This website uses cookies to ensure you have the best experience. Learn more

Improving Watermark Detection By Preprocessing Operation

1537 words - 6 pages

When designing a watermarking algorithm, trade-offs exist among three parameters: payload, fidelity, and robustness. Data payload is the number of bits that can be embedded in the digital data; the fidelity is the degradation introduced into the signal; and the robustness is the ability of the watermark to remain readable after innocent or malicious signal processing operations on the watermarked image. These parameters are conflicting with each other, and they should be set to meet the requirements of the application (Levicky & Foris,2004).
Watermarking techniques are generally classified into spatial domain or the transform domain. The earlier watermarking techniques were almost in the spatial domain. Spatial domain techniques are not resilient enough to image compression and other image processing (Potdar & et al, 2005). Although some methods, e.g. in (Depovere & et al,1998), adopted pre-filtering skill to increase the percentage of identification, experimental results have shown the fundamental disadvantages of spatial domain watermarking. Transform domain watermarking schemes like those based on the discrete cosine transform (DCT) ((Chu, 2003), ( Lin & Chin2000), ( Deng & Wang, 2003)) and the discrete wavelet transform (DWT) ((Hsieh &et al, 2001), ( Reddy & Chatterji, 2005), (Tay & Havlicek, 2002)) typically provide higher image imperceptibility and are much more robust to image manipulations.
It is generally believed that the performance of most existing watermarking systems is not close enough to the fundamental limit on robust watermark embedding rates at which high perceptual image quality is maintained. Although, embedding the watermark in the perceptually significant coefficients could alter the perceived visual quality of the image. Thus, two essential prerequisites for a powerful watermarking scheme, robustness and invisibility do conflict with each other (Amirgholipour & Naghsh-Nilchi, 2009). To support real applications demanding imperceptible and robust watermarking, image preprocessing techniques are required. Any watermarking scheme consists of two parts: Insertion algorithm and extraction algorithm. Robustness of watermarking algorithms could increase by improving each of these parts. Based on this fact, different techniques are applied to improve imperceptibility and robustness of existing watermarking algorithms (Amirgholipour & et al, 2009).
Most of these techniques are based on preprocessing multimedia data before embedding watermark information. They are concentrated on finding the most proper places in the multimedia to embed watermark. Methods such as employing JND profile, contrast sensitivity and texture masking, and exploiting characteristics of the human visual system (HVS) are used to embed watermark in places which are perceptually invisible and more robust (Lahouari & Bouridane, 2005). The goal of these methods is to develop an efficient, yet simple, perceptual model based on a sub-band decomposition that is...

Find Another Essay On Improving Watermark Detection by Preprocessing Operation

palm vein technology Essay

524 words - 2 pages transmission & detection, if it gets leaked.Keywords: watermarking, robust watermarking, spectrum, guilty agent, implicit request, explicit request.I. INTRODUCTIONData leakage is the big challenge in front of theindustries & different institutes. Though there are numberof systems designed for the data security by usingdifferent encryption algorithms, there is a big issue of theintegrity of the users of those systems. It is very hard forany

Motif Analysis

670 words - 3 pages various problems. For example, locating the genomic sites that are believed to contain motifs is not the same as extracting the motifs out of them. Also, many solutions and technologies have been developed to address each of the problems. Following is a broad breakdown of motif analysis to clearly understand and envision how it is performed:- I, Preprocessing stage At this stage we wish to construct a set of co-regulated genes, presuming that they

ECG Biometric Recognition

2009 words - 8 pages their end fiducials from each heartbeat and using a strategy, which uses the delineated features, and taking decision for the identity of an individual with respect to the template database on the basis of match scores. This paper aims at improving the idea of ECG as a new biometric characteristic in various biometric access control applications by the application of more efficient methods for preprocessing which accounts for even the details of

conversion of paper record to electronic record

1624 words - 7 pages , the name appearing in the header of an electronic mail message or in the profile of other types of record is able to fulfill the signature function. A mix of accountability and authenticity functions is then exercised by the digital signature, which is not even a sub or superscription, but a digital data file that uses a computationally unique string of numbers and enables the detection of unauthorized modifications to the contents on a record

