The document proposes a secured reversible data transmission method for encoded AVC video using a Gzip Deflector algorithm. It embeds residual information from a visible watermarking process using reversible contrast mapping after compressing the information with Gzip Deflector and encrypting it with AES. Simulation results showed the proposed method achieved up to 7dB higher PSNR than the state of the art approach when recovering the original video frames.
Iaetsd literature review on generic lossless visible watermarking &Iaetsd Iaetsd
This document discusses literature on lossless visible watermarking and lossless image recovery. It begins by introducing digital watermarking and classifying methods as visible or invisible. Reversible watermarking allows removal of embedded watermarks and restoration of the original content. The document then reviews existing watermarking techniques in the spatial, frequency and wavelet domains. It proposes a novel method for generic visible watermarking using deterministic one-to-one compound mappings that are reversible, allowing lossless recovery of original images from watermarked images. This approach can embed various visible watermarks of arbitrary sizes into images in a lossless manner.
International Journal of Engineering Research and Applications (IJERA) is an open access online peer reviewed international journal that publishes research and review articles in the fields of Computer Science, Neural Networks, Electrical Engineering, Software Engineering, Information Technology, Mechanical Engineering, Chemical Engineering, Plastic Engineering, Food Technology, Textile Engineering, Nano Technology & science, Power Electronics, Electronics & Communication Engineering, Computational mathematics, Image processing, Civil Engineering, Structural Engineering, Environmental Engineering, VLSI Testing & Low Power VLSI Design etc.
This document discusses a structural similarity based approach for efficient multi-view video coding. It begins with an introduction to multi-view video coding and the structural similarity index metric. It then proposes using structural similarity to exploit structural information between different video views. The method uses structural similarity for rate distortion optimization in encoding. Experimental results show the left and right views of a video, their structural similarity image, the decoded 3D video, and the achieved minimum distortion level. The document aims to improve multi-view video quality by using structural similarity during the encoding process.
Project Presentation presented in the final semester of B.Tech (EEE) during the session of 2010-11 By Paras Prateek Bhatnagar, Paramjeet Singh Jamwal, Nisha Rajani & Preeti Kumari.
This document summarizes an article that proposes modifications to the JPEG 2000 image compression standard to achieve higher compression ratios while maintaining acceptable error rates. The proposed Adaptive JPEG 2000 technique involves pre-processing images with a transfer function to make them more suitable for compression by JPEG 2000. This is intended to provide higher compression ratios than the original JPEG 2000 standard while keeping root mean square error within allowed thresholds. The document provides background on JPEG 2000 and lossy image compression techniques, describes the proposed pre-processing approach, and indicates it was tested on single-channel images.
International Journal of Engineering Research and Development (IJERD)IJERD Editor
journal publishing, how to publish research paper, Call For research paper, international journal, publishing a paper, IJERD, journal of science and technology, how to get a research paper published, publishing a paper, publishing of journal, publishing of research paper, reserach and review articles, IJERD Journal, How to publish your research paper, publish research paper, open access engineering journal, Engineering journal, Mathemetics journal, Physics journal, Chemistry journal, Computer Engineering, Computer Science journal, how to submit your paper, peer reviw journal, indexed journal, reserach and review articles, engineering journal, www.ijerd.com, research journals,
yahoo journals, bing journals, International Journal of Engineering Research and Development, google journals, hard copy of journal
IJRET : International Journal of Research in Engineering and Technology is an international peer reviewed, online journal published by eSAT Publishing House for the enhancement of research in various disciplines of Engineering and Technology. The aim and scope of the journal is to provide an academic medium and an important reference for the advancement and dissemination of research results that support high-level learning, teaching and research in the fields of Engineering and Technology. We bring together Scientists, Academician, Field Engineers, Scholars and Students of related fields of Engineering and Technology
This document discusses techniques for effective compression of digital video. It introduces several key algorithms used in video compression, including discrete cosine transform (DCT) for spatial redundancy reduction, motion estimation (ME) for temporal redundancy reduction, and embedded zerotree wavelet (EZW) transforms. DCT is used to compress individual video frames by removing spatial correlations within frames. Motion estimation compares blocks of pixels between frames to find and encode motion vectors rather than full pixel values, reducing file size. Combined, these techniques can achieve high compression ratios while maintaining high video quality for storage and transmission.
Iaetsd literature review on generic lossless visible watermarking &Iaetsd Iaetsd
This document discusses literature on lossless visible watermarking and lossless image recovery. It begins by introducing digital watermarking and classifying methods as visible or invisible. Reversible watermarking allows removal of embedded watermarks and restoration of the original content. The document then reviews existing watermarking techniques in the spatial, frequency and wavelet domains. It proposes a novel method for generic visible watermarking using deterministic one-to-one compound mappings that are reversible, allowing lossless recovery of original images from watermarked images. This approach can embed various visible watermarks of arbitrary sizes into images in a lossless manner.
International Journal of Engineering Research and Applications (IJERA) is an open access online peer reviewed international journal that publishes research and review articles in the fields of Computer Science, Neural Networks, Electrical Engineering, Software Engineering, Information Technology, Mechanical Engineering, Chemical Engineering, Plastic Engineering, Food Technology, Textile Engineering, Nano Technology & science, Power Electronics, Electronics & Communication Engineering, Computational mathematics, Image processing, Civil Engineering, Structural Engineering, Environmental Engineering, VLSI Testing & Low Power VLSI Design etc.
This document discusses a structural similarity based approach for efficient multi-view video coding. It begins with an introduction to multi-view video coding and the structural similarity index metric. It then proposes using structural similarity to exploit structural information between different video views. The method uses structural similarity for rate distortion optimization in encoding. Experimental results show the left and right views of a video, their structural similarity image, the decoded 3D video, and the achieved minimum distortion level. The document aims to improve multi-view video quality by using structural similarity during the encoding process.
Project Presentation presented in the final semester of B.Tech (EEE) during the session of 2010-11 By Paras Prateek Bhatnagar, Paramjeet Singh Jamwal, Nisha Rajani & Preeti Kumari.
This document summarizes an article that proposes modifications to the JPEG 2000 image compression standard to achieve higher compression ratios while maintaining acceptable error rates. The proposed Adaptive JPEG 2000 technique involves pre-processing images with a transfer function to make them more suitable for compression by JPEG 2000. This is intended to provide higher compression ratios than the original JPEG 2000 standard while keeping root mean square error within allowed thresholds. The document provides background on JPEG 2000 and lossy image compression techniques, describes the proposed pre-processing approach, and indicates it was tested on single-channel images.
International Journal of Engineering Research and Development (IJERD)IJERD Editor
journal publishing, how to publish research paper, Call For research paper, international journal, publishing a paper, IJERD, journal of science and technology, how to get a research paper published, publishing a paper, publishing of journal, publishing of research paper, reserach and review articles, IJERD Journal, How to publish your research paper, publish research paper, open access engineering journal, Engineering journal, Mathemetics journal, Physics journal, Chemistry journal, Computer Engineering, Computer Science journal, how to submit your paper, peer reviw journal, indexed journal, reserach and review articles, engineering journal, www.ijerd.com, research journals,
yahoo journals, bing journals, International Journal of Engineering Research and Development, google journals, hard copy of journal
IJRET : International Journal of Research in Engineering and Technology is an international peer reviewed, online journal published by eSAT Publishing House for the enhancement of research in various disciplines of Engineering and Technology. The aim and scope of the journal is to provide an academic medium and an important reference for the advancement and dissemination of research results that support high-level learning, teaching and research in the fields of Engineering and Technology. We bring together Scientists, Academician, Field Engineers, Scholars and Students of related fields of Engineering and Technology
This document discusses techniques for effective compression of digital video. It introduces several key algorithms used in video compression, including discrete cosine transform (DCT) for spatial redundancy reduction, motion estimation (ME) for temporal redundancy reduction, and embedded zerotree wavelet (EZW) transforms. DCT is used to compress individual video frames by removing spatial correlations within frames. Motion estimation compares blocks of pixels between frames to find and encode motion vectors rather than full pixel values, reducing file size. Combined, these techniques can achieve high compression ratios while maintaining high video quality for storage and transmission.
Imperceptible and secure image watermarking using DCT and random spread techn...TELKOMNIKA JOURNAL
Watermarking is a copyright protection technique, while cryptography is a message encoding
technique. Imperceptibility, robustness, and safety are aspects that are often investigated in watermarking.
Cryptography can be implemented to increase watermark security. Beaufort cipher is the algorithm
proposed in this research to encrypt watermark. The new idea proposed in this research is the utilization of
Beaufort key for watermark encryption process as well as for spread watermark when inserted as PN
Sequence substitute with the aim to improve imperceptibility and security aspects. Where PN Sequence is
widely used in spread spectrum watermarking technique. Based on the experimental results and testing of
the proposed method proved that imperceptibility and watermark security are increased. Improved
imperceptibility measured by PSNR rose by about 5dB and so did the MSE score better. Robustness
aspect is also maintained which has been proven by the excellent value of NCC.
The embedding of a digital signature, or tag data is carried out in the frequency domain. The
high frequency varieties are chosen by any LH and HL in the wavelet domain which are to be
applicable in DCT. Coefficients are changed mid-frequency DCT coefficients such transactions by a
low frequency of the watermark to be embedded. Watermark can be recovered from the video by
selecting a random watermark of any reference framework. The proposed techniques are more
secure, robust and are efficient due to the use of static DCT. Watermark techniques uses a bands HL
and LH for adding watermark where the movement does not impact the quality the extracted
watermark until if the video displays for different types of malware attacks.
