156 research outputs found

    Medical image : ROI and RONI definition using fuzzy logic

    Get PDF
    This thesis discusses on the edge detection in fuzzy logic before medical image watermarking. Normally most of the researcher defined the ROT and RON! in the medical image manually. This research will be proposed that the ROl and ROM in the medical image can be defined automatically by using fuzzy logic. There are rules of inference in the FIS which will affect the relationship between the different variables of a fuzzy system input variable and fuzzy output. The images will be used to process are ultrasound, magnetic resonance imaging, computed tomography etc. Firstly, the area of interest (ROl) of the particular ultrasound image will be determined using fuzzy logic. 2x2 pixel window is used to determine whether the pixel is black, white or an edge. Then, we definitely know that which is the ROl and ROM in the ultrasound image by determining the edge using FIS. Thus, this will help doctor on determining the ROT which could be faster than doctor determined it one by one. Computational system should implement widely due to the increasing of medical image. After that, it will proceed with embed the watermark on the ROM by using least significant bit (LSB) technique or other techniques so that it can help in preserve imperceptibility of the watermarked image

    Comparative Analysis of Techniques Used to Detect Copy-Move Tampering for Real-World Electronic Images

    Get PDF
    Evolution of high computational powerful computers, easy availability of several innovative editing software package and high-definition quality-based image capturing tools follows to effortless result in producing image forgery. Though, threats for security and misinterpretation of digital images and scenes have been observed to be happened since a long period and also a lot of research has been established in developing diverse techniques to authenticate the digital images. On the contrary, the research in this region is not limited to checking the validity of digital photos but also to exploring the specific signs of distortion or forgery. This analysis would not require additional prior information of intrinsic content of corresponding digital image or prior embedding of watermarks. In this paper, recent growth in the area of digital image tampering identification have been discussed along with benchmarking study has been shown with qualitative and quantitative results. With variety of methodologies and concepts, different applications of forgery detection have been discussed with corresponding outcomes especially using machine and deep learning methods in order to develop efficient automated forgery detection system. The future applications and development of advanced soft-computing based techniques in digital image forgery tampering has been discussed

    Comparative Analysis of Techniques Used to Detect Copy-Move Tampering for Real-World Electronic Images

    Get PDF
    Evolution of high computational powerful computers, easy availability of several innovative editing software package and high-definition quality-based image capturing tools follows to effortless result in producing image forgery. Though, threats for security and misinterpretation of digital images and scenes have been observed to be happened since a long period and also a lot of research has been established in developing diverse techniques to authenticate the digital images. On the contrary, the research in this region is not limited to checking the validity of digital photos but also to exploring the specific signs of distortion or forgery. This analysis would not require additional prior information of intrinsic content of corresponding digital image or prior embedding of watermarks. In this paper, recent growth in the area of digital image tampering identification have been discussed along with benchmarking study has been shown with qualitative and quantitative results. With variety of methodologies and concepts, different applications of forgery detection have been discussed with corresponding outcomes especially using machine and deep learning methods in order to develop efficient automated forgery detection system. The future applications and development of advanced soft-computing based techniques in digital image forgery tampering has been discussed

    High payload digital image steganography using mixed edge detection mechanism

    Get PDF
    The Least Significant Bit(LSB) is a spatial domain embedding technique suggest that data can be hidden in the least significant bits of the cover image and the human visual system(HVS) not able to find the secret data in the cover image. It is most powerful and easily understood method in spatial domain. LSB is widely used stegonagraphy technique in both spatial and frequency domain because all other methods in frequency domain are complex to understand and implement. In this thesis, along with using the LSB substitution method as a important stage, edge detection mechanism is used to take advantage for high payload, as edges are sharp areas of an image. In the proposed scheme, mixed edge detection mechanism is employed to achieve high payload steganography. Here, mixed edge detection mechanism is combination of Canny edge detection and Log edge detection techniques. Then applying the embedding algorithm, heavy amount data are stored in the cover image i.e high payload is achieved. Experimental results show that the steganography using mixed or hybrid edge detection mechanism accomplished with better peak signal to noise ratio(PSNR), compare to other steganograpgic model, for the same number of bits per pixel in embedded image

    Visual Servoing

    Get PDF
    The goal of this book is to introduce the visional application by excellent researchers in the world currently and offer the knowledge that can also be applied to another field widely. This book collects the main studies about machine vision currently in the world, and has a powerful persuasion in the applications employed in the machine vision. The contents, which demonstrate that the machine vision theory, are realized in different field. For the beginner, it is easy to understand the development in the vision servoing. For engineer, professor and researcher, they can study and learn the chapters, and then employ another application method

    Reversible Image Watermarking Using Modified Quadratic Difference Expansion and Hybrid Optimization Technique

    Get PDF
    With increasing copyright violation cases, watermarking of digital images is a very popular solution for securing online media content. Since some sensitive applications require image recovery after watermark extraction, reversible watermarking is widely preferred. This article introduces a Modified Quadratic Difference Expansion (MQDE) and fractal encryption-based reversible watermarking for securing the copyrights of images. First, fractal encryption is applied to watermarks using Tromino's L-shaped theorem to improve security. In addition, Cuckoo Search-Grey Wolf Optimization (CSGWO) is enforced on the cover image to optimize block allocation for inserting an encrypted watermark such that it greatly increases its invisibility. While the developed MQDE technique helps to improve coverage and visual quality, the novel data-driven distortion control unit ensures optimal performance. The suggested approach provides the highest level of protection when retrieving the secret image and original cover image without losing the essential information, apart from improving transparency and capacity without much tradeoff. The simulation results of this approach are superior to existing methods in terms of embedding capacity. With an average PSNR of 67 dB, the method shows good imperceptibility in comparison to other schemes

    A High Payload Steganography Mechanism Based on Wavelet Packet Transformation and Neutrosophic Set

    Get PDF
    In this paper a steganographic method is proposed to improve the capacity of the hidden secret data and to provide an imperceptible stego-image quality. The proposed steganography algorithm is based on the wavelet packet decomposition (WPD) and neutrosophic set. First, an original image is decomposed into wavelet packet coefficients. Second, the generalized parent-child relationships of spatial orientation trees for wavelet packet decomposition are established among the wavelet packet subbands. An edge detector based on the neutrosophic set named (NSED) is then introduced and applied on a number of subbands. This leads to classify each wavelet packet tree into edge/non-edge tree to embed more secret bits into the coefficients in the edge tree than those in the non-edge tree. The embedding is done based on the least significant bit substitution scheme. Experimental results demonstrate that the proposed method achieves higher embedding capacity with better imperceptibility compared to the published steganographic methods

    Designing Secure and Survivable Stegosystems

    Get PDF
    Steganography, the art and science of carrying out hidden communication, is an emergingsub-discipline of information security. Unlike cryptography, steganography conceals the existenceof a secret message by embedding it in an innocuous container digital media, thereby enablingunobstrusive communication over insecure channels. Detection and extraction of steganographiccontents is another challenge for the information security professional and this activity iscommonly known as steganalysis. Recent progress in steganalysis has posed a challenge fordesign and development of stegosystems with high levels of security and survivability. In thispaper, different strategies have been presented that can be used to escape detection and foilan eavesdropper having high technical capabilities as well as adequate infrastructure. Based onthe strength and weaknesses of current steganographic schemes, ideas have been progressedto make detection and destruction of hidden information more difficult
    corecore