A New Watermarking Algorithm for Point Model Using Angle Quantization Index Modulation. Feng Xiaoqing
|
|
- Oswald Davis
- 5 years ago
- Views:
Transcription
1 4th National Conference on Electrical, Electronics and Computer Engineering (NCEECE 015) A Ne Watermarking Algorithm for Point Model Using Angle Quantization Index Modulation Feng Xiaoqing Institute of Computer Application echniques, Zhejiang University of Finance & Economics, China zllinda13@sohu.com Keyords: point cloud; Angle Quantization Index Modulation; PCA Abstract. Point cloud models are idely used in industry. It is also faced ith increasingly serious copyright protection issues. A ne atermarking algorithm of 3D point cloud model using angle quantization index modulation is proposed. At first, a point cloud model is segmented into many patches according to the length of atermark information. hen, for each patch, 1 bit atermark is embedded into by modulating the angle of feature signal. Experiments sho that the algorithm is certain robustness against affine transformation, reorder and lo intensity of noise. Introduction Digital atermarking by inserting some invisible information is an effective method to protect copyright of digital media. People mainly focused on images [1] and videos []. And fe orks have been done on point model. Hoever, point cloud model can express a complicated object only by point information. his character makes point cloud used idely in fields of computer graphic. It is becoming urgent to research a practical atermark algorithm for point clouds. So far, several point cloud atermark schemes have been developed. A fast hierarchical clustering algorithm is applied to partition patches by Cott [3]. hen, Laplacian eigen-functions of each patch are achieved to insert atermark. It is robust against attacks, including affine transformations, cropping, noising and resampling. Ohbuchi et al. extend a mesh atermarking algorithm to point models [4]. So, it need generates a non-manifold mesh for each cluster of the points. hen, avelet-based spectral analysis technique proposed by Zachi Karni[5] is applied to insert into atermark. o atermark algorithms in above are non-blind atermark because original point model is need provided during extraction. Zhu proposed an improved AQIM algorithm [6], and prove the effectiveness of the scheme on images. In this paper, e extend this image AQIM algorithm to 3D point cloud models. Because there is not inherent order to sho point cloud like image from left to right, a point cloud model should be sorted in a certain order. Furthermore, for decreasing the distortion causing by embedding atermark into model, a point model need to divided into many groups according to the numbers of atermark bit. For each group, 1 bit atermark are embedded into by an angle quantization index modulation scheme. he remainder of this paper is organized as follos. In Section, related ork is described. An improved AQIM atermarking is described in detail in Section 3. he performance of algorithm is shon in section 4. Finally the future ork is looked forard in Section 5. elated orks Watermarking algorithms based on QIM he QIM scheme proposed by Chen et al. [7] modulate the host signal to its closest code ords according to the atermark bit, as shon in figure 1. Dither modulation (DM) is a kind of basic implementation of QIM. his algorithm can keep a better balance beteen imperceptible, atermark capacity and robustness. So, QIM algorithm is idely used in image atermarking scheme he authors - Published by Atlantis Press 963
2 1-1 1 x Δ Figure 1 Principle of QIM Hoever, the QIM atermarking method does not resist against some attacks, for example, compensation and scaling. For improving the performance of atermarking, a lot of efforts have been done in terms of choosing a suitable quantization feature. hus, many improved methods based on QIM have been proposed, such as the spread-transform dither modulation (SDM) [8], the logarithmic QIM (LQIM) [9], and the angle QIM (AQIM) method [10]. SDM is as an extension of DM in [7], projection feature is quantized along a random direction, hich makes SDM has significant advantages. Logarithmic transform and non-uniform quantization step are used in LQIM, hich makes it can resist against scaling attack. AQIM first introduced in [10] is an extension of the QIM to angle. he different ith traditional QIM method, the angle is quantized instead of quantizing the amplitude values. he angle of vector is changed to the most closed codeline according to embedded atermark bit as shon in Figure.. AQIM algorithm can be simplified described as folloing: 1) he angle of the host vector is quantized according to quantizers Q(). θ + m Q( θ ) = + m ) Change the angle of the vector to closest code ords to obtain the atermarked vector. Figure AQIM algorithm Figure.3 he relationship beteen x, y, z and r,θ,φ Although the types of a carrier signal are not any restricted in QIM, they are not directly applied to 3D model. Darazi [11] developed a sparse QIM for 3D mesh models. he scheme of quantization the distance of vertex in the spherical coordinate system makes the algorithm robust to affine transformation. In our QIM of 3D point model, e adopt Darazi s scheme to against affine transformation. he atermarking algorithm We are inspired by papers [6,10]. And e try to apply this algorithm [6] to 3D point cloud model. In this section, a novel atermarking algorithm for point cloud model based on AQIM ill be descried in detail. he block diagram of this method is shon in Figure
