A Novel Watermarking Scheme for Image Authentication in Social Networks

Associate Professor
Jan. 12, 2015
A Novel Watermarking Scheme for Image Authentication in Social Networks
A Novel Watermarking Scheme for Image Authentication in Social Networks
A Novel Watermarking Scheme for Image Authentication in Social Networks
A Novel Watermarking Scheme for Image Authentication in Social Networks
A Novel Watermarking Scheme for Image Authentication in Social Networks
A Novel Watermarking Scheme for Image Authentication in Social Networks
A Novel Watermarking Scheme for Image Authentication in Social Networks
A Novel Watermarking Scheme for Image Authentication in Social Networks
A Novel Watermarking Scheme for Image Authentication in Social Networks
A Novel Watermarking Scheme for Image Authentication in Social Networks
A Novel Watermarking Scheme for Image Authentication in Social Networks
A Novel Watermarking Scheme for Image Authentication in Social Networks
A Novel Watermarking Scheme for Image Authentication in Social Networks
A Novel Watermarking Scheme for Image Authentication in Social Networks
A Novel Watermarking Scheme for Image Authentication in Social Networks
A Novel Watermarking Scheme for Image Authentication in Social Networks
A Novel Watermarking Scheme for Image Authentication in Social Networks
A Novel Watermarking Scheme for Image Authentication in Social Networks
A Novel Watermarking Scheme for Image Authentication in Social Networks
1 of 19

More Related Content

What's hot

hh2014_presentation2noBackuphh2014_presentation2noBackup
hh2014_presentation2noBackupJere Harrison
3D Shape and Indirect Appearance by Structured Light Transport3D Shape and Indirect Appearance by Structured Light Transport
3D Shape and Indirect Appearance by Structured Light TransportMatthew O'Toole
Deep Learning for Computer Vision: Object Detection (UPC 2016)Deep Learning for Computer Vision: Object Detection (UPC 2016)
Deep Learning for Computer Vision: Object Detection (UPC 2016)Universitat Politècnica de Catalunya
Deep Local Parametric Filters for Image EnhancementDeep Local Parametric Filters for Image Enhancement
Deep Local Parametric Filters for Image EnhancementSean Moran
Sobel Edge Detection Using FPGASobel Edge Detection Using FPGA
Sobel Edge Detection Using FPGAghanshyam zambare
Ieee 2016 nss mic poster N30-21Ieee 2016 nss mic poster N30-21
Ieee 2016 nss mic poster N30-21Dae Woon Kim

What's hot(20)

Similar to A Novel Watermarking Scheme for Image Authentication in Social Networks

Decision Forests and discriminant analysisDecision Forests and discriminant analysis
Decision Forests and discriminant analysispotaters
Fa19_P1.pptxFa19_P1.pptx
Fa19_P1.pptxMd Abul Hayat
Mlp mixer  an all-mlp architecture for visionMlp mixer  an all-mlp architecture for vision
Mlp mixer an all-mlp architecture for visionJaey Jeong
Application of feature point matching to video stabilizationApplication of feature point matching to video stabilization
Application of feature point matching to video stabilizationNikhil Prathapani
Near-Duplicate Video Retrieval by Aggregating Intermediate CNN LayersNear-Duplicate Video Retrieval by Aggregating Intermediate CNN Layers
Near-Duplicate Video Retrieval by Aggregating Intermediate CNN LayersSymeon Papadopoulos
med_poster_spiemed_poster_spie
med_poster_spieJoe Robinson

Similar to A Novel Watermarking Scheme for Image Authentication in Social Networks(20)

More from Oresti Banos

Measuring human behaviour to inform e-coaching actionsMeasuring human behaviour to inform e-coaching actions
Measuring human behaviour to inform e-coaching actionsOresti Banos
Measuring human behaviour by sensing everyday mobile interactionsMeasuring human behaviour by sensing everyday mobile interactions
Measuring human behaviour by sensing everyday mobile interactionsOresti Banos
Emotion AI: Concepts, Challenges and OpportunitiesEmotion AI: Concepts, Challenges and Opportunities
Emotion AI: Concepts, Challenges and OpportunitiesOresti Banos
Biodata analysisBiodata analysis
Biodata analysisOresti Banos
Biosignal ProcessingBiosignal Processing
Biosignal ProcessingOresti Banos
Automatic mapping of motivational text messages into ontological entities for...Automatic mapping of motivational text messages into ontological entities for...
Automatic mapping of motivational text messages into ontological entities for...Oresti Banos

