Chaos Based Spread Spectrum Watermarking algorithm
|
|
- Delphia Norris
- 7 years ago
- Views:
Transcription
1 Chaos Based Spread Spectrum Watermarking algorithm Kais Feltekh Laboratoire SysCom, Ecole Nationale d Ingenieurs de Tunis kais.feltekh@gmail.com Zouhair Ben Jemaa Laboratoire SysCom, Ecole Nationale d Ingenieurs de Tunis zouhair.benjemaa@enit.rnu.tn Abstract This paper presents a blind spread spectrum watermarking algorithm in discret cosine transform (DCT) domain based on chaotic sequence features for still image. We used logistic map with two secret keys; one to generate a spread spectrum sequence and other to determinate the secret insertion positions of the mark; the insertion of the mark was done in the middle frequency of DCT of the image to be watermarked. This allowed to have a compromise between invisibility and robustness against scaling, rotation and cropping attacks. Index Terms Watermark, spread spectrum, Chaos, Attacks. I. INTRODUCTION Digital watermarking operation aims to embed many kinds of digital information into multimedia data (such as image, sound and video.); this allows multimedia identification and information copyright protection. As a technology of information hiding, digital watermarking targets to allow three main properties: invisibility, robustness and capacity. In recent years, to achieve these targets several watermarking algorithms have been proposed [3], [4], [5]. The results enabled by these algorithms have shown that the invisibility and robustness are often contradictory and improvement of one causes the degradation of the other. A compromise between the two became the target of proposed algorithms. As a result, many watermarking algorithms based on DCT was proposed in the few last years [2], [7], [8], [10]. Especially, Cox and al [9] and F. Hartung and al [1] proposed many works on digital watermarking based on spread spectrum schema which aims to spread the mark in almost all the spectrum band of the image. R.Munir and al [2] proposed a new spread spectrum watermarking algorithm based on the properties of chaotic sequences generated by non linear maps. The algorithm proposed in this work is based on the algorithm of R. Munir in which we made two modifications, the first is to put the watermark in the middle band of the spectrum in the aim to improve the invisibility of the watermark; the second is to do the DCT on blocks of 8 8 pixels instead of the entire image. We used a chaotic map to produce two pseudo-random sequences one to spread the spectrum of the watermark and the other to determinate the positions of the watermark in the set of DCT components. This paper is organized as follows. In section II, we will give a little idea on chaos and the motivation of using it in various applications. In section III, we will describe the algorithm proposed by Rinaldi Munir. In section IV, we will present the proposed method. After that, we will present the experimental results; and we will finish by a conclusion. II. CHAOS AND RANDOMNESS Chaos has many features that make it attractive for searchers in various fields, indeed all these features can be summarized by saying that chaos is a deterministic phenomena having almost all the features of a noise. Another feature of chaos is sensitivity to initial conditions; i.e two infinitesimal close initial conditions of a chaotic system give two solutions completely uncorrelated. Motivated by these features, chaotic systems have been used as a pseudo-random generator, this means a finite number of noise-like, deterministic and reproducible sequences can be generated [5]. One of the simplest chaotic systems is defined by the logistic map, described by x k+1 = λ.x k (1 x k ) (1) where 0 λ 4. For λ = 4, the map is in the chaotic state and for almost all initial condition x 0, the sequence generated by (1) is a pseudo-random sequence, in fig.1 we plotted the histogram of one of the sequences of length N = The generated real number sequence is quantized, a binary sequence s(n) {0, 1} is produced with approximately equal number of 1 s and 0 s. In our scheme, we use logistic map twice, one to spread the spectrum of the mark to be embedded and other to determine the positions among the DCT coefficients where the mark will be embedded. III. SPREAD SPECTRUM WATERMARKING WITH CHAOTIC MAP In this section we will describe the algorithm proposed in [2] and in which we introduced two modifications to improve its performance. The basic idea of this algorithm is to add a pseudo-random signal to the image as a watermark that is below the threshold of perception and that cannot be identified and thus removed without knowledge of the parameters of the watermarking algorithm [2]. The embedding and extracting algorithms are described bellow.
