The document describes a video watermarking scheme based on discrete wavelet transform (DWT) and principal component analysis (PCA) for copyright protection. The scheme embeds a binary logo watermark into video frames by applying DWT to decompose frames into sub-bands, then applying block-based PCA on sub-blocks of low and high frequency sub-bands. The watermark is embedded into the principal components of the sub-blocks. Algorithms are provided for applying DWT, PCA transforms, and embedding and extracting the watermark. The scheme aims to provide imperceptibility, robustness against attacks, and ownership protection for digital video content.
Nowadays, digital watermarking has many
applications such as broadcast monitoring, owner identification,
proof of ownership, transaction tracking. Embedding a hidden
stream of bits in a file is called Digital Watermarking. This paper
introduces a LSB information hiding algorithm which can lift the
wavelet transform image. LSB based Steganography embeds the
hiding text message in least significant bit of the pixels. The
proposed method has good invisibility, robustness for a lot of
hidden attacks. As we think about the capacity lead us to think
about improved approach which can be achieved through
hardware implementation system by using Field Programmable
Gate Array (FPGA). In this paper hardware implementation of
digital watermarking system is proposed. MATLAB is used to
convert images into pixel-format files and to observe simulation
results. To implement this paper XPS & VB are needed. In XPS,
first select hardware & software components then by adding
source and header files & converting into bit streams and
download into FPGA, to obtain Stego image.
This document summarizes a research paper that proposes a novel video watermarking scheme using discrete wavelet transform (DWT) and principal component analysis (PCA). The scheme embeds a binary logo watermark into video frames for copyright protection. PCA is applied to blocks of two bands (LL-HH) resulting from DWT of video frames. The watermark is embedded into the principal components of LL and HH blocks at different levels. Combining DWT and PCA improves the watermarking performance by distributing the watermark bits over sub-bands, increasing robustness to attacks. The scheme provides imperceptible watermarking that is robust against various attacks such as geometric transformations and brightness/contrast adjustments.
This document discusses and compares two digital image watermarking techniques: discrete cosine transform (DCT) domain watermarking and discrete wavelet transform (DWT) domain watermarking. It first provides background on digital watermarking and explains watermark embedding and extraction processes in both the spatial and frequency domains. It then proposes a specific DCT watermarking technique that embeds a watermark by modifying mid-band DCT coefficients of divided image blocks. A DWT watermarking technique is also proposed that embeds a watermark in the low-high band of the DWT. Finally, the document indicates that experimental results will be used to compare the robustness of the two techniques against various attacks.
DWT Based Audio Watermarking Schemes : A Comparative Study ijcisjournal
The main problem encountered during multimedia transmission is its protection against illegal distribution
and copying. One of the possible solutions for this is digital watermarking. Digital audio watermarking is
the technique of embedding watermark content to the audio signal to protect the owner copyrights. In this
paper, we used three wavelet transforms i.e. Discrete Wavelet Transform (DWT), Double Density DWT
(DDDWT) and Dual Tree DWT (DTDWT) for audio watermarking and the performance analysis of each
transform is presented. The key idea of the basic algorithm is to segment the audio signal into two parts,
one is for synchronization code insertion and other one is for watermark embedding. Initially, binary
watermark image is scrambled using chaotic technique to provide secrecy. By using QuantizationIndex
Modulation (QIM), this method works as a blind technique. The comparative analysis of the three methods
is made by conducting robustness and imperceptibility tests are conducted on five benchmark audio
signals.
This document presents a new algorithm for progressive medical image coding using binary wavelet transforms (BWT). It divides grayscale medical images into binary bit-planes and applies a three-level BWT to each bit-plane. It then encodes each BWT bit-plane using quadtree-based partitioning to exploit the energy concentration in high-frequency subbands. Experiments on ultrasound, MRI and CT images show it provides significant improvements in bitrate for required quality compared to existing progressive image coding methods.
This document presents a DWT-based video watermarking algorithm that embeds a watermark into randomly selected video frames in the mid-frequency DWT coefficients. The algorithm first divides the video into frames and extracts the blue channel of randomly selected frames. It then applies DWT to the blue channel, extracts the mid-frequency components, and embeds the watermark by modifying these coefficients. After inverse DWT and recombining the color channels, the watermarked frames are assembled into the watermarked video. The algorithm was tested on standard videos and performance was measured using PSNR and MSE between the original and watermarked videos.
A Hybrid DWT-SVD Method for Digital Video Watermarking Using Random Frame Sel...researchinventy
This document presents a hybrid DWT-SVD method for digital video watermarking using random frame selection. The proposed method embeds a watermark into randomly selected video frames by applying discrete wavelet transform and singular value decomposition. The blue channel of selected frames is used for watermark embedding in the mid-frequency DWT coefficients. Experimental results show the method provides good imperceptibility and robustness against various attacks like compression, cropping, noise addition, contrast changes and tampering. The normalization coefficient between original and extracted watermarks is used to evaluate the performance under different attacks.
High Speed and Area Efficient 2D DWT Processor Based Image Compressionsipij
The document describes a proposed high speed and area efficient 2D discrete wavelet transform (DWT) processor design for image compression applications implemented on FPGAs. The design uses a pipelined partially serial architecture to enhance speed while optimally utilizing FPGA resources. Simulation results show the design operating at 231MHz on a Spartan 3 FPGA, a 15% improvement over alternative designs. Resource utilization and speed are improved compared to previous implementations through the optimized DWT processor architecture and FPGA platform choice.
Nowadays, digital watermarking has many
applications such as broadcast monitoring, owner identification,
proof of ownership, transaction tracking. Embedding a hidden
stream of bits in a file is called Digital Watermarking. This paper
introduces a LSB information hiding algorithm which can lift the
wavelet transform image. LSB based Steganography embeds the
hiding text message in least significant bit of the pixels. The
proposed method has good invisibility, robustness for a lot of
hidden attacks. As we think about the capacity lead us to think
about improved approach which can be achieved through
hardware implementation system by using Field Programmable
Gate Array (FPGA). In this paper hardware implementation of
digital watermarking system is proposed. MATLAB is used to
convert images into pixel-format files and to observe simulation
results. To implement this paper XPS & VB are needed. In XPS,
first select hardware & software components then by adding
source and header files & converting into bit streams and
download into FPGA, to obtain Stego image.
This document summarizes a research paper that proposes a novel video watermarking scheme using discrete wavelet transform (DWT) and principal component analysis (PCA). The scheme embeds a binary logo watermark into video frames for copyright protection. PCA is applied to blocks of two bands (LL-HH) resulting from DWT of video frames. The watermark is embedded into the principal components of LL and HH blocks at different levels. Combining DWT and PCA improves the watermarking performance by distributing the watermark bits over sub-bands, increasing robustness to attacks. The scheme provides imperceptible watermarking that is robust against various attacks such as geometric transformations and brightness/contrast adjustments.
This document discusses and compares two digital image watermarking techniques: discrete cosine transform (DCT) domain watermarking and discrete wavelet transform (DWT) domain watermarking. It first provides background on digital watermarking and explains watermark embedding and extraction processes in both the spatial and frequency domains. It then proposes a specific DCT watermarking technique that embeds a watermark by modifying mid-band DCT coefficients of divided image blocks. A DWT watermarking technique is also proposed that embeds a watermark in the low-high band of the DWT. Finally, the document indicates that experimental results will be used to compare the robustness of the two techniques against various attacks.
DWT Based Audio Watermarking Schemes : A Comparative Study ijcisjournal
The main problem encountered during multimedia transmission is its protection against illegal distribution
and copying. One of the possible solutions for this is digital watermarking. Digital audio watermarking is
the technique of embedding watermark content to the audio signal to protect the owner copyrights. In this
paper, we used three wavelet transforms i.e. Discrete Wavelet Transform (DWT), Double Density DWT
(DDDWT) and Dual Tree DWT (DTDWT) for audio watermarking and the performance analysis of each
transform is presented. The key idea of the basic algorithm is to segment the audio signal into two parts,
one is for synchronization code insertion and other one is for watermark embedding. Initially, binary
watermark image is scrambled using chaotic technique to provide secrecy. By using QuantizationIndex
Modulation (QIM), this method works as a blind technique. The comparative analysis of the three methods
is made by conducting robustness and imperceptibility tests are conducted on five benchmark audio
signals.
This document presents a new algorithm for progressive medical image coding using binary wavelet transforms (BWT). It divides grayscale medical images into binary bit-planes and applies a three-level BWT to each bit-plane. It then encodes each BWT bit-plane using quadtree-based partitioning to exploit the energy concentration in high-frequency subbands. Experiments on ultrasound, MRI and CT images show it provides significant improvements in bitrate for required quality compared to existing progressive image coding methods.
This document presents a DWT-based video watermarking algorithm that embeds a watermark into randomly selected video frames in the mid-frequency DWT coefficients. The algorithm first divides the video into frames and extracts the blue channel of randomly selected frames. It then applies DWT to the blue channel, extracts the mid-frequency components, and embeds the watermark by modifying these coefficients. After inverse DWT and recombining the color channels, the watermarked frames are assembled into the watermarked video. The algorithm was tested on standard videos and performance was measured using PSNR and MSE between the original and watermarked videos.
A Hybrid DWT-SVD Method for Digital Video Watermarking Using Random Frame Sel...researchinventy
This document presents a hybrid DWT-SVD method for digital video watermarking using random frame selection. The proposed method embeds a watermark into randomly selected video frames by applying discrete wavelet transform and singular value decomposition. The blue channel of selected frames is used for watermark embedding in the mid-frequency DWT coefficients. Experimental results show the method provides good imperceptibility and robustness against various attacks like compression, cropping, noise addition, contrast changes and tampering. The normalization coefficient between original and extracted watermarks is used to evaluate the performance under different attacks.
High Speed and Area Efficient 2D DWT Processor Based Image Compressionsipij
The document describes a proposed high speed and area efficient 2D discrete wavelet transform (DWT) processor design for image compression applications implemented on FPGAs. The design uses a pipelined partially serial architecture to enhance speed while optimally utilizing FPGA resources. Simulation results show the design operating at 231MHz on a Spartan 3 FPGA, a 15% improvement over alternative designs. Resource utilization and speed are improved compared to previous implementations through the optimized DWT processor architecture and FPGA platform choice.
Multiple Binary Images Watermarking in Spatial and Frequency Domainssipij
Editing, reproduction and distribution of the digital multimedia are becoming extremely easier and faster with the existence of the internet and the availability of pervasive and powerful multimedia tools. Digital watermarking has emerged as a possible method to tackle these issues. This paper proposes a scheme using which more data can be inserted into an image in different domains using different techniques. This increases the embedding capacity. Using the proposed scheme 24 binary images can be embedded in the DCT domain and 12 binary images can be embedded in the spatial domain using LSB substitution technique in a single RGB image. The proposed scheme also provides an extra level of security to the watermark image by scrambling the image before embedding it into the host image. Experimental results show that the proposed watermarking method results in almost invisible difference between the watermarked image and the original image and is also robust against various image processing attacks.
Abstract: The increasing amount of applications using digital multimedia technologies has accentuated the need to provide copyright protection to multimedia data. This paper reviews one of the data hiding techniques - digital image watermarking. Through this paper we will explore some basic concepts of digital image watermarking techniques.Two different methods of digital image watermarking namely spatial domain watermarking and transform domain watermarking are briefly discussed in this paper. Furthermore, two different algorithms for a digital image watermarking have also been discussed. Also the comparision between the different algorithms,tests performed for the robustness and the applications of the digital image watermarking have also been discussed.
International journal of signal and image processing issues vol 2015 - no 1...sophiabelthome
This document discusses a method for embedding a binary watermark image into a digital video using a hybrid of three transforms: discrete cosine transform (DCT), discrete wavelet transform (DWT), and singular value decomposition (SVD). The method first applies DCT to frames of the video, then applies three-level DWT to the transformed frames. SVD is then applied to both the transformed video frames and the watermark image. The watermark is embedded by modifying coefficients of the video based on the SVD results. PSNR, MSE, and correlation are used to evaluate the quality and robustness of the watermarked video.
