The document discusses different types of image compression and digital image watermarking. It describes how image compression reduces the amount of data needed to represent an image by removing redundant and irrelevant information. It then explains visible and invisible watermarking, where visible watermarks are noticeable overlays and invisible watermarks embed hidden identification information in image bits. The document concludes by outlining a robust, invisible watermarking technique that embeds a pseudo-random watermark in the largest DCT image coefficients to withstand attacks like compression.
The document discusses different types of image compression and digital image watermarking. It describes how image compression reduces the amount of data needed to represent an image by removing redundant and irrelevant information. It then explains visible and invisible watermarking, where visible watermarks are noticeable overlays and invisible watermarks embed hidden identification information in image bits. The document concludes by outlining a robust, invisible watermarking technique that embeds a pseudo-random watermark in the largest DCT image coefficients to withstand attacks like compression.
The document discusses different types of image compression and digital image watermarking. It describes how image compression reduces the amount of data needed to represent an image by removing redundant and irrelevant information. It then explains visible and invisible watermarking, where visible watermarks are noticeable overlays and invisible watermarks embed hidden identification information in image bits. The document concludes by outlining a robust, invisible watermarking technique that embeds a pseudo-random watermark in the largest DCT image coefficients to withstand attacks like compression.
• Image compression is the art & science of reducing the amount
of data required to represent an image. • Fundamentals: • The term data compression refers to process of reducing the amount of data required to represent a given quantity of information. • Data & information are not same here, data are used as how the information is conveyed.(various amounts of data are used to represent the same amount of information). • Irrelavant & repeated information is called redundant data. • If b and b’ is no of bits in two representations then relative redundancy R of the representation with b bits is R=1-(1/c) compression ratio c=b/b’ • C=10 (also written 10:1 ) that is larger representation has 10 bits of data for every 1 bit of data in smaller representation. • Digital image watermarking • Distribution of images on digital media & over internet practically. These images are copied repeatedly without any error. • One way to duplication is to insert one or more items of information collectively called watermarking. • By watermarking,protects copy rights of owners as • 1. copy right identification: watermaking can provide information that serves as proof of ownership. • 2.user identification & fingerprinting • 3.authenticity determination • 4.automated monitering • 5.copy protection • Visible watermarking is opaque or semi transparent sub image,therefore it is obvious to image. Ex: television networks place visible watermarking in the upper or lower part of television screen. • Let fw represent the watermarked image. It can be expressed as the linear combination of unmarked image f & watermark w using fw=(1-α) f+ αw 0< α<1 Here watermarked image is clearly visible. Invisible watermarking • Invisible watermarking cannot be seen by naked eye. But can be reconvered by appropiate decoding algorithm. • LSB of an 8bit image have virtually no effect on human perception,hence watermark was inserted or inserted in its two least significant bits,using the notation • fw=4(f/4)+ W/64 • Dividing & multiplying by sets the two LSB of f to zero. • Dividing w by 64 shifts its two MSB’s into two LSB’s & adding the two results generates LSB matermakered image. • By zeroing the MSB 6 bits watermarked image can be extracted. • If the image is compressed & decompressed then watermaked is destroyed. Robust invisible watermarking • Robust invisble watermarking system has to be developed to overcome the inadvertent attacks include lossy compression, linear & nonlinear filtering, croping, rotation ,resampling ,adding noise. • Typical watermarking system: • If wi is visible the decoder is not needed. • If wi is invisible the decoder is needed. • If fi & wi is used for decoding then system is private or restricted –key system otherwise public or unrestricted –key system. DCT based invisible robust watermark • Mark insertion & extraction inthe spatial domain is as follows • Step1. compute the 2-D DCT of the image to be watermarked. • step2. locate its K largest coeficients c1,c2,...ck • Step3. create a watermark by generating a K- element Pseudo random sequence of numbers w1,w2, .......wk from guassiam distribution. • Step4. embed the watermark from step 3 into K largest DCT coeficients from step2 as Ci’ = Ci(1+αwi ) 1<i<k • Step5: compute the inverse of DCT of the result from step4. • Step1. compute the 2-D DCT of the image . • step2. Extract its K largest coeficients c’1,c’2,...c’k • Step 3. compute watermark w1,w2,...wk wi= c’i-ci • Step4. measure the similarity of wi by
• Step5.compare the measured similarity with the predefined
(Undergraduate Texts in Computer Science) David R. Brooks (Auth.) - Problem Solving With Fortran 90 - For Scientists and Engineers-Springer-Verlag New York (1997) PDF