ROTATION, TRANSLATION AND SCALING INVARIANT WATERMARKING USING A GENERALIZED RADON TRANSFORMATION
|
|
- Derrick Cunningham
- 5 years ago
- Views:
Transcription
1 ROTATION, TRANSLATION AND SCALING INVARIANT WATERMARKING USING A GENERALIZED RADON TRANSFORMATION D. SIMITOPOULOS, A. OIKONOMOPOULOS, AND M. G. STRINTZIS Aristotle University of Thessaloniki Electrical and Computer Engineering Dept. Thessaloniki, Greece A watermarking scheme able to resist geometric attacks is presented in this paper. The watermark embedding and detection are performed in a domain which is invariant to geometric attacks such as rotation, scaling and translation. The invariant domain is derived by applying a new generalized Radon transform to the image. The ability of the proposed method to withstand geometric attacks is evaluated experimentally. 1. Introduction Digital image watermarking is a technology which has attracted many researchers in the past few years. A lot of watermarking techniques are laying emphasis on robustness against common digital image processing operations, such as compression or filtering. However it is clear that even the smallest geometric distortions can irreparably harm the detection process of a watermarking scheme due to loss of synchronization between the embedded and the correlating watermark. These geometric distortions usually include translation, rotation and scaling (RST) operations which can be easily applied on an image. Recently, many watermarking techniques have been proposed which are oriented towards robustness against geometric attacks. In some approaches an additional pattern is embedded in the image along with the watermark in order to be able to revert the geometric attack 1. There are also watermarking methods 2, where the embedding and detection processes are taking place in a domain which is invariant to geometric transformations. The watermarking technique presented in this paper is based on the latter approach for resisting geometric attacks. First, a corner detection scheme detects corners in the image content and finds the most robust among them. This corner is used as an origin for a new generalized Radon transform (GRT) 3 followed by a two dimensional Fourier Transform. Through this sequence of transformations 1
2 2 an invariant to RST attacks domain is created. The watermark is embedded in this domain, and then, by applying the inverse sequence of transformations we obtain the watermarked image. A correlation-based detection scheme is applied in order to detect the existence of the watermark. The detection is blind, i.e. the original image is not required. The detection is performed in the invariant domain in order to ensure that the embedded and the correlating watermark will be synchronized even in the case of geometric attacks. The resistance of the proposed scheme is demonstrated through experimental results. 2. RST invariance using the Spiral Integration Transform In order to achieve robustness to translation a Harris corner detector 4 is first applied to the image. In this way a set of corners in the image content is detected and the most robust among them is selected. This corner is used as an origin for the application of a new generalized Radon transform, the Spiral Integration Transform (SIT), which is applied in order to achieve robustness against rotation and scaling. If f(r, φ) is the image in a polar coordinate system, the SIT of f(r, φ) is the integral of f(r, φ) along the line (in a polar coordinate system) given by r = e a (φ ω), r [, + ). This line (see Fig.1a) in the polar coordinate system, corresponds to a spire (see Fig.1b) in a cartesian coordinate system. The SIT is given by: Figure 1. system. r S f (a, ω) = ω Integration path 2π e a = tan(z) (a) z φ f(r, φ)δ(r e a (φ ω))rdrdφ (1) (b) Most robust corner The integration path in (a) the polar coordinate system and (b) the cartesian coordinate Consider now the rotated by φ and scaled by b image g(r, φ) =f ( r b,φ φ ) written in a polar coordinate system. The SIT of this image will be: S g (a, ω) =b S f (a ln(b),ω φ ) (2)
3 3 Therefore, the SIT of the scaled and rotated image is translated by log(b) along the a axis and cyclically shifted by φ along the ω axis, and its magnitude is scaled by b. Since the DFT magnitude is translation invariant 2, using equation (2) it is easy to show that A g = b A f, where A f and A g are the magnitudes of the spectrum of S g and S f respectively. As can be seen, the magnitude of the SIT spectrum of the scaled and rotated image is only scaled by b. However, we need not be concerned with the magnitude scaling of the spectrum, since we intend to use a correlation-based detector that is invariant to scaling. Therefore, it is clear that the magnitude of the SIT spectrum is invariant to rotation and scaling. In addition, due to the use of the corner detection scheme for selecting the origin of SIT, invariance to image translation is achieved. 3. Embedding As shown in section 2 the magnitude of the SIT spectrum of an image f(x, y) is invariant to RST operations. For this reason, the watermark embedding and detection should take place in this domain. However, if the watermark is added to the magnitude of the SIT spectrum, then the inverse transformations (IDFT, inverse SIT and inverse polar mapping) should be applied to the watermarked spectrum in order to obtain the watermarked image in the spatial domain. In such a case the original image may be degraded by the transformations. For this reason, after the watermark is embedded in the magnitude of the SIT spectrum and IDFT is applied, we subtract the SIT of the original image from the SIT of the watermarked image. In this way a representation of the watermark in the SIT domain is obtained and after inverse SIT and inverse polar mapping are applied, the spatial representation of the watermark is additively embedded in the original image. This is depicted in Fig. 2 and is described in detail in the following. The watermark W is the product of a zero-mean random sequence of the values +1 and -1 and the constant embedding strength factor h. A secret key is used in order to produce a seed for the watermark sequence generation. In order to ensure that the IDFT of the watermark is real, the watermark values should comply to the following rule: W (k, n) =W ( k, n). For this reason, first the watermark is generated in the first and the fourth quadrant of the spectrum, and then the generated watermark is duplicated in the third and the second quadrant respectively. In addition, the area of the spectrum in which the watermark is embedded, is a ring-shaped area that covers the middle frequencies: {, if ρ < R1 and ρ > R W (ρ, θ) = 2 (3) ±1 if R 1 <ρ<r 2 where ρ = k 2 + n 2 and θ = arctan(n/k). This area was selected for two
