Multimedia Data Hiding
|
|
- Job Cameron
- 8 years ago
- Views:
Transcription
1 Multimedia Data Hiding Introduction! Digital Watermarking / Multimedia Data Hiding Hide secondary data in digital image/video/audio/3d! Uses of hidden data: ownership verification, alteration detection access control, annotation, side info. delivery Min Wu Dept. of Electrical Engineering Committee: Profs. B.Liu, P.Ramadge, S.Kulkarni! Issues and challenges: imperceptibility, robustness & security, capacity tradeoff between the conflicting requirements Robustness Imperceptibility Capacity 2 General Framework Key Elements of Data Hiding 1111 Hello, World original media data to be hidden extracted 1111 data Hello, World player embed play/ record/ extract marked media (w/ hidden data) compress process / attack! Perceptual model! Embedding one bit! Multiple bits! Uneven embedding capacity! Robustness and security! What data to embed Upper Layers security error correction uneven capacity equalization Physical Layer how to embed one or multiple bits? 3 4 1
2 Thesis Outline " Fundamental issues and solutions # embedding strategy classification and capacity issues # handling uneven capacity # modulation/multiplexing techniques for hiding multiple bits " Algorithm and system designs # binary images # image authentication # video copy/access control and fingerprinting # applications in video communication " Attacks and countermeasures # innocent tools block replacement and double-capturing # countermeasure against rotation/scale/translation # robustness & security analysis on SDMI audio watermarking Algorithm and System Designs " Demonstrating solutions to fundamental issues 5 6 Data Hiding in Binary Image Example-1: Signature in Signature! A simple yet important class of images scanned documents, drawings, signatures! Challenges E-PAD (InterLink Electronics) little room for invisible changes uneven distribution of changeable pixels Clinton electronically signed Electronic Signatures Act - Yahoo News 6/3/ media/gif/bil.gif as of 7/ 7 Annotating digitized signature with content info. of the signed document (Finkelstein - Princeton U.) 8 2
3 Our Approach! Block-based pixel-domain method hide a fixed number of bits in each block extract hidden data without the use of original copy Robustness is not a major requirement for authentication and annotation applications. Preserve Visual Quality! Assign flippability score to each pixel determine how noticeable the flipping of a pixel is based on smoothness and connectivity Hierarchical! Three issues determine which pixels to flip for invisibility embed data in each block using flippable pixels handle uneven embedding capacity via shuffling (a) (b)! Sort pixels in each block according to the scores flip high-score pixels with high priority 9 1 Embedding Mechanism! Extracting data without original image hard to directly encode data in flippable pixels # flippability may change after encoding! Our approach manipulate flippable pixels to enforce block-based property # enforce the total number of black pixels to be odd/even to hide 1 bit / block, or use more general mapping # incorporate quantization or tolerance zone for robustness # of black pixel per blk 2kQ (2k+1)Q (2k+2)Q (2k+3)Q odd-even mapping 1 1 lookup table mapping Shuffling for Binary Image! Uneven distribution of flippable pixels most are on rugged boundary! Embedding rate (per block) variable: need side info. constant: require larger blk! Random shuffling equalizes distribution embed more bits enhance security portion of blocks Important! Pixels with high flippability score are shown in the images. image size 288x48, red block size 16x16 before shuffle after shuffle embeddble coeff. # per block (signature img) 12 3
4 Analysis of Shuffling Compare Analysis with Simulation for Shuffling Mean follows hypergeometric distribution m /N ( th bin) m 1/N (1 st bin) m 2/N (2 nd bin) before shuffle 2.37% 1.85% 5.56% mean after shuffle analysis simulation 5.16x1-5 % % 7.77x1-4 % % 5.81x1-3 % 5.56x1-3 % std after shuffle analysis simulation 9.78x x m r ~ # of blocks each having r blue balls out of q balls q balls... pick w/o replacement N = S/q blocks portion of blocks (x 1%) before shuffle before shuff simulation mean simulation std analytic mean analytic std mean after shuffle std after shuffle q = 16 x 16 S = 288 x 48 N = S/q = 18 x 3 p = 5.45%.5 unchangeable pixel/coeff. changeable pixel/coeff. S balls in total n = ps blue balls 13 Simulation: 1 indep. random shuff # of flippable pixels per block (signature img) 14 Example-1: Signature in Signature Each block is 32- pixel large, 1bit / blk. Example-2: Document Authentication (c) (a) alter (d) (f) (b) after alteration (e) (g) Annotating digitized signature with content info. of the signed document (Finkelstein - Princeton U.) 15 Embed pre-determined pattern or content features beforehand Verify hidden data s integrity to decide on authenticity 16 4
