SlideShare uma empresa Scribd logo
1 de 17
Baixar para ler offline
Base paper: - http://ijcsi.org/papers/IJCSI-8-5-2-226-232.pdf
A Robust Watermarking Algorithm Based on Image Normalization and DC Coefficients
International Journal of Computer Science and Informatics
Abstract:
Digital watermarking is a highly evolving field, which involves the embedding of a certain kind of
information under a digital object (image, video, audio) for the purpose of copyright protection. Both
the image and the watermark are most frequently translated into a transform domain where the
embedding takes place. The selection of both the transform domain and the particular algorithm that is
used for the embedding of the watermark, depend heavily on the application. One of the most widely
used transform domains for watermarking of still digital images is the Discrete Cosine Transform
domain. The reason is that the Discrete Cosine Transform is a part of the JPEG standard, which in turn is
widely used for storage of digital images. In our research we propose a unique method for DCT-based
image watermarking. In an effort to achieve robustness to cropping and JPEG compression we have
developed an algorithm for rating the 8×8 blocks of the image DCT coefficients taking into account their
embedding capacity and their spatial location within the image. Our experiments show that the
proposed scheme offers adequate transparency, and works exceptionally well against cropping while at
the same time maintains sufficient robustness to JPEG compression.
Base paper: - http://ijcsi.org/papers/IJCSI-8-5-2-226-232.pdf
(a) Block Diagram of the JPEG Compression
(b) Encoder
Base paper: - http://ijcsi.org/papers/IJCSI-8-5-2-226-232.pdf
(c) Decoder
(d) Three Watermarks used in Project
Base paper: - http://ijcsi.org/papers/IJCSI-8-5-2-226-232.pdf
Default Parameters
weighting factor alpha (recommended value ---):- 0.5
index of the coefficient - 60
embedding size (number of watermark coefficients per block) Choose 2, 4 o r 8:- 4
cropping:-0
quantization:-0
marked image in uint8:-0
normalization:-0
Base paper: - http://ijcsi.org/papers/IJCSI-8-5-2-226-232.pdf
A: - stripes
Base paper: - http://ijcsi.org/papers/IJCSI-8-5-2-226-232.pdf
SNR of real image, SNRr(dB)=12.5997
Base paper: - http://ijcsi.org/papers/IJCSI-8-5-2-226-232.pdf
BER(bits per pixel)=0.0000
BERmod(bits per pixel with error)=NaN
rho=1.0000
Base paper: - http://ijcsi.org/papers/IJCSI-8-5-2-226-232.pdf
B: - NPS logo
Base paper: - http://ijcsi.org/papers/IJCSI-8-5-2-226-232.pdf
SNR of real image, SNRr(dB)=11.3263
Base paper: - http://ijcsi.org/papers/IJCSI-8-5-2-226-232.pdf
BER (bits per pixel)=0.0000
BERmod (bits per pixel with error)=NaN
rho =1.0000
Base paper: - http://ijcsi.org/papers/IJCSI-8-5-2-226-232.pdf
C: - random gray scale watermark
Base paper: - http://ijcsi.org/papers/IJCSI-8-5-2-226-232.pdf
SNR of real image, SNRr(dB)=12.7750
Base paper: - http://ijcsi.org/papers/IJCSI-8-5-2-226-232.pdf
BER (bits per pixel)=0.0000
BERmod (bits per pixel with error)=NaN
rho=1.0000
Base paper: - http://ijcsi.org/papers/IJCSI-8-5-2-226-232.pdf
Future Enhancement:
Embedding the coefficients in a way that will take full advantage of the human visual system’s
characteristics is a big goal of the watermarking community. Further research in this subject is required
to investigate the possibility of incorporating our metric to the Just Noticeable Difference (JND) models
that have been proposed.
In addition, in this work the transparency of a watermarking algorithm is judged by the subjective
decision of independent observers. The possibility of developing a formal model for the evaluation of
the transparency may be investigated. However this task is not trivial. A simple correlation test between
the original and the marked image would not work. This would detect any differences between the two
but cannot tell if these differences occur in a visually perceptual manner. A JND model could be used as
the basis for the evaluation of the transparency ([24]), but then it should not also be used in the
embedding model. Otherwise the judgment would be biased and therefore unable to give dependable
results.
Base paper: - http://ijcsi.org/papers/IJCSI-8-5-2-226-232.pdf
References:
[1] F. A. P. Petitcolas, R. J. Anderson, M. G. Kuhn, "Information Hiding – A Survey",
Proceedings of the IEEE, vol.87, no.7, pp.1062-1078, July 1999.
[2] D. J. Ryan, "Infosec and Infowar, Considerations for Military Intelligence",
www.danjryan.com/MIntl.html.
[3] F. Hartung, M. Kutter, "Multimedia Watermarking Techniques", Proceedings of the
IEEE, vol.87, no.7, pp.1079-1107, July 1999.
[4] I. J. Cox, M. L. Miller, J. A. Bloom, "Digital Watermarking", Morgan Kaufmann
Publishers, 2002.
[5] C. P. Pfleeger, "Security in Computing", Prentice Hall PTR, 2
nd
edition, 2000.
[6] G. L. Friedman, "The Trustworthy Digital Camera: Restoring Credibility to the
Photographic Image", IEEE Transactions on Consumer Electronics, vol.39, pp.905-910, October
1993.
[7] D. Kundur, D. Hatzinakos, “Digital Watermarking for Telltale Tamper Proofing and
Authentication”, Proceedings of the IEEE, vol.87, no.7, pp.1167-1180, July 1999.
[8] C. I. Podilchuk, E. J. Delp, "Digital Watermarking: Algorithm and Applications", IEEE
Signal Processing Magazine, pp.33-46, July 2001.
