Multimedia Data Hiding

Size: px
Start display at page:

Download "Multimedia Data Hiding"

Transcription

1 Multimedia Data Hiding Introduction! Digital Watermarking / Multimedia Data Hiding Hide secondary data in digital image/video/audio/3d! Uses of hidden data: ownership verification, alteration detection access control, annotation, side info. delivery Min Wu Dept. of Electrical Engineering Committee: Profs. B.Liu, P.Ramadge, S.Kulkarni! Issues and challenges: imperceptibility, robustness & security, capacity tradeoff between the conflicting requirements Robustness Imperceptibility Capacity 2 General Framework Key Elements of Data Hiding 1111 Hello, World original media data to be hidden extracted 1111 data Hello, World player embed play/ record/ extract marked media (w/ hidden data) compress process / attack! Perceptual model! Embedding one bit! Multiple bits! Uneven embedding capacity! Robustness and security! What data to embed Upper Layers security error correction uneven capacity equalization Physical Layer how to embed one or multiple bits? 3 4 1

2 Thesis Outline " Fundamental issues and solutions # embedding strategy classification and capacity issues # handling uneven capacity # modulation/multiplexing techniques for hiding multiple bits " Algorithm and system designs # binary images # image authentication # video copy/access control and fingerprinting # applications in video communication " Attacks and countermeasures # innocent tools block replacement and double-capturing # countermeasure against rotation/scale/translation # robustness & security analysis on SDMI audio watermarking Algorithm and System Designs " Demonstrating solutions to fundamental issues 5 6 Data Hiding in Binary Image Example-1: Signature in Signature! A simple yet important class of images scanned documents, drawings, signatures! Challenges E-PAD (InterLink Electronics) little room for invisible changes uneven distribution of changeable pixels Clinton electronically signed Electronic Signatures Act - Yahoo News 6/3/ media/gif/bil.gif as of 7/ 7 Annotating digitized signature with content info. of the signed document (Finkelstein - Princeton U.) 8 2

3 Our Approach! Block-based pixel-domain method hide a fixed number of bits in each block extract hidden data without the use of original copy Robustness is not a major requirement for authentication and annotation applications. Preserve Visual Quality! Assign flippability score to each pixel determine how noticeable the flipping of a pixel is based on smoothness and connectivity Hierarchical! Three issues determine which pixels to flip for invisibility embed data in each block using flippable pixels handle uneven embedding capacity via shuffling (a) (b)! Sort pixels in each block according to the scores flip high-score pixels with high priority 9 1 Embedding Mechanism! Extracting data without original image hard to directly encode data in flippable pixels # flippability may change after encoding! Our approach manipulate flippable pixels to enforce block-based property # enforce the total number of black pixels to be odd/even to hide 1 bit / block, or use more general mapping # incorporate quantization or tolerance zone for robustness # of black pixel per blk 2kQ (2k+1)Q (2k+2)Q (2k+3)Q odd-even mapping 1 1 lookup table mapping Shuffling for Binary Image! Uneven distribution of flippable pixels most are on rugged boundary! Embedding rate (per block) variable: need side info. constant: require larger blk! Random shuffling equalizes distribution embed more bits enhance security portion of blocks Important! Pixels with high flippability score are shown in the images. image size 288x48, red block size 16x16 before shuffle after shuffle embeddble coeff. # per block (signature img) 12 3

4 Analysis of Shuffling Compare Analysis with Simulation for Shuffling Mean follows hypergeometric distribution m /N ( th bin) m 1/N (1 st bin) m 2/N (2 nd bin) before shuffle 2.37% 1.85% 5.56% mean after shuffle analysis simulation 5.16x1-5 % % 7.77x1-4 % % 5.81x1-3 % 5.56x1-3 % std after shuffle analysis simulation 9.78x x m r ~ # of blocks each having r blue balls out of q balls q balls... pick w/o replacement N = S/q blocks portion of blocks (x 1%) before shuffle before shuff simulation mean simulation std analytic mean analytic std mean after shuffle std after shuffle q = 16 x 16 S = 288 x 48 N = S/q = 18 x 3 p = 5.45%.5 unchangeable pixel/coeff. changeable pixel/coeff. S balls in total n = ps blue balls 13 Simulation: 1 indep. random shuff # of flippable pixels per block (signature img) 14 Example-1: Signature in Signature Each block is 32- pixel large, 1bit / blk. Example-2: Document Authentication (c) (a) alter (d) (f) (b) after alteration (e) (g) Annotating digitized signature with content info. of the signed document (Finkelstein - Princeton U.) 15 Embed pre-determined pattern or content features beforehand Verify hidden data s integrity to decide on authenticity 16 4

5 Robustness vs. Capacity! Blind/non-coherent detection ~ original copy unavailable! Single robustness-capacity setting over-estimates and/or under-estimates actual noise not all embedded data are equally important Robustness Capacity Capacity C (bits/ch. use) Capacity of Type-I (host=1e) and Type-II AWGN ch. (wmk MSE E 2 ) Type-I (C-i C-o, blind detection) Type-II (D-i D-o) grayscale/color image/video Experimental Results 6-frame 352 x 24 flower garden sequence 66-frame 352 x 24 concatenated sequence Level-1: high capacity Level-2: high robustness embed. rate robustness embed. rate robustness 64 bits (91 char.) 332 bits avg. chunk size = 6 frames Video Examples MPEG-2 4.5Mbps; frame dropping 132 bits (18 char.) 1266 bits MPEG-2 1.5Mbps; frame dropping Notes also embed control info. Imperceptibility log 1 (E 2 /σ 2 ) (db) stronger noise weaker Video Example Robust Video Data Hiding embed b i & (i mod M) embed b i+1 & (i+1 mod M) 1st & 3th Mpeg4.5Mbps frame of original, marked, and their luminance difference human visual model for imperceptibility: protect smooth areas and sharp edges 19! Embedding domain partition video into segments of similar consecutive frames for each frame of a segment, embed same data in block-dct domain embed segment index to detect frame jitter! Multi-level embedding light processing data extractable from just a few frames severe processing extractable by processing more frames! Uneven embedding capacity seg. i seg. i+1 within a frame: constant embedding rate per region & shuffling between frames: embed # of hidden bit per frame as side info.! Modulation/Multiplexing techniques TDMA, CDMA, orthogonal/bi-orthogonal modulation 2 5

