Preview

Robust Digital Image Watermarking Based on Gradient Vector Quantization and Denoising using Bilateral filter and its method noise Thresholding

Powerful Essays
Open Document
Open Document
3433 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
Robust Digital Image Watermarking Based on Gradient Vector Quantization and Denoising using Bilateral filter and its method noise Thresholding
Robust Digital Image Watermarking Based on Gradient Vector Quantization and Denoising using Bilateral filter and its method noise ThresholdingI. Kullayamma, P. Sathyanarayana,
Assistant Professor, Department of ECE, Professor, Department of ECE,
SV University, Tirupati, AITS, Tirupati, ikusuma96@gmail.com satyamp1@yahoo.com
Abstract- In this modern world Digital watermarking is of prime importance. This has increased the demand for copyright protection. Digital watermarking is a solution to the problem of copyright protection and authentication of multimedia data while working in a networked environment. We propose a robust quantization-based image watermarking scheme, called the gradient direction watermarking (GDWM), and based on the uniform quantization of the direction of gradient vectors. In GDWM, the watermark bits are embedded by quantizing the angles of significant gradient vectors at multiple wavelet scales. The proposed scheme has the following advantages: 1) Increased invisibility of the embedded watermark, 2) Robustness to amplitude scaling attacks, and 3) Increased watermarking capacity. To quantize the gradient direction, the DWT coefficients are modified based on the derived relationship between the changes in coefficients and the change in the gradient direction. This watermarking technique is more robust to various sizes of watermark images. The Gaussian filter is a local and linear filter that smoothens the whole image irrespective of its edges or details, whereas the bilateral filter is also a local but non-linear, considers both gray level similarities and geometric closeness of the neighbouring pixels without smoothing edges. The extension of bilateral filter: multi-resolution bilateral filter, where bilateral



References: [1] D. Kundur and D. Hatzinakos, “Digital watermarking for telltaletamper proofing and authentication,” Proc. IEEE, vol. 87, no. 7, pp.1167–1180, Jul. 1999. [2] B. Chen and G. W. Wornell, “Quantization index modulation: A classof provably good methods for digital watermarking and informationembedding,” IEEE Trans. Inf. Theory, vol. 47, no. 4, pp. 1423–1443,May 2001. [3]. Perez-Gonzlez and F. Balado, “Quantized projection data hiding,”in Proc. Int. Conf. Image Process., 2002, vol. 2, pp. 889–892. [4] L.-H. Chen and J.-J. Lin, “Mean quantization based image watermarking,”Image Vis. Comput., vol. 21, no. 8, pp. 717–727, 2003 [5] S.-H [6] P. Bao and X. Ma, “Image adaptive watermarking using wavelet domainsingular value decomposition,” IEEE Trans. Circuits Syst. VideoTechnol., vol. 15, no. 1, pp. 96–102, Jan. 2005.

You May Also Find These Documents Helpful

  • Powerful Essays

    Nt1310 Unit 7 Vocab Answers

    • 4516 Words
    • 19 Pages

    Steganography is task of hiding information by putting messages within one another. Whereas, cryptography is when you change information into an illegible layout. this format is called cipher text.…

    • 4516 Words
    • 19 Pages
    Powerful Essays
  • Good Essays

    Nt1310 Final Exam

    • 3599 Words
    • 15 Pages

    b. digital watermark (Incorrect. A digital watermark is used to identify proprietary data, but it does not protect privacy.)…

    • 3599 Words
    • 15 Pages
    Good Essays
  • Satisfactory Essays

    APA Cribsheet

    • 323 Words
    • 3 Pages

    Scarborough, S., & Dziemieszko, A. (2004). Techniques for digital enhancement of latent prints obscured by disruptive backgrounds. Journal of Forensic Identification, 54(2), 141.…

    • 323 Words
    • 3 Pages
    Satisfactory Essays
  • Satisfactory Essays

    Piracy is a long debated issue, expressly in the entertainment industry. It is argued that encryption programs are necessary to prevent piracy, protecting the rights of artists as well as production agents. Yet, an important query on this matter still remains; the question of public benefit and free flowing ideas for purchasers wanting limited copies in digital form. Yet the rights of the artists and producers still remains leaving the question of copyright violation, the idea behind encryption is valid but only to a certain aspect. Piracy will not be able to be brought to an end so hastily as long as the motivation to do so still remains, that is the real problem behind this debate. The purchasers should be allowed to make a limited number of copies as a fair use policy. If a purchaser fairly buys rights to a product they should be allowed to make copies for themselves via modes of laptop and other digital other issues relating to the consumer as well, which may result in this idea to be more counterproductive instead of beneficial. Instead of using encryption it may be more productive in the long run to educate purchasers of a product about piracy. The costs of products such as DVD’s and BLU-RAY copies has steadily increased causing a lot of consumers to make do with cheaper and pirated versions…

    • 463 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    Dna Evidence

    • 397 Words
    • 2 Pages

    Henry, Lee & Gaensslen, Robert.2001. Advances in Fingerprint Technology, 2nd Edition. Retrieved February 26, 2009. Available Online:…

    • 397 Words
    • 2 Pages
    Satisfactory Essays
  • Good Essays

    Copyright law sometimes struggles to keep up with internet developments. Most internet content is protected from unauthorised reproduction by copyright, which provides protection against the copying of original work including website graphics, pictures, videos, music and original text. However, enforcement is difficult.…

