CHAPTER 1: INTRODUCTION
|
|
- Marshall Lindsey
- 5 years ago
- Views:
Transcription
1 CHAPTER 1: INTRODUCTION In the modern age, digital images and videos have become the main information carriers to disseminate knowledge and establish the bridge among several sources. Visual information has a capability to convey the broader spectrum of information because of its ease in acquisition, distribution, and storage to express knowledge, thoughts, evidences, etc. and represents one of the effective means for communication since eras. The advancements in visual (video) technologies, viz. compression, editing, retrieval, transmission, etc. have facilitated the society at several domains such as social, technological, educational, medical, entertainment, commercial, etc. beside to video surveillance and legal evidence. In the socio-economic knowledge and scientific development, images and videos available at various video sharing and social networking websites (viz. YouTube, TacherTube, Google Videos, facebook, etc.) are becoming modern need and signify their unprecedented role in the current context [1-3]. Apart from several useful applications in diversified domains, there are some darker sides of visual (video) information, viz. misuse or the wrong projection of information through videos. One of them is video tampering, where a forger can intentionally manipulate actual or original videos to create tampered or doctored videos for malpractice [4-10] viz. video based forgery, doctored video evidences, criminal activities, defamation, etc. However, video tampering is relatively new area; image doctoring is as old as the art of photography itself where numerous incidences of serious cases of fake photographs have been reported in literature [10-16]. Some of the famous manipulations with visual information which includes photographs, videos, and audios have been displayed in Figure 1.1. The easy availability of many sophisticated video editing tools provides a platform for forger to manipulate original videos and create perceptually indistinguishable fake videos. Every malicious manipulation with videos is not equally consequential [17], but in many serious scenarios viz. video surveillance, defamation, etc. where video is submitted as evidence during court trials and 1
2 one of the parties involved in the litigation disagree about the authenticity of the video in evidence, the authenticity or originality of videos are necessary to be examined [18][19]. (b) Many fake videos were aired, claiming the video is (a) Mikhail G. Delyagin was digitally erased from a video original and captured during WTO building collapse captured during Russian Talk Show in 2007 (c) Joseph Goebbels was erased from the photo which was captured in 1937 during the meet of Hitler and Leni Riefenstahl. First photo is the doctored photo, whereas second one is the original photo of that meet. (d) In order to conceal that second missile from the right (the second photo which is the original photo) had not fired during Iranian Missile Test in 2008, it was decided to paste a successful launch (first photo, which is doctored photo) in its place. (e) An ongoing controversy in India, which is under litigation and yet to prove or disprove the authenticity of the evidence (in form of conversation between the persons involved in litigation). Source of Figures Figure 1.1(a) Figure 1.1(b) Figure 1.1(c) and (d) Figure 1.1(e) Figure 1.1: Some of the famous manipulation with visual information 2 Accessed on 26 Jan 2014
3 Here, video forensic laboratories and experts play a key role to examine the authenticity of videos as well as detection of location of tampering in videos either through visual examination [20] or by detecting the traces or clue or fingerprints (if any) of tampering left by forger while creation of doctored videos [21]. The success or failure of experts to verify the authenticity of videos depend upon how intelligently tampering has been carried out by the forger. It is difficult for forensic experts to verify the authenticity of a video and/or detect the location of tampering in videos, if there are no (or little) traces left by forger while tampering. Although tampering with visual information is not new, digital video forensic (a branch of multimedia security) is still an emerging research area and scientific community is involved in the development of established methodologies to examine the authenticity and credibility of videos as well as detection of location of tampering (i.e. detection of tampering) in an automatic manner [4][5][22-26]. On the other hand, anti-forensics is the branch of multimedia security which facilitates the forger to counter the existing forensic techniques and procedures. Although some anti-forensic techniques are available in literature [27-30] which provide guidance to the forger, but the primary expectation from the forger is to perform such manipulation which is perceptually indistinguishable and deceive casual eye [4]. It is evident from Figure 1.1 (c) that due to casual manipulation a perceptually visible clue / trace is left by forger, where the removal of Joseph Goebbels from the original photo resulted into the quality degradation in surrounding pixels of tampered photo, whereas there is no perceptually visible clue left by forger in the photograph of Figure 1.1 (d). Here, the video quality assessment methods [31-36] may helpful for forger to assess the quality degradation in tampered video with reference to original video and accordingly manipulations can be performed by the forger. However, in literature, a little contribution have been made over this aspect of anti-forensic [37-40], one of the project involving quality assessment for multimedia security is under development at University of Surrey [41]. 3
4 The involvement of digital videos in our day to day life, its prevalence in criminal activities in recent years, and lack of established methodologies as a preventive measure for forensic science and counter measure for anti-forensics seeks immediate attention of the scientific community and our motivation to carry out the research in the domain of multimedia security. In the thesis, our contribution is majorly focused toward development of efficient schemes for followings. (a) Detection of tampering with videos, and (b) Quality assessment in tampered videos The forger can manipulate videos in numerous ways to create tampered videos. A single scheme may not detect all types of tampering; therefore we developed the schemes focused to a specific form of tampering which cannot be applied singlehandedly to detect all types of video tampering. Similarly, the scheme developed for quality assessment in tampered videos cannot be applied to assess the quality in all types of tampered videos. In the following sections, we provide basics of digital videos and different ways to tamper videos, modes of tampering detection, and fundamentals of video quality assessment along with our assumptions and considerations. Section 1.1 presents the tampering with videos. Section 1.2 focuses over the detection of tampering with videos. Fundamentals of quality assessment are presented in Section 1.3. Organization of the thesis is outlined in Section Tampering with videos There can be two types of videos, viz. analog video and digital video, but throughout in the thesis, the word video is used to state the digital video. Besides the video basics, this section presents the tampering domains, levels of tampering and common tampering with videos. As illustrated in Figure 1.2, a video consists of a time-ordered sequence of orthogonal bitmap images (often called as frames), where each frame consists of w h pixels (w and h are the width and height of a frame respectively), i.e. a video is represented in three dimensions involving two domains, viz. temporal domain (i.e. the time-ordered set of frames) and spatial domain (i.e. the pixel domain of w h pixels). In other words, pixels are the smallest unit in spatial domain or in an image, whereas frames are the smallest unit in temporal domain. 4