5 Robustness vs. Capacity! Blind/non-coherent detection ~ original copy unavailable! Single robustness-capacity setting over-estimates and/or under-estimates actual noise not all embedded data are equally important Robustness Capacity Capacity C (bits/ch. use) Capacity of Type-I (host=1e) and Type-II AWGN ch. (wmk MSE E 2 ) Type-I (C-i C-o, blind detection) Type-II (D-i D-o) grayscale/color image/video Experimental Results 6-frame 352 x 24 flower garden sequence 66-frame 352 x 24 concatenated sequence Level-1: high capacity Level-2: high robustness embed. rate robustness embed. rate robustness 64 bits (91 char.) 332 bits avg. chunk size = 6 frames Video Examples MPEG-2 4.5Mbps; frame dropping 132 bits (18 char.) 1266 bits MPEG-2 1.5Mbps; frame dropping Notes also embed control info. Imperceptibility log 1 (E 2 /σ 2 ) (db) stronger noise weaker Video Example Robust Video Data Hiding embed b i & (i mod M) embed b i+1 & (i+1 mod M) 1st & 3th Mpeg4.5Mbps frame of original, marked, and their luminance difference human visual model for imperceptibility: protect smooth areas and sharp edges 19! Embedding domain partition video into segments of similar consecutive frames for each frame of a segment, embed same data in block-dct domain embed segment index to detect frame jitter! Multi-level embedding light processing data extractable from just a few frames severe processing extractable by processing more frames! Uneven embedding capacity seg. i seg. i+1 within a frame: constant embedding rate per region & shuffling between frames: embed # of hidden bit per frame as side info.! Modulation/Multiplexing techniques TDMA, CDMA, orthogonal/bi-orthogonal modulation 2 5
6 Watermark Attacks: What and Why? Attacks & Countermeasures! Attacks: intentionally obliterate watermarks remove a robust watermark make watermark undetectable (e.g., miss synchronization) uncertainty in detection (e.g., multiple ownership claims) forge a valid (fragile) watermark bypass watermark detector 21! Why study attacks? identify weaknesses propose improvement understand pros and limitation of tech. solution To win each campaign, a general should know both his troop and the opponent s as well as possible. -- Sun Tzu, The Art of War, 5 B.C. 22 Innocent Tools Used by Attackers! Recovery of lost blocks for resilient multimedia transmission of JPEG/MPEG good quality by edge-directed interpolation: Jung et al; Zeng-Liu! Remove robust watermark by block replacement JPEG 1% marked original (no distortion) after proposed attack edge estimation edge-directed interpolation JPEG 1% w/o distort Interp. w/ orig w/o orig x512 lenna Threshold: 3 ~ 6! Attack effective on block-dct based spread-spectrum watermark 23 claimed high robustness&quality by fine tuning wmk strength for each region 24 6
7 Secure Digital Music Initiative Challenge SDMI Challenge Setup Obtained From SDMI Job for Attackers Black Box (unknown)! International consortium ~ 18+companies/organizations currently pursuing watermark based solution for access and copy control on digital music Sample-1 (original) Watermark (special signal) Embed Sample-2 (marked)! Public challenge ( 9/15-1/8/2 ) attacks on four robust watermark technologies Any Marked Audio Detect Watermark Found! Non-traditional research values reveal real industrial problem and state-of-art technologies present an emulated rivalry environment for better understanding on audio watermarking lead to a few research problems Sample-3 (marked) Attack Sample-4 (attacked) Detect GOAL Watermark NOT Found Observation on One SDMI Watermark Difference between original and marked samples given by SDMI 27 Learning from SDMI Challenge! Our successful attacks blind attacks: warping, jittering attacks based on studying orig.-marked pairs # deliberate filtering / subtraction / randomization! Noteworthy issues duality between embedding and attacks secrecy of embedding can t rely on orig. being unknown double-watermarking used by SDMI # robust wmk should resist processing/attacks # fragile wmk indicate audio experience compression attacks and countermeasures on forging fragile wmk # relate to watermark-based authentication 28 7
8 Is Watermark Useful?! Not an answer to all our attacks pointed out weaknesses of specific proposals and demonstrated general approaches! For copy/access control hard to get complete solution with technology alone # business model, pricing model, etc. Summary improved watermark tech. could be part of the solution # make attack non-trivial and keep honest people honest! Other applications detecting alteration # digital camera/camcorder; digitized signature/ binary doc. convey side information # for performance enhancement or additional funtionality 29 3 Summary & Conclusion! Data hiding in digital multimedia for a variety of purposes, involving multiple disciplines! Tradeoff among many criterions! Important to think both as designer and as attacker! Data hiding in market digital cameras with authentication watermark module plug-in for image editors video watermark proposals for DVD copy control on-going SDMI effort for digital music Digital Rights Management (DRM) for multimedia data 31 Other Data Hiding Works in Thesis! Watermark-based image/video authentication, attack & countermeasures hide auth. data via look-up table in quantized coeff. (ICIP 98 & 99) double capturing attack and countermeasure (Asilomar 99)! Rotation/Scale/Translation resilient watermarking (w/ NECI) add spread-spectrum wmk in log-polar of FFT magnitude (Trans. IP 1, SPIE )! Data hiding for video communication (w/ P. Yin) real-time video transcoding via downsizing # send subblock motion for better visual quality error concealment # protect motion vectors by embedding parity bits 32 8
