A Practical Print-and-Scan Resilient Watermarking for High Resolution Images
|
|
- Preston Nash
- 5 years ago
- Views:
Transcription
1 A Practical Print-and-Scan Resilient Watermaring for High Resolution Images Yongping Zhang, Xiangui Kang 2, and Philipp Zhang 3 Research Department, Hisilicon Technologies Co., Ltd, Beijing, China. zhangyongping79@huaei.com. 2 School of Infor. Sci. and Tech., Sun Yat-Sen University, Guangzhou, China. issxg@mail.sysu.edu.cn 3 Research Department, Hisilicon Technologies Co., Ltd, Plano, Texas, USA. pzhang@huaei.com Abstract. Detecting the atermar from the rescanned image is still a challenging problem, especially for high resolution image. After printing and scanning, an image usually suffers global geometric distorts ( such as rotation, scaling, translation and cropping), local random nonlinear geometric distortions hich is simulated in Random Bending function of Stirmar, as ell as nonlinear pixel value distortions. The combination of both of the latter distortions is called nonlinear distortions. Many atermaring techniques, including the pilot-based atermaring techniques, are robust against the global geometric distortions but sensitive to the nonlinear distortions. Local random nonlinear geometric distortions remain a tough problem for image atermaring. In the setting of print-and-scan process, it becomes severer as combining ith nonlinear pixel value distortions. This may defeat a atermaring scheme, especially for the print-scanning of high resolution image. This paper proposes an effective pilot-based atermaring algorithm for the print-and-scan process. After careful analysis of the print-and-scan process, the pilot signal and the atermar are embedded and detected in the donsampled lo resolution image to deal ith the combination of local random nonlinear geometric distortions and nonlinear pixel value distortions. Theoretical analysis and experimental results demonstrate the proposed algorithm is robust to the print-and-scan process and at lo computational complexity. The major contribution of this paper is that e analyze the impact of nonlinear distortions in print-and-scan process and propose an effective atermaring scheme to conquer it. To our best noledge, our or also first addresses the issues of print-and-scan resilient atermaring for high resolution images. Keyords: Print-and-scan, atermar, non-linear distortions, robustness Introduction The print-and-scan process is commonly used for image reproduction and distribution. Print-and-scan resilient data hiding provides a viable authentication mechanism via
2 the multi-bit atermar hidden in a picture in the document. Document authentication of ID card, passport, driving license, image publication etc. is important today as the security concerns are higher than ever before. For example, the authentication of South China Tiger Image dre extensively concerns in China, even in the hole orld. But print-and-scan resilient data hiding has not been extensively researched. Many of them focus on detecting atermars []. The rescanned image is usually changed both in geometric and pixel value, and in both linear, non-linear ay. The atermar can be detected from the rescanned image only if the atermar can resist the combination of these distortions. Many atermaring techniques robust to geometric distortions are presented. One category is to embed the atermar in the global geometric transform invariant domain [][2]. The computational complexity of this technique is high, especially for high resolution images. Besides, the non-uniform log-polar mapping adopted in this technique might cause severe image fidelity problem. Another category [3][4][5] is to embed a pilot multiple times in the image at different spatial locations. The autocorrelation function of the atermared image ill then yield a pattern of peas corresponding to the embedded locations. Changes in this pattern of peas can be used to estimate the global geometric distortions that the atermared image has undergone. These methods have significant potential, but, similar to the above methods, do not consider the effect of the nonlinear distortions including nonlinear geometric distortions and nonlinear pixel value distortions. The atermar can be detected based on the pilot signals. But after printing-and-scanning, the nonlinear distortions destroy the periodicity of the pilot signal and the autocorrelation of the rescanned image ill not yield a pattern of peas. After careful analysis of the print-and-scan process, our proposal employs a donsampling operation in the atermar embedding and extraction process that simulate the atermaring embedding and extraction in the lo-resolution, thus reduce the effect of nonlinear distortions and mae sure that the pilot signal can be detected correctly. We can get the parameters of the global geometric distortions ith the help of pilot signal and invert the rescanned image before applying the atermar extractor. In this paper, e begin ith the analysis of the print-and-scan process in Section 2. Then e propose a novel atermaring algorithm in Section 3. Experimental results are presented in Section 4. In Section 5, e mae a summary. 2 Nonlinear Distortion Problems to Watermaring and Solutions In this section, e first mae a careful analysis on the print-and-scan process. Here e present ho the print-and-scan process affects the atermar. Then e propose the folloing solutions.
3 2. Analysis on the Print-and-Scan Process The process of print and scan is a complex composite of various attacs, hich cause various distortions including geometric distortion and pixel value distortion. The original image is transmitted into control system of the printer. Before Raster Image Processor (RIP) in the control system converts the original image into halftone image and corresponding electronic pulse level, the printer ill mae the Dots Per Inch (DPI) value of image equal to the physical DPI value of the printer. The electronic pulse level is converted into optical level and forms latent image on Organic Photo Conductor (OPC) drum of electrophotographic system. After development process, transferring process and fusing process, latent image is transformed into hardcopy output. In the scanning process, a pure light emitted to the hardcopy global. Charge Coupled Device (CCD) sensors receive the luminance of the light and convert it into the electronic signal. At last, the generated digital image generated is transmitted to PC via Graphic User Interface (GUI). [7] According to the process of the print-and-scan process, e can find that both the printing process and scanning process introduce geometric distortions. The distortions during these to processes are different. Converting the electronic pulse into optical level and hardcopy process introduces the nonlinear geometric distortions. Consider an image I, and a nonlinear distorted version of this image, I. Then e can rite that D( = I '( I( () here D( represents the difference of pixel value beteen I and I. Let x and y represent the magnitude of nonlinear geometric distortion in the horizontal direction and in the vertical direction respectively. The position of pixel I( is translated to the position ( x + y + in the rescanned image. The nonlinear adjustment in the printer and scanner also introduce the distortion on the value of pixel. The nonlinear adjustment, hich is called gamma teaing, is performed in the printer to mae sure the printed images appear the same as on a monitor: γ p B = I( (2) here B represents the actual light brightness. When the image is scanned, it must be compensated to mae sure it loos fine to us hen vieed on a monitor: γ s I' ( = B (3) So, I γ p γ s ' ( = I ( (4) Besides these distortions, there is some random noise in the print-and-scan process. And let N represent the random noise. Then e can get γ s D y = I'( I( = I( x y + N I( γ p (5)
