Digital Watermarking for Forgery Detection in Printed Materials
|
|
- Andrea Dawson
- 5 years ago
- Views:
Transcription
1 Lecture Notes in Computer Science 1 Digital Watermarking for Forgery Detection in Printed Materials Y.J.Song, R.Z.Liu, T.N.Tan National Lab of Pattern Recognition Institute of Automation, Chinese Academy of Sciences P.O.Box 2728 Beijing, , P.R.China {yjsong,liurz,tnt}@nlpr.ia.ac.cn Abstract. Forgery prevention and detection are of great social importance.this paper attempts to apply digital watermarking into forgery prevention.to embed a watermark,the wavelet transformation is first applied to the original image and the corresponding approximation image and detail images are obtained.the digital watermark is embedded into the most important DCT coefficients of the approximation image except the DC coefficient of the detail image through linearly additive operation.the corresponding watermark is extracted throught threshold judgement and the threshold is determined through the difference of two cycle print&scan and one cyle print&scan of the images.to improve the robustness of the orgorithm,the simple and effective repetition is applied to watermark configuration.and the CIE Lab color space is chosen to guarantee the repetition of the results and minimize the error brought by the transference of images between differnt equipments.experimental results show that the proposed algorithm can satisfy the requirements of forgery prevention for ordinary images,that is to say the digital watermark is robust to one cycle print&scan and fragile to two cycle print&scan. Compared with other forgery prevention and detection techniques,the algorithm described in this paper reduced the computation cost considerably as no other special material or equipment is required and ordinary user can verify the authentication of printing materials. This algorithm can also be used in printing materials copyright protection,such as the owner verification in certificates,passports,ect. 1 Introduction The increasingly networked society calls for effective measures for copyright protection, image authentication, etc. Digital watermarking thus comes into being and promotes the progress of the field. But we should not neglect those images largely in the form of presswork (trademarks, pictures, certification, ID cards, paper currency, passports, etc). For recent years, many people have been engaged in forgery of printed materials for illegal economic profit. The identical printing process brings the fact This work is supported by the Chinese NSF (Grant No ) and the Chinese Academy of Sciences.
2 Lecture Notes in Computer Science 2 fact that it is easy for a forger to make illegal copies of the original. Just take the passports as an example, from the China Police Department statistics, there are about 3 million false passports all over the world. And a comparative portion is absolutely counterfeited. The strike on counterfeit has never been stopped. People have thought of many different forgery prevention methods on color printing, such as laser forgery preventing, telephone code forgery preventing, computer network counterfeit preventing, etc. All these forgery-prevention techniques have worked on a certain degree, but the cost has increased greatly. People are looking forward to more costeffective schemes. In this paper, we attempt to apply digital watermarking into the forgery prevention field. The paper is organized as follows. Section 2 introduces the recent progresses of watermarking in printing systems. Section 3 puts forward the implementation scheme. Section 4 outlines the experimental results. And Section 5 makes the conclusions and presents the work to be continued. 2 Recent Progresses of Watermarking in Printing Recent public literatures show that some researchers have tried to apply watermarking into printing system. The watermarking scheme invented in Digimarc Company has been integrated in the most popular image processing tool-photoshop. The embedded watermark can survive printing and scanning on some degree. But the amount of watermark is very limited and the content of watermark is restricted in Digimarc ID, Distributor ID, Copyright Year, etc. Also it is sensitive to geometric transform. Pun [1] has devised a watermarking algorithm robust to printing and scanning. The PhotoCheck software developed in AlpVision Company by Kutter [2] is mainly focused on authentication detection of passports. As a passport belongs to the owner with his photo, this belongs to a content-based watermarking technique. When the photo is changed, the image with the watermark is of course lost and this just requires that the watermark hidden in the owner s passport is robust to one cycle of print and scan. Considering the special characteristic of FFT on rotation, scaling and cropping, Lin [3][4] has carried out the research on fragile watermarking rather early and obtained many useful conclusions on the distortion brought by print and scan. Researchers in China [5] began to hide some information in printing materials, using the function offered by PhotoShop. All these are focused on the watermark robust to one cycle of print and scan. For real forgery prevention, there are some other requirements as discussed in the following. Figure 1 and 2 illustrate watermark embedding and extraction processes both for a copyrighted product and a forged one. From the figures, we can see that the difference between the copyrighted and the forged is the process before watermark extraction. The copyrighted only needs one scan, while the forged requires more than one cycle of print and scan. It will be ideal if the watermark is robust only to the first cycle of print&scan, but fragile to the second cycle of print&scan.
