Learn More
In this paper a blind watermarking algorithm for digital image is presented. The proposed method operates in wavelet domain. The watermark is decomposed into 2D-IMFs(intrinsic mode functions)using BEMD (bidimensional empirical mode decomposition) which is the 2-dimensional extension of1 dimensional empirical mode decomposition. The CDMA (code division(More)
In this paper, a new forensic watermarking algorithm which generates digital hologram from forensic mark and embeds it into DWT-SVD domain was suggested. Forensic watermarking is used to trace the illegal distribution. For the purpose of the high capacity, off-axis hologram is generated from forensic m and the hologram is embedded into subband of the DWT(More)
Abstract. In this paper, a multiple audio watermarking algorithm was proposed for embedding information of multiple users into audio content to trace illegal distribution. The information is generated by Dot Code A which can express multiple user’s information with error correction. The Hadamard transform was used for spreading the Dot Code A. This also(More)
In this paper we suggested a new image watermarking algorithm which can hide special information of the ID owner for preventing ID’s photo forgery. The algorithm should have robustness against to printing and scanning of the photo because the photo used in ID isn’t a digital photo but a printed analog photo. And it also should have enough(More)
In this paper, we proposed a new video forensic marking algorithm to hide special information of the content user in order to prevent the illegal distribution of the video content. The information which is hid to trace the illegal distribution of the content is the copyright owner information, buyer information, upload and download time, and so on. So, the(More)
In this paper, we propose a new digital watermarking algorithm that hides specific information related to content-users. The proposed algorithm uses a correlation peak position modulation (CPPM) to ensure robustness and sufficient capacity, and this is modulated by user information. For a JPEG compression operation with a quality factor of 35, the other(More)
  • 1