Multibit Digital Watermarking Robust against Local Nonlinear Geometrical Distortions
|
|
- Stephanie Price
- 5 years ago
- Views:
Transcription
1 Multibit Digital Watermarking Robust against Local Nonlinear Geometrical Distortions Sviatoslav Voloshynovskiy Frédéric Deguillaume, and Thierry Pun CUI - University of Geneva 24, rue du Général Dufour 1211 Geneva 4 Switzerland
2 Outline 1. Introduction 2. Watermarking as Communication with Side Information 3. Adaptive diversity watermarking 4. Affine transforms 5. Non-linear geometrical distortions 6. Results 7. Conclusions
3 1. Introduction Watermarking (WM) should mainly resist: geometrical attacks (desynchronization( desynchronization), e.g.: cropping, translation, rotation, rescaling, proportion change, row/column removal, general affine transforms, random local distortions signal processing attacks: non-linear and adaptive filtering, lossy compression (JPEG, JPEG2K), (re)quantization, multiple watermarks, noise addition Open questions for many existing WM technologies: random bending attack (RBA) projective transforms warping 3
4 2. Watermarking as Communication with Side Information (SI) Key p(y x,s) Message b Watermark Encoder s Attacking Channel Watermark Decoder s bˆ A State generator B Cover image x 4
5 2. Watermarking as Communication with SI SI is available at both encoder and decoder. Key Pilot Generator Pilot Generator Message b x Encoder c Image channel state estimation Watermark Embedder y Attacks y Watermark Extractor ŵ Geometrical distortion Estimator Recovery of synchronization Fading Estimator Decoder bˆ 5
6 2. Watermarking as Communication with SI These algorithms can operate under a wide class of uncertainties with respect to the channel state. The encoder is matched with the cover data and the decoder is adapted to the attacking channel variations assuming fading, non-gaussian attacks and geometrical transforms utilizing advantages of diversity watermarking. 6
7 3. Adaptive diversity watermarking Matched filter c i F 1 ( i) β 1 ( i) r(i) Decoder bˆ Pilot F J (i) β J (i) Pilot based channel state estimation Generalized channel: c = Fc + β Fading non-gaussian noise 7
8 3. Adaptive diversity watermarking Decoder for Fading and non Gaussian noise: was presented in [SPIE2001] Main goal of this paper: to consider the synchronization aspects of the adaptive decoder: global affine transforms random bending attack (RBA) projective transforms warping 8
9 4. Affine transforms An affine transform maps a point (x,y) T to (x,y ) T : x = y x A + d y a b and dx A = d = c d d y d = translation part, parameters: d x, d x A = linear part, parameters: a, b, c, d d is easily estimated, e.g. based on cross-correlation with a reference pattern with: 9
10 4. Affine transforms Original image: Affine transformed: 10
11 4.1. A self-reference watermark Message b Encoder c Encryption Allocation in the block Addition of reference WM, or pilot K Watermark 2 Tiling Upsampling Flipping For more details, see [EUSIPCO2000] 11
12 4.2. Estimation of affine transform parameters based on magnitude spectrum Magnitude spectrum peaks (after perceptual embedding) : Periodical WM : without compression with JPEG, QF=50%! Rotated periodical WM : - Fourier magnitude spectrum of WM => regular grid of peaks - The affine transform parameters can be estimated from this grid 12
13 4.2. Estimation of affine transform parameters The set of peaks is generally noisy: Â ˆ min x' x A = arg ρ A + µ Ω( A) A Φ y' y = estimate of the affine transform within the set of possible transforms ρ = cost function (quadratic norm for Gaussian model of misalignments, l 1 norm for Laplacian model) µ Ω(A) A Φ = regularization parameter a, b, c, d A = constraints on the coefficients in 13
14 4.2. Estimation of affine transform parameters Magnitude spectrum peaks Fitted affine parameters More details will be presented in [SPIE2002] 14
15 5. Nonlinear geometrical distortions Not all transforms are affine transforms: projective transforms random bending attack (RBA) warping Factors that complicate the WM extraction: perceptual masking function: reduce the WM energy in flat areas damaged areas: information is easily destroyed in flat areas by lossy compression or denoising splitting in non-synchronized parts, insertion in another image: collage attack => modeled as deep fade or erasure channels 15
16 5.1. Projective transforms, RBA, and warping Original image: Projected: RBA: Warped: 16
17 5.2. Collage attack Original image: Splitted: 17
