Proceedings of the International Conference on Signal Processing and Multimedia Applications, 2010
This paper presents a new approach of embedding watermarks adaptively in DC components of color i... more This paper presents a new approach of embedding watermarks adaptively in DC components of color images with respect to analysis of the image luminance in the YIQ model or the blue channel in the RGB model. The embedding strength is determined by the classification of DCT blocks, which is simply implemented in the DCT domain via just analyzing the values of two AC coefficients rather than using method such as Sobel, Canny, or Prewitt. Furthermore, a new combination algorithm of both watermark extraction and blind detection is designed, where the watermark is extracted directly in the spatial domain without knowledge of the original image. Experimental results demonstrated that the embedded watermark is robust to the attacks including JPEG-loss compression, JPEG2000, filtering, scaling, small cropping, small rotation-crop and self-similarities attacks.
Signal Processing, Pattern Recognition and Applications, 2010
In this paper, we propose a robust image watermarking scheme using visually significant feature p... more In this paper, we propose a robust image watermarking scheme using visually significant feature points, which are determined by end-stopped wavelets feature detector. These feature points can resist various types of common signal processing and geometric attacks and they can be used as synchronization marks between watermark embedding and detection. The watermark is embedded into non overlapping normalized circular regions, which are determined by feature points. The watermark embedding process is carried out by modifying DCT coefficients in selected blocks. The original unmarked image is not required at the watermark extraction. Experimental results show that the proposed scheme successfully makes the watermark perceptually invisible as well as robust against common signal processing and geometric attacks and outperforms related techniques in the literature.
Temperature monitoring and control are important in many control applications, for instance, indu... more Temperature monitoring and control are important in many control applications, for instance, industrial domains such as process heat, automotive, industrial places, storage or office buildings. This paper presents a temperature monitoring system based on 1-wire protocol communication and PIC microcontroller. The hardware implementation of the proposed temperature monitoring system uses the digital temperature sensor DS18B20, which has a unique 64-bit serial code identifier that allows multiple DS18B20s to function on the same 1-Wire bus. Therefore, one PIC microcontroller can be used to control many DS18B20s distributed over a large area. The experimental results show that the proposed system is performed well as expected.
With the rapid growth of the internet and digital media techniques over the last decade, multimed... more With the rapid growth of the internet and digital media techniques over the last decade, multimedia data such as images, video and audio can easily be copied, altered and distributed over the internet without any loss in quality. Therefore, protection of ownership of multimedia data has become a very significant and challenging issue. Three novel image watermarking algorithms have been designed and implemented for copyright protection. The first proposed algorithm is based on embedding multiple
Computer Science & Information Technology ( CS & IT ), 2014
Geometric attacks can desynchronize the location of the watermark and hence cause incorrect water... more Geometric attacks can desynchronize the location of the watermark and hence cause incorrect watermark detection. This paper presents a robust colour image watermarking scheme based on visually significant feature points and image normalization technique. The feature points are used as synchronization marks between watermark embedding and detection. The watermark is embedded into the non overlapped normalized circular regions in the luminance component or the blue component of a color image. The embedding of the watermark is carried out by modifying the DCT coefficients values in selected blocks. The original unmarked image is not required for watermark extraction Experimental results show that the proposed scheme successfully makes the watermark perceptually invisible as well as robust to common signal processing and geometric attacks.
Proceedings of 2012 UKACC International Conference on Control, 2012
This paper presents a new low cost obstacle detection system for wheeled mobile robot. The hardwa... more This paper presents a new low cost obstacle detection system for wheeled mobile robot. The hardware implementation of the proposed detection system uses two Sharp GP2D02 infra-red range sensors which are placed cross over each other in front of the robot in order to detect any object and avoid collisions. The software implementation of the proposed detection system is implemented using timer with the overflow interrupt for generating the required waveform for driving the Sharp GP2D02 infra-red range sensor. As a result, the mobile robot is able to execute different tasks without a delay on the processing time, for example driving the robot wheels and drive the Sharp sensors for detecting an object. Experimental results show that the proposed detection system successfully detect an object placed in a path of the mobile robot.
This paper presents a novel multiple digital watermarking technique for the copyright protection ... more This paper presents a novel multiple digital watermarking technique for the copyright protection of digital color images. In order to improve the robustness against cropping attacks, a binary watermark image is divided into four parts. Each is encrypted by a secret key and embedded into different regions of the blue component of the color image in the spatial domain. Watermark extraction is based on the comparisons between the original intensity pixel values and the corresponding watermarked intensity pixel values in blocks of size 8 × 8. The watermark-extracted bits are determined using the probabilities of detecting bit '1' or bit '0'. The watermark can be extracted in several parts depending on the size of the host image, but only four of these are selected by a correlation coefficient detector and used to reconstruct the extracted watermark. Experimental results show that the proposed scheme successfully makes the watermark perceptually invisible and robust for a wide range of attacks, including JPEG-loss compression, median filtering, low pass filtering, rotation, rotation-scaling, rotation-crop, image cropping, image scaling, and self-similarity attacks.
