ROTATION, TRANSLATION AND SCALING INVARIANT WATERMARKING USING A GENERALIZED RADON TRANSFORMATION

Size: px
Start display at page:

Download "ROTATION, TRANSLATION AND SCALING INVARIANT WATERMARKING USING A GENERALIZED RADON TRANSFORMATION"

Transcription

1 ROTATION, TRANSLATION AND SCALING INVARIANT WATERMARKING USING A GENERALIZED RADON TRANSFORMATION D. SIMITOPOULOS, A. OIKONOMOPOULOS, AND M. G. STRINTZIS Aristotle University of Thessaloniki Electrical and Computer Engineering Dept. Thessaloniki, Greece A watermarking scheme able to resist geometric attacks is presented in this paper. The watermark embedding and detection are performed in a domain which is invariant to geometric attacks such as rotation, scaling and translation. The invariant domain is derived by applying a new generalized Radon transform to the image. The ability of the proposed method to withstand geometric attacks is evaluated experimentally. 1. Introduction Digital image watermarking is a technology which has attracted many researchers in the past few years. A lot of watermarking techniques are laying emphasis on robustness against common digital image processing operations, such as compression or filtering. However it is clear that even the smallest geometric distortions can irreparably harm the detection process of a watermarking scheme due to loss of synchronization between the embedded and the correlating watermark. These geometric distortions usually include translation, rotation and scaling (RST) operations which can be easily applied on an image. Recently, many watermarking techniques have been proposed which are oriented towards robustness against geometric attacks. In some approaches an additional pattern is embedded in the image along with the watermark in order to be able to revert the geometric attack 1. There are also watermarking methods 2, where the embedding and detection processes are taking place in a domain which is invariant to geometric transformations. The watermarking technique presented in this paper is based on the latter approach for resisting geometric attacks. First, a corner detection scheme detects corners in the image content and finds the most robust among them. This corner is used as an origin for a new generalized Radon transform (GRT) 3 followed by a two dimensional Fourier Transform. Through this sequence of transformations 1

2 2 an invariant to RST attacks domain is created. The watermark is embedded in this domain, and then, by applying the inverse sequence of transformations we obtain the watermarked image. A correlation-based detection scheme is applied in order to detect the existence of the watermark. The detection is blind, i.e. the original image is not required. The detection is performed in the invariant domain in order to ensure that the embedded and the correlating watermark will be synchronized even in the case of geometric attacks. The resistance of the proposed scheme is demonstrated through experimental results. 2. RST invariance using the Spiral Integration Transform In order to achieve robustness to translation a Harris corner detector 4 is first applied to the image. In this way a set of corners in the image content is detected and the most robust among them is selected. This corner is used as an origin for the application of a new generalized Radon transform, the Spiral Integration Transform (SIT), which is applied in order to achieve robustness against rotation and scaling. If f(r, φ) is the image in a polar coordinate system, the SIT of f(r, φ) is the integral of f(r, φ) along the line (in a polar coordinate system) given by r = e a (φ ω), r [, + ). This line (see Fig.1a) in the polar coordinate system, corresponds to a spire (see Fig.1b) in a cartesian coordinate system. The SIT is given by: Figure 1. system. r S f (a, ω) = ω Integration path 2π e a = tan(z) (a) z φ f(r, φ)δ(r e a (φ ω))rdrdφ (1) (b) Most robust corner The integration path in (a) the polar coordinate system and (b) the cartesian coordinate Consider now the rotated by φ and scaled by b image g(r, φ) =f ( r b,φ φ ) written in a polar coordinate system. The SIT of this image will be: S g (a, ω) =b S f (a ln(b),ω φ ) (2)

3 3 Therefore, the SIT of the scaled and rotated image is translated by log(b) along the a axis and cyclically shifted by φ along the ω axis, and its magnitude is scaled by b. Since the DFT magnitude is translation invariant 2, using equation (2) it is easy to show that A g = b A f, where A f and A g are the magnitudes of the spectrum of S g and S f respectively. As can be seen, the magnitude of the SIT spectrum of the scaled and rotated image is only scaled by b. However, we need not be concerned with the magnitude scaling of the spectrum, since we intend to use a correlation-based detector that is invariant to scaling. Therefore, it is clear that the magnitude of the SIT spectrum is invariant to rotation and scaling. In addition, due to the use of the corner detection scheme for selecting the origin of SIT, invariance to image translation is achieved. 3. Embedding As shown in section 2 the magnitude of the SIT spectrum of an image f(x, y) is invariant to RST operations. For this reason, the watermark embedding and detection should take place in this domain. However, if the watermark is added to the magnitude of the SIT spectrum, then the inverse transformations (IDFT, inverse SIT and inverse polar mapping) should be applied to the watermarked spectrum in order to obtain the watermarked image in the spatial domain. In such a case the original image may be degraded by the transformations. For this reason, after the watermark is embedded in the magnitude of the SIT spectrum and IDFT is applied, we subtract the SIT of the original image from the SIT of the watermarked image. In this way a representation of the watermark in the SIT domain is obtained and after inverse SIT and inverse polar mapping are applied, the spatial representation of the watermark is additively embedded in the original image. This is depicted in Fig. 2 and is described in detail in the following. The watermark W is the product of a zero-mean random sequence of the values +1 and -1 and the constant embedding strength factor h. A secret key is used in order to produce a seed for the watermark sequence generation. In order to ensure that the IDFT of the watermark is real, the watermark values should comply to the following rule: W (k, n) =W ( k, n). For this reason, first the watermark is generated in the first and the fourth quadrant of the spectrum, and then the generated watermark is duplicated in the third and the second quadrant respectively. In addition, the area of the spectrum in which the watermark is embedded, is a ring-shaped area that covers the middle frequencies: {, if ρ < R1 and ρ > R W (ρ, θ) = 2 (3) ±1 if R 1 <ρ<r 2 where ρ = k 2 + n 2 and θ = arctan(n/k). This area was selected for two

