• Title/Summary/Keyword: Embedding Techniques

Search Result 141, Processing Time 0.032 seconds

Robust Image Watermarking using Quantization on the Lowest Wavelet Subband (웨이브렛 최저주파수 대역에서의 양자화를 이용한 강인한 영상 워터마킹)

  • 서용석;주상현;유원영
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.28 no.9C
    • /
    • pp.898-907
    • /
    • 2003
  • In this paper, we propose a new blind watermarking method that embeds a watermark on the lowest wavelet subband coefficients, while most watermarking techniques embed watermarks in the middle frequency range for robustness and fidelity. A new embedding algorithm for watermarking is proposed that embeds a bi-level watermark sequence into randomly selected wavelet coefficients on the lowest subband(LL) using a quantization in order to be robust. Experimental results prove our novel embedding strategy is invisible and good rate-distortion-robustness performance.

Joint Access Point Selection and Local Discriminant Embedding for Energy Efficient and Accurate Wi-Fi Positioning

  • Deng, Zhi-An;Xu, Yu-Bin;Ma, Lin
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.6 no.3
    • /
    • pp.794-814
    • /
    • 2012
  • We propose a novel method for improving Wi-Fi positioning accuracy while reducing the energy consumption of mobile devices. Our method presents three contributions. First, we jointly and intelligently select the optimal subset of access points for positioning via maximum mutual information criterion. Second, we further propose local discriminant embedding algorithm for nonlinear discriminative feature extraction, a process that cannot be effectively handled by existing linear techniques. Third, to reduce complexity and make input signal space more compact, we incorporate clustering analysis to localize the positioning model. Experiments in realistic environments demonstrate that the proposed method can lower energy consumption while achieving higher accuracy compared with previous methods. The improvement can be attributed to the capability of our method to extract the most discriminative features for positioning as well as require smaller computation cost and shorter sensing time.

Estimation of the journal distance of Genomics & Informatics from other bioinformatics-driven journals, 2003-2018

  • Oh, Ji-Hye;Nam, Hee-Jo;Park, Hyun-Seok
    • Genomics & Informatics
    • /
    • v.19 no.4
    • /
    • pp.51.1-51.8
    • /
    • 2021
  • This study explored the trends of Genomics & Informatics during the period of 2003-2018 in comparison with 11 other scholarly journals: BMC Bioinformatics, Algorithms for Molecular Biology: AMB, BMC Systems Biology, Journal of Computational Biology, Briefings in Bioinformatics, BMC Genomics, Nucleic Acids Research, American Journal of Human Genetics, Oncogenesis, Disease Markers, and Microarrays. In total, 22,423 research articles were reviewed. Content analysis was the main method employed in the current research. The results were interpreted using descriptive analysis, a clustering analysis, word embedding, and deep learning techniques. Trends are discussed for the 12 journals, both individually and collectively. This is an extension of our previous study (PMCID: PMC6808643).

A Study on the Performance Analysis of Entity Name Recognition Techniques Using Korean Patent Literature

  • Gim, Jangwon
    • Journal of Advanced Information Technology and Convergence
    • /
    • v.10 no.2
    • /
    • pp.139-151
    • /
    • 2020
  • Entity name recognition is a part of information extraction that extracts entity names from documents and classifies the types of extracted entity names. Entity name recognition technologies are widely used in natural language processing, such as information retrieval, machine translation, and query response systems. Various deep learning-based models exist to improve entity name recognition performance, but studies that compared and analyzed these models on Korean data are insufficient. In this paper, we compare and analyze the performance of CRF, LSTM-CRF, BiLSTM-CRF, and BERT, which are actively used to identify entity names using Korean data. Also, we compare and evaluate whether embedding models, which are variously used in recent natural language processing tasks, can affect the entity name recognition model's performance improvement. As a result of experiments on patent data and Korean corpus, it was confirmed that the BiLSTM-CRF using FastText method showed the highest performance.

A RST Resistant Logo Embedding Technique Using Block DCT and Image Normalization (블록 DCT와 영상 정규화를 이용한 회전, 크기, 이동 변환에 견디는 강인한 로고 삽입방법)

  • Choi Yoon-Hee;Choi Tae-Sun
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.15 no.5
    • /
    • pp.93-103
    • /
    • 2005
  • In this paper, we propose a RST resistant robust logo embedding technique for multimedia copyright protection Geometric manipulations are challenging attacks in that they do not introduce the quality degradation very much but make the detection process very complex and difficult. Watermark embedding in the normalized image directly suffers from smoothing effect due to the interpolation during the image normalization. This can be avoided by estimating the transform parameters using an image normalization technique, instead of embedding in the normalized image. Conventional RST resistant schemes that use full frame transform suffer from the absence of effective perceptual masking methods. Thus, we adopt $8\times8$ block DCT and calculate masking using a spatio-frequency localization of the $8\times8$ block DCT coefficients. Simulation results show that the proposed algorithm is robust against various signal processing techniques, compression and geometrical manipulations.