[9] C. C. Langelaar, I. Setyawan, R. L. Lagendijk, "Watermarking Digital Image and Video
Data", IEEE Signal Processing Magazine, pp.20-46, September 2000.
[10] W. Bender, D. Gruhl, N. Morimoto, "Techniques for Data Hiding", Proceedings SPIE,
vol.2420, p.40, San Jose, CA, February 1995.
[11] N. Nikolaidis, I. Pitas, "Copyright Protection of Images using Robust Digital
Signatures", Proceedings ICASSP '96, Atlanta, GA, May 1996.
[12] C. Langelaar, J. C. A. van der Lubbe, R. L. Lagendijk, "Robust Labeling Methods for
Copy Protection of Images", Proceedings in Electronic Imaging, vol.3022, pp.298-309, San Jose,
CA, February 1997.
[13] M. Kutter, F. Jordan, F. Bossen, "Digital Signature of Color Images using Amplitude
Modulation", Proceedings in Electronic Imaging, San Jose, CA, February 1997.
[14] M. Barni, C. I. Podilchuk, F. Bartolini, E. J. Delp, "Watermark Embedding: Hiding a
Signal within a Cover Image", IEEE Communications Magazine, pp.102-108, August 2001.
[15] M. Ramkumar, A. N. Akansu, A. A. Alatan, “On the Choice of Transforms for Data
Hiding in Compressed Video”, IEEE International Conference on Acoustics, Speech, and Signal
Processing 1999, Proceedings, Vol.6 , pp.3049-3052, 1999.
[16] S. Kang, Y. Aoki, “Digital Image Watermarking by Fresnel Transform and its
Robustness”, International Conference on Image Processing, Proceedings 1999 (ICIP 99), vol.2,
pp.221-225.
[17] J. J. K. O Ruanaidh, W. J. Dowling, F. M. Boland, "Phase Watermarking of Digital
Images", Proceedings IEEE, International Conference of Image Processing, vol.III, pp.239-242,
Lausanne, Switzerland, September 16-19, 1996.
[18] A. Herrigel, H. Petersen, J. O Ruanaidh, T. Pun, P. Shelby, "Copyright Techniques for
Digital Images Based on Asymmetric Cryptographic Techniques", presented at Workshop on
Information Hiding, Portland, Oregon, USA, April 1998.
Base paper: - http://ijcsi.org/papers/IJCSI-8-5-2-226-232.pdf
[19] A. Herrigel, J. J. K. O Ruanaidh, H. Petersen, S. Pereira, T. Pun, "Secure Copyright
Protection Techniques for Digital Images", in Information Hiding (Lecture Notes in Computer
Science, vol. 1525), D. Aucsmith, Ed. Berlin, Germany: Springer, 1998, pp.169-190.
[20] S. Pereira, J. J. K. O Ruanaidh, F. Deguillaume, G. Csurka, T. Pun, "Template-based
Recovery of Fourier-based Watermarks using Log-polar and Log-log Maps", Proceedings IEEE in
Multimedia Systems 99, International Conference in Multimedia Computing and Systems, Florence,
Italy, June 7-11, 1999.
[21] J. J. K. O Ruanaidh, F. M. Boland, O. Sinnen, "Watermarking Digital Images for
Copyright Protection", Proceedings in Electronic Imaging and the Visual Arts 1996, Florence, Italy,
February 1996.
[22] I. J. Cox, J. Kilian, F. T. Leighton, T. Shamoon, “Secure Spread Spectrum
Watermarking for Multimedia”, IEEE Transactions on Image Processing, vol.6, no.12, pp.1673-
1687, December 1997.
[23] C. I. Podilchuk, W. Zeng, “Image-adaptive Watermarking using Visual Models”, IEEE
Journal on Selected Areas in Communications, vol.16, no.4, pp.525-539, May 1998.
[24] C. I. Podilchuk, W. Zeng, “Perceptual Watermarking of Still Images”, IEEE First
Workshop on Multimedia Signal Processing, pp.363-368, 1997.
[25] A. Piva, M. Barni, E. Bartolini, V. Cappellini, "A DCT-based Watermarking Recovering
without resorting to the Uncorrupted Digital Image", Proceedings IEEE, International Conference in
Image Processing, vol.1, p.520, Santa Barbara, CA, 1997.
[26] M. Barni, F. Bartolini, V. Cappellini, A. Lipi, A. Piva, "A DWT-based Technique for
Spatio-Frequency Masking of Digital Signatures", Proceedings SPIE/IS International Conferencein
Security and Watermarking of Multimedia Contents, vol.3657, pp.31-39, San Jose, January 25-27,
1999.
[27] K. Sayood, "Introduction to Data Compression", Morgan Kaufmann Publidhers, 2
nd
edition, 2000.
[28] J. Miano, "Compressed Image File Formats", Addison Wesley Longman, Inc, 1999.
Base paper: - http://ijcsi.org/papers/IJCSI-8-5-2-226-232.pdf
[29] K. R Castleman, "Digital Image Processing", Prentice Hall, Inc, 1996.
[30] M. Ghanbari, "Video Coding: An Introduction to Standard Codecs", IEE
Telecommunication Series 42, 1999.
[31] C.-T. Hsu, J.-L. Wu, “Hidden Digital Watermarks in Images”, IEEE Transactions on
Image Processing, vol.8, no.1, pp. 58-68, January 1999.
[32] K. S. Shanmugan, A. M. Breipohl, "Random Signals: Detection Estimation and Data
Analysis", John Wiley and Sons, Inc, 1988.
[33] R. B Wolfgang, C. I. Podilchuk, E. J. Delp, “Perceptual Watermarks for Digital Images
and Video”, Proceedings of the IEEE, vol.87, no.7, pp. 1108-1126, July 1999.
[34] C. I. Podilchuk, E. J. Delp, "Digital Watermarking: Algorithm and Applications", IEEE
Signal Processing Magazine, pp.33-46, July 2001.
[35] Y.-P. Wang, M.-J. Chen, p.-Y. Cheng, “Robust Image Watermark With Wavelet
Transform and Spread Spectrum Techniques”, Conference Record of the Thirty-Fourth Asilomar
Conference on Signals, Systems and Computers, vol.2 , pp. 1846 –1850, Asilomar, 2000.
[36] S. B. Wicker, "Error Control Systems for Digital Communication and Storage",
Prentice-Hall Inc, 1995.
[37] I. Retsas, R. Pieper, R. Cristi, “Watermark Recovery with a DCT-based Scheme Employing
Nonuniform Imbedding”, 34
th
Southeastern Symposium on System Theory (SSST-02), Alabama,
March 18-19, 2002.

