Invariant Image Watermark Using Zernike Moments

Size: px
Start display at page:

Download "Invariant Image Watermark Using Zernike Moments"

Transcription

1 766 IEEE TRANSACTIONS ON CIRCUITS AND SYSTEMS FOR VIDEO TECHNOLOGY, VOL. 13, NO. 8, AUGUST 2003 Invariant Image Watermark Using Zernike Moments Hyung Shin Kim and Heung-Kyu Lee, Member, IEEE Abstract This paper introduces a robust image watermark based on an invariant image feature vector. Normalized Zernike moments of an image are used as the vector. The watermark is generated by modifying the vector. Watermark signal is designed with Zernike moments. The signal is added to the cover image in the spatial domain after the reconstruction process. We extract the feature vector from the modified image and use it as the watermark. The watermark is detected by comparing the computed Zernike moments of the test image and the given watermark vector. Rotation invariance is achieved by taking the magnitude of the Zernike moments. Image normalization method is used for scale and translation invariance. The robustness of the proposed method is demonstrated and tested by using Stirmark 3.1. The test results show that our watermark is robust with respect to the geometrical distortions and compression. Index Terms Feature extraction, geometrical attack robustness, watermark, Zernike moment. I. INTRODUCTION THE DIGITAL watermark is a signal added to digital data that can be detected or extracted later to make an assertion about the data. After its earlier proposal as a method for copyright protection, it has drawn significant attention from many researchers and there has been a very intensive research in this area [1], [2]. Many different watermarks for still images and video contents are vulnerable to small amount of geometrical distortions [3]. This problem is most pronounced when the original image is not available to the detector. Hence, the designing a watermark resistant to geometrical distortions is remained as an open problem. Since the recognition of the need for watermarking schemes resilient to geometric distortion, many research results were reported [4] [6], [8]. Most of them are based on the shift-invariant property of the Fourier transform. Among various approaches, invariant watermark has advantages compared to the others. The invariant watermark schemes are based on a strong mathematical theory. As such, watermarking methods belong to this class will have provable invariance as well as empirical results. Also, there is more potential to design reliable system using the relevant mathematical theories. The invariant watermark which is robust against rotation, scale, and translation (RST) was first reported in [8]. They used the Fourier Mellin transform for their watermark. It is an Manuscript received December 16, 2002; revised March 13, This work was supported by the Korea Science and Engineering Foundation (KOSEF) through the Advanced Information Technology Research Center (AITrc). The authors are with the Department of Electrical Engineering and Computer Science, Korea Advanced Institute of Science and Technology (KAIST), Daejon , Korea ( hskim@casaturn.kaist.ac.kr). Digital Object Identifier /TCSVT integral invariant. Shift invariance is achieved from the translation invariant property of magnitude of the Fourier coefficients. For scale and rotation invariance, they take the Fourier magnitude spectrum of the log-polar mapped Fourier magnitude of the image. This procedure is equivalent to the Fourier-Mellin transform. By doing that, a scale and a rotation are converted into a translation which is invariant after another Fourier transform. The work by [9] is also based on the Fourier Mellin transforms. Most of the methods using the Fourier Mellin transform suffer severe implementation difficulty. It is mainly due to interpolation error by the log-polar and inverse log-polar mapping during embedding and detection procedure. The nonuniform sampling grid of the log-polar mapping also causes aliasing. Watermarking algorithms using a feature of an image were proposed in [6], [7]. Moments and invariant functions of moments have been extensively used for invariant feature extraction in a wide range of two- and three-dimensional pattern recognition applications [10] [14]. Hu [15] derived seven moment invariants which are RST invariant from the regular moments. The same invariants were used for watermark in [16]. They adopted Hu s moment invariant functions and used them as the watermark. They embed the watermark by modifying the moment values of the image. In their implementation, they had to do an exhausted search to determine the embedding strength. They could not embed watermark systematically. Of various types of moments defined in the literature, Zernike moments have been shown to be superior to the others in terms of their insensitivity to image noise, information content, and ability to provide faithful image representation [17]. Recently, a Zernike moment was used as the invariant watermark in [19]. Image is subdivided into co-centric rings and a watermark signal is modulated into the Zernike moments of each ring. The watermarked image is achieved by reconstructing the image from the modulated moments of the segmented subimages. However, the reconstruction procedure is computationally expensive and there is severe fidelity loss during the process. Hence, we question their performance. Another problem in [19] is that authors have shown only the rotation invariance; they did not mention the scale and translation and other possible distortions. Scale and translation invariance can be achieved by preprocessing the image to a standard image. Image normalization technique has been used for invariant pattern recognition [20]. Once an image is translated to its centroid and scaled to a standard size, we can achieve the invariance against scale and translation. A generalized approach to correct geometric distortion for watermarking schemes using normalization is proposed in [21] and [22]. The image is translated and scaled to a standard size /03$ IEEE

2 KIM AND LEE: INVARIANT IMAGE WATERMARK USING ZERNIKE MOMENTS 767 Fig. 1. Reconstruction of letter A. From left to right:original image, reconstructed image with order =5, 15, 20, 30. prior watermark embedding and the watermarked image is inverse transformed to its original form for distribution. At the detector, the test image is transformed to the same standard image and embedded signal can be successfully recovered. A scheme of image representation by the moduli of Zernike moments of image appropriately normalized by means of loworder regular moments was studied by Khotanzad and Hong [18] and shown to yield superior results to other moment-based methods in an invariant character recognition task. We, therefore, adopt this scheme for our watermark. In this paper, we propose a new invariant watermark based on Zernike moment. We achieved the rotational invariance from the property of the Zernike moment and scale and translation invariance by normalization. Hence, we follow the procedures suggested in [18]. Our method is different from [19] in that we embed the watermark by directly adding orthogonal patterns to the spatial domain rather than to the Zernike moment. Hence, our method will not suffer the fidelity degradation. Also, our method is RST-invariant while the method in [19] is rotation invariant only. This paper is organized as follows. In Section II, we describe about the Zernike moments and their properties. In Section III, we present our embedding and detection algorithms. In Section IV, we show the experimental results. In Section V, we discuss some of the issues regarding to our method, and in Section VI, conclusions are drawn. II. BACKGROUNDS In this section, we describe Zernike moments and their properties. We explain how we achieve the RST invariance using them. Some of the implementation issues are discussed. Zernike moments have been investigated by Perantonis and Lisboa [23] and by Khotanzad and Lu [24] among others. Some of the materials in the following are based on [18] and [24]. A. Zernike Moment The Zernike moments [25] of order with repetition for a continuous image function that vanishes outside the unit circle are where a nonnegative integer and an integer such that is nonnegative and even. The complex-valued functions are defined by (1) (2) where and represent polar coordinates over the unit disk and are polynomials of (Zernike polynomials) given by. These polynomials are or- Note that thogonal and satisfy with (3) a b otherwise For a digital image, the integrals are replaced by summations. To compute the Zernike moments of a given image, the center of the image is taken as the origin and pixel coordinates are mapped to the range of the unit circle. Those pixels falling outside the unit circle are not used in the computation. Note that. Suppose that one knows all moments of up to a given order. A discretized original image function whose moments are those of up to the given order can be computed. By orthogonality of the Zernike basis, we can reconstruct as Note that as approaches infinity, will approach. The reconstruction process is illustrated in Fig. 1 for a binary image of letter. The reconstructed binary images are generated by using (5) followed by mapping to [0, 255] range. It shows that lower order moments capture gross shape information and high frequency details are filled in by higher order moments. In this example, orders 2 30 are used. Order 0 and 1 are omitted, as they are independent to the image feature after normalization. B. Invariance of Normalized Zernike Moment Consider a rotation of the image through angle. If the rotated image is denoted by, the relationship between the original and rotated images in the same polar coordinate is (4) (5) (6)

