Watermark based Recovery of Tampered Documents

Size: px
Start display at page:

Download "Watermark based Recovery of Tampered Documents"

Transcription

1 Watermark based Recovery of Tampered Documents Anamitra Makur Electrical & Electronic Engineering Nanyang Technological University, Singapore Govindarajan Sridharan Electrical & Electronic Engineering Nanyang Technological University, Singapore ABSTRACT In this work recovery of text documents is addressed. Text documents are watermarked using pixel flipping based watermarking and self-embedding for not only authentication but eventual recovery in presence of tampering. A scheme is proposed that recovers against all possible editing attacks such as substitution, insertion and deletion of characters. Algorithms for tamper detection and recovery are suggested and their functioning explained with detailed examples. Categories and Subject Descriptors K.6.5 [Security and Protection]: Authentication. I.7.m [Document and Text Processing]: Miscellaneous. General Terms Security, Algorithms. Keywords Document watermarking, authentication, recovery. 1. INTRODUCTION Documents represent a primary form of written communication and large volumes are exchanged daily. Document recipients should be able to authenticate documents as well as identify document owners. While document can be gray-scale or color images, in this work we consider documents as binary images, such as a fax. Many watermarking schemes have been developed for gray-scale and color images. However, these watermarking schemes cannot be applied to binary document images, since such schemes achieve embedding by small changes to the gray/color pixel values which is not possible for binary values, and also since perceptible image distortion of binary images (see section 2.3) is quite different from that of gray/color images. The goal of fragile watermarking in this work is to detect any tampering and to recover the original information. Documents are intercepted and tampered by non-intended users or users with malicious intent for purposes such as systematic manipulation of contents of the document for one s favor. Since the original document is seldom accessible at the decoder in applications of data authentication, the only resort to authenticate and recover the document is to extract the watermark from the non-tampered part of the document. te that the goal of watermarking is different from that of encryption, since a watermarked document is public (readable to anyone, almost indistinguishable from the original), while an encrypted document is incomprehensible to others. Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. ISI-KDD 12, August 12, 2012, Beijing, China. Copyright 2012 ACM /12/08. In this work, the prime focus is on recovery of a sequence such as text from partial information (watermark). A document is modeled by a sequence of alphanumeric characters, and recovery is limited to recovering the original character sequence (but not font, style, etc.). We propose an algorithm to counter all kinds of sequence tampering such as substitution, insertion, deletion or a combination of all. Even though used for text sequences, the idea proposed here is equally applicable to any other sequence. 2. WATERMARK EMBEDDING AND EXTRACTION Before we proceed to tamper detection and recovery, the document watermarking scheme used is described in brief. Since authentication is the objective, the watermark used is fragile; even slight modification will result in extraction error. Embedding involves character segmentation and recognition, creating the watermark for self-embedding, and actual embedding using boundary pixel flipping. 2.1 Character Recognition Our implementation is limited to document images that use some standard font such as Times New Roman, and have only upper case 26 alphabets, lower case 26 alphabets, numerals from 0 to 9, and 2 punctuation marks, making a total of 64 characters. (The scheme may be extended to include all ASCII characters.) Each character is segmented using a standard connected component segmentation. Each character is then recognized using Fourier descriptors (FD) [1,14]. Boundary points of each character are extracted, expressed as a sequence of complex numbers, and a 512-point discrete Fourier transform (DFT) is taken to obtain the FD. Even though FDs are invariant to rotation and translation, they are sensitive to boundary modifications. Since the character boundary is modified by the watermarking process (described later), the FD after watermarking will change. However, low frequency FDs determine the global shape and are relatively less affected. Therefore, we consider only first 21 lower order FDs (DFT coefficients for k = 10 to 10). For the standard fonts and 64 characters, a table of 21 FDs is pre-computed and stored. The table entry closest (mean absolute error) to the obtained FD denotes the character. 2.2 Self-embedding In order to be able to recover tampered characters, self-embedding [2,5-7,11-13] is used, where the watermark is a copy of the cover medium itself. In this work, one unit of watermark is the ASCII code representing a character, which is embedded in one unit of the cover medium, the binary image of a segmented character. However, embedding the code of a character onto itself does not allow its recovery if tampered. Therefore, the code of a character i is embedded on another character (i + c) mod n, where c is a cyclic shift known to the encoder and the decoder (all examples use c = 5), and n is the length of the text sequence. Schemes besides cyclic shift may be found in [13]. Some prior document recovery works use document as a color image [2] which poses less of a challenge. Other works on binary document with character-based [13] or word-based [5] self-embedding used only recovery bits (code of a character or word) as watermark.

2 Consequently these schemes had difficulty against recovery of insertion and deletion tampering. In this work we propose use of authentication bits with position information (counter) to recover any kind of tampering. The authentication bits are encrypted version of a counter denoting the sequence number of a character. For each character, 10 bits are used as the watermark data, where the first 3 bits are authentication bits obtained from a 3 bit counter. Consecutive characters will have (decrypted) counter value 0,1,2,3,4,5,6,7,0,1,2,3, etc. The remaining 7 recovery bits are the ASCII code of a character. 2.3 Watermark Embedding For binary images, pixel values are either black (0) or white (1). Therefore, to embed watermark data, one has to flip pixels from black to white or vice versa. If the pixels to be used for flipping are not selected appropriately, image distortion will be highly perceptible. Low et al. [8-10] proposed a robust data hiding scheme which embeds data in formatted text documents by changing line, word, or character spacing by an indiscernible amount. Wu et al. [16] proposed a data hiding in the binary image using human perception. Distortion that can occur due to flipping of every pixel was measured. Based upon the distortion score, suitable pixels were then selected for flipping. Another scheme of embedding data in 8-connected boundary pixel of a character has been proposed by Mei et al. [15]. Pairs of five-pixel long boundary patterns were identified for pixel embedding data. The use of a suitable distortion model is necessary to minimize the visual distortion in the watermarked images, because minor modification of the pixels can be perceptible since the pixels are either black or white. A perceptual model based on the curvature weighted distance difference (CWDD) measure between two contour segments has been proposed by Ho et al. [3,4], in which the amount of intrusion or protrusion of the boundary due to flipping of a boundary pixel is measured. The model is found to be highly correlated with human perception and particularly useful for sharply contrasted binary images such as text, drawing and signature images. In this work the non-blind watermarking scheme of [3] is modified to a blind scheme. Bounding box of each character is identified. Pixels in the bounding box are randomly divided into 10 groups. This random grouping is based upon a seed key, which is shared only between the watermark encoder and the watermark decoder. For each group, a flippable pixel having the minimum CWDD value is identified. During embedding, this flippable pixel is flipped if necessary to make the group parity equal to the watermark bit. Figure 1 shows an example of a watermarked document. The 10-bit watermark of character S is embedded into the sixth character l, the watermark of the second character i is embedded into the seventh character P, and so on. The watermark image is subjectively indistinguishable from the original. te that since our implementation uses connected component segmentation, dots of i/j appear as separate characters which are then eliminated from further consideration based on their small area. Thus the watermarked (and subsequent) documents in our examples do not have these dots. It is of course possible to put back the dots in their original positions for aesthetic purpose. 2.4 Watermark Extraction The extraction process involves segmentation of characters, determining the bounding box, random grouping of pixels, and determining the parity of each group to obtain 10 bit watermark from each character image. 3. TAMPER DETECTION Tampering of text document by editing attack is classified by us into substitution of character(s) within a document, insertion of character(s), and deletion of character(s) from the document. te that substitution is relatively easy to counter since the sequence length is not altered. Substitution is considered a separate class and not deletion followed by insertion so that, locally, these three classes of editing attack will be mutually exclusive. The extracted watermark sequence is reverse shifted using c and its counter value (first 3 bits) is separated. Example 1: Let the original sequence be: Eat less and stay healthy (1) In absence of any tampering, the extracted and decrypted counter values will be consecutive: 0,1,2,3,4,5,6,7,0,1,2,3,4,5,6,7,0,1,2,3,4. If the tampering involves introducing new characters (substitution or insertion), the counter will have a random value highly unlikely to be consecutive. This is true even if the character is cut-and-pasted from another place of the watermarked document itself. A segment table is created from the counter sequence as follows. A segment is defined as a sequence of consecutive values, and is characterized by its start value start[i], end value end[i], and length l[i]. A segment i is labeled tampered if l[i] is less than a threshold, taken as 2 in this work. The segment table for the above example is i start end length tampered no since all 21 values are consecutive. 3.1 Detecting Deletion Example 2: Consider the tampered sequence from (1) to be Eat sand stay healthy where letters les have been deleted. The counter values are 0,1,2,6,7,0,1,2,3,4,5,6,7,0,1,2,3,4. The segment table is i start end length tampered no Figure 1. Watermark example: original (top), watermarked (middle), flipped pixel locations (bottom).

