Loading...
Search for: image-watermarking
0.007 seconds
Total 41 records

    Steganalysis of Incomplete Image Using Random Fields

    , M.Sc. Thesis Sharif University of Technology Ahmadi, Aria (Author) ; Ghaemmaghami, Shahrokh (Supervisor) ; Gholampour, Iman (Co-Advisor)
    Abstract
    Widespread transfer of digital files over networks provides a hidden channel to transfer secret messages. Current steganalysis schemes need to work on a complete image for doing the detection job that starts when the image is entirely transferred, so are often restricted to an offline process. This restriction is serious when existence of the hidden message carriers on the network is shorter than the time required for the detection process. In this thesis, we propose a structurally fast detection method to detect the data hidden in an image passing through network. We use two of most powerful steganalysis algorithms for steganalysis of images that proposed by 1) Fridrich and Pevny and 2) Liu... 

    Image Steganalysis Based on Feature Optimization Using Evolutionary Algorithms

    , M.Sc. Thesis Sharif University of Technology Karandish, Mohammad Ali (Author) ; Ghaemmaghami, Shahrokh (Supervisor)
    Abstract
    Image steganalysis is the technique and art of detecting covert communication via images.Reduction of features dimentionality is an important issue according to accuracy and time complexity. In this thesis, GA (genetic algorithm) and PSO (Particle Swarm Optimization) are used to reduce the dimentionality of JRM, a recently proposed feature set containing 11255 features which looks high dimentional compared to other feature sets which has been reduced by evolutionary algorithms so far. So, inspite of other works done using evolutionary algorithms in this field, we use the class sepearability criterion as fitness function instead of the accuracy of the classifier. Investigating these features,... 

    Image Steganography Resistant Against Higher Order statistical Attacks

    , M.Sc. Thesis Sharif University of Technology Mohsenzadeh, Yalda (Author) ; Ghaemmaghami, Shahrokh (Supervisor) ; Mohajeri, Javad (Supervisor)
    Abstract
    A major goal in image steganography is to preserve the statistical properties of the host image to thwart statistical based steganalysis. However, most steganography methods introduce some distortions into the host signal’s statistical properties that have been used, as a certain indication of manipulation of the signal, by steganalysis algorithms. In order to overcome such a methodical vulnerability, a new generation of data hiding algorithms has been proposed in the literature to preserve histogram of the host signal. In this thesis we present a novel image steganographic technique to preserve one-dimensional and two-dimensional histograms of the host image. Experimental results show that... 

    Improving Watermarking Robustness Against Print and Scan Attack

    , M.Sc. Thesis Sharif University of Technology Amiri, Hamid (Author) ; Jamzad, Mansour (Supervisor)
    Abstract
    The advent of digital age with the Internet revolution has made it extremely convenient for users to access, create, process, copy, or exchange multimedia data. This has created an urgent need for protecting intellectual property in both the digital and the print media. Digital watermarking is a suitable way to do this. In this technology, some hidden information called watermark are embedded into host signal and extracted to confirm copyright protection. However, the watermark should be embedded in the host in such a way that the attacks could not destroy it. Print and scan is a popular attack that is applied on digital images. This attack has complex nature and can be implemented easily.... 

    New Generation of On-purpose Attacks for Evaluating Digital Image Watermarking Methods by Preserving the Image Quality

    , Ph.D. Dissertation Sharif University of Technology Taherinia, Amir Hossein (Author) ; Jamzad, Mansour (Supervisor)
    Abstract
    Up to now, compared with the comprehensive research for developing robust watermarking algorithms, no equal attention has been devoted to the proposition of benchmarks tailored to assess the watermark robustness. In addition, almost all the state of the art benchmarks only integrate a number of common image processing operations like geometrical transformations to remove watermarks. However, the quality of the processed image is often too degraded to permit further commercial exploitation. Moreover, to the best of our knowledge, the design of these tools does not take into account the statistical properties of the images and watermarks in the design of attacks. In spite of the significant... 

