TECHNICAL REPORT No. TR2000/10/01

Size: px
Start display at page:

Download "TECHNICAL REPORT No. TR2000/10/01"

Transcription

1 TECHNICAL REPORT No. TR2000/10/01 Bit Signature Casting in the DCT domain V. Fotopoulos, P. Kavathas and A.N. Skodras October 2000 Abstract Spread spectrum techniques have been successfully applied in still image watermarking. Pseudorandom noise sequences and transform coefficients of logo images are mostly used in these methods. In this report a new signature casting scheme is proposed. The watermark/signature is a 32-bit sequence and the casting domain is the DCT coefficients of the entire image. The 32 largest coefficients are selected for embedding. The original image is needed for the extraction of the signature. Various tests have been performed and results appear quite promising. TECHNICAL REPORT No. TR2000/10/01 1

2 1. Introduction During the last years, there has been a rapid growth in the use of Internet. People from all around the world exploit Internet s great capabilities by exchanging any possible kind of information and useful data. Along with all the benefits from this situation, it s also a fact that many problems concerning copyright ownership protection issues have arisen. The main reason is that digital media can nowadays be exactly reproduced, easily, and quite cheaply. These problems have led to the development of Digital Watermarking, in order to protect all digital media (image, audio and video) from the so-called electronic piracy. Digital Watermarking is a relatively new field of research with many features similar to Cryptography. Of course, the goal here is to hide information rather than coding it like Cryptography does [1]. The watermark is basically a digital signature embedded into a digital media, for the purpose of ownership verification and/or authentication. In the case of digital still images, the watermark can be a stream of bits that constitute a digital signature, a pseudo random noise sequence or an image pattern. They can be classified as visible or invisible. Visible watermarks are generally easier to destroy and not so valuable because they alter the image significantly. Invisible ones are more important and are used in various applications depending on their persistence factor. The image quality is altered according to the method. In general the most robust the watermark is, the greater the changes are and consequently the image degradation. Speaking of robustness there are applications where this is the main issue, such as intellectual property rights protection while on the other hand less fragile watermarking can be used for transaction proof [2]. In section 2, an overview of the watermarking features is presented. In sections 3 and 4 the embedding and detection schemes of the proposed method are discussed. The experimental results are reported in section 5. Some comments and observations on the results are given in section 6 and the work is concluded in section 7 with some ideas for future research directions. 2. General Watermarking Features The so far proposed watermarking schemes for digital still images obey to some common rules for watermark embedding. For the detection process though, they don t have the same requirements. Depending on the application, a watermarking system may sometimes require the original image in order to detect the watermark or at least answer whether it was found or not when given a copy of it. There are also systems that do not use the original image and have no information about the watermark during the detection procedure. These are called blind detection systems and are of great practical use [3]. A key is usually associated with both procedures. The key is an important part of the procedure, especially in methods that use pseudo random sequences. In these, the key plays the role of the random generator s TECHNICAL REPORT No. TR2000/10/01 2

3 initialisation seed. In some applications there are two types of keys, private ones and public ones. The private key is used in the embedding process and is property of the creator. The public key is used for ownership proof by an authorised owner/client. The diagrams of the Embedding and Detection Processes of a typical watermarking system are shown in Figures 1 and 2. Watermark Key Original Image Embedding Algorithm Watermarked Image Figure 1. Block diagram of the embedding process The basic principles governing the digital watermarking of still images are: 1. The watermark must be perceptually invisible in the majority of applications. 2. The watermark should not be detected by applying statistical processing methods to a number of images with the same watermark. 3. The detection process must be trustworthy and should prove beyond any doubt who the rightful owner of the digital media is. 4. Every watermarking method must have a secret key that controls the embedding/detection algorithm. 5. Each method should be as robust as possible, in order to face any attacks that may be applied to the watermarked image. 6. Each method should give the capability of embedding more than one watermarks into the same image (multiple watermarking). Original image Watermark Key Watermark: YES or NO Test Image Detection Algorithm or... Information about the watermark Figure 2. Block diagram of the detection process TECHNICAL REPORT No. TR2000/10/01 3

4 Many different techniques for digital image watermarking have been proposed throughout the last five years. There are three categories of watermarking techniques as shown in Figure 3. These are: A. Techniques that embed the watermark directly into the spatial domain of an image. A common practice is the modification of the LSB (Least Significant Bit) by a certain factor [4]. Another approach is the addition of each watermark bit to a large number of image bits [5]. Some statistical methods, such as patchwork, have also been proposed [6]. B. Techniques that embed the watermark into the transform coefficients of an image. These methods can be block based or they can be applied to the whole image. The transforms usually involved are the DCT (Discrete Cosine Transform) [7,8], the DFT (Discrete Fourier Transform) [9] and the DWT (Discrete Wavelet Transform) [10,11]. Recently, there have been some attempts using the Hadamard and the Chirp-Z transforms. C. Hybrid techniques that are a combination of the above two. WATERMARKING TECHNIQUES Spatial Domain LSB based Statistical methods Watermark a large number of image bits Frequency Domain DCT DFT DWT Hadamard Chirp-Z Hybrid Techniques Figure 3. Classification of the Watermarking Techniques The embedding place of the watermark is another important issue. Some methods cast the watermark in the whole image, while others do it in specific regions or blocks. The second category usually exploits some special characteristic of the Human Visual System (HVS) [7,8,10]. This has to do with the tolerance of the human eye in certain changes made to the image. For example, if we cast our watermark into a part of the image that is characterised by lots of fine details, the changes imposed by the watermark are not easily observable. TECHNICAL REPORT No. TR2000/10/01 4

5 3. Watermark Embedding According to the method presented in this report, the watermark is inserted into the DCT domain of the host image (Figure 4). The watermark is a bit signature, a stream of 1 and 0 giving a total number of 32 bits. The transform is applied to the image as a whole. More specifically, it is applied to a square block whose side is the nearest power of 2 that can fit into the image s canvas. For example, if the image is 176x144, the DCT is applied to the central block of size N=128. Original Image DCT Select the 32 largest coefficients Modify the coefficients by using the signature IDCT Watermarked Image Figure 4. The embedding process of the method The next step of the technique after the DCT, is to select the 32 larger positive coefficients, in the low-mid frequency range. Robustness issues justify this choice, since the most important information of the image is there. The high frequency coefficients represent the image details and are vulnerable to most common image manipulation like filtering, compression etc. Of course one might argue that this is the place where changes that come from watermarking are more imperceptible, but this is true only if we re speaking of small sized blocks. Our scheme is applied to the whole image and since robustness is the main issue, the low and mid frequency coefficients are the most appropriate. The DC coefficient is not included in this search, because such a change would impose heavy altering to the image content. The selected coefficients c i are ordered by magnitude and then modified by the corresponding bit in the signature stream. If the i-th signature bit s(i) to be embedded is 1, a quantity D is added to the coefficient. This D quantity represents the persistence factor. If the watermark bit is 0, the same quantity is subtracted from the coefficient. Thus the watermarked coefficients * c i are given by Eq. 1. c * i = c i + f ( i) D (1) where + 1 f ( i) = { 1 if if s(i) = 1 s(i) = 0 and i = 1,2,3,...,32 Finally, the IDCT (Inverse Discrete Cosine Transform) is calculated to form the watermarked image. According to this method, the watermark is spread all over the image, which is a desired feature for the method s imperceptibility. TECHNICAL REPORT No. TR2000/10/01 5

