A Desynchronization Resilient Watermarking Scheme

Size: px
Start display at page:

Download "A Desynchronization Resilient Watermarking Scheme"

Transcription

1 A Desynchronzaton Reslent Watermarkng Scheme Xaojun Q and J Q Department of Computer Scence, Utah State Unversty, Logan, UT Xaojun.Q@usu.edu, jq79@gmal.com Abstract. Ths paper presents a content-based desynchronzaton resstant dgtal mage watermarkng scheme. The mage content s represented by strong mportant feature ponts obtaned by our robust and mproved Harrs corner detector. These feature ponts are more resstant to geometrc attacks and are therefore used by the Delaunay trangle matchng and mage restoraton method to reduce synchronzaton errors. The spread-spectrum-based blnd watermark embeddng and retreval scheme s appled n the Fourer doman of each perceptually hghly textured submage. The multplcatve scheme s then used to embed the same copy of the watermark at hghly secure md-frequency postons generated by one-way hash functons wth dfferent secret keys. The watermark detecton decson s based on the number of matched bts between the recovered and embedded watermarks n embeddng submages. Expermental results demonstrate that our scheme s more robust to desynchronzaton attacks (.e., geometrc and common mage processng attacks) than other peer featurebased approaches. Keywords: Desynchronzaton reslent dgtal watermarkng, mportant feature ponts, spread-spectrum-based blnd watermarkng, Delaunay trangle matchng. 1 Introducton Wth the rapd growth of multmeda data dstrbuton, many dgtal watermarkng schemes have been proposed for copyrght protecton. The robustness of the watermark to common mage processng and geometrc attacks s essental n many applcatons [1]. However, these desynchronzaton attacks are dffcult to tackle due to nduced synchronzaton errors n watermark detecton and decodng. Several watermarkng schemes, ncludng template-based, nvarant-doman-based, moment-based, and feature-based, have been developed to counterattack desynchronzaton dstortons. Template-based watermarkng algorthms [2], [3], [4] embed mage ndependent templates to assst synchronzaton n watermark detecton process. However, these template features can be exploted [5] to destroy the synchronzaton pattern. Invarant-doman-based watermarkng algorthms [6], [7], [8], [9] generally provde a RST (Rotaton, Scalng, and Translaton) nvarant doman to mantan synchronzaton under affne transforms. The Fourer-Melln transform and log-polar resamplng are two typcal examples. However, the nterpolaton accuracy and alasng n the resamplng and ntegraton may cause problems n synchronzaton. Moment-based watermarkng Y.Q. Sh (Ed.): Transactons on DHMS IV, LNCS 5510, pp , Sprnger-Verlag Berln Hedelberg 2009

2 30 X. Q and J. Q algorthms utlze ordnary geometrc moments [10], [11], [12] or Zernke moments [13], [14] to solve the geometrc nvarance problem. However, perfect nvarance cannot be acheved due to the dscretzaton errors. Feature-based watermarkng algorthms [15], [16], [17], [18], [19], [20] use mage dependent feature ponts to represent nvarant reference ponts for both embeddng and detecton. They generally are the best approaches to resstng desynchronzaton dstortons snce feature ponts provde stable references for both watermark embeddng and detecton. Several related, representatve schemes are brefly revewed here. Bas et al. [15] used the Harrs corner detector for feature extracton. These feature ponts were mxed wth a Delaunay tessellaton to mark each trangle for embeddng the watermark. The orgnal watermark trangles were then warped durng the detecton to correlate wth the correspondng marked trangles. Smlarly, Seo and Yoo [16], [17] extracted feature ponts usng the Harrs-Laplace detector and decomposed the mage nto dsjonted local crcular or ellptcal regons for watermark embeddng and extracton. Lee et al. [18] proposed to use the SIFT (Scale-Invarant Feature Transform) to determne the local crcular regons for watermarkng. The smulaton results from all of the above methods show that the robustness of each scheme depends on the capacty for preservng feature ponts after geometrc transformaton, especally on mages wth more texture and mages wth less texture and large homogeneous areas. Moreover, these methods embed the watermark n the spatal doman after geometrc normalzaton accordng to the shapes of the regon. Consequently, watermark robustness to common mage processng s not satsfactory and the feature ponts-based transformaton doman watermarkng schemes were proposed. Tang and Hang [19] adopted the Mexcan hat wavelet scale nteracton method to extract feature ponts. They embedded and extracted the watermark n the normalzed dsks centered at the extracted feature ponts. Wang et al. [20] mproved Tang s method by usng the scale nvarant Harrs-Laplace detector to fnd the radus of each crcular regon. However, Tang s scheme performs well under only mld geometrc dstorton and certan common mage processng attacks. The watermark capacty of both schemes s only 16 bts, whch may restrct ther practcal applcatons. In ths paper, we develop a desynchronzaton reslent watermarkng scheme. Ths scheme combnes the advantages of mportant feature extracton, perceptual analyss, one-way hash functons, and spread-spectrum-based blnd watermark embeddng and retreval to reduce the watermark synchronzaton problem and resst dfferent attacks. Secton 2 descrbes the proposed robust feature extracton method. Secton 3 brefly presents our varants of two mportant technques used n the proposed scheme. Secton 4 covers the detals of the watermark embeddng and detecton procedure. Secton 5 compares our scheme wth three feature-based approaches n terms of robustness aganst both geometrc dstortons and common mage processng attacks. In addton, we also demonstrate the performance of our proposed scheme on 105 mages of varous textures under dfferent Strmark attacks. Secton 6 concludes ths presentaton. 2 Feature Ponts Extracton Extractng feature ponts s the most mportant step n the proposed dgtal mage watermarkng scheme. In order to detect watermarks wthout access to the orgnal mages, we look for feature ponts that are perceptually sgnfcant and can thus resst

3 A Desynchronzaton Reslent Watermarkng Scheme 31 varous types of desynchronzaton dstortons. These mage-content-bounded feature ponts can be further used as synchronzaton markers (.e., anchor ponts) n watermark detecton. To ths end, we propose a robust and mproved Harrs corner detector to fnd relatvely strong IFPs (Important Feature Ponts) to reduce the synchronzaton errors n watermark detecton. Our two major contrbutons are: Improve the Harrs corner detector [21] to reduce nose effect and regulate the densty of IFPs based on the dmenson and texture of the mage. Strengthen the mproved Harrs corner detector to dscard some non-stable IFPs. These two mprovements can also be appled to other detectors to acheve better performance. The algorthmc flow of our mproved Harrs corner detector s summarzed as follows: 1. Apply a rotatonally symmetrc 3 3 Gaussan low-pass flter wth the standard devaton of 0.5 to blur the orgnal mage to ncrease the nose resstance. 2. Compute three dervatve mages, A, B, and C, by convolvng the blurred mage wth the horzontal, vertcal, and dagonal edge flters, respectvely. 3. Apply the same Gaussan low-pass flter to blur three dervatve mages (e.g., A, B, and C) to further ncrease the nose tolerance. 4. Calculate the corner response functon R as defned n [21],.e., R = (AB-C) 2-0.4(A+B) 2, wthn a crcular wndow, whch s at the mage center and covers the largest area of the orgnal mage. The resultng functon reduces the effect of mage center based rotaton attacks and removes the corner ponts near the mage border. 5. Search for IFPs whose corner response value R(x,y) s are larger than a threshold T and are the local maxma wthn a crcular neghborhood centered at (x, y). We choose the crcular neghborhood wndow to avod the ncreasng detector ansotropy and to obtan a homogeneous dstrbuton of feature ponts n the mage. It s also mportant to determne the approprate wndow sze snce a small wndow makes the feature ponts concentrate on textured areas and a large wndow tends to solate the feature ponts. Fg. 1 llustrates the effect of dfferent wndow szes on the resultant feature ponts. We can easly observe that the smaller wndow yelds more feature ponts. However, these extra feature ponts wll requre more computatonal cost n the detecton process. The larger wndow yelds fewer feature ponts and requres fewer computatonal cost n the detecton process. However, the possblty of losng some IFPs s also ncreased. In order to make a compromse between the number of feature ponts and the computatonal cost n watermark detecton, we determne a sutable wndow sze based on the dmenson and texture of the mage. We roughly classfy mage textures as hgh, medum, and low, based on the rato of the feature ponts to the total number of pxels n an mage, wheren the feature ponts are obtaned by usng our mproved Harrs corner detector wth a fxed 3 3 neghborhood wndow. That s: hgh texture f rato 0.01 mage has medum texture f rato (1) low texture f rato

4 32 X. Q and J. Q The dameter of the crcular wndow s calculated: wh D = (2) np where ntegers w and h respectvely represent the wdth and heght of the mage; nteger p s an emprcal value (.e., p = 5) for obtanng a reasonable number of feature ponts for mages wth large homogeneous areas; and nteger n s the wndow sze quantzer, whch depends on the texture of the mage. It s set to be 2, 2.5, and 3 for mages wth hgh, medum, and low textures, respectvely. (a) Fg. 1. The effect of dfferent wndow szes on the feature ponts. (a) (b) Our mproved Harrs corner detector ensures to extract IFPs n a nosy mage. However, these IFPs may not be robust under certan geometrc or common mage processng attacks. Fg. 2 demonstrates ths observaton by dsplayng the IFPs of two attacked Lena mages. We can clearly see that some IFPs are present n both attacked mages whle others are only present n one attacked mage. (b) Fg. 2. The non-robustness of IFPs under attacks. (a) IFPs after rotaton. (b) IFPs after reszng. In order to keep the strong IFPs whch resst geometrc attacks, we further enhance the mproved Harrs detector by quanttatvely evaluatng ts capacty for preservng the IFPs when the mage undergoes certan attacks. Ths evaluaton functon s computed as: Numkept ( Numnew + Numloss ) Numkept ( Numnew + Numloss ) Score = = (3) Num + Num Num kept (a) loss (b) or

5 A Desynchronzaton Reslent Watermarkng Scheme 33 where Num or denotes the number of IFPs present n the orgnal mage; Num new, Num loss, and Num represent the number of IFPs that have been created, destroyed, and preserved after certan attacks, respectvely. The preservaton, creaton, kept or loss status of these feature ponts s evaluated by performng an nverse transformaton, whch restores the attacked mage to be algned wth the orgnal mage, on the IFPs obtaned from the attacked mage. Ths evaluaton functon yelds the maxmal value of 1 when the detector precsely fnds the IFPs under a certan attack,.e., Num new= Numloss = 0. In general, the larger the Score, the more capacty of the detector to preserve the IFPs under attacks. Fg. 3 llustrates the block dagram of fndng the relatvely strong IFPs. Varous mage rotaton and scalng attacks have been performed on the orgnal mage to fnd several attacks that preserve most of the strong IFPs n the orgnal mage. Our extensve expermental results show that random attacks can roughly estmate all possble rotatons and scalng factors. The best attacks that acheve the hghest Score values wll be further used to ndvdually pre-attack the orgnal mage to fnd the IFPs n ts correspondng attacked mages. Choosng these pre-attacks ensures that a decent number of strong IFPs can be obtaned to reduce the synchronzaton errors. The strong IFPs are obtaned by: where IFP strong I n or =1 { Algn( IFP )} = IFP (4) Attack IFP or represents the IFPs n the orgnal mage; IFPAttack represents the IFPs after the th best attack, whch can be ether a rotaton or a scalng attack; and () Algn s an algnment operator to regster the orgnal and attacked mages; and n s the number of the best attacks and s adaptvely chosen based on the mage texture. In our system, we set n to be 6 for hgh textured mages, 4 for medum textured mages, and 2 for low textured mages. Fg. 4 llustrates the effect of dfferent pre-attacks on the resultng IFPs and shows the relatvely strong IFPs obtaned by ntersectng IFPs of the orgnal and ts preattacked mages. We can easly observe the senstvty of the IFPs to dfferent attacks. That s, some IFPs may dsappear or show up or shft a bt after attacks. Consequently, t s mpossble to locate the robust IFPs whch can survve varous attacks n the real world. To address ths challengng ssue, we select a few best pre-attacks to extract the strong IFPs that are lkely preserved under dfferent attacks. Such a choce keeps the balance between the robustness and the number of strong IFPs. Specfcally, the ntersecton operaton ncreases the robustness of the extracted strong IFPs and keeps enough IFPs to regan the synchronzaton (.e., algn the watermarked mage wth the orgnal mage). In other words, a robust resynchronzaton can be acheved by usng a few best pre-attacks for a compromse between the robustness and the number of strong IFPs. The ratonale for choosng the best pre-attacks s based on the followng observatons: 1. Most IFPs survvng a rotaton or scalng attack can survve any combned RST attacks or any mage processng attacks f the mage s not cropped. The followng ntutve proofs support ths observaton: a) Croppng may result n substantal loss of the IFPs and therefore wll not be consdered as a pre-attack. b) A feature pont,

