Key-based scrambling for secure image communication
|
|
- Stephen Geoffrey Edwards
- 5 years ago
- Views:
Transcription
1 University of Wollongong Research Online Faculty of Engineering and Information Sciences - Papers: Part A Faculty of Engineering and Information Sciences 2012 Key-based scrambling for secure image communication Prashan Premaratne University of Wollongong, prashan@uow.edu.au Malin Premaratne Monash University Publication Details P. Premaratne & M. Premaratne, "Key-based scrambling for secure image communication," in Emerging Intelligent Computing Technology and Applications, P. Gupta, D. Huang, P. Premaratne & X. Zhang, Ed. Berlin: Springer, 2012, pp Research Online is the open access institutional repository for the University of Wollongong. For further information contact the UOW Library: research-pubs@uow.edu.au
2 Key-based scrambling for secure image communication Abstract Secure image communication is becoming increasingly important due to theft and manipulation of its content. Law enforcement agents may find it increasingly difficult to stay afloat above the ill intentions of hackers. We have been able to develop an image scrambling algorithm that is very simple to implement but almost impossible to breach with a probability less than 5x This is possible due to the fact that a user may purchase or acquire rights for an intended image by specifying a 'key' that can form a sequence of numbers 10 to 100 in length. The content provider uses this sequence as a base in developing another key sequence to scramble the image and transmit it to the user through regular channels such as an attachment. Since the user is the only party apart from the provider to possess the key for descrambling, any third party will not be able to descramble it successfully as will be shown in this paper. Keywords key, image, scrambling, secure, communication Disciplines Engineering Science and Technology Studies Publication Details P. Premaratne & M. Premaratne, "Key-based scrambling for secure image communication," in Emerging Intelligent Computing Technology and Applications, P. Gupta, D. Huang, P. Premaratne & X. Zhang, Ed. Berlin: Springer, 2012, pp This book chapter is available at Research Online:
3 Key-Based Scrambling for Secure Image Communication Prashan Premaratne 1 and Malin Premaratne 2 1 School of Electrical Computer and Telecommunications Engineering, University of Wollongong, North Wollongong, NSW, Australia 2 Department of Electrical and Computer Systems Engineering at Monash University, Victoria, Australia malin@ieee.org, prashan@uow.edu.au Abstract. Secure image communication is becoming increasingly important due to theft and manipulation of its content. Law enforcement agents may find it increasingly difficult to stay afloat above the ill intentions of hackers. We have been able to develop an image scrambling algorithm that is very simple to implement but almost impossible to breach with a probability less than 5x This is possible due to the fact that a user may purchase or acquire rights for an intended image by specifying a key that can form a sequence of numbers 10 to 100 in length. The content provider uses this sequence as a base in developing another key sequence to scramble the image and transmit it to the user through regular channels such as an attachment. Since the user is the only party apart from the provider to possess the key for descrambling, any third party will not be able to descramble it successfully as will be shown in this paper. Keywords: Image scrambling, image communication, image shuffling, key generation. 1 Introduction Digital images are increasingly sent over networks as documents, commercial items or law enforcement material. Due to the heightened activities of hackers all over the world, these images can easily end up in the hands of unscrupulous third parties who might profit/extort or modify them without the knowledge of the legitimate receiver. To safeguard the image information, research has been carried out in mathematics, cryptology and in information theory over the years. Previously, image watermarking, visual cryptology, information sharing and image scrambling has been proposed to counter image theft. Image scrambling process is an important image encryption method which has been used in watermarking for data hiding. The objective of image scrambling has been to generate a non-intelligible image which prevents human visual system or computer vision system from understanding the true content. An authorized user is empowered to descramble the image using information regarding scrambling method and the variables in order to decipher the image. Image scrambling has been proposed as a way to mitigate such issues way back in 1960 when the first documented system to do so emerged [1]. Their approach D.-S. Huang et al. (Eds.): ICIC 2012, CCIS 304, pp , Springer-Verlag Berlin Heidelberg 2012