3 Lecture Notes in Computer Science 3 Fig. 1. Embedding Process Fig. 2. Extracting Process
4 Lecture Notes in Computer Science 4 3 Implementation Method 3.1 Print&scan Distortion Analysis All the distortion in the print and scan process can be categorized into two types[3].the first type is distortion visible to human eyes, including changes of brightness and contrast, gamma correction, image halftone,dot diffusion, edge noise, etc. The printing of an image is from digital to analogous. Meanwhile, the resolution of a photocomposer is a key factor, which controls the fine degree of the halftone grids. On the contrary, the scanning is to convert an analogy image to its digital form. The resolution of a scanner is also an important factor. As with the increase of the resolution of the scanner, the inserting values are also increasing and the computing speed is decreasing. Considering all these factors, we choose 300dpi for printing and 600dpi~1200dpi for scanning in our experiments.the second type is geometric distortion invisible to human eyes,including rotation, scaling, cropping, etc.this distortion always occurs when locating the corresponding portion in the printing sheet with the original digital images. Some rotation is needed, as a sheet may not be very horizontal when it is put on the surface of a scanner. Numerous experiments show the rotation angle is at about 0.5 ~ 0.5. A certain cropping is necessary to cut the margins. And scaling is always indispensable, as the printing resolution and the scanning resolution are always inconsistent. There is still one point which is always neglected,that is the color conversions during print and scan.one image has different color space descriptions on different equipment. For example, it may be displayed in RGB space in computer, be edited in HSI space and be converted into CMYK space when it is published. Different color spaces have different gamut. So some information may be lost when converting between different spaces. It is important to select an appropriate color space among so many color spaces, including RGB space, CMY space, HIS(HLS, HSB)space YUV space, YIQ space, and YCrCb space and those based on CIE,including CIExyY space, CIELab space and CIELu*v* space. Meanwhile the CIELab space is recently the only one to describe color most exactly and independent of the equipment. So CIE Lab space is chosen. 3.2 Watermark Embedding and Extraction Methods The original image (ordinarily in the RGB mode) is first changed into CIELab mode, and the L portion is chosen to carry the watermark. The watermark This belongs to NLPR is taken as an example (the length of the watermark is defined as l). Firstly, each bit of the watermark is extracted and a sequence composed of 0 and 1 is obtained. 0 is changed to 1, 1 remains unchanged. The above sequence is repeated m times and the size of the total sequence is 8l*m. Secondly, a two-level multiresolution representation of the original image is obtained using a Haar wavelet trans-
5 Lecture Notes in Computer Science 5 form.the DCT transform is applied to the approximation image, the 8l*m largest coefficients are selected and the watermark is added with a linear additive function, just as Cox s method [6]. The strength of the watermark is controlled by a. Lastly, the inverse DCT of the above sequence is made,the corresponding inverse wavelet tranform is done to get the watermarked image which can be printed later. It is time to distinguish the copyrighted products and the forged ones. Firstly, one of the presswork is scanned and a scanned image with some margin is obtained (The sheet should better be put as horizontal as possible.). Secondly, the corresponding area with the original digital image is located. Thirdly a sequence W_j (i) is computed using the minus operation with the embedding process. M is chosen as a threshold, if the current value of W_j (i) is greater than M, then W_jj (i) is set to 1,otherwise is set to 0. If the number of 1s is greater than that of 0s in a bit of a character, then the bit is considered as 1s,otherwise 0.By repeating the above operation for all other bits, the watermark is extracted. At the same time, the bit-error rate curve can be obtained. If the whole eight bits of a character can be extracted (or the bit error rate of each bit of a character is less than 50%), then the extracted character is considered as correct. If all the characters can be extracted from the first cycle of the print&scan image, the watermark is considered robust to the first cycle of print&scan. If all the characters can not be extracted from the second cycle of the print&scan image, the watermark is defined fragile to second cycle of print&scan. Thus the watermark can claim the owner of the copyright and detect the forgery images. Now the pirating technique is becoming more sophisticated. That is to say the difference between the first cycle of print&scan image and the second cycle of print&scan image is small. If the above scheme works, the difference between the sequences extracted after the copyrighted image and the forgery must be found. Many repeated experiments (100 times) with the approximately same conditions demonstrate that the mean of the sequence extracted from copyrighted image stabilizes at a certain value M 1 (the variance is between -0.1 and 0.1). Many repeated experiments (100 times) with other conditions different from the copyrighted print and scan show the mean of the sequence extracted from forgery image stabilizes at another certain value M 2 and M 2 is ten times greater than M 1.So M 1 is chosen as the decision threshold. 4 Experimental Results 4.1 Parameter Optimization Channel capacity is a key factor in the watermark insertion and detection. It is well connected with the robustness and the invisibility of the watermark. Robustness need more watermark capacity and invisibility requires capacity should not exceed a certain value. From the point of information theory, MIT lab s Smith and Comiskey [7]
6 Lecture Notes in Computer Science 6 ever made some capacity estimation on the data hiding system. They obtained the conclusion that the channel capacity is proportional to the ratio of signal-noise of the system on the condition that Gaussian noise channel is the basic model of the system and the ratio of signal-noise is low.ramkumar [8] made some improvement on the above model and also made some quantitative analysis. Although this model still have many presumptive conditions, but it offered a useful reflection. In this paper, we used the formula proposed [8] and estimate that we can embed 1000 bits at best robust to first cycle of print&scan in a 256*256 pixel if we just use luminance of the image. For more details [8] can be referred to. The invisibility of a watermark is weighted by the image quality evaluation. PSNR is chosen for simplicity. Generally, the PSNR should be chosen to be 38dB for watermark invisibility and more powerful watermark.the robustness is connected with the following factors:watermark strengthen factor a, watermark sequence repeat times m, watermark sequence length l, etc. PSNR is defined no less than 38dB, the whole length of the adding sequence (8*m*l) is computed to be 1000 at most.the optimized value of a is 0.2 on the condition that watermark sequence is consist of 1, -1, PSNR is 38dB and 8m*l is1000. Of course, the robustness is connected with printing quality and the resolution of the original image. 