    Image Steganalysis of Low Rate Embedding in Spatial Domain

    , Ph.D. Dissertation Sharif University of Technology Farhat, Farshid (Author) ; Ghaemmaghami, Shahrokh (Supervisor) ; Aref, Mohammad Reza (Co-Advisor)
    Abstract
    LSB embedding in spatial domain with very low rate can be easily performed and its detection in spite of many researches is very hard, while BOSS competition has been held to break an adaptive embedding algorithm with low rate. Thus, proposing powerful steganalyzer of very low rate in spatial domain is highly requested. In this thesis it has been tried to present some algorithms to detect secret message with very low rate in spatial domain using eigenvalues analysis and relative auto-correlation of image.First approach is based on the analysis of the eigenvalues of the cover correlation matrix that we used for the first time. Image partitioning, correlation function computation,... 

    Some Applications of Singular Values Decomposition in Image Processing

    , M.Sc. Thesis Sharif University of Technology Ghobadi Ghadikalaei, Vahideh (Author) ; Mahdavi Amiri, Nezamoddin (Supervisor)
    Abstract
    The field of digital image processing refers to processing digital images by means of a digital computer. One of the principal applications used in digital image processing is image compression. Image compression is the problem of reducing the amount of data required to represent a digital image. The basis of the reduction process is the removal of redundant data. One of the other principal applications of image processing is noise reduction (filtering) of images corrupted with additive noise. Filtering techniques are oriented toward modeling the degradation and applying the inverse process in order to recover the original image. Image watermarking is another application of image processing.... 

    Improving the Robustness of Image Watermarking for Publicly Copyright-Proving

    , M.Sc. Thesis Sharif University of Technology Shakeri, Mahsa (Author) ; Jamzad, Mansour (Supervisor)
    Abstract
    The advent of Internet and advancement of computer technologies have enabled convenient and fast exchange of multimedia so the illegal reproduction and modification of digital media has become increasingly serious. Hence, how to protect the intellectual property rights of digital multimedia is an imperative issue. Digital watermarking is one of the solutions to prevent unauthorized use of images. Traditional digital watermarking techniques embed a watermark such as logo, trademark, or copyright information into a host image so that it is not perceptible. These techniques, depending on the amount of embedded data, will distort the content of host image which results in quality degradation of... 

    Extracting Appropriate Features for Zero Watermarking of Similar Images for Ownership Protection

    , M.Sc. Thesis Sharif University of Technology Ehsaee, Shahryar (Author) ; Jamzad, Mansour (Supervisor)
    Abstract
    Digital watermarking is an efficacious technique to protect the copyright and ownership of digital information. Traditional image watermarking algorithms embed a logo in the image that could reduce its visual quality. A new approach in watermarking called zero watermarking doesn’t need to embed a logo in the image. In this algorithm we find a feature from the main image and combine it with a logo to obtain a key. This key is securely kept by a trusted authority. In this thesis we show that we can increase the robustness of digital zero watermarking by a new counter detection method in comparison to Canny Edge detection and morphological dilatation that is mostly used by related works.... 

    Watermarking based on independent component analysis in spatial domain

    , Article Proceedings - 2011 UKSim 13th International Conference on Modelling and Simulation, UKSim 2011, 30 March 2011 through 1 April 2011, Cambridge ; 2011 , Pages 299-303 ; 9780769543765 (ISBN) Hajisami, A ; Rahmati, A ; Babaie Zadeh, M ; Sharif University of Technology
    2011
    Abstract
    This paper proposes an image watermarking scheme for copyright protection based on Independent Component Analysis (ICA). In the suggested scheme, embedding is carried out in cumulative form in spatial domain and ICA is used for watermark extraction. For extraction there is no need to access the original image or the watermark, and extraction is carried out only with two watermarked images. Experimental results show that the new method has better quality than famous methods [1], [2], [3] in spatial or frequency domain and is robust against various attacks. Noise addition, resizing, low pass filtering, multiple marks, gray-scale reduction, rotation, JPEG compression, and cropping are some... 

    Using julian set patterns for higher robustness in correlation based watermarking methods

    , Article 5th IEEE International Symposium on Signal Processing and Information Technology, Athens, 18 December 2005 through 21 December 2005 ; Volume 2005 , 2005 , Pages 358-362 Yaghmaee, F ; Jamzad, M ; Sharif University of Technology
    2005
    Abstract
    Some of the most important classes of watermark detection methods in image watermarking are correlation based algorithms. In these methods usually a pseudorandom pattern is embedded in host image. Receiver can regenerate this pattern by having a key that is the seed of a random number generator. After that if the correlation between this pattern and the image that is assumed to have the watermark is higher than a predefined threshold, this means that the watermark exists and vise versa. In this paper we showed the advantage of using the Julian set patterns as a watermark, instead of commonly used pseudorandom noisy pattern. Julian set patterns can be regenerate in receiver with few... 