4 When γ > γ, this nonlinear adjustment amplify the effect of nonlinear p s geometric distortion. And D is distributed in the hole image. It may become large enough to affect the atermar extracting. There is one measure to deal ith this problem if the resolution of image is lo. We can scale the atermared lo resolution image up to a higher resolution before printing it out. And in the scanning process, the printed atermared image is donsampled to a lo resolution as the original resolution. This operation can improve the robustness against the nonlinear distortions. Some experiments on Digimarc atermaring tool in Photoshop are performed. In our experiments, 00 images ith 800-by-600(4:3) are utilized. The embedding strength is as large as possible under the limitation of invisibility and the PSNR value is 36.3dB averagely. It shos good performance hen e up-scale the atermared image to 4096-by-3076(4:3, hich is the size of A4) in the printing process. The Bit Error Ratio (BER) of atermar extraction from the rescanned atermared images is about 3.5%. But unfortunately, ith the development of the multimedia technologies, the resolutions of images become higher and higher in the application. Especially in the document printing, the driver of printer ill convert a text to an image. The resolution of this image is very high and based on the size of paper printed on. No the above measure does not or. For example, hen the atermared image hose resolution is 4096-by-3076 is printed on A4, e cannot up-scale the atermared image because of the paper scope. No the nonlinear distortions can destroy the atermar easily. Experiments on the Digimarc atermaring tool are performed on four images ith 4096-by-3076 or 3076-by The atermared images are printed ith the original resolution on A4 paper. No atermar can be extracted from the rescanned atermared images. Another problem is that many existing print-and-scan resilient atermaring algorithms are complex and time consuming. Many complex methods are included to mae the atermaring algorithm to be robust against the print-and-scan process. Computation efficiency is an important consideration in application. There is still another measure proposed in this paper to deal ith the above problems. We can adopt the method of embedding and extracting atermar at lo resolution shon as follos to get better robustness against nonlinear distortions and higher computation efficiency. 2.2 Proposed Solution Based on the above analysis and the experiments ith Digimarc atermaring tool on the print-and-scan process, our solution is to add a don-sampling operation to achieve the lo-resolution hich is necessary in the atermar embedding and extraction process. In atermar embedding, e first don-sample the original image ith and embed the atermar in the don-sampled image. Let I ( y ) represent one pixel in the don-sampled atermared image. We can obtain,
5 I ( I ( x ) + ( y ) + j) j= = 2 (6) ' Assume I ( to be the pixel of the atermared image and ( to be the pixel of the rescanned atermared image, here x = ( x ) + i j [, ] (7) y = ( y ) + j In atermar extraction, the rescanned image is also don-sampled to / of the original size. We can obtain, ' ( ( x ) + ( y ) + j) ' I j= = (8) 2 I The difference beteen Eq.(6) and Eq.(8), hich is the effect on the image at lo resolution from the nonlinear distortion, can be described as, here D = D i, j j= I j ' j ( I ( = = 2 D and ' ' D I ( I ( = I (( x ) + ( y ) + j) I (( x ) + ( y ) ) D 2 i, j + j I (9) =, hich is shon in Eq.(5). The impact of random noise N in Eq.(5) can be removed or lessened ith the summation operation in Eq.(9). Most importantly, the nonlinear 2 geometric distortion in a don-sampled rescanned image ill be reduced to / of the distortion in a rescanned image ithout don-sampling. If is great enough, the effect of nonlinear geometric distortion almost may be ignored. 3 Proposed Scheme The ey idea of our proposed scheme is to embed and detect the atermar in lo resolution. This ill reduce the effect of nonlinear geometric distortion and ensure the survival of atermar from the print-and-scan process. The diagram of our atermaring scheme is illustrated in Fig.. 3. Watermar Generation In our atermaring algorithm, there are to types of atermaring signal. One is pilot pattern p, hich is a hite noise pattern and embedded in certain blocs. Through the extraction of pilot patterns, the rescanned image can be resynchronized. The other is atermar payload { b i }. The atermar payload is often chosen to be orthogonal noise-lie patterns or spread spectrum modulated by a basis of n orthogonal noise-lie patterns {u i } via,
6 Fig.. Bloc diagram of the proposal scheme. (a) is atermar embedding process. (b) is atermar extraction process. here {0, } b or {, } i n = i= b [8]. i b i u i (0) 3.2 Watermar Embedding in Lo Resolution In order to resist the nonlinear geometric distortions introduced in the print-and-scan process, the lo-resolution image based atermar embedding method is proposed. The main steps are as follos. Step Don-sample the original image I to / of the original size to get I. In our experiments, e use =0. Step 2 Divide I into the blocs and perform Discrete Cosine Transform (DCT). Step 3 Embed the pilot pattern p and atermar pattern in DCT coefficients f of different blocs (see Fig. 2).
7 Fig. 2. The partition model. The pilot patterns are embedded in the blac blocs. And the atermar patterns are embedded in the other blocs. The gray regions are exhaustive searching indos. f ( y ) = f ( y ) + α () here α is the atermaring strength. We use α = 0. 6 in our experiments. And here p is a hite noise pattern and is a set of hite noise patterns. Here e use the popular linear, additive atermaring scheme [8] in the atermar embedding. Other embedding schemes, such as linear [0][] and nonlinear multiplication atermar scheme [2], may be used to achieve better performance in terms of robustness or invisibility of atermar. Step 4 Perform inverse DCT transform on the atermared DCT coefficients f of every bloc and get I. Step 5 Get the atermar mas as, Mas = I I (2) Step 6 Up-scale Mas ith to the original size and add it to the original image to get the atermared image I. 3.3 Watermar Extraction The atermar extraction procedure includes three steps. Step Don-sample the rescanned image at different ratio and detect the positions of four pilot patterns by exhaustive searching in the certain indos (see Fig. 2).
