scispace - formally typeset
Search or ask a question
Author

Ahmed Al-Gindy

Other affiliations: University of Bradford
Bio: Ahmed Al-Gindy is an academic researcher from Ajman University of Science and Technology. The author has contributed to research in topics: Digital watermarking & Watermark. The author has an hindex of 6, co-authored 18 publications receiving 136 citations. Previous affiliations of Ahmed Al-Gindy include University of Bradford.

Papers
More filters
Proceedings ArticleDOI
11 Nov 2008
TL;DR: This paper presents a new algorithm for colour digital image watermarking that has shown to be resistant to JPEG compression, cropping, scaling, low-pass, median and removal attack.
Abstract: This paper presents a new algorithm for colour digital image watermarking. The 24 bits/pixel RGB images are used and the watermark is placed on the green channel of the RGB image. The green channel is chosen after an analytical investigation process was carried out using some popular measurement metrics. The analysis and embedding processes have been carried out using the discrete cosine transform DCT. The new watermarking method has shown to be resistant to JPEG compression, cropping, scaling, low-pass, median and removal attack. This algorithm produces more than 65 dB of average PSNR.

29 citations

Proceedings ArticleDOI
10 May 2009
TL;DR: It is shown that the proposed image authentication technique can resist classical attacks such as JPEG Compression, low pass filtering, median filtering, cropping, and geometrical scaling attack.
Abstract: In this paper an image authentication technique that embeds a binary watermark into a host color image is proposed. In this scheme the colour image is first transformed from the RGB to the YCbCr color space. The watermark is embedded into the Y channel of the host image by selectively modifying the very low frequency parts of the DCT transformation. It is shown that the proposed technique can resist classical attacks such as JPEG Compression, low pass filtering, median filtering, cropping, and geometrical scaling attack. Moreover, the recovery method is blind and doesn't need the original host image for extraction.

24 citations

Journal ArticleDOI
TL;DR: The proposed research demonstrates using the knowledge of integrated disciplines with virtual reality to develop a simulation platform to teach water cycle process for young kids.
Abstract: The new paradigm shift of education where learners should learn real-life scenarios and solve real-life problems has created a major challenge. Students are passive and detached and may struggle to see the relevance of what they are learning to their lives. The recent growth of emerging technologies has launched terms such as virtual reality (VR), augmented reality (AR) and mixed reality (MR) into mainstream topic. Virtual reality, an integrated, hands-on tool for learning, can play a unique role in addressing these educational challenges. The proposed research demonstrates using the knowledge of integrated disciplines with virtual reality. COSPACES and MERGE cube add-on have been used to develop a simulation platform to teach water cycle process for young kids. This type of integration develops learners’ 21st century skills to be decision makers, problem solvers, lifelong learners, creators, innovators, and to think critically in solving problems.

19 citations

01 Jan 2009
TL;DR: A new frequency domain based watermarking scheme for colour images captured by mobile phone cameras that embeds personal mobile phone numbers inside the image to protect the copy right ownership of the image is proposed.
Abstract: Summary A new frequency domain based watermarking scheme for colour images captured by mobile phone cameras is proposed. The proposed technique embeds personal mobile phone numbers inside the image. The aim of the scheme is to protect the copy right ownership of the image. Each bit of the decimal digits is inserted onto one low frequency coefficient of one of the DCT blocks of the host image. A DCT coefficient selection (DCS) process has been applied to increase the invisibility qualities, this process managed to find the coefficient with the maximum magnitude. Different embedding location depending on the spatial frequencies of the host image will be selected. The proposed algorithm achieves a high PSNR values and is found to be robust against JPEG compression and different image manipulation algorithms.

18 citations

Proceedings ArticleDOI
01 Nov 2007
TL;DR: This paper deals with a new blind technique for robust image watermarking in the DCT domain based on embedding watermark information in eight low-frequency band coefficients of the D CT sub-blocks.
Abstract: This paper deals with a new blind technique for robust image watermarking in the DCT domain. The technique is based on embedding watermark information in eight low-frequency band coefficients of the DCT sub-blocks. Single watermark has been embedded multi-times in the host image. The embedding process is based on changing the selected DCT-coefficients of the host image to odd or even values depending on the binary watermark's bit value. The proposed blind watermarking embedding has shown to be strongly robust against several attacks.

