A WATERMARKING METHOD RESISTANT TO GEOMETRIC ATTACKS
|
|
- Diane Townsend
- 5 years ago
- Views:
Transcription
1 A WATERMARKING METHOD RESISTANT TO GEOMETRIC ATTACKS D. Simitopoulos, D. Koutsonanos and M.G. Strintzis Informatics and Telematics Institute Thermi-Thessaloniki, Greece. Abstract In this paper, a novel watermarking scheme able to resist geometric attacks is analyzed. The proposed method performs watermarking of images in the raw domain. A perceptual model is used in order to define the strength of the embedded watermark. For resistance to scaling and rotation attacks, two generalized Radon transformations of the image are introduced, while resistance to translation is accomplished through a localization of the watermarking method based on feature points of the image. Experimental evaluation demonstrates that the proposed scheme is able to withstand a variety of attacks including common geometric attacks. INTRODUCTION Watermarking of images is a technology that has attracted a lot of attention the recent years. In order to verify the robustness of the proposed watermarking schemes, a variety of attacks may be imposed to the image []. Among them, geometric attacks such as scaling, rotation and translation are easy to apply and may lead many watermark detectors to total failure due to loss of synchronization between the embedded and the correlating watermark. Lately, a lot of watermarking methods resistant to geometric attacks were presented in the literature. These may be divided in three categories. In some approaches, the watermark embedding is performed in a domain invariant to geometric attacks [2], while in others an additional pattern is embedded in the image in order to be able to revert the geometric attack [3]. Yet another approach for resisting geometric attacks is based on geometrically transforming a reference watermark both in the embedding and detection (correlation) according to a characteristic of the image content. A similar approach was presented in [4] where characteristics of the image content were extracted using Principal Component Analysis. The watermarking method presented in this paper, is also based on the latter approach to geometric resistant watermarking. First a corner detection scheme detects corners in the image content and finds the most robust among them. This corner is used as an origin for two onedimensional generalized Radon transformations that are applied to the image. According to characteristic values extracted from the two transformations during the embedding and detection of the watermark, a reference watermark is scaled and rotated before embedding or correlation-based detection respectively. This way, synchronization between the embedding and the correlating watermark is achieved. The experimental results demonstrate the resistance of the proposed scheme to geometric attacks as well as other common attacks. One- Dimensional Generalized Radon Transformations One-Dimensional Generalized Radon Transformations Two one-dimensional generalized Radon transformations [5] for resistance to scaling and rotation attacks respectively are introduced. The Radial Integration Transform (RIT) is used to 36
2 deal with rotation attacks, while the Circular Integration Transform (CIT) is used to cope with scaling attacks. Radial Integration Transform The RIT of a function f(x,y) is defined as the integral along a straight line that begins from the origin (x o,y o ) and has angle θ with respect to the horizontal axis (see Fig.a) The RIT is given by the following equation: + ( θ) = ( + cosθ, + sin ) where u is the distance from the origin (x o,y o ). Rf f xo u yo u θ du () 0 x y If f(x,y) is an image and g( x, y) = f, is the image scaled by s (s>0) in both s s directions, then the RIT of image g(x,y) is given by: R ( θ ) = sr ( θ ) g f (2) Therefore, the RIT amplitude of the scaled image is only multiplied by the factor s. If f (, r ϕ ) is an image written in polar form and gr (, ϕ) = f( r, ϕ ϕa ) is the image rotated byφ a around the ( r, φ ) system origin, then the RIT of image grϕ (, ) is given by: R ( θ ) = R ( θ φ ) g f a (3) Therefore, the RIT of the rotated image is translated byφ a. Circular Integration Transform The CIT of a function f(x,y) is defined as the integral of f(x,y) along a circle curve ( ) h ρ with center (x o,y o ) and radius ρ (see Fig. b). The CIT is given by the following equation: 2 ( ) π ( ) ( ρ ) 0 C ( ) cos, sin cos, sin f ρ = f xo + ρ θ yo + ρ θ du = xo + ρ θ yo + ρ θ ρdθ (4) h where du is the elementary arc length over the integration path and dθ is the corresponding elementary angle. x y If f(x,y) is an image and g( x, y) = f, is the image scaled by s (s>0) in both s s directions, then the CIT of image g(x,y) is given by: Cg( ρ) = scf( ρ) (5) s Therefore, the CIT of the scaled image is scaled with the same scaling factor and its amplitude is also multiplied by the factor s. 37
