Robust Multibit Decoding and Detection of Multiplicative Watermarks for Fingerprint Images

Size: px
Start display at page:

Download "Robust Multibit Decoding and Detection of Multiplicative Watermarks for Fingerprint Images"

Transcription

1 JOURNAL OF MULTIMEDIA, VOL. 5, NO. 2, APRIL 2 67 Robust Multibit Decoding and Detection of Multiplicative Watermarks for Fingerprint Images Khalil Zebbiche*, Foued Khelifi # and Ahmed Bouridane* * School of Electronics, Electrical Engineering and Computer Science, Queen s University of Belfast, Belfast BT7 NN, UK {kzebbiche, A.Bouridane}@qub.ac.uk # Department of Electronic Imaging and Media Communications (EIMC, School of Informatics, University of Bradford, Bradford BD7 DP, UK F.Khelifi@bradford.ac.uk Abstract In this paper, multibit watermark decoding and detection structures of fingerprint images are proposed. The watermark is hidden within the high frequencies coefficients of the discrete wavelet transform (DWT which are statistically modeled by generalized Gaussian distribution. The structure of the decoder and the detector are based on the maximum-likelihood (ML method. For flexibility purposes, the original image is not necessary during the decoding and the detection processes. Analytical expressions for performance measures such as the probability of error in watermark decoding and probabilities of false alarm and detection in watermark detection are derived and contrasted with experimental results. The results obtained are very attractive when considering a number of commonly used attacks and the proposed detector and decoder have been shown to outperform similar detectors/decoders existing in the literature. They also show that the overall performances of both decoder and detector are dependent on the fingerprint image characteristics, namely, on the size of the ridges area relative to the size of the fingerprint image. Index Terms Watermark decoding, watermark detection, fingerprint images, multibit watermarking I. INTRODUCTION The term biometric refers to the identification of a person on the basis of their physiological measurements or behavioral traits; biometrics can be used to verify and authenticate the identity of individuals. Associated technologies are employed in the fields of law enforcement, user access applications, e-commerce, etc. There exist a range of available biometric techniques, such as fingerprint, face recognition, iris recognition, voice identification, etc. Fingerprint-based authentication is the most mature, proven and widely used biometric technique []. Although biometric-based systems have advantages over knowledge-based and token-based systems they are not fully secure since the integrity of biometric templates/data is vulnerable to various risks and attacks. The reliability of a biometric system depends on its effectiveness and Manuscript received February 5 28; revised November 27 28; accepted February Corresponding author Khalil Zebbiche, kzebbiche@qub.ac.uk. security against unauthorized modification and misuse. Increased security of biometric data is crucial to promote the wide spread utilization of biometric technologies [2]. Recently, a number of security techniques such as encryption and watermarking have been introduced in the literature. For example, in the case of biometric encryption, a number of techniques have been adopted [3] [8]. A comprehensive analysis of biometric cryptosystems is presented in [9], where the weaknesses of the approaches in [3], [4] and the impracticality of the systems in [7], [8] have been discussed. In addition, the work presented in [] shows the vulnerability of the systems [6] and [5]. Thus, biometric encryption does not yet provide satisfactory security. Watermarking techniques have been used to protect biometric data and attractive results have been obtained [2], [] [3]. The amount of information that can be stored in a watermark is application dependent. For copy protection purposes, a payload of one bit, also referred to as onebit watermarking, is usually sufficient. In this case, watermarks serve as verification codes and the role of the receiver is to detect the presence or absence of a given watermark in the host media. Thus, watermark detection is a binary hypothesis test, for which the probabilities of false alarm (i.e. wrong decision that a given watermark has been inserted and detection (i.e. correctly deciding that a given watermark is embedded can be defined and used to assess the performance of the detector. Early detectors were based on computing the correlation between the watermarked media and the watermark itself [4], [5]. Due to the simplicity of its application, a correlationbased detection is usually preferred; this approach is optimal only when the embedding process follows an additive rule, and the host media is drawn from Gaussian distributions. This is not the case for most applications. More recently, optimum detection schemes have been proposed for multiple domains such as Discrete Cosine Transform (DCT, Discrete Wavelet Transform (DWT, Discrete Fourier Transform (DFT,... etc. The schemes are modeled with different statistical models, such as 2 ACADEMY PUBLISHER doi:.434/jmm

2 68 JOURNAL OF MULTIMEDIA, VOL. 5, NO. 2, APRIL 2 Gaussian, Laplacian, generalized Gaussian distribution (GGD, Weibul distribution,... etc., and can be used in in both additive watermarking [6], [7] and non-additive (multiplicative watermarking [8], [9]. For the protection of intellectual property rights multibit watermarking techniques are used. Hidden information may be comprised of ownership identifiers, transaction dates, serial numbers, etc. Multibit watermarking involves the correct extraction (decoding of information using a secret key. Optimum decoding of a multibit watermark has been considered in [6], [2] [22]. The works in [6] and [2] are concerned with additive watermarks embedded within DCT coefficients modeled by GGD features. The problem of multibit decoding for multiplicative watermarking has been addressed in [2] and [22]; in [2] the watermark is embedded in the DFT coefficients, modeled using a Weibull distribution, while in [22] a general statistical procedure based on a total efficient score vector for both GGD and Weibull distributions is proposed. In most cases, this will lead to an associated error probability for the extracted information. This error probability can be used as a measure of the performance of a watermarking system. Note that error probability increases with the number of bits in the hidden message. Thus there is a practical limit on the length of secret messages that can be conveyed. Another issue associated with multibit watermarking is the problem of assessing the presence of a multibit watermark. This is considered more complex than one-bit watermark detection because the hidden bits are unknown to the detector. Multibit detection is usually tackled heuristically by first estimating the hidden message and then verifying the presence of the message. The first attempt to theoretically derive the structure of an optimum detector is given in [6], where an additive watermarking scheme is considered. Optimum multibit detection structures for multiplicative watermarks have also been derived in [2], [22]. The main goal of this paper is to propose new optimum decoding and detection techniques for multibit, multiplicative watermarks hosted by generalized Gaussian features; which are classically encountered in image watermarking in the DWT domain. The problem of decoding and detection is formulated theoretically based on a maximum-likelihood (ML estimation scheme which requires an accurate statistical modeling of the host data. This theoretical formulation allows for the derivation of optimal decoding and detector structures for the generalized Gaussian model. This optimality of the proposed decoder and detector depends on the accuracy of the GGD to model the statistics of the host data. A theoretical analysis permits the determination of useful mathematical model for use in the performance assessment. The parameters of the GGD can be directly estimated from the watermarked image (i.e. blind watermarking. This makes the proposed decoder and detector more suitable in real applications. The results given in this paper are concerned with fingerprint images. However, the proposed decoder and detector can be applied to any other data that can be accurately modeled using GGD. The paper is organized as follows: In Section II, a statistical analysis which models high-frequency DWT coefficients of fingerprint images is presented. A description of watermark generation and the embedding process are given in Section III. Then, in Sections IV and V, the proposed multibit watermark decoding (extraction and detection schemes are described and analyzed. Optimum mathematical expressions for performance measures are obtained. Theoretical results are compared with empirical data obtained through experimentation in Sections IV- C and V-B for the watermark decoder and detector, respectively. Finally, conclusions are drawn in Section VI. II. MODELING DWT COEFFICIENTS OF FINGERPRINT IMAGES The most evident structural characteristics of a fingerprint is a pattern of interleaved ridges and valleys. Ina fingerprint image, ridges (also called ridge lines are dark whereas valleys are bright. Ridges and valleys often run in parallel; sometimes they bifurcate and sometimes they terminate [23]. Furthermore, a fingerprint image is rich in textures and details information. It has been found that edges and textures are usually confined to the DWT coefficients of the high frequency subbands. Watermarking in the DWT is also very robust to compression methods such as Wavelet Scalar Quantization (WSQ [24] which is the standard adopted by the FBI and many other investigation agencies. In the literature, it is claimed that a good probability distribution function (pdf approximation for a marginal density of coefficients, at a particular subband produced by various type of wavelet transforms, may be achieved by adaptively varying two parameters of the GGD density [25], [26]. This is defined as: f X (x i ; α, β = ( β 2αΓ(/β exp ( β xi α where Γ(. is the Gamma function, Γ(z = e t t z dt, z >. The parameter α is referred to as the scale parameter and it models the width of the pdf peak (standard deviation and β is called the shape parameter and it is inversely proportional to the decreasing rate of the peak. Note that β =and β =2 yield Laplacian and Gaussian distributions, respectively. The parameters α and β can be estimated as described in [27]. The optimal value of β may be different for each DWT coefficient, but for practical reasons a constant value is used. To verify whether the distribution of the DWT coefficients of fingerprint images can be approximately modeled by a GGD, one can examine the Quantile- Quantile (Q-Q plots of the DWT coefficients of a set of real test images (see Fig. which are chosen in order to take into account the different visual quality of fingerprint images [28]. Thus allowing the modeling results to be more general and reliable. A Q-Q plot ( 2 ACADEMY PUBLISHER

3 JOURNAL OF MULTIMEDIA, VOL. 5, NO. 2, APRIL 2 69 Q Q Plot for Image2 Q Q Plot for Image Random Samples Quantiles Random Samples Quantiles Random Samples Quantiles DWT Coefficients Quantiles (a Q Q Plot for Image Random Samples Quantiles DWT Coefficients Quantiles (b Q Q Plot for Image DWT Coefficients Quantiles (c DWT Coefficients Quantiles Figure 2. Q-Q plots of DWT coefficients of sample images for the generalized Gaussian distribution: (a Image2, (b Image22, (c Image2 5 and (d Image6 (d (a (c Figure. Test images with different visual quality: (a Image2, (b Image22, (c Image2 5 and (d Image6 is a graphical technique for determining if two data sets are generated from populations having a common distribution. For example, if two data sets are taken from two populations with the same distribution, the (b (d points should fall approximately along a reference line. The greater the departure from this reference line, the greater the evidence that the two data sets have been generated from populations with different distributions. In our experiments, for a given fingerprint image we first estimate the parameters α and β from the DWT coefficients and then generate a large number of random samples drawn from a GGD having the estimated parameters α and β [29]. The quantiles of the real DWT coefficients against the quantiles of the random generated samples are plotted. As can be seen from Fig. 2 (a-d, most of the + marks follow a straight line for Image6, deviating slightly from the reference line for Image22 and Image2 but with a more significant deviation for Image2 5. In general, the Q-Q plots for all fingerprint images show that the GGD provides an accurate fit for the DWT coefficients. Experiments performed with other test images have very similar plots. Images (2, 22 and 6 are expected to yield better watermark decoding and detection performance than that for Image2 5. It is worth noting that in Image2 5, the region of interest (or the ridges area is somewhat small when compared to the overall size of the image (i.e. most of it is composed 2 ACADEMY PUBLISHER

