This document proposes a new robust hybrid watermarking scheme that embeds data in all frequencies of an image using both the discrete cosine transform (DCT) and singular value decomposition (SVD). It first applies DCT to the cover image and maps the coefficients into four quadrants representing different frequency bands. SVD is then applied to each quadrant. The singular values in each quadrant are modified by the singular values of the DCT-transformed visual watermark. Embedding data in all frequencies makes the scheme robust against attacks that target specific frequencies.
Hybrid Approach for Robust Digital Video WatermarkingIJSRD
With the growing popularity of internet and digital media, digital watermarking techniques have been developed to protect the copyright of multimedia objects such as text, audio, video, etc. So, we have proposed a hybrid video watermarking technique which takes the advantages of different transforms like DWT, DCT, SVD and Arnold Transform, which enhances more security and provides robustness to the watermark. In this paper method, video is divided into several groups of frames, and one of the frames is selected where watermark will be embedded. Before embedding watermark in a selected frame it will be pre-processed with Arnold Transform which will provide security to it. The selected plane of video frame are decomposed using DWT and high frequency band HH, middle frequency bands LH, HL are transformed with DCT. The DCT coefficients are SVD transformed which are embedded with corresponding transformed coefficients of watermarks along with Arnold Transform. The embedded watermark is extracted with inverse process of embedding. The proposed algorithm is tested with various video sequences using MATLAB 2013a. The distortion quality of original image and watermark is controlled by the Peak Signal to Noise Ratio, Signal to Noise Ratio and Mean square error of the watermarked frame with original frame.
In this era any type of digital media such as image, text, audio and video, all are easily accessible and transferable through the use of high speed internet. As the use of internet increased, the need of security and authenticity also increased. To secure the multimedia data such as image, audio, text and video researcher has developed a watermarking technique which gives a watermark embedding and watermark extraction algorithm, and later it is used for proof of ownership. Here we are proposing a technique on video watermarking using 2D DWT and 2-level SVD technique. In this paper first we are taking a video which is decomposed into number of frames and embedding a watermark image on each frame. First 2-D DWT is applied on each frame. Dwt decompose each frame into low frequency, mid frequency and in high frequency (LL, LH, HL, HH) band then we applied SVD on LL and HL sub-band called it dual band. SVD convert it into three matrices as U1S1V1’ of single matrix. A watermark image is taken which converted in to gray scale from RGB scale then resized it. And embed this watermark image into host frames with some scaling factor. After that we again applied SVD on this watermarked frames which further convert this single matrix into three matrices as U2S2V2’ now multiply S2 matrix with U1 and V1 matrix component to make it more secure. To demonstrate the authenticity of this watermarked video we applied some attacks such as Gaussian filtering, median filtering, frame rotation, contrast adjustment and sharpness attack which show its PSNR and NCC value in comparison with the original video.
Hybrid Approach for Robust Digital Video WatermarkingIJSRD
With the growing popularity of internet and digital media, digital watermarking techniques have been developed to protect the copyright of multimedia objects such as text, audio, video, etc. So, we have proposed a hybrid video watermarking technique which takes the advantages of different transforms like DWT, DCT, SVD and Arnold Transform, which enhances more security and provides robustness to the watermark. In this paper method, video is divided into several groups of frames, and one of the frames is selected where watermark will be embedded. Before embedding watermark in a selected frame it will be pre-processed with Arnold Transform which will provide security to it. The selected plane of video frame are decomposed using DWT and high frequency band HH, middle frequency bands LH, HL are transformed with DCT. The DCT coefficients are SVD transformed which are embedded with corresponding transformed coefficients of watermarks along with Arnold Transform. The embedded watermark is extracted with inverse process of embedding. The proposed algorithm is tested with various video sequences using MATLAB 2013a. The distortion quality of original image and watermark is controlled by the Peak Signal to Noise Ratio, Signal to Noise Ratio and Mean square error of the watermarked frame with original frame.
In this era any type of digital media such as image, text, audio and video, all are easily accessible and transferable through the use of high speed internet. As the use of internet increased, the need of security and authenticity also increased. To secure the multimedia data such as image, audio, text and video researcher has developed a watermarking technique which gives a watermark embedding and watermark extraction algorithm, and later it is used for proof of ownership. Here we are proposing a technique on video watermarking using 2D DWT and 2-level SVD technique. In this paper first we are taking a video which is decomposed into number of frames and embedding a watermark image on each frame. First 2-D DWT is applied on each frame. Dwt decompose each frame into low frequency, mid frequency and in high frequency (LL, LH, HL, HH) band then we applied SVD on LL and HL sub-band called it dual band. SVD convert it into three matrices as U1S1V1’ of single matrix. A watermark image is taken which converted in to gray scale from RGB scale then resized it. And embed this watermark image into host frames with some scaling factor. After that we again applied SVD on this watermarked frames which further convert this single matrix into three matrices as U2S2V2’ now multiply S2 matrix with U1 and V1 matrix component to make it more secure. To demonstrate the authenticity of this watermarked video we applied some attacks such as Gaussian filtering, median filtering, frame rotation, contrast adjustment and sharpness attack which show its PSNR and NCC value in comparison with the original video.
it is used for security purpose using two level dct and wavelet packet denoising .based on digital image processing.the software based on matlab.it is used for high security purpose.
International Journal of Computational Engineering Research(IJCER)ijceronline
International Journal of Computational Engineering Research(IJCER) is an intentional online Journal in English monthly publishing journal. This Journal publish original research work that contributes significantly to further the scientific knowledge in engineering and Technology.
A Review on Robust Digital Watermarking based on different Methods and its Ap...IJSRD
Digital Watermarking is the process of embedding data called watermark or signature or label or tag into a multimedia object (image or audio or video) so that the watermark can be extracted for ownership verification or authentication. A visible watermark is a secondary translucent image overlaid into the primary image and appears visible to a viewer on a careful inspection. The invisible watermark is embedded in such a way that the modification made to the pixel value is perceptually not noticed and it can be recovered only with an appropriate decoding mechanism. Digital watermarking is used to hide the information inside a signal, which cannot be easily extracted by the third party. Its widely used application is copyright protection of digital information. It is different from the encryption in the sense that it allows the user to access, view and interpret the signal but protect the ownership of the content. One of the current research areas is to protect digital watermark inside the information so that ownership of the information cannot be claimed by third party.
Image Authentication Using Digital Watermarkingijceronline
International Journal of Computational Engineering Research (IJCER) is dedicated to protecting personal information and will make every reasonable effort to handle collected information appropriately. All information collected, as well as related requests, will be handled as carefully and efficiently as possible in accordance with IJCER standards for integrity and objectivity.
International Journal of Engineering Research and Applications (IJERA) is an open access online peer reviewed international journal that publishes research and review articles in the fields of Computer Science, Neural Networks, Electrical Engineering, Software Engineering, Information Technology, Mechanical Engineering, Chemical Engineering, Plastic Engineering, Food Technology, Textile Engineering, Nano Technology & science, Power Electronics, Electronics & Communication Engineering, Computational mathematics, Image processing, Civil Engineering, Structural Engineering, Environmental Engineering, VLSI Testing & Low Power VLSI Design etc.
