|
|
- Darcy Bailey
- 8 years ago
- Views:
Transcription
1 SteganographyinaVideoConferencingSystem? AndreasWestfeld1andGrittaWolf2 2InstituteforOperatingSystems,DatabasesandComputerNetworks 1InstituteforTheoreticalComputerScience DresdenUniversityofTechnology D-01062Dresden,Germany Abstract.Wedescribeasteganographicsystemwhichembedssecret includesdiscretecosinetransformation(dct)based,lossycompression. securityisestablishedbyindeterminismwithinthesignalpath. Resultisthetechnicalrealisationofasteganographicalgorithmwhose messagesintoavideostream.weexaminethesignalpathwhichtypically 1Introduction Theescalationofcommunicationviacomputernetworkhasbeenlinkedtothe informationhidingexistfordigitalimageles,audioles,andinbackground soundsofphonecalls[2].therearemorethan20programsontheinternet(for increasinguseofcomputeraidedsteganography[5],[6].steganographicmethods examplesseethelistbelow). thatathirdpersoncannotdetectorevenprovethisprocess.examplesfor usuallyhidecipheredmessagesinother,harmless-lookingdatainsuchaway {S-ToolsbyAndyBrownembedsdataasleastsignicantbitsinaudioles {JstegbyDerekUphamembedsdatainJFIFimages.Itoverwritestheleast (.wav)orasleastsignicantbitsofthergbcolorvaluesingraphicles (.bmp).athirdmethodhidesdatainfreesectorsofdiskettes.severalsymmetricencryptionmethods(des,idea,...)areoeredforadditionalencryptionofthesecretdata.[9] signicantbitsofthecoecients.[8],[10] {HideandSeekbyColinMaroneyhidesdata(encryptedwithIDEA)inGIF {MandelstegbyHenryHasturcalculatesaGIFfractalfromale.Theresultingimagesareverysimilar.Dierencescanonlybeseenwhencomparing {PGE(PrettyGoodEnvelope)byRoche-CryptpacksdatainGIForJPEG les.theuseofanadditionalsecureencryptionmethodisrecommended.[12] les.[11]?thisworkissponsoredbythegermanfederalministryofeducation,science,researchandtechnology(bmbf). {StegobyJohnWalkertransformsanyletoanonsensicaltextbymeansof theircolorvalues.[13] afreechoosabledictionary.
2 2{TextobyKevinMahertransferslesintopoeticEnglishsentences(comparablewithstego,whichproducesnonsensicaltexts).[14] stereophony,colortv,videotext,traccontrolsystem(tcs),andradiodata system(rds)atfmradio. Datacamouageisalsousedforcompatibleenlargementofnorms,suchas 2VideoConferencingSystems Videoconferencesusecompressionalgorithmstoensureanacceptablequality Thispaperdoesnotdealwithwatermarkingsystemsatall[1]. evenonlowdataratesystemslikeisdn.usually,compressionmethodsarelossy whichmeansthatthereconstructedimageisnotidenticalwiththeoriginal. tempresentedinthispaperworksontheh.261standard.thisisthemost commonstandardforcompressioninvideoconferencesandisrecommendedby [3].InFig.4,wecanseethepointsforembeddingandextractingwithinthe thecomiteconsultatifinternationaltelegraphiqueettelephonique1(ccitt) Thevideoconferenceusedfortheimplementationofthesteganographicsys- H.261informationow. weneedacarrierthatallowsthepossibilityofunnoticeablemodications.signal possibilitiesfordataembeddingwehave.inchapter5weinvestigateatypical noiseandirrelevancearecommonexamplesforit.compressionmethodstryto removesignalnoiseandirrelevance.thebetterasignaliscompressed,theless Compressionanddataembeddinghavecontrarygoals.Fordataembedding signalpathfordataembedding. ThesteganographicalgorithmdescribedinChapter6embedsdataintransformedblocks.Thereforewedescribethetransformationprocessusedinthis videoconferencingsystem. image.thesubsequentquantizationremovestheinsignicantpartsoftheimage. forthehumaneye)frommarginalparts(invisibleforthehumaneye)ofthe Thetransformationemployedhastobeinvertibleinordertoregaintheessential Asuitabletransformationisameanstoseparateessentialinformation(visible 3DiscreteCosineTransformation (DCT).Ittransformesanimageof88pixelswith88=64brightnessvalues H.261,M-JPEG,MPEG,usethetwo-dimensionaldiscretecosinetransformation F(0;0):::F(7;7)into64values(so-calledDCTcoecients)f(0;0):::f(7;7) (seeequation1).thetransformationcausesnosignicantloss(roundingerrors Manydigitalvideoconferencingsystems,forinstancebasedonthestandards only).theretransformedimageresultsfrombacktransformationofthedct coecients(seeequation2).itcanalsobeunderstoodaslinearcombination Bk;n(seeFig.1). ofthedctcoecients(seeequation3andfig.2)withthedctbaseimages 1theformerCCITTisnowtheInternationalTelecommunicationUnion(ITU)
3 increasingverticalfrequency kn ????88 image increasinghorizontalfrequency Fig.1.DCTbaseimagesBk;n - =f(0;0) +f(0;1) +:::+f(7;7) Fig.2.Presentationofan88imageby64baseimageparts?
4 4 F(x;y)=7Xk=07Xn=0C(k) f(k;n)=c(k) 2C(n) 22C(n) 7Xx=07Xy=0F(x;y)cos(2x+1)k 2f(k;n)cos(2x+1)k (1) 16 cos(2y+1)n 16 (2) with F(x;y)=7Xk=07Xn=0f(k;n)Bk;n(x;y) C(z)=12p2forz=0 (3) 4AnExample 1else InordertoillustratetheDCT,wetransformadotoverthei.Fig.3showsit stronglyenlarged.aspresentedinfig.3b)thedotovertheihasagratingof 64brightnessvalues.Let'slookatitstransformedmatrix: 264?840? ? ?110?1?40 50?4?84?2?31?2?12? ? ?2?20?10 00?10?20 00?10?10 0?1 3 Thequantizationcausesanaccumulationofzerosbyapplyingastepfunction 75 (dividingandrounding)tothedctcoecients: 264?30?80?20 20?80?30? ? Theexampledemonstratesthatonly15coecientsdierentfromzeroareleftof 75 coded.[3]and[4]encloseadescriptionofrunandlevelandhumancoding.the theinitial64brightnessvalues.thecoecientsarearrangedinlinearordering andthenarerunandlevelcoded.thenewcreatedsequencewillbehuman- signicantfactisthattheyareloss-freecodings.fig.3c)showstheresultof thebacktransformation.
