Tuesday, January 28, 2020

Reversible Data Hiding on Color Images

Reversible Data Hiding on Color Images REVERSIBLE DATA HIDING ON COLOR IMAGES USING DIFFERENCE HISTOGRAM MODIFICATION Subash David A   Abstract: Data embedding is done by processing these selected coefficients of the modified subband histograms. We present a high capacity reversible watermarking scheme using the technique of difference average value coefficients of image blocks by using the tool Matlab. This scheme takes advantage of difference average value coefficients, which permits low distortion between the watermarked image and the original one caused by the LSB bit replacement operations of the watermarking technique specifically in the embedding process. By the proposed approach, compared with the conventional one-dimensional difference-histogram and one-dimensional prediction-error-histogram-based RDH methods [3] [20], the image redundancy can be better exploited and an improved embedding performance is achieved. Keywords: DPM, Histogram, LSB, Matlab, RDH, Watermarking, I.INTRODUCTION For most image data hiding methods [1], the host image is permanently distorted and it cannot be restored from the marked content. But in some applications such as medical image sharing multimedia archive management and image trans-coding any distortion due to data embedding is intolerable and the availability of the original image is in high demand. To this end, a solution called â€Å"reversible data hiding† (RDH) is proposed, in which the host image can be fully restored after data embedding. RDH is a hybrid method which combines various techniques to ensure the reversibility. Its feasibility is mainly due to the lossless compressibility of natural images. Many RDH methods [10] have been proposed in recent years, e.g., the methods based on lossless compression, difference expansion (DE), histogram shifting (HS), and integer transform [5], etc. Many researchers’ algorithm plays as an important work of RDH. In DE algorithm, the host image is divided into pixel pairs, and the difference value of two pixels in a pair is expanded to carry one data bit. All these methods aim at increasing the embedding capacity (EC) as high as possible while keeping the distortion low. This method can provide an embedding rate (ER) up to 0.5 bits per pixel (BPP) and it outperforms the previous compression based works. For the proposed method, by considering a pixel-pair and its context, a local image region is projected to a two-dimensional space to obtain a sequence of images that consisting of difference pixel variant pairs. Then, a two-dimensional difference histogram is then generated by counting the difference-pairs. Here, the DPM is an injective mapping defined on difference-pairs, and it is a natural extension of expansion embedding and shifting techniques used in current histogram-based methods. Finally, reversible data embedding is implemented according to a specifically designed difference-pair-mapping (DPM). By using the two-dimensional difference-histogram and this specific DPM, compared with the conventional one-dimensional histogram based methods, more pixels are used for carrying data while the number of shifted pixels is reduced as well, and thus an improved embedding performance is thus achieved. A new reversible authentication technique for images embeds a significant amount of data while keeping high visual quality. In order to verify the integrity of the image, we use a cryptographic hash function. The hash code is combined with a binary logo image by a bit-wise exclusive LSB replacement [9] or as well as difference pixel pair matching based on histogram matching technique in the difference image from the original image. On the other hand, a half the number of pixels of the image are added or subtracted by 1. Thus, the classification of pixels and also the terminal classification of the zeroth pixel and the last pixel are compared and shown together. II.PROPOSED WORK 2.1. Reversible Data Hiding The reversible data hiding [1] [7] in encrypted image is investigated. Most of the work on reversible data hiding focuses on the data embedding/extracting [20] on the plain spatial domain. But, in some applications, an inferior assistant or a channel administrator hopes to append some additional message, such as the origin information, image notation or authentication data, within the encrypted image though he does not know the original image content. And it is also hopeful that the original content should be recovered without any error after image decryption and message extraction at receiver side. This presents a practical scheme satisfying the above-mentioned requirements. A content owner encrypts the original image using an encryption key, and a data-hider can embed additional data into the encrypted image using a data-hiding key though he does not know the original content. Most of the existing watermarking algorithms are lossy. Permanent distortion is introduced into the host image during