SELF-AUTHENTICATION OF NATURAL COLOR IMAGES IN PASCAL TRANSFORM DOMAIN. E. E. Varsaki, V. Fotopoulos and A. N. Skodras
|
|
- Derek Reynolds
- 6 years ago
- Views:
Transcription
1 SELF-AUTHENTICATION OF NATURAL COLOR IMAGES IN PASCAL TRANSFORM DOMAIN E. E. Varsaki, V. Fotopoulos and A. N. Skodras Digital Systems & Media Computing Laboratory School of Science and Technology, Hellenic Open University Tsamadou st., GR-6, Patras, Greece {e.varsaki, vfotop1, dsmc.eap.gr ABSTRACT This paper proposes a self-authentication scheme for color images, using a fragile data hiding method based on the Discrete Pascal Transform (DPT). The main contribution of this work is in the development of a scheme that is able to detect whether a color image has been tampered or not, to locate the exact tampered position, and to attempt to restore the original image content. This is achieved by embedding a low bit-depth scaled version of the image itself, resulting in very good stego image quality and satisfactory restoration. Index Terms self-authentication, data hiding, discrete Pascal transform. 1. INTRODUCTION The digital nature of multimedia documents facilitates modification, transformation and duplication. A central issue in multimedia manipulation is to reinforce their security and integrity. Most research to date intents to authenticate still images by hiding side information. In other words the problem of image authentication is solved by using fragile or semi-fragile data hiding schemes. Authentication concerns the image content. It is important to distinguish between malicious manipulations, which involve the altering of the content of the original image, and manipulations related to the use of an image, such as format conversions, compression, filtering and so on. In the first case the image content is altered as opposed to the second case. Image authentication can be used in applications where the content is important like cultural heritance, legal disputes, journalism, etc. Self-authentication methods attempt to embed the image into itself. In this way it is possible to recover the original image, even if the stego image has been altered by one or more attacks, malicious or not. First Fridrich et al. proposed a fragile method in which a compressed version of the original image is embedded into the LSB of its own pixels [1]. Several authentication methods have been proposed after that. The information is hidden in the LSB of the image [], or in the transform (DCT [3], wavelet [4]) coefficients. The recently presented discrete Pascal transform (DPT) by Aburdene et al. in [5] has become an important aspect of study. Kostopoulos et al. [6] proposed an interest watermarking scheme based on Pascal Triangle. However, the study on the applications of DPT is still of interest. This paper aims to evaluate the use of DPT in a selfauthentication scheme. The paper is organized as follows. In section the Discrete Pascal Transform is discussed. The embedding and extracting algorithms are presented in section 3. In section 4 the self-authentication scheme is analysed. Experimental results are shown in section 5. Finally conclusions are drawn in section 6.. DISCRETE PASCAL TRANSFORM AND DATA HIDING The discrete Pascal transform (DPT) X(k) of a 1D data vector x(n), for n=0,1,,,n-1 is defined in [7] as Xk ( ) = Pxn ( ), (1) where k=0,1,,,n-1 and P is the NxN Pascal transform matrix the elements of which are equal to p i, j N j ( 1) aij, for i j =, () 0, otherwise with i,j=0,1,,,n-1. The Pascal s transform matrix for N=, N=3 and N=4 are given in (3). For clarity reasons, the zero elements are denoted by a dot. The Pascal transform matrix is equal to its inverse, thus the inverse DPT is implemented by multiplying again with the Pascal transform matrix as in (4) /09/$ IEEE DSP 009
2 P =, P 3 = , P4 = (3) x() n = P X() k (4) N The Pascal transform operation is highly sensitive to noise and this is reflected on the DPT coefficients [8]. By extending to two dimensions, the DPT X(u,v) for the D data x(m,n), where M and N are the dimensions of the D signal, is defined as T X ( uv, ) = P xmnp (, ). (5) where m=0,1,,m-1 and n=0,1,,n-1. Coefficients in Pascal transform represent weighted differences in neighboring data values. Aburdene in [5] has proved that any sharp change in the pixel values of an image will produce large transform coefficients. When a variation occurs the DPT coefficients change up to the variation location. In the following we study how the DPT coefficient are affected when the identity or the anti-diagonal identity matrix is added to the D data. For simplicity let us assume a x block of the D data as follows: a11 a1 A = a1 a. (6) The DPT of A is calculated according to (5) as: X = a11 a1 a11 a1 a1 + a M a a a Let I be the x identity matrix and A be the x result of the addition of A and I. The DPT of A is calculated in (9). a a 1 0 a + 1 a A = + = a1 a 0 1 a1 a + 1 a ( a11 + 1) a1 X = ( a11 + 1) a1 ( a11 + 1) a1 a1 + ( a + 1) a11 a11 a1 1 1 X = + a11 a1 a11 a1 a1 + a X = X + 1, (9) From eq. (9) we see that the addition of the identity matrix increases the DPT coefficients by one, except for coefficient X (,) which increases by. In a similar way, it is seen that the X 4 DPT of a 4x4 D data block, to which the I 4 matrix is added, equals to N (7) (8) X 4 = X4 +, (10) where X 4 is the DPT of the 4x4 D data block prior to the addition. In general, the DPT coefficients of a D data block A V, for V even or odd, increases by the VxV Pascal matrix, when the VxV identity matrix is added to the A V block. Likewise, let A be the x result block of the addition of the x A data and I, where I is the x anti-diagonal identity matrix. X is the DPT of A and equals to (11). 0 1 X = X +, 1 (11) It is seen that the X (1,1) coefficient remains unchanged. The rest of the coefficients are decreased by one except for X (,), which is increased by. The X 4 DPT of a 4x4 data block in which the 4x4 antidiagonal identity matrix I 4 is added, equals to X 4 = X4 +. (1) In general, the DPT coefficients of an VxV sized A V data block (where V is even), monotonically decreases from the anti-diagonal identity diagonal of the block towards the X V (V,V) coefficient, when the VxV anti-diagonal identity matrix is added to the A V block. This does not hold for the odd sized matrices. In this case the the DPT coefficients are increased, as can be seen in eq. (13-14) below for the 3x3 matrices A 3 and X 3. a11 a1 a A 3 = a1 a 1 a + 3 (13) a a3 a X 3 = X , (14) In eq. (14) X 3 is the DPT of A 3 3x3 data block and X 3 is the DPT of the 3x3 D data block prior the addition. We have observed that the X V (V,V) coefficient of natural photos has a zero mean Gaussian distribution. The coefficients are positive or negative. It is possible to change the coefficient sign, by just adding the identity or the antidiagonal identity matrix VxV matrix to the VxV pixel block. This property of the DPT can be used in order to invisibly embed data into a block of pixels. Based on the above
