WATERMARKING FOR IMAGE AUTHENTICATION
|
|
|
- Peregrine Day
- 10 years ago
- Views:
Transcription
1 WATERMARKING FOR IMAGE AUTHENTICATION Min Wu Bede Liu Department of Electrical Engineering Princeton University, Princeton, NJ 08544, USA Fax: {minwu, ABSTRACT A data embedding method is proposed for image authentication based on table look-up in frequency domain. A visually meaningful watermark and a set of simple features are embedded invisibly in the marked image, which can be stored in the compressed form. The scheme can detect and localize alterations of the original image, such as the tempering of images exported from a digital camera. Keywords: digital watermark, image authentication. 1. INTRODUCTION Digital information revolution has brought about many advantages and new issues. With the ease of editing and perfect reproduction, the protection of ownership and the prevention of unauthorized manipulation of digital audio, image, and video materials become important concerns. Digital watermarking, a scheme to embed special labels in digital sources, has made considerable progress in recent years. There are several categories of watermarking schemes [l]. Among them, fragile watermarking is a technique to insert a signature for image authentication. The signature will be altered when the host image is manipulated. In this paper, we focus on watermarking for digital image authentication. An effective authentication scheme should have the following desirable features: 1. to be able to determine whether an image has been altered or not; 2. to be able to locate any alteration made on the image; This research is supported by a New Jersey State R&D Excellence Award and NSF grant MIP to be able to integrate authentication data with host image rather than as a separate data file; 4. the embedded authentication data be invisible under normal viewing conditions; 5. to allow the watermarked image be stored in lossycompression format. Previously published methods for image authentication do not satisfy all the requirements. The digital signature proposed in[2], as well as the content based signature reported in [3] and [4] do not satisfy requirements 2 and 3. The pixel-domain scheme [5] can not be stored in lossy compression format. In addition, two frequency domain data hiding schemes [6][7] may be used for authentication, but they cannot always locate alteration and the distortion introduced by embedding is larger than the proposed scheme. This paper presents a new authentication scheme by embedding a visually meaningful watermark and a set of simple features in the frequency domain of an image via table look-up. This scheme can be applied to compressed image using JPEG or other techniques such as Wavelet compression, and the marked image can be kept in the compressed format. Any alteration made on the marked image can be localized, making it suitable for trustworthy digital camera. Furthermore, this scheme is computationally efficient, and can be applied to video. 2. TWO ASPECTS OF PROPOSED AUTHENTICATION APPROACH We shall present our approach in the context of grey scale JPEG compressed images. The extension to images compressed using other means and to color images are reasonably straightforward and discussed in Section 7. A block diagram for the embedding of data is given in Fig. 1 which, aside from the block labeled embed, /98 $ IEEE 437
2 is identical to that of the JPEG compression [8]. Watermark is inserted into the quantized DCT coefficients via a look-up table. Original Image Lookup Table The basic idea of the embedding process is also illustrated by the example in Fig. 2. In this example, zeros are to be embedded in two AC coefficients with values -73 and -24 of an 8x8 image block. The entry in the table for coefficient value -73 is 1. So to embed a O, we go to its closest neighbor for which the entry is 0. In this case, -73 is changed to -74. Since the entry for coefficient value 24 is 0, it is unchanged. Data to be embedded Marked JPEG Image Original M- Figure 1: Block Diagram of Embedding Process In the next section, we present how to embed data. The question of what data are used for authentication is discussed in Section PROPOSED FREQUENCY-DOMAIN DATA EMBEDDING SCHEME 3.1. Embedding Binary Bits Via Table Look-up A proprietary look-up table (LUT) is generated beforehand by the owner of the image or the digital camera manufacturers. The table maps every possible value of JPEG coefficient randomly to 1 or 0 with the constraint that runs of 1 and 0 are limited in length. To embed a 1 in a coefficient, the coefficient