CHAPTER 1: INTRODUCTION

Size: px
Start display at page:

Download "CHAPTER 1: INTRODUCTION"

Transcription

1 CHAPTER 1: INTRODUCTION In the modern age, digital images and videos have become the main information carriers to disseminate knowledge and establish the bridge among several sources. Visual information has a capability to convey the broader spectrum of information because of its ease in acquisition, distribution, and storage to express knowledge, thoughts, evidences, etc. and represents one of the effective means for communication since eras. The advancements in visual (video) technologies, viz. compression, editing, retrieval, transmission, etc. have facilitated the society at several domains such as social, technological, educational, medical, entertainment, commercial, etc. beside to video surveillance and legal evidence. In the socio-economic knowledge and scientific development, images and videos available at various video sharing and social networking websites (viz. YouTube, TacherTube, Google Videos, facebook, etc.) are becoming modern need and signify their unprecedented role in the current context [1-3]. Apart from several useful applications in diversified domains, there are some darker sides of visual (video) information, viz. misuse or the wrong projection of information through videos. One of them is video tampering, where a forger can intentionally manipulate actual or original videos to create tampered or doctored videos for malpractice [4-10] viz. video based forgery, doctored video evidences, criminal activities, defamation, etc. However, video tampering is relatively new area; image doctoring is as old as the art of photography itself where numerous incidences of serious cases of fake photographs have been reported in literature [10-16]. Some of the famous manipulations with visual information which includes photographs, videos, and audios have been displayed in Figure 1.1. The easy availability of many sophisticated video editing tools provides a platform for forger to manipulate original videos and create perceptually indistinguishable fake videos. Every malicious manipulation with videos is not equally consequential [17], but in many serious scenarios viz. video surveillance, defamation, etc. where video is submitted as evidence during court trials and 1

2 one of the parties involved in the litigation disagree about the authenticity of the video in evidence, the authenticity or originality of videos are necessary to be examined [18][19]. (b) Many fake videos were aired, claiming the video is (a) Mikhail G. Delyagin was digitally erased from a video original and captured during WTO building collapse captured during Russian Talk Show in 2007 (c) Joseph Goebbels was erased from the photo which was captured in 1937 during the meet of Hitler and Leni Riefenstahl. First photo is the doctored photo, whereas second one is the original photo of that meet. (d) In order to conceal that second missile from the right (the second photo which is the original photo) had not fired during Iranian Missile Test in 2008, it was decided to paste a successful launch (first photo, which is doctored photo) in its place. (e) An ongoing controversy in India, which is under litigation and yet to prove or disprove the authenticity of the evidence (in form of conversation between the persons involved in litigation). Source of Figures Figure 1.1(a) Figure 1.1(b) Figure 1.1(c) and (d) Figure 1.1(e) Figure 1.1: Some of the famous manipulation with visual information 2 Accessed on 26 Jan 2014

3 Here, video forensic laboratories and experts play a key role to examine the authenticity of videos as well as detection of location of tampering in videos either through visual examination [20] or by detecting the traces or clue or fingerprints (if any) of tampering left by forger while creation of doctored videos [21]. The success or failure of experts to verify the authenticity of videos depend upon how intelligently tampering has been carried out by the forger. It is difficult for forensic experts to verify the authenticity of a video and/or detect the location of tampering in videos, if there are no (or little) traces left by forger while tampering. Although tampering with visual information is not new, digital video forensic (a branch of multimedia security) is still an emerging research area and scientific community is involved in the development of established methodologies to examine the authenticity and credibility of videos as well as detection of location of tampering (i.e. detection of tampering) in an automatic manner [4][5][22-26]. On the other hand, anti-forensics is the branch of multimedia security which facilitates the forger to counter the existing forensic techniques and procedures. Although some anti-forensic techniques are available in literature [27-30] which provide guidance to the forger, but the primary expectation from the forger is to perform such manipulation which is perceptually indistinguishable and deceive casual eye [4]. It is evident from Figure 1.1 (c) that due to casual manipulation a perceptually visible clue / trace is left by forger, where the removal of Joseph Goebbels from the original photo resulted into the quality degradation in surrounding pixels of tampered photo, whereas there is no perceptually visible clue left by forger in the photograph of Figure 1.1 (d). Here, the video quality assessment methods [31-36] may helpful for forger to assess the quality degradation in tampered video with reference to original video and accordingly manipulations can be performed by the forger. However, in literature, a little contribution have been made over this aspect of anti-forensic [37-40], one of the project involving quality assessment for multimedia security is under development at University of Surrey [41]. 3

4 The involvement of digital videos in our day to day life, its prevalence in criminal activities in recent years, and lack of established methodologies as a preventive measure for forensic science and counter measure for anti-forensics seeks immediate attention of the scientific community and our motivation to carry out the research in the domain of multimedia security. In the thesis, our contribution is majorly focused toward development of efficient schemes for followings. (a) Detection of tampering with videos, and (b) Quality assessment in tampered videos The forger can manipulate videos in numerous ways to create tampered videos. A single scheme may not detect all types of tampering; therefore we developed the schemes focused to a specific form of tampering which cannot be applied singlehandedly to detect all types of video tampering. Similarly, the scheme developed for quality assessment in tampered videos cannot be applied to assess the quality in all types of tampered videos. In the following sections, we provide basics of digital videos and different ways to tamper videos, modes of tampering detection, and fundamentals of video quality assessment along with our assumptions and considerations. Section 1.1 presents the tampering with videos. Section 1.2 focuses over the detection of tampering with videos. Fundamentals of quality assessment are presented in Section 1.3. Organization of the thesis is outlined in Section Tampering with videos There can be two types of videos, viz. analog video and digital video, but throughout in the thesis, the word video is used to state the digital video. Besides the video basics, this section presents the tampering domains, levels of tampering and common tampering with videos. As illustrated in Figure 1.2, a video consists of a time-ordered sequence of orthogonal bitmap images (often called as frames), where each frame consists of w h pixels (w and h are the width and height of a frame respectively), i.e. a video is represented in three dimensions involving two domains, viz. temporal domain (i.e. the time-ordered set of frames) and spatial domain (i.e. the pixel domain of w h pixels). In other words, pixels are the smallest unit in spatial domain or in an image, whereas frames are the smallest unit in temporal domain. 4

5 w h P 1 1 P P 1 w P 2 1 P P 2 w Timeordered frames V(1) V(2) V(m 1) V(m) P h 1 P h P h w (a) A video V is a time-ordered sequence of frames. Here, V(i), represents i th frame in V (b) Each frame consists of w h pixels, where, w and h are the width and height of a frame. Figure 1.2: Video as a sequence of frames Each frame is captured at a constant rate and the number of frames captured per second (fps) depends upon the hardware specifications of video capturing device. Since, these devices capture several frames per seconds (usually 25 to 30 fps) it is quiet often to have temporally redundant frames in raw or uncompressed videos (where each frame consists redundant pixels, i.e. spatial redundancy) resulting into high bit rate and large volume of video data [42]. Temporal variation or redundancy depends on various parameters, viz. camera motion (still or motion), object motion (still or motion), sensor noise, illumination and reflectance change, etc [43]. However, these parameters are important to characterize a video; we have not considered them as input parameters for the schemes developed in this thesis. Further, using various compression techniques [42][43], video encoders reduce the spatial and temporal redundancies and compress these raw videos for efficient storage. Videos may be available in compressed form but to process a video, the conventional approach is to uncompress the video, perform the processing with decoded video, and re-encode the video [44][45]. Videos, which are publicly available in compressed or uncompressed form, are the major source for creating tampered videos. These tampered videos can be created involving either a single video, i.e. single source, or multiple videos, i.e. many sources [5]. In this thesis, our aim is to develop schemes for detection of tampering in such tampered videos which were created from single source video. The next section presents the domains in which videos can be manipulated Tampering Domain Depending upon the domain in which manipulation is performed, there can be following types of video tampering [46-51] 5