9 Publication List Fundamental Issues 1. M. Wu, B. Liu: Data Hiding in Images and Videos: Part I Fundamental Issues and Solutions, draft, to be submitted to IEEE Trans. on Circuits & Systems for Video Technology, Feb M. Wu, H. Yu, A. Gelman: Multi-level Data Hiding for Digital Image and Video, SPIE M. Wu, B. Liu: Digital Watermarking Using Shuffling, IEEE ICIP'99. Designs 1. C-Y. Lin, M. Wu, Y-M. Lui, J.A. Bloom, M.L. Miller, I.J. Cox: Rotation, Scale, and Translation Resilient Public Watermarking for Images, to appear in IEEE Transactions on Image Processing, May M. Wu, B. Liu: Data Hiding in Binary Images, submitted to IEEE Trans. on Multimedia, Apr M. Wu, H. Yu, B. Liu: Data Hiding in Images and Videos: Part II Designs and Applications, draft, to be submitted to IEEE Trans. on Circuits & Systems for Video Technology, Feb M. Wu, B. Liu: Data Hiding for Image and Video Authentication, to be submitted to IEEE Trans. on Image Processing, Jan M. Wu, E. Tang, B. Liu: Data Hiding in Digital Binary Image, IEEE ICME'. 6. M. Wu, H. Yu: Video Access Control via Multi-level Data Hiding, IEEE ICME'. 7. P. Yin, M. Wu, B. Liu: Video Transcoding by Reducing Spatial Resolution, IEEE ICIP. 8. C-Y. Lin, M. Wu, J.A. Bloom, M.L. Miller, I.J. Cox, and Y-M. Lui: Rotation, Scale, and Translation Resilient Public Watermarking for Images, SPIE (list of design papers - cont d) 9. M. Wu, B. Liu: Watermarking for Image Authentication, ICIP' P. Yin, M. Wu, B. Liu: Error Concealment for MPEG Video Over Internet, submitted to ICIP 1. Attacks & Countermeasures 1. M. Wu, S. Craver, E. Felten, B. Liu: Analysis of Attacks on SDMI Audio Watermarks, to appear in IEEE ICASSP'1. 2. S. Craver, P. McGregor, M. Wu, B. Liu, A. Stubblefield, B. Swartzlander, D.S. Wallach, D. Dean, E.W. Felten: Reading Between the Lines: Lessons from the SDMI Challenge, to appear in 4 th Info. Hiding Workshop, M. Wu, B. Liu, Attacks on Digital Watermarks, Asilomar 99. Non-watermark Works on Video (not included in thesis) 1. M. Wu, R. Joyce, H-S. Wong, L. Guan, S-Y. Kung: Dynamic Resource Allocation Via Video Content and Short-term Traffic Statistics, to appear in IEEE Trans. on Multimedia, special issues on multimedia over IP, June M. Wu, R. Joyce, S-Y. Kung: Dynamic Resource Allocation Via Video Content and Short-term Traffic Statistics, ICIP, invited paper. 3. H-S. Wong, M. Wu, R. Joyce, L. Guan, S-Y. Kung: A Neural Network Approach For Predicting Network Resource Requirement in Video Transmission, IEEE Pacific Rim Conference on Multimedia (PCM ). 4. M. Wu, W. Wolf, B. Liu, "An Algorithm of Wipe Detection", IEEE ICIP' Questions? Comments? Welcome! Acknowledgement Prof. Bede Liu (advisor) Dr. Wenjun Zeng (HVS and error concealment) Prof. Adam Finkelstein, Ed Tang, Mishella Yoshi (binary image) Dr. Heather Yu (multilevel data hiding) PengYin (transcoding and error concealment) Scott Craver, Prof. Ed Felten (SDMI attacks) Drs. I. Cox, M. Miller, J. Bloom, H. Stone (data hiding & RST wmk) 35 9
WATERMARKING FOR IMAGE AUTHENTICATION
WATERMARKING FOR IMAGE AUTHENTICATION Min Wu Bede Liu Department of Electrical Engineering Princeton University, Princeton, NJ 08544, USA Fax: +1-609-258-3745 {minwu, liu}@ee.princeton.edu ABSTRACT A data
More informationAudio synthesis: MIDI Digital Audio Coding/Compression. Today: Intellectual property management for digital media. What is Digital Watermarking?
ENEE408G Lecture-9 Last Lecture Digital Watermarking and Fingerprinting for Digital Rights Protection of Multimedia URL: http://www.ece.umd.edu/class/enee408g/ Slides included here are based on Spring
More informationImage Authentication Scheme using Digital Signature and Digital Watermarking
www..org 59 Image Authentication Scheme using Digital Signature and Digital Watermarking Seyed Mohammad Mousavi Industrial Management Institute, Tehran, Iran Abstract Usual digital signature schemes for
More informationCHAPTER 7 CONCLUSION AND FUTURE WORK
158 CHAPTER 7 CONCLUSION AND FUTURE WORK The aim of this thesis was to present robust watermarking techniques for medical image. Section 7.1, consolidates the contributions made by the researcher and Section
More informationMultimedia Document Authentication using On-line Signatures as Watermarks
Multimedia Document Authentication using On-line Signatures as Watermarks Anoop M Namboodiri and Anil K Jain Department of Computer Science and Engineering Michigan State University East Lansing, MI 48824
More informationA Survey of Error Resilient Coding Schemes for Image/Video Transmission Based on Data Embedding
A Survey of Error Resilient Coding Schemes for Image/Video Transmission Based on Data Embedding Li-Wei Kang*( 康 立 威 ) and Jin-Jang Leou # ( 柳 金 章 ) *Institute of Information Science Academia Sinica, Taipei
More informationVideo Authentication for H.264/AVC using Digital Signature Standard and Secure Hash Algorithm
Video Authentication for H.264/AVC using Digital Signature Standard and Secure Hash Algorithm Nandakishore Ramaswamy Qualcomm Inc 5775 Morehouse Dr, Sam Diego, CA 92122. USA nandakishore@qualcomm.com K.
