This document summarizes a research paper that proposes a multiple watermark embedding scheme based on human visual characteristics. The scheme embeds two watermarks in the luminance and chrominance blue components of an image. It uses Arnold scrambling to increase security, and embeds watermarks in the singular value decomposition domain by modifying coefficients based on a threshold. The proposed scheme is evaluated based on imperceptibility using SSIM and robustness using normalized cross-correlation and bit error rate. Experimental results show the scheme provides improved invisibility and resistance to various attacks.
A NOVEL APPROACH FOR IMAGE WATERMARKING USING DCT AND JND TECHNIQUESijiert bestjournal
Today�s world is digital world. Nowadays,in every field there is enormous use of digital contents. Information handled on internet and multimedia netw ork system is in digital form. The copying of digital content without quality loss is not so diff icult. Due to this,there are more chances of copyi ng of such digital information. So,there is great need o f prohibiting such illegal copyright of digital med ia. Digital watermarking is the powerful solution to ad dress this problem. Digital watermarking is the technology in which there is embedding of various t ypes of information in digital content which we have to protect from illegal copying. This embedded information to protect the data is embedded as watermark. This paper introduces two novel techniqu es for image watermarking such as DCT and JND. The DCT based approach adapted to embed waterm arks in DC,low,mid and high frequency components coefficient of DCT. The JND based approa ch gives robust and transparent scheme of watermarking that exploits the �human visual system s� sensitivity to local image characteristics obtained from the spatial domain,improving upon th e content based image watermarking scheme.
A New Watermarking Algorithm Based on Image Scrambling and SVD in the Wavelet...IDES Editor
A new watermarking algorithm which is based on
image scrambling and SVD in the wavelet domain is discussed
in this paper. In the proposed algorithm, chaotic signals are
generated using logistic mapping and are used for scrambling
the original watermark. The initial values of logistic mapping
are taken as private keys. The covert image is decomposed
into four bands using integer wavelet transform; we apply
SVD to each band and embed the
A DWT based Dual Image Watermarking Technique for Authenticity and Watermark ...sipij
In this paper we propose a DWT based dual watermarking technique wherein both blind and non-blind algorithms are used for the copyright protection of the cover/host image and the watermark respectively. We use the concept of embedding two watermarks into the cover image by actually embedding only one, to authenticate the source image and protect the watermark simultaneously. Here the DWT coefficients of the primary watermark (logo) are modified using another smaller secondary binary image (sign) and the midfrequency coefficients of the cover/host image. Since the watermark has some features of host image embedded in it, the security is increased two-fold and it also protects the watermark from any misuse or copy attack. For this purpose a new pseudorandom generator based on the mathematical constant π has been developed and used successfully in various stages of the algorithm. We have also proposed a new approach of applying pseudo-randomness in selecting the watermark pixel values for embedding in the cover image. In all the existing techniques the randomness is incorporated in selecting the location to embed the watermark. This makes the embedding process more unpredictable. The cover image which is watermarked with the signed-logo is subjected to various attacks like cropping, rotation, JPEG compression, scaling and noising. From the results it has been found that it is very robust and has good invisibility as well.
Blind Image Watermarking Based on Chaotic MapsITIIIndustries
Security of a watermark refers to its resistance to unauthorized detecting and decoding, while watermark robustness refers to the watermark’s resistance against common processing. Many watermarking schemes emphasize robustness more than security. However, a robust watermark is not enough to accomplish protection because the range of hostile attacks is not limited to common processing and distortions. In this paper, we give consideration to watermark security. To achieve this, we employ chaotic maps due to their extreme sensitivity to the initial values. If one fails to provide these values, the watermark will be wrongly extracted. While the chaotic maps provide perfect watermarking security, the proposed scheme is also intended to achieve robustness.
SECURED COLOR IMAGE WATERMARKING TECHNIQUE IN DWT-DCT DOMAIN ijcseit
The multilayer secured DWT-DCT and YIQ color space based image watermarking technique with
robustness and better correlation is presented here. The security levels are increased by using multiple pn
sequences, Arnold scrambling, DWT domain, DCT domain and color space conversions. Peak signal to
noise ratio and Normalized correlations are used as measurement metrics. The 512x512 sized color images
with different histograms are used for testing and watermark of size 64x64 is embedded in HL region of
DWT and 4x4 DCT is used. ‘Haar’ wavelet is used for decomposition and direct flexing factor is used. We
got PSNR value is 63.9988 for flexing factor k=1 for Lena image and the maximum NC 0.9781 for flexing
factor k=4 in Q color space. The comparative performance in Y, I and Q color space is presented. The
technique is robust for different attacks like scaling, compression, rotation etc.
A NOVEL APPROACH FOR IMAGE WATERMARKING USING DCT AND JND TECHNIQUESijiert bestjournal
Today�s world is digital world. Nowadays,in every field there is enormous use of digital contents. Information handled on internet and multimedia netw ork system is in digital form. The copying of digital content without quality loss is not so diff icult. Due to this,there are more chances of copyi ng of such digital information. So,there is great need o f prohibiting such illegal copyright of digital med ia. Digital watermarking is the powerful solution to ad dress this problem. Digital watermarking is the technology in which there is embedding of various t ypes of information in digital content which we have to protect from illegal copying. This embedded information to protect the data is embedded as watermark. This paper introduces two novel techniqu es for image watermarking such as DCT and JND. The DCT based approach adapted to embed waterm arks in DC,low,mid and high frequency components coefficient of DCT. The JND based approa ch gives robust and transparent scheme of watermarking that exploits the �human visual system s� sensitivity to local image characteristics obtained from the spatial domain,improving upon th e content based image watermarking scheme.
A New Watermarking Algorithm Based on Image Scrambling and SVD in the Wavelet...IDES Editor
A new watermarking algorithm which is based on
image scrambling and SVD in the wavelet domain is discussed
in this paper. In the proposed algorithm, chaotic signals are
generated using logistic mapping and are used for scrambling
the original watermark. The initial values of logistic mapping
are taken as private keys. The covert image is decomposed
into four bands using integer wavelet transform; we apply
SVD to each band and embed the
A DWT based Dual Image Watermarking Technique for Authenticity and Watermark ...sipij
In this paper we propose a DWT based dual watermarking technique wherein both blind and non-blind algorithms are used for the copyright protection of the cover/host image and the watermark respectively. We use the concept of embedding two watermarks into the cover image by actually embedding only one, to authenticate the source image and protect the watermark simultaneously. Here the DWT coefficients of the primary watermark (logo) are modified using another smaller secondary binary image (sign) and the midfrequency coefficients of the cover/host image. Since the watermark has some features of host image embedded in it, the security is increased two-fold and it also protects the watermark from any misuse or copy attack. For this purpose a new pseudorandom generator based on the mathematical constant π has been developed and used successfully in various stages of the algorithm. We have also proposed a new approach of applying pseudo-randomness in selecting the watermark pixel values for embedding in the cover image. In all the existing techniques the randomness is incorporated in selecting the location to embed the watermark. This makes the embedding process more unpredictable. The cover image which is watermarked with the signed-logo is subjected to various attacks like cropping, rotation, JPEG compression, scaling and noising. From the results it has been found that it is very robust and has good invisibility as well.
Blind Image Watermarking Based on Chaotic MapsITIIIndustries
Security of a watermark refers to its resistance to unauthorized detecting and decoding, while watermark robustness refers to the watermark’s resistance against common processing. Many watermarking schemes emphasize robustness more than security. However, a robust watermark is not enough to accomplish protection because the range of hostile attacks is not limited to common processing and distortions. In this paper, we give consideration to watermark security. To achieve this, we employ chaotic maps due to their extreme sensitivity to the initial values. If one fails to provide these values, the watermark will be wrongly extracted. While the chaotic maps provide perfect watermarking security, the proposed scheme is also intended to achieve robustness.
SECURED COLOR IMAGE WATERMARKING TECHNIQUE IN DWT-DCT DOMAIN ijcseit
The multilayer secured DWT-DCT and YIQ color space based image watermarking technique with
robustness and better correlation is presented here. The security levels are increased by using multiple pn
sequences, Arnold scrambling, DWT domain, DCT domain and color space conversions. Peak signal to
noise ratio and Normalized correlations are used as measurement metrics. The 512x512 sized color images
with different histograms are used for testing and watermark of size 64x64 is embedded in HL region of
DWT and 4x4 DCT is used. ‘Haar’ wavelet is used for decomposition and direct flexing factor is used. We
got PSNR value is 63.9988 for flexing factor k=1 for Lena image and the maximum NC 0.9781 for flexing
factor k=4 in Q color space. The comparative performance in Y, I and Q color space is presented. The
technique is robust for different attacks like scaling, compression, rotation etc.
Novel DCT based watermarking scheme for digital imagesIDES Editor
There is an ever growing interest in copyright
protection of multimedia content, thus digital
watermarking techniques are widely practiced. Due to
the internet connectivity and digital libraries the
research interest of protecting digital content
watermarking is extensively researched. In this paper
we present a novel watermark generation scheme
based on the histogram of the image and apply it to the
original image in the transform(DCT) domain. Further
we study the performance of the watermark against
some common attacks that can take place with images.
Experimental results show that the embedded
watermark is imperceptible and image quality is not
degraded.
PREVENTING COPYRIGHTS INFRINGEMENT OF IMAGES BY WATERMARKING IN TRANSFORM DOM...ijistjournal
Images are undoubtedly the most efficacious and easiest means of communicating an idea. They are surely an indispensable part of human life .The trend of sharing images of various kinds for example typical technical figures, modern exceptional masterpiece from an artist, photos from the recent picnic to hill station etc, on the internet is spreading like a viral. There is a mandatory requirement for checking the privacy and security of our personal digital images before making them public via the internet. There is always a threat of our original images being illegally reproduced or distributed elsewhere. To prevent the misuse and protect the copyrights, an efficient solution has been given that can withstand many attacks. This paper aims at encoding of the host image prior to watermark embedding for enhancing the security. The fast and effective full counter propagation neural network helps in the successful watermark embedding without deteriorating the image perception. Earlier techniques embedded the watermark in the image itself but is has been observed that synapses of neural network provide a better platform for reducing the distortion and increasing the message capacity.
International Journal of Computational Engineering Research (IJCER) is dedicated to protecting personal information and will make every reasonable effort to handle collected information appropriately. All information collected, as well as related requests, will be handled as carefully and efficiently as possible in accordance with IJCER standards for integrity and objectivity.
Hardware Implementation of Genetic Algorithm Based Digital Colour Image Water...IDES Editor
The objective of this work is to develop a
hardware-based watermarking system to identify the device
using which the photograph was taken. The watermark chip
will be fit in any electronic component that acquires the
images, which are then watermarked in real time while
capturing along with separate key. Watermarking is the
process of embedding the watermark, in which a watermark
is inserted in to a host image while extracting the watermark
the watermark is pulled out of the image. The ultimate
objective of the research presented in this paper is to develop
low-power, high-performance, real-time, reliable and secure
watermarking systems, which can be achieved through
hardware implementations. In this paper the development of
a very Large Scale Integration (VLSI) architecture for a highperformance
watermarking chip that can perform invisible
colour image watermarking using genetic algorithm is
discussed. The prototyped VLSI implementation of
watermarking is analyzed in two ways.