3 768 IEEE TRANSACTIONS ON CIRCUITS AND SYSTEMS FOR VIDEO TECHNOLOGY, VOL. 13, NO. 8, AUGUST 2003 Fig. 2. Watermark detection. It can be shown that the Zernike moments image become [18], [24], of the rotated Equation (7) shows that each Zernike moment acquires a phase shift on rotation. Thus,, the magnitude of the Zernike moment, can be used as a rotation-invariant feature of the image. Scale and translation invariance can be achieved by utilizing the image normalization technique as shown in [21], [22]. An image function can be normalized with respect to scale and translation by transforming it into, where with (, ) being the centroid of and, with a predetermined value and its zero-order moment. Hence, we first move the origin of the image into the centroid and scale it to a standard size. If we compute the Zernike moments of the image, then the magnitudes of the moments are RST invariant. III. ALGORITHM As the magnitudes of Zernike moments are RST invariant after proper normalization, we use them as the watermark. The watermark signal is embedded in the spatial intensity domain after reconstruction of the chosen watermark vector consisting of Zernike moments. Embedding strength is controlled by an iterative feature modification and verification procedure. This procedure avoids the implementation errors that can occur during insertion and detection of the watermark. At the detector, the Zernike feature vector is estimated from the test image and the similarity between the vector and the watermark vector is computed. We use root-mean-square-error (rmse) as our similarity measure instead of the traditional normalized correlation because the feature vectors are not white and the correlation measure can not produce peak value when they are same vectors. Hence, we measure the distance between two vectors using rmse function. If the rmse value is smaller than the threshold, the watermark is detected. The original image is not required at the detector. We define the detector first and an iterative embedder is designed using the detector. (7) (8) A. Watermark Detection Fig. 2 shows the detection procedure. The detector takes a test image and normalize it into a standard image as (8) for scale and translation compensation. Zernike moments of the normalize image are computed. A feature vector is constructed with the Zernike moments of the test image as, where is the length of the feature vector and is on the order of Zernike moments. The similarity defined with rmse between the extracted vector and the watermark as follows: If is smaller than the detection threshold, the watermark is detected. Note that the moments and are not included in the feature vector construction. Those moments are modified to have known values during the normalization procedure. B. Watermark Insertion As we use the Zernike feature vector as the watermark, we try to modify the Zernike moments of the input image. Though watermark signal can be inserted into the Zernike moments of cover image, we have found that this approach causes severe implementation difficulty. After modifying the Zernike moments of the input image, we have to reconstruct watermarked image using (5). However, as we mentioned before, the reconstructed image cannot be the anticipated, and instead we get. The reconstruction procedure requires Zernike moments with high order and this leads to a heavy computation load. We have tried to reconstruct 256 level gray images and we could hardly recognize the images reconstructed from Zernike moments even with order. Also, it was very time consuming. Hence, we believe that it is not feasible to embed the watermark by modifying the Zernike moments of the input image directly. A watermark signal can be directly added into the intensity of the image using the Zernike polynomials. If we try to modify of the original image by, then we can compute the contri- (9)

4 KIM AND LEE: INVARIANT IMAGE WATERMARK USING ZERNIKE MOMENTS 769 bution of the modification as intensity pixel values by the reconstruction equation. The contribution can be shown as with k m n k m l otherwise (10) As,, the distortion added to the original image is bounded as, which means by adjusting, we can exactly control the maximum pixel distortion to the images. Note that for modification of, we also have to change to have real valued intensity after the reconstruction process. We simply add the reconstructed intensity watermark signal into the cover image to achieve the watermarked image for distribution. Ideally, the added signal affects only and the value becomes For all,. Hence, we can modify the Zernike feature vector of the image by adding the reconstructed watermark signal in spatial domain. In some watermarking methods, we may not be able to extract the exact embedded signal at the detector. As reported in previous research ([8] and [9]), there are situations when the estimated signal at the detector is different from the embedded signal in its nature. Embedding functions without exact inverse function or discrete nature of the implementation can be the reasons. In [9], the authors have provided approximation methods to reduce the effects of these errors. Instead of using a similar method, we approach this problem differently. As we have proposed in [7], we use the iterative embedding method. Let the feature vector of the cover image be. After embedding, we intended the feature vector of the watermarked image to be. However, at the detector we get instead of. Hence, after embedding the watermark signal, we apply the feature extractor from this watermarked image and use the extracted feature as the embedded watermark instead of the initially modified feature vector. In this way, we can avoid the inversion errors. However, to guarantee the uniqueness of the watermark and its perceptual invisibility after insertion, we need a validation procedure to use as a watermark. We empirically measure the maximum noise level resulting from geometric distortions with the detector response as follows: (13) where is the feature vector of an image and is the feature vector of the image after RST distortions. We should adjust the embedding strength so that the distance between the two features from the unmarked and the marked image show a higher value than. However, the embedding strength cannot be higher than, which defines the minimum distance between features of the images and (14) (11) By the orthogonal property of the Zernike moment as in (4), we have (12) where and are the feature vectors of different images. We preset and values empirically. With varying the embedding parameters, it is checked if. If this condition is satisfied and the embedded signal is unobtrusive, is accepted as a watermark. We repeat this validation procedure until we get the right result. In this way, we can embed the watermark without exact inversion of the modified signal. From the above observations, we can design the embedding procedure. Fig. 3 shows the whole insertion procedure. The watermark signal to be embedded is defined as follows: if otherwise (15) where are the embedding locations and the locations of the nonzero Zernike moments. We reconstruct the intensity domain representation of as (5) and get. The watermarked image is achieved by adding to the cover image. We extract the watermark to be used for detection by extracting the Zernike moments of after normalization. Then we validate the watermark iteratively until it meets.

5 770 IEEE TRANSACTIONS ON CIRCUITS AND SYSTEMS FOR VIDEO TECHNOLOGY, VOL. 13, NO. 8, AUGUST 2003 Fig. 3. Watermark insertion. Fig. 4 shows insertion and detection example with Lena image. We have embedded a watermark signal with and. Fig. 4 shows the watermarked Lena image. The measured PSNR is db and inserted noise is invisible. The reconstructed is shown in Fig. 4. We took the absolute values of and equalized them for better display. Fig. 4(c) shows the histogram of. The added noise is well spread around the zero value, which we have anticipated from (10). Those two orthogonal complex polynomials selected for embedding is shown in Fig. 4(d). We have displayed the real part only. Fig. 5 shows the detected watermark at the detector. We can see the peaks at and. Note that although the detection looks perfect, there are little peaks around the intended moments. Those unwanted peaks are due to the discrete implementation of the procedure as analyzed in [26]. IV. EXPERIMENTAL RESULTS Experiments are performed with 50 images from the Corel image library [27]. For valid watermark generation, and are determined empirically using unwatermarked images. The similarity is measured between unmarked test images and the smallest is chosen for. For the test we use. For the determination of, robustness of the defined feature vector is tested. Similarity is measured between the original image and attacked images. The largest is chosen for. Fig. 6 shows the variation of the feature vector after rotation, scale, random geometric attack, and JPEG compression, respectively. From these graphs, we set. Zernike moments are modified with controlling so that the fidelity of the watermarked image remains over PSNR 36 db. Embedding location is determined randomly excluding, which are the independent terms. We embedded at two or three locations out of ten Zernike moments which are computed with order. is used for the detection threshold. Two experiments are performed to demonstrate robustness. Using images of Lena, Mandrill, and Fishingboat, the watermark detection ratio is measured for each class of attack generated by Stirmark benchmark software. The second experiment is performed to estimate the false positive and negative probability with 50 images from the Corel image library. Table I shows the watermark detection ratio compared to other published results. The ratio of 1 means 100% detection success and 0 means the complete detection failure. Our method shows good performance against scaling, rotation, and JPEG compression. Detection failure was found when we scale the image down to 50%. This is due to the large amount of interpolation errors during normalization. Rotation with large angle causes more detection failures than with small angles. This can be anticipated as larger portion of the image is cut out after the large angel rotation and crop operation. As our watermark is using a global feature of the image, our method shows strong resilience to random geometric distortion. The false positive probability and false negative probability is measured with 50 unmarked images and 50 marked images. For each watermarked image, StirMark generates attacked images. In this experiment, we used only two attacked images for each watermarked image that makes 100 attacked images. We measure the empirical probability density function (pdf) of the computed with histogram. Though we do not know the exact distribution of, we approximate the empirical pdf of to the Gaussian distribution to show rough estimation of the robustness. and can be computed using the estimates of mean and variance. Random geometric attack performance is the worst with and. It shows that our method performs well over

6 KIM AND LEE: INVARIANT IMAGE WATERMARK USING ZERNIKE MOMENTS 771 (c) (d) Fig. 4. Watermark insertion and detection in Lena image. Watermarked Lena image. Reconstruced ^g(x; y). (c) Histogram of ^g(x; y). (d) Added polynomials. A. Rotation Fig. 7 shows the histogram of and ROC curve after rotation by 1 and 30. Different from other invariants, we do not need to shift the computed vector as Zernike moment is rotationally invariant. The performance of rotation by a large angle is poor because we used the rotation-and-crop option for attack. With, is and is. False negative probability shows better performance than false positive probability in this attack. This is because the pdf of the similarity between unmarked images and watermarks has relatively large variance that resulted into the larger false positive probability. B. Scaling Fig. 5. Detected watermark. the intended attacks. The similarity histograms and receiver operating characteristic (ROC) curves ( versus for several thresholds) are produced for analysis. In this section, four attacks are examined: rotation, scaling, random geometric distortion, and compression. The detection histogram was measured using 75% scaled down images and 150% scaled up images. As the histogram in Fig. 8 shows, the watermarked images show strong resistance to scaling attack. The ROC curve shows that is and is. These values are relatively lower than the other attacks, which means that our method performs well with scaling attacks.

