A New Watermarking Algorithm for Point Model Using Angle Quantization Index Modulation. Feng Xiaoqing

Size: px
Start display at page:

Download "A New Watermarking Algorithm for Point Model Using Angle Quantization Index Modulation. Feng Xiaoqing"

Transcription

1 4th National Conference on Electrical, Electronics and Computer Engineering (NCEECE 015) A Ne Watermarking Algorithm for Point Model Using Angle Quantization Index Modulation Feng Xiaoqing Institute of Computer Application echniques, Zhejiang University of Finance & Economics, China zllinda13@sohu.com Keyords: point cloud; Angle Quantization Index Modulation; PCA Abstract. Point cloud models are idely used in industry. It is also faced ith increasingly serious copyright protection issues. A ne atermarking algorithm of 3D point cloud model using angle quantization index modulation is proposed. At first, a point cloud model is segmented into many patches according to the length of atermark information. hen, for each patch, 1 bit atermark is embedded into by modulating the angle of feature signal. Experiments sho that the algorithm is certain robustness against affine transformation, reorder and lo intensity of noise. Introduction Digital atermarking by inserting some invisible information is an effective method to protect copyright of digital media. People mainly focused on images [1] and videos []. And fe orks have been done on point model. Hoever, point cloud model can express a complicated object only by point information. his character makes point cloud used idely in fields of computer graphic. It is becoming urgent to research a practical atermark algorithm for point clouds. So far, several point cloud atermark schemes have been developed. A fast hierarchical clustering algorithm is applied to partition patches by Cott [3]. hen, Laplacian eigen-functions of each patch are achieved to insert atermark. It is robust against attacks, including affine transformations, cropping, noising and resampling. Ohbuchi et al. extend a mesh atermarking algorithm to point models [4]. So, it need generates a non-manifold mesh for each cluster of the points. hen, avelet-based spectral analysis technique proposed by Zachi Karni[5] is applied to insert into atermark. o atermark algorithms in above are non-blind atermark because original point model is need provided during extraction. Zhu proposed an improved AQIM algorithm [6], and prove the effectiveness of the scheme on images. In this paper, e extend this image AQIM algorithm to 3D point cloud models. Because there is not inherent order to sho point cloud like image from left to right, a point cloud model should be sorted in a certain order. Furthermore, for decreasing the distortion causing by embedding atermark into model, a point model need to divided into many groups according to the numbers of atermark bit. For each group, 1 bit atermark are embedded into by an angle quantization index modulation scheme. he remainder of this paper is organized as follos. In Section, related ork is described. An improved AQIM atermarking is described in detail in Section 3. he performance of algorithm is shon in section 4. Finally the future ork is looked forard in Section 5. elated orks Watermarking algorithms based on QIM he QIM scheme proposed by Chen et al. [7] modulate the host signal to its closest code ords according to the atermark bit, as shon in figure 1. Dither modulation (DM) is a kind of basic implementation of QIM. his algorithm can keep a better balance beteen imperceptible, atermark capacity and robustness. So, QIM algorithm is idely used in image atermarking scheme he authors - Published by Atlantis Press 963

2 1-1 1 x Δ Figure 1 Principle of QIM Hoever, the QIM atermarking method does not resist against some attacks, for example, compensation and scaling. For improving the performance of atermarking, a lot of efforts have been done in terms of choosing a suitable quantization feature. hus, many improved methods based on QIM have been proposed, such as the spread-transform dither modulation (SDM) [8], the logarithmic QIM (LQIM) [9], and the angle QIM (AQIM) method [10]. SDM is as an extension of DM in [7], projection feature is quantized along a random direction, hich makes SDM has significant advantages. Logarithmic transform and non-uniform quantization step are used in LQIM, hich makes it can resist against scaling attack. AQIM first introduced in [10] is an extension of the QIM to angle. he different ith traditional QIM method, the angle is quantized instead of quantizing the amplitude values. he angle of vector is changed to the most closed codeline according to embedded atermark bit as shon in Figure.. AQIM algorithm can be simplified described as folloing: 1) he angle of the host vector is quantized according to quantizers Q(). θ + m Q( θ ) = + m ) Change the angle of the vector to closest code ords to obtain the atermarked vector. Figure AQIM algorithm Figure.3 he relationship beteen x, y, z and r,θ,φ Although the types of a carrier signal are not any restricted in QIM, they are not directly applied to 3D model. Darazi [11] developed a sparse QIM for 3D mesh models. he scheme of quantization the distance of vertex in the spherical coordinate system makes the algorithm robust to affine transformation. In our QIM of 3D point model, e adopt Darazi s scheme to against affine transformation. he atermarking algorithm We are inspired by papers [6,10]. And e try to apply this algorithm [6] to 3D point cloud model. In this section, a novel atermarking algorithm for point cloud model based on AQIM ill be descried in detail. he block diagram of this method is shon in Figure

3 Figure 4 he block diagram of the atermark algorithm A ne coordinate system of a point cloud model is constructed by PCA, and then, the Cartesian coordinates vi = ( xi, yi, zi) is converted into the spherical coordinates qi = ( ri, qi, ϕi), as shon in figure 3. A distance set D= { ri r1, r,... rn, ri < r i + 1} is divided into some bins according to the length of atermark. For each group, e calculate the angle 1 r1 r... r j... n = =..., j = n r r... r m p+ 1 q n, q = n n. θ = arccos m mu u. Here, In our algorithm, atermarking is embedded by modulating the angle ofθ m. o quantizers QQ 0 ( ) and QQ 1 ( ) are constructed, (, ) d Q Ζ Ζ 1 d 1 0 Ζ = + d and Q1 ( Ζ, ) = d + +. he signal of θ m is quantized by choosing one of quantizers, θ = Q( θm, ), { 1,1}. If θ [ 1,1], θ = θ ± In our embedding, the step size Δ=0.00, hich is an empirical value. Futhermore, atermarked angle signal A is required to satisfy a condition of θa = θ, here θ A has the same definition as θ. he embedding region is the surface of a circular cone ith the axis u and the angle θ A. For getting the minimize distortion causing by embedding, the embedding function is considered as θ project on the cone. Paper [6] descirbe the geometric interpretation of atermark embedding function. Aaccording to [6], = d d and d = λ d + µ Xd can be achieved. Moreover, the value of d satisfies the conditions = 1 and X = cos( θ ). According to these analysis in above, d d d d m 965

