This paper proposes a improved algorithm to embed and detect the digital watermark in digital image. And it uses a highly efficient and practical programming tool MATLAB to achieve a block-based on DCT domain digital ...
详细信息
ISBN:
(纸本)9781424486915
This paper proposes a improved algorithm to embed and detect the digital watermark in digital image. And it uses a highly efficient and practical programming tool MATLAB to achieve a block-based on DCT domain digital watermark embedding and extraction validated. First, transform the watermark information into a binary string, with dual unrelated normal pseudo random sequence of real numbers representing the 0 and 1 of the watermark information embedded in the image of the DCT middle frequency coefficients. After these attacks based detection of correlation matrix to extract the correct watermark. Demonstrate the robustness and invisibility. Propose some improvement methods.
In order to distinguish the conventional image manipulation and malicious tampering more effectively , this paper implements an image authentication algorithm based on semi-fragile scrambling watermarking. The origina...
详细信息
ISBN:
(纸本)9781424497621
In order to distinguish the conventional image manipulation and malicious tampering more effectively , this paper implements an image authentication algorithm based on semi-fragile scrambling watermarking. The original image is firstly decomposed into pixel-based bit-planes, then the Arnold scrambled binary watermarking is embedded as a mask information into a particular bit-plane of original image. In the image detection side, the extracted watermarking is combined with a tamper assessment function to determine the credibility of image authentication. Experimental results show that the algorithm is robust to several conventional image manipulation like brightness adjusted, JPEG compression, salt and pepper noise ,and median filtering ,and which is simultaneously fragile to malicious tampering .The position of malicious tampering can be localized accurately.
The development of successful multimedia applications is becoming a challenging task due to short deployment cycles and the huge amount of applications flooding the market. One major problem that the multimedia indust...
详细信息
The development of successful multimedia applications is becoming a challenging task due to short deployment cycles and the huge amount of applications flooding the market. One major problem that the multimedia industry is facing in this area is the heterogeneity of the content-delivery chain. The classic model in which all the components, such as the authoring, distribution, and playback, were known in advance, has now evolved into an interconnected network of programmable processing units that are no longer dedicated and built for one purpose.
Current steganalysis for images is not universal, which is usually special for one kind of steganography and not practical for others. Meanwhile the correct detection rate of these detecting methods is not high. After...
详细信息
ISBN:
(纸本)9781424486915
Current steganalysis for images is not universal, which is usually special for one kind of steganography and not practical for others. Meanwhile the correct detection rate of these detecting methods is not high. After analyzing current steganalysis methods, a new steganalysis method for detection of steganography in image's frequency domain is proposed. The detecting method is universal and is not restrained to some special steganography method. Based on the spectrum analysis of difference histogram of frequency coefficients, the detection is achieved according to evident spectrum difference between non-steg-images and steg-images. The physical frame of the algorithm is easy and the detection method can be put into practice. Experimental results from detecting steganographic images of DCT domain and DWT domain show that the detection performance is satisfying. Compared to Stegdetect 0.6, which is a steganalysis system for JPEG images, the method shows much better performance.
In this paper we present a new model-based method to code the transform coefficients of audio signals. The histogram of transform coefficients is approximated by a generalized Gaussian model for efficient model-based ...
详细信息
ISBN:
(纸本)1424407281
In this paper we present a new model-based method to code the transform coefficients of audio signals. The histogram of transform coefficients is approximated by a generalized Gaussian model for efficient model-based bit allocation and the spectrum is coded by scalar quantization followed by arithmetic coding. An example coder operating at 16 kHz and using predictive modified discrete cosine transform (MDCT) coding is described. We compare the performance of the proposed coder with ITU-T G.722.1. Objective and subjective quality results are presented. The proposed coder is better than ITU-T G.722.1 at 24 kbit/s and equivalent at 32 kbit/s.
Scalable architectures were proposed for Discrete Cosine transform (DCT). Number of processing elements (PE) can be reduced significantly using partial column structure for computing the DCT transform. This feature is...
详细信息
ISBN:
(纸本)9781424477739
Scalable architectures were proposed for Discrete Cosine transform (DCT). Number of processing elements (PE) can be reduced significantly using partial column structure for computing the DCT transform. This feature is very desirable for multimedia applications usage in handheld devices. As per transform computation, data reordering is required between stages (columns) where intermediate computed values are saved in memory-like temporary locations called FIFO's. A scalable interconnect network for both global and local data reordering and its implementation is presented in this paper. Scalability is based on transform size and desired number of processing elements (PE). The structure gives choice flexibility of throughput vs. complexity (cost and area.) of the overall system.
High Dynamic Range (HDR) imaging represents a wide range of intensity levels found in real scenes ranging from direct sunlight to shadows. However, raw HDR sequences require very huge memory space for storage. In this...
详细信息
ISBN:
(纸本)9781424479948
High Dynamic Range (HDR) imaging represents a wide range of intensity levels found in real scenes ranging from direct sunlight to shadows. However, raw HDR sequences require very huge memory space for storage. In this work, we present an approach of how an existing encoder can be used for encoding HDR video sequence with our proposed adaptive LogLuv transform. The proposed method shows considerable improvement when compared with non-adaptive LogLuv transform.
Lossy compression of hyperspectral and ultraspectral images is traditionally performed using 3D transform coding. This approach yields good performance, but the complexity and memory requirements make it unsuitable fo...
详细信息
ISBN:
(纸本)9781424479948
Lossy compression of hyperspectral and ultraspectral images is traditionally performed using 3D transform coding. This approach yields good performance, but the complexity and memory requirements make it unsuitable for onboard compression. In this paper we propose a low-complexity lossy compression scheme based on prediction, quantization and rate-distortion optimization. The scheme employs coset codes coupled with the new concept of "informed quantization", and requires no entropy coding. The performance of the resulting algorithm is competitive with that of state-of-the-art 3D transform coding schemes, but the complexity is immensely lower, making it suitable for onboard compression at high throughputs.
Luby transform code (LT code) has been a popular and practical technique in the field of channel coding since its proposal. One of the key components of LT code is a degree distribution which is used to determine the ...
详细信息
ISBN:
(纸本)9781424481262
Luby transform code (LT code) has been a popular and practical technique in the field of channel coding since its proposal. One of the key components of LT code is a degree distribution which is used to determine the relationship between source data and codewords. Luby in his proposal suggested two general methods to construct feasible degree distributions. Such general designs work appropriately in typical situations but not optimally in most cases. To explore the full potential of LT code, in this work, we make the first attempt to introduce evolutionary algorithms to optimize the degree distribution in LT code. Degree distributions are encoded as real-valued vectors and evaluated by numerical simulation of LT code. For applications of different natures, two objectives are implemented to search good degree distributions with different decoding behavior. Compared with the original design, the experimental results are quite promising and demonstrate that the degree distribution can be customized for different purposes. In addition to manually adjusting the degree distribution as the common practice, the work presented in this paper provides an efficient alternative approach to use and adapt LT code for both practitioners and researchers.
暂无评论