3 discussion the embedding algorithm is presented in the next section. 3. DATA EMBEDDING AND EXTRACTING ALGORITHMS 3.1. Embedding Algorithm Let x(m,n) be a color component of the original image of MxN pixels, with m=1,,,m and n=1,,,n. The embedding algorithm is applied into RGB color space, but it is expandable to other color spaces as YUV. Let b i, with i=1,,,p be the to hide size P. The and the original image are the inputs of the algorithm. The output is the stego-image s, which contains the secret and is not visible for a human observer. The embedding algorithm is as follows: Step1: Divide each R, G and B color component of the original image into 4x4 non-overlapping blocks. The block size selection is discussed later. Step: For each bit b i check whether it is equal to 0 or not. If this is not the case go to step 7. Step3: Compute the DPT of the corresponding x i 4x4 block, X i. Step4: Check whether -0-T<X i (4,4) -T. If this true continue with the next bit (step ). Step5: If X i (4,4)<-T-0 add the identity 4x4 matrix I to the x i corresponding 4x4 pixel block and compute again the DPT of the modified block. Repeat this step until the inequality in step 4 is satisfied and then continue with the next bit. Step6: While X i (4,4)>-T subtract the identity 4x4 matrix I from the x i corresponding 4x4 pixel block and compute again the DPT of the modified x i block. Repeat this step until inequality in step 4 is satisfied and then continue with the next bit (step ). Step7: Compute the DPT of the corresponding x i 4x4 block, X i. Step8: Check whether X i (4,4) DPT coefficient satisfies the equation: T<X i (4,4) T+0. If this is true continue with step. Step9: If X i (4,4)<T add the 4x4 identity matrix I to the corresponding x i block. Compute again the DPT of the altered x i block and repeat until inequality in step 8 is satisfied. Step10: While X i (4,4)>T+0 subtract the 4x4 identity matrix I from the corresponding x i block and compute again the DPT. Repeat until the inequality in step 8 is satisfied and then continue with step. Step11: Form the stego image from the changed and unchanged x i blocks of the original image. xi + I Message bi xi -I Xi(4,4)<T i = i + 1 Original image x P = (MxN)/16 Divide x into P 4x4 blocks i = 1 bi = 0 Compute Xi the DPT of i block T<Xi(4,4)<T+0 i = P Stego image s Compute Xi the DPT of i block -T-0<Xi(4,4)<-T Fig. 1. Block diagram of the embedding algorithm. xi -I xi + I Xi(4,4)<-T-0 In some cases steps 5,6,9 and 10 may result in overflow. To avoid such errors, additional control is applied. When overflow occurs and no condition in steps 4 and 8 is satisfied, then the above steps may be modified as follows: Modified step5 or 9: Subtract the anti-diagonal identity matrix from the corresponding 4x4 x i block and compute again the DPT. Repeat this step until inequality in step 4 or 8 is satisfied and then continue with the next bit. If this is not the case go to next step. Modified step6 or 10: Add the anti-diagonal identity matrix to the corresponding 4x4 x i block and compute again the DPT. Repeat this step until inequality in step 4 or 8 is satisfied. Continue with next bit. Fig. 1 depicts the block diagram of the embedding algorithm. T is an upper threshold defined for authentication purposes. A range of 0 is selected because the X 4 (4,4) coefficient is changed by 0, when identity or anti-diagonal identity 4x4 matrix is added to the 4x4 block as presented in section. 3.. Extracting Algorithm The hidden may be retrieved by collecting the embedding bit of each 4x4 block. The extracting algorithm is shown in Fig.. The procedure simply reads the S(4,4) DPT coefficient of the 4x4 stego blocks in order to reply 0 or 1 for the hidden. The extracting algorithm is as follows:
4 Step1: Divide each R, G and B component of the stegoimage s into 4x4 non overlapping blocks. Step: For each s i block compute the DPT coefficients, S i. The bits are extracted in the same order as been embedded. Step3: If -0-T<S i (4,4)<T the bit extracted is equal to zero (b i =0). Step4: If T<S i (4,4)<T+0 then b i =1. Step5: Form the hidden from the extracted b i bits. i = i + 1 Extract bi = 0 Stego image s P = (MxN)/16 Divide s into P 4x4 blocks i = 1 Compute Si the DPT of i block -T-0<Si(4,4)>-T i = P Form the hidden Extract bi = 1 T<Si(4,4)>T+0 Tampered Fig.. Block diagram of the extracting algorithm Fig. shows the extracting algorithm, where the decision about extracting 1 or 0 is based on whether coefficient S i (4,4) belongs to the positive [T, T+0] range or the negative [-T-0, -T] range, respectively. If for a block the S i (4,4) coefficient does not satisfy one of the above conditions, then the image is considered as tampered. 4. IMAGE SELF-AUTHENTICATION The general idea is to embed secret data into an original color image so that any attempt to alter the content of the image will also alter the. In order to locate the tampered regions of the image, the hidden is extracted. Then the is compared with the image content and the tampered blocks are located. The extracted restores the content of the tampered image. For that reason the embedded is a scaled version of the image itself. Since the embedding algorithm is designed to be easily destroyed but also able to recover tampered regions, the is reversed. This is made in order to extract the original image from an un-tampered place and by this restore it. The authentication scheme is described latter (Fig. 3) Message preparation The original image is 1:4 scaled to each dimension. This color scaled version or the image is inverted to gray level. That version is denoted as a(h,l), where h=1,,,m/4 and l=1,, N/4, with MxN the original image size. Only the three most significant bits (MSBs) of its pixel values are used to compose the. In this way each pixel of a(h,l) image is embedded into three 4x4 blocks of the original color image. The is embedded in reverse order. For example for the upper left corner block the 3MSB of pixel a(m/4, N/4) is embedded. In this way, the tampered region can be restored by the that is embedded in the non-tampered regions of the image. 4.. Message embedding Embedding procedure takes place after the preparation. The first MSBs of the gray level and scaled version of the original image are embedded into the 4x4 blocks of the original image s R component. The next MSBs are embedded into the 4x4 blocks of the G component and the last MSBs are embedded into the 4x4 blocks of the B component. The embedding procedure is as described in section 3. DPT X(4,4) coefficient is enforced to be in the [T, T+0] or the [-T-0, -T] range, depending on the bit. Threshold T selection is discussed in experimental results Tamper detection At the receiving part the image y(m,n) needs to be searched to check whether it is authentic or has been altered in some way. The tamper detection is performed during the extracting procedure in which the exact tampered position/s is/are located. At the next phase the image is restored. The extracting procedure is performed as described in section 3. Each image s color component is divided into 4x4 non-overlapping blocks. Then DPT is computed and Y(4,4) coefficient is checked. If Y(4,4) [T, T+0], then the extracting bit equals to 1. If Y(4,4) [-T-0, -T], then the extracting bit equals to 0. If neither of the above is true, then the corresponding block is altered and the extracted bit equals to null. The is extracted, reversed and forms the a (h,l). Changes between a (h,l) and a(h,l) identify the tampered locations.