3 Figure 4 he block diagram of the atermark algorithm A ne coordinate system of a point cloud model is constructed by PCA, and then, the Cartesian coordinates vi = ( xi, yi, zi) is converted into the spherical coordinates qi = ( ri, qi, ϕi), as shon in figure 3. A distance set D= { ri r1, r,... rn, ri < r i + 1} is divided into some bins according to the length of atermark. For each group, e calculate the angle 1 r1 r... r j... n = =..., j = n r r... r m p+ 1 q n, q = n n. θ = arccos m mu u. Here, In our algorithm, atermarking is embedded by modulating the angle ofθ m. o quantizers QQ 0 ( ) and QQ 1 ( ) are constructed, (, ) d Q Ζ Ζ 1 d 1 0 Ζ = + d and Q1 ( Ζ, ) = d + +. he signal of θ m is quantized by choosing one of quantizers, θ = Q( θm, ), { 1,1}. If θ [ 1,1], θ = θ ± In our embedding, the step size Δ=0.00, hich is an empirical value. Futhermore, atermarked angle signal A is required to satisfy a condition of θa = θ, here θ A has the same definition as θ. he embedding region is the surface of a circular cone ith the axis u and the angle θ A. For getting the minimize distortion causing by embedding, the embedding function is considered as θ project on the cone. Paper [6] descirbe the geometric interpretation of atermark embedding function. Aaccording to [6], = d d and d = λ d + µ Xd can be achieved. Moreover, the value of d satisfies the conditions = 1 and X = cos( θ ). According to these analysis in above, d d d d m 965
4 λ = 1 cos ( θ ) 1 cos ( θ ) atermarked signal and µ = cos( θ ) λcos( θ ) can be calculated. At last, e ill get the, = r 1 r rn bit [... ]. Watermark extracted he process of extraction algorithm is alike to embed process. For achieving the sort order of the original model, resampling operation must be done. he angle of attacked signal f A is calculated. At last, a atermark is extracted by the minimal distance decoder, = arg min θ Q ( θ ). he bit error rate (BE) is used for judging hether there are m { 1,1} A m A atermark embedded in a point model. Simulation results Embedding atermark ill cause geometrical distortion of a point model. HausdorffDist is a common evaluating indicator. So, e use HausdorffDist [1] of r i beteen original and atermarked point model. able 1 provides information of tested point cloud models. In the simulations, a 64 bits of atermark is embedded into a point model. able 1 Point cloud models Original Model NeVenus (10558 points) fo1 (1083 points) miscdino (3984 points) Watermarked Model HausdorffDist ) Affine transformation Affine transformation includes translation, scaling and rotation, hich are a common operation rather than any of attacks. hus, robustness against these operations is very important for a reversible atermark scheme. he simulation experiments of similarity transformation are shon in able. ) eordering Distances beteen points and the center of model is sorted in ascending order, atermark can be integrality extracted after model is attacked by reordering. 3) Noising Binary random noise is added to each vertex of line entities ith different error rates on the model. he experiment results of noising attacks are shon in able 3 and figure
5 Conclusion In this ne atermarking scheme based on AQIM, a point model is divided into many patches according to the numbers of atermarking bit. hen, 1 bit atermark information is embedded into a patch. he experimental results sho that the introduced algorithm is certain robust against some attacks, such as affine transformation, reorder and lo intensity of noise. Hoever, e find that BEs ill become greater ith the increasing of noise intensity. able Experiment results Model ype attacks NeVenus fo1 miscdino similarity transformation re-order strength of noising 0.5% 1/ % 13/64 9/64 5/64 % 6/64 31/64 34/64 5% 8/64 8/64 39/64 Figure 5 Noising attack Acknoledgment his ork is supported by the National Natural Science Foundation of China (No ). eferences [1] E. Nezhadarya, Z. J. Wang,. K. Ward, "obust image atermarking based on multiscale gradient direction quantization". IEEE rans. Inf. Forensics Security, 6( 4), (011), [] H. Y. Chen, Y. S. Zhu,"A robust video atermarking algorithm based on singular value decomposition and slope-based embedding technique". Multimed ools App. DOI /s , 01 [3] D. Cotting,. Weyrich, M. Pauly, M. Gross, "obust Watermarking of Point Sampled Geometry". In: the Proceedings of the international Conference on Shape Modeling and Application, Italy, 004: 33-4 [4] Ohbuchi., Mukaiyama A., akahashi S. "Watermarking a 3D shape model defined as a point set". In: Proceedings of the International Conference on Cyber orlds (CW04), okyo, 004, [5] S. Kanai, H. Date,. Kishinami, "Digital atermarking for 3D polygons using multiresolution avelet decomposition". In: Proceedings of the 6th IFIP WG 5. International Workshop on Geometric Modeling, okyo, 1998, B. Chen and G. W. Wornell, "Quantization index 967