    Towards energy optimization of transparent watermarks using entropy masking

    , Article IASTED International Conference on Internet and Multimedia Systems and Applications, EuroIMSA 2005, Grindelwald, 21 February 2005 through 23 February 2005 ; 2005 , Pages 259-264 ; 0889864861 (ISBN) Haghighi, M. S ; Ghaemmaghami, S ; Hamza M. H ; Sharif University of Technology
    2005
    Abstract
    An invisible image watermarking scheme tends to insert the mark in a transparent manner, with the highest possible energy. Several watermarking algorithms use human visual models as perceptual masks to maximize the power of watermark. We take advantage of inhibitory and excitatory characteristics of eye receptors which yield an extra capacity, for amplifying watermark power, while still satisfying imperceptibility constraint. Spatial-domain image entropy is used as a measure of strength of inhibitory effect. The principle of our idea is based on the decomposition of mark sequence into two parts, corresponding to two complementary sets of pixels in spatial-domain. These sets are determined... 

    Robust watermarking against print and scan attack through efficient modeling algorithm

    , Article Signal Processing: Image Communication ; Vol. 29, issue. 10 , November , 2014 , p. 1181-1196 ; ISSN: 09235965 Amiri, S. H ; Jamzad, M ; Sharif University of Technology
    Abstract
    This article proposes a blind discrete wavelet transform-discrete cosine transform (DWT-DCT) composite watermarking scheme that is robust against print and scan distortions. First, two-dimensional DWT is applied to the original image to obtain the mid-frequency subbands. Then, a one-dimensional DCT is applied to the selected mid-frequency subbands to extract the final coefficients for embedding the watermark. To specify watermarking parameters, we utilize a Genetic Algorithm to achieve a predefined image quality after watermark insertion. Suitable locations for watermarking are determined by analyzing the effect of a modeling algorithm. This model simulates noise and nonlinear attacks in... 

    Robust scaling-based image watermarking using maximum-likelihood decoder with optimum strength factor

    , Article IEEE Transactions on Multimedia ; Volume 11, Issue 5 , 2009 , Pages 822-833 ; 15209210 (ISSN) Akhaee, M. A ; Sahraeian, S. M. E ; Sankur, B ; Marvasti, F ; Sharif University of Technology
    2009
    Abstract
    In this paper, a new scaling-based image-adaptive watermarking system has been presented, which exploits human visual model for adapting the watermark data to local properties of the host image. Its improved robustness is due to embedding in the low-frequency wavelet coefficients and optimal control of its strength factor from HVS point of view. Maximum-likelihood (ML) decoder is used aided by the channel side information. The performance of the proposed scheme is analytically calculated and verified by simulation. Experimental results confirm the imperceptibility of the proposed method and its higher robustness against attacks compared to alternative watermarking methods in the literature.... 

    Robustness enhancement of content-based watermarks using entropy masking effect

    , Article 4th International Workshop on Digital Watermarking, IWDW 2005, Siena, 15 September 2005 through 17 September 2005 ; Volume 3710 LNCS , 2005 , Pages 444-458 ; 03029743 (ISSN); 354028768X (ISBN); 9783540287681 (ISBN) Sadr, A. H ; Ghaemmaghami, S ; Sharif University of Technology
    2005
    Abstract
    Image-Adaptive watermarking systems exploit visual models to adapt the watermark to local properties of the host image. This leads to a watermark power enhancement, hence an improved resilience against different attacks, while keeping the mark imperceptible. Visual models consider different properties of the human visual system, such as frequency sensitivity, luminance sensitivity and contrast masking. Entropy masking is another human visual system's characteristic, which rarely has been addressed in visual models. In this paper we have utilized this masking effect to improve the robustness of Image-Adaptive watermarks while keeping their transparency. Experimental results show a significant... 

