A New Concept of Security Camera Monitoring. With Privacy Protection by Masking Moving. Objects
|
|
- Polly Pitts
- 6 years ago
- Views:
Transcription
1 A New Concept of Security Camera Monitoring With Privacy Protection by Masking Moving Objects Kenichi YABUTA, Hitoshi KITAZAWA, and Toshihisa TANAKA Department of Electrical and Electronic Engineering Tokyo University of Agriculture and Technology Naka-cho, Koganei-shi, Tokyo, Japan y @gc.tuat.ac.jp, kitazawa@cc.tuat.ac.jp, tanakat@cc.tuat.ac.jp Abstract. We present a novel framework for encoding images obtained by a security monitoring camera with protecting the privacy of moving objects in the images. We are motivated by the fact that although security monitoring cameras can deter crimes, they may infringe the privacy of those who and objects which are recorded by the cameras. Moving objects, whose privacy should be protected, in an input image (recorded by a monitoring camera) are encrypted and hidden in a JPEG bitstream. Therefore, a normal JPEG viewer generates a masked image, where the moving objects are unrecognizable or completely invisible. Only a special viewer with a password can reconstruct the original recording. Data hiding is achieved by watermarking and encrypting with the advanced encryption standard (AES). We illustrate a concept of our framework and an algorithm of the encoder and the special viewer. Moreover, we
2 2 Kenichi YABUTA, Hitoshi KITAZAWA, and Toshihisa TANAKA show an implementation example. Keyword: privacy protection, security camera, watermarking, JPEG encoding 1 Introduction Recently, a large number of security monitoring cameras are set up to deter and investigate crimes. With the increase of these monitoring cameras, how to protect the privacy of recorded objects such as people, cars, and so on is becoming a major problem. Monitoring cameras record not only criminals but also general people, who may not be aware that they are monitored. Moreover, the recorded images can probably be distributed without any permission by these monitored people. Therefore, we should establish a framework for security monitoring which considers the privacy protection. A simple way to do this is to deteriorate the quality of moving objects. Based on this idea, a non-reversible method which decreases the resolution of objects whose privacy should be protected has been proposed in [1] and [2]. These strategy can make moving objects unrecognizable and still keep the nature of a moving object, that is, we can distinguish whether the moving object is a man, a car, or something else. However, the non-reversible processing loses details of the objects such as human faces, number plates of cars, etc. This implies that the reliability of monitoring cameras for security purpose can be reduced by this deterioration. In other words, if a face image of a criminal, for example, is even
3 Security Camera Privacy Protection 3 slightly destroyed, we may not be able to specify this criminal. In [3], a concept of the reversible method has been proposed. This method can display images with privacies protected or unprotected. However, this system needs a special system when the system reconstructs images as well as it displays images in which the privacy is protected. In this paper, therefore, we propose a new framework for encoding images recorded by security monitoring cameras. In this framework, an encoder generates a bitstream which gives a masked image when a normal JPEG [9] viewer is used for decoding, and a special viewer is needed to reconstruct an input image. In the masked image decoded by a normal viewer, moving objects in an input image are scrambled or erased, so that the privacy of the moving objects can be protected. A special viewer with a password decrypts the moving objects embedded in the bitstream and then reconstructs the input image. Therefore, even if recorded images taken by monitoring cameras are distributed, the objects are unrecognizable, as long as normal JPEG viewers are used. The rest of this paper is organized as what follows. In Section 2, we clarify requirements which security monitoring cameras satisfy. In Sections 3 and 4, we propose algorithms which implement our new concept. In Section 3, we describe a method of masking and in Section 4, we show how to embed moving objects in a JPEG bitstream by using watermarking [8]. In Section 5, we show experimantal results and discuss about the results. Section 6 concludes our work and mentions open problems.
4 4 Kenichi YABUTA, Hitoshi KITAZAWA, and Toshihisa TANAKA Radiance I = 0.30R G B (1) 0 Average MEN = lp (l) (2) Dispersion VAR = (l MEN) 2 P (l) (3) Privacy Protection in an Image Obtained by Security Monitoring We can classify images into two regions, moving object regions and background regions. Moving object regions are defined as regions including moving objects extracted from the input image by the moving object extraction process [4], [5], [6], [7]. Background regions are defined as regions except the moving object regions. People and cars passing by are extracted as moving objects. If the moving object regions are made invisible or unrecognizable, their privacy can be protected. Moreover, the input image with the moving objects should be reconstructed when it is needed for certain reasons, such as, crime investigation. Although we should preserve the quality of the moving object regions as well as possible, we can reduce the amount of information of the background, because we are more interested in the moving object regions than the background regions. Based on these discussions, we state the requirements of the privacy protection in the fixed monitoring camera system as follows.
5 Security Camera Privacy Protection 5 1. Masked images should be displayed by normal viewers for compressed images, such as JPEG viewers. 2. Moving objects in masked images should be invisible or unrecognizable. 3. Original input images should be reconstructed by a special viewer with a decodeing password. A decoded images should be reconstructed as close to an input image as possible. 4. An encoder should generate only one JPEG bitstream. A normal and a special viewers can decode a masked and a reconstructed images, respectively only from this bitstream. 3 Masking Method 3.1 Algorithm Overview Figure 1 shows the flow of a masking method proposed in this paper. We assume that the size of an input image obtained by a monitoring camera is W H. A JPEG bitstream of a masked image is generated by moving object extraction followed by encoding. The bitstream can be decoded by either a normal or a special JPEG viewer. The former viewer only displays a masked image, where the privacy of moving objects are protected, and the latter viewer reconstructs an input image. In the following, each part is described. Moving object extraction For extracting moving objects, we can use the background subtraction methods proposed in [4], [5], [6], or [7], for example. In these methods, a background image is produced by a sequence of input images and
6 6 Kenichi YABUTA, Hitoshi KITAZAWA, and Toshihisa TANAKA moving objects are extracted by taking the difference between an input image and the background image, and then the moving objects are detected. The pixels extracted as a part of the moving object are grouped into connected regions, wich are called moving object regions. The moving object regions are decided whether they need masking process or not, according to the region size which is defined by the number of pixels belonging to that region. Assume that there are K moving object regions in an image. Let Np(i)(i = 1, 2,..., K) be the number of pixels in the ith moving object region. If the ith moving object region satisfies Np(i) T h (i = 1, 2,..., K), (4) where T h is a threshold, then this region will be masked, and is referred to as a region to be masked. We introduce a binary image which indicates pixels in the masked regions. Let M ij (i = 1, 2,..., W, j = 1, 2,..., H) be a value of the (i, j)th pixel of this binary image. Then, M ij is defined as 1 if the (i, j)th pixel in the image belongs to region to be masked. M ij = 0 otherwise. Encoding Recall that in the proposed scheme, the privacy of the moving object regions are protected by scrambling/erasing. This step needs three data, that is, an input image, a background image, and a binary image M ij defined above. First, we produce a scrambled/erased image where moving objects are invisible or unrecognizable. Since the special viewer must reconstruct the input image,
