scholarly journals FCM-Based Approach for Locating Visible Video Watermarks

Symmetry ◽  
2020 ◽  
Vol 12 (3) ◽  
pp. 339 ◽  
Author(s):  
A. Al. Embaby ◽  
Mohamed A. Wahby Shalaby ◽  
Khaled Mostafa Elsayed

The increased usage demand for digital multimedia has induced significant challenges regarding copyright protection, which is the copy control and proof of ownership. Digital watermarking serves as a solution to these kinds of problems. Among different types of digital watermarking, visible watermarking protects the copyrights effectively, since the approach not only prevents pirates but also visually proves the copyright of the broadcasted video. A visible watermark could be in any location on the frame (corner, center, diagonal, etc.). In addition, it could either completely or partially disappear for some frames. The same video also might have multiple watermarks. In order to strengthen the techniques of adding visible watermarks, there is a need to discover the weakness of the used watermarks. Since the major step of attacking a visible watermark is to locate it accurately, in this paper, a Fuzzy C-Means (FCM)-based approach is proposed to locate visible watermarks in video. Broadcasting channels are used to utilize video logos, which can be considered as a form of visible watermark that represents a trademark or symbol to declare the intellectual property ownership. In general, a high-standard video watermark has such properties as a clear background with distinctive shape without additional texture obscuring the watermark area. In addition, the probability of the logo appearing in the four corners of the video frames is higher than in the center. Based on these common properties of the video watermark, the proposed scheme locates the visible watermark using the Fuzzy C-Means technique without any prior information. The proposed technique has two stages: the first stage is positioning, and the second is masking (extracting the watermark mask). Due to real-world limitations such as noise, shadowing, and variations in cameras, the positioning stage is developed by employing gradient and Fuzzy C-Means classifier techniques. By using the dilation and erosion operators, the masking stage is developed to extract the watermark mask. Using a set of trademark videos, the proposed algorithm is tested and evaluated. A comparative study shows that the proposed FCM-based technique is able to achieve higher accuracy at a reasonable computational cost in comparison to the most related and recent published work. The proposed technique could locate different watermarks with high symmetry in their pattern, even if they appeared mutually in the same location. Still, it will be a challenge if the symmetry is low between used watermarks in the same location.

2021 ◽  
Vol 2 (11) ◽  
pp. 2145-2157
Author(s):  
Ondi Asroni ◽  
Dedy Ricardo Serumena

Era zaman digital saat ini, internet telah menjadi sebuah kebutuhan sehari-hari, yang memberikan kemudahan terhadap pengguna untuk melakukan aktivitas transmisi file, namun demikian data tersebut membutuhkan proteksi dari tangan yang tidak bertanggung jawab. Dalam penelitian ini di ajukan sebuah metode digital watermarking dalam melakukan perlindungan terhadap motif batik. Adapun algoritma yang diterapkan yaitu Hybrid Singular Value Decomposition dengan Discrete Wavelete Transform, setelah dilakukan experimen penerapan Hybrid Image Watermarking DWT dengan SVD nilai alpha dapat mempengaruhi tingkat imperceptibility terhadap citra watermarked, karena nilai alpha menunjukkan tingkat ketampakan (visible) watermark pada cover image. Semakin rendah nilai alpha maka tingkat ketampakan watermark semakin berkurang dan tingkat imperceptibility semakin tinggi. Dari pengujian yang dilakukan dengan object motif batik ditemukan nilai alpha terbaik yaitu nilai alpha 0.01, karena mendapatkan nilai PSNR tertinggi dari yang lainnya, sedangkan Berdasarkan pengujian tingkat robustness metode Hybrid Image Watermarking DWT-SVD pada subband LL memiliki tingkat ketahanan yang cukup tinggi terhadap upaya menghilangkan watermark yang menjadi identitas kepemilikan sah terhadap suatu citra digital selama citra watermarked tidak direkayasa dengan serangan noise.


Author(s):  
Hehe Fan ◽  
Zhongwen Xu ◽  
Linchao Zhu ◽  
Chenggang Yan ◽  
Jianjun Ge ◽  
...  