3 If f ( r, ϕ ) is an image written in polar form and gr (, ϕ) = f( r, ϕ ϕa ) is the image rotated byφ a around the ( r, φ ) system origin, then the CIT of image grϕ (, ) is given by: C ( ρ) = C ( ρ) g f (6) Therefore, the CIT of an image is independent of rotation. y (x o,y o ) Integration path θ du dx dy y (x o,y o ) ρ dθ θ Integration path ds x x (a) (b) Discrete RIT and CIT Fig. (a) RIT integration path, (b) CIT integration path. A discrete form of the RIT equation () is given by J R( t θ) = I( x0 + j ucos ( t θ), y0 + j usin( t θ) ), t =,..., T (7) J j= where u and θ are the constant step sizes of the corresponding variables, J is the number of points that lie on the line with orientation θ and are located between the origin and the end of 360 the image I(x,y) in that direction, and T =. θ Similarly, a discrete form of the CIT equation (4) is given by Τ Ck ( ρ) = I( x0 + k ρcos ( t θ), y0 + k ρsin( t θ) ), k=,..., K Τ t= where ρ and θ are the constant step sizes of the corresponding variables, K ρ is the radius 360 of the smallest circle that encircles the image I(x,y), and Τ=. θ Resisting geometric transformations using RIT and CIT The RIT and CIT properties given in equations (2), (3), (5) and (6) are very desirable in watermarking applications in which resisting the geometric attacks performed on the watermarked image is required. This can be accomplished by the watermark embedding and detection scheme described in the following. First, a two-dimensional watermark is created, to be used as a reference watermark. The orientation of the reference watermark corresponds to a reference angle θ r and one of its dimensions (its width for example) corresponds to a reference size ρ r. Then, the values of the (8) 38
4 parameters θ max and ρ max which maximize the RIT and CIT coefficients respectively, define the geometric transformation that the reference watermark should undergo before additive embedding in the original image. Specifically, the reference watermark is first scaled by the scaling factor ρmax sw = (9) ρr and rotated by the angle r (0) w = θmax θr and then embedded in the image. Let us assume a scaling and a rotation attack to the watermarked image by s α and θ α respectively. Based on the RIT and CIT properties, it is obvious that after the attack, the location of the new maximum will be θ max + θ α for RIT and s α ρ max for CIT. Subsequently, in ρmax the detection process, if the reference watermark is scaled by the scaling factor sw = s α ρ and rotated by the angle rw = θmax θr + θa, the embedding and the correlating watermark will be synchronized (same scale and orientation), which is vital for a successful detection. This concept for resisting geometric attacks can only be applied if a specific location of the image content can be accurately traced both in the embedding and in the detection (possibly after a geometrical attack that would change its position). This location will serve as an origin for RIT and CIT in embedding and detection and also for positioning the embedding and the correlating watermark. A robust feature point extracted from the image content would be appropriate for this cause. For this reason, a corner point is extracted from the image. Watermark embedding The proposed watermarking scheme, which is based on the concept described in the previous section, performs the watermark embedding in the following steps (see Fig. 2a): A random two-dimensional sequence of + and - is created based on a secret key. Each value of the sequence is spread in blocks sized B B (B=2). This block-based watermark will be used as the reference watermark. The Harris corner detector [6] is applied in the image and the most robust among the detected corners is extracted. Using the location of the most robust corner as the origin, the RIT and CIT are applied to the image. Then, θ max and ρ max are found and the rotation parameter r w and the scaling parameter s w are calculated. The reference watermark is geometrically transformed using r w and s w. A perceptual analysis for each image pixel X(i,j) is performed as in [7], in order to determine the strength of the watermark. Additive embedding of the watermark in the spatial domain is performed. After experimenting with a set of 500 photographic images where the watermark was embedded, no noticeable degradation of the image quality was observed and the minimum and average PSNR observed were 39.97db and 4.76db respectively. Watermark detection For the detection of the watermark, a correlation-based detection scheme is applied. The detection process can be divided in the following steps (see Fig. 2b): r 39
5 . The watermark W is created using the owner's secret key and is then transformed to a block-based watermark W B as in the embedding process. 2. The Harris corner detector is applied to the image. 3. The RIT and CIT of the image are calculated using the location of the corner detector response maximum as the origin. Then, the values of the parameters ρ max and θ max that maximize the RIT and CIT coefficients respectively are found. 4. The scaling and rotation parameters s w and r w, that will be used to create the correlating watermark W C, are estimated using the detected corner as the origin for RIT and CIT. 5. The correlating watermark W C is created by first geometrically transforming the watermark W B and then by applying the sign function to the values of the geometrically transformed watermark as in the embedding process. 6. The local mean Y lm (i,j) for each pixel Y(i,j) of the test image is calculated. The local mean is calculated over a 7 x 7 window centered at the pixel location. 