4 λ = 1 cos ( θ ) 1 cos ( θ ) atermarked signal and µ = cos( θ ) λcos( θ ) can be calculated. At last, e ill get the, = r 1 r rn bit [... ]. Watermark extracted he process of extraction algorithm is alike to embed process. For achieving the sort order of the original model, resampling operation must be done. he angle of attacked signal f A is calculated. At last, a atermark is extracted by the minimal distance decoder, = arg min θ Q ( θ ). he bit error rate (BE) is used for judging hether there are m { 1,1} A m A atermark embedded in a point model. Simulation results Embedding atermark ill cause geometrical distortion of a point model. HausdorffDist is a common evaluating indicator. So, e use HausdorffDist [1] of r i beteen original and atermarked point model. able 1 provides information of tested point cloud models. In the simulations, a 64 bits of atermark is embedded into a point model. able 1 Point cloud models Original Model NeVenus (10558 points) fo1 (1083 points) miscdino (3984 points) Watermarked Model HausdorffDist ) Affine transformation Affine transformation includes translation, scaling and rotation, hich are a common operation rather than any of attacks. hus, robustness against these operations is very important for a reversible atermark scheme. he simulation experiments of similarity transformation are shon in able. ) eordering Distances beteen points and the center of model is sorted in ascending order, atermark can be integrality extracted after model is attacked by reordering. 3) Noising Binary random noise is added to each vertex of line entities ith different error rates on the model. he experiment results of noising attacks are shon in able 3 and figure

5 Conclusion In this ne atermarking scheme based on AQIM, a point model is divided into many patches according to the numbers of atermarking bit. hen, 1 bit atermark information is embedded into a patch. he experimental results sho that the introduced algorithm is certain robust against some attacks, such as affine transformation, reorder and lo intensity of noise. Hoever, e find that BEs ill become greater ith the increasing of noise intensity. able Experiment results Model ype attacks NeVenus fo1 miscdino similarity transformation re-order strength of noising 0.5% 1/ % 13/64 9/64 5/64 % 6/64 31/64 34/64 5% 8/64 8/64 39/64 Figure 5 Noising attack Acknoledgment his ork is supported by the National Natural Science Foundation of China (No ). eferences [1] E. Nezhadarya, Z. J. Wang,. K. Ward, "obust image atermarking based on multiscale gradient direction quantization". IEEE rans. Inf. Forensics Security, 6( 4), (011), [] H. Y. Chen, Y. S. Zhu,"A robust video atermarking algorithm based on singular value decomposition and slope-based embedding technique". Multimed ools App. DOI /s , 01 [3] D. Cotting,. Weyrich, M. Pauly, M. Gross, "obust Watermarking of Point Sampled Geometry". In: the Proceedings of the international Conference on Shape Modeling and Application, Italy, 004: 33-4 [4] Ohbuchi., Mukaiyama A., akahashi S. "Watermarking a 3D shape model defined as a point set". In: Proceedings of the International Conference on Cyber orlds (CW04), okyo, 004, [5] S. Kanai, H. Date,. Kishinami, "Digital atermarking for 3D polygons using multiresolution avelet decomposition". In: Proceedings of the 6th IFIP WG 5. International Workshop on Geometric Modeling, okyo, 1998, B. Chen and G. W. Wornell, "Quantization index 967

6 modulation: a class of provably good methods for digital atermarking and information embedding". IEEE rans. Inf. heory, 47(4), (001), [6] X. S. Zhu, S. L. Pen, "Novel Quantization Watermarking Based on andom Angle Modulation". In: 011 Seventh International Conference on Computational Intelligence and Security. 16(7), (011), , [7] B. Chen, and G. W. Wornell, "Preprocessed and post processed quantization index modulation methods for migital atermarking", Proc. of the SPIE International Conference on Security and Watermarking of Multimedia, (000), [8] B. Chen, and G. W. Wornell, "Quantization index modulation: a class of provably good methods for digital atermarking and information embedding", Information heory IEEE ransactions on, 47(4), (001), [9] N. K. Kalantari, and S. M. Ahadi, "A logarithmic quantization index modulation for perceptually better data hiding", IEEE transactions on image processing : a publication of the IEEE Signal Processing Society, 19(6), (010), [10] F. Our ıque, V. Licks,. Jordan, and F. P erez-gonz` alez, "Angle qim :a novel atermark embedding scheme robust against amplitude scaling distortions". In Proc. Int. Conf. Acoustics, Speech and Signal Processing, (005), [11]. Darazi,. Hu, and B. Macq, "Applying spread transform dither modulation for 3D-mesh atermarking by using perceptual models", In Proc. IEEE Int. Conf. Acoust., Speech, and Signal Processing (ICASSP'10), Mar. 19, (010), [1] 968

Adaptive Fuzzy Watermarking for 3D Models

Adaptive Fuzzy Watermarking for 3D Models International Conference on Computational Intelligence and Multimedia Applications 2007 Adaptive Fuzzy Watermarking for 3D Models Mukesh Motwani.*, Nikhil Beke +, Abhijit Bhoite +, Pushkar Apte +, Frederick

More information

A Wavelet-Based Watermarking for Still Images

A Wavelet-Based Watermarking for Still Images Buletinul Ştiinţific al Universităţii "Politehnica" din Timişoara Seria ELECTRONICĂ şi TELECOMUNICAŢII TRANSACTIONS on ELECTRONICS and COMMUNICATIONS Tom 49(63) Fascicola 2 2004 A Wavelet-Based Watermarking

More information

Local patch blind spectral watermarking method for 3D graphics

Local patch blind spectral watermarking method for 3D graphics Local patch blind spectral watermarking method for 3D graphics Ming Luo 1, Kai Wang 2, Adrian G. Bors 1, and Guillaume Lavoué 2 1 Department of Computer Science, University of York, York YO10 5DD, UK 2

More information

A 3D Mesh Watermarking Based on Improved Vertex Grouping and Piecewise Mapping Function

A 3D Mesh Watermarking Based on Improved Vertex Grouping and Piecewise Mapping Function Journal of Information Hiding and Multimedia Signal Processing c 2017 ISSN 2073-4212 Ubiquitous International Volume 8, Number 1, January 2017 A 3D Mesh Watermarking Based on Improved Vertex Grouping and

More information

A FRACTAL WATERMARKING SCHEME FOR IMAGE IN DWT DOMAIN

A FRACTAL WATERMARKING SCHEME FOR IMAGE IN DWT DOMAIN A FRACTAL WATERMARKING SCHEME FOR IMAGE IN DWT DOMAIN ABSTRACT A ne digital approach based on the fractal technolog in the Disperse Wavelet Transform domain is proposed in this paper. First e constructed