7 Security Camera Privacy Protection 7 information of the moving object regions should be embedded in the masked image. This embedded data should be also encrypted for privacy protection. Then, this masked image with embedded data is encoded by a JPEG codec. This part will be more fully explained in Section 4. Decoding by normal viewers If we use normal JPEG viewers such as web browsers, they display masked images. Since a masked image is generated such that moving objects are invisible, privacies of these objects are protected. Reconstruction of the input image To reconstruct the masked objects, a special viewer with a decoding password is required. The moving objects are decrypted with the password and reconstructed. As a result, a reconstructed image is obtained. 3.2 How to Make Objects Invisible We propose two schemes for masking that make moving objects invisible. They are listed below. Scrambling By the scrambling, the pixels in a moving object region are randomly permutated. As a result, we may not understand what the moving objects are. Although this method can conceal a part of the object, for example a number plate of a car, and a face, some parts of information, such as color, can be recognized. Erasing By the erasing, the moving object images are replaced by the corresponding background images. Therefore, the moving objects become invis-
8 8 Kenichi YABUTA, Hitoshi KITAZAWA, and Toshihisa TANAKA ible. However, in many cases we want to keep a brief shape of an object for some purposes: counting cars and pedestrians, for example. Therefore, in this method we draw peripheral curves of moving objects. This will be illustrated later. Masked images generated by each method show what is happening, not who is there. We can choose one of the two methods depending on an objective of the system. If a part of information of moving objects, such as color, is desirable to be seen by general users, the scrambling is recommended. If all details of moving objects except the shape should be hidden, we should use the erasing. It should be noted that for reconstruction of an input image including moving objects, information of the moving objects should be embedded in the bitstream generated by the encoder. We will address this problem in the following section. 4 Embedding Moving Objects With Watermarking This section describes masking methods and how to embed data of moving objects in a masked image by using digital watermarking [8]. Figure 2 shows the simple flow of masking methods with watermarking. First, moving objects are extracted from an input image. The extracted moving objects are compressed by the JPEG and are encrypted by AES with password. Moving object regions in an input image are hidden by scrambling/erasing. This masked image is transformed by the discrete cosine transform (DCT) and the data of objects that have been encrypted are embedded in DCT coefficients of the masked image. In the following, we describe details of the proposed method.
9 Security Camera Privacy Protection Scrambling/Erasing Moving Object Regions Scrambling In this method, all pixels in a moving object region are randomly permutated. Assume that there are N pixels in a moving object region. Let R(i)(i = 1, 2,..., N) be a generated random number and P (i)(i = 1, 2,..., N) is the ith pixel in this region. Then, the ith replaced pixel is obtained by the permutation defined as P (i) = P (R(i)). (5) Erasing In this method, moving objects are made invisible. The pixels in the moving object regions in the input image are replaced by the pixels at the same coordinates in the background image. To illustrate the shape of a moving object, the edge of the moving object is explicitly drawn. We use the binary image (a set of M ij ) to specify edges as follows. The pixel of coordinate (i, j) is regarded as a pixel on the edge if M ij = 1 and one or over of four pixels in circumference are M ij = 0. In other words, when we define N ij as the sum of pixels of the binary image at the upper, the lower, the right, and the left pixels of M ij that is, N ij = M i,j 1 + M i,j+1 + M i+1,j + M i 1,j. If M ij satisfies 0 < M ij N ij < 4, (6) then the pixel of coordinate (i, j) is judged as a pixel on the edge.
10 10 Kenichi YABUTA, Hitoshi KITAZAWA, and Toshihisa TANAKA 4.2 Embedding Moving Objects With Watermarking Encryption of a Moving Object (Fig. 2,(2)) First, an input image is divided into minimum coded units (MCUs). An MCU is a minimum unit of JPEG compression, and the size of an MCU is 8 8. If an MCU includes a moving object region, the MCU is compressed by the JPEG. A bitstream generated by JPEG is stored in an N-byte-length array denoted by MO[i](i = 1,..., N). It should be noted that the bitsream consists of only Huffman codes; therefore, a JPEG header is removed. MO[i] is encrypted by AES [10] and it become MO[i](i = 1,..., Ñ) AES is a block encryption method and the block size is 16 bytes, Ñ is a smallest multiple of 16 not less than N. Watermarking the Encrypted Moving Object (Fig. 2,(4)) We embed M O[i] in the scrambling/erasing image with watermarking. First, we obtain DCT coefficients of the scrambling/erasing image by using a JPEG technique. We use DCT coefficients of middle frequencies for watermarking, because any changes of low coefficients are very noticeable and the changes of high coefficients lead to great changes when the JPEG decoder decodes quantized data. Compared with the low or high frequency DCT coefficients, a small perturbation of a middle frequency DCT coefficient does not visually affect the reconstructed image. Therefore, we propose to embed the moving object data in the middle coefficients indicated in Fig. 3. The least signifivcation bits (LSBs) of quantized DCT coefficients are replaced by MO[i] one bit by one bit. For example, if MO[i] = 0x5A = (2)
11 Security Camera Privacy Protection 11 Table 1. Grouping of DCT coefficients QDCT Z k(i) in each MCU 1 i 8 not embedded 9 i 16 Position 1 17 i 24 Position 2 25 i 32 Position 3 33 i 40 Position 4 41 i 48 Position 5 49 i 56 not embedded 57 i 64 not embedded Table 2. Adaptive embedding position selection by data size Size of embedding data [bytes] Position to be embedded 1 to to to to to to to to to 5 and if the DCT coefficients at the embedding position are 2, 5, 0, 8, 10, 1, 4, and 3, that DCT coefficients become 2, 5, 0, 9, 11, 0, 5, and 2. Let QDCT Z k(i)(i = 1, 2,..., 64) be a quantized and zigzag scanned DCT coefficients. The QDCT Z k(i) are grouped into 8 parts as shown in Table 1. The embedding position is decided according to the number of bytes to be embedded. If, the size of input image is , then the number of MCUs is ( )/ = The embedding position is dynamically selected by the size of data to be embedded as defined in Table 2. Remarks on the Use of Watermarking for Embedding the Object Data The proposed watermarking in masking methods can embed more bits than
12 12 Kenichi YABUTA, Hitoshi KITAZAWA, and Toshihisa TANAKA ordinary watermarking methods do. When watermarking is used in detecting illegal copy or embedding copyright, it should be robust to manipulation of image such as expansion, reduction, and color change. On the other hand, in the proposed masking application, it does not matter in terms of privacy protection if a masked image is attacked and can not be reconstructed. Moreover, the background region in an input image does not include important information. Therefore, the watermarking in this masking application can embed a large size of data, as mentioned in the previous section. 4.3 Decrypting and Reconstruction First, the encrypted data array the masked image. Then, M O[i] are extracted from DCT coefficients of MO[i] are decrypted by AES. Then, the moving object data is reconstructed with the JPEG decoder. Finally, the reconstructed moving object image is overwritten at the position where there was the moving object in the input image. 5 Experimental Results Experimental results of masking methods using scrambling/erasing are shown. We apply the proposed methods to a sequence of moving images with 169 frames. In this experiment, the image size acquired from a fixed monitor camera is pixels. The frame rate is 5 frames/sec. Figure 4 shows the 131st frame in this sequence whose size is KB.