6 Watermark Attacks: What and Why? Attacks & Countermeasures! Attacks: intentionally obliterate watermarks remove a robust watermark make watermark undetectable (e.g., miss synchronization) uncertainty in detection (e.g., multiple ownership claims) forge a valid (fragile) watermark bypass watermark detector 21! Why study attacks? identify weaknesses propose improvement understand pros and limitation of tech. solution To win each campaign, a general should know both his troop and the opponent s as well as possible. -- Sun Tzu, The Art of War, 5 B.C. 22 Innocent Tools Used by Attackers! Recovery of lost blocks for resilient multimedia transmission of JPEG/MPEG good quality by edge-directed interpolation: Jung et al; Zeng-Liu! Remove robust watermark by block replacement JPEG 1% marked original (no distortion) after proposed attack edge estimation edge-directed interpolation JPEG 1% w/o distort Interp. w/ orig w/o orig x512 lenna Threshold: 3 ~ 6! Attack effective on block-dct based spread-spectrum watermark 23 claimed high robustness&quality by fine tuning wmk strength for each region 24 6

7 Secure Digital Music Initiative Challenge SDMI Challenge Setup Obtained From SDMI Job for Attackers Black Box (unknown)! International consortium ~ 18+companies/organizations currently pursuing watermark based solution for access and copy control on digital music Sample-1 (original) Watermark (special signal) Embed Sample-2 (marked)! Public challenge ( 9/15-1/8/2 ) attacks on four robust watermark technologies Any Marked Audio Detect Watermark Found! Non-traditional research values reveal real industrial problem and state-of-art technologies present an emulated rivalry environment for better understanding on audio watermarking lead to a few research problems Sample-3 (marked) Attack Sample-4 (attacked) Detect GOAL Watermark NOT Found Observation on One SDMI Watermark Difference between original and marked samples given by SDMI 27 Learning from SDMI Challenge! Our successful attacks blind attacks: warping, jittering attacks based on studying orig.-marked pairs # deliberate filtering / subtraction / randomization! Noteworthy issues duality between embedding and attacks secrecy of embedding can t rely on orig. being unknown double-watermarking used by SDMI # robust wmk should resist processing/attacks # fragile wmk indicate audio experience compression attacks and countermeasures on forging fragile wmk # relate to watermark-based authentication 28 7

8 Is Watermark Useful?! Not an answer to all our attacks pointed out weaknesses of specific proposals and demonstrated general approaches! For copy/access control hard to get complete solution with technology alone # business model, pricing model, etc. Summary improved watermark tech. could be part of the solution # make attack non-trivial and keep honest people honest! Other applications detecting alteration # digital camera/camcorder; digitized signature/ binary doc. convey side information # for performance enhancement or additional funtionality 29 3 Summary & Conclusion! Data hiding in digital multimedia for a variety of purposes, involving multiple disciplines! Tradeoff among many criterions! Important to think both as designer and as attacker! Data hiding in market digital cameras with authentication watermark module plug-in for image editors video watermark proposals for DVD copy control on-going SDMI effort for digital music Digital Rights Management (DRM) for multimedia data 31 Other Data Hiding Works in Thesis! Watermark-based image/video authentication, attack & countermeasures hide auth. data via look-up table in quantized coeff. (ICIP 98 & 99) double capturing attack and countermeasure (Asilomar 99)! Rotation/Scale/Translation resilient watermarking (w/ NECI) add spread-spectrum wmk in log-polar of FFT magnitude (Trans. IP 1, SPIE )! Data hiding for video communication (w/ P. Yin) real-time video transcoding via downsizing # send subblock motion for better visual quality error concealment # protect motion vectors by embedding parity bits 32 8

9 Publication List Fundamental Issues 1. M. Wu, B. Liu: Data Hiding in Images and Videos: Part I Fundamental Issues and Solutions, draft, to be submitted to IEEE Trans. on Circuits & Systems for Video Technology, Feb M. Wu, H. Yu, A. Gelman: Multi-level Data Hiding for Digital Image and Video, SPIE M. Wu, B. Liu: Digital Watermarking Using Shuffling, IEEE ICIP'99. Designs 1. C-Y. Lin, M. Wu, Y-M. Lui, J.A. Bloom, M.L. Miller, I.J. Cox: Rotation, Scale, and Translation Resilient Public Watermarking for Images, to appear in IEEE Transactions on Image Processing, May M. Wu, B. Liu: Data Hiding in Binary Images, submitted to IEEE Trans. on Multimedia, Apr M. Wu, H. Yu, B. Liu: Data Hiding in Images and Videos: Part II Designs and Applications, draft, to be submitted to IEEE Trans. on Circuits & Systems for Video Technology, Feb M. Wu, B. Liu: Data Hiding for Image and Video Authentication, to be submitted to IEEE Trans. on Image Processing, Jan M. Wu, E. Tang, B. Liu: Data Hiding in Digital Binary Image, IEEE ICME'. 6. M. Wu, H. Yu: Video Access Control via Multi-level Data Hiding, IEEE ICME'. 7. P. Yin, M. Wu, B. Liu: Video Transcoding by Reducing Spatial Resolution, IEEE ICIP. 8. C-Y. Lin, M. Wu, J.A. Bloom, M.L. Miller, I.J. Cox, and Y-M. Lui: Rotation, Scale, and Translation Resilient Public Watermarking for Images, SPIE (list of design papers - cont d) 9. M. Wu, B. Liu: Watermarking for Image Authentication, ICIP' P. Yin, M. Wu, B. Liu: Error Concealment for MPEG Video Over Internet, submitted to ICIP 1. Attacks & Countermeasures 1. M. Wu, S. Craver, E. Felten, B. Liu: Analysis of Attacks on SDMI Audio Watermarks, to appear in IEEE ICASSP'1. 2. S. Craver, P. McGregor, M. Wu, B. Liu, A. Stubblefield, B. Swartzlander, D.S. Wallach, D. Dean, E.W. Felten: Reading Between the Lines: Lessons from the SDMI Challenge, to appear in 4 th Info. Hiding Workshop, M. Wu, B. Liu, Attacks on Digital Watermarks, Asilomar 99. Non-watermark Works on Video (not included in thesis) 1. M. Wu, R. Joyce, H-S. Wong, L. Guan, S-Y. Kung: Dynamic Resource Allocation Via Video Content and Short-term Traffic Statistics, to appear in IEEE Trans. on Multimedia, special issues on multimedia over IP, June M. Wu, R. Joyce, S-Y. Kung: Dynamic Resource Allocation Via Video Content and Short-term Traffic Statistics, ICIP, invited paper. 3. H-S. Wong, M. Wu, R. Joyce, L. Guan, S-Y. Kung: A Neural Network Approach For Predicting Network Resource Requirement in Video Transmission, IEEE Pacific Rim Conference on Multimedia (PCM ). 4. M. Wu, W. Wolf, B. Liu, "An Algorithm of Wipe Detection", IEEE ICIP' Questions? Comments? Welcome! Acknowledgement Prof. Bede Liu (advisor) Dr. Wenjun Zeng (HVS and error concealment) Prof. Adam Finkelstein, Ed Tang, Mishella Yoshi (binary image) Dr. Heather Yu (multilevel data hiding) PengYin (transcoding and error concealment) Scott Craver, Prof. Ed Felten (SDMI attacks) Drs. I. Cox, M. Miller, J. Bloom, H. Stone (data hiding & RST wmk) 35 9