Mais conteúdo relacionado

Mais procurados

Volume 2-issue-6-1974-1978
Volume 2-issue-6-1974-1978Volume 2-issue-6-1974-1978
Volume 2-issue-6-1974-1978
Editor IJARCET
 
Pattern Approximation Based Generalized Image Noise Reduction Using Adaptive ...
Pattern Approximation Based Generalized Image Noise Reduction Using Adaptive ...Pattern Approximation Based Generalized Image Noise Reduction Using Adaptive ...
Pattern Approximation Based Generalized Image Noise Reduction Using Adaptive ...
IJECEIAES
 

Mais procurados (19)

Quality - Security Uncompromised and Plausible Watermarking for Patent Infrin...
Quality - Security Uncompromised and Plausible Watermarking for Patent Infrin...Quality - Security Uncompromised and Plausible Watermarking for Patent Infrin...
Quality - Security Uncompromised and Plausible Watermarking for Patent Infrin...
 
Top Cited Article in Informatics Engineering Research: October 2020
Top Cited Article in Informatics Engineering Research: October 2020Top Cited Article in Informatics Engineering Research: October 2020
Top Cited Article in Informatics Engineering Research: October 2020
 
20120140503009
2012014050300920120140503009
20120140503009
 
A0344001010
A0344001010A0344001010
A0344001010
 
IRJET- Kidney Stone Classification using Deep Neural Networks and Facilitatin...
IRJET- Kidney Stone Classification using Deep Neural Networks and Facilitatin...IRJET- Kidney Stone Classification using Deep Neural Networks and Facilitatin...
IRJET- Kidney Stone Classification using Deep Neural Networks and Facilitatin...
 
Predicting Media Memorability with Audio, Video, and Text representations
Predicting Media Memorability with Audio, Video, and Text representationsPredicting Media Memorability with Audio, Video, and Text representations
Predicting Media Memorability with Audio, Video, and Text representations
 
DIP Using Image Encryption and XOR Operation Affine Transform
DIP Using Image Encryption and XOR Operation Affine TransformDIP Using Image Encryption and XOR Operation Affine Transform
DIP Using Image Encryption and XOR Operation Affine Transform
 
A New Steganographic Method for Embedded Image In Audio File
A New Steganographic Method for Embedded Image In Audio FileA New Steganographic Method for Embedded Image In Audio File
A New Steganographic Method for Embedded Image In Audio File
 
卒業研究 角島康太郎
卒業研究 角島康太郎卒業研究 角島康太郎
卒業研究 角島康太郎
 
2011 06 02 (uned) emadrid mlcalvo ucm m learning y holografia tecnicas compat...
2011 06 02 (uned) emadrid mlcalvo ucm m learning y holografia tecnicas compat...2011 06 02 (uned) emadrid mlcalvo ucm m learning y holografia tecnicas compat...
2011 06 02 (uned) emadrid mlcalvo ucm m learning y holografia tecnicas compat...
 
Volume 2-issue-6-1974-1978
Volume 2-issue-6-1974-1978Volume 2-issue-6-1974-1978
Volume 2-issue-6-1974-1978
 
Digital enhancement of indian manuscript, yashodhar charitra
Digital enhancement of indian manuscript, yashodhar charitraDigital enhancement of indian manuscript, yashodhar charitra
Digital enhancement of indian manuscript, yashodhar charitra
 
Efficient video indexing for fast motion video
Efficient video indexing for fast motion videoEfficient video indexing for fast motion video
Efficient video indexing for fast motion video
 
Cse image processing ppt
Cse image processing pptCse image processing ppt
Cse image processing ppt
 
TVSum: Summarizing Web Videos Using Titles
TVSum: Summarizing Web Videos Using TitlesTVSum: Summarizing Web Videos Using Titles
TVSum: Summarizing Web Videos Using Titles
 
Pattern Approximation Based Generalized Image Noise Reduction Using Adaptive ...
Pattern Approximation Based Generalized Image Noise Reduction Using Adaptive ...Pattern Approximation Based Generalized Image Noise Reduction Using Adaptive ...
Pattern Approximation Based Generalized Image Noise Reduction Using Adaptive ...
 
Review of Pose Recognition Systems
Review of Pose Recognition SystemsReview of Pose Recognition Systems
Review of Pose Recognition Systems
 
De-Noisy Image of Activity Tracking System in Digital Image Processing
De-Noisy Image of Activity Tracking System in Digital Image ProcessingDe-Noisy Image of Activity Tracking System in Digital Image Processing
De-Noisy Image of Activity Tracking System in Digital Image Processing
 
Restoration of Old Documents that Suffer from Degradation
Restoration of Old Documents that Suffer from DegradationRestoration of Old Documents that Suffer from Degradation
Restoration of Old Documents that Suffer from Degradation
 

Semelhante a A robust watermarking algorithm based on image normalization and dc coefficients

Image compression using discrete wavelet transform
Image compression using discrete wavelet transformImage compression using discrete wavelet transform
Image compression using discrete wavelet transform
Harshal Ladhe
 