18 5.3. Recovering from local distortions Main idea: The WM can be approximated by a set of local affine transforms as: w p ( x, y) w A m, n K x 1K y 1 m= 0 n= 0 w( A 1 T T m, n ( x, y) ( mt, nt) ) K K where: is the original WM block, repeated x y times with a period (block size) of T T, resulting in the periodical and distorted WM. w This approximation is valid due to the limited amount of local distortions introduced by RBA to preserve the image quality p 18
19 5.3. Recovering from local distortions First approach: local self-reference in local areas, take at least 4 WM blocks into account compute magnitude spectrum locally, and then estimate local transform A m, n (with constrains) locally symmetric WM => zero-phase condition Fragment of RBA distorted WM Magnitude spectrum Fitted parameters compensate Compensated fragment or ACF 19
20 5.3. Recovering from local distortions Second approach: local template matching local area ~ 1 block based on the known reference WM perform local (and constrained) template matching to determine A m, n Fragment of RBA distorted WM pilot matching compensate Compensated fragment 20
21 5.4. Local geometrical compensation advantages Based on local self-reference: self-reference => no need for explicit template matching area of several blocks => more WM energy available for local fitting and decoding, than in the template case small number of peaks => fast estimation of the local linear transform Based on local template matching: area of only one block => better chance to correctly approximate the local transform by an affine transform Adaptive diversity decoding: combine blocks based on the reliability of the reference WM or pilot 21
22 5.5. Application to video watermarking Motion-compensated video (eg( eg.. MPEG-1/2) I-frames: JPEG encoded frames P/B-frames: block-wise motion compensated frames, relatively to I/P-frames I-frames Video frames P/B-frame P-frames B-frames local displacements of WM ~ RBA + collage attack 22
23 6. Results Stirmark 3.1 score Signal enhancement 1,00 Compression (JPEG/GIF) 0,99 Scaling 1,00 Cropping 0,99 Shearing 1,00 Rotation (auto-crop, auto-scale) 0,99 Column & line removal 1,00 Flip 1,00 Random geometric distortions 1,00 Total score 0,996 23
24 7.. Conclusions The method is robust against non-linear geometric distortions: RBA, projective transforms, warping,... collage, partial erasure, In general, the method does not require a strictly periodical WM The The method can operate simultaneously on both hierarchical levels of global and local geometrical transforms The best known Stirmark 3.1 score = 99.6%! 24
25 References [SPIE2001] S. Voloshynovskiy, F. Deguillaume, S. Pereira and T. Pun, Optimal adaptive diversity watermarking with state channel estimation, Proceedings of SPIE: Security and Watermarking of Multimedia Content III, vol. 4314, San Jose, CA, USA, January 2001 [EUSIPCO2000] S.Voloshynovskiy, F. Deguillaume and T. Pun, Content adaptive watermarking based on a stochastic multiresolution image modeling, EUSIPCO2000, X European Signal Processing Conference, Tampere, Finland, September 2000 [SPIE2002] F. Deguillaume, S. Voloshynovskiy and T. Pun Method for the estimation and recovering from general affine transforms in digital watermarking applications, Proceedings of SPIE: Security and Watermarking of Multimedia Contents IV, paper , San Jose, CA, USA, January 2002 (accepted) 25
A DWT-DFT Composite Watermarking Scheme Robust to Both Affine Transform and JPEG Compression
776 IEEE TRANSACTIONS ON CIRCUITS AND SYSTEMS FOR VIDEO TECHNOLOGY, VOL 13, NO 8, AUGUST 2003 A DWT-DFT Composite Watermarking Scheme Robust to Both Affine Transform and JPEG Compression Xiangui Kang,
More informationImage and Video Watermarking
Telecommunications Seminar WS 1998 Data Hiding, Digital Watermarking and Secure Communications Image and Video Watermarking Herbert Buchner University of Erlangen-Nuremberg 16.12.1998 Outline 1. Introduction:
More informationData Hiding in Video
Data Hiding in Video J. J. Chae and B. S. Manjunath Department of Electrical and Computer Engineering University of California, Santa Barbara, CA 9316-956 Email: chaejj, manj@iplab.ece.ucsb.edu Abstract
More informationA Robust A DCT-Based Digital Watermarking Scheme Using Important Feature Points
A Robust A DCT-Based Digital Watermarking Scheme Using Important Feature Points Xiaojun Qi and Ji Qi Department of Computer Science, Utah State University Logan, UT, 84322-4205, USA. Xiaojun.Qi@usu.edu
More informationA Robust Image Watermarking Scheme using Image Moment Normalization