Biometrics: Iris Recognition

1236 words - 5 pages specifically setup sensor. (ii) Iris segmentation or preprocessing includes various steps such as iris localization by defining inner and outer boundaries of the iris, removal of occlusion of the eyelids and normalization. (iii) Feature extraction identifies the most discriminating features present in an iris pattern and the features are extracted to a pattern suitable for recognition. (iv) Last module is the Template matching or classification in

Steganography

2305 words - 9 pages communicate using these techniques to hide their messages and rumours persist that Al-Qaeda have used it to communicate. Also of concern is that these techniques may be used by paedophiles to hide pornographic images within seemingly innocuous material.As a result the need for detection of steganographic data has become an important issue for law enforcement agencies. Attempting to detect the use of steganography is called steganalysis and can be either

bank frauds in India

2407 words - 10 pages invoice. The reasons for the increased fraud in state and local governments are poor management practice; economic pressure; weakened society values; people being not held responsible for their actions; and inadequate training for those responsible for fraud prevention/detection. The most often reported “red flags” are weaknesses in internal control; ignoring audit reports; inventory losses; non reliance on internal/external audit reports; not

Portable Capilary Electrophoresis Insturment

1567 words - 7 pages into its components by a strong electric field imposed between the two ends of a narrow capillary tube filled with electrolyte solution, which separated solutions by differences in mobility without the presence of stationary phase.2 With advantageous properties including a wide range of accessible analytes, high separation efficiency, short analysis time, low power requirements, limited consumption of chemicals, and ease of installation, operation

Mediator-free electrocatalytic oxidation of phenolic compounds and the simultaneous sensing of catechol, p-cresol and p-nitrophenol at single-wall

551 words - 3 pages Phenolic compounds are extensively used in industrial byproducts and that can accumulate in the environment and the ecological food chain by consumption or uptake of this compounds.1 Due to their presence in water, air and food matrices cause toxic risks to environment and the human health.2,3 Most of the phenolic compounds exhibit different toxicities and their detection and determination are very important for evaluating the total toxicity of

Counterfeit Money

918 words - 4 pages I Last summer at a music store I was buying a guitar. The store was equipped with a counterfeit detection pen and scanner which many other stores use. As I was purchasing the guitar with cash, the employee took every dollar and passed it through the scanner. He was almost done until one of my $100 bills failed the counterfeit test. It set off an alarm and before I knew it, everyone was staring at me. I was extremely surprised

Biometric Iris Recognition: A Literature Survey

1204 words - 5 pages . RDWFB is obtained using DWFB coefficients whose directions are 451 apart from DWFB. Ramkumar, R., P, et. al [76], proposed iris recognition method where pupil localization is done by using negative function and four neighbors method to accurately detect the pupil boundary. For iris outer boundary detection, contrast enhancement, special wedges and thresholding techniques are used to isolate the specific iris regions without eyelid and eyelash

Similar Essays

Comparison Between The Effect Of Laplacian And High Boost Filters On Spatial Domain Watermarking

1716 words - 7 pages (ICA) and detects the watermark with a blind source separation method. The watermark information is considered as noise for the watermarked image in its spatial domain. This noise is magnified before detection, and then recovers the watermark information by adjusting the extracted data from the frequency domain according to the global minimum method [21]. A preprocessing method is proposed that exploit a combination of noise boosting and filtering

The Image Watermarking System Essay

2446 words - 10 pages consists of an embedder and a detector, as illustrated in Figure 1. The embedder takes two inputs. One is the payload or watermark, and the other is the cover work or the host image. The output of the embedder is typically transmitted or recorded. Later that work is presented as an input to the detector. Most detectors try to determine whether a payload is present, and if so, output the message encoded by it. 1.1 BASIC MODEL OF DIGITAL

Image Retrieval Systems Essay

802 words - 4 pages is designed as a separate phase. The four phases are interrelated and the output from one phase is used as input by the next phase. The techniques proposed in each of these phases are described in the subsequent sections. 3.2. PHASE I : PREPROCESSING Preprocessing in CBIR systems is the process of preparing the template and query images into a form that improves the process of feature detection and image retrieval. The preprocessing step of

Detection Measures Essay

1423 words - 6 pages . Technologies such as watermarking can come to use here. By identifying data such as copyright information into other data, watermarking helps detect unauthorized copy from the authorized ones. An imperceptible watermark is generated by using an algorithm to insert the data into an object, marking that object as proprietary. This watermark will act as evidence against the copier if the object is copied without satisfying certain conditions.Imperceptible