SlideShare una empresa de Scribd logo
1 de 6
Reversible Watermarking Based on Invariant Image Classification
and Dynamic Histogram Shifting
ABSTRACT:
In this paper, we propose a new reversible watermarking scheme. One first contribution is a
histogram shifting modulation which adaptively takes care of the local specificities of the image
content. By applying it to the image prediction-errors and by considering their immediate
neighborhood, the scheme we propose inserts data in textured areas where other methods fail to
do so. Furthermore, our scheme makes use of a classification process for identifying parts of the
image that can be watermarked with the most suited reversible modulation. This classification is
based on a reference image derived from the image itself, a prediction of it, which has the
property of being invariant to the watermark insertion. In that way, the watermark embedder
and extractor remain synchronized for message extraction and image reconstruction. The
experiments conducted so far, on some natural images and on medical images from different
modalities, show that for capacities smaller than 0.4 bpp, our method can insert more data with
lower distortion than any existing schemes. For the same capacity, we achieve a peak signal-to-
noise ratio (PSNR) of about 1–2 dB greater than with the scheme of Hwang et al., the most
efficient approach actually.
EXISTING SYSTEM:
GLOBALSOFT TECHNOLOGIES
IEEE PROJECTS & SOFTWARE DEVELOPMENTS
IEEE FINAL YEAR PROJECTS|IEEE ENGINEERING PROJECTS|IEEE STUDENTS PROJECTS|IEEE
BULK PROJECTS|BE/BTECH/ME/MTECH/MS/MCA PROJECTS|CSE/IT/ECE/EEE PROJECTS
CELL: +91 98495 39085, +91 99662 35788, +91 98495 57908, +91 97014 40401
Visit: www.finalyearprojects.org Mail to:ieeefinalsemprojects@gmail.com
The introduction of the concept of reversible watermarking in the Barton patent, several
methods have been proposed. Among these solutions, most recent schemes use Expansion
Embedding (EE) modulation, Histogram Shifting (HS) modulation or, more recently, their
combination. One of the main concerns with these modulations is to avoid underflows and
overflows. Indeed, with the addition of a watermark signal to the image, caution must be taken
to avoid gray level value underflows (negative) and overflows (greater than for a bit depth
image) in the watermarked image while minimizing at the same time image distortion.
Basically, EE modulation introduced by Thodiet al. is a generalization of Difference Expansion
modulation proposed by Tianet al.which expands the difference between two adjacent pixels by
shifting to the left its binary representation, thus creating a new virtual least significant bit
(LSB) that can be used for data insertion. Since then, EE has been applied in some transformed
domains such as the wavelet domain or to prediction-errors.EE is usually associated with LSB
substitution applied to “samples” that cannot be expanded due to the signal dynamic limits or in
order to preserve the image quality. In, Ni et al.introduced the well-known Histogram Shifting
(HS) modulation. HS adds gray values to some pixels in order to shift a range of classes of the
image histogram and to create a ’gap’ near the histogram maxima. Pixels which belong to the
class of the histogram maxima (“Carrier-class”) are then shifted to the gap or kept unchanged to
encode one bit of the message ’0’ or ’1’. Other pixels (the “noncarriers”) are simply shifted.
Instead of working in the spatial domain, several schemes apply HS to some transformed
coefficients or pixel prediction-errors, histograms of which are most of the time concentrated
around one single class maxima located on zero. This maximizes HS capacity and also
simplifies the reidentification of the histogram classes of maximum cardinality at the extraction
stage. In order to reduce the distortion while preserving the capacity, some preprocessing has
been suggested in order to identify pixels, transformed coefficients or prediction-errors that do
not belong to the histogram maxima classes (“noncarrier classes”). As we will see later,
different schemes working with prediction-errors do not watermark pixels within a
neighborhood of high variance; indeed, these pixels belong to histogram classes that are shifted
without message embedding. Recently, Hwanget al. improved the approach of Sachnevet al..
They suggest defining the set of carrier-classes as the classes which minimize, for a given
capacity, image distortion. However, their set of carrier-classes is uniquely defined for the
whole image and the execution time of this approach is rather high.
DISADVANTAGES OF EXISTING SYSTEM:
The modulation is overflow and underflow.
The image distortions are more.
PROPOSED SYSTEM:
We propose to adapt dynamically the carrier-classes by considering the local specificities of the
image. We simply suggest using the local neighborhood of each prediction-error in order to
determine the most adapted carrier-class for message insertion. Another refinement we propose
is based on the selection of the most locally adapted lossless modulation. Indeed, reversible
modulations are more or less efficient depending on image content. This is especially the case
for medical images where large black areas exist (i.e., the background area). In these regions,
directly applying HS on pixels may be more efficient and of smaller complexity than applying it
on prediction-errors. Because, the histogram maxima corresponds to the null gray value;
capacity is maximized and underflows simply avoided by shifting pixel value to the right, i.e.
by adding a positive gray value. When working on prediction-errors in these regions, the
management of overflows/underflows is more difficult because the shift amplitude can be
positive or negative. This is why we suggest considering the local content of the image in order
to select the most locally adapted lossless modulation. This should allow us to optimize the
compromise capacity/image distortion.
ADVANTAGES OF PROPOSED SYSTEM:
Directly applying HS on pixels may be more efficient and of smaller complexity than
applying it on prediction-errors.
The watermark embedder and extractor remain synchronized because the extractor will
retrieve the same reference image. Herein, we adapt this process to select the most locally
appropriate watermarking modulation.
SYSTEM CONFIGURATION:-
HARDWARE REQUIREMENTS:-
 Processor - Pentium –IV
 Speed - 1.1 Ghz
 RAM - 256 MB(min)
 Hard Disk - 20 GB
 Key Board - Standard Windows Keyboard
 Mouse - Two or Three Button Mouse
 Monitor - SVGA
SOFTWARE REQUIREMENTS:
• Operating system : - Windows XP.
• Coding Language : C#.Net
REFERENCE:
Gouenou Coatrieux, Member, IEEE, Wei Pan, Nora Cuppens-Boulahia, Member, IEEE,
Frédéric Cuppens, Member, IEEE, and Christian Roux, Fellow, IEEE “Reversible
Watermarking Based on Invariant Image Classification and Dynamic Histogram Shifting” -
IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, VOL. 8,
NO. 1, JANUARY 2013.
CLOUING
DOMAIN: WIRELESS NETWORK PROJECTS