In this work we have taken three video watermarking techniques i.e. BIT GET (spatial),
DWT, DCT and one video formats ie.MPEG video to perform a comparative analysis of different
techniques using single video formats, to obtain the best performing technique for video
watermarking. Such that to increase robustness of the video and decrease the embedding time
Performance and Analysis of Video Compression Using Block Based Singular Valu...IJMER
This document presents an analysis of low-complexity video compression using block-based singular value decomposition (SVD) algorithms. It begins with an introduction to video compression and its importance for reducing storage and transmission costs. Current video compression standards like MPEG and H.26x are computationally expensive, making them unsuitable for real-time applications. The document then discusses block SVD algorithms as an alternative that can provide higher quality compression at lower computational complexity. It analyzes reducing the time complexity of video compression using block SVD and compares it to other compression methods. The document outlines the SVD decomposition process and how a 2D version can be applied to groups of image blocks for more efficient compression than 1D SVD.
The document discusses a built-in self-detection and correction (BISDC) architecture for motion estimation computing arrays (MECAs) used in video coding systems. It proposes using biresidue error correcting codes to detect and correct single bit errors in each processing element of the MECA with minimal area overhead. The BISDC architecture achieves online error detection and correction through test code generation, detection and selection circuits, syndrome decoding, and error correction circuits. Performance analysis shows the approach effectively detects and corrects errors while introducing minor additional circuitry.
5 ijaems sept-2015-9-video feature extraction based on modified lle using ada...INFOGAIN PUBLICATION
Locally linear embedding (LLE) is an unsupervised learning algorithm which computes the low dimensional, neighborhood preserving embeddings of high dimensional data. LLE attempts to discover non-linear structure in high dimensional data by exploiting the local symmetries of linear reconstructions. In this paper, video feature extraction is done using modified LLE alongwith adaptive nearest neighbor approach to find the nearest neighbor and the connected components. The proposed feature extraction method is applied to a video. The video feature description gives a new tool for analysis of video.
This document proposes a multi-level block truncation code algorithm for RGB image compression to achieve low bit rates and high quality. The algorithm combines bit mapping and quantization by dividing images into blocks, calculating thresholds, quantizing thresholds, and representing blocks with bit maps. It was tested on standard images like flowers, Lena, and baboon. Results showed improved peak signal-to-noise ratio and mean squared error compared to existing methods, demonstrating the effectiveness of the proposed multi-level block truncation code algorithm for image compression.
HARDWARE SOFTWARE CO-SIMULATION OF MOTION ESTIMATION IN H.264 ENCODERcscpconf
This paper proposes about motion estimation in H.264/AVC encoder. Compared with standards
such as MPEG-2 and MPEG-4 Visual, H.264 can deliver better image quality at the same
compressed bit rate or at a lower bit rate. The increase in compression efficiency comes at the
expense of increase in complexity, which is a fact that must be overcome. An efficient Co-design
methodology is required, where the encoder software application is highly optimized and
structured in a very modular and efficient manner, so as to allow its most complex and time
consuming operations to be offloaded to dedicated hardware accelerators. The Motion
Estimation algorithm is the most computationally intensive part of the encoder which is simulated using MATLAB. The hardware/software co-simulation is done using system generator tool and implemented using Xilinx FPGA Spartan 3E for different scanning methods.
This document discusses and compares two digital image watermarking techniques: discrete cosine transform (DCT) domain watermarking and discrete wavelet transform (DWT) domain watermarking. It first provides background on digital watermarking and explains watermark embedding and extraction processes in both the spatial and frequency domains. It then proposes a specific DCT watermarking technique that embeds a watermark by modifying mid-band DCT coefficients of divided image blocks. A DWT watermarking technique is also proposed that embeds a watermark in the low-high band of the DWT. Finally, the document indicates that experimental results will be used to compare the robustness of the two techniques against various attacks.
This document proposes a method for video copy detection using segmentation, MPEG-7 descriptors, and graph-based sequence matching. It extracts key frames from videos, extracts features from the frames using descriptors like CEDD, FCTH, SCD, EHD and CLD, and stores them in a database. When a query video is input, its features are extracted and compared to the database to detect if it matches any videos already in the database. Graph-based sequence matching is also used to find the optimal matching between video sequences despite transformations like changed frame rates or ordering. The method is shown to perform better than previous techniques at detecting copied videos through transformations.
A FRAGILE WATERMARKING BASED ON BINOMIAL TRANSFORM IN COLOR IMAGEScscpconf
In this paper, a novel Binomial Transform based fragile image watermarking technique has been proposed for color image authentication. The Binomial Transform (BT) is used to convert
each 2 × 2 sub-image block of the carrier image into transformed block corresponding to red, green and blue channels in sliding window manner. One/two/three watermark bits are embedded in second/third/fourth transformed components starting from the least significant bit’s position (LSB-0). An adjustment has been incorporated to adjust embedded component closer to the actual value without hampering the fabricated bits. The inverse Binomial
transform (IBT) is used to convert the transformed components back into the spatial domain. A delicate re-adjustment method is applied on the first transformed component to remain the pixel components in a valid range. The embedding operation in succession generates the final watermarked image. At the receiving end, whole watermark is extracted based on the reverse procedure and authentication is done through computed message digest and extracted bits. Experimental results conform that the proposed technique produces high payload and Peak Signal to Noise Ratio (PSNR) as compared to existing transformation based techniques[1, 5].
A fragile watermarking based on binomial transform in color imagescsandit
In this paper, a novel Binomial Transform based fragile image watermarking technique has
been proposed for color image authentication. The Binomial Transform (BT) is used to convert
each 2 × 2 sub-image block of the carrier image into transformed block corresponding to red,
green and blue channels in sliding window manner. One/two/three watermark bits are
embedded in second/third/fourth transformed components starting from the least significant
bit’s position (LSB-0). An adjustment has been incorporated to adjust embedded component
closer to the actual value without hampering the fabricated bits. The inverse Binomial
transform (IBT) is used to convert the transformed components back into the spatial domain. A
delicate re-adjustment method is applied on the first transformed component to remain the pixel
components in a valid range. The embedding operation in succession generates the final
watermarked image. At the receiving end, whole watermark is extracted based on the reverse
procedure and authentication is done through computed message digest and extracted bits.
Experimental results conform that the proposed technique produces high payload and Peak
Signal to Noise Ratio (PSNR) as compared to existing transformation based techniques[1, 5].
Improved Key Frame Extraction Using Discrete Wavelet Transform with Modified ...TELKOMNIKA JOURNAL
Video summarization used for a different application like video object recognition and classification. In video processing, numerous frames containing similar information, this leads to time consumption and slow processing speed and complexity. By using key frames reducing the amount of memory needed for video data processing and complexity greatly. In this paper key frame extraction of Arabic isolated word using discrete wavelet transform (DWT) with modified threshold factor is proposed with different bases. The results for different wavelet basis db, sym and coif show the best result for numbers of key frames at the threshold factor value (0.75).
This document summarizes a research paper on lossless reversible visible watermarking. It begins with an abstract that describes digital watermarking techniques and introduces a new approach for lossless reversible visible watermarking with robust security. It then provides a literature review of previous lossless invisible and visible watermarking techniques. The proposed technique aims to allow legitimate users to remove embedded watermarks and perfectly recover the original image content. Finally, it outlines the system architecture and provides a mathematical model for the watermark generation, embedding, and extraction processes.
IRJET- Encryption and Authentication of Image by using Data HidingIRJET Journal
The document discusses a proposed system for encrypting and authenticating images using data hiding. At the sender side, a palette image is encrypted using an encryption key. Data is then hidden in the encrypted image using a data hiding key. At the receiver side, the image is decrypted and the original image can be reconstructed after extracting the hidden data. The system aims to securely transfer images from sender to receiver while protecting the owner's privacy and allowing accurate recovery of the original image content. Several existing reversible data hiding and encrypted image techniques are reviewed and the proposed system is described as providing satisfactory data hiding capacity while maintaining high image quality after decryption.
IRJET - Underwater Image Enhancement using PCNN and NSCT FusionIRJET Journal
This document discusses techniques for enhancing underwater images that have been degraded due to scattering and absorption in the water medium. It proposes a new method for color image fusion using Non-Subsampled Contourlet Transform (NSCT) and Pulse Coupled Neural Network (PCNN). NSCT is used to decompose the image into sub-bands, while PCNN is used to fuse the high frequency sub-band coefficients. The proposed method is shown to outperform other fusion methods in objective quality assessment metrics. Various other underwater image enhancement techniques are also discussed, including wavelength compensation, multi-band fusion, image mode filtering, and approaches using neural networks like convolutional neural networks.
Secured Data Transmission Using Video Steganographic SchemeIJERA Editor
Steganography is the art of hiding information in ways that avert the revealing of hiding messages. Video Steganography is focused on spatial and transform domain. Spatial domain algorithm directly embedded information in the cover image with no visual changes. This kind of algorithms has the advantage in Steganography capacity, but the disadvantage is weak robustness. Transform domain algorithm is embedding the secret information in the transform space. This kind of algorithms has the advantage of good stability, but the disadvantage of small capacity. These kinds of algorithms are vulnerable to steganalysis. This paper proposes a new Compressed Video Steganographic scheme. The data is hidden in the horizontal and the vertical components of the motion vectors. The PSNR value is calculated so that the quality of the video after the data hiding is evaluated.
ROBUST COLOUR IMAGE WATERMARKING SCHEME BASED ON FEATURE POINTS AND IMAGE NOR...csandit
Geometric attacks can desynchronize the location of the watermark and hence cause incorrect
watermark detection. This paper presents a robust colour image watermarking scheme based on
visually significant feature points and image normalization technique. The feature points are
used as synchronization marks between watermark embedding and detection. The watermark is
embedded into the non overlapped normalized circular regions in the luminance component or
the blue component of a color image. The embedding of the watermark is carried out by
modifying the DCT coefficients values in selected blocks. The original unmarked image is not
required for watermark extraction Experimental results show that the proposed scheme
successfully makes the watermark perceptually invisible as well as robust to common signal
processing and geometric attacks.
