E-Comics Protection E-Comics Protection Avnish Kumar Bachelor of Technology Electrical Engineering, IInd Year Indian Institute of Technology Roorkee, India.

Slides:



Advertisements
Similar presentations
5th Intensive Course on Soil Micromorphology Naples th - 14th September Image Analysis Lecture 8 Introduction to Binary Morphology.
Advertisements

Programming Assignment 2 CS 302 Data Structures Dr. George Bebis.
Digital Rights Management © Knowledge Books & Software, 2012.
Introduction to Morphological Operators
A Low-cost Attack on a Microsoft CAPTCHA Yan Qiang,
‘ Glaucoma Detection In Retinal Images Using Automated Method ’
T H E U N I V E R S I T Y O F B R I T I S H C O L U M B I A November 2005Analysis of Attacks on Common Watermarking Techniques 1 A study on the robustness.
Title of Presentation Author 1, Author 2, Author 3, Author 4 Abstract Introduction This is my abstract. This is my abstract. This is my abstract. This.
HCI Final Project Robust Real Time Face Detection Paul Viola, Michael Jones, Robust Real-Time Face Detetion, International Journal of Computer Vision,
1 Preprocessing for JPEG Compression Elad Davidson & Lilach Schwartz Project Supervisor: Ari Shenhar SPRING 2000 TECHNION - ISRAEL INSTITUTE of TECHNOLOGY.
In the last part of the course we make a review of selected technical problems in multimedia signal processing First problem: CONTENT SECURITY AND WATERMARKING.
Course Website: Digital Image Processing Morphological Image Processing.
Smart Traveller with Visual Translator. What is Smart Traveller? Mobile Device which is convenience for a traveller to carry Mobile Device which is convenience.
Stephen J. Guy. Many Digital Cameras include timestamp directly on image Metadata in binary image deprecates need for visible timestamp Experienced Photoshop.
Digital Image Processing - (monsoon 2003) FINAL PROJECT REPORT Project Members Sanyam Sharma Sunil Mohan Ranta Group No FINGERPRINT.
Technical Seminar Presentation-2004 Presented by : ASHOK KUMAR SAHOO (EI ) NATIONAL INSTITUTE OF SCIENCE & TECHNOLOGY Presented By Ashok Kumar.
A study for Relational Database watermarking scheme Speaker: Pei-Feng Shiu Date: 2012/09/21.
Extracting Barcodes from a Camera-Shaken Image on Camera Phones Graduate Institute of Communication Engineering National Taiwan University Chung-Hua Chu,
Cryptography. Introduction Encryption  The art (or science) of putting messages into a code, and the study of those coding techniques. Decryption  The.
Morphological Image Processing
Gianni Ramponi University of Trieste Images © 2002 Gonzalez & Woods Digital Image Processing Chapter 9 Morphological Image.
Presented By: Abirami Poonkundran Authors: Jeff Yan, Ahmad El Ahmad.
S ECURE A UTHENTICATION USING I MAGE P ROCESSING AND V ISUAL C RYPTOGRAPHY FOR B ANKING A PPLICATIONS Guided By Prof. Rashmi Welekar Submitted By Deepti.
Digital Image Processing - (monsoon 2003) FINAL PROJECT REPORT Project Members Sanyam Sharma Sunil Mohan Ranta Group No FINGERPRINT.
STEGANOGRAPHY AND DIGITAL WATERMARKING KAKATIYA INSTITUTE OF TECHNOLOGY AND SCIENCES,WARANGAL.
11/29/ Image Processing. 11/29/ Systems and Software Image file formats Image processing applications.
NTIT IMD 1 Speaker: Ching-Hao Lai( 賴璟皓 ) Author: Hongliang Bai, Junmin Zhu and Changping Liu Source: Proceedings of IEEE on Intelligent Transportation.
Mobile Image Processing
Bachelor of Engineering In Image Processing Techniques For Video Content Extraction Submitted to the faculty of Engineering North Maharashtra University,
Title Authors Introduction Text, text, text, text, text, text Background Information Text, text, text, text, text, text Observations Text, text, text,
Image Processing and Analysis (ImagePandA)
Multi resolution Watermarking For Digital Images Presented by: Mohammed Alnatheer Kareem Ammar Instructor: Dr. Donald Adjeroh CS591K Multimedia Systems.
DIGITAL IMAGE PROCESSING
Target Tracking In a Scene By Saurabh Mahajan Supervisor Dr. R. Srivastava B.E. Project.
Scene Text Extraction Using Focus of Mobile Camera Egyul Kim, SeongHun Lee, JinHyung Kim Artificial Intelligence & Pattern Recognition Lab, KAIST, Korea.
Ec2029 digital image processing
ECE472/572 - Lecture 14 Morphological Image Processing 11/17/11.
Gaussian Smoothing Gaussian Smoothing is the result of blurring an image by a Gaussian function. It is also known as Gaussian blur.  Course Name: Digital.
Automatic Caption Localization in Compressed Video By Yu Zhong, Hongjiang Zhang, and Anil K. Jain, Fellow, IEEE IEEE Transactions on Pattern Analysis and.
Chapter 6 Skeleton & Morphological Operation. Image Processing for Pattern Recognition Feature Extraction Acquisition Preprocessing Classification Post.
License Plate Recognition of A Vehicle using MATLAB
CRYPTOGRAPHY Cryptography is art or science of transforming intelligible message to unintelligible and again transforming that message back to the original.
Content Based Coding of Face Images
Digital Image Processing (Digitaalinen kuvankäsittely) Exercise 5
Security Using Armstrong Numbers and Authentication using Colors
Digital Image Processing - (monsoon 2003) FINAL PROJECT REPORT
Digital Image Processing CP-7008 Lecture # 09 Morphological Image Processing Fall 2011.
Adaptive Image Processing for Automated Structural Crack Detection
Der-Chyuan Lou and Jiang-Lung Liu,
Introduction to Morphological Operators
DONE BY S.MURALIRAJAN M.NIRMAL
Lossy Compression of DNA Microarray Images
Source : Signal Processing, Volume 133, April 2017, Pages
TITLE Authors Institution RESULTS INTRODUCTION CONCLUSION AIMS METHODS
Lecture 8 Introduction to Binary Morphology
Statistical Approach to a Color-based Face Detection Algorithm
Binary Image processing بهمن 92
Dilation The basic morphological operations applied to either grayscale or binary images are Erosion and Dilation. Erosion shrinks image objects while.
Aline Martin ECE738 Project – Spring 2005
Closing One of the important morphological operations applied to either grayscale or binary images is Closing. It is derived from the fundamental operations.
Erosion The basic morphological operations applied to either grayscale or binary images are Erosion and Dilation. Erosion shrinks image objects while.
Advisor: Chin-Chen Chang1, 2 Student: Yi-Pei Hsieh2
Filtration Filtration methods for binary images
Joshua Kahn, Scott Wiese ECE533 – Fall 2003 December 12, 2003
ECE 692 – Advanced Topics in Computer Vision
Chair Professor Chin-Chen Chang Feng Chia University
Title Introduction: Discussion & Conclusion: Methods & Results:
Sourse: arXiv preprint, arXiv: , 2018 (Submit to IEEE Trans
Opening One of the important morphological operations applied to either grayscale or binary images is Opening. It is derived from the fundamental operations.
Privacy-Preserving Reversible Watermarking for Data Exfiltration Prevention Through Lexicographic Permutations Source: IIH-MSP(2018): Authors:
Presentation transcript:

E-Comics Protection E-Comics Protection Avnish Kumar Bachelor of Technology Electrical Engineering, IInd Year Indian Institute of Technology Roorkee, India Supervisors : William Puech Mickael Pinto

Presentation Plan Introduction Objective Step-by-Step Process Step Taken so far Proposed Plan Conclusion

Presentation Plan Introduction Objective Step-by-Step Process Step Taken so far Proposed Plan Conclusion

Introduction Several companies propose to transform comics into digital form and publish it directly on their website. Major problem is to protect the digital content of comics. Classical DRM Technology have an application, which protect the digital content, but one non- authorized user can break the application and can read and also distribute the digital version of comics.

We can do selective encryption during the JPEG compression to blur the e-comic image, which can make it unreadable to non-authorized user. It will me more interesting, if It is also possible to only encrypt some critical part of e-comics as bubble in order to appreciate the quality and coloring of comics, which will help in marketing purposes.

Presentation Plan Introduction Objective Step-by-Step Process Step Taken so far Proposed Plan Conclusion

Objective Apart from DRM technology and their application, my objective is to encrypt only the text-bubble part of comic image. I have to apply Selective reversible encryption during JPEG compression, which can be decrypt only by authorized user having secret key. For selective encryption of text-bubble, firstly have to detect text-bubble from the Comic image.

Presentation Plan Introduction Objective Step-by-Step Process Step Taken so far Conclusion

Step-by-Step Process Bubble detection : In typical comic Image, text-bubble usually has white background. Thresholding Morphology Filter ( dilation and erosion) Blob classification Selective reversible encryption during JPEG compression SE is performed in Huffman coding stage of JPEG algorithm without affecting the size of compressed image.

Presentation Plan Introduction Objective Step-by-Step Process : Proposed Step Taken so far Proposed Plan Conclusion

Step Taken so far Text - bubble detection Thresholding by taking threshold value 200 Dilation of binarize image for merging neighbor white pixel. Erosion of dilated image for getting back original image. after dilation, I got increased white pixel, so by eroding get back to original image.

Thresholding Original Image Binarize Image

Morphology filter (Dilation and Erosion) Binarize Image Final Image after Dilation & Erosion

Presentation Plan Introduction Objective Step-by-Step Process : Proposed Step Taken so far Proposed Plan Conclusion

Proposed Plan Thresholding Morphology filter Dilation Erosion Blob extraction : after blob extraction, we will get, Balloon blob Non- balloon blob Blob classification

Thresholding Original Image Binarize Image

Blob Classification Classification conditions: Minimum size of blob is about [Image. Height]/10 and [Image. Width]/8 of original comic image. Blob height size is less than 1.5 of blob width size.

Presentation Plan Introduction Objective Step-by-Step Process : Proposed Step Taken so far Proposed Plan Conclusion

Conclusion After Thresholding, morphology filtering, blob extraction and classification, we can detect the balloon (ROI). After detecting bubbles, we can do selective encryption during JPEG compression to blur the bubble part of comic image, which will make it good for marketing purposes. One can appreciate the quality and coloring of Image.

Any Questions Any Questions