An Algorithm for Data Hiding in Binary Images. Eman Th. Sedeek Al-obaidy Veterinary Medicine College University of Mosul
|
|
|
- Charleen Washington
- 10 years ago
- Views:
Transcription
1 Raf. J. of Comp. & Math s., Vol. 5, No. 2, 2008 An Algorithm for Data Hiding in Binary Images Eman Th. Sedeek Al-obaidy Veterinary Medicine College University of Mosul Received on: 1/10/2007 Accepted on: 17/12/2007 الملخص تم في هذا البحث استخدام خوارزمية جديدة لا خفاء البيانات في الصور الثناي ية. يتم ا ولا في هذه الخوارزمية تحديد النقاط الضوي ية التي يمكن ا ن تنقلب دون حدوث تشوهات مري ية وذلك عن طريق استخدام مجموعة من القوانين التي يتم من خلالها فحص جميع النقاط المجاورة لنقطة المركز لكل قطاع غيرمنتظم ومن ثم يتم تغيير النقطة المركزية فقط في حالة مطابقة القطاع لهذه الشروط وهذه الخاصية تسمح باكتشاف البيانات المضمنة دون الرجوع الى الصورة الاصلية. وقد اظهرت التجارب نتاي ج مختلفة لصورثناي ية مختلفة تمت كتابة البرنامج بلغة. MATLAB (6.5) ABSTRACT In this work a new data hiding algorithm for binary images is used. In this algorithm the pixels which can be flipped without introducing noticeable artifacts are identified at first by using some rules that examine the neighbors of the central pixels in each non-uniform block and then this central pixel only is changed in the block which matches these rules and this property allows easy detection of the embedded data without referring to the original image. Experiments show different results for different binary images. The program is written in MATLAB (6.5). 111
2 Eman Th. Sedeek Al-obaidy 1. Introduction The use of binary images become more common in our life like scanned documents, drawing and signatures and these images can have the capabilities of data hiding for authentication, annotation and copyright protection. However data hiding in binary images become more difficult than that in grayscale and color images by which the gray level or color value of a selected group of pixels is changed by a small amount without causing visually noticeable artifacts.these techniques cannot be directly applied to binary images where the pixels have either '' 0'' or ''1'' value. Arbitrarily changing pixels on binary images cause very noticeable artifacts [1], as can be noted in figure (1). Figure (1) Effect of arbitrarily changing pixel values on a binary image [1], 2. Related Work: There was a limited work on data hiding in binary images because of the bi-level constraints. Some of those researches in such field are reviewed below: Mei,Q.,Wong,E.K., and Memon,N., use an algorithm just implemented on the text documents [1].They found the connected components of five-pixel long in the image and compare it with 100 pairs of five-pixel long boundary and each pair consists of two patterns, the first is addition of a foreground pixel adjacent to the center pixel and the second requires deletion of the central foreground pixel. Lu,H.;Kot,C.A., and Cheng,J., use an algorithm based on (Distance Reciprocal Distortion Measure)(DRDM) [2] which correlates well with human visual perception. A weighted matrix is used and then the distortion is measured for each pixel in a block. At last the pixel with the lowest DRDM value in the block is chosen to flip. Pamboukian,S.;V.,D., and Kim,H.Y., use an algorithm which divides the image into (3x3 ) non-overlapping blocks and then arrange these blocks in an increasing order according to the visibility of their 112
3 An Algorithm for Data Hiding In Binary Images central pixels [3] and then compares these blocks with templates which are set up previously and also arranged by the same manner. In an extraction stage, the two templates that differ only in their central pixels must have the same visibility score so the central pixel of that block will take the same value of the central pixel of the template. Pan,G.;Wu,Z.; and Pan,Y.,(2002) introduce the concept of supblock which can be decomposed to several subblocks [4] and put a rank for each subblock according to the pattern-color and nominated color: pattern-color is the color of the most pixels in the pattern and nominated color may be other color in the subblock except for pattern color. Tzeng,C.; and Tsai,W., use an algorithm that defines a variable ( Surrounding Edge Count) (SEC) [5] which represents the existing edges between pixel p and its eight neighbors and then SEC is found which is the difference between SEC and SEC - and then the pixel p in block B flippable if and only if SEC is less than or equal to predefined threshold in order to restrict the distortion, and P and its neighbors are not visited yet in block B in order to make flippable pixels disconnected and this will not make visual artifacts. Wu,M.; and Liu,B., identify those pixels that can be flipped from white to black and vice versa without introducing irregularities [6]. This is done through a set of rules which find a score to each pixel in a block. They find that the distribution of these flippable pixels is highly uneven over the image so they use the shuffle technique which permutes the pixels so that these flippable can occur more evenly across the image. Wu,M.;Fridrich,J.; and Goljan,M.,H., clarify the benefits of the shuffling technique in increasing the capacity of embedding [7], while enhancing security since the receiver side only needs the shuffling table or key to correctly extract the hidden data. In this paper, a proposed algorithm is introduced, the effect of the immediate neighbors (8-way connected) of the central pixel on a local window is taken as a major consideration in the design of the algorithm. 3. Data Embedding in Binary Images: Data hiding can be defined as a technique that enables us to secretly embed extra data into digital media such as image, movie, audio and text files [8], or it is a technique used to embed a sequence of bits in a host with small visual deterioration and the means to extract it afterwards 113
