2008/12/17. RST invariant digital image watermarking & digital watermarking based audiovisual quality evaluation. Outline
|
|
- Isaac Claude Pitts
- 5 years ago
- Views:
Transcription
1 //7 RST invariant digital image watermarking & digital watermarking based audiovisual quality evaluation Outline Digital watermarking RST invariant image watermarking Audiovisual quality evaluation based on watermarking Jiying Zhao, Ph.D. School of Information Technology & Engineering Introduction to digital watermarking Digital watermarking What is digital watermarking Host signals Applications of watermarking How it works Requirements for watermarking Some examples Digital Watermarking technology allows users to embed some data into digital contents such as still image, movie and audio data. When data is embedded, it is not written at header part but embedded directly into digital media itself by changing media contents data. Host signals for digital watermarking Image Video Audio Software Applications of digital watermarking Rights management Copyrights protection Content distribution, tracking and monitoring Authentication Assure contents integrity Prevent unauthorized alternation of contents Detect alternation location in the contents Contents management Indexing & retrieval Access/copy control Prevent unauthorized copy, playback of multimedia contents Quality evaluation
2 //7 How it works (IBM TRL) Technical requirements for watermarking Invisibility Robustness Capacity Examples of watermarking Broadcast monitoring (example: IBM TRL) Original Watermarked Owner identification Content authentication An invisible watermark is very resistant to destruction under any image manipulation. Verifies ownership of media suspected of misappropriation. Digital detection of the watermark would indicate the source of the image. A fragile watermark will be destroyed when the image is manipulated digitally in any way. It proves authenticity of media. If the watermark is still intact, then the image has not been doctored. If the watermark has been destroyed, then the image has been tampered with. Semi-fragile watermark, tell-tale watermark
3 //7 RST invariant image watermarking [][][] Rotation, Scaling, and Translation (RST) are the most challenging attacks to image watermarking. We have proposed several novel RST invariant image watermarking algorithms. An image rectification scheme and its applications in RST invariant digital image watermarking Fourier transform f ( x, y) F( u, v) Fourier transform shift invariance f ( x a, y b) F( u, v)exp( j ( au bv)) N Fourier transform -- rotation F r f r ( x, y) f (( xcos a ysin a),( xsin a ycos a)) ( u, v) F(( u cos a vsin a),( u sin a vcos a)) Fourier transform -- scaling u v f ( ax, by) F(, ) ab a b Log-polar mapping Using log-polar coordinates: u e cos v e sin The magnitude of the Fourier spectrum: I'(, ) I( ln, ) Advantage: Image scaling results in a translational shift of lnσ along the log-radius ρ axis. Image rotation results in a cyclical shift of α along the angle θ axis. Image translation has no effects in LPM domain.
4 //7 Log-polar mapping (example) Matching template We cut a small block as a matching template from the LPM domain or the spatial domain of the original image. Original image DFT LPM Cut a template optional Cut a template DFT: discrete Fourier transform LPM: log-polar mapping y x Cartesian domain LPM domain The key technique is to match the template in the log-polar domain with the watermarked image having undergone RST attacks. Five traditional filters The matching results of the five filters (without rotation or scaling) Classical matched filter G jg (, ) (, ) (, ) A G e Amplitude-only filter G, ) A (, ) A ( G Inverse filter j (, ) e G GI (, ) A (, ) Phase-only filter G jg (, ) (, ) e G Binary phase-only filter G BPOF e jbpof (, ) (, ) where, Gr BPOF(, ), Gr Gr stands for the real part of the Fourier transform G(, ) (a) Classical matched filter (b) Amplitude-only filter (c) Inv erse filter (d) Phase-only filter (e) Binary phase-only filter The matching results of the five filters (with rotation and scaling) (g) Classical matched filter (h) Amplitude-only filter (i) Inverse filter Phase-only filtering method Phase information is more important than the amplitude information in preserving the visual intelligibility. Correlation detection is only optimal in the case that the signal can be modeled as additive white Gaussian noise. Using only the phase information of the matching template and the LPM spectrum of the watermarked image undergone RST transformations. * r IFFT[ F (, ) G (, )] where jf (, ) (, ) e F G jg (, ) (, ) e (j) Phase-only filter (k) Binary phase-only filter
5 //7 The matching results of our method Rectification (rotation and scaling parameters) (a) Without rotation or scaling (b) With rotation and scaling Compute the cross-correlation between the template and the watermarked image in the LPM domain. Suppose the coordinates of the peak is (, ). We know the original position of the template is (, ) The translations in the LPM domain are: The rotation and scaling parameters in the spatial domain are: ' N' ln( rmax ) M ' ' e Scaling without rotation (a) Rotated by 5 degrees counterclockwise without scaling (c) Scaled by.7 (e) Rotated by 5 degrees counterclockwise after being scaled by.7 Application : Spatial domain Application : Fourier domain Application : LPM domain (b) Correlation with (a). The peak is (d) Correlation with (c). The peak is at (5,7). at (5,). (f) Correlation with (e). The peak is at (,). * The original template position is (5,7) Rotation with cropping Scaling and rotation 5
