Geometric attacks can desynchronize the location of the watermark and hence cause incorrect
watermark detection. This paper presents a robust colour image watermarking scheme based on
visually significant feature points and image normalization technique. The feature points are
used as synchronization marks between watermark embedding and detection. The watermark is
embedded into the non overlapped normalized circular regions in the luminance component or
the blue component of a color image. The embedding of the watermark is carried out by
modifying the DCT coefficients values in selected blocks. The original unmarked image is not
required for watermark extraction Experimental results show that the proposed scheme
successfully makes the watermark perceptually invisible as well as robust to common signal
processing and geometric attacks.
Color Image Watermarking using Cycle Spinning based Sharp Frequency Localized...CSCJournals
This paper describes a new approach for color image watermarking using Cycle Spinning based Sharp Frequency Localized Contourlet Transform and Principal Component Analysis. The approach starts with decomposition of images into various subbands using Contourlet Transform(CT) successively for all the color spaces of both host and watermark images. Then principal components of middle band(x bands) are considered for inserting operation. The ordinary contourlet transform suffers from lack of frequency localization. The localization being the most important criterion for watermarking, the conventional CT is not very suitable for watermarking. This problem of CT is over come by Sharp Frequency Localized Contourlet, but this lacks of translation invariance. Hence the cycle spinning based sharp frequency localized contourlet chosen for watermarking. Embedding at middle level sub bands(x band) preserves the curve nature of edges in the host image hence less disturbance is observed when host and watermark images are compared. This result in very good Peak Signal to Noise Ratio (PSNR) instead of directly adding of mid frequency components of watermark and host images the principal components are only added. Likewise the amount of payload to be added is reduced hence host images get very less distortion. Usage of principal components also helps in fruitful extraction of watermark information from host image hence gives good correlation between input watermark and extracted one. This technique has shown a very high robustness under various intentional and non intentional attacks.
A CONTENT BASED WATERMARKING SCHEME USING RADIAL SYMMETRY TRANSFORM AND SINGU...cscpconf
The Watermarking techniques represent actually a very important issue in digital multimedia
content distribution. To protect digital multimedia content we embed an invisible watermark
into images which facilitate the detection of different manipulations, duplication, illegitimate
distributions of these images. In this paper we present an approach to embedding invisible
watermarks into color images using a robust transform of images that is the Radial symmetry
transform. The watermark is inserted in blocs of eight pixels large of the blue channel using the
Singular Value Decomposition (SVD) of these blocs and those of the radial symmetry transform.
The insertion in the blue channel is justified when we know that many works states that the
human visual system is less sensible to perturbation in the blue channel of the image. Results
obtained after tests show that the imperceptibility of the watermark using this approach is good
and its robustness face to different attacks leads to think that the proposed approach is a very
promising one.
A Wavelet - Based Object Watermarking System for MPEG4 VideoCSCJournals
Efficient storage, transmission and use of video information are key requirements in many multimedia applications currently being addressed by MPEG-4. To fulfill these requirements, a new approach for representing video information which relies on an object-based representation, has been adopted. Therefore, object-based watermarking schemes are needed for copyright protection. This paper presents a novel object based watermarking solution for MPEG4 video authentication using the shape adaptive-discrete wavelet transform (SA-DWT). In order to make the watermark robust and transparent, the watermark is embedded in the average of wavelet blocks using the visual model based on the human visual system. Wavelet coefficients n least significant bits (LSBs) are adjusted in concert with the average. Simulation results shows that the proposed watermarking scheme is perceptually invisible and robust against many attacks such as lossy compression (e.g. MPEG1 and MPEG2,MPEG-4,H264)
Color Image Watermarking using Cycle Spinning based Sharp Frequency Localized...CSCJournals
This paper describes a new approach for color image watermarking using Cycle Spinning based Sharp Frequency Localized Contourlet Transform and Principal Component Analysis. The approach starts with decomposition of images into various subbands using Contourlet Transform(CT) successively for all the color spaces of both host and watermark images. Then principal components of middle band(x bands) are considered for inserting operation. The ordinary contourlet transform suffers from lack of frequency localization. The localization being the most important criterion for watermarking, the conventional CT is not very suitable for watermarking. This problem of CT is over come by Sharp Frequency Localized Contourlet, but this lacks of translation invariance. Hence the cycle spinning based sharp frequency localized contourlet chosen for watermarking. Embedding at middle level sub bands(x band) preserves the curve nature of edges in the host image hence less disturbance is observed when host and watermark images are compared. This result in very good Peak Signal to Noise Ratio (PSNR) instead of directly adding of mid frequency components of watermark and host images the principal components are only added. Likewise the amount of payload to be added is reduced hence host images get very less distortion. Usage of principal components also helps in fruitful extraction of watermark information from host image hence gives good correlation between input watermark and extracted one. This technique has shown a very high robustness under various intentional and non intentional attacks.
A CONTENT BASED WATERMARKING SCHEME USING RADIAL SYMMETRY TRANSFORM AND SINGU...cscpconf
The Watermarking techniques represent actually a very important issue in digital multimedia
content distribution. To protect digital multimedia content we embed an invisible watermark
into images which facilitate the detection of different manipulations, duplication, illegitimate
distributions of these images. In this paper we present an approach to embedding invisible
watermarks into color images using a robust transform of images that is the Radial symmetry
transform. The watermark is inserted in blocs of eight pixels large of the blue channel using the
Singular Value Decomposition (SVD) of these blocs and those of the radial symmetry transform.
The insertion in the blue channel is justified when we know that many works states that the
human visual system is less sensible to perturbation in the blue channel of the image. Results
obtained after tests show that the imperceptibility of the watermark using this approach is good
and its robustness face to different attacks leads to think that the proposed approach is a very
promising one.
A Wavelet - Based Object Watermarking System for MPEG4 VideoCSCJournals
Efficient storage, transmission and use of video information are key requirements in many multimedia applications currently being addressed by MPEG-4. To fulfill these requirements, a new approach for representing video information which relies on an object-based representation, has been adopted. Therefore, object-based watermarking schemes are needed for copyright protection. This paper presents a novel object based watermarking solution for MPEG4 video authentication using the shape adaptive-discrete wavelet transform (SA-DWT). In order to make the watermark robust and transparent, the watermark is embedded in the average of wavelet blocks using the visual model based on the human visual system. Wavelet coefficients n least significant bits (LSBs) are adjusted in concert with the average. Simulation results shows that the proposed watermarking scheme is perceptually invisible and robust against many attacks such as lossy compression (e.g. MPEG1 and MPEG2,MPEG-4,H264)
IMPROVEMENT OF BM3D ALGORITHM AND EMPLOYMENT TO SATELLITE AND CFA IMAGES DENO...ijistjournal
This paper proposes a new procedure in order to improve the performance of block matching and 3-D filtering (BM3D) image denoising algorithm. It is demonstrated that it is possible to achieve a better performance than that of BM3D algorithm in a variety of noise levels. This method changes BM3D algorithm parameter values according to noise level, removes prefiltering, which is used in high noise level; therefore Peak Signal-to-Noise Ratio (PSNR) and visual quality get improved, and BM3D complexities and processing time are reduced. This improved BM3D algorithm is extended and used to denoise satellite and color filter array (CFA) images. Output results show that the performance has upgraded in comparison with current methods of denoising satellite and CFA images. In this regard this algorithm is compared with Adaptive PCA algorithm, that has led to superior performance for denoising CFA images, on the subject of PSNR and visual quality. Also the processing time has decreased significantly.
Remote sensing image fusion using contourlet transform with sharp frequency l...Zac Darcy
This paper addresses four different aspects of the remote sensing image fusion: i) image fusion method, ii)
quality analysis of fusion results, iii) effects of image decomposition level, and iv) importance of image
registration. First, a new contourlet-based image fusion method is presented, which is an improvement
over the wavelet-based fusion. This fusion method is then utilized withinthe main fusion process to analyze
the final fusion results. Fusion framework, scheme and datasets used in the study are discussed in detail.
Second, quality analysis of the fusion results is discussed using various quantitative metrics for both spatial
and spectral analyses. Our results indicate that the proposed contourlet-based fusion method performs
better than the conventional wavelet-based fusion methodsin terms of both spatial and spectral analyses.
Third, we conducted an analysis on the effects of the image decomposition level and observed that the
decomposition level of 3 produced better fusion results than both smaller and greater number of levels.
Last, we created four different fusion scenarios to examine the importance of the image registration. As a
result, the feature-based image registration using the edge features of the source images produced better
fusion results than the intensity-based imageregistration.
Detection of Bridges using Different Types of High Resolution Satellite Imagesidescitation
Automatic detection of geographical objects such as roads, buildings and bridges
from remote sensing imagery is a very meaningful but difficult work. Bridges over water is
a typical geographical object and its automatic detection is of great significance for many
applications. Finding Region Of Interest (ROI) having water areas alone is the most crucial
task in bridge detection. This can be done with image processing / soft computing methods
using images in spatial domain or with Normalized Differential Water Index (NDWI) using
images in spectral domain. We have developed an efficient algorithm for bridge detection
where the ROI segmentation is done using both methods. Exact locations of bridges are
obtained by knowledge models and spatial resolution of the image. These knowledge models
are applied in the algorithm in such a way that the thresholds are automatically fixed
depending on the quality of the image. Using the algorithm any type of bridges are extracted
irrespective of their inclination and shape.