13 Security Camera Privacy Protection 13 Table 3. The comparison of the masking method PSNR [db] File Size [KB] Processing Time [sec] Scrambling (192%) Erasing (163%) Figures 5(a) and 5(b) show scrambled and reconstructed images, respectively. It can be observed in Fig. 5(a) that pixels in the moving object region are scrambled and the moving object is no longer recognized. However, as seen in Fig. 5(a) and 5(b), blocking artifacts are visible in the background region due to watermarking. As shown in Fig. 5(b), the moving object region is reconstructed. In Fig. 5(c), the masked image with an erased object is shown. The moving object is replaced by the background image and it becomes invisible. The reconstructed image is shown in Fig. 5(d). By the erasing, we can hide such information that scrambling can not hide. In the case of scrambling, we can roughly estimate the moving object from the shape and a dominant color, though the face of the moving object can not be recognized. Table 3 shows comparison of peak signal to noise ratios (PSNRs), the file sizes and the processing times of the scrambleing and the erasing methods. PSNR is defined as P SNR = 10 log MSE, (7) where MSE is the mean square error between the original input and reconstructed images. The scrambling and the erasing give similar PSNRs. They are less than 30 db in the whole images. However, when we compare PSNRs of only
14 14 Kenichi YABUTA, Hitoshi KITAZAWA, and Toshihisa TANAKA the moving object images in the input and reconstructed images, the PSNR of both images are an identical value and it is db. For subjective comparison, the original and reconstructed object images are illustrated in Fig.6. This result shows that the PSNR of the moving object region is higher than that of the whole image. The background image is highly deteriorated by watermarking, however the moving object region gives higher PSNR. This result suggests that each method sacrifices the image quality of the background region to that of the moving object regions, which is desirable because the moving object regions include more important information than its background region. As seen in Table 3, the file size increases by 92% compared to the input image in the scrambling, and by 63% in the erasing. Efficiency of the JPEG compression is reduced because the watermarking decreases zero run length in DCT coefficients. The file size in the scrambling is greater than that of the erasing, because in the scrambling, the adjacent pixels in a moving object region largely differ from each other, which is caused by the interchange of pixels. The processing time in Table 3is the CPU time required for the encoding process using Pentium4 2.6GHz. It does not include the moving object extraction time. 6 Conclusion We have presented a novel concept for a security monitoring camera with protecting the privacy of moving objects in recorded images. By using the proposed encoder for security camera recordings, a normal JPEG viewer shows only the
15 Security Camera Privacy Protection 15 masked images, where moving objects are scrambled or erased. Therefore, we need a special viewer with a password to reconstruct an input image. As a result, the privacy of moving objects are strongly protected. The following problems would be still open. First, we need to decrease the processing time for real-time recording and encoding. Second, experimental results in this paper have shown that the sizes of masked images are grater than those of input images. More efficient compression is necessary. Moreover, flexible selection of DCT coefficients which is used for watermarking would be effective for decreasing the size of output bitstream as well as improving the subjective quality of the reconstructed image. This research was partially supported by the Ministry of Education, Science, Sports and Culture, Grant-in-Aid for Scientific Research (C), , References 1. I. Kitahara, K. Kogure, and N. Hagita, Stealth Vision for Protecting Privacy, Proc. of 17th International Conference on Pattern Recognition (ICPR 2004), Vol.4, pp , (2004) 2. J. Wickramasuriya, M. Alhazzazi, M. Datt, S. Mehrotra and N. Venkatasubramanian Privacy-Protecting Video Surveillance, SPIE International Symposium on Electronic Imaging (Real-Time Imaging IX), San Jose, CA, Jan A. Senior, S. Pankanti, A. Hampapur, L. Brown, Y. Tian and A. Ekin, Blinkering Surveillance: Enabling Video Privacy through Computer Vision, IBM Technical Paper, RC22886 (W ), August 28, 2003,
16 16 Kenichi YABUTA, Hitoshi KITAZAWA, and Toshihisa TANAKA 4. C. Staffer and W. E. L. Grimson, Adaptive Background Mixture Models for Real- Time Tracking, CVPR99, p. 2246, Fort Colins, CO, June, A. Lipton, H. Fujiyoshi, and R. S. Patil, Moving Target Detection and Classification from Real-Time Video, Proceeding of IEEE WACV98, November W. E. L. Grimson, C. Stauffer, R. Romano, and L. Lee, Using Adaptive Tracking to Classify and Monitor Activities in a Site, IEEE Proc, Computer Vision and Pattern Recognition, pp , R. T. Collins, A. J. Lipton, and T. Kanade, A System for Video Surveillance and Monitoring, MU-RI-TR-00-12, Robotics Institute, Carnegie Mellon University, May, S. Katzenbeisser, F. A. P. Petitcolas, F. Petticolas, Information Hiding Techniques for Steganography and Digital Watermarking, Artech House Publishers, W. B. Pennebacker, and J. L. Mitchell, JPEG Still Data Compression Standard, Van Nostrand Reinhold, Announcing the ADVANCED ENCRYPTION STANDARD (AES), November 26, 2001,
17 Security Camera Privacy Protection 17 W W H H Background image A fixed monitoring camera Coding password Random number generation Moving object Original image W Moving object extraction H Pixel to be masked M ij =1 Pixel not to be masked Binary image M ij =0 Encoding Generate the scrambled/erased image Embedding moving objects Decoding by normal viewer Masked Image Reconstruction of the Special viewer input image JPEG bitstream Random number generation Decoding password Reconstruction process Reconstructed Image Fig. 1. Flow of Masking process.
18 18 Kenichi YABUTA, Hitoshi KITAZAWA, and Toshihisa TANAKA Input image Masked image (3) Scrambling/ erasing (1)Extracting moving objects Scrambling DCT Erasing Huffman coding Moving object (2)JPEG compression and encryption JPEG compression (4) Watermarking of encrypted moving objects Encryption bitstream Fig. 2. Flow of masking with watermarking. Low frequency :coefficient not used :coefficient used High frequency Fig. 3. Position of DCT coefficients for watermarking.