8 Assume R img to be the resolution of the original image and R scan to be resolution of the scanner. It is ell non that the difference beteen R img and R scan ill introduce scaling beteen the original image and the rescanned one. And the scaling parameter is R scan P scale = (2) Rimg In order to extract the pilot signal in the lo resolution, e also don-sample the atermared image ith /. According to Section 3.2, the effect of nonlinear geometric distortions can be reduced. So the possible ratio of don-sample is Rate R img = (3) R R scan is certain in the extraction process. And although R img is unnon to the detector, the possible value is limited in application. We ill exhaustive searching in all possible value of Eq.3. We can get the searching result at hich the correlation beteen the original pilot signal and the extracted one is highest. Don-sample the rescanned image ith that result ratio and find the locations of four pilot signals in the don-sampled rescanned image. Step 2 Get the parameters of global geometric distortions. With the help of four pilot signal, e can get rotation angles and four sets of parameters of translation [7]. We use the average values of them to resynchronize the don-sampled rescanned image. Because the positions of four pilot signals can be gotten correctly, e can get the exact orientation ith their help. Step 3 Decode the atermar payload bit by bit from the recovered image. The don-sampled image is divided into blocs. Select the DCT coefficients of blocs at the same positions as in the embedding procedure. Compute the correlation beteen u i and the selected coefficients. If the correlation is greater than a threshold T, then indicate that the bit of atermar b i is. scan 4 Experimental Results We evaluate the proposed algorithm using 4 high resolution images from Standard High Precision Pictures (SHIPP). The parameter of don-sample is set to 0. The don-sampled image is divided into blocs ith size 64-by-64 and there are 24 blocs in one test image. Except four blocs embedded the pilot signals in, e embed 64bits in each of the other tenty blocs. So the largest atermaring capacity is up to 280 bits. In our application, e embed the same atermar in these tenty blocs and the atermaring capacity is 64 bits. The PSNRs of the atermared images are presented in Table. From this table, e can find that visual quality of the atermared images is acceptable. And the atermared images are shon in Fig. 3.
9 Table. PSNRs of the atermared images. Image Bride Harbor Wool Bottle Resolution 3072-by by by by-4096 PSNR(dB) Fig. 3. Watermared images We printed the atermared image out by Ricoh Aficio 2032 and scanned the printed atermared images by HP scanjet 8250, both common commercial products. We employ different models of Ricoh laser printer and HP scanner to evaluate the robustness of our proposed atermaring algorithm. The resolution of Aficio 2032 is set to 600 dpi. And the scanning resolution is set to 300 dpi and 600 dpi. The detection results are shon in Table 2. The BER of extrcted 64 bits is less than.6%. So e can conclude that the proposed algorithm is robust to print-and-scan process. Table 2. The detection results BER(%) Image Scanning Resolution = 300 dpi Scanning Resolution = 600 dpi Bride 0 0 Harbor 0 0 Wool 0 0 Bottle.6 0 We also evaluate the proposed algorithm s robustness against JPEG compression. The atermared images are compressed under different JPEG quality factors. The quality factors are set to be from 50 to 90 and at intervals of 0. All atermars can be extracted correctly ithout any error bit from compressed images. In the experiments, the atermaring algorithm is implemented ith CPU PIV 2.4G, RAM 2G and Matlab 6.5. It taes about 7.89s for the embedding, and taes 26.08s for the extraction despite the very high resolution of images, so it is efficient in computation.
10 5 Conclusions In this paper, e analyze the impact of the combination of local random nonlinear geometric distortions and nonlinear pixel value distortions in print-and-scanning process, and a novel print-and-scan resilient image atermaring algorithm is proposed. The atermars are embedded in the don-sampled lo resolution image to reduce the effect of nonlinear distortions in printing process. And the pilot patterns are embedded to be resilient global geometric distortions in print-and-scan process. Theoretical analysis and the experimental results demonstrate that the proposed algorithm is robust to the print-and-scan process and its computational efficiency is high. Future or is to perform more testing on this algorithm by more test images. Acnoledgement This or as supported by NSFC ( ), NSF of Guangdong ( ), and NSF of Guangzhou (2006Z3-D304). References. C.Y. Lin, M. Wu, J. A. Bloom, I.J. Co M.L. Miller, and Y.M. Lui: Rotation, Scale and Translation Resilient Watermaring for Images, IEEE Transactions on Image Processing, vol. 0, no. 5, pp (200). 2. J. O Ruanaidh, and T. Pun: Rotation, Scale and Translation Invariant Spread Spectrum Digital Image Watermaring, Signal Processing, vol. 66, no. 3, pp (998). 3. P. C. Su, and C. C. Jay Kuo: Synchronized Detection of The Bloc-Based Watermar ith Invisible Grid Embedding, In: SPIE Photonics West, Security and Watermaring of Multimedia Contents III, San Jose, California (200). 4. M. Kutter: Watermaring Resisting to Translation, Rotation and Scaling, In: Proceedings of the SPIE: Multimedia systems and applications, Boston, USA (3528), pp: (998). 5. S. Voloshynovsiy, F. Deguillaume, T. Pun: Multibit atermaring robust against local nonlinear geometrical distortions, In: IEEE International Conference on Image Processing 200, Thessaloni Greece, pp: (200). 6. C. Y. Lin, S. F. Chang: Distortion Modeling and Invariant Extraction for Digital Image Printand-Scan Process, In: Int. Symposium on Multimedia Information Processing (999). 7. L. Yu, X. Niu, and S. Sun: Print-and-Scan Model and the Watermaring Countermeasure, In: Image and Vision Computing, 23, pp: (2005). 8. I.J. Co J. Kilian, T. Leighton, and T. Shamoon: Secure Spread Spectrum Watermaring for Multimedia, IEEE Transactions on Image Processing, vol. 6, no. 2, pp: (997). 9. K. Solan U.Madho, B.S.Manjunath, S. Chandrasearan, and I. El-Khalil: Print and Scan Resilient Data Hiding in Images, IEEE Transactions on Information Forensics and Security, vol., no. 4, pp: (2006).
11 0. Qiang Cheng and Thomas S. Huang: Robust Optimum Detection of Transform Domain Multiplicative Watermars, IEEE Transactions on Signal Processing, vol.5, no. 4, pp: (2003).. Xiangui Kang, Xiong Zhong, Jiu Huang, and Wenjun Zeng: An Efficient Print-Scanning Resilient Data Hiding Based on a Novel LPM, In: IEEE International Conference on Image Processing 2008, San Digeo, CA, USA (2008). 2. Wei Liu, Lina Dong, and Wenjun Zeng: Optimum Detection for Spread-Spectrum Watermaring That Employs Self-Masing, In: IEEE Transactions on Information Forensics and Security, vol. 2, No. 4, pp: (2007). 3. D. He, and Q. Sun: A Practical Print-Scan Resilient Watermaring Scheme, In: IEEE International Conference on Image Processing 2005, vol., pp: (2005).