7 772 IEEE TRANSACTIONS ON CIRCUITS AND SYSTEMS FOR VIDEO TECHNOLOGY, VOL. 13, NO. 8, AUGUST 2003 Fig. 6. (c) (d) Histogram of s between features from original and attacked unmarked images. Rotation (1.0, 30.0 ). Scaling (20:75; 21:4). (c) Compression (Q =30; 70): (d) Random geometric attack. TABLE I STIRMARK TEST RESULTS COMPARED TO OTHER METHODS C. Random Geometric Distortion This attack simulates the print-and-scanning process of images. It applies a minor geometric distortion by an unnoticeable random amount in stretching, shearing, and/or rotating an image [3]. In Fig. 9, the histogram shows large variance in the similarity between the watermark and unmarked image. As a result, is and is, which are relatively large compared with others. Not many previous methods survive this attack and our algorithm works well even with those numbers. D. Compression JPEG compression with Q and 70 was applied after watermark embedding. With Q, the watermarked image fidelity is unacceptable. However, our method survives the

8 KIM AND LEE: INVARIANT IMAGE WATERMARK USING ZERNIKE MOMENTS 773 Fig. 7. Robustness: Rotation 1, 30. Histogram of s. ROC curve. Fig. 8. Robustness: Scale 75%, 150%. Histogram of s. ROC curve. harsh compression attack. Fig. 10 shows the histogram and ROC curve. is and is. These numbers show that our method has strong resilience to JPEG compression. V. DISCUSSIONS A. Implementation Errors Due to the discretization error, perfect invariance cannot be achieved during implementation. There are two error sources in computation of Zernike moments of discrete images. The first is the geometric error that occurs due to the fact that the area used for the moment calculation, the summation of the square pixels, is not equal to the area of the unit disk. The second source of the errors is the numerical error caused by the fact that during the computation of the moment, there are points whose values are not initially given. In this situation, we have to interpolate the value according to a known interpolation methods which introduce errors. These errors can be reduced by using pseudo- Zernike moments [17] instead of standard Zernike moments or various interpolation methods [26], [28]. B. Complexity Analysis It takes about 5 min to compute the Zernike moments of gray image with. We have implemented our algorithm using Matlab on a Pentium 1.5-GHz PC. With,we compute the first nine moments of the image. The most time consuming part is in the computation of Zernike polynomial. There are four factorial operation to compute one value which is dependent on the order and repetition variables. If we want to have more moments for better reconstruction and watermark capacity, we need to increase the order and repetition values. This leads to a heavy computational load. This problem can be improved by using the table lookup method. We compute the value once and store it in a table. Whenever is called, we simply look up the table and return the

9 774 IEEE TRANSACTIONS ON CIRCUITS AND SYSTEMS FOR VIDEO TECHNOLOGY, VOL. 13, NO. 8, AUGUST 2003 Fig. 9. Robustness: Random geometric distortion. Histogram of s. ROC curve. Fig. 10. Robustness: JPEG Compression Q = 30 and 70. Histogram of s. ROC curve. value immediately. With this method, it takes about 1 min for embedding procedure. C. Capacity Current implementation works for zero-bit watermarks. With simple modification, we can embed more bits. After the iterative procedure to generate the valid watermarks, we can construct a code book such as a dirty-paper code [29]. Information is assigned to each valid watermark code during embedding. At the detector, the code book is implemented within the detector. During detection, the detector compares extracted feature with the vectors registered in the code book. When a measured similarity value reaches a previously determined threshold, it shows the assigned information from the code book. D. Embedding Without Exact Inversion If an embedding function does not have exact inversion function, the resulting watermarked image will be distorted. This distortion reduces the image fidelity and watermark signal strength. As argued in [9], having exact inversion is not the necessary condition for the embedding function. Two approaches can be considered. One method is defining a set of invertible vectors and works only with those vectors during embedding procedure. Though the embedding space is reduced, exact inversion is possible. Another approach is to use a conversion function that maps the embedded watermark and the extracted vector. Our approach belongs to this category. At the detector, after estimation of watermark, this signal is mapped into the inserted watermark using the conversion function. VI. CONCLUSION We propose a new RST-invariant watermarking method based on algebraic invariants. Zernike moments are used for the invariant watermark. With the combination of normalization, we have achieved RST invariance. Novel watermark embedding

