A WATERMARKING METHOD RESISTANT TO GEOMETRIC ATTACKS

Size: px
Start display at page:

Download "A WATERMARKING METHOD RESISTANT TO GEOMETRIC ATTACKS"

Transcription

1 A WATERMARKING METHOD RESISTANT TO GEOMETRIC ATTACKS D. Simitopoulos, D. Koutsonanos and M.G. Strintzis Informatics and Telematics Institute Thermi-Thessaloniki, Greece. Abstract In this paper, a novel watermarking scheme able to resist geometric attacks is analyzed. The proposed method performs watermarking of images in the raw domain. A perceptual model is used in order to define the strength of the embedded watermark. For resistance to scaling and rotation attacks, two generalized Radon transformations of the image are introduced, while resistance to translation is accomplished through a localization of the watermarking method based on feature points of the image. Experimental evaluation demonstrates that the proposed scheme is able to withstand a variety of attacks including common geometric attacks. INTRODUCTION Watermarking of images is a technology that has attracted a lot of attention the recent years. In order to verify the robustness of the proposed watermarking schemes, a variety of attacks may be imposed to the image []. Among them, geometric attacks such as scaling, rotation and translation are easy to apply and may lead many watermark detectors to total failure due to loss of synchronization between the embedded and the correlating watermark. Lately, a lot of watermarking methods resistant to geometric attacks were presented in the literature. These may be divided in three categories. In some approaches, the watermark embedding is performed in a domain invariant to geometric attacks [2], while in others an additional pattern is embedded in the image in order to be able to revert the geometric attack [3]. Yet another approach for resisting geometric attacks is based on geometrically transforming a reference watermark both in the embedding and detection (correlation) according to a characteristic of the image content. A similar approach was presented in [4] where characteristics of the image content were extracted using Principal Component Analysis. The watermarking method presented in this paper, is also based on the latter approach to geometric resistant watermarking. First a corner detection scheme detects corners in the image content and finds the most robust among them. This corner is used as an origin for two onedimensional generalized Radon transformations that are applied to the image. According to characteristic values extracted from the two transformations during the embedding and detection of the watermark, a reference watermark is scaled and rotated before embedding or correlation-based detection respectively. This way, synchronization between the embedding and the correlating watermark is achieved. The experimental results demonstrate the resistance of the proposed scheme to geometric attacks as well as other common attacks. One- Dimensional Generalized Radon Transformations One-Dimensional Generalized Radon Transformations Two one-dimensional generalized Radon transformations [5] for resistance to scaling and rotation attacks respectively are introduced. The Radial Integration Transform (RIT) is used to 36

2 deal with rotation attacks, while the Circular Integration Transform (CIT) is used to cope with scaling attacks. Radial Integration Transform The RIT of a function f(x,y) is defined as the integral along a straight line that begins from the origin (x o,y o ) and has angle θ with respect to the horizontal axis (see Fig.a) The RIT is given by the following equation: + ( θ) = ( + cosθ, + sin ) where u is the distance from the origin (x o,y o ). Rf f xo u yo u θ du () 0 x y If f(x,y) is an image and g( x, y) = f, is the image scaled by s (s>0) in both s s directions, then the RIT of image g(x,y) is given by: R ( θ ) = sr ( θ ) g f (2) Therefore, the RIT amplitude of the scaled image is only multiplied by the factor s. If f (, r ϕ ) is an image written in polar form and gr (, ϕ) = f( r, ϕ ϕa ) is the image rotated byφ a around the ( r, φ ) system origin, then the RIT of image grϕ (, ) is given by: R ( θ ) = R ( θ φ ) g f a (3) Therefore, the RIT of the rotated image is translated byφ a. Circular Integration Transform The CIT of a function f(x,y) is defined as the integral of f(x,y) along a circle curve ( ) h ρ with center (x o,y o ) and radius ρ (see Fig. b). The CIT is given by the following equation: 2 ( ) π ( ) ( ρ ) 0 C ( ) cos, sin cos, sin f ρ = f xo + ρ θ yo + ρ θ du = xo + ρ θ yo + ρ θ ρdθ (4) h where du is the elementary arc length over the integration path and dθ is the corresponding elementary angle. x y If f(x,y) is an image and g( x, y) = f, is the image scaled by s (s>0) in both s s directions, then the CIT of image g(x,y) is given by: Cg( ρ) = scf( ρ) (5) s Therefore, the CIT of the scaled image is scaled with the same scaling factor and its amplitude is also multiplied by the factor s. 37

3 If f ( r, ϕ ) is an image written in polar form and gr (, ϕ) = f( r, ϕ ϕa ) is the image rotated byφ a around the ( r, φ ) system origin, then the CIT of image grϕ (, ) is given by: C ( ρ) = C ( ρ) g f (6) Therefore, the CIT of an image is independent of rotation. y (x o,y o ) Integration path θ du dx dy y (x o,y o ) ρ dθ θ Integration path ds x x (a) (b) Discrete RIT and CIT Fig. (a) RIT integration path, (b) CIT integration path. A discrete form of the RIT equation () is given by J R( t θ) = I( x0 + j ucos ( t θ), y0 + j usin( t θ) ), t =,..., T (7) J j= where u and θ are the constant step sizes of the corresponding variables, J is the number of points that lie on the line with orientation θ and are located between the origin and the end of 360 the image I(x,y) in that direction, and T =. θ Similarly, a discrete form of the CIT equation (4) is given by Τ Ck ( ρ) = I( x0 + k ρcos ( t θ), y0 + k ρsin( t θ) ), k=,..., K Τ t= where ρ and θ are the constant step sizes of the corresponding variables, K ρ is the radius 360 of the smallest circle that encircles the image I(x,y), and Τ=. θ Resisting geometric transformations using RIT and CIT The RIT and CIT properties given in equations (2), (3), (5) and (6) are very desirable in watermarking applications in which resisting the geometric attacks performed on the watermarked image is required. This can be accomplished by the watermark embedding and detection scheme described in the following. First, a two-dimensional watermark is created, to be used as a reference watermark. The orientation of the reference watermark corresponds to a reference angle θ r and one of its dimensions (its width for example) corresponds to a reference size ρ r. Then, the values of the (8) 38