A Print-Scan Resilient Watermarking based on Fourier Transform and Image Restoration
A Print-Scan Resilient Watermarking based on Fourier Transform and Image Restoration R. Riad H. Douzi M. El Hajji R. Harba PRISME, University of Orleans, Orléans, France F. Ros PRISME, University of Orleans,
More informationRobust Image Watermarking based on DCT-DWT- SVD Method
Robust Image Watermarking based on DCT-DWT- SVD Sneha Jose Rajesh Cherian Roy, PhD. Sreenesh Shashidharan ABSTRACT Hybrid Image watermarking scheme proposed based on Discrete Cosine Transform (DCT)-Discrete
More informationA DWT-DFT Composite Watermarking Scheme Robust to Both Affine Transform and JPEG Compression
776 IEEE TRANSACTIONS ON CIRCUITS AND SYSTEMS FOR VIDEO TECHNOLOGY, VOL 13, NO 8, AUGUST 2003 A DWT-DFT Composite Watermarking Scheme Robust to Both Affine Transform and JPEG Compression Xiangui Kang,
More informationA Robust Wavelet-Based Watermarking Algorithm Using Edge Detection
A Robust Wavelet-Based Watermarking Algorithm Using Edge Detection John N. Ellinas Abstract In this paper, a robust watermarking algorithm using the wavelet transform and edge detection is presented. The
More informationImage and Video Watermarking
Telecommunications Seminar WS 1998 Data Hiding, Digital Watermarking and Secure Communications Image and Video Watermarking Herbert Buchner University of Erlangen-Nuremberg 16.12.1998 Outline 1. Introduction:
More informationDIGITAL IMAGE WATERMARKING TECHNIQUES FOR IMAGES USING TWO-DIMENSIONAL WALSH CODING
DIGITAL IMAGE WATERMARKING TECHNIQUES FOR IMAGES USING TWO-DIMENSIONAL WALSH CODING Ajeet Pratap Singh 1, Sachin Kumar 2 1,2 Department of ECE, ASET, Amity University, Lucknow, U.P., (India) ABSTRACT The
More informationA ROBUST WATERMARKING SCHEME BASED ON EDGE DETECTION AND CONTRAST SENSITIVITY FUNCTION
A ROBUST WATERMARKING SCHEME BASED ON EDGE DETECTION AND CONTRAST SENSITIVITY FUNCTION John N. Ellinas Department of Electronic Computer Systems,Technological Education Institute of Piraeus, 12244 Egaleo,
More informationComparison of Digital Image Watermarking Algorithms. Xu Zhou Colorado School of Mines December 1, 2014
Comparison of Digital Image Watermarking Algorithms Xu Zhou Colorado School of Mines December 1, 2014 Outlier Introduction Background on digital image watermarking Comparison of several algorithms Experimental
More informationA NEW DCT-BASED WATERMARKING METHOD FOR COPYRIGHT PROTECTION OF DIGITAL AUDIO
International journal of computer science & information Technology (IJCSIT) Vol., No.5, October A NEW DCT-BASED WATERMARKING METHOD FOR COPYRIGHT PROTECTION OF DIGITAL AUDIO Pranab Kumar Dhar *, Mohammad
More informationDigital Watermarking of Still Images using the Discrete Wavelet Transform
Buletinul Ştiinţific al Universităţii "Politehnica" din Timişoara Seria ELECTROICĂ şi TELECOMUICAŢII TRASACTIOS on ELECTROICS and COMMUICATIOS Tom 48(62) Fascicola 1 2003 Digital Watermarking of Still
More informationData Hiding in Video
Data Hiding in Video J. J. Chae and B. S. Manjunath Department of Electrical and Computer Engineering University of California, Santa Barbara, CA 9316-956 Email: chaejj, manj@iplab.ece.ucsb.edu Abstract
More informationImage Error Concealment Based on Watermarking
Image Error Concealment Based on Watermarking Shinfeng D. Lin, Shih-Chieh Shie and Jie-Wei Chen Department of Computer Science and Information Engineering,National Dong Hwa Universuty, Hualien, Taiwan,
More informationRotation, scale, and translation invariant image watermark using higher order spectra Hyung -Shin Kim Yunju Baek Heung-Kyu Lee
Rotation, scale, and translation invariant image watermark using higher order spectra Hyung -Shin Kim Yunju Baek Heung-Kyu Lee Division of Computer Science Department of Electrical Engineering and Computer
More informationA NOVEL APPROACH FOR IMAGE WATERMARKING USING DCT AND JND TECHNIQUES
A NOVEL APPROACH FOR IMAGE WATERMARKING USING DCT AND JND TECHNIQUES Mrs. R.J. Shelke, Dept of Electronics Engineering, Walchand Institute of Technology, Solapur 43002, India ABSTRACT Dr. Mrs. S.S. Apte,
More informationRobust Watermark Algorithm using Genetic Algorithm
JOURNAL OF INFORMATION SCIENCE AND ENGINEERING 23, 661-670 (2007) Short Paper Robust Watermark Algorithm using Genetic Algorithm CONG JIN AND SHI-HUI WANG * Department of Computer Science Central China
More informationA Wavelet-Based Watermarking for Still Images
Buletinul Ştiinţific al Universităţii "Politehnica" din Timişoara Seria ELECTRONICĂ şi TELECOMUNICAŢII TRANSACTIONS on ELECTRONICS and COMMUNICATIONS Tom 49(63) Fascicola 2 2004 A Wavelet-Based Watermarking
More informationA New Approach to Compressed Image Steganography Using Wavelet Transform
IOSR Journal of Computer Engineering (IOSR-JCE) e-issn: 2278-0661,p-ISSN: 2278-8727, Volume 17, Issue 5, Ver. III (Sep. Oct. 2015), PP 53-59 www.iosrjournals.org A New Approach to Compressed Image Steganography
More informationAn Improved Images Watermarking Scheme Using FABEMD Decomposition and DCT
An Improved Images Watermarking Scheme Using FABEMD Decomposition and DCT Noura Aherrahrou and Hamid Tairi University Sidi Mohamed Ben Abdellah, Faculty of Sciences, Dhar El mahraz, LIIAN, Department of
More informationMultiple domain watermarking for print-scan and JPEG resilient data hiding
Multiple domain watermarking for print-scan and JPEG resilient data hiding Anu Pramila, Anja Keskinarkaus, and Tapio Seppänen MediaTeam Oulu, Department of Electrical and Information Engineering, University
More informationA FRACTAL WATERMARKING SCHEME FOR IMAGE IN DWT DOMAIN
A FRACTAL WATERMARKING SCHEME FOR IMAGE IN DWT DOMAIN ABSTRACT A ne digital approach based on the fractal technolog in the Disperse Wavelet Transform domain is proposed in this paper. First e constructed
More informationA Robust Image Hiding Method Using Wavelet Technique *