More information

ROBUST BLIND IMAGE WATERMARKING BASED ON MULTI-WAVELET TRANSFORM AND SINGULAR VALUE DECOMPOSITION

ROBUST BLIND IMAGE WATERMARKING BASED ON MULTI-WAVELET TRANSFORM AND SINGULAR VALUE DECOMPOSITION Proceeding of 3th Seminar on Harmonic Analysis and Applications, January 2015 ROBUST BLIND IMAGE WATERMARKING BASED ON MULTI-WAVELET TRANSFORM AND SINGULAR VALUE DECOMPOSITION Author: Malihe Mardanpour,

More information

Robust Digital Image Watermarking using Gradient Vector Quantization and Denoising using Contourlet

Robust Digital Image Watermarking using Gradient Vector Quantization and Denoising using Contourlet Robust Digital Image Watermarking using Gradient Vector Quantization and Denoising using Contour 1 I.Kullayamma, 2 V.Harika, 3 K.Radhika 1 Assistant Professor, Department of Electronics and Communication

More information

Digital Watermarking of Still Images using the Discrete Wavelet Transform

Digital Watermarking of Still Images using the Discrete Wavelet Transform Buletinul Ştiinţific al Universităţii "Politehnica" din Timişoara Seria ELECTROICĂ şi TELECOMUICAŢII TRASACTIOS on ELECTROICS and COMMUICATIOS Tom 48(62) Fascicola 1 2003 Digital Watermarking of Still

More information

Vertex Shuffling : A Novel Information Hiding on 3D Model

Vertex Shuffling : A Novel Information Hiding on 3D Model Vertex Shuffling : A Novel Information Hiding on 3D Model Cong-Kai Lin, Charlie Irawan Tan, and Wen-Kai Tai Department of Computer Science and Information Engineering, National Dong Hwa University, Taiwan,

More information

A Robust and Oblivious Watermarking Method Using Wavelet Transform and Genetic Algorithm

A Robust and Oblivious Watermarking Method Using Wavelet Transform and Genetic Algorithm .iecs.in International Journal Of Engineering And Computer Science ISSN:39-74 Volume 5 Issue -0 February, 06 Page No. 58-588 A Robust and Oblivious Watermarking Meod Using Wavelet Transform and Genetic

More information

Arab Journal of Nuclear Sciences and Applications

Arab Journal of Nuclear Sciences and Applications Arab J. Nucl. Sci. Appl., Vol. 51, 4, 62-71 (2018) Arab Journal of Nuclear Sciences and Applications ISSN 1110-0451 Web site: ajnsa.journals.ekb.eg (ESNSA) Non-Blind Robust 3D Object Watermarking Scheme

More information

A STEGANALYTIC ALGORITHM FOR 3D POLYGONAL MESHES. Department of Computer Science, Yale University

A STEGANALYTIC ALGORITHM FOR 3D POLYGONAL MESHES. Department of Computer Science, Yale University A STEGANALYTIC ALGORITHM FOR 3D POLYGONAL MESHES Ying Yang Ruggero Pintus, Holly Rushmeier Ioannis Ivrissimtzis Department of Computer Science, Yale University CRS4, Italy School of Engineering and Computing

More information

SPREAD SPECTRUM AUDIO WATERMARKING SCHEME BASED ON PSYCHOACOUSTIC MODEL

SPREAD SPECTRUM AUDIO WATERMARKING SCHEME BASED ON PSYCHOACOUSTIC MODEL SPREAD SPECTRUM WATERMARKING SCHEME BASED ON PSYCHOACOUSTIC MODEL 1 Yüksel Tokur 2 Ergun Erçelebi e-mail: tokur@gantep.edu.tr e-mail: ercelebi@gantep.edu.tr 1 Gaziantep University, MYO, 27310, Gaziantep,

More information

International Conference on Information Sciences, Machinery, Materials and Energy (ICISMME 2015)

International Conference on Information Sciences, Machinery, Materials and Energy (ICISMME 2015) International Conference on Information Sciences, Machinery, Materials and Energy (ICISMME 2015) Study on Obtaining High-precision Velocity Parameters of Visual Autonomous Navigation Method Considering

More information

A ROBUST 3D WATERMARKING BASED ON FEATURE REGIONS

A ROBUST 3D WATERMARKING BASED ON FEATURE REGIONS A ROBUST 3D WATERMARKING BASED ON FEATURE REGIONS Saoussen Ben Jabra and Ezzeddine Zagrouba Institut Supérieur d informatique, Abou Raihane Bayrouni, 2080 l Ariana, Tunisia. Saoussen.bj@laposte.net, ezzeddine.zagrouba@fsm.rnu.tn

More information

An Improved DCT Based Color Image Watermarking Scheme Xiangguang Xiong1, a

An Improved DCT Based Color Image Watermarking Scheme Xiangguang Xiong1, a International Symposium on Mechanical Engineering and Material Science (ISMEMS 2016) An Improved DCT Based Color Image Watermarking Scheme Xiangguang Xiong1, a 1 School of Big Data and Computer Science,

More information

An Algorithm for the Welding Torch Weaving Control of Arc Welding Robot

An Algorithm for the Welding Torch Weaving Control of Arc Welding Robot http://dx.doi.org/0.5755/j0.eee.2.2.599 ELEKTRONIKA IR ELEKTROTECHNIKA, ISSN 392-25, VOL. 2, NO. 2, 205 An Algorithm for the Welding Torch Weaving Control of Arc Welding Robot Wen-liang Zhu, Fu-sheng Ni

More information

Spectral Graph-Theoretic Approach to 3D Mesh Watermarking

Spectral Graph-Theoretic Approach to 3D Mesh Watermarking Spectral Graph-Theoretic Approach to 3D Mesh Watermarking Emad E. Abdallah Department of Computer Science Concordia University, Montreal, Canada ee abdal@cs.concordia.ca A. Ben Hamza and Prabir Bhattacharya

More information

An Improved Images Watermarking Scheme Using FABEMD Decomposition and DCT

An Improved Images Watermarking Scheme Using FABEMD Decomposition and DCT An Improved Images Watermarking Scheme Using FABEMD Decomposition and DCT Noura Aherrahrou and Hamid Tairi University Sidi Mohamed Ben Abdellah, Faculty of Sciences, Dhar El mahraz, LIIAN, Department of

More information

Geometric Modeling and Processing

Geometric Modeling and Processing Geometric Modeling and Processing Tutorial of 3DIM&PVT 2011 (Hangzhou, China) May 16, 2011 6. Mesh Simplification Problems High resolution meshes becoming increasingly available 3D active scanners Computer

More information

3-D D Digital Watermarking

3-D D Digital Watermarking CORESA 2007, Montpellier 3-D D Digital Watermarking Adrian G. Bors University of York Computer Science Department YORK Y010 5DD, UK adrian.bors@cs.york.ac.uk 9 November 2007 Outline Overview of 3D watermarking