3 showing two non-tampered segments. Thus, deletion is detected when two adjacent segments i and i+1 are non-tampered, and the difference (start[i + 1] end[i]) mod 8 1 (since 3-bit counter is used) denotes the number of deleted characters. 3.2 Detecting Insertion Example 3: Consider another tampering of (1) as follows. Eat less and cant stay healthy Four characters cant (can t) have been inserted. The counter values are now 0,1,2,3,4,5,6,7,0,1,3,1,5,0,2,3,4,5,6,7,0,1,2,3,4, where the random values from the inserted characters are shown in bold. The resulting segment table is no yes yes yes yes no start[j] = (end[i] + s + 1) mod 8 where s = l[i + 1] + l[i + 2] + + l [j 1] is the number of substituted characters between them. Figure 2 shows the flowchart of the detection algorithm. While it is capable of detecting multiple occurrences of deletion, insertion, substitution, and a mixture of them, it is conceivable that some tampering patterns (such as when two consecutive tamper locations are separated by 0 or 1 character) will be detected but cannot be classified into these 3 classes. Such cases are shown as failure which indicates that even though we are able to detect these, we are unable to recover these segments. Start for all i, if l[i] < threshold Yes Mark i as tampered t tampered showing all inserted characters as tampered segments. Further, the start value after these tampered segments is consecutive to the end value before these segments. Thus, insertion is detected when two non-tampered segments i and j separated by tampered segment(s) satisfy start[j] = (end[i] + 1) mod 8. All in between characters are detected as extraneous. Choose 2 adjacent non-tampered segments: i and j j=i+1 Mark deletion of start [i+1] - end [i] - 1 characters between segments i and i Detecting Substitution Example 4: Lastly, consider a substitution of (1): Eat more and stay healthy Four characters less are substituted by four new characters more. The counter values are now 0,1,2,1,7,5,4,7,0,1,2,3,4,5,6,7,0,1,2,3,4, where the values from the substituted characters are shown in bold. The resulting segment table is yes yes yes yes no if (start[j]) = (end[i] + 1) mod 8 s=l[i+1] + l[i+2] + + l[j-1] if (start[j]) = (end[i] + s +1) mod 8 Detection only Yes Yes Mark all segments i+1, i+2,.., j-1 as substitution Mark all segments between i and j i.e. i+1, i+2,, j-1 as insertion showing all substituted characters as tampered segments. Further, the start value after these tampered segments is 4 more than the end value before these segments, where 4 characters have been substituted. Thus, substitution is detected when two non-tampered segments i and j separated by tampered segment(s) satisfy Repeat for the next 2 adjacent non-tampered segments l[j] and l[k] Figure 2. Flowchart of the tamper detection algorithm.

4 4. RECOVERY After extraction, the watermark recovery bits (7 bits) are retrieved, and similar to the counter array, a character array b is extracted from the watermarks. For a shift of c = 5, for example 1 the array b is: althyeatlessandstayhe 4.1 Recovering Insertion Recovery from insertions is performed first. All inserted characters are dropped. For example 3, the array b is althyeatleih 3ssandstayhe where the random watermark characters obtained from the inserted character images cant are highlighted in bold, and denotes a non- ASCII code. The segment table is updated by removing the inserted segments and concatenating the adjacent non-tampered segments. In the end, after all tampering has been treated, an inverse circular shift will produce the original character sequence (1). 4.2 Recovering Deletion Deletion is addressed next. A special character * is added to replace the deleted characters. Example 2 results in the following character array altatlessandstayhe which, after replacement of deletion, will become: alt***atlessandstayhe In the end, after inverse shift, the character array b will be: *atlessandstayhealt** The segment table is updated by introducing the deleted characters (fourth, fifth and sixth positions) and a label deletion with them. This changes the received text from Eat sand stay healthy to Eat ***sand stay healthy. The * characters in b above are then replaced by the corresponding letters from this updated received text to obtain Eatlessandstayhealthy which indeed is the original sequence (1). 4.3 Recovering Substitution After treating deletion, all substituted characters are replaced by a special character # and the corresponding segments in the segment table are labeled substitution. For example 4 we obtain altu oytlessandstayhe where the watermark characters obtained from the substituted letters more are highlighted in bold. After replacement it is which after inverse shift gives: alt####tlessandstayhe ##tlessandstayhealt## Similar to deletion case, `# is replaced from the updated received text to obtain the original sequence (1): Eatlessandstayhealthy Figure 3. Flowchart of the recovery algorithm. Figure 3 shows the complete flowchart of the recovery algorithm. This algorithm works for any number of tampering of any class, so long as two tampered locations have more than 1 character gap. te that the counter repeats after 8 characters, thus creating an ambiguity as to the length of tampered segments modulo 8. If longer tampering is expected, the maximum counter value should be increased. 4.4 Complete Examples Example 5: We now consider a case of multiple tampering of (1) including all classes: Eat sand to stay wealthy Three characters les are deleted at the early part, two characters to are inserted at the middle part, and a character h is substituted by another character w near the end of this text sequence. The counter values obtained are 0,1,2,6,7,0,1,4,0,2,3,4,5,3,7,0,1,2,3,4, where the values from the inserted and substituted characters are shown in bold. The resulting segment table is as follows.

5 no yes yes no yes no The detection algorithm starts by choosing first two non-tampered segments, 1 and 2. Since they are adjacent, a deletion of start[2] end[1] 1 = 3 characters is detected. Next, two non-tampered segments 2 and 5 are considered. Since they are not adjacent, it is not deletion. However, start[5] = end[2] + 1, so an insertion of segments 3 and 4 (eighth and ninth characters, to) is detected. Next pair of nontampered segments are 5 and 7. They are neither adjacent nor satisfy the insertion condition. However, start[7] = end[5] + s + 1, where s = l[6] = 1. Therefore, a substitution is detected at segment 6 (fourteenth character, w). The character array b obtained in this case is altatlebxssanpstayhe The recovery algorithm begins by removing the inserted segments 3 and 4, resulting in: altatlessanpstayhe The updated segment table after removing the inserted segments 3, 4 and merging segments 2,5 is no yes no and the updated received text is: Eat sand stay wealthy Since there is no more insertion, deletion of 3 characters between segments 1 and 2 is treated next. The result is: alt***atlessanpstayhe The segment table is updated by introducing the deleted characters, deletion no yes no Figure 4. Recovery example: watermarked (top), tampered (middle), recovered (bottom). and the updated received text is: Eat ***sand stay wealthy (2) Since there is no more deletion, substitution of updated segment 4 is replaced by # to obtain: alt***atlessan#stayhe Since this is the last step, there is no need to update the segment table, except appropriate segments may be labeled substitution. Since substitution does not change the length of a sequence, there is no need to update the received text either. Inverse shift of the b array gives the final result, *atlessan#stayhealt** where 3 characters of segment 2 are labeled deletion and 1 character of segment 4 is labeled substitution. A successful recovery is achieved by replacing these unknown characters from the updated received text (2): Eatlessandstayhealthy The code developed uses the same font library (known from FD based recognition), and generates a recovered document image that is almost identical to the original document except spaces. Figure 4 shows another example of the final result of recovery of a tampered document. Such results are easily extended to full-length documents. 5. CONCLUSION An application is developed using document watermark for detection and recovery of editing based tampering. Unlike its predecessors, the proposed scheme uses both recovery bits and authentication bits with position information in the watermark to successfully recover a sequence of characters (text) even against insertion or deletion. The tamper detection and recovery algorithms proposed here are applicable beyond text to any sequence recovery. The presented scheme is easily