JOURNAL OF INFORMATION SCIENCE AND ENGINEERING 22, 163-174 (2006) Short Paper A Robust Image Hiding Method Using Wavelet Technique * Department of Computer and Information Science National Chiao Tung University
More informationOn domain selection for additive, blind image watermarking
BULLETIN OF THE POLISH ACADEY OF SCIENCES TECHNICAL SCIENCES, Vol. 60, No. 2, 2012 DOI: 10.2478/v10175-012-0042-5 DEDICATED PAPERS On domain selection for additive, blind image watermarking P. LIPIŃSKI
More informationDIGITAL IMAGE WATERMARKING BASED ON A RELATION BETWEEN SPATIAL AND FREQUENCY DOMAINS
DIGITAL IMAGE WATERMARKING BASED ON A RELATION BETWEEN SPATIAL AND FREQUENCY DOMAINS Murat Furat Mustafa Oral e-mail: mfurat@cu.edu.tr e-mail: moral@mku.edu.tr Cukurova University, Faculty of Engineering,
More informationAn Adaptive Content Based Localized Watermarking Algorithm for Remote Sensing Image
An Adaptive Content Based Localized Watermaring Algorithm for Remote Sensing Image Xianmin Wang a* Zequn Guan a Chenhan Wu a a College of Remote Sensing Information Engineering, Wuhan University No.129
More informationA NEW APPROACH OF DIGITAL IMAGE COPYRIGHT PROTECTION USING MULTI-LEVEL DWT ALGORITHM
A NEW APPROACH OF DIGITAL IMAGE COPYRIGHT PROTECTION USING MULTI-LEVEL DWT ALGORITHM Siva Prasad K, Ganesh Kumar N PG Student [DECS], Assistant professor, Dept of ECE, Thandrapaparaya Institute of science
More informationSCALED WAVELET TRANSFORM VIDEO WATERMARKING METHOD USING HYBRID TECHNIQUE: SWT-SVD-DCT
SCALED WAVELET TRANSFORM VIDEO WATERMARKING METHOD USING HYBRID TECHNIQUE: SWT- Shaveta 1, Daljit Kaur 2 1 PG Scholar, 2 Assistant Professor, Dept of IT, Chandigarh Engineering College, Landran, Mohali,
More informationMultibit Digital Watermarking Robust against Local Nonlinear Geometrical Distortions
Multibit Digital Watermarking Robust against Local Nonlinear Geometrical Distortions Sviatoslav Voloshynovskiy Frédéric Deguillaume, and Thierry Pun CUI - University of Geneva 24, rue du Général Dufour
More informationAn Improved DCT Based Color Image Watermarking Scheme Xiangguang Xiong1, a
International Symposium on Mechanical Engineering and Material Science (ISMEMS 2016) An Improved DCT Based Color Image Watermarking Scheme Xiangguang Xiong1, a 1 School of Big Data and Computer Science,
More informationQR Code Watermarking Algorithm based on Wavelet Transform
2013 13th International Symposium on Communications and Information Technologies (ISCIT) QR Code Watermarking Algorithm based on Wavelet Transform Jantana Panyavaraporn 1, Paramate Horkaew 2, Wannaree
More informationCOMPARISONS OF DCT-BASED AND DWT-BASED WATERMARKING TECHNIQUES
COMPARISONS OF DCT-BASED AND DWT-BASED WATERMARKING TECHNIQUES H. I. Saleh 1, M. E. Elhadedy 2, M. A. Ashour 1, M. A. Aboelsaud 3 1 Radiation Engineering Dept., NCRRT, AEA, Egypt. 2 Reactor Dept., NRC,
More informationCOMPARISON BETWEEN TWO WATERMARKING ALGORITHMS USING DCT COEFFICIENT, AND LSB REPLACEMENT
COMPARISO BETWEE TWO WATERMARKIG ALGORITHMS USIG DCT COEFFICIET, AD LSB REPLACEMET Mona M. El-Ghoneimy Associate Professor, Elect. & Comm. Dept., Faculty of Engineering, Cairo University, Post code 12316
More information2D barcodes as watermarks in image authentication
University of Wollongong Research Online Faculty of Informatics - Papers (Archive) Faculty of Engineering and Information Sciences 2007 2D barcodes as watermars in image authentication Prashan Premaratne
More informationAn Efficient Watermarking Algorithm Based on DWT and FFT Approach
An Efficient Watermarking Algorithm Based on DWT and FFT Approach S.Manikanda prabu Assistant Professor, Department of CSE, Tamilnadu College of Engineering, Coimbatore, India smaniprabume@gmail.com Dr.S.Ayyasamy
More informationEnhancing the pictorial content of digital holograms at 100 frames per second
Enhancing the pictorial content of digital holograms at 100 frames per second P.W.M. Tsang, 1 T.-C Poon, 2 and K.W.K. Cheung 1 1 Department of Electronic Engineering, City University of Hong Kong, Hong
More informationA Robust A DCT-Based Digital Watermarking Scheme Using Important Feature Points
A Robust A DCT-Based Digital Watermarking Scheme Using Important Feature Points Xiaojun Qi and Ji Qi Department of Computer Science, Utah State University Logan, UT, 84322-4205, USA. Xiaojun.Qi@usu.edu
More informationRobust Image Watermarking based on Discrete Wavelet Transform, Discrete Cosine Transform & Singular Value Decomposition
Advance in Electronic and Electric Engineering. ISSN 2231-1297, Volume 3, Number 8 (2013), pp. 971-976 Research India Publications http://www.ripublication.com/aeee.htm Robust Image Watermarking based
More informationMr Mohan A Chimanna 1, Prof.S.R.Khot 2
Digital Video Watermarking Techniques for Secure Multimedia Creation and Delivery Mr Mohan A Chimanna 1, Prof.S.R.Khot 2 1 Assistant Professor,Department of E&Tc, S.I.T.College of Engineering, Yadrav,Maharashtra,
More informationContour Extraction & Compression from Watermarked Image using Discrete Wavelet Transform & Ramer Method
Contour Extraction & Compression from Watermarked Image using Discrete Wavelet Transform & Ramer Method Ali Ukasha, Majdi Elbireki, and Mohammad Abdullah Abstract In this paper we have implemented a digital
More informationRobust object-based watermarking scheme via shape self-similarity
See discussions, stats, and author profiles for this publication at: https://www.researchgate.net/publication/4049526 Robust object-based watermaring scheme via shape self-similarity Conference Paper January
More informationA new predictive image compression scheme using histogram analysis and pattern matching
University of Wollongong Research Online University of Wollongong in Dubai - Papers University of Wollongong in Dubai 00 A new predictive image compression scheme using histogram analysis and pattern matching
More informationDigital Image Steganography Techniques: Case Study. Karnataka, India.
