Thresholding for edge detection using human psychovisual phenomena
Pattern Recognition Letters
The lifting scheme: a construction of second generation wavelets
SIAM Journal on Mathematical Analysis
A hierarchical access control model for video database systems
ACM Transactions on Information Systems (TOIS)
ACSW Frontiers '05 Proceedings of the 2005 Australasian workshop on Grid computing and e-research - Volume 44
Content Access Control for JPEG Images using CRND Zigzag Scanning and QBP
CIT '06 Proceedings of the Sixth IEEE International Conference on Computer and Information Technology
Layered Access Control Schemes on Watermarked Scalable Media
Journal of VLSI Signal Processing Systems
ICVGIP '08 Proceedings of the 2008 Sixth Indian Conference on Computer Vision, Graphics & Image Processing
Dual purpose FWT domain spread spectrum image watermarking in real time
Computers and Electrical Engineering
Hidden QIM Watermarking on Compressed Data Using Channel Coding and Lifting
PReMI '09 Proceedings of the 3rd International Conference on Pattern Recognition and Machine Intelligence
Blind quality assessment system for multimedia communications using tracing watermarking
IEEE Transactions on Signal Processing
IEEE Transactions on Information Forensics and Security
IEEE Transactions on Information Theory
Writing on dirty paper (Corresp.)
IEEE Transactions on Information Theory
The JPEG2000 still image coding system: an overview
IEEE Transactions on Consumer Electronics
Compressed-domain scrambler/descrambler for digital video
IEEE Transactions on Consumer Electronics
A DCT-based MPEG-2 transparent scrambling algorithm
IEEE Transactions on Consumer Electronics
Digital rights management and watermarking of multimedia content for m-commerce applications
IEEE Communications Magazine
Wavelet families of increasing order in arbitrary dimensions
IEEE Transactions on Image Processing
IEEE Transactions on Image Processing
Improved wavelet-based watermarking through pixel-wise masking
IEEE Transactions on Image Processing
Image quality assessment: from error visibility to structural similarity
IEEE Transactions on Image Processing
Image compression using the 2-D wavelet transform
IEEE Transactions on Image Processing
A format-compliant configurable encryption framework for access control of video
IEEE Transactions on Circuits and Systems for Video Technology
Novel wavelet-based QIM data hiding technique for tamper detection and correction of digital images
Journal of Visual Communication and Image Representation
Hi-index | 0.00 |
This paper proposes a joint data-hiding and data modulation scheme to serve the purpose of quality access control of image(s) using quantization index modulation (QIM). The combined effect of external information embedding and data modulation cause visual degradation and may be used in access control through reversible process. The degree of deterioration depends on the amount of external data insertion, amount of data modulation as well as step size used in QIM. A weight function (q) and the quantization step size (@D"b) of JPEG 2000 are used for defining the step size of QIM. Lifting based discrete wavelet transform (DWT), instead of conventional DWT, is used to decompose the original image in order to achieve advantages, namely low loss in image quality due to QIM, better watermark decoding reliability and high embedding capacity for a given embedding distortion. At the decoder, data are demodulated first and watermark bits are then extracted using minimum distance decoding. Extracted watermark is used to suppress self-noise (SN) that provides better quality of image. Simulation results have shown that an improvement in peak-signal-to-noise-ratio (PSNR), mean structural-similarity-index-measure (MSSIM) and Watson distance by an amount of about 30%, 12% and 77%, respectively, are gained by authorized user when 50% coefficients of high-high (HH) coefficients are modulated.