7. The correlation value c between the watermarked and possibly distorted N image pixel values Y(i,j) (after the local mean Y lm (i,j) is subtracted) and the watermark values W C (i,j) is calculated: c = () ( Y( i, j) Ylm ( i, j) ) WC ( i, j) N i j 8. The correlation value c is compared to the threshold T, which is defined according to the allowed false alarm probability P FA of the detection scheme. Reference Watermark Reference Watermark Original Image Corner Detection Perceptual Analysis CIT RIT ρ max θ max Geometrical Transformation of Watermark Rotated and Scaled Watermark Attacked Watermarked Image Harris Corner Detector CIT RIT ρ max θ max Correlation Geometrical Transformation of Watermark Synchronized Watermark Additive Embedding Decision Watermarked Image (a) (b) Fig. 2 (a) Watermark embedding process, (b) Watermark detection process. Experimental Results The experiments presented in the following were all performed using the image Lena. The corner detected at (x 0 =80, y 0 =435) was used as the origin for the RIT and CIT transforms. The parameters of these transforms were set to the following values: θ=0.0, s=0.5, θ r =0 o for the RIT transform and ρ=0., θ = , ρ r =250 for the CIT transform. Linear interpolation was used for the geometrical transformations of the watermark. Various attacks were directed on the watermarked image. The corresponding errors of the estimated geometrical transformations of the image, and the corresponding correlator values are presented in Table. Finally, the correlator value for the watermarked image Lena using 5000 different correlating watermarks is given in Fig. 3. The 000th watermark is the valid correlating 40
6 watermark. The experimental mean and variance of the correlator value derived from this test were very close to the corresponding theoretical values which were used to determine the threshold T=0.2 for a given false alarm probability P FA =0-3. Scaling Attack Rotation parameters JPEG Q=70 - Estimation Scaling error Rotation Correlation value c Threshold T Table Correlator output results for various attacks on the watermarked image Lena Fig. 3 Correlator values for the watermarked image Lena using 5000 different correlating watermarks. References [] F. A. P. Petitcolas, Watermarking schemes evaluation, IEEE Signal Processing, vol. 7, no.5, pp , [2] J. O. Ruanaidh and T. Pun, Rotation, scale and translation invariant spread spectrum digital image watermarking, Signal Processing, vol. 66, no. 3, pp , May 998. [3] S. Pereira and T. Pun, Robust template matching for affine resistant image watermarks, IEEE Trans. Image Processing, vol. 9, no. 6, pp , June [4] P. Bas and B. Macq, A new video-object watermarking scheme robust to object manipulation, in ICIP, Thessaloniki, Greece, Oct. 200, vol. 2, pp [5] C.H. Chapman, Generalized Radon transforms and slant stacks, Geophys. J. R. ast. Soc., vol 66, pp , 98. [6] C. Harris and M. Stephen, A combined corner and edge detector, in Alvey Vision Conference, 988, pp [7] D. Simitopoulos, D. Koutsonanos, and M. G. Strintzis, Image watermarking resistant to geometric attacks using Generalized Radon Transformations, DSP 2002, Santorini, Greece, June 2002, pp
Subpixel Corner Detection Using Spatial Moment 1)
Vol.31, No.5 ACTA AUTOMATICA SINICA September, 25 Subpixel Corner Detection Using Spatial Moment 1) WANG She-Yang SONG Shen-Min QIANG Wen-Yi CHEN Xing-Lin (Department of Control Engineering, Harbin Institute
More informationImage watermarking based on scale-space representation
Image watermarking based on scale-space representation Jin S. Seo and Chang D. Yoo Department of Electrical Engineering and Computer Science Korea Advanced Institute of Science and Technology Daejeon 305-701,
More informationA Robust Wavelet-Based Watermarking Algorithm Using Edge Detection
A Robust Wavelet-Based Watermarking Algorithm Using Edge Detection John N. Ellinas Abstract In this paper, a robust watermarking algorithm using the wavelet transform and edge detection is presented. The
More informationA Print-Scan Resilient Watermarking based on Fourier Transform and Image Restoration
A Print-Scan Resilient Watermarking based on Fourier Transform and Image Restoration R. Riad H. Douzi M. El Hajji R. Harba PRISME, University of Orleans, Orléans, France F. Ros PRISME, University of Orleans,
More informationA ROBUST WATERMARKING SCHEME BASED ON EDGE DETECTION AND CONTRAST SENSITIVITY FUNCTION
A ROBUST WATERMARKING SCHEME BASED ON EDGE DETECTION AND CONTRAST SENSITIVITY FUNCTION John N. Ellinas Department of Electronic Computer Systems,Technological Education Institute of Piraeus, 12244 Egaleo,
More informationRotation, scale, and translation invariant image watermark using higher order spectra Hyung -Shin Kim Yunju Baek Heung-Kyu Lee
Rotation, scale, and translation invariant image watermark using higher order spectra Hyung -Shin Kim Yunju Baek Heung-Kyu Lee Division of Computer Science Department of Electrical Engineering and Computer
More informationAPPLICATION OF RADON TRANSFORM IN CT IMAGE MATCHING Yufang Cai, Kuan Shen, Jue Wang ICT Research Center of Chongqing University, Chongqing, P.R.
APPLICATION OF RADON TRANSFORM IN CT IMAGE MATCHING Yufang Cai, Kuan Shen, Jue Wang ICT Research Center of Chongqing University, Chongqing, P.R.China Abstract: When Industrial Computerized Tomography (CT)
More informationRobust Image Watermarking based on DCT-DWT- SVD Method
Robust Image Watermarking based on DCT-DWT- SVD Sneha Jose Rajesh Cherian Roy, PhD. Sreenesh Shashidharan ABSTRACT Hybrid Image watermarking scheme proposed based on Discrete Cosine Transform (DCT)-Discrete
More informationGraphics and Interaction Transformation geometry and homogeneous coordinates
433-324 Graphics and Interaction Transformation geometry and homogeneous coordinates Department of Computer Science and Software Engineering The Lecture outline Introduction Vectors and matrices Translation
More informationCOMP30019 Graphics and Interaction Transformation geometry and homogeneous coordinates
