Conferences related to Watermarking

Back to Top

2023 Annual International Conference of the IEEE Engineering in Medicine & Biology Conference (EMBC)

The conference program will consist of plenary lectures, symposia, workshops and invitedsessions of the latest significant findings and developments in all the major fields of biomedical engineering.Submitted full papers will be peer reviewed. Accepted high quality papers will be presented in oral and poster sessions,will appear in the Conference Proceedings and will be indexed in PubMed/MEDLINE.


2020 IEEE International Conference on Image Processing (ICIP)

The International Conference on Image Processing (ICIP), sponsored by the IEEE SignalProcessing Society, is the premier forum for the presentation of technological advances andresearch results in the fields of theoretical, experimental, and applied image and videoprocessing. ICIP 2020, the 27th in the series that has been held annually since 1994, bringstogether leading engineers and scientists in image and video processing from around the world.


2020 IEEE International Instrumentation and Measurement Technology Conference (I2MTC)

The Conference focuses on all aspects of instrumentation and measurement science andtechnology research development and applications. The list of program topics includes but isnot limited to: Measurement Science & Education, Measurement Systems, Measurement DataAcquisition, Measurements of Physical Quantities, and Measurement Applications.


GLOBECOM 2020 - 2020 IEEE Global Communications Conference

IEEE Global Communications Conference (GLOBECOM) is one of the IEEE Communications Society’s two flagship conferences dedicated to driving innovation in nearly every aspect of communications. Each year, more than 2,900 scientific researchers and their management submit proposals for program sessions to be held at the annual conference. After extensive peer review, the best of the proposals are selected for the conference program, which includes technical papers, tutorials, workshops and industry sessions designed specifically to advance technologies, systems and infrastructure that are continuing to reshape the world and provide all users with access to an unprecedented spectrum of high-speed, seamless and cost-effective global telecommunications services.


ICASSP 2020 - 2020 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP)

The ICASSP meeting is the world's largest and most comprehensive technical conference focused on signal processing and its applications. The conference will feature world-class speakers, tutorials, exhibits, and over 50 lecture and poster sessions.


More Conferences

Periodicals related to Watermarking

Back to Top

Audio, Speech, and Language Processing, IEEE Transactions on

Speech analysis, synthesis, coding speech recognition, speaker recognition, language modeling, speech production and perception, speech enhancement. In audio, transducers, room acoustics, active sound control, human audition, analysis/synthesis/coding of music, and consumer audio. (8) (IEEE Guide for Authors) The scope for the proposed transactions includes SPEECH PROCESSING - Transmission and storage of Speech signals; speech coding; speech enhancement and noise reduction; ...


Broadcasting, IEEE Transactions on

Broadcast technology, including devices, equipment, techniques, and systems related to broadcast technology, including the production, distribution, transmission, and propagation aspects.


Circuits and Systems for Video Technology, IEEE Transactions on

Video A/D and D/A, display technology, image analysis and processing, video signal characterization and representation, video compression techniques and signal processing, multidimensional filters and transforms, analog video signal processing, neural networks for video applications, nonlinear video signal processing, video storage and retrieval, computer vision, packet video, high-speed real-time circuits, VLSI architecture and implementation for video technology, multiprocessor systems--hardware and software-- ...


Communications Magazine, IEEE

IEEE Communications Magazine was the number three most-cited journal in telecommunications and the number eighteen cited journal in electrical and electronics engineering in 2004, according to the annual Journal Citation Report (2004 edition) published by the Institute for Scientific Information. Read more at http://www.ieee.org/products/citations.html. This magazine covers all areas of communications such as lightwave telecommunications, high-speed data communications, personal communications ...


Computer

Computer, the flagship publication of the IEEE Computer Society, publishes peer-reviewed technical content that covers all aspects of computer science, computer engineering, technology, and applications. Computer is a resource that practitioners, researchers, and managers can rely on to provide timely information about current research developments, trends, best practices, and changes in the profession.


More Periodicals

Most published Xplore authors for Watermarking

Back to Top

Xplore Articles related to Watermarking

Back to Top

A robust and encrypted digital image watermarking method against print-scan

2015 Chinese Automation Congress (CAC), 2015

The growth of network multimedia systems has expanded the demand for image copyright protection. Digital watermark is one approach which is often used for image copyright protection. However, there are limitations of robustness and confidentiality in the common digital watermarking algorithms to resist print-scan attacks. In this paper, a new method combining zero watermarking, blind watermarking and Arnold scrambling is ...


