Image Steganalysis: Challenges

Size: px
Start display at page:

Download "Image Steganalysis: Challenges"

Transcription

1 Image Steganalysis: Challenges Jiwu Huang,China BUCHAREST 2017

2 Acknowledgement Members in my team Dr. Weiqi Luo and Dr. Fangjun Huang Sun Yat-sen Univ., China Dr. Bin Li and Dr. Shunquan Tan, Mr. Jishen Zeng Shenzhen Univ., China

3 Outlines Steganography in Images Steganalysis vs. Steganography Challenges in Steganalysis 3

4 Steganography What steganography? undetectable 4

5 Steganography Steganography vs. Cryptography? Unreadable! plaintext E k (M) =? ciphertext plaintext Cryptography 5

6 Steganography Steganography and Cryptography? cover Nothing! plaintext M Hiding M stego plaintext Steganography 6

7 Steganography Secret message Cryptography Encryption Encrypted bits Steganography Cover image Hiding Unsecure channel Security: 1) difficulty to find stego images 2) difficulty to extract the hidden bits 7

8 Steganography Security for steganography Secure steganography: undetectable Can only be estimated with a probability about random guessing Not necessary or sufficient to be imperceptible Imperceptible does not means undetectable perceptible does not means detectable 8

9 Steganography Security for steganography K-L distance: security (Cachin 2004) P X ---distribution of covers P Y ---distribution of stegos relative entropy security 9

10 Steganography Security for steganography Maximum Mean Discrepancy-based Security (Fridrich 2008) x i, y i : Sample of P X, P Y What function f should be selected? 10

11 Steganography Security for steganography Steganalyzer s ROC-based Security (Memon 2003) security: ROC:TP rate ~FP rate 11

12 Steganalysis vs. Steganography 12

13 Steganalysis vs. Steganography Steganalysis 13

14 Steganalysis vs. Steganography Early targeted approaches Attacking LSB-based steganography Attacking OutGuess, MB, F5, YASS Advanced universal approaches Image Quality Features (Memon et. al) Calibration Based Features (Fridrich et. al) Moment Based Features (Farid et. al) Correlation Based Features (Moulin, Sullivan, Shi) 14

15 Steganalysis vs. Steganography Cat & Mouse Game targeted approaches steganography LSB-based (J-steg) Model-based (MB1) steganalysis Histogram-based (Chi-square), RS Over fitting Compensationbased (MB2) Block artifact due to many changes 15

16 Steganalysis vs. Steganography Cat & Mouse Game universal approaches steganography matrix coding wet paper code STC(syndrome-trellis codes) Distortion functions steganalysis High-dimensional features +machine learning Adaptive+ Adaptive+ 16

17 Steganalysis vs. Steganography Advanced universal approaches Y i testing Y: feature vector Classifier: mapping Y i i : i =0,nature image; i =1,stego image 17

18 Steganalysis vs. Steganography Advanced universal approaches training Classifiers: SVM, Fisher linear discriminant, neural network, ensemble, others. 18

19 19 Statistical features nature images stego images Steganalysis wins steganography

20 20 Statistical features stego images nature images steganography wins Steganalysis

21 21 Counterwork between steganography and steganalysis statistical model of nature images

22 Challenges in Steganalysis Statistical model of nature images Is there such universal statistical model It seem to be difficult to answer If yes, how to model? At least, it is not easy to model texture regions 22

23 Challenges in Steganalysis How to find the traces a steganographic scheme? Limited performance in the existing features Objective image quality measures, Calibration-based features, statistical moments, gray-level co-occurrence matrix based features, Markov process based features, SPAM (subtractive pixel adjacency matrix), SRM (spatial rich model) SRM: generating features (Fridrich 2012) 23

24 SRM Computing residuals using different submodels Ri,j = X i,j(ni,j)-cxi,j Truncation and quantization by quantization step q and threshold T Ri,j = trunc T (round(ri,j/q)) Using co-occurrence matrices for feature extraction Fridrich et. al, Rich Models for Steganalysis of Digital Images, IEEE T-IFS, 7(3): ,

25 25

26 Performance of SRM under different datasets SRM + ensemble classifier Image Dataset: downsampling from high resolution raw images Downsampling type: bicubic, bilinear, lanczos2, nearest 5000 images for training, 5000 for testing. stegnographic algorithm: S-UNIWARD, 0.4bpp 26

27 Challenges in Steganalysis How to find the traces a steganographic scheme? How to design efficient features? To achieve better performance Methodology for constructing features Compact features Low computation load 27

28 Challenges in Steganalysis Mis-matchng between training and testing databases Mis-matching issue Mis-matching: datasets for training and testing have different properties Steganalyzers should be robust In steganalysis community: downsampling leaves traces 28

29 Downsampling effect on steganalysis SRM + ensemble classifier Image Dataset: downsampling from high resolution raw images 5000 images for training, 5000 for testing. stegnographic algorithm: S-UNIWARD, 0.4bpp 29

30 Challenges in Steganalysis Does deep learning work? Great success in pattern recognition Does DL work in recognizing Imperceptible differences? Works on some easy forensics issues However, how about steganalysis? Have not seen good progress in steganalysis in spatial domain Recent progress in steganalysis for JPEG domain 30

31 Deep learning in JPEG steganalysis JPEG steganography: J-Uniward, 0.4bpp Training: 800K images from ImageNet Testing: 200K images from ImageNet Method Accuracy DCTR features (8000dims) 0.65 PHARM features (12600dims) 0.68 Proposed deep network 0.75 JPEG stegnographic algorithm: J-UNIWARD, 0.4bpp Zeng et,al, Large-scale JPEG image steganalysis using hybrid deep-learning framework, Submitted to IEEE Trans. on IFS 31