is unchanged if the entry of the table corresponding to that coefficient is also a 1. If the entry of the table is a O, then the coefficient is changed to its nearest neighbor- ing values for which the entry is 1. The embedding of a 0 is similar. This process can be abstracted into the following formula where u; is the original coefficient, vi is the marked one, bi is the bit to be embedded in, and EUT(.) is the mapping by look-up table: va if LUT(u;) = b; 21; = 21; + 6 if LUT(u;) # b;, and 6 = minpl{d E 2 : LUT(u; + d) = b;} The extraction of the signature is simply by looking up the table. That is, iz = LUT(V; ) where & is the extracted bit. Look-up Table &UT1 Figure 2: Frequency-domain Embedding Scheme 3.2. Considerations For Minimizing Distortion Several steps are taken to ensure that the markings are invisible: e The run of 1 and 0 entries in the LUT is constrained to avoid excessive modification on the coefficients; e DC coefficient in each block is not changed to avoid blocky effect unless the quantization step is very small; e Small valued coefficients are not modified to avoid high frequency distortion. The above constraints make the number of bits that can be embedded varies significantly from block to block. Also, extraction error may occur due to image format conversion and other causes. For these reasons, we choose to embed one bit per 8x8 block by embedding the same bit to all embeddable coefficients in the block and detecting that bit by majority voting. The detection of an error in the embedded bit signals alteration of that block, which will be discussed in next section. Better encoding schemes will be discussed in Section 7. The constraint of leaving DC coefficients and small valued AC coefficients unchanged makes it impossible 438
3 to embed data in smooth blocks where all AC coefficients are very small hence unembeddable. We shall discuss this problem in Section CHOICE OF EMBEDDED DATA FOR AUTHENTICATION The authentication data we embed in an image consists of a visually meaningful binary pattern and some content features. The visually meaningful pattern serves as a quick check for alteration and location of possible alteration. A simple example of content features is the most significant bit of macroblock mean intensity. Another example is the sign of intensity difference between macroblocks. The combination of these two types data is suitable for such applications as image authentication Figure 4: Original Image ( 75% JPEG Compression ) for trustworthy digital cameras. The embedding and verifying procedures are summarized in Fig. 3. we take the macroblock as a unit. We use two bits to embed data corresponding to the current macroblock, Original -- 1 Image and use the other two bits to embed a backup copy of Lookup Table data corresponding to the companion macroblock. In the illustration of Fig. 6, the companion blocks are half i ~~~-~~~ Quant. Marked_yj I Embed Coeff. Coding picture height apart., I I _ 7 ; 1 Binary t Features Pattern Compressed Marked Image I I I Embeddedl Compare- Features b A Figure 3: Embedding and Extraction Procedures Figure 5: Smooth Blocks of Fig. 4 (shown in black) 5. SMOOTH REGION EMBEDDING Authentication data cannot be embedded in smooth blocks because the AC coefficients are small. In a typical natural image such as the one shown in Fig. 4, about 20% of the blocks are smooth, which is illustrated in Fig. 5. We propose a solution to embed data in smooth region by embedding data in blocks that are not smooth but whose location bears a fixed relationship to the smooth block in question. A simple implementation, called backup embedding, is illustrated in Fig. 6. Instead of embedding one bit independently in each block, 6. EXPERIMENTAL RESULTS A JPEG compressed image of size 640x432 is shown in Fig. 4. Shown in Fig. 7(a) is the same image but with a 40x27 binary pattern PUEE of Fig. 7(b) and the MSB of macroblock mean intensity embedded in. This image is indistinguishable from the original. The smooth regions of the image is shown in Fig. 5. For these blocks, the backup embedding is used. The marked image is modified by changing Princeton University to Alexander Hall and (c) Copyright 1997 to January 1998, shown in Fig. 8(a). This image is again stored in the JPEG format. For ease of 439
