SlideShare ist ein Scribd-Unternehmen logo
1 von 19
UC Lab Kyung Hee University, South Korea
January 09 , 2015
UC Lab Kyung Hee University, South Korea 2
UC Lab Kyung Hee University, South Korea 3
• Millions of images are shared every day through the SNS
• Many of these images end up in the hands of unknown
people that use them in an illegal and malicious manner
• Mechanisms for ensuring the ownership and protecting the
copyright are utterly required to settle potential disputes
Image
Watermarking
UC Lab Kyung Hee University, South Korea 4
Convenience
Imperceptibility
Robustness
The information should be extracted from the original image
A watermark has to be imperceptible
A watermark needs to be robust against image modifications
visualization
frequency domain
• Quality
 Optimal color channel selection
• Accuracy rate in the extraction process
 Optimal threshold based on the Otsu method.
UC Lab Kyung Hee University, South Korea 5
UC Lab Kyung Hee University, South Korea 6
Article Key concept Limitations
Xiang-yang [2012] Fourier transform
Least square support vector
machine (LS-SVM)
High computation time for LS-SVM training.
Niu [2011] Nonsubsampled coutourlet
transform (NSCT)
Support vector regression (SVR)
Low performing NSCT and computation time in
extraction process.
Song [2012] Curvelet transform
Coefficient quantization technique
Weakness under lossy JPEG compression
Chou [2010] Wavelet transform
Just noticeable color difference
(JNCD)
Weakness under geometric operations and hue
modification.
UC Lab Kyung Hee University, South Korea 7
Color
Images
4-DWT
Coeffient
Blocking
Coeffient
Difference
Optimum
Selection
Embedding
Rule
Coefficient
Unblocking
4-IDWT
Embedded
Image
Binary
Watermark
Bit shuffling
Combined
Key
Recovered
Watermark
Bit
Reshuffling
Extraction
Rule
Coefficient
Difference
Coefficient
Blocking
4-DWT
Modified
Image
Adaptive
threshold
Otsu method
Channel
Attacks
Embedding process
Extraction process
UC Lab Kyung Hee University, South Korea 8
Color
Images
4-DWT
Coefficient
Blocking
Coefficient
Difference
Optimum
Selection
Embedding
Rule
Coefficient
Unblocking
4-IDWT
Embedded
Image
Binary
Watermark
Bit shuffling
Combined
Key
HL4
(C(HL,i))
LH4
(C(LH,i))
Block 1
C(HL,1 )
Block 2 Block n
C(HL,2) C(LH,1 ) C(LH,2)C(HL,n) C(HL,n)
Coefficient difference
Numberofblocks
Before embedding
The embedding process
Coefficient difference
Numberofblocks
After embedding
0-bits
1-bits
y1 y2
∆𝑖,𝑘 (= 𝐶𝐿𝐻𝑖,𝑘
− 𝐶 𝐻𝐿 𝑖,𝑘
)
∆𝑖,𝑘→ ∆𝑖,𝑘
𝑆
𝛻𝑖
0
= 𝑦1 − ∆𝑖,𝑘
𝑆
𝑦1 =
1
𝑁0
𝑘=1
3
𝑖=1
𝑁0
∆𝑖,𝑘
𝑆
𝐶𝐿𝐻 𝑖,𝑘_𝑜𝑝𝑡
= 𝐶𝐿𝐻 𝑖,𝑘_𝑜𝑝𝑡
+ 𝛻𝑖
0
; ∀𝐶𝐿𝐻 𝑖,𝑘_𝑜𝑝𝑡
≥ 𝐶 𝐻𝐿 𝑖,𝑘_𝑜𝑝𝑡
𝐶 𝐻𝐿 𝑖,𝑘_𝑜𝑝𝑡
= 𝐶 𝐻𝐿 𝑖,𝑘_𝑜𝑝𝑡
+ 𝛻𝑖
0
; ∀𝐶𝐿𝐻 𝑖,𝑘_𝑜𝑝𝑡
< 𝐶 𝐻𝐿 𝑖,𝑘_𝑜𝑝𝑡
UC Lab Kyung Hee University, South Korea 9
LL4 HL4
LH4 HH4
HL4
(C(HL,i))
LH4
(C(LH,i))
Block 1
C(HL,1 )
Block 2 Block n
C(HL,2) C(LH,1 ) C(LH,2)C(HL,n) C(HL,n)
The embedding process
UC Lab Kyung Hee University, South Korea 10
∆1,𝑅 ∆1,𝐺 ∆1,𝐵
∆2,𝑅 ∆2,𝐺 ∆2,𝐵
⋮ ⋮ ⋮
∆ 𝑛−1,𝑅 ∆ 𝑛−1,𝐺 ∆ 𝑛−1,𝐵
∆ 𝑛,𝑅 ∆ 𝑛,𝐺 ∆ 𝑛,𝐵
∆𝑖,𝑘 − 𝑦1 ; ∀ 0 − bit
∆𝑖,𝑘 − 𝑦2 ; ∀ 1 − bit
UC Lab Kyung Hee University, South Korea 11
The extraction process
Embedded
Image
Recovered
Watermark
Bit
Reshuffling
Extraction
Rule
Coefficient
Difference
Coefficient
Blocking
4-DWT
Modified
Image
Adaptive
threshold
Otsu method
Attacks
HL4
(C(HL,i))
LH4
(C(LH,i))
Block 1
C(HL,1 )
Block 2 Block n
C(HL,2) C(LH,1 ) C(LH,2)C(HL,n) C(HL,n)
Coefficient difference
Numberofblocks
After embedding
Optimal threshold
0-bits
1-bits
𝛻𝑖
1
= 𝑦2 − ∆𝑖,𝑘
𝑆
𝑦2 =
1
𝑁0
𝑘=1
3
∆𝑖=𝜆𝑁1,𝑘
𝑆
∆𝑖,𝑘
𝑆
< 𝑦2
𝐶𝐿𝐻 𝑖,𝑘_𝑜𝑝𝑡
= 𝐶𝐿𝐻 𝑖,𝑘_𝑜𝑝𝑡
+ 𝛻𝑖
1
𝐶 𝐻𝐿 𝑖,𝑘_𝑜𝑝𝑡
= 𝐶 𝐻𝐿 𝑖,𝑘_𝑜𝑝𝑡
− 𝛻𝑖
0 𝐶𝐿𝐻 𝑖,𝑘_𝑜𝑝𝑡
≥ 𝐶 𝐻𝐿 𝑖,𝑘_𝑜𝑝𝑡
𝐶𝐿𝐻 𝑖,𝑘_𝑜𝑝𝑡
= 𝐶𝐿𝐻 𝑖,𝑘_𝑜𝑝𝑡
− 𝛻𝑖
1
𝐶 𝐻𝐿 𝑖,𝑘_𝑜𝑝𝑡
= 𝐶 𝐻𝐿 𝑖,𝑘_𝑜𝑝𝑡
+ 𝛻𝑖
0 𝐶𝐿𝐻 𝑖,𝑘_𝑜𝑝𝑡
< 𝐶 𝐻𝐿 𝑖,𝑘_𝑜𝑝𝑡
∆𝑖,𝑘
𝑆
≥ 𝑦2
𝐶𝐿𝐻 𝑖,𝑘_𝑜𝑝𝑡
= 𝐶𝐿𝐻 𝑖,𝑘_𝑜𝑝𝑡
𝐶 𝐻𝐿 𝑖,𝑘_𝑜𝑝𝑡
= 𝐶 𝐻𝐿 𝑖,𝑘_𝑜𝑝𝑡
UC Lab Kyung Hee University, South Korea 13
(a) (b) (c) (d)
(e) (f) (g) (h)
UC Lab Kyung Hee University, South Korea 14
Table 1: Quality of embedded images
Image CPSNR (dB) SSIM
Airplane 45.81 0.992
Girl 53.13 0.999
House 43.41 0.995
Lena 48.17 0.999
Mandrill 46.75 0.999
Peppers 44.57 0.999
Sailboat 43.73 0.998
Splash 55.28 0.999
Image quality after embedment
Original Watermarked
UC Lab Kyung Hee University, South Korea 15
Watermark robustness after extraction (NC value)
0.4
0.5
0.6
0.7
0.8
0.9
1
Non-attack Scaling Cropping 25% Rotation (0.5) Gaussian noise
Geometric attacking
Airplane Girl House Lena Mandrill Peppers Sailboat Splash
0.4
0.5
0.6
0.7
0.8
0.9
1
Histogram
equalization
Average filter 7x7 Median filter 7x7 Gaussian filter 7x7
Non-geometric attacking
Airplane Girl House Lena Mandrill Peppers Sailboat Splash
0.4
0.5
0.6
0.7
0.8
0.9
1
JPEG QF=10% JPEG QF=20% JPEG QF=40% JPEG QF=60%
Lossy JPEG compression
Airplane Girl House Lena Mandrill Peppers Sailboat Splash
UC Lab Kyung Hee University, South Korea 16
0.4
0.5
0.6
0.7
0.8
0.9
1
Scaling Cropping
20%
Rotation (5) Gaussian
noise
Median
filter 3x3
Gaussian
filter 3x3
JPEG
QF=30%
JPEG
QF=40%
JPEG
QF=70%
Robustness comparison - NC
Niu [7] Proposed
40.71
48.17
36 38 40 42 44 46 48 50
Niu's method
Proposed method
Imperceptibility comparison - CPSNR (dB)
optimal channel selection
• Combined key
optimal threshold
high quality of watermarked image is obtained
robust against most types of attacks
17
UC Lab Kyung Hee University, South Korea 18
UC Lab Kyung Hee University, South Korea 19