Más contenido relacionado

La actualidad más candente

Ibica2014(p15)image fusion based on broveywavelet
Ibica2014(p15)image fusion based on broveywaveletIbica2014(p15)image fusion based on broveywavelet
Ibica2014(p15)image fusion based on broveywavelet
Aboul Ella Hassanien
 
Comparison of image fusion methods
Comparison of image fusion methodsComparison of image fusion methods
Comparison of image fusion methods
Amr Nasr
 
IMAGE FUSION IN IMAGE PROCESSING
IMAGE FUSION IN IMAGE PROCESSINGIMAGE FUSION IN IMAGE PROCESSING
IMAGE FUSION IN IMAGE PROCESSING
garima0690
 
Wavelet based image fusion
Wavelet based image fusionWavelet based image fusion
Wavelet based image fusion
Umed Paliwal
 
Comparative study on image fusion methods in spatial domain
Comparative study on image fusion methods in spatial domainComparative study on image fusion methods in spatial domain
Comparative study on image fusion methods in spatial domain
IAEME Publication
 

La actualidad más candente (20)

Ibica2014(p15)image fusion based on broveywavelet
Ibica2014(p15)image fusion based on broveywaveletIbica2014(p15)image fusion based on broveywavelet
Ibica2014(p15)image fusion based on broveywavelet
 
Comparison of image fusion methods
Comparison of image fusion methodsComparison of image fusion methods
Comparison of image fusion methods
 
Imagefusfinalppt 140413102757-phpapp02
Imagefusfinalppt 140413102757-phpapp02Imagefusfinalppt 140413102757-phpapp02
Imagefusfinalppt 140413102757-phpapp02
 
A fast single image haze removal algorithm using color attenuation prior
A fast single image haze removal algorithm using color attenuation priorA fast single image haze removal algorithm using color attenuation prior
A fast single image haze removal algorithm using color attenuation prior
 
IMAGE FUSION IN IMAGE PROCESSING
IMAGE FUSION IN IMAGE PROCESSINGIMAGE FUSION IN IMAGE PROCESSING
IMAGE FUSION IN IMAGE PROCESSING
 
Wavelet based image fusion
Wavelet based image fusionWavelet based image fusion
Wavelet based image fusion
 
Multi-hypothesis projection-based shift estimation for sweeping panorama reco...
Multi-hypothesis projection-based shift estimation for sweeping panorama reco...Multi-hypothesis projection-based shift estimation for sweeping panorama reco...
Multi-hypothesis projection-based shift estimation for sweeping panorama reco...
 