4 4 User ID Watermark Magnitude + DFT Phase X IDFT Watermarked DFT - SIT SIT of the watermark Polar Mapping Inverse SIT Harris Corner Detector Original Image Inverse Polar Mapping + Watermarked Image Figure 2. Block diagram of the embedding process. reasons. Firstly, it was found that very high valued coefficients appear in the low frequencies of the SIT spectrum. After experimenting with various images, it was found that these outliers deteriorate the detector performance and for this reason embedding and detection in this area was avoided. In addition, the magnitude of the SIT spectrum in the high frequencies is generally small. In a significant number of these coefficients it is smaller than the embedding strength h and these coefficients may be zeroed after embedding. Therefore, the high frequencies were also not used for embedding and detection. After the watermark generation process is completed, the watermark coefficients W (k, n) are added to the SIT spectrum magnitude values A(k, n). Then IDFT is applied and the resulting SIT of the watermarked image is subtracted from the original SIT. The SIT of the watermark is obtained, which must be transferred to the spatial domain so that it can be added to the original image. As mentioned in section 2, each element of the SIT domain is the result of an integration along a line of the form r = e a (φ ω) in a polar coordinate system. In

5 5 order to invert the SIT of the watermark, each SIT coefficient is distributed along the pixels belonging to the corresponding line. This means that the value of each SIT coefficient is divided by the number of pixels that exist in each line and the resulting value is added to every pixel that belongs to the corresponding line. This leads to a representation of the watermark in the polar coordinate system. The final stage of the embedding process includes transformation of the watermark from the polar representation to the spatial domain and addition to the original image. 4. Detection For the detection of the watermark a correlation-based scheme is applied. The detection process can be divided into the following steps: First, the most robust corner of the test image is detected. Then, the SIT is applied to the test image. In the following, the DFT is applied to the SIT of the image and its magnitude is obtained. The symmetrical watermark W is created using the owner s secret ID as described in section 3. Finally, the correlation metric c between the values A(k, n) of the magnitude of the SIT spectrum, and the correlating watermark values W (k, n) is calculated: c = N 1 N 2 k= n= N 1 A(k, n) W (k, n) N 2 k= n= A(k, n) 2 (4) where N 1 and N 2 are the dimensions of the 2D-DFT image. The correlation metric c is compared to the threshold T, which is defined according to the allowed false alarm probability P FA of the detection scheme, as described in Experimental results The experiments presented in the following were performed using standard test images such as Lena, Baboon and Fishing boat. Linear interpolation was used for the SIT, the polar mapping and their inverses. Table 1. Correlation metric values under various attacks. Attacks Lena Baboon Fishing boat No attack Rotation by 45 degrees Downscaling by JPEG Q= Median filtering 3x Gaussian Noise N(,1)

6 6 Table 1 presents the correlation metric value for both the original and the attacked images. As can be seen, apart from RST attacks, filtering, noise addition and compression attacks were also tested. Furthermore, the values of the correlation metric for the watermarked image Lena (see Fig. 3a) using 5 different correlating watermarks were computed and are given in Fig. 3b. The 1th watermark is the valid correlating watermark. As can be seen, the value of c for the 1th watermark is significantly larger than other values corresponding to different watermarks. In addition, all these values are below the threshold T = 4.75 for false alarm probability P FA = Correlation metric c Threshold T (a) Watermark Figure 3. (a) Watermarked image Lena, (b) Correlator values for the watermarked image Lena using 5 different correlating watermarks. (b) 6. Conclusions In this paper a watermarking method that uses a new generalized Radon transform, the SIT transform, is presented. The proposed method offers resilience to RST attacks without using the original image in the detection. Furthermore, experimental results demonstrate that the embedded watermarks resist filtering, noise addition and compression. References 1. S. Pereira and T. Pun, Robust template matching for affine resistant image watermarks, IEEE Trans. Im. Proc., vol. 9, no. 6, pp , June J. O Ruanaidh and T. Pun, Rotation, scale and translation invariant spread spectrum digital image watermarking, Signal Processing, vol. 66, no. 3, pp , May C. H. Chapman, Generalized Radon transforms and slant stacks, Geophys. J. R. ast. Soc., vol. 66, pp , C. Harris and M. Stephen, A combined corner and edge detector, in Alvey Vision Conference, 1988, pp I. J. Cox, J. Kilian, T. Leighton, and T. Shamoon, Secure spread spectrum watermarking for multimedia, IEEE Trans. Im. Proc., vol. 6, no. 12, pp , Dec 1997.

A Modified Moment-Based Image Watermarking Method Robust to Cropping Attack

A Modified Moment-Based Image Watermarking Method Robust to Cropping Attack A Modified Moment-Based Watermarking Method Robust to Cropping Attack Tianrui Zong, Yong Xiang, and Suzan Elbadry School of Information Technology Deakin University, Burwood Campus Melbourne, Australia

More information

Watermarking in the Space/Spatial-Frequency Domain Using Two-Dimensional Radon Wigner Distribution

Watermarking in the Space/Spatial-Frequency Domain Using Two-Dimensional Radon Wigner Distribution 650 IEEE TRANSACTIONS ON IMAGE PROCESSING, VOL. 10, NO. 4, APRIL 2001 Watermarking in the Space/Spatial-Frequency Domain Using Two-Dimensional Radon Wigner Distribution Srdjan Stanković, Member, IEEE,

More information

University of Siena. Multimedia Security. Watermark extraction. Mauro Barni University of Siena. M. Barni, University of Siena

University of Siena. Multimedia Security. Watermark extraction. Mauro Barni University of Siena. M. Barni, University of Siena Multimedia Security Mauro Barni University of Siena : summary Optimum decoding/detection Additive SS watermarks Decoding/detection of QIM watermarks The dilemma of de-synchronization attacks Geometric

More information

Fast and Automatic Watermark Resynchronization based on Zernike. Moments

Fast and Automatic Watermark Resynchronization based on Zernike. Moments Fast and Automatic Watermark Resynchronization based on Zernike Moments Xiangui Kang a, Chunhui Liu a, Wenjun Zeng b, Jiwu Huang a, Congbai Liu a a Dept. of ECE., Sun Yat-Sen Univ. (Zhongshan Univ.), Guangzhou