6 (a) Tampering in spatial domain (i.e. Spatial Tampering) (b) Tampering in temporal domain (i.e. Temporal Tampering) (c) Tampering in spatio-temporal domain (i.e. Spatio-Temporal Tampering) A forger can tamper source videos spatially (i.e. spatial tampering) by manipulating pixel bits within a video frame or across the video frames (i.e. set of adjacent frames). Figure 1.3 (b) presents a spatially tampered video created from the actual video of Figure 1.3 (a). Further, as presented in Figure 1.3 (c), forger can tamper source videos by disturbing the frame sequence (i.e. temporal tampering) through frames replacement, frames addition, and by the removal of video frames and thus create temporally tampered videos. P 11 P P h w P 11 ' P 12 ' - - P P 21 P P P P - - P (a) Actual or Original Video V(1) V(5) V(4) V(3) V(2) V(6) P 21 ' P 22 ' - - P P P - - P (b) Manipulation with pixels V(1) V(5) V(4) V(3) V(2) V(6) Frames P P - - P P V(6) P - - P V(5 ) = V(3) V(4 ) = V(3) V(3) P P - - P V(2) V(1) (c) Manipulation with the frame sequence Frames w h P 11 ' P 12 ' - - P P 21 ' P 22 ' - - P V(6) V(5 ) = V(3) V(4 ) = V(3) V(3) P P - - P V(2) V(1) (d) Manipulation with pixels as well as frame sequence An example of (a) Actual video (b) Spatially tampered video (c) Temporally tampered video and (d) Spatio-temporal tampered video. Where V(i) represents the i frame and P is the pixel intensity. V(i ) is the manipulated i frame and P is the manipulated pixel intensity. Figure 1.3: Video Tampering Domains 6

7 Lastly, referring Figure 1.3 (d), forger can tamper videos in combination of both spatial and temporal domain (i.e. spatio-temporal tampering) by manipulating pixel bits within a video frame or across the video frames (i.e. set of adjacent frames) as well as disturb the frame sequence and thus create spatio-temporally tampered videos. Over the past few years, significant contributions have been made for detection of spatial tampering or image tampering [4][22], whereas, relatively little contributions have been made for detection of temporal tampering. Thus, this thesis aims to detect the temporal tampering (i.e. tampering with frame sequence) in temporally or spatio-temporally tampered videos. Proceeding section describes the level at which temporal tampering is possible Levels of Temporal Tampering Videos can be manipulated or tampered by a forger at following levels [46-48][52-54] (a) Frame level (b) Scene level (c) Video level In temporal domain, frame is the smallest unit, whereas a video scene is comprised of semantically related sequence of video frames [55]. Based on the accumulative changes in successive frames, scenes in a video are often bounded by either, abrupt change between successive frames in a video or gradual change [56][57]. In this thesis, our consideration about a scene is the sequence of gradually changing successive frames in a video and we will call change of scene when there is abrupt change between two successive frames. Depending upon above discussion, videos can be manipulated at frame level viz. frames of a video (irrespective of scene) can be deleted, or intermediate frames of a video scene can be removed. At the scene level, an entire scene of a video is manipulated viz. deletion of a video scene (i.e. scene deletion), copying of a video scene to another place, etc. Finally, there can be manipulations at the video level viz. making copy of a video. Although, videos may be temporally tampered at the video level, some temporal tampering may not feasible at the video level viz. deletion of frames at video level will be resulted into deletion 7

8 of entire video. Thus, this thesis aims to detect temporal tampering in such videos which were created by manipulating video frames at frame and scene level. Next section presents commonly used temporal tampering with videos Common Temporal Tampering with Videos However, one can temporally manipulate videos in several ways, mostly addressed temporal tampering in literature are mentioned below [46-50][52][53][58-77] (a) Frame Drop or Frame Deletion or Frame Removal (b) Frame Swapping or Reordering of frame sequences (c) Frame Copy or Frame Addition While tampering with original or source video, forger can drop or delete frames of his/her choice, resulting into tampered or doctored videos with reduced frame count. These frames can be the intermediate frames of a video scene or can be the set of frames spread into two scenes. Although, the count of frames get reduced due to tampering of frame drop, but the order or sequence of frames remain unchanged, i.e. if i frame appears before the j frame in the original video and if both frames are present in tampered video (i.e. non dropped frames), then their order will remain same in the tampered video. Figure 1.4 (b) illustrates an example of frame drop at the frame level, where V T is the tampered video created by deleting frames in the original video V O, presented in Figure 1.4 (a). Further, deletion can also be performed at the scene level, i.e. an entire scene is removed or dropped by deleting all frames (i.e. i frame to j frame, where i < j) in that scene. Unlike frame drop, frame count remains unchanged while swapping the video frames (or reordering the frame sequences) to create a tampered or doctored video from original or source video. At the frame level, these swapped frames can be intermediate video frames of one/two scene(s), whereas, there will be swapping of entire scene at the scene level, i.e. all frames of one scene may be swapped with all frames of another scene. Although, the number of frames in tampered video remains same as in original video, but the tampering of frame swapping will be resulted into disordering of frames, i.e. if, the i frame appears before the j frame in the 8

9 original video then the swapping of i and j frames to create a tampered video will disorder the frame sequence in tampered video. Figure 1.4 (c) presents an example depicting tampering of the frame swapping at the frame level. Drop of frames V O (3) and V O (4) V O (1) V O (2) V O (3) V O (4) V O (5) V O (6) V T (1) V O (1) V T (2) V O (2) V O (3) V O (4) V T (3) V O (5) V T (4) V O (6) Temporal domain (a) An example of original video V with 6 video frames Swapping of frames V O (2) and V O (5) (b) Temporal tampering of frame drop. V is a temporally tampered video created by dropping frames in V Copying of frames V O (2) and V O (3) V T (1) V O (1) V T (2) V O (5) V T (3) V O (3) V T (4) V O (4) V T (5) V O (2) V T (6) V O (6) V T (1) V O (1) V T (2) V O (2) V T (3) V O (3) V T (4) V O (4) V T (5) V O (5) V T (6) V O (2) V T (7) V O (3) V T (8) V O (6) Temporal domain Temporal domain (c) Temporal tampering of frame swapping. V is a temporally tampered video created by swapping frames in V (d) Temporal tampering of frame copy. V is a temporally tampered video created by copying or adding frames in V Figure 1.4: Examples of common temporal tampering Finally, frame count will be increased if a source video is manipulated by copying the video frames and pasting to some other location in the source video. At the frame level, these copied frames may be the intermediate frames of a video scene, or at the scene level, an entire scene can be copied and pasted after another scene. Copying can also be at the video level, i.e. all frames of a video can be copied and pasted to create the copy of a source video. Like tampering of frame swapping, tampering of frame copying (at frame level or scene level) will also be resulted into disordering of frame sequence in the tampered video. Figure 1.4 (d) presents an example depicting tampering of frame copying at the frame level. 9

