Image Steganalysis: Challenges
|
|
- Berniece Henderson
- 6 years ago
- Views:
Transcription
1 Image Steganalysis: Challenges Jiwu Huang,China BUCHAREST 2017
2 Acknowledgement Members in my team Dr. Weiqi Luo and Dr. Fangjun Huang Sun Yat-sen Univ., China Dr. Bin Li and Dr. Shunquan Tan, Mr. Jishen Zeng Shenzhen Univ., China
3 Outlines Steganography in Images Steganalysis vs. Steganography Challenges in Steganalysis 3
4 Steganography What steganography? undetectable 4
5 Steganography Steganography vs. Cryptography? Unreadable! plaintext E k (M) =? ciphertext plaintext Cryptography 5
6 Steganography Steganography and Cryptography? cover Nothing! plaintext M Hiding M stego plaintext Steganography 6
7 Steganography Secret message Cryptography Encryption Encrypted bits Steganography Cover image Hiding Unsecure channel Security: 1) difficulty to find stego images 2) difficulty to extract the hidden bits 7
8 Steganography Security for steganography Secure steganography: undetectable Can only be estimated with a probability about random guessing Not necessary or sufficient to be imperceptible Imperceptible does not means undetectable perceptible does not means detectable 8
9 Steganography Security for steganography K-L distance: security (Cachin 2004) P X ---distribution of covers P Y ---distribution of stegos relative entropy security 9
10 Steganography Security for steganography Maximum Mean Discrepancy-based Security (Fridrich 2008) x i, y i : Sample of P X, P Y What function f should be selected? 10
11 Steganography Security for steganography Steganalyzer s ROC-based Security (Memon 2003) security: ROC:TP rate ~FP rate 11
12 Steganalysis vs. Steganography 12
13 Steganalysis vs. Steganography Steganalysis 13
14 Steganalysis vs. Steganography Early targeted approaches Attacking LSB-based steganography Attacking OutGuess, MB, F5, YASS Advanced universal approaches Image Quality Features (Memon et. al) Calibration Based Features (Fridrich et. al) Moment Based Features (Farid et. al) Correlation Based Features (Moulin, Sullivan, Shi) 14
15 Steganalysis vs. Steganography Cat & Mouse Game targeted approaches steganography LSB-based (J-steg) Model-based (MB1) steganalysis Histogram-based (Chi-square), RS Over fitting Compensationbased (MB2) Block artifact due to many changes 15
16 Steganalysis vs. Steganography Cat & Mouse Game universal approaches steganography matrix coding wet paper code STC(syndrome-trellis codes) Distortion functions steganalysis High-dimensional features +machine learning Adaptive+ Adaptive+ 16
17 Steganalysis vs. Steganography Advanced universal approaches Y i testing Y: feature vector Classifier: mapping Y i i : i =0,nature image; i =1,stego image 17
18 Steganalysis vs. Steganography Advanced universal approaches training Classifiers: SVM, Fisher linear discriminant, neural network, ensemble, others. 18
19 19 Statistical features nature images stego images Steganalysis wins steganography
20 20 Statistical features stego images nature images steganography wins Steganalysis
21 21 Counterwork between steganography and steganalysis statistical model of nature images
22 Challenges in Steganalysis Statistical model of nature images Is there such universal statistical model It seem to be difficult to answer If yes, how to model? At least, it is not easy to model texture regions 22
23 Challenges in Steganalysis How to find the traces a steganographic scheme? Limited performance in the existing features Objective image quality measures, Calibration-based features, statistical moments, gray-level co-occurrence matrix based features, Markov process based features, SPAM (subtractive pixel adjacency matrix), SRM (spatial rich model) SRM: generating features (Fridrich 2012) 23
24 SRM Computing residuals using different submodels Ri,j = X i,j(ni,j)-cxi,j Truncation and quantization by quantization step q and threshold T Ri,j = trunc T (round(ri,j/q)) Using co-occurrence matrices for feature extraction Fridrich et. al, Rich Models for Steganalysis of Digital Images, IEEE T-IFS, 7(3): ,
25 25
26 Performance of SRM under different datasets SRM + ensemble classifier Image Dataset: downsampling from high resolution raw images Downsampling type: bicubic, bilinear, lanczos2, nearest 5000 images for training, 5000 for testing. stegnographic algorithm: S-UNIWARD, 0.4bpp 26
27 Challenges in Steganalysis How to find the traces a steganographic scheme? How to design efficient features? To achieve better performance Methodology for constructing features Compact features Low computation load 27