4 Eman Th. Sedeek Al-obaidy [3]. However, there is a limitation to hide information behind binary images and there are many reasons for that like: 1- Embedding data in a binary image will cause obvious image content changes because of (black and white) nature of the image. 2- Binary images are more fragile to disturbances or attacks like channel noise, such a property makes authentication of recovered hidden information a required work. [5 ] In particular flipping white or black pixels that are not on the boundaries are likely to introduce visible artifacts in binary images and in this type of images the human perceptual factor can be taken into account by studying every pixel and its immediate neighbors as shown in figure (2).[6] Figure (2): The flipping of the center pixel in (b) is more noticeable than that in (a) [6]. Application of data hiding like authentication and annotation requires high-rate embedding with blind detection which does not need the original image and first the flippable pixels whose change would not incur substantial visual distortion must be identified and to enforce properties of a group of pixel via local manipulation of a small number of flippable pixels. [1] Embedding and extraction mechanism should be chosen precisely because any small mistake will propagate to the entire image in embedding and then in extraction method and directly encoding the hidden information in flippable pixel (e.g., set to black if to embed a ''0'' and to white if to 114
5 An Algorithm for Data Hiding In Binary Images embed a ''1'') may not allow the extraction of embedded data without the original image. The reason is that the embedding process may change a flippable pixel in the original image to a pixel that may no longer be considered flippable [6] as it is shown in figure (3). Figure (3): It can be seen that after embedding the marked pixel it is no longer considered flippable if applying the same rule.[6] This example shows the difficulties for the detector to carry hidden information without using the original image. 4. The Proposed Algorithm: The effect of the immediate neighbors (8-way connected) of the central pixel in a local window is taken as a major consideration in the design of the proposed algorithm. It can be noted in figure (4) that the flipping of the central pixels in both cases does not introduce major visual irregularities especially if the flipping is done on the boundaries. This property is used in the design of the templates which are set up previously and used later in the algorithm in the embedding and extraction process, and in figure (5) the four basic templates which are used in this algorithm are shown. Figure (4): the flipping of the central pixels in both cases does not cause visual artifacts especially if the flipping is on the boundary. 115
6 Eman Th. Sedeek Al-obaidy 1st template 2nd template 3rd template 4rd template Figure (5): 4 Basic templates used in the proposed algorithm, the central ( black ) pixels only will be flipped from 0 to 1 or vice versa. The four templates in figure (5), represent the starting point for the algorithm and by them the comparisons begin between them and the specified block to find the correct template and according to the value of the central pixel in that template the value of the central pixel in the block will be the same. In figure (6), the extension of the first and fourth basic templates is shown and every time the number of the black pixels (suppose that the background is white and foreground is black) that surrounds the central pixel in a block is increased in the used templates and then if this central pixel only is changed from black to white or vice versa that will not cause a visual distortion in the marked image (stego image). The extension also is done for the second and third templates, and then the detection of the hidden data will be easy depending also on the same procedure and the same templates, that means a blind detection without need of the original image. Figure (6): The increase of the black (gray here) pixels around the central pixels (black here) in the first and fourth templates. 116
