What is Steganography

Size: px
Start display at page:

Download "What is Steganography"

Transcription

1 STEGANOGRAPHY

2 Outline Introduction Outline What is Steganography History Lesson Why is this important to Digital Forensics Steganography and Cryptography Variations Classifications of Steganography Inside Steganography How does suspects use steganography How does CF use knowledge of Steganography Detection programs and techniques Questions

3 What is Steganography What s Steganography? Steganography comes from the La>n & Greek Steganos (Greek) meaning Covered Graphy (La>n) meaning wri>ng or drawing Steganography is the science of hiding informa>on. (Kessler) Steganography is the art of concealing the existence of informa>on within seemingly innocuous carriers (Johnson) The Art & Science of using overt objects to create and exploit covert communica>ons. (Trawick)

4 History Lesson 1499 Trithemius-published Steganographia. Legendary tales of TaTooing WWI Use of invisible inks WWII Use of Micro dots

5 Why is this important to Digital Forensics Forensics Inves>gators looking for the Truth. Steganography gives users ability to hide the truth So its important to know Tac>cs, Techniques, and procedures suspects might use

6 Steganography and Cryptography Differences Cryptography hides the meaning of a message, the encrypted message is visible, you may know that communica>ons are taking place, but you can t read them without the proper key, BUT Steganography hides the fact that there is even a message being sent.

7 Steganography and Cryptography Similari>es Both provide confiden>al communica>ons between par>es Both require some prerequisite knowledge about the communica>ons What about message integrity?

8 Variations on Steganography

9 Variations Trojan Horses (yes or no)? Yes: uses covert channels Yes: hides one item inside another NO: Its not really communica>ons NO: Recipient not a willing party to the comms

10 Variations Covert Channels (yes or no)? Yes: Secret Communica>ons Yes: Hiding the signal in plain site or overtly Yes: Require pre-requisite knowledge NO: Normally not a message being sent, but a signal NO: Normally, message already conveyed, or is yet to be conveyed

11 Variations Easter Eggs (yes or no)? Yes: covert and overt channels Yes: Hiding the signal in plain site Yes: requires pre-requisite knowledge NO: Normally not a message, but a prize. NO: Intent & usage different, normally a program

12 Classifications of Steganography Inser>on Subs>tu>on Genera>on

13 Classifications of Steganography Inser>on Techniques Adds to beginning or ending of file In between BOF and EOF headers Prac>cally unlimited storage Does not affect the appearance of original File size changes propor>onately

14 Classifications of Steganography Subs>tu>on techniques Changes to Least Significant Bit (LSB) Limits to how much you can hide Can change the visual appearance

15 Classifications of Steganography Genera>on Techniques Uses Algorithm and Hidden file to generate new Unlimited storage Generates pictures such as fractals, sta>c or noise depending on algorithm used. Use may allow Steganography image to remain intact even aaer processing such as format change.

16 Inside Steganography Demonstrate Camouflage program Review MS PAINT Pro for pixel color changes Review MS Paint Pro for HISTOGRAM changes Example of impact of file size on image

17 Inside Steganography Demonstrate Camouflage program Inser>on based File size changes No apparent change to picture Any size into any size.

18 Inside Steganography Subs>tu>on Example Review MS PAINT pro for pixel color changes Review MS Paint pro for HISTOGRAM changes Example of impact of file size on image

19 How does suspects use steganography Terrorist are thought to use Web Images to transmit messages Commercial & Government users use it to communicate with employees and hide cri>cal data Use as a Dead-Drop so par>es don t know each other

20 How do we use knowledge of Steganography Know the capabili>es exist Know popular programs embed and detect Learn signs of possible use of Steganography

21 Detection programs and techniques X-steg- for JPG files windows GUI (OutGuess) Other tools for steg detec>on Current state of the art = $$$

22 Questions

23 References htp:// htp:// steganography htp:// Neil F. Johnson. Steganography. Technical Report. November IEEE Computer in 1998 Network based intrusion detec1on to detect steganographic communica1on channels - on the example of images, Hesse, D. DiTmann, J. Lang, A. AMSL Adv. Mul>media & Security Lab., OTo-von-Guericke Univ. of Magdeburg, Germany htp://

Keywords- Cryptography, Frame, Least Significant Bit, Pseudo Random Equations, Text, Video Image, Video Steganography.

Keywords- Cryptography, Frame, Least Significant Bit, Pseudo Random Equations, Text, Video Image, Video Steganography. International Journal of Scientific & Engineering Research, Volume 5, Issue 7, July-2014 164 High Security Video Steganography Putti DeepthiChandan, Dr. M. Narayana Abstract- Video Steganography is a technique

More information

Image Steganalysis: Challenges

Image Steganalysis: Challenges Image Steganalysis: Challenges Jiwu Huang,China BUCHAREST 2017 Acknowledgement Members in my team Dr. Weiqi Luo and Dr. Fangjun Huang Sun Yat-sen Univ., China Dr. Bin Li and Dr. Shunquan Tan, Mr. Jishen

More information

WINGS TO YOUR THOUGHTS..