the embedding process and results in Peak Signal-to-Noise Ratio (PSNR) loss. In some applications such as legal, military and medical imaging, permanent loss of signal fidelity is not allowed. This highlights the necessity of lossless/reversible data hiding which can recover the original host signal perfectly after the watermark extraction. However, the payload of the reversible watermarking is typically lower than that of lossy watermarking algorithms. With an encrypted image containing additional data, a receiver may first decrypt it according to the encryption key, and then extract the embedded data and recover the original image according to the data-hiding key. In the scheme, the data extraction is not separable from the content decryption. In other words, the additional data must be extracted from the decrypted image, so that the principal content of original image is revealed before data extraction, and, if someone has the data-hiding key but not the encryption key, he cannot extract any information from the encrypted image containing additional data. In applications that image downsizing is required; the embedded information is extracted from the received image using lossless data hiding extraction method before the transcoding process. A â€Å"thin edge† location map is formed as side information for the image enhancement process. During image resizing, we divide the image into N x N blocks (for simplicity, assume N is a positive integer larger in value. To share medical images with some concomitant data, one approach involves adding, when allowed by the image file format, some extra header information. Unfortunately, header files are prone to manipulation and information loss may occur during file format conversion. Most data contained in the header of a Digital Imaging and Communications in Medicine (DICOM). fig 1: Input Original Image In the presented experimental results, the algorithm is applied to each color component of three 512 Ãâ€" 512 RGB images, for all images such as Baboon, Lena, and Fruits setting T1 = T2 = T3 in all experiments. The embedding capacity depends on the nature of the image itself. In this case, the images with a lot of low frequencies contents produce more expandable triplets with lower distortion than high frequency images such as Baboon. In particular with Fruits, the algorithm is able to embed some amount of bits with a PSNR rate in dB, but with only reduced bits image quality increases at some amount of PSNR value in dB. Location Mapping: The number of subgroup points, depth of wavelet transforms and overflow/underflow book-keeping data are the necessary side information that should be embedded into the high frequency transformation coefficients besides the hidden data. Below mentioned figure shows the embedding image retrieving process. In the first block the integer wavelet transform is applied on the original image. Then the coefficients of high frequency subbands are used for constructing the subgroups. fig 2: Location Mapping Then the data and side information is hidden. The stego image carrying hidden data will be obtained after inverse integer wavelet transform. In image recovery system, the integer wavelet transform is applied on the stego image. Then by using the side information level of wavelet applying and the points of high frequency sub bands are used to construct the subgroups. In this step the data is retrieved. Then each subband histogram is inverse modified according to its subgroup points. Embedding the normal image by considering the pixel values achieved the concept of data hiding, secret data communication, etc. We need an image, an audio; a text file, a web source to be hidden or these sources can also be used to hide a particular data or any types of files. Data hiding, secret data communication, encrypting the data plays an important role in making telemedicine applications, secrecy in defense communication, etc. Each subband histogram is modified according to its subgroup coefficients. Now the subbands are ready for data embedding. The data embedding stage hides the data by subband coefficient processing. This type of flow is called reversible data hiding. The reverse process can take the same flow of getting the image as input and doing some of watermarking procedure to hide the secret data. fig 3: Image in which the secret data is kept hidden Hiding Retrieving back the Hidden Web Source: Each and every data (any data can be hidden for instance image, audio, text file, web source, etc.) Here we have done with some updations in making the data hiding process with the new algorithm of histogram and data hiding which is used for hiding a web source and retrieving it back. These use the algorithm of reversible data hiding and that the web source link will be saved in a particular place and it can be hidden in an image. Then after that the process of decrypting the watermarked image will be carried out. Herewith below shown are the retrieved image and the web source. fig 