SlideShare una empresa de Scribd logo
1 de 5
Descargar para leer sin conexión
ACEEE International Journal on Signal and Image Processing Vol 1, No. 1, Jan 2010




    An improved Spread Spectrum Watermarking
   technique to withstand Geometric Deformations
                             A. Sangeetha 1 ,K.Anusudha 2 ,B.Gomathy 3 and K.Surya Tej 4
                                                 1
                                                   asangeetha@vit.ac.in1
                                                 2
                                                   Kanusudha@vit.ac.in2
                                             3
                                               gomathy_tc16@yahoo.co.in3
                                             4
                                               kunchesuryatej@gmail.com4
                                              School of Electrical Sciences
                                               VIT University, Vellore-14

Abstract—Here, we propose a new method for the                     modulated spread spectrum with frequency spectrum,
watermarking to withstand the geometric attacks, which             centered at the carrier frequency. The information is
may occur during the transmission of the watermarked               demodulated at the receiving end by multiplying the
image. The underlying system is based on Direct Sequence           signal by a locally generated version of the pseudo-
Code Division Multiple Access (DS-CDMA). The algorithm
for the normalization has been formulated for use in black
                                                                   random code sequence. This process, known as "de-
and white images. The watermark is spread across the               spreading", mathematically constitutes a correlation of
carrier image by using the pseudo-random noise sequences           the transmitted PN sequence with the PN sequence that
of optimal period and retrieval is made by the use of              the receiver believes the transmitter is using.
correlation. Private Key technique is used so the
transmission is very secure. Matlab was used to implement
                                                                              IV.   WATERMARKING METHODOLOGY
the algorithm discussed here.

                     I.   INTRODUCTION                             The original image is taken and converted into gray
  Geometric deformations include rotation, scaling,                scale if required. Normalization procedure is applied to
translation, shearing, random bending, and change of               the original image. A PN sequence is generated using a
aspect ratio (e.g., [1]–[3]). It is well known that a small        key element, which is confidential to the organization
amount of rotation and/or scaling can dramatically                 alone. Create a two-dimensional (2-D) watermark with
disable the receiver from detecting the watermark [4].A            the same size as the normalized image. Binary pseudo-
watermark is robust if it cannot be impaired without also          random sequences pi, i=1,2,3…. M is generated, as
rendering the attacked data useless. Watermark                     signature patterns using the private key as seed, where
impairment can be measured by criteria such as miss                M is the number of bits in the watermark message.
probability, probability of bit error, or channel capacity.        Then the last two digits of the sequence will be XORed
Hence, robustness can be evaluated by simultaneously               and the value will be shifted once this process will
considering watermark impairment and the distortion of             continue till code of length equal to the length of the
the attacked data. The key idea of this watermarking               cover image is generated. A 1-D DS-CDMA
scheme is to use a normalized image for both watermark             watermark signature by modulating the watermark
embedding and detection.                                           message with the patterns generated in previous steps
                                                                   is created.
                                                                    Message is embedded to the normalized image.
   II. WATERMARKING USING CDMA TECHNIQUES                          Desired watermarking strength is used before
  The CDMA technique is a spread spectrum technique                addition.A mask image is created, which is a binary
that spreads the transmitted signal over a wide                    image of the same size as the normalized image. This
frequency band, which is much wider than the actual                image has 1s within the support of the normalized
minimum bandwidth required. This technique ensures                 image and 0s elsewhere. Using the mask image the
the survival of watermark under various attacks due to             boundary is masked of if it is excess than the cover
redundancy.                                                        image.Inverse normalization is done to this watermark
                                                                   embedded image. This is the watermarked image and
        III.   DIRECT SEQUENCE SPREAD SPECTRUM                     this is transmitted.
  In this form of modulation, a pseudo-random noise                In the receiver side the image is normalized. Using the
 generator creates a high-speed pseudo-noise code                  same key PN sequence is again generated. Correlation
 sequence (sequence of 1 and −1 values). Direct-                   is performed between the watermarked image and the
 sequence spread-spectrum transmissions multiply the               PN sequence. Mean of the correlation values are taken
 data being transmitted by this "noise" signal; thus, it           and a threshold is fixed. Message is decoded using this
 directly sets the transmitted radio frequency (RF)                threshold.
 bandwidth. The result of modulating an RF carrier with
 such a code sequence is to produce a direct-sequence-

                                                              32
 © 2010 ACEEE
 DOI: 01.ijsip.01.01.07
ACEEE International Journal on Signal and Image Processing Vol 1, No. 1, Jan 2010


                 V.    IMPLEMENTATION                             So that the resulting image, denoted by, f 3(x, y) = Ay
                                                                 [f 2(x, y)]. γ Can be calculated using the formula,
 The parameters by which the image is normalized are
estimated from the geometric moments of the image
[4].                                                             By putting μ11(3) =0 we get

A. Image Moments and Affine Transforms

Let f (x, y) denote a digital image of size M x N. Its
geometric moments mpq and μpq central moments, p, q
= 0, 1, 2, 3… are defined, respectively as                           Scale f 4(x, y) in both x and y directions with
                                                                 As = α 0 so that the resulting image denoted by,
                                                                       0 β
 And
                                                                   f 4(x,y) = As[f 3(x,y)] achieves
                                                                      1) A prescribed standard size.
                                                                      2) μ50(4)>0 and μ05(4)>0.
 Where                                                           Where, α= Standard image size/number of columns in
                                                                 y-sheared image.
                                                                          β=Standard image size/number of rows in y-
An image g (x,y) is said to be an affine transform of                 sheared image.
f(x,y) if there is a matrix A= a11 a21                           The final image f4 (x, y) is the normalized image.
                         a12 a22
and the vector        d = d1 such that f(x,y)=g(x,y),
                            d2
where



B.Normalization procedure

The four steps of normalization are:
  Center the image f (x,y); this is achieved by setting
the matrix A=      0 1 and the
       1 0

Vector with d=    d1           with,
                  d2




     Let f 1(x, y) denotes the resulting centered image.
  Apply a shearing transform to f 1(x, y) in the x
direction with matrix Ax = 1 β
                    0 1
So          that        the        resulting        image                          Figure 1. Block diagram
denoted by, f 2(x,y) = Ax[f1(x,y)].β can be calculated
using the formula,                                               C.Embedding
                                                                   The addition of the PN sequences to the cover image
In particular, we may have the following two                     is done according to the equation:
scenarios:                                                                    Iw (x, y) = I (x, y) + k × W (x, y)
    1) One of the three roots is real and the other two          This is shown in figure given bellow
         are complex, we select the real root                    Where, Iw (x, y) denotes the watermarked image.
    2) All three roots are real, then we pick the                        I (x, y) denote the actual cover image.
         median of the three real roots.                         W (x, y) denotes a pseudorandom noise pattern that is
                                                                 added to the image.
  Apply a shearing transform to f 2(x, y) in the y               K denotes the gain factor.
  direction with matrix Ay = 1 0
                             γ 1