International Journal of Engineering Research and Development (IJERD)IJERD Editor
journal publishing, how to publish research paper, Call For research paper, international journal, publishing a paper, IJERD, journal of science and technology, how to get a research paper published, publishing a paper, publishing of journal, publishing of research paper, reserach and review articles, IJERD Journal, How to publish your research paper, publish research paper, open access engineering journal, Engineering journal, Mathemetics journal, Physics journal, Chemistry journal, Computer Engineering, Computer Science journal, how to submit your paper, peer reviw journal, indexed journal, reserach and review articles, engineering journal, www.ijerd.com, research journals,
yahoo journals, bing journals, International Journal of Engineering Research and Development, google journals, hard copy of journal
International Journal of Computational Engineering Research (IJCER) is dedicated to protecting personal information and will make every reasonable effort to handle collected information appropriately. All information collected, as well as related requests, will be handled as carefully and efficiently as possible in accordance with IJCER standards for integrity and objectivity.
Noise resistance territorial intensity-based optical flow using inverse confi...journalBEEI
This paper presents the use of the inverse confidential technique on bilateral function with the territorial intensity-based optical flow to prove the effectiveness in noise resistance environment. In general, the image’s motion vector is coded by the technique called optical flow where the sequences of the image are used to determine the motion vector. But, the accuracy rate of the motion vector is reduced when the source of image sequences is interfered by noises. This work proved that the inverse confidential technique on bilateral function can increase the percentage of accuracy in the motion vector determination by the territorial intensity-based optical flow under the noisy environment. We performed the testing with several kinds of non-Gaussian noises at several patterns of standard image sequences by analyzing the result of the motion vector in a form of the error vector magnitude (EVM) and compared it with several noise resistance techniques in territorial intensity-based optical flow method.
Transmission error propagation in wireless multimedia communication systems has become a recurring
problem. This persistent problem has led to grave consequences on the visual quality of the decoded video.
It is against this backdrop that, we present an adaptive intra refresh (AIR) error-resilient coding tool to
mitigate the effect of transmission error propagation in 3D video communications. This work utilizes
periodic insertion of intra macroblocks in badly error-infected frames temporally as well as related frames
in the multi view video scheme. Our objective is to maximize the transmission efficiency while ensuring the
transmission robustness of the coded bitstream. The selection of periodic macroblocks is based on areas
with high motion above a pre-set threshold. The coding modes of the macroblocks are based on the
distortion expectation due to transmission errors. Extensive simulation results show significant
improvement in both objective and subjective video quality at different intra refresh rates.
Robust Adaptive Intra Refresh for Multiview VideoIJCSEA Journal
Transmission error propagation in wireless multimedia communication systems has become a recurring problem. This persistent problem has led to grave consequences on the visual quality of the decoded video. It is against this backdrop that, we present an adaptive intra refresh (AIR) error-resilient coding tool to mitigate the effect of transmission error propagation in 3D video communications. This work utilizes periodic insertion of intra macroblocks in badly error-infected frames temporally as well as related frames in the multi view video scheme. Our objective is to maximize the transmission efficiency while ensuring the transmission robustness of the coded bitstream. The selection of periodic macroblocks is based on areas with high motion above a pre-set threshold. The coding modes of the macroblocks are based on the distortion expectation due to transmission errors. Extensive simulation results show significant improvement in both objective and subjective video quality at different intra refresh rates
Comparison of Wavelet Watermarking Method With & without Estimator Approachijsrd.com
In this paper we propose an Estimator approach with wavelet watermarking method which is capable to hide watermark in the host image based on wavelet domain technique. Using the Estimator approach the proposed technique becomes robust against different noise attacks. For the evaluation of Imperceptibility & Robustness of the proposed method we have calculated basic statistical parameters. We have tested watermarked image against different noise attacks at different noise densities. Due to the use of estimator the perceptible quality of extracted image is better though the image is degraded by high density noise.
EFFICIENT IMAGE COMPRESSION USING LAPLACIAN PYRAMIDAL FILTERS FOR EDGE IMAGESijcnac
This project presents a new image compression technique for the coding of retinal and
fingerprint images. Retinal images are used to detect diseases like diabetes or
hypertension. Fingerprint images are used for the security purpose. In this work, the
contourlet transform of the retinal and fingerprint image is taken first. The coefficients of
the contourlet transform are quantized using adaptive multistage vector quantization
scheme. The number of code vectors in the adaptive vector quantization scheme depends
on the dynamic range of the input image.
Single image super resolution with improved wavelet interpolation and iterati...iosrjce
IOSR journal of VLSI and Signal Processing (IOSRJVSP) is a double blind peer reviewed International Journal that publishes articles which contribute new results in all areas of VLSI Design & Signal Processing. The goal of this journal is to bring together researchers and practitioners from academia and industry to focus on advanced VLSI Design & Signal Processing concepts and establishing new collaborations in these areas.Design and realization of microelectronic systems using VLSI/ULSI technologies require close collaboration among scientists and engineers in the fields of systems architecture, logic and circuit design, chips and wafer fabrication, packaging, testing and systems applications. Generation of specifications, design and verification must be performed at all abstraction levels, including the system, register-transfer, logic, circuit, transistor and process levels.
Empirical Evaluation of Decomposition Strategy for Wavelet Video CompressionCSCJournals
Abstract The wavelet transform has become the most interesting new algorithm for video compression. Yet there are many parameters within a wavelet analysis and synthesis which govern the quality of a decoded video. In this paper different wavelet decomposition strategies and their implications for the decoded video are discussed. A pool of color video sequences has been wavelet-transformed at different settings of the wavelet filter bank and quantization threshold and with decomposition of dyadic and packet wavelet transformation strategies. The empirical evaluation of the decomposition strategy is based on three benchmarks: a first judgment regards the perceived quality of the decoded video. The compression rate is a second crucial factor, and finally the best parameter setting with regards to the Peak Signal to Noise Ratio (PSNR). The investigation proposes dyadic decomposition as the chosen decomposition strategy.
Image Watermarking in Spatial Domain Using QIM and Genetic Algorithmijsrd.com
Digital watermarking is one of the proposed solutions for copyright protection of multimedia data. A watermark is a form of image or text that is impressed onto paper, which provides evidence of its authenticity. A digital watermark is digital data embedded in some host document so as to later prove the ownership of the document. Digital image watermarking refers to digital data embedding in images. Robust image watermarking systems are required so that watermarked images can resist geometric attacks in addition to common image processing tasks, such as JPEG compression. Least Significant Bit (LSB) watermarking, is one of the most traditional method of watermarking which changes the LSB of individual pixels in correlation with the watermark. However, pure LSB scheme provides a fragile watermarking technique which is not acceptable in practical applications. Also, robustness against geometric attacks, such as rotation, scaling and translation, still remains one of the most challenging research topics in pixel based image watermarking. In this paper, a new pixel-based watermarking system is proposed, in which a binary logo is embedded, a bit per pixel, in the pixel domain of an image. The LSB based watermarking is then quantized using QIM, augmented with genetic algorithm to produce a watermarking scheme which is highly robust against geometrical attacks.
International Journal of Engineering Research and Development (IJERD)IJERD Editor
journal publishing, how to publish research paper, Call For research paper, international journal, publishing a paper, IJERD, journal of science and technology, how to get a research paper published, publishing a paper, publishing of journal, publishing of research paper, reserach and review articles, IJERD Journal, How to publish your research paper, publish research paper, open access engineering journal, Engineering journal, Mathemetics journal, Physics journal, Chemistry journal, Computer Engineering, Computer Science journal, how to submit your paper, peer reviw journal, indexed journal, reserach and review articles, engineering journal, www.ijerd.com, research journals,
yahoo journals, bing journals, International Journal of Engineering Research and Development, google journals, hard copy of journal
PERCEPTUAL COPYRIGHT PROTECTION USING MULTIRESOLUTION WAVELET-BASED WATERMARK...gerogepatton
In this paper, an efficiently DWT-based watermarking technique is proposed to embed signatures in images to attest the owner identification and discourage the unauthorized copying. This paper deals with a fuzzy inference filter to choose the larger entropy of coefficients to embed watermarks. Unlike most previous watermarking frameworks which embedded watermarks in the larger coefficients of inner coarser subbands, the proposed technique is based on utilizing a context model and fuzzy inference filter by embedding watermarks in the larger-entropy coefficients of coarser DWT subbands. The proposed approaches allow us to embed adaptive casting degree of watermarks for transparency and robustness to the general image-processing attacks such as smoothing, sharpening, and JPEG compression. The approach has no need the original host image to extract watermarks. Our schemes have been shown to provide very good results in both image transparency and robustness.
Robust Image Watermarking Scheme Based on Wavelet TechniqueCSCJournals
In this paper, an image watermarking scheme based on multi bands wavelet transformation method is proposed. At first, the proposed scheme is tested on the spatial domain (for both a non and semi blind techniques) in order to compare its results with a frequency domain. In the frequency domain, an adaptive scheme is designed and implemented based on the bands selection criteria to embed the watermark. These criteria depend on the number of wavelet passes. In this work three methods are developed to embed the watermark (one band (LL|HH|HL|LH), two bands (LL&HH | LL&HL | LL&LH | HL&LH | HL&HH | LH&HH) and three bands (LL&HL&LH | LL&HH&HL | LL&HH&LH | LH&HH&HL) selection. The analysis results indicate that the performance of the proposed watermarking scheme for the non-blind scheme is much better than semi-blind scheme in terms of similarity of extracted watermark, while the security of semi-blind is relatively high. The results show that in frequency domain when the watermark is added to the two bands (HL and LH) for No. of pass =3 led to good correlation between original and extracted watermark around (similarity = 99%), and leads to reconstructed images of good objective quality (PSNR=24 dB) after JPEG compression attack (QF=25). The disadvantage of the scheme is the involvement of a large number of wavelet bands in the embedding process.
