In a digital watermarking scheme, it is not convenient to carry the original image all the time in order to detect the owner's signature from the watermarked image. Moreover, for those applications that require different watermark for different copies, it is preferred to utilize some kind of watermark-independent algorithm for extraction process i.e. dewatermarking. Watermark embedding is performed in the blue channel, as it is less sensitive to human visual system .This paper proposes a new color image watermarking method ,which adopts Blind Source Separation (BSS) technique for watermark extraction. Single level Discrete Wavelet Transform(DWT) is used for embedding . The novelty of our scheme lies in determining the mixing matrix for BSS model during embedding. The determination of mixing matrix using Quasi-Newton’s (BFGS) technique is based on texture analysis which uses energy as metric. This makes our method image adaptive to embed the watermark into original image so as not to bring about a perceptible change in the marked image. BSS based on Joint diagonalization of the time delayed covariance matrices algorithm is used for the extraction of watermark. The proposed method, undergoing different experiments, has shown its robustness against many attacks including rotation ,low pass filtering, salt n pepper noise addition and compression. The robustness evaluation is also carried out with respect to the spatial domain embedding.
This document discusses and compares two digital image watermarking techniques: discrete cosine transform (DCT) domain watermarking and discrete wavelet transform (DWT) domain watermarking. It first provides background on digital watermarking and explains watermark embedding and extraction processes in both the spatial and frequency domains. It then proposes a specific DCT watermarking technique that embeds a watermark by modifying mid-band DCT coefficients of divided image blocks. A DWT watermarking technique is also proposed that embeds a watermark in the low-high band of the DWT. Finally, the document indicates that experimental results will be used to compare the robustness of the two techniques against various attacks.
This document provides an overview of digital watermarking techniques. It discusses how watermarking has evolved from earlier steganography methods and classifications of watermarking such as image, audio, and video watermarking. It also summarizes various watermarking techniques including spatial domain methods that directly modify pixel values, frequency domain methods that operate in transform domains like DCT and DWT, and spread spectrum techniques. Specific spatial and frequency domain techniques are described for image, audio, and video watermarking. The document concludes that watermarking continues to be an evolving topic with opportunities remaining to further develop fragile and semi-fragile techniques.
The proposed system implements an image watermarking technique that incorporates human visual system (HVS) models into watermark embedding. The watermarking is performed in the wavelet domain. The algorithm first calculates the coarseness of different subbands (HH, HL, LH) to select the subband with the highest coarseness for watermark embedding. It then embeds the watermark bits into the selected subband by modifying the least significant bits of coefficients based on their values. Experimental results on test images show the technique is robust, with average watermark extraction rates of 80-95% and high PSNR values, even after filtering.
PREVENTING COPYRIGHTS INFRINGEMENT OF IMAGES BY WATERMARKING IN TRANSFORM DOM...ijistjournal
1) The document discusses a method for preventing copyright infringement of images using watermarking in the transform domain and a full counter propagation neural network.
2) It aims to encode the host image before watermark embedding to enhance security. The fast and effective full counter propagation neural network then helps successfully embed the watermark without deteriorating the image quality.
3) Previous techniques embedded watermarks directly in images, but the authors find neural network synapses provide a better way to reduce distortion and increase message capacity when embedding watermarks.
This document summarizes a research paper on lossless reversible visible watermarking. It begins with an abstract that describes digital watermarking techniques and introduces a new approach for lossless reversible visible watermarking with robust security. It then provides a literature review of previous lossless invisible and visible watermarking techniques. The proposed technique aims to allow legitimate users to remove embedded watermarks and perfectly recover the original image content. Finally, it outlines the system architecture and provides a mathematical model for the watermark generation, embedding, and extraction processes.
Digital watermarking has been proposed as a solution to the problem of copyright protection of
multimedia documents in networked environments. There are two important issues that watermarking
algorithms need to address. First, watermarking schemes are required to provide trustworthy evidence for
protecting rightful ownership. Second, good watermarking schemes should satisfy the requirement of
robustness and resist distortions due to common image manipulations (such as filtering, compression,
etc.). In this paper, a watermarking algorithm is proposed based on the Discrete Wavelet Transform
(DWT), Fractional Fourier Transform (FrFT) and Singular value decomposition (SVD). Analysis and
experimental results show that the proposed watermarking method performs well in both security and
robustness.
A New Technique to Digital Image Watermarking Using DWT for Real Time Applica...IJERA Editor
Digital watermarking is an essential technique to add hidden copyright notices or secret messages to digital audio, image, or image forms. In this paper we introduce a new approach for digital image watermarking for real time applications. We have successfully implemented the digital watermarking technique on digital images based on 2-level Discrete Wavelet Transform and compared the performance of the proposed method with Level-1 and Level-2 and Level-3 Discrete Wavelet Transform using the parameter peak signal to noise ratio. To make the watermark robust and to preserve visual significant information a 2-Level Discrete wavelet transform used as transformation domain for both secret image and original image. The watermark is embedded in the original image using Alpha blending technique and implemented using Matlab Simulink.
This document summarizes a research paper that proposes a content-based hybrid DWT-DCT watermarking technique for image authentication in color images. The technique embeds statistical features extracted from the host image as the watermark. Four different statistical features are used to generate the watermark - the Frobenius norm, mean, standard deviation, and combined mean and standard deviation of the host image blocks. The watermark is then embedded into the host image by applying both DWT and DCT transforms. During extraction, the same process is applied to extract the watermark for authentication. Experimental results show the technique is robust against various attacks like compression, noise, and filters.
This document discusses and compares two digital image watermarking techniques: discrete cosine transform (DCT) domain watermarking and discrete wavelet transform (DWT) domain watermarking. It first provides background on digital watermarking and explains watermark embedding and extraction processes in both the spatial and frequency domains. It then proposes a specific DCT watermarking technique that embeds a watermark by modifying mid-band DCT coefficients of divided image blocks. A DWT watermarking technique is also proposed that embeds a watermark in the low-high band of the DWT. Finally, the document indicates that experimental results will be used to compare the robustness of the two techniques against various attacks.
This document provides an overview of digital watermarking techniques. It discusses how watermarking has evolved from earlier steganography methods and classifications of watermarking such as image, audio, and video watermarking. It also summarizes various watermarking techniques including spatial domain methods that directly modify pixel values, frequency domain methods that operate in transform domains like DCT and DWT, and spread spectrum techniques. Specific spatial and frequency domain techniques are described for image, audio, and video watermarking. The document concludes that watermarking continues to be an evolving topic with opportunities remaining to further develop fragile and semi-fragile techniques.
The proposed system implements an image watermarking technique that incorporates human visual system (HVS) models into watermark embedding. The watermarking is performed in the wavelet domain. The algorithm first calculates the coarseness of different subbands (HH, HL, LH) to select the subband with the highest coarseness for watermark embedding. It then embeds the watermark bits into the selected subband by modifying the least significant bits of coefficients based on their values. Experimental results on test images show the technique is robust, with average watermark extraction rates of 80-95% and high PSNR values, even after filtering.
PREVENTING COPYRIGHTS INFRINGEMENT OF IMAGES BY WATERMARKING IN TRANSFORM DOM...ijistjournal
1) The document discusses a method for preventing copyright infringement of images using watermarking in the transform domain and a full counter propagation neural network.
2) It aims to encode the host image before watermark embedding to enhance security. The fast and effective full counter propagation neural network then helps successfully embed the watermark without deteriorating the image quality.
3) Previous techniques embedded watermarks directly in images, but the authors find neural network synapses provide a better way to reduce distortion and increase message capacity when embedding watermarks.
This document summarizes a research paper on lossless reversible visible watermarking. It begins with an abstract that describes digital watermarking techniques and introduces a new approach for lossless reversible visible watermarking with robust security. It then provides a literature review of previous lossless invisible and visible watermarking techniques. The proposed technique aims to allow legitimate users to remove embedded watermarks and perfectly recover the original image content. Finally, it outlines the system architecture and provides a mathematical model for the watermark generation, embedding, and extraction processes.
Digital watermarking has been proposed as a solution to the problem of copyright protection of
multimedia documents in networked environments. There are two important issues that watermarking
algorithms need to address. First, watermarking schemes are required to provide trustworthy evidence for
protecting rightful ownership. Second, good watermarking schemes should satisfy the requirement of
robustness and resist distortions due to common image manipulations (such as filtering, compression,
etc.). In this paper, a watermarking algorithm is proposed based on the Discrete Wavelet Transform
(DWT), Fractional Fourier Transform (FrFT) and Singular value decomposition (SVD). Analysis and
experimental results show that the proposed watermarking method performs well in both security and
robustness.
A New Technique to Digital Image Watermarking Using DWT for Real Time Applica...IJERA Editor
Digital watermarking is an essential technique to add hidden copyright notices or secret messages to digital audio, image, or image forms. In this paper we introduce a new approach for digital image watermarking for real time applications. We have successfully implemented the digital watermarking technique on digital images based on 2-level Discrete Wavelet Transform and compared the performance of the proposed method with Level-1 and Level-2 and Level-3 Discrete Wavelet Transform using the parameter peak signal to noise ratio. To make the watermark robust and to preserve visual significant information a 2-Level Discrete wavelet transform used as transformation domain for both secret image and original image. The watermark is embedded in the original image using Alpha blending technique and implemented using Matlab Simulink.
