Size: px
Start display at page:

Download ""

Transcription

1 SteganographyinaVideoConferencingSystem? AndreasWestfeld1andGrittaWolf2 2InstituteforOperatingSystems,DatabasesandComputerNetworks 1InstituteforTheoreticalComputerScience DresdenUniversityofTechnology D-01062Dresden,Germany Abstract.Wedescribeasteganographicsystemwhichembedssecret includesdiscretecosinetransformation(dct)based,lossycompression. securityisestablishedbyindeterminismwithinthesignalpath. Resultisthetechnicalrealisationofasteganographicalgorithmwhose messagesintoavideostream.weexaminethesignalpathwhichtypically 1Introduction Theescalationofcommunicationviacomputernetworkhasbeenlinkedtothe informationhidingexistfordigitalimageles,audioles,andinbackground soundsofphonecalls[2].therearemorethan20programsontheinternet(for increasinguseofcomputeraidedsteganography[5],[6].steganographicmethods examplesseethelistbelow). thatathirdpersoncannotdetectorevenprovethisprocess.examplesfor usuallyhidecipheredmessagesinother,harmless-lookingdatainsuchaway {S-ToolsbyAndyBrownembedsdataasleastsignicantbitsinaudioles {JstegbyDerekUphamembedsdatainJFIFimages.Itoverwritestheleast (.wav)orasleastsignicantbitsofthergbcolorvaluesingraphicles (.bmp).athirdmethodhidesdatainfreesectorsofdiskettes.severalsymmetricencryptionmethods(des,idea,...)areoeredforadditionalencryptionofthesecretdata.[9] signicantbitsofthecoecients.[8],[10] {HideandSeekbyColinMaroneyhidesdata(encryptedwithIDEA)inGIF {MandelstegbyHenryHasturcalculatesaGIFfractalfromale.Theresultingimagesareverysimilar.Dierencescanonlybeseenwhencomparing {PGE(PrettyGoodEnvelope)byRoche-CryptpacksdatainGIForJPEG les.theuseofanadditionalsecureencryptionmethodisrecommended.[12] les.[11]?thisworkissponsoredbythegermanfederalministryofeducation,science,researchandtechnology(bmbf). {StegobyJohnWalkertransformsanyletoanonsensicaltextbymeansof theircolorvalues.[13] afreechoosabledictionary.

2 2{TextobyKevinMahertransferslesintopoeticEnglishsentences(comparablewithstego,whichproducesnonsensicaltexts).[14] stereophony,colortv,videotext,traccontrolsystem(tcs),andradiodata system(rds)atfmradio. Datacamouageisalsousedforcompatibleenlargementofnorms,suchas 2VideoConferencingSystems Videoconferencesusecompressionalgorithmstoensureanacceptablequality Thispaperdoesnotdealwithwatermarkingsystemsatall[1]. evenonlowdataratesystemslikeisdn.usually,compressionmethodsarelossy whichmeansthatthereconstructedimageisnotidenticalwiththeoriginal. tempresentedinthispaperworksontheh.261standard.thisisthemost commonstandardforcompressioninvideoconferencesandisrecommendedby [3].InFig.4,wecanseethepointsforembeddingandextractingwithinthe thecomiteconsultatifinternationaltelegraphiqueettelephonique1(ccitt) Thevideoconferenceusedfortheimplementationofthesteganographicsys- H.261informationow. weneedacarrierthatallowsthepossibilityofunnoticeablemodications.signal possibilitiesfordataembeddingwehave.inchapter5weinvestigateatypical noiseandirrelevancearecommonexamplesforit.compressionmethodstryto removesignalnoiseandirrelevance.thebetterasignaliscompressed,theless Compressionanddataembeddinghavecontrarygoals.Fordataembedding signalpathfordataembedding. ThesteganographicalgorithmdescribedinChapter6embedsdataintransformedblocks.Thereforewedescribethetransformationprocessusedinthis videoconferencingsystem. image.thesubsequentquantizationremovestheinsignicantpartsoftheimage. forthehumaneye)frommarginalparts(invisibleforthehumaneye)ofthe Thetransformationemployedhastobeinvertibleinordertoregaintheessential Asuitabletransformationisameanstoseparateessentialinformation(visible 3DiscreteCosineTransformation (DCT).Ittransformesanimageof88pixelswith88=64brightnessvalues H.261,M-JPEG,MPEG,usethetwo-dimensionaldiscretecosinetransformation F(0;0):::F(7;7)into64values(so-calledDCTcoecients)f(0;0):::f(7;7) (seeequation1).thetransformationcausesnosignicantloss(roundingerrors Manydigitalvideoconferencingsystems,forinstancebasedonthestandards only).theretransformedimageresultsfrombacktransformationofthedct coecients(seeequation2).itcanalsobeunderstoodaslinearcombination Bk;n(seeFig.1). ofthedctcoecients(seeequation3andfig.2)withthedctbaseimages 1theformerCCITTisnowtheInternationalTelecommunicationUnion(ITU)

3 increasingverticalfrequency kn ????88 image increasinghorizontalfrequency Fig.1.DCTbaseimagesBk;n - =f(0;0) +f(0;1) +:::+f(7;7) Fig.2.Presentationofan88imageby64baseimageparts?

4 4 F(x;y)=7Xk=07Xn=0C(k) f(k;n)=c(k) 2C(n) 22C(n) 7Xx=07Xy=0F(x;y)cos(2x+1)k 2f(k;n)cos(2x+1)k (1) 16 cos(2y+1)n 16 (2) with F(x;y)=7Xk=07Xn=0f(k;n)Bk;n(x;y) C(z)=12p2forz=0 (3) 4AnExample 1else InordertoillustratetheDCT,wetransformadotoverthei.Fig.3showsit stronglyenlarged.aspresentedinfig.3b)thedotovertheihasagratingof 64brightnessvalues.Let'slookatitstransformedmatrix: 264?840? ? ?110?1?40 50?4?84?2?31?2?12? ? ?2?20?10 00?10?20 00?10?10 0?1 3 Thequantizationcausesanaccumulationofzerosbyapplyingastepfunction 75 (dividingandrounding)tothedctcoecients: 264?30?80?20 20?80?30? ? Theexampledemonstratesthatonly15coecientsdierentfromzeroareleftof 75 coded.[3]and[4]encloseadescriptionofrunandlevelandhumancoding.the theinitial64brightnessvalues.thecoecientsarearrangedinlinearordering andthenarerunandlevelcoded.thenewcreatedsequencewillbehuman- signicantfactisthattheyareloss-freecodings.fig.3c)showstheresultof thebacktransformation.

5 5 a) b) c) Fig.3.\Dotoverthei":a)original,b)rasteredc)afterdecompression Input Motion Estimationand Motion Compensation 6Output Compensation Discrete Cosine Transform Cosine Transform InverseDiscrete Quantization Quantization Inverse Coding Model EmbedExtract? Model Decoder Entropy Coder Entropy SS??SSS??HHHHH Decoder Fig.4.InformationowintheH.261Codec[4] Transmission 666 -

6 65SignalPath Apreciseknowledgeofthesignalpathisimportantinordertobeabletoestimate thesafetyofasteganographictechnique.fromthecameratothecodedsequence ofpictures,thesignalpathissubjecttolossesbytransformationsaswellasto inuencesandtodisturbances.inthefollowing,sometransformationpointson thepatharedesignated,andinparentheses,thealteredquantity. imageoftheoriginalispreprocessedopticallybythelensofthecamera.additionally,attitudeaperturesetting(depthoffocus),thefocuses(partofhigh videofrequencies),thefocallength(detail,videodepth)andthequalityofthe Theappearanceoftheoriginalisinuencedbythelightingconditions.The lens(distortion)contributeessentially.throughdispersion,thefocusesaredependentonthecoloroflight.thelightisusuallytransformedintoanelectrical signalinthecamerabyachargecoupleddevice(ccd).thetinyccdsare characterizedthroughtheirhighsensitivitytolight.thelightinfrontofthe about380000photosensitivepointsislteredbymanycolored,narrow,vertical stripes.eachthreeadjacentsensors,receivingrespectivelyred,green,andblue lteredlight,makeonepixel.thehorizontaldistanceofthethreesensorsisonly apartialpixeldistanceandthus,isneglected.accdhasatemporalinertness (thereaderpossiblyobservedthe\tracing"inthecaseofacamerapanshot) andisoperatedwithaspecicsamplingfrequency.afterwards,thealteredand runsthroughacircuitwhichcontainssemiconductors(temperaturedependence, rasteredimageisavailableintheformofanelectricalsignal.inthisform,it whichcontainstheimagewhichisnowevenmorecoarselyrasteredthaninthe transmittedtothedevicedriver.2adatastructureinthergbformatresults, camera.onthevideocardinthecomputerthepictureislocked,digitizedand noise),anditischangedintoantscorpalsignal.thesignalpathnowleads tothecomputeroveracoaxialcable(spectralphaseshift,attenuation)fromthe boundarytodeterminism(seefig.5).allfurtherprocessingstepsaredigitaland NTSCorPALsignal.Withthelaststeponthesignalpath,weexceededthe deterministic.withthetransformationandquantization,desirableroundingerrorsoccur.aloss-freeentropycodingcompressesthedatabetweenquantization andtransfer. -non-deterministic Processing - lossy Processing deterministic,embedding?-deterministic, Fig.5.Sectionsofthesignalpath loss-free Processing 2Oftenonlytheinterfaceofthedevicedriverisdocumented.Theprogrammeris unabletoseparatetheactivitiesofthevideocardandthoseofthedevicedriver.

7 meansthatresultingoutputsignalsdierfromeachotherwithhighprobability Thesignalpathcanbedividedintothreeparts.Non-deterministicprocessing7 inthecaseofidenticalinputsignals. noiselevelisdependentoftheconsideredbandwidth.theimageincorporated linespersecond(for25fullframes).thevoltagewithinalinevariesduringhorizontalcolorchange,withverticalfromlinetoline.therefore,uprightbrightness Anexampleisthenoiseofthesemiconductordevicesmentionedalready.The bythecameraisledinthepalsignallinebylinefromtoptobottom,15625 modicationsareputinthesignalatabandwidthamaximumof8khz(oneline iswhite,onelineisblack,alternating).upto800imageelementsperlinecan beplacedincomparisontothis,whichcorrespondstoabandwidthof6mhz. Thebandwidthforhorizontalvideofrequencies{andthereforethenoiselevel{ isupto800timesaslargeasthebandwidthforverticalvideofrequencies. whichisincludedintheccvssignal.lineinterlacingdividesafullframeinto twohalfframes.ifonenumbersthelinesofafullframefromtoptobottom,the rstframecontainsalloddlinesandthesecondframeallevenlines.therefore, twostraightadjacentlinesofthefullframeare1 Twoscanlinesarealignedbymeansofthehorizontalsynchronizationpulse other.sincethehalfframesarealsoregisteredattheframerate,thescreen contentcanalreadyhavechanged. mightbeplacedinformat720by540.threeadjacentsensorswillbesummarized Herefollowsanexamplewithnumbers.Theabout380000sensorsofaCCD 50frameseparatedfromeach asoneimagepoint(rgb),althoughthesensorshaveadistanceof1 spectrum. theimagecontentof110pixelsallowsconsiderablemodicationsofthefrequency length.thishorizontaldistanceis,referringtothesmallesth.261format(176by 144),14pixeldistance.Table1shows,thatalreadyahorizontaldisplacementof 720line generatedwithhorizontaldephasingandtransformed.thedephasingresults ifterm2y+1isreplacedby2y+1:2inequation1.throughconsideration offig.1,itisobviousthatahorizontal\dephasing"ofthebaseimagesbk;0 bringsnochange.underexclusionofthecoecientsf(0;0)(basebrightness) WedevelopedalittleprogramwhichcreatesTable1whenbaseimagesare andf(k;n)(appropriateforthebaseimage),thecoecientf(k0;n0)withthe truncatedvaluesduringcomputation.inthelineforb0;1,thecoecientwiththe inbracketsarenottobetracedbacktodisplacementandcanbeexplainedby strongestdieringamountprobablyisf(0;0).sincethiscoecientisexcluded largestabsolutevaluewasalwayssearchedinthetransformedmatrix.thevalues fromconsideration,thesmallernextappears.otherwise,forn>0,thefollowing patternisvalid: thatcoecientf(k0;n0)currentlychangesby1.sincethecoecientsareinteger, Columnfmincontainstheminimumamountforthecoecientf(k;n)from n0=n?1andf(k0;n0) k0=k f(k;n)n3% amodicationlessthan1isnotpossible.

8 8 Table1.RelativechangeofDCTcoecientsf(k0;n0)whilehorizontaldephasingof baseimagesbk;nby1 knk0n0f(k0;n0) 00{{(0.00)%(1) 10pixel f(k;n)fmin % 6.75% 9.19% knk0n0f(k0;n0) % 15.16% 18.90% (0.00)%(1) (0.27)%(369) % 3.61% % f(k;n)fmin % % % % (0.13)%(780) 12.28% 15.13% 18.98% 24.55% (0.14)%(736) 12.29% % % % % % % % % % (0.14)%(737) 12.18% 15.19% 18.82% 24.62% (0.26)%(390) 12.30% % % % % % % % % % 9.29% % 15.16% 18.98% 24.55% (0.14)%(736) 15.21% 18.82% % % 6.80% % 15.16% 18.98% 24.60% 9.28%

9 6Algorithm 9 time,wewanttoshowanunveriablemodication,unveriableinthesenseof Inthischapterwewilldiscusstheimage(dotoverthei)ofChapter4again.This changescauseanimperceptiblehorizontaldislocationoftheimage,thealgorithmdoesnotinuenceso-calledmotionvectors,atleastnotinadirectway.a motioncompensationstep(seefig.4)isnotnecessaryfortheimplementation ofthissteganographicvideoconferencingsystem.anattackercouldgetmore changethecarriersignal.theheartofasteganographicalgorithmisaprocess thecalculatedexampleinchapter5.whenembeddingsomething,wehaveto thatchangesthesignal.inourcaseitchangesdctcoecients.althoughthe onlyonceasakeyframe.hence,itistransmittedandusedforsteganography easierforsteganographers.anunchangingpictureinfrontofthecameracomes forembedding.however,deltaframecodingincaseofstillimagesmakeslife whichhecouldmatchagainsttheactualframe.thiswouldreducethespace preciseimagedatabyinterpolatingconsecutiveframesofanunchangingpicture steganographicprocessing. agecontainabigcoecient(seefminintable1)makingthemsuitablefor onlyonce.itisveryunlikelythatthedierence(ordelta)framesofastillim- a) b) c) d) e) f) (unchanged),c)afterdecompression(changedbyalgorithm),d)by115pixelshifted Fig.6.\Dotoverthei"andhorizontalshifting:a)original,b)afterdecompression original,e)movedimageaftergrating,f)movedimageafterdecompression result,theabsolutevalueofoneofthedctcoecientsaccordingtotable1is highercontrast. largeenoughtoallowamodication.(refertocoecientf(0;2)intheexample.) Thefollowingmatrixincludesthe64brightnessvaluesoftheoriginalimagewith Thecontrastoftheoriginalimagehasbeenincreased(seeFig.6a)).Asa

10 ThefollowingleftmatrixincludestheDCTcoecientsafterquantization. 75 Theboldhighlightedcoecientf(0;2)allowsamodicationof6.75%,which means160:0675=1:08.therightmatrixshowsthismodicationforf(0;1). 264?160?503020?60 40?160?60? ? ?1?160?60?20 64?160?503020?20? Afterrecovery,thefollowingmatrixesofbrightnessvaluesresult,presented 75 infig.6b)andc),too.themodicationleadstoaslightshiftingtotheright The\natural"shiftingasacomparison:Fig.6d)showstheoriginal,shifted 75 tionofthecoecient. Theshiftingoftheoriginalimagewouldhavecausedamoreintensivemodica- transformationandquantizationoftheleftfollowingmatrix(seealsofig.6e). by115pixel.thecoecientspresentedintherightfollowingmatrixresultfrom ?2?160?60?20 64?160?513020?20?

11 Finally,Fig.6f)showsthefollowing,recoveredmatrix Astheexampleshows,early,non-deterministiceectsatthebeginningof 75 7Implementation thesignalpathcanbereproducedinalaterpart(seefig.5). coecients.blocksare\suitable"iftheyincludeacoecientwhichislarger exploitstheeectdescribedinchapter6:thefrequencyspectrumchangesconsiderablyalreadyatminorchangingsofthephasingoftheimage. Theimplementedsteganographicfunction\Embedding"(seethemodelin[7]) thanitsminimumamountfmin(seetable1).inthesourcecode,allminimum amountsarerepresentedbydelta[].allotherblocksare\unsuitable"andwill betransmittedwithoutsteganographicmodication. Atrst,wedistinguishbetween\suitable"and\unsuitable"blocksofDCT */ /*Tobeclassifiedas"suitable",ablockmustcontainone unsignedintdelta[64]={ coefficientgreaterorequaltoitscorrespondentvalue inthefollowingmatrix. -1,-1,-1,-1,-1,-1,-1,-1, -1,28,28,28,29,28,28,28, 15,15,15,15,15,15,15,15, 11,11,11,11,11,11,11,11, 9,9,9,9,9,9,9,9, /*-1meansinfinity*/ }; 5,5,5,5,5,5,5,5 6,6,6,6,6,6,6,6, 7,7,7,7,7,7,7,7, /*stego_in(p)isthesteganographicfunction"embedding". */ Theparameterppointstoamatrixof64coefficients.

12 12 voidstego_in(int*p) { inti,most_suitable,sum_of_block,is_stego,*steg_ptr; is_stego=0; for(i=1;i<64;i++){/*skipdccoefficientp[0]*/ sum_of_block=0;/*forsum(mod2)*/ if(p[i]){ sum_of_block+=abs(p[i]); /*1means"suitable"block*/ if(abs(p[i])>=delta[i]){ /*coefficientlargeenough?*/ is_stego=1; /*considernon-zerocoefficients*/ /*moresuitable?thenkeepthepointer*/ /*"suitable"block*/ /*sumup*/ if(abs(p[i])-delta[i]>=most_suitable){ steg_ptr=&p[i-8];/*thisisf(k',n')*/ } } } } most_suitable=abs(p[i])-delta[i]; embedding,theblockwillbetransmittedunchanged.iftheparityisnotequal, 2sumofitscoecients(akindofparity).Iftheparityisequaltothenextbitfor...Forablockclassiedassuitable,itsfurthertreatmentdependsonthemodulo- ithastobechanged....if(is_stego) /*comparethemodulo-2sumwiththenextbittoembed*/ if((sum_of_block&1)!=get_bit_to_embed()){ if(*steg_ptr>0) /*decrementabs(*steg_ptr),thecoefficient*/ /*suitableblock?*/ elseif(*steg_ptr<0) (*steg_ptr)--; }Letf(k;n)bethecoecientofasuitableblockwhich,correspondingto } else/*0==>1*/ (*steg_ptr)++; *steg_ptr=1; Table1,allowsthemaximummodication.Inthiscase,theabsolutevalueof thecoecientf(k;n?1)willbedecreasedby1orifitiszero,setto1.this way,acoecientofablockischangedby1anditsparityips.

13 necessary.thewholescenarioisshowninfig.7.therecipientreceivessuitable Allchangedblocksaretransmittedaswellasthose,wherenochangewas 13 andunsuitableblockswhichareseparatedbythesamecriteriaasatthesender. Ithastoberemarkedthatchangedsuitableblocks(suitableblockswithipped parity)willalwaysstaysuitableblocksbecausethecoecientf(k;n)hasnot beenchanged,butfulllsthecriterion\suitable". imagereconstruction.thesteganographicalgorithmpresentedhereactslikea bitsofthesuitableblockssequentially.therecipientsystemusesallblocksfor quantizationwithahigherdivisor.itincreasesthecompressionratesothatthe introducederrorlooksnatural.alowerquantizershouldequalizetheeectof Therecipientcanextracttheembeddeddatathroughreadingouttheparity thealgorithm. voidstego_out(int*p)/*steganographicfunction"extraction"*/ { inti,sum_of_block,is_stego; sum_of_block=0; is_stego=0; for(i=1;i<64;i++){ if(p[i]){ sum_of_block+=abs(p[i]);/*sumup*/ /*1means"suitable"block*/ /*considernon-zerocoefficients*/ /*formod-2sum*/ /*coefficientlargeenough?*/ if(abs(p[i])>=delta[i]) }InFig.8weshowthesurfaceoftheapplication.ivsdisthedaemonwhich }if(is_stego)put_embedded_bit(sum_of_block&1); } is_stego=1; /*YES!suitableblock!*/ otherdaemons(single-ormulticast-addresses).afterestablishingthevideoconferenceconnection,theuseroftheconferencewithsteganographicenhancement receivesconferencecalls.permouseclickitispossibletoopenawindowtocall andonefordisplayingtheembeddedmessagesofthecommunicatingpartner. Theapplicationiscomparabletoacombinationofavideoconferenceandthe Unixstandardcommandtalk3. 8Conclusion Throughcompression,asusedwithvideoconferencing,theleastsignicantbits gainimportance,soeverybitofthecompressedsignalcontributesasignicant parttothepicture.thedetectionofarandomreplacementofthesebitsis hastwoadditionalwindows:onefortheinputoftext(thesecretmessagetohide) 3talkisacommunicationprogramforterminals.

14 14 Embedding digital brightness values Extracting compressed video signal (embedded data) Transformation Entropy Decoding unsuitable measure the distance to quantized value detect whether block is suitable secret message secret message calculate modulo-2 sum Quantization lossy unsuitable Inverse detect whether block is suitable Quantization calculate modulo-2 sum sum=bit compare sum with the bit to embed change one coefficient Fig.7.EmbeddingandExtracting by 1, if necessary Entropy Coding loss-free Inverse Transformation compressed video signal (embedded data) digital brightness values totheunchangedcarrier,whichshouldneverleavethesecuritydomain.we carrier,makingitimpossibletodetectthesechangeswithoutdirectcomparison possibleasshownforjstegin[8].however,itispossibletochangepartsofthe Transmission raiseanysuspicionforapossibleattacker.forthisreason,wescrutinisedthe picturereceptionclosely. analysisoftheinputdevicesshowsfreespacespermittingembeddeddata.if steganographictechniquessimulatepeculiaritiesofacamera,thechangesdonot usespecialfeaturesoftheinputdevices,suchasacameraorscanner.the ceptibly.adirectcomparisonwiththeoriginalallowsdierentiation,butthis stilldoesnotenabletheobservertodiscernbetweentheoriginalandthealtered signals.furthermore,thesendermerelytransmitsthechangedframes.inthis manner,asecretmessagecanbeembedded.theslighthorizontaldephasingis Ouralgorithmreproducestheseeectsarticially;thesignalchangesimper- unnoticeable. thisitisnecessarytoseparatethealgorithmfromthesecrets.thesimplest receiverneedthesamekeyandproceduretogeneratethesebitsandusethem possibilityisthegenerationofpseudorandombits.boththesenderandthe asapseudoone-timepad.becausethedistributionofthesebitshasthesame Algorithmsareonlytrustworthy,whentheyareopentopublicscrutiny.For randomuniformityasbitsextractedfromanyvideoconference,theattackercan notdiscernbetweenanormalvideoconferenceandoneinwhichsecretdatahas beenembeddedafterencryption. picture,becauseitisimpossibletoembeddatainblackframes. phoneconversation(upto8kbit/s).thisdependsuponthetextureofthe InanISDNvideoconferencingsystemitispossibletoembedaGSMtele-

15 15 References 1.IngemarJ.Cox,JoeKilian,TomLeighton,TatalShamoon,ASecure,RobustWa- 2.ElkeFranz,AnjaJerichow,SteenMoller,AndreasPtzmann,IngoStierand: termarkformultimedia,in:proceedings:informationhiding.workshop,cam- Fig.8.Userinterfaceoftheimplementedapplication 3.CCITTRecommendationH.261,VideoCodecForAudiovisualServicesAtp64 Cambridge,U.K.,May/June,1996,LNCS1174. ComputerBasedSteganography.In:Proceedings:InformationHiding.Workshop, 7.BirgitPtzmann:InformationHidingTerminology.In:Proceedings:Information 6.MaritKohntopp,SteganographiealsVerschlusselungstechnik,iX4/ AndyC.Hung,PVRG-P64Codec1.1,StanfordUniversity, NeilF.Johnson,Steganography,GeorgeMasonUniversity,1996 kbit/s,genf, RobertTinsley,SteganographyandJPEGCompression,FinalYearProjectReport,UniversityofWarwick,1996 Hiding.Workshop,Cambridge,U.K.,May/June,1996,LNCS.

16 169.ftp://idea.sec.dsi.unimi.it/pub/security/crypt/code/s-tools4.zip 10.ftp://ftp.funet.fi/pub/crypt/steganography/ ftp://ftp.funet.fi/pub/crypt/mirrors/idea.sec.dsi.unimi.it/ cypherpunks/steganography/mandelsteg1.0.tar.gz

Video-Conferencing System

Video-Conferencing System Video-Conferencing System Evan Broder and C. Christoher Post Introductory Digital Systems Laboratory November 2, 2007 Abstract The goal of this project is to create a video/audio conferencing system. Video

More information

Introduction to image coding

Introduction to image coding Introduction to image coding Image coding aims at reducing amount of data required for image representation, storage or transmission. This is achieved by removing redundant data from an image, i.e. by

More information

Study and Implementation of Video Compression Standards (H.264/AVC and Dirac)

Study and Implementation of Video Compression Standards (H.264/AVC and Dirac) Project Proposal Study and Implementation of Video Compression Standards (H.264/AVC and Dirac) Sumedha Phatak-1000731131- sumedha.phatak@mavs.uta.edu Objective: A study, implementation and comparison of

More information

Reading.. IMAGE COMPRESSION- I IMAGE COMPRESSION. Image compression. Data Redundancy. Lossy vs Lossless Compression. Chapter 8.

Reading.. IMAGE COMPRESSION- I IMAGE COMPRESSION. Image compression. Data Redundancy. Lossy vs Lossless Compression. Chapter 8. Reading.. IMAGE COMPRESSION- I Week VIII Feb 25 Chapter 8 Sections 8.1, 8.2 8.3 (selected topics) 8.4 (Huffman, run-length, loss-less predictive) 8.5 (lossy predictive, transform coding basics) 8.6 Image

More information

Figure 1: Relation between codec, data containers and compression algorithms.

Figure 1: Relation between codec, data containers and compression algorithms. Video Compression Djordje Mitrovic University of Edinburgh This document deals with the issues of video compression. The algorithm, which is used by the MPEG standards, will be elucidated upon in order

More information

Multi-factor Authentication in Banking Sector

Multi-factor Authentication in Banking Sector Multi-factor Authentication in Banking Sector Tushar Bhivgade, Mithilesh Bhusari, Ajay Kuthe, Bhavna Jiddewar,Prof. Pooja Dubey Department of Computer Science & Engineering, Rajiv Gandhi College of Engineering

More information

JPEG Image Compression by Using DCT

JPEG Image Compression by Using DCT International Journal of Computer Sciences and Engineering Open Access Research Paper Volume-4, Issue-4 E-ISSN: 2347-2693 JPEG Image Compression by Using DCT Sarika P. Bagal 1* and Vishal B. Raskar 2 1*

More information

FacultyofComputingandInformationTechnology DepartmentofRoboticsandDigitalTechnology TechnicalReport93-11

FacultyofComputingandInformationTechnology DepartmentofRoboticsandDigitalTechnology TechnicalReport93-11 FacultyofComputingandInformationTechnology DepartmentofRoboticsandDigitalTechnology TechnicalReport93-11 TheTheoryofCCITTRecommendationH.261, p64kbit/s"andreviewofsuchacodec \VideoCodecforAudiovisualServicesat

More information

A Robust and Lossless Information Embedding in Image Based on DCT and Scrambling Algorithms

A Robust and Lossless Information Embedding in Image Based on DCT and Scrambling Algorithms A Robust and Lossless Information Embedding in Image Based on DCT and Scrambling Algorithms Dr. Mohammad V. Malakooti Faculty and Head of Department of Computer Engineering, Islamic Azad University, UAE

More information

Evaluating Wavelet Tranforms for Video Conferencing Applications. Second quarter report (Oct Dec, 2008)

Evaluating Wavelet Tranforms for Video Conferencing Applications. Second quarter report (Oct Dec, 2008) ICT R&D Funded Project Evaluating Wavelet Tranforms for Video Conferencing Applications Second quarter report (Oct Dec, 2008) Principal Investigators: Dr. Shahid Masud and Dr. Nadeem Khan Dept of Computer

More information

Watermarking Techniques for Protecting Intellectual Properties in a Digital Environment

Watermarking Techniques for Protecting Intellectual Properties in a Digital Environment Watermarking Techniques for Protecting Intellectual Properties in a Digital Environment Isinkaye F. O*. and Aroge T. K. Department of Computer Science and Information Technology University of Science and

More information

Security and protection of digital images by using watermarking methods

Security and protection of digital images by using watermarking methods Security and protection of digital images by using watermarking methods Andreja Samčović Faculty of Transport and Traffic Engineering University of Belgrade, Serbia Gjovik, june 2014. Digital watermarking

More information

Image Compression through DCT and Huffman Coding Technique

Image Compression through DCT and Huffman Coding Technique International Journal of Current Engineering and Technology E-ISSN 2277 4106, P-ISSN 2347 5161 2015 INPRESSCO, All Rights Reserved Available at http://inpressco.com/category/ijcet Research Article Rahul

More information

Study and Implementation of Video Compression standards (H.264/AVC, Dirac)

Study and Implementation of Video Compression standards (H.264/AVC, Dirac) Study and Implementation of Video Compression standards (H.264/AVC, Dirac) EE 5359-Multimedia Processing- Spring 2012 Dr. K.R Rao By: Sumedha Phatak(1000731131) Objective A study, implementation and comparison

More information

How To Improve Performance Of The H264 Video Codec On A Video Card With A Motion Estimation Algorithm

How To Improve Performance Of The H264 Video Codec On A Video Card With A Motion Estimation Algorithm Implementation of H.264 Video Codec for Block Matching Algorithms Vivek Sinha 1, Dr. K. S. Geetha 2 1 Student of Master of Technology, Communication Systems, Department of ECE, R.V. College of Engineering,

More information

Conceptual Framework Strategies for Image Compression: A Review

Conceptual Framework Strategies for Image Compression: A Review International Journal of Computer Sciences and Engineering Open Access Review Paper Volume-4, Special Issue-1 E-ISSN: 2347-2693 Conceptual Framework Strategies for Image Compression: A Review Sumanta Lal

More information

Transform-domain Wyner-Ziv Codec for Video

Transform-domain Wyner-Ziv Codec for Video Transform-domain Wyner-Ziv Codec for Video Anne Aaron, Shantanu Rane, Eric Setton, and Bernd Girod Information Systems Laboratory, Department of Electrical Engineering Stanford University 350 Serra Mall,

More information

Steganography Based Seaport Security Communication System

Steganography Based Seaport Security Communication System , pp.302-306 http://dx.doi.org/10.14257/astl.2014.46.63 Steganography Based Seaport Security Communication System Yair Wiseman 1, 1 Computer Science Department Ramat-Gan 52900, Israel wiseman@cs.biu.ac.il

More information

Huffman Movement DCT. Encoding H.261 Detection. video Raw video Interframe coding data. Inverse Inverse Memory

Huffman Movement DCT. Encoding H.261 Detection. video Raw video Interframe coding data. Inverse Inverse Memory CopyrightIEEE/TransactionsonNetworking,June1996 VideoconferencingintheInternet ThierryTurlettiandChristianHuitema Abstract ThispaperdescribestheINRIAVideoconferencingSystem(ivs),alowbandwidthtool forreal-timevideobetweenworkstationsonthe

More information

PCM Encoding and Decoding:

PCM Encoding and Decoding: PCM Encoding and Decoding: Aim: Introduction to PCM encoding and decoding. Introduction: PCM Encoding: The input to the PCM ENCODER module is an analog message. This must be constrained to a defined bandwidth

More information

Mike Perkins, Ph.D. perk@cardinalpeak.com

Mike Perkins, Ph.D. perk@cardinalpeak.com Mike Perkins, Ph.D. perk@cardinalpeak.com Summary More than 28 years of experience in research, algorithm development, system design, engineering management, executive management, and Board of Directors

More information

Introduction to Medical Image Compression Using Wavelet Transform

Introduction to Medical Image Compression Using Wavelet Transform National Taiwan University Graduate Institute of Communication Engineering Time Frequency Analysis and Wavelet Transform Term Paper Introduction to Medical Image Compression Using Wavelet Transform 李 自

More information

Sachin Dhawan Deptt. of ECE, UIET, Kurukshetra University, Kurukshetra, Haryana, India

Sachin Dhawan Deptt. of ECE, UIET, Kurukshetra University, Kurukshetra, Haryana, India Abstract Image compression is now essential for applications such as transmission and storage in data bases. In this paper we review and discuss about the image compression, need of compression, its principles,

More information

For Articulation Purpose Only

For Articulation Purpose Only E305 Digital Audio and Video (4 Modular Credits) This document addresses the content related abilities, with reference to the module. Abilities of thinking, learning, problem solving, team work, communication,

More information

AUDIO CODING: BASICS AND STATE OF THE ART

AUDIO CODING: BASICS AND STATE OF THE ART AUDIO CODING: BASICS AND STATE OF THE ART PACS REFERENCE: 43.75.CD Brandenburg, Karlheinz Fraunhofer Institut Integrierte Schaltungen, Arbeitsgruppe Elektronische Medientechnolgie Am Helmholtzring 1 98603

More information

Video Coding Technologies and Standards: Now and Beyond

Video Coding Technologies and Standards: Now and Beyond Hitachi Review Vol. 55 (Mar. 2006) 11 Video Coding Technologies and Standards: Now and Beyond Tomokazu Murakami Hiroaki Ito Muneaki Yamaguchi Yuichiro Nakaya, Ph.D. OVERVIEW: Video coding technology compresses

More information

A comprehensive survey on various ETC techniques for secure Data transmission

A comprehensive survey on various ETC techniques for secure Data transmission A comprehensive survey on various ETC techniques for secure Data transmission Shaikh Nasreen 1, Prof. Suchita Wankhade 2 1, 2 Department of Computer Engineering 1, 2 Trinity College of Engineering and

More information

Lossless Medical Image Compression using Predictive Coding and Integer Wavelet Transform based on Minimum Entropy Criteria

Lossless Medical Image Compression using Predictive Coding and Integer Wavelet Transform based on Minimum Entropy Criteria Lossless Medical Image Compression using Predictive Coding and Integer Wavelet Transform based on Minimum Entropy Criteria 1 Komal Gupta, Ram Lautan Verma, 3 Md. Sanawer Alam 1 M.Tech Scholar, Deptt. Of

More information

Voice---is analog in character and moves in the form of waves. 3-important wave-characteristics:

Voice---is analog in character and moves in the form of waves. 3-important wave-characteristics: Voice Transmission --Basic Concepts-- Voice---is analog in character and moves in the form of waves. 3-important wave-characteristics: Amplitude Frequency Phase Voice Digitization in the POTS Traditional

More information

Volume 2, Issue 12, December 2014 International Journal of Advance Research in Computer Science and Management Studies

Volume 2, Issue 12, December 2014 International Journal of Advance Research in Computer Science and Management Studies Volume 2, Issue 12, December 2014 International Journal of Advance Research in Computer Science and Management Studies Research Article / Survey Paper / Case Study Available online at: www.ijarcsms.com

More information

3. Interpolation. Closing the Gaps of Discretization... Beyond Polynomials

3. Interpolation. Closing the Gaps of Discretization... Beyond Polynomials 3. Interpolation Closing the Gaps of Discretization... Beyond Polynomials Closing the Gaps of Discretization... Beyond Polynomials, December 19, 2012 1 3.3. Polynomial Splines Idea of Polynomial Splines

More information

CHAPTER 2 LITERATURE REVIEW

CHAPTER 2 LITERATURE REVIEW 11 CHAPTER 2 LITERATURE REVIEW 2.1 INTRODUCTION Image compression is mainly used to reduce storage space, transmission time and bandwidth requirements. In the subsequent sections of this chapter, general

More information

JPEG compression of monochrome 2D-barcode images using DCT coefficient distributions

JPEG compression of monochrome 2D-barcode images using DCT coefficient distributions Edith Cowan University Research Online ECU Publications Pre. JPEG compression of monochrome D-barcode images using DCT coefficient distributions Keng Teong Tan Hong Kong Baptist University Douglas Chai

More information

Information, Entropy, and Coding

Information, Entropy, and Coding Chapter 8 Information, Entropy, and Coding 8. The Need for Data Compression To motivate the material in this chapter, we first consider various data sources and some estimates for the amount of data associated

More information

How To Recognize Voice Over Ip On Pc Or Mac Or Ip On A Pc Or Ip (Ip) On A Microsoft Computer Or Ip Computer On A Mac Or Mac (Ip Or Ip) On An Ip Computer Or Mac Computer On An Mp3

How To Recognize Voice Over Ip On Pc Or Mac Or Ip On A Pc Or Ip (Ip) On A Microsoft Computer Or Ip Computer On A Mac Or Mac (Ip Or Ip) On An Ip Computer Or Mac Computer On An Mp3 Recognizing Voice Over IP: A Robust Front-End for Speech Recognition on the World Wide Web. By C.Moreno, A. Antolin and F.Diaz-de-Maria. Summary By Maheshwar Jayaraman 1 1. Introduction Voice Over IP is

More information

A Digital Audio Watermark Embedding Algorithm

A Digital Audio Watermark Embedding Algorithm Xianghong Tang, Yamei Niu, Hengli Yue, Zhongke Yin Xianghong Tang, Yamei Niu, Hengli Yue, Zhongke Yin School of Communication Engineering, Hangzhou Dianzi University, Hangzhou, Zhejiang, 3008, China tangxh@hziee.edu.cn,

More information

An Incomplete Cryptography based Digital Rights Management with DCFF

An Incomplete Cryptography based Digital Rights Management with DCFF An Incomplete Cryptography based Digital Rights Management with DCFF Ta Minh Thanh Department of Computer Science Tokyo Institute of Technology 2-12-2, Ookayama, Meguro, Tokyo, 152-8552, Japan. Email:thanhtm@ks.cs.titech.ac.jp

More information

Comparison of different image compression formats. ECE 533 Project Report Paula Aguilera

Comparison of different image compression formats. ECE 533 Project Report Paula Aguilera Comparison of different image compression formats ECE 533 Project Report Paula Aguilera Introduction: Images are very important documents nowadays; to work with them in some applications they need to be

More information

Video Coding Basics. Yao Wang Polytechnic University, Brooklyn, NY11201 yao@vision.poly.edu

Video Coding Basics. Yao Wang Polytechnic University, Brooklyn, NY11201 yao@vision.poly.edu Video Coding Basics Yao Wang Polytechnic University, Brooklyn, NY11201 yao@vision.poly.edu Outline Motivation for video coding Basic ideas in video coding Block diagram of a typical video codec Different

More information

REGION OF INTEREST CODING IN MEDICAL IMAGES USING DIAGNOSTICALLY SIGNIFICANT BITPLANES

REGION OF INTEREST CODING IN MEDICAL IMAGES USING DIAGNOSTICALLY SIGNIFICANT BITPLANES REGION OF INTEREST CODING IN MEDICAL IMAGES USING DIAGNOSTICALLY SIGNIFICANT BITPLANES Sharath T. ChandraShekar Sarayu Technologies, India Gomata L. Varanasi Samskruti, India ABSTRACT Accelerated expansion

More information

http://www.springer.com/0-387-23402-0

http://www.springer.com/0-387-23402-0 http://www.springer.com/0-387-23402-0 Chapter 2 VISUAL DATA FORMATS 1. Image and Video Data Digital visual data is usually organised in rectangular arrays denoted as frames, the elements of these arrays

More information

MPEG-1 and MPEG-2 Digital Video Coding Standards

MPEG-1 and MPEG-2 Digital Video Coding Standards Please note that the page has been produced based on text and image material from a book in [sik] and may be subject to copyright restrictions from McGraw Hill Publishing Company. MPEG-1 and MPEG-2 Digital

More information

STUDY OF MUTUAL INFORMATION IN PERCEPTUAL CODING WITH APPLICATION FOR LOW BIT-RATE COMPRESSION

STUDY OF MUTUAL INFORMATION IN PERCEPTUAL CODING WITH APPLICATION FOR LOW BIT-RATE COMPRESSION STUDY OF MUTUAL INFORMATION IN PERCEPTUAL CODING WITH APPLICATION FOR LOW BIT-RATE COMPRESSION Adiel Ben-Shalom, Michael Werman School of Computer Science Hebrew University Jerusalem, Israel. {chopin,werman}@cs.huji.ac.il

More information

Region of Interest Access with Three-Dimensional SBHP Algorithm CIPR Technical Report TR-2006-1

Region of Interest Access with Three-Dimensional SBHP Algorithm CIPR Technical Report TR-2006-1 Region of Interest Access with Three-Dimensional SBHP Algorithm CIPR Technical Report TR-2006-1 Ying Liu and William A. Pearlman January 2006 Center for Image Processing Research Rensselaer Polytechnic

More information

MPEG Unified Speech and Audio Coding Enabling Efficient Coding of both Speech and Music

MPEG Unified Speech and Audio Coding Enabling Efficient Coding of both Speech and Music ISO/IEC MPEG USAC Unified Speech and Audio Coding MPEG Unified Speech and Audio Coding Enabling Efficient Coding of both Speech and Music The standardization of MPEG USAC in ISO/IEC is now in its final

More information

DCT-JPEG Image Coding Based on GPU

DCT-JPEG Image Coding Based on GPU , pp. 293-302 http://dx.doi.org/10.14257/ijhit.2015.8.5.32 DCT-JPEG Image Coding Based on GPU Rongyang Shan 1, Chengyou Wang 1*, Wei Huang 2 and Xiao Zhou 1 1 School of Mechanical, Electrical and Information

More information

Accelerating Wavelet-Based Video Coding on Graphics Hardware

Accelerating Wavelet-Based Video Coding on Graphics Hardware Wladimir J. van der Laan, Andrei C. Jalba, and Jos B.T.M. Roerdink. Accelerating Wavelet-Based Video Coding on Graphics Hardware using CUDA. In Proc. 6th International Symposium on Image and Signal Processing

More information

Parametric Comparison of H.264 with Existing Video Standards

Parametric Comparison of H.264 with Existing Video Standards Parametric Comparison of H.264 with Existing Video Standards Sumit Bhardwaj Department of Electronics and Communication Engineering Amity School of Engineering, Noida, Uttar Pradesh,INDIA Jyoti Bhardwaj

More information

Quality Estimation for Scalable Video Codec. Presented by Ann Ukhanova (DTU Fotonik, Denmark) Kashaf Mazhar (KTH, Sweden)

Quality Estimation for Scalable Video Codec. Presented by Ann Ukhanova (DTU Fotonik, Denmark) Kashaf Mazhar (KTH, Sweden) Quality Estimation for Scalable Video Codec Presented by Ann Ukhanova (DTU Fotonik, Denmark) Kashaf Mazhar (KTH, Sweden) Purpose of scalable video coding Multiple video streams are needed for heterogeneous

More information

Tape Drive Data Compression Q & A

Tape Drive Data Compression Q & A Tape Drive Data Compression Q & A Question What is data compression and how does compression work? Data compression permits increased storage capacities by using a mathematical algorithm that reduces redundant

More information

A Guide to MPEG Fundamentals and Protocol Analysis (Including DVB and ATSC)

A Guide to MPEG Fundamentals and Protocol Analysis (Including DVB and ATSC) (Including DVB and ATSC) M P E G T u t o r i a l A Guide to MPEG Fundamentals and Protocol Analysis (Including DVB and ATSC) ii www.tektronix.com/video_audio/ A Guide to MPEG Fundamentals and Protocol

More information

Understanding Compression Technologies for HD and Megapixel Surveillance

Understanding Compression Technologies for HD and Megapixel Surveillance When the security industry began the transition from using VHS tapes to hard disks for video surveillance storage, the question of how to compress and store video became a top consideration for video surveillance

More information

Michael W. Marcellin and Ala Bilgin

Michael W. Marcellin and Ala Bilgin JPEG2000: HIGHLY SCALABLE IMAGE COMPRESSION Michael W. Marcellin and Ala Bilgin Department of Electrical and Computer Engineering, The University of Arizona, Tucson, AZ 85721. {mwm,bilgin}@ece.arizona.edu

More information

A Secure File Transfer based on Discrete Wavelet Transformation and Audio Watermarking Techniques

A Secure File Transfer based on Discrete Wavelet Transformation and Audio Watermarking Techniques A Secure File Transfer based on Discrete Wavelet Transformation and Audio Watermarking Techniques Vineela Behara,Y Ramesh Department of Computer Science and Engineering Aditya institute of Technology and

More information

Thor High Efficiency, Moderate Complexity Video Codec using only RF IPR

Thor High Efficiency, Moderate Complexity Video Codec using only RF IPR Thor High Efficiency, Moderate Complexity Video Codec using only RF IPR draft-fuldseth-netvc-thor-00 Arild Fuldseth, Gisle Bjontegaard (Cisco) IETF 93 Prague, CZ July 2015 1 Design principles Moderate

More information

A Guide to MPEG Fundamentals and Protocol Analysis (Including DVB and ATSC)

A Guide to MPEG Fundamentals and Protocol Analysis (Including DVB and ATSC) A Guide to MPEG Fundamentals and Protocol Analysis (Including DVB and ATSC) M P E G T u t o r i a l Section 1 Introduction to MPEG...1 1.1 Convergence...1 1.2 Why Compression Is Needed...1 1.3 Principles

More information

Digital Video Coding Standards and Their Role in Video Communications

Digital Video Coding Standards and Their Role in Video Communications Digital Video Coding Standards and Their Role in Video Communications RALF SCHAFER AND THOMAS SIKORA, MEMBER, IEEE Invited Paper The eficient digital representation of image and video signals has been

More information

2695 P a g e. IV Semester M.Tech (DCN) SJCIT Chickballapur Karnataka India

2695 P a g e. IV Semester M.Tech (DCN) SJCIT Chickballapur Karnataka India Integrity Preservation and Privacy Protection for Digital Medical Images M.Krishna Rani Dr.S.Bhargavi IV Semester M.Tech (DCN) SJCIT Chickballapur Karnataka India Abstract- In medical treatments, the integrity

More information

MPEG Digital Video Coding Standards

MPEG Digital Video Coding Standards MPEG Digital Video Coding Standards Thomas Sikora, HHI Berlin Preprint from Digital Consumer Electronics Handbook First Edition (Editor R.Jurgens) to be published by McGRAW-Hill Book Company Chapter 9

More information

Video compression: Performance of available codec software

Video compression: Performance of available codec software Video compression: Performance of available codec software Introduction. Digital Video A digital video is a collection of images presented sequentially to produce the effect of continuous motion. It takes

More information

Implementation of a Prototype for Secure Online Payment System Using Discrete Cosine Transformation and Permutative Straddling

Implementation of a Prototype for Secure Online Payment System Using Discrete Cosine Transformation and Permutative Straddling Implementation of a Prototype for Secure Online Payment System Using Discrete Cosine Transformation and Permutative Straddling GRADUATE PROJECT REPORT Submitted to the Faculty of The School of Engineering

More information

IMAGE STEGANOGRAPHY FOR SECURE DATA TRANSMISSION USING BLOWFISH ALGORITHM

IMAGE STEGANOGRAPHY FOR SECURE DATA TRANSMISSION USING BLOWFISH ALGORITHM IMAGE STEGANOGRAPHY FOR SECURE DATA TRANSMISSION USING BLOWFISH ALGORITHM BARJINDER SINGH 1, BALPREET KAUR 2, RANJOT KAUR 3 1 Research Scholar at BBSBEC, Fatehgarh sahib 2 Lecturer at BBSBEC Fatehgarh

More information

Coding and Patterns of Data Streams

Coding and Patterns of Data Streams Characterizing Video Coding Computing in Conference Systems By G. Tuquerres (tuquerre@cs.utwente.nl) Telematics Systems and Services Twente University Abstract In this paper, a number of coding operations

More information

Lesson 7: SYSTEM-ON. SoC) AND USE OF VLSI CIRCUIT DESIGN TECHNOLOGY. Chapter-1L07: "Embedded Systems - ", Raj Kamal, Publs.: McGraw-Hill Education

Lesson 7: SYSTEM-ON. SoC) AND USE OF VLSI CIRCUIT DESIGN TECHNOLOGY. Chapter-1L07: Embedded Systems - , Raj Kamal, Publs.: McGraw-Hill Education Lesson 7: SYSTEM-ON ON-CHIP (SoC( SoC) AND USE OF VLSI CIRCUIT DESIGN TECHNOLOGY 1 VLSI chip Integration of high-level components Possess gate-level sophistication in circuits above that of the counter,

More information

DVB-S2 and DVB-RCS for VSAT and Direct Satellite TV Broadcasting

DVB-S2 and DVB-RCS for VSAT and Direct Satellite TV Broadcasting Hands-On DVB-S2 and DVB-RCS for VSAT and Direct Satellite TV Broadcasting Course Description This course will examine DVB-S2 and DVB-RCS for Digital Video Broadcast and the rather specialised application

More information

Using Linear Fractal Interpolation Functions to Compress Video. The paper in this appendix was presented at the Fractals in Engineering '94

Using Linear Fractal Interpolation Functions to Compress Video. The paper in this appendix was presented at the Fractals in Engineering '94 Appendix F Using Linear Fractal Interpolation Functions to Compress Video Images The paper in this appendix was presented at the Fractals in Engineering '94 Conference which was held in the École Polytechnic,

More information

Digital terrestrial television broadcasting Audio coding

Digital terrestrial television broadcasting Audio coding Digital terrestrial television broadcasting Audio coding Televisão digital terrestre Codificação de vídeo, áudio e multiplexação Parte 2: Codificação de áudio Televisión digital terrestre Codificación

More information

Reversible Data Hiding for Security Applications

Reversible Data Hiding for Security Applications Reversible Data Hiding for Security Applications Baig Firdous Sulthana, M.Tech Student (DECS), Gudlavalleru engineering college, Gudlavalleru, Krishna (District), Andhra Pradesh (state), PIN-521356 S.

More information

Video Authentication for H.264/AVC using Digital Signature Standard and Secure Hash Algorithm

Video Authentication for H.264/AVC using Digital Signature Standard and Secure Hash Algorithm Video Authentication for H.264/AVC using Digital Signature Standard and Secure Hash Algorithm Nandakishore Ramaswamy Qualcomm Inc 5775 Morehouse Dr, Sam Diego, CA 92122. USA nandakishore@qualcomm.com K.

More information

Robust Blind Watermarking Mechanism For Point Sampled Geometry

Robust Blind Watermarking Mechanism For Point Sampled Geometry Robust Blind Watermarking Mechanism For Point Sampled Geometry Parag Agarwal Balakrishnan Prabhakaran Department of Computer Science, University of Texas at Dallas MS EC 31, PO Box 830688, Richardson,

More information

Module 8 VIDEO CODING STANDARDS. Version 2 ECE IIT, Kharagpur

Module 8 VIDEO CODING STANDARDS. Version 2 ECE IIT, Kharagpur Module 8 VIDEO CODING STANDARDS Version ECE IIT, Kharagpur Lesson H. andh.3 Standards Version ECE IIT, Kharagpur Lesson Objectives At the end of this lesson the students should be able to :. State the

More information

Trends and Perspectives in Image and Video Coding

Trends and Perspectives in Image and Video Coding Trends and Perspectives in Image and Video Coding THOMAS SIKORA, SENIOR MEMBER, IEEE Invited Paper The objective of the paper is to provide an overview on recent trends and future perspectives in image

More information

Automatic Detection of Emergency Vehicles for Hearing Impaired Drivers

Automatic Detection of Emergency Vehicles for Hearing Impaired Drivers Automatic Detection of Emergency Vehicles for Hearing Impaired Drivers Sung-won ark and Jose Trevino Texas A&M University-Kingsville, EE/CS Department, MSC 92, Kingsville, TX 78363 TEL (36) 593-2638, FAX

More information

Multiple Embedding Using Robust Watermarks for Wireless Medical Images

Multiple Embedding Using Robust Watermarks for Wireless Medical Images Multiple Embedding Using Robust Watermarks for Wireless Medical Images Dominic Osborne and Derek Abbott Centre for Biomedical Engineering (CBME) The University of Adelaide, SA 5005, Australia Matthew Sorell

More information

CM0340 SOLNS. Do not turn this page over until instructed to do so by the Senior Invigilator.

CM0340 SOLNS. Do not turn this page over until instructed to do so by the Senior Invigilator. CARDIFF UNIVERSITY EXAMINATION PAPER Academic Year: 2008/2009 Examination Period: Examination Paper Number: Examination Paper Title: SOLUTIONS Duration: Autumn CM0340 SOLNS Multimedia 2 hours Do not turn

More information

DTS Enhance : Smart EQ and Bandwidth Extension Brings Audio to Life

DTS Enhance : Smart EQ and Bandwidth Extension Brings Audio to Life DTS Enhance : Smart EQ and Bandwidth Extension Brings Audio to Life White Paper Document No. 9302K05100 Revision A Effective Date: May 2011 DTS, Inc. 5220 Las Virgenes Road Calabasas, CA 91302 USA www.dts.com

More information

VIDEOTELEPHONY AND VIDEOCONFERENCE OVER ISDN

VIDEOTELEPHONY AND VIDEOCONFERENCE OVER ISDN VIDEOTELEPHONY AND VIDEOCONFERENCE OVER ISDN Fernando Pereira Instituto Superior Técnico Digital Video Video versus Images Still Image Services No strong temporal requirements; no realtime notion. Video

More information

Audio Coding Algorithm for One-Segment Broadcasting

Audio Coding Algorithm for One-Segment Broadcasting Audio Coding Algorithm for One-Segment Broadcasting V Masanao Suzuki V Yasuji Ota V Takashi Itoh (Manuscript received November 29, 2007) With the recent progress in coding technologies, a more efficient

More information

VoIP Technologies Lecturer : Dr. Ala Khalifeh Lecture 4 : Voice codecs (Cont.)