32 Challenges in Steganalysis Dataset for training Golden rules in machine learning data samples should be at least times with the total number of parameters. Steganalysis in spatial domain: Highdimensional features vs. small dataset Taking SRM as an example 32

33 SRM: very high feature dimension vs. small training dataset features:34671 Image database: 10 K, training images: 5K JPEG stegnographic algorithm: Juniward, 0.4bpp Fridrich et. al, Rich Models for Steganalysis of Digital Images, IEEE T-IFS, 7(3): ,

34 DNN: very large number of network parameters vs. small training dataset parameters: 100K Image database: 10 K, training images: 5K JPEG stegnographic algorithm: Juniward, 0.4bpp Xu et., al, Structural Design of Convolutional Neural Networks for Steganalysis, IEEE SPL, 23(5), ,

35 Challenges in Steganalysis Dataset for training Uncompressed images are not commonly used in practice Very huge manpower to collect an applicable raw dataset 35

36 Conclusions Stegnography is a good way in secret communication and thus steganalysis is of important Have some progress in laboratory There are still many challenges Deep learning may be useful in JPEG steganalysis 36

37

1 Introduction Steganography and Steganalysis as Empirical Sciences Objective and Approach Outline... 4

1 Introduction Steganography and Steganalysis as Empirical Sciences Objective and Approach Outline... 4 Contents 1 Introduction... 1 1.1 Steganography and Steganalysis as Empirical Sciences... 1 1.2 Objective and Approach... 2 1.3 Outline... 4 Part I Background and Advances in Theory 2 Principles of Modern

More information

Quantitative Evaluation of Pairs and RS Steganalysis

Quantitative Evaluation of Pairs and RS Steganalysis Quantitative Evaluation of Pairs and RS Steganalysis Andrew Ker Oxford University Computing Laboratory adk@comlab.ox.ac.uk Royal Society University Research Fellow / Junior Research Fellow at University

More information

Copy Move Image Forgery Detection Method Using Steerable Pyramid Transform and Texture Descriptor

Copy Move Image Forgery Detection Method Using Steerable Pyramid Transform and Texture Descriptor Copy Move Image Forgery Detection Method Using Steerable Pyramid Transform and Texture Descriptor Ghulam Muhammad 1, Muneer H. Al-Hammadi 1, Muhammad Hussain 2, Anwar M. Mirza 1, and George Bebis 3 1 Dept.

More information

Advanced Statistical Steganalysis

Advanced Statistical Steganalysis Information Security and Cryptography Advanced Statistical Steganalysis Bearbeitet von Rainer Böhme 1. Auflage 2010. Buch. xvi, 288 S. Hardcover ISBN 978 3 642 14312 0 Format (B x L): 15,5 x 23,5 cm Gewicht:

More information

Steganography in Digital Media

Steganography in Digital Media Steganography in Digital Media Steganography, the art of hiding of information in apparently innocuous objects or images, is a field with a rich heritage, and an area of rapid current development. This

More information

Keywords- Cryptography, Frame, Least Significant Bit, Pseudo Random Equations, Text, Video Image, Video Steganography.

Keywords- Cryptography, Frame, Least Significant Bit, Pseudo Random Equations, Text, Video Image, Video Steganography. International Journal of Scientific & Engineering Research, Volume 5, Issue 7, July-2014 164 High Security Video Steganography Putti DeepthiChandan, Dr. M. Narayana Abstract- Video Steganography is a technique

More information

Reducing DDR Latency for Embedded Image Steganography

Reducing DDR Latency for Embedded Image Steganography Reducing DDR Latency for Embedded Image Steganography J Haralambides and L Bijaminas Department of Math and Computer Science, Barry University, Miami Shores, FL, USA Abstract - Image steganography is the

More information

WINGS TO YOUR THOUGHTS..

WINGS TO YOUR THOUGHTS.. Review on Various Image Steganographic Techniques Amrit Preet Kaur 1, Gagandeep Singh 2 1 M.Tech Scholar, Chandigarh Engineering College, Department of CSE, Landran, India, kaur.amritpreet13@gmail 2 Assistant

More information

Steganographic Technique for Hiding Secret Audio in an Image

Steganographic Technique for Hiding Secret Audio in an Image Steganographic Technique for Hiding Secret Audio in an Image 1 Aiswarya T, 2 Mansi Shah, 3 Aishwarya Talekar, 4 Pallavi Raut 1,2,3 UG Student, 4 Assistant Professor, 1,2,3,4 St John of Engineering & Management,

More information

Moving Steganography and Steganalysis from the Laboratory into the Real World

Moving Steganography and Steganalysis from the Laboratory into the Real World Moving Steganography and Steganalysis from the Laboratory into the Real World Andrew D. Ker Dept. of Computer Science University of Oxford Oxford OX1 3QD, UK adk@cs.ox.ac.uk Rémi Cogranne LM2S - UMR STMR

More information

Moving Steganography and Steganalysis from the Laboratory into the Real World

Moving Steganography and Steganalysis from the Laboratory into the Real World Moving Steganography and Steganalysis from the Laboratory into the Real World Andrew Ker, Patrick Bas, Rainer Böhme, Rémi Cogranne, Scott Craver, Tomáš Filler, Jessica Fridrich, Tomas Pevny To cite this

More information

What is Steganography

What is Steganography STEGANOGRAPHY Outline Introduction Outline What is Steganography History Lesson Why is this important to Digital Forensics Steganography and Cryptography Variations Classifications of Steganography Inside

More information

Channel models for high-capacity information hiding in images

Channel models for high-capacity information hiding in images Channel models for high-capacity information hiding in images Johann A. Briffa a, Manohar Das b School of Engineering and Computer Science Oakland University, Rochester MI 48309 ABSTRACT We consider the

More information

Nearest-neighbor and Bilinear Resampling Factor Estimation to Detect Blockiness or Blurriness of an Image*