DIGITAL IMAGE WATERMARKING USING DFT ALGORITHMacijjournal
Image security is a relatively very young and fast growing. Security of data or information is very
important now a day in this world. Information security is most important for the business industries.
Embedding information so that it cannot be visually perceived. Embedding information in digital data so
that it cannot be visually or audibly perceived. In this paper we review some of the digital image
watermarking and techniques and then DFT algorithm is also proposed. In this paper we review the
robustness and metrics.
Digital video watermarking scheme using discrete wavelet transform and standa...eSAT Publishing House
IJRET : International Journal of Research in Engineering and Technology is an international peer reviewed, online journal published by eSAT Publishing House for the enhancement of research in various disciplines of Engineering and Technology. The aim and scope of the journal is to provide an academic medium and an important reference for the advancement and dissemination of research results that support high-level learning, teaching and research in the fields of Engineering and Technology. We bring together Scientists, Academician, Field Engineers, Scholars and Students of related fields of Engineering and Technology
A Hybrid Model of Watermarking Scheme for Color Image Authentication Using Di...iosrjce
IOSR Journal of Electronics and Communication Engineering(IOSR-JECE) is a double blind peer reviewed International Journal that provides rapid publication (within a month) of articles in all areas of electronics and communication engineering and its applications. The journal welcomes publications of high quality papers on theoretical developments and practical applications in electronics and communication engineering. Original research papers, state-of-the-art reviews, and high quality technical notes are invited for publications.
(Paper) P2P VIDEO BROADCAST BASED ON PER-PEER TRANSCODING AND ITS EVALUATION ...Naoki Shibata
Shibata, N., Yasumoto, K., and Mori, M.: P2P Video Broadcast based on Per-Peer Transcoding and its Evaluation on PlanetLab, Proc. of 19th IASTED Int'l. Conf. on Parallel and Distributed Computing and Systems (PDCS2007), pp. 478-483, (November 2007).
http://ito-lab.naist.jp/themes/pdffiles/071121.shibata.pdcs2007.pdf
We have previously proposed a P2P video broadcast method called MTcast for simultaneously delivering video to user peers with different quality requirements. In this paper, we design and implement a prototype system of MTcast and report the results of its performance evaluation in the real Internet environment. MTcast relies on each peer to transcode and forward video to other peers. We conducted experiments on 20 PlanetLab nodes, evaluated startup delay and recovery time from peer leaving/failure, and confirmed that MTcast achieves practical performance in a real environment.
"This educational activity is
implemented under
The "Learning Together" Programme" which is funded
By the John S. Latsis Public Benefit Foundation”
The project started in December 2015 and will end in June 2016
it is used for security purpose using two level dct and wavelet packet denoising .based on digital image processing.the software based on matlab.it is used for high security purpose.
International Journal of Computational Engineering Research(IJCER)ijceronline
International Journal of Computational Engineering Research(IJCER) is an intentional online Journal in English monthly publishing journal. This Journal publish original research work that contributes significantly to further the scientific knowledge in engineering and Technology.
A Review on Robust Digital Watermarking based on different Methods and its Ap...IJSRD
Digital Watermarking is the process of embedding data called watermark or signature or label or tag into a multimedia object (image or audio or video) so that the watermark can be extracted for ownership verification or authentication. A visible watermark is a secondary translucent image overlaid into the primary image and appears visible to a viewer on a careful inspection. The invisible watermark is embedded in such a way that the modification made to the pixel value is perceptually not noticed and it can be recovered only with an appropriate decoding mechanism. Digital watermarking is used to hide the information inside a signal, which cannot be easily extracted by the third party. Its widely used application is copyright protection of digital information. It is different from the encryption in the sense that it allows the user to access, view and interpret the signal but protect the ownership of the content. One of the current research areas is to protect digital watermark inside the information so that ownership of the information cannot be claimed by third party.
Image Authentication Using Digital Watermarkingijceronline
International Journal of Computational Engineering Research (IJCER) is dedicated to protecting personal information and will make every reasonable effort to handle collected information appropriately. All information collected, as well as related requests, will be handled as carefully and efficiently as possible in accordance with IJCER standards for integrity and objectivity.
International Journal of Engineering Research and Applications (IJERA) is an open access online peer reviewed international journal that publishes research and review articles in the fields of Computer Science, Neural Networks, Electrical Engineering, Software Engineering, Information Technology, Mechanical Engineering, Chemical Engineering, Plastic Engineering, Food Technology, Textile Engineering, Nano Technology & science, Power Electronics, Electronics & Communication Engineering, Computational mathematics, Image processing, Civil Engineering, Structural Engineering, Environmental Engineering, VLSI Testing & Low Power VLSI Design etc.
DIGITAL IMAGE WATERMARKING USING DFT ALGORITHMacijjournal
Image security is a relatively very young and fast growing. Security of data or information is very
important now a day in this world. Information security is most important for the business industries.
Embedding information so that it cannot be visually perceived. Embedding information in digital data so
that it cannot be visually or audibly perceived. In this paper we review some of the digital image
watermarking and techniques and then DFT algorithm is also proposed. In this paper we review the
robustness and metrics.
Digital video watermarking scheme using discrete wavelet transform and standa...eSAT Publishing House
IJRET : International Journal of Research in Engineering and Technology is an international peer reviewed, online journal published by eSAT Publishing House for the enhancement of research in various disciplines of Engineering and Technology. The aim and scope of the journal is to provide an academic medium and an important reference for the advancement and dissemination of research results that support high-level learning, teaching and research in the fields of Engineering and Technology. We bring together Scientists, Academician, Field Engineers, Scholars and Students of related fields of Engineering and Technology
A Hybrid Model of Watermarking Scheme for Color Image Authentication Using Di...iosrjce
IOSR Journal of Electronics and Communication Engineering(IOSR-JECE) is a double blind peer reviewed International Journal that provides rapid publication (within a month) of articles in all areas of electronics and communication engineering and its applications. The journal welcomes publications of high quality papers on theoretical developments and practical applications in electronics and communication engineering. Original research papers, state-of-the-art reviews, and high quality technical notes are invited for publications.
(Paper) P2P VIDEO BROADCAST BASED ON PER-PEER TRANSCODING AND ITS EVALUATION ...Naoki Shibata
Shibata, N., Yasumoto, K., and Mori, M.: P2P Video Broadcast based on Per-Peer Transcoding and its Evaluation on PlanetLab, Proc. of 19th IASTED Int'l. Conf. on Parallel and Distributed Computing and Systems (PDCS2007), pp. 478-483, (November 2007).
http://ito-lab.naist.jp/themes/pdffiles/071121.shibata.pdcs2007.pdf
We have previously proposed a P2P video broadcast method called MTcast for simultaneously delivering video to user peers with different quality requirements. In this paper, we design and implement a prototype system of MTcast and report the results of its performance evaluation in the real Internet environment. MTcast relies on each peer to transcode and forward video to other peers. We conducted experiments on 20 PlanetLab nodes, evaluated startup delay and recovery time from peer leaving/failure, and confirmed that MTcast achieves practical performance in a real environment.