5 w h P 1 1 P P 1 w P 2 1 P P 2 w Timeordered frames V(1) V(2) V(m 1) V(m) P h 1 P h P h w (a) A video V is a time-ordered sequence of frames. Here, V(i), represents i th frame in V (b) Each frame consists of w h pixels, where, w and h are the width and height of a frame. Figure 1.2: Video as a sequence of frames Each frame is captured at a constant rate and the number of frames captured per second (fps) depends upon the hardware specifications of video capturing device. Since, these devices capture several frames per seconds (usually 25 to 30 fps) it is quiet often to have temporally redundant frames in raw or uncompressed videos (where each frame consists redundant pixels, i.e. spatial redundancy) resulting into high bit rate and large volume of video data [42]. Temporal variation or redundancy depends on various parameters, viz. camera motion (still or motion), object motion (still or motion), sensor noise, illumination and reflectance change, etc [43]. However, these parameters are important to characterize a video; we have not considered them as input parameters for the schemes developed in this thesis. Further, using various compression techniques [42][43], video encoders reduce the spatial and temporal redundancies and compress these raw videos for efficient storage. Videos may be available in compressed form but to process a video, the conventional approach is to uncompress the video, perform the processing with decoded video, and re-encode the video [44][45]. Videos, which are publicly available in compressed or uncompressed form, are the major source for creating tampered videos. These tampered videos can be created involving either a single video, i.e. single source, or multiple videos, i.e. many sources [5]. In this thesis, our aim is to develop schemes for detection of tampering in such tampered videos which were created from single source video. The next section presents the domains in which videos can be manipulated Tampering Domain Depending upon the domain in which manipulation is performed, there can be following types of video tampering [46-51] 5
6 (a) Tampering in spatial domain (i.e. Spatial Tampering) (b) Tampering in temporal domain (i.e. Temporal Tampering) (c) Tampering in spatio-temporal domain (i.e. Spatio-Temporal Tampering) A forger can tamper source videos spatially (i.e. spatial tampering) by manipulating pixel bits within a video frame or across the video frames (i.e. set of adjacent frames). Figure 1.3 (b) presents a spatially tampered video created from the actual video of Figure 1.3 (a). Further, as presented in Figure 1.3 (c), forger can tamper source videos by disturbing the frame sequence (i.e. temporal tampering) through frames replacement, frames addition, and by the removal of video frames and thus create temporally tampered videos. P 11 P P h w P 11 ' P 12 ' - - P P 21 P P P P - - P (a) Actual or Original Video V(1) V(5) V(4) V(3) V(2) V(6) P 21 ' P 22 ' - - P P P - - P (b) Manipulation with pixels V(1) V(5) V(4) V(3) V(2) V(6) Frames P P - - P P V(6) P - - P V(5 ) = V(3) V(4 ) = V(3) V(3) P P - - P V(2) V(1) (c) Manipulation with the frame sequence Frames w h P 11 ' P 12 ' - - P P 21 ' P 22 ' - - P V(6) V(5 ) = V(3) V(4 ) = V(3) V(3) P P - - P V(2) V(1) (d) Manipulation with pixels as well as frame sequence An example of (a) Actual video (b) Spatially tampered video (c) Temporally tampered video and (d) Spatio-temporal tampered video. Where V(i) represents the i frame and P is the pixel intensity. V(i ) is the manipulated i frame and P is the manipulated pixel intensity. Figure 1.3: Video Tampering Domains 6
7 Lastly, referring Figure 1.3 (d), forger can tamper videos in combination of both spatial and temporal domain (i.e. spatio-temporal tampering) by manipulating pixel bits within a video frame or across the video frames (i.e. set of adjacent frames) as well as disturb the frame sequence and thus create spatio-temporally tampered videos. Over the past few years, significant contributions have been made for detection of spatial tampering or image tampering [4][22], whereas, relatively little contributions have been made for detection of temporal tampering. Thus, this thesis aims to detect the temporal tampering (i.e. tampering with frame sequence) in temporally or spatio-temporally tampered videos. Proceeding section describes the level at which temporal tampering is possible Levels of Temporal Tampering Videos can be manipulated or tampered by a forger at following levels [46-48][52-54] (a) Frame level (b) Scene level (c) Video level In temporal domain, frame is the smallest unit, whereas a video scene is comprised of semantically related sequence of video frames [55]. Based on the accumulative changes in successive frames, scenes in a video are often bounded by either, abrupt change between successive frames in a video or gradual change [56][57]. In this thesis, our consideration about a scene is the sequence of gradually changing successive frames in a video and we will call change of scene when there is abrupt change between two successive frames. Depending upon above discussion, videos can be manipulated at frame level viz. frames of a video (irrespective of scene) can be deleted, or intermediate frames of a video scene can be removed. At the scene level, an entire scene of a video is manipulated viz. deletion of a video scene (i.e. scene deletion), copying of a video scene to another place, etc. Finally, there can be manipulations at the video level viz. making copy of a video. Although, videos may be temporally tampered at the video level, some temporal tampering may not feasible at the video level viz. deletion of frames at video level will be resulted into deletion 7
8 of entire video. Thus, this thesis aims to detect temporal tampering in such videos which were created by manipulating video frames at frame and scene level. Next section presents commonly used temporal tampering with videos Common Temporal Tampering with Videos However, one can temporally manipulate videos in several ways, mostly addressed temporal tampering in literature are mentioned below [46-50][52][53][58-77] (a) Frame Drop or Frame Deletion or Frame Removal (b) Frame Swapping or Reordering of frame sequences (c) Frame Copy or Frame Addition While tampering with original or source video, forger can drop or delete frames of his/her choice, resulting into tampered or doctored videos with reduced frame count. These frames can be the intermediate frames of a video scene or can be the set of frames spread into two scenes. Although, the count of frames get reduced due to tampering of frame drop, but the order or sequence of frames remain unchanged, i.e. if i frame appears before the j frame in the original video and if both frames are present in tampered video (i.e. non dropped frames), then their order will remain same in the tampered video. Figure 1.4 (b) illustrates an example of frame drop at the frame level, where V T is the tampered video created by deleting frames in the original video V O, presented in Figure 1.4 (a). Further, deletion can also be performed at the scene level, i.e. an entire scene is removed or dropped by deleting all frames (i.e. i frame to j frame, where i < j) in that scene. Unlike frame drop, frame count remains unchanged while swapping the video frames (or reordering the frame sequences) to create a tampered or doctored video from original or source video. At the frame level, these swapped frames can be intermediate video frames of one/two scene(s), whereas, there will be swapping of entire scene at the scene level, i.e. all frames of one scene may be swapped with all frames of another scene. Although, the number of frames in tampered video remains same as in original video, but the tampering of frame swapping will be resulted into disordering of frames, i.e. if, the i frame appears before the j frame in the 8
9 original video then the swapping of i and j frames to create a tampered video will disorder the frame sequence in tampered video. Figure 1.4 (c) presents an example depicting tampering of the frame swapping at the frame level. Drop of frames V O (3) and V O (4) V O (1) V O (2) V O (3) V O (4) V O (5) V O (6) V T (1) V O (1) V T (2) V O (2) V O (3) V O (4) V T (3) V O (5) V T (4) V O (6) Temporal domain (a) An example of original video V with 6 video frames Swapping of frames V O (2) and V O (5) (b) Temporal tampering of frame drop. V is a temporally tampered video created by dropping frames in V Copying of frames V O (2) and V O (3) V T (1) V O (1) V T (2) V O (5) V T (3) V O (3) V T (4) V O (4) V T (5) V O (2) V T (6) V O (6) V T (1) V O (1) V T (2) V O (2) V T (3) V O (3) V T (4) V O (4) V T (5) V O (5) V T (6) V O (2) V T (7) V O (3) V T (8) V O (6) Temporal domain Temporal domain (c) Temporal tampering of frame swapping. V is a temporally tampered video created by swapping frames in V (d) Temporal tampering of frame copy. V is a temporally tampered video created by copying or adding frames in V Figure 1.4: Examples of common temporal tampering Finally, frame count will be increased if a source video is manipulated by copying the video frames and pasting to some other location in the source video. At the frame level, these copied frames may be the intermediate frames of a video scene, or at the scene level, an entire scene can be copied and pasted after another scene. Copying can also be at the video level, i.e. all frames of a video can be copied and pasted to create the copy of a source video. Like tampering of frame swapping, tampering of frame copying (at frame level or scene level) will also be resulted into disordering of frame sequence in the tampered video. Figure 1.4 (d) presents an example depicting tampering of frame copying at the frame level. 9
