Matlab is a registered trademark of The Mathworks, Inc.


 Advanced Source Code . Com

 
 
HOME SOURCE CODE SOFTWARE INFO SUPPORT CONTACT US
 
Source code for fingerprint recognition, face recognition and much more


Software Info    About us     
Go To Matlab Official Website

.: Click here to download :.

A simple watermarking method for color images is proposed. The proposed method is based on watermark embedding for the histograms of the HSV planes using visual cryptography watermarking. The method has been proved to be robust for various image processing operations such as filtering, compression, additive noise, and various geometrical attacks such as rotation, scaling, cropping, flipping, and shearing.

The watermark method is an excellent technique to protect the copyright ownership of a digital image. The proposed watermark method is built up on the concept of visual cryptography. According to the proposed method, the watermark pattern does not have to be embedded into the original image directly, which makes it harder to detect or recover from the marked image in an illegal way. It can be retrieved from the marked image without making comparison with the original image. The notary also can off-line adjudge the ownership of the suspect image by this method. The watermark pattern can be any significant black/white image that can be used to typify the owner. Experimental results show that the watermark pattern in the marked image has good transparency and robustness. By the proposed method, all the pixels of the marked image are equal to the original image.

Index Terms: Matlab, source, code, histogram, HSV, visual, cryptography, watermark, hue, saturation, value.

 

 

 

 

Figure 1. Hue-Saturation-Value color space



A simple and effective source code for HSV Image Watermarking Scheme Based on Visual Cryptography.

Demo code (protected P-files) available for performance evaluation. Matlab Image Processing Toolbox is required.

Release
Date
Major features
1.0

2009.06.11



We recommend to check the secure connection to PayPal, in order to avoid any fraud.
This donation has to be considered an encouragement to improve the code itself.

HSV Image Watermarking Scheme Based on Visual Cryptography. Click here for your donation. In order to obtain the source code you have to pay a little sum of money: 200 EUROS (less than 280 U.S. Dollars).

Once you have done this, please email us luigi.rosa@tiscali.it
As soon as possible (in a few days) you will receive our new release of HSV Image Watermarking Scheme Based on Visual Cryptography.

Alternatively, you can bestow using our banking coordinates:
Name :
Luigi Rosa
Address :
Via Pozzo Strada 5 10139 Torino Italy
Bank name:
Poste Italiane
Bank address:
Viale Europa 190 00144 Roma Italy
IBAN (International Bank Account Number) :
IT-50-V-07601-03600-000058177916
BIC (Bank Identifier Code) :
BPPIITRRXXX

The authors have no relationship or partnership with The Mathworks. All the code provided is written in Matlab language (M-files and/or M-functions), with no dll or other protected parts of code (P-files or executables). The code was developed with Matlab 2006a. Matlab Image Processing Toolbox is required. The code provided has to be considered "as is" and it is without any kind of warranty. The authors deny any kind of warranty concerning the code as well as any kind of responsibility for problems and damages which may be caused by the use of the code itself including all parts of the source code.

New - Python Face Recognition
 Biometric Authentication with Python We have developed a fast and reliable Python code for face recognition based on Principal Component Analysis (PCA). Proposed algorithm results computationally inexpensive and it can run also in a low-cost pc such as Raspberry PI.
 
New - Raspberry PI Remote Desktop
 Raspberry PI Remote Desktop A complete and detailed PDF tutorial to learn how to connect to and from a Raspberry PI using Remote Desktop.
 
New - Speaker Verification System
 Text-Independent Speaker Authentication There are two major applications of speaker recognition technologies and methodologies. If the speaker claims to be of a certain identity and the voice is used to verify this claim, this is called verification or authentication.
 
New - Java Face Recognition
 Java-based Biometric Authentication System Face recognition is essential in many applications, including mugshot matching, surveillance, access control and personal identification, and forensic and law enforcement applications.
 
New - White Papers
 High Capacity Wavelet Watermarking Using CDMA Multilevel Codes This paper proposes a technique based on CDMA and multilevel coding in order to achieve a high capacity watermarking scheme. The bits of watermark are grouped together and for each sequence a different modulation coefficient is used.
 
New - WebCam Face Identification
 Face Recognition Based on Fractional Gaussian Derivatives Local photometric descriptors computed for interest regions have proven to be very successful in applications such as wide baseline matching, object recognition, texture recognition, image retrieval, robot localization, video data mining, building panoramas, and recognition of object categories.
 
New - Speaker Recognition System
 Source code for speaker recognition
Speaker recognition is the process of automatically recognizing who is speaking on the basis of individual information included in speech waves.
 
New - Speech Recognition System
 Source code for isolated words recognition
Speech recognition technology is used more and more for telephone applications like travel booking and information, financial account information, customer service call routing, and directory assistance. Using constrained grammar recognition, such applications can achieve remarkably high accuracy.
 



The MathWorks, Inc. Google NeuralNetworks.It Octave Scilab The R Project for Statistical Computing Python Other available resources English Dictionary Download .Com
 
Software Info    About us