Print-Scan Resilient Binary Map Watermarking Based on DCT and Scrambling

2018 ◽  
Vol 10 (4) ◽  
pp. 80-89
Author(s):  
Fei Peng ◽  
Shuai-ping Wang ◽  
Min Long

This article describes how combing the characteristics of simple textures and uneven black area distribution of a binary map, a novel blind print-scan resilient watermarking scheme is proposed. First, the flipping probability of each pixel is calculated, and then the image characteristic value matrix is obtained by scrambling and partitioning. Second, a DCT transform is performed on the characteristic value matrix and then the DCT coefficients are modified according to the hidden data. After that, an inverse DCT is made to the modified DCT coefficient matrix, and the pixels of the corresponding block are flipped. Finally, the watermarked map is obtained by inverse scrambling. Experimental results and analysis show that the proposed scheme not only provides a large capacity and good imperceptibility, but also can resist the impact of a print-scan operation, and has strong robustness. Meanwhile, compared with the existing algorithms, it has a low implementation complexity and can be applied to military maps, engineering design drawings and other binary images.

Geosciences ◽  
2019 ◽  
Vol 9 (10) ◽  
pp. 437 ◽  
Author(s):  
Meena ◽  
Tavakkoli Piralilou

Despite landslide inventories being compiled throughout the world every year at different scales, limited efforts have been made to critically compare them using various techniques or by different investigators. Event-based landslide inventories indicate the location, distribution, and detected boundaries of landslides caused by a single event, such as an earthquake or a rainstorm. Event-based landslide inventories are essential for landslide susceptibility mapping, hazard modeling, and further management of risk mitigation. In Nepal, there were several attempts to map landslides in detail after the Gorkha earthquake. Particularly after the main event on 25 April 2015, researchers around the world mapped the landslides induced by this earthquake. In this research, we compared four of these published inventories qualitatively and quantitatively using different techniques. Two principal methodologies, namely the cartographical degree of matching and frequency area distribution (FAD), were optimized and applied to evaluate inventory maps. We also showed the impact of using satellite imagery with different spatial resolutions on the landslide inventory generation by analyzing matches and mismatches between the inventories. The results of our work give an overview of the impact of methodology selection and outline the limitations and advantages of different remote sensing and mapping techniques for landslide inventorying.


2010 ◽  
Vol 19 (02) ◽  
pp. 491-502 ◽  
Author(s):  
YONG-GANG FU ◽  
RUIMIN SHEN

In this paper, a novel image watermarking scheme based on a self-reference technique is proposed. The meaningful watermark is embedded into a gray-level image according to the relation between the constructed reference image and the original host. In order to be robust against Jpeg compression, the reference image should be robust under Jpeg compression. Firstly, the original image is transformed into DCT domain; and then most of the high frequency coefficients are omitted; after the quantization step and inverse DCT transform, we can obtain a robust reference. By considering the relation between the original image and its reference, we can embed the watermark into the host. The watermark extraction process is oblivious. Experimental results under several attacks show good robustness of the proposed scheme. Especially under cropping and Jpeg compression attacks, the watermark can be extracted with only few errors.


2018 ◽  
Vol 16 (07) ◽  
pp. 1850058 ◽  
Author(s):  
Ri-Gui Zhou ◽  
Wen Wen Hu ◽  
Gao Feng Luo ◽  
Ping Fan ◽  
Hou Ian

Based on the NEQR representation of quantum grayscale images and binary images, the optimal LSBs-based quantum watermarking scheme is investigated in this paper, which embeds several binary images (watermark images) into a grayscale image (cover image). The size of the cover image and secret image are both assumed to be [Formula: see text]. Compared to quantum simple LSBs substitution method generating one stego-pixel, our presented quantum optimal LSBs-based method can generate three stego-pixel simultaneously first. Then one of them with lowest visual distortion is chosen as the final stego-pixel. To this end, first of all, the quantum circuits for a few basic quantum modules (i.e. Quantum Comparator, Parallel CNOT, Parallel Swap, ADDER MOD, Subtracter (SUB.ER) MOD and Absolute Value) are predefined. Following that, based on these simple modules, two composite quantum modules (i.e. the ADDER and SUB.ER MOD [Formula: see text] module and Choose final stego-pixel module) are further constructed. With the help of the basic and composite quantum modules, the integrated quantum circuit implementation of the optimal LSBs-based quantum watermark images embedding/extracting procedures are illustrated. Then, the experiment result are simulated under the classical computer software MATLAB 2014(b), which illustrates our presented optimal LSBs-based quantum watermarking methods are superior to the simple LSBs scheme in terms of PSNR and histogram graphs on the basis of visual effect, and the circuit’s complexity analysis also demonstrates our investigated scheme with a very low computational complexity. Finally, we analyze the security of quantum cryptography system, which verifies the quantum watermarking data can be securely transmitted to other legal normal users.


