# A Robust Image Watermark Algorithm for AD/DA Conversion

Save this PDF as:

Size: px
Start display at page:

## Transcription

2 give details on both the watermark embedding method and also the watermark extraction method. In Section 3, several tests are conducted in order to verify the effectiveness of the proposed algorithm. We conclude the paper in Section 4. II. CIRCULAR SHIFT WATERMARK In this paper, to embed the watermark, the method sets the standard pattern in frequency domain plane by using template and shifts circularly the pattern according to watermark information. Figure 1 shows the example of circular shift with angle (θ) of a specific pattern. The moving phase with angle (θ) for minimum basic unit, 1, is different according to the watermark payload amount for one specific pattern. Equation (1) shows the level value to embed x bits of information in the pattern. When the watermark information is increased by 1, the phase angle moves by, as shown in equation (2). level = 2 x (1) = / (2) Figure 2. Example of embedding watermark in frequency plane A. Embedding Watermark Figure 3 shows the order of embedding the watermark. Figure 1. Watermark embedding method using Circular Shift Figure 2 shows an example of embedded watermarks by producing multiple reference patterns. Figure 3. Order of watermark embedding 1) First, when the watermark embedding algorithm is started, a watermark message data and secret key are received as inputs, and a watermark embedding pattern data is generated based on the inputs. 2) In 1), based on the produced pattern, the watermark pattern is produced in order to be embedded in the original digital images with watermark embedding data. 3) The input digital image is transformed to frequency domain data by FFT (Fast Fourier Transform). 4) On the frequency domain of 3), the watermark pattern from 2) is embedded. 51

3 5) By using Inverse FFT, the image in the frequency domain is transformed into the image in the spatial domain. 6) To ensure the invisibility of embedded watermark, the strength of watermark is adjusted by using the visual masking method. Equation (3) shows the visual masking method. = + (1 ) (3) Here, WI : the watermark embedded digital image maskoffset : [ ], if the value is closer to 0, the image is closer to the original one. I: Original image : The final image after watermark embedding B. Extracting Watermark Figure 4 shows the order of extracting the watermark. 5) The embedded data are decoded by using the local maximum value of cross-correlation. To extract the watermark, the correlation value between the reference pattern of each frequency and the extracted signal from each frequency band is calculated. The maximum value is selected and the phase value on the point is measured, then the watermark is extracted using the measured value. To calculate the correlation value between signals of circular form in frequency domain, a polar transformation is used to change them to a 1 dimension array of the same size. The basic geometry of polar mapping is shown in Figure 5. Equally spaced concentric circles are drawn centered at the image center, and a number of equally spaced sectors are drawn. Pixels at the points of intersection of these circles and radial lines are plotted on a rectangular grid, and the resulting image is a polar view. In a log polar mapping, the radii of the concentric circles vary on a logarithmic scale [10][11]. Figure 5. Comparison between rectangular coordinate system and polar coordinate system Descartes coordinate plane: = + (4) Polar coordinate plane: = r, = θ, where = +, = arctan ( ) (5) Figure 4. Order of extracting watermark 1) The watermark embedded image is transformed to frequency domain by FFT. 2) By using polar mapping, the angle component of the image is translated to horizontal axis value and the radius component of the image is transformed to vertical axis value. 3) The reference pattern is generated with the key which is used for watermark embedding. 4) The cross-correlation value is calculated between the reference pattern in 3) and the value in 2) III. EXPERIMENT RESULTS Watermarks could hardly be extracted when a previous watermark algorithms, which is based on spread spectrum in spatial domain, was used for a robustness test against DA/AD conversion attack of Print-Scan method [5][12]. 52

4 TABLE 1. TEST ENVIRONMENTS Test components Settings Resolution 1024x1024 Resolution TABLE 2. CAPTURE ENVIRONMENTS Place (experiment Object environment) Printer HP Color LaserJet x720 Monitor (resolution: 1920x1080) Camera Message bit size Samsung galaxy S4 66bit 2M pixels (1920 x1080 included) Prints(color/resolution : 600 dpi) /outdoor PSNR 36.21dB SSIM Figure 6 shows the digital images which are used for tests. The test digital images are globe image, landscape, and video color bar image. For a performance test of our algorithm, we proceeded by taking photographs in several different environments. Table 1 shows the basic test environment. The resolution of original digital image is 1024 X The er is HP Color LaserJet 4650 for image ing. The camera is Samsung Galaxy S4 to take pictures. 66 bits of watermark payload are embedded and extracted from the taken pictures. The watermark payload does not include any error correction or error detection code. To evaluate the visual quality of the watermark embedded image, PSNR (Peak Signal to Noise Ratio) and SSIM (Structured Similarity Index Measure) are calculated. o PSNR Peak Signal-to-Noise Ratio : = 10 ( ) (6), h = 1 [ (, ) (, )] o SSIM Structured Similarity Index Measure (, ) = ( )( ) ( )( ), h = ( ), = ( ) = h h = 0.01, = 0.03 For taking pictures, Samsung Galaxy S4 is used. Table 2 shows the test conditions of: picture resolution, picture object, and picture place. Two image resolutions of 1280x720 and 1920x1080 are used. The output resolution for rendering in monitor is 1920x1080. In the case of ing papers, a color er with 600 dpi is used. In capturing from a monitor, only indoor light condition is target for test. However, in capturing from the ed papers, both indoor light and outdoor light are used for the test. (7) Figure 6. Digital images used for tests Figure 7 shows the example of extracting the watermark process: (a) is the result of 2 dimension FFT of the input digital image. To embed 66 bits, a total of 12 circular patterns are used with 11 patterns for message and 1 pattern for reference (b) shows 3 dimensional picture which renders the result of the cross correlation between the reference pattern and entire image values. It shows that the locations of maximum peak for phase are different according to the watermark information (c) shows the changes of maximum correlation values according to radius changes (d) shows the correlation value with the reference pattern. 53

5 (c) capture of monitor Figure 8. Example of the captured images in test Figure 7. Example of extracting watermark Figure 8 shows the captured image for watermark detection tests (a) is the camera captured image of the ed paper with watermark embedded in indoor environment (b) is the camera captured image of the ed paper with watermark embedded in outdoor environment (c) is the camera captured image of monitor screen with watermark embedded in indoor environment. Table 3 shows the test results to compare the performance of the proposed and spread spectrum method. The spread spectrum method was implemented by Kutter s method [5][6]. Success cases indicate no-error extraction cases with 66 bit data size. The performance of the algorithm is tested with the captured images of monitor and captured images of the ed images. When the watermarked digital image is displayed through indoor monitor, the results of extraction rate of same resolution capture is 32% and with 720p resolution is 58%. In the case of 600 dpi color ed on paper, extraction rate of 1920x1080 resolution is 83% and with 720p is 84% in indoor cases. In the outdoor case, those were 81% and 79% for 1080p and 720p cases respectively. TABLE 3. EXPERIMENTAL RESULTS Test Environment Proposed Result(Succes s cases/entire tries, extract rate) Spread spectrum Method (a) capture of ed paper Color ed in 600 dpi, 1920x /100 (83%) Color ed in 600 dpi, 1280x720 84/100 (84%) Outdoor Color ed in 600 dpi, 1920x /100 (83%) Outdoor Color ed in 600 dpi, 1280x720 79/100 (79%) (b) Outdoor capture of ed paper monitor Monitor resolution : 1920x1080, Captured resolution : 1920x /50 (32%) 3/100 (3%) Monitor resolution: 29/50 2/100 54

6 monitor 1920x1080, Captured resolution : 1280x720 IV. (58%) CONCLUSION (2%) In this paper, a strong watermark method against AD/DA transformation is proposed. In previous watermark algorithm approach in spatial domain, there is a disadvantage that the algorithm is weak at s-scan attacks, which is one very strong AD/DA attack. Our algorithm is proposed to overcome this disadvantage and can be extracted regardless of RST attack. This is implemented through a method that generates a reference template watermark pattern in the frequency domain, and extracts watermark using maximum peak location by calculating the correlation between reference pattern and the extracted pattern from the watermarked image. For evaluating the performance of the algorithm, tests were performed by capturing monitor output and ed images and extracting of watermarks. In the case of monitor output, our algorithm achieved 45% extraction rate on average. In the case of 600dpi color er, the extraction rate is 83.5% in indoor case, and 81% in outdoor case. Because those results are without error correction mechanisms, we can expect higher extraction rates if we apply it in the future. The performance of proposed algorithm is affected by the capture angle. Further research is required in this area. [6] M. Kutter, Watermarking resistant to translation, rotation and scaling, in Proc. SPIE, Int. Symp. Multimedia Systems and Applications, vol. 3528, pp , [7] C. Lin, C Chang, and Y. Chen, A Novel SVD-based Watermarking Scheme for Protecting Rightful Ownership of Digital Images, Journal of Information Hiding and Multimedia Signal Processing, Vol.5, No.2, pp , April 2014 [8] Makhloghi, M., Tab. F. A., and Danyali, H. A new robust blind DWT-SVD based digital image watermarking, ICEE 2011, Vol.1, pp.1-5, [9] M. Wu, and B. Liu, Data hiding in image and video: Part I Fundamental issues and solutions, IEEE Trans. Image Process., vol. 12, no. 6, pp , Jun [10] P. Pu, X. Guo, and L. Lei., Application of Image Interpolation in Log-Polar Transformation. Computer Engineering, 34, 5 (2008), pp [11] B. Yu, L. Guo, and T. Zhao, Gray projection image stabilizing algorithm based on log-polar image transform. Computer Applications, 28, 12 (2008), pp [12] Y. Xin, and M. Pawlak, M-ary Phase Modulation for Digital Watermarking Int. J. Math. Comput. Sci. 2008, Vol. 18, No. 1, pp ACKNOWLEDGMENT This research project was supported by Government Fund from Korea Copyright Commission in (Development of high performative watermarking embedding and detecting system for copyright protection of UHD real-time broadcasting content.). REFERENCES [1] J. Nah, J. Kim, and J. Kim, Video Forensic Marking Algorithm Using Peak Position Modulation, Journal of Applied Mathematics & Information Sciences (AMIS), Vol. 6, No. 3S, pp , [2] D. Li, and J. Kim, Secure Image Forensic Marking Algorithm using 2D Barcode and Off-axis Hologram in DWT-DFRNT Domain, Applied Mathematics and Information Sciences, Vol. 6, 2S, pp , [3] J. Nah, J. Kim, and J. Kim, Image Watermarking for Identification Forgery Prevention, Journal of the Korea Contents Association, Vol. 11, No. 12, pp , [4] S. P. Maity, P. K. Nandi, and T. S. Das, Robustness improvement in spread spectrum watermarking using M-ary modulation, Proc. 11 th NationalConferenceonCommunication, NCC2005, pp , [5] M. Kutter, Performance improvement of spread spectrum based image watermarking schemes through M-ary modulation, Lecture Notes in Computer Science, 1728, pp.238~250,