"This educational activity is
implemented under
The "Learning Together" Programme" which is funded
By the John S. Latsis Public Benefit Foundation”
The project started in December 2015 and will end in June 2016
Case study on Nike's Marketing strategy - Nike is the top athletic apparel and footwear manufacturer in the world. This presentation will give you an insight of how Nike changed the marketing scenario of the sports equipment industry. Started off as a small company which only made running shoes for athletes by athletes, in just a short span of time, it rose to become the leading competitor of the sports industry.
IJERA (International journal of Engineering Research and Applications) is International online, ... peer reviewed journal. For more detail or submit your article, please visit www.ijera.com
Digital watermarking has been proposed as a solution to the problem of copyright protection of
multimedia documents in networked environments. There are two important issues that watermarking
algorithms need to address. First, watermarking schemes are required to provide trustworthy evidence for
protecting rightful ownership. Second, good watermarking schemes should satisfy the requirement of
robustness and resist distortions due to common image manipulations (such as filtering, compression,
etc.). In this paper, a watermarking algorithm is proposed based on the Discrete Wavelet Transform
(DWT), Fractional Fourier Transform (FrFT) and Singular value decomposition (SVD). Analysis and
experimental results show that the proposed watermarking method performs well in both security and
robustness.
IOSR Journal of Electronics and Communication Engineering(IOSR-JECE) is an open access international journal that provides rapid publication (within a month) of articles in all areas of electronics and communication engineering and its applications. The journal welcomes publications of high quality papers on theoretical developments and practical applications in electronics and communication engineering. Original research papers, state-of-the-art reviews, and high quality technical notes are invited for publications.
SVD Based Robust Digital Watermarking For Still Images Using Wavelet Transform cscpconf
This paper aims at developing a hybrid image watermarking algorithm which satisfies both
imperceptibility and robustness requirements. In order to achieve our objectives we have used
singular values of Wavelet Transformation’s HL and LH sub bands to embed watermark.
Further to increase and control the strength of the watermark, we use a scale factor. An optimal
watermark embedding method is developed to achieve minimum watermarking distortion. A
secret embedding key is designed to securely embed the fragile watermarks so that the new
method is robust to counterfeiting, even when the malicious attackers are fully aware of the
watermark embedding algorithm. Experimental results are provided in terms of Peak signal to
noise ratio (PSNR), Normalized cross correlation (NCC) and gain factor to demonstrate the
effectiveness of the proposed algorithm. Image operations such as JPEG compression from
malicious image attacks and, thus, can be used for semi-fragile watermarking
International Journal of Engineering Research and Development (IJERD)IJERD Editor
call for paper 2012, hard copy of journal, research paper publishing, where to publish research paper,
journal publishing, how to publish research paper, Call For research paper, international journal, publishing a paper, IJERD, journal of science and technology, how to get a research paper published, publishing a paper, publishing of journal, publishing of research paper, reserach and review articles, IJERD Journal, How to publish your research paper, publish research paper, open access engineering journal, Engineering journal, Mathemetics journal, Physics journal, Chemistry journal, Computer Engineering, Computer Science journal, how to submit your paper, peer reviw journal, indexed journal, reserach and review articles, engineering journal, www.ijerd.com, research journals,
yahoo journals, bing journals, International Journal of Engineering Research and Development, google journals, hard copy of journal
Abstract: The increasing amount of applications using digital multimedia technologies has accentuated the need to provide copyright protection to multimedia data. This paper reviews one of the data hiding techniques - digital image watermarking. Through this paper we will explore some basic concepts of digital image watermarking techniques.Two different methods of digital image watermarking namely spatial domain watermarking and transform domain watermarking are briefly discussed in this paper. Furthermore, two different algorithms for a digital image watermarking have also been discussed. Also the comparision between the different algorithms,tests performed for the robustness and the applications of the digital image watermarking have also been discussed.
IJERA (International journal of Engineering Research and Applications) is International online, ... peer reviewed journal. For more detail or submit your article, please visit www.ijera.com
A Brief Survey on Robust Video Watermarking Techniquestheijes
The International Journal of Engineering & Science is aimed at providing a platform for researchers, engineers, scientists, or educators to publish their original research results, to exchange new ideas, to disseminate information in innovative designs, engineering experiences and technological skills. It is also the Journal's objective to promote engineering and technology education. All papers submitted to the Journal will be blind peer-reviewed. Only original articles will be published.
A Wavelet Based Hybrid SVD Algorithm for Digital Image Watermarkingsipij
In this paper we propose a hybrid image watermarking algorithm which satisfies both imperceptibility and robustness requirements. Our proposed work provide an optimum solution by using singular values of Wavelet Transformation’s HL and LH sub bands to embed watermark. Further to increase and control the strength of the watermark, we use a scale factor. An optimal watermark embedding method is developed to achieve minimum watermarking distortion. A secret embedding key is designed to securely embed the fragile watermarks so that the new method is robust to counterfeiting, even when the malicious attackers are fully aware of the watermark embedding algorithm. Experimental results are provided in terms of peak signal to noise ratio (PSNR), normalized cross correlation (NCC) and gain factor to demonstrate the effectiveness of the proposed algorithm. Image operations such as JPEG compression from malicious image attacks and, thus, can be used for semi-fragile watermarking.
Advance Digital Video Watermarking based on DWT-PCA for Copyright protectionIJERA Editor
Now a days there is use of digital multimedia applications are increased. Digital image watermarking techniques can be classified into spatial or transform domains. The spatial domain methods are the simplest watermarking techniques but have low robustness against different attacks, unlike the transform domains watermarking methods are more complex and have high robustness against various attacks. Most commonly used methods of watermarking are discrete cosine transform (DCT), discrete wavelet transform (DWT).A hybrid digital video watermarking scheme based on Discrete Wavelet Transform (DWT) and Principal Component Analysis (PCA). These transform domain technique always give more robust output than DCT and DWT The video frames are first decomposed using DWT and the binary watermark is embedded in the principal components of the low frequency wavelet coefficients Here in order to improve the robustness of water mark Haar filtering must be used in order to get PSNR as much as possible Experimental result shows no visible difference between the watermarked frames and original frame. It shows robustness on the watermarked video against various attacks. Peak signal to noise ratio (PSNR) is calculated to measure efficiency of this all methods. And this value must be increased up to the level.