28 Challenges in Steganalysis Mis-matchng between training and testing databases Mis-matching issue Mis-matching: datasets for training and testing have different properties Steganalyzers should be robust In steganalysis community: downsampling leaves traces 28
29 Downsampling effect on steganalysis SRM + ensemble classifier Image Dataset: downsampling from high resolution raw images 5000 images for training, 5000 for testing. stegnographic algorithm: S-UNIWARD, 0.4bpp 29
30 Challenges in Steganalysis Does deep learning work? Great success in pattern recognition Does DL work in recognizing Imperceptible differences? Works on some easy forensics issues However, how about steganalysis? Have not seen good progress in steganalysis in spatial domain Recent progress in steganalysis for JPEG domain 30
31 Deep learning in JPEG steganalysis JPEG steganography: J-Uniward, 0.4bpp Training: 800K images from ImageNet Testing: 200K images from ImageNet Method Accuracy DCTR features (8000dims) 0.65 PHARM features (12600dims) 0.68 Proposed deep network 0.75 JPEG stegnographic algorithm: J-UNIWARD, 0.4bpp Zeng et,al, Large-scale JPEG image steganalysis using hybrid deep-learning framework, Submitted to IEEE Trans. on IFS 31
32 Challenges in Steganalysis Dataset for training Golden rules in machine learning data samples should be at least times with the total number of parameters. Steganalysis in spatial domain: Highdimensional features vs. small dataset Taking SRM as an example 32
33 SRM: very high feature dimension vs. small training dataset features:34671 Image database: 10 K, training images: 5K JPEG stegnographic algorithm: Juniward, 0.4bpp Fridrich et. al, Rich Models for Steganalysis of Digital Images, IEEE T-IFS, 7(3): ,
34 DNN: very large number of network parameters vs. small training dataset parameters: 100K Image database: 10 K, training images: 5K JPEG stegnographic algorithm: Juniward, 0.4bpp Xu et., al, Structural Design of Convolutional Neural Networks for Steganalysis, IEEE SPL, 23(5), ,
35 Challenges in Steganalysis Dataset for training Uncompressed images are not commonly used in practice Very huge manpower to collect an applicable raw dataset 35
36 Conclusions Stegnography is a good way in secret communication and thus steganalysis is of important Have some progress in laboratory There are still many challenges Deep learning may be useful in JPEG steganalysis 36
37
1 Introduction Steganography and Steganalysis as Empirical Sciences Objective and Approach Outline... 4
Contents 1 Introduction... 1 1.1 Steganography and Steganalysis as Empirical Sciences... 1 1.2 Objective and Approach... 2 1.3 Outline... 4 Part I Background and Advances in Theory 2 Principles of Modern
More informationQuantitative Evaluation of Pairs and RS Steganalysis
Quantitative Evaluation of Pairs and RS Steganalysis Andrew Ker Oxford University Computing Laboratory adk@comlab.ox.ac.uk Royal Society University Research Fellow / Junior Research Fellow at University
More informationCopy Move Image Forgery Detection Method Using Steerable Pyramid Transform and Texture Descriptor
Copy Move Image Forgery Detection Method Using Steerable Pyramid Transform and Texture Descriptor Ghulam Muhammad 1, Muneer H. Al-Hammadi 1, Muhammad Hussain 2, Anwar M. Mirza 1, and George Bebis 3 1 Dept.
More informationAdvanced Statistical Steganalysis
Information Security and Cryptography Advanced Statistical Steganalysis Bearbeitet von Rainer Böhme 1. Auflage 2010. Buch. xvi, 288 S. Hardcover ISBN 978 3 642 14312 0 Format (B x L): 15,5 x 23,5 cm Gewicht:
More informationSteganography in Digital Media
Steganography in Digital Media Steganography, the art of hiding of information in apparently innocuous objects or images, is a field with a rich heritage, and an area of rapid current development. This
More informationKeywords- Cryptography, Frame, Least Significant Bit, Pseudo Random Equations, Text, Video Image, Video Steganography.
International Journal of Scientific & Engineering Research, Volume 5, Issue 7, July-2014 164 High Security Video Steganography Putti DeepthiChandan, Dr. M. Narayana Abstract- Video Steganography is a technique
More informationReducing DDR Latency for Embedded Image Steganography
Reducing DDR Latency for Embedded Image Steganography J Haralambides and L Bijaminas Department of Math and Computer Science, Barry University, Miami Shores, FL, USA Abstract - Image steganography is the
More informationWINGS TO YOUR THOUGHTS..
Review on Various Image Steganographic Techniques Amrit Preet Kaur 1, Gagandeep Singh 2 1 M.Tech Scholar, Chandigarh Engineering College, Department of CSE, Landran, India, kaur.amritpreet13@gmail 2 Assistant
More informationSteganographic Technique for Hiding Secret Audio in an Image
Steganographic Technique for Hiding Secret Audio in an Image 1 Aiswarya T, 2 Mansi Shah, 3 Aishwarya Talekar, 4 Pallavi Raut 1,2,3 UG Student, 4 Assistant Professor, 1,2,3,4 St John of Engineering & Management,
More informationMoving Steganography and Steganalysis from the Laboratory into the Real World
Moving Steganography and Steganalysis from the Laboratory into the Real World Andrew D. Ker Dept. of Computer Science University of Oxford Oxford OX1 3QD, UK adk@cs.ox.ac.uk Rémi Cogranne LM2S - UMR STMR
More informationMoving Steganography and Steganalysis from the Laboratory into the Real World
Moving Steganography and Steganalysis from the Laboratory into the Real World Andrew Ker, Patrick Bas, Rainer Böhme, Rémi Cogranne, Scott Craver, Tomáš Filler, Jessica Fridrich, Tomas Pevny To cite this
More informationWhat is Steganography
STEGANOGRAPHY Outline Introduction Outline What is Steganography History Lesson Why is this important to Digital Forensics Steganography and Cryptography Variations Classifications of Steganography Inside
More informationChannel models for high-capacity information hiding in images
Channel models for high-capacity information hiding in images Johann A. Briffa a, Manohar Das b School of Engineering and Computer Science Oakland University, Rochester MI 48309 ABSTRACT We consider the
More informationNearest-neighbor and Bilinear Resampling Factor Estimation to Detect Blockiness or Blurriness of an Image*
Nearest-neighbor and Bilinear Resampling Factor Estimation to Detect Blockiness or Blurriness of an Image* Ariawan Suwendi Prof. Jan P. Allebach Purdue University - West Lafayette, IN *Research supported
More informationA Robust Method for Image Steganography based on Chaos Theory
A Robust Method for Image Steganography based on Chaos Theory Anoop Kumar Tiwari Research Scholar Dept of Computer Science Banaras Hindu University Ajay Rajpoot, Ex-M.Sc. Student Dept of Computer Science
More informationRegion Adaptive Unsharp Masking based DCT Interpolation for Efficient Video Intra Frame Up-sampling
International Conference on Electronic Design and Signal Processing (ICEDSP) 0 Region Adaptive Unsharp Masking based DCT Interpolation for Efficient Video Intra Frame Up-sampling Aditya Acharya Dept. of
More informationAutomatic Music Genre Classification
Automatic Music Genre Classification Nathan YongHoon Kwon, SUNY Binghamton Ingrid Tchakoua, Jackson State University Matthew Pietrosanu, University of Alberta Freya Fu, Colorado State University Yue Wang,
More informationVideo coding standards
Video coding standards Video signals represent sequences of images or frames which can be transmitted with a rate from 5 to 60 frames per second (fps), that provides the illusion of motion in the displayed
More informationA Framework for Segmentation of Interview Videos
A Framework for Segmentation of Interview Videos Omar Javed, Sohaib Khan, Zeeshan Rasheed, Mubarak Shah Computer Vision Lab School of Electrical Engineering and Computer Science University of Central Florida
More informationWYNER-ZIV VIDEO CODING WITH LOW ENCODER COMPLEXITY
WYNER-ZIV VIDEO CODING WITH LOW ENCODER COMPLEXITY (Invited Paper) Anne Aaron and Bernd Girod Information Systems Laboratory Stanford University, Stanford, CA 94305 {amaaron,bgirod}@stanford.edu Abstract
More informationModule 8 VIDEO CODING STANDARDS. Version 2 ECE IIT, Kharagpur
Module 8 VIDEO CODING STANDARDS Lesson 27 H.264 standard Lesson Objectives At the end of this lesson, the students should be able to: 1. State the broad objectives of the H.264 standard. 2. List the improved
More informationISSN (Print) Original Research Article. Coimbatore, Tamil Nadu, India
Scholars Journal of Engineering and Technology (SJET) Sch. J. Eng. Tech., 016; 4(1):1-5 Scholars Academic and Scientific Publisher (An International Publisher for Academic and Scientific Resources) www.saspublisher.com
More informationAn Efficient Low Bit-Rate Video-Coding Algorithm Focusing on Moving Regions
1128 IEEE TRANSACTIONS ON CIRCUITS AND SYSTEMS FOR VIDEO TECHNOLOGY, VOL. 11, NO. 10, OCTOBER 2001 An Efficient Low Bit-Rate Video-Coding Algorithm Focusing on Moving Regions Kwok-Wai Wong, Kin-Man Lam,
More informationUC San Diego UC San Diego Previously Published Works
UC San Diego UC San Diego Previously Published Works Title Classification of MPEG-2 Transport Stream Packet Loss Visibility Permalink https://escholarship.org/uc/item/9wk791h Authors Shin, J Cosman, P
More informationCS 1674: Intro to Computer Vision. Face Detection. Prof. Adriana Kovashka University of Pittsburgh November 7, 2016
CS 1674: Intro to Computer Vision Face Detection Prof. Adriana Kovashka University of Pittsburgh November 7, 2016 Today Window-based generic object detection basic pipeline boosting classifiers face detection
More informationImproving Frame Based Automatic Laughter Detection
Improving Frame Based Automatic Laughter Detection Mary Knox EE225D Class Project knoxm@eecs.berkeley.edu December 13, 2007 Abstract Laughter recognition is an underexplored area of research. My goal for
More informationWavelet transform based steganography technique to hide audio signals in image.
Available online at www.sciencedirect.com ScienceDirect Procedia Computer Science 47 (2015 ) 272 281 Wavelet transform based steganography technique to hide audio signals in image. Hemalatha S a,1, U.
More informationEmbedding Multilevel Image Encryption in the LAR Codec
Embedding Multilevel Image Encryption in the LAR Codec Jean Motsch, Olivier Déforges, Marie Babel To cite this version: Jean Motsch, Olivier Déforges, Marie Babel. Embedding Multilevel Image Encryption
More informationVISUAL CONTENT BASED SEGMENTATION OF TALK & GAME SHOWS. O. Javed, S. Khan, Z. Rasheed, M.Shah. {ojaved, khan, zrasheed,
VISUAL CONTENT BASED SEGMENTATION OF TALK & GAME SHOWS O. Javed, S. Khan, Z. Rasheed, M.Shah {ojaved, khan, zrasheed, shah}@cs.ucf.edu Computer Vision Lab School of Electrical Engineering and Computer
More informationChord Classification of an Audio Signal using Artificial Neural Network
Chord Classification of an Audio Signal using Artificial Neural Network Ronesh Shrestha Student, Department of Electrical and Electronic Engineering, Kathmandu University, Dhulikhel, Nepal ---------------------------------------------------------------------***---------------------------------------------------------------------
More informationA Layered Approach for Watermarking In Images Based On Huffman Coding
A Layered Approach for Watermarking In Images Based On Huffman Coding D. Lalitha Bhaskari 1 P. S. Avadhani 1 M. Viswanath 2 1 Department of Computer Science & Systems Engineering, Andhra University, 2
More informationInternational Journal of Advance Engineering and Research Development MUSICAL INSTRUMENT IDENTIFICATION AND STATUS FINDING WITH MFCC
Scientific Journal of Impact Factor (SJIF): 5.71 International Journal of Advance Engineering and Research Development Volume 5, Issue 04, April -2018 e-issn (O): 2348-4470 p-issn (P): 2348-6406 MUSICAL
More informationMotion Re-estimation for MPEG-2 to MPEG-4 Simple Profile Transcoding. Abstract. I. Introduction
Motion Re-estimation for MPEG-2 to MPEG-4 Simple Profile Transcoding Jun Xin, Ming-Ting Sun*, and Kangwook Chun** *Department of Electrical Engineering, University of Washington **Samsung Electronics Co.
More informationAnalog Performance-based Self-Test Approaches for Mixed-Signal Circuits
Analog Performance-based Self-Test Approaches for Mixed-Signal Circuits Tutorial, September 1, 2015 Byoungho Kim, Ph.D. Division of Electrical Engineering Hanyang University Outline State of the Art for
More informationExperiments on musical instrument separation using multiplecause
Experiments on musical instrument separation using multiplecause models J Klingseisen and M D Plumbley* Department of Electronic Engineering King's College London * - Corresponding Author - mark.plumbley@kcl.ac.uk
More informationMusic Genre Classification
Music Genre Classification chunya25 Fall 2017 1 Introduction A genre is defined as a category of artistic composition, characterized by similarities in form, style, or subject matter. [1] Some researchers
More informationKey-based scrambling for secure image communication
University of Wollongong Research Online Faculty of Engineering and Information Sciences - Papers: Part A Faculty of Engineering and Information Sciences 2012 Key-based scrambling for secure image communication
More informationDeepID: Deep Learning for Face Recognition. Department of Electronic Engineering,
DeepID: Deep Learning for Face Recognition Xiaogang Wang Department of Electronic Engineering, The Chinese University i of Hong Kong Machine Learning with Big Data Machine learning with small data: overfitting,
More informationMusic Genre Classification and Variance Comparison on Number of Genres
Music Genre Classification and Variance Comparison on Number of Genres Miguel Francisco, miguelf@stanford.edu Dong Myung Kim, dmk8265@stanford.edu 1 Abstract In this project we apply machine learning techniques
More informationCOMP 249 Advanced Distributed Systems Multimedia Networking. Video Compression Standards
COMP 9 Advanced Distributed Systems Multimedia Networking Video Compression Standards Kevin Jeffay Department of Computer Science University of North Carolina at Chapel Hill jeffay@cs.unc.edu September,