4 260 P. Premaratne and M. Premaratne involved scrambling, concealing or encoding information and unscrambling and decoding the received images using line screens and grids consisting of opaque and transparent lines. Over the years, image scrambling has evolved into two streams; one based on matrix transformation to shift coordinates and another to permuting coordinates of pixels. Most of the scrambling approaches are based on Arnold Transform or combination of Arnold Transform with other techniques [2-4]. These are also applicable only to equilateral images. If images are not equilateral, then they have to be padded with values to make them equilateral [5]. Since most of these techniques do not use a key that provides additional security, Zhou et.al. proposed Fibonacci P-code based scrambling algorithm which required two parameters to be known by the receiver side to descramble the images [6]. Even though, this is certainly a favorable development over the others, two numbers would not provide adequate protection and the system is very vulnerable to attack. Others [7-12] have attempted scrambling using random sequences based on chaos or pseudo random number generation based on parameters. Zhou et. al proposed an algorithm using an M-sequence to shuffle image coordinates using two parameter key [13]. The M-sequences is a maximum length sequence that has been used in spread spectrum communications. It is a pseudo random noise sequence. In this approach, the authorized user is given the shift parameter r and the distance parameter p which are used to generate the 2-D M-sequence to descramble the scrambled image. Gu, et. al. presented an image scrambling algorithm based on chaotic sequences [14]. The chaotic sequence was generated using three parameters and the algorithm typically had to be iterated 100 times to generate the non linear sequence. This introduced high complexity and the resulting scrambled image histogram was modified in the process. Even though these attempts are promising, having one or two parameters controlling the entire pseudorandom sequence generation was very vulnerable to attack. 2 Key Based Scrambling In image scrambling and descrambling, it is imperative to have simple algorithm to shuffle the pixel values fast and reorder it to reveal the original. However, such simple requirements have most of the time resulted in low-secure solutions. Our approach proposes a solution which provides both simplicity and utmost security using a user defined sequence to safeguard the content. In our approach, we build a pseudorandom sequence using the user defined 10 to 100 long positive integer value sequence. Since these values are used for image pixel row and column shuffling, the values usually have a lower and an upper limit of 1 and 200. These limits restrict that a small image such as 256x128 will not be shuffled by a value such as 300 in which case, the modulo operations simply will result in switching row value by 44 (300 = ) rather than 300. This provided sequence is used to generate a longer sequence that is as long as the maximum dimension of the image (length or width). We have few options to generate the longer sequence from the user provided sequence. One option would be to periodically insert the user provided
5 Key-Based Scrambling for Secure Image Communication 261 sequence in order to generate the longer sequence. In order to shuffle the image well, we can increment each value of the shorter sequence whenever it is repeated in the longer sequence. This process is illustrated in Fig. 1. User defined short sequence Generated Shuffling Key Sequence Increment all values Increment all values Increment all values Fig. 1. Key Sequence Generation Using User Provided Key Once the shuffling order sequence is generated, which is the key in this process, sequence values are read and the rows are switched (if the first value of the sequence is 78, then row 78 of the image is copied into row 1 and row 1 is copied into row 78). Once all rows are switched according to the key sequence, columns are switched using the same sequence. At this stage the amount of scrambling achieved is visually not acceptable as indicated by Figures 2(b). Thus this process is now followed by circular shifting of rows and then the columns using the key sequence. The result is Fig. 2. (a) Original Image of Lena (b) Scrambled Image Using Row-Wise and Column Wise Shuffling. (c) Final Scrambled Image: Result of the Row-Wise Followed by Column Wise Circular Shifting of Image (b). (d) Descrambled Image of (c) Using the Correct Sequence.
6 262 P. Premaratne and M. Premaratne visually acceptable and is shown in Fig. 2(c). Table 1 lists the image scrambling process as discussed above. The generated key sequence can again be used by the authorized party to unscramble image by undoing the circular shifting and shuffling. The unscrambled image of Fig.2(c) is shown in Fig. 2(d). 3 Robustness of Our Approach Since the user defined sequence which can be from 10 to 100 values long positive integers in the range of 1 to 200, statistically, the probability of estimating such a sequence will be (1/200) 100 = 5x Hence we can conclude that estimating such a sequence to unscramble the image will be practically impossible. Due to this robustness, the user can expect multiple images of different sizes scrambled and communicated by the same content provider. In the event of communication channel or unauthorized party adding noise to the transmitted image, the descrambling process will not be affected. Table 1. Summary of the proposed scrambling process Step1 Use the user provided key to generate a key sequence that is of the length of the maximum dimension of the image Step2 Use the key sequence to switch the rows Step3 Use the key sequence to switch