The document summarizes a research paper that proposes a novel approach for digital image watermarking using a hybrid transform and singular value decomposition (SVD). The hybrid transform is generated by taking the Kronecker product of existing orthogonal transforms like discrete cosine transform (DCT), Haar, and Walsh. The watermark is embedded by modifying the singular values of the host image after applying the hybrid transform and SVD. Experimental results show the proposed approach improves robustness against compression by 59%, noise addition by 70%, and resizing by 32-56% compared to other hybrid wavelet transform techniques. The performance is evaluated under various attacks like compression, cropping, noise addition, resizing, and histogram equalization.
Performance comparison of hybrid wavelet transforms formed using dct, walsh, ...ijcsit
1. The document discusses a proposed watermarking method using hybrid wavelet transforms and singular value decomposition (SVD).
2. Hybrid wavelet transforms are generated from combinations of discrete cosine transform (DCT), Walsh, Haar, and discrete Kekre transform (DKT). DCT is tested as both the global and local component of the hybrid transform.
3. SVD is applied to the watermark before embedding in the mid-frequency coefficients of the hybrid wavelet transformed host image.
4. The method is tested against various attacks including compression, cropping, noise addition, and resizing. Using DCT as the global component is found to be more robust, particularly against compression attacks.
Robust Watermarking in Mid-Frequency Band in Transform Domain using Different Transforms with Full, Row and Column Version and Varying Embedding Energy
Hybrid Digital Image Watermarking using Contourlet Transform (CT), DCT and SVDCSCJournals
Role of watermarking is dramatically enhanced due to the emerging technologies like IoT, Data analysis, and automation in many sectors of identity. Due to these many devices are connected through internet and networking and large amounts of data is generated and transmitted. Here security of the data is very much needed. The algorithm used for the watermarking is to be robust against various processes (attacks) such as filtering, compression and cropping etc. To increase the robustness, in the paper a hybrid algorithm is proposed by combining three transforms such as Contourlet, Discrete Cosine Transform (DCT) and Singular Value Decomposition (SVD). Performance of Algorithm is evaluated by using similarity metrics such as NCC, MSE and PSNR.
Hybrid Method For Image Watermarking Using 2 Level LWT-Walsh Transform-SVD in...rahulmonikasharma
Due to tremendous development in technology in recent time and availability of abundant tool, it is very easy for an unauthorized person to imitate crucial information which is present on internet. Therefore to shield valuable information present on internet there are various advanced techniques for example watermarking technique, cryptography technique, steganography and many more. With pace of time analog techniques replaced by digital techniques due to various advantages and in current scenario every country moving towards digitalization. Digital watermarking is a technique through which digital information is embedded into an image and secret digital data can be extracted at receiver side with authentication otherwise impossible to fetch. Spatial domain and frequency are the two techniques through which secret digital information can be embedded. In this paper two level lifting wavelet transform (LWT), Walsh Hadamard transform and singular value decomposition (SVD) technique has been proposed in YCbCr color space. First of all cover image and watermark image converted into YCbCr color space from RGB color space after that one of channel is selected for embedded purpose. Now perform first level LWT on the Y channel of cover and watermark image so that image split into four groups. Now apply second level LWT on any one of four bands. Further Walsh hadamard transform technique applied with singular value decomposition (SVD) technique to get enhanced output. In base paper DWT-DFT-SVD used but in this paper DWT-DFT replaced by LWT-WHT due to various advantages. One disadvantage of DWT is that the use of larger DWT basis functions or wavelet filters produces blurring and also ringing noise near edges in images. This disadvantage of DWT is overcome in LWT. Other advantages of LWT are that it significantly reduces the computation time and speed up the computation process. This method provides better results in terms of enhanced PSNR values and is able to withstand a variety of image processing attacks and besides this processing time also reduced.
This document presents a comparative analysis of digital image watermarking techniques in the frequency domain using MATLAB Simulink. It discusses watermarking using discrete cosine transform (DCT) and discrete wavelet transform (DWT). For DCT, the image is divided into blocks and DCT is applied before embedding the watermark in middle frequency coefficients. For extraction, the same process is reversed. For DWT, the image is decomposed into sub-bands before embedding the watermark into the low-high frequency sub-band. Extraction follows the reverse process. The document also proposes a technique using both DCT and DWT that embeds a watermark into DCT coefficients of DWT sub-bands for increased robust
A simplified-single-correlator-rake-receiver-for-cdma-communicationsCemal Ardil
This document summarizes a research paper that proposes a simplified single correlator RAKE receiver for CDMA communications. The receiver uses a single correlator and code generator, rather than multiple correlators as in conventional RAKE receivers. It spreads data using modified Walsh-Hadamard codes, which provide better uncorrelation between multipath signals. Simulation results showed the proposed receiver achieves lower bit error rates than conventional RAKE receivers when receiving multiple multipath signals.
SECURED COLOR IMAGE WATERMARKING TECHNIQUE IN DWT-DCT DOMAIN ijcseit
The multilayer secured DWT-DCT and YIQ color space based image watermarking technique with
robustness and better correlation is presented here. The security levels are increased by using multiple pn
sequences, Arnold scrambling, DWT domain, DCT domain and color space conversions. Peak signal to
noise ratio and Normalized correlations are used as measurement metrics. The 512x512 sized color images
with different histograms are used for testing and watermark of size 64x64 is embedded in HL region of
DWT and 4x4 DCT is used. ‘Haar’ wavelet is used for decomposition and direct flexing factor is used. We
got PSNR value is 63.9988 for flexing factor k=1 for Lena image and the maximum NC 0.9781 for flexing
factor k=4 in Q color space. The comparative performance in Y, I and Q color space is presented. The
technique is robust for different attacks like scaling, compression, rotation etc.
Watermarking Scheme based on Redundant Discrete Wavelet Transform and SVDIRJET Journal
This document presents a watermarking scheme based on Redundant Discrete Wavelet Transform (RDWT) and Singular Value Decomposition (SVD) with the following key points:
1. The host image is first transformed into the wavelet domain using 1-level RDWT. SVD is then applied to embed the watermark by modifying the singular values of the host and watermark images.
2. For extraction, the watermarked image is transformed using RDWT and SVD to recover the singular values. The extracted watermark is obtained by calculating the difference between the singular values of the watermarked and original host images.
3. Experimental results on standard test images show the scheme is robust against various attacks
Performance comparison of hybrid wavelet transforms formed using dct, walsh, ...ijcsit
1. The document discusses a proposed watermarking method using hybrid wavelet transforms and singular value decomposition (SVD).
2. Hybrid wavelet transforms are generated from combinations of discrete cosine transform (DCT), Walsh, Haar, and discrete Kekre transform (DKT). DCT is tested as both the global and local component of the hybrid transform.
3. SVD is applied to the watermark before embedding in the mid-frequency coefficients of the hybrid wavelet transformed host image.
4. The method is tested against various attacks including compression, cropping, noise addition, and resizing. Using DCT as the global component is found to be more robust, particularly against compression attacks.
Robust Watermarking in Mid-Frequency Band in Transform Domain using Different Transforms with Full, Row and Column Version and Varying Embedding Energy
Hybrid Digital Image Watermarking using Contourlet Transform (CT), DCT and SVDCSCJournals
Role of watermarking is dramatically enhanced due to the emerging technologies like IoT, Data analysis, and automation in many sectors of identity. Due to these many devices are connected through internet and networking and large amounts of data is generated and transmitted. Here security of the data is very much needed. The algorithm used for the watermarking is to be robust against various processes (attacks) such as filtering, compression and cropping etc. To increase the robustness, in the paper a hybrid algorithm is proposed by combining three transforms such as Contourlet, Discrete Cosine Transform (DCT) and Singular Value Decomposition (SVD). Performance of Algorithm is evaluated by using similarity metrics such as NCC, MSE and PSNR.
Hybrid Method For Image Watermarking Using 2 Level LWT-Walsh Transform-SVD in...rahulmonikasharma
Due to tremendous development in technology in recent time and availability of abundant tool, it is very easy for an unauthorized person to imitate crucial information which is present on internet. Therefore to shield valuable information present on internet there are various advanced techniques for example watermarking technique, cryptography technique, steganography and many more. With pace of time analog techniques replaced by digital techniques due to various advantages and in current scenario every country moving towards digitalization. Digital watermarking is a technique through which digital information is embedded into an image and secret digital data can be extracted at receiver side with authentication otherwise impossible to fetch. Spatial domain and frequency are the two techniques through which secret digital information can be embedded. In this paper two level lifting wavelet transform (LWT), Walsh Hadamard transform and singular value decomposition (SVD) technique has been proposed in YCbCr color space. First of all cover image and watermark image converted into YCbCr color space from RGB color space after that one of channel is selected for embedded purpose. Now perform first level LWT on the Y channel of cover and watermark image so that image split into four groups. Now apply second level LWT on any one of four bands. Further Walsh hadamard transform technique applied with singular value decomposition (SVD) technique to get enhanced output. In base paper DWT-DFT-SVD used but in this paper DWT-DFT replaced by LWT-WHT due to various advantages. One disadvantage of DWT is that the use of larger DWT basis functions or wavelet filters produces blurring and also ringing noise near edges in images. This disadvantage of DWT is overcome in LWT. Other advantages of LWT are that it significantly reduces the computation time and speed up the computation process. This method provides better results in terms of enhanced PSNR values and is able to withstand a variety of image processing attacks and besides this processing time also reduced.
This document presents a comparative analysis of digital image watermarking techniques in the frequency domain using MATLAB Simulink. It discusses watermarking using discrete cosine transform (DCT) and discrete wavelet transform (DWT). For DCT, the image is divided into blocks and DCT is applied before embedding the watermark in middle frequency coefficients. For extraction, the same process is reversed. For DWT, the image is decomposed into sub-bands before embedding the watermark into the low-high frequency sub-band. Extraction follows the reverse process. The document also proposes a technique using both DCT and DWT that embeds a watermark into DCT coefficients of DWT sub-bands for increased robust
A simplified-single-correlator-rake-receiver-for-cdma-communicationsCemal Ardil
This document summarizes a research paper that proposes a simplified single correlator RAKE receiver for CDMA communications. The receiver uses a single correlator and code generator, rather than multiple correlators as in conventional RAKE receivers. It spreads data using modified Walsh-Hadamard codes, which provide better uncorrelation between multipath signals. Simulation results showed the proposed receiver achieves lower bit error rates than conventional RAKE receivers when receiving multiple multipath signals.
SECURED COLOR IMAGE WATERMARKING TECHNIQUE IN DWT-DCT DOMAIN ijcseit
The multilayer secured DWT-DCT and YIQ color space based image watermarking technique with
robustness and better correlation is presented here. The security levels are increased by using multiple pn
sequences, Arnold scrambling, DWT domain, DCT domain and color space conversions. Peak signal to
noise ratio and Normalized correlations are used as measurement metrics. The 512x512 sized color images
with different histograms are used for testing and watermark of size 64x64 is embedded in HL region of
DWT and 4x4 DCT is used. ‘Haar’ wavelet is used for decomposition and direct flexing factor is used. We
got PSNR value is 63.9988 for flexing factor k=1 for Lena image and the maximum NC 0.9781 for flexing
factor k=4 in Q color space. The comparative performance in Y, I and Q color space is presented. The
technique is robust for different attacks like scaling, compression, rotation etc.
Watermarking Scheme based on Redundant Discrete Wavelet Transform and SVDIRJET Journal
This document presents a watermarking scheme based on Redundant Discrete Wavelet Transform (RDWT) and Singular Value Decomposition (SVD) with the following key points:
1. The host image is first transformed into the wavelet domain using 1-level RDWT. SVD is then applied to embed the watermark by modifying the singular values of the host and watermark images.
2. For extraction, the watermarked image is transformed using RDWT and SVD to recover the singular values. The extracted watermark is obtained by calculating the difference between the singular values of the watermarked and original host images.
3. Experimental results on standard test images show the scheme is robust against various attacks
Determining the Efficient Subband Coefficients of Biorthogonal Wavelet for Gr...CSCJournals
In this paper, we propose an invisible blind watermarking scheme for the gray-level images. The cover image is decomposed using the Discrete Wavelet Transform with Biorthogonal wavelet filters and the watermark is embedded into significant coefficients of the transformation. The Biorthogonal wavelet is used because it has the property of perfect reconstruction and smoothness. The proposed scheme embeds a monochrome watermark into a gray-level image. In the embedding process, we use a localized decomposition, means that the second level decomposition is performed on the detail sub-band resulting from the first level decomposition. The image is decomposed into first level and for second level decomposition we consider Horizontal, vertical and diagonal subband separately. From this second level decomposition we take the respective Horizontal, vertical and diagonal coefficients for embedding the watermark. The robustness of the scheme is tested by considering the different types of image processing attacks like blurring, cropping, sharpening, Gaussian filtering and salt and pepper noise effect. The experimental result shows that the embedding watermark into diagonal subband coefficients is robust against different types of attacks.
This document summarizes a research article that presents a novel robust reversible watermarking method for copyright protection of images. The proposed method, called wavelet-domain statistical quantity histogram shifting and clustering (WSQH-SC), aims to improve upon existing reversible watermarking methods by addressing issues with reversibility, robustness, and invisibility.
WSQH-SC consists of four main modules: 1) property inspired pixel adjustment to avoid pixel overflow/underflow during embedding, 2) construction of statistical quantity histograms in the wavelet domain for embedding, 3) an enhanced pixel-wise masking technique to optimize watermark strength based on human visual perception, and 4) watermark extraction based on k-means clustering. The authors
SVD and Lifting Wavelet Based Fragile Image WatermarkingIDES Editor
Creation and distribution of digital multimedia, by
copying and editing, has both advantages and disadvantages.
These can facilitate unauthorized usage, misappropriation,
and misrepresentation. Therefore the content providers have
become more concerned. So image watermarking, which is the
act of embedding another signal (the watermark) into an
image, have been proposed for copyright protection and
authentication by robust and fragile methodologies
respectively. So for various applications, there are different
watermarking algorithms, but here this work is mainly for
authentication as the watermarking scheme is fragile. The
discrete lifting based wavelet transform and the singular value
decomposition (SVD) algorithms are used in this scheme. The
former for the carrier or the image to be authenticated, while
the latter for the logo which is embedded in the carrier. The
distribution of SVD compressed pixel values are distributed in
the wavelet domain based on a pseudorandom sequence. This
has been observed to test the integrity of the stego image and
its authentication. Moreover due to usage of lifting based
wavelet transform and SVD the hardware implementability is
better.
A new efficient fpga design of residue to-binary converterVLSICS Design
In this paper, we introduce a new 6n bit Dynamic Range Moduli set { 22n, 22n + 1, 22n – 1} and then present
its associated novel reverse converters. First, we simplify the Chinese Remainder Theorem in order to
obtain an efficient reverse converter which is completely memory less and adder based. Next, we present a
low complexity implementation that does not require the explicit use of modulo operation in the conversion
process and we demonstrate that theoretically speaking it outperforms state of the art equivalent reverse
converters. We also implemented the proposed converter and the best equivalent state of the art reverse
converters on Xilinx Spartan 6 FPGA. The experimental results confirmed the theoretical evaluation. The
FPGA synthesis results indicate that, on the average, our proposal is about 52.35% and 43.94% better in
terms of conversion time and hardware resources respectively.
This document summarizes the performance of a switched multistage vector quantizer (SWMSVQ) technique for coding narrowband speech signals. SWMSVQ is a hybrid of switch vector quantization and multistage vector quantization. The spectral distortion, computational complexity, and memory requirements of SWMSVQ using hard and soft decision schemes are compared to other techniques like split vector quantization, multistage vector quantization, switched split vector quantization, and multi switched split vector quantization. The results show that SWMSVQ using a soft decision scheme has lower spectral distortion, complexity, and memory usage than the other techniques except for multi switched split vector quantization using a hard decision scheme, which has even lower performance.