10 KIM AND LEE: INVARIANT IMAGE WATERMARK USING ZERNIKE MOMENTS 775 and detection algorithms which can reduce the implementation errors are proposed. The watermark is embedded by modifying the Zernike feature vector of the original image. The watermark is generated during embedding procedure after iterative validation procedure. We have shown a mathematical description about the invariance property and have also performed simulation. The results show that our method is robust against geometric distortion and compression, as intended. REFERENCES [1] I. J. Cox and M. L. Miller, Eletronic watermarking: the first 50 years, in Proc. IEEE Int. Workshop Multimedia Signal Processing, 2001, pp [2] F. Hartung and M. Kutter, Multimedia watermarking technique, Proc. IEEE, vol. 87, pp , July [3] F. A. P. Petitcolas, R. J. Anderson, and M. G. Kuhn, Attacks on copyright marking systems, in Proc. 2nd Int. Workshop Information Hiding, 1998, pp [4] S. Pereira and T. Pun, Robust template matching for affine resistant image watermarksi, IEEE Trans. Image Processing, vol. 9, pp , July [5] M. Kutter, Watermarking resisting to translation, rotation, and scaling, in Proc. SPIE Multimedia Systems Applications, 1998, pp [6] M. Kutter, S. K. Bhattacharjee, and T. Ebrahimi, Toward second generation watermarking schemes, in Proc. IEEE Int. Conf. Image Processing, 1999, pp [7] H. S. Kim, Y. Baek, and H. K. Lee, Rotation-, scale-, and translationinvariant image watermark using higher order spectra, Opt. Eng., vol. 42, no. 2, pp , Feb [8] J. J. K. O Ruanaidh and T. Pun, Rotation, scale, and translation invariant spread spectrum digital image watermarking, Signal Processing, vol. 66, pp , [9] C. Y. Lin, M. Wu, J. A. Bloom, I. J. Cox, M. L. Miller, and Y. M. Lui, Rotation, scale, and translation resilient watermarking for images, IEEE Trans. Image Processing, vol. 10, pp , May [10] B. A. Dudani, K. J. Breeding, and R. B. McGhee, Aircraft identification by moment invariants, IEEE Trans. Comput., vol. C-26, pp , [11] S. S. Reddi, Radial and angular moment invariants for image identification, IEEE Trans. Pattern. Anal. Machine Intell., vol. PAMI-3, pp , [12] Y. S. Abu-Mostafa and D. Psaltis, Image normalization by complex moments, IEEE Trans. Pattern. Anal. Machine Intell., vol. PAMI-7, pp , [13] A. P. Reeves, R. J. Prokop, S. E. Andrews, and F. P. Kuhl, Three dimensional shape analysis using moment and Fourier descriptors, IEEE Trans. Pattern. Anal. Machine Intell., vol. 10, pp , [14] J. Wood, Invariant pattern recognition: a review, Pattern Recognit., vol. 29, no. 1, pp. 1 17, [15] M. K. Hu, Visual pattern recognition by moment invariants, IEEE Trans. Inform. Theory, vol. 8, pp , [16] M. Alghoniemy and A. H. Tewfik, Image watermarking by moment invariant, in Proc. IEEE Int. Conf. Image Processing, 2000, pp [17] C. H. Teh and R. T. Chin, On image analysis by the methods of moments, IEEE Trans. Pattern Anal. Machine Intell., vol. 10, pp , Apr [18] A. Khotanzad and Y. H. Hong, Invariant image recognition by Zernike moments, IEEE Trans. Pattern Anal. Machine Intell., vol. 12, pp , May [19] M. Farzam and S.Shahram Shirani, A robust multimedia watermarking technique using Zernike transform, in Proc. IEEE Int. Workshop Multimedia Signal Processing, 2001, pp [20] J. Leu, Shape normalization through compacting, Pattern Recognit. Lett., vol. 10, pp , [21] M. Alghoniemy and A. H. Tewfik, Geometric distortion correction through image normalization, in Proc. IEEE Int. Conf. Multimedia and Expo, 2000, pp [22] P. Dong and N. P. Galatsanos, Affine transform resistant watermarking based on image normalization, in Proc. IEEE Int. Conf. Image Processing, 2002, pp [23] S. J. Perantonis and P. J. G. Lisboa, Translation, rotation, and scale invariant pattern recognition by high-order neural networks and moment classifiers, IEEE Trans. Neural Networks, vol. 3, pp , [24] A. Khotanzad and J. H. Lu, Classification of invariant image representations using a neural network, IEEE Trans. Acoust., Speech, Signal Processing, vol. 38, pp , [25] F. Zernike, Beugungstheorie des schneidenverfahrens und seiner verbesserten form, der phasenkontrastmethode, Physica, vol. 1, pp , [26] S. X. Liao and M. Pawlak, On the accuracy of Zernike moments for image analysis, IEEE Trans. Pattern Anal. Machine Intell., vol. 20, pp , Dec [27] Corel Corporation, Corel Stock Photo Library 3. [28] J. Altmann, On the digital implementation of the rotation-invariant Fourier-Mellin transform, J. Inform. Process. Cybern., vol. EIK 28, no. 1, pp , [29] M. L. Miller, Watermarking with dirty-paper codes, in Proc. IEEE Int. Conf. Image Processing, 1999, pp Hyung Shin Kim received the B.S. and Ph. D. degrees in computer science from Korea Advanced Institute of Science and Technology (KAIST), Daejon, in 1990 and 2003, respectively, and the M.S. degree in satellite communication engineering from the University of Surrey, Guildford, U.K., in From 1992 to 2001, he was with the Satellite Technology Research Center (SaTReC), KAIST, as a Senior Researcher. At SaTReC, he worked on real-time operating system and on-board computer systems. From 1998 to 2000, he was the Project Manager for the development of a small satellite, KAISTSAT-1. Since joining the Real-Time Computing Laboratory at KAIST in 1994, his research has shifted to problems in multimedia signal processing and digital contents right management. His research interests include information hiding, multimedia security, and pattern recognition. Heung-Kyu Lee received the B.S. degree in electronics engineering from the Seoul National University, Seoul, Korea, in 1978, and the M.S. and Ph.D. degrees in computer science from the Korea Advanced Institute of Science and Technology (KAIST), Daejon, in 1981 and 1984, respectively. From 1984 to 1985, he served as a Research Scientist at the University of Michigan, Ann Arbor. Since 1986, he has been a Professor with the Department of Computer Science, KAIST. He is currently also a Director of the Digital Right Management (DRM) forum in Korea, a Committee Chairman of the Secure Digital Contents Association (SEDICA) in Korea, and Vice Director of the AITRC center in KAIST. He was a Director of the Korean Society of Remote Sensing. His major interests are digital watermarking, real-time processing, and image processing. He is an author/coauthor of more than 120 journal and conference proceedings papers in his research areas. Dr. Lee has been a reviewer of many international journals, including the Journal of Electronic Imaging, Journal of Real-Time Imaging, and the ACM Multimedia System-Journal. He was a Program Chairman of IEEE Real-Time Computing Systems and Applications Conference in 1999 and 2000, respectively. He received the Order of Civil Merit, SukRyu Medal 5066 from the Republic of Korea in October He obtained a Best Paper Award from the Korean Information Science Society in He His biography has been selected by Marquis Who s Who for inclusion in Who s Who in Science and Engineering, Who s Who in America, and Who s Who in the World since 1996.

Fast and Automatic Watermark Resynchronization based on Zernike. Moments

Fast and Automatic Watermark Resynchronization based on Zernike. Moments Fast and Automatic Watermark Resynchronization based on Zernike Moments Xiangui Kang a, Chunhui Liu a, Wenjun Zeng b, Jiwu Huang a, Congbai Liu a a Dept. of ECE., Sun Yat-Sen Univ. (Zhongshan Univ.), Guangzhou

More information

A Modified Moment-Based Image Watermarking Method Robust to Cropping Attack

A Modified Moment-Based Image Watermarking Method Robust to Cropping Attack A Modified Moment-Based Watermarking Method Robust to Cropping Attack Tianrui Zong, Yong Xiang, and Suzan Elbadry School of Information Technology Deakin University, Burwood Campus Melbourne, Australia

More information

1. INTRODUCTION. Yen-Chung Chiu. Wen-Hsiang Tsai.

1. INTRODUCTION. Yen-Chung Chiu. Wen-Hsiang Tsai. Copyright Protection by Watermarking for Color Images against Rotation and Scaling Attacks Using Coding and Synchronization of Peak Locations in DFT Domain Yen-Chung Chiu Department of Computer and Information

More information

Rotation, scale and translation invariant digital image watermarking. O'RUANAIDH, Joséph John, PUN, Thierry. Abstract

Rotation, scale and translation invariant digital image watermarking. O'RUANAIDH, Joséph John, PUN, Thierry. Abstract Proceedings Chapter Rotation, scale and translation invariant digital image watermarking O'RUANAIDH, Joséph John, PUN, Thierry Abstract A digital watermark is an invisible mark embedded in a digital image

More information

ROTATION, TRANSLATION AND SCALING INVARIANT WATERMARKING USING A GENERALIZED RADON TRANSFORMATION

ROTATION, TRANSLATION AND SCALING INVARIANT WATERMARKING USING A GENERALIZED RADON TRANSFORMATION ROTATION, TRANSLATION AND SCALING INVARIANT WATERMARKING USING A GENERALIZED RADON TRANSFORMATION D. SIMITOPOULOS, A. OIKONOMOPOULOS, AND M. G. STRINTZIS Aristotle University of Thessaloniki Electrical

More information

IEEE TRANSACTIONS ON IMAGE PROCESSING, VOL. 20, NO. 8, AUGUST

IEEE TRANSACTIONS ON IMAGE PROCESSING, VOL. 20, NO. 8, AUGUST IEEE TRANSACTIONS ON IMAGE PROCESSING, VOL 20, NO 8, AUGUST 2011 2189 Affine Legendre Moment Invariants for Image Watermarking Robust to Geometric Distortions Hui Zhang, Member, IEEE, Huazhong Shu, Senior

More information

MOMENT functions are used in several computer vision

MOMENT functions are used in several computer vision IEEE TRANSACTIONS ON IMAGE PROCESSING, VOL. 13, NO. 8, AUGUST 2004 1055 Some Computational Aspects of Discrete Orthonormal Moments R. Mukundan, Senior Member, IEEE Abstract Discrete orthogonal moments

More information

Wavelet Packet Based Digital Image Watermarking

Wavelet Packet Based Digital Image Watermarking Wavelet Packet Based Digital Image ing A.Adhipathi Reddy, B.N.Chatterji Department of Electronics and Electrical Communication Engg. Indian Institute of Technology, Kharagpur 72 32 {aar, bnc}@ece.iitkgp.ernet.in

More information

Science Insights: An International Journal

Science Insights: An International Journal Available online at http://www.urpjournals.com Science Insights: An International Journal Universal Research Publications. All rights reserved ISSN 2277 3835 Original Article Object Recognition using Zernike

More information

University of Siena. Multimedia Security. Watermark extraction. Mauro Barni University of Siena. M. Barni, University of Siena

University of Siena. Multimedia Security. Watermark extraction. Mauro Barni University of Siena. M. Barni, University of Siena Multimedia Security Mauro Barni University of Siena : summary Optimum decoding/detection Additive SS watermarks Decoding/detection of QIM watermarks The dilemma of de-synchronization attacks Geometric

More information

Accurate Orthogonal Circular Moment Invariants of Gray-Level Images

Accurate Orthogonal Circular Moment Invariants of Gray-Level Images Journal of Computer Science 7 (5): 75-722, 20 ISSN 549-3636 20 Science Publications Accurate Orthogonal Circular Moment Invariants of Gray-Level Images Khalid Mohamed Hosny Department of Computer Science,

More information

Image Recognition Using Modified Zernike Moments

Image Recognition Using Modified Zernike Moments Sensors & Transducers 204 by IFSA Publishing S. L. http://www.sensorsportal.com Image Recognition Using Modified ernike Moments Min HUANG Yaqiong MA and Qiuping GONG School of Computer and Communication