Reversible encrypted data concealment in images by reserving room approachIAEME Publication
The document summarizes a novel method for reversible encrypted data concealment in images. The proposed method reserves room in the original image before encryption using a traditional reversible data hiding algorithm like lifting wavelet transform. This makes it easy for a data hider to reversibly embed data in the encrypted image by simply filling the pre-reserved space. The method is compared to previous "vacating room after encryption" methods and shows it can embed over 10 times as large payloads with the same image quality, as well as achieve better performance in terms of PSNR and MSE. Experiments on test images demonstrate the benefits of the proposed "reserving room before encryption" approach.
This document discusses an enhanced technique for secure and reliable watermarking using Modified Haar Wavelet Transform (MFHWT). The proposed technique embeds a watermark into an original image using discrete wavelet transform (DWT) and wavelet packet transform (WPT) according to the size of the watermark. MFHWT is a memory efficient, fast, and simple transform. The watermarking process involves embedding and extraction processes. Various watermarking techniques in different transform domains are discussed, including DWT and WPT. The proposed algorithm uses MFHWT for decomposition and reconstruction. Image quality is measured using metrics like MSE and PSNR, with higher PSNR indicating better quality. The technique achieves robustness
This survey propose a Novel Joint Data-Hiding and
Compression Scheme (JDHC) for digital images using side match
vector quantization (SMVQ) and image in painting. In this
JDHC scheme image compression and data hiding scheme are
combined into a single module. On the client side, the data should
be hided and compressed in sub codebook such that remaining
block except left and top most of the image. The data hiding and
compression scheme follows raster scanning order i.e. block by
block on row basis. Vector Quantization used with SMVQ and
Image In painting for complex block to control distortion and
error injection. The receiver side process is based on two
methods. First method divide the received image into series of
blocks the receiver achieve hided data and original image
according to the index value in the segmented block. Second
method use edge based harmonic in painting is used to get
original image if any loss in the image.
A Hybrid DWT-SVD Method for Digital Video Watermarking Using Random Frame Sel...researchinventy
This document presents a hybrid DWT-SVD method for digital video watermarking using random frame selection. The proposed method embeds a watermark into randomly selected video frames by applying discrete wavelet transform and singular value decomposition. The blue channel of selected frames is used for watermark embedding in the mid-frequency DWT coefficients. Experimental results show the method provides good imperceptibility and robustness against various attacks like compression, cropping, noise addition, contrast changes and tampering. The normalization coefficient between original and extracted watermarks is used to evaluate the performance under different attacks.
Image Authentication Using Digital Watermarkingijceronline
International Journal of Computational Engineering Research (IJCER) is dedicated to protecting personal information and will make every reasonable effort to handle collected information appropriately. All information collected, as well as related requests, will be handled as carefully and efficiently as possible in accordance with IJCER standards for integrity and objectivity.
Imperceptible and secure image watermarking using DCT and random spread techn...TELKOMNIKA JOURNAL
Watermarking is a copyright protection technique, while cryptography is a message encoding
technique. Imperceptibility, robustness, and safety are aspects that are often investigated in watermarking.
Cryptography can be implemented to increase watermark security. Beaufort cipher is the algorithm
proposed in this research to encrypt watermark. The new idea proposed in this research is the utilization of
Beaufort key for watermark encryption process as well as for spread watermark when inserted as PN
Sequence substitute with the aim to improve imperceptibility and security aspects. Where PN Sequence is
widely used in spread spectrum watermarking technique. Based on the experimental results and testing of
the proposed method proved that imperceptibility and watermark security are increased. Improved
imperceptibility measured by PSNR rose by about 5dB and so did the MSE score better. Robustness
aspect is also maintained which has been proven by the excellent value of NCC.
The embedding of a digital signature, or tag data is carried out in the frequency domain. The
high frequency varieties are chosen by any LH and HL in the wavelet domain which are to be
applicable in DCT. Coefficients are changed mid-frequency DCT coefficients such transactions by a
low frequency of the watermark to be embedded. Watermark can be recovered from the video by
selecting a random watermark of any reference framework. The proposed techniques are more
secure, robust and are efficient due to the use of static DCT. Watermark techniques uses a bands HL
and LH for adding watermark where the movement does not impact the quality the extracted
watermark until if the video displays for different types of malware attacks.
In this work we have taken three video watermarking techniques i.e. BIT GET (spatial),
DWT, DCT and one video formats ie.MPEG video to perform a comparative analysis of different
techniques using single video formats, to obtain the best performing technique for video
watermarking. Such that to increase robustness of the video and decrease the embedding time
Performance and Analysis of Video Compression Using Block Based Singular Valu...IJMER
This document presents an analysis of low-complexity video compression using block-based singular value decomposition (SVD) algorithms. It begins with an introduction to video compression and its importance for reducing storage and transmission costs. Current video compression standards like MPEG and H.26x are computationally expensive, making them unsuitable for real-time applications. The document then discusses block SVD algorithms as an alternative that can provide higher quality compression at lower computational complexity. It analyzes reducing the time complexity of video compression using block SVD and compares it to other compression methods. The document outlines the SVD decomposition process and how a 2D version can be applied to groups of image blocks for more efficient compression than 1D SVD.
The document discusses a built-in self-detection and correction (BISDC) architecture for motion estimation computing arrays (MECAs) used in video coding systems. It proposes using biresidue error correcting codes to detect and correct single bit errors in each processing element of the MECA with minimal area overhead. The BISDC architecture achieves online error detection and correction through test code generation, detection and selection circuits, syndrome decoding, and error correction circuits. Performance analysis shows the approach effectively detects and corrects errors while introducing minor additional circuitry.
5 ijaems sept-2015-9-video feature extraction based on modified lle using ada...INFOGAIN PUBLICATION
Locally linear embedding (LLE) is an unsupervised learning algorithm which computes the low dimensional, neighborhood preserving embeddings of high dimensional data. LLE attempts to discover non-linear structure in high dimensional data by exploiting the local symmetries of linear reconstructions. In this paper, video feature extraction is done using modified LLE alongwith adaptive nearest neighbor approach to find the nearest neighbor and the connected components. The proposed feature extraction method is applied to a video. The video feature description gives a new tool for analysis of video.
This document proposes a multi-level block truncation code algorithm for RGB image compression to achieve low bit rates and high quality. The algorithm combines bit mapping and quantization by dividing images into blocks, calculating thresholds, quantizing thresholds, and representing blocks with bit maps. It was tested on standard images like flowers, Lena, and baboon. Results showed improved peak signal-to-noise ratio and mean squared error compared to existing methods, demonstrating the effectiveness of the proposed multi-level block truncation code algorithm for image compression.
HARDWARE SOFTWARE CO-SIMULATION OF MOTION ESTIMATION IN H.264 ENCODERcscpconf
This paper proposes about motion estimation in H.264/AVC encoder. Compared with standards
such as MPEG-2 and MPEG-4 Visual, H.264 can deliver better image quality at the same
compressed bit rate or at a lower bit rate. The increase in compression efficiency comes at the
expense of increase in complexity, which is a fact that must be overcome. An efficient Co-design
methodology is required, where the encoder software application is highly optimized and
structured in a very modular and efficient manner, so as to allow its most complex and time
consuming operations to be offloaded to dedicated hardware accelerators. The Motion
Estimation algorithm is the most computationally intensive part of the encoder which is simulated using MATLAB. The hardware/software co-simulation is done using system generator tool and implemented using Xilinx FPGA Spartan 3E for different scanning methods.
This document discusses and compares two digital image watermarking techniques: discrete cosine transform (DCT) domain watermarking and discrete wavelet transform (DWT) domain watermarking. It first provides background on digital watermarking and explains watermark embedding and extraction processes in both the spatial and frequency domains. It then proposes a specific DCT watermarking technique that embeds a watermark by modifying mid-band DCT coefficients of divided image blocks. A DWT watermarking technique is also proposed that embeds a watermark in the low-high band of the DWT. Finally, the document indicates that experimental results will be used to compare the robustness of the two techniques against various attacks.
This document proposes a method for video copy detection using segmentation, MPEG-7 descriptors, and graph-based sequence matching. It extracts key frames from videos, extracts features from the frames using descriptors like CEDD, FCTH, SCD, EHD and CLD, and stores them in a database. When a query video is input, its features are extracted and compared to the database to detect if it matches any videos already in the database. Graph-based sequence matching is also used to find the optimal matching between video sequences despite transformations like changed frame rates or ordering. The method is shown to perform better than previous techniques at detecting copied videos through transformations.
A FRAGILE WATERMARKING BASED ON BINOMIAL TRANSFORM IN COLOR IMAGEScscpconf
In this paper, a novel Binomial Transform based fragile image watermarking technique has been proposed for color image authentication. The Binomial Transform (BT) is used to convert
each 2 × 2 sub-image block of the carrier image into transformed block corresponding to red, green and blue channels in sliding window manner. One/two/three watermark bits are embedded in second/third/fourth transformed components starting from the least significant bit’s position (LSB-0). An adjustment has been incorporated to adjust embedded component closer to the actual value without hampering the fabricated bits. The inverse Binomial
transform (IBT) is used to convert the transformed components back into the spatial domain. A delicate re-adjustment method is applied on the first transformed component to remain the pixel components in a valid range. The embedding operation in succession generates the final watermarked image. At the receiving end, whole watermark is extracted based on the reverse procedure and authentication is done through computed message digest and extracted bits. Experimental results conform that the proposed technique produces high payload and Peak Signal to Noise Ratio (PSNR) as compared to existing transformation based techniques[1, 5].
