REVVIND REVerse engineering of audio-visual content Data
|
|
- Audra Greene
- 5 years ago
- Views:
Transcription
1 REVVIND REVerse engineering of Newsletter Issue n.1, October 2012 REWIND Page 1 of 12
2 1.1 The REWIND is a FET (Future and Emerging Technology) research project funded by the European Commission within the ICT area of the Seventh Framework Program (FP7). The project is devoted to the analysis of multimedia content in order to trace back its processing history with potential impact in several areas ranging from forensics and law enforcement to quality assessment. This newsletter is addressed to subjects that might be potentially interested in the outcomes of the project, including companies, public and private research institutions or individual researchers working this field. 1.2 Project context and objectives With the rapid proliferation of inexpensive hardware devices that enable the acquisition of audio-visual data, new types of multimedia digital objects (audio, images and videos) can be readily created, stored, transmitted, modified and tampered with. The need of methods and tools that enable REVerse engineering of is therefore becoming more and more of an urgent necessity. The REWIND project is aimed at synergistically combining principles of signal processing, machine learning and information theory to answer relevant questions on the past history of such objects. As an example, Figure 1 illustrates a simple processing chain that corresponds to a video clip originally acquired with a webcam and then downloaded from a video sharing web application such as YouTube. First, the original content is acquired in a digital format and subsequently compressed, typically using a lossy coding algorithm. The user might use off-the-shelf commercial software to alter either the audio or the video track, or both, before re-encoding the content in order to be transmitted and stored on a remote server. Upon a download request, the video clip is transmitted over a noisy network, decoded and finally played out by the receiver device. Figure 1. Example of a simple processing chain of multimedia content. The REWIND project relies on the fact that each one of these processing steps is bound to leave a characteristic footprint that can be detected and analyzed to trace back the past history of the considered multimedia object. This operation, in principle, can be done in a blind fashion, i.e. without needing to access the content at any earlier point of the processing chain. Notice that these processing steps often introduce undesired and irreversible distortions in the original multimedia object, e.g. due to insufficient sampling rate in the acquisition phase, coding artifacts in lossy compression, or imperfect error concealment strategies. Conventionally, these footprints are deemed as misprints of the multimedia processing chain, as they indicate that something went wrong during one of the processing steps of Figure October 30, 2012 Page 2 of 12
3 1. As a consequence, considerable effort in multimedia processing research has been directed towards preventing these artifacts through, for instance, sophisticated sampling and interpolation methods, errorresilience mechanisms or techniques to avoid undesired or unauthorized modifications of the content streams. In the REWIND project, this perspective is completely reversed: footprints are here considered as an asset, i.e., as a precious source of information on the history of the multimedia object, which can be leveraged to reconstruct the processing chain. 1.3 Potential impact and use Content production and access technologies for the multimedia market have undergone a radical transformation over the past decade. Indeed, a wide range of novel networked services have brought a formidable amount of multimedia content at the user s reach. We have also witnessed a radical change in the role of the Citizen, who has been elevated from that of a mere end-user to that of a contributor, thanks to the multitude of powerful audio-visual authoring tools that are today at hand. This, in fact, has promoted the production of an enormous amount of user-generated content (UGC), whose dissemination is greatly favored by a wide variety of novel and effective distribution channels, such as social networks or media sharing websites (e.g. YouTube, Google Videos). In this context the REWIND project intends to play a key role by providing tools and methodologies for assessing and understanding the processing chains that account for the history of multimedia objects. The impact of these methodologies and tools will be significant on a wide range of application areas. If the tracing of the history can be done with a high degree of reliability, relevant applications can be envisioned in fields where stakes are high, such as forensics and law enforcement. Here the information extracted can be used, for example, for authenticating content without the need of prior modifications of the considered content; for tracing content (associating it with the devices used for acquiring/editing it); or for detecting a malicious concealment of footprints. There is, however, a wide range of low-risk applications where the tracing process is narrowed down to a decision on whether or not to trust or to accept the digital object. These include, for example: the evaluation of the face validity of a digital object (i.e. the assessment of its trustworthiness at face value, an essential ingredient for the emerging paradigms of information gathering, such as Citizen Journalism); the quality assessment of a multimedia experience, in all cases in which the reference content is not available; the detection of pirated (or illegally distributed) content. As such evaluations are needed on a regular basis, it is important to perform them automatically and with little or no interaction at all. October 30, 2012 Page 3 of 12
4 1.4 List of the project partners, project public website, project contact point Partner # Partner Name Acronym Country P1 Politecnico di Milano (Coordinator) PoliMi Italy P2 CNIT (Consorzio Interuniversitario per le Telecomunicazioni) CNIT Italy P3 Imperial College of Science, Technology & Medicine Imperial UK P4 University of Vigo UVigo Spain P5 Fraunhofer - Institute for Digital Media Technology IDMT Fraunhofer Germany Project Public WebSite Project Contact Point Prof. Stefano Tubaro Dipartimento di Elettronica e Informazione Politecnico di Milano Piazza Leonardo da Vinci Milano Italy Tel/Fax: / stefano.tubaro@polimi.it 1.5 Some facts about REWIND The REWIND project started on May 1, 2011 and will end on April 30, 2014, for a total duration of 36 months. As of October 2012, the date of this first issue of the REWIND newsletter a series of significant results have been obtained, which were published on top-ranked scientific journals and on international conferences (see the project websiste, for the complete list, including references to publicly available papers). In addition, the project has also realized a set of prototypes demonstrating on real data what can be obtained by using the developed techniques, thus indicating the potential impact in practical applications. In the following, a selection of these prototypes is briefly illustrated. October 30, 2012 Page 4 of 12
