SlideShare a Scribd company logo
1 of 20
Dr. M. T. Somashekara
Associate Professor,
Department of Computer Science and
Applications,
Bangalore University, Bengaluru, India.
Under the Guidance of,
Pavan. A. C
Research Scholar,
Department of Computer Science and
Applications,
Bangalore University, Bengaluru, India.
Presented By,
An Approach for Detecting and Restoring
Tampering in Digital Image Watermarking
5th International Conference on Cognitive Computing and
Information Processing (CCIP 2023)
5th International Conference on Cognitive Computing and Information Processing (CCIP 2023) 15th & 16th DEC 2023
1.
2.
3.
4.
5.
6.
L I T E R A T U R E S U R V E Y
I N T R O D U C T I O N
E X P E R I M E N T A L R E S U L T S
M E T H O D O L O G Y
C O N C L U S I O N
R E F E R E N C E S
2
Introduction
5th International Conference on Cognitive Computing and Information Processing (CCIP 2023) 15th & 16th DEC 2023 3
What is Digital
Image
Watermarking?
• Digital image watermarking is a technique used to embed
information, often in the form of a digital watermark or a
code, into a digital image.
• The purpose of digital image watermarking is to provide a
way to verify the authenticity or ownership of an image,
protect against unauthorized use, and track the
distribution of digital media.
5th International Conference on Cognitive Computing and Information Processing (CCIP 2023) 15th & 16th DEC 2023 4
• Proposed method defines the tampering
as a source coding problem and hence
develop a watermark which could help in
self-recovery of the tampered image.
• The method includes compressing the
original image by source coding using
SPIHT algorithm.
Tamper Detection
with JPEG
Compression
Tamper Detection
with LSB-MSB
• Replace each image block's least significant
bits (LSB) with bits generated from that
block's most significant bits (MSB)
• These methods are ineffective against noise
assaults
5th International Conference on Cognitive Computing and Information Processing (CCIP 2023) 15th & 16th DEC 2023 5
Literature
Survey
5th International Conference on Cognitive Computing and Information Processing (CCIP 2023) 15th & 16th DEC 2023 6
Literature Survey
2011
Z. Qian, G. Feng,
Inpainting assisted
self-recovery with
decreased embedding
data.
J. Fridrich, et. al The
DCT values which
were quantized along
with the version
generated by low
depth of the original
image can be used as
important features for
generating.
1999
S. Sarreshtedari,
M.A. Akhaee, Source-
channel coding
approach to generate
tamperproof images.
2014
P. Korus, J. Biaas, A.
Dziech, Towards
practical self-
embedding for JPEG-
compressed digital
images.
2015
Saeed Sarreshtedari,
et. al Source-channel
coding-based
watermarking for self-
embedding of JPEG
images.
2017
5th International Conference on Cognitive Computing and Information Processing (CCIP 2023) 15th & 16th DEC 2023 7
Methodology
5th International Conference on Cognitive Computing and Information Processing (CCIP 2023) 15th & 16th DEC 2023 8
Embedding
Algorithm
Sender Side
5th International Conference on Cognitive Computing and Information Processing (CCIP 2023) 15th & 16th DEC 2023 9
Embedding
Algorithm
Receiver Side
5th International Conference on Cognitive Computing and Information Processing (CCIP 2023) 15th & 16th DEC 2023 10
Algorithms
with
Methodology
Compression of Lossy Data
DCT is applied to compress the image
SPIHT
Used for source coding
LDPC Codes
Channel coding algorithm to detect the
error and make the recovery
Embedding of Watermark
Watermark will be embedded bit by bit