Digital video watermarking using modified lsb and dct techniqueeSAT Publishing House
IJRET : International Journal of Research in Engineering and Technology is an international peer reviewed, online journal published by eSAT Publishing House for the enhancement of research in various disciplines of Engineering and Technology. The aim and scope of the journal is to provide an academic medium and an important reference for the advancement and dissemination of research results that support high-level learning, teaching and research in the fields of Engineering and Technology. We bring together Scientists, Academician, Field Engineers, Scholars and Students of related fields of Engineering and Technology
DWT-DCT-SVD Based Semi Blind Image Watermarking Using Middle Frequency BandIOSR Journals
This document summarizes a research paper that proposes a semi-blind image watermarking technique using discrete wavelet transform (DWT), discrete cosine transform (DCT), and singular value decomposition (SVD). The technique embeds a watermark in the middle frequency band of the DWT domain of a host image. It modifies the singular values of the DCT coefficients of the middle frequency band using singular values of the DCT transformed watermark. The watermark can then be extracted from the watermarked image using inverse processes. The technique was tested on various attacks and showed robustness, with correlation values between the extracted and original watermarks ranging from 0.5308 to 0.9665 and PSNR values indicating impercept
Robust Image Watermarking Scheme Based on Wavelet TechniqueCSCJournals
In this paper, an image watermarking scheme based on multi bands wavelet transformation method is proposed. At first, the proposed scheme is tested on the spatial domain (for both a non and semi blind techniques) in order to compare its results with a frequency domain. In the frequency domain, an adaptive scheme is designed and implemented based on the bands selection criteria to embed the watermark. These criteria depend on the number of wavelet passes. In this work three methods are developed to embed the watermark (one band (LL|HH|HL|LH), two bands (LL&HH | LL&HL | LL&LH | HL&LH | HL&HH | LH&HH) and three bands (LL&HL&LH | LL&HH&HL | LL&HH&LH | LH&HH&HL) selection. The analysis results indicate that the performance of the proposed watermarking scheme for the non-blind scheme is much better than semi-blind scheme in terms of similarity of extracted watermark, while the security of semi-blind is relatively high. The results show that in frequency domain when the watermark is added to the two bands (HL and LH) for No. of pass =3 led to good correlation between original and extracted watermark around (similarity = 99%), and leads to reconstructed images of good objective quality (PSNR=24 dB) after JPEG compression attack (QF=25). The disadvantage of the scheme is the involvement of a large number of wavelet bands in the embedding process.
This document discusses different techniques for digital image watermarking, including in the spatial and frequency domains. It provides an overview of watermarking concepts and applications. It then describes two watermarking algorithms - one that embeds watermarks in the spatial domain by modifying pixel intensities in selected image blocks, and another that embeds watermarks in the wavelet domain by modifying selected wavelet coefficients. Both algorithms are described step-by-step and include watermark insertion and extraction procedures. Results are provided showing the performance of the algorithms under different attacks in terms of normalized cross-correlation between the original and extracted watermarks.
Watermarking Scheme based on Redundant Discrete Wavelet Transform and SVDIRJET Journal
This document presents a watermarking scheme based on Redundant Discrete Wavelet Transform (RDWT) and Singular Value Decomposition (SVD) with the following key points:
1. The host image is first transformed into the wavelet domain using 1-level RDWT. SVD is then applied to embed the watermark by modifying the singular values of the host and watermark images.
2. For extraction, the watermarked image is transformed using RDWT and SVD to recover the singular values. The extracted watermark is obtained by calculating the difference between the singular values of the watermarked and original host images.
3. Experimental results on standard test images show the scheme is robust against various attacks
This document summarizes a research paper that proposes a new digital image watermarking technique using discrete wavelet transform and singular value decomposition (DWT-SVD). The technique embeds a watermark in the high frequency subbands of an image after applying DWT and SVD. Experimental results show the watermarked images have high quality as measured by PSNR. The extracted watermarks are robust to common image distortions like noise, filtering, and cropping as measured by normalized cross correlation. A comparison shows the proposed technique provides better image quality and watermark extraction than a previous DWT-based method. The technique could provide copyright protection for digital images.
SECURED COLOR IMAGE WATERMARKING TECHNIQUE IN DWT-DCT DOMAIN ijcseit
The multilayer secured DWT-DCT and YIQ color space based image watermarking technique with
robustness and better correlation is presented here. The security levels are increased by using multiple pn
sequences, Arnold scrambling, DWT domain, DCT domain and color space conversions. Peak signal to
noise ratio and Normalized correlations are used as measurement metrics. The 512x512 sized color images
with different histograms are used for testing and watermark of size 64x64 is embedded in HL region of
DWT and 4x4 DCT is used. ‘Haar’ wavelet is used for decomposition and direct flexing factor is used. We
got PSNR value is 63.9988 for flexing factor k=1 for Lena image and the maximum NC 0.9781 for flexing
factor k=4 in Q color space. The comparative performance in Y, I and Q color space is presented. The
technique is robust for different attacks like scaling, compression, rotation etc.
Hybrid Approach for Robust Digital Video WatermarkingIJSRD
With the growing popularity of internet and digital media, digital watermarking techniques have been developed to protect the copyright of multimedia objects such as text, audio, video, etc. So, we have proposed a hybrid video watermarking technique which takes the advantages of different transforms like DWT, DCT, SVD and Arnold Transform, which enhances more security and provides robustness to the watermark. In this paper method, video is divided into several groups of frames, and one of the frames is selected where watermark will be embedded. Before embedding watermark in a selected frame it will be pre-processed with Arnold Transform which will provide security to it. The selected plane of video frame are decomposed using DWT and high frequency band HH, middle frequency bands LH, HL are transformed with DCT. The DCT coefficients are SVD transformed which are embedded with corresponding transformed coefficients of watermarks along with Arnold Transform. The embedded watermark is extracted with inverse process of embedding. The proposed algorithm is tested with various video sequences using MATLAB 2013a. The distortion quality of original image and watermark is controlled by the Peak Signal to Noise Ratio, Signal to Noise Ratio and Mean square error of the watermarked frame with original frame.
IJCER (www.ijceronline.com) International Journal of computational Engineerin...ijceronline
The document discusses a proposed CDMA-based watermarking scheme that aims to improve robustness and message capacity. It begins with an overview of digital watermarking phases and concepts. It then discusses applying CDMA techniques to watermarking, modeling video as a bit plane stream, defining the watermark and spreading it using m-sequences. The watermark is inserted into video bit planes determined by a pseudorandom sequence. Experimental results showed the proposed scheme has higher robustness than conventional approaches under different attacks. Wavelet transforms and their use in watermark extraction are also briefly covered.
The embedding of a digital signature, or tag data is carried out in the frequency domain. The
high frequency varieties are chosen by any LH and HL in the wavelet domain which are to be
applicable in DCT. Coefficients are changed mid-frequency DCT coefficients such transactions by a
low frequency of the watermark to be embedded. Watermark can be recovered from the video by
selecting a random watermark of any reference framework. The proposed techniques are more
secure, robust and are efficient due to the use of static DCT. Watermark techniques uses a bands HL
and LH for adding watermark where the movement does not impact the quality the extracted
watermark until if the video displays for different types of malware attacks.
In this work we have taken three video watermarking techniques i.e. BIT GET (spatial),
DWT, DCT and one video formats ie.MPEG video to perform a comparative analysis of different
techniques using single video formats, to obtain the best performing technique for video
watermarking. Such that to increase robustness of the video and decrease the embedding time
Comparison of SVD & Pseudo Random Sequence based methods of Image Watermarkingijsrd.com
Due to the extensive use of digital media applications, multimedia security and copyright protection has gained tremendous importance. Digital watermarking is a technology used for the copyright protection of digital applications. Image watermarking is used to hide the special information into the image and to later detect and extract that special information. Watermarking can be implemented both in spatial and frequency domain. In this paper frequency domain techniques were experimented. The methods compared in this paper are image watermarking using singular value decomposition (SVD) based and image watermarking using discrete wavelet transform (DWT) and Pseudo random sequence. Our experiments show that former technique have low peak signal to noise ratio (PSNR) value and also requires cover data at the detection where as in the later case we don’t require cover data and PSNR value is good.
DIGITAL IMAGE WATERMARKING OF COMPRESSED IMAGE USING JPEG 2000 AND ENCRYPTION...ijiert bestjournal
The necessity for copyright protection,ownership v erification,and other issues for digital data are getting more and more value these days. For the rap id revolution in digital multimedia and the ease of creating similar and unauthorized data,the digital data can be copied or manipulated or distributed. So it is necessary to watermark the media content for tamper proofing or quality assessment or copy control. In this paper we propose a JPEG2000 compre ssion. The compression standard is chosen such that it provides higher compression ratio and the c ompressed byte stream are randomized by the encryption algorithm. In our paper watermarking was done in the compressed � encrypted domain. We use different watermarking techniques for this. Att empting to watermark such a randomized bit stream can cause a dramatic degradation of the media quali ty. Thus it is necessary to choose an encryption scheme that is both secure and will allow watermark ing in a predictable manner in the compressed encrypted domain. The projected method is a robust watermarking algorithm to watermark JPEG2000 compressed and encrypted images (grayscale) of size 512�512. The encryption algorithm in this paper uses stream cipher. While the estimated technique e mbeds watermark in the compressed-encrypted domain,and the extraction of watermark can be done in the encrypted domain. The proposed algorithm also conserves the confidentiality of data as the e mbedding process can be done on encrypted data.
A DWT based Dual Image Watermarking Technique for Authenticity and Watermark ...sipij
In this paper we propose a DWT based dual watermarking technique wherein both blind and non-blind algorithms are used for the copyright protection of the cover/host image and the watermark respectively. We use the concept of embedding two watermarks into the cover image by actually embedding only one, to authenticate the source image and protect the watermark simultaneously. Here the DWT coefficients of the primary watermark (logo) are modified using another smaller secondary binary image (sign) and the midfrequency coefficients of the cover/host image. Since the watermark has some features of host image embedded in it, the security is increased two-fold and it also protects the watermark from any misuse or copy attack. For this purpose a new pseudorandom generator based on the mathematical constant π has been developed and used successfully in various stages of the algorithm. We have also proposed a new approach of applying pseudo-randomness in selecting the watermark pixel values for embedding in the cover image. In all the existing techniques the randomness is incorporated in selecting the location to embed the watermark. This makes the embedding process more unpredictable. The cover image which is watermarked with the signed-logo is subjected to various attacks like cropping, rotation, JPEG compression, scaling and noising. From the results it has been found that it is very robust and has good invisibility as well.
Simple and Fast Implementation of Segmented Matrix Algorithm for Haar DWT on ...IDES Editor
Haar discrete wavelet transform (DWT), the
simplest among all DWTs, has diverse applications in signal
and image processing fields. A traditional approach for 2D
Haar DWT is 1D row operation followed by and 1D column
operation. In 2002, Chen and Liao presented a fast algorithm
for 2D Haar DWT based on segmented matrix. However, this
method is infeasible for its high computational requirements
for processing large sized images. In this paper, we have
implemented the segmented matrix algorithm on a low cost
NVIDIA’s GPU to achieve speedup in computation. The
efficiency of our GPU based implementation is measured and
compared with CPU based algorithms. Our experimental
results show performance improvement over a factor of 28.5
compared with Chen and Liao’s CPU based segmented matrix
algorithm and a factor of 8 compared to MATLAB’s wavelet
function for an image of size 2560×2560.