More informationSinger Traits Identification using Deep Neural Network
Singer Traits Identification using Deep Neural Network Zhengshan Shi Center for Computer Research in Music and Acoustics Stanford University kittyshi@stanford.edu Abstract The author investigates automatic
More informationImage Resolution and Contrast Enhancement of Satellite Geographical Images with Removal of Noise using Wavelet Transforms
Image Resolution and Contrast Enhancement of Satellite Geographical Images with Removal of Noise using Wavelet Transforms Prajakta P. Khairnar* 1, Prof. C. A. Manjare* 2 1 M.E. (Electronics (Digital Systems)
More informationCryptagram. Photo Privacy for Online Social Media Matt Tierney, Ian Spiro Christoph Bregler, Lakshmi Subramanian
Cryptagram Photo Privacy for Online Social Media http://cryptagr.am Matt Tierney, Ian Spiro Christoph Bregler, Lakshmi Subramanian Courant Institute, NYU Photo Privacy Problem Photo Privacy Problem Photo
More informationVisual Communication at Limited Colour Display Capability
Visual Communication at Limited Colour Display Capability Yan Lu, Wen Gao and Feng Wu Abstract: A novel scheme for visual communication by means of mobile devices with limited colour display capability
More informationCapacity is the Wrong Paradigm*
Capacity is the Wrong Paradigm* Ira S. Moskowitz Center for High Assurance Computer Systems-5540 Naval Research Laboratory Washington, DC 20375 LiWu Chang Center for High Assurance Computer Systems-5540
More informationMusic Emotion Recognition. Jaesung Lee. Chung-Ang University
Music Emotion Recognition Jaesung Lee Chung-Ang University Introduction Searching Music in Music Information Retrieval Some information about target music is available Query by Text: Title, Artist, or
More informationMultichannel Satellite Image Resolution Enhancement Using Dual-Tree Complex Wavelet Transform and NLM Filtering
Multichannel Satellite Image Resolution Enhancement Using Dual-Tree Complex Wavelet Transform and NLM Filtering P.K Ragunath 1, A.Balakrishnan 2 M.E, Karpagam University, Coimbatore, India 1 Asst Professor,
More informationEE391 Special Report (Spring 2005) Automatic Chord Recognition Using A Summary Autocorrelation Function
EE391 Special Report (Spring 25) Automatic Chord Recognition Using A Summary Autocorrelation Function Advisor: Professor Julius Smith Kyogu Lee Center for Computer Research in Music and Acoustics (CCRMA)
More informationTRAFFIC SURVEILLANCE VIDEO MANAGEMENT SYSTEM
TRAFFIC SURVEILLANCE VIDEO MANAGEMENT SYSTEM K.Ganesan*, Kavitha.C, Kriti Tandon, Lakshmipriya.R TIFAC-Centre of Relevance and Excellence in Automotive Infotronics*, School of Information Technology and
More informationOverview: Video Coding Standards
Overview: Video Coding Standards Video coding standards: applications and common structure ITU-T Rec. H.261 ISO/IEC MPEG-1 ISO/IEC MPEG-2 State-of-the-art: H.264/AVC Video Coding Standards no. 1 Applications
More informationOutline. Why do we classify? Audio Classification
Outline Introduction Music Information Retrieval Classification Process Steps Pitch Histograms Multiple Pitch Detection Algorithm Musical Genre Classification Implementation Future Work Why do we classify
More informationAutomatic Piano Music Transcription
Automatic Piano Music Transcription Jianyu Fan Qiuhan Wang Xin Li Jianyu.Fan.Gr@dartmouth.edu Qiuhan.Wang.Gr@dartmouth.edu Xi.Li.Gr@dartmouth.edu 1. Introduction Writing down the score while listening
More informationFast MBAFF/PAFF Motion Estimation and Mode Decision Scheme for H.264
Fast MBAFF/PAFF Motion Estimation and Mode Decision Scheme for H.264 Ju-Heon Seo, Sang-Mi Kim, Jong-Ki Han, Nonmember Abstract-- In the H.264, MBAFF (Macroblock adaptive frame/field) and PAFF (Picture
More informationAN IMPROVED ERROR CONCEALMENT STRATEGY DRIVEN BY SCENE MOTION PROPERTIES FOR H.264/AVC DECODERS
AN IMPROVED ERROR CONCEALMENT STRATEGY DRIVEN BY SCENE MOTION PROPERTIES FOR H.264/AVC DECODERS Susanna Spinsante, Ennio Gambi, Franco Chiaraluce Dipartimento di Elettronica, Intelligenza artificiale e
More informationA SUBJECTIVE STUDY OF THE INFLUENCE OF COLOR INFORMATION ON VISUAL QUALITY ASSESSMENT OF HIGH RESOLUTION PICTURES