A fragile watermarking based on binomial transform in color imagescsandit
In this paper, a novel Binomial Transform based fragile image watermarking technique has
been proposed for color image authentication. The Binomial Transform (BT) is used to convert
each 2 × 2 sub-image block of the carrier image into transformed block corresponding to red,
green and blue channels in sliding window manner. One/two/three watermark bits are
embedded in second/third/fourth transformed components starting from the least significant
bit’s position (LSB-0). An adjustment has been incorporated to adjust embedded component
closer to the actual value without hampering the fabricated bits. The inverse Binomial
transform (IBT) is used to convert the transformed components back into the spatial domain. A
delicate re-adjustment method is applied on the first transformed component to remain the pixel
components in a valid range. The embedding operation in succession generates the final
watermarked image. At the receiving end, whole watermark is extracted based on the reverse
procedure and authentication is done through computed message digest and extracted bits.
Experimental results conform that the proposed technique produces high payload and Peak
Signal to Noise Ratio (PSNR) as compared to existing transformation based techniques[1, 5].
Improved Key Frame Extraction Using Discrete Wavelet Transform with Modified ...TELKOMNIKA JOURNAL
Video summarization used for a different application like video object recognition and classification. In video processing, numerous frames containing similar information, this leads to time consumption and slow processing speed and complexity. By using key frames reducing the amount of memory needed for video data processing and complexity greatly. In this paper key frame extraction of Arabic isolated word using discrete wavelet transform (DWT) with modified threshold factor is proposed with different bases. The results for different wavelet basis db, sym and coif show the best result for numbers of key frames at the threshold factor value (0.75).
This document summarizes a research paper on lossless reversible visible watermarking. It begins with an abstract that describes digital watermarking techniques and introduces a new approach for lossless reversible visible watermarking with robust security. It then provides a literature review of previous lossless invisible and visible watermarking techniques. The proposed technique aims to allow legitimate users to remove embedded watermarks and perfectly recover the original image content. Finally, it outlines the system architecture and provides a mathematical model for the watermark generation, embedding, and extraction processes.
IRJET- Encryption and Authentication of Image by using Data HidingIRJET Journal
The document discusses a proposed system for encrypting and authenticating images using data hiding. At the sender side, a palette image is encrypted using an encryption key. Data is then hidden in the encrypted image using a data hiding key. At the receiver side, the image is decrypted and the original image can be reconstructed after extracting the hidden data. The system aims to securely transfer images from sender to receiver while protecting the owner's privacy and allowing accurate recovery of the original image content. Several existing reversible data hiding and encrypted image techniques are reviewed and the proposed system is described as providing satisfactory data hiding capacity while maintaining high image quality after decryption.
IRJET - Underwater Image Enhancement using PCNN and NSCT FusionIRJET Journal
This document discusses techniques for enhancing underwater images that have been degraded due to scattering and absorption in the water medium. It proposes a new method for color image fusion using Non-Subsampled Contourlet Transform (NSCT) and Pulse Coupled Neural Network (PCNN). NSCT is used to decompose the image into sub-bands, while PCNN is used to fuse the high frequency sub-band coefficients. The proposed method is shown to outperform other fusion methods in objective quality assessment metrics. Various other underwater image enhancement techniques are also discussed, including wavelength compensation, multi-band fusion, image mode filtering, and approaches using neural networks like convolutional neural networks.
Secured Data Transmission Using Video Steganographic SchemeIJERA Editor
Steganography is the art of hiding information in ways that avert the revealing of hiding messages. Video Steganography is focused on spatial and transform domain. Spatial domain algorithm directly embedded information in the cover image with no visual changes. This kind of algorithms has the advantage in Steganography capacity, but the disadvantage is weak robustness. Transform domain algorithm is embedding the secret information in the transform space. This kind of algorithms has the advantage of good stability, but the disadvantage of small capacity. These kinds of algorithms are vulnerable to steganalysis. This paper proposes a new Compressed Video Steganographic scheme. The data is hidden in the horizontal and the vertical components of the motion vectors. The PSNR value is calculated so that the quality of the video after the data hiding is evaluated.
ROBUST COLOUR IMAGE WATERMARKING SCHEME BASED ON FEATURE POINTS AND IMAGE NOR...csandit
Geometric attacks can desynchronize the location of the watermark and hence cause incorrect
watermark detection. This paper presents a robust colour image watermarking scheme based on
visually significant feature points and image normalization technique. The feature points are
used as synchronization marks between watermark embedding and detection. The watermark is
embedded into the non overlapped normalized circular regions in the luminance component or
the blue component of a color image. The embedding of the watermark is carried out by
modifying the DCT coefficients values in selected blocks. The original unmarked image is not
required for watermark extraction Experimental results show that the proposed scheme
successfully makes the watermark perceptually invisible as well as robust to common signal
processing and geometric attacks.
Reversible encrypted data concealment in images by reserving room approachIAEME Publication
The document summarizes a novel method for reversible encrypted data concealment in images. The proposed method reserves room in the original image before encryption using a traditional reversible data hiding algorithm like lifting wavelet transform. This makes it easy for a data hider to reversibly embed data in the encrypted image by simply filling the pre-reserved space. The method is compared to previous "vacating room after encryption" methods and shows it can embed over 10 times as large payloads with the same image quality, as well as achieve better performance in terms of PSNR and MSE. Experiments on test images demonstrate the benefits of the proposed "reserving room before encryption" approach.
This document discusses an enhanced technique for secure and reliable watermarking using Modified Haar Wavelet Transform (MFHWT). The proposed technique embeds a watermark into an original image using discrete wavelet transform (DWT) and wavelet packet transform (WPT) according to the size of the watermark. MFHWT is a memory efficient, fast, and simple transform. The watermarking process involves embedding and extraction processes. Various watermarking techniques in different transform domains are discussed, including DWT and WPT. The proposed algorithm uses MFHWT for decomposition and reconstruction. Image quality is measured using metrics like MSE and PSNR, with higher PSNR indicating better quality. The technique achieves robustness
This survey propose a Novel Joint Data-Hiding and
Compression Scheme (JDHC) for digital images using side match
vector quantization (SMVQ) and image in painting. In this
JDHC scheme image compression and data hiding scheme are
combined into a single module. On the client side, the data should
be hided and compressed in sub codebook such that remaining
block except left and top most of the image. The data hiding and
compression scheme follows raster scanning order i.e. block by
block on row basis. Vector Quantization used with SMVQ and
Image In painting for complex block to control distortion and
error injection. The receiver side process is based on two
methods. First method divide the received image into series of
blocks the receiver achieve hided data and original image
according to the index value in the segmented block. Second
method use edge based harmonic in painting is used to get
original image if any loss in the image.
A Hybrid DWT-SVD Method for Digital Video Watermarking Using Random Frame Sel...researchinventy
This document presents a hybrid DWT-SVD method for digital video watermarking using random frame selection. The proposed method embeds a watermark into randomly selected video frames by applying discrete wavelet transform and singular value decomposition. The blue channel of selected frames is used for watermark embedding in the mid-frequency DWT coefficients. Experimental results show the method provides good imperceptibility and robustness against various attacks like compression, cropping, noise addition, contrast changes and tampering. The normalization coefficient between original and extracted watermarks is used to evaluate the performance under different attacks.
Image Authentication Using Digital Watermarkingijceronline
International Journal of Computational Engineering Research (IJCER) is dedicated to protecting personal information and will make every reasonable effort to handle collected information appropriately. All information collected, as well as related requests, will be handled as carefully and efficiently as possible in accordance with IJCER standards for integrity and objectivity.
Comparison of Invisible Digital Watermarking Techniques for its RobustnessIRJET Journal
This document compares two digital image watermarking techniques, discrete cosine transform (DCT) and discrete wavelet transform (DWT), to analyze their robustness. The techniques are implemented in MATLAB to embed a watermark into an original image. Various attacks are performed on the watermarked images and the correlation between the original and extracted watermarks is calculated. The results show that the DWT technique maintains a higher correlation than DCT after attacks like JPEG compression, indicating it is more robust to distortions.
International journal of signal and image processing issues vol 2015 - no 1...sophiabelthome
This document discusses a method for embedding a binary watermark image into a digital video using a hybrid of three transforms: discrete cosine transform (DCT), discrete wavelet transform (DWT), and singular value decomposition (SVD). The method first applies DCT to frames of the video, then applies three-level DWT to the transformed frames. SVD is then applied to both the transformed video frames and the watermark image. The watermark is embedded by modifying coefficients of the video based on the SVD results. PSNR, MSE, and correlation are used to evaluate the quality and robustness of the watermarked video.
Robust Video Watermarking Scheme Based on Intra-Coding Process in MPEG-2 Style IJECEIAES
The proposed scheme implemented a semi blind digital watermarking method for video exploiting MPEG-2 standard. The watermark is inserted into selected high frequency coefficients of plain types of discrete cosine transform blocks instead of edge and texture blocks during intra coding process. The selection is essential because the error in such type of blocks is less sensitive to human eyes as compared to other categories of blocks. Therefore, the perceptibility of watermarked video does not degraded sharply. Visual quality is also maintained as motion vectors used for generating the motion compensated images are untouched during the entire watermarking process. Experimental results revealed that the scheme is not only robust to re-compression attack, spatial synchronization attacks like cropping, rotation but also strong to temporal synchronization attacks like frame inserting, deleting, swapping and averaging. The superiority of the anticipated method is obtaining the best sturdiness results contrast to the recently delivered schemes.
The proposed scheme embedded the watermark during the differential pulse code modulation process and extracted through decoding the entropy details. This technique utilize the moving picture expert groups standard (MPEG-2) in which discrete cosine transform coefficients are adjusted from selected instantaneous decoder refresh frames for watermarking purpose. The subsets of frames as candidate I-frames are chosen to achieve better perceptibility and robustness. A secret key based cryptographic technique is used to select the candidate frames. Three more keys are required to extract the watermark whereas one of the key is used to stop the extraction process and the remaining two are used to display the scrambled watermark. The toughness is evaluated by testing spatial and temporal synchronization attacks. High sturdiness is achieved against video specific attacks frequently occurs in the real world. Even a single frame can accommodate thousand of watermark bits which reflect that high watermark capacity can be obtained.