A New Watermarking Algorithm Based on Image Scrambling and SVD in the Wavelet...IDES Editor
A new watermarking algorithm which is based on
image scrambling and SVD in the wavelet domain is discussed
in this paper. In the proposed algorithm, chaotic signals are
generated using logistic mapping and are used for scrambling
the original watermark. The initial values of logistic mapping
are taken as private keys. The covert image is decomposed
into four bands using integer wavelet transform; we apply
SVD to each band and embed the
A Wavelet - Based Object Watermarking System for MPEG4 VideoCSCJournals
Efficient storage, transmission and use of video information are key requirements in many multimedia applications currently being addressed by MPEG-4. To fulfill these requirements, a new approach for representing video information which relies on an object-based representation, has been adopted. Therefore, object-based watermarking schemes are needed for copyright protection. This paper presents a novel object based watermarking solution for MPEG4 video authentication using the shape adaptive-discrete wavelet transform (SA-DWT). In order to make the watermark robust and transparent, the watermark is embedded in the average of wavelet blocks using the visual model based on the human visual system. Wavelet coefficients n least significant bits (LSBs) are adjusted in concert with the average. Simulation results shows that the proposed watermarking scheme is perceptually invisible and robust against many attacks such as lossy compression (e.g. MPEG1 and MPEG2,MPEG-4,H264)
here it introduces an efficient multi-resolution watermarking methodology for copyright protection of digital images. By adapting the watermark signal to the wavelet coefficients, the proposed method is highly image adaptive and the watermark signal can be strengthen in the most significant parts of the image. As this property also increases the watermark visibility, usage of the human visual system is incorporated to prevent perceptual visibility of embedded watermark signal. Experimental results show that the proposed system preserves the image quality and is vulnerable against most common image processing distortions. Furthermore, the hierarchical nature of wavelet transform allows for detection of watermark at various resolutions, resulting in reduction of the computational load needed for watermark detection based on the noise level. The performance of the proposed system is shown to be superior to that of other available schemes reported in the literature.
The document is a receipt for dental supplies received from the supplier DENTSPLY INTERNATIONAL MAILLEFER on January 24, 2013. It lists over 100 items received including files, burs, broaches, reamers, and other dental instruments. The items are coded and include descriptions and catalog numbers. A transport company delivered the supplies, which were received by the logistics coordinator.
Estimation of Metric Distance of Observations from the Average ScoreIOSR Journals
This document proposes a method to estimate the "metric distance" of observations from the average score in a population. Metric distance is defined as the number of subjects whose scores are lower or higher than a given subject's score relative to the average. Formulas are developed to calculate the metric distance and its variance for each subject. Hypothesis tests are proposed to test if a subject's metric distance is equal to a given value or to test if two subjects' metric distances are the same. The method is intended to help determine how many subjects are above or below average compared to a reference subject.
Multiple Binary Images Watermarking in Spatial and Frequency Domainssipij
Editing, reproduction and distribution of the digital multimedia are becoming extremely easier and faster with the existence of the internet and the availability of pervasive and powerful multimedia tools. Digital watermarking has emerged as a possible method to tackle these issues. This paper proposes a scheme using which more data can be inserted into an image in different domains using different techniques. This increases the embedding capacity. Using the proposed scheme 24 binary images can be embedded in the DCT domain and 12 binary images can be embedded in the spatial domain using LSB substitution technique in a single RGB image. The proposed scheme also provides an extra level of security to the watermark image by scrambling the image before embedding it into the host image. Experimental results show that the proposed watermarking method results in almost invisible difference between the watermarked image and the original image and is also robust against various image processing attacks.
Abstract: The increasing amount of applications using digital multimedia technologies has accentuated the need to provide copyright protection to multimedia data. This paper reviews one of the data hiding techniques - digital image watermarking. Through this paper we will explore some basic concepts of digital image watermarking techniques.Two different methods of digital image watermarking namely spatial domain watermarking and transform domain watermarking are briefly discussed in this paper. Furthermore, two different algorithms for a digital image watermarking have also been discussed. Also the comparision between the different algorithms,tests performed for the robustness and the applications of the digital image watermarking have also been discussed.
International journal of signal and image processing issues vol 2015 - no 1...sophiabelthome
This document discusses a method for embedding a binary watermark image into a digital video using a hybrid of three transforms: discrete cosine transform (DCT), discrete wavelet transform (DWT), and singular value decomposition (SVD). The method first applies DCT to frames of the video, then applies three-level DWT to the transformed frames. SVD is then applied to both the transformed video frames and the watermark image. The watermark is embedded by modifying coefficients of the video based on the SVD results. PSNR, MSE, and correlation are used to evaluate the quality and robustness of the watermarked video.
Digital video watermarking using modified lsb and dct techniqueeSAT Publishing House
IJRET : International Journal of Research in Engineering and Technology is an international peer reviewed, online journal published by eSAT Publishing House for the enhancement of research in various disciplines of Engineering and Technology. The aim and scope of the journal is to provide an academic medium and an important reference for the advancement and dissemination of research results that support high-level learning, teaching and research in the fields of Engineering and Technology. We bring together Scientists, Academician, Field Engineers, Scholars and Students of related fields of Engineering and Technology
DWT-DCT-SVD Based Semi Blind Image Watermarking Using Middle Frequency BandIOSR Journals
This document summarizes a research paper that proposes a semi-blind image watermarking technique using discrete wavelet transform (DWT), discrete cosine transform (DCT), and singular value decomposition (SVD). The technique embeds a watermark in the middle frequency band of the DWT domain of a host image. It modifies the singular values of the DCT coefficients of the middle frequency band using singular values of the DCT transformed watermark. The watermark can then be extracted from the watermarked image using inverse processes. The technique was tested on various attacks and showed robustness, with correlation values between the extracted and original watermarks ranging from 0.5308 to 0.9665 and PSNR values indicating impercept
Robust Image Watermarking Scheme Based on Wavelet TechniqueCSCJournals
In this paper, an image watermarking scheme based on multi bands wavelet transformation method is proposed. At first, the proposed scheme is tested on the spatial domain (for both a non and semi blind techniques) in order to compare its results with a frequency domain. In the frequency domain, an adaptive scheme is designed and implemented based on the bands selection criteria to embed the watermark. These criteria depend on the number of wavelet passes. In this work three methods are developed to embed the watermark (one band (LL|HH|HL|LH), two bands (LL&HH | LL&HL | LL&LH | HL&LH | HL&HH | LH&HH) and three bands (LL&HL&LH | LL&HH&HL | LL&HH&LH | LH&HH&HL) selection. The analysis results indicate that the performance of the proposed watermarking scheme for the non-blind scheme is much better than semi-blind scheme in terms of similarity of extracted watermark, while the security of semi-blind is relatively high. The results show that in frequency domain when the watermark is added to the two bands (HL and LH) for No. of pass =3 led to good correlation between original and extracted watermark around (similarity = 99%), and leads to reconstructed images of good objective quality (PSNR=24 dB) after JPEG compression attack (QF=25). The disadvantage of the scheme is the involvement of a large number of wavelet bands in the embedding process.
This document discusses different techniques for digital image watermarking, including in the spatial and frequency domains. It provides an overview of watermarking concepts and applications. It then describes two watermarking algorithms - one that embeds watermarks in the spatial domain by modifying pixel intensities in selected image blocks, and another that embeds watermarks in the wavelet domain by modifying selected wavelet coefficients. Both algorithms are described step-by-step and include watermark insertion and extraction procedures. Results are provided showing the performance of the algorithms under different attacks in terms of normalized cross-correlation between the original and extracted watermarks.
Watermarking Scheme based on Redundant Discrete Wavelet Transform and SVDIRJET Journal
This document presents a watermarking scheme based on Redundant Discrete Wavelet Transform (RDWT) and Singular Value Decomposition (SVD) with the following key points:
1. The host image is first transformed into the wavelet domain using 1-level RDWT. SVD is then applied to embed the watermark by modifying the singular values of the host and watermark images.
2. For extraction, the watermarked image is transformed using RDWT and SVD to recover the singular values. The extracted watermark is obtained by calculating the difference between the singular values of the watermarked and original host images.
3. Experimental results on standard test images show the scheme is robust against various attacks
This document summarizes a research paper that proposes a new digital image watermarking technique using discrete wavelet transform and singular value decomposition (DWT-SVD). The technique embeds a watermark in the high frequency subbands of an image after applying DWT and SVD. Experimental results show the watermarked images have high quality as measured by PSNR. The extracted watermarks are robust to common image distortions like noise, filtering, and cropping as measured by normalized cross correlation. A comparison shows the proposed technique provides better image quality and watermark extraction than a previous DWT-based method. The technique could provide copyright protection for digital images.
SECURED COLOR IMAGE WATERMARKING TECHNIQUE IN DWT-DCT DOMAIN ijcseit
The multilayer secured DWT-DCT and YIQ color space based image watermarking technique with
robustness and better correlation is presented here. The security levels are increased by using multiple pn
sequences, Arnold scrambling, DWT domain, DCT domain and color space conversions. Peak signal to
noise ratio and Normalized correlations are used as measurement metrics. The 512x512 sized color images
with different histograms are used for testing and watermark of size 64x64 is embedded in HL region of
DWT and 4x4 DCT is used. ‘Haar’ wavelet is used for decomposition and direct flexing factor is used. We
got PSNR value is 63.9988 for flexing factor k=1 for Lena image and the maximum NC 0.9781 for flexing
factor k=4 in Q color space. The comparative performance in Y, I and Q color space is presented. The
technique is robust for different attacks like scaling, compression, rotation etc.
Hybrid Approach for Robust Digital Video WatermarkingIJSRD
With the growing popularity of internet and digital media, digital watermarking techniques have been developed to protect the copyright of multimedia objects such as text, audio, video, etc. So, we have proposed a hybrid video watermarking technique which takes the advantages of different transforms like DWT, DCT, SVD and Arnold Transform, which enhances more security and provides robustness to the watermark. In this paper method, video is divided into several groups of frames, and one of the frames is selected where watermark will be embedded. Before embedding watermark in a selected frame it will be pre-processed with Arnold Transform which will provide security to it. The selected plane of video frame are decomposed using DWT and high frequency band HH, middle frequency bands LH, HL are transformed with DCT. The DCT coefficients are SVD transformed which are embedded with corresponding transformed coefficients of watermarks along with Arnold Transform. The embedded watermark is extracted with inverse process of embedding. The proposed algorithm is tested with various video sequences using MATLAB 2013a. The distortion quality of original image and watermark is controlled by the Peak Signal to Noise Ratio, Signal to Noise Ratio and Mean square error of the watermarked frame with original frame.
IJCER (www.ijceronline.com) International Journal of computational Engineerin...ijceronline
The document discusses a proposed CDMA-based watermarking scheme that aims to improve robustness and message capacity. It begins with an overview of digital watermarking phases and concepts. It then discusses applying CDMA techniques to watermarking, modeling video as a bit plane stream, defining the watermark and spreading it using m-sequences. The watermark is inserted into video bit planes determined by a pseudorandom sequence. Experimental results showed the proposed scheme has higher robustness than conventional approaches under different attacks. Wavelet transforms and their use in watermark extraction are also briefly covered.
The embedding of a digital signature, or tag data is carried out in the frequency domain. The
high frequency varieties are chosen by any LH and HL in the wavelet domain which are to be
applicable in DCT. Coefficients are changed mid-frequency DCT coefficients such transactions by a
low frequency of the watermark to be embedded. Watermark can be recovered from the video by
selecting a random watermark of any reference framework. The proposed techniques are more
secure, robust and are efficient due to the use of static DCT. Watermark techniques uses a bands HL
and LH for adding watermark where the movement does not impact the quality the extracted
watermark until if the video displays for different types of malware attacks.
In this work we have taken three video watermarking techniques i.e. BIT GET (spatial),
DWT, DCT and one video formats ie.MPEG video to perform a comparative analysis of different
techniques using single video formats, to obtain the best performing technique for video
watermarking. Such that to increase robustness of the video and decrease the embedding time
Comparison of SVD & Pseudo Random Sequence based methods of Image Watermarkingijsrd.com
Due to the extensive use of digital media applications, multimedia security and copyright protection has gained tremendous importance. Digital watermarking is a technology used for the copyright protection of digital applications. Image watermarking is used to hide the special information into the image and to later detect and extract that special information. Watermarking can be implemented both in spatial and frequency domain. In this paper frequency domain techniques were experimented. The methods compared in this paper are image watermarking using singular value decomposition (SVD) based and image watermarking using discrete wavelet transform (DWT) and Pseudo random sequence. Our experiments show that former technique have low peak signal to noise ratio (PSNR) value and also requires cover data at the detection where as in the later case we don’t require cover data and PSNR value is good.