Viz.,(i) Digital watermarking
In this era any type of digital media such as image, text, audio and video, all are easily accessible and transferable through the use of high speed internet. As the use of internet increased, the need of security and authenticity also increased. To secure the multimedia data such as image, audio, text and video researcher has developed a watermarking technique which gives a watermark embedding and watermark extraction algorithm, and later it is used for proof of ownership. Here we are proposing a technique on video watermarking using 2D DWT and 2-level SVD technique. In this paper first we are taking a video which is decomposed into number of frames and embedding a watermark image on each frame. First 2-D DWT is applied on each frame. Dwt decompose each frame into low frequency, mid frequency and in high frequency (LL, LH, HL, HH) band then we applied SVD on LL and HL sub-band called it dual band. SVD convert it into three matrices as U1S1V1’ of single matrix. A watermark image is taken which converted in to gray scale from RGB scale then resized it. And embed this watermark image into host frames with some scaling factor. After that we again applied SVD on this watermarked frames which further convert this single matrix into three matrices as U2S2V2’ now multiply S2 matrix with U1 and V1 matrix component to make it more secure. To demonstrate the authenticity of this watermarked video we applied some attacks such as Gaussian filtering, median filtering, frame rotation, contrast adjustment and sharpness attack which show its PSNR and NCC value in comparison with the original video.
it is used for security purpose using two level dct and wavelet packet denoising .based on digital image processing.the software based on matlab.it is used for high security purpose.
nternational Journal of Computational Engineering Research(IJCER)ijceronline
International Journal of Computational Engineering Research (IJCER) is dedicated to protecting personal information and will make every reasonable effort to handle collected information appropriately. All information collected, as well as related requests, will be handled as carefully and efficiently as possible in accordance with IJCER standards for integrity and objectivity.
Comparison of SVD & Pseudo Random Sequence based methods of Image Watermarkingijsrd.com
Due to the extensive use of digital media applications, multimedia security and copyright protection has gained tremendous importance. Digital watermarking is a technology used for the copyright protection of digital applications. Image watermarking is used to hide the special information into the image and to later detect and extract that special information. Watermarking can be implemented both in spatial and frequency domain. In this paper frequency domain techniques were experimented. The methods compared in this paper are image watermarking using singular value decomposition (SVD) based and image watermarking using discrete wavelet transform (DWT) and Pseudo random sequence. Our experiments show that former technique have low peak signal to noise ratio (PSNR) value and also requires cover data at the detection where as in the later case we don’t require cover data and PSNR value is good.
Self Attested Images for Secured Transactions using Superior SOMIDES Editor
Separate digital signals are usually used as the
digital watermarks. But this paper proposes rebuffed
untrained minute values of vital image as a digital watermark,
since no host image is needed to hide the vital image for its
safety. The vital images can be transformed with the self
attestation. Superior Self Organized Maps is used to derive
self signature from the vital image. This analysis work
constructs framework with Superior Self Organizing Maps
(SSOM) against Counter Propagation Network for watermark
generation and detection. The required features like
robustness, imperceptibility and security was analyzed to prove
that which neural network is appropriate for mining watermark
from the host image. SSOM network is proved as an efficient
neural trainer for the proposed watermarking technique. The
paper presents one more contribution to the watermarking
area.
International Journal of Engineering Research and Applications (IJERA) is an open access online peer reviewed international journal that publishes research and review articles in the fields of Computer Science, Neural Networks, Electrical Engineering, Software Engineering, Information Technology, Mechanical Engineering, Chemical Engineering, Plastic Engineering, Food Technology, Textile Engineering, Nano Technology & science, Power Electronics, Electronics & Communication Engineering, Computational mathematics, Image processing, Civil Engineering, Structural Engineering, Environmental Engineering, VLSI Testing & Low Power VLSI Design etc.
In Digital era sharing of images have become very
common and raises the risk of using it for unethical and
fraudulent purposes with the help of manipulation tools. Digital
image watermarking is one way to protect the digital information
(text, images, audio, and video) from fraudulent manipulations.
Digital Image Watermarking is a process of implanting data in
the original image for authentication. In this paper we are
providing one such watermarking scheme for color images. The
proposed method is designed to be robust for common attacks
with the aid of redundant discrete wavelet transform (RDWT)
and discrete cosine transform (DCT) properties. After applying
two levels RDWT decomposition to the blue channel of cover
image, we apply DCT to HH_LL subband i.e. 2nd level
decomposed coefficient of HH band and to the watermark.
Divided the HH_LL sub band into 4x4 subblocks and DCT
coefficients of the last subblock of the cover image are replaced
with the DCT coefficients of watermark. Inverse DCT and
inverse RDWT is performed to get watermarked image. The
performance of the proposed technique is measured using the
parameters PSNR and NCC.
BLIND EXTRACTION OF DIGITAL WATERMARKING ALGORITHM FOR COLOR IMAGESijma
Digital watermark technology hides copyright information in digital images, effectively protecting the
copyright of digital images. At present, the color image digital watermarking algorithm still has defects
such as the inability to balance robustness, invisibility and the weak anti-attack ability. Aiming at the
above problems, this paper studies the digital watermarking method based on discrete wavelet transform
and discrete cosine transform. Then this paper proposes a color image blind digital watermarking
algorithm based on QR code. First, convert the color image from RGB space to YCbCr space, extract the Y
component and perform the second-level discrete wavelet transform. secondly, block the LL2 subband and
perform the discrete cosine transform. finally, use the embedding method to convert the watermark
information after the Arnold transform embedded in the block. The experimental results show that the
PSNR of the color image embedded with the QR code is 56.7159 without being attacked. After being
attacked, its PSNR and NC values are respectively 30dB and 0.95 or more, which proves that the algorithm
has good robustness and can achieve watermarking blind extraction.
PERCEPTUAL COPYRIGHT PROTECTION USING MULTIRESOLUTION WAVELET-BASED WATERMARK...gerogepatton
In this paper, an efficiently DWT-based watermarking technique is proposed to embed signatures in images to attest the owner identification and discourage the unauthorized copying. This paper deals with a fuzzy inference filter to choose the larger entropy of coefficients to embed watermarks. Unlike most previous watermarking frameworks which embedded watermarks in the larger coefficients of inner coarser subbands, the proposed technique is based on utilizing a context model and fuzzy inference filter by embedding watermarks in the larger-entropy coefficients of coarser DWT subbands. The proposed approaches allow us to embed adaptive casting degree of watermarks for transparency and robustness to the general image-processing attacks such as smoothing, sharpening, and JPEG compression. The approach has no need the original host image to extract watermarks. Our schemes have been shown to provide very good results in both image transparency and robustness.
Digital watermarking has been proposed as a solution to the problem of copyright protection of
multimedia documents in networked environments. There are two important issues that watermarking
algorithms need to address. First, watermarking schemes are required to provide trustworthy evidence for
protecting rightful ownership. Second, good watermarking schemes should satisfy the requirement of
robustness and resist distortions due to common image manipulations (such as filtering, compression,
etc.). In this paper, a watermarking algorithm is proposed based on the Discrete Wavelet Transform
(DWT), Fractional Fourier Transform (FrFT) and Singular value decomposition (SVD). Analysis and
experimental results show that the proposed watermarking method performs well in both security and
robustness.
Tchebichef image watermarking along the edge using YCoCg-R color space for co...IJECEIAES
Easy creation and manipulation of digital images present the potential danger of counterfeiting and forgery. Watermarking technique which embeds a watermark into the images can be used to overcome these problems and to provide copyright protection. Digital image watermarking should meet requirements, e.g. maintain image quality, difficult to remove the watermark, quality of watermark extraction, and applicable. This research proposes Tchebichef watermarking along the edge based on YCoCg-R color space. The embedding region is selected by considering the human visual characteristics (HVC) entropy. The selected blocks with minimum of HVC entropy values are transformed by Tchebichef moments. The locations of C(0,1), C(1,0), C(0,2) and C(2,0) of the matrix moment are randomly embedded for each watermark bit. The proposed watermarking scheme produces a good imperceptibility by average SSIM value around 0.98. The watermark recovery has greater resistant after several types of attack than other schemes.
A Wavelet Based Hybrid SVD Algorithm for Digital Image Watermarkingsipij
In this paper we propose a hybrid image watermarking algorithm which satisfies both imperceptibility and robustness requirements. Our proposed work provide an optimum solution by using singular values of Wavelet Transformation’s HL and LH sub bands to embed watermark. Further to increase and control the strength of the watermark, we use a scale factor. An optimal watermark embedding method is developed to achieve minimum watermarking distortion. A secret embedding key is designed to securely embed the fragile watermarks so that the new method is robust to counterfeiting, even when the malicious attackers are fully aware of the watermark embedding algorithm. Experimental results are provided in terms of peak signal to noise ratio (PSNR), normalized cross correlation (NCC) and gain factor to demonstrate the effectiveness of the proposed algorithm. Image operations such as JPEG compression from malicious image attacks and, thus, can be used for semi-fragile watermarking.
Novel DCT based watermarking scheme for digital imagesIDES Editor
There is an ever growing interest in copyright
protection of multimedia content, thus digital
watermarking techniques are widely practiced. Due to
the internet connectivity and digital libraries the
research interest of protecting digital content
watermarking is extensively researched. In this paper
we present a novel watermark generation scheme
based on the histogram of the image and apply it to the
original image in the transform(DCT) domain. Further
we study the performance of the watermark against
some common attacks that can take place with images.
Experimental results show that the embedded
watermark is imperceptible and image quality is not
degraded.
PREVENTING COPYRIGHTS INFRINGEMENT OF IMAGES BY WATERMARKING IN TRANSFORM DOM...ijistjournal
Images are undoubtedly the most efficacious and easiest means of communicating an idea. They are surely an indispensable part of human life .The trend of sharing images of various kinds for example typical technical figures, modern exceptional masterpiece from an artist, photos from the recent picnic to hill station etc, on the internet is spreading like a viral. There is a mandatory requirement for checking the privacy and security of our personal digital images before making them public via the internet. There is always a threat of our original images being illegally reproduced or distributed elsewhere. To prevent the misuse and protect the copyrights, an efficient solution has been given that can withstand many attacks. This paper aims at encoding of the host image prior to watermark embedding for enhancing the security. The fast and effective full counter propagation neural network helps in the successful watermark embedding without deteriorating the image perception. Earlier techniques embedded the watermark in the image itself but is has been observed that synapses of neural network provide a better platform for reducing the distortion and increasing the message capacity.
International Journal of Computational Engineering Research (IJCER) is dedicated to protecting personal information and will make every reasonable effort to handle collected information appropriately. All information collected, as well as related requests, will be handled as carefully and efficiently as possible in accordance with IJCER standards for integrity and objectivity.
Hardware Implementation of Genetic Algorithm Based Digital Colour Image Water...IDES Editor
The objective of this work is to develop a
hardware-based watermarking system to identify the device
using which the photograph was taken. The watermark chip
will be fit in any electronic component that acquires the
images, which are then watermarked in real time while
capturing along with separate key. Watermarking is the
process of embedding the watermark, in which a watermark
is inserted in to a host image while extracting the watermark
the watermark is pulled out of the image. The ultimate
objective of the research presented in this paper is to develop
low-power, high-performance, real-time, reliable and secure
watermarking systems, which can be achieved through
hardware implementations. In this paper the development of
a very Large Scale Integration (VLSI) architecture for a highperformance
watermarking chip that can perform invisible
colour image watermarking using genetic algorithm is
discussed. The prototyped VLSI implementation of
watermarking is analyzed in two ways.