4 4 User ID Watermark Magnitude + DFT Phase X IDFT Watermarked DFT - SIT SIT of the watermark Polar Mapping Inverse SIT Harris Corner Detector Original Image Inverse Polar Mapping + Watermarked Image Figure 2. Block diagram of the embedding process. reasons. Firstly, it was found that very high valued coefficients appear in the low frequencies of the SIT spectrum. After experimenting with various images, it was found that these outliers deteriorate the detector performance and for this reason embedding and detection in this area was avoided. In addition, the magnitude of the SIT spectrum in the high frequencies is generally small. In a significant number of these coefficients it is smaller than the embedding strength h and these coefficients may be zeroed after embedding. Therefore, the high frequencies were also not used for embedding and detection. After the watermark generation process is completed, the watermark coefficients W (k, n) are added to the SIT spectrum magnitude values A(k, n). Then IDFT is applied and the resulting SIT of the watermarked image is subtracted from the original SIT. The SIT of the watermark is obtained, which must be transferred to the spatial domain so that it can be added to the original image. As mentioned in section 2, each element of the SIT domain is the result of an integration along a line of the form r = e a (φ ω) in a polar coordinate system. In
5 5 order to invert the SIT of the watermark, each SIT coefficient is distributed along the pixels belonging to the corresponding line. This means that the value of each SIT coefficient is divided by the number of pixels that exist in each line and the resulting value is added to every pixel that belongs to the corresponding line. This leads to a representation of the watermark in the polar coordinate system. The final stage of the embedding process includes transformation of the watermark from the polar representation to the spatial domain and addition to the original image. 4. Detection For the detection of the watermark a correlation-based scheme is applied. The detection process can be divided into the following steps: First, the most robust corner of the test image is detected. Then, the SIT is applied to the test image. In the following, the DFT is applied to the SIT of the image and its magnitude is obtained. The symmetrical watermark W is created using the owner s secret ID as described in section 3. Finally, the correlation metric c between the values A(k, n) of the magnitude of the SIT spectrum, and the correlating watermark values W (k, n) is calculated: c = N 1 N 2 k= n= N 1 A(k, n) W (k, n) N 2 k= n= A(k, n) 2 (4) where N 1 and N 2 are the dimensions of the 2D-DFT image. The correlation metric c is compared to the threshold T, which is defined according to the allowed false alarm probability P FA of the detection scheme, as described in Experimental results The experiments presented in the following were performed using standard test images such as Lena, Baboon and Fishing boat. Linear interpolation was used for the SIT, the polar mapping and their inverses. Table 1. Correlation metric values under various attacks. Attacks Lena Baboon Fishing boat No attack Rotation by 45 degrees Downscaling by JPEG Q= Median filtering 3x Gaussian Noise N(,1)
6 6 Table 1 presents the correlation metric value for both the original and the attacked images. As can be seen, apart from RST attacks, filtering, noise addition and compression attacks were also tested. Furthermore, the values of the correlation metric for the watermarked image Lena (see Fig. 3a) using 5 different correlating watermarks were computed and are given in Fig. 3b. The 1th watermark is the valid correlating watermark. As can be seen, the value of c for the 1th watermark is significantly larger than other values corresponding to different watermarks. In addition, all these values are below the threshold T = 4.75 for false alarm probability P FA = Correlation metric c Threshold T (a) Watermark Figure 3. (a) Watermarked image Lena, (b) Correlator values for the watermarked image Lena using 5 different correlating watermarks. (b) 6. Conclusions In this paper a watermarking method that uses a new generalized Radon transform, the SIT transform, is presented. The proposed method offers resilience to RST attacks without using the original image in the detection. Furthermore, experimental results demonstrate that the embedded watermarks resist filtering, noise addition and compression. References 1. S. Pereira and T. Pun, Robust template matching for affine resistant image watermarks, IEEE Trans. Im. Proc., vol. 9, no. 6, pp , June J. O Ruanaidh and T. Pun, Rotation, scale and translation invariant spread spectrum digital image watermarking, Signal Processing, vol. 66, no. 3, pp , May C. H. Chapman, Generalized Radon transforms and slant stacks, Geophys. J. R. ast. Soc., vol. 66, pp , C. Harris and M. Stephen, A combined corner and edge detector, in Alvey Vision Conference, 1988, pp I. J. Cox, J. Kilian, T. Leighton, and T. Shamoon, Secure spread spectrum watermarking for multimedia, IEEE Trans. Im. Proc., vol. 6, no. 12, pp , Dec 1997.