DIGITAL IMAGE WATERMARKING OF COMPRESSED IMAGE USING JPEG 2000 AND ENCRYPTION...ijiert bestjournal
The necessity for copyright protection,ownership v erification,and other issues for digital data are getting more and more value these days. For the rap id revolution in digital multimedia and the ease of creating similar and unauthorized data,the digital data can be copied or manipulated or distributed. So it is necessary to watermark the media content for tamper proofing or quality assessment or copy control. In this paper we propose a JPEG2000 compre ssion. The compression standard is chosen such that it provides higher compression ratio and the c ompressed byte stream are randomized by the encryption algorithm. In our paper watermarking was done in the compressed � encrypted domain. We use different watermarking techniques for this. Att empting to watermark such a randomized bit stream can cause a dramatic degradation of the media quali ty. Thus it is necessary to choose an encryption scheme that is both secure and will allow watermark ing in a predictable manner in the compressed encrypted domain. The projected method is a robust watermarking algorithm to watermark JPEG2000 compressed and encrypted images (grayscale) of size 512�512. The encryption algorithm in this paper uses stream cipher. While the estimated technique e mbeds watermark in the compressed-encrypted domain,and the extraction of watermark can be done in the encrypted domain. The proposed algorithm also conserves the confidentiality of data as the e mbedding process can be done on encrypted data.
A DWT based Dual Image Watermarking Technique for Authenticity and Watermark ...sipij
In this paper we propose a DWT based dual watermarking technique wherein both blind and non-blind algorithms are used for the copyright protection of the cover/host image and the watermark respectively. We use the concept of embedding two watermarks into the cover image by actually embedding only one, to authenticate the source image and protect the watermark simultaneously. Here the DWT coefficients of the primary watermark (logo) are modified using another smaller secondary binary image (sign) and the midfrequency coefficients of the cover/host image. Since the watermark has some features of host image embedded in it, the security is increased two-fold and it also protects the watermark from any misuse or copy attack. For this purpose a new pseudorandom generator based on the mathematical constant π has been developed and used successfully in various stages of the algorithm. We have also proposed a new approach of applying pseudo-randomness in selecting the watermark pixel values for embedding in the cover image. In all the existing techniques the randomness is incorporated in selecting the location to embed the watermark. This makes the embedding process more unpredictable. The cover image which is watermarked with the signed-logo is subjected to various attacks like cropping, rotation, JPEG compression, scaling and noising. From the results it has been found that it is very robust and has good invisibility as well.
Simple and Fast Implementation of Segmented Matrix Algorithm for Haar DWT on ...IDES Editor
Haar discrete wavelet transform (DWT), the
simplest among all DWTs, has diverse applications in signal
and image processing fields. A traditional approach for 2D
Haar DWT is 1D row operation followed by and 1D column
operation. In 2002, Chen and Liao presented a fast algorithm
for 2D Haar DWT based on segmented matrix. However, this
method is infeasible for its high computational requirements
for processing large sized images. In this paper, we have
implemented the segmented matrix algorithm on a low cost
NVIDIA’s GPU to achieve speedup in computation. The
efficiency of our GPU based implementation is measured and
compared with CPU based algorithms. Our experimental
results show performance improvement over a factor of 28.5
compared with Chen and Liao’s CPU based segmented matrix
algorithm and a factor of 8 compared to MATLAB’s wavelet
function for an image of size 2560×2560.
A New Watermarking Algorithm Based on Image Scrambling and SVD in the Wavelet...IDES Editor
A new watermarking algorithm which is based on
image scrambling and SVD in the wavelet domain is discussed
in this paper. In the proposed algorithm, chaotic signals are
generated using logistic mapping and are used for scrambling
the original watermark. The initial values of logistic mapping
are taken as private keys. The covert image is decomposed
into four bands using integer wavelet transform; we apply
SVD to each band and embed the
A Wavelet - Based Object Watermarking System for MPEG4 VideoCSCJournals
Efficient storage, transmission and use of video information are key requirements in many multimedia applications currently being addressed by MPEG-4. To fulfill these requirements, a new approach for representing video information which relies on an object-based representation, has been adopted. Therefore, object-based watermarking schemes are needed for copyright protection. This paper presents a novel object based watermarking solution for MPEG4 video authentication using the shape adaptive-discrete wavelet transform (SA-DWT). In order to make the watermark robust and transparent, the watermark is embedded in the average of wavelet blocks using the visual model based on the human visual system. Wavelet coefficients n least significant bits (LSBs) are adjusted in concert with the average. Simulation results shows that the proposed watermarking scheme is perceptually invisible and robust against many attacks such as lossy compression (e.g. MPEG1 and MPEG2,MPEG-4,H264)
here it introduces an efficient multi-resolution watermarking methodology for copyright protection of digital images. By adapting the watermark signal to the wavelet coefficients, the proposed method is highly image adaptive and the watermark signal can be strengthen in the most significant parts of the image. As this property also increases the watermark visibility, usage of the human visual system is incorporated to prevent perceptual visibility of embedded watermark signal. Experimental results show that the proposed system preserves the image quality and is vulnerable against most common image processing distortions. Furthermore, the hierarchical nature of wavelet transform allows for detection of watermark at various resolutions, resulting in reduction of the computational load needed for watermark detection based on the noise level. The performance of the proposed system is shown to be superior to that of other available schemes reported in the literature.
The document is a receipt for dental supplies received from the supplier DENTSPLY INTERNATIONAL MAILLEFER on January 24, 2013. It lists over 100 items received including files, burs, broaches, reamers, and other dental instruments. The items are coded and include descriptions and catalog numbers. A transport company delivered the supplies, which were received by the logistics coordinator.
Estimation of Metric Distance of Observations from the Average ScoreIOSR Journals
This document proposes a method to estimate the "metric distance" of observations from the average score in a population. Metric distance is defined as the number of subjects whose scores are lower or higher than a given subject's score relative to the average. Formulas are developed to calculate the metric distance and its variance for each subject. Hypothesis tests are proposed to test if a subject's metric distance is equal to a given value or to test if two subjects' metric distances are the same. The method is intended to help determine how many subjects are above or below average compared to a reference subject.
Este documento describe los conceptos clave de la evaluación educativa, incluyendo técnicas, instrumentos y tipos de evaluación. Explica que la evaluación implica recoger información sobre el proceso de enseñanza y aprendizaje a través de observaciones sistemáticas y comprobaciones utilizando instrumentos como listas de cotejo, registros y pruebas. Además, distingue entre evaluación sumativa, formativa e inicial/procesual/final; y entre autoevaluación, coevaluación y heteroevaluación.
1) The document discusses the use of wind power generators as an alternative energy source for Nigeria given the inability of the national power company to meet demand.
2) It describes the basic principles of how wind power is converted to electrical power through a turbine that spins a generator, and discusses two main types of systems - constant speed constant frequency and variable speed constant frequency.
3) Potential sites in Nigeria for wind power generators are areas along beaches, some parts of Bauchi and Sokoto states where mean wind speeds are high, some highlands, and some riverine areas.
Modeling Of Carbon Deposit From Methane Gas On Zeolite Y Catalyst Activity In...IOSR Journals
This document summarizes a study that models carbon deposit from methane gas on Zeolite Y catalyst activity in a packed bed reactor. The study developed two computational fluid dynamic (CFD) models: 1) The first model considered the influence of carbon deposition on catalyst activity over time. Results showed carbon deposition increased over time while methane decreased and hydrogen increased, indicating methane decomposition. 2) The second model investigated the effect of carbon deposits on fluid flow over both time and space. The study aims to provide insight into how carbon deposition affects catalyst activity and gas flow through the packed bed reactor.
This document summarizes four different privacy preserving policies for online social networks: Safebook, Lockr, flyByNight, and Persona. Safebook is a decentralized social network that leverages real-life trust between users, with users' data stored and routed by trusted peers. Lockr improves privacy in centralized and decentralized content sharing systems. flyByNight aims to mitigate privacy risks through encrypting information on Facebook. Persona allows users to control who accesses their information. The policies differ in their trust models, ability to form flexible groups, and architectural approaches. Persona is identified as the relatively best method based on these parameters.
This document analyzes the energy in a Linear Variable Reluctance Motor Actuator (LVRM). LVRM is a modification of a Switched Reluctance Motor that operates based on transverse magnetic flux. The summary analyzes the magnetic field energy and co-field energy in the LVRM. It derives equations to calculate the magnetic force acting on the moving part of the LVRM based on the co-field energy and flux density. Key equations presented include those relating voltage, current, flux linkage and inductance to determine electrical power and stored energy in the LVRM.
Performance Comparison of Various Filters and Wavelet Transform for Image De-...IOSR Journals
This document compares different filtering and wavelet transform approaches for image de-noising. It adds three types of noise (Gaussian, salt and pepper, speckle) to an image and uses median, Wiener, Gaussian, average filters and wavelet transform to remove the noise. It evaluates the performance of each approach using peak signal-to-noise ratio and root mean square error. The results show that wavelet transform performs best for removing Gaussian and speckle noise, while median filtering works best for salt and pepper noise removal. Overall, wavelet transform is concluded to be very effective for de-noising all types of noise.
IOSR Journal of Electrical and Electronics Engineering(IOSR-JEEE) is an open access international journal that provides rapid publication (within a month) of articles in all areas of electrical and electronics engineering and its applications. The journal welcomes publications of high quality papers on theoretical developments and practical applications in electrical and electronics engineering. Original research papers, state-of-the-art reviews, and high quality technical notes are invited for publications.
Optimization of Mining Association Rule from XML DocumentsIOSR Journals
This document summarizes research on optimizing the mining of association rules from XML documents. It first provides background on association rule mining and challenges with semi-structured XML data. It then describes indexing XML elements and using an index table to extract transactions and items. The Apriori algorithm is used to generate association rules, but some rules are weak. The document proposes using an Ant Colony Optimization (ACO) algorithm to optimize the results by updating pheromone values based on rule confidence and pruning weak rules. ACO mimics how ants cooperate to find optimal paths; it is applied here to iteratively improve the generated association rule set.
IOSR Journal of Applied Physics (IOSR-JAP) is an open access international journal that provides rapid publication (within a month) of articles in all areas of physics and its applications. The journal welcomes publications of high quality papers on theoretical developments and practical applications in applied physics. Original research papers, state-of-the-art reviews, and high quality technical notes are invited for publications.
IOSR Journal of Applied Physics (IOSR-JAP) is an open access international journal that provides rapid publication (within a month) of articles in all areas of physics and its applications. The journal welcomes publications of high quality papers on theoretical developments and practical applications in applied physics. Original research papers, state-of-the-art reviews, and high quality technical notes are invited for publications.
The document proposes a novel method to characterize nonlinear channels in OFDM systems using spectral notch signals. The method involves transmitting OFDM frames with and without spectral notches and analyzing the difference signal. This allows the estimation of frequency-domain Volterra kernels to be decomposed into independent subtasks involving fewer coefficients, improving accuracy and reducing complexity compared to conventional methods. Simulations validate that the proposed method has lower computational complexity than existing approaches for estimating kernels of cubically nonlinear channels in real baseband OFDM systems.
An Adaptive Zero Voltage Mechanism for Boost ConverterIOSR Journals
This document describes an adaptive zero voltage mechanism proposed for a boost converter. The mechanism uses a variable frequency operation with a single switch instead of multiple switches to reduce size and improve efficiency. It achieves zero voltage switching to reduce switching losses and stresses. The control circuit uses PI control and adaptive feedback to maintain a constant output voltage despite input voltage or load variations. Simulation results show the converter successfully outputs a regulated 60V from a 40V input with the adaptive mechanism matching the resonant and switching frequencies for stability.
Design of Low Noise Amplifier for Wimax ApplicationIOSR Journals
The document describes the design of a low noise amplifier (LNA) for WiMAX applications operating in the 3.3-3.8 GHz range. It discusses testing the transistor to check for stability and gain. Input and output matching is performed using stub matching networks to achieve low noise figure and high gain. A passive biasing circuit is designed using resistors and capacitors. Two LNA techniques, feedback amplifier and balanced amplifier, are simulated to find the best performance; the feedback amplifier provides a nominal noise figure of 1.02 dB and gain of 12 dB.
Modeling of generation and propagation of cardiac action potential using frac...IOSR Journals
This document presents a model for simulating cardiac action potentials using fractional differential equations. The model builds off the existing Hund-Rudy dynamic model by replacing ordinary differential equations with fractional differential equations to more accurately model ion exchange mechanisms. The fractional model is shown to capture cardiac action potential generation and propagation with higher accuracy than ordinary differential equation models. An electrical circuit representation of the fractional model is also proposed to abstract the transmembrane ion exchange process.