We aim to significantly reduce the computational cost for classification of temporally untrimmed videos while retaining similar accuracy. Existing video classification methods sample frames with a predefined frequency over entire video. Differently, we propose an end-to-end deep reinforcement approach which enables an agent to classify videos by watching a very small portion of frames like what we do. We make two main contributions. First, information is not equally distributed in video frames along time. An agent needs to watch more carefully when a clip is informative and skip the frames if they are redundant or irrelevant. The proposed approach enables the agent to adapt sampling rate to video content and skip most of the frames without the loss of information. Second, in order to have a confident decision, the number of frames that should be watched by an agent varies greatly from one video to another. We incorporate an adaptive stop network to measure confidence score and generate timely trigger to stop the agent watching videos, which improves efficiency without loss of accuracy. Our approach reduces the computational cost significantly for the large-scale YouTube-8M dataset, while the accuracy remains the same.


2009 ◽  
Vol 419-420 ◽  
pp. 165-168
Author(s):  
Qiang Li ◽  
Jian Pei Zhang ◽  
Guang Sheng Feng

Both fuzzy c-means (FCM) clustering and outlier detection are useful data mining techniques in real applications. In this paper, we show that the task of outlier detection could be achieved as by-product of fuzzy c-means clustering. The proposed strategy consists of two stages. The first stage consists of purely fuzzy c-means process, while the second stage identifies exceptional objects according to a novel metric based on the entropy of membership values. We provide experimental results to demonstrate the effectiveness of our technique.


Author(s):  
A. G. Zotin ◽  
A. V. Proskurin

Abstract. In recent years, digital watermarking of photo and video materials has become more and more important in connection with the transmission of multimedia data over unsecured communication channels. Digital watermarking allows to reduce the amount of transmitted information and to protect embedded metadata. Improving robustness and security of embedded data increases computational costs, which obstruct usage of digital watermarks in mobile devices. In this research, we propose a number of improvements to the digital watermarking process based on Arnold and discrete wavelet transforms to reduce the computational cost. Considering the watermark as a linear sequence of pixels allows us to speed up its processing. The two-dimensional lookup table allows performing an Arnold transform in constant time regardless of the number of iterations. Number of iteration for each block of watermark is determined using hash function applied to the secret key. Also, the structure of the lookup table is proposed to accelerate the embedding of watermark. This table allows to determine the frequency coefficients for embedding based on the key hash code. Proposed improvements allow to speed up the watermark preparation by an average 14 times and the overall embedding process by 1.22 times for 1920×1080 images.


2021 ◽  
Vol 0 (0) ◽  
Author(s):  
Zhifeng Hu ◽  
Yin Chen

Abstract The development of film art in the People’s Republic of China throughout the past 70 years can be roughly divided into two stages: before and after the reform and opening-up. During this period, Chinese films not only influenced the political, economic, social, and cultural spheres, but they also produced aesthetics with uniquely Chinese characteristics, distinguishing themselves on the world film stage. However, after 70 years of development, Chinese films still have many contradictions and problems, namely: how to deal with the relationships between education and entertainment, plan and market, tradition/China/subjectivity, and modernity/world/diversity. Prejudicial tendencies can be avoided with a dialectical view of these relationships, and a healthy, integrated, and developmental track can be achieved. With this new historical contextualization in mind, to realize the transformation from a big film country to a strong film country, Chinese films should keep pace with the country’s economic and social strategic development, enhancing their quality and making contributions to a culturally advanced country with many high-standard films in the new era.


2010 ◽  
Vol 44-47 ◽  
pp. 3383-3387
Author(s):  
Li Sen Peng ◽  
Yong Qiang Chen ◽  
Han Ping Hu

An effective and integrated video watermark scheme mainly includes watermark generation, watermark embedding, watermark detecting, and watermark attack. The watermark data come from a meaningful binary image encrypted by two-dimensional chaotic stream encryption to improve watermark security. In the procedure of watermark embedding, watermarks are embedded into the random selected video frames through modifying the DCT coefficients. After robust and frame processes, watermarks can be mainly extracted and identified through watermark extracting algorithm. The experimental results show that the proposed video watermark method has some performances of security, imperceptibility and robustness.