6 modulation: a class of provably good methods for digital atermarking and information embedding". IEEE rans. Inf. heory, 47(4), (001), [6] X. S. Zhu, S. L. Pen, "Novel Quantization Watermarking Based on andom Angle Modulation". In: 011 Seventh International Conference on Computational Intelligence and Security. 16(7), (011), , [7] B. Chen, and G. W. Wornell, "Preprocessed and post processed quantization index modulation methods for migital atermarking", Proc. of the SPIE International Conference on Security and Watermarking of Multimedia, (000), [8] B. Chen, and G. W. Wornell, "Quantization index modulation: a class of provably good methods for digital atermarking and information embedding", Information heory IEEE ransactions on, 47(4), (001), [9] N. K. Kalantari, and S. M. Ahadi, "A logarithmic quantization index modulation for perceptually better data hiding", IEEE transactions on image processing : a publication of the IEEE Signal Processing Society, 19(6), (010), [10] F. Our ıque, V. Licks,. Jordan, and F. P erez-gonz` alez, "Angle qim :a novel atermark embedding scheme robust against amplitude scaling distortions". In Proc. Int. Conf. Acoustics, Speech and Signal Processing, (005), [11]. Darazi,. Hu, and B. Macq, "Applying spread transform dither modulation for 3D-mesh atermarking by using perceptual models", In Proc. IEEE Int. Conf. Acoust., Speech, and Signal Processing (ICASSP'10), Mar. 19, (010), [1] 968
Adaptive Fuzzy Watermarking for 3D Models
International Conference on Computational Intelligence and Multimedia Applications 2007 Adaptive Fuzzy Watermarking for 3D Models Mukesh Motwani.*, Nikhil Beke +, Abhijit Bhoite +, Pushkar Apte +, Frederick
More informationA Wavelet-Based Watermarking for Still Images
Buletinul Ştiinţific al Universităţii "Politehnica" din Timişoara Seria ELECTRONICĂ şi TELECOMUNICAŢII TRANSACTIONS on ELECTRONICS and COMMUNICATIONS Tom 49(63) Fascicola 2 2004 A Wavelet-Based Watermarking
More informationLocal patch blind spectral watermarking method for 3D graphics
Local patch blind spectral watermarking method for 3D graphics Ming Luo 1, Kai Wang 2, Adrian G. Bors 1, and Guillaume Lavoué 2 1 Department of Computer Science, University of York, York YO10 5DD, UK 2
More informationA 3D Mesh Watermarking Based on Improved Vertex Grouping and Piecewise Mapping Function
Journal of Information Hiding and Multimedia Signal Processing c 2017 ISSN 2073-4212 Ubiquitous International Volume 8, Number 1, January 2017 A 3D Mesh Watermarking Based on Improved Vertex Grouping and
More informationA FRACTAL WATERMARKING SCHEME FOR IMAGE IN DWT DOMAIN
A FRACTAL WATERMARKING SCHEME FOR IMAGE IN DWT DOMAIN ABSTRACT A ne digital approach based on the fractal technolog in the Disperse Wavelet Transform domain is proposed in this paper. First e constructed
More informationROBUST BLIND IMAGE WATERMARKING BASED ON MULTI-WAVELET TRANSFORM AND SINGULAR VALUE DECOMPOSITION
Proceeding of 3th Seminar on Harmonic Analysis and Applications, January 2015 ROBUST BLIND IMAGE WATERMARKING BASED ON MULTI-WAVELET TRANSFORM AND SINGULAR VALUE DECOMPOSITION Author: Malihe Mardanpour,
More informationRobust Digital Image Watermarking using Gradient Vector Quantization and Denoising using Contourlet
Robust Digital Image Watermarking using Gradient Vector Quantization and Denoising using Contour 1 I.Kullayamma, 2 V.Harika, 3 K.Radhika 1 Assistant Professor, Department of Electronics and Communication
More informationDigital Watermarking of Still Images using the Discrete Wavelet Transform
Buletinul Ştiinţific al Universităţii "Politehnica" din Timişoara Seria ELECTROICĂ şi TELECOMUICAŢII TRASACTIOS on ELECTROICS and COMMUICATIOS Tom 48(62) Fascicola 1 2003 Digital Watermarking of Still
More informationVertex Shuffling : A Novel Information Hiding on 3D Model
Vertex Shuffling : A Novel Information Hiding on 3D Model Cong-Kai Lin, Charlie Irawan Tan, and Wen-Kai Tai Department of Computer Science and Information Engineering, National Dong Hwa University, Taiwan,
More informationA Robust and Oblivious Watermarking Method Using Wavelet Transform and Genetic Algorithm
.iecs.in International Journal Of Engineering And Computer Science ISSN:39-74 Volume 5 Issue -0 February, 06 Page No. 58-588 A Robust and Oblivious Watermarking Meod Using Wavelet Transform and Genetic
More informationArab Journal of Nuclear Sciences and Applications
