Combating Anti-forensics of Jpeg Compression
|
|
|
- Frank Hall
- 10 years ago
- Views:
Transcription
1 IJCSI International Journal of Computer Science Issues, Vol. 9, Issue 6, No 3, November 212 ISSN (Online): Combating Anti-forensics of Jpeg Compression Zhenxing Qian 1, Xinpeng Zhang 2 1 School of Communication & Information Engineering, Shanghai University, Shanghai, China ABSTRACT This paper proposes a forensic method for identifying whether an image was previously compressed by JPEG. Though some methods have already been proposed for this purpose, Stamm and Liu s anti-forensic method disables the detection capabilities of these methods. After analyzing the anti-forensics method, we propose to use the decimal histogram of the coefficients to distinguish the never-compressed images from the previously compressed; even the compressed image is anti-forensically processed. Experimental results show that this method has a good forensic capability. Keywords: Digital Forensics, Anti-forensics, JPEG Compression 1. Introduction With the development of computer technologies, digital images can easily be processed by editing software and spread via internet. This provides forgers opportunities for manipulating original images into fakes [1]. As a result, researchers have developed many forensics schemes to detect the probable forgeries in digital images. Though most forgeries may not be perceived by human vision, features extracted from the image can be used to reveal the tampering fact [2, 3]. A particular type of forensics is the operation of JPEG compression, which is a very popular method for image compression. With the method proposed in [4], an image s origin can be identified by analyzing the quantization steps of JPEG compression and compare them with a database containing kinds of camera models and editing software. If the parameters match, decisions of manipulations can be made. Some schemes have also been proposed for identifying whether an image in uncompressed format was previously compressed by JPEG. Fan and Queiroz proposed a method able to estimate the quantization steps by analyzing the DCT coefficients of the image [5]. Some other methods such as [6] and [7] are proposed to detect the existence of double JPEG compression. However, these forensic methods can be defeated by antiforensic methods hiding the features of tampering operations. In [8] and [9], Stamm and Liu proposed to hide the JPEG compression history by adding noise into the DCT coefficients. During compression, the Laplacian distribution of coefficients histograms changes to discrete form, which is an obvious evidence of JPEG compression. After adding noise into the coefficients, the discrete gaps of the histograms are efficiently padded. Anti-forensics is compressive for assessing the forensics methods and is helpful for improving their reliability [1, 11]. In this paper, we propose a forensics method to combat Stamm and Liu s anti-forensics to images that are previously compressed by JPEG. We find the distribution for decimal values of the coefficients of a nevercompressed image is different to that of the previously compressed image, and also different to that of the antiforensically processed image. 2. Related Work Previously, Stamm and Liu proposed an effective antiforensics method of hiding traces of JPEG compression in Copyright (c) 212 International Journal of Computer Science Issues. All Rights Reserved.
2 IJCSI International Journal of Computer Science Issues, Vol. 9, Issue 6, No 3, November 212 ISSN (Online): [8] and [9]. According to [12], coefficients for AC components corresponding to the same subband of a nevercompressed image follow Laplacian distribution. Let X be the DCT coefficient at the block position (i, j) for a nevercompressed image, (1) Where 1, / ; and for the nonzero values / Where if, otherwise 1,., (6) (5) where λ is a Laplacian parameter. If the image was previously compressed by JPEG, AC coefficients of each subband are distributed as discrete Laplacian distribution because of the quantization and the reverse. For the the coefficients at the (i, j)-th position, if we use the quantization step Q i,j, the distribution would be 1, if sin, if, otherwise Where, /,, and the parameter λ can be generated by maximum likelihood estimation ln,,,,,, Where, N is the total number of coefficients at the (i, j)-th position, N represents the number of coefficients taking zero values, and N 1 the number of nonzero coefficients. The discreteness of Laplacian distribution causes comblike histograms as many gaps appear. To hide the compression evidence, Stamm and Liu introduce noises into the AC coefficients to approximately restore the histogram of each subband, by (4) Where N is the additive noise. For the coefficient Y of zeros value at the (i, j)-th position, the noise distribution is given by 1 if, 2, 2 otherwise (2) (3) 3. Countering Anti-Forensics The key idea of Stamm and Liu s method is to pad the gaps appear in the histogram of each subband for AC components. However, when analyzing the decimal values of the DCT coefficients, we find they are not distributed as Laplacian distribution in each subband for nevercompressed images. As a result, we propose to use the distribution feature of decimal values in the image to verify whether the image was compressed or anti-forensically processed. For a test image X, first divide the image into 8 8 blocks, and turn each block into a coefficient block by discrete cosine transform (DCT). Let the coefficient at (i, j)-th position of the k-th block be,. Generate the histogram of coefficients corresponding to the (i, j)-th position of all the blocks,,, (7) Where hist( ) is the histogram function. The artifact of comblike histogram should appear if the image was previously compressed. However, if the image had been processed by Stamm and Liu. s anti-forensics method, we are unable to find this evidence. An example is shown in Figure 1, in which (a) is a nevercompressed image, and the histogram of coefficients at position (1, 2) is shown in (b). If the image is compressed with quality factor 8, histogram of coefficients at the subband (1, 2) is changed into (c) that a comblike histogram with many gaps. After using Stamm and Liu. s method, the Copyright (c) 212 International Journal of Computer Science Issues. All Rights Reserved.