A Robust Image ing Scheme using Image Moment Normalization Latha Parameswaran, and K. Anbumani Abstract Multimedia security is an incredibly significant area of concern. A number of papers on robust digital
More informationBENCHMARKING OF STILL IMAGE WATERMARKING METHODS: PRINCIPLES AND STATE OF THE ART
BENCHMARKING OF STILL IMAGE WATERMARKING METHODS: PRINCIPLES AND STATE OF THE ART N. Nikolaidis, V. Solachidis, A. Tefas, V. Arguriou, I. Pitas Department of Informatics Aristotle University of Thessaloniki
More informationSPREAD SPECTRUM AUDIO WATERMARKING SCHEME BASED ON PSYCHOACOUSTIC MODEL
SPREAD SPECTRUM WATERMARKING SCHEME BASED ON PSYCHOACOUSTIC MODEL 1 Yüksel Tokur 2 Ergun Erçelebi e-mail: tokur@gantep.edu.tr e-mail: ercelebi@gantep.edu.tr 1 Gaziantep University, MYO, 27310, Gaziantep,
More informationRobust Image Watermarking based on DCT-DWT- SVD Method
Robust Image Watermarking based on DCT-DWT- SVD Sneha Jose Rajesh Cherian Roy, PhD. Sreenesh Shashidharan ABSTRACT Hybrid Image watermarking scheme proposed based on Discrete Cosine Transform (DCT)-Discrete
More informationENTROPY-BASED IMAGE WATERMARKING USING DWT AND HVS
SETIT 2005 3 rd International Conference: Sciences of Electronic, Technologies of Information and Telecommunications March 27-31, 2005 TUNISIA ENTROPY-BASED IMAGE WATERMARKING USING DWT AND HVS Shiva Zaboli
More informationCERIAS Tech Report
CERIAS Tech Report 04-86 Spatial Synchronization Using Watermark Key Structure by Eugene T. Lin and Edward J. Delp Center for Education and Research in Information Assurance and Security, Purdue University,
More informationRST Invariant Digital Image Watermarking Based on Log-Polar Mapping and Phase Correlation
IEEE TRANSACTIONS ON CIRCUITS AND SYSTEMS FOR VIDEO TECHNOLOGY, VOL. XX, NO. Y, SEPTEMBER 2003 1 RST Invariant Digital Image Watermarking Based on Log-Polar Mapping and Phase Correlation Dong Zheng, Student
More informationBlock Mean Value Based Image Perceptual Hashing for Content Identification
Block Mean Value Based Image Perceptual Hashing for Content Identification Abstract. Image perceptual hashing has been proposed to identify or authenticate image contents in a robust way against distortions
More informationImage Watermarking Using Visual Perception Model and Statistical Features
Ms. S.Meenakshi et al. /International Journal of Engineering and Technology Vol.(3),, 94-99 Image Watermarking Using Visual Perception Model and Statistical Features Ms. S.Meenakshi and Mrs.C.Akila University
More informationAnalysis of feature-based geometry invariant watermarking
Header for SPIE use Analysis of feature-based geometry invariant watermarking Mehmet U. Celik *a, Eli Saber b, Gaurav Sharma b, A.Murat Tekalp a a University of Rochester, Rochester, NY, 14627-0126 b Xerox
More informationImproved Geometric Warping-Based Watermarking
Improved Geometric Warping-Based Watermarking Dima Pröfrock, Mathias Schlauweg, Erika Müller Institute of Communication Engineering, Faculty of Computer Science and Electrical Engineering, University of
More informationA Wavelet Watermarking Algorithm Based on a Tree Structure
A Wavelet Watermarking Algorithm Based on a Tree Structure Oriol Guitart Pla a,eugenet.lin b,andedwardj.delp b a Universitat Politecnica de Catalunya (UPC) Barcelona Spain b Video and Image Processing
More informationReversible Non-Blind Video Watermarking Based on Interlacing using 3-level DWT & Alpha Blending Technique
IOSR Journal of Electronics and Communication Engineering (IOSR-JECE) e-issn: 2278-2834,p- ISSN: 2278-8735.Volume 10, Issue 5, Ver. I (Sep - Oct.2015), PP 06-13 www.iosrjournals.org Reversible Non-Blind
More informationMultiple domain watermarking for print-scan and JPEG resilient data hiding
Multiple domain watermarking for print-scan and JPEG resilient data hiding Anu Pramila, Anja Keskinarkaus, and Tapio Seppänen MediaTeam Oulu, Department of Electrical and Information Engineering, University
More informationIntroduction to Visible Watermarking. IPR Course: TA Lecture 2002/12/18 NTU CSIE R105
Introduction to Visible Watermarking IPR Course: TA Lecture 2002/12/18 NTU CSIE R105 Outline Introduction State-of of-the-art Characteristics of Visible Watermarking Schemes Attacking Visible Watermarking
More informationMotion Tracking and Event Understanding in Video Sequences
Motion Tracking and Event Understanding in Video Sequences Isaac Cohen Elaine Kang, Jinman Kang Institute for Robotics and Intelligent Systems University of Southern California Los Angeles, CA Objectives!
