ADVANCED TECHNIQUES IN DIGITAL WATERMARKING AND DATA HIDING

Size: px
Start display at page:

Download "ADVANCED TECHNIQUES IN DIGITAL WATERMARKING AND DATA HIDING"

Transcription

1 Hellenic Open University School of Science and Technology Digital Systems & Media Computing Laboratory ADVANCED TECHNIQUES IN DIGITAL WATERMARKING AND DATA HIDING Eleftherios K. Chrysochos June 2009, Patras

2 ii

3 Dedicated to my friends and family iii

4 iv

5 Abstract This thesis is entitled Advanced Techniques in Digital Watermarking and Data Hiding. Two close but distinct research areas are related to this thesis. In both areas the main goal is to embed information in a digital medium. The main difference between them is the scope of the application. In data hiding the medium-carrier is of no importance, while in digital watermarking the medium is of crucial importance as well as the message hidden within. Therefore research in both areas sometimes overlaps and certain embedding techniques are shared in both fields. The main research interest is digital robust watermarking. A reversible, blind, watermarking scheme which is based on histogram modification is presented. The watermark is robust against geometrical attacks but susceptible to compression and filtering attacks. To cope with this kind of attacks our research turned to frequency domain and chaos. A watermarking scheme which is v

6 based on a chaotic function for embedding and a correlation method for detection was introduced. This novel scheme shows increased robustness against JPEG compression and filtering attacks. Research in reversible embedding and especially in Difference Expansion (DE) techniques led to a novel reversible DE transform which embeds two bits of information in a triplet of coefficients. This transform can be applied in spatial or frequency domain and induces minimum distortion to the initial coefficients of the image. Another implementation in image data hiding domain was a scheme based on DE that uses consecutive, overlapping pairs, instead of the non-overlapping pairs or triads (used by traditional DE techniques) outperforming all existing DE schemes, both in terms of capacity and PSNR. vi

7 Declaration This is to certify that: (i) the thesis comprises only my original work towards the PhD except where indicated, (ii) due acknowledgement has been made in the text to all other material used, (iii) the thesis is less than 100,000 words in length, exclusive of table, maps, bibliographies, appendices and footnotes. Eleftherios K. Chrysochos vii

8 viii

9 Publications Chrysochos E., Fotopoulos V., Skodras A., Xenos M., "Reversible Image Watermarking Based on Histogram Modification", 11th Panhellenic Conference on Informatics with international participation (PCI 2007), Vol. B, pp , Patras, Greece, May, Chrysochos E., Fotopoulos V., Skodras A., "Robust Watermarking of Digital Images Based on Chaotic Mapping and DCT", 16th European Signal Processing Conference (EUSIPCO 2008), Lausanne, Switzerland, August, Chrysochos E., Fotopoulos V., Xenos M., Stork M., Skodras A. N., Hrusak J., Chaotic-Correlation Based Watermarking scheme for Still Images, IEEE International Conference: Applied Electronics 2008, Pilsen, Czech Republic, September 10-11, Chrysochos E., Varsaki E., Fotopoulos V., Skodras A., " High Capacity Reversible Data Hiding using Overlapping Difference Expansion", 10th International Workshop on Image Analysis for Multimedia Services (WIAMIS 2009), London, UK, 6-8 May, ix

10 x

11 Acknowledgements This work was funded by the European Union - European Social Fund (75%), the Greek Government - Ministry of Development - General Secretariat of Research and Technology (25%) and the Private Sector in the frames of the European Competitiveness Programme (Third Community Support Framework - Measure programme ΠΕΝΕΔ - contract no.03εδ832). xi

12 xii

13 Contents 1. INTRODUCTION OVERVIEW OF DIGITAL WATERMARKING DOMAIN FOR IMAGES HISTORICAL REVIEW CRITERIONS FOR DIGITAL IMAGE WATERMARKING CATEGORIZATION VISIBILITY Visible- Invisible Watermarking IDENTIFICATION METHOD FOR THE WATERMARK Readable- Detectable Watermarks REVERSIBILITY Reversible (lossless) - Non reversible schemes ROBUSTNESS Robust Fragile Semi fragile watermarks INFORMATION REQUIRED FOR WATERMARK EXTRACTION Blind Non blind Zero knowledge - Zero watermarking NUMBER OF WATERMARKS USED Simple Multicasting ADJUSTABILITY st 2nd generation watermarking systems HUMAN VISUAL SYSTEM (HVS) HVS based Non HVS based systems WATERMARKING DOMAIN Spatial Frequency Histogram ICA Spatial Domain Frequency Domain Histogram Domain Independent Component Analysis (ICA) HYBRID TECHNIQUES REVERSIBLE WATERMARKING BASED ON HISTOGRAM MODIFICATION EXISTING SCHEMES PROPOSED WATERMARKING SCHEME Features of the Proposed Scheme Embedding Procedure Watermark Extraction Restoration of Watermarked Image EXPERIMENTAL RESULTS RESEARCH CONTRIBUTION WATERMARKING AND CHAOS CHAOS AND WATERMARKING EXISTING SCHEMES CHAOTIC MAP PROPOSED SCHEME Features of the proposed scheme Embedding Procedure Extracting Procedure EXPERIMENTAL RESULTS xiii

14 4.5 RESEARCH CONTRIBUTION ADVANCED TECHNIQUES IN DATA HIDING DIFFERENCE EXPANSION METHODS Tian s Difference Expansion Transform (baseline method) Shen et al s 3C2B Transform on Triplets Alattar s Transform on triplets NOVEL DE TRANSFORM ON TRIPLETS Computational Cost Analysis Performance Analysis with regard to Coefficient Alteration Shen et al s 3C2B Transform on Triplets Alattar s 3C2B Transform on Triplets Proposed Novel Transform Experimental Results Research Contribution PROPOSED DATA HIDING SCHEME USING OVERLAPPING DE Embedding Procedure Extracting Procedure Capacity Issues Experimental Results Research Contribution CONCLUSIONS FUTURE WORK REFERENCES xiv

15 Chapter 1 - Introduction 1. Introduction In Recent years the majority of the information that involves sound, image and video is stored in digital form. Multimedia in digital form offers many advantages and new potentials to the average user. Likely the most common used potential of digital media is the untroubled copy without degradation of the medium. Another convenience of digital multimedia is the ability of easy modification of its content. The above actions may be permissible, like the legitimate copy of a medical digital image for remote diagnosis purposes, or non permissible, like the illegal copy and distribution of a digital music album. After the 1980 s the personal computers invaded everyday life and step by step became a necessity for every home and business. Another phenomenon of the digital era is that music albums as well as films and photographs are no longer produced or distributed in analog form or hard copy. In our days all multimedia are almost exclusively distributed in digital form. The above two factors lead to global use of digital multimedia and a - 1 -

16 Chapter 1 - Introduction simultaneous rapid increase of copyright piracy as copy and modification of digital content was at hand by an average user. Another crucial factor that also contributed to the increase of piracy is the free and untroubled traffic of information over the World Wide Web. Nowadays everybody with no special skills on computer science can easily surf through the internet (World Wide Web) simply by using a web browser (e.g. internet explorer or firefox) or query and acquire information with the use of a search machine (e.g. Google). Often this information involves multimedia files. Sometimes this is a legitimate action but other times when the multimedia file is copyrighted, sharing or copying its content is considered illegal and unethical. Nevertheless sharing copyrighted material over the internet is a very common practice in our days. A system that would protect digital content was needed in order to protect and secure its copyright. In some cases a question of validity or credibility arises. This is the case when a digital content is used in sensitive applications, like medical or military applications. In these cases a system of validation and credibility check is required in order to avoid critical errors. Digital - 2 -

17 Chapter 1 - Introduction Watermarking is a developing field of research that copes with these issues. Music industry as well as movie making industry suffers each year from huge economic losses due to music and movie piracy respectively. This also affects the multimedia industry in general as all multimedia content is nowadays produced and distributed in digital form and therefore is subsequent to digital piracy. Due to these enormous economic losses involved in digital piracy there is an increasing interest in the area of digital watermarking as digital watermarking applications could be used as countermeasure against digital piracy

18 Chapter 2 Overview of Digital Watermarking Domain for Images 2. Overview of Digital Watermarking Domain for Images Digital watermarking stands for embedding a signature signal, called watermark, into a digital cover, in order to prove ownership, check authenticity or integrity of the cover, and it may relate to audio, images, video or even text. This thesis focuses on digital watermarking for images. 2.1 Historical Review The first record of visible watermarking was applied on paper in Italy in 1282 B.C. [11]. This method was introduced by papermakers in order to mark and identify their products. During the electronics revolution, the first electronic watermarking application Identification of sound and like signals, was introduced by Hembrooke E. in 1954 [17] and related to audio signals. His patent described a method for imperceptibly embedding an identification code into music for the purpose of proving ownership

19 Chapter 2 Overview of Digital Watermarking Domain for Images The first publications about digital image watermarking were seen in 1979 while the area of digital image watermarking developed rapidly during the 90 s [11]. 2.2 Criterions for Digital Image Watermarking Categorization The various existing watermarking systems can be categorized according to various factors. These factors may involve the procedure used for the embedding of the information in the image or the characteristics and the attributes of the new watermarked image [11], [4], [32] and [12]. The criterions used for categorization of watermarking schemes are: Watermark visibility: whether the watermark is visible via the naked eye. Identification method for the watermark. Reversibility: whether the watermarked image can be restored in its original status. Robustness: how robust is the watermark against - 5 -

20 Chapter 2 Overview of Digital Watermarking Domain for Images compression, geometrical attacks and filter attacks. Information required for identification and authentication of the watermark embedded in an image. Simple or multicasting: whether more than one embedding procedures may be applied for one image. Adjustability of the watermarking algorithm. Human Visual System (HVS): whether the watermarking procedure takes into account the particular features of the HVS. Watermarking domain. According to the above criterions watermarking systems are divided to different categories as shown above. 2.3 Visibility Visible- Invisible Watermarking Visible watermarking is the procedure during which a signalsignature is embedded in an image in a perceivable way usually to declare the creator or the copyrights owner of the image. Common - 6 -