More information

1. INTRODUCTION. Yen-Chung Chiu. Wen-Hsiang Tsai.

1. INTRODUCTION. Yen-Chung Chiu. Wen-Hsiang Tsai. Copyright Protection by Watermarking for Color Images against Rotation and Scaling Attacks Using Coding and Synchronization of Peak Locations in DFT Domain Yen-Chung Chiu Department of Computer and Information

More information

Wavelet Packet Based Digital Image Watermarking

Wavelet Packet Based Digital Image Watermarking Wavelet Packet Based Digital Image ing A.Adhipathi Reddy, B.N.Chatterji Department of Electronics and Electrical Communication Engg. Indian Institute of Technology, Kharagpur 72 32 {aar, bnc}@ece.iitkgp.ernet.in

More information

Rotation, scale and translation invariant digital image watermarking. O'RUANAIDH, Joséph John, PUN, Thierry. Abstract

Rotation, scale and translation invariant digital image watermarking. O'RUANAIDH, Joséph John, PUN, Thierry. Abstract Proceedings Chapter Rotation, scale and translation invariant digital image watermarking O'RUANAIDH, Joséph John, PUN, Thierry Abstract A digital watermark is an invisible mark embedded in a digital image

More information

Invariant Image Watermark Using Zernike Moments

Invariant Image Watermark Using Zernike Moments 766 IEEE TRANSACTIONS ON CIRCUITS AND SYSTEMS FOR VIDEO TECHNOLOGY, VOL. 13, NO. 8, AUGUST 2003 Invariant Image Watermark Using Zernike Moments Hyung Shin Kim and Heung-Kyu Lee, Member, IEEE Abstract This

More information

Double Sided Watermark Embedding and Detection with Perceptual Analysis

Double Sided Watermark Embedding and Detection with Perceptual Analysis DOUBLE SIDED WATERMARK EMBEDDIG AD DETECTIO WITH PERCEPTUAL AALYSIS Double Sided Watermark Embedding and Detection with Perceptual Analysis Jidong Zhong and Shangteng Huang Abstract In our previous work,

More information

Digital Image Watermarking Algorithm Based on Wavelet Packet

Digital Image Watermarking Algorithm Based on Wavelet Packet www.ijcsi.org 403 Digital Image ing Algorithm Based on Wavelet Packet 1 A.Geetha, 2 B.Vijayakumari, 3 C.Nagavani, 4 T.Pandiselvi 1 3 4 Faculty of Kamaraj College of Engineering and Technology Department

More information

SCALE INVARIANT AND ROTATION INVARIANT IMAGE WATERMARKING. Spandana Bodapati. Bachelor of Science. Jawaharlal Nehru Technological University

SCALE INVARIANT AND ROTATION INVARIANT IMAGE WATERMARKING. Spandana Bodapati. Bachelor of Science. Jawaharlal Nehru Technological University SCALE INVARIANT AND ROTATION INVARIANT IMAGE WATERMARKING By Spandana Bodapati Bachelor of Science Jawaharlal Nehru Technological University Hyderabad, India 200 Submitted to the Faculty of the Graduate

More information

Study of Wavelet Functions of Discrete Wavelet Transformation in Image Watermarking

Study of Wavelet Functions of Discrete Wavelet Transformation in Image Watermarking Study of Wavelet Functions of Discrete Wavelet Transformation in Image Watermarking Navdeep Goel 1,a, Gurwinder Singh 2,b 1ECE Section, Yadavindra College of Engineering, Talwandi Sabo 2Research Scholar,

More information

A Method for Blur and Similarity Transform Invariant Object Recognition

A Method for Blur and Similarity Transform Invariant Object Recognition A Method for Blur and Similarity Transform Invariant Object Recognition Ville Ojansivu and Janne Heikkilä Machine Vision Group, Department of Electrical and Information Engineering, University of Oulu,

More information

Spread Spectrum Watermarking. Information Technologies for IPR Protection

Spread Spectrum Watermarking. Information Technologies for IPR Protection Spread Spectrum Watermarking Information Technologies for IPR Protection Spread Spectrum Communication A Narrow-band signal is transmitted over a much larger bandwidth such that the signal energy presented

More information

Quantization Based Watermarking Methods Against Valumetric Distortions

Quantization Based Watermarking Methods Against Valumetric Distortions International Journal of Automation and Computing 14(6), December 2017, 672-685 DOI: 10.1007/s11633-016-1010-6 Quantization Based Watermarking Methods Against Valumetric Distortions Zai-Ran Wang 1,2 Jing

More information

Abstract The aim of this paper is to improve the performance of spatial domain watermarking. To this end, a new perceptual mask

Abstract The aim of this paper is to improve the performance of spatial domain watermarking. To this end, a new perceptual mask Efficient Spatial Image Watermarking via New Perceptual Masking and Blind Detection Schemes Irene G. Karybali, Member, IEEE, and Kostas Berberidis, Member, IEEE Abstract The aim of this paper is to improve

More information

1782 IEEE TRANSACTIONS ON IMAGE PROCESSING, VOL. 18, NO. 8, AUGUST 2009

1782 IEEE TRANSACTIONS ON IMAGE PROCESSING, VOL. 18, NO. 8, AUGUST 2009 1782 IEEE TRANSACTIONS ON IMAGE PROCESSING, VOL. 18, NO. 8, AUGUST 2009 A New Statistical Detector for DWT-Based Additive Image Watermarking Using the Gauss Hermite Expansion S. M. Mahbubur Rahman, M.

More information

This is a repository copy of The effect of quality scalable image compression on robust watermarking.

This is a repository copy of The effect of quality scalable image compression on robust watermarking. This is a repository copy of The effect of quality scalable image compression on robust watermarking. White Rose Research Online URL for this paper: http://eprints.whiterose.ac.uk/7613/ Conference or Workshop

More information

IEEE TRANSACTIONS ON IMAGE PROCESSING, VOL. 20, NO. 8, AUGUST

IEEE TRANSACTIONS ON IMAGE PROCESSING, VOL. 20, NO. 8, AUGUST IEEE TRANSACTIONS ON IMAGE PROCESSING, VOL 20, NO 8, AUGUST 2011 2189 Affine Legendre Moment Invariants for Image Watermarking Robust to Geometric Distortions Hui Zhang, Member, IEEE, Huazhong Shu, Senior

More information

DATA-HIDING codes have been widely used for embedding

DATA-HIDING codes have been widely used for embedding 284 IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, VOL. 4, NO. 3, SEPTEMBER 2009 On Estimation Accuracy of Desynchronization Attack Channel Parameters Shankar Sadasivam, Student Member, IEEE,

More information

Robust Watermarking Procedure based on JPEG-DCT Image Compression

Robust Watermarking Procedure based on JPEG-DCT Image Compression TIME-FREQUENCY SIGNAL ANALYSIS 1649 Robust Watermarking Procedure based on JPEG-DCT Image Compression Srdjan Stanković, Irena Orović, and Nikola Žarić Abstract A new procedure for watermarking in the 8x8

More information

Improved Polynomial Detectors for Side-Informed Watermarking

Improved Polynomial Detectors for Side-Informed Watermarking Improved Polynomial Detectors for Side-Informed Watermarking Jonathan Delhumeau, Teddy Furon, Guénolé Silvestre, Neil Hurley To cite this version: Jonathan Delhumeau, Teddy Furon, Guénolé Silvestre, Neil

More information

Templates, Image Pyramids, and Filter Banks

Templates, Image Pyramids, and Filter Banks Templates, Image Pyramids, and Filter Banks 09/9/ Computer Vision James Hays, Brown Slides: Hoiem and others Review. Match the spatial domain image to the Fourier magnitude image 2 3 4 5 B A C D E Slide:

More information

Edge Detection. Introduction to Computer Vision. Useful Mathematics Funcs. The bad news

Edge Detection. Introduction to Computer Vision. Useful Mathematics Funcs. The bad news Edge Detection Introduction to Computer Vision CS / ECE 8B Thursday, April, 004 Edge detection (HO #5) Edge detection is a local area operator that seeks to find significant, meaningful changes in image

More information

Accurate Orthogonal Circular Moment Invariants of Gray-Level Images

Accurate Orthogonal Circular Moment Invariants of Gray-Level Images Journal of Computer Science 7 (5): 75-722, 20 ISSN 549-3636 20 Science Publications Accurate Orthogonal Circular Moment Invariants of Gray-Level Images Khalid Mohamed Hosny Department of Computer Science,

More information

Object Recognition Using Local Characterisation and Zernike Moments

Object Recognition Using Local Characterisation and Zernike Moments Object Recognition Using Local Characterisation and Zernike Moments A. Choksuriwong, H. Laurent, C. Rosenberger, and C. Maaoui Laboratoire Vision et Robotique - UPRES EA 2078, ENSI de Bourges - Université

More information

A Hypothesis Testing Approach for Achieving Semi-fragility in Multimedia Authentication

A Hypothesis Testing Approach for Achieving Semi-fragility in Multimedia Authentication A Hypothesis Testing Approach for Achieving Semi-fragility in Multimedia Authentication Chuhong Fei a, Deepa Kundur b, and Raymond Kwong a a University of Toronto, 10 King s College Road, Toronto, ON Canada

More information

Lecture 8: Interest Point Detection. Saad J Bedros

Lecture 8: Interest Point Detection. Saad J Bedros #1 Lecture 8: Interest Point Detection Saad J Bedros sbedros@umn.edu Last Lecture : Edge Detection Preprocessing of image is desired to eliminate or at least minimize noise effects There is always tradeoff

More information

Geometric Invariant Semi-fragile Image Watermarking Using Real Symmetric Matrix

Geometric Invariant Semi-fragile Image Watermarking Using Real Symmetric Matrix Tamkang Journal of Science and Engineering, Vol. 10, No. 3, pp. 211220 (2007) 211 Geometric Invariant Semi-fragile Image Watermarking Using Real Symmetric Matrix Ching-Tang Hsieh 1 *, Yeh-Kuang Wu 1 and

More information

A Vision-Based Masking Model for Spread-Spectrum Image Watermarking

A Vision-Based Masking Model for Spread-Spectrum Image Watermarking A Vision-Based Masking Model for Spread-Spectrum Image Watermarking Martin Kutter and Stefan Winkler Signal Processing Laboratory Swiss Federal Institute of Technology 5 Lausanne, Switzerland http://ltswww.epfl.ch/

More information

Research Article Reverse-Engineering a Watermark Detector Using an Oracle

Research Article Reverse-Engineering a Watermark Detector Using an Oracle Hindawi Publishing Corporation EURASIP Journal on Information Security Volume 27, Article ID 4334, 7 pages doi:1.1155/27/4334 Research Article Reverse-Engineering a Watermark Detector Using an Oracle Scott

More information

Image matching. by Diva Sian. by swashford

Image matching. by Diva Sian. by swashford Image matching by Diva Sian by swashford Harder case by Diva Sian by scgbt Invariant local features Find features that are invariant to transformations geometric invariance: translation, rotation, scale

More information

Research Article Effect of Different Places in Applying Laplacian Filter on the Recovery Algorithm in Spatial Domain Watermarking

Research Article Effect of Different Places in Applying Laplacian Filter on the Recovery Algorithm in Spatial Domain Watermarking Research Journal of Applied Sciences, Engineering and Technology 7(24): 5157-5162, 2014 DOI:10.19026/rjaset.7.912 ISSN: 2040-7459; e-issn: 2040-7467 2014 Maxwell Scientific Publication Corp. Submitted:

More information

Digital Watermark Detection in Visual Multimedia Content

Digital Watermark Detection in Visual Multimedia Content Digital Watermark Detection in Visual Multimedia Content PhD Thesis Defense Peter Meerwald Dept. of Computer Sciences, University of Salzburg September 2010 Watermarking Watermarking is a technology to

More information

ECE Digital Image Processing and Introduction to Computer Vision

ECE Digital Image Processing and Introduction to Computer Vision ECE592-064 Digital Image Processing and Introduction to Computer Vision Depart. of ECE, NC State University Instructor: Tianfu (Matt) Wu Spring 2017 Outline Recap, image degradation / restoration Template