19 Security Camera Privacy Protection 19 Fig. 4. Input image (the 131st frame) (a) Scrambling. (b) Reconstructed. (c) Erasing. (d) Reconstructed. Fig. 5. Masked and reconstructed images generated by two methods.
20 20 Kenichi YABUTA, Hitoshi KITAZAWA, and Toshihisa TANAKA Input image Reconstructed image Fig. 6. Images of only the moving object regions.
Bit-Plane Decomposition Steganography Using Wavelet Compressed Video
Bit-Plane Decomposition Steganography Using Wavelet Compressed Video Tomonori Furuta, Hideki Noda, Michiharu Niimi, Eiji Kawaguchi Kyushu Institute of Technology, Dept. of Electrical, Electronic and Computer
More informationA Reversible Data Hiding Scheme for BTC- Compressed Images
IJACSA International Journal of Advanced Computer Science and Applications, A Reversible Data Hiding Scheme for BTC- Compressed Images Ching-Chiuan Lin Shih-Chieh Chen Department of Multimedia and Game
More informationData Hiding in Video
Data Hiding in Video J. J. Chae and B. S. Manjunath Department of Electrical and Computer Engineering University of California, Santa Barbara, CA 9316-956 Email: chaejj, manj@iplab.ece.ucsb.edu Abstract
More informationDIGITAL WATERMARKING FOR GRAY-LEVEL WATERMARKS
DICTA22: Digital Image Computing Techniques and Applications, 2 22 January 22, Melbourne, Australia. DIGITAL WATERMARKING FOR GRAY-LEVEL WATERMARKS *Yuk Ying CHUNG, Man To WONG *Basser Department of Computer
More informationDigital Image Steganography Techniques: Case Study. Karnataka, India.
ISSN: 2320 8791 (Impact Factor: 1.479) Digital Image Steganography Techniques: Case Study Santosh Kumar.S 1, Archana.M 2 1 Department of Electronicsand Communication Engineering, Sri Venkateshwara College
More informationWatermarking Moble Phone Color Images With Error Correction Codes
IOSR Journal of Electronics & Communication Engineering (IOSR-JECE) ISSN(e) : 2278-1684 ISSN(p) : 2320-334X, PP 05-09 www.iosrjournals.org Watermarking Moble Phone Color Images With Error Correction Codes
More informationA Novel Secure Digital Watermark Generation from Public Share by Using Visual Cryptography and MAC Techniques
Bashar S. Mahdi Alia K. Abdul Hassan Department of Computer Science, University of Technology, Baghdad, Iraq A Novel Secure Digital Watermark Generation from Public Share by Using Visual Cryptography and
More informationFRAGILE WATERMARKING USING SUBBAND CODING
ICCVG 2002 Zakopane, 25-29 Sept. 2002 Roger ŚWIERCZYŃSKI Institute of Electronics and Telecommunication Poznań University of Technology roger@et.put.poznan.pl FRAGILE WATERMARKING USING SUBBAND CODING
More informationLETTER Improvement of JPEG Compression Efficiency Using Information Hiding and Image Restoration
IEICE TRANS. INF. & SYST., VOL.E96 D, NO.5 MAY 2013 1233 LETTER Improvement of JPEG Compression Efficiency Using Information Hiding and Image Restoration Kazumi YAMAWAKI, Member, Fumiya NAKANO, Student
More informationImage Error Concealment Based on Watermarking
Image Error Concealment Based on Watermarking Shinfeng D. Lin, Shih-Chieh Shie and Jie-Wei Chen Department of Computer Science and Information Engineering,National Dong Hwa Universuty, Hualien, Taiwan,
More informationA New Approach to Compressed Image Steganography Using Wavelet Transform
IOSR Journal of Computer Engineering (IOSR-JCE) e-issn: 2278-0661,p-ISSN: 2278-8727, Volume 17, Issue 5, Ver. III (Sep. Oct. 2015), PP 53-59 www.iosrjournals.org A New Approach to Compressed Image Steganography
More informationA New Watermarking Algorithm for Scanned Grey PDF Files Using Robust Logo and Hash Function
A New Watermarking Algorithm for Scanned Grey PDF Files Using Robust Logo and Hash Function Walid Alakk Electrical and Computer Engineering Department Khalifa University of Science, technology and Research
More informationA Robust Watermarking Algorithm For JPEG Images
nd Joint International Information Technology, Mechanical and Electronic Engineering Conference (JIMEC 7) A Robust Watermarking Algorithm For JPEG Images Baosheng Sun, Daofu Gong*, Fenlin Liu *Foundation
More informationInteractive Progressive Encoding System For Transmission of Complex Images
Interactive Progressive Encoding System For Transmission of Complex Images Borko Furht 1, Yingli Wang 1, and Joe Celli 2 1 NSF Multimedia Laboratory Florida Atlantic University, Boca Raton, Florida 33431
More informationDIGITAL IMAGE WATERMARKING BASED ON A RELATION BETWEEN SPATIAL AND FREQUENCY DOMAINS
DIGITAL IMAGE WATERMARKING BASED ON A RELATION BETWEEN SPATIAL AND FREQUENCY DOMAINS Murat Furat Mustafa Oral e-mail: mfurat@cu.edu.tr e-mail: moral@mku.edu.tr Cukurova University, Faculty of Engineering,
More informationA new predictive image compression scheme using histogram analysis and pattern matching
University of Wollongong Research Online University of Wollongong in Dubai - Papers University of Wollongong in Dubai 00 A new predictive image compression scheme using histogram analysis and pattern matching
More informationImage Compression Algorithm and JPEG Standard
International Journal of Scientific and Research Publications, Volume 7, Issue 12, December 2017 150 Image Compression Algorithm and JPEG Standard Suman Kunwar sumn2u@gmail.com Summary. The interest in
More informationEnhancing the Image Compression Rate Using Steganography
The International Journal Of Engineering And Science (IJES) Volume 3 Issue 2 Pages 16-21 2014 ISSN(e): 2319 1813 ISSN(p): 2319 1805 Enhancing the Image Compression Rate Using Steganography 1, Archana Parkhe,
More informationAN EFFICIENT VIDEO WATERMARKING USING COLOR HISTOGRAM ANALYSIS AND BITPLANE IMAGE ARRAYS
AN EFFICIENT VIDEO WATERMARKING USING COLOR HISTOGRAM ANALYSIS AND BITPLANE IMAGE ARRAYS G Prakash 1,TVS Gowtham Prasad 2, T.Ravi Kumar Naidu 3 1MTech(DECS) student, Department of ECE, sree vidyanikethan
More informationBit Adjusting Image Steganography in Blue Channel using AES and Secured Hash Function
Available Online at www.ijcsmc.com International Journal of Computer Science and Mobile Computing A Monthly Journal of Computer Science and Information Technology ISSN 2320 088X IMPACT FACTOR: 6.017 IJCSMC,
More informationCompression of Stereo Images using a Huffman-Zip Scheme
Compression of Stereo Images using a Huffman-Zip Scheme John Hamann, Vickey Yeh Department of Electrical Engineering, Stanford University Stanford, CA 94304 jhamann@stanford.edu, vickey@stanford.edu Abstract
More informationHighly Secure Invertible Data Embedding Scheme Using Histogram Shifting Method
www.ijecs.in International Journal Of Engineering And Computer Science ISSN:2319-7242 Volume 3 Issue 8 August, 2014 Page No. 7932-7937 Highly Secure Invertible Data Embedding Scheme Using Histogram Shifting
More informationHiding Depth Map in JPEG Image and MPEG-2 Video
Hiding Depth Map in JPEG Image and MPEG-2 Video by Wenyi Wang A thesis submitted to the University of Ottawa in partial fulfillment of the requirements for the degree of Master of Applied Science in Electrical
More informationFRACTAL IMAGE COMPRESSION OF GRAYSCALE AND RGB IMAGES USING DCT WITH QUADTREE DECOMPOSITION AND HUFFMAN CODING. Moheb R. Girgis and Mohammed M.
