Give brief description of the perceptual hashing technology

Assignment Help Other Subject
Reference no: EM131451485

Assignment Tasks

Part 1.

Section A.

Give a brief description of the perceptual hashing technology and discuss its applications.

Explain how robust and fragile watermarking can be used to solve legal and ethical issues related to digital images and videos.

Guide length: no more than 300 words each.

Section B.
You are provided with a test image saved as TIF file named ‘peppers.tif'. For the purpose of image copyright protection, you are required in this section to implement a one-bit watermarking system in the wavelet domain and a similar watermarking system in the DCT domain as follows:

Wavelet domain watermarking:

Embedding: The input image is wavelet transformed with two levels of decomposition. The second level sub-bands H2, D2 and V2 are used to hold three watermarks w1, w2, and w3 respectively. These watermarks are of size (128 x 128) each and are saved in a MAT file named ‘watermark.mat'. The embedding rule is multiplicative with a watermark strength α = 0.3. For instance, the ith wavelet coefficient in H2 is updated as

Y' (i)=Y(i)+α w1 (i)Y(i)

where Y'(i) is the watermarked coefficient in H2. Y(i) is the original coefficient in H2. Once the coefficients are updated, the inverse wavelet transform is performed to obtain the watermarked image. This programme should produce the watermarked image in a TIF file.
Detection: [9 marks]. This programme verifies the presence of the watermarks w1, w2, and w3 in the previously saved picture. First, two wavelet decompositions are performed as before. Then, three similar watermark detectors are used for detecting w1, w2, and w3 which are stored in ‘watermark.mat'. For example, for H2 where w1 is verified, the detector calculates

?1 = ∑(i=1)N(|(37.5 × Y' (i))/σ1 | )c (1-1/(1+ α w1 (i) )c )

μ1 = ∑(i=1)N1/c (1-1/(1+α w1 (i) )c )

λ1 = ∑(i=1)N1/c (1-1/(1+α w1 (i) )c )2

where N is the number of samples. |.| represents the absolute operation. c=0.4 is called the shape parameter. σ1 is the standard deviation of the sub-band H2(use std if the matrix is converted into a column vector and std2 otherwise). The decision for watermark w1 is made as follows

if ?1 > 4.75 × √(λ1) + μ1 then w1 exists in H2. Otherwise, w1 does not exist.

Similarly, the second detector calculates ?22,and μ2 from w2, σ2 , and the coefficients in D2 to decide on the presence of w2 in D2. The third detector calculates ?33,and μ3 from w3, σ3 , and the coefficients in V2 to decide on the presence of w3 in V2

Hints:
a-For the insertion of the watermark (Embedding),you may create a functionwhich has two arguments (set of coefficients, watermark) and outputs the set of watermarked coefficients. Then, this function can be called in the main Embedding programme three times for the insertion of w1, w2, and w3, respectively. As for the detection, you may also need to create a function which has two arguments (set of coefficients, candidate watermark) and outputs a binary decision (1 if watermark exists, 0 otherwise). Once the function is created, it can be called in the main detection programme three times with different parameters.

b- You may convert a matrix into a column vector (or into a row vector) to perform the insertion and detection of the watermark. The syntax in matlab to convert a matrix A of M rows and N columns into a column vector is

column_vector=A(:);

The inverse process (conversion from column vector into matrix) can be obtained by the following syntax
Reconstructed_matrix=reshape(column_vector,M,N);
DCT domain watermarking:[15 marks]

Embedding: The input image is DCT-transformed. Three square regions are selected from the transformed image to hold w1, w2 and w3 (see figure) using the same multiplicative rule as before. Then, the inverse DCT is applied to get the watermarked image. This programme should output the watermarked image in a TIF file.

Detection: This programme verifies the presence of the watermarks w1, w2, and w3 in the previously saved picture. First, the DCT is applied on the watermarked image. Then, three similar watermark detectors as described earlier are used for detecting w1, w2, and w3 which are stored in ‘watermark.mat'. For example, for the region where w1 is verified, the detector calculates ?1 ,λ1,and μ1 from w1, σ1 , and the coefficients in that region to decide on the presence of w1.