10 Based on the discussion of common temporal tampering, we briefly present two different aspects of temporal tampering as follows (a) Count of frames remain unchanged or get changed in tampered videos, viz. in the tampering of frame swapping number of frames in tampered video remains same as in original or source video, whereas it gets changed due to the tampering of frame drop and frame copy. (b) Order of frames remain same or it gets disordered in tampered videos, viz. in the tampering of frame drop the sequence of frames in tampered video remains same as in original or source video, whereas it gets disordered due to the tampering of frame swapping and frame copy. Based on the presented aspects of temporal tampering, this thesis focuses on the detection of temporal tampering in tampered videos, if created by frame drop (at frame level), frame swapping (at frame level), and frame copying (at scene level). The following section presents the basics of video tampering detection. 1.2 Detection of Tampering with Videos As discussed, the authenticity of video evidences which are submitted during court trials need to be examined before using these videos as evidence. Forensic experts and laboratories contribute to examine the authenticity of video evidences either through blind investigation or investigation with some prior information, which include availability of original or source video, information about video capturing devices viz. CCTV, digital camera, etc., information about some additional information viz. watermarks and digital signature, etc. In literature, these investigation approaches have been categorized under the heads, Active Tamper Detection Techniques, ATDT and Passive Tamper Detection Techniques PTDT [6][50][59-62][65][77-79]. The PTDT are used for blind investigation, whereas the ATDT are based on the availability of some prior information. Inspirit of the categorization used for video quality assessment in the literature [36], we breakup the investigation approaches for detection of tampering with videos into following three categories 10
11 (a) Full Reference (FR) Mode: In this mode of tampering detection, the original or source video which was used for the creation of tampered video is available to conduct the investigation. This is applicable under such circumstances where, the tampering has been performed with the copy of the original video. Hence, the original video is available as reference to verify the authenticity of the tampered video. (b) Reduced Reference (RR) Mode: In this mode of tampering detection, the original or source video is not available but some additional information (as discussed above, excluding the availability of original video) is available to examine the authenticity of video evidence. Generally in this mode, the authenticity of video evidences are examined either by retrieving the embedded information (viz. watermark and digital signature), or verifying the video characteristics as per the details of video capturing device, viz. CCTV. (c) No Reference (NR) Mode: In this mode, no additional information available to forensic experts about the video whose authenticity is to be examined, unlike FR and RR. In the absence of any additional information, the tampering detection under NR mode (or PTDT) is usually performed for identification of any abnormalities or inconsistencies either, within and across video frames (for tracing the spatial tampering), or in the expected temporal redundancy (for tracing the temporal tampering), or combination of both for tracing the spatio-temporal tampering. This thesis aims to detect the tampering under full reference (FR) and no reference (NR) modes for the types of tampering considered to be detected in Section Now we present another aspect of the thesis related with tampered videos, i.e. video quality assessment in the proceeding section Video Quality Assessment As discussed earlier, assessment of quality degradation in tampered video may play a counter measure for forger to create perceptually indistinguishable fake videos. This section briefly presents the overview of the methodologies used in literature for assessing the quality of a video. 11
12 Quality of a video is assessed in two ways, viz. subjective assessment and objective assessment [80][81], where video quality are generally assessed in three modes viz. quality assessment under full reference (FR) mode, reduced reference (RR) mode, and no reference (NR) mode [36][82]. Subjective quality assessment involves human subjects to assess the video quality (in all the three modes i.e. FR, RR, and NR), whereas, objective quality assessment involves various objective quality metrics viz. Mean Squared Error (MSE), Peak Signal to Noise Ratio (PSNR), Structural Similarity Index (SSIM), etc. to measure the video quality automatically [83][84]. Broadly, objective quality metrics are classified in two categories viz. statistical metrics and perceptual metrics such as PSNR and SSIM respectively [36][83][84]. Statistical metrics employ the application of various mathematical functions like calculating pixel-by-pixel weighted differences (viz. MSE and PSNR) between reference and distorted video (in context of video quality assessment, original videos and tampered videos are referred as reference videos and distorted videos respectively), whereas perceptual metrics use Human Visual Systems (HVS) characteristics [35][36]. Subjective assessments are the most reliable way to assess the video quality but it is an exhaustive and costly procedure, whereas in objective quality assessment, challenges lie to design objective quality metrics whose assessment is the true representation of the perceived quality. Distorted videos which are involved in the quality assessment (either in FR or RR or NR modes of quality assessment) may be either the temporally distorted or tampered videos or spatially distorted videos or spatio-temporally distorted videos. In thesis, we aim to assess the quality of spatio-temporally distorted or tampered videos under full reference mode, where the temporal distortion or tampering is due to frame drop. Next section presents the organization of the thesis, which includes the introductory chapter, literature review, and contributory chapters Thesis Organization Apart from introduction, presented in Chapter 1, the remaining chapters of the thesis are organized as follows: 12
13 Chapter 2 presents the explored literature along with limitations of the existing techniques for the detection of tampering with videos. It also presents the reviewed literature for video quality assessment, viz. subjective and objective assessment. Based on the limitations with existing schemes, this chapter presents the explored research issues and accordingly set the objectives in the thesis. Chapter 3 proposes full reference (FR) schemes for detection of tampering of frame drop considering that the tampered video is either a temporally tampered video or spatio-temporally tampered video. This chapter also presents the data parallelization of the scheme proposed for spatio-temporally tampered videos. Chapter 4 proposes learning based no reference (NR) scheme, which detects the tampering of frame drop in the temporally tampered video and accordingly verify the authenticity of the video. Chapter 5 describes the limitations of the learning based scheme proposed in the chapter 4 and proposes a threshold based NR scheme to detect the tampering of frame drop (at frame level) in the temporally tampered video and accordingly verify the authenticity of the video. Chapter 6 proposes a threshold based NR scheme to detect the tampering of frame copy (at the scene level) in the temporally tampered video and accordingly verify the authenticity of the video. Chapter 7 proposes a threshold based NR scheme to detect the tampering of frame swapping (at frame level) in the temporally tampered video and accordingly verify the authenticity of the video. Chapter 8 describes the conducted subjective experiments and presents the obtained mean opinion score (MOS) for spatio-temporal tampered videos (where frame drop was used as the temporal distortion or tampering). Further, the MOS has been used to analyze the performance of two objective quality metrics viz. PSNR and SSIM. Finally, we have proposed a FR dropped frames video quality metrics to assess the quality degradation in the spatio-temporally tampered videos. 13
14
Image Quality Assessment Techniques: An Overview
Image Quality Assessment Techniques: An Overview Shruti Sonawane A. M. Deshpande Department of E&TC Department of E&TC TSSM s BSCOER, Pune, TSSM s BSCOER, Pune, Pune University, Maharashtra, India Pune
More informationReview and Implementation of DWT based Scalable Video Coding with Scalable Motion Coding.