17 citations


Cited by
More filters
Journal ArticleDOI
TL;DR: An effective video watermarking method based on a pseudo-3-D discrete cosine transform (DCT) and quantization index modulation (QIM) against several attacks is proposed that can survive filtering, compressions, luminance change, and noise attacks with a good invisibility and robustness.
Abstract: The increasing popularity of the internet means that digital multimedia are transmitted more rapidly and easily. And people are very aware for media ownership. However, digital watermarking is an efficient and promising means to protect intellectual properties. Based on the intellectual property attention in the information era, how to protect the personal ownership is extremely important and a necessary scheme. In this paper, we propose an effective video watermarking method based on a pseudo-3-D discrete cosine transform (DCT) and quantization index modulation (QIM) against several attacks. The watermark is mainly inserted into the uncompressed domain by adjusting the correlation between DCT coefficients of the selected blocks, and the watermark extraction is blind. This approach consists of a pseudo-3-D DCT, watermark embedding, and extraction. A pseudo-3-D DCT, which is taken DCT transformation twice, will be first utilized to calculate the embedding factor and to obtain the useful messages. Using the QIM, we embed the watermark into the quantization regions from the successive raw frames in the uncompressed domain and record the relative information to create a secret embedding key. This secret embedding key will further apply to extraction. Experimental results demonstrate that the proposed method can survive filtering, compressions, luminance change, and noise attacks with a good invisibility and robustness.

103 citations

Journal ArticleDOI
01 Jun 2014-Optik
TL;DR: A blind watermarking scheme based on singular value decomposition (SVD) is proposed, which has stronger robustness against most common attacks such as image compression, filtering, cropping, noise adding, blurring, scaling and sharpening.

77 citations

Journal ArticleDOI
TL;DR: The proposed Discrete Shearlet Transform Transform (DST) as a new embedding domain for blind image watermarking shows greater windowing flexibility with more sensitive to directional and anisotropic features when compared against discrete wavelet and contourlets.
Abstract: Blind watermarking targets the challenging recovery of the watermark when the host is not available during the detection stage. This paper proposes Discrete Shearlet Transform (DST) as a new embedding domain for blind image watermarking. Our novel DST blind watermark detection system uses a nonadditive scheme based on the statistical decision theory. It first computes the Probability Density Function (PDF) of the DST coefficients modeled as a Laplacian distribution. The resulting likelihood ratio is compared with a decision threshold calculated using Neyman–Pearson criterion to minimize the missed detection subject to a fixed false alarm probability. Our method is evaluated in terms of imperceptibility, robustness, and payload against different attacks (Gaussian noise, blurring, cropping, compression, and rotation) using 30 standard grayscale images covering different characteristics (smooth, more complex with a lot of edges, and high detail textured regions). The proposed method shows greater windowing flexibility with more sensitive to directional and anisotropic features when compared against discrete wavelet and contourlets.

70 citations

Journal ArticleDOI
TL;DR: It is shown that the proposed channel coding-based schemes can achieve near exact watermark recovery against all kinds of attacks and the convolutional code-based additive embedding scheme is optimal, which can also achieve good performance for video watermarking after extension.
Abstract: The rapid development of big data and cloud computing technologies greatly accelerate the spreading and utilization of images and videos. The copyright protection for images and videos is becoming increasingly serious. In this paper, we proposed the robust non-blind watermarking schemes in YCbCr color space based on channel coding. The source watermark image is encoded and singular value decomposed. Subsequently, the singular value matrixes are embedded into the Y, Cb, and Cr components of the host image after four-level discrete wavelet transform (DWT). The embedding factor for each component is calculated based on the just-noticeable distortion and the singular vectors of HL subband of DWT. The peak signal-to-noise ratio of the watermarked image and the normalized correlation coefficient of the extracted watermark are investigated. It is shown that the proposed channel coding-based schemes can achieve near exact watermark recovery against all kinds of attacks. Considering both robustness and transparency, the convolutional code-based additive embedding scheme is optimal, which can also achieve good performance for video watermarking after extension.

70 citations

Journal ArticleDOI
TL;DR: The experiment results show that the proposed watermarking algorithm can ensure the invisibility and stronger robustness for the common image processing operations and geometric attacks, and the performance of this proposed method outperforms that of other proposed methods considered in this work.

69 citations