133 research outputs found
Perceptual Copyright Protection Using Multiresolution Wavelet-Based Watermarking And Fuzzy Logic
In this paper, an efficiently DWT-based watermarking technique is proposed to
embed signatures in images to attest the owner identification and discourage
the unauthorized copying. This paper deals with a fuzzy inference filter to
choose the larger entropy of coefficients to embed watermarks. Unlike most
previous watermarking frameworks which embedded watermarks in the larger
coefficients of inner coarser subbands, the proposed technique is based on
utilizing a context model and fuzzy inference filter by embedding watermarks in
the larger-entropy coefficients of coarser DWT subbands. The proposed
approaches allow us to embed adaptive casting degree of watermarks for
transparency and robustness to the general image-processing attacks such as
smoothing, sharpening, and JPEG compression. The approach has no need the
original host image to extract watermarks. Our schemes have been shown to
provide very good results in both image transparency and robustness.Comment: 13 pages, 7 figure
Medical image : ROI and RONI definition using fuzzy logic
This thesis discusses on the edge detection in fuzzy logic before medical image watermarking. Normally most of the researcher defined the ROT and RON! in the medical image manually. This research will be proposed that the ROl and ROM in the medical image can be defined automatically by using fuzzy logic. There are rules of
inference in the FIS which will affect the relationship between the different variables of a fuzzy system input variable and fuzzy output. The images will be used to process are ultrasound, magnetic resonance imaging, computed tomography etc. Firstly, the area of interest (ROl) of the particular ultrasound image will be determined using fuzzy logic. 2x2 pixel window is used to determine whether the pixel is black, white or an edge.
Then, we definitely know that which is the ROl and ROM in the ultrasound image by determining the edge using FIS. Thus, this will help doctor on determining the ROT
which could be faster than doctor determined it one by one. Computational system should implement widely due to the increasing of medical image. After that, it will proceed with embed the watermark on the ROM by using least significant bit (LSB) technique or other techniques so that it can help in preserve imperceptibility of the
watermarked image
Recommended from our members
High capacity steganographic method based upon JPEG
The two most important aspects of any image-based
steganographic system are the quality of the stegoimage and the capacity of the cover image. This paper proposes a novel and high capacity steganographic approach based on Discrete Cosine Transformation (DCT) and JPEG compression. JPEG technique divides the input image into non-overlapping blocks of 8x8 pixels and uses the DCT transformation. However, our proposed method divides the cover image into nonoverlapping
blocks of 16x16 pixels. For each quantized
DCT block, the least two-significant bits (2-LSBs) of each middle frequency coefficient are modified to embed two secret bits. Our aim is to investigate the data hiding efficiency using larger blocks for JPEG compression. Our experiment result shows that the proposed approach can provide a higher information hiding capacity than Jpeg-Jsteg and Chang et al. methods based on the conventional blocks of 8x8 pixels. Furthermore, the produced stego-images are almost identical to the original cover images
Adaptive Blind Watermarking Using Psychovisual Image Features
With the growth of editing and sharing images through the internet, the
importance of protecting the images' authorship has increased. Robust
watermarking is a known approach to maintaining copyright protection.
Robustness and imperceptibility are two factors that are tried to be maximized
through watermarking. Usually, there is a trade-off between these two
parameters. Increasing the robustness would lessen the imperceptibility of the
watermarking. This paper proposes an adaptive method that determines the
strength of the watermark embedding in different parts of the cover image
regarding its texture and brightness. Adaptive embedding increases the
robustness while preserving the quality of the watermarked image. Experimental
results also show that the proposed method can effectively reconstruct the
embedded payload in different kinds of common watermarking attacks. Our
proposed method has shown good performance compared to a recent technique.Comment: 5 pages, 3 figure
JPEG steganography: A performance evaluation of quantization tables
The two most important aspects of any image based steganographic system are the imperceptibility and the capacity of the stego image. This paper evaluates the performance and efficiency of using optimized quantization tables instead of default JPEG tables within JPEG steganography. We found that using optimized tables significantly improves the quality of stego-images. Moreover, we used this optimization strategy to generate a 16x16 quantization table to be used instead of that suggested. The quality of stego-images was greatly improved when these optimized tables were used. This led us to suggest a new hybrid steganographic method in order to increase the embedding capacity. This new method is based on both and Jpeg-Jsteg methods. In this method, for each 16x16 quantized DCT block, the least two significant bits (2-LSBs) of each middle frequency coefficient are modified to embed two secret bits. Additionally, the Jpeg-Jsteg embedding technique is used for the low frequency DCT coefficients without modifying the DC coefficient. Our experimental results show that the proposed approach can provide a higher information-hiding capacity than the other methods tested. Furthermore, the quality of the produced stego-images is better than that of other methods which use the default tables
Blind 3D Model Watermarking based on Multi-Resolution Representation and Fuzzy Logic
ABSTRACT Insertion of a text message, audio data or/and an image into another image o
- …