Project Title: Review and Implementation of DWT based Scalable Video Coding with Scalable Motion Coding. Midterm Report CS 584 Multimedia Communications Submitted by: Syed Jawwad Bukhari 2004-03-0028 About
More informationDigital Image Processing
Digital Image Processing Fundamentals of Image Compression DR TANIA STATHAKI READER (ASSOCIATE PROFFESOR) IN SIGNAL PROCESSING IMPERIAL COLLEGE LONDON Compression New techniques have led to the development
More informationA hybrid video quality metric for analyzing quality degradation due to frame drop
A hybrid video quality metric for analyzing quality degradation due to frame drop Manish K Thakur, Vikas Saxena 2 and J P Gupta 3 Department of CSE/IT, Jaypee Institute of Information Technology Noida,
More informationNo-reference perceptual quality metric for H.264/AVC encoded video. Maria Paula Queluz
No-reference perceptual quality metric for H.264/AVC encoded video Tomás Brandão Maria Paula Queluz IT ISCTE IT IST VPQM 2010, Scottsdale, USA, January 2010 Outline 1. Motivation and proposed work 2. Technical
More informationMRT based Adaptive Transform Coder with Classified Vector Quantization (MATC-CVQ)
5 MRT based Adaptive Transform Coder with Classified Vector Quantization (MATC-CVQ) Contents 5.1 Introduction.128 5.2 Vector Quantization in MRT Domain Using Isometric Transformations and Scaling.130 5.2.1
More informationDetecting Digital Image Forgeries By Multi-illuminant Estimators
Research Paper Volume 2 Issue 8 April 2015 International Journal of Informative & Futuristic Research ISSN (Online): 2347-1697 Detecting Digital Image Forgeries By Multi-illuminant Estimators Paper ID
More informationMIXDES Methods of 3D Images Quality Assesment
Methods of 3D Images Quality Assesment, Marek Kamiński, Robert Ritter, Rafał Kotas, Paweł Marciniak, Joanna Kupis, Przemysław Sękalski, Andrzej Napieralski LODZ UNIVERSITY OF TECHNOLOGY Faculty of Electrical,
More informationAN EFFICIENT VIDEO WATERMARKING USING COLOR HISTOGRAM ANALYSIS AND BITPLANE IMAGE ARRAYS
AN EFFICIENT VIDEO WATERMARKING USING COLOR HISTOGRAM ANALYSIS AND BITPLANE IMAGE ARRAYS G Prakash 1,TVS Gowtham Prasad 2, T.Ravi Kumar Naidu 3 1MTech(DECS) student, Department of ECE, sree vidyanikethan
More informationInternational Journal of Emerging Technology and Advanced Engineering Website: (ISSN , Volume 2, Issue 4, April 2012)
A Technical Analysis Towards Digital Video Compression Rutika Joshi 1, Rajesh Rai 2, Rajesh Nema 3 1 Student, Electronics and Communication Department, NIIST College, Bhopal, 2,3 Prof., Electronics and
More informationQoE Characterization for Video-On-Demand Services in 4G WiMAX Networks
QoE Characterization for Video-On-Demand Services in 4G WiMAX Networks Amitabha Ghosh IBM India Research Laboratory Department of Electrical Engineering University of Southern California, Los Angeles http://anrg.usc.edu/~amitabhg
More informationR 118 TIERING OF CAMERAS FOR USE IN TELEVISION PRODUCTION
R 118 TIERING OF CAMERAS FOR USE IN TELEVISION PRODUCTION VERSION 2 Geneva April 2017 Page intentionally left blank. This document is paginated for two sided printing EBU R 118 Tiering of Cameras for use
More informationIMAGE COMPRESSION USING ANTI-FORENSICS METHOD
IMAGE COMPRESSION USING ANTI-FORENSICS METHOD M.S.Sreelakshmi and D. Venkataraman Department of Computer Science and Engineering, Amrita Vishwa Vidyapeetham, Coimbatore, India mssreelakshmi@yahoo.com d_venkat@cb.amrita.edu
More informationCHAPTER 6. 6 Huffman Coding Based Image Compression Using Complex Wavelet Transform. 6.3 Wavelet Transform based compression technique 106
CHAPTER 6 6 Huffman Coding Based Image Compression Using Complex Wavelet Transform Page No 6.1 Introduction 103 6.2 Compression Techniques 104 103 6.2.1 Lossless compression 105 6.2.2 Lossy compression
More informationDYADIC WAVELETS AND DCT BASED BLIND COPY-MOVE IMAGE FORGERY DETECTION
DYADIC WAVELETS AND DCT BASED BLIND COPY-MOVE IMAGE FORGERY DETECTION Ghulam Muhammad*,1, Muhammad Hussain 2, Anwar M. Mirza 1, and George Bebis 3 1 Department of Computer Engineering, 2 Department of
More informationHow Many Humans Does it Take to Judge Video Quality?