4.2 Parameter Optimization The most popular attack tool-stirmark3.1 is first selected to test the robustness of the algorithm. The following Table1 is statistical results. The watermark shows good robustness to JPEG compression, scaling, changes in the x-y axis display, removal of the rows and columns symmetrical or not; it shows some robustness on central cropping, rotation with scaling and cropping, x-y direction cropping to some extent; and it is fragile to Linear geometry conversion.the above robustness can satisfy the process of the printing and scanning which includes some rotation (-0.5 degree to 0.5 degree), some cropping (about 1%), scaling, JPEG compression for fast transmission, random error, etc. Test type Test numbers Right Tests numbers Remove the rows and columns symmetrical or not 5 5 Filtering(median Gaussian FMLR sharping) 6 5 JPEG compression Cropping 9 2 Linear geometry conversion 3 0 Change the x-y axis display 8 8 Rotation with cropping,without scaling 16 6 Rotation with cropping and scaling 16 6
7 Lecture Notes in Computer Science 7 Scaling 6 6 x y direction cropping 6 3 Stirmark random bend 1 0 Table 1. Stirmark3.1 test results sum Print&scan Results Figure 4 is a typical result chosen from 100 experiments. It shows bit error rate comparison between the copyrighted and forgery images. As when the bit error rate is lower than 35%, the extracted bit is considered correct. The bit error rate of each bit from the copyrighted image is all below 50%, thus the watermark can be fully extracted. While the bit error rate from the forgery image is above 35%,only about half of the bits can be extracted correctly and now the embedded watemark has become meaningless. So we can make a decision that when the watermark can be 85% or above extracted, the image is considered copyrighted product; otherwise the image will be considered forgery product. Fig. 3. Bit Error Rate Comparison (Copyrighted and Forgery Images) 5 Conclusions The above experiments show that the proposed scheme can satisfy the requirement of forgery preventing for ordinary images. Also it can be used in situations where only the robustness to one cycle of print&scan is needed, such as the ID card, passports, etc. The most excellent point is that the cost of this scheme is largely reduced compared with other forgery techniques and ordinary people can authenticate their products. The combined wavelet and DCT transform is applied to the original image and
8 Lecture Notes in Computer Science 8 the watermark is linearly added to the most energy-concentrated oefficients.the CIE lab color space makes it possible that the watermark technique can be used in forgery prevention field. The repeated experiments for the same watermark and same image under the same parameters are considered on the same environment equipment (including the scanner, printer, etc.). The optimization may vary with different equipment. There is still much work to do from the point of research. If we take the color difference (a* and b*) into account, more watermarks can be added and PSNR will not work. Future work will focus on these. References 1. Joe J. K. Ó Ruanaidh, Thierry Pun, Rotation, scale and translation invariant spread spectrum digital image watermarking, Signal Processing vol. 66(III), pp , May M. Kutter, F. Jordan, F. Bossen, "Digital signature of color images using amplitude modulation", Journal of Electronic Imaging, vol. 7, no. 2, pp , April, C.Y.Lin and S.F.Chang, Distortion Modeling and Invariant Extraction for Digital Image Print-and-Scan Process, ISMIP 99, Taipei, Taiwan, Dec C.Y.Lin, Public Watermarking Surviving General Scaling and Cropping: An Application for Print-and-Scan Process, Multimedia and Security Workshop at ACM Multimedia 99, Orlando, FL, Oct Z.Y.Li, Z.Z.Fu, Hiding information in printing system, CIHW 2000, Beijing, China, Jun I.J. Cox, J. Kilian, T. Leighton and T. Shamoon, Secure Spread Spectrum Watermarking for Images, Audio and Video, ICIP'96, vol. III, pp J. R. Smith and B. O. Comiskey, Modulation and Information Hiding in Images, Workshop on Information Hiding, University of Cambridge, UK, pp , May M. Ramkumar, Data Hiding In Multimedia- Theory And Applications, Ph.D. Dissertation, New Jersey Institute of Technology, Jan. 2000
Digital Watermarking Using Homogeneity in Image
Digital Watermarking Using Homogeneity in Image S. K. Mitra, M. K. Kundu, C. A. Murthy, B. B. Bhattacharya and T. Acharya Dhirubhai Ambani Institute of Information and Communication Technology Gandhinagar
More informationImplementation of a Visible Watermarking in a Secure Still Digital Camera Using VLSI Design
2009 nternational Symposium on Computing, Communication, and Control (SCCC 2009) Proc.of CST vol.1 (2011) (2011) ACST Press, Singapore mplementation of a Visible Watermarking in a Secure Still Digital
More informationReversible data hiding based on histogram modification using S-type and Hilbert curve scanning
Advances in Engineering Research (AER), volume 116 International Conference on Communication and Electronic Information Engineering (CEIE 016) Reversible data hiding based on histogram modification using
More informationSpread Spectrum Watermarking Using HVS Model and Wavelets in JPEG 2000 Compression
Spread Spectrum Watermarking Using HVS Model and Wavelets in JPEG 2000 Compression Khaly TALL 1, Mamadou Lamine MBOUP 1, Sidi Mohamed FARSSI 1, Idy DIOP 1, Abdou Khadre DIOP 1, Grégoire SISSOKO 2 1. Laboratoire
More informationLossless Image Watermarking for HDR Images Using Tone Mapping
IJCSNS International Journal of Computer Science and Network Security, VOL.13 No.5, May 2013 113 Lossless Image Watermarking for HDR Images Using Tone Mapping A.Nagurammal 1, T.Meyyappan 2 1 M. Phil Scholar
More informationA Visual Cryptography Based Watermark Technology for Individual and Group Images
A Visual Cryptography Based Watermark Technology for Individual and Group Images Azzam SLEIT (Previously, Azzam IBRAHIM) King Abdullah II School for Information Technology, University of Jordan, Amman,
More informationColored Digital Image Watermarking using the Wavelet Technique
American Journal of Applied Sciences 4 (9): 658-662, 2007 ISSN 1546-9239 2007 Science Publications Corresponding Author: Colored Digital Image Watermarking using the Wavelet Technique 1 Mohammed F. Al-Hunaity,
More informationA Watermark for Image Integrity and Ownership Verification
A Watermark for Image Integrity and Ownership Verification Ping Wah Wong Hewlett Packard Company, 11000 Wolfe Road, Cupertino, CA 95014 Abstract We describe in this paper a ing scheme for ownership verification
More informationSteganography & Steganalysis of Images. Mr C Rafferty Msc Comms Sys Theory 2005
Steganography & Steganalysis of Images Mr C Rafferty Msc Comms Sys Theory 2005 Definitions Steganography is hiding a message in an image so the manner that the very existence of the message is unknown.