Viz.,(i) Digital watermarking
In this era any type of digital media such as image, text, audio and video, all are easily accessible and transferable through the use of high speed internet. As the use of internet increased, the need of security and authenticity also increased. To secure the multimedia data such as image, audio, text and video researcher has developed a watermarking technique which gives a watermark embedding and watermark extraction algorithm, and later it is used for proof of ownership. Here we are proposing a technique on video watermarking using 2D DWT and 2-level SVD technique. In this paper first we are taking a video which is decomposed into number of frames and embedding a watermark image on each frame. First 2-D DWT is applied on each frame. Dwt decompose each frame into low frequency, mid frequency and in high frequency (LL, LH, HL, HH) band then we applied SVD on LL and HL sub-band called it dual band. SVD convert it into three matrices as U1S1V1’ of single matrix. A watermark image is taken which converted in to gray scale from RGB scale then resized it. And embed this watermark image into host frames with some scaling factor. After that we again applied SVD on this watermarked frames which further convert this single matrix into three matrices as U2S2V2’ now multiply S2 matrix with U1 and V1 matrix component to make it more secure. To demonstrate the authenticity of this watermarked video we applied some attacks such as Gaussian filtering, median filtering, frame rotation, contrast adjustment and sharpness attack which show its PSNR and NCC value in comparison with the original video.
it is used for security purpose using two level dct and wavelet packet denoising .based on digital image processing.the software based on matlab.it is used for high security purpose.
nternational Journal of Computational Engineering Research(IJCER)ijceronline
International Journal of Computational Engineering Research (IJCER) is dedicated to protecting personal information and will make every reasonable effort to handle collected information appropriately. All information collected, as well as related requests, will be handled as carefully and efficiently as possible in accordance with IJCER standards for integrity and objectivity.
Comparison of SVD & Pseudo Random Sequence based methods of Image Watermarkingijsrd.com
Due to the extensive use of digital media applications, multimedia security and copyright protection has gained tremendous importance. Digital watermarking is a technology used for the copyright protection of digital applications. Image watermarking is used to hide the special information into the image and to later detect and extract that special information. Watermarking can be implemented both in spatial and frequency domain. In this paper frequency domain techniques were experimented. The methods compared in this paper are image watermarking using singular value decomposition (SVD) based and image watermarking using discrete wavelet transform (DWT) and Pseudo random sequence. Our experiments show that former technique have low peak signal to noise ratio (PSNR) value and also requires cover data at the detection where as in the later case we don’t require cover data and PSNR value is good.
Self Attested Images for Secured Transactions using Superior SOMIDES Editor
Separate digital signals are usually used as the
digital watermarks. But this paper proposes rebuffed
untrained minute values of vital image as a digital watermark,
since no host image is needed to hide the vital image for its
safety. The vital images can be transformed with the self
attestation. Superior Self Organized Maps is used to derive
self signature from the vital image. This analysis work
constructs framework with Superior Self Organizing Maps
(SSOM) against Counter Propagation Network for watermark
generation and detection. The required features like
robustness, imperceptibility and security was analyzed to prove
that which neural network is appropriate for mining watermark
from the host image. SSOM network is proved as an efficient
neural trainer for the proposed watermarking technique. The
paper presents one more contribution to the watermarking
area.
International Journal of Engineering Research and Applications (IJERA) is an open access online peer reviewed international journal that publishes research and review articles in the fields of Computer Science, Neural Networks, Electrical Engineering, Software Engineering, Information Technology, Mechanical Engineering, Chemical Engineering, Plastic Engineering, Food Technology, Textile Engineering, Nano Technology & science, Power Electronics, Electronics & Communication Engineering, Computational mathematics, Image processing, Civil Engineering, Structural Engineering, Environmental Engineering, VLSI Testing & Low Power VLSI Design etc.
In Digital era sharing of images have become very
common and raises the risk of using it for unethical and
fraudulent purposes with the help of manipulation tools. Digital
image watermarking is one way to protect the digital information
(text, images, audio, and video) from fraudulent manipulations.
Digital Image Watermarking is a process of implanting data in
the original image for authentication. In this paper we are
providing one such watermarking scheme for color images. The
proposed method is designed to be robust for common attacks
with the aid of redundant discrete wavelet transform (RDWT)
and discrete cosine transform (DCT) properties. After applying
two levels RDWT decomposition to the blue channel of cover
image, we apply DCT to HH_LL subband i.e. 2nd level
decomposed coefficient of HH band and to the watermark.
Divided the HH_LL sub band into 4x4 subblocks and DCT
coefficients of the last subblock of the cover image are replaced
with the DCT coefficients of watermark. Inverse DCT and
inverse RDWT is performed to get watermarked image. The
performance of the proposed technique is measured using the
parameters PSNR and NCC.
BLIND EXTRACTION OF DIGITAL WATERMARKING ALGORITHM FOR COLOR IMAGESijma
Digital watermark technology hides copyright information in digital images, effectively protecting the
copyright of digital images. At present, the color image digital watermarking algorithm still has defects
such as the inability to balance robustness, invisibility and the weak anti-attack ability. Aiming at the
above problems, this paper studies the digital watermarking method based on discrete wavelet transform
and discrete cosine transform. Then this paper proposes a color image blind digital watermarking
algorithm based on QR code. First, convert the color image from RGB space to YCbCr space, extract the Y
component and perform the second-level discrete wavelet transform. secondly, block the LL2 subband and
perform the discrete cosine transform. finally, use the embedding method to convert the watermark
information after the Arnold transform embedded in the block. The experimental results show that the
PSNR of the color image embedded with the QR code is 56.7159 without being attacked. After being
attacked, its PSNR and NC values are respectively 30dB and 0.95 or more, which proves that the algorithm
has good robustness and can achieve watermarking blind extraction.
PERCEPTUAL COPYRIGHT PROTECTION USING MULTIRESOLUTION WAVELET-BASED WATERMARK...gerogepatton
In this paper, an efficiently DWT-based watermarking technique is proposed to embed signatures in images to attest the owner identification and discourage the unauthorized copying. This paper deals with a fuzzy inference filter to choose the larger entropy of coefficients to embed watermarks. Unlike most previous watermarking frameworks which embedded watermarks in the larger coefficients of inner coarser subbands, the proposed technique is based on utilizing a context model and fuzzy inference filter by embedding watermarks in the larger-entropy coefficients of coarser DWT subbands. The proposed approaches allow us to embed adaptive casting degree of watermarks for transparency and robustness to the general image-processing attacks such as smoothing, sharpening, and JPEG compression. The approach has no need the original host image to extract watermarks. Our schemes have been shown to provide very good results in both image transparency and robustness.
Digital watermarking has been proposed as a solution to the problem of copyright protection of
multimedia documents in networked environments. There are two important issues that watermarking
algorithms need to address. First, watermarking schemes are required to provide trustworthy evidence for
protecting rightful ownership. Second, good watermarking schemes should satisfy the requirement of
robustness and resist distortions due to common image manipulations (such as filtering, compression,
etc.). In this paper, a watermarking algorithm is proposed based on the Discrete Wavelet Transform
(DWT), Fractional Fourier Transform (FrFT) and Singular value decomposition (SVD). Analysis and
experimental results show that the proposed watermarking method performs well in both security and
robustness.
Tchebichef image watermarking along the edge using YCoCg-R color space for co...IJECEIAES
Easy creation and manipulation of digital images present the potential danger of counterfeiting and forgery. Watermarking technique which embeds a watermark into the images can be used to overcome these problems and to provide copyright protection. Digital image watermarking should meet requirements, e.g. maintain image quality, difficult to remove the watermark, quality of watermark extraction, and applicable. This research proposes Tchebichef watermarking along the edge based on YCoCg-R color space. The embedding region is selected by considering the human visual characteristics (HVC) entropy. The selected blocks with minimum of HVC entropy values are transformed by Tchebichef moments. The locations of C(0,1), C(1,0), C(0,2) and C(2,0) of the matrix moment are randomly embedded for each watermark bit. The proposed watermarking scheme produces a good imperceptibility by average SSIM value around 0.98. The watermark recovery has greater resistant after several types of attack than other schemes.
A Wavelet Based Hybrid SVD Algorithm for Digital Image Watermarkingsipij
In this paper we propose a hybrid image watermarking algorithm which satisfies both imperceptibility and robustness requirements. Our proposed work provide an optimum solution by using singular values of Wavelet Transformation’s HL and LH sub bands to embed watermark. Further to increase and control the strength of the watermark, we use a scale factor. An optimal watermark embedding method is developed to achieve minimum watermarking distortion. A secret embedding key is designed to securely embed the fragile watermarks so that the new method is robust to counterfeiting, even when the malicious attackers are fully aware of the watermark embedding algorithm. Experimental results are provided in terms of peak signal to noise ratio (PSNR), normalized cross correlation (NCC) and gain factor to demonstrate the effectiveness of the proposed algorithm. Image operations such as JPEG compression from malicious image attacks and, thus, can be used for semi-fragile watermarking.
Image watermarking based on integer wavelet transform-singular value decompos...IJECEIAES
With the era of rapid technology in multimedia, the copyright protection is very important to preserve an ownership of multimedia data. This paper proposes an image watermarking scheme based on Integer Wavelet Transform (IWT) and Singular Value Decomposition (SVD). The binary watermark is scrambled by Arnold transform before embedding watermark. Embedding locations are determined by using variance pixels. Selected blocks with the lowest variance pixels are transformed by IWT, thus the LL sub-band of 8×8 IWT is computed by using SVD. The orthogonal U matrix component of U3,1 and U4,1 are modified using certain rules by considering the watermark bits and an optimal threshold. This research reveals an optimal threshold value based on the trade-off between robustness and imperceptibility of watermarked image. In order to measure the watermarking performance, the proposed scheme is tested under various attacks. The experimental results indicate that our scheme achieves higher robustness than other scheme under different types of attack.
SVD Based Robust Digital Watermarking For Still Images Using Wavelet Transform cscpconf
This paper aims at developing a hybrid image watermarking algorithm which satisfies both
imperceptibility and robustness requirements. In order to achieve our objectives we have used
singular values of Wavelet Transformation’s HL and LH sub bands to embed watermark.
Further to increase and control the strength of the watermark, we use a scale factor. An optimal
watermark embedding method is developed to achieve minimum watermarking distortion. A
secret embedding key is designed to securely embed the fragile watermarks so that the new
method is robust to counterfeiting, even when the malicious attackers are fully aware of the
watermark embedding algorithm. Experimental results are provided in terms of Peak signal to
noise ratio (PSNR), Normalized cross correlation (NCC) and gain factor to demonstrate the
effectiveness of the proposed algorithm. Image operations such as JPEG compression from
malicious image attacks and, thus, can be used for semi-fragile watermarking
Blind image watermarking scheme based on lowest energy contourlet transform c...nooriasukmaningtyas
The widespread of global internet has led to the need for developing new
methods of protecting multimedia information from exploitation, alteration
or forgery, illegal distribution, and manipulation. An attacker is quickly and
illegally distributing or changing multimedia information by using various
means of computer technology. For detecting this manipulation, this paper
suggests blind watermark image inside a host image for observing in the
receiver. If the watermark image was retrieved, then the host image was not
attacked or manipulated. While if not retrieved, in this case, the image was
attacked. The proposed method is depending on a decomposition of the host
image using lowest energy sub-bands of contourlet transform (4-levels), with
scrambling by ikeda map of the watermark image, and selecting new
positions by modified arnold cat map. This will produce more security and
safety, as well as provide more difficulty or prevent hacking. The obtained
results confirm the robustness against attacks and more effectiveness of the
presented scheme compared with the other similar works. Also, using lowest
energy sub-bands will expand area of embedding and this part will be
considered in the future works with the color images.