How Many Humans Does it Take to Judge Video Quality? Bill Reckwerdt, CTO Video Clarity, Inc. Version 1.0 A Video Clarity Case Study page 1 of 5 Abstract for Subjective Video Quality Assessment In order
More informationA New Approach to Authenticate Images in Different Datasets Using a Lossless Image Watermarking Technique
A New Approach to Authenticate Images in Different Datasets Using a Lossless Image Watermarking Technique 1 Arathi Chitla, 2 Dr. M. Chandra Mohan 1 Associate Professor, Department of Computer Science &
More informationImage Quality Assessment-Oriented Frame Capture of Video Phone over 3G system
Image Quality Assessment-Oriented Frame Capture of Video Phone over 3G system Chao Feng, Lianfen Huang*, Jianan Lin and Jinjin Li School of Information Science and Technology, Xiamen University Xiamen,
More informationPerformance analysis of AAC audio codec and comparison of Dirac Video Codec with AVS-china. Under guidance of Dr.K.R.Rao Submitted By, ASHWINI S URS
Performance analysis of AAC audio codec and comparison of Dirac Video Codec with AVS-china Under guidance of Dr.K.R.Rao Submitted By, ASHWINI S URS Outline Overview of Dirac Overview of AVS-china Overview
More informationAn Introduction to Content Based Image Retrieval
CHAPTER -1 An Introduction to Content Based Image Retrieval 1.1 Introduction With the advancement in internet and multimedia technologies, a huge amount of multimedia data in the form of audio, video and
More informationNo Reference Medical Image Quality Measurement Based on Spread Spectrum and Discrete Wavelet Transform using ROI Processing
No Reference Medical Image Quality Measurement Based on Spread Spectrum and Discrete Wavelet Transform using ROI Processing Arash Ashtari Nakhaie, Shahriar Baradaran Shokouhi Iran University of Science
More informationModule 7 VIDEO CODING AND MOTION ESTIMATION
Module 7 VIDEO CODING AND MOTION ESTIMATION Lesson 20 Basic Building Blocks & Temporal Redundancy Instructional Objectives At the end of this lesson, the students should be able to: 1. Name at least five
More informationDIGITAL FORENSICS FORENSICS FRAMEWORK FOR CLOUD COMPUTING
17.09.24 DIGITAL FORENSICS FORENSICS FRAMEWORK FOR CLOUD COMPUTING FORENSICS FRAMEWORK FOR CLOUD COMPUTING OUTLINE Abstract Introduction Challenges in cloud forensics Proposed solution Conclusion Opinion
More informationDigital Image Forgery Detection Based on GLCM and HOG Features
Digital Image Forgery Detection Based on GLCM and HOG Features Liya Baby 1, Ann Jose 2 Department of Electronics and Communication, Ilahia College of Engineering and Technology, Muvattupuzha, Ernakulam,
More informationADAPTIVE VIDEO STREAMING FOR BANDWIDTH VARIATION WITH OPTIMUM QUALITY
ADAPTIVE VIDEO STREAMING FOR BANDWIDTH VARIATION WITH OPTIMUM QUALITY Joseph Michael Wijayantha Medagama (08/8015) Thesis Submitted in Partial Fulfillment of the Requirements for the Degree Master of Science
More informationEfficient Color Image Quality Assessment Using Gradient Magnitude Similarity Deviation
IJECT Vo l. 8, Is s u e 3, Ju l y - Se p t 2017 ISSN : 2230-7109 (Online) ISSN : 2230-9543 (Print) Efficient Color Image Quality Assessment Using Gradient Magnitude Similarity Deviation 1 Preeti Rani,
More informationCHAPTER 4 REVERSIBLE IMAGE WATERMARKING USING BIT PLANE CODING AND LIFTING WAVELET TRANSFORM
74 CHAPTER 4 REVERSIBLE IMAGE WATERMARKING USING BIT PLANE CODING AND LIFTING WAVELET TRANSFORM Many data embedding methods use procedures that in which the original image is distorted by quite a small
More informationSignature Verification Why xyzmo offers the leading solution
Dynamic (Biometric) Signature Verification The signature is the last remnant of the hand-written document in a digital world, and is considered an acceptable and trustworthy means of authenticating all
More informationAn Architectural Framework for Ubiquitous Computing Applications
An Architectural Framework for Ubiquitous Computing Applications I. Koutelekos 1 Dpts. of Electronics and Automation MSc in Networking and Data Communications, T.E.I. of Piraeus, Greece, Email: ekoutele@otenet.gr
More informationSTUDY AND IMPLEMENTATION OF VIDEO COMPRESSION STANDARDS (H.264/AVC, DIRAC)
STUDY AND IMPLEMENTATION OF VIDEO COMPRESSION STANDARDS (H.264/AVC, DIRAC) EE 5359-Multimedia Processing Spring 2012 Dr. K.R Rao By: Sumedha Phatak(1000731131) OBJECTIVE A study, implementation and comparison
More informationDWT-SVD Based Hybrid Approach for Digital Watermarking Using Fusion Method
DWT-SVD Based Hybrid Approach for Digital Watermarking Using Fusion Method Sonal Varshney M.tech Scholar Galgotias University Abhinandan Singh M.tech Scholar Galgotias University Abstract With the rapid
More informationREVIEW ON IMAGE COMPRESSION TECHNIQUES AND ADVANTAGES OF IMAGE COMPRESSION
REVIEW ON IMAGE COMPRESSION TECHNIQUES AND ABSTRACT ADVANTAGES OF IMAGE COMPRESSION Amanpreet Kaur 1, Dr. Jagroop Singh 2 1 Ph. D Scholar, Deptt. of Computer Applications, IK Gujral Punjab Technical University,
More informationautomatic digitization. In the context of ever increasing population worldwide and thereby
Chapter 1 Introduction In the recent time, many researchers had thrust upon developing various improvised methods of automatic digitization. In the context of ever increasing population worldwide and thereby
More informationCHAPTER 6 EFFICIENT TECHNIQUE TOWARDS THE AVOIDANCE OF REPLAY ATTACK USING LOW DISTORTION TRANSFORM
109 CHAPTER 6 EFFICIENT TECHNIQUE TOWARDS THE AVOIDANCE OF REPLAY ATTACK USING LOW DISTORTION TRANSFORM Security is considered to be the most critical factor in many applications. The main issues of such
More informationThe Trustworthiness of Digital Records
The Trustworthiness of Digital Records International Congress on Digital Records Preservation Beijing, China 16 April 2010 1 The Concept of Record Record: any document made or received by a physical or
More informationVideo Inter-frame Forgery Identification Based on Optical Flow Consistency
Sensors & Transducers 24 by IFSA Publishing, S. L. http://www.sensorsportal.com Video Inter-frame Forgery Identification Based on Optical Flow Consistency Qi Wang, Zhaohong Li, Zhenzhen Zhang, Qinglong
More informationComparative and performance analysis of HEVC and H.264 Intra frame coding and JPEG2000
Comparative and performance analysis of HEVC and H.264 Intra frame coding and JPEG2000 EE5359 Multimedia Processing Project Proposal Spring 2013 The University of Texas at Arlington Department of Electrical
More informationTech Note - 05 Surveillance Systems that Work! Calculating Recorded Volume Disk Space
Tech Note - 05 Surveillance Systems that Work! Surveillance Systems Calculating required storage drive (disk space) capacity is sometimes be a rather tricky business. This Tech Note is written to inform
More informationWhen Recognition Matters WHITEPAPER CLFE CERTIFIED LEAD FORENSIC EXAMINER.