A Modified Moment-Based Image Watermarking Method Robust to Cropping Attack
A Modified Moment-Based Watermarking Method Robust to Cropping Attack Tianrui Zong, Yong Xiang, and Suzan Elbadry School of Information Technology Deakin University, Burwood Campus Melbourne, Australia
More informationWatermarking in the Space/Spatial-Frequency Domain Using Two-Dimensional Radon Wigner Distribution
650 IEEE TRANSACTIONS ON IMAGE PROCESSING, VOL. 10, NO. 4, APRIL 2001 Watermarking in the Space/Spatial-Frequency Domain Using Two-Dimensional Radon Wigner Distribution Srdjan Stanković, Member, IEEE,
More informationUniversity of Siena. Multimedia Security. Watermark extraction. Mauro Barni University of Siena. M. Barni, University of Siena
Multimedia Security Mauro Barni University of Siena : summary Optimum decoding/detection Additive SS watermarks Decoding/detection of QIM watermarks The dilemma of de-synchronization attacks Geometric
More informationFast and Automatic Watermark Resynchronization based on Zernike. Moments
Fast and Automatic Watermark Resynchronization based on Zernike Moments Xiangui Kang a, Chunhui Liu a, Wenjun Zeng b, Jiwu Huang a, Congbai Liu a a Dept. of ECE., Sun Yat-Sen Univ. (Zhongshan Univ.), Guangzhou
More information1. INTRODUCTION. Yen-Chung Chiu. Wen-Hsiang Tsai.
Copyright Protection by Watermarking for Color Images against Rotation and Scaling Attacks Using Coding and Synchronization of Peak Locations in DFT Domain Yen-Chung Chiu Department of Computer and Information
More informationWavelet Packet Based Digital Image Watermarking
Wavelet Packet Based Digital Image ing A.Adhipathi Reddy, B.N.Chatterji Department of Electronics and Electrical Communication Engg. Indian Institute of Technology, Kharagpur 72 32 {aar, bnc}@ece.iitkgp.ernet.in
More informationRotation, scale and translation invariant digital image watermarking. O'RUANAIDH, Joséph John, PUN, Thierry. Abstract
Proceedings Chapter Rotation, scale and translation invariant digital image watermarking O'RUANAIDH, Joséph John, PUN, Thierry Abstract A digital watermark is an invisible mark embedded in a digital image
More informationInvariant Image Watermark Using Zernike Moments
766 IEEE TRANSACTIONS ON CIRCUITS AND SYSTEMS FOR VIDEO TECHNOLOGY, VOL. 13, NO. 8, AUGUST 2003 Invariant Image Watermark Using Zernike Moments Hyung Shin Kim and Heung-Kyu Lee, Member, IEEE Abstract This
More informationDouble Sided Watermark Embedding and Detection with Perceptual Analysis
DOUBLE SIDED WATERMARK EMBEDDIG AD DETECTIO WITH PERCEPTUAL AALYSIS Double Sided Watermark Embedding and Detection with Perceptual Analysis Jidong Zhong and Shangteng Huang Abstract In our previous work,
More informationDigital Image Watermarking Algorithm Based on Wavelet Packet
www.ijcsi.org 403 Digital Image ing Algorithm Based on Wavelet Packet 1 A.Geetha, 2 B.Vijayakumari, 3 C.Nagavani, 4 T.Pandiselvi 1 3 4 Faculty of Kamaraj College of Engineering and Technology Department
More informationSCALE INVARIANT AND ROTATION INVARIANT IMAGE WATERMARKING. Spandana Bodapati. Bachelor of Science. Jawaharlal Nehru Technological University
SCALE INVARIANT AND ROTATION INVARIANT IMAGE WATERMARKING By Spandana Bodapati Bachelor of Science Jawaharlal Nehru Technological University Hyderabad, India 200 Submitted to the Faculty of the Graduate
More informationStudy of Wavelet Functions of Discrete Wavelet Transformation in Image Watermarking
Study of Wavelet Functions of Discrete Wavelet Transformation in Image Watermarking Navdeep Goel 1,a, Gurwinder Singh 2,b 1ECE Section, Yadavindra College of Engineering, Talwandi Sabo 2Research Scholar,
More informationA Method for Blur and Similarity Transform Invariant Object Recognition
A Method for Blur and Similarity Transform Invariant Object Recognition Ville Ojansivu and Janne Heikkilä Machine Vision Group, Department of Electrical and Information Engineering, University of Oulu,
More informationSpread Spectrum Watermarking. Information Technologies for IPR Protection
Spread Spectrum Watermarking Information Technologies for IPR Protection Spread Spectrum Communication A Narrow-band signal is transmitted over a much larger bandwidth such that the signal energy presented
More informationQuantization Based Watermarking Methods Against Valumetric Distortions
International Journal of Automation and Computing 14(6), December 2017, 672-685 DOI: 10.1007/s11633-016-1010-6 Quantization Based Watermarking Methods Against Valumetric Distortions Zai-Ran Wang 1,2 Jing
More informationAbstract The aim of this paper is to improve the performance of spatial domain watermarking. To this end, a new perceptual mask
Efficient Spatial Image Watermarking via New Perceptual Masking and Blind Detection Schemes Irene G. Karybali, Member, IEEE, and Kostas Berberidis, Member, IEEE Abstract The aim of this paper is to improve
More information1782 IEEE TRANSACTIONS ON IMAGE PROCESSING, VOL. 18, NO. 8, AUGUST 2009
1782 IEEE TRANSACTIONS ON IMAGE PROCESSING, VOL. 18, NO. 8, AUGUST 2009 A New Statistical Detector for DWT-Based Additive Image Watermarking Using the Gauss Hermite Expansion S. M. Mahbubur Rahman, M.
