[HTML][HTML] A review on visual privacy preservation techniques for active and assisted living
This paper reviews the state of the art in visual privacy protection techniques, with particular
attention paid to techniques applicable to the field of Active and Assisted Living (AAL). A …
attention paid to techniques applicable to the field of Active and Assisted Living (AAL). A …
Quantization index modulation: A class of provably good methods for digital watermarking and information embedding
B Chen, GW Wornell - IEEE Transactions on Information theory, 2001 - ieeexplore.ieee.org
We consider the problem of embedding one signal (eg, a digital watermark), within another"
host" signal to form a third," composite" signal. The embedding is designed to achieve …
host" signal to form a third," composite" signal. The embedding is designed to achieve …
Efficiently self-synchronized audio watermarking for assured audio data transmission
In this paper, we propose a self-synchronization algorithm for audio watermarking to
facilitate assured audio data transmission. The synchronization codes are embedded into …
facilitate assured audio data transmission. The synchronization codes are embedded into …
Color image watermarking using multidimensional Fourier transforms
TK Tsui, XP Zhang, D Androutsos - IEEE Transactions on …, 2008 - ieeexplore.ieee.org
This paper presents two vector watermarking schemes that are based on the use of complex
and quaternion Fourier transforms and demonstrates, for the first time, how to embed …
and quaternion Fourier transforms and demonstrates, for the first time, how to embed …
Data hiding in motion vectors of compressed video based on their associated prediction error
HA Aly - IEEE transactions on information forensics and …, 2010 - ieeexplore.ieee.org
This paper deals with data hiding in compressed video. Unlike data hiding in images and
raw video which operates on the images themselves in the spatial or transformed domain …
raw video which operates on the images themselves in the spatial or transformed domain …
Using deep learning for image watermarking attack
Digital image watermarking has justified its suitability for copyright protection and copy
control of digital images. In the past years, various watermarking schemes were proposed to …
control of digital images. In the past years, various watermarking schemes were proposed to …
[PDF][PDF] RAINBOW: A robust and invisible non-blind watermark for network flows.
Linking network flows is an important problem in intrusion detection as well as anonymity.
Passive traffic analysis can link flows but requires long periods of observation to reduce …
Passive traffic analysis can link flows but requires long periods of observation to reduce …
Audio watermarking via EMD
K Khaldi, AO Boudraa - IEEE transactions on audio, speech …, 2012 - ieeexplore.ieee.org
In this paper a new adaptive audio watermarking algorithm based on Empirical Mode
Decomposition (EMD) is introduced. The audio signal is divided into frames and each one is …
Decomposition (EMD) is introduced. The audio signal is divided into frames and each one is …
LiDAR data integrity verification for autonomous vehicle
R Changalvala, H Malik - IEEE Access, 2019 - ieeexplore.ieee.org
Deterministic perception of the surrounding environment is both crucial and a challenging
task for autonomous vehicles. A wide range of sensors, including LiDAR, RADAR, cameras …
task for autonomous vehicles. A wide range of sensors, including LiDAR, RADAR, cameras …
Using perceptual models to improve fidelity and provide resistance to valumetric scaling for quantization index modulation watermarking
Q Li, IJ Cox - IEEE Transactions on Information Forensics and …, 2007 - ieeexplore.ieee.org
Traditional quantization index modulation (QIM) methods are based on a fixed quantization
step size, which may lead to poor fidelity in some areas of the content. A more serious …
step size, which may lead to poor fidelity in some areas of the content. A more serious …