In this paper, we analyze and compare the performance of fusion methods based on four different
transforms: i) wavelet transform, ii) curvelet transform, iii) contourlet transform and iv) nonsubsampled
contourlet transform. Fusion framework and scheme are explained in detail, and two different sets of
images are used in our experiments. Furthermore, eight different performancemetrics are adopted to
comparatively analyze the fusion results. The comparison results show that the nonsubsampled contourlet
transform method performs better than the other three methods, both spatially and spectrally. We also
observed from additional experiments that the decomposition level of 3 offered the best fusion performance,
anddecomposition levels beyond level-3 did not significantly improve the fusion results.
IJRET : International Journal of Research in Engineering and Technology is an international peer reviewed, online journal published by eSAT Publishing House for the enhancement of research in various disciplines of Engineering and Technology. The aim and scope of the journal is to provide an academic medium and an important reference for the advancement and dissemination of research results that support high-level learning, teaching and research in the fields of Engineering and Technology. We bring together Scientists, Academician, Field Engineers, Scholars and Students of related fields of Engineering and Technology
Digital watermarking with a new algorithmeSAT Journals
Abstract Everyday millions of data need to transmit through a distinct channel for various purposes; as a result there is a certain chance of third person interruption on that data. In this regards digital watermarking is one of the best solution. This paper proposes a new embedding algorithm (NEA) of digital watermarking. The algorithm is performed for digital image as data. The performance is compared for NEA and well established Cox's modified embedding algorithm. The watermarking is based on discrete wavelet transforms (DWT) and discrete cosine transforms (DCT). The acceptance of the new algorithm is measured by the two requirements of digital watermarking. One is imperceptibility of the watermarked image, measured by peak signal to noise ratio (PSNR) in dB; another one is robustness of the mark image, measured by correlation of original mark image and recovering mark image. Here a 512×512 gray scale "Lena" and "Cameraman's" image is taken as host images, and a 128×128 gray scale image is taken as mark image for 2 level of DWT. The simulation results for different attacking conditions such as salt and pepper attack, additive white Gaussian noise (AWGN) attack, jpg compression attack, gamma attack, histogram attack, cropping attack, sharpening attack etc. After different attacks the changing tendency PSNR for both algorithms are similar. But the mean square error (MSE) value of NEA is always less than Cox’s modified algorithm, which means that after embedding the changes of the host image property lower for NEA than Cox’s algorithm. From the simulation results it can be said that NEA will be a substitute of modified Cox’s algorithm with better performance. Keywords: Digital watermark, DWT, DCT, Cox’s modified algorithm, Lena image, Cameraman image, AWGN, JPG, salt and pepper attack, PSNR, correlation, MSE.
A Novel Algorithm for Watermarking and Image Encryption cscpconf
Digital watermarking is a method of copyright protection of audio, images, video and text. We
propose a new robust watermarking technique based on contourlet transform and singular value
decomposition. The paper also proposes a novel encryption algorithm to store a signed double
matrix as an RGB image. The entropy of the watermarked image and correlation coefficient of
extracted watermark image is very close to ideal values, proving the correctness of proposed
algorithm. Also experimental results show resiliency of the scheme against large blurring attack
like mean and gaussian filtering, linear filtering (high pass and low pass filtering) , non-linear
filtering (median filtering), addition of a constant offset to the pixel values and local exchange of pixels .Thus proving the security, effectiveness and robustness of the proposed watermarking algorithm.
IRJET- Digital Watermarking using Integration of DWT & SVD TechniquesIRJET Journal
This document describes a digital image watermarking technique that uses a combination of discrete wavelet transform (DWT) and singular value decomposition (SVD). The proposed algorithm embeds a watermark image into the low-low (LL) sub-band of a cover image after applying 2-level DWT and SVD. For embedding, the singular values of the watermark and cover image LL sub-band are added together. Extraction involves applying DWT and SVD to extract the watermark from the watermarked image. The algorithm is tested on standard test images and is shown to be robust against various attacks like JPEG compression, median filtering, and rotation.
Optimal Network Locality in Distributed ServicesGwendal Simon
In age of cloud computing, any equipment can become server, e.g. set-top-boxes or access routers. For service providers, a challenge consists in accurately making use of these servers. We address the problem of locating a large service (or content) into these Internet edges so that the delivery to clients is efficient from a networking point of view.
Simple and Fast Implementation of Segmented Matrix Algorithm for Haar DWT on ...IDES Editor
Haar discrete wavelet transform (DWT), the
simplest among all DWTs, has diverse applications in signal
and image processing fields. A traditional approach for 2D
Haar DWT is 1D row operation followed by and 1D column
operation. In 2002, Chen and Liao presented a fast algorithm
for 2D Haar DWT based on segmented matrix. However, this
method is infeasible for its high computational requirements
for processing large sized images. In this paper, we have
implemented the segmented matrix algorithm on a low cost
NVIDIA’s GPU to achieve speedup in computation. The
efficiency of our GPU based implementation is measured and
compared with CPU based algorithms. Our experimental
results show performance improvement over a factor of 28.5
compared with Chen and Liao’s CPU based segmented matrix
algorithm and a factor of 8 compared to MATLAB’s wavelet
function for an image of size 2560×2560.
This document presents a generalized discrete cosine transform (DCT) decimation scheme for DCT-domain spatial downscaling to improve visual quality. It proposes performing two-fold decimation on flexible-sized subframes larger than 8x8 blocks to reduce aliasing artifacts compared to pixel-domain downscaling schemes. Sparse matrix representations are derived to reduce the computation cost of the proposed DCT decimation method. Experimental results show the proposed approach achieves better visual quality than existing schemes while computational complexity increases but can be optimized by applying larger subframe sizes only to high activity regions.
The peer-reviewed International Journal of Engineering Inventions (IJEI) is started with a mission to encourage contribution to research in Science and Technology. Encourage and motivate researchers in challenging areas of Sciences and Technology.
Distributed Spatial Modulation based Cooperative Diversity Schemeijwmn
: In this paper, a distributed spatial modulation based cooperative diversity scheme for relay
wireless networks is proposed. Where, the space-time block code is exploited to integrate with distributed
spatial modulation. Therefore, the interested transmission scheme achieves high diversity gain. By using
Monte-Carlo simulation based on computer, we showed that our proposed transmission scheme outperforms
state-of-the-art cooperative relaying schemes in terms bit error rate (BER) performance.
The document summarizes Oscar Gonzalez's PhD thesis defense on interference alignment in MIMO networks. It discusses the feasibility and transceiver design problems for interference alignment. For feasibility, it presents existing results showing conclusive answers for some symmetric scenarios, but results for asymmetric scenarios have remained elusive. Gonzalez contributes a polynomial time algorithm for solving feasibility by mapping it to a maximum flow problem. He also develops an algebraic approach using projective spaces and Grassmannians to distinguish feasible and infeasible interference alignment scenarios.
Performance Evaluation of Quarter Shift Dual Tree Complex Wavelet Transform B...IJECEIAES
In this paper, multifocus image fusion using quarter shift dual tree complex wavelet transform is proposed. Multifocus image fusion is a technique that combines the partially focused regions of multiple images of the same scene into a fully focused fused image. Directional selectivity and shift invariance properties are essential to produce a high quality fused image. However conventional wavelet based fusion algorithms introduce the ringing artifacts into fused image due to lack of shift invariance and poor directionality. The quarter shift dual tree complex wavelet transform has proven to be an effective multi-resolution transform for image fusion with its directional and shift invariant properties. Experimentation with this transform led to the conclusion that the proposed method not only produce sharp details (focused regions) in fused image due to its good directionality but also removes artifacts with its shift invariance in order to get high quality fused image. Proposed method performance is compared with traditional fusion methods in terms of objective measures.
IJRET : International Journal of Research in Engineering and Technology is an international peer reviewed, online journal published by eSAT Publishing House for the enhancement of research in various disciplines of Engineering and Technology. The aim and scope of the journal is to provide an academic medium and an important reference for the advancement and dissemination of research results that support high-level learning, teaching and research in the fields of Engineering and Technology. We bring together Scientists, Academician, Field Engineers, Scholars and Students of related fields of Engineering and Technology
1) The document proposes a non-cooperative resource allocation game algorithm using Adaptive Modulation and Coding (AMC) schemes in multi-cell OFDMA systems.
2) The algorithm aims to maximize utility while reducing co-channel interference and improving power efficiency through AMC.
3) Simulation results show the proposed algorithm achieves maximum capacity within AMC levels and reduces system power compared to an algorithm without AMC.
Digital Watermarking Of Medical(DICOM) ImagesPrashant Singh
This project addresses authenticity and integrity of medical images using watermarking. Watermarking can be seen as an additional tool for security measures. As the medical tradition is very strict with the quality of biomedical images, the watermarking method must be reversible or if not, region of Interest (ROI) needs to be defined and left intact. Watermarking should also serve as an integrity control and should be able to authenticate the medical image.
Determining the Efficient Subband Coefficients of Biorthogonal Wavelet for Gr...CSCJournals
In this paper, we propose an invisible blind watermarking scheme for the gray-level images. The cover image is decomposed using the Discrete Wavelet Transform with Biorthogonal wavelet filters and the watermark is embedded into significant coefficients of the transformation. The Biorthogonal wavelet is used because it has the property of perfect reconstruction and smoothness. The proposed scheme embeds a monochrome watermark into a gray-level image. In the embedding process, we use a localized decomposition, means that the second level decomposition is performed on the detail sub-band resulting from the first level decomposition. The image is decomposed into first level and for second level decomposition we consider Horizontal, vertical and diagonal subband separately. From this second level decomposition we take the respective Horizontal, vertical and diagonal coefficients for embedding the watermark. The robustness of the scheme is tested by considering the different types of image processing attacks like blurring, cropping, sharpening, Gaussian filtering and salt and pepper noise effect. The experimental result shows that the embedding watermark into diagonal subband coefficients is robust against different types of attacks.
This document summarizes a research article that presents a novel robust reversible watermarking method for copyright protection of images. The proposed method, called wavelet-domain statistical quantity histogram shifting and clustering (WSQH-SC), aims to improve upon existing reversible watermarking methods by addressing issues with reversibility, robustness, and invisibility.
WSQH-SC consists of four main modules: 1) property inspired pixel adjustment to avoid pixel overflow/underflow during embedding, 2) construction of statistical quantity histograms in the wavelet domain for embedding, 3) an enhanced pixel-wise masking technique to optimize watermark strength based on human visual perception, and 4) watermark extraction based on k-means clustering. The authors
SVD and Lifting Wavelet Based Fragile Image WatermarkingIDES Editor
Creation and distribution of digital multimedia, by
copying and editing, has both advantages and disadvantages.
These can facilitate unauthorized usage, misappropriation,
and misrepresentation. Therefore the content providers have
become more concerned. So image watermarking, which is the
act of embedding another signal (the watermark) into an
image, have been proposed for copyright protection and
authentication by robust and fragile methodologies
respectively. So for various applications, there are different
watermarking algorithms, but here this work is mainly for
authentication as the watermarking scheme is fragile. The
discrete lifting based wavelet transform and the singular value
decomposition (SVD) algorithms are used in this scheme. The
former for the carrier or the image to be authenticated, while
the latter for the logo which is embedded in the carrier. The
distribution of SVD compressed pixel values are distributed in
the wavelet domain based on a pseudorandom sequence. This
has been observed to test the integrity of the stego image and
its authentication. Moreover due to usage of lifting based
wavelet transform and SVD the hardware implementability is
better.
A new efficient fpga design of residue to-binary converterVLSICS Design
In this paper, we introduce a new 6n bit Dynamic Range Moduli set { 22n, 22n + 1, 22n – 1} and then present
its associated novel reverse converters. First, we simplify the Chinese Remainder Theorem in order to
obtain an efficient reverse converter which is completely memory less and adder based. Next, we present a
low complexity implementation that does not require the explicit use of modulo operation in the conversion
process and we demonstrate that theoretically speaking it outperforms state of the art equivalent reverse
converters. We also implemented the proposed converter and the best equivalent state of the art reverse
converters on Xilinx Spartan 6 FPGA. The experimental results confirmed the theoretical evaluation. The
FPGA synthesis results indicate that, on the average, our proposal is about 52.35% and 43.94% better in
terms of conversion time and hardware resources respectively.
This document summarizes the performance of a switched multistage vector quantizer (SWMSVQ) technique for coding narrowband speech signals. SWMSVQ is a hybrid of switch vector quantization and multistage vector quantization. The spectral distortion, computational complexity, and memory requirements of SWMSVQ using hard and soft decision schemes are compared to other techniques like split vector quantization, multistage vector quantization, switched split vector quantization, and multi switched split vector quantization. The results show that SWMSVQ using a soft decision scheme has lower spectral distortion, complexity, and memory usage than the other techniques except for multi switched split vector quantization using a hard decision scheme, which has even lower performance.
In this paper, we analyze and compare the performance of fusion methods based on four different
transforms: i) wavelet transform, ii) curvelet transform, iii) contourlet transform and iv) nonsubsampled
contourlet transform. Fusion framework and scheme are explained in detail, and two different sets of
images are used in our experiments. Furthermore, eight different performancemetrics are adopted to
comparatively analyze the fusion results. The comparison results show that the nonsubsampled contourlet
transform method performs better than the other three methods, both spatially and spectrally. We also
observed from additional experiments that the decomposition level of 3 offered the best fusion performance,
anddecomposition levels beyond level-3 did not significantly improve the fusion results.
IJRET : International Journal of Research in Engineering and Technology is an international peer reviewed, online journal published by eSAT Publishing House for the enhancement of research in various disciplines of Engineering and Technology. The aim and scope of the journal is to provide an academic medium and an important reference for the advancement and dissemination of research results that support high-level learning, teaching and research in the fields of Engineering and Technology. We bring together Scientists, Academician, Field Engineers, Scholars and Students of related fields of Engineering and Technology
Digital watermarking with a new algorithmeSAT Journals
Abstract Everyday millions of data need to transmit through a distinct channel for various purposes; as a result there is a certain chance of third person interruption on that data. In this regards digital watermarking is one of the best solution. This paper proposes a new embedding algorithm (NEA) of digital watermarking. The algorithm is performed for digital image as data. The performance is compared for NEA and well established Cox's modified embedding algorithm. The watermarking is based on discrete wavelet transforms (DWT) and discrete cosine transforms (DCT). The acceptance of the new algorithm is measured by the two requirements of digital watermarking. One is imperceptibility of the watermarked image, measured by peak signal to noise ratio (PSNR) in dB; another one is robustness of the mark image, measured by correlation of original mark image and recovering mark image. Here a 512×512 gray scale "Lena" and "Cameraman's" image is taken as host images, and a 128×128 gray scale image is taken as mark image for 2 level of DWT. The simulation results for different attacking conditions such as salt and pepper attack, additive white Gaussian noise (AWGN) attack, jpg compression attack, gamma attack, histogram attack, cropping attack, sharpening attack etc. After different attacks the changing tendency PSNR for both algorithms are similar. But the mean square error (MSE) value of NEA is always less than Cox’s modified algorithm, which means that after embedding the changes of the host image property lower for NEA than Cox’s algorithm. From the simulation results it can be said that NEA will be a substitute of modified Cox’s algorithm with better performance. Keywords: Digital watermark, DWT, DCT, Cox’s modified algorithm, Lena image, Cameraman image, AWGN, JPG, salt and pepper attack, PSNR, correlation, MSE.
A Novel Algorithm for Watermarking and Image Encryption cscpconf
Digital watermarking is a method of copyright protection of audio, images, video and text. We
propose a new robust watermarking technique based on contourlet transform and singular value
decomposition. The paper also proposes a novel encryption algorithm to store a signed double
matrix as an RGB image. The entropy of the watermarked image and correlation coefficient of
extracted watermark image is very close to ideal values, proving the correctness of proposed
algorithm. Also experimental results show resiliency of the scheme against large blurring attack
like mean and gaussian filtering, linear filtering (high pass and low pass filtering) , non-linear
filtering (median filtering), addition of a constant offset to the pixel values and local exchange of pixels .Thus proving the security, effectiveness and robustness of the proposed watermarking algorithm.