More informationThe Scientist and Engineer's Guide to Digital Signal Processing By Steven W. Smith, Ph.D.
The Scientist and Engineer's Guide to Digital Signal Processing By Steven W. Smith, Ph.D. Home The Book by Chapters About the Book Steven W. Smith Blog Contact Book Search Download this chapter in PDF
More informationThe Influence of Image Enhancement Filters on a Watermark Detection Rate Authors
acta graphica 194 udc 004.056.55:655.36 original scientific paper received: -09-011 accepted: 11-11-011 The Influence of Image Enhancement Filters on a Watermark Detection Rate Authors Ante Poljičak, Lidija
More informationWatermarking-based Image Authentication with Recovery Capability using Halftoning and IWT
Watermarking-based Image Authentication with Recovery Capability using Halftoning and IWT Luis Rosales-Roldan, Manuel Cedillo-Hernández, Mariko Nakano-Miyatake, Héctor Pérez-Meana Postgraduate Section,
More informationFPGA implementation of DWT for Audio Watermarking Application
FPGA implementation of DWT for Audio Watermarking Application Naveen.S.Hampannavar 1, Sajeevan Joseph 2, C.B.Bidhul 3, Arunachalam V 4 1, 2, 3 M.Tech VLSI Students, 4 Assistant Professor Selection Grade
More informationREVERSIBLE MEDICAL IMAGE WATERMARKING TECHNIQUE USING HISTOGRAM SHIFTING
REVERSIBLE MEDICAL IMAGE WATERMARKING TECHNIQUE USING HISTOGRAM SHIFTING S.Mounika 1, M.L. Mittal 2 1 Department of ECE, MRCET, Hyderabad, India 2 Professor Department of ECE, MRCET, Hyderabad, India ABSTRACT
More informationJournal of mathematics and computer science 11 (2014),
Journal of mathematics and computer science 11 (2014), 137-146 Application of Unsharp Mask in Augmenting the Quality of Extracted Watermark in Spatial Domain Watermarking Saeed Amirgholipour 1 *,Ahmad
More informationPrinted Document Watermarking Using Phase Modulation
1 Printed Document Watermarking Using Phase Modulation Chabukswar Hrishikesh Department Of Computer Engineering, SBPCOE, Indapur, Maharastra, India, Pise Anil Audumbar Department Of Computer Engineering,
More informationMultiple Watermarking Scheme Using Adaptive Phase Shift Keying Technique
Multiple Watermarking Scheme Using Adaptive Phase Shift Keying Technique Wen-Yuan Chen, Jen-Tin Lin, Chi-Yuan Lin, and Jin-Rung Liu Department of Electronic Engineering, National Chin-Yi Institute of Technology,
More informationAN OPTIMIZED APPROACH FOR FAKE CURRENCY DETECTION USING DISCRETE WAVELET TRANSFORM
AN OPTIMIZED APPROACH FOR FAKE CURRENCY DETECTION USING DISCRETE WAVELET TRANSFORM T.Manikyala Rao 1, Dr. Ch. Srinivasa Rao 2 Research Scholar, Department of Electronics and Communication Engineering,
More informationCompression and Image Formats
Compression Compression and Image Formats Reduce amount of data used to represent an image/video Bit rate and quality requirements Necessary to facilitate transmission and storage Required quality is application
More informationImage Quality Estimation of Tree Based DWT Digital Watermarks
International Journal of Engineering Research and General Science Volume 3, Issue 1, January-February, 215 ISSN 291-273 Image Quality Estimation of Tree Based DWT Digital Watermarks MALVIKA SINGH PG Scholar,
More informationRobust Watermarking Scheme Using Phase Shift Keying Embedding
Robust Watermarking Scheme Using Phase Sht Keying Embedding Wen-Yuan Chen Chio-Tan Kuo and Jiang-Nan Jow Department of Electronic Engineering National Chin-Yi Institute of Technology Taichung Taiwan R.O.C.
More informationA new seal verification for Chinese color seal
Edith Cowan University Research Online ECU Publications 2011 2011 A new seal verification for Chinese color seal Zhihu Huang Jinsong Leng Edith Cowan University 10.4028/www.scientific.net/AMM.58-60.2558
More informationVARIABLE-RATE STEGANOGRAPHY USING RGB STEGO- IMAGES
VARIABLE-RATE STEGANOGRAPHY USING RGB STEGO- IMAGES Ayman M. Abdalla, PhD Dept. of Multimedia Systems, Al-Zaytoonah University, Amman, Jordan Abstract A new algorithm is presented for hiding information
More informationJayalakshmi M., S. N. Merchant, Uday B. Desai SPANN Lab, Indian Institute of Technology, Bombay jlakshmi, merchant,
SIGNIFICANT PIXEL WATERMARKING IN CONTOURLET OMAIN Jayalakshmi M., S. N. Merchant, Uday B. esai SPANN Lab, Indian Institute of Technology, Bombay email: jlakshmi, merchant, ubdesai @ee.iitb.ac.in Keywords:
More informationCopyright protection scheme for digital images using visual cryptography and sampling methods
44 7, 077003 July 2005 Copyright protection scheme for digital images using visual cryptography and sampling methods Ching-Sheng Hsu National Central University Department of Information Management P.O.