VoIP Technologies Lecturer : Dr. Ala Khalifeh Lecture 4 : Voice codecs (Cont.) VoIP Technologies Lecturer : Dr. Ala Khalifeh Lecture 4 : Voice codecs (Cont.) 1 Remember first the big picture VoIP network architecture and some terminologies Voice coders 2 Audio and voice quality measuring

More information

Multidimensional Transcoding for Adaptive Video Streaming

Multidimensional Transcoding for Adaptive Video Streaming Multidimensional Transcoding for Adaptive Video Streaming Jens Brandt, Lars Wolf Institut für Betriebssystem und Rechnerverbund Technische Universität Braunschweig Germany NOSSDAV 2007, June 4-5 Jens Brandt,

More information

Standard encoding protocols for image and video coding

Standard encoding protocols for image and video coding International Telecommunication Union Standard encoding protocols for image and video coding Dave Lindbergh Polycom Inc. Rapporteur, ITU-T Q.E/16 (Media Coding) Workshop on Standardization in E-health

More information

Standards compliant watermarking for access management

Standards compliant watermarking for access management Standards compliant watermarking for access management Viresh Ratnakar and Onur G. Guleryuz Epson Palo Alto Laboratory 3145 Porter Drive, Suite 104 Palo Alto, CA 94304, USA ABSTRACT We present standards-compliant

More information

FFT Algorithms. Chapter 6. Contents 6.1

FFT Algorithms. Chapter 6. Contents 6.1 Chapter 6 FFT Algorithms Contents Efficient computation of the DFT............................................ 6.2 Applications of FFT................................................... 6.6 Computing DFT

More information

We are presenting a wavelet based video conferencing system. Openphone. Dirac Wavelet based video codec

We are presenting a wavelet based video conferencing system. Openphone. Dirac Wavelet based video codec Investigating Wavelet Based Video Conferencing System Team Members: o AhtshamAli Ali o Adnan Ahmed (in Newzealand for grad studies) o Adil Nazir (starting MS at LUMS now) o Waseem Khan o Farah Parvaiz

More information

Performance Analysis of medical Image Using Fractal Image Compression

Performance Analysis of medical Image Using Fractal Image Compression Performance Analysis of medical Image Using Fractal Image Compression Akhil Singal 1, Rajni 2 1 M.Tech Scholar, ECE, D.C.R.U.S.T, Murthal, Sonepat, Haryana, India 2 Assistant Professor, ECE, D.C.R.U.S.T,

More information

MEDICAL IMAGE COMPRESSION USING HYBRID CODER WITH FUZZY EDGE DETECTION

MEDICAL IMAGE COMPRESSION USING HYBRID CODER WITH FUZZY EDGE DETECTION MEDICAL IMAGE COMPRESSION USING HYBRID CODER WITH FUZZY EDGE DETECTION K. Vidhya 1 and S. Shenbagadevi Department of Electrical & Communication Engineering, College of Engineering, Anna University, Chennai,

More information

SSIM Technique for Comparison of Images

SSIM Technique for Comparison of Images SSIM Technique for Comparison of Images Anil Wadhokar 1, Krupanshu Sakharikar 2, Sunil Wadhokar 3, Geeta Salunke 4 P.G. Student, Department of E&TC, GSMCOE Engineering College, Pune, Maharashtra, India

More information

Fast Hybrid Simulation for Accurate Decoded Video Quality Assessment on MPSoC Platforms with Resource Constraints

Fast Hybrid Simulation for Accurate Decoded Video Quality Assessment on MPSoC Platforms with Resource Constraints Fast Hybrid Simulation for Accurate Decoded Video Quality Assessment on MPSoC Platforms with Resource Constraints Deepak Gangadharan and Roger Zimmermann Department of Computer Science, National University

More information

White paper. H.264 video compression standard. New possibilities within video surveillance.

White paper. H.264 video compression standard. New possibilities within video surveillance. White paper H.264 video compression standard. New possibilities within video surveillance. Table of contents 1. Introduction 3 2. Development of H.264 3 3. How video compression works 4 4. H.264 profiles

More information

A Secure Data Transmission By Integrating Cryptography And Video Steganography

A Secure Data Transmission By Integrating Cryptography And Video Steganography A Secure Data Transmission By Integrating Cryptography And Video Steganography Shafna P K Computer Science Department KMEA Engineering College Ernakulam, India shabanapk9999@gmail.com Abstract Advances

More information

Video Codec Requirements and Evaluation Methodology

Video Codec Requirements and Evaluation Methodology -47pt -30pt :white Font : edium t Video Codec Requirements and Evaluation Methodology www.huawei.com draft-filippov-netvc-requirements-02 Alexey Filippov, Jose Alvarez (Huawei Technologies) Contents An

More information

Measurements on MPEG2 and DVB-T signals (1)

Measurements on MPEG2 and DVB-T signals (1) Measurements on MPEG2 and DVB-T signals (1) With the expansion of multi-frequency networks (MFNs) and single-frequency networks (SFNs) for DVB-T*, there is a growing demand for measuring instruments and

More information

Using fractal compression scheme to embed a digital signature into an image

Using fractal compression scheme to embed a digital signature into an image Using fractal compression scheme to embed a digital signature into an image Joan Puate, Fred Jordan Swiss federal institute of technology Signal Processing Laboratory CH-1015 Lausanne Switzerland Email:

More information

Invisible Image Water Marking Using Hybrid DWT Compression/Decompression Technique

Invisible Image Water Marking Using Hybrid DWT Compression/Decompression Technique Invisible Image Water Marking Using Hybrid DWT Compression/Decompression Technique B.Sai Kiran M.Tech (VLSI), CMR Institute of Technology. Mr.Shahbaz Khan Associate Professor, CMR Institute of Technology.

More information

Compression techniques

Compression techniques Compression techniques David Bařina February 22, 2013 David Bařina Compression techniques February 22, 2013 1 / 37 Contents 1 Terminology 2 Simple techniques 3 Entropy coding 4 Dictionary methods 5 Conclusion

More information

Security Based Data Transfer and Privacy Storage through Watermark Detection

Security Based Data Transfer and Privacy Storage through Watermark Detection Security Based Data Transfer and Privacy Storage through Watermark Detection Gowtham.T 1 Pradeep Kumar.G 2 1PG Scholar, Applied Electronics, Nandha Engineering College, Anna University, Erode, India. 2Assistant

More information

TECHNICAL OVERVIEW OF VP8, AN OPEN SOURCE VIDEO CODEC FOR THE WEB

TECHNICAL OVERVIEW OF VP8, AN OPEN SOURCE VIDEO CODEC FOR THE WEB TECHNICAL OVERVIEW OF VP8, AN OPEN SOURCE VIDEO CODEC FOR THE WEB Jim Bankoski, Paul Wilkins, Yaowu Xu Google Inc. 1600 Amphitheatre Parkway, Mountain View, CA, USA {jimbankoski, paulwilkins, yaowu}@google.com

More information

Electronic Records Management Guidelines - File Formats

Electronic Records Management Guidelines - File Formats Electronic Records Management Guidelines - File Formats Rapid changes in technology mean that file formats can become obsolete quickly and cause problems for your records management strategy. A long-term

More information

*EP001025692B1* EP 1 025 692 B1 (19) (11) EP 1 025 692 B1 (12) EUROPEAN PATENT SPECIFICATION

*EP001025692B1* EP 1 025 692 B1 (19) (11) EP 1 025 692 B1 (12) EUROPEAN PATENT SPECIFICATION (19) Europäisches Patentamt European Patent Office Office européen des brevets *EP002692B1* (11) EP 1 02 692 B1 (12) EUROPEAN PATENT SPECIFICATION (4) Date of publication and mention of the grant of the

More information