8 research outputs found

    Reversible color video watermarking scheme based on hybrid of integer-to-integer wavelet transform and Arnold transform

    Get PDF
    Unauthorized redistribution and illegal copying of digital contents are serious issues which have affected numerous types of digital contents such as digital video. One of the methods, which have been suggested to support copyright protection, is to hide digital watermark within the digital video. This paper introduces a new video watermarking system which based on a combination of Arnold transform and integer wavelet transforms (IWT). IWT is employed to decompose the cover video frames whereby Arnold transform is used to scramble the watermark which is a grey scale image. Scrambling the watermark before the concealment makes the transmission more secure by disordering the information. The system performance was benchmarked against related video watermarking schemes, in which the evaluation processes consist of testing against several video operations and attacks. Consequently, the scheme has been demonstrated to be perfectly robust

    Texture analysis using local ternary pattern for face anti-spoofing

    Get PDF
    This paper proposes a new face anti-spoofing approach based on analysis of texture characteristics. Photo images are used for spoofing the face recognition and verification system. These photos are similar to the images of a live person which are exhibiting quite different contrast and texture characteristics when compared to real face images. Various feature extraction methods for texture classification including local Binary Patterns emerge as one of the most popular method because of its simplicity and classification accuracy. However, in homogenous regions, the order of the pixel with respect to its neighbors is quite noisy which can affect the performance of Local Binary Pattern. This paper demonstrates the use of local Ternary Pattern (LTP) in face liveness detection system to overcome this problem. The LTP approach is tested on three publicly available NUAA Photograph Imposter database, CASIA Face Anti -Spoofing Database and REPLAY-ATTACK database. Moreover, different experiments are performed by applying different sizes of neighbor pixels and radius of the patches. The test results are compared with the LBP operator and other state-of art work. The proposed face anti-spoofing method performs better than conventional texture based methods

    A multi-purpose watermarking scheme based on hybrid of lifting wavelet transform and Arnold transform

    Get PDF
    This paper introduces a new multi-purpose image watermarking algorithm which based on a hybrid of lifting wavelet transform (LWT) and Arnold transform for copyright protection and image authentication. In the proposed scheme, the original image is first decomposed by LWT into four subbands. Then the robust watermark which is a binary logo image is decomposed by Discrete Wavelet Transform (DWT) as such only the high frequency subband of the watermark are embedded in the low frequency subband of the original image. The fragile watermark is block wise self-generated from the original image and scrambled using Arnold transform which is later embedded in the spatial domain of the robust watermarked image. Self-generated fragile watermark supports self-authentication with high localization, whereas scrambling the fragile watermark increases the security of the algorithm. On the other hand, the lifting scheme approaches have almost one half the amounts of operations compared to the DWT based approaches. The overall system has been tested against various attacks and the results demonstrated that the robust watermark can be decoded successively under each attack. In addition, the proposed algorithm can detect any tampering attempts

    A study on multipurpose watermarking techniques for image

    Get PDF
    Conventional single watermark systems are mainly aimed at accomplishing a single goal, either for forgery detection or image copyright protection. This limitation has resulted in the introduction of multipurpose or otherwise known as multifunction watermarking algorithms, with the prime objective of simultaneously achieving both goals. Research in this domain has attracted tremendous interest in recent years, mainly due to its challenging nature in effectively satisfying both aims without degrading one another. However, most of the recent studies have not indicated a clear distinction between multipurpose and multiple watermarks (or cocktail watermarking) algorithms. This paper differentiates between these two types of digital watermarking systems and focuses on multipurpose watermarking due to its significance. In addition, it presents a state of the art survey on the theories, models, features, and algorithms that have been implemented in designing a multipurpose watermarking algorithm. It highlights the recent trends in related techniques and most reliable results attained, whilst also pointing the possible future research directions that can be investigated

    Design of high performance copyright protection watermarking based on lifting wavelet transform and bi empirical mode decomposition

