The DCT domain and JPEG
|
|
- Georgia Garrison
- 6 years ago
- Views:
Transcription
1 The DCT domain and JPEG CSM25 Secure Information Hiding Dr Hans Georg Schaathun University of Surrey Spring 2009 Week 3 Dr Hans Georg Schaathun The DCT domain and JPEG Spring 2009 Week 3 1 / 47
2 Learning Objectives Be able to work with and JPEG images and other representations in the transform domain. Understand what happens during JPEG compression, and its potential consequence to watermarking and steganography. Be able to apply simple LSB embedding in the JPEG domain. Dr Hans Georg Schaathun The DCT domain and JPEG Spring 2009 Week 3 2 / 47
3 Outline Overview 1 Overview 2 Image Representation 3 Compression 4 Steganography in JPEG 5 Matlab Dr Hans Georg Schaathun The DCT domain and JPEG Spring 2009 Week 3 3 / 47
4 Overview The elements of JPEG Operates on luminence and chrominance (YCbCr) (not on RGB) Grayscale images have luminence component only. Downsampling Works in the DCT domain (not the spatial domain) Quantisation Entropy coding (lossless compression) Dr Hans Georg Schaathun The DCT domain and JPEG Spring 2009 Week 3 4 / 47
5 Overview JPEG is not a file format JPEG is a compression system The system employs three different compression techniques JPEG is not a file format. Files with extension.jpeg are often JFIF or EXIF. JFIF is traditionally the most common file format for JPEG. EXIF is made for digital cameras and contain extra meta information. Dr Hans Georg Schaathun The DCT domain and JPEG Spring 2009 Week 3 5 / 47
6 Overview Reading Core Reading Digital Image Processing Using MATLAB. Chapter 6: colour images Representation Processing Conversion Chapter 8.5: JPEG compression Chapter 4: Frequency domain processing Dr Hans Georg Schaathun The DCT domain and JPEG Spring 2009 Week 3 6 / 47
7 Outline Image Representation 1 Overview 2 Image Representation Alternatives to RGB The blockwise DCT domain 3 Compression 4 Steganography in JPEG 5 Matlab Dr Hans Georg Schaathun The DCT domain and JPEG Spring 2009 Week 3 7 / 47
8 Image Representation Alternatives to RGB The RGB colour representations RGB : A colour is a vector (R, G, B) R is amount of red light. G is amount of green light. B is amount of blue light. Each pixel can be either A colour vector (R, G, B); or a reference to an array of colour vectors (the palette) Each coefficient can be [0, 1]; floating point (double in matlab) {0, 1,..., 255}; 8-bit integer (uint8 in matlab) {0, 1,..., }; 16-bit integer (uint16 in matlab) Dr Hans Georg Schaathun The DCT domain and JPEG Spring 2009 Week 3 8 / 47
9 Alternatives to RGB Image Representation Alternatives to RGB NTSC : (Y, I, Q) where R, G, B [0, 1]. YCbCr : (Y, Cb, Cr) Y R I = G Q B Y R Cb = G Cr B where R, G, B [0, 1] and Y, Cb, Cr [0, 255]. Dr Hans Georg Schaathun The DCT domain and JPEG Spring 2009 Week 3 9 / 47
10 Image Representation The blockwise DCT domain Block-wise Each colour-channel (Y,Cb,Cr) considered separately M N matrix divided into 8 8 blocks Each block is handled separately Dr Hans Georg Schaathun The DCT domain and JPEG Spring 2009 Week 3 10 / 47
11 The DCT transform Image Representation The blockwise DCT domain Several different DCT transform. We use the following. T f (u, v) = M 1 N 1 x=0 y=0 α(u)α(v) f (x, y) cos MN (2x + 1)uπ 2M cos (2y + 1)vπ 2N where α(a) = M = N = 8, { 1, if a = 0, 2, otherwise. Dr Hans Georg Schaathun The DCT domain and JPEG Spring 2009 Week 3 11 / 47
12 The DCT transform Image Representation The blockwise DCT domain The inverse is similar f (x, y) = M 1 N 1 u=0 v=0 α(u)α(v) T f (u, v) cos MN (2x + 1)uπ 2M cos (2y + 1)vπ 2N where α(a) = M = N = 8, { 1, if a = 0, 2, otherwise. Dr Hans Georg Schaathun The DCT domain and JPEG Spring 2009 Week 3 12 / 47
13 Image Representation The blockwise DCT domain Matlab Matlab functions dct2 (2D DCT transform) idct2 (Inverse) blkproc ( X, [M N], FUN ) For instance blkproc ( X, [8 ) Use help system for details Do not use imread for JPEG images converts images to the spatial domain. you don t even know the compression parameters... Dr Hans Georg Schaathun The DCT domain and JPEG Spring 2009 Week 3 13 / 47
14 Image Representation The blockwise DCT domain Transform image Linear combination of patterns (see right) DC (upper left) gives average colour intensity Low frequency: coarse structure High frequency: fine details Dr Hans Georg Schaathun The DCT domain and JPEG Spring 2009 Week 3 14 / 47
15 Outline Compression 1 Overview 2 Image Representation 3 Compression Downsampling Quantisation Source Coding 4 Steganography in JPEG 5 Matlab Dr Hans Georg Schaathun The DCT domain and JPEG Spring 2009 Week 3 15 / 47
16 Compression Downsampling What is sampling? Fact The human eye is more sensitive to changes in luminance than in chrominance. To sample is to collect measurements. Each pixel is a sample (measuring the colour of the image). Lower resolution means fewer samples. Reducing resolution = downsampling Basic M N image: N M samples per component (Y, Cb, Cr). Y is more useful than Cb and Cr. Therefore we can downsample Cb and Cr M/2 N/2 is common for Cb and Cr Still use M M for Y Dr Hans Georg Schaathun The DCT domain and JPEG Spring 2009 Week 3 16 / 47
17 Compression Downsampling What is sampling? Fact The human eye is more sensitive to changes in luminance than in chrominance. To sample is to collect measurements. Each pixel is a sample (measuring the colour of the image). Lower resolution means fewer samples. Reducing resolution = downsampling Basic M N image: N M samples per component (Y, Cb, Cr). Y is more useful than Cb and Cr. Therefore we can downsample Cb and Cr M/2 N/2 is common for Cb and Cr Still use M M for Y Dr Hans Georg Schaathun The DCT domain and JPEG Spring 2009 Week 3 16 / 47
