Watermarking Techniques for Protecting Intellectual Properties in a Digital Environment
|
|
|
- Dwayne Reed
- 10 years ago
- Views:
Transcription
1 Watermarking Techniques for Protecting Intellectual Properties in a Digital Environment Isinkaye F. O*. and Aroge T. K. Department of Computer Science and Information Technology University of Science and Technology, Ifaki-Ekiti, Ekiti-State *Corresponding Authour:[email protected] Abstract The protection and enforcement of intellectual property rights for digital media has become an important issue in many countries of the world. There is increase in the popularity and accessibility of the Internet to record, edit, replicate and broadcast multimedia content which has necessitated a high demand to protect digital information against illegal uses, manipulations and distributions. Digital watermarking technique which is the process used to embed proprietary information into multimedia digital signal provides a robust solution to this problem. This paper reviews different aspects and techniques of digital watermarking for protecting digital contents. It also explores different application areas of digital watermarking such as copyright protection, broadcast monitoring, integrity protection etc. Keywords: Watermarking techniques, Digital properties, Content protection, Authenticity determination, Quantization Introduction The development and success of the internet has created a new challenge to protect digital content from piracy. Digital watermarking is a new technique that provides an ultimate and robust solution to this problem. It involves direct embedding of additional information into the original content or host signal without perceptible difference between the watermarked and the original content [1]. Such watermark is extremely difficult to remove without altering or damaging the original signal. Watermarking techniques consist of two parts: a part to embed a signal to the original content and a part to detect if a given piece of signal hosts a watermark and subsequently retrieves the conveyed signal. Digital watermarking is very important because it protects the rights of owners of a signal; it also provides copyright identification, user identification, authenticity determination and automated monitoring. This paper reviews different watermarking application and techniques to protect digital contents such as text, video, image and audio. Digital watermarking is a new research area which is becoming popular. It provides robust solution to the problem of copying and modifying digital content by protecting it from piracy. [2, 3] observed that, the focus of most digital watermarking research is on data objects such as still images, video and audio. Digital watermarking technique is used to ensure the truthfulness and integrity of document content [4], and to embed information which can either be a unique code specifying the author or the originator of the host content [5] (user identification). Due to this, Digital watermarking techniques are often evaluated based on their invisibility, recoverability and robustness. Digital watermarking can be achieved in three ways: fragile, semi-fragile and robust watermarking. Fragile watermarks are the set of watermarking method that can be completely destroyed after any modification to an image [6]. They are not applicable for copyright protection because they are easily removed without seriously degrading the signal. They are heavily used in signal authenticity determination. Semi-fragile on the other hand are used for detecting any unauthorized modification to a digital signal [7]. They have more applicability because they assure that only non-malicious modification will occur in the host signal. Robust watermarking has the best applicability for watermarking than the two previous methods in that they are designed to withstand arbitrarily malicious attacks [8] and are usually used for copyright protection. According to [9], robust watermarking is seen as a communication channel multiplexed into original content in a non-perceptible way and whose capacity degrades as a smooth function of the degradation of the marked content. Watermark embedding scheme can either embed the watermark into the host signal or to a transformed version of the host signal. Transform domain watermarking is a scheme that is used to transform image frequency domain in such a way to modify the transform coefficient. Some common transform domain watermarking for image data can be Discrete Cosine Transform (DCT) based [10, 11] or Discrete Wavelet Transform (DWT) based [12]. This scheme is very useful for taking advantage of perceptual criteria in the embedding process for designing watermark techniques. Spatial domain watermarking on the other hand has the capability of performing some transformation directly on image pixels. The use of perceptual models is also an important component in generating an effective and acceptable watermarking scheme for audio just as it is used in image watermarking [13, 14]. Each watermarking application has its own features that determine the required attributes of the watermarking system and drive the choice of techniques used for embedding and detecting the watermark. These features such as transparency, effectiveness, security, reversibility and complexity as well as possibility of verification allow digital watermarking algorithms to be efficiently evaluated to know if it has enough ingredients that can be used for certain application area. 27
