7 research outputs found

    Digital watermark technology in security applications

    Get PDF
    With the rising emphasis on security and the number of fraud related crimes around the world, authorities are looking for new technologies to tighten security of identity. Among many modern electronic technologies, digital watermarking has unique advantages to enhance the document authenticity. At the current status of the development, digital watermarking technologies are not as matured as other competing technologies to support identity authentication systems. This work presents improvements in performance of two classes of digital watermarking techniques and investigates the issue of watermark synchronisation. Optimal performance can be obtained if the spreading sequences are designed to be orthogonal to the cover vector. In this thesis, two classes of orthogonalisation methods that generate binary sequences quasi-orthogonal to the cover vector are presented. One method, namely "Sorting and Cancelling" generates sequences that have a high level of orthogonality to the cover vector. The Hadamard Matrix based orthogonalisation method, namely "Hadamard Matrix Search" is able to realise overlapped embedding, thus the watermarking capacity and image fidelity can be improved compared to using short watermark sequences. The results are compared with traditional pseudo-randomly generated binary sequences. The advantages of both classes of orthogonalisation inethods are significant. Another watermarking method that is introduced in the thesis is based on writing-on-dirty-paper theory. The method is presented with biorthogonal codes that have the best robustness. The advantage and trade-offs of using biorthogonal codes with this watermark coding methods are analysed comprehensively. The comparisons between orthogonal and non-orthogonal codes that are used in this watermarking method are also made. It is found that fidelity and robustness are contradictory and it is not possible to optimise them simultaneously. Comparisons are also made between all proposed methods. The comparisons are focused on three major performance criteria, fidelity, capacity and robustness. aom two different viewpoints, conclusions are not the same. For fidelity-centric viewpoint, the dirty-paper coding methods using biorthogonal codes has very strong advantage to preserve image fidelity and the advantage of capacity performance is also significant. However, from the power ratio point of view, the orthogonalisation methods demonstrate significant advantage on capacity and robustness. The conclusions are contradictory but together, they summarise the performance generated by different design considerations. The synchronisation of watermark is firstly provided by high contrast frames around the watermarked image. The edge detection filters are used to detect the high contrast borders of the captured image. By scanning the pixels from the border to the centre, the locations of detected edges are stored. The optimal linear regression algorithm is used to estimate the watermarked image frames. Estimation of the regression function provides rotation angle as the slope of the rotated frames. The scaling is corrected by re-sampling the upright image to the original size. A theoretically studied method that is able to synchronise captured image to sub-pixel level accuracy is also presented. By using invariant transforms and the "symmetric phase only matched filter" the captured image can be corrected accurately to original geometric size. The method uses repeating watermarks to form an array in the spatial domain of the watermarked image and the the array that the locations of its elements can reveal information of rotation, translation and scaling with two filtering processes

    Implementasi Metode Log-Polar Mapping Dan Phase Correlation Pada Watermaking Citra Digital Yang Independen Terhadap Rotasi, Skala, Dan Translasi

    Get PDF
    Watermarking adalah proses embedding (penambahan) dan ekstraksi data yang disebut watermark ke dalam sebuah media. Watermark ini bisa berbentuk sinyal, citra, atau barisan bit. Sedangkan media yang digunakan bisa berupa citra atau video atau audio. Fungsi utama dari watermarking adalah sebagai proteksi hak cipta dari media yang diberi watermark. Banyak metode telah digunakan dalam watermarking ini. Salah satunya menggunakan metode Log-Polar Mapping (LPM) dan Phase Correlation. Metode inilah yang digunakan dalam tugas akhir ini. Metode LPM dan Phase Correlation digunakan dalam proses embedding dan ekstraksi watermark. Proses-proses ini dilakukan pada magnitude dari domain Fourier sebuah citra digital untuk membuat watermarking independen terhadap translasi. Metode LPM digunakan pada proses embedding untuk membuat watermark yang independen terhadap rotasi dan skala. Sedangkan metode Phase Correlation dalam proses ekstraksi watermark bersamaan dengan metode LPM digunakan dalam proses penyesuaian (rect(fication) citra digital. Dengan kedua metode ini posisi watermark dalam magnitude tetap terjaga sehingga watermark mudah diekstraksi. Selain itu watermark terhindar dari resiko pengurangan kualitas yang disebabkan oleh LPM. Uji coba dilakukan menggunakan 5 citra digital dan berbagai macam watermark. Hasil uji coba menunjukkan terdeteksinya watermark pada hampir semua kasus, hal ini menunjukkan watermarking ini independen terhadap rotasi, skala, dan translasi (RST)

