SlideShare a Scribd company logo
1 of 9
Download to read offline
International Journal of Engineering Inventions
e-ISSN: 2278-7461, p-ISSN: 2319-6491
Volume 4, Issue 7 (December 2014) PP: 06-14
www.ijeijournal.com Page | 6
RRW Framework by Using Enhanced Pixel Wise masking
and K-Means Clustering
N. Krishna Chaitanya1
, Vijaya Kumar Nasina2
1
Associate Professor, ECE Department, PBR VITS, KAVALI, NELLORE (DT.), INDIA
2
Student M.Tech(DSCE), ECE Department, PBR VITS, KAVALI, NELLORE (DT.), INDIA
Abstract: This paper presents Robust reversible watermarking methods are popular in multimedia for
protecting copyright, while preserving intactness of host images and providing robustness against unintentional
attacks. However, conventional RRW methods are not readily applicable in practice. That is mainly because
they fail to offer satisfactory reversibility on large-scale image datasets. They have limited robustness in
extracting watermarks from the watermarked images destroyed by different unintentional attack. Some of them
suffer from extremely poor invisibility for watermarked images. Therefore, it is necessary to have a framework
to address these three problems, and further improve its performance. So a novel pragmatic framework is
proposed that is wavelet-domain statistical quantity histogram shifting and clustering (WSQH-SC). Compared
with conventional methods, WSQH-SC ingeniously constructs new watermark embedding and extraction
procedures by histogram shifting and clustering, which are important for improving robustness and reducing
run-time complexity. Additionally, WSQH-SC includes the property-inspired pixel adjustment to effectively
handle overflow and underflow of pixels. This results in satisfactory reversibility and invisibility. Furthermore,
to increase its practical applicability, WSQH-SC designs an enhanced pixel-wise masking to balance robustness
and invisibility. So it perform extensive experiments over natural, medical, and synthetic aperture radar images
to show the effectiveness of WSQH-SC by comparing with the histogram rotation-based and histogram
distribution constrained methods.
Key words: Integer wavelet transform, k-means clustering, masking, robust reversible watermarking (RRW).
I. Introduction
REVERSIBLE WATERMARKING (RW) methods [1] are used to embed watermarks [2], e.g., secret
information [3], into digital media while preserving high intactness and good fidelity of host media. It plays an
important role in protecting copyright and content of digital media for sensitive applications, e.g., medical and
military images. Although researchers proposed some RW methods for various media, e.g., images [4], [5],
audios [6], videos [7], and 3-Dmeshes [8], they assume the transmission channel is lossless. The robust RW
(RRW) is thus a challenging task. For RRW, the essential objective is to accomplish watermark embedding and
extraction in both lossless and lossy environment. As a result, RRW is required to not only recover host images
and watermarks without distortion for the lossless channel, but also resist unintentional attacks and extract as
many watermarks as possible for the noised channel [9].
II. Existing Methods
Recently, a dozen of RRW methods for digital images have been proposed [10]–[13], which can be classified
into two groups [9]: histogram rotation (HR)-based methods and histogram distribution constrained (HDC)
methods. The HR-based methods [10], [11] accomplish robust lossless embedding by slightly rotating the
centroid vectors of two random zones in the non-overlapping blocks. Due to the close correlation of neighboring
pixels, these methods were reported to be robust against JPEG compression. However, they are sensitive to
“salt-and-pepper” noise, which leads to poor visual quality of watermarked images, and impedes lossless
recovery of host images and watermarks. To solve this problem, the HDC methods have been developed in
spatial and wavelet-domains [12], [13], which divide image blocks into different types and embed the modulated
watermarks for each type based on histogram distribution. Unfortunately, these methods suffer from unstable
reversibility and robustness according to [9]. In summary, the above analysis shows that both kinds of RRW
methods are not readily applicable in practice.
III. Proposed Framework
In this section, we introduce a new RRW framework, i.e., WSQH-SC, which accomplishes the robust lossless
embedding task by incorporating the merits of SQH shifting, k-means clustering and EPWM. WSQH-SC
comprises two processes: watermark embedding and extraction. In view of their similarity, Fig. 1 only shows
the diagram of the embedding process in which the three modules are termed: 1) PIPA; 2) SQH construction;
and 3) EPWM-based embedding, and they are detailed in the following three subsections. To be specific,
RRW Framework by Using Enhanced Pixel Wise masking and K-Means Clustering
www.ijeijournal.com Page | 7
WSQH-SC first investigates the wavelet sub-band properties in depth and exploits PIPA to preprocess the host
image, which is of great importance to avoid both overflow and underflow of pixels during the embedding
process. Afterward, the host image is decomposed by the 5/3 integer wavelet transform (IWT) [30] and the
blocks of interest in the sub-band C
HL
0
are selected to generate the SQH with the help of the threshold
constraint. Finally, watermarks can be embedded into the selected blocks by histogram shifting, wherein EPWM
is designed to adaptively control watermark strength. After the IWT reconstruction, the watermarked image is
obtained.
Fig. 1. Embedding process of the proposed wavelet-domain SQH shifting and clustering framework.
(a) PIPA. (b) SQH construction. (c) EPWM based embedding
A. PIPA:
Firstly, PIPA deeply exploits the intrinsic relationship between wavelet coefficient and pixel changes.
Secondly, by taking the scale and region of wavelet coefficient changes into consideration, PIPA determines the
adjustment scale and employs the pixel adjustment strategy to preprocess the host images.
Multiple Sub-Bands and Multiple Wavelet Coefficients:
Considering an arbitrary block with the top left corner at (p, q) in C
W
0
, 1 ≤ p < M, 1 ≤ q < N, we investigate
the changes of wavelet coefficients and pixels in two special cases, Here, vf
=
]0,0,1...0,1,0,1,0,0[ 12 xh
, vg = ]1,2,...,2,1[ 32 xw
and the affected region of pixels is denoted
by the location of its top left corner. To further illustrate such effects, Fig. 2 shows an example in which the
block size is 3 × 3, and the wavelet coefficients of two neighboring blocks in C
LL
0
and C
HL
0
are changed
simultaneously.
Fig. 2. Example of the effects of changing wavelet coefficients on pixels based on multiple sub-bands and
multiple wavelet coefficients.
RRW Framework by Using Enhanced Pixel Wise masking and K-Means Clustering
www.ijeijournal.com Page | 8
With Fig. 2, we can deduce that: 1) the affected pixel regions are nonoverlapped when the wavelet coefficients
of neighboring blocks are changed at the same time and 2) the pixel changes are monodirectional and the
maximum change scale equals λ. In this case, we can easily determine the adjustment scale and use the pixel
adjustment strategy to preprocess host images. In particular, given a t-bit host image I with the size of 2M ×2N,
the pixel adjustment is performed by






,),(
,),(
),(!


jiI
jiI
jiI




),(.
2),(.
jiIif
jiIif t
(1)
where I (i, j ) is the grayscale value of the pixel at (i, j ) in the image I , I(i, j ) is the adjusted one (1 ≤ i ≤ 2M, 1
≤ j ≤ 2N), and η > λ is the adjustment scale. Thereafter, the preprocessed host image can be reliably used for
watermark embedding in the next subsections. Because the pixels are changed into a reliable range before
embedding, i.e.[η, 2t − 1 – η], PIPA can successfully avoid both overflow and underflow of pixels [15]. It is also
worth emphasizing that the proposed WSQH-SC is nonblind to some extent because the locations of the
changed pixels need to be saved as a part of side information and transmitted to the receiver side in order to
recover the original grayscale values of pixels.
B. SQH Construction
In this subsection, we consider the SQH construction task with a threshold constraint. Inspired by
characteristics of the wavelet coefficients [13], we focus on the mean of wavelet coefficients (MWC) histogram
by taking the following two properties into account: 1) it is designed in high-pass sub-bands of wavelet
decomposition, to which HVS is less sensitive, leading to high invisibility of watermarked images and 2) it has
almost a zero-mean and Laplacian-like distribution based on the experimental study of wavelet high-pass sub-
bands from 300 test images illustrated in Section V, which is stable for different images. In particular, an MWC
histogram is generated based on the following procedure. Considering a given host image I , we first decompose
I using 5/3 IWT to obtain the sub-band C
HL
0
, and then divide C
HL
0
into n nonoverlapping blocks.
Let S = [ 1S , . . . , kS , . . . , nS ] be the MWCs in the sub-band, then the MWC of the
th
k kth block, kS is
defined as






1
2
1
2
),(
)2()2(
1 h
i
w
j
ji
kk pwXh
S (2)
where P
ji
k
),(
represents the wavelet coefficient at (i, j ) in the kth block. To construct the MWC histogram, our
concern is the possibility of utilizing the blocks of interest in a sub-band,
which will be helpful for simplifying the embedding process.In view of the histogram distribution of MWC,
only the peak and its neighbors in the histogram are mostly useful for the
embedding task. Therefore, a threshold constraint is applied to the blocks to retain those of interest, each of
which satisfies the following condition:
d (x, kS ) ≤ δ, 1 ≤ k ≤ n (3)
where d (·) computes the Euclidean distance of two elements, x ∈ {xl , xr } represents the aforementioned two
peak points, and δ is a predefined constant for threshold control. When
δ ≥ max {d ( lx , min (S)) , d ( rx , max (S))}, all of the blocks will be retained for embedding, which is a
special case of this constraint. Moreover, with the help of the threshold constraint, the capacity can be controlled
flexibly.
C. EPWM-Based Embedding :
It has been well acknowledged that a balance between invisibility and robustness is important for
robust watermarking methods. Although many efforts have been made to design lossless embedding models,
little progress has been made in this trade-off. Therefore, we develop EPWM to tackle this problem by utilizing
the JND thresholds of wavelet coefficients to optimize watermark strength. In view of the disadvantages of
PWM discussed in Section II, EPWM focuses on improving the local sensitivity of images to noise by mainly
estimating brightness and texture sensitivities in a more precise way. Motivated by the benefits of luminance
masking [34], we first redefine the brightness sensitivity in (5) by calculating the luminance masking of the
low-pass sub-band at resolution level ρ, denoted as
))},(),,(()),,((max{),,( jiljilfjilfji mbs