Nearest-neighbor and Bilinear Resampling Factor Estimation to Detect Blockiness or Blurriness of an Image* Nearest-neighbor and Bilinear Resampling Factor Estimation to Detect Blockiness or Blurriness of an Image* Ariawan Suwendi Prof. Jan P. Allebach Purdue University - West Lafayette, IN *Research supported

More information

A Robust Method for Image Steganography based on Chaos Theory

A Robust Method for Image Steganography based on Chaos Theory A Robust Method for Image Steganography based on Chaos Theory Anoop Kumar Tiwari Research Scholar Dept of Computer Science Banaras Hindu University Ajay Rajpoot, Ex-M.Sc. Student Dept of Computer Science

More information

Region Adaptive Unsharp Masking based DCT Interpolation for Efficient Video Intra Frame Up-sampling

Region Adaptive Unsharp Masking based DCT Interpolation for Efficient Video Intra Frame Up-sampling International Conference on Electronic Design and Signal Processing (ICEDSP) 0 Region Adaptive Unsharp Masking based DCT Interpolation for Efficient Video Intra Frame Up-sampling Aditya Acharya Dept. of

More information

Automatic Music Genre Classification

Automatic Music Genre Classification Automatic Music Genre Classification Nathan YongHoon Kwon, SUNY Binghamton Ingrid Tchakoua, Jackson State University Matthew Pietrosanu, University of Alberta Freya Fu, Colorado State University Yue Wang,

More information

Video coding standards

Video coding standards Video coding standards Video signals represent sequences of images or frames which can be transmitted with a rate from 5 to 60 frames per second (fps), that provides the illusion of motion in the displayed

More information

A Framework for Segmentation of Interview Videos

A Framework for Segmentation of Interview Videos A Framework for Segmentation of Interview Videos Omar Javed, Sohaib Khan, Zeeshan Rasheed, Mubarak Shah Computer Vision Lab School of Electrical Engineering and Computer Science University of Central Florida

More information

WYNER-ZIV VIDEO CODING WITH LOW ENCODER COMPLEXITY

WYNER-ZIV VIDEO CODING WITH LOW ENCODER COMPLEXITY WYNER-ZIV VIDEO CODING WITH LOW ENCODER COMPLEXITY (Invited Paper) Anne Aaron and Bernd Girod Information Systems Laboratory Stanford University, Stanford, CA 94305 {amaaron,bgirod}@stanford.edu Abstract

More information

Module 8 VIDEO CODING STANDARDS. Version 2 ECE IIT, Kharagpur

Module 8 VIDEO CODING STANDARDS. Version 2 ECE IIT, Kharagpur Module 8 VIDEO CODING STANDARDS Lesson 27 H.264 standard Lesson Objectives At the end of this lesson, the students should be able to: 1. State the broad objectives of the H.264 standard. 2. List the improved

More information

ISSN (Print) Original Research Article. Coimbatore, Tamil Nadu, India

ISSN (Print) Original Research Article. Coimbatore, Tamil Nadu, India Scholars Journal of Engineering and Technology (SJET) Sch. J. Eng. Tech., 016; 4(1):1-5 Scholars Academic and Scientific Publisher (An International Publisher for Academic and Scientific Resources) www.saspublisher.com

More information

An Efficient Low Bit-Rate Video-Coding Algorithm Focusing on Moving Regions

An Efficient Low Bit-Rate Video-Coding Algorithm Focusing on Moving Regions 1128 IEEE TRANSACTIONS ON CIRCUITS AND SYSTEMS FOR VIDEO TECHNOLOGY, VOL. 11, NO. 10, OCTOBER 2001 An Efficient Low Bit-Rate Video-Coding Algorithm Focusing on Moving Regions Kwok-Wai Wong, Kin-Man Lam,

More information

UC San Diego UC San Diego Previously Published Works

UC San Diego UC San Diego Previously Published Works UC San Diego UC San Diego Previously Published Works Title Classification of MPEG-2 Transport Stream Packet Loss Visibility Permalink https://escholarship.org/uc/item/9wk791h Authors Shin, J Cosman, P

More information

CS 1674: Intro to Computer Vision. Face Detection. Prof. Adriana Kovashka University of Pittsburgh November 7, 2016

CS 1674: Intro to Computer Vision. Face Detection. Prof. Adriana Kovashka University of Pittsburgh November 7, 2016 CS 1674: Intro to Computer Vision Face Detection Prof. Adriana Kovashka University of Pittsburgh November 7, 2016 Today Window-based generic object detection basic pipeline boosting classifiers face detection

More information

Improving Frame Based Automatic Laughter Detection

Improving Frame Based Automatic Laughter Detection Improving Frame Based Automatic Laughter Detection Mary Knox EE225D Class Project knoxm@eecs.berkeley.edu December 13, 2007 Abstract Laughter recognition is an underexplored area of research. My goal for

More information

Wavelet transform based steganography technique to hide audio signals in image.

Wavelet transform based steganography technique to hide audio signals in image. Available online at www.sciencedirect.com ScienceDirect Procedia Computer Science 47 (2015 ) 272 281 Wavelet transform based steganography technique to hide audio signals in image. Hemalatha S a,1, U.