5 1.5.1 Image integrity verification The advent of technologies easily enables modification and manipulation of digital visual data, so that we are no longer confident that what we are seeing in a photo is a true representation of what really happened: the value of photography as a record of events must be carefully evaluated. This interactive demonstrator turns the user into a Forensic Analyst (FA), and allows him to analyze the integrity of images. This is done exploiting some of the state-of-the-art results obtained in the Image Forensic research field [1-3]. The demo provides a friendly graphical interface (Figure 2) that helps the FA in viewing the image and its metadata (EXIF), selecting arbitrarily shaped suspect regions or performing fullyautomatic forgery localization, and viewing the output of forensic tools in a friendly way. In particular, the demo embeds a decision fusion framework tailored to the Image Forensic scenario (presented at WIFS11 [4]), that allows the user to have a unique final decision (as fusion of different algorithm outputs) on the integrity of the analysed image region. This software will run on a laptop, it is fully interactive and several realistic splicings (see Figure 2) can be demonstrated, so that users may play with the demo. Figure 2. Outline of the GUI for the image integrity verification tool, during the selection of suspect regions. October 30, 2012 Page 5 of 12
6 1.5.2 Multiple JPEG compression detector The analysis of double-compressed images is a problem largely studied by the multimedia forensics community, as it might be exploited, e.g., for tampering localization or source device identification. In many practical scenarios, e.g., photos uploaded on blogs or sharing web sites, images might be compressed several times. However, the identification of the number of compression stages applied to an image remains an open issue, as many authors address only the problem of double compression. With this demo we show that we are able to estimate the number of JPEG compression steps applied to an image, if it has been compressed up to three times. This is a valuable hint in determining the image authenticity. The algorithm we use is based on the work in [5] and it relies on the analysis of the distribution of the first significant digits of DCT coefficients, which is modeled according to Benford s law. At this purpose, the software we present (see Figure 2) allows a user to load an uncompressed image, compress it from one to three times with random quality factors within a range, and run the detector. The detector output is the estimated number of compression steps. This software can be shown on a laptop, and no other equipment is required. Figure 2. Outline of the GUI for the multiple JPEG compression detector, that shows the estimated number of IPEG compressions applied to the considered image. October 30, 2012 Page 6 of 12
7 1.5.3 Music Plagiarism Analyzer Music plagiarism, i.e., the use of another work while presenting it as one s own original music, has always been a topic of public interest. Typically, if music plagiarism cases are brought to court, independent music experts, often musicologists, are asked to analyze the similarities between two songs, and the judges rely on their opinion. With this demo we show that we are able to help music experts to inspect cases of suspected samplingplagiarism (see Figure 3). The software Music Plagiarism Analyzer facilitates retrieval of samples of one song in another song and thus helps to prove or disprove suspected sampling-plagiarism. The original sample thereby may have undergone manipulations such as time-stretching and pitch-shifting. Commonly it is also superimposed with additional music sources, such as drums or bass inside the new song. The algorithm we use is based on [6] and it relies on spectrogram decomposition of both the original and suspected plagiarism by means of Non-Negative Matrix Factorization. For the suspected plagiarism, the basis vectors of the original spectrogram are used as priors and retained during decomposition. The software enables the user to select an excerpt of a song and have the software erase this part from the suspected plagiarism. Further details can be found in [7]. Figure 3. Outline of the GUI for the music plagiarism analyzer. October 30, 2012 Page 7 of 12
8 1.5.4 Automatic video recapture detection With the increasing availability of small, inexpensive video recording devices, casual movie making is now within everyone's reach. This represents a great leap forward for budding directors; however it poses a significant threat in terms of copyrighted video material that can be covertly recorded and distributed. Moreover, illegitimate video material circulating on the net may not be limited to the case of recaptured copyrighted footage; another possibility is to recapture a fraudulent or otherwise doctored video in order to conceal traces of forgery, claiming its authenticity. Automatic detection of recaptured videos has not been thoroughly examined in the literature, and constitutes a useful tool to automatically flag media for potential copyright infringement or tampering concealment. Our technique [8] uses scene jitter as a cue for classification. During recapture, jitter is introduced due to either physiological hand tremor, or environmental factors such as projector flicker or floor vibrations. When recapturing planar surfaces approximately parallel to the imaging plane (such as a cinema screen captured by a handheld camera), any added motion due to jitter will result in approximately uniform high-frequency 2D motion fields. In our work the high-frequency motion components are analyzed through stages of feature tracking, wavelet decomposition and normalized cross correlation in order to obtain a distribution of the correlation coefficients between the high frequency motion components. The obtained distributions are then used directly for classification. To show the validity of our approach, our demo allows the user to either load a video from our dataset (either original or recaptured) or to load a video and synthetically add recapture jitter. An outline of the user interface is shown in Figure 1. Visual features are then tracked and shown in real time to the user, together with their trajectory before and after the wavelet decomposition. Finally, both the motion correlation matrix and the correlation distribution are shown together with the classification result, in order for the user to visually appreciate the strong influence of even very modest jitter on the correlation coefficients. Figure 4. Outline of the GUI for the video recapture detection software October 30, 2012 Page 8 of 12
9 1.5.5 Automatic video recapture detection The spectacular growth of Internet Protocol (IP) networks in the last decade, as well as the generalization of their use, have changed our way of interacting with people and learning, our consumption habits, and even our entertainment preferences. Concerning the latter, probably the first example are the widespread online games, although in the last years the online consumption of multimedia contents has also experienced a quantum leap. Due to its bandwidth characteristics and its added value, special attention is deserved by the IP distribution of video contents. Typically, two ways of video distribution can be found: Video on Demand (VoD): the user asks for the content to be delivered. Multicast: the content is scheduled for delivering and the user applies for being included in the destination list. Generally VoD streams contents (videos or TV shows) which are stored at the streaming server (a.k.a. delayed or time-shifted playing), as movies or TV shows, while multicast deals with the streaming of live events, typically sports. These new video distribution models have advantages from the point of view of the user: ease of use, possibility of choosing the screened contents among a huge selection, pause, play, rewind and forward features, paying just for those contents which are really consumed (unlike most of the previously used cable/satellite systems), enjoy their favorite programs/movies even when the users are not at home, and open a number of possibilities to the content distributor: almost unlimited potential market, cheap infrastructures, well-known distribution technology, leading to a new video distribution business model. Nevertheless, new technological and legal problems must be also faced, probably being the most important of them the streaming of contents by providers not owning the corresponding rights. This misuse of the contents causes huge losses to the legitimate content right owners, who indeed are interested in tracing back the distribution channel undergone by the content for arriving to the server of the unauthorized provider. October 30, 2012 Page 9 of 12
10 Since terrestrial and satellital channels are two of the most important ways of broadcasting video programs, this demo illustrates the possibility of classifying the origin of one streamed program between terrestrial and satellital, both for time-shifted and live streaming. In the considered framework, the streamed video will have high quality (specifically, no video or audio transcoding will be performed) and it will be streamed according to the Internet Protocol Television (IPTV) standard. Figure 5 contains a screenshot of the developed application; the current interface allows the user to watch on real-time the video in the considered stream, as well as the instant rate variability. The length of the considered video sequence can be determined by the used, although a minimum length around 30 seconds should be considered in order to provide reliable results. Figure 5. Screenshot of ClasifIPTV October 30, 2012 Page 10 of 12
11 1.5.6 References [1] Bianchi, T.; Piva, A.; "Detection of non-aligned double JPEG compression with estimation of primary compression parameters", IEEE International Conference on Image Processing (ICIP), 2011, pp , 2011 [2] Bianchi, T.; De Rosa, A.; Piva, A.; "Improved DCT coefficient analysis for forgery localization in JPEG images," IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), pp , 2011 [3] Farid, H.; "Exposing Digital Forgeries From JPEG Ghosts", IEEE Transactions on Information Forensics and Security, vol.4, no.1, pp , 2009 [4] Fontani, M.; Bianchi, T.; De Rosa, A.; Piva, A.; Barni, M.;, "A Dempster-Shafer framework for decision fusion in image forensics" IEEE International Workshop on Information Forensics and Security (WIFS), pp.1-6, 2011 [5] Milani S., Tagliasacchi M., Tubaro S., Discriminating multiple JPEG compression using first digit features, IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), Kyoto, Japan, March 2012 [6] P. Smaragdis, From learning music to learning to separate, Invited paper at Forum Acusticum, Budapest, Hungary, 2005 [7] C. Dittmar et al. Audio Forensics meets Music Information Retrieval A Toolbox for Inspection of Music Plagiarism to appear in Proceedings of the 20 th European Signal Processing Conference (EUSIPCO), Bucharest, Romania, 2012 [1] M. Visentini-Scarzanella, P. L. Dragotti, Video Jitter Analysis for Automatic Bootleg Detection, to appear in Proceedings of IEEE International Workshop on Multimedia Signal Processing (MMSP), Banff (Canada), 2012 October 30, 2012 Page 11 of 12
12 1.6 Upcoming events REWIND supports a series of events in which it will disseminate its outcomes, in the form of effective methods for performing reverse engineering of multimedia content. These are the upcoming events: IEEE International Workshop on Information Forensics and Security (WIFS 2012), Tenerife, Spain, December 2-5, REWIND is a sponsor of the workshop and supports a Best Paper Awards on Multimedia Forensics and Security. Moreover REWIND will organize a tutorial on Uncovering the processing history of video content and a set of REWIND demonstrators will be presented during the workshop. IEEE International Workshop on Multimedia Signal Processing (MMSP 2013), Pula (Sardinia), Italy, September 30 - October 2, REWIND will be one of the workshop sponsors and a series of activities will be organized during the events to showcase the results of the project. REWIND Workshop, Milan November The event will be specifically organized to present the results of the projects to companies, organizations and people potentially interested in using tools for discovering the past history of multimedia objects. The exact date of the event will be fixed soon. October 30, 2012 Page 12 of 12
Deliverable D6.3 Release of publicly available datasets and software tools
Grant Agreement No. 268478 Deliverable D6.3 Release of publicly available datasets and software tools Lead partner for this deliverable: PoliMI Version: 1.0 Dissemination level: Public April 29, 2013 Contents
More informationREVVIND REVerse engineering of audio VIsual content Data
REVVIND REVerse engineering of Newsletter Issue n.3, November 2013 REWIND Page 1 of 12 1.1 The REWIND is a FET (Future and Emerging Technology) research project funded by the European Commission within
More informationThe Watchful Forensic Analyst: Multi-Clue Information Fusion with Background Knowledge
WIFS 13 The Watchful Forensic Analyst: Multi-Clue Information Fusion with Background Knowledge Marco Fontani #, Enrique Argones-Rúa*, Carmela Troncoso*, Mauro Barni # # University of Siena (IT) * GRADIANT:
More informationREVVIND. FP7-ICT-2007-C GA No REVerse engineering of audio-visual content Data. D6.4 REWIND project workshop
FP7-ICT-2007-C GA No. 268478 D6.4 REWIND project workshop LAST MODIFICATION: 5.12.2013 REPORTING ORGANIZATION: POLITECNICO DI MILANO AUTHORS: MARCO TAGLIASACCHI, STEFANO TUBARO (POLITECNICO DI MILANO)
More informationLocal tampering detection in video sequences
Local tampering detection in video sequences Paolo Bestagini, Simone Milani, Marco Tagliasacchi, Stefano Tubaro Dipartimento di Elettronica, Informazione e Bioingegneria, Politecnico di Milano piazza Leonardo
More informationREVVIND REVerse engineering of audio-visual content Data
FP7-ICT-2007-C GA No. 268478 footprint detectors LAST MODIFICATION: 30.04.2014 REPORTING ORGANIZATION: FRAUNHOFER (INSTITUTE FOR DIGITAL MEDIA TECHNOLOGY) AUTHORS: LUCA CUCCOVILLO, PATRICK AICHROTH, DANIEL
More informationREVVIND REVerse engineering of audio-visual content Data
FP7-ICT-2007-C GA No. 268478 D5.5-2 Final report on content sets and flows, m36 Update LAST MODIFICATION: 30.04.2014 REPORTING ORGANIZATION: FRAUNHOFER (INSTITUTE FOR DIGITAL MEDIA TECHNOLOGY) AUTHORS:
More informationMultimedia Security: So What s the Big Deal?
Multimedia Security: So What s the Big Deal? Edward J. Delp Purdue University School of Electrical and Computer Engineering Video and Image Processing Laboratory (VIPER) West Lafayette, Indiana email:
More informationDetecting malicious tampering in digital images
Detecting malicious tampering in digital images Markos Zampoglou - markzampoglou@iti.gr Information Technologies Institute (ITI) Centre for Research and Technology Hellas (CERTH) Workshop on Tools for
More informationREVVIND REVerse engineering of audio-visual content Data
FP7-ICT-2007-C GA No. 268478 D5.4 Initial report on evaluation of footprint detectors LAST MODIFICATION: 30.04.2013 REPORTING ORGANIZATION: FRAUNHOFER (INSTITUTE FOR DIGITAL MEDIA TECHNOLOGY) GERMANY AUTHORS:
More informationAN OVERVIEW ON VIDEO FORENSICS
AN OVERVIEW ON VIDEO FORENSICS P. Bestagini,M. Fontani,, S. Milani, M. Barni,, A.Piva,,M. Tagliasacchi, S.Tubaro Politecnico di Milano, Dipartimento di Elettronica e Informazione, Milano, Italy University
More informationAn overview on video forensics
An overview on video forensics 1 S. Milani 1, M. Fontani 2,4, P. Bestagini 1, M. Barni 2,4, A. Piva 3,4, M. Tagliasacchi 1, S. Tubaro 1 1 Politecnico di Milano, Dipartimento di Elettronica e Informazione,
More informationCHAPTER 1: INTRODUCTION
CHAPTER 1: INTRODUCTION In the modern age, digital images and videos have become the main information carriers to disseminate knowledge and establish the bridge among several sources. Visual information
More informationIMAGE PHYLOGENY THROUGH DISSIMILARITY METRICS FUSION
IMAGE PHYLOGENY THROUGH DISSIMILARITY METRICS FUSION A. Melloni, P. Bestagini, S. Milani, M. Tagliasacchi, A. Rocha, S. Tubaro Dipartimento di Elettronica, Informazione e Bioingegneria Politecnico di Milano,
More information(JBE Vol. 23, No. 6, November 2018) Detection of Frame Deletion Using Convolutional Neural Network. Abstract
(JBE Vol. 23, No. 6, November 2018) (Regular Paper) 23 6, 2018 11 (JBE Vol. 23, No. 6, November 2018) https://doi.org/10.5909/jbe.2018.23.6.886 ISSN 2287-9137 (Online) ISSN 1226-7953 (Print) CNN a), a),
More informationModelling Radial Distortion Chains for Video Recapture Detection
Modelling Radial Distortion Chains for Video Recapture Detection Marco Visentini-Scarzanella 1, Pier Luigi Dragotti 2 Communications and Signal Processing Group Department of Electrical and Electronic
More informationVIDEO CODEC IDENTIFICATION EXTENDING THE IDEMPOTENCY PROPERTY. P. Bestagini, S. Milani, M. Tagliasacchi, S. Tubaro
VIDEO CODEC IDENTIFICATION EXTENDING THE IDEMPOTENCY PROPERTY P. Bestagini, S. Milani, M. Tagliasacchi, S. Tubaro Dipartimento di Elettronica ed Informazione, Politecnico di Milano piazza Leonardo da Vinci
More informationIRMOS Newsletter. Issue N 5 / January Editorial. In this issue... Dear Reader, Editorial p.1
IRMOS Newsletter Issue N 5 / January 2011 In this issue... Editorial Editorial p.1 Highlights p.2 Special topic: The IRMOS Repository p.5 Recent project outcomes p.6 Keep in touch with IRMOS p.8 Dear Reader,
More informationPolitecnico di Torino. Porto Institutional Repository
Politecnico di Torino Porto Institutional Repository [Proceeding] Detection and classification of double compressed MP3 audio tracks Original Citation: Tiziano Bianchi;Alessia De Rosa;Marco Fontani;Giovanni
More informationForensic analysis of JPEG image compression
Forensic analysis of JPEG image compression Visual Information Privacy and Protection (VIPP Group) Course on Multimedia Security 2015/2016 Introduction Summary Introduction The JPEG (Joint Photographic
More informationRiskSense Attack Surface Validation for IoT Systems
RiskSense Attack Surface Validation for IoT Systems 2018 RiskSense, Inc. Surfacing Double Exposure Risks Changing Times and Assessment Focus Our view of security assessments has changed. There is diminishing
More informationPreemptive PREventivE Methodology and Tools to protect utilities
Preemptive PREventivE Methodology and Tools to protect utilities 2014 2017 With the financial support of FP7 Seventh Framework Programme Grant agreement no: 607093 1 Preemptive description Project objectives
More informationFRAGILE WATERMARKING USING SUBBAND CODING
ICCVG 2002 Zakopane, 25-29 Sept. 2002 Roger ŚWIERCZYŃSKI Institute of Electronics and Telecommunication Poznań University of Technology roger@et.put.poznan.pl FRAGILE WATERMARKING USING SUBBAND CODING
More informationVersion 11
The Big Challenges Networked and Electronic Media European Technology Platform The birth of a new sector www.nem-initiative.org Version 11 1. NEM IN THE WORLD The main objective of the Networked and Electronic