Restoration of an Image
Identify the manipulated bits
Tampering Detection
Comparing and detection of tamper
using Thresholding, erosion and dilation
5th International Conference on Cognitive Computing and Information Processing (CCIP 2023) 15th & 16th DEC 2023 1
Experimental
Results
5th International Conference on Cognitive Computing and Information Processing (CCIP 2023) 15th & 16th DEC 2023 1
Tampering Rate 15%-17%
Tampering
Original image may be
restored by the proposed
method as long as the
tampering and these
additional attacks leads to
tampering of the watermarked
image within 17.2%.
Image Size
Proposed scheme is tested on
8-bit 512 × 512 grey-scale
image
Attacks
The results are robust against
the attacks such as noise
addition and recompression
on the received image along
with tampering.
5th International Conference on Cognitive Computing and Information Processing (CCIP 2023) 15th & 16th DEC 2023 13
5th International Conference on Cognitive Computing and Information Processing (CCIP 2023) 15th & 16th DEC 2023
Original Image Tampered Image
Compressed Image
Image Representation
1
5th International Conference on Cognitive Computing and Information Processing (CCIP 2023) 15th & 16th DEC 2023
Thresholding and opening
Result
Tampering Map Recovered Image
Image Representation
1
Conclusion
5th International Conference on Cognitive Computing and Information Processing (CCIP 2023) 15th & 16th DEC 2023 16
5th International Conference on Cognitive Computing and Information Processing (CCIP 2023) 15th & 16th DEC 2023
A tamper proof watermark embedding process has been
proposed in this paper.
A tamper proof watermark embedding process has been
adapted suitably with respect to the standard JPEG
compression chain.
Since, compression reduces the redundancy of image and
available capacity for watermark embedding is limited, the
recovery of tampering is also up to certain tolerable rate.
Recovery of the original image significantly depends on size
of the watermark string embedded into it.
1
References
5th International Conference on Cognitive Computing and Information Processing (CCIP 2023) 15th & 16th DEC 2023 18
5th International Conference on Cognitive Computing and Information Processing (CCIP 2023) 15th & 16th DEC 2023
• Saeed Sarreshtedari, Mohammad Ali Akhaee, AliazamAbbasfar, "Source-channel coding-based
watermarking for self-embedding of JPEG images", Electrical and Computer Engg., University
of Tehran, 2017, pp 107-116
• J. Fridrich, M. Goljan, (1999) Images with self-correcting capabilities, in: Proc. Int. Conf. on
Image Processing, Vol. 3, pp. 792–796
• Z. Qian, G. Feng, Inpainting assisted self-recovery with decreased embedding data, IEEEFigure
6 Received tampered image X. Zhang, Z. Qian, Y. Ren, G. Feng, Watermarking with flexible self-
recovery quality based on compressive sensing and compositive reconstruction, IEEE Trans.
Inform.Forensics Secur. 6 (4) (2011) 1223–1232.
• P. Korus, J. Biaas, A. Dziech, Towards practical self-embedding for JPEG-compressed digital
images, IEEE Trans. Multimedia 17 (2) (2015) 157–170.
http://dx.doi.org/10.1109/TMM.2014.2368696.
• S. Sarreshtedari, M.A. Akhaee, A source-channel coding approach to digital image protection
and self-recovery, IEEE Trans. Image Process. 24 (7) (2015) 2266–2277.
• S. Sarreshtedari, M.A. Akhaee, Source-channel coding approach to generate tamperproof
images, in: IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP),
2014, pp. 7435– 7439, doi:10.1109/ICASSP.2014.6855045.
1
Thank You..!

