HIGH-QUALITY FREQUENCY DOMAIN-BASED AUDIO WATERMARKING. Eric Humphrey. School of Music Engineering Technology University of Miami

Size: px
Start display at page:

Download "HIGH-QUALITY FREQUENCY DOMAIN-BASED AUDIO WATERMARKING. Eric Humphrey. School of Music Engineering Technology University of Miami"

Transcription

1 HIGH-QUALITY FREQUENCY DOMAIN-BASED AUDIO WATERMARKING Eric Humphrey School of Music Engineering Technology University of Miami ABSTRACT An investigation of current audio watermarking technology is provided, from which a system is selected and implemented. In the algorithm presented, watermark embedding and detection are based in the frequency domain, achieved through the modification and subsequent crosscorrelation of the Fourier coefficients, respectively. The system is prototyped and implemented in both MATLAB and C ++ environments, and the performances of both systems are verified for accuracy and consistency. Particular emphasis is given to the translation of the algorithm from prototype to production implementation. Brief analysis of post-embedding audio quality and detection robustness to perceptual audio coders is also given. Index Terms Digital audio watermarking, copyright protection, data hiding 1. INTRODUCTION In short, the proliferation of digital technologies has led to the ubiquity of digital media. While the benefits of this sea change are staggering as they are innumerable, it has not come about without technological growing pains, being namely distribution and reproduction control. One of the foremost reasons for the rise of the digital age (the ease with which one can transfer information) has simultaneously become one of the greatest issues facing technology and the adoption of it by reluctant parties (the ease with which one can transfer information illegally). Brought to light by the Napster court case at the turn of the century, digital piracy is easy, and as a result of other communications advances, it is also getting faster, more efficient, and even easier. Digital watermarking provides the prospect of a solution to the distribution and reproduction issue for electronic multimedia, and while watermarking methods are generally equivalent across media formats, digital audio is considered here. Conceptually, watermarking strives to embed data that is inseparable from the media itself, and actually doing so would require the degradation of the medium s perceptual quality below some acceptable limit. Beyond copyright protection, there are further applications for audio watermarking, including use-enhancement and broadcast monitoring. The benchmark of a good watermarking scheme is that it must be imperceptible to the end-user, while robust enough to survive a variety of potential removal efforts (intentional or otherwise). A great deal of effort has been spent on the development of such a watermarking scheme, and there now exist a variety of implementation methods. Regardless of the specific watermarking approach, all schemes exhibit the same properties and trade-offs, stated succinctly in [07]: Audio Quality the allowable level of audio fidelity degradation, Robustness the ability with which a watermark survives un/intentional signal modification, Security the ability with which a watermark survives watermark tampering, Complexity the computational power necessary to embed/detect data, Data Capacity the amount of data per processed frame (payload), Granularity the amount of discrete time samples necessary to recover the watermark. As often noted in watermarking literature, these properties are conflicting and in direct competition with each other, highlighting the difficulty in obtaining a high quality watermarking system. There are several approaches to achieving this collection of properties. Watermarking schemes can generally be divided into two classes, based on the domain in which the watermark is generated and embedded (time vs. frequency). Temporal watermarking schemes are typically less expensive computationally than frequency-based methods, but generally yield poorer results. These systems often employ additive pseudo-random noise modulated by the time envelope of the audio waveform. An alternative time-based scheme, referred to as echo coding, places cropped, delayed versions of the signal back into the waveform, exploiting the Haas precedence effect. In the frequency domain, either Fourier phase or magnitude components are modified directly by some operation (summation, multiplication). Processing frequency information also allows for the exploitation of masking properties in the Human Auditory System, though this may present problems with regard to robustness against compression algorithms (codecs) employing psychoacoustic models (mp3, AAC, etc). Conceptually, watermarking is based on the idea that there may is information in an audio signal that is

2 perceptually unimportant, and attempts to hide data as such imperceptible information. Simultaneously, the ideal psychoacoustic-based compression algorithm aims to remove all perceptually redundant or unnecessary information, and would thereby remove a watermark perfectly. Some published methods have proven more robust to these audio compression algorithms, and are significantly more attractive options to further develop. With that in mind, a comparable watermarking algorithm is presented, fundamentally derived from the work of van der Veen et al [07]. 2. PROPOSED SYSTEM A watermarking system is developed based on the algorithm presented in [07]. However, in the course of implementing the system, adjustments were deemed necessary and are outlined below Watermark Embedding Initially, a normally distributed pseudorandom sequence with zero mean and unity standard deviation is generated by seeding a random number generator with some key, shown by (1), with length N/2. This key must be known beforehand by the watermark embedding/detection pair to allow for the recreation of the same watermark at the decoder. Cyclically shifting the PN sequence,, produces the data-dependent sequence,, where each shift corresponds to a different payload symbol (log 2 (N/2) bits per frame). 2ln 1 _ cos 2 (1) _ The audio signal is segmented into non-overlapping frames of length N, and the Fourier transform is computed. To maintain a real-valued inverse Fourier transform, only the first N/2 coefficients of are considered, as the magnitude spectra is even-symmetric about the DC frequency bin. The magnitudes are then multiplied by the final watermark sequence as (2) where m represents the frame number, is the range of the watermark, and is the mean (or offset). Changing the parameters and change the standard deviation and mean of the sequence, respectively, where the mean should be shifted approximately unity and the sequence range should be kept relatively small. Watermarked audio is achieved by computing the inverse Fourier transform for each complex-valued sequence,, and recombined in the time domain. The strength parameter is then directly tied to the robustness, as well the level of perceptibility, of the watermarked audio. A small and =1 are expected to produce a nearly identical signal in the time domain to the original audio. In particular, close attention must be given to the output watermark-embedded audio, so that no clipping occurs to the signal. This system deviates from the algorithm proposed in [07] by performing the summation from (2) in the frequency rather than the time domain after taking the inverse transform. Offsetting the normally distributed sequence about 1 prior to weighting the spectral coefficients ensures that phase values are unaffected. A watermark with zero mean will cause phase discontinuities in adjacent bins by flipping phase (φ±180 ) due to changes in sign Watermark Detection As outlined in [07], watermark detection is also performed in the frequency domain as the cross-correlation between the recreated watermark sequence,, and the Fourier coefficient magnitudes. Assuming synchronization, which will be discussed later, the audio signal,, is segmented into frames of length N (similar to the embedding process) and the Fourier coefficients are computed, given by. The algorithm in [07] recommends employing an accumulation buffer of L frames to average the spectral information in time, thus increasing the signal-to-noise ratio (SNR). This method, however, does not prove useful in the event that each frame may contain a different payload. As averaging is not essential to the detection process, it is not implemented in this system. Cross-correlation can be efficiently computed for the two sequences by taking the product of the N/2 length discrete Fourier transform representations of each sequence after computing the natural logarithm, given below as, ln (3) ln (4) (5) Taking the natural logarithm in (3) and (4) aims to separate the product that forms the spectral envelope of the watermarked waveform, generated by (2), and is conceptually equivalent to homomorphic filtering in image processing. A simple exercise in expanding the natural logarithm of (2) shows this, where the contribution to the correlation measure is roughly a DC offset. The cross-correlation vector is computed per frame, and must be processed to produce consistent results, defined in (6) and shown in Figure 1. Data detection is defined by the coordinate [peak, index], the max of, where the value peak corresponds to the detection reliability, or confidence level, and index, the actual payload. Note that and denote the mean and the standard deviation of C, respectively. In the case that there

