4th IEEE/ASME International Conference on Mechatronics, Embedded Systems and Applications (MESA 08), Beijing, China, October, 2008

Variable Threshold Based Reversible Watermarking: Hiding Depth Maps For Subsequent 3-D Analysis Asifullah Khan, Asad Ali, M. Tariq Mahmood, Imran Usman, and Tae-Sun Choi, Senior Member, IEEE

Abstract—This paper presents a lossless data hiding approach based on integer wavelet transform and variable threshold for a novel application of watermarking. In this novel application, a depth map of an object obtained from sequence of 2D images is secretly embedded in one of the 2-D images for subsequent 3-D analysis after transmission. Additionally, for efficient generation of the depth map, we also propose a new focus measure based on Discrete Cosine Transform (DCT) and Principal Component Analysis. The proposed approach is able not only in extracting the depth map, but also recovers the cover image. Experimental results show the capability of the proposed approach of secretly transmitting and retrieving the depth information. The employment of this novel idea of hiding depth maps in corresponding 2-D cover images could be helpful in medical and military image processing, security based stickers, mobile advertizing, image vision, law enforcement, etc. Additionally, if the depth map is generated through a standard approach, it could also help in the authentication related applications of the cover image.

I. INTRODUCTION igital watermarking has gained sizable attention from the research and academic communities, mainly due to the problems arising in securing the now easily generated, copied, and transmitted digital content. As compared to the last decade, applications of watermarking are now quite diverse and still increasing. This is because of the consistent emergence of the complex issues related to the security of digital content [1]. A very recent example is the patent filed by Canon, where the embedding of photographer’s iris information is performed in the same image being captured. Camera would be able to perform scanning of the iris as the eye is put to the viewfinder when the shot is taken. This is thus a combination of digital watermarking and iris recognition systems producing images that can be linked back to the photographer [2]. Similarly, very recently MPEG4 video codec adds watermarking capabilities and thus MPEG4000WA is introduced, which is very attractive being able to perform both authentication and integrity check. It first guarantee that the received data originated from an authentic source and secondly, that the data have not been tampered afterward [3]. Likewise, owing to the success of watermarking technologies, Philips is launching a VTrack digital watermarking solution that may deter the illicit replication of high definition movies in hotels and enable

D

This work was supported by the Higher Education Commission of Pakistan under the indigenous PhD scholarship program (17-5-1(Cu204)/HEC/Sch/2004) & GIST (KOSEF) No. R01-2007-000-20227-0

hoteliers to guarantee that they remain available to their guests [4]. A watermark is actually embedded in the cover work and is supposed to be extracted, whenever needed. However, the embedding of a watermark produces distortion in the cover work, which may not be desirable in important applications, such as, medical, military, and lawenforcement related image processing. For this purpose, the concept of distortionless or reversible watermarking has been introduced [5]. On the other hand, one of the fundamental objectives of computer vision is to reconstruct a three-dimensional (3-D) structure of objects from two-dimensional (2-D) images. Image focus analysis is one of the many approaches used for developing 3-D shape recovery or depth maps of objects. The basic idea is to estimate best focus for every pixel by taking a series of images. After that, computational approaches are employed for selecting the best focused frame for each pixel. In this context, shape from focus (SFF) is a cheap and fast approach. SFF could be an effective 3-D shape recovery phase that may be exploited in machine vision, consumer video cameras, and video microscopy [6]. It is also worthwhile to use it for the better surface understanding in electroformed sieves or meshes, photoetched components, printed circuit boards--bare or populated, silicon engineering etc [7]. For example, the depth perception is a prominent low-level task that helps a mobile robot understand the three dimensional relationship of the real world objects. Depth maps could be useful in unmanned spacecraft landings, where both fine and coarse details of depth often become crucial for safe landing. Similarly, other examples where depth maps can be exploited are: 3-D features extraction, range segmentation, and estimation of object distances from camera in image sequences, and examination of the 3-D shape of the microbiological species, etc. The aim of this work is to securely hide the depth map of an object in one of its corresponding 2-D image, which is used as a cover for subsequent analysis. To generate a depth map efficiently for subsequent 3-D analysis, we propose a new focus measure based on Discrete Cosine Transform (DCT). DCT is applied on a small window around a pixel and the focus value is calculated by accumulating energies of the modified AC coefficients. The AC coefficients are modified by subtracting the DC component. The magnitude of this difference, rather than the ratio of AC and DC coefficient is considered to be more valuable in measuring the focused value in transformed domain. To further efficiently learn the variation in this difference energy in DCT domain, we employ Principal Component Analysis (PCA). The depth

