All

What are you looking for?

All
Projects
Results
Organizations

Quick search

  • Projects supported by TA ČR
  • Excellent projects
  • Projects with the highest public support
  • Current projects

Smart search

  • That is how I find a specific +word
  • That is how I leave the -word out of the results
  • “That is how I can find the whole phrase”

Blind Watermark Approach for Map Authentication Using Support Vector Machine

The result's identifiers

  • Result code in IS VaVaI

    <a href="https://www.isvavai.cz/riv?ss=detail&h=RIV%2F61989100%3A27240%2F13%3A86093047" target="_blank" >RIV/61989100:27240/13:86093047 - isvavai.cz</a>

  • Result on the web

    <a href="http://dx.doi.org/10.1007/978-3-642-40597-6_7" target="_blank" >http://dx.doi.org/10.1007/978-3-642-40597-6_7</a>

  • DOI - Digital Object Identifier

    <a href="http://dx.doi.org/10.1007/978-3-642-40597-6_7" target="_blank" >10.1007/978-3-642-40597-6_7</a>

Alternative languages

  • Result language

    angličtina

  • Original language name

    Blind Watermark Approach for Map Authentication Using Support Vector Machine

  • Original language description

    This paper presents a blind and robust watermark approach for authentication 2D Map based on polar coordinates mapping and support vector machine is presented. The proposed system is composed of three phases. Firstly, in the preprocessing phase, the proposed algorithm mapped all vertices into polar coordinate system. Then, in the support vector machine phase, the watermark portable points will be chosen using support vector machine to reduce the number of these points which increases the imperceptibility without any effect on the robustness of the watermark. Afterwards, in the watermarking algorithm phase, the watermark is embedded into the map vertices using the random table of the decimal valued of the polar coordinates through the digit substitutionof the decimal part. Finally, in the theoretical analysis and experimental results shows that the presented approach is robust against a various attacks including rotation, scaling, and translation. The proposed approach attained high im

  • Czech name

  • Czech description

Classification

  • Type

    D - Article in proceedings

  • CEP classification

    IN - Informatics

  • OECD FORD branch

Result continuities

  • Project

  • Continuities

    S - Specificky vyzkum na vysokych skolach

Others

  • Publication year

    2013

  • Confidentiality

    S - Úplné a pravdivé údaje o projektu nepodléhají ochraně podle zvláštních právních předpisů

Data specific for result type

  • Article name in the collection

    Communications in Computer and Information Science. Volume 381

  • ISBN

    978-3-642-40596-9

  • ISSN

    1865-0929

  • e-ISSN

  • Number of pages

    14

  • Pages from-to

    84-97

  • Publisher name

    Springer

  • Place of publication

    London

  • Event location

    Káhira

  • Event date

    Sep 3, 2013

  • Type of event by nationality

    WRD - Celosvětová akce

  • UT code for WoS article