When Recognition Matters WHITEPAPER CLFE www.pecb.com CONTENT 3 4 5 6 6 7 7 8 8 Introduction So, what is Computer Forensics? Key domains of a CLFE How does a CLFE approach the investigation? What are the
More informationMultimedia Security: So What s the Big Deal?
Multimedia Security: So What s the Big Deal? Edward J. Delp Purdue University School of Electrical and Computer Engineering Video and Image Processing Laboratory (VIPER) West Lafayette, Indiana email:
More informationContext based optimal shape coding
IEEE Signal Processing Society 1999 Workshop on Multimedia Signal Processing September 13-15, 1999, Copenhagen, Denmark Electronic Proceedings 1999 IEEE Context based optimal shape coding Gerry Melnikov,
More informationSo, what is data compression, and why do we need it?
In the last decade we have been witnessing a revolution in the way we communicate 2 The major contributors in this revolution are: Internet; The explosive development of mobile communications; and The
More informationCOMPUTER VISION. Dr. Sukhendu Das Deptt. of Computer Science and Engg., IIT Madras, Chennai
COMPUTER VISION Dr. Sukhendu Das Deptt. of Computer Science and Engg., IIT Madras, Chennai 600036. Email: sdas@iitm.ac.in URL: //www.cs.iitm.ernet.in/~sdas 1 INTRODUCTION 2 Human Vision System (HVS) Vs.
More informationDigital Image Steganography Using Bit Flipping
BULGARIAN ACADEMY OF SCIENCES CYBERNETICS AND INFORMATION TECHNOLOGIES Volume 18, No 1 Sofia 2018 Print ISSN: 1311-9702; Online ISSN: 1314-4081 DOI: 10.2478/cait-2018-0006 Digital Image Steganography Using
More informationVIDEO DENOISING BASED ON ADAPTIVE TEMPORAL AVERAGING
Engineering Review Vol. 32, Issue 2, 64-69, 2012. 64 VIDEO DENOISING BASED ON ADAPTIVE TEMPORAL AVERAGING David BARTOVČAK Miroslav VRANKIĆ Abstract: This paper proposes a video denoising algorithm based
More informationWATERMARKING FOR LIGHT FIELD RENDERING 1
ATERMARKING FOR LIGHT FIELD RENDERING 1 Alper Koz, Cevahir Çığla and A. Aydın Alatan Department of Electrical and Electronics Engineering, METU Balgat, 06531, Ankara, TURKEY. e-mail: koz@metu.edu.tr, cevahir@eee.metu.edu.tr,
More informationCelebrity Identification and Recognition in Videos. An application of semi-supervised learning and multiclass classification
Celebrity Identification and Recognition in Videos An application of semi-supervised learning and multiclass classification Contents Celebrity Identification and Recognition in Videos... 1 Aim... 3 Motivation...
More informationVideo Quality Analysis for H.264 Based on Human Visual System
IOSR Journal of Engineering (IOSRJEN) ISSN (e): 2250-3021 ISSN (p): 2278-8719 Vol. 04 Issue 08 (August. 2014) V4 PP 01-07 www.iosrjen.org Subrahmanyam.Ch 1 Dr.D.Venkata Rao 2 Dr.N.Usha Rani 3 1 (Research
More information6th International Workshop on OMNeT++
6th International Workshop on OMNeT++ An OMNeT++ Framework to Evaluate Video Transmission in Mobile Wireless Multimedia Sensor Networks Denis Rosário, Zhongliang Zhao, Claudio Silva, Eduardo Cerqueira,
More informationAbout MPEG Compression. More About Long-GOP Video
About MPEG Compression HD video requires significantly more data than SD video. A single HD video frame can require up to six times more data than an SD frame. To record such large images with such a low
More informationBlind Prediction of Natural Video Quality and H.264 Applications
Proceedings of Seventh International Workshop on Video Processing and Quality Metrics for Consumer Electronics January 30-February 1, 2013, Scottsdale, Arizona 1 Blind Prediction of Natural Video Quality
More informationVideo and Audio Recordings Video and audio recordings of activities continue to
Chapter 3 Video and Audio Recordings Video and audio recordings of activities continue to become prevalent in investigations of criminal activity. Recordings include surveillance tapes recordings of criminal
More informationNavjot Singh *1, Deepak Sharma 2 ABSTRACT I. INTRODUCTION
2017 IJSRSET Volume 3 Issue 1 Print ISSN: 2395-1990 Online ISSN : 2394-4099 Themed Section: Engineering and Technology An Efficient Multiple Data Hiding Technique for Medical Images Using QR Code Authentication
More informationCHAPTER-4 WATERMARKING OF GRAY IMAGES
CHAPTER-4 WATERMARKING OF GRAY IMAGES 4.1 INTRODUCTION Like most DCT based watermarking schemes, Middle-Band Coefficient Exchange scheme has proven its robustness against those attacks, which anyhow, do
More informationPerceptual Quality Measurement and Control: Definition, Application and Performance
Perceptual Quality Measurement and Control: Definition, Application and Performance A. R. Prasad, R. Esmailzadeh, S. Winkler, T. Ihara, B. Rohani, B. Pinguet and M. Capel Genista Corporation Tokyo, Japan
More informationAnatomy of a Semantic Virus
Anatomy of a Semantic Virus Peyman Nasirifard Digital Enterprise Research Institute National University of Ireland, Galway IDA Business Park, Lower Dangan, Galway, Ireland peyman.nasirifard@deri.org Abstract.