2 Watermarking Techniques Watermark embedding techniques are designed to insert the watermark directly into original signal or into some transformed versions of the original signal in order to take advantage of the perceptual properties or robustness to a particular signal manipulation. Watermarking techniques should have two basic steps: one step that inserts a digital signal using an embedding algorithm and an embedding key. Another step uses a detection algorithm and an appropriate detection key to retrieve the watermark signal. In most techniques, the embedding and detection key are secrete as shown in the figure below. Original data (Od) Secrete key (Sk) Watermarked data (Wd) Watermark (W) Fig. 1: Watermark embedding process In Fig. 1, (Od) is the original data in which (W) will be inserted, (W) may require a secret key (Sk). The watermarked data (Wd) which is normally generated with the help of a generating function (fg) is the output of the embedding process. Wd = fg(od, Ws, Sk) (Eq. 1) Original data (Od) Watermark embedding algorithm Secrete key (Sk) Watermark detection algorithm Extracted Watermarked data (Wd) Fig. 2: Watermark detection process In Fig. 2, the watermarked data (Wd), which is distorted, together with the secret key (Sk) and the original data (Od) are all input to the detection algorithm. The extracting function (fh) recovers the embedded watermarked signal (Ws ) at the receiving end. The secrete key (Sk), used in the embedding process should be available at the receiving end along with the original data (Od). If the watermark data was not attacked, it returns the watermark or an indication of its presence (Eq. 2) [15]. In the contrary case, nothing is returned (Eq. 3). (Eq. 2), Sk) (Eq. 3) Digital Audio Watermarking Digital audio watermarking involves embedding special signals within a discrete audio file. The signal can be extracted by detection mechanisms. The use of perceptual models is an important component in generating an effective and acceptable watermarking scheme for audio [16]. The requirements for audio watermarking are imperceptivity, robustness to signal alteration such as conversion, compression and filtering [17]. There are different watermarking techniques for audio which includes echo coding, phase coding, spread spectrum and quantization based watermarking. Phase encoding breaks an audio signal into frames and performs spectra analysis on each of the broken frames, once the spectrum has been completed, the magnitude and phase of consecutive frames are compared and an artificial phase signal is created to transmit signal. The artificial phase is modulated in with the phase from each frame and new frames are combined to form the watermarked signal. This technique is very effective in the presence of noise. Spread spectrum watermarking technique depends on direct sequence spread spectrum to spread the watermark signal over an entire audible frequency spectrum. It is an example of a correlation method which embeds pseudorandom sequence and detects watermark by calculating correlation between pseudorandom noise sequence and watermark audio signal. SSW is very easy to implement but it requires timeconsuming psycho-acoustic shaping to reduce audible noise and susceptible to time-scale modification attack [18]. Echo watermarking allows the original audio signal to be copied into two kernels, one which leads the original in time and one which lags. Each kernel represents either a zero or a one bit for watermark data transmission. The bit stream of watermark data is used to mix the two kernels together. The signals are mixed with gradually slope transition to reduce distortion. Quantization based watermarking technique quantizes a sample a and assigns new value to the sample a based on the quantized sample value. The watermarked sample value b is described as: (Eq. 4) (Eq. 5) In Eq (4&5), qz(.) is a quantization function and C is a quantization step. The quantization function qz(a) is given as qz(a,c)=[a/c].c. The technique is simple to implement and it is robust against noise attack so long as the noise margin is below C/4. It also has the ability to achieve provably better rate-distortion-robustness trade-offs than other watermarking techniques such as spread spectrum and low-bits modulation against worse-case square-error distortion-constrained intentional attacks which may be 28
3 encountered in a number of copyright, authentication and convert communication multimedia application. Image Watermarking Images in watermarking are represented as pixels in frequencies transform domain or in spatial domain and they are expected to go through signal processing operations such as compression, filtering, rescaling, cropping, geometric distortion and additive noise which they must survive. In image watermarking, watermark embedding is applied directly to the pixels values in the spatial domain or to transform coefficients in a transform domain [19] such as discrete cosine transform (DCT) or discrete wavelet transform (DWT). The watermarked image ( ) is obtained by embedding the watermark (W) in the original image = f (I g) w), where f() is a function denoting the embedding operation and g() is a gain function that depends upon (w) and local global image properties. The function can be linear or non-linear. Discrete Wavelet Transform allows the simultaneous apparition of both temporal and frequency information. It separates an image into lower resolution approximation image LL as well as horizontal HL, vertical LH and diagonal HH detail components. The process can then be repeated to compute scale wavelet decomposition as in the two scale wavelet transform shown in the Fig. 3 below. LL 2 HL 2 LH 1 HH 2 HL 1 LH 1 HH 1 Fig. 3: Two scale 2-dimensional DWT The benefit of this technique is that it accurately models aspects of the human visual system (HVS) as compared to the DCT. This helps to use higher energy watermarks in regions that the HVS is known to be less sensitive to, such as high resolution detail bands like LH, HL, H. when watermark is embedded in these regions, there is increase in the robustness of watermark at little to no additional impact on image quality. Discrete Cosine Transform allows an image to be broken into different frequency bands making it easier to embed watermarking information into the middle frequency bands of the image. The basic idea is to represent the image as a sum of sinusoid at different frequencies and magnitudes. An image is divided into 8x8 blocks and the coefficient for each block is calculated. For most images, most of the visually significant information is concentrated in a few coefficients. The DCT is used frequently in JPEG compression. The steps are highlighted below. Divide the image into non-overlapping blocks of 8x8 apply forward DCT to each of the blocks apply some block selection criteria apply coefficient selection criteria embed watermark by modifying selected coefficient convert the inverse DCT for 8x8 blocks after modifying the largest coefficient in step 5. Discrete Fourier Transform watermarking is of two types, one allows the watermark to be directly embedded by modifying the phase information within the DFT. The other is a template based embedding which embeds a template in the DFT domain to estimate the transformation factor. Anytime the watermarked image is