Codes work perfectly without errors. Excellent use of matrix manipulation inMatlab. Very good understanding and implementation of the embedding and detection equations. Good understanding of the watermarking systems. >10

Problems with the understanding and implementation of some equations. Hard coded implementation. However, it includes correct parts on embedding, detection, and image transforms. 6- 10

Poor understanding of the different parts of watermarking systems. Unable to link and analyse the main parts of the system. Incorrect implementation and the code does not compile/work properly. 0 - 6

Section C.

In this section, you are required to apply the following manipulations on the watermarked image in both wavelet and DCT domains and check the detection of the watermarks. Complete the following table and interpret the results.
Wavelet-Based DCT-Based
Manipulation W1 W2 W3 W1 W2 W3
Circular shifting [1,1] use ‘circshift.m'
Average filtering 77

Guide length: no more than 50 words for the interpretation of the results.

Part 2. LO1 & LO3

Section A.

Discuss the main similarities and differences between Artificial Neural Networks and Decision Trees.

Guide length: no more than 500 words.
Marking criteria.
Good work in this question will:
Show good understanding of both Atrificial Neural Networks (ANNs) and Decision Trees (C&RT) in terms of their use, applications and training.
Give a sound analysis of the two systems and possibly discuss their weaknesses/strengths if this is relevant.


Section B.
Explain why, in supervised machine learning, multiple samples from each class are required in the training phase.

Guide length: no more than 300 words.
Marking criteria.
Good work in this question will:
Show good understanding of supervised learning and classification.

Section C.

The implementation of a gender classification system using an Artificial Neural Network is given in Matlab. The Matlab function ‘getFeatureVector.m' extracts 64 features from any inputcolour image by using the grey scale plane only in the Discrete Cosine Transform (DCT) domain. There are two types of training images: male and female images which are stored in two folders ‘Male' and ‘Female', respectively. The extracted features for both male and female images will be used to train the classifier with ‘ANN_training.m'. Once the classifier is trained, it can be evaluated on test images stored in folder ‘test_gender'. This is implemented via the Matlab code ‘ANN_testing.m' where the default image is ‘male01.jpg'. The idea is to verify the gender each face image according to the trained classifier. If a female image is classified, the system will display a message ‘female'. Otherwise, the message ‘male' is displayed.

Based on the existing Matlab codes (‘ANN_training.m' and ‘ANN_testing.m'), create new codes that implement the linear perceptron, the Naive Bayes classifier, and a classification tree. You should submit only the part of codes which are different from the current ones. [3]
The false positive rate (FPR) is defined as the proportion of falsely classifying a maleimage as ‘female'. The false negative rate (FNR) is the proportion of misclassifying female images. For instance, if the system is applied on 20 male images and there are 2 incorrect classifications (i.e. classified as female), FPR=2/20. If the system shows 5incorrect classifications on 20female images, FNR=5/20. Run the Matlab codes on all test images and complete the following table [6].
Linear Perceptron ANN Decision Tree Naive Bayes
FPR
FNR
Error = (FPR+FNR)/2
Analyse and interpret the results.
Guide length: no more than 500 words.
Marking criteria.
Good work in this question will:
Show good analysis of the results and a reasonable justification of the performance of each classifier. The complexity cost for each algorithm should be discussed as part of the experimental analysis.

Explain how the performance of the gender classification system can be improved.

Verified Expert

This is about watermarking techniques and their application using MATLAB. In this first theory portion is covered which gives the information about what this is all about. Later we went on to analyze the wavelet based, DCT based watermarking. In last past we have ANN which offers comparison and analysis part