Abstract: The increasing amount of applications using digital multimedia technologies has accentuated the need to provide copyright protection to multimedia data. This paper reviews one of the data hiding techniques - digital image watermarking. Through this paper we will explore some basic concepts of digital image watermarking techniques.Two different methods of digital image watermarking namely spatial domain watermarking and transform domain watermarking are briefly discussed in this paper. Furthermore, two different algorithms for a digital image watermarking have also been discussed. Also the comparision between the different algorithms,tests performed for the robustness and the applications of the digital image watermarking have also been discussed.
A New Technique to Digital Image Watermarking Using DWT for Real Time Applica...IJERA Editor
Digital watermarking is an essential technique to add hidden copyright notices or secret messages to digital audio, image, or image forms. In this paper we introduce a new approach for digital image watermarking for real time applications. We have successfully implemented the digital watermarking technique on digital images based on 2-level Discrete Wavelet Transform and compared the performance of the proposed method with Level-1 and Level-2 and Level-3 Discrete Wavelet Transform using the parameter peak signal to noise ratio. To make the watermark robust and to preserve visual significant information a 2-Level Discrete wavelet transform used as transformation domain for both secret image and original image. The watermark is embedded in the original image using Alpha blending technique and implemented using Matlab Simulink.
IOSR Journal of Electronics and Communication Engineering(IOSR-JECE) is an open access international journal that provides rapid publication (within a month) of articles in all areas of electronics and communication engineering and its applications. The journal welcomes publications of high quality papers on theoretical developments and practical applications in electronics and communication engineering. Original research papers, state-of-the-art reviews, and high quality technical notes are invited for publications.
CT-SVD and Arnold Transform for Secure Color Image WatermarkingAM Publications,India
Watermarking is used for protecting copyright of digital images. In this paper, we propose a novel technique for watermarking using Contourlet Transform (CT) and Singular Value Decomposition (SVD). CT ensures imperceptibility of the watermark and SVD ensures its robustness against attacks. Arnold transform is used for scrambling watermark pixels to ensure watermark security. Watermark extraction is semi-blind, which avoids the need for original image for extraction. Both watermark and cover image are color images. Performance of the system is judged by using PSNR and Correlation Coefficient (CC) values. System shows good robustness against noise, JPEG compression, filtering and cropping
A Hybrid DWT-SVD Method for Digital Video Watermarking Using Random Frame Sel...researchinventy
Digital watermarking refers to embedding watermarks in a multimedia documents and files in order to protect them from illegal copying and identifying manipulations. We proposed a technique is Hybrid DWTSVD method for digital video watermarking. This paper presents a robust and secure watermarking algorithm for video sequence. Proposed scheme divide the video in to frames and then blue channel is used for watermarking insertion. Discrete wavelet transform is used for watermark embedding. Watermark is inserted in to mid frequency component for better resistance to video manipulation operation. PSNR and MSE are computed for testing the proposed method
A novel rrw framework to resist accidental attackseSAT Journals
Abstract Robust reversible watermarking (RRW) methods are popular in multimedia for protecting copyright, while preserving intactness of host images and providing robustness against unintentional attacks. Robust reversible watermarking (RRW) is used to protect the copyrights and providing robustness against unintentional attacks. The past histogram rotation-based methods suffer from extremely poor invisibility for watermarked images and limited robustness in extracting watermarks from the watermarked images destroyed by unintentional attacks. This paper proposes a wavelet-domain statistical quantity histogram shifting and clustering (WSQH-SC) method and Enhanced pixel-wise masking (EPWM). This method embeds a new watermark image and extraction procedures by histogram shifting and clustering, which are important for improving robustness and reducing run-time complexity. It is possible reversibility and invisibility. By using WSQH-SC methods reversibility, invisibility of watermarks can be achieved. The experimental results show the comprehensive performance in terms of reversibility, robustness, invisibility, capacity and run-time complexity widely applicable to different kinds of images. Keywords: — Integer wavelet transform, k-means clustering, masking, robust reversible watermarking (RRW)
Similar to A Blind Multiple Watermarks based on Human Visual Characteristics (20)
Bibliometric analysis highlighting the role of women in addressing climate ch...IJECEIAES
Fossil fuel consumption increased quickly, contributing to climate change
that is evident in unusual flooding and draughts, and global warming. Over
the past ten years, women's involvement in society has grown dramatically,
and they succeeded in playing a noticeable role in reducing climate change.
A bibliometric analysis of data from the last ten years has been carried out to
examine the role of women in addressing the climate change. The analysis's
findings discussed the relevant to the sustainable development goals (SDGs),
particularly SDG 7 and SDG 13. The results considered contributions made
by women in the various sectors while taking geographic dispersion into
account. The bibliometric analysis delves into topics including women's
leadership in environmental groups, their involvement in policymaking, their
contributions to sustainable development projects, and the influence of
gender diversity on attempts to mitigate climate change. This study's results
highlight how women have influenced policies and actions related to climate
change, point out areas of research deficiency and recommendations on how
to increase role of the women in addressing the climate change and
achieving sustainability. To achieve more successful results, this initiative
aims to highlight the significance of gender equality and encourage
inclusivity in climate change decision-making processes.
Voltage and frequency control of microgrid in presence of micro-turbine inter...IJECEIAES
The active and reactive load changes have a significant impact on voltage
and frequency. In this paper, in order to stabilize the microgrid (MG) against
load variations in islanding mode, the active and reactive power of all
distributed generators (DGs), including energy storage (battery), diesel
generator, and micro-turbine, are controlled. The micro-turbine generator is
connected to MG through a three-phase to three-phase matrix converter, and
the droop control method is applied for controlling the voltage and
frequency of MG. In addition, a method is introduced for voltage and
frequency control of micro-turbines in the transition state from gridconnected mode to islanding mode. A novel switching strategy of the matrix
converter is used for converting the high-frequency output voltage of the
micro-turbine to the grid-side frequency of the utility system. Moreover,
using the switching strategy, the low-order harmonics in the output current
and voltage are not produced, and consequently, the size of the output filter
would be reduced. In fact, the suggested control strategy is load-independent
and has no frequency conversion restrictions. The proposed approach for
voltage and frequency regulation demonstrates exceptional performance and
favorable response across various load alteration scenarios. The suggested
strategy is examined in several scenarios in the MG test systems, and the
simulation results are addressed.
Enhancing battery system identification: nonlinear autoregressive modeling fo...IJECEIAES
Precisely characterizing Li-ion batteries is essential for optimizing their
performance, enhancing safety, and prolonging their lifespan across various
applications, such as electric vehicles and renewable energy systems. This
article introduces an innovative nonlinear methodology for system
identification of a Li-ion battery, employing a nonlinear autoregressive with
exogenous inputs (NARX) model. The proposed approach integrates the
benefits of nonlinear modeling with the adaptability of the NARX structure,
facilitating a more comprehensive representation of the intricate
electrochemical processes within the battery. Experimental data collected
from a Li-ion battery operating under diverse scenarios are employed to
validate the effectiveness of the proposed methodology. The identified
NARX model exhibits superior accuracy in predicting the battery's behavior
compared to traditional linear models. This study underscores the
importance of accounting for nonlinearities in battery modeling, providing
insights into the intricate relationships between state-of-charge, voltage, and
current under dynamic conditions.
Smart grid deployment: from a bibliometric analysis to a surveyIJECEIAES
Smart grids are one of the last decades' innovations in electrical energy.
They bring relevant advantages compared to the traditional grid and
significant interest from the research community. Assessing the field's
evolution is essential to propose guidelines for facing new and future smart
grid challenges. In addition, knowing the main technologies involved in the
deployment of smart grids (SGs) is important to highlight possible
shortcomings that can be mitigated by developing new tools. This paper
contributes to the research trends mentioned above by focusing on two
objectives. First, a bibliometric analysis is presented to give an overview of
the current research level about smart grid deployment. Second, a survey of
the main technological approaches used for smart grid implementation and
their contributions are highlighted. To that effect, we searched the Web of
Science (WoS), and the Scopus databases. We obtained 5,663 documents
from WoS and 7,215 from Scopus on smart grid implementation or
deployment. With the extraction limitation in the Scopus database, 5,872 of
the 7,215 documents were extracted using a multi-step process. These two
datasets have been analyzed using a bibliometric tool called bibliometrix.
The main outputs are presented with some recommendations for future
research.
Use of analytical hierarchy process for selecting and prioritizing islanding ...IJECEIAES
One of the problems that are associated to power systems is islanding
condition, which must be rapidly and properly detected to prevent any
negative consequences on the system's protection, stability, and security.
This paper offers a thorough overview of several islanding detection
strategies, which are divided into two categories: classic approaches,
including local and remote approaches, and modern techniques, including
techniques based on signal processing and computational intelligence.
Additionally, each approach is compared and assessed based on several
factors, including implementation costs, non-detected zones, declining
power quality, and response times using the analytical hierarchy process
(AHP). The multi-criteria decision-making analysis shows that the overall
weight of passive methods (24.7%), active methods (7.8%), hybrid methods
(5.6%), remote methods (14.5%), signal processing-based methods (26.6%),
and computational intelligent-based methods (20.8%) based on the
comparison of all criteria together. Thus, it can be seen from the total weight
that hybrid approaches are the least suitable to be chosen, while signal
processing-based methods are the most appropriate islanding detection
method to be selected and implemented in power system with respect to the
aforementioned factors. Using Expert Choice software, the proposed
hierarchy model is studied and examined.
Enhancing of single-stage grid-connected photovoltaic system using fuzzy logi...IJECEIAES
The power generated by photovoltaic (PV) systems is influenced by
environmental factors. This variability hampers the control and utilization of
solar cells' peak output. In this study, a single-stage grid-connected PV
system is designed to enhance power quality. Our approach employs fuzzy
logic in the direct power control (DPC) of a three-phase voltage source
inverter (VSI), enabling seamless integration of the PV connected to the
grid. Additionally, a fuzzy logic-based maximum power point tracking
(MPPT) controller is adopted, which outperforms traditional methods like
incremental conductance (INC) in enhancing solar cell efficiency and
minimizing the response time. Moreover, the inverter's real-time active and
reactive power is directly managed to achieve a unity power factor (UPF).
The system's performance is assessed through MATLAB/Simulink
implementation, showing marked improvement over conventional methods,
particularly in steady-state and varying weather conditions. For solar
irradiances of 500 and 1,000 W/m2
, the results show that the proposed
method reduces the total harmonic distortion (THD) of the injected current
to the grid by approximately 46% and 38% compared to conventional
methods, respectively. Furthermore, we compare the simulation results with
IEEE standards to evaluate the system's grid compatibility.
Enhancing photovoltaic system maximum power point tracking with fuzzy logic-b...IJECEIAES
Photovoltaic systems have emerged as a promising energy resource that
caters to the future needs of society, owing to their renewable, inexhaustible,
and cost-free nature. The power output of these systems relies on solar cell
radiation and temperature. In order to mitigate the dependence on
atmospheric conditions and enhance power tracking, a conventional
approach has been improved by integrating various methods. To optimize
the generation of electricity from solar systems, the maximum power point
tracking (MPPT) technique is employed. To overcome limitations such as
steady-state voltage oscillations and improve transient response, two
traditional MPPT methods, namely fuzzy logic controller (FLC) and perturb
and observe (P&O), have been modified. This research paper aims to
simulate and validate the step size of the proposed modified P&O and FLC
techniques within the MPPT algorithm using MATLAB/Simulink for
efficient power tracking in photovoltaic systems.