### Image Authentication Scheme using Digital Signature and Digital Watermarking

www..org 59 Image Authentication Scheme using Digital Signature and Digital Watermarking Seyed Mohammad Mousavi Industrial Management Institute, Tehran, Iran Abstract Usual digital signature schemes for

### Watermarking Techniques for Protecting Intellectual Properties in a Digital Environment

Watermarking Techniques for Protecting Intellectual Properties in a Digital Environment Isinkaye F. O*. and Aroge T. K. Department of Computer Science and Information Technology University of Science and

### A Secure File Transfer based on Discrete Wavelet Transformation and Audio Watermarking Techniques

A Secure File Transfer based on Discrete Wavelet Transformation and Audio Watermarking Techniques Vineela Behara,Y Ramesh Department of Computer Science and Engineering Aditya institute of Technology and

### Image Compression through DCT and Huffman Coding Technique

International Journal of Current Engineering and Technology E-ISSN 2277 4106, P-ISSN 2347 5161 2015 INPRESSCO, All Rights Reserved Available at http://inpressco.com/category/ijcet Research Article Rahul

### QUANTITATIVE ANALYSIS OF IMAGE QUALITY OF LOSSY COMPRESSION IMAGES

QUANTITATIVE ANALYSIS OF IMAGE QUALITY OF LOSSY COMPRESSION IMAGES Ryuji Matsuoka*, Mitsuo Sone, Kiyonari Fukue, Kohei Cho, Haruhisa Shimoda Tokai University Research & Information Center 2-28-4 Tomigaya,

### Reversible Data Hiding for Security Applications

Reversible Data Hiding for Security Applications Baig Firdous Sulthana, M.Tech Student (DECS), Gudlavalleru engineering college, Gudlavalleru, Krishna (District), Andhra Pradesh (state), PIN-521356 S.

### Study and Implementation of Video Compression Standards (H.264/AVC and Dirac)

Project Proposal Study and Implementation of Video Compression Standards (H.264/AVC and Dirac) Sumedha Phatak-1000731131- sumedha.phatak@mavs.uta.edu Objective: A study, implementation and comparison of

### Security Based Data Transfer and Privacy Storage through Watermark Detection

Security Based Data Transfer and Privacy Storage through Watermark Detection Gowtham.T 1 Pradeep Kumar.G 2 1PG Scholar, Applied Electronics, Nandha Engineering College, Anna University, Erode, India. 2Assistant

### JPEG Image Compression by Using DCT

International Journal of Computer Sciences and Engineering Open Access Research Paper Volume-4, Issue-4 E-ISSN: 2347-2693 JPEG Image Compression by Using DCT Sarika P. Bagal 1* and Vishal B. Raskar 2 1*

### WATERMARKING FOR IMAGE AUTHENTICATION

WATERMARKING FOR IMAGE AUTHENTICATION Min Wu Bede Liu Department of Electrical Engineering Princeton University, Princeton, NJ 08544, USA Fax: +1-609-258-3745 {minwu, liu}@ee.princeton.edu ABSTRACT A data

### CHAPTER 7 CONCLUSION AND FUTURE WORK

158 CHAPTER 7 CONCLUSION AND FUTURE WORK The aim of this thesis was to present robust watermarking techniques for medical image. Section 7.1, consolidates the contributions made by the researcher and Section

### Keywords Android, Copyright Protection, Discrete Cosine Transform (DCT), Digital Watermarking, Discrete Wavelet Transform (DWT), YCbCr.

Volume 3, Issue 7, July 2013 ISSN: 2277 128X International Journal of Advanced Research in Computer Science and Software Engineering Research Paper Available online at: www.ijarcsse.com Web Based Novel

### Study and Implementation of Video Compression standards (H.264/AVC, Dirac)

Study and Implementation of Video Compression standards (H.264/AVC, Dirac) EE 5359-Multimedia Processing- Spring 2012 Dr. K.R Rao By: Sumedha Phatak(1000731131) Objective A study, implementation and comparison

### Volume 2, Issue 12, December 2014 International Journal of Advance Research in Computer Science and Management Studies

Volume 2, Issue 12, December 2014 International Journal of Advance Research in Computer Science and Management Studies Research Article / Survey Paper / Case Study Available online at: www.ijarcsms.com