ISSN: 2320 8791 (Impact Factor: 1.479) Digital Image Steganography Techniques: Case Study Santosh Kumar.S 1, Archana.M 2 1 Department of Electronicsand Communication Engineering, Sri Venkateshwara College
More informationA WATERMARKING METHOD RESISTANT TO GEOMETRIC ATTACKS
A WATERMARKING METHOD RESISTANT TO GEOMETRIC ATTACKS D. Simitopoulos, D. Koutsonanos and M.G. Strintzis Informatics and Telematics Institute Thermi-Thessaloniki, Greece. Abstract In this paper, a novel
More informationFiltering. -If we denote the original image as f(x,y), then the noisy image can be denoted as f(x,y)+n(x,y) where n(x,y) is a cosine function.
Filtering -The image shown below has been generated by adding some noise in the form of a cosine function. -If we denote the original image as f(x,y), then the noisy image can be denoted as f(x,y)+n(x,y)
More informationA Robust Digital Watermarking Scheme using BTC-PF in Wavelet Domain
A Robust Digital Watermarking Scheme using BTC-PF in Wavelet Domain Chinmay Maiti a *, Bibhas Chandra Dhara b a Department of Computer Science & Engineering, College of Engineering & Management, Kolaghat,
More informationRegion Based Even Odd Watermarking Method With Fuzzy Wavelet
Region Based Even Odd Watermarking Method With Fuzzy Wavelet S.Maruthuperumal 1, G.Rosline Nesakumari 1, Dr.V.Vijayakumar 2 1 Research Scholar, Dr.MGR University Chennai. Associate Professor, GIET Rajahmundry,
More informationSpatial, Transform and Fractional Domain Digital Image Watermarking Techniques
Spatial, Transform and Fractional Domain Digital Image Watermarking Techniques Dr.Harpal Singh Professor, Chandigarh Engineering College, Landran, Mohali, Punjab, Pin code 140307, India Puneet Mehta Faculty,
More informationCERIAS Tech Report
CERIAS Tech Report 04-86 Spatial Synchronization Using Watermark Key Structure by Eugene T. Lin and Edward J. Delp Center for Education and Research in Information Assurance and Security, Purdue University,
More informationHigh Capacity Reversible Watermarking Scheme for 2D Vector Maps
Scheme for 2D Vector Maps 1 Information Management Department, China National Petroleum Corporation, Beijing, 100007, China E-mail: jxw@petrochina.com.cn Mei Feng Research Institute of Petroleum Exploration
More informationImproved Qualitative Color Image Steganography Based on DWT
Improved Qualitative Color Image Steganography Based on DWT 1 Naresh Goud M, II Arjun Nelikanti I, II M. Tech student I, II Dept. of CSE, I, II Vardhaman College of Eng. Hyderabad, India Muni Sekhar V
More informationRotation, Scale, and Translation Resilient Digital Watermark Based on Complex Exponential Function
40 ECTI TRANSACTIONS ON ELECTRICAL ENG., ELECTRONICS, AND COMMUNICATIONS VOL.2, NO.2 AUGUST 2004 Rotation, Scale, and Translation Resilient Digital Watermark Based on Complex Exponential Function Siriporn
More informationA NEW ROBUST IMAGE WATERMARKING SCHEME BASED ON DWT WITH SVD
A NEW ROBUST IMAGE WATERMARKING SCHEME BASED ON WITH S.Shanmugaprabha PG Scholar, Dept of Computer Science & Engineering VMKV Engineering College, Salem India N.Malmurugan Director Sri Ranganathar Institute
More informationA Video Watermarking Algorithm Based on the Human Visual System Properties
A Video Watermarking Algorithm Based on the Human Visual System Properties Ji-Young Moon 1 and Yo-Sung Ho 2 1 Samsung Electronics Co., LTD 416, Maetan3-dong, Paldal-gu, Suwon-si, Gyenggi-do, Korea jiyoung.moon@samsung.com
More informationA Robust Image Watermarking Scheme using Image Moment Normalization
A Robust Image ing Scheme using Image Moment Normalization Latha Parameswaran, and K. Anbumani Abstract Multimedia security is an incredibly significant area of concern. A number of papers on robust digital
More informationVideo Inter-frame Forgery Identification Based on Optical Flow Consistency
Sensors & Transducers 24 by IFSA Publishing, S. L. http://www.sensorsportal.com Video Inter-frame Forgery Identification Based on Optical Flow Consistency Qi Wang, Zhaohong Li, Zhenzhen Zhang, Qinglong
More informationDigital Watermarking with Copyright Authentication for Image Communication
Digital Watermarking with Copyright Authentication for Image Communication Keta Raval Dept. of Electronics and Communication Patel Institute of Engineering and Science RGPV, Bhopal, M.P., India ketaraval@yahoo.com
More informationThis document is downloaded from DR-NTU, Nanyang Technological University Library, Singapore.