Adaptive synchronous sliding control for a robot manipulator based on neural ...IJECEIAES
Robot manipulators have become important equipment in production lines, medical fields, and transportation. Improving the quality of trajectory tracking for
robot hands is always an attractive topic in the research community. This is a
challenging problem because robot manipulators are complex nonlinear systems
and are often subject to fluctuations in loads and external disturbances. This
article proposes an adaptive synchronous sliding control scheme to improve trajectory tracking performance for a robot manipulator. The proposed controller
ensures that the positions of the joints track the desired trajectory, synchronize
the errors, and significantly reduces chattering. First, the synchronous tracking
errors and synchronous sliding surfaces are presented. Second, the synchronous
tracking error dynamics are determined. Third, a robust adaptive control law is
designed,the unknown components of the model are estimated online by the neural network, and the parameters of the switching elements are selected by fuzzy
logic. The built algorithm ensures that the tracking and approximation errors
are ultimately uniformly bounded (UUB). Finally, the effectiveness of the constructed algorithm is demonstrated through simulation and experimental results.
Simulation and experimental results show that the proposed controller is effective with small synchronous tracking errors, and the chattering phenomenon is
significantly reduced.
Remote field-programmable gate array laboratory for signal acquisition and de...IJECEIAES
A remote laboratory utilizing field-programmable gate array (FPGA) technologies enhances students’ learning experience anywhere and anytime in embedded system design. Existing remote laboratories prioritize hardware access and visual feedback for observing board behavior after programming, neglecting comprehensive debugging tools to resolve errors that require internal signal acquisition. This paper proposes a novel remote embeddedsystem design approach targeting FPGA technologies that are fully interactive via a web-based platform. Our solution provides FPGA board access and debugging capabilities beyond the visual feedback provided by existing remote laboratories. We implemented a lab module that allows users to seamlessly incorporate into their FPGA design. The module minimizes hardware resource utilization while enabling the acquisition of a large number of data samples from the signal during the experiments by adaptively compressing the signal prior to data transmission. The results demonstrate an average compression ratio of 2.90 across three benchmark signals, indicating efficient signal acquisition and effective debugging and analysis. This method allows users to acquire more data samples than conventional methods. The proposed lab allows students to remotely test and debug their designs, bridging the gap between theory and practice in embedded system design.
Detecting and resolving feature envy through automated machine learning and m...IJECEIAES
Efficiently identifying and resolving code smells enhances software project quality. This paper presents a novel solution, utilizing automated machine learning (AutoML) techniques, to detect code smells and apply move method refactoring. By evaluating code metrics before and after refactoring, we assessed its impact on coupling, complexity, and cohesion. Key contributions of this research include a unique dataset for code smell classification and the development of models using AutoGluon for optimal performance. Furthermore, the study identifies the top 20 influential features in classifying feature envy, a well-known code smell, stemming from excessive reliance on external classes. We also explored how move method refactoring addresses feature envy, revealing reduced coupling and complexity, and improved cohesion, ultimately enhancing code quality. In summary, this research offers an empirical, data-driven approach, integrating AutoML and move method refactoring to optimize software project quality. Insights gained shed light on the benefits of refactoring on code quality and the significance of specific features in detecting feature envy. Future research can expand to explore additional refactoring techniques and a broader range of code metrics, advancing software engineering practices and standards.
Smart monitoring technique for solar cell systems using internet of things ba...IJECEIAES
Rapidly and remotely monitoring and receiving the solar cell systems status parameters, solar irradiance, temperature, and humidity, are critical issues in enhancement their efficiency. Hence, in the present article an improved smart prototype of internet of things (IoT) technique based on embedded system through NodeMCU ESP8266 (ESP-12E) was carried out experimentally. Three different regions at Egypt; Luxor, Cairo, and El-Beheira cities were chosen to study their solar irradiance profile, temperature, and humidity by the proposed IoT system. The monitoring data of solar irradiance, temperature, and humidity were live visualized directly by Ubidots through hypertext transfer protocol (HTTP) protocol. The measured solar power radiation in Luxor, Cairo, and El-Beheira ranged between 216-1000, 245-958, and 187-692 W/m 2 respectively during the solar day. The accuracy and rapidity of obtaining monitoring results using the proposed IoT system made it a strong candidate for application in monitoring solar cell systems. On the other hand, the obtained solar power radiation results of the three considered regions strongly candidate Luxor and Cairo as suitable places to build up a solar cells system station rather than El-Beheira.
An efficient security framework for intrusion detection and prevention in int...IJECEIAES
Over the past few years, the internet of things (IoT) has advanced to connect billions of smart devices to improve quality of life. However, anomalies or malicious intrusions pose several security loopholes, leading to performance degradation and threat to data security in IoT operations. Thereby, IoT security systems must keep an eye on and restrict unwanted events from occurring in the IoT network. Recently, various technical solutions based on machine learning (ML) models have been derived towards identifying and restricting unwanted events in IoT. However, most ML-based approaches are prone to miss-classification due to inappropriate feature selection. Additionally, most ML approaches applied to intrusion detection and prevention consider supervised learning, which requires a large amount of labeled data to be trained. Consequently, such complex datasets are impossible to source in a large network like IoT. To address this problem, this proposed study introduces an efficient learning mechanism to strengthen the IoT security aspects. The proposed algorithm incorporates supervised and unsupervised approaches to improve the learning models for intrusion detection and mitigation. Compared with the related works, the experimental outcome shows that the model performs well in a benchmark dataset. It accomplishes an improved detection accuracy of approximately 99.21%.
Developing a smart system for infant incubators using the internet of things ...IJECEIAES
This research is developing an incubator system that integrates the internet of things and artificial intelligence to improve care for premature babies. The system workflow starts with sensors that collect data from the incubator. Then, the data is sent in real-time to the internet of things (IoT) broker eclipse mosquito using the message queue telemetry transport (MQTT) protocol version 5.0. After that, the data is stored in a database for analysis using the long short-term memory network (LSTM) method and displayed in a web application using an application programming interface (API) service. Furthermore, the experimental results produce as many as 2,880 rows of data stored in the database. The correlation coefficient between the target attribute and other attributes ranges from 0.23 to 0.48. Next, several experiments were conducted to evaluate the model-predicted value on the test data. The best results are obtained using a two-layer LSTM configuration model, each with 60 neurons and a lookback setting 6. This model produces an R 2 value of 0.934, with a root mean square error (RMSE) value of 0.015 and a mean absolute error (MAE) of 0.008. In addition, the R 2 value was also evaluated for each attribute used as input, with a result of values between 0.590 and 0.845.
A review on internet of things-based stingless bee's honey production with im...IJECEIAES
Honey is produced exclusively by honeybees and stingless bees which both are well adapted to tropical and subtropical regions such as Malaysia. Stingless bees are known for producing small amounts of honey and are known for having a unique flavor profile. Problem identified that many stingless bees collapsed due to weather, temperature and environment. It is critical to understand the relationship between the production of stingless bee honey and environmental conditions to improve honey production. Thus, this paper presents a review on stingless bee's honey production and prediction modeling. About 54 previous research has been analyzed and compared in identifying the research gaps. A framework on modeling the prediction of stingless bee honey is derived. The result presents the comparison and analysis on the internet of things (IoT) monitoring systems, honey production estimation, convolution neural networks (CNNs), and automatic identification methods on bee species. It is identified based on image detection method the top best three efficiency presents CNN is at 98.67%, densely connected convolutional networks with YOLO v3 is 97.7%, and DenseNet201 convolutional networks 99.81%. This study is significant to assist the researcher in developing a model for predicting stingless honey produced by bee's output, which is important for a stable economy and food security.
A trust based secure access control using authentication mechanism for intero...IJECEIAES
The internet of things (IoT) is a revolutionary innovation in many aspects of our society including interactions, financial activity, and global security such as the military and battlefield internet. Due to the limited energy and processing capacity of network devices, security, energy consumption, compatibility, and device heterogeneity are the long-term IoT problems. As a result, energy and security are critical for data transmission across edge and IoT networks. Existing IoT interoperability techniques need more computation time, have unreliable authentication mechanisms that break easily, lose data easily, and have low confidentiality. In this paper, a key agreement protocol-based authentication mechanism for IoT devices is offered as a solution to this issue. This system makes use of information exchange, which must be secured to prevent access by unauthorized users. Using a compact contiki/cooja simulator, the performance and design of the suggested framework are validated. The simulation findings are evaluated based on detection of malicious nodes after 60 minutes of simulation. The suggested trust method, which is based on privacy access control, reduced packet loss ratio to 0.32%, consumed 0.39% power, and had the greatest average residual energy of 0.99 mJoules at 10 nodes.
Fuzzy linear programming with the intuitionistic polygonal fuzzy numbersIJECEIAES
In real world applications, data are subject to ambiguity due to several factors; fuzzy sets and fuzzy numbers propose a great tool to model such ambiguity. In case of hesitation, the complement of a membership value in fuzzy numbers can be different from the non-membership value, in which case we can model using intuitionistic fuzzy numbers as they provide flexibility by defining both a membership and a non-membership functions. In this article, we consider the intuitionistic fuzzy linear programming problem with intuitionistic polygonal fuzzy numbers, which is a generalization of the previous polygonal fuzzy numbers found in the literature. We present a modification of the simplex method that can be used to solve any general intuitionistic fuzzy linear programming problem after approximating the problem by an intuitionistic polygonal fuzzy number with n edges. This method is given in a simple tableau formulation, and then applied on numerical examples for clarity.
The performance of artificial intelligence in prostate magnetic resonance im...IJECEIAES
Prostate cancer is the predominant form of cancer observed in men worldwide. The application of magnetic resonance imaging (MRI) as a guidance tool for conducting biopsies has been established as a reliable and well-established approach in the diagnosis of prostate cancer. The diagnostic performance of MRI-guided prostate cancer diagnosis exhibits significant heterogeneity due to the intricate and multi-step nature of the diagnostic pathway. The development of artificial intelligence (AI) models, specifically through the utilization of machine learning techniques such as deep learning, is assuming an increasingly significant role in the field of radiology. In the realm of prostate MRI, a considerable body of literature has been dedicated to the development of various AI algorithms. These algorithms have been specifically designed for tasks such as prostate segmentation, lesion identification, and classification. The overarching objective of these endeavors is to enhance diagnostic performance and foster greater agreement among different observers within MRI scans for the prostate. This review article aims to provide a concise overview of the application of AI in the field of radiology, with a specific focus on its utilization in prostate MRI.
Seizure stage detection of epileptic seizure using convolutional neural networksIJECEIAES
According to the World Health Organization (WHO), seventy million individuals worldwide suffer from epilepsy, a neurological disorder. While electroencephalography (EEG) is crucial for diagnosing epilepsy and monitoring the brain activity of epilepsy patients, it requires a specialist to examine all EEG recordings to find epileptic behavior. This procedure needs an experienced doctor, and a precise epilepsy diagnosis is crucial for appropriate treatment. To identify epileptic seizures, this study employed a convolutional neural network (CNN) based on raw scalp EEG signals to discriminate between preictal, ictal, postictal, and interictal segments. The possibility of these characteristics is explored by examining how well timedomain signals work in the detection of epileptic signals using intracranial Freiburg Hospital (FH), scalp Children's Hospital Boston-Massachusetts Institute of Technology (CHB-MIT) databases, and Temple University Hospital (TUH) EEG. To test the viability of this approach, two types of experiments were carried out. Firstly, binary class classification (preictal, ictal, postictal each versus interictal) and four-class classification (interictal versus preictal versus ictal versus postictal). The average accuracy for stage detection using CHB-MIT database was 84.4%, while the Freiburg database's time-domain signals had an accuracy of 79.7% and the highest accuracy of 94.02% for classification in the TUH EEG database when comparing interictal stage to preictal stage.
