An Efficient Architecture for Image Compression and Lightweight Encryption using Parameterized DWT



Similar documents
Introduction to Medical Image Compression Using Wavelet Transform

MEDICAL IMAGE COMPRESSION USING HYBRID CODER WITH FUZZY EDGE DETECTION

DESIGN AND SIMULATION OF TWO CHANNEL QMF FILTER BANK FOR ALMOST PERFECT RECONSTRUCTION

JPEG Image Compression by Using DCT

Copyright 2008 IEEE. Reprinted from IEEE Transactions on Multimedia 10, no. 8 (December 2008):

Reconfigurable Low Area Complexity Filter Bank Architecture for Software Defined Radio

Admin stuff. 4 Image Pyramids. Spatial Domain. Projects. Fourier domain 2/26/2008. Fourier as a change of basis

How To Fix A 3 Bit Error In Data From A Data Point To A Bit Code (Data Point) With A Power Source (Data Source) And A Power Cell (Power Source)

Image Compression through DCT and Huffman Coding Technique

CHAPTER 7 CONCLUSION AND FUTURE WORK

Study and Implementation of Video Compression Standards (H.264/AVC and Dirac)

2695 P a g e. IV Semester M.Tech (DCN) SJCIT Chickballapur Karnataka India


Quality Estimation for Scalable Video Codec. Presented by Ann Ukhanova (DTU Fotonik, Denmark) Kashaf Mazhar (KTH, Sweden)

Implementation and Design of AES S-Box on FPGA

A Novel Method to Improve Resolution of Satellite Images Using DWT and Interpolation

Region of Interest Access with Three-Dimensional SBHP Algorithm CIPR Technical Report TR

MPEG Unified Speech and Audio Coding Enabling Efficient Coding of both Speech and Music

Design and Implementation of Concurrent Error Detection and Data Recovery Architecture for Motion Estimation Testing Applications

IMPROVING QUALITY OF VIDEOS IN VIDEO STREAMING USING FRAMEWORK IN THE CLOUD

Sachin Dhawan Deptt. of ECE, UIET, Kurukshetra University, Kurukshetra, Haryana, India

Sachin Patel HOD I.T Department PCST, Indore, India. Parth Bhatt I.T Department, PCST, Indore, India. Ankit Shah CSE Department, KITE, Jaipur, India

Performance Analysis and Comparison of JM 15.1 and Intel IPP H.264 Encoder and Decoder

2K Processor AJ-HDP2000


Load Balancing in Fault Tolerant Video Server

Implementation of Full -Parallelism AES Encryption and Decryption

Volume 2, Issue 12, December 2014 International Journal of Advance Research in Computer Science and Management Studies

COMPRESSION OF 3D MEDICAL IMAGE USING EDGE PRESERVATION TECHNIQUE

A HIGH PERFORMANCE SOFTWARE IMPLEMENTATION OF MPEG AUDIO ENCODER. Figure 1. Basic structure of an encoder.

How To Improve Performance Of The H264 Video Codec On A Video Card With A Motion Estimation Algorithm

AUTHORIZED WATERMARKING AND ENCRYPTION SYSTEM BASED ON WAVELET TRANSFORM FOR TELERADIOLOGY SECURITY ISSUES

DESIGN OF AN ERROR DETECTION AND DATA RECOVERY ARCHITECTURE FOR MOTION ESTIMATION TESTING APPLICATIONS

Image Authentication Scheme using Digital Signature and Digital Watermarking

FPGA. AT6000 FPGAs. Application Note AT6000 FPGAs. 3x3 Convolver with Run-Time Reconfigurable Vector Multiplier in Atmel AT6000 FPGAs.

ON SUITABILITY OF FPGA BASED EVOLVABLE HARDWARE SYSTEMS TO INTEGRATE RECONFIGURABLE CIRCUITS WITH HOST PROCESSING UNIT

Innovative improvement of fundamental metrics including power dissipation and efficiency of the ALU system

Security and protection of digital images by using watermarking methods

Non-Data Aided Carrier Offset Compensation for SDR Implementation

A Secure File Transfer based on Discrete Wavelet Transformation and Audio Watermarking Techniques

AUDIO CODING: BASICS AND STATE OF THE ART

Study and Implementation of Video Compression standards (H.264/AVC, Dirac)

Image Transmission over IEEE and ZigBee Networks

High Speed and Efficient 4-Tap FIR Filter Design Using Modified ETA and Multipliers