IRJET- Digital Watermarking using Integration of DWT & SVD TechniquesIRJET Journal
This document describes a digital image watermarking technique that uses a combination of discrete wavelet transform (DWT) and singular value decomposition (SVD). The proposed algorithm embeds a watermark image into the low-low (LL) sub-band of a cover image after applying 2-level DWT and SVD. For embedding, the singular values of the watermark and cover image LL sub-band are added together. Extraction involves applying DWT and SVD to extract the watermark from the watermarked image. The algorithm is tested on standard test images and is shown to be robust against various attacks like JPEG compression, median filtering, and rotation.
Optimal Network Locality in Distributed ServicesGwendal Simon
In age of cloud computing, any equipment can become server, e.g. set-top-boxes or access routers. For service providers, a challenge consists in accurately making use of these servers. We address the problem of locating a large service (or content) into these Internet edges so that the delivery to clients is efficient from a networking point of view.
Simple and Fast Implementation of Segmented Matrix Algorithm for Haar DWT on ...IDES Editor
Haar discrete wavelet transform (DWT), the
simplest among all DWTs, has diverse applications in signal
and image processing fields. A traditional approach for 2D
Haar DWT is 1D row operation followed by and 1D column
operation. In 2002, Chen and Liao presented a fast algorithm
for 2D Haar DWT based on segmented matrix. However, this
method is infeasible for its high computational requirements
for processing large sized images. In this paper, we have
implemented the segmented matrix algorithm on a low cost
NVIDIA’s GPU to achieve speedup in computation. The
efficiency of our GPU based implementation is measured and
compared with CPU based algorithms. Our experimental
results show performance improvement over a factor of 28.5
compared with Chen and Liao’s CPU based segmented matrix
algorithm and a factor of 8 compared to MATLAB’s wavelet
function for an image of size 2560×2560.
This document presents a generalized discrete cosine transform (DCT) decimation scheme for DCT-domain spatial downscaling to improve visual quality. It proposes performing two-fold decimation on flexible-sized subframes larger than 8x8 blocks to reduce aliasing artifacts compared to pixel-domain downscaling schemes. Sparse matrix representations are derived to reduce the computation cost of the proposed DCT decimation method. Experimental results show the proposed approach achieves better visual quality than existing schemes while computational complexity increases but can be optimized by applying larger subframe sizes only to high activity regions.
The peer-reviewed International Journal of Engineering Inventions (IJEI) is started with a mission to encourage contribution to research in Science and Technology. Encourage and motivate researchers in challenging areas of Sciences and Technology.
Distributed Spatial Modulation based Cooperative Diversity Schemeijwmn
: In this paper, a distributed spatial modulation based cooperative diversity scheme for relay
wireless networks is proposed. Where, the space-time block code is exploited to integrate with distributed
spatial modulation. Therefore, the interested transmission scheme achieves high diversity gain. By using
Monte-Carlo simulation based on computer, we showed that our proposed transmission scheme outperforms
state-of-the-art cooperative relaying schemes in terms bit error rate (BER) performance.
The document summarizes Oscar Gonzalez's PhD thesis defense on interference alignment in MIMO networks. It discusses the feasibility and transceiver design problems for interference alignment. For feasibility, it presents existing results showing conclusive answers for some symmetric scenarios, but results for asymmetric scenarios have remained elusive. Gonzalez contributes a polynomial time algorithm for solving feasibility by mapping it to a maximum flow problem. He also develops an algebraic approach using projective spaces and Grassmannians to distinguish feasible and infeasible interference alignment scenarios.
Performance Evaluation of Quarter Shift Dual Tree Complex Wavelet Transform B...IJECEIAES
In this paper, multifocus image fusion using quarter shift dual tree complex wavelet transform is proposed. Multifocus image fusion is a technique that combines the partially focused regions of multiple images of the same scene into a fully focused fused image. Directional selectivity and shift invariance properties are essential to produce a high quality fused image. However conventional wavelet based fusion algorithms introduce the ringing artifacts into fused image due to lack of shift invariance and poor directionality. The quarter shift dual tree complex wavelet transform has proven to be an effective multi-resolution transform for image fusion with its directional and shift invariant properties. Experimentation with this transform led to the conclusion that the proposed method not only produce sharp details (focused regions) in fused image due to its good directionality but also removes artifacts with its shift invariance in order to get high quality fused image. Proposed method performance is compared with traditional fusion methods in terms of objective measures.
IJRET : International Journal of Research in Engineering and Technology is an international peer reviewed, online journal published by eSAT Publishing House for the enhancement of research in various disciplines of Engineering and Technology. The aim and scope of the journal is to provide an academic medium and an important reference for the advancement and dissemination of research results that support high-level learning, teaching and research in the fields of Engineering and Technology. We bring together Scientists, Academician, Field Engineers, Scholars and Students of related fields of Engineering and Technology
1) The document proposes a non-cooperative resource allocation game algorithm using Adaptive Modulation and Coding (AMC) schemes in multi-cell OFDMA systems.
2) The algorithm aims to maximize utility while reducing co-channel interference and improving power efficiency through AMC.
3) Simulation results show the proposed algorithm achieves maximum capacity within AMC levels and reduces system power compared to an algorithm without AMC.
Digital Watermarking Of Medical(DICOM) ImagesPrashant Singh
This project addresses authenticity and integrity of medical images using watermarking. Watermarking can be seen as an additional tool for security measures. As the medical tradition is very strict with the quality of biomedical images, the watermarking method must be reversible or if not, region of Interest (ROI) needs to be defined and left intact. Watermarking should also serve as an integrity control and should be able to authenticate the medical image.
The document discusses code obfuscation techniques used to protect software from piracy and malware analysis, and methods for deobfuscation. It covers common obfuscation techniques like code virtualization, code morphing, and opaque predicates. It then introduces the Ariadne engine, which can deobfuscate virtualized and morphed code using its emulator-based AIR Wave Deobfuscation Technology to calculate variable values and determine code flow. Test results showed Ariadne can effectively deobfuscate code protected by many obfuscators and protectors.
Digital watermarking involves embedding a hidden signal or watermark into digital content like images, audio or video. It can be used for copyright protection, content authentication and metadata tagging. There are different types of watermarking including robust, fragile, visible, invisible, public and private watermarking. Common techniques include LSB watermarking, color separation and bit stream watermarking. Digital watermarking faces attacks from techniques like Stirmark and mosaic attacks but continues to be an effective method for protecting digital multimedia content and verifying its authenticity.
Digital watermarking allows users to embed special patterns or data into digital content like images, audio, and video without changing the perceptual quality. Watermarking helps protect copyright ownership by embedding information directly into the media itself through small changes to the content data. Watermarks can be invisible, inseparable from the content after processing, and do not change the file size. Watermarks are classified based on human perception (visible or invisible), robustness (fragile, semi-fragile, or robust), and the type of document (text, image, audio, or video). Frequency domain techniques like discrete cosine transformation are commonly used to embed watermarks in images and videos.
Digital watermarking is a technique for hiding copyright information in digital content such as images, audio and video. A digital watermark is imperceptibly embedded in the digital content and can be extracted or detected to prove ownership. There are two main types of watermarks - visible watermarks that can be seen and invisible watermarks that cannot be seen by the human eye. Watermarking techniques include spatial domain and frequency domain methods. The Fast Hadamard Transform is commonly used for digital image watermarking as it allows for faster processing times and robust watermarks. The watermarking process involves embedding, attacks on the watermarked content, and detection of the watermark.
DWT-DCT-SVD Based Semi Blind Image Watermarking Using Middle Frequency BandIOSR Journals
This document summarizes a research paper that proposes a semi-blind image watermarking technique using discrete wavelet transform (DWT), discrete cosine transform (DCT), and singular value decomposition (SVD). The technique embeds a watermark in the middle frequency band of the DWT domain of a host image. It modifies the singular values of the DCT coefficients of the middle frequency band using singular values of the DCT transformed watermark. The watermark can then be extracted from the watermarked image using inverse processes. The technique was tested on various attacks and showed robustness, with correlation values between the extracted and original watermarks ranging from 0.5308 to 0.9665 and PSNR values indicating impercept
SVD Based Robust Digital Watermarking For Still Images Using Wavelet Transform cscpconf
This paper aims at developing a hybrid image watermarking algorithm which satisfies both
imperceptibility and robustness requirements. In order to achieve our objectives we have used
singular values of Wavelet Transformation’s HL and LH sub bands to embed watermark.
Further to increase and control the strength of the watermark, we use a scale factor. An optimal
watermark embedding method is developed to achieve minimum watermarking distortion. A
secret embedding key is designed to securely embed the fragile watermarks so that the new
method is robust to counterfeiting, even when the malicious attackers are fully aware of the
watermark embedding algorithm. Experimental results are provided in terms of Peak signal to
noise ratio (PSNR), Normalized cross correlation (NCC) and gain factor to demonstrate the
effectiveness of the proposed algorithm. Image operations such as JPEG compression from
malicious image attacks and, thus, can be used for semi-fragile watermarking
Hybrid Approach for Robust Digital Video WatermarkingIJSRD
With the growing popularity of internet and digital media, digital watermarking techniques have been developed to protect the copyright of multimedia objects such as text, audio, video, etc. So, we have proposed a hybrid video watermarking technique which takes the advantages of different transforms like DWT, DCT, SVD and Arnold Transform, which enhances more security and provides robustness to the watermark. In this paper method, video is divided into several groups of frames, and one of the frames is selected where watermark will be embedded. Before embedding watermark in a selected frame it will be pre-processed with Arnold Transform which will provide security to it. The selected plane of video frame are decomposed using DWT and high frequency band HH, middle frequency bands LH, HL are transformed with DCT. The DCT coefficients are SVD transformed which are embedded with corresponding transformed coefficients of watermarks along with Arnold Transform. The embedded watermark is extracted with inverse process of embedding. The proposed algorithm is tested with various video sequences using MATLAB 2013a. The distortion quality of original image and watermark is controlled by the Peak Signal to Noise Ratio, Signal to Noise Ratio and Mean square error of the watermarked frame with original frame.
A highly robust and secure image watermarking based on classification and vis...AliFatahbeygi
In this paper a new robust image watermarking algorithm based on blocks classification and visual cryp tography (VC) is presented. First the original image is decomposed into non-overlapping blocks. Then, we use canny edge detection and the support vector machine (SVM) classification method to categorize these blocks into smooth and non-smooth classes. The VC technique is used to generate two image shares: A
master share that is constructed according to the block classification results and an owner share generated by using the master share together with a binary watermark. To verify the ownership of the image the watermark can be retrieved by stacking the master share and the owner share. By skipping blocks which are not robust against attacks, the robustness of our proposed watermarking method is significantly improved. Our method is completely imperceptible because the watermark pattern is concealed without modifying the original host image.
Digital watermarking has been proposed as a solution to the problem of copyright protection of
multimedia documents in networked environments. There are two important issues that watermarking
algorithms need to address. First, watermarking schemes are required to provide trustworthy evidence for
protecting rightful ownership. Second, good watermarking schemes should satisfy the requirement of
robustness and resist distortions due to common image manipulations (such as filtering, compression,
etc.). In this paper, a watermarking algorithm is proposed based on the Discrete Wavelet Transform
(DWT), Fractional Fourier Transform (FrFT) and Singular value decomposition (SVD). Analysis and
experimental results show that the proposed watermarking method performs well in both security and
robustness.
Improved Quality of Watermark Image by using Integrated SVD with Discrete Wav...IRJET Journal
This document proposes a new digital image watermarking technique that integrates discrete wavelet transform (DWT) with differential evolution based singular value decomposition (SVD) to improve imperceptibility and robustness. Existing watermarking methods are susceptible to multiple attacks on watermarked images. The proposed method applies DWT to decompose the image into sub-bands, then uses differential evolution optimized SVD to embed the watermark in singular values. Experimental results show the technique enhances visual quality and improves metrics like peak signal-to-noise ratio, structural similarity index, and root mean square error compared to existing approaches, indicating greater resistance to attacks on watermarked images.
This document summarizes a research paper that proposes a new digital image watermarking technique using discrete wavelet transform and singular value decomposition (DWT-SVD). The technique embeds a watermark in the high frequency subbands of an image after applying DWT and SVD. Experimental results show the watermarked images have high quality as measured by PSNR. The extracted watermarks are robust to common image distortions like noise, filtering, and cropping as measured by normalized cross correlation. A comparison shows the proposed technique provides better image quality and watermark extraction than a previous DWT-based method. The technique could provide copyright protection for digital images.
This document presents a dual band video watermarking technique using 2D discrete wavelet transform (DWT) and 2-level singular value decomposition (SVD). A video is divided into frames and a watermark image is embedded into each frame. First, 2D DWT is applied to each frame, decomposing it into subbands. SVD is then applied to two subbands, converting them into matrices. The watermark image is embedded into the matrices. SVD is applied again and the matrices are multiplied with the original components for security. Experiments show the technique provides imperceptibility with a mean PSNR of 75.23dB and robustness against various attacks, with correlation values above 0.83.
A DWT, DCT AND SVD BASED WATERMARKING TECHNIQUE TO PROTECT THE IMAGE PIRACYijmpict
With the rapid development of information technology and multimedia, the use of digital data is increasing day by day. So it becomes very essential to protect multimedia information from piracy and also it is challenging. A great deal of Copyright owners is worried about protecting any kind of illegal repetition of their information. Hence, facing all these kinds of problems development of the techniques is very important. Digital watermarking considered as a solution to prevent the multimedia data. In this paper, an idea of watermarking is proposed and implemented. In proposed watermarking method, the original image is rearranged using zigzag sequence and DWT is applied on rearranged image. Then DCT and SVD are applied on all high bands LH, HL and HH. Watermark is then embedded by modifying the singular values of these bands. Extraction of watermark is performed by the inversion of watermark embedding process. For choosing of these three bands it gives facility of mid-band and pure high band that ensures good imperceptibility and more robustness against different kinds of attacks.
A DWT, DCT AND SVD BASED WATERMARKING TECHNIQUE TO PROTECT THE IMAGE PIRACYijmpict
With the rapid development of information technology and multimedia, the use of digital data is increasing
day by day. So it becomes very essential to protect multimedia information from piracy and also it is
challenging. A great deal of Copyright owners is worried about protecting any kind of illegal repetition of
their information. Hence, facing all these kinds of problems development of the techniques is very
important. Digital watermarking considered as a solution to prevent the multimedia data.
In this paper, an idea of watermarking is proposed and implemented. In proposed watermarking method,
the original image is rearranged using zigzag sequence and DWT is applied on rearranged image. Then
DCT and SVD are applied on all high bands LH, HL and HH. Watermark is then embedded by modifying
the singular values of these bands. Extraction of watermark is performed by the inversion of watermark
embedding process. For choosing of these three bands it gives facility of mid-band and pure high band that
ensures good imperceptibility and more robustness against different kinds of attacks.
A Wavelet Based Hybrid SVD Algorithm for Digital Image Watermarkingsipij
In this paper we propose a hybrid image watermarking algorithm which satisfies both imperceptibility and robustness requirements. Our proposed work provide an optimum solution by using singular values of Wavelet Transformation’s HL and LH sub bands to embed watermark. Further to increase and control the strength of the watermark, we use a scale factor. An optimal watermark embedding method is developed to achieve minimum watermarking distortion. A secret embedding key is designed to securely embed the fragile watermarks so that the new method is robust to counterfeiting, even when the malicious attackers are fully aware of the watermark embedding algorithm. Experimental results are provided in terms of peak signal to noise ratio (PSNR), normalized cross correlation (NCC) and gain factor to demonstrate the effectiveness of the proposed algorithm. Image operations such as JPEG compression from malicious image attacks and, thus, can be used for semi-fragile watermarking.
