Enhanced images watermarking based on amplitude modulation Image and Vision Computing, 24 (2006), 111 – 119 Authors :T. Amornraksa, K. Janthawongwilai.

Slides:



Advertisements
Similar presentations
[1] AN ANALYSIS OF DIGITAL WATERMARKING IN FREQUENCY DOMAIN.
Advertisements

Reversible Data Hiding Based on Two-Dimensional Prediction Errors
1 Adjustable prediction-based reversible data hiding Authors: Chin-Feng Lee and Hsing-Ling Chen Source: Digital Signal Processing, Vol. 22, No. 6, pp.
1 Reversible image hiding scheme using predictive coding and histogram shifting Source: Signal Processing, vol. 89, no. 6, June 2009, pp Author:
Maximizing Strength of Digital Watermarks Using Neural Network Presented by Bin-Cheng Tzeng 5/ Kenneth J.Davis; Kayvan Najarian International Conference.
2005/6/16 by pj 1 Hiding Biometric Data Hiding Biometric Data IEEE TRANSACTIONS ON PATTERN ANALYSIS AND MACHINE INTELLIGENCE, VOL. 25, NO. 11, NOVEMBER.
Title of Presentation Author 1, Author 2, Author 3, Author 4 Abstract Introduction This is my abstract. This is my abstract. This is my abstract. This.
» Copying images is easy » Distributing images is easy » But what if we want to protect our rights to an image?
Fifth International Conference on Information
Effective Gaussian mixture learning for video background subtraction Dar-Shyang Lee, Member, IEEE.
Exploring Steganography: Seeing the Unseen Neil F. Johnson Sushil Jajodia George Mason University.
Teacher : Hsien-Chu Wu Student : Hsiao-yun Tseng, Chen-ying Lai Speaker : Hsiao-yun Tseng Date : May 10, 2006 Database Temper Detection Techniques Based.
Technical Seminar Presentation-2004 Presented by : ASHOK KUMAR SAHOO (EI ) NATIONAL INSTITUTE OF SCIENCE & TECHNOLOGY Presented By Ashok Kumar.
Colored Watermarking Technology Based on Visual Cryptography Author: Hsien-Chu Wu, Chwei-Shyong Tsai, Shu-Chuan Huang Speaker: Shu-Chuan Huang Date: May.
Reversible Image Watermarking Using Interpolation Technique Source: IEEE Transcation on Information Forensics and Security, Vol. 5, No. 1, March 2010 Authors:
A study for Relational Database watermarking scheme Speaker: Pei-Feng Shiu Date: 2012/09/21.
1 Security and Robustness Enhancement for Image Data Hiding Authors: Ning Liu, Palak Amin, and K. P. Subbalakshmi, Senior Member, IEEE IEEE TRANSACTIONS.
1 A Gradient Based Predictive Coding for Lossless Image Compression Source: IEICE Transactions on Information and Systems, Vol. E89-D, No. 7, July 2006.
Reversible image hiding scheme using predictive coding and histogram shifting Source: Authors: Reporter: Date: Signal Processing, Vol.89, Issue 6, pp ,
Multiple-description iterative coding image watermarking Source: Authors: Reporter: Date: Digital Signal Processing, Vol. 20, No. 4, pp , 2010.
by Mitchell D. Swanson, Bin Zhu, and Ahmed H. Tewfik
Data Hiding in Image and Video: Part II—Designs and Applications Min Wu, Heather Yu, and Bede Liu.
Multiple watermarking Wu Dan Introduction (I) Multipurpose watermarking Ownership watermarks (very robust) Captioning watermarks ( robust)
Blind image data hiding based on self reference Source : Pattern Recognition Letters, Vol. 25, Aug. 2004, pp Authors: Yulin Wang and Alan Pearmain.
1 Security of fragile watermarking scheme for image authentication Authors: K. C. Liao, W. B. Lee, and C. W. Liao Source: The Imaging Science Journal,
An improved SVD-based watermarking scheme using human visual characteristics Chih-Chin Lai Department of Electrical Engineering, National University of.
Watermarking Scheme Capable of Resisting Sensitivity Attack
Robust Data Hiding for MCLT Based Acoustic Data Transmission
K. ZEBBICHE , F. KHELIFI and A. BOURIDANE
Robustness Evaluation of Perceptual Watermarks
Face recognition using improved local texture pattern
TITLE Authors Institution RESULTS INTRODUCTION CONCLUSION AIMS METHODS
Feature Space Based Watermarking in Multi-Images
Source: Mobile Information Systems, vol. 2017, 2017.
Centrality Bias Measure for High Density QR Code Module Recognition
Separable and error-free reversible data hiding in encrypted images
Source: Pattern Recognition, Vol. 38, Issue 11, December 2005, pp
Source : Signal Processing Image Communication Vol. 66, pp , Aug 2018
An efficient reversible image authentication method using improved PVO and LSB substitution techniques Source : Signal Processing: Image Communication,
A Self-Reference Watermarking Scheme Based on Wet Paper Coding
Authors:Tae-Yun Chung; Min-Suk Hong; Young-Nam Oh;
Partial reversible data hiding scheme using (7, 4) hamming code
High Capacity Data Hiding for Grayscale Images
Zhe-Ming Lu, Chun-He Liu, Dian-Guo Xu, Sheng-He Sun,
Improved Spread Spectrum: A New Modulation Technique for Robust Watermarking IEEE Trans. On Signal Processing, April 2003 Multimedia Security.
Author: Minoru Kuribayashi, Hatsukazu Tanaka
Digital Watermarking for Image Authentication with Localization
Data hiding method using image interpolation
The Image The pixels in the image The mask The resulting image 255 X
Mean quantization based image watermarking
Source: Signal Processing: Image Communication 16 (2001) pp
Title Introduction: Discussion & Conclusion: Methods & Results:
Partial reversible data hiding scheme using (7, 4) hamming code
Novel Multiple Spatial Watermarking Technique in Color Images
Source: J. Vis. Commun. Image R. 31 (2015) 64–74
A Self-Reference Watermarking Scheme Based on Wet Paper Coding
A Robust Digital Watermarking Of Satellite Image at Third Level DWT Decomposition Source:International Conference on Computational Intelligence and Multimedia.
Ming-Shi Wang *, Wei-Che Chen 11 November 2006 present: 沈雅楓
An imperceptible spatial domain color image watermarking scheme
Source: IEEE Access. (2019/05/13). DOI: /ACCESS
Predictive Grayscale Image Coding Scheme Using VQ and BTC
Authors: J.J. Murillo-Fuentes
Dynamic improved pixel value ordering reversible data hiding
Source : Digital Signal Processing. Vol. 73, pp , Feb
High-Capacity Data Hiding in Halftone Images Using Minimal-Error Bit Searching and Least-Mean Square Filter Author: Soo-Chang Pei and Jing-Ming Guo Source:
Source: Circuits and Systems for Video Technology,
A Quadratic-Residue-based Fragile Watermarking Scheme
Rich QR Codes With Three-Layer Information Using Hamming Code
Privacy-Preserving Reversible Watermarking for Data Exfiltration Prevention Through Lexicographic Permutations Source: IIH-MSP(2018): Authors:
Hiding Information in VQ Index Tables with Reversibility
Presentation transcript:

Enhanced images watermarking based on amplitude modulation Image and Vision Computing, 24 (2006), 111 – 119 Authors :T. Amornraksa, K. Janthawongwilai Presenter: 李振祥

2 Outline Introduction Amplitude modulation based watermarking The proposed method Experimental results Conclusions

3 Introduction L (I,j) =0.299R (I,j) G (I,j) B (I,j) By balancing watermark bits around the embedding pixel.(preparing process) By properly tuning the strength of embedding watermark. (embedding process) By modifying the methods of pixel prediction. (retrivieval process)

4 Amplitude modulation based watermarking(1/3) Scaling factorLuminance Watermark

5 Amplitude modulation based watermarking(2/3)

6 rewrite Amplitude modulation based watermarking(3/3)

7 The proposed method

8 The proposed method-1 XOR (for watermark)

9 The proposed method-1 0

10 The proposed method-2 Gaussian mask

11 The proposed method-3 Pixel value replacing

12 Experimental results

13 Experimental results

14 Experimental results

15 Experimental results

16 Experimental results

17 Experimental results

18 Experimental results

19 Experimental results

20 Experimental results

21 Experimental results

22 Experimental results

23 Experimental results (Attack)

24 Experimental results (Attack)

25 Experimental results (Attack)

26 Experimental results (Attack)

27 Experimental results (Attack)

28 Experimental results (Attack)

29 Conclusions To improve accuracy and robustness of the watermark can use: Employing an error control coding Multiple embedding techniques