Performance Analysis of CSI Based PV system During LL and TPG faultsIOSR Journals
This document analyzes the performance of a current source inverter (CSI)-based photovoltaic (PV) system during line-to-line (LL) and three-phase-to-ground (TPG) faults. It presents simulation results showing the CSI system is able to limit DC-side current oscillations during faults, unlike voltage source inverter systems. The controller regulates DC and AC currents to maximize PV power extraction and provide sinusoidal current to the grid. Simulation results show DC-side current oscillations dampen quickly after faults clear, while AC current undergoes overmodulation during faults. The CSI provides overcurrent protection and restricts currents on both sides during faults.
The document provides a reflection on learning from a preliminary task to a full product. It discusses areas for improvement like conducting research, planning better, and considering the audience. It also describes learning to use new software like Photoshop. The reflection notes the preliminary task lacked organization with too many fonts, while photographs were included on every page of the full product, which had a more professional and aesthetically pleasing design.
1) The document proposes a portable smart data server for small businesses that eliminates the need for internet infrastructure, hosting, website maintenance, and costly hardware. It uses an Android smartphone to function as the data server.
2) The system design involves using a smartphone's SQLite database to store data and a broadcast receiver to detect incoming requests via SMS. The business logic is invoked to process requests and send replies.
3) An implementation was created on an Android phone to demonstrate serving over 1000 requests with no errors and caching frequent queries. Comparisons show it requires low cost, space and power compared to traditional data servers.
Hybrid video watermarking technique by using dwt & pcaIAEME Publication
This document discusses a hybrid video watermarking technique that combines discrete wavelet transform (DWT) and principal component analysis (PCA). [1] DWT is applied to video frames to decompose them into subbands, and PCA is then applied to selected subbands. [2] A binary watermark logo is embedded differently into the LL and HH subbands - it is added to the first principal component of LL blocks and two pseudorandom sequences are used to embed in HH blocks. [3] Experimental results on the Foreman video sequence show the watermarked frames have high imperceptibility/PSNR compared to originals, and the extracted watermark is identical to the original with no attacks applied.
Advance Digital Video Watermarking based on DWT-PCA for Copyright protectionIJERA Editor
This document presents a digital video watermarking technique based on discrete wavelet transform (DWT) and principal component analysis (PCA). It begins with an introduction to digital watermarking and an overview of spatial and transform domain watermarking methods. The document then describes DWT and PCA in more detail. It presents a watermarking scheme that uses DWT to decompose video frames into frequency subbands, and embeds a watermark into the principal components of the low frequency subband after applying PCA. Experimental results on a test video show the watermarked frames have no visible quality differences from the original and the watermark is robust to various attacks. The technique achieves imperceptibility measured by high peak signal-to-
In Digital era sharing of images have become very
common and raises the risk of using it for unethical and
fraudulent purposes with the help of manipulation tools. Digital
image watermarking is one way to protect the digital information
(text, images, audio, and video) from fraudulent manipulations.
Digital Image Watermarking is a process of implanting data in
the original image for authentication. In this paper we are
providing one such watermarking scheme for color images. The
proposed method is designed to be robust for common attacks
with the aid of redundant discrete wavelet transform (RDWT)
and discrete cosine transform (DCT) properties. After applying
two levels RDWT decomposition to the blue channel of cover
image, we apply DCT to HH_LL subband i.e. 2nd level
decomposed coefficient of HH band and to the watermark.
Divided the HH_LL sub band into 4x4 subblocks and DCT
coefficients of the last subblock of the cover image are replaced
with the DCT coefficients of watermark. Inverse DCT and
inverse RDWT is performed to get watermarked image. The
performance of the proposed technique is measured using the
parameters PSNR and NCC.
International Journal for Research in Applied Science & Engineeringpriyanka singh
This document describes a method for embedding a secret watermark image into a QR code image using discrete wavelet transform. The watermark embedding process involves:
1) Performing a two-level discrete wavelet transform on the QR code image to create sub-bands
2) Converting the watermark image (e.g. a logo) to a binary sequence and generating a pseudo-random sequence with a secret key
3) Embedding the watermark bits into one of the high frequency sub-bands by modifying pixel values
4) Performing inverse discrete wavelet transform to get the watermarked QR code image
The watermark can then be extracted without the original QR code by estimating the original pixel values and
A Wavelet Based Hybrid SVD Algorithm for Digital Image Watermarkingsipij
In this paper we propose a hybrid image watermarking algorithm which satisfies both imperceptibility and robustness requirements. Our proposed work provide an optimum solution by using singular values of Wavelet Transformation’s HL and LH sub bands to embed watermark. Further to increase and control the strength of the watermark, we use a scale factor. An optimal watermark embedding method is developed to achieve minimum watermarking distortion. A secret embedding key is designed to securely embed the fragile watermarks so that the new method is robust to counterfeiting, even when the malicious attackers are fully aware of the watermark embedding algorithm. Experimental results are provided in terms of peak signal to noise ratio (PSNR), normalized cross correlation (NCC) and gain factor to demonstrate the effectiveness of the proposed algorithm. Image operations such as JPEG compression from malicious image attacks and, thus, can be used for semi-fragile watermarking.
Annotated Bibliography On Multimedia SecurityBrenda Higgins
This document discusses an efficient distributed arithmetic architecture for implementing the discrete wavelet transform (DWT) in JPEG2000 encoders. Distributed arithmetic is implemented to achieve multiplier-less computation in DWT filtering using a lookup table approach, which can reduce power consumption and hardware complexity compared to other DWT implementations. The main goals are to design high-speed digital filters for DWT using a parallel distributed arithmetic approach to speed up the computation.
IOSR Journal of Electronics and Communication Engineering(IOSR-JECE) is an open access international journal that provides rapid publication (within a month) of articles in all areas of electronics and communication engineering and its applications. The journal welcomes publications of high quality papers on theoretical developments and practical applications in electronics and communication engineering. Original research papers, state-of-the-art reviews, and high quality technical notes are invited for publications.
Digital video watermarking scheme using discrete wavelet transform and standa...eSAT Publishing House
IJRET : International Journal of Research in Engineering and Technology is an international peer reviewed, online journal published by eSAT Publishing House for the enhancement of research in various disciplines of Engineering and Technology. The aim and scope of the journal is to provide an academic medium and an important reference for the advancement and dissemination of research results that support high-level learning, teaching and research in the fields of Engineering and Technology. We bring together Scientists, Academician, Field Engineers, Scholars and Students of related fields of Engineering and Technology
SVD Based Robust Digital Watermarking For Still Images Using Wavelet Transform cscpconf
This paper aims at developing a hybrid image watermarking algorithm which satisfies both
imperceptibility and robustness requirements. In order to achieve our objectives we have used
singular values of Wavelet Transformation’s HL and LH sub bands to embed watermark.
Further to increase and control the strength of the watermark, we use a scale factor. An optimal
watermark embedding method is developed to achieve minimum watermarking distortion. A
secret embedding key is designed to securely embed the fragile watermarks so that the new
method is robust to counterfeiting, even when the malicious attackers are fully aware of the
watermark embedding algorithm. Experimental results are provided in terms of Peak signal to
noise ratio (PSNR), Normalized cross correlation (NCC) and gain factor to demonstrate the
effectiveness of the proposed algorithm. Image operations such as JPEG compression from
malicious image attacks and, thus, can be used for semi-fragile watermarking
A Novel Digital Watermarking Technique for Video Copyright Protection cscpconf
This paper proposes a novel digital video watermarking technique that embeds both visible and invisible watermarks for improved copyright protection. The invisible watermark is embedded using discrete wavelet transform (DWT) in the high-high (HH) subband coefficients of video frames. The visible watermark is embedded partially in video frames depending on user input location. Experimental results on a gray-scale video show the embedded watermarks can be extracted after attacks like salt and pepper noise, Gaussian noise, and median filtering, with peak signal-to-noise ratios above 28 dB, demonstrating the technique's robustness.
This document discusses techniques for effective compression of digital video. It introduces several key algorithms used in video compression, including discrete cosine transform (DCT) for spatial redundancy reduction, motion estimation (ME) for temporal redundancy reduction, and embedded zerotree wavelet (EZW) transforms. DCT is used to compress individual video frames by removing spatial correlations within frames. Motion estimation compares blocks of pixels between frames to find and encode motion vectors rather than full pixel values, reducing file size. Combined, these techniques can achieve high compression ratios while maintaining high video quality for storage and transmission.
Efficient video compression using EZWTIJERA Editor
In this article, wavelet based lossy video compression algorithm is presented. The motion estimation and compensation, being an important part in the compression, is based on segment movements. The proposed work is based on wavelet transform algorithm Embedded Zeroed WaveletTransform (EZWT). Based on the results of peak signal to noise ratio (PSNR), mean squared error (MSE), different videos are analyzed. Maintaining the PSNR to acceptable limits the proposed EZWT algorithm achieves very good compression ratios making the technique more efficient than the 2-Discrete Cosine Transform (DCT) in the H.264/AVC codec. The method is being suitable for low bit rate video showing highest compression ratio and very good PSNR of more than 30dB.
Design of digital video watermarking scheme using matlab simulinkeSAT Publishing House
IJRET : International Journal of Research in Engineering and Technology is an international peer reviewed, online journal published by eSAT Publishing House for the enhancement of research in various disciplines of Engineering and Technology. The aim and scope of the journal is to provide an academic medium and an important reference for the advancement and dissemination of research results that support high-level learning, teaching and research in the fields of Engineering and Technology. We bring together Scientists, Academician, Field Engineers, Scholars and Students of related fields of Engineering and Technology.
Design of digital video watermarking scheme using matlab simulinkeSAT Journals
Abstract
Due to increase in growth of internet users of networks are increasing rapidly. Owners of the digital products are concerned about illegal copying of their products. Security and copyright protection are becoming important issues in multimedia applications and services. Digital watermarking is a technology used for copyright protection of digital media. Here ownership information data called watermark is embedded into the digital media without affecting its perceptual quality. In case of any dispute, the watermark data can be detected or extracted from the media and use as a proof of ownership. Digital video watermarking scheme based on Discrete Wavelet Transform is addressed in this paper. Design of this scheme using Matlab Simulink is proposed. Embedded watermark is robust against various attacks that can be carried out on the watermarked video. Index Terms:Digital video, Discrete Wavelet Transform, Binary watermark.
This document discusses and compares two digital image watermarking techniques: discrete cosine transform (DCT) domain watermarking and discrete wavelet transform (DWT) domain watermarking. It first provides background on digital watermarking and explains watermark embedding and extraction processes in both the spatial and frequency domains. It then proposes a specific DCT watermarking technique that embeds a watermark by modifying mid-band DCT coefficients of divided image blocks. A DWT watermarking technique is also proposed that embeds a watermark in the LH sub-band of the DWT. Finally, the document indicates that experimental results will be used to compare the robustness of the two techniques against various attacks.
This document discusses video quality analysis for H.264 based on the human visual system. It proposes an improved video quality assessment method that adds color comparison to structural similarity measurement. The method separates similarity measurement into four comparisons: luminance, contrast, structure, and color. Experimental results on video sets with two distortion types show the proposed method's quality scores are more consistent with visual quality than classical methods. It also discusses the H.264 video coding standard and provides examples of encoding and decoding experimental results.
Implementation of digital image watermarking techniques using dwt and dwt svd...eSAT Journals
computerized substance. Data took care of on web and mixed media system framework is in advanced structure. Computerized watermarking is only the innovation in which there is inserting of different data in advanced substance, which we need to shield from illicit replicating. Computerized picture watermarking is concealing data in any structure (content, picture, sound and video) in unique picture without corrupting its perceptual quality. On the off chance that of Discrete Wavelet Transform (DWT), deterioration of the first picture is completed to insert the watermark. Moreover, if there should arise an occurrence of cross breed system (DWT-SVD) firstly picture is decayed by and after that watermark is installed in solitary qualities acquired by application of Singular Value Decomposition (SVD). DWT and SVD are utilized in combination to enhance the nature of watermarking. We have the procedures which are looked at on the premise of Peak Signal to Noise Ratio (PSNR) esteem at various benefits of scaling component; high estimation of PSNR is coveted because it displays great intangibility of the strategy.