More information

Contour Error Decoupling Compensation for Non-circular Grinding Qi-guang LI 1,a, Qiu-shi HAN 1, Wei-hua LI 2 and Bao-ying PENG 1

Contour Error Decoupling Compensation for Non-circular Grinding Qi-guang LI 1,a, Qiu-shi HAN 1, Wei-hua LI 2 and Bao-ying PENG 1 07 nd International Conference on Applied Mechanics, Electronics and Mechatronics Engineering (AMEME 07) ISBN: 978--60595-497-4 Contour Error Decoupling Compensation for Non-circular Grinding Qi-guang

More information

A New Spatial q-log Domain for Image Watermarking

A New Spatial q-log Domain for Image Watermarking 1 Ta Minh Thanh, 2 Pham Thanh Hiep, 3 Ta Minh Tam 1 Department of Network Security, Le Quy Don Technical University, 100 Hoang Quoc Viet, Cau Giay, Hanoi, Vietnam. E-mail: taminhjp@gmail.com 2 Le Quy Don

More information

Audio Watermarking using Empirical Mode Decomposition

Audio Watermarking using Empirical Mode Decomposition Audio Watermarking using Empirical Mode Decomposition Charulata P. Talele 1, Dr A. M. Patil 2 1ME Student, Electronics and Telecommunication Department J. T. Mahajan College of Engineering, Faizpur, Maharashtra,

More information

An Edge Detection Method Using Back Propagation Neural Network

An Edge Detection Method Using Back Propagation Neural Network RESEARCH ARTICLE OPEN ACCESS An Edge Detection Method Using Bac Propagation Neural Netor Ms. Utarsha Kale*, Dr. S. M. Deoar** *Department of Electronics and Telecommunication, Sinhgad Institute of Technology

More information

Blind watermarking of 3D shapes using localized constraints

Blind watermarking of 3D shapes using localized constraints Blind watermarking of 3D shapes using localized constraints Adrian G. Bors Dept. of Computer Science, University of York, York YO DD, U.K. E-mail: adrian.bors@cs.york.ac.uk Abstract This paper develops

More information

Accepted Manuscript. Optimization approach for 3D model watermarking by linear binary programming. Yu-Ping Wang, Shi-Min Hu

Accepted Manuscript. Optimization approach for 3D model watermarking by linear binary programming. Yu-Ping Wang, Shi-Min Hu Accepted Manuscript Optimization approach for 3D model watermarking by linear binary programming Yu-Ping Wang, Shi-Min Hu PII: S0167-8396(10)00024-5 DOI: 10.1016/j.cagd.2010.02.003 Reference: COMAID 1208

More information

ENTROPY-BASED IMAGE WATERMARKING USING DWT AND HVS

ENTROPY-BASED IMAGE WATERMARKING USING DWT AND HVS SETIT 2005 3 rd International Conference: Sciences of Electronic, Technologies of Information and Telecommunications March 27-31, 2005 TUNISIA ENTROPY-BASED IMAGE WATERMARKING USING DWT AND HVS Shiva Zaboli

More information

Enhanced Watermarking Scheme for 3D Mesh Models

Enhanced Watermarking Scheme for 3D Mesh Models Enhanced Watermarking Scheme for 3D Mesh Models Lamiaa Basyoni College of Computing and Information Technology Arab Academy of Science and Technology Cairo, Egypt lamiaa.basyoni@gmail.com H. I. Saleh Radiation

More information

PARTICLE SWARM OPTIMIZATION (PSO) [1] is an

PARTICLE SWARM OPTIMIZATION (PSO) [1] is an Proceedings of International Joint Conference on Neural Netorks, Atlanta, Georgia, USA, June -9, 9 Netork-Structured Particle Sarm Optimizer Considering Neighborhood Relationships Haruna Matsushita and

More information

COPYRIGHT PROTECTION OF PALETTE IMAGES BY A ROBUST LOSSLESS VISIBLE WATERMARKING TECHNIQUE *

COPYRIGHT PROTECTION OF PALETTE IMAGES BY A ROBUST LOSSLESS VISIBLE WATERMARKING TECHNIQUE * COPYIGHT POTECTION OF PALETTE IMAGES BY A OBUST LOSSLESS VISIBLE WATEMAKING TECHNIQUE * Pei-Pei Chen ( 陳佩貝 ) and Wen-Hsiang Tsai ( 蔡文祥 ), Dept of Computer Science, National Chiao Tung University, Hsinchu,

More information

IEEE TRANSACTIONS ON MULTIMEDIA, VOL. 10, NO. 8, DECEMBER /$ IEEE

IEEE TRANSACTIONS ON MULTIMEDIA, VOL. 10, NO. 8, DECEMBER /$ IEEE IEEE TRANSACTIONS ON MULTIMEDIA, VOL. 10, NO. 8, DECEMBER 2008 1513 A Comprehensive Survey on Three-Dimensional Mesh Watermarking Kai Wang, Guillaume Lavoué, Florence Denis, and Atilla Baskurt Abstract

More information

FRACTAL 3D MODELING OF ASTEROIDS USING WAVELETS ON ARBITRARY MESHES 1 INTRODUCTION: FRACTAL SURFACES IN NATURE

FRACTAL 3D MODELING OF ASTEROIDS USING WAVELETS ON ARBITRARY MESHES 1 INTRODUCTION: FRACTAL SURFACES IN NATURE 1 FRACTAL D MODELING OF ASTEROIDS USING WAVELETS ON ARBITRARY MESHES André Jalobeanu Automated Learning Group, USRA/RIACS NASA Ames Research Center MS 269-4, Moffett Field CA 9405-1000, USA ajalobea@email.arc.nasa.gov

More information

Image and Video Watermarking

Image and Video Watermarking Telecommunications Seminar WS 1998 Data Hiding, Digital Watermarking and Secure Communications Image and Video Watermarking Herbert Buchner University of Erlangen-Nuremberg 16.12.1998 Outline 1. Introduction:

More information

Digital Invisible Ink and its Applications in Steganography

Digital Invisible Ink and its Applications in Steganography Digital Invisible Ink and its Applications in Steganography Chun-Hsiang Huang Dept. of CSIE, National aian Univ. 886-2-23625336 ext 23 bh@cmlab.csie.ntu.edu.t Shang-Chih Chuang Dept. of CSIE, National