This document is downloaded from DR-NTU, Nanyang Technological University Library, Singapore. Title A robust phase watermarking algorithm using conugate symmetric sequency-ordered complex Hadamard transform
More informationA REAL-TIME REGISTRATION METHOD OF AUGMENTED REALITY BASED ON SURF AND OPTICAL FLOW
A REAL-TIME REGISTRATION METHOD OF AUGMENTED REALITY BASED ON SURF AND OPTICAL FLOW HONGBO LI, MING QI AND 3 YU WU,, 3 Institute of Web Intelligence, Chongqing University of Posts and Telecommunications,
More informationA DWT, DCT AND SVD BASED WATERMARKING TECHNIQUE TO PROTECT THE IMAGE PIRACY
A DWT, DCT AND SVD BASED WATERMARKING TECHNIQUE TO PROTECT THE IMAGE PIRACY Md. Maklachur Rahman 1 1 Department of Computer Science and Engineering, Chittagong University of Engineering and Technology,
More informationImage Watermarking Using Visual Perception Model and Statistical Features
Ms. S.Meenakshi et al. /International Journal of Engineering and Technology Vol.(3),, 94-99 Image Watermarking Using Visual Perception Model and Statistical Features Ms. S.Meenakshi and Mrs.C.Akila University
More informationSign-up Sheet posted outside of my office HFH 1121
Lecture 14: Digital Watermarking II Some slides from Prof. M. Wu, UMCP Lab2 Demo Csil Monday: May 24, 1 4pm Optional (9:30 11am) 10 minutes per Group 5 Minutes Presentation 5 Minutes Demo Sign-up Sheet
More informationRST Invariant Digital Image Watermarking Based on Log-Polar Mapping and Phase Correlation
IEEE TRANSACTIONS ON CIRCUITS AND SYSTEMS FOR VIDEO TECHNOLOGY, VOL. XX, NO. Y, SEPTEMBER 2003 1 RST Invariant Digital Image Watermarking Based on Log-Polar Mapping and Phase Correlation Dong Zheng, Student
More informationDIGITAL WATERMARKING FOR GRAY-LEVEL WATERMARKS
DICTA22: Digital Image Computing Techniques and Applications, 2 22 January 22, Melbourne, Australia. DIGITAL WATERMARKING FOR GRAY-LEVEL WATERMARKS *Yuk Ying CHUNG, Man To WONG *Basser Department of Computer
More informationBlock Mean Value Based Image Perceptual Hashing for Content Identification
Block Mean Value Based Image Perceptual Hashing for Content Identification Abstract. Image perceptual hashing has been proposed to identify or authenticate image contents in a robust way against distortions
More informationWatermarking of Image Using Priority Based On Algorithms
This work by IJARBEST is licensed under Creative Commons Attribution 4.0 International License. Available at https://www.ijarbest.com Watermarking of Image Using Priority Based On Algorithms B.Aarthi,
More informationCopy Protection for Multimedia Data based on Labeling Techniques
Copy Protection for Multimedia Data based on Labeling Techniques G.C. Langelaar, J.C.A. van der Lubbe, J. Biemond Department of Electrical Engineering, Information Theory Group Delft University of Technology
More informationPart III. Attacks and Countermeasures
Part III Attacks and Countermeasures 19 Chapter 9 Attacks and Countermeasures on Known Data Hiding Algorithms An attack on a watermarking system is to obliterate the watermark so that the original goal
More informationAuthentication and Secret Message Transmission Technique Using Discrete Fourier Transformation
, 2009, 5, 363-370 doi:10.4236/ijcns.2009.25040 Published Online August 2009 (http://www.scirp.org/journal/ijcns/). Authentication and Secret Message Transmission Technique Using Discrete Fourier Transformation
More informationA Reversible Data Hiding Scheme for BTC- Compressed Images
IJACSA International Journal of Advanced Computer Science and Applications, A Reversible Data Hiding Scheme for BTC- Compressed Images Ching-Chiuan Lin Shih-Chieh Chen Department of Multimedia and Game
More informationRobust Digital Image Watermarking based on complex wavelet transform
Robust Digital Image Watermarking based on complex wavelet transform TERZIJA NATAŠA, GEISSELHARDT WALTER Institute of Information Technology University Duisburg-Essen Bismarckstr. 81, 47057 Duisburg GERMANY
More informationA new approach of nonblind watermarking methods based on DWT and SVD via LU decomposition
Turkish Journal of Electrical Engineering & Computer Sciences http:// journals. tubitak. gov. tr/ elektrik/ Research Article Turk J Elec Eng & Comp Sci (2014) 22: 1354 1366 c TÜBİTAK doi:10.3906/elk-1212-75
More informationCERIAS Tech Report
CERIAS Tech Report 2001-68 The Effect of Matching Watermark and Compression Transforms in Compressed Color Images by Raymond B. Wolfgang and Christine I. Podilchuk and Edward J. Delp Center for Education
More informationImage Steganography (cont.)
Image Steganography (cont.) 2.2) Image Steganography: Use of Discrete Cosine Transform (DCT) DCT is one of key components of JPEG compression JPEG algorithm: (1) algorithm is split in 8x8 pixel squares
More informationDigital Image Watermarking Using DWT Based DCT Technique
International Journal of Recent Research and Review, Vol. VII, Issue 4, December 2014 ISSN 2277 8322 Digital Image Watermarking Using DWT Based DCT Technique Digvijaysinh Vaghela, Ram Kishan Bairwa Research
More informationVideo Watermarking Scheme resistant to MPEG Compression
Video Watermarking Scheme resistant to MPEG Compression Pedro A. Hernandez-Avalos, Claudia Feregrino-Uribe, Rene Cumplido, Jose Juan Garcia-Hernandez National Institute for Astrophysics, Optics and Electronics
More informationAn Edge Detection Method Using Back Propagation Neural Network
RESEARCH ARTICLE OPEN ACCESS An Edge Detection Method Using Bac Propagation Neural Netor Ms. Utarsha Kale*, Dr. S. M. Deoar** *Department of Electronics and Telecommunication, Sinhgad Institute of Technology
More informationA Watermarking Algorithm Based on HT- DWT-TGF for Security Applications
ISSN: 78 33 Volume, Issue, December 03 A Watermaring Algorithm Based on HT- DWT-TGF for Security Applications C. SUBBA RAO M.E., (PhD) B.V.LAKSHMI (Mtech),ECE Associate Professor, ECE PVP Siddhartha Engineering
More informationAN IMPROVISED LOSSLESS DATA-HIDING MECHANISM FOR IMAGE AUTHENTICATION BASED HISTOGRAM MODIFICATION
AN IMPROVISED LOSSLESS DATA-HIDING MECHANISM FOR IMAGE AUTHENTICATION BASED HISTOGRAM MODIFICATION Shaik Shaheena 1, B. L. Sirisha 2 VR Siddhartha Engineering College, Vijayawada, Krishna, Andhra Pradesh(520007),
More informationMRT based Fixed Block size Transform Coding
3 MRT based Fixed Block size Transform Coding Contents 3.1 Transform Coding..64 3.1.1 Transform Selection...65 3.1.2 Sub-image size selection... 66 3.1.3 Bit Allocation.....67 3.2 Transform coding using
More informationA Robust Image Zero-Watermarking Algorithm Based on DWT and PCA
A Robust Image Zero-Watermarking Algorithm Based on DWT and PCA Xiaoxu Leng, Jun Xiao, and Ying Wang Graduate University of Chinese Academy of Sciences, 100049 Beijing, China lengxiaoxu@163.com, {xiaojun,ywang}@gucas.ac.cn
More informationENTROPY-BASED IMAGE WATERMARKING USING DWT AND HVS
SETIT 2005 3 rd International Conference: Sciences of Electronic, Technologies of Information and Telecommunications March 27-31, 2005 TUNISIA ENTROPY-BASED IMAGE WATERMARKING USING DWT AND HVS Shiva Zaboli
More informationDOI: /jos Tel/Fax: by Journal of Software. All rights reserved. , )
ISSN 1000-9825, CODEN RUXUEW E-mail: jos@iscasaccn Journal of Software, Vol17, No2, February 2006, pp315 324 http://wwwjosorgcn DOI: 101360/jos170315 Tel/Fax: +86-10-62562563 2006 by Journal of Software
More informationA Robust and Oblivious Watermarking Method Using Wavelet Transform and Genetic Algorithm
.iecs.in International Journal Of Engineering And Computer Science ISSN:39-74 Volume 5 Issue -0 February, 06 Page No. 58-588 A Robust and Oblivious Watermarking Meod Using Wavelet Transform and Genetic
More informationCompression of Stereo Images using a Huffman-Zip Scheme
Compression of Stereo Images using a Huffman-Zip Scheme John Hamann, Vickey Yeh Department of Electrical Engineering, Stanford University Stanford, CA 94304 jhamann@stanford.edu, vickey@stanford.edu Abstract
More informationMultipurpose Color Image Watermarking Algorithm Based on IWT and Halftoning
Multipurpose Color Image Watermarking Algorithm Based on IWT and Halftoning C. SANTIAGO-AVILA, M. GONZALEZ LEE, M. NAKANO-MIYATAKE, H. PEREZ-MEANA Sección de Posgrado e Investigación, Esime Culhuacan Instituto
More informationTowards copy-evident JPEG images
Towards copy-evident JPEG images Andrew B. Lewis, Markus G. Kuhn Abstract: We present a technique for adding a high-frequency pattern to JPEG images that is imperceptible to the unaided eye, but turns
More informationRobust Watermarking Method for Color Images Using DCT Coefficients of Watermark
Global Journal of Computer Science and Technology Graphics & Vision Volume 12 Issue 12 Version 1.0 Year 2012 Type: Double Blind Peer Reviewed International Research Journal Publisher: Global Journals Inc.