More informationA Secure File Transfer based on Discrete Wavelet Transformation and Audio Watermarking Techniques
A Secure File Transfer based on Discrete Wavelet Transformation and Audio Watermarking Techniques Vineela Behara,Y Ramesh Department of Computer Science and Engineering Aditya institute of Technology and
More informationGenerating Robust Digital Signature for Image/Video Authentication
Generating Robust Digital Signature for Image/Video Authentication Ching-Yung Lin and Shih-Fu Chang Department of Electrical Engineering and New Media Technology Center Columbia University New York, NY
More informationWatermarking Techniques for Protecting Intellectual Properties in a Digital Environment
Watermarking Techniques for Protecting Intellectual Properties in a Digital Environment Isinkaye F. O*. and Aroge T. K. Department of Computer Science and Information Technology University of Science and
More informationVolume 2, Issue 12, December 2014 International Journal of Advance Research in Computer Science and Management Studies
Volume 2, Issue 12, December 2014 International Journal of Advance Research in Computer Science and Management Studies Research Article / Survey Paper / Case Study Available online at: www.ijarcsms.com
More informationSecurity and protection of digital images by using watermarking methods
Security and protection of digital images by using watermarking methods Andreja Samčović Faculty of Transport and Traffic Engineering University of Belgrade, Serbia Gjovik, june 2014. Digital watermarking
More informationIN THE recent decade, new devices and powerful software
IEEE TRANSACTIONS ON IMAGE PROCESSING, VOL. 12, NO. 6, JUNE 2003 685 Data Hiding in Image and Video: Part I Fundamental Issues and Solutions Min Wu, Member, IEEE, and Bede Liu, Fellow, IEEE Abstract In
More informationSECURE DATA TRANSMISSION USING DIGITAL IMAGE WATERMARKING
SECURE DATA TRANSMISSION USING DIGITAL IMAGE WATERMARKING 1 Maulik Srivastava, 2 Anuradha Sharma 1,2 Department of Computer Science & Engineering, Amity University, Uttar Pradesh Abstract: As we all know
More informationBandwidth Adaptation for MPEG-4 Video Streaming over the Internet
DICTA2002: Digital Image Computing Techniques and Applications, 21--22 January 2002, Melbourne, Australia Bandwidth Adaptation for MPEG-4 Video Streaming over the Internet K. Ramkishor James. P. Mammen
More informationExperimental DRM Architecture Using Watermarking and PKI
Experimental DRM Architecture Using Watermarking and PKI Mikko Löytynoja, Tapio Seppänen, Nedeljko Cvejic MediaTeam Oulu Information Processing Laboratory University of Oulu, Finland {mikko.loytynoja,
More informationA Digital Audio Watermark Embedding Algorithm
Xianghong Tang, Yamei Niu, Hengli Yue, Zhongke Yin Xianghong Tang, Yamei Niu, Hengli Yue, Zhongke Yin School of Communication Engineering, Hangzhou Dianzi University, Hangzhou, Zhejiang, 3008, China tangxh@hziee.edu.cn,
More informationROI Based Medical Image Watermarking with Zero Distortion and Enhanced Security
I.J. Modern Education and Computer Science, 2014, 10, 40-48 Published Online October 2014 in MECS (http://www.mecs-press.org/) DOI: 10.5815/ijmecs.2014.10.06 ROI Based Medical Image Watermarking with Zero
More informationAn Incomplete Cryptography based Digital Rights Management with DCFF
An Incomplete Cryptography based Digital Rights Management with DCFF Ta Minh Thanh Department of Computer Science Tokyo Institute of Technology 2-12-2, Ookayama, Meguro, Tokyo, 152-8552, Japan. Email:thanhtm@ks.cs.titech.ac.jp
More informationExample #1: Controller for Frequency Modulated Spectroscopy
Progress Report Examples The following examples are drawn from past student reports, and illustrate how the general guidelines can be applied to a variety of design projects. The technical details have
More informationUsing fractal compression scheme to embed a digital signature into an image
Using fractal compression scheme to embed a digital signature into an image Joan Puate, Fred Jordan Swiss federal institute of technology Signal Processing Laboratory CH-1015 Lausanne Switzerland Email:
More informationCombating Anti-forensics of Jpeg Compression
IJCSI International Journal of Computer Science Issues, Vol. 9, Issue 6, No 3, November 212 ISSN (Online): 1694-814 www.ijcsi.org 454 Combating Anti-forensics of Jpeg Compression Zhenxing Qian 1, Xinpeng
More informationDigital Audio and Video Data
Multimedia Networking Reading: Sections 3.1.2, 3.3, 4.5, and 6.5 CS-375: Computer Networks Dr. Thomas C. Bressoud 1 Digital Audio and Video Data 2 Challenges for Media Streaming Large volume of data Each
More information2695 P a g e. IV Semester M.Tech (DCN) SJCIT Chickballapur Karnataka India
Integrity Preservation and Privacy Protection for Digital Medical Images M.Krishna Rani Dr.S.Bhargavi IV Semester M.Tech (DCN) SJCIT Chickballapur Karnataka India Abstract- In medical treatments, the integrity
More informationKeywords Android, Copyright Protection, Discrete Cosine Transform (DCT), Digital Watermarking, Discrete Wavelet Transform (DWT), YCbCr.