This document summarizes a research paper that proposes a content-based hybrid DWT-DCT watermarking technique for image authentication in color images. The technique embeds statistical features extracted from the host image as the watermark. Four different statistical features are used to generate the watermark - the Frobenius norm, mean, standard deviation, and combined mean and standard deviation of the host image blocks. The watermark is then embedded into the host image by applying both DWT and DCT transforms. During extraction, the same process is applied to extract the watermark for authentication. Experimental results show the technique is robust against various attacks like compression, noise, and filters.
Semi blind rgb color image watermarking using dct and two level svdsipij
This paper presents semi blind RGB color image wate
rmarking using DCT and two-level SVD. First, RGB
image is divided into red, green, and blue channels
. The blue component is divided into blocks accordi
ng
to the watermark size. Second, DCT is applied to ea
ch block to form a new block in the transform domai
n.
DC component is retrieved and assembled from each b
lock to form a new matrix of 128x128 pixels. SVD is
applied to the resultant matrix to obtain matrices,
U, S and V. The watermark is embedded into the S
matrix. The watermark can be extracted without orig
inal host image, however, matrices U1, S and V1 are
required. Experimental results indicate that the pr
oposed algorithm can satisfy imperceptibility and i
t is
more robust against common types of attacks such as
filtering, adding noise, geometric and compression
attacks.
PERCEPTUAL COPYRIGHT PROTECTION USING MULTIRESOLUTION WAVELET-BASED WATERMARK...gerogepatton
In this paper, an efficiently DWT-based watermarking technique is proposed to embed signatures in images to attest the owner identification and discourage the unauthorized copying. This paper deals with a fuzzy inference filter to choose the larger entropy of coefficients to embed watermarks. Unlike most previous watermarking frameworks which embedded watermarks in the larger coefficients of inner coarser subbands, the proposed technique is based on utilizing a context model and fuzzy inference filter by embedding watermarks in the larger-entropy coefficients of coarser DWT subbands. The proposed approaches allow us to embed adaptive casting degree of watermarks for transparency and robustness to the general image-processing attacks such as smoothing, sharpening, and JPEG compression. The approach has no need the original host image to extract watermarks. Our schemes have been shown to provide very good results in both image transparency and robustness.
Novel DCT based watermarking scheme for digital imagesIDES Editor
There is an ever growing interest in copyright
protection of multimedia content, thus digital
watermarking techniques are widely practiced. Due to
the internet connectivity and digital libraries the
research interest of protecting digital content
watermarking is extensively researched. In this paper
we present a novel watermark generation scheme
based on the histogram of the image and apply it to the
original image in the transform(DCT) domain. Further
we study the performance of the watermark against
some common attacks that can take place with images.
Experimental results show that the embedded
watermark is imperceptible and image quality is not
degraded.
Cecimg an ste cryptographic approach for data security in imageijctet
The document presents a new algorithm called CECIMG (Canny edge encryption image steganography) for securing data in images. It combines Blowfish encryption with embedding encrypted data in the edge pixels of an image detected using Canny edge detection. The algorithm is implemented in Java and experiments show it provides better security and higher PSNR values than existing LSB steganography techniques. It securely stores encrypted data in images in a series of steps and allows retrieval of the original data. The algorithm aims to maximize security compared to traditional approaches.
A robust combination of dwt and chaotic function for image watermarkingijctet
This document summarizes a research paper on a robust image watermarking technique that combines discrete wavelet transform (DWT) and a chaotic function. The proposed method embeds a watermark into selected blocks of the low-frequency DWT subband of an image. It calculates the Euclidean distance between blocks of the watermark and image to select the most similar block for embedding. Experimental results on standard test images show the proposed method achieves better performance than previous methods in terms of PSNR and structural similarity under compression attacks. The extraction accuracy remains high even with noise attacks, though it degrades more under filtering attacks.
International Journal of Engineering Research and Applications (IJERA) is an open access online peer reviewed international journal that publishes research and review articles in the fields of Computer Science, Neural Networks, Electrical Engineering, Software Engineering, Information Technology, Mechanical Engineering, Chemical Engineering, Plastic Engineering, Food Technology, Textile Engineering, Nano Technology & science, Power Electronics, Electronics & Communication Engineering, Computational mathematics, Image processing, Civil Engineering, Structural Engineering, Environmental Engineering, VLSI Testing & Low Power VLSI Design etc.
This document summarizes a research paper that proposes a new digital image watermarking technique using discrete wavelet transform and singular value decomposition (DWT-SVD). The technique embeds a watermark in the high frequency subbands of an image after applying DWT and SVD. Experimental results show the watermarked images have high quality as measured by PSNR. The extracted watermarks are robust to common image distortions like noise, filtering, and cropping as measured by normalized cross correlation. A comparison shows the proposed technique provides better image quality and watermark extraction than a previous DWT-based method. The technique could provide copyright protection for digital images.
Iaetsd literature review on generic lossless visible watermarking &Iaetsd Iaetsd
This document discusses literature on lossless visible watermarking and lossless image recovery. It begins by introducing digital watermarking and classifying methods as visible or invisible. Reversible watermarking allows removal of embedded watermarks and restoration of the original content. The document then reviews existing watermarking techniques in the spatial, frequency and wavelet domains. It proposes a novel method for generic visible watermarking using deterministic one-to-one compound mappings that are reversible, allowing lossless recovery of original images from watermarked images. This approach can embed various visible watermarks of arbitrary sizes into images in a lossless manner.
Watermarking Scheme based on Redundant Discrete Wavelet Transform and SVDIRJET Journal
This document presents a watermarking scheme based on Redundant Discrete Wavelet Transform (RDWT) and Singular Value Decomposition (SVD) with the following key points:
1. The host image is first transformed into the wavelet domain using 1-level RDWT. SVD is then applied to embed the watermark by modifying the singular values of the host and watermark images.
2. For extraction, the watermarked image is transformed using RDWT and SVD to recover the singular values. The extracted watermark is obtained by calculating the difference between the singular values of the watermarked and original host images.
3. Experimental results on standard test images show the scheme is robust against various attacks
For the full video of this presentation, please visit: https://www.edge-ai-vision.com/2021/10/person-re-identification-and-tracking-at-the-edge-challenges-and-techniques-a-presentation-from-the-university-of-auckland/
Morteza Biglari-Abhari, Senior Lecturer at the University of Auckland, presents the “Person Re-Identification and Tracking at the Edge: Challenges and Techniques” tutorial at the May 2021 Embedded Vision Summit.
Numerous video analytics applications require understanding how people are moving through a space, including the ability to recognize when the same person has moved outside of the camera’s view and then back into the camera’s view, or when a person has passed from the view of one camera to the view of another. This capability is referred to as person re-identification and tracking. It’s an essential technique for applications such as surveillance for security, health and safety monitoring in healthcare and industrial facilities, intelligent transportation systems and smart cities. It can also assist in gathering business intelligence such as monitoring customer behavior in shopping environments. Person re-identification is challenging.
In this talk, Biglari-Abhari discusses the key challenges and current approaches for person re-identification and tracking, as well as his initial work on multi-camera systems and techniques to improve accuracy, especially fusing appearance and spatio-temporal models. He also briefly discusses privacy-preserving techniques, which are critical for some applications, as well as challenges for real-time processing at the edge.
International Journal of Engineering Research and Development (IJERD)IJERD Editor
journal publishing, how to publish research paper, Call For research paper, international journal, publishing a paper, IJERD, journal of science and technology, how to get a research paper published, publishing a paper, publishing of journal, publishing of research paper, reserach and review articles, IJERD Journal, How to publish your research paper, publish research paper, open access engineering journal, Engineering journal, Mathemetics journal, Physics journal, Chemistry journal, Computer Engineering, Computer Science journal, how to submit your paper, peer reviw journal, indexed journal, reserach and review articles, engineering journal, www.ijerd.com, research journals,
yahoo journals, bing journals, International Journal of Engineering Research and Development, google journals, hard copy of journal
A Blind Multiple Watermarks based on Human Visual Characteristics IJECEIAES
This document summarizes a research paper that proposes a multiple watermark embedding scheme based on human visual characteristics. The scheme embeds two watermarks in the luminance and chrominance blue components of an image. It uses Arnold scrambling to increase security, and embeds watermarks in the singular value decomposition domain by modifying coefficients based on a threshold. The proposed scheme is evaluated based on imperceptibility using SSIM and robustness using normalized cross-correlation and bit error rate. Experimental results show the scheme provides improved invisibility and resistance to various attacks.
11.compression technique using dct fractal compressionAlexander Decker
1) The document discusses and compares different image compression techniques, specifically DCT and fractal compression.
2) Fractal compression works by finding self-similar patterns within an image during encoding, but can have a long computation time. DCT transforms an image into frequency coefficients that can be quantized for compression.
3) The document reviews previous work combining DCT and fractal compression with steganography and encryption to improve hiding capacity, imperceptibility, and security against subterfuge attacks. However, prior methods had limitations like low data hiding amounts or lack of protection for compressed data.
Compression technique using dct fractal compressionAlexander Decker
This document summarizes and compares different image compression techniques, including DCT, fractal compression, and their applications in steganography. It discusses how DCT works by transforming image data into frequency domains, while fractal compression exploits self-similarity within images. The document reviews several existing studies on combining these techniques with steganography and encryption. Specifically, it examines approaches that use DCT and fractal compression to improve data hiding capacity and security. Overall, the document provides an overview of key compression algorithms and their applications in digital watermarking and steganography.