COMP30019 Graphics and Interaction Transformation geometry and homogeneous coordinates Department of Computer Science and Software Engineering The Lecture outline Introduction Vectors and matrices Translation
More informationTo graph the point (r, θ), simply go out r units along the initial ray, then rotate through the angle θ. The point (1, 5π 6
Polar Coordinates Any point in the plane can be described by the Cartesian coordinates (x, y), where x and y are measured along the corresponding axes. However, this is not the only way to represent points
More informationTo graph the point (r, θ), simply go out r units along the initial ray, then rotate through the angle θ. The point (1, 5π 6. ) is graphed below:
Polar Coordinates Any point in the plane can be described by the Cartesian coordinates (x, y), where x and y are measured along the corresponding axes. However, this is not the only way to represent points
More informationA Robust A DCT-Based Digital Watermarking Scheme Using Important Feature Points
A Robust A DCT-Based Digital Watermarking Scheme Using Important Feature Points Xiaojun Qi and Ji Qi Department of Computer Science, Utah State University Logan, UT, 84322-4205, USA. Xiaojun.Qi@usu.edu
More informationA Robust Image Watermarking Scheme using Image Moment Normalization
A Robust Image ing Scheme using Image Moment Normalization Latha Parameswaran, and K. Anbumani Abstract Multimedia security is an incredibly significant area of concern. A number of papers on robust digital
More informationA NEW APPROACH OF DIGITAL IMAGE COPYRIGHT PROTECTION USING MULTI-LEVEL DWT ALGORITHM
A NEW APPROACH OF DIGITAL IMAGE COPYRIGHT PROTECTION USING MULTI-LEVEL DWT ALGORITHM Siva Prasad K, Ganesh Kumar N PG Student [DECS], Assistant professor, Dept of ECE, Thandrapaparaya Institute of science
More informationAnalysis of feature-based geometry invariant watermarking
Header for SPIE use Analysis of feature-based geometry invariant watermarking Mehmet U. Celik *a, Eli Saber b, Gaurav Sharma b, A.Murat Tekalp a a University of Rochester, Rochester, NY, 14627-0126 b Xerox
More informationA Robust Visual Identifier Using the Trace Transform
A Robust Visual Identifier Using the Trace Transform P. Brasnett*, M.Z. Bober* *Mitsubishi Electric ITE VIL, Guildford, UK. paul.brasnett@vil.ite.mee.com, miroslaw.bober@vil.ite.mee.com Keywords: image
More informationRST Invariant Digital Image Watermarking Based on Log-Polar Mapping and Phase Correlation
IEEE TRANSACTIONS ON CIRCUITS AND SYSTEMS FOR VIDEO TECHNOLOGY, VOL. XX, NO. Y, SEPTEMBER 2003 1 RST Invariant Digital Image Watermarking Based on Log-Polar Mapping and Phase Correlation Dong Zheng, Student
More informationRobust Digital Image Watermarking based on complex wavelet transform
Robust Digital Image Watermarking based on complex wavelet transform TERZIJA NATAŠA, GEISSELHARDT WALTER Institute of Information Technology University Duisburg-Essen Bismarckstr. 81, 47057 Duisburg GERMANY
More informationComparison of Digital Image Watermarking Algorithms. Xu Zhou Colorado School of Mines December 1, 2014
Comparison of Digital Image Watermarking Algorithms Xu Zhou Colorado School of Mines December 1, 2014 Outlier Introduction Background on digital image watermarking Comparison of several algorithms Experimental
More informationEdge and local feature detection - 2. Importance of edge detection in computer vision
Edge and local feature detection Gradient based edge detection Edge detection by function fitting Second derivative edge detectors Edge linking and the construction of the chain graph Edge and local feature
More informationFiltering. -If we denote the original image as f(x,y), then the noisy image can be denoted as f(x,y)+n(x,y) where n(x,y) is a cosine function.
Filtering -The image shown below has been generated by adding some noise in the form of a cosine function. -If we denote the original image as f(x,y), then the noisy image can be denoted as f(x,y)+n(x,y)
More informationPolar Coordinates. Chapter 10: Parametric Equations and Polar coordinates, Section 10.3: Polar coordinates 27 / 45
: Given any point P = (x, y) on the plane r stands for the distance from the origin (0, 0). θ stands for the angle from positive x-axis to OP. Polar coordinate: (r, θ) Chapter 10: Parametric Equations
More informationDigital video watermarking robust to geometric attacks and compressions
Digital video watermarking robust to geometric attacks and compressions by Yan Liu A thesis submitted to the Faculty of Graduate and Postdoctoral Studies in partial fulfillment of the requirements for
More informationPolar Coordinates. Chapter 10: Parametric Equations and Polar coordinates, Section 10.3: Polar coordinates 28 / 46
Polar Coordinates Polar Coordinates: Given any point P = (x, y) on the plane r stands for the distance from the origin (0, 0). θ stands for the angle from positive x-axis to OP. Polar coordinate: (r, θ)
More informationCOMPARISONS OF DCT-BASED AND DWT-BASED WATERMARKING TECHNIQUES
COMPARISONS OF DCT-BASED AND DWT-BASED WATERMARKING TECHNIQUES H. I. Saleh 1, M. E. Elhadedy 2, M. A. Ashour 1, M. A. Aboelsaud 3 1 Radiation Engineering Dept., NCRRT, AEA, Egypt. 2 Reactor Dept., NRC,
More informationWATERMARKING FOR LIGHT FIELD RENDERING 1
ATERMARKING FOR LIGHT FIELD RENDERING 1 Alper Koz, Cevahir Çığla and A. Aydın Alatan Department of Electrical and Electronics Engineering, METU Balgat, 06531, Ankara, TURKEY. e-mail: koz@metu.edu.tr, cevahir@eee.metu.edu.tr,