2 (generally K 1 K 2 ). Then the real value elements of this sequence is converted into integers by multiplying each element by NM then rounding it to the nearest integer, N M is the dimension of the image to be embedded. 5) The spread spectrum watermark is embedded into V, except DC component, on secret positions specified at step 4. The spread bit b i is modulated by the binary pseudo-noise sequence S 1 and the results are amplified with a watermarking strength factor α, to form the spread spectrum watermark w i = α.b i.p i (3) The watermark w i is added to image V = v i yielding a watermarked image Fig. 1. Histogram of a sequence generated by the logistic map. A. Embedding Scheme The embedding schema is described in fig.iii-a. ˆv i = v i + w i (4) 6) Finally, the inverse DCT is applied to reconstruct the watermarked image. B. Watermark Extracting Algorithm The extracting schema is described in fig.3. Fig. 2. Watermark embedding. 1) The DCT of the original image is computed; the coefficients of this transform is saved into a vector V. 2) The watermark A is spread by a factor cr to obtain a sequence B using equation (2) ; L is the length of B. B = {b i /b i = a j, j.cr i < (j + 1).cr} (2) 3) The first chaotic sequence S 1 is generate by using the logistic map and an initial condition x 0 = K 1 ; the length of this sequence is equal to L. 4) Next, secret positions for embedding watermark are defined; a second chaotic sequence S 2 is generated by using the logistic map and another initial condition K 2 Fig. 3. Extraction of Watermark. 1) The DCT transform of the test image is computed and saved in a vector ˆv i. 2) The same sequence P 1 used in embedding process is generated by using logistic map and the secret key K 1. 3) The same sequence P 2 corresponding to secret positions are generated by using logistic map and the secret key K 2. 4) Recover bits of the watermark A by using equation (5). P (i) = { 1 if (j+1).cr 1 i=j.cr p i.ˆv i > 0 1 if (j+1).cr 1 i=j.cr p i.ˆv i < 0 (5)
3 IV. PROPOSED SCHEME The watermarking algorithm proposed in this work is the result of two modifications introduced on the algorithm described in the previous section; The image is divided into blocs of dimension 8 8 and the DCT is computed for each bloc. the watermark is introduced in the middle band of the spectrum of the blocs. In the Following we describe the embedding and extracting algorithms resulting from these modifications A. Watermark Embedding Algorithm The embedding algorithm is shown in fig.iii-a; it is the same described above with the following differences To insert between the coefficients AC 6 and AC 27, we must have: 6 Y (i) (8) Since P 2 takes values in the interval [0, 1] the inequality (8) is verified if { b 63 = 6 (9) (a + b) 63 = 27 From Equation (8) and (9) we find the following system: { b = 6/63 (10) a = 21/63 So Y (i) = P 2(i) + 6 (11) 63 Since Y must contain the vector of integers giving the order of location of the mark, then we multiply each element by 63 and then round it to the nearest integer. We must ensure that there are L different positions of embedding. 5) Now we apply the function I.zigzag (Inverse Zigzag) to return to the 8x8 matrix form. Fig. 4. Proposed insertion algorithm. 1) The DCT is computed using 8x8 DCT block transformation. 2) The zigzag transformation is applied to arrange the spectral components in low, medium and high frequency. This will allow to put the watermark in the medium frequency. 3) We set a threshold K to convert elements of sequence (in real value) into binary element (+1/-1), according to the following formula: Fig. 5. Inverse zigzag transform of a vector to 64 coefficients. After the realization of I.Zigzag for each bloc, we must rearrange the blocs to get a single MxN matrix (Fig.6). { 1 P1 (i) > K P (i) = 1 P 1 (i) < K in the following we use the threshold (k=0.5). 4) To insert the watermark in the medium frequency band, we must find a linear transformation of Y values in the desired range. This equation is: (6) Y (i) = a.p 2 (i) + b (7) Fig. 6. Rearrangement of the 8x8 blocs.
4 We use both equations (3) and (4) to insert the watermark in the spread secret position B specified in the matrix MxN. B. Watermark Extracting Algorithm The extracting algorithm is illustrated in fig.7; it is done following the steps bellow. Where M and M are the matrices corresponding to the original A and the extracted A watermark images. { 1 if A(i, j) = 0 M(i, j) = 1 if A(i, j) = 1 and M (i, j) = { 1 if A (i, j) = 0 1 if A (i, j) = 1 The normalized correlation coefficient (NC) takes values between 0 (random relationship) to 1(perfect relationship). VI. EXPERIMENT RESULTS We used Lena 512 x 512 GIF images with 256 gray levels for our experiments. The watermark is 16 x 32 BMP image. We program the watermarking algorithm above by using MATLAB 7, and then the watermarked image is tested with some typical attacks. We considered intentional geometric attacks e.g.rotation, scaling and cropping. We have chosen K 1 = 0.2 and K 2 = 0.35 to obtain two logistic sequences. We use α = 16 for watermarking strength factor and spreading factor cr = 16. A. Robustness against geometric attacks The experimental results are shown as follows: Fig. 7. Proposed extracting algorithm. 1) We transform the original image in the frequency domain by using 8x8 DCT block transformation, then we apply the zigzag function on all 8x8 DCT blocks. 2) Generate the same chaotic sequence P 1 using the logistic map with the same initial condition K 1. 3) Generate the same secret positions; that we used when inserting watermark; the logistic with the same initial condition K 2. 4) Recover the watermark by using the equation (5). Fig. 8. (a) (b) (a)the original image of Lena. (b) The original binary watermark. V. EVALUATION CRITERIA OF A WATERMARKING SYSTEM The peak signal-to-noise ratio (PSNR) is used to evaluate the similarity between the attacked and the original images. The PSNR is defined by P SNR = 10.log 10 ( MN max X 2 (i,j) i,j [X(i,j) X (i,j)] 2 The normalized correlation coefficient (NC) is another criterion used to evaluate the existence and the quality of the extracted watermark. When we use a watermark image A of dimension N 1 xn 2, it is defined by ) (a) (b) NC = N1 i=1 N1 N2 [M(i,j) M (i,j)] i=1 j=1 N2 N1 N2 j=1 [M(i,j)]2 [M (i,j)] 2 i=1 j=1 Fig. 9. (a) Watermarked Lena with PSNR=42.05dB. (b) The extracted watermark with NC=1.