Analysis of driving style using self-organizing maps to analyze driver behaviorIJECEIAES
Modern life is strongly associated with the use of cars, but the increase in acceleration speeds and their maneuverability leads to a dangerous driving style for some drivers. In these conditions, the development of a method that allows you to track the behavior of the driver is relevant. The article provides an overview of existing methods and models for assessing the functioning of motor vehicles and driver behavior. Based on this, a combined algorithm for recognizing driving style is proposed. To do this, a set of input data was formed, including 20 descriptive features: About the environment, the driver's behavior and the characteristics of the functioning of the car, collected using OBD II. The generated data set is sent to the Kohonen network, where clustering is performed according to driving style and degree of danger. Getting the driving characteristics into a particular cluster allows you to switch to the private indicators of an individual driver and considering individual driving characteristics. The application of the method allows you to identify potentially dangerous driving styles that can prevent accidents.
Hyperspectral object classification using hybrid spectral-spatial fusion and ...IJECEIAES
Because of its spectral-spatial and temporal resolution of greater areas, hyperspectral imaging (HSI) has found widespread application in the field of object classification. The HSI is typically used to accurately determine an object's physical characteristics as well as to locate related objects with appropriate spectral fingerprints. As a result, the HSI has been extensively applied to object identification in several fields, including surveillance, agricultural monitoring, environmental research, and precision agriculture. However, because of their enormous size, objects require a lot of time to classify; for this reason, both spectral and spatial feature fusion have been completed. The existing classification strategy leads to increased misclassification, and the feature fusion method is unable to preserve semantic object inherent features; This study addresses the research difficulties by introducing a hybrid spectral-spatial fusion (HSSF) technique to minimize feature size while maintaining object intrinsic qualities; Lastly, a soft-margins kernel is proposed for multi-layer deep support vector machine (MLDSVM) to reduce misclassification. The standard Indian pines dataset is used for the experiment, and the outcome demonstrates that the HSSF-MLDSVM model performs substantially better in terms of accuracy and Kappa coefficient.
Saudi Arabia stands as a titan in the global energy landscape, renowned for its abundant oil and gas resources. It's the largest exporter of petroleum and holds some of the world's most significant reserves. Let's delve into the top 10 oil and gas projects shaping Saudi Arabia's energy future in 2024.
Hierarchical Digital Twin of a Naval Power SystemKerry Sado
A hierarchical digital twin of a Naval DC power system has been developed and experimentally verified. Similar to other state-of-the-art digital twins, this technology creates a digital replica of the physical system executed in real-time or faster, which can modify hardware controls. However, its advantage stems from distributing computational efforts by utilizing a hierarchical structure composed of lower-level digital twin blocks and a higher-level system digital twin. Each digital twin block is associated with a physical subsystem of the hardware and communicates with a singular system digital twin, which creates a system-level response. By extracting information from each level of the hierarchy, power system controls of the hardware were reconfigured autonomously. This hierarchical digital twin development offers several advantages over other digital twins, particularly in the field of naval power systems. The hierarchical structure allows for greater computational efficiency and scalability while the ability to autonomously reconfigure hardware controls offers increased flexibility and responsiveness. The hierarchical decomposition and models utilized were well aligned with the physical twin, as indicated by the maximum deviations between the developed digital twin hierarchy and the hardware.
Overview of the fundamental roles in Hydropower generation and the components involved in wider Electrical Engineering.
This paper presents the design and construction of hydroelectric dams from the hydrologist’s survey of the valley before construction, all aspects and involved disciplines, fluid dynamics, structural engineering, generation and mains frequency regulation to the very transmission of power through the network in the United Kingdom.
Author: Robbie Edward Sayers
Collaborators and co editors: Charlie Sims and Connor Healey.
(C) 2024 Robbie E. Sayers
About
Indigenized remote control interface card suitable for MAFI system CCR equipment. Compatible for IDM8000 CCR. Backplane mounted serial and TCP/Ethernet communication module for CCR remote access. IDM 8000 CCR remote control on serial and TCP protocol.
• Remote control: Parallel or serial interface.
• Compatible with MAFI CCR system.
• Compatible with IDM8000 CCR.
• Compatible with Backplane mount serial communication.
• Compatible with commercial and Defence aviation CCR system.
• Remote control system for accessing CCR and allied system over serial or TCP.
• Indigenized local Support/presence in India.
• Easy in configuration using DIP switches.
Technical Specifications
Indigenized remote control interface card suitable for MAFI system CCR equipment. Compatible for IDM8000 CCR. Backplane mounted serial and TCP/Ethernet communication module for CCR remote access. IDM 8000 CCR remote control on serial and TCP protocol.
Key Features
Indigenized remote control interface card suitable for MAFI system CCR equipment. Compatible for IDM8000 CCR. Backplane mounted serial and TCP/Ethernet communication module for CCR remote access. IDM 8000 CCR remote control on serial and TCP protocol.
• Remote control: Parallel or serial interface
• Compatible with MAFI CCR system
• Copatiable with IDM8000 CCR
• Compatible with Backplane mount serial communication.
• Compatible with commercial and Defence aviation CCR system.
• Remote control system for accessing CCR and allied system over serial or TCP.
• Indigenized local Support/presence in India.
Application
• Remote control: Parallel or serial interface.
• Compatible with MAFI CCR system.
• Compatible with IDM8000 CCR.
• Compatible with Backplane mount serial communication.
• Compatible with commercial and Defence aviation CCR system.
• Remote control system for accessing CCR and allied system over serial or TCP.
• Indigenized local Support/presence in India.
• Easy in configuration using DIP switches.
Immunizing Image Classifiers Against Localized Adversary Attacksgerogepatton
This paper addresses the vulnerability of deep learning models, particularly convolutional neural networks
(CNN)s, to adversarial attacks and presents a proactive training technique designed to counter them. We
introduce a novel volumization algorithm, which transforms 2D images into 3D volumetric representations.
When combined with 3D convolution and deep curriculum learning optimization (CLO), itsignificantly improves
the immunity of models against localized universal attacks by up to 40%. We evaluate our proposed approach
using contemporary CNN architectures and the modified Canadian Institute for Advanced Research (CIFAR-10
and CIFAR-100) and ImageNet Large Scale Visual Recognition Challenge (ILSVRC12) datasets, showcasing
accuracy improvements over previous techniques. The results indicate that the combination of the volumetric
input and curriculum learning holds significant promise for mitigating adversarial attacks without necessitating
adversary training.
NO1 Uk best vashikaran specialist in delhi vashikaran baba near me online vas...Amil Baba Dawood bangali
Contact with Dawood Bhai Just call on +92322-6382012 and we'll help you. We'll solve all your problems within 12 to 24 hours and with 101% guarantee and with astrology systematic. If you want to take any personal or professional advice then also you can call us on +92322-6382012 , ONLINE LOVE PROBLEM & Other all types of Daily Life Problem's.Then CALL or WHATSAPP us on +92322-6382012 and Get all these problems solutions here by Amil Baba DAWOOD BANGALI
#vashikaranspecialist #astrologer #palmistry #amliyaat #taweez #manpasandshadi #horoscope #spiritual #lovelife #lovespell #marriagespell#aamilbabainpakistan #amilbabainkarachi #powerfullblackmagicspell #kalajadumantarspecialist #realamilbaba #AmilbabainPakistan #astrologerincanada #astrologerindubai #lovespellsmaster #kalajaduspecialist #lovespellsthatwork #aamilbabainlahore#blackmagicformarriage #aamilbaba #kalajadu #kalailam #taweez #wazifaexpert #jadumantar #vashikaranspecialist #astrologer #palmistry #amliyaat #taweez #manpasandshadi #horoscope #spiritual #lovelife #lovespell #marriagespell#aamilbabainpakistan #amilbabainkarachi #powerfullblackmagicspell #kalajadumantarspecialist #realamilbaba #AmilbabainPakistan #astrologerincanada #astrologerindubai #lovespellsmaster #kalajaduspecialist #lovespellsthatwork #aamilbabainlahore #blackmagicforlove #blackmagicformarriage #aamilbaba #kalajadu #kalailam #taweez #wazifaexpert #jadumantar #vashikaranspecialist #astrologer #palmistry #amliyaat #taweez #manpasandshadi #horoscope #spiritual #lovelife #lovespell #marriagespell#aamilbabainpakistan #amilbabainkarachi #powerfullblackmagicspell #kalajadumantarspecialist #realamilbaba #AmilbabainPakistan #astrologerincanada #astrologerindubai #lovespellsmaster #kalajaduspecialist #lovespellsthatwork #aamilbabainlahore #Amilbabainuk #amilbabainspain #amilbabaindubai #Amilbabainnorway #amilbabainkrachi #amilbabainlahore #amilbabaingujranwalan #amilbabainislamabad
2. Int J Elec & Comp Eng ISSN: 2088-8708
A Blind Multiple Watermarks based on Human Visual Characteristics (Ferda Ernawan)
2579
methods [11]-[14] have been formulated for multiple watermarking scheme. Multiple watermarking scheme
provides more security and robustness [16], [17].
This paper describes a hybrid method using DCT-SVD based on human visual characteristics for
multiple watermarks. Referring to [18], red color contributes 65% cones which sensitive to human eyes,
green color provides 33% sensitivity and blue color has produces 2% sensitivity. Embedding multiple
watermarks on green and blue colors successively can achieve transparency watermarked image. While the
watermark can easily be removed when the watermarked image was compressed by JPEG. Luminance and
chrominance blue exihibite less sensitivity to human eyes. Therefore, watermark bits are embedded into
luminance and chrominance blue components. Embedding of multiple watermarks is performed by
examining the relationship of U3,1 and U4,1 coefficients of SVD. To enhance the security of watermarked
images, the two watermarks are scrambled by Arnold chaotic. Finally, the selected blocks are inversed by
SVD and DCT to get the watermarked image. The proposed scheme can achieve an improved robustness and
imperceptibility of watermarked image.
The related works demonstrate that multiple watermarks are a vital role in multimedia security. This
watermarking model can be improved by the hybrid techniques and extra security can be achieved using
scrambled watermarks. A new hybrid block-based image watermarking is proposed based on the HVS
characteristics and the embedding process is carried out based on modifying first column of orthogonal
matrix U of SVD. This scheme attains high robustness against attacks. The highlights and some special
features of the proposed scheme are provided as follows:
a. Our scheme proposes multiple watermarks embedding which considers entropy and edge entropy. This
paper proposes an optimal threshold for multiple watermarking in luminance and chrominance blue. Our
scheme produces minimum distortion in the visual watermarked image.
b. Multiple watermarks embedding are performed by examining the first column of U matrix. Watermark
embedding on U matrix of luminance and chrominance blue can improve the robustness and invisibility
of multiple watermarks.
c. Confidentially of watermark image is an important information, it should be extracted by authorized
users. To improve the security level, multiple watermarks are scrambled before they are embedded into
luminance and chrominance blue which can provide extra security in the watermarked image.
d. By finding optimal thresholds for each image component, the quality of the watermarked image produces
high image quality and the recovered watermark resistants against different types of attack.
