scispace - formally typeset
Search or ask a question
Author

Frank Boland

Bio: Frank Boland is an academic researcher from Trinity College, Dublin. The author has contributed to research in topics: Adaptive filter & Ambisonics. The author has an hindex of 15, co-authored 64 publications receiving 1779 citations. Previous affiliations of Frank Boland include University College Dublin & University of Sheffield.


Papers
More filters
Journal ArticleDOI
01 Aug 1996
TL;DR: The authors demonstrate a solution to one of the key problems in image watermarking, namely how to hide robust invisible labels inside grey scale or colour digital images.
Abstract: A watermark is an invisible mark placed on an image that is designed to identify both the source of an image as well as its intended recipient. The authors present an overview of watermarking techniques and demonstrate a solution to one of the key problems in image watermarking, namely how to hide robust invisible labels inside grey scale or colour digital images.

462 citations

Proceedings ArticleDOI
16 Sep 1996
TL;DR: Techniques for embedding watermark marks in grey scale digital images are discussed and a novel phase based method of conveying the watermark information is proposed.
Abstract: A watermark is an invisible mark placed on an image that can be detected when the image is compared with the original. This mark is designed to identify both the source of an image as well as its intended recipient. The mark should be tolerant to reasonable quality lossy compression of the image using transform coding or vector quantization. Standard image processing operations such as low pass filtering, cropping, translation and rescaling should not remove the mark. Spread spectrum communication techniques and matrix transformations can be used together to design watermarks that are robust to tampering and are visually imperceptible. This paper discusses techniques for embedding such marks in grey scale digital images. It also proposes a novel phase based method of conveying the watermark information. In addition, the use of optimal detectors for watermark identification is also proposed.

372 citations

Proceedings ArticleDOI
04 Jul 1995
TL;DR: The requirements that an effective image watermarking scheme must possess are specified, followed by a review of current and novel techniques based on image transforms.
Abstract: A watermark is all invisible mark placed on an image that can only be detected when the image is compared with the original. This mark is designed to identify both the source of a document as well as its intended recipient. This paper discusses various techniques for embedding such marks in grey scale and colour digital images. It begins specifying the requirements that an effective image watermarking scheme must possess, followed by a review of current and novel techniques based on image transforms.

344 citations

Journal ArticleDOI
TL;DR: A novel approach is proposed which employs an information theoretic approach to feature subset selection of modulation spectra features and leverages information regarding the chronological order of data samples for dimensionality reduction.
Abstract: While automated condition monitoring of rotating machines often use vibration signals for defect detection, diagnosis, and residual life predictions, in this paper, the acoustic noise signal (<; 25 kHz), acquired via non-contact microphone sensors, is used to predict the remaining useful life (RUL). Modulation spectral (MS) analysis of acoustic signals has the potential to provide additional long-term information over more conventional short-term signal spectral components. However, the high dimensionality of MS features has been cited as a limitation to their applicability in this area in the literature. Therefore, in this study, a novel approach is proposed which employs an information theoretic approach to feature subset selection of modulation spectra features. This approach does not require information regarding the spectral location of defect frequencies to be known or pre-estimated and leverages information regarding the chronological order of data samples for dimensionality reduction. The results of this study show significant improvements for this proposed approach over the other commonly used spectral-based approaches for the task of predicting RUL by up to 19% relative over the standard envelope analysis approach used in the literature. A further 16% improvement was achieved by applying a more rigorous approach to labeling of acoustic samples acquired over the lifetime of the machines over a fixed length class labeling approach. A detailed misclassification analysis is provided to interpret the relative cost of system errors for the task of residual life predictions of rotating machines used in industrial applications.

60 citations


Cited by
More filters
Journal ArticleDOI
TL;DR: It is argued that insertion of a watermark under this regime makes the watermark robust to signal processing operations and common geometric transformations provided that the original image is available and that it can be successfully registered against the transformed watermarked image.
Abstract: This paper presents a secure (tamper-resistant) algorithm for watermarking images, and a methodology for digital watermarking that may be generalized to audio, video, and multimedia data. We advocate that a watermark should be constructed as an independent and identically distributed (i.i.d.) Gaussian random vector that is imperceptibly inserted in a spread-spectrum-like fashion into the perceptually most significant spectral components of the data. We argue that insertion of a watermark under this regime makes the watermark robust to signal processing operations (such as lossy compression, filtering, digital-analog and analog-digital conversion, requantization, etc.), and common geometric transformations (such as cropping, scaling, translation, and rotation) provided that the original image is available and that it can be successfully registered against the transformed watermarked image. In these cases, the watermark detector unambiguously identifies the owner. Further, the use of Gaussian noise, ensures strong resilience to multiple-document, or collusional, attacks. Experimental results are provided to support these claims, along with an exposition of pending open problems.

6,194 citations

Journal Article
TL;DR: In this article, a fast Fourier transform method of topography and interferometry is proposed to discriminate between elevation and depression of the object or wave-front form, which has not been possible by the fringe-contour generation techniques.
Abstract: A fast-Fourier-transform method of topography and interferometry is proposed. By computer processing of a noncontour type of fringe pattern, automatic discrimination is achieved between elevation and depression of the object or wave-front form, which has not been possible by the fringe-contour-generation techniques. The method has advantages over moire topography and conventional fringe-contour interferometry in both accuracy and sensitivity. Unlike fringe-scanning techniques, the method is easy to apply because it uses no moving components.

3,742 citations

Book
24 Oct 2001
TL;DR: Digital Watermarking covers the crucial research findings in the field and explains the principles underlying digital watermarking technologies, describes the requirements that have given rise to them, and discusses the diverse ends to which these technologies are being applied.
Abstract: Digital watermarking is a key ingredient to copyright protection. It provides a solution to illegal copying of digital material and has many other useful applications such as broadcast monitoring and the recording of electronic transactions. Now, for the first time, there is a book that focuses exclusively on this exciting technology. Digital Watermarking covers the crucial research findings in the field: it explains the principles underlying digital watermarking technologies, describes the requirements that have given rise to them, and discusses the diverse ends to which these technologies are being applied. As a result, additional groundwork is laid for future developments in this field, helping the reader understand and anticipate new approaches and applications.

2,849 citations

Journal ArticleDOI
01 Jul 1999
TL;DR: An overview of the information-hiding techniques field is given, of what the authors know, what works, what does not, and what are the interesting topics for research.
Abstract: Information-hiding techniques have recently become important in a number of application areas. Digital audio, video, and pictures are increasingly furnished with distinguishing but imperceptible marks, which may contain a hidden copyright notice or serial number or even help to prevent unauthorized copying directly. Military communications systems make increasing use of traffic security techniques which, rather than merely concealing the content of a message using encryption, seek to conceal its sender, its receiver, or its very existence. Similar techniques are used in some mobile phone systems and schemes proposed for digital elections. Criminals try to use whatever traffic security properties are provided intentionally or otherwise in the available communications systems, and police forces try to restrict their use. However, many of the techniques proposed in this young and rapidly evolving field can trace their history back to antiquity, and many of them are surprisingly easy to circumvent. In this article, we try to give an overview of the field, of what we know, what works, what does not, and what are the interesting topics for research.

2,561 citations