322 FRACTAL IMAGE COMPRESSION OF GRAYSCALE AND RGB IMAGES USING DCT WITH QUADTREE DECOMPOSITION AND HUFFMAN CODING Moheb R. Girgis and Mohammed M. Talaat Abstract: Fractal image compression (FIC) is a
More informationDigital Image Steganography Using Bit Flipping
BULGARIAN ACADEMY OF SCIENCES CYBERNETICS AND INFORMATION TECHNOLOGIES Volume 18, No 1 Sofia 2018 Print ISSN: 1311-9702; Online ISSN: 1314-4081 DOI: 10.2478/cait-2018-0006 Digital Image Steganography Using
More informationInternational Journal of Computer Engineering and Applications,
International Journal of Computer Engineering and Applications, Volume XII, Issue I, Jan. 18, www.ijcea.com ISSN 2321-3469 SECURING TEXT DATA BY HIDING IN AN IMAGE USING AES CRYPTOGRAPHY AND LSB STEGANOGRAPHY
More informationII. RELATIVE WORK The earlier watermarking techniques were proposed for data hiding applications only [2, 7]. Then, the authentication capability beca
ROI based Tamper Detection and Recovery for Medical Images Using Reversible Watermarking Technique Osamah M. Al-Qershi, Bee Ee Khoo School of Electrical and Electronic Engineering Universiti Sains Malaysia
More informationIMAGE COMPRESSION USING HYBRID QUANTIZATION METHOD IN JPEG
IMAGE COMPRESSION USING HYBRID QUANTIZATION METHOD IN JPEG MANGESH JADHAV a, SNEHA GHANEKAR b, JIGAR JAIN c a 13/A Krishi Housing Society, Gokhale Nagar, Pune 411016,Maharashtra, India. (mail2mangeshjadhav@gmail.com)
More informationUniversity of Mustansiriyah, Baghdad, Iraq
Volume 5, Issue 9, September 2015 ISSN: 2277 128X International Journal of Advanced Research in Computer Science and Software Engineering Research Paper Available online at: www.ijarcsse.com Audio Compression
More informationVideo Compression Method for On-Board Systems of Construction Robots
Video Compression Method for On-Board Systems of Construction Robots Andrei Petukhov, Michael Rachkov Moscow State Industrial University Department of Automatics, Informatics and Control Systems ul. Avtozavodskaya,
More informationA Image Comparative Study using DCT, Fast Fourier, Wavelet Transforms and Huffman Algorithm
International Journal of Engineering Research and General Science Volume 3, Issue 4, July-August, 15 ISSN 91-2730 A Image Comparative Study using DCT, Fast Fourier, Wavelet Transforms and Huffman Algorithm
More informationBlock-based Watermarking Using Random Position Key
IJCSNS International Journal of Computer Science and Network Security, VOL.9 No.2, February 2009 83 Block-based Watermarking Using Random Position Key Won-Jei Kim, Jong-Keuk Lee, Ji-Hong Kim, and Ki-Ryong
More informationAn Information Hiding Scheme Based on Pixel- Value-Ordering and Prediction-Error Expansion with Reversibility
An Information Hiding Scheme Based on Pixel- Value-Ordering Prediction-Error Expansion with Reversibility Ching-Chiuan Lin Department of Information Management Overseas Chinese University Taichung, Taiwan
More informationApplication of Data Hiding in Audio-Video Using Advance Algorithm
Available Online at www.ijcsmc.com International Journal of Computer Science and Mobile Computing A Monthly Journal of Computer Science and Information Technology ISSN 2320 088X IMPACT FACTOR: 5.258 IJCSMC,
More informationAnalysis of Robustness of Digital Watermarking Techniques under Various Attacks
International Journal of Engineering Research and Development e-issn : 2278-067X, p-issn : 2278-800X, www.ijerd.com Volume 2, Issue 6 (August 2012), PP. 28-34 Analysis of Robustness of Digital Watermarking
More informationRobust Image Watermarking based on DCT-DWT- SVD Method
Robust Image Watermarking based on DCT-DWT- SVD Sneha Jose Rajesh Cherian Roy, PhD. Sreenesh Shashidharan ABSTRACT Hybrid Image watermarking scheme proposed based on Discrete Cosine Transform (DCT)-Discrete
More informationRobust DWT Based Technique for Digital Watermarking
Robust DWT Based Technique for Digital Watermarking Mamta Jain Department of Electronics & Communication Institute of Engineering & Technology Alwar er.mamtajain@gmail.com Abstract Hiding the information
More informationHigh Capacity Data Hiding Scheme for DCT-based Images
Journal of Information Hiding and Multimedia Signal Processing c 010 ISSN 073-41 Ubiquitous International Volume 1, Number 3, July 010 High Capacity Data Hiding Scheme for DCT-based Images Chia-Chen Lin
More informationJeff Hinson CS525, Spring 2010
DIGITAL WATERMARKING Jeff Hinson CS525, Spring 2010 Outline Introduction Challenges Algorithms / Methods Detection Existing Programs Lessons Learned / Conclusion Questions Jeff Hinson CS525 Slide #1 Introduction
More informationJPEG compression of monochrome 2D-barcode images using DCT coefficient distributions
Edith Cowan University Research Online ECU Publications Pre. JPEG compression of monochrome D-barcode images using DCT coefficient distributions Keng Teong Tan Hong Kong Baptist University Douglas Chai
More informationA Video Watermarking Algorithm Based on the Human Visual System Properties
A Video Watermarking Algorithm Based on the Human Visual System Properties Ji-Young Moon 1 and Yo-Sung Ho 2 1 Samsung Electronics Co., LTD 416, Maetan3-dong, Paldal-gu, Suwon-si, Gyenggi-do, Korea jiyoung.moon@samsung.com
More informationImage Watermarking with Biorthogonal and Coiflet Wavelets at Different Levels
International Journal of Computer Science & Communication Vol., No. 2, July-December 200, pp. 35-356 Image Watermarking with Biorthogonal and Coiflet Wavelets at Different Levels Kirti Arora Jasuja & Baljit
More informationComparison of Digital Image Watermarking Algorithms. Xu Zhou Colorado School of Mines December 1, 2014