Weitere ähnliche Inhalte

Was ist angesagt?

hh2014_presentation2noBackup
hh2014_presentation2noBackuphh2014_presentation2noBackup
hh2014_presentation2noBackupJere Harrison
 
3D Shape and Indirect Appearance by Structured Light Transport
3D Shape and Indirect Appearance by Structured Light Transport3D Shape and Indirect Appearance by Structured Light Transport
3D Shape and Indirect Appearance by Structured Light TransportMatthew O'Toole
 
Deep Local Parametric Filters for Image Enhancement
Deep Local Parametric Filters for Image EnhancementDeep Local Parametric Filters for Image Enhancement
Deep Local Parametric Filters for Image EnhancementSean Moran
 
Sobel Edge Detection Using FPGA
Sobel Edge Detection Using FPGASobel Edge Detection Using FPGA
Sobel Edge Detection Using FPGAghanshyam zambare
 
Ieee 2016 nss mic poster N30-21
Ieee 2016 nss mic poster N30-21Ieee 2016 nss mic poster N30-21
Ieee 2016 nss mic poster N30-21Dae Woon Kim
 
Multi-camera Time-of-Flight Systems | SIGGRAPH 2016
Multi-camera Time-of-Flight Systems | SIGGRAPH 2016Multi-camera Time-of-Flight Systems | SIGGRAPH 2016
Multi-camera Time-of-Flight Systems | SIGGRAPH 2016StanfordComputationalImaging
 
Recent Progress on Object Detection_20170331
Recent Progress on Object Detection_20170331Recent Progress on Object Detection_20170331
Recent Progress on Object Detection_20170331Jihong Kang
 
Wave-Based Non-Line-of-Sight Imaging Using Fast f–k Migration | SIGGRAPH 2019
Wave-Based Non-Line-of-Sight Imaging Using Fast f–k Migration | SIGGRAPH 2019Wave-Based Non-Line-of-Sight Imaging Using Fast f–k Migration | SIGGRAPH 2019
Wave-Based Non-Line-of-Sight Imaging Using Fast f–k Migration | SIGGRAPH 2019David Lindell
 
MIC-TJU at MediaEval Violent Scenes Detection (VSD) 2014
MIC-TJU at MediaEval Violent Scenes Detection (VSD) 2014MIC-TJU at MediaEval Violent Scenes Detection (VSD) 2014
MIC-TJU at MediaEval Violent Scenes Detection (VSD) 2014multimediaeval
 
ieee nss mic 2016 poster N30-21
ieee nss mic 2016 poster N30-21ieee nss mic 2016 poster N30-21
ieee nss mic 2016 poster N30-21Dae Woon Kim
 