6 34 X. Q and J. Q major characterstc n an mage, must be dfferentated from ts neghbors no matter what knds of the attacks are performed on the mage. c) Any rotaton or scalng attack, lke any combned RST attack, requres an nterpolaton operaton to modfy the ntensty of each pxel. The mage processng attacks wll modfy the ntensty of each pxel n another way. However, these modfcatons should not make the dfferentaton between the feature pont and ts neghbors dsappear. That s, most feature ponts should stll stand out when compared to ther neghbors after geometrc and mage processng attacks. As a result, we can always use a rotaton or scalng attack to fnd potental IFPs. Orgnal Image Yes One of Varous Image Attacks Improved Harrs Corner Detector Capacty Score Calculaton Another Attack? No Capacty Score Sortng No One of Selected Image Attacks Improved Harrs Corner Detector Feature Ponts Restoraton Fnsh Attacks? Yes Improved Harrs Corner Detector I n = 1 Attacks wth Top Scores Strong Important Feature Ponts Fg. 3. Block dagram of extractng strong IFPs 2. The IFPs whch are preserved after several pre-attacks are more robust aganst attacks than the other IFPs whch are destroyed or created after the pre-attacks. 3. The best pre-attacks usually yeld more IFPs than any other pre-attacks (e.g., random attacks, worst attacks, or mage processng attacks). Ths leads to more anchor ponts for synchronzaton and therefore ncreases the possbltes for fndng the geometrc transformaton n watermark detecton. 4. The IFPs obtaned from the best pre-attacks always ntersect wth majorty IFPs obtaned from an attacked mage. Ths ndcates that we can always fnd enough IFPs to perform synchronzaton.

7 A Desynchronzaton Reslent Watermarkng Scheme 35 a: (a.1) (a.2) (a.3) (a.4) (a.5) (a.6) (a.7) b: (b.1) (b.2) (b.3) (b.4) (b.5) (b.6) (b.7) c: (c.1) (c.2) (c.3) (c.4) (c.5) (c.6) (c.7) d: (d.1) (d.2) (d.3) (d.4) (d.5) (d.6) (d.7) Fg. 4. The effect of dfferent pre-attacks on the resultant strong IFPs. (a) IFPs obtaned from 6 best pre-attacks. (a.1) R180º (a.2) R250º (a.3) R265º (a.4) R280º (a.5) R60º (a.6) S0.95 (a.7) Fnal strong IFPs by ntersectng the orgnal and ts 6 best pre-attacked mages. (b) IFPs obtaned from 6 worst pre-attacks. (b.1) R145º (b.2) R235º (b.3) R220º (b.4) R320º (b.5) R190º (b.6) S0.90 (b.7) Fnal strong IFPs by ntersectng the orgnal and ts 6 worst pre-attacked mages. (c) IFPs obtaned from 6 random pre-attacks. (c.1) R16º (c.2) R145º + S0.95 (c.3) R240º + S0.87 (c.4) R110º + S T[5, 5] (c.5) R68º + S T[10, 10] (c.6) S0.8 +T[10, 10] (c.7) Fnal strong IFPs by ntersectng the orgnal and ts 6 random pre-attacked mages. (d) IFPs obtaned from 6 common mage processng pre-attacks. (d.1) Medan flterng 2 2 (d.2) Medan flterng 3 3 (d.3) Mean flterng JPEG90% (d.4) Sharpenng (d.5) Gaussan flterng (d.6) Hstogram equalzaton (d.7) Fnal strong IFPs after ntersectng the orgnal and ts 6 common mage processng pre-attacked mages. Here, R denotes rotaton, S denotes scalng, and T denotes translaton. 5. The IFPs obtaned from the worst pre-attacks seem to be the most stable ones. However, some IFP may not be preserved under certan attacks due to the senstvty of the IFPs to dfferent attacks. In addton, these IFPs may not possess suffcent anchor ponts for the synchronzaton n the detecton process. Fg. 5 demonstrates the fnal preserved strong IFPs by applyng our proposed robust and mproved Harrs corner detector on four mages wth dfferent textures. That s, random rotaton and scalng operatons are respectvely appled on each mage to fnd ts best pre-attacks. The mproved Harrs detector s then appled to fnd the IFPs for each orgnal mage and ts correspondng best pre-attacked mages. The ntersecton of all IFPs yelds strong IFPs to be saved for the detecton process. As shown n Fg. 5, the proposed approach effectvely elmnates some unrelable feature ponts whch fal to be detected after certan geometrc attacks.

8 36 X. Q and J. Q Fg. 5. Relatvely strong and mportant feature ponts 3 Our Varants of Related Technques 3.1 The PN-Sequence and One-Way Hash Functons We use the PN (Pseudo-Nose) sequence based spread spectrum method n our system due to ts robustness aganst nose and ts capablty to acheve error free transmsson near or at the lmts set by Shannon s nosy channel codng theorem [22]. Ths sequence combned wth the watermark s adaptvely embedded nto md-frequency postons n the DFT doman snce hgh-frequency watermark can be easly elmnated by lossy compresson and low-frequency watermark s usually notceable. We mprove the one-way hash functon [23], whch s easy to compute and dffcult to nvert, to generate the hghly secure md-frequency postons by the followng seven steps: 1. Save all mddle frequency postons nto vector V. 2. Randomly choose two large prme numbers p and q, and compute the secret key n=pq. 3. Obtan two seeds X and Y usng the encpher process : n K 2 X = m mod n; Y = X mod (5) where m s the orgnal mage dentfcaton number (.e., a numercal seral number for regsterng the mage) and K s the second secret key. 4. Calculate an ndex l by: 2 Y = Y mod n l = ( Y mod n) mod length( V (6) 5. Choose the lth tem n V as the embeddng poston. 6. Remove the lth tem from V so no duplcated postons are produced and no collson occurs. 7. Repeat steps 4-6 untl the total number of embeddng postons s reached. These hghly secure embeddng postons can be easly reproduced gven the same secret keys n and K. In the meantme, the reproducton of these postons s computatonally nfeasble wthout knowng n and K. To ensure the attackers cannot fnd out the watermark embeddng postons by comparng several watermarked copes, dfferent secret keys are used to generate embeddng postons for each embeddng submage. )

9 A Desynchronzaton Reslent Watermarkng Scheme Blnd Embeddng and Retreval A watermarkng system should be secure and relable. It s also desrable to extract the watermark ndependent of the orgnal mage. In our system, we adopt the blnd retreval scheme of MPEG vdeo watermark [24], [25] to elmnate the need of storng values at embeddng postons of each host submage. We employ ths blnd retreval scheme n the DFT doman nstead of ther proposed DCT doman. The multplcatve nstead of addtve embeddng s also appled n our modfed scheme. That s: where FIˆ = FI + FI G W p, = 1,..., N (7) FI s the orgnal md-frequency DFT sequence wth length N, Fˆ I s the watermarked DFT sequence, G s the embeddng strength, p s the bpolar PN sequence generated by a secret key, and W s the blnd watermark bt sequence obtaned by repeatng the bpolar watermark message w by a spreadng factor s such that W = w j for js < ( j +1) s. The blnd retreval can be acheved by de-spreadng the blnd watermarked bt sequence usng the correlaton detector. The same embeddng PN-sequence p s used to multply the possbly watermarked sequence: W ' = p FIˆ (8) The W s further grouped nto blocks of sze s where each block s computed: ( j+ 1) s = js+ 1 ( j+ 1) s S1 ( j+ 1) s 2 p ˆ FI = pfi + G p FI W = js+ 1 = js S 2 (9) where j = 0,..., n 1 and n s the length of w. For a large s, FI s statstcally uncorrelated wth p. As a result, S 2 >>S 1 and Eq. (9) s smplfed: ( j+ 1) s = js+ 1 ( j+ 1) s 2 p ˆ FI G p FI W = js S 2 ( j+ 1) s = G FI W = js Snce FI and G are postve, the embedded bpolar watermark bt w j s therefore smlar to the sgn of the correlaton sum ŵ. That s: j S 2 (10) ( j 1) s w wˆ sgn p FIˆ j j = +, j = = js+ 1 0,..., n-1 (11) 4 Watermark Embeddng and Detecton Scheme 4.1 Watermark Embeddng Scheme Our watermark s desgned for copyrght protecton. We vew all possble embeddng submages as ndependent communcaton channels. To mprove the robustness of the

10 38 X. Q and J. Q transmtted watermark bts, all channels carry the same copy of the chosen watermark. Durng the detecton process, we clam the exstence of watermark f one copy of the embedded watermark s correctly detected n one embeddng submage. The watermark embeddng process s detaled step by step as follows: 1. Image tessellaton: Evenly dvde the 8-bt grayscale mage nto 3 3 nonoverlappng submages. The last several nondvsble rows and columns are not used for embeddng. 2. Perceptual analyss: Apply the Harrs corner detector to fnd all feature ponts n the orgnal mage by usng a 3 3 wndow. Choose the submages that have a large number of feature ponts to be embeddng blocks. These blocks are perceptually hgh textured. 3. For each perceptually hgh textured submage SubA: 3.1 DFT: Apply global DFT to obtan FSubA. 3.2 Poston Generator: Generate hghly secure embeddng postons n the mdfrequences between f 1 and f 2 n the upper half plane of FSubA by usng our one-way hash functon. 3.3 operaton: Embed the spread bpolar watermark message bt W j nto each poston (x k, y k ) by usng the multplcatve formula [26]: ( xk, yk )' = FSubA( xk, yk ) + FSubA( xk, yk ) G W j p j (12) FSubA where p j {1, -1} (zero mean and unt varance) s the PN-sequence generated by a secret key. The same changes are carred out at center-based symmetrc postons due to the constrants n the DFT doman for obtanng a real mage. 3.4 IDFT (Inverse DFT): Apply the IDFT to FSubA to obtan the watermark embedded submage SubA, whch replaces the orgnal submage SubA. The proposed robust and mproved Harrs detector s fnally used to fnd strong IFPs n the watermarked mage. The poston of each strong IFP, the bpolar watermark message bt sequence W, the number of embeddng postons Len, two secret keys n and K for our one-way hash functon n each submage, two mddle frequency ratos, and the secret key for generatng the PN-sequence are saved for watermark detecton. Snce strong IFPs are obtaned va the ntersecton operaton, the number of IFPs s optmzed and the storage s mnmal compared to the cost of savng the mage tself. If all the nformaton s compressed, the storage cost wll be further mnmzed. 4.2 Watermark Detecton Scheme The watermark detecton procedure does not need the orgnal mage. The relatvely strong IFPs are frst extracted by ntersectng the IFPs obtaned by applyng our proposed mproved Harrs corner detector on the probe mage and a few randomly rotated probe mages. Two sets of Delaunay tessellaton-based trangles [27] are generated usng the strong IFPs found n the probe mage and the saved strong IFPs, respectvely. These two sets of trangles are then matched to determne the possble geometrc transformatons the probe mage has undergone. These geometrc transformatons are further utlzed to restore the probe mage so synchronzaton errors are mnmzed n the detecton.