More informationMultimedia Security: Open Problems and Solutions
Book Title Book Editors IOS Press, 2003 1 Multimedia Security: Open Problems and Solutions S. Voloshynovskiy a,1, O. Koval a F. Deguillaume a and T. Pun a a CUI-University of Geneva, 24, rue General Duour,
More informationRotation, scale, and translation invariant image watermark using higher order spectra Hyung -Shin Kim Yunju Baek Heung-Kyu Lee
Rotation, scale, and translation invariant image watermark using higher order spectra Hyung -Shin Kim Yunju Baek Heung-Kyu Lee Division of Computer Science Department of Electrical Engineering and Computer
More informationComparison of Digital Image Watermarking Algorithms. Xu Zhou Colorado School of Mines December 1, 2014
Comparison of Digital Image Watermarking Algorithms Xu Zhou Colorado School of Mines December 1, 2014 Outlier Introduction Background on digital image watermarking Comparison of several algorithms Experimental
More informationComputer Vision 2. SS 18 Dr. Benjamin Guthier Professur für Bildverarbeitung. Computer Vision 2 Dr. Benjamin Guthier
Computer Vision 2 SS 18 Dr. Benjamin Guthier Professur für Bildverarbeitung Computer Vision 2 Dr. Benjamin Guthier 1. IMAGE PROCESSING Computer Vision 2 Dr. Benjamin Guthier Content of this Chapter Non-linear
More informationCOMPARISONS OF DCT-BASED AND DWT-BASED WATERMARKING TECHNIQUES
COMPARISONS OF DCT-BASED AND DWT-BASED WATERMARKING TECHNIQUES H. I. Saleh 1, M. E. Elhadedy 2, M. A. Ashour 1, M. A. Aboelsaud 3 1 Radiation Engineering Dept., NCRRT, AEA, Egypt. 2 Reactor Dept., NRC,
More informationwithin the data itself. In this case the control bits and owner signatures cannot be removed easily or at all without destroying the data (except by t
Robust 3D DFT Video Watermarking Frederic Deguillaume Gabriela Csurka Joseph O'Ruanaidh y Thierry Pun CUI, University of Geneva, 24 rue General Dufour, CH 1211 Geneva, Switzerland z ABSTRACT This paper
More informationRobust Digital Image Watermarking based on complex wavelet transform
Robust Digital Image Watermarking based on complex wavelet transform TERZIJA NATAŠA, GEISSELHARDT WALTER Institute of Information Technology University Duisburg-Essen Bismarckstr. 81, 47057 Duisburg GERMANY
More informationImage watermarking based on scale-space representation
Image watermarking based on scale-space representation Jin S. Seo and Chang D. Yoo Department of Electrical Engineering and Computer Science Korea Advanced Institute of Science and Technology Daejeon 305-701,
More informationEvaluation of copyright marking systems
1 Proceedings of IEEE Multimedia Systems 99, vol. 1, pp. 574 579, 7 11 June 1999, Florence, Italy. Evaluation of copyright marking systems Fabien A. P. Petitcolas and Ross J. Anderson Abstract Hidden copyright
More informationFiltering. -If we denote the original image as f(x,y), then the noisy image can be denoted as f(x,y)+n(x,y) where n(x,y) is a cosine function.
Filtering -The image shown below has been generated by adding some noise in the form of a cosine function. -If we denote the original image as f(x,y), then the noisy image can be denoted as f(x,y)+n(x,y)
More informationMultiple-View Object Recognition in Band-Limited Distributed Camera Networks
in Band-Limited Distributed Camera Networks Allen Y. Yang, Subhransu Maji, Mario Christoudas, Kirak Hong, Posu Yan Trevor Darrell, Jitendra Malik, and Shankar Sastry Fusion, 2009 Classical Object Recognition
More informationWatermark Resynchronization based on Elastic Graph Matching
SETIT 25 3 rd International Conference: Sciences of Electronic, Technologies of Information and Telecommunications March 27-31, 25 Tunisia Watermark Resynchronization based on Elastic Graph Matching Gwenaël
More informationAdaptive Fuzzy Watermarking for 3D Models
International Conference on Computational Intelligence and Multimedia Applications 2007 Adaptive Fuzzy Watermarking for 3D Models Mukesh Motwani.*, Nikhil Beke +, Abhijit Bhoite +, Pushkar Apte +, Frederick
More informationFRAGILE WATERMARKING USING SUBBAND CODING
ICCVG 2002 Zakopane, 25-29 Sept. 2002 Roger ŚWIERCZYŃSKI Institute of Electronics and Telecommunication Poznań University of Technology roger@et.put.poznan.pl FRAGILE WATERMARKING USING SUBBAND CODING
More informationVideo Watermarking Scheme resistant to MPEG Compression
Video Watermarking Scheme resistant to MPEG Compression Pedro A. Hernandez-Avalos, Claudia Feregrino-Uribe, Rene Cumplido, Jose Juan Garcia-Hernandez National Institute for Astrophysics, Optics and Electronics
More informationA Print-Scan Resilient Watermarking based on Fourier Transform and Image Restoration