WINGS TO YOUR THOUGHTS.. Review on Various Image Steganographic Techniques Amrit Preet Kaur 1, Gagandeep Singh 2 1 M.Tech Scholar, Chandigarh Engineering College, Department of CSE, Landran, India, kaur.amritpreet13@gmail 2 Assistant

More information

Steganographic Technique for Hiding Secret Audio in an Image

Steganographic Technique for Hiding Secret Audio in an Image Steganographic Technique for Hiding Secret Audio in an Image 1 Aiswarya T, 2 Mansi Shah, 3 Aishwarya Talekar, 4 Pallavi Raut 1,2,3 UG Student, 4 Assistant Professor, 1,2,3,4 St John of Engineering & Management,

More information

P. Sanyasi Naidu* and Jagadish Gurrala**

P. Sanyasi Naidu* and Jagadish Gurrala** I J C T A, 9(32), 2016, pp. 261-269 International Science Press ISSN: 0974-5572 A Study of Low Power Consumable Frameworks for Hiding Audio signals in Image Container Using Different Steganography techniques

More information

Quantitative Evaluation of Pairs and RS Steganalysis

Quantitative Evaluation of Pairs and RS Steganalysis Quantitative Evaluation of Pairs and RS Steganalysis Andrew Ker Oxford University Computing Laboratory adk@comlab.ox.ac.uk Royal Society University Research Fellow / Junior Research Fellow at University

More information

CHAPTER 8 CONCLUSION AND FUTURE SCOPE

CHAPTER 8 CONCLUSION AND FUTURE SCOPE 124 CHAPTER 8 CONCLUSION AND FUTURE SCOPE Data hiding is becoming one of the most rapidly advancing techniques the field of research especially with increase in technological advancements in internet and

More information

Reducing DDR Latency for Embedded Image Steganography

Reducing DDR Latency for Embedded Image Steganography Reducing DDR Latency for Embedded Image Steganography J Haralambides and L Bijaminas Department of Math and Computer Science, Barry University, Miami Shores, FL, USA Abstract - Image steganography is the

More information

A Robust Method for Image Steganography based on Chaos Theory

A Robust Method for Image Steganography based on Chaos Theory A Robust Method for Image Steganography based on Chaos Theory Anoop Kumar Tiwari Research Scholar Dept of Computer Science Banaras Hindu University Ajay Rajpoot, Ex-M.Sc. Student Dept of Computer Science

More information

NUMB3RS Activity: Coded Messages. Episode: The Mole

NUMB3RS Activity: Coded Messages. Episode: The Mole Teacher Page 1 : Coded Messages Topic: Inverse Matrices Grade Level: 10-11 Objective: Students will learn how to apply inverse matrix multiplication to the coding of values. Time: 15 minutes Materials:

More information

A Layered Approach for Watermarking In Images Based On Huffman Coding

A Layered Approach for Watermarking In Images Based On Huffman Coding A Layered Approach for Watermarking In Images Based On Huffman Coding D. Lalitha Bhaskari 1 P. S. Avadhani 1 M. Viswanath 2 1 Department of Computer Science & Systems Engineering, Andhra University, 2

More information

LFSR Based Watermark and Address Generator for Digital Image Watermarking SRAM

LFSR Based Watermark and Address Generator for Digital Image Watermarking SRAM LFSR Based Watermark and Address Generator for igital Image Watermarking SRAM S. Bhargav Kumar #1, S.Jagadeesh *2, r.m.ashok #3 #1 P.G. Student, M.Tech. (VLSI), epartment of Electronics and Communication

More information

Steganography in Digital Media

Steganography in Digital Media Steganography in Digital Media Steganography, the art of hiding of information in apparently innocuous objects or images, is a field with a rich heritage, and an area of rapid current development. This

More information

WATERMARKING USING DECIMAL SEQUENCES. Navneet Mandhani and Subhash Kak

WATERMARKING USING DECIMAL SEQUENCES. Navneet Mandhani and Subhash Kak Cryptologia, volume 29, January 2005 WATERMARKING USING DECIMAL SEQUENCES Navneet Mandhani and Subhash Kak ADDRESS: Department of Electrical and Computer Engineering, Louisiana State University, Baton

More information

1 Introduction Steganography and Steganalysis as Empirical Sciences Objective and Approach Outline... 4

1 Introduction Steganography and Steganalysis as Empirical Sciences Objective and Approach Outline... 4 Contents 1 Introduction... 1 1.1 Steganography and Steganalysis as Empirical Sciences... 1 1.2 Objective and Approach... 2 1.3 Outline... 4 Part I Background and Advances in Theory 2 Principles of Modern

More information

The Web Cryptology Game CODEBREAKERS.EU edition 2015

The Web Cryptology Game CODEBREAKERS.EU edition 2015 Lecture 2, in which we look at the main methods of concealing information. We will learn that what used to be an unbreakable cipher can today be compared to a child play. We will also see how this children

More information

Nomenclators. Nomenclator Example. Alberti s Cipher Disk. Early code/cipher combination, popular form 1400s-1800s. Philip of Spain (1589, see Kahn):

Nomenclators. Nomenclator Example. Alberti s Cipher Disk. Early code/cipher combination, popular form 1400s-1800s. Philip of Spain (1589, see Kahn): Nomenclators Early code/cipher combination, popular form 1400s-1800s. Philip of Spain (1589, see Kahn): LO = Spain POM = King of Spain 64 = confederation overlined two-digit groups = null + substitution