SinkrOn ◽  
2019 ◽  
Vol 4 (1) ◽  
pp. 95
Author(s):  
Dwi Vernanda ◽  
Nunu Nugraha Purnawan ◽  
Tri Herdiawan Apandi

Subang State Polytechnic is one of tertiary institution which was established in 2014. As a new tertiary institution this institution certainly competes with other tertiary institutions in obtaining prospective students. Currently, Subang State Polytechnic determines some schools to be visited for socialization activities for New Student Admissions based on the large number of students in the schools at Subang district. However, it does not prove that it has influenced the students to enroll in Subang State Polytechnic. This research highlights the issues involved in each school including the number of graduates, graduates who continue to colleges, graduates who continue to Subang State Polytechnic, average score of school’s national examination, average report card grades, number of counseling guidance teachers, number of college socialization, and the distance from the school to Subang State Polytechnic. As a result, there are 40 schools that are selected to determine as the potential schools do a socialization. The grouping schools use the Fuzzy C Means method and determe the number of groups or clusters use Modified Partition Coeffcient (MPC). The results of the MPC calculation revealed that there are 3 clusters, each cluster has a cluster center and members. In cluster I, there are 9 schools, cluster II has 16 schools, and cluster III consists of 15 schools. The results of the clustering assisted the New Student Admissions committees in determining the potential schools to do a socialization activities and it was a major step towards the success of the New Student Admissions at Subang State Polytechnic.


Robotica ◽  
2014 ◽  
Vol 33 (3) ◽  
pp. 649-668 ◽  
Author(s):  
V. B. Saputra ◽  
S. K. Ong ◽  
A. Y. C. Nee

SUMMARYThis paper presents a novel method to determine the workspace of parallel manipulators using a variant of the Firefly Algorithm, which is one of the emerging techniques in swarm artificial intelligence. The workspace is defined as a set of all the coordinates in the search space that are accessible by the parallel manipulator end effector. The workspace formulation of the parallel manipulator considered in this paper has actuated and passive joint displacements which values are limited by their physical constraints. A special fitness function that discriminates between accessible and inaccessible coordinates is formulated based on the joint limitations. By finding these coordinates using the proposed Firefly Algorithm, the workspace of the manipulator can be constructed. The proposed method is an easy-to-implement alternative solution to the current numerical methods for workspace determination. The method consists of two stages of operation. The first stage maps the workspace to find the initial results with a space filling approach, in which a number of coordinates in the workspace are identified. The second stage refines the results with a boundary detection approach which focuses on the mapping of the boundaries of the workspace. The method is illustrated by its application to determine the 2D, 3D, and 6D workspaces of a Gough--Stewart Platform manipulator. Furthermore, the method is compared with a more rigorous interval analysis method in terms of computational cost and accuracy.


Author(s):  
D. M. Salmanidou ◽  
S. Guillas ◽  
A. Georgiopoulou ◽  
F. Dias

Statistical methods constitute a useful approach to understand and quantify the uncertainty that governs complex tsunami mechanisms. Numerical experiments may often have a high computational cost. This forms a limiting factor for performing uncertainty and sensitivity analyses, where numerous simulations are required. Statistical emulators, as surrogates of these simulators, can provide predictions of the physical process in a much faster and computationally inexpensive way. They can form a prominent solution to explore thousands of scenarios that would be otherwise numerically expensive and difficult to achieve. In this work, we build a statistical emulator of the deterministic codes used to simulate submarine sliding and tsunami generation at the Rockall Bank, NE Atlantic Ocean, in two stages. First we calibrate, against observations of the landslide deposits, the parameters used in the landslide simulations. This calibration is performed under a Bayesian framework using Gaussian Process (GP) emulators to approximate the landslide model, and the discrepancy function between model and observations. Distributions of the calibrated input parameters are obtained as a result of the calibration. In a second step, a GP emulator is built to mimic the coupled landslide-tsunami numerical process. The emulator propagates the uncertainties in the distributions of the calibrated input parameters inferred from the first step to the outputs. As a result, a quantification of the uncertainty of the maximum free surface elevation at specified locations is obtained.


Mathematics ◽  
2019 ◽  
Vol 7 (3) ◽  
pp. 221 ◽  
Author(s):  
Lei Gao ◽  
Zhen-yun Jiang ◽  
Fan Min

First-arrival picking is a critical step in seismic data processing. This paper proposes the first-arrival picking through sliding windows and fuzzy c-means (FPSF) algorithm with two stages. The first stage detects a range using sliding windows on vertical and horizontal directions. The second stage obtains the first-arrival travel times from the range using fuzzy c-means coupled with particle swarm optimization. Results on both noisy and preprocessed field data show that the FPSF algorithm is more accurate than classical methods.


Sign in / Sign up

Export Citation Format

Share Document