Welcome to International Journal of Engineering Research and Development (IJERD)IJERD Editor
call for paper 2012, hard copy of journal, research paper publishing, where to publish research paper,
journal publishing, how to publish research paper, Call For research paper, international journal, publishing a paper, IJERD, journal of science and technology, how to get a research paper published, publishing a paper, publishing of journal, publishing of research paper, reserach and review articles, IJERD Journal, How to publish your research paper, publish research paper, open access engineering journal, Engineering journal, Mathemetics journal, Physics journal, Chemistry journal, Computer Engineering, Computer Science journal, how to submit your paper, peer reviw journal, indexed journal, reserach and review articles, engineering journal, www.ijerd.com, research journals
This document proposes a multi-view object tracking system using deep learning to track objects from multiple camera views. It uses the YOLO v3 algorithm to map segmented object groups between camera views to share knowledge. A two-pass regression framework is also presented for multi-view object tracking. Key steps include preprocessing images, extracting features, detecting and tracking objects between views using blob matching, and counting objects over time by maintaining tracks. The approach aims to improve object counting accuracy by exploiting information from multiple camera views.
This document presents a novel approach for jointly optimizing spatial prediction and transform coding in video compression. It aims to improve performance and reduce complexity compared to existing techniques. The proposed method uses singular value decomposition (SVD) to compress images. SVD decomposes an image matrix into three matrices, allowing the image to be approximated using only a few singular values. This achieves compression by removing redundant information. The document outlines the SVD approach for image compression and measures compression performance using compression ratio and mean squared error between the original and compressed images. It then discusses trends in image and video coding, including combining natural and synthetic content. Finally, it provides a block diagram of the proposed system and compares its compression performance to existing discrete cosine transform-
An Efficient Video Watermarking Using Color Histogram Analysis and Biplanes I...IJERA Editor
Video watermarking is a novel technology that has the ability to solve the problem of illegal digital video
manipulation and distribution. In video watermarking, the copyright bits are embedded into video bit streams.
This paper proposes an effective, robust and indiscernible video watermarking algorithm. A video can also
undergo several intentional attacks like frame dropping, averaging, cropping and median filtering and
unintentional attacks like addition of noise and compression which can compromise copyright information,
thereby denying the authentication. In this paper, the design and implementation of SVD and multiple bit plane
image based watermarking is proposed. The developed method embeds 8 bit-plane images, obtained from single
gray scale watermark image, into different frames of a video sequence. In this algorithm, some of the luminous
values in the video pictures are selected and divided into groups, and the watermark bits are embedded by
adjusting the relative relationship of the member in each group. A sufficient number of watermark bits will be
embedded into the video pictures without causing noticeable distortion. The watermark will be correctly
retrieved at the extraction stage, even after various types of video manipulation and other signal processing
attacks.
IRJET- Image Compression Technique for Quantized Encrypted Images using SVDIRJET Journal
This document proposes an image compression technique for encrypted images using discrete wavelet transform, singular value decomposition, and Huffman coding. At the sender side, the image is first encrypted using quantized wavelet coefficients and a secret key. Significant and less significant wavelet coefficients are then selected. The encrypted low-low sub-band is quantized and compressed with Huffman coding, while other sub-bands are compressed by discarding irrelevant information using SVD and Huffman coding. At the receiver side, decompression and decryption are performed using the compressed bit streams and inverse processes to reconstruct the original image. The technique achieves good compression performance while maintaining image quality, as shown through compression ratio and PSNR evaluation on test images.
Optimization of image compression and ciphering based on EZW techniquesTELKOMNIKA JOURNAL
This paper presents the design and optimization of image compression and ciphering depend on optimized embedded zero tree of wavelet (EZW) techniques. Nowadays, the compression and ciphering of image have become particularly important in a protected image storage and communication. The challenge is put in application for both compression and encryption where the parameters of images such as quality and size are critical in secure image transmission. A new technique for secure image storage and transmission is proposed in this work. The compression is achieved by remodel the EZW scheme combine with discrete cosine transform (DCT). Encrypted the XOR ten bits by initial threshold of EZW with random bits produced from linear-feedback shift register (LFSR). The obtained result shows that the suggested techniques provide acceptable compression ratio, reduced the computational time for both compression and encryption, immunity against the statistical and the frequency attacks.
A digital watermarking scheme based on integer wavelet transform and histogram techniques is
proposed in this paper. Lifting scheme based integer wavelet transform is used to provide ease of
transformation of compressed data and to increase the data embedding capacity. Also histogram technique
which is one of the reversible data hiding is used to embed the secret data into original image and retrieve the
original data back after extraction. The AES encryption is used to encrypt the embedded image to provide
authentication. This algorithm is developed using verilog code and implemented on FPGA Artix 7 board in
order to increase throughput, reduce area and power consumption.
Transmission error propagation in wireless multimedia communication systems has become a recurring
problem. This persistent problem has led to grave consequences on the visual quality of the decoded video.
It is against this backdrop that, we present an adaptive intra refresh (AIR) error-resilient coding tool to
mitigate the effect of transmission error propagation in 3D video communications. This work utilizes
periodic insertion of intra macroblocks in badly error-infected frames temporally as well as related frames
in the multi view video scheme. Our objective is to maximize the transmission efficiency while ensuring the
transmission robustness of the coded bitstream. The selection of periodic macroblocks is based on areas
with high motion above a pre-set threshold. The coding modes of the macroblocks are based on the
distortion expectation due to transmission errors. Extensive simulation results show significant
improvement in both objective and subjective video quality at different intra refresh rates.
ROBUST ADAPTIVE INTRA REFRESH FOR MULTIVIEW VIDEOIJCSEA Journal
This document presents a robust adaptive intra refresh (AIR) method for error resilience in multiview video coding. The proposed AIR technique inserts intra-coded macroblocks periodically in frames and views that are dependent on erroneous frames to mitigate the effects of error propagation spatially and temporally. Simulation results show the proposed AIR method achieves significant improvements in both objective and subjective video quality compared to two other H.264 schemes at different intra refresh rates, especially in error-prone environments.
Robust Adaptive Intra Refresh for Multiview VideoIJCSEA Journal
Transmission error propagation in wireless multimedia communication systems has become a recurring problem. This persistent problem has led to grave consequences on the visual quality of the decoded video. It is against this backdrop that, we present an adaptive intra refresh (AIR) error-resilient coding tool to mitigate the effect of transmission error propagation in 3D video communications. This work utilizes periodic insertion of intra macroblocks in badly error-infected frames temporally as well as related frames in the multi view video scheme. Our objective is to maximize the transmission efficiency while ensuring the transmission robustness of the coded bitstream. The selection of periodic macroblocks is based on areas with high motion above a pre-set threshold. The coding modes of the macroblocks are based on the distortion expectation due to transmission errors. Extensive simulation results show significant improvement in both objective and subjective video quality at different intra refresh rates
ROBUST ADAPTIVE INTRA REFRESH FOR MULTIVIEW VIDEOIJCSEA Journal
Transmission error propagation in wireless multimedia communication systems has become a recurring
problem. This persistent problem has led to grave consequences on the visual quality of the decoded video.
It is against this backdrop that, we present an adaptive intra refresh (AIR) error-resilient coding tool to
mitigate the effect of transmission error propagation in 3D video communications. This work utilizes
periodic insertion of intra macroblocks in badly error-infected frames temporally as well as related frames
in the multi view video scheme. Our objective is to maximize the transmission efficiency while ensuring the
transmission robustness of the coded bitstream. The selection of periodic macroblocks is based on areas
with high motion above a pre-set threshold. The coding modes of the macroblocks are based on the
distortion expectation due to transmission errors. Extensive simulation results show significant
improvement in both objective and subjective video quality at different intra refresh rates.
International Journal of Computational Engineering Research(IJCER)ijceronline
International Journal of Computational Engineering Research(IJCER) is an intentional online Journal in English monthly publishing journal. This Journal publish original research work that contributes significantly to further the scientific knowledge in engineering and Technology.
Digital image watermarking using dct with high security ofIAEME Publication
1) The document describes a new approach to digital image watermarking using discrete cosine transform (DCT) and image fusion.
2) It embeds a watermark into the middle frequency DCT coefficients of an image for imperceptibility and robustness.
3) To increase security, it then uses image fusion techniques from the MATLAB Wavelet Toolbox to combine the original and watermarked images into a single synthesized image, eliminating the need to transmit the original image separately.
UiPath Test Automation using UiPath Test Suite series, part 6DianaGray10
Welcome to UiPath Test Automation using UiPath Test Suite series part 6. In this session, we will cover Test Automation with generative AI and Open AI.
UiPath Test Automation with generative AI and Open AI webinar offers an in-depth exploration of leveraging cutting-edge technologies for test automation within the UiPath platform. Attendees will delve into the integration of generative AI, a test automation solution, with Open AI advanced natural language processing capabilities.
Throughout the session, participants will discover how this synergy empowers testers to automate repetitive tasks, enhance testing accuracy, and expedite the software testing life cycle. Topics covered include the seamless integration process, practical use cases, and the benefits of harnessing AI-driven automation for UiPath testing initiatives. By attending this webinar, testers, and automation professionals can gain valuable insights into harnessing the power of AI to optimize their test automation workflows within the UiPath ecosystem, ultimately driving efficiency and quality in software development processes.
What will you get from this session?
1. Insights into integrating generative AI.
2. Understanding how this integration enhances test automation within the UiPath platform
3. Practical demonstrations
4. Exploration of real-world use cases illustrating the benefits of AI-driven test automation for UiPath
Topics covered:
What is generative AI
Test Automation with generative AI and Open AI.