Video Codec Requirements and Evaluation Methodology

A comprehensive survey on various ETC techniques for secure Data transmission

/$ IEEE

Implementation of Modified Booth Algorithm (Radix 4) and its Comparison with Booth Algorithm (Radix-2)

Lossless Grey-scale Image Compression using Source Symbols Reduction and Huffman Coding

ELECTENG702 Advanced Embedded Systems. Improving AES128 software for Altera Nios II processor using custom instructions

Information Theory and Coding Prof. S. N. Merchant Department of Electrical Engineering Indian Institute of Technology, Bombay

Lossless Medical Image Compression using Predictive Coding and Integer Wavelet Transform based on Minimum Entropy Criteria

Implementation of Digital Signal Processing: Some Background on GFSK Modulation

Jpeg2000 Encryption and Its Advantages

Broadband Networks. Prof. Dr. Abhay Karandikar. Electrical Engineering Department. Indian Institute of Technology, Bombay. Lecture - 29.

Redundant Wavelet Transform Based Image Super Resolution

Introduction to Xilinx System Generator Part II. Evan Everett and Michael Wu ELEC Spring 2013

Internet Video Streaming and Cloud-based Multimedia Applications. Outline

WATERMARKING FOR IMAGE AUTHENTICATION

Video compression: Performance of available codec software

ARIB STD-T64-C.S0042 v1.0 Circuit-Switched Video Conferencing Services

A Survey of Video Processing with Field Programmable Gate Arrays (FGPA)

CHAPTER 2 LITERATURE REVIEW

IJESRT. [Padama, 2(5): May, 2013] ISSN:

Reconfigurable Architecture Requirements for Co-Designed Virtual Machines

Compression techniques

Parametric Comparison of H.264 with Existing Video Standards

International Journal of Computer Sciences and Engineering Open Access. A novel technique to hide information using Daubechies Transformation

Hardware Implementation of AES Encryption and Decryption System Based on FPGA

Implementation of emulated digital CNN-UM architecture on programmable logic devices and its applications

Error Detection and Data Recovery Architecture for Systolic Motion Estimators

MULTI-RESOLUTION PERCEPTUAL ENCODING FOR INTERACTIVE IMAGE SHARING IN REMOTE TELE-DIAGNOSTICS. Javed I. Khan and D. Y. Y. Yun

Accelerating Wavelet-Based Video Coding on Graphics Hardware

VoIP Technologies Lecturer : Dr. Ala Khalifeh Lecture 4 : Voice codecs (Cont.)

Voice---is analog in character and moves in the form of waves. 3-important wave-characteristics:

Complexity-bounded Power Control in Video Transmission over a CDMA Wireless Network

Algorithms for the resizing of binary and grayscale images using a logical transform

STUDY OF MUTUAL INFORMATION IN PERCEPTUAL CODING WITH APPLICATION FOR LOW BIT-RATE COMPRESSION

Department of Electrical and Computer Engineering Ben-Gurion University of the Negev. LAB 1 - Introduction to USRP

LMS is a simple but powerful algorithm and can be implemented to take advantage of the Lattice FPGA architecture.

How To Recognize Voice Over Ip On Pc Or Mac Or Ip On A Pc Or Ip (Ip) On A Microsoft Computer Or Ip Computer On A Mac Or Mac (Ip Or Ip) On An Ip Computer Or Mac Computer On An Mp3

This document is downloaded from DR-NTU, Nanyang Technological University Library, Singapore.

Multiple Description Coding (MDC) and Scalable Coding (SC) for Multimedia

Colour Image Encryption and Decryption by using Scan Approach

Complexity-rate-distortion Evaluation of Video Encoding for Cloud Media Computing

SPEECH SIGNAL CODING FOR VOIP APPLICATIONS USING WAVELET PACKET TRANSFORM A

SCAN-CA Based Image Security System

System Interconnect Architectures. Goals and Analysis. Network Properties and Routing. Terminology - 2. Terminology - 1

TRANSPARENT ENCRYPTION FOR HEVC USING BIT-STREAM-BASED SELECTIVE COEFFICIENT SIGN ENCRYPTION. Heinz Hofbauer Andreas Uhl Andreas Unterweger

Revision of Lecture Eighteen

Fast Hybrid Simulation for Accurate Decoded Video Quality Assessment on MPSoC Platforms with Resource Constraints

StreamStorage: High-throughput and Scalable Storage Technology for Streaming Data

VALAR: A BENCHMARK SUITE TO STUDY THE DYNAMIC BEHAVIOR OF HETEROGENEOUS SYSTEMS

Sampling Theorem Notes. Recall: That a time sampled signal is like taking a snap shot or picture of signal periodically.