6 //7 JPEG compression Image quality evaluation based on watermarking [7] Limitation of existing quality metrics A common limitation of the widely used quality metrics, such as PSNR, wpsnr and Watson model: need access to the original work All of them are based on point-to-point difference calculation between the original work and degraded work in spatial domain or in frequency domain This definitely results in big inconveniences at the receiver side in a communication system when the original work is real-time signals such as TV signals Aim of developing watermarking based quality metric To find a quality estimation method which can accurately estimate image/video qualities without the access to the original image/video Digital watermarking based metric can be a good candidate since it can evaluate the image/video quality by simply evaluating the degradation of the extracted watermark Watermark is much smaller than the original work, which is easier to transmit and makes it possible for real-time quality evaluation Main idea of developing watermarkingbased quality metric Use the degradation of watermark to evaluate the quality degradation of the cover work The watermark is invisibly embedded throughout the cover work The watermark is inseparable from the cover work, which means the watermark will undergo the same transformations and distortions as the cover work The watermark can be embedded with suitable vulnerability so that the degradation of the watermark can reflect the quality degradation of the cover work Main idea of developing watermarking based quality metric The proposed scheme is based on DWT The different watermark embedding vulnerability for different cover work Watermark embedding bits Middle frequency High/low frequency Watermark embedding strength Need to: Find a balance between robustness and fidelity Improve accuracy of the results
7 JND JND //7 Automatic control system designed for the watermarking scheme The proposed watermarking-based image quality evaluation scheme Feedforward control Original image Empirical information Feedforward control Initial quantization parameters -level DWT Watermark embedder Adjusted quantization parameters Quantization parameter adjuster Feedback control Controller Emprical watermark portion -level IDWT Increment/Decrement Reference input + Controller Implementer Controlled process Measured output Watermarked image distortion The quantization parameter(s) needed to be adjusted - Disturbances Degraded watermarked image The most contributing block(s) Sensor Original watermark -level DWT Classic quality metric Gradient calculator Watermark extractor Calculated quality + N + Estimation error Acceptable? - Ideal curve Mapping Estimated quality Y Finished Feedback control Quantization method employed by the watermark embedder The watermark extraction and quality measurement Original position before embedding Final position after embedding Degraded watermarked image -level DWT Quantization coefficients Quantization parameter Watermark extractor Watermark extraction A B 5 Original watermark Q( e) DWT coefficien t even quantization parameter DWT coefficien t odd quantization parameter Ideal curve Mapping Estimated quality Quality evaluation The watermarking based quality measurement The watermarking based quality measurement -- ideal curve & mapping The image/video quality will be estimated by evaluating the degradation of the watermark (True Detection Rate) for the watermark degradation Number of successfully detected watermark bits Number of watermark bitsused for embedding Linear interpolation: T(j) Q(j) TC Q E T(j+) Q(j+) TC T( j) QE Q ( j) Q ( j) Q ( j ) T( j) T( j ) Mean Absolute Error (MAE) MAE N i Q ( i) Q ( i) C N E 7
8 Calculated wpsnr (db) Calculated PSNR (db) Calculated PSNR (db) Calculated wpsnr (db) //7 The principle behind the adjustment of watermark vulnerability Evaluation --- Original watermark JND Ideal curve JND Ideal curve Upper bounds P Adjusted result Tested result Lower bounds The by original watermark Tested curve B A C D E The estimation errors on the sample distortions were reduced at the same time Ideal curve used for estimating PSNR Experiment result estimating PSNR Estimated PSNR (db) Estimated PSNR (db) MAE =.7 db MAE =.777 db Ideal curve for estimating wpsnr Experiment result estimating wpsnr Estimiated wpsnr (db) Estimiated wpsnr (db) MAE =.9 db MAE =.797 db
9 JND Calculated JND Calcualted JND //7 Ideal curve for estimating Watson JND Experiment result estimating Watson JND Estimated JND MAE=.5JND For JND, MAE =.57 JND Estimated JND MAE =.5JND Speech quality evaluation based on watermarking [] Watermarking scheme Discrete wavelet transform Watermark bit embedding Low Pass Signal Filters High Pass Speech DWT Coefficient Levels Level Level Blocking Block Block Coefficient Selection Select first 5 largest coefficients to embed watermark Level m Block n ca cd Quantization -- Embed one bit ( or ) on each coefficient Low Pass Filters High Pass ca cd 9