More Related Content

Similar to CCIP-23_PavanAC.pptx

s41598-023-28094-1.pdf
s41598-023-28094-1.pdfs41598-023-28094-1.pdf
s41598-023-28094-1.pdfarchurssu
 
Presentation_Format (1).ppt
Presentation_Format (1).pptPresentation_Format (1).ppt
Presentation_Format (1).pptPavanNagre6
 
Optimized WES-System with Image Bit Embedding for Enhancing the Security of H...
Optimized WES-System with Image Bit Embedding for Enhancing the Security of H...Optimized WES-System with Image Bit Embedding for Enhancing the Security of H...
Optimized WES-System with Image Bit Embedding for Enhancing the Security of H...IRJET Journal
 
Image Steganography: An Inevitable Need for Data Security, Authors: Sneh Rach...
Image Steganography: An Inevitable Need for Data Security, Authors: Sneh Rach...Image Steganography: An Inevitable Need for Data Security, Authors: Sneh Rach...
Image Steganography: An Inevitable Need for Data Security, Authors: Sneh Rach...Rajesh Kumar
 
Symbols Frequency based Image Coding for Compression
Symbols Frequency based Image Coding for CompressionSymbols Frequency based Image Coding for Compression
Symbols Frequency based Image Coding for CompressionIJCSIS Research Publications
 
Unified Approach With Neural Network for Authentication, Security and Compres...
Unified Approach With Neural Network for Authentication, Security and Compres...Unified Approach With Neural Network for Authentication, Security and Compres...
Unified Approach With Neural Network for Authentication, Security and Compres...CSCJournals
 
A hybrid predictive technique for lossless image compression
A hybrid predictive technique for lossless image compressionA hybrid predictive technique for lossless image compression
A hybrid predictive technique for lossless image compressionjournalBEEI
 
IRJET- Wearable AI Device for Blind
IRJET- Wearable AI Device for BlindIRJET- Wearable AI Device for Blind
IRJET- Wearable AI Device for BlindIRJET Journal
 
System for Detecting Deepfake in Videos – A Survey
System for Detecting Deepfake in Videos – A SurveySystem for Detecting Deepfake in Videos – A Survey
System for Detecting Deepfake in Videos – A SurveyIRJET Journal
 
An Improved Noise Resistant Image Steganography Technique using Zero Cross Ed...
An Improved Noise Resistant Image Steganography Technique using Zero Cross Ed...An Improved Noise Resistant Image Steganography Technique using Zero Cross Ed...
An Improved Noise Resistant Image Steganography Technique using Zero Cross Ed...IRJET Journal
 
A Secure & Optimized Data Hiding Technique Using DWT With PSNR Value
A Secure & Optimized Data Hiding Technique Using DWT With PSNR ValueA Secure & Optimized Data Hiding Technique Using DWT With PSNR Value
A Secure & Optimized Data Hiding Technique Using DWT With PSNR ValueIJERA Editor
 
Ijri ece-01-01 joint data hiding and compression based on saliency and smvq
Ijri ece-01-01 joint data hiding and compression based on saliency and smvqIjri ece-01-01 joint data hiding and compression based on saliency and smvq
Ijri ece-01-01 joint data hiding and compression based on saliency and smvqIjripublishers Ijri
 
Developing and comparing an encoding system using vector quantization &
Developing and comparing an encoding system using vector quantization &Developing and comparing an encoding system using vector quantization &
Developing and comparing an encoding system using vector quantization &IAEME Publication
 
Developing and comparing an encoding system using vector quantization &
Developing and comparing an encoding system using vector quantization &Developing and comparing an encoding system using vector quantization &
Developing and comparing an encoding system using vector quantization &IAEME Publication
 
A Study of Image Tampering Detection
A Study of Image Tampering DetectionA Study of Image Tampering Detection
A Study of Image Tampering DetectionIRJET Journal
 
76201950
7620195076201950
76201950IJRAT
 
Developing Algorithms for Image Steganography and Increasing the Capacity Dep...
Developing Algorithms for Image Steganography and Increasing the Capacity Dep...Developing Algorithms for Image Steganography and Increasing the Capacity Dep...
Developing Algorithms for Image Steganography and Increasing the Capacity Dep...IJCNCJournal
 
DEVELOPING ALGORITHMS FOR IMAGE STEGANOGRAPHY AND INCREASING THE CAPACITY DEP...
DEVELOPING ALGORITHMS FOR IMAGE STEGANOGRAPHY AND INCREASING THE CAPACITY DEP...DEVELOPING ALGORITHMS FOR IMAGE STEGANOGRAPHY AND INCREASING THE CAPACITY DEP...
DEVELOPING ALGORITHMS FOR IMAGE STEGANOGRAPHY AND INCREASING THE CAPACITY DEP...IJCNCJournal
 
