CHAPTER 8 CONCLUSION AND FUTURE SCOPE
|
|
- Julia Johnson
- 5 years ago
- Views:
Transcription
1 124 CHAPTER 8 CONCLUSION AND FUTURE SCOPE Data hiding is becoming one of the most rapidly advancing techniques the field of research especially with increase in technological advancements in internet and multimedia technology. With the technology advancing on one side, so has the rate of threat to hack, tamper or steal the data that is being transmitted over these medial also increased in leaps and bounds. This has necessitated an ever growing and systematic approach to ensure the security of transmitted and received content. On the other hand, the advent of tele based services have introduced medical image processing also to the data embedding arena especially for hospital management of patient records and subsequent follow up services and treatments. This maintenance of records also acts as data base for researchers all over to access any data as and when required. 8.1 SUMMARY OF WORK DONE In this thesis, a data hiding technique is proposed to embed electronic patient record (EPR) bits, multiple watermarks in the form of hospital logo and doctor s signature in a hybrid frequency domain technique addressing all the three key issues of any embedding process namely the robustness, visual imperceptibility and embedding capacity. The success of any data embedding technique lies on the above three factors often termed as optimality criteria or constraints for data hiding. They are rightly called constraints as they are interlinked with one another and improvement in one or more factor is done at the cost of degradation of the other. Since, our work focuses on medical images and its storage and retrieval at later stages, usage in real time for diagnosis and
2 125 subsequent treatments, a slight degradation in image quality could prove fatal for the patient. Hence, the goal in this work is to establish a balanced tradeoff between the three extremities for an optimal data embedding in the medical images. Chapters 3 and 4 focus on the first two optimality criteria namely robustness and visual imperceptibility. After careful and systematic analysis of all existing methodologies, a frequency domain strategy has been adopted due to its superiority in certain important aspects like robustness towards noise, resilience towards compression attacks, directionality etc., over the spatial domain techniques. A hybrid transform has been proposed after careful study of the features of the transforms in the hybrid combination so that it is able to address the robustness and visual imperceptibility criteria. Accordingly, the directional properties of the multi resolution Contourlet transform, the energy compaction property of DCT and the rotation - scaling translation invariance properties of the SVD transform have been joined together in a hybrid formation. The superiority of this combination is also tested and justified over other existing transforms like DCT, DWT in a single form or in a hybrid formation. The second aspect of this thesis is to address the third criterion which is embedding capacity. It is especially important since this application is directed towards hospital data management of patient records. Hence, it is desirable that maximum data measured in bits and bits per pixel are packed into the cover image without affecting the image quality. Existing methodologies have shown the variation of embedding capacity with image quality. However, it is a standalone approach as mentioned before. Since, the stored medical image and the patient records needs to be privately documented, stored and retrieved, a multiple watermarking technique has also been integrated into this thus ensuring security and also aiding in tamper detection and maintaining the legal authenticity of the record with respect to the patient, doctor and hospital. Hence, this proposed integrated data embedding system addresses the three optimality criteria which is a novel approach.
3 126 The final aspect of this thesis is to evaluate the strength, quality of the integrated data hiding system in terms of some important metrics such as peak signal to noise ratio, structural similarity index, and correlation coefficient and mean squared error. The evaluation is carried out by passing or exposing the embedded medical image to a wide range of aggressive image processing operations trying to simulate and equate to the real time attacks on the embedded image which may be intentional or unintentional. The third criterion is also evaluated by increasing the payload of the electronic patient information in stages and analyzing its signal quality in terms of peak signal to noise ratio. 8.2 CONTRIBUTION OF THE WORK Many researchers have put forward and proposed new and effective techniques of data embedding and extraction either by using a single transform or the transform in a hybrid combination. As mentioned in the previous section, up to the current knowledge, no technique has been found to address all the three issues in a single framework to a satisfactory balance. Hence, this work would be a useful and productive technique upon which further advancements and improvements could be done. The unique features of various transforms both in spatial and frequency domain have been made use of in development of this integrated data hiding system. Directional properties of Contourlet transform serve the purpose of choosing an ideal embedding location based on the energy level of the sub band, while the robustness properties of DCT have been utilized to provide the much needed resilience towards external attacks and the RST invariance of the SVD have been made use of to protect the underlying data against rotation and scaling attacks. On the other hand, the concept of histogram based difference expansion for increasing the embedding capacity acts as a useful tool especially for the proposed application of medical data management for patients and hospitals. Histogram shifting
4 127 jointly combined with difference expansion eliminates the need for a location map thus reducing the complexity. The ability of the images to be divided into smooth and non smooth regions facilitates the easy integration of robustness and visual imperceptibility property in the non smooth regions while accommodating the embedding capacity enhancement in the smooth regions of the image before concatenating them to get the embedded image which is quite robust, visually indistinguishable and with an increased payload. To summarize, flexibility exists in this technique to increase the payload at the expense of reduction in authentication procedures such as watermarks used for copyright protection and vice versa. A graphic user interface (GUI) would further enhance the simplicity of the method and further optimization if any needed could bring into picture genetic algorithm based techniques. 8.3 LIMITATIONS OF THE WORK Though a quite robust and high capacity data embedding system has been proposed for medical data management of patient records, data embedding is a fragile field as long as the level of threats and hacking techniques get complex day by day. As mentioned in previous sections, it can never reach saturation and needs to be updated with the latest hacking techniques and methodologies to keep the data embedding system strong and robust. In this work, it can be seen that the system loses much of its quality when cropped and scaled to higher limits. Data loss due to cropping could be minimized by appropriately choosing embedding locations which becomes contradictory to the high energy embedding location strategy adopted in this work. Moreover, data cropping is mostly intentional and hence it is difficult to predict the area of cropping before choosing the embedding location. In spite of the fact that a sufficient and satisfactory balance has
5 128 been brought about in the three optimality criteria, increase in payload beyond certain limits is found to impact image quality of cover image which is not quite desirable. 8.4 FUTURE SCOPE Data hiding has been an evergreen field since its inception in the late 1970 s with the ever increasing need for security, speed and low cost as part of requirements of any transmission or reception system. Things need to be done at a very rapid rate without any compensation in loss of data or time. Data hiding has proved to be the ideal choice for such applications. It has grown in leaps and bounds with the advent of broadband and communication technologies which is capable of spanning the entire globe within a few minutes. It has played key roles in covert communication, image and video tagging, broadcast monitoring and copyright protection. With the ever existing introduction of new transforms which are improvements over their predecessors in some way or the other also could contribute to the growth of data hiding in an attempt to further bring about the optimality. Directionality features of new transforms like the Curvelet transforms, Slantlet transforms could also be possibly investigated for its exploitation. As far as data hiding is concerned, there cannot be a point of saturation with the ever increasing threats and new hacking techniques in real world. With the advent of tele services, data hiding could cut costs and distance and travel miles and miles within a few minutes. It could also be an important tool in forensics for tracking criminal records and immediate identification of suspects. It could drastically reduce the effort of INTERPOL (International Police) and could bring about a better coordination globally. With the fast booming integrated circuit (IC) technology, data hiding concepts have been exposed to field programmable gate arrays (FPGA) using wavelet transforms, lifting based wavelet transforms. It could greatly aid in real time applications
6 129 with reduction in space, cost and time. This technology could be a great boon in preventing fake passports and forged identity cards especially in airline industries.
ATSC Standard: Video Watermark Emission (A/335)
ATSC Standard: Video Watermark Emission (A/335) Doc. A/335:2016 20 September 2016 Advanced Television Systems Committee 1776 K Street, N.W. Washington, D.C. 20006 202-872-9160 i The Advanced Television
More informationSteganographic Technique for Hiding Secret Audio in an Image
Steganographic Technique for Hiding Secret Audio in an Image 1 Aiswarya T, 2 Mansi Shah, 3 Aishwarya Talekar, 4 Pallavi Raut 1,2,3 UG Student, 4 Assistant Professor, 1,2,3,4 St John of Engineering & Management,