the columns Step4 Use the key sequence to circular shift the rows Step5 Use the key sequence to circular shift the columns 4 Discussion We have proposed a highly secure yet simple image scrambling algorithm that seems to address most of the concerns of having a random sequence to scramble and descramble an image. Since the sequence generation is not governed by few numbers of parameter as has been reported before [7-12], a sequence that is almost 100 values long will almost be impossible to crack. Since the algorithm does not affect the pixel values of the image, its histogram and the content remain unchanged. Any additive noise will not affect the descrambling process. The algorithm equally applies to color images. Since the authorized user determines the key, same key can be used multiple times for multiple images when dealing with the same content provider. References 1. Renesse, R.L.: Hidden and Scrabbled Images- a Review. In: Conference on Optical Security and Counterfeit Deterence Techniques IV, vol. 4677, pp SPIE (2002) 2. Huang, H.: An Image Scrambling Encryption Algorithm Combined Arnold and Chaotic Transform. In: Int. Conf. China Communication, pp (2010)
7 Key-Based Scrambling for Secure Image Communication Fang, L., YuKai, W.: Restoring of the Watermarking Image in Arnold Scrambling. In: 2nd International Conference on Signal Processing Systems (ICSPS), pp (2010) 4. Liu, Z., Chen, H., Liu, T., Li, P., Xu, L., Dai, J., Liu, S.: Image Encryption by Us-ing Gyrator Transform and Arnold Transform. Journal of Electronic Imaging 20(1) (2011) 5. Kong, T., Zhang, D.: A New Anti-Arnold Transformation Algorithm. Journal of Software 15(10), (2004) 6. Zhou, Y., Joyner, V.M., Panetta, K.: Two Fibonacci P-code Based Image Scram-bling Algorithms. Image Processing: Algorithms and Systems VI 6812, , 1 12 (2008) 7. Che, S., Che, Z., Ma, B.: An Improved Image Scrabbling Algorithm. In: Proc. Second Int. Conf. Genetics and Evolutionary Computing, pp (2008) 8. Fridrich, J.: Image Encryption Based on Chaotic Maps. In: Proc. IEEE Conf. Systems, Man, and Cybernetics, pp (1997) 9. Yeo, J., Guo, C.: Efficient Hierarchical Chaotic Image Encryption Algorithm and Its VLSI Realisation. In: IEE Proceedings Vision, Image and Signal Processing, vol. 147(2), pp (2000) 10. Liping, S., Zheng, Q., Bo, L., Jun, Q., Huan, L.: Image Scrambling Algorithm Based on Random Shuffling Strategy. In: 3rd IEEE Conference on Industrial Electronics and Applications, vol. 4677, pp SPIE (2008) 11. Ville, D., Philips, W., Walle, R., Lemahieu, I.: Image Scrambling Without Band-width Expansion. IEEE Trans. Circ. Sys. Video Tech. 14(6), (2004) 12. Liu, S., Sheridan, J.T.: Optical Information Hiding by Combining Image Scrambling Techniques in Fractional Fourier Domains. In: Irish Signal and Systems Conference, pp (2001) 13. Zhou, Y., Panetta, K., Agaian, S.: An Image Scrambling Algorithm Using Parameter Based M-sequence. In: Proc. Seventh Inter. Conf. Mach. Learning and Cybern., pp (2008) 14. Gu, G., Han, G.: The Application of Chaos and DWT in Image Scrambling. In: Proceedings of the Fifth International Conference on Machine Learning and Cybernetics, pp (2006)
ISSN (Print) Original Research Article. Coimbatore, Tamil Nadu, India
Scholars Journal of Engineering and Technology (SJET) Sch. J. Eng. Tech., 016; 4(1):1-5 Scholars Academic and Scientific Publisher (An International Publisher for Academic and Scientific Resources) www.saspublisher.com
More informationImplementation of a turbo codes test bed in the Simulink environment
University of Wollongong Research Online Faculty of Informatics - Papers (Archive) Faculty of Engineering and Information Sciences 2005 Implementation of a turbo codes test bed in the Simulink environment
More informationImage Scrambling Using R-Prime Shuffle on Image and Image Blocks
Scrambling Using R-Prime Shuffle on and Blocks H.B.Kekre, Tanuja Sarode 2, Pallavi Halarnkar 3 Sr. Professor, Computer Engineering, MPSTME, Mumbai, India Associate. Professor, Computer Engineering, TSEC,
More informationOBJECT-BASED IMAGE COMPRESSION WITH SIMULTANEOUS SPATIAL AND SNR SCALABILITY SUPPORT FOR MULTICASTING OVER HETEROGENEOUS NETWORKS
OBJECT-BASED IMAGE COMPRESSION WITH SIMULTANEOUS SPATIAL AND SNR SCALABILITY SUPPORT FOR MULTICASTING OVER HETEROGENEOUS NETWORKS Habibollah Danyali and Alfred Mertins School of Electrical, Computer and
More informationKeywords- Cryptography, Frame, Least Significant Bit, Pseudo Random Equations, Text, Video Image, Video Steganography.
International Journal of Scientific & Engineering Research, Volume 5, Issue 7, July-2014 164 High Security Video Steganography Putti DeepthiChandan, Dr. M. Narayana Abstract- Video Steganography is a technique
More informationPseudorandom bit Generators for Secure Broadcasting Systems
+00? IE.Nfejb~lV 4 Pseudorandom bit Generators for Secure Broadcasting Systems Chung-Huang Yang m Computer & Communication Research Laboratories Industrial Technology Research Institute Chutung, Hsinchu
More informationA Pseudorandom Binary Generator Based on Chaotic Linear Feedback Shift Register
A Pseudorandom Binary Generator Based on Chaotic Linear Feedback Shift Register Saad Muhi Falih Department of Computer Technical Engineering Islamic University College Al Najaf al Ashraf, Iraq saadmuheyfalh@gmail.com
More informationWATERMARKING USING DECIMAL SEQUENCES. Navneet Mandhani and Subhash Kak
