Double-Sided Watermark Embedding and Detection
Spread-spectrum schemes embed additive or multiplicative watermarks into the host contents for copyright protection. However, their performances are reduced by the interference from the host contents. Thus, in this work, we introduce a simple double-...
Reversible Data-Hiding Scheme for 2-D Vector Maps Based on Difference Expansion
Reversible watermarking is suitable for hiding data in 2-D vector maps because the distortions induced by data embedding can be removed after extracting the hidden bits. In this paper, two reversible data-hiding schemes are explored based on the idea of ...
Reversible Image Watermarking Based on Integer-to-Integer Wavelet Transform
This paper proposes a high capacity reversible image watermarking scheme based on integer-to-integer wavelet transforms. The proposed scheme divides an input image into nonoverlapping blocks and embeds a watermark into the high-frequency wavelet ...
Robust Wireless Transmission of Compressed Latent Fingerprint Images
Maximizing the potential of latent fingerprints from crime scenes in the identification of suspects requires the rapid transfer of the latent from the scene to a remote fingerprint bureau. Transmission over restricted-bandwidth cellular wireless ...
Lossless Data Embedding With High Embedding Capacity Based on Declustering for VQ-Compressed Codes
The purpose of data hiding with reversibility property is to recover the original cover media after extracting the hidden data from the stegomedia. In this paper, we propose a reversible data-hiding scheme for embedding secret data in VQ-compressed ...
Watermarking Protocol for Web Context
Digital watermarking is considered to be a main technology for the copyright protection of multimedia digital content distributed on the Internet. However, watermarking procedures can effectively support copyright protection processes only if they are ...
Channel Identification: Secret Sharing Using Reciprocity in Ultrawideband Channels
To establish a secure communications link between any two transceivers, the communicating parties require some shared secret, or key, with which to encrypt the message so that it cannot be understood by an enemy observer. Using the theory of reciprocity ...
Robust and Secure Image Hashing via Non-Negative Matrix Factorizations
In this paper, we propose the use of non-negative matrix factorization (NMF) for image hashing. In particular, we view images as matrices and the goal of hashing as a randomized dimensionality reduction that retains the essence of the original image ...
Statistical Models for Assessing the Individuality of Fingerprints
Following the Daubert ruling in 1993, forensic evidence based on fingerprints was first challenged in the 1999 case of the U.S. versus Byron C. Mitchell and, subsequently, in 20 other cases involving fingerprint evidence. The main concern with the ...
A Memetic Fingerprint Matching Algorithm
Minutiae point pattern matching is the most common approach for fingerprint verification. Although many minutiae point pattern matching algorithms have been proposed, reliable automatic fingerprint verification remains as a challenging problem, both ...
Toward Pose-Invariant 2-D Face Recognition Through Point Distribution Models and Facial Symmetry
This paper proposes novel ways to deal with pose variations in a 2-D face recognition scenario. Using a training set of sparse face meshes, we built a point distribution model and identified the parameters which are responsible for controlling the ...
Warping-Based Offline Signature Recognition
Offline signature recognition is an important form of biometric identification that can be used for various purposes. Similar to other biometric measures, signatures have inherent variability and so pose a difficult recognition problem. In this paper, ...
Exposing Digital Forgeries in Interlaced and Deinterlaced Video
With the advent of high-quality digital video cameras and sophisticated video editing software, it is becoming increasingly easier to tamper with digital video. A growing number of video surveillance cameras are also giving rise to an enormous amount of ...
Exposing Digital Forgeries in Complex Lighting Environments
The availability of sophisticated digital imaging technology has given rise to digital forgeries that are increasing in sophistication and frequency. We describe a technique for exposing such fakes by detecting inconsistencies in lighting. We show how ...
Unicity Distance of Robust Image Hashing
An image hash is a randomized compact representation of image content and finds applications in image authentication, image and video watermarking, and image similarity comparison. Usually, an image-hashing scheme is required to be robust and secure, ...
Multimodal Wireless Networks: Communication and Surveillance on the Same Infrastructure
In this paper, we propose a new family of wireless networks-the multimodal wireless networks. These networks offer multiple functionalities realized on the same infrastructure. A multimodal wireless network has two modes of operation: 1) the ...