5 5 a) b) c) Fig.3.\Dotoverthei":a)original,b)rasteredc)afterdecompression Input Motion Estimationand Motion Compensation 6Output Compensation Discrete Cosine Transform Cosine Transform InverseDiscrete Quantization Quantization Inverse Coding Model EmbedExtract? Model Decoder Entropy Coder Entropy SS??SSS??HHHHH Decoder Fig.4.InformationowintheH.261Codec[4] Transmission 666 -
6 65SignalPath Apreciseknowledgeofthesignalpathisimportantinordertobeabletoestimate thesafetyofasteganographictechnique.fromthecameratothecodedsequence ofpictures,thesignalpathissubjecttolossesbytransformationsaswellasto inuencesandtodisturbances.inthefollowing,sometransformationpointson thepatharedesignated,andinparentheses,thealteredquantity. imageoftheoriginalispreprocessedopticallybythelensofthecamera.additionally,attitudeaperturesetting(depthoffocus),thefocuses(partofhigh videofrequencies),thefocallength(detail,videodepth)andthequalityofthe Theappearanceoftheoriginalisinuencedbythelightingconditions.The lens(distortion)contributeessentially.throughdispersion,thefocusesaredependentonthecoloroflight.thelightisusuallytransformedintoanelectrical signalinthecamerabyachargecoupleddevice(ccd).thetinyccdsare characterizedthroughtheirhighsensitivitytolight.thelightinfrontofthe about380000photosensitivepointsislteredbymanycolored,narrow,vertical stripes.eachthreeadjacentsensors,receivingrespectivelyred,green,andblue lteredlight,makeonepixel.thehorizontaldistanceofthethreesensorsisonly apartialpixeldistanceandthus,isneglected.accdhasatemporalinertness (thereaderpossiblyobservedthe\tracing"inthecaseofacamerapanshot) andisoperatedwithaspecicsamplingfrequency.afterwards,thealteredand runsthroughacircuitwhichcontainssemiconductors(temperaturedependence, rasteredimageisavailableintheformofanelectricalsignal.inthisform,it whichcontainstheimagewhichisnowevenmorecoarselyrasteredthaninthe transmittedtothedevicedriver.2adatastructureinthergbformatresults, camera.onthevideocardinthecomputerthepictureislocked,digitizedand noise),anditischangedintoantscorpalsignal.thesignalpathnowleads tothecomputeroveracoaxialcable(spectralphaseshift,attenuation)fromthe boundarytodeterminism(seefig.5).allfurtherprocessingstepsaredigitaland NTSCorPALsignal.Withthelaststeponthesignalpath,weexceededthe deterministic.withthetransformationandquantization,desirableroundingerrorsoccur.aloss-freeentropycodingcompressesthedatabetweenquantization andtransfer. -non-deterministic Processing - lossy Processing deterministic,embedding?-deterministic, Fig.5.Sectionsofthesignalpath loss-free Processing 2Oftenonlytheinterfaceofthedevicedriverisdocumented.Theprogrammeris unabletoseparatetheactivitiesofthevideocardandthoseofthedevicedriver.
7 meansthatresultingoutputsignalsdierfromeachotherwithhighprobability Thesignalpathcanbedividedintothreeparts.Non-deterministicprocessing7 inthecaseofidenticalinputsignals. noiselevelisdependentoftheconsideredbandwidth.theimageincorporated linespersecond(for25fullframes).thevoltagewithinalinevariesduringhorizontalcolorchange,withverticalfromlinetoline.therefore,uprightbrightness Anexampleisthenoiseofthesemiconductordevicesmentionedalready.The bythecameraisledinthepalsignallinebylinefromtoptobottom,15625 modicationsareputinthesignalatabandwidthamaximumof8khz(oneline iswhite,onelineisblack,alternating).upto800imageelementsperlinecan beplacedincomparisontothis,whichcorrespondstoabandwidthof6mhz. Thebandwidthforhorizontalvideofrequencies{andthereforethenoiselevel{ isupto800timesaslargeasthebandwidthforverticalvideofrequencies. whichisincludedintheccvssignal.lineinterlacingdividesafullframeinto twohalfframes.ifonenumbersthelinesofafullframefromtoptobottom,the rstframecontainsalloddlinesandthesecondframeallevenlines.therefore, twostraightadjacentlinesofthefullframeare1 Twoscanlinesarealignedbymeansofthehorizontalsynchronizationpulse other.sincethehalfframesarealsoregisteredattheframerate,thescreen contentcanalreadyhavechanged. mightbeplacedinformat720by540.threeadjacentsensorswillbesummarized Herefollowsanexamplewithnumbers.Theabout380000sensorsofaCCD 50frameseparatedfromeach asoneimagepoint(rgb),althoughthesensorshaveadistanceof1 spectrum. theimagecontentof110pixelsallowsconsiderablemodicationsofthefrequency length.thishorizontaldistanceis,referringtothesmallesth.261format(176by 144),14pixeldistance.Table1shows,thatalreadyahorizontaldisplacementof 720line generatedwithhorizontaldephasingandtransformed.thedephasingresults ifterm2y+1isreplacedby2y+1:2inequation1.throughconsideration offig.1,itisobviousthatahorizontal\dephasing"ofthebaseimagesbk;0 bringsnochange.underexclusionofthecoecientsf(0;0)(basebrightness) WedevelopedalittleprogramwhichcreatesTable1whenbaseimagesare andf(k;n)(appropriateforthebaseimage),thecoecientf(k0;n0)withthe truncatedvaluesduringcomputation.inthelineforb0;1,thecoecientwiththe inbracketsarenottobetracedbacktodisplacementandcanbeexplainedby strongestdieringamountprobablyisf(0;0).sincethiscoecientisexcluded largestabsolutevaluewasalwayssearchedinthetransformedmatrix.thevalues fromconsideration,thesmallernextappears.otherwise,forn>0,thefollowing patternisvalid: thatcoecientf(k0;n0)currentlychangesby1.sincethecoecientsareinteger, Columnfmincontainstheminimumamountforthecoecientf(k;n)from n0=n?1andf(k0;n0) k0=k f(k;n)n3% amodicationlessthan1isnotpossible.