The robustness of watermarks to geometric attacks is viewed as an issue of great importance. Inde... more The robustness of watermarks to geometric attacks is viewed as an issue of great importance. Indeed, it constitutes one of the most challenging design requirements for watermarks. This study proposes a robust image watermarking scheme using visually significant feature points and image normalisation. In order to tackle the issue of geometric distortions, the authors adopt a feature extraction method based on end-stopped wavelets to extract significant geometry preserving feature points, which are shown to be robust against various types of common signal processing and geometric attacks. These feature points can be used as synchronisation marks between watermark embedding and detection. The watermark is embedded into nonoverlapping normalised circular images, which are determined by feature points. Rotation invariance is achieved via image normalisation. The watermark embedding process is performed by modifying low-frequency coefficients of discrete cosine transform blocks, which are randomly selected using a secret key. Moreover, the security of the scheme is further guaranteed by an image-dependent key. The proposed scheme is blind as the original image is not required at the watermark detection. Experimental results show that the proposed scheme is robust against geometric attacks as well as common signal processing attacks and outperforms related techniques found in the literature.
In this paper, we propose a robust multiple digital watermarking technique for the copyright prot... more In this paper, we propose a robust multiple digital watermarking technique for the copyright protection of digital color images. The watermark is a binary image, which is divided into four parts, each encrypted using a secret key and embedded using the spatial domain into four different regions of size 128×128 of the blue component of the color image. Watermark extraction is based on the comparisons between the original intensity pixel values and the corresponding watermarked intensity pixel values in blocks of size 8x8. The watermark extracted bits are determined using the probabilities of detecting bit '1' or bit '0'. The watermark can be extracted in sixteen parts but only four of these are selected by a correlation coefficient detector and used to reconstruct the extracted watermark. Experimental results show that the proposed scheme successfully makes the watermark perceptually invisible and robust for a wide range of attacks, including JPEG loss compression, median filtering, low pass filtering, rotation, rotation-scaling, rotation-crop, image cropping, image scaling and self similarity attacks.
Fifth International Conference on Information Technology: New Generations (itng 2008), 2008
This paper proposes novel robust multiple watermarking technique for color images in spatial doma... more This paper proposes novel robust multiple watermarking technique for color images in spatial domain. The host image is divided into four different regions. Each region consists of four 128*128 blocks in order to hide a watermark. The watermark is a binary image, encrypted and embedded into different regions of the blue component of the host image by altering intensity values
Proceedings of the International Conference on Signal Processing and Multimedia Applications, 2010
This paper presents a new approach of embedding watermarks adaptively in DC components of color i... more This paper presents a new approach of embedding watermarks adaptively in DC components of color images with respect to analysis of the image luminance in the YIQ model or the blue channel in the RGB model. The embedding strength is determined by the classification of DCT blocks, which is simply implemented in the DCT domain via just analyzing the values of two AC coefficients rather than using method such as Sobel, Canny, or Prewitt. Furthermore, a new combination algorithm of both watermark extraction and blind detection is designed, where the watermark is extracted directly in the spatial domain without knowledge of the original image. Experimental results demonstrated that the embedded watermark is robust to the attacks including JPEG-loss compression, JPEG2000, filtering, scaling, small cropping, small rotation-crop and self-similarities attacks.
Signal Processing, Pattern Recognition and Applications, 2010
In this paper, we propose a robust image watermarking scheme using visually significant feature p... more In this paper, we propose a robust image watermarking scheme using visually significant feature points, which are determined by end-stopped wavelets feature detector. These feature points can resist various types of common signal processing and geometric attacks and they can be used as synchronization marks between watermark embedding and detection. The watermark is embedded into non overlapping normalized circular regions, which are determined by feature points. The watermark embedding process is carried out by modifying DCT coefficients in selected blocks. The original unmarked image is not required at the watermark extraction. Experimental results show that the proposed scheme successfully makes the watermark perceptually invisible as well as robust against common signal processing and geometric attacks and outperforms related techniques in the literature.
Temperature monitoring and control are important in many control applications, for instance, indu... more Temperature monitoring and control are important in many control applications, for instance, industrial domains such as process heat, automotive, industrial places, storage or office buildings. This paper presents a temperature monitoring system based on 1-wire protocol communication and PIC microcontroller. The hardware implementation of the proposed temperature monitoring system uses the digital temperature sensor DS18B20, which has a unique 64-bit serial code identifier that allows multiple DS18B20s to function on the same 1-Wire bus. Therefore, one PIC microcontroller can be used to control many DS18B20s distributed over a large area. The experimental results show that the proposed system is performed well as expected.
