Digital Image Watermarking
|
|
- Charity Gardner
- 5 years ago
- Views:
Transcription
1 Digital Image Watermarking Yun Q. Shi Electrical and Computer Engineering New Jersey Institute of Technology 19 th November 2004 shi 1
2 Outline Introduction What is image data hiding? Fundamentals Robust Image Data Hiding JPEG compression, geometric distortion Lossless Image Data Hiding Reversibility, image authentication Steganography and Steganalysis Status, and some of current work shi 2
3 Introduction to Data Hiding A process to hide a set of data into a cover medium imperceptibly. The former set of data is referred to as hidden data (mark signal). The latter, cover media, is a second set of data. The cover media with the hidden data inside is referred to as marked media (stegomedia). shi 3
4 Embedding cover media mark data hiding marked media Extraction marked media retrieval media after data retrieval extracted data shi 4
5 Applications Copy-right protection (original driving-force application, now Hollywood movie fingerprinting) Authentication (temper detection, monitoring) Covert communications (confidentiality) Many more, including (Multi-level) secure data systems in military, medical and law enforcement fields Digital notarization On-line identity verification shi 5
6 Example: Tamper Detection (could be much more advanced) Watermarked Altered image image Altered Watermark watermark shi 6
7 Three Major Types of Data Hiding Algorithms Least Significant Bit-plane (LSB) Data are hidden into the least significant bit-plane. Vulnerable to attacks. Spread Spectrum (SS) Inspired by the idea of spread spectrum RF communication system which was invented during WWII for RF covert communication. Most robust to attack Most difficult for steganalysis Quantization Index Modulation (QIM) Use different quantization strategies to hide data. shi 7
8 Fundamental Requirements Imperceptibility for invisible watermarking Robustness for robust watermarking Common signal processing procedure In particular, JPEG compression Geometric distortions (e.g. rotation) Malicious attacks such as collusion Not required for fragile watermarking Security aspect shi 8
9 Imperceptibility Original Lena Baboon image image Watermarked image image shi 9
10 JPEG Compression Original image (8 bpp) After JPEG compression (quality factor 50 (1 bpp)) shi 10
11 Geometric Distortion It embeds more than 100 bits in the image. After geometric attack (includes rotation, scale, translation), it still can extract the information successfully. Geometrically distorted image Geometrically corrected image shi 11
12 I. Robust Image Data Hiding Various techniques developed in image processing to correct geometric distortion have been used to tackle this issue. One successful technique: Template hidden in Fourier transform to detect affine transform Training sequence in wavelet transform to detect translation Watermark in wavelet transform to achieve robustness against compression X. Kang, J. Huang, Y. Q. Shi, Y. Lin, A DWT-DFT composite watermarking scheme robust to both affine transform and JPEG compression, IEEE CSVT, August Problem still open Random small geometrical distortion shi 12
13 II. Lossless Data Hiding What is lossless data hiding? Lossless data hiding is such a kind of data hiding techniques in which the original cover media can be recovered without any distortion after hidden data extraction. (refer to figure in the next slide) Also, referred to as: distortion-free, invertible, reversible. shi 13
14 Embedding cover media mark data hiding Stego-media Extraction Stego-media retrieval media after data retrieval (=original cover media) extracted data shi 14
15 The following are two marked images by using a reversible marking method. (The American Independence Declaration contains 6,760 characters ) 7000 bytes hidden in this medical image (512x512) 2000 bytes hidden in this image (512x512) shi 15
16 Most of Existing Watermarking Schemes are not Reversible Spread spectrum method is not invertible due to truncation error (to prevent over/underflow), and round-off error. LSB scheme is not due to bit-replacement without memory. Quantization-Index-Modulation (QIM) is not due to quantization error. shi 16
17 Applications Driving application of reversible date hiding is: Authentication Can be used in some special applications, such as law enforcement and medical fields, where original cover media is required for legal reasons. Can be used in military, remote sensing and high energy physics experiments, where high accuracy is required, or data acquisition is expensive. Embedding data into cover media while keeping the media reversible opens a new door for: Linking some dada with original media. For instance: Medical data system shi 17
18 State of the Art 1. Barton s U.S. Patent 5,646,997 (97) (1 st ) 2. Honsinger et al. s US Patent 6,278,791 B1 (01) (1 st ) 3. Fridrich et al. s method (SPIE01) (1 st ) 4. de Vleeschouwer et al. s method (MMSP01) (3 rd ) 5. Goljan et al. s method (IHW01) (2 nd ) 6. Xuan et al. s method (MMSP02) (2 nd ) 7. Celik et al. s method (ICIP02) (2 nd ) 8. Ni et al. s method (ISCAS03) (2 nd ) 9. Tian s method (CSVT03) (2 nd ) 10. Yang et al. s method (SPIE04) (2 nd ) 11. Thodi & Rodríguez s method (SWSIAI04) (2 nd ) 12. Ni et al. s method (ICME04) (3 rd ) 13. Zou et al. s method (MMSP04) (3 rd ) 14. Xuan et al. s method (MMSP04) (2 nd ) 15. Xuan et al. s method (IWDW04) (2 nd ) shi 18
19 State of the Art 1 st Category 1. Barton s U.S. Patent 5,646,997 (97) 2. Honsinger et al. s US Patent 6,278,791 B1 (01) (modulo-256 addition) 3. Fridrich et al. s method (SPIE01) (bit-plane compression in spatial domain) shi 19
20 Data embedding: Honsinger et al. s Modulo-256 Addition Method (the representative of 1 st category) Spatial domain Modulo 256 addition (reversible, key idea) Non-adaptive Iw = (I + W )mod 256 Iw: watermarked image I: original image W = W(H(I),K): watermark operation H(I): hash function of original image I K: secret key. shi 20
21 Eastman Kodak s Method (cont.) Reversibility is obvious: (I+W) mod 256 = Iw (Iw-W) mod 256 = I Comments: If the image is authentic, the original image data can be recovered without any distortion. Marked image may suffer from salt-and-pepper noise due to possible grayscale flipping over between 0 and 255 in either direction. shi 21
22 State of the Art 2 nd Category 1. Goljan et al. s R-S method (IHW01) 2. Celik et al. s G-LSB method (ICIP02) 3. Xuan et al. s Bit-plane Compression in IWT method (MMSP02) 4. Ni et al. s Histogram Manipulation method (ISCAS03) 5. Tian s Difference Expansion (DF) method (CSVT03) 6. Yang et al. s Companding in IDCT method (SPIE04) 7. Thodi & Rodríguez s Prediction-error Expansion method (SWSIAI04) 8. Xuan et al. s spread spectrum (SS) in IWT method (MMSP04) 9. Xuan et al. s companding in IWT method (IWDW04) shi 22