8 8 Table1.RelativechangeofDCTcoecientsf(k0;n0)whilehorizontaldephasingof baseimagesbk;nby1 knk0n0f(k0;n0) 00{{(0.00)%(1) 10pixel f(k;n)fmin % 6.75% 9.19% knk0n0f(k0;n0) % 15.16% 18.90% (0.00)%(1) (0.27)%(369) % 3.61% % f(k;n)fmin % % % % (0.13)%(780) 12.28% 15.13% 18.98% 24.55% (0.14)%(736) 12.29% % % % % % % % % % (0.14)%(737) 12.18% 15.19% 18.82% 24.62% (0.26)%(390) 12.30% % % % % % % % % % 9.29% % 15.16% 18.98% 24.55% (0.14)%(736) 15.21% 18.82% % % 6.80% % 15.16% 18.98% 24.60% 9.28%
9 6Algorithm 9 time,wewanttoshowanunveriablemodication,unveriableinthesenseof Inthischapterwewilldiscusstheimage(dotoverthei)ofChapter4again.This changescauseanimperceptiblehorizontaldislocationoftheimage,thealgorithmdoesnotinuenceso-calledmotionvectors,atleastnotinadirectway.a motioncompensationstep(seefig.4)isnotnecessaryfortheimplementation ofthissteganographicvideoconferencingsystem.anattackercouldgetmore changethecarriersignal.theheartofasteganographicalgorithmisaprocess thecalculatedexampleinchapter5.whenembeddingsomething,wehaveto thatchangesthesignal.inourcaseitchangesdctcoecients.althoughthe onlyonceasakeyframe.hence,itistransmittedandusedforsteganography easierforsteganographers.anunchangingpictureinfrontofthecameracomes forembedding.however,deltaframecodingincaseofstillimagesmakeslife whichhecouldmatchagainsttheactualframe.thiswouldreducethespace preciseimagedatabyinterpolatingconsecutiveframesofanunchangingpicture steganographicprocessing. agecontainabigcoecient(seefminintable1)makingthemsuitablefor onlyonce.itisveryunlikelythatthedierence(ordelta)framesofastillim- a) b) c) d) e) f) (unchanged),c)afterdecompression(changedbyalgorithm),d)by115pixelshifted Fig.6.\Dotoverthei"andhorizontalshifting:a)original,b)afterdecompression original,e)movedimageaftergrating,f)movedimageafterdecompression result,theabsolutevalueofoneofthedctcoecientsaccordingtotable1is highercontrast. largeenoughtoallowamodication.(refertocoecientf(0;2)intheexample.) Thefollowingmatrixincludesthe64brightnessvaluesoftheoriginalimagewith Thecontrastoftheoriginalimagehasbeenincreased(seeFig.6a)).Asa
10 ThefollowingleftmatrixincludestheDCTcoecientsafterquantization. 75 Theboldhighlightedcoecientf(0;2)allowsamodicationof6.75%,which means160:0675=1:08.therightmatrixshowsthismodicationforf(0;1). 264?160?503020?60 40?160?60? ? ?1?160?60?20 64?160?503020?20? Afterrecovery,thefollowingmatrixesofbrightnessvaluesresult,presented 75 infig.6b)andc),too.themodicationleadstoaslightshiftingtotheright The\natural"shiftingasacomparison:Fig.6d)showstheoriginal,shifted 75 tionofthecoecient. Theshiftingoftheoriginalimagewouldhavecausedamoreintensivemodica- transformationandquantizationoftheleftfollowingmatrix(seealsofig.6e). by115pixel.thecoecientspresentedintherightfollowingmatrixresultfrom ?2?160?60?20 64?160?513020?20?
11 Finally,Fig.6f)showsthefollowing,recoveredmatrix Astheexampleshows,early,non-deterministiceectsatthebeginningof 75 7Implementation thesignalpathcanbereproducedinalaterpart(seefig.5). coecients.blocksare\suitable"iftheyincludeacoecientwhichislarger exploitstheeectdescribedinchapter6:thefrequencyspectrumchangesconsiderablyalreadyatminorchangingsofthephasingoftheimage. Theimplementedsteganographicfunction\Embedding"(seethemodelin[7]) thanitsminimumamountfmin(seetable1).inthesourcecode,allminimum amountsarerepresentedbydelta[].allotherblocksare\unsuitable"andwill betransmittedwithoutsteganographicmodication. Atrst,wedistinguishbetween\suitable"and\unsuitable"blocksofDCT */ /*Tobeclassifiedas"suitable",ablockmustcontainone unsignedintdelta[64]={ coefficientgreaterorequaltoitscorrespondentvalue inthefollowingmatrix. -1,-1,-1,-1,-1,-1,-1,-1, -1,28,28,28,29,28,28,28, 15,15,15,15,15,15,15,15, 11,11,11,11,11,11,11,11, 9,9,9,9,9,9,9,9, /*-1meansinfinity*/ }; 5,5,5,5,5,5,5,5 6,6,6,6,6,6,6,6, 7,7,7,7,7,7,7,7, /*stego_in(p)isthesteganographicfunction"embedding". */ Theparameterppointstoamatrixof64coefficients.
12 12 voidstego_in(int*p) { inti,most_suitable,sum_of_block,is_stego,*steg_ptr; is_stego=0; for(i=1;i<64;i++){/*skipdccoefficientp[0]*/ sum_of_block=0;/*forsum(mod2)*/ if(p[i]){ sum_of_block+=abs(p[i]); /*1means"suitable"block*/ if(abs(p[i])>=delta[i]){ /*coefficientlargeenough?*/ is_stego=1; /*considernon-zerocoefficients*/ /*moresuitable?thenkeepthepointer*/ /*"suitable"block*/ /*sumup*/ if(abs(p[i])-delta[i]>=most_suitable){ steg_ptr=&p[i-8];/*thisisf(k',n')*/ } } } } most_suitable=abs(p[i])-delta[i]; embedding,theblockwillbetransmittedunchanged.iftheparityisnotequal, 2sumofitscoecients(akindofparity).Iftheparityisequaltothenextbitfor...Forablockclassiedassuitable,itsfurthertreatmentdependsonthemodulo- ithastobechanged....if(is_stego) /*comparethemodulo-2sumwiththenextbittoembed*/ if((sum_of_block&1)!=get_bit_to_embed()){ if(*steg_ptr>0) /*decrementabs(*steg_ptr),thecoefficient*/ /*suitableblock?*/ elseif(*steg_ptr<0) (*steg_ptr)--; }Letf(k;n)bethecoecientofasuitableblockwhich,correspondingto } else/*0==>1*/ (*steg_ptr)++; *steg_ptr=1; Table1,allowsthemaximummodication.Inthiscase,theabsolutevalueof thecoecientf(k;n?1)willbedecreasedby1orifitiszero,setto1.this way,acoecientofablockischangedby1anditsparityips.
13 necessary.thewholescenarioisshowninfig.7.therecipientreceivessuitable Allchangedblocksaretransmittedaswellasthose,wherenochangewas 13 andunsuitableblockswhichareseparatedbythesamecriteriaasatthesender. Ithastoberemarkedthatchangedsuitableblocks(suitableblockswithipped parity)willalwaysstaysuitableblocksbecausethecoecientf(k;n)hasnot beenchanged,butfulllsthecriterion\suitable". imagereconstruction.thesteganographicalgorithmpresentedhereactslikea bitsofthesuitableblockssequentially.therecipientsystemusesallblocksfor quantizationwithahigherdivisor.itincreasesthecompressionratesothatthe introducederrorlooksnatural.alowerquantizershouldequalizetheeectof Therecipientcanextracttheembeddeddatathroughreadingouttheparity thealgorithm. voidstego_out(int*p)/*steganographicfunction"extraction"*/ { inti,sum_of_block,is_stego; sum_of_block=0; is_stego=0; for(i=1;i<64;i++){ if(p[i]){ sum_of_block+=abs(p[i]);/*sumup*/ /*1means"suitable"block*/ /*considernon-zerocoefficients*/ /*formod-2sum*/ /*coefficientlargeenough?*/ if(abs(p[i])>=delta[i]) }InFig.8weshowthesurfaceoftheapplication.ivsdisthedaemonwhich }if(is_stego)put_embedded_bit(sum_of_block&1); } is_stego=1; /*YES!suitableblock!*/ otherdaemons(single-ormulticast-addresses).afterestablishingthevideoconferenceconnection,theuseroftheconferencewithsteganographicenhancement receivesconferencecalls.permouseclickitispossibletoopenawindowtocall andonefordisplayingtheembeddedmessagesofthecommunicatingpartner. Theapplicationiscomparabletoacombinationofavideoconferenceandthe Unixstandardcommandtalk3. 8Conclusion Throughcompression,asusedwithvideoconferencing,theleastsignicantbits gainimportance,soeverybitofthecompressedsignalcontributesasignicant parttothepicture.thedetectionofarandomreplacementofthesebitsis hastwoadditionalwindows:onefortheinputoftext(thesecretmessagetohide) 3talkisacommunicationprogramforterminals.