  (4)
RRW Framework by Using Enhanced Pixel Wise masking and K-Means Clustering
www.ijeijournal.com Page | 9







127)(,3)127/)(1(17
127)(,3)127)(()128/3(
),(!


bb
bb
ll
ll
jiI (5)
And
))())(()())(),(( 21  
bbmmb
p
s ldldlllf -(6)
represent the visibility threshold and spatial masking functions, respectively, in which d1 (·) and d2 (·) are the
background luminance dependent functions, and lρ b (·) and lρm (·) mean
the average background luminance and maximum weighted average of luminance differences. Then, the texture
sensitivity is evaluated based on [35] by
𝜌, 𝑖, 𝑗 =
1
16 𝑘
3−𝜌
𝑘=0 [𝐶𝑘+𝜌
𝑤1
𝑦=0
1
𝑥=0𝑤∈ 𝐿𝐻,𝐻𝐿,𝐻𝐻 (𝑦 +
𝑖
2 𝑘 , 𝑥 +
𝑗
2 𝑘)]2
x
1
𝛾 𝜌
3 𝛾𝜌
3
(I,j) (7)
Fig. 3: Example of WMC histogram in a watermarked image.
Algorithm1: Proposed Classification Process
Input: The MWCs
w
S = [
w
S1 , . . . ,
w
mS ],and number of clusters  .
Output:The set of clusters g =[ 1g , . . . , g ]
1.Inittialize the clusters ,,..., )1()1(
1 ff iteration time  ;
2. Do
3. For k=1 to m do
4 Assign the kth
k
wS to one of the clusters according to the distance between it and cluster centers.
k
wS ∈ 𝑔𝑗 ,if d(
k
wS ,𝑓𝑗
(∈)
) ≤ 𝑑
k
wS , 𝑓𝑙
∈
𝑓𝑜𝑟 𝑎𝑙𝑙 𝑙 = 1,2, … . 𝜇
5 End for
6 Update the cluster centers with 𝑓𝑗
(∈+1)
= (1/|𝑔𝑗
∈
|) ∙
k
wSk
wS ∈𝑔 𝑗
∈
7 While arg min ||
k
wS − 𝑓𝑗
(∈+1)
|
𝜇
𝑗=1
k
wS ∈𝑔𝑗
|2
where ϒ3 ρ is the mean of the approximation sub-image ϒ3 ρ . Because both (13) and (16) take the difference
between resolution levels into account, we can replace (6) with
(8)
Otherwise,1
HHwif,2
)(


 
w
Finally, the new JND threshold can be obtained by
2.0
),,(),,()( jijiwJNDw
p  
 (9)
RRW Framework by Using Enhanced Pixel Wise masking and K-Means Clustering
www.ijeijournal.com Page | 10
in which 0 < ϒ≤ 1 is a tuning parameter corresponding to the weight of brightness sensitivity. In view of space
limitation, refer to [15] and [16] for the definitions of d1 (·), d2 (·), lρ b (·),
lρm (·), and ϒ3 ρ . With (8), we use the obtained JND thresholds to control watermark strength during the
embedding process. To be specific, given the MWC of the kth block of interest, i.e.,
Sk, 1 ≤ k ≤ m, the watermark embedding is given by
bS kk k
wS (10)
Here
k
wS is the obtained MWC after the kth watermark bit kb ∈ {0, 1} is embedded, β is a factor defined as
𝛽 = (𝑆𝑘 -𝑆∗
)/abs(𝑆𝑘 -𝑆∗
) (11)
𝑆∗
= arg min 𝑑( 𝑆𝑘,x)
x∈ 𝑥𝑙, 𝑥 𝑟 )
 =
𝛼
𝑀 𝑥 𝑁
𝐽𝑁𝐷𝜌
𝑤
(𝑖, 𝑗)𝑁
𝑗 =1
𝑀
𝑖=1
(12)
represents the watermark strength, where α is a global parameter and M × N is the sub-band size. Because the
novel embedding model shown in (10) expands the additive spread
spectrum [36] to a reversible embedding model, we term it a generalized additive spread spectrum. By applying
(10) to the blocks of interest in the sub-band, watermarks can be
embedded into the wavelet coefficients. Thereafter, the IWT reconstruction is performed to obtain the
watermarked image.
D. Extraction Based on k-Means Clustering
If watermarked images are transmitted through an ideal channel, we can directly adopt the inverse
operation of (10) to recover host images and watermarks. However, in the real environment, degradation may be
imposed on watermarked images due to unintentional attacks, e.g., lossy compression and random noise.
Therefore, it is essential to find an effective watermark extraction algorithm so that it can resist unintentional
attacks in the lossy environment. Based on the aforementioned embedding model in (10), the MWC histogram
of watermarked images are divided into three parts shown in Fig. 3, in which the center part corresponds to
watermark bit “0” and others to bit “1.” To extract the embedded watermarks, the key issue is to partition these
parts dynamically. In the lossy environment, this is very difficult because the histogram distribution of MWC is
destroyed by unintentional attacks, as reported in [14]. In this paper, by investigating the effects of
unintentional attacks on histogram, we treat the partition as a clustering problem with a certain number of
clusters and adopt the k-means clustering algorithm [18], [19] to tackle this problem for simplicity.Similar to the
embedding process, we first decompose the watermarked image with 5/3 IWT and construct the MWC
histogram by calculating the MWCs of blocks of interest in the sub-band C
HL
0
. Let
w
S = [
w
S1 , . . . ,
w
mS ]
be the obtained MWCs, F = [ 1f , . . . , f ] be the cluster centers, and g =[ 1g , . . . , g ] be the set of clusters,
wherein μ is the number of clusters. The above classification process is summarized in Table V. Particularly, the
initial cluster centers are given by considering the features of the embedding process, e.g.,F = {τ min (Sw) , 0, τ
max (Sw)} for μ = 3, to improve the efficiency of classification. Based on the results of classification the
embedded watermarks can be extracted by







IIIClassorIClassSif,1
(13)IIClassSif,0
w
k
w
kr
kb
Algorithm-2: Embeddding Procedure of the Proposed Framework
Input: A t-bit host image I with the size of 2Mx 2N ,a watermark sequence b =[𝑏1,…, 𝑏 𝑚] and block size hxw.
Output:The watermarked image 𝐼 𝑤
1. Apply PIPA to host image I to ontain the adjusted image 𝐼!
, and record the locations of the pixels changed
by PIPA:
2. Decompose 𝐼!
using 5/3 IWT and devide
The sub-band 𝐶0
𝐻𝐿
into n nonoverlapping blocks with size of h x w;
3. Compute the MWCs of all the blocks with (2) and obtain S = [ 1S , . . . , kS , . . . , nS ];
4. Retain blocks of interest with the threshold constraint in (3) and construct SQH
RRW Framework by Using Enhanced Pixel Wise masking and K-Means Clustering
www.ijeijournal.com Page | 11
5. Perform EPWM to compute the watermark strength
 =
𝛼
𝑀 𝑥 𝑁
𝐽𝑁𝐷𝜌
𝑤
(𝑖, 𝑗)
𝑁
𝑗 =1
𝑀
𝑖=1
6. For k=1 to m do
7. Embed the kth watermark with bS kk k
wS
8. End for
9. Recondtruct the watermark image 𝐼 𝑤
with inverse 5/3 IWT
Algorithm-3: Extraction Procedure of the Proposed Framework
Input: A watermarked image I
W
with the size of 2Mx 2N , block size h x w , watermark strength  and the
locations of the pixel changed by PIPA.
Output:The recovered watermarke sequence 𝑏 𝑟
image 𝐼 𝑟
.
1. Decompose 𝐼 𝑤
using 5/3 IWT and devide
The sub-band 𝐶0
𝐻𝐿
into n nonoverlapping blocks with size of h x w;
2. Compute the MWCs of all the blocks of interest with with (2) and obtain
w
S = [
w
S1 , . . . ,
w
mS ];
3. For k=1 to m do
4. Extract the embedded watermarks







IIIClassorIClassSif,1
(13)3forIIClassSif,0
w
k
w
k r
kb
5 Recover the MWCs with
r
k
w
k bS r
kS
6 End for
7 Perform inverse IWT follwed by PIPA to obtain the recovered image 𝐼 𝑟
8 Return the Recovered watermark 𝑏 𝑟
andimage 𝐼 𝑟
For μ = 3, in which
k
wS is the kth MWC, brk is the extracted watermark bit, and Classes I–III denote the
obtained set of clusters. Thereafter, we recover the MWCs with
r
k
w
k bS r
kS , which are identical to the
original ones in the lossless environment. After the IWT reconstruction, the inverse operation of (1) is applied to
the pixels changed by PIPA in the embedding process to recover host images. As
mentioned earlier, the side information including the block size, watermark strength, and loations of the pixels
changed by PIPA, should be transmitted to the receiver side, which is important for the recovery of watermarks
and host images, and also leads to nonblindness of the proposed framework to some extent. In summary, the
embedding and extraction processes of the proposed framework are depicted in the discussion.
IV. Simulation Results
In our experiments, the robustness, reversibility, invisibility, capacity, and run-time complexity are used to
evaluate the performance. In particular, the pure capacity is calculated in bits/pixel (b/ps) and the invisibility is
measured by PSNR, defined as