6 extendible to larger character set, larger font set, and longer tampering. With appropriate character recognition, it is extendible to handwritten documents as well. Our future effort is towards dealing with editing attacks that the present scheme is unable to recover, such as two consecutive tampering or word/phrase cut-and-pasting. It should be mentioned that the proposed recovery strategy fails for certain tamper patterns, or when too many characters are tampered. Obviously, if both character i and character i+c are tampered, then character i can not be recovered. These issues are discussed and the probability of such restoration failure (both theoretical and simulated) for random substitution attack is presented in [13]. 6. REFERENCES [1] Cabrelli, C.A. and Molter, U.M Automatic representation of binary images. IEEE Trans. PAMI, 12(12) (Dec. 1990). [2] Cheddad, A., Condell, J., Curran, K., and McKevitt, P A secure and improved self-embedding algorithm to combat digital document forgery. Signal Proc., 89, [3] Ho, A.T.S., Puhan, N.B., Makur, A., Marziliano, P., and Guan, Y.L Imperceptible data embedding in sharply-contrasted binary images. Proc. Intl. Conf. ICARCV, 2, [4] Ho, A.T.S., Puhan, N.B., Marziliano, P., Makur, A., and Guan, Y.L Perception based binary image watermarking. Proc. IEEE Intl. Symp. Circuits Systems, 2, [5] Khen, T.V. and Makur, A A word based self-embedding scheme for document watermark. Proc. IEEE Region 10 Intl Conf (TENCON). [6] Kostopoulos, I., Gilani, S.A.M., and Skodras, A.N Colour image authentication based on a self-embedding technique. Proc. Intl. Conf. DSP, 2, [7] Lan, T.-H. and Tewfik, A.H Fraud detection and self embedding. Proc. ACM Multimedia, part 2, [8] Low, S.H. and Maxemchuck, N.F Performance comparison of two text marking methods. IEEE Jour. Selected Area Comm, 16(4). [9] Low, S.H., Maxemchuck, N.F., Brassil, J.T., and O Gorman, L Document marking and identification using both line and word shifting. Proc. Conf. Infocom, IEEE Comp. Soc. Press. [10] Low, S.H., Maxemchuck, N.F., and Lapone, A.M Document identification for copyright protection using centroid detection. IEEE Trans. Comm., 46(3), [11] Luo, H., Chu, S.-C., and Lu, Z.-M Self embedding watermarking using halftoning technique. Circuits Syst. Signal Process., 27, [12] Luo, H., Lu, Z.-M., Chu, S.-C., and Pan, J.-S Self embedding watermarking scheme using halftone image. IEICE Trans. Inf. & Syst., E91-D(1), [13] Makur, A Self-embedding and restoration algorithms for document watermark. Proc. ICASSP, 2, [14] Man, G.M.T. and Poon, J.C.H An enhanced approach to character recognition by Fourier descriptor. Proc. Conf. ICCS/ISITA, Singapore. [15] Mei, Q.G., Wong, E.K., and Memon, N.D Data hiding in binary text documents. Proc. SPIE Conf. Security Watermarking Multimedia Contents III, 4314, [16] Wu, M., Tang, E., and Liu, B Data hiding in digital binary image. Proc. IEEE Intl. Conf. Multimedia Expo.

Data Hiding in Binary Text Documents 1. Q. Mei, E. K. Wong, and N. Memon

Data Hiding in Binary Text Documents 1. Q. Mei, E. K. Wong, and N. Memon Data Hiding in Binary Text Documents 1 Q. Mei, E. K. Wong, and N. Memon Department of Computer and Information Science Polytechnic University 5 Metrotech Center, Brooklyn, NY 11201 ABSTRACT With the proliferation

More information

Image Authentication and Recovery Scheme Based on Watermarking Technique

Image Authentication and Recovery Scheme Based on Watermarking Technique Image Authentication and Recovery Scheme Based on Watermarking Technique KENJI SUMITOMO 1, MARIKO NAKANO 2, HECTOR PEREZ 2 1 Faculty of Information and Computer Engineering The University of Electro-Communications

More information

DIGITAL IMAGE WATERMARKING BASED ON A RELATION BETWEEN SPATIAL AND FREQUENCY DOMAINS

DIGITAL IMAGE WATERMARKING BASED ON A RELATION BETWEEN SPATIAL AND FREQUENCY DOMAINS DIGITAL IMAGE WATERMARKING BASED ON A RELATION BETWEEN SPATIAL AND FREQUENCY DOMAINS Murat Furat Mustafa Oral e-mail: mfurat@cu.edu.tr e-mail: moral@mku.edu.tr Cukurova University, Faculty of Engineering,

More information

AN EFFICIENT VIDEO WATERMARKING USING COLOR HISTOGRAM ANALYSIS AND BITPLANE IMAGE ARRAYS

AN EFFICIENT VIDEO WATERMARKING USING COLOR HISTOGRAM ANALYSIS AND BITPLANE IMAGE ARRAYS AN EFFICIENT VIDEO WATERMARKING USING COLOR HISTOGRAM ANALYSIS AND BITPLANE IMAGE ARRAYS G Prakash 1,TVS Gowtham Prasad 2, T.Ravi Kumar Naidu 3 1MTech(DECS) student, Department of ECE, sree vidyanikethan

More information

DIGITAL WATERMARKING FOR GRAY-LEVEL WATERMARKS

DIGITAL WATERMARKING FOR GRAY-LEVEL WATERMARKS DICTA22: Digital Image Computing Techniques and Applications, 2 22 January 22, Melbourne, Australia. DIGITAL WATERMARKING FOR GRAY-LEVEL WATERMARKS *Yuk Ying CHUNG, Man To WONG *Basser Department of Computer

More information

High Capacity Reversible Watermarking Scheme for 2D Vector Maps

High Capacity Reversible Watermarking Scheme for 2D Vector Maps Scheme for 2D Vector Maps 1 Information Management Department, China National Petroleum Corporation, Beijing, 100007, China E-mail: jxw@petrochina.com.cn Mei Feng Research Institute of Petroleum Exploration

More information

A Flexible Scheme of Self Recovery for Digital Image Protection

A Flexible Scheme of Self Recovery for Digital Image Protection www.ijcsi.org 460 A Flexible Scheme of Self Recoery for Digital Image Protection Zhenxing Qian, Lili Zhao 2 School of Communication and Information Engineering, Shanghai Uniersity, Shanghai 200072, China

More information

Error-free Authentication Watermarking Based on Prediction-Error-Expansion Reversible Technique

Error-free Authentication Watermarking Based on Prediction-Error-Expansion Reversible Technique ISSC 2013, LYIT Letterkenny, June 20 21 Error-free Authentication Watermarking Based on Prediction-Error-Expansion Reversible Technique Rongrong Ni,H.D.Cheng, Yao Zhao andyuhou Institute of Information

More information

Filtering. -If we denote the original image as f(x,y), then the noisy image can be denoted as f(x,y)+n(x,y) where n(x,y) is a cosine function.