More informationIEEE Signal Processing Letters: SPL Distance-Reciprocal Distortion Measure for Binary Document Images
IEEE SIGNAL PROCESSING LETTERS, VOL. X, NO. Y, Z 2003 1 IEEE Signal Processing Letters: SPL-00466-2002 1) Paper Title Distance-Reciprocal Distortion Measure for Binary Document Images 2) Authors Haiping
More informationTHE advent of the digital age with the Internet revolution
464 IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, VOL. 1, NO. 4, DECEMBER 2006 Print and Scan Resilient Data Hiding in Images Kaushal Solanki, Member, IEEE, Upamanyu Madhow, Fellow, IEEE, B.
More informationMultimedia Systems Color Space Mahdi Amiri March 2012 Sharif University of Technology
Course Presentation Multimedia Systems Color Space Mahdi Amiri March 2012 Sharif University of Technology Physics of Color Light Light or visible light is the portion of electromagnetic radiation that
More informationData Embedding Using Phase Dispersion. Chris Honsinger and Majid Rabbani Imaging Science Division Eastman Kodak Company Rochester, NY USA
Data Embedding Using Phase Dispersion Chris Honsinger and Majid Rabbani Imaging Science Division Eastman Kodak Company Rochester, NY USA Abstract A method of data embedding based on the convolution of
More informationIntroduction to Video Forgery Detection: Part I
Introduction to Video Forgery Detection: Part I Detecting Forgery From Static-Scene Video Based on Inconsistency in Noise Level Functions IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, VOL. 5,
More informationEffect of Embedding Multiple Watermarks in Color Image against Cropping and Salt and Pepper Noise Attacks
International Journal of IT, Engineering and Applied Sciences Research (IJIEASR) ISSN: 239-443 Volume, No., October 202 8 Effect of Embedding Multiple Watermarks in Color Image against Cropping and Salt
More informationDigital Image Watermarking by Spread Spectrum method
Digital Image Watermarking by Spread Spectrum method Andreja Samčovi ović Faculty of Transport and Traffic Engineering University of Belgrade, Serbia Belgrade, november 2014. I Spread Spectrum Techniques
More informationRobust and Blind Spatial Watermarking in Digital Image
Robust and lind Spatial Watermarking in Digital Image Santi Prasad Maity Malay Kumar Kundu Dept.of Electronics Telecomm. Machine Intelligence Unit.E.College(D.U.) Indian Statical Institute Howrah -711
More informationAn Improved Edge Adaptive Grid Technique To Authenticate Grey Scale Images
An Improved Edge Adaptive Grid Technique To Authenticate Grey Scale Images Ishwarya.M 1, Mary shamala.l 2 M.E, Dept of CSE, IFET College of Engineering, Villupuram, TamilNadu, India 1 Associate Professor,
More informationDigital Audio Watermarking With Discrete Wavelet Transform Using Fibonacci Numbers
Digital Audio Watermarking With Discrete Wavelet Transform Using Fibonacci Numbers P. Mohan Kumar 1, Dr. M. Sailaja 2 M. Tech scholar, Dept. of E.C.E, Jawaharlal Nehru Technological University Kakinada,
More informationLaser Printer Source Forensics for Arbitrary Chinese Characters
Laser Printer Source Forensics for Arbitrary Chinese Characters Xiangwei Kong, Xin gang You,, Bo Wang, Shize Shang and Linjie Shen Information Security Research Center, Dalian University of Technology,
More informationHigh capacity robust audio watermarking scheme based on DWT transform
High capacity robust audio watermarking scheme based on DWT transform Davod Zangene * (Sama technical and vocational training college, Islamic Azad University, Mahshahr Branch, Mahshahr, Iran) davodzangene@mail.com
More informationAutomatic Counterfeit Protection System Code Classification
Automatic Counterfeit Protection System Code Classification Joost van Beusekom a,b, Marco Schreyer a, Thomas M. Breuel b a German Research Center for Artificial Intelligence (DFKI) GmbH D-67663 Kaiserslautern,
More informationCopyright Warning & Restrictions
Copyright Warning & Restrictions The copyright law of the United States (Title 17, United States Code) governs the making of photocopies or other reproductions of copyrighted material. Under certain conditions
More informationAPPLYING EDGE INFORMATION IN YCbCr COLOR SPACE ON THE IMAGE WATERMARKING
APPLYING EDGE INFORMATION IN YCbCr COLOR SPACE ON THE IMAGE WATERMARKING Mansur Jaba 1, Mosbah Elsghair 2, Najib Tanish 1 and Abdusalam Aburgiga 2 1 Alpha University, Serbia and 2 John Naisbitt University,
More informationTampering Detection Algorithms: A Comparative Study
International Journal of Engineering Research and Development e-issn: 2278-067X, p-issn: 2278-800X, www.ijerd.com Volume 7, Issue 5 (June 2013), PP.82-86 Tampering Detection Algorithms: A Comparative Study
More informationIntroduction to More Advanced Steganography. John Ortiz. Crucial Security Inc. San Antonio
Introduction to More Advanced Steganography John Ortiz Crucial Security Inc. San Antonio John.Ortiz@Harris.com 210 977-6615 11/17/2011 Advanced Steganography 1 Can YOU See the Difference? Which one of
More informationThresholding Technique for Document Images using a Digital Camera
I&T's 2 PIC Conference I&T's 2 PIC Conference Copyright 2, I&T Thresholding Technique for Document Images using a Digital Camera adao Takahashi Research and Development Group, Ricoh Co., Ltd. Yokohama,