Comparison of Digital Image Watermarking Algorithms Xu Zhou Colorado School of Mines December 1, 2014 Outlier Introduction Background on digital image watermarking Comparison of several algorithms Experimental
More informationA New hybrid method in watermarking using DCT and AES
International Journal of Engineering Research and Development e-issn: 2278-067X, p-issn: 2278-800X, www.ijerd.com Volume 10, Issue 11 (November 2014), PP.64-69 A New hybrid method in watermarking using
More informationSpatial, Transform and Fractional Domain Digital Image Watermarking Techniques
Spatial, Transform and Fractional Domain Digital Image Watermarking Techniques Dr.Harpal Singh Professor, Chandigarh Engineering College, Landran, Mohali, Punjab, Pin code 140307, India Puneet Mehta Faculty,
More informationComparison of Wavelet Based Watermarking Techniques for Various Attacks
International Journal of Engineering and Technical Research (IJETR) ISSN: 2321-0869, Volume-3, Issue-4, April 2015 Comparison of Wavelet Based Watermarking Techniques for Various Attacks Sachin B. Patel,
More informationEfficient & Secure Data Hiding Using Secret Reference Matrix
Efficient & Secure Data Hiding Using Secret Reference Matrix Laxman Tawade 1, Rajshree Mahajan 2, Chandan Kulthe 3 1 Department of Electronic and Telecommunication Engineering, Pune University, India 2,3
More informationStatistical Modeling of Huffman Tables Coding
Statistical Modeling of Huffman Tables Coding S. Battiato 1, C. Bosco 1, A. Bruna 2, G. Di Blasi 1, and G.Gallo 1 1 D.M.I. University of Catania - Viale A. Doria 6, 95125, Catania, Italy {battiato, bosco,
More informationCHAPTER 6. LSB based data hiding with double Encryption. 6.1 Introduction
CHAPTER 6 LSB based data hiding with double Encryption 6.1 Introduction In image steganography, the amount of secret data that can be embedded depends on the method and the cover-image as capacity limitation
More informationBiometric Data Hiding: A 3 Factor Authentication Approach to Verify Identity with a Single Image Using Steganography, Encryption and Matching
Biometric Data Hiding: A 3 Factor Authentication Approach to Verify Identity with a Single Image Using Steganography, Encryption and Matching Neha Agrawal and Marios Savvides Carnegie Mellon University
More informationMultiple Binary Images Watermarking in Spatial and Frequency Domains
Multiple Binary Images Watermarking in Spatial and Frequency Domains K.Ganesan 1 and Tarun Kumar Guptha 2 1 Director, TIFAC-CORE in Automotive Infotronics and Senior Professor, School of Information Technology
More informationImage Authentication and Recovery Scheme Based on Watermarking Technique
Image Authentication and Recovery Scheme Based on Watermarking Technique KENJI SUMITOMO 1, MARIKO NAKANO 2, HECTOR PEREZ 2 1 Faculty of Information and Computer Engineering The University of Electro-Communications
More informationRandom Image Embedded in Videos using LSB Insertion Algorithm
Random Image Embedded in Videos using LSB Insertion Algorithm K.Parvathi Divya 1, K.Mahesh 2 Research Scholar 1, * Associate Professor 2 Department of Computer Science and Engg, Alagappa university, Karaikudi.
More informationCHAPTER 4 REVERSIBLE IMAGE WATERMARKING USING BIT PLANE CODING AND LIFTING WAVELET TRANSFORM
74 CHAPTER 4 REVERSIBLE IMAGE WATERMARKING USING BIT PLANE CODING AND LIFTING WAVELET TRANSFORM Many data embedding methods use procedures that in which the original image is distorted by quite a small
More informationOptimized Watermarking Using Swarm-Based Bacterial Foraging
Journal of Information Hiding and Multimedia Signal Processing c 2009 ISSN 2073-4212 Ubiquitous International Volume 1, Number 1, January 2010 Optimized Watermarking Using Swarm-Based Bacterial Foraging
More informationCompression of RADARSAT Data with Block Adaptive Wavelets Abstract: 1. Introduction
Compression of RADARSAT Data with Block Adaptive Wavelets Ian Cumming and Jing Wang Department of Electrical and Computer Engineering The University of British Columbia 2356 Main Mall, Vancouver, BC, Canada
More informationA Novel Statistical Distortion Model Based on Mixed Laplacian and Uniform Distribution of Mpeg-4 FGS
A Novel Statistical Distortion Model Based on Mixed Laplacian and Uniform Distribution of Mpeg-4 FGS Xie Li and Wenjun Zhang Institute of Image Communication and Information Processing, Shanghai Jiaotong
More informationA Robust Digital Watermarking Scheme using BTC-PF in Wavelet Domain
A Robust Digital Watermarking Scheme using BTC-PF in Wavelet Domain Chinmay Maiti a *, Bibhas Chandra Dhara b a Department of Computer Science & Engineering, College of Engineering & Management, Kolaghat,
More informationA Detailed look of Audio Steganography Techniques using LSB and Genetic Algorithm Approach
www.ijcsi.org 402 A Detailed look of Audio Steganography Techniques using LSB and Genetic Algorithm Approach Gunjan Nehru 1, Puja Dhar 2 1 Department of Information Technology, IEC-Group of Institutions
More informationSIGNAL COMPRESSION. 9. Lossy image compression: SPIHT and S+P
SIGNAL COMPRESSION 9. Lossy image compression: SPIHT and S+P 9.1 SPIHT embedded coder 9.2 The reversible multiresolution transform S+P 9.3 Error resilience in embedded coding 178 9.1 Embedded Tree-Based
More informationSPREAD SPECTRUM AUDIO WATERMARKING SCHEME BASED ON PSYCHOACOUSTIC MODEL
SPREAD SPECTRUM WATERMARKING SCHEME BASED ON PSYCHOACOUSTIC MODEL 1 Yüksel Tokur 2 Ergun Erçelebi e-mail: tokur@gantep.edu.tr e-mail: ercelebi@gantep.edu.tr 1 Gaziantep University, MYO, 27310, Gaziantep,
More informationDATA HIDING IN H.264 VIDEO FOR LOSSLESS RECONSTRUCTION OF REGION OF INTEREST