REVIEW ON SECRET IMAGE SHARING USING QR CODE GENERATION TECHNIC
REVIEW ON SECRET IMAGE SHARING USING QR CODE GENERATION TECHNICREVIEW ON SECRET IMAGE SHARING USING QR CODE GENERATION TECHNIC
REVIEW ON SECRET IMAGE SHARING USING QR CODE GENERATION TECHNIC
priyanka singh
 

Semelhante a A robust watermarking algorithm based on image normalization and dc coefficients (20)

Presentation_Format (1).ppt
Presentation_Format (1).pptPresentation_Format (1).ppt
Presentation_Format (1).ppt
 
Entropy based Digital Watermarking using 2-D Biorthogonal WAVELET
Entropy based Digital Watermarking using 2-D Biorthogonal WAVELETEntropy based Digital Watermarking using 2-D Biorthogonal WAVELET
Entropy based Digital Watermarking using 2-D Biorthogonal WAVELET
 
Image compression using discrete wavelet transform
Image compression using discrete wavelet transformImage compression using discrete wavelet transform
Image compression using discrete wavelet transform
 
Watermarkingppt
WatermarkingpptWatermarkingppt
Watermarkingppt
 
PREVENTING COPYRIGHTS INFRINGEMENT OF IMAGES BY WATERMARKING IN TRANSFORM DOM...
PREVENTING COPYRIGHTS INFRINGEMENT OF IMAGES BY WATERMARKING IN TRANSFORM DOM...PREVENTING COPYRIGHTS INFRINGEMENT OF IMAGES BY WATERMARKING IN TRANSFORM DOM...
PREVENTING COPYRIGHTS INFRINGEMENT OF IMAGES BY WATERMARKING IN TRANSFORM DOM...
 
Quality Compression for Medical Big Data X-Ray Image using Biorthogonal 5.5 W...
Quality Compression for Medical Big Data X-Ray Image using Biorthogonal 5.5 W...Quality Compression for Medical Big Data X-Ray Image using Biorthogonal 5.5 W...
Quality Compression for Medical Big Data X-Ray Image using Biorthogonal 5.5 W...
 
REVIEW ON SECRET IMAGE SHARING USING QR CODE GENERATION TECHNIC
REVIEW ON SECRET IMAGE SHARING USING QR CODE GENERATION TECHNICREVIEW ON SECRET IMAGE SHARING USING QR CODE GENERATION TECHNIC
REVIEW ON SECRET IMAGE SHARING USING QR CODE GENERATION TECHNIC
 
October 2022: Top 10 Read Articles in Signal & Image Processing
October 2022: Top 10 Read Articles in Signal & Image ProcessingOctober 2022: Top 10 Read Articles in Signal & Image Processing
October 2022: Top 10 Read Articles in Signal & Image Processing
 
August 2022: Top 10 Read Articles in Signal & Image Processing
August 2022: Top 10 Read Articles in Signal & Image ProcessingAugust 2022: Top 10 Read Articles in Signal & Image Processing
August 2022: Top 10 Read Articles in Signal & Image Processing
 
September 2022: Top 10 Read Articles in Signal & Image Processing
September 2022: Top 10 Read Articles in Signal & Image ProcessingSeptember 2022: Top 10 Read Articles in Signal & Image Processing
September 2022: Top 10 Read Articles in Signal & Image Processing
 
April 2022: Top Read Articles in Signal & Image Processing
April 2022: Top Read Articles in Signal & Image ProcessingApril 2022: Top Read Articles in Signal & Image Processing
April 2022: Top Read Articles in Signal & Image Processing
 
June 2022: Top 10 Read Articles in Signal & Image Processing
June 2022: Top 10 Read Articles in Signal & Image   ProcessingJune 2022: Top 10 Read Articles in Signal & Image   Processing
June 2022: Top 10 Read Articles in Signal & Image Processing
 
May 2022: Top Read Articles in Signal & Image Processing
May 2022: Top Read Articles in Signal & Image ProcessingMay 2022: Top Read Articles in Signal & Image Processing
May 2022: Top Read Articles in Signal & Image Processing
 
July 2022: Top 10 Read Articles in Signal & Image Processing
July 2022: Top 10 Read Articles in Signal & Image ProcessingJuly 2022: Top 10 Read Articles in Signal & Image Processing
July 2022: Top 10 Read Articles in Signal & Image Processing
 
January 2023: Top 10 Read Articles in Signal &Image Processing
January 2023: Top 10 Read Articles in Signal &Image Processing	January 2023: Top 10 Read Articles in Signal &Image Processing
January 2023: Top 10 Read Articles in Signal &Image Processing
 
IT6005 digital image processing question bank
IT6005   digital image processing question bankIT6005   digital image processing question bank
IT6005 digital image processing question bank
 
Digital Audio Watermarking
Digital Audio WatermarkingDigital Audio Watermarking
Digital Audio Watermarking
 
December 2021: Top Read Articles in Signal & Image Processing
December 2021: Top Read Articles in Signal & Image ProcessingDecember 2021: Top Read Articles in Signal & Image Processing
December 2021: Top Read Articles in Signal & Image Processing
 
50120140506015
5012014050601550120140506015
50120140506015
 
November 2021: Top Read Articles in Signal & Image Processing
November 2021: Top Read Articles in Signal & Image ProcessingNovember 2021: Top Read Articles in Signal & Image Processing
November 2021: Top Read Articles in Signal & Image Processing
 

Mais de Harshal Ladhe

RGB Image Compression using Two-dimensional Discrete Cosine Transform
RGB Image Compression using Two-dimensional Discrete Cosine TransformRGB Image Compression using Two-dimensional Discrete Cosine Transform
RGB Image Compression using Two-dimensional Discrete Cosine Transform
Harshal Ladhe
 