This document summarizes a research paper that proposes a content-based hybrid DWT-DCT watermarking technique for image authentication in color images. The technique embeds statistical features extracted from the host image as the watermark. Four different statistical features are used to generate the watermark - the Frobenius norm, mean, standard deviation, and combined mean and standard deviation of the host image blocks. The watermark is then embedded into the host image by applying both DWT and DCT transforms. During extraction, the same process is applied to extract the watermark for authentication. Experimental results show the technique is robust against various attacks like compression, noise, and filters.
IJRET : International Journal of Research in Engineering and Technology is an international peer reviewed, online journal published by eSAT Publishing House for the enhancement of research in various disciplines of Engineering and Technology. The aim and scope of the journal is to provide an academic medium and an important reference for the advancement and dissemination of research results that support high-level learning, teaching and research in the fields of Engineering and Technology. We bring together Scientists, Academician, Field Engineers, Scholars and Students of related fields of Engineering and Technology.
Comparative Analysis of DCT and DWT based novel methods for WatermarkingIRJET Journal
This document presents a comparative analysis of DCT and DWT based digital watermarking techniques. It proposes algorithms for embedding and extracting watermarks in the DCT and DWT domains. The DWT technique is shown to be better for watermarking as it is more suited to the human visual system. The analysis finds that DWT provides better imperceptibility and fidelity than DCT, especially at lower embedding factors. However, robustness decreases with lower embedding factors. An optimal embedding factor of 10 is identified as providing a good balance between all evaluation parameters for the watermarking techniques. In conclusion, DWT is determined to be a better overall technique compared to DCT for digital image watermarking applications.
IRJET-Comparative Analysis of DCT and DWT based novel methods for WatermarkingIRJET Journal
This document presents a comparative analysis of DCT and DWT based watermarking techniques. It proposes algorithms for embedding and extracting watermarks in the DCT and DWT domains. The DWT method embeds the watermark in the low-low frequency region and is shown to be more robust to attacks like noise addition and region tampering compared to the DCT method. Results demonstrate that DWT provides better imperceptibility and fidelity than DCT, especially at lower embedding strengths. However, robustness decreases with lower strengths. An embedding strength of 10 is identified as a good balance for all parameters. In conclusion, DWT is found to be a better technique than DCT for digital image watermarking applications.
IOSR Journal of Electronics and Communication Engineering(IOSR-JECE) is an open access international journal that provides rapid publication (within a month) of articles in all areas of electronics and communication engineering and its applications. The journal welcomes publications of high quality papers on theoretical developments and practical applications in electronics and communication engineering. Original research papers, state-of-the-art reviews, and high quality technical notes are invited for publications.
ROBUST IMAGE WATERMARKING METHOD USING WAVELET TRANSFORMsipij
In this paper a robust watermarking method operating in the wavelet domain for grayscale digital imagesis developed. The method first acomputes the differences between the watermark and the HH1 sub-band ofthe cover image values and then embed these differences in one of the frequency sub-bands. The resultsshow that embedding the watermark in the LH1 sub-band gave the best results. The results were evaluatedusing the RMSE and the PSNR of both the original and the watermarked image. Although the watermarkwas recovered perfectly in the ideal case, the addition of Gaussian noise, or compression of the imageusing JPEG with quality less than 100 destroys the embedded watermark. Different experiments werecarried out to test the performance of the proposed method and good results were obtained.
Implementation of digital image watermarking techniques using dwt and dwt svd...eSAT Journals
computerized substance. Data took care of on web and mixed media system framework is in advanced structure. Computerized watermarking is only the innovation in which there is inserting of different data in advanced substance, which we need to shield from illicit replicating. Computerized picture watermarking is concealing data in any structure (content, picture, sound and video) in unique picture without corrupting its perceptual quality. On the off chance that of Discrete Wavelet Transform (DWT), deterioration of the first picture is completed to insert the watermark. Moreover, if there should arise an occurrence of cross breed system (DWT-SVD) firstly picture is decayed by and after that watermark is installed in solitary qualities acquired by application of Singular Value Decomposition (SVD). DWT and SVD are utilized in combination to enhance the nature of watermarking. We have the procedures which are looked at on the premise of Peak Signal to Noise Ratio (PSNR) esteem at various benefits of scaling component; high estimation of PSNR is coveted because it displays great intangibility of the strategy.
Implementation of digital image watermarking techniques using dwt and dwt svd...eSAT Journals
Abstract
These days, in every field there is gigantic utilization of computerized substance. Data took care of on web and mixed media system framework is in advanced structure. Computerized watermarking is only the innovation in which there is inserting of different data in advanced substance, which we need to shield from illicit replicating. Computerized picture watermarking is concealing data in any structure (content, picture, sound and video) in unique picture without corrupting its perceptual quality. On the off chance that of Discrete Wavelet Transform (DWT), deterioration of the first picture is completed to insert the watermark. Moreover, if there should arise an occurrence of cross breed system (DWT-SVD) firstly picture is decayed by and after that watermark is installed in solitary qualities acquired by application of Singular Value Decomposition (SVD). DWT and SVD are utilized in combination to enhance the nature of watermarking. We have the procedures which are looked at on the premise of Peak Signal to Noise Ratio (PSNR) esteem at various benefits of scaling component; high estimation of PSNR is coveted because it displays great intangibility of the strategy.
PERCEPTUAL COPYRIGHT PROTECTION USING MULTIRESOLUTION WAVELET-BASED WATERMARK...gerogepatton
In this paper, an efficiently DWT-based watermarking technique is proposed to embed signatures in images to attest the owner identification and discourage the unauthorized copying. This paper deals with a fuzzy inference filter to choose the larger entropy of coefficients to embed watermarks. Unlike most previous watermarking frameworks which embedded watermarks in the larger coefficients of inner coarser subbands, the proposed technique is based on utilizing a context model and fuzzy inference filter by embedding watermarks in the larger-entropy coefficients of coarser DWT subbands. The proposed approaches allow us to embed adaptive casting degree of watermarks for transparency and robustness to the general image-processing attacks such as smoothing, sharpening, and JPEG compression. The approach has no need the original host image to extract watermarks. Our schemes have been shown to provide very good results in both image transparency and robustness.
Similar to Robust Watermarking Using Hybrid Transform of DCT, Haar and Walsh and SVD (20)
A Novel Method for Prevention of Bandwidth Distributed Denial of Service AttacksIJERD Editor
Distributed Denial of Service (DDoS) Attacks became a massive threat to the Internet. Traditional
Architecture of internet is vulnerable to the attacks like DDoS. Attacker primarily acquire his army of Zombies,
then that army will be instructed by the Attacker that when to start an attack and on whom the attack should be
done. In this paper, different techniques which are used to perform DDoS Attacks, Tools that were used to
perform Attacks and Countermeasures in order to detect the attackers and eliminate the Bandwidth Distributed
Denial of Service attacks (B-DDoS) are reviewed. DDoS Attacks were done by using various Flooding
techniques which are used in DDoS attack.
The main purpose of this paper is to design an architecture which can reduce the Bandwidth
Distributed Denial of service Attack and make the victim site or server available for the normal users by
eliminating the zombie machines. Our Primary focus of this paper is to dispute how normal machines are
turning into zombies (Bots), how attack is been initiated, DDoS attack procedure and how an organization can
save their server from being a DDoS victim. In order to present this we implemented a simulated environment
with Cisco switches, Routers, Firewall, some virtual machines and some Attack tools to display a real DDoS
attack. By using Time scheduling, Resource Limiting, System log, Access Control List and some Modular
policy Framework we stopped the attack and identified the Attacker (Bot) machines
Hearing loss is one of the most common human impairments. It is estimated that by year 2015 more
than 700 million people will suffer mild deafness. Most can be helped by hearing aid devices depending on the
severity of their hearing loss. This paper describes the implementation and characterization details of a dual
channel transmitter front end (TFE) for digital hearing aid (DHA) applications that use novel micro
electromechanical- systems (MEMS) audio transducers and ultra-low power-scalable analog-to-digital
converters (ADCs), which enable a very-low form factor, energy-efficient implementation for next-generation
DHA. The contribution of the design is the implementation of the dual channel MEMS microphones and powerscalable
ADC system.
Influence of tensile behaviour of slab on the structural Behaviour of shear c...IJERD Editor
-A composite beam is composed of a steel beam and a slab connected by means of shear connectors
like studs installed on the top flange of the steel beam to form a structure behaving monolithically. This study
analyzes the effects of the tensile behavior of the slab on the structural behavior of the shear connection like slip
stiffness and maximum shear force in composite beams subjected to hogging moment. The results show that the
shear studs located in the crack-concentration zones due to large hogging moments sustain significantly smaller
shear force and slip stiffness than the other zones. Moreover, the reduction of the slip stiffness in the shear
connection appears also to be closely related to the change in the tensile strain of rebar according to the increase
of the load. Further experimental and analytical studies shall be conducted considering variables such as the
reinforcement ratio and the arrangement of shear connectors to achieve efficient design of the shear connection
in composite beams subjected to hogging moment.
Gold prospecting using Remote Sensing ‘A case study of Sudan’IJERD Editor
Gold has been extracted from northeast Africa for more than 5000 years, and this may be the first
place where the metal was extracted. The Arabian-Nubian Shield (ANS) is an exposure of Precambrian
crystalline rocks on the flanks of the Red Sea. The crystalline rocks are mostly Neoproterozoic in age. ANS
includes the nations of Israel, Jordan. Egypt, Saudi Arabia, Sudan, Eritrea, Ethiopia, Yemen, and Somalia.
Arabian Nubian Shield Consists of juvenile continental crest that formed between 900 550 Ma, when intra
oceanic arc welded together along ophiolite decorated arc. Primary Au mineralization probably developed in
association with the growth of intra oceanic arc and evolution of back arc. Multiple episodes of deformation
have obscured the primary metallogenic setting, but at least some of the deposits preserve evidence that they
originate as sea floor massive sulphide deposits.
The Red Sea Hills Region is a vast span of rugged, harsh and inhospitable sector of the Earth with
inimical moon-like terrain, nevertheless since ancient times it is famed to be an abode of gold and was a major
source of wealth for the Pharaohs of ancient Egypt. The Pharaohs old workings have been periodically
rediscovered through time. Recent endeavours by the Geological Research Authority of Sudan led to the
discovery of a score of occurrences with gold and massive sulphide mineralizations. In the nineties of the
previous century the Geological Research Authority of Sudan (GRAS) in cooperation with BRGM utilized
satellite data of Landsat TM using spectral ratio technique to map possible mineralized zones in the Red Sea
Hills of Sudan. The outcome of the study mapped a gossan type gold mineralization. Band ratio technique was
applied to Arbaat area and a signature of alteration zone was detected. The alteration zones are commonly
associated with mineralization. The alteration zones are commonly associated with mineralization. A filed check
confirmed the existence of stock work of gold bearing quartz in the alteration zone. Another type of gold
mineralization that was discovered using remote sensing is the gold associated with metachert in the Atmur
Desert.
Reducing Corrosion Rate by Welding DesignIJERD Editor
This document summarizes a study on reducing corrosion rates in steel through welding design. The researchers tested different welding groove designs (X, V, 1/2X, 1/2V) and preheating temperatures (400°C, 500°C, 600°C) on ferritic malleable iron samples. Testing found that X and V groove designs with 500°C and 600°C preheating had corrosion rates of 0.5-0.69% weight loss after 14 days, compared to 0.57-0.76% for 400°C preheating. Higher preheating reduced residual stresses which decreased corrosion. Residual stresses were 1.7 MPa for optimal X groove and 600°C
Router 1X3 – RTL Design and VerificationIJERD Editor
Routing is the process of moving a packet of data from source to destination and enables messages
to pass from one computer to another and eventually reach the target machine. A router is a networking device
that forwards data packets between computer networks. It is connected to two or more data lines from different
networks (as opposed to a network switch, which connects data lines from one single network). This paper,
mainly emphasizes upon the study of router device, it‟s top level architecture, and how various sub-modules of
router i.e. Register, FIFO, FSM and Synchronizer are synthesized, and simulated and finally connected to its top
module.
Active Power Exchange in Distributed Power-Flow Controller (DPFC) At Third Ha...IJERD Editor
This paper presents a component within the flexible ac-transmission system (FACTS) family, called
distributed power-flow controller (DPFC). The DPFC is derived from the unified power-flow controller (UPFC)
with an eliminated common dc link. The DPFC has the same control capabilities as the UPFC, which comprise
the adjustment of the line impedance, the transmission angle, and the bus voltage. The active power exchange
between the shunt and series converters, which is through the common dc link in the UPFC, is now through the
transmission lines at the third-harmonic frequency. DPFC multiple small-size single-phase converters which
reduces the cost of equipment, no voltage isolation between phases, increases redundancy and there by
reliability increases. The principle and analysis of the DPFC are presented in this paper and the corresponding
simulation results that are carried out on a scaled prototype are also shown.
Mitigation of Voltage Sag/Swell with Fuzzy Control Reduced Rating DVRIJERD Editor
Power quality has been an issue that is becoming increasingly pivotal in industrial electricity
consumers point of view in recent times. Modern industries employ Sensitive power electronic equipments,
control devices and non-linear loads as part of automated processes to increase energy efficiency and
productivity. Voltage disturbances are the most common power quality problem due to this the use of a large
numbers of sophisticated and sensitive electronic equipment in industrial systems is increased. This paper
discusses the design and simulation of dynamic voltage restorer for improvement of power quality and
reduce the harmonics distortion of sensitive loads. Power quality problem is occurring at non-standard
voltage, current and frequency. Electronic devices are very sensitive loads. In power system voltage sag,
swell, flicker and harmonics are some of the problem to the sensitive load. The compensation capability
of a DVR depends primarily on the maximum voltage injection ability and the amount of stored
energy available within the restorer. This device is connected in series with the distribution feeder at
medium voltage. A fuzzy logic control is used to produce the gate pulses for control circuit of DVR and the
circuit is simulated by using MATLAB/SIMULINK software.
Study on the Fused Deposition Modelling In Additive ManufacturingIJERD Editor
Additive manufacturing process, also popularly known as 3-D printing, is a process where a product
is created in a succession of layers. It is based on a novel materials incremental manufacturing philosophy.
Unlike conventional manufacturing processes where material is removed from a given work price to derive the
final shape of a product, 3-D printing develops the product from scratch thus obviating the necessity to cut away
materials. This prevents wastage of raw materials. Commonly used raw materials for the process are ABS
plastic, PLA and nylon. Recently the use of gold, bronze and wood has also been implemented. The complexity
factor of this process is 0% as in any object of any shape and size can be manufactured.
Spyware triggering system by particular string valueIJERD Editor
This computer programme can be used for good and bad purpose in hacking or in any general
purpose. We can say it is next step for hacking techniques such as keylogger and spyware. Once in this system if
user or hacker store particular string as a input after that software continually compare typing activity of user
with that stored string and if it is match then launch spyware programme.
A Blind Steganalysis on JPEG Gray Level Image Based on Statistical Features a...IJERD Editor
This paper presents a blind steganalysis technique to effectively attack the JPEG steganographic
schemes i.e. Jsteg, F5, Outguess and DWT Based. The proposed method exploits the correlations between
block-DCTcoefficients from intra-block and inter-block relation and the statistical moments of characteristic
functions of the test image is selected as features. The features are extracted from the BDCT JPEG 2-array.
Support Vector Machine with cross-validation is implemented for the classification.The proposed scheme gives
improved outcome in attacking.
Secure Image Transmission for Cloud Storage System Using Hybrid SchemeIJERD Editor
- Data over the cloud is transferred or transmitted between servers and users. Privacy of that
data is very important as it belongs to personal information. If data get hacked by the hacker, can be
used to defame a person’s social data. Sometimes delay are held during data transmission. i.e. Mobile
communication, bandwidth is low. Hence compression algorithms are proposed for fast and efficient
transmission, encryption is used for security purposes and blurring is used by providing additional
layers of security. These algorithms are hybridized for having a robust and efficient security and
transmission over cloud storage system.