6 4. Watermark Detection For the detection process, the original image is required. The extraction algorithm consists of the following steps (Fig. 5): 1. The forward DCT is applied to both images (the original and the image under testing) 2. The 32 largest DCT coefficients of the original image are located 3. The corresponding 32 DCT coefficients of the test image are located 4. Corresponding coefficients in both images are subtracted. Depending on the sign of the differences, a binary sequence is retrieved. A positive difference shows that the retrieved bit is 1 and a negative one shows that the bit is 0. Original Image DCT Selection of the coefficients Signature Extraction Test Image DCT Retrieval of corresponding coefficients Figure 5. The detection process of the method Screenshots A and B show the interaction for the embedding and detection programs respectively for an application example. The original sailboat image that was used in this test, along with it s watermarked version are shown in Fig. 6. The visual differences between the original and the watermarked images are hardly noticeable despite the large value of D used. This result was more or less expected, since the watermark was spread all over the image as explained in the section 3. The above observation can also be justified by the histogram of the difference image (Fig. 7). This image is the result of the subtraction between the original and the watermarked image. It must be noted, that a bias of 128 has been added, for better visualisation. This is why the histogram is centered around 128. The threshold value in screenshot A is the value of the last coefficient that was watermarked, the lowest one in order of magnitude. TECHNICAL REPORT No. TR2000/10/01 6

7 Input image name: sailboat Output image name: sailboat.wm100 Image height: 512 Image width: 512 FCT-- new N=512 Inserting watermark with a threshold of: 1131 Select persistence factor (5-100): 100 Job Completed Successfully Screenshot A. Embedding the watermark in the image Sailboat with dimensions 512x512 Input original image name: sailboat Input marked image name: sailboat.wm100 Image height: 512 Image width: 512 FCT-- new N= Watermark retrieved Job Completed Successfully Screenshot B. Detecting the watermark from the same image (a) Figure 6 : (a) Original Image (b) Watermarked with D=100 (b) TECHNICAL REPORT No. TR2000/10/01 7

8 Figure 7. Histogram of the Image of Differences 5. Experimental Results For the experiments of the proposed scheme, we have used both video frames and still images. The frames where of size 176x144 (Akiyo, Carphone, and Foreman). The still images used were sized 512x512 (Sailboat, Brandyrose, Sailboat, Opera, Papermachine). The watermark for the three smaller images was embedded for 3 different values of D (10, 50, 100). The still images were tested only for the value D=100. To test the watermark robustness, five common image-processing tasks were applied to each of the images with the help of Adobe Photoshop (Blurring, Gaussian Blurring, Uniform Noise, Sharpening and JPEG Compression). These tests are usually called attacks because their purpose is to destroy the watermark, making it illegible. Since the attacks alter the image s quality, it is important to emphasize that they should not be extreme because the image would then be destroyed. A severely damaged image, even without the watermark information present, is of no longer use to anyone! All results are presented in Table 1. TECHNICAL REPORT No. TR2000/10/01 8

9 Blurring Table 1. Experimental results Gaussian Blurring Uniform Noise Sharpening JPEG Compression Compression Ratio Akiyo (frame 100) Wm10 4,9:1 Wm50 4,2:1 Wm100 4,8:1 Carphone (frame 50) Wm ,4:1 Wm50 1 4,4:1 Wm100 4,4:1 Foreman (frame 100) Wm10 3,8:1 Wm50 3,8:1 Wm100 3,8:1 Sailboat Wm100 10,3:1 Brandyrose Wm100 24,5:1 Opera Wm100 17,2:1 Lochness Wm100 22,8:1 Papermachine Wm ,1:1 1: Only the last bit was lost 2: Two bits from the last 8 were lost 6. Discussion and Conclusions The main advantage of this method is that the DCT (forward or inverse), is applied to the whole image; thus the changes are spread throughout the whole image and they become almost undetectable. On the other hand, when the image is not an exact power of 2, a minor problem arises. If we use a large quantity for D (e.g. 100) in order to produce a robust watermark, when the inverse DCT is applied, the perimeter of the block that the DCT (forward and inverse) had been applied to, becomes apparent. TECHNICAL REPORT No. TR2000/10/01 9

10 The D value has to balance between the robustness of the watermark and the distortion of the image s quality. Large D values produce more robust watermarks but also deteriorate the image significantly. Small D values produce hardly noticeable distortions but are more fragile to most attacks. This is the necessary trade off between the image s quality and the watermark s robustness. Using small values of D (eg. D=10), the results show that the watermark did not make it through difficult tests-attacks such as the Gaussian Blurring and the addition of Uniform Noise. Table 1 shows, that some problems with Blurring, arose even for values of D=50 (for the image Carphone). Without a doubt, this is a strong attack, which distorts the image s quality a great deal. But practically, this image is of no longer use. This is clearly shown in the example images (Fig 8). (a) (b) Figure 8: (a) Original Image (b) Image with Gaussian Blur The fact that all images passed very easily the tests of Sharpening and JPEG Compression is very impressing and promising. It is also noticeable that the problems occur mainly for the video frames which are very small in size. Larger still images easily passed most of the tests (except of papermachine for gaussian blurring). That leads to the conclusion that the size of the image is important to the scheme. Of course larger values of D can be used in larger images since the distortion is spread in a wider area (so its not easily noticed) and so the method proves more robust there. The distortion for D=100 is less noticeable in a 512x512 image compared to a 176x144 video frame. That was the reason that the larger images were tested only for D=100. Another interesting fact is that the only still image where we encountered a problem was papermachine, a very special image, characterised by large homogeneous regions. This is also partly true for most of the video frames used. The compression ratios (CR) for the JPEG compression test, given in Table 1, are the maximum possible that Adobe Photoshop could produce. TECHNICAL REPORT No. TR2000/10/01 10

