Relative Visibility Function

Keyword(s):  
2013 ◽  
Vol 416-417 ◽  
pp. 1210-1213
Author(s):  
Hua Wen Ai ◽  
Ping Feng Liu ◽  
Sheng Cong Dong

In order to resist print and scan attacks, a kind of digital halftone image watermarking algorithm is proposed, which is based on the edge detection and improved error diffusion. The edge of gray image is gotten using canny detection. Calculate the noise visibility function values of the edge points. Then, sort the values in ascending order and select the size that equal to the length of watermark as the location of watermark embedding. While the grayscale image turns to halftone image using the improved error diffusion algorithm, binary watermark is embedded in the edge position. Watermark is pretreated with Arnold before embedding to improve the safety of watermark. Experiment results show that the algorithm is good resistance to print and scan attacks, while resistance to shearing, noise and jpeg compression attacks.


1918 ◽  
Vol 12 (6) ◽  
pp. 493-493
Author(s):  
Irwin G. Priest
Keyword(s):  

1967 ◽  
Vol 45 (6) ◽  
pp. 2041-2052
Author(s):  
Ralph J. Gagnon

The usual methods of interferometry make use of the Fourier transform relationship which holds between a radio-noise brightness distribution and the complex visibility function which is measured with a pair of antennas. The visibility function is a function of the distance or base line between the antennas. If it were known for all base lines, then the brightness distribution could be found by Fourier inversion. Unfortunately, the visibility function is not known for all base lines and the Fourier inversion is not unique. If the observer wishes to interpret his data by displaying a single possible brightness distribution, then he must choose from the infinite set of brightness distributions which could have produced his data. Previously, the author suggested that this be accomplished by representing the set of possible distributions as a statistical ensemble, and making the choice on a statistical basis so as to minimize the expected mean-square error.In the present communication, the results of the previous paper are presented for the two-dimensional case. The inversion formulas are worked out in detail for the cases of uniform point-source distributions in a square (or rectangle) and in a circular disk, and also for a point-source distribution with a Gaussian envelope taper. It is shown how to extend the point-source results to a distribution of nonpoint sources, and as an example the inversion equations are computed for the case of a distribution of Gaussian-shaped sources distributed with a Gaussian amplitude or density envelope. Finally, the appropriate inversion equations are derived for an observed visibility function which is contaminated with additive zero-mean Gaussian random noise, uncorrelated with the true visibility function.


2006 ◽  
pp. 350-352
Author(s):  
Agostino Fiorani ◽  
Roberto Scaramella ◽  
Dario Lorenzetti ◽  
Fabrizio Vitali

1972 ◽  
Vol 24 (5) ◽  
pp. 989-992 ◽  
Author(s):  
Gerald Beer

The visibility function assigns to each point x of a fixed measurable set E in a Euclidean space En the Lebesgue outer measure of S(x), the set {y : rx + (1 — r)y ∊ E for every r in [0, 1]}.The purpose of this paper is to determine sufficient conditions for the continuity of the function on the interor of a starshaped set.


2013 ◽  
Vol 798-799 ◽  
pp. 785-789
Author(s):  
Na Na Zhang ◽  
Jia Fa Mao ◽  
Jing Yin ◽  
Xiao Fang Yang

This paper proposes the estimation method for the maximum payload on spatial domain, concentrates on digital watermarking payload in the spatial domain image, on the constraint of perceptual invisibility research, the influence under the factors in Human Visual System. The maximum payload is influenced by the factors which include the size of image, the brightness masking, contrast masking and texture masking of the image. with such as noise visibility function visual model, gets the just noticeable different value to calculate the payload of the image, finally we get the watermarking payload, test and verify it with Matlab simulation experiments.


Sign in / Sign up

Export Citation Format

Share Document