More information

Embedding Multilevel Image Encryption in the LAR Codec

Embedding Multilevel Image Encryption in the LAR Codec Embedding Multilevel Image Encryption in the LAR Codec Jean Motsch, Olivier Déforges, Marie Babel To cite this version: Jean Motsch, Olivier Déforges, Marie Babel. Embedding Multilevel Image Encryption

More information

VISUAL CONTENT BASED SEGMENTATION OF TALK & GAME SHOWS. O. Javed, S. Khan, Z. Rasheed, M.Shah. {ojaved, khan, zrasheed,

VISUAL CONTENT BASED SEGMENTATION OF TALK & GAME SHOWS. O. Javed, S. Khan, Z. Rasheed, M.Shah. {ojaved, khan, zrasheed, VISUAL CONTENT BASED SEGMENTATION OF TALK & GAME SHOWS O. Javed, S. Khan, Z. Rasheed, M.Shah {ojaved, khan, zrasheed, shah}@cs.ucf.edu Computer Vision Lab School of Electrical Engineering and Computer

More information

Chord Classification of an Audio Signal using Artificial Neural Network

Chord Classification of an Audio Signal using Artificial Neural Network Chord Classification of an Audio Signal using Artificial Neural Network Ronesh Shrestha Student, Department of Electrical and Electronic Engineering, Kathmandu University, Dhulikhel, Nepal ---------------------------------------------------------------------***---------------------------------------------------------------------

More information

A Layered Approach for Watermarking In Images Based On Huffman Coding

A Layered Approach for Watermarking In Images Based On Huffman Coding A Layered Approach for Watermarking In Images Based On Huffman Coding D. Lalitha Bhaskari 1 P. S. Avadhani 1 M. Viswanath 2 1 Department of Computer Science & Systems Engineering, Andhra University, 2

More information

International Journal of Advance Engineering and Research Development MUSICAL INSTRUMENT IDENTIFICATION AND STATUS FINDING WITH MFCC

International Journal of Advance Engineering and Research Development MUSICAL INSTRUMENT IDENTIFICATION AND STATUS FINDING WITH MFCC Scientific Journal of Impact Factor (SJIF): 5.71 International Journal of Advance Engineering and Research Development Volume 5, Issue 04, April -2018 e-issn (O): 2348-4470 p-issn (P): 2348-6406 MUSICAL

More information

Motion Re-estimation for MPEG-2 to MPEG-4 Simple Profile Transcoding. Abstract. I. Introduction

Motion Re-estimation for MPEG-2 to MPEG-4 Simple Profile Transcoding. Abstract. I. Introduction Motion Re-estimation for MPEG-2 to MPEG-4 Simple Profile Transcoding Jun Xin, Ming-Ting Sun*, and Kangwook Chun** *Department of Electrical Engineering, University of Washington **Samsung Electronics Co.

More information

Analog Performance-based Self-Test Approaches for Mixed-Signal Circuits

Analog Performance-based Self-Test Approaches for Mixed-Signal Circuits Analog Performance-based Self-Test Approaches for Mixed-Signal Circuits Tutorial, September 1, 2015 Byoungho Kim, Ph.D. Division of Electrical Engineering Hanyang University Outline State of the Art for

More information

Experiments on musical instrument separation using multiplecause

Experiments on musical instrument separation using multiplecause Experiments on musical instrument separation using multiplecause models J Klingseisen and M D Plumbley* Department of Electronic Engineering King's College London * - Corresponding Author - mark.plumbley@kcl.ac.uk

More information

Music Genre Classification

Music Genre Classification Music Genre Classification chunya25 Fall 2017 1 Introduction A genre is defined as a category of artistic composition, characterized by similarities in form, style, or subject matter. [1] Some researchers

More information

Key-based scrambling for secure image communication

Key-based scrambling for secure image communication University of Wollongong Research Online Faculty of Engineering and Information Sciences - Papers: Part A Faculty of Engineering and Information Sciences 2012 Key-based scrambling for secure image communication

More information

DeepID: Deep Learning for Face Recognition. Department of Electronic Engineering,

DeepID: Deep Learning for Face Recognition. Department of Electronic Engineering, DeepID: Deep Learning for Face Recognition Xiaogang Wang Department of Electronic Engineering, The Chinese University i of Hong Kong Machine Learning with Big Data Machine learning with small data: overfitting,

More information

Music Genre Classification and Variance Comparison on Number of Genres

Music Genre Classification and Variance Comparison on Number of Genres Music Genre Classification and Variance Comparison on Number of Genres Miguel Francisco, miguelf@stanford.edu Dong Myung Kim, dmk8265@stanford.edu 1 Abstract In this project we apply machine learning techniques

More information

COMP 249 Advanced Distributed Systems Multimedia Networking. Video Compression Standards

COMP 249 Advanced Distributed Systems Multimedia Networking. Video Compression Standards COMP 9 Advanced Distributed Systems Multimedia Networking Video Compression Standards Kevin Jeffay Department of Computer Science University of North Carolina at Chapel Hill jeffay@cs.unc.edu September,

More information

Singer Traits Identification using Deep Neural Network

Singer Traits Identification using Deep Neural Network Singer Traits Identification using Deep Neural Network Zhengshan Shi Center for Computer Research in Music and Acoustics Stanford University kittyshi@stanford.edu Abstract The author investigates automatic

More information

Image Resolution and Contrast Enhancement of Satellite Geographical Images with Removal of Noise using Wavelet Transforms

Image Resolution and Contrast Enhancement of Satellite Geographical Images with Removal of Noise using Wavelet Transforms Image Resolution and Contrast Enhancement of Satellite Geographical Images with Removal of Noise using Wavelet Transforms Prajakta P. Khairnar* 1, Prof. C. A. Manjare* 2 1 M.E. (Electronics (Digital Systems)

More information

Cryptagram. Photo Privacy for Online Social Media Matt Tierney, Ian Spiro Christoph Bregler, Lakshmi Subramanian

Cryptagram. Photo Privacy for Online Social Media  Matt Tierney, Ian Spiro Christoph Bregler, Lakshmi Subramanian Cryptagram Photo Privacy for Online Social Media http://cryptagr.am Matt Tierney, Ian Spiro Christoph Bregler, Lakshmi Subramanian Courant Institute, NYU Photo Privacy Problem Photo Privacy Problem Photo