MSE
PSNR
2
255
log10 (14)
MSE= )
22
1
2
1
),(),((
4
1
JIIJII
MN
M
I
N
J
W
 
 (15)
in which I (i, j ) and I
W
(i, j ) denote the grayscale values of the pixels at (i, j ) in the host and watermarked
images.
TABLE I: Simulation values of PSNR, MSE& Ans
Parameter Value
PSNR 99.89
MSE 0.019
Ans 0.998
RRW Framework by Using Enhanced Pixel Wise masking and K-Means Clustering
www.ijeijournal.com Page | 12
Fig 5 a,b,c,d,e: a-Original image ,b- IWT 5/3 decomposed image, c- watermarked image, d-extracted
watermark, e- Extracted image .
RRW Framework by Using Enhanced Pixel Wise masking and K-Means Clustering
www.ijeijournal.com Page | 13
Fig 6 a,b: PSNR AND MSE VALUES Vr block size
Fig 7 a,b: PSNR & MSE Vr Tuning parameter
RRW Framework by Using Enhanced Pixel Wise masking and K-Means Clustering
www.ijeijournal.com Page | 14
Fig 8 a,b: MSE and PSNR values Vr Threshold
V. Conclusion
In this paper, we have developed a novel yet pragmatic framework for RRW. It includes carefully designed
PIPA,SQH shifting and clustering, and EPWM, each of which handles a specific problem in RRW. PIPA
preprocesses host images by adjusting the pixels into a reliable range for satisfactory reversibility. SQH shifting
and clustering constructs new watermark embedding and extraction processes for good Robustness and low run-
time complexity. EPWM precisely estimates the local sensitivity of HVS and adaptively optimizes the
watermark strength for a trade-off between robustness and invisibility. Below are the advantages of this
framework: 1) obtains comprehensive performance in terms of reversibility, robustness, invisibility, capacity
and run-time complexity; 2) is widely applicable to different kinds of images; and 3) is readily applicable in
practice. In future, we will combine the proposed framework with the local feature to further improve
robustness. In addition, it is valuable to integrate the merits of sparse representation and probabilistic graphical
model into the designing of image watermarking.
REFERENCES
[1] J. Fridrich, M. Goljan, and R. Du, “Lossless data embedding-new paradigm in digital watermarking,” EURASIP J. Appl. Signal
Process., vol. 2002, no. 1, pp. 185–196, Jan. 2002.
[2] Z. Zhao, N. Yu, and X. Li, “A novel video watermarking scheme in compression domain based on fast motion estimation,” in Proc.
Int. Conf. Commun. Technol., vol. 2. 2003, pp. 1878–1882.
[3] X. Li, “Watermarking in secure image retrieval,” Pattern Recog. Lett., vol. 24, no. 14, pp. 2431–2434, Oct. 2003.
[4] M. Celik, G. Sharma, A. Tekalp, and E. Saber, “Lossless generalized-LSB data embedding,” IEEE Trans. Image Process., vol. 14,
no. 2, pp. 253–266, Feb. 2005.
[5] J. Tian, “Reversible watermarking using a difference expansion,” IEEE Trans. Circuits Syst. Video Technol., vol. 13, no. 8, pp.
890–896, Aug. 2003.
[6] M. Van der Veen, F. Bruekers, A. Van Leest, and S. Cavin, “High capacity reversible watermarking for audio,” Proc. SPIE, vol.
5020, no.1, pp. 1–11, Jan. 2003.
[7] R. Du and J. Fridrich, “Lossless authentication of MPEG-2 video,” in Proc. IEEE Int. Conf. Image Process., vol. 2. Dec. 2002, pp.
893–896.
[8] J. Dittmann and O. Benedens, “Invertible authentication for 3-D-meshes,” Proc. SPIE, vol. 5020, no. 653, pp. 653–664, Jan. 2003.
[9] L. An, X. Gao, C. Deng, and F. Ji, “Robust lossless data hiding: Analysis and evaluation,” in Proc. Int. Conf. High Perform.
Comput. Simul., 2010, pp. 512–516.
[10] C. De Vleeschouwer, J. Delaigle, and B. Macq, “Circular interpretation of histogram for reversible watermarking,” in Proc. IEEE
Workshop.
[11] C. De Vleeschouwer, J. Delaigle, and B. Macq, “Circular interpretation of bijective transformations in lossless watermarking for
media asset management,” IEEE Trans. Multimedia, vol. 5, no. 1, pp. 97–105, Mar.2003.
[12] Z. Ni, Y. Shi, N. Ansari, W. Su, Q. Sun, and X. Lin, “Robust lossless image data hiding designed for semi-fragile image
authentication,” IEEE Trans. Circuits Syst. Video Technol., vol. 18, no. 4, pp. 497–509, Apr. 2008.
[13] D. Zou, Y. Shi, Z. Ni, and W. Su, “A semi-fragile lossless digital watermarking scheme based on integer wavelet transform,” IEEE
Trans.Circuits Syst. Video Technol., vol. 16, no. 10, pp. 1294–1300, Oct. 2006.
[14] X. Gao, L. An, Y. Yuan, D. Tao, and X. Li, “Lossless data embedding using generalized statistical quantity histogram,” IEEE
Trans. Circuits Syst. Video Technol., vol. 21, no. 8, pp. 1061–1070, Aug. 2011. Multimedia Signal Process., 2001, pp. 345–350.
[15] C. Chou and Y. Li, “A perceptually tuned subband image coder based on the measure of just-noticeable-distortion profile,” IEEE
Trans. Circuits Syst. Video Technol., vol. 5, no. 6, pp. 467–476, Dec. 1995.
[16] C. Nafornita, “A new pixel-wise mask for watermarking,” in Proc. ACM Multimedia Secur. Workshop, 2007, pp. 221–228.
[17] S. Zhang, Q. Tian, G. Hua, Q. Huang, and S. Li, “Descriptive visual words and visual phrases for image applications,” in Proc.
ACM Int.Conf. Multimedia, 2009, pp. 75–84.
[18] T. Xia, D. Tao, T. Mei, and Y. Zhang, “Multiview spectral embedding,” IEEE Trans. Syst., Man, Cybern. B, Cybern., vol. 40, no. 6,
pp. 1438–1446, Dec. 2010.
[19] T. Zhou and D. Tao, “Fast gradient clustering,” in Proc. NIPS Workshop Discr. Optim. Mach.

More Related Content

What's hot

A novel rrw framework to resist accidental attacks
A novel rrw framework to resist accidental attacksA novel rrw framework to resist accidental attacks
A novel rrw framework to resist accidental attackseSAT Publishing House
 
An improved image compression algorithm based on daubechies wavelets with ar...
An improved image compression algorithm based on daubechies  wavelets with ar...An improved image compression algorithm based on daubechies  wavelets with ar...
An improved image compression algorithm based on daubechies wavelets with ar...Alexander Decker
 
Springer base paper
Springer base paperSpringer base paper
Springer base paperchndu
 
Novel Approach for Image Restoration and Transmission
Novel Approach for Image Restoration and TransmissionNovel Approach for Image Restoration and Transmission
Novel Approach for Image Restoration and TransmissionCSCJournals
 
33 8951 suseela g suseela paper8 (edit)new2
33 8951 suseela g   suseela paper8 (edit)new233 8951 suseela g   suseela paper8 (edit)new2
33 8951 suseela g suseela paper8 (edit)new2IAESIJEECS
 
34 8951 suseela g suseela paper8 (edit)new
34 8951 suseela g   suseela paper8 (edit)new34 8951 suseela g   suseela paper8 (edit)new
34 8951 suseela g suseela paper8 (edit)newIAESIJEECS
 
Matlab Implementation of Baseline JPEG Image Compression Using Hardware Optim...
Matlab Implementation of Baseline JPEG Image Compression Using Hardware Optim...Matlab Implementation of Baseline JPEG Image Compression Using Hardware Optim...
Matlab Implementation of Baseline JPEG Image Compression Using Hardware Optim...inventionjournals
 
VERY DEEP CONVOLUTIONAL NETWORKS FOR LARGE-SCALE IMAGE RECOGNITION
VERY DEEP CONVOLUTIONAL NETWORKS FOR LARGE-SCALE IMAGE RECOGNITIONVERY DEEP CONVOLUTIONAL NETWORKS FOR LARGE-SCALE IMAGE RECOGNITION
VERY DEEP CONVOLUTIONAL NETWORKS FOR LARGE-SCALE IMAGE RECOGNITIONWilly Marroquin (WillyDevNET)
 
Highly Parallel Pipelined VLSI Implementation of Lifting Based 2D Discrete Wa...
Highly Parallel Pipelined VLSI Implementation of Lifting Based 2D Discrete Wa...Highly Parallel Pipelined VLSI Implementation of Lifting Based 2D Discrete Wa...
Highly Parallel Pipelined VLSI Implementation of Lifting Based 2D Discrete Wa...idescitation
 
IRJET- Semantic Segmentation using Deep Learning
IRJET- Semantic Segmentation using Deep LearningIRJET- Semantic Segmentation using Deep Learning
IRJET- Semantic Segmentation using Deep LearningIRJET Journal
 
Kassem2009
Kassem2009Kassem2009
Kassem2009lazchi
 
A Dual Tree Complex Wavelet Transform Construction and Its Application to Ima...
A Dual Tree Complex Wavelet Transform Construction and Its Application to Ima...A Dual Tree Complex Wavelet Transform Construction and Its Application to Ima...
A Dual Tree Complex Wavelet Transform Construction and Its Application to Ima...CSCJournals
 
Halftoning-based BTC image reconstruction using patch processing with border ...
Halftoning-based BTC image reconstruction using patch processing with border ...Halftoning-based BTC image reconstruction using patch processing with border ...
Halftoning-based BTC image reconstruction using patch processing with border ...TELKOMNIKA JOURNAL
 
Multiple Binary Images Watermarking in Spatial and Frequency Domains
Multiple Binary Images Watermarking in Spatial and Frequency DomainsMultiple Binary Images Watermarking in Spatial and Frequency Domains
Multiple Binary Images Watermarking in Spatial and Frequency Domainssipij
 