4: Extracted Original Image A sorting technique is used in this method to record prediction-errors based on the magnitude of local variance, and a pixel will be prior embedded if it has a small local variance. This method performs well and it is superior to some typical RDH schemes. fig 5: Retrieved web link source from the Watermarked image Now the inverse formula of data embedding is applied. After that inverse integer wavelet transform is applied to obtain the image. Now the side information tells us that the Overflow/Underflow post processing is required or not. The original image is obtained after this step. In the histogram modification process, the watermark is embedded into the modified difference image. The modified difference image is scanned. Once a pixel with the difference value of -1 or 1 is encountered, we check the watermark to be embedded. III.CONCLUSION DISCUSSION: This work is an attempt to employ higher dimensional histogram as a hierarchical watermarking process along the pair mapping histogram level. Compared with the previously introduced one-dimensional histogram based methods, our technique exploits the image repetition as far as good and it achieves an improved performance. Since only one pixel of a pixel-pair is allowed to be modified by 1 in value. This issue should be investigated in the future. Moreover, utilizing more suitable two-dimensional histogram and designing more meaningful Difference Pair Mapping (in arrangement of pixels) to achieve the best embedding performance is also a valuable problem. If the bit to be embedded is 1, we move the difference value of -1 to -2 by subtracting one from the odd-line pixel or 1 to 2 by adding one to the odd-line pixel. This correlation makes the pair easier to satisfy smaller thresholds and, hence, to produce a large portion of selected expandable pairs. The major drawback of reversible data hiding algorithm, is the size of the binary map. IV.REFERENCES: [1] Y. Q. Shi, â€Å"Reversible data hiding,† in Proc. IWDW, 2004, vol. 3304, pp. 1–12, ser. Springer LNCS. [2] Y. Q. Shi, Z. Ni, D. Zou, C. Liang, and G. Xuan, â€Å"Lossless data hiding: fundamentals, algorithms and applications,† in Proc. IEEE ISCAS, 2004, vol. 2, pp. 33–36. [3] G. Coatrieux, C. L. Guillou, J. M. Cauvin, and C. Roux, â€Å"Reversible watermarking for knowledge digest embedding and reliability control in medical images,† IEEE Trans. Inf. Technol. Biomed., vol. 13, no. 2, pp. 158–165, Mar. 2009. [4] M. Fontani, A. D. Rosa, R. Caldelli, F. Filippini, A. Piva, and M. Consalvo, â€Å"Reversible watermarking for image integrity verification in hierarchical pacs,† in Proc. 12th ACM Workshop on Multimedia and Security, 2010, pp. 161–168. [5] S. Lee, C. D. Yoo, and T. Kalker, â€Å"Reversible image watermarking based on integer-to-integer wavelet transform,† IEEE Trans. Inf. Forensics Security, vol. 2, no. 3, pp. 321–330, Sep. 2007. [6] R. Li, O. C. Au, C. K. M. Yuk, S. Yip, and T. Chan, â€Å"Enhanced image trans-coding using reversible data hiding,† in Proc. IEEE ISCAS, 2007, pp. 1273–1276. [7] K.-L. Chung, Y.-H. Huang, P.-C. Chang, and H.-Y. Liao, â€Å"Reversible data hiding-based approach for intra-frame error concealment in H.264/AVC,† IEEE Trans. Circuits Syst. Video Technol., vol. 20, no. 11, pp. 1643–1647, Nov. 2010. [8] J. Fridrich, M. Goljan, and R. Du, â€Å"Lossless data embedding—new paradigm in digital watermarking,† EURASIP J. Appl. Signal Process., vol. 2002, no. 2, pp. 185–196, Feb. 2002. [9] M. U. Celik, G. Sharma, A. M. Tekalp, and E. Saber, â€Å"Lossless generalized- LSB data embedding,† IEEE Trans. Image Process., vol. 14, no. 2, pp. 253–266, Feb. 2005. [10] J. Tian, â€Å"Reversible data embedding using a difference expansion,† IEEE Trans. Circuits Syst. Video Technol., vol. 13, no. 8, pp. 890–896, Aug. 2003. [11] A. M. Alattar, â€Å"Reversible watermark using the difference expansion of a generalized integer transform,† IEEE Trans. Image Process., vol. 13, no. 8, pp. 1147–1156, Aug. 2004. [12] W. L. Tai, C. M. Yeh, and C. C. Chang, â€Å"Reversible data hiding based on histogram modification of pixel differences,† IEEE Trans. Circuits Syst. Video Technol., vol. 19, no. 6, pp. 906–910, Jun. 2009. [13] Z.Ni, Y.Q. Shi, N. Ansari, andW. Su, â€Å"Reversible data hiding,† IEEE Trans. Circuits Syst. Video Technol., vol. 16, no. 3, pp. 354–362, Mar. 2006. [14] S. K. Lee, Y. H. Suh, and Y. S. Ho, â€Å"Reversible image authentication based on watermarking,† in Proc. IEEE ICME, 2006, pp. 1321–1324. [18] M. Fallahpour, â€Å"Reversible image data hiding based on gradient adjusted prediction,† IEICE Electron. Express, vol. 5, no. 20, pp. 870–876, Oct. 2008. [19] W. Hong, T. S. Chen, and C. W. Shiu, â€Å"Reversible data hiding for high quality images using modification of prediction errors,† J. Syst. Software, vol. 82, no. 11, pp. 1833–1842, Nov. 2009. [20] D. M. Thodi and J. J. Rodriguez, â€Å"Expansion embedding techniques for reversible watermarking,† IEEE Trans. Image Process., vol. 16, no. 3, pp. 721–730, Mar. 2007.