4 parameters θ max and ρ max which maximize the RIT and CIT coefficients respectively, define the geometric transformation that the reference watermark should undergo before additive embedding in the original image. Specifically, the reference watermark is first scaled by the scaling factor ρmax sw = (9) ρr and rotated by the angle r (0) w = θmax θr and then embedded in the image. Let us assume a scaling and a rotation attack to the watermarked image by s α and θ α respectively. Based on the RIT and CIT properties, it is obvious that after the attack, the location of the new maximum will be θ max + θ α for RIT and s α ρ max for CIT. Subsequently, in ρmax the detection process, if the reference watermark is scaled by the scaling factor sw = s α ρ and rotated by the angle rw = θmax θr + θa, the embedding and the correlating watermark will be synchronized (same scale and orientation), which is vital for a successful detection. This concept for resisting geometric attacks can only be applied if a specific location of the image content can be accurately traced both in the embedding and in the detection (possibly after a geometrical attack that would change its position). This location will serve as an origin for RIT and CIT in embedding and detection and also for positioning the embedding and the correlating watermark. A robust feature point extracted from the image content would be appropriate for this cause. For this reason, a corner point is extracted from the image. Watermark embedding The proposed watermarking scheme, which is based on the concept described in the previous section, performs the watermark embedding in the following steps (see Fig. 2a): A random two-dimensional sequence of + and - is created based on a secret key. Each value of the sequence is spread in blocks sized B B (B=2). This block-based watermark will be used as the reference watermark. The Harris corner detector [6] is applied in the image and the most robust among the detected corners is extracted. Using the location of the most robust corner as the origin, the RIT and CIT are applied to the image. Then, θ max and ρ max are found and the rotation parameter r w and the scaling parameter s w are calculated. The reference watermark is geometrically transformed using r w and s w. A perceptual analysis for each image pixel X(i,j) is performed as in [7], in order to determine the strength of the watermark. Additive embedding of the watermark in the spatial domain is performed. After experimenting with a set of 500 photographic images where the watermark was embedded, no noticeable degradation of the image quality was observed and the minimum and average PSNR observed were 39.97db and 4.76db respectively. Watermark detection For the detection of the watermark, a correlation-based detection scheme is applied. The detection process can be divided in the following steps (see Fig. 2b): r 39

5 . The watermark W is created using the owner's secret key and is then transformed to a block-based watermark W B as in the embedding process. 2. The Harris corner detector is applied to the image. 3. The RIT and CIT of the image are calculated using the location of the corner detector response maximum as the origin. Then, the values of the parameters ρ max and θ max that maximize the RIT and CIT coefficients respectively are found. 4. The scaling and rotation parameters s w and r w, that will be used to create the correlating watermark W C, are estimated using the detected corner as the origin for RIT and CIT. 5. The correlating watermark W C is created by first geometrically transforming the watermark W B and then by applying the sign function to the values of the geometrically transformed watermark as in the embedding process. 6. The local mean Y lm (i,j) for each pixel Y(i,j) of the test image is calculated. The local mean is calculated over a 7 x 7 window centered at the pixel location. 7. The correlation value c between the watermarked and possibly distorted N image pixel values Y(i,j) (after the local mean Y lm (i,j) is subtracted) and the watermark values W C (i,j) is calculated: c = () ( Y( i, j) Ylm ( i, j) ) WC ( i, j) N i j 8. The correlation value c is compared to the threshold T, which is defined according to the allowed false alarm probability P FA of the detection scheme. Reference Watermark Reference Watermark Original Image Corner Detection Perceptual Analysis CIT RIT ρ max θ max Geometrical Transformation of Watermark Rotated and Scaled Watermark Attacked Watermarked Image Harris Corner Detector CIT RIT ρ max θ max Correlation Geometrical Transformation of Watermark Synchronized Watermark Additive Embedding Decision Watermarked Image (a) (b) Fig. 2 (a) Watermark embedding process, (b) Watermark detection process. Experimental Results The experiments presented in the following were all performed using the image Lena. The corner detected at (x 0 =80, y 0 =435) was used as the origin for the RIT and CIT transforms. The parameters of these transforms were set to the following values: θ=0.0, s=0.5, θ r =0 o for the RIT transform and ρ=0., θ = , ρ r =250 for the CIT transform. Linear interpolation was used for the geometrical transformations of the watermark. Various attacks were directed on the watermarked image. The corresponding errors of the estimated geometrical transformations of the image, and the corresponding correlator values are presented in Table. Finally, the correlator value for the watermarked image Lena using 5000 different correlating watermarks is given in Fig. 3. The 000th watermark is the valid correlating 40

6 watermark. The experimental mean and variance of the correlator value derived from this test were very close to the corresponding theoretical values which were used to determine the threshold T=0.2 for a given false alarm probability P FA =0-3. Scaling Attack Rotation parameters JPEG Q=70 - Estimation Scaling error Rotation Correlation value c Threshold T Table Correlator output results for various attacks on the watermarked image Lena Fig. 3 Correlator values for the watermarked image Lena using 5000 different correlating watermarks. References [] F. A. P. Petitcolas, Watermarking schemes evaluation, IEEE Signal Processing, vol. 7, no.5, pp , [2] J. O. Ruanaidh and T. Pun, Rotation, scale and translation invariant spread spectrum digital image watermarking, Signal Processing, vol. 66, no. 3, pp , May 998. [3] S. Pereira and T. Pun, Robust template matching for affine resistant image watermarks, IEEE Trans. Image Processing, vol. 9, no. 6, pp , June [4] P. Bas and B. Macq, A new video-object watermarking scheme robust to object manipulation, in ICIP, Thessaloniki, Greece, Oct. 200, vol. 2, pp [5] C.H. Chapman, Generalized Radon transforms and slant stacks, Geophys. J. R. ast. Soc., vol 66, pp , 98. [6] C. Harris and M. Stephen, A combined corner and edge detector, in Alvey Vision Conference, 988, pp [7] D. Simitopoulos, D. Koutsonanos, and M. G. Strintzis, Image watermarking resistant to geometric attacks using Generalized Radon Transformations, DSP 2002, Santorini, Greece, June 2002, pp

Subpixel Corner Detection Using Spatial Moment 1)

Subpixel Corner Detection Using Spatial Moment 1) Vol.31, No.5 ACTA AUTOMATICA SINICA September, 25 Subpixel Corner Detection Using Spatial Moment 1) WANG She-Yang SONG Shen-Min QIANG Wen-Yi CHEN Xing-Lin (Department of Control Engineering, Harbin Institute