4 1 backup Figure 6: Backup Embedding For Smooth Region visualization, we shall denote the block that embeds 0 as a black dot, the block that embeds 1 as a white dot, and the block with no majorityas a gray dot. With these notation, Fig. 8(b) and Fig. 8(c) show the extracted binary pattern and content feature matching result of the edited image. The random pattern corresponding to the altered blocks are clearly identifiable. Also, very few unembeddable data are shown as isolated gray dots by the backup scheme. Figure 8: 6 (a) Marked Image After Editing (stored in 75% JPEG); (b) Extracted Binary Pattern from Edited Image; (c) Feature Matching Result. 7. IMPROVEMENT AND EXTENSIONS 7.1. Double Watermarking For Authentication and Ownership Verification Previous work on double watermarking mainly emph& sized on embedding multiple labels (such as ownership label, recipient label, etc.) using the same embedding approach. No published work discussed to verify ownership as well as signal and locate alteration. A key issue for this kind of double watermarking is that no original true image can be used since the validity of this original image has not been verified yet. The proposed new scheme can be combined with a previous robust watermarking and detection scheme on ownership verification [9] for double watermarking. This double watermarking has been tested successfully Embedding More Data We have described previously a method to embed 1 bit per 8x8 block. The amount of data embedded can be increased by more sophisticated backup and coding. Figure 7: f (a) Marked Image; (b) Embedded Binary Pattern Multi-level Data Embedding and Unequal Error Protection We mentioned in Section 4 that two sets of data, namely, a meaningful visual pattern and a set of low-level con- 440
5 tent features, are embedded in the image for authentication purpose. Multi-level data embedding and unequal error protection are possible in order to embed several sets of data with different levels of error protection Other Compression Format Besides JPEG compressed image, we also tested Wavelet compression and found our approach effective Color Image and Video For color images, we may work in YCrCb coordinates and use the new approach to mark luminance components while leaving chrominance components unchanged; or we may apply the approach to chrominance components as well to embed more data. We may also work in other color coordinates, such as RGB. The proposed scheme can be applied to MPEG compressed digital video. A simple approach would be to mark I-frames of video streams using our new scheme. In addition, I-frame serial number can be used as part of embedded data to detect modification such as frame reordering and frame dropping. [4] D. Storck: A New Approach to Integrity of Digital Images, IFIP Conf. on Mobile Communication, [5] M. M. Yeung, F. Mintzer: An Invisible Watermarking Technique for Image Verification, ICIP, [6] M. D. Swanson, B. Zhu, A. H. Tewfik: Robust Data Hiding for Images, IEEE DSP Workshop, [7] E. Koch, J. Zhao: Towards Robust and Hidden Image Copyright Labeling, IEEE Workshop on Nonlinear Signal and Image Processing, [8] G. K. Wallace: The JPEG Still Picture Compression Standard JEEE Trans. on Consumer Electronics, vo1.38, no.1, pp18-34, 1992 [9] W. Zeng, B. Liu: On Resolving Rightful Ownerships of Digital Images by Invisible Watermarks $ ICIQ, CONCLUSION In this paper, we have presented a frequency domain technique for image authentication in which the signature is embedded in the image and the marked image can be kept in the compressed form. The scheme can detect tempering of the marked image and can locate where the tempering has occurred. Potential applications include trust-worthy digital cameras and camcorders. Image samples and other information are available at inwu/rschauthwmark.htm1. 9. REFERENCES F. Mintzer, G. W. Braudaway, M. M. Yeung: Effective and Ineffective Digital Watermarks, ICIP, 1997 G. L. Friedman: The Trustworthy Digital Camera: Restoring Credibility to the Photographic Image, IEEE Trans. on Consumer Electronics, Nov M. Schneider, S-F. Chang: A Robust Content Based Digital Signature for Image Authenticat ion, ICIP,
Video Authentication for H.264/AVC using Digital Signature Standard and Secure Hash Algorithm
Video Authentication for H.264/AVC using Digital Signature Standard and Secure Hash Algorithm Nandakishore Ramaswamy Qualcomm Inc 5775 Morehouse Dr, Sam Diego, CA 92122. USA [email protected] K.
Image Authentication Scheme using Digital Signature and Digital Watermarking
www..org 59 Image Authentication Scheme using Digital Signature and Digital Watermarking Seyed Mohammad Mousavi Industrial Management Institute, Tehran, Iran Abstract Usual digital signature schemes for
Multimedia Document Authentication using On-line Signatures as Watermarks