10 Based on the discussion of common temporal tampering, we briefly present two different aspects of temporal tampering as follows (a) Count of frames remain unchanged or get changed in tampered videos, viz. in the tampering of frame swapping number of frames in tampered video remains same as in original or source video, whereas it gets changed due to the tampering of frame drop and frame copy. (b) Order of frames remain same or it gets disordered in tampered videos, viz. in the tampering of frame drop the sequence of frames in tampered video remains same as in original or source video, whereas it gets disordered due to the tampering of frame swapping and frame copy. Based on the presented aspects of temporal tampering, this thesis focuses on the detection of temporal tampering in tampered videos, if created by frame drop (at frame level), frame swapping (at frame level), and frame copying (at scene level). The following section presents the basics of video tampering detection. 1.2 Detection of Tampering with Videos As discussed, the authenticity of video evidences which are submitted during court trials need to be examined before using these videos as evidence. Forensic experts and laboratories contribute to examine the authenticity of video evidences either through blind investigation or investigation with some prior information, which include availability of original or source video, information about video capturing devices viz. CCTV, digital camera, etc., information about some additional information viz. watermarks and digital signature, etc. In literature, these investigation approaches have been categorized under the heads, Active Tamper Detection Techniques, ATDT and Passive Tamper Detection Techniques PTDT [6][50][59-62][65][77-79]. The PTDT are used for blind investigation, whereas the ATDT are based on the availability of some prior information. Inspirit of the categorization used for video quality assessment in the literature [36], we breakup the investigation approaches for detection of tampering with videos into following three categories 10

11 (a) Full Reference (FR) Mode: In this mode of tampering detection, the original or source video which was used for the creation of tampered video is available to conduct the investigation. This is applicable under such circumstances where, the tampering has been performed with the copy of the original video. Hence, the original video is available as reference to verify the authenticity of the tampered video. (b) Reduced Reference (RR) Mode: In this mode of tampering detection, the original or source video is not available but some additional information (as discussed above, excluding the availability of original video) is available to examine the authenticity of video evidence. Generally in this mode, the authenticity of video evidences are examined either by retrieving the embedded information (viz. watermark and digital signature), or verifying the video characteristics as per the details of video capturing device, viz. CCTV. (c) No Reference (NR) Mode: In this mode, no additional information available to forensic experts about the video whose authenticity is to be examined, unlike FR and RR. In the absence of any additional information, the tampering detection under NR mode (or PTDT) is usually performed for identification of any abnormalities or inconsistencies either, within and across video frames (for tracing the spatial tampering), or in the expected temporal redundancy (for tracing the temporal tampering), or combination of both for tracing the spatio-temporal tampering. This thesis aims to detect the tampering under full reference (FR) and no reference (NR) modes for the types of tampering considered to be detected in Section Now we present another aspect of the thesis related with tampered videos, i.e. video quality assessment in the proceeding section Video Quality Assessment As discussed earlier, assessment of quality degradation in tampered video may play a counter measure for forger to create perceptually indistinguishable fake videos. This section briefly presents the overview of the methodologies used in literature for assessing the quality of a video. 11

12 Quality of a video is assessed in two ways, viz. subjective assessment and objective assessment [80][81], where video quality are generally assessed in three modes viz. quality assessment under full reference (FR) mode, reduced reference (RR) mode, and no reference (NR) mode [36][82]. Subjective quality assessment involves human subjects to assess the video quality (in all the three modes i.e. FR, RR, and NR), whereas, objective quality assessment involves various objective quality metrics viz. Mean Squared Error (MSE), Peak Signal to Noise Ratio (PSNR), Structural Similarity Index (SSIM), etc. to measure the video quality automatically [83][84]. Broadly, objective quality metrics are classified in two categories viz. statistical metrics and perceptual metrics such as PSNR and SSIM respectively [36][83][84]. Statistical metrics employ the application of various mathematical functions like calculating pixel-by-pixel weighted differences (viz. MSE and PSNR) between reference and distorted video (in context of video quality assessment, original videos and tampered videos are referred as reference videos and distorted videos respectively), whereas perceptual metrics use Human Visual Systems (HVS) characteristics [35][36]. Subjective assessments are the most reliable way to assess the video quality but it is an exhaustive and costly procedure, whereas in objective quality assessment, challenges lie to design objective quality metrics whose assessment is the true representation of the perceived quality. Distorted videos which are involved in the quality assessment (either in FR or RR or NR modes of quality assessment) may be either the temporally distorted or tampered videos or spatially distorted videos or spatio-temporally distorted videos. In thesis, we aim to assess the quality of spatio-temporally distorted or tampered videos under full reference mode, where the temporal distortion or tampering is due to frame drop. Next section presents the organization of the thesis, which includes the introductory chapter, literature review, and contributory chapters Thesis Organization Apart from introduction, presented in Chapter 1, the remaining chapters of the thesis are organized as follows: 12

13 Chapter 2 presents the explored literature along with limitations of the existing techniques for the detection of tampering with videos. It also presents the reviewed literature for video quality assessment, viz. subjective and objective assessment. Based on the limitations with existing schemes, this chapter presents the explored research issues and accordingly set the objectives in the thesis. Chapter 3 proposes full reference (FR) schemes for detection of tampering of frame drop considering that the tampered video is either a temporally tampered video or spatio-temporally tampered video. This chapter also presents the data parallelization of the scheme proposed for spatio-temporally tampered videos. Chapter 4 proposes learning based no reference (NR) scheme, which detects the tampering of frame drop in the temporally tampered video and accordingly verify the authenticity of the video. Chapter 5 describes the limitations of the learning based scheme proposed in the chapter 4 and proposes a threshold based NR scheme to detect the tampering of frame drop (at frame level) in the temporally tampered video and accordingly verify the authenticity of the video. Chapter 6 proposes a threshold based NR scheme to detect the tampering of frame copy (at the scene level) in the temporally tampered video and accordingly verify the authenticity of the video. Chapter 7 proposes a threshold based NR scheme to detect the tampering of frame swapping (at frame level) in the temporally tampered video and accordingly verify the authenticity of the video. Chapter 8 describes the conducted subjective experiments and presents the obtained mean opinion score (MOS) for spatio-temporal tampered videos (where frame drop was used as the temporal distortion or tampering). Further, the MOS has been used to analyze the performance of two objective quality metrics viz. PSNR and SSIM. Finally, we have proposed a FR dropped frames video quality metrics to assess the quality degradation in the spatio-temporally tampered videos. 13

14

Image Quality Assessment Techniques: An Overview

Image Quality Assessment Techniques: An Overview Image Quality Assessment Techniques: An Overview Shruti Sonawane A. M. Deshpande Department of E&TC Department of E&TC TSSM s BSCOER, Pune, TSSM s BSCOER, Pune, Pune University, Maharashtra, India Pune

More information

Review and Implementation of DWT based Scalable Video Coding with Scalable Motion Coding.

Review and Implementation of DWT based Scalable Video Coding with Scalable Motion Coding. Project Title: Review and Implementation of DWT based Scalable Video Coding with Scalable Motion Coding. Midterm Report CS 584 Multimedia Communications Submitted by: Syed Jawwad Bukhari 2004-03-0028 About

More information

Digital Image Processing

Digital Image Processing Digital Image Processing Fundamentals of Image Compression DR TANIA STATHAKI READER (ASSOCIATE PROFFESOR) IN SIGNAL PROCESSING IMPERIAL COLLEGE LONDON Compression New techniques have led to the development

More information

A hybrid video quality metric for analyzing quality degradation due to frame drop

A hybrid video quality metric for analyzing quality degradation due to frame drop A hybrid video quality metric for analyzing quality degradation due to frame drop Manish K Thakur, Vikas Saxena 2 and J P Gupta 3 Department of CSE/IT, Jaypee Institute of Information Technology Noida,

More information

No-reference perceptual quality metric for H.264/AVC encoded video. Maria Paula Queluz

No-reference perceptual quality metric for H.264/AVC encoded video. Maria Paula Queluz No-reference perceptual quality metric for H.264/AVC encoded video Tomás Brandão Maria Paula Queluz IT ISCTE IT IST VPQM 2010, Scottsdale, USA, January 2010 Outline 1. Motivation and proposed work 2. Technical