WATERMARKING FOR IMAGE AUTHENTICATION

WATERMARKING FOR IMAGE AUTHENTICATION WATERMARKING FOR IMAGE AUTHENTICATION Min Wu Bede Liu Department of Electrical Engineering Princeton University, Princeton, NJ 08544, USA Fax: +1-609-258-3745 {minwu, liu}@ee.princeton.edu ABSTRACT A data

More information

Audio synthesis: MIDI Digital Audio Coding/Compression. Today: Intellectual property management for digital media. What is Digital Watermarking?

Audio synthesis: MIDI Digital Audio Coding/Compression. Today: Intellectual property management for digital media. What is Digital Watermarking? ENEE408G Lecture-9 Last Lecture Digital Watermarking and Fingerprinting for Digital Rights Protection of Multimedia URL: http://www.ece.umd.edu/class/enee408g/ Slides included here are based on Spring

More information

Image Authentication Scheme using Digital Signature and Digital Watermarking

Image Authentication Scheme using Digital Signature and Digital Watermarking www..org 59 Image Authentication Scheme using Digital Signature and Digital Watermarking Seyed Mohammad Mousavi Industrial Management Institute, Tehran, Iran Abstract Usual digital signature schemes for

More information

CHAPTER 7 CONCLUSION AND FUTURE WORK

CHAPTER 7 CONCLUSION AND FUTURE WORK 158 CHAPTER 7 CONCLUSION AND FUTURE WORK The aim of this thesis was to present robust watermarking techniques for medical image. Section 7.1, consolidates the contributions made by the researcher and Section

More information

Multimedia Document Authentication using On-line Signatures as Watermarks

Multimedia Document Authentication using On-line Signatures as Watermarks Multimedia Document Authentication using On-line Signatures as Watermarks Anoop M Namboodiri and Anil K Jain Department of Computer Science and Engineering Michigan State University East Lansing, MI 48824

More information

A Survey of Error Resilient Coding Schemes for Image/Video Transmission Based on Data Embedding

A Survey of Error Resilient Coding Schemes for Image/Video Transmission Based on Data Embedding A Survey of Error Resilient Coding Schemes for Image/Video Transmission Based on Data Embedding Li-Wei Kang*( 康 立 威 ) and Jin-Jang Leou # ( 柳 金 章 ) *Institute of Information Science Academia Sinica, Taipei

More information

Video Authentication for H.264/AVC using Digital Signature Standard and Secure Hash Algorithm

Video Authentication for H.264/AVC using Digital Signature Standard and Secure Hash Algorithm Video Authentication for H.264/AVC using Digital Signature Standard and Secure Hash Algorithm Nandakishore Ramaswamy Qualcomm Inc 5775 Morehouse Dr, Sam Diego, CA 92122. USA nandakishore@qualcomm.com K.

More information

A Secure File Transfer based on Discrete Wavelet Transformation and Audio Watermarking Techniques

A Secure File Transfer based on Discrete Wavelet Transformation and Audio Watermarking Techniques A Secure File Transfer based on Discrete Wavelet Transformation and Audio Watermarking Techniques Vineela Behara,Y Ramesh Department of Computer Science and Engineering Aditya institute of Technology and

More information

Generating Robust Digital Signature for Image/Video Authentication

Generating Robust Digital Signature for Image/Video Authentication Generating Robust Digital Signature for Image/Video Authentication Ching-Yung Lin and Shih-Fu Chang Department of Electrical Engineering and New Media Technology Center Columbia University New York, NY

More information

Watermarking Techniques for Protecting Intellectual Properties in a Digital Environment

Watermarking Techniques for Protecting Intellectual Properties in a Digital Environment Watermarking Techniques for Protecting Intellectual Properties in a Digital Environment Isinkaye F. O*. and Aroge T. K. Department of Computer Science and Information Technology University of Science and

More information

Volume 2, Issue 12, December 2014 International Journal of Advance Research in Computer Science and Management Studies

Volume 2, Issue 12, December 2014 International Journal of Advance Research in Computer Science and Management Studies Volume 2, Issue 12, December 2014 International Journal of Advance Research in Computer Science and Management Studies Research Article / Survey Paper / Case Study Available online at: www.ijarcsms.com

More information

Security and protection of digital images by using watermarking methods

Security and protection of digital images by using watermarking methods Security and protection of digital images by using watermarking methods Andreja Samčović Faculty of Transport and Traffic Engineering University of Belgrade, Serbia Gjovik, june 2014. Digital watermarking

More information

IN THE recent decade, new devices and powerful software

IN THE recent decade, new devices and powerful software IEEE TRANSACTIONS ON IMAGE PROCESSING, VOL. 12, NO. 6, JUNE 2003 685 Data Hiding in Image and Video: Part I Fundamental Issues and Solutions Min Wu, Member, IEEE, and Bede Liu, Fellow, IEEE Abstract In

More information

SECURE DATA TRANSMISSION USING DIGITAL IMAGE WATERMARKING

SECURE DATA TRANSMISSION USING DIGITAL IMAGE WATERMARKING SECURE DATA TRANSMISSION USING DIGITAL IMAGE WATERMARKING 1 Maulik Srivastava, 2 Anuradha Sharma 1,2 Department of Computer Science & Engineering, Amity University, Uttar Pradesh Abstract: As we all know

More information

Bandwidth Adaptation for MPEG-4 Video Streaming over the Internet

Bandwidth Adaptation for MPEG-4 Video Streaming over the Internet DICTA2002: Digital Image Computing Techniques and Applications, 21--22 January 2002, Melbourne, Australia Bandwidth Adaptation for MPEG-4 Video Streaming over the Internet K. Ramkishor James. P. Mammen

More information

Experimental DRM Architecture Using Watermarking and PKI

Experimental DRM Architecture Using Watermarking and PKI Experimental DRM Architecture Using Watermarking and PKI Mikko Löytynoja, Tapio Seppänen, Nedeljko Cvejic MediaTeam Oulu Information Processing Laboratory University of Oulu, Finland {mikko.loytynoja,