More information

Watermarking in the Space/Spatial-Frequency Domain Using Two-Dimensional Radon Wigner Distribution

Watermarking in the Space/Spatial-Frequency Domain Using Two-Dimensional Radon Wigner Distribution 650 IEEE TRANSACTIONS ON IMAGE PROCESSING, VOL. 10, NO. 4, APRIL 2001 Watermarking in the Space/Spatial-Frequency Domain Using Two-Dimensional Radon Wigner Distribution Srdjan Stanković, Member, IEEE,

More information

Constraint relationship for reflectional symmetry and rotational symmetry

Constraint relationship for reflectional symmetry and rotational symmetry Journal of Electronic Imaging 10(4), 1 0 (October 2001). Constraint relationship for reflectional symmetry and rotational symmetry Dinggang Shen Johns Hopkins University Department of Radiology Baltimore,

More information

Empirical Analysis of Invariance of Transform Coefficients under Rotation

Empirical Analysis of Invariance of Transform Coefficients under Rotation International Journal of Engineering Research and Development e-issn: 2278-67X, p-issn: 2278-8X, www.ijerd.com Volume, Issue 5 (May 25), PP.43-5 Empirical Analysis of Invariance of Transform Coefficients

More information

Feature Extraction Using Zernike Moments

Feature Extraction Using Zernike Moments Feature Extraction Using Zernike Moments P. Bhaskara Rao Department of Electronics and Communication Engineering ST.Peter's Engineeing college,hyderabad,andhra Pradesh,India D.Vara Prasad Department of

More information

FARSI CHARACTER RECOGNITION USING NEW HYBRID FEATURE EXTRACTION METHODS

FARSI CHARACTER RECOGNITION USING NEW HYBRID FEATURE EXTRACTION METHODS FARSI CHARACTER RECOGNITION USING NEW HYBRID FEATURE EXTRACTION METHODS Fataneh Alavipour 1 and Ali Broumandnia 2 1 Department of Electrical, Computer and Biomedical Engineering, Qazvin branch, Islamic

More information

Digital Image Watermarking Algorithm Based on Wavelet Packet

Digital Image Watermarking Algorithm Based on Wavelet Packet www.ijcsi.org 403 Digital Image ing Algorithm Based on Wavelet Packet 1 A.Geetha, 2 B.Vijayakumari, 3 C.Nagavani, 4 T.Pandiselvi 1 3 4 Faculty of Kamaraj College of Engineering and Technology Department

More information

2. Definition & Classification

2. Definition & Classification Information Hiding Data Hiding K-H Jung Agenda 1. Data Hiding 2. Definition & Classification 3. Related Works 4. Considerations Definition of Data Hiding 3 Data Hiding, Information Hiding Concealing secret

More information

Various Shape Descriptors in Image Processing A Review

Various Shape Descriptors in Image Processing A Review Various Shape Descriptors in Image Processing A Review Preetika D Silva 1, P. Bhuvaneswari 2 1 PG Student, Department of Electronics and Communication, Rajarajeswari College of Engineering, Bangalore,

More information

Geometric Invariant Semi-fragile Image Watermarking Using Real Symmetric Matrix

Geometric Invariant Semi-fragile Image Watermarking Using Real Symmetric Matrix Tamkang Journal of Science and Engineering, Vol. 10, No. 3, pp. 211220 (2007) 211 Geometric Invariant Semi-fragile Image Watermarking Using Real Symmetric Matrix Ching-Tang Hsieh 1 *, Yeh-Kuang Wu 1 and

More information

Study of Wavelet Functions of Discrete Wavelet Transformation in Image Watermarking

Study of Wavelet Functions of Discrete Wavelet Transformation in Image Watermarking Study of Wavelet Functions of Discrete Wavelet Transformation in Image Watermarking Navdeep Goel 1,a, Gurwinder Singh 2,b 1ECE Section, Yadavindra College of Engineering, Talwandi Sabo 2Research Scholar,

More information

An Efficient Algorithm for Fast Computation of Pseudo-Zernike Moments

An Efficient Algorithm for Fast Computation of Pseudo-Zernike Moments An Efficient Algorithm for Fast Computation of Pseudo-Zernike Moments Chong, Chee-Way Fac. of Engg & Tech., Multimedia University, Jalan Air Keroh Lama, 75450 Melaka, Malaysia. (Email:cwayc@pc.jaring.my)

More information

A New Efficient Method for Producing Global Affine Invariants

A New Efficient Method for Producing Global Affine Invariants A New Efficient Method for Producing Global Affine Invariants Esa Rahtu, Mikko Salo 2, and Janne Heikkilä Machine Vision Group, Department of Electrical and Information Engineering, P.O. Box 45, 94 University

More information

IEEE TRANSACTIONS ON SYSTEMS, MAN, AND CYBERNETICS PART C: APPLICATIONS AND REVIEWS, VOL. 30, NO. 1, FEBRUARY I = N

IEEE TRANSACTIONS ON SYSTEMS, MAN, AND CYBERNETICS PART C: APPLICATIONS AND REVIEWS, VOL. 30, NO. 1, FEBRUARY I = N IEEE TRANSACTIONS ON SYSTEMS, MAN, AND CYBERNETICS PART C: APPLICATIONS AND REVIEWS, VOL. 30, NO. 1, FEBRUARY 2000 125 Translation, Rotation, and Scale-Invariant Object Recognition L. A. Torres-Méndez,

More information

Role of Assembling Invariant Moments and SVM in Fingerprint Recognition

Role of Assembling Invariant Moments and SVM in Fingerprint Recognition 56 Role of Assembling Invariant Moments SVM in Fingerprint Recognition 1 Supriya Wable, 2 Chaitali Laulkar 1, 2 Department of Computer Engineering, University of Pune Sinhgad College of Engineering, Pune-411

More information

Affine Normalization of Symmetric Objects

Affine Normalization of Symmetric Objects Affine Normalization of Symmetric Objects Tomáš Suk and Jan Flusser Institute of Information Theory and Automation, Academy of Sciences of the Czech Republic, Pod vodárenskou věží 4, 182 08 Prague 8, Czech

More information

Quantization Index Modulation using the E 8 lattice

Quantization Index Modulation using the E 8 lattice 1 Quantization Index Modulation using the E 8 lattice Qian Zhang and Nigel Boston Dept of Electrical and Computer Engineering University of Wisconsin Madison 1415 Engineering Drive, Madison, WI 53706 Email:

More information

Detection of Copy-Rotate-Move Forgery Using Zernike Moments

Detection of Copy-Rotate-Move Forgery Using Zernike Moments Detection of Copy-Rotate-Move Forgery Using Zernike Moments Seung-Jin Ryu, Min-Jeong Lee, and Heung-Kyu Lee Department of Computer Science, Korea Advanced Institute of Science and Technology, Daejeon,

More information

Spread Spectrum Watermarking. Information Technologies for IPR Protection

Spread Spectrum Watermarking. Information Technologies for IPR Protection Spread Spectrum Watermarking Information Technologies for IPR Protection Spread Spectrum Communication A Narrow-band signal is transmitted over a much larger bandwidth such that the signal energy presented

More information

Information Hiding and Covert Communication

Information Hiding and Covert Communication Information Hiding and Covert Communication Andrew Ker adk @ comlab.ox.ac.uk Royal Society University Research Fellow Oxford University Computing Laboratory Foundations of Security Analysis and Design

More information

Evaluation of OCR Algorithms for Images with Different Spatial Resolutions and Noises

Evaluation of OCR Algorithms for Images with Different Spatial Resolutions and Noises Evaluation of OCR Algorithms for Images with Different Spatial Resolutions and Noises by Qing Chen A thesis submitted to the School of Graduate Studies and Research in partial fulfillment of the requirements

More information

Invariant Pattern Recognition using Dual-tree Complex Wavelets and Fourier Features

Invariant Pattern Recognition using Dual-tree Complex Wavelets and Fourier Features Invariant Pattern Recognition using Dual-tree Complex Wavelets and Fourier Features G. Y. Chen and B. Kégl Department of Computer Science and Operations Research, University of Montreal, CP 6128 succ.

More information

A Method for Blur and Similarity Transform Invariant Object Recognition

A Method for Blur and Similarity Transform Invariant Object Recognition A Method for Blur and Similarity Transform Invariant Object Recognition Ville Ojansivu and Janne Heikkilä Machine Vision Group, Department of Electrical and Information Engineering, University of Oulu,

More information

MODERN video coding standards, such as H.263, H.264,

MODERN video coding standards, such as H.263, H.264, 146 IEEE TRANSACTIONS ON CIRCUITS AND SYSTEMS FOR VIDEO TECHNOLOGY, VOL. 16, NO. 1, JANUARY 2006 Analysis of Multihypothesis Motion Compensated Prediction (MHMCP) for Robust Visual Communication Wei-Ying

More information

Abstract The aim of this paper is to improve the performance of spatial domain watermarking. To this end, a new perceptual mask

Abstract The aim of this paper is to improve the performance of spatial domain watermarking. To this end, a new perceptual mask Efficient Spatial Image Watermarking via New Perceptual Masking and Blind Detection Schemes Irene G. Karybali, Member, IEEE, and Kostas Berberidis, Member, IEEE Abstract The aim of this paper is to improve

More information

Multiscale Autoconvolution Histograms for Affine Invariant Pattern Recognition

Multiscale Autoconvolution Histograms for Affine Invariant Pattern Recognition Multiscale Autoconvolution Histograms for Affine Invariant Pattern Recognition Esa Rahtu Mikko Salo Janne Heikkilä Department of Electrical and Information Engineering P.O. Box 4500, 90014 University of

More information

Hu and Zernike Moments for Sign Language Recognition

Hu and Zernike Moments for Sign Language Recognition Hu and Zernike Moments for Sign Language Recognition K. C. Otiniano-Rodríguez 1, G. Cámara-Chávez 1, and D. Menotti 1 1 Computing Department, Federal University of Ouro Preto, Ouro Preto, MG, Brazil Abstract

More information

Digital Watermark Detection in Visual Multimedia Content

Digital Watermark Detection in Visual Multimedia Content Digital Watermark Detection in Visual Multimedia Content PhD Thesis Defense Peter Meerwald Dept. of Computer Sciences, University of Salzburg September 2010 Watermarking Watermarking is a technology to

More information

Image Interpolation Using Kriging Technique for Spatial Data

Image Interpolation Using Kriging Technique for Spatial Data Image Interpolation Using Kriging Technique for Spatial Data Firas Ajil Jassim, Fawzi Hasan Altaany Abstract Image interpolation has been used spaciously by customary interpolation techniques. Recently,

More information

A Recognition System for 3D Embossed Digits on Non-Smooth Metallic Surface

A Recognition System for 3D Embossed Digits on Non-Smooth Metallic Surface 2011 International Conference on elecommunication echnology and Applications Proc.of CSI vol.5 (2011) (2011) IACSI Press, Singapore A Recognition System for 3D Embossed Digits on Non-Smooth Metallic Surface

More information

A HYBRID MOMENT METHOD FOR IDENTIFICATION OF 3D-OBJECTS FROM 2D-MONOCROMATIC IMAGES

A HYBRID MOMENT METHOD FOR IDENTIFICATION OF 3D-OBJECTS FROM 2D-MONOCROMATIC IMAGES IJICIS, VOL. 4, NO. 1, January 004 A HYBRID MOMENT METHOD FOR IDENTIFICATION OF 3D-OBJECTS FROM D-MONOCROMATIC IMAGES S. F. Bahgat Faculty of Computer & Information Sciences, Ain Shams University, Abbassia,

More information

Image Dependent Log-likelihood Ratio Allocation for Repeat Accumulate Code based Decoding in Data Hiding Channels

Image Dependent Log-likelihood Ratio Allocation for Repeat Accumulate Code based Decoding in Data Hiding Channels Image Dependent Log-likelihood Ratio Allocation for Repeat Accumulate Code based Decoding in Data Hiding Channels Anindya Sarkar and B. S. Manjunath Department of Electrical and Computer Engineering, University

More information

SCALE INVARIANT AND ROTATION INVARIANT IMAGE WATERMARKING. Spandana Bodapati. Bachelor of Science. Jawaharlal Nehru Technological University

SCALE INVARIANT AND ROTATION INVARIANT IMAGE WATERMARKING. Spandana Bodapati. Bachelor of Science. Jawaharlal Nehru Technological University SCALE INVARIANT AND ROTATION INVARIANT IMAGE WATERMARKING By Spandana Bodapati Bachelor of Science Jawaharlal Nehru Technological University Hyderabad, India 200 Submitted to the Faculty of the Graduate

More information

where =0,, 1, () is the sample at time index and is the imaginary number 1. Then, () is a vector of values at frequency index corresponding to the mag

where =0,, 1, () is the sample at time index and is the imaginary number 1. Then, () is a vector of values at frequency index corresponding to the mag Efficient Discrete Tchebichef on Spectrum Analysis of Speech Recognition Ferda Ernawan and Nur Azman Abu Abstract Speech recognition is still a growing field of importance. The growth in computing power

More information

SYMBOL RECOGNITION IN HANDWRITTEN MATHEMATI- CAL FORMULAS

SYMBOL RECOGNITION IN HANDWRITTEN MATHEMATI- CAL FORMULAS SYMBOL RECOGNITION IN HANDWRITTEN MATHEMATI- CAL FORMULAS Hans-Jürgen Winkler ABSTRACT In this paper an efficient on-line recognition system for handwritten mathematical formulas is proposed. After formula

More information

Research Article Effect of Different Places in Applying Laplacian Filter on the Recovery Algorithm in Spatial Domain Watermarking

Research Article Effect of Different Places in Applying Laplacian Filter on the Recovery Algorithm in Spatial Domain Watermarking Research Journal of Applied Sciences, Engineering and Technology 7(24): 5157-5162, 2014 DOI:10.19026/rjaset.7.912 ISSN: 2040-7459; e-issn: 2040-7467 2014 Maxwell Scientific Publication Corp. Submitted:

More information

Modifying Voice Activity Detection in Low SNR by correction factors

Modifying Voice Activity Detection in Low SNR by correction factors Modifying Voice Activity Detection in Low SNR by correction factors H. Farsi, M. A. Mozaffarian, H.Rahmani Department of Electrical Engineering University of Birjand P.O. Box: +98-9775-376 IRAN hfarsi@birjand.ac.ir

More information

A Robust Modular Wavelet Network Based Symbol Classifier

A Robust Modular Wavelet Network Based Symbol Classifier A Robust Modular Wavelet Network Based Symbol Classifier A.K. Mishra, P.W. Fieguth, D.A. Clausi University of Waterloo, Vision and Image Processing Group akmishra, pfieguth, dclausi@uwaterloo.ca Abstract.

More information

Original Article Design Approach for Content-Based Image Retrieval Using Gabor-Zernike Features

Original Article Design Approach for Content-Based Image Retrieval Using Gabor-Zernike Features International Archive of Applied Sciences and Technology Volume 3 [2] June 2012: 42-46 ISSN: 0976-4828 Society of Education, India Website: www.soeagra.com/iaast/iaast.htm Original Article Design Approach

More information

A Novel Activity Detection Method

A Novel Activity Detection Method A Novel Activity Detection Method Gismy George P.G. Student, Department of ECE, Ilahia College of,muvattupuzha, Kerala, India ABSTRACT: This paper presents an approach for activity state recognition of

More information

3-D Projective Moment Invariants

3-D Projective Moment Invariants Journal of Information & Computational Science 4: * (2007) 1 Available at http://www.joics.com 3-D Projective Moment Invariants Dong Xu a,b,c,d,, Hua Li a,b,c a Key Laboratory of Intelligent Information

More information

Object Recognition Using a Neural Network and Invariant Zernike Features

Object Recognition Using a Neural Network and Invariant Zernike Features Object Recognition Using a Neural Network and Invariant Zernike Features Abstract : In this paper, a neural network (NN) based approach for translation, scale, and rotation invariant recognition of objects

More information

Michal Kuneš

Michal Kuneš A (Zernike) moment-based nonlocal-means algorithm for image denoising Michal Kuneš xkunes@utia.cas.cz ZOI UTIA, ASCR, Friday seminar 13.03.015 Introduction - Uses nonlocal (NL) means filter - Introduce

More information

Double Sided Watermark Embedding and Detection with Perceptual Analysis

Double Sided Watermark Embedding and Detection with Perceptual Analysis DOUBLE SIDED WATERMARK EMBEDDIG AD DETECTIO WITH PERCEPTUAL AALYSIS Double Sided Watermark Embedding and Detection with Perceptual Analysis Jidong Zhong and Shangteng Huang Abstract In our previous work,