Adaptive noise estimation algorithm for speech enhancement
Adaptive noise estimation algorithm for speech enhancementAdaptive noise estimation algorithm for speech enhancement
Adaptive noise estimation algorithm for speech enhancement
Harshal Ladhe
 
Bilateral filtering for gray and color images
Bilateral filtering for gray and color imagesBilateral filtering for gray and color images
Bilateral filtering for gray and color images
Harshal Ladhe
 
Phase locked loop techniques for fm demodulation and modulation
Phase locked loop techniques for fm demodulation and modulationPhase locked loop techniques for fm demodulation and modulation
Phase locked loop techniques for fm demodulation and modulation
Harshal Ladhe
 
Design of iir notch filters and narrow and wide band filters
Design of iir notch filters and narrow and wide band filtersDesign of iir notch filters and narrow and wide band filters
Design of iir notch filters and narrow and wide band filters
Harshal Ladhe
 
A geometric approach to improving active packet loss measurement
A geometric approach to improving active packet loss measurementA geometric approach to improving active packet loss measurement
A geometric approach to improving active packet loss measurement
Harshal Ladhe
 
Genetic algorithm for the design of optimal iir digital filters
Genetic algorithm for the design of optimal iir digital filtersGenetic algorithm for the design of optimal iir digital filters
Genetic algorithm for the design of optimal iir digital filters
Harshal Ladhe
 
Intrusion detection in homogeneous and heterogeneous wireless sensor networks
Intrusion detection in homogeneous and heterogeneous wireless sensor networksIntrusion detection in homogeneous and heterogeneous wireless sensor networks
Intrusion detection in homogeneous and heterogeneous wireless sensor networks
Harshal Ladhe
 
Study & simulation of O.F.D.M. system
Study & simulation of O.F.D.M. systemStudy & simulation of O.F.D.M. system
Study & simulation of O.F.D.M. system
Harshal Ladhe
 
A simulation and analysis of ofdm system for 4 g communications
A simulation and analysis of ofdm system for 4 g communicationsA simulation and analysis of ofdm system for 4 g communications
A simulation and analysis of ofdm system for 4 g communications
Harshal Ladhe
 
Speech compression using voiced excited loosy predictive coding (lpc)
Speech compression using voiced excited loosy predictive coding (lpc)Speech compression using voiced excited loosy predictive coding (lpc)
Speech compression using voiced excited loosy predictive coding (lpc)
Harshal Ladhe
 
Speech compression using loosy predictive coding (lpc)
Speech compression using loosy predictive coding (lpc)Speech compression using loosy predictive coding (lpc)
Speech compression using loosy predictive coding (lpc)
Harshal Ladhe
 
Noise analysis & qrs detection in ecg signals
Noise analysis & qrs detection in ecg signalsNoise analysis & qrs detection in ecg signals
Noise analysis & qrs detection in ecg signals
Harshal Ladhe
 

Mais de Harshal Ladhe (14)

RGB Image Compression using Two-dimensional Discrete Cosine Transform
RGB Image Compression using Two-dimensional Discrete Cosine TransformRGB Image Compression using Two-dimensional Discrete Cosine Transform
RGB Image Compression using Two-dimensional Discrete Cosine Transform
 
Adaptive noise estimation algorithm for speech enhancement
Adaptive noise estimation algorithm for speech enhancementAdaptive noise estimation algorithm for speech enhancement
Adaptive noise estimation algorithm for speech enhancement
 
Bilateral filtering for gray and color images
Bilateral filtering for gray and color imagesBilateral filtering for gray and color images
Bilateral filtering for gray and color images
 
Phase locked loop techniques for fm demodulation and modulation
Phase locked loop techniques for fm demodulation and modulationPhase locked loop techniques for fm demodulation and modulation
Phase locked loop techniques for fm demodulation and modulation
 
Design of iir notch filters and narrow and wide band filters
Design of iir notch filters and narrow and wide band filtersDesign of iir notch filters and narrow and wide band filters
Design of iir notch filters and narrow and wide band filters
 
A geometric approach to improving active packet loss measurement
A geometric approach to improving active packet loss measurementA geometric approach to improving active packet loss measurement
A geometric approach to improving active packet loss measurement
 
Genetic algorithm for the design of optimal iir digital filters
Genetic algorithm for the design of optimal iir digital filtersGenetic algorithm for the design of optimal iir digital filters
Genetic algorithm for the design of optimal iir digital filters
 
Intrusion detection in homogeneous and heterogeneous wireless sensor networks
Intrusion detection in homogeneous and heterogeneous wireless sensor networksIntrusion detection in homogeneous and heterogeneous wireless sensor networks
Intrusion detection in homogeneous and heterogeneous wireless sensor networks
 
Study & simulation of O.F.D.M. system
Study & simulation of O.F.D.M. systemStudy & simulation of O.F.D.M. system
Study & simulation of O.F.D.M. system
 
A simulation and analysis of ofdm system for 4 g communications
A simulation and analysis of ofdm system for 4 g communicationsA simulation and analysis of ofdm system for 4 g communications
A simulation and analysis of ofdm system for 4 g communications
 
Speech compression using voiced excited loosy predictive coding (lpc)
Speech compression using voiced excited loosy predictive coding (lpc)Speech compression using voiced excited loosy predictive coding (lpc)
Speech compression using voiced excited loosy predictive coding (lpc)
 
Speech compression using loosy predictive coding (lpc)
Speech compression using loosy predictive coding (lpc)Speech compression using loosy predictive coding (lpc)
Speech compression using loosy predictive coding (lpc)
 
Noise analysis & qrs detection in ecg signals
Noise analysis & qrs detection in ecg signalsNoise analysis & qrs detection in ecg signals
Noise analysis & qrs detection in ecg signals
 
GIS
GISGIS
GIS
 

Último

Activity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdfActivity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdf
ciinovamais
 