Filtering. -If we denote the original image as f(x,y), then the noisy image can be denoted as f(x,y)+n(x,y) where n(x,y) is a cosine function. Filtering -The image shown below has been generated by adding some noise in the form of a cosine function. -If we denote the original image as f(x,y), then the noisy image can be denoted as f(x,y)+n(x,y)

More information

Multipurpose Color Image Watermarking Algorithm Based on IWT and Halftoning

Multipurpose Color Image Watermarking Algorithm Based on IWT and Halftoning Multipurpose Color Image Watermarking Algorithm Based on IWT and Halftoning C. SANTIAGO-AVILA, M. GONZALEZ LEE, M. NAKANO-MIYATAKE, H. PEREZ-MEANA Sección de Posgrado e Investigación, Esime Culhuacan Instituto

More information

EAG: Edge Adaptive Grid Data Hiding for Binary Image Authentication

EAG: Edge Adaptive Grid Data Hiding for Binary Image Authentication EAG: Edge Adaptive Grid Data Hiding for Binary Image Authentication Hong Cao and Alex C. Kot * Institute for Infocomm Research, A*STAR, Singapore E-mail: hcao@i2r.a-star.edu.sg Tel: +65-64082157 * Nanyang

More information

A BTC-COMPRESSED DOMAIN INFORMATION HIDING METHOD BASED ON HISTOGRAM MODIFICATION AND VISUAL CRYPTOGRAPHY. Hang-Yu Fan and Zhe-Ming Lu

A BTC-COMPRESSED DOMAIN INFORMATION HIDING METHOD BASED ON HISTOGRAM MODIFICATION AND VISUAL CRYPTOGRAPHY. Hang-Yu Fan and Zhe-Ming Lu International Journal of Innovative Computing, Information and Control ICIC International c 2016 ISSN 1349-4198 Volume 12, Number 2, April 2016 pp. 395 405 A BTC-COMPRESSED DOMAIN INFORMATION HIDING METHOD

More information

Data Hiding in Video

Data Hiding in Video Data Hiding in Video J. J. Chae and B. S. Manjunath Department of Electrical and Computer Engineering University of California, Santa Barbara, CA 9316-956 Email: chaejj, manj@iplab.ece.ucsb.edu Abstract

More information

Robust Lossless Data Hiding. Outline

Robust Lossless Data Hiding. Outline Robust Lossless Data Hiding Yun Q. Shi, Zhicheng Ni, Nirwan Ansari Electrical and Computer Engineering New Jersey Institute of Technology October 2010 1 Outline What is lossless data hiding Existing robust

More information

A Robust Image Watermarking Scheme using Image Moment Normalization

A Robust Image Watermarking Scheme using Image Moment Normalization A Robust Image ing Scheme using Image Moment Normalization Latha Parameswaran, and K. Anbumani Abstract Multimedia security is an incredibly significant area of concern. A number of papers on robust digital

More information

Keyword Spotting in Document Images through Word Shape Coding

Keyword Spotting in Document Images through Word Shape Coding 2009 10th International Conference on Document Analysis and Recognition Keyword Spotting in Document Images through Word Shape Coding Shuyong Bai, Linlin Li and Chew Lim Tan School of Computing, National

More information

Image Error Concealment Based on Watermarking

Image Error Concealment Based on Watermarking Image Error Concealment Based on Watermarking Shinfeng D. Lin, Shih-Chieh Shie and Jie-Wei Chen Department of Computer Science and Information Engineering,National Dong Hwa Universuty, Hualien, Taiwan,

More information

Introduction to Visible Watermarking. IPR Course: TA Lecture 2002/12/18 NTU CSIE R105

Introduction to Visible Watermarking. IPR Course: TA Lecture 2002/12/18 NTU CSIE R105 Introduction to Visible Watermarking IPR Course: TA Lecture 2002/12/18 NTU CSIE R105 Outline Introduction State-of of-the-art Characteristics of Visible Watermarking Schemes Attacking Visible Watermarking

More information

TEVI: Text Extraction for Video Indexing

TEVI: Text Extraction for Video Indexing TEVI: Text Extraction for Video Indexing Hichem KARRAY, Mohamed SALAH, Adel M. ALIMI REGIM: Research Group on Intelligent Machines, EIS, University of Sfax, Tunisia hichem.karray@ieee.org mohamed_salah@laposte.net

More information

A NOVEL SECURED BOOLEAN BASED SECRET IMAGE SHARING SCHEME

A NOVEL SECURED BOOLEAN BASED SECRET IMAGE SHARING SCHEME VOL 13, NO 13, JULY 2018 ISSN 1819-6608 2006-2018 Asian Research Publishing Network (ARPN) All rights reserved wwwarpnjournalscom A NOVEL SECURED BOOLEAN BASED SECRET IMAGE SHARING SCHEME Javvaji V K Ratnam

More information

SELF-AUTHENTICATION OF NATURAL COLOR IMAGES IN PASCAL TRANSFORM DOMAIN. E. E. Varsaki, V. Fotopoulos and A. N. Skodras

SELF-AUTHENTICATION OF NATURAL COLOR IMAGES IN PASCAL TRANSFORM DOMAIN. E. E. Varsaki, V. Fotopoulos and A. N. Skodras SELF-AUTHENTICATION OF NATURAL COLOR IMAGES IN PASCAL TRANSFORM DOMAIN E. E. Varsaki, V. Fotopoulos and A. N. Skodras Digital Systems & Media Computing Laboratory School of Science and Technology, Hellenic

More information

A reversible data hiding based on adaptive prediction technique and histogram shifting

A reversible data hiding based on adaptive prediction technique and histogram shifting A reversible data hiding based on adaptive prediction technique and histogram shifting Rui Liu, Rongrong Ni, Yao Zhao Institute of Information Science Beijing Jiaotong University E-mail: rrni@bjtu.edu.cn

More information

Digital Watermarking on Micro Image using Reversible Optical Reproduction

Digital Watermarking on Micro Image using Reversible Optical Reproduction Digital Watermarking on Micro Image using Reversible Optical Reproduction Shraddha Raut, Antra Bhattacharya & S. P. Khandait G.H.R.I.E.T.W, G.H.R.I.E.T.W, K.D.K.C.E E-mail : rautshraddha@yahoo.in, antarab@rediffmail.com,

More information

Information and Communications Security: Encryption and Information Hiding

Information and Communications Security: Encryption and Information Hiding Short Course on Information and Communications Security: Encryption and Information Hiding Tuesday, 10 March Friday, 13 March, 2015 Lecture 10: Information Hiding Contents Covert Encryption Principles

More information

An Efficient Self-Embedding Watermarking Scheme for Colour Image Tamper Detection and Recovery

An Efficient Self-Embedding Watermarking Scheme for Colour Image Tamper Detection and Recovery Available Online at www.ijcsmc.com International Journal of Computer Science and Mobile Computing A Monthly Journal of Computer Science and Information Technology IJCSMC, Vol. 4, Issue. 1, January 2015,

More information

SPREAD SPECTRUM AUDIO WATERMARKING SCHEME BASED ON PSYCHOACOUSTIC MODEL

SPREAD SPECTRUM AUDIO WATERMARKING SCHEME BASED ON PSYCHOACOUSTIC MODEL SPREAD SPECTRUM WATERMARKING SCHEME BASED ON PSYCHOACOUSTIC MODEL 1 Yüksel Tokur 2 Ergun Erçelebi e-mail: tokur@gantep.edu.tr e-mail: ercelebi@gantep.edu.tr 1 Gaziantep University, MYO, 27310, Gaziantep,