11 7. To probe further The main problem of this method concerns the dimensions of the bock to be transformed. If the dimensions are an exact power of 2 there is no problem. For all the other cases, a possible solution could be a clever algorithm. Depending on the image s dimensions, an adjusting could be made by adding or perhaps rejecting rows and columns. This could also appear helpful to possible attacks such as Resizing and Cropping. The whole issue is still under consideration. The method hasn t yet been tested against geometrical attacks such as Rotation or Shearing and others. A Print-Scan-Detect test would also be interesting. Also, the possibility of inserting multiple watermarks should be checked. References [1] J. Brassil et al. Document marking and identification using both lines and word shifting, Proc. Infocom95, IEEE CS Press, Los Alamitos, California, USA, [2] R. Barnett. Digital watermarking: applications, techniques and challenges, Electronics & Communication Engineering Journal, August 1999 [3] M. Kutter, F. A. P. Petitcolas. A fair benchmark for image watermarking systems, Electronic Imaging 99. Security and Watermarking of Multimedia contents, vol. 3657, Sans Jose, CA, USA, January [4] R. G. Van Schyndel, A. Z. Tirkel, C. F. Osborne. A digital watermark, Proc. IEEE International Conference on Image Processing, volume II, pp 86-90, Austin, Texas, [5] F. Hartung, B. Girod. Watermarking of uncompressed and compressed video, Signal Processing, 66(3): pp , May [6] W. Bender, D. Gruhl, N. Morimoto. Techniques for data hiding, In Proceedings of SPIE, volume 2420, p.40, February [7] I. Cox, J Kilian, T. Leighton, T. Shamoon. Secure spread spectrum watermarking for multimedia, Technical Report 95-10, NEC Research Institute, Princeton, NJ, USA, [8] M. Barni, F. Bartolini, V. Cappellini, A. Piva. A DCT-domain system for robust image watermarking, Signal Processing, 66(3): pp , May [9] J. K. O Ruanaid, T. Pun. Rotation, scale and translation invariant spread spectrum digital image watermarking, Signal Processing, 66(3): pp , May [10] D. Kundur, D. Hatzinakos. A robust digital image watermarking method using wavelet-based fusion, International Conference on Image Processing, pp , Santa Barbara, California, USA, October [11] D. Kundur, D. Hatzinakos. Digital watermarking using multiresolution wavelet decomposition, International Conference on Acoustic, Speech and Signal Processing (ICASP), volume 5, pp , Seattle, WA, USA, May TECHNICAL REPORT No. TR2000/10/01 11

A Secure File Transfer based on Discrete Wavelet Transformation and Audio Watermarking Techniques

A Secure File Transfer based on Discrete Wavelet Transformation and Audio Watermarking Techniques A Secure File Transfer based on Discrete Wavelet Transformation and Audio Watermarking Techniques Vineela Behara,Y Ramesh Department of Computer Science and Engineering Aditya institute of Technology and

More information

Image Authentication Scheme using Digital Signature and Digital Watermarking

Image Authentication Scheme using Digital Signature and Digital Watermarking www..org 59 Image Authentication Scheme using Digital Signature and Digital Watermarking Seyed Mohammad Mousavi Industrial Management Institute, Tehran, Iran Abstract Usual digital signature schemes for

More information

Watermarking Techniques for Protecting Intellectual Properties in a Digital Environment

Watermarking Techniques for Protecting Intellectual Properties in a Digital Environment Watermarking Techniques for Protecting Intellectual Properties in a Digital Environment Isinkaye F. O*. and Aroge T. K. Department of Computer Science and Information Technology University of Science and

More information

Multimedia Document Authentication using On-line Signatures as Watermarks

Multimedia Document Authentication using On-line Signatures as Watermarks Multimedia Document Authentication using On-line Signatures as Watermarks Anoop M Namboodiri and Anil K Jain Department of Computer Science and Engineering Michigan State University East Lansing, MI 48824

More information

A Digital Audio Watermark Embedding Algorithm

A Digital Audio Watermark Embedding Algorithm Xianghong Tang, Yamei Niu, Hengli Yue, Zhongke Yin Xianghong Tang, Yamei Niu, Hengli Yue, Zhongke Yin School of Communication Engineering, Hangzhou Dianzi University, Hangzhou, Zhejiang, 3008, China tangxh@hziee.edu.cn,

More information

Security and protection of digital images by using watermarking methods

Security and protection of digital images by using watermarking methods Security and protection of digital images by using watermarking methods Andreja Samčović Faculty of Transport and Traffic Engineering University of Belgrade, Serbia Gjovik, june 2014. Digital watermarking

More information

Volume 2, Issue 12, December 2014 International Journal of Advance Research in Computer Science and Management Studies

Volume 2, Issue 12, December 2014 International Journal of Advance Research in Computer Science and Management Studies Volume 2, Issue 12, December 2014 International Journal of Advance Research in Computer Science and Management Studies Research Article / Survey Paper / Case Study Available online at: www.ijarcsms.com

More information

WATERMARKING FOR IMAGE AUTHENTICATION

WATERMARKING FOR IMAGE AUTHENTICATION WATERMARKING FOR IMAGE AUTHENTICATION Min Wu Bede Liu Department of Electrical Engineering Princeton University, Princeton, NJ 08544, USA Fax: +1-609-258-3745 {minwu, liu}@ee.princeton.edu ABSTRACT A data

More information

Dynamic Binary Location based Multi-watermark Embedding Algorithm in DWT

Dynamic Binary Location based Multi-watermark Embedding Algorithm in DWT Dynamic Binary Location based Multi-watermark Embedding Algorithm in DWT Ammar Jameel Hussein, Seda Yuksel, and Ersin Elbasi Abstract In order to achieve a good imperceptibility and robustness, using 4-level

More information

Keywords Android, Copyright Protection, Discrete Cosine Transform (DCT), Digital Watermarking, Discrete Wavelet Transform (DWT), YCbCr.

Keywords Android, Copyright Protection, Discrete Cosine Transform (DCT), Digital Watermarking, Discrete Wavelet Transform (DWT), YCbCr. Volume 3, Issue 7, July 2013 ISSN: 2277 128X International Journal of Advanced Research in Computer Science and Software Engineering Research Paper Available online at: www.ijarcsse.com Web Based Novel

More information

CHAPTER 7 CONCLUSION AND FUTURE WORK

CHAPTER 7 CONCLUSION AND FUTURE WORK 158 CHAPTER 7 CONCLUSION AND FUTURE WORK The aim of this thesis was to present robust watermarking techniques for medical image. Section 7.1, consolidates the contributions made by the researcher and Section

More information

Using fractal compression scheme to embed a digital signature into an image

Using fractal compression scheme to embed a digital signature into an image Using fractal compression scheme to embed a digital signature into an image Joan Puate, Fred Jordan Swiss federal institute of technology Signal Processing Laboratory CH-1015 Lausanne Switzerland Email:

More information

Security Based Data Transfer and Privacy Storage through Watermark Detection

Security Based Data Transfer and Privacy Storage through Watermark Detection Security Based Data Transfer and Privacy Storage through Watermark Detection Gowtham.T 1 Pradeep Kumar.G 2 1PG Scholar, Applied Electronics, Nandha Engineering College, Anna University, Erode, India. 2Assistant

More information

A Robust and Lossless Information Embedding in Image Based on DCT and Scrambling Algorithms

A Robust and Lossless Information Embedding in Image Based on DCT and Scrambling Algorithms A Robust and Lossless Information Embedding in Image Based on DCT and Scrambling Algorithms Dr. Mohammad V. Malakooti Faculty and Head of Department of Computer Engineering, Islamic Azad University, UAE