3 is no watermark, the peak would, and should, not breach a set threshold. the embedded data rate is defined as log, so the data capacity decreases exponentially with the increase of. It is therefore desirable to find a compromise between a somewhat large and a small, rather than the inverse, to yield worthwhile channel capacity and imperceptibility. The selection of a threshold for the confidence level in the detection process is desirable, but less important, to the operation of the system. Even as a worst case scenario, the detector could simply return the data corresponding to the maximum of the cross-correlation, or monitor the level of the peaks detected (indirect thresholding). This peak monitor could operate either as an average value function, or tally peaks that exceed a threshold, while keeping the peak values regardless. A lowvalued peak monitor implies no (or an incorrect) watermark, while a high value conveys watermark detection. 3. IMPLEMENTATION: REACTIONS & RESULTS Figure 1 - Normalized cross-correlation for a single frame of audio (top) and its derivative (bottom). (6) The peak of can be further accentuated, providing better detection results, by filtering the vector (i.e. computing a low order derivative) and finding the area of greatest change. Statistically, the presence of a watermark will produce such a large spike in the contour of that its value is a local maximum exhibiting inflection points on both sides of the peak Parameter Selection The functionality of the system outlined depends heavily on the selection of,, and. The offset of the normally distributed watermark,, should be slightly less than 1 to maintain approximately the same signal energy of the original signal. It is for this reason the system requires a normally, and not uniformly, distributed pseudorandom sequence. Audibility and strength of the watermark are directly linked by the trade-off between and. Larger values of or will increase the confidence level in the detector, constrained by (the watermark sequence should never be negative). However, these large values will also increase the audibility of the watermark. Additionally, Given the laundry list of initial difficulties faced in the development of a functioning system based on the algorithm outlined, the fact that the system works, regardless of perceptual quality, is admittedly surprising. It is even more impressive, then, that the algorithm developed sounds exceedingly good, in addition to producing high confidence values for rather high data rates. Before delving into performance data and discussion, some realizations precipitating from the development process should be noted. Most importantly, Fourier coefficient magnitudes must maintain even symmetry and the zero and Nyquist bins must remain purely real to produce a real-valued inverse transform. This constraint results in a watermark sequence that is half the length of the frame size. Separate from the watermark embedding/detection system itself, data synchronization needs to be employed in some facet within the system. This is particularly necessary in the case that a signal has been cropped/zero padded, and the first sample of the audio to the detector does not correspond to the first sample of a frame. Technically, assuming no other data alteration has occurred, this would merely result in frame sharing, as the watermark information is spread across the length of the initial frame. As a worst case, where the signal is padded/cropped by half the frame size, each detection frame would produce a confidence value corresponding to the data in the two adjacent frames at half the strength of an otherwise synchronized detection. Clearly, synchronization can be easily achieved through redundancy in the embedding stage at the cost of halving the data capacity, i.e. by embedding payload symbols in pairs of adjacent frames. At this point, the problem is a data management one, and beyond the scope of this project.

4 Figure 2 - Multi-frame Normalized Cross-correlation measure for (left to right) Watermark present, Alternate Watermark Present, and no Watermark Present Clipping, and signal normalization on a whole, is of notable interest, especially in the case the system is deployed in production. Modifying the spectral coefficients will change the signal energy, and stands to produce a timedomain signal beyond the range of [-1, 1]. Scaling is the most obvious solution, but by no means the most desirable one. Watermark detection will not be affected, but the output audio will unavoidably be quieter, a non-ideal result given the aim of a perceptually indistinguishable watermarked signal Algorithm Performance The system was originally implemented with an unnecessarily large frame size to encourage detection, but found to maintain perfect detection for a data rate of 237bps (N=2048). Watermarked audio was found to produce confidence values regularly exceeding a cross-correlation score of 6, while non- or alternate-sequence watermarked audio seldom produces cross-correlation scores over 4. A threshold for data detection can optimally be selected in this region, depending on the application, selectivity, and how the threshold will be employed. The multi-frame crosscorrelation results are shown for the three scenarios mentioned above in Figure 2. Independently, the watermarked audio is perceptually indistinguishable from the original audio. Tests and figures were initially computed with the values of.75,.95, and , which maintains a data rate of approximately 35bps. At that rate, a 128-byte message requires slightly under 30 seconds for extraction. Given the values of and, it is expected that scaling will be necessary, causing the only perceptible difference between the original and watermarked versions of the audio. Limits were found to exist for.2,.8, and 2048, allowing extremely reliable detection and perceptually equivalent audio Programming Environment Translation After the successful completion of a system prototype in MATLAB, facilitated by a built-in functions and GUI verification tools, a production implementation was developed in C ++. This process required locating and including external libraries to allow Fourier transform computations and reading/writing to.wav files. The system presented employs the KissFFT and libsndfile libraries to complete these tasks. As is good practice in programming, both libraries were instantiated separately and compared with MATLAB results to verify proper functionality. While a good majority of the prototype system mapped directly to the production environment, a few instances in translation proved troublesome. A normal distribution function was written, returning a value in the set [-1 1], since the random number function native to C ++ produces uniformly distributed integers. In order to normalize the cross-correlation result, a standard deviation formula also needed to be obtained and implemented. Complex conjugate multiplication also needed to be translated, which, admittedly, was initially overlooked for its intricacies, and not computed correctly. This type of error highlights the required level of detail for even simple operations that may be taken for granted Verification The benchmark for a confirming the transition from one environment to another is to directly compare the outputs of both systems. In this case, the dual-sided nature of the system, embedding and detecting, produces two quantifiable outputs. As shown in Figure 3, the errors between the watermark embedding systems (output audio) and detection systems (correlation matrix) are accountable to the accumulation of machine precision errors. The embedded audio differs by a mean absolute error of , while the more computationally intensive correlation matrix has a mean absolute error of Taking the base- 2 logarithm of each mean absolute error shows that the audio is, on average, equal through over 16 bits of precision (exceeding the original audio quality), and the correlation matrix is equal through over 11 bits.