Sunday, January 19, 2020

Poetry Essay - Anaylsis of 9 Poems :: Duffy Armitage Plath Milligan Hood Clarke Heaney

In this piece of coursework I am going to analysis and compare a number of poems, some written by the same authors and some by different authors. All 9 poems have one common link which is: Youth. The first poem is called â€Å"Stealing† and it was written by Carol Ann Duffy. This poem is about a troubled young man who takes away a snowman from someone’s garden and talks about other items he has stolen before such as a camera. In this poem there are certain words and phrases which you can relate to your sense of sight, hearing, smell, touch and taste. For example when he describes the snowman as â€Å"A mate with a mind as cold as the slice of ice,† which you can use your sense of hearing and hear someone cutting through the ice. Also where he says â€Å"I was standing alone amongst lumps of snow,† where you can picture this person standing there alone with a snowman crushed at his feet. I think this add enjoyment to the poem as it is getting you to see, hear, feel exactly what is happening in the poem which makes it more real. He uses a lot of metaphors. For an example he talks about the snowman being as â€Å"cold as the slice of ice within my own brain† and â€Å"a fierce chill pierced my gut,† where he is talking about the snowman on the outside but also talking about how he feels on the inside, cold and lonely. In this poem the poet has chosen to separate the events and place a stanza in the middle, so the poem starts off talking about the snowman and what it feels like but the third verse talks about the person’s life and then back to talking about the snowman. I think the poet has done this to add more effect to the poem, as it indicates that the person in the poem does not understand themselves let alone explain them self to anyone else. Also that they think about their lifestyle a lot and that they do not understand why they do what they do. In this poem there is no rhyme. I think this is because the poet wants to make the poem sound more serious and realistic than childish with loads of rhyming words.

Saturday, January 11, 2020

Prior Knowledge Deficit Essay

Prior knowledge comes from visual experiences, seeing those mental pictures of a subject. Prior knowledge comes before understanding what readers read, or understanding the subject. A deficit in prior knowledge inhibits student learning by taking away their educational experiences and replacing them with standardized testing. To begin with, prior knowledge plays an important role in enabling students to learn to read, and to read to learn. First, learning to read starts in kindergarten and continues through third grade, where teachers use books called primers. Primers teach students how to read because they tell stories about subjects that students already have visual experience with, such as family, friends, food, pets, or games. Since students know the basic information about such subjects, when they are being taught how to read, they understand the primers. Finally, when students enter fourth grade, they begin reading textbooks to learn about science and social studies. These students developed prior knowledge of science and social studies from kindergarten through third grade, when they attended field trips to zoos and museums, watched educational films, and completed science projects. If they learned this basic information about the natural world of science, and about the human world of social studie s, students are able to understand their textbooks. As a result, they can add new knowledge to further their education. Additionally, many students struggle with the prior knowledge deficit because of standardized testing. First of all, standardized testing takes time away from educational experience by using all the time and money on the tests. Teachers use the time on teaching students how to become test takers, instead of educating them in different experiences of the world. In the past, schools would take students on field trips to teach them mostly about science, and social studies. However, such field trips cost a lot of money; money that is currently being used on standardized tests. On one hand, traditional education consisted of students reading and writing to understand and explain the knowledge of the world. On the other hand, now day’s students are test takers, and they use their reading and writing skills for the test, just like knowledge is used to memorize all the information without understanding it. Teachers need to focus on this method because they are evaluated by the student s test scores. To summarize, prior knowledge deficit hinders students learning by taking away their educational experiences and focusing their time on standardized testing. A solution to the prior knowledge deficit is for teachers to dedicate more time on teaching students about subjects that will be used later on in further education, rather than teaching students how to become test takers.