More informationLocal prediction based reversible watermarking framework for digital videos
Local prediction based reversible watermarking framework for digital videos J.Priyanka (M.tech.) 1 K.Chaintanya (Asst.proff,M.tech(Ph.D)) 2 M.Tech, Computer science and engineering, Acharya Nagarjuna University,
More informationColor Image Processing
Color Image Processing Jesus J. Caban Outline Discuss Assignment #1 Project Proposal Color Perception & Analysis 1 Discuss Assignment #1 Project Proposal Due next Monday, Oct 4th Project proposal Submit
More informationMahdi Amiri. March Sharif University of Technology
Course Presentation Multimedia Systems Color Space Mahdi Amiri March 2014 Sharif University of Technology The wavelength λ of a sinusoidal waveform traveling at constant speed ν is given by Physics of
More informationLecture 8. Color Image Processing
Lecture 8. Color Image Processing EL512 Image Processing Dr. Zhu Liu zliu@research.att.com Note: Part of the materials in the slides are from Gonzalez s Digital Image Processing and Onur s lecture slides
More informationIntroduction to Multimedia Computing
COMP 319 Lecture 02 Introduction to Multimedia Computing Fiona Yan Liu Department of Computing The Hong Kong Polytechnic University Learning Outputs of Lecture 01 Introduction to multimedia technology
More informationDigital Image Watermarking using MSLDIP (Modified Substitute Last Digit in Pixel)
Digital Watermarking using MSLDIP (Modified Substitute Last Digit in Pixel) Abdelmgeid A. Ali Ahmed A. Radwan Ahmed H. Ismail ABSTRACT The improvements in Internet technologies and growing requests on
More informationColor and More. Color basics
Color and More In this lesson, you'll evaluate an image in terms of its overall tonal range (lightness, darkness, and contrast), its overall balance of color, and its overall appearance for areas that
More informationCOLOR LASER PRINTER IDENTIFICATION USING PHOTOGRAPHED HALFTONE IMAGES. Do-Guk Kim, Heung-Kyu Lee
COLOR LASER PRINTER IDENTIFICATION USING PHOTOGRAPHED HALFTONE IMAGES Do-Guk Kim, Heung-Kyu Lee Graduate School of Information Security, KAIST Department of Computer Science, KAIST ABSTRACT Due to the
More informationExploration of Least Significant Bit Based Watermarking and Its Robustness against Salt and Pepper Noise
Exploration of Least Significant Bit Based Watermarking and Its Robustness against Salt and Pepper Noise Kamaldeep Joshi, Rajkumar Yadav, Sachin Allwadhi Abstract Image steganography is the best aspect
More informationRobust Invisible QR Code Image Watermarking Algorithm in SWT Domain
Robust Invisible QR Code Image Watermarking Algorithm in SWT Domain Swathi.K 1, Ramudu.K 2 1 M.Tech Scholar, Annamacharya Institute of Technology & Sciences, Rajampet, Andhra Pradesh, India 2 Assistant
More informationExploiting the RGB Intensity Values to Implement a Novel Dynamic Steganography Scheme
Exploiting the RGB Intensity Values to Implement a Novel Dynamic Steganography Scheme Surbhi Gupta 1, Parvinder S. Sandhu 2 Abstract Steganography means covered writing. It is the concealment of information
More informationMULTIMEDIA SYSTEMS
1 Department of Computer Engineering, g, Faculty of Engineering King Mongkut s Institute of Technology Ladkrabang 01076531 MULTIMEDIA SYSTEMS Pakorn Watanachaturaporn, Ph.D. pakorn@live.kmitl.ac.th, pwatanac@gmail.com
More informationRobust watermarking based on DWT SVD
Robust watermarking based on DWT SVD Anumol Joseph 1, K. Anusudha 2 Department of Electronics Engineering, Pondicherry University, Puducherry, India anumol.josph00@gmail.com, anusudhak@yahoo.co.in Abstract
More informationWavelet-based Image Splicing Forgery Detection
Wavelet-based Image Splicing Forgery Detection 1 Tulsi Thakur M.Tech (CSE) Student, Department of Computer Technology, basiltulsi@gmail.com 2 Dr. Kavita Singh Head & Associate Professor, Department of
More informationFragile Watermarking With Error-Free Restoration Capability Xinpeng Zhang and Shuozhong Wang
1490 IEEE TRANSACTIONS ON MULTIMEDIA, VOL 10, NO 8, DECEMBER 2008 Fragile Watermarking With Error-Free Restoration Capability Xinpeng Zhang and Shuozhong Wang Abstract This paper proposes a novel fragile
More informationTWO ALGORITHMS IN DIGITAL AUDIO STEGANOGRAPHY USING QUANTIZED FREQUENCY DOMAIN EMBEDDING AND REVERSIBLE INTEGER TRANSFORMS
TWO ALGORITHMS IN DIGITAL AUDIO STEGANOGRAPHY USING QUANTIZED FREQUENCY DOMAIN EMBEDDING AND REVERSIBLE INTEGER TRANSFORMS Sos S. Agaian 1, David Akopian 1 and Sunil A. D Souza 1 1Non-linear Signal Processing
More informationProposed Method for Off-line Signature Recognition and Verification using Neural Network
e-issn: 2349-9745 p-issn: 2393-8161 Scientific Journal Impact Factor (SJIF): 1.711 International Journal of Modern Trends in Engineering and Research www.ijmter.com Proposed Method for Off-line Signature
More informationHologram-based watermarking capable of surviving print-scan process
Hologram-based watermarking capable of surviving print-scan process Shuozhong Wang,* Sujuan Huang, Xinpeng Zhang, and Wei Wu School of Communication and Information Engineering, Key Laboratory of Specialty