Enhanced Hashing Approach For Image Forgery Detection With Feature Level FusionIJTET Journal
Image forgery detection and its accuracy are addressed in the proposed work. The image authentication process aims at finding the originality of an image. Due to the advent of many image editing software image tampering has become common. The Enhanced hashing approach is suggested for image authentication. The concept of Hashing has been used for searching images from large databases. It can also be applied to image authentication as it produces different results with respect to the change in image. But the hashing methods used for similarity searches cannot be used for image authentication since they are no sensitive for small changes. Moreover, we need a system that detects only perceptual changes. A new hashing method, namely, enhanced robust hashing is proposed for image authentication, which uses global and local properties of an image. This method is developed for detecting image forgery, including removal, insertion, and replacement of objects, and abnormal color modification, and for locating the forged area. The local models include position and texture information of object regions in the image. The hash mechanism uses secret keys for encryption and decryption. IP tracing is done to track the suspicious nodes.
IMPROVEMENT OF BM3D ALGORITHM AND EMPLOYMENT TO SATELLITE AND CFA IMAGES DENO...ijistjournal
This paper proposes a new procedure in order to improve the performance of block matching and 3-D filtering (BM3D) image denoising algorithm. It is demonstrated that it is possible to achieve a better performance than that of BM3D algorithm in a variety of noise levels. This method changes BM3D algorithm parameter values according to noise level, removes prefiltering, which is used in high noise level; therefore Peak Signal-to-Noise Ratio (PSNR) and visual quality get improved, and BM3D complexities and processing time are reduced. This improved BM3D algorithm is extended and used to denoise satellite and color filter array (CFA) images. Output results show that the performance has upgraded in comparison with current methods of denoising satellite and CFA images. In this regard this algorithm is compared with Adaptive PCA algorithm, that has led to superior performance for denoising CFA images, on the subject of PSNR and visual quality. Also the processing time has decreased significantly.
Remote sensing image fusion using contourlet transform with sharp frequency l...Zac Darcy
This paper addresses four different aspects of the remote sensing image fusion: i) image fusion method, ii)
quality analysis of fusion results, iii) effects of image decomposition level, and iv) importance of image
registration. First, a new contourlet-based image fusion method is presented, which is an improvement
over the wavelet-based fusion. This fusion method is then utilized withinthe main fusion process to analyze
the final fusion results. Fusion framework, scheme and datasets used in the study are discussed in detail.
Second, quality analysis of the fusion results is discussed using various quantitative metrics for both spatial
and spectral analyses. Our results indicate that the proposed contourlet-based fusion method performs
better than the conventional wavelet-based fusion methodsin terms of both spatial and spectral analyses.
Third, we conducted an analysis on the effects of the image decomposition level and observed that the
decomposition level of 3 produced better fusion results than both smaller and greater number of levels.
Last, we created four different fusion scenarios to examine the importance of the image registration. As a
result, the feature-based image registration using the edge features of the source images produced better
fusion results than the intensity-based imageregistration.
Detection of Bridges using Different Types of High Resolution Satellite Imagesidescitation
Automatic detection of geographical objects such as roads, buildings and bridges
from remote sensing imagery is a very meaningful but difficult work. Bridges over water is
a typical geographical object and its automatic detection is of great significance for many
applications. Finding Region Of Interest (ROI) having water areas alone is the most crucial
task in bridge detection. This can be done with image processing / soft computing methods
using images in spatial domain or with Normalized Differential Water Index (NDWI) using
images in spectral domain. We have developed an efficient algorithm for bridge detection
where the ROI segmentation is done using both methods. Exact locations of bridges are
obtained by knowledge models and spatial resolution of the image. These knowledge models
are applied in the algorithm in such a way that the thresholds are automatically fixed
depending on the quality of the image. Using the algorithm any type of bridges are extracted
irrespective of their inclination and shape.
International Journal of Engineering Research and Development (IJERD)IJERD Editor
journal publishing, how to publish research paper, Call For research paper, international journal, publishing a paper, IJERD, journal of science and technology, how to get a research paper published, publishing a paper, publishing of journal, publishing of research paper, reserach and review articles, IJERD Journal, How to publish your research paper, publish research paper, open access engineering journal, Engineering journal, Mathemetics journal, Physics journal, Chemistry journal, Computer Engineering, Computer Science journal, how to submit your paper, peer reviw journal, indexed journal, reserach and review articles, engineering journal, www.ijerd.com, research journals,
yahoo journals, bing journals, International Journal of Engineering Research and Development, google journals, hard copy of journal
International Journal of Computational Engineering Research (IJCER) is dedicated to protecting personal information and will make every reasonable effort to handle collected information appropriately. All information collected, as well as related requests, will be handled as carefully and efficiently as possible in accordance with IJCER standards for integrity and objectivity.
Noise resistance territorial intensity-based optical flow using inverse confi...journalBEEI
This paper presents the use of the inverse confidential technique on bilateral function with the territorial intensity-based optical flow to prove the effectiveness in noise resistance environment. In general, the image’s motion vector is coded by the technique called optical flow where the sequences of the image are used to determine the motion vector. But, the accuracy rate of the motion vector is reduced when the source of image sequences is interfered by noises. This work proved that the inverse confidential technique on bilateral function can increase the percentage of accuracy in the motion vector determination by the territorial intensity-based optical flow under the noisy environment. We performed the testing with several kinds of non-Gaussian noises at several patterns of standard image sequences by analyzing the result of the motion vector in a form of the error vector magnitude (EVM) and compared it with several noise resistance techniques in territorial intensity-based optical flow method.
Transmission error propagation in wireless multimedia communication systems has become a recurring
problem. This persistent problem has led to grave consequences on the visual quality of the decoded video.
It is against this backdrop that, we present an adaptive intra refresh (AIR) error-resilient coding tool to
mitigate the effect of transmission error propagation in 3D video communications. This work utilizes
periodic insertion of intra macroblocks in badly error-infected frames temporally as well as related frames
in the multi view video scheme. Our objective is to maximize the transmission efficiency while ensuring the
transmission robustness of the coded bitstream. The selection of periodic macroblocks is based on areas
with high motion above a pre-set threshold. The coding modes of the macroblocks are based on the
distortion expectation due to transmission errors. Extensive simulation results show significant
improvement in both objective and subjective video quality at different intra refresh rates.
Robust Adaptive Intra Refresh for Multiview VideoIJCSEA Journal
Transmission error propagation in wireless multimedia communication systems has become a recurring problem. This persistent problem has led to grave consequences on the visual quality of the decoded video. It is against this backdrop that, we present an adaptive intra refresh (AIR) error-resilient coding tool to mitigate the effect of transmission error propagation in 3D video communications. This work utilizes periodic insertion of intra macroblocks in badly error-infected frames temporally as well as related frames in the multi view video scheme. Our objective is to maximize the transmission efficiency while ensuring the transmission robustness of the coded bitstream. The selection of periodic macroblocks is based on areas with high motion above a pre-set threshold. The coding modes of the macroblocks are based on the distortion expectation due to transmission errors. Extensive simulation results show significant improvement in both objective and subjective video quality at different intra refresh rates
Comparison of Wavelet Watermarking Method With & without Estimator Approachijsrd.com
In this paper we propose an Estimator approach with wavelet watermarking method which is capable to hide watermark in the host image based on wavelet domain technique. Using the Estimator approach the proposed technique becomes robust against different noise attacks. For the evaluation of Imperceptibility & Robustness of the proposed method we have calculated basic statistical parameters. We have tested watermarked image against different noise attacks at different noise densities. Due to the use of estimator the perceptible quality of extracted image is better though the image is degraded by high density noise.
EFFICIENT IMAGE COMPRESSION USING LAPLACIAN PYRAMIDAL FILTERS FOR EDGE IMAGESijcnac
This project presents a new image compression technique for the coding of retinal and
fingerprint images. Retinal images are used to detect diseases like diabetes or
hypertension. Fingerprint images are used for the security purpose. In this work, the
contourlet transform of the retinal and fingerprint image is taken first. The coefficients of
the contourlet transform are quantized using adaptive multistage vector quantization
scheme. The number of code vectors in the adaptive vector quantization scheme depends
on the dynamic range of the input image.
Single image super resolution with improved wavelet interpolation and iterati...iosrjce
IOSR journal of VLSI and Signal Processing (IOSRJVSP) is a double blind peer reviewed International Journal that publishes articles which contribute new results in all areas of VLSI Design & Signal Processing. The goal of this journal is to bring together researchers and practitioners from academia and industry to focus on advanced VLSI Design & Signal Processing concepts and establishing new collaborations in these areas.Design and realization of microelectronic systems using VLSI/ULSI technologies require close collaboration among scientists and engineers in the fields of systems architecture, logic and circuit design, chips and wafer fabrication, packaging, testing and systems applications. Generation of specifications, design and verification must be performed at all abstraction levels, including the system, register-transfer, logic, circuit, transistor and process levels.