COMPRESSION ALGORITHM SELECTION FOR MULTISPECTRAL MASTCAM IMAGES
COMPRESSION ALGORITHM SELECTION FOR MULTISPECTRAL MASTCAM IMAGESCOMPRESSION ALGORITHM SELECTION FOR MULTISPECTRAL MASTCAM IMAGES
COMPRESSION ALGORITHM SELECTION FOR MULTISPECTRAL MASTCAM IMAGESsipij
 
Hybrid Method For Image Watermarking Using 2 Level LWT-Walsh Transform-SVD in...
Hybrid Method For Image Watermarking Using 2 Level LWT-Walsh Transform-SVD in...Hybrid Method For Image Watermarking Using 2 Level LWT-Walsh Transform-SVD in...
Hybrid Method For Image Watermarking Using 2 Level LWT-Walsh Transform-SVD in...rahulmonikasharma
 
PERFORMANCE EVALUATION OF PARALLEL TRANSMISSION VISIBLE LIGHT COMMUNICATION S...
PERFORMANCE EVALUATION OF PARALLEL TRANSMISSION VISIBLE LIGHT COMMUNICATION S...PERFORMANCE EVALUATION OF PARALLEL TRANSMISSION VISIBLE LIGHT COMMUNICATION S...
PERFORMANCE EVALUATION OF PARALLEL TRANSMISSION VISIBLE LIGHT COMMUNICATION S...ijma
 

What's hot (19)

A novel rrw framework to resist accidental attacks
A novel rrw framework to resist accidental attacksA novel rrw framework to resist accidental attacks
A novel rrw framework to resist accidental attacks
 
An improved image compression algorithm based on daubechies wavelets with ar...
An improved image compression algorithm based on daubechies  wavelets with ar...An improved image compression algorithm based on daubechies  wavelets with ar...
An improved image compression algorithm based on daubechies wavelets with ar...
 
L0936775
L0936775L0936775
L0936775
 
Springer base paper
Springer base paperSpringer base paper
Springer base paper
 
Novel Approach for Image Restoration and Transmission
Novel Approach for Image Restoration and TransmissionNovel Approach for Image Restoration and Transmission
Novel Approach for Image Restoration and Transmission
 
33 8951 suseela g suseela paper8 (edit)new2
33 8951 suseela g   suseela paper8 (edit)new233 8951 suseela g   suseela paper8 (edit)new2
33 8951 suseela g suseela paper8 (edit)new2
 
34 8951 suseela g suseela paper8 (edit)new
34 8951 suseela g   suseela paper8 (edit)new34 8951 suseela g   suseela paper8 (edit)new
34 8951 suseela g suseela paper8 (edit)new
 
Matlab Implementation of Baseline JPEG Image Compression Using Hardware Optim...
Matlab Implementation of Baseline JPEG Image Compression Using Hardware Optim...Matlab Implementation of Baseline JPEG Image Compression Using Hardware Optim...
Matlab Implementation of Baseline JPEG Image Compression Using Hardware Optim...
 
VERY DEEP CONVOLUTIONAL NETWORKS FOR LARGE-SCALE IMAGE RECOGNITION
VERY DEEP CONVOLUTIONAL NETWORKS FOR LARGE-SCALE IMAGE RECOGNITIONVERY DEEP CONVOLUTIONAL NETWORKS FOR LARGE-SCALE IMAGE RECOGNITION
VERY DEEP CONVOLUTIONAL NETWORKS FOR LARGE-SCALE IMAGE RECOGNITION
 
Highly Parallel Pipelined VLSI Implementation of Lifting Based 2D Discrete Wa...
Highly Parallel Pipelined VLSI Implementation of Lifting Based 2D Discrete Wa...Highly Parallel Pipelined VLSI Implementation of Lifting Based 2D Discrete Wa...
Highly Parallel Pipelined VLSI Implementation of Lifting Based 2D Discrete Wa...
 
IRJET- Semantic Segmentation using Deep Learning
IRJET- Semantic Segmentation using Deep LearningIRJET- Semantic Segmentation using Deep Learning
IRJET- Semantic Segmentation using Deep Learning
 
Kassem2009
Kassem2009Kassem2009
Kassem2009
 
538 207-219
538 207-219538 207-219
538 207-219
 
A Dual Tree Complex Wavelet Transform Construction and Its Application to Ima...
A Dual Tree Complex Wavelet Transform Construction and Its Application to Ima...A Dual Tree Complex Wavelet Transform Construction and Its Application to Ima...
A Dual Tree Complex Wavelet Transform Construction and Its Application to Ima...
 
Halftoning-based BTC image reconstruction using patch processing with border ...
Halftoning-based BTC image reconstruction using patch processing with border ...Halftoning-based BTC image reconstruction using patch processing with border ...
Halftoning-based BTC image reconstruction using patch processing with border ...
 
Multiple Binary Images Watermarking in Spatial and Frequency Domains
Multiple Binary Images Watermarking in Spatial and Frequency DomainsMultiple Binary Images Watermarking in Spatial and Frequency Domains
Multiple Binary Images Watermarking in Spatial and Frequency Domains
 
COMPRESSION ALGORITHM SELECTION FOR MULTISPECTRAL MASTCAM IMAGES
COMPRESSION ALGORITHM SELECTION FOR MULTISPECTRAL MASTCAM IMAGESCOMPRESSION ALGORITHM SELECTION FOR MULTISPECTRAL MASTCAM IMAGES
COMPRESSION ALGORITHM SELECTION FOR MULTISPECTRAL MASTCAM IMAGES
 
Hybrid Method For Image Watermarking Using 2 Level LWT-Walsh Transform-SVD in...
Hybrid Method For Image Watermarking Using 2 Level LWT-Walsh Transform-SVD in...Hybrid Method For Image Watermarking Using 2 Level LWT-Walsh Transform-SVD in...
Hybrid Method For Image Watermarking Using 2 Level LWT-Walsh Transform-SVD in...
 
PERFORMANCE EVALUATION OF PARALLEL TRANSMISSION VISIBLE LIGHT COMMUNICATION S...
PERFORMANCE EVALUATION OF PARALLEL TRANSMISSION VISIBLE LIGHT COMMUNICATION S...PERFORMANCE EVALUATION OF PARALLEL TRANSMISSION VISIBLE LIGHT COMMUNICATION S...
PERFORMANCE EVALUATION OF PARALLEL TRANSMISSION VISIBLE LIGHT COMMUNICATION S...
 

Viewers also liked

Topics in CGIV @ 0905
Topics in CGIV @ 0905Topics in CGIV @ 0905
Topics in CGIV @ 0905leebyunggook
 
S U P E R S U C C E S S & S U P E R L I V I N G D R
S U P E R  S U C C E S S &  S U P E R L I V I N G   D RS U P E R  S U C C E S S &  S U P E R L I V I N G   D R
S U P E R S U C C E S S & S U P E R L I V I N G D Rmumbaipathcare
 
Breadpig at Room to Read
Breadpig at Room to ReadBreadpig at Room to Read
Breadpig at Room to ReadAlexis Ohanian
 
Android development-workshop-v2-1228043706544191-8
Android development-workshop-v2-1228043706544191-8Android development-workshop-v2-1228043706544191-8
Android development-workshop-v2-1228043706544191-8maxminhaj1
 
Tomorrow's membership organization 201110
Tomorrow's membership organization 201110Tomorrow's membership organization 201110
Tomorrow's membership organization 201110Kyle Sexton
 
3.2 factors for success in priority setting (t)
3.2 factors for success in priority setting (t)3.2 factors for success in priority setting (t)
3.2 factors for success in priority setting (t)ubcchcm
 

Viewers also liked (7)

Citarum river
Citarum riverCitarum river
Citarum river
 
Topics in CGIV @ 0905
Topics in CGIV @ 0905Topics in CGIV @ 0905
Topics in CGIV @ 0905
 
S U P E R S U C C E S S & S U P E R L I V I N G D R
S U P E R  S U C C E S S &  S U P E R L I V I N G   D RS U P E R  S U C C E S S &  S U P E R L I V I N G   D R
S U P E R S U C C E S S & S U P E R L I V I N G D R
 
Breadpig at Room to Read
Breadpig at Room to ReadBreadpig at Room to Read
Breadpig at Room to Read
 
Android development-workshop-v2-1228043706544191-8
Android development-workshop-v2-1228043706544191-8Android development-workshop-v2-1228043706544191-8
Android development-workshop-v2-1228043706544191-8
 
Tomorrow's membership organization 201110
Tomorrow's membership organization 201110Tomorrow's membership organization 201110
Tomorrow's membership organization 201110
 
3.2 factors for success in priority setting (t)
3.2 factors for success in priority setting (t)3.2 factors for success in priority setting (t)
3.2 factors for success in priority setting (t)
 

Similar to B04 07 0614

A Wavelet Based Hybrid SVD Algorithm for Digital Image Watermarking
A Wavelet Based Hybrid SVD Algorithm for Digital Image WatermarkingA Wavelet Based Hybrid SVD Algorithm for Digital Image Watermarking
A Wavelet Based Hybrid SVD Algorithm for Digital Image Watermarkingsipij
 
A Novel Algorithm for Watermarking and Image Encryption
A Novel Algorithm for Watermarking and Image Encryption A Novel Algorithm for Watermarking and Image Encryption
A Novel Algorithm for Watermarking and Image Encryption cscpconf
 
A robust combination of dwt and chaotic function for image watermarking
A robust combination of dwt and chaotic function for image watermarkingA robust combination of dwt and chaotic function for image watermarking
A robust combination of dwt and chaotic function for image watermarkingijctet
 
A Blind Multiple Watermarks based on Human Visual Characteristics
A Blind Multiple Watermarks based on Human Visual Characteristics A Blind Multiple Watermarks based on Human Visual Characteristics
A Blind Multiple Watermarks based on Human Visual Characteristics IJECEIAES
 