Cryptologia, volume 29, January 2005 WATERMARKING USING DECIMAL SEQUENCES Navneet Mandhani and Subhash Kak ADDRESS: Department of Electrical and Computer Engineering, Louisiana State University, Baton
More informationOn the design of turbo codes with convolutional interleavers
University of Wollongong Research Online University of Wollongong Thesis Collection 1954-2016 University of Wollongong Thesis Collections 2005 On the design of turbo codes with convolutional interleavers
More informationA Hybrid Approach for Information Hiding and Encryption using Multiple LSB s Algorithms
A Hybrid Approach for Information Hiding and Encryption using Multiple LSB s Algorithms H.B.Kekre 1, Tanuja Sarode 2 and Pallavi Halarnkar 3 1 Senior Professor, MPSTME, NMIMS University, Mumbai 2 Associate
More informationError Resilience for Compressed Sensing with Multiple-Channel Transmission
Journal of Information Hiding and Multimedia Signal Processing c 2015 ISSN 2073-4212 Ubiquitous International Volume 6, Number 5, September 2015 Error Resilience for Compressed Sensing with Multiple-Channel
More informationAnalysis of Different Pseudo Noise Sequences
Analysis of Different Pseudo Noise Sequences Alka Sawlikar, Manisha Sharma Abstract Pseudo noise (PN) sequences are widely used in digital communications and the theory involved has been treated extensively
More informationLFSR Based Watermark and Address Generator for Digital Image Watermarking SRAM
LFSR Based Watermark and Address Generator for igital Image Watermarking SRAM S. Bhargav Kumar #1, S.Jagadeesh *2, r.m.ashok #3 #1 P.G. Student, M.Tech. (VLSI), epartment of Electronics and Communication
More informationDesign and Implementation of Data Scrambler & Descrambler System Using VHDL
Design and Implementation of Data Scrambler & Descrambler System Using VHDL Naina K.Randive Dept.of Electronics and Telecommunications Dept. of Electronics and Telecommunications P.R. Pote (Patil) college
More informationImplementation of Memory Based Multiplication Using Micro wind Software
Implementation of Memory Based Multiplication Using Micro wind Software U.Palani 1, M.Sujith 2,P.Pugazhendiran 3 1 IFET College of Engineering, Department of Information Technology, Villupuram 2,3 IFET
More informationResearch Article. ISSN (Print) *Corresponding author Shireen Fathima
Scholars Journal of Engineering and Technology (SJET) Sch. J. Eng. Tech., 2014; 2(4C):613-620 Scholars Academic and Scientific Publisher (An International Publisher for Academic and Scientific Resources)
More informationHCCA: A Cryptogram Analysis Algorithm Based on Hill Climbing
International Conference on Logistics Engineering, Management and Computer Science (LEMCS 2015) HCCA: A Cryptogram Analysis Algorithm Based on Hill Climbing Zhang Tongbo ztb5129@live.com Li Guangli calculatinggod@foxmail.com
More informationA Novel Architecture of LUT Design Optimization for DSP Applications
A Novel Architecture of LUT Design Optimization for DSP Applications O. Anjaneyulu 1, Parsha Srikanth 2 & C. V. Krishna Reddy 3 1&2 KITS, Warangal, 3 NNRESGI, Hyderabad E-mail : anjaneyulu_o@yahoo.com
More informationOMS Based LUT Optimization
International Journal of Advanced Education and Research ISSN: 2455-5746, Impact Factor: RJIF 5.34 www.newresearchjournal.com/education Volume 1; Issue 5; May 2016; Page No. 11-15 OMS Based LUT Optimization
More informationROBUST ADAPTIVE INTRA REFRESH FOR MULTIVIEW VIDEO
ROBUST ADAPTIVE INTRA REFRESH FOR MULTIVIEW VIDEO Sagir Lawan1 and Abdul H. Sadka2 1and 2 Department of Electronic and Computer Engineering, Brunel University, London, UK ABSTRACT Transmission error propagation
More informationColor Image Compression Using Colorization Based On Coding Technique
Color Image Compression Using Colorization Based On Coding Technique D.P.Kawade 1, Prof. S.N.Rawat 2 1,2 Department of Electronics and Telecommunication, Bhivarabai Sawant Institute of Technology and Research
More informationALONG with the progressive device scaling, semiconductor
IEEE TRANSACTIONS ON CIRCUITS AND SYSTEMS II: EXPRESS BRIEFS, VOL. 57, NO. 4, APRIL 2010 285 LUT Optimization for Memory-Based Computation Pramod Kumar Meher, Senior Member, IEEE Abstract Recently, we
More informationShot Transition Detection Scheme: Based on Correlation Tracking Check for MB-Based Video Sequences
, pp.120-124 http://dx.doi.org/10.14257/astl.2017.146.21 Shot Transition Detection Scheme: Based on Correlation Tracking Check for MB-Based Video Sequences Mona A. M. Fouad 1 and Ahmed Mokhtar A. Mansour
More informationMultichannel Satellite Image Resolution Enhancement Using Dual-Tree Complex Wavelet Transform and NLM Filtering
Multichannel Satellite Image Resolution Enhancement Using Dual-Tree Complex Wavelet Transform and NLM Filtering P.K Ragunath 1, A.Balakrishnan 2 M.E, Karpagam University, Coimbatore, India 1 Asst Professor,
More informationTransmission System for ISDB-S
Transmission System for ISDB-S HISAKAZU KATOH, SENIOR MEMBER, IEEE Invited Paper Broadcasting satellite (BS) digital broadcasting of HDTV in Japan is laid down by the ISDB-S international standard. Since
More informationCryptagram. Photo Privacy for Online Social Media Matt Tierney, Ian Spiro Christoph Bregler, Lakshmi Subramanian