A SUBJECTIVE STUDY OF THE INFLUENCE OF COLOR INFORMATION ON VISUAL QUALITY ASSESSMENT OF HIGH RESOLUTION PICTURES Francesca De Simone a, Frederic Dufaux a, Touradj Ebrahimi a, Cristina Delogu b, Vittorio
More informationP. Sanyasi Naidu* and Jagadish Gurrala**
I J C T A, 9(32), 2016, pp. 261-269 International Science Press ISSN: 0974-5572 A Study of Low Power Consumable Frameworks for Hiding Audio signals in Image Container Using Different Steganography techniques
More informationTemplate Protection under Signal Degradation: A Case-Study on Iris-Biometric Fuzzy Commitment Schemes
Template Protection under Signal Degradation: A Case-Study on Iris-Biometric Fuzzy Commitment Schemes Christian Rathgeb Andreas Uhl Technical Report 11-4 November 11 Department of Computer Sciences Jakob-Haringer-Straße
More informationMultiple Image Secret Sharing based on Linear System
Indian Journal of Science and Technology, Vol 10(33), 10.17485/ijst/2017/v10i33/113085, September 2017 ISSN (Print) : 0974-6846 ISSN (Online) : 0974-5645 Multiple Image Secret Sharing based on Linear System
More informationDETECTION OF SLOW-MOTION REPLAY SEGMENTS IN SPORTS VIDEO FOR HIGHLIGHTS GENERATION
DETECTION OF SLOW-MOTION REPLAY SEGMENTS IN SPORTS VIDEO FOR HIGHLIGHTS GENERATION H. Pan P. van Beek M. I. Sezan Electrical & Computer Engineering University of Illinois Urbana, IL 6182 Sharp Laboratories
More informationIntroduction to image compression
Introduction to image compression 1997-2015 Josef Pelikán CGG MFF UK Praha pepca@cgg.mff.cuni.cz http://cgg.mff.cuni.cz/~pepca/ Compression 2015 Josef Pelikán, http://cgg.mff.cuni.cz/~pepca 1 / 12 Motivation
More informationAnalysis of a Two Step MPEG Video System
Analysis of a Two Step MPEG Video System Lufs Telxeira (*) (+) (*) INESC- Largo Mompilhet 22, 4000 Porto Portugal (+) Universidade Cat61ica Portnguesa, Rua Dingo Botelho 1327, 4150 Porto, Portugal Abstract:
More informationLecture 9 Source Separation
10420CS 573100 音樂資訊檢索 Music Information Retrieval Lecture 9 Source Separation Yi-Hsuan Yang Ph.D. http://www.citi.sinica.edu.tw/pages/yang/ yang@citi.sinica.edu.tw Music & Audio Computing Lab, Research
More informationA Study of Encoding and Decoding Techniques for Syndrome-Based Video Coding
MITSUBISHI ELECTRIC RESEARCH LABORATORIES http://www.merl.com A Study of Encoding and Decoding Techniques for Syndrome-Based Video Coding Min Wu, Anthony Vetro, Jonathan Yedidia, Huifang Sun, Chang Wen
More informationMUSI-6201 Computational Music Analysis
MUSI-6201 Computational Music Analysis Part 9.1: Genre Classification alexander lerch November 4, 2015 temporal analysis overview text book Chapter 8: Musical Genre, Similarity, and Mood (pp. 151 155)
More informationAutomatic Extraction of Popular Music Ringtones Based on Music Structure Analysis
Automatic Extraction of Popular Music Ringtones Based on Music Structure Analysis Fengyan Wu fengyanyy@163.com Shutao Sun stsun@cuc.edu.cn Weiyao Xue Wyxue_std@163.com Abstract Automatic extraction of
More informationA SVD BASED SCHEME FOR POST PROCESSING OF DCT CODED IMAGES
Electronic Letters on Computer Vision and Image Analysis 8(3): 1-14, 2009 A SVD BASED SCHEME FOR POST PROCESSING OF DCT CODED IMAGES Vinay Kumar Srivastava Assistant Professor, Department of Electronics
More informationAdaptive Distributed Compressed Video Sensing
Journal of Information Hiding and Multimedia Signal Processing 2014 ISSN 2073-4212 Ubiquitous International Volume 5, Number 1, January 2014 Adaptive Distributed Compressed Video Sensing Xue Zhang 1,3,
More informationNeural Network for Music Instrument Identi cation
Neural Network for Music Instrument Identi cation Zhiwen Zhang(MSE), Hanze Tu(CCRMA), Yuan Li(CCRMA) SUN ID: zhiwen, hanze, yuanli92 Abstract - In the context of music, instrument identi cation would contribute
More informationStream Cipher. Block cipher as stream cipher LFSR stream cipher RC4 General remarks. Stream cipher
Lecturers: Mark D. Ryan and David Galindo. Cryptography 2015. Slide: 90 Stream Cipher Suppose you want to encrypt a stream of data, such as: the data from a keyboard the data from a sensor Block ciphers
More informationUniversity of Bristol - Explore Bristol Research. Peer reviewed version. Link to published version (if available): /ICASSP.2016.