18 Compression Downsampling What is sampling? Fact The human eye is more sensitive to changes in luminance than in chrominance. To sample is to collect measurements. Each pixel is a sample (measuring the colour of the image). Lower resolution means fewer samples. Reducing resolution = downsampling Basic M N image: N M samples per component (Y, Cb, Cr). Y is more useful than Cb and Cr. Therefore we can downsample Cb and Cr M/2 N/2 is common for Cb and Cr Still use M M for Y Dr Hans Georg Schaathun The DCT domain and JPEG Spring 2009 Week 3 16 / 47
19 Compression Downsampling What is sampling? Fact The human eye is more sensitive to changes in luminance than in chrominance. To sample is to collect measurements. Each pixel is a sample (measuring the colour of the image). Lower resolution means fewer samples. Reducing resolution = downsampling Basic M N image: N M samples per component (Y, Cb, Cr). Y is more useful than Cb and Cr. Therefore we can downsample Cb and Cr M/2 N/2 is common for Cb and Cr Still use M M for Y Dr Hans Georg Schaathun The DCT domain and JPEG Spring 2009 Week 3 16 / 47
20 Compression Downsampling What is sampling? Fact The human eye is more sensitive to changes in luminance than in chrominance. To sample is to collect measurements. Each pixel is a sample (measuring the colour of the image). Lower resolution means fewer samples. Reducing resolution = downsampling Basic M N image: N M samples per component (Y, Cb, Cr). Y is more useful than Cb and Cr. Therefore we can downsample Cb and Cr M/2 N/2 is common for Cb and Cr Still use M M for Y Dr Hans Georg Schaathun The DCT domain and JPEG Spring 2009 Week 3 16 / 47
21 Compression Downsampling What is sampling? Fact The human eye is more sensitive to changes in luminance than in chrominance. To sample is to collect measurements. Each pixel is a sample (measuring the colour of the image). Lower resolution means fewer samples. Reducing resolution = downsampling Basic M N image: N M samples per component (Y, Cb, Cr). Y is more useful than Cb and Cr. Therefore we can downsample Cb and Cr M/2 N/2 is common for Cb and Cr Still use M M for Y Dr Hans Georg Schaathun The DCT domain and JPEG Spring 2009 Week 3 16 / 47
22 Compression Downsampling What is sampling? Fact The human eye is more sensitive to changes in luminance than in chrominance. To sample is to collect measurements. Each pixel is a sample (measuring the colour of the image). Lower resolution means fewer samples. Reducing resolution = downsampling Basic M N image: N M samples per component (Y, Cb, Cr). Y is more useful than Cb and Cr. Therefore we can downsample Cb and Cr M/2 N/2 is common for Cb and Cr Still use M M for Y Dr Hans Georg Schaathun The DCT domain and JPEG Spring 2009 Week 3 16 / 47
23 Compression Downsampling What is sampling? Fact The human eye is more sensitive to changes in luminance than in chrominance. To sample is to collect measurements. Each pixel is a sample (measuring the colour of the image). Lower resolution means fewer samples. Reducing resolution = downsampling Basic M N image: N M samples per component (Y, Cb, Cr). Y is more useful than Cb and Cr. Therefore we can downsample Cb and Cr M/2 N/2 is common for Cb and Cr Still use M M for Y Dr Hans Georg Schaathun The DCT domain and JPEG Spring 2009 Week 3 16 / 47
24 Compression Downsampling What is sampling? Fact The human eye is more sensitive to changes in luminance than in chrominance. To sample is to collect measurements. Each pixel is a sample (measuring the colour of the image). Lower resolution means fewer samples. Reducing resolution = downsampling Basic M N image: N M samples per component (Y, Cb, Cr). Y is more useful than Cb and Cr. Therefore we can downsample Cb and Cr M/2 N/2 is common for Cb and Cr Still use M M for Y Dr Hans Georg Schaathun The DCT domain and JPEG Spring 2009 Week 3 16 / 47
25 Compression Downsampling What is sampling? Fact The human eye is more sensitive to changes in luminance than in chrominance. To sample is to collect measurements. Each pixel is a sample (measuring the colour of the image). Lower resolution means fewer samples. Reducing resolution = downsampling Basic M N image: N M samples per component (Y, Cb, Cr). Y is more useful than Cb and Cr. Therefore we can downsample Cb and Cr M/2 N/2 is common for Cb and Cr Still use M M for Y Dr Hans Georg Schaathun The DCT domain and JPEG Spring 2009 Week 3 16 / 47
26 Compression Downsampling What do we save? Original: M N pixels 3 components. Compressed: 2 M 2 N 2 + M N = 11 2 M N Ratio We just saved 50% Compressed Original = MN 3MN = 1 2. Dr Hans Georg Schaathun The DCT domain and JPEG Spring 2009 Week 3 17 / 47
27 Compression Downsampling What do we save? Original: M N pixels 3 components. Compressed: 2 M 2 N 2 + M N = 11 2 M N Ratio We just saved 50% Compressed Original = MN 3MN = 1 2. Dr Hans Georg Schaathun The DCT domain and JPEG Spring 2009 Week 3 17 / 47
28 Compression Downsampling What do we save? Original: M N pixels 3 components. Compressed: 2 M 2 N 2 + M N = 11 2 M N Ratio We just saved 50% Compressed Original = MN 3MN = 1 2. Dr Hans Georg Schaathun The DCT domain and JPEG Spring 2009 Week 3 17 / 47
29 Compression Downsampling What do we save? Original: M N pixels 3 components. Compressed: 2 M 2 N 2 + M N = 11 2 M N Ratio We just saved 50% Compressed Original = MN 3MN = 1 2. Dr Hans Georg Schaathun The DCT domain and JPEG Spring 2009 Week 3 17 / 47
30 Compression Downsampling Chrominance versus Luminence Fact The human eye is more sensitive to changes in luminance than in chrominance. Watermarking tend to embed in Y (luminence) Embedding in Cb and Cr would more easily be destroyed by JPEG Dr Hans Georg Schaathun The DCT domain and JPEG Spring 2009 Week 3 18 / 47
31 Compression Downsampling Chrominance versus Luminence Fact The human eye is more sensitive to changes in luminance than in chrominance. Watermarking tend to embed in Y (luminence) Embedding in Cb and Cr would more easily be destroyed by JPEG Dr Hans Georg Schaathun The DCT domain and JPEG Spring 2009 Week 3 18 / 47