More information

Object Recognition Using Local Characterisation and Zernike Moments

Object Recognition Using Local Characterisation and Zernike Moments Object Recognition Using Local Characterisation and Zernike Moments A. Choksuriwong, H. Laurent, C. Rosenberger, and C. Maaoui Laboratoire Vision et Robotique - UPRES EA 2078, ENSI de Bourges - Université

More information

Determining the Optimal Decision Delay Parameter for a Linear Equalizer

Determining the Optimal Decision Delay Parameter for a Linear Equalizer International Journal of Automation and Computing 1 (2005) 20-24 Determining the Optimal Decision Delay Parameter for a Linear Equalizer Eng Siong Chng School of Computer Engineering, Nanyang Technological

More information

HOPFIELD neural networks (HNNs) are a class of nonlinear

HOPFIELD neural networks (HNNs) are a class of nonlinear IEEE TRANSACTIONS ON CIRCUITS AND SYSTEMS II: EXPRESS BRIEFS, VOL. 52, NO. 4, APRIL 2005 213 Stochastic Noise Process Enhancement of Hopfield Neural Networks Vladimir Pavlović, Member, IEEE, Dan Schonfeld,

More information

Boundary and Region based Moments Analysis for Image Pattern Recognition

Boundary and Region based Moments Analysis for Image Pattern Recognition ISSN 1746-7659, England, UK Journal of Inforation and Coputing Science Vol. 10, No. 1, 015, pp. 040-045 Boundary and Region based Moents Analysis for Iage Pattern Recognition Dr. U Ravi Babu 1, Dr Md Mastan

More information

New wrinkle in dirty paper techniques

New wrinkle in dirty paper techniques New wrinkle in dirty paper techniques Brett Bradley, John Stach Digimarc Corporation, 19801 SW 72 nd Ave, Suite 250, Tualatin, OR, USA 97062 ABSTRACT The many recent publications that focus upon watermarking

More information

Hiding Data in a QImage File

Hiding Data in a QImage File Hiding Data in a QImage File Gabriela Mogos Abstract The idea of embedding some information within a digital media, in such a way that the inserted data are intrinsically part of the media itself, has

More information

An Algorithm for Pre-Processing of Satellite Images of Cyclone Clouds

An Algorithm for Pre-Processing of Satellite Images of Cyclone Clouds An Algorithm for Pre-Processing of Satellite Images of Cyclone Clouds Ishita Dutta West Bengal University of Technology BF-142 Sector I Salt Lake Kolkata 700064, India Mallika De University of Kalyani

More information

NOISE can sometimes improve nonlinear signal processing

NOISE can sometimes improve nonlinear signal processing 488 IEEE TRANSACTIONS ON SIGNAL PROCESSING, VOL. 59, NO. 2, FEBRUARY 2011 Noise Benefits in Quantizer-Array Correlation Detection and Watermark Decoding Ashok Patel, Member, IEEE, and Bart Kosko, Fellow,

More information

Enhanced Fourier Shape Descriptor Using Zero-Padding

Enhanced Fourier Shape Descriptor Using Zero-Padding Enhanced ourier Shape Descriptor Using Zero-Padding Iivari Kunttu, Leena Lepistö, and Ari Visa Tampere University of Technology, Institute of Signal Processing, P.O. Box 553, I-330 Tampere inland {Iivari.Kunttu,

More information

Open Access Measuring Method for Diameter of Bearings Based on the Edge Detection Using Zernike Moment

Open Access Measuring Method for Diameter of Bearings Based on the Edge Detection Using Zernike Moment Send Orders for Reprints to reprints@benthamscience.ae 114 The Open Automation and Control Systems Journal, 2015, 7, 114-119 Open Access Measuring Method for Diameter of Bearings Based on the Edge Detection

More information

Efficient Computation of Zernike and Pseudo-Zernike Moments for Pattern Classification Applications 1

Efficient Computation of Zernike and Pseudo-Zernike Moments for Pattern Classification Applications 1 REPRESENTATION, PROCESSING, ANALYSIS, AND UNDERSTANDING OF IMAGES Efficient Computation of Zernike and Pseudo-Zernike Moments for Pattern Classification Applications 1 G. A. Papakostas a, Y. S. Boutalis

More information

Invariant Image Recognition by Zernike Moments

Invariant Image Recognition by Zernike Moments IEEE TRANSACTIONS ON PATTERN ANALYSIS AND MACHINE INTELLIGENCE. VOL. 12. NO. 5. MAY 1990 489 REFERENCES H. Freeman and L. Garder, Apictorial jigsaw puzzles: The computer solution of a problem in pattern

More information

Intraframe Prediction with Intraframe Update Step for Motion-Compensated Lifted Wavelet Video Coding

Intraframe Prediction with Intraframe Update Step for Motion-Compensated Lifted Wavelet Video Coding Intraframe Prediction with Intraframe Update Step for Motion-Compensated Lifted Wavelet Video Coding Aditya Mavlankar, Chuo-Ling Chang, and Bernd Girod Information Systems Laboratory, Department of Electrical

More information

Classification of Hand-Written Digits Using Scattering Convolutional Network

Classification of Hand-Written Digits Using Scattering Convolutional Network Mid-year Progress Report Classification of Hand-Written Digits Using Scattering Convolutional Network Dongmian Zou Advisor: Professor Radu Balan Co-Advisor: Dr. Maneesh Singh (SRI) Background Overview

More information

An Investigation of 3D Dual-Tree Wavelet Transform for Video Coding

An Investigation of 3D Dual-Tree Wavelet Transform for Video Coding MITSUBISHI ELECTRIC RESEARCH LABORATORIES http://www.merl.com An Investigation of 3D Dual-Tree Wavelet Transform for Video Coding Beibei Wang, Yao Wang, Ivan Selesnick and Anthony Vetro TR2004-132 December

More information

- An Image Coding Algorithm

- An Image Coding Algorithm - An Image Coding Algorithm Shufang Wu http://www.sfu.ca/~vswu vswu@cs.sfu.ca Friday, June 14, 2002 22-1 Agenda Overview Discrete Wavelet Transform Zerotree Coding of Wavelet Coefficients Successive-Approximation

More information

Copy-Move Forgery Detection Using Zernike and Pseudo Zernike Moments

Copy-Move Forgery Detection Using Zernike and Pseudo Zernike Moments 039 The International Arab Journal of Information Technology, Vol. 13, No. 6A, 2016 Copy-Move Forgery Detection Using Zernike and Pseudo Zernike Moments Khaled Mahmoud and Arwa Abu-AlRukab Computer Science

More information

Quantization Based Watermarking Methods Against Valumetric Distortions

Quantization Based Watermarking Methods Against Valumetric Distortions International Journal of Automation and Computing 14(6), December 2017, 672-685 DOI: 10.1007/s11633-016-1010-6 Quantization Based Watermarking Methods Against Valumetric Distortions Zai-Ran Wang 1,2 Jing

More information

Representing regions in 2 ways:

Representing regions in 2 ways: Representing regions in 2 ways: Based on their external characteristics (its boundary): Shape characteristics Based on their internal characteristics (its region): Both Regional properties: color, texture,

More information

BIOMETRIC verification systems are used to verify the

BIOMETRIC verification systems are used to verify the 86 IEEE TRANSACTIONS ON CIRCUITS AND SYSTEMS FOR VIDEO TECHNOLOGY, VOL. 14, NO. 1, JANUARY 2004 Likelihood-Ratio-Based Biometric Verification Asker M. Bazen and Raymond N. J. Veldhuis Abstract This paper

More information

Basic Concepts of. Feature Selection

Basic Concepts of. Feature Selection Basic Concepts of Pattern Recognition and Feature Selection Xiaojun Qi -- REU Site Program in CVMA (2011 Summer) 1 Outline Pattern Recognition Pattern vs. Features Pattern Classes Classification Feature

More information

Palmprint Verification with Moments

Palmprint Verification with Moments Palmprint Verification with Moments Ying-Han Pang Andrew T.B.J David N.C.L Hiew Fu San Faculty of Information Science and Technology Multimedia University Jalan Ayer Keroh Lama 75450, Melaka, Malaysia.