14 14 Embedding digital brightness values Extracting compressed video signal (embedded data) Transformation Entropy Decoding unsuitable measure the distance to quantized value detect whether block is suitable secret message secret message calculate modulo-2 sum Quantization lossy unsuitable Inverse detect whether block is suitable Quantization calculate modulo-2 sum sum=bit compare sum with the bit to embed change one coefficient Fig.7.EmbeddingandExtracting by 1, if necessary Entropy Coding loss-free Inverse Transformation compressed video signal (embedded data) digital brightness values totheunchangedcarrier,whichshouldneverleavethesecuritydomain.we carrier,makingitimpossibletodetectthesechangeswithoutdirectcomparison possibleasshownforjstegin[8].however,itispossibletochangepartsofthe Transmission raiseanysuspicionforapossibleattacker.forthisreason,wescrutinisedthe picturereceptionclosely. analysisoftheinputdevicesshowsfreespacespermittingembeddeddata.if steganographictechniquessimulatepeculiaritiesofacamera,thechangesdonot usespecialfeaturesoftheinputdevices,suchasacameraorscanner.the ceptibly.adirectcomparisonwiththeoriginalallowsdierentiation,butthis stilldoesnotenabletheobservertodiscernbetweentheoriginalandthealtered signals.furthermore,thesendermerelytransmitsthechangedframes.inthis manner,asecretmessagecanbeembedded.theslighthorizontaldephasingis Ouralgorithmreproducestheseeectsarticially;thesignalchangesimper- unnoticeable. thisitisnecessarytoseparatethealgorithmfromthesecrets.thesimplest receiverneedthesamekeyandproceduretogeneratethesebitsandusethem possibilityisthegenerationofpseudorandombits.boththesenderandthe asapseudoone-timepad.becausethedistributionofthesebitshasthesame Algorithmsareonlytrustworthy,whentheyareopentopublicscrutiny.For randomuniformityasbitsextractedfromanyvideoconference,theattackercan notdiscernbetweenanormalvideoconferenceandoneinwhichsecretdatahas beenembeddedafterencryption. picture,becauseitisimpossibletoembeddatainblackframes. phoneconversation(upto8kbit/s).thisdependsuponthetextureofthe InanISDNvideoconferencingsystemitispossibletoembedaGSMtele-
15 15 References 1.IngemarJ.Cox,JoeKilian,TomLeighton,TatalShamoon,ASecure,RobustWa- 2.ElkeFranz,AnjaJerichow,SteenMoller,AndreasPtzmann,IngoStierand: termarkformultimedia,in:proceedings:informationhiding.workshop,cam- Fig.8.Userinterfaceoftheimplementedapplication 3.CCITTRecommendationH.261,VideoCodecForAudiovisualServicesAtp64 Cambridge,U.K.,May/June,1996,LNCS1174. ComputerBasedSteganography.In:Proceedings:InformationHiding.Workshop, 7.BirgitPtzmann:InformationHidingTerminology.In:Proceedings:Information 6.MaritKohntopp,SteganographiealsVerschlusselungstechnik,iX4/ AndyC.Hung,PVRG-P64Codec1.1,StanfordUniversity, NeilF.Johnson,Steganography,GeorgeMasonUniversity,1996 kbit/s,genf, RobertTinsley,SteganographyandJPEGCompression,FinalYearProjectReport,UniversityofWarwick,1996 Hiding.Workshop,Cambridge,U.K.,May/June,1996,LNCS.
16 169.ftp://idea.sec.dsi.unimi.it/pub/security/crypt/code/s-tools4.zip 10.ftp://ftp.funet.fi/pub/crypt/steganography/ ftp://ftp.funet.fi/pub/crypt/mirrors/idea.sec.dsi.unimi.it/ cypherpunks/steganography/mandelsteg1.0.tar.gz
Video-Conferencing System
Video-Conferencing System Evan Broder and C. Christoher Post Introductory Digital Systems Laboratory November 2, 2007 Abstract The goal of this project is to create a video/audio conferencing system. Video
More informationIntroduction to image coding
Introduction to image coding Image coding aims at reducing amount of data required for image representation, storage or transmission. This is achieved by removing redundant data from an image, i.e. by
More informationStudy and Implementation of Video Compression Standards (H.264/AVC and Dirac)
Project Proposal Study and Implementation of Video Compression Standards (H.264/AVC and Dirac) Sumedha Phatak-1000731131- sumedha.phatak@mavs.uta.edu Objective: A study, implementation and comparison of
More informationReading.. IMAGE COMPRESSION- I IMAGE COMPRESSION. Image compression. Data Redundancy. Lossy vs Lossless Compression. Chapter 8.
Reading.. IMAGE COMPRESSION- I Week VIII Feb 25 Chapter 8 Sections 8.1, 8.2 8.3 (selected topics) 8.4 (Huffman, run-length, loss-less predictive) 8.5 (lossy predictive, transform coding basics) 8.6 Image
More informationFigure 1: Relation between codec, data containers and compression algorithms.