Empirical Evaluation of Decomposition Strategy for Wavelet Video CompressionCSCJournals
Abstract The wavelet transform has become the most interesting new algorithm for video compression. Yet there are many parameters within a wavelet analysis and synthesis which govern the quality of a decoded video. In this paper different wavelet decomposition strategies and their implications for the decoded video are discussed. A pool of color video sequences has been wavelet-transformed at different settings of the wavelet filter bank and quantization threshold and with decomposition of dyadic and packet wavelet transformation strategies. The empirical evaluation of the decomposition strategy is based on three benchmarks: a first judgment regards the perceived quality of the decoded video. The compression rate is a second crucial factor, and finally the best parameter setting with regards to the Peak Signal to Noise Ratio (PSNR). The investigation proposes dyadic decomposition as the chosen decomposition strategy.
Image Watermarking in Spatial Domain Using QIM and Genetic Algorithmijsrd.com
Digital watermarking is one of the proposed solutions for copyright protection of multimedia data. A watermark is a form of image or text that is impressed onto paper, which provides evidence of its authenticity. A digital watermark is digital data embedded in some host document so as to later prove the ownership of the document. Digital image watermarking refers to digital data embedding in images. Robust image watermarking systems are required so that watermarked images can resist geometric attacks in addition to common image processing tasks, such as JPEG compression. Least Significant Bit (LSB) watermarking, is one of the most traditional method of watermarking which changes the LSB of individual pixels in correlation with the watermark. However, pure LSB scheme provides a fragile watermarking technique which is not acceptable in practical applications. Also, robustness against geometric attacks, such as rotation, scaling and translation, still remains one of the most challenging research topics in pixel based image watermarking. In this paper, a new pixel-based watermarking system is proposed, in which a binary logo is embedded, a bit per pixel, in the pixel domain of an image. The LSB based watermarking is then quantized using QIM, augmented with genetic algorithm to produce a watermarking scheme which is highly robust against geometrical attacks.
International Journal of Engineering Research and Development (IJERD)IJERD Editor
journal publishing, how to publish research paper, Call For research paper, international journal, publishing a paper, IJERD, journal of science and technology, how to get a research paper published, publishing a paper, publishing of journal, publishing of research paper, reserach and review articles, IJERD Journal, How to publish your research paper, publish research paper, open access engineering journal, Engineering journal, Mathemetics journal, Physics journal, Chemistry journal, Computer Engineering, Computer Science journal, how to submit your paper, peer reviw journal, indexed journal, reserach and review articles, engineering journal, www.ijerd.com, research journals,
yahoo journals, bing journals, International Journal of Engineering Research and Development, google journals, hard copy of journal
PERCEPTUAL COPYRIGHT PROTECTION USING MULTIRESOLUTION WAVELET-BASED WATERMARK...gerogepatton
In this paper, an efficiently DWT-based watermarking technique is proposed to embed signatures in images to attest the owner identification and discourage the unauthorized copying. This paper deals with a fuzzy inference filter to choose the larger entropy of coefficients to embed watermarks. Unlike most previous watermarking frameworks which embedded watermarks in the larger coefficients of inner coarser subbands, the proposed technique is based on utilizing a context model and fuzzy inference filter by embedding watermarks in the larger-entropy coefficients of coarser DWT subbands. The proposed approaches allow us to embed adaptive casting degree of watermarks for transparency and robustness to the general image-processing attacks such as smoothing, sharpening, and JPEG compression. The approach has no need the original host image to extract watermarks. Our schemes have been shown to provide very good results in both image transparency and robustness.
Robust Image Watermarking Scheme Based on Wavelet TechniqueCSCJournals
In this paper, an image watermarking scheme based on multi bands wavelet transformation method is proposed. At first, the proposed scheme is tested on the spatial domain (for both a non and semi blind techniques) in order to compare its results with a frequency domain. In the frequency domain, an adaptive scheme is designed and implemented based on the bands selection criteria to embed the watermark. These criteria depend on the number of wavelet passes. In this work three methods are developed to embed the watermark (one band (LL|HH|HL|LH), two bands (LL&HH | LL&HL | LL&LH | HL&LH | HL&HH | LH&HH) and three bands (LL&HL&LH | LL&HH&HL | LL&HH&LH | LH&HH&HL) selection. The analysis results indicate that the performance of the proposed watermarking scheme for the non-blind scheme is much better than semi-blind scheme in terms of similarity of extracted watermark, while the security of semi-blind is relatively high. The results show that in frequency domain when the watermark is added to the two bands (HL and LH) for No. of pass =3 led to good correlation between original and extracted watermark around (similarity = 99%), and leads to reconstructed images of good objective quality (PSNR=24 dB) after JPEG compression attack (QF=25). The disadvantage of the scheme is the involvement of a large number of wavelet bands in the embedding process.
Enhanced Hashing Approach For Image Forgery Detection With Feature Level FusionIJTET Journal
Image forgery detection and its accuracy are addressed in the proposed work. The image authentication process aims at finding the originality of an image. Due to the advent of many image editing software image tampering has become common. The Enhanced hashing approach is suggested for image authentication. The concept of Hashing has been used for searching images from large databases. It can also be applied to image authentication as it produces different results with respect to the change in image. But the hashing methods used for similarity searches cannot be used for image authentication since they are no sensitive for small changes. Moreover, we need a system that detects only perceptual changes. A new hashing method, namely, enhanced robust hashing is proposed for image authentication, which uses global and local properties of an image. This method is developed for detecting image forgery, including removal, insertion, and replacement of objects, and abnormal color modification, and for locating the forged area. The local models include position and texture information of object regions in the image. The hash mechanism uses secret keys for encryption and decryption. IP tracing is done to track the suspicious nodes.
it is used for security purpose using two level dct and wavelet packet denoising .based on digital image processing.the software based on matlab.it is used for high security purpose.
Robust Digital Image-Adaptive Watermarking Using BSS BasedCSCJournals
In a digital watermarking scheme, it is not convenient to carry the original image all the time in order to detect the owner's signature from the watermarked image. Moreover, for those applications that require different watermark for different copies, it is preferred to utilize some kind of watermark-independent algorithm for extraction process i.e. dewatermarking. Watermark embedding is performed in the blue channel, as it is less sensitive to human visual system .This paper proposes a new color image watermarking method ,which adopts Blind Source Separation (BSS) technique for watermark extraction. Single level Discrete Wavelet Transform(DWT) is used for embedding . The novelty of our scheme lies in determining the mixing matrix for BSS model during embedding. The determination of mixing matrix using Quasi-Newton’s (BFGS) technique is based on texture analysis which uses energy as metric. This makes our method image adaptive to embed the watermark into original image so as not to bring about a perceptible change in the marked image. BSS based on Joint diagonalization of the time delayed covariance matrices algorithm is used for the extraction of watermark. The proposed method, undergoing different experiments, has shown its robustness against many attacks including rotation ,low pass filtering, salt n pepper noise addition and compression. The robustness evaluation is also carried out with respect to the spatial domain embedding.
A Wavelet Based Hybrid SVD Algorithm for Digital Image Watermarkingsipij
In this paper we propose a hybrid image watermarking algorithm which satisfies both imperceptibility and robustness requirements. Our proposed work provide an optimum solution by using singular values of Wavelet Transformation’s HL and LH sub bands to embed watermark. Further to increase and control the strength of the watermark, we use a scale factor. An optimal watermark embedding method is developed to achieve minimum watermarking distortion. A secret embedding key is designed to securely embed the fragile watermarks so that the new method is robust to counterfeiting, even when the malicious attackers are fully aware of the watermark embedding algorithm. Experimental results are provided in terms of peak signal to noise ratio (PSNR), normalized cross correlation (NCC) and gain factor to demonstrate the effectiveness of the proposed algorithm. Image operations such as JPEG compression from malicious image attacks and, thus, can be used for semi-fragile watermarking.
SVD Based Robust Digital Watermarking For Still Images Using Wavelet Transform cscpconf
This paper aims at developing a hybrid image watermarking algorithm which satisfies both
imperceptibility and robustness requirements. In order to achieve our objectives we have used
singular values of Wavelet Transformation’s HL and LH sub bands to embed watermark.
Further to increase and control the strength of the watermark, we use a scale factor. An optimal
watermark embedding method is developed to achieve minimum watermarking distortion. A
secret embedding key is designed to securely embed the fragile watermarks so that the new
method is robust to counterfeiting, even when the malicious attackers are fully aware of the
watermark embedding algorithm. Experimental results are provided in terms of Peak signal to
noise ratio (PSNR), Normalized cross correlation (NCC) and gain factor to demonstrate the
effectiveness of the proposed algorithm. Image operations such as JPEG compression from
malicious image attacks and, thus, can be used for semi-fragile watermarking
Digital Image Watermarking Based On Gradient Direction Quantization and Denoi...IJERA Editor
Digital watermarking is the art of hiding of information or data in documents, where the embedded information
or data can be extracted to resist copyright violation or to verify the uniqueness of a document which leads to
security. Protecting the digital content has become a major issue for content owners and service providers.
Watermarking using gradient direction quantization is based on the uniform quantization of the direction of
gradient vectors, which is called gradient direction watermarking (GDWM). In GDWM, the watermark bits are
embedded by quantizing the angles of significant gradient vectors at multiple wavelet scales. The proposed
scheme has the advantages of increased invisibility and robustness to amplitude scaling effects. The DWT
coefficients are modified to quantize the gradient direction based on the on the derived relationship between the
changes in the coefficients and the change in the gradient direction. In this paper, we propose a novel explicit
image filter called guided filter. It is derived from a local linear model that computes the filtering output using
the content of guidance image, which can be the input image itself or any other different image. The guided
filter naturally has a fast and non approximate linear time algorithm, regardless of the kernel size and the
intensity range. Finally, we show simulation results of denoising method using guided image filtering over
bilateral filtering
International Journal of Computational Engineering Research (IJCER) is dedicated to protecting personal information and will make every reasonable effort to handle collected information appropriately. All information collected, as well as related requests, will be handled as carefully and efficiently as possible in accordance with IJCER standards for integrity and objectivity
This paper presents a rotation scale invariant digital
color image watermarking technique using Scale Invariant
Feature Transform (SIFT) which is invariant to geometric
transformation. The image descriptors extracted using SIFT
transform of original image and watermarked image are used
for estimating the scaling factor and angle of rotation of
attacked image. Using estimated factors attacked image is
then restored to its original size for synchronization purpose.