A Print-Scan Resilient Watermarking based on Fourier Transform and Image Restoration R. Riad H. Douzi M. El Hajji R. Harba PRISME, University of Orleans, Orléans, France F. Ros PRISME, University of Orleans,
More informationCombined Hashing/Watermarking Method for Image Authentication
Combined Hashing/Watermarking Method for Image Authentication Vlado Kitanovski, Dimitar Taskovski, and Sofija Bogdanova Abstract In this paper we present a combined hashing/watermarking method for image
More informationSpatial Domain Digital Watermarking of Multimedia Objects for Buyer Authentication. By:
Spatial Domain Digital Watermarking of Multimedia Objects for Buyer Authentication By: Ravi Andem Todd Yarrington (randem@mix.wvu.edu) (tyarring@mix.wvu.edu) Motivation Encryption of valuable images Keep
More informationA WATERMARKING METHOD RESISTANT TO GEOMETRIC ATTACKS
A WATERMARKING METHOD RESISTANT TO GEOMETRIC ATTACKS D. Simitopoulos, D. Koutsonanos and M.G. Strintzis Informatics and Telematics Institute Thermi-Thessaloniki, Greece. Abstract In this paper, a novel
More informationCOMPARISON BETWEEN TWO WATERMARKING ALGORITHMS USING DCT COEFFICIENT, AND LSB REPLACEMENT
COMPARISO BETWEE TWO WATERMARKIG ALGORITHMS USIG DCT COEFFICIET, AD LSB REPLACEMET Mona M. El-Ghoneimy Associate Professor, Elect. & Comm. Dept., Faculty of Engineering, Cairo University, Post code 12316
More informationBlock-based Watermarking Using Random Position Key
IJCSNS International Journal of Computer Science and Network Security, VOL.9 No.2, February 2009 83 Block-based Watermarking Using Random Position Key Won-Jei Kim, Jong-Keuk Lee, Ji-Hong Kim, and Ki-Ryong
More informationRobust image watermarking using local invariant features
45 3, 037002 March 2006 Robust image watermarking using local invariant features Hae-Yeoun Lee Korea Advanced Institute of Science and Technology Department of Electrical Engineering and Computer Science
More informationA SEMI-FRAGILE WATERMARKING SCHEME FOR IMAGE TAMPER LOCALIZATION AND RECOVERY
Journal of Theoretical Applied nformation Technology 31 August 2012 Vol 42 No2 2005-2012 JATT & LLS All rights reserved SSN: 1992-8645 wwwjatitorg E-SSN: 1817-3195 A SEM-FRAGLE WATERMARNG SCHEME FOR MAGE
More informationA Robust Visual Identifier Using the Trace Transform
A Robust Visual Identifier Using the Trace Transform P. Brasnett*, M.Z. Bober* *Mitsubishi Electric ITE VIL, Guildford, UK. paul.brasnett@vil.ite.mee.com, miroslaw.bober@vil.ite.mee.com Keywords: image
More informationThread-based Benchmarking Deployment
Thread-based Benchmarking Deployment Sébastien Lugan and Benoît Macq Laboratory of Telecommunications and Remote Sensing, Université catholique de Louvain, Place du Levant, 2, B-1348 Louvain-la-Neuve,
More informationA NEW DCT-BASED WATERMARKING METHOD FOR COPYRIGHT PROTECTION OF DIGITAL AUDIO
International journal of computer science & information Technology (IJCSIT) Vol., No.5, October A NEW DCT-BASED WATERMARKING METHOD FOR COPYRIGHT PROTECTION OF DIGITAL AUDIO Pranab Kumar Dhar *, Mohammad
More informationCompression-Compatible Fragile and Semi-Fragile Tamper Detection
Compression-Compatible Fragile and Semi-Fragile Tamper Detection Lisa M. Marvel George W. Hartwig, Jr. Charles Boncelet, Jr. Presentation by Peter Macko Motivation Direct Applications Establishing credibility
More informationRobust Video Watermarking for MPEG Compression and DA-AD Conversion
Robust Video ing for MPEG Compression and DA-AD Conversion Jong-Uk Hou, Jin-Seok Park, Do-Guk Kim, Seung-Hun Nam, Heung-Kyu Lee Division of Web Science and Technology, KAIST Department of Computer Science,
More informationA Study and Analysis on a Perceptual Image Hash Algorithm Based on Invariant Moments
Sensors & Transducers 013 by IFSA http://www.sensorsportal.com A Study and Analysis on a Perceptual Image Hash Algorithm Based on Invariant Moments Hu Bin School of Civil Engineering and Transportation,
More informationQR Code Watermarking Algorithm based on Wavelet Transform
2013 13th International Symposium on Communications and Information Technologies (ISCIT) QR Code Watermarking Algorithm based on Wavelet Transform Jantana Panyavaraporn 1, Paramate Horkaew 2, Wannaree
More informationDense Image-based Motion Estimation Algorithms & Optical Flow
Dense mage-based Motion Estimation Algorithms & Optical Flow Video A video is a sequence of frames captured at different times The video data is a function of v time (t) v space (x,y) ntroduction to motion
More informationA NEW ROBUST IMAGE WATERMARKING SCHEME BASED ON DWT WITH SVD