More information

Image watermarking based on scale-space representation

Image watermarking based on scale-space representation Image watermarking based on scale-space representation Jin S. Seo and Chang D. Yoo Department of Electrical Engineering and Computer Science Korea Advanced Institute of Science and Technology Daejeon 305-701,

More information

A Robust Wavelet-Based Watermarking Algorithm Using Edge Detection

A Robust Wavelet-Based Watermarking Algorithm Using Edge Detection A Robust Wavelet-Based Watermarking Algorithm Using Edge Detection John N. Ellinas Abstract In this paper, a robust watermarking algorithm using the wavelet transform and edge detection is presented. The

More information

A Print-Scan Resilient Watermarking based on Fourier Transform and Image Restoration

A Print-Scan Resilient Watermarking based on Fourier Transform and Image Restoration A Print-Scan Resilient Watermarking based on Fourier Transform and Image Restoration R. Riad H. Douzi M. El Hajji R. Harba PRISME, University of Orleans, Orléans, France F. Ros PRISME, University of Orleans,

More information

A ROBUST WATERMARKING SCHEME BASED ON EDGE DETECTION AND CONTRAST SENSITIVITY FUNCTION

A ROBUST WATERMARKING SCHEME BASED ON EDGE DETECTION AND CONTRAST SENSITIVITY FUNCTION A ROBUST WATERMARKING SCHEME BASED ON EDGE DETECTION AND CONTRAST SENSITIVITY FUNCTION John N. Ellinas Department of Electronic Computer Systems,Technological Education Institute of Piraeus, 12244 Egaleo,

More information

Rotation, scale, and translation invariant image watermark using higher order spectra Hyung -Shin Kim Yunju Baek Heung-Kyu Lee

Rotation, scale, and translation invariant image watermark using higher order spectra Hyung -Shin Kim Yunju Baek Heung-Kyu Lee Rotation, scale, and translation invariant image watermark using higher order spectra Hyung -Shin Kim Yunju Baek Heung-Kyu Lee Division of Computer Science Department of Electrical Engineering and Computer

More information

APPLICATION OF RADON TRANSFORM IN CT IMAGE MATCHING Yufang Cai, Kuan Shen, Jue Wang ICT Research Center of Chongqing University, Chongqing, P.R.

APPLICATION OF RADON TRANSFORM IN CT IMAGE MATCHING Yufang Cai, Kuan Shen, Jue Wang ICT Research Center of Chongqing University, Chongqing, P.R. APPLICATION OF RADON TRANSFORM IN CT IMAGE MATCHING Yufang Cai, Kuan Shen, Jue Wang ICT Research Center of Chongqing University, Chongqing, P.R.China Abstract: When Industrial Computerized Tomography (CT)

More information

Robust Image Watermarking based on DCT-DWT- SVD Method

Robust Image Watermarking based on DCT-DWT- SVD Method Robust Image Watermarking based on DCT-DWT- SVD Sneha Jose Rajesh Cherian Roy, PhD. Sreenesh Shashidharan ABSTRACT Hybrid Image watermarking scheme proposed based on Discrete Cosine Transform (DCT)-Discrete

More information

Graphics and Interaction Transformation geometry and homogeneous coordinates

Graphics and Interaction Transformation geometry and homogeneous coordinates 433-324 Graphics and Interaction Transformation geometry and homogeneous coordinates Department of Computer Science and Software Engineering The Lecture outline Introduction Vectors and matrices Translation

More information

COMP30019 Graphics and Interaction Transformation geometry and homogeneous coordinates

COMP30019 Graphics and Interaction Transformation geometry and homogeneous coordinates COMP30019 Graphics and Interaction Transformation geometry and homogeneous coordinates Department of Computer Science and Software Engineering The Lecture outline Introduction Vectors and matrices Translation

More information

To graph the point (r, θ), simply go out r units along the initial ray, then rotate through the angle θ. The point (1, 5π 6

To graph the point (r, θ), simply go out r units along the initial ray, then rotate through the angle θ. The point (1, 5π 6 Polar Coordinates Any point in the plane can be described by the Cartesian coordinates (x, y), where x and y are measured along the corresponding axes. However, this is not the only way to represent points

More information

To graph the point (r, θ), simply go out r units along the initial ray, then rotate through the angle θ. The point (1, 5π 6. ) is graphed below:

To graph the point (r, θ), simply go out r units along the initial ray, then rotate through the angle θ. The point (1, 5π 6. ) is graphed below: Polar Coordinates Any point in the plane can be described by the Cartesian coordinates (x, y), where x and y are measured along the corresponding axes. However, this is not the only way to represent points

More information

A Robust A DCT-Based Digital Watermarking Scheme Using Important Feature Points

A Robust A DCT-Based Digital Watermarking Scheme Using Important Feature Points A Robust A DCT-Based Digital Watermarking Scheme Using Important Feature Points Xiaojun Qi and Ji Qi Department of Computer Science, Utah State University Logan, UT, 84322-4205, USA. Xiaojun.Qi@usu.edu

More information

A Robust Image Watermarking Scheme using Image Moment Normalization

A Robust Image Watermarking Scheme using Image Moment Normalization A Robust Image ing Scheme using Image Moment Normalization Latha Parameswaran, and K. Anbumani Abstract Multimedia security is an incredibly significant area of concern. A number of papers on robust digital

More information

A NEW APPROACH OF DIGITAL IMAGE COPYRIGHT PROTECTION USING MULTI-LEVEL DWT ALGORITHM

A NEW APPROACH OF DIGITAL IMAGE COPYRIGHT PROTECTION USING MULTI-LEVEL DWT ALGORITHM A NEW APPROACH OF DIGITAL IMAGE COPYRIGHT PROTECTION USING MULTI-LEVEL DWT ALGORITHM Siva Prasad K, Ganesh Kumar N PG Student [DECS], Assistant professor, Dept of ECE, Thandrapaparaya Institute of science

More information

Analysis of feature-based geometry invariant watermarking

Analysis of feature-based geometry invariant watermarking Header for SPIE use Analysis of feature-based geometry invariant watermarking Mehmet U. Celik *a, Eli Saber b, Gaurav Sharma b, A.Murat Tekalp a a University of Rochester, Rochester, NY, 14627-0126 b Xerox