More informationValue of YouTube to the music industry Paper V Direct value to the industry
Value of YouTube to the music industry Paper V Direct value to the industry June 2017 RBB Economics 1 1 Introduction The music industry has undergone significant change over the past few years, with declining
More informationInternet Television. Chapter Internet Television vs. IPTV. Internet Television
Chapter 8 Internet Television In concluding this book, we will examine what we can consider to represent an evolving industry television delivered via the Internet. Although television delivered via the
More information1. Publishable Summary
1. Publishable Summary 1.1Project objectives and context Identity management (IdM) has emerged as a promising technology to distribute identity information across security domains. In e-business scenarios,
More informationTotal Variation Based Forensics for JPEG Compression
International Journal of Research Studies in Science, Engineering and Technology Volume 1, Issue 6, September 2014, PP 8-13 ISSN 2349-4751 (Print) & ISSN 2349-476X (Online) Total Variation Based Forensics
More information!!!!!! Portfolio Summary!! for more information July, C o n c e r t T e c h n o l o g y
Portfolio Summary July, 2014 for more information www.concerttechnology.com bizdev@concerttechnology.com C o n c e r t T e c h n o l o g y Overview The screenplay project covers emerging trends in social
More informationForensic Analysis Approach Based on Metadata and Hash Values for Digital Objects in the Cloud
Forensic Analysis Approach Based on Metadata and Hash Values for Digital Objects in the Cloud Ezz El-Din Hemdan 1, Manjaiah D.H 2 Research Scholar, Department of Computer Science, Mangalore University,
More informationD7.6 Project video. Project ref. no. H2020-ICT GA No BINCI Binaural tools for the creative industries
D7.6 Project video Project ref. no. H2020-ICT-21-2016 GA No. 732130 Project title BINCI Binaural tools for the creative industries Duration of the project 1 January 2017-30 June 2018 (18 months) WP/Task:
More informationD.9.1 Web Portal Creation and Launch
HERMES Cognitive Care and Guidance for Active Aging FP7-ICT 216709 Specific Targeted Research or Innovation Project Start date of project: January 1, 2008 Duration: 36 months D.9.1 Web Portal Creation
More informationRate-distortion Optimized Streaming of Compressed Light Fields with Multiple Representations
Rate-distortion Optimized Streaming of Compressed Light Fields with Multiple Representations Prashant Ramanathan and Bernd Girod Department of Electrical Engineering Stanford University Stanford CA 945
More informationLau Zuydervelt. Product Marketing Director (Watermarking) 2018 Irdeto. All Rights Reserved.
Watermarking is much more than just an anti-piracy tool Lau Zuydervelt Product Marketing Director (Watermarking) +5 BILLION DEVICES AND APPLICATIONS SECURED IRDETO IS THE WORLD LEADER IN DIGITAL PLATFORM
More informationMultiple Classifier Systems for Image Forgery Detection
Multiple Classifier Systems for Image Forgery Detection Davide Cozzolino, Francesco Gargiulo, Carlo Sansone, and Luisa Verdoliva DIETI, University of Naples Federico II {davide.cozzolino,francesco.grg,carlosan,verdoliv}@unina.it
More informationA Forensic Tool for Investigating Image Forgeries
A Forensic Tool for Investigating Image Forgeries Marco Fontani, University of Siena, Via Roma 56, 53100, Siena, Italy Tiziano Bianchi, Politecnico di Torino, Corso Duca degli Abruzzi 24, 10129, Torino,
More informationDetecting Digital Image Forgeries By Multi-illuminant Estimators
Research Paper Volume 2 Issue 8 April 2015 International Journal of Informative & Futuristic Research ISSN (Online): 2347-1697 Detecting Digital Image Forgeries By Multi-illuminant Estimators Paper ID
More informationRate-distortion Optimized Streaming of Compressed Light Fields with Multiple Representations
Rate-distortion Optimized Streaming of Compressed Light Fields with Multiple Representations Prashant Ramanathan and Bernd Girod Department of Electrical Engineering Stanford University Stanford CA 945
More informationOutline Introduction MPEG-2 MPEG-4. Video Compression. Introduction to MPEG. Prof. Pratikgiri Goswami
to MPEG Prof. Pratikgiri Goswami Electronics & Communication Department, Shree Swami Atmanand Saraswati Institute of Technology, Surat. Outline of Topics 1 2 Coding 3 Video Object Representation Outline
More informationKEY BENEFITS OF A TIKILIVE NETWORK