10 ITU-T (P.) PESQMOS ITU -T (P.) PESQMOS ITU-T (P.) PESQMOS ITU-T (P.) PESQMOS //7 Experimental results Experimental results DWMOS DWMOS DWMOS DWMOS (a) MP compression () samples (b) Gaussian noise () samples (c) Low-pass filtering () samples (d) Packet loss () samples DWMOS --- predication of MOS DWMOS --- predication of MOS Research in process The watermarking-based image quality algorithm is applying to the MPEG- / H. video codec. The research on quality estimation against noise pollution, packet loss, and other signal processing are in process. The experiment to simulate subjective visual quality is under consideration. NSERC Strategic Project: Quality evaluation and enhancement of audiovisual signals based on digital watermarking Selected Journal Papers (RST invariant image watermarking). D.Zheng, S.Wang, and J.Zhao, An RST invariant image watermarking algorithm with mathematical modeling and analysis, to appear in IEEE Transactions on Image Processing.. D.Zheng, Y.Liu, J.Zhao and Abdulmotaleb El Saddik, A Survey of RST Invariant Image Watermarking Algorithms, ACM Computing Surveys. Vol. 9, No., Article 5, pp. -9, June 7.. Y.Liu, D.Zheng, and J.Zhao, An image rectification scheme and its applications in RST invariant digital image watermarking, Kluwer Journal: Multimedia Tools and Applications, Vol., No., pp. 57-, July 7.. D.Zheng, Y.Liu, and J.Zhao, RST invariant digital image watermarking based on a new phase-only filtering method, Elsevier Journal: Signal Processing, Vol.5, No., pp.5-7, December Y.Liu, D.Zheng, and J.Zhao, A Rectification Scheme for RST Invariant Image Watermarking, IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences, Special Section on Cryptography and Information Security, Vol. E-A, No., pp. -, January 5, LETTER.. D.Zheng, J.Zhao, and A.El Saddik, RST Invariant Digital Image Watermarking Based on Log-Polar Mapping and Phase Correlation, IEEE Transactions on Circuits and Systems for Video Technology, Special Issue on Authentication, Copyright Protection and Information Hiding, Vol., Issue, pp , August. Selected Journal Papers (quality evaluation based on digital watermarking) 7. Sha Wang, Dong Zheng, Jiying Zhao, Wa James Tam, and Filippo Speranza, An image quality evaluation method based on digital watermarking, IEEE Transactions on Circuits and Systems for Video Technology, Vol.7, No., pp.9-5, January 7.. Libin Cai, Ronghui Tu, Jiying Zhao, and Yongyi Mao, Speech quality evaluation: a new application of digital watermarking, IEEE Transactions on Instrumentation and Measurement, Vol. 5, No., pp. 5-55, February Sha Wang, Dong Zheng, Jiying Zhao, Wa James Tam, and Filippo Speranza, An Accurate Method for Image Quality Evaluation Using Digital Watermarking, IEICE Electronics Express (ELEX), Vol., No., pp.5-59, October 5.. Libin Cai and Jiying Zhao, Evaluation of speech quality using digital watermarking, IEICE Electronics Express (ELEX), Vol., No., pp. -5, October. Acknowledgement Graduate students Dong Zheng (RST invariant image watermarking, image quality evaluation) Yan Liu (RST invariant image watermarking) Ronghui Tu (audio watermarking, speech quality evaluation) Libin Cai (speech quality evaluation) Sha Wang (image/video quality evaluation) Colleagues Dr. Wa James Tam (Communications Research Centre Canada (CRC)) Dr. Filippo Speranza (CRC)
11 //7 Acknowledgement 井上智雄博士 筑波大学井上研究室 Research Center for Knowledge Communities 知的コミュニティ基盤研究センター
Image Quality Estimation of Tree Based DWT Digital Watermarks
International Journal of Engineering Research and General Science Volume 3, Issue 1, January-February, 215 ISSN 291-273 Image Quality Estimation of Tree Based DWT Digital Watermarks MALVIKA SINGH PG Scholar,
More informationDWT BASED AUDIO WATERMARKING USING ENERGY COMPARISON
DWT BASED AUDIO WATERMARKING USING ENERGY COMPARISON K.Thamizhazhakan #1, S.Maheswari *2 # PG Scholar,Department of Electrical and Electronics Engineering, Kongu Engineering College,Erode-638052,India.
More informationHigh capacity robust audio watermarking scheme based on DWT transform
High capacity robust audio watermarking scheme based on DWT transform Davod Zangene * (Sama technical and vocational training college, Islamic Azad University, Mahshahr Branch, Mahshahr, Iran) davodzangene@mail.com
More informationDigital Audio Watermarking With Discrete Wavelet Transform Using Fibonacci Numbers
Digital Audio Watermarking With Discrete Wavelet Transform Using Fibonacci Numbers P. Mohan Kumar 1, Dr. M. Sailaja 2 M. Tech scholar, Dept. of E.C.E, Jawaharlal Nehru Technological University Kakinada,
More informationFPGA implementation of DWT for Audio Watermarking Application
FPGA implementation of DWT for Audio Watermarking Application Naveen.S.Hampannavar 1, Sajeevan Joseph 2, C.B.Bidhul 3, Arunachalam V 4 1, 2, 3 M.Tech VLSI Students, 4 Assistant Professor Selection Grade
More informationDWT based high capacity audio watermarking
LETTER DWT based high capacity audio watermarking M. Fallahpour, student member and D. Megias Summary This letter suggests a novel high capacity robust audio watermarking algorithm by using the high frequency
More informationTHE STATISTICAL ANALYSIS OF AUDIO WATERMARKING USING THE DISCRETE WAVELETS TRANSFORM AND SINGULAR VALUE DECOMPOSITION
THE STATISTICAL ANALYSIS OF AUDIO WATERMARKING USING THE DISCRETE WAVELETS TRANSFORM AND SINGULAR VALUE DECOMPOSITION Mr. Jaykumar. S. Dhage Assistant Professor, Department of Computer Science & Engineering
More informationAn Enhanced Least Significant Bit Steganography Technique
An Enhanced Least Significant Bit Steganography Technique Mohit Abstract - Message transmission through internet as medium, is becoming increasingly popular. Hence issues like information security are
More informationRobust watermarking based on DWT SVD
Robust watermarking based on DWT SVD Anumol Joseph 1, K. Anusudha 2 Department of Electronics Engineering, Pondicherry University, Puducherry, India anumol.josph00@gmail.com, anusudhak@yahoo.co.in Abstract