32 Compression Downsampling Chrominance versus Luminence Fact The human eye is more sensitive to changes in luminance than in chrominance. Watermarking tend to embed in Y (luminence) Embedding in Cb and Cr would more easily be destroyed by JPEG Dr Hans Georg Schaathun The DCT domain and JPEG Spring 2009 Week 3 18 / 47
33 Compression Downsampling Downsampling in JPEG 1 Translation to YCbCr. 2 Downsampling 3 DCT transform Each downsampled component matrix Y, Cb, Cr is Divided into 8 8 blocks DCT transformed blockwise An 8 8 block in Cb can be associated with 1,2 or 4 Y blocks depending on downsampling. Dr Hans Georg Schaathun The DCT domain and JPEG Spring 2009 Week 3 19 / 47
34 What is quantisation? Rounding in general Compression Quantisation Rounding numbers is quantisation. Measuring gives continuous numbers Whether you measure pixel luminence, or the length of your garage. No matter how close to points are, there is a point in between. However, our precision is limited. We give lengths to the nearest unit. Luminence is categorised into 256 intervals (8bit integers). Computer memory is finite, 256 different possibilites for a byte Dr Hans Georg Schaathun The DCT domain and JPEG Spring 2009 Week 3 20 / 47
35 Compression Quantisation Quantisation in JPEG Quantisation in the DCT domain Each coefficient is divided by the quantisation constant. The result is rounded to nearest integer. Different quantisation constants for each coefficient in the block. Dr Hans Georg Schaathun The DCT domain and JPEG Spring 2009 Week 3 21 / 47
36 Compression Quantisation Example Quantisation in JPEG DCT matrix Quantisation matrix / Quantised DCT matrix Example from Wikipedia. Dr Hans Georg Schaathun The DCT domain and JPEG Spring 2009 Week 3 22 / 47
37 Entropy Coding Compression Source Coding Recall Observe 0 is extremely common ±1 is common Two-digit numbers are very rare This is typical Dr Hans Georg Schaathun The DCT domain and JPEG Spring 2009 Week 3 23 / 47
38 Entropy Coding Compression Source Coding In order to compress the data Use few bits (short codewords) for frequent symbols Many bits (long codewords) only for rare symbols Usually, JPEG uses a simple Huffman code. it can use other codes (saving space, but computionally costly) For instance, a single short codeword to say the rest of the block is zero Dr Hans Georg Schaathun The DCT domain and JPEG Spring 2009 Week 3 24 / 47
39 Outline Steganography in JPEG 1 Overview 2 Image Representation 3 Compression 4 Steganography in JPEG Into the compressed domain JSteg and OutGuess Matlab Dr Hans Georg Schaathun The DCT domain and JPEG Spring 2009 Week 3 25 / 47
40 Steganography in JPEG Before or after compression Into the compressed domain pixmap message LSB embedding JPEG compression stegoimage pixmap JPEG compression message LSB embedding stegoimage Dr Hans Georg Schaathun The DCT domain and JPEG Spring 2009 Week 3 26 / 47
41 Steganography in JPEG Into the compressed domain Fragility of LSB LSB embedding is criticised for being fragile JPEG removes insignificant information... such as the LSB JPEG compression after embedding (probably) ruins the message When is this a problem? Dr Hans Georg Schaathun The DCT domain and JPEG Spring 2009 Week 3 27 / 47
42 Steganography in JPEG When fragility is a problem Into the compressed domain It is a problem in robust watermarking JPEG compression is common-place most applications need robustness If the purpose is steganography, and Alice and Bob are allowed to exchange pixmaps, then it is not a problem. Obviously, if your steganogram is supposed to be JPEG... Do not do LSB in the pixmap. Dr Hans Georg Schaathun The DCT domain and JPEG Spring 2009 Week 3 28 / 47
43 Steganography in JPEG When fragility is a problem Into the compressed domain It is a problem in robust watermarking JPEG compression is common-place most applications need robustness If the purpose is steganography, and Alice and Bob are allowed to exchange pixmaps, then it is not a problem. Obviously, if your steganogram is supposed to be JPEG... Do not do LSB in the pixmap. Dr Hans Georg Schaathun The DCT domain and JPEG Spring 2009 Week 3 28 / 47
44 Steganography in JPEG When fragility is a problem Into the compressed domain It is a problem in robust watermarking JPEG compression is common-place most applications need robustness If the purpose is steganography, and Alice and Bob are allowed to exchange pixmaps, then it is not a problem. Obviously, if your steganogram is supposed to be JPEG... Do not do LSB in the pixmap. Dr Hans Georg Schaathun The DCT domain and JPEG Spring 2009 Week 3 28 / 47
45 Steganography in JPEG Into the compressed domain Double compression Common bug in existing software Read an arbitrary image file JPEG is decompressed on reading... pixmap Embedding works on JPEG image is compressed to produce JPEG signal quality factor (QF) either default or supplied by user A JPEG steganogram has now been compressed twice different QF produces an artifact Is there any reason for de- and recompressing? Dr Hans Georg Schaathun The DCT domain and JPEG Spring 2009 Week 3 29 / 47
46 Important lessons Steganography in JPEG Into the compressed domain 1 Do not make unnecessary image conversions. 2 Many techniques apply to any format LSB applies to JPEG signals... but it is called Jsteg 3 Use a technique which fits the target (stego-) format i.e. the format you are allowed to use on the channel. Dr Hans Georg Schaathun The DCT domain and JPEG Spring 2009 Week 3 30 / 47
47 Steganography in JPEG Into the compressed domain Main development The past at a glance Core Reading Hide and Seek: An Introduction to Steganography by Niels Provos and Peter Honeyman, in IEEE Security & Privacy JSteg was published 2 JSteg was broken 3 OutGuess was published 4 OutGuess was broken 5 F5 was published 6 F5 was broken Dr Hans Georg Schaathun The DCT domain and JPEG Spring 2009 Week 3 31 / 47