2. RESEARCH METHOD
2.1. Arnold scrambling
Watermark images are scrambled by Arnold chaotic map to increase the security of multiple
watermarking. Scrambled watermarks cannot be recovered without a secret key even attackers successfully
extract the watermark from luminance and chrominance blue components of the watermarked image. Arnold
scrambling transformation is defined by [19]:
N
y
x
y
x
mod
21
11
'
'
(1)
where
'
'
y
x
represents vector position after shifting,
y
x
represents original vector position before shifting
and mod denotes the modulus operation after division with N. The parameter N represents the period of
Arnold scrambling. In this experiment, the number of iteration order N is used as a secret key for scrambling
transformation. In order to inverse the watermark image, the inverse Arnold transformation can be defined
by:
N
y
x
y
x
mod
'
'
11
12
(2)
2.2. Human visual characteristics
Human visual characteristics less sensitive against redundancy of image information. It can be
described through entropy to determine most redundant image information. Entropy was exploited to select
significant embedding region. Entropy are applied to determine embedding locations for multiple watermarks
3. ISSN: 2088-8708
Int J Elec & Comp Eng, Vol. 8, No. 4, August 2018 : 2578 – 2587
2580
image. Embedding certain amount of watermark bits in the luminance and chrominance must be invisible to
human eyes. The entropy was used to measure the spatial correlation of neighbor pixels. Entropy of an N-
state is defined by [20]:
2
1
log ( )
N
i i
i
E p p
(3)
Image edge is an important information of image characteristics. Edge entropy of an image block is
considered for embedding regions. Edge entropy is given as follows:
1
1
exp i
N
p
edge i
i
E p
(4)
where ip denotes the occurrence probability of i-th pixel with 0 1ip and 1- ip represents the uncertainty
or ignorance of the pixel value. The values obtained from combination between entropy and edge entropy are
sorted in ascending order and the lowest value are choosen as embedding regions.
2.3. DCT
A true-color host image is transformed into YCbCr color space. Each component (luminance and
chrominance blue) is divided into small blocks, then each block is computed by modified entropy. Selected
blocks are transformed by two-dimensional DCT to produce the frequency image signals. The two-
dimensional DCT matrix B of an input image A is computed by [21]:
1 1
0 0
(2 1) (2 1)
cos cos ,
2 2
M N
mnpq p q
m n
m p n q
A
M N
B
(5)
for p = 0, 1, 2, …, M1 and q = 0, 1, 2, …, N1 where
1
, 0
2
, 0
p
for p
M
for p
M
1
, 0
2
, 0
q
for q
N
for q
N
(6)
The inverse of two-dimensional DCT is calculated using
1 1
0 0
(2 1) (2 1)
cos cos ,
2 2
M N
p q mnpq
m n
m p n q
A B
M N
(7)
The DCT coefficients are then transformed by SVD which is described in the next sub-section.
2.4. SVD
The SVD factorizes a real or complex matrix into three matrices which are U, S and V matrix. SVD
of A can be presented as follows [22]:
T
A USV (8)
Where U is orthonormal eigenvectors of AAT
, S is a diagonal matrix containing the square of the
eigenvalues A in descending order and V is orthonormal vectors of AT
A. Embedding is performed in the first
column of the orthogonal matrix U by examining U3,1 and U4,1 using some rules. The rules are used to embed
and extract multiple watermarks in the DCT-SVD domain. The rules are described in the proposed
watermarking embedding and extraction algorithms in the next section.
4. Int J Elec & Comp Eng ISSN: 2088-8708
A Blind Multiple Watermarks based on Human Visual Characteristics (Ferda Ernawan)
2581
2.5. Imperceptibility measurement
This section describes the metrics to evaluate the proposed watermarking scheme. In order to
demonstrate the performance of the proposed scheme, the watermarked imperceptibility is evaluated by
structural similarity (SSIM) index. SSIM is computed by:
( , ) ( , ) ( , ) ( , )SSIM x y l x y c x y s x y
(9)
where α>0, β>0, γ>0, are parameters which can be adjusted to signify their relative importance.
2.6. Robustness measurement
Robustness of watermark extraction is measured by Normalized Cross-Correlation (NC) and Bit
Error Rate (BER). NC and BER are given as [23]-[25]:
1 1
2 2
1 1 1 1
( , ). ( , )
( , ) ( , )
M N
i j
M N M N
i j i j
W i j W i j
NC
W i j W i j
(10)
1 1
( , ) ( , )
M N
i j
W i j W i j
BER
M N
(11)
where denotes the exclusive OR operation. M and N represent rows and columns size of the watermark
image, ( , )W i j
is the extracted watermark and the W(i, j) is the original watermark.
3. PROPOSED SCHEME
3.1. Watermark insertion
Watermark insertion process is divided into ten steps. The proposed multiple watermarks scheme is
described in Algorithm 1.
Algorithm 1: Watermark Insertion
Input: Host image; watermark; threshold (T)
Step 1: The cover color image is converted to YCbCr color channels. Embedding multiple watermarks is performed in
Luminance (Y) and Chrominance-Blue (Cb).
Step 2: Luminance and chrominance blue are divided by 8×8 pixels.
Step 3: Calculate entropy values for each block.
Step 4: Select blocks based on entropy values and save the x and y coordinates
Step 5: Both binary watermarks are scrambled by Arnold chaotic.
Step 6: Apply DCT for each selected blocks.
Step 7: Perform SVD based on block-based DCT coefficients for watermark embedding.
Step 8: For each watermark bit, embed watermark according to the rules as follows:
Rule 1: if the number of bits are less than maximum watermark bits, calculate the average U3,1 and U4,1 coefficients
and save it to m.
Rule 2: if the binary watermark equal to 1 and U3,1 coefficient is less than U4,1 coefficient, modify the coefficients by:
U3,1=m+ T/2; U4,1=m - T/2.
Rule 3: if the binary watermark bit equal to 0 and U3,1 coefficient is less than U4,1 coefficient, modify the coefficients
by: U3,1=m - T/2; U4,1=m + T/2.
Step 9: Perform the inverse SVD, then applying the inverse DCT on each selected block.
Step 10: Merging all YCbCr components and convert YCbCr to RGB color image to obtain the watermarked image.
Output: Watermarked image containing a watermark
3.2. Watermark extraction
Step-by-steps to extract multiple watermarks are divided into sevent steps as described in
Algorithm 2.
5. ISSN: 2088-8708
Int J Elec & Comp Eng, Vol. 8, No. 4, August 2018 : 2578 – 2587
2582
Algorithm 2: Watermark Extraction
Input: Watermarked image
Step 1: A watermarked color image is converted to YCbCr color channels. Extraction multiple watermarks is performed in
Luminance (Y) and Chrominance-Blue (Cb)
Step 2: Selected block coordinates are used to find the location of embedded multiple watermarks
Step 3: Apply DCT for each selected blocks.
Step 4: Perform SVD on DCT selected block coefficients for extraction purpose in the first column orthogonal U matrix.
Step 5: For each bit of recovered binary watermark is described as follows:
Rule 1: if the number of recovered watermark bits are less than watermark size, calculate the different between U3,1
and U4,1 coefficients
Rule 2: if the different value of U3,1 and U4,1 coefficients is greater than 0, then binary recovered watermark bit =1.
Rule 3: if the different value of U3,1 and U4,1 coefficients is lesser than 0, then binary recovered watermark bit =0.
Step 6: Perform Step 3 to Step 5 for both luminance and chrominance-blue channels until the length of the watermark.
Step 7: Apply inverse Arnold chaotic for both binary watermarks
Output: Watermark recoveries
4. EXPERIMENTAL RESULTS
The proposed multiple watermarking scheme is employed on five true color images with
512×512 pixels as shown in Figure 1. The original true color images are taken from CVG-UGR
database [26].
(a) (b) (c) (d) (e) (f) (g)
Figure 1. Host images: (a) Lena, (b) pepper, (c) car, (d) airplane, (e) sailboat (f) first watermark
(g) second watermark
(a) (b)
Figure 2. An optimal threshold for (a) luminance and (b) chrominance blue
The number of selected blocks for luminance and chrominance blue is 1024, it equal to the
watermark size with 32×32 pixels. Using the experiment, we find a threshold as an optimal trade-off between
transparency and robustness against JPEG compression for the proposed scheme. JPEG compression is the
most popular standard image compression techniques and it has been widely implemented on most digital
cameras [27]-[37]. The experimental results have revealed the optimal thresholds as about 0.016 and 0.24 for
luminance and chrominance, respectively as shown in Figure 2. The multiple watermark insertion and
extraction process are shown in Figure 3 and Figure 4.
0.008 0.01 0.012 0.014 0.016 0.018 0.02 0.022 0.024
0.75
0.8
0.85
0.9
0.95
Threshold against JPEG Compression
Value
Results obtained from JPEG Images
SSIM
NC
0.1 0.15 0.2 0.25 0.3
0.5
0.55
0.6
0.65
0.7
0.75
0.8
0.85
0.9
Threshold against JPEG Compression
Value
Results obtained from JPEG Images
SSIM
NC
6. Int J Elec & Comp Eng ISSN: 2088-8708
A Blind Multiple Watermarks based on Human Visual Characteristics (Ferda Ernawan)
2583
Figure 3. Embedding block diagram
Figure 4. Extraction block diagram
7. ISSN: 2088-8708
Int J Elec & Comp Eng, Vol. 8, No. 4, August 2018 : 2578 – 2587
2584
In this experiment, the proposed multiple watermarks prove the robustness against signal processing
attacks especially for embedding in chrominance blue. The embedding in the chrominance blue channel can
provide less distortion and it provides higher robustness than embedding in the luminance component.
Figure 5 shows the recovered multiple watermarks under the different types of attack. Table 1 and Table 2
show the imperceptibility and robustness of watermarked image from Lena image.
(a) (b) (c) (d)
(e) (f) (g) (h)
(i) (j) (k) (l)
Figure 5. Results under different types of attack and the corresponding recovered watermark using
(a) gaussian low pass filter [33], (b) gaussian noise 0.001, (c) sharpening, (d) median filter (3×3), (e) pepper
and salt noise 0.1%, (f) speckle noise 0.01, (g) poisson noise, (h) adjust, (i) histogram equalization attack
(j) cropping rows off 25%, (k) cropping columns off 25%, (l) scaling 0.5
Table 1. NC Values for Lena Image under different Geometrical Attacks
Attack SSIM
Watermark 1 Watermark 2
NC BER NC BER
Cropping rows off 25% 0.6605 0.8100 0.1699 0.8393 0.1475
Cropping rows off 50% 0.4364 0.6427 0.2900 0.6471 0.2900
Cropping columns off 25% 0.6547 0.8824 0.1094 0.8252 0.1592
Cropping columns off 50% 0.4176 0.8293 0.1543 0.7363 0.2285
Rotation 2˚ 0.4905 0.5542 0.4756 0.4635 0.5078
Rotation 45˚ 0.2004 0.5069 0.4922 0.4203 0.5186
Translate attack (10, 10) 0.2773 0.5292 0.5264 0.4650 0.5195
Translate attack (10, 20) 0.2680 0.4063 0.4980 0.4449 0.5146
Scaling 0.5 0.8845 0.9970 0.0029 1 0
Scaling 0.25 0.8857 0.6520 0.3398 0.9980 0.0020
Table 2. NC Values for Lena Image under different Signal Processing Attacks
Attack SSIM
Watermark 1 Watermark 2
NC BER NC BER
Gaussian Low Pass Filter [3 3] 0.8857 0.9780 0.0225 1 0
Gaussian Low Pass Filter [5 5] 0.8881 0.9609 0.0410 1 0
Gaussian Noise 0.001 0.8039 0.9068 0.0918 1 0
Gaussian Noise 0.005 0.6512 0.7248 0.2842 1 0
Sharpening 0.7930 0.9535 0.0449 1 0
Median Filter [3 3] 0.8835 0.9722 0.0283 1 0
Median Filter [5 5] 0.9031 0.7834 0.2813 0.9923 0.0078
Pepper and Salt Noise 0.1% 0.8548 0.9831 0.0166 1 0
8. Int J Elec & Comp Eng ISSN: 2088-8708
A Blind Multiple Watermarks based on Human Visual Characteristics (Ferda Ernawan)
2585
Attack SSIM
Watermark 1 Watermark 2
NC BER NC BER
Pepper and Salt Noise 1% 0.7386 0.8438 0.1533 1 0
Speckle Noise 0.01 0.7079 0.7774 0.2197 1 0
Poisson Noise 0.7466 0.8172 0.1846 1 0
Adjust 0.7925 0.9950 0.0049 1 0
Histogram Equalization Attack 0.6726 0.9030 0.0957 1 0
JPEG with Q=40 0.8824 0.5874 0.3857 0.7377 0.2559
JPEG with Q=50 0.8684 0.8203 0.1729 0.8738 0.1270
JPEG with Q=60 0.8653 0.9527 0.0469 0.9195 0.0811
JPEG with Q=70 0.8680 0.9970 0.0029 0.9740 0.0264
Figure 6 shows bit error rate of the proposed scheme against JPEG and JPEG2000 compression with
different types of compression level. It can be noticed that watermark insertion in chrominance blue is more
resistants against JPEG2000 than watermark insertion in luminance.