                                                            33
© 2010 ACEEE
DOI: 01.ijsip.01.01.07
ACEEE International Journal on Signal and Image Processing Vol 1, No. 1, Jan 2010




               Figure 2(a) Embedding process step-1



                                                                    Figure 5(a) watermark message    Figure 5(b) watermarked image

                                                                     This image is masked to remove borders in watermark
                                                                     message if greater than normalized image. To the
                                                                     normalized and masked image inverse normalization is
              Figure 2(b) Embedding process step-2
                                                                     done. Inverse normalization involves the steps, which
                                                                     is simply the inverse of the steps involved in
 D.Extraction                                                        normalization.
 The multiplier output C of figure.3 is given by
 C = Iw (x, y) × b (x, y)
    = (a(x,y) × b(x,y) + I(x,y)) × b(x,y)
   = a(x,y) × b^2(x,y) + I(x,y) × b(x,y)




                                                                     Figure 6(a) masked image       Figure 6(b) image to be transmitted

                         Figure.3 extraction process
                                                                     Receiver side results for a watermarking strength K= 2
 The watermark image a (x, y) is multiplied twice with
 the noise signal b (x, y) which becomes 1 whereas the
 unwanted or the cover image I (x, y) is multiplied only
 once with the noise signal that can be filtered out
 during the process of correlation by setting the
                                                                                                         Recovered Watermark
 threshold as mean of correlation.




                VI.     RESULT ANALYSIS
                                                                     Figure 7(a) received image         Figure 7((b)recoverd watermark
 The first step is normalization.
                                                                     This difference image below shows that the technique
                                                                     ensures high degree of fidelity. As the gain is increased
                                                                     from 2 to 4, the recovery of the watermark improves,
                                                                     but at the cost of distorting the watermarked image.




Figure 4(a) original image   Figure 4(b) normalized image

Then the watermark is embedded.
                                                                                         Figure 8. Difference image




                                                               34
 © 2010 ACEEE
 DOI: 01.ijsip.01.01.07
ACEEE International Journal on Signal and Image Processing Vol 1, No. 1, Jan 2010


                              VII.      ATTACKS                                  A .BER after Geometric Distortion
   TABLE I. Comparison between Watermark Recovery with and                        ∗ Flipping
                    without Normalization                                                          TABLE II. BER for flipping
                                                                                              Flipping                        BER
  Type of attack        With normalization                    Without
                                                            Normalization
                                                                                        Horizontal / Vertical                     0.0443

  Line & column
     Removal
                                                                                  ∗ Scaling
                                                                                                         TABLE III. BER for scaling


      Scaling
                                                                                              Scaling                       BER
                                                                                               0.75                            0.0461
                                                                                                0.5                            0.0461
   Aspect ratio                                                                                 1.1                            0.0461
    Change                                                                                      1.5                            0.0425


                                                                                  ∗ Aspect ratio change
     Shearing
                                                                                                TABLE IV. BER for change of aspect ratio.

                                                                                          Aspect Ratio                             BER
   Affine                                                                                    (1, 0.8)                             0.0490
Transformation                                                                               (1, 0.9)                             0.0437
                                                                                             (1, 1.1)                             0.0437
    Horizontal                                                                               (1, 1.2)                             0.0514
     Flipping
                                                                                 ∗ Line and column removal

                                                                                          TABLE V. BER for line & column removal
 Vertical Flipping
                                                                                 Number of Rows & Columns                      BER

 Median filtering                                                                          (1, 1)                                    0.0425
                                                                                           (17, 5)                                   0.0443
The above shows the watermarking recovery with and
without normalization. From the recovered images it is                           ∗ Shearing
seen that the normalization procedure resulted in a                                                 TABLE VI. BER for shearing
better geometric deformation resistance to the images.
                                                                                          Shearing                                    BER
                      VIII.    BIT ERROR RATIO
                               Waterm strength Vs BER
                                     ark
                                                                                           (0, 1%)                                    0.0319
          0.2                                                                             (5%, 5%)                                    0.0461

          0.15
                                                                                 ∗ General geometric affine transformation
    BER




          0.1                                                                            TABLE VII.             BER for general geometric affine
                                                                                         transformation
          0.05
                                                                                                Matrix                      BER
            0
             1    2     3       4           5       6   7       8    9                        1.1 0.2 0
                                    Waterm strength
                                          ark                                                 -0.1 0.9 0                   0.1329
                                                                                               0   0 1
Figure 9. Plot between watermark strength Vs BER
                                                                                              0.9 -0.2 0                   0.1010
From the plot we can infer that the Bit Error rate                                            0.1 1.2 0
                                                                                               0   0 1
decreases with the increase in watermark strength.
                                                                                              1.01 0.2 0                   0.0691
                                                                                              -0.2 0.8 0
                                                                                               0   0 1


                                                                            35
© 2010 ACEEE
DOI: 01.ijsip.01.01.07
ACEEE International Journal on Signal and Image Processing Vol 1, No. 1, Jan 2010


                        IX.    CONCLUSION
The proposed algorithm achieves its robustness by both
embedding and detecting the watermark message in the
normalized images. It is demonstrated that the
proposed algorithm can achieve very low decoding
BER when used with multi bit watermarks under
various affine attacks. From the analysis, the gain
factor k=2 is arrived which gives a good balance
between the visual quality and watermark robustness.
The above process provides high security to the
copyright information and preventing access from
unauthorized users.

                       REFERENCES

 [1]   F. A. P. Petitcolas, R. J. Anderson, and M. G. Kuhn, “Attacks
       on copyright marking            systems,” in Proc. Workshop
       Information Hiding, Portland, OR, Apr. 1998, pp. 15–17.

 [2]   M. Kutter and F. A. P. Petitcolas, “A fair benchmark for
       image watermarking systems,” presented at the Electronic
       Imaging, Security and Watermarking of Multimedia Contents,
       vol. 3657, Sans Jose, CA, Jan. 1999.

 [3]   J. Cox and J. P. M. G. Linnartz, “Public watermarks and
       resistance to tampering,” presented at the IEEE Int. Conf.
       Image Processing, vol. 3, 1997.

 [4]   C. Y. Lin, M.Wu, J. A. Bloom, I. J. Cox, M. Miller, and Y. M.
       Lui, “Rotation, scale, and translation resilient public
       watermarking for images,” IEEE Trans. Image Process., vol.
       10, no. 5, pp. 767–782, May 2001

 [5]   M. Alghoniemy and A. H. Tewfik, “Geometric distortion
       correction through image normalization,” presented at the
       ICME Multimedia Expo, 2000.
 [6]   Ingemar J. Cox, et al., “Secure Spread Spectrum
       Watermarking for Multimedia”, IEEE Trans. on Image
       Processing, Vol. 6, No.12, Dec 1997, pp.1673-1687.