Cryptagram Photo Privacy for Online Social Media http://cryptagr.am Matt Tierney, Ian Spiro Christoph Bregler, Lakshmi Subramanian Courant Institute, NYU Photo Privacy Problem Photo Privacy Problem Photo
More information[Dharani*, 4.(8): August, 2015] ISSN: (I2OR), Publication Impact Factor: 3.785
IJESRT INTERNATIONAL JOURNAL OF ENGINEERING SCIENCES & RESEARCH TECHNOLOGY IMPLEMENTATION OF ADDRESS GENERATOR FOR WiMAX DEINTERLEAVER ON FPGA T. Dharani*, C.Manikanta * M. Tech scholar in VLSI System
More information[Thu Ha* et al., 5(8): August, 2016] ISSN: IC Value: 3.00 Impact Factor: 4.116
IJESRT INTERNATIONAL JOURNAL OF ENGINEERING SCIENCES & RESEARCH TECHNOLOGY A NEW SYSTEM FOR INSERTING A MARK PATTERN INTO H264 VIDEO Tran Thu Ha *, Tran Quang Duc and Tran Minh Son * Ho Chi Minh City University
More informationUnequal Error Protection Codes for Wavelet Image Transmission over W-CDMA, AWGN and Rayleigh Fading Channels
Unequal Error Protection Codes for Wavelet Image Transmission over W-CDMA, AWGN and Rayleigh Fading Channels MINH H. LE and RANJITH LIYANA-PATHIRANA School of Engineering and Industrial Design College
More informationOptimized Color Based Compression
Optimized Color Based Compression 1 K.P.SONIA FENCY, 2 C.FELSY 1 PG Student, Department Of Computer Science Ponjesly College Of Engineering Nagercoil,Tamilnadu, India 2 Asst. Professor, Department Of Computer
More informationNew Address Shift Linear Feedback Shift Register Generator
New Address Shift Linear Feedback Shift Register Generator Kholood J. Moulood Department of Mathematical, Tikrit University, College of Education for Women, Salahdin. E-mail: khmsc2006@yahoo.com. Abstract
More informationAdaptive Key Frame Selection for Efficient Video Coding
Adaptive Key Frame Selection for Efficient Video Coding Jaebum Jun, Sunyoung Lee, Zanming He, Myungjung Lee, and Euee S. Jang Digital Media Lab., Hanyang University 17 Haengdang-dong, Seongdong-gu, Seoul,
More informationModified Reconfigurable Fir Filter Design Using Look up Table
Modified Reconfigurable Fir Filter Design Using Look up Table R. Dhayabarani, Assistant Professor. M. Poovitha, PG scholar, V.S.B Engineering College, Karur, Tamil Nadu. Abstract - Memory based structures
More informationReduced complexity MPEG2 video post-processing for HD display
Downloaded from orbit.dtu.dk on: Dec 17, 2017 Reduced complexity MPEG2 video post-processing for HD display Virk, Kamran; Li, Huiying; Forchhammer, Søren Published in: IEEE International Conference on
More informationSRAM Based Random Number Generator For Non-Repeating Pattern Generation
Applied Mechanics and Materials Online: 2014-06-18 ISSN: 1662-7482, Vol. 573, pp 181-186 doi:10.4028/www.scientific.net/amm.573.181 2014 Trans Tech Publications, Switzerland SRAM Based Random Number Generator
More informationDigital holographic security system based on multiple biometrics
Digital holographic security system based on multiple biometrics ALOKA SINHA AND NIRMALA SAINI Department of Physics, Indian Institute of Technology Delhi Indian Institute of Technology Delhi, Hauz Khas,
More informationGuidance For Scrambling Data Signals For EMC Compliance
Guidance For Scrambling Data Signals For EMC Compliance David Norte, PhD. Abstract s can be used to help mitigate the radiated emissions from inherently periodic data signals. A previous paper [1] described
More informationCONSTRUCTION OF LOW-DISTORTED MESSAGE-RICH VIDEOS FOR PERVASIVE COMMUNICATION
2016 International Computer Symposium CONSTRUCTION OF LOW-DISTORTED MESSAGE-RICH VIDEOS FOR PERVASIVE COMMUNICATION 1 Zhen-Yu You ( ), 2 Yu-Shiuan Tsai ( ) and 3 Wen-Hsiang Tsai ( ) 1 Institute of Information
More informationAn Efficient Reduction of Area in Multistandard Transform Core
An Efficient Reduction of Area in Multistandard Transform Core A. Shanmuga Priya 1, Dr. T. K. Shanthi 2 1 PG scholar, Applied Electronics, Department of ECE, 2 Assosiate Professor, Department of ECE Thanthai
More informationDesign and Implementation of LUT Optimization DSP Techniques
Design and Implementation of LUT Optimization DSP Techniques 1 D. Srinivasa rao & 2 C. Amala 1 M.Tech Research Scholar, Priyadarshini Institute of Technology & Science, Chintalapudi 2 Associate Professor,
More informationScalable Foveated Visual Information Coding and Communications
Scalable Foveated Visual Information Coding and Communications Ligang Lu,1 Zhou Wang 2 and Alan C. Bovik 2 1 Multimedia Technologies, IBM T. J. Watson Research Center, Yorktown Heights, NY 10598, USA 2
More informationLine-Adaptive Color Transforms for Lossless Frame Memory Compression
Line-Adaptive Color Transforms for Lossless Frame Memory Compression Joungeun Bae 1 and Hoon Yoo 2 * 1 Department of Computer Science, SangMyung University, Jongno-gu, Seoul, South Korea. 2 Full Professor,
More informationModule 8 VIDEO CODING STANDARDS. Version 2 ECE IIT, Kharagpur
Module 8 VIDEO CODING STANDARDS Lesson 27 H.264 standard Lesson Objectives At the end of this lesson, the students should be able to: 1. State the broad objectives of the H.264 standard. 2. List the improved
More informationKey Techniques of Bit Rate Reduction for H.264 Streams
Key Techniques of Bit Rate Reduction for H.264 Streams Peng Zhang, Qing-Ming Huang, and Wen Gao Institute of Computing Technology, Chinese Academy of Science, Beijing, 100080, China {peng.zhang, qmhuang,
More informationDesign of Memory Based Implementation Using LUT Multiplier