### Improved N Level Decomposition-Hybrid DCT-DWT Image Compression

International Journal of Engineering and Technical Research (IJETR) ISSN: 2321-0869, Volume-2, Issue-6, June 2014 Improved N Level Decomposition-Hybrid DCT-DWT Image Compression Sangeeta Abstract With

### Multi-factor Authentication in Banking Sector

Multi-factor Authentication in Banking Sector Tushar Bhivgade, Mithilesh Bhusari, Ajay Kuthe, Bhavna Jiddewar,Prof. Pooja Dubey Department of Computer Science & Engineering, Rajiv Gandhi College of Engineering

### A comprehensive survey on various ETC techniques for secure Data transmission

A comprehensive survey on various ETC techniques for secure Data transmission Shaikh Nasreen 1, Prof. Suchita Wankhade 2 1, 2 Department of Computer Engineering 1, 2 Trinity College of Engineering and

### Multimedia Document Authentication using On-line Signatures as Watermarks

Multimedia Document Authentication using On-line Signatures as Watermarks Anoop M Namboodiri and Anil K Jain Department of Computer Science and Engineering Michigan State University East Lansing, MI 48824

### ROI Based Medical Image Watermarking with Zero Distortion and Enhanced Security

I.J. Modern Education and Computer Science, 2014, 10, 40-48 Published Online October 2014 in MECS (http://www.mecs-press.org/) DOI: 10.5815/ijmecs.2014.10.06 ROI Based Medical Image Watermarking with Zero

### A Novel Method to Improve Resolution of Satellite Images Using DWT and Interpolation

A Novel Method to Improve Resolution of Satellite Images Using DWT and Interpolation S.VENKATA RAMANA ¹, S. NARAYANA REDDY ² M.Tech student, Department of ECE, SVU college of Engineering, Tirupati, 517502,

### Performance Analysis and Comparison of JM 15.1 and Intel IPP H.264 Encoder and Decoder

Performance Analysis and Comparison of 15.1 and H.264 Encoder and Decoder K.V.Suchethan Swaroop and K.R.Rao, IEEE Fellow Department of Electrical Engineering, University of Texas at Arlington Arlington,

### Invisible Image Water Marking Using Hybrid DWT Compression/Decompression Technique

Invisible Image Water Marking Using Hybrid DWT Compression/Decompression Technique B.Sai Kiran M.Tech (VLSI), CMR Institute of Technology. Mr.Shahbaz Khan Associate Professor, CMR Institute of Technology.

### Modeling the Print-Scan Process for Resilient Data Hiding

Modeling the Print-Scan Process for Resilient Data Hiding Kaushal Solanki, Upamanyu Madhow, Banglore S. Manjunath, and Shiv Chandrasekaran Department of Electrical and Computer Engineering University of

### A Digital Audio Watermark Embedding Algorithm

Xianghong Tang, Yamei Niu, Hengli Yue, Zhongke Yin Xianghong Tang, Yamei Niu, Hengli Yue, Zhongke Yin School of Communication Engineering, Hangzhou Dianzi University, Hangzhou, Zhejiang, 3008, China tangxh@hziee.edu.cn,

### PIXEL-LEVEL IMAGE FUSION USING BROVEY TRANSFORME AND WAVELET TRANSFORM

PIXEL-LEVEL IMAGE FUSION USING BROVEY TRANSFORME AND WAVELET TRANSFORM Rohan Ashok Mandhare 1, Pragati Upadhyay 2,Sudha Gupta 3 ME Student, K.J.SOMIYA College of Engineering, Vidyavihar, Mumbai, Maharashtra,

### Conceptual Framework Strategies for Image Compression: A Review

International Journal of Computer Sciences and Engineering Open Access Review Paper Volume-4, Special Issue-1 E-ISSN: 2347-2693 Conceptual Framework Strategies for Image Compression: A Review Sumanta Lal

### Video Authentication for H.264/AVC using Digital Signature Standard and Secure Hash Algorithm

Video Authentication for H.264/AVC using Digital Signature Standard and Secure Hash Algorithm Nandakishore Ramaswamy Qualcomm Inc 5775 Morehouse Dr, Sam Diego, CA 92122. USA nandakishore@qualcomm.com K.

### Dynamic Binary Location based Multi-watermark Embedding Algorithm in DWT

Dynamic Binary Location based Multi-watermark Embedding Algorithm in DWT Ammar Jameel Hussein, Seda Yuksel, and Ersin Elbasi Abstract In order to achieve a good imperceptibility and robustness, using 4-level

### Combating Anti-forensics of Jpeg Compression

IJCSI International Journal of Computer Science Issues, Vol. 9, Issue 6, No 3, November 212 ISSN (Online): 1694-814 www.ijcsi.org 454 Combating Anti-forensics of Jpeg Compression Zhenxing Qian 1, Xinpeng

### Video-Conferencing System

Video-Conferencing System Evan Broder and C. Christoher Post Introductory Digital Systems Laboratory November 2, 2007 Abstract The goal of this project is to create a video/audio conferencing system. Video

### Video Encryption Exploiting Non-Standard 3D Data Arrangements. Stefan A. Kramatsch, Herbert Stögner, and Andreas Uhl uhl@cosy.sbg.ac.