Arab J. Nucl. Sci. Appl., Vol. 51, 4, 62-71 (2018) Arab Journal of Nuclear Sciences and Applications ISSN 1110-0451 Web site: ajnsa.journals.ekb.eg (ESNSA) Non-Blind Robust 3D Object Watermarking Scheme
More informationA STEGANALYTIC ALGORITHM FOR 3D POLYGONAL MESHES. Department of Computer Science, Yale University
A STEGANALYTIC ALGORITHM FOR 3D POLYGONAL MESHES Ying Yang Ruggero Pintus, Holly Rushmeier Ioannis Ivrissimtzis Department of Computer Science, Yale University CRS4, Italy School of Engineering and Computing
More informationSPREAD SPECTRUM AUDIO WATERMARKING SCHEME BASED ON PSYCHOACOUSTIC MODEL
SPREAD SPECTRUM WATERMARKING SCHEME BASED ON PSYCHOACOUSTIC MODEL 1 Yüksel Tokur 2 Ergun Erçelebi e-mail: tokur@gantep.edu.tr e-mail: ercelebi@gantep.edu.tr 1 Gaziantep University, MYO, 27310, Gaziantep,
More informationInternational Conference on Information Sciences, Machinery, Materials and Energy (ICISMME 2015)
International Conference on Information Sciences, Machinery, Materials and Energy (ICISMME 2015) Study on Obtaining High-precision Velocity Parameters of Visual Autonomous Navigation Method Considering
More informationA ROBUST 3D WATERMARKING BASED ON FEATURE REGIONS
A ROBUST 3D WATERMARKING BASED ON FEATURE REGIONS Saoussen Ben Jabra and Ezzeddine Zagrouba Institut Supérieur d informatique, Abou Raihane Bayrouni, 2080 l Ariana, Tunisia. Saoussen.bj@laposte.net, ezzeddine.zagrouba@fsm.rnu.tn
More informationAn Improved DCT Based Color Image Watermarking Scheme Xiangguang Xiong1, a
International Symposium on Mechanical Engineering and Material Science (ISMEMS 2016) An Improved DCT Based Color Image Watermarking Scheme Xiangguang Xiong1, a 1 School of Big Data and Computer Science,
More informationAn Algorithm for the Welding Torch Weaving Control of Arc Welding Robot
http://dx.doi.org/0.5755/j0.eee.2.2.599 ELEKTRONIKA IR ELEKTROTECHNIKA, ISSN 392-25, VOL. 2, NO. 2, 205 An Algorithm for the Welding Torch Weaving Control of Arc Welding Robot Wen-liang Zhu, Fu-sheng Ni
More informationSpectral Graph-Theoretic Approach to 3D Mesh Watermarking
Spectral Graph-Theoretic Approach to 3D Mesh Watermarking Emad E. Abdallah Department of Computer Science Concordia University, Montreal, Canada ee abdal@cs.concordia.ca A. Ben Hamza and Prabir Bhattacharya
More informationAn Improved Images Watermarking Scheme Using FABEMD Decomposition and DCT
An Improved Images Watermarking Scheme Using FABEMD Decomposition and DCT Noura Aherrahrou and Hamid Tairi University Sidi Mohamed Ben Abdellah, Faculty of Sciences, Dhar El mahraz, LIIAN, Department of
More informationGeometric Modeling and Processing
Geometric Modeling and Processing Tutorial of 3DIM&PVT 2011 (Hangzhou, China) May 16, 2011 6. Mesh Simplification Problems High resolution meshes becoming increasingly available 3D active scanners Computer
More information3-D D Digital Watermarking
CORESA 2007, Montpellier 3-D D Digital Watermarking Adrian G. Bors University of York Computer Science Department YORK Y010 5DD, UK adrian.bors@cs.york.ac.uk 9 November 2007 Outline Overview of 3D watermarking
More informationContour Error Decoupling Compensation for Non-circular Grinding Qi-guang LI 1,a, Qiu-shi HAN 1, Wei-hua LI 2 and Bao-ying PENG 1
07 nd International Conference on Applied Mechanics, Electronics and Mechatronics Engineering (AMEME 07) ISBN: 978--60595-497-4 Contour Error Decoupling Compensation for Non-circular Grinding Qi-guang
More informationA New Spatial q-log Domain for Image Watermarking
1 Ta Minh Thanh, 2 Pham Thanh Hiep, 3 Ta Minh Tam 1 Department of Network Security, Le Quy Don Technical University, 100 Hoang Quoc Viet, Cau Giay, Hanoi, Vietnam. E-mail: taminhjp@gmail.com 2 Le Quy Don
More informationAudio Watermarking using Empirical Mode Decomposition
Audio Watermarking using Empirical Mode Decomposition Charulata P. Talele 1, Dr A. M. Patil 2 1ME Student, Electronics and Telecommunication Department J. T. Mahajan College of Engineering, Faizpur, Maharashtra,
More informationAn Edge Detection Method Using Back Propagation Neural Network
RESEARCH ARTICLE OPEN ACCESS An Edge Detection Method Using Bac Propagation Neural Netor Ms. Utarsha Kale*, Dr. S. M. Deoar** *Department of Electronics and Telecommunication, Sinhgad Institute of Technology
More informationBlind watermarking of 3D shapes using localized constraints
Blind watermarking of 3D shapes using localized constraints Adrian G. Bors Dept. of Computer Science, University of York, York YO DD, U.K. E-mail: adrian.bors@cs.york.ac.uk Abstract This paper develops
More informationAccepted Manuscript. Optimization approach for 3D model watermarking by linear binary programming. Yu-Ping Wang, Shi-Min Hu
Accepted Manuscript Optimization approach for 3D model watermarking by linear binary programming Yu-Ping Wang, Shi-Min Hu PII: S0167-8396(10)00024-5 DOI: 10.1016/j.cagd.2010.02.003 Reference: COMAID 1208
More informationENTROPY-BASED IMAGE WATERMARKING USING DWT AND HVS