48 Steganography in JPEG Into the compressed domain Main development The past at a glance Core Reading Hide and Seek: An Introduction to Steganography by Niels Provos and Peter Honeyman, in IEEE Security & Privacy JSteg was published 2 JSteg was broken 3 OutGuess was published 4 OutGuess was broken 5 F5 was published 6 F5 was broken Dr Hans Georg Schaathun The DCT domain and JPEG Spring 2009 Week 3 31 / 47
49 Steganography in JPEG Into the compressed domain Main development The past at a glance Core Reading Hide and Seek: An Introduction to Steganography by Niels Provos and Peter Honeyman, in IEEE Security & Privacy JSteg was published 2 JSteg was broken 3 OutGuess was published 4 OutGuess was broken 5 F5 was published 6 F5 was broken Dr Hans Georg Schaathun The DCT domain and JPEG Spring 2009 Week 3 31 / 47
50 Steganography in JPEG Into the compressed domain Main development The past at a glance Core Reading Hide and Seek: An Introduction to Steganography by Niels Provos and Peter Honeyman, in IEEE Security & Privacy JSteg was published 2 JSteg was broken 3 OutGuess was published 4 OutGuess was broken 5 F5 was published 6 F5 was broken Dr Hans Georg Schaathun The DCT domain and JPEG Spring 2009 Week 3 31 / 47
51 Steganography in JPEG Into the compressed domain Main development The past at a glance Core Reading Hide and Seek: An Introduction to Steganography by Niels Provos and Peter Honeyman, in IEEE Security & Privacy JSteg was published 2 JSteg was broken 3 OutGuess was published 4 OutGuess was broken 5 F5 was published 6 F5 was broken Dr Hans Georg Schaathun The DCT domain and JPEG Spring 2009 Week 3 31 / 47
52 Steganography in JPEG Into the compressed domain Main development The past at a glance Core Reading Hide and Seek: An Introduction to Steganography by Niels Provos and Peter Honeyman, in IEEE Security & Privacy JSteg was published 2 JSteg was broken 3 OutGuess was published 4 OutGuess was broken 5 F5 was published 6 F5 was broken Dr Hans Georg Schaathun The DCT domain and JPEG Spring 2009 Week 3 31 / 47
53 Steganography in JPEG JSteg and OutGuess 0.1 The JSteg algorithm JSteg denotes a software package. Approach: simple LSB in the DCT domain. No different from LSB in the spatial domain χ 2 analysis applies Dr Hans Georg Schaathun The DCT domain and JPEG Spring 2009 Week 3 32 / 47
54 Steganography in JPEG JSteg and OutGuess 0.1 Pseudocode The JSteg algorithm Input: Image I, Message m Output: Image J for each bit b of m c := next DCT coefficient from I while c = 0 or c = 1, c := next DCT coefficient from I end while c := c c mod 2 + b replace coefficient in I by c end for May ignore high and/or low frequency coefficients Dr Hans Georg Schaathun The DCT domain and JPEG Spring 2009 Week 3 33 / 47
55 Bitflips in JSteg Steganography in JPEG JSteg and OutGuess 0.1 Cover Stego Typical JPEG. Typical JSteg. Dr Hans Georg Schaathun The DCT domain and JPEG Spring 2009 Week 3 34 / 47
56 Pros and Cons Steganography in JPEG JSteg and OutGuess 0.1 Why is JSteg important? First publicly available solution. Simple solution What are the disadvantages? Similar to LSB in Spatial domain. Histogramme analysis applies χ 2 /pairs of values applies Dr Hans Georg Schaathun The DCT domain and JPEG Spring 2009 Week 3 35 / 47
57 Pros and Cons Steganography in JPEG JSteg and OutGuess 0.1 Why is JSteg important? First publicly available solution. Simple solution What are the disadvantages? Similar to LSB in Spatial domain. Histogramme analysis applies χ 2 /pairs of values applies Dr Hans Georg Schaathun The DCT domain and JPEG Spring 2009 Week 3 35 / 47
58 Pros and Cons Steganography in JPEG JSteg and OutGuess 0.1 Why is JSteg important? First publicly available solution. Simple solution What are the disadvantages? Similar to LSB in Spatial domain. Histogramme analysis applies χ 2 /pairs of values applies Dr Hans Georg Schaathun The DCT domain and JPEG Spring 2009 Week 3 35 / 47
59 Pros and Cons Steganography in JPEG JSteg and OutGuess 0.1 Why is JSteg important? First publicly available solution. Simple solution What are the disadvantages? Similar to LSB in Spatial domain. Histogramme analysis applies χ 2 /pairs of values applies Dr Hans Georg Schaathun The DCT domain and JPEG Spring 2009 Week 3 35 / 47
60 Pros and Cons Steganography in JPEG JSteg and OutGuess 0.1 Why is JSteg important? First publicly available solution. Simple solution What are the disadvantages? Similar to LSB in Spatial domain. Histogramme analysis applies χ 2 /pairs of values applies Dr Hans Georg Schaathun The DCT domain and JPEG Spring 2009 Week 3 35 / 47
61 Pros and Cons Steganography in JPEG JSteg and OutGuess 0.1 Why is JSteg important? First publicly available solution. Simple solution What are the disadvantages? Similar to LSB in Spatial domain. Histogramme analysis applies χ 2 /pairs of values applies Dr Hans Georg Schaathun The DCT domain and JPEG Spring 2009 Week 3 35 / 47
62 Pros and Cons Steganography in JPEG JSteg and OutGuess 0.1 Why is JSteg important? First publicly available solution. Simple solution What are the disadvantages? Similar to LSB in Spatial domain. Histogramme analysis applies χ 2 /pairs of values applies Dr Hans Georg Schaathun The DCT domain and JPEG Spring 2009 Week 3 35 / 47
63 Steganography in JPEG JSteg and OutGuess 0.1 Outguess 0.1 How can we improve JSteg? How did we improve LSB in the Spatial Domain? Solution Choose random coefficients from the entire image. Dr Hans Georg Schaathun The DCT domain and JPEG Spring 2009 Week 3 36 / 47
64 Steganography in JPEG JSteg and OutGuess 0.1 Outguess 0.1 How can we improve JSteg? How did we improve LSB in the Spatial Domain? Solution Choose random coefficients from the entire image. Dr Hans Georg Schaathun The DCT domain and JPEG Spring 2009 Week 3 36 / 47