Implementation of digital image watermarking techniques using dwt and dwt svd...eSAT Journals
computerized substance. Data took care of on web and mixed media system framework is in advanced structure. Computerized watermarking is only the innovation in which there is inserting of different data in advanced substance, which we need to shield from illicit replicating. Computerized picture watermarking is concealing data in any structure (content, picture, sound and video) in unique picture without corrupting its perceptual quality. On the off chance that of Discrete Wavelet Transform (DWT), deterioration of the first picture is completed to insert the watermark. Moreover, if there should arise an occurrence of cross breed system (DWT-SVD) firstly picture is decayed by and after that watermark is installed in solitary qualities acquired by application of Singular Value Decomposition (SVD). DWT and SVD are utilized in combination to enhance the nature of watermarking. We have the procedures which are looked at on the premise of Peak Signal to Noise Ratio (PSNR) esteem at various benefits of scaling component; high estimation of PSNR is coveted because it displays great intangibility of the strategy.
Implementation of digital image watermarking techniques using dwt and dwt svd...eSAT Journals
Abstract
These days, in every field there is gigantic utilization of computerized substance. Data took care of on web and mixed media system framework is in advanced structure. Computerized watermarking is only the innovation in which there is inserting of different data in advanced substance, which we need to shield from illicit replicating. Computerized picture watermarking is concealing data in any structure (content, picture, sound and video) in unique picture without corrupting its perceptual quality. On the off chance that of Discrete Wavelet Transform (DWT), deterioration of the first picture is completed to insert the watermark. Moreover, if there should arise an occurrence of cross breed system (DWT-SVD) firstly picture is decayed by and after that watermark is installed in solitary qualities acquired by application of Singular Value Decomposition (SVD). DWT and SVD are utilized in combination to enhance the nature of watermarking. We have the procedures which are looked at on the premise of Peak Signal to Noise Ratio (PSNR) esteem at various benefits of scaling component; high estimation of PSNR is coveted because it displays great intangibility of the strategy.
An Overview of Visual Cryptography based Video Watermarking Schemes: Techniqu...idescitation
Digital communication has seen exponential growth in the past decade.
Consequently, the security of digital data has become a field of extensive research since
piracy and unauthorized use of such data is prevalent because of the ease with which data
can be replicated or tampered. Visual Cryptography (VC) is a special cryptographic
technique where decryption is done by an authorized user by simply overlaying the shares.
Thus, there is no requirement for complex computations unlike normal cryptography.
Though simple for an authorized user, it is equally difficult for an unauthorized user to
attack since the secret message can be deciphered if and only if all the shares are available
to the attacker. The probability of this is negligibly small since one of the shares usually
needs to be registered with a Certified Authority (CA). The procedure is non- intrusive and
does not alter the contents of the host image or video. For this reason, VC has been applied
to image watermarking widely. In case of video watermarking applications, robustness
against different types of attacks like frame attacks, spatial and temporal desynchronization
attacks, statistical analysis and collusion attacks need to be considered. Also creation of
shares for videos requires feature extraction techniques which are different from that of
images. Moreover, as size of video is more, a large secret payload can be used to construct a
share. In this survey paper, the research being carried out globally on VC techniques for
videos, along with their pros and cons have been highlighted. The paper also discusses
challenges in applying VC for video watermarking. Further, a performance comparison
amongst the mentioned schemes is also provided.
DWT-SVD BASED SECURED IMAGE WATERMARKING FOR COPYRIGHT PROTECTION USING VISUA...cscpconf
In this paper, a new robust watermarking technique for copyright protection based on Discrete
Wavelet Transform and Singular Value Decomposition is proposed. The high frequency subband
of the wavelet decomposed cover image is modified by modifying its singular values. A secret key
is generated from the original watermark with the help of visual cryptography to claim the
ownership of the image. The ownership of the image can be claimed by superimposing this secret
key on the extracted watermark from the watermarked image. The robustness of the technique is
tested by applying different attacks and the visual quality of the extracted watermark after
applying these attacks is good. Also, the visual quality of the watermarked image is undistinguishable from the original image.
A NOVEL APPROACH FOR IMAGE WATERMARKING USING DCT AND JND TECHNIQUESijiert bestjournal
Today�s world is digital world. Nowadays,in every field there is enormous use of digital contents. Information handled on internet and multimedia netw ork system is in digital form. The copying of digital content without quality loss is not so diff icult. Due to this,there are more chances of copyi ng of such digital information. So,there is great need o f prohibiting such illegal copyright of digital med ia. Digital watermarking is the powerful solution to ad dress this problem. Digital watermarking is the technology in which there is embedding of various t ypes of information in digital content which we have to protect from illegal copying. This embedded information to protect the data is embedded as watermark. This paper introduces two novel techniqu es for image watermarking such as DCT and JND. The DCT based approach adapted to embed waterm arks in DC,low,mid and high frequency components coefficient of DCT. The JND based approa ch gives robust and transparent scheme of watermarking that exploits the �human visual system s� sensitivity to local image characteristics obtained from the spatial domain,improving upon th e content based image watermarking scheme.
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024Albert Hoitingh
In this session I delve into the encryption technology used in Microsoft 365 and Microsoft Purview. Including the concepts of Customer Key and Double Key Encryption.
Elevating Tactical DDD Patterns Through Object CalisthenicsDorra BARTAGUIZ
After immersing yourself in the blue book and its red counterpart, attending DDD-focused conferences, and applying tactical patterns, you're left with a crucial question: How do I ensure my design is effective? Tactical patterns within Domain-Driven Design (DDD) serve as guiding principles for creating clear and manageable domain models. However, achieving success with these patterns requires additional guidance. Interestingly, we've observed that a set of constraints initially designed for training purposes remarkably aligns with effective pattern implementation, offering a more ‘mechanical’ approach. Let's explore together how Object Calisthenics can elevate the design of your tactical DDD patterns, offering concrete help for those venturing into DDD for the first time!
UiPath Test Automation using UiPath Test Suite series, part 4DianaGray10
Welcome to UiPath Test Automation using UiPath Test Suite series part 4. In this session, we will cover Test Manager overview along with SAP heatmap.
The UiPath Test Manager overview with SAP heatmap webinar offers a concise yet comprehensive exploration of the role of a Test Manager within SAP environments, coupled with the utilization of heatmaps for effective testing strategies.
Participants will gain insights into the responsibilities, challenges, and best practices associated with test management in SAP projects. Additionally, the webinar delves into the significance of heatmaps as a visual aid for identifying testing priorities, areas of risk, and resource allocation within SAP landscapes. Through this session, attendees can expect to enhance their understanding of test management principles while learning practical approaches to optimize testing processes in SAP environments using heatmap visualization techniques
What will you get from this session?
1. Insights into SAP testing best practices
2. Heatmap utilization for testing
3. Optimization of testing processes
4. Demo
Topics covered:
Execution from the test manager
Orchestrator execution result
Defect reporting
SAP heatmap example with demo
Speaker:
Deepak Rai, Automation Practice Lead, Boundaryless Group and UiPath MVP
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...DanBrown980551
Do you want to learn how to model and simulate an electrical network from scratch in under an hour?
Then welcome to this PowSyBl workshop, hosted by Rte, the French Transmission System Operator (TSO)!
During the webinar, you will discover the PowSyBl ecosystem as well as handle and study an electrical network through an interactive Python notebook.