 [7]   D. Shen, and Horace H., “Generalized Affine Invariant Image
       Normalization,” IEEETrans. Pattern Anal. and Machine
       Intelligence, Vol. 19, No. 5, pp. 431-440, May 1997.




                                                                       36
© 2010 ACEEE
DOI: 01.ijsip.01.01.07

Más contenido relacionado

La actualidad más candente

Image Denoising Using Wavelet Transform
Image Denoising Using Wavelet TransformImage Denoising Using Wavelet Transform
Image Denoising Using Wavelet TransformIJERA Editor
 
VARIATION-FREE WATERMARKING TECHNIQUE BASED ON SCALE RELATIONSHIP
VARIATION-FREE WATERMARKING TECHNIQUE BASED ON SCALE RELATIONSHIPVARIATION-FREE WATERMARKING TECHNIQUE BASED ON SCALE RELATIONSHIP
VARIATION-FREE WATERMARKING TECHNIQUE BASED ON SCALE RELATIONSHIPcsandit
 
An Application of Second Generation Wavelets for Image Denoising using Dual T...
An Application of Second Generation Wavelets for Image Denoising using Dual T...An Application of Second Generation Wavelets for Image Denoising using Dual T...
An Application of Second Generation Wavelets for Image Denoising using Dual T...IDES Editor
 
Notes on image processing
Notes on image processingNotes on image processing
Notes on image processingMohammed Kamel
 
FINGERPRINTS IMAGE COMPRESSION BY WAVE ATOMS
FINGERPRINTS IMAGE COMPRESSION BY WAVE ATOMSFINGERPRINTS IMAGE COMPRESSION BY WAVE ATOMS
FINGERPRINTS IMAGE COMPRESSION BY WAVE ATOMScsandit
 
Cj31365368
Cj31365368Cj31365368
Cj31365368IJMER
 
IJCER (www.ijceronline.com) International Journal of computational Engineerin...
IJCER (www.ijceronline.com) International Journal of computational Engineerin...IJCER (www.ijceronline.com) International Journal of computational Engineerin...
IJCER (www.ijceronline.com) International Journal of computational Engineerin...ijceronline
 
Presentation Journée Thématique - Fouille de Grands Graphes
Presentation Journée Thématique - Fouille de Grands GraphesPresentation Journée Thématique - Fouille de Grands Graphes
Presentation Journée Thématique - Fouille de Grands GraphesJuan David Cruz-Gómez
 
An adaptive method for noise removal from real world images
An adaptive method for noise removal from real world imagesAn adaptive method for noise removal from real world images
An adaptive method for noise removal from real world imagesIAEME Publication
 
IJERD (www.ijerd.com) International Journal of Engineering Research and Devel...
IJERD (www.ijerd.com) International Journal of Engineering Research and Devel...IJERD (www.ijerd.com) International Journal of Engineering Research and Devel...
IJERD (www.ijerd.com) International Journal of Engineering Research and Devel...IJERD Editor
 
Improved anti-noise attack ability of image encryption algorithm using de-noi...
Improved anti-noise attack ability of image encryption algorithm using de-noi...Improved anti-noise attack ability of image encryption algorithm using de-noi...
Improved anti-noise attack ability of image encryption algorithm using de-noi...TELKOMNIKA JOURNAL
 
MRI Image Compression
MRI Image CompressionMRI Image Compression
MRI Image Compressiondswazalwar
 
Image Compression Using Wavelet Packet Tree
Image Compression Using Wavelet Packet TreeImage Compression Using Wavelet Packet Tree
Image Compression Using Wavelet Packet TreeIDES Editor
 
A localized nonlinear_method_for_the_contrast_enhancement_of_images
A localized nonlinear_method_for_the_contrast_enhancement_of_imagesA localized nonlinear_method_for_the_contrast_enhancement_of_images
A localized nonlinear_method_for_the_contrast_enhancement_of_imagesEr. Nancy
 

La actualidad más candente (18)

Image Denoising Using Wavelet Transform
Image Denoising Using Wavelet TransformImage Denoising Using Wavelet Transform
Image Denoising Using Wavelet Transform
 
VARIATION-FREE WATERMARKING TECHNIQUE BASED ON SCALE RELATIONSHIP
VARIATION-FREE WATERMARKING TECHNIQUE BASED ON SCALE RELATIONSHIPVARIATION-FREE WATERMARKING TECHNIQUE BASED ON SCALE RELATIONSHIP
VARIATION-FREE WATERMARKING TECHNIQUE BASED ON SCALE RELATIONSHIP
 
An Application of Second Generation Wavelets for Image Denoising using Dual T...
An Application of Second Generation Wavelets for Image Denoising using Dual T...An Application of Second Generation Wavelets for Image Denoising using Dual T...
An Application of Second Generation Wavelets for Image Denoising using Dual T...
 
Notes on image processing
Notes on image processingNotes on image processing
Notes on image processing
 
FINGERPRINTS IMAGE COMPRESSION BY WAVE ATOMS
FINGERPRINTS IMAGE COMPRESSION BY WAVE ATOMSFINGERPRINTS IMAGE COMPRESSION BY WAVE ATOMS
FINGERPRINTS IMAGE COMPRESSION BY WAVE ATOMS
 
Cj31365368
Cj31365368Cj31365368
Cj31365368
 
IJCER (www.ijceronline.com) International Journal of computational Engineerin...
IJCER (www.ijceronline.com) International Journal of computational Engineerin...IJCER (www.ijceronline.com) International Journal of computational Engineerin...
IJCER (www.ijceronline.com) International Journal of computational Engineerin...
 
Presentation Journée Thématique - Fouille de Grands Graphes
Presentation Journée Thématique - Fouille de Grands GraphesPresentation Journée Thématique - Fouille de Grands Graphes
Presentation Journée Thématique - Fouille de Grands Graphes
 
An adaptive method for noise removal from real world images
An adaptive method for noise removal from real world imagesAn adaptive method for noise removal from real world images
An adaptive method for noise removal from real world images
 
IJERD (www.ijerd.com) International Journal of Engineering Research and Devel...
IJERD (www.ijerd.com) International Journal of Engineering Research and Devel...IJERD (www.ijerd.com) International Journal of Engineering Research and Devel...
IJERD (www.ijerd.com) International Journal of Engineering Research and Devel...
 
Improved anti-noise attack ability of image encryption algorithm using de-noi...
Improved anti-noise attack ability of image encryption algorithm using de-noi...Improved anti-noise attack ability of image encryption algorithm using de-noi...
Improved anti-noise attack ability of image encryption algorithm using de-noi...
 