More informationATSC Candidate Standard: Video Watermark Emission (A/335)
ATSC Candidate Standard: Video Watermark Emission (A/335) Doc. S33-156r1 30 November 2015 Advanced Television Systems Committee 1776 K Street, N.W. Washington, D.C. 20006 202-872-9160 i The Advanced Television
More informationChannel models for high-capacity information hiding in images
Channel models for high-capacity information hiding in images Johann A. Briffa a, Manohar Das b School of Engineering and Computer Science Oakland University, Rochester MI 48309 ABSTRACT We consider the
More informationColour Reproduction Performance of JPEG and JPEG2000 Codecs
Colour Reproduction Performance of JPEG and JPEG000 Codecs A. Punchihewa, D. G. Bailey, and R. M. Hodgson Institute of Information Sciences & Technology, Massey University, Palmerston North, New Zealand
More informationMPEG has been established as an international standard
1100 IEEE TRANSACTIONS ON CIRCUITS AND SYSTEMS FOR VIDEO TECHNOLOGY, VOL. 9, NO. 7, OCTOBER 1999 Fast Extraction of Spatially Reduced Image Sequences from MPEG-2 Compressed Video Junehwa Song, Member,
More informationDICOM medical image watermarking of ECG signals using EZW algorithm. A. Kannammal* and S. Subha Rani
126 Int. J. Medical Engineering and Informatics, Vol. 5, No. 2, 2013 DICOM medical image watermarking of ECG signals using EZW algorithm A. Kannammal* and S. Subha Rani ECE Department, PSG College of Technology,
More informationUnderstanding Compression Technologies for HD and Megapixel Surveillance
When the security industry began the transition from using VHS tapes to hard disks for video surveillance storage, the question of how to compress and store video became a top consideration for video surveillance
More informationContents. xv xxi xxiii xxiv. 1 Introduction 1 References 4
Contents List of figures List of tables Preface Acknowledgements xv xxi xxiii xxiv 1 Introduction 1 References 4 2 Digital video 5 2.1 Introduction 5 2.2 Analogue television 5 2.3 Interlace 7 2.4 Picture
More informationBehavior Forensics for Scalable Multiuser Collusion: Fairness Versus Effectiveness H. Vicky Zhao, Member, IEEE, and K. J. Ray Liu, Fellow, IEEE
IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, VOL. 1, NO. 3, SEPTEMBER 2006 311 Behavior Forensics for Scalable Multiuser Collusion: Fairness Versus Effectiveness H. Vicky Zhao, Member, IEEE,
More informationComparative Analysis of Wavelet Transform and Wavelet Packet Transform for Image Compression at Decomposition Level 2
2011 International Conference on Information and Network Technology IPCSIT vol.4 (2011) (2011) IACSIT Press, Singapore Comparative Analysis of Wavelet Transform and Wavelet Packet Transform for Image Compression
More informationCOMPRESSION OF DICOM IMAGES BASED ON WAVELETS AND SPIHT FOR TELEMEDICINE APPLICATIONS
COMPRESSION OF IMAGES BASED ON WAVELETS AND FOR TELEMEDICINE APPLICATIONS 1 B. Ramakrishnan and 2 N. Sriraam 1 Dept. of Biomedical Engg., Manipal Institute of Technology, India E-mail: rama_bala@ieee.org
More informationAn Efficient Low Bit-Rate Video-Coding Algorithm Focusing on Moving Regions
1128 IEEE TRANSACTIONS ON CIRCUITS AND SYSTEMS FOR VIDEO TECHNOLOGY, VOL. 11, NO. 10, OCTOBER 2001 An Efficient Low Bit-Rate Video-Coding Algorithm Focusing on Moving Regions Kwok-Wai Wong, Kin-Man Lam,
More informationDistortion Compensated Lookup-Table Embedding: Joint Security and Robustness Enhancement for Quantization Based Data Hiding
Distortion Compensated Lookup-Table Embedding: Joint Security and Robustness Enhancement for Quantization Based Data Hiding Min Wu ECE Department, University of Maryland, College Park, U.S.A. ABSTRACT
More informationStudy of White Gaussian Noise with Varying Signal to Noise Ratio in Speech Signal using Wavelet
American International Journal of Research in Science, Technology, Engineering & Mathematics Available online at http://www.iasir.net ISSN (Print): 2328-3491, ISSN (Online): 2328-3580, ISSN (CD-ROM): 2328-3629
More informationError Resilience for Compressed Sensing with Multiple-Channel Transmission
Journal of Information Hiding and Multimedia Signal Processing c 2015 ISSN 2073-4212 Ubiquitous International Volume 6, Number 5, September 2015 Error Resilience for Compressed Sensing with Multiple-Channel
More informationONE SENSOR MICROPHONE ARRAY APPLICATION IN SOURCE LOCALIZATION. Hsin-Chu, Taiwan
ICSV14 Cairns Australia 9-12 July, 2007 ONE SENSOR MICROPHONE ARRAY APPLICATION IN SOURCE LOCALIZATION Percy F. Wang 1 and Mingsian R. Bai 2 1 Southern Research Institute/University of Alabama at Birmingham
More informationFilm Grain Technology
Film Grain Technology Hollywood Post Alliance February 2006 Jeff Cooper jeff.cooper@thomson.net What is Film Grain? Film grain results from the physical granularity of the photographic emulsion Film grain
More informationModule 8 VIDEO CODING STANDARDS. Version 2 ECE IIT, Kharagpur
Module 8 VIDEO CODING STANDARDS Lesson 24 MPEG-2 Standards Lesson Objectives At the end of this lesson, the students should be able to: 1. State the basic objectives of MPEG-2 standard. 2. Enlist the profiles
More informationThe Development of a Synthetic Colour Test Image for Subjective and Objective Quality Assessment of Digital Codecs