4th IEEE/ASME International Conference on Mechatronics, Embedded Systems and Applications (MESA 08), Beijing, China, October, 2008

map is then computed by maximizing this new measure based on the absolute difference of AC and DC component and PCA. Embedding is performed with the intention that the depth map can be extracted accurately as and when needed but, only by an authorized person. Additionally, after the extraction, the proposed method should be able to restore the 2-D image to its original state so that any information represented by the image may not be lost. In order to perform this novel task with less distortion being generated at embedding stage, we introduce the concept of variable threshold based reversible watermarking. Our current approach could be considered as an improvement of the technique proposed by Xuan et al. [8]. A. Scenarios where we need to hide and secretly transmit the depth maps Prospective applications of hiding depth maps as watermarks could be envisioned in mobile industry, such as, downloading of movies and 3-D games on mobile devices [9]. This may either be performed for security reasons or to reduce the bandwidth requirement. Similarly, it may be helpful in embedding and extracting depth maps from printed 2-D images through mobile devices for web-linking. Additionally, this secret hiding of depth maps could be supportive in military and medical image processing. In case of medical applications, secure and fast transmission of highly valuable information between two working units is now highly desirable. One example is the safe communication of medical images and videos between island and mainland hospitals for online discussion or telesurgery [10-12]. Another example is the secure communication of classified 3-D shape information related to injuries and skin conditions for the purpose of online negotiating interpretation and legal significance [13]. This type of secure transmission of depth information is priceless for forensic pathologists. Likewise, depth map information is very valuable for microsurgery and DNA studies [14]. As far as military applications are concerned, depth information corresponding to the 2-D image could be highly confidential and would certainly require secure transmission. However, if it is intelligently embedded and secured through secret keys, no unauthorized person could extract it. After receiving the 2-D image, depth map can be extracted and the cover image restored by an authorized person without compromising on its quality. II. REVERSIBLE WATERMARKING In digital watermarking applications related to multimedia archives, military and medical image processing; only reversible degradation of the original data is favorable. In multimedia archives, it is not desirable to store both the original and the watermarked versions. However, a content provider mostly wants the original content to be preserved besides the fact that distortion due to watermarking is

imperceptible to most users. In other applications like military image processing and crime scene investigations, images are gathered at a very high cost. Additionally, they are usually subjected to further processing steps and rigorous analysis. In such scenarios, any loss of original information may result in inaccurate analysis and thus lead to a significant error. The limitations posed by conventional watermarking approaches in applications as listed above, can be eradicated by using a reversible or lossless watermarking scheme [15]. Thus, reversible watermarking deals with the ability of a watermarking scheme to reconstruct the original data from the watermarked version. In addition, it can provide controlled access to the original content. An authorized person can access the original content by removing the watermark, while the watermarked content is still available to everyone else. This ability is not offered by the conventional watermarking approaches, where the distortions induced by watermark embedding are not reversible and thus no one has access to the original content. Regular cryptographic algorithms can also be used to achieve the reversibility property. Nonetheless, the problem with cryptographic approaches is that they cannot maintain the semantic understanding of the cover work as is done by reversible watermarking. Among the initial works in reversible watermarking is the one proposed by Fridrich et al. [5]. Vleeschouwer et al. [16] used circular interpretation of bijective transformations to propose a lossless watermarking scheme. Celik et al. [17] achieved high capacity by using a prediction based entropy coder in order to generalize a well-known LSB-substitution technique. Yang et al. proposed a reversible watermarking scheme based on integer DCT transform [18]. Similarly, the work by Xuan et al. [8] is based on reversible embedding of the watermark bits into the middle and high frequency integer wavelet coefficients. Tian et al. [19] embeds data using the difference expansion technique and is considered as one of the best reversible data scheme as regards making a tradeoff between imperceptibility and capacity of the watermarking system. Recently, Lee et al. [15], introduced a reversible image watermarking using Integer-to-Integer Wavelet Transform and exploits the high frequency coefficients of non overlapping blocks for embedding watermark. Shape From Focus (SFF) is one of the passive methods for 3D shape reconstruction. A sequence of images is taken by either relocating object in the optical axis direction or by changing the focus of the camera lens. The best-focused pixel among the sequence provides depth information about corresponding object point. Once such information is collected for all points of the object, the 3D shape can be easily recovered. The first step in SFF algorithms is to apply a focus measure operator. Focus measure is defined as a quantity to evaluate the sharpness of a pixel locally. The value of the focus measure increases as the image sharpness increases and attains the maximum for the best focused image. In literature, many focus measures have been reported in the spatial as well as in the frequency domain. Modified