Volume 3, Issue 7, July 2013 ISSN: 2277 128X International Journal of Advanced Research in Computer Science and Software Engineering Research Paper Available online at: www.ijarcsse.com Web Based Novel
More informationEnhancing Data Security in Medical Information System Using the Watermarking Techniques and Oracle SecureFile LOBs
Enhancing Data Security in Medical Information System Using the Watermarking Techniques and Oracle SecureFile LOBs Said Aminzou 1, Brahim ER-RAHA 2, Youness Idrissi Khamlichi 3, Mustapha Machkour 4, Karim
More informationReal-Time DMB Video Encryption in Recording on PMP
Real-Time DMB Video Encryption in Recording on PMP Seong-Yeon Lee and Jong-Nam Kim Dept. of Electronic Computer Telecommunication Engineering, PuKyong Nat'l Univ. sylee9997@pknu.ac.kr, jongnam@pknu.ac.kr
More informationMulti-factor Authentication in Banking Sector
Multi-factor Authentication in Banking Sector Tushar Bhivgade, Mithilesh Bhusari, Ajay Kuthe, Bhavna Jiddewar,Prof. Pooja Dubey Department of Computer Science & Engineering, Rajiv Gandhi College of Engineering
More informationAN ENHANCED MECHANISM FOR SECURE DATA TRANSMISSION USING STEGANOGRAPHY MERGED WITH VISUAL CRYPTOGRAPHY
AN ENHANCED MECHANISM FOR SECURE DATA TRANSMISSION USING STEGANOGRAPHY MERGED WITH VISUAL CRYPTOGRAPHY Chandan Mohapatra 1, Manajusha Pandey 2 1 PG Student in Computer Science Dept., KIIT University, Bhubaneswar,
More informationAn Algorithm for Data Hiding in Binary Images. Eman Th. Sedeek Al-obaidy Veterinary Medicine College University of Mosul
Raf. J. of Comp. & Math s., Vol. 5, No. 2, 2008 An Algorithm for Data Hiding in Binary Images Eman Th. Sedeek Al-obaidy Veterinary Medicine College University of Mosul Received on: 1/10/2007 Accepted on:
More informationData Hiding: Current Status and Key Issues
International Journal of Network Security, Vol.4, No.1, PP.1 9, Jan. 2007 1 Data Hiding: Current Status and Key Issues Nan-I Wu 1 and Min-Shiang Hwang 2 (Corresponding author: Min-Shiang Hwang) Institute
More informationParametric Comparison of H.264 with Existing Video Standards
Parametric Comparison of H.264 with Existing Video Standards Sumit Bhardwaj Department of Electronics and Communication Engineering Amity School of Engineering, Noida, Uttar Pradesh,INDIA Jyoti Bhardwaj
More informationStudy and Implementation of Video Compression Standards (H.264/AVC and Dirac)
Project Proposal Study and Implementation of Video Compression Standards (H.264/AVC and Dirac) Sumedha Phatak-1000731131- sumedha.phatak@mavs.uta.edu Objective: A study, implementation and comparison of
More information5 Digital Rights Management
5 Digital Rights Management 5.1 Media Rights 5.2 Rights Models 5.3 Principles of Encryption-Based DRM Systems 5.4 Watermarking 5.5 DRM Standards and Selected Commercial Solutions Literature: Bill Rosenblatt,
More informationA Dynamic Approach to Extract Texts and Captions from Videos
Available Online at www.ijcsmc.com International Journal of Computer Science and Mobile Computing A Monthly Journal of Computer Science and Information Technology IJCSMC, Vol. 3, Issue. 4, April 2014,
More informationTracking Moving Objects In Video Sequences Yiwei Wang, Robert E. Van Dyck, and John F. Doherty Department of Electrical Engineering The Pennsylvania State University University Park, PA16802 Abstract{Object
More informationJPEG Image Compression by Using DCT
International Journal of Computer Sciences and Engineering Open Access Research Paper Volume-4, Issue-4 E-ISSN: 2347-2693 JPEG Image Compression by Using DCT Sarika P. Bagal 1* and Vishal B. Raskar 2 1*
More informationAlaa Alhamami, Avan Sabah Hamdi Amman Arab University Amman, Jordan
World of Computer Science and Information Technology Journal (WCSIT) ISSN: 2221-0741 Vol. 5, No. 5, 87-91, 2015 Mobile Secure Transmission Method Based on Audio Steganography Alaa Alhamami, Avan Sabah
More informationRESEARCH PROFILE: VIDEO TECHNOLOGIES FOR NETWORKED MULTIMEDIA APPLICATIONS
RESEARCH PROFILE: VIDEO TECHNOLOGIES FOR NETWORKED MULTIMEDIA APPLICATIONS Chia-Wen Lin ( 林 嘉 文 ) cwlin@cs.ccu.edu.tw Tel: (05) 272-0411 ext. 33120 Networked Video Lab Dept. CSIE National Chung Cheng University
More informationA Robust and Lossless Information Embedding in Image Based on DCT and Scrambling Algorithms
A Robust and Lossless Information Embedding in Image Based on DCT and Scrambling Algorithms Dr. Mohammad V. Malakooti Faculty and Head of Department of Computer Engineering, Islamic Azad University, UAE
More informationAssessment of Camera Phone Distortion and Implications for Watermarking
Assessment of Camera Phone Distortion and Implications for Watermarking Aparna Gurijala, Alastair Reed and Eric Evans Digimarc Corporation, 9405 SW Gemini Drive, Beaverton, OR 97008, USA 1. INTRODUCTION
More informationA Secure Data Transmission By Integrating Cryptography And Video Steganography
A Secure Data Transmission By Integrating Cryptography And Video Steganography Shafna P K Computer Science Department KMEA Engineering College Ernakulam, India shabanapk9999@gmail.com Abstract Advances
More informationOpen issues and research trends in Content-based Image Retrieval
Open issues and research trends in Content-based Image Retrieval Raimondo Schettini DISCo Universita di Milano Bicocca schettini@disco.unimib.it www.disco.unimib.it/schettini/ IEEE Signal Processing Society
More informationCOMPONENT FORENSICS OF DIGITAL CAMERAS: A NON-INTRUSIVE APPROACH
COMPONENT FORENSICS OF DIGITAL CAMERAS: A NON-INTRUSIVE APPROACH Ashwin Swaminathan, Min Wu and K. J. Ray Liu Electrical and Computer Engineering Department, University of Maryland, College Park ABSTRACT
More informationSecurity Based Data Transfer and Privacy Storage through Watermark Detection
Security Based Data Transfer and Privacy Storage through Watermark Detection Gowtham.T 1 Pradeep Kumar.G 2 1PG Scholar, Applied Electronics, Nandha Engineering College, Anna University, Erode, India. 2Assistant
More informationEvaluating the Feasibility of Digital Watermarking To Enforce Music Copyright
Evaluating the Feasibility of Digital Watermarking To Enforce Music Copyright CS 588: Final Project Rob Farraher Ken Pickering Lim Vu Date Due: 12/04/01 Introduction With the tremendous increase in the
More informationCircle Object Recognition Based on Monocular Vision for Home Security Robot
Journal of Applied Science and Engineering, Vol. 16, No. 3, pp. 261 268 (2013) DOI: 10.6180/jase.2013.16.3.05 Circle Object Recognition Based on Monocular Vision for Home Security Robot Shih-An Li, Ching-Chang
More informationA Look at Emerging Standards in Video Security Systems. Chris Adesanya Panasonic Network Systems Company Chris.Adesanya@us.panasonic.