More information

Visual Communication at Limited Colour Display Capability

Visual Communication at Limited Colour Display Capability Visual Communication at Limited Colour Display Capability Yan Lu, Wen Gao and Feng Wu Abstract: A novel scheme for visual communication by means of mobile devices with limited colour display capability

More information

Capacity is the Wrong Paradigm*

Capacity is the Wrong Paradigm* Capacity is the Wrong Paradigm* Ira S. Moskowitz Center for High Assurance Computer Systems-5540 Naval Research Laboratory Washington, DC 20375 LiWu Chang Center for High Assurance Computer Systems-5540

More information

Music Emotion Recognition. Jaesung Lee. Chung-Ang University

Music Emotion Recognition. Jaesung Lee. Chung-Ang University Music Emotion Recognition Jaesung Lee Chung-Ang University Introduction Searching Music in Music Information Retrieval Some information about target music is available Query by Text: Title, Artist, or

More information

Multichannel Satellite Image Resolution Enhancement Using Dual-Tree Complex Wavelet Transform and NLM Filtering

Multichannel Satellite Image Resolution Enhancement Using Dual-Tree Complex Wavelet Transform and NLM Filtering Multichannel Satellite Image Resolution Enhancement Using Dual-Tree Complex Wavelet Transform and NLM Filtering P.K Ragunath 1, A.Balakrishnan 2 M.E, Karpagam University, Coimbatore, India 1 Asst Professor,

More information

EE391 Special Report (Spring 2005) Automatic Chord Recognition Using A Summary Autocorrelation Function

EE391 Special Report (Spring 2005) Automatic Chord Recognition Using A Summary Autocorrelation Function EE391 Special Report (Spring 25) Automatic Chord Recognition Using A Summary Autocorrelation Function Advisor: Professor Julius Smith Kyogu Lee Center for Computer Research in Music and Acoustics (CCRMA)

More information

TRAFFIC SURVEILLANCE VIDEO MANAGEMENT SYSTEM

TRAFFIC SURVEILLANCE VIDEO MANAGEMENT SYSTEM TRAFFIC SURVEILLANCE VIDEO MANAGEMENT SYSTEM K.Ganesan*, Kavitha.C, Kriti Tandon, Lakshmipriya.R TIFAC-Centre of Relevance and Excellence in Automotive Infotronics*, School of Information Technology and

More information

Overview: Video Coding Standards

Overview: Video Coding Standards Overview: Video Coding Standards Video coding standards: applications and common structure ITU-T Rec. H.261 ISO/IEC MPEG-1 ISO/IEC MPEG-2 State-of-the-art: H.264/AVC Video Coding Standards no. 1 Applications

More information

Outline. Why do we classify? Audio Classification

Outline. Why do we classify? Audio Classification Outline Introduction Music Information Retrieval Classification Process Steps Pitch Histograms Multiple Pitch Detection Algorithm Musical Genre Classification Implementation Future Work Why do we classify

More information

Automatic Piano Music Transcription

Automatic Piano Music Transcription Automatic Piano Music Transcription Jianyu Fan Qiuhan Wang Xin Li Jianyu.Fan.Gr@dartmouth.edu Qiuhan.Wang.Gr@dartmouth.edu Xi.Li.Gr@dartmouth.edu 1. Introduction Writing down the score while listening

More information

Fast MBAFF/PAFF Motion Estimation and Mode Decision Scheme for H.264

Fast MBAFF/PAFF Motion Estimation and Mode Decision Scheme for H.264 Fast MBAFF/PAFF Motion Estimation and Mode Decision Scheme for H.264 Ju-Heon Seo, Sang-Mi Kim, Jong-Ki Han, Nonmember Abstract-- In the H.264, MBAFF (Macroblock adaptive frame/field) and PAFF (Picture

More information

AN IMPROVED ERROR CONCEALMENT STRATEGY DRIVEN BY SCENE MOTION PROPERTIES FOR H.264/AVC DECODERS

AN IMPROVED ERROR CONCEALMENT STRATEGY DRIVEN BY SCENE MOTION PROPERTIES FOR H.264/AVC DECODERS AN IMPROVED ERROR CONCEALMENT STRATEGY DRIVEN BY SCENE MOTION PROPERTIES FOR H.264/AVC DECODERS Susanna Spinsante, Ennio Gambi, Franco Chiaraluce Dipartimento di Elettronica, Intelligenza artificiale e

More information

A SUBJECTIVE STUDY OF THE INFLUENCE OF COLOR INFORMATION ON VISUAL QUALITY ASSESSMENT OF HIGH RESOLUTION PICTURES

A SUBJECTIVE STUDY OF THE INFLUENCE OF COLOR INFORMATION ON VISUAL QUALITY ASSESSMENT OF HIGH RESOLUTION PICTURES A SUBJECTIVE STUDY OF THE INFLUENCE OF COLOR INFORMATION ON VISUAL QUALITY ASSESSMENT OF HIGH RESOLUTION PICTURES Francesca De Simone a, Frederic Dufaux a, Touradj Ebrahimi a, Cristina Delogu b, Vittorio

More information

P. Sanyasi Naidu* and Jagadish Gurrala**

P. Sanyasi Naidu* and Jagadish Gurrala** I J C T A, 9(32), 2016, pp. 261-269 International Science Press ISSN: 0974-5572 A Study of Low Power Consumable Frameworks for Hiding Audio signals in Image Container Using Different Steganography techniques

More information

Template Protection under Signal Degradation: A Case-Study on Iris-Biometric Fuzzy Commitment Schemes

Template Protection under Signal Degradation: A Case-Study on Iris-Biometric Fuzzy Commitment Schemes Template Protection under Signal Degradation: A Case-Study on Iris-Biometric Fuzzy Commitment Schemes Christian Rathgeb Andreas Uhl Technical Report 11-4 November 11 Department of Computer Sciences Jakob-Haringer-Straße