4th IEEE/ASME International Conference on Mechatronics, Embedded Systems and Applications (MESA 08), Beijing, China, October, 2008

Laplacian (ML), Sum Modified Laplacian (SML), Tenenbaum Focus Measure (TFM), and Gray Level Variance (GLV) are commonly used [20]. These methods locally compute the sharpness by considering a small 2-D window around each pixel, the size of which affects the depth map accuracy and computational complexity. On the other hand, Bilal et al. [6] suggested that the accuracy of depth maps can be improved by using a 3-D window around each pixel. To further enhance the results obtained by a focus measure, an approximation method is followed. Malik et al. [20] reported many approximation methods. In traditional method, the focus value is computed for each pixel of every image by applying SML and then, in the second step, three focus values near the peak are fitted to the Gaussian model to compute a more accurate depth. Similarly, Bilal et al. proposed a fast method based on Dynamic Programming (DP) [6]. These methods provide better results than traditional methods but at high computational cost. III. PROPOSED LOSSLESS BASED DATA HIDING OF A DEPTH MAP A. Generating Depth Map Using PCA in DCT Domain In this particular work, we have used SSF for obtaining a depth map. The proposed technique, however, is general and able to embed depth maps generated through other advanced approaches [21]. An image sequence I k ( x, y ) consisting of k images of an object, each having X×Y pixels, is obtained by moving the image detector in small steps in the optical axis direction. For each pixel in the image volume a small window of size N × N , is transformed by applying DCT . Recently, a new SFF method has been introduced [22] based on DCT and PCA. We use the same idea of employing PCA for efficiently exploiting the variations in energies in transform domain. However, instead of directly applying PCA on the AC energy part corresponding to a pixel position in question, we first compute the absolute difference of AC and DC energies. That is, to better exploit the variation in the AC energy, each AC coefficient is first subtracted from the DC component. The energy of the modified AC coefficients is taken as focus measure.

F( ki , j ) =

N −1

N −1

u =1

v =1

∑ ∑

F (u , v ) −

F ( 0 ,0 )

(1)

F (u, v) are DCT coefficients of an image block and F (0,0) represents its DC component. The energies of the

where

modified AC coefficients for the sequence of pixels are collected into matrix M ( i , j ) = mkl where 1 ≤ k ≤ Z and

[ ]

1 ≤ l ≤ N − 1 . The eigenvalues λ and their corresponding eigenvectors E are computed from the covariance matrix of M ( i , j ) . The transformed data T in eigenspace is then

obtained by multiplying matrix

E with the mean µ l

subtracted data.

T = E × ( m kl − µ l )

(2)

The columns of the matrix T are known as the principal components or features in eigenspace. The first feature is employed to calculate the depth by using formula (3). The algorithm iterates XY times to compute the complete depth map for the object. Finally, the median filter is applied on the depth map to reduced the impulse noise due to the possiblity of more than one maxima in the focus curve.

Depth( i , j ) = arg max t k 1 k

(3)

B. Variable Threshold Based Lossless Data hiding The proposed data hiding scheme utilizes integer wavelet transform, variable threshold for selective embedding, and histogram modification to avoid possible overflow. Analysis of ordinary grayscale images shows that binary 0’s and 1’s are almost equally distributed in the first several ‘lower’ bit-planes [8]. However, the bias between 0’s and 1’s gradually increases in the ‘higher’ bit-planes. This fact suggests a window of opportunity as one may compress bits in more than one bit-plane creating space for hiding data. In this regard, transformation of the image to frequency domain is expected to be more deliverable for obtaining a large bias between 0’s and 1’s. For this purpose and to avoid round-off error, we use the second generation wavelet transform, such as IDWT [23]. This wavelet transform maps integer to integer and has been adopted by JPEG2000 as well. Now, besides capacity, imperceptibility of a watermarking system is also highly desirable in reversible watermarking. Therefore, to avoid high embedding distortions, we do not use LL subband for embedding. Embedding is thus performed in LH, HL, and HH, subbands, which accommodates middle and high frequency coefficients. In order to achieve security, secret key based permutation is employed to keep the secrecy of hidden information even after the algorithm is made public. As noticed by Xuan et al [8], and as is the case with most of the reversible watermarking approaches, pre-processing has to be performed before embedding to avoid possible overflow. This means that while embedding bits, we do need to change certain coefficients and equivalently, thinking of it in spatial domain; grayscale values of some pixels in the marked image may exceed the upper and/or the lower bounds. The upper bound for an eight-bit grayscale image is 255, while the lower bound is 0. In order to further enhance imperceptibility of the marked image, we propose the use of variable threshold. We believe that the distribution of HH subband encompasses more high frequency content as compared to the LH and HL subbands. Even, for some images, there might be fair enough difference of frequency content between LH and HL subbands. Embedding is performed in a coefficient, if its