Deep learning for image super resolution
Deep learning for image super resolutionDeep learning for image super resolution
Deep learning for image super resolutionPrudhvi Raj
 
Digital Image Processing: An Introduction
Digital Image Processing: An IntroductionDigital Image Processing: An Introduction
Digital Image Processing: An IntroductionMostafa G. M. Mostafa
 
The neural tangent link between CNN denoisers and non-local filters
The neural tangent link between CNN denoisers and non-local filtersThe neural tangent link between CNN denoisers and non-local filters
The neural tangent link between CNN denoisers and non-local filtersJulián Tachella
 
Deep Local Parametric Filters for Image Enhancement
Deep Local Parametric Filters for Image EnhancementDeep Local Parametric Filters for Image Enhancement
Deep Local Parametric Filters for Image EnhancementSean Moran
 
Object Detection Methods using Deep Learning
Object Detection Methods using Deep LearningObject Detection Methods using Deep Learning
Object Detection Methods using Deep LearningSungjoon Choi
 
How much position information do convolutional neural networks encode? review...
How much position information do convolutional neural networks encode? review...How much position information do convolutional neural networks encode? review...
How much position information do convolutional neural networks encode? review...Dongmin Choi
 
Deblurring Image and Removing Noise from Medical Images for Cancerous Disease...
Deblurring Image and Removing Noise from Medical Images for Cancerous Disease...Deblurring Image and Removing Noise from Medical Images for Cancerous Disease...
Deblurring Image and Removing Noise from Medical Images for Cancerous Disease...IRJET Journal
 

Was ist angesagt? (20)

hh2014_presentation2noBackup
hh2014_presentation2noBackuphh2014_presentation2noBackup
hh2014_presentation2noBackup
 
3D Shape and Indirect Appearance by Structured Light Transport
3D Shape and Indirect Appearance by Structured Light Transport3D Shape and Indirect Appearance by Structured Light Transport
3D Shape and Indirect Appearance by Structured Light Transport
 
Deep Learning for Computer Vision: Object Detection (UPC 2016)
Deep Learning for Computer Vision: Object Detection (UPC 2016)Deep Learning for Computer Vision: Object Detection (UPC 2016)
Deep Learning for Computer Vision: Object Detection (UPC 2016)
 
Deep Local Parametric Filters for Image Enhancement
Deep Local Parametric Filters for Image EnhancementDeep Local Parametric Filters for Image Enhancement
Deep Local Parametric Filters for Image Enhancement
 
Sobel Edge Detection Using FPGA
Sobel Edge Detection Using FPGASobel Edge Detection Using FPGA
Sobel Edge Detection Using FPGA
 
Ieee 2016 nss mic poster N30-21
Ieee 2016 nss mic poster N30-21Ieee 2016 nss mic poster N30-21
Ieee 2016 nss mic poster N30-21
 
Multi-camera Time-of-Flight Systems | SIGGRAPH 2016
Multi-camera Time-of-Flight Systems | SIGGRAPH 2016Multi-camera Time-of-Flight Systems | SIGGRAPH 2016
Multi-camera Time-of-Flight Systems | SIGGRAPH 2016
 
Recent Progress on Object Detection_20170331
Recent Progress on Object Detection_20170331Recent Progress on Object Detection_20170331
Recent Progress on Object Detection_20170331
 
Wave-Based Non-Line-of-Sight Imaging Using Fast f–k Migration | SIGGRAPH 2019
Wave-Based Non-Line-of-Sight Imaging Using Fast f–k Migration | SIGGRAPH 2019Wave-Based Non-Line-of-Sight Imaging Using Fast f–k Migration | SIGGRAPH 2019
Wave-Based Non-Line-of-Sight Imaging Using Fast f–k Migration | SIGGRAPH 2019
 
MIC-TJU at MediaEval Violent Scenes Detection (VSD) 2014
MIC-TJU at MediaEval Violent Scenes Detection (VSD) 2014MIC-TJU at MediaEval Violent Scenes Detection (VSD) 2014
MIC-TJU at MediaEval Violent Scenes Detection (VSD) 2014
 
ieee nss mic 2016 poster N30-21
ieee nss mic 2016 poster N30-21ieee nss mic 2016 poster N30-21
ieee nss mic 2016 poster N30-21
 
Deep learning for image super resolution
Deep learning for image super resolutionDeep learning for image super resolution
Deep learning for image super resolution
 
Digital Image Processing: An Introduction
Digital Image Processing: An IntroductionDigital Image Processing: An Introduction
Digital Image Processing: An Introduction
 
The neural tangent link between CNN denoisers and non-local filters
The neural tangent link between CNN denoisers and non-local filtersThe neural tangent link between CNN denoisers and non-local filters
The neural tangent link between CNN denoisers and non-local filters
 
Deep Local Parametric Filters for Image Enhancement
Deep Local Parametric Filters for Image EnhancementDeep Local Parametric Filters for Image Enhancement
Deep Local Parametric Filters for Image Enhancement
 
Object Detection Methods using Deep Learning
Object Detection Methods using Deep LearningObject Detection Methods using Deep Learning
Object Detection Methods using Deep Learning
 
How much position information do convolutional neural networks encode? review...
How much position information do convolutional neural networks encode? review...How much position information do convolutional neural networks encode? review...
How much position information do convolutional neural networks encode? review...
 
Adaptive object detection using adjacency and zoom prediction
Adaptive object detection using adjacency and zoom predictionAdaptive object detection using adjacency and zoom prediction
Adaptive object detection using adjacency and zoom prediction
 
Object Detection - Míriam Bellver - UPC Barcelona 2018
Object Detection - Míriam Bellver - UPC Barcelona 2018Object Detection - Míriam Bellver - UPC Barcelona 2018
Object Detection - Míriam Bellver - UPC Barcelona 2018
 
Deblurring Image and Removing Noise from Medical Images for Cancerous Disease...
Deblurring Image and Removing Noise from Medical Images for Cancerous Disease...Deblurring Image and Removing Noise from Medical Images for Cancerous Disease...
Deblurring Image and Removing Noise from Medical Images for Cancerous Disease...
 