1029-Danh muc Sach Giao Khoa khoi 6.pdf
1029-Danh muc Sach Giao Khoa khoi  6.pdf1029-Danh muc Sach Giao Khoa khoi  6.pdf
1029-Danh muc Sach Giao Khoa khoi 6.pdf
QucHHunhnh
 
An Overview of Mutual Funds Bcom Project.pdf
An Overview of Mutual Funds Bcom Project.pdfAn Overview of Mutual Funds Bcom Project.pdf
An Overview of Mutual Funds Bcom Project.pdf
SanaAli374401
 
Seal of Good Local Governance (SGLG) 2024Final.pptx
Seal of Good Local Governance (SGLG) 2024Final.pptxSeal of Good Local Governance (SGLG) 2024Final.pptx
Seal of Good Local Governance (SGLG) 2024Final.pptx
negromaestrong
 
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in DelhiRussian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
kauryashika82
 

Último (20)

INDIA QUIZ 2024 RLAC DELHI UNIVERSITY.pptx
INDIA QUIZ 2024 RLAC DELHI UNIVERSITY.pptxINDIA QUIZ 2024 RLAC DELHI UNIVERSITY.pptx
INDIA QUIZ 2024 RLAC DELHI UNIVERSITY.pptx
 
How to Give a Domain for a Field in Odoo 17
How to Give a Domain for a Field in Odoo 17How to Give a Domain for a Field in Odoo 17
How to Give a Domain for a Field in Odoo 17
 
Activity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdfActivity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdf
 
Advanced Views - Calendar View in Odoo 17
Advanced Views - Calendar View in Odoo 17Advanced Views - Calendar View in Odoo 17
Advanced Views - Calendar View in Odoo 17
 
Ecological Succession. ( ECOSYSTEM, B. Pharmacy, 1st Year, Sem-II, Environmen...
Ecological Succession. ( ECOSYSTEM, B. Pharmacy, 1st Year, Sem-II, Environmen...Ecological Succession. ( ECOSYSTEM, B. Pharmacy, 1st Year, Sem-II, Environmen...
Ecological Succession. ( ECOSYSTEM, B. Pharmacy, 1st Year, Sem-II, Environmen...
 
microwave assisted reaction. General introduction
microwave assisted reaction. General introductionmicrowave assisted reaction. General introduction
microwave assisted reaction. General introduction
 
1029-Danh muc Sach Giao Khoa khoi 6.pdf
1029-Danh muc Sach Giao Khoa khoi  6.pdf1029-Danh muc Sach Giao Khoa khoi  6.pdf
1029-Danh muc Sach Giao Khoa khoi 6.pdf
 
Key note speaker Neum_Admir Softic_ENG.pdf
Key note speaker Neum_Admir Softic_ENG.pdfKey note speaker Neum_Admir Softic_ENG.pdf
Key note speaker Neum_Admir Softic_ENG.pdf
 
Holdier Curriculum Vitae (April 2024).pdf
Holdier Curriculum Vitae (April 2024).pdfHoldier Curriculum Vitae (April 2024).pdf
Holdier Curriculum Vitae (April 2024).pdf
 
Paris 2024 Olympic Geographies - an activity
Paris 2024 Olympic Geographies - an activityParis 2024 Olympic Geographies - an activity
Paris 2024 Olympic Geographies - an activity
 
Unit-IV; Professional Sales Representative (PSR).pptx
Unit-IV; Professional Sales Representative (PSR).pptxUnit-IV; Professional Sales Representative (PSR).pptx
Unit-IV; Professional Sales Representative (PSR).pptx
 
PROCESS RECORDING FORMAT.docx
PROCESS      RECORDING        FORMAT.docxPROCESS      RECORDING        FORMAT.docx
PROCESS RECORDING FORMAT.docx
 
An Overview of Mutual Funds Bcom Project.pdf
An Overview of Mutual Funds Bcom Project.pdfAn Overview of Mutual Funds Bcom Project.pdf
An Overview of Mutual Funds Bcom Project.pdf
 
Seal of Good Local Governance (SGLG) 2024Final.pptx
Seal of Good Local Governance (SGLG) 2024Final.pptxSeal of Good Local Governance (SGLG) 2024Final.pptx
Seal of Good Local Governance (SGLG) 2024Final.pptx
 
APM Welcome, APM North West Network Conference, Synergies Across Sectors
APM Welcome, APM North West Network Conference, Synergies Across SectorsAPM Welcome, APM North West Network Conference, Synergies Across Sectors
APM Welcome, APM North West Network Conference, Synergies Across Sectors
 
psychiatric nursing HISTORY COLLECTION .docx
psychiatric  nursing HISTORY  COLLECTION  .docxpsychiatric  nursing HISTORY  COLLECTION  .docx
psychiatric nursing HISTORY COLLECTION .docx
 
Advance Mobile Application Development class 07
Advance Mobile Application Development class 07Advance Mobile Application Development class 07
Advance Mobile Application Development class 07
 
Nutritional Needs Presentation - HLTH 104
Nutritional Needs Presentation - HLTH 104Nutritional Needs Presentation - HLTH 104
Nutritional Needs Presentation - HLTH 104
 
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in DelhiRussian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
 
Accessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impactAccessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impact
 