A Look at Emerging Standards in Video Security Systems Chris Adesanya Panasonic Network Systems Company Chris.Adesanya@us.panasonic.com Standards Standards are published documents that establish specifications
More informationClasses of multimedia Applications
Classes of multimedia Applications Streaming Stored Audio and Video Streaming Live Audio and Video Real-Time Interactive Audio and Video Others Class: Streaming Stored Audio and Video The multimedia content
More informationIMPACT OF COMPRESSION ON THE VIDEO QUALITY
IMPACT OF COMPRESSION ON THE VIDEO QUALITY Miroslav UHRINA 1, Jan HLUBIK 1, Martin VACULIK 1 1 Department Department of Telecommunications and Multimedia, Faculty of Electrical Engineering, University
More informationIndex Terms Audio streams, inactive frames, steganography, Voice over Internet Protocol (VoIP), packet loss. I. Introduction
Volume 2, Issue 2, February 2012 ISSN: 2277 128X International Journal of Advanced Research in Computer Science and Software Engineering Research Paper Available online at: Advanced Integrated Steganographic
More informationReversible Data Hiding and Reversible Authentication Watermarking for Binary Images
Reversible Data Hiding and Reversible Authentication Watermarking for Binary Images Sergio Vicente D. Pamboukian 1, Hae Yong Kim 2 1 Universidade Presbiteriana Mackenzie, Brazil. 2 Universidade de São
More informationUnderstanding Network Video Security Systems
Understanding Network Video Security Systems Chris Adesanya Panasonic System Solutions Company adesanyac@us.panasonic.com Introduction and Overview This session will provide vendor neutral introduction
More informationAlgorithms for the resizing of binary and grayscale images using a logical transform
Algorithms for the resizing of binary and grayscale images using a logical transform Ethan E. Danahy* a, Sos S. Agaian b, Karen A. Panetta a a Dept. of Electrical and Computer Eng., Tufts University, 161
More informationRobust Blind Watermarking Mechanism For Point Sampled Geometry
Robust Blind Watermarking Mechanism For Point Sampled Geometry Parag Agarwal Balakrishnan Prabhakaran Department of Computer Science, University of Texas at Dallas MS EC 31, PO Box 830688, Richardson,
More informationINTERNATIONAL JOURNAL OF APPLIED ENGINEERING RESEARCH, DINDIGUL Volume 1, No 3, 2010
Lossless Medical Image Security Shrikhande Rohini 1, Vinayak Bairagi 2 1 Researcher, Electronics & Telecommunication Department, Sinhgad Academy Of Engg. 2 Assistant Professor, Electronics & Telecommunication
More informationAn Approach of Covert Communication Based on the Adaptive Steganography Scheme on Voice over IP
An Approach of Covert Communication Based on the Adaptive Steganography Scheme on Voice over IP Rui Miao Department of Electronic Engineering, Tsinghua University, Beijing, China rm870725@gmail.com Yongfeng
More informationROBUST AND SECURE DIGITAL SIGNATURE FOR IMAGE AUTHENTICATION OVER WIRELESS CHANNELS
ROBUST AND SECURE DIGITAL SIGNATURE FOR IMAGE AUTHENTICATION OVER WIRELESS CHANNELS J Sravanthi #1, Dr. MHM Krishna Prasad *2 # Dept. of Computer Science, UCEV Vizianagaram, Andhra Pradesh, India * Associate
More informationDigital Rights Management
2009 Levente Buttyán - piracy and DRM - basic model and architecture of DRM systems -MS Windows DRM -why DRM is bad? - content fingerprinting and watermarking - software protection techniques Introduction
More informationPERFORMANCE ANALYSIS OF VOIP TRAFFIC OVER INTEGRATING WIRELESS LAN AND WAN USING DIFFERENT CODECS
PERFORMANCE ANALYSIS OF VOIP TRAFFIC OVER INTEGRATING WIRELESS LAN AND WAN USING DIFFERENT CODECS Ali M. Alsahlany 1 1 Department of Communication Engineering, Al-Najaf Technical College, Foundation of
More informationFigure 1: Relation between codec, data containers and compression algorithms.