PowSyBl is an open source project hosted by LF Energy, which offers a comprehensive set of features for electrical grid modelling and simulation. Among other advanced features, PowSyBl provides:
- A fully editable and extendable library for grid component modelling;
- Visualization tools to display your network;
- Grid simulation tools, such as power flows, security analyses (with or without remedial actions) and sensitivity analyses;
The framework is mostly written in Java, with a Python binding so that Python developers can access PowSyBl functionalities as well.
What you will learn during the webinar:
- For beginners: discover PowSyBl's functionalities through a quick general presentation and the notebook, without needing any expert coding skills;
- For advanced developers: master the skills to efficiently apply PowSyBl functionalities to your real-world scenarios.
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...Ramesh Iyer
In today's fast-changing business world, Companies that adapt and embrace new ideas often need help to keep up with the competition. However, fostering a culture of innovation takes much work. It takes vision, leadership and willingness to take risks in the right proportion. Sachin Dev Duggal, co-founder of Builder.ai, has perfected the art of this balance, creating a company culture where creativity and growth are nurtured at each stage.
DevOps and Testing slides at DASA ConnectKari Kakkonen
My and Rik Marselis slides at 30.5.2024 DASA Connect conference. We discuss about what is testing, then what is agile testing and finally what is Testing in DevOps. Finally we had lovely workshop with the participants trying to find out different ways to think about quality and testing in different parts of the DevOps infinity loop.
JMeter webinar - integration with InfluxDB and GrafanaRTTS
Watch this recorded webinar about real-time monitoring of application performance. See how to integrate Apache JMeter, the open-source leader in performance testing, with InfluxDB, the open-source time-series database, and Grafana, the open-source analytics and visualization application.
In this webinar, we will review the benefits of leveraging InfluxDB and Grafana when executing load tests and demonstrate how these tools are used to visualize performance metrics.
Length: 30 minutes
Session Overview
-------------------------------------------
During this webinar, we will cover the following topics while demonstrating the integrations of JMeter, InfluxDB and Grafana:
- What out-of-the-box solutions are available for real-time monitoring JMeter tests?
- What are the benefits of integrating InfluxDB and Grafana into the load testing stack?
- Which features are provided by Grafana?
- Demonstration of InfluxDB and Grafana using a practice web application
To view the webinar recording, go to:
https://www.rttsweb.com/jmeter-integration-webinar
GraphRAG is All You need? LLM & Knowledge GraphGuy Korland
Guy Korland, CEO and Co-founder of FalkorDB, will review two articles on the integration of language models with knowledge graphs.
1. Unifying Large Language Models and Knowledge Graphs: A Roadmap.
https://arxiv.org/abs/2306.08302
2. Microsoft Research's GraphRAG paper and a review paper on various uses of knowledge graphs:
https://www.microsoft.com/en-us/research/blog/graphrag-unlocking-llm-discovery-on-narrative-private-data/
Neuro-symbolic is not enough, we need neuro-*semantic*Frank van Harmelen
Neuro-symbolic (NeSy) AI is on the rise. However, simply machine learning on just any symbolic structure is not sufficient to really harvest the gains of NeSy. These will only be gained when the symbolic structures have an actual semantics. I give an operational definition of semantics as “predictable inference”.
All of this illustrated with link prediction over knowledge graphs, but the argument is general.
1. Secure DCT-SVD Domain Image Watermarking:
Embedding Data in All Frequencies
Alexander Sverdlov Scott Dexter Ahmet M. Eskicioglu
The Graduate Center Department of CIS, Brooklyn College Department of CIS, Brooklyn College
The City University of New York 2900 Bedford Avenue 2900 Bedford Avenue
365 Fifth Avenue, NY, NY 10016 Brooklyn, NY 11210 Brooklyn, NY 11210
Tel: 212-817-8190 Tel: 718-951-3125 Tel: 718-758-8481
sverdlov@sci.brooklyn.cuny.edu sdexter@sci.brooklyn.cuny.edu eskicioglu@sci.brooklyn.cuny.edu
ABSTRACT
1. INTRODUCTION
Both Discrete Cosine Transform (DCT) and Singular Value
Watermarking (data hiding) [1,2,3] is the process of embedding
Decomposition (SVD) have been used as mathematical tools for
data into a multimedia element such as image, audio or video.
embedding data into an image. In the DCT-domain, the DCT
This embedded data can later be extracted from, or detected in,
coefficients are modified by the elements of a pseudo-random
the multimedia for security purposes. A watermarking algorithm
sequence of real values. In the SVD domain, a common approach
consists of the watermark structure, an embedding algorithm, and
is to modify the singular values by the singular values of a visual
an extraction, or a detection, algorithm. Watermarks can be
watermark. In this paper, we present a new robust hybrid
embedded in the pixel domain or a transform domain. In
watermarking schemes based on DCT and SVD. After applying
multimedia applications, embedded watermarks should be
the DCT to the cover image, we map the DCT coefficients in a
invisible, robust, and have a high capacity [4]. Invisibility refers
zig-zag order into four quadrants, and apply the SVD to each
to the degree of distortion introduced by the watermark and its
quadrant. These four quadrants represent frequency bands from
affect on the viewers or listeners. Robustness is the resistance of
the lowest to the highest. The singular values in each quadrant
an embedded watermark against intentional attacks, and normal
are then modified by the singular values of the DCT-transformed
A/V processes such as noise, filtering (blurring, sharpening, etc.),
visual watermark. We assume that the size of the visual
resampling, scaling, rotation, cropping, and lossy compression.
watermark is one quarter of the size of the cover image.
Capacity is the amount of data that can be represented by an
Modification in all frequencies enables a watermarking scheme
embedded watermark. The approaches used in watermarking still
that is robust to normal A/V processes or intentional attacks that
images include least-significant bit encoding, basic M-sequence,
destroy the watermark in either lower or higher frequencies. We
transform techniques, and image-adaptive techniques [5].
show that embedding data in lowest frequencies is resistant to one
set of attacks while embedding data in highest frequencies is Typical uses of watermarks include copyright protection
resistant to another set of attacks. The only exception is the (identification of the origin of content, tracing illegally distributed
rotation attack for which the data embedded in middle frequencies copies) and disabling unauthorized access to content.
survive better. Requirements and characteristics for the digital watermarks in
these scenarios are different, in general. Identification of the
Categories and Subject Descriptors origin of content requires the embedding of a single watermark
K.4.4 [Computers and Society]: Electronic Commerce - into the content at the source of distribution. To trace illegal
cybercash, digital cash, distributed commercial transactions, copies, a unique watermark is needed based on the location or
electronic data interchange (EDI), intellectual property, payment identity of the recipient in the multimedia network. In both of
schemes, security. these applications, watermark extraction or detection needs to
take place only when there is a dispute regarding the ownership of
General Terms Security content. For access control, the watermark should be checked in
every authorized consumer device used to receive the content.
Keywords copyright protection, discrete cosine transform,
Note that the cost of a watermarking system will depend on the
image watermarking, multimedia, singular value decomposition.
intended use, and may vary considerably.