11 A Desynchronzaton Reslent Watermarkng Scheme 39 The choce of Delaunay tessellaton s based on two attractve propertes: 1) Local property: If a vertex dsappears, the tessellaton s only modfed on connected trangles. 2) Stablty area: Each vertex s assocated wth a stablty area where the tessellaton pattern s not changed when the vertex s moved wthn ths area. That s, the tessellaton patterns of other trangles reman the same even though losng or shftng an IFP affects the trangle(s) connected to t. In addton, two propertes of the Delaunay tessellaton always ensure that an dentcal generaton of trangles can be obtaned f the relatve postons of the IFPs do not change. We mplemented the Qhull algorthm [28] to generate the IFPs-based trangles due to ts fast speed and less memory constrants. In our system, the angle radans are used to match Delaunay tessellaton-based trangles. That s, f two trangles have very smlar angle radans (.e., the angle dfference s less than 0.01 radan), they are clamed to be lkely matched. The possble geometrc transformatons are determned from the matched trangle pars snce the IFPs-based trangles undergo the same transformaton as the mage tself. The detaled steps are: 1. Calculate the scalng factor SF by reszng the probe trangle to the same sze as the target matched trangle. 2. Calculate the translaton factor TF by regsterng one of the vertces of the matched trangle par. 3. Calculate the rotaton factor RF by algnng the other two unregstered vertces of the matched trangle par. These factors form a 3-element tuple (SF, TF, RF) where SF measures the scalng rato up to a precson of 1/10, TF measures the translaton n pxel numbers, and RF measures the rotaton angle n an nteger degree. Snce an mage and the wthn trangles undergo exactly the same transformaton, we use the majorty of the dentcal 3-element tuples obtaned from all matched trangle pars to restore the probe mage. The same embeddng procedure s appled to the restored probe mage to obtan the watermark embedded DFT sequence FSubA for each potental embeddng submage. The blnd watermark retreval scheme s then appled to extract the bpolar watermark bt sequence W j, whch s compared wth the orgnal watermark bt sequence W j to determne the presence of the watermark. That s, the number of matched bts n a potental embeddng submage s compared wth a threshold to determne whether the watermark s present n the probe mage. Ths threshold s calculated based on the false-alarm probablty that may occur n watermark detecton. The Bernoull trals are used to model W j snce every watermark bt s an ndependent random varable. The probablty of a k-bt match between extracted and orgnal watermark bt sequences wth a length of n s calculated as: p n k k n k k = p ( 1 p) where p s the success probablty for the extracted bt to be matched wth the orgnal watermark bt. We further smplfy Eq. (13) by assumng p to be 1/2: (13)

12 40 X. Q and J. Q n 1 n! pk = (14) 2 k!( n k)! The false-alarm probablty for each embeddng submage s a cumulatve probablty of the cases that k T, where k and T respectvely represent the number of matchng bts and the threshold for each submage. It s computed as: n n 1 n! Pfalse alarm( ) =. (15) k = T 2 k!( n k )! Based on Eq. (15), the perfect match between the extracted and orgnal watermarks 5 n a sngle embeddng submage leads to a false alarm probablty of Ths s a low false alarm probablty so we can confdently clam the watermark exsts. In our system, we wll check the perfect match n any embeddng submage to ndcate the presence of the watermark. 5 Expermental Results To evaluate the performance of the proposed watermarkng scheme, we conducted experments on varous standard 8-bt grayscale mages and dfferent knds of attemptng attacks. We frst perform the watermark nvsblty test usng four bt gray-level mages. We then llustrate the effectveness of the proposed strong IFPs-based mage restoraton scheme, whch functons as a self-synchronzaton scheme to algn the possbly geometrcally dstorted watermarked mage wth the orgnal one. Next, we perform extensve comparsons wth three well desgned feature-based RST reslent watermarkng schemes proposed by Tang and Hang [19], Wang et al. [20], and Bas et al. [15]. Fnally, we summarze the performance of our proposed scheme under a varety of Strmark attacks on bt watermarked grayscale mages. 5.1 Watermark Invsblty Test We evaluate watermark nvsblty on four mages: Lena, Pepper, Arplane, and Baboon. These four mages correspond to several texture categores. For example, Baboon ncludes textured areas wth hgh frequency components; Lena and Arplane nclude large homogeneous areas whereas Lena has sharp edges; and Pepper falls n a low-textured category. The PSNRs of these four watermarked mages are 43.33, 44.06, 42.27, and 37.62, respectvely. These PSNR values are all greater than 35.00db, whch s the emprcal value for the mage wthout any percevable degradaton [29]. 5.2 Important Restoraton Test Image restoraton s an mportant step n the proposed watermarkng scheme. In general, we apply the Delaunay tessellaton on the strong IFPs to generate trangles, and use angle degrees to fnd the matched trangles between the orgnal and probe

13 A Desynchronzaton Reslent Watermarkng Scheme 41 mages. We further use these matched trangles to fnd the possble geometrc attacks. Table 1 lsts four mage texture dependent parameters and the number of strong IFPs determned by applyng our mage-texture-based mproved and robust Harrs corner detector on four mages wth dfferent textures. These four parameters are Rato (the factor for classfyng mage textures), Type (the texture decded by Eq. (1)), D (the dameter of the crcular wndow of the robust and mproved Harrs corner detector), and SNum (the number of embeddng submages determned by perceptual analyss). It clearly shows that dameter D s determned by the mage texture. That s, the more complcate the texture, the larger the dameter D. The value of SNum ndcates the dstrbuton of the perceptually hgh texture wthn an mage. These adaptve parameters are automatcally determned based on mage textures. They mprove the accuracy n fndng the mage-content-based strong IFPs and the robustness n resstng geometrc and common mage processng attacks on dfferent textured mages. We also observe that the number of IFPs s less than 35 for all the test mages wth dfferent textures. Ths observaton clearly demonstrates that our mproved and robust Harrs corner detector does regulate the number of IFPs. It also ndcates that the cost of savng IFPs for watermark synchronzaton s mnmal compared wth the cost of savng the host mage. Table 1 also lsts the ratos between the number of matched trangle pars for determnng the geometrc transformaton and the total number of matched trangle pars under four random geometrc attacks. All smulaton results yeld ratos of larger than 85%, whch ndcate a hgh accuracy n fndng the possble geometrc transformaton a probe mage may undergo. When comparng the results between the mages, t should be noted that the number of matched trangle pars s not lnearly related to the number of strong IFPs due to the senstvty of the IFPs to dfferent attacks. However, our mproved and robust Harrs corner detector generates relatvely strong IFPs to reduce the synchronzaton errors. In addton, two propertes of the Delaunay tessellaton always ensure that there are enough matched trangles, as ndcated by hgh ratos n Table 1, for restorng the probe mage. Table 1. Image adaptve parameters and ratos under dfferent attacks Images Images Robust Geometrc Attacks Adaptve Parameters IFPs Rato Type D SNum (a) (b) (c) (d) Lena Med /16 23/25 10/11 15/16 Baboon 0.01 Hgh /20 25/27 12/14 12/12 Pepper Low /22 17/18 13/15 16/17 Plane Med /18 24/26 10/10 15/ Comparson wth Feature-Based RST Robust Watermarkng Schemes We compare the proposed scheme wth three feature-based RST robust watermarkng schemes, namely Tang s scheme [19], Wang s scheme [20], and Bas s scheme [15] n Tables 2 through 4. Each gray cell ndcates that the correspondng method fals to detect the watermark under the correspondng dstorton. Table 2 summarzes the

14 42 X. Q and J. Q detecton results compared wth the schemes of Tang [19] and Wang [20] aganst common mage processng attacks. Table 3 summarzes the detecton results compared wth the schemes of Tang [19] and Wang [20] aganst desynchronzaton attacks. These two tables show the rato between the number of correctly detected watermarked embeddng regons and the number of orgnal embedded watermarked embeddng regons. Here, we use the term detecton rate to denote t. Smlarly, the detecton rate n Tang s scheme refers to the fracton of correctly detected watermark embeddng dsks and the detecton rate n Wang s scheme refers to the fracton of correctly detected watermark embeddng LCR (Local Characterstc Regons). That s, the submages n our scheme correspond to the dsks n Tang s scheme and the LCRs n Wang s scheme, respectvely. Table 2. Comparson of the detecton rates (.e., the fracton of correctly detected watermark embeddng regons) under common mage processng attacks. (1) Medan flter (3 3). (2) Shapenng (3 3). (3) Gaussan nose. (4) JPEG 70%. (5) JPEG 50%. (6) JPEG 30%. (7) Medan flter (3 3) + JPEG 90%. (8) Sharpenng (3 3) + JPEG 90%. Lena Baboon Pepper Attacks Our Wang s Tang s Our Wang s Tang s Our Wang s Tang s Method Method Method Method Method Method Method Method Method (1) (2) (3) (4) (5) (6) (7) (8) Table 2 clearly shows that our scheme and Wang s scheme successfully pass all the tests whle Tang s scheme fals medan flterng, JPEG compresson 30%, and medan flterng wth JPEG compresson 90%. Our scheme shows better stablty than Wang s scheme due to the hgher detecton ratos under all the attacks. Our method also yelds almost equal performance on all three mages due to the regulaton of the number of strong IFPs on mages wth dfferent textures whereas Tang s method performs better on hgh textured mages such as Baboon. In summary, the performance of our scheme s much more stable under dfferent attacks n the comparson wth Tang s scheme and Wang s scheme. One reason s that our relatvely strong IFPs are more stable than those found by the Mexcan hat detector and the scale nvarant Harrs-Laplace detector. These robust IFPs ensure more accurate synchronzaton between the probe and orgnal watermarked mages. Another reason s that the watermark s embedded n the md-frequences, whch are n postons that are unlkely changed by common mage processng attacks. Table 3 clearly shows that our scheme performs the best n all the desynchronzaton attacks except the large croppng and local random bendng attacks. Specfcally,