5 For testing, a 135-second watermarked.wav file is encoded as an.mp3 file according to the bitrates stated in Table 1. The four files are then converted back into.wav files and parsed to the watermark detection process. Detection is measured as both the percentage of peaks corresponding to the correct shift (i.e. the peak correlation index per frame is the intended data) and the average peak value. Partial detection matrices are shown in Figure 4 for the various formats. 5. CONCLUSIONS Figure 3 - MATLAB and C++ System Performance Differences for embedded audio (top) and detection matrix (bottom) 4. TESTING Without exception, the most commercially viable application for a good audio watermarking system is copyright protection and management, given the ease with which files can be distributed electronically. So far, all work and testing has been conducted with CD-quality audio (44.1kHz, 16-bit). Unfortunately, digital audio rarely exchanges hands in this format due to enormous file sizes (upwards of 600MB for an album), but rather as files that have been compressed using a variety of psychoacousticbased lossy compression algorithms. Therefore, above most everything else, a quantifiably good watermarking system should still survive in reasonably compressed audio. The qualifier reasonably comes from the fact that, beyond a certain point of compression, the audio will not sound good (i.e. has been effectively destroyed), and a watermark has no reason to survive beyond this limit (though, if it did, that would be an impressive watermarking algorithm). Table 1: Detection Performance for Various Audio Formats Format Detection Ratio Average Peak.wav (uncompressed) mp3-320kbps mp3-192kbps mp3-128kbps mp3-96kbps wav (no watermark) A frequency-domain watermarking system is implemented in two programming environments, verified for accuracy, and tested for performance. Slight modifications were made to the initial algorithm design, and both the auditory and mathematical results far exceed expectations. It was verified that the two systems are significantly equivalent, particularly the audio output of the watermark embedding process. The rather small discrepancies between resulting detection matrices likely arise from a combination of factors, mainly error accumulation, and possibly the use of different Fourier transform libraries. The algorithm s performance after mp3 encoding conveys a great deal of information about the watermarking system itself. An initial observation is that even for a bitrate typically deemed perceptually indistinguishable from highfidelity audio (320kbps), the watermark suffers significantly. However, performance, and, of most importance, the confidence peak values, do not diminish much farther for lower bitrates. As Figure 4 shows, there are still many areas in the detection matrices where the watermark survives, even for the different compression ratings. The reason that performance deteriorates so much develops from parts of the song which are spectrally vacant (intros and interludes, for example). For this style of watermark to be detected, the audio must be very active though at least a good majority of the spectra. In the cases that it is not, a perceptual audio coder will readily disregard all inaudible frequency information that was holding parts of the watermark sequence. It is conceivable that the performance of this algorithm could be greatly enhanced by, for a given frame length, analyzing the spectral activity and embedding the watermark sequence only in the most active spectral region (for example, the watermark embedding process could find a N/8 th length window with the most spectral energy, and only apply the watermark there). Regardless, the watermark system does survive in some detectable capacity despite perceptual coding, and based on the application and its data throughput demands, this system could conceivably be satisfactory. As will be stated shortly, there is still work to be conducted with this style of watermarking system, but with the ease and quality a system like this can be developed, it seems inevitable that some universal audio watermarking algorithm will be developed.

6 5.1. Future Work Numerous instances in this paper state steps that could be taken to further the algorithm presented. Achieving imperceptibility does not seem to be an issue with any of the simple listening tests conducted over a small sampling of audio. Future work would likely focus on achieving more consistent watermark detection and data extraction. Experimentation may yield ideal parameters that, in turn, directly yield better detection results. Filtering, and in particular low order derivatives, may also prove beneficial in enhancing peaks in the detection matrix. As mentioned, some form of data synchronization needs to be implemented in the ideal watermarking system. This would allow for other forms of signal corruption to be tested, such as analog/air transmission, time-variation, cropping/padding, filtering, or any combination of that mentioned. Also, performance against other audio coders should be considered, but were not available at the time. 6. REFERENCES [01] Neubauer, Christian et al. A Compatible Family of Bitstream Watermarking Schemes for MPEG-Audio. Journal of the Audio Engineering Society, presented at the 110 th Convention (Paper 5356). May [02] Garcia, Ricardo. Digital Watermarking of Audio Signals Using a Psychoacoustic Auditory Model and Spread Spectrum Theory. Journal of the Audio Engineering Society, presented at the 107 th Convention (Paper 5073), September [03] Lemma et al. A Temporal Domain Audio Watermarking Technique. IEEE Transactions on Signal Processing. Vol. 51 No. 4, April [04] Oh et al. Imperceptible Echo for Robust Audio Watermarking. Journal of the AES, presented at the 113 th Convention (Paper 5644), October [05] Esmaili et al. A Novel Spread Spectrum Audio Watermarking Scheme Based on Time-Frequency characteristics. Canadian Conference on Electrical and Computer Engineering, May [06] Jackson, Tim et al. Watermarking and Copy Protection by Information Hiding in Soundtracks. AES 25 th International Conference, London UK, June [07] van der Veen, Michiel et al. Robust, Multi-functional and High-quality Audio Watermarking Technology. Journal of the AES. Presented at the 110 th Convention (Paper 5345), May [08] Bassia et al. Robust Audio Watermarking in the Time Domain. IEEE Transaction on Multimedia, Vol. 3, No. 2, June [09] Malvar et al. Improved Spread Spectrum: A New Modulation Technique for Robust Watermarking. IEEE Transactions on Signal Processing, Vol. 51, No. 4, April [10] Swanson et al. Robust Audio Watermarking Using Perceptual Masking. Signal Processing, V.66 No.3, p , May Available Online. [11] Gomes et al. Cyclostationarity-based Audio Watermarking with Private and Public Hidden Data. Journal of the AES, Presented at the 109 th Convention (Paper 5258), Los Angeles, CA, September Figure 4 - Detection Matrices for Perceptually Coded Audio (from top left, counterclockwise), 320kbps, 192kbps, 96kbps, and 128 kbps.

A Secure File Transfer based on Discrete Wavelet Transformation and Audio Watermarking Techniques

A Secure File Transfer based on Discrete Wavelet Transformation and Audio Watermarking Techniques A Secure File Transfer based on Discrete Wavelet Transformation and Audio Watermarking Techniques Vineela Behara,Y Ramesh Department of Computer Science and Engineering Aditya institute of Technology and

More information

A Digital Audio Watermark Embedding Algorithm

A Digital Audio Watermark Embedding Algorithm Xianghong Tang, Yamei Niu, Hengli Yue, Zhongke Yin Xianghong Tang, Yamei Niu, Hengli Yue, Zhongke Yin School of Communication Engineering, Hangzhou Dianzi University, Hangzhou, Zhejiang, 3008, China tangxh@hziee.edu.cn,

More information

Broadband Networks. Prof. Dr. Abhay Karandikar. Electrical Engineering Department. Indian Institute of Technology, Bombay. Lecture - 29.

Broadband Networks. Prof. Dr. Abhay Karandikar. Electrical Engineering Department. Indian Institute of Technology, Bombay. Lecture - 29. Broadband Networks Prof. Dr. Abhay Karandikar Electrical Engineering Department Indian Institute of Technology, Bombay Lecture - 29 Voice over IP So, today we will discuss about voice over IP and internet

More information

TCOM 370 NOTES 99-4 BANDWIDTH, FREQUENCY RESPONSE, AND CAPACITY OF COMMUNICATION LINKS

TCOM 370 NOTES 99-4 BANDWIDTH, FREQUENCY RESPONSE, AND CAPACITY OF COMMUNICATION LINKS TCOM 370 NOTES 99-4 BANDWIDTH, FREQUENCY RESPONSE, AND CAPACITY OF COMMUNICATION LINKS 1. Bandwidth: The bandwidth of a communication link, or in general any system, was loosely defined as the width of

More information

STUDY OF MUTUAL INFORMATION IN PERCEPTUAL CODING WITH APPLICATION FOR LOW BIT-RATE COMPRESSION

STUDY OF MUTUAL INFORMATION IN PERCEPTUAL CODING WITH APPLICATION FOR LOW BIT-RATE COMPRESSION STUDY OF MUTUAL INFORMATION IN PERCEPTUAL CODING WITH APPLICATION FOR LOW BIT-RATE COMPRESSION Adiel Ben-Shalom, Michael Werman School of Computer Science Hebrew University Jerusalem, Israel. {chopin,werman}@cs.huji.ac.il