PCM Encoding and Decoding:

MP3 Player CSEE 4840 SPRING 2010 PROJECT DESIGN.

Achieving New Levels of Channel Density in Downstream Cable Transmitter Systems: RF DACs Deliver Smaller Size and Lower Power Consumption

WHITE PAPER Personal Telepresence: The Next Generation of Video Communication VIDYO

Dynamic channel filtering method for multi-mode & multi-service software radio communication systems

Design and Analysis of Parallel AES Encryption and Decryption Algorithm for Multi Processor Arrays

Transcription:

An Efficient Architecture for Image Compression and Lightweight Encryption using Parameterized DWT Babu M., Mukuntharaj C., Saranya S. Abstract Discrete Wavelet Transform (DWT) based architecture serves as a compression cum encryption system that provides dual features of high throughput multimedia compression and embedded multimedia security. The parameterized construction of the DWT compression block is used to introduce a free parameter (a) in the design. It allows building a key space for lightweight multimedia encryption. This DWT architecture provides an efficient and highthroughput reconfigurable hardware implementation through the use of Look Up Table (LUT) based constant multiplier enabling run-time reconfiguration of encryption key and also it provides multiplier less hardware implementation. Keywords Discrete Wavelet Transform, Lightweight Encryption, Parameterization, Reconfigurable LUT. II. TRADITIONAL AND PROPOSED SYSTEM Video compression and data encryption are both computationally expensive tasks. The scheme presented in Figure (2a ) restricts a custom hardware design for the DWT that requires low power consumption and hardware usage. Such a design also limits an efficient delivery of scalable video streams. These restrictions can be alleviated by developing a scheme that integrates both encryption and compression operations into one without any significant computational overheads. This proposed concept is presented in Figure (2b). A light-weight encryption block is built into the compression engine I. INTRODUCTION The Discrete Wavelet Transform (DWT) has enabled research in image and video coding and has become a part of multiple next generation multimedia compression and transmission standards. The increasing importance of the DWT in image and multimedia compression applications has inspired the development of efficient hardware for implementations. Figure 1 shows some constraints in the design of a DWT filter. It must provide a high compression ratio and image reconstruction quality so as to serve the end user requirements. Some other desired features include low hardware cost, low power requirements and high throughput of the system. However, a parameterized DWT implementation can fulfil these requirements. The re-design of the DWT filter can meet the security requirements in addition to providing a perfect image reconstruction and high compression framework for video compression. This paper introduces a new layout and configuration scheme for the parameterized DWT that enables lightweight multimedia encryption and authentication. The DWT-based architecture is to enable real-time video-streaming applications such as those used in telemedicine, remote laboratories, educational video streaming and video surveillance. The DWT filters presented in give a polymorphic hardware support for the real-time requirements of multimedia applications. Existing implementations do not suit the security demands of real-time multimedia systems. Fig.1 DWT Filter Design Constraints 406 Fig.2.a Traditional system Fig.2.b Proposed system III. IMAGE COMPRESSION USING DISCRETE WAVELET TRANSFORM The wavelet transform (WT) has gained widespread acceptance in signal processing and image Compression. Because of their inherent multi-resolution nature, waveletcoding schemes are especially suitable for applications where scalability and tolerable degradation are important. Recently the JPEG committee has released its new image coding standard, JPEG-2000, which has been based upon DWT. A. Sub-Band Coding Figure 3 shows the fundamental concept behind Subband Coding (SBC) is to split up the frequency band of a signal (image in our case) and then to code each sub-band using a coder and bit rate accurately matched to the statistics of the band. SBC has been used extensively first

