Standard

Comparative analysis of halftoning algorithms for digital watermarking. / Makarov, Anton; Yakovleva, Elena.

Proceedings of the 18th Conference of Open Innovations Association FRUCT and Seminar on Information Security and Protection of Information Technolog, FRUCT-ISPIT 2016. ред. / Sergey Balandin; Alla Levina; Tatiana Tyutina. Institute of Electrical and Electronics Engineers Inc., 2016. стр. 193-199 7561527 (Conference of Open Innovation Association, FRUCT; Том 2016-September).

Результаты исследований: Публикации в книгах, отчётах, сборниках, трудах конференцийстатья в сборнике материалов конференциинаучнаяРецензирование

Harvard

Makarov, A & Yakovleva, E 2016, Comparative analysis of halftoning algorithms for digital watermarking. в S Balandin, A Levina & T Tyutina (ред.), Proceedings of the 18th Conference of Open Innovations Association FRUCT and Seminar on Information Security and Protection of Information Technolog, FRUCT-ISPIT 2016., 7561527, Conference of Open Innovation Association, FRUCT, Том. 2016-September, Institute of Electrical and Electronics Engineers Inc., стр. 193-199, 18th Conference of Open Innovations Association FRUCT and Seminar on Information Security and Protection of Information Technolog, FRUCT-ISPIT 2016, St. Petersburg, Российская Федерация, 18/04/16. https://doi.org/10.1109/FRUCT-ISPIT.2016.7561527

APA

Makarov, A., & Yakovleva, E. (2016). Comparative analysis of halftoning algorithms for digital watermarking. в S. Balandin, A. Levina, & T. Tyutina (Ред.), Proceedings of the 18th Conference of Open Innovations Association FRUCT and Seminar on Information Security and Protection of Information Technolog, FRUCT-ISPIT 2016 (стр. 193-199). [7561527] (Conference of Open Innovation Association, FRUCT; Том 2016-September). Institute of Electrical and Electronics Engineers Inc.. https://doi.org/10.1109/FRUCT-ISPIT.2016.7561527

Vancouver

Makarov A, Yakovleva E. Comparative analysis of halftoning algorithms for digital watermarking. в Balandin S, Levina A, Tyutina T, Редакторы, Proceedings of the 18th Conference of Open Innovations Association FRUCT and Seminar on Information Security and Protection of Information Technolog, FRUCT-ISPIT 2016. Institute of Electrical and Electronics Engineers Inc. 2016. стр. 193-199. 7561527. (Conference of Open Innovation Association, FRUCT). https://doi.org/10.1109/FRUCT-ISPIT.2016.7561527

Author

Makarov, Anton ; Yakovleva, Elena. / Comparative analysis of halftoning algorithms for digital watermarking. Proceedings of the 18th Conference of Open Innovations Association FRUCT and Seminar on Information Security and Protection of Information Technolog, FRUCT-ISPIT 2016. Редактор / Sergey Balandin ; Alla Levina ; Tatiana Tyutina. Institute of Electrical and Electronics Engineers Inc., 2016. стр. 193-199 (Conference of Open Innovation Association, FRUCT).