Ähnlich wie A Novel Watermarking Scheme for Image Authentication in Social Networks

Decision Forests and discriminant analysis
Decision Forests and discriminant analysisDecision Forests and discriminant analysis
Decision Forests and discriminant analysispotaters
 
Mlp mixer an all-mlp architecture for vision
Mlp mixer  an all-mlp architecture for visionMlp mixer  an all-mlp architecture for vision
Mlp mixer an all-mlp architecture for visionJaey Jeong
 
Application of feature point matching to video stabilization
Application of feature point matching to video stabilizationApplication of feature point matching to video stabilization
Application of feature point matching to video stabilizationNikhil Prathapani
 
Near-Duplicate Video Retrieval by Aggregating Intermediate CNN Layers
Near-Duplicate Video Retrieval by Aggregating Intermediate CNN LayersNear-Duplicate Video Retrieval by Aggregating Intermediate CNN Layers
Near-Duplicate Video Retrieval by Aggregating Intermediate CNN LayersSymeon Papadopoulos
 
[2018 台灣人工智慧學校校友年會] 視訊畫面生成 / 林彥宇
[2018 台灣人工智慧學校校友年會] 視訊畫面生成 / 林彥宇[2018 台灣人工智慧學校校友年會] 視訊畫面生成 / 林彥宇
[2018 台灣人工智慧學校校友年會] 視訊畫面生成 / 林彥宇台灣資料科學年會
 
Sparse representation based human action recognition using an action region-a...
Sparse representation based human action recognition using an action region-a...Sparse representation based human action recognition using an action region-a...
Sparse representation based human action recognition using an action region-a...Wesley De Neve
 
TVSum: Summarizing Web Videos Using Titles
TVSum: Summarizing Web Videos Using TitlesTVSum: Summarizing Web Videos Using Titles
TVSum: Summarizing Web Videos Using TitlesNEERAJ BAGHEL
 
Lecture 29 Convolutional Neural Networks - Computer Vision Spring2015
Lecture 29 Convolutional Neural Networks -  Computer Vision Spring2015Lecture 29 Convolutional Neural Networks -  Computer Vision Spring2015
Lecture 29 Convolutional Neural Networks - Computer Vision Spring2015Jia-Bin Huang
 
Deep Learning for Personalized Search and Recommender Systems
Deep Learning for Personalized Search and Recommender SystemsDeep Learning for Personalized Search and Recommender Systems
Deep Learning for Personalized Search and Recommender SystemsBenjamin Le
 
Deep learning for molecules, introduction to chainer chemistry
Deep learning for molecules, introduction to chainer chemistryDeep learning for molecules, introduction to chainer chemistry
Deep learning for molecules, introduction to chainer chemistryKenta Oono
 
Image Translation with GAN
Image Translation with GANImage Translation with GAN
Image Translation with GANJunho Cho
 
Deep Learning Approach in Characterizing Salt Body on Seismic Images - by Zhe...
Deep Learning Approach in Characterizing Salt Body on Seismic Images - by Zhe...Deep Learning Approach in Characterizing Salt Body on Seismic Images - by Zhe...
Deep Learning Approach in Characterizing Salt Body on Seismic Images - by Zhe...Yan Xu
 
Contrast and resolution improvement of pocus using self consistent cycle gan
Contrast and resolution improvement of pocus using self consistent cycle ganContrast and resolution improvement of pocus using self consistent cycle gan
Contrast and resolution improvement of pocus using self consistent cycle ganShujaat Khan
 
Morgan uw maGIV v1.3 dist
Morgan uw maGIV v1.3 distMorgan uw maGIV v1.3 dist
Morgan uw maGIV v1.3 distddm314
 

Ähnlich wie A Novel Watermarking Scheme for Image Authentication in Social Networks (20)

Decision Forests and discriminant analysis
Decision Forests and discriminant analysisDecision Forests and discriminant analysis
Decision Forests and discriminant analysis
 
Fa19_P1.pptx
Fa19_P1.pptxFa19_P1.pptx
Fa19_P1.pptx
 
Mlp mixer an all-mlp architecture for vision
Mlp mixer  an all-mlp architecture for visionMlp mixer  an all-mlp architecture for vision
Mlp mixer an all-mlp architecture for vision
 
Application of feature point matching to video stabilization
Application of feature point matching to video stabilizationApplication of feature point matching to video stabilization
Application of feature point matching to video stabilization
 
Near-Duplicate Video Retrieval by Aggregating Intermediate CNN Layers
Near-Duplicate Video Retrieval by Aggregating Intermediate CNN LayersNear-Duplicate Video Retrieval by Aggregating Intermediate CNN Layers
Near-Duplicate Video Retrieval by Aggregating Intermediate CNN Layers
 
med_poster_spie
med_poster_spiemed_poster_spie
med_poster_spie
 
[2018 台灣人工智慧學校校友年會] 視訊畫面生成 / 林彥宇
[2018 台灣人工智慧學校校友年會] 視訊畫面生成 / 林彥宇[2018 台灣人工智慧學校校友年會] 視訊畫面生成 / 林彥宇
[2018 台灣人工智慧學校校友年會] 視訊畫面生成 / 林彥宇
 
Temporal Segment Network
Temporal Segment NetworkTemporal Segment Network
Temporal Segment Network
 
Sparse representation based human action recognition using an action region-a...
Sparse representation based human action recognition using an action region-a...Sparse representation based human action recognition using an action region-a...
Sparse representation based human action recognition using an action region-a...
 