4 7 JOURNAL OF MULTIMEDIA, VOL. 5, NO. 2, APRIL 2 by smooth area or background. The DWT coefficients can be divided into sequences where each sequence is used to hide one bit (see Section III below. The partition of the coefficients must be carried out in such a way that the sequences can also be modeled by a GGD. It has been experimentally found that the simplest and most efficient way to divide a subband is to use two-dimensional (2-D non overlapping blocks. III. WATERMARK EMBEDDING The DWT subbands coefficients are used to embed the watermark. It is well known that a DWT decomposition at level l produces : (i a low resolution subband (LL, (ii high resolution horizontal subbands (HL l,hl l, HL, (iii high resolution vertical subbands (LH l,lh l, LH and (iv high resolution diagonal subbands (HH l,hh l, HH. A watermark should be embedded in high resolution subbands where the human eye is less sensitive to noise and distortions [3], [3]. Let x[n] be a 2-D real sequence representing one of the subbands used to hold the watermark (i.e. HL l, LH l or HH l [Note that all three subbands can be used to carry the watermark, depending on the size of the information bit to be hidden and also the application]. Let m[n] be a pseudo-random sequence uniformly distributed in [, +], which is generated using a pseudo-random sequence generator (PRSG initialized by a secret key K. In this paper, a vector notation in boldface typesetting is used to represent 2-D indices. Assume that the watermark carries a secret message, which is mapped by an encoder to a binary sequence b = {b b 2...b Nb } of N b bits (by denoting + for bit and for bit. The information bits b are hidden as follows: Step : The sequence x[n] is partitioned into N b nonoverlapping blocks { } N b i=. In the following, we denote by x i [k] the set of DWT coefficients belonging to block,wherex i [k] x j [k] = for i j and N b i= x i[k] =x[n]. The number of coefficients in any block depends on whether a perceptual mask is used or not. If a perceptual mask is used, the number of coefficients per block will vary according to the nature of the mask and the coefficients in each block. Otherwise, all interior blocks should have the same size; Step 2: The watermark sequence m[n] is divided into N b non-overlapping chunks {m i [k]} N b i= where m i[k] m j [k] = for i j and N b i= m i[k] =m[n], sothat, each chunk m i [k] is associated to one block x i [k] and both are used to carry one information bit b i. The number of elements in block x i [k] is the same as in its associated chunk m i [k]; Step 3: Each element of a chunk m i [k] is multiplied by + or - according to its associated information bit b i.the result of this multiplication is an amplitude modulated watermark w i where w i [k] =m i [k]b i ; Step:4: Finally, the watermark is embedded as follows: y i [k] =(+λm i [k]b i x i [k] (2 where y i [k] represents the set of the watermarked coefficients belonging to block. λ is a value used to control the strength of the watermark by amplifying or attenuating the watermark effect on each DWT coefficient so that the watermark energy is maximized while the alterations suffered by the image are kept invisible. The embedding process is summarized in Fig. 3. IV. HIDDEN INFORMATION DECODING The task of the decoding process is to extract the hidden information sequence b, bit-by-bit, from the possible information sequences {b j } 2N b j=. In practice, since the watermarked image is usually altered by intentional or unintentional attacks, the hidden information cannot be completely recovered and errors may occur. An efficient decoder estimates ˆb with a low error probability. Consequently, the key idea is to develop a criterion that minimizes the probability of error. A. Optimum Decoder for the Generalized Gaussian Model By assuming that all possible information bit sequences {b j } 2N b j= are equally probable, a maximum-likelihood (ML criterion can be used to minimize the probability of error and hence derive a structure for an optimum decoder. An optimum ML decoder would decide ˆb {b j } 2N b j=,such that: ˆb =argj= 2 N b max f y (y[n] m[n],b j (3 where y[n] represents the set of DWT coefficients of the watermarked image, f y (y m,b j is the pdf of the set y[n] conditioned to the events m[n] and b j. By assuming that: (i the DWT coefficients y[n] are statistically independent and (ii the hidden sequence b and the values in m[n] are independent of each other, Eq. (3 can be expressed by: N b ˆb =argj= 2 N b max f yi (y i [k] m i [k],b ji (4 i= where y i [k] indicates the DWT coefficients of the block carrying the bit b i, and m i [k] is a set from m[n] associated to the bit b i. The decision criterion for bit b i can be expressed as: ˆb i =arg max bi {,+} f yi (y i [k] m i [k],b i Bi [ ] (5 B = sign i f yi (y i [k] m i [k], + f yi (y i [k] m i [k], According to the multiplicative rule used to embed the watermark(see Eq. (2, the pdf f yi (y of a marked coefficient y i [k] subject to a watermark value m i [k]b i can be computed by: ( y i [k] f yi (y i [k] m i [k],b i = f xi +λm i [k]b i +λm i [k]b i (6 2 ACADEMY PUBLISHER

5 JOURNAL OF MULTIMEDIA, VOL. 5, NO. 2, APRIL 2 7 Figure 3. Block diagram of the watermark embedding process. where f x (x indicates the pdf of the original, nonmarked coefficients. Substituting f x (x with Eq. (, the pdf of the marked coefficients y i [k] conditioned to the event m i [k] and b i =+is given by: β i f yi (y i [k] m i [k], + = 2α i Γ( β i +λm i [k] ( exp y i [k] α βi +λm i i [k] β i Similarly, the pdf of the marked coefficients conditioned to the event m i [k] and b i = is given by: β i f yi (y i [k] m i [k], = 2α i Γ( β i λm i [k] ( exp y i [k] α βi λm i i [k] β i By substituting Eq. (7 and Eq. (8 in Eq. (5 and adopting a logarithmic formulation, we obtain: [ ( λmi [k] ˆb i =sign ln +λm i [k] ( + ] β y i [k] y i [k] i βi α βi λm i i [k] +λm i [k] (9 By letting and z i = α βi i ( y i [k] λm i [k] T i = ln βi ( +λmi [k] λm i [k] y i [k] +λm i [k] β i Eq. (9 can be expressed in a simple formulation as: ˆb i = { +, if zi >T i ;, otherwise. (7 (8 ( ( (2 B. Performance Analysis Once the decoder structure has been designed, it is worth deriving the theoretical probability of making an error when decoding a bit (also known as bit error rate ( in the absence of attacks. The value z i is a sum of statistically independent random variables, so according to the central limit theorem (CLT, its pdf can be approximated as a normal distribution for an appropriately large number of samples. Therefore, we consider modeling z i by a Gaussian distribution with mean and variance under hypotheses b i =+and b i = that can be estimated from the given data. Assuming that the watermarked image is unaltered and from Eq. 2, the coefficients y i [k] can be substituted by ( + λm i [k]x i [k] under hypothesis b i =+.Themeanµ and variance σ 2 of z under the hypotheses b i =+are: and µ = E[z i b i =+] = [ ] +λmi [k] βi α βi λm i i [k] E[ x i βi ] βi = [ ] +λmi [k] βi β i λm i [k] βi (3 σ 2 = Var[z i b i =+] = E[z i E[z i ] b i =+] 2 = [ ] 2 (4 +λmi [k] βi β i λm i [k] βi In a similar fashion, the mean µ and variance σ 2 of z i under hypothesis b i = are computed by substituting ( λm i [k]x i [k] for y i [k], thus: and µ = E[z i b i = ] = β i σ 2 = Var[z i b i = ] = β i [ λm i[k] βi +λm i [k] βi [ λm i[k] βi +λm i [k] βi ] (5 ] 2 (6 2 ACADEMY PUBLISHER

6 72 JOURNAL OF MULTIMEDIA, VOL. 5, NO. 2, APRIL 2 2 Monte Carlo simulation Analytical whether the hidden message was correctly recovered or not. This procedure has been carried out for different strength values, λ. Fig. 4 illustrates the average results obtained on 5 real fingerprint images chosen from [28] and by using different random sequences. It can be seen that the decreases as the strength λ increases. For Monte Carlo simulations and under a normality assumption, the results obtained are very similar especially at low watermark strength values. This similarity confirms the validity of the theoretical analysis of the under the normality assumption of z i Strength Figure 4. Comparison between the actual bit error rate computed through Monte Carlo simulations and the error rate set under a normality assumption. The mean (µ,µ and variance (σ,σ 2 ofz 2 i can be computed from the given data (i.e. the DWT coefficients of the original image since they only depend on the distribution parameter β i and the sequence m i [k]. The is given by: = 2 [p (z i >T i b i = + p (z i <T i b i =+] (7 where p (z i <T i b i =+is the error probability of mistaking bit for, which is given by: p (z i <T i b i =+= p (z i >T i b i =+ = f(z i b i =+dz i T i ( (8 = 2 erfc T i µ 2σ 2 and p (z i > T i b i = is the error probability of mistaking bit for, defined as: p (z i >T i b i = = T i f zi (z i dz i ( = (9 2 erfc T i µ 2δ 2 C. Experimental Results Extensive experiments were conducted in order to evaluate the performance of the proposed decoder when operating on real fingerprint images and to assess its robustness in the presence of different attacks, namely WSQ compression, mean filtering and additive white Gaussian noise (AWGN. In all experiments, real fingerprint images of size have been used, taken from Fingerprint Verification Competition FVC 2, DB3 database [28]. These images have been chosen for their different visual quality. In all tests, the watermark has been embedded in the HL 3, LH 3 and HH 3 subbands, obtained after a wavelet transformation of each image by DWT using Daubechies wavelet at the 3 rd decomposition level. Also, a blind watermark decoding is used so that the parameters α i and β i of each block are directly estimated from the DWT coefficients of the watermarked image by assuming that λ is sufficiently small to not alter the visual quality of the original image. To make a comparison as fair as possible, the performance of the proposed decoder has been compared against a similar and related decoding technique proposed by Song [22]. The decoder proposed in [22] performs a multibit watermark estimation in the DWT domain and uses a GGD to describe the DWT coefficients that hold the watermark according to a multiplicative rule. where ercf(. is the complementary error function. In order to evaluate the error introduced by the normality assumption, the analytical has been compared against the actual calculated through Monte Carlo Simulations. First, the number of coefficients per bit has been fixed to 256 and a set of pseudo-random sequences have been generated. Then, a set of typical parameters (i.e. α i sandβ i s has been estimated from real fingerprint images. At this stage, the analytical can be evaluated using Eq. (7. As for Monte Carlo simulations, a large number of random samples drawn from a set of GGD having the desired parameters have been generated, as described in [29]. Eventually, such samples have been used to hide a set of randomly generated messages. These watermarked samples have been considered to verify 2 Analytical Empirical Song s Watermark Strength Figure 5. Comparison between The empirical, analytical and, computed for different value of the strength λ. As a first step, one needs to compare the actual obtained when watermarking real fingerprint images with 2 ACADEMY PUBLISHER

7 JOURNAL OF MULTIMEDIA, VOL. 5, NO. 2, APRIL 2 73 for Image 2 for Image ( (3..5 ( (29.2 Compressin rate (bpp (a for Image ( ( ( (29.2 Compression rate (bpp (b for Image 6 2. ( ( ( (3.2 Compression rate (bpp (c 2. ( ( ( (3.2 Compression rate (bpp Figure 6. Robustness against WSQ compression with increasing bits per pixel. Results refer to fingerprint images shown in Fig.. The watermark strength λ =.26. The corresponding value of PSNR is given between brackets. (d for Image 2 for Image 22 Proposed technique Song decoder 2 4 ( ( ( ( (3.3 SNR(dB (a for Image ( ( ( ( (3.8 SNR(dB (b for Image ( ( ( ( (29.2 SNR (db (c 2 4 ( ( ( (3.9 2 (29. SNR(dB Figure 7. Robustness against white Gaussian noise addition with decreasing SNR. Results refer to fingerprint images shown in Fig.. The watermark strength λ =.26. The corresponding value of PSNR is given between brackets. (d 2 ACADEMY PUBLISHER

8 74 JOURNAL OF MULTIMEDIA, VOL. 5, NO. 2, APRIL 2 for Image 2 for Image x3(3.36 5x5( x7(28.2 Filter size (a for Image x3( x5(3.88 7x7(3.2 Filter size (b for Image 6 2 3x3( x5(3.79 7x7(3.2 Filter size (c 2 3x3( x5(3.5 7x7(3.2 Filter size Figure 8. Robustness against mean filtering with increasing filter size. Results refer to fingerprint images shown in Fig.. The watermark strength λ =.26. The corresponding value of PSNR is given between brackets. (d the analytical analysis described in Section IV- B. Fig. 5 shows the average results from the same 5 fingerprint images used to derive the analytical and different pseudo-random sequences, each hosting N b =36bits (2 information bits/subband. The number of coefficients per information bit is set to 256 coefficients/bit (block size =6 6 and the watermark has been inserted with different values of λ. As can be seen from Fig. 5, our proposed decoder outperforms the one proposed by Song for all values of the strength λ. In addition, both the empirical and the analytical results are similar especially for small strength values, λ; the difference is proportional to the watermark strength. This is justified by the fact that the analytical is derived from the original images (i.e. the parameters αs andβs are estimated from DWT coefficients of the original images while these parameters have been estimated from watermarked images to compute the empirical error. The values of the estimated parameters from the watermarked images diverge from the original ones against the increasing watermark strength. For the sake of completeness, extensive experiments have also been conducted to assess the performance of the proposed decoder in terms of robustness and to compare it against the decoder proposed by Song [22]. Three sets of experiments have been carried out which aim to measure the robustness of the watermark against WSQ compression, mean filtering and AWGN. In all tests, the value of the strength λ is set to.26 and the number of coefficients per bit is fixed to 256. Each attack has been applied several times, by varying the attack strength and reporting the average value of over different pseudo random sequences. Here, we only display the results of the four fingerprint images shown in Fig., the results obtained from other test images are very similar. Robustness against WSQ compression is of crucial importance due to the need of reducing the size of fingerprint images for storage (especially, in large databases and transmission purposes. To assess the performance of the two decoders, we iteratively applied WSQ compression to the watermarked fingerprint images using the WSQ viewer [32] and varying the bit-rate value measured by bits per pixel (bpp. The results obtained are given in Fig. 6. Even though the compression ratio is over a wide range of values (from bpp to.25 bpp, the proposed decoder performs very well. If one refers to Song s method, the obtained with the proposed decoder is smaller for all images and bit-rate values. It is worth mentioning that even the value of peak signalto-noise ratio (PSNR is small (< 34 for all images, the WSQ compression does not affect the integrity of the fingerprint image (i.e. the ridges region, the visual alteration can only be seen in the background areas for very high compression ratios. The results are as expected since the wavelet-based watermarking is very robust to the wavelet-based compression including WSQ compression. 2 ACADEMY PUBLISHER

9 JOURNAL OF MULTIMEDIA, VOL. 5, NO. 2, APRIL 2 75 Fig. 7 shows the results for of watermarked fingerprint images corrupted by additive white Gaussian noise with different value of signal-to-noise ratio (SNR. For all images, our proposed decoder provides attractive results and significantly outperforms Song s method. Severe visual image degradations occur at a SNR of 3 db or less, where the PSNR is smaller than 36. In general, the white Gaussian noise is spread over the whole image and it does not affect significantly the performance of the two decoders. The results for degradations due to a linear mean filtering are depicted in Fig. 8 where the watermarked fingerprint images are blurred with different filter sizes. Although the of the proposed decoder is less than that of Song s decoder all images and all filter sizes, the results are reasonably close especially for Image6 which exhibits a degraded visual quality. Note that mean filtering affects the quality of the images even for the smallest size 3 3 where the PSNR is below 33. Unlike AWGN, a mean filtering affects dramatically the performance of the two decoders since, in essence, this type of filtering smoothes the image and attenuates the shape of edges and texture which are well confined in the the high frequency DWT subbands and hold an important part of information, represented by the watermark. V. WATERMARK DETECTION The role of a detector is to decide whether a given image contains a watermark generated with a given key. Although the multibit watermarking is different from the one-bit case, an optimum detector for multibit watermark can be designed following the same approach used for one-bit optimum detector. The watermark detection problem can be mathematically formulated as a binary hypothesis test as follows: H : y[n] =(+λm[n]bx[n]; H : y[n] =x[n]; The hypothesis H states to saying that the DWT coefficients are marked by the sequence m[n], modulated by any bit sequence from the 2 N b possible bit sequences. Likewise, hypothesis H states that y[n] does not carry any watermark. The likelihood ratio, denoted by Λ(y, is defined as: Λ(y = f y(y[n] H f y (y[n] H (2 where f y (y[n] H and f y (y[n] H represent the pdf of y[n] conditioned to the events H and H, respectively. By assuming that: (i the information bits b and the values in m[n] are independent of each other, and (ii the DWT coefficients used to carry the watermark are statistically independent. The pdf f y (y[n] H is obtained by integrating the 2 N b possible bit sequences: N b f y (y[n] H = f yi (y i [k] m i [k] i= N b [ = fyi (y i [k] m i [k], p(b i = i= + f yi (y i [k] m i [k], +p(b i =+ ] (2 By assuming a priori equal probabilities (i.e. p(b i = = p(b i = + = /2, Eq. (2 can be written as follows: f y (y[n] H = N b i= [ f yi (y i [k] m i [k], 2 + ] (22 f yi (y i [k] m i [k], + To simplify the notation in the sequel, the 2-D index k is omitted from y i [k] and m i [k]. The pdf of the marked coefficients y i conditioned to the value m i and b i ( or + can be expressed by the pdf of the original DWT coefficients x, sothat: [ Nb ] i= y 2 Bi λm i f x ( i λm i Λ(y = Nb i= [ f x (y i ] [ Nb ] (23 y i Bi + i= 2 Nb i= +λm i f x ( [ f x (y i ] +λm i A. Optimum Detection for the Generalized Gaussian Model If we assume that the DWT coefficients of the original image follow a GGD, then a log-likelihood function l(y ln Λ(y is given by: { N b l(y = ln(2+ i= [ ( ln λm i + ( +λm i. exp. exp [ ( yi [ βi ]] β i α i λm i [ ( yi [ βi ]] ]} β i α i +λm i (24 where α i and β i are the parameters of the generalized Gaussian pdf for the coefficients x i belonging to block. The decision rule reveals that an image is watermarked by the sequence m[n] (H is accepted only if l(y exceeds a threshold T. By employing the Neyman-Pearson criterion, the threshold is obtained in such a way that the probability of detection P det is maximized, subject to a fixed false alarm probability Pfa. By fixing the value of P fa,the threshold T can be obtained using the equation: P fa = P (l(y >T H = T f l (l(ydl(y (25 2 ACADEMY PUBLISHER

10 76 JOURNAL OF MULTIMEDIA, VOL. 5, NO. 2, APRIL 2 Figure 9. Block diagram of the watermark decoding/detection process. where f l (l(y is the pdf of l(y conditioned to H.The problem now is to derive a good estimate of f l (l(y. By using the central limit theorem, Barni et al. [2] models l(y by a Gaussian pdf with mean µ = E[l(y H ] and σ 2 = Var[l(Y H ]. Under these assumptions, Eq. (25 can be expressed by: ( Pfa = 2 erfc T µ (26 2σ 2 where erfc(. is the complementary error function, so: T = erfc (2Pfa 2σ 2 + µ (27 For the sake of simplicity, the mean µ and the variance σ 2 are usually estimated numerically by evaluating l(y for n fake sequences {m j [n] :m j [n] [, +]; j n}, so that the estimated mean and variance of l(y are given by: ˆµ = n l j (y (28 n and ˆσ 2 = n j= n (l j (y ˆµ 2 (29 j= where l j (y represents the log likelihood ratio corresponding to the sequence m j [n]. The selection of n involves a trade-off between computational complexity and accuracy of results. The higher n is, the better the estimates to µ and σ 2 are but the higher computational complexity is, and vice versa. We found in [33] that a good estimation of µ and σ 2, with reasonable computational complexity, can be obtained by letting n = 5. The performance of the watermark detection is measured in terms of its probability of false alarm (P fa and its probability of correct detection (P det for a given image. The P fa is given by Eq. (26, while the P det is expressed by: ( P det = 2 erfc λ µ 2σ 2 (3 where µ and σ 2 represent the mean and variance of the likelihood ratio l[y] under hypothesis H, respectively. The mean µ and the variance σ 2 can be estimated as the mean and the variance of l[y] under H and by substituting y i [k] by ( + m i [k]λb i x i [k] and b i can be substituted by + or - in Eq. (24. The experiments reveal that there is a slight difference between µ and σ 2 estimated under b =+and µ and δ estimated under b =. By inserting Eq. (27 in Eq. (3, P det can be expressed as a function of P fa, µ and σ 2,hencethe receiver operating characteristic (ROC of the watermark detector can be computed from the given image (i.e. the DWT coefficients of the original image. B. Experimental results In order to reliably measure the actual performance of the proposed detector, extensive experiments have been conducted with various test images used to evaluate the performance of the decoder of the previous section. In these experiments, the watermarks are generated and embedded following the procedure described in Section III. Also, the performance of the proposed detector has been compared against the one proposed by Song [22]. The theoretical ROC curves are derived for the proposed detector using Eq. (3. The experimental ROC curves are computed by measuring the performance of the actual watermark detection system by calculating the P det from real watermarked images. Experiments are then conducted by comparing the log-likelihood ratio with the corresponding threshold for each value of the theoretical false alarm and for randomly generated watermark sequences. The P fa is set to the range 5 to and the value of the strength λ is fixed to value.. The ROC curves in Fig. (a-(c indicate that the proposed detector clearly outperforms Song s detector, except for the case of Image6 (Fig. (d Song s detector performs slightly better than the proposed one but the difference of the ROC curves is not as significant as for the other images. Fig. (a-(d clearly show that the empirically obtained ROC curves verify the theoretical ones for all images. The performance of the detector depends highly on the image characteristics in the DWT 2 ACADEMY PUBLISHER

11 JOURNAL OF MULTIMEDIA, VOL. 5, NO. 2, APRIL ROC curves for Image 2 Analytical Empirical Song s Detector Probability of False Alarm (a ROC curves for Image 2 5 Analytical Empirical Song s Detector Probability of False Alarm (c ROC curves for Image 22 Analytical Empirical Song s Detector Probability of False Alarm (b ROC curves for Image 6 Analytical Empirical Song s Detector Proboility of False Alarm Figure. Empirical and analytical ROC curves for the DWT coefficients of the test images. The watermark strength λ has been set to.. (d domain. For instance, one can notice the large difference between the ROC curves of Image2 and Image2 5. The results for Images2 are very attractive and P det is above.87 for all values of P fa. The ROC curves for Image22 and Image6 are quite similar. On the other hand, Image2 5 provides the worst results; this is consistent with the modeling results of Section II, where it was shown that for this image the GGD does not really fit its high-frequency DWT coefficients. A similar situation arose from the results of optimum decoder, where the probability of bit error for Image2 5 was very high. Note that the strength λ used is very low.; increasing the value of λ will enhance the performance of the proposed detector. The performance of the detection schemes is also evaluated when watermarks of varying strength are embedded in DWT coefficients. For this purpose, we define the Watermark to Document Ratio (WDR as in [34]: ( σ 2 WDR =log w (3 with σ 2 w = N σ 2 x N wj 2,σx 2 = N j= N x 2 j (32 j= where w represents the watermark inserted and is given by λm i b i x i, x is the watermarked data and N is the number of data samples used to carry the watermark and which also refers to the original host data (i.e. the original DWT coefficients. The WDR determines the amplitude of the watermarks where a small value of WDR correspond to a high perceptual quality since, in this case, the host data document (i.e. DWT coefficients has good immunity to the watermarking process. Note that as a rule of thumb for image watermarking, WDRs below -2 db are required to keep the watermark imperceptible [35]. For the test images presented in Fig., watermarks of varying strength λ are embedded in the DWT coefficients, leading to different values of σw 2 and WDR. For these watermarks, we determine both the probability of false alarm and the probability of true detection. We then consider two cases: first, we fix the probability of false alarm and we calculate the corresponding probabilities of detection. Then we fix the probability of detection to compute the corresponding probabilities of false alarm. In the former case, we set the false alarm probability to the value P fa = 9 and in the latter case we consider P det =.99. From the statistics of the likelihood ratios of the detector and the predetermined P fa and P det,wethen estimate the corresponding thresholds for the likelihood ratio tests. For fixed P fa we use (33 and for fixed P det the threshold for the detector can be given by: λ = erfc (2P det 2δl 2 + µ l (33 Finally, from Eq. (26 and Eq. (3, we calculate the probability of detection and false alarm for all the WDR values whose results are depicted in Fig. and Fig. 2, respectively. Note that in Fig. (a, (b and (d, a WDR value greater than -42 db corresponds to a relative weak watermark strength to some extent (i.e. λ.2 that 2 ACADEMY PUBLISHER

12 78 JOURNAL OF MULTIMEDIA, VOL. 5, NO. 2, APRIL 2 Detector Performance for Image2 Detector Performance for Image (.5 56(. 48(.5 42(.2 38(.25 34( (a Detector Performance for Image2 5 7(.5 56(. 48(.5 42(.2 38(.25 34( (b Detector Performance for Image (.5 56(. 48(.5 42(.2 38(.25 34(.3 (c 7(.5 56(. 48(.5 42(.2 38(.25 34(.3 Figure. Probability of detection for watermarks of varying strength λ parameterized by the WDR. The P fa = 9. The corresponding value of λ is given between brackets. (d.7 Detector Performance for Image2 Detector Performance for Image Probability of False Alarm Probability of False Alarm (.5 56(. 48(.5 42(.2 38(.25 34(.3 Probability of False Alarm (a Detector Performance for Image2 5 7(.5 56(. 48(.5 42(.2 38(.25 34(.3 Probability of False Alarm (b Detector Performance for Image6 7(.5 56(. 48(.5 42(.2 38(.25 34(.3 (c 7(.5 56(. 48(.5 42(.2 38(.25 34(.3 Figure 2. Probability of false alarm for watermarks of varying strength parameterized by the Watermark to Document Ratio. The P det =.99. The corresponding value of the strength λ is given between brackets. (d 2 ACADEMY PUBLISHER

13 JOURNAL OF MULTIMEDIA, VOL. 5, NO. 2, APRIL 2 79 can be detected with a probability of. For Image2 5, the values WDR for which the probability equals are above -38 db and correspond to a relatively strong watermark strength λ.25. It can also be noticed that the performance of the detector depends not only on the WDR, but on the specific characteristics of the image as well. For example, comparing Fig. 2(b and (c, one can observe that a stronger watermark must be embedded in image2 5, which exhibits less detail information, in order for it to be reliably detected. On the other hand, for images having more details such as Image2, a weaker (by about db watermark is required to obtain the same probability of detection. This result makes an intuitive sense, since the amount of the watermark inserted depends on the amplitude of the coefficient itself in multiplicative watermarking and a detailed image produces DWT coefficients with relatively higher amplitudes than a smooth one. Similarly, in Fig. 2, it can be seen that more false alarms tend to occur in Image2 5 for the same WDR. This can also be explained intuitively, since DWT coefficients of smooth images are relatively small which require an insertion of weak watermarks for invisibility purposes. However, in such a case, the detector cannot make significant difference and may lead to a false decision. Fig. and 2 show that the proposed detector provides attractive results and can reliably detect a watermark in low WDR margins (i.e., even if the watermark has very low strength or it is subject to an attack that partially eliminates it thus decreasing its power σ 2 w. VI. CONCLUSIONS This paper proposes new optimum multibit, multiplicative watermarking decoding and detection methods in the DWT domain for fingerprint images. The proposed techniques are based on the statistical properties of the high-frequency DWT coefficients. The original image is not required in the watermark decoding and detection processes, which makes the algorithms highly flexible for real applications. The proposed decoder and detector utilize a generalized Gaussian model, which accurately describes the DWT coefficients of the fingerprint images. The accuracy of this model has been verified through experimental investigation. Optimal structures for both watermark decoding (extraction and watermark detection has been derived using a ML scheme. Theoretical assessments of the performance of the proposed decoder and detector (such as the probability of error in decoding and the probabilities of false alarm and detection in watermark detection have been derived. The analytical results are compared with the empirical ones; both indicate that the approach is robust even in the presence of attacks such as WSQ compression, mean filtering and white noise addition. The overall performances for both decoder and detector are dependent on the fingerprint image characteristics. This dependence is, however, not related to the quality of the fingerprint image or to the clarity of the ridge lines but it depends on the size of the ridges area relative to the size of the fingerprint image. The bigger the ridges area, the higher the performance of the proposed decoder and detector. In this paper, we have not taken into account the influence of visual masking on the performance of the proposed decoder and detector. It is hoped that the use of perceptual masking will further improve the results in future work. REFERENCES [] A. k. Jain, S. Prabhakar, and L. Hong, A multichannel approach to fingerprint classification, IEEE Transactions on Pattern Analysis and Machine Intelligence, vol. 2, no. 4, pp , April 999. [2] A. k. Jain and U. Uludag, Hiding biometric data, IEEE Transactions on Pattern Analysis and Machine Intelligence, vol. 25, no., pp , November 23. [3] G. I. Davida, Y. Frankel, and B. Matt, On enabling secure applications through online biometric identification, in Proceedings of IEEE Symposium on Security and Privacy, 998, pp [4] G. I. Davida, Y. Frankel, B. Matt, and R. Peralta, On the relation of error correction and cryptography to an offline biometric based identification scheme, in Proceedings of the Workshop on Coding and Cryptography (WCC99, 999, pp [5] C. Soutar, D. Roberge, S. A. Stojanov, R. Gilory, and B. V. K. V. Kumar, Biometric encryption using image processing, in Proceedings SPIE, Optical Security and Counterfeit Deterrence Techniques II, vol. 334, April 998, pp [6] C. Soutar, D. Roberge, S. A. S. amd R. Gilory, and B. V. K. V. Kumar, Biometric encryption, enrollment and verification procedures, in Proceeding SPIE, Optical Pattern Recognition IX, vol. 3386, March 998, pp [7] E. Verbitsky, E. Tuyls, D. Denteneer, and J. Linnartz, Reliable biometric authentication with privacy protection, in Benelux Symposium on Information Theory, 23. [8] J. P. Linnartz and P. Tuyls, New shielding functions to enhance privacy and prevent misuse of biometric templates, in Proceedings of the 4th International Conference on Audio an Video Based Biomeric Person Authentication, 23, pp [9] U. Uludag, S. Pankanti, S. Prabhakar, and A. K. Jain, Biometric cryptosystems : Issues and challenges, Proceedings of the IEEE, vol. 92, no. 6, pp , June 24. [] A. Andy, Vulnerability in biometric encryption systems, in Audio- and Video-Based Biometric Person Authentication, Springer-Verlag, Ed., vol. 3546, June 25, pp. 9. [] N. K. Ratha, J. H. Connell, and R. M. Bolle, Secure data hiding in wavelet compressed fingerprint images, in Proceedings of ACM Multimedia 2 Workshop, 2, pp [2] B. Gunsel, U. Umut, and A. M. Tekalp, Robust watermarking of fingerprint images, ELSEVIER: Pattern Recognition, vol. 35, no. 2, pp , 22. [3] k. Zebbiche, L. Ghouti, F. Khelifi, and A. Bouridane, Protecting fingerprint data using watermarking, in Proceedings of the st Adaptive Hardware Software (AHS26 Conference, June 26, pp [4] A. Piva, M. Barni, F. Bartolini, and V. Cappelini, Threshold selection for correlation-based watermark detction, in Proceddings of the COST254 Workshop on Intelligent Communications, 998, pp [5] M. Barni, F. Bartolini, V. Cappelini, and A. Piva, A DCTdomain system for robust image watermarking, Signal Processing, vol. 66, no. 3, pp , May ACADEMY PUBLISHER

14 8 JOURNAL OF MULTIMEDIA, VOL. 5, NO. 2, APRIL 2 [6] J. R. Hernandez, M. Amado, and F. Perez-Gonzales, DCT-domain watermarking techniques for still images: Detector performance analysis and a new structre, IEEE Transactions on Image Processing, vol. 9, no., pp , January 2. [7] A. Briassouli, P. Tsakalides, and A. Stouraitis, Hidden messages in heavy-tails: DCT-domain watermark detection using alpha-stable models, IEEE Transactions on Multimedia, vol. 7, no. 4, pp. 7 75, August 25. [8] M. Barni, F. Bartolini, A. D. Rosa, and A. Piva, A new decoder for the optimum recovery of nonadditive watermarks, IEEE Transaction on Image Processing, vol., no. 5, pp , May 2. [9] Q. Cheng and T. S. Huang, Robust optimum detection of transform domain multiplicative watermarks, IEEE Tansactions on Signal Procesing, vol. 5, no. 4, pp , April 23. [2] F. Perez-Gonzales, J. R. Hernandez, and F. Balado, Approaching the capacity limit in image watermarking: A perspective on coding techniques of data hiding applications, Signal Processing, vol. 8, no. 6, pp , June 2. [2] M. Barni, F. Bartolini, A. D. Rosa, and A. Piva, Optimum decoding and detection of multiplicative watermarks, IEEE Transactions on Signal Processing, vol. 5, no. 4, pp. 8 23, April 23. [22] K. S. Song, Blind efficient scores detection and decoding of multibit watermarks, in Proceedings of SPIE, the International Society for Optical Engineering, vol. 595, August 25, pp [23] D. Maltoni, D. Maio, A. k. Jain, and S. Prabhakar, Handbook of Fingerprint Recognition. New York: Springer, June 23. [24] WSQ Gray-Scale Fingerprint Image Comprssion Specification, U.S. Federal Bureau of Invetigation, February 993. [25] G. Wouwer, P. Scheunders, and D. Dyck, Statistical texture characterization from discrete wavelet representation, IEEE Transaction on Image Processing, vol. 8, pp , April 999. [26] S. Mallat, A theory for multiresolution signal decomposition: The wavelet representation, IEEE Transaction on Pattern Recognition and Machine Intelligent, vol., pp , July 989. [27] M. N. Do and M. Vetterli, Wavelet-based texture retreival using generalized gaussian density and kullback-leibler distance, IEEE Transaction on Image Processing, vol., no. 2, pp , February 22. [28] Fingerprint verification competition, [29] M. Nardon and P. Pianca, Simulation techniques for generalized gaussian densities, University of Venice, Working paper series 45/26, November 26. [3] X. G. Xia, C. G. Bonklet, and G. R. Acre, Wavelet transform based watermark for digital images, Optics Express, vol. 3, no. 2, pp , December 998. [3] G. C. Langelaar, I. Styawan, and R. L. Lagendijk, Watermarking digital image and video data: A state-of-art overview, IEEE Signal Processing Magazine, vol. 7, no. 5, pp. 2 46, Septembre 2. [32] WSQ viewer (version 2.7, [33] k. Zebbiche, F. Khelifi, and A. Bouridane, Optimum detection of multiplicative-multibit watermarking for fingerprint images, in Proceedings of the 2nd International Conference on Biometrics (ICB27, vol. 4642/27, August 27, pp [34] J. J. Eggers and B. Girod, Quantizaion effects on digital watermarks, Signal Processing, vol. 8, no. 2, pp , February 2. [35] J. K. Su and B. Girod, Power-spectrum condition for energy-efficient watermarking, in Proceedings of the International Conference on Image Processing (ICIP999, vol., October 999, pp Khalil Zebbiche received the Ingenieur d Etat degree in Computer Science from the Ecole Polytechnique, Algiers, Algeria, in 23. In Septembre 25, he joined the Queens University of Belfast, Belfast, UK, as a research student and received the PhD degree from the School of Computer Science in 28. From 23 to 25, he was a research scientist at the Algerian National Centre for Research and Development. He is currently holding a senior research position at the Algerian National Centre for Research and Development, Algeria. His research interests include biometrics, security, image watermarking, digital signal and image processing and information theory. Fouad Khelifi received the Ingenieur d Etat degree in electrical engineering from the University of Jijel, Algeria, in 2, the Magistere degree in electronics from the University of Annaba, Algeria, in 23. He then joined the Queens University of Belfast, Belfast, UK, as a research student and received the PhD degree from the School of Computer Science in 27. From 23 to 24, he was a Lecturer at the University of Jijel. He is currently holding a research position in Digital Media & Systems Research Institute, School of Computing, Informatics, and Media, University of Bradford, UK. His research interests include image coding, image watermarking, digital signal and image processing, artificial intelligence, pattern recognition and classification. Ahmed Bouridane received the Ingenieur d Etat degree in electronics from Ecole Nationale Polytechnique of Algiers (ENPA, Algeria, in 982, the M.Phil. degree in electrical engineering (VLSI design for signal processing from the University of Newcastle-Upon-Tyne, U.K., in 988, and the Ph.D. degree in electrical engineering (computer vision from the University of Nottingham, U.K., in 992. From 992 to 994, he worked as a Research Developer in telesurveillance and access control applications. In 994, he joined Queens University Belfast, Belfast, U.K., initially as Lecturer in computer architecture and image processing. He is now a Reader in computer science, and his research interests are in imaging for forensics and security, biometrics, homeland security, image/video watermarking and cryptography. He has authored and co-authored more than 8 publications. Dr. Bouridane is a Senior Member of IEEE. 2 ACADEMY PUBLISHER

Study of Wavelet Functions of Discrete Wavelet Transformation in Image Watermarking

Study of Wavelet Functions of Discrete Wavelet Transformation in Image Watermarking Study of Wavelet Functions of Discrete Wavelet Transformation in Image Watermarking Navdeep Goel 1,a, Gurwinder Singh 2,b 1ECE Section, Yadavindra College of Engineering, Talwandi Sabo 2Research Scholar,

More information

University of Siena. Multimedia Security. Watermark extraction. Mauro Barni University of Siena. M. Barni, University of Siena

University of Siena. Multimedia Security. Watermark extraction. Mauro Barni University of Siena. M. Barni, University of Siena Multimedia Security Mauro Barni University of Siena : summary Optimum decoding/detection Additive SS watermarks Decoding/detection of QIM watermarks The dilemma of de-synchronization attacks Geometric

More information

Wavelet Packet Based Digital Image Watermarking

Wavelet Packet Based Digital Image Watermarking Wavelet Packet Based Digital Image ing A.Adhipathi Reddy, B.N.Chatterji Department of Electronics and Electrical Communication Engg. Indian Institute of Technology, Kharagpur 72 32 {aar, bnc}@ece.iitkgp.ernet.in

More information

ISeCure. Nowadays, copyright infringement, unauthorized. The ISC Int'l Journal of Information Security

ISeCure. Nowadays, copyright infringement, unauthorized. The ISC Int'l Journal of Information Security The ISC Int'l Journal of Information Security July 216, Volume 8, Number 2 (pp. 131 139) http://www.isecure-journal.org Optimum Decoder for Multiplicative Spread Spectrum Image Watermarking with Laplacian

More information

Securing BioEncoded IrisCodes Against Correlation Attacks

Securing BioEncoded IrisCodes Against Correlation Attacks Securing BioEncoded IrisCodes Against Correlation Attacks Osama Ouda a,b, Norimichi Tusmura b and Toshiya Nakaguchi b a Faculty of Computers and Information Sciences, Mansoura University, Mansoura 35516,

More information

NOISE can sometimes improve nonlinear signal processing

NOISE can sometimes improve nonlinear signal processing 488 IEEE TRANSACTIONS ON SIGNAL PROCESSING, VOL. 59, NO. 2, FEBRUARY 2011 Noise Benefits in Quantizer-Array Correlation Detection and Watermark Decoding Ashok Patel, Member, IEEE, and Bart Kosko, Fellow,

More information

Watermark Extraction Optimization Using PSO Algorithm

Watermark Extraction Optimization Using PSO Algorithm Research Journal of Applied Sciences, Engineering and Technology 5(12): 3312-3319, 2013 ISS: 2040-7459; e-iss: 2040-7467 Maxwell Scientific Organization, 2013 Submitted: June 09, 2012 Accepted: July 18,

More information

Quantization Index Modulation using the E 8 lattice

Quantization Index Modulation using the E 8 lattice 1 Quantization Index Modulation using the E 8 lattice Qian Zhang and Nigel Boston Dept of Electrical and Computer Engineering University of Wisconsin Madison 1415 Engineering Drive, Madison, WI 53706 Email:

More information

Abstract The aim of this paper is to improve the performance of spatial domain watermarking. To this end, a new perceptual mask

Abstract The aim of this paper is to improve the performance of spatial domain watermarking. To this end, a new perceptual mask Efficient Spatial Image Watermarking via New Perceptual Masking and Blind Detection Schemes Irene G. Karybali, Member, IEEE, and Kostas Berberidis, Member, IEEE Abstract The aim of this paper is to improve

More information

Digital Image Watermarking Algorithm Based on Wavelet Packet

Digital Image Watermarking Algorithm Based on Wavelet Packet www.ijcsi.org 403 Digital Image ing Algorithm Based on Wavelet Packet 1 A.Geetha, 2 B.Vijayakumari, 3 C.Nagavani, 4 T.Pandiselvi 1 3 4 Faculty of Kamaraj College of Engineering and Technology Department

More information

1782 IEEE TRANSACTIONS ON IMAGE PROCESSING, VOL. 18, NO. 8, AUGUST 2009

1782 IEEE TRANSACTIONS ON IMAGE PROCESSING, VOL. 18, NO. 8, AUGUST 2009 1782 IEEE TRANSACTIONS ON IMAGE PROCESSING, VOL. 18, NO. 8, AUGUST 2009 A New Statistical Detector for DWT-Based Additive Image Watermarking Using the Gauss Hermite Expansion S. M. Mahbubur Rahman, M.

More information

Research Article Effect of Different Places in Applying Laplacian Filter on the Recovery Algorithm in Spatial Domain Watermarking

Research Article Effect of Different Places in Applying Laplacian Filter on the Recovery Algorithm in Spatial Domain Watermarking Research Journal of Applied Sciences, Engineering and Technology 7(24): 5157-5162, 2014 DOI:10.19026/rjaset.7.912 ISSN: 2040-7459; e-issn: 2040-7467 2014 Maxwell Scientific Publication Corp. Submitted:

More information

Watermark Detection after Quantization Attacks

Watermark Detection after Quantization Attacks Watermark Detection after Quantization Attacks Joachim J. Eggers and Bernd Girod Telecommunications Laboratory University of Erlangen-Nuremberg Cauerstr. 7/NT, 9158 Erlangen, Germany feggers,girodg@lnt.de

More information

Information Theoretical Analysis of Digital Watermarking. Multimedia Security

Information Theoretical Analysis of Digital Watermarking. Multimedia Security Information Theoretical Analysis of Digital Watermaring Multimedia Security Definitions: X : the output of a source with alphabet X W : a message in a discrete alphabet W={1,2,,M} Assumption : X is a discrete

More information

2. Definition & Classification

2. Definition & Classification Information Hiding Data Hiding K-H Jung Agenda 1. Data Hiding 2. Definition & Classification 3. Related Works 4. Considerations Definition of Data Hiding 3 Data Hiding, Information Hiding Concealing secret

More information

EXTRACTING BIOMETRIC BINARY STRINGS WITH MINIMAL AREA UNDER THE FRR CURVE FOR THE HAMMING DISTANCE CLASSIFIER

EXTRACTING BIOMETRIC BINARY STRINGS WITH MINIMAL AREA UNDER THE FRR CURVE FOR THE HAMMING DISTANCE CLASSIFIER 17th European Signal Processing Conference (EUSIPCO 29) Glasgow, Scotland, August 24-28, 29 EXTRACTING BIOMETRIC BINARY STRINGS WITH MINIMA AREA UNER THE CURVE FOR THE HAMMING ISTANCE CASSIFIER Chun Chen,

More information

A Contrario Detection of False Matches in Iris Recognition

A Contrario Detection of False Matches in Iris Recognition A Contrario Detection of False Matches in Iris Recognition Marcelo Mottalli, Mariano Tepper, and Marta Mejail Departamento de Computación, Universidad de Buenos Aires, Argentina Abstract. The pattern of

More information

Data-Hiding Capacities of Non-Redundant Complex Wavelets

Data-Hiding Capacities of Non-Redundant Complex Wavelets Data-Hiding Capacities of Non-Redundant Complex Wavelets Lahouari Ghouti School of Computer Science, Queen's University of Belfast. Belfast BT7 INN, United ingdom. Email: L.Ghouti@qub.ac.uk eywords: Digital

More information

This is a repository copy of The effect of quality scalable image compression on robust watermarking.