More informationPolar Coordinates
Polar Coordinates 7-7-2 Polar coordinates are an alternative to rectangular coordinates for referring to points in the plane. A point in the plane has polar coordinates r,θ). r is roughly) the distance
More informationBlock Mean Value Based Image Perceptual Hashing for Content Identification
Block Mean Value Based Image Perceptual Hashing for Content Identification Abstract. Image perceptual hashing has been proposed to identify or authenticate image contents in a robust way against distortions
More informationRobust image watermarking using local invariant features
45 3, 037002 March 2006 Robust image watermarking using local invariant features Hae-Yeoun Lee Korea Advanced Institute of Science and Technology Department of Electrical Engineering and Computer Science
More informationRobust Watermark Algorithm using Genetic Algorithm
JOURNAL OF INFORMATION SCIENCE AND ENGINEERING 23, 661-670 (2007) Short Paper Robust Watermark Algorithm using Genetic Algorithm CONG JIN AND SHI-HUI WANG * Department of Computer Science Central China
More informationAn approach for generic detection of conic equation from images
An approach for generic detection of conic equation from images Maysa Macedo and Aura Conci Universidade Federal Fluminense (UFF) mmacedo@ic.uff.br - aconci@ic.uff.br Hough Transform Hough transform is
More informationA Wavelet Watermarking Algorithm Based on a Tree Structure
A Wavelet Watermarking Algorithm Based on a Tree Structure Oriol Guitart Pla a,eugenet.lin b,andedwardj.delp b a Universitat Politecnica de Catalunya (UPC) Barcelona Spain b Video and Image Processing
More informationDIGITAL watermarking technology is emerging as a
126 IEEE TRANSACTIONS ON IMAGE PROCESSING, VOL. 13, NO. 2, FEBRUARY 2004 Analysis and Design of Watermarking Algorithms for Improved Resistance to Compression Chuhong Fei, Deepa Kundur, Senior Member,
More informationLecture 15: Segmentation (Edge Based, Hough Transform)
Lecture 15: Segmentation (Edge Based, Hough Transform) c Bryan S. Morse, Brigham Young University, 1998 000 Last modified on February 3, 000 at :00 PM Contents 15.1 Introduction..............................................
More informationRadon Transform-Based Secure Image Hashing
Radon Transform-Based Secure Image Hashing Dung Q. Nguyen, Li Weng, and Bart Preneel Katholieke Universiteit Leuven, ESAT/COSIC-IBBT dungtobe@gmail.com, {li.weng,bart.preneel}@esat.kuleuven.be Abstract.
More informationBENCHMARKING OF STILL IMAGE WATERMARKING METHODS: PRINCIPLES AND STATE OF THE ART
BENCHMARKING OF STILL IMAGE WATERMARKING METHODS: PRINCIPLES AND STATE OF THE ART N. Nikolaidis, V. Solachidis, A. Tefas, V. Arguriou, I. Pitas Department of Informatics Aristotle University of Thessaloniki
More informationMath Boot Camp: Coordinate Systems
Math Boot Camp: Coordinate Systems You can skip this boot camp if you can answer the following question: Staying on a sphere of radius R, what is the shortest distance between the point (0, 0, R) on the
More informationCoordinate Transformations in Advanced Calculus
Coordinate Transformations in Advanced Calculus by Sacha Nandlall T.A. for MATH 264, McGill University Email: sacha.nandlall@mail.mcgill.ca Website: http://www.resanova.com/teaching/calculus/ Fall 2006,
More informationMultiple domain watermarking for print-scan and JPEG resilient data hiding
Multiple domain watermarking for print-scan and JPEG resilient data hiding Anu Pramila, Anja Keskinarkaus, and Tapio Seppänen MediaTeam Oulu, Department of Electrical and Information Engineering, University
More informationConics, Parametric Equations, and Polar Coordinates. Copyright Cengage Learning. All rights reserved.
10 Conics, Parametric Equations, and Polar Coordinates Copyright Cengage Learning. All rights reserved. 10.5 Area and Arc Length in Polar Coordinates Copyright Cengage Learning. All rights reserved. Objectives
More informationRotation, Scale, and Translation Resilient Digital Watermark Based on Complex Exponential Function
40 ECTI TRANSACTIONS ON ELECTRICAL ENG., ELECTRONICS, AND COMMUNICATIONS VOL.2, NO.2 AUGUST 2004 Rotation, Scale, and Translation Resilient Digital Watermark Based on Complex Exponential Function Siriporn
More informationSection Parametrized Surfaces and Surface Integrals. (I) Parametrizing Surfaces (II) Surface Area (III) Scalar Surface Integrals
Section 16.4 Parametrized Surfaces and Surface Integrals (I) Parametrizing Surfaces (II) Surface Area (III) Scalar Surface Integrals MATH 127 (Section 16.4) Parametrized Surfaces and Surface Integrals
More informationOn domain selection for additive, blind image watermarking
BULLETIN OF THE POLISH ACADEY OF SCIENCES TECHNICAL SCIENCES, Vol. 60, No. 2, 2012 DOI: 10.2478/v10175-012-0042-5 DEDICATED PAPERS On domain selection for additive, blind image watermarking P. LIPIŃSKI
More informationROBUST WATERMARKING OF DIGITAL IMAGES BASED ON CHAOTIC MAPPING AND DCT
ROBUST WATERMARKING OF DIGITAL IMAGES BASED ON CHAOTIC MAPPING AND DCT E. Chrysochos, V. Fotopoulos, and A. N. Skodras Digital Systems & Media Computing Laboratory, School of Science and Technology, Hellenic
More informationWITH the advent of Internet, the use of digital media
IEEE TRANSACTIONS ON SIGNAL PROCESSING, VOL. 54, NO. 4, APRIL 2006 1537 Image Watermarking Based on Invariant Regions of Scale-Space Representation Jin S. Seo, Associate Member, IEEE, and Chang D. Yoo,
More informationConics, Parametric Equations, and Polar Coordinates. Copyright Cengage Learning. All rights reserved.