23 Xuan et al. s IWT-based 3 rd Method: Companding Based on IWT, histogram modification Data are embedded using companding scheme The performance in terms of data embedding capacity versus visual quality of marked image are clearly better than Tian difference expansion method, and Xuan et al. s first two methods. shi 23
24 Integer Wavelet Transform Efficient in coefficient de-correlation Features consistent with that of our human vision system Integer to integer transform (reversible) Efficient in calculation: lifting scheme (2 nd generation) shi 24
25 parts to be merged (a) original histogram parts after merge 0 G/2 G/2 255 (b) modified histogram Histogram Modification shi 25
26 Companding: Compression and Expansion Used for nonuniform quantization of speech signal to enhance signal to quantization noise ratio Figures from a communication text by Lathi: shi 26
27 HL 1 LL1 HL1 LH 1 LH1 HH1 f ( x) = λ λ x 2 e (a) Wavelet subbands (b) Laplacian distribution function, λ = 2 HH1 HL1 LH1 (c) Wavelet coefficient distribution for Lena image in high-frequency subbands Laplacian-like distribution of wavelet high-frequency coefficients shi 27
28 shi 28 Compression function + < = = T x as T T x sign x T x as x x C C Q Q, 2 ) (, ) ( ) ( ( ) Cx 2T T T 3T x
29 Companding ECx ( ( )) = x C: compression, E: expansion y = C(x) = pp 1 2 pn y' = pp 1 2 n p {0,1} pb b {0,1} i y ' x Then distortion will be imperceptible b = LSB( y ) Data extraction y = y 2 x = E( y) Original cover medium recovery 29
30 Companding, Spread-spectrum, Difference expansion Lena image test results (PSNR versus Payload) shi 30
31 Companding, Spread-spectrum, Difference expansion Barbara image test results (PSNR vs Payload) shi 31
32 Comments on Algorithms in 2 rd Category Payload vs PSNR of marked image is normally the major performance criterion. Two factors heavily influence this performance. The amount of change in pixel value or transform coefficient magnitude required to embed one bit. The number of pixels/coefficients are required to embed one bit. shi 32
33 State of the Art 3 rd Category 1. de Vleeschouwer et al. s method (MMSP01) (patchwork, modulo-256 addition) 2. Ni et al. s method (ICME04) (patchwork, average difference of pair pixels) 3. Zou et al. s method (MMSP04) (patchwork, integer wavelet transform) shi 33
34 de Vleeschouwer et al. s Patchwork, Modulo-256 Addition Based Robust Reversible Data Hiding 1 st in the 3 rd category Mostreversible data hiding techniques are fragile in the sense that once the marked media go through any alteration, the hidden data may not be able to be extracted with no error. De Vleeschouwer et al s method is the first and only reversible data hiding algorithm for several years, which has some robustness against high quality JPEG compression. shi 34
35 Patchwork and Modulo-256 Based Algorithm The host image is divided into non overlapped blocks. In each block, pixels are randomly grouped into two sets, A and B. Each pixel value in a set is projected as a unitary weighted ball onto a circle. The mass center of the circle is calculated. According to patchwork theory, the mass centers of the two sets should be close to each other, so the angle between two vectors (each from the origins of circle to the mass center) will be very small. shi 35
36 (Cont.) To embed one bit of information into this block, the gray level values of pixels in this block are modified according to following rule: To embed 1 C =C+P for pixels in group A C =C-P for pixels in group B To embed 0 C =C-P for pixels in group A C =C+P for pixels in group B In some blocks, the mass centers of the two sets are far away from each other, which will cause problem when embedding. We call such blocks Problem blocks. shi 36
37 Bit 1 is embedded into a block shi 37
38 Data Extraction and Restoration of Original Image For a test image, it will be divided into blocks and each block is grouped into two sets the same way we did previously at the embedding stage. The angle between the two mass center vectors of each block described previously is calculated in the same way. If the angle is great than 0, we extract a 1 from this block. Otherwise, we retrieve a 0. After all blocks are scanned and hence the hidden bits are retrieved, the pixel values of each block are reversed with respect to what have done at the embedding stage. If no errors occur in extraction, the exact original image can be obtained. shi 38
39 Drawbacks Some marked images suffer from salt-and-pepper noise because the algorithm utilizes modulo-256 addition. That is, in doing modulo-256 addition, a very bright pixel with a large gray value close to 256 will be possibly changed to a very dark pixel with a small gray value close to 0, and vise versa. The marked image does not have high enough PSNR. Our extensive investigation shows that the subjective visual quality of marked images can be substantially lowered. shi 39
40 Marked medical image (severe salt-pepper noise) shi 40
41 Marked medical image (severe salt-pepper noise) shi 41
42 Marked medical image (severe salt-pepper noise) shi 42
43 Marked medical image (severe salt-pepper noise) shi 43
44 Marked medical image (severe salt-pepper noise) shi 44
45 Marked medical image (some salt-pepper noise). shi 45
46 Marked JPEG2000 test image (severe salt-pepper noise). shi 46
47 Marked JPEG2000 test image (severe salt-pepper noise). shi 47
48 Marked JPEG2000 test image (severe salt-pepper noise). shi 48
49 Marked JPEG2000 test image (severe salt-pepper noise). shi 49
50 Marked JPEG2000 image (severe salt-pepper noise). shi 50
51 Marked JPEG2000 image (some salt-pepper noise). shi 51
52 Marked JPEG2000 image (some salt-pepper noise). shi 52
53 Marked JPEG2000 image (some salt-pepper noise). shi 53
54 Table 1. Test results for eight medical images with block size as 8, embedding level as 6. Images (512x512) Mpic1 Mpic2 Mpic3 Mpic4 Mpic5 Mpic6 Mpic7 Mpic8 PSNR of marked image (db) Data embedding capacity (bits) Robustness (bpp) shi
55 Table 2. Test results for eight JPEG2000 test images with block size as 20, embedding level as 8. Images (1536x1920) PSNR of marked image (db) Data embedding capacity (bits) Robustness (bpp) N1A (Woman) N2A N3A N4A N5A N6A N7A N8A shi
56 Comments The 1 st robust reversible data hiding algorithm Modulo-256 addition generates annoying salt-andpepper noise. Our extensive experiments show that it is in fact un-acceptable in many cases, in particular, it is bad for medical images. We hence conclude that all reversible data hiding algorithms, using modulo-256 addition, have this problem. shi 56
57 shi 57 Ni et al. s Patchwork Based on Method A block statistical quantity is used as a robust parameter to embed information. For a given image block, we split it into two subsets A and B as shown below