65 Steganography in JPEG JSteg and OutGuess 0.1 Outguess 0.1 How can we improve JSteg? How did we improve LSB in the Spatial Domain? Solution Choose random coefficients from the entire image. Dr Hans Georg Schaathun The DCT domain and JPEG Spring 2009 Week 3 36 / 47
66 Steganography in JPEG JSteg and OutGuess 0.1 Pseudocode Outguess 0.1 Input: Image I, Message m, Key k Output: Image J Seed PRNG with k for each bit b of m c := pseudo-random DCT coefficient from I while c = 0 or c = 1, c := pseudo-random DCT coefficient from I end while c := c c mod 2 + b replace coefficient in I by c end for May ignore high and/or low frequency coefficients Dr Hans Georg Schaathun The DCT domain and JPEG Spring 2009 Week 3 37 / 47
67 Histogramme analysis Steganalysis Steganography in JPEG JSteg and OutGuess Pairs of values Generalised χ 2 works 2 Symmetry Embedding exchange and 2 1. The DCT histogramme is expected to be symmetric Outguess/JSteg destroy the symmetry. Dr Hans Georg Schaathun The DCT domain and JPEG Spring 2009 Week 3 38 / 47
68 Outline Matlab 1 Overview 2 Image Representation 3 Compression 4 Steganography in JPEG 5 Matlab The JPEG toolbox Randomness Masking Dr Hans Georg Schaathun The DCT domain and JPEG Spring 2009 Week 3 39 / 47
69 JPEG Toolbox Reading a JPEG image Matlab The JPEG toolbox» im = jpeg_read ( Kerckhoffs.jpg ) im = image_width: 180 image_height: 247 image_components: 3 image_color_space: 2 jpeg_components: 3 jpeg_color_space: 3 comments: {} coef_arrays: {[248x184 double] [128x96 double] [128x96 quant_tables: {[8x8 double] [8x8 double]} ac_huff_tables: [1x2 struct] dc_huff_tables: [1x2 struct] optimize_coding: 0 comp_info: [1x3 struct] progressive_mode: 0» Dr Hans Georg Schaathun The DCT domain and JPEG Spring 2009 Week 3 40 / 47
70 JPEG Toolbox JPEG data Matlab The JPEG toolbox» Xy = im.coef_arrays{im.comp_info(1).component_id} ;» whos Xy Name Size Bytes Class Attributes Xy 248x double» Q = im.quant_tables{im.comp_info(1).quant_tbl_no} Q =» Dr Hans Georg Schaathun The DCT domain and JPEG Spring 2009 Week 3 41 / 47
71 Matlab The JPEG toolbox w/o the toolbox Load/Save workspace jpeg_read and jpeg_write are compiled functions, Available on web page for Intel/Linux and Intel/Windows Compilation required for other systems. If you have trouble with the toolbox, it is possible to load/save files as Matlab workspaces.» load image.mat» whos Name Size Bytes Class Attributes im 1x struct There is one mat-file for each image on the web page Dr Hans Georg Schaathun The DCT domain and JPEG Spring 2009 Week 3 42 / 47
72 Other toolbox functions Matlab The JPEG toolbox If you want to write your own (de)compressor, the following functions are useful. bdct, ibdct, quantize, dequantize Dr Hans Georg Schaathun The DCT domain and JPEG Spring 2009 Week 3 43 / 47
73 Matlab Randomness Pseudo-random number generators A pseudo-random number generator (PRNG) finite state machine starting state given by user input the seed each transition outputs a number observing a sequence of number, it is computationally infeasible to predict the next number looks random It is deterministic if sender and receiver share the seed (a key) they can generate the same sequence Dr Hans Georg Schaathun The DCT domain and JPEG Spring 2009 Week 3 44 / 47
74 Random locations Matlab Randomness Many ways to do it but some makes it hard to avoid using the same pixel twice A simple approach 1 randomly permute the pixels 2 embed in the first pixels in the permuted sequence 3 reverse the permutation If the sender and receiver use the same PRNG seed, they get the same pseudo-random permutation Dr Hans Georg Schaathun The DCT domain and JPEG Spring 2009 Week 3 45 / 47
75 Matlab functions Matlab Randomness Many functions using a PRNG rand, randperm, randn And one dedicated for performing random permutations new = randintrlv ( old, seed ) the seed is given directly when the permutation is used reverse: old = randdeintrlv ( new, seed ) new/old should be a 1D vector serialise the image into a vector (im(:)) before randintrlv reshape ( vector, [ N, M ] ) to recover the 2D image after randdeintrlv Dr Hans Georg Schaathun The DCT domain and JPEG Spring 2009 Week 3 46 / 47
76 Matlab Masking Masking Boolean matrix as index Matlab allows Boolean (logical) matrices as indices Say A is an n m matrix B = logical(ones(n,m)) B(1,1) = 0 A(B) will be all elements of A except (1, 1) repmat(b,m,n) replicates B to form a larger matrix m times the heigh n times the width How do you extract the AC coefficients in a JPEG image? Make an 8 8 mask of ones Set the DC entry to 0, e.g. (1, 1) Replicate the mask using repmat Dr Hans Georg Schaathun The DCT domain and JPEG Spring 2009 Week 3 47 / 47
77 Matlab Masking Masking Boolean matrix as index Matlab allows Boolean (logical) matrices as indices Say A is an n m matrix B = logical(ones(n,m)) B(1,1) = 0 A(B) will be all elements of A except (1, 1) repmat(b,m,n) replicates B to form a larger matrix m times the heigh n times the width How do you extract the AC coefficients in a JPEG image? Make an 8 8 mask of ones Set the DC entry to 0, e.g. (1, 1) Replicate the mask using repmat Dr Hans Georg Schaathun The DCT domain and JPEG Spring 2009 Week 3 47 / 47
78 Matlab Masking Masking Boolean matrix as index Matlab allows Boolean (logical) matrices as indices Say A is an n m matrix B = logical(ones(n,m)) B(1,1) = 0 A(B) will be all elements of A except (1, 1) repmat(b,m,n) replicates B to form a larger matrix m times the heigh n times the width How do you extract the AC coefficients in a JPEG image? Make an 8 8 mask of ones Set the DC entry to 0, e.g. (1, 1) Replicate the mask using repmat Dr Hans Georg Schaathun The DCT domain and JPEG Spring 2009 Week 3 47 / 47
INF5063: Programming heterogeneous multi-core processors. September 17, 2010