3 IJCSI International Journal of Computer Science Issues, Vol. 9, Issue 6, No 3, November 212 ISSN (Online): gaps disappear, and again the histogram is approximately turned into a Laplacian distributed form, which is shown in (d). Number of Coefficients DCT Coefficient Value (d) Figure 1 (a) the original never-compressed image, (b) histogram of the (a) coefficients at subband (1, 2), (c) histogram of the coefficients Number of Coefficients Number of Coefficients DCT Coefficient Value (b) DCT Coefficient Value (c) corresponding to the compressed image, (d) histogram of the coefficients after processing the compressed image by Stamm et al s anti-forensics method. In order to decide whether the image was processed by antiforensics method, we round, to the first decimal,, 1, /1 (8) and calculate the difference of, with its nearest integer.,,,, (9) Values of, range from.5 to.4. Generate the histogram of,,,, (1) We call this histogram the decimal histogram. Because the calculation of DCT randomly produces decimal numbers, values of, are uniformly distributed for the never-compressed images. If the image was previously compressed by JPEG, coefficients were quantized and thus decimal values concentrate around zero. Even Stamm and Liu. s anti-forensics method is unable to conceal the evidence. Thus, we further define a function for identifying whether the image was compressed,, max, min, (11) and compare, with a threshold T. The threshold we used here is.5, which comes from the training results Copyright (c) 212 International Journal of Computer Science Issues. All Rights Reserved.
4 IJCSI International Journal of Computer Science Issues, Vol. 9, Issue 6, No 3, November 212 ISSN (Online): shown in the following section. Finally, we can make a decision that the image was previously compressed if, ; otherwise, it is uncompressed. 4. Experimental Results To verify the proposed method, we choose the commonly used UCID database [13]. A group of decimal histograms are shown in Figure 2, in which (a) is the original nevercompressed image, (b) the decimal histograms of (a). After JPEG encoding and decoding using quality factor 8, the decimal histogram corresponding to subband (1, 2) is shown in (c). Then we use Stamm and Liu s anti-forensics method to forge an uncompressed image, decimal histogram of which is shown in (d). The decimal histogram of the never-compressed image is near flat, while the other two histograms have clear peaks on zero. Number of Decimal Values Number of Decimal Values Decimal Value of DCT Coefficient (c) Decimal Value of DCT Coefficient (d) Figure 2 (a) a never-compressed image, (b) decimal histogram of (a) at the (a) subband (1, 2), (c) decimal histogram at the subband (1, 2) of the compressed image with quality factor 8, (d) decimal histogram.15 corresponding to the image processed by anti-forensics Number of Decimal Values Decimal Value of DCT Coefficient (b) To determine the threshold, we randomly use 2 images from the UCID database and turn them into grey images. Each image is compressed by JPEG using quality factor 2, 5 and 8, respectively. These images are then forged by Stamm and Liu s anti-forensics method. Figure 3 shows the values of, for all images, which are used to determine the threshold for identifying whether an image was compressed or processed by anti-forensics. According to the results shown in Figure 3, we choose T=.5. We further use 4 never-compressed images for testing the Copyright (c) 212 International Journal of Computer Science Issues. All Rights Reserved.