5 RGB to Gray level Threshold in 3MSB Extracting Original Image R G Scale 1:4 B 3 rd MSB nd MSB 1 st MSB Embeding 1 st MSB into R vector nd MSB into G vector 3 rd MSB into B vector Reverse Tamper Tampered image Extracted RGB to Gray level Tamper Detection Threshold in 3MSB Restored image Divide each vector in 4x4 blocks Scale 1:4 Fig. 3. Block diagram of the authentication scheme 4.4. Image restoration In the next step the received image is scaled 1:4 and a gray level version c(h,l) of the received image is produced. Then the 3 MSB of its pixels are compared with a (h,l) extracted image and the changes between the two images define the tampered locations. It is clear that for each tampered region, the extracted image locates two different places that differ from the received. For example let a (i,j) be a destroyed pixel with i [1,M/4] and j [1,N/4]. Then a (i,j) c(i,j), but also a (M/4-i,N/4-j) c(m/4-i,n/4-j), because a (h,l) is reversely embedded. To determine which region is the tampered one, the DPT of the corresponding a (h,l) differences block of the received image y(m,n) is calculated. If Y(4,4) [T, T+0] or Y(4,4) [-T-0, -T], then the block is tampered. For example let a (i,j) differ from the c(i,j) and c(i,j) corresponds to a tampered block. a (i,j) is not embedded into the tampered block but a (M/4-i,N/4-j) is. So the tampered block can be replaced by a (i,j) which represents the original content of the block. In this way the tampered image can be restored. 5. EXPERIMENTAL RESULTS The experiments test the self-authentication method s performance for various block sizes and upper and lower threshold values T. It is important to select the appropriate block size for performance tuning. As mentioned in section, odd block sizes are not preferred because they lead to overflows. Even-sized blocks are preferred because they can obviate overflows. In embedding, when overflows happen, the anti-diagonal identity matrix is subtracted instead of adding the identity matrix. In the case that the image is divided in 4x4 blocks, the maximum possible change to the X(4,4) DPT coefficient is 18*0=560. Testing over ten color images, X(4,4) DPT coefficient has an average minimum value of -700 and average maximum value of 700. Consequently, when overflow occurs, the subtraction of anti-diagonal identity matrix ensures that no underflow occurs. In x blocks the X(,) coefficient is even smaller. In contrary, when odd sized blocks are used, there is no possibility to correct the overflow. The capacity of the proposed scheme is defined as follows P = ( M N)/ t (15) where t is the block size. The algorithm is tested for different block sizes. There is a trade-off between image quality and payload. Experimental results are shown in Fig. 4. It is observed that a block size of 4x4 is an good trade-off between image quality and capacity. Fig. 4. Trade-off between Capacity and PSNR for the Lenna image (56x56) Tests between tampered and non tampered images were performed. For the case of tampered images the extracted image a (h,l) differs from the received image c(h,l). In order to locate the exact tampered locations the selection of threshold T is of paramount importance. If the embedded scheme uses a low T value (e.g. T=0), then the DPT coefficient X i (4,4) of a test image s block i, is near 0. It is very probable for the corresponding tampered block the DPT coefficient Y i (4,4) to be in this range. Consequently, it is not possible to locate the tampered region. Tests for different T values were conducted. The results are shown in Table I and in Fig. 5.
6 TABLE I IMAGE QUALITY OF FRUITS IMAGE FOR DIFFERENT THRESHOLDS FOR 4X4 BLOCK SIZE T PSNR [db] Fig. 5. Experimental results of a tampered image using different thresholds. Fig. 6. Image restoration for different distortions using threshold equal to 100 and 4x4 block size. The tampered images on the upper row and the restored images in the lower row. From Fig.5 we see that when X(4,4) [-80,- 0] [0,80] the method fails to recognize a number of tampered blocks. Less errors are present when X(4,4) [- 100,-80] [80,100]. Of course higher thresholds have better detection results, but image quality is degraded. The proposed self-authentication scheme can restore a wide range of alterations (Fig.6). However, the image content is important in the restoration results. In natural images like that of Fig. 6 where texture is present, the restoration is successful. In other cases, as for example in compound documents, this may result in unexpected failure. For instance, if letters are important to be recovered from a small sized image, then a x embedding version has to be applied, and the 1: scaled image is embedded into itself. 6. CONLUSIONS components of the image. The embedding algorithm takes into account the DPT coefficients of every 4x4 block. The DPT coefficients are forced to be relatively high. In this way the tampered region is located and restored. The drawback of the method is its inability to recover alterations made in the center of the image or when more than one diametrical regions are tampered. This is an issue of future work and improvement. ACKNOWLEDGEMENTS This work was supported by the project PENED (Contract no 03E 83) co-funded by the European Union - European Social Fund (75%), the Greek Government - Ministry of Development - General Secretariat of Research and Technology (5%) and the Private Sector in the frames of the European Competitiveness Programme (Third Community Support Framework). 