INF5063: Programming heterogeneous multi-core processors September 17, 2010 High data volumes: Need for compression PAL video sequence 25 images per second 3 bytes per pixel RGB (red-green-blue values)
More informationIntroduction ti to JPEG
Introduction ti to JPEG JPEG: Joint Photographic Expert Group work under 3 standards: ISO, CCITT, IEC Purpose: image compression Compression accuracy Works on full-color or gray-scale image Color Grayscale
More informationSteganography using Odd-even Based Embedding and Compensation Procedure to Restore Histogram
, October 24-26, 2012, San Francisco, USA Steganography using Odd-even Based Embedding and Compensation Procedure to Restore Histogram Neeta Nain, Jaideep Singh, Ishan Dayma, Rajesh Meena The authors are
More informationBreaking the OutGuess
Breaking the OutGuess Jessica Fridrich, Miroslav Goljan, Dorin Hogea * presented by Deepa Kundur Department of Electrical and Computer Engineering * Department of Computer Science SUNY Binghamton, Binghamton,
More informationFeatures. Sequential encoding. Progressive encoding. Hierarchical encoding. Lossless encoding using a different strategy
JPEG JPEG Joint Photographic Expert Group Voted as international standard in 1992 Works with color and grayscale images, e.g., satellite, medical,... Motivation: The compression ratio of lossless methods
More informationSteganography: Hiding Data In Plain Sight. Ryan Gibson
Steganography: Hiding Data In Plain Sight Ryan Gibson What Is Steganography? The practice of concealing messages or information within other nonsecret text or data. Comes from the Greek words steganos
More informationAN ANALYSIS OF VARIOUS STEGANOGRAPHIC ALGORITHMS
AN ANALYSIS OF VARIOUS STEGANOGRAPHIC ALGORITHMS Chinchu Elza Andrews 1, Iwin Thanakumar Joseph 2 1. Post Graduate Student, Department of Computer Science and Engineering, Karunya University, India 2.
More informationIMAGE COMPRESSION USING FOURIER TRANSFORMS
IMAGE COMPRESSION USING FOURIER TRANSFORMS Kevin Cherry May 2, 2008 Math 4325 Compression is a technique for storing files in less space than would normally be required. This in general, has two major
More informationMultimedia Systems Image III (Image Compression, JPEG) Mahdi Amiri April 2011 Sharif University of Technology
Course Presentation Multimedia Systems Image III (Image Compression, JPEG) Mahdi Amiri April 2011 Sharif University of Technology Image Compression Basics Large amount of data in digital images File size
More informationImage Compression Techniques
ME 535 FINAL PROJECT Image Compression Techniques Mohammed Abdul Kareem, UWID: 1771823 Sai Krishna Madhavaram, UWID: 1725952 Palash Roychowdhury, UWID:1725115 Department of Mechanical Engineering University
More informationWireless Communication
Wireless Communication Systems @CS.NCTU Lecture 6: Image Instructor: Kate Ching-Ju Lin ( 林靖茹 ) Chap. 9 of Fundamentals of Multimedia Some reference from http://media.ee.ntu.edu.tw/courses/dvt/15f/ 1 Outline
More informationLecture 5: Compression I. This Week s Schedule
Lecture 5: Compression I Reading: book chapter 6, section 3 &5 chapter 7, section 1, 2, 3, 4, 8 Today: This Week s Schedule The concept behind compression Rate distortion theory Image compression via DCT
More informationAn introduction to JPEG compression using MATLAB
An introduction to JPEG compression using MATLAB Arno Swart 30 October, 2003 1 Introduction This document describes the popular JPEG still image coding format. The aim is to compress images while maintaining
More informationA Reversible Data Hiding Scheme For JPEG Images
A Reversible Data Hiding Scheme For JPEG Images Qiming Li, Yongdong Wu, and Feng Bao Institute for Infocomm Research, A*Star, Singapore {qli,wydong,baofeng}@i2r.a-star.edu.sg Abstract. When JPEG images
More information2.2: Images and Graphics Digital image representation Image formats and color models JPEG, JPEG2000 Image synthesis and graphics systems
Chapter 2: Representation of Multimedia Data Audio Technology Images and Graphics Video Technology Chapter 3: Multimedia Systems Communication Aspects and Services Chapter 4: Multimedia Systems Storage
More informationDigital Image Representation. Image Representation. Color Models
Digital Representation Chapter : Representation of Multimedia Data Audio Technology s and Graphics Video Technology Chapter 3: Multimedia Systems Communication Aspects and Services Chapter 4: Multimedia
More informationDigiPoints Volume 1. Student Workbook. Module 8 Digital Compression
Digital Compression Page 8.1 DigiPoints Volume 1 Module 8 Digital Compression Summary This module describes the techniques by which digital signals are compressed in order to make it possible to carry
More informationLecture 8 JPEG Compression (Part 3)
CS 414 Multimedia Systems Design Lecture 8 JPEG Compression (Part 3) Klara Nahrstedt Spring 2011 Administrative MP1 is posted Extended Deadline of MP1 is February 18 Friday midnight submit via compass
More informationJeff Hinson CS525, Spring 2010
DIGITAL WATERMARKING Jeff Hinson CS525, Spring 2010 Outline Introduction Challenges Algorithms / Methods Detection Existing Programs Lessons Learned / Conclusion Questions Jeff Hinson CS525 Slide #1 Introduction
More informationRobert Matthew Buckley. Nova Southeastern University. Dr. Laszlo. MCIS625 On Line. Module 2 Graphics File Format Essay
1 Robert Matthew Buckley Nova Southeastern University Dr. Laszlo MCIS625 On Line Module 2 Graphics File Format Essay 2 JPEG COMPRESSION METHOD Joint Photographic Experts Group (JPEG) is the most commonly
More informationDigital Image Representation Image Compression
Digital Image Representation Image Compression 1 Image Representation Standards Need for compression Compression types Lossless compression Lossy compression Image Compression Basics Redundancy/redundancy
More informationIn 2001, US officials stated that they have suspicions that terrorists communicate using steganography in the internet.