21 Chapter 2 Overview of Digital Watermarking Domain for Images example of visible watermarking over video is the exclusive video clips shown occasionally on television and bear the logotype of the TV station. In visible watermarking obviously there is optical degradation of the original signal. Invisible watermarking on the other hand embeds a signature in the digital medium which is not perceivable via naked eye. Applications of visible watermarking were invented prior to invisible and electronic watermarking [6]. 2.4 Identification Method for the Watermark Readable- Detectable Watermarks In detectable watermarking systems the system itself is responsible for determining whether an image carries a watermark or not. This is accomplished by comparing a correlation factor according to a specific, predetermined or adjustable threshold [31], [49]. If the correlation factor is higher than this threshold the presence of a watermark is certified and the image is considered - 7 -

22 Chapter 2 Overview of Digital Watermarking Domain for Images watermarked. Otherwise the image is considered nonwatermarked. In watermarking systems that use readable watermarks the identification of the watermark lies on the human factor. The watermark used for embedding is a logotype or another (usually smaller) image. The logotype usually is a binary or a greyscale image. Such systems are presented in [46], [20]. 2.5 Reversibility Reversible (lossless) - Non reversible schemes A watermarking scheme is considered reversible or lossless when the original image can be fully restored after extracting the watermark of the watermarked image. Full restoration of an image means that the restored image must be equal in every way with the original (host) image without any degradation (perceivable or not). Reversible watermarking schemes may use one or more keys for extracting and restoring procedures. These that use two keys (private and public) are called asymmetric. Usually the first key is public and used for the - 8 -

23 Chapter 2 Overview of Digital Watermarking Domain for Images extracting and identification of the watermark, while the second one is private and is used for the removal of the watermark and restoration of the image back to its original status [20], [40]. On the other hand when the full restoration of the watermarked image is not possible, the watermarking scheme is considered non reversible. The lack of reversibility in these cases is subsequent of some non reversible procedures like truncation, approximation, quantization etc. which take place during the embedding procedure. 2.6 Robustness Robust Fragile Semi fragile watermarks A digital signal may sustain various alterations- attacks, malicious or not. When the watermark after sustaining a specific attack, is still detectable (not erased) then it is considered robust against the specific attack. When the watermark is robust against various attacks is called robust [24]. Robust watermarks are usually used in copyright applications

24 Chapter 2 Overview of Digital Watermarking Domain for Images Watermarking schemes which aim for robustness generally use methods for synchronizing the watermark (procedure required usually after attacks) as preprocessing before detecting the presence of the watermark [33]. When the watermark is designed on purpose not to withstand any alteration of the watermarked image it is considered fragile. Fragile watermarks are commonly used for authentication applications [49], [20], [40]. Any minor alteration of the image will destroy the watermark making it non detectable and therefore the image non authentic. Fragile watermarking is usually used for integrity check and authentication applications. However there are some watermarking schemes that exhibit robustness against some attacks (e.g. compression) but are vulnerable to other attacks (e.g. geometrical attacks or low pass filtering). These watermarking systems are called semi fragile. Most of the watermarking schemes fall into this category since it is very difficult to design and algorithm that can endure all sorts of attack. Nevertheless as new more robust algorithms are invented, new pattern of attacks are invented as well

25 Chapter 2 Overview of Digital Watermarking Domain for Images 2.7 Information Required for Watermark Extraction Blind Non blind Zero knowledge - Zero watermarking Watermarking systems are categorized according to the information required in order to trace and identify the watermark in a digital medium. Therefore a watermarking system is considered blind or oblivious when the initial (non watermarked) image is not needed for the extracting procedure [46], [25]. In case the original image (as well as the watermarked image) is necessary for the extracting procedure the watermarking scheme is called non blind or non oblivious. As expected non blind watermarking schemes show increase robustness against attacks and are base on comparing the watermarked image with the original (non-watermarked) one. On the other hand this process is not always convenient since the host image may not be at hand. Therefore blind systems are more

26 Chapter 2 Overview of Digital Watermarking Domain for Images flexible and have more applications. Blind systems are commonly used for copyright applications. Zero knowledge watermarking systems are characterized by the fact that for the extracting procedure they only require the watermarked image. In this case no additional information (e.g. a security code, a private or public key, etch) are needed for the algorithm to decide whether an image is watermarked or not and to retrieve the respective watermark [49]. Zero watermarking techniques do not embed information in the host image. They usually extract from the image some predefined characteristics that are used to form a unique signature for the specific image [31]. In this way there is no degradation in the host image

27 Chapter 2 Overview of Digital Watermarking Domain for Images 2.8 Number of Watermarks Used Simple Multicasting In simple watermarking the watermark is embedded in the host image only once [39]. In multicasting an already watermarked image can go through the embedding procedure without destroying the precedent watermark. In this way an image can be watermarked successively many times with different watermarks or the same watermark can be embedded in one image several times (aiming in increasing the robustness of the algorithm against malicious attacks) [28]. 2.9 Adjustability 1st 2nd generation watermarking systems The basic difference between first and second generation systems is the capability of adjusting the watermarking algorithm according to the features of the host image and the watermark to be embedded

28 Chapter 2 Overview of Digital Watermarking Domain for Images First generation systems do not take into account the specific features of each image and the algorithm used is standard [39], [16]. Second generation systems on the contrary adjust the embedding algorithm according to the features of the image [28], [3]. Second generation watermarking systems provide better results in terms of robustness and quality of the watermarked image as well as in terms of capacity. Nevertheless second generation algorithms exhibit increased complexity which results in higher computational cost in the embedding and extracting procedure compared to first generation systems Human Visual System (HVS) HVS based Non HVS based systems In recent years watermarking systems tend to take into account the special features of the Human Visual Systems (HVS). These watermarking schemes make sure that the alterations imposed by the watermarking procedure on the host image are not perceivable via the HVS [2]. In order to achieve this they use

29 Chapter 2 Overview of Digital Watermarking Domain for Images special quality metrics adapted to the HVS characteristics [3] instead of the standard Peak Signal to Noise Ratio (PSNR) or other Means Square Error (MSE) metrics Watermarking Domain Spatial Frequency Histogram ICA Watermarking techniques can be categorized according to the domain used to embed the watermark. Therefore there is spatial, frequency and histogram domain, which are more commonly used in watermarking and algorithms that are based on Independent Component Analysis (ICA) and Singular Value Decomposition (SVD) transforms. Each domain has certain advantages and disadvantages which will be analyzed above Spatial Domain The first attempts on digital image watermarking were in spatial domain. The main advantage of spatial watermarking is simplicity. Therefore spatial schemes have low computational

30 Chapter 2 Overview of Digital Watermarking Domain for Images complexity and consequently need less computational time. Another advantage is the high capacity offered for the watermark during the embedding procedure. The disadvantage of spatial domain is that the watermark is vulnerable to attacks (low robustness) [16]. Many spatial techniques embed the watermark information in the Least Significant Bit (LSB) of every pixel and are called LSB techniques [2]. Each LSB scheme embeds the watermark with different algorithm but they all take advantage of the insensitivity of the Human Visual System to minor changes of colour and brightness respectively. However spatial methods are extremely susceptible to any kind of attack. An interesting approach in spatial domain was introduced by Tian J. [39] who used Difference Expansion (DE) for embedding information in an image. This method is fully reversible, without imposing significant degradation ot the watermarked image. Nevertheless it is vulnerable to attacks since it is basically an LSB technique and inherits all itd disadvantaged. The main advantages of this technique are that it is blind, reversible and provides high capacity for the watermark. Specifically the capacity s upper bound is given when for each pair of pixels a watermark bit can be

31 Chapter 2 Overview of Digital Watermarking Domain for Images embedded (e.g. in an image of 640X480 pixels bits of information may be embedded) Frequency Domain Most popular watermarking systems are these that work in frequency domain. These systems make use of some transforms like Discrete Fourier Transform (DFT), Discrete Cosine Transform (DCT) and Discrete Wavelet Transform (DWT). The main advantage of Discrete Fourier Transform (DFT) is that its coefficients stay unaltered after translation attacks. DFT is a complex transform and during this transform the image is divided into two matrices, of amplitude and phase. The phase matrix is more crucial for the quality of the image. Therefore embedding the watermark in the phase matrix makes it more robust against attacks (inducing however more degradation in the quality of the image). This is also coherent with the communication theory that states that frequency modulation is more robust to noise in comparison to amplitude modulation. Watermarking schemes that use DFT transform have some disadvantages too. In order to have

32 Chapter 2 Overview of Digital Watermarking Domain for Images real values for the image luminosity or colour after the inverse DFT transform (idft), the conjugate complex factors must remain symmetric. This demand of symmetry divides in half the given space for information embedding reducing the capacity of the scheme in half. Another disadvantage is that DFT coefficients and especially phase coefficients are susceptible to compression attacks (e.g. JPEG, MPEG). Discrete Cosine Transform (DCT) gives as a result real coefficients. The basic characteristic of this transform is the high concentration of energy in low frequency coefficients with relative low computational cost [38]. This is shown in figure 1 where the DCT coefficients are in logarithmic scale and have been normalized with regard to the DC coefficient

33 Chapter 2 Overview of Digital Watermarking Domain for Images DCT Fig1. Dandelion image and the respective DCT power spectrum Most common lossy or lossless compression techniques (e.g. JPEG, MPEG1, MPEG2 and H26x) use as basis DCT transform. Another feature of this transform is that it is orthogonal and separable. That means that it can be applied on a two dimensional matrix (i.e. image) separately in each dimension thus keeping computational cost low. DCT watermarking schemes exhibit high capacity and increased robustness against attacks like compression and low pass filtering. Furthermore by using DCT watermarking in video (or image) compressed domain (JPEG, MPEG1, MPEG2, H26x) there

