TECHNICAL REPORT No. TR2000/10/01
|
|
- Jade Page
- 7 years ago
- Views:
Transcription
1 TECHNICAL REPORT No. TR2000/10/01 Bit Signature Casting in the DCT domain V. Fotopoulos, P. Kavathas and A.N. Skodras October 2000 Abstract Spread spectrum techniques have been successfully applied in still image watermarking. Pseudorandom noise sequences and transform coefficients of logo images are mostly used in these methods. In this report a new signature casting scheme is proposed. The watermark/signature is a 32-bit sequence and the casting domain is the DCT coefficients of the entire image. The 32 largest coefficients are selected for embedding. The original image is needed for the extraction of the signature. Various tests have been performed and results appear quite promising. TECHNICAL REPORT No. TR2000/10/01 1
2 1. Introduction During the last years, there has been a rapid growth in the use of Internet. People from all around the world exploit Internet s great capabilities by exchanging any possible kind of information and useful data. Along with all the benefits from this situation, it s also a fact that many problems concerning copyright ownership protection issues have arisen. The main reason is that digital media can nowadays be exactly reproduced, easily, and quite cheaply. These problems have led to the development of Digital Watermarking, in order to protect all digital media (image, audio and video) from the so-called electronic piracy. Digital Watermarking is a relatively new field of research with many features similar to Cryptography. Of course, the goal here is to hide information rather than coding it like Cryptography does [1]. The watermark is basically a digital signature embedded into a digital media, for the purpose of ownership verification and/or authentication. In the case of digital still images, the watermark can be a stream of bits that constitute a digital signature, a pseudo random noise sequence or an image pattern. They can be classified as visible or invisible. Visible watermarks are generally easier to destroy and not so valuable because they alter the image significantly. Invisible ones are more important and are used in various applications depending on their persistence factor. The image quality is altered according to the method. In general the most robust the watermark is, the greater the changes are and consequently the image degradation. Speaking of robustness there are applications where this is the main issue, such as intellectual property rights protection while on the other hand less fragile watermarking can be used for transaction proof [2]. In section 2, an overview of the watermarking features is presented. In sections 3 and 4 the embedding and detection schemes of the proposed method are discussed. The experimental results are reported in section 5. Some comments and observations on the results are given in section 6 and the work is concluded in section 7 with some ideas for future research directions. 2. General Watermarking Features The so far proposed watermarking schemes for digital still images obey to some common rules for watermark embedding. For the detection process though, they don t have the same requirements. Depending on the application, a watermarking system may sometimes require the original image in order to detect the watermark or at least answer whether it was found or not when given a copy of it. There are also systems that do not use the original image and have no information about the watermark during the detection procedure. These are called blind detection systems and are of great practical use [3]. A key is usually associated with both procedures. The key is an important part of the procedure, especially in methods that use pseudo random sequences. In these, the key plays the role of the random generator s TECHNICAL REPORT No. TR2000/10/01 2
3 initialisation seed. In some applications there are two types of keys, private ones and public ones. The private key is used in the embedding process and is property of the creator. The public key is used for ownership proof by an authorised owner/client. The diagrams of the Embedding and Detection Processes of a typical watermarking system are shown in Figures 1 and 2. Watermark Key Original Image Embedding Algorithm Watermarked Image Figure 1. Block diagram of the embedding process The basic principles governing the digital watermarking of still images are: 1. The watermark must be perceptually invisible in the majority of applications. 2. The watermark should not be detected by applying statistical processing methods to a number of images with the same watermark. 3. The detection process must be trustworthy and should prove beyond any doubt who the rightful owner of the digital media is. 4. Every watermarking method must have a secret key that controls the embedding/detection algorithm. 5. Each method should be as robust as possible, in order to face any attacks that may be applied to the watermarked image. 6. Each method should give the capability of embedding more than one watermarks into the same image (multiple watermarking). Original image Watermark Key Watermark: YES or NO Test Image Detection Algorithm or... Information about the watermark Figure 2. Block diagram of the detection process TECHNICAL REPORT No. TR2000/10/01 3
4 Many different techniques for digital image watermarking have been proposed throughout the last five years. There are three categories of watermarking techniques as shown in Figure 3. These are: A. Techniques that embed the watermark directly into the spatial domain of an image. A common practice is the modification of the LSB (Least Significant Bit) by a certain factor [4]. Another approach is the addition of each watermark bit to a large number of image bits [5]. Some statistical methods, such as patchwork, have also been proposed [6]. B. Techniques that embed the watermark into the transform coefficients of an image. These methods can be block based or they can be applied to the whole image. The transforms usually involved are the DCT (Discrete Cosine Transform) [7,8], the DFT (Discrete Fourier Transform) [9] and the DWT (Discrete Wavelet Transform) [10,11]. Recently, there have been some attempts using the Hadamard and the Chirp-Z transforms. C. Hybrid techniques that are a combination of the above two. WATERMARKING TECHNIQUES Spatial Domain LSB based Statistical methods Watermark a large number of image bits Frequency Domain DCT DFT DWT Hadamard Chirp-Z Hybrid Techniques Figure 3. Classification of the Watermarking Techniques The embedding place of the watermark is another important issue. Some methods cast the watermark in the whole image, while others do it in specific regions or blocks. The second category usually exploits some special characteristic of the Human Visual System (HVS) [7,8,10]. This has to do with the tolerance of the human eye in certain changes made to the image. For example, if we cast our watermark into a part of the image that is characterised by lots of fine details, the changes imposed by the watermark are not easily observable. TECHNICAL REPORT No. TR2000/10/01 4