Application of Buckley-Leverett Equation in Modeling the Radius of Invasion i...IJERD Editor
A thorough review of existing literature indicates that the Buckley-Leverett equation only analyzes
waterflood practices directly without any adjustments on real reservoir scenarios. By doing so, quite a number
of errors are introduced into these analyses. Also, for most waterflood scenarios, a radial investigation is more
appropriate than a simplified linear system. This study investigates the adoption of the Buckley-Leverett
equation to estimate the radius invasion of the displacing fluid during waterflooding. The model is also adopted
for a Microbial flood and a comparative analysis is conducted for both waterflooding and microbial flooding.
Results shown from the analysis doesn’t only records a success in determining the radial distance of the leading
edge of water during the flooding process, but also gives a clearer understanding of the applicability of
microbes to enhance oil production through in-situ production of bio-products like bio surfactans, biogenic
gases, bio acids etc.
Gesture Gaming on the World Wide Web Using an Ordinary Web CameraIJERD Editor
- Gesture gaming is a method by which users having a laptop/pc/x-box play games using natural or
bodily gestures. This paper presents a way of playing free flash games on the internet using an ordinary webcam
with the help of open source technologies. Emphasis in human activity recognition is given on the pose
estimation and the consistency in the pose of the player. These are estimated with the help of an ordinary web
camera having different resolutions from VGA to 20mps. Our work involved giving a 10 second documentary to
the user on how to play a particular game using gestures and what are the various kinds of gestures that can be
performed in front of the system. The initial inputs of the RGB values for the gesture component is obtained by
instructing the user to place his component in a red box in about 10 seconds after the short documentary before
the game is finished. Later the system opens the concerned game on the internet on popular flash game sites like
miniclip, games arcade, GameStop etc and loads the game clicking at various places and brings the state to a
place where the user is to perform only gestures to start playing the game. At any point of time the user can call
off the game by hitting the esc key and the program will release all of the controls and return to the desktop. It
was noted that the results obtained using an ordinary webcam matched that of the Kinect and the users could
relive the gaming experience of the free flash games on the net. Therefore effective in game advertising could
also be achieved thus resulting in a disruptive growth to the advertising firms.
Hardware Analysis of Resonant Frequency Converter Using Isolated Circuits And...IJERD Editor
-LLC resonant frequency converter is basically a combo of series as well as parallel resonant ckt. For
LCC resonant converter it is associated with a disadvantage that, though it has two resonant frequencies, the
lower resonant frequency is in ZCS region[5]. For this application, we are not able to design the converter
working at this resonant frequency. LLC resonant converter existed for a very long time but because of
unknown characteristic of this converter it was used as a series resonant converter with basically a passive
(resistive) load. . Here, it was designed to operate in switching frequency higher than resonant frequency of the
series resonant tank of Lr and Cr converter acts very similar to Series Resonant Converter. The benefit of LLC
resonant converter is narrow switching frequency range with light load[6] . Basically, the control ckt plays a
very imp. role and hence 555 Timer used here provides a perfect square wave as the control ckt provides no
slew rate which makes the square wave really strong and impenetrable. The dead band circuit provides the
exclusive dead band in micro seconds so as to avoid the simultaneous firing of two pairs of IGBT’s where one
pair switches off and the other on for a slightest period of time. Hence, the isolator ckt here is associated with
each and every ckt used because it acts as a driver and an isolation to each of the IGBT is provided with one
exclusive transformer supply[3]. The IGBT’s are fired using the appropriate signal using the previous boards
and hence at last a high frequency rectifier ckt with a filtering capacitor is used to get an exact dc
waveform .The basic goal of this particular analysis is to observe the wave forms and characteristics of
converters with differently positioned passive elements in the form of tank circuits.
Simulated Analysis of Resonant Frequency Converter Using Different Tank Circu...IJERD Editor
LLC resonant frequency converter is basically a combo of series as well as parallel resonant ckt. For
LCC resonant converter it is associated with a disadvantage that, though it has two resonant frequencies, the
lower resonant frequency is in ZCS region [5]. For this application, we are not able to design the converter
working at this resonant frequency. LLC resonant converter existed for a very long time but because of
unknown characteristic of this converter it was used as a series resonant converter with basically a passive
(resistive) load. . Here, it was designed to operate in switching frequency higher than resonant frequency of the
series resonant tank of Lr and Cr converter acts very similar to Series Resonant Converter. The benefit of LLC
resonant converter is narrow switching frequency range with light load[6] . Basically, the control ckt plays a
very imp. role and hence 555 Timer used here provides a perfect square wave as the control ckt provides no
slew rate which makes the square wave really strong and impenetrable. The dead band circuit provides the
exclusive dead band in micro seconds so as to avoid the simultaneous firing of two pairs of IGBT’s where one
pair switches off and the other on for a slightest period of time. Hence, the isolator ckt here is associated with
each and every ckt used because it acts as a driver and an isolation to each of the IGBT is provided with one
exclusive transformer supply[3]. The IGBT’s are fired using the appropriate signal using the previous boards
and hence at last a high frequency rectifier ckt with a filtering capacitor is used to get an exact dc
waveform .The basic goal of this particular analysis is to observe the wave forms and characteristics of
converters with differently positioned passive elements in the form of tank circuits. The supported simulation
is done through PSIM 6.0 software tool
Amateurs Radio operator, also known as HAM communicates with other HAMs through Radio
waves. Wireless communication in which Moon is used as natural satellite is called Moon-bounce or EME
(Earth -Moon-Earth) technique. Long distance communication (DXing) using Very High Frequency (VHF)
operated amateur HAM radio was difficult. Even with the modest setup having good transceiver, power
amplifier and high gain antenna with high directivity, VHF DXing is possible. Generally 2X11 YAGI antenna
along with rotor to set horizontal and vertical angle is used. Moon tracking software gives exact location,
visibility of Moon at both the stations and other vital data to acquire real time position of moon.
“MS-Extractor: An Innovative Approach to Extract Microsatellites on „Y‟ Chrom...IJERD Editor
Simple Sequence Repeats (SSR), also known as Microsatellites, have been extensively used as
molecular markers due to their abundance and high degree of polymorphism. The nucleotide sequences of
polymorphic forms of the same gene should be 99.9% identical. So, Microsatellites extraction from the Gene is
crucial. However, Microsatellites repeat count is compared, if they differ largely, he has some disorder. The Y
chromosome likely contains 50 to 60 genes that provide instructions for making proteins. Because only males
have the Y chromosome, the genes on this chromosome tend to be involved in male sex determination and
development. Several Microsatellite Extractors exist and they fail to extract microsatellites on large data sets of
giga bytes and tera bytes in size. The proposed tool “MS-Extractor: An Innovative Approach to extract
Microsatellites on „Y‟ Chromosome” can extract both Perfect as well as Imperfect Microsatellites from large
data sets of human genome „Y‟. The proposed system uses string matching with sliding window approach to
locate Microsatellites and extracts them.
Importance of Measurements in Smart GridIJERD Editor
- The need to get reliable supply, independence from fossil fuels, and capability to provide clean
energy at a fixed and lower cost, the existing power grid structure is transforming into Smart Grid. The
development of a smart energy distribution grid is a current goal of many nations. A Smart Grid should have
new capabilities such as self-healing, high reliability, energy management, and real-time pricing. This new era
of smart future grid will lead to major changes in existing technologies at generation, transmission and
distribution levels. The incorporation of renewable energy resources and distribution generators in the existing
grid will increase the complexity, optimization problems and instability of the system. This will lead to a
paradigm shift in the instrumentation and control requirements for Smart Grids for high quality, stable and
reliable electricity supply of power. The monitoring of the grid system state and stability relies on the
availability of reliable measurement of data. In this paper the measurement areas that highlight new
measurement challenges, development of the Smart Meters and the critical parameters of electric energy to be
monitored for improving the reliability of power systems has been discussed.
Study of Macro level Properties of SCC using GGBS and Lime stone powderIJERD Editor
The document summarizes a study on the use of ground granulated blast furnace slag (GGBS) and limestone powder to replace cement in self-compacting concrete (SCC). Tests were conducted on SCC mixes with 0-50% replacement of cement with GGBS and 0-20% replacement with limestone powder. The results showed that replacing 30% of cement with GGBS and 15% with limestone powder produced SCC with the highest compressive strength of 46MPa, meeting fresh property requirements. The study concluded that this ternary blend of cement, GGBS and limestone powder can improve SCC properties while reducing costs.
Main news related to the CCS TSI 2023 (2023/1695)Jakub Marek
An English 🇬🇧 translation of a presentation to the speech I gave about the main changes brought by CCS TSI 2023 at the biggest Czech conference on Communications and signalling systems on Railways, which was held in Clarion Hotel Olomouc from 7th to 9th November 2023 (konferenceszt.cz). Attended by around 500 participants and 200 on-line followers.
The original Czech 🇨🇿 version of the presentation can be found here: https://www.slideshare.net/slideshow/hlavni-novinky-souvisejici-s-ccs-tsi-2023-2023-1695/269688092 .
The videorecording (in Czech) from the presentation is available here: https://youtu.be/WzjJWm4IyPk?si=SImb06tuXGb30BEH .
5th LF Energy Power Grid Model Meet-up SlidesDanBrown980551
5th Power Grid Model Meet-up
It is with great pleasure that we extend to you an invitation to the 5th Power Grid Model Meet-up, scheduled for 6th June 2024. This event will adopt a hybrid format, allowing participants to join us either through an online Mircosoft Teams session or in person at TU/e located at Den Dolech 2, Eindhoven, Netherlands. The meet-up will be hosted by Eindhoven University of Technology (TU/e), a research university specializing in engineering science & technology.
Power Grid Model
The global energy transition is placing new and unprecedented demands on Distribution System Operators (DSOs). Alongside upgrades to grid capacity, processes such as digitization, capacity optimization, and congestion management are becoming vital for delivering reliable services.
Power Grid Model is an open source project from Linux Foundation Energy and provides a calculation engine that is increasingly essential for DSOs. It offers a standards-based foundation enabling real-time power systems analysis, simulations of electrical power grids, and sophisticated what-if analysis. In addition, it enables in-depth studies and analysis of the electrical power grid’s behavior and performance. This comprehensive model incorporates essential factors such as power generation capacity, electrical losses, voltage levels, power flows, and system stability.
Power Grid Model is currently being applied in a wide variety of use cases, including grid planning, expansion, reliability, and congestion studies. It can also help in analyzing the impact of renewable energy integration, assessing the effects of disturbances or faults, and developing strategies for grid control and optimization.
What to expect
For the upcoming meetup we are organizing, we have an exciting lineup of activities planned:
-Insightful presentations covering two practical applications of the Power Grid Model.
-An update on the latest advancements in Power Grid -Model technology during the first and second quarters of 2024.
-An interactive brainstorming session to discuss and propose new feature requests.
-An opportunity to connect with fellow Power Grid Model enthusiasts and users.
In the realm of cybersecurity, offensive security practices act as a critical shield. By simulating real-world attacks in a controlled environment, these techniques expose vulnerabilities before malicious actors can exploit them. This proactive approach allows manufacturers to identify and fix weaknesses, significantly enhancing system security.
This presentation delves into the development of a system designed to mimic Galileo's Open Service signal using software-defined radio (SDR) technology. We'll begin with a foundational overview of both Global Navigation Satellite Systems (GNSS) and the intricacies of digital signal processing.
The presentation culminates in a live demonstration. We'll showcase the manipulation of Galileo's Open Service pilot signal, simulating an attack on various software and hardware systems. This practical demonstration serves to highlight the potential consequences of unaddressed vulnerabilities, emphasizing the importance of offensive security practices in safeguarding critical infrastructure.
Monitoring and Managing Anomaly Detection on OpenShift.pdfTosin Akinosho
Monitoring and Managing Anomaly Detection on OpenShift
Overview
Dive into the world of anomaly detection on edge devices with our comprehensive hands-on tutorial. This SlideShare presentation will guide you through the entire process, from data collection and model training to edge deployment and real-time monitoring. Perfect for those looking to implement robust anomaly detection systems on resource-constrained IoT/edge devices.
Key Topics Covered
1. Introduction to Anomaly Detection
- Understand the fundamentals of anomaly detection and its importance in identifying unusual behavior or failures in systems.
2. Understanding Edge (IoT)
- Learn about edge computing and IoT, and how they enable real-time data processing and decision-making at the source.
3. What is ArgoCD?
- Discover ArgoCD, a declarative, GitOps continuous delivery tool for Kubernetes, and its role in deploying applications on edge devices.
4. Deployment Using ArgoCD for Edge Devices
- Step-by-step guide on deploying anomaly detection models on edge devices using ArgoCD.
5. Introduction to Apache Kafka and S3
- Explore Apache Kafka for real-time data streaming and Amazon S3 for scalable storage solutions.
6. Viewing Kafka Messages in the Data Lake
- Learn how to view and analyze Kafka messages stored in a data lake for better insights.
7. What is Prometheus?
- Get to know Prometheus, an open-source monitoring and alerting toolkit, and its application in monitoring edge devices.
8. Monitoring Application Metrics with Prometheus
- Detailed instructions on setting up Prometheus to monitor the performance and health of your anomaly detection system.
9. What is Camel K?
- Introduction to Camel K, a lightweight integration framework built on Apache Camel, designed for Kubernetes.
10. Configuring Camel K Integrations for Data Pipelines
- Learn how to configure Camel K for seamless data pipeline integrations in your anomaly detection workflow.
11. What is a Jupyter Notebook?
- Overview of Jupyter Notebooks, an open-source web application for creating and sharing documents with live code, equations, visualizations, and narrative text.
12. Jupyter Notebooks with Code Examples
- Hands-on examples and code snippets in Jupyter Notebooks to help you implement and test anomaly detection models.
Fueling AI with Great Data with Airbyte WebinarZilliz
This talk will focus on how to collect data from a variety of sources, leveraging this data for RAG and other GenAI use cases, and finally charting your course to productionalization.
For the full video of this presentation, please visit: https://www.edge-ai-vision.com/2024/06/temporal-event-neural-networks-a-more-efficient-alternative-to-the-transformer-a-presentation-from-brainchip/
Chris Jones, Director of Product Management at BrainChip , presents the “Temporal Event Neural Networks: A More Efficient Alternative to the Transformer” tutorial at the May 2024 Embedded Vision Summit.
The expansion of AI services necessitates enhanced computational capabilities on edge devices. Temporal Event Neural Networks (TENNs), developed by BrainChip, represent a novel and highly efficient state-space network. TENNs demonstrate exceptional proficiency in handling multi-dimensional streaming data, facilitating advancements in object detection, action recognition, speech enhancement and language model/sequence generation. Through the utilization of polynomial-based continuous convolutions, TENNs streamline models, expedite training processes and significantly diminish memory requirements, achieving notable reductions of up to 50x in parameters and 5,000x in energy consumption compared to prevailing methodologies like transformers.
Integration with BrainChip’s Akida neuromorphic hardware IP further enhances TENNs’ capabilities, enabling the realization of highly capable, portable and passively cooled edge devices. This presentation delves into the technical innovations underlying TENNs, presents real-world benchmarks, and elucidates how this cutting-edge approach is positioned to revolutionize edge AI across diverse applications.
"Choosing proper type of scaling", Olena SyrotaFwdays
Imagine an IoT processing system that is already quite mature and production-ready and for which client coverage is growing and scaling and performance aspects are life and death questions. The system has Redis, MongoDB, and stream processing based on ksqldb. In this talk, firstly, we will analyze scaling approaches and then select the proper ones for our system.
How information systems are built or acquired puts information, which is what they should be about, in a secondary place. Our language adapted accordingly, and we no longer talk about information systems but applications. Applications evolved in a way to break data into diverse fragments, tightly coupled with applications and expensive to integrate. The result is technical debt, which is re-paid by taking even bigger "loans", resulting in an ever-increasing technical debt. Software engineering and procurement practices work in sync with market forces to maintain this trend. This talk demonstrates how natural this situation is. The question is: can something be done to reverse the trend?