2005 Asia-Pacific Conference on Communications, Perth, Western Australia, 3-5 October 2005. The Development of a Synthetic Colour Test Image for Subjective and Objective Quality Assessment of Digital Codecs
More informationColor Image Compression Using Colorization Based On Coding Technique
Color Image Compression Using Colorization Based On Coding Technique D.P.Kawade 1, Prof. S.N.Rawat 2 1,2 Department of Electronics and Telecommunication, Bhivarabai Sawant Institute of Technology and Research
More informationScalable Foveated Visual Information Coding and Communications
Scalable Foveated Visual Information Coding and Communications Ligang Lu,1 Zhou Wang 2 and Alan C. Bovik 2 1 Multimedia Technologies, IBM T. J. Watson Research Center, Yorktown Heights, NY 10598, USA 2
More informationWATERMARKING USING DECIMAL SEQUENCES. Navneet Mandhani and Subhash Kak
Cryptologia, volume 29, January 2005 WATERMARKING USING DECIMAL SEQUENCES Navneet Mandhani and Subhash Kak ADDRESS: Department of Electrical and Computer Engineering, Louisiana State University, Baton
More informationEMBEDDED ZEROTREE WAVELET CODING WITH JOINT HUFFMAN AND ARITHMETIC CODING
EMBEDDED ZEROTREE WAVELET CODING WITH JOINT HUFFMAN AND ARITHMETIC CODING Harmandeep Singh Nijjar 1, Charanjit Singh 2 1 MTech, Department of ECE, Punjabi University Patiala 2 Assistant Professor, Department
More informationAN UNEQUAL ERROR PROTECTION SCHEME FOR MULTIPLE INPUT MULTIPLE OUTPUT SYSTEMS. M. Farooq Sabir, Robert W. Heath and Alan C. Bovik
AN UNEQUAL ERROR PROTECTION SCHEME FOR MULTIPLE INPUT MULTIPLE OUTPUT SYSTEMS M. Farooq Sabir, Robert W. Heath and Alan C. Bovik Dept. of Electrical and Comp. Engg., The University of Texas at Austin,
More informationRobust 3-D Video System Based on Modified Prediction Coding and Adaptive Selection Mode Error Concealment Algorithm
International Journal of Signal Processing Systems Vol. 2, No. 2, December 2014 Robust 3-D Video System Based on Modified Prediction Coding and Adaptive Selection Mode Error Concealment Algorithm Walid
More informationJoint Optimization of Source-Channel Video Coding Using the H.264/AVC encoder and FEC Codes. Digital Signal and Image Processing Lab
Joint Optimization of Source-Channel Video Coding Using the H.264/AVC encoder and FEC Codes Digital Signal and Image Processing Lab Simone Milani Ph.D. student simone.milani@dei.unipd.it, Summer School
More informationRegion Adaptive Unsharp Masking based DCT Interpolation for Efficient Video Intra Frame Up-sampling
International Conference on Electronic Design and Signal Processing (ICEDSP) 0 Region Adaptive Unsharp Masking based DCT Interpolation for Efficient Video Intra Frame Up-sampling Aditya Acharya Dept. of
More information52 IEEE TRANSACTIONS ON MULTIMEDIA, VOL. 7, NO. 1, FEBRUARY 2005
52 IEEE TRANSACTIONS ON MULTIMEDIA, VOL. 7, NO. 1, FEBRUARY 2005 Spatially Localized Image-Dependent Watermarking for Statistical Invisibility and Collusion Resistance Karen Su, Student Member, IEEE, Deepa
More informationReducing False Positives in Video Shot Detection
Reducing False Positives in Video Shot Detection Nithya Manickam Computer Science & Engineering Department Indian Institute of Technology, Bombay Powai, India - 400076 mnitya@cse.iitb.ac.in Sharat Chandran
More informationNews from Rohde&Schwarz Number 195 (2008/I)
BROADCASTING TV analyzers 45120-2 48 R&S ETL TV Analyzer The all-purpose instrument for all major digital and analog TV standards Transmitter production, installation, and service require measuring equipment
More informationJoint Security and Robustness Enhancement for Quantization Based Data Embedding
IEEE TRANSACTIONS ON CIRCUITS AND SYSTEMS FOR VIDEO TECHNOLOGY, VOL. 13, NO. 8, AUGUST 2003 831 Joint Security and Robustness Enhancement for Quantization Based Data Embedding Min Wu, Member, IEEE Abstract
More informationImage Contrast Enhancement (ICE) The Defining Feature. Author: J Schell, Product Manager DRS Technologies, Network and Imaging Systems Group
WHITE PAPER Image Contrast Enhancement (ICE) The Defining Feature Author: J Schell, Product Manager DRS Technologies, Network and Imaging Systems Group Image Contrast Enhancement (ICE): The Defining Feature
More informationWINGS TO YOUR THOUGHTS..
Review on Various Image Steganographic Techniques Amrit Preet Kaur 1, Gagandeep Singh 2 1 M.Tech Scholar, Chandigarh Engineering College, Department of CSE, Landran, India, kaur.amritpreet13@gmail 2 Assistant
More informationCompressed-Sensing-Enabled Video Streaming for Wireless Multimedia Sensor Networks Abstract:
Compressed-Sensing-Enabled Video Streaming for Wireless Multimedia Sensor Networks Abstract: This article1 presents the design of a networked system for joint compression, rate control and error correction
More informationChapter 10 Basic Video Compression Techniques
Chapter 10 Basic Video Compression Techniques 10.1 Introduction to Video compression 10.2 Video Compression with Motion Compensation 10.3 Video compression standard H.261 10.4 Video compression standard
More informationDigital Video Telemetry System
Digital Video Telemetry System Item Type text; Proceedings Authors Thom, Gary A.; Snyder, Edwin Publisher International Foundation for Telemetering Journal International Telemetering Conference Proceedings
More informationMotion Video Compression
