762 research outputs found

    ANALISIS DAN IMPLEMENTASI IMAGE WATERMARKING MENGGUNAKAN BEST TREE WAVELET PACKET TRANSFORM

    Get PDF
    ABSTRAKSI: Watermarking merupakan cabang dari steganography. Watermarking adalah suatu teknik penyembunyian data di dalam data digital (citra, audio, video) namun keberadaannya tidak terlihat oleh indra manusia. Watermarking dijadikan solusi dari kasus penyebaran data digital tanpa memandang aspek hak cipta. Internet adalah salah satu media penyebaran data digital. Berbagai situs di internet menyediakan fasilitas download untuk data digital tersebut, ditambah lagi data digital tersebut dapat digandakan dan disimpan ke komputer yang berbeda atau media lain seperti disk sehingga menyebabkan penyebarannya cukup cepat. Halhal yang terjadi seperti di atas sering dianggap sebagai hal yang biasa-biasa saja, akan tetapi jika dikaji kembali, kegiatan-kegiatan tersebut tidak memperhatikan aspek hak cipta. Data digital yang beredar tidak sebanding dengan usaha untuk membuatnya. Untuk melindungi hak cipta, data digital tersebut harus diberi penanda yang menyatakan data tersebut milik seseorang, atau dengan membuat kunci hanya orang-orang tertentu yang bisa membuka data tersebut.Dalam tugas akhir ini diimplementasikan dan dianalisis watermarking citra digital menggunakan Best Tree Wavelet Packet Trasnform (WPT) pada citra digital berformat Bitmap pada domain frekuensi. Wavelet Packet Transformation (WPT) merupakan transformasi wavelet untuk mendapatkan variasi struktur dekomposisi yang lebih banyak. Wavelet Packet Transformtiom diidentikkan dengan adanya best basis, dalam hal ini adalah penggunaan best tree.Kata Kunci : image watermarking, Best Tree Wavelet Packet Transform (WPT),ABSTRACT: Watermarking is kind of steganography. Watermarking is a technique to inserted data into digital host (image digital, audio, video) however it does not look by the people. Watermarking is being a solution for spreading digital data without respect ownership. Internet is one of spreading media for digital data. Many site give download facility for digital data, and it can transfer from one computer to another computer or another media like removable disc and make it spread fast. Many people does not consider about this, eventhough this activity is not respecting the ownership. The spreading of digital data is not equal with the effort to make this digital data. That is why the data need a sing to protect the copy right, by giving a sing that can show the owner of this digital data, or by making a key that certain people can see this digital data.In this final project, it will be analyzed and implemented an image watermarking by Best Tree Wavelet Packet Transform (WPT) based on bitmap digital image. This method based on frequency domain. Wavelet Packet Transformation (WPT) is a method of wavelet transformation that can make many structure of sub band of frequency from its decomposition. Wavelet Packet Transformation apply best basis and called as best tree.Keyword: image watermarking, Best Tree Wavelet Packet Transform (WPT)

    Fast watermarking of MPEG-1/2 streams using compressed-domain perceptual embedding and a generalized correlator detector

    Get PDF
    A novel technique is proposed for watermarking of MPEG-1 and MPEG-2 compressed video streams. The proposed scheme is applied directly in the domain of MPEG-1 system streams and MPEG-2 program streams (multiplexed streams). Perceptual models are used during the embedding process in order to avoid degradation of the video quality. The watermark is detected without the use of the original video sequence. A modified correlation-based detector is introduced that applies nonlinear preprocessing before correlation. Experimental evaluation demonstrates that the proposed scheme is able to withstand several common attacks. The resulting watermarking system is very fast and therefore suitable for copyright protection of compressed video

    Wavelet packet based digital watermarking

    Get PDF
    International audienceWe present a method for digital image watermarking based on the modification of certain subsets of the wavelet packet decomposition. These subsets are determined both from a secret key and an image dependent procedure that chooses a best basis from an energy criterion. The mark is set by imposing a parity constraint at each level of the decomposition. We elaborate on the choice of some of the parameters of the model, showing how they can be tuned so as to obtain good resistance to attacks. Examples are displayed to assess the validity of our approach

    The Wavelet Transform for Image Processing Applications

    Get PDF

    Reversible de-identification for lossless image compression using reversible watermarking

    Get PDF
    De-Identification is a process which can be used to ensure privacy by concealing the identity of individuals captured by video surveillance systems. One important challenge is to make the obfuscation process reversible so that the original image/video can be recovered by persons in possession of the right security credentials. This work presents a novel Reversible De-Identification method that can be used in conjunction with any obfuscation process. The residual information needed to reverse the obfuscation process is compressed, authenticated, encrypted and embedded within the obfuscated image using a two-level Reversible Watermarking scheme. The proposed method ensures an overall single-pass embedding capacity of 1.25 bpp, where 99.8% of the images considered required less than 0.8 bpp while none of them required more than 1.1 bpp. Experimental results further demonstrate that the proposed method managed to recover and authenticate all images considered.peer-reviewe

    QUALITY-DRIVEN CROSS LAYER DESIGN FOR MULTIMEDIA SECURITY OVER RESOURCE CONSTRAINED WIRELESS SENSOR NETWORKS

    Get PDF
    The strong need for security guarantee, e.g., integrity and authenticity, as well as privacy and confidentiality in wireless multimedia services has driven the development of an emerging research area in low cost Wireless Multimedia Sensor Networks (WMSNs). Unfortunately, those conventional encryption and authentication techniques cannot be applied directly to WMSNs due to inborn challenges such as extremely limited energy, computing and bandwidth resources. This dissertation provides a quality-driven security design and resource allocation framework for WMSNs. The contribution of this dissertation bridges the inter-disciplinary research gap between high layer multimedia signal processing and low layer computer networking. It formulates the generic problem of quality-driven multimedia resource allocation in WMSNs and proposes a cross layer solution. The fundamental methodologies of multimedia selective encryption and stream authentication, and their application to digital image or video compression standards are presented. New multimedia selective encryption and stream authentication schemes are proposed at application layer, which significantly reduces encryption/authentication complexity. In addition, network resource allocation methodologies at low layers are extensively studied. An unequal error protection-based network resource allocation scheme is proposed to achieve the best effort media quality with integrity and energy efficiency guarantee. Performance evaluation results show that this cross layer framework achieves considerable energy-quality-security gain by jointly designing multimedia selective encryption/multimedia stream authentication and communication resource allocation
    corecore