More information

A Digital Audio Watermark Embedding Algorithm

A Digital Audio Watermark Embedding Algorithm Xianghong Tang, Yamei Niu, Hengli Yue, Zhongke Yin Xianghong Tang, Yamei Niu, Hengli Yue, Zhongke Yin School of Communication Engineering, Hangzhou Dianzi University, Hangzhou, Zhejiang, 3008, China tangxh@hziee.edu.cn,

More information

ROI Based Medical Image Watermarking with Zero Distortion and Enhanced Security

ROI Based Medical Image Watermarking with Zero Distortion and Enhanced Security I.J. Modern Education and Computer Science, 2014, 10, 40-48 Published Online October 2014 in MECS (http://www.mecs-press.org/) DOI: 10.5815/ijmecs.2014.10.06 ROI Based Medical Image Watermarking with Zero

More information

An Incomplete Cryptography based Digital Rights Management with DCFF

An Incomplete Cryptography based Digital Rights Management with DCFF An Incomplete Cryptography based Digital Rights Management with DCFF Ta Minh Thanh Department of Computer Science Tokyo Institute of Technology 2-12-2, Ookayama, Meguro, Tokyo, 152-8552, Japan. Email:thanhtm@ks.cs.titech.ac.jp

More information

Example #1: Controller for Frequency Modulated Spectroscopy

Example #1: Controller for Frequency Modulated Spectroscopy Progress Report Examples The following examples are drawn from past student reports, and illustrate how the general guidelines can be applied to a variety of design projects. The technical details have

More information

Using fractal compression scheme to embed a digital signature into an image

Using fractal compression scheme to embed a digital signature into an image Using fractal compression scheme to embed a digital signature into an image Joan Puate, Fred Jordan Swiss federal institute of technology Signal Processing Laboratory CH-1015 Lausanne Switzerland Email:

More information

Combating Anti-forensics of Jpeg Compression

Combating Anti-forensics of Jpeg Compression IJCSI International Journal of Computer Science Issues, Vol. 9, Issue 6, No 3, November 212 ISSN (Online): 1694-814 www.ijcsi.org 454 Combating Anti-forensics of Jpeg Compression Zhenxing Qian 1, Xinpeng

More information

Digital Audio and Video Data

Digital Audio and Video Data Multimedia Networking Reading: Sections 3.1.2, 3.3, 4.5, and 6.5 CS-375: Computer Networks Dr. Thomas C. Bressoud 1 Digital Audio and Video Data 2 Challenges for Media Streaming Large volume of data Each

More information

2695 P a g e. IV Semester M.Tech (DCN) SJCIT Chickballapur Karnataka India

2695 P a g e. IV Semester M.Tech (DCN) SJCIT Chickballapur Karnataka India Integrity Preservation and Privacy Protection for Digital Medical Images M.Krishna Rani Dr.S.Bhargavi IV Semester M.Tech (DCN) SJCIT Chickballapur Karnataka India Abstract- In medical treatments, the integrity

More information

Keywords Android, Copyright Protection, Discrete Cosine Transform (DCT), Digital Watermarking, Discrete Wavelet Transform (DWT), YCbCr.

Keywords Android, Copyright Protection, Discrete Cosine Transform (DCT), Digital Watermarking, Discrete Wavelet Transform (DWT), YCbCr. Volume 3, Issue 7, July 2013 ISSN: 2277 128X International Journal of Advanced Research in Computer Science and Software Engineering Research Paper Available online at: www.ijarcsse.com Web Based Novel

More information

Enhancing Data Security in Medical Information System Using the Watermarking Techniques and Oracle SecureFile LOBs

Enhancing Data Security in Medical Information System Using the Watermarking Techniques and Oracle SecureFile LOBs Enhancing Data Security in Medical Information System Using the Watermarking Techniques and Oracle SecureFile LOBs Said Aminzou 1, Brahim ER-RAHA 2, Youness Idrissi Khamlichi 3, Mustapha Machkour 4, Karim

More information

Real-Time DMB Video Encryption in Recording on PMP

Real-Time DMB Video Encryption in Recording on PMP Real-Time DMB Video Encryption in Recording on PMP Seong-Yeon Lee and Jong-Nam Kim Dept. of Electronic Computer Telecommunication Engineering, PuKyong Nat'l Univ. sylee9997@pknu.ac.kr, jongnam@pknu.ac.kr

More information

Multi-factor Authentication in Banking Sector

Multi-factor Authentication in Banking Sector Multi-factor Authentication in Banking Sector Tushar Bhivgade, Mithilesh Bhusari, Ajay Kuthe, Bhavna Jiddewar,Prof. Pooja Dubey Department of Computer Science & Engineering, Rajiv Gandhi College of Engineering

More information

AN ENHANCED MECHANISM FOR SECURE DATA TRANSMISSION USING STEGANOGRAPHY MERGED WITH VISUAL CRYPTOGRAPHY

AN ENHANCED MECHANISM FOR SECURE DATA TRANSMISSION USING STEGANOGRAPHY MERGED WITH VISUAL CRYPTOGRAPHY AN ENHANCED MECHANISM FOR SECURE DATA TRANSMISSION USING STEGANOGRAPHY MERGED WITH VISUAL CRYPTOGRAPHY Chandan Mohapatra 1, Manajusha Pandey 2 1 PG Student in Computer Science Dept., KIIT University, Bhubaneswar,

More information

An Algorithm for Data Hiding in Binary Images. Eman Th. Sedeek Al-obaidy Veterinary Medicine College University of Mosul

An Algorithm for Data Hiding in Binary Images. Eman Th. Sedeek Al-obaidy Veterinary Medicine College University of Mosul Raf. J. of Comp. & Math s., Vol. 5, No. 2, 2008 An Algorithm for Data Hiding in Binary Images Eman Th. Sedeek Al-obaidy Veterinary Medicine College University of Mosul Received on: 1/10/2007 Accepted on:

More information

Data Hiding: Current Status and Key Issues

Data Hiding: Current Status and Key Issues International Journal of Network Security, Vol.4, No.1, PP.1 9, Jan. 2007 1 Data Hiding: Current Status and Key Issues Nan-I Wu 1 and Min-Shiang Hwang 2 (Corresponding author: Min-Shiang Hwang) Institute

More information

Parametric Comparison of H.264 with Existing Video Standards

Parametric Comparison of H.264 with Existing Video Standards Parametric Comparison of H.264 with Existing Video Standards Sumit Bhardwaj Department of Electronics and Communication Engineering Amity School of Engineering, Noida, Uttar Pradesh,INDIA Jyoti Bhardwaj

More information

Study and Implementation of Video Compression Standards (H.264/AVC and Dirac)