More information

Chaotic-Correlation Based Watermarking Scheme for Still Images

Chaotic-Correlation Based Watermarking Scheme for Still Images Chaotic-Correlation Based Watermarking Scheme for Still Images E. Chrysochos 1, V. Fotopoulos 1, M. Xenos 1, M. Stork 2, A. N. Skodras 1, J. Hrusak 2 1 Digital Systems & Media Computing Laboratory, School

More information

Robust Image Watermarking based on DCT-DWT- SVD Method

Robust Image Watermarking based on DCT-DWT- SVD Method Robust Image Watermarking based on DCT-DWT- SVD Sneha Jose Rajesh Cherian Roy, PhD. Sreenesh Shashidharan ABSTRACT Hybrid Image watermarking scheme proposed based on Discrete Cosine Transform (DCT)-Discrete

More information

arxiv: v1 [cs.cr] 31 Dec 2018

arxiv: v1 [cs.cr] 31 Dec 2018 Security analysis of a self-embedding fragile image watermark scheme Xinhui Gong, Feng Yu, Xiaohong Zhao, Shihong Wang School of Science, Beijing University of Posts and Telecommunications, Beijing 100876,

More information

Part II Authentication Techniques

Part II Authentication Techniques Part II Authentication Techniques Authentication Codes Provides means for ensuring integrity of message Independent of secrecy - in fact sometimes secrecy may be undesirable! Techniques for Authentication

More information

Practical Image and Video Processing Using MATLAB

Practical Image and Video Processing Using MATLAB Practical Image and Video Processing Using MATLAB Chapter 18 Feature extraction and representation What will we learn? What is feature extraction and why is it a critical step in most computer vision and

More information

AN IMPROVISED LOSSLESS DATA-HIDING MECHANISM FOR IMAGE AUTHENTICATION BASED HISTOGRAM MODIFICATION

AN IMPROVISED LOSSLESS DATA-HIDING MECHANISM FOR IMAGE AUTHENTICATION BASED HISTOGRAM MODIFICATION AN IMPROVISED LOSSLESS DATA-HIDING MECHANISM FOR IMAGE AUTHENTICATION BASED HISTOGRAM MODIFICATION Shaik Shaheena 1, B. L. Sirisha 2 VR Siddhartha Engineering College, Vijayawada, Krishna, Andhra Pradesh(520007),

More information

Robust Image Watermarking based on Discrete Wavelet Transform, Discrete Cosine Transform & Singular Value Decomposition

Robust Image Watermarking based on Discrete Wavelet Transform, Discrete Cosine Transform & Singular Value Decomposition Advance in Electronic and Electric Engineering. ISSN 2231-1297, Volume 3, Number 8 (2013), pp. 971-976 Research India Publications http://www.ripublication.com/aeee.htm Robust Image Watermarking based

More information

Moment-preserving Based Watermarking for Color Image Authentication and Recovery

Moment-preserving Based Watermarking for Color Image Authentication and Recovery 2012 IACSIT Hong Kong Conferences IPCSIT vol. 30 (2012) (2012) IACSIT Press, Singapore Moment-preserving Based Watermarking for Color Image Authentication and Recovery Kuo-Cheng Liu + Information Educating

More information

CONTENT ADAPTIVE SCREEN IMAGE SCALING

CONTENT ADAPTIVE SCREEN IMAGE SCALING CONTENT ADAPTIVE SCREEN IMAGE SCALING Yao Zhai (*), Qifei Wang, Yan Lu, Shipeng Li University of Science and Technology of China, Hefei, Anhui, 37, China Microsoft Research, Beijing, 8, China ABSTRACT

More information

A New Approach to Authenticate Images in Different Datasets Using a Lossless Image Watermarking Technique

A New Approach to Authenticate Images in Different Datasets Using a Lossless Image Watermarking Technique A New Approach to Authenticate Images in Different Datasets Using a Lossless Image Watermarking Technique 1 Arathi Chitla, 2 Dr. M. Chandra Mohan 1 Associate Professor, Department of Computer Science &

More information

Reversible Image Data Hiding with Local Adaptive Contrast Enhancement

Reversible Image Data Hiding with Local Adaptive Contrast Enhancement Reversible Image Data Hiding with Local Adaptive Contrast Enhancement Ruiqi Jiang, Weiming Zhang, Jiajia Xu, Nenghai Yu and Xiaocheng Hu Abstract Recently, a novel reversible data hiding scheme is proposed

More information

Content Based Image Retrieval Using Color Quantizes, EDBTC and LBP Features

Content Based Image Retrieval Using Color Quantizes, EDBTC and LBP Features Content Based Image Retrieval Using Color Quantizes, EDBTC and LBP Features 1 Kum Sharanamma, 2 Krishnapriya Sharma 1,2 SIR MVIT Abstract- To describe the image features the Local binary pattern (LBP)

More information

Reversible Blind Watermarking for Medical Images Based on Wavelet Histogram Shifting

Reversible Blind Watermarking for Medical Images Based on Wavelet Histogram Shifting Reversible Blind Watermarking for Medical Images Based on Wavelet Histogram Shifting Hêmin Golpîra 1, Habibollah Danyali 1, 2 1- Department of Electrical Engineering, University of Kurdistan, Sanandaj,

More information

Reversible Data Hiding VIA Optimal Code for Image

Reversible Data Hiding VIA Optimal Code for Image Vol. 3, Issue. 3, May - June 2013 pp-1661-1665 ISSN: 2249-6645 Reversible Data Hiding VIA Optimal Code for Image Senthil Rani D. #, Gnana Kumari R. * # PG-Scholar, M.E-CSE, Coimbatore Institute of Engineering

More information

I. INTRODUCTION. Figure-1 Basic block of text analysis

I. INTRODUCTION. Figure-1 Basic block of text analysis ISSN: 2349-7637 (Online) (RHIMRJ) Research Paper Available online at: www.rhimrj.com Detection and Localization of Texts from Natural Scene Images: A Hybrid Approach Priyanka Muchhadiya Post Graduate Fellow,

More information

OTP-Steg. One-Time Pad Image Steganography Using OTP-Steg V.1.0 Software October 2015 Dr. Michael J. Pelosi

OTP-Steg. One-Time Pad Image Steganography Using OTP-Steg V.1.0 Software October 2015 Dr. Michael J. Pelosi OTP-Steg One-Time Pad Image Steganography Using OTP-Steg V.1.0 Software October 2015 Dr. Michael J. Pelosi What is Steganography? Steganography literally means covered writing Encompasses methods of transmitting

More information

II. RELATIVE WORK The earlier watermarking techniques were proposed for data hiding applications only [2, 7]. Then, the authentication capability beca

II. RELATIVE WORK The earlier watermarking techniques were proposed for data hiding applications only [2, 7]. Then, the authentication capability beca ROI based Tamper Detection and Recovery for Medical Images Using Reversible Watermarking Technique Osamah M. Al-Qershi, Bee Ee Khoo School of Electrical and Electronic Engineering Universiti Sains Malaysia

More information

Genetic algorithm for optimal imperceptibility in image communication through noisy channel

Genetic algorithm for optimal imperceptibility in image communication through noisy channel Genetic algorithm for optimal imperceptibility in image communication through noisy channel SantiP.Maity 1, Malay K. Kundu 2 andprasantak.nandi 3 1 Bengal Engineering College (DU), P.O.-Botanic Garden,

More information

A Robust Visual Identifier Using the Trace Transform

A Robust Visual Identifier Using the Trace Transform A Robust Visual Identifier Using the Trace Transform P. Brasnett*, M.Z. Bober* *Mitsubishi Electric ITE VIL, Guildford, UK. paul.brasnett@vil.ite.mee.com, miroslaw.bober@vil.ite.mee.com Keywords: image