(a) (b)
Figure 6. BER values of the proposed scheme against JPEG and JPEG2000 compression
5. CONCLUSION
This paper proposes block-based multiple watermarking scheme based on human visual
characteristics. This experiment demonstrated the multiple watermarks insertion into host images by
examining U3,1 and U4,1 of the orthogonal matrix. The proposed scheme provides robustness and resistance
against signal processing attacks. The two scrambled watermarks provides extra security and difficult to be
identified. The distributed watermarks embedding based on human visual characteristics can achieve high
imperceptibility of watermarked image. Furthermore, the embedding scheme for luminance and chrominance
blue pairs effectively provides resistance to altered signal processing attacks like JPEG, image noise, image
filter, sharpening, and geometric attacks like scaling, translation, cropping. The optimal threshold for
multiple watermarks is able to achieve optimal robustness and imperceptibility. The results have proven that
our proposed scheme holds excellent robustness and imperceptibility for multiple watermarks.
ACKNOWLEDGEMENTS
The authors express their thanks to Universiti Malaysia Pahang, Malaysia for providing the financial
support for this research project through UMP Research Grant Scheme (RDU170399).
REFERENCES
[1] F. Ernawan, M. N. Kabir, M. Fadli, Z. Mustaffa, “Block-based Tchebichef image watermarking scheme using
psychovisual threshold,” 2nd International Conference on Science and Technology Computer, pp. 006-010, 2016.
[2] F. Ernawan, “Robust Image Watermarking Based on Psychovisual Threshold,” Journal of ICT Research and
Applications, vol.10, no. 3, pp.228-242, 2016.
[3] N.A. Abu, F. Ernawan, N. Suryana, S. Sahib, “Image Watermarking Using Psychovisual Threshold over the Edge,”
Information and Communication Technology, ICT-EurAsia 2013, LNCS, vol. 7804, pp. 519-527, 2013.
2 4 6 8 10 12 14 16 18
0
0.02
0.04
0.06
0.08
0.1
0.12
0.14
0.16
0.18
0.2
Compression Ratio
BER
Results Obtained from JPEG2000 Image
Watermark in Luminance
Watermark in Chrominance Blue
2 4 6 8 10 12 14 16 18
0
0.02
0.04
0.06
0.08
0.1
0.12
0.14
0.16
0.18
0.2
Compression Ratio
BER
Results Obtained from JPEG2000 Image
Watermark in Luminance
Watermark in Chrominance Blue
9. ISSN: 2088-8708
Int J Elec & Comp Eng, Vol. 8, No. 4, August 2018 : 2578 – 2587
2586
[4] S. Roy and A.K. Pal, “A blind DCT based color watermarking algorithm for embedding multiple watermarks,”
International Journal of Electronics and Communications, vol. 72, pp. 149-161, 2017.
[5] H.-T. Hu and L.-Y. Hsu, “Exploring DWT-SVD-DCT feature parameters for robust multiple watermarking against
JPEG and JPEG2000 compression,” Computers and Electrical Engineering, vol. 41, pp. 052-063, 2015.
[6] C.-C. Lai, “An improved SVD-based watermarking scheme using human visual characteristics,” Optics
Communications, vol. 284, no. 4, pp. 938-944, 2011
[7] M. Li and C. Han, “A DCT-SVD domain watermarking for color digital image based on compressed sensing theory
and chaos theory,” Seventh International Symposium on Computational Intelligence and Design (ISCID),
pp. 35-38, 2014.
[8] M. Ali, C.W. Ahn, M. Pant, “A robust image watermarking technique using SVD and differential evolution in DCT
domain,” Optik, vol. 125, pp. 428-434, 2014.
[9] C.C.Chang, P. Tsai, C.C. Lin, “SVD-based digital image watermarking scheme,” Pattern Recognition Letter,
vol. 26, no. 10, pp. 1577–1586, 2005.
[10] K.L. Chung, W.N. Yang, Y.H. Huang, S.T. Wu, Y.C. Hsu, “On SVD-based watermarking algorithm,” Applied
Mathematics and Computation, vol. 188, no. 1, pp. 54-57, 2007.
[11] M.Q. Fan, H.X. Wang, S.K. Li, “Restudy on SVD-based watermarking scheme,” Applied Mathematics and
Computation, vol. 203, no. 3 pp.926-930, 2008.
[12] V. Khanduja, S. Chakraverty and O.P. Verma, “Enabling information recovery with ownership using robust
multiple watermarks,” Journal of Information Security and Applications, vol. 29, pp. 80-92, 2016.
[13] V. Khanduja, S. Chakraverty and O.P. Verma, R. Tandon, S. Goel, “A robust multiple watermarking technique for
information recovery,” IEEE International Conference on Advance Computing, pp. 250-255, 2014.
[14] S. Behnia, M. Teshnehlab, P. Ayubi, “Multiple-watermarking scheme based on improved chaotic maps,”
Communications in Nonlinear Science and Numerical Simulation, vol. 15, no. 9, pp. 2469-2478, 2010.
[15] H.-C. Huang, S.-C. Chu, J.-S. Pan, C.-Y. Huang and B.-Y. Liao, “Tabu search based multi-watermarks embedding
algorithm with multiple description coding,” Information Sciences, vol. 181, no. 16, pp. 3379-3396, 2011.
[16] N. Mohananthini and G. Yamuna, “Comparison of multiple watermarking techniques using genetic algorithms,”
Journal of Electrical Systems and Information Technology, vol. 3, no. 1, pp. 68-80, 2016.
[17] R. Chamlawi, A, Khan and I. Usman, “Authentication and recovery of images using multiple watermarks,”
Computers & Electrical Engineering, vol. 36, no. 3, pp. 578-584, 2010.
[18] R.C. Gonzalez, R.E.Wood, “Digital image processing, 2nd edition,” India: Pearson Education, 2002.
[19] M. Khalili, “DCT-Arnold chaotic based watermarking using JPEG-YCbCr,” Optik - International Journal for Light
and Electron Optics, vol. 126, no. 3, pp. 4367-4371, 2015.
[20] F. Ernawan, M. Ramalingam, A.S. Sadiq, Z. Mustaffa, “An improved imperceptibility and robustness of 4x4 DCT-
SVD image watermarking using modified entropy,” Journal of Telecommunication, Electronic and Computer
Engineering, vol. 9, no. 2-7, pp. 111-116, 2017.
[21] F. Ernawan and S.H. Nugraini, “The optimal quantization matrices for JPEG image compression from psychovisual
threshold,” Journal of Theoretical and Applied Information Technology, vol. 70, no. 3, pp. 566-572, 2014.
[22] S.-L. Jia, “A novel blind color images watermarking based on SVD,” Optik - International Journal for Light and
Electron Optics, vol. 125, no. 12, pp. 2868-2874, 2014.
[23] M. Boussif, N. Aloui, A. Cherif, “New Watermarking/Encryption Method for Medical Images Full Protection in m-
Health,” International Journal of Electrical and Computer Engineering, vol. 7, no. 6, pp. 3385-3394, 2017.
[24] V.A. Kumar, C. Dharmaraj, Ch. S. Rao, “A Hybrid Digital Watermarking Approach Using Wavelets and LSB,”
International Journal of Electrical and Computer Engineering, vol. 7, no. 5, pp. 2483-2495, 2017.
[25] I. Iwut, G. Budiman, L. Novamizanti, “Optimization of Discrete Cosine Transform-Based Image Watermarking by
Genetics Algorithm,” International Journal of Electrical and Computer Science, vol. 4, no. 1, pp. 91-103, 2016.
[26] R. Rodriguez-Sanchez, J. Martinez-Baena, A. Garrido, J.A. Garcia, J. Fdez-Valdivia, M.C. Aranda, “Computer
Vision Group”, University of Granada, 2002, http://decsai.ugr.es/cvg/dbimagenes/c512.php.
[27] F. Ernawan, N. Kabir, K.Z. Zamli, “An efficient image compression technique using tchebichef bit allocation,”
Optik - International Journal for Light and Electron Optics, vol. 148, pp. 106-119, 2017.
[28] F. Ernawan, N.A. Abu, N. Suryana, “An adaptive JPEG image compression using psychovisual model,” Advanced
Science Letters, vol. 20, no. 1, pp. 26-31, 2014.
[29] N.A. Abu, F. Ernawan, “A novel psychovisual threshold on large DCT for image compression,” The Scientific
World Journal, vol. 2015, no. 2015, pp. 001-011, 2015.
[30] N.A. Abu, F. Ernawan, N. Suryana, “A generic psychovisual error threshold for the quantization table generation
on JPEG image compression,” 9th
International Colloquium on Signal Processing and its Applications, pp. 39-43,
2013.
[31] F. Ernawan, M.N. Kabir, J.M. Zain, “Bit allocation strategy based on psychovisual threshold in image
compression,” Multimedia Tools and Applications, pp. 1-24, 2017.
[32] F. Ernawan, Z. Mustaffa, L.B. Aji, “An efficient image compression using bit allocation based on psychovisual
threshold,” Information (Japan), vol. 9(9B), pp. 4177-4182, 2016.
[33] N.A. Abu, F. Ernawan, “Psychovisual threshold on large tchebichef moment for image compression,” Applied
Mathematical Sciences, vol. 8, no. 140, pp. 6951-6961, 2014.
[34] F. Ernawan, N.A. Abu, N. Suryana, “Adaptive Tchebichef Moment Transform Image Compression Using
Psychovisual Model,” Journal of Computer Science, vol. 9, no. 6, pp. 716-725, 2013.
10. Int J Elec & Comp Eng ISSN: 2088-8708
A Blind Multiple Watermarks based on Human Visual Characteristics (Ferda Ernawan)
2587
[35] F. Ernawan, N.A. Abu, N. Suryana, “An Optimal Tchebichef Moment Quantization Using Psychovisual Threshold
for Image Compression,” Advanced Science Letters, vol. 20, no. 1, pp. 70-74, 2014.
[36] F. Ernawan, N.A. Abu and N. Suryana, “TMT Quantization Table Generation Based on Psychovisual Threshold for
Image Compression,” International Conference of Information and Communication Technology (ICoICT 2013), pp.
202-207, 2013.
[37] N.A. Abu, F. Ernawan, S. Sahib, “Psychovisual Model on Discrete Orthonormal Transform,” International
Conference on Mathematical Sciences and Statistics (ICMSS 2013), pp.309-314, 2013.