10 Conics, Parametric Equations, and Polar Coordinates Copyright Cengage Learning. All rights reserved. 10.5 Area and Arc Length in Polar Coordinates Copyright Cengage Learning. All rights reserved. Objectives
More informationAn Improved Images Watermarking Scheme Using FABEMD Decomposition and DCT
An Improved Images Watermarking Scheme Using FABEMD Decomposition and DCT Noura Aherrahrou and Hamid Tairi University Sidi Mohamed Ben Abdellah, Faculty of Sciences, Dhar El mahraz, LIIAN, Department of
More informationPolar Coordinates. Calculus 2 Lia Vas. If P = (x, y) is a point in the xy-plane and O denotes the origin, let
Calculus Lia Vas Polar Coordinates If P = (x, y) is a point in the xy-plane and O denotes the origin, let r denote the distance from the origin O to the point P = (x, y). Thus, x + y = r ; θ be the angle
More informationIN MANY IMAGE processing scenarios, it would be desirable
IEEE TRANSACTIONS ON CIRCUITS AND SYSTEMS II: EXPRESS BRIEFS, VOL. 53, NO. 5, MAY 2006 359 Watermark Detection for Noisy Interpolated Images Alexia Giannoula, Nikolaos V. Boulgouris, Member, IEEE, Dimitrios
More informationHOUGH TRANSFORM CS 6350 C V
HOUGH TRANSFORM CS 6350 C V HOUGH TRANSFORM The problem: Given a set of points in 2-D, find if a sub-set of these points, fall on a LINE. Hough Transform One powerful global method for detecting edges
More informationDigital Image Correlation of Stereoscopic Images for Radial Metrology
Digital Image Correlation of Stereoscopic Images for Radial Metrology John A. Gilbert Professor of Mechanical Engineering University of Alabama in Huntsville Huntsville, AL 35899 Donald R. Matthys Professor
More informationWatermarking of Image Using Priority Based On Algorithms
This work by IJARBEST is licensed under Creative Commons Attribution 4.0 International License. Available at https://www.ijarbest.com Watermarking of Image Using Priority Based On Algorithms B.Aarthi,
More informationINVARIANT CORNER DETECTION USING STEERABLE FILTERS AND HARRIS ALGORITHM
INVARIANT CORNER DETECTION USING STEERABLE FILTERS AND HARRIS ALGORITHM ABSTRACT Mahesh 1 and Dr.M.V.Subramanyam 2 1 Research scholar, Department of ECE, MITS, Madanapalle, AP, India vka4mahesh@gmail.com
More informationDetecting Printed and Handwritten Partial Copies of Line Drawings Embedded in Complex Backgrounds
9 1th International Conference on Document Analysis and Recognition Detecting Printed and Handwritten Partial Copies of Line Drawings Embedded in Complex Backgrounds Weihan Sun, Koichi Kise Graduate School
More informationThe diagram above shows a sketch of the curve C with parametric equations
1. The diagram above shows a sketch of the curve C with parametric equations x = 5t 4, y = t(9 t ) The curve C cuts the x-axis at the points A and B. (a) Find the x-coordinate at the point A and the x-coordinate
More informationEdge detection. Gradient-based edge operators
Edge detection Gradient-based edge operators Prewitt Sobel Roberts Laplacian zero-crossings Canny edge detector Hough transform for detection of straight lines Circle Hough Transform Digital Image Processing:
More informationA New Method for Quantifying the Response of Filters at Corners
A New Method for Quantifying the Response of Filters at Corners Mark A. Schulze and John A. Pearce Department of Electrical and Computer Engineering and Biomedical Engineering Program The University of
More informationCalculus III. Math 233 Spring In-term exam April 11th. Suggested solutions
Calculus III Math Spring 7 In-term exam April th. Suggested solutions This exam contains sixteen problems numbered through 6. Problems 5 are multiple choice problems, which each count 5% of your total
More informationGeneric Fourier Descriptor for Shape-based Image Retrieval
1 Generic Fourier Descriptor for Shape-based Image Retrieval Dengsheng Zhang, Guojun Lu Gippsland School of Comp. & Info Tech Monash University Churchill, VIC 3842 Australia dengsheng.zhang@infotech.monash.edu.au
More information9 length of contour = no. of horizontal and vertical components + ( 2 no. of diagonal components) diameter of boundary B
8. Boundary Descriptor 8.. Some Simple Descriptors length of contour : simplest descriptor - chain-coded curve 9 length of contour no. of horiontal and vertical components ( no. of diagonal components
More informationImage Watermarking System Based on Centroid Projection