More informationData Hiding on Text Using Big-5 Code
Data Hiding on Text Using Big-5 Code Jun-Chou Chuang 1 and Yu-Chen Hu 2 1 Department of Computer Science and Communication Engineering Providence University 200 Chung-Chi Rd., Shalu, Taichung 43301, Republic
More informationAn Improved DWT-SVD based Digital Watermarking Algorithm for Images Pracheta Bansal 1, R.P.Mahapatra 2 and Divya Gupta 3
An Improved DWT-SVD based Digital Watermarking Algorithm for Images Pracheta Bansal 1, R.P.Mahapatra 2 and Divya Gupta 3 1,2,3 SRM University, Modinagar Abstract-Protection of digital multimedia content
More informationResearch on Distributed Video Compression Coding Algorithm for Wireless Sensor Networks
Sensors & Transducers 203 by IFSA http://www.sensorsportal.com Research on Distributed Video Compression Coding Algorithm for Wireless Sensor Networks, 2 HU Linna, 2 CAO Ning, 3 SUN Yu Department of Dianguang,
More informationA Scalable Watermarking Scheme for the Scalable Audio Coder
1 A Scalable Watermaring Scheme for the Scalable Audio Coder 1, Z. Li, 1 Q.B. Sun, Y. Lian and 1 R.S. Yu 1 Institute for Infocomm Research (I R) 1 Heng Mui Keng Terrace, Singapore 119613 Department of
More informationEfficient & Secure Data Hiding Using Secret Reference Matrix
Efficient & Secure Data Hiding Using Secret Reference Matrix Laxman Tawade 1, Rajshree Mahajan 2, Chandan Kulthe 3 1 Department of Electronic and Telecommunication Engineering, Pune University, India 2,3
More informationRobust Imperceptible Video Watermarking for MPEG Compression and DA-AD Conversion Using Visual Masking
Robust Imperceptible Video Watermarking for MPEG Compression and DA-AD Conversion Using Visual Masking Sang-Keun Ji, Wook-Hyung Kim, Han-Ul Jang, Seung-Min Mun, and Heung-Kyu Lee School of Computing, Korea
More informationROBUST BLIND IMAGE WATERMARKING BASED ON MULTI-WAVELET TRANSFORM AND SINGULAR VALUE DECOMPOSITION
Proceeding of 3th Seminar on Harmonic Analysis and Applications, January 2015 ROBUST BLIND IMAGE WATERMARKING BASED ON MULTI-WAVELET TRANSFORM AND SINGULAR VALUE DECOMPOSITION Author: Malihe Mardanpour,
More informationComparison of wavelet based watermarking techniques Using SVD
Comparison of wavelet based watermarking techniques Using SVD Prof.T.Sudha Department of Computer Science Vikrama Simhapuri University Nellore. Email- thatimakula_sudha@yahoo.com Ms. K. Sunitha Head, P.G
More informationPRINTED DOCUMENT AUTHENTICATION USING TWO LEVEL QR CODE
PRINTED DOCUMENT AUTHENTICATION USING TWO LEVEL QR CODE Iu. Tkachenko 1,2, W. Puech 1, O. Strauss 1 1 Laboratory LIRMM, UMR CNRS 5506 University of Montpellier 860 rue de St Priest, 34090 Montpellier Cedex
More informationRobust Lossless Data Hiding. Outline
Robust Lossless Data Hiding Yun Q. Shi, Zhicheng Ni, Nirwan Ansari Electrical and Computer Engineering New Jersey Institute of Technology October 2010 1 Outline What is lossless data hiding Existing robust
More informationA Nonoblivious Image Watermarking System Based on Singular Value Decomposition and Texture Segmentation
A Nonoblivious Image Watermarking System Based on Singular Value Decomposition and exture Segmentation Soroosh Rezazadeh, and Mehran Yazdi Abstract In this paper, a robust digital image watermarking scheme
More informationIMPROVED RHOMBUS INTERPOLATION FOR REVERSIBLE WATERMARKING BY DIFFERENCE EXPANSION. Catalin Dragoi, Dinu Coltuc
0th European Signal Processing Conference (EUSIPCO 01) Bucharest, Romania, August 7-31, 01 IMPROVED RHOMBUS INTERPOLATION FOR REVERSIBLE WATERMARKING BY DIFFERENCE EXPANSION Catalin Dragoi, Dinu Coltuc
More informationAUDIOVISUAL COMMUNICATION
AUDIOVISUAL COMMUNICATION Laboratory Session: Discrete Cosine Transform Fernando Pereira The objective of this lab session about the Discrete Cosine Transform (DCT) is to get the students familiar with
More informationAN EFFICIENT VIDEO WATERMARKING USING COLOR HISTOGRAM ANALYSIS AND BITPLANE IMAGE ARRAYS
AN EFFICIENT VIDEO WATERMARKING USING COLOR HISTOGRAM ANALYSIS AND BITPLANE IMAGE ARRAYS G Prakash 1,TVS Gowtham Prasad 2, T.Ravi Kumar Naidu 3 1MTech(DECS) student, Department of ECE, sree vidyanikethan
More information