More information

ROI Based Medical Image Watermarking with Zero Distortion and Enhanced Security

ROI Based Medical Image Watermarking with Zero Distortion and Enhanced Security I.J. Modern Education and Computer Science, 2014, 10, 40-48 Published Online October 2014 in MECS (http://www.mecs-press.org/) DOI: 10.5815/ijmecs.2014.10.06 ROI Based Medical Image Watermarking with Zero

More information

Multi-factor Authentication in Banking Sector

Multi-factor Authentication in Banking Sector Multi-factor Authentication in Banking Sector Tushar Bhivgade, Mithilesh Bhusari, Ajay Kuthe, Bhavna Jiddewar,Prof. Pooja Dubey Department of Computer Science & Engineering, Rajiv Gandhi College of Engineering

More information

Video Authentication for H.264/AVC using Digital Signature Standard and Secure Hash Algorithm

Video Authentication for H.264/AVC using Digital Signature Standard and Secure Hash Algorithm Video Authentication for H.264/AVC using Digital Signature Standard and Secure Hash Algorithm Nandakishore Ramaswamy Qualcomm Inc 5775 Morehouse Dr, Sam Diego, CA 92122. USA nandakishore@qualcomm.com K.

More information

SECURE DATA TRANSMISSION USING DIGITAL IMAGE WATERMARKING

SECURE DATA TRANSMISSION USING DIGITAL IMAGE WATERMARKING SECURE DATA TRANSMISSION USING DIGITAL IMAGE WATERMARKING 1 Maulik Srivastava, 2 Anuradha Sharma 1,2 Department of Computer Science & Engineering, Amity University, Uttar Pradesh Abstract: As we all know

More information

SOFTWARE AND HARDWARE-IN-THE-LOOP MODELING OF AN AUDIO WATERMARKING ALGORITHM. Ismael Zárate Orozco, B.E. Thesis Prepared for the Degree of

SOFTWARE AND HARDWARE-IN-THE-LOOP MODELING OF AN AUDIO WATERMARKING ALGORITHM. Ismael Zárate Orozco, B.E. Thesis Prepared for the Degree of SOFTWARE AND HARDWARE-IN-THE-LOOP MODELING OF AN AUDIO WATERMARKING ALGORITHM Ismael Zárate Orozco, B.E. Thesis Prepared for the Degree of MASTER OF SCIENCE UNIVERSITY OF NORTH TEXAS December 2010 APPROVED:

More information

Study and Implementation of Video Compression Standards (H.264/AVC and Dirac)

Study and Implementation of Video Compression Standards (H.264/AVC and Dirac) Project Proposal Study and Implementation of Video Compression Standards (H.264/AVC and Dirac) Sumedha Phatak-1000731131- sumedha.phatak@mavs.uta.edu Objective: A study, implementation and comparison of

More information

Image Compression through DCT and Huffman Coding Technique

Image Compression through DCT and Huffman Coding Technique International Journal of Current Engineering and Technology E-ISSN 2277 4106, P-ISSN 2347 5161 2015 INPRESSCO, All Rights Reserved Available at http://inpressco.com/category/ijcet Research Article Rahul

More information

Hybrid DCT-DWT Watermarking and IDEA Encryption of Internet Contents

Hybrid DCT-DWT Watermarking and IDEA Encryption of Internet Contents IJCSI International Journal of Computer Science Issues, Vol. 9, Issue 1, o, January 01 www.ijcsi.org 394 Hybrid Watermarking and IDEA Encryption of Internet Contents M.A. Mohamed and A.M. El-Mohandes Electronics

More information

An Incomplete Cryptography based Digital Rights Management with DCFF

An Incomplete Cryptography based Digital Rights Management with DCFF An Incomplete Cryptography based Digital Rights Management with DCFF Ta Minh Thanh Department of Computer Science Tokyo Institute of Technology 2-12-2, Ookayama, Meguro, Tokyo, 152-8552, Japan. Email:thanhtm@ks.cs.titech.ac.jp

More information

A comprehensive survey on various ETC techniques for secure Data transmission

A comprehensive survey on various ETC techniques for secure Data transmission A comprehensive survey on various ETC techniques for secure Data transmission Shaikh Nasreen 1, Prof. Suchita Wankhade 2 1, 2 Department of Computer Engineering 1, 2 Trinity College of Engineering and

More information

Introduction to Medical Image Compression Using Wavelet Transform

Introduction to Medical Image Compression Using Wavelet Transform National Taiwan University Graduate Institute of Communication Engineering Time Frequency Analysis and Wavelet Transform Term Paper Introduction to Medical Image Compression Using Wavelet Transform 李 自

More information

Generating Robust Digital Signature for Image/Video Authentication

Generating Robust Digital Signature for Image/Video Authentication Generating Robust Digital Signature for Image/Video Authentication Ching-Yung Lin and Shih-Fu Chang Department of Electrical Engineering and New Media Technology Center Columbia University New York, NY

More information

JPEG Image Compression by Using DCT

JPEG Image Compression by Using DCT International Journal of Computer Sciences and Engineering Open Access Research Paper Volume-4, Issue-4 E-ISSN: 2347-2693 JPEG Image Compression by Using DCT Sarika P. Bagal 1* and Vishal B. Raskar 2 1*

More information

2695 P a g e. IV Semester M.Tech (DCN) SJCIT Chickballapur Karnataka India

2695 P a g e. IV Semester M.Tech (DCN) SJCIT Chickballapur Karnataka India Integrity Preservation and Privacy Protection for Digital Medical Images M.Krishna Rani Dr.S.Bhargavi IV Semester M.Tech (DCN) SJCIT Chickballapur Karnataka India Abstract- In medical treatments, the integrity

More information

Reversible Data Hiding for Security Applications

Reversible Data Hiding for Security Applications Reversible Data Hiding for Security Applications Baig Firdous Sulthana, M.Tech Student (DECS), Gudlavalleru engineering college, Gudlavalleru, Krishna (District), Andhra Pradesh (state), PIN-521356 S.