SETIT 2005 3 rd International Conference: Sciences of Electronic, Technologies of Information and Telecommunications March 27-31, 2005 TUNISIA ENTROPY-BASED IMAGE WATERMARKING USING DWT AND HVS Shiva Zaboli
More informationEnhanced Watermarking Scheme for 3D Mesh Models
Enhanced Watermarking Scheme for 3D Mesh Models Lamiaa Basyoni College of Computing and Information Technology Arab Academy of Science and Technology Cairo, Egypt lamiaa.basyoni@gmail.com H. I. Saleh Radiation
More informationPARTICLE SWARM OPTIMIZATION (PSO) [1] is an
Proceedings of International Joint Conference on Neural Netorks, Atlanta, Georgia, USA, June -9, 9 Netork-Structured Particle Sarm Optimizer Considering Neighborhood Relationships Haruna Matsushita and
More informationCOPYRIGHT PROTECTION OF PALETTE IMAGES BY A ROBUST LOSSLESS VISIBLE WATERMARKING TECHNIQUE *
COPYIGHT POTECTION OF PALETTE IMAGES BY A OBUST LOSSLESS VISIBLE WATEMAKING TECHNIQUE * Pei-Pei Chen ( 陳佩貝 ) and Wen-Hsiang Tsai ( 蔡文祥 ), Dept of Computer Science, National Chiao Tung University, Hsinchu,
More informationIEEE TRANSACTIONS ON MULTIMEDIA, VOL. 10, NO. 8, DECEMBER /$ IEEE
IEEE TRANSACTIONS ON MULTIMEDIA, VOL. 10, NO. 8, DECEMBER 2008 1513 A Comprehensive Survey on Three-Dimensional Mesh Watermarking Kai Wang, Guillaume Lavoué, Florence Denis, and Atilla Baskurt Abstract
More informationFRACTAL 3D MODELING OF ASTEROIDS USING WAVELETS ON ARBITRARY MESHES 1 INTRODUCTION: FRACTAL SURFACES IN NATURE
1 FRACTAL D MODELING OF ASTEROIDS USING WAVELETS ON ARBITRARY MESHES André Jalobeanu Automated Learning Group, USRA/RIACS NASA Ames Research Center MS 269-4, Moffett Field CA 9405-1000, USA ajalobea@email.arc.nasa.gov
More informationImage and Video Watermarking
Telecommunications Seminar WS 1998 Data Hiding, Digital Watermarking and Secure Communications Image and Video Watermarking Herbert Buchner University of Erlangen-Nuremberg 16.12.1998 Outline 1. Introduction:
More informationDigital Invisible Ink and its Applications in Steganography
Digital Invisible Ink and its Applications in Steganography Chun-Hsiang Huang Dept. of CSIE, National aian Univ. 886-2-23625336 ext 23 bh@cmlab.csie.ntu.edu.t Shang-Chih Chuang Dept. of CSIE, National
More informationCOPYRIGHT PROTECTION OF PALETTE IMAGES BY A ROBUST LOSSLESS VISIBLE WATERMARKING TECHNIQUE *
COPYRIGHT PROTECTION OF PALETTE IMAGES BY A ROBUST LOSSLESS VISIBLE WATERMARKING TECHNIQUE * Pei-Pei Chen ( 陳佩貝 ) 1 and Wen-Hsiang Tsai ( 蔡文祥 ) 1, 2 1 Dept. of Computer Science, National Chiao Tung University,
More informationContrast Improvement on Various Gray Scale Images Together With Gaussian Filter and Histogram Equalization
Contrast Improvement on Various Gray Scale Images Together With Gaussian Filter and Histogram Equalization I M. Rajinikannan, II A. Nagarajan, III N. Vallileka I,II,III Dept. of Computer Applications,
More informationThree-Dimensional Meshes Watermarking: Review and Attack-Centric Investigation
Three-Dimensional Meshes Watermarking: Review and Attack-Centric Investigation Kai Wang 1, Guillaume Lavoué 1, Florence Denis 2, and Atilla Baskurt 1 1 LIRIS, UMR 5205 CNRS, INSA-Lyon, F-69621 Villeurbanne,
More informationBLIND 3D MODEL WATERMARKING BASED ON MULTI-RESOLUTION REPRESENTATION AND FUZZY LOGIC
BLIND 3D MODEL WATERMARKING BASED ON MULTI-RESOLUTION REPRESENTATION AND FUZZY LOGIC 1 Prof. Sharvari C. Tamane, 2 Dr. Ratnadeep R. Deshmukh, 1 MGM s Jawaharlal Nehru Engineering College sharvaree73@yahoo.com
More informationA REAL-TIME REGISTRATION METHOD OF AUGMENTED REALITY BASED ON SURF AND OPTICAL FLOW
A REAL-TIME REGISTRATION METHOD OF AUGMENTED REALITY BASED ON SURF AND OPTICAL FLOW HONGBO LI, MING QI AND 3 YU WU,, 3 Institute of Web Intelligence, Chongqing University of Posts and Telecommunications,
More informationMultibit Digital Watermarking Robust against Local Nonlinear Geometrical Distortions
Multibit Digital Watermarking Robust against Local Nonlinear Geometrical Distortions Sviatoslav Voloshynovskiy Frédéric Deguillaume, and Thierry Pun CUI - University of Geneva 24, rue du Général Dufour
More informationA NEW FRAGILE MESH WATERMARKING ALGORITHM FOR AUTHENTICATION
A NEW FRAGILE MESH WATERMARKING ALGORITHM FOR AUTHENTICATION Hao-Tian Wu and Yiu-Ming Cheung Department of Computer Science, Hong Kong Baptist University, Hong Kong, China Abstract: Key words: In this
More informationA NEW DCT-BASED WATERMARKING METHOD FOR COPYRIGHT PROTECTION OF DIGITAL AUDIO
International journal of computer science & information Technology (IJCSIT) Vol., No.5, October A NEW DCT-BASED WATERMARKING METHOD FOR COPYRIGHT PROTECTION OF DIGITAL AUDIO Pranab Kumar Dhar *, Mohammad
More informationA Novel Fast Self-restoration Semi-fragile Watermarking Algorithm for Image Content Authentication Resistant to JPEG Compression
A Novel Fast Self-restoration Semi-fragile Watermarking Algorithm for Image Content Authentication Resistant to JPEG Compression Hui Wang, Anthony TS Ho and Xi Zhao 24 th October 2011 Outline Background