MRI Image Compression
MRI Image CompressionMRI Image Compression
MRI Image Compression
 
Image Denoising Using WEAD
Image Denoising Using WEADImage Denoising Using WEAD
Image Denoising Using WEAD
 
Image Compression Using Wavelet Packet Tree
Image Compression Using Wavelet Packet TreeImage Compression Using Wavelet Packet Tree
Image Compression Using Wavelet Packet Tree
 
In2414961500
In2414961500In2414961500
In2414961500
 
A localized nonlinear_method_for_the_contrast_enhancement_of_images
A localized nonlinear_method_for_the_contrast_enhancement_of_imagesA localized nonlinear_method_for_the_contrast_enhancement_of_images
A localized nonlinear_method_for_the_contrast_enhancement_of_images
 
F0533134
F0533134F0533134
F0533134
 
Study and Analysis of Multiwavelet Transform with Threshold in Image Denoisin...
Study and Analysis of Multiwavelet Transform with Threshold in Image Denoisin...Study and Analysis of Multiwavelet Transform with Threshold in Image Denoisin...
Study and Analysis of Multiwavelet Transform with Threshold in Image Denoisin...
 

Similar a An improved Spread Spectrum Watermarking technique to withstand Geometric Deformations

FINGERPRINTS IMAGE COMPRESSION BY WAVE ATOMS
FINGERPRINTS IMAGE COMPRESSION BY WAVE ATOMSFINGERPRINTS IMAGE COMPRESSION BY WAVE ATOMS
FINGERPRINTS IMAGE COMPRESSION BY WAVE ATOMScsandit
 
Paper id 212014133
Paper id 212014133Paper id 212014133
Paper id 212014133IJRAT
 
Performance Analysis of Spatial and Frequency Domain Multiple Data Embedding ...
Performance Analysis of Spatial and Frequency Domain Multiple Data Embedding ...Performance Analysis of Spatial and Frequency Domain Multiple Data Embedding ...
Performance Analysis of Spatial and Frequency Domain Multiple Data Embedding ...CSCJournals
 
imageCorrectionLinearDiffusion
imageCorrectionLinearDiffusionimageCorrectionLinearDiffusion
imageCorrectionLinearDiffusionKellen Betts
 
In tech multiple-wavelength_holographic_interferometry_with_tunable_laser_diodes
In tech multiple-wavelength_holographic_interferometry_with_tunable_laser_diodesIn tech multiple-wavelength_holographic_interferometry_with_tunable_laser_diodes
In tech multiple-wavelength_holographic_interferometry_with_tunable_laser_diodesMeyli Valin Fernández
 
3 intensity transformations and spatial filtering slides
3 intensity transformations and spatial filtering slides3 intensity transformations and spatial filtering slides
3 intensity transformations and spatial filtering slidesBHAGYAPRASADBUGGE
 
PPT Image Analysis(IRDE, DRDO)
PPT Image Analysis(IRDE, DRDO)PPT Image Analysis(IRDE, DRDO)
PPT Image Analysis(IRDE, DRDO)Nidhi Gopal
 
WAVELET BASED AUTHENTICATION/SECRET TRANSMISSION THROUGH IMAGE RESIZING (WA...
WAVELET BASED AUTHENTICATION/SECRET  TRANSMISSION THROUGH IMAGE RESIZING  (WA...WAVELET BASED AUTHENTICATION/SECRET  TRANSMISSION THROUGH IMAGE RESIZING  (WA...
WAVELET BASED AUTHENTICATION/SECRET TRANSMISSION THROUGH IMAGE RESIZING (WA...sipij
 
IMAGE CODING THROUGH ZTRANSFORM WITH LOW ENERGY AND BANDWIDTH (IZEB)
IMAGE CODING THROUGH ZTRANSFORM WITH LOW ENERGY AND BANDWIDTH (IZEB) IMAGE CODING THROUGH ZTRANSFORM WITH LOW ENERGY AND BANDWIDTH (IZEB)
IMAGE CODING THROUGH ZTRANSFORM WITH LOW ENERGY AND BANDWIDTH (IZEB) cscpconf
 
Image coding through ztransform with low energy and bandwidth (izeb)
Image coding through ztransform with low energy and bandwidth (izeb)Image coding through ztransform with low energy and bandwidth (izeb)
Image coding through ztransform with low energy and bandwidth (izeb)csandit
 
IMAGE DENOISING BY MEDIAN FILTER IN WAVELET DOMAIN
IMAGE DENOISING BY MEDIAN FILTER IN WAVELET DOMAINIMAGE DENOISING BY MEDIAN FILTER IN WAVELET DOMAIN
IMAGE DENOISING BY MEDIAN FILTER IN WAVELET DOMAINijma
 
Fundamentals of image processing
Fundamentals of image processingFundamentals of image processing
Fundamentals of image processingRoufulAlamBhat1
 

Similar a An improved Spread Spectrum Watermarking technique to withstand Geometric Deformations (20)

1873 1878
1873 18781873 1878
1873 1878
 
1873 1878
1873 18781873 1878
1873 1878
 
FINGERPRINTS IMAGE COMPRESSION BY WAVE ATOMS
FINGERPRINTS IMAGE COMPRESSION BY WAVE ATOMSFINGERPRINTS IMAGE COMPRESSION BY WAVE ATOMS
FINGERPRINTS IMAGE COMPRESSION BY WAVE ATOMS
 
Paper id 212014133
Paper id 212014133Paper id 212014133
Paper id 212014133
 
It 603
It 603It 603
It 603
 
Performance Analysis of Spatial and Frequency Domain Multiple Data Embedding ...
Performance Analysis of Spatial and Frequency Domain Multiple Data Embedding ...Performance Analysis of Spatial and Frequency Domain Multiple Data Embedding ...
Performance Analysis of Spatial and Frequency Domain Multiple Data Embedding ...
 
www.ijerd.com
www.ijerd.comwww.ijerd.com
www.ijerd.com
 
Robust watermarking technique sppt
Robust watermarking technique spptRobust watermarking technique sppt
Robust watermarking technique sppt
 
imageCorrectionLinearDiffusion
imageCorrectionLinearDiffusionimageCorrectionLinearDiffusion
imageCorrectionLinearDiffusion
 
In tech multiple-wavelength_holographic_interferometry_with_tunable_laser_diodes
In tech multiple-wavelength_holographic_interferometry_with_tunable_laser_diodesIn tech multiple-wavelength_holographic_interferometry_with_tunable_laser_diodes
In tech multiple-wavelength_holographic_interferometry_with_tunable_laser_diodes
 
3 intensity transformations and spatial filtering slides
3 intensity transformations and spatial filtering slides3 intensity transformations and spatial filtering slides
3 intensity transformations and spatial filtering slides
 
G04654247
G04654247G04654247
G04654247
 
PPT Image Analysis(IRDE, DRDO)
PPT Image Analysis(IRDE, DRDO)PPT Image Analysis(IRDE, DRDO)
PPT Image Analysis(IRDE, DRDO)
 
WAVELET BASED AUTHENTICATION/SECRET TRANSMISSION THROUGH IMAGE RESIZING (WA...
WAVELET BASED AUTHENTICATION/SECRET  TRANSMISSION THROUGH IMAGE RESIZING  (WA...WAVELET BASED AUTHENTICATION/SECRET  TRANSMISSION THROUGH IMAGE RESIZING  (WA...
WAVELET BASED AUTHENTICATION/SECRET TRANSMISSION THROUGH IMAGE RESIZING (WA...
 