Video Encryption Exploiting Non-Standard 3D Data Arrangements Stefan A. Kramatsch, Herbert Stögner, and Andreas Uhl uhl@cosy.sbg.ac.at Andreas Uhl 1 Carinthia Tech Institute & Salzburg University Outline

### Image Estimation Algorithm for Out of Focus and Blur Images to Retrieve the Barcode Value

IJSTE - International Journal of Science Technology & Engineering Volume 1 Issue 10 April 2015 ISSN (online): 2349-784X Image Estimation Algorithm for Out of Focus and Blur Images to Retrieve the Barcode

### AUTHORIZED WATERMARKING AND ENCRYPTION SYSTEM BASED ON WAVELET TRANSFORM FOR TELERADIOLOGY SECURITY ISSUES

AUTHORIZED WATERMARKING AND ENCRYPTION SYSTEM BASED ON WAVELET TRANSFORM FOR TELERADIOLOGY SECURITY ISSUES S.NANDHINI PG SCHOLAR NandhaEngg. College Erode, Tamilnadu, India. Dr.S.KAVITHA M.E.,Ph.d PROFESSOR

### JPEG compression of monochrome 2D-barcode images using DCT coefficient distributions

Edith Cowan University Research Online ECU Publications Pre. JPEG compression of monochrome D-barcode images using DCT coefficient distributions Keng Teong Tan Hong Kong Baptist University Douglas Chai

### Efficient Coding Unit and Prediction Unit Decision Algorithm for Multiview Video Coding

JOURNAL OF ELECTRONIC SCIENCE AND TECHNOLOGY, VOL. 13, NO. 2, JUNE 2015 97 Efficient Coding Unit and Prediction Unit Decision Algorithm for Multiview Video Coding Wei-Hsiang Chang, Mei-Juan Chen, Gwo-Long

### An Incomplete Cryptography based Digital Rights Management with DCFF

An Incomplete Cryptography based Digital Rights Management with DCFF Ta Minh Thanh Department of Computer Science Tokyo Institute of Technology 2-12-2, Ookayama, Meguro, Tokyo, 152-8552, Japan. Email:thanhtm@ks.cs.titech.ac.jp

### International Journal of Computer Sciences and Engineering Open Access. A novel technique to hide information using Daubechies Transformation

International Journal of Computer Sciences and Engineering Open Access Research Paper Volume-4, Special Issue-1 E-ISSN: 2347-2693 A novel technique to hide information using Daubechies Transformation Jyotsna

### Figure 1: Relation between codec, data containers and compression algorithms.

Video Compression Djordje Mitrovic University of Edinburgh This document deals with the issues of video compression. The algorithm, which is used by the MPEG standards, will be elucidated upon in order

### Security and protection of digital images by using watermarking methods

Security and protection of digital images by using watermarking methods Andreja Samčović Faculty of Transport and Traffic Engineering University of Belgrade, Serbia Gjovik, june 2014. Digital watermarking

### Robust Blind Watermarking Mechanism For Point Sampled Geometry

Robust Blind Watermarking Mechanism For Point Sampled Geometry Parag Agarwal Balakrishnan Prabhakaran Department of Computer Science, University of Texas at Dallas MS EC 31, PO Box 830688, Richardson,

### Chapter 2 Digital Image Compression

4 Chapter 2 Digital Image Compression 2.1 Data Compression and Data Redundancy Data compression is defined as the process of encoding data using a representation that reduces the overall size of data.

### 2695 P a g e. IV Semester M.Tech (DCN) SJCIT Chickballapur Karnataka India

Integrity Preservation and Privacy Protection for Digital Medical Images M.Krishna Rani Dr.S.Bhargavi IV Semester M.Tech (DCN) SJCIT Chickballapur Karnataka India Abstract- In medical treatments, the integrity

### A Study of the Robustness of PRNU-based Camera Identification

A Study of the Robustness of PRNU-based Camera Identification Kurt Rosenfeld Taha Sencar Nasir Memon Abstract We investigate the robustness of PRNU-based camera identification in cases where the test images

### DYNAMIC DOMAIN CLASSIFICATION FOR FRACTAL IMAGE COMPRESSION

DYNAMIC DOMAIN CLASSIFICATION FOR FRACTAL IMAGE COMPRESSION K. Revathy 1 & M. Jayamohan 2 Department of Computer Science, University of Kerala, Thiruvananthapuram, Kerala, India 1 revathysrp@gmail.com

### International Archives of the Photogrammetry, Remote Sensing and Spatial Information Sciences, Vol. XXXIV-5/W10

Accurate 3D information extraction from large-scale data compressed image and the study of the optimum stereo imaging method Riichi NAGURA *, * Kanagawa Institute of Technology nagura@ele.kanagawa-it.ac.jp

### International Journal of Emerging Technology and Advanced Engineering Website: www.ijetae.com (ISSN 2250-2459, Volume 2, Issue 9, September 2012)

Authentication of Medical Images using Integer Transforms A.Kannammal 1, Dr.S.Subha Rani 2 1 Assistant professor, 2 Professor and Head, ECE Department, PSG College of Technology, Peelamedu, Coimbatore