4th IEEE/ASME International Conference on Mechatronics, Embedded Systems and Applications (MESA 08), Beijing, China, October, 2008

magnitude is less than the threshold value set for its respective subband. Else, embedding is not performed; however, we do need to push the non selected coefficient away from the selected ones in terms of magnitude. So in any case, the coefficient has to be modified. This helps us in elegantly extracting the watermark at the extraction stage. Let X denotes the frequency domain coefficient in question, T denotes threshold, and b is the bit to be embedded. We can thus mathematically summarize the embedding strategy as:

⎧ 2 ⋅ X + b, if X < T ⎪ q ⎪ X′ = ⎨ X +T , if X ≥ T q q ⎪ ⎪ X − (T − 1), if X ≤ −T q q ⎩

⎫ ⎪ ⎪ ⎬ ⎪ ⎪ ⎭

(4)

where X ′ represents the modified coefficient, and q=1,2,3 for LH, HL, and HH subbands respectively. The subband, where there is large high-frequency content, embedding of the bits is encouraged. Therefore, we set high thresholds for subbands having large high-frequency content. This is the essence of our technique for improving the quality of the marked image. Similarly, the extraction stage could be mathematically described as such:

⎧ X ′ / 2 , if − 2T + 1 < X ′ < 2T ⎦⎥ ⎪ ⎣⎢ q q ⎪ X = ⎨ X ′−T , if X ′ ≥ 2T q q ⎪ ⎪ X ′ + (T − 1), if X ′ ≤ −2T + 1 q q ⎩

⎫ ⎪ ⎪ ⎬ ⎪ ⎪ ⎭

(5)

where symbol ⎢⎣ p ⎥⎦ provides the largest integer value smaller than p. By applying eq. 4, we can restore the frequency coefficients to their original values. Further details of the above procedure using a fixed threshold could be found in [8]. C. Implementation Details Matlab platform is employed for the simulations related to both depth map generation and its distortionless embedding. To generate depth map of an object, we first use an optical system for obtaining a sequence of frames. Computational approaches are then applied to generate the depth map. In SFF approach, an unknown object is moved with respect to the imaging system. As a result, a sequence of images that present different levels of object focus is obtained. This change in the level of focus is obtained by changing either the lens position or the focal length. The camera and its corresponding optical system used for obtaining sequences of the above images for SFF analysis is the same as employed in [6]. We have used simulated Cone (no. of frames=97), LCD-TFT color filter (no. of frames=60) and Coin (no. of frames=60) objects for depth map analysis. One of the frames is used as a cover image. Size of the nonoverlapping mask for computing depth map is set to 3×3 and 5×5. Generally, overlapping window are used in SFF based

approaches [20]. However, in order to reduce the size of the depth map for subsequent embedding in the cover image, we used non-overlapping windows with the assumption that the depth remains the same for all the pixels in that window. Size of each frame of simulated Cone is 360×360, while that of LCD-TFT color filter and Coin is 300×300. However, for depth map embedding in equal proportions, cover frame of simulated Cone was resized to 300×300. Integer wavelet transform exploiting Cohen-DaubechiesFaraue (2,2) scheme is employed for transformation to frequency domain. Histogram modification as suggested in [8] is used to avoid possible overflow. Threshold for the detail subbands is varied as: TLH= THL =T, and THH=T+2. Secret key is used to permute the final watermark generated after concatenating header information and the depth map. In SFF, generally, there is no need of explicit registration or association of depths with their corresponding 2-D image. However, even if it is needed, Machine Learning based approaches could be applied and made available at the receiving side for demonstrating the desired association [24]. IV. RESULTS AND DISCUSSIONS In the first subsection, we analyze the performance of the depth map generation module using our novel idea of employing PCA on the absolute difference of AC and DC energies. In the second subsection, we examine and compare our proposed distortion less data hiding scheme. A. Generating Depth Maps: As explained in the implementation details section, we have conducted experiments using a synthetic and two real image sequences. Images for the real microscopic objects; TFTLCD color filter and Coin, were obtained using Microscope Control System (MCS). This system comprises of a personal computer, a frame grabber board Matrox Meteor-II, a CCD Camera (SAMSUNG CAMERA SCC-341), and a microscope (NIKON OPTIPHOT-100S). Software is used to acquire images by controlling the lens position through a step motor driver MAC 5000 having a 2.5 nm step length. The sample images are shown in Fig. 1. The performance of a focus measure is usually gauged on the basis of unimodality and monotonicity of the focus curve. The original data and their DCT coefficients for the sequences corresponding to the pixel position (140, 140) of TFT-LCD color filter and (200,200) of simulated Cone objects are plotted in Fig. 2. The effect of absolute difference of AC and DC component is shown in Fig. 3(ab). Fig. 3(c-d) show the modified AC components being transformed into the eigenspace. The curves for the first components are smoother and have greater discriminating power with respect to focus values. Therefore, we maximize the first principal component for depth map generation. Fig. 4 shows the resultant depth maps for the test objects; simulated Cone, TFT-LCD color filter and Coin.

