, scaling, and translation (RST). We embed a watermark in the LPMs of the Fourier magnitude spectrum of an original image, and use the phase correlation between the LPM of the original image and the LPM of the watermarked image to calculate the displacem... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A DWT-DFT composite watermarking scheme robust to both affine transform and JPEG compression

    Publication Year: 2003 , Page(s): 776 - 786
    Cited by:  Papers (76)  |  Patents (15)
    Save to Project icon | Request Permissions | Click to expandAbstract | PDF file iconPDF (1406 KB) |  | HTML iconHTML  

    Robustness is a crucially important issue in watermarking. Robustness against geometric distortion and JPEG compression at the same time with blind extraction remains especially challenging. A blind discrete wavelet transform-discrete Fourier transform (DWT-DFT) composite image watermarking algorithm that is robust against both affine transformation and JPEG compression is proposed. The algorithm ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • An ill-posed operator for secure image authentication

    Publication Year: 2003 , Page(s): 842 - 852
    Cited by:  Papers (14)
    Save to Project icon | Request Permissions | Click to expandAbstract | PDF file iconPDF (1092 KB) |  | HTML iconHTML  

    Many problems in science and technology are modeled by ill-posed operators and the main difficulty in obtaining accurate solutions is caused by the high instability of such operators. The paper introduces a new schema for secure image authentication. It is based on a rather unconventional approach - the extremely high sensitivity of ill-posed operators to any change in the input data is turned int... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Novel blind multiple watermarking technique for images

    Publication Year: 2003 , Page(s): 813 - 830
    Cited by:  Papers (36)
    Save to Project icon | Request Permissions | Click to expandAbstract | PDF file iconPDF (2004 KB) |  | HTML iconHTML  

    Three novel blind watermarking techniques are proposed to embed watermarks into digital images for different purposes. The watermarks are designed to be decoded or detected without the original images. The first one, called single watermark embedding (SWE), is used to embed a watermark bit sequence into digital images using two secret keys. The second technique, called multiple watermark embedding... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Robust image watermarking based on generalized Radon transformations

    Publication Year: 2003 , Page(s): 732 - 745
    Cited by:  Papers (37)
    Save to Project icon | Request Permissions | Click to expandAbstract | PDF file iconPDF (1110 KB) |  | HTML iconHTML  

    The paper presents a novel watermarking scheme able to resist geometric attacks. The proposed method performs imperceptible watermarking of images in the spatial domain. To generate resistance to scaling and rotation attacks, two generalized Radon transformations of the image are introduced, while resistance to translation is accomplished through a localization of the watermarking method based on ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Reversible data embedding using a difference expansion

    Publication Year: 2003 , Page(s): 890 - 896
    Cited by:  Papers (429)  |  Patents (14)
    Save to Project icon | Request Permissions | Click to expandAbstract | PDF file iconPDF (564 KB) |  | HTML iconHTML  

    Reversible data embedding has drawn lots of interest recently. Being reversible, the original digital content can be completely restored. We present a novel reversible data-embedding method for digital images. We explore the redundancy in digital images to achieve very high embedding capacity, and keep the distortion low. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Invariant image watermark using Zernike moments

    Publication Year: 2003 , Page(s): 766 - 775
    Cited by:  Papers (70)
    Save to Project icon | Request Permissions | Click to expandAbstract | PDF file iconPDF (681 KB) |  | HTML iconHTML  

    The paper introduces a robust image watermark based on an invariant image feature vector. Normalized Zernike moments of an image are used as the vector. The watermark is generated by modifying the vector. The watermark signal is designed with Zernike moments. The signal is added to the cover image in the spatial domain after the reconstruction process. We extract the feature vector from the modifi... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Introduction to the special issue on authentication, copyright protection, and information hiding

    Publication Year: 2003 , Page(s): 729 - 731
    Cited by:  Papers (5)
    Save to Project icon | Request Permissions | PDF file iconPDF (191 KB) |  | HTML iconHTML  
    Freely Available from IEEE

Aims & Scope

The emphasis is focused on, but not limited to:
1. Video A/D and D/ A
2. Video Compression Techniques and Signal Processing
3. Multi-Dimensional Filters and Transforms
4. High Speed Real-Tune Circuits
5. Multi-Processors Systems—Hardware and Software
6. VLSI Architecture and Implementation for Video Technology 

 

Full Aims & Scope

Meet Our Editors

Editor-in-Chief
Dan Schonfeld
Multimedia Communications Laboratory
ECE Dept. (M/C 154)
University of Illinois at Chicago (UIC)
Chicago, IL 60607-7053
tcsvt-eic@tcad.polito.it

Managing Editor
Jaqueline Zelkowitz
tcsvt@tcad.polito.it