Friday, January 3, 2020

Analysis Of Stopping By Woods On A Snowy Evening, By...

Robert Frost is a great American poet that mastered the art of eloquently imprinting his readers with an overarching idea, or theme, through his use of symbolic language, precise picture painting, and metronome rhyme and meter. Frost addresses many different themes across his poems, but sometimes has similar methods of displaying his themes; three of the most prominent are the crossroads of a decision in â€Å"Stopping by Woods on a Snowy Evening,† the battle between desire and hate in â€Å"Fire and Ice,† and the loss of innocence in â€Å"Nothing Gold Can Stay.† â€Å"Stopping By Woods on a Snowy Evening† is all about the internal debates that occur when making a decision. The poem is designed to â€Å"unsettle certitude† as Guy Rotella, a literary critic, put†¦show more content†¦The connection between Earth and a relationship is a little more subtle since he does not outright say it, but due to fire and ice being connected to emotions that come from the â€Å"world† of a relationship the reader can assume their connection to the â€Å"world† in the poem. â€Å"Fire and Ice† also draws on Frost’s tendency to â€Å"unsettle certitude† since, as Guy Rotella put it, he concludes with a point that ends up reopening what he had already closed earlier in the poem (253). Frost once again never makes a decision in this poem, he just uses the metaphor to debate with himself on why either desire or hate could be the one to destroy a relationship. Similarly to â€Å"Fire and Ice,† Robert Frost also uses an extended metaphor to show the theme in â€Å"Nothing Gold Can Stay.† Frost tells the story of how the most beautiful part of Spring only lasts a short time in couplets of iambic trimeter, and it is not until line six until the true meaning of this poem is exposed, â€Å"So Eden sank to grief† (Frost). This is alluding to the â€Å"Garden of Eden† story from the Bible when mankind was banished from the garden; which also reveals the reasoning for personifying Spring earlier in the poem by saying gold was â€Å"Her Hardest hue to hold† (Frost, 2). Frost wants the reader to connect mankinds falling from theShow MoreRelatedAnalysis Of Stopping By Woods On A Snowy Evening By Robert Frost1405 Words   |  6 PagesWhile Robert Frost is often portrayed as a regionalist poet, whose focus typically turns to the simplicity and beauty of the New England landscape, many of Frost’s poems have an underlying darkness; â€Å"Stopping by Woods on a Snowy Evening,† a seemingly simple glimpse into the beauty of a winter night, is in both content and form a metaphor for the contemplation of suicide. The title of the poem suggests a familiarity, with the narrator â€Å"stopping by† the woods, a neighborly phrase that suggests thatRead MoreAnalysis Of Robert Frost s Poem Stopping By Woods On A Snowy Evening 923 Words   |  4 PagesIn Robert Frost’s poem â€Å"Stopping by Woods on a Snowy Evening† the speaker is traveling at night through the snow and pauses with his horse near the woods by a neighbor’s house to admire the snow falling in the woods. His little horse shakes his â€Å"harness bells†, questioning his sudden respite; perhaps indicating that this isn’t the destination of their journey. Throughout the poem, the speaker seems to be wrestling between obligations and desire. For example, he continues to stand near the woods attractedRead MoreAnalysis Of Robert Frost s `` Stopping By Woods On A Snowy Evening `` And `` Mending Wall ``1817 Words   |  8 Pages Robert Frost was an American poet born on March 26, 1874. Living to the age of eighty eight, Frost was able to become an accomplished poet in his lifetime, creating beautiful works of art through his words. In many of his poems one can find similar themes that discuss intense feelings and ideas about isolation and loneliness in one’s life, such as in â€Å"Stopping by Woods on a Snowy Evening† and â€Å"Mending Wall†. Each of the following poems discussed will demonstrate that throughout Robert Frost’sRead MoreAnalysis of Acquainted with