15 A Desynchronzaton Reslent Watermarkng Scheme 43 our scheme can successfully resst several attacks Tang s scheme faled to tackle, namely, random relatvely large rotatons, scalng ratos, and any combnaton of RST attacks. Our scheme can handle large scalng attacks, whch Wang s scheme faled to handle. These successes are manly due to the followng three reasons: 1) Our proposed robust and mproved Harrs corner detector fnds relatvely strong IFPs whch are more resstant to desynchronzaton attacks. 2) The strong IFPs-based Delaunay trangle matchng and mage restoraton technque ensures enough matched trangles for accurate self-synchronzaton under a varety of RST and aspect rato changng attacks, whle the local characterstc regon derved from the scale-space theory s not geometrcally nvarant space, as explaned n Wang s scheme. 3) The DFT doman tself s robust to translaton and moderate croppng so t can accommodate the croppng attacks and further compensate the slghtly naccurate IFPs-based geometrc correcton. However, our scheme s more vulnerable to the local random bendng attacks than both Tang s and Wang s schemes, due to the possble naccurate mage restoraton resulted from the shfts of the bendng IFPs or the shfts of the embeddng pxels n a lmted number (usually less than 9) of the embeddng submages. A large amount of embeddng dsks n Tang s and Wang s schemes make t more robust to local bendng attacks snce bendng may not affect all the embeddng dsks and LCRs. Our scheme s also more vulnerable to large croppng attacks snce the potental embeddng regons may be removed. Tang s and Wang s schemes may survve large croppng attacks as long as a few dsks and the LCRs contanng the IFPs are not cropped. Table 3. Comparson of the detecton rate (.e., the fracton of correctly detected watermark embeddng regons) under geometrc attacks. (1) Removed 8 rows and 16 columns. (2) Croppng 55%. (3) Rotaton 5º. (4) Rotaton 15º. (5) Rotaton 30º. (6) Translaton x-10 and y- 19. (7) Scalng 0.6. (8) Scalng 0.9. (9) Scalng 1.4. (10) Local random benng. (11) Croppng 10% and JPEG 70%. (12)Rotaon 5º + Scalng 0.9. (13) Translaton x-10 and y-10 + Rotaton 5º + Scalng 0.9. Lena Baboon Pepper Attacks Our Wang s Tang s Our Wang s Tang s Our Wang s Tang s Method Method Method Method Method Method Method Method Method (1) (2) (3) (4) (5) (6) (7) (8) (9) (10) (11) (12) (13)

16 44 X. Q and J. Q Table 4. The comparson between the proposed method and Bas s method [15] under dfferent processng and geometrc dstorton attacks Lena Arplane Car Attacks Our Bas s Our Bas s Our Bas s Method Method Method Method Method Method No Attack 8 8 Medan Flterng 3 3 Gaussan Flterng Shearng x-1%, y-1% Shearng x-0%, y-5% Shearng x-5%, y-5% Rotaton 10º Scalng 90% Scalng 80% JPEG 80% JPEG 45% JPEG 30% Strmark General Attacks Table 4 compares the proposed scheme wth Bas s scheme [15], whch s a featurebased spatal doman method, n terms of the robustness aganst dfferent attacks such as medan flterng, Gaussan flterng, shearng, rotaton, scalng, JPEG compresson, and Strmark general attacks. All these tests are performed on mages of Lena, Arplane, and Car for a far comparson. The comparson results upon varous common mage processng attacks and geometrc dstortons are lsted sde by sde n Table 4. Snce Bas s scheme dd not record the detecton rato, we use a to ndcate the method successfully detects the watermark after the attack and a to ndcate the method fals to detect the watermark. As shown n Table 4, both methods successfully pass the small shearng, rotaton, scalng, and Strmark general attacks. However, our method has advantages on common mage processng tests such as 8 8 medan flterng and 30% JPEG compresson due to the followng reasons: 1) Our method embeds the watermark nto the md-frequences whch are unlkely to be changed by common mage processng attacks, whle Bas s method ntroduces an nterpolaton problem when dong the watermark trangle wrappng n detecton. 2) Our method embeds the watermark n the DFT doman, whle Bas s scheme s sutable for drectly addng watermarks nto the spatal doman due to rregular shape of the embeddng area. Ths makes the method vulnerable to mage processng dstortons. 5.4 Comprehensve Smulaton Results under Strmark Attacks We performed a varety of attacks on bt watermarked grayscale mages of sze usng Strmark 3.1. These mages are evenly dstrbuted wth hgh, medum, and low textures accordng to Eq. (1). That s, the database contans 35 mages for each texture level. The overall average PSNR value for these 105 watermarked mages s 41.73db. Fg. 6 demonstrates the smulaton results of 15 knds of common attacks on the 105 watermarked mages. The smulated attacks are lsted on x-axs

17 A Desynchronzaton Reslent Watermarkng Scheme 45 Average Detecton Rates Low Textured Images 0.1 Medum Textured Images Hgh Textured Images Attacks Fg. 6. The average successful detecton rates for three knds of textured mages under desynchronzaton attacks where all the numercally labeled attacks sequentally correspond to a category of dstortons ncludng no attacks, translaton, scalng, rotaton, croppng up to 5%, lnear geometrc transform, row and column removal wth a maxmum of 20 rows and columns removed, medan flterng, mean flterng, sharpenng, Gaussan flterng, hstogram equalzaton, and JPEG compressons wth qualty factors of 50%, 40%, and 30%. All the flterng operatons use the maxmum flter sze of 7 7. Each dstorton category (.e., numbers 2 to 12 on x-axs n Fg. 6) contans 3 random attacks. The y- axs summarzes the average detecton rates of all mages n each texture level under each dstorton category. Fg. 6 clearly demonstrates that our scheme acheves good robustness under both mage processng and geometrc dstortons and performs the worst for low and hgh textured mages under the lnear geometrc attacks. Specfcally, the average detecton rates for all smulated geometrc attacks are 94.89%, 89.75%, and 80.45% for medum, low, and hgh textured mages, respectvely. The average detecton rates for all smulated mage processng attacks are 100%, 100%, and 93.15% for medum, low, and hgh textured mages, respectvely. The average detecton rates for all smulated attacks are 97.45%, 94.88%, and 86.8% for medum, low, and hgh textured mages, respectvely. The overall average detecton rate for all mages under all smulated attacks s 93.04%. In summary, the all-around result of our proposed watermark scheme outperforms the peer feature-based schemes. It yelds postve detecton results for most mages wth low, medum, and hgh textures under dfferent desynchronzaton dstortons. It also works well on hghly textured mages due to the relatvely large number of strong IFPs for mage restoraton. Our proposed scheme acheves a good balance between nvsblty and robustness. Specfcally, the robust and mproved Harrs corner detector s capable of fndng the relatvely strong IFPs for dfferent textured mages. The Delaunay trangle matchng and mage restoraton scheme s able to effcently mnmze the synchronzaton errors and elmnate fake IFPs showed up n the hgh and extremely hgh textured mages n the matchng process. The spread spectrum

18 46 X. Q and J. Q embeddng and detecton makes our scheme more resstant to mage processng attacks. The perceptually hghly textured submage based embeddng scheme helps our system to survve some localzed mage attacks n Strmark. However, our scheme does not perform well on extremely low textured mages due to ts nsuffcent number of IFPs. It also fals the JPEG compresson wth a qualty factor of lower than 30% due to the mssng IFPs resulted from hgh compresson. 6 Conclusons In ths paper, we propose a novel and effectve content-based desynchronzaton reslent watermarkng scheme. The major contrbutons consst of: Robust and mproved Harrs corner detector: Ths detector s capable of fndng the relatvely strong IFPs n dfferent textured mages. These IFPs are more stable than the feature ponts extracted by Bas s, Tang s, and Wang s schemes due to the superor performance of the Harrs corner detector, the addtonal nose reducton, the regulaton of the densty of the IFPs based on the mage dmenson and texture, and the ntersecton of IFPs extracted from the pre-attacked mages. Consequently, they are more robust aganst desynchronzaton attacks. Perceptually hghly textured submage based watermark embeddng: These embeddng submages carry the same copy of the bpolar watermark bt sequence to mprove the robustness of transmtted watermark bts. They also ad the proposed watermark scheme n survvng some localzed mage attacks n Strmark. Spread-spectrum-based blnd watermark embeddng and retreval n the DFT doman: The spread spectrum scheme makes our scheme more resstant to common mage processng attacks. The DFT doman ensures more resstant to translaton and moderate croppng. The blnd retreval scheme does not requre the orgnal mage once the probe mage s algned wth the orgnal mage. Delaunay trangle matchng and mage restoraton: Ths scheme can effcently elmnate fake IFPs showed up n the hghly textured mages and accurately determne the possble transformaton a probe mage may undergo. The determned transformaton effectvely reduces the synchronzaton errors wthout ntroducng substantal nterpolaton errors as n Bas s, Tang s, and Wang s schemes, where the affne transform, nterpolaton, and the mage normalzaton are appled. The proposed method s robust aganst a wde varety of tests as ndcated n the expermental results. Partcularly, t s more robust aganst JPEG compresson and the combnaton of the geometrc dstortons wth large scalng ratos and rotatons than other feature-based watermarkng technques. It works successfully for mages wth low, medum, and hgh textures. It can be further mproved by developng a more relable feature extracton method under severe geometrc dstortons and a more effcent and accurate trangle matchng and mage restoraton method. The algorthm can be appled to color mages by embeddng watermark n the lumnance component of the color mage. In the real world, ths watermarkng technque can be appled to a lot of dfferent areas, such as photograph, audo, and vdeo.

19 A Desynchronzaton Reslent Watermarkng Scheme 47 References 1. Petcolas, F., Anderson, R., Kuhn, M.: Attacks on Copyrght Markng Systems. In: Proc. of the 2nd Workshop on Informaton Hdng, pp (1998) 2. Perera, S., O Ruanadh, J.J.K., Degullaume, F., Csurka, G., Pun, T.: Template Based Recovery of Fourer-based Watermarks Usng Log-Polar and Log-Log Maps. In: Proc. of IEEE Int. Conf. Multmeda Computng Systems, vol. 1, pp (1999) 3. Perera, S., Pun, T.: Robust Template Matchng for Affne Resstant Image Watermarks. IEEE Trans. on Image Processng. 9(6), (2000) 4. Dgmarc Corporaton, US patent 5,822,436, Photographc Products and Methods Employng Embedded Informaton 5. Herrgel, A., Voloshynovsky, S., Rytsar, Y.B.: Watermark Template Attack. In: Proc. of SPIE Securty and Watermarkng of Multmeda Contents III, vol. 4314, pp (2001) 6. O Ruanadh, J.J.K., Pun, T.: Rotaton, Scale, and Translaton Invarant Dgtal Image Watermarkng. In: Proc. of IEEE Int. Conf. on Image Processng, pp (1997) 7. O Ruanadh, J.J.K., Pun, T.: Rotaton, Scale, and Translaton Invarant Spread Spectrum Dgtal Image Watermarkng. Sgnal Processng 66, (1998) 8. Zheng, D., Zhao, J., El Saddk, A.: RST-Invarant Dgtal Image Watermarkng Based on Log-Polar Mappng and Phase Correlaton. IEEE Trans. on Crcuts and Systems for Vdeo Technology. 13(8), (2003) 9. Ln, C.Y., Wu, M., Bloom, J.A., Cox, I.J., Mller, M.L., Lu, Y.M.: Rotaton, Scale, and Translaton Reslent Watermarkng for Images. IEEE Trans. on Image Processng. 10(5), (2001) 10. Alghonemy, M., Tewfk, A.H.: Geometrc Dstorton Correcton Through Image Normalzaton. In: Proc. of IEEE Int. Conf. Multmeda Expo., vol. 3, pp (2000) 11. Alghonemy, M., Tewfk, A.H.: Image Watermarkng by Moment Invarants. In: Proc. of IEEE Int. Conf. Image Processng, vol. 2, pp (2000) 12. Alghonemy, M., Tewfk, A.H.: Geometrc Invarance n Image Watermarkng. IEEE Trans. on Image Processng. 13(2), (2004) 13. Km, H.S., Lee, H.K.: Invarant Image Watermark Usng Zernke Moments. IEEE Trans. on Crcut and Systems for Vdeo Technology. 13(8), (2003) 14. Xn, Y., Lao, S., Pawlak, M.: Geometrcally Robust Image Watermarkng Va Pseudo- Zernke Moments. In: Proc. of Canadan Conf. Electrcal and Computer Engneerng, vol. 2, pp (2004) 15. Bas, P., Chassery, J.M., Macq, B.: Geometrcally Invarant Watermarkng Usng Feature Ponts. IEEE Trans. on Image Processng. 11(9), (2002) 16. Seo, J., Yoo, C.: Localzed Image Watermarkng Based on Feature Ponts of Scale-Space Representaton. Pattern Recognton 37(7), (2004) 17. Seo, J., Yoo, C.: Image Watermarkng Based on Invarant Regons of Scale-Space Representaton. IEEE Trans. on Sgnal Processng. 54(4), (2006) 18. Lee, H., Km, H., Lee, H.: Robust Image Watermarkng Usng Local Invarant Features. Optcal Engneerng 45(3), 1 11 (2006) 19. Tang, C.W., Hang, H.M.: A Feature-Based Robust Dgtal Image Watermarkng Scheme. IEEE Trans. on Sgnal Processng. 51(4), (2003) 20. Wang, X., Wu, J., Nu, P.: A New Dgtal Image Watermarkng Algorthm Reslent to Desynchronzaton Attacks. IEEE Trans. on Informaton Forenscs Securty. 2(4), (2007)