More information

MRT based Adaptive Transform Coder with Classified Vector Quantization (MATC-CVQ)

MRT based Adaptive Transform Coder with Classified Vector Quantization (MATC-CVQ) 5 MRT based Adaptive Transform Coder with Classified Vector Quantization (MATC-CVQ) Contents 5.1 Introduction.128 5.2 Vector Quantization in MRT Domain Using Isometric Transformations and Scaling.130 5.2.1

More information

Detecting Digital Image Forgeries By Multi-illuminant Estimators

Detecting Digital Image Forgeries By Multi-illuminant Estimators Research Paper Volume 2 Issue 8 April 2015 International Journal of Informative & Futuristic Research ISSN (Online): 2347-1697 Detecting Digital Image Forgeries By Multi-illuminant Estimators Paper ID

More information

MIXDES Methods of 3D Images Quality Assesment

MIXDES Methods of 3D Images Quality Assesment Methods of 3D Images Quality Assesment, Marek Kamiński, Robert Ritter, Rafał Kotas, Paweł Marciniak, Joanna Kupis, Przemysław Sękalski, Andrzej Napieralski LODZ UNIVERSITY OF TECHNOLOGY Faculty of Electrical,

More information

AN EFFICIENT VIDEO WATERMARKING USING COLOR HISTOGRAM ANALYSIS AND BITPLANE IMAGE ARRAYS

AN EFFICIENT VIDEO WATERMARKING USING COLOR HISTOGRAM ANALYSIS AND BITPLANE IMAGE ARRAYS AN EFFICIENT VIDEO WATERMARKING USING COLOR HISTOGRAM ANALYSIS AND BITPLANE IMAGE ARRAYS G Prakash 1,TVS Gowtham Prasad 2, T.Ravi Kumar Naidu 3 1MTech(DECS) student, Department of ECE, sree vidyanikethan

More information

International Journal of Emerging Technology and Advanced Engineering Website: (ISSN , Volume 2, Issue 4, April 2012)

International Journal of Emerging Technology and Advanced Engineering Website:   (ISSN , Volume 2, Issue 4, April 2012) A Technical Analysis Towards Digital Video Compression Rutika Joshi 1, Rajesh Rai 2, Rajesh Nema 3 1 Student, Electronics and Communication Department, NIIST College, Bhopal, 2,3 Prof., Electronics and

More information

QoE Characterization for Video-On-Demand Services in 4G WiMAX Networks

QoE Characterization for Video-On-Demand Services in 4G WiMAX Networks QoE Characterization for Video-On-Demand Services in 4G WiMAX Networks Amitabha Ghosh IBM India Research Laboratory Department of Electrical Engineering University of Southern California, Los Angeles http://anrg.usc.edu/~amitabhg

More information

R 118 TIERING OF CAMERAS FOR USE IN TELEVISION PRODUCTION

R 118 TIERING OF CAMERAS FOR USE IN TELEVISION PRODUCTION R 118 TIERING OF CAMERAS FOR USE IN TELEVISION PRODUCTION VERSION 2 Geneva April 2017 Page intentionally left blank. This document is paginated for two sided printing EBU R 118 Tiering of Cameras for use

More information

IMAGE COMPRESSION USING ANTI-FORENSICS METHOD

IMAGE COMPRESSION USING ANTI-FORENSICS METHOD IMAGE COMPRESSION USING ANTI-FORENSICS METHOD M.S.Sreelakshmi and D. Venkataraman Department of Computer Science and Engineering, Amrita Vishwa Vidyapeetham, Coimbatore, India mssreelakshmi@yahoo.com d_venkat@cb.amrita.edu

More information

CHAPTER 6. 6 Huffman Coding Based Image Compression Using Complex Wavelet Transform. 6.3 Wavelet Transform based compression technique 106

CHAPTER 6. 6 Huffman Coding Based Image Compression Using Complex Wavelet Transform. 6.3 Wavelet Transform based compression technique 106 CHAPTER 6 6 Huffman Coding Based Image Compression Using Complex Wavelet Transform Page No 6.1 Introduction 103 6.2 Compression Techniques 104 103 6.2.1 Lossless compression 105 6.2.2 Lossy compression

More information

DYADIC WAVELETS AND DCT BASED BLIND COPY-MOVE IMAGE FORGERY DETECTION

DYADIC WAVELETS AND DCT BASED BLIND COPY-MOVE IMAGE FORGERY DETECTION DYADIC WAVELETS AND DCT BASED BLIND COPY-MOVE IMAGE FORGERY DETECTION Ghulam Muhammad*,1, Muhammad Hussain 2, Anwar M. Mirza 1, and George Bebis 3 1 Department of Computer Engineering, 2 Department of

More information

How Many Humans Does it Take to Judge Video Quality?

How Many Humans Does it Take to Judge Video Quality? How Many Humans Does it Take to Judge Video Quality? Bill Reckwerdt, CTO Video Clarity, Inc. Version 1.0 A Video Clarity Case Study page 1 of 5 Abstract for Subjective Video Quality Assessment In order

More information

A New Approach to Authenticate Images in Different Datasets Using a Lossless Image Watermarking Technique

A New Approach to Authenticate Images in Different Datasets Using a Lossless Image Watermarking Technique A New Approach to Authenticate Images in Different Datasets Using a Lossless Image Watermarking Technique 1 Arathi Chitla, 2 Dr. M. Chandra Mohan 1 Associate Professor, Department of Computer Science &

More information

Image Quality Assessment-Oriented Frame Capture of Video Phone over 3G system

Image Quality Assessment-Oriented Frame Capture of Video Phone over 3G system Image Quality Assessment-Oriented Frame Capture of Video Phone over 3G system Chao Feng, Lianfen Huang*, Jianan Lin and Jinjin Li School of Information Science and Technology, Xiamen University Xiamen,

More information

Performance analysis of AAC audio codec and comparison of Dirac Video Codec with AVS-china. Under guidance of Dr.K.R.Rao Submitted By, ASHWINI S URS

Performance analysis of AAC audio codec and comparison of Dirac Video Codec with AVS-china. Under guidance of Dr.K.R.Rao Submitted By, ASHWINI S URS Performance analysis of AAC audio codec and comparison of Dirac Video Codec with AVS-china Under guidance of Dr.K.R.Rao Submitted By, ASHWINI S URS Outline Overview of Dirac Overview of AVS-china Overview

More information

An Introduction to Content Based Image Retrieval

An Introduction to Content Based Image Retrieval CHAPTER -1 An Introduction to Content Based Image Retrieval 1.1 Introduction With the advancement in internet and multimedia technologies, a huge amount of multimedia data in the form of audio, video and

More information

No Reference Medical Image Quality Measurement Based on Spread Spectrum and Discrete Wavelet Transform using ROI Processing

No Reference Medical Image Quality Measurement Based on Spread Spectrum and Discrete Wavelet Transform using ROI Processing No Reference Medical Image Quality Measurement Based on Spread Spectrum and Discrete Wavelet Transform using ROI Processing Arash Ashtari Nakhaie, Shahriar Baradaran Shokouhi Iran University of Science

More information

Module 7 VIDEO CODING AND MOTION ESTIMATION

Module 7 VIDEO CODING AND MOTION ESTIMATION Module 7 VIDEO CODING AND MOTION ESTIMATION Lesson 20 Basic Building Blocks & Temporal Redundancy Instructional Objectives At the end of this lesson, the students should be able to: 1. Name at least five