Video Compression Djordje Mitrovic University of Edinburgh This document deals with the issues of video compression. The algorithm, which is used by the MPEG standards, will be elucidated upon in order
More informationMulti-factor Authentication in Banking Sector
Multi-factor Authentication in Banking Sector Tushar Bhivgade, Mithilesh Bhusari, Ajay Kuthe, Bhavna Jiddewar,Prof. Pooja Dubey Department of Computer Science & Engineering, Rajiv Gandhi College of Engineering
More informationJPEG Image Compression by Using DCT
International Journal of Computer Sciences and Engineering Open Access Research Paper Volume-4, Issue-4 E-ISSN: 2347-2693 JPEG Image Compression by Using DCT Sarika P. Bagal 1* and Vishal B. Raskar 2 1*
More informationFacultyofComputingandInformationTechnology DepartmentofRoboticsandDigitalTechnology TechnicalReport93-11
FacultyofComputingandInformationTechnology DepartmentofRoboticsandDigitalTechnology TechnicalReport93-11 TheTheoryofCCITTRecommendationH.261, p64kbit/s"andreviewofsuchacodec \VideoCodecforAudiovisualServicesat
More informationA Robust and Lossless Information Embedding in Image Based on DCT and Scrambling Algorithms
A Robust and Lossless Information Embedding in Image Based on DCT and Scrambling Algorithms Dr. Mohammad V. Malakooti Faculty and Head of Department of Computer Engineering, Islamic Azad University, UAE
More informationEvaluating Wavelet Tranforms for Video Conferencing Applications. Second quarter report (Oct Dec, 2008)
ICT R&D Funded Project Evaluating Wavelet Tranforms for Video Conferencing Applications Second quarter report (Oct Dec, 2008) Principal Investigators: Dr. Shahid Masud and Dr. Nadeem Khan Dept of Computer
More informationWatermarking Techniques for Protecting Intellectual Properties in a Digital Environment
Watermarking Techniques for Protecting Intellectual Properties in a Digital Environment Isinkaye F. O*. and Aroge T. K. Department of Computer Science and Information Technology University of Science and
More informationSecurity and protection of digital images by using watermarking methods
Security and protection of digital images by using watermarking methods Andreja Samčović Faculty of Transport and Traffic Engineering University of Belgrade, Serbia Gjovik, june 2014. Digital watermarking
More informationImage Compression through DCT and Huffman Coding Technique
International Journal of Current Engineering and Technology E-ISSN 2277 4106, P-ISSN 2347 5161 2015 INPRESSCO, All Rights Reserved Available at http://inpressco.com/category/ijcet Research Article Rahul
More informationStudy and Implementation of Video Compression standards (H.264/AVC, Dirac)
Study and Implementation of Video Compression standards (H.264/AVC, Dirac) EE 5359-Multimedia Processing- Spring 2012 Dr. K.R Rao By: Sumedha Phatak(1000731131) Objective A study, implementation and comparison
More informationHow To Improve Performance Of The H264 Video Codec On A Video Card With A Motion Estimation Algorithm
Implementation of H.264 Video Codec for Block Matching Algorithms Vivek Sinha 1, Dr. K. S. Geetha 2 1 Student of Master of Technology, Communication Systems, Department of ECE, R.V. College of Engineering,
More informationConceptual Framework Strategies for Image Compression: A Review
International Journal of Computer Sciences and Engineering Open Access Review Paper Volume-4, Special Issue-1 E-ISSN: 2347-2693 Conceptual Framework Strategies for Image Compression: A Review Sumanta Lal
More informationTransform-domain Wyner-Ziv Codec for Video
Transform-domain Wyner-Ziv Codec for Video Anne Aaron, Shantanu Rane, Eric Setton, and Bernd Girod Information Systems Laboratory, Department of Electrical Engineering Stanford University 350 Serra Mall,
More informationSteganography Based Seaport Security Communication System
, pp.302-306 http://dx.doi.org/10.14257/astl.2014.46.63 Steganography Based Seaport Security Communication System Yair Wiseman 1, 1 Computer Science Department Ramat-Gan 52900, Israel wiseman@cs.biu.ac.il
More informationHuffman Movement DCT. Encoding H.261 Detection. video Raw video Interframe coding data. Inverse Inverse Memory
CopyrightIEEE/TransactionsonNetworking,June1996 VideoconferencingintheInternet ThierryTurlettiandChristianHuitema Abstract ThispaperdescribestheINRIAVideoconferencingSystem(ivs),alowbandwidthtool forreal-timevideobetweenworkstationsonthe
More informationPCM Encoding and Decoding:
PCM Encoding and Decoding: Aim: Introduction to PCM encoding and decoding. Introduction: PCM Encoding: The input to the PCM ENCODER module is an analog message. This must be constrained to a defined bandwidth
More informationMike Perkins, Ph.D. perk@cardinalpeak.com
Mike Perkins, Ph.D. perk@cardinalpeak.com Summary More than 28 years of experience in research, algorithm development, system design, engineering management, executive management, and Board of Directors
More informationIntroduction to Medical Image Compression Using Wavelet Transform
National Taiwan University Graduate Institute of Communication Engineering Time Frequency Analysis and Wavelet Transform Term Paper Introduction to Medical Image Compression Using Wavelet Transform 李 自
More informationSachin Dhawan Deptt. of ECE, UIET, Kurukshetra University, Kurukshetra, Haryana, India
Abstract Image compression is now essential for applications such as transmission and storage in data bases. In this paper we review and discuss about the image compression, need of compression, its principles,
More informationFor Articulation Purpose Only
E305 Digital Audio and Video (4 Modular Credits) This document addresses the content related abilities, with reference to the module. Abilities of thinking, learning, problem solving, team work, communication,
More informationAUDIO CODING: BASICS AND STATE OF THE ART
AUDIO CODING: BASICS AND STATE OF THE ART PACS REFERENCE: 43.75.CD Brandenburg, Karlheinz Fraunhofer Institut Integrierte Schaltungen, Arbeitsgruppe Elektronische Medientechnolgie Am Helmholtzring 1 98603
More informationVideo Coding Technologies and Standards: Now and Beyond
Hitachi Review Vol. 55 (Mar. 2006) 11 Video Coding Technologies and Standards: Now and Beyond Tomokazu Murakami Hiroaki Ito Muneaki Yamaguchi Yuichiro Nakaya, Ph.D. OVERVIEW: Video coding technology compresses
More informationA comprehensive survey on various ETC techniques for secure Data transmission
A comprehensive survey on various ETC techniques for secure Data transmission Shaikh Nasreen 1, Prof. Suchita Wankhade 2 1, 2 Department of Computer Engineering 1, 2 Trinity College of Engineering and
More informationLossless Medical Image Compression using Predictive Coding and Integer Wavelet Transform based on Minimum Entropy Criteria
Lossless Medical Image Compression using Predictive Coding and Integer Wavelet Transform based on Minimum Entropy Criteria 1 Komal Gupta, Ram Lautan Verma, 3 Md. Sanawer Alam 1 M.Tech Scholar, Deptt. Of