More informationDigital Image Watermarking using MSLDIP (Modified Substitute Last Digit in Pixel)
Digital Watermarking using MSLDIP (Modified Substitute Last Digit in Pixel) Abdelmgeid A. Ali Ahmed A. Radwan Ahmed H. Ismail ABSTRACT The improvements in Internet technologies and growing requests on
More informationJournal of mathematics and computer science 11 (2014),
Journal of mathematics and computer science 11 (2014), 137-146 Application of Unsharp Mask in Augmenting the Quality of Extracted Watermark in Spatial Domain Watermarking Saeed Amirgholipour 1 *,Ahmad
More informationEffect of Embedding Multiple Watermarks in Color Image against Cropping and Salt and Pepper Noise Attacks
International Journal of IT, Engineering and Applied Sciences Research (IJIEASR) ISSN: 239-443 Volume, No., October 202 8 Effect of Embedding Multiple Watermarks in Color Image against Cropping and Salt
More informationMultiple Watermarking Scheme Using Adaptive Phase Shift Keying Technique
Multiple Watermarking Scheme Using Adaptive Phase Shift Keying Technique Wen-Yuan Chen, Jen-Tin Lin, Chi-Yuan Lin, and Jin-Rung Liu Department of Electronic Engineering, National Chin-Yi Institute of Technology,
More informationWatermarking-based Image Authentication with Recovery Capability using Halftoning and IWT
Watermarking-based Image Authentication with Recovery Capability using Halftoning and IWT Luis Rosales-Roldan, Manuel Cedillo-Hernández, Mariko Nakano-Miyatake, Héctor Pérez-Meana Postgraduate Section,
More informationData Hiding Algorithm for Images Using Discrete Wavelet Transform and Arnold Transform
J Inf Process Syst, Vol.13, No.5, pp.1331~1344, October 2017 https://doi.org/10.3745/jips.03.0042 ISSN 1976-913X (Print) ISSN 2092-805X (Electronic) Data Hiding Algorithm for Images Using Discrete Wavelet
More informationRobust Invisible QR Code Image Watermarking Algorithm in SWT Domain
Robust Invisible QR Code Image Watermarking Algorithm in SWT Domain Swathi.K 1, Ramudu.K 2 1 M.Tech Scholar, Annamacharya Institute of Technology & Sciences, Rajampet, Andhra Pradesh, India 2 Assistant
More informationGeometrically Invariant Digital Watermarking Using Robust Feature Detectors. Xiao-Chen Yuan. Doctor of Philosophy in Software Engineering
Geometrically Invariant Digital Watermarking Using Robust Feature Detectors by Xiao-Chen Yuan Doctor of Philosophy in Software Engineering 2013 Faculty of Science and Technology University of Macau Geometrically
More informationDigital Watermarking Using Homogeneity in Image
Digital Watermarking Using Homogeneity in Image S. K. Mitra, M. K. Kundu, C. A. Murthy, B. B. Bhattacharya and T. Acharya Dhirubhai Ambani Institute of Information and Communication Technology Gandhinagar
More informationImplementation of a Visible Watermarking in a Secure Still Digital Camera Using VLSI Design
2009 nternational Symposium on Computing, Communication, and Control (SCCC 2009) Proc.of CST vol.1 (2011) (2011) ACST Press, Singapore mplementation of a Visible Watermarking in a Secure Still Digital
More informationRobust Watermarking Scheme Using Phase Shift Keying Embedding
Robust Watermarking Scheme Using Phase Sht Keying Embedding Wen-Yuan Chen Chio-Tan Kuo and Jiang-Nan Jow Department of Electronic Engineering National Chin-Yi Institute of Technology Taichung Taiwan R.O.C.
More informationCERIAS Tech Report
CERIAS Tech Report 2001-74 A Review of Fragile Image Watermarks by Eugene T. Lin and Edward J. Delp Center for Education and Research in Information Assurance and Security, Purdue University, West Lafayette,
More informationIntroduction to Audio Watermarking Schemes
Introduction to Audio Watermarking Schemes N. Lazic and P. Aarabi, Communication over an Acoustic Channel Using Data Hiding Techniques, IEEE Transactions on Multimedia, Vol. 8, No. 5, October 2006 Multimedia
More informationSteganography & Steganalysis of Images. Mr C Rafferty Msc Comms Sys Theory 2005
Steganography & Steganalysis of Images Mr C Rafferty Msc Comms Sys Theory 2005 Definitions Steganography is hiding a message in an image so the manner that the very existence of the message is unknown.
More informationMODELLING OF GEOMETRIC ATTACKS FOR DIGITAL IMAGE WATERMARKING
MODELLING OF GEOMETRIC ATTACKS FOR DIGITAL IMAGE WATERMARKING Vaishali Jabade Research Student, Electronics Dept., Walchand Institute of Technology, Solapur, India Dr. Sachin Gengaje Head, Electronics
More informationA Visual Cryptography Based Watermark Technology for Individual and Group Images
A Visual Cryptography Based Watermark Technology for Individual and Group Images Azzam SLEIT (Previously, Azzam IBRAHIM) King Abdullah II School for Information Technology, University of Jordan, Amman,
More informationREVERSIBLE MEDICAL IMAGE WATERMARKING TECHNIQUE USING HISTOGRAM SHIFTING
REVERSIBLE MEDICAL IMAGE WATERMARKING TECHNIQUE USING HISTOGRAM SHIFTING S.Mounika 1, M.L. Mittal 2 1 Department of ECE, MRCET, Hyderabad, India 2 Professor Department of ECE, MRCET, Hyderabad, India ABSTRACT
More informationAudio Authenticity and Tampering Detection based on Information Hiding and Collatz p-bit Code
Journal of Information Hiding and Multimedia Signal Processing c 2017 ISSN 2073-4212 Ubiquitous International Volume 8, Number 6, November 2017 Audio Authenticity and Tampering Detection based on Information
More informationBlind Image Fidelity Assessment Using the Histogram
Blind Image Fidelity Assessment Using the Histogram M. I. Khalil Abstract An image fidelity assessment and tamper detection using two histogram components of the color image is presented in this paper.