EXTEND YOUR BRAND AND GENERATE REVENUE WITH TIKILIVE HD STREAMING COMMUNITY TIKILIVE.COM KEY BENEFITS OF A TIKILIVE NETWORK Easily brand connect, manage and monetize your HD content Realize immediate viewer
More informationEffective Threat Modeling using TAM
Effective Threat Modeling using TAM In my blog entry regarding Threat Analysis and Modeling (TAM) tool developed by (Application Consulting and Engineering) ACE, I have watched many more Threat Models
More informationProject Periodic Report Summary
Project Periodic Report Summary Month 12 Date: 24.7.2014 Grant Agreement number: EU 323567 Project acronym: HARVEST4D Project title: Harvesting Dynamic 3D Worlds from Commodity Sensor Clouds TABLE OF CONTENTS
More informationDigital Image Processing
Digital Image Processing Fundamentals of Image Compression DR TANIA STATHAKI READER (ASSOCIATE PROFFESOR) IN SIGNAL PROCESSING IMPERIAL COLLEGE LONDON Compression New techniques have led to the development
More informationOpinion 02/2012 on facial recognition in online and mobile services
ARTICLE 29 DATA PROTECTION WORKING PARTY 00727/12/EN WP 192 Opinion 02/2012 on facial recognition in online and mobile services Adopted on 22 March 2012 This Working Party was set up under Article 29 of
More informationA study of Video Response Spam Detection on YouTube
A study of Video Response Spam Detection on YouTube Suman 1 and Vipin Arora 2 1 Research Scholar, Department of CSE, BITS, Bhiwani, Haryana (India) 2 Asst. Prof., Department of CSE, BITS, Bhiwani, Haryana
More informationCloud Movie: Cloud Based Dynamic Resources Allocation And Parallel Execution On Vod Loading Virtualization
Cloud Movie: Cloud Based Dynamic Resources Allocation And Parallel Execution On Vod Loading Virtualization Akshatha K T #1 #1 M.Tech 4 th sem (CSE), VTU East West Institute of Technology India. Prasad
More informationReverse engineering of double compressed images in the presence of contrast enhancement
Reverse engineering of double compressed images in the presence of contrast enhancement P. Ferrara #, T. Bianchi, A. De Rosa, A. Piva # National Institute of Optics (INO), Firenze, Italy pasquale.ferrara@ino.it
More informationIncident Response Services
Services Enhanced with Supervised Machine Learning and Human Intelligence Empowering clients to stay one step ahead of the adversary. Secureworks helps clients enable intelligent actions to outsmart and
More informationStandardization Activities in ITU-T
Standardization Activities in ITU-T Nozomu NISHINAGA and Suyong Eum Standardization activities for Future Networks in ITU-T have produced 19 Recommendations since it was initiated in 2009. The brief history
More informationSeminar Day HH&RA. Buk 23rd November 2016 Helena Egan, Global Director Industry Relations
Seminar Day HH&RA Buk 23rd November 2016 Helena Egan, Global Director Industry Relations MISSION HELP TRAVELERS PLAN AND BOOK THE BEST TRIP TripAdvisor Today o v e r 6.8 MILLION businesses listed o v e
More informationPhishing Activity Trends Report August, 2006
Phishing Activity Trends Report, 26 Phishing is a form of online identity theft that employs both social engineering and technical subterfuge to steal consumers' personal identity data and financial account
More informationPractical methods for digital video forensic authentication
Practical methods for digital video forensic authentication Jinhua Zeng, * Shaopei Shi, Yan Li, Qimeng Lu, Xiulian Qiu Institute of Forensic Science, Ministry of Justice, Shanghai 200063, China *Corresponding
More informationMassive Data Analysis
Professor, Department of Electrical and Computer Engineering Tennessee Technological University February 25, 2015 Big Data This talk is based on the report [1]. The growth of big data is changing that
More informationRevealing the Traces of JPEG Compression Anti-Forensics
IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, VOL. 8, NO. 2, FEBRUARY 2013 335 Revealing the Traces of JPEG Compression Anti-Forensics Giuseppe Valenzise, Member, IEEE, Marco Tagliasacchi, Member,
More informationKey Learning in Computing: Years 5 and 6 Information Technology
Information Technology Programme of Study Select, use and combine a variety of software (including internet services) on a range of digital devices to design and creat e a range of programs, systems and
More informationIoT privacy risk management in ANASTACIA project
ANASTACIA has received funding from the European Union s Horizon 2020 Research and Innovation Programme under Grant Agreement N 731558 and from the Swiss State Secretariat for Education, Research and Innovation.