7 An Algorithm for Data Hiding In Binary Images 4.1. The Embedding and Extraction Process: Embedding and extraction data processing can be summarized as follows: A) Embedding process: 1. Divide the original image (cover image) into non-overlapping blocks of size (3x3). 2. Check the non-uniform blocks if they match one of the templates which are set up previously and when this happenes only the central pixel of these non-overlapped blocks will be changed (either from 0 to 1 or from 1 to 0 ) according to that template and the permutation of the pixels that surround the central pixels in that block and this change represents the embedding data and this is clarified in figure (7). B) Extraction process: 1. Divide the marked image (stego image which carries the hidden data) into non-overlapping blocks of size (3x3). 2. Find the true template which will differ only in the central pixels in the examined block and this value of the central pixel in the block in the marked image represents the hidden data that will be extracted and this is clarified in figure (7). Template Table. Original Binary Image. Divide into (3 X 3) Blocks. Match Block Pattern. Embedding process Data. Embed. Marked Image. 117
8 Eman Th. Sedeek Al-obaidy Template Table. Marked Binary Image. Divide into (3 X 3) Blocks. Match Block Pattern. Extract Extraction process Data. Figure (7): Block diagram of embedding and extraction processes 5. Results: The algorithm is tested to embed a number of bits in binary images of different types (computr-generated text, cartoon-like images, scaneed documents images ) and of different sizes. The correlation factor between the marked images and the original images was approximatly 0.99 for all the tested images. The marked images have good robustness to printing and scanning, also they have pleasant visual quality. In figure (8), a scanned text document of size (171 x 234) is tested and modified by 44 bits. 118
9 An Algorithm for Data Hiding In Binary Images (a) (b) (c) Figure (8) : (a) original scanned text image (171 x 234), (b) marked image with 44 bits, (c) modified pixels. 119
10 Eman Th. Sedeek Al-obaidy In figure (9), the second tested Hunter image of size( 165 x 213) is used and modified by 65 bits, this image also was used by [6] and the number of the embeded bits was 70 bits. (a) (b) (c) Figure (9) : (a) original scanned Hunter image (165 x 213), (b) marked image with 65 bits, (c) modified pixels. 120
11 An Algorithm for Data Hiding In Binary Images In figure (10 ), a computer generated image by microsoft painter program of size (382 x 456 ) is used and then marked by the algorithm with 105 bits. (a ) (b) (c) Figure (10) : (a) original snow man image (382 x 456), (b) marked image with 105 bits, (c) modified pixels. 121
12 Eman Th. Sedeek Al-obaidy 6. Conclousion: A new algorithm for embedding data in binary images has been proposed. It depends in it's design on the effect of immediate neighbors for a specified pixel.the algorithm has been tested on different types of binary images. The extraction of the hidden data does not need the original image (cover image) also the marked images have pleasant visual quality. 122
13 An Algorithm for Data Hiding In Binary Images REFERENCES [1] Mei,Q.,Wong,E.K.,Memon,N., Data Hiding in Binary Text Documents, Department of Computer and Information Science Polytechnic University, 5 Metrotech Center, Brooklyn,Ny11201,[email protected]. [2] Lu,H.,Kot,C.A.,Cheng,J., Secure Data Hiding In Binary Document Images for Authentication, School of Electrical and Electronic Engineering Nanyang Technological University, Singapore , [email protected]. [3] Pamboukian,S.,V.,D.,Kim,H.Y., Reversible Data Hiding and Revrsibale Authentication Watermarking for Binary Images,Universidade Presbiteriana Mackenzie,Brazil, [email protected]. [4] Pan,G.,Wu,Z.,Pan,Y.,2002, A Data Hiding Method for Few-color Images, Zhejiang University, Department of Computer Science and Engineering, Hangzhon,310027,P.R. China, {gpan,wzh}@cs.zju.edu.cn. [5] Tzeng,C.,Tsai,W., Hiding Authenticable General Digital Information Behind Binary Images with Reduced Distortion, Department of computer and Information Science, National Chiao Tung University, Hsinchu, Taiwan 300, Republic of China, [email protected]. [6] Wu,M.,Liu,B., Data Hiding in Binary Images for Authenication and Annotation, 2004, IEEE Trans.on Multimedia. [7] Wu,M.,Fridrich,J.,Goljan,M.,H., Handling Uneven Emedding Capacity in Binary Images:A Revisit, ECE Department,University of Maryland,USA. [8] Hirohisa,H., A Modified CPT Scheme For Embedding Data Into Binary Images, Center for Promotion of Excellence in Higher Education, Kyoto University, [email protected]. 123
SECURE DATA TRANSMISSION USING DIGITAL IMAGE WATERMARKING
SECURE DATA TRANSMISSION USING DIGITAL IMAGE WATERMARKING 1 Maulik Srivastava, 2 Anuradha Sharma 1,2 Department of Computer Science & Engineering, Amity University, Uttar Pradesh Abstract: As we all know
Safer data transmission using Steganography
Safer data transmission using Steganography Arul Bharathi, B.K.Akshay, M.Priy a, K.Latha Department of Computer Science and Engineering Sri Sairam Engineering College Chennai, India Email: [email protected],
Security and protection of digital images by using watermarking methods
Security and protection of digital images by using watermarking methods Andreja Samčović Faculty of Transport and Traffic Engineering University of Belgrade, Serbia Gjovik, june 2014. Digital watermarking
Reversible Data Hiding and Reversible Authentication Watermarking for Binary Images
Reversible Data Hiding and Reversible Authentication Watermarking for Binary Images Sergio Vicente D. Pamboukian 1, Hae Yong Kim 2 1 Universidade Presbiteriana Mackenzie, Brazil. 2 Universidade de São
Image Authentication Scheme using Digital Signature and Digital Watermarking