More information

Capacity of Full Frame DCT Image Watermarks

Capacity of Full Frame DCT Image Watermarks 1450 IEEE TRANSACTIONS ON IMAGE PROCESSING, VOL. 9, NO. 8, AUGUST 2000 is always better when the nonseparable algorithm is used (around 1 db) compared with the separable approach. Nevertheless, the quality

More information

Practical Watermarking scheme based on Wide Spread Spectrum and Game Theory

Practical Watermarking scheme based on Wide Spread Spectrum and Game Theory Practical Watermarking scheme based on Wide Spread Spectrum and Game Theory Stéphane Pateux,Gaëtan Le Guelvouit IRISA / INRIA-Rennes Campus de Beaulieu 35042 Rennes Cedex, FRANCE. Abstract In this paper,

More information

CS4670: Computer Vision Kavita Bala. Lecture 7: Harris Corner Detec=on

CS4670: Computer Vision Kavita Bala. Lecture 7: Harris Corner Detec=on CS4670: Computer Vision Kavita Bala Lecture 7: Harris Corner Detec=on Announcements HW 1 will be out soon Sign up for demo slots for PA 1 Remember that both partners have to be there We will ask you to

More information

Detection of Copy-Rotate-Move Forgery Using Zernike Moments

Detection of Copy-Rotate-Move Forgery Using Zernike Moments Detection of Copy-Rotate-Move Forgery Using Zernike Moments Seung-Jin Ryu, Min-Jeong Lee, and Heung-Kyu Lee Department of Computer Science, Korea Advanced Institute of Science and Technology, Daejeon,

More information

Given a feature in I 1, how to find the best match in I 2?

Given a feature in I 1, how to find the best match in I 2? Feature Matching 1 Feature matching Given a feature in I 1, how to find the best match in I 2? 1. Define distance function that compares two descriptors 2. Test all the features in I 2, find the one with

More information

Halftone Image Watermarking by Content Aware Double-sided Embedding Error Diffusion

Halftone Image Watermarking by Content Aware Double-sided Embedding Error Diffusion 1 Halftone Image Watermarking by Content Aware Double-sided Embedding Error Diffusion Yuanfang Guo, Member, IEEE, Oscar C. Au, Fellow, IEEE, Rui Wang, Member, IEEE, Lu Fang, Member, IEEE, Xiaochun Cao,

More information

Watermark Extraction Optimization Using PSO Algorithm

Watermark Extraction Optimization Using PSO Algorithm Research Journal of Applied Sciences, Engineering and Technology 5(12): 3312-3319, 2013 ISS: 2040-7459; e-iss: 2040-7467 Maxwell Scientific Organization, 2013 Submitted: June 09, 2012 Accepted: July 18,

More information

Witsenhausen s counterexample and its links with multimedia security problems

Witsenhausen s counterexample and its links with multimedia security problems Witsenhausen s counterexample and its links with multimedia security problems Pedro Comesaña-Alfaro Fernando Pérez-González Chaouki T. Abdallah IWDW 2011 Atlantic City, New Jersey Outline Introduction

More information

Empirical Analysis of Invariance of Transform Coefficients under Rotation

Empirical Analysis of Invariance of Transform Coefficients under Rotation International Journal of Engineering Research and Development e-issn: 2278-67X, p-issn: 2278-8X, www.ijerd.com Volume, Issue 5 (May 25), PP.43-5 Empirical Analysis of Invariance of Transform Coefficients

More information

A Framework for Optimizing Nonlinear Collusion Attacks on Fingerprinting Systems

A Framework for Optimizing Nonlinear Collusion Attacks on Fingerprinting Systems A Framework for Optimizing onlinear Collusion Attacks on Fingerprinting Systems egar iyavash Department of Electrical and Computer Engineering University of Illinois at Urbana-Champaign Coordinated Science

More information

Quantization Index Modulation using the E 8 lattice

Quantization Index Modulation using the E 8 lattice 1 Quantization Index Modulation using the E 8 lattice Qian Zhang and Nigel Boston Dept of Electrical and Computer Engineering University of Wisconsin Madison 1415 Engineering Drive, Madison, WI 53706 Email:

More information

An Image Watermarking Based on the pdf Modeling and Quantization Effects in the Wavelet Domain

An Image Watermarking Based on the pdf Modeling and Quantization Effects in the Wavelet Domain An Image Watermarking Based on the pdf Modeling and Quantization Effects in the Wavelet Domain Irena Orović, Milica Orlandić and Srdjan Stanković Faculty of Electrical Engineering, University of Montenegro

More information

Lecture 8: Interest Point Detection. Saad J Bedros

Lecture 8: Interest Point Detection. Saad J Bedros #1 Lecture 8: Interest Point Detection Saad J Bedros sbedros@umn.edu Review of Edge Detectors #2 Today s Lecture Interest Points Detection What do we mean with Interest Point Detection in an Image Goal:

More information

Old painting digital color restoration

Old painting digital color restoration Old painting digital color restoration Michail Pappas Ioannis Pitas Dept. of Informatics, Aristotle University of Thessaloniki GR-54643 Thessaloniki, Greece Abstract Many old paintings suffer from the

More information

Multiscale Image Transforms

Multiscale Image Transforms Multiscale Image Transforms Goal: Develop filter-based representations to decompose images into component parts, to extract features/structures of interest, and to attenuate noise. Motivation: extract

More information

SIFT: Scale Invariant Feature Transform

SIFT: Scale Invariant Feature Transform 1 SIFT: Scale Invariant Feature Transform With slides from Sebastian Thrun Stanford CS223B Computer Vision, Winter 2006 3 Pattern Recognition Want to find in here SIFT Invariances: Scaling Rotation Illumination

More information

Science Insights: An International Journal

Science Insights: An International Journal Available online at http://www.urpjournals.com Science Insights: An International Journal Universal Research Publications. All rights reserved ISSN 2277 3835 Original Article Object Recognition using Zernike

More information

Chapter 4: Filtering in the Frequency Domain. Fourier Analysis R. C. Gonzalez & R. E. Woods