34 Chapter 2 Overview of Digital Watermarking Domain for Images is no need to decode and re-encode the signal, saving a significant computational time. Another interesting transform used in digital watermarking is Discrete Wavelet Transform (DWT). It is used both in image and video watermarking as it has many advantages [21], [9]. DWT is a hierarchical transform and analyzes the signal into different bands and levels. It supports resolution of a signal in successive levels as shown in figure 2 where a signal is analyzed in three levels. X[n] stands for the initial signal and h[n], g[n] stand for a high-pass and low-pass filter respectively. Fig2. 3 level DWT analysis. X[n] is the initial signal and h[n], g[n] are high and low pass filters respectively

35 Chapter 2 Overview of Digital Watermarking Domain for Images DWT is a separable transform (like DCT) and it can be applied on a two dimensional matrix (i.e. image) separately in each dimension. Two dimensional DWT (2D-DWT) analyzes the initial image in four frequency bands. The first band (LL) contains the low frequencies both in horizontal and vertical direction. The second band (HH) contains the high frequencies both in horizontal and vertical direction. The third band (HL) contains the high frequencies in horizontal direction and low frequencies in vertical direction. The forth band (LH) contains the low frequencies in horizontal direction and high frequencies in vertical direction. This is shown in figure

36 Chapter 2 Overview of Digital Watermarking Domain for Images Fig3. Analysis of Lena image in frequency bands (LL, HL, LH and HH) by DWT transform The LL band represents the approximation of the image and is the most significant band as it caries most of the image energy. The other three bands contain the details of the image (texture of the

37 Chapter 2 Overview of Digital Watermarking Domain for Images image). The Frequency bands are separated by successive filtering and down sampling of the image first in horizontal and afterwards in vertical direction as shown in figure 3. In 2004 Kundur and Hatzinakos presented Fusemark [18], a new invisible and robust image watermarking scheme which affected many following works. In this scheme DWT is applied both on the original image and the logotype to be embedded. The DWT coefficients of the image and the DWT coefficients of the logotype are then merged. This method is very robust to attacks but has the drawback that it is not blind (i.e. the initial image is needed for extracting the watermark). Gui Xie and Hong Shen evolved fusemark and created XFusemark [46], a blind watermarking scheme which is based on the special features of the Human Visual System (HVS based). Xfusemark applies DWT on the image and DCT on the watermark logotype and is based on fusion of the respective DWT and DCT coefficients. A novelty of Xfusemark is that it embeds the DCT coefficients in the LL band of the image (image approximation) in specific coefficients according to a predefined key. This was done in order to embed as much watermark energy possible in the

38 Chapter 2 Overview of Digital Watermarking Domain for Images image with respect to maintaining the image quality according to the HVS. The final watermarked image is generated by applying inverse DWT on these (fused) coefficients. Xfusemark is very robust to compression attack and Gaussian noise Histogram Domain A group of watermarking systems embed information in a signal through histogram modification. Such systems can not be considered as neither spatial nor frequency systems. One interesting watermarking system that works in histogram domain was introduced by Zhicheng Ni et al [26]. The specific system works on the luminosity histogram of an image (fig. 4) is fully reversible and provides rather high capacity for the watermark with low computational cost. The only disadvantage of this system is its low robustness against attacks. An improvement of [26] was proposed by Lee Sang-Kwang, Suh Young-Ho and Ho Yo-Sung [20]. In this scheme the capacity of the watermark is significantly increased since a difference image, generated as the difference of each pixel of even line from

39 Chapter 2 Overview of Digital Watermarking Domain for Images the respective pixel of the next odd line, is used for embedding the watermark. The disadvantage of this scheme is the same with its predecessor, that is low robustness against attacks, as they are both LSB techniques. Fig4. Luminosity histogram of Elaine image

40 Chapter 2 Overview of Digital Watermarking Domain for Images Independent Component Analysis (ICA) Another category of watermarking schemes is based on Independent Component Analysis (ICA). ICA is a signal processing and data analysis method which was firstly used in Blind Signal Separation (BSS). BSS is applied for acquiring two statistically independent signals from their mixed signal. Watermark extraction can be considered as a BSS problem (decorelating two statistical independent signals), where the overall signal is the watermarked image, and the two statistical independent signals are the host image and the watermark respectively. In recent years ICA algorithms are used in pattern recognition, image compression and analysis as well as in watermarking applications [25], [37], [35]. Watermarking systems that use ICA are usually blind and robust against attacks. Nevertheless ICA algorithms are computationally demanding making the watermarking system rather slow due to high computational time, excluding it from real time applications

41 Chapter 2 Overview of Digital Watermarking Domain for Images 2.12 Hybrid Techniques There are numerous watermarking systems that do not fall in the categories presented above either by combining characteristics by several categories, or by a applying a completely different approach, constituting consequently a category of their own. Such an approach is [21] where the watermark is embedded by modifying the histogram of the Integer Wavelet Transform (IWT) coefficients of the image. The modification of the histogram is made with respect to the properties of the Human Visual System in order to reduce the degradation of the image. Yu et al [49] use multiresolution wavelet transform and embeds a complex watermark. Specifically the real part of the watermark coefficients and the imaginary part of the watermark coefficients are embedded in different bands while keeping the magnitude of the coefficients stable. In this way the algorithm can detect the existence of a watermark with no further information than the watermarked image (zero knowledge)

42 Chapter 2 Overview of Digital Watermarking Domain for Images Another interesting work that could be characterized as hybrid was presented by Osborne et al [28]. The image is separated in two regions, Region Of Interest (ROI) and Region Of Background (ROB). In Region Of Interest a fragile watermark is embedded, while in the Region Of Background (ROB) a robust watermark is embedded many times (multicasting). The robust watermark is formed by the DCT coefficients of the ROI. In that way any alteration of the critical ROI is traced (by the fragile watermark), while an approximation of the ROI can be reconstructed by the ROI DCT coefficients included in the robust watermark Watermarking Taxonomy The overall taxonomy of the various watermarking systems is shown in figure

43 Chapter 2 Overview of Digital Watermarking Domain for Images Watermarking Systems Identification Method Information Required for Watermark Extraction Watermarking Domain Number of Watermarks Visibility Reversibility Adjustability Robustness HVS Visible Readable Blind Reversible 1st generation Robust Spatial Simple HVS based Non Visible Detectable Non blind Non reversible 2nd generation Fragile Frequency Multicasting Non HVS based Zero knowledge Semi-fragile Histogram Zero watermarking ICA Fig5. Taxonomy of Watermarking Systems Hybrid Systems

44 Chapter 3 Reversible Watermarking Based on Histogram Modification 3. Reversible Watermarking Based on Histogram Modification Some watermarking systems embed information in a signal through histogram modification. Such systems can not be considered as neither spatial nor frequency systems. 3.1 Existing schemes One interesting watermarking system that works in histogram domain was introduced by Zhicheng Ni et al [26]. The specific system works on the luminosity histogram of an image (fig. 4) is fully reversible and provides rather high capacity for the watermark with low computational cost. The only disadvantage of this system is its low robustness against attacks. Zhicheng Ni et al s algorithm initially locates the histogram bins with the maximum and minimum inputs (where input is the number of pixels with luminosity value equal to the respective bin) as shown in figure

45 Chapter 3 Reversible Watermarking Based on Histogram Modification Max Min Fig6. Maximum and minimum bins of luminosity histogram for Elaine image Then the part of the histogram bounded by these bins (maximum and minimum) is shifted to the direction of the minimum. This means that the luminosity of all pixels with luminosity values between min and max are increased (or decreased if the histogram is shifted to the left) by one. The above process creates an empty bin in the histogram (where the maximum bin used to be) as shown in figure

46 Chapter 3 Reversible Watermarking Based on Histogram Modification Empty bin Fig7. Shifted histogram to the right and empty bin (where the maximum bin used to be) The watermark information is later on embedded in the empty bin created by the process described above. The image is swept and whenever a pixel with luminosity value equal to max is found a watermark bit is embedded. If the watermark bit to be embedded is zero the pixel stays untouched otherwise if the watermark bit is one the pixel s luminosity is increased by one. The capacity provided by this scheme is equal to the initial input of the

47 Chapter 3 Reversible Watermarking Based on Histogram Modification maximum bin (the bin with most common luminosity). The histogram of the watermarked image is shown in figure 8. Fig8. Luminosity histogram of the watermarked image In case the capacity obtained is not sufficient for the watermark (information to be embedded) more than one maximum-minimum pairs may be selected as shown in figure

48 Chapter 3 Reversible Watermarking Based on Histogram Modification Fig9. Flowchart of the embedding procedure In order to extract the embedded information (watermark) the reverse procedure is applied. The image is swept in the same

49 Chapter 3 Reversible Watermarking Based on Histogram Modification manner and each time a pixel with luminosity value of max or max+1 is found a watermark bit is extracted. Each pixel of luminosity value max corresponds to a watermark bit of zero while each pixel of luminosity value max corresponds to a watermark bit of one. Zhicheng Ni et al s [26] watermarking scheme is fully reversible, provides high capacity (5-80 Kbits for an image of 512X512 pixels) and has low computational cost. The only disadvantage of this system is its low robustness against attacks. An improvement of [26] was proposed by Lee Sang-Kwang, Suh Young-Ho and Ho Yo-Sung [20]. In this scheme a difference image is generated as the difference of each pixel of even line from the respective pixel of the next odd line. For an image of MXN dimensions the difference image is calculated by D(i, j) = I(i, 2j + 1) - I(i, 2j), 0 i M-1, 0 j N/2-1 and has the half size of the initial image. In this case the watermark is not embedded in the luminosity histogram of the host image but in the histogram of the difference image. The difference image has the half size of the initial image. This algorithm takes advantage of the spatial correlation between