58 The difference value α is defined as the arithmetic average of differences of pixel pairs, α = 1 n n i= 1 ( a i b i ) It shows that most values of are very close to zero. α shi 58
59 Since the difference value α is based on the statistics of all pixels in the block, it has certain robustness against compression attacks. Hence the difference value α is used as a robust quantity for data embedding. shi 59
60 Bit Embedding Strategy If 1 is to be embedded, we shift the average difference value to right side or left side beyond a threshold, by adding or subtracting a fixed number from each pixel value within one subset. If 0 is to be embedded, the block is intact. Value shift toward left to embed 1 Value shift toward right to embed 1 T 0 T Original Difference Value shi 60
61 Differentiate bit-embedding schemes according to the content of the block. Four different patterns of pixel value distribution in a block are identified. For each type, a different bit-embedding scheme is developed and applied. ECCand Permutation techniques are used to achieve reversibility and enhance robustness. shi 61
62 0 d d1 255-d2 255-d d 255-d 255 Type 1 Type d 255-d d 255-d Type 3 Type 4 Differentiating bit-embedding schemes based on block content shi 62
63 Bit Extraction Strategy Data extraction is actually the reverse process of the data embedding. shi 63
64 Experimental Results This novel algorithm has been applied to Commonly used grayscale images such as Lena, Baboon, etc. Eight medical images 1096 images in the CoralDRAW image database Eight JPEG2000 color test images. Our new algorithm can be applied to all of these test images successfully. shi 64
65 Original image Marked image shi 65
66 Original image Marked image shi 66
67 Original image Marked image shi 67
68 Original image Marked image shi 68
69 shi 69 Original image Marked image
70 JPEG2000 test image (a) original (b) marked shi 70
71 Table 3. Test results for eight medical images with block size as 8, embedding level as 6. Images (512x512) Mpic1 Mpic2 Mpic3 Mpic4 Mpic5 Mpic6 Mpic7 Mpic8 Images (512 PSNR of marked image (db) Data embedding capacity (bits) Robustness (bpp) shi
72 Table 4. Test results for eight JPEG2000 test images with block size as 20, embedding level as 8. Images (1536x1920) PSNR of marked image (db) Data embedding capacity (bits) Robustness (bpp) N1A(Woman) N2A N3A N4A N5A N6A N7A N8A shi
73 Superior Performance Have tested different combinations of block size (hence same embedding capacity) and embedding level. For each combination, the average PSNR of Ni et al. s method is much higher than the modulo-256 based method. Also, the average robustness is stronger. No salt-and-pepper noise. shi 73
74 Application Scenarios Authentication On-line identity verification Secure medical data system shi 74
75 Application 1: Authentication of JPEG2000 images Traditional authentication schemes fail in some JPEG2000 application scenarios, say, compression with different implementations, different transcoding schemes, multiple compression cycles due to introduced incidental alterations. Authentication framework for JPEG2000 images is needed For both Integrity and Non-repudiation purposes It should include the security solutions for JPEG2000 at the content level which achieves both security and robustness. shi 75
76 Pixel difference between original and decoded image shi 76
77 A Unified Authentication Framework for JPEG2000 Image Having cryptographic strength Features signature is embedded into images Fragile and semi-fragile authentication Lossy and lossless compression, hence Lossy module for Semi-fragile authentication Lossless module for Semi-fragile authentication Has been included into JPEG2000 Security Part, JPSEC, Commission Draft 2.0, September shi 77
78 System overview of the unified authentication system shi 78
79 Application 2: On-line Identity Verification A paper published in IWDW04 Sender s fingerprint image Features of fingerprint and sender information are reversibly embedded into the fingerprint image. Verification is conducted at the receiver side with accessing central database. shi 79
80 Conclusion Reversible data hiding has opened a new door of data hiding: Methodology Linking original media with headers shi 80
81 III. Steganography & Steganalysis Covert communications Classification of stego-images from the original cover images Urgently needed for homeland security, cyber security shi 81
82 State of Arts Approach I: Specific steganalysis algorithms aiming at detection of a specific data hiding algorithm. Fridrich s steganalysis for F5 method [1]. Approach II: General steganalysis algorithm. Farid s wavelet based statistical approach [2,3]. Avcibas et al. s image quality metric based statistical approach [4]. shi 82
83 Status Quo of General Steganalysis Systems Performance by Farid s approach: LSB: 42.2% % QIM: not reported SS: not reported Performance by Avcibas et al. s approach: LSB: Around 70% QIM: not reported SS: 80% Size of image database used is small shi 83
84 Our Investigation Classifier: Feed-forward neural network with backpropagation training algorithm Image Database Used: All of 1096 images in CorelDRAW image database are used in investigation. shi 84
85 Our Investigation (cont.) Apply a data hiding algorithm to an image generate a stego-image. Thus, we come up with 1096 image pairs. Randomly select 100 image pairs for training. The rest 996 image pairs are used for testing. Experiments are conducted 10 times. The correct detection rates in these 10-time experiments are averaged and reported. shi 85
86 Performance of Farid s Approach Farid s method: reported in [2] Farid s method: implemented by my group Cox et al. s SS alpha=0.1,[5] Piva et al. s SS [6] No mention 57% No mention 66% LSB(0.3 bpp) 43%-90% 63% shi 86
87 Conclusion & Future Work Our investigation indicates that the current work on steganalysis is not sufficient. Further theoretical research and large number of experiments are necessary in order to have a blind steganalysis system that can detect most of the data embedding algorithms with a high success rate. shi 87
88 Acknowledgements Contributions from Professors G. Xuan, J. Huang Ph.D. candidates: J. Zhu, C. Yang, G. Kang, H. Liu, Z. Ni, D. Zou, C. Chen, W. Chen Supports from New Jersey Commission of Science and Technology via New Jersey Center of Wireless Networking and Internet Security (NJWINS) US Air Force Research Laboratory shi 88