Design of Memory Based Implementation Using LUT Multiplier Charan Kumar.k 1, S. Vikrama Narasimha Reddy 2, Neelima Koppala 3 1,2 M.Tech(VLSI) Student, 3 Assistant Professor, ECE Department, Sree Vidyanikethan
More informationPerformance Evaluation of Stream Ciphers on Large Databases
IJCSNS International Journal of Computer Science and Network Security, VOL.8 No.9, September 28 285 Performance Evaluation of Stream Ciphers on Large Databases Dr.M.Sikandar Hayat Khiyal Aihab Khan Saria
More informationEMBEDDED ZEROTREE WAVELET CODING WITH JOINT HUFFMAN AND ARITHMETIC CODING
EMBEDDED ZEROTREE WAVELET CODING WITH JOINT HUFFMAN AND ARITHMETIC CODING Harmandeep Singh Nijjar 1, Charanjit Singh 2 1 MTech, Department of ECE, Punjabi University Patiala 2 Assistant Professor, Department
More informationTERRESTRIAL broadcasting of digital television (DTV)
IEEE TRANSACTIONS ON BROADCASTING, VOL 51, NO 1, MARCH 2005 133 Fast Initialization of Equalizers for VSB-Based DTV Transceivers in Multipath Channel Jong-Moon Kim and Yong-Hwan Lee Abstract This paper
More informationStudent Laboratory Experiments Exploring Optical Fibre Communication Systems, Eye Diagrams and Bit Error Rates
Student Laboratory Experiments Exploring Optical Fibre Communication Systems, Eye Diagrams and Bit Error Rates Douglas Walsh, David Moodie, Iain Mauchline, Steve Conner, *Walter Johnstone, *Brian Culshaw,
More informationDesignandImplementationofDataScramblerDescramblerSystemusingVHDL
Global Journal of Computer Science and Technology: A Hardware & Computation Volume 15 Issue 2 Version 1.0 Year 2015 Type: Double Blind Peer Reviewed International Research Journal Publisher: Global Journals
More informationRandomness analysis of A5/1 Stream Cipher for secure mobile communication
Randomness analysis of A5/1 Stream Cipher for secure mobile communication Prof. Darshana Upadhyay 1, Dr. Priyanka Sharma 2, Prof.Sharada Valiveti 3 Department of Computer Science and Engineering Institute
More informationImplementation of CRC and Viterbi algorithm on FPGA
Implementation of CRC and Viterbi algorithm on FPGA S. V. Viraktamath 1, Akshata Kotihal 2, Girish V. Attimarad 3 1 Faculty, 2 Student, Dept of ECE, SDMCET, Dharwad, 3 HOD Department of E&CE, Dayanand
More informationFast thumbnail generation for MPEG video by using a multiple-symbol lookup table
48 3, 376 March 29 Fast thumbnail generation for MPEG video by using a multiple-symbol lookup table Myounghoon Kim Hoonjae Lee Ja-Cheon Yoon Korea University Department of Electronics and Computer Engineering,
More informationK. Phanindra M.Tech (ES) KITS, Khammam, India
Volume 7, Issue 5, May 2017 ISSN: 2277 128X International Journal of Advanced Research in Computer Science and Software Engineering Research Paper Available online at: www.ijarcsse.com LUT Optimization
More informationPaulo V. K. Borges. Flat 1, 50A, Cephas Av. London, UK, E1 4AR (+44) PRESENTATION
Paulo V. K. Borges Flat 1, 50A, Cephas Av. London, UK, E1 4AR (+44) 07942084331 vini@ieee.org PRESENTATION Electronic engineer working as researcher at University of London. Doctorate in digital image/video
More informationWITH the rapid development of high-fidelity video services
896 IEEE SIGNAL PROCESSING LETTERS, VOL. 22, NO. 7, JULY 2015 An Efficient Frame-Content Based Intra Frame Rate Control for High Efficiency Video Coding Miaohui Wang, Student Member, IEEE, KingNgiNgan,
More informationImage Steganalysis: Challenges
Image Steganalysis: Challenges Jiwu Huang,China BUCHAREST 2017 Acknowledgement Members in my team Dr. Weiqi Luo and Dr. Fangjun Huang Sun Yat-sen Univ., China Dr. Bin Li and Dr. Shunquan Tan, Mr. Jishen
More informationTHE CAPABILITY to display a large number of gray
292 JOURNAL OF DISPLAY TECHNOLOGY, VOL. 2, NO. 3, SEPTEMBER 2006 Integer Wavelets for Displaying Gray Shades in RMS Responding Displays T. N. Ruckmongathan, U. Manasa, R. Nethravathi, and A. R. Shashidhara
More informationOptimization of memory based multiplication for LUT
Optimization of memory based multiplication for LUT V. Hari Krishna *, N.C Pant ** * Guru Nanak Institute of Technology, E.C.E Dept., Hyderabad, India ** Guru Nanak Institute of Technology, Prof & Head,
More informationA Novel Approach towards Video Compression for Mobile Internet using Transform Domain Technique
A Novel Approach towards Video Compression for Mobile Internet using Transform Domain Technique Dhaval R. Bhojani Research Scholar, Shri JJT University, Jhunjunu, Rajasthan, India Ved Vyas Dwivedi, PhD.
More informationFPGA Implementation of Convolutional Encoder And Hard Decision Viterbi Decoder
FPGA Implementation of Convolutional Encoder And Hard Decision Viterbi Decoder JTulasi, TVenkata Lakshmi & MKamaraju Department of Electronics and Communication Engineering, Gudlavalleru Engineering College,
More informationResearch on sampling of vibration signals based on compressed sensing
Research on sampling of vibration signals based on compressed sensing Hongchun Sun 1, Zhiyuan Wang 2, Yong Xu 3 School of Mechanical Engineering and Automation, Northeastern University, Shenyang, China
More informationH-Ternary Line Decoder for Digital Data Transmission: Circuit Design and Modelling
H-Ternary Line Decoder for Digital Data Transmission: Circuit Design and Modelling Abdullatif Glass and Bahman Ali Faculty of Engineering Ajman University of Science and Technology Al-Ain Campus, P.O.