B0141020
B0141020B0141020
B0141020
 
Image reconstruction in nuclear medicine
Image reconstruction in nuclear medicineImage reconstruction in nuclear medicine
Image reconstruction in nuclear medicine
 
Ijetr021211
Ijetr021211Ijetr021211
Ijetr021211
 
Survey on Haze Removal Techniques
Survey on Haze Removal TechniquesSurvey on Haze Removal Techniques
Survey on Haze Removal Techniques
 
Improved single image dehazing by fusion
Improved single image dehazing by fusionImproved single image dehazing by fusion
Improved single image dehazing by fusion
 
G143741
G143741G143741
G143741
 
Basics of dip
Basics of dipBasics of dip
Basics of dip
 
Adaptive Thresholding Using Quadratic Cost Functions
Adaptive Thresholding Using Quadratic Cost FunctionsAdaptive Thresholding Using Quadratic Cost Functions
Adaptive Thresholding Using Quadratic Cost Functions
 
Remote Sensing IEEE 2015 Projects
Remote Sensing IEEE 2015 ProjectsRemote Sensing IEEE 2015 Projects
Remote Sensing IEEE 2015 Projects
 
Different Image Fusion Techniques –A Critical Review
Different Image Fusion Techniques –A Critical ReviewDifferent Image Fusion Techniques –A Critical Review
Different Image Fusion Techniques –A Critical Review
 
Video Stitching using Improved RANSAC and SIFT
Video Stitching using Improved RANSAC and SIFTVideo Stitching using Improved RANSAC and SIFT
Video Stitching using Improved RANSAC and SIFT
 
A New Approach of Medical Image Fusion using Discrete Wavelet Transform
A New Approach of Medical Image Fusion using Discrete Wavelet TransformA New Approach of Medical Image Fusion using Discrete Wavelet Transform
A New Approach of Medical Image Fusion using Discrete Wavelet Transform
 
Comparative study on image fusion methods in spatial domain
Comparative study on image fusion methods in spatial domainComparative study on image fusion methods in spatial domain
Comparative study on image fusion methods in spatial domain
 

Destacado (9)

Beaconsoft
BeaconsoftBeaconsoft
Beaconsoft
 
Concept
ConceptConcept
Concept
 
JAVA 2013 IEEE DATAMINING PROJECT Comparable entity mining from comparative q...
JAVA 2013 IEEE DATAMINING PROJECT Comparable entity mining from comparative q...JAVA 2013 IEEE DATAMINING PROJECT Comparable entity mining from comparative q...
JAVA 2013 IEEE DATAMINING PROJECT Comparable entity mining from comparative q...
 
Comparable entity mining from comparative questions
Comparable entity mining from comparative questionsComparable entity mining from comparative questions
Comparable entity mining from comparative questions
 
Star schema
Star schemaStar schema
Star schema
 
Project book on WINDS OF CHANGE:FROM VENDOR LOCK-IN TO THE META CLOUD
Project book on WINDS OF CHANGE:FROM VENDOR LOCK-IN TO THE META CLOUDProject book on WINDS OF CHANGE:FROM VENDOR LOCK-IN TO THE META CLOUD
Project book on WINDS OF CHANGE:FROM VENDOR LOCK-IN TO THE META CLOUD
 
Project report of OCR Recognition
Project report of OCR RecognitionProject report of OCR Recognition
Project report of OCR Recognition
 
PowerPoint Template
PowerPoint TemplatePowerPoint Template
PowerPoint Template
 
Hand Written Character Recognition Using Neural Networks
Hand Written Character Recognition Using Neural Networks Hand Written Character Recognition Using Neural Networks
Hand Written Character Recognition Using Neural Networks
 

Similar a Reversible watermarking based on invariant image classification and dynamic histogram shifting

Reversible watermarking based on invariant image classification and dynamic h...
Reversible watermarking based on invariant image classification and dynamic h...Reversible watermarking based on invariant image classification and dynamic h...
Reversible watermarking based on invariant image classification and dynamic h...
Ecway Technologies
 