Digital audio watermarking and image watermarking for information security

2015 International Conference on Pervasive Computing (ICPC), 2015

The article covers a brief summary of modern approaches for embedding additional data in audio signals. It could have many causes - for the purposes of access control or identification related to particular type of audio. This top-secret information is not “visible” for a user. The leading determination for watermarking by audio is to defend beside probable extortions in the ...


Classification of watermarking methods based on watermarking approaches

2017 Artificial Intelligence and Robotics (IRANOPEN), 2017

Video watermarking is the approach of adding insensible data to video content in order to protect the owner's right. One of the main important issues in watermarking operation is the watermarking robustness. The basic requirement in watermarking is resisting in front of distortion and initial attacks, which is commonly examined based on the data processing standards. Many methods have been ...


An IPPCT Dynamic Watermarking Scheme Based on Chinese Remainder Theorem

2013 International Conference on Computational and Information Sciences, 2013

This paper conducted a preliminary study and exploration of dynamic watermarking scheme. Firstly, the paper introduces software watermarking technology and analyses the process of dynamic graph watermarking. Secondly, this paper proposes and realizes the IPPCT dynamic watermarking scheme based on Chinese remainder theorem, and details the stages of watermarking embedding, decomposition, encryption and identification. Finally, the paper designs experimental task ...


Grayscale image digital watermarking technology based on wavelet analysis

2012 IEEE Symposium on Electrical & Electronics Engineering (EEESYM), 2012

Aim at the grayscale image watermarking embedding and detection, on the basis of introduction of digital watermarking principle and wavelet multiresolution analysis, adaptive blind grayscale image watermarking algorithm based on wavelet analysis is put forward. Firstly, the embedded watermarking signal is processed by spread spectrum technology, secondly, the location of the embedded watermarking and strength is automatically adjust according to ...


More Xplore Articles

Educational Resources on Watermarking

Back to Top

IEEE-USA E-Books

  • A robust and encrypted digital image watermarking method against print-scan

    The growth of network multimedia systems has expanded the demand for image copyright protection. Digital watermark is one approach which is often used for image copyright protection. However, there are limitations of robustness and confidentiality in the common digital watermarking algorithms to resist print-scan attacks. In this paper, a new method combining zero watermarking, blind watermarking and Arnold scrambling is proposed. The zero-watermarking algorithm in DCT low-frequency region avoids the limitation of watermarking capacity to a certain extent. And it has a certain degree of stability and adaptability as well as a strong anti-interference ability to the geometric attacks. In the intermediate-frequency region, the blind watermarking algorithm is used to embed the scrambling information of the watermark and it is robust. With such multilayer enciphering, the confidentiality of the watermark is improved. The whole method has made great progress in the resistance of the geometric attacks and confidentiality of watermark. It's proved that the method is an applicable method against print-scan attacks. It has a certain reference value to the study of digital image watermark.

  • Digital audio watermarking and image watermarking for information security

    The article covers a brief summary of modern approaches for embedding additional data in audio signals. It could have many causes - for the purposes of access control or identification related to particular type of audio. This top-secret information is not “visible” for a user. The leading determination for watermarking by audio is to defend beside probable extortions in the audio records and for copyright harm or illegal altering; reality for such information can be unsure by audio watermarking. Steganography and cryptography are two techniques these techniques are related in the manner that they together are used to safeguard private facts. There is lack in characteristic of original image we recommend a generalized form of Reversible Contrast Mapping (RCM) is an in complex integer transform that applies to pairs of pixels. For image watermarking Contrast mapping is invertible procedure, because least significant bits (LSBs) of the transformed pixels are forfeit. The data space occupied by the LSBs is expedient for information hiding. The embedded information bit-rates of reversible watermarking structure are highest bit-rates till date. The system does not need further records compression, and, in terms of mathematical complexity, it is having lowest complexity. Also robustness against cropping can be guaranteed.

  • Classification of watermarking methods based on watermarking approaches

    Video watermarking is the approach of adding insensible data to video content in order to protect the owner's right. One of the main important issues in watermarking operation is the watermarking robustness. The basic requirement in watermarking is resisting in front of distortion and initial attacks, which is commonly examined based on the data processing standards. Many methods have been proposed in the field of video watermarking that are resistant to certain attacks, therefore some attacks can break the watermark. So, the correct identification of methods and knowing the strength and weakness of each method lead to propose appropriate solution in order to reduce the effects of attacks with presenting secure algorithm in video watermarking.

  • An IPPCT Dynamic Watermarking Scheme Based on Chinese Remainder Theorem

    This paper conducted a preliminary study and exploration of dynamic watermarking scheme. Firstly, the paper introduces software watermarking technology and analyses the process of dynamic graph watermarking. Secondly, this paper proposes and realizes the IPPCT dynamic watermarking scheme based on Chinese remainder theorem, and details the stages of watermarking embedding, decomposition, encryption and identification. Finally, the paper designs experimental task to compare performance. The experimental results show that the scheme has higher robustness and better concealment.