5 3. Watermark Embedding According to the method presented in this report, the watermark is inserted into the DCT domain of the host image (Figure 4). The watermark is a bit signature, a stream of 1 and 0 giving a total number of 32 bits. The transform is applied to the image as a whole. More specifically, it is applied to a square block whose side is the nearest power of 2 that can fit into the image s canvas. For example, if the image is 176x144, the DCT is applied to the central block of size N=128. Original Image DCT Select the 32 largest coefficients Modify the coefficients by using the signature IDCT Watermarked Image Figure 4. The embedding process of the method The next step of the technique after the DCT, is to select the 32 larger positive coefficients, in the low-mid frequency range. Robustness issues justify this choice, since the most important information of the image is there. The high frequency coefficients represent the image details and are vulnerable to most common image manipulation like filtering, compression etc. Of course one might argue that this is the place where changes that come from watermarking are more imperceptible, but this is true only if we re speaking of small sized blocks. Our scheme is applied to the whole image and since robustness is the main issue, the low and mid frequency coefficients are the most appropriate. The DC coefficient is not included in this search, because such a change would impose heavy altering to the image content. The selected coefficients c i are ordered by magnitude and then modified by the corresponding bit in the signature stream. If the i-th signature bit s(i) to be embedded is 1, a quantity D is added to the coefficient. This D quantity represents the persistence factor. If the watermark bit is 0, the same quantity is subtracted from the coefficient. Thus the watermarked coefficients * c i are given by Eq. 1. c * i = c i + f ( i) D (1) where + 1 f ( i) = { 1 if if s(i) = 1 s(i) = 0 and i = 1,2,3,...,32 Finally, the IDCT (Inverse Discrete Cosine Transform) is calculated to form the watermarked image. According to this method, the watermark is spread all over the image, which is a desired feature for the method s imperceptibility. TECHNICAL REPORT No. TR2000/10/01 5
6 4. Watermark Detection For the detection process, the original image is required. The extraction algorithm consists of the following steps (Fig. 5): 1. The forward DCT is applied to both images (the original and the image under testing) 2. The 32 largest DCT coefficients of the original image are located 3. The corresponding 32 DCT coefficients of the test image are located 4. Corresponding coefficients in both images are subtracted. Depending on the sign of the differences, a binary sequence is retrieved. A positive difference shows that the retrieved bit is 1 and a negative one shows that the bit is 0. Original Image DCT Selection of the coefficients Signature Extraction Test Image DCT Retrieval of corresponding coefficients Figure 5. The detection process of the method Screenshots A and B show the interaction for the embedding and detection programs respectively for an application example. The original sailboat image that was used in this test, along with it s watermarked version are shown in Fig. 6. The visual differences between the original and the watermarked images are hardly noticeable despite the large value of D used. This result was more or less expected, since the watermark was spread all over the image as explained in the section 3. The above observation can also be justified by the histogram of the difference image (Fig. 7). This image is the result of the subtraction between the original and the watermarked image. It must be noted, that a bias of 128 has been added, for better visualisation. This is why the histogram is centered around 128. The threshold value in screenshot A is the value of the last coefficient that was watermarked, the lowest one in order of magnitude. TECHNICAL REPORT No. TR2000/10/01 6
7 Input image name: sailboat Output image name: sailboat.wm100 Image height: 512 Image width: 512 FCT-- new N=512 Inserting watermark with a threshold of: 1131 Select persistence factor (5-100): 100 Job Completed Successfully Screenshot A. Embedding the watermark in the image Sailboat with dimensions 512x512 Input original image name: sailboat Input marked image name: sailboat.wm100 Image height: 512 Image width: 512 FCT-- new N= Watermark retrieved Job Completed Successfully Screenshot B. Detecting the watermark from the same image (a) Figure 6 : (a) Original Image (b) Watermarked with D=100 (b) TECHNICAL REPORT No. TR2000/10/01 7
8 Figure 7. Histogram of the Image of Differences 5. Experimental Results For the experiments of the proposed scheme, we have used both video frames and still images. The frames where of size 176x144 (Akiyo, Carphone, and Foreman). The still images used were sized 512x512 (Sailboat, Brandyrose, Sailboat, Opera, Papermachine). The watermark for the three smaller images was embedded for 3 different values of D (10, 50, 100). The still images were tested only for the value D=100. To test the watermark robustness, five common image-processing tasks were applied to each of the images with the help of Adobe Photoshop (Blurring, Gaussian Blurring, Uniform Noise, Sharpening and JPEG Compression). These tests are usually called attacks because their purpose is to destroy the watermark, making it illegible. Since the attacks alter the image s quality, it is important to emphasize that they should not be extreme because the image would then be destroyed. A severely damaged image, even without the watermark information present, is of no longer use to anyone! All results are presented in Table 1. TECHNICAL REPORT No. TR2000/10/01 8
9 Blurring Table 1. Experimental results Gaussian Blurring Uniform Noise Sharpening JPEG Compression Compression Ratio Akiyo (frame 100) Wm10 4,9:1 Wm50 4,2:1 Wm100 4,8:1 Carphone (frame 50) Wm ,4:1 Wm50 1 4,4:1 Wm100 4,4:1 Foreman (frame 100) Wm10 3,8:1 Wm50 3,8:1 Wm100 3,8:1 Sailboat Wm100 10,3:1 Brandyrose Wm100 24,5:1 Opera Wm100 17,2:1 Lochness Wm100 22,8:1 Papermachine Wm ,1:1 1: Only the last bit was lost 2: Two bits from the last 8 were lost 6. Discussion and Conclusions The main advantage of this method is that the DCT (forward or inverse), is applied to the whole image; thus the changes are spread throughout the whole image and they become almost undetectable. On the other hand, when the image is not an exact power of 2, a minor problem arises. If we use a large quantity for D (e.g. 100) in order to produce a robust watermark, when the inverse DCT is applied, the perimeter of the block that the DCT (forward and inverse) had been applied to, becomes apparent. TECHNICAL REPORT No. TR2000/10/01 9