Study and Implementation of Video Compression Standards (H.264/AVC and Dirac) Project Proposal Study and Implementation of Video Compression Standards (H.264/AVC and Dirac) Sumedha Phatak-1000731131- sumedha.phatak@mavs.uta.edu Objective: A study, implementation and comparison of

More information

5 Digital Rights Management

5 Digital Rights Management 5 Digital Rights Management 5.1 Media Rights 5.2 Rights Models 5.3 Principles of Encryption-Based DRM Systems 5.4 Watermarking 5.5 DRM Standards and Selected Commercial Solutions Literature: Bill Rosenblatt,

More information

A Dynamic Approach to Extract Texts and Captions from Videos

A Dynamic Approach to Extract Texts and Captions from Videos Available Online at www.ijcsmc.com International Journal of Computer Science and Mobile Computing A Monthly Journal of Computer Science and Information Technology IJCSMC, Vol. 3, Issue. 4, April 2014,

More information

Tracking Moving Objects In Video Sequences Yiwei Wang, Robert E. Van Dyck, and John F. Doherty Department of Electrical Engineering The Pennsylvania State University University Park, PA16802 Abstract{Object

More information

JPEG Image Compression by Using DCT

JPEG Image Compression by Using DCT International Journal of Computer Sciences and Engineering Open Access Research Paper Volume-4, Issue-4 E-ISSN: 2347-2693 JPEG Image Compression by Using DCT Sarika P. Bagal 1* and Vishal B. Raskar 2 1*

More information

Alaa Alhamami, Avan Sabah Hamdi Amman Arab University Amman, Jordan

Alaa Alhamami, Avan Sabah Hamdi Amman Arab University Amman, Jordan World of Computer Science and Information Technology Journal (WCSIT) ISSN: 2221-0741 Vol. 5, No. 5, 87-91, 2015 Mobile Secure Transmission Method Based on Audio Steganography Alaa Alhamami, Avan Sabah

More information

RESEARCH PROFILE: VIDEO TECHNOLOGIES FOR NETWORKED MULTIMEDIA APPLICATIONS

RESEARCH PROFILE: VIDEO TECHNOLOGIES FOR NETWORKED MULTIMEDIA APPLICATIONS RESEARCH PROFILE: VIDEO TECHNOLOGIES FOR NETWORKED MULTIMEDIA APPLICATIONS Chia-Wen Lin ( 林 嘉 文 ) cwlin@cs.ccu.edu.tw Tel: (05) 272-0411 ext. 33120 Networked Video Lab Dept. CSIE National Chung Cheng University

More information

A Robust and Lossless Information Embedding in Image Based on DCT and Scrambling Algorithms

A Robust and Lossless Information Embedding in Image Based on DCT and Scrambling Algorithms A Robust and Lossless Information Embedding in Image Based on DCT and Scrambling Algorithms Dr. Mohammad V. Malakooti Faculty and Head of Department of Computer Engineering, Islamic Azad University, UAE

More information

Assessment of Camera Phone Distortion and Implications for Watermarking

Assessment of Camera Phone Distortion and Implications for Watermarking Assessment of Camera Phone Distortion and Implications for Watermarking Aparna Gurijala, Alastair Reed and Eric Evans Digimarc Corporation, 9405 SW Gemini Drive, Beaverton, OR 97008, USA 1. INTRODUCTION

More information

A Secure Data Transmission By Integrating Cryptography And Video Steganography

A Secure Data Transmission By Integrating Cryptography And Video Steganography A Secure Data Transmission By Integrating Cryptography And Video Steganography Shafna P K Computer Science Department KMEA Engineering College Ernakulam, India shabanapk9999@gmail.com Abstract Advances

More information

Open issues and research trends in Content-based Image Retrieval

Open issues and research trends in Content-based Image Retrieval Open issues and research trends in Content-based Image Retrieval Raimondo Schettini DISCo Universita di Milano Bicocca schettini@disco.unimib.it www.disco.unimib.it/schettini/ IEEE Signal Processing Society

More information

COMPONENT FORENSICS OF DIGITAL CAMERAS: A NON-INTRUSIVE APPROACH

COMPONENT FORENSICS OF DIGITAL CAMERAS: A NON-INTRUSIVE APPROACH COMPONENT FORENSICS OF DIGITAL CAMERAS: A NON-INTRUSIVE APPROACH Ashwin Swaminathan, Min Wu and K. J. Ray Liu Electrical and Computer Engineering Department, University of Maryland, College Park ABSTRACT

More information

Security Based Data Transfer and Privacy Storage through Watermark Detection

Security Based Data Transfer and Privacy Storage through Watermark Detection Security Based Data Transfer and Privacy Storage through Watermark Detection Gowtham.T 1 Pradeep Kumar.G 2 1PG Scholar, Applied Electronics, Nandha Engineering College, Anna University, Erode, India. 2Assistant

More information

Evaluating the Feasibility of Digital Watermarking To Enforce Music Copyright

Evaluating the Feasibility of Digital Watermarking To Enforce Music Copyright Evaluating the Feasibility of Digital Watermarking To Enforce Music Copyright CS 588: Final Project Rob Farraher Ken Pickering Lim Vu Date Due: 12/04/01 Introduction With the tremendous increase in the

More information

Circle Object Recognition Based on Monocular Vision for Home Security Robot

Circle Object Recognition Based on Monocular Vision for Home Security Robot Journal of Applied Science and Engineering, Vol. 16, No. 3, pp. 261 268 (2013) DOI: 10.6180/jase.2013.16.3.05 Circle Object Recognition Based on Monocular Vision for Home Security Robot Shih-An Li, Ching-Chang

More information

A Look at Emerging Standards in Video Security Systems. Chris Adesanya Panasonic Network Systems Company Chris.Adesanya@us.panasonic.