More information

A Robust Visual Identifier Using the Trace Transform

A Robust Visual Identifier Using the Trace Transform A Robust Visual Identifier Using the Trace Transform P. Brasnett*, M.Z. Bober* *Mitsubishi Electric ITE VIL, Guildford, UK. paul.brasnett@vil.ite.mee.com, miroslaw.bober@vil.ite.mee.com Keywords: image

More information

RST Invariant Digital Image Watermarking Based on Log-Polar Mapping and Phase Correlation

RST Invariant Digital Image Watermarking Based on Log-Polar Mapping and Phase Correlation IEEE TRANSACTIONS ON CIRCUITS AND SYSTEMS FOR VIDEO TECHNOLOGY, VOL. XX, NO. Y, SEPTEMBER 2003 1 RST Invariant Digital Image Watermarking Based on Log-Polar Mapping and Phase Correlation Dong Zheng, Student

More information

Robust Digital Image Watermarking based on complex wavelet transform

Robust Digital Image Watermarking based on complex wavelet transform Robust Digital Image Watermarking based on complex wavelet transform TERZIJA NATAŠA, GEISSELHARDT WALTER Institute of Information Technology University Duisburg-Essen Bismarckstr. 81, 47057 Duisburg GERMANY

More information

Comparison of Digital Image Watermarking Algorithms. Xu Zhou Colorado School of Mines December 1, 2014

Comparison of Digital Image Watermarking Algorithms. Xu Zhou Colorado School of Mines December 1, 2014 Comparison of Digital Image Watermarking Algorithms Xu Zhou Colorado School of Mines December 1, 2014 Outlier Introduction Background on digital image watermarking Comparison of several algorithms Experimental

More information

Edge and local feature detection - 2. Importance of edge detection in computer vision

Edge and local feature detection - 2. Importance of edge detection in computer vision Edge and local feature detection Gradient based edge detection Edge detection by function fitting Second derivative edge detectors Edge linking and the construction of the chain graph Edge and local feature

More information

Filtering. -If we denote the original image as f(x,y), then the noisy image can be denoted as f(x,y)+n(x,y) where n(x,y) is a cosine function.

Filtering. -If we denote the original image as f(x,y), then the noisy image can be denoted as f(x,y)+n(x,y) where n(x,y) is a cosine function. Filtering -The image shown below has been generated by adding some noise in the form of a cosine function. -If we denote the original image as f(x,y), then the noisy image can be denoted as f(x,y)+n(x,y)

More information

Polar Coordinates. Chapter 10: Parametric Equations and Polar coordinates, Section 10.3: Polar coordinates 27 / 45

Polar Coordinates. Chapter 10: Parametric Equations and Polar coordinates, Section 10.3: Polar coordinates 27 / 45 : Given any point P = (x, y) on the plane r stands for the distance from the origin (0, 0). θ stands for the angle from positive x-axis to OP. Polar coordinate: (r, θ) Chapter 10: Parametric Equations

More information

Digital video watermarking robust to geometric attacks and compressions

Digital video watermarking robust to geometric attacks and compressions Digital video watermarking robust to geometric attacks and compressions by Yan Liu A thesis submitted to the Faculty of Graduate and Postdoctoral Studies in partial fulfillment of the requirements for

More information

Polar Coordinates. Chapter 10: Parametric Equations and Polar coordinates, Section 10.3: Polar coordinates 28 / 46

Polar Coordinates. Chapter 10: Parametric Equations and Polar coordinates, Section 10.3: Polar coordinates 28 / 46 Polar Coordinates Polar Coordinates: Given any point P = (x, y) on the plane r stands for the distance from the origin (0, 0). θ stands for the angle from positive x-axis to OP. Polar coordinate: (r, θ)

More information

COMPARISONS OF DCT-BASED AND DWT-BASED WATERMARKING TECHNIQUES

COMPARISONS OF DCT-BASED AND DWT-BASED WATERMARKING TECHNIQUES COMPARISONS OF DCT-BASED AND DWT-BASED WATERMARKING TECHNIQUES H. I. Saleh 1, M. E. Elhadedy 2, M. A. Ashour 1, M. A. Aboelsaud 3 1 Radiation Engineering Dept., NCRRT, AEA, Egypt. 2 Reactor Dept., NRC,

More information

WATERMARKING FOR LIGHT FIELD RENDERING 1

WATERMARKING FOR LIGHT FIELD RENDERING 1 ATERMARKING FOR LIGHT FIELD RENDERING 1 Alper Koz, Cevahir Çığla and A. Aydın Alatan Department of Electrical and Electronics Engineering, METU Balgat, 06531, Ankara, TURKEY. e-mail: koz@metu.edu.tr, cevahir@eee.metu.edu.tr,

More information

Polar Coordinates

Polar Coordinates Polar Coordinates 7-7-2 Polar coordinates are an alternative to rectangular coordinates for referring to points in the plane. A point in the plane has polar coordinates r,θ). r is roughly) the distance

More information

Block Mean Value Based Image Perceptual Hashing for Content Identification

Block Mean Value Based Image Perceptual Hashing for Content Identification Block Mean Value Based Image Perceptual Hashing for Content Identification Abstract. Image perceptual hashing has been proposed to identify or authenticate image contents in a robust way against distortions

More information

Robust image watermarking using local invariant features

Robust image watermarking using local invariant features 45 3, 037002 March 2006 Robust image watermarking using local invariant features Hae-Yeoun Lee Korea Advanced Institute of Science and Technology Department of Electrical Engineering and Computer Science

More information

Robust Watermark Algorithm using Genetic Algorithm

Robust Watermark Algorithm using Genetic Algorithm JOURNAL OF INFORMATION SCIENCE AND ENGINEERING 23, 661-670 (2007) Short Paper Robust Watermark Algorithm using Genetic Algorithm CONG JIN AND SHI-HUI WANG * Department of Computer Science Central China

More information

An approach for generic detection of conic equation from images

An approach for generic detection of conic equation from images An approach for generic detection of conic equation from images Maysa Macedo and Aura Conci Universidade Federal Fluminense (UFF) mmacedo@ic.uff.br - aconci@ic.uff.br Hough Transform Hough transform is

More information

A Wavelet Watermarking Algorithm Based on a Tree Structure

A Wavelet Watermarking Algorithm Based on a Tree Structure A Wavelet Watermarking Algorithm Based on a Tree Structure Oriol Guitart Pla a,eugenet.lin b,andedwardj.delp b a Universitat Politecnica de Catalunya (UPC) Barcelona Spain b Video and Image Processing

More information

DIGITAL watermarking technology is emerging as a

DIGITAL watermarking technology is emerging as a 126 IEEE TRANSACTIONS ON IMAGE PROCESSING, VOL. 13, NO. 2, FEBRUARY 2004 Analysis and Design of Watermarking Algorithms for Improved Resistance to Compression Chuhong Fei, Deepa Kundur, Senior Member,

More information

Lecture 15: Segmentation (Edge Based, Hough Transform)

Lecture 15: Segmentation (Edge Based, Hough Transform) Lecture 15: Segmentation (Edge Based, Hough Transform) c Bryan S. Morse, Brigham Young University, 1998 000 Last modified on February 3, 000 at :00 PM Contents 15.1 Introduction..............................................