The Microsoft 365 Migration Tutorial For Beginner.pptxoperationspcvita
This presentation will help you understand the power of Microsoft 365. However, we have mentioned every productivity app included in Office 365. Additionally, we have suggested the migration situation related to Office 365 and how we can help you.
You can also read: https://www.systoolsgroup.com/updates/office-365-tenant-to-tenant-migration-step-by-step-complete-guide/
How to Interpret Trends in the Kalyan Rajdhani Mix Chart.pdfChart Kalyan
A Mix Chart displays historical data of numbers in a graphical or tabular form. The Kalyan Rajdhani Mix Chart specifically shows the results of a sequence of numbers over different periods.
Essentials of Automations: Exploring Attributes & Automation ParametersSafe Software
Building automations in FME Flow can save time, money, and help businesses scale by eliminating data silos and providing data to stakeholders in real-time. One essential component to orchestrating complex automations is the use of attributes & automation parameters (both formerly known as “keys”). In fact, it’s unlikely you’ll ever build an Automation without using these components, but what exactly are they?
Attributes & automation parameters enable the automation author to pass data values from one automation component to the next. During this webinar, our FME Flow Specialists will cover leveraging the three types of these output attributes & parameters in FME Flow: Event, Custom, and Automation. As a bonus, they’ll also be making use of the Split-Merge Block functionality.
You’ll leave this webinar with a better understanding of how to maximize the potential of automations by making use of attributes & automation parameters, with the ultimate goal of setting your enterprise integration workflows up on autopilot.
What is an RPA CoE? Session 1 – CoE VisionDianaGray10
In the first session, we will review the organization's vision and how this has an impact on the COE Structure.
Topics covered:
• The role of a steering committee
• How do the organization’s priorities determine CoE Structure?
Speaker:
Chris Bolin, Senior Intelligent Automation Architect Anika Systems
Northern Engraving | Nameplate Manufacturing Process - 2024Northern Engraving
Manufacturing custom quality metal nameplates and badges involves several standard operations. Processes include sheet prep, lithography, screening, coating, punch press and inspection. All decoration is completed in the flat sheet with adhesive and tooling operations following. The possibilities for creating unique durable nameplates are endless. How will you create your brand identity? We can help!
HCL Notes and Domino License Cost Reduction in the World of DLAUpanagenda
Webinar Recording: https://www.panagenda.com/webinars/hcl-notes-and-domino-license-cost-reduction-in-the-world-of-dlau/
The introduction of DLAU and the CCB & CCX licensing model caused quite a stir in the HCL community. As a Notes and Domino customer, you may have faced challenges with unexpected user counts and license costs. You probably have questions on how this new licensing approach works and how to benefit from it. Most importantly, you likely have budget constraints and want to save money where possible. Don’t worry, we can help with all of this!
We’ll show you how to fix common misconfigurations that cause higher-than-expected user counts, and how to identify accounts which you can deactivate to save money. There are also frequent patterns that can cause unnecessary cost, like using a person document instead of a mail-in for shared mailboxes. We’ll provide examples and solutions for those as well. And naturally we’ll explain the new licensing model.
Join HCL Ambassador Marc Thomas in this webinar with a special guest appearance from Franz Walder. It will give you the tools and know-how to stay on top of what is going on with Domino licensing. You will be able lower your cost through an optimized configuration and keep it low going forward.
These topics will be covered
- Reducing license cost by finding and fixing misconfigurations and superfluous accounts
- How do CCB and CCX licenses really work?
- Understanding the DLAU tool and how to best utilize it
- Tips for common problem areas, like team mailboxes, functional/test users, etc
- Practical examples and best practices to implement right away
For the full video of this presentation, please visit: https://www.edge-ai-vision.com/2024/06/how-axelera-ai-uses-digital-compute-in-memory-to-deliver-fast-and-energy-efficient-computer-vision-a-presentation-from-axelera-ai/
Bram Verhoef, Head of Machine Learning at Axelera AI, presents the “How Axelera AI Uses Digital Compute-in-memory to Deliver Fast and Energy-efficient Computer Vision” tutorial at the May 2024 Embedded Vision Summit.
As artificial intelligence inference transitions from cloud environments to edge locations, computer vision applications achieve heightened responsiveness, reliability and privacy. This migration, however, introduces the challenge of operating within the stringent confines of resource constraints typical at the edge, including small form factors, low energy budgets and diminished memory and computational capacities. Axelera AI addresses these challenges through an innovative approach of performing digital computations within memory itself. This technique facilitates the realization of high-performance, energy-efficient and cost-effective computer vision capabilities at the thin and thick edge, extending the frontier of what is achievable with current technologies.
In this presentation, Verhoef unveils his company’s pioneering chip technology and demonstrates its capacity to deliver exceptional frames-per-second performance across a range of standard computer vision networks typical of applications in security, surveillance and the industrial sector. This shows that advanced computer vision can be accessible and efficient, even at the very edge of our technological ecosystem.
Skybuffer SAM4U tool for SAP license adoptionTatiana Kojar
Manage and optimize your license adoption and consumption with SAM4U, an SAP free customer software asset management tool.
SAM4U, an SAP complimentary software asset management tool for customers, delivers a detailed and well-structured overview of license inventory and usage with a user-friendly interface. We offer a hosted, cost-effective, and performance-optimized SAM4U setup in the Skybuffer Cloud environment. You retain ownership of the system and data, while we manage the ABAP 7.58 infrastructure, ensuring fixed Total Cost of Ownership (TCO) and exceptional services through the SAP Fiori interface.
Robust Watermarking Using Hybrid Transform of DCT, Haar and Walsh and SVD
1. International Journal of Engineering Research and Development
e-ISSN: 2278-067X, p-ISSN: 2278-800X, www.ijerd.com
Volume 10, Issue 12 (December 2014), PP.75-92
75
Robust Watermarking Using Hybrid Transform of DCT, Haar
and Walsh and SVD
Dr. H. B. Kekre1
, Dr. Tanuja Sarode2
, Shachi Natu3
1
Senior Professor, Computer Engg. Dept., MPSTME, Vileparle, Mumbai, India.
2
Associate Professor, Computer Dept. TSEC, Bandra, Mumbai, India.
3
Ph. D. Research Scholar, MPSTME, Vileparle, Mumbai, India.
Abstract:- In this paper a novel approach of watermarking using hybrid transform and SVD is proposed.
Hybrid transform is generated from existing orthogonal transforms of different sizes by taking their kronecker
product. DCT, Walsh, and Haar transforms are used to generate the hybrid transforms DCT-Walsh, Walsh-
DCT, DCT-Haar, Haar-DCT, Walsh-Haar andHaar-Walsh. Each hybrid transform is applied column wise/row
wise on host. Singular Value Decomposition of watermark is obtained and first few singular values of
watermark are embedded in middle frequency band of hybrid column/row transformed host. Robustness of
proposed approach is evaluated against image compression, cropping, noise addition, image resizing and
histogram equalization attack. Performance of hybrid transform shows improvement against compression attack
by 59%, against noise addition by 70% and against resizing by 32-56% when compared to hybrid wavelet
transforms.
Keywords:- Watermarking, Singular Value Decomposition, Hybrid transform, Kronecker product, Hybrid
wavelet transform
I. INTRODUCTION
Due to use of internet technology, vast amount of information is generated with a single click. Security
of this information is equally important. Usually availability of various tools makes distribution and
manipulation of digital information very easy. This may lead to claiming the digital information by someone
else other than owner. To avoid this, some technique is required wherein the information of owner can be
embedded in the digital information to be transmitted thus preventing illegal claim of ownership or can detect
any alterations done in the digital information. Watermarking fulfils this need. Different types of information
like identity of owner, logo of company etc. can be embedded in the information to be protected. The
information to be protected is called host or cover and the secret information embedded in it is called as
watermark. Depending on type of cover, watermarking can be classified as digital image watermarking, audio
and video watermarking. In the proposed work focus is on watermarking of digital images. Depending on how
the watermark is embedded in image, it is classified as spatial domain and frequency domain watermarking.
Spatial domain watermarking directly deals with pixel intensities of image. Frequency domain watermarking
first converts image into another form i.e. its frequency representation using transformation techniques and then
changes those frequency coefficients in such a way that hidden watermark goes unnoticeable with host. Some
more classifications of watermarking include visible and invisible watermarking. As the name suggests it either
reveals or hides the existence of watermark in host image depending on the purpose for which it is used. Robust
and fragile watermarking is yet another category of image watermarking. In robust watermarking, any change in
the host will try to prevent destruction of hidden watermark. Thus attacker cannot easily change or remove
hidden watermark to change the ownership information. In fragile watermarking, small change to image
information will easily damage the hidden watermark thereby detecting the unauthorised changes in contents of
host. Varieties of watermarking techniques available in literature are overviewed in the next section.
II. REVIEW OF LITERATURE
In literature many spatial domain techniques were initially introduced to hide the watermark. Though
spatial domain techniques are not as robust as frequency domain techniques, due to their simplicity they are still
attracting the researchers. Some such spatial domain techniques have been presented in [1], [2], [3] and [4]
where LSB of host is used to hide MSB of watermark. To improve the robustness, instead of using LSB, 3rd or
4th LSB are preferred to hide the watermark. Also operations like shifting the watermark bits or embedding
watermark bits multiple times at different positions in host are proposed.
To have robust watermarking where watermarks can survive the attacks on digital contents, we need to
move to frequency domain watermarking. Transforms like DCT [5], [6], [7], Discrete wavelet transforms (DWT)
[8], [9], [10], Singular Value Decomposition [11], [12] are some of the popularly used transformation
2. Robust Watermarking Using Hybrid Transform of DCT, Haar and Walsh and SVD
76
techniques. Wavelet packet transform is also efficiently used for watermarking by Bhatnagar et al. in [13].
Using more than one transform has also shown a positive effect on robustness. Some popular pairs of such
multiple transforms are DWT-DCT [14], DWT-SVD [15], DCT-SVD [16], DWT-DCT-SVD [17] etc.
Cox [18] first introduced a watermarking using DCT. Piva et al. proposed watermarking using DCT in
[19] in which, a DCT domain watermarking of colour images is presented, which exploits the characteristics of
the human visual system and the correlation between the RGB image channels.Bedi et al. proposed a SVD and
DCT_DWT watermarking technique in [20]. The middle band DCT coefficients are chosen to achieve high
robustness against JPEG compression. Robustness against other attacks is achieved by taking DWT of the DCT
coefficients and the lowest frequency LL band of DWT is chosen for insertion. Chandra Mohan and Srinivas
Kumar presented a SVD based watermarking method in which watermark embedding is carried out in left
singular matrix U and diagonal matrix D [21]. Watermark image is embedded in the D component using Dither
quantization. A copy of the watermark is embedded in the columns of U matrix using comparison of the
coefficients of U matrix with respect to the watermark image. If extraction of watermark from D matrix is not
complete, there is a fair amount of probability that it can be extracted from U matrix.
Rahman proposed a DWT-DCT-SVD based watermarking method in [22]. In their watermarking
method, theoriginal image is rearranged using zigzag sequence and DWT is applied on rearranged image. Then
DCT andSVD are applied on all high bands LH, HL and HH. Watermark is embedded by modifying the
singularvalues of these bands. One more DWT-SVD based watermarking algorithm is proposed by Erkan Yavuz
and Ziya Telatar. In their method [23], third level decomposition of host image is obtained. LL and HL sub
bands obtained through this decomposition are used to embed singular values of watermark. In addition,
components of U matrix of watermark are embedded into LH and HH sub band. While extracting, first the
similarity of extracted U components are checked with the original one. If they are found similar, watermark is
constructed by using extracted singular values and original U and V matrices of the watermark.
Kekre, Tanuja and Shachi presented a DWT-DCT-SVD based hybrid watermarking method for colour
images in [24]. In their method, robustness is achieved by applying DCT to specific wavelet sub-bands and then
factorizing each quadrant of frequency sub-band using singular value decomposition. Watermark is embedded
in host image by modifying singular values of host image. Performance of this technique is then compared by
replacing DCT by Walsh in above combination. In [25], DCT wavelet transform of size 256*256 is generated
using existing well known orthogonal transform DCT of dimension 128*128 and 2*2. This DCT Wavelet
transform is used in combination with the orthogonal transform DCT and SVD to increase the robustness of
watermarking. HL2 sub-band is selected for watermark embedding. Performance of this proposed watermarking
scheme is evaluated against various image processing attacks. In [26] Walsh wavelet transform is used that is
derived from orthogonal Walsh transform matrices of different sizes. 256*256 Walsh wavelet is generated using
128*128 and 2*2 Walsh transform matrix and then using 64*64 and 4*4Walsh matrix which depicts the
resolution of host image taken into consideration. It is supported by DCT and SVD to increase the robustness.
Walsh wavelet based technique is then compared with DCT wavelet based method given in [25]. In [27], other
wavelet transforms like Hartley wavelet, Slant wavelet, Real Fourier wavelet and Kekre wavelet were explored
by Kekre, Tanuja and Shachi. Performance of Slant wavelet and Real Fourier wavelet were proved better for
histogram Equalization and Resizing attack than DCT wavelet based watermarking in [25] and Walsh wavelet
based watermarking presented in [26].
III. HYBRID TRANSFORM AND SVD
Hybrid transform is generated by taking kronecker product of two different orthogonal transforms of
different sizes. For example, DCT-Walsh hybrid transform is generated using DCT and Walsh transform matrix.
DCT-Walsh hybrid transform matrix of size say 256x256 can be generated using DCT matrix of size 128x128
and Walsh matrix of size 2x2. Thus (128, 2) is one possible pair of component matrix size. Similarly other
possible pairs are (64, 4), (32, 8), (16, 16), (8, 32) (4, 64) and (2,128). It comprises of the good characteristics of
both the component transforms and hence is expected to shoe better performance than individual component
transform. In the proposed approach component transforms of size 16x16 each is used to generate 256x256
hybrid transform matrix.
Using singular value decomposition, any real matrix A can be decomposed into a product of three
matrices U, S and V as A=USVT, where U and V are orthogonal matrices and S is diagonal matrix. If A is mxn
matrix, U is mxm orthonormal matrix whose columns are called as left singular vectors of A and V is nxn
orthonormal matrix whose columns are called right singular vectors of A. Some properties of SVD which make
it useful in image processing are:
The singular values are unique for a given matrix.
The rank of matrix A is equal to its nonzero singular values. In many applications, the singular values of
a matrix decrease quickly with increasing rank. This property allows us to reduce the noise or compress the
matrix data by eliminating the small singular values or the higher ranks [28].
3. Robust Watermarking Using Hybrid Transform of DCT, Haar and Walsh and SVD
77
The singular values of an image have very good stability i.e. when a small perturbation is added to an
image; its singular values don’t change significantly [29].
IV. PROPOSED METHOD
In the proposed method, a hybrid watermarking approach using SVD and hybrid transform is proposed.
Use of orthogonal transforms like DCT, DFT, and Haar with SVD is very popular. In this paper a concept of
hybrid transforms generated from orthogonal transforms is used to perform watermarking. Strength of hybrid
transform is increased by using SVD with it. Hybrid transform is applied to host image either column wise or
row wise. Middle frequency band of transformed host is selected to embed the watermark. Watermark to be
embedded in host is subjected to SVD. Since maximum of image energy is accumulated in only first few
singular values, these values are sufficient to embed the watermark in host. In propose approach we find that for
128x128 size watermark image, first 30 singular values contain almost 99.99% of image energy and hence
sufficient for embedding. Before embedding, singular values are adaptively scaled to match their energy with
the energy of middle frequency region in which they are embedded. Inverse transform of host after embedding
singular values in it gives watermarked image.