A NEW ROBUST IMAGE WATERMARKING SCHEME BASED ON WITH S.Shanmugaprabha PG Scholar, Dept of Computer Science & Engineering VMKV Engineering College, Salem India N.Malmurugan Director Sri Ranganathar Institute
More informationTamper-proofing proofing of Electronic and Printed Text Documents via Robust Hashing and Data-Hiding
Tamper-proofing proofing of Electronic and Printed Text Documents via Robust Hashing and Data-Hiding R Villán, S Voloshynovskiy, O Koval, F Deguillaume, and T Pun Stochastic Image Processing Group Computer
More informationImplementation and Comparison of Watermarking Algorithms using DWT
Implementation and Comparison of Watermarking Algorithms using DWT Bushra Jamal M.Tech. Student Galgotia s College of Engineering & Technology Greater Noida, U.P., India Athar Hussain Asst. Professor School
More informationImprovements on Image Authentication and Recovery Using Distributed Source Coding
Improvements on Image Authentication and Recovery Using Distributed Source Coding Nitin Khanna a, Antoni Roca b, George T. C. Chiu c, Jan P. Allebach a, Edward J. Delp a a School of Electrical and Computer
More informationReconstruction of Images Distorted by Water Waves
Reconstruction of Images Distorted by Water Waves Arturo Donate and Eraldo Ribeiro Computer Vision Group Outline of the talk Introduction Analysis Background Method Experiments Conclusions Future Work
More informationA Robust Wavelet-Based Watermarking Algorithm Using Edge Detection
A Robust Wavelet-Based Watermarking Algorithm Using Edge Detection John N. Ellinas Abstract In this paper, a robust watermarking algorithm using the wavelet transform and edge detection is presented. The
More informationDigital Watermarking with Copyright Authentication for Image Communication
Digital Watermarking with Copyright Authentication for Image Communication Keta Raval Dept. of Electronics and Communication Patel Institute of Engineering and Science RGPV, Bhopal, M.P., India ketaraval@yahoo.com
More informationMULTIRESOLUTION QUALITY EVALUATION OF GEOMETRICALLY DISTORTED IMAGES. Angela D Angelo, Mauro Barni
MULTIRESOLUTION QUALITY EVALUATION OF GEOMETRICALLY DISTORTED IMAGES Angela D Angelo, Mauro Barni Department of Information Engineering University of Siena ABSTRACT In multimedia applications there has
More informationBilevel Sparse Coding
Adobe Research 345 Park Ave, San Jose, CA Mar 15, 2013 Outline 1 2 The learning model The learning algorithm 3 4 Sparse Modeling Many types of sensory data, e.g., images and audio, are in high-dimensional
More informationRobust Video Coding. Heechan Park. Signal and Image Processing Group Computer Science Department University of Warwick. for CS403
Robust Video Coding for CS403 Heechan Park Signal and Image Processing Group Computer Science Department University of Warwick Standard Video Coding Scalable Video Coding Distributed Video Coding Video
More informationDEEP LEARNING OF COMPRESSED SENSING OPERATORS WITH STRUCTURAL SIMILARITY (SSIM) LOSS
DEEP LEARNING OF COMPRESSED SENSING OPERATORS WITH STRUCTURAL SIMILARITY (SSIM) LOSS ABSTRACT Compressed sensing (CS) is a signal processing framework for efficiently reconstructing a signal from a small
More informationA Video Watermarking Algorithm Based on the Human Visual System Properties
A Video Watermarking Algorithm Based on the Human Visual System Properties Ji-Young Moon 1 and Yo-Sung Ho 2 1 Samsung Electronics Co., LTD 416, Maetan3-dong, Paldal-gu, Suwon-si, Gyenggi-do, Korea jiyoung.moon@samsung.com
More informationSparse Watermark Embedding and Recovery using Compressed Sensing Framework for Audio Signals
Sparse Watermark Embedding and Recovery using Compressed Sensing Framework for Audio Signals Mohamed Waleed Fakhr Electrical and Electronics Department, University of Bahrain Isa Town, Manama, Bahrain
More informationA Comparison of Still-Image Compression Standards Using Different Image Quality Metrics and Proposed Methods for Improving Lossy Image Quality
A Comparison of Still-Image Compression Standards Using Different Image Quality Metrics and Proposed Methods for Improving Lossy Image Quality Multidimensional DSP Literature Survey Eric Heinen 3/21/08
More informationEMBEDDING WATERMARK IN VIDEO RECORDS
EMBEDDING WATERMARK IN VIDEO RECORDS D.Abirami UG (CSE), Sri Krishna College of Technology, Anna University abidhanabal17@gmail.com R.Gowsika UG (CSE), Sri Krishna College of Technology, Anna University
More informationQuality scalability aware watermarking for visual content
Quality scalability aware watermarking for visual content BHOWMIK, Deepayan and ABHAYARATNE, Charith Available from Sheffield Hallam University Research Archive (SHURA) at:
More informationAN IMPROVISED LOSSLESS DATA-HIDING MECHANISM FOR IMAGE AUTHENTICATION BASED HISTOGRAM MODIFICATION
AN IMPROVISED LOSSLESS DATA-HIDING MECHANISM FOR IMAGE AUTHENTICATION BASED HISTOGRAM MODIFICATION Shaik Shaheena 1, B. L. Sirisha 2 VR Siddhartha Engineering College, Vijayawada, Krishna, Andhra Pradesh(520007),
More informationReview for the Final
Review for the Final CS 635 Review (Topics Covered) Image Compression Lossless Coding Compression Huffman Interpixel RLE Lossy Quantization Discrete Cosine Transform JPEG CS 635 Review (Topics Covered)
More informationToward an interactive poster using digital watermarking and a mobile phone camera
SIViP (2012) 6:211 222 DOI 10.7/s117-011-0211-2 ORIGINAL PAPER Toward an interactive poster using digital watermarking and a mobile phone camera Anu Pramila Anja Keskinarkaus Tapio Seppänen Received: 14
More informationQUANTIZATION WATERMARKING IN THE JPEG2000 CODING PIPELINE
69 QUANTIZATION WATERMARKING IN THE JPEG2000 CODING PIPELINE Peter Meerwald Department of Scientific Computing, University of Salzburg, Jakob-Haringer-Str. 2, A-5020 Salzburg, Austria pmeerw
More informationDIGITAL IMAGE WATERMARKING BASED ON A RELATION BETWEEN SPATIAL AND FREQUENCY DOMAINS
DIGITAL IMAGE WATERMARKING BASED ON A RELATION BETWEEN SPATIAL AND FREQUENCY DOMAINS Murat Furat Mustafa Oral e-mail: mfurat@cu.edu.tr e-mail: moral@mku.edu.tr Cukurova University, Faculty of Engineering,
More informationON THE EFFECTIVENESS OF LOCAL WARPING AGAINST SIFT-BASED COPY-MOVE DETECTION
ON THE EFFECTIVENESS OF LOCAL WARPING AGAINST SIFT-BASED COPY-MOVE DETECTION R. Caldelli, I. Amerini, L. Ballan, G. Serra Media Integration and Communication Center University of Florence Viale Morgagni,
More informationGeometrically Invariant Watermarking Using Feature Points
Geometrically Invariant Watermarking Using Feature Points Patrick Bas, Jean-Marc Chassery, Benoit Macq To cite this version: Patrick Bas, Jean-Marc Chassery, Benoit Macq. Geometrically Invariant Watermarking
More informationENHANCED WAVELET PACKET BASED UN COMPRESSED VIDEO WATERMARKING ALGORITHM WITH FRAME SELECTION AND HVS CRITERIA
ENHANCED WAVELET PACKET BASED UN COMPRESSED VIDEO WATERMARKING ALGORITHM WITH FRAME SELECTION AND HVS CRITERIA T. Jayamalar and V. Radha Department of Computer Science, Avinashilingam University for women,
More informationHiding Fingerprint Minutiae in Images
Hiding Fingerprint Minutiae in Images Anil K. Jain and Umut Uludag Computer Science and Engineering Department, Michigan State University 3115 Engineering Building, East Lansing, MI, 48824, USA {jain,
More informationMotion Estimation (II) Ce Liu Microsoft Research New England
Motion Estimation (II) Ce Liu celiu@microsoft.com Microsoft Research New England Last time Motion perception Motion representation Parametric motion: Lucas-Kanade T I x du dv = I x I T x I y I x T I y
More information2140 IEEE TRANSACTIONS ON IMAGE PROCESSING, VOL. 14, NO. 12, DECEMBER Digital Watermarking Robust to Geometric Distortions
2140 IEEE TRANSACTIONS ON IMAGE PROCESSING, VOL. 14, NO. 12, DECEMBER 2005 Digital Watermarking Robust to Geometric Distortions Ping Dong, Jovan G. Brankov, Member, IEEE, Nikolas P. Galatsanos, Senior
More informationGenetic algorithm for optimal imperceptibility in image communication through noisy channel
Genetic algorithm for optimal imperceptibility in image communication through noisy channel SantiP.Maity 1, Malay K. Kundu 2 andprasantak.nandi 3 1 Bengal Engineering College (DU), P.O.-Botanic Garden,
More informationRST ROBUST WATERMARKING SCHEMA BASED ON IMAGE NORMALIZATION AND DCT DECOMPOSITION
RST ROBUST WATERMARKING SCHEMA BASED ON IMAGE NORMALIZATION AND DCT DECOMPOSITION Faraoun Kamel Mohamed, Rabhi Abbes 2 Evolutionary Engineering and Distributed Information Systems Laboratory, EEDIS UDL
More informationLow Cost Spatial Watermarking
Low Cost Spatial Watermarking 1. Abstract V. Darmstaedter, J.-F. Delaigle, J.J. Quisquater, B. Macq Laboratoire de Télécommunication et Télédétection Université catholique de Louvain Bâtiment Stévin -
More informationA NOVEL APPROACH FOR IMAGE WATERMARKING USING DCT AND JND TECHNIQUES
A NOVEL APPROACH FOR IMAGE WATERMARKING USING DCT AND JND TECHNIQUES Mrs. R.J. Shelke, Dept of Electronics Engineering, Walchand Institute of Technology, Solapur 43002, India ABSTRACT Dr. Mrs. S.S. Apte,
More informationRadon Transform-Based Secure Image Hashing
Radon Transform-Based Secure Image Hashing Dung Q. Nguyen, Li Weng, and Bart Preneel Katholieke Universiteit Leuven, ESAT/COSIC-IBBT dungtobe@gmail.com, {li.weng,bart.preneel}@esat.kuleuven.be Abstract.