New Text Steganography Technique Based on Part-of-Speech Tagging and Format-Preserving Encryption

  • Mohammed Abdul Majeed;Rossilawati Sulaiman;Zarina Shukur
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.18 no.1
    • /
    • pp.170-191
    • /
    • 2024
  • The transmission of confidential data using cover media is called steganography. The three requirements of any effective steganography system are high embedding capacity, security, and imperceptibility. The text file's structure, which makes syntax and grammar more visually obvious than in other media, contributes to its poor imperceptibility. Text steganography is regarded as the most challenging carrier to hide secret data because of its insufficient redundant data compared to other digital objects. Unicode characters, especially non-printing or invisible, are employed for hiding data by mapping a specific amount of secret data bits in each character and inserting the character into cover text spaces. These characters are known with limited spaces to embed secret data. Current studies that used Unicode characters in text steganography focused on increasing the data hiding capacity with insufficient redundant data in a text file. A sequential embedding pattern is often selected and included in all available positions in the cover text. This embedding pattern negatively affects the text steganography system's imperceptibility and security. Thus, this study attempts to solve these limitations using the Part-of-speech (POS) tagging technique combined with the randomization concept in data hiding. Combining these two techniques allows inserting the Unicode characters in randomized patterns with specific positions in the cover text to increase data hiding capacity with minimum effects on imperceptibility and security. Format-preserving encryption (FPE) is also used to encrypt a secret message without changing its size before the embedding processes. By comparing the proposed technique to already existing ones, the results demonstrate that it fulfils the cover file's capacity, imperceptibility, and security requirements.

Semi-Fragile Watermarking for Telltale Tamper Proofing and Authenticating

  • Ko, Han-Ho;Park, Sang-Ju
    • Proceedings of the IEEK Conference
    • /
    • 2002.07a
    • /
    • pp.623-626
    • /
    • 2002
  • Extreme development in digital multimedia has raised anxiety in the minds of copyrighted content owners. This has resulted in the creation of several watermarking techniques. This paper, proposes a method of embedding a perceptually transparent digital signal, named semi-fragile watermark in the wavelet domain, utilizing the characteristics of the human visual system. So as to detect attacks inflicted on the content and use an algorithm to specify the character of the attack.

  • PDF

A Low Frequency Band Watermarking with Weighted Correction in the Combined Cosine and Wavelet Transform Domain

  • Deb, Kaushik;Al-Seraj, Md. Sajib;Chong, Ui-Pil
    • Journal of the Institute of Convergence Signal Processing
    • /
    • v.14 no.1
    • /
    • pp.13-20
    • /
    • 2013
  • A combined DWT and DCT based watermarking technique of low frequency watermarking with weighted correction is proposed. The DWT has excellent spatial localization, frequency spread and multi-resolution characteristics, which are similar to the theoretical models of the human visual system (HVS). The DCT based watermarking techniques offer compression while DWT based watermarking techniques offer scalability. These desirable properties are used in this combined watermarking technique. In the proposed method watermark bits are embedded in the low frequency band of each DCT block of selected DWT sub-band. The weighted correction is also used to improve the imperceptibility. The extracting procedure reverses the embedding operations without the reference of the original image. Compared with the similar approach by DCT based approach and DWT based approach, the experimental results show that the proposed algorithm apparently preserves superiori mage quality and robustness under various attacks such as JPEG compression, cropping, sharping, contrast adjustments and so on.

A Robust and Removable Watermarking Scheme Using Singular Value Decomposition

  • Di, Ya-Feng;Lee, Chin-Feng;Wang, Zhi-Hui;Chang, Chin-Chen;Li, Jianjun
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.10 no.12
    • /
    • pp.5268-5285
    • /
    • 2016
  • Digital watermarking techniques are widely applied to protect the integrity and copyright of digital content. In a majority of the literature for watermarking techniques, the watermarked image often causes some distortions after embedding a watermark. For image-quality-concerned users, the distortions from a watermarked image are unacceptable. In this article, we propose a removable watermarking scheme that can restore an original-like image and resist signal-processing attacks to protect the ownership of an image by utilizing the property of singular value decomposition (SVD). The experimental results reveal that the proposed scheme meets the requirements of watermarking robustness, and also reestablishes an image like the original with average PSNR values of 59.07 dB for reconstructed images.

Adaptive Watermarking Using Successive Subband Quantization and Perceptual Model Based on Multiwavelet Transform Domain (멀티웨이브릿 변환 영역 기반의 연속 부대역 양자화 및 지각 모델을 이용한 적응 워터마킹)

  • 권기룡;이준재
    • Journal of Korea Multimedia Society
    • /
    • v.6 no.7
    • /
    • pp.1149-1158
    • /
    • 2003
  • Content adaptive watermark embedding algorithm using a stochastic image model in the multiwavelet transform is proposed in this paper. A watermark is embedded into the perceptually significant coefficients (PSCs) of each subband using multiwavelet transform. The PSCs in high frequency subband are selected by SSQ, that is, by setting the thresholds as the one half of the largest coefficient in each subband. The perceptual model is applied with a stochastic approach based on noise visibility function (NVF) that has local image properties for watermark embedding. This model uses stationary Generalized Gaussian model characteristic because watermark has noise properties. The watermark estimation use shape parameter and variance of subband region. it is derive content adaptive criteria according to edge and texture, and flat region. The experiment results of the proposed watermark embedding method based on multiwavelet transform techniques were found to be excellent invisibility and robustness.

  • PDF