More informationAudio Fingerprinting using Fractional Fourier Transform
Audio Fingerprinting using Fractional Fourier Transform Swati V. Sutar 1, D. G. Bhalke 2 1 (Department of Electronics & Telecommunication, JSPM s RSCOE college of Engineering Pune, India) 2 (Department,
More informationAnalysis of Secure Text Embedding using Steganography
Analysis of Secure Text Embedding using Steganography Rupinder Kaur Department of Computer Science and Engineering BBSBEC, Fatehgarh Sahib, Punjab, India Deepak Aggarwal Department of Computer Science
More informationEfficient and Robust Audio Watermarking for Content Authentication and Copyright Protection
Efficient and Robust Audio Watermarking for Content Authentication and Copyright Protection Neethu V PG Scholar, Dept. of ECE, Coimbatore Institute of Technology, Coimbatore, India. R.Kalaivani Assistant
More informationROBUST HASHING FOR IMAGE AUTHENTICATION USING ZERNIKE MOMENTS, GABOR WAVELETS AND HISTOGRAM FEATURES
ROBUST HASHING FOR IMAGE AUTHENTICATION USING ZERNIKE MOMENTS, GABOR WAVELETS AND HISTOGRAM FEATURES Bini Babu 1, Keerthi A. S. Pillai 2 1,2 Computer Science & Engineering, Kerala University, (India) ABSTRACT
More informationExploration of Least Significant Bit Based Watermarking and Its Robustness against Salt and Pepper Noise
Exploration of Least Significant Bit Based Watermarking and Its Robustness against Salt and Pepper Noise Kamaldeep Joshi, Rajkumar Yadav, Sachin Allwadhi Abstract Image steganography is the best aspect
More informationModified Skin Tone Image Hiding Algorithm for Steganographic Applications
Modified Skin Tone Image Hiding Algorithm for Steganographic Applications Geetha C.R., and Dr.Puttamadappa C. Abstract Steganography is the practice of concealing messages or information in other non-secret
More informationThe main object of all types of watermarking algorithm is to
Transformed Domain Audio Watermarking Using DWT and DCT Mrs. Pooja Saxena and Prof. Sandeep Agrawal poojaetc@gmail.com Abstract The main object of all types of watermarking algorithm is to improve performance
More informationReversible data hiding based on histogram modification using S-type and Hilbert curve scanning
Advances in Engineering Research (AER), volume 116 International Conference on Communication and Electronic Information Engineering (CEIE 016) Reversible data hiding based on histogram modification using
More informationData Embedding Using Phase Dispersion. Chris Honsinger and Majid Rabbani Imaging Science Division Eastman Kodak Company Rochester, NY USA
Data Embedding Using Phase Dispersion Chris Honsinger and Majid Rabbani Imaging Science Division Eastman Kodak Company Rochester, NY USA Abstract A method of data embedding based on the convolution of
More informationPattern Recognition 41 (2008) Contents lists available at ScienceDirect. Pattern Recognition
Pattern Recognition 41 (2008) 3497 -- 3506 Contents lists available at ScienceDirect Pattern Recognition journal homepage: www.elsevier.com/locate/pr Dual watermark for image tamper detection and recovery
More informationHIGH QUALITY AUDIO CODING AT LOW BIT RATE USING WAVELET AND WAVELET PACKET TRANSFORM
HIGH QUALITY AUDIO CODING AT LOW BIT RATE USING WAVELET AND WAVELET PACKET TRANSFORM DR. D.C. DHUBKARYA AND SONAM DUBEY 2 Email at: sonamdubey2000@gmail.com, Electronic and communication department Bundelkhand
More informationA Blind EMD-based Audio Watermarking using Quantization
768 A Blind EMD-based Audio Watermaring using Quantization Chinmay Maiti 1, Bibhas Chandra Dhara 2 Department of Computer Science & Engineering, CEMK, W.B., India, chinmay@cem.ac.in 1 Department of Information
More informationAn Audio Fingerprint Algorithm Based on Statistical Characteristics of db4 Wavelet
Journal of Information & Computational Science 8: 14 (2011) 3027 3034 Available at http://www.joics.com An Audio Fingerprint Algorithm Based on Statistical Characteristics of db4 Wavelet Jianguo JIANG
More informationVARIABLE-RATE STEGANOGRAPHY USING RGB STEGO- IMAGES
VARIABLE-RATE STEGANOGRAPHY USING RGB STEGO- IMAGES Ayman M. Abdalla, PhD Dept. of Multimedia Systems, Al-Zaytoonah University, Amman, Jordan Abstract A new algorithm is presented for hiding information
More informationAudio Signal Compression using DCT and LPC Techniques
Audio Signal Compression using DCT and LPC Techniques P. Sandhya Rani#1, D.Nanaji#2, V.Ramesh#3,K.V.S. Kiran#4 #Student, Department of ECE, Lendi Institute Of Engineering And Technology, Vizianagaram,
More informationScienceDirect. A Novel DWT based Image Securing Method using Steganography
Available online at www.sciencedirect.com ScienceDirect Procedia Computer Science 46 (2015 ) 612 618 International Conference on Information and Communication Technologies (ICICT 2014) A Novel DWT based
More informationAudio Watermarking Using Pseudorandom Sequences Based on Biometric Templates
72 JOURNAL OF COMPUTERS, VOL., NO., MARCH 2 Audio Watermarking Using Pseudorandom Sequences Based on Biometric Templates Malay Kishore Dutta Department of Electronics Engineering, GCET, Greater Noida,
More informationA TWO-PART PREDICTIVE CODER FOR MULTITASK SIGNAL COMPRESSION. Scott Deeann Chen and Pierre Moulin
A TWO-PART PREDICTIVE CODER FOR MULTITASK SIGNAL COMPRESSION Scott Deeann Chen and Pierre Moulin University of Illinois at Urbana-Champaign Department of Electrical and Computer Engineering 5 North Mathews
More informationLocalized Robust Audio Watermarking in Regions of Interest
Localized Robust Audio Watermarking in Regions of Interest W Li; X Y Xue; X Q Li Department of Computer Science and Engineering University of Fudan, Shanghai 200433, P. R. China E-mail: weili_fd@yahoo.com
More informationIMAGE STEGANOGRAPHY USING MODIFIED KEKRE ALGORITHM
IMAGE STEGANOGRAPHY USING MODIFIED KEKRE ALGORITHM Shyam Shukla 1, Aparna Dixit 2 1 Information Technology, M.Tech, MBU, (India) 2 Computer Science, B.Tech, GGSIPU, (India) ABSTRACT The main goal of steganography
More informationA Source and Channel-Coding Framework for Vector-Based Data Hiding in Video
630 IEEE TRANSACTIONS ON CIRCUITS AND SYSTEMS FOR VIDEO TECHNOLOGY, VOL. 10, NO. 4, JUNE 2000 A Source and Channel-Coding Framework for Vector-Based Data Hiding in Video Debargha Mukherjee, Member, IEEE,
More informationAudio Data Verification and Authentication using Frequency Modulation Based Watermarking
Dublin Institute of Technology ARROW@DIT Articles School of Electrical and Electronic Engineering 2008-01-01 Audio Data Verification and Authentication using Frequency Modulation Based Watermarking Jonathan
More informationThe Scientist and Engineer's Guide to Digital Signal Processing By Steven W. Smith, Ph.D.