MULTIPLE CAUSAL WINDOW BASED REVERSIBLE DATA EMBEDDING
MULTIPLE CAUSAL WINDOW BASED REVERSIBLE DATA EMBEDDINGMULTIPLE CAUSAL WINDOW BASED REVERSIBLE DATA EMBEDDING
MULTIPLE CAUSAL WINDOW BASED REVERSIBLE DATA EMBEDDINGijistjournal
 
MULTIPLE CAUSAL WINDOW BASED REVERSIBLE DATA EMBEDDING
MULTIPLE CAUSAL WINDOW BASED REVERSIBLE DATA EMBEDDINGMULTIPLE CAUSAL WINDOW BASED REVERSIBLE DATA EMBEDDING
MULTIPLE CAUSAL WINDOW BASED REVERSIBLE DATA EMBEDDINGijistjournal
 

Similar to CCIP-23_PavanAC.pptx (20)

s41598-023-28094-1.pdf
s41598-023-28094-1.pdfs41598-023-28094-1.pdf
s41598-023-28094-1.pdf
 
Presentation_Format (1).ppt
Presentation_Format (1).pptPresentation_Format (1).ppt
Presentation_Format (1).ppt
 
Optimized WES-System with Image Bit Embedding for Enhancing the Security of H...
Optimized WES-System with Image Bit Embedding for Enhancing the Security of H...Optimized WES-System with Image Bit Embedding for Enhancing the Security of H...
Optimized WES-System with Image Bit Embedding for Enhancing the Security of H...
 
Image Steganography: An Inevitable Need for Data Security, Authors: Sneh Rach...
Image Steganography: An Inevitable Need for Data Security, Authors: Sneh Rach...Image Steganography: An Inevitable Need for Data Security, Authors: Sneh Rach...
Image Steganography: An Inevitable Need for Data Security, Authors: Sneh Rach...
 
Symbols Frequency based Image Coding for Compression
Symbols Frequency based Image Coding for CompressionSymbols Frequency based Image Coding for Compression
Symbols Frequency based Image Coding for Compression
 
Unified Approach With Neural Network for Authentication, Security and Compres...
Unified Approach With Neural Network for Authentication, Security and Compres...Unified Approach With Neural Network for Authentication, Security and Compres...
Unified Approach With Neural Network for Authentication, Security and Compres...
 
A hybrid predictive technique for lossless image compression
A hybrid predictive technique for lossless image compressionA hybrid predictive technique for lossless image compression
A hybrid predictive technique for lossless image compression
 
IRJET- Wearable AI Device for Blind
IRJET- Wearable AI Device for BlindIRJET- Wearable AI Device for Blind
IRJET- Wearable AI Device for Blind
 
System for Detecting Deepfake in Videos – A Survey
System for Detecting Deepfake in Videos – A SurveySystem for Detecting Deepfake in Videos – A Survey
System for Detecting Deepfake in Videos – A Survey
 
An Improved Noise Resistant Image Steganography Technique using Zero Cross Ed...
An Improved Noise Resistant Image Steganography Technique using Zero Cross Ed...An Improved Noise Resistant Image Steganography Technique using Zero Cross Ed...
An Improved Noise Resistant Image Steganography Technique using Zero Cross Ed...
 