4th IEEE/ASME International Conference on Mechatronics, Embedded Systems and Applications (MESA 08), Beijing, China, October, 2008

(a) (b) Fig. 1. Sample images (a) simulated Cone (b) TFT-LCD color filter (c) Coin

(a)

(c)

(b)

(c) (d) Fig. 2. (a) Pixel intensity and (b) DCT energy for the point (140,140) of TFT-LCD color filter. (c) & (d) show the same for the point (200,200) of simulated Cone.

(a)

(b)

4th IEEE/ASME International Conference on Mechatronics, Embedded Systems and Applications (MESA 08), Beijing, China, October, 2008

(c) (d) Fig. 3. (a) Modified AC energy and (b) its transformation into eigenspace for the point (140,140) of TFT-LCD color filter. (c) & (d) show the same for the point (200,200) of simulated Cone.

(a) (b) (c) Fig. 4. Depth maps (a) simulated Cone, (b) TFT-LCD color filter, and (c) Coin. Note: the depth maps are computed using a nonoverlapping mask of size 3×3.

A. Lossless Embedding of the Depth MAP: Figure 5(a) shows the original cover Cone image, while figure 5(b) shows the watermarked image. The depth map of the simulated Cone (figure 4(a)) is secretly embedded in figure 5(a) to obtain figure 5(b). It can be observed that the difference between the original cover and watermarked images is hardly noticeable by a human eye. The total amount of watermark bits including the depth map and auxiliary information; such as histogram preprocessing related, is 41552. The size of the cover image is 300×300 in this case. B. Performance Comparison in terms of Capacity Versus Imperceptibility Tradeoff. In this section, we compare the performance of our proposed variable threshold based scheme with that of Xuan et al. [8 ] approach. The comparison is performed in terms of making a better tradeoff between the two important and contradicting properties of reversible watermarking approaches; capacity and imperceptibility. As can be viewed in figure 6, we measure the capacity in terms of bpp, while PSNR represents the imperceptibility of the system. Figure 6 shows that the proposed technique provides better imperceptibility for the same bpp compared to that of the fixed threshold approach [8]. C. Extraction of the Depth Map and Recovery of the Cover Image: The watermark (depth map) is extracted from the watermarked image. The secret key used for random permutation and other parameters are assumed to be

provided to the watermark extractor through a private channel. The depth map after extraction and it is the same as being embedded. The number of erroneous bits is zero. Figure 7(a) shows the restored image after watermark extraction has been performed. The restored image is exactly the same as the original image. This fact is also indicated by the difference image (figure 7(b)), which is obtained by subtracting the original image from the restored image. D. Hiding Depth Maps: Potential Applications and Future Prospects: We envision several applications of our proposed idea, which are discussed below in analogy to the existing technologies for the same specific application. (a) Hologram stickers are used for verification, security, and even as a covert entity [25]. The complex optical patterns that they contain encode information about the depth and photographic appearance of the image. However, creating the master security hologram (originator) requires precision optical instruments, lasers and special photosensitive materials, which may be costly and time consuming. Our proposed approach could be used for hiding depth maps and photographic appearance of the image, where first the depth information is embedded and then extracted as and when needed. Its advantage could be its high security and the fact that it does not need some precision materials or precious machinery for extracting the embedded information. Similarly, passive stereo depth maps of face can be embedded as a watermark in identity cards provided to employs [26]. This may help in thwarting any illicit manipulation of the image on the

4th IEEE/ASME International Conference on Mechatronics, Embedded Systems and Applications (MESA 08), Beijing, China, October, 2008

(b)

(c)

(d)