89 References (Lossless Data Hiding) [barton 97] J. M. Barton, Method and apparatus for embedding authentication information within digital data, U.S. Patent 5,646,997, [honsinger et al. 99] C. W. Honsinger, P. Jones, M. Rabbani, and J. C. Stoffel, Lossless recovery of an original image containing embedded data, US Patent 6,278,791 B1, [macq and deweyand 99] B. Macq and F. Deweyand, Trusted headers for medical images, DFG VIII-D II Watermarking Workshop, Erlangen, Germany, October [fridrich et al. 01] J. Fridrich, M. Goljan and R. Du, Invertible authentication, Proc. SPIE, Security and Watermarking of Multimedia Contents, pp , San Jose, CA, January [goljan et al. 01] M. Goljan, J. Fridrich, and R. Du, Distortion-free data embedding, Proceedings of 4 th Information Hiding Workshop, pp , Pittsburgh, PA, April [de vleeschouwer et al. 01] C. de Vleeschouwer, J. F. Delaigle and B. Macq, Circular interpretation on histogram for reversible watermarking, IEEE International Multimedia Signal Processing Workshop, Cannes, France, October shi 89
90 [domingo-ferrer and seb e 02] J. Domingo-Ferrer and F. Seb e, Invertible spread-spectrum watermarking for image authentication and multilevel access to precision-critical watermarked images, Proceedings of the International Conference on Information Technology: Coding and Computing, pp , April [celik et al. 02] M. Celik, G. Sharma, A.M. Tekalp, E. Saber, Reversible data hiding, in Proceedings of the International Conference on Image Processing 2002, Rochester, NY, September [xuan et al. 02] G. Xuan, J. Zhu, J. Chen, Y. Q. Shi, Z. Ni and W. Su, Distortionless data hiding based on integer wavelet transform, IEE Electronics Letters, vol. 38, no. 25, pp , December [xuan et al. 04] G. Xuan, Y. Q. Shi, Z. C. Ni, J. Chen, C. Yang, Y. Zhen and J. Zheng, High capacity lossless data hiding based on integer wavelet transform, Proceedings of IEEE ISCAS, Vancouver, Canada, May [ni et al. 03] Z. Ni, Y. Q. Shi, N. Ansari and W. Su, Reversible data hiding in spatial domain, IEEE ISCAS03. [tian 03] J. Tian, Reversible data embedding using a difference expansion, IEEE Transaction on Circuits and Systems for Video Technology, vol. 13, no. 8, August shi 90
91 [yang et al. 04] B. Yang, M. Schmucker, W. Funk, C. Busch, and S. Sun, Integer DCT-based reversible watermarking for images using companding technique, Proceedings of SPIE Vol. #5306, , January [thodi and rodriguez 04] Thodi, D.M., Rodriguez, J.J., Reversible watermarking by prediction-error expansion, 6th IEEE Southwest Symposium on Image Analysis and Interpretation, pp , Lake Tahoe, CA, March 28-30, [ni 04] Z. Ni, Y. Q. Shi, N. Ansari, W. Su, Q. Sun and X. Lin, Robust image lossless data hiding, IEEE ICME, Taipei, Taiwn, June [xuan 04] G. Xuan and Y. Q. Shi, Integer wavelet transform based lossless data hiding using spread spectrum, IEEE MMSP04, Siena, Italy, September [zou et al. 04] D. Zou, Y. Q. Shi and Z. Ni, A semi-fragile lossless data hiding scheme based on integer wavelet transform, IEEE MMSP04, Siena, Italy, September [calderbank et al. 98] A. R. Calderbank, I. Daubechies, W. Sweldens and B. Yeo, Wavelet transforms that map integers to integers, Applied and Computational Harmonic Analysis, vol.5, no.3, pp , JPSEC Commission Draft Version 2.0, ISO/IEC JTC 1/SC29/WG1 N3397. shi 91
92 References (Steganalysis) [1] J. Fridrich, R. Du, and L. Meng, Steganalysis of LSB Encoding in Color Images, Proceedings IEEE International Conference on Multimedia and Expo, July 30 August 2, 2000, New York City, NY. [2] H. Farid, Detecting Hidden Messages Using Higher-Order Statistical Models International Conference on Image Processing (ICIP), Rochester, NY, 2002 [3] H. Farid and L. Siwei, Detecting Hidden Messages Using Higher-Order Statistics and Support Vector Machines, Proceedings 5th Information Hiding Workshop, Noordwijkerhout, Netherlands, Oct., [4] I. Avcibas, N. Memon, B. Sankur, Steganalysis using image quality metrics ; IEEE Transactions on Image Processing, vol.12, pp , Feb [5] I. J. Cox, J. Kiliany, T. Leightonz and T. Shamoony, Secure Spread Spectrum Watermarking for Multimedia, IEEE Trans. on Image Processing, vol.6, col.12, pp , [6] A. Piva, M. Barni, F. Bartolini, V.Cappellini, DCT-based watermark recovering without resorting to the uncorrupted original image, International Conference on Image Processing, vol.1, pp , Oct shi 92
Forward Modified Histogram Shifting based Reversible Watermarking with Reduced Pixel Shifting and High Embedding Capacity
International Journal of Electronics and Communication Engineering. ISSN 0974-2166 Volume 5, Number 2 (2012), pp. 185-191 International Research Publication House http://www.irphouse.com Forward Modified
More informationDATA HIDING [1] is referred to as a process to hide data
354 IEEE TRANSACTIONS ON CIRCUITS AND SYSTEMS FOR VIDEO TECHNOLOGY, VOL. 16, NO. 3, MARCH 2006 Reversible Data Hiding Zhicheng Ni, Yun-Qing Shi, Nirwan Ansari, and Wei Su Abstract A novel reversible data
More informationWatermarking-based Image Authentication with Recovery Capability using Halftoning and IWT
Watermarking-based Image Authentication with Recovery Capability using Halftoning and IWT Luis Rosales-Roldan, Manuel Cedillo-Hernández, Mariko Nakano-Miyatake, Héctor Pérez-Meana Postgraduate Section,
More informationDATA hiding has recently been proposed as one of the
IEEE TRANSACTIONS ON CIRCUITS AND SYSTEMS FOR VIDEO TECHNOLOGY, VOL. 18, NO. 4, APRIL 2008 497 Robust Lossless Image Data Hiding Designed for Semi-Fragile Image Authentication Zhicheng Ni, Yun Q. Shi,
More informationCopyright Warning & Restrictions
Copyright Warning & Restrictions The copyright law of the United States (Title 17, United States Code) governs the making of photocopies or other reproductions of copyrighted material. Under certain conditions
More informationA Reversible Data Hiding Scheme Based on Prediction Difference
2017 2 nd International Conference on Computer Science and Technology (CST 2017) ISBN: 978-1-60595-461-5 A Reversible Data Hiding Scheme Based on Prediction Difference Ze-rui SUN 1,a*, Guo-en XIA 1,2,
More informationLocal prediction based reversible watermarking framework for digital videos
Local prediction based reversible watermarking framework for digital videos J.Priyanka (M.tech.) 1 K.Chaintanya (Asst.proff,M.tech(Ph.D)) 2 M.Tech, Computer science and engineering, Acharya Nagarjuna University,
More informationData Hiding Algorithm for Images Using Discrete Wavelet Transform and Arnold Transform
J Inf Process Syst, Vol.13, No.5, pp.1331~1344, October 2017 https://doi.org/10.3745/jips.03.0042 ISSN 1976-913X (Print) ISSN 2092-805X (Electronic) Data Hiding Algorithm for Images Using Discrete Wavelet
More informationHistogram Modification Based Reversible Data Hiding Using Neighbouring Pixel Differences
Histogram Modification Based Reversible Data Hiding Using Neighbouring Pixel Differences Ankita Meenpal*, Shital S Mali. Department of Elex. & Telecomm. RAIT, Nerul, Navi Mumbai, Mumbai, University, India
More informationREVERSIBLE data hiding, or lossless data hiding, hides
IEEE TRANSACTIONS ON CIRCUITS AND SYSTEMS FOR VIDEO TECHNOLOGY, VOL. 16, NO. 10, OCTOBER 2006 1301 A Reversible Data Hiding Scheme Based on Side Match Vector Quantization Chin-Chen Chang, Fellow, IEEE,