Video Compression Djordje Mitrovic University of Edinburgh This document deals with the issues of video compression. The algorithm, which is used by the MPEG standards, will be elucidated upon in order
More informationUnderstanding Megapixel Camera Technology for Network Video Surveillance Systems. Glenn Adair
Understanding Megapixel Camera Technology for Network Video Surveillance Systems Glenn Adair Introduction (1) 3 MP Camera Covers an Area 9X as Large as (1) VGA Camera Megapixel = Reduce Cameras 3 Mega
More informationPerformance Analysis and Comparison of JM 15.1 and Intel IPP H.264 Encoder and Decoder
Performance Analysis and Comparison of 15.1 and H.264 Encoder and Decoder K.V.Suchethan Swaroop and K.R.Rao, IEEE Fellow Department of Electrical Engineering, University of Texas at Arlington Arlington,
More informationMotion JPEG Video Authentication based on Quantization Matrix Watermarking: Application in Robotics
Motion JPEG Video Authentication based on Quantization Matrix Watermarking: Application in Robotics Lamri Laouamer Lab-STICC,European University of Brittany Al Qassim University Buraydah,15452,KSA Abdelhamid
More informationAutomatic Extraction of Signatures from Bank Cheques and other Documents
Automatic Extraction of Signatures from Bank Cheques and other Documents Vamsi Krishna Madasu *, Mohd. Hafizuddin Mohd. Yusof, M. Hanmandlu ß, Kurt Kubik * *Intelligent Real-Time Imaging and Sensing group,
More informationIntroduction. Impact of Link Failures on VoIP Performance. Outline. Introduction. Related Work. Outline
Impact of Link Failures on VoIP Performance International Workshop on Network and Operating System Support for Digital Audio and Video (NOSSDAV) C. Boutremans, G. Iannaccone and C. Diot Sprint ATL May
More informationTRANSPARENT ENCRYPTION FOR HEVC USING BIT-STREAM-BASED SELECTIVE COEFFICIENT SIGN ENCRYPTION. Heinz Hofbauer Andreas Uhl Andreas Unterweger
TRANSPARENT ENCRYPTION FOR HEVC USING BIT-STREAM-BASED SELECTIVE COEFFICIENT SIGN ENCRYPTION Heinz Hofbauer Andreas Uhl Andreas Unterweger University of Salzburg, Jakob Haringer Str. 2, 2 Salzburg, Austria
More informationA PHOTOGRAMMETRIC APPRAOCH FOR AUTOMATIC TRAFFIC ASSESSMENT USING CONVENTIONAL CCTV CAMERA
A PHOTOGRAMMETRIC APPRAOCH FOR AUTOMATIC TRAFFIC ASSESSMENT USING CONVENTIONAL CCTV CAMERA N. Zarrinpanjeh a, F. Dadrassjavan b, H. Fattahi c * a Islamic Azad University of Qazvin - nzarrin@qiau.ac.ir
More informationUNIVERSITY OF CENTRAL FLORIDA AT TRECVID 2003. Yun Zhai, Zeeshan Rasheed, Mubarak Shah
UNIVERSITY OF CENTRAL FLORIDA AT TRECVID 2003 Yun Zhai, Zeeshan Rasheed, Mubarak Shah Computer Vision Laboratory School of Computer Science University of Central Florida, Orlando, Florida ABSTRACT In this
More informationQuality Estimation for Scalable Video Codec. Presented by Ann Ukhanova (DTU Fotonik, Denmark) Kashaf Mazhar (KTH, Sweden)
Quality Estimation for Scalable Video Codec Presented by Ann Ukhanova (DTU Fotonik, Denmark) Kashaf Mazhar (KTH, Sweden) Purpose of scalable video coding Multiple video streams are needed for heterogeneous
More informationVideo compression: Performance of available codec software
Video compression: Performance of available codec software Introduction. Digital Video A digital video is a collection of images presented sequentially to produce the effect of continuous motion. It takes
More informationData Storage 3.1. Foundations of Computer Science Cengage Learning
3 Data Storage 3.1 Foundations of Computer Science Cengage Learning Objectives After studying this chapter, the student should be able to: List five different data types used in a computer. Describe how
More informationVideo Coding Basics. Yao Wang Polytechnic University, Brooklyn, NY11201 yao@vision.poly.edu
Video Coding Basics Yao Wang Polytechnic University, Brooklyn, NY11201 yao@vision.poly.edu Outline Motivation for video coding Basic ideas in video coding Block diagram of a typical video codec Different
More informationVideo Authentication- An Overview
Video Authentication- An Overview Saurabh Upadhyay *, Sanjay Kumar Singh *Associate Professor, SIT, Gujarat s4upadhyay@gmail.com Associate Professor, IT BHU, Varanasi sks.cse@itbhu.ac.in ABSTRACT With
More informationWhite paper. H.264 video compression standard. New possibilities within video surveillance.
White paper H.264 video compression standard. New possibilities within video surveillance. Table of contents 1. Introduction 3 2. Development of H.264 3 3. How video compression works 4 4. H.264 profiles
More informationMultimedia Data Transmission over Wired/Wireless Networks
Multimedia Data Transmission over Wired/Wireless Networks Bharat Bhargava Gang Ding, Xiaoxin Wu, Mohamed Hefeeda, Halima Ghafoor Purdue University Website: http://www.cs.purdue.edu/homes/bb E-mail: bb@cs.purdue.edu
More informationVideo Encryption Exploiting Non-Standard 3D Data Arrangements. Stefan A. Kramatsch, Herbert Stögner, and Andreas Uhl uhl@cosy.sbg.ac.