More information

DIGITAL FORENSICS FORENSICS FRAMEWORK FOR CLOUD COMPUTING

DIGITAL FORENSICS FORENSICS FRAMEWORK FOR CLOUD COMPUTING 17.09.24 DIGITAL FORENSICS FORENSICS FRAMEWORK FOR CLOUD COMPUTING FORENSICS FRAMEWORK FOR CLOUD COMPUTING OUTLINE Abstract Introduction Challenges in cloud forensics Proposed solution Conclusion Opinion

More information

Digital Image Forgery Detection Based on GLCM and HOG Features

Digital Image Forgery Detection Based on GLCM and HOG Features Digital Image Forgery Detection Based on GLCM and HOG Features Liya Baby 1, Ann Jose 2 Department of Electronics and Communication, Ilahia College of Engineering and Technology, Muvattupuzha, Ernakulam,

More information

ADAPTIVE VIDEO STREAMING FOR BANDWIDTH VARIATION WITH OPTIMUM QUALITY

ADAPTIVE VIDEO STREAMING FOR BANDWIDTH VARIATION WITH OPTIMUM QUALITY ADAPTIVE VIDEO STREAMING FOR BANDWIDTH VARIATION WITH OPTIMUM QUALITY Joseph Michael Wijayantha Medagama (08/8015) Thesis Submitted in Partial Fulfillment of the Requirements for the Degree Master of Science

More information

Efficient Color Image Quality Assessment Using Gradient Magnitude Similarity Deviation

Efficient Color Image Quality Assessment Using Gradient Magnitude Similarity Deviation IJECT Vo l. 8, Is s u e 3, Ju l y - Se p t 2017 ISSN : 2230-7109 (Online) ISSN : 2230-9543 (Print) Efficient Color Image Quality Assessment Using Gradient Magnitude Similarity Deviation 1 Preeti Rani,

More information

CHAPTER 4 REVERSIBLE IMAGE WATERMARKING USING BIT PLANE CODING AND LIFTING WAVELET TRANSFORM

CHAPTER 4 REVERSIBLE IMAGE WATERMARKING USING BIT PLANE CODING AND LIFTING WAVELET TRANSFORM 74 CHAPTER 4 REVERSIBLE IMAGE WATERMARKING USING BIT PLANE CODING AND LIFTING WAVELET TRANSFORM Many data embedding methods use procedures that in which the original image is distorted by quite a small

More information

Signature Verification Why xyzmo offers the leading solution

Signature Verification Why xyzmo offers the leading solution Dynamic (Biometric) Signature Verification The signature is the last remnant of the hand-written document in a digital world, and is considered an acceptable and trustworthy means of authenticating all

More information

An Architectural Framework for Ubiquitous Computing Applications

An Architectural Framework for Ubiquitous Computing Applications An Architectural Framework for Ubiquitous Computing Applications I. Koutelekos 1 Dpts. of Electronics and Automation MSc in Networking and Data Communications, T.E.I. of Piraeus, Greece, Email: ekoutele@otenet.gr

More information

STUDY AND IMPLEMENTATION OF VIDEO COMPRESSION STANDARDS (H.264/AVC, DIRAC)

STUDY AND IMPLEMENTATION OF VIDEO COMPRESSION STANDARDS (H.264/AVC, DIRAC) STUDY AND IMPLEMENTATION OF VIDEO COMPRESSION STANDARDS (H.264/AVC, DIRAC) EE 5359-Multimedia Processing Spring 2012 Dr. K.R Rao By: Sumedha Phatak(1000731131) OBJECTIVE A study, implementation and comparison

More information

DWT-SVD Based Hybrid Approach for Digital Watermarking Using Fusion Method

DWT-SVD Based Hybrid Approach for Digital Watermarking Using Fusion Method DWT-SVD Based Hybrid Approach for Digital Watermarking Using Fusion Method Sonal Varshney M.tech Scholar Galgotias University Abhinandan Singh M.tech Scholar Galgotias University Abstract With the rapid

More information

REVIEW ON IMAGE COMPRESSION TECHNIQUES AND ADVANTAGES OF IMAGE COMPRESSION

REVIEW ON IMAGE COMPRESSION TECHNIQUES AND ADVANTAGES OF IMAGE COMPRESSION REVIEW ON IMAGE COMPRESSION TECHNIQUES AND ABSTRACT ADVANTAGES OF IMAGE COMPRESSION Amanpreet Kaur 1, Dr. Jagroop Singh 2 1 Ph. D Scholar, Deptt. of Computer Applications, IK Gujral Punjab Technical University,

More information

automatic digitization. In the context of ever increasing population worldwide and thereby

automatic digitization. In the context of ever increasing population worldwide and thereby Chapter 1 Introduction In the recent time, many researchers had thrust upon developing various improvised methods of automatic digitization. In the context of ever increasing population worldwide and thereby

More information

CHAPTER 6 EFFICIENT TECHNIQUE TOWARDS THE AVOIDANCE OF REPLAY ATTACK USING LOW DISTORTION TRANSFORM

CHAPTER 6 EFFICIENT TECHNIQUE TOWARDS THE AVOIDANCE OF REPLAY ATTACK USING LOW DISTORTION TRANSFORM 109 CHAPTER 6 EFFICIENT TECHNIQUE TOWARDS THE AVOIDANCE OF REPLAY ATTACK USING LOW DISTORTION TRANSFORM Security is considered to be the most critical factor in many applications. The main issues of such

More information

The Trustworthiness of Digital Records

The Trustworthiness of Digital Records The Trustworthiness of Digital Records International Congress on Digital Records Preservation Beijing, China 16 April 2010 1 The Concept of Record Record: any document made or received by a physical or

More information

Video Inter-frame Forgery Identification Based on Optical Flow Consistency

Video Inter-frame Forgery Identification Based on Optical Flow Consistency Sensors & Transducers 24 by IFSA Publishing, S. L. http://www.sensorsportal.com Video Inter-frame Forgery Identification Based on Optical Flow Consistency Qi Wang, Zhaohong Li, Zhenzhen Zhang, Qinglong

More information

Comparative and performance analysis of HEVC and H.264 Intra frame coding and JPEG2000

Comparative and performance analysis of HEVC and H.264 Intra frame coding and JPEG2000 Comparative and performance analysis of HEVC and H.264 Intra frame coding and JPEG2000 EE5359 Multimedia Processing Project Proposal Spring 2013 The University of Texas at Arlington Department of Electrical

More information

Tech Note - 05 Surveillance Systems that Work! Calculating Recorded Volume Disk Space

Tech Note - 05 Surveillance Systems that Work! Calculating Recorded Volume Disk Space Tech Note - 05 Surveillance Systems that Work! Surveillance Systems Calculating required storage drive (disk space) capacity is sometimes be a rather tricky business. This Tech Note is written to inform

More information

When Recognition Matters WHITEPAPER CLFE CERTIFIED LEAD FORENSIC EXAMINER.

When Recognition Matters WHITEPAPER CLFE CERTIFIED LEAD FORENSIC EXAMINER. When Recognition Matters WHITEPAPER CLFE www.pecb.com CONTENT 3 4 5 6 6 7 7 8 8 Introduction So, what is Computer Forensics? Key domains of a CLFE How does a CLFE approach the investigation? What are the

More information

Multimedia Security: So What s the Big Deal?

Multimedia Security: So What s the Big Deal? Multimedia Security: So What s the Big Deal? Edward J. Delp Purdue University School of Electrical and Computer Engineering Video and Image Processing Laboratory (VIPER) West Lafayette, Indiana email:

More information

Context based optimal shape coding

Context based optimal shape coding IEEE Signal Processing Society 1999 Workshop on Multimedia Signal Processing September 13-15, 1999, Copenhagen, Denmark Electronic Proceedings 1999 IEEE Context based optimal shape coding Gerry Melnikov,

More information

So, what is data compression, and why do we need it?