More information

Radon Transform-Based Secure Image Hashing

Radon Transform-Based Secure Image Hashing Radon Transform-Based Secure Image Hashing Dung Q. Nguyen, Li Weng, and Bart Preneel Katholieke Universiteit Leuven, ESAT/COSIC-IBBT dungtobe@gmail.com, {li.weng,bart.preneel}@esat.kuleuven.be Abstract.

More information

BENCHMARKING OF STILL IMAGE WATERMARKING METHODS: PRINCIPLES AND STATE OF THE ART

BENCHMARKING OF STILL IMAGE WATERMARKING METHODS: PRINCIPLES AND STATE OF THE ART BENCHMARKING OF STILL IMAGE WATERMARKING METHODS: PRINCIPLES AND STATE OF THE ART N. Nikolaidis, V. Solachidis, A. Tefas, V. Arguriou, I. Pitas Department of Informatics Aristotle University of Thessaloniki

More information

Math Boot Camp: Coordinate Systems

Math Boot Camp: Coordinate Systems Math Boot Camp: Coordinate Systems You can skip this boot camp if you can answer the following question: Staying on a sphere of radius R, what is the shortest distance between the point (0, 0, R) on the

More information

Coordinate Transformations in Advanced Calculus

Coordinate Transformations in Advanced Calculus Coordinate Transformations in Advanced Calculus by Sacha Nandlall T.A. for MATH 264, McGill University Email: sacha.nandlall@mail.mcgill.ca Website: http://www.resanova.com/teaching/calculus/ Fall 2006,

More information

Multiple domain watermarking for print-scan and JPEG resilient data hiding

Multiple domain watermarking for print-scan and JPEG resilient data hiding Multiple domain watermarking for print-scan and JPEG resilient data hiding Anu Pramila, Anja Keskinarkaus, and Tapio Seppänen MediaTeam Oulu, Department of Electrical and Information Engineering, University

More information

Conics, Parametric Equations, and Polar Coordinates. Copyright Cengage Learning. All rights reserved.

Conics, Parametric Equations, and Polar Coordinates. Copyright Cengage Learning. All rights reserved. 10 Conics, Parametric Equations, and Polar Coordinates Copyright Cengage Learning. All rights reserved. 10.5 Area and Arc Length in Polar Coordinates Copyright Cengage Learning. All rights reserved. Objectives

More information

Rotation, Scale, and Translation Resilient Digital Watermark Based on Complex Exponential Function

Rotation, Scale, and Translation Resilient Digital Watermark Based on Complex Exponential Function 40 ECTI TRANSACTIONS ON ELECTRICAL ENG., ELECTRONICS, AND COMMUNICATIONS VOL.2, NO.2 AUGUST 2004 Rotation, Scale, and Translation Resilient Digital Watermark Based on Complex Exponential Function Siriporn

More information

Section Parametrized Surfaces and Surface Integrals. (I) Parametrizing Surfaces (II) Surface Area (III) Scalar Surface Integrals

Section Parametrized Surfaces and Surface Integrals. (I) Parametrizing Surfaces (II) Surface Area (III) Scalar Surface Integrals Section 16.4 Parametrized Surfaces and Surface Integrals (I) Parametrizing Surfaces (II) Surface Area (III) Scalar Surface Integrals MATH 127 (Section 16.4) Parametrized Surfaces and Surface Integrals

More information

On domain selection for additive, blind image watermarking

On domain selection for additive, blind image watermarking BULLETIN OF THE POLISH ACADEY OF SCIENCES TECHNICAL SCIENCES, Vol. 60, No. 2, 2012 DOI: 10.2478/v10175-012-0042-5 DEDICATED PAPERS On domain selection for additive, blind image watermarking P. LIPIŃSKI

More information

ROBUST WATERMARKING OF DIGITAL IMAGES BASED ON CHAOTIC MAPPING AND DCT

ROBUST WATERMARKING OF DIGITAL IMAGES BASED ON CHAOTIC MAPPING AND DCT ROBUST WATERMARKING OF DIGITAL IMAGES BASED ON CHAOTIC MAPPING AND DCT E. Chrysochos, V. Fotopoulos, and A. N. Skodras Digital Systems & Media Computing Laboratory, School of Science and Technology, Hellenic

More information

WITH the advent of Internet, the use of digital media

WITH the advent of Internet, the use of digital media IEEE TRANSACTIONS ON SIGNAL PROCESSING, VOL. 54, NO. 4, APRIL 2006 1537 Image Watermarking Based on Invariant Regions of Scale-Space Representation Jin S. Seo, Associate Member, IEEE, and Chang D. Yoo,

More information

Conics, Parametric Equations, and Polar Coordinates. Copyright Cengage Learning. All rights reserved.