Statistical Steganalysis CHAPTER. INTRODUCTION. Steganography Steganography is an art of secret communications. Its main purpose is to hide the occurrence of communication over a public channel. In contrast
More informationECE 417 Guest Lecture Video Compression in MPEG-1/2/4. Min-Hsuan Tsai Apr 02, 2013
ECE 417 Guest Lecture Video Compression in MPEG-1/2/4 Min-Hsuan Tsai Apr 2, 213 What is MPEG and its standards MPEG stands for Moving Picture Expert Group Develop standards for video/audio compression
More informationJPEG. Wikipedia: Felis_silvestris_silvestris.jpg, Michael Gäbler CC BY 3.0
JPEG Wikipedia: Felis_silvestris_silvestris.jpg, Michael Gäbler CC BY 3.0 DFT vs. DCT Image Compression Image compression system Input Image MAPPER QUANTIZER SYMBOL ENCODER Compressed output Image Compression
More informationSteganography. Brent McClain Rob Carey
Steganography Brent McClain Rob Carey What is Steganography Greek Origin Steganos means covered Graph means writing Hiding information in plain sight Cover Image Another image hidden in the picture Created
More informationLecture 8 JPEG Compression (Part 3)
CS 414 Multimedia Systems Design Lecture 8 JPEG Compression (Part 3) Klara Nahrstedt Spring 2012 Administrative MP1 is posted Today Covered Topics Hybrid Coding: JPEG Coding Reading: Section 7.5 out of
More informationChaos-based Modified EzStego Algorithm for Improving Security of Message Hiding in GIF Image
015 International Conference on Computer, Control, Informatics and Its Applications Chaos-based Modified EzStego Algorithm for Improving Security of Message Hiding in GIF Image Rinaldi Munir Informatics
More informationcompression and coding ii
compression and coding ii Ole-Johan Skrede 03.05.2017 INF2310 - Digital Image Processing Department of Informatics The Faculty of Mathematics and Natural Sciences University of Oslo After original slides
More information7: Image Compression
7: Image Compression Mark Handley Image Compression GIF (Graphics Interchange Format) PNG (Portable Network Graphics) MNG (Multiple-image Network Graphics) JPEG (Join Picture Expert Group) 1 GIF (Graphics
More informationEMPIRICAL ANALYSIS ON STEGANOGRAPHY USING JSTEG, OUTGUESS 0.1 AND F5 ALGORITHMS
EMPIRICAL ANALYSIS ON STEGANOGRAPHY USING JSTEG, OUTGUESS 0.1 AND F5 ALGORITHMS Dr. N.MANOHARAN 1 Dr.R.BALASUBRAMANIAN 2 S.UMA NANDHINI 3 V.SUJATHA 4 1 Assistant Professor in Department of Computer Science,
More informationHYBRID TRANSFORMATION TECHNIQUE FOR IMAGE COMPRESSION
31 st July 01. Vol. 41 No. 005-01 JATIT & LLS. All rights reserved. ISSN: 199-8645 www.jatit.org E-ISSN: 1817-3195 HYBRID TRANSFORMATION TECHNIQUE FOR IMAGE COMPRESSION 1 SRIRAM.B, THIYAGARAJAN.S 1, Student,
More informationMultimedia Signals and Systems Still Image Compression - JPEG
Multimedia Signals and Systems Still Image Compression - JPEG Kunio Takaya Electrical and Computer Engineering University of Saskatchewan January 27, 2008 ** Go to full-screen mode now by hitting CTRL-L
More informationCompression-Compatible Fragile and Semi-Fragile Tamper Detection
Compression-Compatible Fragile and Semi-Fragile Tamper Detection Lisa M. Marvel George W. Hartwig, Jr. Charles Boncelet, Jr. Presentation by Peter Macko Motivation Direct Applications Establishing credibility
More informationF5 A Steganographic Algorithm
F5 A Steganographic Algorithm High Capacity Despite Better Steganalysis 1 Outline Benefits of F5 Properties of existing tools From Jsteg to F5 How secure is F5? My challenge to you 2 Benefits of F5 High
More informationLETTER Improvement of JPEG Compression Efficiency Using Information Hiding and Image Restoration
IEICE TRANS. INF. & SYST., VOL.E96 D, NO.5 MAY 2013 1233 LETTER Improvement of JPEG Compression Efficiency Using Information Hiding and Image Restoration Kazumi YAMAWAKI, Member, Fumiya NAKANO, Student
More informationCompression II: Images (JPEG)
Compression II: Images (JPEG) What is JPEG? JPEG: Joint Photographic Expert Group an international standard in 1992. Works with colour and greyscale images Up 24 bit colour images (Unlike GIF) Target Photographic
More informationIan Snyder. December 14, 2009
PEG mage an Snyder December 14, 2009 Complete... Abstract This paper will outline the process of PEG image compression and the use of linear algebra as part of this process. t will introduce the reasons
More informationVideo Compression An Introduction
Video Compression An Introduction The increasing demand to incorporate video data into telecommunications services, the corporate environment, the entertainment industry, and even at home has made digital
More informationDigital Image Processing
Lecture 9+10 Image Compression Lecturer: Ha Dai Duong Faculty of Information Technology 1. Introduction Image compression To Solve the problem of reduncing the amount of data required to represent a digital
More informationForensic analysis of JPEG image compression
Forensic analysis of JPEG image compression Visual Information Privacy and Protection (VIPP Group) Course on Multimedia Security 2015/2016 Introduction Summary Introduction The JPEG (Joint Photographic
More informationImage Steganography (cont.)