(e)

identity card. It may also help in providing depth map related face information for any subsequent processing. Another prospective application could be the secret and safe communication of depth information required for online/video conferencing related to forensic pathology. Forensic pathologists document injuries or skin conditions for the purpose of negotiating interpretation and legal significance [13]. Likewise, secret communication and protection of precisely digitized surfaces in forensic pathology; including the attempt to reconstructive juxta-positioning, projecting facial or dental landmark for the purpose of quantifying shape match or non-match. Depth maps could be embedded as a watermark in face data bases both to protect the data base and enhance the performance of the recognition system. Very recently, Wang et al. [27] showed that fusion of appearance image and passive stereo depth map is helpful in improving the performance of a face recognition system. In applications, such as adaptive robotics, continuously updated depth maps are highly valuable for perceiving the local environment and taking safety measures [28]. Such valuable information may need to be communicated safely between robots as well as between high-security sensing fields for fast and safe cooperation. Secret and safe embedding of depth maps could also be employed in security cameras for assisting in separating intruders out from complex backgrounds. In case of mechanical or materials engineering related applications, if we examine a rough surface of a material, we can focus on the peaks and see these clearly. However, the lower parts of the object will be out of focus and blurred [7]. If approaches like SFF are used to measure the depth maps, it would be of high interest to mechanical and materials engineers for subsequent analysis. However, this depth information might be confidential in certain applications and therefore, should be secretly and safely embedded in the out of focus image. Similarly, the proposed idea could also work for hiding important and confidential information in their corresponding 2-D images, for example in case of electron, ultrasound, field ion emission, scanning tunneling, and atomic force microscopy.

Fig. 5. (a) shows the original Cone image, while (b) shows the watermarked image

Fig. 6. Tradeoff between capacity and imperceptibility.

(a) (b) Fig. 7. (a) shows the restored Cone image, while (b) shows the difference image obtained by subtracting the restored image from the original image.

V. CONCLUSION We have experimentally shown the secret embedding of depth maps in their corresponding 2-D images. This novel idea of secretly hiding depth maps is expected to have potential applications in medical, military image processing, law enforcement, etc. To improve the imperceptibility of the existing reversible watermarking scheme, we proposed variable threshold based algorithm operating in integer-tointeger wavelet transform. We also show that by employing PCA in the DCT domain, we can better exploit the variations in energy and thus generate improved depth maps. The proposed idea is tested by embedding depth maps generated through shape from focus, but it can also be used for the embedding of other types of depth maps. Also, in addition to still image, the same idea may be applicable for video watermarking, where depth maps can be embedded in their corresponding 2-D frames. In future, we intend to analyze and thus modify the proposed approach for achieving robustness capability as well. REFERENCES [1]

(a)

(b)

[2] [3]

A. Khan, S. F. Tahir, A. Majid, and Tae-Sun Choi, Machine Learning based Adaptive Watermark Decoding in View of an Anticipated Attack, Pattern Recognition, Elsevier Science, 41 (2008) 2594-2610. Canon Patent Application; Pub. No.: US 2008/0025574 A1 Boards and Solutions, The European Embedded Computer Magazine, April 2008.

4th IEEE/ASME International Conference on Mechatronics, Embedded Systems and Applications (MESA 08), Beijing, China, October, 2008

[4] [5]

[6]

[7]

[8]

[9]

[10]

[11]

[12]

[13]

[14]

[15]

[16]

[17]

[18]

[19]

[20]

[21] [22] [23]

[24]

[25] [26]