More informationReversible data hiding based on histogram modification using S-type and Hilbert curve scanning
Advances in Engineering Research (AER), volume 116 International Conference on Communication and Electronic Information Engineering (CEIE 016) Reversible data hiding based on histogram modification using
More informationFragile Watermarking With Error-Free Restoration Capability Xinpeng Zhang and Shuozhong Wang
1490 IEEE TRANSACTIONS ON MULTIMEDIA, VOL 10, NO 8, DECEMBER 2008 Fragile Watermarking With Error-Free Restoration Capability Xinpeng Zhang and Shuozhong Wang Abstract This paper proposes a novel fragile
More informationSTEGANALYSIS OF IMAGES CREATED IN WAVELET DOMAIN USING QUANTIZATION MODULATION
STEGANALYSIS OF IMAGES CREATED IN WAVELET DOMAIN USING QUANTIZATION MODULATION SHAOHUI LIU, HONGXUN YAO, XIAOPENG FAN,WEN GAO Vilab, Computer College, Harbin Institute of Technology, Harbin, China, 150001
More informationHYBRID MATRIX CODING AND ERROR-CORRECTION CODING SCHEME FOR REVERSIBLE DATA HIDING IN BINARY VQ INDEX CODESTREAM
International Journal of Innovative Computing, Information and Control ICIC International c 2013 ISSN 1349-4198 Volume 9, Number 6, June 2013 pp. 2521 2531 HYBRID MATRIX CODING AND ERROR-CORRECTION CODING
More informationHigh-Capacity Reversible Data Hiding in Encrypted Images using MSB Prediction
High-Capacity Reversible Data Hiding in Encrypted Images using MSB Prediction Pauline Puteaux and William Puech; LIRMM Laboratory UMR 5506 CNRS, University of Montpellier; Montpellier, France Abstract
More informationA Lossless Large-Volume Data Hiding Method Based on Histogram Shifting Using an Optimal Hierarchical Block Division Scheme *
JOURNAL OF INFORMATION SCIENCE AND ENGINEERING 27, 1265-1282 (2011) A Lossless Large-Volume Data Hiding Method Based on Histogram Shifting Using an Optimal Hierarchical Block Division Scheme * CHE-WEI
More informationREVERSIBLE MEDICAL IMAGE WATERMARKING TECHNIQUE USING HISTOGRAM SHIFTING
REVERSIBLE MEDICAL IMAGE WATERMARKING TECHNIQUE USING HISTOGRAM SHIFTING S.Mounika 1, M.L. Mittal 2 1 Department of ECE, MRCET, Hyderabad, India 2 Professor Department of ECE, MRCET, Hyderabad, India ABSTRACT
More informationDigital Watermarking Using Homogeneity in Image
Digital Watermarking Using Homogeneity in Image S. K. Mitra, M. K. Kundu, C. A. Murthy, B. B. Bhattacharya and T. Acharya Dhirubhai Ambani Institute of Information and Communication Technology Gandhinagar
More informationSteganalytic methods for the detection of histogram shifting data-hiding schemes
Steganalytic methods for the detection of histogram shifting data-hiding schemes Daniel Lerch and David Megías Universitat Oberta de Catalunya, Spain. ABSTRACT In this paper, some steganalytic techniques
More informationAn Enhanced Least Significant Bit Steganography Technique
An Enhanced Least Significant Bit Steganography Technique Mohit Abstract - Message transmission through internet as medium, is becoming increasingly popular. Hence issues like information security are
More informationReversible Data Hiding in JPEG Images Based on Adjustable Padding
Reversible Data Hiding in JPEG Images Based on Adjustable Padding Ching-Chun Chang Department of Computer Science University of Warwick United Kingdom Email: C.Chang.@warwick.ac.uk Chang-Tsun Li School
More informationExploration of Least Significant Bit Based Watermarking and Its Robustness against Salt and Pepper Noise
Exploration of Least Significant Bit Based Watermarking and Its Robustness against Salt and Pepper Noise Kamaldeep Joshi, Rajkumar Yadav, Sachin Allwadhi Abstract Image steganography is the best aspect
More informationBasic concepts of Digital Watermarking. Prof. Mehul S Raval
Basic concepts of Digital Watermarking Prof. Mehul S Raval Mutual dependencies Perceptual Transparency Payload Robustness Security Oblivious Versus non oblivious Cryptography Vs Steganography Cryptography
More informationContrast Enhancement Based Reversible Image Data Hiding
Contrast Enhancement Based Reversible Image Data Hiding Renji Elsa Jacob 1, Prof. Anita Purushotham 2 PG Student [SP], Dept. of ECE, Sri Vellappally Natesan College, Mavelikara, India 1 Assistant Professor,
More informationReversible Watermarking on Histogram Pixel Based Image Features
Reversible Watermarking on Histogram Pixel Based Features J. Prisiba Resilda (PG scholar) K. Kausalya (Assistant professor) M. Vanitha (Assistant professor I) Abstract - Reversible watermarking is a useful
More informationISSN (PRINT): , (ONLINE): , VOLUME-4, ISSUE-11,
FPGA IMPLEMENTATION OF LSB REPLACEMENT STEGANOGRAPHY USING DWT M.Sathya 1, S.Chitra 2 Assistant Professor, Prince Dr. K.Vasudevan College of Engineering and Technology ABSTRACT An enhancement of data protection
More informationCommutative reversible data hiding and encryption
SECURITY AND COMMUNICATION NETWORKS Security Comm. Networks 3; 6:396 43 Published online March 3 in Wiley Online Library (wileyonlinelibrary.com)..74 RESEARCH ARTICLE Xinpeng Zhang* School of Communication
More informationJournal of mathematics and computer science 11 (2014),
Journal of mathematics and computer science 11 (2014), 137-146 Application of Unsharp Mask in Augmenting the Quality of Extracted Watermark in Spatial Domain Watermarking Saeed Amirgholipour 1 *,Ahmad
More informationDigital Image Watermarking using MSLDIP (Modified Substitute Last Digit in Pixel)
Digital Watermarking using MSLDIP (Modified Substitute Last Digit in Pixel) Abdelmgeid A. Ali Ahmed A. Radwan Ahmed H. Ismail ABSTRACT The improvements in Internet technologies and growing requests on
More informationIntroduction to More Advanced Steganography. John Ortiz. Crucial Security Inc. San Antonio
Introduction to More Advanced Steganography John Ortiz Crucial Security Inc. San Antonio John.Ortiz@Harris.com 210 977-6615 11/17/2011 Advanced Steganography 1 Can YOU See the Difference? Which one of
More informationLOSSLESS CRYPTO-DATA HIDING IN MEDICAL IMAGES WITHOUT INCREASING THE ORIGINAL IMAGE SIZE THE METHOD
LOSSLESS CRYPTO-DATA HIDING IN MEDICAL IMAGES WITHOUT INCREASING THE ORIGINAL IMAGE SIZE J.M. Rodrigues, W. Puech and C. Fiorio Laboratoire d Informatique Robotique et Microlectronique de Montpellier LIRMM,
More informationAn Implementation of LSB Steganography Using DWT Technique
An Implementation of LSB Steganography Using DWT Technique G. Raj Kumar, M. Maruthi Prasada Reddy, T. Lalith Kumar Electronics & Communication Engineering #,JNTU A University Electronics & Communication
More informationSteganography & Steganalysis of Images. Mr C Rafferty Msc Comms Sys Theory 2005
Steganography & Steganalysis of Images Mr C Rafferty Msc Comms Sys Theory 2005 Definitions Steganography is hiding a message in an image so the manner that the very existence of the message is unknown.