50 Chapter 3 Reversible Watermarking Based on Histogram Modification consecutive pixels. In this way the histogram of the difference image is significantly more localized with a higher maximum comparing to the maximum of the histogram of the initial image [20]. This is shown in figures 10 and 11 respectively. Fig10. Luminosity histogram for Elaine image

51 Chapter 3 Reversible Watermarking Based on Histogram Modification Fig11. Histogram of difference image for Elaine image In this scheme the capacity of the watermark is significantly increased since, as in Zhicheng Ni et al s method [26], the capacity is determined by the magnitude of the maximum of the histogram which is significantly higher, as shown in figure 10. The disadvantage of the system is that it has low robustness since it is a LSB technique

52 Chapter 3 Reversible Watermarking Based on Histogram Modification 3.2 Proposed watermarking scheme At present most watermarking schemes perform poorly against geometrical attacks [30]. The most common geometrical attacks are rotation, flipping, translation, aspect ratio changes, resizing and cropping. In many cases in order to handle geometrical attacks, watermarking schemes employ several synchronization methods. These methods usually try to identify the geometrical distortions and invert them, before the watermark detector is applied. The identification of the geometrical distortions is achieved by examining a registration pattern embedded along with the watermark in the host image [29], [7]. However the addition of the registration pattern to the data-carrying watermark reduces the fidelity of the watermarked image, as well as the scheme s capacity. Another weakness of this approach is that usually all the watermarked images carry the same registration watermark. Therefore it is easier to discern the registration watermark by collusion attempts. Once found, the registration pattern could be removed from all the watermarked images, thus restricting the invertibility of any geometric distortions. Additionally

53 Chapter 3 Reversible Watermarking Based on Histogram Modification these methods increase computational time substantially and in some cases perform poorly. There are also watermarking schemes that try to achieve robustness against geometrical attacks, using transformations, invariant to some attacks, and correlation functions like [23] and [19]. Although such schemes show good results with regard to robustness, they require high computational complexity during embedding as well as during extracting the watermark. A novel fully reversible watermarking scheme which is robust to geometrical attacks with low computational cost and is based on histogram modification was presented by Chrysochos, Fotopoulos, Skodras and Xenos [5] Features of the Proposed Scheme The proposed watermarking scheme has the following features: Reversible; the watermarked image can be fully restored to its original status

54 Chapter 3 Reversible Watermarking Based on Histogram Modification Blind; in order to detect the watermark only the watermarked image is needed. Asymmetric; a public key is used for detecting the watermark and a private key is used for restoring the watermarked image. Robust against geometrical attacks like rotation, flipping, translation, aspect ratio changes and resizing, warping, shifting, drawing, scattered tiles as well as their combinations. Multicast; a certain watermark can be embedded several times to increase robustness. Low computational cost. Applicable to very small images (down to 16 x 16). Applicable to colour images. Good watermarked image quality. The basic principle of this scheme is based on the permutation of histogram bins, which are chosen in couples, according to a specific rule. For embedding the watermark a key is

55 Chapter 3 Reversible Watermarking Based on Histogram Modification required. This is a real number that specifies the area where the watermark is to be embedded. This key is also necessary for the detection and extraction of the watermark. Therefore it is considered as public key. A second key, which is referred to, as private key, is used for the full restoration of the image Embedding Procedure The most important parameter needed, in order to embed the watermark into the host image, is the public key. This key (as mentioned above) is a real number that determines the area where the watermark is to be embedded. Its integer part (start) indicates the point of the histogram, where the embedding procedure will start choosing histogram bin couples. Its decimal part, multiplied by ten, defines the minimum distance, two histogram bins of a couple may have. We will refer to this distance as step. start = public_key div 1 step = 10*(public_key mod 1) The steps, of the embedding algorithm, in order to embed a watermark in a grayscale image are the following:

56 Chapter 3 Reversible Watermarking Based on Histogram Modification a. The histogram of the host image is computed. b. start and step are calculated with respect to the public key. c. The first couple (a, b) of the histogram bins is chosen according to start and step, as shown in figure 12. If the corresponding values of the histogram hist(a) and hist(b) are equal, we reject this couple and we continue with the next one. d. For each couple (a, b) and each bit (w) of the watermark respectively, the following rule is applied. If w equals zero then the histogram values hist(a) and hist(b) should be in ascending order. In the opposite case, i.e. when w equals one, the histogram values should be in descending order. w = 0 hist(a) < hist(b) w = 1 hist(a) > hist(b) If the values of a couple are not in the right order according to this rule, then they are swapped, in order to follow the rule. When two values of the histogram are swapped, we ensure that the value of the corresponding pixels, with luminance a and b respectively, are interchanged

57 Chapter 3 Reversible Watermarking Based on Histogram Modification hist(a) hist(b) Figure12. Host Image Histogram and corresponding couple (a, b) e. The next couple (a, b) of the histogram bins is chosen according to start and step for embedding the next bit (w) of the watermark. Steps c and d of the algorithm are repeated until all bits (w) of the watermark are embedded in the image. f. The private key, which is necessary for the restoration of the image, is generated in accordance with the procedure watermark embedding. For each couple (a, b) of the histogram bins that are chosen, a bit (pk) of the private key is generated according to this rule: if originally hist(a) and hist(b) are in

58 Chapter 3 Reversible Watermarking Based on Histogram Modification ascending order, pk equals zero. Else, if originally hist(a) and hist(b) are in descending order, pk equals zero. hist(a) < hist(b) pk = 0 hist(a) > hist(b) pk = 1 g. In case that the algorithm reaches the end of the histogram (which corresponds to intensity value of 255), it continues from the beginning of the histogram (which corresponds to intensity value of 0), provided that the couple (a, b) does not collide with a previously selected couple. In order to avoid artifacts in the watermarked image, the maximum distance between a and b is set to 9. Another case where artifacts could arise, is when a is at the end of the histogram, while b is at the beginning. Such a case is foreseen and prohibited. The flowchart of the embedding procedure is shown in figure

59 Chapter 3 Reversible Watermarking Based on Histogram Modification Host image, Watermark, Public Key Histogram generation YES End of watermark NO Watermarked Image, Private Key a, b selection Private Key generation Histogram Modification-Embedding Figure13. Embedding Algorithm

60 Chapter 3 Reversible Watermarking Based on Histogram Modification During the watermark embedding, the shape of the histogram stays almost unaltered. This is shown in figures 14 and 15 where figure 14 depicts the histogram of the original image Elaine, while figure 15 depicts the histogram of the watermarked image. Figure14. Luminosity histogram of Elaine image

61 Chapter 3 Reversible Watermarking Based on Histogram Modification Figure15. Luminosity histogram of watermarked image Only when the two histograms are more thoroughly examined, one can see in detail the changes that are induced by the embedding algorithm, as the histogram bins are interchanged. This is shown in figures 16 and 17. Figure 16 shows a close up view of the luminosity histogram of Elaine image, while figure 17 shows a close up view of the respective region of the histogram of the watermarked image

62 Chapter 3 Reversible Watermarking Based on Histogram Modification Figure16. Close-up view of luminosity histogram of Elaine image hist(a) hist(b) Figure17. Close-up view of Luminosity histogram of watermarked image

63 Chapter 3 Reversible Watermarking Based on Histogram Modification Watermark Extraction The parameters needed in order to extract the watermark from a possibly marked image, apart from the image itself, is the public key and the watermark size. The public key, as mentioned above is a real number that determines the histogram area where the watermark is embedded in. The scheme is blind and thus there is no need for the original image. The steps, of the extracting algorithm, in order to extract the watermark out of a grayscale image are the following: a. The histogram of the watermarked image is computed. b. start and step are calculated with respect to the public key. c. The first couple (a,b) of the histogram bins is chosen according to start and step. If the corresponding values of the histogram hist(a) and hist(b) are equal, this couple is rejected and the process continues with the next one. d. Each couple (a,b) corresponds to a single bit (w) of the watermark. The following rule is applied. If the histogram values (hist(a), hist(b)) are in ascending order w equals zero. In the opposite case, where histogram values are in descending order w equals one

64 Chapter 3 Reversible Watermarking Based on Histogram Modification hist (a) < hist (b) w = 0 hist(a) > hist (b) w = 1 e. The next couple (a, b) of the histogram bins is chosen according to start and step for extracting the next bit (w) of the watermark. Steps c and d of the algorithm are repeated until all the bits (w) of the watermark are extracted. It is crucial for the extracting process, to choose the same couples (a, b), that were chosen during the embedding process. Therefore the choice of the couples follows exactly the same rules with the embedding algorithm. The process of extracting the watermark can be successful only if the couples that are chosen for extraction are exactly the same with those, chosen for embedding. The flowchart of the extracting algorithm is shown in figure

65 Chapter 3 Reversible Watermarking Based on Histogram Modification Watermarked image, Public key Histogram generation YES End of watermark NO Watermark a, b selection Watermark Extraction Figure18. Extracting Algorithm

66 Chapter 3 Reversible Watermarking Based on Histogram Modification Restoration of Watermarked Image In order to restore the watermarked image to its original form, both the private and the public keys are needed. The private key is the key that has been created during the embedding process. The steps of the restoring algorithm, in order to retrieve the original image, are the following: a. The histogram of the watermarked image is computed b. start and step are calculated with respect to the public key. c. The first couple (a,b) of the histogram bins is chosen according to start and step. If the corresponding values of the histogram hist(a) and hist(b) are equal, this couple is rejected and the algorithm proceeds to the next one. d. For each couple (a,b) and each bit (pk) of the private key respectively, the following rule is applied. If pk equals zero then the histogram values (hist(a), hist(b)) should be in ascending order. In the opposite case, where pk equals one, the histogram values should be in descending order. pk = 0 hist (a) < hist (b) pk = 1 hist (a) > hist (b)