Hosking, B., Agrafiotis, D., Bull, D., & Easton, N. (2016). An adaptive resolution rate control method for intra coding in HEVC. In 2016 IEEE International Conference on Acoustics, Speech and Signal Processing
More informationMan-Machine-Interface (Video) Nataliya Nadtoka coach: Jens Bialkowski
Seminar Digitale Signalverarbeitung in Multimedia-Geräten SS 2003 Man-Machine-Interface (Video) Computation Engineering Student Nataliya Nadtoka coach: Jens Bialkowski Outline 1. Processing Scheme 2. Human
More informationTopics in Computer Music Instrument Identification. Ioanna Karydi
Topics in Computer Music Instrument Identification Ioanna Karydi Presentation overview What is instrument identification? Sound attributes & Timbre Human performance The ideal algorithm Selected approaches
More informationDocument Analysis Support for the Manual Auditing of Elections
Document Analysis Support for the Manual Auditing of Elections Daniel Lopresti Xiang Zhou Xiaolei Huang Gang Tan Department of Computer Science and Engineering Lehigh University Bethlehem, PA 18015, USA
More informationStatistical Modeling and Retrieval of Polyphonic Music
Statistical Modeling and Retrieval of Polyphonic Music Erdem Unal Panayiotis G. Georgiou and Shrikanth S. Narayanan Speech Analysis and Interpretation Laboratory University of Southern California Los Angeles,
More informationCHAPTER 8 CONCLUSION AND FUTURE SCOPE
124 CHAPTER 8 CONCLUSION AND FUTURE SCOPE Data hiding is becoming one of the most rapidly advancing techniques the field of research especially with increase in technological advancements in internet and
More informationWE CONSIDER an enhancement technique for degraded
1140 IEEE SIGNAL PROCESSING LETTERS, VOL. 21, NO. 9, SEPTEMBER 2014 Example-based Enhancement of Degraded Video Edson M. Hung, Member, IEEE, Diogo C. Garcia, Member, IEEE, and Ricardo L. de Queiroz, Senior
More informationConstant Bit Rate for Video Streaming Over Packet Switching Networks
International OPEN ACCESS Journal Of Modern Engineering Research (IJMER) Constant Bit Rate for Video Streaming Over Packet Switching Networks Mr. S. P.V Subba rao 1, Y. Renuka Devi 2 Associate professor
More informationNoise Flooding for Detecting Audio Adversarial Examples Against Automatic Speech Recognition
Noise Flooding for Detecting Audio Adversarial Examples Against Automatic Speech Recognition Krishan Rajaratnam The College University of Chicago Chicago, USA krajaratnam@uchicago.edu Jugal Kalita Department
More informationVideo compression principles. Color Space Conversion. Sub-sampling of Chrominance Information. Video: moving pictures and the terms frame and
Video compression principles Video: moving pictures and the terms frame and picture. one approach to compressing a video source is to apply the JPEG algorithm to each frame independently. This approach
More informationJoint source-channel video coding for H.264 using FEC
Department of Information Engineering (DEI) University of Padova Italy Joint source-channel video coding for H.264 using FEC Simone Milani simone.milani@dei.unipd.it DEI-University of Padova Gian Antonio
More informationA PERPLEXITY BASED COVER SONG MATCHING SYSTEM FOR SHORT LENGTH QUERIES
12th International Society for Music Information Retrieval Conference (ISMIR 2011) A PERPLEXITY BASED COVER SONG MATCHING SYSTEM FOR SHORT LENGTH QUERIES Erdem Unal 1 Elaine Chew 2 Panayiotis Georgiou
More informationVector-Valued Image Interpolation by an Anisotropic Diffusion-Projection PDE
Computer Vision, Speech Communication and Signal Processing Group School of Electrical and Computer Engineering National Technical University of Athens, Greece URL: http://cvsp.cs.ntua.gr Vector-Valued
More informationRebroadcast Attacks: Defenses, Reattacks, and Redefenses
Rebroadcast Attacks: Defenses, Reattacks, and Redefenses Wei Fan, Shruti Agarwal, and Hany Farid Computer Science Dartmouth College Hanover, NH 35 Email: {wei.fan, shruti.agarwal.gr, hany.farid}@dartmouth.edu
More informationAn Introduction to Image Compression
An Introduction to Image Compression Munish Kumar 1, Anshul Anand 2 1 M.Tech Student, Department of CSE, Shri Baba Mastnath Engineering College, Rohtak (INDIA) 2 Assistant Professor, Department of CSE,
More informationCERIAS Tech Report Preprocessing and Postprocessing Techniques for Encoding Predictive Error Frames in Rate Scalable Video Codecs by E
CERIAS Tech Report 2001-118 Preprocessing and Postprocessing Techniques for Encoding Predictive Error Frames in Rate Scalable Video Codecs by E Asbun, P Salama, E Delp Center for Education and Research