transformed, the template is searched to resynchronize the image. A detector is now used to extract the embedded spread spectrum watermark. DFT offers robustness against geometric attacks such as scaling, cropping and rotation. Digital Video Watermarking Digital watermarking refers to embedding watermarks in a multimedia documents and files in order to protect them from illegal copying and identifying manipulations [20]. Ideally, a user viewing the video cannot perceive a difference between the original video and the watermarked video, but a watermark extraction application can read the watermark and obtain the embedded information. Video watermarking approaches can be classified into two main categories based on the method of embedding watermark information bits in the host video. The two categories are: spatial domain watermarking and transform-domain watermarking [21]. In spatial domain watermarking techniques, embedding and detection are performed on spatial pixels values such as luminance, chrominance, color space or on the overall video frame. Spatial-domain techniques are easy to implement, however they are not robust against common digital signal processing operations such as video compression. Transform-domain techniques, on the other hand, alter spatial pixel values of the host video according to a pre-determined transform. Commonly used transforms are the Discrete Cosine Transform (DCT), the Fast Fourier Transform (FFT) and the Discrete Wavelet Transform (DWT). Watermarking algorithm optimizes for three separate factors which are: Robustness, which is the ability to resist attempts by attackers to destroy it by modifying the quality, size, rotation and other visual aspect of video. Security, which is the ability of the watermark to resist attempts by a sophisticated attacker to remove it through cryptanalysis without modifying the video itself and Perceptual fidelity, which is the perceived visual quality of the watermarked video compared to the original video. Text watermarking Text watermarking involves embedding watermark information into the layout and formatting of the text directly. It was designed for watermarking electronic versions of text document which may be in some formatted versions such as postscript or PDF. Text watermarking technique consist of line shift coding, here, each of the even lines is slightly shifted up or down according to the bit value in the payload [22]. If the bit is one, the corresponding line is shifted up else it is shifted down. The odd lines are control lines. Word shift coding, this technique allows each line to be divided into groups of words which has enough number of characters. Each even group is shifted to the right or left according to the bit value in the payload. At decoding, the odd groups are used as 29
4 references for measuring and comparing the distances between the groups [23]. Spread spectrum technique makes watermark bit to be mixed with Pseudo Random Noise [PRN] generated signal, the signal is then embedded in the original signal where the PRN acts as the secrete key. A particular PRN signal can later be detected by correlation receiver. All these techniques are based on watermarking the binary-valued text region of a text document. Text watermark detection technique involves post processing steps to try to remove noise.tw techniques are effective against common attacks such as multigenerational photocopying. Application of Watermarking Techniques Content Authentication: The advances in computer technology has made it easier to manipulate digital multimedia content as well as making it extremely difficult to determine the originality of such content. Content authentication is the process which confirms the integrity of watermarked data to make sure that the data is not tampered with. The use of watermarking related authentication consists of digital rights management systems, video surveillance and remote sensing applications, digital insurance claim evidence and trusted cameras. In security monitoring, watermark is used to make sure that all video inputs are from authorized sources. In these applications, a watermark which describes the work is sometimes used. It is important that the description of the file is unique and hard to obtain by an attacker. Privacy Protection: Electronic health programs allow personal health information to be collected and stored in a digital form. Most of these records consist of personal information which should be highly protected. Personal information on medical images are normally stored in a separate file that can be easily accessed at the same time with the images. However, this information are not always protected, hence it can be accessed anytime by intruders. The issues of privacy protection and access control were triggered by a recent incidence that involved accessing patient information for jobs screening in the university Health Network in Toronto [24]. Digital watermarking can be used to embed sensitive information into the cover files. The advantage of watermarking is that the information stays with the original file, which reduces the chance of it being deleted or changed accidentally. Moreover, since watermarking introduces only small distortions, it will not cause difficulties for physicians who do not have the authority to access the personal file. Ownership assertion and identification: watermarking can be used to prevent unauthorized copying and distribution of a digital content. Intellectuals can make use of watermark to prove ownership of the work they created in case of dispute [25]. The ownership can be ascertained by extracting the embedded information from the watermarked document. In this application, Robustness is critical because the embedded watermark should not be easily removed by little transmission imperfections. Broadcast Monitoring: It is usually performed by automated monitoring stations and it is one of the watermarking applications that has found its way toward successful commercialization. Applications such as data monitoring and tracking require a higher level of robustness in order to detect or identify stored or transmitted data. Examples are automatic monitoring of radio broadcast for billing purposes or identification of images on the World Wide Web with the help of web crawlers. For such applications, the watermarks have to be easily extractable and must be reasonably robust against standard data processing like