7. REFERENCES [1] J. Fridrich, M. Goljan, Protection of Digital Images Using Self Embedding, Symposium on Content Security Data Hiding in Digital Media, New Jersey Institute of Technology, Newark, NJ, USA, pp. 1-10, [] M. H. Hassan, S.A.M. Gilani A Fragile Watermarking Scheme for Color Image Authentication, Proc. of World Academy of Science, Engineering and Technology, Vol. 13, pp , 006. [3] C-Y. Lin, S-F. Chang, Semi-fragile Watermarking for Authenticating JPEG Visual Content, Proc. SPIE international Conf. on Security and Watermarking of Multimedia Contents II, vol.3971, San Jose, Calif. USA, 000. [4] J. Wang, S. Lian, G. Liu, Y. Dai, Z. Liu, Z. Ren, Secure Multimedia Watermarking Authentication in Wavelet Domain, Journal of Electronic Imaging, 17(3), July 008. [5] M. F. Aburdene and T. J. Goodman, The Discrete Pascal Transform and its Applications, IEEE Signal Processing Letters, Vol.1,.7, pp , July 005. [6] H. Kostopoulos, S. Kandiliotis, I. Kostopoulos, M. Xenos A Digital Image Watermarking Technique Using Modulated Pascal s Triangles, IASTED International Conf. Signal Processing, Pattern Recognition & Applications, pp8-86, Rhodes, Greece, 003. [7] A.N. Skodras, Efficient Computation of the Discrete Pascal Transform, Proceedings of the 14 th European Signal Processing Conference (EUSIPCO 006), Florence, Italy, Sept [8] T.J. Goodman, M.F. Aburdene, On the Pascal Transform and Threshold Selection, Proc. 41 st Annual Conf. on Information Sciences and Systems (CiSS 07), pp , Baltimore, MD, March 007. A self-authentication scheme is proposed that is able to distinguish tampered regions in a modified image and restore the original one. This is implemented by embedding the 3 MSB of the scaled gray level version of the original image. Each MSB is embedded into one of the color
Chaotic-Correlation Based Watermarking Scheme for Still Images
Chaotic-Correlation Based Watermarking Scheme for Still Images E. Chrysochos 1, V. Fotopoulos 1, M. Xenos 1, M. Stork 2, A. N. Skodras 1, J. Hrusak 2 1 Digital Systems & Media Computing Laboratory, School
More informationROBUST WATERMARKING OF DIGITAL IMAGES BASED ON CHAOTIC MAPPING AND DCT
ROBUST WATERMARKING OF DIGITAL IMAGES BASED ON CHAOTIC MAPPING AND DCT E. Chrysochos, V. Fotopoulos, and A. N. Skodras Digital Systems & Media Computing Laboratory, School of Science and Technology, Hellenic
More informationDIGITAL WATERMARKING FOR GRAY-LEVEL WATERMARKS
DICTA22: Digital Image Computing Techniques and Applications, 2 22 January 22, Melbourne, Australia. DIGITAL WATERMARKING FOR GRAY-LEVEL WATERMARKS *Yuk Ying CHUNG, Man To WONG *Basser Department of Computer
More informationComparison of Digital Image Watermarking Algorithms. Xu Zhou Colorado School of Mines December 1, 2014
Comparison of Digital Image Watermarking Algorithms Xu Zhou Colorado School of Mines December 1, 2014 Outlier Introduction Background on digital image watermarking Comparison of several algorithms Experimental
More informationIMPROVED RHOMBUS INTERPOLATION FOR REVERSIBLE WATERMARKING BY DIFFERENCE EXPANSION. Catalin Dragoi, Dinu Coltuc
0th European Signal Processing Conference (EUSIPCO 01) Bucharest, Romania, August 7-31, 01 IMPROVED RHOMBUS INTERPOLATION FOR REVERSIBLE WATERMARKING BY DIFFERENCE EXPANSION Catalin Dragoi, Dinu Coltuc
More informationCHAPTER 4 REVERSIBLE IMAGE WATERMARKING USING BIT PLANE CODING AND LIFTING WAVELET TRANSFORM
74 CHAPTER 4 REVERSIBLE IMAGE WATERMARKING USING BIT PLANE CODING AND LIFTING WAVELET TRANSFORM Many data embedding methods use procedures that in which the original image is distorted by quite a small
More informationA Flexible Scheme of Self Recovery for Digital Image Protection
www.ijcsi.org 460 A Flexible Scheme of Self Recoery for Digital Image Protection Zhenxing Qian, Lili Zhao 2 School of Communication and Information Engineering, Shanghai Uniersity, Shanghai 200072, China
More informationMultilayer Data Embedding Using Reduced Difference Expansion
Multilayer Data Embedding Using Reduced Difference Expansion DINESH SATRE 1, DEVYANI BONDE 2, SUBHASH RATHOD 3 Department Of Computer Engineering Marathwada Mitra Mandal s Institute of Technology Savitribai
More informationA NEW ROBUST IMAGE WATERMARKING SCHEME BASED ON DWT WITH SVD
A NEW ROBUST IMAGE WATERMARKING SCHEME BASED ON WITH S.Shanmugaprabha PG Scholar, Dept of Computer Science & Engineering VMKV Engineering College, Salem India N.Malmurugan Director Sri Ranganathar Institute
More informationImage Authentication and Recovery Scheme Based on Watermarking Technique
Image Authentication and Recovery Scheme Based on Watermarking Technique KENJI SUMITOMO 1, MARIKO NAKANO 2, HECTOR PEREZ 2 1 Faculty of Information and Computer Engineering The University of Electro-Communications
More informationDigital Image Steganography Techniques: Case Study. Karnataka, India.
ISSN: 2320 8791 (Impact Factor: 1.479) Digital Image Steganography Techniques: Case Study Santosh Kumar.S 1, Archana.M 2 1 Department of Electronicsand Communication Engineering, Sri Venkateshwara College
More informationII. RELATIVE WORK The earlier watermarking techniques were proposed for data hiding applications only [2, 7]. Then, the authentication capability beca
ROI based Tamper Detection and Recovery for Medical Images Using Reversible Watermarking Technique Osamah M. Al-Qershi, Bee Ee Khoo School of Electrical and Electronic Engineering Universiti Sains Malaysia
More informationA Secure Semi-Fragile Watermarking Scheme for Authentication and Recovery of Images based on Wavelet Transform
A Secure Semi-Fragile Watermarking Scheme for Authentication and Recovery of Images based on Wavelet Transform Rafiullah Chamlawi, Asifullah Khan, Adnan Idris, and Zahid Munir Abstract Authentication of
More informationSECURE SEMI-FRAGILE WATERMARKING FOR IMAGE AUTHENTICATION
SECURE SEMI-FRAGILE WATERMARKING FOR IMAGE AUTHENTICATION Chuhong Fei a, Raymond Kwong b, and Deepa Kundur c a A.U.G. Signals Ltd., 73 Richmond St. W, Toronto, ON M4H 4E8 Canada b University of Toronto,
More informationDigital Image Watermarking Using DWT and SLR Technique Against Geometric Attacks