Conics, Parametric Equations, and Polar Coordinates. Copyright Cengage Learning. All rights reserved. 10 Conics, Parametric Equations, and Polar Coordinates Copyright Cengage Learning. All rights reserved. 10.5 Area and Arc Length in Polar Coordinates Copyright Cengage Learning. All rights reserved. Objectives

More information

An Improved Images Watermarking Scheme Using FABEMD Decomposition and DCT

An Improved Images Watermarking Scheme Using FABEMD Decomposition and DCT An Improved Images Watermarking Scheme Using FABEMD Decomposition and DCT Noura Aherrahrou and Hamid Tairi University Sidi Mohamed Ben Abdellah, Faculty of Sciences, Dhar El mahraz, LIIAN, Department of

More information

Polar Coordinates. Calculus 2 Lia Vas. If P = (x, y) is a point in the xy-plane and O denotes the origin, let

Polar Coordinates. Calculus 2 Lia Vas. If P = (x, y) is a point in the xy-plane and O denotes the origin, let Calculus Lia Vas Polar Coordinates If P = (x, y) is a point in the xy-plane and O denotes the origin, let r denote the distance from the origin O to the point P = (x, y). Thus, x + y = r ; θ be the angle

More information

IN MANY IMAGE processing scenarios, it would be desirable

IN MANY IMAGE processing scenarios, it would be desirable IEEE TRANSACTIONS ON CIRCUITS AND SYSTEMS II: EXPRESS BRIEFS, VOL. 53, NO. 5, MAY 2006 359 Watermark Detection for Noisy Interpolated Images Alexia Giannoula, Nikolaos V. Boulgouris, Member, IEEE, Dimitrios

More information

HOUGH TRANSFORM CS 6350 C V

HOUGH TRANSFORM CS 6350 C V HOUGH TRANSFORM CS 6350 C V HOUGH TRANSFORM The problem: Given a set of points in 2-D, find if a sub-set of these points, fall on a LINE. Hough Transform One powerful global method for detecting edges

More information

Digital Image Correlation of Stereoscopic Images for Radial Metrology

Digital Image Correlation of Stereoscopic Images for Radial Metrology Digital Image Correlation of Stereoscopic Images for Radial Metrology John A. Gilbert Professor of Mechanical Engineering University of Alabama in Huntsville Huntsville, AL 35899 Donald R. Matthys Professor

More information

Watermarking of Image Using Priority Based On Algorithms

Watermarking of Image Using Priority Based On Algorithms This work by IJARBEST is licensed under Creative Commons Attribution 4.0 International License. Available at https://www.ijarbest.com Watermarking of Image Using Priority Based On Algorithms B.Aarthi,

More information

INVARIANT CORNER DETECTION USING STEERABLE FILTERS AND HARRIS ALGORITHM

INVARIANT CORNER DETECTION USING STEERABLE FILTERS AND HARRIS ALGORITHM INVARIANT CORNER DETECTION USING STEERABLE FILTERS AND HARRIS ALGORITHM ABSTRACT Mahesh 1 and Dr.M.V.Subramanyam 2 1 Research scholar, Department of ECE, MITS, Madanapalle, AP, India vka4mahesh@gmail.com

More information

Detecting Printed and Handwritten Partial Copies of Line Drawings Embedded in Complex Backgrounds

Detecting Printed and Handwritten Partial Copies of Line Drawings Embedded in Complex Backgrounds 9 1th International Conference on Document Analysis and Recognition Detecting Printed and Handwritten Partial Copies of Line Drawings Embedded in Complex Backgrounds Weihan Sun, Koichi Kise Graduate School

More information

The diagram above shows a sketch of the curve C with parametric equations

The diagram above shows a sketch of the curve C with parametric equations 1. The diagram above shows a sketch of the curve C with parametric equations x = 5t 4, y = t(9 t ) The curve C cuts the x-axis at the points A and B. (a) Find the x-coordinate at the point A and the x-coordinate

More information

Edge detection. Gradient-based edge operators

Edge detection. Gradient-based edge operators Edge detection Gradient-based edge operators Prewitt Sobel Roberts Laplacian zero-crossings Canny edge detector Hough transform for detection of straight lines Circle Hough Transform Digital Image Processing:

More information

A New Method for Quantifying the Response of Filters at Corners

A New Method for Quantifying the Response of Filters at Corners A New Method for Quantifying the Response of Filters at Corners Mark A. Schulze and John A. Pearce Department of Electrical and Computer Engineering and Biomedical Engineering Program The University of

More information

Calculus III. Math 233 Spring In-term exam April 11th. Suggested solutions

Calculus III. Math 233 Spring In-term exam April 11th. Suggested solutions Calculus III Math Spring 7 In-term exam April th. Suggested solutions This exam contains sixteen problems numbered through 6. Problems 5 are multiple choice problems, which each count 5% of your total

More information

Generic Fourier Descriptor for Shape-based Image Retrieval

Generic Fourier Descriptor for Shape-based Image Retrieval 1 Generic Fourier Descriptor for Shape-based Image Retrieval Dengsheng Zhang, Guojun Lu Gippsland School of Comp. & Info Tech Monash University Churchill, VIC 3842 Australia dengsheng.zhang@infotech.monash.edu.au

More information

9 length of contour = no. of horizontal and vertical components + ( 2 no. of diagonal components) diameter of boundary B

9 length of contour = no. of horizontal and vertical components + ( 2 no. of diagonal components) diameter of boundary B 8. Boundary Descriptor 8.. Some Simple Descriptors length of contour : simplest descriptor - chain-coded curve 9 length of contour no. of horiontal and vertical components ( no. of diagonal components

More information

Image Watermarking System Based on Centroid Projection

Image Watermarking System Based on Centroid Projection ICICS-FCMZOO3 15-18Deamba2003 singapare 2C2.3 Image Watermarking System Based on Centroid Projection Shih-Wei Sun and Pao-Chi Chang Electrical Engineering, National Central University, Chung-Li, Taiwan

More information

DIGITAL IMAGE WATERMARKING BASED ON A RELATION BETWEEN SPATIAL AND FREQUENCY DOMAINS

DIGITAL IMAGE WATERMARKING BASED ON A RELATION BETWEEN SPATIAL AND FREQUENCY DOMAINS DIGITAL IMAGE WATERMARKING BASED ON A RELATION BETWEEN SPATIAL AND FREQUENCY DOMAINS Murat Furat Mustafa Oral e-mail: mfurat@cu.edu.tr e-mail: moral@mku.edu.tr Cukurova University, Faculty of Engineering,

More information

An Improved DCT Based Color Image Watermarking Scheme Xiangguang Xiong1, a

An Improved DCT Based Color Image Watermarking Scheme Xiangguang Xiong1, a International Symposium on Mechanical Engineering and Material Science (ISMEMS 2016) An Improved DCT Based Color Image Watermarking Scheme Xiangguang Xiong1, a 1 School of Big Data and Computer Science,

More information

Lecture 7: Most Common Edge Detectors

Lecture 7: Most Common Edge Detectors #1 Lecture 7: Most Common Edge Detectors Saad Bedros sbedros@umn.edu Edge Detection Goal: Identify sudden changes (discontinuities) in an image Intuitively, most semantic and shape information from the