67 Chapter 3 Reversible Watermarking Based on Histogram Modification If the values of a couple are not in the right order according to this rule, then they are swapped, in order to follow the rule. When two values of the histogram are swapped, the intensity values of the corresponding pixels are interchanged. e. The next couple (a,b) of the histogram bins is chosen according to start and step. Steps c and d of the algorithm are repeated until all the bits (pk) of the private key are examined with respect to the histogram. It is crucial for the restoring process to choose the same couples (a, b), that were chosen during the embedding process. Therefore the choice of the couples follows the exact same rules with the embedding algorithm. 3.3 Experimental results The watermarking algorithm that was described in section 3.2 could be also applied for the case of colour pictures. The only difference is that instead of gray scale intensity values, it should be

68 Chapter 3 Reversible Watermarking Based on Histogram Modification applied to the color components, RGB, or YCbCr respectively. In this way a watermark could be embedded three times, thus achieving improved robustness. The robustness in geometrical attacks is increased, as a change in a pixel affects different bins of each component s histogram, thus it is less probable that all three watermarks are affected in the same way. Furthermore, robustness may increase more by embedding a symmetrical watermark, in a way that allows integrity check, as well. So, if the extracted watermark follows a given symmetry, it is ensured that the watermark is intact. On the other hand, if increased capacity is of prime concern, a three times larger watermark can be embedded partially in each color component. The maximum capacity of this scheme is rather low, namely 128 bits, but it may rise to 384 bits, if we use three color components. It has the advantage, though, that it can be applied to very small images (down to 16 x 16), with reduced capacity. The scheme may provide up to 2304 different public keys (this results as the combination of 256 different values for start with 9 different values for step) for gray scale images and different public keys (2304^3) for colour images

A Secure File Transfer based on Discrete Wavelet Transformation and Audio Watermarking Techniques

A Secure File Transfer based on Discrete Wavelet Transformation and Audio Watermarking Techniques A Secure File Transfer based on Discrete Wavelet Transformation and Audio Watermarking Techniques Vineela Behara,Y Ramesh Department of Computer Science and Engineering Aditya institute of Technology and

More information

Watermarking Techniques for Protecting Intellectual Properties in a Digital Environment

Watermarking Techniques for Protecting Intellectual Properties in a Digital Environment Watermarking Techniques for Protecting Intellectual Properties in a Digital Environment Isinkaye F. O*. and Aroge T. K. Department of Computer Science and Information Technology University of Science and

More information

Image Authentication Scheme using Digital Signature and Digital Watermarking

Image Authentication Scheme using Digital Signature and Digital Watermarking www..org 59 Image Authentication Scheme using Digital Signature and Digital Watermarking Seyed Mohammad Mousavi Industrial Management Institute, Tehran, Iran Abstract Usual digital signature schemes for

More information

2695 P a g e. IV Semester M.Tech (DCN) SJCIT Chickballapur Karnataka India

2695 P a g e. IV Semester M.Tech (DCN) SJCIT Chickballapur Karnataka India Integrity Preservation and Privacy Protection for Digital Medical Images M.Krishna Rani Dr.S.Bhargavi IV Semester M.Tech (DCN) SJCIT Chickballapur Karnataka India Abstract- In medical treatments, the integrity

More information

ROI Based Medical Image Watermarking with Zero Distortion and Enhanced Security

ROI Based Medical Image Watermarking with Zero Distortion and Enhanced Security I.J. Modern Education and Computer Science, 2014, 10, 40-48 Published Online October 2014 in MECS (http://www.mecs-press.org/) DOI: 10.5815/ijmecs.2014.10.06 ROI Based Medical Image Watermarking with Zero

More information

Volume 2, Issue 12, December 2014 International Journal of Advance Research in Computer Science and Management Studies

Volume 2, Issue 12, December 2014 International Journal of Advance Research in Computer Science and Management Studies Volume 2, Issue 12, December 2014 International Journal of Advance Research in Computer Science and Management Studies Research Article / Survey Paper / Case Study Available online at: www.ijarcsms.com

More information

CHAPTER 7 CONCLUSION AND FUTURE WORK

CHAPTER 7 CONCLUSION AND FUTURE WORK 158 CHAPTER 7 CONCLUSION AND FUTURE WORK The aim of this thesis was to present robust watermarking techniques for medical image. Section 7.1, consolidates the contributions made by the researcher and Section

More information

Keywords Android, Copyright Protection, Discrete Cosine Transform (DCT), Digital Watermarking, Discrete Wavelet Transform (DWT), YCbCr.

Keywords Android, Copyright Protection, Discrete Cosine Transform (DCT), Digital Watermarking, Discrete Wavelet Transform (DWT), YCbCr. Volume 3, Issue 7, July 2013 ISSN: 2277 128X International Journal of Advanced Research in Computer Science and Software Engineering Research Paper Available online at: www.ijarcsse.com Web Based Novel

More information

Introduction to Medical Image Compression Using Wavelet Transform

Introduction to Medical Image Compression Using Wavelet Transform National Taiwan University Graduate Institute of Communication Engineering Time Frequency Analysis and Wavelet Transform Term Paper Introduction to Medical Image Compression Using Wavelet Transform 李 自

More information

WATERMARKING FOR IMAGE AUTHENTICATION

WATERMARKING FOR IMAGE AUTHENTICATION WATERMARKING FOR IMAGE AUTHENTICATION Min Wu Bede Liu Department of Electrical Engineering Princeton University, Princeton, NJ 08544, USA Fax: +1-609-258-3745 {minwu, liu}@ee.princeton.edu ABSTRACT A data

More information

Reversible Data Hiding for Security Applications

Reversible Data Hiding for Security Applications Reversible Data Hiding for Security Applications Baig Firdous Sulthana, M.Tech Student (DECS), Gudlavalleru engineering college, Gudlavalleru, Krishna (District), Andhra Pradesh (state), PIN-521356 S.

More information

International Journal of Computer Sciences and Engineering Open Access. A novel technique to hide information using Daubechies Transformation

International Journal of Computer Sciences and Engineering Open Access. A novel technique to hide information using Daubechies Transformation International Journal of Computer Sciences and Engineering Open Access Research Paper Volume-4, Special Issue-1 E-ISSN: 2347-2693 A novel technique to hide information using Daubechies Transformation Jyotsna

More information

Comparison of different image compression formats. ECE 533 Project Report Paula Aguilera

Comparison of different image compression formats. ECE 533 Project Report Paula Aguilera Comparison of different image compression formats ECE 533 Project Report Paula Aguilera Introduction: Images are very important documents nowadays; to work with them in some applications they need to be

More information

Dynamic Binary Location based Multi-watermark Embedding Algorithm in DWT

Dynamic Binary Location based Multi-watermark Embedding Algorithm in DWT Dynamic Binary Location based Multi-watermark Embedding Algorithm in DWT Ammar Jameel Hussein, Seda Yuksel, and Ersin Elbasi Abstract In order to achieve a good imperceptibility and robustness, using 4-level

More information

Image Compression through DCT and Huffman Coding Technique

Image Compression through DCT and Huffman Coding Technique International Journal of Current Engineering and Technology E-ISSN 2277 4106, P-ISSN 2347 5161 2015 INPRESSCO, All Rights Reserved Available at http://inpressco.com/category/ijcet Research Article Rahul

More information

Security and protection of digital images by using watermarking methods

Security and protection of digital images by using watermarking methods Security and protection of digital images by using watermarking methods Andreja Samčović Faculty of Transport and Traffic Engineering University of Belgrade, Serbia Gjovik, june 2014. Digital watermarking

More information

A Robust and Lossless Information Embedding in Image Based on DCT and Scrambling Algorithms

A Robust and Lossless Information Embedding in Image Based on DCT and Scrambling Algorithms A Robust and Lossless Information Embedding in Image Based on DCT and Scrambling Algorithms Dr. Mohammad V. Malakooti Faculty and Head of Department of Computer Engineering, Islamic Azad University, UAE

More information

Study and Implementation of Video Compression Standards (H.264/AVC and Dirac)

Study and Implementation of Video Compression Standards (H.264/AVC and Dirac) Project Proposal Study and Implementation of Video Compression Standards (H.264/AVC and Dirac) Sumedha Phatak-1000731131- sumedha.phatak@mavs.uta.edu Objective: A study, implementation and comparison of

More information

Multi-factor Authentication in Banking Sector

Multi-factor Authentication in Banking Sector Multi-factor Authentication in Banking Sector Tushar Bhivgade, Mithilesh Bhusari, Ajay Kuthe, Bhavna Jiddewar,Prof. Pooja Dubey Department of Computer Science & Engineering, Rajiv Gandhi College of Engineering

More information

JPEG Image Compression by Using DCT

JPEG Image Compression by Using DCT International Journal of Computer Sciences and Engineering Open Access Research Paper Volume-4, Issue-4 E-ISSN: 2347-2693 JPEG Image Compression by Using DCT Sarika P. Bagal 1* and Vishal B. Raskar 2 1*

More information

Introduction to image coding

Introduction to image coding Introduction to image coding Image coding aims at reducing amount of data required for image representation, storage or transmission. This is achieved by removing redundant data from an image, i.e. by

More information

Conceptual Framework Strategies for Image Compression: A Review

Conceptual Framework Strategies for Image Compression: A Review International Journal of Computer Sciences and Engineering Open Access Review Paper Volume-4, Special Issue-1 E-ISSN: 2347-2693 Conceptual Framework Strategies for Image Compression: A Review Sumanta Lal

More information

AUTHORIZED WATERMARKING AND ENCRYPTION SYSTEM BASED ON WAVELET TRANSFORM FOR TELERADIOLOGY SECURITY ISSUES

AUTHORIZED WATERMARKING AND ENCRYPTION SYSTEM BASED ON WAVELET TRANSFORM FOR TELERADIOLOGY SECURITY ISSUES AUTHORIZED WATERMARKING AND ENCRYPTION SYSTEM BASED ON WAVELET TRANSFORM FOR TELERADIOLOGY SECURITY ISSUES S.NANDHINI PG SCHOLAR NandhaEngg. College Erode, Tamilnadu, India. Dr.S.KAVITHA M.E.,Ph.d PROFESSOR

More information

Video Authentication for H.264/AVC using Digital Signature Standard and Secure Hash Algorithm

Video Authentication for H.264/AVC using Digital Signature Standard and Secure Hash Algorithm Video Authentication for H.264/AVC using Digital Signature Standard and Secure Hash Algorithm Nandakishore Ramaswamy Qualcomm Inc 5775 Morehouse Dr, Sam Diego, CA 92122. USA nandakishore@qualcomm.com K.