TVSum: Summarizing Web Videos Using Titles
TVSum: Summarizing Web Videos Using TitlesTVSum: Summarizing Web Videos Using Titles
TVSum: Summarizing Web Videos Using Titles
 
Lecture 29 Convolutional Neural Networks - Computer Vision Spring2015
Lecture 29 Convolutional Neural Networks -  Computer Vision Spring2015Lecture 29 Convolutional Neural Networks -  Computer Vision Spring2015
Lecture 29 Convolutional Neural Networks - Computer Vision Spring2015
 
Deep Learning for Personalized Search and Recommender Systems
Deep Learning for Personalized Search and Recommender SystemsDeep Learning for Personalized Search and Recommender Systems
Deep Learning for Personalized Search and Recommender Systems
 
Deep learning for molecules, introduction to chainer chemistry
Deep learning for molecules, introduction to chainer chemistryDeep learning for molecules, introduction to chainer chemistry
Deep learning for molecules, introduction to chainer chemistry
 
Image Translation with GAN
Image Translation with GANImage Translation with GAN
Image Translation with GAN
 
tracking.ppt
tracking.ppttracking.ppt
tracking.ppt
 
Review DRCN
Review DRCNReview DRCN
Review DRCN
 
Sequential Query Expansion using Concept Graph
Sequential Query Expansion using Concept GraphSequential Query Expansion using Concept Graph
Sequential Query Expansion using Concept Graph
 
Deep Learning Approach in Characterizing Salt Body on Seismic Images - by Zhe...
Deep Learning Approach in Characterizing Salt Body on Seismic Images - by Zhe...Deep Learning Approach in Characterizing Salt Body on Seismic Images - by Zhe...
Deep Learning Approach in Characterizing Salt Body on Seismic Images - by Zhe...
 
Contrast and resolution improvement of pocus using self consistent cycle gan
Contrast and resolution improvement of pocus using self consistent cycle ganContrast and resolution improvement of pocus using self consistent cycle gan
Contrast and resolution improvement of pocus using self consistent cycle gan
 
Morgan uw maGIV v1.3 dist
Morgan uw maGIV v1.3 distMorgan uw maGIV v1.3 dist
Morgan uw maGIV v1.3 dist
 

Mehr von Oresti Banos

Measuring human behaviour to inform e-coaching actions
Measuring human behaviour to inform e-coaching actionsMeasuring human behaviour to inform e-coaching actions
Measuring human behaviour to inform e-coaching actionsOresti Banos
 
Measuring human behaviour by sensing everyday mobile interactions
Measuring human behaviour by sensing everyday mobile interactionsMeasuring human behaviour by sensing everyday mobile interactions
Measuring human behaviour by sensing everyday mobile interactionsOresti Banos
 
Emotion AI: Concepts, Challenges and Opportunities
Emotion AI: Concepts, Challenges and OpportunitiesEmotion AI: Concepts, Challenges and Opportunities
Emotion AI: Concepts, Challenges and OpportunitiesOresti Banos
 
Biosignal Processing
Biosignal ProcessingBiosignal Processing
Biosignal ProcessingOresti Banos
 
Automatic mapping of motivational text messages into ontological entities for...
Automatic mapping of motivational text messages into ontological entities for...Automatic mapping of motivational text messages into ontological entities for...
Automatic mapping of motivational text messages into ontological entities for...Oresti Banos
 
Enabling remote assessment of cognitive behaviour through mobile experience s...
Enabling remote assessment of cognitive behaviour through mobile experience s...Enabling remote assessment of cognitive behaviour through mobile experience s...
Enabling remote assessment of cognitive behaviour through mobile experience s...Oresti Banos
 
Ontological Modeling of Motivational Messages for Physical Activity Coaching
Ontological Modeling of Motivational Messages for Physical Activity CoachingOntological Modeling of Motivational Messages for Physical Activity Coaching
Ontological Modeling of Motivational Messages for Physical Activity CoachingOresti Banos
 
Mobile Health System for Evaluation of Breast Cancer Patients During Treatmen...
Mobile Health System for Evaluation of Breast Cancer Patients During Treatmen...Mobile Health System for Evaluation of Breast Cancer Patients During Treatmen...
Mobile Health System for Evaluation of Breast Cancer Patients During Treatmen...Oresti Banos
 
Analysis of the Innovation Outputs in mHealth for Patient Monitoring
Analysis of the Innovation Outputs in mHealth for Patient MonitoringAnalysis of the Innovation Outputs in mHealth for Patient Monitoring
Analysis of the Innovation Outputs in mHealth for Patient MonitoringOresti Banos
 
First Approach to Automatic Performance Status Evaluation and Physical Activi...
First Approach to Automatic Performance Status Evaluation and Physical Activi...First Approach to Automatic Performance Status Evaluation and Physical Activi...
First Approach to Automatic Performance Status Evaluation and Physical Activi...Oresti Banos
 
First Approach to Automatic Measurement of Frontal Plane Projection Angle Dur...
First Approach to Automatic Measurement of Frontal Plane Projection Angle Dur...First Approach to Automatic Measurement of Frontal Plane Projection Angle Dur...
First Approach to Automatic Measurement of Frontal Plane Projection Angle Dur...Oresti Banos
 
High-Level Context Inference for Human Behavior Identi cation
High-Level Context Inference for Human Behavior IdenticationHigh-Level Context Inference for Human Behavior Identication
High-Level Context Inference for Human Behavior Identi cationOresti Banos
 
On the Development of A Real-Time Multi-Sensor Activity Recognition System
On the Development of A Real-Time Multi-Sensor Activity Recognition SystemOn the Development of A Real-Time Multi-Sensor Activity Recognition System
On the Development of A Real-Time Multi-Sensor Activity Recognition SystemOresti Banos
 
Facilitating Trunk Endurance Assessment by means of Mobile Health Technologies
Facilitating Trunk Endurance Assessment by means of Mobile Health TechnologiesFacilitating Trunk Endurance Assessment by means of Mobile Health Technologies
Facilitating Trunk Endurance Assessment by means of Mobile Health TechnologiesOresti Banos
 
Mining Human Behavior for Health Promotion
Mining Human Behavior for Health PromotionMining Human Behavior for Health Promotion
Mining Human Behavior for Health PromotionOresti Banos
 
Multiwindow Fusion for Wearable Activity Recognition
Multiwindow Fusion for Wearable Activity RecognitionMultiwindow Fusion for Wearable Activity Recognition
Multiwindow Fusion for Wearable Activity RecognitionOresti Banos
 
Mining Minds: an innovative framework for personalized health and wellness su...
Mining Minds: an innovative framework for personalized health and wellness su...Mining Minds: an innovative framework for personalized health and wellness su...
Mining Minds: an innovative framework for personalized health and wellness su...Oresti Banos
 
mHealthDroid: a novel framework for agile development of mobile health appli...
mHealthDroid: a novel framework for agile development of mobile health appli...mHealthDroid: a novel framework for agile development of mobile health appli...
mHealthDroid: a novel framework for agile development of mobile health appli...Oresti Banos
 