More informationWatermarking Still Images Using Parametrized Wavelet Systems
Watermarking Still Images Using Parametrized Wavelet Systems Zhuan Qing Huang and Zhuhan Jiang School of Computing and IT, University of Western Sydney, NSW 2150, Australia zhuang@cit.uws.edu.au, z.jiang@uws.edu.au
More informationReal Time Word to Picture Translation for Chinese Restaurant Menus
Real Time Word to Picture Translation for Chinese Restaurant Menus Michelle Jin, Ling Xiao Wang, Boyang Zhang Email: mzjin12, lx2wang, boyangz @stanford.edu EE268 Project Report, Spring 2014 Abstract--We
More informationImage Manipulation Detection using Convolutional Neural Network
Image Manipulation Detection using Convolutional Neural Network Dong-Hyun Kim 1 and Hae-Yeoun Lee 2,* 1 Graduate Student, 2 PhD, Professor 1,2 Department of Computer Software Engineering, Kumoh National
More informationImage Recognition for PCB Soldering Platform Controlled by Embedded Microchip Based on Hopfield Neural Network
436 JOURNAL OF COMPUTERS, VOL. 5, NO. 9, SEPTEMBER Image Recognition for PCB Soldering Platform Controlled by Embedded Microchip Based on Hopfield Neural Network Chung-Chi Wu Department of Electrical Engineering,
More informationCamera identification from sensor fingerprints: why noise matters
Camera identification from sensor fingerprints: why noise matters PS Multimedia Security 2010/2011 Yvonne Höller Peter Palfrader Department of Computer Science University of Salzburg January 2011 / PS
More informationFPGA implementation of LSB Steganography method
FPGA implementation of LSB Steganography method Pangavhane S.M. 1 &Punde S.S. 2 1,2 (E&TC Engg. Dept.,S.I.E.RAgaskhind, SPP Univ., Pune(MS), India) Abstract : "Steganography is a Greek origin word which
More informationDWT BASED AUDIO WATERMARKING USING ENERGY COMPARISON
DWT BASED AUDIO WATERMARKING USING ENERGY COMPARISON K.Thamizhazhakan #1, S.Maheswari *2 # PG Scholar,Department of Electrical and Electronics Engineering, Kongu Engineering College,Erode-638052,India.
More informationWavelet-Based Multiresolution Matching for Content-Based Image Retrieval
Wavelet-Based Multiresolution Matching for Content-Based Image Retrieval Te-Wei Chiang 1 Tienwei Tsai 2 Yo-Ping Huang 2 1 Department of Information Networing Technology, Chihlee Institute of Technology,
More informationTHE STATISTICAL ANALYSIS OF AUDIO WATERMARKING USING THE DISCRETE WAVELETS TRANSFORM AND SINGULAR VALUE DECOMPOSITION
THE STATISTICAL ANALYSIS OF AUDIO WATERMARKING USING THE DISCRETE WAVELETS TRANSFORM AND SINGULAR VALUE DECOMPOSITION Mr. Jaykumar. S. Dhage Assistant Professor, Department of Computer Science & Engineering
More informationVisual Secret Sharing Based Digital Image Watermarking
www.ijcsi.org 312 Visual Secret Sharing Based Digital Image Watermarking B. Surekha 1, Dr. G. N. Swamy 2 1 Associate Professor, Department of ECE, TRR College of Engineering, Hyderabad, Andhra Pradesh,
More informationAn Enhanced Least Significant Bit Steganography Technique
An Enhanced Least Significant Bit Steganography Technique Mohit Abstract - Message transmission through internet as medium, is becoming increasingly popular. Hence issues like information security are
More informationWireless Communication
Wireless Communication Systems @CS.NCTU Lecture 4: Color Instructor: Kate Ching-Ju Lin ( 林靖茹 ) Chap. 4 of Fundamentals of Multimedia Some reference from http://media.ee.ntu.edu.tw/courses/dvt/15f/ 1 Outline
More informationImage Rendering for Digital Fax
Rendering for Digital Fax Guotong Feng a, Michael G. Fuchs b and Charles A. Bouman a a Purdue University, West Lafayette, IN b Hewlett-Packard Company, Boise, ID ABSTRACT Conventional halftoning methods
More informationDigital Image Processing Color Models &Processing
Digital Image Processing Color Models &Processing Dr. Hatem Elaydi Electrical Engineering Department Islamic University of Gaza Fall 2015 Nov 16, 2015 Color interpretation Color spectrum vs. electromagnetic
More informationPerformance Analysis of Parallel Acoustic Communication in OFDM-based System
Performance Analysis of Parallel Acoustic Communication in OFDM-based System Junyeong Bok, Heung-Gyoon Ryu Department of Electronic Engineering, Chungbuk ational University, Korea 36-763 bjy84@nate.com,
More informationDetection of Image Forgery was Created from Bitmap and JPEG Images using Quantization Table
Detection of Image Forgery was Created from Bitmap and JPEG Images using Quantization Tran Dang Hien University of Engineering and Eechnology, VietNam National Univerity, VietNam Pham Van At Department
More informationImpeding Forgers at Photo Inception
Impeding Forgers at Photo Inception Matthias Kirchner a, Peter Winkler b and Hany Farid c a International Computer Science Institute Berkeley, Berkeley, CA 97, USA b Department of Mathematics, Dartmouth
More informationBlind Image Fidelity Assessment Using the Histogram
Blind Image Fidelity Assessment Using the Histogram M. I. Khalil Abstract An image fidelity assessment and tamper detection using two histogram components of the color image is presented in this paper.
More informationKeywords Secret data, Host data, DWT, LSB substitution.