format, conversion and compression [26]. Broadcast monitoring allows the embedded information to be utilized for various functions that are related to digital media broadcasting. The embedded data can be used to verify whether proper airtime allocation occurred, for devising an automated royalty collection scheme for copyrighted material that is aired by broadcasting operators or to collect information about the number of people who listened to a certain broadcast. Transaction tracking: This consists of hidden and imperceptible information about the user which can be detected by a watermark detector hence; tracing illegal copies of a digital property when distributed is made easier. Also, licensed copies which belong to an individual user are ascertained thus resolving the possible conflicts as regards the ownership of a particular intellectual property. Identification of movie theatres where illegal recording of a movie with a handheld camera took place is a scenario that belongs to this category of application. Conclusion The paper reviews basic watermarking techniques as applied to different media types. Watermarking is an important technique that has the potential of incorporating an embedding process and preventing easy separation of watermark from content. It also has an enabling technology for a number of applications which imposes different requirements on the watermarking system. Owing to these strengths, digital watermarking is suggested as the ultimate solution to protect digital properties from piracy and copyright infringement. References [1] R.B. Wolfgang, C. I. Podilchuk, and E. J. Delp, pp [2] rd International IEEE Conference on Industrial Informatics. IEEE Xplore Press, USA, 2005, pp
5 [3] - Signal Process, Vol 51, 2003, pp [4] J. Ingermar Cox, L. Matthew Miller, and A. Jerey Bloom, Digital watermarking, Morgan Kaufmann Publishers, Inc., San Francisco, 2001 [5] S. Katzenbeisser, Hiding Techniques for Security Technology for World Wide Web, Artech House Computer Security Series, [6] G. Car, Proc of Reliable IT systems, 1995, pp [7] -fragile image Authentication IEEE International Conference on Image Processing, 2002, pp [8] N. Nicholaisdis, the Spati ol.66 No 3, 1998, pp [9] Proc. MMSP, Cannes, France, Oct. 2001, pp [10] F. In IEEE Int. Conf. Image Processing and Applications. 1995, pp [11] I. Spread Spectr IEEE Trans. Image Processing, Vol.6, 1997, pp [12] CSVT Vol.10 No 6, 2000, pp [13] of Information Techniques for Steganography and Digital Watermarking, S. C. Katzenbeisser et al., Ed. Northwood, MA: Artech House, Dec. 1999, pp [14] W. Bender, D. Gruhl, and N.Morimoto -4, 1996, pp [15] tellite Watermarking based on 2 nd International Conference on Information and Communication Techn [16] [17] Process; Special Issue on watermarking, 1997, pp [18] J. Seok, J. Hong, and J. Kim, Watermarking Algorithm for Copyright Protection of [19] S. Guan- bust Digital Image Wat line at pdf [20] L. Qiao, K. Nahrstedt, "Watermarking Schemes and Protocols For Protecting Rightful Ownership and Customer's Rights", Journal of Visual Communication and Image Representation Vol. 9, 1998, pp [21] R. Shah, A. Argawal, and S. Ganesan, "Frequency Domain Real Time Digital Watermarking", in Proc. of the IEEE 2005 Int. Conf. on Elector Info. Tech, 2005, pp [22] Telecommunication in Modern Satellite, Cable and Broadcasting Services, 2005, 7 th International Conference, Vol , pp [23] ification Techniques to Communications, IEEE Journal on Vol. 13, No 8, Oct. 1995, pp [24] M. Arn and Applications of Digital Watermarking and Content House, Boston, MA. ISBN:10: , 2003, pp [25] I. nf on Image Processing, 1996, pp [26] F. Hartung, M. Multimedia Watermarking Techniques,4 Proceeding of the IEEE, Vol. 87 No 7, 1999, pp
A Secure File Transfer based on Discrete Wavelet Transformation and Audio Watermarking Techniques
A Secure File Transfer based on Discrete Wavelet Transformation and Audio Watermarking Techniques Vineela Behara,Y Ramesh Department of Computer Science and Engineering Aditya institute of Technology and
Volume 2, Issue 12, December 2014 International Journal of Advance Research in Computer Science and Management Studies
Volume 2, Issue 12, December 2014 International Journal of Advance Research in Computer Science and Management Studies Research Article / Survey Paper / Case Study Available online at: www.ijarcsms.com
Image Authentication Scheme using Digital Signature and Digital Watermarking
www..org 59 Image Authentication Scheme using Digital Signature and Digital Watermarking Seyed Mohammad Mousavi Industrial Management Institute, Tehran, Iran Abstract Usual digital signature schemes for
Security and protection of digital images by using watermarking methods
Security and protection of digital images by using watermarking methods Andreja Samčović Faculty of Transport and Traffic Engineering University of Belgrade, Serbia Gjovik, june 2014. Digital watermarking
WATERMARKING FOR IMAGE AUTHENTICATION
WATERMARKING FOR IMAGE AUTHENTICATION Min Wu Bede Liu Department of Electrical Engineering Princeton University, Princeton, NJ 08544, USA Fax: +1-609-258-3745 {minwu, liu}@ee.princeton.edu ABSTRACT A data
Multimedia Document Authentication using On-line Signatures as Watermarks
Multimedia Document Authentication using On-line Signatures as Watermarks Anoop M Namboodiri and Anil K Jain Department of Computer Science and Engineering Michigan State University East Lansing, MI 48824
Video Authentication for H.264/AVC using Digital Signature Standard and Secure Hash Algorithm
Video Authentication for H.264/AVC using Digital Signature Standard and Secure Hash Algorithm Nandakishore Ramaswamy Qualcomm Inc 5775 Morehouse Dr, Sam Diego, CA 92122. USA [email protected] K.
Security Based Data Transfer and Privacy Storage through Watermark Detection
Security Based Data Transfer and Privacy Storage through Watermark Detection Gowtham.T 1 Pradeep Kumar.G 2 1PG Scholar, Applied Electronics, Nandha Engineering College, Anna University, Erode, India. 2Assistant
ROI Based Medical Image Watermarking with Zero Distortion and Enhanced Security
I.J. Modern Education and Computer Science, 2014, 10, 40-48 Published Online October 2014 in MECS (http://www.mecs-press.org/) DOI: 10.5815/ijmecs.2014.10.06 ROI Based Medical Image Watermarking with Zero
Keywords Android, Copyright Protection, Discrete Cosine Transform (DCT), Digital Watermarking, Discrete Wavelet Transform (DWT), YCbCr.