More information

DIGITAL IMAGE PROCESSING AND ANALYSIS

DIGITAL IMAGE PROCESSING AND ANALYSIS DIGITAL IMAGE PROCESSING AND ANALYSIS Human and Computer Vision Applications with CVIPtools SECOND EDITION SCOTT E UMBAUGH Uffi\ CRC Press Taylor &. Francis Group Boca Raton London New York CRC Press is

More information

CHAPTER 2 LITERATURE REVIEW

CHAPTER 2 LITERATURE REVIEW 11 CHAPTER 2 LITERATURE REVIEW 2.1 INTRODUCTION Image compression is mainly used to reduce storage space, transmission time and bandwidth requirements. In the subsequent sections of this chapter, general

More information

Multimedia Document Authentication using On-line Signatures as Watermarks

Multimedia Document Authentication using On-line Signatures as Watermarks Multimedia Document Authentication using On-line Signatures as Watermarks Anoop M Namboodiri and Anil K Jain Department of Computer Science and Engineering Michigan State University East Lansing, MI 48824

More information

Using fractal compression scheme to embed a digital signature into an image

Using fractal compression scheme to embed a digital signature into an image Using fractal compression scheme to embed a digital signature into an image Joan Puate, Fred Jordan Swiss federal institute of technology Signal Processing Laboratory CH-1015 Lausanne Switzerland Email:

More information

A Digital Audio Watermark Embedding Algorithm

A Digital Audio Watermark Embedding Algorithm Xianghong Tang, Yamei Niu, Hengli Yue, Zhongke Yin Xianghong Tang, Yamei Niu, Hengli Yue, Zhongke Yin School of Communication Engineering, Hangzhou Dianzi University, Hangzhou, Zhejiang, 3008, China tangxh@hziee.edu.cn,

More information

JPEG compression of monochrome 2D-barcode images using DCT coefficient distributions

JPEG compression of monochrome 2D-barcode images using DCT coefficient distributions Edith Cowan University Research Online ECU Publications Pre. JPEG compression of monochrome D-barcode images using DCT coefficient distributions Keng Teong Tan Hong Kong Baptist University Douglas Chai

More information

PIXEL-LEVEL IMAGE FUSION USING BROVEY TRANSFORME AND WAVELET TRANSFORM

PIXEL-LEVEL IMAGE FUSION USING BROVEY TRANSFORME AND WAVELET TRANSFORM PIXEL-LEVEL IMAGE FUSION USING BROVEY TRANSFORME AND WAVELET TRANSFORM Rohan Ashok Mandhare 1, Pragati Upadhyay 2,Sudha Gupta 3 ME Student, K.J.SOMIYA College of Engineering, Vidyavihar, Mumbai, Maharashtra,

More information

Sachin Patel HOD I.T Department PCST, Indore, India. Parth Bhatt I.T Department, PCST, Indore, India. Ankit Shah CSE Department, KITE, Jaipur, India

Sachin Patel HOD I.T Department PCST, Indore, India. Parth Bhatt I.T Department, PCST, Indore, India. Ankit Shah CSE Department, KITE, Jaipur, India Image Enhancement Using Various Interpolation Methods Parth Bhatt I.T Department, PCST, Indore, India Ankit Shah CSE Department, KITE, Jaipur, India Sachin Patel HOD I.T Department PCST, Indore, India

More information

Security Based Data Transfer and Privacy Storage through Watermark Detection

Security Based Data Transfer and Privacy Storage through Watermark Detection Security Based Data Transfer and Privacy Storage through Watermark Detection Gowtham.T 1 Pradeep Kumar.G 2 1PG Scholar, Applied Electronics, Nandha Engineering College, Anna University, Erode, India. 2Assistant

More information

HSI BASED COLOUR IMAGE EQUALIZATION USING ITERATIVE n th ROOT AND n th POWER

HSI BASED COLOUR IMAGE EQUALIZATION USING ITERATIVE n th ROOT AND n th POWER HSI BASED COLOUR IMAGE EQUALIZATION USING ITERATIVE n th ROOT AND n th POWER Gholamreza Anbarjafari icv Group, IMS Lab, Institute of Technology, University of Tartu, Tartu 50411, Estonia sjafari@ut.ee

More information

STEGANOGRAPHY: TEXT FILE HIDING IN IMAGE YAW CHOON KIT CA10022

STEGANOGRAPHY: TEXT FILE HIDING IN IMAGE YAW CHOON KIT CA10022 STEGANOGRAPHY: TEXT FILE HIDING IN IMAGE YAW CHOON KIT CA10022 FACULTY OF COMPUTER SYSTEM AND SOFTWARE ENGINEERING 2012/2013 1 ABSTRACT Steganography is the art or science in hiding. It is origin from

More information

Study and Implementation of Video Compression standards (H.264/AVC, Dirac)

Study and Implementation of Video Compression standards (H.264/AVC, Dirac) Study and Implementation of Video Compression standards (H.264/AVC, Dirac) EE 5359-Multimedia Processing- Spring 2012 Dr. K.R Rao By: Sumedha Phatak(1000731131) Objective A study, implementation and comparison

More information

Modelling, Extraction and Description of Intrinsic Cues of High Resolution Satellite Images: Independent Component Analysis based approaches

Modelling, Extraction and Description of Intrinsic Cues of High Resolution Satellite Images: Independent Component Analysis based approaches Modelling, Extraction and Description of Intrinsic Cues of High Resolution Satellite Images: Independent Component Analysis based approaches PhD Thesis by Payam Birjandi Director: Prof. Mihai Datcu Problematic

More information

A Novel Method to Improve Resolution of Satellite Images Using DWT and Interpolation

A Novel Method to Improve Resolution of Satellite Images Using DWT and Interpolation A Novel Method to Improve Resolution of Satellite Images Using DWT and Interpolation S.VENKATA RAMANA ¹, S. NARAYANA REDDY ² M.Tech student, Department of ECE, SVU college of Engineering, Tirupati, 517502,

More information

Multiple Embedding Using Robust Watermarks for Wireless Medical Images

Multiple Embedding Using Robust Watermarks for Wireless Medical Images Multiple Embedding Using Robust Watermarks for Wireless Medical Images Dominic Osborne and Derek Abbott Centre for Biomedical Engineering (CBME) The University of Adelaide, SA 5005, Australia Matthew Sorell

More information

Redundant Wavelet Transform Based Image Super Resolution

Redundant Wavelet Transform Based Image Super Resolution Redundant Wavelet Transform Based Image Super Resolution Arti Sharma, Prof. Preety D Swami Department of Electronics &Telecommunication Samrat Ashok Technological Institute Vidisha Department of Electronics

More information

PCM Encoding and Decoding:

PCM Encoding and Decoding: PCM Encoding and Decoding: Aim: Introduction to PCM encoding and decoding. Introduction: PCM Encoding: The input to the PCM ENCODER module is an analog message. This must be constrained to a defined bandwidth

More information

Robust Blind Watermarking Mechanism For Point Sampled Geometry

Robust Blind Watermarking Mechanism For Point Sampled Geometry Robust Blind Watermarking Mechanism For Point Sampled Geometry Parag Agarwal Balakrishnan Prabhakaran Department of Computer Science, University of Texas at Dallas MS EC 31, PO Box 830688, Richardson,

More information

AN ENHANCED MECHANISM FOR SECURE DATA TRANSMISSION USING STEGANOGRAPHY MERGED WITH VISUAL CRYPTOGRAPHY

AN ENHANCED MECHANISM FOR SECURE DATA TRANSMISSION USING STEGANOGRAPHY MERGED WITH VISUAL CRYPTOGRAPHY AN ENHANCED MECHANISM FOR SECURE DATA TRANSMISSION USING STEGANOGRAPHY MERGED WITH VISUAL CRYPTOGRAPHY Chandan Mohapatra 1, Manajusha Pandey 2 1 PG Student in Computer Science Dept., KIIT University, Bhubaneswar,

More information

Simultaneous Gamma Correction and Registration in the Frequency Domain

Simultaneous Gamma Correction and Registration in the Frequency Domain Simultaneous Gamma Correction and Registration in the Frequency Domain Alexander Wong a28wong@uwaterloo.ca William Bishop wdbishop@uwaterloo.ca Department of Electrical and Computer Engineering University

More information

FFT Algorithms. Chapter 6. Contents 6.1

FFT Algorithms. Chapter 6. Contents 6.1 Chapter 6 FFT Algorithms Contents Efficient computation of the DFT............................................ 6.2 Applications of FFT................................................... 6.6 Computing DFT

More information

Friendly Medical Image Sharing Scheme

Friendly Medical Image Sharing Scheme Journal of Information Hiding and Multimedia Signal Processing 2014 ISSN 2073-4212 Ubiquitous International Volume 5, Number 3, July 2014 Frily Medical Image Sharing Scheme Hao-Kuan Tso Department of Computer

More information

Video-Conferencing System

Video-Conferencing System Video-Conferencing System Evan Broder and C. Christoher Post Introductory Digital Systems Laboratory November 2, 2007 Abstract The goal of this project is to create a video/audio conferencing system. Video

More information

The Scientific Data Mining Process

The Scientific Data Mining Process Chapter 4 The Scientific Data Mining Process When I use a word, Humpty Dumpty said, in rather a scornful tone, it means just what I choose it to mean neither more nor less. Lewis Carroll [87, p. 214] In

More information

SECURE DATA TRANSMISSION USING DIGITAL IMAGE WATERMARKING

SECURE DATA TRANSMISSION USING DIGITAL IMAGE WATERMARKING SECURE DATA TRANSMISSION USING DIGITAL IMAGE WATERMARKING 1 Maulik Srivastava, 2 Anuradha Sharma 1,2 Department of Computer Science & Engineering, Amity University, Uttar Pradesh Abstract: As we all know

More information

Figure 1: Relation between codec, data containers and compression algorithms.