As a result of synchronization, watermark detection is done
correctly. In proposed approach the offline signature, which is
a biometric characteristics of owner is embedded in second
level detailed coefficients of discrete wavelet transform of
cover image. The simulation results show that the algorithm
is robust against signal processing and geometric attack.
A DIGITAL COLOR IMAGE WATERMARKING SYSTEM USING BLIND SOURCE SEPARATIONcscpconf
An attempt is made to implement a digital color image-adaptive watermarking scheme in spatial domain and hybrid domain i.e host image in wavelet domain and watermark in spatial
domain. Blind Source Separation (BSS) is used to extract the watermark The novelty of the presented scheme lies in determining the mixing matrix for BSS model using BFGS (Broyden–Fletcher–Goldfarb–Shanno) optimization technique. This method is based on the smooth and textured portions of the image. Texture analysis is carried based on energy content of the image (using GLCM) which makes the method image adaptive to embed color watermark. The performance evaluation is carried for hybrid domain of various color spaces like YIQ, HSI and YCbCr and the feasibility of optimization algorithm for finding mixing matrix is also checked for these color spaces. Three ICA (Independent Component Analysis)/BSS algorithms are used in extraction procedure ,through which the watermark can be retrieved efficiently . An
effort is taken to find out the best suited color space to embed the watermark which satisfies the condition of imperceptibility and robustness against various attacks.
A DIGITAL COLOR IMAGE WATERMARKING SYSTEM USING BLIND SOURCE SEPARATIONcsandit
An attempt is made to implement a digital color image-adaptive watermarking scheme in
spatial domain and hybrid domain i.e host image in wavelet domain and watermark in spatial
domain. Blind Source Separation (BSS) is used to extract the watermark The novelty of the
presented scheme lies in determining the mixing matrix for BSS model using BFGS (Broyden–
Fletcher–Goldfarb–Shanno) optimization technique. This method is based on the smooth and
textured portions of the image. Texture analysis is carried based on energy content of the
image (using GLCM) which makes the method image adaptive to embed color watermark.
The performance evaluation is carried for hybrid domain of various color spaces like YIQ, HSI
and YCbCr and the feasibility of optimization algorithm for finding mixing matrix is also
checked for these color spaces. Three ICA (Independent Component Analysis)/BSS algorithms
are used in extraction procedure ,through which the watermark can be retrieved efficiently . An
effort is taken to find out the best suited color space to embed the watermark which satisfies the
condition of imperceptibility and robustness against various attacks.
VARIATION-FREE WATERMARKING TECHNIQUE BASED ON SCALE RELATIONSHIPcscpconf
Most watermark methods use pixel values or coefficients as the judgment condition to embed or
extract a watermark image. The variation of these values may lead to the inaccurate condition
such that an incorrect judgment has been laid out. To avoid this problem, we design a stable
judgment mechanism, in which the outcome will not be seriously influenced by the variation.
The principle of judgment depends on the scale relationship of two pixels. From the observation
of common signal processing operations, we can find that the pixel value of processed image
usually keeps stable unless an image has been manipulated by cropping attack or halftone
transformation. This can greatly help reduce the modification strength from image processing
operations. Experiment results show that the proposed method can resist various attacks and
keep the image quality friendly.
SECURED COLOR IMAGE WATERMARKING TECHNIQUE IN DWT-DCT DOMAIN ijcseit
The multilayer secured DWT-DCT and YIQ color space based image watermarking technique with
robustness and better correlation is presented here. The security levels are increased by using multiple pn
sequences, Arnold scrambling, DWT domain, DCT domain and color space conversions. Peak signal to
noise ratio and Normalized correlations are used as measurement metrics. The 512x512 sized color images
with different histograms are used for testing and watermark of size 64x64 is embedded in HL region of
DWT and 4x4 DCT is used. ‘Haar’ wavelet is used for decomposition and direct flexing factor is used. We
got PSNR value is 63.9988 for flexing factor k=1 for Lena image and the maximum NC 0.9781 for flexing
factor k=4 in Q color space. The comparative performance in Y, I and Q color space is presented. The
technique is robust for different attacks like scaling, compression, rotation etc.
Abstract: The increasing amount of applications using digital multimedia technologies has accentuated the need to provide copyright protection to multimedia data. This paper reviews one of the data hiding techniques - digital image watermarking. Through this paper we will explore some basic concepts of digital image watermarking techniques.Two different methods of digital image watermarking namely spatial domain watermarking and transform domain watermarking are briefly discussed in this paper. Furthermore, two different algorithms for a digital image watermarking have also been discussed. Also the comparision between the different algorithms,tests performed for the robustness and the applications of the digital image watermarking have also been discussed.
Multiple Binary Images Watermarking in Spatial and Frequency Domainssipij
Editing, reproduction and distribution of the digital multimedia are becoming extremely easier and faster with the existence of the internet and the availability of pervasive and powerful multimedia tools. Digital watermarking has emerged as a possible method to tackle these issues. This paper proposes a scheme using which more data can be inserted into an image in different domains using different techniques. This increases the embedding capacity. Using the proposed scheme 24 binary images can be embedded in the DCT domain and 12 binary images can be embedded in the spatial domain using LSB substitution technique in a single RGB image. The proposed scheme also provides an extra level of security to the watermark image by scrambling the image before embedding it into the host image. Experimental results show that the proposed watermarking method results in almost invisible difference between the watermarked image and the original image and is also robust against various image processing attacks.
IJRET : International Journal of Research in Engineering and Technology is an international peer reviewed, online journal published by eSAT Publishing House for the enhancement of research in various disciplines of Engineering and Technology. The aim and scope of the journal is to provide an academic medium and an important reference for the advancement and dissemination of research results that support high-level learning, teaching and research in the fields of Engineering and Technology. We bring together Scientists, Academician, Field Engineers, Scholars and Students of related fields of Engineering and Technology
Similar to ROBUST COLOUR IMAGE WATERMARKING SCHEME BASED ON FEATURE POINTS AND IMAGE NORMALIZATION IN DCT DOMAIN (20)
Generating a custom Ruby SDK for your web service or Rails API using Smithyg2nightmarescribd
Have you ever wanted a Ruby client API to communicate with your web service? Smithy is a protocol-agnostic language for defining services and SDKs. Smithy Ruby is an implementation of Smithy that generates a Ruby SDK using a Smithy model. In this talk, we will explore Smithy and Smithy Ruby to learn how to generate custom feature-rich SDKs that can communicate with any web service, such as a Rails JSON API.
State of ICS and IoT Cyber Threat Landscape Report 2024 previewPrayukth K V
The IoT and OT threat landscape report has been prepared by the Threat Research Team at Sectrio using data from Sectrio, cyber threat intelligence farming facilities spread across over 85 cities around the world. In addition, Sectrio also runs AI-based advanced threat and payload engagement facilities that serve as sinks to attract and engage sophisticated threat actors, and newer malware including new variants and latent threats that are at an earlier stage of development.
The latest edition of the OT/ICS and IoT security Threat Landscape Report 2024 also covers:
State of global ICS asset and network exposure
Sectoral targets and attacks as well as the cost of ransom
Global APT activity, AI usage, actor and tactic profiles, and implications
Rise in volumes of AI-powered cyberattacks
Major cyber events in 2024
Malware and malicious payload trends
Cyberattack types and targets
Vulnerability exploit attempts on CVEs
Attacks on counties – USA
Expansion of bot farms – how, where, and why
In-depth analysis of the cyber threat landscape across North America, South America, Europe, APAC, and the Middle East
Why are attacks on smart factories rising?
Cyber risk predictions
Axis of attacks – Europe
Systemic attacks in the Middle East
Download the full report from here:
https://sectrio.com/resources/ot-threat-landscape-reports/sectrio-releases-ot-ics-and-iot-security-threat-landscape-report-2024/
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024Tobias Schneck
As AI technology is pushing into IT I was wondering myself, as an “infrastructure container kubernetes guy”, how get this fancy AI technology get managed from an infrastructure operational view? Is it possible to apply our lovely cloud native principals as well? What benefit’s both technologies could bring to each other?
Let me take this questions and provide you a short journey through existing deployment models and use cases for AI software. On practical examples, we discuss what cloud/on-premise strategy we may need for applying it to our own infrastructure to get it to work from an enterprise perspective. I want to give an overview about infrastructure requirements and technologies, what could be beneficial or limiting your AI use cases in an enterprise environment. An interactive Demo will give you some insides, what approaches I got already working for real.
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...James Anderson
Effective Application Security in Software Delivery lifecycle using Deployment Firewall and DBOM
The modern software delivery process (or the CI/CD process) includes many tools, distributed teams, open-source code, and cloud platforms. Constant focus on speed to release software to market, along with the traditional slow and manual security checks has caused gaps in continuous security as an important piece in the software supply chain. Today organizations feel more susceptible to external and internal cyber threats due to the vast attack surface in their applications supply chain and the lack of end-to-end governance and risk management.
The software team must secure its software delivery process to avoid vulnerability and security breaches. This needs to be achieved with existing tool chains and without extensive rework of the delivery processes. This talk will present strategies and techniques for providing visibility into the true risk of the existing vulnerabilities, preventing the introduction of security issues in the software, resolving vulnerabilities in production environments quickly, and capturing the deployment bill of materials (DBOM).
Speakers:
Bob Boule
Robert Boule is a technology enthusiast with PASSION for technology and making things work along with a knack for helping others understand how things work. He comes with around 20 years of solution engineering experience in application security, software continuous delivery, and SaaS platforms. He is known for his dynamic presentations in CI/CD and application security integrated in software delivery lifecycle.
Gopinath Rebala
Gopinath Rebala is the CTO of OpsMx, where he has overall responsibility for the machine learning and data processing architectures for Secure Software Delivery. Gopi also has a strong connection with our customers, leading design and architecture for strategic implementations. Gopi is a frequent speaker and well-known leader in continuous delivery and integrating security into software delivery.
Neuro-symbolic is not enough, we need neuro-*semantic*Frank van Harmelen
Neuro-symbolic (NeSy) AI is on the rise. However, simply machine learning on just any symbolic structure is not sufficient to really harvest the gains of NeSy. These will only be gained when the symbolic structures have an actual semantics. I give an operational definition of semantics as “predictable inference”.
All of this illustrated with link prediction over knowledge graphs, but the argument is general.
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...DanBrown980551
Do you want to learn how to model and simulate an electrical network from scratch in under an hour?
Then welcome to this PowSyBl workshop, hosted by Rte, the French Transmission System Operator (TSO)!
During the webinar, you will discover the PowSyBl ecosystem as well as handle and study an electrical network through an interactive Python notebook.
PowSyBl is an open source project hosted by LF Energy, which offers a comprehensive set of features for electrical grid modelling and simulation. Among other advanced features, PowSyBl provides:
- A fully editable and extendable library for grid component modelling;
- Visualization tools to display your network;
- Grid simulation tools, such as power flows, security analyses (with or without remedial actions) and sensitivity analyses;
The framework is mostly written in Java, with a Python binding so that Python developers can access PowSyBl functionalities as well.
What you will learn during the webinar:
- For beginners: discover PowSyBl's functionalities through a quick general presentation and the notebook, without needing any expert coding skills;
- For advanced developers: master the skills to efficiently apply PowSyBl functionalities to your real-world scenarios.
Essentials of Automations: Optimizing FME Workflows with ParametersSafe Software
Are you looking to streamline your workflows and boost your projects’ efficiency? Do you find yourself searching for ways to add flexibility and control over your FME workflows? If so, you’re in the right place.
Join us for an insightful dive into the world of FME parameters, a critical element in optimizing workflow efficiency. This webinar marks the beginning of our three-part “Essentials of Automation” series. This first webinar is designed to equip you with the knowledge and skills to utilize parameters effectively: enhancing the flexibility, maintainability, and user control of your FME projects.
Here’s what you’ll gain:
- Essentials of FME Parameters: Understand the pivotal role of parameters, including Reader/Writer, Transformer, User, and FME Flow categories. Discover how they are the key to unlocking automation and optimization within your workflows.
- Practical Applications in FME Form: Delve into key user parameter types including choice, connections, and file URLs. Allow users to control how a workflow runs, making your workflows more reusable. Learn to import values and deliver the best user experience for your workflows while enhancing accuracy.
- Optimization Strategies in FME Flow: Explore the creation and strategic deployment of parameters in FME Flow, including the use of deployment and geometry parameters, to maximize workflow efficiency.
- Pro Tips for Success: Gain insights on parameterizing connections and leveraging new features like Conditional Visibility for clarity and simplicity.
We’ll wrap up with a glimpse into future webinars, followed by a Q&A session to address your specific questions surrounding this topic.
Don’t miss this opportunity to elevate your FME expertise and drive your projects to new heights of efficiency.
Securing your Kubernetes cluster_ a step-by-step guide to success !KatiaHIMEUR1
Today, after several years of existence, an extremely active community and an ultra-dynamic ecosystem, Kubernetes has established itself as the de facto standard in container orchestration. Thanks to a wide range of managed services, it has never been so easy to set up a ready-to-use Kubernetes cluster.
However, this ease of use means that the subject of security in Kubernetes is often left for later, or even neglected. This exposes companies to significant risks.
In this talk, I'll show you step-by-step how to secure your Kubernetes cluster for greater peace of mind and reliability.
Connector Corner: Automate dynamic content and events by pushing a buttonDianaGray10
Here is something new! In our next Connector Corner webinar, we will demonstrate how you can use a single workflow to:
Create a campaign using Mailchimp with merge tags/fields
Send an interactive Slack channel message (using buttons)
Have the message received by managers and peers along with a test email for review
But there’s more:
In a second workflow supporting the same use case, you’ll see:
Your campaign sent to target colleagues for approval
If the “Approve” button is clicked, a Jira/Zendesk ticket is created for the marketing design team
But—if the “Reject” button is pushed, colleagues will be alerted via Slack message
Join us to learn more about this new, human-in-the-loop capability, brought to you by Integration Service connectors.
And...
Speakers:
Akshay Agnihotri, Product Manager
Charlie Greenberg, Host
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...UiPathCommunity
💥 Speed, accuracy, and scaling – discover the superpowers of GenAI in action with UiPath Document Understanding and Communications Mining™:
See how to accelerate model training and optimize model performance with active learning
Learn about the latest enhancements to out-of-the-box document processing – with little to no training required
Get an exclusive demo of the new family of UiPath LLMs – GenAI models specialized for processing different types of documents and messages
This is a hands-on session specifically designed for automation developers and AI enthusiasts seeking to enhance their knowledge in leveraging the latest intelligent document processing capabilities offered by UiPath.
Speakers:
👨🏫 Andras Palfi, Senior Product Manager, UiPath
👩🏫 Lenka Dulovicova, Product Program Manager, UiPath
2. 218 Computer Science & Information Technology (CS & IT)
embedded into the green component. This is because the loss of energy of the blue and red
components is higher than the green component when the watermarked image is attacked by
JPEG compression. However, the human eye is more sensitive to changes in the green band.
Barni et al. [7] introduced another colour image watermarking method based on the cross-
correlation of RGB channels. However, it has relative high computing costs and low processing
speed since the full-frame DCT is used for three colour channels. Kutter at al. [8] investigated
watermarking of luminance and blue-channels using a perceptual model, which takes into account
the sensitivity and the masking behaviour of the HVS. Nasir et al. [9] suggested embedding the
watermark into luminance component of the color image and use image normalization technique
to reduce the effect of synchronization errors. However, this method cannot resist cropping
attacks. Several grey-scale image watermarking methods have been developed to overcome of
synchronization errors caused by geometric attacks. These methods can be roughly classified into
template-based, invariant transform domain–based, moment-based, histogram-based, and feature
extraction-based methods. The template-based watermarking methods are based on embedding a
template in addition to the watermark to assist the watermark synchronization in the detection
process. This may be achieved using a structured template embedded in the DFT domain to
estimate transformation factor to resynchronize the image [10-12]. In [13-14], watermarks are
embedded in affine-invariant domains such as the Fourier-Mellin transform or log-polar domain
to achieve robustness against affine transforms. In [15, 16], the watermark is embedded in an
affine-invariant domain by using generalized random transform and Zernike moment,
respectively. However, watermarking methods involving invariant domains are difficult to
implement due to the log-polar mapping [17]. Based on the fact, that the histogram is independent
of the position of the pixels, the authors in [18, 19] presented histogram-based watermarking
approaches. However, these approaches suffer from robustness limitations under histogram
enhancement and equalization attacks. To overcome the issue of synchronization, feature points
are used as reference points for both watermark embedding and detection. In [20], Mexican hat
wavelet method is used to extract feature points. In [21, 22], the Harris detector is used to extract
the feature points. However, Mexican hat wavelet or Harris detector are sensitive to image
modification. In [23], the end-stopped wavelets feature detector is used to extract feature points.
To resist image geometric attacks and to eliminate synchronization errors between the watermark
embedding and the detection, this paper presents a robust color image watermarking scheme,
which combines the advantages of feature points extraction and image normalization and
investigates watermarking of luminance and blue-channels by modifying the DCT coefficients
values in selected blocks.
The rest of this paper is structured as follows. Section 2 describes the proposed watermarking
scheme and section 3 presents experimental results. Conclusions are drawn in section 4.
2. THE PROPOSED WATERMARKING SCHEME
The block diagram shown in Fig. 1 provides an overview of the proposed watermarking scheme.
First, the Luminance (Y) component in YIQ (Luminance, Hue, and Saturation) or the blue
component in RGB (Red, Green, and Blue) color models is obtained from the original image for
embedding the watermark; second, wavelet based feature detector is utilized to extract steady
feature points from the B or Y component of the original image; then the circular regions are
normalized by image normalization process. To enhance the robustness, the watermark bits are
embedded into all circular images. Finally, the watermarked image is reconstructed. During the
detection process, we claim the existence of the watermark if one copy of the embedded
watermark is correctly detected in one embedding circular region.