More information

2695 P a g e. IV Semester M.Tech (DCN) SJCIT Chickballapur Karnataka India

2695 P a g e. IV Semester M.Tech (DCN) SJCIT Chickballapur Karnataka India Integrity Preservation and Privacy Protection for Digital Medical Images M.Krishna Rani Dr.S.Bhargavi IV Semester M.Tech (DCN) SJCIT Chickballapur Karnataka India Abstract- In medical treatments, the integrity

More information

SOFTWARE AND HARDWARE-IN-THE-LOOP MODELING OF AN AUDIO WATERMARKING ALGORITHM. Ismael Zárate Orozco, B.E. Thesis Prepared for the Degree of

SOFTWARE AND HARDWARE-IN-THE-LOOP MODELING OF AN AUDIO WATERMARKING ALGORITHM. Ismael Zárate Orozco, B.E. Thesis Prepared for the Degree of SOFTWARE AND HARDWARE-IN-THE-LOOP MODELING OF AN AUDIO WATERMARKING ALGORITHM Ismael Zárate Orozco, B.E. Thesis Prepared for the Degree of MASTER OF SCIENCE UNIVERSITY OF NORTH TEXAS December 2010 APPROVED:

More information

Image Authentication Scheme using Digital Signature and Digital Watermarking

Image Authentication Scheme using Digital Signature and Digital Watermarking www..org 59 Image Authentication Scheme using Digital Signature and Digital Watermarking Seyed Mohammad Mousavi Industrial Management Institute, Tehran, Iran Abstract Usual digital signature schemes for

More information

MPEG Unified Speech and Audio Coding Enabling Efficient Coding of both Speech and Music

MPEG Unified Speech and Audio Coding Enabling Efficient Coding of both Speech and Music ISO/IEC MPEG USAC Unified Speech and Audio Coding MPEG Unified Speech and Audio Coding Enabling Efficient Coding of both Speech and Music The standardization of MPEG USAC in ISO/IEC is now in its final

More information

Watermarking Techniques for Protecting Intellectual Properties in a Digital Environment

Watermarking Techniques for Protecting Intellectual Properties in a Digital Environment Watermarking Techniques for Protecting Intellectual Properties in a Digital Environment Isinkaye F. O*. and Aroge T. K. Department of Computer Science and Information Technology University of Science and

More information

Non-Data Aided Carrier Offset Compensation for SDR Implementation

Non-Data Aided Carrier Offset Compensation for SDR Implementation Non-Data Aided Carrier Offset Compensation for SDR Implementation Anders Riis Jensen 1, Niels Terp Kjeldgaard Jørgensen 1 Kim Laugesen 1, Yannick Le Moullec 1,2 1 Department of Electronic Systems, 2 Center

More information

Experimental DRM Architecture Using Watermarking and PKI

Experimental DRM Architecture Using Watermarking and PKI Experimental DRM Architecture Using Watermarking and PKI Mikko Löytynoja, Tapio Seppänen, Nedeljko Cvejic MediaTeam Oulu Information Processing Laboratory University of Oulu, Finland {mikko.loytynoja,

More information

How To Recognize Voice Over Ip On Pc Or Mac Or Ip On A Pc Or Ip (Ip) On A Microsoft Computer Or Ip Computer On A Mac Or Mac (Ip Or Ip) On An Ip Computer Or Mac Computer On An Mp3

How To Recognize Voice Over Ip On Pc Or Mac Or Ip On A Pc Or Ip (Ip) On A Microsoft Computer Or Ip Computer On A Mac Or Mac (Ip Or Ip) On An Ip Computer Or Mac Computer On An Mp3 Recognizing Voice Over IP: A Robust Front-End for Speech Recognition on the World Wide Web. By C.Moreno, A. Antolin and F.Diaz-de-Maria. Summary By Maheshwar Jayaraman 1 1. Introduction Voice Over IP is

More information

Final Year Project Progress Report. Frequency-Domain Adaptive Filtering. Myles Friel. Supervisor: Dr.Edward Jones

Final Year Project Progress Report. Frequency-Domain Adaptive Filtering. Myles Friel. Supervisor: Dr.Edward Jones Final Year Project Progress Report Frequency-Domain Adaptive Filtering Myles Friel 01510401 Supervisor: Dr.Edward Jones Abstract The Final Year Project is an important part of the final year of the Electronic

More information

MUSICAL INSTRUMENT FAMILY CLASSIFICATION

MUSICAL INSTRUMENT FAMILY CLASSIFICATION MUSICAL INSTRUMENT FAMILY CLASSIFICATION Ricardo A. Garcia Media Lab, Massachusetts Institute of Technology 0 Ames Street Room E5-40, Cambridge, MA 039 USA PH: 67-53-0 FAX: 67-58-664 e-mail: rago @ media.

More information

T = 1 f. Phase. Measure of relative position in time within a single period of a signal For a periodic signal f(t), phase is fractional part t p

T = 1 f. Phase. Measure of relative position in time within a single period of a signal For a periodic signal f(t), phase is fractional part t p Data Transmission Concepts and terminology Transmission terminology Transmission from transmitter to receiver goes over some transmission medium using electromagnetic waves Guided media. Waves are guided

More information

The Effect of Network Cabling on Bit Error Rate Performance. By Paul Kish NORDX/CDT

The Effect of Network Cabling on Bit Error Rate Performance. By Paul Kish NORDX/CDT The Effect of Network Cabling on Bit Error Rate Performance By Paul Kish NORDX/CDT Table of Contents Introduction... 2 Probability of Causing Errors... 3 Noise Sources Contributing to Errors... 4 Bit Error

More information

Revision of Lecture Eighteen

Revision of Lecture Eighteen Revision of Lecture Eighteen Previous lecture has discussed equalisation using Viterbi algorithm: Note similarity with channel decoding using maximum likelihood sequence estimation principle It also discusses

More information

Computer Networks and Internets, 5e Chapter 6 Information Sources and Signals. Introduction

Computer Networks and Internets, 5e Chapter 6 Information Sources and Signals. Introduction Computer Networks and Internets, 5e Chapter 6 Information Sources and Signals Modified from the lecture slides of Lami Kaya (LKaya@ieee.org) for use CECS 474, Fall 2008. 2009 Pearson Education Inc., Upper

More information

Audio Coding Algorithm for One-Segment Broadcasting

Audio Coding Algorithm for One-Segment Broadcasting Audio Coding Algorithm for One-Segment Broadcasting V Masanao Suzuki V Yasuji Ota V Takashi Itoh (Manuscript received November 29, 2007) With the recent progress in coding technologies, a more efficient

More information

How To Test Video Quality With Real Time Monitor

How To Test Video Quality With Real Time Monitor White Paper Real Time Monitoring Explained Video Clarity, Inc. 1566 La Pradera Dr Campbell, CA 95008 www.videoclarity.com 408-379-6952 Version 1.0 A Video Clarity White Paper page 1 of 7 Real Time Monitor