More information

AUTHORIZED WATERMARKING AND ENCRYPTION SYSTEM BASED ON WAVELET TRANSFORM FOR TELERADIOLOGY SECURITY ISSUES

AUTHORIZED WATERMARKING AND ENCRYPTION SYSTEM BASED ON WAVELET TRANSFORM FOR TELERADIOLOGY SECURITY ISSUES AUTHORIZED WATERMARKING AND ENCRYPTION SYSTEM BASED ON WAVELET TRANSFORM FOR TELERADIOLOGY SECURITY ISSUES S.NANDHINI PG SCHOLAR NandhaEngg. College Erode, Tamilnadu, India. Dr.S.KAVITHA M.E.,Ph.d PROFESSOR

More information

Robust Blind Watermarking Mechanism For Point Sampled Geometry

Robust Blind Watermarking Mechanism For Point Sampled Geometry Robust Blind Watermarking Mechanism For Point Sampled Geometry Parag Agarwal Balakrishnan Prabhakaran Department of Computer Science, University of Texas at Dallas MS EC 31, PO Box 830688, Richardson,

More information

Technical aspects of Digital Rights Management

Technical aspects of Digital Rights Management Technical aspects of Digital Rights Management Emilija Arsenova MI, RWTH-Aachen Table of content 1 Introduction... 3 2 Digital Rights Management (DRM)... 3 2.1 DRM Architecture...4 2.2 DRM Techniques...5

More information

AN ENHANCED MECHANISM FOR SECURE DATA TRANSMISSION USING STEGANOGRAPHY MERGED WITH VISUAL CRYPTOGRAPHY

AN ENHANCED MECHANISM FOR SECURE DATA TRANSMISSION USING STEGANOGRAPHY MERGED WITH VISUAL CRYPTOGRAPHY AN ENHANCED MECHANISM FOR SECURE DATA TRANSMISSION USING STEGANOGRAPHY MERGED WITH VISUAL CRYPTOGRAPHY Chandan Mohapatra 1, Manajusha Pandey 2 1 PG Student in Computer Science Dept., KIIT University, Bhubaneswar,

More information

HSI BASED COLOUR IMAGE EQUALIZATION USING ITERATIVE n th ROOT AND n th POWER

HSI BASED COLOUR IMAGE EQUALIZATION USING ITERATIVE n th ROOT AND n th POWER HSI BASED COLOUR IMAGE EQUALIZATION USING ITERATIVE n th ROOT AND n th POWER Gholamreza Anbarjafari icv Group, IMS Lab, Institute of Technology, University of Tartu, Tartu 50411, Estonia sjafari@ut.ee

More information

Conceptual Framework Strategies for Image Compression: A Review

Conceptual Framework Strategies for Image Compression: A Review International Journal of Computer Sciences and Engineering Open Access Review Paper Volume-4, Special Issue-1 E-ISSN: 2347-2693 Conceptual Framework Strategies for Image Compression: A Review Sumanta Lal

More information

Combating Anti-forensics of Jpeg Compression

Combating Anti-forensics of Jpeg Compression IJCSI International Journal of Computer Science Issues, Vol. 9, Issue 6, No 3, November 212 ISSN (Online): 1694-814 www.ijcsi.org 454 Combating Anti-forensics of Jpeg Compression Zhenxing Qian 1, Xinpeng

More information

International Journal of Computer Sciences and Engineering Open Access. A novel technique to hide information using Daubechies Transformation

International Journal of Computer Sciences and Engineering Open Access. A novel technique to hide information using Daubechies Transformation International Journal of Computer Sciences and Engineering Open Access Research Paper Volume-4, Special Issue-1 E-ISSN: 2347-2693 A novel technique to hide information using Daubechies Transformation Jyotsna

More information

AN OVERVIEW OF IMAGE STEGANOGRAPHY

AN OVERVIEW OF IMAGE STEGANOGRAPHY AN OVERVIEW OF IMAGE STEGANOGRAPHY T. Morkel 1, J.H.P. Eloff 2, M.S. Olivier 3 Information and Computer Security Architecture (ICSA) Research Group Department of Computer Science University of Pretoria,

More information

The Scientific Data Mining Process

The Scientific Data Mining Process Chapter 4 The Scientific Data Mining Process When I use a word, Humpty Dumpty said, in rather a scornful tone, it means just what I choose it to mean neither more nor less. Lewis Carroll [87, p. 214] In

More information

INTERNATIONAL JOURNAL OF APPLIED ENGINEERING RESEARCH, DINDIGUL Volume 1, No 3, 2010

INTERNATIONAL JOURNAL OF APPLIED ENGINEERING RESEARCH, DINDIGUL Volume 1, No 3, 2010 Lossless Medical Image Security Shrikhande Rohini 1, Vinayak Bairagi 2 1 Researcher, Electronics & Telecommunication Department, Sinhgad Academy Of Engg. 2 Assistant Professor, Electronics & Telecommunication

More information

Watermark Design Pattern for Intellectual Property Protection in Electronic Commerce Applications

Watermark Design Pattern for Intellectual Property Protection in Electronic Commerce Applications Design Pattern for Intellectual Property Protection in Electronic Commerce Applications S.H. Kwok Department of Information and Systems Management The Hong Kong University of Science and Technology Clear

More information

PIXEL-LEVEL IMAGE FUSION USING BROVEY TRANSFORME AND WAVELET TRANSFORM

PIXEL-LEVEL IMAGE FUSION USING BROVEY TRANSFORME AND WAVELET TRANSFORM PIXEL-LEVEL IMAGE FUSION USING BROVEY TRANSFORME AND WAVELET TRANSFORM Rohan Ashok Mandhare 1, Pragati Upadhyay 2,Sudha Gupta 3 ME Student, K.J.SOMIYA College of Engineering, Vidyavihar, Mumbai, Maharashtra,

More information

Real-Time Audio Watermarking Based on Characteristics of PCM in Digital Instrument

Real-Time Audio Watermarking Based on Characteristics of PCM in Digital Instrument Journal of Information Hiding and Multimedia Signal Processing 21 ISSN 273-4212 Ubiquitous International Volume 1, Number 2, April 21 Real-Time Audio Watermarking Based on Characteristics of PCM in Digital

More information

INTELLECTUAL PROPERTY PROTECTION FOR ELECTRONIC COMMERCE APPLICATIONS

INTELLECTUAL PROPERTY PROTECTION FOR ELECTRONIC COMMERCE APPLICATIONS INTELLECTUAL PROPERTY PROTECTION FOR ELECTRONIC COMMERCE APPLICATIONS S.H. Kwok Department of Information and Systems Management The Hong Kong University of Science and Technology jkwok@ust.hk C.C. Yang

More information

Invisible Image Water Marking Using Hybrid DWT Compression/Decompression Technique

Invisible Image Water Marking Using Hybrid DWT Compression/Decompression Technique Invisible Image Water Marking Using Hybrid DWT Compression/Decompression Technique B.Sai Kiran M.Tech (VLSI), CMR Institute of Technology. Mr.Shahbaz Khan Associate Professor, CMR Institute of Technology.