More information

COPYRIGHT PROTECTION OF PALETTE IMAGES BY A ROBUST LOSSLESS VISIBLE WATERMARKING TECHNIQUE *

COPYRIGHT PROTECTION OF PALETTE IMAGES BY A ROBUST LOSSLESS VISIBLE WATERMARKING TECHNIQUE * COPYRIGHT PROTECTION OF PALETTE IMAGES BY A ROBUST LOSSLESS VISIBLE WATERMARKING TECHNIQUE * Pei-Pei Chen ( 陳佩貝 ) 1 and Wen-Hsiang Tsai ( 蔡文祥 ) 1, 2 1 Dept. of Computer Science, National Chiao Tung University,

More information

Contrast Improvement on Various Gray Scale Images Together With Gaussian Filter and Histogram Equalization

Contrast Improvement on Various Gray Scale Images Together With Gaussian Filter and Histogram Equalization Contrast Improvement on Various Gray Scale Images Together With Gaussian Filter and Histogram Equalization I M. Rajinikannan, II A. Nagarajan, III N. Vallileka I,II,III Dept. of Computer Applications,

More information

Three-Dimensional Meshes Watermarking: Review and Attack-Centric Investigation

Three-Dimensional Meshes Watermarking: Review and Attack-Centric Investigation Three-Dimensional Meshes Watermarking: Review and Attack-Centric Investigation Kai Wang 1, Guillaume Lavoué 1, Florence Denis 2, and Atilla Baskurt 1 1 LIRIS, UMR 5205 CNRS, INSA-Lyon, F-69621 Villeurbanne,

More information

BLIND 3D MODEL WATERMARKING BASED ON MULTI-RESOLUTION REPRESENTATION AND FUZZY LOGIC

BLIND 3D MODEL WATERMARKING BASED ON MULTI-RESOLUTION REPRESENTATION AND FUZZY LOGIC BLIND 3D MODEL WATERMARKING BASED ON MULTI-RESOLUTION REPRESENTATION AND FUZZY LOGIC 1 Prof. Sharvari C. Tamane, 2 Dr. Ratnadeep R. Deshmukh, 1 MGM s Jawaharlal Nehru Engineering College sharvaree73@yahoo.com

More information

A REAL-TIME REGISTRATION METHOD OF AUGMENTED REALITY BASED ON SURF AND OPTICAL FLOW

A REAL-TIME REGISTRATION METHOD OF AUGMENTED REALITY BASED ON SURF AND OPTICAL FLOW A REAL-TIME REGISTRATION METHOD OF AUGMENTED REALITY BASED ON SURF AND OPTICAL FLOW HONGBO LI, MING QI AND 3 YU WU,, 3 Institute of Web Intelligence, Chongqing University of Posts and Telecommunications,

More information

Multibit Digital Watermarking Robust against Local Nonlinear Geometrical Distortions

Multibit Digital Watermarking Robust against Local Nonlinear Geometrical Distortions Multibit Digital Watermarking Robust against Local Nonlinear Geometrical Distortions Sviatoslav Voloshynovskiy Frédéric Deguillaume, and Thierry Pun CUI - University of Geneva 24, rue du Général Dufour

More information

A NEW FRAGILE MESH WATERMARKING ALGORITHM FOR AUTHENTICATION

A NEW FRAGILE MESH WATERMARKING ALGORITHM FOR AUTHENTICATION A NEW FRAGILE MESH WATERMARKING ALGORITHM FOR AUTHENTICATION Hao-Tian Wu and Yiu-Ming Cheung Department of Computer Science, Hong Kong Baptist University, Hong Kong, China Abstract: Key words: In this

More information

A NEW DCT-BASED WATERMARKING METHOD FOR COPYRIGHT PROTECTION OF DIGITAL AUDIO

A NEW DCT-BASED WATERMARKING METHOD FOR COPYRIGHT PROTECTION OF DIGITAL AUDIO International journal of computer science & information Technology (IJCSIT) Vol., No.5, October A NEW DCT-BASED WATERMARKING METHOD FOR COPYRIGHT PROTECTION OF DIGITAL AUDIO Pranab Kumar Dhar *, Mohammad

More information

A Novel Fast Self-restoration Semi-fragile Watermarking Algorithm for Image Content Authentication Resistant to JPEG Compression

A Novel Fast Self-restoration Semi-fragile Watermarking Algorithm for Image Content Authentication Resistant to JPEG Compression A Novel Fast Self-restoration Semi-fragile Watermarking Algorithm for Image Content Authentication Resistant to JPEG Compression Hui Wang, Anthony TS Ho and Xi Zhao 24 th October 2011 Outline Background

More information

Lecture 1: Turtle Graphics. the turtle and the crane and the swallow observe the time of their coming; Jeremiah 8:7

Lecture 1: Turtle Graphics. the turtle and the crane and the swallow observe the time of their coming; Jeremiah 8:7 Lecture 1: Turtle Graphics the turtle and the crane and the sallo observe the time of their coming; Jeremiah 8:7 1. Turtle Graphics Motion generates geometry. The turtle is a handy paradigm for investigating

More information

A Robust Watermarking Algorithm For JPEG Images

A Robust Watermarking Algorithm For JPEG Images nd Joint International Information Technology, Mechanical and Electronic Engineering Conference (JIMEC 7) A Robust Watermarking Algorithm For JPEG Images Baosheng Sun, Daofu Gong*, Fenlin Liu *Foundation

More information

Mixture models and clustering

Mixture models and clustering 1 Lecture topics: Miture models and clustering, k-means Distance and clustering Miture models and clustering We have so far used miture models as fleible ays of constructing probability models for prediction

More information

Face Recognition Using Vector Quantization Histogram and Support Vector Machine Classifier Rong-sheng LI, Fei-fei LEE *, Yan YAN and Qiu CHEN

Face Recognition Using Vector Quantization Histogram and Support Vector Machine Classifier Rong-sheng LI, Fei-fei LEE *, Yan YAN and Qiu CHEN 2016 International Conference on Artificial Intelligence: Techniques and Applications (AITA 2016) ISBN: 978-1-60595-389-2 Face Recognition Using Vector Quantization Histogram and Support Vector Machine

More information

Detecting Printed and Handwritten Partial Copies of Line Drawings Embedded in Complex Backgrounds

Detecting Printed and Handwritten Partial Copies of Line Drawings Embedded in Complex Backgrounds 9 1th International Conference on Document Analysis and Recognition Detecting Printed and Handwritten Partial Copies of Line Drawings Embedded in Complex Backgrounds Weihan Sun, Koichi Kise Graduate School

More information

Data Hiding in Video

Data Hiding in Video Data Hiding in Video J. J. Chae and B. S. Manjunath Department of Electrical and Computer Engineering University of California, Santa Barbara, CA 9316-956 Email: chaejj, manj@iplab.ece.ucsb.edu Abstract