More information

Multiple Image Secret Sharing based on Linear System

Multiple Image Secret Sharing based on Linear System Indian Journal of Science and Technology, Vol 10(33), 10.17485/ijst/2017/v10i33/113085, September 2017 ISSN (Print) : 0974-6846 ISSN (Online) : 0974-5645 Multiple Image Secret Sharing based on Linear System

More information

DETECTION OF SLOW-MOTION REPLAY SEGMENTS IN SPORTS VIDEO FOR HIGHLIGHTS GENERATION

DETECTION OF SLOW-MOTION REPLAY SEGMENTS IN SPORTS VIDEO FOR HIGHLIGHTS GENERATION DETECTION OF SLOW-MOTION REPLAY SEGMENTS IN SPORTS VIDEO FOR HIGHLIGHTS GENERATION H. Pan P. van Beek M. I. Sezan Electrical & Computer Engineering University of Illinois Urbana, IL 6182 Sharp Laboratories

More information

Introduction to image compression

Introduction to image compression Introduction to image compression 1997-2015 Josef Pelikán CGG MFF UK Praha pepca@cgg.mff.cuni.cz http://cgg.mff.cuni.cz/~pepca/ Compression 2015 Josef Pelikán, http://cgg.mff.cuni.cz/~pepca 1 / 12 Motivation

More information

Analysis of a Two Step MPEG Video System

Analysis of a Two Step MPEG Video System Analysis of a Two Step MPEG Video System Lufs Telxeira (*) (+) (*) INESC- Largo Mompilhet 22, 4000 Porto Portugal (+) Universidade Cat61ica Portnguesa, Rua Dingo Botelho 1327, 4150 Porto, Portugal Abstract:

More information

Lecture 9 Source Separation

Lecture 9 Source Separation 10420CS 573100 音樂資訊檢索 Music Information Retrieval Lecture 9 Source Separation Yi-Hsuan Yang Ph.D. http://www.citi.sinica.edu.tw/pages/yang/ yang@citi.sinica.edu.tw Music & Audio Computing Lab, Research

More information

A Study of Encoding and Decoding Techniques for Syndrome-Based Video Coding

A Study of Encoding and Decoding Techniques for Syndrome-Based Video Coding MITSUBISHI ELECTRIC RESEARCH LABORATORIES http://www.merl.com A Study of Encoding and Decoding Techniques for Syndrome-Based Video Coding Min Wu, Anthony Vetro, Jonathan Yedidia, Huifang Sun, Chang Wen

More information

MUSI-6201 Computational Music Analysis

MUSI-6201 Computational Music Analysis MUSI-6201 Computational Music Analysis Part 9.1: Genre Classification alexander lerch November 4, 2015 temporal analysis overview text book Chapter 8: Musical Genre, Similarity, and Mood (pp. 151 155)

More information

Automatic Extraction of Popular Music Ringtones Based on Music Structure Analysis

Automatic Extraction of Popular Music Ringtones Based on Music Structure Analysis Automatic Extraction of Popular Music Ringtones Based on Music Structure Analysis Fengyan Wu fengyanyy@163.com Shutao Sun stsun@cuc.edu.cn Weiyao Xue Wyxue_std@163.com Abstract Automatic extraction of

More information

A SVD BASED SCHEME FOR POST PROCESSING OF DCT CODED IMAGES

A SVD BASED SCHEME FOR POST PROCESSING OF DCT CODED IMAGES Electronic Letters on Computer Vision and Image Analysis 8(3): 1-14, 2009 A SVD BASED SCHEME FOR POST PROCESSING OF DCT CODED IMAGES Vinay Kumar Srivastava Assistant Professor, Department of Electronics

More information

Adaptive Distributed Compressed Video Sensing

Adaptive Distributed Compressed Video Sensing Journal of Information Hiding and Multimedia Signal Processing 2014 ISSN 2073-4212 Ubiquitous International Volume 5, Number 1, January 2014 Adaptive Distributed Compressed Video Sensing Xue Zhang 1,3,

More information

Neural Network for Music Instrument Identi cation

Neural Network for Music Instrument Identi cation Neural Network for Music Instrument Identi cation Zhiwen Zhang(MSE), Hanze Tu(CCRMA), Yuan Li(CCRMA) SUN ID: zhiwen, hanze, yuanli92 Abstract - In the context of music, instrument identi cation would contribute

More information

Stream Cipher. Block cipher as stream cipher LFSR stream cipher RC4 General remarks. Stream cipher

Stream Cipher. Block cipher as stream cipher LFSR stream cipher RC4 General remarks. Stream cipher Lecturers: Mark D. Ryan and David Galindo. Cryptography 2015. Slide: 90 Stream Cipher Suppose you want to encrypt a stream of data, such as: the data from a keyboard the data from a sensor Block ciphers

More information

University of Bristol - Explore Bristol Research. Peer reviewed version. Link to published version (if available): /ICASSP.2016.