Tchebichef image watermarking along the edge using YCoCg-R color space for co...
Tchebichef image watermarking along the edge using YCoCg-R color space for co...Tchebichef image watermarking along the edge using YCoCg-R color space for co...
Tchebichef image watermarking along the edge using YCoCg-R color space for co...IJECEIAES
 
Robust Watermarking through Dual Band IWT and Chinese Remainder Theorem
Robust Watermarking through Dual Band IWT and Chinese Remainder TheoremRobust Watermarking through Dual Band IWT and Chinese Remainder Theorem
Robust Watermarking through Dual Band IWT and Chinese Remainder TheoremjournalBEEI
 
A Video Watermarking Scheme to Hinder Camcorder Piracy
A Video Watermarking Scheme to Hinder Camcorder PiracyA Video Watermarking Scheme to Hinder Camcorder Piracy
A Video Watermarking Scheme to Hinder Camcorder PiracyIOSR Journals
 
IRJET- Image Compression Technique for Quantized Encrypted Images using SVD
IRJET-  	  Image Compression Technique for Quantized Encrypted Images using SVDIRJET-  	  Image Compression Technique for Quantized Encrypted Images using SVD
IRJET- Image Compression Technique for Quantized Encrypted Images using SVDIRJET Journal
 
A CONTENT BASED WATERMARKING SCHEME USING RADIAL SYMMETRY TRANSFORM AND SINGU...
A CONTENT BASED WATERMARKING SCHEME USING RADIAL SYMMETRY TRANSFORM AND SINGU...A CONTENT BASED WATERMARKING SCHEME USING RADIAL SYMMETRY TRANSFORM AND SINGU...
A CONTENT BASED WATERMARKING SCHEME USING RADIAL SYMMETRY TRANSFORM AND SINGU...cscpconf
 
Blind Image Watermarking Based on Chaotic Maps
Blind Image Watermarking Based on Chaotic MapsBlind Image Watermarking Based on Chaotic Maps
Blind Image Watermarking Based on Chaotic MapsITIIIndustries
 
Improved Quality of Watermark Image by using Integrated SVD with Discrete Wav...
Improved Quality of Watermark Image by using Integrated SVD with Discrete Wav...Improved Quality of Watermark Image by using Integrated SVD with Discrete Wav...
Improved Quality of Watermark Image by using Integrated SVD with Discrete Wav...IRJET Journal
 
DWT-DCT-SVD Based Semi Blind Image Watermarking Using Middle Frequency Band
DWT-DCT-SVD Based Semi Blind Image Watermarking Using Middle Frequency BandDWT-DCT-SVD Based Semi Blind Image Watermarking Using Middle Frequency Band
DWT-DCT-SVD Based Semi Blind Image Watermarking Using Middle Frequency BandIOSR Journals
 
A BLIND ROBUST WATERMARKING SCHEME BASED ON SVD AND CIRCULANT MATRICES
A BLIND ROBUST WATERMARKING SCHEME BASED ON SVD AND CIRCULANT MATRICESA BLIND ROBUST WATERMARKING SCHEME BASED ON SVD AND CIRCULANT MATRICES
A BLIND ROBUST WATERMARKING SCHEME BASED ON SVD AND CIRCULANT MATRICEScsandit
 
IRJET- Lunar Image Fusion based on DT-CWT, Curvelet Transform and NSCT
IRJET- Lunar Image Fusion based on DT-CWT, Curvelet Transform and NSCTIRJET- Lunar Image Fusion based on DT-CWT, Curvelet Transform and NSCT
IRJET- Lunar Image Fusion based on DT-CWT, Curvelet Transform and NSCTIRJET Journal
 
Cj31365368
Cj31365368Cj31365368
Cj31365368IJMER
 
Robust Watermarking Technique using 2D Logistic Map and Elliptic Curve Crypto...
Robust Watermarking Technique using 2D Logistic Map and Elliptic Curve Crypto...Robust Watermarking Technique using 2D Logistic Map and Elliptic Curve Crypto...
Robust Watermarking Technique using 2D Logistic Map and Elliptic Curve Crypto...idescitation
 
IJERD (www.ijerd.com) International Journal of Engineering Research and Devel...
IJERD (www.ijerd.com) International Journal of Engineering Research and Devel...IJERD (www.ijerd.com) International Journal of Engineering Research and Devel...
IJERD (www.ijerd.com) International Journal of Engineering Research and Devel...IJERD Editor
 

Similar to B04 07 0614 (20)

A Wavelet Based Hybrid SVD Algorithm for Digital Image Watermarking
A Wavelet Based Hybrid SVD Algorithm for Digital Image WatermarkingA Wavelet Based Hybrid SVD Algorithm for Digital Image Watermarking
A Wavelet Based Hybrid SVD Algorithm for Digital Image Watermarking
 
A Novel Algorithm for Watermarking and Image Encryption
A Novel Algorithm for Watermarking and Image Encryption A Novel Algorithm for Watermarking and Image Encryption
A Novel Algorithm for Watermarking and Image Encryption
 
A robust combination of dwt and chaotic function for image watermarking
A robust combination of dwt and chaotic function for image watermarkingA robust combination of dwt and chaotic function for image watermarking
A robust combination of dwt and chaotic function for image watermarking
 
Ijetr011837
Ijetr011837Ijetr011837
Ijetr011837
 
A Blind Multiple Watermarks based on Human Visual Characteristics
A Blind Multiple Watermarks based on Human Visual Characteristics A Blind Multiple Watermarks based on Human Visual Characteristics
A Blind Multiple Watermarks based on Human Visual Characteristics
 
Tchebichef image watermarking along the edge using YCoCg-R color space for co...
Tchebichef image watermarking along the edge using YCoCg-R color space for co...Tchebichef image watermarking along the edge using YCoCg-R color space for co...
Tchebichef image watermarking along the edge using YCoCg-R color space for co...
 
A0360105
A0360105A0360105
A0360105
 
Robust Watermarking through Dual Band IWT and Chinese Remainder Theorem
Robust Watermarking through Dual Band IWT and Chinese Remainder TheoremRobust Watermarking through Dual Band IWT and Chinese Remainder Theorem
Robust Watermarking through Dual Band IWT and Chinese Remainder Theorem
 
A Video Watermarking Scheme to Hinder Camcorder Piracy
A Video Watermarking Scheme to Hinder Camcorder PiracyA Video Watermarking Scheme to Hinder Camcorder Piracy
A Video Watermarking Scheme to Hinder Camcorder Piracy
 
IRJET- Image Compression Technique for Quantized Encrypted Images using SVD
IRJET-  	  Image Compression Technique for Quantized Encrypted Images using SVDIRJET-  	  Image Compression Technique for Quantized Encrypted Images using SVD
IRJET- Image Compression Technique for Quantized Encrypted Images using SVD
 
A CONTENT BASED WATERMARKING SCHEME USING RADIAL SYMMETRY TRANSFORM AND SINGU...
A CONTENT BASED WATERMARKING SCHEME USING RADIAL SYMMETRY TRANSFORM AND SINGU...A CONTENT BASED WATERMARKING SCHEME USING RADIAL SYMMETRY TRANSFORM AND SINGU...
A CONTENT BASED WATERMARKING SCHEME USING RADIAL SYMMETRY TRANSFORM AND SINGU...
 
Blind Image Watermarking Based on Chaotic Maps
Blind Image Watermarking Based on Chaotic MapsBlind Image Watermarking Based on Chaotic Maps
Blind Image Watermarking Based on Chaotic Maps
 
Improved Quality of Watermark Image by using Integrated SVD with Discrete Wav...
Improved Quality of Watermark Image by using Integrated SVD with Discrete Wav...Improved Quality of Watermark Image by using Integrated SVD with Discrete Wav...
Improved Quality of Watermark Image by using Integrated SVD with Discrete Wav...
 
DWT-DCT-SVD Based Semi Blind Image Watermarking Using Middle Frequency Band
DWT-DCT-SVD Based Semi Blind Image Watermarking Using Middle Frequency BandDWT-DCT-SVD Based Semi Blind Image Watermarking Using Middle Frequency Band
DWT-DCT-SVD Based Semi Blind Image Watermarking Using Middle Frequency Band
 
A BLIND ROBUST WATERMARKING SCHEME BASED ON SVD AND CIRCULANT MATRICES
A BLIND ROBUST WATERMARKING SCHEME BASED ON SVD AND CIRCULANT MATRICESA BLIND ROBUST WATERMARKING SCHEME BASED ON SVD AND CIRCULANT MATRICES
A BLIND ROBUST WATERMARKING SCHEME BASED ON SVD AND CIRCULANT MATRICES
 
IRJET- Lunar Image Fusion based on DT-CWT, Curvelet Transform and NSCT
IRJET- Lunar Image Fusion based on DT-CWT, Curvelet Transform and NSCTIRJET- Lunar Image Fusion based on DT-CWT, Curvelet Transform and NSCT
IRJET- Lunar Image Fusion based on DT-CWT, Curvelet Transform and NSCT
 
Cj31365368
Cj31365368Cj31365368
Cj31365368
 
Robust Watermarking Technique using 2D Logistic Map and Elliptic Curve Crypto...
Robust Watermarking Technique using 2D Logistic Map and Elliptic Curve Crypto...Robust Watermarking Technique using 2D Logistic Map and Elliptic Curve Crypto...
Robust Watermarking Technique using 2D Logistic Map and Elliptic Curve Crypto...
 
K42016368
K42016368K42016368
K42016368
 
IJERD (www.ijerd.com) International Journal of Engineering Research and Devel...
IJERD (www.ijerd.com) International Journal of Engineering Research and Devel...IJERD (www.ijerd.com) International Journal of Engineering Research and Devel...
IJERD (www.ijerd.com) International Journal of Engineering Research and Devel...
 