LCD TV Matters, LCD TV Association, Spring 2008. Fridrich, I., Goljan, M., and DU, R., Invertible authentication, Proc. SPIE, Security and Watermarking of Multimedia Contents, San Jose, CA, USA, January 2001, pp. 197-208. A. M. Bilal, T. S. Choi, “Application of Three Dimensional Shape from Image Focus in LCD/TFT Displays Manufacturing,” IEEE Trans. Consumer Electronics, 53(1): 1-4, 2007. Terry Jones, Optical Microscopy, Software to the Rescue. Visual inspection tools, technology represent the first line of defense when it comes to process and quality controls. 2007. Guorong Xuan, Yun Q. Shi, Chengyun Yang, Yizhan Zhen, Dekun Zou, Peiqi Chai, Peiqi Chai: Lossless Data Hiding Using Integer Wavelet Transform and Threshold Embedding Technique. ICME 2005: 1520-1523. Pei-Luen. P. Rau, D. Chen, Effects of Watermark and Music on Mobile Message Advertisements, Int. J. Human-Computer Studies, 64(2006) 905-914. Takahashi. T. The present and future of telemedicine in Japan. International Journal of Medical Informatics, Volume 61, Number 2, May 2001 , pp. 131-137(7). Elisabeth M.T. Wurm, Rainer Hofmann-Wellenhof, Robert Wurm, Hans Peter Soyer. Telemedicine and teledermatology: Past, present and future, Journal of German Scoiety of Dermatology. Vol. 6 (2) , 106–112, 2008. Chris Nugent, Dewar Finlay, Richard Davies, Maurice Mulvenna, Jonathan Wallace, Cristiano Paggetti, Elena Tamburini, Norman Black. The next generation of mobile medication management solutions. International Journal of Electronic Healthcare , 2007 Vol. 3, No.1 pp. 7 - 31. Wolf Schweitzer, Martin Häusler, Walter Bär and Michael Schaepman. Evaluation of 3D surface scanners for skin documentation in forensic medicine: comparison of benchmark surfaces. BMC Medical Imaging 2007, 7:1. K. Ohba, J. C. Pedraza, Ortega, K. Tanie, M. tsuji, S. Yamada. Microscopic vision system with all-in-focus and depth images, vol. 15 (2), 56-62, 2003. Machine Vision and Applications. Sunil. Lee, Chang D. Yoo, Ton Kalker, Reversible Image watermarking Based on Integer-to-Integer Wavelet Transform, IEEE Transactions on Information Forensics and Security, Vol. 2, No. 3, pp. 321-330, 2007. C. De Vleeschouwer, J. F. Delaigle, J. F., B. Macq, “Circular interpretation of bijective transformations in lossless watermarking for media asset management,” IEEE Trans. Multimedia, vol. 5, no. 1, pp. 97-105, Mar.,2003. M. U. Celik, G. Sharma, A. M. Tekalp, and E. Saber, “Reversible data hiding,” in Proc. IEEE ICIP, vol. 2, pp. 157-160, Rochester, USA, Sep., 2002. Bian Yang, M. Schmucker, W. Funk, C. Busch, and Shenghe Sun, “Integer DCT-based reversible watermarking for images using companding technique,” in Proc. SPIE, Security, Steganography, and Watermarking of Multimedia Contents, San Jose, CA, USA, Jan. 2004. J. Tian, “Reversible data embedding using a difference expansion,” IEEE Transactions on Circuits and Systems for Video Technology, pp. 890-896, Aug. 2003. A. S. Malik, T. S. Choi, “Consideration of illumination effects and optimization of window size for accurate calculation of depth map for 3D shape recovery,” Pattern Recognition, 40(1), 154-170, 2007. http://ieeexplore.ieee.org/iel5/2/4519918/04519930.pdf?tp=&isnumbe r=4519918&arnumber=4519930. M. T. Mahmood, W. J. Choi, T. S. Choi, “DCT and PCA based method for shape from focus” , ICCSA 2008, part II LNCS 5073. CALDERBANK, A.R.,D AUBECHIES, I., SWELDENS, w.,an d YEO, B.: ‘Wavelet transforms that map integers to integers’, Appl. Comput. Harmonic Anal.,1998, 5, (3), pp. 332-369. Zhiguo. Gao, and Bo Peng, 3-D reconstruction of Blood Vessels Skeleton Based on Neural Network, ICONIP, LNCS, 4234, pp. 110117, 2006. http://www.securityhologram.com/about.php ENHANCING PERSONAL IDENTITY VERIFICATION WITH DIGITAL WATERMARKS, Digimarc Corporation;

http://csrc.nist.gov/groups/SNS/piv/documents/FIPS201-PublicComments/digimarc.pdf [27] Jian-GangWang, Hui Kong, Eric Sung, Wei-Yun Yau, and Eam Khwang Teoh, Fusion of Appearance Image and Passive Stereo Depth Map for Face Recognition Based on the Bilateral 2DLDA. EURASIP Journal on Image and Video Processing, Volume 2007, Article ID 38205, 11 pages. doi:10.1155/2007/38205. [28] http://www.pr-inside.com/leading-optical-sensor-manufacturer-optexr479394.htm

Variable Threshold Based Reversible Watermarking

Similarly, Bilal et al. proposed a fast method based on Dynamic Programming. (DP) [6]. ... able to embed depth maps generated through other advanced approaches [21]. ..... [25] http://www.securityhologram.com/about.php. [26] ENHANCING ...

518KB Sizes 0 Downloads 260 Views

Recommend Documents

Comparative Study of Reversible Image Watermarking: Fragile ...
Status and Key Issues", International Journal of Network Security, Vol.2, No.3, PP.161–171, May 2006. [9] Ingemar J. Cox, Matthew L. Miller, Jeffrey A. Bloom, ...

Comparative Study of Reversible Image Watermarking: Fragile ...
1 PG Student, Department of Electronics and Communication, Gujarat ... this paper is to define the purpose of reversible watermarking, reflecting recent progress ...

Intelligent reversible watermarking and authentication ...
Jun 29, 2012 - ... Korea University of Technology and Education Cheonan, Chungnam, ...... A. Khan et al. / Information Sciences 216 (2012) 155–175. 171 ...