in speech coding and later in image coding because of its inherent advantages namely variable bit assignment among the sub-bands as well as coding error confinement within the sub-bands. addition to preservation of energy, implement a unitary transform between the input and the sub-bands. But, as in the case of 1-D, in two-band Finite Impulse Response (FIR) systems linear phase and orthogonality are mutually exclusive, and so orthogonality is sacrificed to achieve linear phase. Where Downsample coumns : keep the even endexed columns Downsample rows : keep the even endexed rows Convolve with filter X the rows of entry Convolve with filter X the columns of entry Fig.3. Separable 4-subband Filter bank Fig.4. Partition of the Frequency Domain Woods and O'Neil are used a separable combination of one-dimensional Quadrature Mirror Filter banks (QMF) to perform a 4-band decomposition by the row-column approach as show in Fig.3. Corresponding division of the frequency spectrum is shown in Fig.4. The process can be iterated to obtain higher band decomposition filter trees. At the decoder, the sub-band signals are decoded, upsampled and passed through a bank of synthesis filters and properly summed up to yield the reconstructed image. B. From sub-band to wavelet coding Over the years, there have been many efforts leading to improved and efficient design of filter banks and sub-band coding techniques. Since 1990, methods very similar and closely related to sub-band coding have been proposed by various researchers under the name of Wavelet Coding (WC) using filters specifically designed for this purpose. Such filters must meet additional and often conflicting requirements. These include short impulse response of the analysis filters to preserve the localization of image features as well as to have fast computation, short impulse response of the synthesis filters to prevent spreading of artifacts (ringing around edges) resulting from quantization errors, and linear phase of both types of filters since nonlinear phase introduce unpleasant waveform distortions around edges. Orthogonality is another useful requirement since orthogonal filters, in 407 IV. LIGHTWEIGHT MULTIMEDIA ENCRYPTION SCHEME A. Multimedia security using the dwt In this section, we give a brief summary of the security perspective of parameterized DWT filter. The overall scheme for multimedia authentication and encryption as well. B. Building the key space The number of DWT operations N in an image of size M x M pixels is bounded by the limit N log e (M).For example, we can obtain up to nine levels of wavelet decomposition for an image of size 512 x512 pixels. One level of wavelet decomposition involves two filtering operations: one each along the row and column directions. Thus, we can choose up to 18 different a value, one each for the 18 different instances of DWT kernels being used in the operation. The test image Lena was used for this simulation. The variations of a beyond the range of 1 to 3 yields a poor PSNR value, indicating poor compression of the coefficients. Thus, the parameter a can be varied between numerical range of 1 to 3 while yielding satisfactory compression. We can use 8 bits to divide the interval from 1 to 3 into subintervals of 0.008. Hence, it will take 8 bits to represent one a parameter. This gives us a keys pace of 144 bits for a 9 level decomposition. C. Multimedia Security The main advantage of the lightweight encryption scheme is that, while maintaining competitive compression performance and providing security, it comes at extremely low computational overhead. Use a wavelet filter parameterization scheme to provide key dependency to a blind watermarking algorithm. Similarly, the 144-bit keys pace can be used to encrypt input frames. This level of security can suffice for the soft encryption requirements of mobile multimedia applications and surveillance applications as previously mentioned. Against the background of the finalization of JPEG 2000 and the rising usage of this standard in the digital community, it becomes crucial to address issues of security and protection of intellectual property in JPEG 2000. In this respect, the diverse security needs of different applications are addressed in the framework of JPEG 2000 part 8 (JPSEC). Full encryption of a JPEG 2000 bit stream (e.g. using AES) may be feasible for some settings, where there is sufficient computing power available on both, the encoder and the decoder side, and where an application demands security in the sense of complete protection of the visual content. There are other settings, however, in which other requirements are more important than those provided by complete encryption with a traditional cipher. JPEG 2000 performs

