[HTML][HTML] A review on visual privacy preservation techniques for active and assisted living

S Ravi, P Climent-Pérez, F Florez-Revuelta - Multimedia Tools and …, 2024 - Springer
This paper reviews the state of the art in visual privacy protection techniques, with particular
attention paid to techniques applicable to the field of Active and Assisted Living (AAL). A …

Quantization index modulation: A class of provably good methods for digital watermarking and information embedding

B Chen, GW Wornell - IEEE Transactions on Information theory, 2001 - ieeexplore.ieee.org
We consider the problem of embedding one signal (eg, a digital watermark), within another"
host" signal to form a third," composite" signal. The embedding is designed to achieve …

Efficiently self-synchronized audio watermarking for assured audio data transmission

S Wu, J Huang, D Huang, YQ Shi - IEEE Transactions on …, 2005 - ieeexplore.ieee.org
In this paper, we propose a self-synchronization algorithm for audio watermarking to
facilitate assured audio data transmission. The synchronization codes are embedded into …

Color image watermarking using multidimensional Fourier transforms

TK Tsui, XP Zhang, D Androutsos - IEEE Transactions on …, 2008 - ieeexplore.ieee.org
This paper presents two vector watermarking schemes that are based on the use of complex
and quaternion Fourier transforms and demonstrates, for the first time, how to embed …

Data hiding in motion vectors of compressed video based on their associated prediction error

HA Aly - IEEE transactions on information forensics and …, 2010 - ieeexplore.ieee.org
This paper deals with data hiding in compressed video. Unlike data hiding in images and
raw video which operates on the images themselves in the spatial or transformed domain …

Using deep learning for image watermarking attack

MW Hatoum, JF Couchot, R Couturier… - Signal Processing: Image …, 2021 - Elsevier
Digital image watermarking has justified its suitability for copyright protection and copy
control of digital images. In the past years, various watermarking schemes were proposed to …

[PDF][PDF] RAINBOW: A robust and invisible non-blind watermark for network flows.

A Houmansadr, N Kiyavash, N Borisov - NDSS, 2009 - Citeseer
Linking network flows is an important problem in intrusion detection as well as anonymity.
Passive traffic analysis can link flows but requires long periods of observation to reduce …

Audio watermarking via EMD

K Khaldi, AO Boudraa - IEEE transactions on audio, speech …, 2012 - ieeexplore.ieee.org
In this paper a new adaptive audio watermarking algorithm based on Empirical Mode
Decomposition (EMD) is introduced. The audio signal is divided into frames and each one is …

LiDAR data integrity verification for autonomous vehicle

R Changalvala, H Malik - IEEE Access, 2019 - ieeexplore.ieee.org
Deterministic perception of the surrounding environment is both crucial and a challenging
task for autonomous vehicles. A wide range of sensors, including LiDAR, RADAR, cameras …

Using perceptual models to improve fidelity and provide resistance to valumetric scaling for quantization index modulation watermarking

Q Li, IJ Cox - IEEE Transactions on Information Forensics and …, 2007 - ieeexplore.ieee.org
Traditional quantization index modulation (QIM) methods are based on a fixed quantization
step size, which may lead to poor fidelity in some areas of the content. A more serious …