This is a repository copy of The effect of quality scalable image compression on robust watermarking. This is a repository copy of The effect of quality scalable image compression on robust watermarking. White Rose Research Online URL for this paper: http://eprints.whiterose.ac.uk/7613/ Conference or Workshop

More information

A Modified Moment-Based Image Watermarking Method Robust to Cropping Attack

A Modified Moment-Based Image Watermarking Method Robust to Cropping Attack A Modified Moment-Based Watermarking Method Robust to Cropping Attack Tianrui Zong, Yong Xiang, and Suzan Elbadry School of Information Technology Deakin University, Burwood Campus Melbourne, Australia

More information

On Sequential Watermark Detection

On Sequential Watermark Detection On Sequential Watermark Detection R. Chandramouli and Nasir D. Memon Abstract This paper introduces a new watermark detection paradigm based on sequential detection. It is shown that this framework leads

More information

Logarithmic quantisation of wavelet coefficients for improved texture classification performance

Logarithmic quantisation of wavelet coefficients for improved texture classification performance Logarithmic quantisation of wavelet coefficients for improved texture classification performance Author Busch, Andrew, W. Boles, Wageeh, Sridharan, Sridha Published 2004 Conference Title 2004 IEEE International

More information

Spread Spectrum Watermarking. Information Technologies for IPR Protection

Spread Spectrum Watermarking. Information Technologies for IPR Protection Spread Spectrum Watermarking Information Technologies for IPR Protection Spread Spectrum Communication A Narrow-band signal is transmitted over a much larger bandwidth such that the signal energy presented

More information

Capacity of Full Frame DCT Image Watermarks

Capacity of Full Frame DCT Image Watermarks 1450 IEEE TRANSACTIONS ON IMAGE PROCESSING, VOL. 9, NO. 8, AUGUST 2000 is always better when the nonseparable algorithm is used (around 1 db) compared with the separable approach. Nevertheless, the quality

More information

Lecture 5: Likelihood ratio tests, Neyman-Pearson detectors, ROC curves, and sufficient statistics. 1 Executive summary

Lecture 5: Likelihood ratio tests, Neyman-Pearson detectors, ROC curves, and sufficient statistics. 1 Executive summary ECE 830 Spring 207 Instructor: R. Willett Lecture 5: Likelihood ratio tests, Neyman-Pearson detectors, ROC curves, and sufficient statistics Executive summary In the last lecture we saw that the likelihood

More information

Chapter 2 Signal Processing at Receivers: Detection Theory

Chapter 2 Signal Processing at Receivers: Detection Theory Chapter Signal Processing at Receivers: Detection Theory As an application of the statistical hypothesis testing, signal detection plays a key role in signal processing at receivers of wireless communication

More information

SCALE INVARIANT AND ROTATION INVARIANT IMAGE WATERMARKING. Spandana Bodapati. Bachelor of Science. Jawaharlal Nehru Technological University

SCALE INVARIANT AND ROTATION INVARIANT IMAGE WATERMARKING. Spandana Bodapati. Bachelor of Science. Jawaharlal Nehru Technological University SCALE INVARIANT AND ROTATION INVARIANT IMAGE WATERMARKING By Spandana Bodapati Bachelor of Science Jawaharlal Nehru Technological University Hyderabad, India 200 Submitted to the Faculty of the Graduate

More information

Biometric Security Based on ECG

Biometric Security Based on ECG Biometric Security Based on ECG Lingni Ma, J.A. de Groot and Jean-Paul Linnartz Eindhoven University of Technology Signal Processing Systems, Electrical Engineering l.ma.1@student.tue.nl j.a.d.groot@tue.nl

More information

Noise Benefits in Quantizer-Array Correlation Detection and Watermark Decoding

Noise Benefits in Quantizer-Array Correlation Detection and Watermark Decoding To appear in the IEEE Transactions on Signal Processing Current draft: 9 November 010 Noise Benefits in Quantizer-Array Correlation Detection and Watermark Decoding Ashok Patel, Member IEEE, and Bart Kosko,

More information

Improved Adaptive LSB Steganography based on Chaos and Genetic Algorithm

Improved Adaptive LSB Steganography based on Chaos and Genetic Algorithm Improved Adaptive LSB Steganography based on Chaos and Genetic Algorithm Lifang Yu, Yao Zhao 1, Rongrong Ni, Ting Li Institute of Information Science, Beijing Jiaotong University, BJ 100044, China Abstract

More information

Information Hiding and Covert Communication

Information Hiding and Covert Communication Information Hiding and Covert Communication Andrew Ker adk @ comlab.ox.ac.uk Royal Society University Research Fellow Oxford University Computing Laboratory Foundations of Security Analysis and Design

More information

A Systematic Description of Source Significance Information

A Systematic Description of Source Significance Information A Systematic Description of Source Significance Information Norbert Goertz Institute for Digital Communications School of Engineering and Electronics The University of Edinburgh Mayfield Rd., Edinburgh

More information

2. What are the tradeoffs among different measures of error (e.g. probability of false alarm, probability of miss, etc.)?

2. What are the tradeoffs among different measures of error (e.g. probability of false alarm, probability of miss, etc.)? ECE 830 / CS 76 Spring 06 Instructors: R. Willett & R. Nowak Lecture 3: Likelihood ratio tests, Neyman-Pearson detectors, ROC curves, and sufficient statistics Executive summary In the last lecture we

More information

Digital Watermark Detection in Visual Multimedia Content

Digital Watermark Detection in Visual Multimedia Content Digital Watermark Detection in Visual Multimedia Content PhD Thesis Defense Peter Meerwald Dept. of Computer Sciences, University of Salzburg September 2010 Watermarking Watermarking is a technology to

More information

BIOMETRIC verification systems are used to verify the

BIOMETRIC verification systems are used to verify the 86 IEEE TRANSACTIONS ON CIRCUITS AND SYSTEMS FOR VIDEO TECHNOLOGY, VOL. 14, NO. 1, JANUARY 2004 Likelihood-Ratio-Based Biometric Verification Asker M. Bazen and Raymond N. J. Veldhuis Abstract This paper

More information

- An Image Coding Algorithm

- An Image Coding Algorithm - An Image Coding Algorithm Shufang Wu http://www.sfu.ca/~vswu vswu@cs.sfu.ca Friday, June 14, 2002 22-1 Agenda Overview Discrete Wavelet Transform Zerotree Coding of Wavelet Coefficients Successive-Approximation

More information

Can the sample being transmitted be used to refine its own PDF estimate?

Can the sample being transmitted be used to refine its own PDF estimate? Can the sample being transmitted be used to refine its own PDF estimate? Dinei A. Florêncio and Patrice Simard Microsoft Research One Microsoft Way, Redmond, WA 98052 {dinei, patrice}@microsoft.com Abstract

More information

Quantization Based Watermarking Methods Against Valumetric Distortions

Quantization Based Watermarking Methods Against Valumetric Distortions International Journal of Automation and Computing 14(6), December 2017, 672-685 DOI: 10.1007/s11633-016-1010-6 Quantization Based Watermarking Methods Against Valumetric Distortions Zai-Ran Wang 1,2 Jing

More information

Communication Engineering Prof. Surendra Prasad Department of Electrical Engineering Indian Institute of Technology, Delhi

Communication Engineering Prof. Surendra Prasad Department of Electrical Engineering Indian Institute of Technology, Delhi Communication Engineering Prof. Surendra Prasad Department of Electrical Engineering Indian Institute of Technology, Delhi Lecture - 41 Pulse Code Modulation (PCM) So, if you remember we have been talking

More information

This is an accepted version of a paper published in Elsevier Information Fusion. If you wish to cite this paper, please use the following reference:

This is an accepted version of a paper published in Elsevier Information Fusion. If you wish to cite this paper, please use the following reference: This is an accepted version of a paper published in Elsevier Information Fusion. If you wish to cite this paper, please use the following reference: T. Murakami, T. Ohki, K. Takahashi, Optimal sequential

More information

RELIABLE BIOMETRIC AUTHENTICATION WITH PRIVACY PROTECTION

RELIABLE BIOMETRIC AUTHENTICATION WITH PRIVACY PROTECTION RELIABLE BIOMETRIC AUTHENTICATION WITH PRIVACY PROTECTION E. VERBITSKIY, P. TUYLS, D. DENTENEER, J.P. LINNARTZ PHILIPS RESEARCH LABORATORIES PROF. HOLSTLAAN 4, AA 5656 EINDHOVEN, THE NETHERLANDS {EVGENY.VERBITSKIY,PIM.TUYLS,DEE.DENTENEER,J.P.LINNARTZ@PHILIPS.COM}

More information

An Image Watermarking Based on the pdf Modeling and Quantization Effects in the Wavelet Domain

An Image Watermarking Based on the pdf Modeling and Quantization Effects in the Wavelet Domain An Image Watermarking Based on the pdf Modeling and Quantization Effects in the Wavelet Domain Irena Orović, Milica Orlandić and Srdjan Stanković Faculty of Electrical Engineering, University of Montenegro

More information

Low-Complexity Image Denoising via Analytical Form of Generalized Gaussian Random Vectors in AWGN

Low-Complexity Image Denoising via Analytical Form of Generalized Gaussian Random Vectors in AWGN Low-Complexity Image Denoising via Analytical Form of Generalized Gaussian Random Vectors in AWGN PICHID KITTISUWAN Rajamangala University of Technology (Ratanakosin), Department of Telecommunication Engineering,

More information

Robust Watermarking Procedure based on JPEG-DCT Image Compression

Robust Watermarking Procedure based on JPEG-DCT Image Compression TIME-FREQUENCY SIGNAL ANALYSIS 1649 Robust Watermarking Procedure based on JPEG-DCT Image Compression Srdjan Stanković, Irena Orović, and Nikola Žarić Abstract A new procedure for watermarking in the 8x8

More information

Introduction to Statistical Inference

Introduction to Statistical Inference Structural Health Monitoring Using Statistical Pattern Recognition Introduction to Statistical Inference Presented by Charles R. Farrar, Ph.D., P.E. Outline Introduce statistical decision making for Structural

More information

Half-Pel Accurate Motion-Compensated Orthogonal Video Transforms

Half-Pel Accurate Motion-Compensated Orthogonal Video Transforms Flierl and Girod: Half-Pel Accurate Motion-Compensated Orthogonal Video Transforms, IEEE DCC, Mar. 007. Half-Pel Accurate Motion-Compensated Orthogonal Video Transforms Markus Flierl and Bernd Girod Max