7 Motion Video Compression 7.1 Motion video Motion video contains massive amounts of redundant information. This is because each image has redundant information and also because there are very few changes
More informationResearch Topic. Error Concealment Techniques in H.264/AVC for Wireless Video Transmission in Mobile Networks
Research Topic Error Concealment Techniques in H.264/AVC for Wireless Video Transmission in Mobile Networks July 22 nd 2008 Vineeth Shetty Kolkeri EE Graduate,UTA 1 Outline 2. Introduction 3. Error control
More informationMPEGTool: An X Window Based MPEG Encoder and Statistics Tool 1
MPEGTool: An X Window Based MPEG Encoder and Statistics Tool 1 Toshiyuki Urabe Hassan Afzal Grace Ho Pramod Pancha Magda El Zarki Department of Electrical Engineering University of Pennsylvania Philadelphia,
More informationModule 8 VIDEO CODING STANDARDS. Version 2 ECE IIT, Kharagpur
Module 8 VIDEO CODING STANDARDS Lesson 27 H.264 standard Lesson Objectives At the end of this lesson, the students should be able to: 1. State the broad objectives of the H.264 standard. 2. List the improved
More informationDigital Color Images Ownership Authentication via Efficient and Robust Watermarking in a Hybrid Domain
536 M. CEDILLO-HERNANDEZ, A. CEDILLO-HERNANDEZ, F. GARCIA-UGALDE, ET AL., DIGITAL COLOR IMAGES OWNERSHIP Digital Color Images Ownership Authentication via Efficient and Robust Watermarking in a Hybrid
More informationFast MBAFF/PAFF Motion Estimation and Mode Decision Scheme for H.264
Fast MBAFF/PAFF Motion Estimation and Mode Decision Scheme for H.264 Ju-Heon Seo, Sang-Mi Kim, Jong-Ki Han, Nonmember Abstract-- In the H.264, MBAFF (Macroblock adaptive frame/field) and PAFF (Picture
More informationMultichannel Satellite Image Resolution Enhancement Using Dual-Tree Complex Wavelet Transform and NLM Filtering
Multichannel Satellite Image Resolution Enhancement Using Dual-Tree Complex Wavelet Transform and NLM Filtering P.K Ragunath 1, A.Balakrishnan 2 M.E, Karpagam University, Coimbatore, India 1 Asst Professor,
More informationChapter 2. Advanced Telecommunications and Signal Processing Program. E. Galarza, Raynard O. Hinds, Eric C. Reed, Lon E. Sun-
Chapter 2. Advanced Telecommunications and Signal Processing Program Academic and Research Staff Professor Jae S. Lim Visiting Scientists and Research Affiliates M. Carlos Kennedy Graduate Students John
More informationHEVC: Future Video Encoding Landscape
HEVC: Future Video Encoding Landscape By Dr. Paul Haskell, Vice President R&D at Harmonic nc. 1 ABSTRACT This paper looks at the HEVC video coding standard: possible applications, video compression performance
More informationIntra-frame JPEG-2000 vs. Inter-frame Compression Comparison: The benefits and trade-offs for very high quality, high resolution sequences
Intra-frame JPEG-2000 vs. Inter-frame Compression Comparison: The benefits and trade-offs for very high quality, high resolution sequences Michael Smith and John Villasenor For the past several decades,
More informationUnderstanding IP Video for
Brought to You by Presented by Part 3 of 4 B1 Part 3of 4 Clearing Up Compression Misconception By Bob Wimmer Principal Video Security Consultants cctvbob@aol.com AT A GLANCE Three forms of bandwidth compression
More informationModeling and Evaluating Feedback-Based Error Control for Video Transfer
Modeling and Evaluating Feedback-Based Error Control for Video Transfer by Yubing Wang A Dissertation Submitted to the Faculty of the WORCESTER POLYTECHNIC INSTITUTE In partial fulfillment of the Requirements
More informationA Novel Approach towards Video Compression for Mobile Internet using Transform Domain Technique
A Novel Approach towards Video Compression for Mobile Internet using Transform Domain Technique Dhaval R. Bhojani Research Scholar, Shri JJT University, Jhunjunu, Rajasthan, India Ved Vyas Dwivedi, PhD.
More informationAn Overview of Video Coding Algorithms
An Overview of Video Coding Algorithms Prof. Ja-Ling Wu Department of Computer Science and Information Engineering National Taiwan University Video coding can be viewed as image compression with a temporal
More informationDigital Watermarking for Telltale Tamper Proofing and Authentication
Digital Watermarking for Telltale Tamper Proofing and Authentication DEEPA KUNDUR, STUDENT MEMBER, IEEE, AND DIMITRIOS HATZINAKOS, SENIOR MEMBER, IEEE Invited Paper In this paper, we consider the problem
More informationReduction of Noise from Speech Signal using Haar and Biorthogonal Wavelet
Reduction of Noise from Speech Signal using Haar and Biorthogonal 1 Dr. Parvinder Singh, 2 Dinesh Singh, 3 Deepak Sethi 1,2,3 Dept. of CSE DCRUST, Murthal, Haryana, India Abstract Clear speech sometimes
More informationQs7-1 DEVELOPMENT OF AN IMAGE COMPRESSION AND AUTHENTICATION MODULE FOR VIDEO SURVEILLANCE SYSTEMS. DlSTRlBUllON OF THIS DOCUMENT IS UNLlditEb,d
DEVELOPMENT OF AN IMAGE COMPRESSION AND AUTHENTICATION MODULE FOR VIDEO SURVEILLANCE SYSTEMS Qs7-1 William R. Hale Sandia National Laboratories Albuquerque, NM 87185 Charles S. Johnson Sandia National
More informationMotion Re-estimation for MPEG-2 to MPEG-4 Simple Profile Transcoding. Abstract. I. Introduction
Motion Re-estimation for MPEG-2 to MPEG-4 Simple Profile Transcoding Jun Xin, Ming-Ting Sun*, and Kangwook Chun** *Department of Electrical Engineering, University of Washington **Samsung Electronics Co.