UiPath integration with generative AI
Speaker:
Deepak Rai, Automation Practice Lead, Boundaryless Group and UiPath MVP
Cosa hanno in comune un mattoncino Lego e la backdoor XZ?Speck&Tech
ABSTRACT: A prima vista, un mattoncino Lego e la backdoor XZ potrebbero avere in comune il fatto di essere entrambi blocchi di costruzione, o dipendenze di progetti creativi e software. La realtà è che un mattoncino Lego e il caso della backdoor XZ hanno molto di più di tutto ciò in comune.
Partecipate alla presentazione per immergervi in una storia di interoperabilità, standard e formati aperti, per poi discutere del ruolo importante che i contributori hanno in una comunità open source sostenibile.
BIO: Sostenitrice del software libero e dei formati standard e aperti. È stata un membro attivo dei progetti Fedora e openSUSE e ha co-fondato l'Associazione LibreItalia dove è stata coinvolta in diversi eventi, migrazioni e formazione relativi a LibreOffice. In precedenza ha lavorato a migrazioni e corsi di formazione su LibreOffice per diverse amministrazioni pubbliche e privati. Da gennaio 2020 lavora in SUSE come Software Release Engineer per Uyuni e SUSE Manager e quando non segue la sua passione per i computer e per Geeko coltiva la sua curiosità per l'astronomia (da cui deriva il suo nickname deneb_alpha).
Building Production Ready Search Pipelines with Spark and MilvusZilliz
Spark is the widely used ETL tool for processing, indexing and ingesting data to serving stack for search. Milvus is the production-ready open-source vector database. In this talk we will show how to use Spark to process unstructured data to extract vector representations, and push the vectors to Milvus vector database for search serving.
In the rapidly evolving landscape of technologies, XML continues to play a vital role in structuring, storing, and transporting data across diverse systems. The recent advancements in artificial intelligence (AI) present new methodologies for enhancing XML development workflows, introducing efficiency, automation, and intelligent capabilities. This presentation will outline the scope and perspective of utilizing AI in XML development. The potential benefits and the possible pitfalls will be highlighted, providing a balanced view of the subject.
We will explore the capabilities of AI in understanding XML markup languages and autonomously creating structured XML content. Additionally, we will examine the capacity of AI to enrich plain text with appropriate XML markup. Practical examples and methodological guidelines will be provided to elucidate how AI can be effectively prompted to interpret and generate accurate XML markup.
Further emphasis will be placed on the role of AI in developing XSLT, or schemas such as XSD and Schematron. We will address the techniques and strategies adopted to create prompts for generating code, explaining code, or refactoring the code, and the results achieved.
The discussion will extend to how AI can be used to transform XML content. In particular, the focus will be on the use of AI XPath extension functions in XSLT, Schematron, Schematron Quick Fixes, or for XML content refactoring.
The presentation aims to deliver a comprehensive overview of AI usage in XML development, providing attendees with the necessary knowledge to make informed decisions. Whether you’re at the early stages of adopting AI or considering integrating it in advanced XML development, this presentation will cover all levels of expertise.
By highlighting the potential advantages and challenges of integrating AI with XML development tools and languages, the presentation seeks to inspire thoughtful conversation around the future of XML development. We’ll not only delve into the technical aspects of AI-powered XML development but also discuss practical implications and possible future directions.
Generating privacy-protected synthetic data using Secludy and MilvusZilliz
During this demo, the founders of Secludy will demonstrate how their system utilizes Milvus to store and manipulate embeddings for generating privacy-protected synthetic data. Their approach not only maintains the confidentiality of the original data but also enhances the utility and scalability of LLMs under privacy constraints. Attendees, including machine learning engineers, data scientists, and data managers, will witness first-hand how Secludy's integration with Milvus empowers organizations to harness the power of LLMs securely and efficiently.
Your One-Stop Shop for Python Success: Top 10 US Python Development Providersakankshawande
Simplify your search for a reliable Python development partner! This list presents the top 10 trusted US providers offering comprehensive Python development services, ensuring your project's success from conception to completion.
“An Outlook of the Ongoing and Future Relationship between Blockchain Technologies and Process-aware Information Systems.” Invited talk at the joint workshop on Blockchain for Information Systems (BC4IS) and Blockchain for Trusted Data Sharing (B4TDS), co-located with with the 36th International Conference on Advanced Information Systems Engineering (CAiSE), 3 June 2024, Limassol, Cyprus.
Driving Business Innovation: Latest Generative AI Advancements & Success StorySafe Software
Are you ready to revolutionize how you handle data? Join us for a webinar where we’ll bring you up to speed with the latest advancements in Generative AI technology and discover how leveraging FME with tools from giants like Google Gemini, Amazon, and Microsoft OpenAI can supercharge your workflow efficiency.
During the hour, we’ll take you through:
Guest Speaker Segment with Hannah Barrington: Dive into the world of dynamic real estate marketing with Hannah, the Marketing Manager at Workspace Group. Hear firsthand how their team generates engaging descriptions for thousands of office units by integrating diverse data sources—from PDF floorplans to web pages—using FME transformers, like OpenAIVisionConnector and AnthropicVisionConnector. This use case will show you how GenAI can streamline content creation for marketing across the board.
Ollama Use Case: Learn how Scenario Specialist Dmitri Bagh has utilized Ollama within FME to input data, create custom models, and enhance security protocols. This segment will include demos to illustrate the full capabilities of FME in AI-driven processes.
Custom AI Models: Discover how to leverage FME to build personalized AI models using your data. Whether it’s populating a model with local data for added security or integrating public AI tools, find out how FME facilitates a versatile and secure approach to AI.
We’ll wrap up with a live Q&A session where you can engage with our experts on your specific use cases, and learn more about optimizing your data workflows with AI.
This webinar is ideal for professionals seeking to harness the power of AI within their data management systems while ensuring high levels of customization and security. Whether you're a novice or an expert, gain actionable insights and strategies to elevate your data processes. Join us to see how FME and AI can revolutionize how you work with data!
Taking AI to the Next Level in Manufacturing.pdfssuserfac0301
Read Taking AI to the Next Level in Manufacturing to gain insights on AI adoption in the manufacturing industry, such as:
1. How quickly AI is being implemented in manufacturing.
2. Which barriers stand in the way of AI adoption.
3. How data quality and governance form the backbone of AI.
4. Organizational processes and structures that may inhibit effective AI adoption.
6. Ideas and approaches to help build your organization's AI strategy.
Infrastructure Challenges in Scaling RAG with Custom AI modelsZilliz
Building Retrieval-Augmented Generation (RAG) systems with open-source and custom AI models is a complex task. This talk explores the challenges in productionizing RAG systems, including retrieval performance, response synthesis, and evaluation. We’ll discuss how to leverage open-source models like text embeddings, language models, and custom fine-tuned models to enhance RAG performance. Additionally, we’ll cover how BentoML can help orchestrate and scale these AI components efficiently, ensuring seamless deployment and management of RAG systems in the cloud.
TrustArc Webinar - 2024 Global Privacy SurveyTrustArc
How does your privacy program stack up against your peers? What challenges are privacy teams tackling and prioritizing in 2024?
In the fifth annual Global Privacy Benchmarks Survey, we asked over 1,800 global privacy professionals and business executives to share their perspectives on the current state of privacy inside and outside of their organizations. This year’s report focused on emerging areas of importance for privacy and compliance professionals, including considerations and implications of Artificial Intelligence (AI) technologies, building brand trust, and different approaches for achieving higher privacy competence scores.
See how organizational priorities and strategic approaches to data security and privacy are evolving around the globe.
This webinar will review:
- The top 10 privacy insights from the fifth annual Global Privacy Benchmarks Survey
- The top challenges for privacy leaders, practitioners, and organizations in 2024
- Key themes to consider in developing and maintaining your privacy program
Climate Impact of Software Testing at Nordic Testing DaysKari Kakkonen
My slides at Nordic Testing Days 6.6.2024
Climate impact / sustainability of software testing discussed on the talk. ICT and testing must carry their part of global responsibility to help with the climat warming. We can minimize the carbon footprint but we can also have a carbon handprint, a positive impact on the climate. Quality characteristics can be added with sustainability, and then measured continuously. Test environments can be used less, and in smaller scale and on demand. Test techniques can be used in optimizing or minimizing number of tests. Test automation can be used to speed up testing.
Programming Foundation Models with DSPy - Meetup SlidesZilliz
Prompting language models is hard, while programming language models is easy. In this talk, I will discuss the state-of-the-art framework DSPy for programming foundation models with its powerful optimizers and runtime constraint system.
Unlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdfMalak Abu Hammad
Discover how MongoDB Atlas and vector search technology can revolutionize your application's search capabilities. This comprehensive presentation covers:
* What is Vector Search?
* Importance and benefits of vector search
* Practical use cases across various industries
* Step-by-step implementation guide
* Live demos with code snippets
* Enhancing LLM capabilities with vector search
* Best practices and optimization strategies
Perfect for developers, AI enthusiasts, and tech leaders. Learn how to leverage MongoDB Atlas to deliver highly relevant, context-aware search results, transforming your data retrieval process. Stay ahead in tech innovation and maximize the potential of your applications.
#MongoDB #VectorSearch #AI #SemanticSearch #TechInnovation #DataScience #LLM #MachineLearning #SearchTechnology
Unlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdf
Z03301550160
1. International Journal Of Computational Engineering Research (ijceronline.com) Vol. 3 Issue. 3
155
||Issn||2250-3005|| (Online) ||March||2013|| ||www.ijceronline.com||
Secured Reversible Data Transmission by Using Gzip Deflector
Algorithm for Encoded AVC Video
1,
Gokiladeepa.G, 2,
Gayathri.S, 2,
Heeba.S.D, 2,
Pavithra.R
1
Assistant Professor, Department Of Information Technology, SNS College of Engineering, TamilNadu, India
2
UG Scholar, Dept. of Information Technology, SNS College of Engineering ,TamilNadu, India
Abstract
Reversible data transmission, visible watermarking and steganography schemes that can be employed
along with multimedia applications. However, these methods are susceptible to quantization errors provided by
standard image/video compression standards. In this work we present a secured data transmission using novel
reversible visible watermarking scheme for H.264/AVC encoded video sequences. The proposed approach
reversibly embeds the residual information that will then be used by the decoder to recover the original image or
video frame. The residual information is losslessly compressed using the Gzip Deflector algorithm to minimize
the information to be embedded and reduce the distortion provided by RCM. The compressed information is
then encrypted using the 128–bit Advanced Encryption Standard (AES). Furthermore we add security in this
work if the key does not match we provide irrelevant information or unwanted data’s to the decoder. And
finally we compared our proposed work with existing state of art.