A0360105
A0360105A0360105
A0360105
 
IMAGE CODING THROUGH ZTRANSFORM WITH LOW ENERGY AND BANDWIDTH (IZEB)
IMAGE CODING THROUGH ZTRANSFORM WITH LOW ENERGY AND BANDWIDTH (IZEB) IMAGE CODING THROUGH ZTRANSFORM WITH LOW ENERGY AND BANDWIDTH (IZEB)
IMAGE CODING THROUGH ZTRANSFORM WITH LOW ENERGY AND BANDWIDTH (IZEB)
 
Image coding through ztransform with low energy and bandwidth (izeb)
Image coding through ztransform with low energy and bandwidth (izeb)Image coding through ztransform with low energy and bandwidth (izeb)
Image coding through ztransform with low energy and bandwidth (izeb)
 
IMAGE DENOISING BY MEDIAN FILTER IN WAVELET DOMAIN
IMAGE DENOISING BY MEDIAN FILTER IN WAVELET DOMAINIMAGE DENOISING BY MEDIAN FILTER IN WAVELET DOMAIN
IMAGE DENOISING BY MEDIAN FILTER IN WAVELET DOMAIN
 
G0443640
G0443640G0443640
G0443640
 
Fundamentals of image processing
Fundamentals of image processingFundamentals of image processing
Fundamentals of image processing
 

Más de IDES Editor

Power System State Estimation - A Review
Power System State Estimation - A ReviewPower System State Estimation - A Review
Power System State Estimation - A ReviewIDES Editor
 
Artificial Intelligence Technique based Reactive Power Planning Incorporating...
Artificial Intelligence Technique based Reactive Power Planning Incorporating...Artificial Intelligence Technique based Reactive Power Planning Incorporating...
Artificial Intelligence Technique based Reactive Power Planning Incorporating...IDES Editor
 
Design and Performance Analysis of Genetic based PID-PSS with SVC in a Multi-...
Design and Performance Analysis of Genetic based PID-PSS with SVC in a Multi-...Design and Performance Analysis of Genetic based PID-PSS with SVC in a Multi-...
Design and Performance Analysis of Genetic based PID-PSS with SVC in a Multi-...IDES Editor
 
Optimal Placement of DG for Loss Reduction and Voltage Sag Mitigation in Radi...
Optimal Placement of DG for Loss Reduction and Voltage Sag Mitigation in Radi...Optimal Placement of DG for Loss Reduction and Voltage Sag Mitigation in Radi...
Optimal Placement of DG for Loss Reduction and Voltage Sag Mitigation in Radi...IDES Editor
 
Line Losses in the 14-Bus Power System Network using UPFC
Line Losses in the 14-Bus Power System Network using UPFCLine Losses in the 14-Bus Power System Network using UPFC
Line Losses in the 14-Bus Power System Network using UPFCIDES Editor
 
Study of Structural Behaviour of Gravity Dam with Various Features of Gallery...
Study of Structural Behaviour of Gravity Dam with Various Features of Gallery...Study of Structural Behaviour of Gravity Dam with Various Features of Gallery...
Study of Structural Behaviour of Gravity Dam with Various Features of Gallery...IDES Editor
 
Assessing Uncertainty of Pushover Analysis to Geometric Modeling
Assessing Uncertainty of Pushover Analysis to Geometric ModelingAssessing Uncertainty of Pushover Analysis to Geometric Modeling
Assessing Uncertainty of Pushover Analysis to Geometric ModelingIDES Editor
 
Secure Multi-Party Negotiation: An Analysis for Electronic Payments in Mobile...
Secure Multi-Party Negotiation: An Analysis for Electronic Payments in Mobile...Secure Multi-Party Negotiation: An Analysis for Electronic Payments in Mobile...
Secure Multi-Party Negotiation: An Analysis for Electronic Payments in Mobile...IDES Editor
 
Selfish Node Isolation & Incentivation using Progressive Thresholds
Selfish Node Isolation & Incentivation using Progressive ThresholdsSelfish Node Isolation & Incentivation using Progressive Thresholds
Selfish Node Isolation & Incentivation using Progressive ThresholdsIDES Editor
 
Various OSI Layer Attacks and Countermeasure to Enhance the Performance of WS...
Various OSI Layer Attacks and Countermeasure to Enhance the Performance of WS...Various OSI Layer Attacks and Countermeasure to Enhance the Performance of WS...
Various OSI Layer Attacks and Countermeasure to Enhance the Performance of WS...IDES Editor
 
Responsive Parameter based an AntiWorm Approach to Prevent Wormhole Attack in...
Responsive Parameter based an AntiWorm Approach to Prevent Wormhole Attack in...Responsive Parameter based an AntiWorm Approach to Prevent Wormhole Attack in...
Responsive Parameter based an AntiWorm Approach to Prevent Wormhole Attack in...IDES Editor
 
Cloud Security and Data Integrity with Client Accountability Framework
Cloud Security and Data Integrity with Client Accountability FrameworkCloud Security and Data Integrity with Client Accountability Framework
Cloud Security and Data Integrity with Client Accountability FrameworkIDES Editor
 
Genetic Algorithm based Layered Detection and Defense of HTTP Botnet
Genetic Algorithm based Layered Detection and Defense of HTTP BotnetGenetic Algorithm based Layered Detection and Defense of HTTP Botnet
Genetic Algorithm based Layered Detection and Defense of HTTP BotnetIDES Editor
 
Enhancing Data Storage Security in Cloud Computing Through Steganography
Enhancing Data Storage Security in Cloud Computing Through SteganographyEnhancing Data Storage Security in Cloud Computing Through Steganography
Enhancing Data Storage Security in Cloud Computing Through SteganographyIDES Editor
 
Low Energy Routing for WSN’s
Low Energy Routing for WSN’sLow Energy Routing for WSN’s
Low Energy Routing for WSN’sIDES Editor
 