Matlab reversible watermarking based on invariant image classification and d...
Matlab  reversible watermarking based on invariant image classification and d...Matlab  reversible watermarking based on invariant image classification and d...
Matlab reversible watermarking based on invariant image classification and d...
Ecway Technologies
 
Ijarcet vol-2-issue-7-2273-2276
Ijarcet vol-2-issue-7-2273-2276Ijarcet vol-2-issue-7-2273-2276
Ijarcet vol-2-issue-7-2273-2276
Editor IJARCET
 
Ijarcet vol-2-issue-7-2273-2276
Ijarcet vol-2-issue-7-2273-2276Ijarcet vol-2-issue-7-2273-2276
Ijarcet vol-2-issue-7-2273-2276
Editor IJARCET
 
Joint, Image-Adaptive Compression and Watermarking by GABased Wavelet Localiz...
Joint, Image-Adaptive Compression and Watermarking by GABased Wavelet Localiz...Joint, Image-Adaptive Compression and Watermarking by GABased Wavelet Localiz...
Joint, Image-Adaptive Compression and Watermarking by GABased Wavelet Localiz...
CSCJournals
 

Similar a Reversible watermarking based on invariant image classification and dynamic histogram shifting (20)

Reversible watermarking based on invariant image classification and dynamic h...
Reversible watermarking based on invariant image classification and dynamic h...Reversible watermarking based on invariant image classification and dynamic h...
Reversible watermarking based on invariant image classification and dynamic h...
 
Matlab reversible watermarking based on invariant image classification and d...
Matlab  reversible watermarking based on invariant image classification and d...Matlab  reversible watermarking based on invariant image classification and d...
Matlab reversible watermarking based on invariant image classification and d...
 
U4408108113
U4408108113U4408108113
U4408108113
 
Ijarcet vol-2-issue-7-2273-2276
Ijarcet vol-2-issue-7-2273-2276Ijarcet vol-2-issue-7-2273-2276
Ijarcet vol-2-issue-7-2273-2276
 
Ijarcet vol-2-issue-7-2273-2276
Ijarcet vol-2-issue-7-2273-2276Ijarcet vol-2-issue-7-2273-2276
Ijarcet vol-2-issue-7-2273-2276
 
Matlab abstract 2016
Matlab abstract 2016Matlab abstract 2016
Matlab abstract 2016
 
Remote Sensing IEEE 2015 Projects
Remote Sensing IEEE 2015 ProjectsRemote Sensing IEEE 2015 Projects
Remote Sensing IEEE 2015 Projects
 
Ijetr021211
Ijetr021211Ijetr021211
Ijetr021211
 
Noise reduction based on partial reference, dual-tree complex wavelet transfo...
Noise reduction based on partial reference, dual-tree complex wavelet transfo...Noise reduction based on partial reference, dual-tree complex wavelet transfo...
Noise reduction based on partial reference, dual-tree complex wavelet transfo...
 
robio-2014-falquez
robio-2014-falquezrobio-2014-falquez
robio-2014-falquez
 
EVP Plus Software delivers state-of-the-art image processing for CR and DR sy...
EVP Plus Software delivers state-of-the-art image processing for CR and DR sy...EVP Plus Software delivers state-of-the-art image processing for CR and DR sy...
EVP Plus Software delivers state-of-the-art image processing for CR and DR sy...
 
Presentation of Lossy compression
Presentation of Lossy compressionPresentation of Lossy compression
Presentation of Lossy compression
 
Modified clahe an adaptive algorithm for contrast enhancement of aerial medi...
Modified clahe an adaptive algorithm for contrast enhancement of aerial  medi...Modified clahe an adaptive algorithm for contrast enhancement of aerial  medi...
Modified clahe an adaptive algorithm for contrast enhancement of aerial medi...
 
Joint, Image-Adaptive Compression and Watermarking by GABased Wavelet Localiz...
Joint, Image-Adaptive Compression and Watermarking by GABased Wavelet Localiz...Joint, Image-Adaptive Compression and Watermarking by GABased Wavelet Localiz...
Joint, Image-Adaptive Compression and Watermarking by GABased Wavelet Localiz...
 