More informationVoice---is analog in character and moves in the form of waves. 3-important wave-characteristics:
Voice Transmission --Basic Concepts-- Voice---is analog in character and moves in the form of waves. 3-important wave-characteristics: Amplitude Frequency Phase Voice Digitization in the POTS Traditional
More informationVolume 2, Issue 12, December 2014 International Journal of Advance Research in Computer Science and Management Studies
Volume 2, Issue 12, December 2014 International Journal of Advance Research in Computer Science and Management Studies Research Article / Survey Paper / Case Study Available online at: www.ijarcsms.com
More information3. Interpolation. Closing the Gaps of Discretization... Beyond Polynomials
3. Interpolation Closing the Gaps of Discretization... Beyond Polynomials Closing the Gaps of Discretization... Beyond Polynomials, December 19, 2012 1 3.3. Polynomial Splines Idea of Polynomial Splines
More informationCHAPTER 2 LITERATURE REVIEW
11 CHAPTER 2 LITERATURE REVIEW 2.1 INTRODUCTION Image compression is mainly used to reduce storage space, transmission time and bandwidth requirements. In the subsequent sections of this chapter, general
More informationJPEG compression of monochrome 2D-barcode images using DCT coefficient distributions
Edith Cowan University Research Online ECU Publications Pre. JPEG compression of monochrome D-barcode images using DCT coefficient distributions Keng Teong Tan Hong Kong Baptist University Douglas Chai
More informationInformation, Entropy, and Coding
Chapter 8 Information, Entropy, and Coding 8. The Need for Data Compression To motivate the material in this chapter, we first consider various data sources and some estimates for the amount of data associated
More informationHow To Recognize Voice Over Ip On Pc Or Mac Or Ip On A Pc Or Ip (Ip) On A Microsoft Computer Or Ip Computer On A Mac Or Mac (Ip Or Ip) On An Ip Computer Or Mac Computer On An Mp3
Recognizing Voice Over IP: A Robust Front-End for Speech Recognition on the World Wide Web. By C.Moreno, A. Antolin and F.Diaz-de-Maria. Summary By Maheshwar Jayaraman 1 1. Introduction Voice Over IP is
More informationA Digital Audio Watermark Embedding Algorithm
Xianghong Tang, Yamei Niu, Hengli Yue, Zhongke Yin Xianghong Tang, Yamei Niu, Hengli Yue, Zhongke Yin School of Communication Engineering, Hangzhou Dianzi University, Hangzhou, Zhejiang, 3008, China tangxh@hziee.edu.cn,
More informationAn Incomplete Cryptography based Digital Rights Management with DCFF
An Incomplete Cryptography based Digital Rights Management with DCFF Ta Minh Thanh Department of Computer Science Tokyo Institute of Technology 2-12-2, Ookayama, Meguro, Tokyo, 152-8552, Japan. Email:thanhtm@ks.cs.titech.ac.jp
More informationComparison of different image compression formats. ECE 533 Project Report Paula Aguilera
Comparison of different image compression formats ECE 533 Project Report Paula Aguilera Introduction: Images are very important documents nowadays; to work with them in some applications they need to be
More informationVideo Coding Basics. Yao Wang Polytechnic University, Brooklyn, NY11201 yao@vision.poly.edu
Video Coding Basics Yao Wang Polytechnic University, Brooklyn, NY11201 yao@vision.poly.edu Outline Motivation for video coding Basic ideas in video coding Block diagram of a typical video codec Different
More informationREGION OF INTEREST CODING IN MEDICAL IMAGES USING DIAGNOSTICALLY SIGNIFICANT BITPLANES
REGION OF INTEREST CODING IN MEDICAL IMAGES USING DIAGNOSTICALLY SIGNIFICANT BITPLANES Sharath T. ChandraShekar Sarayu Technologies, India Gomata L. Varanasi Samskruti, India ABSTRACT Accelerated expansion
More informationhttp://www.springer.com/0-387-23402-0
http://www.springer.com/0-387-23402-0 Chapter 2 VISUAL DATA FORMATS 1. Image and Video Data Digital visual data is usually organised in rectangular arrays denoted as frames, the elements of these arrays
More informationMPEG-1 and MPEG-2 Digital Video Coding Standards
Please note that the page has been produced based on text and image material from a book in [sik] and may be subject to copyright restrictions from McGraw Hill Publishing Company. MPEG-1 and MPEG-2 Digital
More informationSTUDY OF MUTUAL INFORMATION IN PERCEPTUAL CODING WITH APPLICATION FOR LOW BIT-RATE COMPRESSION
STUDY OF MUTUAL INFORMATION IN PERCEPTUAL CODING WITH APPLICATION FOR LOW BIT-RATE COMPRESSION Adiel Ben-Shalom, Michael Werman School of Computer Science Hebrew University Jerusalem, Israel. {chopin,werman}@cs.huji.ac.il
More informationRegion of Interest Access with Three-Dimensional SBHP Algorithm CIPR Technical Report TR-2006-1
Region of Interest Access with Three-Dimensional SBHP Algorithm CIPR Technical Report TR-2006-1 Ying Liu and William A. Pearlman January 2006 Center for Image Processing Research Rensselaer Polytechnic
More informationMPEG Unified Speech and Audio Coding Enabling Efficient Coding of both Speech and Music
ISO/IEC MPEG USAC Unified Speech and Audio Coding MPEG Unified Speech and Audio Coding Enabling Efficient Coding of both Speech and Music The standardization of MPEG USAC in ISO/IEC is now in its final
More informationDCT-JPEG Image Coding Based on GPU
, pp. 293-302 http://dx.doi.org/10.14257/ijhit.2015.8.5.32 DCT-JPEG Image Coding Based on GPU Rongyang Shan 1, Chengyou Wang 1*, Wei Huang 2 and Xiao Zhou 1 1 School of Mechanical, Electrical and Information
More informationAccelerating Wavelet-Based Video Coding on Graphics Hardware
Wladimir J. van der Laan, Andrei C. Jalba, and Jos B.T.M. Roerdink. Accelerating Wavelet-Based Video Coding on Graphics Hardware using CUDA. In Proc. 6th International Symposium on Image and Signal Processing
More informationParametric Comparison of H.264 with Existing Video Standards
Parametric Comparison of H.264 with Existing Video Standards Sumit Bhardwaj Department of Electronics and Communication Engineering Amity School of Engineering, Noida, Uttar Pradesh,INDIA Jyoti Bhardwaj
More informationQuality Estimation for Scalable Video Codec. Presented by Ann Ukhanova (DTU Fotonik, Denmark) Kashaf Mazhar (KTH, Sweden)
Quality Estimation for Scalable Video Codec Presented by Ann Ukhanova (DTU Fotonik, Denmark) Kashaf Mazhar (KTH, Sweden) Purpose of scalable video coding Multiple video streams are needed for heterogeneous
More informationTape Drive Data Compression Q & A
Tape Drive Data Compression Q & A Question What is data compression and how does compression work? Data compression permits increased storage capacities by using a mathematical algorithm that reduces redundant
More informationA Guide to MPEG Fundamentals and Protocol Analysis (Including DVB and ATSC)
(Including DVB and ATSC) M P E G T u t o r i a l A Guide to MPEG Fundamentals and Protocol Analysis (Including DVB and ATSC) ii www.tektronix.com/video_audio/ A Guide to MPEG Fundamentals and Protocol