More informationAlgorithmic Music Composition
Algorithmic Music Composition MUS-15 Jan Dreier July 6, 2015 1 Introduction The goal of algorithmic music composition is to automate the process of creating music. One wants to create pleasant music without
More informationLUT Optimization for Memory Based Computation using Modified OMS Technique
LUT Optimization for Memory Based Computation using Modified OMS Technique Indrajit Shankar Acharya & Ruhan Bevi Dept. of ECE, SRM University, Chennai, India E-mail : indrajitac123@gmail.com, ruhanmady@yahoo.co.in
More informationFig 1. Flow Chart for the Encoder
MATLAB Simulation of the DVB-S Channel Coding and Decoding Tejas S. Chavan, V. S. Jadhav MAEER S Maharashtra Institute of Technology, Kothrud, Pune, India Department of Electronics & Telecommunication,Pune
More informationFRAME RATE BLOCK SELECTION APPROACH BASED DIGITAL WATER MARKING FOR EFFICIENT VIDEO AUTHENTICATION USING NETWORK CONDITIONS
FRAME RATE BLOCK SELECTION APPROACH BASED DIGITAL WATER MARKING FOR EFFICIENT VIDEO AUTHENTICATION USING NETWORK CONDITIONS A. Kirthika 1 and A. Senthilkumar 2 1 Department of Electronics and Communication
More informationInternational Journal of Engineering Trends and Technology (IJETT) - Volume4 Issue8- August 2013
International Journal of Engineering Trends and Technology (IJETT) - Volume4 Issue8- August 2013 Design and Implementation of an Enhanced LUT System in Security Based Computation dama.dhanalakshmi 1, K.Annapurna
More informationUNIVERSAL SPATIAL UP-SCALER WITH NONLINEAR EDGE ENHANCEMENT
UNIVERSAL SPATIAL UP-SCALER WITH NONLINEAR EDGE ENHANCEMENT Stefan Schiemenz, Christian Hentschel Brandenburg University of Technology, Cottbus, Germany ABSTRACT Spatial image resizing is an important
More informationReview paper on study of various Interleavers and their significance
Review paper on study of various Interleavers and their significance Bobby Raje 1, Karuna Markam 2 1,2Department of Electronics, M.I.T.S, Gwalior, India ---------------------------------------------------------------------------------***------------------------------------------------------------------------------------
More informationFast MBAFF/PAFF Motion Estimation and Mode Decision Scheme for H.264
Fast MBAFF/PAFF Motion Estimation and Mode Decision Scheme for H.264 Ju-Heon Seo, Sang-Mi Kim, Jong-Ki Han, Nonmember Abstract-- In the H.264, MBAFF (Macroblock adaptive frame/field) and PAFF (Picture
More informationSudhanshu Gautam *1, Sarita Soni 2. M-Tech Computer Science, BBAU Central University, Lucknow, Uttar Pradesh, India
International Journal of Scientific Research in Computer Science, Engineering and Information Technology 2018 IJSRCSEIT Volume 3 Issue 3 ISSN : 2456-3307 Artificial Intelligence Techniques for Music Composition
More informationA Novel Turbo Codec Encoding and Decoding Mechanism
A Novel Turbo Codec Encoding and Decoding Mechanism Desai Feroz 1 1Desai Feroz, Knowledge Scientist, Dept. of Electronics Engineering, SciTech Patent Art Services Pvt Ltd, Telangana, India ---------------***---------------
More informationMATHEMATICAL APPROACH FOR RECOVERING ENCRYPTION KEY OF STREAM CIPHER SYSTEM
MATHEMATICAL APPROACH FOR RECOVERING ENCRYPTION KEY OF STREAM CIPHER SYSTEM Abdul Kareem Murhij Radhi College of Information Engineering, University of Nahrian,Baghdad- Iraq. Abstract Stream cipher system
More informationPermutation based speech scrambling for next generation mobile communication
Permutation based speech scrambling for next generation mobile communication Dhanya G #1, Dr. J. Jayakumari *2 # Research Scholar, ECE Department, Noorul Islam University, Kanyakumari, Tamilnadu 1 dhanyagnr@gmail.com
More informationSCALABLE video coding (SVC) is currently being developed
IEEE TRANSACTIONS ON CIRCUITS AND SYSTEMS FOR VIDEO TECHNOLOGY, VOL. 16, NO. 7, JULY 2006 889 Fast Mode Decision Algorithm for Inter-Frame Coding in Fully Scalable Video Coding He Li, Z. G. Li, Senior
More informationBasics of BISS scrambling. Newtec. Innovative solutions for satellite communications
Basics of BISS scrambling Contents Definition of scrambling BISS modes BISS mode 1 BISS mode E Calculation of encrypted session word Buried ID Injected ID Connection diagram Rate adaptation Back panel
More informationAvailable online at ScienceDirect. Procedia Computer Science 46 (2015 )
Available online at www.sciencedirect.com ScienceDirect Procedia Computer Science 46 (2015 ) 381 387 International Conference on Information and Communication Technologies (ICICT 2014) Music Information
More informationImplementation of BIST Test Generation Scheme based on Single and Programmable Twisted Ring Counters
IOSR Journal of Mechanical and Civil Engineering (IOSR-JMCE) e-issn: 2278-1684, p-issn: 2320-334X Implementation of BIST Test Generation Scheme based on Single and Programmable Twisted Ring Counters N.Dilip
More informationOutline. Why do we classify? Audio Classification
Outline Introduction Music Information Retrieval Classification Process Steps Pitch Histograms Multiple Pitch Detection Algorithm Musical Genre Classification Implementation Future Work Why do we classify
More informationPhysical Layer Built-in Security Enhancement of DS-CDMA Systems Using Secure Block Interleaving
transmitted signal. CDMA signals can easily be hidden within the noise floor, and it is impossible to recover the desired user s signal without knowing both the user s spreading code and scrambling sequence.
More informationAn FPGA Implementation of Shift Register Using Pulsed Latches
An FPGA Implementation of Shift Register Using Pulsed Latches Shiny Panimalar.S, T.Nisha Priscilla, Associate Professor, Department of ECE, MAMCET, Tiruchirappalli, India PG Scholar, Department of ECE,
More informationCrypto Key Generation From Selected Portion On An Image With CRT
Crypto Key Generation From Selected Portion On An Image With CRT Kalyanapu Srinivas 1, Dr. V. Janaki 2 1 Research Scholar, Department of Computer Science & Engineering, JNTU Hyderabad, Telangana. India
More informationTEST PATTERN GENERATION USING PSEUDORANDOM BIST
TEST PATTERN GENERATION USING PSEUDORANDOM BIST GaneshBabu.J 1, Radhika.P 2 PG Student [VLSI], Dept. of ECE, SRM University, Chennai, Tamilnadu, India 1 Assistant Professor [O.G], Dept. of ECE, SRM University,
More informationAvailable online at ScienceDirect. Procedia Technology 24 (2016 )
Available online at www.sciencedirect.com ScienceDirect Procedia Technology 24 (2016 ) 1155 1162 International Conference on Emerging Trends in Engineering, Science and Technology (ICETEST 2015) FPGA Implementation
More informationHow to Predict the Output of a Hardware Random Number Generator
How to Predict the Output of a Hardware Random Number Generator Markus Dichtl Siemens AG, Corporate Technology Markus.Dichtl@siemens.com Abstract. A hardware random number generator was described at CHES
More information116 Facta Universitatis ser.: Elect. and Energ. vol. 11, No.1 è1998è to use any kind of encrypted information or with not very pleased attitude of loc
FACTA UNIVERSITATIS èniçsè Series: Electronics and Energetics vol. 11, No.1 è1998è, 115-125 CRYPTOGRAPHY AND STEGANOGRAPHY OF VIDEO INFORMATION IN MODERN COMMUNICATIONS Zenon Hrytskiv, Sviatoslav Voloshynovskiy
More informationDual Frame Video Encoding with Feedback
Video Encoding with Feedback Athanasios Leontaris and Pamela C. Cosman Department of Electrical and Computer Engineering University of California, San Diego, La Jolla, CA 92093-0407 Email: pcosman,aleontar
More informationPower Problems in VLSI Circuit Testing
Power Problems in VLSI Circuit Testing Farhana Rashid and Vishwani D. Agrawal Auburn University Department of Electrical and Computer Engineering 200 Broun Hall, Auburn, AL 36849 USA fzr0001@tigermail.auburn.edu,
More informationAN IMPROVED ERROR CONCEALMENT STRATEGY DRIVEN BY SCENE MOTION PROPERTIES FOR H.264/AVC DECODERS
AN IMPROVED ERROR CONCEALMENT STRATEGY DRIVEN BY SCENE MOTION PROPERTIES FOR H.264/AVC DECODERS Susanna Spinsante, Ennio Gambi, Franco Chiaraluce Dipartimento di Elettronica, Intelligenza artificiale e
More informationDATA hiding technologies have been widely studied in
IEEE TRANSACTIONS ON CIRCUITS AND SYSTEMS FOR VIDEO TECHNOLOGY, VOL 18, NO 6, JUNE 2008 769 A Novel Look-Up Table Design Method for Data Hiding With Reduced Distortion Xiao-Ping Zhang, Senior Member, IEEE,
More informationConstruction of Cable Digital TV Head-end. Yang Zhang
Advanced Materials Research Online: 2014-05-21 ISSN: 1662-8985, Vol. 933, pp 682-686 doi:10.4028/www.scientific.net/amr.933.682 2014 Trans Tech Publications, Switzerland Construction of Cable Digital TV
More informationOperating Bio-Implantable Devices in Ultra-Low Power Error Correction Circuits: using optimized ACS Viterbi decoder
Operating Bio-Implantable Devices in Ultra-Low Power Error Correction Circuits: using optimized ACS Viterbi decoder Roshini R, Udhaya Kumar C, Muthumani D Abstract Although many different low-power Error
More informationCSE 166: Image Processing. Overview. Representing an image. What is an image? History. What is image processing? Today. Image Processing CSE 166
CSE 166: Image Processing Overview Image Processing CSE 166 Today Course overview Logistics Some mathematics MATLAB Lectures will be boardwork and slides Take written notes or take pictures of the board
More informationPractical Bit Error Rate Measurements on Fibre Optic Communications Links in Student Teaching Laboratories
Ref ETOP021 Practical Bit Error Rate Measurements on Fibre Optic Communications Links in Student Teaching Laboratories Douglas Walsh 1, David Moodie 1, Iain Mauchline 1, Steve Conner 1, Walter Johnstone
More informationUPDATE TO DOWNSTREAM FREQUENCY INTERLEAVING AND DE-INTERLEAVING FOR OFDM. Presenter: Rich Prodan
UPDATE TO DOWNSTREAM FREQUENCY INTERLEAVING AND DE-INTERLEAVING FOR OFDM Presenter: Rich Prodan 1 CURRENT FREQUENCY INTERLEAVER 2-D store 127 rows and K columns N I data subcarriers and scattered pilots
More informationMultiple Image Secret Sharing based on Linear System
Indian Journal of Science and Technology, Vol 10(33), 10.17485/ijst/2017/v10i33/113085, September 2017 ISSN (Print) : 0974-6846 ISSN (Online) : 0974-5645 Multiple Image Secret Sharing based on Linear System
More informationDESIGN and IMPLETATION of KEYSTREAM GENERATOR with IMPROVED SECURITY
DESIGN and IMPLETATION of KEYSTREAM GENERATOR with IMPROVED SECURITY Vijay Shankar Pendluri, Pankaj Gupta Wipro Technologies India vijay_shankarece@yahoo.com, pankaj_gupta96@yahoo.com Abstract - This paper
More informationDICOM medical image watermarking of ECG signals using EZW algorithm. A. Kannammal* and S. Subha Rani
126 Int. J. Medical Engineering and Informatics, Vol. 5, No. 2, 2013 DICOM medical image watermarking of ECG signals using EZW algorithm A. Kannammal* and S. Subha Rani ECE Department, PSG College of Technology,
More informationA New Compression Scheme for Color-Quantized Images
904 IEEE TRANSACTIONS ON CIRCUITS AND SYSTEMS FOR VIDEO TECHNOLOGY, VOL. 12, NO. 10, OCTOBER 2002 A New Compression Scheme for Color-Quantized Images Xin Chen, Sam Kwong, and Ju-fu Feng Abstract An efficient
More information