X-Ray Image Enhancement using CLAHE Method
X-Ray Image Enhancement using CLAHE MethodX-Ray Image Enhancement using CLAHE Method
X-Ray Image Enhancement using CLAHE Method
 
HUMAN VISION THRESHOLDING WITH ENHANCEMENT FOR DARK BLURRED IMAGES FOR LOCAL ...
HUMAN VISION THRESHOLDING WITH ENHANCEMENT FOR DARK BLURRED IMAGES FOR LOCAL ...HUMAN VISION THRESHOLDING WITH ENHANCEMENT FOR DARK BLURRED IMAGES FOR LOCAL ...
HUMAN VISION THRESHOLDING WITH ENHANCEMENT FOR DARK BLURRED IMAGES FOR LOCAL ...
 
ICSE03
ICSE03ICSE03
ICSE03
 
MTP paper
MTP paperMTP paper
MTP paper
 
2007 asprs
2007 asprs2007 asprs
2007 asprs
 
Improvement of Image Deblurring Through Different Methods
Improvement of Image Deblurring Through Different MethodsImprovement of Image Deblurring Through Different Methods
Improvement of Image Deblurring Through Different Methods
 

Más de IEEEFINALYEARPROJECTS

Más de IEEEFINALYEARPROJECTS (20)

Scalable face image retrieval using attribute enhanced sparse codewords
Scalable face image retrieval using attribute enhanced sparse codewordsScalable face image retrieval using attribute enhanced sparse codewords
Scalable face image retrieval using attribute enhanced sparse codewords
 
Scalable face image retrieval using attribute enhanced sparse codewords
Scalable face image retrieval using attribute enhanced sparse codewordsScalable face image retrieval using attribute enhanced sparse codewords
Scalable face image retrieval using attribute enhanced sparse codewords
 
Reversible data hiding with optimal value transfer
Reversible data hiding with optimal value transferReversible data hiding with optimal value transfer
Reversible data hiding with optimal value transfer
 
Query adaptive image search with hash codes
Query adaptive image search with hash codesQuery adaptive image search with hash codes
Query adaptive image search with hash codes
 
Noise reduction based on partial reference, dual-tree complex wavelet transfo...
Noise reduction based on partial reference, dual-tree complex wavelet transfo...Noise reduction based on partial reference, dual-tree complex wavelet transfo...
Noise reduction based on partial reference, dual-tree complex wavelet transfo...
 
Local directional number pattern for face analysis face and expression recogn...
Local directional number pattern for face analysis face and expression recogn...Local directional number pattern for face analysis face and expression recogn...
Local directional number pattern for face analysis face and expression recogn...
 
An access point based fec mechanism for video transmission over wireless la ns
An access point based fec mechanism for video transmission over wireless la nsAn access point based fec mechanism for video transmission over wireless la ns
An access point based fec mechanism for video transmission over wireless la ns
 
Towards differential query services in cost efficient clouds
Towards differential query services in cost efficient cloudsTowards differential query services in cost efficient clouds
Towards differential query services in cost efficient clouds
 
Spoc a secure and privacy preserving opportunistic computing framework for mo...
Spoc a secure and privacy preserving opportunistic computing framework for mo...Spoc a secure and privacy preserving opportunistic computing framework for mo...
Spoc a secure and privacy preserving opportunistic computing framework for mo...
 
Secure and efficient data transmission for cluster based wireless sensor netw...
Secure and efficient data transmission for cluster based wireless sensor netw...Secure and efficient data transmission for cluster based wireless sensor netw...
Secure and efficient data transmission for cluster based wireless sensor netw...
 
Privacy preserving back propagation neural network learning over arbitrarily ...
Privacy preserving back propagation neural network learning over arbitrarily ...Privacy preserving back propagation neural network learning over arbitrarily ...
Privacy preserving back propagation neural network learning over arbitrarily ...
 
Non cooperative location privacy
Non cooperative location privacyNon cooperative location privacy
Non cooperative location privacy
 
Harnessing the cloud for securely outsourcing large
Harnessing the cloud for securely outsourcing largeHarnessing the cloud for securely outsourcing large
Harnessing the cloud for securely outsourcing large
 
Geo community-based broadcasting for data dissemination in mobile social netw...
Geo community-based broadcasting for data dissemination in mobile social netw...Geo community-based broadcasting for data dissemination in mobile social netw...
Geo community-based broadcasting for data dissemination in mobile social netw...
 