Permutation of Pixels within the Shares of Visual Cryptography using KBRP for...
Permutation of Pixels within the Shares of Visual Cryptography using KBRP for...Permutation of Pixels within the Shares of Visual Cryptography using KBRP for...
Permutation of Pixels within the Shares of Visual Cryptography using KBRP for...IDES Editor
 
Rotman Lens Performance Analysis
Rotman Lens Performance AnalysisRotman Lens Performance Analysis
Rotman Lens Performance AnalysisIDES Editor
 
Band Clustering for the Lossless Compression of AVIRIS Hyperspectral Images
Band Clustering for the Lossless Compression of AVIRIS Hyperspectral ImagesBand Clustering for the Lossless Compression of AVIRIS Hyperspectral Images
Band Clustering for the Lossless Compression of AVIRIS Hyperspectral ImagesIDES Editor
 
Microelectronic Circuit Analogous to Hydrogen Bonding Network in Active Site ...
Microelectronic Circuit Analogous to Hydrogen Bonding Network in Active Site ...Microelectronic Circuit Analogous to Hydrogen Bonding Network in Active Site ...
Microelectronic Circuit Analogous to Hydrogen Bonding Network in Active Site ...IDES Editor
 
Texture Unit based Monocular Real-world Scene Classification using SOM and KN...
Texture Unit based Monocular Real-world Scene Classification using SOM and KN...Texture Unit based Monocular Real-world Scene Classification using SOM and KN...
Texture Unit based Monocular Real-world Scene Classification using SOM and KN...IDES Editor
 

Más de IDES Editor (20)

Power System State Estimation - A Review
Power System State Estimation - A ReviewPower System State Estimation - A Review
Power System State Estimation - A Review
 
Artificial Intelligence Technique based Reactive Power Planning Incorporating...
Artificial Intelligence Technique based Reactive Power Planning Incorporating...Artificial Intelligence Technique based Reactive Power Planning Incorporating...
Artificial Intelligence Technique based Reactive Power Planning Incorporating...
 
Design and Performance Analysis of Genetic based PID-PSS with SVC in a Multi-...
Design and Performance Analysis of Genetic based PID-PSS with SVC in a Multi-...Design and Performance Analysis of Genetic based PID-PSS with SVC in a Multi-...
Design and Performance Analysis of Genetic based PID-PSS with SVC in a Multi-...
 
Optimal Placement of DG for Loss Reduction and Voltage Sag Mitigation in Radi...
Optimal Placement of DG for Loss Reduction and Voltage Sag Mitigation in Radi...Optimal Placement of DG for Loss Reduction and Voltage Sag Mitigation in Radi...
Optimal Placement of DG for Loss Reduction and Voltage Sag Mitigation in Radi...
 
Line Losses in the 14-Bus Power System Network using UPFC
Line Losses in the 14-Bus Power System Network using UPFCLine Losses in the 14-Bus Power System Network using UPFC
Line Losses in the 14-Bus Power System Network using UPFC
 
Study of Structural Behaviour of Gravity Dam with Various Features of Gallery...
Study of Structural Behaviour of Gravity Dam with Various Features of Gallery...Study of Structural Behaviour of Gravity Dam with Various Features of Gallery...
Study of Structural Behaviour of Gravity Dam with Various Features of Gallery...
 
Assessing Uncertainty of Pushover Analysis to Geometric Modeling
Assessing Uncertainty of Pushover Analysis to Geometric ModelingAssessing Uncertainty of Pushover Analysis to Geometric Modeling
Assessing Uncertainty of Pushover Analysis to Geometric Modeling
 
Secure Multi-Party Negotiation: An Analysis for Electronic Payments in Mobile...
Secure Multi-Party Negotiation: An Analysis for Electronic Payments in Mobile...Secure Multi-Party Negotiation: An Analysis for Electronic Payments in Mobile...
Secure Multi-Party Negotiation: An Analysis for Electronic Payments in Mobile...
 
Selfish Node Isolation & Incentivation using Progressive Thresholds
Selfish Node Isolation & Incentivation using Progressive ThresholdsSelfish Node Isolation & Incentivation using Progressive Thresholds
Selfish Node Isolation & Incentivation using Progressive Thresholds
 
Various OSI Layer Attacks and Countermeasure to Enhance the Performance of WS...
Various OSI Layer Attacks and Countermeasure to Enhance the Performance of WS...Various OSI Layer Attacks and Countermeasure to Enhance the Performance of WS...
Various OSI Layer Attacks and Countermeasure to Enhance the Performance of WS...
 
Responsive Parameter based an AntiWorm Approach to Prevent Wormhole Attack in...
Responsive Parameter based an AntiWorm Approach to Prevent Wormhole Attack in...Responsive Parameter based an AntiWorm Approach to Prevent Wormhole Attack in...
Responsive Parameter based an AntiWorm Approach to Prevent Wormhole Attack in...
 
Cloud Security and Data Integrity with Client Accountability Framework
Cloud Security and Data Integrity with Client Accountability FrameworkCloud Security and Data Integrity with Client Accountability Framework
Cloud Security and Data Integrity with Client Accountability Framework
 
Genetic Algorithm based Layered Detection and Defense of HTTP Botnet
Genetic Algorithm based Layered Detection and Defense of HTTP BotnetGenetic Algorithm based Layered Detection and Defense of HTTP Botnet
Genetic Algorithm based Layered Detection and Defense of HTTP Botnet
 
Enhancing Data Storage Security in Cloud Computing Through Steganography
Enhancing Data Storage Security in Cloud Computing Through SteganographyEnhancing Data Storage Security in Cloud Computing Through Steganography
Enhancing Data Storage Security in Cloud Computing Through Steganography
 
Low Energy Routing for WSN’s
Low Energy Routing for WSN’sLow Energy Routing for WSN’s
Low Energy Routing for WSN’s
 
Permutation of Pixels within the Shares of Visual Cryptography using KBRP for...
Permutation of Pixels within the Shares of Visual Cryptography using KBRP for...Permutation of Pixels within the Shares of Visual Cryptography using KBRP for...
Permutation of Pixels within the Shares of Visual Cryptography using KBRP for...
 
Rotman Lens Performance Analysis
Rotman Lens Performance AnalysisRotman Lens Performance Analysis
Rotman Lens Performance Analysis
 
Band Clustering for the Lossless Compression of AVIRIS Hyperspectral Images
Band Clustering for the Lossless Compression of AVIRIS Hyperspectral ImagesBand Clustering for the Lossless Compression of AVIRIS Hyperspectral Images
Band Clustering for the Lossless Compression of AVIRIS Hyperspectral Images
 
Microelectronic Circuit Analogous to Hydrogen Bonding Network in Active Site ...
Microelectronic Circuit Analogous to Hydrogen Bonding Network in Active Site ...Microelectronic Circuit Analogous to Hydrogen Bonding Network in Active Site ...
Microelectronic Circuit Analogous to Hydrogen Bonding Network in Active Site ...
 