So, what is data compression, and why do we need it? In the last decade we have been witnessing a revolution in the way we communicate 2 The major contributors in this revolution are: Internet; The explosive development of mobile communications; and The

More information

COMPUTER VISION. Dr. Sukhendu Das Deptt. of Computer Science and Engg., IIT Madras, Chennai

COMPUTER VISION. Dr. Sukhendu Das Deptt. of Computer Science and Engg., IIT Madras, Chennai COMPUTER VISION Dr. Sukhendu Das Deptt. of Computer Science and Engg., IIT Madras, Chennai 600036. Email: sdas@iitm.ac.in URL: //www.cs.iitm.ernet.in/~sdas 1 INTRODUCTION 2 Human Vision System (HVS) Vs.

More information

Digital Image Steganography Using Bit Flipping

Digital Image Steganography Using Bit Flipping BULGARIAN ACADEMY OF SCIENCES CYBERNETICS AND INFORMATION TECHNOLOGIES Volume 18, No 1 Sofia 2018 Print ISSN: 1311-9702; Online ISSN: 1314-4081 DOI: 10.2478/cait-2018-0006 Digital Image Steganography Using

More information

VIDEO DENOISING BASED ON ADAPTIVE TEMPORAL AVERAGING

VIDEO DENOISING BASED ON ADAPTIVE TEMPORAL AVERAGING Engineering Review Vol. 32, Issue 2, 64-69, 2012. 64 VIDEO DENOISING BASED ON ADAPTIVE TEMPORAL AVERAGING David BARTOVČAK Miroslav VRANKIĆ Abstract: This paper proposes a video denoising algorithm based

More information

WATERMARKING FOR LIGHT FIELD RENDERING 1

WATERMARKING FOR LIGHT FIELD RENDERING 1 ATERMARKING FOR LIGHT FIELD RENDERING 1 Alper Koz, Cevahir Çığla and A. Aydın Alatan Department of Electrical and Electronics Engineering, METU Balgat, 06531, Ankara, TURKEY. e-mail: koz@metu.edu.tr, cevahir@eee.metu.edu.tr,

More information

Celebrity Identification and Recognition in Videos. An application of semi-supervised learning and multiclass classification

Celebrity Identification and Recognition in Videos. An application of semi-supervised learning and multiclass classification Celebrity Identification and Recognition in Videos An application of semi-supervised learning and multiclass classification Contents Celebrity Identification and Recognition in Videos... 1 Aim... 3 Motivation...

More information

Video Quality Analysis for H.264 Based on Human Visual System

Video Quality Analysis for H.264 Based on Human Visual System IOSR Journal of Engineering (IOSRJEN) ISSN (e): 2250-3021 ISSN (p): 2278-8719 Vol. 04 Issue 08 (August. 2014) V4 PP 01-07 www.iosrjen.org Subrahmanyam.Ch 1 Dr.D.Venkata Rao 2 Dr.N.Usha Rani 3 1 (Research

More information

6th International Workshop on OMNeT++

6th International Workshop on OMNeT++ 6th International Workshop on OMNeT++ An OMNeT++ Framework to Evaluate Video Transmission in Mobile Wireless Multimedia Sensor Networks Denis Rosário, Zhongliang Zhao, Claudio Silva, Eduardo Cerqueira,

More information

About MPEG Compression. More About Long-GOP Video

About MPEG Compression. More About Long-GOP Video About MPEG Compression HD video requires significantly more data than SD video. A single HD video frame can require up to six times more data than an SD frame. To record such large images with such a low

More information

Blind Prediction of Natural Video Quality and H.264 Applications

Blind Prediction of Natural Video Quality and H.264 Applications Proceedings of Seventh International Workshop on Video Processing and Quality Metrics for Consumer Electronics January 30-February 1, 2013, Scottsdale, Arizona 1 Blind Prediction of Natural Video Quality

More information

Video and Audio Recordings Video and audio recordings of activities continue to

Video and Audio Recordings Video and audio recordings of activities continue to Chapter 3 Video and Audio Recordings Video and audio recordings of activities continue to become prevalent in investigations of criminal activity. Recordings include surveillance tapes recordings of criminal

More information

Navjot Singh *1, Deepak Sharma 2 ABSTRACT I. INTRODUCTION

Navjot Singh *1, Deepak Sharma 2 ABSTRACT I. INTRODUCTION 2017 IJSRSET Volume 3 Issue 1 Print ISSN: 2395-1990 Online ISSN : 2394-4099 Themed Section: Engineering and Technology An Efficient Multiple Data Hiding Technique for Medical Images Using QR Code Authentication

More information

CHAPTER-4 WATERMARKING OF GRAY IMAGES

CHAPTER-4 WATERMARKING OF GRAY IMAGES CHAPTER-4 WATERMARKING OF GRAY IMAGES 4.1 INTRODUCTION Like most DCT based watermarking schemes, Middle-Band Coefficient Exchange scheme has proven its robustness against those attacks, which anyhow, do

More information

Perceptual Quality Measurement and Control: Definition, Application and Performance

Perceptual Quality Measurement and Control: Definition, Application and Performance Perceptual Quality Measurement and Control: Definition, Application and Performance A. R. Prasad, R. Esmailzadeh, S. Winkler, T. Ihara, B. Rohani, B. Pinguet and M. Capel Genista Corporation Tokyo, Japan

More information

Anatomy of a Semantic Virus

Anatomy of a Semantic Virus Anatomy of a Semantic Virus Peyman Nasirifard Digital Enterprise Research Institute National University of Ireland, Galway IDA Business Park, Lower Dangan, Galway, Ireland peyman.nasirifard@deri.org Abstract.

More information

A Comparison of Still-Image Compression Standards Using Different Image Quality Metrics and Proposed Methods for Improving Lossy Image Quality

A Comparison of Still-Image Compression Standards Using Different Image Quality Metrics and Proposed Methods for Improving Lossy Image Quality A Comparison of Still-Image Compression Standards Using Different Image Quality Metrics and Proposed Methods for Improving Lossy Image Quality Multidimensional DSP Literature Survey Eric Heinen 3/21/08

More information

Tampering Detection in Compressed Digital Video Using Watermarking

Tampering Detection in Compressed Digital Video Using Watermarking Tampering Detection in Compressed Digital Video Using Watermarking Mehdi Fallahpour, Shervin Shirmohammadi, Mehdi Semsarzadeh, Jiying Zhao School of Electrical Engineering and Computer Science (EECS),

More information

Copy-Move Forgery Detection using DCT and SIFT

Copy-Move Forgery Detection using DCT and SIFT Copy-Move Forgery Detection using DCT and SIFT Amanpreet Kaur Department of Computer Science and Engineering, Lovely Professional University, Punjab, India. Richa Sharma Department of Computer Science

More information

ADVANCE VEHICLE CONTROL AND SAFETY SYSTEM USING FACE DETECTION

ADVANCE VEHICLE CONTROL AND SAFETY SYSTEM USING FACE DETECTION ADVANCE VEHICLE CONTROL AND SAFETY SYSTEM USING FACE DETECTION Prof. Saurabh Thakur 1, Shekhar Dure 2, Ajinkya Khutwad 3 1,2,3 Dept. of E&TC, Sinhgad Academy Of Engineering, Savitribai Phule Pune University,

More information

STEGANOGRAPHIC TECHNIQUES FOR HIDING DATA IN SWF FILES

STEGANOGRAPHIC TECHNIQUES FOR HIDING DATA IN SWF FILES Chapter 19 STEGANOGRAPHIC TECHNIQUES FOR HIDING DATA IN SWF FILES Mark-Anthony Fouche and Martin Olivier Abstract Small Web Format (SWF) or Flash files are widely used on the Internet to provide Rich Internet

More information

Compression of VQM Features for Low Bit-Rate Video Quality Monitoring

Compression of VQM Features for Low Bit-Rate Video Quality Monitoring Compression of VQM Features for Low Bit-Rate Video Quality Monitoring Mina Makar, Yao-Chung Lin, Andre F. de Araujo and Bernd Girod Information Systems Laboratory, Stanford University, Stanford, CA 9435

More information

Face anti-spoofing using Image Quality Assessment

Face anti-spoofing using Image Quality Assessment Face anti-spoofing using Image Quality Assessment Speakers Prisme Polytech Orléans Aladine Chetouani R&D Trusted Services Emna Fourati Outline Face spoofing attacks Image Quality Assessment Proposed method

More information

EE 5359 Multimedia project

EE 5359 Multimedia project EE 5359 Multimedia project -Chaitanya Chukka -Chaitanya.chukka@mavs.uta.edu 5/7/2010 1 Universality in the title The measurement of Image Quality(Q)does not depend : On the images being tested. On Viewing

More information

Digital Image Steganography Techniques: Case Study. Karnataka, India.