DATA HIDING IN H.264 VIDEO FOR LOSSLESS RECONSTRUCTION OF REGION OF INTEREST Peter MEUEL, Marc CHAUMONT, William PUECH Laboratoire d Informatique, de Robotique et de Micro-électronique de Montpellier 161
More informationA Grayscale Image Steganography Based upon Discrete Cosine Transformation
A Grayscale Image Steganography Based upon Discrete Cosine Transformation Chin-Chen Chang 1, Pei-Yu Lin, and Jun-Chou Chuang 3 1 Department of Information Engineering and Computer Science, Feng Chia University,
More informationAppendix A. Definition of Terms
Appendix A Definition of Terms Artifact: Artifacts are the irregularities that may be present in an image after processing. They are not related to the details of the image and sometimes accompany transmitted
More informationUser-Friendly Sharing System using Polynomials with Different Primes in Two Images
User-Friendly Sharing System using Polynomials with Different Primes in Two Images Hung P. Vo Department of Engineering and Technology, Tra Vinh University, No. 16 National Road 53, Tra Vinh City, Tra
More informationDigital Watermarking with Copyright Authentication for Image Communication
Digital Watermarking with Copyright Authentication for Image Communication Keta Raval Dept. of Electronics and Communication Patel Institute of Engineering and Science RGPV, Bhopal, M.P., India ketaraval@yahoo.com
More informationAuthentication and Secret Message Transmission Technique Using Discrete Fourier Transformation
, 2009, 5, 363-370 doi:10.4236/ijcns.2009.25040 Published Online August 2009 (http://www.scirp.org/journal/ijcns/). Authentication and Secret Message Transmission Technique Using Discrete Fourier Transformation
More informationA Moving Object Segmentation Method for Low Illumination Night Videos Soumya. T
Proceedings of the World Congress on Engineering and Computer Science 28 WCECS 28, October 22-24, 28, San Francisco, USA A Moving Object Segmentation Method for Low Illumination Night Videos Soumya. T
More informationText Hiding In Multimedia By Huffman Encoding Algorithm Using Steganography
Text Hiding In Multimedia By Huffman Encoding Algorithm Using Steganography Madhavi V.Kale 1, Prof. Swati A.Patil 2 PG Student, Dept. Of CSE., G.H.Raisoni Institute Of Engineering And Management,Jalgaon
More informationOptimized Progressive Coding of Stereo Images Using Discrete Wavelet Transform
Optimized Progressive Coding of Stereo Images Using Discrete Wavelet Transform Torsten Palfner, Alexander Mali and Erika Müller Institute of Telecommunications and Information Technology, University of
More informationA Reversible Data Hiding Scheme For JPEG Images
A Reversible Data Hiding Scheme For JPEG Images Qiming Li, Yongdong Wu, and Feng Bao Institute for Infocomm Research, A*Star, Singapore {qli,wydong,baofeng}@i2r.a-star.edu.sg Abstract. When JPEG images
More informationImproved Qualitative Color Image Steganography Based on DWT
Improved Qualitative Color Image Steganography Based on DWT 1 Naresh Goud M, II Arjun Nelikanti I, II M. Tech student I, II Dept. of CSE, I, II Vardhaman College of Eng. Hyderabad, India Muni Sekhar V
More informationA Digital Video Watermarking Algorithm Based on LSB and DCT
A Digital Video Watermarking Algorithm Based on LSB and DCT Kirti Jain, U.S.N Raju Department of Computer Science and Engineering NIT Warangal India kirtijain.kj@gmail.com,usnraju@gmail.com ABSTRACT: In
More informationQR Code Watermarking Algorithm based on Wavelet Transform
2013 13th International Symposium on Communications and Information Technologies (ISCIT) QR Code Watermarking Algorithm based on Wavelet Transform Jantana Panyavaraporn 1, Paramate Horkaew 2, Wannaree
More informationHuman Motion Detection and Tracking for Video Surveillance
Human Motion Detection and Tracking for Video Surveillance Prithviraj Banerjee and Somnath Sengupta Department of Electronics and Electrical Communication Engineering Indian Institute of Technology, Kharagpur,
More informationFrequency Band Coding Mode Selection for Key Frames of Wyner-Ziv Video Coding
2009 11th IEEE International Symposium on Multimedia Frequency Band Coding Mode Selection for Key Frames of Wyner-Ziv Video Coding Ghazaleh R. Esmaili and Pamela C. Cosman Department of Electrical and
More informationAN IMPROVISED LOSSLESS DATA-HIDING MECHANISM FOR IMAGE AUTHENTICATION BASED HISTOGRAM MODIFICATION
AN IMPROVISED LOSSLESS DATA-HIDING MECHANISM FOR IMAGE AUTHENTICATION BASED HISTOGRAM MODIFICATION Shaik Shaheena 1, B. L. Sirisha 2 VR Siddhartha Engineering College, Vijayawada, Krishna, Andhra Pradesh(520007),
More informationRGB Digital Image Forgery Detection Using Singular Value Decomposition and One Dimensional Cellular Automata
RGB Digital Image Forgery Detection Using Singular Value Decomposition and One Dimensional Cellular Automata Ahmad Pahlavan Tafti Mohammad V. Malakooti Department of Computer Engineering IAU, UAE Branch
More informationCOPYRIGHT PROTECTION OF PALETTE IMAGES BY A ROBUST LOSSLESS VISIBLE WATERMARKING TECHNIQUE *
COPYRIGHT PROTECTION OF PALETTE IMAGES BY A ROBUST LOSSLESS VISIBLE WATERMARKING TECHNIQUE * Pei-Pei Chen ( 陳佩貝 ) 1 and Wen-Hsiang Tsai ( 蔡文祥 ) 1, 2 1 Dept. of Computer Science, National Chiao Tung University,
More informationEMBEDDING WATERMARK IN VIDEO RECORDS
EMBEDDING WATERMARK IN VIDEO RECORDS D.Abirami UG (CSE), Sri Krishna College of Technology, Anna University abidhanabal17@gmail.com R.Gowsika UG (CSE), Sri Krishna College of Technology, Anna University
More informationRobust Image Identification without any Visible Information for Double-Compressed JPEG Images
