114 research outputs found

    An efficient psychovisual threshold technique in image compression

    Get PDF
    Nowadays, psychovisual model plays a critical role in an image compression system. The psychovisual threshold gives visual tolerance to the human visual system by reducing the amount of frequency image signals. The sensitivity of the human eye can be fully explored and exploited in the qualitative experiment by describing what has been seen or by image quality judgment. However, the result of the psychovisual threshold through qualitative experiment depends on the test condition of the human visual systems and through repetitive viewing sessions. In a modern image compression, there is a need to provide some flexibility to obtain quality levels of the image output based on user preferences. The concept of psychovisual threshold is designed to determine quality levels of the image output. The psychovisual threshold represents an optimal amount of frequency image signals in image compression. This research proposes the psychovisual threshold through a quantitative experiment that can automatically predict an optimal balance between image quality and compression rate in image compression. The contribution of its frequency image signals to the image reconstruction will be the primitive of psychovisual threshold in image compression. It is very challenging to develop a psychovisual threshold from the contribution of the frequency image signals for each frequency order. In this research, the psychovisual threshold prescribes the quantization values and bit allocation for image compression. The psychovisual threshold is the basic primitive prior to generating quantization tables in image compression. The psychovisual threshold allows a developer to design adaptively customized quantization values according to his or her target image quality. The psychovisual threshold is also elementary and primitive for generating a set of bit allocation for frequency image signals. A set of bit allocation based on psychovisual threshold assigns the amount of bits for frequency image signals. A set of bit allocation refers to the psychovisual threshold instead of the quantization process in image compression. This research investigates the basic understanding of the psychovisual threshold in image compression. The experimental results provide significant improvement in the image compression. The psychovisual threshold which is presented as quantization tables, customized quantization tables and as a set of bit allocation gives a significant improvement on both of the quality of the image reconstruction and the average bit length of Huffman code. This research shows that psychovisual threshold is practically the best measure for optimal frequency image signals on image compression

    Robust Image Watermarking Based on Psychovisual Threshold

    Get PDF
    Because of the facility of accessing and sharing digital images through the internet, digital images are often copied, edited and reused. Digital image watermarking is an approach to protect and manage digital images as intellectual property. The embedding of a natural watermark based on the properties of the human eye can be utilized to effectively hide a watermark image. This paper proposes a watermark embedding scheme based on the psychovisual threshold and edge entropy. The sensitivity of minor changes in DCT coefficients against JPEG quantization tables was investigated. A watermark embedding scheme was designed that offers good resistance against JPEG image compression. The proposed scheme was tested under different types of attacks. The experimental results indicated that the proposed scheme can achieve high imperceptibility and robustness against attacks. The watermark recovery process is also robust against attacks

    Tchebichef image watermarking along the edge using YCoCg-R color space for copyright protection

    Get PDF
    Easy creation and manipulation of digital images present the potential danger of counterfeiting and forgery. Watermarking technique which embeds a watermark into the images can be used to overcome these problems and to provide copyright protection. Digital image watermarking should meet requirements, e.g. maintain image quality, difficult to remove the watermark, quality of watermark extraction, and applicable. This research proposes Tchebichef watermarking along the edge based on YCoCg-R color space. The embedding region is selected by considering the human visual characteristics (HVC) entropy. The selected blocks with minimum of HVC entropy values are transformed by Tchebichef moments. The locations of C(0,1), C(1,0), C(0,2) and C(2,0) of the matrix moment are randomly embedded for each watermark bit. The proposed watermarking scheme produces a good imperceptibility by average SSIM value around 0.98. The watermark recovery has greater resistant after several types of attack than other schemes. © 2019 Institute of Advanced Engineering and Science. All rights reserved

    An improved hiding information by modifying selected DWT coefficients in video steganography

    Get PDF
    The rapid expansion of information technology enables users to transfer data or files via the internet in a short time. Steganography is the art of embedding secret information or messages in multimedia data. Video is the most popular medium in steganography to transmit data from sender to receiver. Video has a larger hiding capacity and it provides large redundancy space in video frame sequences. The objective of this research is to embed into the selected video frames based on a new hiding technique with the discrete wavelet transform (DWT). The selected video frames based on scene change detection were chosen for hiding data to minimise the visibility effect on the stego-video. DWT was computed to decompose the selected video frame into sub-bands, the approximation coefficient matrix of two-level DWT was selected to embed the data. The proposed scheme was compared to the existing schemes in terms of imperceptibility. The experimental results showed that the proposed technique achieved high SSIM and PSNR values. The proposed scheme achieved an SSIM value of 0.990 and a PSNR value of 46.09 dB. In addition, the proposed steganography scheme produced good robustness against MPEG-4 compression whereby the message can be fully recognized

    Time series predictive analysis based on hybridization of meta-heuristic algorithms