### SOURCE SCANNER IDENTIFICATION FOR SCANNED DOCUMENTS. Nitin Khanna and Edward J. Delp

SOURCE SCANNER IDENTIFICATION FOR SCANNED DOCUMENTS Nitin Khanna and Edward J. Delp Video and Image Processing Laboratory School of Electrical and Computer Engineering Purdue University West Lafayette,

### Redundant Wavelet Transform Based Image Super Resolution

Redundant Wavelet Transform Based Image Super Resolution Arti Sharma, Prof. Preety D Swami Department of Electronics &Telecommunication Samrat Ashok Technological Institute Vidisha Department of Electronics

### Bandwidth Adaptation for MPEG-4 Video Streaming over the Internet

DICTA2002: Digital Image Computing Techniques and Applications, 21--22 January 2002, Melbourne, Australia Bandwidth Adaptation for MPEG-4 Video Streaming over the Internet K. Ramkishor James. P. Mammen

### VESA Display Stream Compression

Written by Frederick Walls, Associate Technical Director, and Sandy MacInnis, Senior Technical Director, Broadcom Corporation (VESA member) OVERVIEW Display manufacturers are turning to higher- resolution

### Introduction to image coding

Introduction to image coding Image coding aims at reducing amount of data required for image representation, storage or transmission. This is achieved by removing redundant data from an image, i.e. by

### Data Mining for Manufacturing: Preventive Maintenance, Failure Prediction, Quality Control

Data Mining for Manufacturing: Preventive Maintenance, Failure Prediction, Quality Control Andre BERGMANN Salzgitter Mannesmann Forschung GmbH; Duisburg, Germany Phone: +49 203 9993154, Fax: +49 203 9993234;

### Multimodal Biometric Recognition Security System

Multimodal Biometric Recognition Security System Anju.M.I, G.Sheeba, G.Sivakami, Monica.J, Savithri.M Department of ECE, New Prince Shri Bhavani College of Engg. & Tech., Chennai, India ABSTRACT: Security

### DCT Based High Quality Image Compression

DCT Based High Quality Image Compression Nikolay Ponomarenko 1, Vladimir Lukin 1, Karen Egiazarian 2, Jaakko Astola 2 1 Department 504, National Aerospace University (Kharkov Aviation Institute) 17 Chkalova

### Camera identification by grouping images from database, based on shared noise patterns

Camera identification by grouping images from database, based on shared noise patterns Teun Baar, Wiger van Houten, Zeno Geradts Digital Technology and Biometrics department, Netherlands Forensic Institute,

### Simultaneous Gamma Correction and Registration in the Frequency Domain

Simultaneous Gamma Correction and Registration in the Frequency Domain Alexander Wong a28wong@uwaterloo.ca William Bishop wdbishop@uwaterloo.ca Department of Electrical and Computer Engineering University

### An Automatic Identification Authentic Work Anti-counterfeiting Algorithm Based on DWT-DCT

pp.135144 http://dx.doi.org/10.14257/ijsia.2016.10.6.14 An Automatic Identification Authentic Work Anticounterfeiting Algorithm Based on DWTDCT Yue Zhang and Jingbing Li * College of Information Science

### Efficient Data Recovery scheme in PTS-Based OFDM systems with MATRIX Formulation

Efficient Data Recovery scheme in PTS-Based OFDM systems with MATRIX Formulation Sunil Karthick.M PG Scholar Department of ECE Kongu Engineering College Perundurau-638052 Venkatachalam.S Assistant Professor

### Steganography Based Seaport Security Communication System

, pp.302-306 http://dx.doi.org/10.14257/astl.2014.46.63 Steganography Based Seaport Security Communication System Yair Wiseman 1, 1 Computer Science Department Ramat-Gan 52900, Israel wiseman@cs.biu.ac.il

### Video compression: Performance of available codec software

Video compression: Performance of available codec software Introduction. Digital Video A digital video is a collection of images presented sequentially to produce the effect of continuous motion. It takes

### A New Sampling Method of Auto Focus for Voice Coil Motor in Camera Modules

A New Sampling Method of Auto Focus for Voice Coil Motor in Camera Modules Wei Hsu and Chiou-Shann Fuh Department of Computer Science and Information Engineering, National Taiwan University, Taipei, Taiwan,

### VLSI Architecture for DCT Based On High Quality DA

International Journal of Engineering and Technical Research (IJETR) ISSN: 2321-0869, Volume-2, Issue-6, June 2014 VLSI Architecture for DCT Based On High Quality DA Urbi Sharma, Tarun Verma, Rita Jain

### This document is downloaded from DR-NTU, Nanyang Technological University Library, Singapore.

This document is downloaded from DR-NTU, Nanyang Technological University Library, Singapore. Title Transcription of polyphonic signals using fast filter bank( Accepted version ) Author(s) Foo, Say Wei;

### Transmission Line and Back Loaded Horn Physics

Introduction By Martin J. King, 3/29/3 Copyright 23 by Martin J. King. All Rights Reserved. In order to differentiate between a transmission line and a back loaded horn, it is really important to understand