More information

CHAPTER 4 REVERSIBLE IMAGE WATERMARKING USING BIT PLANE CODING AND LIFTING WAVELET TRANSFORM

CHAPTER 4 REVERSIBLE IMAGE WATERMARKING USING BIT PLANE CODING AND LIFTING WAVELET TRANSFORM 74 CHAPTER 4 REVERSIBLE IMAGE WATERMARKING USING BIT PLANE CODING AND LIFTING WAVELET TRANSFORM Many data embedding methods use procedures that in which the original image is distorted by quite a small

More information

A Robust Watermarking Algorithm For JPEG Images

A Robust Watermarking Algorithm For JPEG Images nd Joint International Information Technology, Mechanical and Electronic Engineering Conference (JIMEC 7) A Robust Watermarking Algorithm For JPEG Images Baosheng Sun, Daofu Gong*, Fenlin Liu *Foundation

More information

Authentication and Secret Message Transmission Technique Using Discrete Fourier Transformation

Authentication and Secret Message Transmission Technique Using Discrete Fourier Transformation , 2009, 5, 363-370 doi:10.4236/ijcns.2009.25040 Published Online August 2009 (http://www.scirp.org/journal/ijcns/). Authentication and Secret Message Transmission Technique Using Discrete Fourier Transformation

More information

A Novel Statistical Distortion Model Based on Mixed Laplacian and Uniform Distribution of Mpeg-4 FGS

A Novel Statistical Distortion Model Based on Mixed Laplacian and Uniform Distribution of Mpeg-4 FGS A Novel Statistical Distortion Model Based on Mixed Laplacian and Uniform Distribution of Mpeg-4 FGS Xie Li and Wenjun Zhang Institute of Image Communication and Information Processing, Shanghai Jiaotong

More information

A Novel Secure Digital Watermark Generation from Public Share by Using Visual Cryptography and MAC Techniques

A Novel Secure Digital Watermark Generation from Public Share by Using Visual Cryptography and MAC Techniques Bashar S. Mahdi Alia K. Abdul Hassan Department of Computer Science, University of Technology, Baghdad, Iraq A Novel Secure Digital Watermark Generation from Public Share by Using Visual Cryptography and

More information

Digital Image Processing

Digital Image Processing Digital Image Processing Part 9: Representation and Description AASS Learning Systems Lab, Dep. Teknik Room T1209 (Fr, 11-12 o'clock) achim.lilienthal@oru.se Course Book Chapter 11 2011-05-17 Contents

More information

QR Code Watermarking Algorithm based on Wavelet Transform

QR Code Watermarking Algorithm based on Wavelet Transform 2013 13th International Symposium on Communications and Information Technologies (ISCIT) QR Code Watermarking Algorithm based on Wavelet Transform Jantana Panyavaraporn 1, Paramate Horkaew 2, Wannaree

More information

CHAPTER-4 WATERMARKING OF GRAY IMAGES

CHAPTER-4 WATERMARKING OF GRAY IMAGES CHAPTER-4 WATERMARKING OF GRAY IMAGES 4.1 INTRODUCTION Like most DCT based watermarking schemes, Middle-Band Coefficient Exchange scheme has proven its robustness against those attacks, which anyhow, do

More information

Watermarking Moble Phone Color Images With Error Correction Codes

Watermarking Moble Phone Color Images With Error Correction Codes IOSR Journal of Electronics & Communication Engineering (IOSR-JECE) ISSN(e) : 2278-1684 ISSN(p) : 2320-334X, PP 05-09 www.iosrjournals.org Watermarking Moble Phone Color Images With Error Correction Codes

More information

CHAPTER TWO. Data Representation ( M.MORRIS MANO COMPUTER SYSTEM ARCHITECTURE THIRD EDITION ) IN THIS CHAPTER

CHAPTER TWO. Data Representation ( M.MORRIS MANO COMPUTER SYSTEM ARCHITECTURE THIRD EDITION ) IN THIS CHAPTER 1 CHAPTER TWO Data Representation ( M.MORRIS MANO COMPUTER SYSTEM ARCHITECTURE THIRD EDITION ) IN THIS CHAPTER 2-1 Data Types 2-2 Complements 2-3 Fixed-Point Representation 2-4 Floating-Point Representation

More information

Open Access Side-Informed Image Watermarking Scheme Based on Dither Modulation in the Frequency Domain

Open Access Side-Informed Image Watermarking Scheme Based on Dither Modulation in the Frequency Domain Send Orders for Reprints to reprints@benthamscience.net The Open Signal Processing Journal, 2013, 5, 1-6 1 Open Access Side-Informed Image ing Scheme Based on Dither Modulation in the Frequency Domain

More information

A Detailed look of Audio Steganography Techniques using LSB and Genetic Algorithm Approach

A Detailed look of Audio Steganography Techniques using LSB and Genetic Algorithm Approach www.ijcsi.org 402 A Detailed look of Audio Steganography Techniques using LSB and Genetic Algorithm Approach Gunjan Nehru 1, Puja Dhar 2 1 Department of Information Technology, IEC-Group of Institutions

More information

IMPROVED RHOMBUS INTERPOLATION FOR REVERSIBLE WATERMARKING BY DIFFERENCE EXPANSION. Catalin Dragoi, Dinu Coltuc

IMPROVED RHOMBUS INTERPOLATION FOR REVERSIBLE WATERMARKING BY DIFFERENCE EXPANSION. Catalin Dragoi, Dinu Coltuc 0th European Signal Processing Conference (EUSIPCO 01) Bucharest, Romania, August 7-31, 01 IMPROVED RHOMBUS INTERPOLATION FOR REVERSIBLE WATERMARKING BY DIFFERENCE EXPANSION Catalin Dragoi, Dinu Coltuc

More information

Bit-Plane Decomposition Steganography Using Wavelet Compressed Video

Bit-Plane Decomposition Steganography Using Wavelet Compressed Video Bit-Plane Decomposition Steganography Using Wavelet Compressed Video Tomonori Furuta, Hideki Noda, Michiharu Niimi, Eiji Kawaguchi Kyushu Institute of Technology, Dept. of Electrical, Electronic and Computer

More information

Data Hiding on Text Using Big-5 Code

Data Hiding on Text Using Big-5 Code Data Hiding on Text Using Big-5 Code Jun-Chou Chuang 1 and Yu-Chen Hu 2 1 Department of Computer Science and Communication Engineering Providence University 200 Chung-Chi Rd., Shalu, Taichung 43301, Republic

More information

A CRYPTOGRAPHICALLY SECURE IMAGE WATERMARKING SCHEME

A CRYPTOGRAPHICALLY SECURE IMAGE WATERMARKING SCHEME A CRYPTOGRAPHICALLY SECURE IMAGE WATERMARKING SCHEME Jian Ren Tongtong Li Department of Electrical and Computer Engineering Michigan State University East Lansing, MI 48824-1226 Email: {renjian,tongli}@egr.msu.edu

More information

Vision. OCR and OCV Application Guide OCR and OCV Application Guide 1/14

Vision. OCR and OCV Application Guide OCR and OCV Application Guide 1/14 Vision OCR and OCV Application Guide 1.00 OCR and OCV Application Guide 1/14 General considerations on OCR Encoded information into text and codes can be automatically extracted through a 2D imager device.