Chapter 4: Filtering in the Frequency Domain. Fourier Analysis R. C. Gonzalez & R. E. Woods Fourier Analysis 1992 2008 R. C. Gonzalez & R. E. Woods Properties of δ (t) and (x) δ : f t) δ ( t t ) dt = f ( ) f x) δ ( x x ) = f ( ) ( 0 t0 x= ( 0 x0 1992 2008 R. C. Gonzalez & R. E. Woods Sampling

More information

Spatially adaptive alpha-rooting in BM3D sharpening

Spatially adaptive alpha-rooting in BM3D sharpening Spatially adaptive alpha-rooting in BM3D sharpening Markku Mäkitalo and Alessandro Foi Department of Signal Processing, Tampere University of Technology, P.O. Box FIN-553, 33101, Tampere, Finland e-mail:

More information

Using Entropy and 2-D Correlation Coefficient as Measuring Indices for Impulsive Noise Reduction Techniques

Using Entropy and 2-D Correlation Coefficient as Measuring Indices for Impulsive Noise Reduction Techniques Using Entropy and 2-D Correlation Coefficient as Measuring Indices for Impulsive Noise Reduction Techniques Zayed M. Ramadan Department of Electronics and Communications Engineering, Faculty of Engineering,

More information

An Invariance Property of the Generalized Likelihood Ratio Test

An Invariance Property of the Generalized Likelihood Ratio Test 352 IEEE SIGNAL PROCESSING LETTERS, VOL. 10, NO. 12, DECEMBER 2003 An Invariance Property of the Generalized Likelihood Ratio Test Steven M. Kay, Fellow, IEEE, and Joseph R. Gabriel, Member, IEEE Abstract

More information

CS5670: Computer Vision

CS5670: Computer Vision CS5670: Computer Vision Noah Snavely Lecture 5: Feature descriptors and matching Szeliski: 4.1 Reading Announcements Project 1 Artifacts due tomorrow, Friday 2/17, at 11:59pm Project 2 will be released

More information

Rotation, Scale and Translation Resilient Public Watermarking for Images

Rotation, Scale and Translation Resilient Public Watermarking for Images Roaion Scale and Translaion Resilien Public Waermarking or Images Ching-Yung Lin a Min Wu b Jerey A. Bloom c Ma L. Miller c Ingemar J. Cox c Yui Man Lui d a Columbia Universiy New York NY b Princeon Universiy

More information

Feature extraction: Corners and blobs

Feature extraction: Corners and blobs Feature extraction: Corners and blobs Review: Linear filtering and edge detection Name two different kinds of image noise Name a non-linear smoothing filter What advantages does median filtering have over

More information

CFAR TARGET DETECTION IN TREE SCATTERING INTERFERENCE

CFAR TARGET DETECTION IN TREE SCATTERING INTERFERENCE CFAR TARGET DETECTION IN TREE SCATTERING INTERFERENCE Anshul Sharma and Randolph L. Moses Department of Electrical Engineering, The Ohio State University, Columbus, OH 43210 ABSTRACT We have developed

More information

Noise Benefits in Quantizer-Array Correlation Detection and Watermark Decoding

Noise Benefits in Quantizer-Array Correlation Detection and Watermark Decoding To appear in the IEEE Transactions on Signal Processing Current draft: 9 November 010 Noise Benefits in Quantizer-Array Correlation Detection and Watermark Decoding Ashok Patel, Member IEEE, and Bart Kosko,

More information

Corners, Blobs & Descriptors. With slides from S. Lazebnik & S. Seitz, D. Lowe, A. Efros

Corners, Blobs & Descriptors. With slides from S. Lazebnik & S. Seitz, D. Lowe, A. Efros Corners, Blobs & Descriptors With slides from S. Lazebnik & S. Seitz, D. Lowe, A. Efros Motivation: Build a Panorama M. Brown and D. G. Lowe. Recognising Panoramas. ICCV 2003 How do we build panorama?

More information

EMBEDDING STRENGTH CRITERIA FOR AWGN WATERMARK, ROBUST AGAINST EXPECTED DISTORTION

EMBEDDING STRENGTH CRITERIA FOR AWGN WATERMARK, ROBUST AGAINST EXPECTED DISTORTION Computing and Informatics, Vol. 29, 2010, 357 387 EMBEDDING STRENGTH CRITERIA FOR AWGN WATERMARK, ROBUST AGAINST EXPECTED DISTORTION Vesna Vučković Faculty of Mathematics Studentski trg 16 11000 Belgrade,

More information

Recovery of Low-Rank Plus Compressed Sparse Matrices with Application to Unveiling Traffic Anomalies

Recovery of Low-Rank Plus Compressed Sparse Matrices with Application to Unveiling Traffic Anomalies July 12, 212 Recovery of Low-Rank Plus Compressed Sparse Matrices with Application to Unveiling Traffic Anomalies Morteza Mardani Dept. of ECE, University of Minnesota, Minneapolis, MN 55455 Acknowledgments:

More information

ISeCure. Nowadays, copyright infringement, unauthorized. The ISC Int'l Journal of Information Security

ISeCure. Nowadays, copyright infringement, unauthorized. The ISC Int'l Journal of Information Security The ISC Int'l Journal of Information Security July 216, Volume 8, Number 2 (pp. 131 139) http://www.isecure-journal.org Optimum Decoder for Multiplicative Spread Spectrum Image Watermarking with Laplacian

More information

Security Analysis of ISS Watermarking Using Natural Scene Statistics

Security Analysis of ISS Watermarking Using Natural Scene Statistics Security Analysis of ISS Watermarking Using Natural Scene Statistics Dong Zhang 1, Jiangqun Ni 1, Qiping Zeng 1, Dah-Jye Lee 2, and Jiwu Huang 1 1 School of Information Science and Technology, Sun Yat-sen

More information

EXTRACTION OF PARKING LOT STRUCTURE FROM AERIAL IMAGE IN URBAN AREAS. Received September 2015; revised January 2016

EXTRACTION OF PARKING LOT STRUCTURE FROM AERIAL IMAGE IN URBAN AREAS. Received September 2015; revised January 2016 International Journal of Innovative Computing, Information and Control ICIC International c 2016 ISSN 1349-4198 Volume 12, Number 2, April 2016 pp. 371 383 EXTRACTION OF PARKING LOT STRUCTURE FROM AERIAL