Volume 3, Issue 7, July 2013 ISSN: 2277 128X International Journal of Advanced Research in Computer Science and Software Engineering Research Paper Available online at: www.ijarcsse.com Web Based Novel
A comprehensive survey on various ETC techniques for secure Data transmission
A comprehensive survey on various ETC techniques for secure Data transmission Shaikh Nasreen 1, Prof. Suchita Wankhade 2 1, 2 Department of Computer Engineering 1, 2 Trinity College of Engineering and
CHAPTER 7 CONCLUSION AND FUTURE WORK
158 CHAPTER 7 CONCLUSION AND FUTURE WORK The aim of this thesis was to present robust watermarking techniques for medical image. Section 7.1, consolidates the contributions made by the researcher and Section
A Digital Audio Watermark Embedding Algorithm
Xianghong Tang, Yamei Niu, Hengli Yue, Zhongke Yin Xianghong Tang, Yamei Niu, Hengli Yue, Zhongke Yin School of Communication Engineering, Hangzhou Dianzi University, Hangzhou, Zhejiang, 3008, China [email protected],
A Robust and Lossless Information Embedding in Image Based on DCT and Scrambling Algorithms
A Robust and Lossless Information Embedding in Image Based on DCT and Scrambling Algorithms Dr. Mohammad V. Malakooti Faculty and Head of Department of Computer Engineering, Islamic Azad University, UAE
2695 P a g e. IV Semester M.Tech (DCN) SJCIT Chickballapur Karnataka India
Integrity Preservation and Privacy Protection for Digital Medical Images M.Krishna Rani Dr.S.Bhargavi IV Semester M.Tech (DCN) SJCIT Chickballapur Karnataka India Abstract- In medical treatments, the integrity
Multi-factor Authentication in Banking Sector
Multi-factor Authentication in Banking Sector Tushar Bhivgade, Mithilesh Bhusari, Ajay Kuthe, Bhavna Jiddewar,Prof. Pooja Dubey Department of Computer Science & Engineering, Rajiv Gandhi College of Engineering
Real-Time DMB Video Encryption in Recording on PMP
Real-Time DMB Video Encryption in Recording on PMP Seong-Yeon Lee and Jong-Nam Kim Dept. of Electronic Computer Telecommunication Engineering, PuKyong Nat'l Univ. [email protected], [email protected]
SECURE DATA TRANSMISSION USING DIGITAL IMAGE WATERMARKING
SECURE DATA TRANSMISSION USING DIGITAL IMAGE WATERMARKING 1 Maulik Srivastava, 2 Anuradha Sharma 1,2 Department of Computer Science & Engineering, Amity University, Uttar Pradesh Abstract: As we all know
Video-Conferencing System
Video-Conferencing System Evan Broder and C. Christoher Post Introductory Digital Systems Laboratory November 2, 2007 Abstract The goal of this project is to create a video/audio conferencing system. Video
INTERNATIONAL JOURNAL OF APPLIED ENGINEERING RESEARCH, DINDIGUL Volume 1, No 3, 2010
Lossless Medical Image Security Shrikhande Rohini 1, Vinayak Bairagi 2 1 Researcher, Electronics & Telecommunication Department, Sinhgad Academy Of Engg. 2 Assistant Professor, Electronics & Telecommunication
Reversible Data Hiding for Security Applications
Reversible Data Hiding for Security Applications Baig Firdous Sulthana, M.Tech Student (DECS), Gudlavalleru engineering college, Gudlavalleru, Krishna (District), Andhra Pradesh (state), PIN-521356 S.
Dynamic Binary Location based Multi-watermark Embedding Algorithm in DWT
Dynamic Binary Location based Multi-watermark Embedding Algorithm in DWT Ammar Jameel Hussein, Seda Yuksel, and Ersin Elbasi Abstract In order to achieve a good imperceptibility and robustness, using 4-level
Combating Anti-forensics of Jpeg Compression
IJCSI International Journal of Computer Science Issues, Vol. 9, Issue 6, No 3, November 212 ISSN (Online): 1694-814 www.ijcsi.org 454 Combating Anti-forensics of Jpeg Compression Zhenxing Qian 1, Xinpeng
AUTHORIZED WATERMARKING AND ENCRYPTION SYSTEM BASED ON WAVELET TRANSFORM FOR TELERADIOLOGY SECURITY ISSUES
AUTHORIZED WATERMARKING AND ENCRYPTION SYSTEM BASED ON WAVELET TRANSFORM FOR TELERADIOLOGY SECURITY ISSUES S.NANDHINI PG SCHOLAR NandhaEngg. College Erode, Tamilnadu, India. Dr.S.KAVITHA M.E.,Ph.d PROFESSOR
A Novel Method to Improve Resolution of Satellite Images Using DWT and Interpolation
A Novel Method to Improve Resolution of Satellite Images Using DWT and Interpolation S.VENKATA RAMANA ¹, S. NARAYANA REDDY ² M.Tech student, Department of ECE, SVU college of Engineering, Tirupati, 517502,
SOFTWARE AND HARDWARE-IN-THE-LOOP MODELING OF AN AUDIO WATERMARKING ALGORITHM. Ismael Zárate Orozco, B.E. Thesis Prepared for the Degree of
SOFTWARE AND HARDWARE-IN-THE-LOOP MODELING OF AN AUDIO WATERMARKING ALGORITHM Ismael Zárate Orozco, B.E. Thesis Prepared for the Degree of MASTER OF SCIENCE UNIVERSITY OF NORTH TEXAS December 2010 APPROVED:
Image Compression through DCT and Huffman Coding Technique
International Journal of Current Engineering and Technology E-ISSN 2277 4106, P-ISSN 2347 5161 2015 INPRESSCO, All Rights Reserved Available at http://inpressco.com/category/ijcet Research Article Rahul
STEGANOGRAPHY: TEXT FILE HIDING IN IMAGE YAW CHOON KIT CA10022
STEGANOGRAPHY: TEXT FILE HIDING IN IMAGE YAW CHOON KIT CA10022 FACULTY OF COMPUTER SYSTEM AND SOFTWARE ENGINEERING 2012/2013 1 ABSTRACT Steganography is the art or science in hiding. It is origin from
Safer data transmission using Steganography
Safer data transmission using Steganography Arul Bharathi, B.K.Akshay, M.Priy a, K.Latha Department of Computer Science and Engineering Sri Sairam Engineering College Chennai, India Email: [email protected],
Study and Implementation of Video Compression Standards (H.264/AVC and Dirac)
Project Proposal Study and Implementation of Video Compression Standards (H.264/AVC and Dirac) Sumedha Phatak-1000731131- [email protected] Objective: A study, implementation and comparison of
Invisible Image Water Marking Using Hybrid DWT Compression/Decompression Technique
Invisible Image Water Marking Using Hybrid DWT Compression/Decompression Technique B.Sai Kiran M.Tech (VLSI), CMR Institute of Technology. Mr.Shahbaz Khan Associate Professor, CMR Institute of Technology.