    Data Hiding and Its Applications

    Get PDF
    Data hiding techniques have been widely used to provide copyright protection, data integrity, covert communication, non-repudiation, and authentication, among other applications. In the context of the increased dissemination and distribution of multimedia content over the internet, data hiding methods, such as digital watermarking and steganography, are becoming increasingly relevant in providing multimedia security. The goal of this book is to focus on the improvement of data hiding algorithms and their different applications (both traditional and emerging), bringing together researchers and practitioners from different research fields, including data hiding, signal processing, cryptography, and information theory, among others

    Framework for Automatic Identification of Paper Watermarks with Chain Codes

    Get PDF
    Title from PDF of title page viewed May 21, 2018Dissertation advisor: Reza DerakhshaniVitaIncludes bibliographical references (pages 220-235)Thesis (Ph.D.)--School of Computing and Engineering. University of Missouri--Kansas City, 2017In this dissertation, I present a new framework for automated description, archiving, and identification of paper watermarks found in historical documents and manuscripts. The early manufacturers of paper have introduced the embedding of identifying marks and patterns as a sign of a distinct origin and perhaps as a signature of quality. Thousands of watermarks have been studied, classified, and archived. Most of the classification categories are based on image similarity and are searchable based on a set of defined contextual descriptors. The novel method presented here is for automatic classification, identification (matching) and retrieval of watermark images based on chain code descriptors (CC). The approach for generation of unique CC includes a novel image preprocessing method to provide a solution for rotation and scale invariant representation of watermarks. The unique codes are truly reversible, providing high ratio lossless compression, fast searching, and image matching. The development of a novel distance measure for CC comparison is also presented. Examples for the complete process are given using the recently acquired watermarks digitized with hyper-spectral imaging of Summa Theologica, the work of Antonino Pierozzi (1389 – 1459). The performance of the algorithm on large datasets is demonstrated using watermarks datasets from well-known library catalogue collections.Introduction -- Paper and paper watermarks -- Automatic identification of paper watermarks -- Rotation, Scale and translation invariant chain code -- Comparison of RST_Invariant chain code -- Automatic identification of watermarks with chain codes -- Watermark composite feature vector -- Summary -- Appendix A. Watermarks from the Bernstein Collection used in this study -- Appendix B. The original and transformed images of watermarks -- Appendix C. The transformed and scaled images of watermarks -- Appendix D. Example of chain cod

    Rotation, scaling and translation invariant digital image watermarking

    No full text
    Many digital image watermarking schemes have been proposed and are robust to common signal processing, such as compression and filtering. Geometric distortions, such as rotation, scaling, and translation (RST), are considered the most challenging attacks. This thesis is on RST invariant digital image watermarking. In this thesis, we introduce the fundamental theories and techniques necessary for RST invariant digital image watermarking, and briefly review the existing RST invariant image watermarking schemes. Then, we propose an image rectification scheme for RST invariant digital image watermarking. Rotation and scaling transformations in the spatial domain result in cyclical shifts in the log-polar domain, which is the log-polar mapping (LPM) of the magnitude of the Fourier spectrum of the image. We utilize this property to detect the rotation and scaling parameters by using a matching template and our new phase-only filtering method in the LPM domain. We employ the same strategy in the spatial domain to detect the translation parameters. This rectification scheme can detect RST parameters very accurately. (Abstract shortened by UMI.
    corecore