More information

Edge Detection PSY 5018H: Math Models Hum Behavior, Prof. Paul Schrater, Spring 2005

Edge Detection PSY 5018H: Math Models Hum Behavior, Prof. Paul Schrater, Spring 2005 Edge Detection PSY 5018H: Math Models Hum Behavior, Prof. Paul Schrater, Spring 2005 Gradients and edges Points of sharp change in an image are interesting: change in reflectance change in object change

More information

Harris Corner Detector

Harris Corner Detector Multimedia Computing: Algorithms, Systems, and Applications: Feature Extraction By Dr. Yu Cao Department of Computer Science The University of Massachusetts Lowell Lowell, MA 01854, USA Part of the slides

More information

Steganalysis of Spread Spectrum Data Hiding Exploiting Cover Memory

Steganalysis of Spread Spectrum Data Hiding Exploiting Cover Memory Steganalysis of Spread Spectrum Data Hiding Exploiting Cover Memory Kenneth Sullivan, Upamanyu Madhow, Shivkumar Chandrasekaran, and B.S. Manjunath Department of Electrical and Computer Engineering University

More information

A New Two-dimensional Empirical Mode Decomposition Based on Classical Empirical Mode Decomposition and Radon Transform

A New Two-dimensional Empirical Mode Decomposition Based on Classical Empirical Mode Decomposition and Radon Transform A New Two-dimensional Empirical Mode Decomposition Based on Classical Empirical Mode Decomposition and Radon Transform Zhihua Yang and Lihua Yang Abstract This paper presents a new twodimensional Empirical

More information

Performance Analysis of Spread Spectrum CDMA systems

Performance Analysis of Spread Spectrum CDMA systems 1 Performance Analysis of Spread Spectrum CDMA systems 16:33:546 Wireless Communication Technologies Spring 5 Instructor: Dr. Narayan Mandayam Summary by Liang Xiao lxiao@winlab.rutgers.edu WINLAB, Department

More information

A New Quantum Watermarking Based on Quantum Wavelet Transforms

A New Quantum Watermarking Based on Quantum Wavelet Transforms Commun. Theor. Phys. 67 207 732 742 Vol. 67, No. 6, June, 207 A New Quantum Watermarking Based on Quantum Wavelet Transforms Shahrokh Heidari, Mosayeb Naseri, 2, Reza Gheibi, 3 Masoud Baghfalaki, 4 Mohammad

More information

Stego key searching for LSB steganography on JPEG decompressed image

Stego key searching for LSB steganography on JPEG decompressed image . RESEARCH PAPER. SCIENCE CHINA Information Sciences March 2016, Vol. 59 032105:1 032105:15 doi: 10.1007/s11432-015-5367-x Stego key searching for LSB steganography on JPEG decompressed image Jiufen LIU

More information

Roadmap. Introduction to image analysis (computer vision) Theory of edge detection. Applications

Roadmap. Introduction to image analysis (computer vision) Theory of edge detection. Applications Edge Detection Roadmap Introduction to image analysis (computer vision) Its connection with psychology and neuroscience Why is image analysis difficult? Theory of edge detection Gradient operator Advanced

More information

NOISE can sometimes improve nonlinear signal processing

NOISE can sometimes improve nonlinear signal processing 488 IEEE TRANSACTIONS ON SIGNAL PROCESSING, VOL. 59, NO. 2, FEBRUARY 2011 Noise Benefits in Quantizer-Array Correlation Detection and Watermark Decoding Ashok Patel, Member, IEEE, and Bart Kosko, Fellow,

More information

Various Shape Descriptors in Image Processing A Review

Various Shape Descriptors in Image Processing A Review Various Shape Descriptors in Image Processing A Review Preetika D Silva 1, P. Bhuvaneswari 2 1 PG Student, Department of Electronics and Communication, Rajarajeswari College of Engineering, Bangalore,

More information

Feature Vector Similarity Based on Local Structure

Feature Vector Similarity Based on Local Structure Feature Vector Similarity Based on Local Structure Evgeniya Balmachnova, Luc Florack, and Bart ter Haar Romeny Eindhoven University of Technology, P.O. Box 53, 5600 MB Eindhoven, The Netherlands {E.Balmachnova,L.M.J.Florack,B.M.terHaarRomeny}@tue.nl

More information

Detectors part II Descriptors

Detectors part II Descriptors EECS 442 Computer vision Detectors part II Descriptors Blob detectors Invariance Descriptors Some slides of this lectures are courtesy of prof F. Li, prof S. Lazebnik, and various other lecturers Goal:

More information

A Chaotic Encryption System Using PCA Neural Networks

A Chaotic Encryption System Using PCA Neural Networks A Chaotic Encryption System Using PCA Neural Networks Xiao Fei, Guisong Liu, Bochuan Zheng Computational Intelligence Laboratory, School of Computer Science and Engineering, University of Electronic Science

More information

About zero bit watermarking error exponents

About zero bit watermarking error exponents About zero bit watermarking error exponents Teddy Furon To cite this version: Teddy Furon. About zero bit watermarking error exponents. ICASS2017 - IEEE International Conference on Acoustics, Speech and

More information

Edge Detection. CS 650: Computer Vision

Edge Detection. CS 650: Computer Vision CS 650: Computer Vision Edges and Gradients Edge: local indication of an object transition Edge detection: local operators that find edges (usually involves convolution) Local intensity transitions are

More information

A NO-REFERENCE SHARPNESS METRIC SENSITIVE TO BLUR AND NOISE. Xiang Zhu and Peyman Milanfar

A NO-REFERENCE SHARPNESS METRIC SENSITIVE TO BLUR AND NOISE. Xiang Zhu and Peyman Milanfar A NO-REFERENCE SARPNESS METRIC SENSITIVE TO BLUR AND NOISE Xiang Zhu and Peyman Milanfar Electrical Engineering Department University of California at Santa Cruz, CA, 9564 xzhu@soeucscedu ABSTRACT A no-reference

More information

Empirical Mean and Variance!