Multimedia Document Authentication using On-line Signatures as Watermarks Anoop M Namboodiri and Anil K Jain Department of Computer Science and Engineering Michigan State University East Lansing, MI 48824
Generating Robust Digital Signature for Image/Video Authentication
Generating Robust Digital Signature for Image/Video Authentication Ching-Yung Lin and Shih-Fu Chang Department of Electrical Engineering and New Media Technology Center Columbia University New York, NY
Volume 2, Issue 12, December 2014 International Journal of Advance Research in Computer Science and Management Studies
Volume 2, Issue 12, December 2014 International Journal of Advance Research in Computer Science and Management Studies Research Article / Survey Paper / Case Study Available online at: www.ijarcsms.com
Video-Conferencing System
Video-Conferencing System Evan Broder and C. Christoher Post Introductory Digital Systems Laboratory November 2, 2007 Abstract The goal of this project is to create a video/audio conferencing system. Video
Watermarking Techniques for Protecting Intellectual Properties in a Digital Environment
Watermarking Techniques for Protecting Intellectual Properties in a Digital Environment Isinkaye F. O*. and Aroge T. K. Department of Computer Science and Information Technology University of Science and
A Secure File Transfer based on Discrete Wavelet Transformation and Audio Watermarking Techniques
A Secure File Transfer based on Discrete Wavelet Transformation and Audio Watermarking Techniques Vineela Behara,Y Ramesh Department of Computer Science and Engineering Aditya institute of Technology and
2695 P a g e. IV Semester M.Tech (DCN) SJCIT Chickballapur Karnataka India
Integrity Preservation and Privacy Protection for Digital Medical Images M.Krishna Rani Dr.S.Bhargavi IV Semester M.Tech (DCN) SJCIT Chickballapur Karnataka India Abstract- In medical treatments, the integrity
A Robust and Lossless Information Embedding in Image Based on DCT and Scrambling Algorithms
A Robust and Lossless Information Embedding in Image Based on DCT and Scrambling Algorithms Dr. Mohammad V. Malakooti Faculty and Head of Department of Computer Engineering, Islamic Azad University, UAE
SECURE DATA TRANSMISSION USING DIGITAL IMAGE WATERMARKING
SECURE DATA TRANSMISSION USING DIGITAL IMAGE WATERMARKING 1 Maulik Srivastava, 2 Anuradha Sharma 1,2 Department of Computer Science & Engineering, Amity University, Uttar Pradesh Abstract: As we all know
Combating Anti-forensics of Jpeg Compression
IJCSI International Journal of Computer Science Issues, Vol. 9, Issue 6, No 3, November 212 ISSN (Online): 1694-814 www.ijcsi.org 454 Combating Anti-forensics of Jpeg Compression Zhenxing Qian 1, Xinpeng
Multi-factor Authentication in Banking Sector
Multi-factor Authentication in Banking Sector Tushar Bhivgade, Mithilesh Bhusari, Ajay Kuthe, Bhavna Jiddewar,Prof. Pooja Dubey Department of Computer Science & Engineering, Rajiv Gandhi College of Engineering
Keywords Android, Copyright Protection, Discrete Cosine Transform (DCT), Digital Watermarking, Discrete Wavelet Transform (DWT), YCbCr.
Volume 3, Issue 7, July 2013 ISSN: 2277 128X International Journal of Advanced Research in Computer Science and Software Engineering Research Paper Available online at: www.ijarcsse.com Web Based Novel
CHAPTER 7 CONCLUSION AND FUTURE WORK
158 CHAPTER 7 CONCLUSION AND FUTURE WORK The aim of this thesis was to present robust watermarking techniques for medical image. Section 7.1, consolidates the contributions made by the researcher and Section
INTERNATIONAL JOURNAL OF APPLIED ENGINEERING RESEARCH, DINDIGUL Volume 1, No 3, 2010
Lossless Medical Image Security Shrikhande Rohini 1, Vinayak Bairagi 2 1 Researcher, Electronics & Telecommunication Department, Sinhgad Academy Of Engg. 2 Assistant Professor, Electronics & Telecommunication
Security and protection of digital images by using watermarking methods
Security and protection of digital images by using watermarking methods Andreja Samčović Faculty of Transport and Traffic Engineering University of Belgrade, Serbia Gjovik, june 2014. Digital watermarking
JPEG compression of monochrome 2D-barcode images using DCT coefficient distributions
Edith Cowan University Research Online ECU Publications Pre. JPEG compression of monochrome D-barcode images using DCT coefficient distributions Keng Teong Tan Hong Kong Baptist University Douglas Chai
Reversible Data Hiding for Security Applications
Reversible Data Hiding for Security Applications Baig Firdous Sulthana, M.Tech Student (DECS), Gudlavalleru engineering college, Gudlavalleru, Krishna (District), Andhra Pradesh (state), PIN-521356 S.