10 The D value has to balance between the robustness of the watermark and the distortion of the image s quality. Large D values produce more robust watermarks but also deteriorate the image significantly. Small D values produce hardly noticeable distortions but are more fragile to most attacks. This is the necessary trade off between the image s quality and the watermark s robustness. Using small values of D (eg. D=10), the results show that the watermark did not make it through difficult tests-attacks such as the Gaussian Blurring and the addition of Uniform Noise. Table 1 shows, that some problems with Blurring, arose even for values of D=50 (for the image Carphone). Without a doubt, this is a strong attack, which distorts the image s quality a great deal. But practically, this image is of no longer use. This is clearly shown in the example images (Fig 8). (a) (b) Figure 8: (a) Original Image (b) Image with Gaussian Blur The fact that all images passed very easily the tests of Sharpening and JPEG Compression is very impressing and promising. It is also noticeable that the problems occur mainly for the video frames which are very small in size. Larger still images easily passed most of the tests (except of papermachine for gaussian blurring). That leads to the conclusion that the size of the image is important to the scheme. Of course larger values of D can be used in larger images since the distortion is spread in a wider area (so its not easily noticed) and so the method proves more robust there. The distortion for D=100 is less noticeable in a 512x512 image compared to a 176x144 video frame. That was the reason that the larger images were tested only for D=100. Another interesting fact is that the only still image where we encountered a problem was papermachine, a very special image, characterised by large homogeneous regions. This is also partly true for most of the video frames used. The compression ratios (CR) for the JPEG compression test, given in Table 1, are the maximum possible that Adobe Photoshop could produce. TECHNICAL REPORT No. TR2000/10/01 10
11 7. To probe further The main problem of this method concerns the dimensions of the bock to be transformed. If the dimensions are an exact power of 2 there is no problem. For all the other cases, a possible solution could be a clever algorithm. Depending on the image s dimensions, an adjusting could be made by adding or perhaps rejecting rows and columns. This could also appear helpful to possible attacks such as Resizing and Cropping. The whole issue is still under consideration. The method hasn t yet been tested against geometrical attacks such as Rotation or Shearing and others. A Print-Scan-Detect test would also be interesting. Also, the possibility of inserting multiple watermarks should be checked. References [1] J. Brassil et al. Document marking and identification using both lines and word shifting, Proc. Infocom95, IEEE CS Press, Los Alamitos, California, USA, [2] R. Barnett. Digital watermarking: applications, techniques and challenges, Electronics & Communication Engineering Journal, August 1999 [3] M. Kutter, F. A. P. Petitcolas. A fair benchmark for image watermarking systems, Electronic Imaging 99. Security and Watermarking of Multimedia contents, vol. 3657, Sans Jose, CA, USA, January [4] R. G. Van Schyndel, A. Z. Tirkel, C. F. Osborne. A digital watermark, Proc. IEEE International Conference on Image Processing, volume II, pp 86-90, Austin, Texas, [5] F. Hartung, B. Girod. Watermarking of uncompressed and compressed video, Signal Processing, 66(3): pp , May [6] W. Bender, D. Gruhl, N. Morimoto. Techniques for data hiding, In Proceedings of SPIE, volume 2420, p.40, February [7] I. Cox, J Kilian, T. Leighton, T. Shamoon. Secure spread spectrum watermarking for multimedia, Technical Report 95-10, NEC Research Institute, Princeton, NJ, USA, [8] M. Barni, F. Bartolini, V. Cappellini, A. Piva. A DCT-domain system for robust image watermarking, Signal Processing, 66(3): pp , May [9] J. K. O Ruanaid, T. Pun. Rotation, scale and translation invariant spread spectrum digital image watermarking, Signal Processing, 66(3): pp , May [10] D. Kundur, D. Hatzinakos. A robust digital image watermarking method using wavelet-based fusion, International Conference on Image Processing, pp , Santa Barbara, California, USA, October [11] D. Kundur, D. Hatzinakos. Digital watermarking using multiresolution wavelet decomposition, International Conference on Acoustic, Speech and Signal Processing (ICASP), volume 5, pp , Seattle, WA, USA, May TECHNICAL REPORT No. TR2000/10/01 11
A Secure File Transfer based on Discrete Wavelet Transformation and Audio Watermarking Techniques
A Secure File Transfer based on Discrete Wavelet Transformation and Audio Watermarking Techniques Vineela Behara,Y Ramesh Department of Computer Science and Engineering Aditya institute of Technology and
More informationImage Authentication Scheme using Digital Signature and Digital Watermarking
www..org 59 Image Authentication Scheme using Digital Signature and Digital Watermarking Seyed Mohammad Mousavi Industrial Management Institute, Tehran, Iran Abstract Usual digital signature schemes for
More informationWatermarking Techniques for Protecting Intellectual Properties in a Digital Environment
Watermarking Techniques for Protecting Intellectual Properties in a Digital Environment Isinkaye F. O*. and Aroge T. K. Department of Computer Science and Information Technology University of Science and
More informationMultimedia Document Authentication using On-line Signatures as Watermarks
Multimedia Document Authentication using On-line Signatures as Watermarks Anoop M Namboodiri and Anil K Jain Department of Computer Science and Engineering Michigan State University East Lansing, MI 48824
More informationA Digital Audio Watermark Embedding Algorithm
Xianghong Tang, Yamei Niu, Hengli Yue, Zhongke Yin Xianghong Tang, Yamei Niu, Hengli Yue, Zhongke Yin School of Communication Engineering, Hangzhou Dianzi University, Hangzhou, Zhejiang, 3008, China tangxh@hziee.edu.cn,
More informationSecurity and protection of digital images by using watermarking methods
Security and protection of digital images by using watermarking methods Andreja Samčović Faculty of Transport and Traffic Engineering University of Belgrade, Serbia Gjovik, june 2014. Digital watermarking
More informationVolume 2, Issue 12, December 2014 International Journal of Advance Research in Computer Science and Management Studies
Volume 2, Issue 12, December 2014 International Journal of Advance Research in Computer Science and Management Studies Research Article / Survey Paper / Case Study Available online at: www.ijarcsms.com
More informationWATERMARKING FOR IMAGE AUTHENTICATION
WATERMARKING FOR IMAGE AUTHENTICATION Min Wu Bede Liu Department of Electrical Engineering Princeton University, Princeton, NJ 08544, USA Fax: +1-609-258-3745 {minwu, liu}@ee.princeton.edu ABSTRACT A data
More informationDynamic Binary Location based Multi-watermark Embedding Algorithm in DWT
Dynamic Binary Location based Multi-watermark Embedding Algorithm in DWT Ammar Jameel Hussein, Seda Yuksel, and Ersin Elbasi Abstract In order to achieve a good imperceptibility and robustness, using 4-level
More informationKeywords Android, Copyright Protection, Discrete Cosine Transform (DCT), Digital Watermarking, Discrete Wavelet Transform (DWT), YCbCr.