Volume 5, Issue 3, March 2015 ISSN: 2277 128X International Journal of Advanced Research in Computer Science and Software Engineering Research Paper Available online at: www.ijarcsse.com Performance Evaluation
More informationColor images C1 C2 C3
Color imaging Color images C1 C2 C3 Each colored pixel corresponds to a vector of three values {C1,C2,C3} The characteristics of the components depend on the chosen colorspace (RGB, YUV, CIELab,..) Digital
More informationMultiresolution Watermarking for Digital Images
IEEE TRANSACTIONS ON CIRCUITS AND SYSTEMS II: ANALOG AND DIGITAL SIGNAL PROCESSING, VOL. 45, NO. 8, AUGUST 1998 1097 looks amplitude) of San Francisco Bay. Lee s refined filter tends to overly segment
More informationStamp detection in scanned documents
Annales UMCS Informatica AI X, 1 (2010) 61-68 DOI: 10.2478/v10065-010-0036-6 Stamp detection in scanned documents Paweł Forczmański Chair of Multimedia Systems, West Pomeranian University of Technology,
More informationEE482: Digital Signal Processing Applications
Professor Brendan Morris, SEB 3216, brendan.morris@unlv.edu EE482: Digital Signal Processing Applications Spring 2014 TTh 14:30-15:45 CBC C222 Lecture 15 Image Processing 14/04/15 http://www.ee.unlv.edu/~b1morris/ee482/
More informationDetecting Resized Double JPEG Compressed Images Using Support Vector Machine
Detecting Resized Double JPEG Compressed Images Using Support Vector Machine Hieu Cuong Nguyen and Stefan Katzenbeisser Computer Science Department, Darmstadt University of Technology, Germany {cuong,katzenbeisser}@seceng.informatik.tu-darmstadt.de
More informationIMAGES AND COLOR. N. C. State University. CSC557 Multimedia Computing and Networking. Fall Lecture # 10
IMAGES AND COLOR N. C. State University CSC557 Multimedia Computing and Networking Fall 2001 Lecture # 10 IMAGES AND COLOR N. C. State University CSC557 Multimedia Computing and Networking Fall 2001 Lecture
More informationHiding Image in Image by Five Modulus Method for Image Steganography
Hiding Image in Image by Five Modulus Method for Image Steganography Firas A. Jassim Abstract This paper is to create a practical steganographic implementation to hide color image (stego) inside another
More informationEmbedding and Extracting Two Separate Images Signal in Salt & Pepper Noises in Digital Images based on Watermarking
3rd International Conference on Pattern Recognition and Image Analysis (IPRIA 2017) April 19-20, 2017 Embedding and Extracting Two Separate Images Signal in Salt & Pepper Noises in Digital Images based
More informationImproved Spread Spectrum: A New Modulation Technique for Robust Watermarking
898 IEEE TRANSACTIONS ON SIGNAL PROCESSING, VOL. 51, NO. 4, APRIL 2003 Improved Spread Spectrum: A New Modulation Technique for Robust Watermarking Henrique S. Malvar, Fellow, IEEE, and Dinei A. F. Florêncio,
More informationAn Audio Fingerprint Algorithm Based on Statistical Characteristics of db4 Wavelet
Journal of Information & Computational Science 8: 14 (2011) 3027 3034 Available at http://www.joics.com An Audio Fingerprint Algorithm Based on Statistical Characteristics of db4 Wavelet Jianguo JIANG
More informationWatermarking patient data in encrypted medical images
Sādhanā Vol. 37, Part 6, December 2012, pp. 723 729. c Indian Academy of Sciences Watermarking patient data in encrypted medical images 1. Introduction A LAVANYA and V NATARAJAN Department of Instrumentation
More informationInformation Hiding to Foil the Casual Counterfeiter
Information Hiding Workshop 98 1 Information Hiding to Foil the Casual Counterfeiter Daniel Gruhl and Walter Bender Massachusetts Institute of Technology Media Laboratory Abstract. Security documents (currency,
More informationComputers and Imaging
Computers and Imaging Telecommunications 1 P. Mathys Two Different Methods Vector or object-oriented graphics. Images are generated by mathematical descriptions of line (vector) segments. Bitmap or raster
More informationColor PNG Image Authentication Scheme Based on Rehashing and Secret Sharing Method
Journal of Information Hiding and Multimedia Signal Processing c 015 ISSN 073-41 Ubiquitous International Volume 6, Number 3, May 015 Color PNG Image Authentication Scheme Based on Rehashing and Secret
More informationPattern Recognition 41 (2008) Contents lists available at ScienceDirect. Pattern Recognition
Pattern Recognition 41 (2008) 3497 -- 3506 Contents lists available at ScienceDirect Pattern Recognition journal homepage: www.elsevier.com/locate/pr Dual watermark for image tamper detection and recovery
More informationKeywords Arnold transforms; chaotic logistic mapping; discrete wavelet transform; encryption; mean error.
Volume 5, Issue 2, February 2015 ISSN: 2277 128X International Journal of Advanced Research in Computer Science and Software Engineering Research Paper Available online at: www.ijarcsse.com An Entropy
More informationZero-Based Code Modulation Technique for Digital Video Fingerprinting
Zero-Based Code Modulation Technique for Digital Video Fingerprinting In Koo Kang 1, Hae-Yeoun Lee 1, Won-Young Yoo 2, and Heung-Kyu Lee 1 1 Department of EECS, Korea Advanced Institute of Science and
More informationInternational Journal of Digital Application & Contemporary research Website: (Volume 1, Issue 7, February 2013)
Performance Analysis of OFDM under DWT, DCT based Image Processing Anshul Soni soni.anshulec14@gmail.com Ashok Chandra Tiwari Abstract In this paper, the performance of conventional discrete cosine transform
More informationModified Skin Tone Image Hiding Algorithm for Steganographic Applications
Modified Skin Tone Image Hiding Algorithm for Steganographic Applications Geetha C.R., and Dr.Puttamadappa C. Abstract Steganography is the practice of concealing messages or information in other non-secret
More informationLocalized Robust Audio Watermarking in Regions of Interest
Localized Robust Audio Watermarking in Regions of Interest W Li; X Y Xue; X Q Li Department of Computer Science and Engineering University of Fudan, Shanghai 200433, P. R. China E-mail: weili_fd@yahoo.com
More information