dct transform
Recently Published Documents


TOTAL DOCUMENTS

82
(FIVE YEARS 18)

H-INDEX

6
(FIVE YEARS 1)

2021 ◽  
pp. 717-724
Author(s):  
Bhumika Gupta ◽  
A.R. Verma ◽  
Pushkar Praveen ◽  
Surjeet Singh Patel

2021 ◽  
Author(s):  
Ramzy Jaber

In this thesis, the basics of disparity map and watermarking are reviewed extensively. In order to embed binary information into images, a 3D image watermarking system was proposed. This embedded information was to survive the 3D Image rendering process of Disparity maps, to help identify malicious user who would distribute the watermarked image through an unauthorized system. The proposed system adopted the concept of hidden pixel and introduced an algorithm that identifies all known hidden pixels within the image. This information is combined with the Disparity map to generate a hidden pixel disparity map (HPDM); using the information in the HPDM a decision matrix is generated. This decision matrix is used to guide the watermark embedding process to ensure that information embedded in the Left Image can survive the 3D rendering process. Using the decision matrix, the watermark detector is capable of extracting the image from either the left or right image with no effect on the overall bit rate. This achievement is due to two original additions to the detection process: (1) Reverse rendering and (2) Cyclical Redundancy check. The proposed reverse rendering process expands the decision matrix into a reduced disparity map. This reduced disparity map is used to reverse the right image into a reduced left image. The identification of the image (left or right) is achieved through the use of a CRC check, which is also capable of detecting any errors in the extracted message, thus reducing the number of misidentification. The proposed system was implemented and tested using MATLAB. The bit efficiency of the proposed system varied between 38% and 88%. This variance is caused by the complexity of the depth scene as well as the cost function used in the depth estimation process. The watermark embedding system proposed had a PSNR of 45 dB (when no mark was embedded); this value is primarily attributed to some of the quantization that occurs during the DCT transform. However, a PSNR of 33dB is attained when the watermark was added at full strength.


2021 ◽  
Author(s):  
Ramzy Jaber

In this thesis, the basics of disparity map and watermarking are reviewed extensively. In order to embed binary information into images, a 3D image watermarking system was proposed. This embedded information was to survive the 3D Image rendering process of Disparity maps, to help identify malicious user who would distribute the watermarked image through an unauthorized system. The proposed system adopted the concept of hidden pixel and introduced an algorithm that identifies all known hidden pixels within the image. This information is combined with the Disparity map to generate a hidden pixel disparity map (HPDM); using the information in the HPDM a decision matrix is generated. This decision matrix is used to guide the watermark embedding process to ensure that information embedded in the Left Image can survive the 3D rendering process. Using the decision matrix, the watermark detector is capable of extracting the image from either the left or right image with no effect on the overall bit rate. This achievement is due to two original additions to the detection process: (1) Reverse rendering and (2) Cyclical Redundancy check. The proposed reverse rendering process expands the decision matrix into a reduced disparity map. This reduced disparity map is used to reverse the right image into a reduced left image. The identification of the image (left or right) is achieved through the use of a CRC check, which is also capable of detecting any errors in the extracted message, thus reducing the number of misidentification. The proposed system was implemented and tested using MATLAB. The bit efficiency of the proposed system varied between 38% and 88%. This variance is caused by the complexity of the depth scene as well as the cost function used in the depth estimation process. The watermark embedding system proposed had a PSNR of 45 dB (when no mark was embedded); this value is primarily attributed to some of the quantization that occurs during the DCT transform. However, a PSNR of 33dB is attained when the watermark was added at full strength.


2021 ◽  
Author(s):  
ChenFei Guo ◽  
ChunYu Zhang ◽  
Yinghua Jiang ◽  
HaiLun Liu ◽  
PeiDong Gou ◽  
...  