Sistema automático para la estimación de la presión arterial a partir de pará...
Sistema automático para la estimación de la presión arterial a partir de pará...Sistema automático para la estimación de la presión arterial a partir de pará...
Sistema automático para la estimación de la presión arterial a partir de pará...Oresti Banos
 

Mehr von Oresti Banos (20)

Measuring human behaviour to inform e-coaching actions
Measuring human behaviour to inform e-coaching actionsMeasuring human behaviour to inform e-coaching actions
Measuring human behaviour to inform e-coaching actions
 
Measuring human behaviour by sensing everyday mobile interactions
Measuring human behaviour by sensing everyday mobile interactionsMeasuring human behaviour by sensing everyday mobile interactions
Measuring human behaviour by sensing everyday mobile interactions
 
Emotion AI: Concepts, Challenges and Opportunities
Emotion AI: Concepts, Challenges and OpportunitiesEmotion AI: Concepts, Challenges and Opportunities
Emotion AI: Concepts, Challenges and Opportunities
 
Biodata analysis
Biodata analysisBiodata analysis
Biodata analysis
 
Biosignal Processing
Biosignal ProcessingBiosignal Processing
Biosignal Processing
 
Automatic mapping of motivational text messages into ontological entities for...
Automatic mapping of motivational text messages into ontological entities for...Automatic mapping of motivational text messages into ontological entities for...
Automatic mapping of motivational text messages into ontological entities for...
 
Enabling remote assessment of cognitive behaviour through mobile experience s...
Enabling remote assessment of cognitive behaviour through mobile experience s...Enabling remote assessment of cognitive behaviour through mobile experience s...
Enabling remote assessment of cognitive behaviour through mobile experience s...
 
Ontological Modeling of Motivational Messages for Physical Activity Coaching
Ontological Modeling of Motivational Messages for Physical Activity CoachingOntological Modeling of Motivational Messages for Physical Activity Coaching
Ontological Modeling of Motivational Messages for Physical Activity Coaching
 
Mobile Health System for Evaluation of Breast Cancer Patients During Treatmen...
Mobile Health System for Evaluation of Breast Cancer Patients During Treatmen...Mobile Health System for Evaluation of Breast Cancer Patients During Treatmen...
Mobile Health System for Evaluation of Breast Cancer Patients During Treatmen...
 
Analysis of the Innovation Outputs in mHealth for Patient Monitoring
Analysis of the Innovation Outputs in mHealth for Patient MonitoringAnalysis of the Innovation Outputs in mHealth for Patient Monitoring
Analysis of the Innovation Outputs in mHealth for Patient Monitoring
 
First Approach to Automatic Performance Status Evaluation and Physical Activi...
First Approach to Automatic Performance Status Evaluation and Physical Activi...First Approach to Automatic Performance Status Evaluation and Physical Activi...
First Approach to Automatic Performance Status Evaluation and Physical Activi...
 
First Approach to Automatic Measurement of Frontal Plane Projection Angle Dur...
First Approach to Automatic Measurement of Frontal Plane Projection Angle Dur...First Approach to Automatic Measurement of Frontal Plane Projection Angle Dur...
First Approach to Automatic Measurement of Frontal Plane Projection Angle Dur...
 
High-Level Context Inference for Human Behavior Identi cation
High-Level Context Inference for Human Behavior IdenticationHigh-Level Context Inference for Human Behavior Identication
High-Level Context Inference for Human Behavior Identi cation
 
On the Development of A Real-Time Multi-Sensor Activity Recognition System
On the Development of A Real-Time Multi-Sensor Activity Recognition SystemOn the Development of A Real-Time Multi-Sensor Activity Recognition System
On the Development of A Real-Time Multi-Sensor Activity Recognition System
 
Facilitating Trunk Endurance Assessment by means of Mobile Health Technologies
Facilitating Trunk Endurance Assessment by means of Mobile Health TechnologiesFacilitating Trunk Endurance Assessment by means of Mobile Health Technologies
Facilitating Trunk Endurance Assessment by means of Mobile Health Technologies
 
Mining Human Behavior for Health Promotion
Mining Human Behavior for Health PromotionMining Human Behavior for Health Promotion
Mining Human Behavior for Health Promotion
 
Multiwindow Fusion for Wearable Activity Recognition
Multiwindow Fusion for Wearable Activity RecognitionMultiwindow Fusion for Wearable Activity Recognition
Multiwindow Fusion for Wearable Activity Recognition
 
Mining Minds: an innovative framework for personalized health and wellness su...
Mining Minds: an innovative framework for personalized health and wellness su...Mining Minds: an innovative framework for personalized health and wellness su...
Mining Minds: an innovative framework for personalized health and wellness su...
 
mHealthDroid: a novel framework for agile development of mobile health appli...
mHealthDroid: a novel framework for agile development of mobile health appli...mHealthDroid: a novel framework for agile development of mobile health appli...
mHealthDroid: a novel framework for agile development of mobile health appli...
 
Sistema automático para la estimación de la presión arterial a partir de pará...
Sistema automático para la estimación de la presión arterial a partir de pará...Sistema automático para la estimación de la presión arterial a partir de pará...
Sistema automático para la estimación de la presión arterial a partir de pará...
 

Kürzlich hochgeladen

Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slidevu2urc
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024The Digital Insurer
 
A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?Igalia
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsEnterprise Knowledge
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreternaman860154
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Miguel Araújo
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slidespraypatel2
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc
 
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxFactors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxKatpro Technologies
 
What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?Antenna Manufacturer Coco
 
Advantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your BusinessAdvantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your BusinessPixlogix Infotech
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationMichael W. Hawkins
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Servicegiselly40
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdfhans926745
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxMalak Abu Hammad
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking MenDelhi Call girls
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Scriptwesley chun
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking MenDelhi Call girls
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking MenDelhi Call girls
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationRadu Cotescu
 

Kürzlich hochgeladen (20)

Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slide
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024
 
A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI Solutions
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreter
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slides
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
 
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxFactors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
 
What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?
 
Advantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your BusinessAdvantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your Business
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day Presentation
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Service
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptx
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Script
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organization
 

A Novel Watermarking Scheme for Image Authentication in Social Networks

  • 1. UC Lab Kyung Hee University, South Korea January 09 , 2015
  • 2. UC Lab Kyung Hee University, South Korea 2
  • 3. UC Lab Kyung Hee University, South Korea 3 • Millions of images are shared every day through the SNS • Many of these images end up in the hands of unknown people that use them in an illegal and malicious manner • Mechanisms for ensuring the ownership and protecting the copyright are utterly required to settle potential disputes Image Watermarking
  • 4. UC Lab Kyung Hee University, South Korea 4 Convenience Imperceptibility Robustness The information should be extracted from the original image A watermark has to be imperceptible A watermark needs to be robust against image modifications
  • 5. visualization frequency domain • Quality  Optimal color channel selection • Accuracy rate in the extraction process  Optimal threshold based on the Otsu method. UC Lab Kyung Hee University, South Korea 5
  • 6. UC Lab Kyung Hee University, South Korea 6 Article Key concept Limitations Xiang-yang [2012] Fourier transform Least square support vector machine (LS-SVM) High computation time for LS-SVM training. Niu [2011] Nonsubsampled coutourlet transform (NSCT) Support vector regression (SVR) Low performing NSCT and computation time in extraction process. Song [2012] Curvelet transform Coefficient quantization technique Weakness under lossy JPEG compression Chou [2010] Wavelet transform Just noticeable color difference (JNCD) Weakness under geometric operations and hue modification.
  • 7. UC Lab Kyung Hee University, South Korea 7 Color Images 4-DWT Coeffient Blocking Coeffient Difference Optimum Selection Embedding Rule Coefficient Unblocking 4-IDWT Embedded Image Binary Watermark Bit shuffling Combined Key Recovered Watermark Bit Reshuffling Extraction Rule Coefficient Difference Coefficient Blocking 4-DWT Modified Image Adaptive threshold Otsu method Channel Attacks Embedding process Extraction process
  • 8. UC Lab Kyung Hee University, South Korea 8 Color Images 4-DWT Coefficient Blocking Coefficient Difference Optimum Selection Embedding Rule Coefficient Unblocking 4-IDWT Embedded Image Binary Watermark Bit shuffling Combined Key HL4 (C(HL,i)) LH4 (C(LH,i)) Block 1 C(HL,1 ) Block 2 Block n C(HL,2) C(LH,1 ) C(LH,2)C(HL,n) C(HL,n) Coefficient difference Numberofblocks Before embedding The embedding process Coefficient difference Numberofblocks After embedding 0-bits 1-bits y1 y2
  • 9. ∆𝑖,𝑘 (= 𝐶𝐿𝐻𝑖,𝑘 − 𝐶 𝐻𝐿 𝑖,𝑘 ) ∆𝑖,𝑘→ ∆𝑖,𝑘 𝑆 𝛻𝑖 0 = 𝑦1 − ∆𝑖,𝑘 𝑆 𝑦1 = 1 𝑁0 𝑘=1 3 𝑖=1 𝑁0 ∆𝑖,𝑘 𝑆 𝐶𝐿𝐻 𝑖,𝑘_𝑜𝑝𝑡 = 𝐶𝐿𝐻 𝑖,𝑘_𝑜𝑝𝑡 + 𝛻𝑖 0 ; ∀𝐶𝐿𝐻 𝑖,𝑘_𝑜𝑝𝑡 ≥ 𝐶 𝐻𝐿 𝑖,𝑘_𝑜𝑝𝑡 𝐶 𝐻𝐿 𝑖,𝑘_𝑜𝑝𝑡 = 𝐶 𝐻𝐿 𝑖,𝑘_𝑜𝑝𝑡 + 𝛻𝑖 0 ; ∀𝐶𝐿𝐻 𝑖,𝑘_𝑜𝑝𝑡 < 𝐶 𝐻𝐿 𝑖,𝑘_𝑜𝑝𝑡 UC Lab Kyung Hee University, South Korea 9 LL4 HL4 LH4 HH4 HL4 (C(HL,i)) LH4 (C(LH,i)) Block 1 C(HL,1 ) Block 2 Block n C(HL,2) C(LH,1 ) C(LH,2)C(HL,n) C(HL,n)
  • 10. The embedding process UC Lab Kyung Hee University, South Korea 10 ∆1,𝑅 ∆1,𝐺 ∆1,𝐵 ∆2,𝑅 ∆2,𝐺 ∆2,𝐵 ⋮ ⋮ ⋮ ∆ 𝑛−1,𝑅 ∆ 𝑛−1,𝐺 ∆ 𝑛−1,𝐵 ∆ 𝑛,𝑅 ∆ 𝑛,𝐺 ∆ 𝑛,𝐵 ∆𝑖,𝑘 − 𝑦1 ; ∀ 0 − bit ∆𝑖,𝑘 − 𝑦2 ; ∀ 1 − bit
  • 11. UC Lab Kyung Hee University, South Korea 11 The extraction process Embedded Image Recovered Watermark Bit Reshuffling Extraction Rule Coefficient Difference Coefficient Blocking 4-DWT Modified Image Adaptive threshold Otsu method Attacks HL4 (C(HL,i)) LH4 (C(LH,i)) Block 1 C(HL,1 ) Block 2 Block n C(HL,2) C(LH,1 ) C(LH,2)C(HL,n) C(HL,n) Coefficient difference Numberofblocks After embedding Optimal threshold 0-bits 1-bits
  • 12. 𝛻𝑖 1 = 𝑦2 − ∆𝑖,𝑘 𝑆 𝑦2 = 1 𝑁0 𝑘=1 3 ∆𝑖=𝜆𝑁1,𝑘 𝑆 ∆𝑖,𝑘 𝑆 < 𝑦2 𝐶𝐿𝐻 𝑖,𝑘_𝑜𝑝𝑡 = 𝐶𝐿𝐻 𝑖,𝑘_𝑜𝑝𝑡 + 𝛻𝑖 1 𝐶 𝐻𝐿 𝑖,𝑘_𝑜𝑝𝑡 = 𝐶 𝐻𝐿 𝑖,𝑘_𝑜𝑝𝑡 − 𝛻𝑖 0 𝐶𝐿𝐻 𝑖,𝑘_𝑜𝑝𝑡 ≥ 𝐶 𝐻𝐿 𝑖,𝑘_𝑜𝑝𝑡 𝐶𝐿𝐻 𝑖,𝑘_𝑜𝑝𝑡 = 𝐶𝐿𝐻 𝑖,𝑘_𝑜𝑝𝑡 − 𝛻𝑖 1 𝐶 𝐻𝐿 𝑖,𝑘_𝑜𝑝𝑡 = 𝐶 𝐻𝐿 𝑖,𝑘_𝑜𝑝𝑡 + 𝛻𝑖 0 𝐶𝐿𝐻 𝑖,𝑘_𝑜𝑝𝑡 < 𝐶 𝐻𝐿 𝑖,𝑘_𝑜𝑝𝑡 ∆𝑖,𝑘 𝑆 ≥ 𝑦2 𝐶𝐿𝐻 𝑖,𝑘_𝑜𝑝𝑡 = 𝐶𝐿𝐻 𝑖,𝑘_𝑜𝑝𝑡 𝐶 𝐻𝐿 𝑖,𝑘_𝑜𝑝𝑡 = 𝐶 𝐻𝐿 𝑖,𝑘_𝑜𝑝𝑡
  • 13. UC Lab Kyung Hee University, South Korea 13 (a) (b) (c) (d) (e) (f) (g) (h)
  • 14. UC Lab Kyung Hee University, South Korea 14 Table 1: Quality of embedded images Image CPSNR (dB) SSIM Airplane 45.81 0.992 Girl 53.13 0.999 House 43.41 0.995 Lena 48.17 0.999 Mandrill 46.75 0.999 Peppers 44.57 0.999 Sailboat 43.73 0.998 Splash 55.28 0.999 Image quality after embedment Original Watermarked
  • 15. UC Lab Kyung Hee University, South Korea 15 Watermark robustness after extraction (NC value) 0.4 0.5 0.6 0.7 0.8 0.9 1 Non-attack Scaling Cropping 25% Rotation (0.5) Gaussian noise Geometric attacking Airplane Girl House Lena Mandrill Peppers Sailboat Splash 0.4 0.5 0.6 0.7 0.8 0.9 1 Histogram equalization Average filter 7x7 Median filter 7x7 Gaussian filter 7x7 Non-geometric attacking Airplane Girl House Lena Mandrill Peppers Sailboat Splash 0.4 0.5 0.6 0.7 0.8 0.9 1 JPEG QF=10% JPEG QF=20% JPEG QF=40% JPEG QF=60% Lossy JPEG compression Airplane Girl House Lena Mandrill Peppers Sailboat Splash
  • 16. UC Lab Kyung Hee University, South Korea 16 0.4 0.5 0.6 0.7 0.8 0.9 1 Scaling Cropping 20% Rotation (5) Gaussian noise Median filter 3x3 Gaussian filter 3x3 JPEG QF=30% JPEG QF=40% JPEG QF=70% Robustness comparison - NC Niu [7] Proposed 40.71 48.17 36 38 40 42 44 46 48 50 Niu's method Proposed method Imperceptibility comparison - CPSNR (dB)
  • 17. optimal channel selection • Combined key optimal threshold high quality of watermarked image is obtained robust against most types of attacks 17
  • 18. UC Lab Kyung Hee University, South Korea 18
  • 19. UC Lab Kyung Hee University, South Korea 19