More informationLecture 1: Turtle Graphics. the turtle and the crane and the swallow observe the time of their coming; Jeremiah 8:7
Lecture 1: Turtle Graphics the turtle and the crane and the sallo observe the time of their coming; Jeremiah 8:7 1. Turtle Graphics Motion generates geometry. The turtle is a handy paradigm for investigating
More informationA Robust Watermarking Algorithm For JPEG Images
nd Joint International Information Technology, Mechanical and Electronic Engineering Conference (JIMEC 7) A Robust Watermarking Algorithm For JPEG Images Baosheng Sun, Daofu Gong*, Fenlin Liu *Foundation
More informationMixture models and clustering
1 Lecture topics: Miture models and clustering, k-means Distance and clustering Miture models and clustering We have so far used miture models as fleible ays of constructing probability models for prediction
More informationFace Recognition Using Vector Quantization Histogram and Support Vector Machine Classifier Rong-sheng LI, Fei-fei LEE *, Yan YAN and Qiu CHEN
2016 International Conference on Artificial Intelligence: Techniques and Applications (AITA 2016) ISBN: 978-1-60595-389-2 Face Recognition Using Vector Quantization Histogram and Support Vector Machine
More informationDetecting Printed and Handwritten Partial Copies of Line Drawings Embedded in Complex Backgrounds
9 1th International Conference on Document Analysis and Recognition Detecting Printed and Handwritten Partial Copies of Line Drawings Embedded in Complex Backgrounds Weihan Sun, Koichi Kise Graduate School
More informationData Hiding in Video
Data Hiding in Video J. J. Chae and B. S. Manjunath Department of Electrical and Computer Engineering University of California, Santa Barbara, CA 9316-956 Email: chaejj, manj@iplab.ece.ucsb.edu Abstract
More informationAdvanced Digital Image Forgery Detection by Using SIFT
RESEARCH ARTICLE OPEN ACCESS Advanced Digital Image Forgery Detection by Using SIFT Priyanka G. Gomase, Nisha R. Wankhade Department of Information Technology, Yeshwantrao Chavan College of Engineering
More informationPiecewise Permutation Steganography for 3D Humanoid Mesh Models
Piecewise Permutation Steganography for 3D Humanoid Mesh Models Hsin-Chih Lin* and Shan-Jhu Lin Department of Information and Learning Technology National University of Tainan Tainan City, Taiwan * hclin@mail.nutn.edu.tw
More informationA Robust Spectral Approach for Blind Watermarking of Manifold Surfaces
A Robust Spectral Approach for Blind Watermarking of Manifold Surfaces Yang Liu Dept. of Computer Science University of Texas at Dallas Richardson, TX 75080, USA yxl072100@utdallas.edu Balakrishnan Prabhakaran
More informationRobust Watermarking of Point-Sampled Geometry
Robust Watermarking of Point-Sampled Geometry Daniel Cotting 1 Tim Weyrich 1 Mark Pauly 2 Markus Gross 1 1 Computer Graphics Laboratory Swiss Federal Institute of Technology (ETH) Zurich, Switzerland {dcotting,
More informationSpectral Watermarking for Parameterized Surfaces
1 Spectral Watermarking for Parameterized Surfaces Yang Liu, Balakrishnan Prabhakaran, Xiaohu Guo Abstract This paper presents a blind spectral 2-way watermarking framework for 3D models with parametric
More informationAudio Watermarking using Colour Image Based on EMD and DCT
Audio Watermarking using Colour Image Based on EMD and Suhail Yoosuf 1, Ann Mary Alex 2 P. G. Scholar, Department of Electronics and Communication, Mar Baselios College of Engineering and Technology, Trivandrum,
More informationA Robust Hybrid Blind Digital Image Watermarking System Using Discrete Wavelet Transform and Contourlet Transform
A Robust Hybrid Blind Digital Image System Using Discrete Wavelet Transform and Contourlet Transform Nidal F. Shilbayeh, Belal AbuHaija, Zainab N. Al-Qudsy Abstract In this paper, a hybrid blind digital
More informationWatermarking of Image Using Priority Based On Algorithms
This work by IJARBEST is licensed under Creative Commons Attribution 4.0 International License. Available at https://www.ijarbest.com Watermarking of Image Using Priority Based On Algorithms B.Aarthi,
More informationContext based optimal shape coding
IEEE Signal Processing Society 1999 Workshop on Multimedia Signal Processing September 13-15, 1999, Copenhagen, Denmark Electronic Proceedings 1999 IEEE Context based optimal shape coding Gerry Melnikov,
More informationA Joint DWT-DCT Based Watermarking Technique for Avoiding Unauthorized Replication
A oint DT-DCT Based atermarking Technique for Avoiding Unauthorized Replication Kaushik Deb 1, Md. Sajib Al-Seraj 1, Mir Md. Saki Kowsar 1 and Iqbal Hasan Sarkar 1 1 Department of Computing Science and
More informationA Practical Print-and-Scan Resilient Watermarking for High Resolution Images
A Practical Print-and-Scan Resilient Watermaring for High Resolution Images Yongping Zhang, Xiangui Kang 2, and Philipp Zhang 3 Research Department, Hisilicon Technologies Co., Ltd, 00094 Beijing, China.