More information

A comprehensive survey on various ETC techniques for secure Data transmission

A comprehensive survey on various ETC techniques for secure Data transmission A comprehensive survey on various ETC techniques for secure Data transmission Shaikh Nasreen 1, Prof. Suchita Wankhade 2 1, 2 Department of Computer Engineering 1, 2 Trinity College of Engineering and

More information

Security and protection of digital images by using watermarking methods

Security and protection of digital images by using watermarking methods Security and protection of digital images by using watermarking methods Andreja Samčović Faculty of Transport and Traffic Engineering University of Belgrade, Serbia Gjovik, june 2014. Digital watermarking

More information

AUDIO CODING: BASICS AND STATE OF THE ART

AUDIO CODING: BASICS AND STATE OF THE ART AUDIO CODING: BASICS AND STATE OF THE ART PACS REFERENCE: 43.75.CD Brandenburg, Karlheinz Fraunhofer Institut Integrierte Schaltungen, Arbeitsgruppe Elektronische Medientechnolgie Am Helmholtzring 1 98603

More information

White Paper. PESQ: An Introduction. Prepared by: Psytechnics Limited. 23 Museum Street Ipswich, Suffolk United Kingdom IP1 1HN

White Paper. PESQ: An Introduction. Prepared by: Psytechnics Limited. 23 Museum Street Ipswich, Suffolk United Kingdom IP1 1HN PESQ: An Introduction White Paper Prepared by: Psytechnics Limited 23 Museum Street Ipswich, Suffolk United Kingdom IP1 1HN t: +44 (0) 1473 261 800 f: +44 (0) 1473 261 880 e: info@psytechnics.com September

More information

A HIGH PERFORMANCE SOFTWARE IMPLEMENTATION OF MPEG AUDIO ENCODER. Figure 1. Basic structure of an encoder.

A HIGH PERFORMANCE SOFTWARE IMPLEMENTATION OF MPEG AUDIO ENCODER. Figure 1. Basic structure of an encoder. A HIGH PERFORMANCE SOFTWARE IMPLEMENTATION OF MPEG AUDIO ENCODER Manoj Kumar 1 Mohammad Zubair 1 1 IBM T.J. Watson Research Center, Yorktown Hgts, NY, USA ABSTRACT The MPEG/Audio is a standard for both

More information

ANALYZER BASICS WHAT IS AN FFT SPECTRUM ANALYZER? 2-1

ANALYZER BASICS WHAT IS AN FFT SPECTRUM ANALYZER? 2-1 WHAT IS AN FFT SPECTRUM ANALYZER? ANALYZER BASICS The SR760 FFT Spectrum Analyzer takes a time varying input signal, like you would see on an oscilloscope trace, and computes its frequency spectrum. Fourier's

More information

Image Compression through DCT and Huffman Coding Technique

Image Compression through DCT and Huffman Coding Technique International Journal of Current Engineering and Technology E-ISSN 2277 4106, P-ISSN 2347 5161 2015 INPRESSCO, All Rights Reserved Available at http://inpressco.com/category/ijcet Research Article Rahul

More information

PCM Encoding and Decoding:

PCM Encoding and Decoding: PCM Encoding and Decoding: Aim: Introduction to PCM encoding and decoding. Introduction: PCM Encoding: The input to the PCM ENCODER module is an analog message. This must be constrained to a defined bandwidth

More information

WATERMARKING FOR IMAGE AUTHENTICATION

WATERMARKING FOR IMAGE AUTHENTICATION WATERMARKING FOR IMAGE AUTHENTICATION Min Wu Bede Liu Department of Electrical Engineering Princeton University, Princeton, NJ 08544, USA Fax: +1-609-258-3745 {minwu, liu}@ee.princeton.edu ABSTRACT A data

More information

Real-Time Audio Watermarking Based on Characteristics of PCM in Digital Instrument

Real-Time Audio Watermarking Based on Characteristics of PCM in Digital Instrument Journal of Information Hiding and Multimedia Signal Processing 21 ISSN 273-4212 Ubiquitous International Volume 1, Number 2, April 21 Real-Time Audio Watermarking Based on Characteristics of PCM in Digital

More information

Introduction to Digital Audio

Introduction to Digital Audio Introduction to Digital Audio Before the development of high-speed, low-cost digital computers and analog-to-digital conversion circuits, all recording and manipulation of sound was done using analog techniques.

More information

Electronic Communications Committee (ECC) within the European Conference of Postal and Telecommunications Administrations (CEPT)

Electronic Communications Committee (ECC) within the European Conference of Postal and Telecommunications Administrations (CEPT) Page 1 Electronic Communications Committee (ECC) within the European Conference of Postal and Telecommunications Administrations (CEPT) ECC RECOMMENDATION (06)01 Bandwidth measurements using FFT techniques

More information

Video compression: Performance of available codec software

Video compression: Performance of available codec software Video compression: Performance of available codec software Introduction. Digital Video A digital video is a collection of images presented sequentially to produce the effect of continuous motion. It takes

More information

High-Fidelity Multichannel Audio Coding With Karhunen-Loève Transform

High-Fidelity Multichannel Audio Coding With Karhunen-Loève Transform IEEE TRANSACTIONS ON SPEECH AND AUDIO PROCESSING, VOL. 11, NO. 4, JULY 2003 365 High-Fidelity Multichannel Audio Coding With Karhunen-Loève Transform Dai Yang, Member, IEEE, Hongmei Ai, Member, IEEE, Chris

More information

Introduction to image coding

Introduction to image coding Introduction to image coding Image coding aims at reducing amount of data required for image representation, storage or transmission. This is achieved by removing redundant data from an image, i.e. by

More information

Information, Entropy, and Coding

Information, Entropy, and Coding Chapter 8 Information, Entropy, and Coding 8. The Need for Data Compression To motivate the material in this chapter, we first consider various data sources and some estimates for the amount of data associated

More information

Voice---is analog in character and moves in the form of waves. 3-important wave-characteristics:

Voice---is analog in character and moves in the form of waves. 3-important wave-characteristics: Voice Transmission --Basic Concepts-- Voice---is analog in character and moves in the form of waves. 3-important wave-characteristics: Amplitude Frequency Phase Voice Digitization in the POTS Traditional

More information

CS263: Wireless Communications and Sensor Networks

CS263: Wireless Communications and Sensor Networks CS263: Wireless Communications and Sensor Networks Matt Welsh Lecture 4: Medium Access Control October 5, 2004 2004 Matt Welsh Harvard University 1 Today's Lecture Medium Access Control Schemes: FDMA TDMA

More information

PHASE ESTIMATION ALGORITHM FOR FREQUENCY HOPPED BINARY PSK AND DPSK WAVEFORMS WITH SMALL NUMBER OF REFERENCE SYMBOLS

PHASE ESTIMATION ALGORITHM FOR FREQUENCY HOPPED BINARY PSK AND DPSK WAVEFORMS WITH SMALL NUMBER OF REFERENCE SYMBOLS PHASE ESTIMATION ALGORITHM FOR FREQUENCY HOPPED BINARY PSK AND DPSK WAVEFORMS WITH SMALL NUM OF REFERENCE SYMBOLS Benjamin R. Wiederholt The MITRE Corporation Bedford, MA and Mario A. Blanco The MITRE

More information

DTS Enhance : Smart EQ and Bandwidth Extension Brings Audio to Life

DTS Enhance : Smart EQ and Bandwidth Extension Brings Audio to Life DTS Enhance : Smart EQ and Bandwidth Extension Brings Audio to Life White Paper Document No. 9302K05100 Revision A Effective Date: May 2011 DTS, Inc. 5220 Las Virgenes Road Calabasas, CA 91302 USA www.dts.com

More information

Security Based Data Transfer and Privacy Storage through Watermark Detection

Security Based Data Transfer and Privacy Storage through Watermark Detection Security Based Data Transfer and Privacy Storage through Watermark Detection Gowtham.T 1 Pradeep Kumar.G 2 1PG Scholar, Applied Electronics, Nandha Engineering College, Anna University, Erode, India. 2Assistant

More information

Sampling Theorem Notes. Recall: That a time sampled signal is like taking a snap shot or picture of signal periodically.