Implementation of digital image watermarking techniques using dwt and dwt svd...eSAT Journals
Abstract
These days, in every field there is gigantic utilization of computerized substance. Data took care of on web and mixed media system framework is in advanced structure. Computerized watermarking is only the innovation in which there is inserting of different data in advanced substance, which we need to shield from illicit replicating. Computerized picture watermarking is concealing data in any structure (content, picture, sound and video) in unique picture without corrupting its perceptual quality. On the off chance that of Discrete Wavelet Transform (DWT), deterioration of the first picture is completed to insert the watermark. Moreover, if there should arise an occurrence of cross breed system (DWT-SVD) firstly picture is decayed by and after that watermark is installed in solitary qualities acquired by application of Singular Value Decomposition (SVD). DWT and SVD are utilized in combination to enhance the nature of watermarking. We have the procedures which are looked at on the premise of Peak Signal to Noise Ratio (PSNR) esteem at various benefits of scaling component; high estimation of PSNR is coveted because it displays great intangibility of the strategy.
Secure Image Transmission for Cloud Storage System Using Hybrid SchemeIJERD Editor
- Data over the cloud is transferred or transmitted between servers and users. Privacy of that
data is very important as it belongs to personal information. If data get hacked by the hacker, can be
used to defame a person’s social data. Sometimes delay are held during data transmission. i.e. Mobile
communication, bandwidth is low. Hence compression algorithms are proposed for fast and efficient
transmission, encryption is used for security purposes and blurring is used by providing additional
layers of security. These algorithms are hybridized for having a robust and efficient security and
transmission over cloud storage system.
IOSR journal of VLSI and Signal Processing (IOSRJVSP) is an open access journal that publishes articles which contribute new results in all areas of VLSI Design & Signal Processing. The goal of this journal is to bring together researchers and practitioners from academia and industry to focus on advanced VLSI Design & Signal Processing concepts and establishing new collaborations in these areas.
This document provides a technical review of secure banking using RSA and AES encryption methodologies. It discusses how RSA and AES are commonly used encryption standards for secure data transmission between ATMs and bank servers. The document first provides background on ATM security measures and risks of attacks. It then reviews related work analyzing encryption techniques. The document proposes using a one-time password in addition to a PIN for ATM authentication. It concludes that implementing encryption standards like RSA and AES can make transactions more secure and build trust in online banking.
This document analyzes the performance of various modulation schemes for achieving energy efficient communication over fading channels in wireless sensor networks. It finds that for long transmission distances, low-order modulations like BPSK are optimal due to their lower SNR requirements. However, as transmission distance decreases, higher-order modulations like 16-QAM and 64-QAM become more optimal since they can transmit more bits per symbol, outweighing their higher SNR needs. Simulations show lifetime extensions up to 550% are possible in short-range networks by using higher-order modulations instead of just BPSK. The optimal modulation depends on transmission distance and balancing the energy used by electronic components versus power amplifiers.
This document provides a review of mobility management techniques in vehicular ad hoc networks (VANETs). It discusses three modes of communication in VANETs: vehicle-to-infrastructure (V2I), vehicle-to-vehicle (V2V), and hybrid vehicle (HV) communication. For each communication mode, different mobility management schemes are required due to their unique characteristics. The document also discusses mobility management challenges in VANETs and outlines some open research issues in improving mobility management for seamless communication in these dynamic networks.
This document provides a review of different techniques for segmenting brain MRI images to detect tumors. It compares the K-means and Fuzzy C-means clustering algorithms. K-means is an exclusive clustering algorithm that groups data points into distinct clusters, while Fuzzy C-means is an overlapping clustering algorithm that allows data points to belong to multiple clusters. The document finds that Fuzzy C-means requires more time for brain tumor detection compared to other methods like hierarchical clustering or K-means. It also reviews related work applying these clustering algorithms to segment brain MRI images.
1) The document simulates and compares the performance of AODV and DSDV routing protocols in a mobile ad hoc network under three conditions: when users are fixed, when users move towards the base station, and when users move away from the base station.
2) The results show that both protocols have higher packet delivery and lower packet loss when users are either fixed or moving towards the base station, since signal strength is better in those scenarios. Performance degrades when users move away from the base station due to weaker signals.
3) AODV generally has better performance than DSDV, with higher throughput and packet delivery rates observed across the different user mobility conditions.
This document describes the design and implementation of 4-bit QPSK and 256-bit QAM modulation techniques using MATLAB. It compares the two techniques based on SNR, BER, and efficiency. The key steps of implementing each technique in MATLAB are outlined, including generating random bits, modulation, adding noise, and measuring BER. Simulation results show scatter plots and eye diagrams of the modulated signals. A table compares the results, showing that 256-bit QAM provides better performance than 4-bit QPSK. The document concludes that QAM modulation is more effective for digital transmission systems.
The document proposes a hybrid technique using Anisotropic Scale Invariant Feature Transform (A-SIFT) and Robust Ensemble Support Vector Machine (RESVM) to accurately identify faces in images. A-SIFT improves upon traditional SIFT by applying anisotropic scaling to extract richer directional keypoints. Keypoints are processed with RESVM and hypothesis testing to increase accuracy above 95% by repeatedly reprocessing images until the threshold is met. The technique was tested on similar and different facial images and achieved better results than SIFT in retrieval time and reduced keypoints.
This document studies the effects of dielectric superstrate thickness on microstrip patch antenna parameters. Three types of probes-fed patch antennas (rectangular, circular, and square) were designed to operate at 2.4 GHz using Arlondiclad 880 substrate. The antennas were tested with and without an Arlondiclad 880 superstrate of varying thicknesses. It was found that adding a superstrate slightly degraded performance by lowering the resonant frequency and increasing return loss and VSWR, while decreasing bandwidth and gain. Specifically, increasing the superstrate thickness or dielectric constant resulted in greater changes to the antenna parameters.
This document describes a wireless environment monitoring system that utilizes soil energy as a sustainable power source for wireless sensors. The system uses a microbial fuel cell to generate electricity from the microbial activity in soil. Two microbial fuel cells were created using different soil types and various additives to produce different current and voltage outputs. An electronic circuit was designed on a printed circuit board with components like a microcontroller and ZigBee transceiver. Sensors for temperature and humidity were connected to the circuit to monitor the environment wirelessly. The system provides a low-cost way to power remote sensors without needing battery replacement and avoids the high costs of wiring a power source.
1) The document proposes a model for a frequency tunable inverted-F antenna that uses ferrite material.
2) The resonant frequency of the antenna can be significantly shifted from 2.41GHz to 3.15GHz, a 31% shift, by increasing the static magnetic field placed on the ferrite material.
3) Altering the permeability of the ferrite allows tuning of the antenna's resonant frequency without changing the physical dimensions, providing flexibility to operate over a wide frequency range.
This document summarizes a research paper that presents a speech enhancement method using stationary wavelet transform. The method first classifies speech into voiced, unvoiced, and silence regions based on short-time energy. It then applies different thresholding techniques to the wavelet coefficients of each region - modified hard thresholding for voiced speech, semi-soft thresholding for unvoiced speech, and setting coefficients to zero for silence. Experimental results using speech from the TIMIT database corrupted with white Gaussian noise at various SNR levels show improved performance over other popular denoising methods.
This document reviews the design of an energy-optimized wireless sensor node that encrypts data for transmission. It discusses how sensing schemes that group nodes into clusters and transmit aggregated data can reduce energy consumption compared to individual node transmissions. The proposed node design calculates the minimum transmission power needed based on received signal strength and uses a periodic sleep/wake cycle to optimize energy when not sensing or transmitting. It aims to encrypt data at both the node and network level to further optimize energy usage for wireless communication.
This document discusses group consumption modes. It analyzes factors that impact group consumption, including external environmental factors like technological developments enabling new forms of online and offline interactions, as well as internal motivational factors at both the group and individual level. The document then proposes that group consumption modes can be divided into four types based on two dimensions: vertical (group relationship intensity) and horizontal (consumption action period). These four types are instrument-oriented, information-oriented, enjoyment-oriented, and relationship-oriented consumption modes. Finally, the document notes that consumption modes are dynamic and can evolve over time.
The document summarizes a study of different microstrip patch antenna configurations with slotted ground planes. Three antenna designs were proposed and their performance evaluated through simulation: a conventional square patch, an elliptical patch, and a star-shaped patch. All antennas were mounted on an FR4 substrate. The effects of adding different slot patterns to the ground plane on resonance frequency, bandwidth, gain and efficiency were analyzed parametrically. Key findings were that reshaping the patch and adding slots increased bandwidth and shifted resonance frequency. The elliptical and star patches in particular performed better than the conventional design. Three antenna configurations were selected for fabrication and measurement based on the simulations: a conventional patch with a slot under the patch, an elliptical patch with slots
1) The document describes a study conducted to improve call drop rates in a GSM network through RF optimization.
2) Drive testing was performed before and after optimization using TEMS software to record network parameters like RxLevel, RxQuality, and events.
3) Analysis found call drops were occurring due to issues like handover failures between sectors, interference from adjacent channels, and overshooting due to antenna tilt.
4) Corrective actions taken included defining neighbors between sectors, adjusting frequencies to reduce interference, and lowering the mechanical tilt of an antenna.
5) Post-optimization drive testing showed improvements in RxLevel, RxQuality, and a reduction in dropped calls.
This document describes the design of an intelligent autonomous wheeled robot that uses RF transmission for communication. The robot has two modes - automatic mode where it can make its own decisions, and user control mode where a user can control it remotely. It is designed using a microcontroller and can perform tasks like object recognition using computer vision and color detection in MATLAB, as well as wall painting using pneumatic systems. The robot's movement is controlled by DC motors and it uses sensors like ultrasonic sensors and gas sensors to navigate autonomously. RF transmission allows communication between the robot and a remote control unit. The overall aim is to develop a low-cost robotic system for industrial applications like material handling.
This document reviews cryptography techniques to secure the Ad-hoc On-Demand Distance Vector (AODV) routing protocol in mobile ad-hoc networks. It discusses various types of attacks on AODV like impersonation, denial of service, eavesdropping, black hole attacks, wormhole attacks, and Sybil attacks. It then proposes using the RC6 cryptography algorithm to secure AODV by encrypting data packets and detecting and removing malicious nodes launching black hole attacks. Simulation results show that after applying RC6, the packet delivery ratio and throughput of AODV increase while delay decreases, improving the security and performance of the network under attack.
The document describes a proposed modification to the conventional Booth multiplier that aims to increase its speed by applying concepts from Vedic mathematics. Specifically, it utilizes the Urdhva Tiryakbhyam formula to generate all partial products concurrently rather than sequentially. The proposed 8x8 bit multiplier was coded in VHDL, simulated, and found to have a path delay 44.35% lower than a conventional Booth multiplier, demonstrating its potential for higher speed.
This document discusses image deblurring techniques. It begins by introducing image restoration and focusing on image deblurring. It then discusses challenges with image deblurring being an ill-posed problem. It reviews existing approaches to screen image deconvolution including estimating point spread functions and iteratively estimating blur kernels and sharp images. The document also discusses handling spatially variant blur and summarizes the relationship between the proposed method and previous work for different blur types. It proposes using color filters in the aperture to exploit parallax cues for segmentation and blur estimation. Finally, it proposes moving the image sensor circularly during exposure to prevent high frequency attenuation from motion blur.
This document describes modeling an adaptive controller for an aircraft roll control system using PID, fuzzy-PID, and genetic algorithm. It begins by introducing the aircraft roll control system and motivation for developing an adaptive controller to minimize errors from noisy analog sensor signals. It then provides the mathematical model of aircraft roll dynamics and describes modeling the real-time flight control system in MATLAB/Simulink. The document evaluates PID, fuzzy-PID, and PID-GA (genetic algorithm) controllers for aircraft roll control and finds that the PID-GA controller delivers the best performance.
