scispace - formally typeset
Author

B. Chandra Mohan

Bio: B. Chandra Mohan is an academic researcher from Bapatla Engineering College. The author has contributed to research in topic(s): Digital watermarking & Watermark. The author has an hindex of 11, co-authored 21 publication(s) receiving 406 citation(s). Previous affiliations of B. Chandra Mohan include Jawaharlal Nehru Technological University, Hyderabad.

Papers
More filters
Journal ArticleDOI

[...]

TL;DR: This paper presents a robust image watermarking scheme for multimedia copyright protection that is more secure and robust to various attacks, viz., JPEG2000 compression, JPEG compression, rotation, scaling, cropping, row-column blanking, rows-column copying, salt and pepper noise, filtering and gamma correction.
Abstract: This paper presents a robust image watermarking scheme for multimedia copyright protection. In this work, host image is partitioned into four sub images. Watermark image such as ‘logo’ is embedded in the two of these sub images, in both D (singular and diagonal matrix) and U (left singular and orthogonal matrix) components of Singular Value Decomposition (SVD) of two sub images. Watermark image is embedded in the D component using Dither quantization. A copy of the watermark is embedded in the columns of U matrix using comparison of the coefficients of U matrix with respect to the watermark image. If extraction of watermark from D matrix is not complete, there is a fair amount of probability that it can be extracted from U matrix. The proposed algorithm is more secure and robust to various attacks, viz., JPEG2000 compression, JPEG compression, rotation, scaling, cropping, row-column blanking, row-column copying, salt and pepper noise, filtering and gamma correction. Superior experimental results are observed with the proposed algorithm over a recent scheme proposed by Chung et al. in terms of Bit Error Rate (BER), Normalized Cross correlation (NC) and Peak Signal to Noise Ratio (PSNR).

85 citations

Journal ArticleDOI

[...]

TL;DR: CBIR system using Exact Legendre Moments (ELM) for gray scale images is proposed in this work, and Superiority of the proposed CBIR system is observed over other moment based methods in terms of retrieval efficiency and retrieval time.
Abstract: Content Based Image Retrieval (CBIR) systems based on shape using invariant image moments, viz., Moment Invariants (MI) and Zernike Moments (ZM) are available in the literature. MI and ZM are good at representing the shape features of an image. However, non-orthogonality of MI and poor reconstruction of ZM restrict their application in CBIR. Therefore, an efficient and orthogonal moment based CBIR system is needed. Legendre Moments (LM) are orthogonal, computationally faster, and can represent image shape features compactly. CBIR system using Exact Legendre Moments (ELM) for gray scale images is proposed in this work. Superiority of the proposed CBIR system is observed over other moment based methods, viz., MI and ZM in terms of retrieval efficiency and retrieval time. Further, the classification efficiency is improved by employing Support Vector Machine (SVM) classifier. Improved retrieval results are obtained over existing CBIR algorithm based on Stacked Euler Vector (SERVE) combined with Modified Moment Invariants (MMI).

59 citations

Journal ArticleDOI

[...]

TL;DR: In this paper, an orthogonal moment based CBIR system using exact Legendre Moments (ELM) for gray scale images is proposed, which can represent image shape features compactly.
Abstract: Content Based Image Retrieval (CBIR) systems based on shape using invariant image moments, viz., Moment Invariants (MI) and Zernike Moments (ZM) are available in the literature. MI and ZM are good at representing the shape features of an image. However, non-orthogonality of MI and poor reconstruction of ZM restrict their application in CBIR. Therefore, an efficient and orthogonal moment based CBIR system is needed. Legendre Moments (LM) are orthogonal, computationally faster, and can represent image shape features compactly. CBIR system using Exact Legendre Moments (ELM) for gray scale images is proposed in this work. Superiority of the proposed CBIR system is observed over other moment based methods, viz., MI and ZM in terms of retrieval efficiency and retrieval time. Further, the classification efficiency is improved by employing Support Vector Machine (SVM) classifier. Improved retrieval results are obtained over existing CBIR algorithm based on Stacked Euler Vector (SERVE) combined with Modified Moment Invariants (MMI).