Two widely used image compression standards are JPEG and
JPEG2000. The former is based on the Discrete Cosine
Transform (DCT), and the latter the Discrete Wavelet Transform
(DWT). In recent years, many watermarking schemes have been
developed using these popular transforms.
In all frequency domain watermarking schemes, there is a conflict
between robustness and transparency. If the watermark is
embedded in perceptually most significant components, the
scheme would be robust to attacks but the watermark may be
1
2. difficult to hide. On the other hand, if the watermark is embedded 2. DCT-SVD DOMAIN WATERMARKING
in perceptually insignificant components, it would be easier to
hide the watermark but the scheme may be less resistant to
attacks. The process of separating the frequency bands using the DWT is
well-defined. In two-dimensional DWT, each level of
In image watermarking, two distinct approaches have been used decomposition produces four bands of data denoted by LL, HL,
to represent the watermark. In the first approach, the watermark LH, and HH. The LL subband can further be decomposed to
is generally represented as a sequence of randomly generated real obtain another level of decomposition.
numbers having a normal distribution with zero mean and unity
variance [6,7,8,9,10]. In the second approach, a picture In two-dimensional DCT, we apply the transformation to the
representing a company logo or other copyright information is whole image but need to map the frequency coefficients from the
embedded in the cover image [11,12,13,14,15,16]. lowest to the highest in a zig-zag order to 4 quadrants in order to
apply SVD to each block. All the quadrants will have the same
A few years ago, a third transform called Singular Value number of DCT coefficients. For example, if the cover image is
Decomposition (SVD) was explored for watermarking. The SVD 512x512, the number of DCT coefficients in each block will be
for square matrices was discovered independently by Beltrami in 65,536. To differentiate these blocks from the DWT bands, we
1873 and Jordan in 1874, and extended to rectangular matrices by will label them B1, B2, B3, B4. This process is depicted in
Eckart and Young in the 1930s. It was not used as a Figure 1.
computational tool until the 1960s because of the need for
sophisticated numerical techniques. In later years, Gene Golub In pure DCT-based watermarking, the DCT coefficients are
demonstrated its usefulness and feasibility as a tool in a variety of modified to embed the watermark data. Because of the conflict
applications [17]. SVD is one of the most useful tools of linear between robustness and transparency, the modification is usually
algebra with several applications in image compression made in middle frequencies, avoiding the lowest and highest
[18,19,20,21,22,23], watermarking [14,15,16], and other signal bands.
processing fields [24,25,26,27].
A recent paper [28] on DWT-based multiple watermarking argues
that embedding a visual watermark in both low and high B1 B2
frequencies results in a robust scheme that can resist to different
kinds of attacks. Embedding in low frequencies increases the
robustness with respect to attacks that have low pass B3 B4
characteristics like filtering, lossy compression and geometric
distortions while making the scheme more sensitive to
modifications of the image histogram, such as contrast/brightness
adjustment, gamma correction, and histogram equalization. Figure 1. Mapping of DCT coefficients into 4 blocks
Watermarks embedded in middle and high frequencies are
typically less robust to low-pass filtering, lossy compression, and Every real matrix A can be decomposed into a product of 3
small geometric deformations of the image but are highly robust matrices A = UΣVT, where U and V are orthogonal matrices, UTU
with respect to noise adding, and nonlinear deformations of the = I, VTV = I, and Σ = diag (λ1, λ2, ...). The diagonal entries of Σ
gray scale. Arguing that advantages and disadvantages of low are called the singular values of A, the columns of U are called the
and middle-to-high frequency watermarks are complementary, the left singular vectors of A, and the columns of V are called the
authors propose a new scheme where two different visual right singular vectors of A. This decomposition is known as the
watermarks are embedded in one image. Both watermarks are Singular Value Decomposition (SVD) of A, and can be written as
binary images, one contains the letters CO, and the other EP
against a white background. The cover image is the picture of a A = λ1U1V1 + λ2U2V2 + … + λr UrVr,
young girl. Two levels of decomposition are performed on the
where r is the rank of matrix A. It is important to note that each
cover image. The watermark CO is embedded in the second level
singular value specifies the luminance of an image layer while the
LL, and the watermark EP is embedded in the second level HH.
corresponding pair of singular vectors specifies the geometry of
The experiments show that embedding in the LL subband is
the image.
robust against JPEG compression, wiener filtering, Gaussian
noise, scaling, and cropping while embedding in the HH subband In SVD-based watermarking, several approaches are possible. A
is robust against histogram equalization, intensity adjustment, and common approach is to apply SVD to the whole cover image, and
gamma correction. Extracted watermarks appear to have similar modify all the singular values to embed the watermark data.
quality after the Gaussian noise attack only. We noticed that the
embedded watermark is highly visible in all parts of the cover In this paper, we will combine DCT and SVD to develop a new
image. The degradation is pronounced especially in low hybrid image watermarking scheme that is resistant to a variety of
frequency areas (e.g., the wall behind the young girl), resulting in attacks. The proposed scheme is given by the following
a loss in the commercial value of the image. algorithm:
In this paper, we generalize the above scheme to four subbands Assume the size of visual watermark is nxn, and the size of the
using DCT-SVD watermarking. cover image is 2nx2n.
2
3. Watermark embedding: The magnitudes of the singular values for each quadrant of the
cover image Lena used in our experiments are given in Table 1.
1. Apply the DCT to the whole cover image A. The DCT coefficients with the highest magnitude are found in the
B1 quadrant, and those with the lowest coefficients are found in
2. Using the zig-zag sequence, map the DCT coefficients into 4 the B4 quadrant. Correspondingly, the singular values with the
quadrants: B1, B2, B3, and B4. highest magnitudes are in the B1 quadrant, and the singular values
3. Apply SVD to each quadrant: with the lowest magnitudes are in the B4 quadrant.
k k k kT
A =U Σ V , k = 1,2,3,4, where k
DCT a DCT a DCT a DCT Table 1. Singular values of transformed Lena in 4 quadrants
denotes B1, B2, B3, and B4 quadrants, and λ ,
k
i i = 1,…,n 25000000
k
are the singular values of Σ .
20000000
a DCT
15000000
4. Apply DCT to the whole visual watermark W.
5. Apply SVD to the DCT-transformed visual watermark WDCT: 10000000
T
W =U Σ V , where λwi, i = 1,…,n are 5000000
DCT w DCT w DCT w DCT
0
the singular values of Σ .
1 18 35 52 69 86 103 120 137 154 171 188 205 222 239 256
w DCT (a) B1
6. Modify the singular values in each quadrant Bk, k = 1,2,3,4, 250000
with the singular values of the DCT-transformed visual
watermark: λ*k = λik + α k λ wi , i = 1,…,n.
i
200000
7. Obtain the 4 sets of modified DCT coefficients: 150000
*k k *k kT
A =U Σ V , k = 1,2,3,4. 100000
DCT a DCT a DCT a DCT
50000
8. Map the modified DCT coefficients back to their original
positions. 0
1 18 35 52 69 86 103 120 137 154 171 188 205 222 239 256
9. Apply the inverse DCT to produce the watermarked cover (b) B2
image. 150000
Watermark extraction: 120000
1. Apply the DCT to the whole watermarked (and possibly 90000
*
attacked) cover image A . 60000
2. Using the zig-zag sequence, map the DCT coefficients into 4 30000
quadrants: B1, B2, B3, and B4.