More information

Channel models for high-capacity information hiding in images

Channel models for high-capacity information hiding in images Channel models for high-capacity information hiding in images Johann A. Briffa a, Manohar Das b School of Engineering and Computer Science Oakland University, Rochester MI 48309 ABSTRACT We consider the

More information

An Introduction to Cryptography

An Introduction to Cryptography An Introduction to http://www.southernct.edu/~fields/ Terminology is the study of secret writing. This is the only branch of mathematics to be designated by the U.S. government as export-controlled. Cryptographic

More information

116 Facta Universitatis ser.: Elect. and Energ. vol. 11, No.1 è1998è to use any kind of encrypted information or with not very pleased attitude of loc

116 Facta Universitatis ser.: Elect. and Energ. vol. 11, No.1 è1998è to use any kind of encrypted information or with not very pleased attitude of loc FACTA UNIVERSITATIS èniçsè Series: Electronics and Energetics vol. 11, No.1 è1998è, 115-125 CRYPTOGRAPHY AND STEGANOGRAPHY OF VIDEO INFORMATION IN MODERN COMMUNICATIONS Zenon Hrytskiv, Sviatoslav Voloshynovskiy

More information

The APA style format, is used for documenta6on, by the social sciences. Its emphasis is on date or when a par6cular work was created.

The APA style format, is used for documenta6on, by the social sciences. Its emphasis is on date or when a par6cular work was created. The APA style format, is used for documenta6on, by the social sciences. Its emphasis is on date or when a par6cular work was created. whereas; The MLA style format, is used for documenta6on, by the humani6es.

More information

What is TEMPEST Chapter 1

What is TEMPEST Chapter 1 TEMPEST Engineering and Hardware Design Dr. Bruce C. Gabrielson, NCE 1998 What is TEMPEST Chapter 1 Introduction This text presents an overall introduction to classical information theory, basic communications

More information

Towards Design and Implementation of Discrete Transform Image Coding based on G-Lets and Z- transform

Towards Design and Implementation of Discrete Transform Image Coding based on G-Lets and Z- transform Towards Design and Implementation of Discrete Transform Image Coding based on G-Lets and Z- transform Intermediate report for the year 2013 Madhumita Sengupta, J. K. Mandal Computer Science & Engineering,

More information

Wavelet transform based steganography technique to hide audio signals in image.

Wavelet transform based steganography technique to hide audio signals in image. Available online at www.sciencedirect.com ScienceDirect Procedia Computer Science 47 (2015 ) 272 281 Wavelet transform based steganography technique to hide audio signals in image. Hemalatha S a,1, U.

More information

Advanced Statistical Steganalysis

Advanced Statistical Steganalysis Information Security and Cryptography Advanced Statistical Steganalysis Bearbeitet von Rainer Böhme 1. Auflage 2010. Buch. xvi, 288 S. Hardcover ISBN 978 3 642 14312 0 Format (B x L): 15,5 x 23,5 cm Gewicht:

More information

Capacity is the Wrong Paradigm*

Capacity is the Wrong Paradigm* Capacity is the Wrong Paradigm* Ira S. Moskowitz Center for High Assurance Computer Systems-5540 Naval Research Laboratory Washington, DC 20375 LiWu Chang Center for High Assurance Computer Systems-5540

More information

THE PREVALENCE of multimedia data in our electronic

THE PREVALENCE of multimedia data in our electronic IEEE TRANSACTIONS ON IMAGE PROCESSING, VOL. 8, NO. 8, AUGUST 1999 1075 Spread Spectrum Image Steganography Lisa M. Marvel, Member, IEEE, Charles G. Boncelet, Jr., Member, IEEE, and Charles T. Retter, Member,

More information

On the Limits of Perfect Security for Steganographic System

On the Limits of Perfect Security for Steganographic System IJCSI International Journal of Computer Science Issues, Vol. 1, Issue 4, No 1, July 213 ISSN (Print): 1694-814 ISSN (Online): 1694-784 www.ijcsi.org 121 On the Limits of Perfect Security for Steganographic

More information

Bar Codes to the Rescue!

Bar Codes to the Rescue! Fighting Computer Illiteracy or How Can We Teach Machines to Read Spring 2013 ITS102.23 - C 1 Bar Codes to the Rescue! If it is hard to teach computers how to read ordinary alphabets, create a writing

More information

SIX STEPS TO BUYING DATA LOSS PREVENTION PRODUCTS

SIX STEPS TO BUYING DATA LOSS PREVENTION PRODUCTS E-Guide SIX STEPS TO BUYING DATA LOSS PREVENTION PRODUCTS SearchSecurity D ata loss prevention (DLP) allow organizations to protect sensitive data that could cause grave harm if stolen or exposed. In this

More information

PCA Encrypted Short Acoustic Data Inculcated in Digital Color Images

PCA Encrypted Short Acoustic Data Inculcated in Digital Color Images INTERNATIONAL JOURNAL OF COMPUTERS COMMUNICATIONS & CONTROL ISSN 1841-9836, 10(5):678-685, October, 2015. in Digital Color Images S.H. Karamchandani, K.J. Gandhi, S.R. Gosalia, V.K. Madan, S.N. Merchant,

More information

Access Fee Charging System for Information Contents SharingThrough P2P Communications

Access Fee Charging System for Information Contents SharingThrough P2P Communications Access Fee Charging System for Information Contents SharingThrough P2P Communications Kohei Arai Graduate School of Science and Engineering Saga University Saga City, Japan Abstract Charge system for information