More from International Journal of Engineering Inventions www.ijeijournal.com

More from International Journal of Engineering Inventions www.ijeijournal.com (20)

H04124548
H04124548H04124548
H04124548
 
G04123844
G04123844G04123844
G04123844
 
F04123137
F04123137F04123137
F04123137
 
E04122330
E04122330E04122330
E04122330
 
C04121115
C04121115C04121115
C04121115
 
B04120610
B04120610B04120610
B04120610
 
A04120105
A04120105A04120105
A04120105
 
F04113640
F04113640F04113640
F04113640
 
E04112135
E04112135E04112135
E04112135
 
D04111520
D04111520D04111520
D04111520
 
C04111114
C04111114C04111114
C04111114
 
B04110710
B04110710B04110710
B04110710
 
A04110106
A04110106A04110106
A04110106
 
I04105358
I04105358I04105358
I04105358
 
H04104952
H04104952H04104952
H04104952
 
G04103948
G04103948G04103948
G04103948
 
F04103138
F04103138F04103138
F04103138
 
E04102330
E04102330E04102330
E04102330
 
D04101822
D04101822D04101822
D04101822
 
C04101217
C04101217C04101217
C04101217
 

Recently uploaded

GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationMichael W. Hawkins
 
Artificial intelligence in the post-deep learning era
Artificial intelligence in the post-deep learning eraArtificial intelligence in the post-deep learning era
Artificial intelligence in the post-deep learning eraDeakin University
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking MenDelhi Call girls
 
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | DelhiFULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhisoniya singh
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking MenDelhi Call girls
 
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationBeyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationSafe Software
 
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure serviceWhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure servicePooja Nehwal
 
Understanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitectureUnderstanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitecturePixlogix Infotech
 
SIEMENS: RAPUNZEL – A Tale About Knowledge Graph
SIEMENS: RAPUNZEL – A Tale About Knowledge GraphSIEMENS: RAPUNZEL – A Tale About Knowledge Graph
SIEMENS: RAPUNZEL – A Tale About Knowledge GraphNeo4j
 
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024BookNet Canada
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonetsnaman860154
 
Benefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other FrameworksBenefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other FrameworksSoftradix Technologies
 
Maximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptxMaximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptxOnBoard
 
Azure Monitor & Application Insight to monitor Infrastructure & Application
Azure Monitor & Application Insight to monitor Infrastructure & ApplicationAzure Monitor & Application Insight to monitor Infrastructure & Application
Azure Monitor & Application Insight to monitor Infrastructure & ApplicationAndikSusilo4
 
Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesUnblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesSinan KOZAK
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountPuma Security, LLC
 
My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationRidwan Fadjar
 
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersEnhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersThousandEyes
 
AI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsAI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsMemoori
 
Hyderabad Call Girls Khairatabad ✨ 7001305949 ✨ Cheap Price Your Budget
Hyderabad Call Girls Khairatabad ✨ 7001305949 ✨ Cheap Price Your BudgetHyderabad Call Girls Khairatabad ✨ 7001305949 ✨ Cheap Price Your Budget
Hyderabad Call Girls Khairatabad ✨ 7001305949 ✨ Cheap Price Your BudgetEnjoy Anytime
 

Recently uploaded (20)

GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day Presentation
 
Artificial intelligence in the post-deep learning era
Artificial intelligence in the post-deep learning eraArtificial intelligence in the post-deep learning era
Artificial intelligence in the post-deep learning era
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men
 
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | DelhiFULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
 
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationBeyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
 
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure serviceWhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
 
Understanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitectureUnderstanding the Laravel MVC Architecture
Understanding the Laravel MVC Architecture
 
SIEMENS: RAPUNZEL – A Tale About Knowledge Graph
SIEMENS: RAPUNZEL – A Tale About Knowledge GraphSIEMENS: RAPUNZEL – A Tale About Knowledge Graph
SIEMENS: RAPUNZEL – A Tale About Knowledge Graph
 
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonets
 
Benefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other FrameworksBenefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other Frameworks
 
Maximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptxMaximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptx
 
Azure Monitor & Application Insight to monitor Infrastructure & Application
Azure Monitor & Application Insight to monitor Infrastructure & ApplicationAzure Monitor & Application Insight to monitor Infrastructure & Application
Azure Monitor & Application Insight to monitor Infrastructure & Application
 
Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesUnblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen Frames
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path Mount
 
My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 Presentation
 
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersEnhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
 
AI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsAI as an Interface for Commercial Buildings
AI as an Interface for Commercial Buildings
 
Hyderabad Call Girls Khairatabad ✨ 7001305949 ✨ Cheap Price Your Budget
Hyderabad Call Girls Khairatabad ✨ 7001305949 ✨ Cheap Price Your BudgetHyderabad Call Girls Khairatabad ✨ 7001305949 ✨ Cheap Price Your Budget
Hyderabad Call Girls Khairatabad ✨ 7001305949 ✨ Cheap Price Your Budget
 

