Analysis of Different Interpolation Methods in Watermarking Scheme Based on Prediction Error Expansion, Interpolation and Segmentation

被引:0
作者
Shama, Majeza Begum [1 ]
Abir, Tasnim Azad [1 ]
机构
[1] Khulna Univ Engn & Technol KUET, Dept Elect & Commun Engn, Khulna, Bangladesh
来源
2019 5TH INTERNATIONAL CONFERENCE ON ADVANCES IN ELECTRICAL ENGINEERING (ICAEE) | 2019年
关键词
Image watermarking; Interpolation; Prediction error expansion; Segmentation;
D O I
10.1109/icaee48663.2019.8975611
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
Watermarking is a way to keep secret information hidden in the cover media that is indistinguishable to the human eye but easily noticeable to the decoder. In this paper, a watermarking scheme is analyzed based on prediction error expansion using interpolation and segmentation in order to find an optimal watermarking technique. In this method, watermark is embedded into a cover image using additive prediction error expansion method by interpolating and segmenting the cover image. Interpolation reduces artifacts and segmentation distinguishes sharp areas and smooth areas. Here, interpolation is used instead of other prediction method in order to reduce the computation time and complexity of the method. Segmentation is used so that higher embedding capacity can be used for sharp segments and lower embedding capacity for smooth regions using additive PEE. The interpolation method will be varied to determine the most efficient interpolation method for this scheme. Different noise attacks will be applied to find the robustness of the method. The idea of applying different bits in different segments will be applied. For this purpose, the segments are classified into different classes according to their average slopes. The segments that have higher slopes will get more bits embedded into them. Finally, different performance parameters like PSNR, NCC, MSE & embedding capacity will be calculated for evaluating the proposed scheme.
引用
收藏
页码:171 / 176
页数:6
相关论文
共 15 条
[1]  
Cox I. J., 2001, IEEE T INF FORENSICS, V5, P187
[2]  
Jaiswal S.P., 2014, PROC INT WORKSHOP DI, P276
[3]  
Jaiswal SP, 2013, IEEE IMAGE PROC, P4540, DOI 10.1109/ICIP.2013.6738935
[4]   Reversible data hiding based on prediction error expansion using adjacent pixels [J].
Kumar, Manoj ;
Agrawal, Smita .
SECURITY AND COMMUNICATION NETWORKS, 2016, 9 (16) :3703-3712
[5]  
Lee CF, 2018, PROCEEDINGS OF 2018 3RD INTERNATIONAL CONFERENCE ON COMPUTER AND COMMUNICATION SYSTEMS (ICCCS), P207, DOI 10.1109/CCOMS.2018.8463259
[6]   Towards unsupervised physical activity recognition using smartphone accelerometers [J].
Lu, Yonggang ;
Wei, Ye ;
Liu, Li ;
Zhong, Jun ;
Sun, Letian ;
Liu, Ye .
MULTIMEDIA TOOLS AND APPLICATIONS, 2017, 76 (08) :10701-10719
[7]  
Mousavi M., 2016, ROBUST MED IMAGE WAT
[8]   Adaptive interpolation and segmentation based reversible image watermarking [J].
Samee, Rida ;
Riaz, M. Mohsin ;
Ghafoor, Abdul .
MULTIMEDIA TOOLS AND APPLICATIONS, 2018, 77 (20) :26821-26843
[9]  
Shekaramiz K, 2017, 2017 3RD INTERNATIONAL CONFERENCE ON PATTERN RECOGNITION AND IMAGE ANALYSIS (IPRIA), P32, DOI 10.1109/PRIA.2017.7983060
[10]   Multiple watermarking technique for securing online social network contents using Back Propagation Neural Network [J].
Singh, Amit Kumar ;
Kumar, Basant ;
Singh, Sanjay Kumar ;
Ghrera, S. P. ;
Mohan, Anand .
FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE, 2018, 86 :926-939