Digital Image Steganography Techniques: Case Study. Karnataka, India. ISSN: 2320 8791 (Impact Factor: 1.479) Digital Image Steganography Techniques: Case Study Santosh Kumar.S 1, Archana.M 2 1 Department of Electronicsand Communication Engineering, Sri Venkateshwara College

More information

Redundancy and Correlation: Temporal

Redundancy and Correlation: Temporal Redundancy and Correlation: Temporal Mother and Daughter CIF 352 x 288 Frame 60 Frame 61 Time Copyright 2007 by Lina J. Karam 1 Motion Estimation and Compensation Video is a sequence of frames (images)

More information

MATRIX BASED INDEXING TECHNIQUE FOR VIDEO DATA

MATRIX BASED INDEXING TECHNIQUE FOR VIDEO DATA Journal of Computer Science, 9 (5): 534-542, 2013 ISSN 1549-3636 2013 doi:10.3844/jcssp.2013.534.542 Published Online 9 (5) 2013 (http://www.thescipub.com/jcs.toc) MATRIX BASED INDEXING TECHNIQUE FOR VIDEO

More information

An Improved Performance of Watermarking In DWT Domain Using SVD

An Improved Performance of Watermarking In DWT Domain Using SVD An Improved Performance of Watermarking In DWT Domain Using SVD Ramandeep Kaur 1 and Harpal Singh 2 1 Research Scholar, Department of Electronics & Communication Engineering, RBIEBT, Kharar, Pin code 140301,

More information

Reversible Data Hiding in Colour Images using AES Data Encryption System

Reversible Data Hiding in Colour Images using AES Data Encryption System Reversible Data Hiding in Colour Images using AES Data Encryption System M. Prem Anand 1, Y. Karthikeyan 2 1 Assistant Professor 2 M.E Student 1,2 Department of Electronics & Communication Engineering,

More information

A Video Forgery Detection Using Discrete Wavelet Transform and Scale Invarient Feature Transform Techniques

A Video Forgery Detection Using Discrete Wavelet Transform and Scale Invarient Feature Transform Techniques A Video Forgery Detection Using Discrete Wavelet Transform and Scale Invarient Feature Transform Techniques Gurjinder Kaur 1, Rishamjot Kaur 2 1 Department of Computer Science & Engineering, Baba Farid

More information

Image Enhancement Techniques for Fingerprint Identification

Image Enhancement Techniques for Fingerprint Identification March 2013 1 Image Enhancement Techniques for Fingerprint Identification Pankaj Deshmukh, Siraj Pathan, Riyaz Pathan Abstract The aim of this paper is to propose a new method in fingerprint enhancement

More information

Technical Recommendation S. 10/07: Source Encoding of High Definition Mobile TV Services

Technical Recommendation S. 10/07: Source Encoding of High Definition Mobile TV Services Technical Recommendation S. 10/07: Source Encoding of High Definition Mobile TV Services Version: 0.4 Date: November 29, 2007 Authors: M. Ries, M. Rupp Status: Final Page 1 / 7 Technical Recommendation

More information

DEPLOYMENT OF OPTIMIZED ALGORITHM FOR MPEG-4 DATA OVER WIRELESS MULTIMEDIA SENSOR NETWORK

DEPLOYMENT OF OPTIMIZED ALGORITHM FOR MPEG-4 DATA OVER WIRELESS MULTIMEDIA SENSOR NETWORK DEPLOYMENT OF OPTIMIZED ALGORITHM FOR MPEG-4 DATA OVER WIRELESS MULTIMEDIA SENSOR NETWORK Norlezah Hashim 1, Sharifah Hafizah Syed Ariffin 2, Farizah Yunus 2, Fakrulradzi Idris 3 and Norsheila Fisal 2

More information

Optimized Watermarking Using Swarm-Based Bacterial Foraging

Optimized Watermarking Using Swarm-Based Bacterial Foraging Journal of Information Hiding and Multimedia Signal Processing c 2009 ISSN 2073-4212 Ubiquitous International Volume 1, Number 1, January 2010 Optimized Watermarking Using Swarm-Based Bacterial Foraging

More information

Perceptual coding. A psychoacoustic model is used to identify those signals that are influenced by both these effects.

Perceptual coding. A psychoacoustic model is used to identify those signals that are influenced by both these effects. Perceptual coding Both LPC and CELP are used primarily for telephony applications and hence the compression of a speech signal. Perceptual encoders, however, have been designed for the compression of general

More information

CHAPTER-5 WATERMARKING OF COLOR IMAGES

CHAPTER-5 WATERMARKING OF COLOR IMAGES CHAPTER-5 WATERMARKING OF COLOR IMAGES 5.1 INTRODUCTION After satisfactorily developing the watermarking schemes for gray level images, we focused on developing the watermarking schemes for the color images.

More information

Robust Image Watermarking based on Discrete Wavelet Transform, Discrete Cosine Transform & Singular Value Decomposition

Robust Image Watermarking based on Discrete Wavelet Transform, Discrete Cosine Transform & Singular Value Decomposition Advance in Electronic and Electric Engineering. ISSN 2231-1297, Volume 3, Number 8 (2013), pp. 971-976 Research India Publications http://www.ripublication.com/aeee.htm Robust Image Watermarking based

More information

ENHANCED DCT COMPRESSION TECHNIQUE USING VECTOR QUANTIZATION AND BAT ALGORITHM Er.Samiksha 1, Er. Anurag sharma 2

ENHANCED DCT COMPRESSION TECHNIQUE USING VECTOR QUANTIZATION AND BAT ALGORITHM Er.Samiksha 1, Er. Anurag sharma 2 ENHANCED DCT COMPRESSION TECHNIQUE USING VECTOR QUANTIZATION AND BAT ALGORITHM Er.Samiksha 1, Er. Anurag sharma 2 1 Research scholar (M-tech) ECE, CT Ninstitute of Technology and Recearch, Jalandhar, Punjab,

More information

A Novel Spatial Domain Invisible Watermarking Technique Using Canny Edge Detector

A Novel Spatial Domain Invisible Watermarking Technique Using Canny Edge Detector A Novel Spatial Domain Invisible Watermarking Technique Using Canny Edge Detector 1 Vardaini M.Tech, Department of Rayat Institute of Engineering and information Technology, Railmajra 2 Anudeep Goraya

More information

Scientific Working Groups on Digital Evidence and Imaging Technology

Scientific Working Groups on Digital Evidence and Imaging Technology SWGDE/SWGIT Guidelines & Recommendations for Training in Digital & Multimedia Evidence Disclaimer: As a condition to the use of this document and the information contained therein, the SWGDE/SWGIT request