Figure 1: Relation between codec, data containers and compression algorithms. Video Compression Djordje Mitrovic University of Edinburgh This document deals with the issues of video compression. The algorithm, which is used by the MPEG standards, will be elucidated upon in order

More information

Tracking Moving Objects In Video Sequences Yiwei Wang, Robert E. Van Dyck, and John F. Doherty Department of Electrical Engineering The Pennsylvania State University University Park, PA16802 Abstract{Object

More information

Sachin Dhawan Deptt. of ECE, UIET, Kurukshetra University, Kurukshetra, Haryana, India

Sachin Dhawan Deptt. of ECE, UIET, Kurukshetra University, Kurukshetra, Haryana, India Abstract Image compression is now essential for applications such as transmission and storage in data bases. In this paper we review and discuss about the image compression, need of compression, its principles,

More information

Video compression: Performance of available codec software

Video compression: Performance of available codec software Video compression: Performance of available codec software Introduction. Digital Video A digital video is a collection of images presented sequentially to produce the effect of continuous motion. It takes

More information

Combating Anti-forensics of Jpeg Compression

Combating Anti-forensics of Jpeg Compression IJCSI International Journal of Computer Science Issues, Vol. 9, Issue 6, No 3, November 212 ISSN (Online): 1694-814 www.ijcsi.org 454 Combating Anti-forensics of Jpeg Compression Zhenxing Qian 1, Xinpeng

More information

ECE 533 Project Report Ashish Dhawan Aditi R. Ganesan

ECE 533 Project Report Ashish Dhawan Aditi R. Ganesan Handwritten Signature Verification ECE 533 Project Report by Ashish Dhawan Aditi R. Ganesan Contents 1. Abstract 3. 2. Introduction 4. 3. Approach 6. 4. Pre-processing 8. 5. Feature Extraction 9. 6. Verification

More information

http://www.springer.com/0-387-23402-0

http://www.springer.com/0-387-23402-0 http://www.springer.com/0-387-23402-0 Chapter 2 VISUAL DATA FORMATS 1. Image and Video Data Digital visual data is usually organised in rectangular arrays denoted as frames, the elements of these arrays

More information

SPEECH SIGNAL CODING FOR VOIP APPLICATIONS USING WAVELET PACKET TRANSFORM A

SPEECH SIGNAL CODING FOR VOIP APPLICATIONS USING WAVELET PACKET TRANSFORM A International Journal of Science, Engineering and Technology Research (IJSETR), Volume, Issue, January SPEECH SIGNAL CODING FOR VOIP APPLICATIONS USING WAVELET PACKET TRANSFORM A N.Rama Tej Nehru, B P.Sunitha

More information

Hybrid DCT-DWT Watermarking and IDEA Encryption of Internet Contents

Hybrid DCT-DWT Watermarking and IDEA Encryption of Internet Contents IJCSI International Journal of Computer Science Issues, Vol. 9, Issue 1, o, January 01 www.ijcsi.org 394 Hybrid Watermarking and IDEA Encryption of Internet Contents M.A. Mohamed and A.M. El-Mohandes Electronics

More information

DYNAMIC DOMAIN CLASSIFICATION FOR FRACTAL IMAGE COMPRESSION

DYNAMIC DOMAIN CLASSIFICATION FOR FRACTAL IMAGE COMPRESSION DYNAMIC DOMAIN CLASSIFICATION FOR FRACTAL IMAGE COMPRESSION K. Revathy 1 & M. Jayamohan 2 Department of Computer Science, University of Kerala, Thiruvananthapuram, Kerala, India 1 revathysrp@gmail.com

More information

Lecture 14. Point Spread Function (PSF)

Lecture 14. Point Spread Function (PSF) Lecture 14 Point Spread Function (PSF), Modulation Transfer Function (MTF), Signal-to-noise Ratio (SNR), Contrast-to-noise Ratio (CNR), and Receiver Operating Curves (ROC) Point Spread Function (PSF) Recollect

More information

Module II: Multimedia Data Mining

Module II: Multimedia Data Mining ALMA MATER STUDIORUM - UNIVERSITÀ DI BOLOGNA Module II: Multimedia Data Mining Laurea Magistrale in Ingegneria Informatica University of Bologna Multimedia Data Retrieval Home page: http://www-db.disi.unibo.it/courses/dm/

More information

Invisible Image Water Marking Using Hybrid DWT Compression/Decompression Technique

Invisible Image Water Marking Using Hybrid DWT Compression/Decompression Technique Invisible Image Water Marking Using Hybrid DWT Compression/Decompression Technique B.Sai Kiran M.Tech (VLSI), CMR Institute of Technology. Mr.Shahbaz Khan Associate Professor, CMR Institute of Technology.

More information

International Journal of Emerging Technology and Advanced Engineering Website: www.ijetae.com (ISSN 2250-2459, Volume 2, Issue 9, September 2012)

International Journal of Emerging Technology and Advanced Engineering Website: www.ijetae.com (ISSN 2250-2459, Volume 2, Issue 9, September 2012) Authentication of Medical Images using Integer Transforms A.Kannammal 1, Dr.S.Subha Rani 2 1 Assistant professor, 2 Professor and Head, ECE Department, PSG College of Technology, Peelamedu, Coimbatore

More information

A comprehensive survey on various ETC techniques for secure Data transmission

A comprehensive survey on various ETC techniques for secure Data transmission A comprehensive survey on various ETC techniques for secure Data transmission Shaikh Nasreen 1, Prof. Suchita Wankhade 2 1, 2 Department of Computer Engineering 1, 2 Trinity College of Engineering and

More information

encoding compression encryption

encoding compression encryption encoding compression encryption ASCII utf-8 utf-16 zip mpeg jpeg AES RSA diffie-hellman Expressing characters... ASCII and Unicode, conventions of how characters are expressed in bits. ASCII (7 bits) -

More information

International Archives of the Photogrammetry, Remote Sensing and Spatial Information Sciences, Vol. XXXIV-5/W10

International Archives of the Photogrammetry, Remote Sensing and Spatial Information Sciences, Vol. XXXIV-5/W10 Accurate 3D information extraction from large-scale data compressed image and the study of the optimum stereo imaging method Riichi NAGURA *, * Kanagawa Institute of Technology nagura@ele.kanagawa-it.ac.jp

More information

Turgut Ozal University. Computer Engineering Department. TR-06010 Ankara, Turkey

Turgut Ozal University. Computer Engineering Department. TR-06010 Ankara, Turkey Dr. YILDIRAY YALMAN Associate Professor CONTACT INFORMATION Turgut Ozal University Computer Engineering Department TR-06010 Ankara, Turkey Phone: +90 (0)312-5515437 E-mail: yyalman@turgutozal.edu.tr RESEARCH

More information

A GPU based real-time video compression method for video conferencing

A GPU based real-time video compression method for video conferencing A GPU based real-time video compression method for video conferencing Stamos Katsigiannis, Dimitris Maroulis Department of Informatics and Telecommunications University of Athens Athens, Greece {stamos,

More information

MEDICAL IMAGE COMPRESSION USING HYBRID CODER WITH FUZZY EDGE DETECTION

MEDICAL IMAGE COMPRESSION USING HYBRID CODER WITH FUZZY EDGE DETECTION MEDICAL IMAGE COMPRESSION USING HYBRID CODER WITH FUZZY EDGE DETECTION K. Vidhya 1 and S. Shenbagadevi Department of Electrical & Communication Engineering, College of Engineering, Anna University, Chennai,

More information

Transportation-theoretic image counterforensics to First Significant Digit histogram forensics

Transportation-theoretic image counterforensics to First Significant Digit histogram forensics Transportation-theoretic image counterforensics to First Significant Digit histogram forensics Cecilia Pasquini cecilia.pasquini@unitn.it Giulia Boato boato@disi.unitn.it University of Trento, DISI, Multimedia

More information

Video Encryption Exploiting Non-Standard 3D Data Arrangements. Stefan A. Kramatsch, Herbert Stögner, and Andreas Uhl uhl@cosy.sbg.ac.

Video Encryption Exploiting Non-Standard 3D Data Arrangements. Stefan A. Kramatsch, Herbert Stögner, and Andreas Uhl uhl@cosy.sbg.ac. Video Encryption Exploiting Non-Standard 3D Data Arrangements Stefan A. Kramatsch, Herbert Stögner, and Andreas Uhl uhl@cosy.sbg.ac.at Andreas Uhl 1 Carinthia Tech Institute & Salzburg University Outline

More information

Face detection is a process of localizing and extracting the face region from the

Face detection is a process of localizing and extracting the face region from the Chapter 4 FACE NORMALIZATION 4.1 INTRODUCTION Face detection is a process of localizing and extracting the face region from the background. The detected face varies in rotation, brightness, size, etc.