5 IJCSI International Journal of Computer Science Issues, Vol. 9, Issue 6, No 3, November 212 ISSN (Online): proposed scheme. Experimental results are shown in Table 1. With the predefined threshold.5, more than 9% of the never-compressed images are truly determined, and all the previously compressed images that were further processed by Stamm and Liu s method are truly determined. Detection results show that the proposed scheme has a good forensic capability. This work was supported by the Natural Science Foundation of China (Grant ), the Natural Science Foundation of Shanghai (Grant 11ZR14132), and the Innovation Program of Shanghai Municipal Education Commission (Grant 11YZ1). References Difference Value Decision Image Number Figure 3 Threshold training using 2 images from UCID Table 1 Detection Results Never- Compressed Stamm et al. s Anti-forensics Processed QF=8 QF=5 QF=2 True 91% 1% 1% 1% False 9% 5. Conclusion In this paper, we have proposed a forensics method for identifying whether an image was previously compressed. This method is designed to combat Stamm and Liu s antiforensics method. By analyzing the decimal values of the DCT coefficients, we have found that the distributions in the decimal histogram are different for never-compressed images and previously compressed images, even if the compressed traces are hidden by the anti-forensics processing. Experimental results show that with proper threshold high detection rates are achieved. Acknowledgement never-compressed anti-forensics (QF=2) anti-forensics (QF=5) anti-forensics (QF=8) compressed (QF=8) threshold [1] H. Farid, Image forgery detection, IEEE Signal Processing Magazine, vol. 26, no. 2, pp , Mar. 29. [2] A. C. Popescu and H. Farid, Statistical tools for digital forensics, in 6th International Workshop on Information Hiding, Toronto, Canada, 24. [3] M. Kirchner and R. Böhme, Synthesis of color filter array pattern in digital images, in Proc. SPIE-IS&T Electronic Imaging: Media Forensics and Security, Feb. 29, vol [4] H. Farid, Digital image ballistics from JPEG quantization, Tech. Rep. TR26-583, Dept. of Computer Science, Dartmouth College, 26. [5] Z. Fan and R. de Queiroz, Identification of bitmap compression history: JPEG detection and quantizer estimation, IEEE Trans. on Image Processing, vol. 12, no. 2, pp , Feb 23. [6] T. Pevny and J. Fridrich, Detection of double-compression in JPEG images for applications in steganography, IEEE Trans. on Information Forensics and Security, vol. 3, no. 2, pp , June 28. [7] J. He, Z. Lin, L. Wang, and X. Tang, Detecting doctored JPEG images via DCT coefficient nalysis, in Proc. of ECCV, 26, vol. 3593, pp [8] M. Stamm, S. Tjoa, W. Lin, K. Liu, Anti-forensics of JPEG compression. In: IEEE International Conference on Acoustics Speech and Signal Processing (ICASSP 21), pp IEEE Press, Los Alamitos (21) [9] M. Stamm and K. Liu, Anti-forensics of digital image compression, IEEE Trans. Information Forensics and Security, vol. 6, no. 3, pp , Sep [1] T. Gloe, M. Kirchner, A. Winkler, and R. Böhme, Can we Copyright (c) 212 International Journal of Computer Science Issues. All Rights Reserved.
6 IJCSI International Journal of Computer Science Issues, Vol. 9, Issue 6, No 3, November 212 ISSN (Online): trust digital image forensics?, in 15th Int. Conf. Multimedia, 27, pp [11] M. Kirchner and R. Böhme, Hiding traces of resampling in digital images, IEEE Trans. Inf. Forensics Security, vol. 3, no. 4, pp , Dec. 28. [12] E. Y. Lam and J. W. Goodman, A mathematical analysis of the DCT coefficient distributions for images, IEEE Trans. Image Processing, vol. 9, no. 1, pp , Oct 2. [13] G. Schaefer and M. Stich, UCID: an uncompressed color image database, in Proc. SPIE: Storage and Retrieval Methods and Applications for Multimedia, 23, vol. 537, pp Zhenxing Qian received the B.S. degree in 23 and the Ph.D. degree in 27 from University of Science & Technology of China (USTC). Since 29, he has been with the faculty of the School of Communication and Information Engineering, Shanghai University. He is now an associate professor. His research interests include data hiding, image processing, and digital forensics. Xinpeng Zhang received the B.S. degree in computational mathematics from Jilin University, China, in 1995, and the M.E. and Ph.D. degrees in communication and information system from Shanghai University, China, in 21 and 24, respectively. Since 24, he has been with the faculty of the School of Communication and Information Engineering, Shanghai University, where he is currently a Professor. His research interests include information hiding, image processing and digital forensics. Copyright (c) 212 International Journal of Computer Science Issues. All Rights Reserved.
Automated Image Forgery Detection through Classification of JPEG Ghosts
Automated Image Forgery Detection through Classification of JPEG Ghosts Fabian Zach, Christian Riess and Elli Angelopoulou Pattern Recognition Lab University of Erlangen-Nuremberg {riess,elli}@i5.cs.fau.de
Topics in Security: Forensic Signal Analysis
Topics in Security: Forensic Signal Analysis Fact or fiction? Markus Kuhn, Andrew Lewis Computer Laboratory http://www.cl.cam.ac.uk/teaching/0910/r08/ Michaelmas 2009 MPhil ACS Hans D. Baumann, DOCMA 3
Image Authentication Scheme using Digital Signature and Digital Watermarking
www..org 59 Image Authentication Scheme using Digital Signature and Digital Watermarking Seyed Mohammad Mousavi Industrial Management Institute, Tehran, Iran Abstract Usual digital signature schemes for
JPEG compression of monochrome 2D-barcode images using DCT coefficient distributions
Edith Cowan University Research Online ECU Publications Pre. JPEG compression of monochrome D-barcode images using DCT coefficient distributions Keng Teong Tan Hong Kong Baptist University Douglas Chai
Video Authentication for H.264/AVC using Digital Signature Standard and Secure Hash Algorithm
Video Authentication for H.264/AVC using Digital Signature Standard and Secure Hash Algorithm Nandakishore Ramaswamy Qualcomm Inc 5775 Morehouse Dr, Sam Diego, CA 92122. USA [email protected] K.
