Loading [MathJax]/extensions/MathZoom.js
M. D. Swanson - IEEE Xplore Author Profile

Showing 1-18 of 18 results

Results

Digital multimedia is ubiquitous today. Multimedia is easily reproduced and modified without any trace of manipulations. In most cases, a human will not be able to judge whether a multimedia signal is authentic by perceptual inspection. In this article we provide a compact yet fairly comprehensive introduction of multimedia authentication (MA) to the general signal processing audience. The article...Show More
Transparent data embedding algorithms embed binary streams in host multimedia signals. The embedded data is perceptually inaudible to maintain the quality of the source data. The embedded data can add features to the host multimedia signal or provide copyright protection. We review developments and requirements in transparent data embedding techniques for audio signals. We describe our latest audi...Show More
Summary form only given. Data embedding algorithms embed binary streams in host multimedia signals. The embedded data can add features to the host multimedia signal or provide copyright protection. We review requirements for transparent data embedding techniques in audio signals. We describe and contrast current approaches to data embedding in audio. In particular, we emphasize the advantages and ...Show More
We review developments in transparent data embedding and watermarking for audio, image, and video. Data-embedding and watermarking algorithms embed text, binary streams, audio, image, or video in a host audio, image, or video signal. The embedded data are perceptually inaudible or invisible to maintain the quality of the source data. The embedded data can add features to the host multimedia signal...Show More
We present a watermarking procedure to embed copyright protection into digital video. Our watermarking procedure is scene-based and video dependent. It directly exploits spatial masking, frequency masking, and temporal properties to embed an invisible and robust watermark. The watermark consists of static and dynamic temporal components that are generated from a temporal wavelet transform of the v...Show More
The advantages of digital media have opened up many new possibilities to hide data (information) within audio, image and video files. In order to provide copyright protection digital watermarking has been proposed as a means of identifying the owner or distributor of digital data. Data hiding and watermarking research builds on ideas and concepts developed in cryptography, communications theory, a...Show More
We present a watermarking procedure to embed copyright protection into video sequences. To address issues associated with video motion and redundancy, individual watermarks are created for objects within the video. Each watermark is created by shaping an author and video dependent pseudo-random sequence according to the perceptual masking characteristics of the video. As a result, the watermark ad...Show More
We propose a technique to search through large image collections. Each database image is stored as a combination of potential query terms (i.e., objects, texture regions, etc.) and non-query terms. The query terms are represented by affine-invariant B-spline moments and wavelet transform subbands. The dual representation supports a two-stage image retrieval system. A user-posed query is first mapp...Show More
We propose an image coding algorithm which employs data hiding techniques to "fold" an image into itself. Data hiding is a process of encoding extra information into a host image by making small modifications to its pixels. In our approach, an image is split into two parts of equal size: a host image and a residual image. The residual image is compressed into a bit stream and then embedded into th...Show More
We introduce a scheme for hiding high bit-rate supplementary data, such as secondary video, into a digital video stream by directly modifying the pixels in the video frames. The technique requires no separate channel or bit interleaving to transmit the extra information. The data is invisibly embedded using a perception-based projection and quantization algorithm. The data hiding algorithm support...Show More
We introduce a watermarking procedure to embed copyright protection into digital video. Our video dependent watermarking procedure directly exploits the masking and temporal properties to embed an invisible and robust watermark. The watermark consists of static and dynamic temporal components that are generated from a temporal wavelet transform of the video scenes. To generate the watermark, the r...Show More
We describe a technique to encode images for content-based access and retrieval. Potential query terms are first extracted from an image and represented in terms of multiresolution subbands. A vector quantizer structure then maps the subbands of each image object onto a set of embedded dictionaries. An algorithm is used to exploit the occurrence and query probabilities of the objects for efficient...Show More
We propose a watermarking scheme to hide copyright information in an image. The scheme employs visual masking to guarantee that the embedded watermark is invisible and to maximize the robustness of the hidden data. The watermark is constructed for arbitrary image blocks by filtering a pseudo-noise sequence (author id) with a filter that approximates the frequency masking characteristics of the vis...Show More
Data hiding is the process of encoding extra information in an image by making small modifications to its pixels. To be practical, the hidden data must be perceptually invisible yet robust to common signal processing operations. This paper introduces two schemes for hiding data in images. The techniques exploit perceptual masking properties to embed the data in an invisible manner. The first metho...Show More
We propose a novel scheme to embed an invisible signature into an image to check image integrity and measure its distortion. The technique is based on the pseudo-noise sequences and visual masking effects. The values of an image are modified by a pseudo-noise signature which is shaped by the perceptual thresholds from masking effects. The method is robust and can gauge errors accurately up to half...Show More
We construct a theory of binary wavelet decompositions of finite binary images. The new binary wavelet transform uses simple module-2 operations. It shares many of the important characteristics of the real wavelet transform. In particular, it yields an output similar to the thresholded output of a real wavelet transform operating on the underlying binary image. We begin by introducing a new binary...Show More
Constructs a theory of wavelet decompositions of binary images. The construction defines binary valued wavelets and scaling functions and their associated spectral properties. The authors begin by introducing a new binary field transform and the corresponding concept of sequence spectra over GF(2). Using this transform, a theory of binary wavelets is then developed in terms of 2-band perfect recon...Show More