Bandwidth Adaptation for MPEG-4 Video Streaming over the Internet
DICTA2002: Digital Image Computing Techniques and Applications, 21--22 January 2002, Melbourne, Australia Bandwidth Adaptation for MPEG-4 Video Streaming over the Internet K. Ramkishor James. P. Mammen
Robust Blind Watermarking Mechanism For Point Sampled Geometry
Robust Blind Watermarking Mechanism For Point Sampled Geometry Parag Agarwal Balakrishnan Prabhakaran Department of Computer Science, University of Texas at Dallas MS EC 31, PO Box 830688, Richardson,
MPEG Unified Speech and Audio Coding Enabling Efficient Coding of both Speech and Music
ISO/IEC MPEG USAC Unified Speech and Audio Coding MPEG Unified Speech and Audio Coding Enabling Efficient Coding of both Speech and Music The standardization of MPEG USAC in ISO/IEC is now in its final
International Journal of Emerging Technology and Advanced Engineering Website: www.ijetae.com (ISSN 2250-2459, Volume 2, Issue 9, September 2012)
Authentication of Medical Images using Integer Transforms A.Kannammal 1, Dr.S.Subha Rani 2 1 Assistant professor, 2 Professor and Head, ECE Department, PSG College of Technology, Peelamedu, Coimbatore
AN ENHANCED MECHANISM FOR SECURE DATA TRANSMISSION USING STEGANOGRAPHY MERGED WITH VISUAL CRYPTOGRAPHY
AN ENHANCED MECHANISM FOR SECURE DATA TRANSMISSION USING STEGANOGRAPHY MERGED WITH VISUAL CRYPTOGRAPHY Chandan Mohapatra 1, Manajusha Pandey 2 1 PG Student in Computer Science Dept., KIIT University, Bhubaneswar,
Audio Coding Algorithm for One-Segment Broadcasting
Audio Coding Algorithm for One-Segment Broadcasting V Masanao Suzuki V Yasuji Ota V Takashi Itoh (Manuscript received November 29, 2007) With the recent progress in coding technologies, a more efficient
Introduction to Medical Image Compression Using Wavelet Transform
National Taiwan University Graduate Institute of Communication Engineering Time Frequency Analysis and Wavelet Transform Term Paper Introduction to Medical Image Compression Using Wavelet Transform 李 自
Experimental DRM Architecture Using Watermarking and PKI
Experimental DRM Architecture Using Watermarking and PKI Mikko Löytynoja, Tapio Seppänen, Nedeljko Cvejic MediaTeam Oulu Information Processing Laboratory University of Oulu, Finland {mikko.loytynoja,
Audio synthesis: MIDI Digital Audio Coding/Compression. Today: Intellectual property management for digital media. What is Digital Watermarking?
ENEE408G Lecture-9 Last Lecture Digital Watermarking and Fingerprinting for Digital Rights Protection of Multimedia URL: http://www.ece.umd.edu/class/enee408g/ Slides included here are based on Spring
A PHOTOGRAMMETRIC APPRAOCH FOR AUTOMATIC TRAFFIC ASSESSMENT USING CONVENTIONAL CCTV CAMERA
A PHOTOGRAMMETRIC APPRAOCH FOR AUTOMATIC TRAFFIC ASSESSMENT USING CONVENTIONAL CCTV CAMERA N. Zarrinpanjeh a, F. Dadrassjavan b, H. Fattahi c * a Islamic Azad University of Qazvin - [email protected]
White paper. H.264 video compression standard. New possibilities within video surveillance.
White paper H.264 video compression standard. New possibilities within video surveillance. Table of contents 1. Introduction 3 2. Development of H.264 3 3. How video compression works 4 4. H.264 profiles
Figure 1: Relation between codec, data containers and compression algorithms.
