7,266 research outputs found

    Reversible Image Watermarking Using Modified Quadratic Difference Expansion and Hybrid Optimization Technique

    Get PDF
    With increasing copyright violation cases, watermarking of digital images is a very popular solution for securing online media content. Since some sensitive applications require image recovery after watermark extraction, reversible watermarking is widely preferred. This article introduces a Modified Quadratic Difference Expansion (MQDE) and fractal encryption-based reversible watermarking for securing the copyrights of images. First, fractal encryption is applied to watermarks using Tromino's L-shaped theorem to improve security. In addition, Cuckoo Search-Grey Wolf Optimization (CSGWO) is enforced on the cover image to optimize block allocation for inserting an encrypted watermark such that it greatly increases its invisibility. While the developed MQDE technique helps to improve coverage and visual quality, the novel data-driven distortion control unit ensures optimal performance. The suggested approach provides the highest level of protection when retrieving the secret image and original cover image without losing the essential information, apart from improving transparency and capacity without much tradeoff. The simulation results of this approach are superior to existing methods in terms of embedding capacity. With an average PSNR of 67 dB, the method shows good imperceptibility in comparison to other schemes

    A Reversible Image Watermarking Scheme with High Contrast Visible Watermarks

    Get PDF
    [[abstract]]A reversible image watermarking scheme recovers the original host image when extracting the embedded watermarks. General reversible image watermarking scheme embeds invisible watermarks. This paper presents a reversible image watermarking scheme with embedding highly contrast visible watermarks. The host image first segments to non-overlapped blocks. Each block then uses two watermarking schemes including difference-expansion based invisible watermarking and high-contrast visible watermarking to embed one watermark bit into the host image. The difference-expansion based invisible watermarking scheme is adopted for extracting the watermark bit. Some extra information is therefore needed to be recorded. The high contrast visible watermarking scheme embeds significant visible watermarks. Experimental results show that the proposed scheme embeds high contrast visible watermarks and the watermarks can be extracted perfectly.[[notice]]補正完

    Difference-Expansion Based Reversible and Visible Image Watermarking Scheme

    Get PDF
    [[conferencetype]]國內[[conferencedate]]20150817~20150819[[booktype]]電子版[[iscallforpapers]]Y[[conferencelocation]]JiaoSi, Taiwa

    Robust Lossless Semi Fragile Information Protection in Images

    Get PDF
    Internet security finds it difficult to keep the information secure and to maintain the integrity of the data. Sending messages over the internet secretly is one of the major tasks as it is widely used for passing the message. In order to achieve security there must be some mechanism to protect the data against unauthorized access. A lossless data hiding scheme is proposed in this paper which has a higher embedding capacity than other schemes. Unlike other schemes that are used for embedding fixed amount of data, the proposed data hiding method is block based approach and it uses a variable data embedding in different blocks which reduces the chances of distortion and increases the hiding capacity of the image. When the data is recovered the original image can be restored without any distortion. Our experimental results indicate that the proposed solution can significantly support the data hiding problem. We achieved good Peak signal-to-noise ratio (PSNR) while hiding large amount of data into smoother regions

    Entropy in Dimension One

    Full text link
    This paper completely classifies which numbers arise as the topological entropy associated to postcritically finite self-maps of the unit interval. Specifically, a positive real number h is the topological entropy of a postcritically finite self-map of the unit interval if and only if exp(h) is an algebraic integer that is at least as large as the absolute value of any of the conjugates of exp(h); that is, if exp(h) is a weak Perron number. The postcritically finite map may be chosen to be a polynomial all of whose critical points are in the interval (0,1). This paper also proves that the weak Perron numbers are precisely the numbers that arise as exp(h), where h is the topological entropy associated to ergodic train track representatives of outer automorphisms of a free group.Comment: 38 pages, 15 figures. This paper was completed by the author before his death, and was uploaded by Dylan Thurston. A version including endnotes by John Milnor will appear in the proceedings of the Banff conference on Frontiers in Complex Dynamic
    corecore