The increasing attractiveness and trust on digital photography has given rise to new acceptability issues in the field of image forensics. There are many advantages to using digital images. Digital cameras produce imm...
详细信息
ISBN:
(纸本)9781467329064
The increasing attractiveness and trust on digital photography has given rise to new acceptability issues in the field of image forensics. There are many advantages to using digital images. Digital cameras produce immediate images, allowing the photographer to outlook the images and immediately decide whether the photographs are sufficient without the postponement of waiting for the film and prints to be processed. It does not require external developing or reproduction. Furthermore, digital images are easily stored. No conventional "original image" is prepared here like traditional camera. Therefore when forensic researchers analyze the images they don't have access to the original image to compare. Fraud by conventional photograph is relatively difficult, requiring technical expertise. Whereas significant features of digital photography is the ease and the decreased cost in altering the image. Manipulation of digital images is simpler. With some fundamental software, a digitally-recorded image can easily be edited. The most of the alterations include borrowing, cloning, removal and switching parts of a digital image. A number of techniques are available to verify the authenticity of images. But the fact is that number of image tampering is also increasing. The forensic researchers need to find new techniques to detect the tampering. For this purpose they have to find the new anti-forensic techniques and solutions for them. In this paper a new anti-forensic technique is considered, which is capable of removing the evidences of compression and filtering. It is done by adding a specially designed noise called tailored noise to the image after processing. This method can be used to cover the history of processing in addition to that it can be also used to remove the signature traces of filtering.
A novel 4-way pipelined processing architecture is presented for three-step search block-matching motion estimation. For the 4-way pipelined processing, we have developed a method which divides the current block and s...
详细信息
A novel 4-way pipelined processing architecture is presented for three-step search block-matching motion estimation. For the 4-way pipelined processing, we have developed a method which divides the current block and search area into 4 subregions respectively and processes them concurrently. Also, we have developed a memory partitioning method to access pixel data from the 4 subregions concurrently without memory conflict. The architecture has been designed and simulated with C language and VHDL. Simulation results show that the proposed architecture achieves a high performance for real time motion estimation
The image compression has always been one of the competitive fields of studies. It aims to represent an image in a minimal size in bytes without compromising the image quality. Our method; the numbering combinations m...
详细信息
ISBN:
(纸本)9781467385275
The image compression has always been one of the competitive fields of studies. It aims to represent an image in a minimal size in bytes without compromising the image quality. Our method; the numbering combinations method, consists on calculating all the possible combinations of the pixels and associate an index to our image through all the mentioned combinations. This index is a unique identifier of the image. However, with real images, the index of an image is a big number and it is difficult to manipulate it or to talk about image compression. The idea is to implement our algorithm as an image compression technique and test it in transmission to judge its performances.
A new technique for watermarking of MPEG compressed video streams is proposed. The watermarking scheme operates directly in the domain of MPEG program streams. Perceptual models are used during the embedding process i...
详细信息
A new technique for watermarking of MPEG compressed video streams is proposed. The watermarking scheme operates directly in the domain of MPEG program streams. Perceptual models are used during the embedding process in order to preserve the video quality. The watermark is embedded in the compressed domain and is detected without the use of the original video sequence. Experimental evaluation demonstrates that the proposed scheme is able to withstand a variety of attacks. The resulting watermarking system is fast and reliable, and is suitable for copyright protection and real-time content authentication applications.
This paper presents a meta-heuristic based technique Discrete Particle Swarm Optimization (DPSO) to address the permanent link failures in Application-Specific Network-on-Chip (NoC) design. Application-specific NoC ba...
详细信息
ISBN:
(数字)9781728137063
ISBN:
(纸本)9781728137070
This paper presents a meta-heuristic based technique Discrete Particle Swarm Optimization (DPSO) to address the permanent link failures in Application-Specific Network-on-Chip (NoC) design. Application-specific NoC based designs are more flexible with the current application requirements. With the advent of technology, dense integration of components on a chip gradually degraded the reliability and system performance. Therefore, to improve the reliability and system performance in application-specific NoC design, the proposed technique places the spare links in the likelihood of link faults. Experimentations have performed for different application benchmarks to leverage the efficiency of proposed technique. The results show that overhead in communication cost over fault-free result is minimum.
This paper proposes a novel multi-scale image hashing method by using the location-context information of the features generated by adaptive local feature extraction techniques. The adaptive local feature extraction m...
详细信息
ISBN:
(纸本)9781479986422
This paper proposes a novel multi-scale image hashing method by using the location-context information of the features generated by adaptive local feature extraction techniques. The adaptive local feature extraction method is proposed for more robust feature descriptors. The global hash is calculated to determine whether the received image has been maliciously tampered. The multi-scale hash is calculated to locate the tampered regions. Experimental results show that the proposed tampering detection scheme is very robust against the content-preserving attacks, including both common signal processing and geometric distortions.
In this paper, we proposed a robust moving video object segmentation algorithm using features in the MPEG compressed domain. We first cluster the motion vectors and produce a motion mask. Then, a difference mask at 8 ...
详细信息
ISBN:
(纸本)0780377508
In this paper, we proposed a robust moving video object segmentation algorithm using features in the MPEG compressed domain. We first cluster the motion vectors and produce a motion mask. Then, a difference mask at 8 x 8 block size is extracted from the DC image by background subtraction method. Finally, the motion mask and the difference mask are combined conditionally to generate the final object mask based on a set of rules that are application specified and is obtained with learning or heuristic based methods. The experimental results show that this object segmentation scheme is more robust than those using DC image or motion vectors only.
In this paper, a simple watermarking scheme for digital image authentication is proposed. The insertion of a binary watermark is accomplished by adding to the lower frequency subband of discrete wavelet transform (DWT...
详细信息
In this paper, a simple watermarking scheme for digital image authentication is proposed. The insertion of a binary watermark is accomplished by adding to the lower frequency subband of discrete wavelet transform (DWT) decomposition of host image with a random binary image obtained by random permutations. The proposed scheme is secure, fast, and is immune of the well-known quantization attack. Especially the watermark extracting process has no need of the original image.
A simple watermarking scheme based on the discrete cosine transform (DCT) is proposed. To increase the hidden capacity while maintaining the robustness of the proposed method, the authors use quotient-embedding algori...
详细信息
ISBN:
(纸本)9781424431977;9780769531618
A simple watermarking scheme based on the discrete cosine transform (DCT) is proposed. To increase the hidden capacity while maintaining the robustness of the proposed method, the authors use quotient-embedding algorithm to hide the secret message in the selected low-frequency coefficients of a DCT block. Simulations show that the stego-images generated by the proposed method do robustness against image processing operations, such as JPEG2000, JPEG, cropping, processing the negative, quantization, low-pass filtering, noise additions, and so on. Moreover, the PSNR is not bad while the resultant perceived quality and hiding capability are good.
暂无评论