B04 07 0614

  • 1. International Journal of Engineering Inventions e-ISSN: 2278-7461, p-ISSN: 2319-6491 Volume 4, Issue 7 (December 2014) PP: 06-14 www.ijeijournal.com Page | 6 RRW Framework by Using Enhanced Pixel Wise masking and K-Means Clustering N. Krishna Chaitanya1 , Vijaya Kumar Nasina2 1 Associate Professor, ECE Department, PBR VITS, KAVALI, NELLORE (DT.), INDIA 2 Student M.Tech(DSCE), ECE Department, PBR VITS, KAVALI, NELLORE (DT.), INDIA Abstract: This paper presents Robust reversible watermarking methods are popular in multimedia for protecting copyright, while preserving intactness of host images and providing robustness against unintentional attacks. However, conventional RRW methods are not readily applicable in practice. That is mainly because they fail to offer satisfactory reversibility on large-scale image datasets. They have limited robustness in extracting watermarks from the watermarked images destroyed by different unintentional attack. Some of them suffer from extremely poor invisibility for watermarked images. Therefore, it is necessary to have a framework to address these three problems, and further improve its performance. So a novel pragmatic framework is proposed that is wavelet-domain statistical quantity histogram shifting and clustering (WSQH-SC). Compared with conventional methods, WSQH-SC ingeniously constructs new watermark embedding and extraction procedures by histogram shifting and clustering, which are important for improving robustness and reducing run-time complexity. Additionally, WSQH-SC includes the property-inspired pixel adjustment to effectively handle overflow and underflow of pixels. This results in satisfactory reversibility and invisibility. Furthermore, to increase its practical applicability, WSQH-SC designs an enhanced pixel-wise masking to balance robustness and invisibility. So it perform extensive experiments over natural, medical, and synthetic aperture radar images to show the effectiveness of WSQH-SC by comparing with the histogram rotation-based and histogram distribution constrained methods. Key words: Integer wavelet transform, k-means clustering, masking, robust reversible watermarking (RRW). I. Introduction REVERSIBLE WATERMARKING (RW) methods [1] are used to embed watermarks [2], e.g., secret information [3], into digital media while preserving high intactness and good fidelity of host media. It plays an important role in protecting copyright and content of digital media for sensitive applications, e.g., medical and military images. Although researchers proposed some RW methods for various media, e.g., images [4], [5], audios [6], videos [7], and 3-Dmeshes [8], they assume the transmission channel is lossless. The robust RW (RRW) is thus a challenging task. For RRW, the essential objective is to accomplish watermark embedding and extraction in both lossless and lossy environment. As a result, RRW is required to not only recover host images and watermarks without distortion for the lossless channel, but also resist unintentional attacks and extract as many watermarks as possible for the noised channel [9]. II. Existing Methods Recently, a dozen of RRW methods for digital images have been proposed [10]–[13], which can be classified into two groups [9]: histogram rotation (HR)-based methods and histogram distribution constrained (HDC) methods. The HR-based methods [10], [11] accomplish robust lossless embedding by slightly rotating the centroid vectors of two random zones in the non-overlapping blocks. Due to the close correlation of neighboring pixels, these methods were reported to be robust against JPEG compression. However, they are sensitive to “salt-and-pepper” noise, which leads to poor visual quality of watermarked images, and impedes lossless recovery of host images and watermarks. To solve this problem, the HDC methods have been developed in spatial and wavelet-domains [12], [13], which divide image blocks into different types and embed the modulated watermarks for each type based on histogram distribution. Unfortunately, these methods suffer from unstable reversibility and robustness according to [9]. In summary, the above analysis shows that both kinds of RRW methods are not readily applicable in practice. III. Proposed Framework In this section, we introduce a new RRW framework, i.e., WSQH-SC, which accomplishes the robust lossless embedding task by incorporating the merits of SQH shifting, k-means clustering and EPWM. WSQH-SC comprises two processes: watermark embedding and extraction. In view of their similarity, Fig. 1 only shows the diagram of the embedding process in which the three modules are termed: 1) PIPA; 2) SQH construction; and 3) EPWM-based embedding, and they are detailed in the following three subsections. To be specific,
  • 2. RRW Framework by Using Enhanced Pixel Wise masking and K-Means Clustering www.ijeijournal.com Page | 7 WSQH-SC first investigates the wavelet sub-band properties in depth and exploits PIPA to preprocess the host image, which is of great importance to avoid both overflow and underflow of pixels during the embedding process. Afterward, the host image is decomposed by the 5/3 integer wavelet transform (IWT) [30] and the blocks of interest in the sub-band C HL 0 are selected to generate the SQH with the help of the threshold constraint. Finally, watermarks can be embedded into the selected blocks by histogram shifting, wherein EPWM is designed to adaptively control watermark strength. After the IWT reconstruction, the watermarked image is obtained. Fig. 1. Embedding process of the proposed wavelet-domain SQH shifting and clustering framework. (a) PIPA. (b) SQH construction. (c) EPWM based embedding A. PIPA: Firstly, PIPA deeply exploits the intrinsic relationship between wavelet coefficient and pixel changes. Secondly, by taking the scale and region of wavelet coefficient changes into consideration, PIPA determines the adjustment scale and employs the pixel adjustment strategy to preprocess the host images. Multiple Sub-Bands and Multiple Wavelet Coefficients: Considering an arbitrary block with the top left corner at (p, q) in C W 0 , 1 ≤ p < M, 1 ≤ q < N, we investigate the changes of wavelet coefficients and pixels in two special cases, Here, vf = ]0,0,1...0,1,0,1,0,0[ 12 xh , vg = ]1,2,...,2,1[ 32 xw and the affected region of pixels is denoted by the location of its top left corner. To further illustrate such effects, Fig. 2 shows an example in which the block size is 3 × 3, and the wavelet coefficients of two neighboring blocks in C LL 0 and C HL 0 are changed simultaneously. Fig. 2. Example of the effects of changing wavelet coefficients on pixels based on multiple sub-bands and multiple wavelet coefficients.
  • 3. RRW Framework by Using Enhanced Pixel Wise masking and K-Means Clustering www.ijeijournal.com Page | 8 With Fig. 2, we can deduce that: 1) the affected pixel regions are nonoverlapped when the wavelet coefficients of neighboring blocks are changed at the same time and 2) the pixel changes are monodirectional and the maximum change scale equals λ. In this case, we can easily determine the adjustment scale and use the pixel adjustment strategy to preprocess host images. In particular, given a t-bit host image I with the size of 2M ×2N, the pixel adjustment is performed by       ,),( ,),( ),(!   jiI jiI jiI     ),(. 2),(. jiIif jiIif t (1) where I (i, j ) is the grayscale value of the pixel at (i, j ) in the image I , I(i, j ) is the adjusted one (1 ≤ i ≤ 2M, 1 ≤ j ≤ 2N), and η > λ is the adjustment scale. Thereafter, the preprocessed host image can be reliably used for watermark embedding in the next subsections. Because the pixels are changed into a reliable range before embedding, i.e.[η, 2t − 1 – η], PIPA can successfully avoid both overflow and underflow of pixels [15]. It is also worth emphasizing that the proposed WSQH-SC is nonblind to some extent because the locations of the changed pixels need to be saved as a part of side information and transmitted to the receiver side in order to recover the original grayscale values of pixels. B. SQH Construction In this subsection, we consider the SQH construction task with a threshold constraint. Inspired by characteristics of the wavelet coefficients [13], we focus on the mean of wavelet coefficients (MWC) histogram by taking the following two properties into account: 1) it is designed in high-pass sub-bands of wavelet decomposition, to which HVS is less sensitive, leading to high invisibility of watermarked images and 2) it has almost a zero-mean and Laplacian-like distribution based on the experimental study of wavelet high-pass sub- bands from 300 test images illustrated in Section V, which is stable for different images. In particular, an MWC histogram is generated based on the following procedure. Considering a given host image I , we first decompose I using 5/3 IWT to obtain the sub-band C HL 0 , and then divide C HL 0 into n nonoverlapping blocks. Let S = [ 1S , . . . , kS , . . . , nS ] be the MWCs in the sub-band, then the MWC of the th k kth block, kS is defined as       1 2 1 2 ),( )2()2( 1 h i w j ji kk pwXh S (2) where P ji k ),( represents the wavelet coefficient at (i, j ) in the kth block. To construct the MWC histogram, our concern is the possibility of utilizing the blocks of interest in a sub-band, which will be helpful for simplifying the embedding process.In view of the histogram distribution of MWC, only the peak and its neighbors in the histogram are mostly useful for the embedding task. Therefore, a threshold constraint is applied to the blocks to retain those of interest, each of which satisfies the following condition: d (x, kS ) ≤ δ, 1 ≤ k ≤ n (3) where d (·) computes the Euclidean distance of two elements, x ∈ {xl , xr } represents the aforementioned two peak points, and δ is a predefined constant for threshold control. When δ ≥ max {d ( lx , min (S)) , d ( rx , max (S))}, all of the blocks will be retained for embedding, which is a special case of this constraint. Moreover, with the help of the threshold constraint, the capacity can be controlled flexibly. C. EPWM-Based Embedding : It has been well acknowledged that a balance between invisibility and robustness is important for robust watermarking methods. Although many efforts have been made to design lossless embedding models, little progress has been made in this trade-off. Therefore, we develop EPWM to tackle this problem by utilizing the JND thresholds of wavelet coefficients to optimize watermark strength. In view of the disadvantages of PWM discussed in Section II, EPWM focuses on improving the local sensitivity of images to noise by mainly estimating brightness and texture sensitivities in a more precise way. Motivated by the benefits of luminance masking [34], we first redefine the brightness sensitivity in (5) by calculating the luminance masking of the low-pass sub-band at resolution level ρ, denoted as ))},(),,(()),,((max{),,( jiljilfjilfji mbs      (4)
  • 4. RRW Framework by Using Enhanced Pixel Wise masking and K-Means Clustering www.ijeijournal.com Page | 9        127)(,3)127/)(1(17 127)(,3)127)(()128/3( ),(!   bb bb ll ll jiI (5) And ))())(()())(),(( 21   bbmmb p s ldldlllf -(6) represent the visibility threshold and spatial masking functions, respectively, in which d1 (·) and d2 (·) are the background luminance dependent functions, and lρ b (·) and lρm (·) mean the average background luminance and maximum weighted average of luminance differences. Then, the texture sensitivity is evaluated based on [35] by 𝜌, 𝑖, 𝑗 = 1 16 𝑘 3−𝜌 𝑘=0 [𝐶𝑘+𝜌 𝑤1 𝑦=0 1 𝑥=0𝑤∈ 𝐿𝐻,𝐻𝐿,𝐻𝐻 (𝑦 + 𝑖 2 𝑘 , 𝑥 + 𝑗 2 𝑘)]2 x 1 𝛾 𝜌 3 𝛾𝜌 3 (I,j) (7) Fig. 3: Example of WMC histogram in a watermarked image. Algorithm1: Proposed Classification Process Input: The MWCs w S = [ w S1 , . . . , w mS ],and number of clusters  . Output:The set of clusters g =[ 1g , . . . , g ] 1.Inittialize the clusters ,,..., )1()1( 1 ff iteration time  ; 2. Do 3. For k=1 to m do 4 Assign the kth k wS to one of the clusters according to the distance between it and cluster centers. k wS ∈ 𝑔𝑗 ,if d( k wS ,𝑓𝑗 (∈) ) ≤ 𝑑 k wS , 𝑓𝑙 ∈ 𝑓𝑜𝑟 𝑎𝑙𝑙 𝑙 = 1,2, … . 𝜇 5 End for 6 Update the cluster centers with 𝑓𝑗 (∈+1) = (1/|𝑔𝑗 ∈ |) ∙ k wSk wS ∈𝑔 𝑗 ∈ 7 While arg min || k wS − 𝑓𝑗 (∈+1) | 𝜇 𝑗=1 k wS ∈𝑔𝑗 |2 where ϒ3 ρ is the mean of the approximation sub-image ϒ3 ρ . Because both (13) and (16) take the difference between resolution levels into account, we can replace (6) with (8) Otherwise,1 HHwif,2 )(     w Finally, the new JND threshold can be obtained by 2.0 ),,(),,()( jijiwJNDw p    (9)