A Secure & Optimized Data Hiding Technique Using DWT With PSNR Value
A Secure & Optimized Data Hiding Technique Using DWT With PSNR ValueA Secure & Optimized Data Hiding Technique Using DWT With PSNR Value
A Secure & Optimized Data Hiding Technique Using DWT With PSNR Value
 
Ijri ece-01-01 joint data hiding and compression based on saliency and smvq
Ijri ece-01-01 joint data hiding and compression based on saliency and smvqIjri ece-01-01 joint data hiding and compression based on saliency and smvq
Ijri ece-01-01 joint data hiding and compression based on saliency and smvq
 
Developing and comparing an encoding system using vector quantization &
Developing and comparing an encoding system using vector quantization &Developing and comparing an encoding system using vector quantization &
Developing and comparing an encoding system using vector quantization &
 
Developing and comparing an encoding system using vector quantization &
Developing and comparing an encoding system using vector quantization &Developing and comparing an encoding system using vector quantization &
Developing and comparing an encoding system using vector quantization &
 
A Study of Image Tampering Detection
A Study of Image Tampering DetectionA Study of Image Tampering Detection
A Study of Image Tampering Detection
 
76201950
7620195076201950
76201950
 
Developing Algorithms for Image Steganography and Increasing the Capacity Dep...
Developing Algorithms for Image Steganography and Increasing the Capacity Dep...Developing Algorithms for Image Steganography and Increasing the Capacity Dep...
Developing Algorithms for Image Steganography and Increasing the Capacity Dep...
 
DEVELOPING ALGORITHMS FOR IMAGE STEGANOGRAPHY AND INCREASING THE CAPACITY DEP...
DEVELOPING ALGORITHMS FOR IMAGE STEGANOGRAPHY AND INCREASING THE CAPACITY DEP...DEVELOPING ALGORITHMS FOR IMAGE STEGANOGRAPHY AND INCREASING THE CAPACITY DEP...
DEVELOPING ALGORITHMS FOR IMAGE STEGANOGRAPHY AND INCREASING THE CAPACITY DEP...
 
MULTIPLE CAUSAL WINDOW BASED REVERSIBLE DATA EMBEDDING
MULTIPLE CAUSAL WINDOW BASED REVERSIBLE DATA EMBEDDINGMULTIPLE CAUSAL WINDOW BASED REVERSIBLE DATA EMBEDDING
MULTIPLE CAUSAL WINDOW BASED REVERSIBLE DATA EMBEDDING
 
MULTIPLE CAUSAL WINDOW BASED REVERSIBLE DATA EMBEDDING
MULTIPLE CAUSAL WINDOW BASED REVERSIBLE DATA EMBEDDINGMULTIPLE CAUSAL WINDOW BASED REVERSIBLE DATA EMBEDDING
MULTIPLE CAUSAL WINDOW BASED REVERSIBLE DATA EMBEDDING
 

Recently uploaded

fourth grading exam for kindergarten in writing
fourth grading exam for kindergarten in writingfourth grading exam for kindergarten in writing
fourth grading exam for kindergarten in writingTeacherCyreneCayanan
 
Beyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global ImpactBeyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global ImpactPECB
 
Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111Sapana Sha
 
General AI for Medical Educators April 2024
General AI for Medical Educators April 2024General AI for Medical Educators April 2024
General AI for Medical Educators April 2024Janet Corral
 
Introduction to Nonprofit Accounting: The Basics
Introduction to Nonprofit Accounting: The BasicsIntroduction to Nonprofit Accounting: The Basics
Introduction to Nonprofit Accounting: The BasicsTechSoup
 
Sanyam Choudhary Chemistry practical.pdf
Sanyam Choudhary Chemistry practical.pdfSanyam Choudhary Chemistry practical.pdf
Sanyam Choudhary Chemistry practical.pdfsanyamsingh5019
 
Measures of Central Tendency: Mean, Median and Mode
Measures of Central Tendency: Mean, Median and ModeMeasures of Central Tendency: Mean, Median and Mode
Measures of Central Tendency: Mean, Median and ModeThiyagu K
 
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in DelhiRussian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhikauryashika82
 
Ecosystem Interactions Class Discussion Presentation in Blue Green Lined Styl...
Ecosystem Interactions Class Discussion Presentation in Blue Green Lined Styl...Ecosystem Interactions Class Discussion Presentation in Blue Green Lined Styl...
Ecosystem Interactions Class Discussion Presentation in Blue Green Lined Styl...fonyou31
 
Accessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impactAccessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impactdawncurless
 
Key note speaker Neum_Admir Softic_ENG.pdf
Key note speaker Neum_Admir Softic_ENG.pdfKey note speaker Neum_Admir Softic_ENG.pdf
Key note speaker Neum_Admir Softic_ENG.pdfAdmir Softic
 
1029 - Danh muc Sach Giao Khoa 10 . pdf
1029 -  Danh muc Sach Giao Khoa 10 . pdf1029 -  Danh muc Sach Giao Khoa 10 . pdf
1029 - Danh muc Sach Giao Khoa 10 . pdfQucHHunhnh
 
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...Krashi Coaching
 
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...EduSkills OECD
 
Activity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdfActivity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdfciinovamais
 
IGNOU MSCCFT and PGDCFT Exam Question Pattern: MCFT003 Counselling and Family...
IGNOU MSCCFT and PGDCFT Exam Question Pattern: MCFT003 Counselling and Family...IGNOU MSCCFT and PGDCFT Exam Question Pattern: MCFT003 Counselling and Family...
IGNOU MSCCFT and PGDCFT Exam Question Pattern: MCFT003 Counselling and Family...PsychoTech Services
 

Recently uploaded (20)

Advance Mobile Application Development class 07
Advance Mobile Application Development class 07Advance Mobile Application Development class 07
Advance Mobile Application Development class 07
 
fourth grading exam for kindergarten in writing
fourth grading exam for kindergarten in writingfourth grading exam for kindergarten in writing
fourth grading exam for kindergarten in writing
 
Beyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global ImpactBeyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global Impact
 
INDIA QUIZ 2024 RLAC DELHI UNIVERSITY.pptx
INDIA QUIZ 2024 RLAC DELHI UNIVERSITY.pptxINDIA QUIZ 2024 RLAC DELHI UNIVERSITY.pptx
INDIA QUIZ 2024 RLAC DELHI UNIVERSITY.pptx
 
Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111
 
General AI for Medical Educators April 2024
General AI for Medical Educators April 2024General AI for Medical Educators April 2024
General AI for Medical Educators April 2024
 
Código Creativo y Arte de Software | Unidad 1
Código Creativo y Arte de Software | Unidad 1Código Creativo y Arte de Software | Unidad 1
Código Creativo y Arte de Software | Unidad 1
 
Introduction to Nonprofit Accounting: The Basics
Introduction to Nonprofit Accounting: The BasicsIntroduction to Nonprofit Accounting: The Basics
Introduction to Nonprofit Accounting: The Basics
 
Mattingly "AI & Prompt Design: Structured Data, Assistants, & RAG"
Mattingly "AI & Prompt Design: Structured Data, Assistants, & RAG"Mattingly "AI & Prompt Design: Structured Data, Assistants, & RAG"
Mattingly "AI & Prompt Design: Structured Data, Assistants, & RAG"
 
Sanyam Choudhary Chemistry practical.pdf
Sanyam Choudhary Chemistry practical.pdfSanyam Choudhary Chemistry practical.pdf
Sanyam Choudhary Chemistry practical.pdf
 
Measures of Central Tendency: Mean, Median and Mode
Measures of Central Tendency: Mean, Median and ModeMeasures of Central Tendency: Mean, Median and Mode
Measures of Central Tendency: Mean, Median and Mode
 
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in DelhiRussian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
 
Ecosystem Interactions Class Discussion Presentation in Blue Green Lined Styl...
Ecosystem Interactions Class Discussion Presentation in Blue Green Lined Styl...Ecosystem Interactions Class Discussion Presentation in Blue Green Lined Styl...
Ecosystem Interactions Class Discussion Presentation in Blue Green Lined Styl...
 
Accessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impactAccessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impact
 
Key note speaker Neum_Admir Softic_ENG.pdf
Key note speaker Neum_Admir Softic_ENG.pdfKey note speaker Neum_Admir Softic_ENG.pdf
Key note speaker Neum_Admir Softic_ENG.pdf
 
1029 - Danh muc Sach Giao Khoa 10 . pdf
1029 -  Danh muc Sach Giao Khoa 10 . pdf1029 -  Danh muc Sach Giao Khoa 10 . pdf
1029 - Danh muc Sach Giao Khoa 10 . pdf
 
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
 
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
 
Activity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdfActivity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdf
 
IGNOU MSCCFT and PGDCFT Exam Question Pattern: MCFT003 Counselling and Family...
IGNOU MSCCFT and PGDCFT Exam Question Pattern: MCFT003 Counselling and Family...IGNOU MSCCFT and PGDCFT Exam Question Pattern: MCFT003 Counselling and Family...
IGNOU MSCCFT and PGDCFT Exam Question Pattern: MCFT003 Counselling and Family...
 

CCIP-23_PavanAC.pptx

  • 1. Dr. M. T. Somashekara Associate Professor, Department of Computer Science and Applications, Bangalore University, Bengaluru, India. Under the Guidance of, Pavan. A. C Research Scholar, Department of Computer Science and Applications, Bangalore University, Bengaluru, India. Presented By, An Approach for Detecting and Restoring Tampering in Digital Image Watermarking 5th International Conference on Cognitive Computing and Information Processing (CCIP 2023)
  • 2. 5th International Conference on Cognitive Computing and Information Processing (CCIP 2023) 15th & 16th DEC 2023 1. 2. 3. 4. 5. 6. L I T E R A T U R E S U R V E Y I N T R O D U C T I O N E X P E R I M E N T A L R E S U L T S M E T H O D O L O G Y C O N C L U S I O N R E F E R E N C E S 2
  • 3. Introduction 5th International Conference on Cognitive Computing and Information Processing (CCIP 2023) 15th & 16th DEC 2023 3
  • 4. What is Digital Image Watermarking? • Digital image watermarking is a technique used to embed information, often in the form of a digital watermark or a code, into a digital image. • The purpose of digital image watermarking is to provide a way to verify the authenticity or ownership of an image, protect against unauthorized use, and track the distribution of digital media. 5th International Conference on Cognitive Computing and Information Processing (CCIP 2023) 15th & 16th DEC 2023 4
  • 5. • Proposed method defines the tampering as a source coding problem and hence develop a watermark which could help in self-recovery of the tampered image. • The method includes compressing the original image by source coding using SPIHT algorithm. Tamper Detection with JPEG Compression Tamper Detection with LSB-MSB • Replace each image block's least significant bits (LSB) with bits generated from that block's most significant bits (MSB) • These methods are ineffective against noise assaults 5th International Conference on Cognitive Computing and Information Processing (CCIP 2023) 15th & 16th DEC 2023 5
  • 6. Literature Survey 5th International Conference on Cognitive Computing and Information Processing (CCIP 2023) 15th & 16th DEC 2023 6
  • 7. Literature Survey 2011 Z. Qian, G. Feng, Inpainting assisted self-recovery with decreased embedding data. J. Fridrich, et. al The DCT values which were quantized along with the version generated by low depth of the original image can be used as important features for generating. 1999 S. Sarreshtedari, M.A. Akhaee, Source- channel coding approach to generate tamperproof images. 2014 P. Korus, J. Biaas, A. Dziech, Towards practical self- embedding for JPEG- compressed digital images. 2015 Saeed Sarreshtedari, et. al Source-channel coding-based watermarking for self- embedding of JPEG images. 2017 5th International Conference on Cognitive Computing and Information Processing (CCIP 2023) 15th & 16th DEC 2023 7
  • 8. Methodology 5th International Conference on Cognitive Computing and Information Processing (CCIP 2023) 15th & 16th DEC 2023 8