DIRECTIONAL BASED WATERMARKING SCHEME USING A NOVEL DATA EMBEDDING APPROACH acijjournal
Image watermarking has come to wide use in the recent past. It is by the authentication problems and limitation means that the setting accuracy of the image watermarking operation is minimized. Different types of integration schemes have been proposed in the past to improve efficiency and makes the
embedding resistant against various attacks .Although transformation, spatial domain approaches have been developed PSNR improvements in image artifacts due to the fringes are still to be observed. To improvise the embedding, image artifacts in this paper a forward – based image embedding scheme is proposed.
The document discusses color characterization for scanners and the relationship between scanned RGB values and CIE color space values. It examines using polynomial regression and neural networks to create models that relate scanning devices to spectrophotometers. Specifically, it aims to determine CIE XYZ, L*a*b*, and L*c*h* values from RGB scans under D65 illumination for a color characterization target containing 140 color patches scanned on a Fabric Eye D2000 scanner. Previous studies that used polynomial regression and other transformation techniques for scanner color characterization are also reviewed.
VHDL Design for Image Segmentation using Gabor filter for Disease DetectionVLSICS Design
Tonsillitis, Tumor and many more skin diseases can be detected in its early-state and can be cured. For this a new idea for efficient Gabor filter design with improved data transfer rate, efficient noise reduction, less power consumption and reduced memory usage is proposed in this paper. The filter design is suitable for detecting the early stages of disease using textural properties of anatomical structures. The code for Gabor filter will be developed in VHDL using Modelsim and then implemented on SPARTAN-3E FPGA kit. These systems must provide both highly accurate and extremely fast processing of large amounts of image data.
Maximizing Strength of Digital Watermarks Using Fuzzy Logicsipij
In this paper, we propose a novel digital watermarking scheme in DCT domain based fuzzy inference system and the human visual system to adapt the embedding strength of different blocks. Firstly, the original image is divided into some 8×8 blocks, and then fuzzy inference system according to different textural features and luminance of each block decide adaptively different embedding strengths. The watermark detection adopts correlation technology. Experimental results show that the proposed scheme has good imperceptibility and high robustness to common image processing operators.
Image Interpolation Techniques in Digital Image Processing: An OverviewIJERA Editor
This document provides an overview of various image interpolation techniques, including nearest neighbor, bilinear, bicubic, B-spline, Lanczos, discrete wavelet transform (DWT), and Kriging. It analyzes the performance of each technique and shows that bicubic interpolation produces better results than nearest neighbor and bilinear by using polynomials. DWT and Kriging provide finer image details compared to other methods. Kriging uses a weighted average approach based on distance between points, rather than arbitrary weighting functions used in other techniques. The document includes examples applying different interpolation methods and analyzing their outputs.
This document discusses and compares two digital image watermarking techniques: discrete cosine transform (DCT) domain watermarking and discrete wavelet transform (DWT) domain watermarking. It first provides background on digital watermarking and explains watermark embedding and extraction processes in both the spatial and frequency domains. It then proposes a specific DCT watermarking technique that embeds a watermark by modifying mid-band DCT coefficients of divided image blocks. A DWT watermarking technique is also proposed that embeds a watermark in the LH sub-band of the DWT. Finally, the document indicates that experimental results will be used to compare the robustness of the two techniques against various attacks.
This document summarizes a research paper on lossless reversible visible watermarking. It begins with an abstract that describes digital watermarking techniques and introduces a new approach for lossless reversible visible watermarking with robust security. It then provides a literature review of previous lossless invisible and visible watermarking techniques. The proposed technique aims to allow legitimate users to remove embedded watermarks and perfectly recover the original image content. Finally, it outlines the system architecture and provides a mathematical model for the watermark generation, embedding, and extraction processes.
This document summarizes a research paper on a relational database watermarking technique using clustering. The proposed technique clusters database tuples before embedding and detecting a watermark. It uses Mahalanobis distance to measure tuple similarity during clustering. The watermark is then embedded and detected within each cluster by modifying the least significant bits of numeric fields. Majority decision is used in blind detection to determine watermark bits. The technique aims to improve watermark robustness against database operations while maintaining reversibility.
Semi blind rgb color image watermarking using dct and two level svdsipij
This paper presents semi blind RGB color image wate
rmarking using DCT and two-level SVD. First, RGB
image is divided into red, green, and blue channels
. The blue component is divided into blocks accordi
ng
to the watermark size. Second, DCT is applied to ea
ch block to form a new block in the transform domai
n.
DC component is retrieved and assembled from each b
lock to form a new matrix of 128x128 pixels. SVD is
applied to the resultant matrix to obtain matrices,
U, S and V. The watermark is embedded into the S
matrix. The watermark can be extracted without orig
inal host image, however, matrices U1, S and V1 are
required. Experimental results indicate that the pr
oposed algorithm can satisfy imperceptibility and i
t is
more robust against common types of attacks such as
filtering, adding noise, geometric and compression
attacks.
PERCEPTUAL COPYRIGHT PROTECTION USING MULTIRESOLUTION WAVELET-BASED WATERMARK...gerogepatton
In this paper, an efficiently DWT-based watermarking technique is proposed to embed signatures in images to attest the owner identification and discourage the unauthorized copying. This paper deals with a fuzzy inference filter to choose the larger entropy of coefficients to embed watermarks. Unlike most previous watermarking frameworks which embedded watermarks in the larger coefficients of inner coarser subbands, the proposed technique is based on utilizing a context model and fuzzy inference filter by embedding watermarks in the larger-entropy coefficients of coarser DWT subbands. The proposed approaches allow us to embed adaptive casting degree of watermarks for transparency and robustness to the general image-processing attacks such as smoothing, sharpening, and JPEG compression. The approach has no need the original host image to extract watermarks. Our schemes have been shown to provide very good results in both image transparency and robustness.
Novel DCT based watermarking scheme for digital imagesIDES Editor
There is an ever growing interest in copyright
protection of multimedia content, thus digital
watermarking techniques are widely practiced. Due to
the internet connectivity and digital libraries the
research interest of protecting digital content
watermarking is extensively researched. In this paper
we present a novel watermark generation scheme
based on the histogram of the image and apply it to the
original image in the transform(DCT) domain. Further
we study the performance of the watermark against
some common attacks that can take place with images.
Experimental results show that the embedded
watermark is imperceptible and image quality is not
degraded.
Cecimg an ste cryptographic approach for data security in imageijctet
The document presents a new algorithm called CECIMG (Canny edge encryption image steganography) for securing data in images. It combines Blowfish encryption with embedding encrypted data in the edge pixels of an image detected using Canny edge detection. The algorithm is implemented in Java and experiments show it provides better security and higher PSNR values than existing LSB steganography techniques. It securely stores encrypted data in images in a series of steps and allows retrieval of the original data. The algorithm aims to maximize security compared to traditional approaches.
A robust combination of dwt and chaotic function for image watermarkingijctet
This document summarizes a research paper on a robust image watermarking technique that combines discrete wavelet transform (DWT) and a chaotic function. The proposed method embeds a watermark into selected blocks of the low-frequency DWT subband of an image. It calculates the Euclidean distance between blocks of the watermark and image to select the most similar block for embedding. Experimental results on standard test images show the proposed method achieves better performance than previous methods in terms of PSNR and structural similarity under compression attacks. The extraction accuracy remains high even with noise attacks, though it degrades more under filtering attacks.
International Journal of Engineering Research and Applications (IJERA) is an open access online peer reviewed international journal that publishes research and review articles in the fields of Computer Science, Neural Networks, Electrical Engineering, Software Engineering, Information Technology, Mechanical Engineering, Chemical Engineering, Plastic Engineering, Food Technology, Textile Engineering, Nano Technology & science, Power Electronics, Electronics & Communication Engineering, Computational mathematics, Image processing, Civil Engineering, Structural Engineering, Environmental Engineering, VLSI Testing & Low Power VLSI Design etc.
This document summarizes a research paper that proposes a new digital image watermarking technique using discrete wavelet transform and singular value decomposition (DWT-SVD). The technique embeds a watermark in the high frequency subbands of an image after applying DWT and SVD. Experimental results show the watermarked images have high quality as measured by PSNR. The extracted watermarks are robust to common image distortions like noise, filtering, and cropping as measured by normalized cross correlation. A comparison shows the proposed technique provides better image quality and watermark extraction than a previous DWT-based method. The technique could provide copyright protection for digital images.
Iaetsd literature review on generic lossless visible watermarking &Iaetsd Iaetsd
This document discusses literature on lossless visible watermarking and lossless image recovery. It begins by introducing digital watermarking and classifying methods as visible or invisible. Reversible watermarking allows removal of embedded watermarks and restoration of the original content. The document then reviews existing watermarking techniques in the spatial, frequency and wavelet domains. It proposes a novel method for generic visible watermarking using deterministic one-to-one compound mappings that are reversible, allowing lossless recovery of original images from watermarked images. This approach can embed various visible watermarks of arbitrary sizes into images in a lossless manner.
Watermarking Scheme based on Redundant Discrete Wavelet Transform and SVDIRJET Journal
This document presents a watermarking scheme based on Redundant Discrete Wavelet Transform (RDWT) and Singular Value Decomposition (SVD) with the following key points:
1. The host image is first transformed into the wavelet domain using 1-level RDWT. SVD is then applied to embed the watermark by modifying the singular values of the host and watermark images.
2. For extraction, the watermarked image is transformed using RDWT and SVD to recover the singular values. The extracted watermark is obtained by calculating the difference between the singular values of the watermarked and original host images.