Robust Image Identification without any Visible Information for Double-Compressed JPEG Images Kenta Iida and Hitoshi Kiya Tokyo Metropolitan University, Tokyo, Japan E-mail: iida-kenta1@ed.tmu.ac.jp, kiya@tmu.ac.jp
More information2 2 Coltuc 2) A Zeng 3) B JPEG JPEG JPEG JPEG JPEG JPEG JPEG 3 1) Exif JPEG 2) 3) JPEG A Exif A 2) 3) B DCT JPEG Exif DCT a) b) Coltuc JPEG c) a) 1) b
IIEEJ JPEG, Protection of Privacy in JPEG Files Using Reversible Information Hiding Fuyuki MASUTANI, Michiharu NIIMI (Member), Hideki NODA Graduate School of Computer Science and Systems Engineering, Kyushu
More informationOBLIVIOUS SCHEMES OF GHOST-BASED WATERMARKING FOR DCT COEFFICIENTS
OBLIVIOUS SCHEMES OF GHOST-BASED WATERMARKING FOR DCT COEFFICIENTS Hiromu KODA, Tomoyuki OGAWA and Shojiro SAKATA Faculty of Electro-Communications The University of Electro-Communications -5- Chofugaoka,
More informationLocating 1-D Bar Codes in DCT-Domain
Edith Cowan University Research Online ECU Publications Pre. 2011 2006 Locating 1-D Bar Codes in DCT-Domain Alexander Tropf Edith Cowan University Douglas Chai Edith Cowan University 10.1109/ICASSP.2006.1660449
More informationA reversible data hiding based on adaptive prediction technique and histogram shifting
A reversible data hiding based on adaptive prediction technique and histogram shifting Rui Liu, Rongrong Ni, Yao Zhao Institute of Information Science Beijing Jiaotong University E-mail: rrni@bjtu.edu.cn
More informationCovert Communication with Authentication via Software Programs Using Invisible ASCII Codes --- A New Approach
Covert Communication with Authentication via Software Programs Using Invisible ASCII Codes --- A New Approach I-Shi Lee Dept. of Computer Science, National Chiao Tung University, Hsinchu, Taiwan 30010
More informationACEAIT-3055 High-Capacity Steganography Using MRF-Synthesized Cover Images
ACEAIT-3055 High-Capacity Steganography Using MRF-Synthesized Cover Images Chaur-Chin Chen and Wei-Ju Lai Department of Computer Science National Tsing Hua University Hsinchu 30013, Taiwan e-mail: cchen@cs.nthu.edu.tw
More informationReversible Data Hiding VIA Optimal Code for Image
Vol. 3, Issue. 3, May - June 2013 pp-1661-1665 ISSN: 2249-6645 Reversible Data Hiding VIA Optimal Code for Image Senthil Rani D. #, Gnana Kumari R. * # PG-Scholar, M.E-CSE, Coimbatore Institute of Engineering
More informationISSN (ONLINE): , VOLUME-3, ISSUE-1,
PERFORMANCE ANALYSIS OF LOSSLESS COMPRESSION TECHNIQUES TO INVESTIGATE THE OPTIMUM IMAGE COMPRESSION TECHNIQUE Dr. S. Swapna Rani Associate Professor, ECE Department M.V.S.R Engineering College, Nadergul,
More informationRobust Steganography Using Texture Synthesis
Robust Steganography Using Texture Synthesis Zhenxing Qian 1, Hang Zhou 2, Weiming Zhang 2, Xinpeng Zhang 1 1. School of Communication and Information Engineering, Shanghai University, Shanghai, 200444,
More informationJPEG 2000 vs. JPEG in MPEG Encoding
JPEG 2000 vs. JPEG in MPEG Encoding V.G. Ruiz, M.F. López, I. García and E.M.T. Hendrix Dept. Computer Architecture and Electronics University of Almería. 04120 Almería. Spain. E-mail: vruiz@ual.es, mflopez@ace.ual.es,
More informationA New DCT based Color Video Watermarking using Luminance Component
IOSR Journal of Computer Engineering (IOSR-JCE) e-issn: 2278-0661, p- ISSN: 2278-8727Volume 16, Issue 2, Ver. XII (Mar-Apr. 2014), PP 83-90 A New DCT based Color Video Watermarking using Luminance Component
More informationAdaptive Quantization for Video Compression in Frequency Domain
Adaptive Quantization for Video Compression in Frequency Domain *Aree A. Mohammed and **Alan A. Abdulla * Computer Science Department ** Mathematic Department University of Sulaimani P.O.Box: 334 Sulaimani
More informationMetamorphosis of High Capacity Steganography Schemes
2012 International Conference on Computer Networks and Communication Systems (CNCS 2012) IPCSIT vol.35(2012) (2012) IACSIT Press, Singapore Metamorphosis of High Capacity Steganography Schemes 1 Shami
More informationQuality Access Control of a Compressed Gray Scale Image
Quality Access Control of a Compressed Gray Scale Image Amit Phadikar, Malay K. Kundu 2, Santi P. Maity 3 Department of Information Technology, MCKV Institute of Engineering, Liluah, Howrah 7204, India.
More informationA Robust Wavelet-Based Watermarking Algorithm Using Edge Detection
A Robust Wavelet-Based Watermarking Algorithm Using Edge Detection John N. Ellinas Abstract In this paper, a robust watermarking algorithm using the wavelet transform and edge detection is presented. The
More informationCOMPARISONS OF DCT-BASED AND DWT-BASED WATERMARKING TECHNIQUES
COMPARISONS OF DCT-BASED AND DWT-BASED WATERMARKING TECHNIQUES H. I. Saleh 1, M. E. Elhadedy 2, M. A. Ashour 1, M. A. Aboelsaud 3 1 Radiation Engineering Dept., NCRRT, AEA, Egypt. 2 Reactor Dept., NRC,
More informationCombined Copyright Protection and Error Detection Scheme for H.264/AVC
Combined Copyright Protection and Error Detection Scheme for H.264/AVC XIAOMING CHEN, YUK YING CHUNG, FANGFEI XU, AHMED FAWZI OTOOM, *CHANGSEOK BAE School of Information Technologies, The University of
More informationImage Steganography (cont.)
Image Steganography (cont.) 2.2) Image Steganography: Use of Discrete Cosine Transform (DCT) DCT is one of key components of JPEG compression JPEG algorithm: (1) algorithm is split in 8x8 pixel squares
More informationCOMPARISON BETWEEN TWO WATERMARKING ALGORITHMS USING DCT COEFFICIENT, AND LSB REPLACEMENT
COMPARISO BETWEE TWO WATERMARKIG ALGORITHMS USIG DCT COEFFICIET, AD LSB REPLACEMET Mona M. El-Ghoneimy Associate Professor, Elect. & Comm. Dept., Faculty of Engineering, Cairo University, Post code 12316
More information