Enabling data dynamic and indirect mutual trust for cloud computing storage s...
Enabling data dynamic and indirect mutual trust for cloud computing storage s...Enabling data dynamic and indirect mutual trust for cloud computing storage s...
Enabling data dynamic and indirect mutual trust for cloud computing storage s...
 
Dynamic resource allocation using virtual machines for cloud computing enviro...
Dynamic resource allocation using virtual machines for cloud computing enviro...Dynamic resource allocation using virtual machines for cloud computing enviro...
Dynamic resource allocation using virtual machines for cloud computing enviro...
 
A secure protocol for spontaneous wireless ad hoc networks creation
A secure protocol for spontaneous wireless ad hoc networks creationA secure protocol for spontaneous wireless ad hoc networks creation
A secure protocol for spontaneous wireless ad hoc networks creation
 
Utility privacy tradeoff in databases an information-theoretic approach
Utility privacy tradeoff in databases an information-theoretic approachUtility privacy tradeoff in databases an information-theoretic approach
Utility privacy tradeoff in databases an information-theoretic approach
 
Two tales of privacy in online social networks
Two tales of privacy in online social networksTwo tales of privacy in online social networks
Two tales of privacy in online social networks
 
Spatial approximate string search
Spatial approximate string searchSpatial approximate string search
Spatial approximate string search
 

Último

Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Safe Software
 
Why Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire businessWhy Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire business
panagenda
 

Último (20)

Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)
 
Artificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : UncertaintyArtificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : Uncertainty
 
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin WoodPolkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
 
presentation ICT roal in 21st century education
presentation ICT roal in 21st century educationpresentation ICT roal in 21st century education
presentation ICT roal in 21st century education
 
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUnderstanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
 
HTML Injection Attacks: Impact and Mitigation Strategies
HTML Injection Attacks: Impact and Mitigation StrategiesHTML Injection Attacks: Impact and Mitigation Strategies
HTML Injection Attacks: Impact and Mitigation Strategies
 
Top 5 Benefits OF Using Muvi Live Paywall For Live Streams
Top 5 Benefits OF Using Muvi Live Paywall For Live StreamsTop 5 Benefits OF Using Muvi Live Paywall For Live Streams
Top 5 Benefits OF Using Muvi Live Paywall For Live Streams
 
Strategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherStrategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a Fresher
 
Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024
 
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
 
Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
 
Why Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire businessWhy Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire business
 
Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivity
 
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
 

Reversible watermarking based on invariant image classification and dynamic histogram shifting

