Experiments for different images when quality is 90

Experiments for different images when quality is 90

Source publication
Article
Full-text available
With the development of mobile Internet technology, the characteristic of easy editing, transmitting, and forging the digital media bring great challenges in authenticity of multimedia. Due to that, the focus on the digital forensics and identification, such as source identification, content authentication, and information integrity, have become an...

Contexts in source publication

Context 1
... watermark describes the mobile photo information, such as phone no., time, location, and IMEI, and the attack methods are the same as above. Table 2 shows the same results as described above and the experiments show the valid- ation and performance of the proposed algorithm. ...
Context 2
... to the experimental results from Table 2, we draw the conclusion as follows: The CIR for dif- ferent images are in general less than 0 when com- pression quality is 90, which means the file size of watermarked images cannot be increased very much for watermark embedding, even decreased for JPEG compression. The PSNR of the images are in general above 38 dB, and the bit error of the identification watermarks are near 0. ...

Similar publications

Article
Full-text available
With the development of Internet technology, transmitting, editing and misusing the digital multimedia bring great challenges in misusing detection for multimedia content protection. In this paper we proposed an artwork image digital rights management scheme for Internet misusing detection based on watermark and blockchain with robustness and high-...

Citations

... Traditional content protection methods are designed to protect data copyrights and content ownership, and they include encryption, digital rights management, and watermarking. [5][6][7][8] Although some distribution systems address the copyright, transparency, and secure sharing of videos, there are still a numerous challenges to be addressed. ...
... 48 Time costs were measured for different attributes and found to correlate with the number of attributes. To satisfy current needs, we assumed the number of attributes was given by     n n = ϵ [5,25] a a , u . The corresponding test results are shown in Figure 3 and Table 4. ...
... The corresponding test results are shown in Figure 3 and Table 4. The time cost was evaluated for specific encryption algorithms using (5,10,15,20,25) attribute values. The corresponding time cost remained constant at 21.71 ms, as shown in Table 3. ...
Article
Video streaming applications are rapidly proliferating, allowing users to browse, download, and share videos through platforms such as YouTube, Netflix, and Amazon. Media content providers are required to register copyrights on digital platforms. With the existence of blockchain technology, users can manage their data using a smart contract, which allows them to define access and search policies and use an instant payment system without a third party in a decentralized network. We propose a secure and reliable video sharing scheme based on blockchain, using cryptographic primitives to secure the information of streamers and viewers. The use of blockchain ensures reliability and prevents the manipulating or forging of multimedia content. A smart contract system is implemented to represent contractual actions once a given access condition is satisfied. Analysis of the scheme's security and performance demonstrates that it is reliable and efficient.
... The whole attack process is shown in Figure 1. Existing mainstream or novel DRM mechanisms include but are not limited to encapsulated encryption and confusion [2][3][4][5], digital watermarks [6][7][8][9][10][11][12][13][14], blockchain [15,16], trusted computing [17,18], biological features [19], etc. After reviewing the previous schemes, we believe that existing DRM technologies still have great defects. ...
Article
Full-text available
With the development of information technology, films, music, and other publications are inclined to be distributed in digitalized form. However, the low cost of data replication and dissemination leads to digital rights problems and brings huge economic losses. Up to now, existing digital rights management (DRM) schemes have been powerless to deter attempts of infringing digital rights and recover losses of copyright holders. This paper presents a YODA-based digital watermark management system (Y-DWMS), adopting non-repudiation of smart contract and blockchain, to implement a DRM mechanism to infinitely amplify the cost of infringement and recover losses copyright holders suffered once the infringement is reported. We adopt game analysis to prove that in Y-DWMS, the decision of non-infringement always dominates rational users, so as to fundamentally eradicate the infringement of digital rights, which current mainstream DRM schemes cannot reach.
Article
With the widespread growth of digital information and improved internet technologies, the demand for improved information security techniques has significantly increased due to privacy leakage, identity theft, illegal copying, and data distribution. Because of this, data hiding approaches have received much attention in several application areas. However, those approaches are unable to solve many issues that are necessary to measure in future investigations. This survey provides a comprehensive survey on data hiding techniques and their new trends for solving new challenges in real-world applications. The notable applications are telemedicine, 3D objects, mobile devices, cloud/distributed computing and data mining environments, chip and hardware protection, cyber physical systems, internet traffic, fusion of watermarking and encryption, joint compression and watermarking, biometric watermarking, watermarking at the physical layer, and many other perspectives. Further, the potential issues that existing approaches of data hiding face are identified. I believe that this survey will provide a valuable source of information for finding research directions for fledgling researchers and developers.