University of Bristol - Explore Bristol Research. Peer reviewed version. Link to published version (if available): /ICASSP.2016. Hosking, B., Agrafiotis, D., Bull, D., & Easton, N. (2016). An adaptive resolution rate control method for intra coding in HEVC. In 2016 IEEE International Conference on Acoustics, Speech and Signal Processing

More information

Man-Machine-Interface (Video) Nataliya Nadtoka coach: Jens Bialkowski

Man-Machine-Interface (Video) Nataliya Nadtoka coach: Jens Bialkowski Seminar Digitale Signalverarbeitung in Multimedia-Geräten SS 2003 Man-Machine-Interface (Video) Computation Engineering Student Nataliya Nadtoka coach: Jens Bialkowski Outline 1. Processing Scheme 2. Human

More information

Topics in Computer Music Instrument Identification. Ioanna Karydi

Topics in Computer Music Instrument Identification. Ioanna Karydi Topics in Computer Music Instrument Identification Ioanna Karydi Presentation overview What is instrument identification? Sound attributes & Timbre Human performance The ideal algorithm Selected approaches

More information

Document Analysis Support for the Manual Auditing of Elections

Document Analysis Support for the Manual Auditing of Elections Document Analysis Support for the Manual Auditing of Elections Daniel Lopresti Xiang Zhou Xiaolei Huang Gang Tan Department of Computer Science and Engineering Lehigh University Bethlehem, PA 18015, USA

More information

Statistical Modeling and Retrieval of Polyphonic Music

Statistical Modeling and Retrieval of Polyphonic Music Statistical Modeling and Retrieval of Polyphonic Music Erdem Unal Panayiotis G. Georgiou and Shrikanth S. Narayanan Speech Analysis and Interpretation Laboratory University of Southern California Los Angeles,

More information

CHAPTER 8 CONCLUSION AND FUTURE SCOPE

CHAPTER 8 CONCLUSION AND FUTURE SCOPE 124 CHAPTER 8 CONCLUSION AND FUTURE SCOPE Data hiding is becoming one of the most rapidly advancing techniques the field of research especially with increase in technological advancements in internet and

More information

WE CONSIDER an enhancement technique for degraded

WE CONSIDER an enhancement technique for degraded 1140 IEEE SIGNAL PROCESSING LETTERS, VOL. 21, NO. 9, SEPTEMBER 2014 Example-based Enhancement of Degraded Video Edson M. Hung, Member, IEEE, Diogo C. Garcia, Member, IEEE, and Ricardo L. de Queiroz, Senior

More information

Constant Bit Rate for Video Streaming Over Packet Switching Networks

Constant Bit Rate for Video Streaming Over Packet Switching Networks International OPEN ACCESS Journal Of Modern Engineering Research (IJMER) Constant Bit Rate for Video Streaming Over Packet Switching Networks Mr. S. P.V Subba rao 1, Y. Renuka Devi 2 Associate professor

More information

Noise Flooding for Detecting Audio Adversarial Examples Against Automatic Speech Recognition

Noise Flooding for Detecting Audio Adversarial Examples Against Automatic Speech Recognition Noise Flooding for Detecting Audio Adversarial Examples Against Automatic Speech Recognition Krishan Rajaratnam The College University of Chicago Chicago, USA krajaratnam@uchicago.edu Jugal Kalita Department

More information

Video compression principles. Color Space Conversion. Sub-sampling of Chrominance Information. Video: moving pictures and the terms frame and

Video compression principles. Color Space Conversion. Sub-sampling of Chrominance Information. Video: moving pictures and the terms frame and Video compression principles Video: moving pictures and the terms frame and picture. one approach to compressing a video source is to apply the JPEG algorithm to each frame independently. This approach

More information

Joint source-channel video coding for H.264 using FEC

Joint source-channel video coding for H.264 using FEC Department of Information Engineering (DEI) University of Padova Italy Joint source-channel video coding for H.264 using FEC Simone Milani simone.milani@dei.unipd.it DEI-University of Padova Gian Antonio

More information

A PERPLEXITY BASED COVER SONG MATCHING SYSTEM FOR SHORT LENGTH QUERIES

A PERPLEXITY BASED COVER SONG MATCHING SYSTEM FOR SHORT LENGTH QUERIES 12th International Society for Music Information Retrieval Conference (ISMIR 2011) A PERPLEXITY BASED COVER SONG MATCHING SYSTEM FOR SHORT LENGTH QUERIES Erdem Unal 1 Elaine Chew 2 Panayiotis Georgiou

More information

Vector-Valued Image Interpolation by an Anisotropic Diffusion-Projection PDE

Vector-Valued Image Interpolation by an Anisotropic Diffusion-Projection PDE Computer Vision, Speech Communication and Signal Processing Group School of Electrical and Computer Engineering National Technical University of Athens, Greece URL: http://cvsp.cs.ntua.gr Vector-Valued

More information

Rebroadcast Attacks: Defenses, Reattacks, and Redefenses

Rebroadcast Attacks: Defenses, Reattacks, and Redefenses Rebroadcast Attacks: Defenses, Reattacks, and Redefenses Wei Fan, Shruti Agarwal, and Hany Farid Computer Science Dartmouth College Hanover, NH 35 Email: {wei.fan, shruti.agarwal.gr, hany.farid}@dartmouth.edu

More information

An Introduction to Image Compression

An Introduction to Image Compression An Introduction to Image Compression Munish Kumar 1, Anshul Anand 2 1 M.Tech Student, Department of CSE, Shri Baba Mastnath Engineering College, Rohtak (INDIA) 2 Assistant Professor, Department of CSE,

More information

CERIAS Tech Report Preprocessing and Postprocessing Techniques for Encoding Predictive Error Frames in Rate Scalable Video Codecs by E

CERIAS Tech Report Preprocessing and Postprocessing Techniques for Encoding Predictive Error Frames in Rate Scalable Video Codecs by E CERIAS Tech Report 2001-118 Preprocessing and Postprocessing Techniques for Encoding Predictive Error Frames in Rate Scalable Video Codecs by E Asbun, P Salama, E Delp Center for Education and Research

More information

Implementation of an MPEG Codec on the Tilera TM 64 Processor

Implementation of an MPEG Codec on the Tilera TM 64 Processor 1 Implementation of an MPEG Codec on the Tilera TM 64 Processor Whitney Flohr Supervisor: Mark Franklin, Ed Richter Department of Electrical and Systems Engineering Washington University in St. Louis Fall

More information

VERY low bit-rate video coding has triggered intensive. Significance-Linked Connected Component Analysis for Very Low Bit-Rate Wavelet Video Coding