Hinweis der Redaktion

  1. Most data on the Internet including images, videos have been not certified and protected to against the unauthorized copy issue. Therefore, we need a watermarking technique to assign a copyright on our images. In which a watermark is embedded into a host image and able to extract exactly in contention.
  2. The motivations for proposal of a watermarking method are robustness, imperceptibility and convenience. -> Explain each of them.
  3. Describe content on the slide
  4. The input of our method is a color image and a watermark is a binary image. The uniqueness is an optimum color channel selection to apply the embedding rule to achive an imperceptibility at the output. The wavelet coefficients have been modified based on the value of coefficient difference and watermark bits.
  5. The embedded images in transmission, storage process can be attacks by common digital signal proceses. In extraction, the watermark bits are extracted based on comparing the threshold with coefficient different value. The watermark bits after extracted will be reshuffling to obtain the original one.
  6. Describe content on the slide
  7. This slide show the result of image quality after embedding process based on CPNSR and SSIM parameter. Higher value of CPNSR is better. Different images with different structure and texture have different values of CPSNR. SSIM should reach to 1.
  8. Some results of watermark robustness after extraction under various attacking types : geometric, non-geometric, and lossy JPEG compression. Scaling image to double size and rescaling to original size modifies intensity slightly because interpolation process only consider 4 pixels in neighbor, therefore the pixel is affected by 4 pixels in surrounding. Embedding is implemented on LH and HL sub-band (middle frequency sub-bands including a part of low bandwidth), while Gaussian filter is low-pass filter, that means, this signal process will suppress high frequency and keep low frequency. Actually, the quality after using Gaussian filter is decreased, however, it is not enough.   Cropping 25%, that mean, 25% content is removed end replace by 0-bits (black area). We can not extract correctly watermark bit in this area.   When rotate the image, the alteration is increased from the center to border of image, and it affects to all pixels in and image and another reason is the operation of wavelet transform on horizontal and vertical dimension, while the effect of rotation is diagonal.   With histogram equalization, some results is low depend on the contrast of images. Some image have the low contrast (small range in histogram) will be strongly affected by this attacks.   The influence of Gaussian noise on the smooth image (less detail) is less than the image having more details (considering splash sample)   Average filter is the opposite case of Gaussian noise when images which have more detail will be strongly modified by this attack (like as mandrill sample).
  9. Color images, same watermark payload Comparing with method of Niu at the same conditions, the proposed method is outperform in most of attacking types, except Rotation process. 1.       Niu: Contourlet transform. Our method: Wavelet transform. 2.       Niu: Embedding on Green channel. Our method: optimal channel selection (3 channels) 3.       Niu: Embedding on Low frequencies component. Our method: middle frequencies -> better in imperceptibility 4.       Niu: SVM in extraction. Out method: thresholding -> more computation time in training and classification in extraction with Niu method.
  10. Descibe content on the slide