More informationRobust Image Watermarking based on Discrete Wavelet Transform, Discrete Cosine Transform & Singular Value Decomposition
Advance in Electronic and Electric Engineering. ISSN 2231-1297, Volume 3, Number 8 (2013), pp. 971-976 Research India Publications http://www.ripublication.com/aeee.htm Robust Image Watermarking based
More informationA Benchmark for 3D Mesh Watermarking
2010 Shape Modeling International Conference A Benchmark for 3D Mesh Watermarking Kai WANG 1, Guillaume Lavoué 1, Florence Denis 2, Atilla Baskurt 1 Université de Lyon, CNRS INSA-Lyon 1 / Université Lyon
More informationA Robust Image Zero-Watermarking Algorithm Based on DWT and PCA
A Robust Image Zero-Watermarking Algorithm Based on DWT and PCA Xiaoxu Leng, Jun Xiao, and Ying Wang Graduate University of Chinese Academy of Sciences, 100049 Beijing, China lengxiaoxu@163.com, {xiaojun,ywang}@gucas.ac.cn
More informationBlind QIM-LDPC Watermarking of 3D-Meshes
Blind QIM-LDPC Watermarking of 3D-Meshes (Invited Paper) Bata Vasic Department of Electronic University of Nis, Faculty of Electronic Engineering Nis, Serbia bata.vasic@elfak.ni.ac.rs Abstract We introduce
More informationComparison of Wavelet Based Watermarking Techniques for Various Attacks
International Journal of Engineering and Technical Research (IJETR) ISSN: 2321-0869, Volume-3, Issue-4, April 2015 Comparison of Wavelet Based Watermarking Techniques for Various Attacks Sachin B. Patel,
More informationA dynamic programming algorithm for perceptually consistent stereo
A dynamic programming algorithm for perceptually consistent stereo The Harvard community has made this article openly available. Please share ho this access benefits you. Your story matters. Citation Accessed
More informationResearch Article Novel Iris Biometric Watermarking Based on Singular Value Decomposition and Discrete Cosine Transform
Mathematical Problems in Engineering, Article I 926170, 6 pages http://dx.doi.org/10.1155/2014/926170 Research Article Novel Iris Biometric Watermarking Based on Singular Value ecomposition and iscrete
More informationA Benchmark for 3D Mesh Watermarking
IEEE INTERNATIONAL CONFERENCE ON SHAPE MODELING AND APPLICATIONS (SMI) 2010 1 A Benchmark for 3D Mesh Watermarking Kai Wang 1, Guillaume Lavoué 1, Florence Denis 2, Atilla Baskurt 1, and Xiyan He 3 1,2
More informationRECENT advances in 3D acquisition technologies, 3D graphics rendering and geometric modeling have boosted
RESEARCH REPORT OF LIRIS 1 Robust and Blind Watermarking of Polygonal Meshes Based on Volume Moments Kai Wang, Guillaume Lavoué, Florence Denis, and Atilla Baskurt Abstract This paper describes a robust
More information142 IEEE TRANSACTIONS ON SIGNAL PROCESSING, VOL. 55, NO. 1, JANUARY 2007
142 IEEE TRANSACTIONS ON SIGNAL PROCESSING, VOL. 55, NO. 1, JANUARY 2007 An Oblivious Watermarking for 3-D Polygonal Meshes Using Distribution of Vertex Norms Jae-Won Cho, Rémy Prost, and Ho-Youl Jung
More informationWavelet-Based Blind Watermarking of 3D Models
Wavelet-Based Blind Watermarking of 3D Models F. Uccheddu Department of Electronic and Telecommunications University of Florence Via S. Marta 3 50139, Firenze, Italy uccheddu@lci.det.unifi.it M. Corsini
More informationOpen Access Side-Informed Image Watermarking Scheme Based on Dither Modulation in the Frequency Domain
Send Orders for Reprints to reprints@benthamscience.net The Open Signal Processing Journal, 2013, 5, 1-6 1 Open Access Side-Informed Image ing Scheme Based on Dither Modulation in the Frequency Domain
More informationA Robust Wavelet-Based Watermarking Algorithm Using Edge Detection
A Robust Wavelet-Based Watermarking Algorithm Using Edge Detection John N. Ellinas Abstract In this paper, a robust watermarking algorithm using the wavelet transform and edge detection is presented. The
More informationAn Analysis of Interference as a Source for Diffraction
J. Electromagnetic Analysis & Applications, 00,, 60-606 doi:0.436/jemaa.00.0079 Published Online October 00 (http://.scirp.org/journal/jemaa) 60 An Analysis of Interference as a Source for Diffraction
More informationDTM Based on an Ellipsoidal Squares
DM Based on an Ellipsoidal Squares KRZYSZOF NAUS Institute of Navigation and Hydrography Polish Naval Academy Śmidoicza 69, 8-3 Gdynia POLAND k.naus@am.gdynia.pl Abstract: - he paper presents the description
More informationChapter 1. Turtle Graphics. 1.1 Turtle Graphics. The turtle and the crane and the swallow observe the time of their coming Jeremiah 8:7
Goldman/An Integrated Introduction to Computer Graphics and Geometric Modeling K10188_C001 Revise Proof page 3 26.3.2009 7:54am Compositor Name: VAmoudavally Chapter 1 Turtle Graphics The turtle and the
More informationRobust Blind Watermarking Mechanism For Motion Data Streams
Robust Blind Watermarking Mechanism For Motion Data Streams Parag Agarwal Ketaki Adi B. Prabhakaran Department of Computer Science, University of Texas at Dallas MS EC 31, PO Box 830688, Richardson, TX
More informationAn efficient face recognition algorithm based on multi-kernel regularization learning
Acta Technica 61, No. 4A/2016, 75 84 c 2017 Institute of Thermomechanics CAS, v.v.i. An efficient face recognition algorithm based on multi-kernel regularization learning Bi Rongrong 1 Abstract. A novel
More informationImage Quality Assessment based on Improved Structural SIMilarity
Image Quality Assessment based on Improved Structural SIMilarity Jinjian Wu 1, Fei Qi 2, and Guangming Shi 3 School of Electronic Engineering, Xidian University, Xi an, Shaanxi, 710071, P.R. China 1 jinjian.wu@mail.xidian.edu.cn
More informationA Method to Eliminate Wrongly Matched Points for Image Matching
2017 2nd International Seminar on Applied Physics, Optoelectronics and Photonics (APOP 2017) ISBN: 978-1-60595-522-3 A Method to Eliminate Wrongly Matched Points for Image Matching Xiao-fei AI * ABSTRACT
More informationBlind digital watermarking in PDF documents using Spread Transform Dither Modulation.