VERY low bit-rate video coding has triggered intensive. Significance-Linked Connected Component Analysis for Very Low Bit-Rate Wavelet Video Coding 630 IEEE TRANSACTIONS ON CIRCUITS AND SYSTEMS FOR VIDEO TECHNOLOGY, VOL. 9, NO. 4, JUNE 1999 Significance-Linked Connected Component Analysis for Very Low Bit-Rate Wavelet Video Coding Jozsef Vass, Student

More information

Optimized Color Based Compression

Optimized Color Based Compression Optimized Color Based Compression 1 K.P.SONIA FENCY, 2 C.FELSY 1 PG Student, Department Of Computer Science Ponjesly College Of Engineering Nagercoil,Tamilnadu, India 2 Asst. Professor, Department Of Computer

More information

Intra-frame JPEG-2000 vs. Inter-frame Compression Comparison: The benefits and trade-offs for very high quality, high resolution sequences

Intra-frame JPEG-2000 vs. Inter-frame Compression Comparison: The benefits and trade-offs for very high quality, high resolution sequences Intra-frame JPEG-2000 vs. Inter-frame Compression Comparison: The benefits and trade-offs for very high quality, high resolution sequences Michael Smith and John Villasenor For the past several decades,

More information

CONSTRUCTION OF LOW-DISTORTED MESSAGE-RICH VIDEOS FOR PERVASIVE COMMUNICATION

CONSTRUCTION OF LOW-DISTORTED MESSAGE-RICH VIDEOS FOR PERVASIVE COMMUNICATION 2016 International Computer Symposium CONSTRUCTION OF LOW-DISTORTED MESSAGE-RICH VIDEOS FOR PERVASIVE COMMUNICATION 1 Zhen-Yu You ( ), 2 Yu-Shiuan Tsai ( ) and 3 Wen-Hsiang Tsai ( ) 1 Institute of Information

More information

Deep Neural Networks Scanning for patterns (aka convolutional networks) Bhiksha Raj

Deep Neural Networks Scanning for patterns (aka convolutional networks) Bhiksha Raj Deep Neural Networks Scanning for patterns (aka convolutional networks) Bhiksha Raj 1 Story so far MLPs are universal function approximators Boolean functions, classifiers, and regressions MLPs can be

More information

Indexing local features. Wed March 30 Prof. Kristen Grauman UT-Austin

Indexing local features. Wed March 30 Prof. Kristen Grauman UT-Austin Indexing local features Wed March 30 Prof. Kristen Grauman UT-Austin Matching local features Kristen Grauman Matching local features? Image 1 Image 2 To generate candidate matches, find patches that have

More information

High Quality Digital Video Processing: Technology and Methods

High Quality Digital Video Processing: Technology and Methods High Quality Digital Video Processing: Technology and Methods IEEE Computer Society Invited Presentation Dr. Jorge E. Caviedes Principal Engineer Digital Home Group Intel Corporation LEGAL INFORMATION

More information

Research on sampling of vibration signals based on compressed sensing

Research on sampling of vibration signals based on compressed sensing Research on sampling of vibration signals based on compressed sensing Hongchun Sun 1, Zhiyuan Wang 2, Yong Xu 3 School of Mechanical Engineering and Automation, Northeastern University, Shenyang, China

More information

Research Topic. Error Concealment Techniques in H.264/AVC for Wireless Video Transmission in Mobile Networks

Research Topic. Error Concealment Techniques in H.264/AVC for Wireless Video Transmission in Mobile Networks Research Topic Error Concealment Techniques in H.264/AVC for Wireless Video Transmission in Mobile Networks July 22 nd 2008 Vineeth Shetty Kolkeri EE Graduate,UTA 1 Outline 2. Introduction 3. Error control

More information

Optimal look-up table-based data hiding

Optimal look-up table-based data hiding Published in IET Signal Processing Received on 9th December 2008 Revised on 19th December 2009 Optimal look-up table-based data hiding X. Wang X.-P. Zhang ISSN 1751-9675 Department of Electrical & Computer

More information

Instrument Recognition in Polyphonic Mixtures Using Spectral Envelopes

Instrument Recognition in Polyphonic Mixtures Using Spectral Envelopes Instrument Recognition in Polyphonic Mixtures Using Spectral Envelopes hello Jay Biernat Third author University of Rochester University of Rochester Affiliation3 words jbiernat@ur.rochester.edu author3@ismir.edu

More information

A Hybrid Approach for Information Hiding and Encryption using Multiple LSB s Algorithms

A Hybrid Approach for Information Hiding and Encryption using Multiple LSB s Algorithms A Hybrid Approach for Information Hiding and Encryption using Multiple LSB s Algorithms H.B.Kekre 1, Tanuja Sarode 2 and Pallavi Halarnkar 3 1 Senior Professor, MPSTME, NMIMS University, Mumbai 2 Associate

More information

Distortion Compensated Lookup-Table Embedding: Joint Security and Robustness Enhancement for Quantization Based Data Hiding

Distortion Compensated Lookup-Table Embedding: Joint Security and Robustness Enhancement for Quantization Based Data Hiding Distortion Compensated Lookup-Table Embedding: Joint Security and Robustness Enhancement for Quantization Based Data Hiding Min Wu ECE Department, University of Maryland, College Park, U.S.A. ABSTRACT

More information

DATA hiding technologies have been widely studied in

DATA hiding technologies have been widely studied in IEEE TRANSACTIONS ON CIRCUITS AND SYSTEMS FOR VIDEO TECHNOLOGY, VOL 18, NO 6, JUNE 2008 769 A Novel Look-Up Table Design Method for Data Hiding With Reduced Distortion Xiao-Ping Zhang, Senior Member, IEEE,

More information