More information

Advanced Digital Image Forgery Detection by Using SIFT

Advanced Digital Image Forgery Detection by Using SIFT RESEARCH ARTICLE OPEN ACCESS Advanced Digital Image Forgery Detection by Using SIFT Priyanka G. Gomase, Nisha R. Wankhade Department of Information Technology, Yeshwantrao Chavan College of Engineering

More information

Piecewise Permutation Steganography for 3D Humanoid Mesh Models

Piecewise Permutation Steganography for 3D Humanoid Mesh Models Piecewise Permutation Steganography for 3D Humanoid Mesh Models Hsin-Chih Lin* and Shan-Jhu Lin Department of Information and Learning Technology National University of Tainan Tainan City, Taiwan * hclin@mail.nutn.edu.tw

More information

A Robust Spectral Approach for Blind Watermarking of Manifold Surfaces

A Robust Spectral Approach for Blind Watermarking of Manifold Surfaces A Robust Spectral Approach for Blind Watermarking of Manifold Surfaces Yang Liu Dept. of Computer Science University of Texas at Dallas Richardson, TX 75080, USA yxl072100@utdallas.edu Balakrishnan Prabhakaran

More information

Robust Watermarking of Point-Sampled Geometry

Robust Watermarking of Point-Sampled Geometry Robust Watermarking of Point-Sampled Geometry Daniel Cotting 1 Tim Weyrich 1 Mark Pauly 2 Markus Gross 1 1 Computer Graphics Laboratory Swiss Federal Institute of Technology (ETH) Zurich, Switzerland {dcotting,

More information

Spectral Watermarking for Parameterized Surfaces

Spectral Watermarking for Parameterized Surfaces 1 Spectral Watermarking for Parameterized Surfaces Yang Liu, Balakrishnan Prabhakaran, Xiaohu Guo Abstract This paper presents a blind spectral 2-way watermarking framework for 3D models with parametric

More information

Audio Watermarking using Colour Image Based on EMD and DCT

Audio Watermarking using Colour Image Based on EMD and DCT Audio Watermarking using Colour Image Based on EMD and Suhail Yoosuf 1, Ann Mary Alex 2 P. G. Scholar, Department of Electronics and Communication, Mar Baselios College of Engineering and Technology, Trivandrum,

More information

A Robust Hybrid Blind Digital Image Watermarking System Using Discrete Wavelet Transform and Contourlet Transform

A Robust Hybrid Blind Digital Image Watermarking System Using Discrete Wavelet Transform and Contourlet Transform A Robust Hybrid Blind Digital Image System Using Discrete Wavelet Transform and Contourlet Transform Nidal F. Shilbayeh, Belal AbuHaija, Zainab N. Al-Qudsy Abstract In this paper, a hybrid blind digital

More information

Watermarking of Image Using Priority Based On Algorithms

Watermarking of Image Using Priority Based On Algorithms This work by IJARBEST is licensed under Creative Commons Attribution 4.0 International License. Available at https://www.ijarbest.com Watermarking of Image Using Priority Based On Algorithms B.Aarthi,

More information

Context based optimal shape coding

Context based optimal shape coding IEEE Signal Processing Society 1999 Workshop on Multimedia Signal Processing September 13-15, 1999, Copenhagen, Denmark Electronic Proceedings 1999 IEEE Context based optimal shape coding Gerry Melnikov,

More information

A Joint DWT-DCT Based Watermarking Technique for Avoiding Unauthorized Replication

A Joint DWT-DCT Based Watermarking Technique for Avoiding Unauthorized Replication A oint DT-DCT Based atermarking Technique for Avoiding Unauthorized Replication Kaushik Deb 1, Md. Sajib Al-Seraj 1, Mir Md. Saki Kowsar 1 and Iqbal Hasan Sarkar 1 1 Department of Computing Science and

More information

A Practical Print-and-Scan Resilient Watermarking for High Resolution Images

A Practical Print-and-Scan Resilient Watermarking for High Resolution Images A Practical Print-and-Scan Resilient Watermaring for High Resolution Images Yongping Zhang, Xiangui Kang 2, and Philipp Zhang 3 Research Department, Hisilicon Technologies Co., Ltd, 00094 Beijing, China.

More information

Robust Image Watermarking based on Discrete Wavelet Transform, Discrete Cosine Transform & Singular Value Decomposition

Robust Image Watermarking based on Discrete Wavelet Transform, Discrete Cosine Transform & Singular Value Decomposition Advance in Electronic and Electric Engineering. ISSN 2231-1297, Volume 3, Number 8 (2013), pp. 971-976 Research India Publications http://www.ripublication.com/aeee.htm Robust Image Watermarking based

More information

A Benchmark for 3D Mesh Watermarking

A Benchmark for 3D Mesh Watermarking 2010 Shape Modeling International Conference A Benchmark for 3D Mesh Watermarking Kai WANG 1, Guillaume Lavoué 1, Florence Denis 2, Atilla Baskurt 1 Université de Lyon, CNRS INSA-Lyon 1 / Université Lyon

More information

A Robust Image Zero-Watermarking Algorithm Based on DWT and PCA

A Robust Image Zero-Watermarking Algorithm Based on DWT and PCA A Robust Image Zero-Watermarking Algorithm Based on DWT and PCA Xiaoxu Leng, Jun Xiao, and Ying Wang Graduate University of Chinese Academy of Sciences, 100049 Beijing, China lengxiaoxu@163.com, {xiaojun,ywang}@gucas.ac.cn

More information

Blind QIM-LDPC Watermarking of 3D-Meshes

Blind QIM-LDPC Watermarking of 3D-Meshes Blind QIM-LDPC Watermarking of 3D-Meshes (Invited Paper) Bata Vasic Department of Electronic University of Nis, Faculty of Electronic Engineering Nis, Serbia bata.vasic@elfak.ni.ac.rs Abstract We introduce

More information

Comparison of Wavelet Based Watermarking Techniques for Various Attacks

Comparison of Wavelet Based Watermarking Techniques for Various Attacks International Journal of Engineering and Technical Research (IJETR) ISSN: 2321-0869, Volume-3, Issue-4, April 2015 Comparison of Wavelet Based Watermarking Techniques for Various Attacks Sachin B. Patel,

More information

A dynamic programming algorithm for perceptually consistent stereo

A dynamic programming algorithm for perceptually consistent stereo A dynamic programming algorithm for perceptually consistent stereo The Harvard community has made this article openly available. Please share ho this access benefits you. Your story matters. Citation Accessed

More information

Research Article Novel Iris Biometric Watermarking Based on Singular Value Decomposition and Discrete Cosine Transform