Multimedia Data Hiding
Multimedia Data Hiding Introduction! Digital Watermarking / Multimedia Data Hiding Hide secondary data in digital image/video/audio/3d! Uses of hidden data: ownership verification, alteration detection
A Digital Audio Watermark Embedding Algorithm
Xianghong Tang, Yamei Niu, Hengli Yue, Zhongke Yin Xianghong Tang, Yamei Niu, Hengli Yue, Zhongke Yin School of Communication Engineering, Hangzhou Dianzi University, Hangzhou, Zhejiang, 3008, China [email protected],
A comprehensive survey on various ETC techniques for secure Data transmission
A comprehensive survey on various ETC techniques for secure Data transmission Shaikh Nasreen 1, Prof. Suchita Wankhade 2 1, 2 Department of Computer Engineering 1, 2 Trinity College of Engineering and
A Concept of Digital Picture Envelope for Internet Communication
A Concept of Digital Picture Envelope for Internet Communication Eiji Kawaguchi, Koichi Nozaki, Michiharu Niimi, Hideki Noda and Richard O. Eason Kyushu Institute of Technology 1-1 Sensui-cho, Tobata,
ROI Based Medical Image Watermarking with Zero Distortion and Enhanced Security
I.J. Modern Education and Computer Science, 2014, 10, 40-48 Published Online October 2014 in MECS (http://www.mecs-press.org/) DOI: 10.5815/ijmecs.2014.10.06 ROI Based Medical Image Watermarking with Zero
Audio synthesis: MIDI Digital Audio Coding/Compression. Today: Intellectual property management for digital media. What is Digital Watermarking?
ENEE408G Lecture-9 Last Lecture Digital Watermarking and Fingerprinting for Digital Rights Protection of Multimedia URL: http://www.ece.umd.edu/class/enee408g/ Slides included here are based on Spring
Security Based Data Transfer and Privacy Storage through Watermark Detection
Security Based Data Transfer and Privacy Storage through Watermark Detection Gowtham.T 1 Pradeep Kumar.G 2 1PG Scholar, Applied Electronics, Nandha Engineering College, Anna University, Erode, India. 2Assistant
Invisible Image Water Marking Using Hybrid DWT Compression/Decompression Technique
Invisible Image Water Marking Using Hybrid DWT Compression/Decompression Technique B.Sai Kiran M.Tech (VLSI), CMR Institute of Technology. Mr.Shahbaz Khan Associate Professor, CMR Institute of Technology.
STEGANOGRAPHY: TEXT FILE HIDING IN IMAGE YAW CHOON KIT CA10022
STEGANOGRAPHY: TEXT FILE HIDING IN IMAGE YAW CHOON KIT CA10022 FACULTY OF COMPUTER SYSTEM AND SOFTWARE ENGINEERING 2012/2013 1 ABSTRACT Steganography is the art or science in hiding. It is origin from
Enhancing Data Security in Medical Information System Using the Watermarking Techniques and Oracle SecureFile LOBs
Enhancing Data Security in Medical Information System Using the Watermarking Techniques and Oracle SecureFile LOBs Said Aminzou 1, Brahim ER-RAHA 2, Youness Idrissi Khamlichi 3, Mustapha Machkour 4, Karim
AN ENHANCED MECHANISM FOR SECURE DATA TRANSMISSION USING STEGANOGRAPHY MERGED WITH VISUAL CRYPTOGRAPHY
AN ENHANCED MECHANISM FOR SECURE DATA TRANSMISSION USING STEGANOGRAPHY MERGED WITH VISUAL CRYPTOGRAPHY Chandan Mohapatra 1, Manajusha Pandey 2 1 PG Student in Computer Science Dept., KIIT University, Bhubaneswar,
Friendly Medical Image Sharing Scheme
Journal of Information Hiding and Multimedia Signal Processing 2014 ISSN 2073-4212 Ubiquitous International Volume 5, Number 3, July 2014 Frily Medical Image Sharing Scheme Hao-Kuan Tso Department of Computer
Statistical Modeling of Huffman Tables Coding
Statistical Modeling of Huffman Tables Coding S. Battiato 1, C. Bosco 1, A. Bruna 2, G. Di Blasi 1, G.Gallo 1 1 D.M.I. University of Catania - Viale A. Doria 6, 95125, Catania, Italy {battiato, bosco,
Figure 1: Relation between codec, data containers and compression algorithms.