20 48 X. Q and J. Q 21. Harrs, C., Stephen, M.: A Combned Corner and Edge Detector. In: Proc. of the 4th Alvey Vson Conf., pp (1988) 22. Pckholtz, R.L., Schllng, D.L., Mlsten, L.B.: Theory of Spread Spectrum Communcatons A Tutoral. IEEE Trans. on Communcatons. COM 30, (1982) 23. Hwang, M.S., Chang, C.C., Hwang, K.F.: A Watermarkng Technque Based on One-Way Hashng Functons. IEEE Trans. on Consumer Electroncs 25, (1999) 24. Hartung, F., Grod, B.: Watermarkng of Uncompressed and Compressed Vdeo. Sgnal Processng 66, (1998) 25. Pranata, S., Guan, Y.L., Chua, H.C.: BER Formulaton for the Blnd Retreval of MPEG Vdeo Watermark. In: Pettcolas, F.A.P., Km, H.-J. (eds.) IWDW LNCS, vol. 2613, pp Sprnger, Hedelberg (2003) 26. Barn, M., Podlchuk, C.I., Bartoln, F., Delp, E.J.: Watermark Embeddng: Hdng a Sgnal wthn a Cover Image. IEEE Communcatons Magazne 39, (2001) 27. Bertn, E., Marchand-Mallet, S., Chassery, J.M.: Optmzaton n Vorono Dagrams. Kluwer, Dordrecht (1994) 28. Barber, C.B., Dobkn, D.P., Huhdanpaa, H.T.: The Quckhull Algorthm for Convex Hulls. ACM Trans. on Mathematcal Software. 22(4), (1996) 29. Hseh, M.S., Tseng, D.C.: Perceptual Dgtal Watermarkng for Image Authentcaton n Electronc Commerce. Electronc Commerce Research 4, (2004)

Hybrid Non-Blind Color Image Watermarking

Hybrid Non-Blind Color Image Watermarking Hybrd Non-Blnd Color Image Watermarkng Ms C.N.Sujatha 1, Dr. P. Satyanarayana 2 1 Assocate Professor, Dept. of ECE, SNIST, Yamnampet, Ghatkesar Hyderabad-501301, Telangana 2 Professor, Dept. of ECE, AITS,

More information

Improvement of Spatial Resolution Using BlockMatching Based Motion Estimation and Frame. Integration

Improvement of Spatial Resolution Using BlockMatching Based Motion Estimation and Frame. Integration Improvement of Spatal Resoluton Usng BlockMatchng Based Moton Estmaton and Frame Integraton Danya Suga and Takayuk Hamamoto Graduate School of Engneerng, Tokyo Unversty of Scence, 6-3-1, Nuku, Katsuska-ku,

More information

A Fast Visual Tracking Algorithm Based on Circle Pixels Matching

A Fast Visual Tracking Algorithm Based on Circle Pixels Matching A Fast Vsual Trackng Algorthm Based on Crcle Pxels Matchng Zhqang Hou hou_zhq@sohu.com Chongzhao Han czhan@mal.xjtu.edu.cn Ln Zheng Abstract: A fast vsual trackng algorthm based on crcle pxels matchng

More information

Parallelism for Nested Loops with Non-uniform and Flow Dependences

Parallelism for Nested Loops with Non-uniform and Flow Dependences Parallelsm for Nested Loops wth Non-unform and Flow Dependences Sam-Jn Jeong Dept. of Informaton & Communcaton Engneerng, Cheonan Unversty, 5, Anseo-dong, Cheonan, Chungnam, 330-80, Korea. seong@cheonan.ac.kr

More information

Content Based Image Retrieval Using 2-D Discrete Wavelet with Texture Feature with Different Classifiers

Content Based Image Retrieval Using 2-D Discrete Wavelet with Texture Feature with Different Classifiers IOSR Journal of Electroncs and Communcaton Engneerng (IOSR-JECE) e-issn: 78-834,p- ISSN: 78-8735.Volume 9, Issue, Ver. IV (Mar - Apr. 04), PP 0-07 Content Based Image Retreval Usng -D Dscrete Wavelet wth

More information

A Hybrid Semi-Blind Gray Scale Image Watermarking Algorithm Based on DWT-SVD using Human Visual System Model

A Hybrid Semi-Blind Gray Scale Image Watermarking Algorithm Based on DWT-SVD using Human Visual System Model A Hybrd Sem-Blnd Gray Scale Image Watermarkng Algorthm Based on DWT-SVD usng Human Vsual System Model Rajesh Mehta r Scence & Engneerng, USICT Guru Gobnd Sngh Indrarprastha Unversty New Delh, Inda rajesh00ust@gmal.com

More information

Key-Selective Patchwork Method for Audio Watermarking

Key-Selective Patchwork Method for Audio Watermarking Internatonal Journal of Dgtal Content Technology and ts Applcatons Volume 4, Number 4, July 2010 Key-Selectve Patchwork Method for Audo Watermarkng 1 Ch-Man Pun, 2 Jng-Jng Jang 1, Frst and Correspondng

More information

Geometrically Invariant Watermarking Scheme Based on Local Feature Points

Geometrically Invariant Watermarking Scheme Based on Local Feature Points JOURNAL OF MULTIMEDIA, VOL. 7, NO. 3, JUNE 0 3 Geometrcally Invarant Watermarkng Scheme Based on Local Feature Ponts L Jng School of Computer and Informaton Engneerng, Henan Unversty of Economcs and Law,

More information

A Binarization Algorithm specialized on Document Images and Photos

A Binarization Algorithm specialized on Document Images and Photos A Bnarzaton Algorthm specalzed on Document mages and Photos Ergna Kavalleratou Dept. of nformaton and Communcaton Systems Engneerng Unversty of the Aegean kavalleratou@aegean.gr Abstract n ths paper, a

More information

Enhanced Watermarking Technique for Color Images using Visual Cryptography

Enhanced Watermarking Technique for Color Images using Visual Cryptography Informaton Assurance and Securty Letters 1 (2010) 024-028 Enhanced Watermarkng Technque for Color Images usng Vsual Cryptography Enas F. Al rawashdeh 1, Rawan I.Zaghloul 2 1 Balqa Appled Unversty, MIS

More information

Image Representation & Visualization Basic Imaging Algorithms Shape Representation and Analysis. outline

Image Representation & Visualization Basic Imaging Algorithms Shape Representation and Analysis. outline mage Vsualzaton mage Vsualzaton mage Representaton & Vsualzaton Basc magng Algorthms Shape Representaton and Analyss outlne mage Representaton & Vsualzaton Basc magng Algorthms Shape Representaton and

More information

A Fast Content-Based Multimedia Retrieval Technique Using Compressed Data

A Fast Content-Based Multimedia Retrieval Technique Using Compressed Data A Fast Content-Based Multmeda Retreval Technque Usng Compressed Data Borko Furht and Pornvt Saksobhavvat NSF Multmeda Laboratory Florda Atlantc Unversty, Boca Raton, Florda 3343 ABSTRACT In ths paper,

More information

Edge Detection in Noisy Images Using the Support Vector Machines

Edge Detection in Noisy Images Using the Support Vector Machines Edge Detecton n Nosy Images Usng the Support Vector Machnes Hlaro Gómez-Moreno, Saturnno Maldonado-Bascón, Francsco López-Ferreras Sgnal Theory and Communcatons Department. Unversty of Alcalá Crta. Madrd-Barcelona

More information

An efficient method to build panoramic image mosaics

An efficient method to build panoramic image mosaics An effcent method to buld panoramc mage mosacs Pattern Recognton Letters vol. 4 003 Dae-Hyun Km Yong-In Yoon Jong-Soo Cho School of Electrcal Engneerng and Computer Scence Kyungpook Natonal Unv. Abstract

More information

TN348: Openlab Module - Colocalization

TN348: Openlab Module - Colocalization TN348: Openlab Module - Colocalzaton Topc The Colocalzaton module provdes the faclty to vsualze and quantfy colocalzaton between pars of mages. The Colocalzaton wndow contans a prevew of the two mages

More information

FEATURE EXTRACTION. Dr. K.Vijayarekha. Associate Dean School of Electrical and Electronics Engineering SASTRA University, Thanjavur

FEATURE EXTRACTION. Dr. K.Vijayarekha. Associate Dean School of Electrical and Electronics Engineering SASTRA University, Thanjavur FEATURE EXTRACTION Dr. K.Vjayarekha Assocate Dean School of Electrcal and Electroncs Engneerng SASTRA Unversty, Thanjavur613 41 Jont Intatve of IITs and IISc Funded by MHRD Page 1 of 8 Table of Contents

More information

Robust Video Watermarking Using Image Normalization, Motion Vector and Perceptual Information

Robust Video Watermarking Using Image Normalization, Motion Vector and Perceptual Information Robust Vdeo Watermarkng Usng Image ormalzaton, Moton Vector and Perceptual Informaton Cedllo-Hernández Antono 1, Cedllo-Hernández Manuel 1, akano-myatake Marko 1, García-Vázquez Mreya S. 2 1 Postgraduate

More information

Research and Application of Fingerprint Recognition Based on MATLAB

Research and Application of Fingerprint Recognition Based on MATLAB Send Orders for Reprnts to reprnts@benthamscence.ae The Open Automaton and Control Systems Journal, 205, 7, 07-07 Open Access Research and Applcaton of Fngerprnt Recognton Based on MATLAB Nng Lu* Department

More information

Skew Angle Estimation and Correction of Hand Written, Textual and Large areas of Non-Textual Document Images: A Novel Approach