  • 5. RRW Framework by Using Enhanced Pixel Wise masking and K-Means Clustering www.ijeijournal.com Page | 10 in which 0 < ϒ≤ 1 is a tuning parameter corresponding to the weight of brightness sensitivity. In view of space limitation, refer to [15] and [16] for the definitions of d1 (·), d2 (·), lρ b (·), lρm (·), and ϒ3 ρ . With (8), we use the obtained JND thresholds to control watermark strength during the embedding process. To be specific, given the MWC of the kth block of interest, i.e., Sk, 1 ≤ k ≤ m, the watermark embedding is given by bS kk k wS (10) Here k wS is the obtained MWC after the kth watermark bit kb ∈ {0, 1} is embedded, β is a factor defined as 𝛽 = (𝑆𝑘 -𝑆∗ )/abs(𝑆𝑘 -𝑆∗ ) (11) 𝑆∗ = arg min 𝑑( 𝑆𝑘,x) x∈ 𝑥𝑙, 𝑥 𝑟 )  = 𝛼 𝑀 𝑥 𝑁 𝐽𝑁𝐷𝜌 𝑤 (𝑖, 𝑗)𝑁 𝑗 =1 𝑀 𝑖=1 (12) represents the watermark strength, where α is a global parameter and M × N is the sub-band size. Because the novel embedding model shown in (10) expands the additive spread spectrum [36] to a reversible embedding model, we term it a generalized additive spread spectrum. By applying (10) to the blocks of interest in the sub-band, watermarks can be embedded into the wavelet coefficients. Thereafter, the IWT reconstruction is performed to obtain the watermarked image. D. Extraction Based on k-Means Clustering If watermarked images are transmitted through an ideal channel, we can directly adopt the inverse operation of (10) to recover host images and watermarks. However, in the real environment, degradation may be imposed on watermarked images due to unintentional attacks, e.g., lossy compression and random noise. Therefore, it is essential to find an effective watermark extraction algorithm so that it can resist unintentional attacks in the lossy environment. Based on the aforementioned embedding model in (10), the MWC histogram of watermarked images are divided into three parts shown in Fig. 3, in which the center part corresponds to watermark bit “0” and others to bit “1.” To extract the embedded watermarks, the key issue is to partition these parts dynamically. In the lossy environment, this is very difficult because the histogram distribution of MWC is destroyed by unintentional attacks, as reported in [14]. In this paper, by investigating the effects of unintentional attacks on histogram, we treat the partition as a clustering problem with a certain number of clusters and adopt the k-means clustering algorithm [18], [19] to tackle this problem for simplicity.Similar to the embedding process, we first decompose the watermarked image with 5/3 IWT and construct the MWC histogram by calculating the MWCs of blocks of interest in the sub-band C HL 0 . Let w S = [ w S1 , . . . , w mS ] be the obtained MWCs, F = [ 1f , . . . , f ] be the cluster centers, and g =[ 1g , . . . , g ] be the set of clusters, wherein μ is the number of clusters. The above classification process is summarized in Table V. Particularly, the initial cluster centers are given by considering the features of the embedding process, e.g.,F = {τ min (Sw) , 0, τ max (Sw)} for μ = 3, to improve the efficiency of classification. Based on the results of classification the embedded watermarks can be extracted by        IIIClassorIClassSif,1 (13)IIClassSif,0 w k w kr kb Algorithm-2: Embeddding Procedure of the Proposed Framework Input: A t-bit host image I with the size of 2Mx 2N ,a watermark sequence b =[𝑏1,…, 𝑏 𝑚] and block size hxw. Output:The watermarked image 𝐼 𝑤 1. Apply PIPA to host image I to ontain the adjusted image 𝐼! , and record the locations of the pixels changed by PIPA: 2. Decompose 𝐼! using 5/3 IWT and devide The sub-band 𝐶0 𝐻𝐿 into n nonoverlapping blocks with size of h x w; 3. Compute the MWCs of all the blocks with (2) and obtain S = [ 1S , . . . , kS , . . . , nS ]; 4. Retain blocks of interest with the threshold constraint in (3) and construct SQH
  • 6. RRW Framework by Using Enhanced Pixel Wise masking and K-Means Clustering www.ijeijournal.com Page | 11 5. Perform EPWM to compute the watermark strength  = 𝛼 𝑀 𝑥 𝑁 𝐽𝑁𝐷𝜌 𝑤 (𝑖, 𝑗) 𝑁 𝑗 =1 𝑀 𝑖=1 6. For k=1 to m do 7. Embed the kth watermark with bS kk k wS 8. End for 9. Recondtruct the watermark image 𝐼 𝑤 with inverse 5/3 IWT Algorithm-3: Extraction Procedure of the Proposed Framework Input: A watermarked image I W with the size of 2Mx 2N , block size h x w , watermark strength  and the locations of the pixel changed by PIPA. Output:The recovered watermarke sequence 𝑏 𝑟 image 𝐼 𝑟 . 1. Decompose 𝐼 𝑤 using 5/3 IWT and devide The sub-band 𝐶0 𝐻𝐿 into n nonoverlapping blocks with size of h x w; 2. Compute the MWCs of all the blocks of interest with with (2) and obtain w S = [ w S1 , . . . , w mS ]; 3. For k=1 to m do 4. Extract the embedded watermarks        IIIClassorIClassSif,1 (13)3forIIClassSif,0 w k w k r kb 5 Recover the MWCs with r k w k bS r kS 6 End for 7 Perform inverse IWT follwed by PIPA to obtain the recovered image 𝐼 𝑟 8 Return the Recovered watermark 𝑏 𝑟 andimage 𝐼 𝑟 For μ = 3, in which k wS is the kth MWC, brk is the extracted watermark bit, and Classes I–III denote the obtained set of clusters. Thereafter, we recover the MWCs with r k w k bS r kS , which are identical to the original ones in the lossless environment. After the IWT reconstruction, the inverse operation of (1) is applied to the pixels changed by PIPA in the embedding process to recover host images. As mentioned earlier, the side information including the block size, watermark strength, and loations of the pixels changed by PIPA, should be transmitted to the receiver side, which is important for the recovery of watermarks and host images, and also leads to nonblindness of the proposed framework to some extent. In summary, the embedding and extraction processes of the proposed framework are depicted in the discussion. IV. Simulation Results In our experiments, the robustness, reversibility, invisibility, capacity, and run-time complexity are used to evaluate the performance. In particular, the pure capacity is calculated in bits/pixel (b/ps) and the invisibility is measured by PSNR, defined as        MSE PSNR 2 255 log10 (14) MSE= ) 22 1 2 1 ),(),(( 4 1 JIIJII MN M I N J W    (15) in which I (i, j ) and I W (i, j ) denote the grayscale values of the pixels at (i, j ) in the host and watermarked images. TABLE I: Simulation values of PSNR, MSE& Ans Parameter Value PSNR 99.89 MSE 0.019 Ans 0.998
  • 7. RRW Framework by Using Enhanced Pixel Wise masking and K-Means Clustering www.ijeijournal.com Page | 12 Fig 5 a,b,c,d,e: a-Original image ,b- IWT 5/3 decomposed image, c- watermarked image, d-extracted watermark, e- Extracted image .
  • 8. RRW Framework by Using Enhanced Pixel Wise masking and K-Means Clustering www.ijeijournal.com Page | 13 Fig 6 a,b: PSNR AND MSE VALUES Vr block size Fig 7 a,b: PSNR & MSE Vr Tuning parameter
  • 9. RRW Framework by Using Enhanced Pixel Wise masking and K-Means Clustering www.ijeijournal.com Page | 14 Fig 8 a,b: MSE and PSNR values Vr Threshold V. Conclusion In this paper, we have developed a novel yet pragmatic framework for RRW. It includes carefully designed PIPA,SQH shifting and clustering, and EPWM, each of which handles a specific problem in RRW. PIPA preprocesses host images by adjusting the pixels into a reliable range for satisfactory reversibility. SQH shifting and clustering constructs new watermark embedding and extraction processes for good Robustness and low run- time complexity. EPWM precisely estimates the local sensitivity of HVS and adaptively optimizes the watermark strength for a trade-off between robustness and invisibility. Below are the advantages of this framework: 1) obtains comprehensive performance in terms of reversibility, robustness, invisibility, capacity and run-time complexity; 2) is widely applicable to different kinds of images; and 3) is readily applicable in practice. In future, we will combine the proposed framework with the local feature to further improve robustness. In addition, it is valuable to integrate the merits of sparse representation and probabilistic graphical model into the designing of image watermarking. REFERENCES [1] J. Fridrich, M. Goljan, and R. Du, “Lossless data embedding-new paradigm in digital watermarking,” EURASIP J. Appl. Signal Process., vol. 2002, no. 1, pp. 185–196, Jan. 2002. [2] Z. Zhao, N. Yu, and X. Li, “A novel video watermarking scheme in compression domain based on fast motion estimation,” in Proc. Int. Conf. Commun. Technol., vol. 2. 2003, pp. 1878–1882. [3] X. Li, “Watermarking in secure image retrieval,” Pattern Recog. Lett., vol. 24, no. 14, pp. 2431–2434, Oct. 2003. [4] M. Celik, G. Sharma, A. Tekalp, and E. Saber, “Lossless generalized-LSB data embedding,” IEEE Trans. Image Process., vol. 14, no. 2, pp. 253–266, Feb. 2005. [5] J. Tian, “Reversible watermarking using a difference expansion,” IEEE Trans. Circuits Syst. Video Technol., vol. 13, no. 8, pp. 890–896, Aug. 2003. [6] M. Van der Veen, F. Bruekers, A. Van Leest, and S. Cavin, “High capacity reversible watermarking for audio,” Proc. SPIE, vol. 5020, no.1, pp. 1–11, Jan. 2003. [7] R. Du and J. Fridrich, “Lossless authentication of MPEG-2 video,” in Proc. IEEE Int. Conf. Image Process., vol. 2. Dec. 2002, pp. 893–896. [8] J. Dittmann and O. Benedens, “Invertible authentication for 3-D-meshes,” Proc. SPIE, vol. 5020, no. 653, pp. 653–664, Jan. 2003. [9] L. An, X. Gao, C. Deng, and F. Ji, “Robust lossless data hiding: Analysis and evaluation,” in Proc. Int. Conf. High Perform. Comput. Simul., 2010, pp. 512–516. [10] C. De Vleeschouwer, J. Delaigle, and B. Macq, “Circular interpretation of histogram for reversible watermarking,” in Proc. IEEE Workshop. [11] C. De Vleeschouwer, J. Delaigle, and B. Macq, “Circular interpretation of bijective transformations in lossless watermarking for media asset management,” IEEE Trans. Multimedia, vol. 5, no. 1, pp. 97–105, Mar.2003. [12] Z. Ni, Y. Shi, N. Ansari, W. Su, Q. Sun, and X. Lin, “Robust lossless image data hiding designed for semi-fragile image authentication,” IEEE Trans. Circuits Syst. Video Technol., vol. 18, no. 4, pp. 497–509, Apr. 2008. [13] D. Zou, Y. Shi, Z. Ni, and W. Su, “A semi-fragile lossless digital watermarking scheme based on integer wavelet transform,” IEEE Trans.Circuits Syst. Video Technol., vol. 16, no. 10, pp. 1294–1300, Oct. 2006. [14] X. Gao, L. An, Y. Yuan, D. Tao, and X. Li, “Lossless data embedding using generalized statistical quantity histogram,” IEEE Trans. Circuits Syst. Video Technol., vol. 21, no. 8, pp. 1061–1070, Aug. 2011. Multimedia Signal Process., 2001, pp. 345–350. [15] C. Chou and Y. Li, “A perceptually tuned subband image coder based on the measure of just-noticeable-distortion profile,” IEEE Trans. Circuits Syst. Video Technol., vol. 5, no. 6, pp. 467–476, Dec. 1995. [16] C. Nafornita, “A new pixel-wise mask for watermarking,” in Proc. ACM Multimedia Secur. Workshop, 2007, pp. 221–228. [17] S. Zhang, Q. Tian, G. Hua, Q. Huang, and S. Li, “Descriptive visual words and visual phrases for image applications,” in Proc. ACM Int.Conf. Multimedia, 2009, pp. 75–84. [18] T. Xia, D. Tao, T. Mei, and Y. Zhang, “Multiview spectral embedding,” IEEE Trans. Syst., Man, Cybern. B, Cybern., vol. 40, no. 6, pp. 1438–1446, Dec. 2010. [19] T. Zhou and D. Tao, “Fast gradient clustering,” in Proc. NIPS Workshop Discr. Optim. Mach.