Extraction of watermark is followed exactly in reverse manner. Thus watermarked image is first
column/row transformed using hybrid transform. From its middle frequency region, singular values of
watermark are obtained. These singular values are scaled up to bring them back to their original strength.
Inverse SVD of these scaled singular values gives us recovered watermark. Robustness of proposed approach is
tested by comparing recovered watermark with embedded one. Comparison is done on the basis of average of
absolute difference between pixels of two images known as Mean Absolute Error (MAE).
Proposed approach of watermarking is tested for its robustness against the attacks like image compression,
image cropping, adding noise to watermarked images, resizing watermarked images and equalizing histogram of
watermarked images. Fig. 1 shows five different host images and a watermark used to embed in host images.
(a) Lena (b) Mandrill (c) Peppers (d) Face (e) Puppy (f) NMIMS
Fig. 1: (a)-(e) host images (f) watermark image used for experimental work
Fig. 2 shows the watermarked image Mandrill using each of the column hybrid transforms mentioned and
extracted watermark NMIMS from it without performing any attack. Below each watermarked image, MAE
between host and watermarked image is displayed and below each extracted watermark, MAE between
embedded and extracted watermark is shown.
Watermarked
image
Extracted
watermark
Watermarked
image
Extracted
watermark
MAE=0.337 MAE=0 MAE=0.265 MAE=0
DCT-Walsh hybrid column transform Walsh-DCT hybrid column transform
MAE=0.304 MAE=0 MAE=0.131 MAE=0
DCT-Haar hybrid column transform Haar-DCT hybrid column transform
4. Robust Watermarking Using Hybrid Transform of DCT, Haar and Walsh and SVD
78
MAE=0.223 MAE=0 MAE=0.136 MAE=0
Walsh-Haar hybrid column transform Haar-Walsh hybrid column transform
Fig. 2: watermarked image Mandrill and extracted watermark
V. RESULT ANALYSIS AGAINST ATTACKS
A. Compression attack
Compression of watermarked images is very obvious as its main aim is to save bandwidth. In proposed
approach three types of compressions are performed. Compression using transforms like DCT, DST, Walsh,
Haar and DCT wavelet, Compression using Vector quantization and JPEG compression. In compression using
VQ, Kekre’s Fast Codebook Generation (KFCG) algorithm [30] is used to generate codebook of size 256. JPEG
compression includes compression using quality factor 100. One such compression results are shown here in Fig.
3. For each of the column hybrid transform mentioned, results of DCT compression are presented.
Watermarked
image after
compression
Extracted
watermark
Watermarked
image after
compression
Extracted
watermark
MAE=2.895 MAE=3.259 MAE=2.895 MAE=3.589
DCT-Walsh Walsh-DCT
MAE=2.895 MAE=3.768 MAE=2.895 MAE=2.505
DCT-Haar Haar-DCT
MAE=2.895 MAE=9.789 MAE=2.894 MAE=4.811
Walsh-Haar Haar-Walsh
Fig. 3: Results of various hybrids transforms against compression using DCT
From Fig. 3 it can be seen that different hybrid transforms give different MAE values between
embedded and extracted watermark and each of them is showing quite acceptable quality of extracted
watermark. Table 1 shows average MAE between embedded and extracted watermark extracted from five
different host images against compression attack when column and row version of hybrid transforms are used to
embed the watermark.
5. Robust Watermarking Using Hybrid Transform of DCT, Haar and Walsh and SVD
79
Table I: Average MAE between embedded and extracted watermark against compression attack
using various hybrid transforms
Compression
using
Column
DCT-Walsh
Column
Walsh-DCT
Column
DCT-Haar
Column
Haar-DCT
Column
Walsh-
Haar
Column
Haar-
Walsh
DCT 1.657 1.527 1.817 1.234 2.931 1.905
DST 1.677 1.537 1.840 1.265 2.980 1.980
Walsh 0 1.752 0.449 1.832 1.442 0.170
Haar 0.828 2.969 0.9 2.832 2.886 1.181
DCT Wavelet 7.182 2.015 7.716 1.407 8.569 8.082
JPEG 46.061 43.189 45.190 43.144 44.883 41.886
VQ 41.250 40.758 40.619 33.096 40.764 27.405
Compression
using
Row DCT-
Walsh
Row Walsh-
DCT
Row DCT-
Haar
Row Haar-
DCT
Row Walsh-
Haar
Row Haar-
Walsh
DCT 2.197 1.482 3.312 2.230 1.981 3.449
DST 2.135 1.502 3.339 2.258 2.054 3.532
Walsh 0.327 2.010 2.062 2.253 1.136 1.660
Haar 3.131 2.756 4.057 3.491 1.110 2.690
DCT Wavelet 11.640 2.145 11.423 2.115 9.925 12.077
JPEG 47.069 44.216 45.964 39.436 45.100 40.968
VQ 39.648 40.637 39.832 30.429 40.897 34.998
From Table I it can be seen that except JPEG compression and VQ based compression, against all other
types of compression attacks, all explored hybrid transforms show strong robustness.
B. Cropping Attack
Watermarked images are cropped at different regions: at corners and at centre. 16x16 size squares and
32x32 size squares are cropped at the corners of watermarked image to observe the effect of cropping more
information. 32x32 size square is cropped at the centre where number of pixels cropped is same as in case of
cropping 16x16 pixels at four corners. Fig. 4 shows the result images for cropping 32x32 at centre attack using
column hybrid transforms.
Watermarked
image after
cropping
Extracted
watermark
Watermarked
image after
cropping
Extracted
watermark
MAE=1.856 MAE=61.781 MAE=1.856 MAE=165.969
DCT-Walsh Walsh-DCT
MAE=1.856 MAE=25.533 MAE=1.856 MAE=0
DCT-Haar Haar-DCT
6. Robust Watermarking Using Hybrid Transform of DCT, Haar and Walsh and SVD
80
MAE=1.856 MAE=144.594 MAE=1.855 MAE=0
Walsh-Haar Haar-Walsh
Fig. 4: Results of various hybrid transforms against cropping 32x32 portion at centre.
From Fig. 4 it is observed that when Haar is used as base transform (first component) during generation
of hybrid transform, highest robustness against cropping attack is obtained. Thus Haar-DCT and Haar-Walsh
column hybrid transform show excellent robustness against cropping. On the other hand Walsh when used as
base transform in the generation of hybrid transform cannot withstand the cropping attack. In case of row
versions of hybrid transforms also transforms having Haar as base transform perform very well against cropping
attack.
Table II shows Average MAE between embedded and extracted watermark against cropping attack for
column and row versions of hybrid transforms.
Table II: Average MAE between embedded and extracted watermark against cropping attack using
various hybrid transforms
Cropping
type
Column
DCT-Walsh
Column
Walsh-DCT
Column
DCT-Haar
Column
Haar-DCT
Column
Walsh-Haar
Column
Haar-Walsh
16x16 at
corners
58.328 55.231 51.901 115.660 55.613 123.134
32x32 at
corners
35.162 27.042 33.539 242.896 26.898 260.219
32x32 at
centre
71.125 95.420 61.814 0.749 90.048 0
Cropping
type
Row DCT-
Walsh
Row Walsh-
DCT
Row DCT-
Haar
Row Haar-
DCT
Row Walsh-
Haar
Row Haar-
Walsh
16x16 at
corners
56.626 36.456 49.493 73.904 29.773 83.985
32x32 at
corners
34.500 45.407 35.560 254.603 46.026 281.515
32x32 at
centre
48.616 51.125 45.665 1.885 41.382 3.048
From Table 2 it can be concluded that for cropping at centre, hybrid transform column as well as row
with Haar as the base transform shows strong robustness.
C. Noise addition attack
Two types of noises binary distributed run length noise and Gaussian distributed run length noise are
added to watermarked images. Binary distributed noise is added with different run length like 1 to10, 5 to 50
and 10 to 100. Fig. 5 shows the watermarked images with Gaussian distributed noise added to them and
watermark extracted from them when different hybrid transforms are used to embed the watermark.
Watermarked
image after
compression
Extracted watermark
Watermarked
image after
compression
Extracted
watermark
MAE=0.746 MAE=1.968 MAE=0.746 MAE=2.213
7. Robust Watermarking Using Hybrid Transform of DCT, Haar and Walsh and SVD
81
Fig. 5: Results of various hybrid transforms against Gaussian distributed run length noise.
From Fig. 5 it is observed that column hybrid transforms show excellent robustness against Gaussian
distributed run length noise added to watermarked images. For binary distributed run length noise also, hybrid
transforms shoe very well sustenance. Table 3 shows average MAE between embedded and extracted watermark
from five different host images using column and row version of hybrid transforms.
Table III Average MAE between embedded and extracted watermark against noise addition attack using
various hybrid transforms
Noise type Column
DCT-
Walsh
Column
Walsh-DCT
Column DCT-
Haar
Column
Haar-DCT
Column
Walsh-Haar
Column
Haar-Walsh
Binary distributed
run length noise
(1-10)
0 0 0 0 0 0
Binary distributed
run length noise
(5-50)
1.963 2.568 2.374 1.945 2.088 2.766
Binary distributed
run length noise
(50-100)
2.433 2.239 2.015 2.261 2.059 2.282
Gaussian
distributed run
length noise
2.087 2.207 2.037 2.243 2.109 2.413
Noise Type Row
DCT-
Walsh
Row Walsh-
DCT
Row DCT-
Haar
Row Haar-
DCT
Row Walsh-
Haar
Row Haar-
Walsh
Binary distributed
run length noise
(1-10)
5.755 4.897 4.036 3.840 6.381 3.961
Binary distributed
run length noise
(5-50)
5.411 4.702 4.676 4.316 4..140 4.234
Binary distributed
run length noise
(50-100)
3.656 3.430 3.512 3.011 3.101 3.632
Gaussian
distributed run
length noise
2.097 1.419 1.97 1.299 1.349 1.640
DCT-Walsh Walsh-DCT
MAE=0.746 MAE=1.727 MAE=0.746 MAE=1.708
DCT-Haar Haar-DCT
MAE=0.746 MAE=2.209 MAE=0.746 MAE=2.970
Walsh-Haar Haar-Walsh
8. Robust Watermarking Using Hybrid Transform of DCT, Haar and Walsh and SVD
82
Table 3 shows that all hybrid transforms explored in proposed approach sustain noise addition attack
very strongly. Column hybrid transforms show better robustness over row hybrid transforms against binary
distributed run length noise attack.
D. Resizing attack
In resizing attack, watermarked image is first increased in size two times and then reduced to its
original size. This is achieved by three different mechanisms: bicubic interpolation, transform based zooming
[31] and grid based interpolation [32]. In transform based zooming, different transforms like DCT, DST, DFT,
Real Fourier Transform and Hartley transform are used to zoom and reduce the watermarked image. Fig. 6
shows result images for bicubic interpolation based resizing for column hybrid transforms used for embedding
the watermark.
Watermarked
image after
compression
Extracted
watermark
Watermarked
image after
compression
Extracted
watermark
MAE=3.770 MAE=18.886 MAE=3.766 MAE=20.349
DCT-Walsh Walsh-DCT
MAE=3.769 MAE=18.159 MAE=3.763 MAE=21.340
DCT-Haar Haar-DCT
MAE=3.768 MAE=19.437 MAE=3.762 MAE=20.842
Walsh-Haar Haar-Walsh
Fig. 6: Results of various hybrid transforms against resizing using bicubic interpolation
Table IV shows average MAE between embedded and extracted watermark when different hybrid
transforms (column and row versions) are used to embed watermark.
Table IV Average MAE between embedded and extracted watermark against resizing attack
using various hybrid transforms
Resizing type Column DCT-
Walsh
Column Walsh-
DCT
Column
DCT-Haar
Column Haar-
DCT
Column
Walsh-Haar
Column Haar-
Walsh
Bicubic
Interpolation
19.371 18.479 19.200 17.661 19.015 17.731
DFT 0.619 0.689 0.627 0.644 0.679 0.692
Grid based
Interpolation
6.061 6.567 5.900 3.708 8.425 4.935
Resizing Type Row DCT-
Walsh
Row Walsh-
DCT
Row DCT-
Haar
Row Haar-
DCT
Row Walsh-
Haar
Row Haar-Walsh
Bicubic
Interpolation
20.412 17.767 20.340 15.980 19.321 18.403
DFT 0.950 0.727 0.927 0.979 0.732 1.013
Grid based
Interpolation
6.699 5.826 6.173 3.660 8.105 5.089
9. Robust Watermarking Using Hybrid Transform of DCT, Haar and Walsh and SVD
83
From Table IV, it is observed that column as well as row hybrid transforms show excellent robustness
against resizing using DFT. For other transforms used to resize the watermarked image, MAE between
embedded and extracted watermark is found to be zero. Thus we can conclude that proposed watermarking
approach is strongly robust against transform based image resizing attack. Next high level robustness is obtained
against resizing using grid based interpolation as shown in Table 4. For resizing using bicubic interpolation the
quality of extracted watermark is acceptable. Similar results are obtained for row hybrid transforms also.
E. Histogram Equalization
Fig. 7 shows result images of Mandrill after equalizing its histogram for various column hybrid
transforms.
Watermarked
image after
compression
Extracted
watermark
Watermarked
image after
compression
Extracted
watermark
MAE=23.223 MAE=72.655 MAE=23.218 MAE=78.530
DCT-Walsh Walsh-DCT
MAE=23.223 MAE=72.651 MAE=23.208 MAE=79.643
DCT-Haar Haar-DCT
MAE=23.218 MAE=78.091 MAE=23.215 MAE=71.060
Walsh-Haar Haar-Walsh
Fig. 7: Results of various hybrid transforms against histogram equalization
As can be seen from Fig. 7, MAE values between embedded and extracted watermark are higher due to
changes in their pixel intensity values. Similar behaviour is depicted by row versions of hybrid transforms.
VI. PERFORMANCE COMPARISON WITH HYBRID WAVELET TRANSFORMS
Performance of proposed approach using hybrid transforms is compared with our previous work of
hybrid wavelet transforms.
A. Compression attack:
1) Column hybrid wavelet vs. Column hybrid transform
Fig. 8 shows comparison of column hybrid wavelet transforms and column hybrid transforms against
compression attack.
10. Robust Watermarking Using Hybrid Transform of DCT, Haar and Walsh and SVD
84
(a)DCT-Walsh hybrid wavelet vs. DCT-Walsh
hybrid transform
(b)Walsh-DCT hybrid wavelet vs. Walsh-DCT
hybrid transform
(c)DCT-Haar hybrid wavelet vs. Haar-DCT hybrid
transform
(d)Haar-DCT hybrid wavelet vs. Haar-DCT hybrid
transform
(e)Walsh-Haar hybrid wavelet vs. Walsh-Haar
hybrid transform
(f)Haar-Walsh hybrid wavelet vs. Haar-Walsh
hybrid transform
Fig. 8: Column hybrid wavelet transforms vs. column hybrid transforms against compression attack.
From Fig. 8 it can be observed that hybrid transforms perform better than hybrid wavelet transforms.
For transform based compression this improvement is from 6% to 95%. For JPEG compression it is 23% to 38%
better. For VQ based compression the improvement in robustness by hybrid transforms is 20% to 44%.
2) Row hybrid wavelet transforms vs. row hybrid transforms
Fig. 9 shows comparison of row hybrid wavelet transforms and row hybrid transforms against
compression attack. Similar to column hybrid transforms, row hybrid transforms improve the robustness against
compression attack by more or less similar range.
11. Robust Watermarking Using Hybrid Transform of DCT, Haar and Walsh and SVD
85
(a)DCT-Walsh hybrid wavelet vs. DCT-Walsh
hybrid transform
(b)Walsh-DCT hybrid wavelet vs. Walsh-DCT
hybrid transform
(c)DCT-Haar hybrid wavelet vs. Haar-DCT hybrid
transform
(d)Haar-DCT hybrid wavelet vs. Haar-DCT hybrid
transform
(e)Walsh-Haar hybrid wavelet vs. Walsh-Haar
hybrid transform
(f)Haar-Walsh hybrid wavelet vs. Haar-Walsh
hybrid transform
Fig. 9: Row hybrid wavelet transforms vs. row hybrid transforms against compression attack.