More informationThis is a repository copy of The effect of quality scalable image compression on robust watermarking.
This is a repository copy of The effect of quality scalable image compression on robust watermarking. White Rose Research Online URL for this paper: http://eprints.whiterose.ac.uk/7613/ Conference or Workshop
More informationIEEE TRANSACTIONS ON IMAGE PROCESSING, VOL. 20, NO. 8, AUGUST
IEEE TRANSACTIONS ON IMAGE PROCESSING, VOL 20, NO 8, AUGUST 2011 2189 Affine Legendre Moment Invariants for Image Watermarking Robust to Geometric Distortions Hui Zhang, Member, IEEE, Huazhong Shu, Senior
More informationDATA-HIDING codes have been widely used for embedding
284 IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, VOL. 4, NO. 3, SEPTEMBER 2009 On Estimation Accuracy of Desynchronization Attack Channel Parameters Shankar Sadasivam, Student Member, IEEE,
More informationRobust Watermarking Procedure based on JPEG-DCT Image Compression
TIME-FREQUENCY SIGNAL ANALYSIS 1649 Robust Watermarking Procedure based on JPEG-DCT Image Compression Srdjan Stanković, Irena Orović, and Nikola Žarić Abstract A new procedure for watermarking in the 8x8
More informationImproved Polynomial Detectors for Side-Informed Watermarking
Improved Polynomial Detectors for Side-Informed Watermarking Jonathan Delhumeau, Teddy Furon, Guénolé Silvestre, Neil Hurley To cite this version: Jonathan Delhumeau, Teddy Furon, Guénolé Silvestre, Neil
More informationTemplates, Image Pyramids, and Filter Banks
Templates, Image Pyramids, and Filter Banks 09/9/ Computer Vision James Hays, Brown Slides: Hoiem and others Review. Match the spatial domain image to the Fourier magnitude image 2 3 4 5 B A C D E Slide:
More informationEdge Detection. Introduction to Computer Vision. Useful Mathematics Funcs. The bad news
Edge Detection Introduction to Computer Vision CS / ECE 8B Thursday, April, 004 Edge detection (HO #5) Edge detection is a local area operator that seeks to find significant, meaningful changes in image
More informationAccurate Orthogonal Circular Moment Invariants of Gray-Level Images
Journal of Computer Science 7 (5): 75-722, 20 ISSN 549-3636 20 Science Publications Accurate Orthogonal Circular Moment Invariants of Gray-Level Images Khalid Mohamed Hosny Department of Computer Science,
More informationObject Recognition Using Local Characterisation and Zernike Moments
Object Recognition Using Local Characterisation and Zernike Moments A. Choksuriwong, H. Laurent, C. Rosenberger, and C. Maaoui Laboratoire Vision et Robotique - UPRES EA 2078, ENSI de Bourges - Université
More informationA Hypothesis Testing Approach for Achieving Semi-fragility in Multimedia Authentication
A Hypothesis Testing Approach for Achieving Semi-fragility in Multimedia Authentication Chuhong Fei a, Deepa Kundur b, and Raymond Kwong a a University of Toronto, 10 King s College Road, Toronto, ON Canada
More informationLecture 8: Interest Point Detection. Saad J Bedros
#1 Lecture 8: Interest Point Detection Saad J Bedros sbedros@umn.edu Last Lecture : Edge Detection Preprocessing of image is desired to eliminate or at least minimize noise effects There is always tradeoff
More informationGeometric Invariant Semi-fragile Image Watermarking Using Real Symmetric Matrix
Tamkang Journal of Science and Engineering, Vol. 10, No. 3, pp. 211220 (2007) 211 Geometric Invariant Semi-fragile Image Watermarking Using Real Symmetric Matrix Ching-Tang Hsieh 1 *, Yeh-Kuang Wu 1 and
More informationA Vision-Based Masking Model for Spread-Spectrum Image Watermarking
A Vision-Based Masking Model for Spread-Spectrum Image Watermarking Martin Kutter and Stefan Winkler Signal Processing Laboratory Swiss Federal Institute of Technology 5 Lausanne, Switzerland http://ltswww.epfl.ch/
More informationResearch Article Reverse-Engineering a Watermark Detector Using an Oracle
Hindawi Publishing Corporation EURASIP Journal on Information Security Volume 27, Article ID 4334, 7 pages doi:1.1155/27/4334 Research Article Reverse-Engineering a Watermark Detector Using an Oracle Scott
More informationImage matching. by Diva Sian. by swashford
Image matching by Diva Sian by swashford Harder case by Diva Sian by scgbt Invariant local features Find features that are invariant to transformations geometric invariance: translation, rotation, scale