2007 ◽  
Author(s):  
Chung-Chuan Wang ◽  
Chin-Chen Chang ◽  
Jinn-Ke Jan ◽  
Iuon-Chang Lin

2016 ◽  
Vol 46 (1) ◽  
pp. 33-48 ◽  
Author(s):  
Gerhardus P. Nortjé ◽  
Wouter v. Hoven ◽  
Michiel C. Laker ◽  
Johanna C. Jordaan ◽  
Michelle A. Louw

Author(s):  
Ahmad Fakheri ◽  
Mohammad H. Naraghi

Typically, in a basic course, the equations are derived and the solutions are presented in tabular or chart from. Spreadsheets provide an attractive option, as most students have access to and are familiar with their use. In this paper, a classic algorithm, called Thomas algorithm, used for the solution of set of algebraic equations whose coefficient matrix is tri-diagonal, is adopted to spreadsheets. It is used to obtain solutions to a number of classical problems in fluid mechanics and heat transfer non-iteratively, and in some cases where the governing equations are non-linear via some iterations. Without needing much programming skills, or needing to learn specialized software, undergraduate students can use this approach and easily obtain the solution to many otherwise difficult problems and study the impact of different parameters.


2016 ◽  
Vol 139 (3) ◽  
Author(s):  
Mohammad Miraskari ◽  
Farzad Hemmati ◽  
Alireza Jalali ◽  
M. Y. Alqaradawi ◽  
Mohamed S. Gadala

In the current study, a modified fast converging, mass-conserving, and robust algorithm is proposed for calculation of the pressure distribution of a cavitated axially grooved journal bearing based on the finite volume discretization of the Adams/Elrod cavitation model. The solution of cavitation problem is shown to strongly depend on the specific values chosen for the lubricant bulk modulus. It is shown how the new proposed scheme is capable of handling the stiff discrete numerical system for any chosen value of the lubricant bulk modulus (β) and hence a significant improvement in the robustness is achieved compared to traditionally implemented schemes in the literature. Enhanced robustness is shown not to affect the accuracy of the obtained results, and the convergence speed is also shown to be considerably faster than the widely used techniques in the literature. Effects of bulk modulus, static load, and mesh size are studied on numerical stability of the system by means of eigenvalue analysis of the coefficient matrix of the discrete numerical system. It is shown that the impact of static load and mesh size is negligible on numerical stability compared to dominant significance of varying bulk modulus values. Common softening techniques of artificial bulk modulus reduction is found to be tolerable with maximum two order of magnitudes reduction of β to avoid large errors of more than 3–40% in calculated results.


Water ◽  
2019 ◽  
Vol 11 (2) ◽  
pp. 201 ◽  
Author(s):  
Ana Juárez ◽  
Ana Adeva-Bustos ◽  
Knut Alfredsen ◽  
Bjørn Dønnum

Extreme, short-duration fluctuations caused by hydropeaking occurs when hydropower is regulated to cover demand peaks in the electricity market. Such rapid dewatering processes may have a high impact on the downstream biological conditions, particularly related to stranding of fish and other species. The present work analyzes these fluctuations using a two-dimensional unsteady hydraulic modelling approach for quantification of two important hydro-morphological factors on fish stranding risk: the variation in wetted area and the dewatering ramping rate. This approach was applied on the two-kilometer-long reach of Storåne downstream of the Hol 1 power plant, where topo bathymetric LiDAR (Light Detection and Ranging) data was available providing a high-resolution digital elevation model. Based on this model, hydraulic conditions could be simulated in high detail allowing for an accurate assessment of the hydro morphological factors. Results show the dried area distribution at different flows and dewatering ramping rates. The attenuation of the water level fluctuation due to the damping effect along the river reach controls the dewatering rate. We recommend an alternative scenario operation which can reduce the impact of the peaking operation and estimate the operational mitigation cost. We find that the modelling based on the fine resolution grid provides new opportunities in assessing effects of hydropower regulations on the ecosystem.


2010 ◽  
Vol 121-122 ◽  
pp. 254-259 ◽  
Author(s):  
Jing Long Zuo ◽  
De Long Cui

Most watermarking schemes in literatures are usually implemented by embedding a mark in a host media itself for intended purposes. The existing techniques for watermarking are confronted with the problems of perceptible quality degradation and the inherent conflict between imperceptibility and robustness, which introduced by the watermark embedding. In this paper, we propose a novel audio zero-watermarking scheme for content authentication. First the audio is divided to frame by fixed length and then low-frequent and high-frequent components are obtained by three-level lifting-based wavelet transformation in every frame. Secondly the audio frame is approximately represented as a product of a base matrix and a coefficient matrix using non-negative matrix factorization (NMF). Finally the sum of each column in the coefficient matrix is calculated which is quantized to produce a feature vector, and then the copyright information is obtained by calculating the watermark and feature vector. Experiment results show that the proposed scheme is robust against Mp3 compression and secure.


Sign in / Sign up

Export Citation Format

Share Document