B. Cropping attack
1) Column hybrid wavelet transforms vs. column hybrid transform
Fig. 10 shows comparison of column hybrid wavelet transform and column hybrid transforms against
cropping attack. From Fig. 10 it is observed that hybrid transforms cannot perform better than hybrid wavelet
transforms in column version against compression attack. Hybrid wavelet transforms are much better in
robustness.
12. Robust Watermarking Using Hybrid Transform of DCT, Haar and Walsh and SVD
86
(a)DCT-Walsh hybrid wavelet vs. DCT-Walsh
hybrid transform
(b)Walsh-DCT hybrid wavelet vs. Walsh-DCT
hybrid transform
(c)DCT-Haar hybrid wavelet vs. Haar-DCT hybrid
transform
(d)Haar-DCT hybrid wavelet vs. Haar-DCT hybrid
transform
(e)Walsh-Haar hybrid wavelet vs. Walsh-Haar
hybrid transform
(f)Haar-Walsh hybrid wavelet vs. Haar-Walsh
hybrid transform
Fig. 10: Column hybrid wavelet transforms vs. column hybrid transforms against cropping attack.
2) Row hybrid wavelet transforms vs. row hybrid transforms
Fig. 11 shows comparison of row hybrid wavelet transforms and row hybrid transforms against
cropping attack. Observations for row hybrid wavelet transforms and hybrid transforms are similar to that of
column transforms. Hybrid wavelet transforms better sustain against cropping attack than hybrid transforms.
(a)DCT-Walsh hybrid wavelet vs. DCT-Walsh (b)Walsh-DCT hybrid wavelet vs. Walsh-DCT
13. Robust Watermarking Using Hybrid Transform of DCT, Haar and Walsh and SVD
87
hybrid transform hybrid transform
(c)DCT-Haar hybrid wavelet vs. Haar-DCT hybrid
transform
(d)Haar-DCT hybrid wavelet vs. Haar-DCT hybrid
transform
(e)Walsh-Haar hybrid wavelet vs. Walsh-Haar
hybrid transform
(f)Haar-Walsh hybrid wavelet vs. Haar-Walsh
hybrid transform
Fig. 11: Row hybrid wavelet transforms vs. row hybrid transforms against cropping attack.
C. Noise addition attack
1) Column hybrid wavelet transform vs. column hybrid transform
Fig. 12 compares column hybrid transforms with column hybrid wavelet transforms against noise
addition attack. In column version of hybrid transforms and hybrid wavelet transforms, MAE obtained for
smaller run length (1 to 10) of binary distributed run length noise is zero. Therefore it is not shown in the graph.
However, for row transforms, it is nonzero and hence can be compared.
From Fig. 12 it is observed that all hybrid transforms show up to 70% improved robustness against
binary distributed run length noise with run length 5 to 50 and 10 to 100. But for Gaussian distributed run length
noise, hybrid wavelet transforms are more robust.
(a)DCT-Walsh hybrid wavelet vs. DCT-Walsh
hybrid transform
(b)Walsh-DCT hybrid wavelet vs. Walsh-DCT
hybrid transform
14. Robust Watermarking Using Hybrid Transform of DCT, Haar and Walsh and SVD
88
(c)DCT-Haar hybrid wavelet vs. Haar-DCT hybrid
transform
(d)Haar-DCT hybrid wavelet vs. Haar-DCT hybrid
transform
(e)Walsh-Haar hybrid wavelet vs. Walsh-Haar
hybrid transform
(f)Haar-Walsh hybrid wavelet vs. Haar-Walsh
hybrid transform
Fig. 12: Column hybrid wavelet transforms vs. column hybrid transforms against noise addition attack.
2) Row hybrid wavelet vs. row hybrid transforms
Fig. 13 compares row hybrid transforms with row hybrid wavelet transforms. Behaviour of row hybrid
transforms and row hybrid wavelet transforms is opposite to that of column transforms. Thus in row version,
hybrid transforms perform better than hybrid wavelet transform against Gaussian distributed run length noise.
For Binary distributed run length noise, hybrid wavelet transform show better robustness than hybrid transforms.
(a)DCT-Walsh hybrid wavelet vs. DCT-Walsh
hybrid transform
(b)Walsh-DCT hybrid wavelet vs. Walsh-DCT
hybrid transform
(c)DCT-Haar hybrid wavelet vs. Haar-DCT hybrid (d)Haar-DCT hybrid wavelet vs. Haar-DCT hybrid
15. Robust Watermarking Using Hybrid Transform of DCT, Haar and Walsh and SVD
89
transform transform
(e)Walsh-Haar hybrid wavelet vs. Walsh-Haar
hybrid transform
(f)Haar-Walsh hybrid wavelet vs. Haar-Walsh
hybrid transform
Fig. 13: Row hybrid wavelet transforms vs. row hybrid transforms against noise addition attack.
D. Resizing attack
1) Column hybrid wavelet transforms vs. column hybrid transforms
Fig. 14 compares column versions of hybrid wavelet and hybrid transforms against resizing attack.
Hybrid transforms improve the robustness significantly up to 32% against bicubic interpolation based resizing
and up to 56% against resizing using DFT. For the combination of Walsh-DCT, Haar-DCT and Walsh-Haar,
hybrid wavelet transforms are more robust than hybrid transforms against resizing using grid interpolation.
(a)DCT-Walsh hybrid wavelet vs. DCT-Walsh
hybrid transform
(b)Walsh-DCT hybrid wavelet vs. Walsh-DCT
hybrid transform
(c)DCT-Haar hybrid wavelet vs. Haar-DCT hybrid
transform
(d)Haar-DCT hybrid wavelet vs. Haar-DCT hybrid
transform
16. Robust Watermarking Using Hybrid Transform of DCT, Haar and Walsh and SVD
90
(e)Walsh-Haar hybrid wavelet vs. Walsh-Haar
hybrid transform
(f)Haar-Walsh hybrid wavelet vs. Haar-Walsh
hybrid transform
Fig. 14: Column hybrid wavelet transforms vs. column hybrid transforms against resizing attack.
2) Row hybrid wavelet transforms vs. row hybrid transforms
Fig. 15 compares hybrid wavelet transforms and hybrid transforms against resizing attack in their row
versions. Performance of row versions is similar to that of column versions. Hybrid transforms are more robust
than hybrid wavelet transforms.
(a)DCT-Walsh hybrid wavelet vs. DCT-Walsh
hybrid transform
(b)Walsh-DCT hybrid wavelet vs. Walsh-DCT
hybrid transform
(c)DCT-Haar hybrid wavelet vs. Haar-DCT hybrid
transform
(d)Haar-DCT hybrid wavelet vs. Haar-DCT hybrid
transform
(e)Walsh-Haar hybrid wavelet vs. Walsh-Haar
hybrid transform
(f)Haar-Walsh hybrid wavelet vs. Haar-Walsh
hybrid transform
17. Robust Watermarking Using Hybrid Transform of DCT, Haar and Walsh and SVD
91
Fig. 15: Row hybrid wavelet transforms vs. row hybrid transforms against resizing attack.
VII. CONCLUSIONS
In the proposed approach of watermarking using hybrid transforms, desirable characteristics of two
transforms are clubbed in one transform by taking their kronecker product. Hybrid transforms in their column
and row versions improve the performance of individual component transforms. At the same time they also
show significant improvement in robustness against various attacks over hybrid wavelet transforms. For
different attacks percentage improvement shown by hybrid transforms is given in following Table V.
Table V Performance improvement by hybrid transforms over hybrid
Wavelet transforms against various attacks.
Attack Percentage improvement over
hybrid wavelet transforms
Compression 59%
Cropping No improvement
Noise addition 70%
Resizing 32-56%
REFERENCES
[1]. Abhay Sharma, Rekha Chaturvedi, Naveen Hemrajani, Dinesh Goyal, “New improved and robust
watermarking technique based on third LSB substitution method”, International journal of scientific
and research publication, vol. 2, issue 3, pp. 1-4, 2012.
[2]. Rajani Verma, Archana Tiwari, “Copyright Protection for Watermark Image Using LSB Algorithm in
Colored Image”, Advance in Electronic and electric engineering, vol. 4, No. 5, pp. 499-506, 2014.
[3]. V.Madhu Viswanatham, Jeswanth Manikonda, “A novel technique for embedding data in spatial
domain”, International Journal on Computer Science and Engineering, Vol. 2, No. 2, pp. 233-236, 2010.
[4]. Abdullah Bamatraf, Rosziati Ibrahim and Mohd. Najib Mohd. Salleh, “A New Digital Watermarking
Algorithm UsingCombination of Least Significant Bit (LSB) and Inverse Bit”, Journal of computing,
volume 3, Issue 4, pp. 1-8, 2011.
[5]. Wai Chu, “DCT-Based Image Watermarking Using Subsampling”, IEEE transactions on multimedia,
vol. 5, no. 1, pp. 34-38, March 2003.
[6]. Adrian G. Bor_s and Ioannis Pitas, “Image watermarking using block site selection and DCT domain
constraints”, Optics Express, Vol. 3, No. 12, pp.512-523, 1998.
[7]. Rajesh Kannan Megalingam, Mithun Muralidharan Nair, Rahul Srikumar, Venkat Krishnan
Balasubramanian and Vineeth Sarma Venugopala Sarma, “A Comparative Study on Performance of
Novel, Robust Spatial Domain Digital Image Watermarking with DCT Based Watermarking”,
International Journal of Computer Theory and Engineering, Vol. 2, No. 4, pp. 647-653, August 2010.
[8]. Dr. B. Eswara Reddy, P. Harini, S. Maruthu Perumal & Dr. V. Vijaya Kumar, “A New Wavelet Based
Digital Watermarking Method for Authenticated Mobile Signals”, International Journal of Image
Processing (IJIP), Volume (5): Issue (1), pp. 13-24, 2011.
[9]. Nagaraj V. Dharwadkar & B. B. Amberker, “Determining the Efficient Sub band Coefficients of
Biorthogonal Wavelet for Grey level Image Watermarking”, International Journal of Image Processing
Volume (4): Issue (2), pp. 89-105.
[10]. Yiwei Wang, , John F. Doherty, and Robert E. Van Dyck, “A Wavelet-Based Watermarking Algorithm
for Ownership Verification of Digital Images”, IEEE transactions on image processing, vol. 11, no. 2,
pp.77-88, February 2002.
[11]. Ruizhen Liu and Tieniu Tan, “An SVD-Based Watermarking Scheme for Protecting Rightful
Ownership”, IEEE transactions on multimedia, vol. 4, no.1, pp. 121-128, March 2002.
[12]. Kapre Bhagyashri, Joshi, M.Y., “Robust image watermarking based on singular value decomposition
and discrete wavelet transform”, in Proc. of 3rd IEEE International Conference on Computer Science
and Information Technology, pp.337-341, 2010.
[13]. G. Bhatnagar, B. Raman, Q. M. J. Wu, “ Robust watermarking using fractional wavelet packet
transform”, IET Image Processing, vol. 6, issue 4, pp. 386-397, 2012.
[14]. Ahmed Abdulfetah, Xingming Sun, Hengfu Yang and Nur Mohammad, “Robust adaptive image
watermarking using visual models in DWT and DCT domain”, Information Technology journal 9(3),
pp. 460-466, 2010.
[15]. Mohsen Kariman Khorasani, Mohammad Mojtaba Sheikholeslami, “An DWT-SVD Based Digital
Image Watermarking Using a Novel Wavelet Analysis Function”, Fourth International Conference on
Computational Intelligence, Communication Systems and Networks, pp. 254-256, 2012.
18. Robust Watermarking Using Hybrid Transform of DCT, Haar and Walsh and SVD
92
[16]. A. Sverdlov, S. Dexter and A. M. Eskicioglu, “Robust DCT-SVD domain image watermarking for
copyright protection : Embedding data in all frequencies, in proc. the 2004 Multimedia and Security
Workshop, ACM press, pp. 166-174, Sep. 2004.
[17]. Navas, K.A., Ajay, M.C., Lakshmi M., Archana T.S., Sasikumar, M., “DWT-DCT-SVD based
watermarking”, 3rd International Conference on Communication Systems Software and Middleware
and Workshops,pp.271-274, 2008.
[18]. Cox, Ingemar J., Joe Kilian, F. Thomson Leighton, and Talal Shamoon,“Secure spread spectrum
watermarking for multimedia”, Image Processing, IEEE Transactions on 6, no. 12, 1673-1687, 1997.
[19]. Piva, Alessandro, F. Bartolinin, V. Cappellini, and M. Barni,“Exploiting the cross-correlation of RGB-
channels for robust watermarking of color images”,inproc. IEEE of International Conference on Image
Processing, pp. 306-310, 1999.
[20]. Bedi, S. S., Ashwani Kumar, and Piyush Kapoor, “Robust secure SVD based DCT–DWT oriented
watermarking technique for image authentication”, In International Conference on IT to celebrate S.
Charmonman's 72nd birthday, pp. 46-1. 2009.
[21]. Mohan, B. Chandra, and S. Srinivas Kumar,“A robust image watermarking scheme using singular
value decomposition”, Journal of Multimedia 3, no. 1, 7-15, 2008.
[22]. Rahman, Md, “A dwt, dct and svd based watermarking technique to protect the image piracy”, arXiv
preprint arXiv:1307.3294 (2013).
[23]. Erkan Yavuz, ziya telatar, “Improved SVD-DWT Based Digital Image Watermarking against
Watermark Ambiguity”, Proceedings of the 2007 ACM symposium on applied computing, pp. 1051-
1055, 2007.
[24]. H. B. Kekre, Tanuja Sarode, Shachi Natu, “Performance Comparison of DCT and Walsh Transforms
for Watermarking using DWT-SVD”, International Journal of Advanced Computer Science and
Applications, Vol. 4, No. 2, pp. 131-141, 2013.
[25]. Dr. H. B. Kekre, Dr. Tanuja Sarode, Shachi Natu, “Hybrid Watermarking of Color Images using DCT-
Wavelet, DCT and SVD”, International Journal of Advances in Engineering and Technology, vol.6,
Issue 2.pp. 769-779, May 2013.
[26]. Dr. H. B. Kekre, Dr. Tanuja Sarode, Shachi Natu, “Robust watermarking using Walsh wavelets and
SVD”, International Journal of Advances in Science and Technology, Vol. 6, No. 4, pp.8-23, April
2013.
[27]. Dr. H. B. Kekre, Dr. Tanuja Sarode, Shachi Natu,“ Performance Comparison of Wavelets Generated
from Four Different Orthogonal Transforms for Watermarking With Various Attacks”, International
Journal of Computer and Technology, Vol. 9, No. 3, pp. 1139-1152, July 2013.
[28]. Cao, Lijie. "Singular value decomposition applied to digital image processing, “Division of Computing
Studies” , Arizona State University Polytechnic Campus, Mesa, 2006.
[29]. Ruizhen Liu, Tieniu Tan, “A SVD based watermarking scheme for protecting rightful
ownership”,IEEE transactions on multimedia, vol. 4, pp.121-128, 2002.
[30]. Kekre, H. B., and Tanuja K. Sarode,“Fast Codebook Generation Algorithm for Color Images using
Vector Quantization”, International Journal of Computer Science and Information Technology 1.1: 7-
12, 2009.
[31]. Dr. H. B. Kekre, Dr. Tanuja Sarode, Shachi Natu, “Image Zooming using Sinusoidal Transforms like
Hartley, DFT, DCT, DST and Real Fourier Transform”, International journal of computer science and
information security Vol. 12 No. 7, 2014.
[32]. H. B. Kekre, Tanuja Sarode, Sudeep Thepade, “Grid based image scaling technique”, International
Journal of Computer Science and Applications, Volume 1, No. 2, pp. 95-98, 2008.