Texture Unit based Monocular Real-world Scene Classification using SOM and KN...
Texture Unit based Monocular Real-world Scene Classification using SOM and KN...Texture Unit based Monocular Real-world Scene Classification using SOM and KN...
Texture Unit based Monocular Real-world Scene Classification using SOM and KN...
 

Último

The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxMalak Abu Hammad
 
A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?Igalia
 
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024The Digital Insurer
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slidevu2urc
 
Advantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your BusinessAdvantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your BusinessPixlogix Infotech
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsEnterprise Knowledge
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Miguel Araújo
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerThousandEyes
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreternaman860154
 
Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024The Digital Insurer
 
Real Time Object Detection Using Open CV
Real Time Object Detection Using Open CVReal Time Object Detection Using Open CV
Real Time Object Detection Using Open CVKhem
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationSafe Software
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfEnterprise Knowledge
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)Gabriella Davis
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking MenDelhi Call girls
 
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsJoaquim Jorge
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘RTylerCroy
 
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxFactors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxKatpro Technologies
 
Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Enterprise Knowledge
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Scriptwesley chun
 

Último (20)

The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptx
 
A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?
 
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slide
 
Advantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your BusinessAdvantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your Business
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI Solutions
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreter
 
Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024
 
Real Time Object Detection Using Open CV
Real Time Object Detection Using Open CVReal Time Object Detection Using Open CV
Real Time Object Detection Using Open CV
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
 
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and Myths
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘
 
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxFactors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
 
Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Script
 

An improved Spread Spectrum Watermarking technique to withstand Geometric Deformations