5 Fig.8 show the original image and the original watermark; Fig.9 show the watermarked image and the extracted watermark. The PSNR between the original and the watermarked images is 42.05, and we can hardly perceive the change of the original image. Also the extracted watermark is identical to the inserted watermark. TABLE IV COMPARISON WITH RINALDI MUNIR ALGORITHM. TABLE I CROPPING. Table I presents a different locations and percentage of cropping applied to the watermarked Lenna image. We can see that the watermarking algorithm is very robust to cropping attack. The spread spectrum watermark allows us to have more chance to extract the pixels after this type of attacks. TABLE II SCALING THE IMAGE. Table II presents a scaling attack, an image of size 512 x 512 is first scaled to 256 x 256 then the scaled image is opened and resized back to 512 x 512. Table III presents a rotation attack obtained by rotating the watermarked image with low angle then cropping the image to obtain the same size of the original image, the rotation is positive when it is done in the sense of the clock wise. TABLE III ROTATING THE IMAGE. B. Comparison with Rinaldi Munir Algorithm We compare the proposed method with R.munir and al[2] using the Lena image. The watermark consists of 256 bits 1 and 256 bits 0. The results are shown in Table IV; the PSNR of the proposed method is better than those of [2], however it is far better for cropping, scaling and rotation with degree of 0.25, but it is not so good for the rotation attacks with degree greater than VII. CONCLUSION In this paper, a spread spectrum watermarking in middle frequency scheme was proposed. This scheme, firstly, use the logistic map to determine the secret position, in the 8 x 8 DCT block coefficients, this secret positions belong to the middle frequency in the aim to improve the invisibility of the watermark without degrading similarity. The extraction of watermark depends on private keys of logistic map used in the embedding algorithm. Simulations confirmed that this scheme has high fidelity and is robust against geometric attacks and geometric transformations. furthermore, the one who don t know the key can t know the position of the watermark embedded in, and the watermark is not easy to be extracted or modified, so this scheme is secure. REFERENCES [1] F. Hartung, and B. Girod, Fast Public-Key Watermarking of Compressed Video, Proceedings of the International Conference on Image Processing,1997. [2] R. Munir and al, Secure Spread Spectrum Watermarking Algorithm Based on Chaotic Map for Still Images, Proceedings of the International Conference on Electrical Engineering and Informatics, Institut Teknologi Bandung, Indonesia June 17-19, [3] S. H. Wang and Y. P. Lin, Wavelet tree quantization for copyright protection watermarking, IEEE Trans. Image Processing, vol. 13, pp , Feb [4] B.K.Lien and W.H. Lin, A watermarking method based on maximum distance wavelet tree quantization, In Conf, [5] E.Li, H.Liang et X.Niu, An integer wavelet based multiple logowatermarking scheme, IEEE, In Proc, [6] W.H.Lin, Y.R.Wang et S.J.Horng, A Blind Watermarking Scheme Based on Wavelet Tree Quantization, IEEE, In Proc, [7] Yanling Wang et XiuhuaJi, A New Algorithm For Watermarking Based On DCT and Chaotic Scrambling, IEEE, In Proc, [8] Zhao Yantao et al, A robust chaos-based DCT-domain watermarking algorithm, IEEE,In Proc, [9] J. Cox and al, Secure Spread Spectrum Watermarking for Multimedia, IEEE Transactions On Image Processing,VOL. 6, NO. 12, December [10] A.Briassouli and al, Hidden Messages in Heavy-Tails: DCT-Domain Watermark Detection Using Alpha-Stable Models, IEEE Transaction Multimedia,VOL. 7, NO. 4, August 2005.
Image Authentication Scheme using Digital Signature and Digital Watermarking
www..org 59 Image Authentication Scheme using Digital Signature and Digital Watermarking Seyed Mohammad Mousavi Industrial Management Institute, Tehran, Iran Abstract Usual digital signature schemes for
More informationA Secure File Transfer based on Discrete Wavelet Transformation and Audio Watermarking Techniques
A Secure File Transfer based on Discrete Wavelet Transformation and Audio Watermarking Techniques Vineela Behara,Y Ramesh Department of Computer Science and Engineering Aditya institute of Technology and
More information2695 P a g e. IV Semester M.Tech (DCN) SJCIT Chickballapur Karnataka India
Integrity Preservation and Privacy Protection for Digital Medical Images M.Krishna Rani Dr.S.Bhargavi IV Semester M.Tech (DCN) SJCIT Chickballapur Karnataka India Abstract- In medical treatments, the integrity
More informationSecurity and protection of digital images by using watermarking methods
Security and protection of digital images by using watermarking methods Andreja Samčović Faculty of Transport and Traffic Engineering University of Belgrade, Serbia Gjovik, june 2014. Digital watermarking
More informationMulti-factor Authentication in Banking Sector
Multi-factor Authentication in Banking Sector Tushar Bhivgade, Mithilesh Bhusari, Ajay Kuthe, Bhavna Jiddewar,Prof. Pooja Dubey Department of Computer Science & Engineering, Rajiv Gandhi College of Engineering
More informationReversible Data Hiding for Security Applications
Reversible Data Hiding for Security Applications Baig Firdous Sulthana, M.Tech Student (DECS), Gudlavalleru engineering college, Gudlavalleru, Krishna (District), Andhra Pradesh (state), PIN-521356 S.