The Scientist and Engineer's Guide to Digital Signal Processing By Steven W. Smith, Ph.D. Home The Book by Chapters About the Book Steven W. Smith Blog Contact Book Search Download this chapter in PDF
More informationAPPLYING EDGE INFORMATION IN YCbCr COLOR SPACE ON THE IMAGE WATERMARKING
APPLYING EDGE INFORMATION IN YCbCr COLOR SPACE ON THE IMAGE WATERMARKING Mansur Jaba 1, Mosbah Elsghair 2, Najib Tanish 1 and Abdusalam Aburgiga 2 1 Alpha University, Serbia and 2 John Naisbitt University,
More informationHigh Capacity Audio Watermarking Based on Fibonacci Series
2017 IJSRST Volume 3 Issue 8 Print ISSN: 2395-6011 Online ISSN: 2395-602X Themed Section: Scienceand Technology High Capacity Audio Watermarking Based on Fibonacci Series U. Hari krishna 1, M. Sreedhar
More informationPractical Content-Adaptive Subsampling for Image and Video Compression
Practical Content-Adaptive Subsampling for Image and Video Compression Alexander Wong Department of Electrical and Computer Eng. University of Waterloo Waterloo, Ontario, Canada, N2L 3G1 a28wong@engmail.uwaterloo.ca
More informationSpread Spectrum Watermarking Using HVS Model and Wavelets in JPEG 2000 Compression
Spread Spectrum Watermarking Using HVS Model and Wavelets in JPEG 2000 Compression Khaly TALL 1, Mamadou Lamine MBOUP 1, Sidi Mohamed FARSSI 1, Idy DIOP 1, Abdou Khadre DIOP 1, Grégoire SISSOKO 2 1. Laboratoire
More informationDynamic Collage Steganography on Images
ISSN 2278 0211 (Online) Dynamic Collage Steganography on Images Aswathi P. S. Sreedhi Deleepkumar Maya Mohanan Swathy M. Abstract: Collage steganography, a type of steganographic method, introduced to
More informationScale estimation in two-band filter attacks on QIM watermarks
Scale estimation in two-band filter attacks on QM watermarks Jinshen Wang a,b, vo D. Shterev a, and Reginald L. Lagendijk a a Delft University of Technology, 8 CD Delft, etherlands; b anjing University
More informationBackground Dirty Paper Coding Codeword Binning Code construction Remaining problems. Information Hiding. Phil Regalia
Information Hiding Phil Regalia Department of Electrical Engineering and Computer Science Catholic University of America Washington, DC 20064 regalia@cua.edu Baltimore IEEE Signal Processing Society Chapter,
More informationJayalakshmi M., S. N. Merchant, Uday B. Desai SPANN Lab, Indian Institute of Technology, Bombay jlakshmi, merchant,
SIGNIFICANT PIXEL WATERMARKING IN CONTOURLET OMAIN Jayalakshmi M., S. N. Merchant, Uday B. esai SPANN Lab, Indian Institute of Technology, Bombay email: jlakshmi, merchant, ubdesai @ee.iitb.ac.in Keywords:
More informationDetection of Image Forgery was Created from Bitmap and JPEG Images using Quantization Table
Detection of Image Forgery was Created from Bitmap and JPEG Images using Quantization Tran Dang Hien University of Engineering and Eechnology, VietNam National Univerity, VietNam Pham Van At Department
More informationForensic Hash for Multimedia Information
Forensic Hash for Multimedia Information Wenjun Lu, Avinash L. Varna and Min Wu Department of Electrical and Computer Engineering, University of Maryland, College Park, U.S.A email: {wenjunlu, varna, minwu}@eng.umd.edu
More informationAudio and Speech Compression Using DCT and DWT Techniques
Audio and Speech Compression Using DCT and DWT Techniques M. V. Patil 1, Apoorva Gupta 2, Ankita Varma 3, Shikhar Salil 4 Asst. Professor, Dept.of Elex, Bharati Vidyapeeth Univ.Coll.of Engg, Pune, Maharashtra,
More information11th International Conference on, p
NAOSITE: Nagasaki University's Ac Title Audible secret keying for Time-spre Author(s) Citation Matsumoto, Tatsuya; Sonoda, Kotaro Intelligent Information Hiding and 11th International Conference on, p
More informationImage Compression Supported By Encryption Using Unitary Transform
Image Compression Supported By Encryption Using Unitary Transform Arathy Nair 1, Sreejith S 2 1 (M.Tech Scholar, Department of CSE, LBS Institute of Technology for Women, Thiruvananthapuram, India) 2 (Assistant
More informationEmbedding and Extracting Two Separate Images Signal in Salt & Pepper Noises in Digital Images based on Watermarking
3rd International Conference on Pattern Recognition and Image Analysis (IPRIA 2017) April 19-20, 2017 Embedding and Extracting Two Separate Images Signal in Salt & Pepper Noises in Digital Images based
More informationDigital Image Watermarking by Spread Spectrum method
Digital Image Watermarking by Spread Spectrum method Andreja Samčovi ović Faculty of Transport and Traffic Engineering University of Belgrade, Serbia Belgrade, november 2014. I Spread Spectrum Techniques
More informationInternational Journal of Advance Engineering and Research Development IMAGE BASED STEGANOGRAPHY REVIEW OF LSB AND HASH-LSB TECHNIQUES