www..org 59 Image Authentication Scheme using Digital Signature and Digital Watermarking Seyed Mohammad Mousavi Industrial Management Institute, Tehran, Iran Abstract Usual digital signature schemes for
Multimedia Document Authentication using On-line Signatures as Watermarks
Multimedia Document Authentication using On-line Signatures as Watermarks Anoop M Namboodiri and Anil K Jain Department of Computer Science and Engineering Michigan State University East Lansing, MI 48824
Friendly Medical Image Sharing Scheme
Journal of Information Hiding and Multimedia Signal Processing 2014 ISSN 2073-4212 Ubiquitous International Volume 5, Number 3, July 2014 Frily Medical Image Sharing Scheme Hao-Kuan Tso Department of Computer
2695 P a g e. IV Semester M.Tech (DCN) SJCIT Chickballapur Karnataka India
Integrity Preservation and Privacy Protection for Digital Medical Images M.Krishna Rani Dr.S.Bhargavi IV Semester M.Tech (DCN) SJCIT Chickballapur Karnataka India Abstract- In medical treatments, the integrity
Volume 2, Issue 12, December 2014 International Journal of Advance Research in Computer Science and Management Studies
Volume 2, Issue 12, December 2014 International Journal of Advance Research in Computer Science and Management Studies Research Article / Survey Paper / Case Study Available online at: www.ijarcsms.com
AN ENHANCED MECHANISM FOR SECURE DATA TRANSMISSION USING STEGANOGRAPHY MERGED WITH VISUAL CRYPTOGRAPHY
AN ENHANCED MECHANISM FOR SECURE DATA TRANSMISSION USING STEGANOGRAPHY MERGED WITH VISUAL CRYPTOGRAPHY Chandan Mohapatra 1, Manajusha Pandey 2 1 PG Student in Computer Science Dept., KIIT University, Bhubaneswar,
Multi-factor Authentication in Banking Sector
Multi-factor Authentication in Banking Sector Tushar Bhivgade, Mithilesh Bhusari, Ajay Kuthe, Bhavna Jiddewar,Prof. Pooja Dubey Department of Computer Science & Engineering, Rajiv Gandhi College of Engineering
A Digital Audio Watermark Embedding Algorithm
Xianghong Tang, Yamei Niu, Hengli Yue, Zhongke Yin Xianghong Tang, Yamei Niu, Hengli Yue, Zhongke Yin School of Communication Engineering, Hangzhou Dianzi University, Hangzhou, Zhejiang, 3008, China [email protected],
A Robust and Lossless Information Embedding in Image Based on DCT and Scrambling Algorithms
A Robust and Lossless Information Embedding in Image Based on DCT and Scrambling Algorithms Dr. Mohammad V. Malakooti Faculty and Head of Department of Computer Engineering, Islamic Azad University, UAE
ROI Based Medical Image Watermarking with Zero Distortion and Enhanced Security
I.J. Modern Education and Computer Science, 2014, 10, 40-48 Published Online October 2014 in MECS (http://www.mecs-press.org/) DOI: 10.5815/ijmecs.2014.10.06 ROI Based Medical Image Watermarking with Zero
Triple Security of Information Using Stegnography and Cryptography
Triple Security of Information Using Stegnography and Cryptography Abstract In this growing age information sharing and transfer has increased exponentially so, security is a primary requirement for all
WATERMARKING FOR IMAGE AUTHENTICATION
WATERMARKING FOR IMAGE AUTHENTICATION Min Wu Bede Liu Department of Electrical Engineering Princeton University, Princeton, NJ 08544, USA Fax: +1-609-258-3745 {minwu, liu}@ee.princeton.edu ABSTRACT A data
CHAPTER 7 CONCLUSION AND FUTURE WORK
158 CHAPTER 7 CONCLUSION AND FUTURE WORK The aim of this thesis was to present robust watermarking techniques for medical image. Section 7.1, consolidates the contributions made by the researcher and Section
Security Protection of Software Programs by Information Sharing and Authentication Techniques Using Invisible ASCII Control Codes
International Journal of Network Security, Vol.10, No.1, PP.1 10, Jan. 2010 1 Security Protection of Software Programs by Information Sharing and Authentication Techniques Using Invisible ASCII Control
Expansion and Implementation of a 3x3 Sobel and Prewitt Edge Detection Filter to a 5x5 Dimension Filter
A E Imm 33 S P E D F Dm F M.S. R A Rm L B C Em S U S P. T S m m m. T S m. T P mm,, S,. T m m 33 S P m. I, 33 m S m, C 8 m, m m m m M. S الملخص في هذا البحث تم اعتماد طريقتي و P لكشف الحافة. تقنيا ان مشغل
A Secure File Transfer based on Discrete Wavelet Transformation and Audio Watermarking Techniques
A Secure File Transfer based on Discrete Wavelet Transformation and Audio Watermarking Techniques Vineela Behara,Y Ramesh Department of Computer Science and Engineering Aditya institute of Technology and
Watermarking Techniques for Protecting Intellectual Properties in a Digital Environment
Watermarking Techniques for Protecting Intellectual Properties in a Digital Environment Isinkaye F. O*. and Aroge T. K. Department of Computer Science and Information Technology University of Science and
Secret Communication through Web Pages Using Special Space Codes in HTML Files
International Journal of Applied Science and Engineering 2008. 6, 2: 141-149 Secret Communication through Web Pages Using Special Space Codes in HTML Files I-Shi Lee a, c and Wen-Hsiang Tsai a, b, * a
STEGANOGRAPHY: TEXT FILE HIDING IN IMAGE YAW CHOON KIT CA10022
STEGANOGRAPHY: TEXT FILE HIDING IN IMAGE YAW CHOON KIT CA10022 FACULTY OF COMPUTER SYSTEM AND SOFTWARE ENGINEERING 2012/2013 1 ABSTRACT Steganography is the art or science in hiding. It is origin from
Vol. 35, No. 3, Sept 30,2000 ملخص تعتبر الخوارزمات الجينية واحدة من أفضل طرق البحث من ناحية األداء. فبالرغم من أن استخدام هذه الطريقة ال يعطي الحل