More information

Math 136 Exam 1 Practice Problems

Math 136 Exam 1 Practice Problems Math Exam Practice Problems. Find the surface area of the surface of revolution generated by revolving the curve given by around the x-axis? To solve this we use the equation: In this case this translates

More information

Feature Selection. Ardy Goshtasby Wright State University and Image Fusion Systems Research

Feature Selection. Ardy Goshtasby Wright State University and Image Fusion Systems Research Feature Selection Ardy Goshtasby Wright State University and Image Fusion Systems Research Image features Points Lines Regions Templates 2 Corners They are 1) locally unique and 2) rotationally invariant

More information

Biomedical Image Analysis. Point, Edge and Line Detection

Biomedical Image Analysis. Point, Edge and Line Detection Biomedical Image Analysis Point, Edge and Line Detection Contents: Point and line detection Advanced edge detection: Canny Local/regional edge processing Global processing: Hough transform BMIA 15 V. Roth

More information

A DWT-DFT Composite Watermarking Scheme Robust to Both Affine Transform and JPEG Compression

A DWT-DFT Composite Watermarking Scheme Robust to Both Affine Transform and JPEG Compression 776 IEEE TRANSACTIONS ON CIRCUITS AND SYSTEMS FOR VIDEO TECHNOLOGY, VOL 13, NO 8, AUGUST 2003 A DWT-DFT Composite Watermarking Scheme Robust to Both Affine Transform and JPEG Compression Xiangui Kang,

More information

Combined Hashing/Watermarking Method for Image Authentication

Combined Hashing/Watermarking Method for Image Authentication Combined Hashing/Watermarking Method for Image Authentication Vlado Kitanovski, Dimitar Taskovski, and Sofija Bogdanova Abstract In this paper we present a combined hashing/watermarking method for image

More information

Geometrically Invariant Watermarking Using Feature Points

Geometrically Invariant Watermarking Using Feature Points Geometrically Invariant Watermarking Using Feature Points Patrick Bas, Jean-Marc Chassery, Benoit Macq To cite this version: Patrick Bas, Jean-Marc Chassery, Benoit Macq. Geometrically Invariant Watermarking

More information

Types of Edges. Why Edge Detection? Types of Edges. Edge Detection. Gradient. Edge Detection

Types of Edges. Why Edge Detection? Types of Edges. Edge Detection. Gradient. Edge Detection Why Edge Detection? How can an algorithm extract relevant information from an image that is enables the algorithm to recognize objects? The most important information for the interpretation of an image

More information

A Robust Color Image Watermarking Using Maximum Wavelet-Tree Difference Scheme

A Robust Color Image Watermarking Using Maximum Wavelet-Tree Difference Scheme A Robust Color Image Watermarking Using Maximum Wavelet-Tree ifference Scheme Chung-Yen Su 1 and Yen-Lin Chen 1 1 epartment of Applied Electronics Technology, National Taiwan Normal University, Taipei,

More information

R f da (where da denotes the differential of area dxdy (or dydx)

R f da (where da denotes the differential of area dxdy (or dydx) Math 28H Topics for the second exam (Technically, everything covered on the first exam, plus) Constrained Optimization: Lagrange Multipliers Most optimization problems that arise naturally are not unconstrained;

More information

Texture Segmentation by using Haar Wavelets and K-means Algorithm

Texture Segmentation by using Haar Wavelets and K-means Algorithm Texture Segmentation by using Haar Wavelets and K-means Algorithm P. Ashok Babu Associate Professor, Narsimha Reddy Engineering College, Hyderabad, A.P., INDIA, ashokbabup2@gmail.com Dr. K. V. S. V. R.

More information

A Video Watermarking Algorithm Based on the Human Visual System Properties

A Video Watermarking Algorithm Based on the Human Visual System Properties A Video Watermarking Algorithm Based on the Human Visual System Properties Ji-Young Moon 1 and Yo-Sung Ho 2 1 Samsung Electronics Co., LTD 416, Maetan3-dong, Paldal-gu, Suwon-si, Gyenggi-do, Korea jiyoung.moon@samsung.com

More information

This document is downloaded from DR-NTU, Nanyang Technological University Library, Singapore.

This document is downloaded from DR-NTU, Nanyang Technological University Library, Singapore. This document is downloaded from DR-NTU, Nanyang Technological University Library, Singapore. Title A robust phase watermarking algorithm using conugate symmetric sequency-ordered complex Hadamard transform

More information

Chapter 11 Image Processing

Chapter 11 Image Processing Chapter Image Processing Low-level Image Processing Operates directly on a stored image to improve or enhance it. Stored image consists of a two-dimensional array of pixels (picture elements): Origin (0,

More information

A Novel Real-Time Feature Matching Scheme

A Novel Real-Time Feature Matching Scheme Sensors & Transducers, Vol. 165, Issue, February 01, pp. 17-11 Sensors & Transducers 01 by IFSA Publishing, S. L. http://www.sensorsportal.com A Novel Real-Time Feature Matching Scheme Ying Liu, * Hongbo

More information

Transformations: 2D Transforms

Transformations: 2D Transforms 1. Translation Transformations: 2D Transforms Relocation of point WRT frame Given P = (x, y), translation T (dx, dy) Then P (x, y ) = T (dx, dy) P, where x = x + dx, y = y + dy Using matrix representation

More information

Edge Detection. Announcements. Edge detection. Origin of Edges. Mailing list: you should have received messages

Edge Detection. Announcements. Edge detection. Origin of Edges. Mailing list: you should have received messages Announcements Mailing list: csep576@cs.washington.edu you should have received messages Project 1 out today (due in two weeks) Carpools Edge Detection From Sandlot Science Today s reading Forsyth, chapters

More information

A new robust watermarking scheme based on PDE decomposition *

A new robust watermarking scheme based on PDE decomposition * A new robust watermarking scheme based on PDE decomposition * Noura Aherrahrou University Sidi Mohamed Ben Abdellah Faculty of Sciences Dhar El mahraz LIIAN, Department of Informatics Fez, Morocco Hamid

More information

Robust Zero Watermarking for Still and Similar Images Using a Learning Based Contour Detection

Robust Zero Watermarking for Still and Similar Images Using a Learning Based Contour Detection Robust Zero Watermarking for Still and Similar Images Using a Learning Based Contour Detection Shahryar Ehsaee and Mansour Jamzad (&) Department of Computer Engineering, Sharif University of Technology,