ICICS-FCMZOO3 15-18Deamba2003 singapare 2C2.3 Image Watermarking System Based on Centroid Projection Shih-Wei Sun and Pao-Chi Chang Electrical Engineering, National Central University, Chung-Li, Taiwan
More informationDIGITAL IMAGE WATERMARKING BASED ON A RELATION BETWEEN SPATIAL AND FREQUENCY DOMAINS
DIGITAL IMAGE WATERMARKING BASED ON A RELATION BETWEEN SPATIAL AND FREQUENCY DOMAINS Murat Furat Mustafa Oral e-mail: mfurat@cu.edu.tr e-mail: moral@mku.edu.tr Cukurova University, Faculty of Engineering,
More informationAn Improved DCT Based Color Image Watermarking Scheme Xiangguang Xiong1, a
International Symposium on Mechanical Engineering and Material Science (ISMEMS 2016) An Improved DCT Based Color Image Watermarking Scheme Xiangguang Xiong1, a 1 School of Big Data and Computer Science,
More informationLecture 7: Most Common Edge Detectors
#1 Lecture 7: Most Common Edge Detectors Saad Bedros sbedros@umn.edu Edge Detection Goal: Identify sudden changes (discontinuities) in an image Intuitively, most semantic and shape information from the
More informationMath 136 Exam 1 Practice Problems
Math Exam Practice Problems. Find the surface area of the surface of revolution generated by revolving the curve given by around the x-axis? To solve this we use the equation: In this case this translates
More informationFeature Selection. Ardy Goshtasby Wright State University and Image Fusion Systems Research
Feature Selection Ardy Goshtasby Wright State University and Image Fusion Systems Research Image features Points Lines Regions Templates 2 Corners They are 1) locally unique and 2) rotationally invariant
More informationBiomedical Image Analysis. Point, Edge and Line Detection
Biomedical Image Analysis Point, Edge and Line Detection Contents: Point and line detection Advanced edge detection: Canny Local/regional edge processing Global processing: Hough transform BMIA 15 V. Roth
More informationA DWT-DFT Composite Watermarking Scheme Robust to Both Affine Transform and JPEG Compression
776 IEEE TRANSACTIONS ON CIRCUITS AND SYSTEMS FOR VIDEO TECHNOLOGY, VOL 13, NO 8, AUGUST 2003 A DWT-DFT Composite Watermarking Scheme Robust to Both Affine Transform and JPEG Compression Xiangui Kang,
More informationCombined Hashing/Watermarking Method for Image Authentication
Combined Hashing/Watermarking Method for Image Authentication Vlado Kitanovski, Dimitar Taskovski, and Sofija Bogdanova Abstract In this paper we present a combined hashing/watermarking method for image
More informationGeometrically Invariant Watermarking Using Feature Points
Geometrically Invariant Watermarking Using Feature Points Patrick Bas, Jean-Marc Chassery, Benoit Macq To cite this version: Patrick Bas, Jean-Marc Chassery, Benoit Macq. Geometrically Invariant Watermarking
More informationTypes of Edges. Why Edge Detection? Types of Edges. Edge Detection. Gradient. Edge Detection
Why Edge Detection? How can an algorithm extract relevant information from an image that is enables the algorithm to recognize objects? The most important information for the interpretation of an image
More informationA Robust Color Image Watermarking Using Maximum Wavelet-Tree Difference Scheme
A Robust Color Image Watermarking Using Maximum Wavelet-Tree ifference Scheme Chung-Yen Su 1 and Yen-Lin Chen 1 1 epartment of Applied Electronics Technology, National Taiwan Normal University, Taipei,
More informationR f da (where da denotes the differential of area dxdy (or dydx)
Math 28H Topics for the second exam (Technically, everything covered on the first exam, plus) Constrained Optimization: Lagrange Multipliers Most optimization problems that arise naturally are not unconstrained;
More informationTexture Segmentation by using Haar Wavelets and K-means Algorithm
Texture Segmentation by using Haar Wavelets and K-means Algorithm P. Ashok Babu Associate Professor, Narsimha Reddy Engineering College, Hyderabad, A.P., INDIA, ashokbabup2@gmail.com Dr. K. V. S. V. R.
More informationA Video Watermarking Algorithm Based on the Human Visual System Properties
A Video Watermarking Algorithm Based on the Human Visual System Properties Ji-Young Moon 1 and Yo-Sung Ho 2 1 Samsung Electronics Co., LTD 416, Maetan3-dong, Paldal-gu, Suwon-si, Gyenggi-do, Korea jiyoung.moon@samsung.com
More informationThis document is downloaded from DR-NTU, Nanyang Technological University Library, Singapore.