More informationForensic Image Recognition using a Novel Image Fingerprinting and Hashing Technique
Forensic Image Recognition using a Novel Image Fingerprinting and Hashing Technique R D Neal, R J Shaw and A S Atkins Faculty of Computing, Engineering and Technology, Staffordshire University, Stafford
More informationImage and video processing
Image and video processing Digital video Dr. Pengwei Hao Agenda Digital video Video compression Video formats and codecs MPEG Other codecs Web video - 2 - Digital Video Until the arrival of the Pentium
More informationLive Broadcast: Video Services from AT&T
Delivering your content through the power of the cloud Live Broadcast: Video Services from AT&T Getting your content to your audience is becoming increasingly diverse and complex. Today, people want to
More informationEnhanced Performance of Search Engine with Multitype Feature Co-Selection of Db-scan Clustering Algorithm
Enhanced Performance of Search Engine with Multitype Feature Co-Selection of Db-scan Clustering Algorithm K.Parimala, Assistant Professor, MCA Department, NMS.S.Vellaichamy Nadar College, Madurai, Dr.V.Palanisamy,
More informationData Hiding in Video
Data Hiding in Video J. J. Chae and B. S. Manjunath Department of Electrical and Computer Engineering University of California, Santa Barbara, CA 9316-956 Email: chaejj, manj@iplab.ece.ucsb.edu Abstract
More informationA Study on Transmission System for Realistic Media Effect Representation
Indian Journal of Science and Technology, Vol 8(S5), 28 32, March 2015 ISSN (Print) : 0974-6846 ISSN (Online) : 0974-5645 DOI : 10.17485/ijst/2015/v8iS5/61461 A Study on Transmission System for Realistic
More informationBinju Bentex *1, Shandry K. K 2. PG Student, Department of Computer Science, College Of Engineering, Kidangoor, Kottayam, Kerala, India
International Journal of Scientific Research in Computer Science, Engineering and Information Technology 2018 IJSRCSEIT Volume 3 Issue 3 ISSN : 2456-3307 Survey on Summarization of Multiple User-Generated
More informationEmbarking on the next stage of hosted desktop delivery for international events management company
Embarking on the next stage of hosted desktop delivery for international events management company Richmond Events is an international events management company, delivering a diverse range of forums and
More informationArchive Legislation: archiving in the United Kingdom. The key laws that affect your business
Archive Legislation: Email archiving in the United Kingdom The key laws that affect your business Contents Laws regulating archiving, who they apply to and the penalties 3 Who is affected? 3 All private
More informationAuthentication and Secret Message Transmission Technique Using Discrete Fourier Transformation
, 2009, 5, 363-370 doi:10.4236/ijcns.2009.25040 Published Online August 2009 (http://www.scirp.org/journal/ijcns/). Authentication and Secret Message Transmission Technique Using Discrete Fourier Transformation
More informationNational Data Sharing and Accessibility Policy-2012 (NDSAP-2012)
National Data Sharing and Accessibility Policy-2012 (NDSAP-2012) Department of Science & Technology Ministry of science & Technology Government of India Government of India Ministry of Science & Technology
More informationSearching User-generated Video Content based on Link Relationships between Videos and Blogs
Searching User-generated Video Content based on Relationships between Videos and Blogs User-generated Video Blogs Video Search Searching User-generated Video Content based on Relationships between Videos
More informationCountering Anti-Forensics by Means of Data Fusion
Countering Anti-Forensics by Means of Data Fusion Marco Fontani a, Alessandro Bonchi b, Alessandro Piva b and Mauro Barni c a CNIT, University of Siena, 53100 Siena, Italy; b University of Florence, 50139
More informationCompressive Sensing for Multimedia. Communications in Wireless Sensor Networks
Compressive Sensing for Multimedia 1 Communications in Wireless Sensor Networks Wael Barakat & Rabih Saliba MDDSP Project Final Report Prof. Brian L. Evans May 9, 2008 Abstract Compressive Sensing is an
More informationESKIAV3 (SQA Unit Code - F9AM 04) Audio and Video Software
Overview This is the ability to use a software application designed to record and edit audio and video sequences. ESKIAV3 (SQA Unit Code - F9AM 04) 1 Performance criteria You must be able to: You must
More informationIn focus: Broadcasting. Challenges within the broadcasting industry
In focus: Broadcasting Challenges within the broadcasting industry Contents A new world 3 The issues broadcasters are facing 4 ICT challenges for the media sector 5 The focus has changed 6 Where we re
More informationTRIBHUVAN UNIVERSITY Institute of Engineering Pulchowk Campus Department of Electronics and Computer Engineering
TRIBHUVAN UNIVERSITY Institute of Engineering Pulchowk Campus Department of Electronics and Computer Engineering A Final project Report ON Minor Project Java Media Player Submitted By Bisharjan Pokharel(061bct512)
More informationLINEAR VIDEO DELIVERY FROM THE CLOUD. A New Paradigm for 24/7 Broadcasting WHITE PAPER
WHITE PAPER LINEAR VIDEO DELIVERY FROM THE CLOUD A New Paradigm for 24/7 Broadcasting Copyright 2016 Elemental Technologies. Linear Video Delivery from the Cloud 1 CONTENTS Introduction... 3 A New Way
More informationPhishing Activity Trends Report August, 2005
Phishing Activity Trends Report August, 25 Phishing is a form of online identity theft that employs both social engineering and technical subterfuge to steal consumers' personal identity data and financial
More informationNovel Lossy Compression Algorithms with Stacked Autoencoders
Novel Lossy Compression Algorithms with Stacked Autoencoders Anand Atreya and Daniel O Shea {aatreya, djoshea}@stanford.edu 11 December 2009 1. Introduction 1.1. Lossy compression Lossy compression is
More informationSecurity Assurance Framework for Networked Vehicular Technology
D7.2 SAFERtec Website Security Assurance Framework for Networked Vehicular Technology Abstract SAFERtec proposes a flexible and efficient assurance framework for security and trustworthiness of Connected
More informationThe Watchful Forensic Analyst: Multi-Clue Information Fusion with Background Knowledge
The Watchful Forensic Analyst: Multi-Clue Information Fusion with Background Knowledge Marco Fontani #, Enrique Argones-Rúa 2, Carmela Troncoso 3, Mauro Barni #4 # Dept. of Information Engineering and
More informationWorldScreen. Layered Scheme Compression for the Digital Cinema Chain. Mike Christmann.
WorldScreen Layered Scheme Compression for the Digital Cinema Chain Mike Christmann http://www.worldscreen.org Project Overview Acronym: WorldScreen Duration: 09/2004 04/2007 Partners: 8 + 2 associated
More informationReport from the Ad Hoc Committee for Task Force Maximization and Knowledge Sharing
Report from the Ad Hoc Committee for Task Force Maximization and Knowledge Sharing Presented by: Sallie Greenberg CSLF Technical Group Meeting Melbourne, Australia - 17 October 2018 2017 PIRT Abu Dhabi
More informationGeorgios Tziritas Computer Science Department
New Video Coding standards MPEG-4, HEVC Georgios Tziritas Computer Science Department http://www.csd.uoc.gr/~tziritas 1 MPEG-4 : introduction Motion Picture Expert Group Publication 1998 (Intern. Standardization
More information15412/16 RR/dk 1 DGD 1C
Council of the European Union Brussels, 12 December 2016 (OR. en) 15412/16 ENFOPOL 484 ENV 791 ENFOCUSTOM 235 OUTCOME OF PROCEEDINGS From: General Secretariat of the Council On: 8 December 2016 To: Delegations
More informationPrivacy Policy. 1. Information may collected by Feelingtouch
Privacy Policy When you use Feelingtouch game software or accept Feelingtouch game services, Feelingtouch may collect and use your relevant information. Feelingtouch promises to strictly protect your privacy.