51 citations

[...]

01 Jan 2008
TL;DR: A novel oblivious and highly robust watermarking scheme using Multiple Descriptions (MD) and Quantization Index Modulation (QIM) of the host image and superior in terms of Peak Signal to Noise Ratio (PSNR) and Normalized Cross correlation (NC).
Abstract: Summary A novel oblivious and highly robust watermarking scheme using Multiple Descriptions (MD) and Quantization Index Modulation (QIM) of the host image is presented in this paper. The watermark is embedded in the Discrete Contourlet Transform domain (CT). Discrete Countourlet Transform (CT) is able to capture the directional edges and contours superior to Discrete Wavelet Transform (DWT). Watermark embedding is done at two stages for achieving robustness to various attacks. This algorithm is highly robust for different attacks on the watermarked image and superior in terms of Peak Signal to Noise Ratio (PSNR) and Normalized Cross correlation (NC). here the part of summary.

44 citations

Journal ArticleDOI

[...]

TL;DR: A hybrid routing intelligent algorithm that has an ant colony optimisation algorithm and particle swarm optimisation (PSO) algorithm is used to improve the various metrics in MANET routing.
Abstract: Graphical abstractDisplay Omitted Hybrid routing intelligent algorithm is proposed in this paper.The hybrid routing intelligent algorithm improves the end-to-end delay and power consumption.The proposed hybrid routing intelligent algorithm approach has a tendency to find the optimal route. End-to-end delay, power consumption, and communication cost are some of the most important metrics in a mobile ad hoc network (MANET) when routing from a source to a destination. Recent approaches using the swarm intelligence (SI) technique proved that the local interaction of several simple agents to meet a global goal has a significant impact on MANET routing. In this work, a hybrid routing intelligent algorithm that has an ant colony optimisation (ACO) algorithm and particle swarm optimisation (PSO) is used to improve the various metrics in MANET routing. The ACO algorithm uses mobile agents as ants to identify the most feasible and best path in a network. Additionally, the ACO algorithm helps to locate paths between two nodes in a network and provides input to the PSO technique, which is a metaheuristic approach in SI. The PSO finds the best solution for a particle's position and velocity and minimises cost, power, and end-to-end delay. This hybrid routing intelligent algorithm has an improved performance when compared with the simple ACO algorithm in terms of delay, power consumption, and communication cost.

32 citations


Cited by
More filters
Journal ArticleDOI

[...]

TL;DR: A robust digital image watermarking scheme based on singular value decomposition (SVD) and a tiny genetic algorithm (Tiny-GA) and Experimental results demonstrate that the scheme is able to withstand a variety of image processing attacks.
Abstract: A robust digital image watermarking scheme based on singular value decomposition (SVD) and a tiny genetic algorithm (Tiny-GA) is proposed in this paper. Previous works have shown that both one-way and non-symmetric properties of SVD make it desirable for watermarking techniques. The produced singular values are very stable and vary very little under various image processing operations or attacks. In the proposed scheme, the singular values of a cover image are modified by multiple scale factors to embed the watermark image. Since the values of scale factors determine the watermark strength; therefore, we use the Tiny-GA to search the proper values in order to improve the visual quality of the watermarked image and the robustness of the watermark. Experimental results demonstrate that our scheme is able to withstand a variety of image processing attacks.

159 citations

Journal ArticleDOI

[...]

TL;DR: A comprehensive review of all conducting intensive research survey into the pros and cons, main architecture, and extended versions of this algorithm.
Abstract: This paper introduces a comprehensive and exhaustive overview of the cuckoo search algorithm (CSA). CSA is a metaheuristic swarm-based approach established by Yang and Deb [10] to emulate the cuckoo breeding behavior. Owing to the successful application of CSA for a wide variety of optimization problems, since then, researchers have developed several new algorithms in this field. This article displays a comprehensive review of all conducting intensive research survey into the pros and cons, main architecture, and extended versions of this algorithm. It is worth mentioning that the materials of this survey paper are categorized in accordance with the structure of the CSA in which the materials are divided into the CSA versions and modification, publication years, the CSA applications areas, and the hybridization of CSA. The survey paper ends with solid conclusions about the current research on CSA and the possible future directions for the relevant audience and readers. The researchers and practitioners on CSA belong to a wide range of audiences from the domains of optimization, engineering, medical, data mining, clustering, etc., who will benefit from this study.