BibTeX

@inproceedings{99c9131504e94d5eb31b98ff18f228f2,
title = "Comparative analysis of halftoning algorithms for digital watermarking",
abstract = "Steganography is the art of hiding information within other information in such a way that it is hard or even impossible to tell that it is there. The most popular carriers for steganography are the redundant data of multimedia, such as image, video, audio, and text digital image. Digital watermarking is the practice of hiding a message about a digital image within that image. Modern halftoning algorithms for obtaining a digital binarized image, applicable as a watermark, are discussed. The description of the steganographic system and results of halftoning of the grayscale images are presented. The algorithms of embedding of the halftoned image into grayscale image using the secret key, which provides theoretical and practical secrecy of the stegosystem, and detection, are described. The degradation of the embedded halftoned image by JPEG compression is estimated. From the results of calculations of the chosen distortion measures it has been found that digital watermarks created by using block-based halftoning algorithm has a smallest degradation by JPEG compression, than those obtained by other halftoning algorithms. Thus, the proposed steganographic system provides desired stability to compression and secrecy.",
author = "Anton Makarov and Elena Yakovleva",
year = "2016",
month = sep,
day = "6",
doi = "10.1109/FRUCT-ISPIT.2016.7561527",
language = "English",
isbn = "978-952-68397-3-8",
series = "Conference of Open Innovation Association, FRUCT",
publisher = "Institute of Electrical and Electronics Engineers Inc.",
pages = "193--199",
editor = "Sergey Balandin and Alla Levina and Tatiana Tyutina",
booktitle = "Proceedings of the 18th Conference of Open Innovations Association FRUCT and Seminar on Information Security and Protection of Information Technolog, FRUCT-ISPIT 2016",
address = "United States",
note = "18th Conference of Open Innovations Association FRUCT and Seminar on Information Security and Protection of Information Technolog, FRUCT-ISPIT 2016 ; Conference date: 18-04-2016 Through 22-04-2016",

}

RIS

TY - GEN

T1 - Comparative analysis of halftoning algorithms for digital watermarking

AU - Makarov, Anton

AU - Yakovleva, Elena

PY - 2016/9/6

Y1 - 2016/9/6

N2 - Steganography is the art of hiding information within other information in such a way that it is hard or even impossible to tell that it is there. The most popular carriers for steganography are the redundant data of multimedia, such as image, video, audio, and text digital image. Digital watermarking is the practice of hiding a message about a digital image within that image. Modern halftoning algorithms for obtaining a digital binarized image, applicable as a watermark, are discussed. The description of the steganographic system and results of halftoning of the grayscale images are presented. The algorithms of embedding of the halftoned image into grayscale image using the secret key, which provides theoretical and practical secrecy of the stegosystem, and detection, are described. The degradation of the embedded halftoned image by JPEG compression is estimated. From the results of calculations of the chosen distortion measures it has been found that digital watermarks created by using block-based halftoning algorithm has a smallest degradation by JPEG compression, than those obtained by other halftoning algorithms. Thus, the proposed steganographic system provides desired stability to compression and secrecy.

AB - Steganography is the art of hiding information within other information in such a way that it is hard or even impossible to tell that it is there. The most popular carriers for steganography are the redundant data of multimedia, such as image, video, audio, and text digital image. Digital watermarking is the practice of hiding a message about a digital image within that image. Modern halftoning algorithms for obtaining a digital binarized image, applicable as a watermark, are discussed. The description of the steganographic system and results of halftoning of the grayscale images are presented. The algorithms of embedding of the halftoned image into grayscale image using the secret key, which provides theoretical and practical secrecy of the stegosystem, and detection, are described. The degradation of the embedded halftoned image by JPEG compression is estimated. From the results of calculations of the chosen distortion measures it has been found that digital watermarks created by using block-based halftoning algorithm has a smallest degradation by JPEG compression, than those obtained by other halftoning algorithms. Thus, the proposed steganographic system provides desired stability to compression and secrecy.

UR - http://www.scopus.com/inward/record.url?scp=84989181240&partnerID=8YFLogxK

U2 - 10.1109/FRUCT-ISPIT.2016.7561527

DO - 10.1109/FRUCT-ISPIT.2016.7561527

M3 - Conference contribution

SN - 978-952-68397-3-8

T3 - Conference of Open Innovation Association, FRUCT

SP - 193

EP - 199

BT - Proceedings of the 18th Conference of Open Innovations Association FRUCT and Seminar on Information Security and Protection of Information Technolog, FRUCT-ISPIT 2016

A2 - Balandin, Sergey

A2 - Levina, Alla

A2 - Tyutina, Tatiana

PB - Institute of Electrical and Electronics Engineers Inc.

T2 - 18th Conference of Open Innovations Association FRUCT and Seminar on Information Security and Protection of Information Technolog, FRUCT-ISPIT 2016

Y2 - 18 April 2016 through 22 April 2016

ER -

ID: 7562582