Research Article Novel Iris Biometric Watermarking Based on Singular Value Decomposition and Discrete Cosine Transform Mathematical Problems in Engineering, Article I 926170, 6 pages http://dx.doi.org/10.1155/2014/926170 Research Article Novel Iris Biometric Watermarking Based on Singular Value ecomposition and iscrete

More information

A Benchmark for 3D Mesh Watermarking

A Benchmark for 3D Mesh Watermarking IEEE INTERNATIONAL CONFERENCE ON SHAPE MODELING AND APPLICATIONS (SMI) 2010 1 A Benchmark for 3D Mesh Watermarking Kai Wang 1, Guillaume Lavoué 1, Florence Denis 2, Atilla Baskurt 1, and Xiyan He 3 1,2

More information

RECENT advances in 3D acquisition technologies, 3D graphics rendering and geometric modeling have boosted

RECENT advances in 3D acquisition technologies, 3D graphics rendering and geometric modeling have boosted RESEARCH REPORT OF LIRIS 1 Robust and Blind Watermarking of Polygonal Meshes Based on Volume Moments Kai Wang, Guillaume Lavoué, Florence Denis, and Atilla Baskurt Abstract This paper describes a robust

More information

142 IEEE TRANSACTIONS ON SIGNAL PROCESSING, VOL. 55, NO. 1, JANUARY 2007

142 IEEE TRANSACTIONS ON SIGNAL PROCESSING, VOL. 55, NO. 1, JANUARY 2007 142 IEEE TRANSACTIONS ON SIGNAL PROCESSING, VOL. 55, NO. 1, JANUARY 2007 An Oblivious Watermarking for 3-D Polygonal Meshes Using Distribution of Vertex Norms Jae-Won Cho, Rémy Prost, and Ho-Youl Jung

More information

Wavelet-Based Blind Watermarking of 3D Models

Wavelet-Based Blind Watermarking of 3D Models Wavelet-Based Blind Watermarking of 3D Models F. Uccheddu Department of Electronic and Telecommunications University of Florence Via S. Marta 3 50139, Firenze, Italy uccheddu@lci.det.unifi.it M. Corsini

More information

Open Access Side-Informed Image Watermarking Scheme Based on Dither Modulation in the Frequency Domain

Open Access Side-Informed Image Watermarking Scheme Based on Dither Modulation in the Frequency Domain Send Orders for Reprints to reprints@benthamscience.net The Open Signal Processing Journal, 2013, 5, 1-6 1 Open Access Side-Informed Image ing Scheme Based on Dither Modulation in the Frequency Domain

More information

A Robust Wavelet-Based Watermarking Algorithm Using Edge Detection

A Robust Wavelet-Based Watermarking Algorithm Using Edge Detection A Robust Wavelet-Based Watermarking Algorithm Using Edge Detection John N. Ellinas Abstract In this paper, a robust watermarking algorithm using the wavelet transform and edge detection is presented. The

More information

An Analysis of Interference as a Source for Diffraction

An Analysis of Interference as a Source for Diffraction J. Electromagnetic Analysis & Applications, 00,, 60-606 doi:0.436/jemaa.00.0079 Published Online October 00 (http://.scirp.org/journal/jemaa) 60 An Analysis of Interference as a Source for Diffraction

More information

DTM Based on an Ellipsoidal Squares

DTM Based on an Ellipsoidal Squares DM Based on an Ellipsoidal Squares KRZYSZOF NAUS Institute of Navigation and Hydrography Polish Naval Academy Śmidoicza 69, 8-3 Gdynia POLAND k.naus@am.gdynia.pl Abstract: - he paper presents the description

More information

Chapter 1. Turtle Graphics. 1.1 Turtle Graphics. The turtle and the crane and the swallow observe the time of their coming Jeremiah 8:7

Chapter 1. Turtle Graphics. 1.1 Turtle Graphics. The turtle and the crane and the swallow observe the time of their coming Jeremiah 8:7 Goldman/An Integrated Introduction to Computer Graphics and Geometric Modeling K10188_C001 Revise Proof page 3 26.3.2009 7:54am Compositor Name: VAmoudavally Chapter 1 Turtle Graphics The turtle and the

More information

Robust Blind Watermarking Mechanism For Motion Data Streams

Robust Blind Watermarking Mechanism For Motion Data Streams Robust Blind Watermarking Mechanism For Motion Data Streams Parag Agarwal Ketaki Adi B. Prabhakaran Department of Computer Science, University of Texas at Dallas MS EC 31, PO Box 830688, Richardson, TX

More information

An efficient face recognition algorithm based on multi-kernel regularization learning

An efficient face recognition algorithm based on multi-kernel regularization learning Acta Technica 61, No. 4A/2016, 75 84 c 2017 Institute of Thermomechanics CAS, v.v.i. An efficient face recognition algorithm based on multi-kernel regularization learning Bi Rongrong 1 Abstract. A novel

More information

Image Quality Assessment based on Improved Structural SIMilarity

Image Quality Assessment based on Improved Structural SIMilarity Image Quality Assessment based on Improved Structural SIMilarity Jinjian Wu 1, Fei Qi 2, and Guangming Shi 3 School of Electronic Engineering, Xidian University, Xi an, Shaanxi, 710071, P.R. China 1 jinjian.wu@mail.xidian.edu.cn

More information

A Method to Eliminate Wrongly Matched Points for Image Matching

A Method to Eliminate Wrongly Matched Points for Image Matching 2017 2nd International Seminar on Applied Physics, Optoelectronics and Photonics (APOP 2017) ISBN: 978-1-60595-522-3 A Method to Eliminate Wrongly Matched Points for Image Matching Xiao-fei AI * ABSTRACT

More information

Blind digital watermarking in PDF documents using Spread Transform Dither Modulation.