3. Experimental results on standard test images show the scheme is robust against various attacks
For the full video of this presentation, please visit: https://www.edge-ai-vision.com/2021/10/person-re-identification-and-tracking-at-the-edge-challenges-and-techniques-a-presentation-from-the-university-of-auckland/
Morteza Biglari-Abhari, Senior Lecturer at the University of Auckland, presents the “Person Re-Identification and Tracking at the Edge: Challenges and Techniques” tutorial at the May 2021 Embedded Vision Summit.
Numerous video analytics applications require understanding how people are moving through a space, including the ability to recognize when the same person has moved outside of the camera’s view and then back into the camera’s view, or when a person has passed from the view of one camera to the view of another. This capability is referred to as person re-identification and tracking. It’s an essential technique for applications such as surveillance for security, health and safety monitoring in healthcare and industrial facilities, intelligent transportation systems and smart cities. It can also assist in gathering business intelligence such as monitoring customer behavior in shopping environments. Person re-identification is challenging.
In this talk, Biglari-Abhari discusses the key challenges and current approaches for person re-identification and tracking, as well as his initial work on multi-camera systems and techniques to improve accuracy, especially fusing appearance and spatio-temporal models. He also briefly discusses privacy-preserving techniques, which are critical for some applications, as well as challenges for real-time processing at the edge.
International Journal of Engineering Research and Development (IJERD)IJERD Editor
journal publishing, how to publish research paper, Call For research paper, international journal, publishing a paper, IJERD, journal of science and technology, how to get a research paper published, publishing a paper, publishing of journal, publishing of research paper, reserach and review articles, IJERD Journal, How to publish your research paper, publish research paper, open access engineering journal, Engineering journal, Mathemetics journal, Physics journal, Chemistry journal, Computer Engineering, Computer Science journal, how to submit your paper, peer reviw journal, indexed journal, reserach and review articles, engineering journal, www.ijerd.com, research journals,
yahoo journals, bing journals, International Journal of Engineering Research and Development, google journals, hard copy of journal
A Blind Multiple Watermarks based on Human Visual Characteristics IJECEIAES
This document summarizes a research paper that proposes a multiple watermark embedding scheme based on human visual characteristics. The scheme embeds two watermarks in the luminance and chrominance blue components of an image. It uses Arnold scrambling to increase security, and embeds watermarks in the singular value decomposition domain by modifying coefficients based on a threshold. The proposed scheme is evaluated based on imperceptibility using SSIM and robustness using normalized cross-correlation and bit error rate. Experimental results show the scheme provides improved invisibility and resistance to various attacks.
11.compression technique using dct fractal compressionAlexander Decker
1) The document discusses and compares different image compression techniques, specifically DCT and fractal compression.
2) Fractal compression works by finding self-similar patterns within an image during encoding, but can have a long computation time. DCT transforms an image into frequency coefficients that can be quantized for compression.
3) The document reviews previous work combining DCT and fractal compression with steganography and encryption to improve hiding capacity, imperceptibility, and security against subterfuge attacks. However, prior methods had limitations like low data hiding amounts or lack of protection for compressed data.
Compression technique using dct fractal compressionAlexander Decker
This document summarizes and compares different image compression techniques, including DCT, fractal compression, and their applications in steganography. It discusses how DCT works by transforming image data into frequency domains, while fractal compression exploits self-similarity within images. The document reviews several existing studies on combining these techniques with steganography and encryption. Specifically, it examines approaches that use DCT and fractal compression to improve data hiding capacity and security. Overall, the document provides an overview of key compression algorithms and their applications in digital watermarking and steganography.
DIRECTIONAL BASED WATERMARKING SCHEME USING A NOVEL DATA EMBEDDING APPROACH acijjournal
Image watermarking has come to wide use in the recent past. It is by the authentication problems and limitation means that the setting accuracy of the image watermarking operation is minimized. Different types of integration schemes have been proposed in the past to improve efficiency and makes the
embedding resistant against various attacks .Although transformation, spatial domain approaches have been developed PSNR improvements in image artifacts due to the fringes are still to be observed. To improvise the embedding, image artifacts in this paper a forward – based image embedding scheme is proposed.
The document discusses color characterization for scanners and the relationship between scanned RGB values and CIE color space values. It examines using polynomial regression and neural networks to create models that relate scanning devices to spectrophotometers. Specifically, it aims to determine CIE XYZ, L*a*b*, and L*c*h* values from RGB scans under D65 illumination for a color characterization target containing 140 color patches scanned on a Fabric Eye D2000 scanner. Previous studies that used polynomial regression and other transformation techniques for scanner color characterization are also reviewed.
VHDL Design for Image Segmentation using Gabor filter for Disease DetectionVLSICS Design
Tonsillitis, Tumor and many more skin diseases can be detected in its early-state and can be cured. For this a new idea for efficient Gabor filter design with improved data transfer rate, efficient noise reduction, less power consumption and reduced memory usage is proposed in this paper. The filter design is suitable for detecting the early stages of disease using textural properties of anatomical structures. The code for Gabor filter will be developed in VHDL using Modelsim and then implemented on SPARTAN-3E FPGA kit. These systems must provide both highly accurate and extremely fast processing of large amounts of image data.
Maximizing Strength of Digital Watermarks Using Fuzzy Logicsipij
In this paper, we propose a novel digital watermarking scheme in DCT domain based fuzzy inference system and the human visual system to adapt the embedding strength of different blocks. Firstly, the original image is divided into some 8×8 blocks, and then fuzzy inference system according to different textural features and luminance of each block decide adaptively different embedding strengths. The watermark detection adopts correlation technology. Experimental results show that the proposed scheme has good imperceptibility and high robustness to common image processing operators.
Image Interpolation Techniques in Digital Image Processing: An OverviewIJERA Editor
This document provides an overview of various image interpolation techniques, including nearest neighbor, bilinear, bicubic, B-spline, Lanczos, discrete wavelet transform (DWT), and Kriging. It analyzes the performance of each technique and shows that bicubic interpolation produces better results than nearest neighbor and bilinear by using polynomials. DWT and Kriging provide finer image details compared to other methods. Kriging uses a weighted average approach based on distance between points, rather than arbitrary weighting functions used in other techniques. The document includes examples applying different interpolation methods and analyzing their outputs.
This document discusses and compares two digital image watermarking techniques: discrete cosine transform (DCT) domain watermarking and discrete wavelet transform (DWT) domain watermarking. It first provides background on digital watermarking and explains watermark embedding and extraction processes in both the spatial and frequency domains. It then proposes a specific DCT watermarking technique that embeds a watermark by modifying mid-band DCT coefficients of divided image blocks. A DWT watermarking technique is also proposed that embeds a watermark in the LH sub-band of the DWT. Finally, the document indicates that experimental results will be used to compare the robustness of the two techniques against various attacks.
This document summarizes a research paper on lossless reversible visible watermarking. It begins with an abstract that describes digital watermarking techniques and introduces a new approach for lossless reversible visible watermarking with robust security. It then provides a literature review of previous lossless invisible and visible watermarking techniques. The proposed technique aims to allow legitimate users to remove embedded watermarks and perfectly recover the original image content. Finally, it outlines the system architecture and provides a mathematical model for the watermark generation, embedding, and extraction processes.
This document summarizes a research paper on a relational database watermarking technique using clustering. The proposed technique clusters database tuples before embedding and detecting a watermark. It uses Mahalanobis distance to measure tuple similarity during clustering. The watermark is then embedded and detected within each cluster by modifying the least significant bits of numeric fields. Majority decision is used in blind detection to determine watermark bits. The technique aims to improve watermark robustness against database operations while maintaining reversibility.
In Digital era sharing of images have become very
common and raises the risk of using it for unethical and
fraudulent purposes with the help of manipulation tools. Digital
image watermarking is one way to protect the digital information
(text, images, audio, and video) from fraudulent manipulations.
Digital Image Watermarking is a process of implanting data in
the original image for authentication. In this paper we are
providing one such watermarking scheme for color images. The
proposed method is designed to be robust for common attacks
with the aid of redundant discrete wavelet transform (RDWT)
and discrete cosine transform (DCT) properties. After applying
two levels RDWT decomposition to the blue channel of cover
image, we apply DCT to HH_LL subband i.e. 2nd level
decomposed coefficient of HH band and to the watermark.
Divided the HH_LL sub band into 4x4 subblocks and DCT
coefficients of the last subblock of the cover image are replaced
with the DCT coefficients of watermark. Inverse DCT and
inverse RDWT is performed to get watermarked image. The
performance of the proposed technique is measured using the
parameters PSNR and NCC.
This document proposes a blind, robust watermarking technique for 3D triangular mesh models using neural networks. It selects optimal watermark carrier vertices using self-organizing maps (SOM) neural networks to cluster vertices by smoothness. Watermark bits are embedded in the selected vertices using local statistical measures. Experimental results show the watermarks can be extracted without re-alignment or re-meshing after various attacks, demonstrating the technique's robustness. The approach is compared to other blind 3D watermarking methods and proves efficient in terms of robustness and imperceptibility.