Scientific Journal of Impact Factor (SJIF) : 3.134 ISSN (Print) : 2348-6406 ISSN (Online): 2348-4470 ed International Journal of Advance Engineering and Research Development IMAGE BASED STEGANOGRAPHY REVIEW
More informationThe Influence of Image Enhancement Filters on a Watermark Detection Rate Authors
acta graphica 194 udc 004.056.55:655.36 original scientific paper received: -09-011 accepted: 11-11-011 The Influence of Image Enhancement Filters on a Watermark Detection Rate Authors Ante Poljičak, Lidija
More informationWavelet-based Image Splicing Forgery Detection
Wavelet-based Image Splicing Forgery Detection 1 Tulsi Thakur M.Tech (CSE) Student, Department of Computer Technology, basiltulsi@gmail.com 2 Dr. Kavita Singh Head & Associate Professor, Department of
More informationISSN (PRINT): , (ONLINE): , VOLUME-4, ISSUE-11,
FPGA IMPLEMENTATION OF LSB REPLACEMENT STEGANOGRAPHY USING DWT M.Sathya 1, S.Chitra 2 Assistant Professor, Prince Dr. K.Vasudevan College of Engineering and Technology ABSTRACT An enhancement of data protection
More informationZero-Based Code Modulation Technique for Digital Video Fingerprinting
Zero-Based Code Modulation Technique for Digital Video Fingerprinting In Koo Kang 1, Hae-Yeoun Lee 1, Won-Young Yoo 2, and Heung-Kyu Lee 1 1 Department of EECS, Korea Advanced Institute of Science and
More informationPAPER Robust High-Capacity Audio Watermarking Based on FFT Amplitude Modification
IEICE TRANS. INF. & SYST., VOL.E93 D, NO.1 JANUARY 2010 87 PAPER Robust High-Capacity Audio Watermarking Based on FFT Amplitude Modification Mehdi FALLAHPOUR a), Student Member and David MEGÍAS, Nonmember
More informationA Novel Image Steganography Based on Contourlet Transform and Hill Cipher
Journal of Information Hiding and Multimedia Signal Processing c 2015 ISSN 2073-4212 Ubiquitous International Volume 6, Number 5, September 2015 A Novel Image Steganography Based on Contourlet Transform
More informationRobust and Blind Spatial Watermarking in Digital Image
Robust and lind Spatial Watermarking in Digital Image Santi Prasad Maity Malay Kumar Kundu Dept.of Electronics Telecomm. Machine Intelligence Unit.E.College(D.U.) Indian Statical Institute Howrah -711
More informationWhy Visual Quality Assessment?
Why Visual Quality Assessment? Sample image-and video-based applications Entertainment Communications Medical imaging Security Monitoring Visual sensing and control Art Why Visual Quality Assessment? What
More informationAudio Compression using the MLT and SPIHT
Audio Compression using the MLT and SPIHT Mohammed Raad, Alfred Mertins and Ian Burnett School of Electrical, Computer and Telecommunications Engineering University Of Wollongong Northfields Ave Wollongong
More informationBasic concepts of Digital Watermarking. Prof. Mehul S Raval
Basic concepts of Digital Watermarking Prof. Mehul S Raval Mutual dependencies Perceptual Transparency Payload Robustness Security Oblivious Versus non oblivious Cryptography Vs Steganography Cryptography
More informationEE 351M Digital Signal Processing
EE 351M Digital Signal Processing Course Details Objective Establish a background in Digital Signal Processing Theory Required Text Discrete-Time Signal Processing, Prentice Hall, 2 nd Edition Alan Oppenheim,
More informationArmor on Digital Images Captured Using Photoelectric Technique by Absolute Watermarking Approach
American Journal of Science, Engineering and Technology 2017; 2(1): 33-38 http://www.sciencepublishinggroup.com/j/ajset doi: 10.11648/j.ajset.20170201.16 Methodology Article Armor on Digital Images Captured
More informationARTICLE IN PRESS. Signal Processing
Signal Processing 9 (1) 467 479 Contents lists available at ScienceDirect Signal Processing journal homepage: www.elsevier.com/locate/sigpro Watermarking via zero assigned filter banks Zeynep Yücel,A.Bülent
More informationMultiresolution Watermarking for Digital Images
IEEE TRANSACTIONS ON CIRCUITS AND SYSTEMS II: ANALOG AND DIGITAL SIGNAL PROCESSING, VOL. 45, NO. 8, AUGUST 1998 1097 looks amplitude) of San Francisco Bay. Lee s refined filter tends to overly segment
More informationRGB Image Reconstruction Using Two-Separated Band Reject Filters
RGB Image Reconstruction Using Two-Separated Band Reject Filters Muthana H. Hamd Computer/ Faculty of Engineering, Al Mustansirya University Baghdad, Iraq ABSTRACT Noises like impulse or Gaussian noise
More informationOptimization Method of Redundant Coefficients for Multiple Description Image Coding
1 2 Optimization Method of Redundant Coefficients for Multiple Description Image Coding Takaaki Ishikawa 1 and Hiroshi Watanabe 2 We propose a new optimization method of redundant coefficients for multiple
More informationColored Digital Image Watermarking using the Wavelet Technique
American Journal of Applied Sciences 4 (9): 658-662, 2007 ISSN 1546-9239 2007 Science Publications Corresponding Author: Colored Digital Image Watermarking using the Wavelet Technique 1 Mohammed F. Al-Hunaity,