Sampling Theorem Notes. Recall: That a time sampled signal is like taking a snap shot or picture of signal periodically. Sampling Theorem We will show that a band limited signal can be reconstructed exactly from its discrete time samples. Recall: That a time sampled signal is like taking a snap shot or picture of signal

More information

Efficient Data Recovery scheme in PTS-Based OFDM systems with MATRIX Formulation

Efficient Data Recovery scheme in PTS-Based OFDM systems with MATRIX Formulation Efficient Data Recovery scheme in PTS-Based OFDM systems with MATRIX Formulation Sunil Karthick.M PG Scholar Department of ECE Kongu Engineering College Perundurau-638052 Venkatachalam.S Assistant Professor

More information

Implementation of Digital Signal Processing: Some Background on GFSK Modulation

Implementation of Digital Signal Processing: Some Background on GFSK Modulation Implementation of Digital Signal Processing: Some Background on GFSK Modulation Sabih H. Gerez University of Twente, Department of Electrical Engineering s.h.gerez@utwente.nl Version 4 (February 7, 2013)

More information

Audio and Video Synchronization:

Audio and Video Synchronization: White Paper Audio and Video Synchronization: Defining the Problem and Implementing Solutions Linear Acoustic Inc. www.linearacaoustic.com 2004 Linear Acoustic Inc Rev. 1. Introduction With the introduction

More information

Quality Estimation for Scalable Video Codec. Presented by Ann Ukhanova (DTU Fotonik, Denmark) Kashaf Mazhar (KTH, Sweden)

Quality Estimation for Scalable Video Codec. Presented by Ann Ukhanova (DTU Fotonik, Denmark) Kashaf Mazhar (KTH, Sweden) Quality Estimation for Scalable Video Codec Presented by Ann Ukhanova (DTU Fotonik, Denmark) Kashaf Mazhar (KTH, Sweden) Purpose of scalable video coding Multiple video streams are needed for heterogeneous

More information

Synchronization Essentials of VoIP WHITE PAPER

Synchronization Essentials of VoIP WHITE PAPER Synchronization Essentials of VoIP WHITE PAPER Synchronization Essentials of VoIP Introduction As we accelerate into the New World of VoIP we assume we can leave some of the trappings of wireline telecom

More information

Multimedia Document Authentication using On-line Signatures as Watermarks

Multimedia Document Authentication using On-line Signatures as Watermarks Multimedia Document Authentication using On-line Signatures as Watermarks Anoop M Namboodiri and Anil K Jain Department of Computer Science and Engineering Michigan State University East Lansing, MI 48824

More information

TCOM 370 NOTES 99-6 VOICE DIGITIZATION AND VOICE/DATA INTEGRATION

TCOM 370 NOTES 99-6 VOICE DIGITIZATION AND VOICE/DATA INTEGRATION TCOM 370 NOTES 99-6 VOICE DIGITIZATION AND VOICE/DATA INTEGRATION (Please read appropriate parts of Section 2.5.2 in book) 1. VOICE DIGITIZATION IN THE PSTN The frequencies contained in telephone-quality

More information

HD Radio FM Transmission System Specifications Rev. F August 24, 2011

HD Radio FM Transmission System Specifications Rev. F August 24, 2011 HD Radio FM Transmission System Specifications Rev. F August 24, 2011 SY_SSS_1026s TRADEMARKS HD Radio and the HD, HD Radio, and Arc logos are proprietary trademarks of ibiquity Digital Corporation. ibiquity,

More information

Video Authentication for H.264/AVC using Digital Signature Standard and Secure Hash Algorithm

Video Authentication for H.264/AVC using Digital Signature Standard and Secure Hash Algorithm Video Authentication for H.264/AVC using Digital Signature Standard and Secure Hash Algorithm Nandakishore Ramaswamy Qualcomm Inc 5775 Morehouse Dr, Sam Diego, CA 92122. USA nandakishore@qualcomm.com K.

More information

DAB + The additional audio codec in DAB

DAB + The additional audio codec in DAB DAB + The additional audio codec in DAB 2007 Contents Why DAB + Features of DAB + Possible scenarios with DAB + Comparison of DAB + and DMB for radio services Performance of DAB + Status of standardisation

More information

Classes of multimedia Applications

Classes of multimedia Applications Classes of multimedia Applications Streaming Stored Audio and Video Streaming Live Audio and Video Real-Time Interactive Audio and Video Others Class: Streaming Stored Audio and Video The multimedia content

More information

L9: Cepstral analysis

L9: Cepstral analysis L9: Cepstral analysis The cepstrum Homomorphic filtering The cepstrum and voicing/pitch detection Linear prediction cepstral coefficients Mel frequency cepstral coefficients This lecture is based on [Taylor,

More information

Data Storage 3.1. Foundations of Computer Science Cengage Learning

Data Storage 3.1. Foundations of Computer Science Cengage Learning 3 Data Storage 3.1 Foundations of Computer Science Cengage Learning Objectives After studying this chapter, the student should be able to: List five different data types used in a computer. Describe how

More information

For Articulation Purpose Only

For Articulation Purpose Only E305 Digital Audio and Video (4 Modular Credits) This document addresses the content related abilities, with reference to the module. Abilities of thinking, learning, problem solving, team work, communication,

More information

Figure 1: Relation between codec, data containers and compression algorithms.