This document is downloaded from DR-NTU, Nanyang Technological University Library, Singapore. Title A robust phase watermarking algorithm using conugate symmetric sequency-ordered complex Hadamard transform
More informationChapter 11 Image Processing
Chapter Image Processing Low-level Image Processing Operates directly on a stored image to improve or enhance it. Stored image consists of a two-dimensional array of pixels (picture elements): Origin (0,
More informationA Novel Real-Time Feature Matching Scheme
Sensors & Transducers, Vol. 165, Issue, February 01, pp. 17-11 Sensors & Transducers 01 by IFSA Publishing, S. L. http://www.sensorsportal.com A Novel Real-Time Feature Matching Scheme Ying Liu, * Hongbo
More informationTransformations: 2D Transforms
1. Translation Transformations: 2D Transforms Relocation of point WRT frame Given P = (x, y), translation T (dx, dy) Then P (x, y ) = T (dx, dy) P, where x = x + dx, y = y + dy Using matrix representation
More informationEdge Detection. Announcements. Edge detection. Origin of Edges. Mailing list: you should have received messages
Announcements Mailing list: csep576@cs.washington.edu you should have received messages Project 1 out today (due in two weeks) Carpools Edge Detection From Sandlot Science Today s reading Forsyth, chapters
More informationA new robust watermarking scheme based on PDE decomposition *
A new robust watermarking scheme based on PDE decomposition * Noura Aherrahrou University Sidi Mohamed Ben Abdellah Faculty of Sciences Dhar El mahraz LIIAN, Department of Informatics Fez, Morocco Hamid
More informationRobust Zero Watermarking for Still and Similar Images Using a Learning Based Contour Detection
Robust Zero Watermarking for Still and Similar Images Using a Learning Based Contour Detection Shahryar Ehsaee and Mansour Jamzad (&) Department of Computer Engineering, Sharif University of Technology,
More informationChapter 3 Image Registration. Chapter 3 Image Registration
Chapter 3 Image Registration Distributed Algorithms for Introduction (1) Definition: Image Registration Input: 2 images of the same scene but taken from different perspectives Goal: Identify transformation
More informationRobust biometric image watermarking for fingerprint and face template protection
Robust biometric image watermarking for fingerprint and face template protection Mayank Vatsa 1, Richa Singh 1, Afzel Noore 1a),MaxM.Houck 2, and Keith Morris 2 1 West Virginia University, Morgantown,
More informationMultibit Digital Watermarking Robust against Local Nonlinear Geometrical Distortions
Multibit Digital Watermarking Robust against Local Nonlinear Geometrical Distortions Sviatoslav Voloshynovskiy Frédéric Deguillaume, and Thierry Pun CUI - University of Geneva 24, rue du Général Dufour
More informationSpatial, Transform and Fractional Domain Digital Image Watermarking Techniques
Spatial, Transform and Fractional Domain Digital Image Watermarking Techniques Dr.Harpal Singh Professor, Chandigarh Engineering College, Landran, Mohali, Punjab, Pin code 140307, India Puneet Mehta Faculty,
More information13. Brewster angle measurement
13. Brewster angle measurement Brewster angle measurement Objective: 1. Verification of Malus law 2. Measurement of reflection coefficient of a glass plate for p- and s- polarizations 3. Determination
More informationA NEW DCT-BASED WATERMARKING METHOD FOR COPYRIGHT PROTECTION OF DIGITAL AUDIO
International journal of computer science & information Technology (IJCSIT) Vol., No.5, October A NEW DCT-BASED WATERMARKING METHOD FOR COPYRIGHT PROTECTION OF DIGITAL AUDIO Pranab Kumar Dhar *, Mohammad
More informationEE 584 MACHINE VISION
EE 584 MACHINE VISION Binary Images Analysis Geometrical & Topological Properties Connectedness Binary Algorithms Morphology Binary Images Binary (two-valued; black/white) images gives better efficiency
More informationWorksheet 3.2: Double Integrals in Polar Coordinates
Boise State Math 75 (Ultman) Worksheet 3.: ouble Integrals in Polar Coordinates From the Toolbox (what you need from previous classes): Trig/Calc II: Convert equations in x and y into r and θ, using the
More informationBasic Algorithms for Digital Image Analysis: a course
Institute of Informatics Eötvös Loránd University Budapest, Hungary Basic Algorithms for Digital Image Analysis: a course Dmitrij Csetverikov with help of Attila Lerch, Judit Verestóy, Zoltán Megyesi,
More informationCircular Analysis based Line Detection Filters for Watermark Extraction in X-ray images of Etchings
Circular Analysis based Line Detection Filters for Watermark Extraction in X-ray images of Etchings M. van Staalduinen, J. C. A. van der Lubbe, E. Backer {M.vanStaalduinen, J.C.A.vanderLubbe, E.Backer}@ewi.tudelft.nl
More informationComputer Vision. Coordinates. Prof. Flávio Cardeal DECOM / CEFET- MG.
Computer Vision Coordinates Prof. Flávio Cardeal DECOM / CEFET- MG cardeal@decom.cefetmg.br Abstract This lecture discusses world coordinates and homogeneous coordinates, as well as provides an overview
More informationEdge and corner detection
Edge and corner detection Prof. Stricker Doz. G. Bleser Computer Vision: Object and People Tracking Goals Where is the information in an image? How is an object characterized? How can I find measurements
More informationCOPYRIGHT PROTECTION OF PALETTE IMAGES BY A ROBUST LOSSLESS VISIBLE WATERMARKING TECHNIQUE *
COPYRIGHT PROTECTION OF PALETTE IMAGES BY A ROBUST LOSSLESS VISIBLE WATERMARKING TECHNIQUE * Pei-Pei Chen ( 陳佩貝 ) 1 and Wen-Hsiang Tsai ( 蔡文祥 ) 1, 2 1 Dept. of Computer Science, National Chiao Tung University,
More informationCSC418 / CSCD18 / CSC2504
5 5.1 Surface Representations As with 2D objects, we can represent 3D objects in parametric and implicit forms. (There are also explicit forms for 3D surfaces sometimes called height fields but we will
More informationMATH 19520/51 Class 15
MATH 19520/51 Class 15 Minh-Tam Trinh University of Chicago 2017-11-01 1 Change of variables in two dimensions. 2 Double integrals via change of variables. Change of Variables Slogan: An n-variable substitution
More informationFINGERPRINTING SCHEME FOR FILE SHARING IN TRANSFORM DOMAIN
FINGERPRINTING SCHEME FOR FILE SHARING IN TRANSFORM DOMAIN S.Manikandaprabu 1 P.Kalaiyarasi 2 1 Department of CSE, Tamilnadu College of Engineering, Coimbatore, India smaniprabume@gmail.com 2 Department
More informationPart III. Attacks and Countermeasures
Part III Attacks and Countermeasures 19 Chapter 9 Attacks and Countermeasures on Known Data Hiding Algorithms An attack on a watermarking system is to obliterate the watermark so that the original goal
More information