More informationResearch Article Effect of Different Places in Applying Laplacian Filter on the Recovery Algorithm in Spatial Domain Watermarking
Research Journal of Applied Sciences, Engineering and Technology 7(24): 5157-5162, 2014 DOI:10.19026/rjaset.7.912 ISSN: 2040-7459; e-issn: 2040-7467 2014 Maxwell Scientific Publication Corp. Submitted:
More informationDigital Watermark Detection in Visual Multimedia Content
Digital Watermark Detection in Visual Multimedia Content PhD Thesis Defense Peter Meerwald Dept. of Computer Sciences, University of Salzburg September 2010 Watermarking Watermarking is a technology to
More informationECE Digital Image Processing and Introduction to Computer Vision
ECE592-064 Digital Image Processing and Introduction to Computer Vision Depart. of ECE, NC State University Instructor: Tianfu (Matt) Wu Spring 2017 Outline Recap, image degradation / restoration Template
More informationCapacity of Full Frame DCT Image Watermarks
1450 IEEE TRANSACTIONS ON IMAGE PROCESSING, VOL. 9, NO. 8, AUGUST 2000 is always better when the nonseparable algorithm is used (around 1 db) compared with the separable approach. Nevertheless, the quality
More informationPractical Watermarking scheme based on Wide Spread Spectrum and Game Theory
Practical Watermarking scheme based on Wide Spread Spectrum and Game Theory Stéphane Pateux,Gaëtan Le Guelvouit IRISA / INRIA-Rennes Campus de Beaulieu 35042 Rennes Cedex, FRANCE. Abstract In this paper,
More informationCS4670: Computer Vision Kavita Bala. Lecture 7: Harris Corner Detec=on
CS4670: Computer Vision Kavita Bala Lecture 7: Harris Corner Detec=on Announcements HW 1 will be out soon Sign up for demo slots for PA 1 Remember that both partners have to be there We will ask you to
More informationDetection of Copy-Rotate-Move Forgery Using Zernike Moments
Detection of Copy-Rotate-Move Forgery Using Zernike Moments Seung-Jin Ryu, Min-Jeong Lee, and Heung-Kyu Lee Department of Computer Science, Korea Advanced Institute of Science and Technology, Daejeon,
More informationGiven a feature in I 1, how to find the best match in I 2?
Feature Matching 1 Feature matching Given a feature in I 1, how to find the best match in I 2? 1. Define distance function that compares two descriptors 2. Test all the features in I 2, find the one with
More informationHalftone Image Watermarking by Content Aware Double-sided Embedding Error Diffusion
1 Halftone Image Watermarking by Content Aware Double-sided Embedding Error Diffusion Yuanfang Guo, Member, IEEE, Oscar C. Au, Fellow, IEEE, Rui Wang, Member, IEEE, Lu Fang, Member, IEEE, Xiaochun Cao,
More informationWatermark Extraction Optimization Using PSO Algorithm
Research Journal of Applied Sciences, Engineering and Technology 5(12): 3312-3319, 2013 ISS: 2040-7459; e-iss: 2040-7467 Maxwell Scientific Organization, 2013 Submitted: June 09, 2012 Accepted: July 18,
More informationWitsenhausen s counterexample and its links with multimedia security problems
Witsenhausen s counterexample and its links with multimedia security problems Pedro Comesaña-Alfaro Fernando Pérez-González Chaouki T. Abdallah IWDW 2011 Atlantic City, New Jersey Outline Introduction
More informationEmpirical Analysis of Invariance of Transform Coefficients under Rotation
International Journal of Engineering Research and Development e-issn: 2278-67X, p-issn: 2278-8X, www.ijerd.com Volume, Issue 5 (May 25), PP.43-5 Empirical Analysis of Invariance of Transform Coefficients
More informationA Framework for Optimizing Nonlinear Collusion Attacks on Fingerprinting Systems
A Framework for Optimizing onlinear Collusion Attacks on Fingerprinting Systems egar iyavash Department of Electrical and Computer Engineering University of Illinois at Urbana-Champaign Coordinated Science
More informationQuantization Index Modulation using the E 8 lattice
1 Quantization Index Modulation using the E 8 lattice Qian Zhang and Nigel Boston Dept of Electrical and Computer Engineering University of Wisconsin Madison 1415 Engineering Drive, Madison, WI 53706 Email:
More informationAn Image Watermarking Based on the pdf Modeling and Quantization Effects in the Wavelet Domain