1. IOSR Journal of Computer Engineering (IOSR-JCE)
e-ISSN: 2278-0661, p- ISSN: 2278-8727Volume 9, Issue 4 (Mar. - Apr. 2013), PP 18-24
www.iosrjournals.org
Video Watermarking Scheme Based on DWT and PCA for
Copyright Protection
Phadtare Saurabh1, Dhebe Pooja2, Bobade Sharayu3, Jawalkar Nishigandha4
1
(Computer Engineering, Sinhgad College Of Engg,Pune./ University of Pune, India)
2
(Computer Engineering, Sinhgad College Of Engg,Pune./ University of Pune, India)
3
(Computer Engineering, Sinhgad College Of Engg,Pune./ University of Pune , India)
4
(Computer Engineering, Sinhgad College Of Engg,Pune./ University of Pune , India)
Abstract :The distribution of digital products like audio and video are increasing rapidly over the networks, so
the owners of such digital data are worried about their ownership protection. It may be possible that the third-
party may claim the digital products as their own and misuse it in future. In order to overcome this problem,
'Video Watermarking Scheme Based on Principal Component Analysis and Wavelet Transform for Copyright
Protection', is introduced for preventing illegal copying of their digital products. In this system, a Binary logo
watermark is embedded in video frames for copyright protection. Principal Component Analysis (PCA) is
applied to each block of the two bands (LL – HH) which results from Discrete Wavelet transform of the video
frame. The watermark is embedded into the principal components of the LL blocks and HH blocks at different
levels. Combining the DWT and PCA transform improves the performance of the watermark algorithm. This
watermarking scheme shows no visible difference between the watermarked frames and the original frames i.e.
imperceptible to the Human Visual System (HVS). It depicts the robustness against a wide range of attacks such
as geometric transformation, histogram equalization, and gamma correction.
Keywords -Advanced Encryption Standard (AES), Discrete wavelet transforms (DWT), Fixed-length codeword
(FLC), Principle Component Analysis (PCA), Video Watermarking.
I. Introduction
Existence of Digital Watermarking was founded in 1979. It gained popularity in 1990. No one person
is recognized as the founder or inventor of the digital watermark. Digital watermarking in its growing stages is
gaining more importance and reasons for applying, cases like Napster.
'Fingerprinting' is also known as digital watermarking. Copyright owners are allowed to integrate a
digital watermark into their work to identify which information is invisible to the human eye. Whenever any
kind of illegal copy of photos and music is found on the Internet by the respective copyright owner, he can take
appropriate legal action by combining new tracking services that are offered by some of the same companies
which are having watermarking technology.
Watermarks are usually of two types, visible and invisible. They can be viewed with either stand alone
technology or plug-in play software. Digital watermarking technology is a unique identification code that can be
traced to the copyright owner. It completes the copyright ownership information. A special feature pattern of
bits is inserted into a digital image, audio or video file that identifies the file's copyright information (author,
rights, etc.). Copyright protection for intellectual property that is in digital format is the purpose of digital
watermarks.
Purpose
Lately, the users of networks, especially the World Wide Web have increased rapidly. The procreation,
manipulation and the distribution of digital multimedia via networks become faster and easier. Therefore, the
owners of the digital products are concerned about illegal copying of their products. As a consequence of this,
security and copyright protection are becoming essential issues in multimedia applications and services. The
copyright information is embedded into multimedia data in order to protect the ownership, this is the purpose of
the proposed system i.e. watermarking scheme.
In the beginning, video watermarking techniques were based on DCT and DFT which did not provide
the advantage of both spatial domain and frequency domain [8]. So DWT was innovated which increased the
robustness of the watermarking scheme [4]. DWT is used in watermarking algorithms to increase the security
whereas PCA provides imperceptibility in watermarked video. Thus, in this watermarking scheme, both
transformations i.e. DWT and PCA are applied. For video encoding and decoding purpose, AES algorithm is
implemented. In this scheme, MPEG4 (Moving Picture Experts Group) standard videos are most preferably
used. As the luminance component is less sensitive to the human eye than chrominance components, the
watermark logo is embedded in the luminance (Y) component of each frame of the uncoded video.
www.iosrjournals.org 18 | Page
2. Video Watermarking Scheme based on DWT and PCA for copyright protection.
II. Watermarking Scheme
2.1 Discrete Wavelet Transform (DWT)
Wavelet transform breaks down an image or video frame into a set of band fixed components which
can be put together to rebuild the master copy [7, 9]. For 2-D images, using DWT agrees to work on the image
with 2-D filters in each dimension. The filters will divide the input image into four non-overlapping multi-
resolution sub bands which are lower resolution approximation image (LL1), horizontal (HL1), vertical (LH1)
and diagonal (HH1) detail components as shown in Fig.1. The process required to obtain a multiple scale
wavelet decomposition. One of the advantages of DWT over DCT is that it can more accurately model the
aspects of the HVS as compared to DCT [1, 5].
1 2 5 6
LL1 HL1
3 4 7 8
LL2 HL2 9 10 13 14
LH1
LH2 HH2 11 12 15 16
Fig 1: Two level wavelet decomposition and sub band numbering
2.2 Principal Component Analysis
Principal component analysis (PCA) is a mathematical process which utilizes an orthogonal
transformation to change a set of observations of possible correlated variables into a set of values of
uncorrelated variables called principal components. The number of principal components is less than or equal to
the number of original variables. PCA highlights the similarities and differences of the data. Since patterns in
data are difficult to find in data of high dimension, graphical representation is not available, PCA is a powerful
tool for examining data. The other major advantage of PCA is to identify patterns in the data and then the data is
compressed by reducing the number of dimensions, without a lot of information loss. It plots the data into a new
coordinate system where the data with maximum covariance are plotted together and is known as the first
principal component [3].
Similarly, there are the second and third principal components and so on. The maximum energy
engrossment lies in the first principal component. The following block diagram (Fig.2 and Fig.3) shows the
embedding and extraction process of the watermark. In the suggested method the binary watermark is embedded
into each of the video frames by the decomposition of the frames into DWT sub bands followed by the
application of block based PCA on the sub-blocks of the low frequency sub band. The watermark is embedded
into the principal components of the sub-blocks. The extracted watermark is obtained through a similar process.
3.1 Algorithms for watermarking using DWT and PCA techniques
Algorithm 1:
The PCA approach is applied to the transform coefficients of wavelet sub band SBθ where θ represents (LL or
HH) as shown in the following steps:
Step1: The wavelet sub band SBθ with NxN dimension is subdivided into n x n non overlapping blocks (the
block size should be appropriate to the sub band size) where the number of blocks is given by nb = NxN/n x n.
Step 2: Each block in the LL band can be processed by method1 and each block in HH band can be processed
by method2 as follows:
Method 1: Consider each block like a vector; data vectors can be expressed as:
SBθ = (SBθ1, SBθ2, SBθ3… SBθk)T, where vector SBθi represents the block number i with n2 dimension.
Method 2: Each block can be considered as 2D array BLθ = (BLθ1, BLθ2, BLθ3… BLθk)T, where array BLθi
represents the block number i with size nxn.
Step 3: For each block, the covariance matrix COi of the zero mean block Z is calculated as:
COi = Zi ZiT……………………… (1)
Where TR denotes the matrix transpose operation and Z is defined by:
Method 1: for a vector block as Zi=EX (SBθi –mei).
Method 2: for 2D array block as Zi=EX (BLθi –mei).
Where mei is the mean of block and EX denotes expectation operation.
Step 4: Each block is transformed into PCA components by calculating the eigenvectors (basis function)
corresponding to the eigenvalues of the covariance matrix:
COi Ф = λi Ф……………………. (2)
www.iosrjournals.org 19 | Page
3. Video Watermarking Scheme based on DWT and PCA for copyright protection.
Where Ф is the matrix of eigenvectors and λ is the matrix of eigenvalues defined for:
Method 1: for a vector block as Ф = (egv1, egv2, egv3… egvnxn) and λi = (λ1, λ2, λ3 … λnxn).
Method 2: for 2D array block as Ф = (egv1, egv2, egv3… egvn) and λi = (λ1, λ2, λ3 … λn).
Ф vectors are sorted in descending order according to λi , where ( λ1 ≥ λ2 ≥ λ3 ≥ …..≥ λn or (λnxn)). The matrix Ф
is an orthogonal matrix called basis function of PCA (PCA eigen images).
Step 5: Calculate the PCA components of the block. The PCA transforms the correlated block into uncorrelated
coefficients by taking the inner product of the block with the basic functions Ф:
PCi = ФT Zi…………………………….. (3)
Where PCi is the PC block which represents the principle component of the block i.
Step 6: Apply inverse PCA on the modified PCA components to obtain the modified wavelet coefficients. The
inversion can be performed by the following equation:
Zi = Ф PCi ……………………………… (4)
3.2 Watermark Embedding
Step 1: Divide video into frames and convert 2Nx2N RGB frames into YUV components.
Step 2: For each frame, choose the luminance Y component and apply the DWT to decompose the Y frame into
four multi resolution sub bands NxN: LL, HL, LH, and HH.
Step 3: Divide the two sub bands LL and HH into n x n non overlapping blocks.
Step 4: Apply PCA to each block in the chosen sub bands LL by using method1 and HH by using method2
Step 5: Convert the 32x32 binary watermark logo into a vector BW = {bw1, bw2… bw32x32} of '0's and '1's.
Step 6: Embed the logo into LL and HH bands by different ways. For the LL band, the watermark bits are
embedded with strength α1 into the first principle component of each PC block PCi. From equation (3), for the
PC block PC1,PC2,PC3… PCk, we can define PCI = (PC1 (1), PC2 (1), PC3 (1)… PCk (1))T and the embedding
equation:
PCI ' = PCI + α1 BW………………………….. (5)
Step 7: For HH band, use two pseudorandom sequences (PNS); ps0 and ps1 with different keys k1 and k2 to
embed the watermark bit bw '0' and '1' respectively [12,13]. So, we can represent BWm as follows:
ps0 if bw = 0
BWm = …………….......... (6)
ps1 if bw = 1
When bit bw = 0, embed ps0 with strength α2 to the mid-band coefficient of PC block PCi and when bit bw=1,
embed ps1 with strength α2 to the mid-band coefficients of PC block PCi.
If PCB includes the mid-band coefficients then the embedding equation is:
PCB'=PCB+α2BWm……………………… (7)
Step 8: Apply inverse PCA on the modified PCA components of the two bands to obtain the modified wavelet
coefficients.
Step 9: Apply the inverse DWT to produce the watermarked luminance component of the frame. Then
reconstruct the watermarked frame.
3.3 Watermark Extraction
The watermark extraction procedure is as follows:
Step 1: Convert the watermarked (and may be attacked) video into frames and convert the 2Nx2N RGB frames
into YUV components.
Step 2: For each frame, choose the luminance Y component and apply the DWT to decompose the Y frame into
four multi resolution sub bands NxN.
Step 3: Divide the sub bands LL and HH into n x n non overlapping blocks.
Step 4: Apply PCA to each block in the chosen sub bands LL by using method1 and HH by using method 2
Step 5: Convert the 32x32 binary watermark logo into a vector BW = {bw1, bw2… bw32x32} of '0's and '1's.
Step 6: For the LL band, the watermark bits are extracted from the first components of each block by:
BW' = (PCI ' - PCI)/ α1……….... (8)
Step 7: For the HH band, re-generate the two (PNS) sequences ps0 and ps1 with the same keys k1 and k2 used in
embedding. Afterwards, the (PNS) sequences are extracted from the mid-band coefficient of each PC block PCB
by:
BWm' = (PCB' - PCB)/ α2……….......... (9)
The embedded bits are estimated depending on the correlation value Corr between ps0 and ps1 and extracted
sequences BWm' and a predefined threshold Thr as follows:
www.iosrjournals.org 20 | Page
4. Video Watermarking Scheme based on DWT and PCA for copyright protection.
0 if Corr ps0, BWm′ > 𝐶𝑜𝑟𝑟 ps1, BWm′
and Corr ps0, BWm′ > 𝑇ℎ 𝑟
BW ′ = …..... (10)
1 if Corr(ps1, BWm′) > 𝐶𝑜𝑟𝑟(𝑝𝑠0, 𝐵𝑊m′ )
and Corr(ps1, BWm′) > Thr
Step 8: After extracting the watermark from LL and HH bands, similarity measurements of the extracted
watermark BW' and the referenced watermarks BW are used for objective judgment of the extraction fidelity
NC which is given by:
i j BW (i,j).BW ′(i,j)
NC = ……………... (11)
2 2
i j BW (i,j) i j BW ′(i,j)
3.4 AES Algorithm
The U.S. government has adopted the Advanced Encryption Standard (AES) as one of the encryption
standards in cryptography. The standard comprises three block ciphers, AES-128, AES-192 and AES-256,
acquired from a larger collection originally published as Rijndael. Each AES cipher has a 128-bit block size,
with key sizes of 128, 192 and 256 bits, respectively. The AES ciphers have been analyzed extensively and are
now used worldwide, as it overcomes the shortcomings of DES.