Author(s):  
Ali A. Yassin ◽  
Abdullah Mohammed Rashid ◽  
Abdulla J. Yassin ◽  
Hamid Alasadi

Recently, the concept of DNA has been invested in computing technology in different ways which linking information technology and biological sciences. There are several encryption algorithms based on DNA encoding that has been proposed, which leads to generating a new direction in image encryption. However, the DNA encryption scheme has drawbacks such as expensive experimental equipment, difficult operations, and hard to hold its biotechnology. Additionally, during careful cryptanalysis that applied to most of these image encryption schemes, we notice that DNA operators can only influence one DNA base, which causes poor diffusion. Our proposed scheme is not applied complex biological operation but just is given to improve the diffusion ability of image encryption scheme by using DNA sequence and DCT transform. Our works overcome above-aforementioned issues. Furthermore, empirical results on real images and security analysis demonstrate that our proposed scheme not only has flexibility and efficiency encryption scheme but also has the ability to resist well-known attacks such as entropy attack, differential attack, statistical attack, chosen/known plain image attack. Additionally, our work enjoys several strong characteristics as follows: (1) the decryption error is very low to recover the original image; (2) Once key for each encryption process and if the user wants to use the same key in many times, our proposed scheme supports secret key sensitivity; (3) the value of correlation of the encrypted image is null; (4) the scrambling process is good and generate high disorder at the output. As a result, our proposed scheme achieves a good balance between strong security and high performance.


This paper presents a new color video watermarking technique based on the one-dimensional Discrete Cosine Transform (DCT). This approach uses a differential embedding technique to insert the bits of the watermark into the video frames so that the extraction process is blind and straightforward. To further ensure the security of the method, the binary image watermark is scrambled using Arnold transform before embedded into the video segment. Also, a color space transformation from Red, Green and Blue (RGB) to YUV is performed in order to deal with the color nature of the video segments. The proposed approach exhibits good robustness against a wide range of attacks such as video compression, cropping, Gaussian filtering, and noise adding. Finally, we propose an implementation of the video watermarking technique using the Raspberry Pi 3 platform. Nearly the same remarks may be made as in the simulation resultsconcerning the robustness against video compression attacks


2021 ◽  
Vol 19 (2) ◽  
pp. 1373-1387
Author(s):  
Zilong Liu ◽  
◽  
Jingbing Li ◽  
Jing Liu ◽  
◽  
...  

<abstract> <p>With the popularization and application of face recognition technology, a large number of face image data are spread and used on the Internet. It has brought great potential safety hazard for personal privacy. Combined with the characteristics of tent chaos and Henon chaos, a THM (tent-Henon map) chaotic encrypted face algorithm based on Ridgelet-DCT transform is proposed in this paper. Different from conventional face recognition methods, this new approach encryptes the face images by means of using the homomorphic encryption method to extract their visual robust features in the first place, and then uses the proposed neural network model to design the encrypted face recognition algorithm. This paper selects the ORL face database of Cambridge University to verify the algorithm. Experimental results show that the algorithm has a good performance in encryption effect, security and robustness, and has a broad application prospect.</p> </abstract>


Electronics ◽  
2020 ◽  
Vol 9 (9) ◽  
pp. 1428
Author(s):  
Musrrat Ali ◽  
Chang Wook Ahn ◽  
Millie Pant ◽  
Sanoj Kumar ◽  
Manoj Singh ◽  
...  

Digital watermarking has become an essential and important tool for copyright protection, authentication, and security of multimedia contents. It is the process of embedding a watermark in the multimedia content and its extraction. Block-based discrete cosine transform (DCT) is a widely used method in digital watermarking. This paper proposes a novel blind image watermarking scheme developed in the spatial domain by quantization of invariant direct current (DC) coefficients. The cover image is redistributed and divided into non-overlapped square blocks and then the DC coefficients invariant to rotation, row and column flip operations, without utilization of the DCT transform, are directly calculated in the spatial domain. Utilizing the quantization parameter and watermark information, the modified DC coefficients and the difference between DC and modified DC coefficients are calculated to directly modify the pixel values to embed watermark bits in the spatial domain instead of the DCT domain. Optimal values of the quantization parameter, which plays a significant role in controlling the tradeoff between robustness and invisibility, are calculated through differential evolution (DE), the optimization algorithm. Experimental results, compared with the latest similar schemes, demonstrate the advantages of the proposed scheme.


Sign in / Sign up

Export Citation Format

Share Document