More informationImplementation of an MPEG Codec on the Tilera TM 64 Processor
1 Implementation of an MPEG Codec on the Tilera TM 64 Processor Whitney Flohr Supervisor: Mark Franklin, Ed Richter Department of Electrical and Systems Engineering Washington University in St. Louis Fall
More informationVERY low bit-rate video coding has triggered intensive. Significance-Linked Connected Component Analysis for Very Low Bit-Rate Wavelet Video Coding
630 IEEE TRANSACTIONS ON CIRCUITS AND SYSTEMS FOR VIDEO TECHNOLOGY, VOL. 9, NO. 4, JUNE 1999 Significance-Linked Connected Component Analysis for Very Low Bit-Rate Wavelet Video Coding Jozsef Vass, Student
More informationOptimized Color Based Compression
Optimized Color Based Compression 1 K.P.SONIA FENCY, 2 C.FELSY 1 PG Student, Department Of Computer Science Ponjesly College Of Engineering Nagercoil,Tamilnadu, India 2 Asst. Professor, Department Of Computer
More informationIntra-frame JPEG-2000 vs. Inter-frame Compression Comparison: The benefits and trade-offs for very high quality, high resolution sequences
Intra-frame JPEG-2000 vs. Inter-frame Compression Comparison: The benefits and trade-offs for very high quality, high resolution sequences Michael Smith and John Villasenor For the past several decades,
More informationCONSTRUCTION OF LOW-DISTORTED MESSAGE-RICH VIDEOS FOR PERVASIVE COMMUNICATION
2016 International Computer Symposium CONSTRUCTION OF LOW-DISTORTED MESSAGE-RICH VIDEOS FOR PERVASIVE COMMUNICATION 1 Zhen-Yu You ( ), 2 Yu-Shiuan Tsai ( ) and 3 Wen-Hsiang Tsai ( ) 1 Institute of Information
More informationDeep Neural Networks Scanning for patterns (aka convolutional networks) Bhiksha Raj
Deep Neural Networks Scanning for patterns (aka convolutional networks) Bhiksha Raj 1 Story so far MLPs are universal function approximators Boolean functions, classifiers, and regressions MLPs can be
More informationIndexing local features. Wed March 30 Prof. Kristen Grauman UT-Austin
Indexing local features Wed March 30 Prof. Kristen Grauman UT-Austin Matching local features Kristen Grauman Matching local features? Image 1 Image 2 To generate candidate matches, find patches that have
More informationHigh Quality Digital Video Processing: Technology and Methods
High Quality Digital Video Processing: Technology and Methods IEEE Computer Society Invited Presentation Dr. Jorge E. Caviedes Principal Engineer Digital Home Group Intel Corporation LEGAL INFORMATION
More informationResearch on sampling of vibration signals based on compressed sensing
Research on sampling of vibration signals based on compressed sensing Hongchun Sun 1, Zhiyuan Wang 2, Yong Xu 3 School of Mechanical Engineering and Automation, Northeastern University, Shenyang, China
More informationResearch Topic. Error Concealment Techniques in H.264/AVC for Wireless Video Transmission in Mobile Networks
Research Topic Error Concealment Techniques in H.264/AVC for Wireless Video Transmission in Mobile Networks July 22 nd 2008 Vineeth Shetty Kolkeri EE Graduate,UTA 1 Outline 2. Introduction 3. Error control
More informationOptimal look-up table-based data hiding
Published in IET Signal Processing Received on 9th December 2008 Revised on 19th December 2009 Optimal look-up table-based data hiding X. Wang X.-P. Zhang ISSN 1751-9675 Department of Electrical & Computer
More informationInstrument Recognition in Polyphonic Mixtures Using Spectral Envelopes
Instrument Recognition in Polyphonic Mixtures Using Spectral Envelopes hello Jay Biernat Third author University of Rochester University of Rochester Affiliation3 words jbiernat@ur.rochester.edu author3@ismir.edu
More informationA Hybrid Approach for Information Hiding and Encryption using Multiple LSB s Algorithms
A Hybrid Approach for Information Hiding and Encryption using Multiple LSB s Algorithms H.B.Kekre 1, Tanuja Sarode 2 and Pallavi Halarnkar 3 1 Senior Professor, MPSTME, NMIMS University, Mumbai 2 Associate
More informationDistortion Compensated Lookup-Table Embedding: Joint Security and Robustness Enhancement for Quantization Based Data Hiding
Distortion Compensated Lookup-Table Embedding: Joint Security and Robustness Enhancement for Quantization Based Data Hiding Min Wu ECE Department, University of Maryland, College Park, U.S.A. ABSTRACT
More informationDATA hiding technologies have been widely studied in
IEEE TRANSACTIONS ON CIRCUITS AND SYSTEMS FOR VIDEO TECHNOLOGY, VOL 18, NO 6, JUNE 2008 769 A Novel Look-Up Table Design Method for Data Hiding With Reduced Distortion Xiao-Ping Zhang, Senior Member, IEEE,
More information