Figure 1: Relation between codec, data containers and compression algorithms. Video Compression Djordje Mitrovic University of Edinburgh This document deals with the issues of video compression. The algorithm, which is used by the MPEG standards, will be elucidated upon in order

More information

Convention Paper Presented at the 112th Convention 2002 May 10 13 Munich, Germany

Convention Paper Presented at the 112th Convention 2002 May 10 13 Munich, Germany Audio Engineering Society Convention Paper Presented at the 112th Convention 2002 May 10 13 Munich, Germany This convention paper has been reproduced from the author's advance manuscript, without editing,

More information

Figure1. Acoustic feedback in packet based video conferencing system

Figure1. Acoustic feedback in packet based video conferencing system Real-Time Howling Detection for Hands-Free Video Conferencing System Mi Suk Lee and Do Young Kim Future Internet Research Department ETRI, Daejeon, Korea {lms, dyk}@etri.re.kr Abstract: This paper presents

More information

CDMA TECHNOLOGY. Brief Working of CDMA

CDMA TECHNOLOGY. Brief Working of CDMA CDMA TECHNOLOGY History of CDMA The Cellular Challenge The world's first cellular networks were introduced in the early 1980s, using analog radio transmission technologies such as AMPS (Advanced Mobile

More information

Introduction and Comparison of Common Videoconferencing Audio Protocols I. Digital Audio Principles

Introduction and Comparison of Common Videoconferencing Audio Protocols I. Digital Audio Principles Introduction and Comparison of Common Videoconferencing Audio Protocols I. Digital Audio Principles Sound is an energy wave with frequency and amplitude. Frequency maps the axis of time, and amplitude

More information

Multi-factor Authentication in Banking Sector

Multi-factor Authentication in Banking Sector Multi-factor Authentication in Banking Sector Tushar Bhivgade, Mithilesh Bhusari, Ajay Kuthe, Bhavna Jiddewar,Prof. Pooja Dubey Department of Computer Science & Engineering, Rajiv Gandhi College of Engineering

More information

Objective Speech Quality Measures for Internet Telephony

Objective Speech Quality Measures for Internet Telephony Objective Speech Quality Measures for Internet Telephony Timothy A. Hall National Institute of Standards and Technology 100 Bureau Drive, STOP 8920 Gaithersburg, MD 20899-8920 ABSTRACT Measuring voice

More information

Analysis of Filter Coefficient Precision on LMS Algorithm Performance for G.165/G.168 Echo Cancellation

Analysis of Filter Coefficient Precision on LMS Algorithm Performance for G.165/G.168 Echo Cancellation Application Report SPRA561 - February 2 Analysis of Filter Coefficient Precision on LMS Algorithm Performance for G.165/G.168 Echo Cancellation Zhaohong Zhang Gunter Schmer C6 Applications ABSTRACT This

More information

Fast Arithmetic Coding (FastAC) Implementations

Fast Arithmetic Coding (FastAC) Implementations Fast Arithmetic Coding (FastAC) Implementations Amir Said 1 Introduction This document describes our fast implementations of arithmetic coding, which achieve optimal compression and higher throughput by

More information

Bandwidth Adaptation for MPEG-4 Video Streaming over the Internet

Bandwidth Adaptation for MPEG-4 Video Streaming over the Internet DICTA2002: Digital Image Computing Techniques and Applications, 21--22 January 2002, Melbourne, Australia Bandwidth Adaptation for MPEG-4 Video Streaming over the Internet K. Ramkishor James. P. Mammen

More information

Convention Paper 7896

Convention Paper 7896 Audio Engineering Society Convention Paper 7896 Presented at the 127th Convention 2009 October 9 12 New York, NY, USA The papers at this Convention have been selected on the basis of a submitted abstract

More information

Performance Analysis and Comparison of JM 15.1 and Intel IPP H.264 Encoder and Decoder

Performance Analysis and Comparison of JM 15.1 and Intel IPP H.264 Encoder and Decoder Performance Analysis and Comparison of 15.1 and H.264 Encoder and Decoder K.V.Suchethan Swaroop and K.R.Rao, IEEE Fellow Department of Electrical Engineering, University of Texas at Arlington Arlington,

More information

JPEG Image Compression by Using DCT

JPEG Image Compression by Using DCT International Journal of Computer Sciences and Engineering Open Access Research Paper Volume-4, Issue-4 E-ISSN: 2347-2693 JPEG Image Compression by Using DCT Sarika P. Bagal 1* and Vishal B. Raskar 2 1*

More information

A Comparison of Speech Coding Algorithms ADPCM vs CELP. Shannon Wichman

A Comparison of Speech Coding Algorithms ADPCM vs CELP. Shannon Wichman A Comparison of Speech Coding Algorithms ADPCM vs CELP Shannon Wichman Department of Electrical Engineering The University of Texas at Dallas Fall 1999 December 8, 1999 1 Abstract Factors serving as constraints

More information

Analyzing Mission Critical Voice over IP Networks. Michael Todd Gardner

Analyzing Mission Critical Voice over IP Networks. Michael Todd Gardner Analyzing Mission Critical Voice over IP Networks Michael Todd Gardner Organization What is Mission Critical Voice? Why Study Mission Critical Voice over IP? Approach to Analyze Mission Critical Voice

More information

Analog-to-Digital Voice Encoding

Analog-to-Digital Voice Encoding Analog-to-Digital Voice Encoding Basic Voice Encoding: Converting Analog to Digital This topic describes the process of converting analog signals to digital signals. Digitizing Analog Signals 1. Sample

More information

Digital Audio Compression: Why, What, and How

Digital Audio Compression: Why, What, and How Digital Audio Compression: Why, What, and How An Absurdly Short Course Jeff Bier Berkeley Design Technology, Inc. 2000 BDTI 1 Outline Why Compress? What is Audio Compression? How Does it Work? Conclusions

More information

Fast Hybrid Simulation for Accurate Decoded Video Quality Assessment on MPSoC Platforms with Resource Constraints

Fast Hybrid Simulation for Accurate Decoded Video Quality Assessment on MPSoC Platforms with Resource Constraints Fast Hybrid Simulation for Accurate Decoded Video Quality Assessment on MPSoC Platforms with Resource Constraints Deepak Gangadharan and Roger Zimmermann Department of Computer Science, National University

More information

Video-Conferencing System

Video-Conferencing System Video-Conferencing System Evan Broder and C. Christoher Post Introductory Digital Systems Laboratory November 2, 2007 Abstract The goal of this project is to create a video/audio conferencing system. Video

More information

Loop Bandwidth and Clock Data Recovery (CDR) in Oscilloscope Measurements. Application Note 1304-6

Loop Bandwidth and Clock Data Recovery (CDR) in Oscilloscope Measurements. Application Note 1304-6 Loop Bandwidth and Clock Data Recovery (CDR) in Oscilloscope Measurements Application Note 1304-6 Abstract Time domain measurements are only as accurate as the trigger signal used to acquire them. Often

More information

Video Coding Basics. Yao Wang Polytechnic University, Brooklyn, NY11201 yao@vision.poly.edu

Video Coding Basics. Yao Wang Polytechnic University, Brooklyn, NY11201 yao@vision.poly.edu Video Coding Basics Yao Wang Polytechnic University, Brooklyn, NY11201 yao@vision.poly.edu Outline Motivation for video coding Basic ideas in video coding Block diagram of a typical video codec Different

More information

Log-Likelihood Ratio-based Relay Selection Algorithm in Wireless Network

Log-Likelihood Ratio-based Relay Selection Algorithm in Wireless Network Recent Advances in Electrical Engineering and Electronic Devices Log-Likelihood Ratio-based Relay Selection Algorithm in Wireless Network Ahmed El-Mahdy and Ahmed Walid Faculty of Information Engineering

More information

Chapter 3 ATM and Multimedia Traffic

Chapter 3 ATM and Multimedia Traffic In the middle of the 1980, the telecommunications world started the design of a network technology that could act as a great unifier to support all digital services, including low-speed telephony and very

More information

Lezione 6 Communications Blockset

Lezione 6 Communications Blockset Corso di Tecniche CAD per le Telecomunicazioni A.A. 2007-2008 Lezione 6 Communications Blockset Ing. Marco GALEAZZI 1 What Is Communications Blockset? Communications Blockset extends Simulink with a comprehensive

More information

6 Scalar, Stochastic, Discrete Dynamic Systems

6 Scalar, Stochastic, Discrete Dynamic Systems 47 6 Scalar, Stochastic, Discrete Dynamic Systems Consider modeling a population of sand-hill cranes in year n by the first-order, deterministic recurrence equation y(n + 1) = Ry(n) where R = 1 + r = 1

More information

RF Measurements Using a Modular Digitizer

RF Measurements Using a Modular Digitizer RF Measurements Using a Modular Digitizer Modern modular digitizers, like the Spectrum M4i series PCIe digitizers, offer greater bandwidth and higher resolution at any given bandwidth than ever before.

