498 research outputs found
Optimal Radiometric Calibration for Camera-Display Communication
We present a novel method for communicating between a camera and display by
embedding and recovering hidden and dynamic information within a displayed
image. A handheld camera pointed at the display can receive not only the
display image, but also the underlying message. These active scenes are
fundamentally different from traditional passive scenes like QR codes because
image formation is based on display emittance, not surface reflectance.
Detecting and decoding the message requires careful photometric modeling for
computational message recovery. Unlike standard watermarking and steganography
methods that lie outside the domain of computer vision, our message recovery
algorithm uses illumination to optically communicate hidden messages in real
world scenes. The key innovation of our approach is an algorithm that performs
simultaneous radiometric calibration and message recovery in one convex
optimization problem. By modeling the photometry of the system using a
camera-display transfer function (CDTF), we derive a physics-based kernel
function for support vector machine classification. We demonstrate that our
method of optimal online radiometric calibration (OORC) leads to an efficient
and robust algorithm for computational messaging between nine commercial
cameras and displays.Comment: 10 pages, Submitted to CVPR 201
Multiple Content Adaptive Intelligent Watermarking Schemes for the Protection of Blocks of a Document Image
Most of the documents contain different types of information such as white space, static information and dynamic information or mix of static and dynamic information. In this paper, multiple watermarking schemes are proposed for protection of the information content. The proposed approach comprises of three phases. In Phase-1, the edges of the source document image are extracted and the edge image is decomposed into blocks of uniform size. In Phase-2, GLCM features like energy, homogeneity, contrast and correlation are extracted from each block and the blocks are classified as no-information, static, dynamic and mix of static and dynamic information content blocks. The adjacent blocks of same type are merged together into a single block. Each block is watermarked in Phase-3. The type and amount of watermarking applied is decided intelligently and adaptively based on the classification of the blocks which results in improving embedding capacity and reducing time complexity incurred during watermarking. Experiments are conducted exhaustively on all the images in the corpus. The experimental evaluations exhibit better classification of segments based on information content in the block. The proposed technique also outperforms the existing watermarking schemes on document images in terms of robustness, accuracy of tamper detection and recovery
Recommended from our members
Protection of an intrusion detection engine with watermarking in ad hoc networks
Mobile ad hoc networks have received great attention in recent years, mainly due to the evolution of wireless networking and mobile computing hardware. Nevertheless, many inherent vulnerabilities exist in mobile ad hoc networks and their applications that affect the security of wireless transactions. As intrusion prevention mechanisms, such as encryption and authentication, are not sufficient we need a second line of defense, Intrusion Detection. In this pa-per we present an intrusion detection engine based on neural networks and a protection method based on watermarking techniques. In particular, we exploit information visualization and machine learning techniques in order to achieve intrusion detection and we authenticate the maps produced by the application of the intelligent techniques using a novel combined watermarking embedding method. The performance of the proposed model is evaluated under different traffic conditions, mobility patterns and visualization metrics
Research on digital image watermark encryption based on hyperchaos
The digital watermarking technique embeds meaningful information into one or more watermark images hidden in one image, in which it is known as a secret carrier. It is difficult for a hacker to extract or remove any hidden watermark from an image, and especially to crack so called digital watermark. The combination of digital watermarking technique and traditional image encryption technique is able to greatly improve anti-hacking capability, which suggests it is a good method for keeping the integrity of the original image. The research works contained in this thesis include: (1)A literature review the hyperchaotic watermarking technique is relatively more advantageous, and becomes the main subject in this programme. (2)The theoretical foundation of watermarking technologies, including the human visual system (HVS), the colour space transform, discrete wavelet transform (DWT), the main watermark embedding algorithms, and the mainstream methods for improving watermark robustness and for evaluating watermark embedding performance. (3) The devised hyperchaotic scrambling technique it has been applied to colour image watermark that helps to improve the image encryption and anti-cracking capabilities. The experiments in this research prove the robustness and some other advantages of the invented technique. This thesis focuses on combining the chaotic scrambling and wavelet watermark embedding to achieve a hyperchaotic digital watermark to encrypt digital products, with the human visual system (HVS) and other factors taken into account. This research is of significant importance and has industrial application value
Towards Optimal Copyright Protection Using Neural Networks Based Digital Image Watermarking
In the field of digital watermarking, digital image watermarking for copyright protection has attracted a lot of attention in the research community. Digital watermarking contains varies techniques for protecting the digital content. Among all those techniques,Discrete Wavelet Transform (DWT) provides higher image imperceptibility and robustness. Over the years, researchers have been designing watermarking techniques with robustness in mind, in order for the watermark to be resistant against any image processing techniques. Furthermore, the requirements of a good watermarking technique includes a tradeoff between robustness, image quality (imperceptibility) and capacity. In this paper, we have done an extensive literature review for the existing DWT techniques and those combined with other techniques such as Neural Networks. In addition to that, we have discuss the contribution of Neural Networks in copyright protection. Finally we reached our goal in which we identified the research gaps existed in the current watermarking schemes. So that, it will be easily to obtain an optimal techniques to make the watermark object robust to attacks while maintaining the imperceptibility to enhance the copyright protection
Digital watermarking by utilizing the properties of self-organization map based on least significant bit and most significant bit
Information security is one of the most important branches concerned with maintaining the confidentiality and reliability of data and the medium for which it is transmitted. Digital watermarking is one of the common techniques in this field and it is developing greatly and rapidly due to the great importance it represents in the field of reliability and security. Most modern watermarking systems, however, use the self-organization map (SOM), which is safer than other algorithms because an unauthorized user cannot see the result of the SOM's training. Our method presents a semi-fragile watermark under spatial domain using least significant bit (LSB) and by relying on most significant bit (MSB) when the taken values equal to (2 or 4 bits) depending on the characteristics of SOM through developing the so-called best matching unit (BMU) which working to determine the best location for concealment. As a result, it shows us the ability of the proposed method to maintain the quality of the host with the ability to retrieve data, whether it is a binary image or a secret message
Modular Digital Watermarking for Image Verification and Secure Data Storage in Web Applications
Our modular approach to data hiding is an innovative concept
in the data hiding research field. It enables the creation of modular digital
watermarking methods that have extendable features and are designed for
use in web applications. The methods consist of two types of modules – a
basic module and an application-specific module. The basic module mainly
provides features which are connected with the specific image format.
As JPEG is a preferred image format on the Internet, we have put a focus
on the achievement of a robust and error-free embedding and retrieval of
the embedded data in JPEG images. The application-specific modules are
adaptable to user requirements in the concrete web application.
The experimental results of the modular data watermarking are very promising.
They indicate excellent image quality, satisfactory size of the embedded data and
perfect robustness against JPEG transformations with prespecified compression ratios.
ACM Computing Classification System (1998): C.2.0
- …