WATERMARKING FOR IMAGE AUTHENTICATION
WATERMARKING FOR IMAGE AUTHENTICATION Min Wu Bede Liu Department of Electrical Engineering Princeton University, Princeton, NJ 08544, USA Fax: +1-609-258-3745 {minwu, liu}@ee.princeton.edu ABSTRACT A data
A comprehensive survey on various ETC techniques for secure Data transmission
A comprehensive survey on various ETC techniques for secure Data transmission Shaikh Nasreen 1, Prof. Suchita Wankhade 2 1, 2 Department of Computer Engineering 1, 2 Trinity College of Engineering and
Digital Image Authentication from JPEG Headers
1 Digital Image Authentication from JPEG Headers Eric Kee, Micah K. Johnson and Hany Farid Abstract It is often desirable to determine if an image has been modified in any way from its original recording.
A Secure File Transfer based on Discrete Wavelet Transformation and Audio Watermarking Techniques
A Secure File Transfer based on Discrete Wavelet Transformation and Audio Watermarking Techniques Vineela Behara,Y Ramesh Department of Computer Science and Engineering Aditya institute of Technology and
Reversible Data Hiding for Security Applications
Reversible Data Hiding for Security Applications Baig Firdous Sulthana, M.Tech Student (DECS), Gudlavalleru engineering college, Gudlavalleru, Krishna (District), Andhra Pradesh (state), PIN-521356 S.
Image Compression through DCT and Huffman Coding Technique
International Journal of Current Engineering and Technology E-ISSN 2277 4106, P-ISSN 2347 5161 2015 INPRESSCO, All Rights Reserved Available at http://inpressco.com/category/ijcet Research Article Rahul
Invisible Image Water Marking Using Hybrid DWT Compression/Decompression Technique
Invisible Image Water Marking Using Hybrid DWT Compression/Decompression Technique B.Sai Kiran M.Tech (VLSI), CMR Institute of Technology. Mr.Shahbaz Khan Associate Professor, CMR Institute of Technology.
Multimedia Document Authentication using On-line Signatures as Watermarks
Multimedia Document Authentication using On-line Signatures as Watermarks Anoop M Namboodiri and Anil K Jain Department of Computer Science and Engineering Michigan State University East Lansing, MI 48824
2695 P a g e. IV Semester M.Tech (DCN) SJCIT Chickballapur Karnataka India
Integrity Preservation and Privacy Protection for Digital Medical Images M.Krishna Rani Dr.S.Bhargavi IV Semester M.Tech (DCN) SJCIT Chickballapur Karnataka India Abstract- In medical treatments, the integrity
A Robust and Lossless Information Embedding in Image Based on DCT and Scrambling Algorithms
A Robust and Lossless Information Embedding in Image Based on DCT and Scrambling Algorithms Dr. Mohammad V. Malakooti Faculty and Head of Department of Computer Engineering, Islamic Azad University, UAE
Study and Implementation of Video Compression Standards (H.264/AVC and Dirac)
Project Proposal Study and Implementation of Video Compression Standards (H.264/AVC and Dirac) Sumedha Phatak-1000731131- [email protected] Objective: A study, implementation and comparison of
How To Filter Spam Image From A Picture By Color Or Color
Image Content-Based Email Spam Image Filtering Jianyi Wang and Kazuki Katagishi Abstract With the population of Internet around the world, email has become one of the main methods of communication among
DCT-JPEG Image Coding Based on GPU
, pp. 293-302 http://dx.doi.org/10.14257/ijhit.2015.8.5.32 DCT-JPEG Image Coding Based on GPU Rongyang Shan 1, Chengyou Wang 1*, Wei Huang 2 and Xiao Zhou 1 1 School of Mechanical, Electrical and Information
An Efficient Compression of Strongly Encrypted Images using Error Prediction, AES and Run Length Coding
An Efficient Compression of Strongly Encrypted Images using Error Prediction, AES and Run Length Coding Stebin Sunny 1, Chinju Jacob 2, Justin Jose T 3 1 Final Year M. Tech. (Cyber Security), KMP College
Mike Perkins, Ph.D. [email protected]
Mike Perkins, Ph.D. [email protected] Summary More than 28 years of experience in research, algorithm development, system design, engineering management, executive management, and Board of Directors