Digital Image Watermarking Using DWT and SLR Technique Against Geometric Attacks Sarvesh Kumar Yadav, Mrs. Shital Gupta, Prof. Vineet richariya Abstract- Now days digital watermarking is very popular field
More informationA Novel Fast Self-restoration Semi-fragile Watermarking Algorithm for Image Content Authentication Resistant to JPEG Compression
A Novel Fast Self-restoration Semi-fragile Watermarking Algorithm for Image Content Authentication Resistant to JPEG Compression Hui Wang, Anthony TS Ho and Xi Zhao 24 th October 2011 Outline Background
More informationA reversible data hiding based on adaptive prediction technique and histogram shifting
A reversible data hiding based on adaptive prediction technique and histogram shifting Rui Liu, Rongrong Ni, Yao Zhao Institute of Information Science Beijing Jiaotong University E-mail: rrni@bjtu.edu.cn
More informationA Revisit to LSB Substitution Based Data Hiding for Embedding More Information
A Revisit to LSB Substitution Based Data Hiding for Embedding More Information Yanjun Liu 1,, Chin-Chen Chang 1, and Tzu-Yi Chien 2 1 Department of Information Engineering and Computer Science, Feng Chia
More informationNo Reference Medical Image Quality Measurement Based on Spread Spectrum and Discrete Wavelet Transform using ROI Processing
No Reference Medical Image Quality Measurement Based on Spread Spectrum and Discrete Wavelet Transform using ROI Processing Arash Ashtari Nakhaie, Shahriar Baradaran Shokouhi Iran University of Science
More informationHigh Capacity Reversible Watermarking Scheme for 2D Vector Maps
Scheme for 2D Vector Maps 1 Information Management Department, China National Petroleum Corporation, Beijing, 100007, China E-mail: jxw@petrochina.com.cn Mei Feng Research Institute of Petroleum Exploration
More informationAN EFFICIENT VIDEO WATERMARKING USING COLOR HISTOGRAM ANALYSIS AND BITPLANE IMAGE ARRAYS
AN EFFICIENT VIDEO WATERMARKING USING COLOR HISTOGRAM ANALYSIS AND BITPLANE IMAGE ARRAYS G Prakash 1,TVS Gowtham Prasad 2, T.Ravi Kumar Naidu 3 1MTech(DECS) student, Department of ECE, sree vidyanikethan
More informationData Hiding in Video
Data Hiding in Video J. J. Chae and B. S. Manjunath Department of Electrical and Computer Engineering University of California, Santa Barbara, CA 9316-956 Email: chaejj, manj@iplab.ece.ucsb.edu Abstract
More informationMultiple Binary Images Watermarking in Spatial and Frequency Domains
Multiple Binary Images Watermarking in Spatial and Frequency Domains K.Ganesan 1 and Tarun Kumar Guptha 2 1 Director, TIFAC-CORE in Automotive Infotronics and Senior Professor, School of Information Technology
More informationHybrid Stegnography using ImagesVaried PVD+ LSB Detection Program
www.ijecs.in International Journal Of Engineering And Computer Science ISSN:2319-7242 Volume 4 Issue 5 May 2015, Page No. 12086-12090 Hybrid Stegnography using ImagesVaried PVD+ LSB Detection Program Shruti
More informationA Reversible Data Hiding Scheme for BTC- Compressed Images
IJACSA International Journal of Advanced Computer Science and Applications, A Reversible Data Hiding Scheme for BTC- Compressed Images Ching-Chiuan Lin Shih-Chieh Chen Department of Multimedia and Game
More informationNon-fragile High quality Reversible Watermarking for Compressed PNG image format using Haar Wavelet Transforms and Constraint Difference Expansions
Non-fragile High quality Reversible Watermarking for Compressed PNG image format using Haar Wavelet Transforms and Constraint Difference Expansions Junkyu Park Department of Cyber Security, Sangmyung University,
More informationMoment-preserving Based Watermarking for Color Image Authentication and Recovery
2012 IACSIT Hong Kong Conferences IPCSIT vol. 30 (2012) (2012) IACSIT Press, Singapore Moment-preserving Based Watermarking for Color Image Authentication and Recovery Kuo-Cheng Liu + Information Educating
More informationRobust Image Watermarking based on DCT-DWT- SVD Method
Robust Image Watermarking based on DCT-DWT- SVD Sneha Jose Rajesh Cherian Roy, PhD. Sreenesh Shashidharan ABSTRACT Hybrid Image watermarking scheme proposed based on Discrete Cosine Transform (DCT)-Discrete
More informationAn Efficient Self-Embedding Watermarking Scheme for Colour Image Tamper Detection and Recovery
Available Online at www.ijcsmc.com International Journal of Computer Science and Mobile Computing A Monthly Journal of Computer Science and Information Technology IJCSMC, Vol. 4, Issue. 1, January 2015,
More informationAN IMPROVISED LOSSLESS DATA-HIDING MECHANISM FOR IMAGE AUTHENTICATION BASED HISTOGRAM MODIFICATION
AN IMPROVISED LOSSLESS DATA-HIDING MECHANISM FOR IMAGE AUTHENTICATION BASED HISTOGRAM MODIFICATION Shaik Shaheena 1, B. L. Sirisha 2 VR Siddhartha Engineering College, Vijayawada, Krishna, Andhra Pradesh(520007),
More informationComparison of Wavelet Based Watermarking Techniques for Various Attacks
International Journal of Engineering and Technical Research (IJETR) ISSN: 2321-0869, Volume-3, Issue-4, April 2015 Comparison of Wavelet Based Watermarking Techniques for Various Attacks Sachin B. Patel,
More informationFRAGILE WATERMARKING USING SUBBAND CODING
ICCVG 2002 Zakopane, 25-29 Sept. 2002 Roger ŚWIERCZYŃSKI Institute of Electronics and Telecommunication Poznań University of Technology roger@et.put.poznan.pl FRAGILE WATERMARKING USING SUBBAND CODING
More informationRobust Image Watermarking based on Discrete Wavelet Transform, Discrete Cosine Transform & Singular Value Decomposition
Advance in Electronic and Electric Engineering. ISSN 2231-1297, Volume 3, Number 8 (2013), pp. 971-976 Research India Publications http://www.ripublication.com/aeee.htm Robust Image Watermarking based
More informationA Semi-Fragile Watermarking Scheme for Color Image Authentication
A Semi-Fragile Watermarking Scheme for Color Image Authentication M. Hamad Hassan and S.A.M. Gilani Abstract In this paper, a semi-fragile watermarking scheme is proposed for color image authentication.
More informationAbstract. Keywords: Genetic Algorithm, Mean Square Error, Peak Signal to noise Ratio, Image fidelity. 1. Introduction
A Report on Genetic Algorithm based Steganography for Image Authentication by Amrita Khamrui Enrolled Scholar Department of Computer Science & Engineering, Kalyani University Prof. (Dr.) J K Mandal Professor
More informationRobust DWT Based Technique for Digital Watermarking
Robust DWT Based Technique for Digital Watermarking Mamta Jain Department of Electronics & Communication Institute of Engineering & Technology Alwar er.mamtajain@gmail.com Abstract Hiding the information
More informationRobust Lossless Image Watermarking in Integer Wavelet Domain using SVD
Robust Lossless Image Watermarking in Integer Domain using SVD 1 A. Kala 1 PG scholar, Department of CSE, Sri Venkateswara College of Engineering, Chennai 1 akala@svce.ac.in 2 K. haiyalnayaki 2 Associate
More informationAuthentication and Secret Message Transmission Technique Using Discrete Fourier Transformation
, 2009, 5, 363-370 doi:10.4236/ijcns.2009.25040 Published Online August 2009 (http://www.scirp.org/journal/ijcns/). Authentication and Secret Message Transmission Technique Using Discrete Fourier Transformation
More informationRandom Traversing Based Reversible Data Hiding Technique Using PE and LSB
Random Traversing Based Reversible Data Hiding Technique Using PE and LSB Rhythm Katira #1, Prof. V. Thanikaiselvan *2 # ECE Department, VIT University Vellore, Tamil-Nadu, India 1 rhythm.katira2009@vit.ac.in
More informationCombined Hashing/Watermarking Method for Image Authentication
Combined Hashing/Watermarking Method for Image Authentication Vlado Kitanovski, Dimitar Taskovski, and Sofija Bogdanova Abstract In this paper we present a combined hashing/watermarking method for image
More informationA Robust Color Image Watermarking Using Maximum Wavelet-Tree Difference Scheme
A Robust Color Image Watermarking Using Maximum Wavelet-Tree ifference Scheme Chung-Yen Su 1 and Yen-Lin Chen 1 1 epartment of Applied Electronics Technology, National Taiwan Normal University, Taipei,
More informationReversible Data Hiding VIA Optimal Code for Image
Vol. 3, Issue. 3, May - June 2013 pp-1661-1665 ISSN: 2249-6645 Reversible Data Hiding VIA Optimal Code for Image Senthil Rani D. #, Gnana Kumari R. * # PG-Scholar, M.E-CSE, Coimbatore Institute of Engineering
More informationSemi-fragile Watermarking for Video Content Authentication Based on Hybrid Feature
Semi-fragile Watermarking for Video Content Authentication Based on Hybrid Feature Chen Ling 1, 2 Wenjun Zhang 1 1 School of Film and Television Technology, Shanghai University Shanghai 200072, Shanghai,
More informationReversible Data Hiding Based on Median Difference Histogram
JOURNAL OF INFORMATION SCIENCE AND ENGINEERING 27, 577-593 (2011) Reversible Data Hiding Based on Median Difference Histogram HSIEN-WEI YANG 1,2, I-EN LIAO * AND CHAUR-CHIN CHEN + 1 Department of Information
More informationHierarchical Image Authentication Based on Reversible Data Hiding
1 Bull. Soc. Photogr. Imag. Japan. (2014) Vol. 24 No. 1: 1 5 Original Paper Hierarchical Image Authentication Based on Reversible Data Hiding Shoko Imaizumi * and Kanichi Taniguchi * Abstract: In this
More informationA New Approach to Compressed Image Steganography Using Wavelet Transform
IOSR Journal of Computer Engineering (IOSR-JCE) e-issn: 2278-0661,p-ISSN: 2278-8727, Volume 17, Issue 5, Ver. III (Sep. Oct. 2015), PP 53-59 www.iosrjournals.org A New Approach to Compressed Image Steganography
More informationAnalysis of Robustness of Digital Watermarking Techniques under Various Attacks
International Journal of Engineering Research and Development e-issn : 2278-067X, p-issn : 2278-800X, www.ijerd.com Volume 2, Issue 6 (August 2012), PP. 28-34 Analysis of Robustness of Digital Watermarking
More informationError-free Authentication Watermarking Based on Prediction-Error-Expansion Reversible Technique
ISSC 2013, LYIT Letterkenny, June 20 21 Error-free Authentication Watermarking Based on Prediction-Error-Expansion Reversible Technique Rongrong Ni,H.D.Cheng, Yao Zhao andyuhou Institute of Information
More informationResearch Article A Novel Steganalytic Algorithm based on III Level DWT with Energy as Feature
Research Journal of Applied Sciences, Engineering and Technology 7(19): 4100-4105, 2014 DOI:10.19026/rjaset.7.773 ISSN: 2040-7459; e-issn: 2040-7467 2014 Maxwell Scientific Publication Corp. Submitted:
More informationA Survey of Fragile Watermarking-based Image Authentication Techniques
Journal of Information Hiding and Multimedia Signal Processing c 2016 ISSN 2073-4212 Ubiquitous International Volume 7, Number 6, November 2016 A Survey of Fragile Watermarking-based Image Authentication
More informationImproved Qualitative Color Image Steganography Based on DWT
Improved Qualitative Color Image Steganography Based on DWT 1 Naresh Goud M, II Arjun Nelikanti I, II M. Tech student I, II Dept. of CSE, I, II Vardhaman College of Eng. Hyderabad, India Muni Sekhar V
More informationDigital Watermarking with Copyright Authentication for Image Communication
Digital Watermarking with Copyright Authentication for Image Communication Keta Raval Dept. of Electronics and Communication Patel Institute of Engineering and Science RGPV, Bhopal, M.P., India ketaraval@yahoo.com
More informationReversible Image Data Hiding with Local Adaptive Contrast Enhancement
Reversible Image Data Hiding with Local Adaptive Contrast Enhancement Ruiqi Jiang, Weiming Zhang, Jiajia Xu, Nenghai Yu and Xiaocheng Hu Abstract Recently, a novel reversible data hiding scheme is proposed
More informationInternational Journal of Innovative Research in Computer and Communication Engineering
Data Hiding Using Difference Expension Method YASMEEN M.G,RAJALAKSHMI G Final year M.E, Arunai Engineering College, Thiruvannamalai, Tamilnadu, India Assistant Professor, Arunai Engineering College,Thiruvannamalai,
More informationReversible Blind Watermarking for Medical Images Based on Wavelet Histogram Shifting
Reversible Blind Watermarking for Medical Images Based on Wavelet Histogram Shifting Hêmin Golpîra 1, Habibollah Danyali 1, 2 1- Department of Electrical Engineering, University of Kurdistan, Sanandaj,
More informationMultipurpose Color Image Watermarking Algorithm Based on IWT and Halftoning
Multipurpose Color Image Watermarking Algorithm Based on IWT and Halftoning C. SANTIAGO-AVILA, M. GONZALEZ LEE, M. NAKANO-MIYATAKE, H. PEREZ-MEANA Sección de Posgrado e Investigación, Esime Culhuacan Instituto
More informationA SEMI-FRAGILE WATERMARKING SCHEME FOR IMAGE TAMPER LOCALIZATION AND RECOVERY
Journal of Theoretical Applied nformation Technology 31 August 2012 Vol 42 No2 2005-2012 JATT & LLS All rights reserved SSN: 1992-8645 wwwjatitorg E-SSN: 1817-3195 A SEM-FRAGLE WATERMARNG SCHEME FOR MAGE
More informationDOI: /jos Tel/Fax: by Journal of Software. All rights reserved. , )
ISSN 1000-9825, CODEN RUXUEW E-mail: jos@iscasaccn Journal of Software, Vol17, No2, February 2006, pp315 324 http://wwwjosorgcn DOI: 101360/jos170315 Tel/Fax: +86-10-62562563 2006 by Journal of Software
More informationFeature Based Watermarking Algorithm by Adopting Arnold Transform
Feature Based Watermarking Algorithm by Adopting Arnold Transform S.S. Sujatha 1 and M. Mohamed Sathik 2 1 Assistant Professor in Computer Science, S.T. Hindu College, Nagercoil, Tamilnadu, India 2 Associate
More informationComparison of wavelet based watermarking techniques Using SVD
Comparison of wavelet based watermarking techniques Using SVD Prof.T.Sudha Department of Computer Science Vikrama Simhapuri University Nellore. Email- thatimakula_sudha@yahoo.com Ms. K. Sunitha Head, P.G
More informationRobust biometric image watermarking for fingerprint and face template protection
Robust biometric image watermarking for fingerprint and face template protection Mayank Vatsa 1, Richa Singh 1, Afzel Noore 1a),MaxM.Houck 2, and Keith Morris 2 1 West Virginia University, Morgantown,
More informationAn Improved DCT Based Color Image Watermarking Scheme Xiangguang Xiong1, a
International Symposium on Mechanical Engineering and Material Science (ISMEMS 2016) An Improved DCT Based Color Image Watermarking Scheme Xiangguang Xiong1, a 1 School of Big Data and Computer Science,
More informationA Fragile Watermarking Scheme for Color Image Authentication
A Fragile Watermarking Scheme for Color Image Authentication M. Hamad Hassan, and S.A.M. Gilani Abstract In this paper, a fragile watermarking scheme is proposed for color image specified object s authentication.
More informationMrs. Vandana Assistant Professor (Dept. of Computer Science and Engg.) Hindu College of Engineering, Sonepat, Haryana, India
Volume 3, Issue 7, July 2013 ISSN: 2277 128X International Journal of Advanced Research in Computer Science and Software Engineering Research Paper Available online at: www.ijarcsse.com Modified Approach
More informationRobust Lossless Data Hiding. Outline
Robust Lossless Data Hiding Yun Q. Shi, Zhicheng Ni, Nirwan Ansari Electrical and Computer Engineering New Jersey Institute of Technology October 2010 1 Outline What is lossless data hiding Existing robust
More informationSCALED WAVELET TRANSFORM VIDEO WATERMARKING METHOD USING HYBRID TECHNIQUE: SWT-SVD-DCT
SCALED WAVELET TRANSFORM VIDEO WATERMARKING METHOD USING HYBRID TECHNIQUE: SWT- Shaveta 1, Daljit Kaur 2 1 PG Scholar, 2 Assistant Professor, Dept of IT, Chandigarh Engineering College, Landran, Mohali,
More informationarxiv: v1 [cs.cr] 31 Dec 2018
Security analysis of a self-embedding fragile image watermark scheme Xinhui Gong, Feng Yu, Xiaohong Zhao, Shihong Wang School of Science, Beijing University of Posts and Telecommunications, Beijing 100876,
More informationA Robust Image Watermarking Scheme using Image Moment Normalization
A Robust Image ing Scheme using Image Moment Normalization Latha Parameswaran, and K. Anbumani Abstract Multimedia security is an incredibly significant area of concern. A number of papers on robust digital
More informationReversible Watermarking in JPEG Images Based on Modified RZL Codes and Histogram Shift
203, Vol.8 No.2, 26-32 Article ID 007-202(203)02-026-07 DOI 0.007/s859-03-0904- Reversible Watermarking in JPEG Images Based on Modified RZL Codes and Histogram Shift CHEN Biao, ZHANG Weiming,2, YU Nenghai.
More informationA Novel Secure Digital Watermark Generation from Public Share by Using Visual Cryptography and MAC Techniques
Bashar S. Mahdi Alia K. Abdul Hassan Department of Computer Science, University of Technology, Baghdad, Iraq A Novel Secure Digital Watermark Generation from Public Share by Using Visual Cryptography and
More informationA CRYPTOGRAPHICALLY SECURE IMAGE WATERMARKING SCHEME
A CRYPTOGRAPHICALLY SECURE IMAGE WATERMARKING SCHEME Jian Ren Tongtong Li Department of Electrical and Computer Engineering Michigan State University East Lansing, MI 48824-1226 Email: {renjian,tongli}@egr.msu.edu
More informationLeast Significant Bit (LSB) and Discrete Cosine Transform (DCT) based Steganography
Least Significant Bit (LSB) and Discrete Cosine Transform (DCT) based Steganography Smruti Ranjan Gouda (Dept. Of computer Science & Engineering, Asst. Professor, Gandhi Group of institutions, Berhampur,
More informationChaos-based Modified EzStego Algorithm for Improving Security of Message Hiding in GIF Image
015 International Conference on Computer, Control, Informatics and Its Applications Chaos-based Modified EzStego Algorithm for Improving Security of Message Hiding in GIF Image Rinaldi Munir Informatics
More informationMr Mohan A Chimanna 1, Prof.S.R.Khot 2
Digital Video Watermarking Techniques for Secure Multimedia Creation and Delivery Mr Mohan A Chimanna 1, Prof.S.R.Khot 2 1 Assistant Professor,Department of E&Tc, S.I.T.College of Engineering, Yadrav,Maharashtra,
More informationREVERSIBLE DATA HIDING SCHEME BASED ON PREDICTION ERROR SORTING AND DOUBLE PREDICTION.