More informationA Comparison of Still-Image Compression Standards Using Different Image Quality Metrics and Proposed Methods for Improving Lossy Image Quality
A Comparison of Still-Image Compression Standards Using Different Image Quality Metrics and Proposed Methods for Improving Lossy Image Quality Multidimensional DSP Literature Survey Eric Heinen 3/21/08
More informationTampering Detection in Compressed Digital Video Using Watermarking
Tampering Detection in Compressed Digital Video Using Watermarking Mehdi Fallahpour, Shervin Shirmohammadi, Mehdi Semsarzadeh, Jiying Zhao School of Electrical Engineering and Computer Science (EECS),
More informationCopy-Move Forgery Detection using DCT and SIFT
Copy-Move Forgery Detection using DCT and SIFT Amanpreet Kaur Department of Computer Science and Engineering, Lovely Professional University, Punjab, India. Richa Sharma Department of Computer Science
More informationADVANCE VEHICLE CONTROL AND SAFETY SYSTEM USING FACE DETECTION
ADVANCE VEHICLE CONTROL AND SAFETY SYSTEM USING FACE DETECTION Prof. Saurabh Thakur 1, Shekhar Dure 2, Ajinkya Khutwad 3 1,2,3 Dept. of E&TC, Sinhgad Academy Of Engineering, Savitribai Phule Pune University,
More informationSTEGANOGRAPHIC TECHNIQUES FOR HIDING DATA IN SWF FILES
Chapter 19 STEGANOGRAPHIC TECHNIQUES FOR HIDING DATA IN SWF FILES Mark-Anthony Fouche and Martin Olivier Abstract Small Web Format (SWF) or Flash files are widely used on the Internet to provide Rich Internet
More informationCompression of VQM Features for Low Bit-Rate Video Quality Monitoring
Compression of VQM Features for Low Bit-Rate Video Quality Monitoring Mina Makar, Yao-Chung Lin, Andre F. de Araujo and Bernd Girod Information Systems Laboratory, Stanford University, Stanford, CA 9435
More informationFace anti-spoofing using Image Quality Assessment
Face anti-spoofing using Image Quality Assessment Speakers Prisme Polytech Orléans Aladine Chetouani R&D Trusted Services Emna Fourati Outline Face spoofing attacks Image Quality Assessment Proposed method
More informationEE 5359 Multimedia project
EE 5359 Multimedia project -Chaitanya Chukka -Chaitanya.chukka@mavs.uta.edu 5/7/2010 1 Universality in the title The measurement of Image Quality(Q)does not depend : On the images being tested. On Viewing
More informationDigital Image Steganography Techniques: Case Study. Karnataka, India.
ISSN: 2320 8791 (Impact Factor: 1.479) Digital Image Steganography Techniques: Case Study Santosh Kumar.S 1, Archana.M 2 1 Department of Electronicsand Communication Engineering, Sri Venkateshwara College
More informationRedundancy and Correlation: Temporal
Redundancy and Correlation: Temporal Mother and Daughter CIF 352 x 288 Frame 60 Frame 61 Time Copyright 2007 by Lina J. Karam 1 Motion Estimation and Compensation Video is a sequence of frames (images)
More informationMATRIX BASED INDEXING TECHNIQUE FOR VIDEO DATA
Journal of Computer Science, 9 (5): 534-542, 2013 ISSN 1549-3636 2013 doi:10.3844/jcssp.2013.534.542 Published Online 9 (5) 2013 (http://www.thescipub.com/jcs.toc) MATRIX BASED INDEXING TECHNIQUE FOR VIDEO
More informationAn Improved Performance of Watermarking In DWT Domain Using SVD
An Improved Performance of Watermarking In DWT Domain Using SVD Ramandeep Kaur 1 and Harpal Singh 2 1 Research Scholar, Department of Electronics & Communication Engineering, RBIEBT, Kharar, Pin code 140301,
More informationReversible Data Hiding in Colour Images using AES Data Encryption System
Reversible Data Hiding in Colour Images using AES Data Encryption System M. Prem Anand 1, Y. Karthikeyan 2 1 Assistant Professor 2 M.E Student 1,2 Department of Electronics & Communication Engineering,
More informationA Video Forgery Detection Using Discrete Wavelet Transform and Scale Invarient Feature Transform Techniques
A Video Forgery Detection Using Discrete Wavelet Transform and Scale Invarient Feature Transform Techniques Gurjinder Kaur 1, Rishamjot Kaur 2 1 Department of Computer Science & Engineering, Baba Farid
More informationImage Enhancement Techniques for Fingerprint Identification
March 2013 1 Image Enhancement Techniques for Fingerprint Identification Pankaj Deshmukh, Siraj Pathan, Riyaz Pathan Abstract The aim of this paper is to propose a new method in fingerprint enhancement
More informationTechnical Recommendation S. 10/07: Source Encoding of High Definition Mobile TV Services
Technical Recommendation S. 10/07: Source Encoding of High Definition Mobile TV Services Version: 0.4 Date: November 29, 2007 Authors: M. Ries, M. Rupp Status: Final Page 1 / 7 Technical Recommendation
More informationDEPLOYMENT OF OPTIMIZED ALGORITHM FOR MPEG-4 DATA OVER WIRELESS MULTIMEDIA SENSOR NETWORK
DEPLOYMENT OF OPTIMIZED ALGORITHM FOR MPEG-4 DATA OVER WIRELESS MULTIMEDIA SENSOR NETWORK Norlezah Hashim 1, Sharifah Hafizah Syed Ariffin 2, Farizah Yunus 2, Fakrulradzi Idris 3 and Norsheila Fisal 2
More informationOptimized Watermarking Using Swarm-Based Bacterial Foraging
Journal of Information Hiding and Multimedia Signal Processing c 2009 ISSN 2073-4212 Ubiquitous International Volume 1, Number 1, January 2010 Optimized Watermarking Using Swarm-Based Bacterial Foraging
More informationPerceptual coding. A psychoacoustic model is used to identify those signals that are influenced by both these effects.
Perceptual coding Both LPC and CELP are used primarily for telephony applications and hence the compression of a speech signal. Perceptual encoders, however, have been designed for the compression of general
More informationCHAPTER-5 WATERMARKING OF COLOR IMAGES
CHAPTER-5 WATERMARKING OF COLOR IMAGES 5.1 INTRODUCTION After satisfactorily developing the watermarking schemes for gray level images, we focused on developing the watermarking schemes for the color images.