A Look at Emerging Standards in Video Security Systems. Chris Adesanya Panasonic Network Systems Company Chris.Adesanya@us.panasonic. A Look at Emerging Standards in Video Security Systems Chris Adesanya Panasonic Network Systems Company Chris.Adesanya@us.panasonic.com Standards Standards are published documents that establish specifications

More information

Classes of multimedia Applications

Classes of multimedia Applications Classes of multimedia Applications Streaming Stored Audio and Video Streaming Live Audio and Video Real-Time Interactive Audio and Video Others Class: Streaming Stored Audio and Video The multimedia content

More information

IMPACT OF COMPRESSION ON THE VIDEO QUALITY

IMPACT OF COMPRESSION ON THE VIDEO QUALITY IMPACT OF COMPRESSION ON THE VIDEO QUALITY Miroslav UHRINA 1, Jan HLUBIK 1, Martin VACULIK 1 1 Department Department of Telecommunications and Multimedia, Faculty of Electrical Engineering, University

More information

Index Terms Audio streams, inactive frames, steganography, Voice over Internet Protocol (VoIP), packet loss. I. Introduction

Index Terms Audio streams, inactive frames, steganography, Voice over Internet Protocol (VoIP), packet loss. I. Introduction Volume 2, Issue 2, February 2012 ISSN: 2277 128X International Journal of Advanced Research in Computer Science and Software Engineering Research Paper Available online at: Advanced Integrated Steganographic

More information

Reversible Data Hiding and Reversible Authentication Watermarking for Binary Images

Reversible Data Hiding and Reversible Authentication Watermarking for Binary Images Reversible Data Hiding and Reversible Authentication Watermarking for Binary Images Sergio Vicente D. Pamboukian 1, Hae Yong Kim 2 1 Universidade Presbiteriana Mackenzie, Brazil. 2 Universidade de São

More information

Understanding Network Video Security Systems

Understanding Network Video Security Systems Understanding Network Video Security Systems Chris Adesanya Panasonic System Solutions Company adesanyac@us.panasonic.com Introduction and Overview This session will provide vendor neutral introduction

More information

Algorithms for the resizing of binary and grayscale images using a logical transform

Algorithms for the resizing of binary and grayscale images using a logical transform Algorithms for the resizing of binary and grayscale images using a logical transform Ethan E. Danahy* a, Sos S. Agaian b, Karen A. Panetta a a Dept. of Electrical and Computer Eng., Tufts University, 161

More information

Robust Blind Watermarking Mechanism For Point Sampled Geometry

Robust Blind Watermarking Mechanism For Point Sampled Geometry Robust Blind Watermarking Mechanism For Point Sampled Geometry Parag Agarwal Balakrishnan Prabhakaran Department of Computer Science, University of Texas at Dallas MS EC 31, PO Box 830688, Richardson,

More information

INTERNATIONAL JOURNAL OF APPLIED ENGINEERING RESEARCH, DINDIGUL Volume 1, No 3, 2010

INTERNATIONAL JOURNAL OF APPLIED ENGINEERING RESEARCH, DINDIGUL Volume 1, No 3, 2010 Lossless Medical Image Security Shrikhande Rohini 1, Vinayak Bairagi 2 1 Researcher, Electronics & Telecommunication Department, Sinhgad Academy Of Engg. 2 Assistant Professor, Electronics & Telecommunication

More information

An Approach of Covert Communication Based on the Adaptive Steganography Scheme on Voice over IP

An Approach of Covert Communication Based on the Adaptive Steganography Scheme on Voice over IP An Approach of Covert Communication Based on the Adaptive Steganography Scheme on Voice over IP Rui Miao Department of Electronic Engineering, Tsinghua University, Beijing, China rm870725@gmail.com Yongfeng

More information

ROBUST AND SECURE DIGITAL SIGNATURE FOR IMAGE AUTHENTICATION OVER WIRELESS CHANNELS

ROBUST AND SECURE DIGITAL SIGNATURE FOR IMAGE AUTHENTICATION OVER WIRELESS CHANNELS ROBUST AND SECURE DIGITAL SIGNATURE FOR IMAGE AUTHENTICATION OVER WIRELESS CHANNELS J Sravanthi #1, Dr. MHM Krishna Prasad *2 # Dept. of Computer Science, UCEV Vizianagaram, Andhra Pradesh, India * Associate

More information

Digital Rights Management

Digital Rights Management 2009 Levente Buttyán - piracy and DRM - basic model and architecture of DRM systems -MS Windows DRM -why DRM is bad? - content fingerprinting and watermarking - software protection techniques Introduction

More information

PERFORMANCE ANALYSIS OF VOIP TRAFFIC OVER INTEGRATING WIRELESS LAN AND WAN USING DIFFERENT CODECS

PERFORMANCE ANALYSIS OF VOIP TRAFFIC OVER INTEGRATING WIRELESS LAN AND WAN USING DIFFERENT CODECS PERFORMANCE ANALYSIS OF VOIP TRAFFIC OVER INTEGRATING WIRELESS LAN AND WAN USING DIFFERENT CODECS Ali M. Alsahlany 1 1 Department of Communication Engineering, Al-Najaf Technical College, Foundation of

More information

Figure 1: Relation between codec, data containers and compression algorithms.

Figure 1: Relation between codec, data containers and compression algorithms. Video Compression Djordje Mitrovic University of Edinburgh This document deals with the issues of video compression. The algorithm, which is used by the MPEG standards, will be elucidated upon in order

More information

Understanding Megapixel Camera Technology for Network Video Surveillance Systems. Glenn Adair

Understanding Megapixel Camera Technology for Network Video Surveillance Systems. Glenn Adair Understanding Megapixel Camera Technology for Network Video Surveillance Systems Glenn Adair Introduction (1) 3 MP Camera Covers an Area 9X as Large as (1) VGA Camera Megapixel = Reduce Cameras 3 Mega

More information

Performance Analysis and Comparison of JM 15.1 and Intel IPP H.264 Encoder and Decoder

Performance Analysis and Comparison of JM 15.1 and Intel IPP H.264 Encoder and Decoder Performance Analysis and Comparison of 15.1 and H.264 Encoder and Decoder K.V.Suchethan Swaroop and K.R.Rao, IEEE Fellow Department of Electrical Engineering, University of Texas at Arlington Arlington,

More information

Motion JPEG Video Authentication based on Quantization Matrix Watermarking: Application in Robotics

Motion JPEG Video Authentication based on Quantization Matrix Watermarking: Application in Robotics Motion JPEG Video Authentication based on Quantization Matrix Watermarking: Application in Robotics Lamri Laouamer Lab-STICC,European University of Brittany Al Qassim University Buraydah,15452,KSA Abdelhamid

More information

Automatic Extraction of Signatures from Bank Cheques and other Documents

Automatic Extraction of Signatures from Bank Cheques and other Documents Automatic Extraction of Signatures from Bank Cheques and other Documents Vamsi Krishna Madasu *, Mohd. Hafizuddin Mohd. Yusof, M. Hanmandlu ß, Kurt Kubik * *Intelligent Real-Time Imaging and Sensing group,

More information

Introduction. Impact of Link Failures on VoIP Performance. Outline. Introduction. Related Work. Outline

Introduction. Impact of Link Failures on VoIP Performance. Outline. Introduction. Related Work. Outline Impact of Link Failures on VoIP Performance International Workshop on Network and Operating System Support for Digital Audio and Video (NOSSDAV) C. Boutremans, G. Iannaccone and C. Diot Sprint ATL May