More informationA Digital Audio Watermark Embedding Algorithm
Xianghong Tang, Yamei Niu, Hengli Yue, Zhongke Yin Xianghong Tang, Yamei Niu, Hengli Yue, Zhongke Yin School of Communication Engineering, Hangzhou Dianzi University, Hangzhou, Zhejiang, 3008, China tangxh@hziee.edu.cn,
More informationWatermarking Techniques for Protecting Intellectual Properties in a Digital Environment
Watermarking Techniques for Protecting Intellectual Properties in a Digital Environment Isinkaye F. O*. and Aroge T. K. Department of Computer Science and Information Technology University of Science and
More informationIntroduction to image coding
Introduction to image coding Image coding aims at reducing amount of data required for image representation, storage or transmission. This is achieved by removing redundant data from an image, i.e. by
More informationDynamic Binary Location based Multi-watermark Embedding Algorithm in DWT
Dynamic Binary Location based Multi-watermark Embedding Algorithm in DWT Ammar Jameel Hussein, Seda Yuksel, and Ersin Elbasi Abstract In order to achieve a good imperceptibility and robustness, using 4-level
More informationVolume 2, Issue 12, December 2014 International Journal of Advance Research in Computer Science and Management Studies
Volume 2, Issue 12, December 2014 International Journal of Advance Research in Computer Science and Management Studies Research Article / Survey Paper / Case Study Available online at: www.ijarcsms.com
More informationSecurity Based Data Transfer and Privacy Storage through Watermark Detection
Security Based Data Transfer and Privacy Storage through Watermark Detection Gowtham.T 1 Pradeep Kumar.G 2 1PG Scholar, Applied Electronics, Nandha Engineering College, Anna University, Erode, India. 2Assistant
More informationWATERMARKING FOR IMAGE AUTHENTICATION
WATERMARKING FOR IMAGE AUTHENTICATION Min Wu Bede Liu Department of Electrical Engineering Princeton University, Princeton, NJ 08544, USA Fax: +1-609-258-3745 {minwu, liu}@ee.princeton.edu ABSTRACT A data
More informationImage Compression through DCT and Huffman Coding Technique
International Journal of Current Engineering and Technology E-ISSN 2277 4106, P-ISSN 2347 5161 2015 INPRESSCO, All Rights Reserved Available at http://inpressco.com/category/ijcet Research Article Rahul
More informationMultimedia Document Authentication using On-line Signatures as Watermarks
Multimedia Document Authentication using On-line Signatures as Watermarks Anoop M Namboodiri and Anil K Jain Department of Computer Science and Engineering Michigan State University East Lansing, MI 48824
More informationInternational Journal of Computer Sciences and Engineering Open Access. A novel technique to hide information using Daubechies Transformation
International Journal of Computer Sciences and Engineering Open Access Research Paper Volume-4, Special Issue-1 E-ISSN: 2347-2693 A novel technique to hide information using Daubechies Transformation Jyotsna
More informationCHAPTER 7 CONCLUSION AND FUTURE WORK
158 CHAPTER 7 CONCLUSION AND FUTURE WORK The aim of this thesis was to present robust watermarking techniques for medical image. Section 7.1, consolidates the contributions made by the researcher and Section
More informationCombating Anti-forensics of Jpeg Compression
IJCSI International Journal of Computer Science Issues, Vol. 9, Issue 6, No 3, November 212 ISSN (Online): 1694-814 www.ijcsi.org 454 Combating Anti-forensics of Jpeg Compression Zhenxing Qian 1, Xinpeng
More informationKeywords Android, Copyright Protection, Discrete Cosine Transform (DCT), Digital Watermarking, Discrete Wavelet Transform (DWT), YCbCr.
Volume 3, Issue 7, July 2013 ISSN: 2277 128X International Journal of Advanced Research in Computer Science and Software Engineering Research Paper Available online at: www.ijarcsse.com Web Based Novel
More informationVideo Authentication for H.264/AVC using Digital Signature Standard and Secure Hash Algorithm
Video Authentication for H.264/AVC using Digital Signature Standard and Secure Hash Algorithm Nandakishore Ramaswamy Qualcomm Inc 5775 Morehouse Dr, Sam Diego, CA 92122. USA nandakishore@qualcomm.com K.
More informationAn Incomplete Cryptography based Digital Rights Management with DCFF
An Incomplete Cryptography based Digital Rights Management with DCFF Ta Minh Thanh Department of Computer Science Tokyo Institute of Technology 2-12-2, Ookayama, Meguro, Tokyo, 152-8552, Japan. Email:thanhtm@ks.cs.titech.ac.jp
More informationA Robust and Lossless Information Embedding in Image Based on DCT and Scrambling Algorithms
A Robust and Lossless Information Embedding in Image Based on DCT and Scrambling Algorithms Dr. Mohammad V. Malakooti Faculty and Head of Department of Computer Engineering, Islamic Azad University, UAE
More informationRobust Blind Watermarking Mechanism For Point Sampled Geometry
Robust Blind Watermarking Mechanism For Point Sampled Geometry Parag Agarwal Balakrishnan Prabhakaran Department of Computer Science, University of Texas at Dallas MS EC 31, PO Box 830688, Richardson,
More informationA Novel Method to Improve Resolution of Satellite Images Using DWT and Interpolation
A Novel Method to Improve Resolution of Satellite Images Using DWT and Interpolation S.VENKATA RAMANA ¹, S. NARAYANA REDDY ² M.Tech student, Department of ECE, SVU college of Engineering, Tirupati, 517502,
More informationJPEG Image Compression by Using DCT
International Journal of Computer Sciences and Engineering Open Access Research Paper Volume-4, Issue-4 E-ISSN: 2347-2693 JPEG Image Compression by Using DCT Sarika P. Bagal 1* and Vishal B. Raskar 2 1*
More informationA comprehensive survey on various ETC techniques for secure Data transmission
A comprehensive survey on various ETC techniques for secure Data transmission Shaikh Nasreen 1, Prof. Suchita Wankhade 2 1, 2 Department of Computer Engineering 1, 2 Trinity College of Engineering and
More informationDYNAMIC DOMAIN CLASSIFICATION FOR FRACTAL IMAGE COMPRESSION
DYNAMIC DOMAIN CLASSIFICATION FOR FRACTAL IMAGE COMPRESSION K. Revathy 1 & M. Jayamohan 2 Department of Computer Science, University of Kerala, Thiruvananthapuram, Kerala, India 1 revathysrp@gmail.com
More informationA Lightweight Rao-Cauchy Detector for Additive Watermarking in the DWT-Domain
A Lightweight Rao-Cauchy Detector for Additive Watermarking in the DWT-Domain Roland Kwitt, Peter Meerwald, Andreas Uhl Dept. of Computer Sciences, University of Salzburg, Austria E-Mail: {rkwitt, pmeerw,
More informationEfficient Data Recovery scheme in PTS-Based OFDM systems with MATRIX Formulation
Efficient Data Recovery scheme in PTS-Based OFDM systems with MATRIX Formulation Sunil Karthick.M PG Scholar Department of ECE Kongu Engineering College Perundurau-638052 Venkatachalam.S Assistant Professor
More informationExample #1: Controller for Frequency Modulated Spectroscopy
Progress Report Examples The following examples are drawn from past student reports, and illustrate how the general guidelines can be applied to a variety of design projects. The technical details have
More informationROI Based Medical Image Watermarking with Zero Distortion and Enhanced Security
I.J. Modern Education and Computer Science, 2014, 10, 40-48 Published Online October 2014 in MECS (http://www.mecs-press.org/) DOI: 10.5815/ijmecs.2014.10.06 ROI Based Medical Image Watermarking with Zero
More informationSECURE DATA TRANSMISSION USING DIGITAL IMAGE WATERMARKING
SECURE DATA TRANSMISSION USING DIGITAL IMAGE WATERMARKING 1 Maulik Srivastava, 2 Anuradha Sharma 1,2 Department of Computer Science & Engineering, Amity University, Uttar Pradesh Abstract: As we all know
More informationInternational Journal of Emerging Technology and Advanced Engineering Website: www.ijetae.com (ISSN 2250-2459, Volume 2, Issue 9, September 2012)
Authentication of Medical Images using Integer Transforms A.Kannammal 1, Dr.S.Subha Rani 2 1 Assistant professor, 2 Professor and Head, ECE Department, PSG College of Technology, Peelamedu, Coimbatore
More informationKeywords: Image complexity, PSNR, Levenberg-Marquardt, Multi-layer neural network.
