High-frequency Invisible Code for Natural Images Using Color Shift Technique
نویسندگان
چکیده
منابع مشابه
Invisible Watermarking of Color Images using SVD and DWT
The rapid growth of the world wide web and the wide spread usage of multimedia in the internet has resulted in various security and authenticity issues. Everyday multimedia content is shared via internet to different locations and different people across the globe. The various image processing techniques available today allows intellectual property theft and reproduction of digital images in an...
متن کاملEmbedding Invisible Information in Color Images
David J. Fleet David J. Heeger Department of Computing Science Department of Psychology Queen's University Stanford University Kingston, Canada K7L 3N6 Palo Alto, CA 94305 Abstract We describe a method for embedding information in color images. A model of human color vision is used to ensure that the embedded signal is invisible. Sinusoidal signals are embedded so that they can be detected (dec...
متن کاملAutomatic Quick-Shift Segmentation for Color Images
This paper proposes an automatic quick-shift segmentation method using illumination invariant representation of natural color images. In practice, the quick-shift segmentation method is sensitive to the choice of parameters, thus a quick tuning by hand is not sufficient. The proposed method segments images into homogeneous regions by applying the quick-shift method with initial values, then cha...
متن کاملThe Color-Code Technique for 3D Scanning
We present a new method of image coding in structured light 3D scanning called Color-Coding. The method reduces the number of projected patterns needed to generate the code used to retrieve depths of an object being scanned to only three slides, each one containg RGB values that identify the vertical image stripes correctly. The technique converts the RGB values to the well-known Gray-Code algo...
متن کاملPioneering the Technique for Invisible Image Watermarking on Color Image
Accessibility and ease of internet, together with availability of relatively inexpensive digital recording and storage devices has created an environment where duplication, unauthenticated use and maldistribution of digital content has become very easy. This also facilitates unauthorized use, misappropriation, misrepresentation. Thus authentication of multimedia contents (such as image, video, ...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: The Journal of The Institute of Image Information and Television Engineers
سال: 2012
ISSN: 1342-6907,1881-6908
DOI: 10.3169/itej.66.j407