More information

Affine-invariant shape matching and recognition under partial occlusion

Affine-invariant shape matching and recognition under partial occlusion Title Affine-invariant shape matching and recognition under partial occlusion Author(s) Mai, F; Chang, CQ; Hung, YS Citation The 17th IEEE International Conference on Image Processing (ICIP 2010), Hong

More information

International Journal of Modern Trends in Engineering and Research e-issn No.: , Date: April, 2016

International Journal of Modern Trends in Engineering and Research  e-issn No.: , Date: April, 2016 International Journal of Modern Trends in Engineering and Research www.ijmter.com e-issn No.:2349-9745, Date: 28-30 April, 2016 Watermarking Technology for Relational Database Priyanka R. Gadiya 1,Prashant

More information

Block Mean Value Based Image Perceptual Hashing for Content Identification

Block Mean Value Based Image Perceptual Hashing for Content Identification Block Mean Value Based Image Perceptual Hashing for Content Identification Abstract. Image perceptual hashing has been proposed to identify or authenticate image contents in a robust way against distortions

More information

Extracting Characters From Books Based On The OCR Technology

Extracting Characters From Books Based On The OCR Technology 2016 International Conference on Engineering and Advanced Technology (ICEAT-16) Extracting Characters From Books Based On The OCR Technology Mingkai Zhang1, a, Xiaoyi Bao1, b,xin Wang1, c, Jifeng Ding1,

More information

CHAPTER-5 WATERMARKING OF COLOR IMAGES

CHAPTER-5 WATERMARKING OF COLOR IMAGES CHAPTER-5 WATERMARKING OF COLOR IMAGES 5.1 INTRODUCTION After satisfactorily developing the watermarking schemes for gray level images, we focused on developing the watermarking schemes for the color images.

More information

Multilayer Data Embedding Using Reduced Difference Expansion

Multilayer Data Embedding Using Reduced Difference Expansion Multilayer Data Embedding Using Reduced Difference Expansion DINESH SATRE 1, DEVYANI BONDE 2, SUBHASH RATHOD 3 Department Of Computer Engineering Marathwada Mitra Mandal s Institute of Technology Savitribai

More information

Fingerprint Watermark Embedding by Discrete Cosine Transform for Copyright Ownership Authentication

Fingerprint Watermark Embedding by Discrete Cosine Transform for Copyright Ownership Authentication Fingerprint Watermark Embedding by Discrete Cosine Transform for Copyright Ownership Authentication Chi-Man Pun and Ioi-Tun Lam Abstract In respect to the issues on protecting intellectual property, particular

More information

This document is downloaded from DR-NTU, Nanyang Technological University Library, Singapore.

This document is downloaded from DR-NTU, Nanyang Technological University Library, Singapore. This document is downloaded from DR-NTU, Nanyang Technological University Library, Singapore. Title A robust phase watermarking algorithm using conugate symmetric sequency-ordered complex Hadamard transform

More information

An Efficient Active Content Reconstruction Based on Adaptive Pixel Permutation

An Efficient Active Content Reconstruction Based on Adaptive Pixel Permutation RESEARCH ARTICLE OPEN ACCESS An Efficient Active Content Reconstruction Based on Adaptive Pixel Permutation K.K.Amutha, N.A.Vidya Mol 2 1 Amutha.K.K Author is currently pursuing M.E ( Computer Science

More information

arxiv: v1 [cs.mm] 16 Mar 2017

arxiv: v1 [cs.mm] 16 Mar 2017 Medical Image Watermarking using 2D-DWT with Enhanced security and capacity Ali Sharifara, and Amir Ghaderi arxiv:1703.05778v1 [cs.mm] 16 Mar 2017 ABSTRACT Teleradiology enables medical images to be transferred

More information

VIDEO WATERMARKING ALGORITHM FOR CONTENT AUTHORISATION

VIDEO WATERMARKING ALGORITHM FOR CONTENT AUTHORISATION Volume, Issue 3, March 2015 VIDEO WATERMARKING ALGORITHM FOR CONTENT AUTHORISATION V.Rajendhiran J.Elavanthan M.Vengadapathiraj R.Vinothkumar Dr.M.Saravanan Abstract:-In this paper proposed a novel video

More information

LSB Based Audio Steganography Using Pattern Matching

LSB Based Audio Steganography Using Pattern Matching ISSN: 359-0040 Vol 2 Issue, November - 205 LSB Based Audio Steganography Using Pattern Matching Mr Ratul Choudhury Student, Dept of Computer Sc & Engg Dept University of Calcutta Kolkata, India ratulchowdhury@iemcalcom

More information

Combined Hashing/Watermarking Method for Image Authentication

Combined Hashing/Watermarking Method for Image Authentication Combined Hashing/Watermarking Method for Image Authentication Vlado Kitanovski, Dimitar Taskovski, and Sofija Bogdanova Abstract In this paper we present a combined hashing/watermarking method for image

More information

Towards a Telltale Watermarking Technique for Tamper-Proofing

Towards a Telltale Watermarking Technique for Tamper-Proofing Towards a Telltale Watermarking Technique for Tamper-Proofing Deepa Kundur and Dimitrios Hatzinakos 10 King s College Road Department of Electrical and Computer Engineering University of Toronto Toronto,

More information

CHAPTER 6 EFFICIENT TECHNIQUE TOWARDS THE AVOIDANCE OF REPLAY ATTACK USING LOW DISTORTION TRANSFORM

CHAPTER 6 EFFICIENT TECHNIQUE TOWARDS THE AVOIDANCE OF REPLAY ATTACK USING LOW DISTORTION TRANSFORM 109 CHAPTER 6 EFFICIENT TECHNIQUE TOWARDS THE AVOIDANCE OF REPLAY ATTACK USING LOW DISTORTION TRANSFORM Security is considered to be the most critical factor in many applications. The main issues of such

More information

A Combined Encryption Compression Scheme Using Chaotic Maps

A Combined Encryption Compression Scheme Using Chaotic Maps BULGARIAN ACADEMY OF SCIENCES CYBERNETICS AND INFORMATION TECHNOLOGIES Volume 13, No 2 Sofia 2013 Print ISSN: 1311-9702; Online ISSN: 1314-4081 DOI: 10.2478/cait-2013-0016 A Combined Encryption Compression

More information

A SEMI-FRAGILE WATERMARKING SCHEME FOR IMAGE TAMPER LOCALIZATION AND RECOVERY

A SEMI-FRAGILE WATERMARKING SCHEME FOR IMAGE TAMPER LOCALIZATION AND RECOVERY Journal of Theoretical Applied nformation Technology 31 August 2012 Vol 42 No2 2005-2012 JATT & LLS All rights reserved SSN: 1992-8645 wwwjatitorg E-SSN: 1817-3195 A SEM-FRAGLE WATERMARNG SCHEME FOR MAGE

More information

Navjot Singh *1, Deepak Sharma 2 ABSTRACT I. INTRODUCTION

Navjot Singh *1, Deepak Sharma 2 ABSTRACT I. INTRODUCTION 2017 IJSRSET Volume 3 Issue 1 Print ISSN: 2395-1990 Online ISSN : 2394-4099 Themed Section: Engineering and Technology An Efficient Multiple Data Hiding Technique for Medical Images Using QR Code Authentication

More information

A Robust Video Hash Scheme Based on. 2D-DCT Temporal Maximum Occurrence

A Robust Video Hash Scheme Based on. 2D-DCT Temporal Maximum Occurrence A Robust Video Hash Scheme Based on 1 2D-DCT Temporal Maximum Occurrence Qian Chen, Jun Tian, and Dapeng Wu Abstract In this paper, we propose a video hash scheme that utilizes image hash and spatio-temporal

More information

ROBUST WATERMARKING OF DIGITAL IMAGES BASED ON CHAOTIC MAPPING AND DCT

ROBUST WATERMARKING OF DIGITAL IMAGES BASED ON CHAOTIC MAPPING AND DCT ROBUST WATERMARKING OF DIGITAL IMAGES BASED ON CHAOTIC MAPPING AND DCT E. Chrysochos, V. Fotopoulos, and A. N. Skodras Digital Systems & Media Computing Laboratory, School of Science and Technology, Hellenic