Volume 3, Issue 7, July 2013 ISSN: 2277 128X International Journal of Advanced Research in Computer Science and Software Engineering Research Paper Available online at: www.ijarcsse.com Web Based Novel
More informationCHAPTER 7 CONCLUSION AND FUTURE WORK
158 CHAPTER 7 CONCLUSION AND FUTURE WORK The aim of this thesis was to present robust watermarking techniques for medical image. Section 7.1, consolidates the contributions made by the researcher and Section
More informationUsing fractal compression scheme to embed a digital signature into an image
Using fractal compression scheme to embed a digital signature into an image Joan Puate, Fred Jordan Swiss federal institute of technology Signal Processing Laboratory CH-1015 Lausanne Switzerland Email:
More informationSecurity Based Data Transfer and Privacy Storage through Watermark Detection
Security Based Data Transfer and Privacy Storage through Watermark Detection Gowtham.T 1 Pradeep Kumar.G 2 1PG Scholar, Applied Electronics, Nandha Engineering College, Anna University, Erode, India. 2Assistant
More informationA Robust and Lossless Information Embedding in Image Based on DCT and Scrambling Algorithms
A Robust and Lossless Information Embedding in Image Based on DCT and Scrambling Algorithms Dr. Mohammad V. Malakooti Faculty and Head of Department of Computer Engineering, Islamic Azad University, UAE
More informationROI Based Medical Image Watermarking with Zero Distortion and Enhanced Security
I.J. Modern Education and Computer Science, 2014, 10, 40-48 Published Online October 2014 in MECS (http://www.mecs-press.org/) DOI: 10.5815/ijmecs.2014.10.06 ROI Based Medical Image Watermarking with Zero
More informationMulti-factor Authentication in Banking Sector
Multi-factor Authentication in Banking Sector Tushar Bhivgade, Mithilesh Bhusari, Ajay Kuthe, Bhavna Jiddewar,Prof. Pooja Dubey Department of Computer Science & Engineering, Rajiv Gandhi College of Engineering
More informationVideo Authentication for H.264/AVC using Digital Signature Standard and Secure Hash Algorithm
Video Authentication for H.264/AVC using Digital Signature Standard and Secure Hash Algorithm Nandakishore Ramaswamy Qualcomm Inc 5775 Morehouse Dr, Sam Diego, CA 92122. USA nandakishore@qualcomm.com K.
More informationSECURE DATA TRANSMISSION USING DIGITAL IMAGE WATERMARKING
SECURE DATA TRANSMISSION USING DIGITAL IMAGE WATERMARKING 1 Maulik Srivastava, 2 Anuradha Sharma 1,2 Department of Computer Science & Engineering, Amity University, Uttar Pradesh Abstract: As we all know
More informationSOFTWARE AND HARDWARE-IN-THE-LOOP MODELING OF AN AUDIO WATERMARKING ALGORITHM. Ismael Zárate Orozco, B.E. Thesis Prepared for the Degree of
SOFTWARE AND HARDWARE-IN-THE-LOOP MODELING OF AN AUDIO WATERMARKING ALGORITHM Ismael Zárate Orozco, B.E. Thesis Prepared for the Degree of MASTER OF SCIENCE UNIVERSITY OF NORTH TEXAS December 2010 APPROVED:
More informationStudy and Implementation of Video Compression Standards (H.264/AVC and Dirac)
Project Proposal Study and Implementation of Video Compression Standards (H.264/AVC and Dirac) Sumedha Phatak-1000731131- sumedha.phatak@mavs.uta.edu Objective: A study, implementation and comparison of
More informationImage Compression through DCT and Huffman Coding Technique
International Journal of Current Engineering and Technology E-ISSN 2277 4106, P-ISSN 2347 5161 2015 INPRESSCO, All Rights Reserved Available at http://inpressco.com/category/ijcet Research Article Rahul
More informationHybrid DCT-DWT Watermarking and IDEA Encryption of Internet Contents
IJCSI International Journal of Computer Science Issues, Vol. 9, Issue 1, o, January 01 www.ijcsi.org 394 Hybrid Watermarking and IDEA Encryption of Internet Contents M.A. Mohamed and A.M. El-Mohandes Electronics
More informationAn Incomplete Cryptography based Digital Rights Management with DCFF
An Incomplete Cryptography based Digital Rights Management with DCFF Ta Minh Thanh Department of Computer Science Tokyo Institute of Technology 2-12-2, Ookayama, Meguro, Tokyo, 152-8552, Japan. Email:thanhtm@ks.cs.titech.ac.jp
More informationA comprehensive survey on various ETC techniques for secure Data transmission
A comprehensive survey on various ETC techniques for secure Data transmission Shaikh Nasreen 1, Prof. Suchita Wankhade 2 1, 2 Department of Computer Engineering 1, 2 Trinity College of Engineering and
More informationIntroduction to Medical Image Compression Using Wavelet Transform
National Taiwan University Graduate Institute of Communication Engineering Time Frequency Analysis and Wavelet Transform Term Paper Introduction to Medical Image Compression Using Wavelet Transform 李 自
More informationGenerating Robust Digital Signature for Image/Video Authentication
Generating Robust Digital Signature for Image/Video Authentication Ching-Yung Lin and Shih-Fu Chang Department of Electrical Engineering and New Media Technology Center Columbia University New York, NY
More informationJPEG Image Compression by Using DCT
International Journal of Computer Sciences and Engineering Open Access Research Paper Volume-4, Issue-4 E-ISSN: 2347-2693 JPEG Image Compression by Using DCT Sarika P. Bagal 1* and Vishal B. Raskar 2 1*
More information2695 P a g e. IV Semester M.Tech (DCN) SJCIT Chickballapur Karnataka India
Integrity Preservation and Privacy Protection for Digital Medical Images M.Krishna Rani Dr.S.Bhargavi IV Semester M.Tech (DCN) SJCIT Chickballapur Karnataka India Abstract- In medical treatments, the integrity
More informationReversible Data Hiding for Security Applications
Reversible Data Hiding for Security Applications Baig Firdous Sulthana, M.Tech Student (DECS), Gudlavalleru engineering college, Gudlavalleru, Krishna (District), Andhra Pradesh (state), PIN-521356 S.