Video Compression Djordje Mitrovic University of Edinburgh This document deals with the issues of video compression. The algorithm, which is used by the MPEG standards, will be elucidated upon in order
A Novel Method to Improve Resolution of Satellite Images Using DWT and Interpolation
A Novel Method to Improve Resolution of Satellite Images Using DWT and Interpolation S.VENKATA RAMANA ¹, S. NARAYANA REDDY ² M.Tech student, Department of ECE, SVU college of Engineering, Tirupati, 517502,
Real-Time DMB Video Encryption in Recording on PMP
Real-Time DMB Video Encryption in Recording on PMP Seong-Yeon Lee and Jong-Nam Kim Dept. of Electronic Computer Telecommunication Engineering, PuKyong Nat'l Univ. [email protected], [email protected]
Study and Implementation of Video Compression Standards (H.264/AVC and Dirac)
Project Proposal Study and Implementation of Video Compression Standards (H.264/AVC and Dirac) Sumedha Phatak-1000731131- [email protected] Objective: A study, implementation and comparison of
Image Compression through DCT and Huffman Coding Technique
International Journal of Current Engineering and Technology E-ISSN 2277 4106, P-ISSN 2347 5161 2015 INPRESSCO, All Rights Reserved Available at http://inpressco.com/category/ijcet Research Article Rahul
Digimarc for Images. Best Practices Guide (Chroma + Classic Edition)
Digimarc for Images Best Practices Guide (Chroma + Classic Edition) Best Practices Guide (Chroma + Classic Edition) Why should you digitally watermark your images? 3 What types of images can be digitally
Data Storage 3.1. Foundations of Computer Science Cengage Learning
3 Data Storage 3.1 Foundations of Computer Science Cengage Learning Objectives After studying this chapter, the student should be able to: List five different data types used in a computer. Describe how
Understanding and Integrating KODAK Picture Authentication Cameras
Understanding and Integrating KODAK Picture Authentication Cameras Introduction Anyone familiar with imaging software such as ADOBE PHOTOSHOP can appreciate how easy it is manipulate digital still images.
How To Recognize Voice Over Ip On Pc Or Mac Or Ip On A Pc Or Ip (Ip) On A Microsoft Computer Or Ip Computer On A Mac Or Mac (Ip Or Ip) On An Ip Computer Or Mac Computer On An Mp3
Recognizing Voice Over IP: A Robust Front-End for Speech Recognition on the World Wide Web. By C.Moreno, A. Antolin and F.Diaz-de-Maria. Summary By Maheshwar Jayaraman 1 1. Introduction Voice Over IP is
Alaa Alhamami, Avan Sabah Hamdi Amman Arab University Amman, Jordan
World of Computer Science and Information Technology Journal (WCSIT) ISSN: 2221-0741 Vol. 5, No. 5, 87-91, 2015 Mobile Secure Transmission Method Based on Audio Steganography Alaa Alhamami, Avan Sabah
REGION OF INTEREST CODING IN MEDICAL IMAGES USING DIAGNOSTICALLY SIGNIFICANT BITPLANES
REGION OF INTEREST CODING IN MEDICAL IMAGES USING DIAGNOSTICALLY SIGNIFICANT BITPLANES Sharath T. ChandraShekar Sarayu Technologies, India Gomata L. Varanasi Samskruti, India ABSTRACT Accelerated expansion
ANALYSIS OF THE EFFECTIVENESS IN IMAGE COMPRESSION FOR CLOUD STORAGE FOR VARIOUS IMAGE FORMATS
ANALYSIS OF THE EFFECTIVENESS IN IMAGE COMPRESSION FOR CLOUD STORAGE FOR VARIOUS IMAGE FORMATS Dasaradha Ramaiah K. 1 and T. Venugopal 2 1 IT Department, BVRIT, Hyderabad, India 2 CSE Department, JNTUH,
White paper. H.264 video compression standard. New possibilities within video surveillance.
