• Title/Summary/Keyword: redundant wavelet

Search Result 17, Processing Time 0.023 seconds

Digital Watermarking using Redundant Biorthogonal Wavelet Transform (중복성을 갖는 쌍직교 웨이블릿 변환을 이용한 디지털 워터마킹)

  • Choe, Chi-Won;Lee, Hae-Seong;Byeon, Hye-Ran
    • Journal of KIISE:Software and Applications
    • /
    • v.28 no.3
    • /
    • pp.262-271
    • /
    • 2001
  • 디지털 컨텐츠의 저작권 보호와 위변조 탐지를 위해 사용되는 비가시적인 워터마킹 기법은 워터마킹된 영상의 화질저하를 최소로 하면서 화질이 현격히 저하되기 전에는 워터마크가 제거되지 않는 견고성을 갖도록 해야한다. 본 논문에서는 워커마킹된 영상에서 원영상을 사용하지 않고 저작권자를 탐지할 수 있는 디지털 워터마킹 기법을 제안한다. 제안된 기법은 크게 내장단계와 탐지단계로 나뉜다. 내장단계에서는 워터마킹된 영상의 화질이 크게 저하되지 않도록 시각적 마스킹 효과를 고려한다. 워터마크 탐지과정은 원 영상을 사용하지 않고 저작권 분쟁이 발생한 영상과 저작권 주장하는 사람이 제시한 해당 워터마크만을 사용하여 이루어진다. 본 논문에서 제안된 디지털 워터마킹 방법은 일반적인 영상의 변형에 상당히 견고한 특성을 가지며, 변형이 가해지지 않은 워터마킹된 영상을 저작자가 보관함으로써 다중 소유권 주장 문제에 대해서도 저작권 주장이 가능하다.

  • PDF

A Reliable SVD Based Watermarking Scheme Resistant to Geometric Attacks (기하학적 공격에 강한 고신뢰성 SVD 기반 워터마킹방안)

  • Dung, Luong Ngoc Thuy;Sohn, Won
    • Proceedings of the Korean Society of Broadcast Engineers Conference
    • /
    • 2018.11a
    • /
    • pp.87-89
    • /
    • 2018
  • We proposed an improved reliable SVD-based watermarking scheme resistant to geometric attacks while having high fidelity with no false-positive problem. Principal components of a watermark image are embedded into singular values of LL, LH, HL, and HH sub-bands of a transformed cover image by RDWT(redundant discrete wavelet transform) with optimal scale factors. Each scale factor is generated by trading-off fidelity and robustness using Differential Evolution (DE) algorithm. Zernike Moment (ZM) is used to estimate the geometric distortion and to correct the watermarked image before extracting watermark. The proposed scheme improves fidelity and robustness of existing reliable SVD based watermarking schemes while resisting to geometric attacks.

  • PDF

Encryption-based Image Steganography Technique for Secure Medical Image Transmission During the COVID-19 Pandemic

  • Alkhliwi, Sultan
    • International Journal of Computer Science & Network Security
    • /
    • v.21 no.3
    • /
    • pp.83-93
    • /
    • 2021
  • COVID-19 poses a major risk to global health, highlighting the importance of faster and proper diagnosis. To handle the rise in the number of patients and eliminate redundant tests, healthcare information exchange and medical data are transmitted between healthcare centres. Medical data sharing helps speed up patient treatment; consequently, exchanging healthcare data is the requirement of the present era. Since healthcare professionals share data through the internet, security remains a critical challenge, which needs to be addressed. During the COVID-19 pandemic, computed tomography (CT) and X-ray images play a vital part in the diagnosis process, constituting information that needs to be shared among hospitals. Encryption and image steganography techniques can be employed to achieve secure data transmission of COVID-19 images. This study presents a new encryption with the image steganography model for secure data transmission (EIS-SDT) for COVID-19 diagnosis. The EIS-SDT model uses a multilevel discrete wavelet transform for image decomposition and Manta Ray Foraging Optimization algorithm for optimal pixel selection. The EIS-SDT method uses a double logistic chaotic map (DLCM) is employed for secret image encryption. The application of the DLCM-based encryption procedure provides an additional level of security to the image steganography technique. An extensive simulation results analysis ensures the effective performance of the EIS-SDT model and the results are investigated under several evaluation parameters. The outcome indicates that the EIS-SDT model has outperformed the existing methods considerably.