### WHITE PAPER DECEMBER 2010 CREATING QUALITY BAR CODES FOR YOUR MOBILE APPLICATION

DECEMBER 2010 CREATING QUALITY BAR CODES FOR YOUR MOBILE APPLICATION TABLE OF CONTENTS 1 Introduction...3 2 Printed bar codes vs. mobile bar codes...3 3 What can go wrong?...5 3.1 Bar code Quiet Zones...5

### MPEG, the MP3 Standard, and Audio Compression

MPEG, the MP3 Standard, and Audio Compression Mark ilgore and Jamie Wu Mathematics of the Information Age September 16, 23 Audio Compression Basic Audio Coding. Why beneficial to compress? Lossless versus

### (Refer Slide Time: 07:43)

Computer Graphics Prof. Sukhendu Das Dept. of Computer Science and Engineering Indian Institute of Technology, Madras Lecture - 42 Digital Image Processing, Image Compression, Jpeg Enhancements Welcome

### COMPRESSION OF 3D MEDICAL IMAGE USING EDGE PRESERVATION TECHNIQUE

International Journal of Electronics and Computer Science Engineering 802 Available Online at www.ijecse.org ISSN: 2277-1956 COMPRESSION OF 3D MEDICAL IMAGE USING EDGE PRESERVATION TECHNIQUE Alagendran.B

### Image Processing with. ImageJ. Biology. Imaging

Image Processing with ImageJ 1. Spatial filters Outlines background correction image denoising edges detection 2. Fourier domain filtering correction of periodic artefacts 3. Binary operations masks morphological

### Automatic Recognition Algorithm of Quick Response Code Based on Embedded System

Automatic Recognition Algorithm of Quick Response Code Based on Embedded System Yue Liu Department of Information Science and Engineering, Jinan University Jinan, China ise_liuy@ujn.edu.cn Mingjun Liu

### Friendly Medical Image Sharing Scheme

Journal of Information Hiding and Multimedia Signal Processing 2014 ISSN 2073-4212 Ubiquitous International Volume 5, Number 3, July 2014 Frily Medical Image Sharing Scheme Hao-Kuan Tso Department of Computer

### Chapter 14. MPEG Audio Compression

Chapter 14 MPEG Audio Compression 14.1 Psychoacoustics 14.2 MPEG Audio 14.3 Other Commercial Audio Codecs 14.4 The Future: MPEG-7 and MPEG-21 14.5 Further Exploration 1 Li & Drew c Prentice Hall 2003 14.1

### Region of Interest Access with Three-Dimensional SBHP Algorithm CIPR Technical Report TR-2006-1

Region of Interest Access with Three-Dimensional SBHP Algorithm CIPR Technical Report TR-2006-1 Ying Liu and William A. Pearlman January 2006 Center for Image Processing Research Rensselaer Polytechnic

### Implementation and Analysis of Efficient Lossless Image Compression Algorithm

International Journal of Engineering and Technical Research (IJETR) ISSN: 2321-0869, Volume-2, Issue-6, June 2014 Implementation and Analysis of Efficient Lossless Image Compression Algorithm Prof.Megha

### A deterministic fractal is an image which has low information content and no inherent scale.

FRACTAL IMAGE COMPRESSION: A RESOLUTION INDEPENDENT REPRESENTATION FOR IMAGER?? Alan D. Sloan 5550 Peachtree Parkway Iterated Systems, Inc. Norcross, Georgia 30092 1. Background A deterministic fractal

### Lecture 14. Point Spread Function (PSF)

Lecture 14 Point Spread Function (PSF), Modulation Transfer Function (MTF), Signal-to-noise Ratio (SNR), Contrast-to-noise Ratio (CNR), and Receiver Operating Curves (ROC) Point Spread Function (PSF) Recollect

### OBJECT TRACKING USING LOG-POLAR TRANSFORMATION

OBJECT TRACKING USING LOG-POLAR TRANSFORMATION A Thesis Submitted to the Gradual Faculty of the Louisiana State University and Agricultural and Mechanical College in partial fulfillment of the requirements

### Quality Estimation for Scalable Video Codec. Presented by Ann Ukhanova (DTU Fotonik, Denmark) Kashaf Mazhar (KTH, Sweden)

Quality Estimation for Scalable Video Codec Presented by Ann Ukhanova (DTU Fotonik, Denmark) Kashaf Mazhar (KTH, Sweden) Purpose of scalable video coding Multiple video streams are needed for heterogeneous

### VLSI BASED COLOR INTERPOLATION ALGORITHM FOR REAL TIME IMAGE APPLICATIONS

VOL. 10, NO. 7, APRIL 2015 ISSN 1819-6608 VLSI BASED COLOR INTERPOLATION ALGORITHM FOR REAL TIME IMAGE APPLICATIONS Sudalai Utchimahali C. 1 and Rajakumar G. 2 1 M.E VLSI Design, Francis Xavier Engineering

### Using fractal compression scheme to embed a digital signature into an image

Using fractal compression scheme to embed a digital signature into an image Joan Puate, Fred Jordan Swiss federal institute of technology Signal Processing Laboratory CH-1015 Lausanne Switzerland Email:

### Deinterlacing/interpolation of TV signals. Elham Shahinfard Advisors: Prof. M. Ahmadi Prof. M. Sid-Ahmed

Deinterlacing/interpolation of TV signals Elham Shahinfard Advisors: Prof. M. Ahmadi Prof. M. Sid-Ahmed Outline A Review of some terminologies Converting from NTSC to HDTV; What changes need to be considered?