REVERSIBLE DATA HIDING SCHEME BASED ON PREDICTION ERROR SORTING AND DOUBLE PREDICTION Ling-ling WAN 1,Fan CHEN 1, Hong-jie HE 1,Lei ZHANG 2 1 the School of Information Science and Technology, Southwest
More informationQR Code Watermarking Algorithm based on Wavelet Transform
2013 13th International Symposium on Communications and Information Technologies (ISCIT) QR Code Watermarking Algorithm based on Wavelet Transform Jantana Panyavaraporn 1, Paramate Horkaew 2, Wannaree
More informationAn Information Hiding Scheme Based on Pixel- Value-Ordering and Prediction-Error Expansion with Reversibility
An Information Hiding Scheme Based on Pixel- Value-Ordering Prediction-Error Expansion with Reversibility Ching-Chiuan Lin Department of Information Management Overseas Chinese University Taichung, Taiwan
More informationAn Efficient Watermarking Algorithm Based on DWT and FFT Approach
An Efficient Watermarking Algorithm Based on DWT and FFT Approach S.Manikanda prabu Assistant Professor, Department of CSE, Tamilnadu College of Engineering, Coimbatore, India smaniprabume@gmail.com Dr.S.Ayyasamy
More informationReversible Authentication Watermark for Image
Reversible Authentication Watermark for Image Xiaoping Liang, Student Member, IEEE Abstract Reversible (invertible, lossless) authentication draws much attention recently for its ability to restore the
More informationA Digital Video Watermarking Algorithm Based on LSB and DCT
A Digital Video Watermarking Algorithm Based on LSB and DCT Kirti Jain, U.S.N Raju Department of Computer Science and Engineering NIT Warangal India kirtijain.kj@gmail.com,usnraju@gmail.com ABSTRACT: In
More informationReduced Time Complexity for Detection of Copy-Move Forgery Using Discrete Wavelet Transform
Reduced Time Complexity for of Copy-Move Forgery Using Discrete Wavelet Transform Saiqa Khan Computer Engineering Dept., M.H Saboo Siddik College Of Engg., Mumbai, India Arun Kulkarni Information Technology
More informationEnhancing the Image Compression Rate Using Steganography
The International Journal Of Engineering And Science (IJES) Volume 3 Issue 2 Pages 16-21 2014 ISSN(e): 2319 1813 ISSN(p): 2319 1805 Enhancing the Image Compression Rate Using Steganography 1, Archana Parkhe,
More informationI. Introduction. II Integer-To-Integer Wavelet Transforms
Reversible Image Data Hiding Using Lifting Wavelet Transform and Histogram Shifting S. Kurshid Jinna Dr. L. Ganesan Professor, Dept of Computer Science & Engineering Professor, Dept of Computer Science
More informationEfficient Image Steganography Using Integer Wavelet Transform
Efficient Image Steganography Using Integer Wavelet Transform DHIVYA DHARSHINI. K 1, Dr. K. ANUSDHA 2 1 M.Tech, Department of Electronics Engineering, Pondicherry University, Puducherry, India. 2 Assistant
More informationAnalysis of Information Hiding Techniques in HEVC.
Analysis of Information Hiding Techniques in HEVC. Multimedia Processing EE 5359 spring 2015 Advisor: Dr. K. R. Rao Department of Electrical Engineering University of Texas, Arlington Rahul Ankushrao Kawadgave
More informationSpeech Modulation for Image Watermarking
Speech Modulation for Image Watermarking Mourad Talbi 1, Ben Fatima Sira 2 1 Center of Researches and Technologies of Energy, Tunisia 2 Engineering School of Tunis, Tunisia Abstract Embedding a hidden
More informationSPEECH WATERMARKING USING DISCRETE WAVELET TRANSFORM, DISCRETE COSINE TRANSFORM AND SINGULAR VALUE DECOMPOSITION
SPEECH WATERMARKING USING DISCRETE WAVELET TRANSFORM, DISCRETE COSINE TRANSFORM AND SINGULAR VALUE DECOMPOSITION D. AMBIKA *, Research Scholar, Department of Computer Science, Avinashilingam Institute
More informationImage Error Concealment Based on Watermarking
Image Error Concealment Based on Watermarking Shinfeng D. Lin, Shih-Chieh Shie and Jie-Wei Chen Department of Computer Science and Information Engineering,National Dong Hwa Universuty, Hualien, Taiwan,
More informationA DWT, DCT AND SVD BASED WATERMARKING TECHNIQUE TO PROTECT THE IMAGE PIRACY
A DWT, DCT AND SVD BASED WATERMARKING TECHNIQUE TO PROTECT THE IMAGE PIRACY Md. Maklachur Rahman 1 1 Department of Computer Science and Engineering, Chittagong University of Engineering and Technology,
More informationImplementation of ContourLet Transform For Copyright Protection of Color Images
Implementation of ContourLet Transform For Copyright Protection of Color Images * S.janardhanaRao,** Dr K.Rameshbabu Abstract In this paper, a watermarking algorithm that uses the wavelet transform with
More informationJeff Hinson CS525, Spring 2010
DIGITAL WATERMARKING Jeff Hinson CS525, Spring 2010 Outline Introduction Challenges Algorithms / Methods Detection Existing Programs Lessons Learned / Conclusion Questions Jeff Hinson CS525 Slide #1 Introduction
More informationIntroduction to Visible Watermarking. IPR Course: TA Lecture 2002/12/18 NTU CSIE R105
Introduction to Visible Watermarking IPR Course: TA Lecture 2002/12/18 NTU CSIE R105 Outline Introduction State-of of-the-art Characteristics of Visible Watermarking Schemes Attacking Visible Watermarking
More informationFidelity Analysis of Additive and Multiplicative Watermarked Images in Integrated Domain
IOSR Journal of Computer Engineering (IOSR-JCE) e-issn: 2278-0661,p-ISSN: 2278-8727, Volume 16, Issue 5, Ver. III (Sep Oct. 2014), PP 36-41 Fidelity Analysis of Additive and Multiplicative Watermarked
More informationDigital Image Watermarking Scheme Based on LWT and DCT
Digital Image ing Scheme Based on LWT and Amy Tun and Yadana Thein Abstract As a potential solution to defend unauthorized replication of digital multimedia objects, digital watermarking technology is
More informationInterleaving Max-Min Difference Histogram Shifting Data Hiding Method
JOURNAL OF SOFTWARE, VOL. 5, NO. 6, JUNE 2010 615 Interleaving Max-Min Difference Histogram Shifting Data Hiding Method Hsien-Wei Yang Overseas Chinese University/Department of Information Management,
More informationResearch Article Improvements in Geometry-Based Secret Image Sharing Approach with Steganography
Hindawi Publishing Corporation Mathematical Problems in Engineering Volume 2009, Article ID 187874, 11 pages doi:10.1155/2009/187874 Research Article Improvements in Geometry-Based Secret Image Sharing
More informationA new robust watermarking scheme based on PDE decomposition *
A new robust watermarking scheme based on PDE decomposition * Noura Aherrahrou University Sidi Mohamed Ben Abdellah Faculty of Sciences Dhar El mahraz LIIAN, Department of Informatics Fez, Morocco Hamid
More informationUser-Friendly Sharing System using Polynomials with Different Primes in Two Images
User-Friendly Sharing System using Polynomials with Different Primes in Two Images Hung P. Vo Department of Engineering and Technology, Tra Vinh University, No. 16 National Road 53, Tra Vinh City, Tra
More informationRegion Based Even Odd Watermarking Method With Fuzzy Wavelet
Region Based Even Odd Watermarking Method With Fuzzy Wavelet S.Maruthuperumal 1, G.Rosline Nesakumari 1, Dr.V.Vijayakumar 2 1 Research Scholar, Dr.MGR University Chennai. Associate Professor, GIET Rajahmundry,
More informationHigh Capacity Data Hiding Scheme for DCT-based Images
Journal of Information Hiding and Multimedia Signal Processing c 010 ISSN 073-41 Ubiquitous International Volume 1, Number 3, July 010 High Capacity Data Hiding Scheme for DCT-based Images Chia-Chen Lin
More information