Index Terms – Information embedding, data compression, lossless recovery, reversible watermarking scheme,
DCT, AES, GZip Deflector algorithm.
1. INTRODUCTION
The recent growth of computer networks and multimedia systems has contributed to the proliferation of
multimedia con-tent. However, the availability of multimedia editing software has raised the issue of increased
distortion level[1]unauthorized manipulation of proprietary material. Visible watermarking techniques have been
extensively used to protect copyrighted material. However, traditional approaches, such as [2] are not able to
recover the original image/video quality after watermarking extraction.The methods proposed for removable
visible watermarking schemes where authenticated users are allowed to approximate the visible watermark.
Nonetheless, these methods only manage to recover an approximate version of the original image after
watermark extraction [12] and are therefore unsuitable for military, law and medical applications.There are
several reversible visible watermarking schemes that can be employed for many applications [3]. However,
these methods are susceptible to quantization errors provided by standard image/video compression standards.
Therefore, these methods are not suitable for most Internet applications where multimedia content needs to be
compressed prior transmission. In previous work, the same author has presented a reversible watermarking
scheme for JPEG image compression . However, this method cannot be directly integrated within current video
compression standards, mainly due to the spatio-temporal prediction mechanisms being employed by video
standards.
This paper presents secured data transmission by an adaptation of the reversible visible watermarking
scheme presented, for H.264/AVC video coding. The proposed method computes the residual error caused by
the embedded watermark which is losslessly compressed using the GZip Deflector algorithm and then encrypted
using the Advanced Encryption Standard (AES). The resulting information is embedded within the trans-form
coefficients of every macroblock (MB) pair using the Reversible Contrast Mapping (RCM).The simulation
results clearly show that the proposed mechanism outperforms the state of the art approach where Peak Signal-
to-Noise Ratio (PSNR) gains of up to 7 dB were registered. The structure of this paper is as follows. Section II
provides a detailed description of each component involved in the Reversible Visible Watermarking Embedding
process while the Reversible Visible Watermark Extraction process is described in section III. Section IV
presents the testing environment and presents the simulation results. The final comments and conclusion are
delivered in section V.
2. Information Embedding
A High level description of the proposed Reversible Visible Watermark Embedding process for video
content is illustrated in Fig.1. The original frame I is first fed to the information Embedding process which
inserts a visible watermark within its Region of Interest (ROI) to generate the frame IW. Given that the
embedded watermark directly affects the image content, it makes this process irreversible.The resulting
watermarked frame IW is then compressed using the Video Encoder 1 process which employs motion estimation
2. Secured Reversible Data Transmission By Using Gzip...
156
||Issn||2250-3005|| (Online) ||March||2013|| ||www.ijceronline.com||
and spatial prediction of the standard H.264/AVC encoder [4] to minimize the residual error EWC to be entropy
coded. The motion vectors and modes selected for each Macro block (MB) are registered in the Control
Information module. This information is then used by the video encoder to compress the original image I which
outputs the residual error EC. This process computes neither motion estimation nor mode decision, but relies
solely on the information contained within the Control Information module, thus significantly reduce the
complexity of the system.
Fig.1 Schematic diagram of Information Embedding process.
The difference between the residual errors of the compressed watermarked image EWC [5]and the compressed
image EC provides the discrepancy image D. This image contains 0 values outside the ROI, while having low
magnitude values within the ROI. Therefore, in order to minimize the information to be embedded within the
image, only the message M encompassing the Region of Interest within D is losslessly encoded and encrypted.
The encrypted message ME is then embedded within the watermarked image IW using a re-visible watermarking
approach. More information about each individual module is provided in the following sub-sections.
2.1 Data Embedding
The Visible Watermarking Embedding process is used to perceptibly insert a watermark W into a
primary image I so that the watermark is visible by the human eye. The purpose of these watermarks is to be
noticeable without significantly reducing the quality of the image. The method adopted in this work considers
the human vision system (HVS model) and the image content to insert the watermark without significantly
degrading the perceptual quality of the image/video content. This process dissects the host image I into non-
overlapping 8× 8 blocks. The watermark pattern W is then adaptively embedded into the host image using
In
W
(i, j) = [αnIn(i,j)] , if W(i,j) =1
In(i,j) , otherwise (1)
where [ ] represents the floor function, In
W
and In denote the nth
8×8 block of the watermarked image IW and the
host image I respectively, i and j are spatial coordinates within the block and n is the nth
adaptive scaling
coefficient. The scaling coefficients n are dependent on both the human perception and image content and
determine the visibility of the watermark pattern. More information about the derivation of these scaling
coefficients can be found in [8] and [12].
2.2 Video Encoder and DCT
The Video Encoder process employs the standard H.264/AVC encoder [6] to compress the supplied
video content.This process employs spatial prediction and motion estimation to minimize the residual error to be
encoded. The encoder derives the residual information to be encoded by subtracting the predicted frame from the
original frame. The resulting residual information is de-correlated using the discrete cosine transform (DCT)
transformation [10][9] and quantized to keep the least amount of information while still achieving an acceptable
level of image quality. The quantized transform coefficients are then inverse quantized and inverse transformed
to recover the residual error E which also includes the quantization error introduced by the lossy nature of the
standard video codec.
Fig. 2. DCT Based Watermark Technique.
3. Secured Reversible Data Transmission By Using Gzip...
157
||Issn||2250-3005|| (Online) ||March||2013|| ||www.ijceronline.com||
The proposed method employs two Video Encoder pro-cesses. The Video Encoder 1 process receives the
watermarked frame IW and computes motion estimation and spatial pre-diction to compress the video. The
resulting modes selected and motion vectors are then stored in the Control Information module while the
resulting residual error EWC is outputted. On the other hand, the Video Encoder to process receives the original
video stream I and compresses it using the motion vectors and mode selected available in the Control
Information module. This is done to ensure synchronization between the two processes and to minimize the
computational complexity of the proposed system.
2.3 Data Compression and Encryption
The discrepancy message D is derived by subtracting the residual EC from the residual EWC. As it can
be seen from Fig. 1, the non-zero coefficients reside only within the Region of Interest. Therefore, in order to
minimize the data to be embedded, the Region of Interest is extracted from the discrepancy message D to
generate the message M and this information is then passed through the Lossless Encoder process.The Lossless
Encoder process adopts a simple encoding strategy, where each pixel in M is represented by a 10–bit codeword.
The Most Significant Bit (MSB) is used to flag whether the pixel is a watermark (1) or not (0). The second MSB
represents the polarity of the coefficient where negative coefficients are marked by a 1. The remaining 8–bits
represent the magnitude of the coefficients of the residual error message M. Given that the decoder needs some
extra information to be able to decode the encoded message (e.g. watermark dimensions and coordinates of the
ROI), this information is concatenated to M prior to lossless encoding. The resulting 10–bit code words are then
compressed using the public do-main lossless Gzip Deflector algorithm [14].
2.4 AES (Advanced Encryption Standard)
To enhance the security, a 128–bit Advanced Encryption Standard (AES) [13] is used to encrypt the
information to be embedded so that only authenticated users can recover the original image.The AES algorithm
is a symmetric key algorithm which means the same key is used to both encrypt and decrypt a message. Also,
the cipher text produced by the AES algorithm is the same size as the plain text message. Most of the operations
in the AES algorithm take place on bytes of data or on words of data 4 bytes long, which are represented in the
field GF(28), called the Galois Field. AES is based on a design principle known as a Substitution permutation
network. AES operates on a 4×4 matrix of bytes, termed the state. The AES cipher is specified as a number of
repetitions of transformation rounds that convert the input plaintext into the final output of cipher text. Each
round consists of several processing steps, including one that depends on the encryption key. A set of reverse
rounds are applied to transform cipher text back into the original plaintext using the same encryption key. The
AES algorithm loops through certain sections Nr times. It is fast in both software and hardware.AES Algorithm
have following steps
Advantages of using AES algorithm:
1) Very Secure.
2) Reasonable Cost.
3) Main Characteristics
i) Flexibility, ii) Simplicity
1) Key Expansion—Round keys are derived from the cipher key using
Rijndael's key schedule.
2) Initial Round
a) Add Round Key—each byte of the state is combined with the
round key using bitwise XOR.
3) Rounds
a) Sub Bytes—a non-linear substitution step where each byte is
replaced with another according to a lookup table.
b)Shift Rows—A transposition step where each row of the state is
shifted cyclically a certain number of steps.
c) Mix Columns—a mixing operation which operates on the
columns of the state, combining the four bytes in each column.
d) Add Round Key
4) Final Round (no Mix Columns)
a) Sub Bytes
b) Shift Rows
c) Add Round Key
4. Secured Reversible Data Transmission By Using Gzip...
158
||Issn||2250-3005|| (Online) ||March||2013|| ||www.ijceronline.com||
2.5 Reversible Contrast Mapping (RCM)
The Reversible Watermarking process adopts the Reversible Contrast Mapping (RCM) mechanism
presented in [15] to embed the encrypted information ME within the watermarked image IW . The RCM
algorithm was used since it is reported to provide high-capacity data embedding without the requirement of the
transmission of any additional side information.The RCM algorithm considers x and y to be a pair of
coefficients whose values [11] reside in the range [0; L]. The forward RCM algorithm transforms the pixel pairs
according to
x = 2x - y; y = 2y - x (2)
In order to prevent overflow and underflow, the transformed pixel pairs are restricted within the range
0 ≤ x≤ L, 0 ≤ y ≤L (3)
The original coefficients can be recovered using the following inverse transformation
x= [(2/3) x+ (1/3) y], Y= [(1/3) x+ (2/3) y)] (4)
Where [ ] is the ceil function.