More information

TRANSPARENT ENCRYPTION FOR HEVC USING BIT-STREAM-BASED SELECTIVE COEFFICIENT SIGN ENCRYPTION. Heinz Hofbauer Andreas Uhl Andreas Unterweger

TRANSPARENT ENCRYPTION FOR HEVC USING BIT-STREAM-BASED SELECTIVE COEFFICIENT SIGN ENCRYPTION. Heinz Hofbauer Andreas Uhl Andreas Unterweger TRANSPARENT ENCRYPTION FOR HEVC USING BIT-STREAM-BASED SELECTIVE COEFFICIENT SIGN ENCRYPTION Heinz Hofbauer Andreas Uhl Andreas Unterweger University of Salzburg, Jakob Haringer Str. 2, 2 Salzburg, Austria

More information

A PHOTOGRAMMETRIC APPRAOCH FOR AUTOMATIC TRAFFIC ASSESSMENT USING CONVENTIONAL CCTV CAMERA

A PHOTOGRAMMETRIC APPRAOCH FOR AUTOMATIC TRAFFIC ASSESSMENT USING CONVENTIONAL CCTV CAMERA A PHOTOGRAMMETRIC APPRAOCH FOR AUTOMATIC TRAFFIC ASSESSMENT USING CONVENTIONAL CCTV CAMERA N. Zarrinpanjeh a, F. Dadrassjavan b, H. Fattahi c * a Islamic Azad University of Qazvin - nzarrin@qiau.ac.ir

More information

UNIVERSITY OF CENTRAL FLORIDA AT TRECVID 2003. Yun Zhai, Zeeshan Rasheed, Mubarak Shah

UNIVERSITY OF CENTRAL FLORIDA AT TRECVID 2003. Yun Zhai, Zeeshan Rasheed, Mubarak Shah UNIVERSITY OF CENTRAL FLORIDA AT TRECVID 2003 Yun Zhai, Zeeshan Rasheed, Mubarak Shah Computer Vision Laboratory School of Computer Science University of Central Florida, Orlando, Florida ABSTRACT In this

More information

Quality Estimation for Scalable Video Codec. Presented by Ann Ukhanova (DTU Fotonik, Denmark) Kashaf Mazhar (KTH, Sweden)

Quality Estimation for Scalable Video Codec. Presented by Ann Ukhanova (DTU Fotonik, Denmark) Kashaf Mazhar (KTH, Sweden) Quality Estimation for Scalable Video Codec Presented by Ann Ukhanova (DTU Fotonik, Denmark) Kashaf Mazhar (KTH, Sweden) Purpose of scalable video coding Multiple video streams are needed for heterogeneous

More information

Video compression: Performance of available codec software

Video compression: Performance of available codec software Video compression: Performance of available codec software Introduction. Digital Video A digital video is a collection of images presented sequentially to produce the effect of continuous motion. It takes

More information

Data Storage 3.1. Foundations of Computer Science Cengage Learning

Data Storage 3.1. Foundations of Computer Science Cengage Learning 3 Data Storage 3.1 Foundations of Computer Science Cengage Learning Objectives After studying this chapter, the student should be able to: List five different data types used in a computer. Describe how

More information

Video Coding Basics. Yao Wang Polytechnic University, Brooklyn, NY11201 yao@vision.poly.edu

Video Coding Basics. Yao Wang Polytechnic University, Brooklyn, NY11201 yao@vision.poly.edu Video Coding Basics Yao Wang Polytechnic University, Brooklyn, NY11201 yao@vision.poly.edu Outline Motivation for video coding Basic ideas in video coding Block diagram of a typical video codec Different

More information

Video Authentication- An Overview

Video Authentication- An Overview Video Authentication- An Overview Saurabh Upadhyay *, Sanjay Kumar Singh *Associate Professor, SIT, Gujarat s4upadhyay@gmail.com Associate Professor, IT BHU, Varanasi sks.cse@itbhu.ac.in ABSTRACT With

More information

White paper. H.264 video compression standard. New possibilities within video surveillance.

White paper. H.264 video compression standard. New possibilities within video surveillance. White paper H.264 video compression standard. New possibilities within video surveillance. Table of contents 1. Introduction 3 2. Development of H.264 3 3. How video compression works 4 4. H.264 profiles

More information

Multimedia Data Transmission over Wired/Wireless Networks

Multimedia Data Transmission over Wired/Wireless Networks Multimedia Data Transmission over Wired/Wireless Networks Bharat Bhargava Gang Ding, Xiaoxin Wu, Mohamed Hefeeda, Halima Ghafoor Purdue University Website: http://www.cs.purdue.edu/homes/bb E-mail: bb@cs.purdue.edu

More information

Video Encryption Exploiting Non-Standard 3D Data Arrangements. Stefan A. Kramatsch, Herbert Stögner, and Andreas Uhl uhl@cosy.sbg.ac.

Video Encryption Exploiting Non-Standard 3D Data Arrangements. Stefan A. Kramatsch, Herbert Stögner, and Andreas Uhl uhl@cosy.sbg.ac. Video Encryption Exploiting Non-Standard 3D Data Arrangements Stefan A. Kramatsch, Herbert Stögner, and Andreas Uhl uhl@cosy.sbg.ac.at Andreas Uhl 1 Carinthia Tech Institute & Salzburg University Outline

More information

Voice over IP: RTP/RTCP The transport layer

Voice over IP: RTP/RTCP The transport layer Advanced Networking Voice over IP: /RTCP The transport layer Renato Lo Cigno Requirements For Real-Time Transmission Need to emulate conventional telephone system Isochronous output timing same with input

More information

Multiple Embedding Using Robust Watermarks for Wireless Medical Images

Multiple Embedding Using Robust Watermarks for Wireless Medical Images Multiple Embedding Using Robust Watermarks for Wireless Medical Images Dominic Osborne and Derek Abbott Centre for Biomedical Engineering (CBME) The University of Adelaide, SA 5005, Australia Matthew Sorell

More information

OBJECTIVE VIDEO QUALITY METRICS: A PERFORMANCE ANALYSIS

OBJECTIVE VIDEO QUALITY METRICS: A PERFORMANCE ANALYSIS OBJECTIVE VIDEO QUALITY METRICS: A PERFORMANCE ANALYSIS José Luis Martínez, Pedro Cuenca, Francisco Delicado and Francisco Quiles Instituto de Investigación en Informática Universidad de Castilla La Mancha,

More information

Taking Inverse Graphics Seriously

Taking Inverse Graphics Seriously CSC2535: 2013 Advanced Machine Learning Taking Inverse Graphics Seriously Geoffrey Hinton Department of Computer Science University of Toronto The representation used by the neural nets that work best