Global Journal of Computer Science and Technology Volume 11 Issue 3 Version 1.0 Type: Double Blind Peer Reviewed International Research Journal Publisher: Global Journals Inc. (USA) Online ISSN: 0975-4172
More informationTCOM 370 NOTES 99-4 BANDWIDTH, FREQUENCY RESPONSE, AND CAPACITY OF COMMUNICATION LINKS
TCOM 370 NOTES 99-4 BANDWIDTH, FREQUENCY RESPONSE, AND CAPACITY OF COMMUNICATION LINKS 1. Bandwidth: The bandwidth of a communication link, or in general any system, was loosely defined as the width of
More informationSachin Dhawan Deptt. of ECE, UIET, Kurukshetra University, Kurukshetra, Haryana, India
Abstract Image compression is now essential for applications such as transmission and storage in data bases. In this paper we review and discuss about the image compression, need of compression, its principles,
More informationInvisible Image Water Marking Using Hybrid DWT Compression/Decompression Technique
Invisible Image Water Marking Using Hybrid DWT Compression/Decompression Technique B.Sai Kiran M.Tech (VLSI), CMR Institute of Technology. Mr.Shahbaz Khan Associate Professor, CMR Institute of Technology.
More informationJPEG compression of monochrome 2D-barcode images using DCT coefficient distributions
Edith Cowan University Research Online ECU Publications Pre. JPEG compression of monochrome D-barcode images using DCT coefficient distributions Keng Teong Tan Hong Kong Baptist University Douglas Chai
More informationADVANCED APPLICATIONS OF ELECTRICAL ENGINEERING
Development of a Software Tool for Performance Evaluation of MIMO OFDM Alamouti using a didactical Approach as a Educational and Research support in Wireless Communications JOSE CORDOVA, REBECA ESTRADA
More informationFFT Algorithms. Chapter 6. Contents 6.1
Chapter 6 FFT Algorithms Contents Efficient computation of the DFT............................................ 6.2 Applications of FFT................................................... 6.6 Computing DFT
More informationVideo-Conferencing System
Video-Conferencing System Evan Broder and C. Christoher Post Introductory Digital Systems Laboratory November 2, 2007 Abstract The goal of this project is to create a video/audio conferencing system. Video
More informationSOFTWARE AND HARDWARE-IN-THE-LOOP MODELING OF AN AUDIO WATERMARKING ALGORITHM. Ismael Zárate Orozco, B.E. Thesis Prepared for the Degree of
SOFTWARE AND HARDWARE-IN-THE-LOOP MODELING OF AN AUDIO WATERMARKING ALGORITHM Ismael Zárate Orozco, B.E. Thesis Prepared for the Degree of MASTER OF SCIENCE UNIVERSITY OF NORTH TEXAS December 2010 APPROVED:
More informationEricsson T18s Voice Dialing Simulator
Ericsson T18s Voice Dialing Simulator Mauricio Aracena Kovacevic, Anna Dehlbom, Jakob Ekeberg, Guillaume Gariazzo, Eric Lästh and Vanessa Troncoso Dept. of Signals Sensors and Systems Royal Institute of
More informationPerformance Analysis and Comparison of JM 15.1 and Intel IPP H.264 Encoder and Decoder
Performance Analysis and Comparison of 15.1 and H.264 Encoder and Decoder K.V.Suchethan Swaroop and K.R.Rao, IEEE Fellow Department of Electrical Engineering, University of Texas at Arlington Arlington,
More informationDepartment of Electrical and Computer Engineering Ben-Gurion University of the Negev. LAB 1 - Introduction to USRP
Department of Electrical and Computer Engineering Ben-Gurion University of the Negev LAB 1 - Introduction to USRP - 1-1 Introduction In this lab you will use software reconfigurable RF hardware from National
More informationColour Image Encryption and Decryption by using Scan Approach
Colour Image Encryption and Decryption by using Scan Approach, Rinkee Gupta,Master of Engineering Scholar, Email: guptarinki.14@gmail.com Jaipal Bisht, Asst. Professor Radharaman Institute Of Technology
More informationEfficient Coding Unit and Prediction Unit Decision Algorithm for Multiview Video Coding
JOURNAL OF ELECTRONIC SCIENCE AND TECHNOLOGY, VOL. 13, NO. 2, JUNE 2015 97 Efficient Coding Unit and Prediction Unit Decision Algorithm for Multiview Video Coding Wei-Hsiang Chang, Mei-Juan Chen, Gwo-Long
More informationHSI BASED COLOUR IMAGE EQUALIZATION USING ITERATIVE n th ROOT AND n th POWER
HSI BASED COLOUR IMAGE EQUALIZATION USING ITERATIVE n th ROOT AND n th POWER Gholamreza Anbarjafari icv Group, IMS Lab, Institute of Technology, University of Tartu, Tartu 50411, Estonia sjafari@ut.ee
More informationINTER CARRIER INTERFERENCE CANCELLATION IN HIGH SPEED OFDM SYSTEM Y. Naveena *1, K. Upendra Chowdary 2
ISSN 2277-2685 IJESR/June 2014/ Vol-4/Issue-6/333-337 Y. Naveena et al./ International Journal of Engineering & Science Research INTER CARRIER INTERFERENCE CANCELLATION IN HIGH SPEED OFDM SYSTEM Y. Naveena
More informationLess naive Bayes spam detection
Less naive Bayes spam detection Hongming Yang Eindhoven University of Technology Dept. EE, Rm PT 3.27, P.O.Box 53, 5600MB Eindhoven The Netherlands. E-mail:h.m.yang@tue.nl also CoSiNe Connectivity Systems
More informationUsing fractal compression scheme to embed a digital signature into an image
Using fractal compression scheme to embed a digital signature into an image Joan Puate, Fred Jordan Swiss federal institute of technology Signal Processing Laboratory CH-1015 Lausanne Switzerland Email:
More informationTracking Moving Objects In Video Sequences Yiwei Wang, Robert E. Van Dyck, and John F. Doherty Department of Electrical Engineering The Pennsylvania State University University Park, PA16802 Abstract{Object
More informationHybrid DCT-DWT Watermarking and IDEA Encryption of Internet Contents
IJCSI International Journal of Computer Science Issues, Vol. 9, Issue 1, o, January 01 www.ijcsi.org 394 Hybrid Watermarking and IDEA Encryption of Internet Contents M.A. Mohamed and A.M. El-Mohandes Electronics
More informationRedundant Wavelet Transform Based Image Super Resolution
Redundant Wavelet Transform Based Image Super Resolution Arti Sharma, Prof. Preety D Swami Department of Electronics &Telecommunication Samrat Ashok Technological Institute Vidisha Department of Electronics
More informationA Concept of Digital Picture Envelope for Internet Communication
A Concept of Digital Picture Envelope for Internet Communication Eiji Kawaguchi, Koichi Nozaki, Michiharu Niimi, Hideki Noda and Richard O. Eason Kyushu Institute of Technology 1-1 Sensui-cho, Tobata,
More informationDIGITAL IMAGE PROCESSING AND ANALYSIS
DIGITAL IMAGE PROCESSING AND ANALYSIS Human and Computer Vision Applications with CVIPtools SECOND EDITION SCOTT E UMBAUGH Uffi\ CRC Press Taylor &. Francis Group Boca Raton London New York CRC Press is
More informationIMAGE STEGANOGRAPHY FOR SECURE DATA TRANSMISSION USING BLOWFISH ALGORITHM
IMAGE STEGANOGRAPHY FOR SECURE DATA TRANSMISSION USING BLOWFISH ALGORITHM BARJINDER SINGH 1, BALPREET KAUR 2, RANJOT KAUR 3 1 Research Scholar at BBSBEC, Fatehgarh sahib 2 Lecturer at BBSBEC Fatehgarh
More informationPIXEL-LEVEL IMAGE FUSION USING BROVEY TRANSFORME AND WAVELET TRANSFORM
PIXEL-LEVEL IMAGE FUSION USING BROVEY TRANSFORME AND WAVELET TRANSFORM Rohan Ashok Mandhare 1, Pragati Upadhyay 2,Sudha Gupta 3 ME Student, K.J.SOMIYA College of Engineering, Vidyavihar, Mumbai, Maharashtra,
More informationCDMA TECHNOLOGY. Brief Working of CDMA
CDMA TECHNOLOGY History of CDMA The Cellular Challenge The world's first cellular networks were introduced in the early 1980s, using analog radio transmission technologies such as AMPS (Advanced Mobile
More informationHow To Filter Spam Image From A Picture By Color Or Color
Image Content-Based Email Spam Image Filtering Jianyi Wang and Kazuki Katagishi Abstract With the population of Internet around the world, email has become one of the main methods of communication among
More informationPCM Encoding and Decoding:
PCM Encoding and Decoding: Aim: Introduction to PCM encoding and decoding. Introduction: PCM Encoding: The input to the PCM ENCODER module is an analog message. This must be constrained to a defined bandwidth
More informationA Feature Selection Methodology for Steganalysis
A Feature Selection Methodology for Steganalysis Yoan Miche 1, Benoit Roue 2, Amaury Lendasse 1, Patrick Bas 12 1 Laboratory of Computer and Information Science Helsinki University of Technology P.O. Box
More informationImplementation of Digital Signal Processing: Some Background on GFSK Modulation
Implementation of Digital Signal Processing: Some Background on GFSK Modulation Sabih H. Gerez University of Twente, Department of Electrical Engineering s.h.gerez@utwente.nl Version 4 (February 7, 2013)
More informationIntroduction to Medical Image Compression Using Wavelet Transform
National Taiwan University Graduate Institute of Communication Engineering Time Frequency Analysis and Wavelet Transform Term Paper Introduction to Medical Image Compression Using Wavelet Transform 李 自
More informationHow To Improve Performance Of The H264 Video Codec On A Video Card With A Motion Estimation Algorithm
Implementation of H.264 Video Codec for Block Matching Algorithms Vivek Sinha 1, Dr. K. S. Geetha 2 1 Student of Master of Technology, Communication Systems, Department of ECE, R.V. College of Engineering,
More informationNon-negative Matrix Factorization (NMF) in Semi-supervised Learning Reducing Dimension and Maintaining Meaning
Non-negative Matrix Factorization (NMF) in Semi-supervised Learning Reducing Dimension and Maintaining Meaning SAMSI 10 May 2013 Outline Introduction to NMF Applications Motivations NMF as a middle step
More informationIN current film media, the increase in areal density has
IEEE TRANSACTIONS ON MAGNETICS, VOL. 44, NO. 1, JANUARY 2008 193 A New Read Channel Model for Patterned Media Storage Seyhan Karakulak, Paul H. Siegel, Fellow, IEEE, Jack K. Wolf, Life Fellow, IEEE, and
More informationSampling Theorem Notes. Recall: That a time sampled signal is like taking a snap shot or picture of signal periodically.
Sampling Theorem We will show that a band limited signal can be reconstructed exactly from its discrete time samples. Recall: That a time sampled signal is like taking a snap shot or picture of signal
More informationBandwidth Adaptation for MPEG-4 Video Streaming over the Internet
DICTA2002: Digital Image Computing Techniques and Applications, 21--22 January 2002, Melbourne, Australia Bandwidth Adaptation for MPEG-4 Video Streaming over the Internet K. Ramkishor James. P. Mammen
More informationA Secure Data Transmission By Integrating Cryptography And Video Steganography
A Secure Data Transmission By Integrating Cryptography And Video Steganography Shafna P K Computer Science Department KMEA Engineering College Ernakulam, India shabanapk9999@gmail.com Abstract Advances
More informationImage Compression and Decompression using Adaptive Interpolation
Image Compression and Decompression using Adaptive Interpolation SUNILBHOOSHAN 1,SHIPRASHARMA 2 Jaypee University of Information Technology 1 Electronicsand Communication EngineeringDepartment 2 ComputerScience
More informationSCAN-CA Based Image Security System
SCAN-CA Based Image Security System Bhagyashree.S.Anantwar 1, S.P.Sonavane 2 Student, Department of Computer Science and Engg, Walchand College of Engg, Sanli, India 1 Asso. Professor, Department of Information
More informationPerformance Verification of Super-Resolution Image Reconstruction
Performance Verification of Super-Resolution Image Reconstruction Masaki Sugie Department of Information Science, Kogakuin University Tokyo, Japan Email: em13010@ns.kogakuin.ac.jp Seiichi Gohshi Department
More informationEuler Vector: A Combinatorial Signature for Gray-Tone Images
Euler Vector: A Combinatorial Signature for Gray-Tone Images Arijit Bishnu, Bhargab B. Bhattacharya y, Malay K. Kundu, C. A. Murthy fbishnu t, bhargab, malay, murthyg@isical.ac.in Indian Statistical Institute,
More informationNEW YORK STATE TEACHER CERTIFICATION EXAMINATIONS
NEW YORK STATE TEACHER CERTIFICATION EXAMINATIONS TEST DESIGN AND FRAMEWORK September 2014 Authorized for Distribution by the New York State Education Department This test design and framework document
More informationExperimental DRM Architecture Using Watermarking and PKI
Experimental DRM Architecture Using Watermarking and PKI Mikko Löytynoja, Tapio Seppänen, Nedeljko Cvejic MediaTeam Oulu Information Processing Laboratory University of Oulu, Finland {mikko.loytynoja,
More informationThis document is downloaded from DR-NTU, Nanyang Technological University Library, Singapore.
This document is downloaded from DR-NTU, Nanyang Technological University Library, Singapore. Title Transcription of polyphonic signals using fast filter bank( Accepted version ) Author(s) Foo, Say Wei;
More informationA deterministic fractal is an image which has low information content and no inherent scale.
FRACTAL IMAGE COMPRESSION: A RESOLUTION INDEPENDENT REPRESENTATION FOR IMAGER?? Alan D. Sloan 5550 Peachtree Parkway Iterated Systems, Inc. Norcross, Georgia 30092 1. Background A deterministic fractal
More informationSteganographyinaVideoConferencingSystem? AndreasWestfeld1andGrittaWolf2 2InstituteforOperatingSystems,DatabasesandComputerNetworks 1InstituteforTheoreticalComputerScience DresdenUniversityofTechnology
More informationAn Efficient Architecture for Image Compression and Lightweight Encryption using Parameterized DWT
An Efficient Architecture for Image Compression and Lightweight Encryption using Parameterized DWT Babu M., Mukuntharaj C., Saranya S. Abstract Discrete Wavelet Transform (DWT) based architecture serves
More informationMPEG Unified Speech and Audio Coding Enabling Efficient Coding of both Speech and Music
ISO/IEC MPEG USAC Unified Speech and Audio Coding MPEG Unified Speech and Audio Coding Enabling Efficient Coding of both Speech and Music The standardization of MPEG USAC in ISO/IEC is now in its final
More informationEstablishing the Uniqueness of the Human Voice for Security Applications
Proceedings of Student/Faculty Research Day, CSIS, Pace University, May 7th, 2004 Establishing the Uniqueness of the Human Voice for Security Applications Naresh P. Trilok, Sung-Hyuk Cha, and Charles C.