More informationChapter 3 LEAST SIGNIFICANT BIT STEGANOGRAPHY TECHNIQUE FOR HIDING COMPRESSED ENCRYPTED DATA USING VARIOUS FILE FORMATS
44 Chapter 3 LEAST SIGNIFICANT BIT STEGANOGRAPHY TECHNIQUE FOR HIDING COMPRESSED ENCRYPTED DATA USING VARIOUS FILE FORMATS 45 CHAPTER 3 Chapter 3: LEAST SIGNIFICANT BIT STEGANOGRAPHY TECHNIQUE FOR HIDING
More informationDetecting Resized Double JPEG Compressed Images Using Support Vector Machine
Detecting Resized Double JPEG Compressed Images Using Support Vector Machine Hieu Cuong Nguyen and Stefan Katzenbeisser Computer Science Department, Darmstadt University of Technology, Germany {cuong,katzenbeisser}@seceng.informatik.tu-darmstadt.de
More informationWatermarking patient data in encrypted medical images
Sādhanā Vol. 37, Part 6, December 2012, pp. 723 729. c Indian Academy of Sciences Watermarking patient data in encrypted medical images 1. Introduction A LAVANYA and V NATARAJAN Department of Instrumentation
More informationCompendium of Reversible Data Hiding
Compendium of Reversible Data Hiding S.Bhavani 1 and B.Ravi teja 2 Gudlavalleru Engineering College Abstract- In any communication, security is the most important issue in today s world. Lots of data security
More informationInternational Journal of Advance Engineering and Research Development IMAGE BASED STEGANOGRAPHY REVIEW OF LSB AND HASH-LSB TECHNIQUES
Scientific Journal of Impact Factor (SJIF) : 3.134 ISSN (Print) : 2348-6406 ISSN (Online): 2348-4470 ed International Journal of Advance Engineering and Research Development IMAGE BASED STEGANOGRAPHY REVIEW
More informationA Novel Image Steganography Based on Contourlet Transform and Hill Cipher
Journal of Information Hiding and Multimedia Signal Processing c 2015 ISSN 2073-4212 Ubiquitous International Volume 6, Number 5, September 2015 A Novel Image Steganography Based on Contourlet Transform
More informationRobust Invisible QR Code Image Watermarking Algorithm in SWT Domain
Robust Invisible QR Code Image Watermarking Algorithm in SWT Domain Swathi.K 1, Ramudu.K 2 1 M.Tech Scholar, Annamacharya Institute of Technology & Sciences, Rajampet, Andhra Pradesh, India 2 Assistant
More informationArmor on Digital Images Captured Using Photoelectric Technique by Absolute Watermarking Approach
American Journal of Science, Engineering and Technology 2017; 2(1): 33-38 http://www.sciencepublishinggroup.com/j/ajset doi: 10.11648/j.ajset.20170201.16 Methodology Article Armor on Digital Images Captured
More informationDetection of Image Forgery was Created from Bitmap and JPEG Images using Quantization Table
Detection of Image Forgery was Created from Bitmap and JPEG Images using Quantization Tran Dang Hien University of Engineering and Eechnology, VietNam National Univerity, VietNam Pham Van At Department
More informationSteganography using LSB bit Substitution for data hiding
ISSN: 2277 943 Volume 2, Issue 1, October 213 Steganography using LSB bit Substitution for data hiding Himanshu Gupta, Asst.Prof. Ritesh Kumar, Dr.Soni Changlani Department of Electronics and Communication
More informationApplication of Histogram Examination for Image Steganography
J. Appl. Environ. Biol. Sci., 5(9S)97-104, 2015 2015, TextRoad Publication ISSN: 2090-4274 Journal of Applied Environmental and Biological Sciences www.textroad.com Application of Histogram Examination
More informationThreshold-based Steganography: A Novel Technique for Improved Payload and SNR
380 The International Arab Journal of Information Technology, Vol. 13, No. 4, July 2016 Threshold-based Steganography: A Novel Technique for Improved Payload and SNR Zakir Khan 1, Mohsin Shah 2, Muhammad
More informationScienceDirect. A Novel DWT based Image Securing Method using Steganography
Available online at www.sciencedirect.com ScienceDirect Procedia Computer Science 46 (2015 ) 612 618 International Conference on Information and Communication Technologies (ICICT 2014) A Novel DWT based
More informationPattern Recognition 41 (2008) Contents lists available at ScienceDirect. Pattern Recognition
Pattern Recognition 41 (2008) 3497 -- 3506 Contents lists available at ScienceDirect Pattern Recognition journal homepage: www.elsevier.com/locate/pr Dual watermark for image tamper detection and recovery
More informationTransform Domain Technique in Image Steganography for Hiding Secret Information
Transform Domain Technique in Image Steganography for Hiding Secret Information Manibharathi. N 1 (PG Scholar) Dr.Pauls Engg. College Villupuram Dist, Tamilnadu, India- 605109 Krishnaprasad. S 2 (PG Scholar)
More informationTampering Detection Algorithms: A Comparative Study
International Journal of Engineering Research and Development e-issn: 2278-067X, p-issn: 2278-800X, www.ijerd.com Volume 7, Issue 5 (June 2013), PP.82-86 Tampering Detection Algorithms: A Comparative Study
More informationAuthentication Algorithm for Color Images using Watermarking Techniques
Auntication Algorithm for Color Images using Watermarking Techniques LUIS ROSALES-ROLDAN, CLARA CRUZ-RAMOS, MARIKO NAKANO-MIYATAKE and HECTOR PEREZ-MEANA Postgraduate Section, Mechanical Electrical Engineering
More informationColor PNG Image Authentication Scheme Based on Rehashing and Secret Sharing Method
Journal of Information Hiding and Multimedia Signal Processing c 015 ISSN 073-41 Ubiquitous International Volume 6, Number 3, May 015 Color PNG Image Authentication Scheme Based on Rehashing and Secret
More informationAn Integrated Image Steganography System. with Improved Image Quality
Applied Mathematical Sciences, Vol. 7, 2013, no. 71, 3545-3553 HIKARI Ltd, www.m-hikari.com http://dx.doi.org/10.12988/ams.2013.34236 An Integrated Image Steganography System with Improved Image Quality
More informationModified Skin Tone Image Hiding Algorithm for Steganographic Applications
Modified Skin Tone Image Hiding Algorithm for Steganographic Applications Geetha C.R., and Dr.Puttamadappa C. Abstract Steganography is the practice of concealing messages or information in other non-secret
More informationImproved Detection of LSB Steganography in Grayscale Images
Improved Detection of LSB Steganography in Grayscale Images Andrew Ker adk@comlab.ox.ac.uk Royal Society University Research Fellow at Oxford University Computing Laboratory Information Hiding Workshop
More informationImage Compression Supported By Encryption Using Unitary Transform
Image Compression Supported By Encryption Using Unitary Transform Arathy Nair 1, Sreejith S 2 1 (M.Tech Scholar, Department of CSE, LBS Institute of Technology for Women, Thiruvananthapuram, India) 2 (Assistant
More informationDigital Audio Watermarking With Discrete Wavelet Transform Using Fibonacci Numbers
Digital Audio Watermarking With Discrete Wavelet Transform Using Fibonacci Numbers P. Mohan Kumar 1, Dr. M. Sailaja 2 M. Tech scholar, Dept. of E.C.E, Jawaharlal Nehru Technological University Kakinada,
More informationHiding Image in Image by Five Modulus Method for Image Steganography
Hiding Image in Image by Five Modulus Method for Image Steganography Firas A. Jassim Abstract This paper is to create a practical steganographic implementation to hide color image (stego) inside another
More informationA novel technique for Reversible Information Hiding
Advances in Computational Sciences and Technology ISSN 0973-6107 Volume 10, Number 7 (2017) pp. 2069-2078 Research India Publications http://www.ripublication.com A novel technique for Reversible Information
More informationReversible Data Hiding in Encrypted color images by Reserving Room before Encryption with LSB Method
ISSN (e): 2250 3005 Vol, 04 Issue, 10 October 2014 International Journal of Computational Engineering Research (IJCER) Reversible Data Hiding in Encrypted color images by Reserving Room before Encryption
More informationAuthentication of grayscale document images using shamir secret sharing scheme.