More information

Digimarc for Images. Best Practices Guide (Chroma + Classic Edition)

Digimarc for Images. Best Practices Guide (Chroma + Classic Edition) Digimarc for Images Best Practices Guide (Chroma + Classic Edition) Best Practices Guide (Chroma + Classic Edition) Why should you digitally watermark your images? 3 What types of images can be digitally

More information

Experimental DRM Architecture Using Watermarking and PKI

Experimental DRM Architecture Using Watermarking and PKI Experimental DRM Architecture Using Watermarking and PKI Mikko Löytynoja, Tapio Seppänen, Nedeljko Cvejic MediaTeam Oulu Information Processing Laboratory University of Oulu, Finland {mikko.loytynoja,

More information

A Lightweight Rao-Cauchy Detector for Additive Watermarking in the DWT-Domain

A Lightweight Rao-Cauchy Detector for Additive Watermarking in the DWT-Domain A Lightweight Rao-Cauchy Detector for Additive Watermarking in the DWT-Domain Roland Kwitt, Peter Meerwald, Andreas Uhl Dept. of Computer Sciences, University of Salzburg, Austria E-Mail: {rkwitt, pmeerw,

More information

Study and Implementation of Video Compression standards (H.264/AVC, Dirac)

Study and Implementation of Video Compression standards (H.264/AVC, Dirac) Study and Implementation of Video Compression standards (H.264/AVC, Dirac) EE 5359-Multimedia Processing- Spring 2012 Dr. K.R Rao By: Sumedha Phatak(1000731131) Objective A study, implementation and comparison

More information

PRN BASED WATERMARKING SCHEME FOR COLOR IMAGES

PRN BASED WATERMARKING SCHEME FOR COLOR IMAGES İstanbul Ticaret Üniversitesi Fen Bilimleri Dergisi Yıl: 5 Sayı:10 Güz 2006/2 s.119-131 PRN BASED WATERMARKING SCHEME FOR COLOR IMAGES Ersin ELBAŞI *, Ahmet M. ESKİCİOĞLU ** ABSTRACT Robust image watermarking

More information

Bandwidth Adaptation for MPEG-4 Video Streaming over the Internet

Bandwidth Adaptation for MPEG-4 Video Streaming over the Internet DICTA2002: Digital Image Computing Techniques and Applications, 21--22 January 2002, Melbourne, Australia Bandwidth Adaptation for MPEG-4 Video Streaming over the Internet K. Ramkishor James. P. Mammen

More information

International Journal of Advanced Computer Technology (IJACT) ISSN:2319-7900 Least Significant Bit algorithm for image steganography

International Journal of Advanced Computer Technology (IJACT) ISSN:2319-7900 Least Significant Bit algorithm for image steganography Champakamala.B.S, Padmini.K, Radhika.D. K Asst Professors, Department of TCE, Don Bosco Institute of Technology,Bangalore, India Abstract Steganography is one of the most powerful techniques to conceal

More information

Multiple Embedding Using Robust Watermarks for Wireless Medical Images

Multiple Embedding Using Robust Watermarks for Wireless Medical Images Multiple Embedding Using Robust Watermarks for Wireless Medical Images Dominic Osborne and Derek Abbott Centre for Biomedical Engineering (CBME) The University of Adelaide, SA 5005, Australia Matthew Sorell

More information

ROBUST AND SECURE DIGITAL SIGNATURE FOR IMAGE AUTHENTICATION OVER WIRELESS CHANNELS

ROBUST AND SECURE DIGITAL SIGNATURE FOR IMAGE AUTHENTICATION OVER WIRELESS CHANNELS ROBUST AND SECURE DIGITAL SIGNATURE FOR IMAGE AUTHENTICATION OVER WIRELESS CHANNELS J Sravanthi #1, Dr. MHM Krishna Prasad *2 # Dept. of Computer Science, UCEV Vizianagaram, Andhra Pradesh, India * Associate

More information

Automated Image Forgery Detection through Classification of JPEG Ghosts

Automated Image Forgery Detection through Classification of JPEG Ghosts Automated Image Forgery Detection through Classification of JPEG Ghosts Fabian Zach, Christian Riess and Elli Angelopoulou Pattern Recognition Lab University of Erlangen-Nuremberg {riess,elli}@i5.cs.fau.de

More information

THE PURPOSE of a digital watermark is to embed auxiliary

THE PURPOSE of a digital watermark is to embed auxiliary IEEE TRANSACTIONS ON MULTIMEDIA, VOL. 7, NO. 1, FEBRUARY 2005 43 Statistical Invisibility for Collusion-Resistant Digital Video Watermarking Karen Su, Student Member, IEEE, Deepa Kundur, Senior Member,

More information

Friendly Medical Image Sharing Scheme

Friendly Medical Image Sharing Scheme Journal of Information Hiding and Multimedia Signal Processing 2014 ISSN 2073-4212 Ubiquitous International Volume 5, Number 3, July 2014 Frily Medical Image Sharing Scheme Hao-Kuan Tso Department of Computer

More information

International Journal of Emerging Technology and Advanced Engineering Website: www.ijetae.com (ISSN 2250-2459, Volume 2, Issue 9, September 2012)

International Journal of Emerging Technology and Advanced Engineering Website: www.ijetae.com (ISSN 2250-2459, Volume 2, Issue 9, September 2012) Authentication of Medical Images using Integer Transforms A.Kannammal 1, Dr.S.Subha Rani 2 1 Assistant professor, 2 Professor and Head, ECE Department, PSG College of Technology, Peelamedu, Coimbatore

More information

Video Authentication- An Overview

Video Authentication- An Overview Video Authentication- An Overview Saurabh Upadhyay *, Sanjay Kumar Singh *Associate Professor, SIT, Gujarat s4upadhyay@gmail.com Associate Professor, IT BHU, Varanasi sks.cse@itbhu.ac.in ABSTRACT With

More information

JPEG compression of monochrome 2D-barcode images using DCT coefficient distributions

JPEG compression of monochrome 2D-barcode images using DCT coefficient distributions Edith Cowan University Research Online ECU Publications Pre. JPEG compression of monochrome D-barcode images using DCT coefficient distributions Keng Teong Tan Hong Kong Baptist University Douglas Chai

More information

CHAPTER 2 LITERATURE REVIEW

CHAPTER 2 LITERATURE REVIEW 11 CHAPTER 2 LITERATURE REVIEW 2.1 INTRODUCTION Image compression is mainly used to reduce storage space, transmission time and bandwidth requirements. In the subsequent sections of this chapter, general

More information

Motion JPEG Video Authentication based on Quantization Matrix Watermarking: Application in Robotics

Motion JPEG Video Authentication based on Quantization Matrix Watermarking: Application in Robotics Motion JPEG Video Authentication based on Quantization Matrix Watermarking: Application in Robotics Lamri Laouamer Lab-STICC,European University of Brittany Al Qassim University Buraydah,15452,KSA Abdelhamid

More information

Tracking Moving Objects In Video Sequences Yiwei Wang, Robert E. Van Dyck, and John F. Doherty Department of Electrical Engineering The Pennsylvania State University University Park, PA16802 Abstract{Object

More information

An Experimental Study of the Performance of Histogram Equalization for Image Enhancement

An Experimental Study of the Performance of Histogram Equalization for Image Enhancement International Journal of Computer Sciences and Engineering Open Access Research Paper Volume-4, Special Issue-2, April 216 E-ISSN: 2347-2693 An Experimental Study of the Performance of Histogram Equalization

More information

Modeling the Print-Scan Process for Resilient Data Hiding

Modeling the Print-Scan Process for Resilient Data Hiding Modeling the Print-Scan Process for Resilient Data Hiding Kaushal Solanki, Upamanyu Madhow, Banglore S. Manjunath, and Shiv Chandrasekaran Department of Electrical and Computer Engineering University of