3. Computer Science & Information Technology (CS & IT) 219
Figure 1. Watermark embedding scheme
2.1. Feature Extraction Detector
Monga et al, [24] proposed an iterative feature detector to extract significant geometry preserving
feature points. The detector determine the feature points by computing a wavelet transform based
on an end-stopped wavelets obtained by applying the first-derivative of Gaussian (FDoG)
operator to the Morlet wavelet. Monga et al, [24] evaluate the performance of this detector with
three commonly used detectors that are Harris corner detector, the maximally stable extremaly
region (MSER) detector and Hessian Affine and conclude the feature detector based on end-
stopped wavelets is the most robust. Therefore, in the present scheme, this detector has been
adopted to extract the feature points. The feature detection process can be divided into the
following steps:
(i) For each image location, the wavelet transform is computed as given in reference
[24]
(ii) The significant features points are identified by looking for local maxima of the
magnitude of the wavelet coefficients in a pre-selected neighbourhood.
(iii) A threshold is applied to eliminate spurious local maxima in featureless regions of the
image.
To determine the regions for each determined feature point for embedding the watermark, a
search is carried out within a circular neighbouring region whose radius is set to be R. If the
detector response at the centre of the region achieves local maximum, the feature point is
selected. Otherwise, it is discarded. To obtain non-overlapping regions, the most stable feature
points are first selected. Then, any feature points whose corresponding region overlaps with the
selected feature points are excluded.
2.2. Image Normalization
Synchronization errors between the embedding and the detection of the watermark may be
introduced by geometric attacks such as rotation, shearing and translation and although the
watermark is still present in the watermarked image, it can no longer be detected. Image
4. 220 Computer Science & Information Technology (CS & IT)
normalization techniques developed for pattern recognition [25] can be used to overcome this
problem as suggested in [26]. In the proposed scheme, an image normalization technique is
performed on extracted circular images.
2.3. Watermarking Embedding Process
We assume that the watermark of length wN is a binary and denoted by
}{ )1,0(w,N,.....,1i,wW iwi ∈== , which is a key-based PN sequence. The private key is shared with
the detector to make decision whether a given watermark is present or not. The watermark is
embedded into DCT coefficients of M×M block. The proposed watermark embedding process is
described as follows.
• The Luminance (Y) component or the blue component of the original image is selected to
embed the watermark.
• The feature detector based on end-stopped wavelets is applied to the image to determine
the feature points as described in section 2. These feature points are used for the reference
centers of circular subimages for watermark embedding and detection.
• For each determined feature points, search within a circular neighbouring region, whose
radius is set to be R to extract non overlapped circular images for embedding the
watermark.
• The normalization process is applied to each extracted circular image.
• The normalized circular image can not be transferred directly into frequency domain.
Therefore zero-padding operation could be performed on the normalized circular image.
In the proposed method, a subimage is extracted from the normalized circular image
because zero-padding operation will introduce error after applying the inverse DCT
transform method.
• The discrete cosine transform (DCT) is applied to a selected 8×8 blocks of the sub-
images.
• To achieve robustness against common signal processing attacks, the low frequency
coefficient of the selected DCT block is used to embed the watermark. In the proposed
scheme, the DC coefficients are kept unmodified and the first four AC coefficients in
zigzag order are selected to embed the watermark. In order to reduce the visual
degradation on the watermarked image, the number of AC coefficients for embedding a
watermark bit in each selected DCT blocks is set to 4. This is because using more
coefficients for embedding a watermark bit will cause more distortions of the
watermarked image.
The watermark embedding process is carried out by quantizing the absolute value of the
second largest DCT coefficients in the selected DCT blocks to the nearest values 0M or
1M as shown in Figure 2 by dashed vertical lines. The watermark embedding algorithm
can be described as follows:
Firstly, the length of embedding intervals for bit 0 and bit 1 is defined as given in (1)
L
AC
LL
1
10 == (1)
where 0L and 1L are the length of embedding intervals for bit 0 and bit 1, respectively. L
represents the number of embedding intervals and 1AC is the absolute value of the largest
DCT coefficients selected from the first four AC coefficients in zigzag order. Secondly,
to embed watermark bit 0 or bit 1, the absolute value of the second largest DCT
5. Computer Science & Information Technology (CS & IT) 221
coefficient 2AC is quantized to the nearest 0M to embed ‘0’ or to the nearest 1M to embed
‘1’ as follows:
=
=
otherwiseM
0wifM
AC
1
0*
2
(2)
Where *
2AC is the watermarked coefficient, 0M and 1M are the middle values of the
quantization level ‘0’ and level ‘1’, respectively. The 3AC and 4AC coefficients are only
quantized to the value *
2AC if they are greater than the watermarked coefficient *
2AC . The
signs of the watermarked coefficients are determined as given in (3)
<−
=
otherwiseAC
0ACifAC
AC *
2
2
*
2*
2
(3)
The watermarked subimages are obtained by applying the IDCT transform. Finally, the
inverse normalized process is applied to each watermarked circular image and the
watermarked image is reconstructed.
0L 1L
0M 1M 1AC1M 0M
0L1L
Figure 2 Quantization process for watermarking
Watermark Extraction process
2.4. Watermark Extraction Process
The proposed watermark extraction process is performed without use of the original image. In
the extraction process, the first six steps are similar to that used in the watermark embedding
process. The watermark bit is extracted as given in (4)
∈
∈
=
1
*
2
0
*
2*
i
LACif1
LACif0
W (4)
where *
2AC is the absolute values of the second largest DCT coefficients of the first four AC
coefficients in the selected DCT blocks of size 8×8. The AC coefficients are selected in zigzag
order, *
iW is the extracted watermark bit and 0L and 1L are the embedding intervals for bits 0 and
1, respectively. The extracted watermark is then compared with the original embedded watermark
to decide a success detect. The normalized (NC) given in [22] is used to evaluate the similarities
between the original and the extracted watermarks.
Main-body text is to written in fully (left and right) justified 11 pt. Times New Roman font with a
6pt. (paragraph) line spacing following the last line of each paragraph, but a 12pt. (paragraph) line
spacing following the last paragraph. Do not indent paragraphs.
6. 222 Computer Science & Information Technology (CS & IT)
3. EXPERIMENTAL RESULTS
The watermark imperceptibility and robustness are evaluated by using 10 different colour images
of size 512×512 including Lena, Peppers, Baboon, Lake, etc. In the experiments, a
pseudorandom sequence of size 16-bits is used as a watermark and the radius of each circular
image is 71.
3.1 Watermark Imperceptibility
The distortion of an image depends on the watermark length, the number of quantization levels
for embedding the watermark, the number of extracted sub-images and the number of AC
coefficients for embedding a watermark bit in each 8×8 DCT block. The larger the number of AC
coefficients used for embedding, the more significant the distortion. Also the more the
quantization levels (L) for embedding watermark bits, the smaller the distortion. In the other
words, increasing the number of quantization levels leads to a small change in the AC
coefficients. Hence there is a trade off between robustness and imperceptivity. The Peak Signal
to Noise Ratio (PSNR) is adopted to evaluate the perceptual distortion of the proposed scheme.
The PSNR values for ten watermarked images are between 39 and 53 db. These values are all
grater than 30 db, which is the empirically tested threshold value for the image without any
perceivable degradation [21]. Taking Lena, Peppers, as an example, the watermarked images and
circular feature regions from Y component are shown in Figure 3.
Table I. PSNR between watermarked image and the original image (db)
Image RGB model YIQ model
Lena 52.63 44.93
Peppers 51.69 43.08
Baboon 44.57 39.19
(a) (b)
(c) (d)
Figure 3. (a) and (b) Watermarked Lena and Peppers images; (c) and (d) circular feature regions
7. Computer Science & Information Technology (CS & IT) 223
3.2 Watermark Robustness
To evaluate the robustness of the proposed watermarking scheme, various common signal
processing and geometric attacks were applied to the watermarked images. These attacks include
JPEG-lossy compression, median filtering, low-pass filtering, Gaussian filtering, and cropping,
shearing, rotation, row and column removal attacks. As an example, results for some geometric
attacks are shown in Figure 4 and Figure 5.
(a)
(b)
Figure 4. Results of geometric attacks; (a) shearing x-0%, y-5%, (b) Translation-x-20 and y-20.
(a)
(b)
8. 224 Computer Science & Information Technology (CS & IT)
(c)
Figure 5. Results of cropping attacks; (a) cropping Lena 25 % off , (b) cropping Peppers 25 % off, (c)
centred cropping 10%.
Table 2 and Table 3 summarize experimental results by applying common signal processing
attacks on Lena, Peppers and Baboon images watermarked in RGB model and YIQ model. For
JPEG lossy compression attacks, the quality factor varied from 30% (high compression) to 100%.
As can be seen from Table 1, the embedded watermark in Y component can be correctly extracted
even under JPEG compression with a quality factor as low as 30%. As shown, better performance
is achieved when the watermark is embedded in Y component than the B component. This
robustness is achieved by embedding the watermark into the low frequency coefficients of the
DCT, which are less affected by JPEG compression attacks. For filtering attacks, the watermarked
images were subjected to median, low pass and Gaussian filtering. As shown in Table 2, more
robustness to these attacks is achieved when the watermark is embedded in Y component in YIQ
model.
Table 3 shows that better robustness is achieved when the watermarked in embedded in Y
component. As can be seen, the watermark can be correctly detected when the watermarked
image attacked by geometric attacks. The proposed scheme overcomes the synchronization
problem caused by geometric attacks by combining the advantages of using image normalizing
and geometrically invariant feature points. Robustness against cropping attacks is achieved
because the normalization process is applied into sub-images rather than the entire image.