IOSR Journal of Computer Engineering (IOSR-JCE) e-issn: 2278-0661, p- ISSN: 2278-8727Volume 16, Issue 2, Ver. VII (Mar-Apr. 2014), PP 75-79 Authentication of grayscale document images using shamir secret
More informationCamera identification from sensor fingerprints: why noise matters
Camera identification from sensor fingerprints: why noise matters PS Multimedia Security 2010/2011 Yvonne Höller Peter Palfrader Department of Computer Science University of Salzburg January 2011 / PS
More informationDWT BASED AUDIO WATERMARKING USING ENERGY COMPARISON
DWT BASED AUDIO WATERMARKING USING ENERGY COMPARISON K.Thamizhazhakan #1, S.Maheswari *2 # PG Scholar,Department of Electrical and Electronics Engineering, Kongu Engineering College,Erode-638052,India.
More informationBlind Image Fidelity Assessment Using the Histogram
Blind Image Fidelity Assessment Using the Histogram M. I. Khalil Abstract An image fidelity assessment and tamper detection using two histogram components of the color image is presented in this paper.
More informationAn Overview of Image Steganography Techniques
www.ijecs.in International Journal Of Engineering And Computer Science ISSN:2319-7242 Volume 3 Issue 7 July, 2014 Page No. 7341-7345 An Overview of Image Steganography Techniques Amritpal Singh 1, Satinder
More informationDynamic Collage Steganography on Images
ISSN 2278 0211 (Online) Dynamic Collage Steganography on Images Aswathi P. S. Sreedhi Deleepkumar Maya Mohanan Swathy M. Abstract: Collage steganography, a type of steganographic method, introduced to
More informationData Embedding Using Phase Dispersion. Chris Honsinger and Majid Rabbani Imaging Science Division Eastman Kodak Company Rochester, NY USA
Data Embedding Using Phase Dispersion Chris Honsinger and Majid Rabbani Imaging Science Division Eastman Kodak Company Rochester, NY USA Abstract A method of data embedding based on the convolution of
More informationComparative Histogram Analysis of LSB-based Image Steganography
Comparative Histogram Analysis of LSB-based Image Steganography KI-HYUN JUNG Department of Cyber Security Kyungil University 50 Gamasil-gil, Hayang-eup, Gyeongsan-si, Gyeongbuk 38428 REPUBLIC OF KOREA
More informationImage Quality Estimation of Tree Based DWT Digital Watermarks
International Journal of Engineering Research and General Science Volume 3, Issue 1, January-February, 215 ISSN 291-273 Image Quality Estimation of Tree Based DWT Digital Watermarks MALVIKA SINGH PG Scholar,
More informationWe are IntechOpen, the world s leading publisher of Open Access books Built by scientists, for scientists. International authors and editors
We are IntechOpen, the world s leading publisher of Open Access books Built by scientists, for scientists 4,000 116,000 120M Open access books available International authors and editors Downloads Our
More informationON PACKING LASER SCANNING MICROSCOPY IMAGES BY REVERSIBLE WATERMARKING: A CASE STUDY
ON PACKING LASER SCANNING MICROSCOPY IMAGES BY REVERSIBLE WATERMARKING: A CASE STUDY Ioan-Catalin Dragoi 1 Stefan G. Stanciu 2 Dinu Coltuc 1 Denis E. Tranca 2 Radu Hristu 2 George A. Stanciu 2 1 Electrical
More informationBlock Wise Data Hiding with Auxilliary Matrix
Block Wise Data Hiding with Auxilliary Matrix Jyoti Bharti Deptt. of Computer Science & Engg. MANIT Bhopal, India R.K. Pateriya Deptt. of Computer Science & Engg. MANIT Bhopal, India Sanyam Shukla Deptt.
More informationA Novel Approach of Compressing Images and Assessment on Quality with Scaling Factor
A Novel Approach of Compressing Images and Assessment on Quality with Scaling Factor Umesh 1,Mr. Suraj Rana 2 1 M.Tech Student, 2 Associate Professor (ECE) Department of Electronic and Communication Engineering
More informationLevel-Successive Encoding for Digital Photography
Level-Successive Encoding for Digital Photography Mehmet Celik, Gaurav Sharma*, A.Murat Tekalp University of Rochester, Rochester, NY * Xerox Corporation, Webster, NY Abstract We propose a level-successive
More informationKeywords Secret data, Host data, DWT, LSB substitution.