Comparative Study of Reversible Image Watermarking
1 PG Student, Department of Electronics and Communication, Gujarat Technological University. Chandkheda, Gujarat, India. 1 [email protected]. Abstract.

Reversible Watermarking for 3D Cameras: Hiding ...
DCT is applied on a small window around a pixel and the focus val- ue is calculated by accumulating ... versible data hiding technique using adaptive threshold for depth map hiding in its cover image, in section 6 we ..... by controlling the lens pos

variable block carry skip logic using reversible gates
its carry output, Ci+1, when Pi = Ai⊕Bi. Multiple full- adders, called a .... architecture for adder circuits using reversible logic based on minimizing gate count, ...

Reversible Sketch Based on the XOR-based Hashing
proportional to the sketch length at none cost of the storage space and a little cost of the update ... Using a large amount of real Internet traffic data from NLANR,.

PHONOLOGICAL FEATURE BASED VARIABLE ...
the speech signal by tying the framing strategy with the de- tected phone .... signal is not required. On the ..... ASR models for phone-class dependent N-best list.

Self-Interference Threshold-Based MIMO Full-Duplex ... - IEEE Xplore
leads to a non-convex optimization problem. In this letter, we in- troduce a maximum Self-Interference Threshold (SIT) constraint to the sum-rate maximization ...

A DWT Based Blind Watermarking Method with High ...
... are these sorted values. We quantize the distance of C2 and C3 according to the distance from C1 and C4. We define ∆ as (1). α. ×. −. = Δ. 2. 1. 4. C. C. (1). In (1) α is the strength of watermark. Higher values for α increase the robust

An integrated visual saliency-based watermarking ...
domain, which exploits the characteristics of human visual system (HVS) to ... embedded the watermark into the host image based on ...... the references to color in this figure, the reader is referred to the web version of this article.) Fig. 8.

Rate-Distortion based Video Watermarking for storing ...
to monitor the improper activities in an environment. At the same time, ... But the security flaw overlooked in this system is that once the modifications are done.

Color Image Watermarking Based on Fast Discrete Pascal Transform ...
It is much more effective than cryptography as cryptography does not hides the existence of the message. Cryptography only encrypts the message so that the intruder is not able to read it. Steganography [1] needs a carrier to carry the hidden message

A Novel Blind Watermarking Scheme Based on Fuzzy ...
In this paper, a novel image watermarking scheme in DCT domain based on ... health professionals and manipulated and managed more easily [13],[15] .... log),(. (8). And 'entropy' is an indication of the complexity within an image. A complex ..... dif

Robust Image Watermarking Based on Local Zernike ...
Signal Processing Laboratory, School of Electrical Engineering and INMC, ..... to check whether the suspect image is corrupted by resizing or scal- ing attacks.

High capacity audio watermarking based on wavelet ...
cessing (IIH-MSP'06), Pasadena,CA USA, pp. 41-46,2006. [7] M.A.Akhaee,S.GhaemMaghami,and N.Khademi,“A Novel. Technique forAudio Signals Watermarking in the Wavelet and Walsh Transform Domains”,IEEEInternational Sympo- sium on Intelligent Signal P

Sharp Threshold Detection Based on Sup-norm Error ...
May 3, 2015 - E (X1(τ)X1(τ) ) denote the population covariance matrix of the covariates. ... 1 ≤ s ≤ 2m, a positive number c0 and some set S ⊂ R, the following condition holds wpa1 κ(s, c0,S) = min ..... package of Friedman et al. (2010).

Photonic variable delay devices based on optical birefringence
Nov 2, 2001 - Huignard,. “TWo—dimensional optical architecture for time—delay beam forming in ...... 7A and 7B, for the bi-directional operation, an external.

sac-reversible-patron.pdf
There was a problem previewing this document. Retrying... Download. Connect more apps... Try one of the apps below to open or edit this item.

Reversible Data Hiding
technique, which enables the exact recovery of the original host signal upon extraction of the ... ues in the digital representation of the host signal, e.g. overflows.

Multivariate contemporaneous-threshold ...
Available online 17 September 2010. JEL classification: ..... regimes (a problem which is, of course, common to many of the multiple-regime multivariate models ...... As an illustration, we analyze the low-frequency relationship between stock ...

Reversible-Reactions-derivation.pdf
There was a problem previewing this document. Retrying... Download. Connect more apps... Try one of the apps below to open or edit this item.

Reversible Tote Bag.pdf
with my 1⁄4" sewing machine foot. Begin by cutting two 17" squares. from each of your two fabrics. Then cut four 14" strips of webbing. Now you're ready to start ...