Blind digital watermarking in PDF documents using Spread Transform Dither Modulation. Noname manuscript No. (will be inserted by the editor) Blind digital watermarking in PDF documents using Spread Transform Dither Modulation. Ahmad W. Bitar 1, Rony Darazi 1, Jean-François Couchot 2 and

More information

Robust Zero Watermarking for Still and Similar Images Using a Learning Based Contour Detection

Robust Zero Watermarking for Still and Similar Images Using a Learning Based Contour Detection Robust Zero Watermarking for Still and Similar Images Using a Learning Based Contour Detection Shahryar Ehsaee and Mansour Jamzad (&) Department of Computer Engineering, Sharif University of Technology,

More information

RAWVec A Method for Watermarking Vector Maps

RAWVec A Method for Watermarking Vector Maps RAWVec A Method for Watermarking Vector Maps Douglas Aurélio Marques 1, Karina M. Magalhães 2, Ricardo R. Dahab 2 1 CGU - Controladoria-Geral da União SAS Q1 BL. A - 70070-905 - Brasília - DF - Brazil

More information

Robust Image Watermarking based on DCT-DWT- SVD Method

Robust Image Watermarking based on DCT-DWT- SVD Method Robust Image Watermarking based on DCT-DWT- SVD Sneha Jose Rajesh Cherian Roy, PhD. Sreenesh Shashidharan ABSTRACT Hybrid Image watermarking scheme proposed based on Discrete Cosine Transform (DCT)-Discrete

More information

Robust Watermark Algorithm using Genetic Algorithm

Robust Watermark Algorithm using Genetic Algorithm JOURNAL OF INFORMATION SCIENCE AND ENGINEERING 23, 661-670 (2007) Short Paper Robust Watermark Algorithm using Genetic Algorithm CONG JIN AND SHI-HUI WANG * Department of Computer Science Central China

More information

Mr Mohan A Chimanna 1, Prof.S.R.Khot 2

Mr Mohan A Chimanna 1, Prof.S.R.Khot 2 Digital Video Watermarking Techniques for Secure Multimedia Creation and Delivery Mr Mohan A Chimanna 1, Prof.S.R.Khot 2 1 Assistant Professor,Department of E&Tc, S.I.T.College of Engineering, Yadrav,Maharashtra,

More information

An Oblivious Watermarking for 3-D Polygonal Meshes Using Distribution of Vertex Norms

An Oblivious Watermarking for 3-D Polygonal Meshes Using Distribution of Vertex Norms An Oblivious Watermarking for 3-D Polygonal Meshes Using Distribution of Vertex Norms Jae-Won Cho 1, 2, Rémy Prost 1 and Ho-Youl Jung 2* 1 CREATIS, CNRS #5515, Inserm U630 INSA-UCB Villeurbanne, France

More information

Dimensionality Reduction of Laplacian Embedding for 3D Mesh Reconstruction

Dimensionality Reduction of Laplacian Embedding for 3D Mesh Reconstruction Journal of Physics: Conference Series PAPER OPEN ACCESS Dimensionality Reduction of Laplacian Embedding for 3D Mesh Reconstruction To cite this article: I Mardhiyah et al 2016 J. Phys.: Conf. Ser. 725

More information

Spectral Compression of Mesh Geometry

Spectral Compression of Mesh Geometry Spectral Compression of Mesh Geometry Zachi Karni, Craig Gotsman SIGGRAPH 2000 1 Introduction Thus far, topology coding drove geometry coding. Geometric data contains far more information (15 vs. 3 bits/vertex).

More information

Content-based Image Retrieval with Color and Texture Features in Neutrosophic Domain

Content-based Image Retrieval with Color and Texture Features in Neutrosophic Domain 3rd International Conference on Pattern Recognition and Image Analysis (IPRIA 2017) April 19-20, 2017 Content-based Image Retrieval ith Color and Texture Features in Neutrosophic Domain Abdolreza Rashno

More information

Video Seamless Splicing Method Based on SURF Algorithm and Harris Corner Points Detection

Video Seamless Splicing Method Based on SURF Algorithm and Harris Corner Points Detection Vol13 (Softech 016), pp138-14 http://dxdoiorg/101457/astl016137 Video Seamless Splicing Method Based on SURF Algorithm and Harris Corner Points Detection Dong Jing 1, Chen Dong, Jiang Shuen 3 1 College

More information

DIGITAL watermarking has been studied over many years

DIGITAL watermarking has been studied over many years IEEE TRANSACTIONS ON VISUALIZATION AND COMPUTER GRAPHICS, VOL. 15, NO. 2, MARCH/APRIL 2009 285 A New Watermarking Method for 3D Models Based on Integral Invariants Yu-Ping Wang and Shi-Min Hu, Member,

More information

Polygonal mesh watermarking using Laplacian coordinates

Polygonal mesh watermarking using Laplacian coordinates Eurographics Symposium on Geometry Processing 1 Olga Sorkine and Bruno Lévy (Guest Editors) Volume 9 (1), Number 5 Polygonal mesh watermarking using Laplacian coordinates Y. Yang and I. Ivrissimtzis School

More information

QUANTIZATION WATERMARKING IN THE JPEG2000 CODING PIPELINE

QUANTIZATION WATERMARKING IN THE JPEG2000 CODING PIPELINE 69 QUANTIZATION WATERMARKING IN THE JPEG2000 CODING PIPELINE Peter Meerwald Department of Scientific Computing, University of Salzburg, Jakob-Haringer-Str. 2, A-5020 Salzburg, Austria pmeerw

More information

Chapter 4. Clustering Core Atoms by Location

Chapter 4. Clustering Core Atoms by Location Chapter 4. Clustering Core Atoms by Location In this chapter, a process for sampling core atoms in space is developed, so that the analytic techniques in section 3C can be applied to local collections

More information

Robust Wide Baseline Point Matching Based on Scale Invariant Feature Descriptor

Robust Wide Baseline Point Matching Based on Scale Invariant Feature Descriptor Chinese Journal of Aeronautics 22(2009) 70-74 Chinese Journal of Aeronautics www.elsevier.com/locate/cja Robust Wide Baseline Point Matching Based on Scale Invariant Feature Descriptor Yue Sicong*, Wang

More information

Illumination-Robust Face Recognition based on Gabor Feature Face Intrinsic Identity PCA Model

Illumination-Robust Face Recognition based on Gabor Feature Face Intrinsic Identity PCA Model Illumination-Robust Face Recognition based on Gabor Feature Face Intrinsic Identity PCA Model TAE IN SEOL*, SUN-TAE CHUNG*, SUNHO KI**, SEONGWON CHO**, YUN-KWANG HONG*** *School of Electronic Engineering

More information

Recent Researches in Applied Informatics and Remote Sensing

Recent Researches in Applied Informatics and Remote Sensing A New Robust Digital Watermarking Algorithm Based on Genetic Algorithms and Neural Networks PRAYOTH KUMSAWAT 1, KASAMA PASITWILITHAM 1, KITTI ATTAKITMONGCOL 2 AND ARTHIT SRIKAEW 2 1 School of Telecommunication

More information

Robust biometric image watermarking for fingerprint and face template protection

Robust biometric image watermarking for fingerprint and face template protection Robust biometric image watermarking for fingerprint and face template protection Mayank Vatsa 1, Richa Singh 1, Afzel Noore 1a),MaxM.Houck 2, and Keith Morris 2 1 West Virginia University, Morgantown,

More information