More informationDetection and localization of double compression in MP3 audio tracks
Bianchi et al. EURASIP Journal on Information Security 214, 214:1 http://jis.eurasipjournals.com/content/214/1/1 RESEARCH Detection and localization of double compression in MP3 audio tracks Tiziano Bianchi
More informationCYBERCRIME AS A NEW FORM OF CONTEMPORARY CRIME
FACULTY OF LAW DEPARTEMENT: CIVIL LAW MASTER STUDY THEME: CYBERCRIME AS A NEW FORM OF CONTEMPORARY CRIME Mentor: Prof. Ass. Dr. Xhemajl Ademaj Candidate: Abdurrahim Gashi Pristinë, 2015 Key words List
More informationMultimodal Information Spaces for Content-based Image Retrieval
Research Proposal Multimodal Information Spaces for Content-based Image Retrieval Abstract Currently, image retrieval by content is a research problem of great interest in academia and the industry, due
More informationResearch Article A Novel Steganalytic Algorithm based on III Level DWT with Energy as Feature
Research Journal of Applied Sciences, Engineering and Technology 7(19): 4100-4105, 2014 DOI:10.19026/rjaset.7.773 ISSN: 2040-7459; e-issn: 2040-7467 2014 Maxwell Scientific Publication Corp. Submitted:
More informationTech Note - 05 Surveillance Systems that Work! Calculating Recorded Volume Disk Space
Tech Note - 05 Surveillance Systems that Work! Surveillance Systems Calculating required storage drive (disk space) capacity is sometimes be a rather tricky business. This Tech Note is written to inform
More informationD2.2 Web Platform development
EUBrazilCC EU-Brazil Cloud infrastructure Connecting federated resources for Scientific Advancement D2.2 Web Platform development Contract number: FP7-614048 / Start Date of Project: 1 October 2013 Duration
More informationIPTV Explained. Part 1 in a BSF Series.
IPTV Explained Part 1 in a BSF Series www.aucklandsatellitetv.co.nz I N T R O D U C T I O N As a result of broadband service providers moving from offering connectivity to services, the discussion surrounding
More informationGDPR: An Opportunity to Transform Your Security Operations
GDPR: An Opportunity to Transform Your Security Operations McAfee SIEM solutions improve breach detection and response Is your security operations GDPR ready? General Data Protection Regulation (GDPR)
More informationRiskSense Attack Surface Validation for Web Applications
RiskSense Attack Surface Validation for Web Applications 2018 RiskSense, Inc. Keeping Pace with Digital Business No Excuses for Not Finding Risk Exposure We needed a faster way of getting a risk assessment
More informationMultimedia Databases. Wolf-Tilo Balke Younès Ghammad Institut für Informationssysteme Technische Universität Braunschweig
Multimedia Databases Wolf-Tilo Balke Younès Ghammad Institut für Informationssysteme Technische Universität Braunschweig http://www.ifis.cs.tu-bs.de Previous Lecture Audio Retrieval - Query by Humming
More informationDIGITAL FORENSICS FORENSICS FRAMEWORK FOR CLOUD COMPUTING
17.09.24 DIGITAL FORENSICS FORENSICS FRAMEWORK FOR CLOUD COMPUTING FORENSICS FRAMEWORK FOR CLOUD COMPUTING OUTLINE Abstract Introduction Challenges in cloud forensics Proposed solution Conclusion Opinion
More informationTips on DVD Authoring and DVD Duplication M A X E L L P R O F E S S I O N A L M E D I A
Tips on DVD Authoring and DVD Duplication DVD Authoring - Introduction The postproduction business has certainly come a long way in the past decade or so. This includes the duplication/authoring aspect
More informationIssues of Operating Systems Security
ECAI 2007 - International Conference Second Edition Electronics, Computers and Artificial Intelligence 29 th 30 th June, 2007, Piteşti, ROMÂNIA Issues of Operating Systems Security Academy of Economic
More informationOptimal Video Adaptation and Skimming Using a Utility-Based Framework
Optimal Video Adaptation and Skimming Using a Utility-Based Framework Shih-Fu Chang Digital Video and Multimedia Lab ADVENT University-Industry Consortium Columbia University Sept. 9th 2002 http://www.ee.columbia.edu/dvmm
More informationMetadata, Chief technicolor
Metadata, the future of home entertainment Christophe Diot Christophe Diot Chief Scientist @ technicolor 2 2011-09-26 What is a metadata? Metadata taxonomy Usage metadata Consumption (number of views,
More informationMESH. Multimedia Semantic Syndication for Enhanced News Services. Project Overview
MESH Multimedia Semantic Syndication for Enhanced News Services Project Overview Presentation Structure 2 Project Summary Project Motivation Problem Description Work Description Expected Result The MESH
More informationWATERMARKING FOR LIGHT FIELD RENDERING 1
ATERMARKING FOR LIGHT FIELD RENDERING 1 Alper Koz, Cevahir Çığla and A. Aydın Alatan Department of Electrical and Electronics Engineering, METU Balgat, 06531, Ankara, TURKEY. e-mail: koz@metu.edu.tr, cevahir@eee.metu.edu.tr,
More information