The performance of the proposed watermarking scheme in YIQ model is better than RGB model
due to the following factors:
(i) Loss of energy of the blue component is high when the watermarked image is attacked by
JPEG compression or low pass- filtering attacks [6].
(ii) The blue component of an image in RGB model is more sensitivity to rotation because such a
geometric transformation is based on interpolation which is a low-pass local filtering that
affects the high frequency content. Consequently, the watermark is less robust to the rotation
attack when is embedded in this component.
The more distortion on the blue component, the less accurate normalization angle can be used at
extraction.
9. Computer Science & Information Technology (CS & IT) 225
Table 2 Watermark detection results for signal processing attacks (detection rates)
Attacks RGB Model YIQ Model
Lena Peppers Baboon Lena Peppers Baboon
Jpeg 100%
Jpeg 80%
Jpeg 60%
Jpeg 50%
Jpeg 30%
Median filtering 3×3
Low-pass filtering3×3
Gaussian filtering
3×3
2/8
1/8
1/8
1/8
1/8
1/8
0/8
0/8
1/6
1/6
1/6
0/6
1/6
0/6
1/6
1/6
5/11
2/11
3/11
2/11
1/11
0/11
0/11
1/11
4/8
4/8
5/8
3/8
3/8
3/8
3/8
2/8
4/6
4/6
4/6
4/6
4/6
3/6
2/6
2/6
3/11
3/11
2/11
2/11
1/11
3/11
3/11
4/11
Table 3 the watermark detection results for geometric attacks (detection rates)
Attacks RGB Model YIQ Model
Lena Peppers Baboon Lena Peppers Baboon
Rotation 1°
Rotation 5°
Shearing x-1%,y-1%
Shearing x-0%,y-5%
Shearing x-5%,y-5%
Translation-x-5 y-5
Translation-x-10 y-10
Translation-x-20 y-20
Centered cropping 5%
Centered cropping 10%
Centered cropping 20%
Cropping 25% off
Remove 1Row & 5 Col
Remove 5Row & 17 Col
Remove 17Row & 5 Col
1/8
2/8
1/8
1/8
1/8
1/8
1/8
1/8
1/8
1/8
1/8
1/8
1/8
1/8
0/8
0/6
2/6
1/6
1/6
1/6
1/6
1/6
1/6
3/6
2/6
1/6
2/6
1/6
1/6
1/6
2/11
2/11
3/11
2/11
2/11
3/11
3/11
2/11
6/11
4/11
1/11
1/11
2/11
1/11
1/11
3/8
3/8
3/8
2/8
1/8
5/8
5/8
5/8
3/8
1/8
2/8
3/8
4/8
3/8
4/8
3/6
2/6
2/6
3/6
3/6
4/6
4/6
4/6
3/6
3/6
1/6
2/6
4/6
3/6
2/6
4/11
2/11
3/11
3/11
3/11
2/11
2/11
2/11
1/11
2/11
1/11
1/11
2/11
2/11
2/11
4. CONCLUSIONS
This paper presents a robust colour image watermarking scheme, which is designed to be robust
against both signal processing and geometric attacks. In order to eliminate synchronization errors
between the watermarks embedding and the detection, perceptually significant feature points and
image normalization technique were used. The reference image is not required at the detector.
The watermark is embedded into the image luminance in YIQ model or in the blue channel in
RGB model by modifying the DCT coefficients values in selected blocks.
Experimental results show that the proposed scheme succeeds in making the watermark
perceptually invisible and also robust against various signal processing and geometric attacks.
Further research is to improve the results by using the color components of YIQ model to
determine the feature points.
10. 226 Computer Science & Information Technology (CS & IT)
REFERENCES
[1] L. M. Marvel, C. G. Boncelet, Jr., and C. T. Retter, "Spread spectrum image steganography," IEEE
Transactions on Image Processing, vol. 8 (8), pp. 1075-1083, 1999.
[2] M. Barni, I.J. Cox, T. Kalker, Digital watermarking, 4th International Workshop on Digital
Watermarking, Siena, Italy, Lecture Notes in Computer Science 3710, Springer 2005.
[3] K. I. Hashida and S. A., "A method of embedding robust watermarks into digital color images,"
IEICE Transactions Fundamentals, vol. E81-A(10), pp. 2133-2137, 1998.
[4] N. Nikolaidis and I. Pitas, "Robust image watermarking in spatial domain," Signal Processing, vol.
66(3), pp. 385-403, 1998.
[5] M. Kutter, F. Jordan, and F. Bossen, "Digital watermarking of color images using amplitude
modulation," Journal of Electronic Imaging, vol. 7, pp. 326-332, 1998.
[6] L. Lian-Shan, L. Ren-Hou, and G. Qi, "A new watermarking method based on DWT green
component of color image," in International Conference on Machine Learning and Cybernetics, vol.
6, 2004, pp. 3949-3954
[7] M. Barni, F. Bartolini, and A. Piva, "Multichannel watermarking of color images," IEEE Transactions
on Circuits and Systems for Video Technology, vol. 12(3), pp. 142-156, 2002.
[8] M. Kutter and S. Winkler, "A vision-based masking model for spread-spectrum image watermarking,"
IEEE Transactions on Image Processing, vol. 11(1), pp. 16-25, 2002.
[9] I. Nasir and A. Abdurrman, "A Robust Color Image Watermarking Scheme Based on Image
Normalization, " World Congress on Engineering, pp. 2238-2242, 2013.
[10] S. Pereira and T. Pun, "Robust template matching for affine resistant image watermarks," IEEE Trans.
on Image Processing, vol. 9(6), pp. 1123-1129, 2000.
[11] X. Kang, J. Huang, Y. Q. Shi, and Y. Lin, "A DWT-DFT composite watermarking scheme robust to
both affine transform and JPEG compression," IEEE Trans. on Circuits and Systems for Video
Technology, vol. 13(8), pp. 776-786, 2003.
[12] J. L. Dugelay, S. Roche, C. Rey, and G. Doerr, "Still-image watermarking robust to local geometric
distortions," IEEE Trans. on Image Processing, vol. 15(9), pp. 2831-2842, 2006.
[13] C.Y. Lin, M. Wu, J.A. Bloom, I.J. Cox, M. L. Miller, and Y. M. Lui, "Rotation, scale, and translation
resilient watermarking for images," IEEE Trans. on Image Processing, vol. 10(5), pp. 767-782, 2001.
[14] D. Zheng, J. Zhao, and A. E. Saddik, "RST-invariant digital correlation," IEEE Trans. on Circuits and
Systems for Video Technology, vol. 13(8), pp. 753-765, 2003.
[15] X. Kang, J. Huang, et al., A DWT-DFT composite watermarking scheme robust to both affine
transform and JPEG compression, IEEE Trans. on Circuits and Systems for video Technology, vol.
13, no. 8, pp. 776-786, 2003.
[16] D. Simitopoulos, D.E. Koutsonanos, Robust image watermarking based on generalized random
transformations, IEEE Trans. On Circuit and Systems for Video Technology, vol. 13, no. 8, pp. 732-
745, 2003.
[17] C.Y. Lin, M. Wu, J.A. Bloom, I.J. Cox, M. L. Miller, and Y. M. Lui, "Rotation, scale, and translation
resilient watermarking for images," IEEE Trans. on Image Processing, vol. 10(5), pp. 767-782, 2001.
[18] S. Roy and E.C. Chang, Watermarking color histogram, in proc. Int. Conf. Image Process, pp.2191-
2194, 2004.
[19] S. Lee, Y. Suh, and Y. Ho, Lossless data hiding based on histogram modification of different images,
in Proc. Pacific-Rim Conf. Multimedia, vol3, pp. 340-347, 2004.
[20] S. Xiang, H. Joong, and J. Huang, Invariant Image Watermarking based on statistical features in low-
frequency domain, IEEE Trans. on Circuit and Systems for video Technology, vol. 18, no. 6, pp. 777-
789, 2008.
[21] X. Qi, J. Qi, A robust content-based digital image watermarking scheme, Signal processing, vol. 87,
pp. 1264-1280, 2007.
[22] L. Li, and B. Guo, “Localized image watermarking in spatial domain resistant to geometric attacks",
Int. Journal of Elec. And Comm., vol. 63, pp. 123-131, 2009.
[23] I. Nasir, F. Khelifi, J. Jiang, and S. Ipson, "Robust image watermarking via geometrically invariant
feature points and image normalisation", Image Processing, IET, vol.6, no.4, pp.354-363, 2012.
[24] V. Monga and B. Evans, Percetual image hashing via feature points: performance evaluation and
tradeoffs, IEEE Trans. on Image processing, vol. 15, no. 11, pp. 3453-3466, 2006.
[25] M. Alghoniemy, and A. H. Tewfik, "Geometric invariant in image watermarking", IEEE Trans. on
Image Processing, vol. 13, no. 2, pp. 145-153, 2004.
11. Computer Science & Information Technology (CS & IT) 227
[26] S. C. Pei and C. N. Lin, "Image normalization for pattern recognition", Image Vision. Computing,
vol. 13, no. 10, pp. 711-723, 1995.
Authors
Ibrahim Nasir received B.Eng. from Sebha University, Libya in 1994, M.Sc. degree from
Heriot-Watt University, Edinburgh, UK in 2005, and PhD from the University of
Bradford, UK in 2010. In 2011, He joined the Department of Electronic and Computer
Engineering, University of Sebha, Libya. His interest research topics are Image
processing, Mobile robotic and Embedded system.