More information

PA Substitution Cipher

PA Substitution Cipher Anuj Kumar 1 PA Substitution Cipher Ankur Kumar Varshney 2 Pankaj Kumar 3 1 M.Tech*, Computer Science & Engineering IEC CET, Greater Noida, (U.P.) India 2 M.Tech*, Computer Science & Engineering B.S.A

More information

[Thu Ha* et al., 5(8): August, 2016] ISSN: IC Value: 3.00 Impact Factor: 4.116

[Thu Ha* et al., 5(8): August, 2016] ISSN: IC Value: 3.00 Impact Factor: 4.116 IJESRT INTERNATIONAL JOURNAL OF ENGINEERING SCIENCES & RESEARCH TECHNOLOGY A NEW SYSTEM FOR INSERTING A MARK PATTERN INTO H264 VIDEO Tran Thu Ha *, Tran Quang Duc and Tran Minh Son * Ho Chi Minh City University

More information

1843 First facsimile patent (England, nº 9745) registered by Mr. Alexander Bain telephone has not been invented until 1876!

1843 First facsimile patent (England, nº 9745) registered by Mr. Alexander Bain telephone has not been invented until 1876! FACSIMILE: CODING AND TRANSMISSION OF BILEVEL IMAGES Fernando Pereira Instituto Superior Técnico Facsimile: Objective Efficient representation of bilevel images for transmission using telephone and data

More information

CONSTRUCTION OF LOW-DISTORTED MESSAGE-RICH VIDEOS FOR PERVASIVE COMMUNICATION

CONSTRUCTION OF LOW-DISTORTED MESSAGE-RICH VIDEOS FOR PERVASIVE COMMUNICATION 2016 International Computer Symposium CONSTRUCTION OF LOW-DISTORTED MESSAGE-RICH VIDEOS FOR PERVASIVE COMMUNICATION 1 Zhen-Yu You ( ), 2 Yu-Shiuan Tsai ( ) and 3 Wen-Hsiang Tsai ( ) 1 Institute of Information

More information

Using Raw Speech as a Watermark, Does it work?

Using Raw Speech as a Watermark, Does it work? Using Raw Speech as a Watermark, Does it work? P. Nintanavongsa and T. Amomraksa Multimedia Communications Laboratory, Department of Computer Engineering, King Mongkut's University of Technology Thonburi,

More information

Figure 2: Original and PAM modulated image. Figure 4: Original image.

Figure 2: Original and PAM modulated image. Figure 4: Original image. Figure 2: Original and PAM modulated image. Figure 4: Original image. An image can be represented as a 1D signal by replacing all the rows as one row. This gives us our image as a 1D signal. Suppose x(t)

More information

ISSN (Print) Original Research Article. Coimbatore, Tamil Nadu, India

ISSN (Print) Original Research Article. Coimbatore, Tamil Nadu, India Scholars Journal of Engineering and Technology (SJET) Sch. J. Eng. Tech., 016; 4(1):1-5 Scholars Academic and Scientific Publisher (An International Publisher for Academic and Scientific Resources) www.saspublisher.com

More information

Comunicação de Áudio e Vídeo, Fernando Pereira

Comunicação de Áudio e Vídeo, Fernando Pereira FACSIMILE: CODING AND TRANSMISSION OF BILEVEL IMAGES Fernando Pereira Instituto Superior Técnico Facsimile: Objective Efficient representation of bilevel images for transmission using telephone and data

More information

FACSIMILE: CODING AND TRANSMISSION OF BILEVEL IMAGES

FACSIMILE: CODING AND TRANSMISSION OF BILEVEL IMAGES FACSIMILE: CODING AND TRANSMISSION OF BILEVEL IMAGES Fernando Pereira Instituto Superior TécnicoT Facsimile OBJECTIVE Efficient representation of bilevel images for transmission using telephone and data

More information

Lossless and Reversible Data Hiding In Encrypted Pictures by Allocating Memory Some Time Recently Encryption through Security Keys

Lossless and Reversible Data Hiding In Encrypted Pictures by Allocating Memory Some Time Recently Encryption through Security Keys Lossless and Reversible Data Hiding In Encrypted Pictures by Allocating Memory Some Time Recently Encryption through Security Keys Noor Mohammed S, 2 Ms. Sathyabama, 1 CSE ME, 2 Assistant Professor, Department

More information

Formatting a Document in Word using MLA style

Formatting a Document in Word using MLA style Formatting a Document in Word using MLA style 1. Using MS Word - various versions 2. Using MLA Handbook for Writers of Research Papers 7 th ed. (2009) 3. The 7 th ed. is also in Term Paper Assistance section

More information

NAPIER. University School of Engineering. Advanced Communication Systems Module: SE Television Broadcast Signal.