An Image Watermarking Based on the pdf Modeling and Quantization Effects in the Wavelet Domain Irena Orović, Milica Orlandić and Srdjan Stanković Faculty of Electrical Engineering, University of Montenegro
More informationLecture 8: Interest Point Detection. Saad J Bedros
#1 Lecture 8: Interest Point Detection Saad J Bedros sbedros@umn.edu Review of Edge Detectors #2 Today s Lecture Interest Points Detection What do we mean with Interest Point Detection in an Image Goal:
More informationOld painting digital color restoration
Old painting digital color restoration Michail Pappas Ioannis Pitas Dept. of Informatics, Aristotle University of Thessaloniki GR-54643 Thessaloniki, Greece Abstract Many old paintings suffer from the
More informationMultiscale Image Transforms
Multiscale Image Transforms Goal: Develop filter-based representations to decompose images into component parts, to extract features/structures of interest, and to attenuate noise. Motivation: extract
More informationSIFT: Scale Invariant Feature Transform
1 SIFT: Scale Invariant Feature Transform With slides from Sebastian Thrun Stanford CS223B Computer Vision, Winter 2006 3 Pattern Recognition Want to find in here SIFT Invariances: Scaling Rotation Illumination
More informationScience Insights: An International Journal
Available online at http://www.urpjournals.com Science Insights: An International Journal Universal Research Publications. All rights reserved ISSN 2277 3835 Original Article Object Recognition using Zernike
More informationChapter 4: Filtering in the Frequency Domain. Fourier Analysis R. C. Gonzalez & R. E. Woods
Fourier Analysis 1992 2008 R. C. Gonzalez & R. E. Woods Properties of δ (t) and (x) δ : f t) δ ( t t ) dt = f ( ) f x) δ ( x x ) = f ( ) ( 0 t0 x= ( 0 x0 1992 2008 R. C. Gonzalez & R. E. Woods Sampling
More informationSpatially adaptive alpha-rooting in BM3D sharpening
Spatially adaptive alpha-rooting in BM3D sharpening Markku Mäkitalo and Alessandro Foi Department of Signal Processing, Tampere University of Technology, P.O. Box FIN-553, 33101, Tampere, Finland e-mail:
More informationUsing Entropy and 2-D Correlation Coefficient as Measuring Indices for Impulsive Noise Reduction Techniques
Using Entropy and 2-D Correlation Coefficient as Measuring Indices for Impulsive Noise Reduction Techniques Zayed M. Ramadan Department of Electronics and Communications Engineering, Faculty of Engineering,
More informationAn Invariance Property of the Generalized Likelihood Ratio Test
352 IEEE SIGNAL PROCESSING LETTERS, VOL. 10, NO. 12, DECEMBER 2003 An Invariance Property of the Generalized Likelihood Ratio Test Steven M. Kay, Fellow, IEEE, and Joseph R. Gabriel, Member, IEEE Abstract
More informationCS5670: Computer Vision
CS5670: Computer Vision Noah Snavely Lecture 5: Feature descriptors and matching Szeliski: 4.1 Reading Announcements Project 1 Artifacts due tomorrow, Friday 2/17, at 11:59pm Project 2 will be released
More informationRotation, Scale and Translation Resilient Public Watermarking for Images
Roaion Scale and Translaion Resilien Public Waermarking or Images Ching-Yung Lin a Min Wu b Jerey A. Bloom c Ma L. Miller c Ingemar J. Cox c Yui Man Lui d a Columbia Universiy New York NY b Princeon Universiy
More informationFeature extraction: Corners and blobs
Feature extraction: Corners and blobs Review: Linear filtering and edge detection Name two different kinds of image noise Name a non-linear smoothing filter What advantages does median filtering have over
More informationCFAR TARGET DETECTION IN TREE SCATTERING INTERFERENCE
CFAR TARGET DETECTION IN TREE SCATTERING INTERFERENCE Anshul Sharma and Randolph L. Moses Department of Electrical Engineering, The Ohio State University, Columbus, OH 43210 ABSTRACT We have developed
More informationNoise Benefits in Quantizer-Array Correlation Detection and Watermark Decoding
To appear in the IEEE Transactions on Signal Processing Current draft: 9 November 010 Noise Benefits in Quantizer-Array Correlation Detection and Watermark Decoding Ashok Patel, Member IEEE, and Bart Kosko,
More informationCorners, Blobs & Descriptors. With slides from S. Lazebnik & S. Seitz, D. Lowe, A. Efros
Corners, Blobs & Descriptors With slides from S. Lazebnik & S. Seitz, D. Lowe, A. Efros Motivation: Build a Panorama M. Brown and D. G. Lowe. Recognising Panoramas. ICCV 2003 How do we build panorama?