exceptionally well at low bitrates and is thus well suited for mobile applications. In a mobile environment typically at least on one side there is low computing power. If visual content is to be transferred securely from one mobile device (like a mobile phone or a PDA) to another such device, computing power is restricted on the encoding and the decoding side, which could rule out full encryption as a feasible option for providing confidentiality. Furthermore, in such settings, there is often no need for complete protection of the visual content (cf. the notion of hard vs. soft encryption). In some application scenarios a degradation of quality (in terms of resolution or quality) for wrong keys is sufficient, as long as the full quality visual data can only be accessed with the unique correct key. In commercial scenarios access to a degraded version of the visual content often is a desired effect as an incentive for buying the full quality version ( transparent encryption ). Another consideration is that with full bits stream encryption, standard bit stream compliance is lost. A method for lightweight encryption that produces standard compliant bits streams is preferable. We can phrase requirements for lightweight encryption in the presented setting: low demands on computational power retain compression performance comparable to the standard CDF 9/7 biorthogonal wavelet filter in JPEG2000 provide sufficient security with respect to target application support transparent encryption retain standard JPEG 2000 bit stream compliance V. DWT ARCHITECTURE AND DESIGN Figure.5 provides an overview of our parameterized DWT architecture. The input data (one pixel input per cycle) x is pipelined for eight cycles. In this block, we perform shift and add operations to implement fractional multiplications for the DWT filter. The high and low pass filter coefficients are the final outputs of the DWT filter. We performed several optimization steps to reduce the cost of the underlying hardware, as summarized below: 1) Division by binary coefficients (e.g. 1/64, 1/16, 1/4) was performed using arithmetic shift operations. This eliminates the requirement for multipliers in the circuit and reduces the number of multipliers from 69 to 23. 2) Eight out of the nine inputs are passed through four adders to reduce the number of variables to five. These values (labeled as w0, w1, w2, w3 and w4) are multiplied with a, a2 and a 1 to get the necessary intermediate values which are input to shift and add logic. This optimization gives a tremendous savings in hardware. It reduces the number of adders in the design from 70 to 41 and the number of multipliers from 23 to 13. 3) The input stream was pipelined. As shown in Figure 5, our architecture takes one pixel (or channel input) as the input and outputs the low and high pass signal coefficients with a finite latency. Increasing the system latency allows us to achieve a higher clock speed (and hence higher throughput). A direct implementation of this architecture using a Virtex-XC4VLX40 FPGA resulted in a clock frequency of 60 MHz which was improved by pipelining the critical path. A. Reconfigurable Constant Multiplier The parameterized low and high pass filters were implemented using architecture given in Figure 5 using several multiplier units. The w i, i 2 {0, 1, 2, 3, 4} values are obtained by summing the inputs for symmetric taps in the DWT implementation as shown in Figure 5. w i is calculated as follows (where x(i-j) is the input x pipelined by j cycles): Wi(k) = x(k+i)+x(k-i), I belong to {0,1,2,3,4} Then, we can represent the filter expressions as: Here K i (α) and K^i(α) are the functions of the variable and w i, are obtained from the pipelined input. The values of functions K i (α) and K^i(α) remain the same as long as we have the same _ parameter. This implies that the values of these functions behave as constants and change only when we change the encryption key (and the associated parameter). This value can thus be computed and hardcoded into the circuit. This constant multiplication can easily be mapped to a reconfigurable hardware with programmable LUTs. If the input is represented by B1 bits and constant is represented by B2 bits, we can use (B1 + B2) B2-input LUTs to get the output values of H1(k) and H2(k). Alternatively we can break down a (B1 B2) bit multiplication into smaller input LUTs. Fig.5 DWT architecture 408 Thus, the LUTs based multiplication can be reconfigured to incorporate any changes in encryption key. We discuss the implementation of a 4 4 bit multiplier to explain the LUT mappings.

Fig.6. LUT architecture Fig.7. Illustration of 12-bit constant multiplication with a 8-bit input. (a) The individual bits of product are obtained as output of a 8-LUT. (b) 4-LUTs are used in the implementation with the input A divided into two 4-bit values 1) 4 4 Bits Multiplier using LUTs: Arbitrary hardware multipliers can be implemented using Propagate and Generate algorithm. We make some interesting observations to build a direct LUT-based multiplier. Let A and B be the two operands, both being 4 bits long. We define P i = A i _ B i and G i, = A i B i. The output bit and the sum at each stage can be represented as Si = Pi ^ CiC i+1 = Gi + PiCi On simplification, we get C 1 = G 0 = A 0 B 0 C 2 = G 1 + P 1 C 1 = A 1 B 1 + (A 1^B 1 )A 0 B 0 S 1 = A 1^B 1^C 1 = A 1^B 1^A 0 B 0 S 2 = A 2^B 2^C 2 = A 2^B 2^(A 1 B 1 +A 1^B 1 )A 0 B 0 ) We can observe that Si is a function of inputs and is characterized uniquely by a logical expression. If one of the inputs (say B) is a constant, Si can be represented as a logic function of bit values of A. S i = f i (A3, A2, A1, A0) The truth table of these functions w i (...) can be evaluated either by logical simplification or by exhaustive search over the input values. Thus, we can implement a 4 4 bit constant multiplication using 8 4-input LUTs or more generically, we can implement a M K bit constant multiplication using (M + K) K-input LUTs. It has been discovered that the LUT size of 4 to 6 provides the best area-delay product for an FPGA. Most commercial reconfigurable devices such as FPGAs have 4- input LUTs. We therefore discuss the mapping of an M K bit constant multiplier into 4-LUTs in the next subsection. 409 2) Mapping a generic RCM into LUTs: The multiplication of two inputs A and B (M -bit variable input A, K-bit reconfigurable constant B) can be mapped to LUTs similar to 4 4 bits multiplier by obtaining a generic expression for S1, S2... SM+K 1. Si values can be represented as f(am 1,AM 2,...A1) and can be therefore mapped into an M-input LUT. We have (M +K 1) Si values, requiring (M + K 1) M-input LUTs to multiply A and B. A (K+1)-input LUT can be built from 2 K-input LUTs (as shown in the Figure 3.2). For example, we can build a 8-LUT from 2 7-LUTs which can be synthesized from 2 2 = 4 6- LUTs. Thus, one 8-LUT can be made from 24 = 16 4-LUTs and an arbitrary M-LUT from 2M 4 4-LUTs. Figure.7 gives an example of multiplication of 8-bit number with 12-bit constant (M = 8, K = 12). Figure 7(a) depicts implementation using 8-LUTs. 20 8-LUTs or equivalently 128 4-LUTs are used in the design. Figure 7(b) provides an alternative implementation of the same multiplication by breaking the input number into multiples of 4-bit values. 4-input LUTs are used to obtain the X and Y values which are then added together using an adder. This implementation requires 32 4-LUTs and a 20 bit adder. This design requires less LUTs but the presence of 20-bit adder may slow down the clock speed of such a design. VI. RESULTS AND CONCLUSION The proposed multimedia encryption scheme gives promising results for image and video encryption while the underlying hardware architecture is developed using LUTs allowing reconfiguration and providing high throughput. The key information is embedded into the configuration bit stream of reconfigurable hardware. To the best of our knowledge, this is the first such scheme, optimized to provide high throughput multimedia delivery alongside with multimedia encryption using parameterization of compression blocks. The resultant waveform for the proposed architecture which is taken from Modelsim 6.3c simulator software is show in fig.8. Fig.8 Encrypted multimedia bitstream output waveform