More information

Axis Megapixel Network Cameras. See what you ve been missing

Axis Megapixel Network Cameras. See what you ve been missing Axis Megapixel Network Cameras See what you ve been missing Megapixel network cameras Megapixel network cameras have an important role to play in video surveillance applications. They are obviously more

More information

Megapixel Video for. Part 2 of 4. Brought to You by. Presented by Video Security Consultants

Megapixel Video for. Part 2 of 4. Brought to You by. Presented by Video Security Consultants rought to You by 2009 Video Security Consultants Presented by Part 2 of 4 A1 Part 2 of 4 How to Avert a Compression Depression Illustration by Jerry King While bandwidth is widening, larger video systems

More information

DCT-BASED IMAGE QUALITY ASSESSMENT FOR MOBILE SYSTEM. Jeoong Sung Park and Tokunbo Ogunfunmi

DCT-BASED IMAGE QUALITY ASSESSMENT FOR MOBILE SYSTEM. Jeoong Sung Park and Tokunbo Ogunfunmi DCT-BASED IMAGE QUALITY ASSESSMENT FOR MOBILE SYSTEM Jeoong Sung Park and Tokunbo Ogunfunmi Department of Electrical Engineering Santa Clara University Santa Clara, CA 9553, USA Email: jeoongsung@gmail.com

More information

Computer forensics Aiman Al-Refaei

Computer forensics Aiman Al-Refaei Computer forensics Aiman Al-Refaei 29.08.2006 Computer forensics 1 Computer forensics Definitions: Forensics - The use of science and technology to investigate and establish facts in criminal or civil

More information

Human Motion Detection and Tracking for Video Surveillance

Human Motion Detection and Tracking for Video Surveillance Human Motion Detection and Tracking for Video Surveillance Prithviraj Banerjee and Somnath Sengupta Department of Electronics and Electrical Communication Engineering Indian Institute of Technology, Kharagpur,

More information

15 Data Compression 2014/9/21. Objectives After studying this chapter, the student should be able to: 15-1 LOSSLESS COMPRESSION

15 Data Compression 2014/9/21. Objectives After studying this chapter, the student should be able to: 15-1 LOSSLESS COMPRESSION 15 Data Compression Data compression implies sending or storing a smaller number of bits. Although many methods are used for this purpose, in general these methods can be divided into two broad categories:

More information

SECRETLY CONCEALING MESSAGE USING ADVANCED IMAGE PROCESSING

SECRETLY CONCEALING MESSAGE USING ADVANCED IMAGE PROCESSING International Journal of Engineering Research ISSN: 2348-4039 & Management Technology May-2017 Volume- 4, Issue-3 Email: editor@ijermt.org www.ijermt.org SECRETLY CONCEALING MESSAGE USING ADVANCED IMAGE

More information

Image and Video Quality Assessment Using Neural Network and SVM

Image and Video Quality Assessment Using Neural Network and SVM TSINGHUA SCIENCE AND TECHNOLOGY ISSN 1007-0214 18/19 pp112-116 Volume 13, Number 1, February 2008 Image and Video Quality Assessment Using Neural Network and SVM DING Wenrui (), TONG Yubing (), ZHANG Qishan

More information

A Robust Wavelet-Based Watermarking Algorithm Using Edge Detection

A Robust Wavelet-Based Watermarking Algorithm Using Edge Detection A Robust Wavelet-Based Watermarking Algorithm Using Edge Detection John N. Ellinas Abstract In this paper, a robust watermarking algorithm using the wavelet transform and edge detection is presented. The

More information

Both LPC and CELP are used primarily for telephony applications and hence the compression of a speech signal.

Both LPC and CELP are used primarily for telephony applications and hence the compression of a speech signal. Perceptual coding Both LPC and CELP are used primarily for telephony applications and hence the compression of a speech signal. Perceptual encoders, however, have been designed for the compression of general

More information

DIGITAL TELEVISION 1. DIGITAL VIDEO FUNDAMENTALS

DIGITAL TELEVISION 1. DIGITAL VIDEO FUNDAMENTALS DIGITAL TELEVISION 1. DIGITAL VIDEO FUNDAMENTALS Television services in Europe currently broadcast video at a frame rate of 25 Hz. Each frame consists of two interlaced fields, giving a field rate of 50

More information

CHAPTER 3 SHOT DETECTION AND KEY FRAME EXTRACTION

CHAPTER 3 SHOT DETECTION AND KEY FRAME EXTRACTION 33 CHAPTER 3 SHOT DETECTION AND KEY FRAME EXTRACTION 3.1 INTRODUCTION The twenty-first century is an age of information explosion. We are witnessing a huge growth in digital data. The trend of increasing

More information

Suspicious Activity Detection of Moving Object in Video Surveillance System

Suspicious Activity Detection of Moving Object in Video Surveillance System International Journal of Latest Engineering and Management Research (IJLEMR) ISSN: 2455-4847 ǁ Volume 1 - Issue 5 ǁ June 2016 ǁ PP.29-33 Suspicious Activity Detection of Moving Object in Video Surveillance

More information

Part 1 of 4. MARCH

Part 1 of 4. MARCH Presented by Brought to You by Part 1 of 4 MARCH 2004 www.securitysales.com A1 Part1of 4 Essentials of DIGITAL VIDEO COMPRESSION By Bob Wimmer Video Security Consultants cctvbob@aol.com AT A GLANCE Compression

More information

DEEP LEARNING OF COMPRESSED SENSING OPERATORS WITH STRUCTURAL SIMILARITY (SSIM) LOSS

DEEP LEARNING OF COMPRESSED SENSING OPERATORS WITH STRUCTURAL SIMILARITY (SSIM) LOSS DEEP LEARNING OF COMPRESSED SENSING OPERATORS WITH STRUCTURAL SIMILARITY (SSIM) LOSS ABSTRACT Compressed sensing (CS) is a signal processing framework for efficiently reconstructing a signal from a small

More information

No-Reference Image Based On Fuzzy Classification for Quality Assessment

No-Reference Image Based On Fuzzy Classification for Quality Assessment No-Reference Image Based On Fuzzy Classification for Quality Assessment Percy Irine Biju P Department of Electrical and Electronics Engineering Anna University Regional Campus, Tirunelveli, Tamilnadu,

More information

Towards a Telltale Watermarking Technique for Tamper-Proofing

Towards a Telltale Watermarking Technique for Tamper-Proofing Towards a Telltale Watermarking Technique for Tamper-Proofing Deepa Kundur and Dimitrios Hatzinakos 10 King s College Road Department of Electrical and Computer Engineering University of Toronto Toronto,

More information

Motion Estimation for Video Coding Standards

Motion Estimation for Video Coding Standards Motion Estimation for Video Coding Standards Prof. Ja-Ling Wu Department of Computer Science and Information Engineering National Taiwan University Introduction of Motion Estimation The goal of video compression

More information

Robust Image Watermarking based on DCT-DWT- SVD Method

Robust Image Watermarking based on DCT-DWT- SVD Method Robust Image Watermarking based on DCT-DWT- SVD Sneha Jose Rajesh Cherian Roy, PhD. Sreenesh Shashidharan ABSTRACT Hybrid Image watermarking scheme proposed based on Discrete Cosine Transform (DCT)-Discrete

More information

A Full Reference Based Objective Image Quality Assessment

A Full Reference Based Objective Image Quality Assessment A Full Reference Based Objective Image Quality Assessment Mayuresh Gulame, K. R. Joshi & Kamthe R. S. P.E.S Modern College of Engineering, Pune -5 E-mail : mayuresh2103@gmail.com, krjpune@gmail.com rupalikamathe@gmail.com

More information