Skew Angle Estimation and Correction of Hand Written, Textual and Large areas of Non-Textual Document Images: A Novel Approach Angle Estmaton and Correcton of Hand Wrtten, Textual and Large areas of Non-Textual Document Images: A Novel Approach D.R.Ramesh Babu Pyush M Kumat Mahesh D Dhannawat PES Insttute of Technology Research

More information

Digital Video Watermarking using Discrete Wavelet Transform and Principal Component Analysis

Digital Video Watermarking using Discrete Wavelet Transform and Principal Component Analysis Internatonal Journal of Wsdom Based Computng, Vol. 1 (2), August 2011 7 Dgtal Vdeo Watermarkng usng Dscrete Wavelet Transform and Prncpal Component Analyss Sanjana Snha, Prajnat Bardhan, Swarnal Pramanck,

More information

User Authentication Based On Behavioral Mouse Dynamics Biometrics

User Authentication Based On Behavioral Mouse Dynamics Biometrics User Authentcaton Based On Behavoral Mouse Dynamcs Bometrcs Chee-Hyung Yoon Danel Donghyun Km Department of Computer Scence Department of Computer Scence Stanford Unversty Stanford Unversty Stanford, CA

More information

A Modified Median Filter for the Removal of Impulse Noise Based on the Support Vector Machines

A Modified Median Filter for the Removal of Impulse Noise Based on the Support Vector Machines A Modfed Medan Flter for the Removal of Impulse Nose Based on the Support Vector Machnes H. GOMEZ-MORENO, S. MALDONADO-BASCON, F. LOPEZ-FERRERAS, M. UTRILLA- MANSO AND P. GIL-JIMENEZ Departamento de Teoría

More information

Fuzzy Filtering Algorithms for Image Processing: Performance Evaluation of Various Approaches

Fuzzy Filtering Algorithms for Image Processing: Performance Evaluation of Various Approaches Proceedngs of the Internatonal Conference on Cognton and Recognton Fuzzy Flterng Algorthms for Image Processng: Performance Evaluaton of Varous Approaches Rajoo Pandey and Umesh Ghanekar Department of

More information

Feature Reduction and Selection

Feature Reduction and Selection Feature Reducton and Selecton Dr. Shuang LIANG School of Software Engneerng TongJ Unversty Fall, 2012 Today s Topcs Introducton Problems of Dmensonalty Feature Reducton Statstc methods Prncpal Components

More information

High Payload Reversible Data Hiding Scheme Using Difference Segmentation and Histogram Shifting

High Payload Reversible Data Hiding Scheme Using Difference Segmentation and Histogram Shifting JOURNAL OF ELECTRONIC SCIENCE AND TECHNOLOGY, VOL. 11, NO. 1, MARCH 2013 9 Hgh Payload Reversble Data Hdng Scheme Usng Dfference Segmentaton and Hstogram Shftng Yung-Chen Chou and Huang-Chng L Abstract

More information

Enhanced AMBTC for Image Compression using Block Classification and Interpolation

Enhanced AMBTC for Image Compression using Block Classification and Interpolation Internatonal Journal of Computer Applcatons (0975 8887) Volume 5 No.0, August 0 Enhanced AMBTC for Image Compresson usng Block Classfcaton and Interpolaton S. Vmala Dept. of Comp. Scence Mother Teresa

More information

Local Quaternary Patterns and Feature Local Quaternary Patterns

Local Quaternary Patterns and Feature Local Quaternary Patterns Local Quaternary Patterns and Feature Local Quaternary Patterns Jayu Gu and Chengjun Lu The Department of Computer Scence, New Jersey Insttute of Technology, Newark, NJ 0102, USA Abstract - Ths paper presents

More information

S1 Note. Basis functions.

S1 Note. Basis functions. S1 Note. Bass functons. Contents Types of bass functons...1 The Fourer bass...2 B-splne bass...3 Power and type I error rates wth dfferent numbers of bass functons...4 Table S1. Smulaton results of type

More information

Identify the Attack in Embedded Image with Steganalysis Detection Method by PSNR and RGB Intensity

Identify the Attack in Embedded Image with Steganalysis Detection Method by PSNR and RGB Intensity Internatonal Journal of Computer Systems (ISSN: 394-1065), Volume 03 Issue 07, July, 016 Avalable at http://www.jcsonlne.com/ Identfy the Attack n Embedded Image wth Steganalyss Detecton Method by PSNR

More information

R s s f. m y s. SPH3UW Unit 7.3 Spherical Concave Mirrors Page 1 of 12. Notes

R s s f. m y s. SPH3UW Unit 7.3 Spherical Concave Mirrors Page 1 of 12. Notes SPH3UW Unt 7.3 Sphercal Concave Mrrors Page 1 of 1 Notes Physcs Tool box Concave Mrror If the reflectng surface takes place on the nner surface of the sphercal shape so that the centre of the mrror bulges

More information

An Optimal Algorithm for Prufer Codes *

An Optimal Algorithm for Prufer Codes * J. Software Engneerng & Applcatons, 2009, 2: 111-115 do:10.4236/jsea.2009.22016 Publshed Onlne July 2009 (www.scrp.org/journal/jsea) An Optmal Algorthm for Prufer Codes * Xaodong Wang 1, 2, Le Wang 3,

More information

Coding Artifact Reduction Using Edge Map Guided Adaptive and Fuzzy Filter

Coding Artifact Reduction Using Edge Map Guided Adaptive and Fuzzy Filter MEL A MITSUBISHI ELECTIC ESEACH LABOATOY http://www.merl.com Codng Artfact educton Usng Edge Map Guded Adaptve and Fuzzy Flter Hao-Song Kong Yao Ne Anthony Vetro Hufang Sun Kenneth E. Barner T-2004-056

More information

Shape-adaptive DCT and Its Application in Region-based Image Coding

Shape-adaptive DCT and Its Application in Region-based Image Coding Internatonal Journal of Sgnal Processng, Image Processng and Pattern Recognton, pp.99-108 http://dx.do.org/10.14257/sp.2014.7.1.10 Shape-adaptve DCT and Its Applcaton n Regon-based Image Codng Yamn Zheng,

More information

Feature Extractions for Iris Recognition

Feature Extractions for Iris Recognition Feature Extractons for Irs Recognton Jnwook Go, Jan Jang, Yllbyung Lee, and Chulhee Lee Department of Electrcal and Electronc Engneerng, Yonse Unversty 134 Shnchon-Dong, Seodaemoon-Gu, Seoul, KOREA Emal:

More information

Corner-Based Image Alignment using Pyramid Structure with Gradient Vector Similarity

Corner-Based Image Alignment using Pyramid Structure with Gradient Vector Similarity Journal of Sgnal and Informaton Processng, 013, 4, 114-119 do:10.436/jsp.013.43b00 Publshed Onlne August 013 (http://www.scrp.org/journal/jsp) Corner-Based Image Algnment usng Pyramd Structure wth Gradent

More information

Learning the Kernel Parameters in Kernel Minimum Distance Classifier

Learning the Kernel Parameters in Kernel Minimum Distance Classifier Learnng the Kernel Parameters n Kernel Mnmum Dstance Classfer Daoqang Zhang 1,, Songcan Chen and Zh-Hua Zhou 1* 1 Natonal Laboratory for Novel Software Technology Nanjng Unversty, Nanjng 193, Chna Department

More information

Semi-Fragile Watermarking Scheme for Authentication of JPEG Images

Semi-Fragile Watermarking Scheme for Authentication of JPEG Images Tamkang Journal of Scence and Engneerng, Vol. 10, No 1, pp. 5766 (2007) 57 Sem-Fragle Watermarkng Scheme for Authentcaton of JPEG Images Chh-Hung n 1 *, Tung-Shh Su 2 and Wen-Shyong Hseh 2,3 1 Department

More information

SLAM Summer School 2006 Practical 2: SLAM using Monocular Vision

SLAM Summer School 2006 Practical 2: SLAM using Monocular Vision SLAM Summer School 2006 Practcal 2: SLAM usng Monocular Vson Javer Cvera, Unversty of Zaragoza Andrew J. Davson, Imperal College London J.M.M Montel, Unversty of Zaragoza. josemar@unzar.es, jcvera@unzar.es,

More information

Private Information Retrieval (PIR)

Private Information Retrieval (PIR) 2 Levente Buttyán Problem formulaton Alce wants to obtan nformaton from a database, but she does not want the database to learn whch nformaton she wanted e.g., Alce s an nvestor queryng a stock-market

More information

Problem Set 3 Solutions

Problem Set 3 Solutions Introducton to Algorthms October 4, 2002 Massachusetts Insttute of Technology 6046J/18410J Professors Erk Demane and Shaf Goldwasser Handout 14 Problem Set 3 Solutons (Exercses were not to be turned n,

More information

Cluster Analysis of Electrical Behavior

Cluster Analysis of Electrical Behavior Journal of Computer and Communcatons, 205, 3, 88-93 Publshed Onlne May 205 n ScRes. http://www.scrp.org/ournal/cc http://dx.do.org/0.4236/cc.205.350 Cluster Analyss of Electrcal Behavor Ln Lu Ln Lu, School

More information

The Codesign Challenge

The Codesign Challenge ECE 4530 Codesgn Challenge Fall 2007 Hardware/Software Codesgn The Codesgn Challenge Objectves In the codesgn challenge, your task s to accelerate a gven software reference mplementaton as fast as possble.

More information

Detection of an Object by using Principal Component Analysis

Detection of an Object by using Principal Component Analysis Detecton of an Object by usng Prncpal Component Analyss 1. G. Nagaven, 2. Dr. T. Sreenvasulu Reddy 1. M.Tech, Department of EEE, SVUCE, Trupath, Inda. 2. Assoc. Professor, Department of ECE, SVUCE, Trupath,

More information

2 optmal per-pxel estmate () whch we had proposed for non-scalable vdeo codng [5] [6]. The extended s shown to accurately account for both temporal an

2 optmal per-pxel estmate () whch we had proposed for non-scalable vdeo codng [5] [6]. The extended s shown to accurately account for both temporal an Scalable Vdeo Codng wth Robust Mode Selecton Ru Zhang, Shankar L. Regunathan and Kenneth Rose Department of Electrcal and Computer Engneerng Unversty of Calforna Santa Barbara, CA 906 Abstract We propose

More information

An Image Fusion Approach Based on Segmentation Region

An Image Fusion Approach Based on Segmentation Region Rong Wang, L-Qun Gao, Shu Yang, Yu-Hua Cha, and Yan-Chun Lu An Image Fuson Approach Based On Segmentaton Regon An Image Fuson Approach Based on Segmentaton Regon Rong Wang, L-Qun Gao, Shu Yang 3, Yu-Hua

More information

X- Chart Using ANOM Approach

X- Chart Using ANOM Approach ISSN 1684-8403 Journal of Statstcs Volume 17, 010, pp. 3-3 Abstract X- Chart Usng ANOM Approach Gullapall Chakravarth 1 and Chaluvad Venkateswara Rao Control lmts for ndvdual measurements (X) chart are

More information

Information Hiding Watermarking Detection Technique by PSNR and RGB Intensity

Information Hiding Watermarking Detection Technique by PSNR and RGB Intensity www..org 3 Informaton Hdng Watermarkng Detecton Technque by PSNR and RGB Intensty 1 Neha Chauhan, Akhlesh A. Waoo, 3 P. S. Patheja 1 Research Scholar, BIST, Bhopal, Inda.,3 Assstant Professor, BIST, Bhopal,