More informationKeywords Xilinx ISE, LUT, FIR System, SDR, Spectrum- Sensing, FPGA, Memory- optimization, A-OMS LUT.
An Advanced and Area Optimized L.U.T Design using A.P.C. and O.M.S K.Sreelakshmi, A.Srinivasa Rao Department of Electronics and Communication Engineering Nimra College of Engineering and Technology Krishna
More informationPassive Image Forensic Method to Detect Resampling Forgery in Digital Images
IOSR Journal of Computer Engineering (IOSR-JCE) e-issn: 2278-0661,p-ISSN: 2278-8727, Volume 17, Issue 3, Ver. VII (May Jun. 2015), PP 47-52 www.iosrjournals.org Passive Image Forensic Method to Detect
More informationResearch Article. ISSN (Print) *Corresponding author Shireen Fathima
Scholars Journal of Engineering and Technology (SJET) Sch. J. Eng. Tech., 2014; 2(4C):613-620 Scholars Academic and Scientific Publisher (An International Publisher for Academic and Scientific Resources)
More informationGaussian Noise attack Analysis of Non Blind Multiplicative Watermarking using 2D-DWT
Gaussian Noise attack Analysis of Non Blind Multiplicative Watermarking using 2D-DWT Mohammad Rizwan Khan 1, Ankur Goyal 2 1 Research Scholar, Department of Computer Engineering, Yagvalayka Institute of
More informationStudy and Analysis of Robust DWT-SVD Domain Based Digital Image Watermarking Technique Using MATLAB
2015 IEEE International Conference on Computational Intelligence & Communication Technology Study and Analysis of Robust DWT-SVD Domain Based Digital Image Watermarking Technique Using MATLAB Asna Furqan
More informationCHAPTER 2 SUBCHANNEL POWER CONTROL THROUGH WEIGHTING COEFFICIENT METHOD
CHAPTER 2 SUBCHANNEL POWER CONTROL THROUGH WEIGHTING COEFFICIENT METHOD 2.1 INTRODUCTION MC-CDMA systems transmit data over several orthogonal subcarriers. The capacity of MC-CDMA cellular system is mainly
More informationDISTRIBUTION STATEMENT A 7001Ö
Serial Number 09/678.881 Filing Date 4 October 2000 Inventor Robert C. Higgins NOTICE The above identified patent application is available for licensing. Requests for information should be addressed to:
More informationReal Time PQoS Enhancement of IP Multimedia Services Over Fading and Noisy DVB-T Channel
Real Time PQoS Enhancement of IP Multimedia Services Over Fading and Noisy DVB-T Channel H. Koumaras (1), E. Pallis (2), G. Gardikis (1), A. Kourtis (1) (1) Institute of Informatics and Telecommunications
More informationDELTA MODULATION AND DPCM CODING OF COLOR SIGNALS
DELTA MODULATION AND DPCM CODING OF COLOR SIGNALS Item Type text; Proceedings Authors Habibi, A. Publisher International Foundation for Telemetering Journal International Telemetering Conference Proceedings
More informationPAPER Wireless Multi-view Video Streaming with Subcarrier Allocation
IEICE TRANS. COMMUN., VOL.Exx??, NO.xx XXXX 200x 1 AER Wireless Multi-view Video Streaming with Subcarrier Allocation Takuya FUJIHASHI a), Shiho KODERA b), Nonmembers, Shunsuke SARUWATARI c), and Takashi
More informationIntelsat-29e Interference Mitigation Testing Interference Scenarios and Mitigation Techniques Enabled by the Intelsat Epic NG Class Satellites
Intelsat-29e Interference Mitigation Testing Interference Scenarios and Mitigation Techniques Enabled by the Intelsat Epic NG Class Satellites 7922-Inteference-Mitigation Introduction Networks are constantly
More informationDigital Audio and Video Fidelity. Ken Wacks, Ph.D.