More from Oresti Banos(20)

Recently uploaded

How to DAO?How to DAO?
How to DAO?Liveplex
Jino Clone: Develop a Car Wash Mobile App with Limited Resources Jino Clone: Develop a Car Wash Mobile App with Limited Resources
Jino Clone: Develop a Car Wash Mobile App with Limited Resources eSiteWorld TechnoLabs Pvt. Ltd.
Datacenter in a Suitcase.pdfDatacenter in a Suitcase.pdf
Datacenter in a Suitcase.pdfMario Fahlandt
BuilderAI Proposal_MalesniakBuilderAI Proposal_Malesniak
BuilderAI Proposal_MalesniakMichael Lesniak
Data Integrity TrendsData Integrity Trends
Data Integrity TrendsPrecisely
TaketoFujikawa_KES2023TaketoFujikawa_KES2023
TaketoFujikawa_KES2023Matsushita Laboratory

A Novel Watermarking Scheme for Image Authentication in Social Networks

Editor's Notes

  1. Most data on the Internet including images, videos have been not certified and protected to against the unauthorized copy issue. Therefore, we need a watermarking technique to assign a copyright on our images. In which a watermark is embedded into a host image and able to extract exactly in contention.
  2. The motivations for proposal of a watermarking method are robustness, imperceptibility and convenience. -> Explain each of them.
  3. Describe content on the slide
  4. The input of our method is a color image and a watermark is a binary image. The uniqueness is an optimum color channel selection to apply the embedding rule to achive an imperceptibility at the output. The wavelet coefficients have been modified based on the value of coefficient difference and watermark bits.
  5. The embedded images in transmission, storage process can be attacks by common digital signal proceses. In extraction, the watermark bits are extracted based on comparing the threshold with coefficient different value. The watermark bits after extracted will be reshuffling to obtain the original one.
  6. Describe content on the slide
  7. This slide show the result of image quality after embedding process based on CPNSR and SSIM parameter. Higher value of CPNSR is better. Different images with different structure and texture have different values of CPSNR. SSIM should reach to 1.
  8. Some results of watermark robustness after extraction under various attacking types : geometric, non-geometric, and lossy JPEG compression. Scaling image to double size and rescaling to original size modifies intensity slightly because interpolation process only consider 4 pixels in neighbor, therefore the pixel is affected by 4 pixels in surrounding. Embedding is implemented on LH and HL sub-band (middle frequency sub-bands including a part of low bandwidth), while Gaussian filter is low-pass filter, that means, this signal process will suppress high frequency and keep low frequency. Actually, the quality after using Gaussian filter is decreased, however, it is not enough.   Cropping 25%, that mean, 25% content is removed end replace by 0-bits (black area). We can not extract correctly watermark bit in this area.   When rotate the image, the alteration is increased from the center to border of image, and it affects to all pixels in and image and another reason is the operation of wavelet transform on horizontal and vertical dimension, while the effect of rotation is diagonal.   With histogram equalization, some results is low depend on the contrast of images. Some image have the low contrast (small range in histogram) will be strongly affected by this attacks.   The influence of Gaussian noise on the smooth image (less detail) is less than the image having more details (considering splash sample)   Average filter is the opposite case of Gaussian noise when images which have more detail will be strongly modified by this attack (like as mandrill sample).
  9. Color images, same watermark payload Comparing with method of Niu at the same conditions, the proposed method is outperform in most of attacking types, except Rotation process. 1.       Niu: Contourlet transform. Our method: Wavelet transform. 2.       Niu: Embedding on Green channel. Our method: optimal channel selection (3 channels) 3.       Niu: Embedding on Low frequencies component. Our method: middle frequencies -> better in imperceptibility 4.       Niu: SVM in extraction. Out method: thresholding -> more computation time in training and classification in extraction with Niu method.
  10. Descibe content on the slide