More information

Lightweight Detection of Additive Watermarking in the DWT-Domain

Lightweight Detection of Additive Watermarking in the DWT-Domain Lightweight Detection of Additive Watermarking in the DWT-Domain Roland Kwitt Peter Meerwald Andreas Uhl Technical Report 2010-04 May 2010 Department of Computer Sciences Jakob-Haringer-Straße 2 5020 Salzburg

More information

ECE533 Digital Image Processing. Embedded Zerotree Wavelet Image Codec

ECE533 Digital Image Processing. Embedded Zerotree Wavelet Image Codec University of Wisconsin Madison Electrical Computer Engineering ECE533 Digital Image Processing Embedded Zerotree Wavelet Image Codec Team members Hongyu Sun Yi Zhang December 12, 2003 Table of Contents

More information

DETECTION theory deals primarily with techniques for

DETECTION theory deals primarily with techniques for ADVANCED SIGNAL PROCESSING SE Optimum Detection of Deterministic and Random Signals Stefan Tertinek Graz University of Technology turtle@sbox.tugraz.at Abstract This paper introduces various methods for

More information

A Framework for Optimizing Nonlinear Collusion Attacks on Fingerprinting Systems

A Framework for Optimizing Nonlinear Collusion Attacks on Fingerprinting Systems A Framework for Optimizing onlinear Collusion Attacks on Fingerprinting Systems egar iyavash Department of Electrical and Computer Engineering University of Illinois at Urbana-Champaign Coordinated Science

More information

ML Detection of Steganography

ML Detection of Steganography ML Detection of Steganography Mark T Hogan, Neil J Hurley, Guénolé CM Silvestre, Félix Balado and Kevin M Whelan Department of Computer Science, University College Dublin, Belfield, Dublin 4, Ireland ABSTRACT

More information

EECS564 Estimation, Filtering, and Detection Exam 2 Week of April 20, 2015

EECS564 Estimation, Filtering, and Detection Exam 2 Week of April 20, 2015 EECS564 Estimation, Filtering, and Detection Exam Week of April 0, 015 This is an open book takehome exam. You have 48 hours to complete the exam. All work on the exam should be your own. problems have

More information

Modifying Voice Activity Detection in Low SNR by correction factors

Modifying Voice Activity Detection in Low SNR by correction factors Modifying Voice Activity Detection in Low SNR by correction factors H. Farsi, M. A. Mozaffarian, H.Rahmani Department of Electrical Engineering University of Birjand P.O. Box: +98-9775-376 IRAN hfarsi@birjand.ac.ir

More information

The peculiarities of the model: - it is allowed to use by attacker only noisy version of SG C w (n), - CO can be known exactly for attacker.

The peculiarities of the model: - it is allowed to use by attacker only noisy version of SG C w (n), - CO can be known exactly for attacker. Lecture 6. SG based on noisy channels [4]. CO Detection of SG The peculiarities of the model: - it is alloed to use by attacker only noisy version of SG C (n), - CO can be knon exactly for attacker. Practical

More information

MPSteg-color: a new steganographic technique for color images

MPSteg-color: a new steganographic technique for color images MPSteg-color: a new steganographic technique for color images Giacomo Cancelli, Mauro Barni Università degli Studi di Siena Dipartimento di Ingegneria dell Informazione, Italy {cancelli,barni}@dii.unisi.it

More information

Role of Assembling Invariant Moments and SVM in Fingerprint Recognition

Role of Assembling Invariant Moments and SVM in Fingerprint Recognition 56 Role of Assembling Invariant Moments SVM in Fingerprint Recognition 1 Supriya Wable, 2 Chaitali Laulkar 1, 2 Department of Computer Engineering, University of Pune Sinhgad College of Engineering, Pune-411

More information

Research Article A Steganographic Method Based on Pixel-Value Differencing and the Perfect Square Number

Research Article A Steganographic Method Based on Pixel-Value Differencing and the Perfect Square Number Applied Mathematics Volume 013, Article ID 189706, 8 pages http://dx.doi.org/10.1155/013/189706 Research Article A Steganographic Method Based on Pixel-Value Differencing and the Perfect Square Number

More information

Module 4. Multi-Resolution Analysis. Version 2 ECE IIT, Kharagpur

Module 4. Multi-Resolution Analysis. Version 2 ECE IIT, Kharagpur Module 4 Multi-Resolution Analysis Lesson Multi-resolution Analysis: Discrete avelet Transforms Instructional Objectives At the end of this lesson, the students should be able to:. Define Discrete avelet

More information

CFAR DETECTION OF SPATIALLY DISTRIBUTED TARGETS IN K- DISTRIBUTED CLUTTER WITH UNKNOWN PARAMETERS

CFAR DETECTION OF SPATIALLY DISTRIBUTED TARGETS IN K- DISTRIBUTED CLUTTER WITH UNKNOWN PARAMETERS CFAR DETECTION OF SPATIALLY DISTRIBUTED TARGETS IN K- DISTRIBUTED CLUTTER WITH UNKNOWN PARAMETERS N. Nouar and A.Farrouki SISCOM Laboratory, Department of Electrical Engineering, University of Constantine,

More information

4348 IEEE TRANSACTIONS ON IMAGE PROCESSING, VOL. 23, NO. 10, OCTOBER 2014

4348 IEEE TRANSACTIONS ON IMAGE PROCESSING, VOL. 23, NO. 10, OCTOBER 2014 4348 IEEE TRANSACTIONS ON IMAGE PROCESSING, VOL. 3, NO. 10, OCTOBER 014 A Study of Multiplicative Watermark Detection in the Contourlet Domain Using Alpha-Stable Distributions Hamidreza Sadreazami, Student

More information

Breaking an encryption scheme based on chaotic Baker map

Breaking an encryption scheme based on chaotic Baker map Breaking an encryption scheme based on chaotic Baker map Gonzalo Alvarez a, and Shujun Li b a Instituto de Física Aplicada, Consejo Superior de Investigaciones Científicas, Serrano 144 28006 Madrid, Spain

More information

Linear and Nonlinear Oblivious Data Hiding

Linear and Nonlinear Oblivious Data Hiding EURASIP Journal on Applied Signal Processing 4:4, c 4 Hindawi Publishing Corporation Linear and Nonlinear Oblivious Data Hiding Litao Gang InfoDesk, Inc., 66 White Plains Road, Tarrytown, NY 59, USA Email:

More information

Double Sided Watermark Embedding and Detection with Perceptual Analysis

Double Sided Watermark Embedding and Detection with Perceptual Analysis DOUBLE SIDED WATERMARK EMBEDDIG AD DETECTIO WITH PERCEPTUAL AALYSIS Double Sided Watermark Embedding and Detection with Perceptual Analysis Jidong Zhong and Shangteng Huang Abstract In our previous work,

More information

Proyecto final de carrera

Proyecto final de carrera UPC-ETSETB Proyecto final de carrera A comparison of scalar and vector quantization of wavelet decomposed images Author : Albane Delos Adviser: Luis Torres 2 P a g e Table of contents Table of figures...

More information

PATTERN RECOGNITION AND MACHINE LEARNING

PATTERN RECOGNITION AND MACHINE LEARNING PATTERN RECOGNITION AND MACHINE LEARNING Slide Set 3: Detection Theory January 2018 Heikki Huttunen heikki.huttunen@tut.fi Department of Signal Processing Tampere University of Technology Detection theory

More information

An Information Theoretic View of Watermark Embedding Detection and Geometric Attacks

An Information Theoretic View of Watermark Embedding Detection and Geometric Attacks An Information Theoretic View of Watermark Embedding Detection and Geometric Attacks Neri Merhav Department of Electrical Engineering Technion - Israel Institute of Technology Technion City, Haifa 32000,

More information

Halftone Image Watermarking by Content Aware Double-sided Embedding Error Diffusion

Halftone Image Watermarking by Content Aware Double-sided Embedding Error Diffusion 1 Halftone Image Watermarking by Content Aware Double-sided Embedding Error Diffusion Yuanfang Guo, Member, IEEE, Oscar C. Au, Fellow, IEEE, Rui Wang, Member, IEEE, Lu Fang, Member, IEEE, Xiaochun Cao,

More information

Detection Theory. Chapter 3. Statistical Decision Theory I. Isael Diaz Oct 26th 2010

Detection Theory. Chapter 3. Statistical Decision Theory I. Isael Diaz Oct 26th 2010 Detection Theory Chapter 3. Statistical Decision Theory I. Isael Diaz Oct 26th 2010 Outline Neyman-Pearson Theorem Detector Performance Irrelevant Data Minimum Probability of Error Bayes Risk Multiple

More information

SIGNAL COMPRESSION. 8. Lossy image compression: Principle of embedding

SIGNAL COMPRESSION. 8. Lossy image compression: Principle of embedding SIGNAL COMPRESSION 8. Lossy image compression: Principle of embedding 8.1 Lossy compression 8.2 Embedded Zerotree Coder 161 8.1 Lossy compression - many degrees of freedom and many viewpoints The fundamental

More information

4038 IEEE TRANSACTIONS ON SIGNAL PROCESSING, VOL. 53, NO. 10, OCTOBER 2005

4038 IEEE TRANSACTIONS ON SIGNAL PROCESSING, VOL. 53, NO. 10, OCTOBER 2005 4038 IEEE TRANSACTIONS ON SIGNAL PROCESSING, VOL. 53, NO. 10, OCTOBER 2005 On Orientation and Anisotropy Estimation for Online Fingerprint Authentication Xudong Jiang, Member, IEEE Abstract Local dominant

More information

Research Article NSCT Domain Additive Watermark Detection Using RAO Hypothesis Test and Cauchy Distribution

Research Article NSCT Domain Additive Watermark Detection Using RAO Hypothesis Test and Cauchy Distribution Mathematical Problems in Engineering Volume 2016, Article ID 4065215, 18 pages http://dx.doi.org/10.1155/2016/4065215 Research Article SCT Domain Additive Watermark Detection Using RAO Hypothesis Test

More information

Steganalysis of Spread Spectrum Data Hiding Exploiting Cover Memory

Steganalysis of Spread Spectrum Data Hiding Exploiting Cover Memory Steganalysis of Spread Spectrum Data Hiding Exploiting Cover Memory Kenneth Sullivan, Upamanyu Madhow, Shivkumar Chandrasekaran, and B.S. Manjunath Department of Electrical and Computer Engineering University

More information

Audio Zero-Watermarking Based on Discrete Hartley Transform and Non-Negative Matrix Factorization

Audio Zero-Watermarking Based on Discrete Hartley Transform and Non-Negative Matrix Factorization IJCSNS International Journal of Computer Science and Networ Security, VOL7 No8, August 207 Audio Zero-Watermaring Based on Discrete Hartley Transform and Non-Negative Matrix Factorization Pranab Kumar

More information

Adaptive Audio Watermarking via the Optimization. Point of View on the Wavelet-Based Entropy