AIN SHAMS UNIVERSITY FACULTY OF ENGINEERING Vol. 35, No. 3, Sept 30,2000 SCIENTIFIC BULLETIN Received on : 3/9/2000 Accepted on: 28/9/2000 pp : 337-348 GENETIC ALGORITHMS AND ITS USE WITH BACK- PROPAGATION
The Role of Size Normalization on the Recognition Rate of Handwritten Numerals
The Role of Size Normalization on the Recognition Rate of Handwritten Numerals Chun Lei He, Ping Zhang, Jianxiong Dong, Ching Y. Suen, Tien D. Bui Centre for Pattern Recognition and Machine Intelligence,
Security Based Data Transfer and Privacy Storage through Watermark Detection
Security Based Data Transfer and Privacy Storage through Watermark Detection Gowtham.T 1 Pradeep Kumar.G 2 1PG Scholar, Applied Electronics, Nandha Engineering College, Anna University, Erode, India. 2Assistant
A Concept of Digital Picture Envelope for Internet Communication
A Concept of Digital Picture Envelope for Internet Communication Eiji Kawaguchi, Koichi Nozaki, Michiharu Niimi, Hideki Noda and Richard O. Eason Kyushu Institute of Technology 1-1 Sensui-cho, Tobata,
An Application of Visual Cryptography To Financial Documents
An Application of Visual Cryptography To Financial Documents L. W. Hawkes, A. Yasinsac, C. Cline Security and Assurance in Information Technology Laboratory Computer Science Department Florida State University
ECE 533 Project Report Ashish Dhawan Aditi R. Ganesan
Handwritten Signature Verification ECE 533 Project Report by Ashish Dhawan Aditi R. Ganesan Contents 1. Abstract 3. 2. Introduction 4. 3. Approach 6. 4. Pre-processing 8. 5. Feature Extraction 9. 6. Verification
Keywords Android, Copyright Protection, Discrete Cosine Transform (DCT), Digital Watermarking, Discrete Wavelet Transform (DWT), YCbCr.
Volume 3, Issue 7, July 2013 ISSN: 2277 128X International Journal of Advanced Research in Computer Science and Software Engineering Research Paper Available online at: www.ijarcsse.com Web Based Novel
Multimedia Data Hiding
Multimedia Data Hiding Introduction! Digital Watermarking / Multimedia Data Hiding Hide secondary data in digital image/video/audio/3d! Uses of hidden data: ownership verification, alteration detection
Hamid.A.Jalab, A.A Zaidan and B.B Zaidan
Frame Selected Approach for Hiding Data within MPEG Video Using Bit Plane Complexity Segmentation 108 Hamid.A.Jalab, A.A Zaidan and B.B Zaidan Abstract--- Bit Plane Complexity Segmentation (BPCS) digital
Blind Deconvolution of Barcodes via Dictionary Analysis and Wiener Filter of Barcode Subsections
Blind Deconvolution of Barcodes via Dictionary Analysis and Wiener Filter of Barcode Subsections Maximilian Hung, Bohyun B. Kim, Xiling Zhang August 17, 2013 Abstract While current systems already provide
International Journal of Advanced Computer Technology (IJACT) ISSN:2319-7900 Least Significant Bit algorithm for image steganography
Champakamala.B.S, Padmini.K, Radhika.D. K Asst Professors, Department of TCE, Don Bosco Institute of Technology,Bangalore, India Abstract Steganography is one of the most powerful techniques to conceal
Mathematical Model Based Total Security System with Qualitative and Quantitative Data of Human
Int Jr of Mathematics Sciences & Applications Vol3, No1, January-June 2013 Copyright Mind Reader Publications ISSN No: 2230-9888 wwwjournalshubcom Mathematical Model Based Total Security System with Qualitative
Group Testing a tool of protecting Network Security
Group Testing a tool of protecting Network Security Hung-Lin Fu 傅 恆 霖 Department of Applied Mathematics, National Chiao Tung University, Hsin Chu, Taiwan Group testing (General Model) Consider a set N
Signature Region of Interest using Auto cropping
ISSN (Online): 1694-0784 ISSN (Print): 1694-0814 1 Signature Region of Interest using Auto cropping Bassam Al-Mahadeen 1, Mokhled S. AlTarawneh 2 and Islam H. AlTarawneh 2 1 Math. And Computer Department,
Efficient Data Recovery scheme in PTS-Based OFDM systems with MATRIX Formulation
Efficient Data Recovery scheme in PTS-Based OFDM systems with MATRIX Formulation Sunil Karthick.M PG Scholar Department of ECE Kongu Engineering College Perundurau-638052 Venkatachalam.S Assistant Professor
Tracking Moving Objects In Video Sequences Yiwei Wang, Robert E. Van Dyck, and John F. Doherty Department of Electrical Engineering The Pennsylvania State University University Park, PA16802 Abstract{Object
Turgut Ozal University. Computer Engineering Department. TR-06010 Ankara, Turkey
Dr. YILDIRAY YALMAN Associate Professor CONTACT INFORMATION Turgut Ozal University Computer Engineering Department TR-06010 Ankara, Turkey Phone: +90 (0)312-5515437 E-mail: [email protected] RESEARCH
Locating and Decoding EAN-13 Barcodes from Images Captured by Digital Cameras
Locating and Decoding EAN-13 Barcodes from Images Captured by Digital Cameras W3A.5 Douglas Chai and Florian Hock Visual Information Processing Research Group School of Engineering and Mathematics Edith
PageX: An Integrated Document Processing and Management Software for Digital Libraries
PageX: An Integrated Document Processing and Management Software for Digital Libraries Hanchuan Peng, Zheru Chi, Wanchi Siu, and David Dagan Feng Department of Electronic & Information Engineering The
Robust Blind Watermarking Mechanism For Point Sampled Geometry