NAPIER. University School of Engineering. Advanced Communication Systems Module: SE Television Broadcast Signal. NAPIER. University School of Engineering Television Broadcast Signal. luminance colour channel channel distance sound signal By Klaus Jørgensen Napier No. 04007824 Teacher Ian Mackenzie Abstract Klaus

More information

SCode V3.5.1 (SP-501 and MP-9200) Digital Video Network Surveillance System

SCode V3.5.1 (SP-501 and MP-9200) Digital Video Network Surveillance System V3.5.1 (SP-501 and MP-9200) Digital Video Network Surveillance System Core Technologies Image Compression MPEG4. It supports high compression rate with good image quality and reduces the requirement of

More information

Le go My Stego. Steganography in the post Web 2.0 World. James Shewmaker 2008 Defcon 0x10

Le go My Stego. Steganography in the post Web 2.0 World. James Shewmaker 2008 Defcon 0x10 Le go My Stego Steganography in the post Web 2.0 World James Shewmaker 2008 Defcon 0x10 Today s Agenda Today s Agenda Background: Classical Stego Digital Stego Techniques Extending Stego concepts Surviving

More information

Multiple Image Secret Sharing based on Linear System

Multiple Image Secret Sharing based on Linear System Indian Journal of Science and Technology, Vol 10(33), 10.17485/ijst/2017/v10i33/113085, September 2017 ISSN (Print) : 0974-6846 ISSN (Online) : 0974-5645 Multiple Image Secret Sharing based on Linear System

More information

Book Review: Digital Crime and Forensic Science in Cyberspace

Book Review: Digital Crime and Forensic Science in Cyberspace Publications 2006 Book Review: Digital Crime and Forensic Science in Cyberspace Gary C. Kessler Champlain College - Burlington, kessleg1@erau.edu Follow this and additional works at: https://commons.erau.edu/publication

More information

Large Amount of Data GIF Image Encryption with High Security using Path-based Animation

Large Amount of Data GIF Image Encryption with High Security using Path-based Animation Large Amount of Data GIF Image Encryption with High Security using Path-based Animation Hind Rostom Mohammed University of Kufa College of Mathematical &Computer Sciences/Computer Dept. hind_restem@yahoo.com.

More information

1. Presentation of the software. 2. The different screens of the software. 3. About sounds in Imagemo. 1. Presentation of the software

1. Presentation of the software. 2. The different screens of the software. 3. About sounds in Imagemo. 1. Presentation of the software Imagemo 1.0 Documentation 1. Presentation of the software. 2. The different screens of the software. 3. About sounds in Imagemo. 1. Presentation of the software Imagemo is a software which helps to learn

More information

SSTV Transmission Methodology

SSTV Transmission Methodology SSTV Transmission Methodology Slow Scan TV (SSTV) is a video mode which uses analog frequency modulation. Every different brightness in the image is assigned a different audio frequency. The modulating

More information

Update to 8 June 2011 Press Release

Update to 8 June 2011 Press Release 19 August 2011 Update to 8 June 2011 Press Release In June 2011, the National Security Agency (NSA) declassified and released to the National Archives and Records Administration (NARA) over 50,000 pages

More information

SELSE ASAR: Applica+on-Specific Approximate Recovery to Mi+gate Hardware Variability. Presenter: Manish Gupta

SELSE ASAR: Applica+on-Specific Approximate Recovery to Mi+gate Hardware Variability. Presenter: Manish Gupta SELSE 2017 ASAR: Applica+on-Specific Approximate Recovery to Mi+gate Hardware Variability Presenter: Manish Gupta Collaborators: Abbas Rahimi, Daniel Lowell, John Kalama9anos, Advisors: Dean Tullsen, Rajesh

More information

Homer / The Odyssey By Homer, Ian McKellen READ ONLINE

Homer / The Odyssey By Homer, Ian McKellen READ ONLINE Homer / The Odyssey By Homer, Ian McKellen READ ONLINE Timelines of Homer's Odyssey Chronological Order: Odyssey Order: Odysseus and his men raid the Cicones. Council of the gods. Athena bargains with

More information

DICOM medical image watermarking of ECG signals using EZW algorithm. A. Kannammal* and S. Subha Rani

DICOM medical image watermarking of ECG signals using EZW algorithm. A. Kannammal* and S. Subha Rani 126 Int. J. Medical Engineering and Informatics, Vol. 5, No. 2, 2013 DICOM medical image watermarking of ECG signals using EZW algorithm A. Kannammal* and S. Subha Rani ECE Department, PSG College of Technology,

More information

ATSC Standard: Video Watermark Emission (A/335)

ATSC Standard: Video Watermark Emission (A/335) ATSC Standard: Video Watermark Emission (A/335) Doc. A/335:2016 20 September 2016 Advanced Television Systems Committee 1776 K Street, N.W. Washington, D.C. 20006 202-872-9160 i The Advanced Television

More information

HDBaseT TM Long Reach Mode. White Paper v1.0. Lightware Visual Engineering. Long Reach Mode White Paper

HDBaseT TM Long Reach Mode. White Paper v1.0. Lightware Visual Engineering. Long Reach Mode White Paper HDBaseT TM Long Reach Mode White Paper v1.0 Lightware Visual Engineering Theory of Operation HDBaseT uses an asymmetric method to send audio, video, Ethernet, USB, controls and power from source to sink,

More information

Role of Color Processing in Display

Role of Color Processing in Display Advances in Computational Sciences and Technology ISSN 0973-6107 Volume 10, Number 7 (2017) pp. 2183-2190 Research India Publications http://www.ripublication.com Role of Color Processing in Display Mani