More information

Information Theory and Coding Prof. S. N. Merchant Department of Electrical Engineering Indian Institute of Technology, Bombay

Information Theory and Coding Prof. S. N. Merchant Department of Electrical Engineering Indian Institute of Technology, Bombay Information Theory and Coding Prof. S. N. Merchant Department of Electrical Engineering Indian Institute of Technology, Bombay Lecture - 17 Shannon-Fano-Elias Coding and Introduction to Arithmetic Coding

More information

Study Element Based Adaptation of Lecture Videos to Mobile Devices

Study Element Based Adaptation of Lecture Videos to Mobile Devices Study Element Based Adaptation of Lecture Videos to Mobile Devices Ganesh Narayana Murthy Department of Computer Science and Engineering Indian Institute of Technology Bombay Powai, Mumbai - 476 Email:

More information

Clock Recovery in Serial-Data Systems Ransom Stephens, Ph.D.

Clock Recovery in Serial-Data Systems Ransom Stephens, Ph.D. Clock Recovery in Serial-Data Systems Ransom Stephens, Ph.D. Abstract: The definition of a bit period, or unit interval, is much more complicated than it looks. If it were just the reciprocal of the data

More information

VoIP Technologies Lecturer : Dr. Ala Khalifeh Lecture 4 : Voice codecs (Cont.)

VoIP Technologies Lecturer : Dr. Ala Khalifeh Lecture 4 : Voice codecs (Cont.) VoIP Technologies Lecturer : Dr. Ala Khalifeh Lecture 4 : Voice codecs (Cont.) 1 Remember first the big picture VoIP network architecture and some terminologies Voice coders 2 Audio and voice quality measuring

More information

Basic principles of Voice over IP

Basic principles of Voice over IP Basic principles of Voice over IP Dr. Peter Počta {pocta@fel.uniza.sk} Department of Telecommunications and Multimedia Faculty of Electrical Engineering University of Žilina, Slovakia Outline VoIP Transmission

More information

Chapter 6 Bandwidth Utilization: Multiplexing and Spreading 6.1

Chapter 6 Bandwidth Utilization: Multiplexing and Spreading 6.1 Chapter 6 Bandwidth Utilization: Multiplexing and Spreading 6.1 Copyright The McGraw-Hill Companies, Inc. Permission required for reproduction or display. Note Bandwidth utilization is the wise use of

More information

Case Study: Real-Time Video Quality Monitoring Explored

Case Study: Real-Time Video Quality Monitoring Explored 1566 La Pradera Dr Campbell, CA 95008 www.videoclarity.com 408-379-6952 Case Study: Real-Time Video Quality Monitoring Explored Bill Reckwerdt, CTO Video Clarity, Inc. Version 1.0 A Video Clarity Case

More information

PRIMER ON PC AUDIO. Introduction to PC-Based Audio

PRIMER ON PC AUDIO. Introduction to PC-Based Audio PRIMER ON PC AUDIO This document provides an introduction to various issues associated with PC-based audio technology. Topics include the following: Introduction to PC-Based Audio Introduction to Audio

More information

The Theory Behind Mp3

The Theory Behind Mp3 The Theory Behind Mp3 Rassol Raissi December 2002 Abstract Since the MPEG-1 Layer III encoding technology is nowadays widely used it might be interesting to gain knowledge of how this powerful compression/decompression

More information

Mathematical Modelling of Computer Networks: Part II. Module 1: Network Coding

Mathematical Modelling of Computer Networks: Part II. Module 1: Network Coding Mathematical Modelling of Computer Networks: Part II Module 1: Network Coding Lecture 3: Network coding and TCP 12th November 2013 Laila Daniel and Krishnan Narayanan Dept. of Computer Science, University

More information

Robust Blind Watermarking Mechanism For Point Sampled Geometry

Robust Blind Watermarking Mechanism For Point Sampled Geometry Robust Blind Watermarking Mechanism For Point Sampled Geometry Parag Agarwal Balakrishnan Prabhakaran Department of Computer Science, University of Texas at Dallas MS EC 31, PO Box 830688, Richardson,

More information

This document is downloaded from DR-NTU, Nanyang Technological University Library, Singapore.

This document is downloaded from DR-NTU, Nanyang Technological University Library, Singapore. This document is downloaded from DR-NTU, Nanyang Technological University Library, Singapore. Title Transcription of polyphonic signals using fast filter bank( Accepted version ) Author(s) Foo, Say Wei;

More information

The Problem with Faxing over VoIP Channels

The Problem with Faxing over VoIP Channels The Problem with Faxing over VoIP Channels Lower your phone bill! is one of many slogans used today by popular Voice over IP (VoIP) providers. Indeed, you may certainly save money by leveraging an existing

More information

Digital Modulation. David Tipper. Department of Information Science and Telecommunications University of Pittsburgh. Typical Communication System

Digital Modulation. David Tipper. Department of Information Science and Telecommunications University of Pittsburgh. Typical Communication System Digital Modulation David Tipper Associate Professor Department of Information Science and Telecommunications University of Pittsburgh http://www.tele.pitt.edu/tipper.html Typical Communication System Source

More information

Spot me if you can: Uncovering spoken phrases in encrypted VoIP conversations

Spot me if you can: Uncovering spoken phrases in encrypted VoIP conversations Spot me if you can: Uncovering spoken phrases in encrypted VoIP conversations C. Wright, L. Ballard, S. Coull, F. Monrose, G. Masson Talk held by Goran Doychev Selected Topics in Information Security and

More information

AN ANALYSIS OF DELAY OF SMALL IP PACKETS IN CELLULAR DATA NETWORKS

AN ANALYSIS OF DELAY OF SMALL IP PACKETS IN CELLULAR DATA NETWORKS AN ANALYSIS OF DELAY OF SMALL IP PACKETS IN CELLULAR DATA NETWORKS Hubert GRAJA, Philip PERRY and John MURPHY Performance Engineering Laboratory, School of Electronic Engineering, Dublin City University,

More information

Department of Electrical and Computer Engineering Ben-Gurion University of the Negev. LAB 1 - Introduction to USRP

Department of Electrical and Computer Engineering Ben-Gurion University of the Negev. LAB 1 - Introduction to USRP Department of Electrical and Computer Engineering Ben-Gurion University of the Negev LAB 1 - Introduction to USRP - 1-1 Introduction In this lab you will use software reconfigurable RF hardware from National

More information