More information

Chapter 3 Image Registration. Chapter 3 Image Registration

Chapter 3 Image Registration. Chapter 3 Image Registration Chapter 3 Image Registration Distributed Algorithms for Introduction (1) Definition: Image Registration Input: 2 images of the same scene but taken from different perspectives Goal: Identify transformation

More information

Robust biometric image watermarking for fingerprint and face template protection

Robust biometric image watermarking for fingerprint and face template protection Robust biometric image watermarking for fingerprint and face template protection Mayank Vatsa 1, Richa Singh 1, Afzel Noore 1a),MaxM.Houck 2, and Keith Morris 2 1 West Virginia University, Morgantown,

More information

Multibit Digital Watermarking Robust against Local Nonlinear Geometrical Distortions

Multibit Digital Watermarking Robust against Local Nonlinear Geometrical Distortions Multibit Digital Watermarking Robust against Local Nonlinear Geometrical Distortions Sviatoslav Voloshynovskiy Frédéric Deguillaume, and Thierry Pun CUI - University of Geneva 24, rue du Général Dufour

More information

Spatial, Transform and Fractional Domain Digital Image Watermarking Techniques

Spatial, Transform and Fractional Domain Digital Image Watermarking Techniques Spatial, Transform and Fractional Domain Digital Image Watermarking Techniques Dr.Harpal Singh Professor, Chandigarh Engineering College, Landran, Mohali, Punjab, Pin code 140307, India Puneet Mehta Faculty,

More information

13. Brewster angle measurement

13. Brewster angle measurement 13. Brewster angle measurement Brewster angle measurement Objective: 1. Verification of Malus law 2. Measurement of reflection coefficient of a glass plate for p- and s- polarizations 3. Determination

More information

A NEW DCT-BASED WATERMARKING METHOD FOR COPYRIGHT PROTECTION OF DIGITAL AUDIO

A NEW DCT-BASED WATERMARKING METHOD FOR COPYRIGHT PROTECTION OF DIGITAL AUDIO International journal of computer science & information Technology (IJCSIT) Vol., No.5, October A NEW DCT-BASED WATERMARKING METHOD FOR COPYRIGHT PROTECTION OF DIGITAL AUDIO Pranab Kumar Dhar *, Mohammad

More information

EE 584 MACHINE VISION

EE 584 MACHINE VISION EE 584 MACHINE VISION Binary Images Analysis Geometrical & Topological Properties Connectedness Binary Algorithms Morphology Binary Images Binary (two-valued; black/white) images gives better efficiency

More information

Worksheet 3.2: Double Integrals in Polar Coordinates

Worksheet 3.2: Double Integrals in Polar Coordinates Boise State Math 75 (Ultman) Worksheet 3.: ouble Integrals in Polar Coordinates From the Toolbox (what you need from previous classes): Trig/Calc II: Convert equations in x and y into r and θ, using the

More information

Basic Algorithms for Digital Image Analysis: a course

Basic Algorithms for Digital Image Analysis: a course Institute of Informatics Eötvös Loránd University Budapest, Hungary Basic Algorithms for Digital Image Analysis: a course Dmitrij Csetverikov with help of Attila Lerch, Judit Verestóy, Zoltán Megyesi,

More information

Circular Analysis based Line Detection Filters for Watermark Extraction in X-ray images of Etchings

Circular Analysis based Line Detection Filters for Watermark Extraction in X-ray images of Etchings Circular Analysis based Line Detection Filters for Watermark Extraction in X-ray images of Etchings M. van Staalduinen, J. C. A. van der Lubbe, E. Backer {M.vanStaalduinen, J.C.A.vanderLubbe, E.Backer}@ewi.tudelft.nl

More information

Computer Vision. Coordinates. Prof. Flávio Cardeal DECOM / CEFET- MG.

Computer Vision. Coordinates. Prof. Flávio Cardeal DECOM / CEFET- MG. Computer Vision Coordinates Prof. Flávio Cardeal DECOM / CEFET- MG cardeal@decom.cefetmg.br Abstract This lecture discusses world coordinates and homogeneous coordinates, as well as provides an overview

More information

Edge and corner detection

Edge and corner detection Edge and corner detection Prof. Stricker Doz. G. Bleser Computer Vision: Object and People Tracking Goals Where is the information in an image? How is an object characterized? How can I find measurements

More information

COPYRIGHT PROTECTION OF PALETTE IMAGES BY A ROBUST LOSSLESS VISIBLE WATERMARKING TECHNIQUE *

COPYRIGHT PROTECTION OF PALETTE IMAGES BY A ROBUST LOSSLESS VISIBLE WATERMARKING TECHNIQUE * COPYRIGHT PROTECTION OF PALETTE IMAGES BY A ROBUST LOSSLESS VISIBLE WATERMARKING TECHNIQUE * Pei-Pei Chen ( 陳佩貝 ) 1 and Wen-Hsiang Tsai ( 蔡文祥 ) 1, 2 1 Dept. of Computer Science, National Chiao Tung University,

More information

CSC418 / CSCD18 / CSC2504

CSC418 / CSCD18 / CSC2504 5 5.1 Surface Representations As with 2D objects, we can represent 3D objects in parametric and implicit forms. (There are also explicit forms for 3D surfaces sometimes called height fields but we will

More information

MATH 19520/51 Class 15

MATH 19520/51 Class 15 MATH 19520/51 Class 15 Minh-Tam Trinh University of Chicago 2017-11-01 1 Change of variables in two dimensions. 2 Double integrals via change of variables. Change of Variables Slogan: An n-variable substitution

More information

FINGERPRINTING SCHEME FOR FILE SHARING IN TRANSFORM DOMAIN

FINGERPRINTING SCHEME FOR FILE SHARING IN TRANSFORM DOMAIN FINGERPRINTING SCHEME FOR FILE SHARING IN TRANSFORM DOMAIN S.Manikandaprabu 1 P.Kalaiyarasi 2 1 Department of CSE, Tamilnadu College of Engineering, Coimbatore, India smaniprabume@gmail.com 2 Department

More information

Part III. Attacks and Countermeasures

Part III. Attacks and Countermeasures Part III Attacks and Countermeasures 19 Chapter 9 Attacks and Countermeasures on Known Data Hiding Algorithms An attack on a watermarking system is to obliterate the watermark so that the original goal

More information