*k k * k kT
=U Σ V
0
3. Apply SVD to each quadrant: A ,k= 1 18 35 52 69 86 103 120 137 154 171 188 205 222 239 256
a a a (c) B3
1,2,3,4, where k denotes the attacked quadrants.
100000
4. Extract the singular values from each quadrant Bk, k =
λk = (λ*k − λik ) / α k , , i = 1,…,n.
80000
1,2,3,4: wi i
60000
5. Construct the DCT coefficients of the four visual watermarks
using the singular vectors: 40000
kk k kT
W =U Σ V , k = 1,2,3,4. 20000
DCT w DCT w DCT w DCT
0
6. Apply the inverse DCT to each set to construct the four 1 18 35 52 69 86 103 120 137 154 171 188 205 222 239 256
visual watermarks. (d) B4
3
4. We also computed the largest singular values of the DCT
coefficients in the four quadrants for six other common test
images. They are given in Table 2 together with Lena’s. The
general trend is a decrease in their magnitudes as we go from the
B1 quadrant to the B4 quadrant. The magnitudes of the largest
singular values in the B2, B3, and B4 quadrants have the same
order of magnitude. So, instead of assigning a different scaling
factor for each quadrant, we decided to use only two values: One
value for B1, and a smaller value for the other three quadrants.
Table 2. Largest singular values in 4 quadrants
Cover image: Lena Watermark: Boat
Image/
B1 B2 B3 B4
Quadrant
Mandrill 18,478,800 820,423 556,3534 380,236
Lena 24,019,900 236,304 130,947 88,132
Barbara 29,737,800 893,738 635,670 199,455
Boat 32,007,000 377,477 166,474 89,828 Watermarked Lena Extracted Watermarks
Figure 2. Watermark embedding/extraction
Goldhill 35,067,000 339,540 228,007 114,731
Table 3 includes the constructed watermarks from all quadrants
for a given attack. The numbers below the images indicate the
Peppers 37,421,400 259,615 174,685 248,779
Pearson product moment correlation between the original vector
of singular values and extracted vector of singular values for each
Airplane 57,248,500 291,741 118,816 65,230 quadrant. The Pearson product moment correlation coefficient is
a dimensionless index that ranges from -1.0 to 1.0, and reflects
the extent of a linear relationship between two data sets. Negative
coefficients imply that the singular values are very much different
from those of the reference watermark. The observer is able to
3. EXPERIMENTS evaluate the quality of constructed watermarks subjectively
Figure 2 shows the 512x512 gray scale cover image Lena, the through a visual comparison with the reference watermark. The
256X256 gray scale visual watermark Boat, the watermarked other alternative is to correlate the extracted singular values with
cover image, and the visual watermarks constructed from the four those of the reference watermark using the correlation coefficient.
quadrants. In the experiments, we used the scaling factor 0.25
According to Table 3, the watermarks constructed from the four
for B1, and 0.01 for the other three quadrants.
quadrants look different for each attack. It is possible to classify
The DCT-SVD based watermarking scheme was tested using the attacks into three groups:
twelve attacks. The DCT was performed using the FFTW library
1. Watermark embedding in the B1 quadrant is resistant to
[29], and the SVD was performed using an implementation of the
Gaussian blur, Gaussian noise, pixelation, JPEG
CLAPACK library for MacOS 10.3 [30]. The chosen attacks
compression, JPEG2000 compression, sharpening, and
were Gaussian blur, Gaussian noise, pixelation, JPEG
rescaling.
compression, JPEG 2000 compression, sharpening, rescaling,
rotation, cropping, contrast adjustment, histogram equalization, 2. Watermark embedding in the B4 quadrant is resistant to,
and gamma correction. cropping, contrast adjustment, histogram equalization, and
gamma correction.
The attacked images are presented in Figure 3 together with the
tools and parameters used for the attacks. 3. Watermark embedding in the B2 quadrant is resistant to
rotation.
4
7. 4. CONCLUSIONS ˆ ˆ 2
∑ W (i )W (i ) / ∑ W (i ) , and
i i
Our observations regarding the proposed watermarking scheme
can be summarized as follows: 2 2
ˆ ˆ
∑ W (i )W (i ) / ∑ W (i ) ∑ W (i ) ,
• SVD is a very convenient tool for watermarking in the i i i
DCT domain. We observed that the scaling factor can be
where W is the vector of singular values of the reference
chosen from a fairly wide range of values for B1, and also
for the other three quadrants. As the B1 quadrant contains ˆ
watermark, and W is the vector of extracted singular
the largest DCT coefficients, the scaling factor is chosen values.
accordingly. When the scaling factor for B1 is raised to an
unreasonable value, the image contrast becomes higher • Experimentation with multiple images will enable a better
while an increase in the scaling factor for the other understanding of the proposed watermarking scheme. As
quadrants results in diagonal artifacts that are visible different images may have singular values with different
especially in low frequency areas. magnitudes, what would be a general formula for
determining the values of the scaling factor for each
• In most DCT-based watermarking schemes, the lowest quadrant?
frequency coefficients are not modified as it is argued that
watermark transparency would be lost. In the DCT-SVD • In SVD watermarking, we embed singular values into
based approach, we experienced no problem in modifying singular values. Variations of this approach can be
the B1 quadrant. considered. For example, instead of embedding singular
values, any other vector that represents some information
• Watermarks inserted in the lowest frequencies (B1 may be used.
quadrant) are resistant to one group of attacks, and
watermarks embedded in highest frequencies (B4 quadrant) 3. ACKNOWLEDGMENTS
are resistant to another group of attacks. If the same
watermark is embedded in 4 blocks, it would be extremely Our thanks to Mr. Emir Ganic for the image input/output code
difficult to remove or destroy the watermark from all that was used in this work.
frequencies.
• In some cases, embedding in the B2 and B3 quadrants is 4. REFERENCES
also resistant to certain attacks. Two examples of those
attacks are histogram equalization and gamma correction.
After the cropping attack, singular value extraction in the [1] C. I. Podilchuk and E. J. Delp, “Digital Watermarking:
B3 and B4 quadrants produce almost identical results (as Algorithms and Applications,” IEEE Signal Processing
displayed by visual quality and correlation coefficient). Magazine, July 2001, pp. 33-46.
• One advantage of SVD-based watermarking is that there is [2] I. J. Cox, M. L. Miller, and J. A. Bloom, Digital
no need to embed all the singular values of a visual Watermarking, Morgan Kaufmann Publishers, 2002.
watermark. Depending on the magnitudes of the largest [3] E. T. Lin, A. M. Eskicioglu, R. L. Lagendijk and E. J.
singular values, it would be sufficient to embed only a Delp, “Advances in Digital Video Content Protection,”
small set. This SVD property has in fact been exploited to Proceedings of the IEEE, Special Issue on Advances in
develop algorithms for lossy image compression. Video Coding and Delivery, 2004.