More informationUnderstanding Compression Technologies for HD and Megapixel Surveillance
When the security industry began the transition from using VHS tapes to hard disks for video surveillance storage, the question of how to compress and store video became a top consideration for video surveillance
More informationMichael W. Marcellin and Ala Bilgin
JPEG2000: HIGHLY SCALABLE IMAGE COMPRESSION Michael W. Marcellin and Ala Bilgin Department of Electrical and Computer Engineering, The University of Arizona, Tucson, AZ 85721. {mwm,bilgin}@ece.arizona.edu
More informationA Secure File Transfer based on Discrete Wavelet Transformation and Audio Watermarking Techniques
A Secure File Transfer based on Discrete Wavelet Transformation and Audio Watermarking Techniques Vineela Behara,Y Ramesh Department of Computer Science and Engineering Aditya institute of Technology and
More informationThor High Efficiency, Moderate Complexity Video Codec using only RF IPR
Thor High Efficiency, Moderate Complexity Video Codec using only RF IPR draft-fuldseth-netvc-thor-00 Arild Fuldseth, Gisle Bjontegaard (Cisco) IETF 93 Prague, CZ July 2015 1 Design principles Moderate
More informationA Guide to MPEG Fundamentals and Protocol Analysis (Including DVB and ATSC)
A Guide to MPEG Fundamentals and Protocol Analysis (Including DVB and ATSC) M P E G T u t o r i a l Section 1 Introduction to MPEG...1 1.1 Convergence...1 1.2 Why Compression Is Needed...1 1.3 Principles
More informationDigital Video Coding Standards and Their Role in Video Communications
Digital Video Coding Standards and Their Role in Video Communications RALF SCHAFER AND THOMAS SIKORA, MEMBER, IEEE Invited Paper The eficient digital representation of image and video signals has been
More information2695 P a g e. IV Semester M.Tech (DCN) SJCIT Chickballapur Karnataka India
Integrity Preservation and Privacy Protection for Digital Medical Images M.Krishna Rani Dr.S.Bhargavi IV Semester M.Tech (DCN) SJCIT Chickballapur Karnataka India Abstract- In medical treatments, the integrity
More informationMPEG Digital Video Coding Standards
MPEG Digital Video Coding Standards Thomas Sikora, HHI Berlin Preprint from Digital Consumer Electronics Handbook First Edition (Editor R.Jurgens) to be published by McGRAW-Hill Book Company Chapter 9
More informationVideo compression: Performance of available codec software
Video compression: Performance of available codec software Introduction. Digital Video A digital video is a collection of images presented sequentially to produce the effect of continuous motion. It takes
More informationImplementation of a Prototype for Secure Online Payment System Using Discrete Cosine Transformation and Permutative Straddling
Implementation of a Prototype for Secure Online Payment System Using Discrete Cosine Transformation and Permutative Straddling GRADUATE PROJECT REPORT Submitted to the Faculty of The School of Engineering
More informationIMAGE STEGANOGRAPHY FOR SECURE DATA TRANSMISSION USING BLOWFISH ALGORITHM
IMAGE STEGANOGRAPHY FOR SECURE DATA TRANSMISSION USING BLOWFISH ALGORITHM BARJINDER SINGH 1, BALPREET KAUR 2, RANJOT KAUR 3 1 Research Scholar at BBSBEC, Fatehgarh sahib 2 Lecturer at BBSBEC Fatehgarh
More informationCoding and Patterns of Data Streams
Characterizing Video Coding Computing in Conference Systems By G. Tuquerres (tuquerre@cs.utwente.nl) Telematics Systems and Services Twente University Abstract In this paper, a number of coding operations
More informationLesson 7: SYSTEM-ON. SoC) AND USE OF VLSI CIRCUIT DESIGN TECHNOLOGY. Chapter-1L07: "Embedded Systems - ", Raj Kamal, Publs.: McGraw-Hill Education
Lesson 7: SYSTEM-ON ON-CHIP (SoC( SoC) AND USE OF VLSI CIRCUIT DESIGN TECHNOLOGY 1 VLSI chip Integration of high-level components Possess gate-level sophistication in circuits above that of the counter,
More informationDVB-S2 and DVB-RCS for VSAT and Direct Satellite TV Broadcasting
Hands-On DVB-S2 and DVB-RCS for VSAT and Direct Satellite TV Broadcasting Course Description This course will examine DVB-S2 and DVB-RCS for Digital Video Broadcast and the rather specialised application
More informationUsing Linear Fractal Interpolation Functions to Compress Video. The paper in this appendix was presented at the Fractals in Engineering '94
Appendix F Using Linear Fractal Interpolation Functions to Compress Video Images The paper in this appendix was presented at the Fractals in Engineering '94 Conference which was held in the École Polytechnic,
More informationDigital terrestrial television broadcasting Audio coding
Digital terrestrial television broadcasting Audio coding Televisão digital terrestre Codificação de vídeo, áudio e multiplexação Parte 2: Codificação de áudio Televisión digital terrestre Codificación
More informationReversible Data Hiding for Security Applications
Reversible Data Hiding for Security Applications Baig Firdous Sulthana, M.Tech Student (DECS), Gudlavalleru engineering college, Gudlavalleru, Krishna (District), Andhra Pradesh (state), PIN-521356 S.
More informationVideo Authentication for H.264/AVC using Digital Signature Standard and Secure Hash Algorithm
Video Authentication for H.264/AVC using Digital Signature Standard and Secure Hash Algorithm Nandakishore Ramaswamy Qualcomm Inc 5775 Morehouse Dr, Sam Diego, CA 92122. USA nandakishore@qualcomm.com K.
More informationRobust Blind Watermarking Mechanism For Point Sampled Geometry
Robust Blind Watermarking Mechanism For Point Sampled Geometry Parag Agarwal Balakrishnan Prabhakaran Department of Computer Science, University of Texas at Dallas MS EC 31, PO Box 830688, Richardson,
More informationModule 8 VIDEO CODING STANDARDS. Version 2 ECE IIT, Kharagpur
Module 8 VIDEO CODING STANDARDS Version ECE IIT, Kharagpur Lesson H. andh.3 Standards Version ECE IIT, Kharagpur Lesson Objectives At the end of this lesson the students should be able to :. State the
More informationTrends and Perspectives in Image and Video Coding
Trends and Perspectives in Image and Video Coding THOMAS SIKORA, SENIOR MEMBER, IEEE Invited Paper The objective of the paper is to provide an overview on recent trends and future perspectives in image
More informationAutomatic Detection of Emergency Vehicles for Hearing Impaired Drivers
Automatic Detection of Emergency Vehicles for Hearing Impaired Drivers Sung-won ark and Jose Trevino Texas A&M University-Kingsville, EE/CS Department, MSC 92, Kingsville, TX 78363 TEL (36) 593-2638, FAX
More informationMultiple Embedding Using Robust Watermarks for Wireless Medical Images
Multiple Embedding Using Robust Watermarks for Wireless Medical Images Dominic Osborne and Derek Abbott Centre for Biomedical Engineering (CBME) The University of Adelaide, SA 5005, Australia Matthew Sorell
More informationCM0340 SOLNS. Do not turn this page over until instructed to do so by the Senior Invigilator.