    Robust image watermarking using independent component analysis

    , Article Proceedings - 3rd International Symposium on Information Processing, ISIP 2010, 12 November 2010 through 14 November 2010, Qingdao ; 2010 , Pages 363-367 ; 9780769542614 (ISBN) Hajisami, A ; Ghaemmaghami, S ; Sharif University of Technology
    2010
    Abstract
    This paper proposes an image watermarking scheme for copyright protection based on Independent Component Analysis (ICA). In the suggested scheme, we divide the original image into blocks and use the ICA to project the image into a basis with its components as statistically independent as possible. The data embedding is carried out in cumulative form in the ICA basis and also the ICA is used for watermark extraction. The extraction process could be either non-blind, through a straightforward procedure, or blind, via a tricky method we propose. Experimental results show that the new method outperforms some well-known image watermarking methods [1], [2], [3] in spatial or frequency domain and... 

    Robust image data hiding using geometric mean quantization

    , Article GLOBECOM - IEEE Global Telecommunications Conference, 30 November 2009 through 4 December 2009, Honolulu, HI ; 2009 ; 9781424441488 (ISBN) Akhaee, M. A ; Ghaemmaghami, S ; Nikooienejad, A ; Marvasti, F ; Sharif University of Technology
    Abstract
    In this paper, a novel quantization based watermarking method is proposed. For blind detection, a set of nonlinear convex functions based on geometric mean are investigated. In order to achieve minimum distortion, the optimum function set is found. The algorithm is implemented on the approximation coefficients of wavelet transform for natural images. In order to make the algorithm more robust and imperceptible, a new transform domain called Point to Point Graph (PPG), which converts a 1-D signal to a 2-D one, has been used. The error probability of the proposed scheme is analytically investigated. Simulation results show that this algorithm has great robustness against common attacks such as... 

    Minimisation of image watermarking side effects through subjective optimisation

    , Article IET Image Processing ; Volume 7, Issue 8 , 2013 , Pages 733-741 ; ISSN: 17519659 Golestani, H. B ; Ghanbari, M ; Sharif University of Technology
    2013
    Abstract
    This study investigates the use of structural similarity index (SSIM) on the minimised side effect to image watermarking. For the fast implementation and more compatibility with the standard discrete cosine transform (DCT)-based codecs, watermark insertion is carried out on the DCT coefficients and hence an SSIM model for DCT-based watermarking is developed. For faster implementation, the SSIM index is maximised over independent 4 × 4 non-overlapped blocks, but the disparity between the adjacent blocks reduces the overall image quality. This problem is resolved through optimisation of overlapped blocks, but, the higher image quality is achieved at a cost of high computational complexity. To... 

    Introducing a new method for estimation image complexity according to calculate watermark capacity

    , Article 2008 4th International Conference on Intelligent Information Hiding and Multiedia Signal Processing, IIH-MSP 2008, Harbin, 15 August 2008 through 17 August 2008 ; 2008 , Pages 981-984 ; 9780769532783 (ISBN) Yaghmaee, F ; Jamzad, M ; Sharif University of Technology
    2008
    Abstract
    One of the most important parameters in evaluating a watermarking algorithm is its capacity. In fact, capacity has a paradoxical relation with other two important parameters: image quality and robustness. Some works have been done on watermarking capacity and a few on image complexities. Most works on watermarking capacity is based on information theory and the capacity values which are calculated based on these methods are very tolerate. In this paper we propose a new method for calculating image complexity based on Region Of Interest (ROI) concept. After that we analyze three complexity measures named: Image compositional complexity (ICC), Quad tree and ROI method, with three different... 

    Improving the performance of spatial domain image watermarking with high boost filter

    , Article Indian Journal of Science and Technology ; Vol. 7, issue. 12 , Dec , 2014 , p. 2133-2139 Alirezanejad, M ; Amirgholipour, S ; Safari, V ; Aslani, S ; Arab, M ; Sharif University of Technology
    Abstract
    Authenticating in transaction of digital media becomes an active research field now a day. That is emerging due to the illegal use of digital media and hacking by unauthorized users. Spatial domain based watermarking methods are one of the authentication methods. These methods are not generally robust against intentional or unintentional changes in the images. In this paper, a new method is proposed to recover watermark more precisely in the spatial domain watermarking method. A high-boost filtering is utilized before executing watermark extraction procedure. The watermark information is magnified by preforming this filter. Effectiveness of this filter is proved by several experiment....