More informationAUTHORIZED WATERMARKING AND ENCRYPTION SYSTEM BASED ON WAVELET TRANSFORM FOR TELERADIOLOGY SECURITY ISSUES
AUTHORIZED WATERMARKING AND ENCRYPTION SYSTEM BASED ON WAVELET TRANSFORM FOR TELERADIOLOGY SECURITY ISSUES S.NANDHINI PG SCHOLAR NandhaEngg. College Erode, Tamilnadu, India. Dr.S.KAVITHA M.E.,Ph.d PROFESSOR
More informationRobust Blind Watermarking Mechanism For Point Sampled Geometry
Robust Blind Watermarking Mechanism For Point Sampled Geometry Parag Agarwal Balakrishnan Prabhakaran Department of Computer Science, University of Texas at Dallas MS EC 31, PO Box 830688, Richardson,
More informationTechnical aspects of Digital Rights Management
Technical aspects of Digital Rights Management Emilija Arsenova MI, RWTH-Aachen Table of content 1 Introduction... 3 2 Digital Rights Management (DRM)... 3 2.1 DRM Architecture...4 2.2 DRM Techniques...5
More informationAN ENHANCED MECHANISM FOR SECURE DATA TRANSMISSION USING STEGANOGRAPHY MERGED WITH VISUAL CRYPTOGRAPHY
AN ENHANCED MECHANISM FOR SECURE DATA TRANSMISSION USING STEGANOGRAPHY MERGED WITH VISUAL CRYPTOGRAPHY Chandan Mohapatra 1, Manajusha Pandey 2 1 PG Student in Computer Science Dept., KIIT University, Bhubaneswar,
More informationHSI BASED COLOUR IMAGE EQUALIZATION USING ITERATIVE n th ROOT AND n th POWER
HSI BASED COLOUR IMAGE EQUALIZATION USING ITERATIVE n th ROOT AND n th POWER Gholamreza Anbarjafari icv Group, IMS Lab, Institute of Technology, University of Tartu, Tartu 50411, Estonia sjafari@ut.ee
More informationConceptual Framework Strategies for Image Compression: A Review
International Journal of Computer Sciences and Engineering Open Access Review Paper Volume-4, Special Issue-1 E-ISSN: 2347-2693 Conceptual Framework Strategies for Image Compression: A Review Sumanta Lal
More informationCombating Anti-forensics of Jpeg Compression
IJCSI International Journal of Computer Science Issues, Vol. 9, Issue 6, No 3, November 212 ISSN (Online): 1694-814 www.ijcsi.org 454 Combating Anti-forensics of Jpeg Compression Zhenxing Qian 1, Xinpeng
More informationInternational Journal of Computer Sciences and Engineering Open Access. A novel technique to hide information using Daubechies Transformation
International Journal of Computer Sciences and Engineering Open Access Research Paper Volume-4, Special Issue-1 E-ISSN: 2347-2693 A novel technique to hide information using Daubechies Transformation Jyotsna
More informationAN OVERVIEW OF IMAGE STEGANOGRAPHY
AN OVERVIEW OF IMAGE STEGANOGRAPHY T. Morkel 1, J.H.P. Eloff 2, M.S. Olivier 3 Information and Computer Security Architecture (ICSA) Research Group Department of Computer Science University of Pretoria,
More informationThe Scientific Data Mining Process
Chapter 4 The Scientific Data Mining Process When I use a word, Humpty Dumpty said, in rather a scornful tone, it means just what I choose it to mean neither more nor less. Lewis Carroll [87, p. 214] In
More informationINTERNATIONAL JOURNAL OF APPLIED ENGINEERING RESEARCH, DINDIGUL Volume 1, No 3, 2010
Lossless Medical Image Security Shrikhande Rohini 1, Vinayak Bairagi 2 1 Researcher, Electronics & Telecommunication Department, Sinhgad Academy Of Engg. 2 Assistant Professor, Electronics & Telecommunication
More informationWatermark Design Pattern for Intellectual Property Protection in Electronic Commerce Applications
Design Pattern for Intellectual Property Protection in Electronic Commerce Applications S.H. Kwok Department of Information and Systems Management The Hong Kong University of Science and Technology Clear
More informationPIXEL-LEVEL IMAGE FUSION USING BROVEY TRANSFORME AND WAVELET TRANSFORM
PIXEL-LEVEL IMAGE FUSION USING BROVEY TRANSFORME AND WAVELET TRANSFORM Rohan Ashok Mandhare 1, Pragati Upadhyay 2,Sudha Gupta 3 ME Student, K.J.SOMIYA College of Engineering, Vidyavihar, Mumbai, Maharashtra,
More informationReal-Time Audio Watermarking Based on Characteristics of PCM in Digital Instrument
Journal of Information Hiding and Multimedia Signal Processing 21 ISSN 273-4212 Ubiquitous International Volume 1, Number 2, April 21 Real-Time Audio Watermarking Based on Characteristics of PCM in Digital
More informationINTELLECTUAL PROPERTY PROTECTION FOR ELECTRONIC COMMERCE APPLICATIONS
INTELLECTUAL PROPERTY PROTECTION FOR ELECTRONIC COMMERCE APPLICATIONS S.H. Kwok Department of Information and Systems Management The Hong Kong University of Science and Technology jkwok@ust.hk C.C. Yang
More informationInvisible Image Water Marking Using Hybrid DWT Compression/Decompression Technique
Invisible Image Water Marking Using Hybrid DWT Compression/Decompression Technique B.Sai Kiran M.Tech (VLSI), CMR Institute of Technology. Mr.Shahbaz Khan Associate Professor, CMR Institute of Technology.
More informationDigimarc for Images. Best Practices Guide (Chroma + Classic Edition)
Digimarc for Images Best Practices Guide (Chroma + Classic Edition) Best Practices Guide (Chroma + Classic Edition) Why should you digitally watermark your images? 3 What types of images can be digitally
More informationExperimental DRM Architecture Using Watermarking and PKI
Experimental DRM Architecture Using Watermarking and PKI Mikko Löytynoja, Tapio Seppänen, Nedeljko Cvejic MediaTeam Oulu Information Processing Laboratory University of Oulu, Finland {mikko.loytynoja,
More informationA Lightweight Rao-Cauchy Detector for Additive Watermarking in the DWT-Domain
A Lightweight Rao-Cauchy Detector for Additive Watermarking in the DWT-Domain Roland Kwitt, Peter Meerwald, Andreas Uhl Dept. of Computer Sciences, University of Salzburg, Austria E-Mail: {rkwitt, pmeerw,
More informationStudy and Implementation of Video Compression standards (H.264/AVC, Dirac)
Study and Implementation of Video Compression standards (H.264/AVC, Dirac) EE 5359-Multimedia Processing- Spring 2012 Dr. K.R Rao By: Sumedha Phatak(1000731131) Objective A study, implementation and comparison
More informationPRN BASED WATERMARKING SCHEME FOR COLOR IMAGES
İstanbul Ticaret Üniversitesi Fen Bilimleri Dergisi Yıl: 5 Sayı:10 Güz 2006/2 s.119-131 PRN BASED WATERMARKING SCHEME FOR COLOR IMAGES Ersin ELBAŞI *, Ahmet M. ESKİCİOĞLU ** ABSTRACT Robust image watermarking
More informationBandwidth Adaptation for MPEG-4 Video Streaming over the Internet
DICTA2002: Digital Image Computing Techniques and Applications, 21--22 January 2002, Melbourne, Australia Bandwidth Adaptation for MPEG-4 Video Streaming over the Internet K. Ramkishor James. P. Mammen
More informationInternational Journal of Advanced Computer Technology (IJACT) ISSN:2319-7900 Least Significant Bit algorithm for image steganography
Champakamala.B.S, Padmini.K, Radhika.D. K Asst Professors, Department of TCE, Don Bosco Institute of Technology,Bangalore, India Abstract Steganography is one of the most powerful techniques to conceal
More informationMultiple Embedding Using Robust Watermarks for Wireless Medical Images
Multiple Embedding Using Robust Watermarks for Wireless Medical Images Dominic Osborne and Derek Abbott Centre for Biomedical Engineering (CBME) The University of Adelaide, SA 5005, Australia Matthew Sorell
More informationROBUST AND SECURE DIGITAL SIGNATURE FOR IMAGE AUTHENTICATION OVER WIRELESS CHANNELS
ROBUST AND SECURE DIGITAL SIGNATURE FOR IMAGE AUTHENTICATION OVER WIRELESS CHANNELS J Sravanthi #1, Dr. MHM Krishna Prasad *2 # Dept. of Computer Science, UCEV Vizianagaram, Andhra Pradesh, India * Associate
More informationAutomated Image Forgery Detection through Classification of JPEG Ghosts
Automated Image Forgery Detection through Classification of JPEG Ghosts Fabian Zach, Christian Riess and Elli Angelopoulou Pattern Recognition Lab University of Erlangen-Nuremberg {riess,elli}@i5.cs.fau.de
More informationTHE PURPOSE of a digital watermark is to embed auxiliary
IEEE TRANSACTIONS ON MULTIMEDIA, VOL. 7, NO. 1, FEBRUARY 2005 43 Statistical Invisibility for Collusion-Resistant Digital Video Watermarking Karen Su, Student Member, IEEE, Deepa Kundur, Senior Member,
More informationFriendly Medical Image Sharing Scheme
Journal of Information Hiding and Multimedia Signal Processing 2014 ISSN 2073-4212 Ubiquitous International Volume 5, Number 3, July 2014 Frily Medical Image Sharing Scheme Hao-Kuan Tso Department of Computer
More informationInternational Journal of Emerging Technology and Advanced Engineering Website: www.ijetae.com (ISSN 2250-2459, Volume 2, Issue 9, September 2012)
Authentication of Medical Images using Integer Transforms A.Kannammal 1, Dr.S.Subha Rani 2 1 Assistant professor, 2 Professor and Head, ECE Department, PSG College of Technology, Peelamedu, Coimbatore
More informationVideo Authentication- An Overview
Video Authentication- An Overview Saurabh Upadhyay *, Sanjay Kumar Singh *Associate Professor, SIT, Gujarat s4upadhyay@gmail.com Associate Professor, IT BHU, Varanasi sks.cse@itbhu.ac.in ABSTRACT With
More informationJPEG compression of monochrome 2D-barcode images using DCT coefficient distributions
Edith Cowan University Research Online ECU Publications Pre. JPEG compression of monochrome D-barcode images using DCT coefficient distributions Keng Teong Tan Hong Kong Baptist University Douglas Chai
More informationCHAPTER 2 LITERATURE REVIEW
11 CHAPTER 2 LITERATURE REVIEW 2.1 INTRODUCTION Image compression is mainly used to reduce storage space, transmission time and bandwidth requirements. In the subsequent sections of this chapter, general
More informationMotion JPEG Video Authentication based on Quantization Matrix Watermarking: Application in Robotics
Motion JPEG Video Authentication based on Quantization Matrix Watermarking: Application in Robotics Lamri Laouamer Lab-STICC,European University of Brittany Al Qassim University Buraydah,15452,KSA Abdelhamid
More informationTracking Moving Objects In Video Sequences Yiwei Wang, Robert E. Van Dyck, and John F. Doherty Department of Electrical Engineering The Pennsylvania State University University Park, PA16802 Abstract{Object
More informationAn Experimental Study of the Performance of Histogram Equalization for Image Enhancement
International Journal of Computer Sciences and Engineering Open Access Research Paper Volume-4, Special Issue-2, April 216 E-ISSN: 2347-2693 An Experimental Study of the Performance of Histogram Equalization
More informationModeling the Print-Scan Process for Resilient Data Hiding
Modeling the Print-Scan Process for Resilient Data Hiding Kaushal Solanki, Upamanyu Madhow, Banglore S. Manjunath, and Shiv Chandrasekaran Department of Electrical and Computer Engineering University of
More informationSTEGANOGRAPHY: TEXT FILE HIDING IN IMAGE YAW CHOON KIT CA10022
STEGANOGRAPHY: TEXT FILE HIDING IN IMAGE YAW CHOON KIT CA10022 FACULTY OF COMPUTER SYSTEM AND SOFTWARE ENGINEERING 2012/2013 1 ABSTRACT Steganography is the art or science in hiding. It is origin from
More informationA Survey of Error Resilient Coding Schemes for Image/Video Transmission Based on Data Embedding
A Survey of Error Resilient Coding Schemes for Image/Video Transmission Based on Data Embedding Li-Wei Kang*( 康 立 威 ) and Jin-Jang Leou # ( 柳 金 章 ) *Institute of Information Science Academia Sinica, Taipei
More informationAudio synthesis: MIDI Digital Audio Coding/Compression. Today: Intellectual property management for digital media. What is Digital Watermarking?
ENEE408G Lecture-9 Last Lecture Digital Watermarking and Fingerprinting for Digital Rights Protection of Multimedia URL: http://www.ece.umd.edu/class/enee408g/ Slides included here are based on Spring
More informationEnhancing Data Security in Medical Information System Using the Watermarking Techniques and Oracle SecureFile LOBs
Enhancing Data Security in Medical Information System Using the Watermarking Techniques and Oracle SecureFile LOBs Said Aminzou 1, Brahim ER-RAHA 2, Youness Idrissi Khamlichi 3, Mustapha Machkour 4, Karim
More informationA Secure Data Transmission By Integrating Cryptography And Video Steganography
A Secure Data Transmission By Integrating Cryptography And Video Steganography Shafna P K Computer Science Department KMEA Engineering College Ernakulam, India shabanapk9999@gmail.com Abstract Advances
More informationROBUST CONTENT-BASED VIDEO WATERMARKING EXPLOITING MOTION ENTROPY MASKING EFFECT
ROBUST CONTENT-BASED VIDEO WATERMARKING EXPLOITING MOTION ENTROPY MASKING EFFECT Amir Houmansadr, Hamed Pirsiaash Department of electrical engineering, Sharif Uniersity of Technology, Azadi Ae., Tehran,
More informationMEDICAL IMAGE COMPRESSION USING HYBRID CODER WITH FUZZY EDGE DETECTION
MEDICAL IMAGE COMPRESSION USING HYBRID CODER WITH FUZZY EDGE DETECTION K. Vidhya 1 and S. Shenbagadevi Department of Electrical & Communication Engineering, College of Engineering, Anna University, Chennai,
More informationMultimodal Biometric Recognition Security System
Multimodal Biometric Recognition Security System Anju.M.I, G.Sheeba, G.Sivakami, Monica.J, Savithri.M Department of ECE, New Prince Shri Bhavani College of Engg. & Tech., Chennai, India ABSTRACT: Security
More informationInternational Archives of the Photogrammetry, Remote Sensing and Spatial Information Sciences, Vol. XXXIV-5/W10
Accurate 3D information extraction from large-scale data compressed image and the study of the optimum stereo imaging method Riichi NAGURA *, * Kanagawa Institute of Technology nagura@ele.kanagawa-it.ac.jp
More informationDigital Image Integrity
WHITEPAPER Digital Image Integrity TABLE OF CONTENTS 1 Viability of digital images 2 Best practices 2 Archive image 3 Audit trail 4 Repeatability of image adjustments 5 History of tools to address issues
More informationComparison of different image compression formats. ECE 533 Project Report Paula Aguilera
Comparison of different image compression formats ECE 533 Project Report Paula Aguilera Introduction: Images are very important documents nowadays; to work with them in some applications they need to be
More informationIn mathematics, there are four attainment targets: using and applying mathematics; number and algebra; shape, space and measures, and handling data.
MATHEMATICS: THE LEVEL DESCRIPTIONS In mathematics, there are four attainment targets: using and applying mathematics; number and algebra; shape, space and measures, and handling data. Attainment target
More informationFrom Concept to Production in Secure Voice Communications
From Concept to Production in Secure Voice Communications Earl E. Swartzlander, Jr. Electrical and Computer Engineering Department University of Texas at Austin Austin, TX 78712 Abstract In the 1970s secure
More informationData Mining for Manufacturing: Preventive Maintenance, Failure Prediction, Quality Control
Data Mining for Manufacturing: Preventive Maintenance, Failure Prediction, Quality Control Andre BERGMANN Salzgitter Mannesmann Forschung GmbH; Duisburg, Germany Phone: +49 203 9993154, Fax: +49 203 9993234;
More informationEvaluating the Feasibility of Digital Watermarking To Enforce Music Copyright
Evaluating the Feasibility of Digital Watermarking To Enforce Music Copyright CS 588: Final Project Rob Farraher Ken Pickering Lim Vu Date Due: 12/04/01 Introduction With the tremendous increase in the
More informationECE 533 Project Report Ashish Dhawan Aditi R. Ganesan
Handwritten Signature Verification ECE 533 Project Report by Ashish Dhawan Aditi R. Ganesan Contents 1. Abstract 3. 2. Introduction 4. 3. Approach 6. 4. Pre-processing 8. 5. Feature Extraction 9. 6. Verification
More informationRegion of Interest Access with Three-Dimensional SBHP Algorithm CIPR Technical Report TR-2006-1
Region of Interest Access with Three-Dimensional SBHP Algorithm CIPR Technical Report TR-2006-1 Ying Liu and William A. Pearlman January 2006 Center for Image Processing Research Rensselaer Polytechnic
More informationClassification of Fingerprints. Sarat C. Dass Department of Statistics & Probability
Classification of Fingerprints Sarat C. Dass Department of Statistics & Probability Fingerprint Classification Fingerprint classification is a coarse level partitioning of a fingerprint database into smaller
More informationVideo compression: Performance of available codec software
Video compression: Performance of available codec software Introduction. Digital Video A digital video is a collection of images presented sequentially to produce the effect of continuous motion. It takes
More informationINTERNATIONAL JOURNAL FOR ENGINEERING APPLICATIONS AND TECHNOLOGY. Implementation of Multi-Factor Authentication Scheme
IJFEAT INTERNATIONAL JOURNAL FOR ENGINEERING APPLICATIONS AND TECHNOLOGY Implementation of Multi-Factor Authentication Scheme Vasundhara Bhele Prof. Nilesh Chaubey Prof. Shyam Dubey Computer Science &
More informationTransform-domain Wyner-Ziv Codec for Video
Transform-domain Wyner-Ziv Codec for Video Anne Aaron, Shantanu Rane, Eric Setton, and Bernd Girod Information Systems Laboratory, Department of Electrical Engineering Stanford University 350 Serra Mall,
More informationA Study of Direct Sequence Spread Spectrum Technique for Data Compression Purpose
3 ÒÃÈÖ ÉÒà ¹Ô ä àãç «Õà Çé¹Êà» Êà»ç µãñá ྠèí ÒÃãªé Ò¹ Ò éò¹ ÒúպÍÑ éíáùå Óà Ãѵ¹ì ÍÁÃÃÑ ÉÒ 1 ÁËÒÇÔ ÂÒÅÑÂà â¹âåâõ¾ãð ÍÁà ÅéÒ ¹ºØÃÕ ºÒ Á Øè ÃØ ÃØ à ¾Ï 10140 º Ñ ÂèÍ Ò¹ÇÔ Ñ¹Õéä éí ÔºÒÂ Ö ÇÔ Õ ÒÃ˹Öè «Öè
More informationSteganography And Digital Watermarking
Steganography And Digital Watermarking Copyright 2004, Jonathan Cummins, Patrick Diskin, Samuel Lau and Robert Parlett, School of Computer Science, The University of Birmingham. Permission is granted to
More informationencoding compression encryption
encoding compression encryption ASCII utf-8 utf-16 zip mpeg jpeg AES RSA diffie-hellman Expressing characters... ASCII and Unicode, conventions of how characters are expressed in bits. ASCII (7 bits) -
More informationSecret Communication through Web Pages Using Special Space Codes in HTML Files
International Journal of Applied Science and Engineering 2008. 6, 2: 141-149 Secret Communication through Web Pages Using Special Space Codes in HTML Files I-Shi Lee a, c and Wen-Hsiang Tsai a, b, * a
More informationRedundant Wavelet Transform Based Image Super Resolution
Redundant Wavelet Transform Based Image Super Resolution Arti Sharma, Prof. Preety D Swami Department of Electronics &Telecommunication Samrat Ashok Technological Institute Vidisha Department of Electronics
More informationDIGITAL IMAGE PROCESSING AND ANALYSIS
DIGITAL IMAGE PROCESSING AND ANALYSIS Human and Computer Vision Applications with CVIPtools SECOND EDITION SCOTT E UMBAUGH Uffi\ CRC Press Taylor &. Francis Group Boca Raton London New York CRC Press is
More informationA Concept of Digital Picture Envelope for Internet Communication
A Concept of Digital Picture Envelope for Internet Communication Eiji Kawaguchi, Koichi Nozaki, Michiharu Niimi, Hideki Noda and Richard O. Eason Kyushu Institute of Technology 1-1 Sensui-cho, Tobata,
More informationOptical Fibres. Introduction. Safety precautions. For your safety. For the safety of the apparatus
Please do not remove this manual from from the lab. It is available at www.cm.ph.bham.ac.uk/y2lab Optics Introduction Optical fibres are widely used for transmitting data at high speeds. In this experiment,
More informationLightweight Security Principles for Distributed Multimedia Based Sensor Networks
Lightweight Security Principles for Distributed Multimedia Based Sensor Networks Deepa Kundur, Takis Zourntos and Nebu John Mathai Department of Electrical Engineering Texas A&M University 3128 TAMU, College
More informationSafer data transmission using Steganography
Safer data transmission using Steganography Arul Bharathi, B.K.Akshay, M.Priy a, K.Latha Department of Computer Science and Engineering Sri Sairam Engineering College Chennai, India Email: arul.bharathi@yahoo.com,
More informationSIGNATURE VERIFICATION
SIGNATURE VERIFICATION Dr. H.B.Kekre, Dr. Dhirendra Mishra, Ms. Shilpa Buddhadev, Ms. Bhagyashree Mall, Mr. Gaurav Jangid, Ms. Nikita Lakhotia Computer engineering Department, MPSTME, NMIMS University
More informationWHITE PAPER MANAGING VALUABLE IMAGE ASSETS USING DIGITAL WATERMARKING FOR COPYRIGHT COMMUNICATION AND IMAGE SEARCH INTRODUCTION
www.digitalwatermarkingalliance.org WHITE PAPER MANAGING VALUABLE IMAGE ASSETS USING DIGITAL WATERMARKING FOR COPYRIGHT COMMUNICATION AND IMAGE SEARCH INTRODUCTION Consider where you encounter digital
More informationEuler Vector: A Combinatorial Signature for Gray-Tone Images
Euler Vector: A Combinatorial Signature for Gray-Tone Images Arijit Bishnu, Bhargab B. Bhattacharya y, Malay K. Kundu, C. A. Murthy fbishnu t, bhargab, malay, murthyg@isical.ac.in Indian Statistical Institute,
More information