A Review of BSS Based Digital Image Watermarking and Extraction MethodsIOSR Journals
Abstract :The field of Signal Processing has witnessed the strong emergence of a new technique, the Blind Signal Processing (BSP) which is based on sound theoretical foundation. An offshoot of the BSP is known as Blind Source Separation (BSS). This digital signal processing techniques have a wide and varied potential applications. The term blind is indicative of the fact that both the source signal and the mixing procedures are unknown. One of the more interesting applications of BSS is in field of image data security/authentication where digital watermarking is proposed. Watermarking is a promising technique to help protect data security and intellectual property rights. The plethora digital image watermarking methods are surveyed and discussed here with their features and limitations. Thus literature survey is presented in two major categories-Digital image watermarking methods and BSS based techniques in digital image watermarking and extraction. Keywords – BSP, BSS, Mixing Coefficient, Digital Image Watermarking, Watermark Extraction.
A Review of BSS Based Digital Image Watermarking and Extraction MethodsIOSR Journals
This document provides a review of blind source separation (BSS) based digital image watermarking and extraction methods. It begins with an introduction to BSS and its application in digital image watermarking. It then surveys various digital image watermarking methods and BSS techniques used for watermark embedding and extraction. The document discusses the general watermarking framework including embedding, attacks, and detection. It also explores challenges in digital image watermarking such as capacity, robustness, and transparency. Finally, it concludes that further research can improve BSS-based watermarking methods to achieve high imperceptibility and robustness.
Multiple Binary Images Watermarking in Spatial and Frequency Domainssipij
Editing, reproduction and distribution of the digital multimedia are becoming extremely easier and faster with the existence of the internet and the availability of pervasive and powerful multimedia tools. Digital watermarking has emerged as a possible method to tackle these issues. This paper proposes a scheme using which more data can be inserted into an image in different domains using different techniques. This increases the embedding capacity. Using the proposed scheme 24 binary images can be embedded in the DCT domain and 12 binary images can be embedded in the spatial domain using LSB substitution technique in a single RGB image. The proposed scheme also provides an extra level of security to the watermark image by scrambling the image before embedding it into the host image. Experimental results show that the proposed watermarking method results in almost invisible difference between the watermarked image and the original image and is also robust against various image processing attacks.
A novel attack detection technique to find attack in watermarked images with ...prjpublications
The document describes a novel technique for detecting attacks on watermarked images. The technique uses Peak Signal-to-Noise Ratio (PSNR) and RGB color intensity values to analyze differences between an original watermarked image and a tested watermarked image. If the PSNR value is above a threshold, the images are considered identical. Otherwise, RGB intensity levels are compared. A match suggests no attack, while a mismatch identifies an attacked image and the type of attack applied. The technique is demonstrated by hiding data in an image, applying attacks, and correctly detecting the attacks based on PSNR and RGB analyses. Evaluation shows the approach effectively identifies various watermark attacks.
BIG DATA-DRIVEN FAST REDUCING THE VISUAL BLOCK ARTIFACTS OF DCT COMPRESSED IM...IJDKP
1) The document proposes a new simple method to reduce visual block artifacts in images compressed using DCT (used in JPEG) for urban surveillance systems.
2) The method smooths only the connection edges between adjacent blocks while keeping other image areas unchanged.
3) Simulation results show the proposed method achieves better image quality as measured by PSNR compared to median and wiener filters, while using significantly less computational resources.
International Journal of Engineering Research and Applications (IJERA) is an open access online peer reviewed international journal that publishes research and review articles in the fields of Computer Science, Neural Networks, Electrical Engineering, Software Engineering, Information Technology, Mechanical Engineering, Chemical Engineering, Plastic Engineering, Food Technology, Textile Engineering, Nano Technology & science, Power Electronics, Electronics & Communication Engineering, Computational mathematics, Image processing, Civil Engineering, Structural Engineering, Environmental Engineering, VLSI Testing & Low Power VLSI Design etc.
A Hybrid Digital Watermarking Approach Using Wavelets and LSB IJECEIAES
The present paper proposed a novel approach called Wavelet based Least Significant Bit Watermarking (WLSBWM) for high authentication, security and copyright protection. Alphabet Pattern (AP) approach is used to generate shuffled image in the first stage and Pell’s Cat Map (PCM) is used for providing more security and strong protection from attacks. PCM applied on each 5×5 sub images. A wavelet concept is used to reduce the dimensionality of the image until it equals to the size of the watermark image. Discrete Cosign Transform is applied in the first stage; later N level Discrete Wavelet Transform (DWT) is applied for reducing up to the size of the watermark image. The water mark image is inserted in LH Sub band of the wavelet image using LSB concept. Simulation results show that the proposed technique produces better PSNR and similarity measure. The experimental results indicate that the present approach is more reliable and secure efficient. The robustness of the proposed scheme is evaluated against various image-processing attacks.
Review paper on segmentation methods for multiobject feature extractioneSAT Journals
Abstract Feature extraction and representation plays a vital role in multimedia processing. It is still a challenge in computer vision system to extract ideal features that represents intrinsic characteristics of an image. Multiobject feature extraction system means a system that can extract features and locations of multiple objects in an image. In this paper we have discuss various methods to extract location and features of multiple objects and describe a system that can extract locations and features of multiple objects in an image by implementing an algorithm as hardware logic on a field-programmable gate array-based platform. There are many multiobject extraction methods which can be use for image segmentation based on motion, color intensity and texture. By calculating zeroth and first order moments of objects it is possible to obtain locations and sizes of multiple objects in an image. Keywords: multiobject extraction, image segmentation
A highly robust and secure image watermarking based on classification and vis...AliFatahbeygi
In this paper a new robust image watermarking algorithm based on blocks classification and visual cryp tography (VC) is presented. First the original image is decomposed into non-overlapping blocks. Then, we use canny edge detection and the support vector machine (SVM) classification method to categorize these blocks into smooth and non-smooth classes. The VC technique is used to generate two image shares: A
master share that is constructed according to the block classification results and an owner share generated by using the master share together with a binary watermark. To verify the ownership of the image the watermark can be retrieved by stacking the master share and the owner share. By skipping blocks which are not robust against attacks, the robustness of our proposed watermarking method is significantly improved. Our method is completely imperceptible because the watermark pattern is concealed without modifying the original host image.
Self Attested Images for Secured Transactions using Superior SOMIDES Editor
Separate digital signals are usually used as the
digital watermarks. But this paper proposes rebuffed
untrained minute values of vital image as a digital watermark,
since no host image is needed to hide the vital image for its
safety. The vital images can be transformed with the self
attestation. Superior Self Organized Maps is used to derive
self signature from the vital image. This analysis work
constructs framework with Superior Self Organizing Maps
(SSOM) against Counter Propagation Network for watermark
generation and detection. The required features like
robustness, imperceptibility and security was analyzed to prove
that which neural network is appropriate for mining watermark
from the host image. SSOM network is proved as an efficient
neural trainer for the proposed watermarking technique. The
paper presents one more contribution to the watermarking
area.
Entropy based Digital Watermarking using 2-D Biorthogonal WAVELETpaperpublications3
Abstract: The Security is the most important aspect of Database, for maintain the integrity and as well as security of the system image watermarking is technique proposed at the year of 1996, in this paper we also implement image watermarking using 2-D biorthogonal Wavelt. The importance of transmitting digital information in digital watermarking system and the dissymmetric digital watermarking framework lived on media content communication is also being discussed in this paper. Then we apply watermarking embedding algorithm to keep the balance between watermarks’ imperceptibility and its robustness while the data is being sent on the communication channel.Keywords: Discrete Wavelet Transform (DWT), Gray Scale, Peak Signal to Noise Ratio (PSNR).
Title: Entropy based Digital Watermarking using 2-D Biorthogonal WAVELET
Author: Abhinav Kumar
ISSN 2350-1022
International Journal of Recent Research in Mathematics Computer Science and Information Technology
Paper Publications
Abstract: The increasing amount of applications using digital multimedia technologies has accentuated the need to provide copyright protection to multimedia data. This paper reviews one of the data hiding techniques - digital image watermarking. Through this paper we will explore some basic concepts of digital image watermarking techniques.Two different methods of digital image watermarking namely spatial domain watermarking and transform domain watermarking are briefly discussed in this paper. Furthermore, two different algorithms for a digital image watermarking have also been discussed. Also the comparision between the different algorithms,tests performed for the robustness and the applications of the digital image watermarking have also been discussed.
SVD Based Robust Digital Watermarking For Still Images Using Wavelet Transform cscpconf
This paper aims at developing a hybrid image watermarking algorithm which satisfies both
imperceptibility and robustness requirements. In order to achieve our objectives we have used
singular values of Wavelet Transformation’s HL and LH sub bands to embed watermark.
Further to increase and control the strength of the watermark, we use a scale factor. An optimal
watermark embedding method is developed to achieve minimum watermarking distortion. A
secret embedding key is designed to securely embed the fragile watermarks so that the new
method is robust to counterfeiting, even when the malicious attackers are fully aware of the
watermark embedding algorithm. Experimental results are provided in terms of Peak signal to
noise ratio (PSNR), Normalized cross correlation (NCC) and gain factor to demonstrate the
effectiveness of the proposed algorithm. Image operations such as JPEG compression from
malicious image attacks and, thus, can be used for semi-fragile watermarking
Comparative Study on Watermarking & Image Encryption for Secure CommunicationIJTET Journal
Over the past decades, research in security has concentrated on the development of algorithms and protocols for authentication, encryption and integrity of data. Despite tremendous advances, several security problems still afflict system’s. In this android app watermarking and encryption is being applied on images and data. Because of the human visual system’s low sensitivity to small changes and the high flexibility of digital media, anyone can easily make small changes in digital data with low perceptibility. Here watermarking and encryption are being performed in wavelet domain. Here in watermarking, the coefficients of watermarks are being embedded with the coefficients of the original image. Encryption is being done in wavelet domain so that the probability of an intruder trying to access the contents is very much minimized. Thus, this model provides a high level of security.