  • 1. ACEEE International Journal on Signal and Image Processing Vol 1, No. 1, Jan 2010 An improved Spread Spectrum Watermarking technique to withstand Geometric Deformations A. Sangeetha 1 ,K.Anusudha 2 ,B.Gomathy 3 and K.Surya Tej 4 1 asangeetha@vit.ac.in1 2 Kanusudha@vit.ac.in2 3 gomathy_tc16@yahoo.co.in3 4 kunchesuryatej@gmail.com4 School of Electrical Sciences VIT University, Vellore-14 Abstract—Here, we propose a new method for the modulated spread spectrum with frequency spectrum, watermarking to withstand the geometric attacks, which centered at the carrier frequency. The information is may occur during the transmission of the watermarked demodulated at the receiving end by multiplying the image. The underlying system is based on Direct Sequence signal by a locally generated version of the pseudo- Code Division Multiple Access (DS-CDMA). The algorithm for the normalization has been formulated for use in black random code sequence. This process, known as "de- and white images. The watermark is spread across the spreading", mathematically constitutes a correlation of carrier image by using the pseudo-random noise sequences the transmitted PN sequence with the PN sequence that of optimal period and retrieval is made by the use of the receiver believes the transmitter is using. correlation. Private Key technique is used so the transmission is very secure. Matlab was used to implement IV. WATERMARKING METHODOLOGY the algorithm discussed here. I. INTRODUCTION The original image is taken and converted into gray Geometric deformations include rotation, scaling, scale if required. Normalization procedure is applied to translation, shearing, random bending, and change of the original image. A PN sequence is generated using a aspect ratio (e.g., [1]–[3]). It is well known that a small key element, which is confidential to the organization amount of rotation and/or scaling can dramatically alone. Create a two-dimensional (2-D) watermark with disable the receiver from detecting the watermark [4].A the same size as the normalized image. Binary pseudo- watermark is robust if it cannot be impaired without also random sequences pi, i=1,2,3…. M is generated, as rendering the attacked data useless. Watermark signature patterns using the private key as seed, where impairment can be measured by criteria such as miss M is the number of bits in the watermark message. probability, probability of bit error, or channel capacity. Then the last two digits of the sequence will be XORed Hence, robustness can be evaluated by simultaneously and the value will be shifted once this process will considering watermark impairment and the distortion of continue till code of length equal to the length of the the attacked data. The key idea of this watermarking cover image is generated. A 1-D DS-CDMA scheme is to use a normalized image for both watermark watermark signature by modulating the watermark embedding and detection. message with the patterns generated in previous steps is created. Message is embedded to the normalized image. II. WATERMARKING USING CDMA TECHNIQUES Desired watermarking strength is used before The CDMA technique is a spread spectrum technique addition.A mask image is created, which is a binary that spreads the transmitted signal over a wide image of the same size as the normalized image. This frequency band, which is much wider than the actual image has 1s within the support of the normalized minimum bandwidth required. This technique ensures image and 0s elsewhere. Using the mask image the the survival of watermark under various attacks due to boundary is masked of if it is excess than the cover redundancy. image.Inverse normalization is done to this watermark embedded image. This is the watermarked image and III. DIRECT SEQUENCE SPREAD SPECTRUM this is transmitted. In this form of modulation, a pseudo-random noise In the receiver side the image is normalized. Using the generator creates a high-speed pseudo-noise code same key PN sequence is again generated. Correlation sequence (sequence of 1 and −1 values). Direct- is performed between the watermarked image and the sequence spread-spectrum transmissions multiply the PN sequence. Mean of the correlation values are taken data being transmitted by this "noise" signal; thus, it and a threshold is fixed. Message is decoded using this directly sets the transmitted radio frequency (RF) threshold. bandwidth. The result of modulating an RF carrier with such a code sequence is to produce a direct-sequence- 32 © 2010 ACEEE DOI: 01.ijsip.01.01.07
  • 2. ACEEE International Journal on Signal and Image Processing Vol 1, No. 1, Jan 2010 V. IMPLEMENTATION So that the resulting image, denoted by, f 3(x, y) = Ay [f 2(x, y)]. γ Can be calculated using the formula, The parameters by which the image is normalized are estimated from the geometric moments of the image [4]. By putting μ11(3) =0 we get A. Image Moments and Affine Transforms Let f (x, y) denote a digital image of size M x N. Its geometric moments mpq and μpq central moments, p, q = 0, 1, 2, 3… are defined, respectively as Scale f 4(x, y) in both x and y directions with As = α 0 so that the resulting image denoted by, 0 β And f 4(x,y) = As[f 3(x,y)] achieves 1) A prescribed standard size. 2) μ50(4)>0 and μ05(4)>0. Where Where, α= Standard image size/number of columns in y-sheared image. β=Standard image size/number of rows in y- An image g (x,y) is said to be an affine transform of sheared image. f(x,y) if there is a matrix A= a11 a21 The final image f4 (x, y) is the normalized image. a12 a22 and the vector d = d1 such that f(x,y)=g(x,y), d2 where B.Normalization procedure The four steps of normalization are: Center the image f (x,y); this is achieved by setting the matrix A= 0 1 and the 1 0 Vector with d= d1 with, d2 Let f 1(x, y) denotes the resulting centered image. Apply a shearing transform to f 1(x, y) in the x direction with matrix Ax = 1 β 0 1 So that the resulting image Figure 1. Block diagram denoted by, f 2(x,y) = Ax[f1(x,y)].β can be calculated using the formula, C.Embedding The addition of the PN sequences to the cover image In particular, we may have the following two is done according to the equation: scenarios: Iw (x, y) = I (x, y) + k × W (x, y) 1) One of the three roots is real and the other two This is shown in figure given bellow are complex, we select the real root Where, Iw (x, y) denotes the watermarked image. 2) All three roots are real, then we pick the I (x, y) denote the actual cover image. median of the three real roots. W (x, y) denotes a pseudorandom noise pattern that is added to the image. Apply a shearing transform to f 2(x, y) in the y K denotes the gain factor. direction with matrix Ay = 1 0 γ 1 33 © 2010 ACEEE DOI: 01.ijsip.01.01.07
  • 3. ACEEE International Journal on Signal and Image Processing Vol 1, No. 1, Jan 2010 Figure 2(a) Embedding process step-1 Figure 5(a) watermark message Figure 5(b) watermarked image This image is masked to remove borders in watermark message if greater than normalized image. To the normalized and masked image inverse normalization is Figure 2(b) Embedding process step-2 done. Inverse normalization involves the steps, which is simply the inverse of the steps involved in D.Extraction normalization. The multiplier output C of figure.3 is given by C = Iw (x, y) × b (x, y) = (a(x,y) × b(x,y) + I(x,y)) × b(x,y) = a(x,y) × b^2(x,y) + I(x,y) × b(x,y) Figure 6(a) masked image Figure 6(b) image to be transmitted Figure.3 extraction process Receiver side results for a watermarking strength K= 2 The watermark image a (x, y) is multiplied twice with the noise signal b (x, y) which becomes 1 whereas the unwanted or the cover image I (x, y) is multiplied only once with the noise signal that can be filtered out during the process of correlation by setting the Recovered Watermark threshold as mean of correlation. VI. RESULT ANALYSIS Figure 7(a) received image Figure 7((b)recoverd watermark The first step is normalization. This difference image below shows that the technique ensures high degree of fidelity. As the gain is increased from 2 to 4, the recovery of the watermark improves, but at the cost of distorting the watermarked image. Figure 4(a) original image Figure 4(b) normalized image Then the watermark is embedded. Figure 8. Difference image 34 © 2010 ACEEE DOI: 01.ijsip.01.01.07
  • 4. ACEEE International Journal on Signal and Image Processing Vol 1, No. 1, Jan 2010 VII. ATTACKS A .BER after Geometric Distortion TABLE I. Comparison between Watermark Recovery with and ∗ Flipping without Normalization TABLE II. BER for flipping Flipping BER Type of attack With normalization Without Normalization Horizontal / Vertical 0.0443 Line & column Removal ∗ Scaling TABLE III. BER for scaling Scaling Scaling BER 0.75 0.0461 0.5 0.0461 Aspect ratio 1.1 0.0461 Change 1.5 0.0425 ∗ Aspect ratio change Shearing TABLE IV. BER for change of aspect ratio. Aspect Ratio BER Affine (1, 0.8) 0.0490 Transformation (1, 0.9) 0.0437 (1, 1.1) 0.0437 Horizontal (1, 1.2) 0.0514 Flipping ∗ Line and column removal TABLE V. BER for line & column removal Vertical Flipping Number of Rows & Columns BER Median filtering (1, 1) 0.0425 (17, 5) 0.0443 The above shows the watermarking recovery with and without normalization. From the recovered images it is ∗ Shearing seen that the normalization procedure resulted in a TABLE VI. BER for shearing better geometric deformation resistance to the images. Shearing BER VIII. BIT ERROR RATIO Waterm strength Vs BER ark (0, 1%) 0.0319 0.2 (5%, 5%) 0.0461 0.15 ∗ General geometric affine transformation BER 0.1 TABLE VII. BER for general geometric affine transformation 0.05 Matrix BER 0 1 2 3 4 5 6 7 8 9 1.1 0.2 0 Waterm strength ark -0.1 0.9 0 0.1329 0 0 1 Figure 9. Plot between watermark strength Vs BER 0.9 -0.2 0 0.1010 From the plot we can infer that the Bit Error rate 0.1 1.2 0 0 0 1 decreases with the increase in watermark strength. 1.01 0.2 0 0.0691 -0.2 0.8 0 0 0 1 35 © 2010 ACEEE DOI: 01.ijsip.01.01.07
  • 5. ACEEE International Journal on Signal and Image Processing Vol 1, No. 1, Jan 2010 IX. CONCLUSION The proposed algorithm achieves its robustness by both embedding and detecting the watermark message in the normalized images. It is demonstrated that the proposed algorithm can achieve very low decoding BER when used with multi bit watermarks under various affine attacks. From the analysis, the gain factor k=2 is arrived which gives a good balance between the visual quality and watermark robustness. The above process provides high security to the copyright information and preventing access from unauthorized users. REFERENCES [1] F. A. P. Petitcolas, R. J. Anderson, and M. G. Kuhn, “Attacks on copyright marking systems,” in Proc. Workshop Information Hiding, Portland, OR, Apr. 1998, pp. 15–17. [2] M. Kutter and F. A. P. Petitcolas, “A fair benchmark for image watermarking systems,” presented at the Electronic Imaging, Security and Watermarking of Multimedia Contents, vol. 3657, Sans Jose, CA, Jan. 1999. [3] J. Cox and J. P. M. G. Linnartz, “Public watermarks and resistance to tampering,” presented at the IEEE Int. Conf. Image Processing, vol. 3, 1997. [4] C. Y. Lin, M.Wu, J. A. Bloom, I. J. Cox, M. Miller, and Y. M. Lui, “Rotation, scale, and translation resilient public watermarking for images,” IEEE Trans. Image Process., vol. 10, no. 5, pp. 767–782, May 2001 [5] M. Alghoniemy and A. H. Tewfik, “Geometric distortion correction through image normalization,” presented at the ICME Multimedia Expo, 2000. [6] Ingemar J. Cox, et al., “Secure Spread Spectrum Watermarking for Multimedia”, IEEE Trans. on Image Processing, Vol. 6, No.12, Dec 1997, pp.1673-1687. [7] D. Shen, and Horace H., “Generalized Affine Invariant Image Normalization,” IEEETrans. Pattern Anal. and Machine Intelligence, Vol. 19, No. 5, pp. 431-440, May 1997. 36 © 2010 ACEEE DOI: 01.ijsip.01.01.07