250 research outputs found

    Improved methods and system for watermarking halftone images

    Get PDF
    Watermarking is becoming increasingly important for content control and authentication. Watermarking seamlessly embeds data in media that provide additional information about that media. Unfortunately, watermarking schemes that have been developed for continuous tone images cannot be directly applied to halftone images. Many of the existing watermarking methods require characteristics that are implicit in continuous tone images, but are absent from halftone images. With this in mind, it seems reasonable to develop watermarking techniques specific to halftones that are equipped to work in the binary image domain. In this thesis, existing techniques for halftone watermarking are reviewed and improvements are developed to increase performance and overcome their limitations. Post-halftone watermarking methods work on existing halftones. Data Hiding Cell Parity (DHCP) embeds data in the parity domain instead of individual pixels. Data Hiding Mask Toggling (DHMT) works by encoding two bits in the 2x2 neighborhood of a pseudorandom location. Dispersed Pseudorandom Generator (DPRG), on the other hand, is a preprocessing step that takes place before image halftoning. DPRG disperses the watermark embedding locations to achieve better visual results. Using the Modified Peak Signal-to-Noise Ratio (MPSNR) metric, the proposed techniques outperform existing methods by up to 5-20%, depending on the image type and method considered. Field programmable gate arrays (FPGAs) are ideal for solutions that require the flexibility of software, while retaining the performance of hardware. Using VHDL, an FPGA based halftone watermarking engine was designed and implemented for the Xilinx Virtex XCV300. This system was designed for watermarking pre-existing halftones and halftones obtained from grayscale images. This design utilizes 99% of the available FPGA resources and runs at 33 MHz. Such a design could be applied to a scanner or printer at the hardware level without adversely affecting performance

    Taming Reversible Halftoning via Predictive Luminance

    Full text link
    Traditional halftoning usually drops colors when dithering images with binary dots, which makes it difficult to recover the original color information. We proposed a novel halftoning technique that converts a color image into a binary halftone with full restorability to its original version. Our novel base halftoning technique consists of two convolutional neural networks (CNNs) to produce the reversible halftone patterns, and a noise incentive block (NIB) to mitigate the flatness degradation issue of CNNs. Furthermore, to tackle the conflicts between the blue-noise quality and restoration accuracy in our novel base method, we proposed a predictor-embedded approach to offload predictable information from the network, which in our case is the luminance information resembling from the halftone pattern. Such an approach allows the network to gain more flexibility to produce halftones with better blue-noise quality without compromising the restoration quality. Detailed studies on the multiple-stage training method and loss weightings have been conducted. We have compared our predictor-embedded method and our novel method regarding spectrum analysis on halftone, halftone accuracy, restoration accuracy, and the data embedding studies. Our entropy evaluation evidences our halftone contains less encoding information than our novel base method. The experiments show our predictor-embedded method gains more flexibility to improve the blue-noise quality of halftones and maintains a comparable restoration quality with a higher tolerance for disturbances.Comment: to be published in IEEE Transactions on Visualization and Computer Graphic

    Visual Cryptography and Steganography Methods - Review

    Get PDF
    In today’s information era information hiding becomes very much important as people transmits the information as innocent as credit card to online stores and as dangerous as terrorist plot to hijackers. The art of information hiding receive attention of the researchers. This paper provides a review of two methods – Visual Cryptography and Steganography for secure communication via a common communication channel. DOI: 10.17762/ijritcc2321-8169.16043

    An Application of Haar Wavelet Decomposition in Video Frames Preservation in Association with Visual Cryptography

    Get PDF
    Visual cryptography is one of the techniques used to encode the video by separating the original video. The proposed Visual cryptography gives the show to the users how encryption and decryption can be done to the video. Waveletchange are to provide characteristic of multiple declarationand worldwide decomposition that are the important features for thevideo compression application. The privacy and security becomes the most significant issues since the multimedia is transmitted openly over the network. A new adapted Haar Wavelet is used to encrypt the full video in an capable protected manner, after encryption the frame will decomposes and audio send final uncompressed video

    A Review on Image mosaicing for secure Transmission of University Exam Question Paper

    Get PDF
    The rapid spread of the digital world nowadays which is powered by ever faster system demands greater speed and security. Real time to secure an image is a challenging task due to the processing time and computational requirement for RGB image. So, to cope with these concerns, many innovative techniques of image processing for data hiding are required. In this paper new data hiding scheme is proposed which is known as image mosaicing. Image mosaicing is the process of merging split images to produce a single and complete image of the document. For this technique two input images are required one is secret image and second is target image, by merging these two a new image is made called as a mosaic image. So, the creation of mosaic image and lossless recovery of secret input image for question paper security is presented in this paper

    Watermarking-Based Inpainting Under Data Transmition Environment

    Get PDF
    [[abstract]]This studyb proposes a novel image inpainting technique based on watermarking and halftoning. This technique use LSB method to embed error diffusion halftone image into original image for protecting the image. In image repair process, we use LSB method to extract the halftone information, and the reference image is achieved from LUT inverse halftone. Finally we use the reference imageto finish the image inpainting work. Experiment shows the performance of our method is very excellent in image inpainting.[[conferencetype]]國際[[conferencedate]]20101206~20101208[[booktype]]電子版[[iscallforpapers]]Y[[conferencelocation]]Chengdu, Chin

    Print-Scan Resilient Text Image Watermarking Based on Stroke Direction Modulation for Chinese Document Authentication

    Get PDF
    Print-scan resilient watermarking has emerged as an attractive way for document security. This paper proposes an stroke direction modulation technique for watermarking in Chinese text images. The watermark produced by the idea offers robustness to print-photocopy-scan, yet provides relatively high embedding capacity without losing the transparency. During the embedding phase, the angle of rotatable strokes are quantized to embed the bits. This requires several stages of preprocessing, including stroke generation, junction searching, rotatable stroke decision and character partition. Moreover, shuffling is applied to equalize the uneven embedding capacity. For the data detection, denoising and deskewing mechanisms are used to compensate for the distortions induced by hardcopy. Experimental results show that our technique attains high detection accuracy against distortions resulting from print-scan operations, good quality photocopies and benign attacks in accord with the future goal of soft authentication
    corecore