A robust watermarking algorithm based on image normalization and dc coefficients

  • 1. Base paper: - http://ijcsi.org/papers/IJCSI-8-5-2-226-232.pdf A Robust Watermarking Algorithm Based on Image Normalization and DC Coefficients International Journal of Computer Science and Informatics Abstract: Digital watermarking is a highly evolving field, which involves the embedding of a certain kind of information under a digital object (image, video, audio) for the purpose of copyright protection. Both the image and the watermark are most frequently translated into a transform domain where the embedding takes place. The selection of both the transform domain and the particular algorithm that is used for the embedding of the watermark, depend heavily on the application. One of the most widely used transform domains for watermarking of still digital images is the Discrete Cosine Transform domain. The reason is that the Discrete Cosine Transform is a part of the JPEG standard, which in turn is widely used for storage of digital images. In our research we propose a unique method for DCT-based image watermarking. In an effort to achieve robustness to cropping and JPEG compression we have developed an algorithm for rating the 8×8 blocks of the image DCT coefficients taking into account their embedding capacity and their spatial location within the image. Our experiments show that the proposed scheme offers adequate transparency, and works exceptionally well against cropping while at the same time maintains sufficient robustness to JPEG compression.
  • 2. Base paper: - http://ijcsi.org/papers/IJCSI-8-5-2-226-232.pdf (a) Block Diagram of the JPEG Compression (b) Encoder
  • 3. Base paper: - http://ijcsi.org/papers/IJCSI-8-5-2-226-232.pdf (c) Decoder (d) Three Watermarks used in Project
  • 4. Base paper: - http://ijcsi.org/papers/IJCSI-8-5-2-226-232.pdf Default Parameters weighting factor alpha (recommended value ---):- 0.5 index of the coefficient - 60 embedding size (number of watermark coefficients per block) Choose 2, 4 o r 8:- 4 cropping:-0 quantization:-0 marked image in uint8:-0 normalization:-0
  • 5. Base paper: - http://ijcsi.org/papers/IJCSI-8-5-2-226-232.pdf A: - stripes
  • 6. Base paper: - http://ijcsi.org/papers/IJCSI-8-5-2-226-232.pdf SNR of real image, SNRr(dB)=12.5997
  • 7. Base paper: - http://ijcsi.org/papers/IJCSI-8-5-2-226-232.pdf BER(bits per pixel)=0.0000 BERmod(bits per pixel with error)=NaN rho=1.0000
  • 8. Base paper: - http://ijcsi.org/papers/IJCSI-8-5-2-226-232.pdf B: - NPS logo
  • 9. Base paper: - http://ijcsi.org/papers/IJCSI-8-5-2-226-232.pdf SNR of real image, SNRr(dB)=11.3263
  • 10. Base paper: - http://ijcsi.org/papers/IJCSI-8-5-2-226-232.pdf BER (bits per pixel)=0.0000 BERmod (bits per pixel with error)=NaN rho =1.0000
  • 11. Base paper: - http://ijcsi.org/papers/IJCSI-8-5-2-226-232.pdf C: - random gray scale watermark
  • 12. Base paper: - http://ijcsi.org/papers/IJCSI-8-5-2-226-232.pdf SNR of real image, SNRr(dB)=12.7750
  • 13. Base paper: - http://ijcsi.org/papers/IJCSI-8-5-2-226-232.pdf BER (bits per pixel)=0.0000 BERmod (bits per pixel with error)=NaN rho=1.0000
  • 14. Base paper: - http://ijcsi.org/papers/IJCSI-8-5-2-226-232.pdf Future Enhancement: Embedding the coefficients in a way that will take full advantage of the human visual system’s characteristics is a big goal of the watermarking community. Further research in this subject is required to investigate the possibility of incorporating our metric to the Just Noticeable Difference (JND) models that have been proposed. In addition, in this work the transparency of a watermarking algorithm is judged by the subjective decision of independent observers. The possibility of developing a formal model for the evaluation of the transparency may be investigated. However this task is not trivial. A simple correlation test between the original and the marked image would not work. This would detect any differences between the two but cannot tell if these differences occur in a visually perceptual manner. A JND model could be used as the basis for the evaluation of the transparency ([24]), but then it should not also be used in the embedding model. Otherwise the judgment would be biased and therefore unable to give dependable results.
  • 15. Base paper: - http://ijcsi.org/papers/IJCSI-8-5-2-226-232.pdf References: [1] F. A. P. Petitcolas, R. J. Anderson, M. G. Kuhn, "Information Hiding – A Survey", Proceedings of the IEEE, vol.87, no.7, pp.1062-1078, July 1999. [2] D. J. Ryan, "Infosec and Infowar, Considerations for Military Intelligence", www.danjryan.com/MIntl.html. [3] F. Hartung, M. Kutter, "Multimedia Watermarking Techniques", Proceedings of the IEEE, vol.87, no.7, pp.1079-1107, July 1999. [4] I. J. Cox, M. L. Miller, J. A. Bloom, "Digital Watermarking", Morgan Kaufmann Publishers, 2002. [5] C. P. Pfleeger, "Security in Computing", Prentice Hall PTR, 2 nd edition, 2000. [6] G. L. Friedman, "The Trustworthy Digital Camera: Restoring Credibility to the Photographic Image", IEEE Transactions on Consumer Electronics, vol.39, pp.905-910, October 1993. [7] D. Kundur, D. Hatzinakos, “Digital Watermarking for Telltale Tamper Proofing and Authentication”, Proceedings of the IEEE, vol.87, no.7, pp.1167-1180, July 1999. [8] C. I. Podilchuk, E. J. Delp, "Digital Watermarking: Algorithm and