Tracking Moving Objects In Video Sequences Yiwei Wang, Robert E. Van Dyck, and John F. Doherty Department of Electrical Engineering The Pennsylvania State University University Park, PA16802 Abstract{Object

### Potential of face area data for predicting sharpness of natural images

Potential of face area data for predicting sharpness of natural images Mikko Nuutinen a, Olli Orenius b, Timo Säämänen b, Pirkko Oittinen a a Dept. of Media Technology, Aalto University School of Science

### A Robust and Lossless Information Embedding in Image Based on DCT and Scrambling Algorithms

A Robust and Lossless Information Embedding in Image Based on DCT and Scrambling Algorithms Dr. Mohammad V. Malakooti Faculty and Head of Department of Computer Engineering, Islamic Azad University, UAE

### International Journal of Advanced Information in Arts, Science & Management Vol.2, No.2, December 2014

Efficient Attendance Management System Using Face Detection and Recognition Arun.A.V, Bhatath.S, Chethan.N, Manmohan.C.M, Hamsaveni M Department of Computer Science and Engineering, Vidya Vardhaka College

### CHAPTER 2 LITERATURE REVIEW

11 CHAPTER 2 LITERATURE REVIEW 2.1 INTRODUCTION Image compression is mainly used to reduce storage space, transmission time and bandwidth requirements. In the subsequent sections of this chapter, general

### RF Measurements Using a Modular Digitizer

RF Measurements Using a Modular Digitizer Modern modular digitizers, like the Spectrum M4i series PCIe digitizers, offer greater bandwidth and higher resolution at any given bandwidth than ever before.

SteganographyinaVideoConferencingSystem? AndreasWestfeld1andGrittaWolf2 2InstituteforOperatingSystems,DatabasesandComputerNetworks 1InstituteforTheoreticalComputerScience DresdenUniversityofTechnology

### Secret Communication through Web Pages Using Special Space Codes in HTML Files

International Journal of Applied Science and Engineering 2008. 6, 2: 141-149 Secret Communication through Web Pages Using Special Space Codes in HTML Files I-Shi Lee a, c and Wen-Hsiang Tsai a, b, * a

### Improving Quality of Satellite Image by Wavelet Transforming & Morphological Filtering

Improving Quality of Satellite Image by Wavelet Transforming & Morphological Filtering Anumolu Lasmika 1, K. Raveendra 2 P.G. Student, Department of ECE, S. V. Engineering College for Women, Tirupati,

### MPEG Unified Speech and Audio Coding Enabling Efficient Coding of both Speech and Music

ISO/IEC MPEG USAC Unified Speech and Audio Coding MPEG Unified Speech and Audio Coding Enabling Efficient Coding of both Speech and Music The standardization of MPEG USAC in ISO/IEC is now in its final

### AN ENHANCED MECHANISM FOR SECURE DATA TRANSMISSION USING STEGANOGRAPHY MERGED WITH VISUAL CRYPTOGRAPHY

AN ENHANCED MECHANISM FOR SECURE DATA TRANSMISSION USING STEGANOGRAPHY MERGED WITH VISUAL CRYPTOGRAPHY Chandan Mohapatra 1, Manajusha Pandey 2 1 PG Student in Computer Science Dept., KIIT University, Bhubaneswar,

### 302 IEEE TRANSACTIONS ON CIRCUITS AND SYSTEMS FOR VIDEO TECHNOLOGY, VOL. 19, NO. 2, FEBRUARY 2009

302 IEEE TRANSACTIONS ON CIRCUITS AND SYSTEMS FOR VIDEO TECHNOLOGY, VOL. 19, NO. 2, FEBRUARY 2009 Transactions Letters Fast Inter-Mode Decision in an H.264/AVC Encoder Using Mode and Lagrangian Cost Correlation

### SR2000 FREQUENCY MONITOR

SR2000 FREQUENCY MONITOR THE FFT SEARCH FUNCTION IN DETAILS FFT Search is a signal search using FFT (Fast Fourier Transform) technology. The FFT search function first appeared with the SR2000 Frequency

### Statistical Modeling of Huffman Tables Coding

Statistical Modeling of Huffman Tables Coding S. Battiato 1, C. Bosco 1, A. Bruna 2, G. Di Blasi 1, G.Gallo 1 1 D.M.I. University of Catania - Viale A. Doria 6, 95125, Catania, Italy {battiato, bosco,

### A Tool for Multimedia Quality Assessment in NS3: QoE Monitor

A Tool for Multimedia Quality Assessment in NS3: QoE Monitor D. Saladino, A. Paganelli, M. Casoni Department of Engineering Enzo Ferrari, University of Modena and Reggio Emilia via Vignolese 95, 41125

### Low-resolution Image Processing based on FPGA

Abstract Research Journal of Recent Sciences ISSN 2277-2502. Low-resolution Image Processing based on FPGA Mahshid Aghania Kiau, Islamic Azad university of Karaj, IRAN Available online at: www.isca.in,