    Get PDF
    This paper developed new and efficient image watermarking scheme for copyright protection based on Lifting wavelet transform (LWT) and Bi- dimensional Empirical Mode Decomposition (BEMD). A LWT has been selected because it is fast, less computational cost and maintains the integrity of the recovered watermark. The BEMD transform can separate the image from the most robust to the least sensitive or fragile frequency bands. This advantage is utilised in this study for the purpose of embedding the watermark in the robust part of BEMD, i.e. the residue (r). In addition, the embedding process has been performed in the low sub-band of LWT decomposed image as the low sub-band is more robust to image processing such as JPEG compression. The robust watermark which is grey scale image is decomposed using DWT to enhance the security and select only high sub-band as it has less impact on the quality of the watermarked image. As a result, the original image’s visual quality can be preserved and the concealed watermark could be successfully retrieved even if the watermarked images have undergone severe attacks like JPEG, rotation, Gamma correction, filtering, additive noise, translation, shearing, and scaling. Furthermore, the improved scheme offers greater robustness against many image processing operations, in comparison to the current schemes about copyright protection

    Design of robust and fragile image watermarking system for copyright protection and authentication using lifting wavelet transform and bivariate empirical mode decomposition techniques

    Get PDF
    In this thesis, a dual purpose watermarking system is designed that satisfy both robustness and fragility, and thus combining copyright protection and tamper proofing simultaneously without significantly degrading each other. The proposed copyright scheme is new and effective. Two transforms which are; lifting wavelet transform (LWT) and bivariate empirical mode decomposition (BEMD), are used to decompose the original image to provide flexibility in choosing the robust frequency subband of the original image. LWT, is chosen as it is fast and keeps the integrity of the retrieved watermark. While BEMD could sift the image from the most robust to the least sensitive (fragile) frequency bands. This property is exploited in this thesis to embed the watermark in the robust part of BEMD which is the residue (r). To ensure the integrity and authenticity of digital images, a wide variety of authentication schemes have been proposed in the literature to detect image tampering. However, most of the existing schemes either fail to address this issue or use inaccurate method to evaluate the system performance. For this reason, a procedure to generate a new type of fragile watermark that can detect any tampering is developed in this thesis. The most sensitive subbands of the BEMD which are Intrinsic Mode Function (IMFs) are used to derive and embed the watermark bits in the frequency domain and further processed to increase the security and the ability to detect any alteration. Another watermark is generated and embedded in the spatial domain using block wise method and the Least Significant Bits (LSBs) insertion. The dual-purpose scheme is obtained by combining both the copyright protection and image authentication schemes and has been subjected to robust and fragile attacks. The results demonstrated that the performance of the scheme remains at par or only degrade at an acceptable level after inserting the dual watermarks. The obtained visual quality, Peak Signal to Noise Ratio (PSNR), is greater than 48dB and the Normalised Cross Correlation (NCC) is greater than 0.97 while the tampering detection rate (AV) is greater than 94%

    Face Liveness Detection Using Dynamic Local Ternary Pattern (DLTP)

    No full text
    Face spoofing is considered to be one of the prominent threats to face recognition systems. However, in order to improve the security measures of such biometric systems against deliberate spoof attacks, liveness detection has received significant recent attention from researchers. For this purpose, analysis of facial skin texture properties becomes more popular because of its limited resource requirement and lower processing cost. The traditional method of skin analysis for liveness detection was to use Local Binary Pattern (LBP) and its variants. LBP descriptors are effective, but they may exhibit certain limitations in near uniform patterns. Thus, in this paper, we demonstrate the effectiveness of Local Ternary Pattern (LTP) as an alternative to LBP. In addition, we adopted Dynamic Local Ternary Pattern (DLTP), which eliminates the manual threshold setting in LTP by using Weber’s law. The proposed method was tested rigorously on four facial spoof databases: three are public domain databases and the other is the Universiti Putra Malaysia (UPM) face spoof database, which was compiled through this study. The results obtained from the proposed DLTP texture descriptor attained optimum accuracy and clearly outperformed the reported LBP and LTP texture descriptors
    corecore