Robust Blind Watermarking Mechanism For Point Sampled Geometry Parag Agarwal Balakrishnan Prabhakaran Department of Computer Science, University of Texas at Dallas MS EC 31, PO Box 830688, Richardson,
A Secure Data Transmission By Integrating Cryptography And Video Steganography
A Secure Data Transmission By Integrating Cryptography And Video Steganography Shafna P K Computer Science Department KMEA Engineering College Ernakulam, India [email protected] Abstract Advances
An Approach of Covert Communication Based on the Adaptive Steganography Scheme on Voice over IP
An Approach of Covert Communication Based on the Adaptive Steganography Scheme on Voice over IP Rui Miao Department of Electronic Engineering, Tsinghua University, Beijing, China [email protected] Yongfeng
Analecta Vol. 8, No. 2 ISSN 2064-7964
EXPERIMENTAL APPLICATIONS OF ARTIFICIAL NEURAL NETWORKS IN ENGINEERING PROCESSING SYSTEM S. Dadvandipour Institute of Information Engineering, University of Miskolc, Egyetemváros, 3515, Miskolc, Hungary,
Automatic License Plate Recognition using Python and OpenCV
Automatic License Plate Recognition using Python and OpenCV K.M. Sajjad Department of Computer Science and Engineering M.E.S. College of Engineering, Kuttippuram, Kerala [email protected] Abstract Automatic
SOFTWARE AND HARDWARE-IN-THE-LOOP MODELING OF AN AUDIO WATERMARKING ALGORITHM. Ismael Zárate Orozco, B.E. Thesis Prepared for the Degree of
SOFTWARE AND HARDWARE-IN-THE-LOOP MODELING OF AN AUDIO WATERMARKING ALGORITHM Ismael Zárate Orozco, B.E. Thesis Prepared for the Degree of MASTER OF SCIENCE UNIVERSITY OF NORTH TEXAS December 2010 APPROVED:
International ejournals
ISSN 0976 1411 Available online at www.internationalejournals.com International ejournals International ejournal of Mathematics and Engineering 227 (2013) 2216-2222 EFFICIENT METHOD OF AUDIO STEGANOGRAPHY
Comparison of Non-linear Dimensionality Reduction Techniques for Classification with Gene Expression Microarray Data
CMPE 59H Comparison of Non-linear Dimensionality Reduction Techniques for Classification with Gene Expression Microarray Data Term Project Report Fatma Güney, Kübra Kalkan 1/15/2013 Keywords: Non-linear
Audio synthesis: MIDI Digital Audio Coding/Compression. Today: Intellectual property management for digital media. What is Digital Watermarking?
ENEE408G Lecture-9 Last Lecture Digital Watermarking and Fingerprinting for Digital Rights Protection of Multimedia URL: http://www.ece.umd.edu/class/enee408g/ Slides included here are based on Spring
Chapter 23. Database Security. Security Issues. Database Security
Chapter 23 Database Security Security Issues Legal and ethical issues Policy issues System-related issues The need to identify multiple security levels 2 Database Security A DBMS typically includes a database
A Method of Caption Detection in News Video
3rd International Conference on Multimedia Technology(ICMT 3) A Method of Caption Detection in News Video He HUANG, Ping SHI Abstract. News video is one of the most important media for people to get information.
INTERNATIONAL JOURNAL OF APPLIED ENGINEERING RESEARCH, DINDIGUL Volume 1, No 3, 2010
Lossless Medical Image Security Shrikhande Rohini 1, Vinayak Bairagi 2 1 Researcher, Electronics & Telecommunication Department, Sinhgad Academy Of Engg. 2 Assistant Professor, Electronics & Telecommunication
LOCAL SURFACE PATCH BASED TIME ATTENDANCE SYSTEM USING FACE. [email protected]
LOCAL SURFACE PATCH BASED TIME ATTENDANCE SYSTEM USING FACE 1 S.Manikandan, 2 S.Abirami, 2 R.Indumathi, 2 R.Nandhini, 2 T.Nanthini 1 Assistant Professor, VSA group of institution, Salem. 2 BE(ECE), VSA
Video compression: Performance of available codec software
Video compression: Performance of available codec software Introduction. Digital Video A digital video is a collection of images presented sequentially to produce the effect of continuous motion. It takes
Experimental DRM Architecture Using Watermarking and PKI
Experimental DRM Architecture Using Watermarking and PKI Mikko Löytynoja, Tapio Seppänen, Nedeljko Cvejic MediaTeam Oulu Information Processing Laboratory University of Oulu, Finland {mikko.loytynoja,
IMAGE STEGANOGRAPHY FOR SECURE DATA TRANSMISSION USING BLOWFISH ALGORITHM
IMAGE STEGANOGRAPHY FOR SECURE DATA TRANSMISSION USING BLOWFISH ALGORITHM BARJINDER SINGH 1, BALPREET KAUR 2, RANJOT KAUR 3 1 Research Scholar at BBSBEC, Fatehgarh sahib 2 Lecturer at BBSBEC Fatehgarh
Mouse Control using a Web Camera based on Colour Detection
Mouse Control using a Web Camera based on Colour Detection Abhik Banerjee 1, Abhirup Ghosh 2, Koustuvmoni Bharadwaj 3, Hemanta Saikia 4 1, 2, 3, 4 Department of Electronics & Communication Engineering,
Digimarc for Images. Best Practices Guide (Chroma + Classic Edition)
Digimarc for Images Best Practices Guide (Chroma + Classic Edition) Best Practices Guide (Chroma + Classic Edition) Why should you digitally watermark your images? 3 What types of images can be digitally
Soumendu Chakraborty, Anand Singh Jalal* and Charul Bhatnagar
----------------------------------------------------------------------------- An Efficient Bit Plane X-ORing Algorithm for Irreversible Image Steganography -----------------------------------------------------------------------------
Evaluating the Area of a Circle and the Volume of a Sphere by Using Monte Carlo Simulation. Abd Al -Kareem I. Sheet * E.mail: kareem59y@yahoo.