Video Compression Djordje Mitrovic University of Edinburgh This document deals with the issues of video compression. The algorithm, which is used by the MPEG standards, will be elucidated upon in order
Turgut Ozal University. Computer Engineering Department. TR-06010 Ankara, Turkey
Dr. YILDIRAY YALMAN Associate Professor CONTACT INFORMATION Turgut Ozal University Computer Engineering Department TR-06010 Ankara, Turkey Phone: +90 (0)312-5515437 E-mail: [email protected] RESEARCH
Efficient Data Recovery scheme in PTS-Based OFDM systems with MATRIX Formulation
Efficient Data Recovery scheme in PTS-Based OFDM systems with MATRIX Formulation Sunil Karthick.M PG Scholar Department of ECE Kongu Engineering College Perundurau-638052 Venkatachalam.S Assistant Professor
MODULATION Systems (part 1)
Technologies and Services on Digital Broadcasting (8) MODULATION Systems (part ) "Technologies and Services of Digital Broadcasting" (in Japanese, ISBN4-339-62-2) is published by CORONA publishing co.,
WHITE PAPER MANAGING VALUABLE IMAGE ASSETS USING DIGITAL WATERMARKING FOR COPYRIGHT COMMUNICATION AND IMAGE SEARCH INTRODUCTION
www.digitalwatermarkingalliance.org WHITE PAPER MANAGING VALUABLE IMAGE ASSETS USING DIGITAL WATERMARKING FOR COPYRIGHT COMMUNICATION AND IMAGE SEARCH INTRODUCTION Consider where you encounter digital
Technical aspects of Digital Rights Management
Technical aspects of Digital Rights Management Emilija Arsenova MI, RWTH-Aachen Table of content 1 Introduction... 3 2 Digital Rights Management (DRM)... 3 2.1 DRM Architecture...4 2.2 DRM Techniques...5
Using fractal compression scheme to embed a digital signature into an image
Using fractal compression scheme to embed a digital signature into an image Joan Puate, Fred Jordan Swiss federal institute of technology Signal Processing Laboratory CH-1015 Lausanne Switzerland Email:
Real-Time Audio Watermarking Based on Characteristics of PCM in Digital Instrument
Journal of Information Hiding and Multimedia Signal Processing 21 ISSN 273-4212 Ubiquitous International Volume 1, Number 2, April 21 Real-Time Audio Watermarking Based on Characteristics of PCM in Digital
PIXEL-LEVEL IMAGE FUSION USING BROVEY TRANSFORME AND WAVELET TRANSFORM
PIXEL-LEVEL IMAGE FUSION USING BROVEY TRANSFORME AND WAVELET TRANSFORM Rohan Ashok Mandhare 1, Pragati Upadhyay 2,Sudha Gupta 3 ME Student, K.J.SOMIYA College of Engineering, Vidyavihar, Mumbai, Maharashtra,
Secret Communication through Web Pages Using Special Space Codes in HTML Files
International Journal of Applied Science and Engineering 2008. 6, 2: 141-149 Secret Communication through Web Pages Using Special Space Codes in HTML Files I-Shi Lee a, c and Wen-Hsiang Tsai a, b, * a
A Secure Data Transmission By Integrating Cryptography And Video Steganography
A Secure Data Transmission By Integrating Cryptography And Video Steganography Shafna P K Computer Science Department KMEA Engineering College Ernakulam, India [email protected] Abstract Advances
How To Test Video Quality With Real Time Monitor
White Paper Real Time Monitoring Explained Video Clarity, Inc. 1566 La Pradera Dr Campbell, CA 95008 www.videoclarity.com 408-379-6952 Version 1.0 A Video Clarity White Paper page 1 of 7 Real Time Monitor
Alaa Alhamami, Avan Sabah Hamdi Amman Arab University Amman, Jordan
World of Computer Science and Information Technology Journal (WCSIT) ISSN: 2221-0741 Vol. 5, No. 5, 87-91, 2015 Mobile Secure Transmission Method Based on Audio Steganography Alaa Alhamami, Avan Sabah
Sachin Patel HOD I.T Department PCST, Indore, India. Parth Bhatt I.T Department, PCST, Indore, India. Ankit Shah CSE Department, KITE, Jaipur, India
Image Enhancement Using Various Interpolation Methods Parth Bhatt I.T Department, PCST, Indore, India Ankit Shah CSE Department, KITE, Jaipur, India Sachin Patel HOD I.T Department PCST, Indore, India
How To Fix Out Of Focus And Blur Images With A Dynamic Template Matching Algorithm
IJSTE - International Journal of Science Technology & Engineering Volume 1 Issue 10 April 2015 ISSN (online): 2349-784X Image Estimation Algorithm for Out of Focus and Blur Images to Retrieve the Barcode
Assessment of Camera Phone Distortion and Implications for Watermarking
Assessment of Camera Phone Distortion and Implications for Watermarking Aparna Gurijala, Alastair Reed and Eric Evans Digimarc Corporation, 9405 SW Gemini Drive, Beaverton, OR 97008, USA 1. INTRODUCTION
Multimodal Biometric Recognition Security System
Multimodal Biometric Recognition Security System Anju.M.I, G.Sheeba, G.Sivakami, Monica.J, Savithri.M Department of ECE, New Prince Shri Bhavani College of Engg. & Tech., Chennai, India ABSTRACT: Security
SteganographyinaVideoConferencingSystem? AndreasWestfeld1andGrittaWolf2 2InstituteforOperatingSystems,DatabasesandComputerNetworks 1InstituteforTheoreticalComputerScience DresdenUniversityofTechnology
4 Digital Video Signal According to ITU-BT.R.601 (CCIR 601) 43
Table of Contents 1 Introduction 1 2 Analog Television 7 3 The MPEG Data Stream 11 3.1 The Packetized Elementary Stream (PES) 13 3.2 The MPEG-2 Transport Stream Packet.. 17 3.3 Information for the Receiver
Friendly Medical Image Sharing Scheme
Journal of Information Hiding and Multimedia Signal Processing 2014 ISSN 2073-4212 Ubiquitous International Volume 5, Number 3, July 2014 Frily Medical Image Sharing Scheme Hao-Kuan Tso Department of Computer
Digimarc for Images. Best Practices Guide (Chroma + Classic Edition)
Digimarc for Images Best Practices Guide (Chroma + Classic Edition) Best Practices Guide (Chroma + Classic Edition) Why should you digitally watermark your images? 3 What types of images can be digitally
ARTICLE. 10 reasons to switch to IP-based video
ARTICLE 10 reasons to switch to IP-based video Table of contents 1. High resolution 3 2. Easy to install 4 3. Truly digital 5 4. Camera intelligence 5 5. Fully integrated 7 6. Built-in security 7 7. Crystal-clear
Detection and Restoration of Vertical Non-linear Scratches in Digitized Film Sequences
Detection and Restoration of Vertical Non-linear Scratches in Digitized Film Sequences Byoung-moon You 1, Kyung-tack Jung 2, Sang-kook Kim 2, and Doo-sung Hwang 3 1 L&Y Vision Technologies, Inc., Daejeon,
Architecture of distributed network processors: specifics of application in information security systems
Architecture of distributed network processors: specifics of application in information security systems V.Zaborovsky, Politechnical University, Sait-Petersburg, Russia [email protected] 1. Introduction Modern
CDMA TECHNOLOGY. Brief Working of CDMA
CDMA TECHNOLOGY History of CDMA The Cellular Challenge The world's first cellular networks were introduced in the early 1980s, using analog radio transmission technologies such as AMPS (Advanced Mobile
Classes of multimedia Applications
Classes of multimedia Applications Streaming Stored Audio and Video Streaming Live Audio and Video Real-Time Interactive Audio and Video Others Class: Streaming Stored Audio and Video The multimedia content
International Archives of the Photogrammetry, Remote Sensing and Spatial Information Sciences, Vol. XXXIV-5/W10
Accurate 3D information extraction from large-scale data compressed image and the study of the optimum stereo imaging method Riichi NAGURA *, * Kanagawa Institute of Technology [email protected]
Broadband Networks. Prof. Dr. Abhay Karandikar. Electrical Engineering Department. Indian Institute of Technology, Bombay. Lecture - 29.