More information

EddyCation - the All-Digital Eddy Current Tool for Education and Innovation

EddyCation - the All-Digital Eddy Current Tool for Education and Innovation EddyCation - the All-Digital Eddy Current Tool for Education and Innovation G. Mook, J. Simonin Otto-von-Guericke-University Magdeburg, Institute for Materials and Joining Technology ABSTRACT: The paper

More information

Eddy current tools for education and innovation

Eddy current tools for education and innovation 17th World Conference on Nondestructive Testing, 25-28 Oct 2008, Shanghai, China Eddy current tools for education and innovation Gerhard MOOK, Jouri SIMONIN Institute of Materials and Joining Technology,

More information

8. Schelling's Segrega0on Model

8. Schelling's Segrega0on Model 8. Schelling's Segrega0on Model Modelling Social Interac0on in Informa0on systems h9p://davidhales.com/msiis David Hales, University of Szeged dave@davidhales.com Schelling s segrega0on model Seminal Agent

More information

Acoustic Scene Classification

Acoustic Scene Classification Acoustic Scene Classification Marc-Christoph Gerasch Seminar Topics in Computer Music - Acoustic Scene Classification 6/24/2015 1 Outline Acoustic Scene Classification - definition History and state of

More information

Getting Started. Connect green audio output of SpikerBox/SpikerShield using green cable to your headphones input on iphone/ipad.

Getting Started. Connect green audio output of SpikerBox/SpikerShield using green cable to your headphones input on iphone/ipad. Getting Started First thing you should do is to connect your iphone or ipad to SpikerBox with a green smartphone cable. Green cable comes with designators on each end of the cable ( Smartphone and SpikerBox

More information

ISO Digital Forensics- Video Analysis

ISO Digital Forensics- Video Analysis ISO 17025 Digital Forensics- Video Analysis From capture to court: the implications of ISO 17025 on video investigations (V1) S. Doyle Introduction In 2014 the UK Forensic Regulator produced the Codes

More information

Getting the MOST out of JT65B on 2m EME Frequency Stability of the RX/TX By: Scott Tilley, VE7TIL

Getting the MOST out of JT65B on 2m EME Frequency Stability of the RX/TX By: Scott Tilley, VE7TIL Getting the MOST out of JT65B on 2m EME Frequency Stability of the RX/TX By: Scott Tilley, VE7TIL Background JT65B uses the FFT algorithm to locate the individual 63 bauds in discreet bins of the received

More information

APPLICATIONS OF DIGITAL IMAGE ENHANCEMENT TECHNIQUES FOR IMPROVED

APPLICATIONS OF DIGITAL IMAGE ENHANCEMENT TECHNIQUES FOR IMPROVED APPLICATIONS OF DIGITAL IMAGE ENHANCEMENT TECHNIQUES FOR IMPROVED ULTRASONIC IMAGING OF DEFECTS IN COMPOSITE MATERIALS Brian G. Frock and Richard W. Martin University of Dayton Research Institute Dayton,

More information

Key-based scrambling for secure image communication

Key-based scrambling for secure image communication University of Wollongong Research Online Faculty of Engineering and Information Sciences - Papers: Part A Faculty of Engineering and Information Sciences 2012 Key-based scrambling for secure image communication

More information

Usability tes+ng. User sa+sfac+on ques+onnaires & interviews are used to elicit opinions. Quan+ta+ve & qualita+ve data. User-Centred Design 1

Usability tes+ng. User sa+sfac+on ques+onnaires & interviews are used to elicit opinions. Quan+ta+ve & qualita+ve data. User-Centred Design 1 Usability tes+ng Controlled by the evaluator Record typical users performance on typical tasks Users are monitored, recorded on video & their key presses are logged Output: quan+ta+ve & (qualita+ve) data

More information

SCode V3.5.1 (SP-601 and MP-6010) Digital Video Network Surveillance System

SCode V3.5.1 (SP-601 and MP-6010) Digital Video Network Surveillance System V3.5.1 (SP-601 and MP-6010) Digital Video Network Surveillance System Core Technologies Image Compression MPEG4. It supports high compression rate with good image quality and reduces the requirement of

More information

Cri$cal Theory of Interna$onal Rela$ons

Cri$cal Theory of Interna$onal Rela$ons Cri$cal Theory of Interna$onal Rela$ons Two kinds of theory Problem solving theory X Cri$cal theory Understand, interpret X Transform Robert Cox: All theore$cal perspec$ves sustain the interest of certain

More information

Third Wave: Television ( )

Third Wave: Television ( ) Third Wave: Television (1950-2000) Television, the third wave, is the optical medium that comes into the home. If cinema is the urban, modern medium, television is the suburban, postmodern medium. We will

More information

THE HEROIC AGE OF EXPLORATION. Sample file

THE HEROIC AGE OF EXPLORATION. Sample file POLAR This Enrichment4You E-guide gives you: *A Brief History about mystery stories *Suggestions on how create a Polar Mystery Box based on the Polar Exploration series ENRICHMENT4YOU Published by Henrich

More information

(12) (10) Patent No.: US 7,197,164 B2. Levy (45) Date of Patent: Mar. 27, 2007

(12) (10) Patent No.: US 7,197,164 B2. Levy (45) Date of Patent: Mar. 27, 2007 United States Patent US007 1971 64B2 (12) () Patent No.: Levy (45) Date of Patent: Mar. 27, 2007 (54) TIME-VARYING VIDEO WATERMARK 5,9,044 A 6/1999 Gardos et al.... 382,236 5,9,377 A 7/1999 Powell et al.......