Digital Audio and Video Fidelity Ken Wacks, Ph.D. www.kenwacks.com Communicating through the noise For most of history, communications was based on face-to-face talking or written messages sent by courier
More informationMicrobolometer based infrared cameras PYROVIEW with Fast Ethernet interface
DIAS Infrared GmbH Publications No. 19 1 Microbolometer based infrared cameras PYROVIEW with Fast Ethernet interface Uwe Hoffmann 1, Stephan Böhmer 2, Helmut Budzier 1,2, Thomas Reichardt 1, Jens Vollheim
More informationOF AN ADVANCED LUT METHODOLOGY BASED FIR FILTER DESIGN PROCESS
IMPLEMENTATION OF AN ADVANCED LUT METHODOLOGY BASED FIR FILTER DESIGN PROCESS 1 G. Sowmya Bala 2 A. Rama Krishna 1 PG student, Dept. of ECM. K.L.University, Vaddeswaram, A.P, India, 2 Assistant Professor,
More informationVideo Processing Applications Image and Video Processing Dr. Anil Kokaram
Video Processing Applications Image and Video Processing Dr. Anil Kokaram anil.kokaram@tcd.ie This section covers applications of video processing as follows Motion Adaptive video processing for noise
More informationAnalysis of MPEG-2 Video Streams
Analysis of MPEG-2 Video Streams Damir Isović and Gerhard Fohler Department of Computer Engineering Mälardalen University, Sweden damir.isovic, gerhard.fohler @mdh.se Abstract MPEG-2 is widely used as
More informationAnalysis of a Two Step MPEG Video System
Analysis of a Two Step MPEG Video System Lufs Telxeira (*) (+) (*) INESC- Largo Mompilhet 22, 4000 Porto Portugal (+) Universidade Cat61ica Portnguesa, Rua Dingo Botelho 1327, 4150 Porto, Portugal Abstract:
More informationData Converters and DSPs Getting Closer to Sensors
Data Converters and DSPs Getting Closer to Sensors As the data converters used in military applications must operate faster and at greater resolution, the digital domain is moving closer to the antenna/sensor
More informationZero Crossover Dynamic Power Synchronization Technology Overview
Technical Note Zero Crossover Dynamic Power Synchronization Technology Overview Background Engineers have long recognized the power benefits of zero crossover (Figure 1) over phase angle (Figure 2) power
More informationA Framework for Segmentation of Interview Videos
A Framework for Segmentation of Interview Videos Omar Javed, Sohaib Khan, Zeeshan Rasheed, Mubarak Shah Computer Vision Lab School of Electrical Engineering and Computer Science University of Central Florida
More informationTelecommunication Development Sector
Telecommunication Development Sector Study Groups ITU-D Study Group 1 Rapporteur Group Meetings Geneva, 4 15 April 2016 Document SG1RGQ/218-E 22 March 2016 English only DELAYED CONTRIBUTION Question 8/1:
More informationKeywords- Discrete Wavelet Transform, Lifting Scheme, 5/3 Filter
An Efficient Architecture for Multi-Level Lifting 2-D DWT P.Rajesh S.Srikanth V.Muralidharan Assistant Professor Assistant Professor Assistant Professor SNS College of Technology SNS College of Technology
More informationA New Wavelet Based Bio-Medical Data Compression Scheme Using FPGA
A New Wavelet Based Bio-Medical Data Compression Scheme Using FPGA Madhuri Kethari 1, Prof. Latika Desai 2 M.E Student, Department of Computer Engineering, DYPIET, Pune, India 1 Associate Professor, Department
More informationRECOMMENDATION ITU-R BT.1203 *
Rec. TU-R BT.1203 1 RECOMMENDATON TU-R BT.1203 * User requirements for generic bit-rate reduction coding of digital TV signals (, and ) for an end-to-end television system (1995) The TU Radiocommunication
More informationSharif University of Technology. SoC: Introduction
SoC Design Lecture 1: Introduction Shaahin Hessabi Department of Computer Engineering System-on-Chip System: a set of related parts that act as a whole to achieve a given goal. A system is a set of interacting
More informationPerformance of a Low-Complexity Turbo Decoder and its Implementation on a Low-Cost, 16-Bit Fixed-Point DSP
Performance of a ow-complexity Turbo Decoder and its Implementation on a ow-cost, 6-Bit Fixed-Point DSP Ken Gracie, Stewart Crozier, Andrew Hunt, John odge Communications Research Centre 370 Carling Avenue,
More informationA Noble Identification System for Tumors and Implementation
A Noble Identification System for Tumors and Implementation SHIEH-SHING LIN A, KING-TAN LEE B, JIA-HAU CHEN C, HEN-CHIA HSU D, a,c,d Department of Electrical Engineering St. John s University #499, Sec.