The RCM method substitutes the Least Significant Bit (LSB) of x and y. The LSB of x is set to 1 to indicate a
transformed pair while 0 otherwise. The information bit b is then embedded within the LSB of y. More
information about this method can be found in [15].The method proposed in [8], which is considered as the state
of the art method, applies the RCM algorithm in the spatial domain. However, the RCM method cannot be
applied in the spatial domain when considering compressed images since the embedded information will be
distorted by the Quantization process of the image/video codec. It was further shown that the RCM method can
modify the transformed coefficients prior entropy coding, thus mak-ing recovery of the original transform
coefficients possible. However, the transform coefficients provide different levels of distortions, and therefore it
is more desirable to embed the information within high frequency coefficients which provide the least distortion
to the human vision system.
Therefore, considering a P Q image, the Reversible Watermarking scans the blocks column-wise and grabs the
first two neighbouring 4 4 transformed blocks. It embeds the first bit within the coordinate (3,3) which
corresponds to the highest frequency coefficient. The remaining P
32
Q
1 bits are then stored within the coefficient
with coordinates (3,3) of the remaining neighbour blocks. Once all the blocks have been used this process goes
back to the first two neighbouring blocks and embeds the second P
32
Q
bits within the coefficient coordinate (3,2).
This process proceeds until either the whole bit stream is embedded or else when all the transform coefficients
are used. It is important to notice that the RCM algorithm can be used to embed information more than once
within the same coefficients. However, this will contribute to major distortions within the image. Therefore, the
transform coefficients were only used once for embedding. The Reversible Watermarking process then outputs
the image IRV C which is then entropy encoded and transmitted.
3. Information Extraction
The Information Extraction process in-verts the computations performed by the Reversible Visible
Watermark Embedding process. It receives the entropy coded information and decodes it to recover the image
IRV W .The Reversible Data Extraction process then computes the inverse RCM function[13] to extract the
encrypted message ME and the visible watermarked residual EW . The message ME is then decrypted and
decoded to derive the message M. The message M contains the residual watermark within a Region of Interest
together with additional information suitable to reconstruct the discrepancy image D. The im-ages D and EWC
are then summed to generate EC. The Video Decoder then is able to recover the original compressed video
sequence IC.
4. Simulation Result
The proposed Reversible Visible Watermarking Scheme was implemented using the C++ programming
language. The raw video sequences considered in these simulation results were encoded using a Common
Intermediate Format (CIF) resolution at 30fps with a format IPPP using the Baseline Profile of H.264/AVC. The
video was encoded using only the 4 4 transform size. The Quantization Parameter is set to a default of 20 unless
otherwise specified. The logos employed in these experiments included some of the logos.
TABLE I
Performance Analysis of the Proposed Reversible Visible Watermarking Embedding Process
5. Secured Reversible Data Transmission By Using Gzip...
159
||Issn||2250-3005|| (Online) ||March||2013|| ||www.ijceronline.com||
TABLE I
Performance Analysis of the Proposed Reversible Visible Watermarking Embedding Process
Table I illustrates the performance of the proposed Re-versible Visible Watermarking Embedding mechanism.
It can be clearly seen that the compression efficiency provided by the Lossless Encoder process is between 1.8
and 2.5. This compression efficiency is almost constant and thus not affected by the logo size. It can be further
noticed that the larger the size of the logo to be embedded the lower is the quality of the Watermarked Video IW .
This is quite intuitive since larger logos need to modify more DCT coefficients thus inevitably reducing the
perceptual quality of the Watermarked Video.The proposed system was compared to the Yang method which
was adapted for compressed video. As it can be seen from Fig. 2, the quality of the proposed method is superior
to the method adopted in [8]. In fact, it can be seen that no matter how much information is reversible embedded
the proposed system manages to recover the original quality for authenticated users. This is mainly due to the
fact that the information is being embedded on the compressed transform coefficients. On the other hand, the
performance of the state of the art approach degrades with increasing embedding information since the
information is hidden within the spatial domain which is corrupted by the Quantization process.
Fig. 3. Performance of the Yang method [8] and the proposed method at different number of embedded bits
Fig. 4. Performance of the Yang [8] and the proposed method at different Quantization Parameters (a) Foreman
(b) Paris Sequence
Fig. 5. Subjective results when using the (a) method proposed by Yang [8] and the (b) Proposed method. QP was
set to 30.
The performance of the proposed scheme was further analysed using different Quantization Parameters. As
Logo Width Height ME Size Comp. IW PSNR
(Bytes) Ratio (dB)
ATLSS 163 216 14408 2.4436 26.2887
DARPA 130 263 16461 2.0770 26.9543
Censcir 82 225 8747 2.1093 30.1921
Robotics 130 108 5623 2.4969 31.4413
CIT 82 225 8472 2.1778 31.7764
HCII 65 65 2253 1.8753 37.4408
6. Secured Reversible Data Transmission By Using Gzip...
160
||Issn||2250-3005|| (Online) ||March||2013|| ||www.ijceronline.com||
shown in Fig. 3, the proposed system clearly outperforms the method presented in [7] where PSNR gains of up
to 7 dB were achieved. The superiority of the proposed method is more evident in Fig. 4 where it can be seen
that the method proposed by Yang does not manage to extract the reversible information since it was corrupted
by quantization errors induced by the lossy Video Encoder process. The quantization errors generally provide
syntax and semantic violations in the De-Encryption and Lossless Decoding processes which are thus not able to
recover the original embedded information. On the other hand the proposed method manages to recover the
original compressed video when the user is authenticated.
5. Comments And Conclusion
This paper has presented a secured data Transmission with Advanced Encryption Standard (AES) using
novel reversible visible water-marking scheme for H.264/AVC encoded video. The proposed method computes
the information required by the decoder to recover the original compressed video when receiving the
watermarked video sequence. The additional information is reversibly embedded within the transform
coefficients of the watermarked video. The authenticated users are then enabled to extract the information
hidden within the transform coefficients to recover the original compressed image.The experimental results have
shown the superiority of the proposed system where PSNR gains of up to 7 dB was registered relative to the
state of the art approach. It was further shown that the information to be hidden can be compressed with
compression efficiency between 1.8 and 2.5.And the distortion provided by the RCM method is reduced.
Furthermore, watermark estimation functions can be employed in order to reduce the energy within the message
D to be decoded.
References
[1] Reuben A.Farrugia ―Reversible Visibe Watermarking for H.264/AVC Encoded Video‖ IEEE Conference,May 2011
[2] A.Watson,‖Visually Optimal DCT Quantization Matrices for Individual Images‖, in Data Compression Conference,
1993. DCC ’93., 1993, pp. –187.
[3] S.-K. Yip, O. Au, C.-W. Ho, and H.-M. Wong, ―Lossless Visible Water-Marking‖ , in Multimedia and Expo, 2006
IEEE International Conference on, 9-12 2006, pp. 853 –856
[4] Xiao Zeng, Zhen-YongChen, MingChen and Zhang Xiong,‖ Reversible Video Watermarking Using Motion
Estimation and Prediction Error Expansion,‖journal of information science and engineering 27,465-479(2011)
[5] R. A. Farrugia, ―A Reversible Visible Watermarking Scheme for Com-pressed Images‖, ‖, in MELECON 2010 -
2010 15th IEEE Mediterranean Electrotechnical Conference, , 26-28 2010, pp. 212 –217
[6] T. Wiegand, G. Sullivan, G. Bjontegaard, and A. Luthra, ―Overview of the H.264/AVC Video Coding Standard,‖
IEEE Transactions on, Vol. 13, no. 7, pp. 560 –576, July 2003
[7] S.P.Mohanty ,K.R.Ramakrishnan, and M.S. Kankanhalli,―A DCT Domain Visible Watermarking Technique for
Images,‖ in Multimedia andExpo, 2000, IEEE International Conference on, NewYork, USA, pp. 1029–1032
[8] D. Coltuc and J.-M. Chassery, ―Very Fast Watermarking by Reversible Contrast Mapping,‖ Signal Processing
Letters, IEEE, Vol. 14, no. 4, pp.255-258,April 2007
[9] A. Watson, ―Visually Optimal DCT Quantization Matrices for Individual Images‖, ,‖ in Data Compression
Conference, 1993. DCC ’93, 1993, pp. 178–187
[10] Y.Yang, X. Sun, H. Yang, and C.-T. Li, , ―Removable Visible Image Watermarking Algorithm in the Discrete
Cosine Transform Domain,‖ Expo, 2000. ICME 2000. 2000 IEEE International Conference on, New York, NY ,
USA, pp. 1029–1032
[11] A. Alattar, ―Reversible of a Generalized Integer Transform ,‖ Image Processing, IEEE Transactions on, Vol.
13,no.8,pp. 1147-1156,Aug.2004
[12] Y. Hu and B. Jeon, ―Reversible Visible Watermarking and Lossless Recovery of Visible Watermarking and Original
Images,‖Circuits and Systems for Video Technology IEEE Transactions on,Vol.16,no.11,pp.1423-1429,Nov.2006
[13] Advanced Encryption Standard (AES), FIPS PUB Std.197,2001
[14] (2010)Thezlibwebsite.[Online].Available http://www.zlib.net/
[15] B.-B. Huang and S.-X. Tang, ―A Contrast-Sensitive Visible Water- MarkingScheme,‖IEEE MultiMedia,vol.13,no.2
pp. 60– 66, 2006.