Asian Science Citation Index is committed to provide an authoritative, trusted and significant information by the coverage of the most important and influential journals to meet the needs of the global scientific community.  
ASCI Database
308-Lasani Town,
Sargodha Road,
Faisalabad, Pakistan
Fax: +92-41-8815544
Contact Via Web
Suggest a Journal
Articles by Dong-Ning Zhao
Total Records ( 2 ) for Dong-Ning Zhao
  Yong Zhang , Zhe-Ming Lu and Dong-Ning Zhao
  This study presents a Hadamard transform based blind digital watermarking scheme whose extraction process doesn’t require the original image. In this scheme, we use a binary image as the original watermark. During the embedding process, the original cover image is first partitioned into non-overlapped 8x8 blocks and the Arnold transform is performed on the original watermark to make the scheme more robust. Secondly, the Hadamard transform is applied to the blocks. Thirdly, one bit information is embedded in each block by modifying the relationship of two coefficients in the transformed matrix. Finally, the inverse Hadamard transform is performed on the modified coefficient matrix to obtain the watermarked image. The experimental results show that the proposed watermarking method performs well in both security and robustness against general image processing operations and various kinds of attacks, while keeping the invisibility very well.
  Yong Zhang , Zhe-Ming Lu and Dong-Ning Zhao
  Although, many fragile video watermarking techniques have been proposed as an effective solution to content authentication problems, they cannot effectively distinguish between legal attacks and illegal attacks. In order to solve this problem, this paper proposes a novel semi-fragile video watermarking algorithm for H.264 video. Traditional fragile video watermarking methods often select the motion vectors as the embedding positions, while our scheme adopt the intra-prediction residuals after Integer DCT (Discrete Cosine Transform) and quantization to be embedding locations. During the watermark embedding process, we modify the standard H.264 quantizer and we embed the watermark based on the dither modulation technique in order to extract the watermark blindly. In the watermark extraction process, this paper adopts a threshold to distinguish between illegal attacks and legal attacks performed on the video clip. Experimental results demonstrate the effectiveness and feasibility of the proposed algorithm and the proposed scheme can survive legal recompression operations and recognize illegal filtering operations.
Copyright   |   Desclaimer   |    Privacy Policy   |   Browsers   |   Accessibility