A Novel Method for Identifying Exact Sensor Using Multiplicative Noise Component
2013 IEEE International Symposium on Multimedia A Novel Method for Identifying Exact Sensor Using Multiplicative Noise Component Babak Mahdian and Stanislav Saic Institute of Information Theory and Automation
Friendly Medical Image Sharing Scheme
Journal of Information Hiding and Multimedia Signal Processing 2014 ISSN 2073-4212 Ubiquitous International Volume 5, Number 3, July 2014 Frily Medical Image Sharing Scheme Hao-Kuan Tso Department of Computer
Turgut Ozal University. Computer Engineering Department. TR-06010 Ankara, Turkey
Dr. YILDIRAY YALMAN Associate Professor CONTACT INFORMATION Turgut Ozal University Computer Engineering Department TR-06010 Ankara, Turkey Phone: +90 (0)312-5515437 E-mail: [email protected] RESEARCH
Digital Image Analysis for Evidence: A MATLAB toolbox
Digital Image Analysis for Evidence: A MATLAB toolbox Susan Welford, Dr. Stuart Gibson, Andrew Payne Forensic Imaging Group, University of Kent, Canterbury, Kent, CT2 7NZ July 2011 Abstract In the last
Multi-factor Authentication in Banking Sector
Multi-factor Authentication in Banking Sector Tushar Bhivgade, Mithilesh Bhusari, Ajay Kuthe, Bhavna Jiddewar,Prof. Pooja Dubey Department of Computer Science & Engineering, Rajiv Gandhi College of Engineering
Determining optimal window size for texture feature extraction methods
IX Spanish Symposium on Pattern Recognition and Image Analysis, Castellon, Spain, May 2001, vol.2, 237-242, ISBN: 84-8021-351-5. Determining optimal window size for texture feature extraction methods Domènec
REGION OF INTEREST CODING IN MEDICAL IMAGES USING DIAGNOSTICALLY SIGNIFICANT BITPLANES
REGION OF INTEREST CODING IN MEDICAL IMAGES USING DIAGNOSTICALLY SIGNIFICANT BITPLANES Sharath T. ChandraShekar Sarayu Technologies, India Gomata L. Varanasi Samskruti, India ABSTRACT Accelerated expansion
A Dynamic Approach to Extract Texts and Captions from Videos
Available Online at www.ijcsmc.com International Journal of Computer Science and Mobile Computing A Monthly Journal of Computer Science and Information Technology IJCSMC, Vol. 3, Issue. 4, April 2014,
Volume 2, Issue 12, December 2014 International Journal of Advance Research in Computer Science and Management Studies
Volume 2, Issue 12, December 2014 International Journal of Advance Research in Computer Science and Management Studies Research Article / Survey Paper / Case Study Available online at: www.ijarcsms.com
Watermarking Techniques for Protecting Intellectual Properties in a Digital Environment
Watermarking Techniques for Protecting Intellectual Properties in a Digital Environment Isinkaye F. O*. and Aroge T. K. Department of Computer Science and Information Technology University of Science and
Region of Interest Access with Three-Dimensional SBHP Algorithm CIPR Technical Report TR-2006-1
Region of Interest Access with Three-Dimensional SBHP Algorithm CIPR Technical Report TR-2006-1 Ying Liu and William A. Pearlman January 2006 Center for Image Processing Research Rensselaer Polytechnic
Index Terms Audio streams, inactive frames, steganography, Voice over Internet Protocol (VoIP), packet loss. I. Introduction
Volume 2, Issue 2, February 2012 ISSN: 2277 128X International Journal of Advanced Research in Computer Science and Software Engineering Research Paper Available online at: Advanced Integrated Steganographic
A Novel Method to Improve Resolution of Satellite Images Using DWT and Interpolation
A Novel Method to Improve Resolution of Satellite Images Using DWT and Interpolation S.VENKATA RAMANA ¹, S. NARAYANA REDDY ² M.Tech student, Department of ECE, SVU college of Engineering, Tirupati, 517502,
A Digital Audio Watermark Embedding Algorithm
Xianghong Tang, Yamei Niu, Hengli Yue, Zhongke Yin Xianghong Tang, Yamei Niu, Hengli Yue, Zhongke Yin School of Communication Engineering, Hangzhou Dianzi University, Hangzhou, Zhejiang, 3008, China [email protected],
Review Article An Overview on Image Forensics
Hindawi Publishing Corporation ISRN Signal Processing Volume 2013, Article ID 496701, 22 pages http://dx.doi.org/10.1155/2013/496701 Review Article An Overview on Image Forensics Alessandro Piva Department