With the rapid growth of the internet and digital media techniques over the last decade, multimed... more With the rapid growth of the internet and digital media techniques over the last decade, multimedia data such as images, video and audio can easily be copied, altered and distributed over the internet without any loss in quality. Therefore, protection of ownership of multimedia data has become a very significant and challenging issue. Three novel image watermarking algorithms have been designed and implemented for copyright protection. The first proposed algorithm is based on embedding multiple
Computer Science & Information Technology ( CS & IT ), 2014
Geometric attacks can desynchronize the location of the watermark and hence cause incorrect water... more Geometric attacks can desynchronize the location of the watermark and hence cause incorrect watermark detection. This paper presents a robust colour image watermarking scheme based on visually significant feature points and image normalization technique. The feature points are used as synchronization marks between watermark embedding and detection. The watermark is embedded into the non overlapped normalized circular regions in the luminance component or the blue component of a color image. The embedding of the watermark is carried out by modifying the DCT coefficients values in selected blocks. The original unmarked image is not required for watermark extraction Experimental results show that the proposed scheme successfully makes the watermark perceptually invisible as well as robust to common signal processing and geometric attacks.
Proceedings of 2012 UKACC International Conference on Control, 2012
This paper presents a new low cost obstacle detection system for wheeled mobile robot. The hardwa... more This paper presents a new low cost obstacle detection system for wheeled mobile robot. The hardware implementation of the proposed detection system uses two Sharp GP2D02 infra-red range sensors which are placed cross over each other in front of the robot in order to detect any object and avoid collisions. The software implementation of the proposed detection system is implemented using timer with the overflow interrupt for generating the required waveform for driving the Sharp GP2D02 infra-red range sensor. As a result, the mobile robot is able to execute different tasks without a delay on the processing time, for example driving the robot wheels and drive the Sharp sensors for detecting an object. Experimental results show that the proposed detection system successfully detect an object placed in a path of the mobile robot.
This paper presents a novel multiple digital watermarking technique for the copyright protection ... more This paper presents a novel multiple digital watermarking technique for the copyright protection of digital color images. In order to improve the robustness against cropping attacks, a binary watermark image is divided into four parts. Each is encrypted by a secret key and embedded into different regions of the blue component of the color image in the spatial domain. Watermark extraction is based on the comparisons between the original intensity pixel values and the corresponding watermarked intensity pixel values in blocks of size 8 × 8. The watermark-extracted bits are determined using the probabilities of detecting bit '1' or bit '0'. The watermark can be extracted in several parts depending on the size of the host image, but only four of these are selected by a correlation coefficient detector and used to reconstruct the extracted watermark. Experimental results show that the proposed scheme successfully makes the watermark perceptually invisible and robust for a wide range of attacks, including JPEG-loss compression, median filtering, low pass filtering, rotation, rotation-scaling, rotation-crop, image cropping, image scaling, and self-similarity attacks.
The robustness of watermarks to geometric attacks is viewed as an issue of great importance. Inde... more The robustness of watermarks to geometric attacks is viewed as an issue of great importance. Indeed, it constitutes one of the most challenging design requirements for watermarks. This study proposes a robust image watermarking scheme using visually significant feature points and image normalisation. In order to tackle the issue of geometric distortions, the authors adopt a feature extraction method based on end-stopped wavelets to extract significant geometry preserving feature points, which are shown to be robust against various types of common signal processing and geometric attacks. These feature points can be used as synchronisation marks between watermark embedding and detection. The watermark is embedded into nonoverlapping normalised circular images, which are determined by feature points. Rotation invariance is achieved via image normalisation. The watermark embedding process is performed by modifying low-frequency coefficients of discrete cosine transform blocks, which are randomly selected using a secret key. Moreover, the security of the scheme is further guaranteed by an image-dependent key. The proposed scheme is blind as the original image is not required at the watermark detection. Experimental results show that the proposed scheme is robust against geometric attacks as well as common signal processing attacks and outperforms related techniques found in the literature.
In this paper, we propose a robust multiple digital watermarking technique for the copyright prot... more In this paper, we propose a robust multiple digital watermarking technique for the copyright protection of digital color images. The watermark is a binary image, which is divided into four parts, each encrypted using a secret key and embedded using the spatial domain into four different regions of size 128×128 of the blue component of the color image. Watermark extraction is based on the comparisons between the original intensity pixel values and the corresponding watermarked intensity pixel values in blocks of size 8x8. The watermark extracted bits are determined using the probabilities of detecting bit '1' or bit '0'. The watermark can be extracted in sixteen parts but only four of these are selected by a correlation coefficient detector and used to reconstruct the extracted watermark. Experimental results show that the proposed scheme successfully makes the watermark perceptually invisible and robust for a wide range of attacks, including JPEG loss compression, median filtering, low pass filtering, rotation, rotation-scaling, rotation-crop, image cropping, image scaling and self similarity attacks.
Fifth International Conference on Information Technology: New Generations (itng 2008), 2008
This paper proposes novel robust multiple watermarking technique for color images in spatial doma... more This paper proposes novel robust multiple watermarking technique for color images in spatial domain. The host image is divided into four different regions. Each region consists of four 128*128 blocks in order to hide a watermark. The watermark is a binary image, encrypted and embedded into different regions of the blue component of the host image by altering intensity values
Uploads
Papers by Ibrahim nasir