More informationPERCEPTUAL QUALITY ASSESSMENT FOR VIDEO WATERMARKING. Stefan Winkler, Elisa Drelie Gelasca, Touradj Ebrahimi
PERCEPTUAL QUALITY ASSESSMENT FOR VIDEO WATERMARKING Stefan Winkler, Elisa Drelie Gelasca, Touradj Ebrahimi Genista Corporation EPFL PSE Genimedia 15 Lausanne, Switzerland http://www.genista.com/ swinkler@genimedia.com
More informationVideo compression principles. Color Space Conversion. Sub-sampling of Chrominance Information. Video: moving pictures and the terms frame and
Video compression principles Video: moving pictures and the terms frame and picture. one approach to compressing a video source is to apply the JPEG algorithm to each frame independently. This approach
More informationRobust Transmission of H.264/AVC Video using 64-QAM and unequal error protection
Robust Transmission of H.264/AVC Video using 64-QAM and unequal error protection Ahmed B. Abdurrhman 1, Michael E. Woodward 1 and Vasileios Theodorakopoulos 2 1 School of Informatics, Department of Computing,
More informationExtraction Methods of Watermarks from Linearly-Distorted Images to Maximize Signal-to-Noise Ratio. Brandon Migdal. Advisors: Carl Salvaggio
Extraction Methods of Watermarks from Linearly-Distorted Images to Maximize Signal-to-Noise Ratio By Brandon Migdal Advisors: Carl Salvaggio Chris Honsinger A senior project submitted in partial fulfillment
More informationSystem Quality Indicators
Chapter 2 System Quality Indicators The integration of systems on a chip, has led to a revolution in the electronic industry. Large, complex system functions can be integrated in a single IC, paving the
More informationPaulo V. K. Borges. Flat 1, 50A, Cephas Av. London, UK, E1 4AR (+44) PRESENTATION
Paulo V. K. Borges Flat 1, 50A, Cephas Av. London, UK, E1 4AR (+44) 07942084331 vini@ieee.org PRESENTATION Electronic engineer working as researcher at University of London. Doctorate in digital image/video
More informationUltraGrid: from point-to-point uncompressed HD to flexible multi-party high-end collaborative environment
UltraGrid: from point-to-point uncompressed HD to flexible multi-party high-end collaborative environment Jiří Matela (matela@ics.muni.cz) Masaryk University EVL, UIC, Chicago, 2008 09 03 1/33 Laboratory
More informationReducing DDR Latency for Embedded Image Steganography
Reducing DDR Latency for Embedded Image Steganography J Haralambides and L Bijaminas Department of Math and Computer Science, Barry University, Miami Shores, FL, USA Abstract - Image steganography is the
More informationRobust Transmission of H.264/AVC Video Using 64-QAM and Unequal Error Protection
Robust Transmission of H.264/AVC Video Using 64-QAM and Unequal Error Protection Ahmed B. Abdurrhman, Michael E. Woodward, and Vasileios Theodorakopoulos School of Informatics, Department of Computing,
More information3D MR Image Compression Techniques based on Decimated Wavelet Thresholding Scheme
3D MR Image Compression Techniques based on Decimated Wavelet Thresholding Scheme Dr. P.V. Naganjaneyulu Professor & Principal, Department of ECE, PNC & Vijai Institute of Engineering & Technology, Repudi,
More informationAUDIOVISUAL COMMUNICATION
AUDIOVISUAL COMMUNICATION Laboratory Session: Recommendation ITU-T H.261 Fernando Pereira The objective of this lab session about Recommendation ITU-T H.261 is to get the students familiar with many aspects
More informationInformed Source Separation of Linear Instantaneous Under-Determined Audio Mixtures by Source Index Embedding
IEEE TRANSACTIONS ON AUDIO, SPEECH, AND LANGUAGE PROCESSING, VOL. 19, NO. 6, AUGUST 2011 1721 Informed Source Separation of Linear Instantaneous Under-Determined Audio Mixtures by Source Index Embedding
More informationA Layered Approach for Watermarking In Images Based On Huffman Coding
A Layered Approach for Watermarking In Images Based On Huffman Coding D. Lalitha Bhaskari 1 P. S. Avadhani 1 M. Viswanath 2 1 Department of Computer Science & Systems Engineering, Andhra University, 2
More informationReduced-reference image quality assessment using energy change in reorganized DCT domain
ISSN : 0974-7435 Volume 7 Issue 10 Reduced-reference image quality assessment using energy change in reorganized DCT domain Sheng Ding 1, Mei Yu 1,2 *, Xin Jin 1, Yang Song 1, Kaihui Zheng 1, Gangyi Jiang
More informationINTERNATIONAL JOURNAL OF ELECTRONICS AND COMMUNICATION ENGINEERING & TECHNOLOGY (IJECET)
INTERNATIONAL JOURNAL OF ELECTRONICS AND COMMUNICATION ENGINEERING & TECHNOLOGY (IJECET) International Journal of Electronics and Communication Engineering & Technology (IJECET), ISSN 0976 ISSN 0976 6464(Print)
More informationOverview of All Pixel Circuits for Active Matrix Organic Light Emitting Diode (AMOLED)
Chapter 2 Overview of All Pixel Circuits for Active Matrix Organic Light Emitting Diode (AMOLED) ---------------------------------------------------------------------------------------------------------------
More informationNUMEROUS elaborate attempts have been made in the
IEEE TRANSACTIONS ON COMMUNICATIONS, VOL. 46, NO. 12, DECEMBER 1998 1555 Error Protection for Progressive Image Transmission Over Memoryless and Fading Channels P. Greg Sherwood and Kenneth Zeger, Senior
More informationCONSTRUCTION OF LOW-DISTORTED MESSAGE-RICH VIDEOS FOR PERVASIVE COMMUNICATION
2016 International Computer Symposium CONSTRUCTION OF LOW-DISTORTED MESSAGE-RICH VIDEOS FOR PERVASIVE COMMUNICATION 1 Zhen-Yu You ( ), 2 Yu-Shiuan Tsai ( ) and 3 Wen-Hsiang Tsai ( ) 1 Institute of Information
More information