CARDIFF UNIVERSITY EXAMINATION PAPER Academic Year: 2008/2009 Examination Period: Examination Paper Number: Examination Paper Title: SOLUTIONS Duration: Autumn CM0340 SOLNS Multimedia 2 hours Do not turn
More informationDTS Enhance : Smart EQ and Bandwidth Extension Brings Audio to Life
DTS Enhance : Smart EQ and Bandwidth Extension Brings Audio to Life White Paper Document No. 9302K05100 Revision A Effective Date: May 2011 DTS, Inc. 5220 Las Virgenes Road Calabasas, CA 91302 USA www.dts.com
More informationVIDEOTELEPHONY AND VIDEOCONFERENCE OVER ISDN
VIDEOTELEPHONY AND VIDEOCONFERENCE OVER ISDN Fernando Pereira Instituto Superior Técnico Digital Video Video versus Images Still Image Services No strong temporal requirements; no realtime notion. Video
More informationAudio Coding Algorithm for One-Segment Broadcasting
Audio Coding Algorithm for One-Segment Broadcasting V Masanao Suzuki V Yasuji Ota V Takashi Itoh (Manuscript received November 29, 2007) With the recent progress in coding technologies, a more efficient
More informationVoIP Technologies Lecturer : Dr. Ala Khalifeh Lecture 4 : Voice codecs (Cont.)
VoIP Technologies Lecturer : Dr. Ala Khalifeh Lecture 4 : Voice codecs (Cont.) 1 Remember first the big picture VoIP network architecture and some terminologies Voice coders 2 Audio and voice quality measuring
More informationMultidimensional Transcoding for Adaptive Video Streaming
Multidimensional Transcoding for Adaptive Video Streaming Jens Brandt, Lars Wolf Institut für Betriebssystem und Rechnerverbund Technische Universität Braunschweig Germany NOSSDAV 2007, June 4-5 Jens Brandt,
More informationStandard encoding protocols for image and video coding
International Telecommunication Union Standard encoding protocols for image and video coding Dave Lindbergh Polycom Inc. Rapporteur, ITU-T Q.E/16 (Media Coding) Workshop on Standardization in E-health
More informationStandards compliant watermarking for access management
Standards compliant watermarking for access management Viresh Ratnakar and Onur G. Guleryuz Epson Palo Alto Laboratory 3145 Porter Drive, Suite 104 Palo Alto, CA 94304, USA ABSTRACT We present standards-compliant
More informationFFT Algorithms. Chapter 6. Contents 6.1
Chapter 6 FFT Algorithms Contents Efficient computation of the DFT............................................ 6.2 Applications of FFT................................................... 6.6 Computing DFT
More informationWe are presenting a wavelet based video conferencing system. Openphone. Dirac Wavelet based video codec
Investigating Wavelet Based Video Conferencing System Team Members: o AhtshamAli Ali o Adnan Ahmed (in Newzealand for grad studies) o Adil Nazir (starting MS at LUMS now) o Waseem Khan o Farah Parvaiz
More informationPerformance Analysis of medical Image Using Fractal Image Compression
Performance Analysis of medical Image Using Fractal Image Compression Akhil Singal 1, Rajni 2 1 M.Tech Scholar, ECE, D.C.R.U.S.T, Murthal, Sonepat, Haryana, India 2 Assistant Professor, ECE, D.C.R.U.S.T,
More informationMEDICAL IMAGE COMPRESSION USING HYBRID CODER WITH FUZZY EDGE DETECTION
MEDICAL IMAGE COMPRESSION USING HYBRID CODER WITH FUZZY EDGE DETECTION K. Vidhya 1 and S. Shenbagadevi Department of Electrical & Communication Engineering, College of Engineering, Anna University, Chennai,
More informationSSIM Technique for Comparison of Images
SSIM Technique for Comparison of Images Anil Wadhokar 1, Krupanshu Sakharikar 2, Sunil Wadhokar 3, Geeta Salunke 4 P.G. Student, Department of E&TC, GSMCOE Engineering College, Pune, Maharashtra, India
More informationFast Hybrid Simulation for Accurate Decoded Video Quality Assessment on MPSoC Platforms with Resource Constraints
Fast Hybrid Simulation for Accurate Decoded Video Quality Assessment on MPSoC Platforms with Resource Constraints Deepak Gangadharan and Roger Zimmermann Department of Computer Science, National University
More informationWhite paper. H.264 video compression standard. New possibilities within video surveillance.
White paper H.264 video compression standard. New possibilities within video surveillance. Table of contents 1. Introduction 3 2. Development of H.264 3 3. How video compression works 4 4. H.264 profiles
More informationA Secure Data Transmission By Integrating Cryptography And Video Steganography
A Secure Data Transmission By Integrating Cryptography And Video Steganography Shafna P K Computer Science Department KMEA Engineering College Ernakulam, India shabanapk9999@gmail.com Abstract Advances
More informationVideo Codec Requirements and Evaluation Methodology
-47pt -30pt :white Font : edium t Video Codec Requirements and Evaluation Methodology www.huawei.com draft-filippov-netvc-requirements-02 Alexey Filippov, Jose Alvarez (Huawei Technologies) Contents An
More informationMeasurements on MPEG2 and DVB-T signals (1)
Measurements on MPEG2 and DVB-T signals (1) With the expansion of multi-frequency networks (MFNs) and single-frequency networks (SFNs) for DVB-T*, there is a growing demand for measuring instruments and
More informationUsing fractal compression scheme to embed a digital signature into an image
Using fractal compression scheme to embed a digital signature into an image Joan Puate, Fred Jordan Swiss federal institute of technology Signal Processing Laboratory CH-1015 Lausanne Switzerland Email:
More informationInvisible Image Water Marking Using Hybrid DWT Compression/Decompression Technique
Invisible Image Water Marking Using Hybrid DWT Compression/Decompression Technique B.Sai Kiran M.Tech (VLSI), CMR Institute of Technology. Mr.Shahbaz Khan Associate Professor, CMR Institute of Technology.
More informationCompression techniques
Compression techniques David Bařina February 22, 2013 David Bařina Compression techniques February 22, 2013 1 / 37 Contents 1 Terminology 2 Simple techniques 3 Entropy coding 4 Dictionary methods 5 Conclusion
More informationSecurity Based Data Transfer and Privacy Storage through Watermark Detection
Security Based Data Transfer and Privacy Storage through Watermark Detection Gowtham.T 1 Pradeep Kumar.G 2 1PG Scholar, Applied Electronics, Nandha Engineering College, Anna University, Erode, India. 2Assistant
More informationTECHNICAL OVERVIEW OF VP8, AN OPEN SOURCE VIDEO CODEC FOR THE WEB
TECHNICAL OVERVIEW OF VP8, AN OPEN SOURCE VIDEO CODEC FOR THE WEB Jim Bankoski, Paul Wilkins, Yaowu Xu Google Inc. 1600 Amphitheatre Parkway, Mountain View, CA, USA {jimbankoski, paulwilkins, yaowu}@google.com
More informationElectronic Records Management Guidelines - File Formats
Electronic Records Management Guidelines - File Formats Rapid changes in technology mean that file formats can become obsolete quickly and cause problems for your records management strategy. A long-term
More information*EP001025692B1* EP 1 025 692 B1 (19) (11) EP 1 025 692 B1 (12) EUROPEAN PATENT SPECIFICATION
(19) Europäisches Patentamt European Patent Office Office européen des brevets *EP002692B1* (11) EP 1 02 692 B1 (12) EUROPEAN PATENT SPECIFICATION (4) Date of publication and mention of the grant of the
More information