More information

Research Topic. Error Concealment Techniques in H.264/AVC for Wireless Video Transmission in Mobile Networks

Research Topic. Error Concealment Techniques in H.264/AVC for Wireless Video Transmission in Mobile Networks Research Topic Error Concealment Techniques in H.264/AVC for Wireless Video Transmission in Mobile Networks July 22 nd 2008 Vineeth Shetty Kolkeri EE Graduate,UTA 1 Outline 2. Introduction 3. Error control

More information

Spatial Error Concealment Technique for Losslessly Compressed Images Using Data Hiding in Error-Prone Channels

Spatial Error Concealment Technique for Losslessly Compressed Images Using Data Hiding in Error-Prone Channels 168 JOURNAL OF COMMUNICATIONS AND NETWORKS, VOL. 12, NO. 2, APRIL 2010 Spatial Error Concealment Technique for Losslessly Compressed Images Using Data Hiding in Error-Prone Channels Kyung-Su Kim, Hae-Yeoun

More information

R&S NESTOR-FOR Alibi Verification

R&S NESTOR-FOR Alibi Verification Application Brochure Version 01.00 R&S NESTOR-FOR Alibi Verification NESTOR-FOR_app-bro_en_5215-5888-92_v0100.indd 1 22.03.2018 15:50:04 Contents This application brochure describes the procedure for surveying

More information

ABB EQmatic Energy Analyzer, M-Bus QA/S , 2CDG110226R0011, QA/S , 2CDG110227R0011

ABB EQmatic Energy Analyzer, M-Bus QA/S , 2CDG110226R0011, QA/S , 2CDG110227R0011 Technical data 2CDC512091D0201 ABB EQmatic Description of product QA/S 3.xx.1 are modular DIN Rail components (MDRC) Pro M design for installation in distribution boards on a 35 mm mounting rail. They

More information

Paranoia. Implementation and Testing For. U-S-E CS169 Software Engineering Dec Prepared by:

Paranoia. Implementation and Testing For. U-S-E CS169 Software Engineering Dec Prepared by: Implementation and Testing For Paranoia U-S-E CS169 Software Engineering Dec 2 2003 Prepared by: BERDAHL,EDGAR CHUNG,SANG GONG,GARY LE,TAM LEE, JOON YUL LI, SHENG MOZAFFARIAN,BEHRAD MURRAY,JASON NGUYEN,

More information

A Hybrid Approach for Information Hiding and Encryption using Multiple LSB s Algorithms

A Hybrid Approach for Information Hiding and Encryption using Multiple LSB s Algorithms A Hybrid Approach for Information Hiding and Encryption using Multiple LSB s Algorithms H.B.Kekre 1, Tanuja Sarode 2 and Pallavi Halarnkar 3 1 Senior Professor, MPSTME, NMIMS University, Mumbai 2 Associate

More information

Muscle Sensor KI 2 Instructions

Muscle Sensor KI 2 Instructions Muscle Sensor KI 2 Instructions Overview This KI pre-work will involve two sections. Section A covers data collection and section B has the specific problems to solve. For the problems section, only answer

More information

CS408 Cryptography & Internet Security

CS408 Cryptography & Internet Security CS408 Cryptography & Internet Security Lecture 4: Rotor Machines Enigma Reza Curtmola Department of Computer Science / NJIT How to move from pencil and paper to more automatic ways of encrypting and decrypting?

More information

Implementation and performance analysis of convolution error correcting codes with code rate=1/2.

Implementation and performance analysis of convolution error correcting codes with code rate=1/2. 2016 International Conference on Micro-Electronics and Telecommunication Engineering Implementation and performance analysis of convolution error correcting codes with code rate=1/2. Neha Faculty of engineering

More information

Motion Video Compression

Motion Video Compression 7 Motion Video Compression 7.1 Motion video Motion video contains massive amounts of redundant information. This is because each image has redundant information and also because there are very few changes

More information

Fundamentals of Multimedia. Lecture 3 Color in Image & Video

Fundamentals of Multimedia. Lecture 3 Color in Image & Video Fundamentals of Multimedia Lecture 3 Color in Image & Video Mahmoud El-Gayyar elgayyar@ci.suez.edu.eg Mahmoud El-Gayyar / Fundamentals of Multimedia 1 Black & white imags Outcomes of Lecture 2 1 bit images,

More information

Updates to the Form and Filing System

Updates to the Form and Filing System FCC Form 481 Updates to the Form and Filing System Program Year 2016 High Cost Program FCC Form 481 1 Welcome Housekeeping Use the Audio section of your control panel to select an audio source and connect

More information

Microbolometer based infrared cameras PYROVIEW with Fast Ethernet interface

Microbolometer based infrared cameras PYROVIEW with Fast Ethernet interface DIAS Infrared GmbH Publications No. 19 1 Microbolometer based infrared cameras PYROVIEW with Fast Ethernet interface Uwe Hoffmann 1, Stephan Böhmer 2, Helmut Budzier 1,2, Thomas Reichardt 1, Jens Vollheim

More information

CRYPTOGRAPHY. Sharafat Ibn Mollah Mosharraf TOUCH-N-PASS EXAM CRAM GUIDE SERIES. Special Edition for CSEDU. Students CSE, DU )