Video Encryption Exploiting Non-Standard 3D Data Arrangements Stefan A. Kramatsch, Herbert Stögner, and Andreas Uhl uhl@cosy.sbg.ac.at Andreas Uhl 1 Carinthia Tech Institute & Salzburg University Outline
More informationVoice over IP: RTP/RTCP The transport layer
Advanced Networking Voice over IP: /RTCP The transport layer Renato Lo Cigno Requirements For Real-Time Transmission Need to emulate conventional telephone system Isochronous output timing same with input
More informationMultiple Embedding Using Robust Watermarks for Wireless Medical Images
Multiple Embedding Using Robust Watermarks for Wireless Medical Images Dominic Osborne and Derek Abbott Centre for Biomedical Engineering (CBME) The University of Adelaide, SA 5005, Australia Matthew Sorell
More informationOBJECTIVE VIDEO QUALITY METRICS: A PERFORMANCE ANALYSIS
OBJECTIVE VIDEO QUALITY METRICS: A PERFORMANCE ANALYSIS José Luis Martínez, Pedro Cuenca, Francisco Delicado and Francisco Quiles Instituto de Investigación en Informática Universidad de Castilla La Mancha,
More informationTaking Inverse Graphics Seriously
CSC2535: 2013 Advanced Machine Learning Taking Inverse Graphics Seriously Geoffrey Hinton Department of Computer Science University of Toronto The representation used by the neural nets that work best
More informationVery Low Frame-Rate Video Streaming For Face-to-Face Teleconference
Very Low Frame-Rate Video Streaming For Face-to-Face Teleconference Jue Wang, Michael F. Cohen Department of Electrical Engineering, University of Washington Microsoft Research Abstract Providing the best
More informationChapter 3 ATM and Multimedia Traffic
In the middle of the 1980, the telecommunications world started the design of a network technology that could act as a great unifier to support all digital services, including low-speed telephony and very
More informationStudy and Implementation of Video Compression standards (H.264/AVC, Dirac)
Study and Implementation of Video Compression standards (H.264/AVC, Dirac) EE 5359-Multimedia Processing- Spring 2012 Dr. K.R Rao By: Sumedha Phatak(1000731131) Objective A study, implementation and comparison
More informationIntroduction to image coding
Introduction to image coding Image coding aims at reducing amount of data required for image representation, storage or transmission. This is achieved by removing redundant data from an image, i.e. by
More informationVideo-Conferencing System
Video-Conferencing System Evan Broder and C. Christoher Post Introductory Digital Systems Laboratory November 2, 2007 Abstract The goal of this project is to create a video/audio conferencing system. Video
More informationModelling, Extraction and Description of Intrinsic Cues of High Resolution Satellite Images: Independent Component Analysis based approaches
Modelling, Extraction and Description of Intrinsic Cues of High Resolution Satellite Images: Independent Component Analysis based approaches PhD Thesis by Payam Birjandi Director: Prof. Mihai Datcu Problematic
More information!"#$"%&' What is Multimedia?
What is Multimedia? %' A Big Umbrella Goal of This Course Understand various aspects of a modern multimedia pipeline Content creating, editing Distribution Search & mining Protection Hands-on experience
More informationAdvanced Networking Voice over IP: RTP/RTCP The transport layer
Advanced Networking Voice over IP: RTP/RTCP The transport layer Renato Lo Cigno Requirements For Real-Time Transmission Need to emulate conventional telephone system Isochronous output timing same with
More informationA Concept of Digital Picture Envelope for Internet Communication
A Concept of Digital Picture Envelope for Internet Communication Eiji Kawaguchi, Koichi Nozaki, Michiharu Niimi, Hideki Noda and Richard O. Eason Kyushu Institute of Technology 1-1 Sensui-cho, Tobata,
More informationData Storage. Chapter 3. Objectives. 3-1 Data Types. Data Inside the Computer. After studying this chapter, students should be able to:
Chapter 3 Data Storage Objectives After studying this chapter, students should be able to: List five different data types used in a computer. Describe how integers are stored in a computer. Describe how
More informationNo-Reference Metric for a Video Quality Control Loop
No-Reference Metric for a Video Quality Control Loop Jorge CAVIEDES Philips Research, 345 Scarborough Rd, Briarcliff Manor NY 10510, USA, jorge.caviedes@philips.com and Joel JUNG Laboratoires d Electronique
More informationSignature Region of Interest using Auto cropping
ISSN (Online): 1694-0784 ISSN (Print): 1694-0814 1 Signature Region of Interest using Auto cropping Bassam Al-Mahadeen 1, Mokhled S. AlTarawneh 2 and Islam H. AlTarawneh 2 1 Math. And Computer Department,
More informationText Localization & Segmentation in Images, Web Pages and Videos Media Mining I
Text Localization & Segmentation in Images, Web Pages and Videos Media Mining I Multimedia Computing, Universität Augsburg Rainer.Lienhart@informatik.uni-augsburg.de www.multimedia-computing.{de,org} PSNR_Y
More informationMultiple Description Coding (MDC) and Scalable Coding (SC) for Multimedia
Multiple Description Coding (MDC) and Scalable Coding (SC) for Multimedia Gürkan Gür PhD. Candidate e-mail: gurgurka@boun.edu.tr Dept. Of Computer Eng. Boğaziçi University Istanbul/TR ( Currenty@UNITN)
More informationJeff M. Smith jeff.smith@ucdenver.edu
Jeff M. Smith jeff.smith@ucdenver.edu EDUCATION M.Sc. Recording Arts - 2006 University of Colorado Denver, Colorado. 3.9 GPA Thesis: The Accuracy and Consistency of Spectrographic Analysis for Voice Identification
More informationSuper-resolution method based on edge feature for high resolution imaging
Science Journal of Circuits, Systems and Signal Processing 2014; 3(6-1): 24-29 Published online December 26, 2014 (http://www.sciencepublishinggroup.com/j/cssp) doi: 10.11648/j.cssp.s.2014030601.14 ISSN:
More informationInvisible Image Water Marking Using Hybrid DWT Compression/Decompression Technique
Invisible Image Water Marking Using Hybrid DWT Compression/Decompression Technique B.Sai Kiran M.Tech (VLSI), CMR Institute of Technology. Mr.Shahbaz Khan Associate Professor, CMR Institute of Technology.
More informationMultimedia Systems: Database Support
Multimedia Systems: Database Support Ralf Steinmetz Lars Wolf Darmstadt University of Technology Industrial Process and System Communications Merckstraße 25 64283 Darmstadt Germany 1 Database System Applications
More informationFriendly Medical Image Sharing Scheme
Journal of Information Hiding and Multimedia Signal Processing 2014 ISSN 2073-4212 Ubiquitous International Volume 5, Number 3, July 2014 Frily Medical Image Sharing Scheme Hao-Kuan Tso Department of Computer
More information