Iraqi Journal of Statistical Science (14) 008 p.p. [48-6] Evaluating the Area of a Circle and the Volume of a Sphere by Using Monte Carlo Simulation Abd Al -Kareem I. Sheet * E.mail: [email protected]
Video Authentication for H.264/AVC using Digital Signature Standard and Secure Hash Algorithm
Video Authentication for H.264/AVC using Digital Signature Standard and Secure Hash Algorithm Nandakishore Ramaswamy Qualcomm Inc 5775 Morehouse Dr, Sam Diego, CA 92122. USA [email protected] K.
Information, Entropy, and Coding
Chapter 8 Information, Entropy, and Coding 8. The Need for Data Compression To motivate the material in this chapter, we first consider various data sources and some estimates for the amount of data associated
Reversible Data Hiding for Security Applications
Reversible Data Hiding for Security Applications Baig Firdous Sulthana, M.Tech Student (DECS), Gudlavalleru engineering college, Gudlavalleru, Krishna (District), Andhra Pradesh (state), PIN-521356 S.
MULTIFACTOR AUTHENTICATION FOR SOFTWARE PROTECTION
Diyala Journal of Engineering Sciences Second Engineering Scientific Conference College of Engineering University of Diyala 16-17 December. 2015, pp. 479-492 ISSN 1999-8716 Printed in Iraq MULTIFACTOR
Steganography and Visual Cryptography in Computer Forensics
2010 Fifth International Workshop on Systematic Approaches to Digital Forensic Engineering Steganography and Visual Cryptography in Computer Forensics George Abboud Department of Computer Engineering and
Bernice E. Rogowitz and Holly E. Rushmeier IBM TJ Watson Research Center, P.O. Box 704, Yorktown Heights, NY USA
Are Image Quality Metrics Adequate to Evaluate the Quality of Geometric Objects? Bernice E. Rogowitz and Holly E. Rushmeier IBM TJ Watson Research Center, P.O. Box 704, Yorktown Heights, NY USA ABSTRACT
Application-Specific Biometric Templates
Application-Specific Biometric s Michael Braithwaite, Ulf Cahn von Seelen, James Cambier, John Daugman, Randy Glass, Russ Moore, Ian Scott, Iridian Technologies Inc. Introduction Biometric technologies
A Novel Security Scheme for Secret Data using Cryptography and Steganography
I. J. Computer Network and Information Security, 2012, 2, 36-42 Published Online March 2012 in MECS (http://www.mecs-press.org/) DOI: 10.5815/ijcnis.2012.02.06 A Novel Security Scheme for Secret Data using
A SECURE EMAIL CLIENT APPLICATION USING RETINAL IMAGE MATCHING
A SECURE EMAIL CLIENT APPLICATION USING RETINAL IMAGE MATCHING ANKITA KANTESH 1, SUPRIYA S. BEHERA 2, JYOTI BHOITE 3, ANAMIKA KUMARI 4 1,2,3,4 B.E, University of Pune Abstract- As technology advances,
How To Encrypt With A 64 Bit Block Cipher
The Data Encryption Standard (DES) As mentioned earlier there are two main types of cryptography in use today - symmetric or secret key cryptography and asymmetric or public key cryptography. Symmetric
Data Storage 3.1. Foundations of Computer Science Cengage Learning
3 Data Storage 3.1 Foundations of Computer Science Cengage Learning Objectives After studying this chapter, the student should be able to: List five different data types used in a computer. Describe how
Example #1: Controller for Frequency Modulated Spectroscopy
Progress Report Examples The following examples are drawn from past student reports, and illustrate how the general guidelines can be applied to a variety of design projects. The technical details have
Modeling the Print-Scan Process for Resilient Data Hiding
Modeling the Print-Scan Process for Resilient Data Hiding Kaushal Solanki, Upamanyu Madhow, Banglore S. Manjunath, and Shiv Chandrasekaran Department of Electrical and Computer Engineering University of
Data Storage. Chapter 3. Objectives. 3-1 Data Types. Data Inside the Computer. After studying this chapter, students should be able to:
Chapter 3 Data Storage Objectives After studying this chapter, students should be able to: List five different data types used in a computer. Describe how integers are stored in a computer. Describe how
Chapter 11 Security+ Guide to Network Security Fundamentals, Third Edition Basic Cryptography
Chapter 11 Security+ Guide to Network Security Fundamentals, Third Edition Basic Cryptography What Is Steganography? Steganography Process of hiding the existence of the data within another file Example:
Multimodal Biometric Recognition Security System
Multimodal Biometric Recognition Security System Anju.M.I, G.Sheeba, G.Sivakami, Monica.J, Savithri.M Department of ECE, New Prince Shri Bhavani College of Engg. & Tech., Chennai, India ABSTRACT: Security
Analysis of Multimodal Biometric Fusion Based Authentication Techniques for Network Security
, pp. 239-246 http://dx.doi.org/10.14257/ijsia.2015.9.4.22 Analysis of Multimodal Biometric Fusion Based Authentication Techniques for Network Security R.Divya #1 and V.Vijayalakshmi #2 #1 Research Scholar,
Alaa Alhamami, Avan Sabah Hamdi Amman Arab University Amman, Jordan
World of Computer Science and Information Technology Journal (WCSIT) ISSN: 2221-0741 Vol. 5, No. 5, 87-91, 2015 Mobile Secure Transmission Method Based on Audio Steganography Alaa Alhamami, Avan Sabah
A Stock Pattern Recognition Algorithm Based on Neural Networks
A Stock Pattern Recognition Algorithm Based on Neural Networks Xinyu Guo [email protected] Xun Liang [email protected] Xiang Li [email protected] Abstract pattern respectively. Recent
Perfect PDF 8 Premium
Perfect PDF 8 Premium Test results ( gut Good, sehr gut very good) refer to versions 7, 6 and 5 of Perfect PDF. Professionally create, convert, edit and view PDF, PDF/A and XPS files Perfect PDF 8 Premium
SOURCE SCANNER IDENTIFICATION FOR SCANNED DOCUMENTS. Nitin Khanna and Edward J. Delp
SOURCE SCANNER IDENTIFICATION FOR SCANNED DOCUMENTS Nitin Khanna and Edward J. Delp Video and Image Processing Laboratory School of Electrical and Computer Engineering Purdue University West Lafayette,
Video Coding Basics. Yao Wang Polytechnic University, Brooklyn, NY11201 [email protected]
Video Coding Basics Yao Wang Polytechnic University, Brooklyn, NY11201 [email protected] Outline Motivation for video coding Basic ideas in video coding Block diagram of a typical video codec Different
Thresholding technique with adaptive window selection for uneven lighting image
Pattern Recognition Letters 26 (2005) 801 808 wwwelseviercom/locate/patrec Thresholding technique with adaptive window selection for uneven lighting image Qingming Huang a, *, Wen Gao a, Wenjian Cai b
Computer Forensics Application. ebay-uab Collaborative Research: Product Image Analysis for Authorship Identification
Computer Forensics Application ebay-uab Collaborative Research: Product Image Analysis for Authorship Identification Project Overview A new framework that provides additional clues extracted from images
Separable & Secure Data Hiding & Image Encryption Using Hybrid Cryptography
502 Separable & Secure Data Hiding & Image Encryption Using Hybrid Cryptography 1 Vinay Wadekar, 2 Ajinkya Jadhavrao, 3 Sharad Ghule, 4 Akshay Kapse 1,2,3,4 Computer Engineering, University Of Pune, Pune,
A New Image Edge Detection Method using Quality-based Clustering. Bijay Neupane Zeyar Aung Wei Lee Woon. Technical Report DNA #2012-01.
A New Image Edge Detection Method using Quality-based Clustering Bijay Neupane Zeyar Aung Wei Lee Woon Technical Report DNA #2012-01 April 2012 Data & Network Analytics Research Group (DNA) Computing and
Automatic Extraction of Signatures from Bank Cheques and other Documents
Automatic Extraction of Signatures from Bank Cheques and other Documents Vamsi Krishna Madasu *, Mohd. Hafizuddin Mohd. Yusof, M. Hanmandlu ß, Kurt Kubik * *Intelligent Real-Time Imaging and Sensing group,
Keywords Decryption, Encryption,password attack, Replay attack, steganography, Visual cryptography EXISTING SYSTEM OF KERBEROS
Volume 4, Issue 2, February 2014 ISSN: 2277 128X International Journal of Advanced Research in Computer Science and Software Engineering Research Paper Available online at: www.ijarcsse.com Secure Authentication
Side Channel Analysis and Embedded Systems Impact and Countermeasures
Side Channel Analysis and Embedded Systems Impact and Countermeasures Job de Haas Agenda Advances in Embedded Systems Security From USB stick to game console Current attacks Cryptographic devices Side
Automated Image Forgery Detection through Classification of JPEG Ghosts
Automated Image Forgery Detection through Classification of JPEG Ghosts Fabian Zach, Christian Riess and Elli Angelopoulou Pattern Recognition Lab University of Erlangen-Nuremberg {riess,elli}@i5.cs.fau.de