Video-Conferencing System
Video-Conferencing System Evan Broder and C. Christoher Post Introductory Digital Systems Laboratory November 2, 2007 Abstract The goal of this project is to create a video/audio conferencing system. Video
International Journal of Emerging Technology and Advanced Engineering Website: www.ijetae.com (ISSN 2250-2459, Volume 2, Issue 9, September 2012)
Authentication of Medical Images using Integer Transforms A.Kannammal 1, Dr.S.Subha Rani 2 1 Assistant professor, 2 Professor and Head, ECE Department, PSG College of Technology, Peelamedu, Coimbatore
ANALYSIS OF THE EFFECTIVENESS IN IMAGE COMPRESSION FOR CLOUD STORAGE FOR VARIOUS IMAGE FORMATS
ANALYSIS OF THE EFFECTIVENESS IN IMAGE COMPRESSION FOR CLOUD STORAGE FOR VARIOUS IMAGE FORMATS Dasaradha Ramaiah K. 1 and T. Venugopal 2 1 IT Department, BVRIT, Hyderabad, India 2 CSE Department, JNTUH,
ROI Based Medical Image Watermarking with Zero Distortion and Enhanced Security
I.J. Modern Education and Computer Science, 2014, 10, 40-48 Published Online October 2014 in MECS (http://www.mecs-press.org/) DOI: 10.5815/ijmecs.2014.10.06 ROI Based Medical Image Watermarking with Zero
Generating Robust Digital Signature for Image/Video Authentication
Generating Robust Digital Signature for Image/Video Authentication Ching-Yung Lin and Shih-Fu Chang Department of Electrical Engineering and New Media Technology Center Columbia University New York, NY
Exposing Digital Forgeries Through Chromatic Aberration
Exposing Digital Forgeries Through Chromatic Aberration Micah K. Johnson Department of Computer Science Dartmouth College Hanover, NH 03755 [email protected] Hany Farid Department of Computer Science
Internet Video Streaming and Cloud-based Multimedia Applications. Outline
Internet Video Streaming and Cloud-based Multimedia Applications Yifeng He, [email protected] Ling Guan, [email protected] 1 Outline Internet video streaming Overview Video coding Approaches for video
Efficient Data Recovery scheme in PTS-Based OFDM systems with MATRIX Formulation
Efficient Data Recovery scheme in PTS-Based OFDM systems with MATRIX Formulation Sunil Karthick.M PG Scholar Department of ECE Kongu Engineering College Perundurau-638052 Venkatachalam.S Assistant Professor
Text Localization & Segmentation in Images, Web Pages and Videos Media Mining I
Text Localization & Segmentation in Images, Web Pages and Videos Media Mining I Multimedia Computing, Universität Augsburg [email protected] www.multimedia-computing.{de,org} PSNR_Y
Functional-Repair-by-Transfer Regenerating Codes
Functional-Repair-by-Transfer Regenerating Codes Kenneth W Shum and Yuchong Hu Abstract In a distributed storage system a data file is distributed to several storage nodes such that the original file can
Source Class Identification for DSLR and Compact Cameras
Source Class Identification for DSLR and Compact Cameras Yanmei Fang #,, Ahmet Emir Dirik #2, Xiaoxi Sun #, Nasir Memon #3 # Dept. of Computer & Information Science Polytechnic Institute of New York University,
CHAPTER 7 CONCLUSION AND FUTURE WORK
158 CHAPTER 7 CONCLUSION AND FUTURE WORK The aim of this thesis was to present robust watermarking techniques for medical image. Section 7.1, consolidates the contributions made by the researcher and Section
Study and Implementation of Video Compression standards (H.264/AVC, Dirac)
Study and Implementation of Video Compression standards (H.264/AVC, Dirac) EE 5359-Multimedia Processing- Spring 2012 Dr. K.R Rao By: Sumedha Phatak(1000731131) Objective A study, implementation and comparison
PERFORMANCE ANALYSIS OF HIGH RESOLUTION IMAGES USING INTERPOLATION TECHNIQUES IN MULTIMEDIA COMMUNICATION SYSTEM
PERFORMANCE ANALYSIS OF HIGH RESOLUTION IMAGES USING INTERPOLATION TECHNIQUES IN MULTIMEDIA COMMUNICATION SYSTEM Apurva Sinha 1, Mukesh kumar 2, A.K. Jaiswal 3, Rohini Saxena 4 Department of Electronics
Parallel Data Selection Based on Neurodynamic Optimization in the Era of Big Data