More information

Improved Reversible Data Hiding in Encrypted Images Based on Reserving Room After Encryption and Pixel Prediction

Improved Reversible Data Hiding in Encrypted Images Based on Reserving Room After Encryption and Pixel Prediction Improved Reversible Data Hiding in Encrypted Images Based on Reserving Room After Encryption and Pixel Prediction Ioan Catalin Dragoi, Henri-George Coanda and Dinu Coltuc Electrical Engineering Dept. Valahia

More information

Comparison of Digital Image Watermarking Algorithms. Xu Zhou Colorado School of Mines December 1, 2014

Comparison of Digital Image Watermarking Algorithms. Xu Zhou Colorado School of Mines December 1, 2014 Comparison of Digital Image Watermarking Algorithms Xu Zhou Colorado School of Mines December 1, 2014 Outlier Introduction Background on digital image watermarking Comparison of several algorithms Experimental

More information

International Journal of Advanced Research in Computer Science and Software Engineering

International Journal of Advanced Research in Computer Science and Software Engineering ISSN: 2277 128X International Journal of Advanced Research in Computer Science and Software Engineering Research Paper Available online at: A Biometric Authentication Based Secured ATM Banking System Shouvik

More information

Secured Double Layer Data Hiding Using Encryption and Decryption Techniques

Secured Double Layer Data Hiding Using Encryption and Decryption Techniques Secured Double Layer Data Hiding Using Encryption and Decryption Techniques H.MaheshKumar M.Vignesh Abstract In this period of Internet every digitized object is transferable and exchangeable over internet

More information

Lecture 18 Representation and description I. 2. Boundary descriptors

Lecture 18 Representation and description I. 2. Boundary descriptors Lecture 18 Representation and description I 1. Boundary representation 2. Boundary descriptors What is representation What is representation After segmentation, we obtain binary image with interested regions

More information

VARIABLE RATE STEGANOGRAPHY IN DIGITAL IMAGES USING TWO, THREE AND FOUR NEIGHBOR PIXELS

VARIABLE RATE STEGANOGRAPHY IN DIGITAL IMAGES USING TWO, THREE AND FOUR NEIGHBOR PIXELS VARIABLE RATE STEGANOGRAPHY IN DIGITAL IMAGES USING TWO, THREE AND FOUR NEIGHBOR PIXELS Anita Pradhan Department of CSE, Sri Sivani College of Engineering, Srikakulam, Andhra Pradesh, India anita.pradhan15@gmail.com

More information

AUTOMATIC LOGO EXTRACTION FROM DOCUMENT IMAGES

AUTOMATIC LOGO EXTRACTION FROM DOCUMENT IMAGES AUTOMATIC LOGO EXTRACTION FROM DOCUMENT IMAGES Umesh D. Dixit 1 and M. S. Shirdhonkar 2 1 Department of Electronics & Communication Engineering, B.L.D.E.A s CET, Bijapur. 2 Department of Computer Science

More information

Digital Fragile Watermarking Scheme For Authentication Of. JPEG Images

Digital Fragile Watermarking Scheme For Authentication Of. JPEG Images Digital Fragile Watermarking Scheme For Authentication Of JPEG Images Chang-Tsun Li Department of Computer Science, University of Warwick, Coventry CV4 7AL, UK ctli@dcs.warwick.ac.uk Abstract It is a common

More information

Adaptive Pixel Pair Matching Technique for Data Embedding

Adaptive Pixel Pair Matching Technique for Data Embedding Available Online at www.ijcsmc.com International Journal of Computer Science and Mobile Computing A Monthly Journal of Computer Science and Information Technology IJCSMC, Vol. 3, Issue. 1, January 2014,

More information

CS443: Digital Imaging and Multimedia Binary Image Analysis. Spring 2008 Ahmed Elgammal Dept. of Computer Science Rutgers University

CS443: Digital Imaging and Multimedia Binary Image Analysis. Spring 2008 Ahmed Elgammal Dept. of Computer Science Rutgers University CS443: Digital Imaging and Multimedia Binary Image Analysis Spring 2008 Ahmed Elgammal Dept. of Computer Science Rutgers University Outlines A Simple Machine Vision System Image segmentation by thresholding

More information

COMPARISONS OF DCT-BASED AND DWT-BASED WATERMARKING TECHNIQUES

COMPARISONS OF DCT-BASED AND DWT-BASED WATERMARKING TECHNIQUES COMPARISONS OF DCT-BASED AND DWT-BASED WATERMARKING TECHNIQUES H. I. Saleh 1, M. E. Elhadedy 2, M. A. Ashour 1, M. A. Aboelsaud 3 1 Radiation Engineering Dept., NCRRT, AEA, Egypt. 2 Reactor Dept., NRC,

More information

Image retrieval based on region shape similarity

Image retrieval based on region shape similarity Image retrieval based on region shape similarity Cheng Chang Liu Wenyin Hongjiang Zhang Microsoft Research China, 49 Zhichun Road, Beijing 8, China {wyliu, hjzhang}@microsoft.com ABSTRACT This paper presents

More information

Use of Local Minimization for Lossless Gray Image Compression

Use of Local Minimization for Lossless Gray Image Compression Narendra Kumar et al. / (IJCSIT) International Journal of Computer Science and Information Technologies, Vol. 1 Use of Local Minimization for Lossless Gray Image Compression Narendra Kumar 1, Dr. Sachin

More information

A NEW APPROACH OF DIGITAL IMAGE COPYRIGHT PROTECTION USING MULTI-LEVEL DWT ALGORITHM

A NEW APPROACH OF DIGITAL IMAGE COPYRIGHT PROTECTION USING MULTI-LEVEL DWT ALGORITHM A NEW APPROACH OF DIGITAL IMAGE COPYRIGHT PROTECTION USING MULTI-LEVEL DWT ALGORITHM Siva Prasad K, Ganesh Kumar N PG Student [DECS], Assistant professor, Dept of ECE, Thandrapaparaya Institute of science

More information

COMPARISON BETWEEN TWO WATERMARKING ALGORITHMS USING DCT COEFFICIENT, AND LSB REPLACEMENT

COMPARISON BETWEEN TWO WATERMARKING ALGORITHMS USING DCT COEFFICIENT, AND LSB REPLACEMENT COMPARISO BETWEE TWO WATERMARKIG ALGORITHMS USIG DCT COEFFICIET, AD LSB REPLACEMET Mona M. El-Ghoneimy Associate Professor, Elect. & Comm. Dept., Faculty of Engineering, Cairo University, Post code 12316

More information

Layout Segmentation of Scanned Newspaper Documents

Layout Segmentation of Scanned Newspaper Documents , pp-05-10 Layout Segmentation of Scanned Newspaper Documents A.Bandyopadhyay, A. Ganguly and U.Pal CVPR Unit, Indian Statistical Institute 203 B T Road, Kolkata, India. Abstract: Layout segmentation algorithms

More information

Video Inter-frame Forgery Identification Based on Optical Flow Consistency

Video Inter-frame Forgery Identification Based on Optical Flow Consistency Sensors & Transducers 24 by IFSA Publishing, S. L. http://www.sensorsportal.com Video Inter-frame Forgery Identification Based on Optical Flow Consistency Qi Wang, Zhaohong Li, Zhenzhen Zhang, Qinglong

More information

Lecture 8 Object Descriptors

Lecture 8 Object Descriptors Lecture 8 Object Descriptors Azadeh Fakhrzadeh Centre for Image Analysis Swedish University of Agricultural Sciences Uppsala University 2 Reading instructions Chapter 11.1 11.4 in G-W Azadeh Fakhrzadeh

More information