Noname manuscript No. (will be inserted by the editor) Blind digital watermarking in PDF documents using Spread Transform Dither Modulation. Ahmad W. Bitar 1, Rony Darazi 1, Jean-François Couchot 2 and
More informationRobust Zero Watermarking for Still and Similar Images Using a Learning Based Contour Detection
Robust Zero Watermarking for Still and Similar Images Using a Learning Based Contour Detection Shahryar Ehsaee and Mansour Jamzad (&) Department of Computer Engineering, Sharif University of Technology,
More informationRAWVec A Method for Watermarking Vector Maps
RAWVec A Method for Watermarking Vector Maps Douglas Aurélio Marques 1, Karina M. Magalhães 2, Ricardo R. Dahab 2 1 CGU - Controladoria-Geral da União SAS Q1 BL. A - 70070-905 - Brasília - DF - Brazil
More informationRobust Image Watermarking based on DCT-DWT- SVD Method
Robust Image Watermarking based on DCT-DWT- SVD Sneha Jose Rajesh Cherian Roy, PhD. Sreenesh Shashidharan ABSTRACT Hybrid Image watermarking scheme proposed based on Discrete Cosine Transform (DCT)-Discrete
More informationRobust Watermark Algorithm using Genetic Algorithm
JOURNAL OF INFORMATION SCIENCE AND ENGINEERING 23, 661-670 (2007) Short Paper Robust Watermark Algorithm using Genetic Algorithm CONG JIN AND SHI-HUI WANG * Department of Computer Science Central China
More informationMr Mohan A Chimanna 1, Prof.S.R.Khot 2
Digital Video Watermarking Techniques for Secure Multimedia Creation and Delivery Mr Mohan A Chimanna 1, Prof.S.R.Khot 2 1 Assistant Professor,Department of E&Tc, S.I.T.College of Engineering, Yadrav,Maharashtra,
More informationAn Oblivious Watermarking for 3-D Polygonal Meshes Using Distribution of Vertex Norms
An Oblivious Watermarking for 3-D Polygonal Meshes Using Distribution of Vertex Norms Jae-Won Cho 1, 2, Rémy Prost 1 and Ho-Youl Jung 2* 1 CREATIS, CNRS #5515, Inserm U630 INSA-UCB Villeurbanne, France
More informationDimensionality Reduction of Laplacian Embedding for 3D Mesh Reconstruction
Journal of Physics: Conference Series PAPER OPEN ACCESS Dimensionality Reduction of Laplacian Embedding for 3D Mesh Reconstruction To cite this article: I Mardhiyah et al 2016 J. Phys.: Conf. Ser. 725
More informationSpectral Compression of Mesh Geometry
Spectral Compression of Mesh Geometry Zachi Karni, Craig Gotsman SIGGRAPH 2000 1 Introduction Thus far, topology coding drove geometry coding. Geometric data contains far more information (15 vs. 3 bits/vertex).
More informationContent-based Image Retrieval with Color and Texture Features in Neutrosophic Domain
3rd International Conference on Pattern Recognition and Image Analysis (IPRIA 2017) April 19-20, 2017 Content-based Image Retrieval ith Color and Texture Features in Neutrosophic Domain Abdolreza Rashno
More informationVideo Seamless Splicing Method Based on SURF Algorithm and Harris Corner Points Detection
Vol13 (Softech 016), pp138-14 http://dxdoiorg/101457/astl016137 Video Seamless Splicing Method Based on SURF Algorithm and Harris Corner Points Detection Dong Jing 1, Chen Dong, Jiang Shuen 3 1 College
More informationDIGITAL watermarking has been studied over many years
IEEE TRANSACTIONS ON VISUALIZATION AND COMPUTER GRAPHICS, VOL. 15, NO. 2, MARCH/APRIL 2009 285 A New Watermarking Method for 3D Models Based on Integral Invariants Yu-Ping Wang and Shi-Min Hu, Member,
More informationPolygonal mesh watermarking using Laplacian coordinates
Eurographics Symposium on Geometry Processing 1 Olga Sorkine and Bruno Lévy (Guest Editors) Volume 9 (1), Number 5 Polygonal mesh watermarking using Laplacian coordinates Y. Yang and I. Ivrissimtzis School
More informationQUANTIZATION WATERMARKING IN THE JPEG2000 CODING PIPELINE
69 QUANTIZATION WATERMARKING IN THE JPEG2000 CODING PIPELINE Peter Meerwald Department of Scientific Computing, University of Salzburg, Jakob-Haringer-Str. 2, A-5020 Salzburg, Austria pmeerw
More informationChapter 4. Clustering Core Atoms by Location
Chapter 4. Clustering Core Atoms by Location In this chapter, a process for sampling core atoms in space is developed, so that the analytic techniques in section 3C can be applied to local collections
More informationRobust Wide Baseline Point Matching Based on Scale Invariant Feature Descriptor
Chinese Journal of Aeronautics 22(2009) 70-74 Chinese Journal of Aeronautics www.elsevier.com/locate/cja Robust Wide Baseline Point Matching Based on Scale Invariant Feature Descriptor Yue Sicong*, Wang
More informationIllumination-Robust Face Recognition based on Gabor Feature Face Intrinsic Identity PCA Model
Illumination-Robust Face Recognition based on Gabor Feature Face Intrinsic Identity PCA Model TAE IN SEOL*, SUN-TAE CHUNG*, SUNHO KI**, SEONGWON CHO**, YUN-KWANG HONG*** *School of Electronic Engineering
More informationRecent Researches in Applied Informatics and Remote Sensing
A New Robust Digital Watermarking Algorithm Based on Genetic Algorithms and Neural Networks PRAYOTH KUMSAWAT 1, KASAMA PASITWILITHAM 1, KITTI ATTAKITMONGCOL 2 AND ARTHIT SRIKAEW 2 1 School of Telecommunication
More informationRobust biometric image watermarking for fingerprint and face template protection
Robust biometric image watermarking for fingerprint and face template protection Mayank Vatsa 1, Richa Singh 1, Afzel Noore 1a),MaxM.Houck 2, and Keith Morris 2 1 West Virginia University, Morgantown,
More information