More information

Very Low Frame-Rate Video Streaming For Face-to-Face Teleconference

Very Low Frame-Rate Video Streaming For Face-to-Face Teleconference Very Low Frame-Rate Video Streaming For Face-to-Face Teleconference Jue Wang, Michael F. Cohen Department of Electrical Engineering, University of Washington Microsoft Research Abstract Providing the best

More information

Chapter 3 ATM and Multimedia Traffic

Chapter 3 ATM and Multimedia Traffic In the middle of the 1980, the telecommunications world started the design of a network technology that could act as a great unifier to support all digital services, including low-speed telephony and very

More information

Study and Implementation of Video Compression standards (H.264/AVC, Dirac)

Study and Implementation of Video Compression standards (H.264/AVC, Dirac) Study and Implementation of Video Compression standards (H.264/AVC, Dirac) EE 5359-Multimedia Processing- Spring 2012 Dr. K.R Rao By: Sumedha Phatak(1000731131) Objective A study, implementation and comparison

More information

Introduction to image coding

Introduction to image coding Introduction to image coding Image coding aims at reducing amount of data required for image representation, storage or transmission. This is achieved by removing redundant data from an image, i.e. by

More information

Video-Conferencing System

Video-Conferencing System Video-Conferencing System Evan Broder and C. Christoher Post Introductory Digital Systems Laboratory November 2, 2007 Abstract The goal of this project is to create a video/audio conferencing system. Video

More information

Modelling, Extraction and Description of Intrinsic Cues of High Resolution Satellite Images: Independent Component Analysis based approaches

Modelling, Extraction and Description of Intrinsic Cues of High Resolution Satellite Images: Independent Component Analysis based approaches Modelling, Extraction and Description of Intrinsic Cues of High Resolution Satellite Images: Independent Component Analysis based approaches PhD Thesis by Payam Birjandi Director: Prof. Mihai Datcu Problematic

More information

!"#$"%&' What is Multimedia?

!#$%&' What is Multimedia? What is Multimedia? %' A Big Umbrella Goal of This Course Understand various aspects of a modern multimedia pipeline Content creating, editing Distribution Search & mining Protection Hands-on experience

More information

Advanced Networking Voice over IP: RTP/RTCP The transport layer

Advanced Networking Voice over IP: RTP/RTCP The transport layer Advanced Networking Voice over IP: RTP/RTCP The transport layer Renato Lo Cigno Requirements For Real-Time Transmission Need to emulate conventional telephone system Isochronous output timing same with

More information

A Concept of Digital Picture Envelope for Internet Communication

A Concept of Digital Picture Envelope for Internet Communication A Concept of Digital Picture Envelope for Internet Communication Eiji Kawaguchi, Koichi Nozaki, Michiharu Niimi, Hideki Noda and Richard O. Eason Kyushu Institute of Technology 1-1 Sensui-cho, Tobata,

More information

Data Storage. Chapter 3. Objectives. 3-1 Data Types. Data Inside the Computer. After studying this chapter, students should be able to:

Data Storage. Chapter 3. Objectives. 3-1 Data Types. Data Inside the Computer. After studying this chapter, students should be able to: Chapter 3 Data Storage Objectives After studying this chapter, students should be able to: List five different data types used in a computer. Describe how integers are stored in a computer. Describe how

More information

No-Reference Metric for a Video Quality Control Loop

No-Reference Metric for a Video Quality Control Loop No-Reference Metric for a Video Quality Control Loop Jorge CAVIEDES Philips Research, 345 Scarborough Rd, Briarcliff Manor NY 10510, USA, jorge.caviedes@philips.com and Joel JUNG Laboratoires d Electronique

More information

Signature Region of Interest using Auto cropping

Signature Region of Interest using Auto cropping ISSN (Online): 1694-0784 ISSN (Print): 1694-0814 1 Signature Region of Interest using Auto cropping Bassam Al-Mahadeen 1, Mokhled S. AlTarawneh 2 and Islam H. AlTarawneh 2 1 Math. And Computer Department,

More information

Text Localization & Segmentation in Images, Web Pages and Videos Media Mining I

Text Localization & Segmentation in Images, Web Pages and Videos Media Mining I Text Localization & Segmentation in Images, Web Pages and Videos Media Mining I Multimedia Computing, Universität Augsburg Rainer.Lienhart@informatik.uni-augsburg.de www.multimedia-computing.{de,org} PSNR_Y

More information

Multiple Description Coding (MDC) and Scalable Coding (SC) for Multimedia

Multiple Description Coding (MDC) and Scalable Coding (SC) for Multimedia Multiple Description Coding (MDC) and Scalable Coding (SC) for Multimedia Gürkan Gür PhD. Candidate e-mail: gurgurka@boun.edu.tr Dept. Of Computer Eng. Boğaziçi University Istanbul/TR ( Currenty@UNITN)

More information

Jeff M. Smith jeff.smith@ucdenver.edu

Jeff M. Smith jeff.smith@ucdenver.edu Jeff M. Smith jeff.smith@ucdenver.edu EDUCATION M.Sc. Recording Arts - 2006 University of Colorado Denver, Colorado. 3.9 GPA Thesis: The Accuracy and Consistency of Spectrographic Analysis for Voice Identification

More information

Super-resolution method based on edge feature for high resolution imaging

Super-resolution method based on edge feature for high resolution imaging Science Journal of Circuits, Systems and Signal Processing 2014; 3(6-1): 24-29 Published online December 26, 2014 (http://www.sciencepublishinggroup.com/j/cssp) doi: 10.11648/j.cssp.s.2014030601.14 ISSN:

More information

Invisible Image Water Marking Using Hybrid DWT Compression/Decompression Technique

Invisible Image Water Marking Using Hybrid DWT Compression/Decompression Technique Invisible Image Water Marking Using Hybrid DWT Compression/Decompression Technique B.Sai Kiran M.Tech (VLSI), CMR Institute of Technology. Mr.Shahbaz Khan Associate Professor, CMR Institute of Technology.

More information

Multimedia Systems: Database Support

Multimedia Systems: Database Support Multimedia Systems: Database Support Ralf Steinmetz Lars Wolf Darmstadt University of Technology Industrial Process and System Communications Merckstraße 25 64283 Darmstadt Germany 1 Database System Applications

More information

Friendly Medical Image Sharing Scheme

Friendly Medical Image Sharing Scheme Journal of Information Hiding and Multimedia Signal Processing 2014 ISSN 2073-4212 Ubiquitous International Volume 5, Number 3, July 2014 Frily Medical Image Sharing Scheme Hao-Kuan Tso Department of Computer

More information