Parallel Data Selection Based on Neurodynamic Optimization in the Era of Big Data Jun Wang Department of Mechanical and Automation Engineering The Chinese University of Hong Kong Shatin, New Territories,
INTERNATIONAL JOURNAL OF APPLIED ENGINEERING RESEARCH, DINDIGUL Volume 1, No 3, 2010
Lossless Medical Image Security Shrikhande Rohini 1, Vinayak Bairagi 2 1 Researcher, Electronics & Telecommunication Department, Sinhgad Academy Of Engg. 2 Assistant Professor, Electronics & Telecommunication
Color Image Stegananalysis Using Correlations between RGB Channels
Color Image Stegananalysis Using Correlations between RGB Channels Hasan Abdulrahman, Marc Chaumont, Philippe Montesinos, Baptiste Magnier To cite this version: Hasan Abdulrahman, Marc Chaumont, Philippe
A Model of Unforgeable Digital Certificate Document System
A Model of Unforgeable Digital Certificate System Koichi Nozaki *, Hideki Noda **, Eiji Kawaguchi ** and Richard Eason *** *Nagasaki University, **Kyushu Institute of Technology, ***University of Maine
Data Storage 3.1. Foundations of Computer Science Cengage Learning
3 Data Storage 3.1 Foundations of Computer Science Cengage Learning Objectives After studying this chapter, the student should be able to: List five different data types used in a computer. Describe how
Separable & Secure Data Hiding & Image Encryption Using Hybrid Cryptography
502 Separable & Secure Data Hiding & Image Encryption Using Hybrid Cryptography 1 Vinay Wadekar, 2 Ajinkya Jadhavrao, 3 Sharad Ghule, 4 Akshay Kapse 1,2,3,4 Computer Engineering, University Of Pune, Pune,
Introduction to image coding
Introduction to image coding Image coding aims at reducing amount of data required for image representation, storage or transmission. This is achieved by removing redundant data from an image, i.e. by
Colour Image Encryption and Decryption by using Scan Approach
Colour Image Encryption and Decryption by using Scan Approach, Rinkee Gupta,Master of Engineering Scholar, Email: [email protected] Jaipal Bisht, Asst. Professor Radharaman Institute Of Technology
Some Publications and Patents on Data Hiding, Steganalysis, Forensics and Security Yun Q. Shi 25 December, 2008
Some Publications and Patents on Data Hiding, Steganalysis, Forensics and Security Yun Q. Shi 25 December, 2008 Data hiding: strategy and robustness Book chapter 1. X. Kang, J. Huang and Y. Q. Shi, DWT
Removal of Artifacts from JPEG Compressed Document Images
Removal of Artifacts from JPEG Compressed Document Images Basak Oztan a,amalmalik b, Zhigang Fan b, Reiner Eschbach b a University of Rochester, Rochester, NY, USA b Xerox Corporation, Webster, NY, USA
Tracking Moving Objects In Video Sequences Yiwei Wang, Robert E. Van Dyck, and John F. Doherty Department of Electrical Engineering The Pennsylvania State University University Park, PA16802 Abstract{Object
Low-resolution Character Recognition by Video-based Super-resolution
2009 10th International Conference on Document Analysis and Recognition Low-resolution Character Recognition by Video-based Super-resolution Ataru Ohkura 1, Daisuke Deguchi 1, Tomokazu Takahashi 2, Ichiro
Adaptive Block Truncation Filter for MVC Depth Image Enhancement
2014 IEEE International Conference on Acoustic, Speech and Signal Processing (ICASSP) Adaptive Block Truncation Filter for MVC Depth Image Enhancement Xuyuan Xu 1, Lai-Man Po 1, Chun-Ho Cheung 2, Litong
Evaluating The Performance of Symmetric Encryption Algorithms
International Journal of Network Security, Vol.10, No.3, PP.213 219, May 2010 213 Evaluating The Performance of Symmetric Encryption Algorithms Diaa Salama Abd Elminaam 1, Hatem Mohamed Abdual Kader 2,
Less naive Bayes spam detection
Less naive Bayes spam detection Hongming Yang Eindhoven University of Technology Dept. EE, Rm PT 3.27, P.O.Box 53, 5600MB Eindhoven The Netherlands. E-mail:[email protected] also CoSiNe Connectivity Systems
Ericsson T18s Voice Dialing Simulator
Ericsson T18s Voice Dialing Simulator Mauricio Aracena Kovacevic, Anna Dehlbom, Jakob Ekeberg, Guillaume Gariazzo, Eric Lästh and Vanessa Troncoso Dept. of Signals Sensors and Systems Royal Institute of