  • 1. Reversible Watermarking Based on Invariant Image Classification and Dynamic Histogram Shifting ABSTRACT: In this paper, we propose a new reversible watermarking scheme. One first contribution is a histogram shifting modulation which adaptively takes care of the local specificities of the image content. By applying it to the image prediction-errors and by considering their immediate neighborhood, the scheme we propose inserts data in textured areas where other methods fail to do so. Furthermore, our scheme makes use of a classification process for identifying parts of the image that can be watermarked with the most suited reversible modulation. This classification is based on a reference image derived from the image itself, a prediction of it, which has the property of being invariant to the watermark insertion. In that way, the watermark embedder and extractor remain synchronized for message extraction and image reconstruction. The experiments conducted so far, on some natural images and on medical images from different modalities, show that for capacities smaller than 0.4 bpp, our method can insert more data with lower distortion than any existing schemes. For the same capacity, we achieve a peak signal-to- noise ratio (PSNR) of about 1–2 dB greater than with the scheme of Hwang et al., the most efficient approach actually. EXISTING SYSTEM: GLOBALSOFT TECHNOLOGIES IEEE PROJECTS & SOFTWARE DEVELOPMENTS IEEE FINAL YEAR PROJECTS|IEEE ENGINEERING PROJECTS|IEEE STUDENTS PROJECTS|IEEE BULK PROJECTS|BE/BTECH/ME/MTECH/MS/MCA PROJECTS|CSE/IT/ECE/EEE PROJECTS CELL: +91 98495 39085, +91 99662 35788, +91 98495 57908, +91 97014 40401 Visit: www.finalyearprojects.org Mail to:ieeefinalsemprojects@gmail.com
  • 2. The introduction of the concept of reversible watermarking in the Barton patent, several methods have been proposed. Among these solutions, most recent schemes use Expansion Embedding (EE) modulation, Histogram Shifting (HS) modulation or, more recently, their combination. One of the main concerns with these modulations is to avoid underflows and overflows. Indeed, with the addition of a watermark signal to the image, caution must be taken to avoid gray level value underflows (negative) and overflows (greater than for a bit depth image) in the watermarked image while minimizing at the same time image distortion. Basically, EE modulation introduced by Thodiet al. is a generalization of Difference Expansion modulation proposed by Tianet al.which expands the difference between two adjacent pixels by shifting to the left its binary representation, thus creating a new virtual least significant bit (LSB) that can be used for data insertion. Since then, EE has been applied in some transformed domains such as the wavelet domain or to prediction-errors.EE is usually associated with LSB substitution applied to “samples” that cannot be expanded due to the signal dynamic limits or in order to preserve the image quality. In, Ni et al.introduced the well-known Histogram Shifting (HS) modulation. HS adds gray values to some pixels in order to shift a range of classes of the image histogram and to create a ’gap’ near the histogram maxima. Pixels which belong to the class of the histogram maxima (“Carrier-class”) are then shifted to the gap or kept unchanged to encode one bit of the message ’0’ or ’1’. Other pixels (the “noncarriers”) are simply shifted. Instead of working in the spatial domain, several schemes apply HS to some transformed coefficients or pixel prediction-errors, histograms of which are most of the time concentrated around one single class maxima located on zero. This maximizes HS capacity and also simplifies the reidentification of the histogram classes of maximum cardinality at the extraction stage. In order to reduce the distortion while preserving the capacity, some preprocessing has been suggested in order to identify pixels, transformed coefficients or prediction-errors that do not belong to the histogram maxima classes (“noncarrier classes”). As we will see later, different schemes working with prediction-errors do not watermark pixels within a neighborhood of high variance; indeed, these pixels belong to histogram classes that are shifted without message embedding. Recently, Hwanget al. improved the approach of Sachnevet al.. They suggest defining the set of carrier-classes as the classes which minimize, for a given
  • 3. capacity, image distortion. However, their set of carrier-classes is uniquely defined for the whole image and the execution time of this approach is rather high. DISADVANTAGES OF EXISTING SYSTEM: The modulation is overflow and underflow. The image distortions are more. PROPOSED SYSTEM: We propose to adapt dynamically the carrier-classes by considering the local specificities of the image. We simply suggest using the local neighborhood of each prediction-error in order to determine the most adapted carrier-class for message insertion. Another refinement we propose is based on the selection of the most locally adapted lossless modulation. Indeed, reversible modulations are more or less efficient depending on image content. This is especially the case for medical images where large black areas exist (i.e., the background area). In these regions, directly applying HS on pixels may be more efficient and of smaller complexity than applying it on prediction-errors. Because, the histogram maxima corresponds to the null gray value; capacity is maximized and underflows simply avoided by shifting pixel value to the right, i.e. by adding a positive gray value. When working on prediction-errors in these regions, the management of overflows/underflows is more difficult because the shift amplitude can be positive or negative. This is why we suggest considering the local content of the image in order to select the most locally adapted lossless modulation. This should allow us to optimize the compromise capacity/image distortion. ADVANTAGES OF PROPOSED SYSTEM: Directly applying HS on pixels may be more efficient and of smaller complexity than applying it on prediction-errors.
  • 4. The watermark embedder and extractor remain synchronized because the extractor will retrieve the same reference image. Herein, we adapt this process to select the most locally appropriate watermarking modulation. SYSTEM CONFIGURATION:- HARDWARE REQUIREMENTS:-  Processor - Pentium –IV  Speed - 1.1 Ghz  RAM - 256 MB(min)  Hard Disk - 20 GB  Key Board - Standard Windows Keyboard  Mouse - Two or Three Button Mouse  Monitor - SVGA SOFTWARE REQUIREMENTS: • Operating system : - Windows XP. • Coding Language : C#.Net REFERENCE:
  • 5. Gouenou Coatrieux, Member, IEEE, Wei Pan, Nora Cuppens-Boulahia, Member, IEEE, Frédéric Cuppens, Member, IEEE, and Christian Roux, Fellow, IEEE “Reversible Watermarking Based on Invariant Image Classification and Dynamic Histogram Shifting” - IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, VOL. 8, NO. 1, JANUARY 2013.