More information

The Efficient Discrete Tchebichef Transform for Spectrum Analysis of Speech Recognition

The Efficient Discrete Tchebichef Transform for Spectrum Analysis of Speech Recognition The Efficient Discrete Tchebichef Transform for Spectrum Analysis of Speech Recognition Ferda Ernawan 1, Nur Azman Abu 2 and Nanna Suryana 2 1 Faculty of Information and Communication Technology, Universitas

More information

A Nonuniform Quantization Scheme for High Speed SAR ADC Architecture

A Nonuniform Quantization Scheme for High Speed SAR ADC Architecture A Nonuniform Quantization Scheme for High Speed SAR ADC Architecture Youngchun Kim Electrical and Computer Engineering The University of Texas Wenjuan Guo Intel Corporation Ahmed H Tewfik Electrical and

More information

Watermark Detection after Quantization Attacks

Watermark Detection after Quantization Attacks Watermark Detection after Quantization Attacks Joachim J. Eggers and Bernd Girod Telecommunications Laboratory University of Erlangen-Nuremberg Cauerstr. 7/NT, 9158 Erlangen, Germany feggers,girodg@lnt.de

More information

INF Shape descriptors

INF Shape descriptors 3.09.09 Shape descriptors Anne Solberg 3.09.009 1 Mandatory exercise1 http://www.uio.no/studier/emner/matnat/ifi/inf4300/h09/undervisningsmateriale/inf4300 termprojecti 009 final.pdf / t / / t t/ifi/inf4300/h09/

More information

EECS490: Digital Image Processing. Lecture #26

EECS490: Digital Image Processing. Lecture #26 Lecture #26 Moments; invariant moments Eigenvector, principal component analysis Boundary coding Image primitives Image representation: trees, graphs Object recognition and classes Minimum distance classifiers

More information

Wavelet-based Audio Watermarking Techniques: Robustness and Fast Synchronization

Wavelet-based Audio Watermarking Techniques: Robustness and Fast Synchronization Wavelet-based Audio Watermarking Techniques: Robustness and Fast Synchronization Hong Oh Kim Bae Keun Lee Nam-Yong Lee Abstract This paper describes a novel technique for embedding watermark bits into

More information

Invariant Feature Extraction from Fingerprint Biometric Using Pseudo Zernike Moments

Invariant Feature Extraction from Fingerprint Biometric Using Pseudo Zernike Moments Invariant Feature Extraction from Biometric Using Pseudo Zernike Moments C.Lakshmi Deepika 1, Dr. A Kandaswamy 2, C. Vimal 3, and B. Sathish 4 1,2,3,4 Department of Biomedical Engineering, PSG College

More information

A Hypothesis Testing Approach for Achieving Semi-fragility in Multimedia Authentication

A Hypothesis Testing Approach for Achieving Semi-fragility in Multimedia Authentication A Hypothesis Testing Approach for Achieving Semi-fragility in Multimedia Authentication Chuhong Fei a, Deepa Kundur b, and Raymond Kwong a a University of Toronto, 10 King s College Road, Toronto, ON Canada

More information

Over-enhancement Reduction in Local Histogram Equalization using its Degrees of Freedom. Alireza Avanaki

Over-enhancement Reduction in Local Histogram Equalization using its Degrees of Freedom. Alireza Avanaki Over-enhancement Reduction in Local Histogram Equalization using its Degrees of Freedom Alireza Avanaki ABSTRACT A well-known issue of local (adaptive) histogram equalization (LHE) is over-enhancement

More information

Fault Tolerance Technique in Huffman Coding applies to Baseline JPEG

Fault Tolerance Technique in Huffman Coding applies to Baseline JPEG Fault Tolerance Technique in Huffman Coding applies to Baseline JPEG Cung Nguyen and Robert G. Redinbo Department of Electrical and Computer Engineering University of California, Davis, CA email: cunguyen,

More information

On the Recovery of a Function on a Circular Domain

On the Recovery of a Function on a Circular Domain 2736 IEEE ANSACTIONS ON INFORMATION THEORY, VOL. 48, NO. 10, OCTOBER 2002 On the Recovery of a Function on a Circular Domain Mirosław Pawlak, Member, IEEE, and Simon X. Liao, Member, IEEE Abstract We consider

More information

THE newest video coding standard is known as H.264/AVC

THE newest video coding standard is known as H.264/AVC IEEE TRANSACTIONS ON CIRCUITS AND SYSTEMS FOR VIDEO TECHNOLOGY, VOL. 17, NO. 6, JUNE 2007 765 Transform-Domain Fast Sum of the Squared Difference Computation for H.264/AVC Rate-Distortion Optimization

More information

Logo Recognition System Using Angular Radial Transform Descriptors

Logo Recognition System Using Angular Radial Transform Descriptors Journal of Computer Science 7 (9): 1416-1422, 2011 ISSN 1549-3636 2011 Science Publications Logo Recognition System Using Angular Radial Transform Descriptors Omar Mohammed Wahdan, Khairuddin Omar and

More information

Data-Hiding Capacities of Non-Redundant Complex Wavelets

Data-Hiding Capacities of Non-Redundant Complex Wavelets Data-Hiding Capacities of Non-Redundant Complex Wavelets Lahouari Ghouti School of Computer Science, Queen's University of Belfast. Belfast BT7 INN, United ingdom. Email: L.Ghouti@qub.ac.uk eywords: Digital

More information

Title: Watermark Estimation Through Detector Observations Author: Ton Kalker Conference: Benelux Signal Processing Symposium 98 Date and location:

Title: Watermark Estimation Through Detector Observations Author: Ton Kalker Conference: Benelux Signal Processing Symposium 98 Date and location: Title: Watermark Estimation Through Detector Observations Author: Ton Kalker Conference: Benelux Signal Processing Symposium 98 Date and location: March 98, Leuven, Belgium Watermark Estimation Through

More information

QISLSQb: A Quantum Image Steganography Scheme Based on Least Significant Qubit

QISLSQb: A Quantum Image Steganography Scheme Based on Least Significant Qubit 06 International Conference on Mathematical, Computational and Statistical Sciences and Engineering (MCSSE 06) ISBN: 978--60595-396-0 QISLSQb: A Quantum Image Steganography Scheme Based on Least Significant

More information

arxiv: v1 [cs.mm] 2 Feb 2017 Abstract

arxiv: v1 [cs.mm] 2 Feb 2017 Abstract DCT-like Transform for Image Compression Requires 14 Additions Only F. M. Bayer R. J. Cintra arxiv:1702.00817v1 [cs.mm] 2 Feb 2017 Abstract A low-complexity 8-point orthogonal approximate DCT is introduced.

More information

Rotation, Scale and Translation Resilient Public Watermarking for Images

Rotation, Scale and Translation Resilient Public Watermarking for Images Roaion Scale and Translaion Resilien Public Waermarking or Images Ching-Yung Lin a Min Wu b Jerey A. Bloom c Ma L. Miller c Ingemar J. Cox c Yui Man Lui d a Columbia Universiy New York NY b Princeon Universiy

More information

On the Cross-Correlation of a p-ary m-sequence of Period p 2m 1 and Its Decimated

On the Cross-Correlation of a p-ary m-sequence of Period p 2m 1 and Its Decimated IEEE TRANSACTIONS ON INFORMATION THEORY, VOL 58, NO 3, MARCH 01 1873 On the Cross-Correlation of a p-ary m-sequence of Period p m 1 Its Decimated Sequences by (p m +1) =(p +1) Sung-Tai Choi, Taehyung Lim,

More information

Pattern Recognition System with Top-Down Process of Mental Rotation

Pattern Recognition System with Top-Down Process of Mental Rotation Pattern Recognition System with Top-Down Process of Mental Rotation Shunji Satoh 1, Hirotomo Aso 1, Shogo Miyake 2, and Jousuke Kuroiwa 3 1 Department of Electrical Communications, Tohoku University Aoba-yama05,

More information

Signal Recovery from Permuted Observations

Signal Recovery from Permuted Observations EE381V Course Project Signal Recovery from Permuted Observations 1 Problem Shanshan Wu (sw33323) May 8th, 2015 We start with the following problem: let s R n be an unknown n-dimensional real-valued signal,

More information

Point and Interval Estimation for Gaussian Distribution, Based on Progressively Type-II Censored Samples

Point and Interval Estimation for Gaussian Distribution, Based on Progressively Type-II Censored Samples 90 IEEE TRANSACTIONS ON RELIABILITY, VOL. 52, NO. 1, MARCH 2003 Point and Interval Estimation for Gaussian Distribution, Based on Progressively Type-II Censored Samples N. Balakrishnan, N. Kannan, C. T.

More information

Content-based document signature: ongoing work

Content-based document signature: ongoing work Content-based document signature: ongoing work Anh Thu Phan Ho, Petra-Krämer Gomez and Mickaël Coustaty L3i laboratory, University of La Rochelle GDR Sécurité Informatique réunion 31 Mai Outline 1 Motivation

More information