More information

New Hash Function Construction for Textual and Geometric Data Retrieval

New Hash Function Construction for Textual and Geometric Data Retrieval Latest Trends on Computers, Vol., pp.483-489, ISBN 978-96-474-3-4, ISSN 79-45, CSCC conference, Corfu, Greece, New Hash Function Construction for Textual and Geometric Data Retrieval Václav Skala, Jan

More information

Digimarc for Images. Best Practices Guide (Chroma + Classic Edition)

Digimarc for Images. Best Practices Guide (Chroma + Classic Edition) Digimarc for Images Best Practices Guide (Chroma + Classic Edition) Best Practices Guide (Chroma + Classic Edition) Why should you digitally watermark your images? 3 What types of images can be digitally

More information

MMGD0203 Multimedia Design MMGD0203 MULTIMEDIA DESIGN. Chapter 3 Graphics and Animations

MMGD0203 Multimedia Design MMGD0203 MULTIMEDIA DESIGN. Chapter 3 Graphics and Animations MMGD0203 MULTIMEDIA DESIGN Chapter 3 Graphics and Animations 1 Topics: Definition of Graphics Why use Graphics? Graphics Categories Graphics Qualities File Formats Types of Graphics Graphic File Size Introduction

More information

SIGNATURE VERIFICATION

SIGNATURE VERIFICATION SIGNATURE VERIFICATION Dr. H.B.Kekre, Dr. Dhirendra Mishra, Ms. Shilpa Buddhadev, Ms. Bhagyashree Mall, Mr. Gaurav Jangid, Ms. Nikita Lakhotia Computer engineering Department, MPSTME, NMIMS University

More information

Euler Vector: A Combinatorial Signature for Gray-Tone Images

Euler Vector: A Combinatorial Signature for Gray-Tone Images Euler Vector: A Combinatorial Signature for Gray-Tone Images Arijit Bishnu, Bhargab B. Bhattacharya y, Malay K. Kundu, C. A. Murthy fbishnu t, bhargab, malay, murthyg@isical.ac.in Indian Statistical Institute,

More information

Steganography Detection for Digital Forensics

Steganography Detection for Digital Forensics Sage LaTorra Digital Forensics Steganography Detection for Digital Forensics Steganography is the pursuit of cryptography that doesn't appear to be cryptography. In essence, steganography is hiding a message

More information

L9: Cepstral analysis

L9: Cepstral analysis L9: Cepstral analysis The cepstrum Homomorphic filtering The cepstrum and voicing/pitch detection Linear prediction cepstral coefficients Mel frequency cepstral coefficients This lecture is based on [Taylor,

More information

A Secure Data Transmission By Integrating Cryptography And Video Steganography

A Secure Data Transmission By Integrating Cryptography And Video Steganography A Secure Data Transmission By Integrating Cryptography And Video Steganography Shafna P K Computer Science Department KMEA Engineering College Ernakulam, India shabanapk9999@gmail.com Abstract Advances

More information

Whitepaper. Image stabilization improving camera usability

Whitepaper. Image stabilization improving camera usability Whitepaper Image stabilization improving camera usability Table of contents 1. Introduction 3 2. Vibration Impact on Video Output 3 3. Image Stabilization Techniques 3 3.1 Optical Image Stabilization 3

More information

Generating Robust Digital Signature for Image/Video Authentication

Generating Robust Digital Signature for Image/Video Authentication Generating Robust Digital Signature for Image/Video Authentication Ching-Yung Lin and Shih-Fu Chang Department of Electrical Engineering and New Media Technology Center Columbia University New York, NY

More information

White paper. HDTV (High Definition Television) and video surveillance

White paper. HDTV (High Definition Television) and video surveillance White paper HDTV (High Definition Television) and video surveillance Table of contents Introduction 3 1. HDTV impact on video surveillance market 3 2. Development of HDTV 3 3. How HDTV works 4 4. HDTV

More information

Automated Image Forgery Detection through Classification of JPEG Ghosts

Automated Image Forgery Detection through Classification of JPEG Ghosts Automated Image Forgery Detection through Classification of JPEG Ghosts Fabian Zach, Christian Riess and Elli Angelopoulou Pattern Recognition Lab University of Erlangen-Nuremberg {riess,elli}@i5.cs.fau.de

More information

CHAPTER 3: DIGITAL IMAGING IN DIAGNOSTIC RADIOLOGY. 3.1 Basic Concepts of Digital Imaging

CHAPTER 3: DIGITAL IMAGING IN DIAGNOSTIC RADIOLOGY. 3.1 Basic Concepts of Digital Imaging Physics of Medical X-Ray Imaging (1) Chapter 3 CHAPTER 3: DIGITAL IMAGING IN DIAGNOSTIC RADIOLOGY 3.1 Basic Concepts of Digital Imaging Unlike conventional radiography that generates images on film through

More information

A deterministic fractal is an image which has low information content and no inherent scale.

A deterministic fractal is an image which has low information content and no inherent scale. FRACTAL IMAGE COMPRESSION: A RESOLUTION INDEPENDENT REPRESENTATION FOR IMAGER?? Alan D. Sloan 5550 Peachtree Parkway Iterated Systems, Inc. Norcross, Georgia 30092 1. Background A deterministic fractal

More information

Predict the Popularity of YouTube Videos Using Early View Data

Predict the Popularity of YouTube Videos Using Early View Data 000 001 002 003 004 005 006 007 008 009 010 011 012 013 014 015 016 017 018 019 020 021 022 023 024 025 026 027 028 029 030 031 032 033 034 035 036 037 038 039 040 041 042 043 044 045 046 047 048 049 050

More information

A Concept of Digital Picture Envelope for Internet Communication

A Concept of Digital Picture Envelope for Internet Communication A Concept of Digital Picture Envelope for Internet Communication Eiji Kawaguchi, Koichi Nozaki, Michiharu Niimi, Hideki Noda and Richard O. Eason Kyushu Institute of Technology 1-1 Sensui-cho, Tobata,

More information

Image Compression and Decompression using Adaptive Interpolation

Image Compression and Decompression using Adaptive Interpolation Image Compression and Decompression using Adaptive Interpolation SUNILBHOOSHAN 1,SHIPRASHARMA 2 Jaypee University of Information Technology 1 Electronicsand Communication EngineeringDepartment 2 ComputerScience

More information

Data Storage. Chapter 3. Objectives. 3-1 Data Types. Data Inside the Computer. After studying this chapter, students should be able to:

Data Storage. Chapter 3. Objectives. 3-1 Data Types. Data Inside the Computer. After studying this chapter, students should be able to: Chapter 3 Data Storage Objectives After studying this chapter, students should be able to: List five different data types used in a computer. Describe how integers are stored in a computer. Describe how

More information

An Application of Visual Cryptography To Financial Documents

An Application of Visual Cryptography To Financial Documents An Application of Visual Cryptography To Financial Documents L. W. Hawkes, A. Yasinsac, C. Cline Security and Assurance in Information Technology Laboratory Computer Science Department Florida State University

More information

An Energy-Based Vehicle Tracking System using Principal Component Analysis and Unsupervised ART Network

An Energy-Based Vehicle Tracking System using Principal Component Analysis and Unsupervised ART Network Proceedings of the 8th WSEAS Int. Conf. on ARTIFICIAL INTELLIGENCE, KNOWLEDGE ENGINEERING & DATA BASES (AIKED '9) ISSN: 179-519 435 ISBN: 978-96-474-51-2 An Energy-Based Vehicle Tracking System using Principal

More information

An Incomplete Cryptography based Digital Rights Management with DCFF

An Incomplete Cryptography based Digital Rights Management with DCFF An Incomplete Cryptography based Digital Rights Management with DCFF Ta Minh Thanh Department of Computer Science Tokyo Institute of Technology 2-12-2, Ookayama, Meguro, Tokyo, 152-8552, Japan. Email:thanhtm@ks.cs.titech.ac.jp

More information

Alaa Alhamami, Avan Sabah Hamdi Amman Arab University Amman, Jordan

Alaa Alhamami, Avan Sabah Hamdi Amman Arab University Amman, Jordan World of Computer Science and Information Technology Journal (WCSIT) ISSN: 2221-0741 Vol. 5, No. 5, 87-91, 2015 Mobile Secure Transmission Method Based on Audio Steganography Alaa Alhamami, Avan Sabah

More information

Component Ordering in Independent Component Analysis Based on Data Power

Component Ordering in Independent Component Analysis Based on Data Power Component Ordering in Independent Component Analysis Based on Data Power Anne Hendrikse Raymond Veldhuis University of Twente University of Twente Fac. EEMCS, Signals and Systems Group Fac. EEMCS, Signals

More information

Data Storage 3.1. Foundations of Computer Science Cengage Learning

Data Storage 3.1. Foundations of Computer Science Cengage Learning 3 Data Storage 3.1 Foundations of Computer Science Cengage Learning Objectives After studying this chapter, the student should be able to: List five different data types used in a computer. Describe how

More information

MPEG Unified Speech and Audio Coding Enabling Efficient Coding of both Speech and Music

MPEG Unified Speech and Audio Coding Enabling Efficient Coding of both Speech and Music ISO/IEC MPEG USAC Unified Speech and Audio Coding MPEG Unified Speech and Audio Coding Enabling Efficient Coding of both Speech and Music The standardization of MPEG USAC in ISO/IEC is now in its final

More information

Enhancing Data Security in Medical Information System Using the Watermarking Techniques and Oracle SecureFile LOBs

Enhancing Data Security in Medical Information System Using the Watermarking Techniques and Oracle SecureFile LOBs Enhancing Data Security in Medical Information System Using the Watermarking Techniques and Oracle SecureFile LOBs Said Aminzou 1, Brahim ER-RAHA 2, Youness Idrissi Khamlichi 3, Mustapha Machkour 4, Karim

More information

Low Contrast Image Enhancement Based On Undecimated Wavelet Transform with SSR

Low Contrast Image Enhancement Based On Undecimated Wavelet Transform with SSR International Journal of Computer Sciences and Engineering Open Access Research Paper Volume-4, Issue-02 E-ISSN: 2347-2693 Low Contrast Image Enhancement Based On Undecimated Wavelet Transform with SSR

More information