  • 9. Embedding Algorithm Sender Side 5th International Conference on Cognitive Computing and Information Processing (CCIP 2023) 15th & 16th DEC 2023 9
  • 10. Embedding Algorithm Receiver Side 5th International Conference on Cognitive Computing and Information Processing (CCIP 2023) 15th & 16th DEC 2023 10
  • 11. Algorithms with Methodology Compression of Lossy Data DCT is applied to compress the image SPIHT Used for source coding LDPC Codes Channel coding algorithm to detect the error and make the recovery Embedding of Watermark Watermark will be embedded bit by bit Restoration of an Image Identify the manipulated bits Tampering Detection Comparing and detection of tamper using Thresholding, erosion and dilation 5th International Conference on Cognitive Computing and Information Processing (CCIP 2023) 15th & 16th DEC 2023 1
  • 12. Experimental Results 5th International Conference on Cognitive Computing and Information Processing (CCIP 2023) 15th & 16th DEC 2023 1
  • 13. Tampering Rate 15%-17% Tampering Original image may be restored by the proposed method as long as the tampering and these additional attacks leads to tampering of the watermarked image within 17.2%. Image Size Proposed scheme is tested on 8-bit 512 × 512 grey-scale image Attacks The results are robust against the attacks such as noise addition and recompression on the received image along with tampering. 5th International Conference on Cognitive Computing and Information Processing (CCIP 2023) 15th & 16th DEC 2023 13
  • 14. 5th International Conference on Cognitive Computing and Information Processing (CCIP 2023) 15th & 16th DEC 2023 Original Image Tampered Image Compressed Image Image Representation 1
  • 15. 5th International Conference on Cognitive Computing and Information Processing (CCIP 2023) 15th & 16th DEC 2023 Thresholding and opening Result Tampering Map Recovered Image Image Representation 1
  • 16. Conclusion 5th International Conference on Cognitive Computing and Information Processing (CCIP 2023) 15th & 16th DEC 2023 16
  • 17. 5th International Conference on Cognitive Computing and Information Processing (CCIP 2023) 15th & 16th DEC 2023 A tamper proof watermark embedding process has been proposed in this paper. A tamper proof watermark embedding process has been adapted suitably with respect to the standard JPEG compression chain. Since, compression reduces the redundancy of image and available capacity for watermark embedding is limited, the recovery of tampering is also up to certain tolerable rate. Recovery of the original image significantly depends on size of the watermark string embedded into it. 1
  • 18. References 5th International Conference on Cognitive Computing and Information Processing (CCIP 2023) 15th & 16th DEC 2023 18
  • 19. 5th International Conference on Cognitive Computing and Information Processing (CCIP 2023) 15th & 16th DEC 2023 • Saeed Sarreshtedari, Mohammad Ali Akhaee, AliazamAbbasfar, "Source-channel coding-based watermarking for self-embedding of JPEG images", Electrical and Computer Engg., University of Tehran, 2017, pp 107-116 • J. Fridrich, M. Goljan, (1999) Images with self-correcting capabilities, in: Proc. Int. Conf. on Image Processing, Vol. 3, pp. 792–796 • Z. Qian, G. Feng, Inpainting assisted self-recovery with decreased embedding data, IEEEFigure 6 Received tampered image X. Zhang, Z. Qian, Y. Ren, G. Feng, Watermarking with flexible self- recovery quality based on compressive sensing and compositive reconstruction, IEEE Trans. Inform.Forensics Secur. 6 (4) (2011) 1223–1232. • P. Korus, J. Biaas, A. Dziech, Towards practical self-embedding for JPEG-compressed digital images, IEEE Trans. Multimedia 17 (2) (2015) 157–170. http://dx.doi.org/10.1109/TMM.2014.2368696. • S. Sarreshtedari, M.A. Akhaee, A source-channel coding approach to digital image protection and self-recovery, IEEE Trans. Image Process. 24 (7) (2015) 2266–2277. • S. Sarreshtedari, M.A. Akhaee, Source-channel coding approach to generate tamperproof images, in: IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), 2014, pp. 7435– 7439, doi:10.1109/ICASSP.2014.6855045. 1