More informationEMBEDDING STRENGTH CRITERIA FOR AWGN WATERMARK, ROBUST AGAINST EXPECTED DISTORTION
Computing and Informatics, Vol. 29, 2010, 357 387 EMBEDDING STRENGTH CRITERIA FOR AWGN WATERMARK, ROBUST AGAINST EXPECTED DISTORTION Vesna Vučković Faculty of Mathematics Studentski trg 16 11000 Belgrade,
More informationRecovery of Low-Rank Plus Compressed Sparse Matrices with Application to Unveiling Traffic Anomalies
July 12, 212 Recovery of Low-Rank Plus Compressed Sparse Matrices with Application to Unveiling Traffic Anomalies Morteza Mardani Dept. of ECE, University of Minnesota, Minneapolis, MN 55455 Acknowledgments:
More informationISeCure. Nowadays, copyright infringement, unauthorized. The ISC Int'l Journal of Information Security
The ISC Int'l Journal of Information Security July 216, Volume 8, Number 2 (pp. 131 139) http://www.isecure-journal.org Optimum Decoder for Multiplicative Spread Spectrum Image Watermarking with Laplacian
More informationSecurity Analysis of ISS Watermarking Using Natural Scene Statistics
Security Analysis of ISS Watermarking Using Natural Scene Statistics Dong Zhang 1, Jiangqun Ni 1, Qiping Zeng 1, Dah-Jye Lee 2, and Jiwu Huang 1 1 School of Information Science and Technology, Sun Yat-sen
More informationEXTRACTION OF PARKING LOT STRUCTURE FROM AERIAL IMAGE IN URBAN AREAS. Received September 2015; revised January 2016
International Journal of Innovative Computing, Information and Control ICIC International c 2016 ISSN 1349-4198 Volume 12, Number 2, April 2016 pp. 371 383 EXTRACTION OF PARKING LOT STRUCTURE FROM AERIAL
More informationEdge Detection PSY 5018H: Math Models Hum Behavior, Prof. Paul Schrater, Spring 2005
Edge Detection PSY 5018H: Math Models Hum Behavior, Prof. Paul Schrater, Spring 2005 Gradients and edges Points of sharp change in an image are interesting: change in reflectance change in object change
More informationHarris Corner Detector
Multimedia Computing: Algorithms, Systems, and Applications: Feature Extraction By Dr. Yu Cao Department of Computer Science The University of Massachusetts Lowell Lowell, MA 01854, USA Part of the slides
More informationSteganalysis of Spread Spectrum Data Hiding Exploiting Cover Memory
Steganalysis of Spread Spectrum Data Hiding Exploiting Cover Memory Kenneth Sullivan, Upamanyu Madhow, Shivkumar Chandrasekaran, and B.S. Manjunath Department of Electrical and Computer Engineering University
More informationA New Two-dimensional Empirical Mode Decomposition Based on Classical Empirical Mode Decomposition and Radon Transform
A New Two-dimensional Empirical Mode Decomposition Based on Classical Empirical Mode Decomposition and Radon Transform Zhihua Yang and Lihua Yang Abstract This paper presents a new twodimensional Empirical
More informationPerformance Analysis of Spread Spectrum CDMA systems
1 Performance Analysis of Spread Spectrum CDMA systems 16:33:546 Wireless Communication Technologies Spring 5 Instructor: Dr. Narayan Mandayam Summary by Liang Xiao lxiao@winlab.rutgers.edu WINLAB, Department
More informationA New Quantum Watermarking Based on Quantum Wavelet Transforms
Commun. Theor. Phys. 67 207 732 742 Vol. 67, No. 6, June, 207 A New Quantum Watermarking Based on Quantum Wavelet Transforms Shahrokh Heidari, Mosayeb Naseri, 2, Reza Gheibi, 3 Masoud Baghfalaki, 4 Mohammad
More informationStego key searching for LSB steganography on JPEG decompressed image
. RESEARCH PAPER. SCIENCE CHINA Information Sciences March 2016, Vol. 59 032105:1 032105:15 doi: 10.1007/s11432-015-5367-x Stego key searching for LSB steganography on JPEG decompressed image Jiufen LIU
More informationRoadmap. Introduction to image analysis (computer vision) Theory of edge detection. Applications
Edge Detection Roadmap Introduction to image analysis (computer vision) Its connection with psychology and neuroscience Why is image analysis difficult? Theory of edge detection Gradient operator Advanced
More informationNOISE can sometimes improve nonlinear signal processing
488 IEEE TRANSACTIONS ON SIGNAL PROCESSING, VOL. 59, NO. 2, FEBRUARY 2011 Noise Benefits in Quantizer-Array Correlation Detection and Watermark Decoding Ashok Patel, Member, IEEE, and Bart Kosko, Fellow,
More informationVarious Shape Descriptors in Image Processing A Review
Various Shape Descriptors in Image Processing A Review Preetika D Silva 1, P. Bhuvaneswari 2 1 PG Student, Department of Electronics and Communication, Rajarajeswari College of Engineering, Bangalore,
More informationFeature Vector Similarity Based on Local Structure
Feature Vector Similarity Based on Local Structure Evgeniya Balmachnova, Luc Florack, and Bart ter Haar Romeny Eindhoven University of Technology, P.O. Box 53, 5600 MB Eindhoven, The Netherlands {E.Balmachnova,L.M.J.Florack,B.M.terHaarRomeny}@tue.nl
More informationDetectors part II Descriptors
EECS 442 Computer vision Detectors part II Descriptors Blob detectors Invariance Descriptors Some slides of this lectures are courtesy of prof F. Li, prof S. Lazebnik, and various other lecturers Goal:
More informationA Chaotic Encryption System Using PCA Neural Networks
A Chaotic Encryption System Using PCA Neural Networks Xiao Fei, Guisong Liu, Bochuan Zheng Computational Intelligence Laboratory, School of Computer Science and Engineering, University of Electronic Science
More informationAbout zero bit watermarking error exponents
About zero bit watermarking error exponents Teddy Furon To cite this version: Teddy Furon. About zero bit watermarking error exponents. ICASS2017 - IEEE International Conference on Acoustics, Speech and
More informationEdge Detection. CS 650: Computer Vision
CS 650: Computer Vision Edges and Gradients Edge: local indication of an object transition Edge detection: local operators that find edges (usually involves convolution) Local intensity transitions are
More informationA NO-REFERENCE SHARPNESS METRIC SENSITIVE TO BLUR AND NOISE. Xiang Zhu and Peyman Milanfar
A NO-REFERENCE SARPNESS METRIC SENSITIVE TO BLUR AND NOISE Xiang Zhu and Peyman Milanfar Electrical Engineering Department University of California at Santa Cruz, CA, 9564 xzhu@soeucscedu ABSTRACT A no-reference
More informationEmpirical Mean and Variance!