More informationSCALED WAVELET TRANSFORM VIDEO WATERMARKING METHOD USING HYBRID TECHNIQUE: SWT-SVD-DCT
SCALED WAVELET TRANSFORM VIDEO WATERMARKING METHOD USING HYBRID TECHNIQUE: SWT- Shaveta 1, Daljit Kaur 2 1 PG Scholar, 2 Assistant Professor, Dept of IT, Chandigarh Engineering College, Landran, Mohali,
More informationAn Attack-resistant Watermark Resynchronization Scheme using LDFT and BSP
IOSR Journal of Computer Engineering (IOSR-JCE) e-issn: 2278-0661,p-ISSN: 2278-8727, Volume 16, Issue 5, Ver. III (Sep Oct. 2014), PP 20-27 An Attack-resistant Watermark Resynchronization Scheme using
More informationOverview: motion-compensated coding
Overview: motion-compensated coding Motion-compensated prediction Motion-compensated hybrid coding Motion estimation by block-matching Motion estimation with sub-pixel accuracy Power spectral density of
More informationVIDEO-DNA: LARGE-SCALE SERVER-SIDE WATERMARKING
VIDEO-DNA: LARGE-SCALE SERVER-SIDE WATERMARKING Ivan Kopilovic, Virginie Drugeon, and Marcel Wagner Nokia Siemens Networks GmbH & Co. KG Otto-Hahn-Ring 6, 8739 Munich, Germany phone: + (49) 89 636 446,
More informationCERIAS Tech Report
CERIAS Tech Report 2001-68 The Effect of Matching Watermark and Compression Transforms in Compressed Color Images by Raymond B. Wolfgang and Christine I. Podilchuk and Edward J. Delp Center for Education
More informationCHAPTER-5 WATERMARKING OF COLOR IMAGES
CHAPTER-5 WATERMARKING OF COLOR IMAGES 5.1 INTRODUCTION After satisfactorily developing the watermarking schemes for gray level images, we focused on developing the watermarking schemes for the color images.
More informationAN AUDIO WATERMARKING SCHEME ROBUST TO MPEG AUDIO COMPRESSION
AN AUDIO WATERMARKING SCHEME ROBUST TO MPEG AUDIO COMPRESSION Won-Gyum Kim, *Jong Chan Lee and Won Don Lee Dept. of Computer Science, ChungNam Nat l Univ., Daeduk Science Town, Taejon, Korea *Dept. of
More informationA Practical Print-and-Scan Resilient Watermarking for High Resolution Images
A Practical Print-and-Scan Resilient Watermaring for High Resolution Images Yongping Zhang, Xiangui Kang 2, and Philipp Zhang 3 Research Department, Hisilicon Technologies Co., Ltd, 00094 Beijing, China.
More informationThis document is downloaded from DR-NTU, Nanyang Technological University Library, Singapore.
This document is downloaded from DR-NTU, Nanyang Technological University Library, Singapore. Title A robust phase watermarking algorithm using conugate symmetric sequency-ordered complex Hadamard transform
More informationDIGITAL WATERMARKING FOR GRAY-LEVEL WATERMARKS
DICTA22: Digital Image Computing Techniques and Applications, 2 22 January 22, Melbourne, Australia. DIGITAL WATERMARKING FOR GRAY-LEVEL WATERMARKS *Yuk Ying CHUNG, Man To WONG *Basser Department of Computer
More informationComputer Graphics and Image Processing
Computer Graphics and Image Processing Lecture B2 Point Processing Joseph Niepce, 1826. The view from my window 1 Context How much input is used to compute an output value? Point Transforms Region Transforms
More informationROBUST WATERMARKING OF REMOTE SENSING IMAGES WITHOUT THE LOSS OF SPATIAL INFORMATION
ROBUST WATERMARKING OF REMOTE SENSING IMAGES WITHOUT THE LOSS OF SPATIAL INFORMATION T.HEMALATHA, V.JOEVIVEK, K.SUKUMAR, K.P.SOMAN CEN, Amrita Vishwa Vidyapeetham, Coimbatore, Tamilnadu, India. hemahems@gmail.com
More informationAn Efficient Watermarking Algorithm Based on DWT and FFT Approach
An Efficient Watermarking Algorithm Based on DWT and FFT Approach S.Manikanda prabu Assistant Professor, Department of CSE, Tamilnadu College of Engineering, Coimbatore, India smaniprabume@gmail.com Dr.S.Ayyasamy
More informationCHAPTER-4 WATERMARKING OF GRAY IMAGES
CHAPTER-4 WATERMARKING OF GRAY IMAGES 4.1 INTRODUCTION Like most DCT based watermarking schemes, Middle-Band Coefficient Exchange scheme has proven its robustness against those attacks, which anyhow, do
More informationPRINTED DOCUMENT AUTHENTICATION USING TWO LEVEL QR CODE
PRINTED DOCUMENT AUTHENTICATION USING TWO LEVEL QR CODE Iu. Tkachenko 1,2, W. Puech 1, O. Strauss 1 1 Laboratory LIRMM, UMR CNRS 5506 University of Montpellier 860 rue de St Priest, 34090 Montpellier Cedex
More informationImproved Content Based Image Watermarking
Improved Content Based Image Watermarking Arvind Kumar Parthasarathy Abstract Due to improvements in imaging technologies and the ease with which digital content can be created and manipulated, there is
More informationCHAPTER 3 DIFFERENT DOMAINS OF WATERMARKING. domain. In spatial domain the watermark bits directly added to the pixels of the cover
38 CHAPTER 3 DIFFERENT DOMAINS OF WATERMARKING Digital image watermarking can be done in both spatial domain and transform domain. In spatial domain the watermark bits directly added to the pixels of the
More information