• Observers can evaluate the quality of constructed [4] F. Hartung and M. Kutter, “Multimedia Watermarking
watermarks either subjectively or objectively. In Techniques,” Proceedings of the IEEE, Vol. 87, No. 7,
subjective evaluation, the reference watermark is compared July 1999, pp. 1079-1107.
with the watermark constructed after an attack. In
objective evaluation, statistical measures like Pearson’s [5] R. B. Wolfgang, C. I. Podilchuk and E. J. Delp,
correlation coefficient can be used, not requiring the “Perceptual Watermarks for Digital Images and Video,”
singular vectors of the watermark image. For automatic Proceedings of the IEEE, Vol. 87, No. 7, July 1999, pp.
watermark detection, the highest value of the correlation 1108-1126.
coefficient can be used to identify the quadrant with the [6] I. J. Cox, J. Kilian, T. Leighton and T. Shamoon,
highest resistance. “Secure Spread Spectrum Watermarking for
In future research, our investigation will include different Multimedia,” IEEE Transactions on Image Processing,
similarity measures, multiple images, and different watermark 6(12), December 1997, pp. 1673-1687.
representations: [7] X.-G. Xia, C. G. Boncelet and G. R. Arce, “A
• Different measures can be used to show the similarity Multiresolution Watermark for Digital Images,”
between the reference and the extracted singular values. Proceedings of the 1997 International Conference on
Two examples of such a measure are Image Processing, Washington, DC, October 26-29,
1997.
7
8. [8] M. Barni, F. Bartolini, V. Cappellini, A. Piva, “A DCT- [20] D. P. O’Leary and S. Peleg, “Digital Image Compression
Domain System for Robust Image Watermarking,” by Outer Product Expansion,” IEEE Transactions on
Signal Processing, Volume 66, No. 3, May 1998, pp. Communications, 31(3), March 1983, pp. 441-444.
357-372.
[21] J. F. Yang and C. L. Lu, “Combined Techniques of
[9] W. Zhu, Z. Xiong and Y.-Q. Zhang, “Multiresolution
Singular Value Decomposition and Vector
Watermarking for Images and Video,” IEEE
Quantization,” IEEE Transactions on Image Processing,
Transactions on Circuits and Systems for Video
4(8), August 1995, pp. 1141-1146.
Technology, Volume 9, No. 4, June 1999, pp. 545-550.
[22] P. Waldemar and T. A. Ramstad, “Hybrid KLT-SVD
[10] V. Fotopoulos and A. N. Skodras, “A Subband DCT
Image Compression,” 1997 IEEE International
Approach to Image Watermarking,” Proceedings of X
Conference on Acoustics, Speech and Signal Processing,
European Signal Processing Conference, Tampere,
Vol. 4, Munich, Germany, April 21-24, 1997, pp. 2713-
Finland, September 4 - 8, 2000.
2716.
[11] J. J. Chae and B. S. Manjunath, “A Robust Embedded
[23] S. O. Aase, J. H. Husoy and P. Waldemar, “A Critique
Data from Wavelet Coefficients,” Proceedings of the
of SVD-Based Image Coding Systems,” 1999 IEEE
SPIE International Conference on Storage and Retrieval
International Symposium on Circuits and Systems VLSI,
for Image and Video Databases VI, San Jose, CA,
Vol. 4, Orlando, FL, May 1999, pp. 13-16.
January 28-30, 1998, Vol. 3312, pp. 308-317.
[24] K. Konstantinides and G. S. Yovanof, “Improved
[12] S. D. Lin and C.-F. Chen, “A Robust DCT-Based
Compression Performance Using SVD-Based Filters for
Watermarking for Copyright Protection,” IEEE
Still Images,” SPIE Proceedings, Vol. 2418, San Jose,
Transactions on Consumer Electronics, Volume 46, No.
CA, February 7-8, 1995, pp. 100-106.
3, August 2000, pp. 415-421.
[25] K. Konstantinides and G. S. Yovanof, “Application of
[13] Y. Wang, J. F. Doherty and R. E. Van Dyck, “A
SVD-Based Spatial Filtering to Video Sequences,” 1995
Wavelet-Based Watermarking Algorithm for Ownership
IEEE International Conference on Acoustics, Speech
Verification of Digital Images,” IEEE Transactions on
and Signal Processing, Vol. 4, Detroit, MI, May 9-12,
Image Processing, Volume 11, No. 2, February 2002,
1995, pp. 2193-2196.
pp. 77-88.
[26] K. Konstantinides, B. Natarajan and G. S. Yovanof,
[14] V. I. Gorodetski, L. J. Popyack, V. Samoilov and V. A.
“Noise Estimation and Filtering Using Block-Based
Skormin, “SVD-based Approach to Transparent
Singular Value Decomposition,” IEEE Transactions on
Embedding Data into Digital Images,” International
Image Processing, 3(3), March 1997, pp. 479-483.
Workshop on Mathematical Methods, Models and
Architectures for Computer Network Security (MMM- [27] R. Karkarala and P. O. Ogunbona, “Signal Analysis
ACNS 2001), St. Petersbug, Russia, May 21-23, 2001. Using a Multiresolution Form of the Singular Value
Decomposition,” IEEE Transactions on Image
[15] D. V. S. Chandra, “Digital Image Watermarking Using
Processing, 10(5), May 2001, pp. 724-735.
Singular Value Decomposition,” Proceedings of 45th
IEEE Midwest Symposium on Circuits and Systems, [28] R. Mehul and R. Priti, “Discrete Wavelet Transform
Tulsa, OK, August 2002, pp. 264-267. Based Multiple Watermarking Scheme,” Proceedings
of IEEE Region 10 Technical Conference on Convergent
[16] R. Liu and T. Tan, “A SVD-Based Watermarking
Technologies for the Asia-Pacific, Bangalore, India,
Scheme for Protecting Rightful Ownership,” IEEE
October 14-17, 2003.
Transactions on Multimedia, 4(1), March 2002, pp.121-
128. [29] M. Frigo and S. G. Johnson, “FFTW: An Adaptive
Software Architecture for the FFT,” Proceedings of
[17] D. Kahaner, C. Moler and S. Nash, Numerical Methods
1998 IEEE International Conference on Acoustics
and Software (New Jersey: Prentice-Hall, Inc, 1989).
Speech and Signal Processing,” Vol. 3, Seattle, WA,
[18] H. C. Andrews and C. L. Patterson, “Singular Value May 12-15, 1998, pp. 1381-1384.
Decomposition (SVD) Image Coding,” IEEE
[30] http://developer.apple.com/hardware/ve
Transactions on Communications, 24(4), April 1976, pp.
425-432.
[19] N. Garguir, “Comparative Performance of SVD and
Adaptive Cosine Transform in Coding Images,” IEEE
Transactions on Communications, 27(8), August 1979,
pp. 1230-1234.
8