Global Image Properties! Global image properties refer to an image as a whole rather than components. Computation of global image properties is often required for image enhancement, preceding image analysis.!
More informationAdvanced Features. Advanced Features: Topics. Jana Kosecka. Slides from: S. Thurn, D. Lowe, Forsyth and Ponce. Advanced features and feature matching
Advanced Features Jana Kosecka Slides from: S. Thurn, D. Lowe, Forsyth and Ponce Advanced Features: Topics Advanced features and feature matching Template matching SIFT features Haar features 2 1 Features
More informationLecture 3: Linear Filters
Lecture 3: Linear Filters Professor Fei Fei Li Stanford Vision Lab 1 What we will learn today? Images as functions Linear systems (filters) Convolution and correlation Discrete Fourier Transform (DFT)
More informationFiltering and Edge Detection
Filtering and Edge Detection Local Neighborhoods Hard to tell anything from a single pixel Example: you see a reddish pixel. Is this the object s color? Illumination? Noise? The next step in order of complexity
More informationSource Coding for Compression
Source Coding for Compression Types of data compression: 1. Lossless -. Lossy removes redundancies (reversible) removes less important information (irreversible) Lec 16b.6-1 M1 Lossless Entropy Coding,
More informationEXPURGATED GAUSSIAN FINGERPRINTING CODES. Pierre Moulin and Negar Kiyavash
EXPURGATED GAUSSIAN FINGERPRINTING CODES Pierre Moulin and Negar iyavash Beckman Inst, Coord Sci Lab and ECE Department University of Illinois at Urbana-Champaign, USA ABSTRACT This paper analyzes the
More informationFiltering in Frequency Domain
Dr. Praveen Sankaran Department of ECE NIT Calicut February 4, 2013 Outline 1 2D DFT - Review 2 2D Sampling 2D DFT - Review 2D Impulse Train s [t, z] = m= n= δ [t m T, z n Z] (1) f (t, z) s [t, z] sampled
More informationA New Efficient Method for Producing Global Affine Invariants
A New Efficient Method for Producing Global Affine Invariants Esa Rahtu, Mikko Salo 2, and Janne Heikkilä Machine Vision Group, Department of Electrical and Information Engineering, P.O. Box 45, 94 University
More informationA new class of shift-invariant operators
1 A new class of shift-invariant operators Janne Heiilä Machine Vision Group Department of Electrical and Information Engineering P.O. Box 4500, 90014 University of Oulu, Finland Tel.: +358 8 553 2786,
More informationImage Segmentation: Definition Importance. Digital Image Processing, 2nd ed. Chapter 10 Image Segmentation.
: Definition Importance Detection of Discontinuities: 9 R = wi z i= 1 i Point Detection: 1. A Mask 2. Thresholding R T Line Detection: A Suitable Mask in desired direction Thresholding Line i : R R, j
More informationL-statistics based Modification of Reconstruction Algorithms for Compressive Sensing in the Presence of Impulse Noise
L-statistics based Modification of Reconstruction Algorithms for Compressive Sensing in the Presence of Impulse Noise Srdjan Stanković, Irena Orović and Moeness Amin 1 Abstract- A modification of standard
More informationEdge Detection. Computer Vision P. Schrater Spring 2003
Edge Detection Computer Vision P. Schrater Spring 2003 Simplest Model: (Canny) Edge(x) = a U(x) + n(x) U(x)? x=0 Convolve image with U and find points with high magnitude. Choose value by comparing with
More informationLecture 3: Linear Filters
Lecture 3: Linear Filters Professor Fei Fei Li Stanford Vision Lab 1 What we will learn today? Images as functions Linear systems (filters) Convolution and correlation Discrete Fourier Transform (DFT)
More informationTitle: Watermark Estimation Through Detector Observations Author: Ton Kalker Conference: Benelux Signal Processing Symposium 98 Date and location:
Title: Watermark Estimation Through Detector Observations Author: Ton Kalker Conference: Benelux Signal Processing Symposium 98 Date and location: March 98, Leuven, Belgium Watermark Estimation Through
More informationLecture 8: Signal Detection and Noise Assumption
ECE 830 Fall 0 Statistical Signal Processing instructor: R. Nowak Lecture 8: Signal Detection and Noise Assumption Signal Detection : X = W H : X = S + W where W N(0, σ I n n and S = [s, s,..., s n ] T
More informationVlad Estivill-Castro (2016) Robots for People --- A project for intelligent integrated systems
1 Vlad Estivill-Castro (2016) Robots for People --- A project for intelligent integrated systems V. Estivill-Castro 2 Perception Concepts Vision Chapter 4 (textbook) Sections 4.3 to 4.5 What is the course
More informationLecture 3. The Population Variance. The population variance, denoted σ 2, is the sum. of the squared deviations about the population
Lecture 5 1 Lecture 3 The Population Variance The population variance, denoted σ 2, is the sum of the squared deviations about the population mean divided by the number of observations in the population,
More information