White paper H.264 video compression standard. New possibilities within video surveillance. Table of contents 1. Introduction 3 2. Development of H.264 3 3. How video compression works 4 4. H.264 profiles
Video Coding Basics. Yao Wang Polytechnic University, Brooklyn, NY11201 [email protected]
Video Coding Basics Yao Wang Polytechnic University, Brooklyn, NY11201 [email protected] Outline Motivation for video coding Basic ideas in video coding Block diagram of a typical video codec Different
PCM Encoding and Decoding:
PCM Encoding and Decoding: Aim: Introduction to PCM encoding and decoding. Introduction: PCM Encoding: The input to the PCM ENCODER module is an analog message. This must be constrained to a defined bandwidth
Bandwidth Adaptation for MPEG-4 Video Streaming over the Internet
DICTA2002: Digital Image Computing Techniques and Applications, 21--22 January 2002, Melbourne, Australia Bandwidth Adaptation for MPEG-4 Video Streaming over the Internet K. Ramkishor James. P. Mammen
Triple Security of Information Using Stegnography and Cryptography
Triple Security of Information Using Stegnography and Cryptography Abstract In this growing age information sharing and transfer has increased exponentially so, security is a primary requirement for all
Tracking Moving Objects In Video Sequences Yiwei Wang, Robert E. Van Dyck, and John F. Doherty Department of Electrical Engineering The Pennsylvania State University University Park, PA16802 Abstract{Object
Using fractal compression scheme to embed a digital signature into an image
Using fractal compression scheme to embed a digital signature into an image Joan Puate, Fred Jordan Swiss federal institute of technology Signal Processing Laboratory CH-1015 Lausanne Switzerland Email:
SOFTWARE AND HARDWARE-IN-THE-LOOP MODELING OF AN AUDIO WATERMARKING ALGORITHM. Ismael Zárate Orozco, B.E. Thesis Prepared for the Degree of
SOFTWARE AND HARDWARE-IN-THE-LOOP MODELING OF AN AUDIO WATERMARKING ALGORITHM Ismael Zárate Orozco, B.E. Thesis Prepared for the Degree of MASTER OF SCIENCE UNIVERSITY OF NORTH TEXAS December 2010 APPROVED:
Experimental DRM Architecture Using Watermarking and PKI
Experimental DRM Architecture Using Watermarking and PKI Mikko Löytynoja, Tapio Seppänen, Nedeljko Cvejic MediaTeam Oulu Information Processing Laboratory University of Oulu, Finland {mikko.loytynoja,
Secret Communication through Web Pages Using Special Space Codes in HTML Files
International Journal of Applied Science and Engineering 2008. 6, 2: 141-149 Secret Communication through Web Pages Using Special Space Codes in HTML Files I-Shi Lee a, c and Wen-Hsiang Tsai a, b, * a
Data Storage. Chapter 3. Objectives. 3-1 Data Types. Data Inside the Computer. After studying this chapter, students should be able to:
Chapter 3 Data Storage Objectives After studying this chapter, students should be able to: List five different data types used in a computer. Describe how integers are stored in a computer. Describe how
Open Access A Facial Expression Recognition Algorithm Based on Local Binary Pattern and Empirical Mode Decomposition
Send Orders for Reprints to [email protected] The Open Electrical & Electronic Engineering Journal, 2014, 8, 599-604 599 Open Access A Facial Expression Recognition Algorithm Based on Local Binary
Safer data transmission using Steganography
Safer data transmission using Steganography Arul Bharathi, B.K.Akshay, M.Priy a, K.Latha Department of Computer Science and Engineering Sri Sairam Engineering College Chennai, India Email: [email protected],
Robust Blind Watermarking Mechanism For Point Sampled Geometry
Robust Blind Watermarking Mechanism For Point Sampled Geometry Parag Agarwal Balakrishnan Prabhakaran Department of Computer Science, University of Texas at Dallas MS EC 31, PO Box 830688, Richardson,
International Journal of Emerging Technology and Advanced Engineering Website: www.ijetae.com (ISSN 2250-2459, Volume 2, Issue 9, September 2012)
Authentication of Medical Images using Integer Transforms A.Kannammal 1, Dr.S.Subha Rani 2 1 Assistant professor, 2 Professor and Head, ECE Department, PSG College of Technology, Peelamedu, Coimbatore
The Scientific Data Mining Process
Chapter 4 The Scientific Data Mining Process When I use a word, Humpty Dumpty said, in rather a scornful tone, it means just what I choose it to mean neither more nor less. Lewis Carroll [87, p. 214] In
Electronic Records Management Guidelines - File Formats
Electronic Records Management Guidelines - File Formats Rapid changes in technology mean that file formats can become obsolete quickly and cause problems for your records management strategy. A long-term
Image Optimization GUIDE
Image Optimization GUIDE for IMAGE SUBMITTAL Images can play a crucial role in the successful execution of a book project by enhancing the text and giving the reader insight into your story. Although your
Software Verification and Authentication in a Gaming Device
Software Verification and Authentication in a Gaming Device White Paper Date: February 15, 2000 39355 California Street, Suite 307 Fremont, CA 94538 1 Introduction Gaming machine development has progressed
DCT-JPEG Image Coding Based on GPU
, pp. 293-302 http://dx.doi.org/10.14257/ijhit.2015.8.5.32 DCT-JPEG Image Coding Based on GPU Rongyang Shan 1, Chengyou Wang 1*, Wei Huang 2 and Xiao Zhou 1 1 School of Mechanical, Electrical and Information
How to Send Video Images Through Internet
Transmitting Video Images in XML Web Service Francisco Prieto, Antonio J. Sierra, María Carrión García Departamento de Ingeniería de Sistemas y Automática Área de Ingeniería Telemática Escuela Superior
Sachin Patel HOD I.T Department PCST, Indore, India. Parth Bhatt I.T Department, PCST, Indore, India. Ankit Shah CSE Department, KITE, Jaipur, India
Image Enhancement Using Various Interpolation Methods Parth Bhatt I.T Department, PCST, Indore, India Ankit Shah CSE Department, KITE, Jaipur, India Sachin Patel HOD I.T Department PCST, Indore, India
Lossless Grey-scale Image Compression using Source Symbols Reduction and Huffman Coding
Lossless Grey-scale Image Compression using Source Symbols Reduction and Huffman Coding C. SARAVANAN [email protected] Assistant Professor, Computer Centre, National Institute of Technology, Durgapur,WestBengal,
Automated Image Forgery Detection through Classification of JPEG Ghosts
Automated Image Forgery Detection through Classification of JPEG Ghosts Fabian Zach, Christian Riess and Elli Angelopoulou Pattern Recognition Lab University of Erlangen-Nuremberg {riess,elli}@i5.cs.fau.de
Comparison of different image compression formats. ECE 533 Project Report Paula Aguilera
Comparison of different image compression formats ECE 533 Project Report Paula Aguilera Introduction: Images are very important documents nowadays; to work with them in some applications they need to be
Study and Implementation of Video Compression standards (H.264/AVC, Dirac)
Study and Implementation of Video Compression standards (H.264/AVC, Dirac) EE 5359-Multimedia Processing- Spring 2012 Dr. K.R Rao By: Sumedha Phatak(1000731131) Objective A study, implementation and comparison
A Look at Emerging Standards in Video Security Systems. Chris Adesanya Panasonic Network Systems Company [email protected].
A Look at Emerging Standards in Video Security Systems Chris Adesanya Panasonic Network Systems Company [email protected] Standards Standards are published documents that establish specifications
Efficient Data Recovery scheme in PTS-Based OFDM systems with MATRIX Formulation
Efficient Data Recovery scheme in PTS-Based OFDM systems with MATRIX Formulation Sunil Karthick.M PG Scholar Department of ECE Kongu Engineering College Perundurau-638052 Venkatachalam.S Assistant Professor
H.264/MPEG-4 AVC Video Compression Tutorial
Introduction The upcoming H.264/MPEG-4 AVC video compression standard promises a significant improvement over all previous video compression standards. In terms of coding efficiency, the new standard is
Novel Unique Technique for Generating Ticket Identifier Using Image Texture Patterns
RESEARCH ARTICLE OPEN ACCESS Novel Unique Technique for Generating Ticket Identifier Using Image Texture Patterns Mrs. Jayashree Katti, Sharadchandra Chavan, Dr. Sudeep Thepade, Samruddhi Puranik, Triloknath
Face detection is a process of localizing and extracting the face region from the
Chapter 4 FACE NORMALIZATION 4.1 INTRODUCTION Face detection is a process of localizing and extracting the face region from the background. The detected face varies in rotation, brightness, size, etc.
LOCAL SURFACE PATCH BASED TIME ATTENDANCE SYSTEM USING FACE. [email protected]
LOCAL SURFACE PATCH BASED TIME ATTENDANCE SYSTEM USING FACE 1 S.Manikandan, 2 S.Abirami, 2 R.Indumathi, 2 R.Nandhini, 2 T.Nanthini 1 Assistant Professor, VSA group of institution, Salem. 2 BE(ECE), VSA
balesio Native Format Optimization Technology (NFO)
balesio AG balesio Native Format Optimization Technology (NFO) White Paper Abstract balesio provides the industry s most advanced technology for unstructured data optimization, providing a fully system-independent
FAQs. Getting started with the industry s most advanced compression technology. when it counts
FAQs Getting started with the industry s most advanced compression technology when it counts AVC-Intra Frequently Asked Questions 1. What is AVC-Intra? AVC-Intra, the industry s most advanced compression
Introduction to image coding
Introduction to image coding Image coding aims at reducing amount of data required for image representation, storage or transmission. This is achieved by removing redundant data from an image, i.e. by
Example #1: Controller for Frequency Modulated Spectroscopy
Progress Report Examples The following examples are drawn from past student reports, and illustrate how the general guidelines can be applied to a variety of design projects. The technical details have