Introduction to Medical Image Compression Using Wavelet Transform
National Taiwan University Graduate Institute of Communication Engineering Time Frequency Analysis and Wavelet Transform Term Paper Introduction to Medical Image Compression Using Wavelet Transform 李 自
SSIM Technique for Comparison of Images
SSIM Technique for Comparison of Images Anil Wadhokar 1, Krupanshu Sakharikar 2, Sunil Wadhokar 3, Geeta Salunke 4 P.G. Student, Department of E&TC, GSMCOE Engineering College, Pune, Maharashtra, India
Redundant Wavelet Transform Based Image Super Resolution
Redundant Wavelet Transform Based Image Super Resolution Arti Sharma, Prof. Preety D Swami Department of Electronics &Telecommunication Samrat Ashok Technological Institute Vidisha Department of Electronics
Low-resolution Image Processing based on FPGA
Abstract Research Journal of Recent Sciences ISSN 2277-2502. Low-resolution Image Processing based on FPGA Mahshid Aghania Kiau, Islamic Azad university of Karaj, IRAN Available online at: www.isca.in,
A Reliability Point and Kalman Filter-based Vehicle Tracking Technique
A Reliability Point and Kalman Filter-based Vehicle Tracing Technique Soo Siang Teoh and Thomas Bräunl Abstract This paper introduces a technique for tracing the movement of vehicles in consecutive video
Hybrid Lossless Compression Method For Binary Images
M.F. TALU AND İ. TÜRKOĞLU/ IU-JEEE Vol. 11(2), (2011), 1399-1405 Hybrid Lossless Compression Method For Binary Images M. Fatih TALU, İbrahim TÜRKOĞLU Inonu University, Dept. of Computer Engineering, Engineering
Network Selection Using TOPSIS in Vertical Handover Decision Schemes for Heterogeneous Wireless Networks
www.ijcsi.org 400 Network Selection Using TOPSIS in Vertical Handover Decision Schemes for Heterogeneous Wireless Networks K.Savitha 1, DR.C.Chandrasekar 2 1 Research Scholar, Periyar University Salem,
Loudspeaker Equalization with Post-Processing
EURASIP Journal on Applied Signal Processing 2002:11, 1296 1300 c 2002 Hindawi Publishing Corporation Loudspeaker Equalization with Post-Processing Wee Ser Email: ewser@ntuedusg Peng Wang Email: ewangp@ntuedusg
June Zhang (Zhong-Ju Zhang)
(Zhong-Ju Zhang) Carnegie Mellon University Dept. Electrical and Computer Engineering, 5000 Forbes Ave. Pittsburgh, PA 15213 Phone: 678-899-2492 E-Mail: [email protected] http://users.ece.cmu.edu/~junez
HSI BASED COLOUR IMAGE EQUALIZATION USING ITERATIVE n th ROOT AND n th POWER
HSI BASED COLOUR IMAGE EQUALIZATION USING ITERATIVE n th ROOT AND n th POWER Gholamreza Anbarjafari icv Group, IMS Lab, Institute of Technology, University of Tartu, Tartu 50411, Estonia [email protected]
AN IMPROVED DOUBLE CODING LOCAL BINARY PATTERN ALGORITHM FOR FACE RECOGNITION
AN IMPROVED DOUBLE CODING LOCAL BINARY PATTERN ALGORITHM FOR FACE RECOGNITION Saurabh Asija 1, Rakesh Singh 2 1 Research Scholar (Computer Engineering Department), Punjabi University, Patiala. 2 Asst.
Keywords: Image complexity, PSNR, Levenberg-Marquardt, Multi-layer neural network.
Global Journal of Computer Science and Technology Volume 11 Issue 3 Version 1.0 Type: Double Blind Peer Reviewed International Research Journal Publisher: Global Journals Inc. (USA) Online ISSN: 0975-4172
A Prediction-Based Transcoding System for Video Conference in Cloud Computing
A Prediction-Based Transcoding System for Video Conference in Cloud Computing Yongquan Chen 1 Abstract. We design a transcoding system that can provide dynamic transcoding services for various types of
International Journal of Advanced Computer Technology (IJACT) ISSN:2319-7900 PRIVACY PRESERVING DATA MINING IN HEALTH CARE APPLICATIONS
PRIVACY PRESERVING DATA MINING IN HEALTH CARE APPLICATIONS First A. Dr. D. Aruna Kumari, Ph.d, ; Second B. Ch.Mounika, Student, Department Of ECM, K L University, [email protected]; Third C.
Detection and Restoration of Vertical Non-linear Scratches in Digitized Film Sequences
Detection and Restoration of Vertical Non-linear Scratches in Digitized Film Sequences Byoung-moon You 1, Kyung-tack Jung 2, Sang-kook Kim 2, and Doo-sung Hwang 3 1 L&Y Vision Technologies, Inc., Daejeon,