    Get PDF
    This paper presents a comparative study which involved five hybrid meta-heuristic methods to predict the weather five days in advance. The identified meta-heuristic methods namely Moth-flame Optimization (MFO), Cuckoo Search algorithm (CSA), Artificial Bee Colony (ABC), Firefly Algorithm (FA) and Differential Evolution (DE) are individually hybridized with a well-known machine learning technique namely Least Squares Support Vector Machines (LS-SVM). For experimental purposes, a total of 6 independent inputs are considered which were collected based on daily weather data. The efficiency of the MFO-LSSVM, CSLSSVM, ABC-LSSVM, FA-LSSVM, and DE-LSSVM was quantitatively analyzed based on Theil’s U and Root Mean Square Percentage Error. Overall, the experimental results demonstrate a good rival among the identified methods. However, the superiority goes to FA-LSSVM which was able to record lower error rates in prediction. The proposed prediction model could benefit many parties in continuity planning daily activities

    A recent survey on image watermarking using scaling factor techniques for copyright protection

    Get PDF
    This survey presented a discussion of the existing scaling factor and adaptive scaling factor in image watermarking schemes. The discussion included several issues: robustness, imperceptibility and computational time for embedding a watermark. This survey also discussed the general concept of the image watermarking, transform method, embedding region and security on the existing watermarking scheme. This paper also discussed the recent use of watermarking techniques, potential issues and available solutions in adaptive watermarking schemes. Furthermore, the performance summary of the state-of-art embedding techniques is presented and analysed for future research. This literature review became useful to researchers to know the current challenges in embedding a watermark image. This survey information can be used to design an efficient embedding watermark for copyright protection

    AuSR1 : Authentication and self-recovery using a new image inpainting technique with LSB shifting in fragile image watermarking

    Get PDF
    With the rapid development of multimedia technology, editing and manipulating digital images have become more accessible than ever. This paper proposed color image authentication based on blind fragile image watermarking for tamper detection and self-recovery named AuSR1. The AuSR1 divides each channel of the cover image into non-overlapping blocks with the size of 2 × 2 pixels. The authentication data is embedded into the original block location, while the recovery data is embedded into the distant location from the original location based on the block mapping algorithm. The watermark data is then embedded into the 2 LSB to achieve high quality of the recovered image under tampering attacks. In addition, the permutation algorithm is applied to ensure the security of the watermark data. The AuSR1 utilizes a three-layer authentication algorithm to achieve a high detection rate. The experimental results show that the scheme produced a PSNR value of 45.57 dB and an SSIM value of 0.9972 of the watermarked images. Furthermore, the AuSR1 detected the tampered area of the images with a high precision value of 0.9943. In addition, the recovered image achieved a PSNR value of 27.64 dB and an SSIM value of 0.9339 on a 50% tampering rate

    Video steganography based on DCT psychovisual and object motion

    Get PDF
    Steganography is a technique of concealing the message in multimedia data. Multimedia data, such as videos are often compressed to reduce the storage for limited bandwidth. The video provides additional hidden-space in the object motion of image sequences. This research proposes a video steganography scheme based on object motion and DCT-psychovisual for concealing the message. The proposed hiding technique embeds a secret message along the object motion of the video frames. Motion analysis is used to determine the embedding regions. The proposed scheme selects six DCT coefficients in the middle frequency using DCT-psychovisual effects of hiding messages. A message is embedded by modifying middle DCT coefficients using the proposed algorithm. The middle frequencies have a large hiding capacity and it relatively does not give significant effect to the video reconstruction. The performance of the proposed video steganography is evaluated in terms of video quality and robustness against MPEG compression. The experimental results produce minimum distortion of the video quality. Our scheme produces a robust of hiding messages against MPEG-4 compression with average NC value of 0.94. The proposed video steganography achieves less perceptual distortion to human eyes and it's resistant against reducing video storage

    An efficient adaptive scaling factor for 4×4 DCT image watermarking

    Get PDF
    The imperceptibility and robustness properties of the watermarked image are the major requirements for maintaining the watermarked image similar to the original image and keeping the inserted watermark resistant under various attacks. In order to optimize the scaling factor for balancing between imperceptibility and robustness, this paper proposed a technique to generate scaling factors by considering the image content. The scaling factor is generated based on selected DCT coefficients of 4 × 4 DCT. The proposed watermarking can generate dynamic scaling factors for different DCT coefficients. The embedding regions are determined by using variance pixels, whereby the highest variance pixel was prioritised for the first embedding watermark. The watermark image pixels were scrambled by using an Arnold cat map before the watermark was embedded. This research uses 10 images from USC-SIPI image database to evaluate the effectiveness of the proposed watermarking. The experimental results showed that the proposed method improved the invisibility of the watermarked image with PSNR value of 45.38 dB rather than other watermarking schemes. The proposed watermarking showed superior performance against different types of attack
    • …
    corecore