More informationInternational Journal of Digital Application & Contemporary research Website: (Volume 1, Issue 7, February 2013)
Performance Analysis of OFDM under DWT, DCT based Image Processing Anshul Soni soni.anshulec14@gmail.com Ashok Chandra Tiwari Abstract In this paper, the performance of conventional discrete cosine transform
More informationSubband Analysis of Time Delay Estimation in STFT Domain
PAGE 211 Subband Analysis of Time Delay Estimation in STFT Domain S. Wang, D. Sen and W. Lu School of Electrical Engineering & Telecommunications University of ew South Wales, Sydney, Australia sh.wang@student.unsw.edu.au,
More informationWatermarking Still Images Using Parametrized Wavelet Systems
Watermarking Still Images Using Parametrized Wavelet Systems Zhuan Qing Huang and Zhuhan Jiang School of Computing and IT, University of Western Sydney, NSW 2150, Australia zhuang@cit.uws.edu.au, z.jiang@uws.edu.au
More informationAn Optimal Pixel-level Self-repairing Authentication. Method for Grayscale Images under a Minimax. Criterion of Distortion Reduction*
An Optimal Pixel-level Self-repairing Authentication Method for Grayscale Images under a Minimax Criterion of Distortion Reduction* Che-Wei Lee 1 and Wen-Hsiang Tsai 1, 2, 1 Department of Computer Science
More informationKeywords Secret data, Host data, DWT, LSB substitution.
Volume 5, Issue 3, March 2015 ISSN: 2277 128X International Journal of Advanced Research in Computer Science and Software Engineering Research Paper Available online at: www.ijarcsse.com Performance Evaluation
More informationA Survey of Substantial Digital Image Watermarking Techniques
A Survey of Substantial Digital Image Watermarking Techniques Neha Sharma 1, Rasmiranjan Samantray 2 1 Central College of Engineering and Management, Kabir Nagar, Raipur. Chhattisgarh Swami Vivekananda
More informationA New Scheme for No Reference Image Quality Assessment
Author manuscript, published in "3rd International Conference on Image Processing Theory, Tools and Applications, Istanbul : Turkey (2012)" A New Scheme for No Reference Image Quality Assessment Aladine
More informationHistogram Modification Based Reversible Data Hiding Using Neighbouring Pixel Differences
Histogram Modification Based Reversible Data Hiding Using Neighbouring Pixel Differences Ankita Meenpal*, Shital S Mali. Department of Elex. & Telecomm. RAIT, Nerul, Navi Mumbai, Mumbai, University, India
More informationSound Quality Evaluation for Audio Watermarking Based on Phase Shift Keying Using BCH Code
IEICE TRANS. INF. & SYST., VOL.E98 D, NO.1 JANUARY 2015 89 LETTER Special Section on Enriched Multimedia Sound Quality Evaluation for Audio Watermarking Based on Phase Shift Keying Using BCH Code Harumi
More informationAn Implementation of LSB Steganography Using DWT Technique
An Implementation of LSB Steganography Using DWT Technique G. Raj Kumar, M. Maruthi Prasada Reddy, T. Lalith Kumar Electronics & Communication Engineering #,JNTU A University Electronics & Communication
More informationA Novel Approach of Compressing Images and Assessment on Quality with Scaling Factor
A Novel Approach of Compressing Images and Assessment on Quality with Scaling Factor Umesh 1,Mr. Suraj Rana 2 1 M.Tech Student, 2 Associate Professor (ECE) Department of Electronic and Communication Engineering
More informationImproved Spread Spectrum: A New Modulation Technique for Robust Watermarking
898 IEEE TRANSACTIONS ON SIGNAL PROCESSING, VOL. 51, NO. 4, APRIL 2003 Improved Spread Spectrum: A New Modulation Technique for Robust Watermarking Henrique S. Malvar, Fellow, IEEE, and Dinei A. F. Florêncio,
More informationLossless Image Watermarking for HDR Images Using Tone Mapping
IJCSNS International Journal of Computer Science and Network Security, VOL.13 No.5, May 2013 113 Lossless Image Watermarking for HDR Images Using Tone Mapping A.Nagurammal 1, T.Meyyappan 2 1 M. Phil Scholar
More informationHiding Image in Image by Five Modulus Method for Image Steganography
Hiding Image in Image by Five Modulus Method for Image Steganography Firas A. Jassim Abstract This paper is to create a practical steganographic implementation to hide color image (stego) inside another
More informationA Scheme for Digital Audio Watermarking Using Empirical Mode Decomposition with IMF
International Journal of Research Studies in Science, Engineering and Technology Volume 1, Issue 7, October 2014, PP 7-12 ISSN 2349-4751 (Print) & ISSN 2349-476X (Online) A Scheme for Digital Audio Watermarking
More informationPassport Authentication Using PNG Image with Data Repair Capability
Passport Authentication Using PNG Image with Data Repair Capability Aswathi Muralidharan, Maria Johnson, Roshna Raj, Deepika M P Abstract The system Passport Authentication Using PNG Image with Data Repair
More information