The document describes a proposed method for generic lossless visible watermarking that allows lossless recovery of the original image from the watermarked image. It introduces compound mappings that can map pixel values to those of a desired visible watermark in a reversible way. The method is generic and can embed different types of visible watermarks, including opaque monochrome watermarks and translucent full-color watermarks. Experimental results demonstrate the effectiveness of the approach.
Similar to Robust Digital Image-Adaptive Watermarking Using BSS Based (20)
Andreas Schleicher presents PISA 2022 Volume III - Creative Thinking - 18 Jun...EduSkills OECD
Andreas Schleicher, Director of Education and Skills at the OECD presents at the launch of PISA 2022 Volume III - Creative Minds, Creative Schools on 18 June 2024.
🔥🔥🔥🔥🔥🔥🔥🔥🔥
إضغ بين إيديكم من أقوى الملازم التي صممتها
ملزمة تشريح الجهاز الهيكلي (نظري 3)
💀💀💀💀💀💀💀💀💀💀
تتميز هذهِ الملزمة بعِدة مُميزات :
1- مُترجمة ترجمة تُناسب جميع المستويات
2- تحتوي على 78 رسم توضيحي لكل كلمة موجودة بالملزمة (لكل كلمة !!!!)
#فهم_ماكو_درخ
3- دقة الكتابة والصور عالية جداً جداً جداً
4- هُنالك بعض المعلومات تم توضيحها بشكل تفصيلي جداً (تُعتبر لدى الطالب أو الطالبة بإنها معلومات مُبهمة ومع ذلك تم توضيح هذهِ المعلومات المُبهمة بشكل تفصيلي جداً
5- الملزمة تشرح نفسها ب نفسها بس تكلك تعال اقراني
6- تحتوي الملزمة في اول سلايد على خارطة تتضمن جميع تفرُعات معلومات الجهاز الهيكلي المذكورة في هذهِ الملزمة
واخيراً هذهِ الملزمة حلالٌ عليكم وإتمنى منكم إن تدعولي بالخير والصحة والعافية فقط
كل التوفيق زملائي وزميلاتي ، زميلكم محمد الذهبي 💊💊
🔥🔥🔥🔥🔥🔥🔥🔥🔥
This presentation was provided by Rebecca Benner, Ph.D., of the American Society of Anesthesiologists, for the second session of NISO's 2024 Training Series "DEIA in the Scholarly Landscape." Session Two: 'Expanding Pathways to Publishing Careers,' was held June 13, 2024.
Chapter wise All Notes of First year Basic Civil Engineering.pptxDenish Jangid
Chapter wise All Notes of First year Basic Civil Engineering
Syllabus
Chapter-1
Introduction to objective, scope and outcome the subject
Chapter 2
Introduction: Scope and Specialization of Civil Engineering, Role of civil Engineer in Society, Impact of infrastructural development on economy of country.
Chapter 3
Surveying: Object Principles & Types of Surveying; Site Plans, Plans & Maps; Scales & Unit of different Measurements.
Linear Measurements: Instruments used. Linear Measurement by Tape, Ranging out Survey Lines and overcoming Obstructions; Measurements on sloping ground; Tape corrections, conventional symbols. Angular Measurements: Instruments used; Introduction to Compass Surveying, Bearings and Longitude & Latitude of a Line, Introduction to total station.
Levelling: Instrument used Object of levelling, Methods of levelling in brief, and Contour maps.
Chapter 4
Buildings: Selection of site for Buildings, Layout of Building Plan, Types of buildings, Plinth area, carpet area, floor space index, Introduction to building byelaws, concept of sun light & ventilation. Components of Buildings & their functions, Basic concept of R.C.C., Introduction to types of foundation
Chapter 5
Transportation: Introduction to Transportation Engineering; Traffic and Road Safety: Types and Characteristics of Various Modes of Transportation; Various Road Traffic Signs, Causes of Accidents and Road Safety Measures.
Chapter 6
Environmental Engineering: Environmental Pollution, Environmental Acts and Regulations, Functional Concepts of Ecology, Basics of Species, Biodiversity, Ecosystem, Hydrological Cycle; Chemical Cycles: Carbon, Nitrogen & Phosphorus; Energy Flow in Ecosystems.
Water Pollution: Water Quality standards, Introduction to Treatment & Disposal of Waste Water. Reuse and Saving of Water, Rain Water Harvesting. Solid Waste Management: Classification of Solid Waste, Collection, Transportation and Disposal of Solid. Recycling of Solid Waste: Energy Recovery, Sanitary Landfill, On-Site Sanitation. Air & Noise Pollution: Primary and Secondary air pollutants, Harmful effects of Air Pollution, Control of Air Pollution. . Noise Pollution Harmful Effects of noise pollution, control of noise pollution, Global warming & Climate Change, Ozone depletion, Greenhouse effect
Text Books:
1. Palancharmy, Basic Civil Engineering, McGraw Hill publishers.
2. Satheesh Gopi, Basic Civil Engineering, Pearson Publishers.
3. Ketki Rangwala Dalal, Essentials of Civil Engineering, Charotar Publishing House.
4. BCP, Surveying volume 1
This presentation was provided by Racquel Jemison, Ph.D., Christina MacLaughlin, Ph.D., and Paulomi Majumder. Ph.D., all of the American Chemical Society, for the second session of NISO's 2024 Training Series "DEIA in the Scholarly Landscape." Session Two: 'Expanding Pathways to Publishing Careers,' was held June 13, 2024.
Robust Digital Image-Adaptive Watermarking Using BSS Based
1. Sangeeta Jadhav & Dr Anjali Bhalchandra
International Journal of Image Processing (IJIP) Volume (4): Issue (1)
77
Robust Digital Image-Adaptive Watermarking Using BSS Based
Extraction Technique
Sangeeta Jadhav djsangeeta@rediffmail.com
Asst Prof./E & TC
AIT,Pune University
Pune (MS), 411015, India
Dr Anjali Bhalchandra asbhalchandra@yahoo.com
HOD & Prof/E & TC
BAM University
Aurangabad (MS), 431005, India
Abstract
In a digital watermarking scheme, it is not convenient to carry the original image
all the time in order to detect the owner's signature from the watermarked image.
Moreover, for those applications that require different watermarks for different
copies, it is preferred to utilize some kind of watermark-independent algorithm for
extraction process i.e. dewatermarking. Watermark embedding is performed in
the blue channel, as it is less sensitive to human visual system .This paper
proposes a new color image watermarking method ,which adopts Blind Source
Separation (BSS) technique for watermark extraction. Single level Discrete
Wavelet Transform (DWT) is used for embedding . The novelty of our scheme
lies in determining the mixing matrix for BSS model during embedding. The
determination of mixing matrix using Quasi-Newton’s (BFGS) technique is
based on texture analysis which uses energy content of the image. This makes
our method image adaptive to embed the watermark into original image so as
not to bring about a perceptible change in the marked image. An effort is also
made to check feasibility of proposed method in device dependent color spaces
viz. YIQ,YCbCr and HSI . BSS based on joint diagonalization of the time delayed
covariance matrices algorithm is used for the extraction of watermark. The
proposed method, undergoing different experiments, has shown its robustness
against many attacks including rotation, low pass filtering, salt n paper noise
addition and compression. The robustness evaluation is also carried out with
respect to the spatial domain embedding.
Keywords: - DWT, BSS, BFGS, Mixing matrix, Attacks, Dewatermarking.
1. INTRODUCTION
With the development of network and multimedia techniques, data can now be distributed much
faster and easier. Unfortunately, engineers still see immense technical challenges in discouraging
unauthorized copying and distributing of electronic documents [1, 2]. Different kinds of
2. Sangeeta Jadhav & Dr Anjali Bhalchandra
International Journal of Image Processing (IJIP) Volume (4): Issue (1)
78
handwritten signatures, seals or watermarks have been used since ancient times as a way to
identify the source or creator of document or picture. However, in digital world, digital technology
for manipulating images has made it difficult to distinguish the visual truth. One potential solution
for claiming the ownership is to use digital watermarks. A digital watermark is a transparent,
invisible information pattern that is inserted into a suitable component of the data source by using
a specific computer algorithm. In nature, the process of watermark embedding is the same as
some special kind of patterns or under-written images are added into the host image, we can
consider it as a mixture of host image and watermark , thus without host image, the watermark
detection is equal to blind source separation in the receiver. Blind digital watermarking does not
need the original images or video frames in the detection stage, thus it is the only feasible way to
do watermarking in many multimedia applications, such as data monitoring or tracking on the
internet, notification of copyright in playing DVD’s. In particular some watermarking schemes
require access to the 'published' watermarked signal that is the original signal just after adding
the watermark. These schemes are referred as semi-blind watermarking schemes. Private
watermarking [3] and non-blind-watermarking mean the same: the original cover signal is
required during the detection process. The watermarked image is viewed as linear mixture of
sources [4] i.e. original image and watermark and then we attempt to recover sources from their
linear mixtures without resorting to any prior knowledge by using Blind Source Separation theory.
Independent Component Analysis (ICA) is probably the most powerful and widely-used method
for performing Blind Source Separation [15].
To present the basic principle of this new watermarking technique based on BSS, the paper is
restricted to watermarking and dewatermarking with the simplest BSS model. The BSS model
used to embed the watermark in the blue channel is shown below.