More informationCommon Core Unit Summary Grades 6 to 8
Common Core Unit Summary Grades 6 to 8 Grade 8: Unit 1: Congruence and Similarity- 8G1-8G5 rotations reflections and translations,( RRT=congruence) understand congruence of 2 d figures after RRT Dilations
More informationStudy and Implementation of Video Compression Standards (H.264/AVC and Dirac)
Project Proposal Study and Implementation of Video Compression Standards (H.264/AVC and Dirac) Sumedha Phatak-1000731131- sumedha.phatak@mavs.uta.edu Objective: A study, implementation and comparison of
More informationRegion of Interest Access with Three-Dimensional SBHP Algorithm CIPR Technical Report TR-2006-1
Region of Interest Access with Three-Dimensional SBHP Algorithm CIPR Technical Report TR-2006-1 Ying Liu and William A. Pearlman January 2006 Center for Image Processing Research Rensselaer Polytechnic
More informationDCT-JPEG Image Coding Based on GPU
, pp. 293-302 http://dx.doi.org/10.14257/ijhit.2015.8.5.32 DCT-JPEG Image Coding Based on GPU Rongyang Shan 1, Chengyou Wang 1*, Wei Huang 2 and Xiao Zhou 1 1 School of Mechanical, Electrical and Information
More informationBig Ideas in Mathematics
Big Ideas in Mathematics which are important to all mathematics learning. (Adapted from the NCTM Curriculum Focal Points, 2006) The Mathematics Big Ideas are organized using the PA Mathematics Standards
More informationLog-Likelihood Ratio-based Relay Selection Algorithm in Wireless Network
Recent Advances in Electrical Engineering and Electronic Devices Log-Likelihood Ratio-based Relay Selection Algorithm in Wireless Network Ahmed El-Mahdy and Ahmed Walid Faculty of Information Engineering
More informationSuper-resolution method based on edge feature for high resolution imaging
Science Journal of Circuits, Systems and Signal Processing 2014; 3(6-1): 24-29 Published online December 26, 2014 (http://www.sciencepublishinggroup.com/j/cssp) doi: 10.11648/j.cssp.s.2014030601.14 ISSN:
More informationModelling, Extraction and Description of Intrinsic Cues of High Resolution Satellite Images: Independent Component Analysis based approaches
Modelling, Extraction and Description of Intrinsic Cues of High Resolution Satellite Images: Independent Component Analysis based approaches PhD Thesis by Payam Birjandi Director: Prof. Mihai Datcu Problematic
More informationECE 533 Project Report Ashish Dhawan Aditi R. Ganesan
Handwritten Signature Verification ECE 533 Project Report by Ashish Dhawan Aditi R. Ganesan Contents 1. Abstract 3. 2. Introduction 4. 3. Approach 6. 4. Pre-processing 8. 5. Feature Extraction 9. 6. Verification
More informationAutomatic Detection of Emergency Vehicles for Hearing Impaired Drivers
Automatic Detection of Emergency Vehicles for Hearing Impaired Drivers Sung-won ark and Jose Trevino Texas A&M University-Kingsville, EE/CS Department, MSC 92, Kingsville, TX 78363 TEL (36) 593-2638, FAX
More informationA Study of Direct Sequence Spread Spectrum Technique for Data Compression Purpose
3 ÒÃÈÖ ÉÒà ¹Ô ä àãç «Õà Çé¹Êà» Êà»ç µãñá ྠèí ÒÃãªé Ò¹ Ò éò¹ ÒúպÍÑ éíáùå Óà Ãѵ¹ì ÍÁÃÃÑ ÉÒ 1 ÁËÒÇÔ ÂÒÅÑÂà â¹âåâõ¾ãð ÍÁà ÅéÒ ¹ºØÃÕ ºÒ Á Øè ÃØ ÃØ à ¾Ï 10140 º Ñ ÂèÍ Ò¹ÇÔ Ñ¹Õéä éí ÔºÒÂ Ö ÇÔ Õ ÒÃ˹Öè «Öè
More informationCurrent Standard: Mathematical Concepts and Applications Shape, Space, and Measurement- Primary
Shape, Space, and Measurement- Primary A student shall apply concepts of shape, space, and measurement to solve problems involving two- and three-dimensional shapes by demonstrating an understanding of:
More informationMultiple Embedding Using Robust Watermarks for Wireless Medical Images
Multiple Embedding Using Robust Watermarks for Wireless Medical Images Dominic Osborne and Derek Abbott Centre for Biomedical Engineering (CBME) The University of Adelaide, SA 5005, Australia Matthew Sorell
More informationTaking the Mystery out of the Infamous Formula, "SNR = 6.02N + 1.76dB," and Why You Should Care. by Walt Kester
ITRODUCTIO Taking the Mystery out of the Infamous Formula, "SR = 6.0 + 1.76dB," and Why You Should Care by Walt Kester MT-001 TUTORIAL You don't have to deal with ADCs or DACs for long before running across
More informationSignal to Noise Instrumental Excel Assignment
Signal to Noise Instrumental Excel Assignment Instrumental methods, as all techniques involved in physical measurements, are limited by both the precision and accuracy. The precision and accuracy of a
More informationActive Internet Traffic Filtering to Denial of Service Attacks from Flash Crowds
Active Internet Traffic Filtering to Denial of Service Attacks from Flash Crowds S.Saranya Devi 1, K.Kanimozhi 2 1 Assistant professor, Department of Computer Science and Engineering, Vivekanandha Institute
More informationQuality Estimation for Scalable Video Codec. Presented by Ann Ukhanova (DTU Fotonik, Denmark) Kashaf Mazhar (KTH, Sweden)
Quality Estimation for Scalable Video Codec Presented by Ann Ukhanova (DTU Fotonik, Denmark) Kashaf Mazhar (KTH, Sweden) Purpose of scalable video coding Multiple video streams are needed for heterogeneous
More informationCommunication on the Grassmann Manifold: A Geometric Approach to the Noncoherent Multiple-Antenna Channel
IEEE TRANSACTIONS ON INFORMATION THEORY, VOL. 48, NO. 2, FEBRUARY 2002 359 Communication on the Grassmann Manifold: A Geometric Approach to the Noncoherent Multiple-Antenna Channel Lizhong Zheng, Student
More information