Adaptive Audio Watermarking via the Optimization. Point of View on the Wavelet-Based Entropy Adaptive Audio Watermarking via the Optimization Point of View on the Wavelet-Based Entropy Shuo-Tsung Chen, Huang-Nan Huang 1 and Chur-Jen Chen Department of Mathematics, Tunghai University, Taichung

More information

Likelihood Ratio-Based Biometric Verification

Likelihood Ratio-Based Biometric Verification Likelihood Ratio-Based Biometric Verification Asker M. Bazen and Raymond N.J. Veldhuis University of Twente, Department of Electrical Engineering, Laboratory of Signals and Systems, P.O. box 27, 75 AE

More information

Wavelet Decomposition in Laplacian Pyramid for Image Fusion

Wavelet Decomposition in Laplacian Pyramid for Image Fusion International Journal of Signal Processing Systems Vol. 4, No., February 06 Wavelet Decomposition in Laplacian Pyramid for Image Fusion I. S. Wahyuni Laboratory Lei, University of Burgundy, Dijon, France

More information

TCQ PRACTICAL EVALUATION IN THE HYPER-CUBE WATERMARKING FRAMEWORK. 161, rue Ada, Montpellier cedex 05, France contact:

TCQ PRACTICAL EVALUATION IN THE HYPER-CUBE WATERMARKING FRAMEWORK. 161, rue Ada, Montpellier cedex 05, France contact: TCQ PRACTICAL EVALUATION IN THE HYPER-CUBE WATERMARKING FRAMEWORK Marc CHAUMONT 1,2 and Dalila GOUDIA 2 1 University of Nîmes, Place Gabriel Péri, 30000 Nîmes, France 2 Laboratory LIRMM, UMR CNRS 5506,

More information

The New Graphic Description of the Haar Wavelet Transform

The New Graphic Description of the Haar Wavelet Transform he New Graphic Description of the Haar Wavelet ransform Piotr Porwik and Agnieszka Lisowska Institute of Informatics, Silesian University, ul.b dzi ska 39, 4-00 Sosnowiec, Poland porwik@us.edu.pl Institute

More information

New wrinkle in dirty paper techniques

New wrinkle in dirty paper techniques New wrinkle in dirty paper techniques Brett Bradley, John Stach Digimarc Corporation, 19801 SW 72 nd Ave, Suite 250, Tualatin, OR, USA 97062 ABSTRACT The many recent publications that focus upon watermarking

More information

A NEW BASIS SELECTION PARADIGM FOR WAVELET PACKET IMAGE CODING

A NEW BASIS SELECTION PARADIGM FOR WAVELET PACKET IMAGE CODING A NEW BASIS SELECTION PARADIGM FOR WAVELET PACKET IMAGE CODING Nasir M. Rajpoot, Roland G. Wilson, François G. Meyer, Ronald R. Coifman Corresponding Author: nasir@dcs.warwick.ac.uk ABSTRACT In this paper,

More information

Adaptive Binary Integration CFAR Processing for Secondary Surveillance Radar *

Adaptive Binary Integration CFAR Processing for Secondary Surveillance Radar * BULGARIAN ACADEMY OF SCIENCES CYBERNETICS AND INFORMATION TECHNOLOGIES Volume 9, No Sofia 2009 Adaptive Binary Integration CFAR Processing for Secondary Surveillance Radar Ivan Garvanov, Christo Kabakchiev

More information

1. INTRODUCTION. Yen-Chung Chiu. Wen-Hsiang Tsai.

1. INTRODUCTION. Yen-Chung Chiu. Wen-Hsiang Tsai. Copyright Protection by Watermarking for Color Images against Rotation and Scaling Attacks Using Coding and Synchronization of Peak Locations in DFT Domain Yen-Chung Chiu Department of Computer and Information

More information

MMSE DECODING FOR ANALOG JOINT SOURCE CHANNEL CODING USING MONTE CARLO IMPORTANCE SAMPLING

MMSE DECODING FOR ANALOG JOINT SOURCE CHANNEL CODING USING MONTE CARLO IMPORTANCE SAMPLING MMSE DECODING FOR ANALOG JOINT SOURCE CHANNEL CODING USING MONTE CARLO IMPORTANCE SAMPLING Yichuan Hu (), Javier Garcia-Frias () () Dept. of Elec. and Comp. Engineering University of Delaware Newark, DE

More information

Image Denoising using Uniform Curvelet Transform and Complex Gaussian Scale Mixture

Image Denoising using Uniform Curvelet Transform and Complex Gaussian Scale Mixture EE 5359 Multimedia Processing Project Report Image Denoising using Uniform Curvelet Transform and Complex Gaussian Scale Mixture By An Vo ISTRUCTOR: Dr. K. R. Rao Summer 008 Image Denoising using Uniform

More information

Modeling Multiscale Differential Pixel Statistics

Modeling Multiscale Differential Pixel Statistics Modeling Multiscale Differential Pixel Statistics David Odom a and Peyman Milanfar a a Electrical Engineering Department, University of California, Santa Cruz CA. 95064 USA ABSTRACT The statistics of natural

More information

Lecture 7. Union bound for reducing M-ary to binary hypothesis testing

Lecture 7. Union bound for reducing M-ary to binary hypothesis testing Lecture 7 Agenda for the lecture M-ary hypothesis testing and the MAP rule Union bound for reducing M-ary to binary hypothesis testing Introduction of the channel coding problem 7.1 M-ary hypothesis testing

More information

If you wish to cite this paper, please use the following reference:

If you wish to cite this paper, please use the following reference: This is an accepted version of a paper published in Proceedings of the st IEEE International Workshop on Information Forensics and Security (WIFS 2009). If you wish to cite this paper, please use the following

More information

Digital Image Processing Lectures 25 & 26

Digital Image Processing Lectures 25 & 26 Lectures 25 & 26, Professor Department of Electrical and Computer Engineering Colorado State University Spring 2015 Area 4: Image Encoding and Compression Goal: To exploit the redundancies in the image

More information

A WAVELET BASED CODING SCHEME VIA ATOMIC APPROXIMATION AND ADAPTIVE SAMPLING OF THE LOWEST FREQUENCY BAND

A WAVELET BASED CODING SCHEME VIA ATOMIC APPROXIMATION AND ADAPTIVE SAMPLING OF THE LOWEST FREQUENCY BAND A WAVELET BASED CODING SCHEME VIA ATOMIC APPROXIMATION AND ADAPTIVE SAMPLING OF THE LOWEST FREQUENCY BAND V. Bruni, D. Vitulano Istituto per le Applicazioni del Calcolo M. Picone, C. N. R. Viale del Policlinico

More information

Detection theory 101 ELEC-E5410 Signal Processing for Communications

Detection theory 101 ELEC-E5410 Signal Processing for Communications Detection theory 101 ELEC-E5410 Signal Processing for Communications Binary hypothesis testing Null hypothesis H 0 : e.g. noise only Alternative hypothesis H 1 : signal + noise p(x;h 0 ) γ p(x;h 1 ) Trade-off

More information

Multimedia Systems Giorgio Leonardi A.A Lecture 4 -> 6 : Quantization

Multimedia Systems Giorgio Leonardi A.A Lecture 4 -> 6 : Quantization Multimedia Systems Giorgio Leonardi A.A.2014-2015 Lecture 4 -> 6 : Quantization Overview Course page (D.I.R.): https://disit.dir.unipmn.it/course/view.php?id=639 Consulting: Office hours by appointment:

More information

Lecture 5. Ideal and Almost-Ideal SG.

Lecture 5. Ideal and Almost-Ideal SG. Lecture 5. Ideal and Almost-Ideal SG. Definition. SG is called ideal (perfect or unconditionally undetectable ISG),if its detection is equivalently to random guessing of this fact even with the use of

More information

Aruna Bhat Research Scholar, Department of Electrical Engineering, IIT Delhi, India

Aruna Bhat Research Scholar, Department of Electrical Engineering, IIT Delhi, India International Journal of Scientific Research in Computer Science, Engineering and Information Technology 2017 IJSRCSEIT Volume 2 Issue 6 ISSN : 2456-3307 Robust Face Recognition System using Non Additive

More information

Research Article Biometric Quantization through Detection Rate Optimized Bit Allocation

Research Article Biometric Quantization through Detection Rate Optimized Bit Allocation Hindawi Publishing Corporation EURASIP Journal on Advances in Signal Processing Volume 9, Article ID 78484, 6 pages doi:.55/9/78484 Research Article Biometric Quantization through Detection Rate Optimized

More information

Quantization 2.1 QUANTIZATION AND THE SOURCE ENCODER

Quantization 2.1 QUANTIZATION AND THE SOURCE ENCODER 2 Quantization After the introduction to image and video compression presented in Chapter 1, we now address several fundamental aspects of image and video compression in the remaining chapters of Section

More information

ACTIVE CONTENT FINGERPRINTING: SHRINKAGE AND LATTICE BASED MODULATIONS

ACTIVE CONTENT FINGERPRINTING: SHRINKAGE AND LATTICE BASED MODULATIONS ACTIVE CONTENT FINGERPRINTING: SHRINKAGE AND ATTICE BASED MODUATIONS Farzad Farhadzadeh, Sviatoslav Voloshynovskiy, Taras Holotyak and Fokko Beekhof University of Geneva Computer Science Department 7,

More information

STATISTICAL DETECTION OF INFORMATION HIDING BASED ON ADJACENT PIXELS DIFFERENCE

STATISTICAL DETECTION OF INFORMATION HIDING BASED ON ADJACENT PIXELS DIFFERENCE 2th European Signal Processing Conference EUSIPCO 22) Bucharest, Romania, August 27-3, 22 STATISTICAL DETECTION OF INFORMATION HIDING BASED ON ADJACENT PIXELS DIFFERENCE Rémi Cogranne, Cathel Zitzmann,

More information

C.M. Liu Perceptual Signal Processing Lab College of Computer Science National Chiao-Tung University

C.M. Liu Perceptual Signal Processing Lab College of Computer Science National Chiao-Tung University Quantization C.M. Liu Perceptual Signal Processing Lab College of Computer Science National Chiao-Tung University http://www.csie.nctu.edu.tw/~cmliu/courses/compression/ Office: EC538 (03)5731877 cmliu@cs.nctu.edu.tw

More information

Lecture 2: Introduction to Audio, Video & Image Coding Techniques (I) -- Fundaments

Lecture 2: Introduction to Audio, Video & Image Coding Techniques (I) -- Fundaments Lecture 2: Introduction to Audio, Video & Image Coding Techniques (I) -- Fundaments Dr. Jian Zhang Conjoint Associate Professor NICTA & CSE UNSW COMP9519 Multimedia Systems S2 2006 jzhang@cse.unsw.edu.au

More information

Expectation Maximization

Expectation Maximization Expectation Maximization Bishop PRML Ch. 9 Alireza Ghane c Ghane/Mori 4 6 8 4 6 8 4 6 8 4 6 8 5 5 5 5 5 5 4 6 8 4 4 6 8 4 5 5 5 5 5 5 µ, Σ) α f Learningscale is slightly Parameters is slightly larger larger

More information