FIGURE 1: BSS model
.
The simplest BSS model assumes the existence of ‘n’ independent components i.e. the source
signals S1,S2,S3……..Sn [S(t)], and the same number of linear and instantaneous mixtures
X1,X2,……Xn [X(t)] of these sources . In vector matrix notation form the mixing matrix model can
be represented as -
x=A*s (1)
Where A is square (n x n) mixing matrix. W is separating matrix or demixing matrix and
Y1,Y2,……Yn.[Y(t)] are estimated output sources which should be identical to sources
represented by S(t).
Image watermarking techniques proposed so far can be categorized based on the domain used
for watermarking embedding domain. The first class includes the spatial domain methods [9].
These embed the watermark by directly modifying the pixel values of the original image. The
second contains Transform domain techniques, Discrete Fourier Transform (DFT), Discrete
Wavelet Transform (DWT) [11], Discrete Cosine Transform (DCT) [10].The third class is the
feature domain technique, where region, boundary and object characteristics are taken into
account [16]. The first class includes the works of Adib et al [4] have proposed to use the blue
channel as the embedding medium . In [5] the authors have benefited from a new decomposition
of the color images by the use of hyper complex numbers, namely the Quaternion and they
achieved their watermarking/data-hiding operation on the component of the quaternion Fourier
Transform. In the recent past, significant attention has been drawn to Blind source Separation by
Independent Component Analysis [7,8] and has received increasing care in different image data
applications such as image data compression, recognition, analysis etc. The technique of BSS
3. Sangeeta Jadhav & Dr Anjali Bhalchandra
International Journal of Image Processing (IJIP) Volume (4): Issue (1)
79
has been extended to the field of watermarking images [6, 12]. In [4], several assumptions are
made regarding values of the mixing coefficients, distribution of the watermark as well as the
mixing process. The proposed BSS based method is more flexible in the sense that the system
finds out best suited mixing matrix using Quasi-Newton (BFGS)algorithm to keep the watermark
hidden in the selected image. Watermark embedding in wavelet domain with adaptive mixing
matrix makes the method quite difficult to extract unknown watermark using the existing simple
methods, for example using [12].
The objective of this paper is to introduce an efficient digital image watermarking scheme based
on BSS theory adopting watermark embedding in wavelet domain, which is more robust to the
dewatermarking attacks as compared to the methods [10] in spatial domain embedding.
In the present work the effort has been also put to check the feasibility of proposed method in
device dependent color spaces namely HSI, YIQ and YCbCr. In device dependent color spaces,
color produced depends on parameters used as well as the equipment used for the display.
The RGB color space is highly correlated except of the blue channel because of its low sensitivity
to human perception. The same set of embedding and detecting procedure is applied to all the
color spaces so as to achieve the best comparison among them. The simulation results are
shown for blue channel of RGB color space.
A BSS/ICA algorithm based on Joint diagonalization of the time delayed covariance matrices [13]
is used for the extraction of watermark.
The paper is structured as follows: section 2 describes the proposed watermarking method
including the watermark embedding using DWT and estimation of mixing matrix. The watermark
extraction using BSS/ICA algorithm is also discussed in this section. The simulation results are
illustrated in section 3. The robustness testing w. r. t. spatial domain embedding is analysed in
section 4 .Finally section 5 mentions conclusions and future work.
2. WATERMARKING SYSTEM
In the generic watermark embedding scheme, the inputs to the system are the original image and
the watermark. To assure the identifiability of BSS model , it is required that the number of
observed linear mixture inputs is at least equal to or larger than the number of independent
sources [15] .
2.1 The Watermark Embedding Scheme
In this paper the effective watermark embedding consists of mainly three phases. In first phase
the blue channels of the host image and watermark image are extracted. The size of host image
selected is 512*512 (M x M) and size of watermark image is 64*64 (N x N) so that M>>N. In order
to determine the sub-image of interest ,the host image is divided into 128*128 blocks and a
sliding square window containing Nb number of such blocks in both the horizontal and vertical
directions (a tentative sub-image) is considered. It has been shown that the energy of textured
portion of image is high. Based on the energy content of the image, the two blue channel sub-
images of size 128*128, one representing the smooth portion and other the textured one are
taken out. In high textured area the visibility is low; therefore a textured sub-image is selected to
embed the watermark. In second phase a single level DWT using haar wavelet function is
applied to this textured sub-image and only the lowest frequency band (LL1 of size 64*64) is
selected for embedding the watermark (size 64*64) . To have as many mixtures as sources, the
mixing matrix A is selected to be a square matrix (order 2*2). The mixing operator ‘A’ has to be
appropriately chosen such that the human vision can not determine that the message
(watermark) is contained inside a host image. A Quasi-Newton (BFGS) algorithm [14] is used to
estimate the mixing matrix A to keep the watermark hidden.
2.2 Estimation Of Mixing Matrix (Statistical Model)
In the proposed method the sources namely original image and watermark are known. The
concept of correlation cancellation is used to estimate the mixing matrix A [13].
Consider two zero mean vector signals x(k) and s(k) that are related by the
linear transformation
4. Sangeeta Jadhav & Dr Anjali Bhalchandra
International Journal of Image Processing (IJIP) Volume (4): Issue (1)
80
x(k)=As(k) +e(k)
where A is unknown full rank mixing matrix and e(k) is a vector of zero mean
error , interference or noise depending on application. Generally vectors s(k) and x(k) are
correlated i.e. Rxs = E{x sT
} 0 but the error or noise e is uncorrelated with s, hence our
objective is to find out the matrix A such that the new pair of vectors
e = x-As and s are no longer correlated with each other and can be expressed in terms of
equation as-
Res= E{esT
}=E{(x-As)sT
}= 0
The cross correlation matrix can be written as
Res =E{xsT
-AssT
}=Rxs-ARss
Hence the optimal mixing matrix can be expressed as
Aopt=Rxs R
1
ss
=E{xsT
}(E{ssT
})
1
The same result is obtained by minimizing the mean square error cost function
J(e) =
2
1E{eT
e}=E{(x-As)
T
(x-As)}
=
2
1(E{xT
x}-E{sT
AT
x}-E{sT
AT
x}-E{xT
As}+E{sT
AT
As})
By computing the gradient of the cost function J(e) w.r.t. A we obtain
A
eJ
)( = - E{xsT
}+AE{ssT
}
Hence applying the Quasi-Newton or BFGS approach, we obtain adaptive algorithm for the
estimation of the mixing matrix to keep the watermark hidden in the host or original image.
A(k)= - V *
)(
)(
kA
eJ
(2)
J(e) could be energy, entropy ,homogeneity or inertia of the original image. In this paper energy
of the original image is used.V is a system constant. A(k) = controlled rate of change of J
w.r.t. mixing matrix A. Assuming the optimum value of A is achieved when gradient is zero.
(3)
Equation (2) becomes
)(
)(
kA
eJ
=
22211211 a
J
a
J
a
J
a
J
But if we can simplify coefficients by certain assumptions
i.e. let a11 =a12=1
a12= 1-t
a22= 1+t
Then instead of A we just have to check for ‘t’ so the equation gets reduce to
5. Sangeeta Jadhav & Dr Anjali Bhalchandra
International Journal of Image Processing (IJIP) Volume (4): Issue (1)
81
)(
)(
kA
eJ
=
dt
edJ )( [since dA=dt]
In BFGS algorithm the value of system constant V =1 initially and as the process grows it gets
updated and the value of ‘A’ gets converge easily.
In third phase, one of the compound sub-images (watermarked sub-image) is encrusted into the
corresponding blocks of the earlier chosen region (by the BFGS algorithm) for the embedding ,in
the original image called watermarked image and is open to the public. The remaining
watermarked textured sub-image is kept secret by the copyright owner. It will constitute the
secret key corresponding to the location at which the watermark is fused with the original (host)
image.
FIGURE 2: Flowchart showing the Watermark Embedding Process
As shown in Figure 2- Mixture1 and Mixture2 has following relationship-
Equation (1) i.e. x=A*s can be written in matrix form as
2
1
Mixture
Mixture
= A *
2
1
Source
Source
From Equation (3)
Mixture1=a11* Source1 + a12* Source2
Mixture2=a21* Source1 +a22* Source2
Thus a watermark embedding process is summarized in the following steps.
6. Sangeeta Jadhav & Dr Anjali Bhalchandra
International Journal of Image Processing (IJIP) Volume (4): Issue (1)
82
Step-1 Take the host and watermark color images, respectively of size (MxM) and (NxN) with
M>>N. Select their blue channels.
Step-2 Select textured regions block based on energy metric. Take one level DWT and use
LL1 for further processing.
Step-3 Obtain the mixing matrix using Quasi-Newton (BFGS) algorithm [14] in order to keep
watermark hidden in textured sub-image to form the watermarked mixtures. Take inverse
wavelet of watermarked mixtures.
Step-4 One of the compound sub-images (watermarked sub-image) is encrusted into the
corresponding blocks of the earlier chosen region of high energy in the original image.The
other secret watermarked mixture in blue channels must be kept for a prospective use in the
watermark extraction process.
2.3 Watermark Extraction
A) PCA whitening –watermark detection
Standard Principal Component Analysis (PCA) is often used for whitening process [12], since it
can compress information optimally in the mean-squared error sense, while filtering possible
noise simultaneously.The PCA whitening matrix is given by
V=D
-1/2
U
T
Where D is the diagonal matrix of data covariance matrix E[Xj Xj
T
] and U is its eigenmatrix,and
E[.] denotes the expectation operator.