More information

Quality Improvement Algorithm for Tetrahedral Mesh Based on Optimal Delaunay Triangulation

Quality Improvement Algorithm for Tetrahedral Mesh Based on Optimal Delaunay Triangulation Intellgent Informaton Management, 013, 5, 191-195 Publshed Onlne November 013 (http://www.scrp.org/journal/m) http://dx.do.org/10.36/m.013.5601 Qualty Improvement Algorthm for Tetrahedral Mesh Based on

More information

Proper Choice of Data Used for the Estimation of Datum Transformation Parameters

Proper Choice of Data Used for the Estimation of Datum Transformation Parameters Proper Choce of Data Used for the Estmaton of Datum Transformaton Parameters Hakan S. KUTOGLU, Turkey Key words: Coordnate systems; transformaton; estmaton, relablty. SUMMARY Advances n technologes and

More information

Classifying Acoustic Transient Signals Using Artificial Intelligence

Classifying Acoustic Transient Signals Using Artificial Intelligence Classfyng Acoustc Transent Sgnals Usng Artfcal Intellgence Steve Sutton, Unversty of North Carolna At Wlmngton (suttons@charter.net) Greg Huff, Unversty of North Carolna At Wlmngton (jgh7476@uncwl.edu)

More information

High-Boost Mesh Filtering for 3-D Shape Enhancement

High-Boost Mesh Filtering for 3-D Shape Enhancement Hgh-Boost Mesh Flterng for 3-D Shape Enhancement Hrokazu Yagou Λ Alexander Belyaev y Damng We z Λ y z ; ; Shape Modelng Laboratory, Unversty of Azu, Azu-Wakamatsu 965-8580 Japan y Computer Graphcs Group,

More information

TECHNIQUE OF FORMATION HOMOGENEOUS SAMPLE SAME OBJECTS. Muradaliyev A.Z.

TECHNIQUE OF FORMATION HOMOGENEOUS SAMPLE SAME OBJECTS. Muradaliyev A.Z. TECHNIQUE OF FORMATION HOMOGENEOUS SAMPLE SAME OBJECTS Muradalyev AZ Azerbajan Scentfc-Research and Desgn-Prospectng Insttute of Energetc AZ1012, Ave HZardab-94 E-mal:aydn_murad@yahoocom Importance of

More information

An Image Compression Algorithm based on Wavelet Transform and LZW

An Image Compression Algorithm based on Wavelet Transform and LZW An Image Compresson Algorthm based on Wavelet Transform and LZW Png Luo a, Janyong Yu b School of Chongqng Unversty of Posts and Telecommuncatons, Chongqng, 400065, Chna Abstract a cylpng@63.com, b y27769864@sna.cn

More information

COMPLEX WAVELET TRANSFORM-BASED COLOR INDEXING FOR CONTENT-BASED IMAGE RETRIEVAL

COMPLEX WAVELET TRANSFORM-BASED COLOR INDEXING FOR CONTENT-BASED IMAGE RETRIEVAL COMPLEX WAVELET TRANSFORM-BASED COLOR INDEXING FOR CONTENT-BASED IMAGE RETRIEVAL Nader Safavan and Shohreh Kasae Department of Computer Engneerng Sharf Unversty of Technology Tehran, Iran skasae@sharf.edu

More information

Suppression for Luminance Difference of Stereo Image-Pair Based on Improved Histogram Equalization

Suppression for Luminance Difference of Stereo Image-Pair Based on Improved Histogram Equalization Suppresson for Lumnance Dfference of Stereo Image-Par Based on Improved Hstogram Equalzaton Zhao Llng,, Zheng Yuhu 3, Sun Quansen, Xa Deshen School of Computer Scence and Technology, NJUST, Nanjng, Chna.School

More information

Range images. Range image registration. Examples of sampling patterns. Range images and range surfaces

Range images. Range image registration. Examples of sampling patterns. Range images and range surfaces Range mages For many structured lght scanners, the range data forms a hghly regular pattern known as a range mage. he samplng pattern s determned by the specfc scanner. Range mage regstraton 1 Examples

More information

IMPLEMENTATION OF QIM BASED AUDIO WATERMARKING USING HYBRID TRANSFORM OF SWT-DCT-SVD METHODS OPTIMIZED WITH GENETIC ALORITHM

IMPLEMENTATION OF QIM BASED AUDIO WATERMARKING USING HYBRID TRANSFORM OF SWT-DCT-SVD METHODS OPTIMIZED WITH GENETIC ALORITHM IMPLEMENTATION OF QIM BASED AUDIO WATERMARKING USING HYBRID TRANSFORM OF SWT-DCT-SVD METHODS OPTIMIZED WITH GENETIC ALORITHM Ryan Amnullah 1, Gelar Budman 2, Irma Saftr 3 1, 2, 3 FakultasTeknk Elektro,

More information

Adaptive digital watermarking of images using Genetic Algorithm

Adaptive digital watermarking of images using Genetic Algorithm Adaptve dgtal watermarkng of mages usng Genetc Algorthm Bushra Skander, Muhammad Ishtaq, M. Arfan Jaffar, Muhammad Tarq, Anwar M. Mrza Department of Computer Scence, Natonal Unversty of Computer and Emergng

More information

Shape Representation Robust to the Sketching Order Using Distance Map and Direction Histogram

Shape Representation Robust to the Sketching Order Using Distance Map and Direction Histogram Shape Representaton Robust to the Sketchng Order Usng Dstance Map and Drecton Hstogram Department of Computer Scence Yonse Unversty Kwon Yun CONTENTS Revew Topc Proposed Method System Overvew Sketch Normalzaton

More information

A Lossless Watermarking Scheme for Halftone Image Authentication

A Lossless Watermarking Scheme for Halftone Image Authentication IJCSNS Internatonal Journal of Computer Scence and Network Securty, VOL.6 No.2B, February 2006 147 A Lossless Watermarkng Scheme for Halftone Image Authentcaton Jeng-Shyang Pan, Hao Luo, and Zhe-Mng Lu,

More information

Analysis of Collaborative Distributed Admission Control in x Networks

Analysis of Collaborative Distributed Admission Control in x Networks 1 Analyss of Collaboratve Dstrbuted Admsson Control n 82.11x Networks Thnh Nguyen, Member, IEEE, Ken Nguyen, Member, IEEE, Lnha He, Member, IEEE, Abstract Wth the recent surge of wreless home networks,

More information

A Hybrid Digital Image Watermarking based on Discrete Wavelet Transform, Discrete Cosine Transform, and General Regression Neural Network

A Hybrid Digital Image Watermarking based on Discrete Wavelet Transform, Discrete Cosine Transform, and General Regression Neural Network A Hybrd Dgtal Image Watermarkng based on Dscrete Wavelet Transform, Dscrete Cosne Transform, and General Regresson Neural Network Ayoub Taher ; ABSTRACT In ths paper, a new hybrd dgtal watermarkng technque

More information

Robust and Reversible Relational Database Watermarking Algorithm Based on Clustering and Polar Angle Expansion

Robust and Reversible Relational Database Watermarking Algorithm Based on Clustering and Polar Angle Expansion Robust and Reversble Relatonal Database Watermarkng Algorthm Based on Clusterng and Polar Angle Expanson Zhyong L, Junmn Lu and Wecheng Tao College of Informaton Scence and Engneerng, Hunan Unversty, Changsha,

More information

KEYWORDS: Digital Image Watermarking, Discrete Wavelet Transform, General Regression Neural Network, Human Visual System. 1.

KEYWORDS: Digital Image Watermarking, Discrete Wavelet Transform, General Regression Neural Network, Human Visual System. 1. An Adaptve Dgtal Image Watermarkng Based on Image Features n Dscrete Wavelet Transform Doman and General Regresson Neural Network Ayoub Taher Group of IT Engneerng, Payam Noor Unversty, Broujen, Iran ABSTRACT:

More information

SAO: A Stream Index for Answering Linear Optimization Queries

SAO: A Stream Index for Answering Linear Optimization Queries SAO: A Stream Index for Answerng near Optmzaton Queres Gang uo Kun-ung Wu Phlp S. Yu IBM T.J. Watson Research Center {luog, klwu, psyu}@us.bm.com Abstract near optmzaton queres retreve the top-k tuples

More information

Wishing you all a Total Quality New Year!

Wishing you all a Total Quality New Year! Total Qualty Management and Sx Sgma Post Graduate Program 214-15 Sesson 4 Vnay Kumar Kalakband Assstant Professor Operatons & Systems Area 1 Wshng you all a Total Qualty New Year! Hope you acheve Sx sgma

More information

Steps for Computing the Dissimilarity, Entropy, Herfindahl-Hirschman and. Accessibility (Gravity with Competition) Indices

Steps for Computing the Dissimilarity, Entropy, Herfindahl-Hirschman and. Accessibility (Gravity with Competition) Indices Steps for Computng the Dssmlarty, Entropy, Herfndahl-Hrschman and Accessblty (Gravty wth Competton) Indces I. Dssmlarty Index Measurement: The followng formula can be used to measure the evenness between

More information

CLASSIFICATION OF ULTRASONIC SIGNALS

CLASSIFICATION OF ULTRASONIC SIGNALS The 8 th Internatonal Conference of the Slovenan Socety for Non-Destructve Testng»Applcaton of Contemporary Non-Destructve Testng n Engneerng«September -3, 5, Portorož, Slovena, pp. 7-33 CLASSIFICATION

More information

Problem Definitions and Evaluation Criteria for Computational Expensive Optimization

Problem Definitions and Evaluation Criteria for Computational Expensive Optimization Problem efntons and Evaluaton Crtera for Computatonal Expensve Optmzaton B. Lu 1, Q. Chen and Q. Zhang 3, J. J. Lang 4, P. N. Suganthan, B. Y. Qu 6 1 epartment of Computng, Glyndwr Unversty, UK Faclty

More information

Subspace clustering. Clustering. Fundamental to all clustering techniques is the choice of distance measure between data points;

Subspace clustering. Clustering. Fundamental to all clustering techniques is the choice of distance measure between data points; Subspace clusterng Clusterng Fundamental to all clusterng technques s the choce of dstance measure between data ponts; D q ( ) ( ) 2 x x = x x, j k = 1 k jk Squared Eucldean dstance Assumpton: All features

More information

CLUSTERING ALGORITHMS FOR PERCEPTUAL IMAGE HASHING. Vishal Monga, Arindam Banerjee, and Brian L. Evans

CLUSTERING ALGORITHMS FOR PERCEPTUAL IMAGE HASHING. Vishal Monga, Arindam Banerjee, and Brian L. Evans CLUSTERING ALGORITHMS FOR PERCEPTUAL IMAGE HASHING Vshal Monga, Arndam Banerjee, and Bran L. Evans Center for Perceptual Systems The Unversty of Texas at Austn, Austn, TX 7871 vshal,abanerje,bevans}@ece.utexas.edu

More information

A Gradient Difference based Technique for Video Text Detection

A Gradient Difference based Technique for Video Text Detection A Gradent Dfference based Technque for Vdeo Text Detecton Palaahnakote Shvakumara, Trung Quy Phan and Chew Lm Tan School of Computng, Natonal Unversty of Sngapore {shva, phanquyt, tancl }@comp.nus.edu.sg

More information

Integrated Expression-Invariant Face Recognition with Constrained Optical Flow

Integrated Expression-Invariant Face Recognition with Constrained Optical Flow Integrated Expresson-Invarant Face Recognton wth Constraned Optcal Flow Chao-Kue Hseh, Shang-Hong La 2, and Yung-Chang Chen Department of Electrcal Engneerng, Natonal Tsng Hua Unversty, Tawan 2 Department

