85 research outputs found

    Image watermarking, steganography, and morphological processing

    Get PDF
    With the fast development of computer technology, research in the fields of multimedia security, image processing, and robot vision have recently become popular. Image watermarking, steganogrphic system, morphological processing and shortest path planning are important subjects among them. In this dissertation, the fundamental techniques are reviewed first followed by the presentation of novel algorithms and theorems for these three subjects. The research on multimedia security consists of two parts, image watermarking and steganographic system. In image watermarking, several algorithms are developed to achieve different goals as shown below. In order to embed more watermarks and to minimize distortion of watermarked images, a novel watermarking technique using combinational spatial and frequency domains is presented. In order to correct rounding errors, a novel technique based on the genetic algorithm (GA) is developed. By separating medical images into Region of Interest (ROI) and non-ROI parts, higher compression rates can be achieved where the ROI is compressed by lossless compression and the non-ROI by lossy compression. The GA-based watermarking technique can also be considered as a fundamental platform for other fragile watermarking techniques. In order to simplify the selection and integrate different watermarking techniques, a novel adjusted-purpose digital watermarking is developed. In order to enlarge the capacity of robust watermarking, a novel robust high-capacity watermarking is developed. In steganographic system, a novel steganographic algorithm is developed by using GA to break the inspection of steganalytic system. In morphological processing, the GA-based techniques are developed to decompose arbitrary shapes of big binary structuring elements and arbitrary values of big grayscale structuring elements into small ones. The decomposition is suited for a parallel-pipelined architecture. The techniques can speed up the morphological processing and allow full freedom for users to design any type and any size of binary and grayscale structuring elements. In applications such as shortest path planning, a novel method is first presented to obtaining Euclidean distance transformation (EDT) in just two scans of image. The shortest path can be extracted based on distance maps by tracking minimum values. In order to record the motion path, a new chain-code representation is developed to allow forward and backward movements. By placing the smooth turning-angle constraint, it is possible to mimic realistic motions of cars. By using dynamically rotational morphology, it is not only guarantee collision-free in the shortest path, but also reduce time complexity dramatically. As soon as the distance map of a destination and collision-free codes have been established off-line, shortest paths of cars given any starting location toward the destination can be promptly obtained on-line

    2D Watermarking: Non Conventional Approaches

    Get PDF

    On the Removal of Steganographic Content from Images

    Get PDF
    Steganography is primarily used for the covert transmission of information even though the purpose can be legitimate or malicious. The primary purpose of this work is to build a firewall which will thwart this transmission. This will be achieved by radiometric and geometric operations. These operations will degrade the quality of cover image. However these can be restored to some extent by a deconvolution operation. The finally deconvolved image is subjected to steganalysis to verify the absence of stego content. Experimental results showed that PSNR and SSIM values are between 35 dB - 45 dB and 0.96, respectively which are above the acceptable range. Our method can suppress the stego content to large extent irrespective of embedding algorithm in spatial and transform domain. We verified by using RS steganalysis, difference image histogram and chi-square attack, that 95 per cent of the stego content embedded in the spatial domain was removed by our showering techniques. We also verified that 100 per cent of the stego content was removed in the transform domain with PSNR 30 dB - 45 dB and SSIM between 0.67-0.99. Percentage of stego removed in both domains was measured by using bit error rate and first order Markov feature

    Embedding Strength Criteria for AWGN Watermark, Robust Against Expected Distortion

    Get PDF
    In this paper we engage in AWGN watermark for grayscale image (the message is embedded by adding of white Gaussian noise matrix; detection is blind, correlation based). We search criteria for ``the best'' (minimal one which guaranties watermark detectability) embedding strength for watermark robust against expected attack. These criteria we find for AWGN watermarks, which are embedded in spatial or in transform domains; for one bit message or for a longer message; into whole image or into some of its coefficients. This paper peculiarity is that we do not propose new watermarking algorithm; for well known, robust algorithm we find the best embedding strength for robust watermark

    A Novel DWT-Based Watermarking for Image with The SIFT

    Get PDF
    A kind of scale invariant features transformation (SIFT for short) operators on DWT domain are proposed for watermarking algorithm. Firstly, the low frequency of the image is obtained by DWT. And then the SIFT transformation is used to calculate the key feature points for the low frequency sub-image. Based on the chosen space’s key points with moderate scale, a circular area as watermark embedding area is constructed. According to the research and final results, the novel digital watermark algorithm is proposed benefiting from the characteristics of SIFT’s key points and local time-frequency of DWT. The algorithm not only has good robustness to resist on such operations as compression, shearing, noise addition, median filtering and scaling, but also has good inhibition to possible watermark fake verification

    Applied sequential-search algorithm for compression-encryption of high-resolution structured light 3D data

    Get PDF
    A new image compression algorithm is proposed and demonstrated in the context of structured light 3D reconstruction. Structured light images contain patterns of light, which are captured by the sensor at very high resolution. The algorithm steps involve a two level Discrete Wavelet Transformation (DWT) followed by a Discrete Cosine Transformation (DCT) to generate a DC-Column and an MA-Matrix (Multi-Array Matrix). The MA-Matrix is then partitioned into blocks and a minimization algorithm codes each block followed by arithmetic coding. At decompression stage a new proposed algorithm, Sequential-Search Algorithm (SS-Algorithm) is used to estimate the MA-Matrix. Thereafter, all decompressed DC-Columns are combined with the MA-Matrix followed by inverse DCT and inverse DWT. The effectiveness of the algorithm is demonstrated within a 3D reconstruction scenario from structured light images

    DiffusionShield: A Watermark for Copyright Protection against Generative Diffusion Models

    Full text link
    Recently, Generative Diffusion Models (GDMs) have showcased their remarkable capabilities in learning and generating images. A large community of GDMs has naturally emerged, further promoting the diversified applications of GDMs in various fields. However, this unrestricted proliferation has raised serious concerns about copyright protection. For example, artists including painters and photographers are becoming increasingly concerned that GDMs could effortlessly replicate their unique creative works without authorization. In response to these challenges, we introduce a novel watermarking scheme, DiffusionShield, tailored for GDMs. DiffusionShield protects images from copyright infringement by GDMs through encoding the ownership information into an imperceptible watermark and injecting it into the images. Its watermark can be easily learned by GDMs and will be reproduced in their generated images. By detecting the watermark from generated images, copyright infringement can be exposed with evidence. Benefiting from the uniformity of the watermarks and the joint optimization method, DiffusionShield ensures low distortion of the original image, high watermark detection performance, and the ability to embed lengthy messages. We conduct rigorous and comprehensive experiments to show the effectiveness of DiffusionShield in defending against infringement by GDMs and its superiority over traditional watermarking methods
    • …
    corecore