Broadband Networks Prof. Dr. Abhay Karandikar Electrical Engineering Department Indian Institute of Technology, Bombay Lecture - 29 Voice over IP So, today we will discuss about voice over IP and internet
Voice---is analog in character and moves in the form of waves. 3-important wave-characteristics:
Voice Transmission --Basic Concepts-- Voice---is analog in character and moves in the form of waves. 3-important wave-characteristics: Amplitude Frequency Phase Voice Digitization in the POTS Traditional
Enhancing Data Security in Medical Information System Using the Watermarking Techniques and Oracle SecureFile LOBs
Enhancing Data Security in Medical Information System Using the Watermarking Techniques and Oracle SecureFile LOBs Said Aminzou 1, Brahim ER-RAHA 2, Youness Idrissi Khamlichi 3, Mustapha Machkour 4, Karim
How To Recognize Voice Over Ip On Pc Or Mac Or Ip On A Pc Or Ip (Ip) On A Microsoft Computer Or Ip Computer On A Mac Or Mac (Ip Or Ip) On An Ip Computer Or Mac Computer On An Mp3
Recognizing Voice Over IP: A Robust Front-End for Speech Recognition on the World Wide Web. By C.Moreno, A. Antolin and F.Diaz-de-Maria. Summary By Maheshwar Jayaraman 1 1. Introduction Voice Over IP is
How to Send Video Images Through Internet
Transmitting Video Images in XML Web Service Francisco Prieto, Antonio J. Sierra, María Carrión García Departamento de Ingeniería de Sistemas y Automática Área de Ingeniería Telemática Escuela Superior
SURVEY ON INFORMATION HIDING TECHNIQUES USING QR BARCODE
SURVEY ON INFORMATION HIDING TECHNIQUES USING QR BARCODE Manoj S. Rewatkar 1 and Shital A. Raut 2 1,2 Department of Computer Science and Engineering, Visvesvaraya National Institute of Technology, Nagpur,
Introduction to image coding
Introduction to image coding Image coding aims at reducing amount of data required for image representation, storage or transmission. This is achieved by removing redundant data from an image, i.e. by
A HIGH PERFORMANCE SOFTWARE IMPLEMENTATION OF MPEG AUDIO ENCODER. Figure 1. Basic structure of an encoder.
A HIGH PERFORMANCE SOFTWARE IMPLEMENTATION OF MPEG AUDIO ENCODER Manoj Kumar 1 Mohammad Zubair 1 1 IBM T.J. Watson Research Center, Yorktown Hgts, NY, USA ABSTRACT The MPEG/Audio is a standard for both
DTS Enhance : Smart EQ and Bandwidth Extension Brings Audio to Life
DTS Enhance : Smart EQ and Bandwidth Extension Brings Audio to Life White Paper Document No. 9302K05100 Revision A Effective Date: May 2011 DTS, Inc. 5220 Las Virgenes Road Calabasas, CA 91302 USA www.dts.com
HSI BASED COLOUR IMAGE EQUALIZATION USING ITERATIVE n th ROOT AND n th POWER
HSI BASED COLOUR IMAGE EQUALIZATION USING ITERATIVE n th ROOT AND n th POWER Gholamreza Anbarjafari icv Group, IMS Lab, Institute of Technology, University of Tartu, Tartu 50411, Estonia [email protected]
7 Network Security. 7.1 Introduction 7.2 Improving the Security 7.3 Internet Security Framework. 7.5 Absolute Security?
7 Network Security 7.1 Introduction 7.2 Improving the Security 7.3 Internet Security Framework 7.4 Firewalls 7.5 Absolute Security? 7.1 Introduction Security of Communications data transport e.g. risk
Study and Implementation of Video Compression standards (H.264/AVC, Dirac)
Study and Implementation of Video Compression standards (H.264/AVC, Dirac) EE 5359-Multimedia Processing- Spring 2012 Dr. K.R Rao By: Sumedha Phatak(1000731131) Objective A study, implementation and comparison
A Concept of Digital Picture Envelope for Internet Communication
A Concept of Digital Picture Envelope for Internet Communication Eiji Kawaguchi, Koichi Nozaki, Michiharu Niimi, Hideki Noda and Richard O. Eason Kyushu Institute of Technology 1-1 Sensui-cho, Tobata,
A Survey of Video Processing with Field Programmable Gate Arrays (FGPA)
A Survey of Video Processing with Field Programmable Gate Arrays (FGPA) Heather Garnell Abstract This paper is a high-level, survey of recent developments in the area of video processing using reconfigurable