    • 2970 Words
    • 12 Pages
    Good Essays
  • Better Essays

    Stegmaier, G. M., Pike and Fischer, Inc., & United States. (2005). The Digital Millennium Copyright Act: 2005 supplement. Silver Spring, Md: Pike & Fischer.…

    • 1339 Words
    • 5 Pages
    Better Essays
  • Better Essays

    intact signature, then, should prove that a photo is genuine. But researchers at ElcomSoft, a computersecurity firm based in Moscow, have shown that the system is easily fooled. Counterfeiters can copy an…

    • 1137 Words
    • 5 Pages
    Better Essays
  • Powerful Essays

    With the proliferation of 3-D Printers and the availability of copyrighted materials posted online, there is an additional facet to the current debate surrounding copyright and ownership of intellectual property. Piracy of digital media such as music and videos has been a long-standing issue since the 1990’s with Napster and similar peer-to-peer file sharing programs.…

    • 4860 Words
    • 14 Pages
    Powerful Essays
  • Satisfactory Essays

    Transcoding Jpeg

    • 461 Words
    • 2 Pages

    There is a transcoding scheme that proposed to compresses existing JPEG files without losing the quality. It does it by using the H.264-like block-adaptive intra prediction to use inter-block relationship of quantized DCT coefficients that are stored in the JPEG file. This prediction is performed in spatial domain of each block composed of 8×8 pels, but the corresponding prediction residuals are calculated in DCT domain to ensure lossless reconstruction of the original coefficients. Block-based classification is carried out to allow accurate modeling of PDF’s. A multi-symbol arithmetic coder and the PDF model is used for entropy coding to predicting residual of each DCT coefficient located in the in JPEG files. For monochrome JPEG images end result usually shows the reduction of coding rates about 18 – 28 %.…

    • 461 Words
    • 2 Pages
    Satisfactory Essays
  • Better Essays

    Quantum Cryptography

    • 1404 Words
    • 6 Pages

    Privacy is paramount when communicating sensitive information, and humans have invented some unusual ways to encode their conversations. Quantum cryptography describes the use of quantum mechanical effects (in particular quantum communication and quantum computation) to perform cryptographic tasks or to break cryptographic systems. The goal of quantum cryptology is to thwart attempts by a third party to eavesdrop on the encrypted message.…

    • 1404 Words
    • 6 Pages
    Better Essays
  • Good Essays

    Photo Manipulation

    • 701 Words
    • 3 Pages

    Image manipulation is everywhere on are daily life. It is a type of digital art. It is a unique way to describe editing photos and adding filters and special effects to photographs in order to make an illusion or define through digital means. Photo manipulation has been commonly used to deceive or convince viewers. It can be simply a photo which colors have been converted, or a photo that has been painted over, usually they use photoshop, but there are other softwares what can we use for manipulating images, image manipulation is an art as well.…

    • 701 Words
    • 3 Pages
    Good Essays
  • Powerful Essays

    Spam Image Identification Using an Artificial Neural Network Jason R. Bowling, Priscilla Hope, Kathy J. Liszka The University of Akron Akron, Ohio 44325-4003 {bowling, ph11, liszka}@uakron.edu Abstract We propose a method for identifying image spam by training an artificial neural network. A detailed process for preprocessing spam image files is given, followed by a description on how to train an artificial neural network to distinguish between ham and spam.…

    • 2824 Words
    • 12 Pages
    Powerful Essays
  • Powerful Essays

    2d-Ar Model

    • 2732 Words
    • 11 Pages

    References: [1] X. Li and M. T. Orchard, “New edge-directed interpolation,” IEEE Trans. Image Processing, pp. 1521–1527, Oct. 2001. [2] D. D. Muresan and T. W. Parks, “Adaptively quadratic (aqua) image interpolation,” IEEE Trans. on Image Processing, vol. 13, pp. 690–698, May 2004. [3] X. Wu, K. U. Barthel, and W. Zhang, “Piecewise 2d autoregression for predictive image coding.” in IEEE ICIP’98, vol. 3, Oct. 1998, pp. 901–904. [4] B. Meyer and P. Tischer, “Tmw – a new method for lossless image compression,” in Proceed. of PCS’97, Oct. 1997. [5] I. Matsuda, H. Mori, J. Maeda, and S. Itoh, “Design and evaluation of minimum-rate predictors for lossless image coding,” Trans. IEICE (DII), vol. J85-D-II, pp. 448–456, Mar. 2002. [6] R. G. Keys, “Cubic convolution interpolation for digital image processing,” IEEE Trans. Acoustic, Speech and Signal Processing, vol. 29, pp. 1153–1160, 1981. [7] K. Jensen and D. Anastassiou, “Subpixel edge localization and the interpolation of still images,” IEEE Trans. Image Processing, vol. 4, pp. 285–295, Mar. 1995.…

    • 2732 Words
    • 11 Pages
    Powerful Essays
  • Good Essays

    Wizzy Kalifa

    • 451 Words
    • 2 Pages

     A text watermark on the desktop that says “This copy of Windows is not genuine”…

    • 451 Words
    • 2 Pages
    Good Essays

Related Topics