Anomaly Detection from Hyperspectral Imagery using Transform-based Feature Selection and Local Spatial Auto-correlation Index (자료 변환 기반 특징 선택과 국소적 자기상관 지수를 이용한 초분광 영상의 이상값 탐지)

  • Park, No-Wook;Yoo, Hee-Young;Shin, Jung-Il;Lee, Kyu-Sung
    • Korean Journal of Remote Sensing
    • /
    • v.28 no.4
    • /
    • pp.357-367
    • /
    • 2012
  • This paper presents a two-stage methodology for anomaly detection from hyperspectral imagery that consists of transform-based feature extraction and selection, and computation of a local spatial auto-correlation statistic. First, principal component transform and 3D wavelet transform are applied to reduce redundant spectral information from hyperspectral imagery. Then feature selection based on global skewness and the portion of highly skewed sub-areas is followed to find optimal features for anomaly detection. Finally, a local indicator of spatial association (LISA) statistic is computed to account for both spectral and spatial information unlike traditional anomaly detection methodology based only on spectral information. An experiment using airborne CASI imagery is carried out to illustrate the applicability of the proposed anomaly detection methodology. From the experiments, anomaly detection based on the LISA statistic linked with the selection of optimal features outperformed both the traditional RX detector which uses only spectral information, and the case using major principal components with large eigen-values. The combination of low- and high-frequency components by 3D wavelet transform showed the best detection capability, compared with the case using optimal features selected from principal components.

Novel Robust High Dynamic Range Image Watermarking Algorithm Against Tone Mapping

  • Bai, Yongqiang;Jiang, Gangyi;Jiang, Hao;Yu, Mei;Chen, Fen;Zhu, Zhongjie
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.12 no.9
    • /
    • pp.4389-4411
    • /
    • 2018
  • High dynamic range (HDR) images are becoming pervasive due to capturing or rendering of a wider range of luminance, but their special display equipment is difficult to be popularized because of high cost and technological problem. Thus, HDR images must be adapted to the conventional display devices by applying tone mapping (TM) operation, which puts forward higher requirements for intellectual property protection of HDR images. As the robustness presents regional diversity in the low dynamic range (LDR) watermarked image after TM, which is different from the traditional watermarking technologies, a concept of watermarking activity is defined and used to distinguish the essential distinction of watermarking between LDR image and HDR image in this paper. Then, a novel robust HDR image watermarking algorithm is proposed against TM operations. Firstly, based on the hybrid processing of redundant discrete wavelet transform and singular value decomposition, the watermark is embedded by modifying the structure information of the HDR image. Distinguished from LDR image watermarking, the high embedding strength can cause more obvious distortion in the high brightness regions of HDR image than the low brightness regions. Thus, a perceptual brightness mask with low complexity is designed to improve the imperceptibility further. Experimental results show that the proposed algorithm is robust to the existing TM operations, with taking into account the imperceptibility and embedded capacity, which is superior to the current state-of-art HDR image watermarking algorithms.

A Novel Multi-focus Image Fusion Technique Using Directional Multiresolution Transform (방향성 다해상도 변환을 사용한 새로운 다중초점 이미지 융합 기법)

  • Park, Dae-Chul;Atole, Ronnel R.
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.9 no.4
    • /
    • pp.59-68
    • /
    • 2009
  • This paper addresses a hybrid multi-focus image fusion scheme using the recent curvelet transform constructions. Hybridization is obtained by combining the MS fusion rule with a novel "copy" method. The proposed scheme use MS rule to fuse the m most significant terms in spectrum of an image at each decomposition level. The scheme is dubbed in this work as m-term fusion in adherence to its use of the MSC (most significant coefficients) in the transform set at any given scale, orientation, and translation. We applied the edge-sensitive objective quality measure proposed by Xydeas and Petrovic to evaluate the method. Experimental results show that the proposed scheme is a potential alternative to the redundant, shift-invariant Dual-Tree Complex Wavelet transforms. In particular, it was confirmed that a 50% m-term fusion produces outputs with no visible quality degradation.

  • PDF

Improvement of Flexible Zerotree Coder by Efficient Transmission of Wavelet Coefficients (웨이블렛 계수의 효율적인 전송에 따른 가변제로트리코더의 성능개선)

  • Joo, Sang-Hyun;Shin, Jae-Ho
    • Journal of the Korean Institute of Telematics and Electronics C
    • /
    • v.36C no.9
    • /
    • pp.76-84
    • /
    • 1999
  • EZW proposed by Shapiro is based on a zerotree constructed in a way that a parent coefficient in a subband is related to four child coefficients in the next finer subband of similar orientation. This fixed treeing based on 1-to-4 parent-child is suitable to exploti hierachical correlations among subbands but not to exploit spatial correlations within a subband. A new treeing by Joo, et al. is suggested to simulatneously exploit those two correlatins by extending parent-child relationship in a flexible way. The flexible treeing leads to increasing the number of symbols and lowering entorpy comparing to the fixed treeing, and therefore a better compression can be resulted. In this paper, we suggest two techniques to suppress the increasing of symbols. First, a probing bit is generated to avoid redundant scan for insignivicant coefficients. Second, since all subbands do not always require the same kind of symbol-set, produced symbols are re-symbolized into binary codes according to a pre-defined procedure. Owing to those techniques, all symbols are generated as binary codes. The binary symbols can be entropy-coded by an adaptive arithmetic coding. Moerover, the binary symbol stream can give comparatively good performances without help of additional entropy coding. Our proposed coding scheme is suggested in two modes: binary coding mode and arithmetic coding mode. We evaluate the effectivenessof our modifications by comparing with the original EZW.

  • PDF