Pages

Sunday, January 2, 2011

Some Studies on Identification and Protection of Multimedia Information

Work: Digital Image Watermarking

Digital media is a craze these days. With the present day internet connectivity the world has become smaller. The copyright protection, of intellectual properties has become a necessity for prevention of illegal copying and content integrity verification. Presently there are many programs that open files only if they have an invisible watermark to support the authentication. Such programs as Adobe Reader and Microsoft Word are examples of this type of notice being displayed upon opening an invisible watermarked-file. Even digital watermark may be used as well to "fingerprint," so to speak, the file with the purchaser's information. If multiple copies are made and distributed, this watermark will be in the file and can be traced back to the purchaser. This watermarking is a method of data authentication by embedding a watermark in any multimedia signal characteristics. Newer data hiding techniques that are imperceptible, robust, have lower complexity, with high data hiding rate and security are therefore being implemented.

The most common type of digital watermark is a particular pattern which may be easily visible in any multimedia data. This pattern is placed in such a manner so that people viewing cannot distribute without it being shown and it cannot be edited out easily. There are two types of digital watermarks: visible and invisible. Visible takes the form of a translucent overlaid, such as described above, whereas invisible is hidden within the coding of the object itself. Imperceptibility, robustness and trustworthiness of the watermarking scheme are the main areas of focus for implementation. For embedding of the watermark for copyright protection in any multimedia data either the spatial domain embedding of watermark or transform domain embedding was normally preferred. The common types being discrete Fourier transform (DFT), discrete wavelet transform (DWT), discrete cosine transform (DCT), singular value decomposition (SVD), etc. and their variants.

Real life watermarking algorithms are purely application oriented copyright protection schemes. So from one field to another the person may have to optimize different criteria in different domains. But from general point of view mainly four parameters must be taken into account while developing a data hiding technique as for e.g. imperceptibility, robustness, capacity and time complexity. Therefore the previous works majorly support, or find solution for any one or two parameters at a time and also the simulation results are good, but major parts are heuristic in nature. Presently the newer breeds of watermarking techniques coming up are in dual or hybrid domain, where the two or more popular transforms or spatial techniques, are being used together with or without modifications. These may be like using DWT-DCT, DWT-SVD, DWT-DCT-SVD, Contulet and Ridgelet Transform, Walsh Transform, LSB (least significant bit) based techniques with QIM (Quantization Index Modulation), PN (pseudorandom noise) sequence, and many more or the other possible combinations of these. The dynamically adaptive watermarking techniques using soft computing skills or algorithms with intelligence are becoming popular as well. Popularized by using neural networks, fuzzy logic, neuro-fuzzy, or watermarking techniques optimized by PSO (particle swarm optimization), GA (genetic algorithm), etc. and many more of these soft computing combinations, or any other optimization scheme. Moreover with the advancement of the multimedia data transfer mechanisms with lower bandwidth, lower cost and higher transmission speed has made the inclusion of communication criteria a must. Thereby present day watermarking techniques are required to provide copyright infringement with better robustness. But the technique must take in to account the speed, ease of implementation, transmission criterions in communication channel, hardware implimentability, mathematical justification, etc both objectively and subjectively. Thereby for the sake of commercial value, and importance of the work best results are required. This is because as due to present day advancements a lot of previous works based on a single transform or more are no longer of any importance due to their various drawbacks and susceptibility to attacks of different forms.

Candidate has already made an extensive survey as well as modification of some work established algorithm to reach the best possible target. The candidate finds that transform domain algorithm with visual information characteristics behavior supports to obtain the best possible openings for the ultimate protection answer. This is done by optimizing the aforesaid parameters for any real time visual information hiding algorithms for practical applications.

Publications:

International Journals:
  • 2011: "BPNN and SVD based Watermarking Scheme", International Journal of Recent Trends in Engineering [ISSN 1797-9617], Volume 4 No. x , February 2011. (S. Majumder, T. S. Das, S. Sarkar, S. K. Sarkar)
  • 2010: "SVD and Lifting Wavelet Based Fragile Image Watermarking", International Journal of Recent Trends in Engineering [ISSN 1797-9617], pg 97-100 of Volume 3 No. 1 May 2010. DOI: 01.IJRTET.2010.03.01.83 (S. Majumder, T. S. Das, S. Sarkar, S. K. Sarkar)
International Conferences:
  • 2011: "DWT and SVD based Image Watermarking Scheme using Noise Visibility and Contrast Sensitivity", pg 938-942 proceedings of IEEE International Conference on Recent Trends in Information Technology (ICRTIT 2011) ISBN-978-1-4577-0590-8/11 , held on 3rd to 5th June 2011, organized by Madras Institute of Technology, Anna University, Chromepet, Chennai. (S. Majumder, T. S. Das, S. K. Sarkar)
  • 2011: "Spread Spectrum Embedding of Colluder Traceable Codeword in Multimedia", pg 190-193 of proceedings of 2nd International Conference on Emerging Applications of Information Technology (EAIT 2011), organized by Computer Society of India Kolkata Chapter on 18th to 20th February 2011 in Kolkata. (M. Saikia, S. Majumder)
  • 2010: "Coded Fingerprinting Based Watermarking to Resist Collusion Attacks and Trace Colluders", pg 120-124, proceedings of International Conference in Advances in Computer Engineering(ACE-2010) ISBN - 978-1-4244-7154-6 DOI 110.1109/ACE.2010.36 published by IEEE CS DL on 21st and 22nd June 2010, in Bangalore. (M. Saikia, S. Majumder, T. S. Das, Md. A. Hussain, S. K. Sarkar)
  • 2010: "SVD and Neural Network based Watermarking Scheme", pg 1-5, Volume 70, Springer Communications in Computer and Information Science DOI: 10.1007/978-3-642-12214-9 ISSN: 1865-0929 (Print) 1865-0937 (Online), Book on Information Processing and Management as the proceedings of International Conference on Recent Trends in Business Administration and Information Processing (BAIP 2010), organized by ACEEE, held at Trivendrum 26th and 27th march 2010, India. ISBN: 978-3-642-12213-2 (Print) ISBN: 978-3-642-12214-9 (Online)(S. Majumder, T. S. Das, V. H. Mankar, S. K. Sarkar)
  • 2009: "SVD and Error Control Coding based Digital Image Watermarking", ID 61, pg 60-63, in International Conference on Advances in Computing, Control and Telecommunication Technologies'2009(ACT 2009), organized by ACEEE and published by IEEE Computer Society, held at Trivendum, India. ISBN 978-0-7695-3915-7 (S. Majumder, T. S. Das, V. H. Mankar, S. K. Sarkar)
National Conferences:
  • 2009: "Image Watermarking by Fast Lifting Wavelet Transform", pg TS-5.2.1-4, proceedings of 3rd National Conference Mathematical Techniques: Emerging Paradigms for Electronics and IT Industries (MATEIT '10), held at Department of Electronics, Deen Dayal Upadhyaya College, (University of Delhi), New Delhi 30th-31st January 2010. (S. Majumder, T. S. Das, S. Sarkar, S. K. Sarkar)
  • 2008: "A Hybrid SVD and Wavelet based Watermarking", pg 197-201, proceedings of 2nd National Conference Mathematical Techniques: Emerging Paradigms for Electronics and IT Industries (MATEIT '08), held at Department of Electronics, Deen Dayal Upadhyaya College, (University of Delhi), New Delhi 26th-28th September 2008.(S. Majumder, M. Mishra, and A.D. Singh)


No comments:

Post a Comment