Applications", IEEE Signal Processing Magazine, pp.33-46, July 2001. [9] C. C. Langelaar, I. Setyawan, R. L. Lagendijk, "Watermarking Digital Image and Video Data", IEEE Signal Processing Magazine, pp.20-46, September 2000. [10] W. Bender, D. Gruhl, N. Morimoto, "Techniques for Data Hiding", Proceedings SPIE, vol.2420, p.40, San Jose, CA, February 1995. [11] N. Nikolaidis, I. Pitas, "Copyright Protection of Images using Robust Digital Signatures", Proceedings ICASSP '96, Atlanta, GA, May 1996. [12] C. Langelaar, J. C. A. van der Lubbe, R. L. Lagendijk, "Robust Labeling Methods for Copy Protection of Images", Proceedings in Electronic Imaging, vol.3022, pp.298-309, San Jose, CA, February 1997. [13] M. Kutter, F. Jordan, F. Bossen, "Digital Signature of Color Images using Amplitude Modulation", Proceedings in Electronic Imaging, San Jose, CA, February 1997. [14] M. Barni, C. I. Podilchuk, F. Bartolini, E. J. Delp, "Watermark Embedding: Hiding a Signal within a Cover Image", IEEE Communications Magazine, pp.102-108, August 2001. [15] M. Ramkumar, A. N. Akansu, A. A. Alatan, “On the Choice of Transforms for Data Hiding in Compressed Video”, IEEE International Conference on Acoustics, Speech, and Signal Processing 1999, Proceedings, Vol.6 , pp.3049-3052, 1999. [16] S. Kang, Y. Aoki, “Digital Image Watermarking by Fresnel Transform and its Robustness”, International Conference on Image Processing, Proceedings 1999 (ICIP 99), vol.2, pp.221-225. [17] J. J. K. O Ruanaidh, W. J. Dowling, F. M. Boland, "Phase Watermarking of Digital Images", Proceedings IEEE, International Conference of Image Processing, vol.III, pp.239-242, Lausanne, Switzerland, September 16-19, 1996. [18] A. Herrigel, H. Petersen, J. O Ruanaidh, T. Pun, P. Shelby, "Copyright Techniques for Digital Images Based on Asymmetric Cryptographic Techniques", presented at Workshop on Information Hiding, Portland, Oregon, USA, April 1998.
  • 16. Base paper: - http://ijcsi.org/papers/IJCSI-8-5-2-226-232.pdf [19] A. Herrigel, J. J. K. O Ruanaidh, H. Petersen, S. Pereira, T. Pun, "Secure Copyright Protection Techniques for Digital Images", in Information Hiding (Lecture Notes in Computer Science, vol. 1525), D. Aucsmith, Ed. Berlin, Germany: Springer, 1998, pp.169-190. [20] S. Pereira, J. J. K. O Ruanaidh, F. Deguillaume, G. Csurka, T. Pun, "Template-based Recovery of Fourier-based Watermarks using Log-polar and Log-log Maps", Proceedings IEEE in Multimedia Systems 99, International Conference in Multimedia Computing and Systems, Florence, Italy, June 7-11, 1999. [21] J. J. K. O Ruanaidh, F. M. Boland, O. Sinnen, "Watermarking Digital Images for Copyright Protection", Proceedings in Electronic Imaging and the Visual Arts 1996, Florence, Italy, February 1996. [22] I. J. Cox, J. Kilian, F. T. Leighton, T. Shamoon, “Secure Spread Spectrum Watermarking for Multimedia”, IEEE Transactions on Image Processing, vol.6, no.12, pp.1673- 1687, December 1997. [23] C. I. Podilchuk, W. Zeng, “Image-adaptive Watermarking using Visual Models”, IEEE Journal on Selected Areas in Communications, vol.16, no.4, pp.525-539, May 1998. [24] C. I. Podilchuk, W. Zeng, “Perceptual Watermarking of Still Images”, IEEE First Workshop on Multimedia Signal Processing, pp.363-368, 1997. [25] A. Piva, M. Barni, E. Bartolini, V. Cappellini, "A DCT-based Watermarking Recovering without resorting to the Uncorrupted Digital Image", Proceedings IEEE, International Conference in Image Processing, vol.1, p.520, Santa Barbara, CA, 1997. [26] M. Barni, F. Bartolini, V. Cappellini, A. Lipi, A. Piva, "A DWT-based Technique for Spatio-Frequency Masking of Digital Signatures", Proceedings SPIE/IS International Conferencein Security and Watermarking of Multimedia Contents, vol.3657, pp.31-39, San Jose, January 25-27, 1999. [27] K. Sayood, "Introduction to Data Compression", Morgan Kaufmann Publidhers, 2 nd edition, 2000. [28] J. Miano, "Compressed Image File Formats", Addison Wesley Longman, Inc, 1999.
  • 17. Base paper: - http://ijcsi.org/papers/IJCSI-8-5-2-226-232.pdf [29] K. R Castleman, "Digital Image Processing", Prentice Hall, Inc, 1996. [30] M. Ghanbari, "Video Coding: An Introduction to Standard Codecs", IEE Telecommunication Series 42, 1999. [31] C.-T. Hsu, J.-L. Wu, “Hidden Digital Watermarks in Images”, IEEE Transactions on Image Processing, vol.8, no.1, pp. 58-68, January 1999. [32] K. S. Shanmugan, A. M. Breipohl, "Random Signals: Detection Estimation and Data Analysis", John Wiley and Sons, Inc, 1988. [33] R. B Wolfgang, C. I. Podilchuk, E. J. Delp, “Perceptual Watermarks for Digital Images and Video”, Proceedings of the IEEE, vol.87, no.7, pp. 1108-1126, July 1999. [34] C. I. Podilchuk, E. J. Delp, "Digital Watermarking: Algorithm and Applications", IEEE Signal Processing Magazine, pp.33-46, July 2001. [35] Y.-P. Wang, M.-J. Chen, p.-Y. Cheng, “Robust Image Watermark With Wavelet Transform and Spread Spectrum Techniques”, Conference Record of the Thirty-Fourth Asilomar Conference on Signals, Systems and Computers, vol.2 , pp. 1846 –1850, Asilomar, 2000. [36] S. B. Wicker, "Error Control Systems for Digital Communication and Storage", Prentice-Hall Inc, 1995. [37] I. Retsas, R. Pieper, R. Cristi, “Watermark Recovery with a DCT-based Scheme Employing Nonuniform Imbedding”, 34 th Southeastern Symposium on System Theory (SSST-02), Alabama, March 18-19, 2002.