More information

STEGANOGRAPHY: TEXT FILE HIDING IN IMAGE YAW CHOON KIT CA10022

STEGANOGRAPHY: TEXT FILE HIDING IN IMAGE YAW CHOON KIT CA10022 STEGANOGRAPHY: TEXT FILE HIDING IN IMAGE YAW CHOON KIT CA10022 FACULTY OF COMPUTER SYSTEM AND SOFTWARE ENGINEERING 2012/2013 1 ABSTRACT Steganography is the art or science in hiding. It is origin from

More information

A Survey of Error Resilient Coding Schemes for Image/Video Transmission Based on Data Embedding

A Survey of Error Resilient Coding Schemes for Image/Video Transmission Based on Data Embedding A Survey of Error Resilient Coding Schemes for Image/Video Transmission Based on Data Embedding Li-Wei Kang*( 康 立 威 ) and Jin-Jang Leou # ( 柳 金 章 ) *Institute of Information Science Academia Sinica, Taipei

More information

Audio synthesis: MIDI Digital Audio Coding/Compression. Today: Intellectual property management for digital media. What is Digital Watermarking?

Audio synthesis: MIDI Digital Audio Coding/Compression. Today: Intellectual property management for digital media. What is Digital Watermarking? ENEE408G Lecture-9 Last Lecture Digital Watermarking and Fingerprinting for Digital Rights Protection of Multimedia URL: http://www.ece.umd.edu/class/enee408g/ Slides included here are based on Spring

More information

Enhancing Data Security in Medical Information System Using the Watermarking Techniques and Oracle SecureFile LOBs

Enhancing Data Security in Medical Information System Using the Watermarking Techniques and Oracle SecureFile LOBs Enhancing Data Security in Medical Information System Using the Watermarking Techniques and Oracle SecureFile LOBs Said Aminzou 1, Brahim ER-RAHA 2, Youness Idrissi Khamlichi 3, Mustapha Machkour 4, Karim

More information

A Secure Data Transmission By Integrating Cryptography And Video Steganography

A Secure Data Transmission By Integrating Cryptography And Video Steganography A Secure Data Transmission By Integrating Cryptography And Video Steganography Shafna P K Computer Science Department KMEA Engineering College Ernakulam, India shabanapk9999@gmail.com Abstract Advances

More information

ROBUST CONTENT-BASED VIDEO WATERMARKING EXPLOITING MOTION ENTROPY MASKING EFFECT

ROBUST CONTENT-BASED VIDEO WATERMARKING EXPLOITING MOTION ENTROPY MASKING EFFECT ROBUST CONTENT-BASED VIDEO WATERMARKING EXPLOITING MOTION ENTROPY MASKING EFFECT Amir Houmansadr, Hamed Pirsiaash Department of electrical engineering, Sharif Uniersity of Technology, Azadi Ae., Tehran,

More information

MEDICAL IMAGE COMPRESSION USING HYBRID CODER WITH FUZZY EDGE DETECTION

MEDICAL IMAGE COMPRESSION USING HYBRID CODER WITH FUZZY EDGE DETECTION MEDICAL IMAGE COMPRESSION USING HYBRID CODER WITH FUZZY EDGE DETECTION K. Vidhya 1 and S. Shenbagadevi Department of Electrical & Communication Engineering, College of Engineering, Anna University, Chennai,

More information

Multimodal Biometric Recognition Security System

Multimodal Biometric Recognition Security System Multimodal Biometric Recognition Security System Anju.M.I, G.Sheeba, G.Sivakami, Monica.J, Savithri.M Department of ECE, New Prince Shri Bhavani College of Engg. & Tech., Chennai, India ABSTRACT: Security

More information

International Archives of the Photogrammetry, Remote Sensing and Spatial Information Sciences, Vol. XXXIV-5/W10

International Archives of the Photogrammetry, Remote Sensing and Spatial Information Sciences, Vol. XXXIV-5/W10 Accurate 3D information extraction from large-scale data compressed image and the study of the optimum stereo imaging method Riichi NAGURA *, * Kanagawa Institute of Technology nagura@ele.kanagawa-it.ac.jp

More information

Digital Image Integrity

Digital Image Integrity WHITEPAPER Digital Image Integrity TABLE OF CONTENTS 1 Viability of digital images 2 Best practices 2 Archive image 3 Audit trail 4 Repeatability of image adjustments 5 History of tools to address issues

More information

Comparison of different image compression formats. ECE 533 Project Report Paula Aguilera

Comparison of different image compression formats. ECE 533 Project Report Paula Aguilera Comparison of different image compression formats ECE 533 Project Report Paula Aguilera Introduction: Images are very important documents nowadays; to work with them in some applications they need to be

More information

In mathematics, there are four attainment targets: using and applying mathematics; number and algebra; shape, space and measures, and handling data.

In mathematics, there are four attainment targets: using and applying mathematics; number and algebra; shape, space and measures, and handling data. MATHEMATICS: THE LEVEL DESCRIPTIONS In mathematics, there are four attainment targets: using and applying mathematics; number and algebra; shape, space and measures, and handling data. Attainment target

More information

From Concept to Production in Secure Voice Communications

From Concept to Production in Secure Voice Communications From Concept to Production in Secure Voice Communications Earl E. Swartzlander, Jr. Electrical and Computer Engineering Department University of Texas at Austin Austin, TX 78712 Abstract In the 1970s secure

More information

Data Mining for Manufacturing: Preventive Maintenance, Failure Prediction, Quality Control

Data Mining for Manufacturing: Preventive Maintenance, Failure Prediction, Quality Control Data Mining for Manufacturing: Preventive Maintenance, Failure Prediction, Quality Control Andre BERGMANN Salzgitter Mannesmann Forschung GmbH; Duisburg, Germany Phone: +49 203 9993154, Fax: +49 203 9993234;

More information

Evaluating the Feasibility of Digital Watermarking To Enforce Music Copyright

Evaluating the Feasibility of Digital Watermarking To Enforce Music Copyright Evaluating the Feasibility of Digital Watermarking To Enforce Music Copyright CS 588: Final Project Rob Farraher Ken Pickering Lim Vu Date Due: 12/04/01 Introduction With the tremendous increase in the

More information

ECE 533 Project Report Ashish Dhawan Aditi R. Ganesan

ECE 533 Project Report Ashish Dhawan Aditi R. Ganesan Handwritten Signature Verification ECE 533 Project Report by Ashish Dhawan Aditi R. Ganesan Contents 1. Abstract 3. 2. Introduction 4. 3. Approach 6. 4. Pre-processing 8. 5. Feature Extraction 9. 6. Verification

More information

Region of Interest Access with Three-Dimensional SBHP Algorithm CIPR Technical Report TR-2006-1

Region of Interest Access with Three-Dimensional SBHP Algorithm CIPR Technical Report TR-2006-1 Region of Interest Access with Three-Dimensional SBHP Algorithm CIPR Technical Report TR-2006-1 Ying Liu and William A. Pearlman January 2006 Center for Image Processing Research Rensselaer Polytechnic