If the rank of D is equal to two for watermarked image ,meaning that there are totally two image
sources. On the otherhand, if the image is unwatermarked image the rank D will be reduced to
one.
After pre-whitening process, the sources are recovered by iteratively estimating the unmixing
matrix W through a joint diagonalization of the time delayed covariance matrices algorithm[13]
As shown in Figure 3, the extraction process can be summarized in the following steps.
Step-1 Extract the marked block from the tampered watermarked image by using the first
part of the key which is the position key.
Step- 2 Obtain the blue channels of the extracted blocks.
Step -3 Apply a PCA whitening process on associated blue channel .
Step-4 Post processing has to be done on the whitened blue channel. Joint
diagonalization algorithm is used to recover both host image and watermark.
FIGURE 3: Watermark Extraction Using BSS
7. Sangeeta Jadhav & Dr Anjali Bhalchandra
International Journal of Image Processing (IJIP) Volume (4): Issue (1)
83
3 SIMULATION RESULTS
3.1 Feasibility Of Proposed Method In Blue Channel Of RGB Color Space
Simulation experiments are conducted to demonstrate the feasibility and robustness of
proposed BSS based watermark extraction method. Some results of DWT embedding are
given below
(a) (b)
FIGURE 4: Original Image (a) and Watermark (b)
FIGURE 5: Smooth and Textured Portions of Original Image
FIGURE 6: DWT of Textured Sub-image
FIGURE 7 :Watermarked Mixture Sub-images
8. Sangeeta Jadhav & Dr Anjali Bhalchandra
International Journal of Image Processing (IJIP) Volume (4): Issue (1)
84
(a) (b)
FIGURE 8 :Watermarked Image (a) Original Host Image or Covertext (b)
FIGURE 9: Recovered Watermark
3.2 Feasibility Of Proposed Method In Device Dependent Color Spaces
The proposed method of watermarking is tested over device dependent color spaces mentioned in Table 1
The Table 1 shows the value of PSNR and Correlation Coefficient computed by Equation (5) and (6) for
recovered watermark using spatial domain embedding. The value of mixing matrix generated using BFGS
method is also mentioned in the table.
TABLE 1: Embedding in Spatial Domain Without Attack
In Table 2, the performance parameters PSNR and Correlation Coefficient computed for recovered
watermark using BSS extraction technique; with DWT domain embedding is shown. The value of mixing
matrix is also shown in the table.
9. Sangeeta Jadhav & Dr Anjali Bhalchandra
International Journal of Image Processing (IJIP) Volume (4): Issue (1)
85
TABLE 2: Embedding in DWT Domain Without Attack
4 ROBUSTNESS TESTING WITH RESPECT TO SPATIAL DOMAIN
EMBEDDING
The watermarking system should be robust against data distortions introduced through standard
data processing and attacks. It should be virtually impossible for unauthorized users to remove it
and practically the image quality must be degraded before the watermark is lost. There are many
attacks against which image watermarking system could be judged . The attacks include average
filtering ,rotation (+90
0
),median filtering ,Salt n Paper noise and so on .These various attacks are
applied to the watermarked images to evaluate whether the proposed dewatermarking system
can recover the embedded watermark, thus measuring the robustness of the watermarking
system to these types of attacks.
Mean Square Error (MSE), PSNR (Peak signal to Noise Ratio) and NC (Normalized Cross-
Correlation) are used to estimate the quality of extracted watermark.
The equations used are defined as below-
(4)
Where r(i,j) represents pixel at location ( i,j) of the original watermark and r*
( i ,j ) represents
the pixel at location ( i ,j) of recovered watermark. M,N denotes the size of the pixel.
PSNR 10 log10
MSE
2
255 (5)
NC
1 1
2'
1 1
2
1 1
'*
m nm n
m n
WW
WW (6)
Where W is original watermark and W’ is recovered watermark with zero mean value each.
As shown in Figure 10 , the PSNR in dB is calculated by using Equation 5 and compared for both
the types of embedding viz. Spatial domain and DWT domain embedding. It is observed that the
PSNR obtained in DWT embedding is high under various attack conditions. In Figure 11, the
correlation coefficients (NC) comparison is shown.
10. Sangeeta Jadhav & Dr Anjali Bhalchandra
International Journal of Image Processing (IJIP) Volume (4): Issue (1)
86
FIGURE 10: PSNR( dB) comparison for DWT based and spatial watermark embedding
FIGURE 11: Normalized Correlation Coefficient (NC) Comparison
JPEG Quality variation is tested for DWT based and spatial based embedding and plotted
against PSNR of recovered watermark.
As shown in graph ,it is observed that the PSNR values are more in case of DWT based
embedding as compared to the Spatial based embedding proving that DWT based embedding is
more robust against the
watermarking attacks .
11. Sangeeta Jadhav & Dr Anjali Bhalchandra
International Journal of Image Processing (IJIP) Volume (4): Issue (1)
87
FIGURE 12: PSNR (dB) comparison for JPEG Quality variation
5 CONSLUSION & FUTURE WORK
In this paper, we proposed a digital color image watermarking system using wavelet(DWT)
domain embedding and adopting Blind Source Separation theory along with RGB decomposition
to extract watermark. The novelty of our scheme lies in determining the mixing matrix for BSS
model , based on energy content of the image using Quasi Newton (BFGS ) method. This makes
our method image adaptive to embed any image watermark into original host image. The effort
has been also put to check the feasibility of proposed method in device dependent color spaces
for the application of image watermarking. The watermark is readily detected by Principal
Component Analysis(PCA) whitening process .The watermark is further separated by using
BSS/ICA algorithm based on Joint diagonalization of the time delayed covariance matrices. The
performance of the proposed method can be evaluated in terms of normalized correlation
coefficient and PSNR with respect to spatial domain watermark embedding. Experimental results
demonstrate the proposed watermarking scheme is more robust to various attacks as compared
to spatial domain watermark embedding.
In future research work, it is proposed to implement the watermark extraction process in time-
frequency domain using DWT in order to improve the performance for different types of images
as well as to make the proposed watermarking scheme more robust against various attacks.
6 REFERNCES
[1] Peter H W Wong, Oscar C Au and YM Yeung, “A novel blind multiple watermarking technique for
Images”, in IEEE transactions on circuits and ystems for video technology, vol.13, No. 8,pp
813 -830,yr 2003
[2] Chiou-Ting Hsu, Ja-Ling Wu, “Hidden Digital Watermarks in Images,” in IEEE transaction on
image processing, vol.8 No.1, pp 58-68,Jan1999.
[3] Ibrahim Nasir et al. “ a New Robust Watermarking Scheme for Color Image in spatial Domain”,
ieeexplore.ieee.org/iel5/4618740/4618741/04618875.pdf.
[4] Moilim Amir, Abdellah Adib et al , “Color Images Watermarking by Means of Independent
Component Analysis”,in IEEE transaction pp 347-350,yr-2007.
[5] Tsz Kin Tsui et al , “ Quaternion Image Watermarking using the Spatio-Chromatic Fourier
Coefficients Analysis”, in ACM 1-59593-447-2/06/0010, yr-2006.
[6] Thang V. Nguyen et al., “A Novel Digital Image Watermarking Scheme Using Blind Source
Separation”, Proc of IEEE, ICIP,pp2649-2652,Yr 2004.
[7] Yang Su –min,Wang Jia-zhen,ZHANG Zheng-bao Ding Guo-liang, “A digital watermark based on blind
signal separation algorithm,” in ICIP 2006 proceedings.
[8] Thang Viet et al. “A Simple ICA –based Digital Image Watermarking Scheme”,DSP archive ,Volume
18,issue 5,yr-2008.
12. Sangeeta Jadhav & Dr Anjali Bhalchandra
International Journal of Image Processing (IJIP) Volume (4): Issue (1)
88
[9] Peter H W Wong, Oscar C Au and YM Yeung, “A novel blind multiple watermarking technique for
Images”, in IEEE transactions on circuits and ystems for video technology, vol.13, No. 8,pp 813 -
830,yr 2003
[10] Chiou-Ting Hsu, Ja-Ling Wu, “Hidden Digital Watermarks in Images,” in IEEE transaction on
image processing, vol.8 No.1, pp 58-68,Jan1999.
[11] Shang-Lin Hsieh et al , “a Color Image Watermarking Scheme Based on Secret Sharing and Wavelet
Transform” ,IEEE,pp-2143-2147,Yr 2007.
[12] Dan Yu ,Farook Sattar et al , “Watermark Detection and Extraction using Independent component
analysis Method”,EURASIP Journal on Applied Signal Processing 2002:1,92-104
[13] A.Cichoki,Shun-ichi Amari , “Adaptive Blind Signal nd Image Processing –Learning Algorihms and
pplications”, Oct-2005,pp 0-175.
[14] L F Escudero, “On Diagonally preconditioning the 2-Steps BFGS Method With Accumulated Steps
for Supra Scale Linearly Constrained Non Linear Programming”published in QUESTIIO-1982,vol-
06 no-04, Yr 1982.
[15] A Hyvarinen and E. Oja , “ Independent Analysis a Tutorial”, http://www.cis.hut.fi/projects/ica/April99.
[16] SUN Jiande et al. “A Blind Video Watermarking Scheme based on ICA and Shot
Segmentation”,Science in China Series F Information Sciences,vol-49, No-3,pp302-312 Yr 2006.