  • Grayscale image digital watermarking technology based on wavelet analysis

    Aim at the grayscale image watermarking embedding and detection, on the basis of introduction of digital watermarking principle and wavelet multiresolution analysis, adaptive blind grayscale image watermarking algorithm based on wavelet analysis is put forward. Firstly, the embedded watermarking signal is processed by spread spectrum technology, secondly, the location of the embedded watermarking and strength is automatically adjust according to the characteristics of the original image, and watermarking is adaptively added to the grayscale images, finally, watermarking signal is blindly extracted without the information of the original image. Experimental results show that the proposed algorithm enhances the anti- attack capability and the hidden nature of the image, improve the security of the watermarking detection, and has higher robustness to random noise attack, cutting and JPEG compression.

  • Medical image watermarking with tamper detection and recovery using reversible watermarking with LSB modification and run length encoding (RLE) compression

    Medical images have been used as one of the objects to diagnose the patient. A digitally formatted medical image is easier to be stored and distributed but also easier to be modified for illegal purposes. Digital image watermarking offers a solution to protect digital medical images. By embedding fragile authentication watermark, the watermarking system can detect and localize the tampered area of medical images. Moreover, by embedding the feature extraction in the form of average intensities of the image, an original image can be recovered from the tampered image. This paper will study and test a watermarking scheme using LSB Modification to perform tamper detection and recovery in the ROI. To make this watermarking scheme reversible, RLE is used to embed the original LSBs in the RONI to get higher embedding capacity. The experimental results show that this watermarking system can detect and localize tamper with up to 100% accuracy and perform image recovery up to 100% recovery rate until 20% of tempered area in ROI.

  • Digital image authentication system based on digital watermarking

    In these days, people are using social networking sites for sharing their life moments as images. And another side other users can access or even download those digital images. Faker can exploits by editing and modifying the original image. Modify images can then be upload and share. The illegal use of personal image comes under copyright law. This research paper introduces a prototype for Digital Image Authentication System (DIAS). This system can perform visible and invisible watermarking on image. DIAS is applicable for color and gray images. The input image could be of any size, and the resultant image size would be same as input image. DIAS identifies the ownership of digital image using Digital Watermarking. The Digital watermarking concept is used to hide and detect information from image. It is the best way to copyright protection of the user. By the use of digital watermarking, user can blame on faker for ownership. This is known as an Authentication System for ownership identification. The complete system consists of two functions, one for hiding information inside image and other for detecting information from image. In this approach, digital watermarking performed using Discrete Wavelet Transform (DWT) and analyzed its results.

  • Improved Web Page Watermarking

    Web Page Watermarking is a research branch of the text watermarking. It is relatively difficult to embed the watermarking into the Web Page. For the particularity of the Web Page, this paper proposes an effectively improved Web Page Watermarking program which can not only protect the Web Page's completeness from tampering, but also can protect the whole Web site's copyright, integrity and consistency. This program, which can be effectively used for copyright protection, is able to test whether the Web Page suffers tampering, and to locate tampering.

  • The Twin Image Watermarking Algorithm (TIWA): A New Techniques for Single and Multi-Message Watermarking Based on Optimum Complete Complementary Codes

    In this paper, a new robust image watermarking technique adopting an optimum encoding framework is proposed. This technique namely, the twin image watermarking algorithm TIWA, utilizes a particular kind of optimum two dimensional codes, based on complete complementary codes, for the introduced watermark encoding process. The TIWA algorithm is first presented for single user, then supported with the optimum code arrays properties, is developed to support multi-message hiding. The enhanced robustness, the developed security, and the remarkable performance compared to conventional technique are the main advantages of the proposed technique shown by the simulation results

  • A Blind Watermarking Technology Based on DCT Domain

    As a new information hiding technology, digital watermarking attracted more and more attention in copyright protection. This paper proposed a DCT domain blind watermarking algorithm based on Arnold and quantification. Firstly we conduct Arnold chaotic scrambling to the watermarking before the embedding, to reduce the correlation between pixels and improve the security of the watermarking, then according to the bit values of watermarking which to be embedded, using different methods to quantize the frequency coefficient of each sub-block, and then based on the coefficient characteristics of embedding watermarking to extract the watermarking, in which the watermarking extraction process does not require the original image so that achieved the blind extraction. Numbers of experiments show that the algorithm has good robustness and transparency in cope with common attacks.



Standards related to Watermarking

Back to Top

No standards are currently tagged "Watermarking"


Jobs related to Watermarking

Back to Top