More informationRobust Image Watermarking based on Discrete Wavelet Transform, Discrete Cosine Transform & Singular Value Decomposition
Advance in Electronic and Electric Engineering. ISSN 2231-1297, Volume 3, Number 8 (2013), pp. 971-976 Research India Publications http://www.ripublication.com/aeee.htm Robust Image Watermarking based
More informationENHANCED DCT COMPRESSION TECHNIQUE USING VECTOR QUANTIZATION AND BAT ALGORITHM Er.Samiksha 1, Er. Anurag sharma 2
ENHANCED DCT COMPRESSION TECHNIQUE USING VECTOR QUANTIZATION AND BAT ALGORITHM Er.Samiksha 1, Er. Anurag sharma 2 1 Research scholar (M-tech) ECE, CT Ninstitute of Technology and Recearch, Jalandhar, Punjab,
More informationA Novel Spatial Domain Invisible Watermarking Technique Using Canny Edge Detector
A Novel Spatial Domain Invisible Watermarking Technique Using Canny Edge Detector 1 Vardaini M.Tech, Department of Rayat Institute of Engineering and information Technology, Railmajra 2 Anudeep Goraya
More informationScientific Working Groups on Digital Evidence and Imaging Technology
SWGDE/SWGIT Guidelines & Recommendations for Training in Digital & Multimedia Evidence Disclaimer: As a condition to the use of this document and the information contained therein, the SWGDE/SWGIT request
More informationAxis Megapixel Network Cameras. See what you ve been missing
Axis Megapixel Network Cameras See what you ve been missing Megapixel network cameras Megapixel network cameras have an important role to play in video surveillance applications. They are obviously more
More informationMegapixel Video for. Part 2 of 4. Brought to You by. Presented by Video Security Consultants
rought to You by 2009 Video Security Consultants Presented by Part 2 of 4 A1 Part 2 of 4 How to Avert a Compression Depression Illustration by Jerry King While bandwidth is widening, larger video systems
More informationDCT-BASED IMAGE QUALITY ASSESSMENT FOR MOBILE SYSTEM. Jeoong Sung Park and Tokunbo Ogunfunmi
DCT-BASED IMAGE QUALITY ASSESSMENT FOR MOBILE SYSTEM Jeoong Sung Park and Tokunbo Ogunfunmi Department of Electrical Engineering Santa Clara University Santa Clara, CA 9553, USA Email: jeoongsung@gmail.com
More informationComputer forensics Aiman Al-Refaei
Computer forensics Aiman Al-Refaei 29.08.2006 Computer forensics 1 Computer forensics Definitions: Forensics - The use of science and technology to investigate and establish facts in criminal or civil
More informationHuman Motion Detection and Tracking for Video Surveillance
Human Motion Detection and Tracking for Video Surveillance Prithviraj Banerjee and Somnath Sengupta Department of Electronics and Electrical Communication Engineering Indian Institute of Technology, Kharagpur,
More information15 Data Compression 2014/9/21. Objectives After studying this chapter, the student should be able to: 15-1 LOSSLESS COMPRESSION
15 Data Compression Data compression implies sending or storing a smaller number of bits. Although many methods are used for this purpose, in general these methods can be divided into two broad categories:
More informationSECRETLY CONCEALING MESSAGE USING ADVANCED IMAGE PROCESSING
International Journal of Engineering Research ISSN: 2348-4039 & Management Technology May-2017 Volume- 4, Issue-3 Email: editor@ijermt.org www.ijermt.org SECRETLY CONCEALING MESSAGE USING ADVANCED IMAGE
More informationImage and Video Quality Assessment Using Neural Network and SVM
TSINGHUA SCIENCE AND TECHNOLOGY ISSN 1007-0214 18/19 pp112-116 Volume 13, Number 1, February 2008 Image and Video Quality Assessment Using Neural Network and SVM DING Wenrui (), TONG Yubing (), ZHANG Qishan
More informationA Robust Wavelet-Based Watermarking Algorithm Using Edge Detection
A Robust Wavelet-Based Watermarking Algorithm Using Edge Detection John N. Ellinas Abstract In this paper, a robust watermarking algorithm using the wavelet transform and edge detection is presented. The
More informationBoth LPC and CELP are used primarily for telephony applications and hence the compression of a speech signal.
Perceptual coding Both LPC and CELP are used primarily for telephony applications and hence the compression of a speech signal. Perceptual encoders, however, have been designed for the compression of general
More informationDIGITAL TELEVISION 1. DIGITAL VIDEO FUNDAMENTALS
DIGITAL TELEVISION 1. DIGITAL VIDEO FUNDAMENTALS Television services in Europe currently broadcast video at a frame rate of 25 Hz. Each frame consists of two interlaced fields, giving a field rate of 50
More informationCHAPTER 3 SHOT DETECTION AND KEY FRAME EXTRACTION
33 CHAPTER 3 SHOT DETECTION AND KEY FRAME EXTRACTION 3.1 INTRODUCTION The twenty-first century is an age of information explosion. We are witnessing a huge growth in digital data. The trend of increasing
More informationSuspicious Activity Detection of Moving Object in Video Surveillance System
International Journal of Latest Engineering and Management Research (IJLEMR) ISSN: 2455-4847 ǁ Volume 1 - Issue 5 ǁ June 2016 ǁ PP.29-33 Suspicious Activity Detection of Moving Object in Video Surveillance
More informationPart 1 of 4. MARCH
Presented by Brought to You by Part 1 of 4 MARCH 2004 www.securitysales.com A1 Part1of 4 Essentials of DIGITAL VIDEO COMPRESSION By Bob Wimmer Video Security Consultants cctvbob@aol.com AT A GLANCE Compression
More informationDEEP LEARNING OF COMPRESSED SENSING OPERATORS WITH STRUCTURAL SIMILARITY (SSIM) LOSS
DEEP LEARNING OF COMPRESSED SENSING OPERATORS WITH STRUCTURAL SIMILARITY (SSIM) LOSS ABSTRACT Compressed sensing (CS) is a signal processing framework for efficiently reconstructing a signal from a small
More informationNo-Reference Image Based On Fuzzy Classification for Quality Assessment
No-Reference Image Based On Fuzzy Classification for Quality Assessment Percy Irine Biju P Department of Electrical and Electronics Engineering Anna University Regional Campus, Tirunelveli, Tamilnadu,
More informationTowards a Telltale Watermarking Technique for Tamper-Proofing
Towards a Telltale Watermarking Technique for Tamper-Proofing Deepa Kundur and Dimitrios Hatzinakos 10 King s College Road Department of Electrical and Computer Engineering University of Toronto Toronto,
More informationMotion Estimation for Video Coding Standards
Motion Estimation for Video Coding Standards Prof. Ja-Ling Wu Department of Computer Science and Information Engineering National Taiwan University Introduction of Motion Estimation The goal of video compression
More informationRobust Image Watermarking based on DCT-DWT- SVD Method
Robust Image Watermarking based on DCT-DWT- SVD Sneha Jose Rajesh Cherian Roy, PhD. Sreenesh Shashidharan ABSTRACT Hybrid Image watermarking scheme proposed based on Discrete Cosine Transform (DCT)-Discrete
More informationA Full Reference Based Objective Image Quality Assessment
A Full Reference Based Objective Image Quality Assessment Mayuresh Gulame, K. R. Joshi & Kamthe R. S. P.E.S Modern College of Engineering, Pune -5 E-mail : mayuresh2103@gmail.com, krjpune@gmail.com rupalikamathe@gmail.com
More information