149 citations

Journal ArticleDOI

[...]

TL;DR: This paper presents a robust image watermarking scheme for multimedia copyright protection that is more secure and robust to various attacks, viz., JPEG2000 compression, JPEG compression, rotation, scaling, cropping, row-column blanking, rows-column copying, salt and pepper noise, filtering and gamma correction.
Abstract: This paper presents a robust image watermarking scheme for multimedia copyright protection. In this work, host image is partitioned into four sub images. Watermark image such as ‘logo’ is embedded in the two of these sub images, in both D (singular and diagonal matrix) and U (left singular and orthogonal matrix) components of Singular Value Decomposition (SVD) of two sub images. Watermark image is embedded in the D component using Dither quantization. A copy of the watermark is embedded in the columns of U matrix using comparison of the coefficients of U matrix with respect to the watermark image. If extraction of watermark from D matrix is not complete, there is a fair amount of probability that it can be extracted from U matrix. The proposed algorithm is more secure and robust to various attacks, viz., JPEG2000 compression, JPEG compression, rotation, scaling, cropping, row-column blanking, row-column copying, salt and pepper noise, filtering and gamma correction. Superior experimental results are observed with the proposed algorithm over a recent scheme proposed by Chung et al. in terms of Bit Error Rate (BER), Normalized Cross correlation (NC) and Peak Signal to Noise Ratio (PSNR).

85 citations

[...]

01 Jan 2014
TL;DR: Various content-based image retrieval techniques available for retrieving the require and classify images are reviewed, and some basic features of any image, like shape, texture, color, are shown and different techniques to calculate them are shown.
Abstract: Various content-based image retrieval techniques are available for retrieving the require and classify images, we are reviewing them. In our first section, we are tending towards some basics of a particular CBIR system with that we have shown some basic features of any image, these are like shape, texture, color and shown different techniques to calculate them. In the next section, we have shown different distance measuring techniques used for similarity measurement of any image and also discussed indexing techniques. Finally conclusion and future scope is discussed.

75 citations

Journal ArticleDOI

[...]

TL;DR: A novel multiplicative watermarking scheme in the contourlet domain using the univariate and bivariate alpha-stable distributions is proposed and the robustness of the proposed bivariate Cauchy detector against various kinds of attacks is studied and shown to be superior to that of the generalized Gaussian detector.
Abstract: In the past decade, several schemes for digital image watermarking have been proposed to protect the copyright of an image document or to provide proof of ownership in some identifiable fashion. This paper proposes a novel multiplicative watermarking scheme in the contourlet domain. The effectiveness of a watermark detector depends highly on the modeling of the transform-domain coefficients. In view of this, we first investigate the modeling of the contourlet coefficients by the alpha-stable distributions. It is shown that the univariate alpha-stable distribution fits the empirical data more accurately than the formerly used distributions, such as the generalized Gaussian and Laplacian, do. We also show that the bivariate alpha-stable distribution can capture the across scale dependencies of the contourlet coefficients. Motivated by the modeling results, a blind watermark detector in the contourlet domain is designed by using the univariate and bivariate alpha-stable distributions. It is shown that the detectors based on both of these distributions provide higher detection rates than that based on the generalized Gaussian distribution does. However, a watermark detector designed based on the alpha-stable distribution with a value of its parameter α other than 1 or 2 is computationally expensive because of the lack of a closed-form expression for the distribution in this case. Therefore, a watermark detector is designed based on the bivariate Cauchy member of the alpha-stable family for which α = 1 . The resulting design yields a significantly reduced-complexity detector and provides a performance that is much superior to that of the GG detector and very close to that of the detector corresponding to the best-fit alpha-stable distribution. The robustness of the proposed bivariate Cauchy detector against various kinds of attacks, such as noise, filtering, and compression, is studied and shown to be superior to that of the generalized Gaussian detector.

70 citations