FUTURE WORK This project can also be extended to use the Multiplier Design Based on Ancient Indian Vedic Mathematics instead of the normal Multiplier used in present DWT architecture to obtain better performance. REFERENCES [1] A. Pande and J. Zambreno A reconfigurable Architecture for secure multimedia delivery in IEEE Transactions in 23rd international conference on VLSI design 2010. [2] A. Pande and J. Zambreno An efficient hardware architecture for multimedia encryption and authentication using DWT in IEEE CS Intlsysvlsi 2009. [3] A. Pande and J. Zambreno, Design and analysis of efficient reconfigurable wavelet filters, in Proceedings of the IEEE Intl. Conf. on Electro Information Technology, 2008, pp. 337 342. [4] A.Pande and J. Zambreno, Polymorphic wavelet architecuture over reconfigurable hardware, in IEEE Intl. Conf. on Field Programmable Logic and Applications, 2008, pp. 471 474. [5] M. Martina and G. Masera, Multiplierless, folded 9/7 5/3 wavelet VLSI architecture, IEEE Transactions on Circuits and Systems II, vol. 54,no. 9, pp. 770 774, Sep. 2007. [6] H. Schwarz, D. Marpe, and T. Wiegand, Overview of the scalable video coding extension of the H.264/AVC standard, Circuits and Systems for Video Technology, IEEE Transactions on, vol. 17, no. 9, pp. 1103 1120, Sept. 2007. [7] A. Mittal, A. Pande, and P. K. Verma, Content-based network resource allocation for mobile engineering laboratory applications, in Proceedings of the Intl. Conference on Mobile Learning, 2007, pp. 146 152. [8] A. Mittal, S. Gupta, S. Jain, and A. Jain, Content-based adaptive compression of educational videos using phase correlation techniques, ACM/ Springer Multimedia Systems, vol. 11, no. 3, pp. 249 259, 2006. AUTHOR S PROFILE Mr. Babu. M Working as an Asst.Professor in PSR REngasamy College of engineering, Sivakasi since July 2012. Finished M.E. from Eawari Engineering College, Chennai. Area of specialization is VLSI Design. Email: ibabum@gmail.com Mr. Mukuntharaj C Working as an Asst.Professor in PSR Rengasamy College of engineering, Sivakasi since June 2012. Finished M.Tech. from Kalasalingam University. Area of Specialization is VLSI Design. Email: mukuntharaj@psrr.edu.in Ms. Saranya. S Working as a Software Tester in Tata Consultancy Services, Chennai since November 2011. Finished M.E. from Eawari Engineering College, Chennai. Area of Specialization is VLSI Design. Email: sarankvp@yahoo.com 410