Volume 5, Issue 3, March 2015 ISSN: 2277 128X International Journal of Advanced Research in Computer Science and Software Engineering Research Paper Available online at: www.ijarcsse.com Performance Evaluation
More informationAn Optimum Modified Bit Plane Splicing LSB Algorithm for Secret Data Hiding
An Optimum Modified Bit Plane Splicing LSB Algorithm for Secret Data Hiding M. Naseem Department of Computer Engineering, Ibrahim M. Hussain Department of Computer Engineering, M. Kamran Khan Department
More informationAn Optimal Pixel-level Self-repairing Authentication. Method for Grayscale Images under a Minimax. Criterion of Distortion Reduction*
An Optimal Pixel-level Self-repairing Authentication Method for Grayscale Images under a Minimax Criterion of Distortion Reduction* Che-Wei Lee 1 and Wen-Hsiang Tsai 1, 2, 1 Department of Computer Science
More informationEnhance Image using Dynamic Histogram and Data Hiding Technique
_ Enhance Image using Dynamic Histogram and Data Hiding Technique 1 D.Bharadwaja, 2 Y.V.N.Tulasi 1 Department of CSE, Gudlavalleru Engineering College, Email: bharadwaja599@gmail.com 2 Department of CSE,
More informationFPGA implementation of DWT for Audio Watermarking Application
FPGA implementation of DWT for Audio Watermarking Application Naveen.S.Hampannavar 1, Sajeevan Joseph 2, C.B.Bidhul 3, Arunachalam V 4 1, 2, 3 M.Tech VLSI Students, 4 Assistant Professor Selection Grade
More informationIntroduction to Audio Watermarking Schemes
Introduction to Audio Watermarking Schemes N. Lazic and P. Aarabi, Communication over an Acoustic Channel Using Data Hiding Techniques, IEEE Transactions on Multimedia, Vol. 8, No. 5, October 2006 Multimedia
More informationAN IMPROVED LSB METHOD OF STEGANOGRAPHY WITH JPEG COLORED IMAGE
(IJISE) 207, Vol. No. 5, Jan-Jun e-issn: 2454-6402, p-issn: 2454-82X AN IMPROVED LSB METHOD OF STEGANOGRAPHY WITH JPEG COLORED IMAGE Dr. Rajesh Kumar Pathak, 2 Neha Jain Professor &Director GNCT Greater
More informationPRIOR IMAGE JPEG-COMPRESSION DETECTION
Applied Computer Science, vol. 12, no. 3, pp. 17 28 Submitted: 2016-07-27 Revised: 2016-09-05 Accepted: 2016-09-09 Compression detection, Image quality, JPEG Grzegorz KOZIEL * PRIOR IMAGE JPEG-COMPRESSION
More informationThe Influence of Image Enhancement Filters on a Watermark Detection Rate Authors
acta graphica 194 udc 004.056.55:655.36 original scientific paper received: -09-011 accepted: 11-11-011 The Influence of Image Enhancement Filters on a Watermark Detection Rate Authors Ante Poljičak, Lidija
More informationA New Compression Method for Encrypted Images
Technology, Volume-2, Issue-2, March-April, 2014, pp. 15-19 IASTER 2014, www.iaster.com Online: 2347-5099, Print: 2348-0009 ABSTRACT A New Compression Method for Encrypted Images S. Manimurugan, Naveen
More informationMLP for Adaptive Postprocessing Block-Coded Images
1450 IEEE TRANSACTIONS ON CIRCUITS AND SYSTEMS FOR VIDEO TECHNOLOGY, VOL. 10, NO. 8, DECEMBER 2000 MLP for Adaptive Postprocessing Block-Coded Images Guoping Qiu, Member, IEEE Abstract A new technique
More informationJoint near-lossless compression and watermarking of still images for authentication and tamper localization
Signal Processing: Image Communication 21 (2006) 890 903 www.elsevier.com/locate/image Joint near-lossless compression and watermarking of still images for authentication and tamper localization Roberto
More informationA SECURE IMAGE STEGANOGRAPHY USING LEAST SIGNIFICANT BIT TECHNIQUE
Int. J. Engg. Res. & Sci. & Tech. 2014 Amit and Jyoti Pruthi, 2014 Research Paper A SECURE IMAGE STEGANOGRAPHY USING LEAST SIGNIFICANT BIT TECHNIQUE Amit 1 * and Jyoti Pruthi 1 *Corresponding Author: Amit
More informationLossless Image Watermarking for HDR Images Using Tone Mapping
IJCSNS International Journal of Computer Science and Network Security, VOL.13 No.5, May 2013 113 Lossless Image Watermarking for HDR Images Using Tone Mapping A.Nagurammal 1, T.Meyyappan 2 1 M. Phil Scholar
More informationIntroduction to Video Forgery Detection: Part I
Introduction to Video Forgery Detection: Part I Detecting Forgery From Static-Scene Video Based on Inconsistency in Noise Level Functions IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, VOL. 5,
More informationISSN: (Online) Volume 3, Issue 4, April 2015 International Journal of Advance Research in Computer Science and Management Studies
ISSN: 2321-7782 (Online) Volume 3, Issue 4, April 2015 International Journal of Advance Research in Computer Science and Management Studies Research Article / Survey Paper / Case Study Available online
More informationA Proposed Technique For Hiding Data Into Video Files
www.ijcsi.org 68 A Proposed Technique For Hiding Data Into Video Files Mohamed Elbayoumy 1, Mohammed Elmogy 2, Ahmed Abouelfetouh 3 and Rasha Elhadary 4 1 Information systems department, Faculty of computer
More informationENHANCED SECURITY SYSTEM USING SYMMETRIC ENCRYPTION AND VISUAL CRYPTOGRAPHY
ENHANCED SECURITY SYSTEM USING SYMMETRIC ENCRYPTION AND VISUAL CRYPTOGRAPHY Ranjan Kumar H S 1, Prasanna Kumar H R 1, Sudeepa K B 2 and Ganesh Aithal 2 1 Dept of CSE, NMAMIT, Nitte, Karnataka, India 2
More informationIMPROVEMENTS ON SOURCE CAMERA-MODEL IDENTIFICATION BASED ON CFA INTERPOLATION
IMPROVEMENTS ON SOURCE CAMERA-MODEL IDENTIFICATION BASED ON CFA INTERPOLATION Sevinc Bayram a, Husrev T. Sencar b, Nasir Memon b E-mail: sevincbayram@hotmail.com, taha@isis.poly.edu, memon@poly.edu a Dept.
More informationRobust watermarking based on DWT SVD
Robust watermarking based on DWT SVD Anumol Joseph 1, K. Anusudha 2 Department of Electronics Engineering, Pondicherry University, Puducherry, India anumol.josph00@gmail.com, anusudhak@yahoo.co.in Abstract
More informationText fusion watermarking in Medical image with Semi-reversible for Secure transfer and Authentication
2009 International Conference on Advances in Recent Technologies in Communication and Computing Text fusion watermarking in Medical image with Semi-reversible for Secure transfer and Authentication P.Viswanathan*
More informationA Survey of Substantial Digital Image Watermarking Techniques
A Survey of Substantial Digital Image Watermarking Techniques Neha Sharma 1, Rasmiranjan Samantray 2 1 Central College of Engineering and Management, Kabir Nagar, Raipur. Chhattisgarh Swami Vivekananda
More informationReversible Data Hiding in Encrypted Images based on MSB. Prediction and Huffman Coding
Reversible Data Hiding in Encrypted Images based on MSB Prediction and Huffman Coding Youzhi Xiang 1, Zhaoxia Yin 1,*, Xinpeng Zhang 2 1 School of Computer Science and Technology, Anhui University 2 School
More informationImplementation of a Visible Watermarking in a Secure Still Digital Camera Using VLSI Design
2009 nternational Symposium on Computing, Communication, and Control (SCCC 2009) Proc.of CST vol.1 (2011) (2011) ACST Press, Singapore mplementation of a Visible Watermarking in a Secure Still Digital
More informationCompression and Image Formats
Compression Compression and Image Formats Reduce amount of data used to represent an image/video Bit rate and quality requirements Necessary to facilitate transmission and storage Required quality is application
More informationAn Efficient Data Security System Using Reserve Room Approach on Digital Images for Secret Sharing
An Efficient Data Security System Using Reserve Room Approach on Digital Images for Secret Sharing Mrs.V.P.Kavitha (Asst. professor, Dept. of ECE in Velammal Engineering College) M.Suganya, K.Suganya,
More informationSterilization of Stego-images through Histogram Normalization
Sterilization of Stego-images through Histogram Normalization Goutam Paul 1 and Imon Mukherjee 2 1 Dept. of Computer Science & Engineering, Jadavpur University, Kolkata 700 032, India. Email: goutam.paul@ieee.org
More information