Empirical Mean and Variance! Global Image Properties! Global image properties refer to an image as a whole rather than components. Computation of global image properties is often required for image enhancement, preceding image analysis.!

More information

Advanced Features. Advanced Features: Topics. Jana Kosecka. Slides from: S. Thurn, D. Lowe, Forsyth and Ponce. Advanced features and feature matching

Advanced Features. Advanced Features: Topics. Jana Kosecka. Slides from: S. Thurn, D. Lowe, Forsyth and Ponce. Advanced features and feature matching Advanced Features Jana Kosecka Slides from: S. Thurn, D. Lowe, Forsyth and Ponce Advanced Features: Topics Advanced features and feature matching Template matching SIFT features Haar features 2 1 Features

More information

Lecture 3: Linear Filters

Lecture 3: Linear Filters Lecture 3: Linear Filters Professor Fei Fei Li Stanford Vision Lab 1 What we will learn today? Images as functions Linear systems (filters) Convolution and correlation Discrete Fourier Transform (DFT)

More information

Filtering and Edge Detection

Filtering and Edge Detection Filtering and Edge Detection Local Neighborhoods Hard to tell anything from a single pixel Example: you see a reddish pixel. Is this the object s color? Illumination? Noise? The next step in order of complexity

More information

Source Coding for Compression

Source Coding for Compression Source Coding for Compression Types of data compression: 1. Lossless -. Lossy removes redundancies (reversible) removes less important information (irreversible) Lec 16b.6-1 M1 Lossless Entropy Coding,

More information

EXPURGATED GAUSSIAN FINGERPRINTING CODES. Pierre Moulin and Negar Kiyavash

EXPURGATED GAUSSIAN FINGERPRINTING CODES. Pierre Moulin and Negar Kiyavash EXPURGATED GAUSSIAN FINGERPRINTING CODES Pierre Moulin and Negar iyavash Beckman Inst, Coord Sci Lab and ECE Department University of Illinois at Urbana-Champaign, USA ABSTRACT This paper analyzes the

More information

Filtering in Frequency Domain

Filtering in Frequency Domain Dr. Praveen Sankaran Department of ECE NIT Calicut February 4, 2013 Outline 1 2D DFT - Review 2 2D Sampling 2D DFT - Review 2D Impulse Train s [t, z] = m= n= δ [t m T, z n Z] (1) f (t, z) s [t, z] sampled

More information

A New Efficient Method for Producing Global Affine Invariants

A New Efficient Method for Producing Global Affine Invariants A New Efficient Method for Producing Global Affine Invariants Esa Rahtu, Mikko Salo 2, and Janne Heikkilä Machine Vision Group, Department of Electrical and Information Engineering, P.O. Box 45, 94 University

More information

A new class of shift-invariant operators

A new class of shift-invariant operators 1 A new class of shift-invariant operators Janne Heiilä Machine Vision Group Department of Electrical and Information Engineering P.O. Box 4500, 90014 University of Oulu, Finland Tel.: +358 8 553 2786,

More information

Image Segmentation: Definition Importance. Digital Image Processing, 2nd ed. Chapter 10 Image Segmentation.

Image Segmentation: Definition Importance. Digital Image Processing, 2nd ed. Chapter 10 Image Segmentation. : Definition Importance Detection of Discontinuities: 9 R = wi z i= 1 i Point Detection: 1. A Mask 2. Thresholding R T Line Detection: A Suitable Mask in desired direction Thresholding Line i : R R, j

More information

L-statistics based Modification of Reconstruction Algorithms for Compressive Sensing in the Presence of Impulse Noise

L-statistics based Modification of Reconstruction Algorithms for Compressive Sensing in the Presence of Impulse Noise L-statistics based Modification of Reconstruction Algorithms for Compressive Sensing in the Presence of Impulse Noise Srdjan Stanković, Irena Orović and Moeness Amin 1 Abstract- A modification of standard

More information

Edge Detection. Computer Vision P. Schrater Spring 2003

Edge Detection. Computer Vision P. Schrater Spring 2003 Edge Detection Computer Vision P. Schrater Spring 2003 Simplest Model: (Canny) Edge(x) = a U(x) + n(x) U(x)? x=0 Convolve image with U and find points with high magnitude. Choose value by comparing with

More information

Lecture 3: Linear Filters

Lecture 3: Linear Filters Lecture 3: Linear Filters Professor Fei Fei Li Stanford Vision Lab 1 What we will learn today? Images as functions Linear systems (filters) Convolution and correlation Discrete Fourier Transform (DFT)

More information

Title: Watermark Estimation Through Detector Observations Author: Ton Kalker Conference: Benelux Signal Processing Symposium 98 Date and location:

Title: Watermark Estimation Through Detector Observations Author: Ton Kalker Conference: Benelux Signal Processing Symposium 98 Date and location: Title: Watermark Estimation Through Detector Observations Author: Ton Kalker Conference: Benelux Signal Processing Symposium 98 Date and location: March 98, Leuven, Belgium Watermark Estimation Through

More information

Lecture 8: Signal Detection and Noise Assumption

Lecture 8: Signal Detection and Noise Assumption ECE 830 Fall 0 Statistical Signal Processing instructor: R. Nowak Lecture 8: Signal Detection and Noise Assumption Signal Detection : X = W H : X = S + W where W N(0, σ I n n and S = [s, s,..., s n ] T

More information

Vlad Estivill-Castro (2016) Robots for People --- A project for intelligent integrated systems

Vlad Estivill-Castro (2016) Robots for People --- A project for intelligent integrated systems 1 Vlad Estivill-Castro (2016) Robots for People --- A project for intelligent integrated systems V. Estivill-Castro 2 Perception Concepts Vision Chapter 4 (textbook) Sections 4.3 to 4.5 What is the course

More information

Lecture 3. The Population Variance. The population variance, denoted σ 2, is the sum. of the squared deviations about the population

Lecture 3. The Population Variance. The population variance, denoted σ 2, is the sum. of the squared deviations about the population Lecture 5 1 Lecture 3 The Population Variance The population variance, denoted σ 2, is the sum of the squared deviations about the population mean divided by the number of observations in the population,

More information