CRYPTOGRAPHY. Sharafat Ibn Mollah Mosharraf TOUCH-N-PASS EXAM CRAM GUIDE SERIES. Special Edition for CSEDU. Students CSE, DU ) Special Edition for CSEDU Students TOUCH-N-PASS EXAM CRAM GUIDE SERIES CRYPTOGRAPHY Prepared By Sharafat Ibn Mollah Mosharraf CSE, DU 12 th Batch (2005 2005-2006 2006) Table of Contents CHAPTER 1: INTRODUCTION

More information

Breaking the Enigma. Dmitri Gabbasov. June 2, 2015

Breaking the Enigma. Dmitri Gabbasov. June 2, 2015 Breaking the Enigma Dmitri Gabbasov June 2, 2015 1 Introduction Enigma was an electro-mechanical machine that was used before and during the World War II by Germany to encrypt and decrypt secret messages.

More information

Moving Steganography and Steganalysis from the Laboratory into the Real World

Moving Steganography and Steganalysis from the Laboratory into the Real World Moving Steganography and Steganalysis from the Laboratory into the Real World Andrew D. Ker Dept. of Computer Science University of Oxford Oxford OX1 3QD, UK adk@cs.ox.ac.uk Rémi Cogranne LM2S - UMR STMR

More information

BBM 413 Fundamentals of Image Processing Dec. 11, Erkut Erdem Dept. of Computer Engineering Hacettepe University. Segmentation Part 1

BBM 413 Fundamentals of Image Processing Dec. 11, Erkut Erdem Dept. of Computer Engineering Hacettepe University. Segmentation Part 1 BBM 413 Fundamentals of Image Processing Dec. 11, 2012 Erkut Erdem Dept. of Computer Engineering Hacettepe University Segmentation Part 1 Image segmentation Goal: identify groups of pixels that go together

More information

Inside Digital Design Accompany Lab Manual

Inside Digital Design Accompany Lab Manual 1 Inside Digital Design, Accompany Lab Manual Inside Digital Design Accompany Lab Manual Simulation Prototyping Synthesis and Post Synthesis Name- Roll Number- Total/Obtained Marks- Instructor Signature-

More information

Handwriting Analysis, Forgery, and Counterfeiting. Forensic Science Chapter 10

Handwriting Analysis, Forgery, and Counterfeiting. Forensic Science Chapter 10 Handwriting Analysis, Forgery, and Counterfeiting Forensic Science Chapter 10 Introduction Document analysis examination and comparison of questioned documents with known material. Experts establish the

More information

Color Correction in Final Cut Studio Introduction to Color

Color Correction in Final Cut Studio Introduction to Color Color Correction in Final Cut Studio Introduction to Color Part 1: Getting Started with Color Part 2: Managing and Applying Grades upart 3: Using the Scopes and Auto Balanceo Part 4: Copying from One Clip

More information

MEDIA HISTORIES Winter 2014 DESMA 8 Media History LEC 6 Dr. Peter Lunenfeld

MEDIA HISTORIES Winter 2014 DESMA 8 Media History LEC 6 Dr. Peter Lunenfeld MEDIA HISTORIES 1850-2050 Winter 2014 DESMA 8 Media History LEC 6 Dr. Peter Lunenfeld [lunenfeld@ucla.edu] Third Wave: Television (1950-2000) Television, the third wave, is the optical medium that comes

More information

Getting started with Spike Recorder on PC/Mac/Linux

Getting started with Spike Recorder on PC/Mac/Linux Getting started with Spike Recorder on PC/Mac/Linux You can connect your SpikerBox to your computer using either the blue laptop cable, or the green smartphone cable. How do I connect SpikerBox to computer

More information

Specifications SMART Board 6075 interactive flat panel with iq Model SPNL-6275

Specifications SMART Board 6075 interactive flat panel with iq Model SPNL-6275 Specifications SMART Board 6075 interactive flat panel with iq Model SPNL-6275 Overview The SMART Board 6075 interactive flat panel with iq is the hub of your classroom. iq technology connects devices,

More information

Moving Steganography and Steganalysis from the Laboratory into the Real World

Moving Steganography and Steganalysis from the Laboratory into the Real World Moving Steganography and Steganalysis from the Laboratory into the Real World Andrew Ker, Patrick Bas, Rainer Böhme, Rémi Cogranne, Scott Craver, Tomáš Filler, Jessica Fridrich, Tomas Pevny To cite this

More information

Lecture 18: Exam Review

Lecture 18: Exam Review Lecture 18: Exam Review The Digital World of Multimedia Prof. Mari Ostendorf Announcements HW5 due today, Lab5 due next week Lab4: Printer should be working soon. Exam: Friday, Feb 22 Review in class today

More information

How to Categorize Risk in IoT

How to Categorize Risk in IoT How to Categorize Risk in IoT Defining use cases for IoT deployments lays the foundation for an end-to-end cybersecurity strategy that cuts across a broad and ever-changing threat landscape 2 Overview

More information

Senior Design Project: Blind Transmitter

Senior Design Project: Blind Transmitter Senior Design Project: Blind Transmitter Marvin Lam Mamadou Sall Ramtin Malool March 19, 2007 As the technology industry progresses we cannot help but to note that products are becoming both smaller and

More information