the Night and Stopping by the Woods on a Snowy Evening1471 Words   |  6 PagesResearch Paper first draft 16th Nov 2011 In a Dark Night, I Find My Answers. The two poems â€Å"Stopping By Woods on a Snowy Evening† and â€Å"Acquainted with the Night† written by Robert Frost are very similar to each other because of the simplistic form of language used and the uses of metaphors. When we first read the poem, it looks like an ordinary poem but once we go in depth and understand the meaning, it becomes so much more. Both of the poem has a very dark, gloomy and lonely setting with a reallyRead MoreEssay on Robert Frosts Life and Accomplishments1244 Words   |  5 Pagesâ€Å"In three words I can sum up everything I’ve learned about life: it goes on.† After a lifetime of ups and downs, Robert Frost said this quote. Most of his poems already shared his message, that life is not as easy as it may first appear to be. He used the simplicity of nature and vernacular speech to give his poems a casual mood, though underneath they display a much deeper meaning of life. These poems help to show people just some of the dif ficult things that will be faced in life, despite everythingRead MoreEssay about An Analysis Of Nature In The W606 Words   |  3 Pages An Analysis of Nature in the works of Robert Frost When reading poetry by Robert Frost the theme of nature is strongly present and persistent. Robert Frost uses the world around him to create a mystic feeling to his writings, almost giving the reader a sense of nostalgia. The influence of nature in Frost’s works creates a palette to paint a picture filled with symbolism for the reader to interpret. The nature in the poems makes the poem an intimate piece in which most readers can identify withRead MoreWinter: A Magical Time of Year809 Words   |  3 Pagesand the cold weather. Winter is a great time to just sit inside by a fire and read a book. The peace and quiet of winter is also what makes it one of the best seasons of the year. The analysis of the following poems â€Å"Now Winter Nights Enlarge† by Thomas Campion, â€Å"Stopping by Woods on a Snowy Evening† by Robert Frost, â€Å"Like Brooms of Steel† by Emily Dickinson, â€Å"Winter Morning† by William Jay Smith, â€Å"Winter: 10 degrees† by Barbara Novack, and â€Å"Winter Sunday† by Mark Wunderlich will show how they areRead MoreStopping by Woods on a Snowy Evening1900 Words   |  8 Pagesmore than capable of helping you achieve this is, †Å"A Sense of Place.† Among these poems the focus will be entirely placed on â€Å"Stopping by Woods on a Snowy Evening† by Robert Frost. He was born on March 17th in 1874 San Francisco, California. Frost’s mother was of Scottish descent and his father’s origin was English. This particular poem of his was written in 1922 when Frost was at the age of 48. There were several things which caused him to write the way that he did. Some of them occurred much earlierRead More Analysis of Robert Frost’s Stopping by Woods on a Snowy Evening692 Words   |  3 PagesAnalysis of Robert Frost’s Stopping by Woods on a Snowy Evening The poem, â€Å"Stopping by Woods†¦Ã¢â‚¬  speaks of a time that the author paused during a trip to simply enjoy the quiet and beauty of nature. During this short stop, he contemplates mortality and his life so far. Frost also cleverly uses the poems form and sounds to enhance the poem, to entice the readers senses, and immerse them in the scene. With repetitive â€Å"s† and â€Å"h† sounds throughout the poem one can imagineRead MoreStopping by Woods on a Snowy Evening, by Robert Frost Essay1383 Words   |  6 Pages Robert Frost uses metaphor and symbolism extensively in ‘Stopping by Woods on a Snowy Evening’, developing deeper and more complex meanings from a superficially simple poem. Frost’s own analysis contributes greatly to our appreciation of the importance of metaphor, claiming that â€Å"metaphor [is] the whole of thinking,† inviting the reader to interpret the beautiful scene in a more profound way. However, the multitude of possible interpretations sees it being read as either carefully crafted lyric