According to MPEG standards, the following FLC data elements exist in an MPEG-video bit stream:
• 4-byte start codes: 000001xx (hexadecimal);
• Almost all information elements in various headers;
• sign bits of non-zero DCT coefficients;
• (Differential) DC coefficients in intra blocks;
• ESCAPE DCT coefficients;
• Sign bits and residuals of motion vectors.
With the three control factors, the encryption procedure of PVEA can be described as follows:
1) Encrypting intra DC coefficients with probability psr;
2) Encrypting sign bits of non-zero DCT coefficients (except for intra DC coefficients) and ESCAPE DCT
coefficients with probability psd;
3) Encrypting sign bits and residuals of motion vectors with probability pmv.
Either a stream cipher or a block cipher can be used to carry out the encryption of selected FLC data elements.
When a block cipher is adopted, the consecutive FLC data elements should be first concatenated together to
form a longer bit stream, then each block of the bit stream is encrypted, and finally each encrypted FLC data
element is placed back into its original position in the video stream. Though the stream cipher or block cipher
embedded in PVEA is secure, here we should assume some special consideration in order to ensure the security
against various attacks.
In the above-described PVEA, the three factors control the visual quality, as follows:
• psr = 1 → 0: the spatial perceptibility changes from 'almost imperceptible' to 'perfectly perceptible' when psd =
0 or to 'roughly perceptible' when psd > 0;
• psr = 0, psd = 1 → 0: the spatial perceptibility changes from 'roughly perceptible' to 'perfectly perceptible';
• pmv = 1 → 0: the temporal (motion) perceptibility (for P/B-pictures only) changes from 'almost imperceptible'
to 'perfectly perceptible'.
3.5 Working
The design used, selectively e crypts fixed length codeword (FLC) in MPEG video bit streams under the control
of 3 perceptibility factors-Psr,Psd,Pmv. These factors mainly deal with video encoding and decoding issue.
The values
Psr- Control factor for intra DC coefficients (rough view)
Psd- Control factor for non intra DC, AC, ESCAPE DCT coefficients (details)
Pmv- Control factor for sign bits & residuals of motion vectors (related to motions)
are taken from the user whose values are independent of each other and are between 0 & 1.
These are further used for encryption procedure that can be described as follows. Encrypting intra DC
coefficients with probability Psr.
Encrypting sign bits of non-zero Duct coefficients and ESCAPE DCT coefficients with probability Psd.
Encrypting sign bits & residuals of motion vectors with probability Pmv.
The algorithms used are AES-128 algorithm and DCT. Since block cipher is adopted to be used in AES the
consecutive FLC data elements should be first concatenated together to form a longer bit stream, then each
www.iosrjournals.org 21 | Page
5. Video Watermarking Scheme based on DWT and PCA for copyright protection.
block of the bit stream is encrypted and finally each encrypted FLC data elements is placed back into its original
position in the video stream.
The value of ‘nf’(number of KeyFrames) and ‘n’(PlayerIteration) is taken which are greater than 0 and
encryption key that can be any alphanumeric value is taken from the user.
Now the video is selected from the pop-up menu and total number of frames comprised by the video is
displayed above the video.
When the ‘videoencryption’button is hit the following operations takes place:
Loading of the image file, saving of the image file, encryption of the video.
Psr and Psd variables are use to determine the scale for quality scaling and Pmv is used to determine the value of
coefficient quantization matrices i.e. whether intra or inter quantization blocks to be used (based on the frame
type)
Then input the decryption key that will be used for video decryption and also user id of sender and receiver.The
user id of receiver is used for decrypting using AES algorithm.
To view the watermarked or retrieved video separately hit the ‘Watermarked Video’or ‘Retrieved Video’ button
respectively or to view the encrypted and decrypted video simultaneously hit the ‘Watermarked/Retrieved
Video’button.
Fig 2: Watermark Embedding Block
Fig 3: Watermark Extraction Block
III. Experimental Results
This scheme applies to a sample video sequence ‘akiyo49.y4m’ using a 32 × 32 binary watermark logo.
The grayscale watermark is converted to binary before embedding. Fig. 4(a) and 4(b) show the original and the
watermarked video frames respectively. Fig. 5(a) is the embedded watermark and Fig. 5(b) is the extracted
www.iosrjournals.org 22 | Page
6. Video Watermarking Scheme based on DWT and PCA for copyright protection.
binary watermark image. The performance of the algorithm has been measured in terms of its imperceptibility
and robustness against the possible attacks like noise addition, filtering, geometric attacks etc.[10].
Fig.5 (a) Original Video frame Fig.5 (b) Watermarked video
(PSNR=38.4084)
Fig 6. (a) Original watermark Fig 6. (b) Extracted binary watermark
(LL NC = 0.94) (HH NC = 0.96)
PSNR: The Peak-Signal-To-Noise Ratio (PSNR) is used to deviation of the watermarked and attacked frames
from the original video frames and is defined as:
255 2
PSNR = 10log MSE ................... (12)
Where MSE (mean squared error) between the original and distorted frames (size m x n) is defined as:
1
MSE = mn m n [I(i, j) − I(i, j)]2 ......................... (13)
i=1 j=1
Where I and I′ are the pixel values at location (i, j) of the original and the distorted frame respectively. Higher
values of PSNR indicate more imperceptibility of watermarking. It is expressed in decibels (dB).
After several experiments, the PSNR values of nearly 100 watermarked frames of akiyo49 video are calculated
then it gives an average PSNR value for all watermarked frames which is 37.2683 dB.
NC: The normalized coefficient (NC) gives a measure of the robustness of watermarking and its peak value is
1. The NC value gives the difference between the original watermark and extracted watermark.
The following images(Fig.7,Fig 8,Fig 9) represent diversity in values of PSNR and NC prescribed in Table 1,
still taken from the watermarked video after the attacks:
Fig 7. Video frame after rotation Fig 8. Video frame after addition Fig 9.Video frame after addition
by 60 degrees (matlab) of ‘salt and pepper’ noise of geometric attacks (matlab)
Table 1. Result Analysis
Attack PSNR NC
Rotation 27.825 0.6510
Salt and pepper 23.459 0.6548
Geometric 40.0710 0.5313
Transform
Since we are using a nonblind hybrid watermarking scheme, we are able to rotate/resize the frame back to its
original position/size after the rotation/resize attack.
www.iosrjournals.org 23 | Page
7. Video Watermarking Scheme based on DWT and PCA for copyright protection.
IV. Conclusion and Future Work
In this watermarking scheme, the combination of PCA and DWT techniques achieve robustness and
imperceptibility which results in high quality copyright protected video. Also the scheme is resistant against
additive Gaussian noise attack, which can be seen from the NC values. With the help of AES algorithm, only
authorized user can extract the watermark from video as well as all authentications, process details are
encrypted. In future the degree of perfection can be increased in the watermark extraction procedure. This
watermarking scheme can be tested for other newly emerging various noise attacks, JPEG compression (coding)
etc. The quality of extracted watermark from video can be improved by using other effective methods like
Hidden Markov Model (HMM), Support Vector machine (SVM) etc. Digital video watermarking can also be
utilized for Labeling, Temper Proofing like applications.
Acknowledgement
It is our privilege to acknowledge with deep sense of gratitude to our project mentor, Prof.G.G.Chiddarwar for her
valuable suggestions and guidance throughout our course of study and timely help given to us in the completion of our
project titled, 'Video Watermarking scheme based on DWT and PCA for copyright protection'. We would like to dedicate
this project to our parents without whose help and moral support it would not have been possible to complete this project.
References
[1] Salwa A.K Mostafa, A. S. Tolba ,F.M. Abdelkader, Hisham M. Elhindy, Video Watermarking Scheme Based on Principal Component
Analysis and Wavelet Transform ,IJCSNS International Journal of Computer Science and Network Security, VOL.9 No.8, August
2009.
[2] R. Reyes, C. Cruz, M. Nakano-Miyatake, Member IEEE and H. Perez-Meana, Senior Member IEEE, Digital Video Watermarking in
DWT Domain Using Chaotic Mixtures, IEEE Latin America Transactions, VOL. 8, NO. 3, June 2010.
[3] Xiaoli Li, Student Member, IEEE, Sridhar (Sri) Krishnan, Senior Member, IEEE, and Ngok-Wah Ma, Senior Member, IEEE, A
Wavelet-PCA-Based Fingerprinting Scheme for Peer-to-Peer Video File Sharing ,IEEE Transactions on Information Forensics and
Security, VOL. 5, NO. 3, September 2010.
[4] Xiangui Kang, Jiwu Huang, Senior Member, IEEE, Yun Q. Shi, Senior Member, IEEE, and Yan Lin, A DWT-DFT Composite
Watermarking Scheme Robust to Both Affine Transform and JPEG Compression, IEEE Transactions on Circuits and Systems for
Video Technology, VOL. 13, NO. 8, August 2003.
[5] Sanjana Sinha, Prajnat Bardhan, Swarnali Pramanick, Ankul Jagatramka, Dipak K. Kole, Aruna Chakraborty,Department of Computer
Science & Engineering, St Thomas’ College of Engineering and Technology, Kolkata, India, Digital Video Watermarking using
Discrete Wavelet Transform and Principal Component Analysis, International Journal of Wisdom Based Computing, Vol. 1 (2),
August 2011.
[6] Nisreen I. Yassin1, Nancy M. Salem2, and Mohamed I. El Adawy National Research Centre, Cairo, Egypt, Block Based Video
Watermarking Scheme Using Wavelet Transform and Principle Component Analysis , IJCSI International Journal of Computer
Science Issues, Vol. 9, Issue 1, No 3, January 2012.
[7] S.K. Amirgholipour, A. R. Naghsh-Nilchi: Robust Digital Image Watermarking Based on Joint DWT-DCT, International Journal of
Digital Content Technology and its Applications Volume 3, Number 2, pp. 42-54, June 2009.
[8] Martin Zlomek, Charles University in Prague, Faculty of Mathematics and Physics, Department of Software and Computer Science
Education, Video Watermarking.
[9] M. Chandra, S. Pandey: A DWT Domain Visible Watermarking Techniques for Digital Images, International Conference on
Electronics and Information Engineering, pp. V2-421 - V2-427, 2010.
[10] C.V. Serdean, M.A. Ambroze, M. Tomlinson and J.G. Wade, DWT Based Video Watermarking for Copyright Protection, Invariant to
Geometrical Attacks, Proceedings of the 3rd International Symposium on Communication Systems Networks and Digital Signal
Processing – CSNDSP'02, Stafford, UK, 15-17, July 2002.
[11] Angshumi Sarma, Dept. of Electronics & Communication Engineering IST, Gauhati University Guwahati, Assam, India,Amrita
Ganguly, Dept. of Electrical Engineering Assam Engineering College Guwahati, Assam, India: An Entropy based Video
Watermarking Scheme, International Journal of Computer Applications (0975 – 8887) Volume 50 – No.7, July 2012.
[12] S.-J. Kim, Suk-Hwan Lee, T.-S. Kim, B.-S. Kim, and K.-I. Lee, A Video Watermarking Using the Spread Spectrum Technique in the
3D Wavelet Transform Domain, Proceedings of the International Conference on Imaging Science, Systems and Technology '04, June
2004.
[13] Xin Y. and Pawlak M, M-ary Phase Modulation for Digital Watermarking, International Journal of Applied Mathematics and
Computer Science (AMCS'08), Vol. 18, No.1, pp. 93-104,2008.
www.iosrjournals.org 24 | Page