Reference no: EM131451485

Questions Cloud

Define the software privacy : Divide into two groups and prepare arguments for and against the following behavior: You run your own graphic design company as a one-person show.
What pressure is exerted by the box where it rests : Acceleration due to gravity at sea level is 9.80 m/s2. What pressure is exerted by the box where it rests?
Write the introduction about the experiment cmos op amps. : Do the introduction and conclusion and rewrite the steps in your own words about the EXPERIMENT CMOS OP AMPS. Cheack the pdf file for more detiles.
Justify the decision to scan e-mails for content : Sergey Brin offered the argument that all e-mail providers scan your e-mails for content to ensure that it is yours and that it isn't a spam e-mail.
Give brief description of the perceptual hashing technology : Give a brief description of the perceptual hashing technology and discuss its applications - Explain how robust and fragile watermarking can be used to solve legal and ethical issues related to digital images and videos.
Riskfree rate-market risk premium : If the riskfree rate is 5% and the market risk premium is 7%, are these stocks correctly priced?
Could google have launched gmail over privacy : In October 2009, the Federal Trade Commission (FTC) announced its new "Guide Concerning the Use of Endorsements and Testimonials in Advertising,".
Develop compensation strategy for the organization : Develop compensation and benefits strategy for the organization.Evaluate current compensation plans for that industry.
Was there an ethical transgression : Considering Reverb's position in its widely distributed statement in response to the settlement of the complaint, was there an ethical transgression here?

Reviews

inf1451485

4/18/2017 5:35:37 AM

I am happy I came to you for help and I would utilize you again in the event that I were in a tough situation. A decent tip is for students like me, the additional time you can give them, it will be somewhat less expensive for you, on the off chance that you require it in a crunch they will have the capacity to do it yet it might be more expensive.

inf1451485

4/18/2017 5:33:59 AM

i have attached the documents needed to complete the assignment please send it to the expert. and please double check with him that he can get me a good quality work on time. and about the price this is a bit more than my budget, i can only pay. thank you 22569679_1assig.zip

len1451485

4/5/2017 5:29:03 AM

its a programming assignment in MATLAb. so please refer it to someone who's expert in matlab. thank youThis is an individual coursework and must be completed independently. Evidence of academic misconduct (e.g., plagiarism, collaboration/collusion among students) will be taken seriously and University regulations strictly followed. You are advised to be familiar with the University definitions of academic misconduct including plagiarism and collusion. ? You are expected to produce a word-processed answer to some questions in this assignment. Please use Arial font and a font size of 12. ? If needed, you are required to use the Harvard Style of referencing and citation. The “Cite them right” guide is recommended for referencing and citation (Pears and Shields, 2008). ? Late submissions will be given zero marks unless prior permission is gained from the school office/programme leader.

Write a Review

Other Subject Questions & Answers

  Cross-cultural opportunities and conflicts in canada

Short Paper on Cross-cultural Opportunities and Conflicts in Canada.

  Sociology theory questions

Sociology are very fundamental in nature. Role strain and role constraint speak about the duties and responsibilities of the roles of people in society or in a group. A short theory about Darwin and Moths is also answered.

  A book review on unfaithful angels

This review will help the reader understand the social work profession through different concepts giving the glimpse of why the social work profession might have drifted away from its original purpose of serving the poor.

  Disorder paper: schizophrenia

Schizophrenia does not really have just one single cause. It is a possibility that this disorder could be inherited but not all doctors are sure.

  Individual assignment: two models handout and rubric

Individual Assignment : Two Models Handout and Rubric,    This paper will allow you to understand and evaluate two vastly different organizational models and to effectively communicate their differences.

  Developing strategic intent for toyota

The following report includes the description about the organization, its strategies, industry analysis in which it operates and its position in the industry.

  Gasoline powered passenger vehicles

In this study, we examine how gasoline price volatility and income of the consumers impacts consumer's demand for gasoline.

  An aspect of poverty in canada

Economics thesis undergrad 4th year paper to write. it should be about 22 pages in length, literature review, economic analysis and then data or cost benefit analysis.

  Ngn customer satisfaction qos indicator for 3g services

The paper aims to highlight the global trends in countries and regions where 3G has already been introduced and propose an implementation plan to the telecom operators of developing countries.

  Prepare a power point presentation

Prepare the power point presentation for the case: Santa Fe Independent School District

  Information literacy is important in this environment

Information literacy is critically important in this contemporary environment

  Associative property of multiplication

Write a definition for associative property of multiplication.

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd