What is Steganography
|
|
- Kerry Terry
- 5 years ago
- Views:
Transcription
1 STEGANOGRAPHY
2 Outline Introduction Outline What is Steganography History Lesson Why is this important to Digital Forensics Steganography and Cryptography Variations Classifications of Steganography Inside Steganography How does suspects use steganography How does CF use knowledge of Steganography Detection programs and techniques Questions
3 What is Steganography What s Steganography? Steganography comes from the La>n & Greek Steganos (Greek) meaning Covered Graphy (La>n) meaning wri>ng or drawing Steganography is the science of hiding informa>on. (Kessler) Steganography is the art of concealing the existence of informa>on within seemingly innocuous carriers (Johnson) The Art & Science of using overt objects to create and exploit covert communica>ons. (Trawick)
4 History Lesson 1499 Trithemius-published Steganographia. Legendary tales of TaTooing WWI Use of invisible inks WWII Use of Micro dots
5 Why is this important to Digital Forensics Forensics Inves>gators looking for the Truth. Steganography gives users ability to hide the truth So its important to know Tac>cs, Techniques, and procedures suspects might use
6 Steganography and Cryptography Differences Cryptography hides the meaning of a message, the encrypted message is visible, you may know that communica>ons are taking place, but you can t read them without the proper key, BUT Steganography hides the fact that there is even a message being sent.
7 Steganography and Cryptography Similari>es Both provide confiden>al communica>ons between par>es Both require some prerequisite knowledge about the communica>ons What about message integrity?
8 Variations on Steganography
9 Variations Trojan Horses (yes or no)? Yes: uses covert channels Yes: hides one item inside another NO: Its not really communica>ons NO: Recipient not a willing party to the comms
10 Variations Covert Channels (yes or no)? Yes: Secret Communica>ons Yes: Hiding the signal in plain site or overtly Yes: Require pre-requisite knowledge NO: Normally not a message being sent, but a signal NO: Normally, message already conveyed, or is yet to be conveyed
11 Variations Easter Eggs (yes or no)? Yes: covert and overt channels Yes: Hiding the signal in plain site Yes: requires pre-requisite knowledge NO: Normally not a message, but a prize. NO: Intent & usage different, normally a program
12 Classifications of Steganography Inser>on Subs>tu>on Genera>on
13 Classifications of Steganography Inser>on Techniques Adds to beginning or ending of file In between BOF and EOF headers Prac>cally unlimited storage Does not affect the appearance of original File size changes propor>onately
14 Classifications of Steganography Subs>tu>on techniques Changes to Least Significant Bit (LSB) Limits to how much you can hide Can change the visual appearance
15 Classifications of Steganography Genera>on Techniques Uses Algorithm and Hidden file to generate new Unlimited storage Generates pictures such as fractals, sta>c or noise depending on algorithm used. Use may allow Steganography image to remain intact even aaer processing such as format change.
16 Inside Steganography Demonstrate Camouflage program Review MS PAINT Pro for pixel color changes Review MS Paint Pro for HISTOGRAM changes Example of impact of file size on image
17 Inside Steganography Demonstrate Camouflage program Inser>on based File size changes No apparent change to picture Any size into any size.
18 Inside Steganography Subs>tu>on Example Review MS PAINT pro for pixel color changes Review MS Paint pro for HISTOGRAM changes Example of impact of file size on image
19 How does suspects use steganography Terrorist are thought to use Web Images to transmit messages Commercial & Government users use it to communicate with employees and hide cri>cal data Use as a Dead-Drop so par>es don t know each other
20 How do we use knowledge of Steganography Know the capabili>es exist Know popular programs embed and detect Learn signs of possible use of Steganography
21 Detection programs and techniques X-steg- for JPG files windows GUI (OutGuess) Other tools for steg detec>on Current state of the art = $$$
22 Questions
23 References htp:// htp:// steganography htp:// Neil F. Johnson. Steganography. Technical Report. November IEEE Computer in 1998 Network based intrusion detec1on to detect steganographic communica1on channels - on the example of images, Hesse, D. DiTmann, J. Lang, A. AMSL Adv. Mul>media & Security Lab., OTo-von-Guericke Univ. of Magdeburg, Germany htp://
Keywords- Cryptography, Frame, Least Significant Bit, Pseudo Random Equations, Text, Video Image, Video Steganography.
International Journal of Scientific & Engineering Research, Volume 5, Issue 7, July-2014 164 High Security Video Steganography Putti DeepthiChandan, Dr. M. Narayana Abstract- Video Steganography is a technique
More informationImage Steganalysis: Challenges
Image Steganalysis: Challenges Jiwu Huang,China BUCHAREST 2017 Acknowledgement Members in my team Dr. Weiqi Luo and Dr. Fangjun Huang Sun Yat-sen Univ., China Dr. Bin Li and Dr. Shunquan Tan, Mr. Jishen
More informationWINGS TO YOUR THOUGHTS..
Review on Various Image Steganographic Techniques Amrit Preet Kaur 1, Gagandeep Singh 2 1 M.Tech Scholar, Chandigarh Engineering College, Department of CSE, Landran, India, kaur.amritpreet13@gmail 2 Assistant
More informationSteganographic Technique for Hiding Secret Audio in an Image
Steganographic Technique for Hiding Secret Audio in an Image 1 Aiswarya T, 2 Mansi Shah, 3 Aishwarya Talekar, 4 Pallavi Raut 1,2,3 UG Student, 4 Assistant Professor, 1,2,3,4 St John of Engineering & Management,
More informationP. Sanyasi Naidu* and Jagadish Gurrala**
I J C T A, 9(32), 2016, pp. 261-269 International Science Press ISSN: 0974-5572 A Study of Low Power Consumable Frameworks for Hiding Audio signals in Image Container Using Different Steganography techniques
More informationQuantitative Evaluation of Pairs and RS Steganalysis
Quantitative Evaluation of Pairs and RS Steganalysis Andrew Ker Oxford University Computing Laboratory adk@comlab.ox.ac.uk Royal Society University Research Fellow / Junior Research Fellow at University
More informationCHAPTER 8 CONCLUSION AND FUTURE SCOPE
124 CHAPTER 8 CONCLUSION AND FUTURE SCOPE Data hiding is becoming one of the most rapidly advancing techniques the field of research especially with increase in technological advancements in internet and
More informationReducing DDR Latency for Embedded Image Steganography
Reducing DDR Latency for Embedded Image Steganography J Haralambides and L Bijaminas Department of Math and Computer Science, Barry University, Miami Shores, FL, USA Abstract - Image steganography is the
More informationA Robust Method for Image Steganography based on Chaos Theory
A Robust Method for Image Steganography based on Chaos Theory Anoop Kumar Tiwari Research Scholar Dept of Computer Science Banaras Hindu University Ajay Rajpoot, Ex-M.Sc. Student Dept of Computer Science
More informationNUMB3RS Activity: Coded Messages. Episode: The Mole
Teacher Page 1 : Coded Messages Topic: Inverse Matrices Grade Level: 10-11 Objective: Students will learn how to apply inverse matrix multiplication to the coding of values. Time: 15 minutes Materials:
More informationA Layered Approach for Watermarking In Images Based On Huffman Coding
A Layered Approach for Watermarking In Images Based On Huffman Coding D. Lalitha Bhaskari 1 P. S. Avadhani 1 M. Viswanath 2 1 Department of Computer Science & Systems Engineering, Andhra University, 2
More informationLFSR Based Watermark and Address Generator for Digital Image Watermarking SRAM
LFSR Based Watermark and Address Generator for igital Image Watermarking SRAM S. Bhargav Kumar #1, S.Jagadeesh *2, r.m.ashok #3 #1 P.G. Student, M.Tech. (VLSI), epartment of Electronics and Communication
More informationSteganography in Digital Media
Steganography in Digital Media Steganography, the art of hiding of information in apparently innocuous objects or images, is a field with a rich heritage, and an area of rapid current development. This
More informationWATERMARKING USING DECIMAL SEQUENCES. Navneet Mandhani and Subhash Kak
Cryptologia, volume 29, January 2005 WATERMARKING USING DECIMAL SEQUENCES Navneet Mandhani and Subhash Kak ADDRESS: Department of Electrical and Computer Engineering, Louisiana State University, Baton
More information1 Introduction Steganography and Steganalysis as Empirical Sciences Objective and Approach Outline... 4
Contents 1 Introduction... 1 1.1 Steganography and Steganalysis as Empirical Sciences... 1 1.2 Objective and Approach... 2 1.3 Outline... 4 Part I Background and Advances in Theory 2 Principles of Modern
More informationThe Web Cryptology Game CODEBREAKERS.EU edition 2015
Lecture 2, in which we look at the main methods of concealing information. We will learn that what used to be an unbreakable cipher can today be compared to a child play. We will also see how this children
More informationNomenclators. Nomenclator Example. Alberti s Cipher Disk. Early code/cipher combination, popular form 1400s-1800s. Philip of Spain (1589, see Kahn):
Nomenclators Early code/cipher combination, popular form 1400s-1800s. Philip of Spain (1589, see Kahn): LO = Spain POM = King of Spain 64 = confederation overlined two-digit groups = null + substitution
More informationChannel models for high-capacity information hiding in images
Channel models for high-capacity information hiding in images Johann A. Briffa a, Manohar Das b School of Engineering and Computer Science Oakland University, Rochester MI 48309 ABSTRACT We consider the
More informationAn Introduction to Cryptography
An Introduction to http://www.southernct.edu/~fields/ Terminology is the study of secret writing. This is the only branch of mathematics to be designated by the U.S. government as export-controlled. Cryptographic
More information116 Facta Universitatis ser.: Elect. and Energ. vol. 11, No.1 è1998è to use any kind of encrypted information or with not very pleased attitude of loc
FACTA UNIVERSITATIS èniçsè Series: Electronics and Energetics vol. 11, No.1 è1998è, 115-125 CRYPTOGRAPHY AND STEGANOGRAPHY OF VIDEO INFORMATION IN MODERN COMMUNICATIONS Zenon Hrytskiv, Sviatoslav Voloshynovskiy
More informationThe APA style format, is used for documenta6on, by the social sciences. Its emphasis is on date or when a par6cular work was created.
The APA style format, is used for documenta6on, by the social sciences. Its emphasis is on date or when a par6cular work was created. whereas; The MLA style format, is used for documenta6on, by the humani6es.
More informationWhat is TEMPEST Chapter 1
TEMPEST Engineering and Hardware Design Dr. Bruce C. Gabrielson, NCE 1998 What is TEMPEST Chapter 1 Introduction This text presents an overall introduction to classical information theory, basic communications
More informationTowards Design and Implementation of Discrete Transform Image Coding based on G-Lets and Z- transform
Towards Design and Implementation of Discrete Transform Image Coding based on G-Lets and Z- transform Intermediate report for the year 2013 Madhumita Sengupta, J. K. Mandal Computer Science & Engineering,
More informationWavelet transform based steganography technique to hide audio signals in image.
Available online at www.sciencedirect.com ScienceDirect Procedia Computer Science 47 (2015 ) 272 281 Wavelet transform based steganography technique to hide audio signals in image. Hemalatha S a,1, U.
More informationAdvanced Statistical Steganalysis
Information Security and Cryptography Advanced Statistical Steganalysis Bearbeitet von Rainer Böhme 1. Auflage 2010. Buch. xvi, 288 S. Hardcover ISBN 978 3 642 14312 0 Format (B x L): 15,5 x 23,5 cm Gewicht:
More informationCapacity is the Wrong Paradigm*
Capacity is the Wrong Paradigm* Ira S. Moskowitz Center for High Assurance Computer Systems-5540 Naval Research Laboratory Washington, DC 20375 LiWu Chang Center for High Assurance Computer Systems-5540
More informationTHE PREVALENCE of multimedia data in our electronic
IEEE TRANSACTIONS ON IMAGE PROCESSING, VOL. 8, NO. 8, AUGUST 1999 1075 Spread Spectrum Image Steganography Lisa M. Marvel, Member, IEEE, Charles G. Boncelet, Jr., Member, IEEE, and Charles T. Retter, Member,
More informationOn the Limits of Perfect Security for Steganographic System
IJCSI International Journal of Computer Science Issues, Vol. 1, Issue 4, No 1, July 213 ISSN (Print): 1694-814 ISSN (Online): 1694-784 www.ijcsi.org 121 On the Limits of Perfect Security for Steganographic
More informationBar Codes to the Rescue!
Fighting Computer Illiteracy or How Can We Teach Machines to Read Spring 2013 ITS102.23 - C 1 Bar Codes to the Rescue! If it is hard to teach computers how to read ordinary alphabets, create a writing
More informationSIX STEPS TO BUYING DATA LOSS PREVENTION PRODUCTS
E-Guide SIX STEPS TO BUYING DATA LOSS PREVENTION PRODUCTS SearchSecurity D ata loss prevention (DLP) allow organizations to protect sensitive data that could cause grave harm if stolen or exposed. In this
More informationPCA Encrypted Short Acoustic Data Inculcated in Digital Color Images
INTERNATIONAL JOURNAL OF COMPUTERS COMMUNICATIONS & CONTROL ISSN 1841-9836, 10(5):678-685, October, 2015. in Digital Color Images S.H. Karamchandani, K.J. Gandhi, S.R. Gosalia, V.K. Madan, S.N. Merchant,
More informationAccess Fee Charging System for Information Contents SharingThrough P2P Communications
Access Fee Charging System for Information Contents SharingThrough P2P Communications Kohei Arai Graduate School of Science and Engineering Saga University Saga City, Japan Abstract Charge system for information
More informationPA Substitution Cipher
Anuj Kumar 1 PA Substitution Cipher Ankur Kumar Varshney 2 Pankaj Kumar 3 1 M.Tech*, Computer Science & Engineering IEC CET, Greater Noida, (U.P.) India 2 M.Tech*, Computer Science & Engineering B.S.A
More information[Thu Ha* et al., 5(8): August, 2016] ISSN: IC Value: 3.00 Impact Factor: 4.116
IJESRT INTERNATIONAL JOURNAL OF ENGINEERING SCIENCES & RESEARCH TECHNOLOGY A NEW SYSTEM FOR INSERTING A MARK PATTERN INTO H264 VIDEO Tran Thu Ha *, Tran Quang Duc and Tran Minh Son * Ho Chi Minh City University
More information1843 First facsimile patent (England, nº 9745) registered by Mr. Alexander Bain telephone has not been invented until 1876!
FACSIMILE: CODING AND TRANSMISSION OF BILEVEL IMAGES Fernando Pereira Instituto Superior Técnico Facsimile: Objective Efficient representation of bilevel images for transmission using telephone and data
More informationCONSTRUCTION OF LOW-DISTORTED MESSAGE-RICH VIDEOS FOR PERVASIVE COMMUNICATION
2016 International Computer Symposium CONSTRUCTION OF LOW-DISTORTED MESSAGE-RICH VIDEOS FOR PERVASIVE COMMUNICATION 1 Zhen-Yu You ( ), 2 Yu-Shiuan Tsai ( ) and 3 Wen-Hsiang Tsai ( ) 1 Institute of Information
More informationUsing Raw Speech as a Watermark, Does it work?
Using Raw Speech as a Watermark, Does it work? P. Nintanavongsa and T. Amomraksa Multimedia Communications Laboratory, Department of Computer Engineering, King Mongkut's University of Technology Thonburi,
More informationFigure 2: Original and PAM modulated image. Figure 4: Original image.
Figure 2: Original and PAM modulated image. Figure 4: Original image. An image can be represented as a 1D signal by replacing all the rows as one row. This gives us our image as a 1D signal. Suppose x(t)
More informationISSN (Print) Original Research Article. Coimbatore, Tamil Nadu, India
Scholars Journal of Engineering and Technology (SJET) Sch. J. Eng. Tech., 016; 4(1):1-5 Scholars Academic and Scientific Publisher (An International Publisher for Academic and Scientific Resources) www.saspublisher.com
More informationComunicação de Áudio e Vídeo, Fernando Pereira
FACSIMILE: CODING AND TRANSMISSION OF BILEVEL IMAGES Fernando Pereira Instituto Superior Técnico Facsimile: Objective Efficient representation of bilevel images for transmission using telephone and data
More informationFACSIMILE: CODING AND TRANSMISSION OF BILEVEL IMAGES
FACSIMILE: CODING AND TRANSMISSION OF BILEVEL IMAGES Fernando Pereira Instituto Superior TécnicoT Facsimile OBJECTIVE Efficient representation of bilevel images for transmission using telephone and data
More informationLossless and Reversible Data Hiding In Encrypted Pictures by Allocating Memory Some Time Recently Encryption through Security Keys
Lossless and Reversible Data Hiding In Encrypted Pictures by Allocating Memory Some Time Recently Encryption through Security Keys Noor Mohammed S, 2 Ms. Sathyabama, 1 CSE ME, 2 Assistant Professor, Department
More informationFormatting a Document in Word using MLA style
Formatting a Document in Word using MLA style 1. Using MS Word - various versions 2. Using MLA Handbook for Writers of Research Papers 7 th ed. (2009) 3. The 7 th ed. is also in Term Paper Assistance section
More informationNAPIER. University School of Engineering. Advanced Communication Systems Module: SE Television Broadcast Signal.
NAPIER. University School of Engineering Television Broadcast Signal. luminance colour channel channel distance sound signal By Klaus Jørgensen Napier No. 04007824 Teacher Ian Mackenzie Abstract Klaus
More informationSCode V3.5.1 (SP-501 and MP-9200) Digital Video Network Surveillance System
V3.5.1 (SP-501 and MP-9200) Digital Video Network Surveillance System Core Technologies Image Compression MPEG4. It supports high compression rate with good image quality and reduces the requirement of
More informationLe go My Stego. Steganography in the post Web 2.0 World. James Shewmaker 2008 Defcon 0x10
Le go My Stego Steganography in the post Web 2.0 World James Shewmaker 2008 Defcon 0x10 Today s Agenda Today s Agenda Background: Classical Stego Digital Stego Techniques Extending Stego concepts Surviving
More informationMultiple Image Secret Sharing based on Linear System
Indian Journal of Science and Technology, Vol 10(33), 10.17485/ijst/2017/v10i33/113085, September 2017 ISSN (Print) : 0974-6846 ISSN (Online) : 0974-5645 Multiple Image Secret Sharing based on Linear System
More informationBook Review: Digital Crime and Forensic Science in Cyberspace
Publications 2006 Book Review: Digital Crime and Forensic Science in Cyberspace Gary C. Kessler Champlain College - Burlington, kessleg1@erau.edu Follow this and additional works at: https://commons.erau.edu/publication
More informationLarge Amount of Data GIF Image Encryption with High Security using Path-based Animation
Large Amount of Data GIF Image Encryption with High Security using Path-based Animation Hind Rostom Mohammed University of Kufa College of Mathematical &Computer Sciences/Computer Dept. hind_restem@yahoo.com.
More information1. Presentation of the software. 2. The different screens of the software. 3. About sounds in Imagemo. 1. Presentation of the software
Imagemo 1.0 Documentation 1. Presentation of the software. 2. The different screens of the software. 3. About sounds in Imagemo. 1. Presentation of the software Imagemo is a software which helps to learn
More informationSSTV Transmission Methodology
SSTV Transmission Methodology Slow Scan TV (SSTV) is a video mode which uses analog frequency modulation. Every different brightness in the image is assigned a different audio frequency. The modulating
More informationUpdate to 8 June 2011 Press Release
19 August 2011 Update to 8 June 2011 Press Release In June 2011, the National Security Agency (NSA) declassified and released to the National Archives and Records Administration (NARA) over 50,000 pages
More informationSELSE ASAR: Applica+on-Specific Approximate Recovery to Mi+gate Hardware Variability. Presenter: Manish Gupta
SELSE 2017 ASAR: Applica+on-Specific Approximate Recovery to Mi+gate Hardware Variability Presenter: Manish Gupta Collaborators: Abbas Rahimi, Daniel Lowell, John Kalama9anos, Advisors: Dean Tullsen, Rajesh
More informationHomer / The Odyssey By Homer, Ian McKellen READ ONLINE
Homer / The Odyssey By Homer, Ian McKellen READ ONLINE Timelines of Homer's Odyssey Chronological Order: Odyssey Order: Odysseus and his men raid the Cicones. Council of the gods. Athena bargains with
More informationDICOM medical image watermarking of ECG signals using EZW algorithm. A. Kannammal* and S. Subha Rani
126 Int. J. Medical Engineering and Informatics, Vol. 5, No. 2, 2013 DICOM medical image watermarking of ECG signals using EZW algorithm A. Kannammal* and S. Subha Rani ECE Department, PSG College of Technology,
More informationATSC Standard: Video Watermark Emission (A/335)
ATSC Standard: Video Watermark Emission (A/335) Doc. A/335:2016 20 September 2016 Advanced Television Systems Committee 1776 K Street, N.W. Washington, D.C. 20006 202-872-9160 i The Advanced Television
More informationHDBaseT TM Long Reach Mode. White Paper v1.0. Lightware Visual Engineering. Long Reach Mode White Paper
HDBaseT TM Long Reach Mode White Paper v1.0 Lightware Visual Engineering Theory of Operation HDBaseT uses an asymmetric method to send audio, video, Ethernet, USB, controls and power from source to sink,
More informationRole of Color Processing in Display
Advances in Computational Sciences and Technology ISSN 0973-6107 Volume 10, Number 7 (2017) pp. 2183-2190 Research India Publications http://www.ripublication.com Role of Color Processing in Display Mani
More informationEddyCation - the All-Digital Eddy Current Tool for Education and Innovation
EddyCation - the All-Digital Eddy Current Tool for Education and Innovation G. Mook, J. Simonin Otto-von-Guericke-University Magdeburg, Institute for Materials and Joining Technology ABSTRACT: The paper
More informationEddy current tools for education and innovation
17th World Conference on Nondestructive Testing, 25-28 Oct 2008, Shanghai, China Eddy current tools for education and innovation Gerhard MOOK, Jouri SIMONIN Institute of Materials and Joining Technology,
More information8. Schelling's Segrega0on Model
8. Schelling's Segrega0on Model Modelling Social Interac0on in Informa0on systems h9p://davidhales.com/msiis David Hales, University of Szeged dave@davidhales.com Schelling s segrega0on model Seminal Agent
More informationAcoustic Scene Classification
Acoustic Scene Classification Marc-Christoph Gerasch Seminar Topics in Computer Music - Acoustic Scene Classification 6/24/2015 1 Outline Acoustic Scene Classification - definition History and state of
More informationGetting Started. Connect green audio output of SpikerBox/SpikerShield using green cable to your headphones input on iphone/ipad.
Getting Started First thing you should do is to connect your iphone or ipad to SpikerBox with a green smartphone cable. Green cable comes with designators on each end of the cable ( Smartphone and SpikerBox
More informationISO Digital Forensics- Video Analysis
ISO 17025 Digital Forensics- Video Analysis From capture to court: the implications of ISO 17025 on video investigations (V1) S. Doyle Introduction In 2014 the UK Forensic Regulator produced the Codes
More informationGetting the MOST out of JT65B on 2m EME Frequency Stability of the RX/TX By: Scott Tilley, VE7TIL
Getting the MOST out of JT65B on 2m EME Frequency Stability of the RX/TX By: Scott Tilley, VE7TIL Background JT65B uses the FFT algorithm to locate the individual 63 bauds in discreet bins of the received
More informationAPPLICATIONS OF DIGITAL IMAGE ENHANCEMENT TECHNIQUES FOR IMPROVED
APPLICATIONS OF DIGITAL IMAGE ENHANCEMENT TECHNIQUES FOR IMPROVED ULTRASONIC IMAGING OF DEFECTS IN COMPOSITE MATERIALS Brian G. Frock and Richard W. Martin University of Dayton Research Institute Dayton,
More informationKey-based scrambling for secure image communication
University of Wollongong Research Online Faculty of Engineering and Information Sciences - Papers: Part A Faculty of Engineering and Information Sciences 2012 Key-based scrambling for secure image communication
More informationUsability tes+ng. User sa+sfac+on ques+onnaires & interviews are used to elicit opinions. Quan+ta+ve & qualita+ve data. User-Centred Design 1
Usability tes+ng Controlled by the evaluator Record typical users performance on typical tasks Users are monitored, recorded on video & their key presses are logged Output: quan+ta+ve & (qualita+ve) data
More informationSCode V3.5.1 (SP-601 and MP-6010) Digital Video Network Surveillance System
V3.5.1 (SP-601 and MP-6010) Digital Video Network Surveillance System Core Technologies Image Compression MPEG4. It supports high compression rate with good image quality and reduces the requirement of
More informationCri$cal Theory of Interna$onal Rela$ons
Cri$cal Theory of Interna$onal Rela$ons Two kinds of theory Problem solving theory X Cri$cal theory Understand, interpret X Transform Robert Cox: All theore$cal perspec$ves sustain the interest of certain
More informationThird Wave: Television ( )
Third Wave: Television (1950-2000) Television, the third wave, is the optical medium that comes into the home. If cinema is the urban, modern medium, television is the suburban, postmodern medium. We will
More informationTHE HEROIC AGE OF EXPLORATION. Sample file
POLAR This Enrichment4You E-guide gives you: *A Brief History about mystery stories *Suggestions on how create a Polar Mystery Box based on the Polar Exploration series ENRICHMENT4YOU Published by Henrich
More information(12) (10) Patent No.: US 7,197,164 B2. Levy (45) Date of Patent: Mar. 27, 2007
United States Patent US007 1971 64B2 (12) () Patent No.: Levy (45) Date of Patent: Mar. 27, 2007 (54) TIME-VARYING VIDEO WATERMARK 5,9,044 A 6/1999 Gardos et al.... 382,236 5,9,377 A 7/1999 Powell et al.......
More informationResearch Topic. Error Concealment Techniques in H.264/AVC for Wireless Video Transmission in Mobile Networks
Research Topic Error Concealment Techniques in H.264/AVC for Wireless Video Transmission in Mobile Networks July 22 nd 2008 Vineeth Shetty Kolkeri EE Graduate,UTA 1 Outline 2. Introduction 3. Error control
More informationSpatial Error Concealment Technique for Losslessly Compressed Images Using Data Hiding in Error-Prone Channels
168 JOURNAL OF COMMUNICATIONS AND NETWORKS, VOL. 12, NO. 2, APRIL 2010 Spatial Error Concealment Technique for Losslessly Compressed Images Using Data Hiding in Error-Prone Channels Kyung-Su Kim, Hae-Yeoun
More informationR&S NESTOR-FOR Alibi Verification
Application Brochure Version 01.00 R&S NESTOR-FOR Alibi Verification NESTOR-FOR_app-bro_en_5215-5888-92_v0100.indd 1 22.03.2018 15:50:04 Contents This application brochure describes the procedure for surveying
More informationABB EQmatic Energy Analyzer, M-Bus QA/S , 2CDG110226R0011, QA/S , 2CDG110227R0011
Technical data 2CDC512091D0201 ABB EQmatic Description of product QA/S 3.xx.1 are modular DIN Rail components (MDRC) Pro M design for installation in distribution boards on a 35 mm mounting rail. They
More informationParanoia. Implementation and Testing For. U-S-E CS169 Software Engineering Dec Prepared by:
Implementation and Testing For Paranoia U-S-E CS169 Software Engineering Dec 2 2003 Prepared by: BERDAHL,EDGAR CHUNG,SANG GONG,GARY LE,TAM LEE, JOON YUL LI, SHENG MOZAFFARIAN,BEHRAD MURRAY,JASON NGUYEN,
More informationA Hybrid Approach for Information Hiding and Encryption using Multiple LSB s Algorithms
A Hybrid Approach for Information Hiding and Encryption using Multiple LSB s Algorithms H.B.Kekre 1, Tanuja Sarode 2 and Pallavi Halarnkar 3 1 Senior Professor, MPSTME, NMIMS University, Mumbai 2 Associate
More informationMuscle Sensor KI 2 Instructions
Muscle Sensor KI 2 Instructions Overview This KI pre-work will involve two sections. Section A covers data collection and section B has the specific problems to solve. For the problems section, only answer
More informationCS408 Cryptography & Internet Security
CS408 Cryptography & Internet Security Lecture 4: Rotor Machines Enigma Reza Curtmola Department of Computer Science / NJIT How to move from pencil and paper to more automatic ways of encrypting and decrypting?
More informationImplementation and performance analysis of convolution error correcting codes with code rate=1/2.
2016 International Conference on Micro-Electronics and Telecommunication Engineering Implementation and performance analysis of convolution error correcting codes with code rate=1/2. Neha Faculty of engineering
More informationMotion Video Compression
7 Motion Video Compression 7.1 Motion video Motion video contains massive amounts of redundant information. This is because each image has redundant information and also because there are very few changes
More informationFundamentals of Multimedia. Lecture 3 Color in Image & Video
Fundamentals of Multimedia Lecture 3 Color in Image & Video Mahmoud El-Gayyar elgayyar@ci.suez.edu.eg Mahmoud El-Gayyar / Fundamentals of Multimedia 1 Black & white imags Outcomes of Lecture 2 1 bit images,
More informationUpdates to the Form and Filing System
FCC Form 481 Updates to the Form and Filing System Program Year 2016 High Cost Program FCC Form 481 1 Welcome Housekeeping Use the Audio section of your control panel to select an audio source and connect
More informationMicrobolometer based infrared cameras PYROVIEW with Fast Ethernet interface
DIAS Infrared GmbH Publications No. 19 1 Microbolometer based infrared cameras PYROVIEW with Fast Ethernet interface Uwe Hoffmann 1, Stephan Böhmer 2, Helmut Budzier 1,2, Thomas Reichardt 1, Jens Vollheim
More informationCRYPTOGRAPHY. Sharafat Ibn Mollah Mosharraf TOUCH-N-PASS EXAM CRAM GUIDE SERIES. Special Edition for CSEDU. Students CSE, DU )
Special Edition for CSEDU Students TOUCH-N-PASS EXAM CRAM GUIDE SERIES CRYPTOGRAPHY Prepared By Sharafat Ibn Mollah Mosharraf CSE, DU 12 th Batch (2005 2005-2006 2006) Table of Contents CHAPTER 1: INTRODUCTION
More informationBreaking the Enigma. Dmitri Gabbasov. June 2, 2015
Breaking the Enigma Dmitri Gabbasov June 2, 2015 1 Introduction Enigma was an electro-mechanical machine that was used before and during the World War II by Germany to encrypt and decrypt secret messages.
More informationMoving Steganography and Steganalysis from the Laboratory into the Real World
Moving Steganography and Steganalysis from the Laboratory into the Real World Andrew D. Ker Dept. of Computer Science University of Oxford Oxford OX1 3QD, UK adk@cs.ox.ac.uk Rémi Cogranne LM2S - UMR STMR
More informationBBM 413 Fundamentals of Image Processing Dec. 11, Erkut Erdem Dept. of Computer Engineering Hacettepe University. Segmentation Part 1
BBM 413 Fundamentals of Image Processing Dec. 11, 2012 Erkut Erdem Dept. of Computer Engineering Hacettepe University Segmentation Part 1 Image segmentation Goal: identify groups of pixels that go together
More informationInside Digital Design Accompany Lab Manual
1 Inside Digital Design, Accompany Lab Manual Inside Digital Design Accompany Lab Manual Simulation Prototyping Synthesis and Post Synthesis Name- Roll Number- Total/Obtained Marks- Instructor Signature-
More informationHandwriting Analysis, Forgery, and Counterfeiting. Forensic Science Chapter 10
Handwriting Analysis, Forgery, and Counterfeiting Forensic Science Chapter 10 Introduction Document analysis examination and comparison of questioned documents with known material. Experts establish the
More informationColor Correction in Final Cut Studio Introduction to Color
Color Correction in Final Cut Studio Introduction to Color Part 1: Getting Started with Color Part 2: Managing and Applying Grades upart 3: Using the Scopes and Auto Balanceo Part 4: Copying from One Clip
More informationMEDIA HISTORIES Winter 2014 DESMA 8 Media History LEC 6 Dr. Peter Lunenfeld
MEDIA HISTORIES 1850-2050 Winter 2014 DESMA 8 Media History LEC 6 Dr. Peter Lunenfeld [lunenfeld@ucla.edu] Third Wave: Television (1950-2000) Television, the third wave, is the optical medium that comes
More informationGetting started with Spike Recorder on PC/Mac/Linux
Getting started with Spike Recorder on PC/Mac/Linux You can connect your SpikerBox to your computer using either the blue laptop cable, or the green smartphone cable. How do I connect SpikerBox to computer
More informationSpecifications SMART Board 6075 interactive flat panel with iq Model SPNL-6275
Specifications SMART Board 6075 interactive flat panel with iq Model SPNL-6275 Overview The SMART Board 6075 interactive flat panel with iq is the hub of your classroom. iq technology connects devices,
More informationMoving Steganography and Steganalysis from the Laboratory into the Real World
Moving Steganography and Steganalysis from the Laboratory into the Real World Andrew Ker, Patrick Bas, Rainer Böhme, Rémi Cogranne, Scott Craver, Tomáš Filler, Jessica Fridrich, Tomas Pevny To cite this
More informationLecture 18: Exam Review
Lecture 18: Exam Review The Digital World of Multimedia Prof. Mari Ostendorf Announcements HW5 due today, Lab5 due next week Lab4: Printer should be working soon. Exam: Friday, Feb 22 Review in class today
More informationHow to Categorize Risk in IoT
How to Categorize Risk in IoT Defining use cases for IoT deployments lays the foundation for an end-to-end cybersecurity strategy that cuts across a broad and ever-changing threat landscape 2 Overview
More informationSenior Design Project: Blind Transmitter
Senior Design Project: Blind Transmitter Marvin Lam Mamadou Sall Ramtin Malool March 19, 2007 As the technology industry progresses we cannot help but to note that products are becoming both smaller and
More information