More information

Outline. Discriminative classifiers for image recognition. Where in the World? A nearest neighbor recognition example 4/14/2011. CS 376 Lecture 22 1

Outline. Discriminative classifiers for image recognition. Where in the World? A nearest neighbor recognition example 4/14/2011. CS 376 Lecture 22 1 4/14/011 Outlne Dscrmnatve classfers for mage recognton Wednesday, Aprl 13 Krsten Grauman UT-Austn Last tme: wndow-based generc obect detecton basc ppelne face detecton wth boostng as case study Today:

More information

Deep learning is a good steganalysis tool when embedding key is reused for different images, even if there is a cover source-mismatch

Deep learning is a good steganalysis tool when embedding key is reused for different images, even if there is a cover source-mismatch Deep learnng s a good steganalyss tool when embeddng key s reused for dfferent mages, even f there s a cover source-msmatch Lonel PIBRE 2,3, Jérôme PASQUET 2,3, Dno IENCO 2,3, Marc CHAUMONT 1,2,3 (1) Unversty

More information

A Secured Method for Image Steganography Based On Pixel Values

A Secured Method for Image Steganography Based On Pixel Values A Secured Method for Image Steganography Based On Pxel Values Tarun Gulat #, Sanskrt Gupta * # Assocate Professor, Electroncs and Communcaton Engneerng Department, MMEC, M.M.U., Mullana, Ambala, Haryana,

More information

A Gradient Difference based Technique for Video Text Detection

A Gradient Difference based Technique for Video Text Detection 2009 10th Internatonal Conference on Document Analyss and Recognton A Gradent Dfference based Technque for Vdeo Text Detecton Palaahnakote Shvakumara, Trung Quy Phan and Chew Lm Tan School of Computng,

More information

Related-Mode Attacks on CTR Encryption Mode

Related-Mode Attacks on CTR Encryption Mode Internatonal Journal of Network Securty, Vol.4, No.3, PP.282 287, May 2007 282 Related-Mode Attacks on CTR Encrypton Mode Dayn Wang, Dongda Ln, and Wenlng Wu (Correspondng author: Dayn Wang) Key Laboratory

More information

Term Weighting Classification System Using the Chi-square Statistic for the Classification Subtask at NTCIR-6 Patent Retrieval Task

Term Weighting Classification System Using the Chi-square Statistic for the Classification Subtask at NTCIR-6 Patent Retrieval Task Proceedngs of NTCIR-6 Workshop Meetng, May 15-18, 2007, Tokyo, Japan Term Weghtng Classfcaton System Usng the Ch-square Statstc for the Classfcaton Subtask at NTCIR-6 Patent Retreval Task Kotaro Hashmoto

More information

Multi-stable Perception. Necker Cube

Multi-stable Perception. Necker Cube Mult-stable Percepton Necker Cube Spnnng dancer lluson, Nobuuk Kaahara Fttng and Algnment Computer Vson Szelsk 6.1 James Has Acknowledgment: Man sldes from Derek Hoem, Lana Lazebnk, and Grauman&Lebe 2008

More information

A Comparison between Digital Images Watermarking in Tow Different Color Spaces Using DWT2*

A Comparison between Digital Images Watermarking in Tow Different Color Spaces Using DWT2* A Comparson between Dgtal s ng n Tow Dfferent Color Spaces Usng DWT* Mehd Khall Natonal Academy of Scence of Armena Yerevan, Armena e-mal: khall.mehd@yahoo.com ABSTRACT A novel dgtal watermarkng for ownershp

More information

Meta-heuristics for Multidimensional Knapsack Problems

Meta-heuristics for Multidimensional Knapsack Problems 2012 4th Internatonal Conference on Computer Research and Development IPCSIT vol.39 (2012) (2012) IACSIT Press, Sngapore Meta-heurstcs for Multdmensonal Knapsack Problems Zhbao Man + Computer Scence Department,

More information

Accounting for the Use of Different Length Scale Factors in x, y and z Directions

Accounting for the Use of Different Length Scale Factors in x, y and z Directions 1 Accountng for the Use of Dfferent Length Scale Factors n x, y and z Drectons Taha Soch (taha.soch@kcl.ac.uk) Imagng Scences & Bomedcal Engneerng, Kng s College London, The Rayne Insttute, St Thomas Hosptal,

More information

Image Alignment CSC 767

Image Alignment CSC 767 Image Algnment CSC 767 Image algnment Image from http://graphcs.cs.cmu.edu/courses/15-463/2010_fall/ Image algnment: Applcatons Panorama sttchng Image algnment: Applcatons Recognton of object nstances

More information

Research in Algorithm of Image Processing Used in Collision Avoidance Systems

Research in Algorithm of Image Processing Used in Collision Avoidance Systems Sensors & Transducers, Vol 59, Issue, November 203, pp 330-336 Sensors & Transducers 203 by IFSA http://wwwsensorsportalcom Research n Algorthm of Image Processng Used n Collson Avodance Systems Hu Bn

More information

A Robust Method for Estimating the Fundamental Matrix

A Robust Method for Estimating the Fundamental Matrix Proc. VIIth Dgtal Image Computng: Technques and Applcatons, Sun C., Talbot H., Ourseln S. and Adraansen T. (Eds.), 0- Dec. 003, Sydney A Robust Method for Estmatng the Fundamental Matrx C.L. Feng and Y.S.

More information

Classifier Selection Based on Data Complexity Measures *

Classifier Selection Based on Data Complexity Measures * Classfer Selecton Based on Data Complexty Measures * Edth Hernández-Reyes, J.A. Carrasco-Ochoa, and J.Fco. Martínez-Trndad Natonal Insttute for Astrophyscs, Optcs and Electroncs, Lus Enrque Erro No.1 Sta.

More information

Constructing Minimum Connected Dominating Set: Algorithmic approach

Constructing Minimum Connected Dominating Set: Algorithmic approach Constructng Mnmum Connected Domnatng Set: Algorthmc approach G.N. Puroht and Usha Sharma Centre for Mathematcal Scences, Banasthal Unversty, Rajasthan 304022 usha.sharma94@yahoo.com Abstract: Connected

More information

MOTION PANORAMA CONSTRUCTION FROM STREAMING VIDEO FOR POWER- CONSTRAINED MOBILE MULTIMEDIA ENVIRONMENTS XUNYU PAN

MOTION PANORAMA CONSTRUCTION FROM STREAMING VIDEO FOR POWER- CONSTRAINED MOBILE MULTIMEDIA ENVIRONMENTS XUNYU PAN MOTION PANORAMA CONSTRUCTION FROM STREAMING VIDEO FOR POWER- CONSTRAINED MOBILE MULTIMEDIA ENVIRONMENTS by XUNYU PAN (Under the Drecton of Suchendra M. Bhandarkar) ABSTRACT In modern tmes, more and more

More information

MULTISPECTRAL IMAGES CLASSIFICATION BASED ON KLT AND ATR AUTOMATIC TARGET RECOGNITION

MULTISPECTRAL IMAGES CLASSIFICATION BASED ON KLT AND ATR AUTOMATIC TARGET RECOGNITION MULTISPECTRAL IMAGES CLASSIFICATION BASED ON KLT AND ATR AUTOMATIC TARGET RECOGNITION Paulo Quntlano 1 & Antono Santa-Rosa 1 Federal Polce Department, Brasla, Brazl. E-mals: quntlano.pqs@dpf.gov.br and

More information

A New Approach For the Ranking of Fuzzy Sets With Different Heights

A New Approach For the Ranking of Fuzzy Sets With Different Heights New pproach For the ankng of Fuzzy Sets Wth Dfferent Heghts Pushpnder Sngh School of Mathematcs Computer pplcatons Thapar Unversty, Patala-7 00 Inda pushpndersnl@gmalcom STCT ankng of fuzzy sets plays

More information

Robust Watermarking for Text Images Based on Arnold Scrambling and DWT-DCT

Robust Watermarking for Text Images Based on Arnold Scrambling and DWT-DCT Internatonal Conference on Mechatroncs Electronc Industral and Control Engneerng (MEIC 015) Robust Watermarkng for Text Images Based on Arnold Scramblng and DWT-DCT Fan Wu College of Informaton Scence

More information

Reducing Frame Rate for Object Tracking

Reducing Frame Rate for Object Tracking Reducng Frame Rate for Object Trackng Pavel Korshunov 1 and We Tsang Oo 2 1 Natonal Unversty of Sngapore, Sngapore 11977, pavelkor@comp.nus.edu.sg 2 Natonal Unversty of Sngapore, Sngapore 11977, oowt@comp.nus.edu.sg

More information

A NEW AUDIO WATERMARKING METHOD BASED

A NEW AUDIO WATERMARKING METHOD BASED A NEW AUDIO WATERMARKING METHOD BASED ON DISCRETE COSINE TRANSFORM WITH A GRAY IMAGE Mohammad Ibrahm Khan 1, Md. Iqbal Hasan Sarker 2, Kaushk Deb 3 and Md. Hasan Furhad 4 1,2,3 Department of Computer Scence

More information

Research Article High Capacity Reversible Watermarking for Audio by Histogram Shifting and Predicted Error Expansion

Research Article High Capacity Reversible Watermarking for Audio by Histogram Shifting and Predicted Error Expansion e Scentfc World Journal, Artcle ID 656251, 7 pages http://dx.do.org/1.1155/214/656251 Research Artcle Hgh Capacty Reversble Watermarkng for Audo by Hstogram Shftng and Predcted Error Expanson Fe Wang,

More information

A Background Subtraction for a Vision-based User Interface *

A Background Subtraction for a Vision-based User Interface * A Background Subtracton for a Vson-based User Interface * Dongpyo Hong and Woontack Woo KJIST U-VR Lab. {dhon wwoo}@kjst.ac.kr Abstract In ths paper, we propose a robust and effcent background subtracton

More information

Load Balancing for Hex-Cell Interconnection Network

Load Balancing for Hex-Cell Interconnection Network Int. J. Communcatons, Network and System Scences,,, - Publshed Onlne Aprl n ScRes. http://www.scrp.org/journal/jcns http://dx.do.org/./jcns.. Load Balancng for Hex-Cell Interconnecton Network Saher Manaseer,

More information

Analysis of Continuous Beams in General

Analysis of Continuous Beams in General Analyss of Contnuous Beams n General Contnuous beams consdered here are prsmatc, rgdly connected to each beam segment and supported at varous ponts along the beam. onts are selected at ponts of support,

More information

Dynamic wetting property investigation of AFM tips in micro/nanoscale

Dynamic wetting property investigation of AFM tips in micro/nanoscale Dynamc wettng property nvestgaton of AFM tps n mcro/nanoscale The wettng propertes of AFM probe tps are of concern n AFM tp related force measurement, fabrcaton, and manpulaton technques, such as dp-pen

More information

An Iterative Solution Approach to Process Plant Layout using Mixed Integer Optimisation

An Iterative Solution Approach to Process Plant Layout using Mixed Integer Optimisation 17 th European Symposum on Computer Aded Process Engneerng ESCAPE17 V. Plesu and P.S. Agach (Edtors) 2007 Elsever B.V. All rghts reserved. 1 An Iteratve Soluton Approach to Process Plant Layout usng Mxed

More information