More information

Classification of Fingerprints. Sarat C. Dass Department of Statistics & Probability

Classification of Fingerprints. Sarat C. Dass Department of Statistics & Probability Classification of Fingerprints Sarat C. Dass Department of Statistics & Probability Fingerprint Classification Fingerprint classification is a coarse level partitioning of a fingerprint database into smaller

More information

Video compression: Performance of available codec software

Video compression: Performance of available codec software Video compression: Performance of available codec software Introduction. Digital Video A digital video is a collection of images presented sequentially to produce the effect of continuous motion. It takes

More information

INTERNATIONAL JOURNAL FOR ENGINEERING APPLICATIONS AND TECHNOLOGY. Implementation of Multi-Factor Authentication Scheme

INTERNATIONAL JOURNAL FOR ENGINEERING APPLICATIONS AND TECHNOLOGY. Implementation of Multi-Factor Authentication Scheme IJFEAT INTERNATIONAL JOURNAL FOR ENGINEERING APPLICATIONS AND TECHNOLOGY Implementation of Multi-Factor Authentication Scheme Vasundhara Bhele Prof. Nilesh Chaubey Prof. Shyam Dubey Computer Science &

More information

Transform-domain Wyner-Ziv Codec for Video

Transform-domain Wyner-Ziv Codec for Video Transform-domain Wyner-Ziv Codec for Video Anne Aaron, Shantanu Rane, Eric Setton, and Bernd Girod Information Systems Laboratory, Department of Electrical Engineering Stanford University 350 Serra Mall,

More information

A Study of Direct Sequence Spread Spectrum Technique for Data Compression Purpose

A Study of Direct Sequence Spread Spectrum Technique for Data Compression Purpose 3 ÒÃÈÖ ÉÒà ¹Ô ä àãç «Õà Çé¹Êà» Êà»ç µãñá ྠèí ÒÃãªé Ò¹ Ò éò¹ ÒúպÍÑ éíáùå Óà Ãѵ¹ì ÍÁÃÃÑ ÉÒ 1 ÁËÒÇÔ ÂÒÅÑÂà â¹âåâõ¾ãð ÍÁà ÅéÒ ¹ºØÃÕ ºÒ Á Øè ÃØ ÃØ à ¾Ï 10140 º Ñ ÂèÍ Ò¹ÇÔ Ñ¹Õéä éí ÔºÒÂ Ö ÇÔ Õ ÒÃ˹Öè «Öè

More information

Steganography And Digital Watermarking

Steganography And Digital Watermarking Steganography And Digital Watermarking Copyright 2004, Jonathan Cummins, Patrick Diskin, Samuel Lau and Robert Parlett, School of Computer Science, The University of Birmingham. Permission is granted to

More information

encoding compression encryption

encoding compression encryption encoding compression encryption ASCII utf-8 utf-16 zip mpeg jpeg AES RSA diffie-hellman Expressing characters... ASCII and Unicode, conventions of how characters are expressed in bits. ASCII (7 bits) -

More information

Secret Communication through Web Pages Using Special Space Codes in HTML Files

Secret Communication through Web Pages Using Special Space Codes in HTML Files International Journal of Applied Science and Engineering 2008. 6, 2: 141-149 Secret Communication through Web Pages Using Special Space Codes in HTML Files I-Shi Lee a, c and Wen-Hsiang Tsai a, b, * a

More information

Redundant Wavelet Transform Based Image Super Resolution

Redundant Wavelet Transform Based Image Super Resolution Redundant Wavelet Transform Based Image Super Resolution Arti Sharma, Prof. Preety D Swami Department of Electronics &Telecommunication Samrat Ashok Technological Institute Vidisha Department of Electronics

More information

DIGITAL IMAGE PROCESSING AND ANALYSIS

DIGITAL IMAGE PROCESSING AND ANALYSIS DIGITAL IMAGE PROCESSING AND ANALYSIS Human and Computer Vision Applications with CVIPtools SECOND EDITION SCOTT E UMBAUGH Uffi\ CRC Press Taylor &. Francis Group Boca Raton London New York CRC Press is

More information

A Concept of Digital Picture Envelope for Internet Communication

A Concept of Digital Picture Envelope for Internet Communication A Concept of Digital Picture Envelope for Internet Communication Eiji Kawaguchi, Koichi Nozaki, Michiharu Niimi, Hideki Noda and Richard O. Eason Kyushu Institute of Technology 1-1 Sensui-cho, Tobata,

More information

Optical Fibres. Introduction. Safety precautions. For your safety. For the safety of the apparatus

Optical Fibres. Introduction. Safety precautions. For your safety. For the safety of the apparatus Please do not remove this manual from from the lab. It is available at www.cm.ph.bham.ac.uk/y2lab Optics Introduction Optical fibres are widely used for transmitting data at high speeds. In this experiment,

More information

Lightweight Security Principles for Distributed Multimedia Based Sensor Networks

Lightweight Security Principles for Distributed Multimedia Based Sensor Networks Lightweight Security Principles for Distributed Multimedia Based Sensor Networks Deepa Kundur, Takis Zourntos and Nebu John Mathai Department of Electrical Engineering Texas A&M University 3128 TAMU, College

More information

Safer data transmission using Steganography

Safer data transmission using Steganography Safer data transmission using Steganography Arul Bharathi, B.K.Akshay, M.Priy a, K.Latha Department of Computer Science and Engineering Sri Sairam Engineering College Chennai, India Email: arul.bharathi@yahoo.com,

More information

SIGNATURE VERIFICATION

SIGNATURE VERIFICATION SIGNATURE VERIFICATION Dr. H.B.Kekre, Dr. Dhirendra Mishra, Ms. Shilpa Buddhadev, Ms. Bhagyashree Mall, Mr. Gaurav Jangid, Ms. Nikita Lakhotia Computer engineering Department, MPSTME, NMIMS University

More information

WHITE PAPER MANAGING VALUABLE IMAGE ASSETS USING DIGITAL WATERMARKING FOR COPYRIGHT COMMUNICATION AND IMAGE SEARCH INTRODUCTION

WHITE PAPER MANAGING VALUABLE IMAGE ASSETS USING DIGITAL WATERMARKING FOR COPYRIGHT COMMUNICATION AND IMAGE SEARCH INTRODUCTION www.digitalwatermarkingalliance.org WHITE PAPER MANAGING VALUABLE IMAGE ASSETS USING DIGITAL WATERMARKING FOR COPYRIGHT COMMUNICATION AND IMAGE SEARCH INTRODUCTION Consider where you encounter digital

More information

Euler Vector: A Combinatorial Signature for Gray-Tone Images

Euler Vector: A Combinatorial Signature for Gray-Tone Images Euler Vector: A Combinatorial Signature for Gray-Tone Images Arijit Bishnu, Bhargab B. Bhattacharya y, Malay K. Kundu, C. A. Murthy fbishnu t, bhargab, malay, murthyg@isical.ac.in Indian Statistical Institute,

More information