Image Steganography (cont.) 2.2) Image Steganography: Use of Discrete Cosine Transform (DCT) DCT is one of key components of JPEG compression JPEG algorithm: (1) algorithm is split in 8x8 pixel squares
More informationJPEG Modes of Operation. Nimrod Peleg Dec. 2005
JPEG Modes of Operation Nimrod Peleg Dec. 2005 Color Space Conversion Example: R G B = Y Cb Cr Remember: all JPEG process is operating on YCbCr color space! Down-Sampling Another optional action is down-sampling
More informationJPEG decoding using end of block markers to concurrently partition channels on a GPU. Patrick Chieppe (u ) Supervisor: Dr.
JPEG decoding using end of block markers to concurrently partition channels on a GPU Patrick Chieppe (u5333226) Supervisor: Dr. Eric McCreath JPEG Lossy compression Widespread image format Introduction
More informationDigital Image Steganography Techniques: Case Study. Karnataka, India.
ISSN: 2320 8791 (Impact Factor: 1.479) Digital Image Steganography Techniques: Case Study Santosh Kumar.S 1, Archana.M 2 1 Department of Electronicsand Communication Engineering, Sri Venkateshwara College
More informationCOLOR IMAGE COMPRESSION USING DISCRETE COSINUS TRANSFORM (DCT)
COLOR IMAGE COMPRESSION USING DISCRETE COSINUS TRANSFORM (DCT) Adietiya R. Saputra Fakultas Ilmu Komputer dan Teknologi Informasi, Universitas Gunadarma Jl. Margonda Raya no. 100, Depok 16424, Jawa Barat
More informationTopics. Number Theory Review. Public Key Cryptography
Public Key Cryptography Topics 1. Number Theory Review 2. Public Key Cryptography 3. One-Way Trapdoor Functions 4. Diffie-Helman Key Exchange 5. RSA Cipher 6. Modern Steganography Number Theory Review
More informationVC 12/13 T16 Video Compression
VC 12/13 T16 Video Compression Mestrado em Ciência de Computadores Mestrado Integrado em Engenharia de Redes e Sistemas Informáticos Miguel Tavares Coimbra Outline The need for compression Types of redundancy
More informationSecure Information Hiding Portfolio. Ruoxi Li
Secure Information Hiding Portfolio Ruoxi Li 6075338 1 Chi-Square Test and Steganalysis This section uses two scenarios to evaluate the chi-square test function and discusses several factors that may affect
More informationHiding of Random Permutated Encrypted Text using LSB Steganography with Random Pixels Generator
Hiding of Random Permutated Encrypted Text using LSB Steganography with Random Pixels Generator Noor Kareem Jumaa Department of Computer Technology Engineering Al-Mansour University College, Iraq ABSTRACT
More informationCMPT 365 Multimedia Systems. Media Compression - Image
CMPT 365 Multimedia Systems Media Compression - Image Spring 2017 Edited from slides by Dr. Jiangchuan Liu CMPT365 Multimedia Systems 1 Facts about JPEG JPEG - Joint Photographic Experts Group International
More informationEnhancing the Image Compression Rate Using Steganography
The International Journal Of Engineering And Science (IJES) Volume 3 Issue 2 Pages 16-21 2014 ISSN(e): 2319 1813 ISSN(p): 2319 1805 Enhancing the Image Compression Rate Using Steganography 1, Archana Parkhe,
More informationA Image Comparative Study using DCT, Fast Fourier, Wavelet Transforms and Huffman Algorithm
International Journal of Engineering Research and General Science Volume 3, Issue 4, July-August, 15 ISSN 91-2730 A Image Comparative Study using DCT, Fast Fourier, Wavelet Transforms and Huffman Algorithm
More informationSD 575 Image Processing
SD 575 Image Processing Fall 2014 Lab 5: Image Compression and Segmentation Due Thursday November 27 at 10:30am (in class/email) Note: All lab reports will be submitted as hard or soft copies to Robert
More informationSECURITY METHOD FOR COMBINATION STEGANOGRAPHY ALGORITHMS ON TRANSFORM DOMAIN FOR JPEG IMAGES
INTERNATIONAL JOURNAL ON SMART SENSING AND INTELLIGENT SYSTEMS VOL. 7, NO. 4, DECEMBER 2014 SECURITY METHOD FOR COMBINATION STEGANOGRAPHY ALGORITHMS ON TRANSFORM DOMAIN FOR JPEG IMAGES Hamdan L. Jaheel
More informationDIGITAL TELEVISION 1. DIGITAL VIDEO FUNDAMENTALS
DIGITAL TELEVISION 1. DIGITAL VIDEO FUNDAMENTALS Television services in Europe currently broadcast video at a frame rate of 25 Hz. Each frame consists of two interlaced fields, giving a field rate of 50
More informationAUDIOVISUAL COMMUNICATION
AUDIOVISUAL COMMUNICATION Laboratory Session: Discrete Cosine Transform Fernando Pereira The objective of this lab session about the Discrete Cosine Transform (DCT) is to get the students familiar with
More informationAN4996 Application note
Application note Hardware JPEG codec peripheral in STM32F76/77xxx and STM32H7x3 line microcontrollers Introduction This application note describes the use of the hardware JPEG codec peripheral for JPEG
More information7.5 Dictionary-based Coding
7.5 Dictionary-based Coding LZW uses fixed-length code words to represent variable-length strings of symbols/characters that commonly occur together, e.g., words in English text LZW encoder and decoder
More informationThe term, steganography, comes from Greek roots, Image steganography and steganalysis Mayra Bachrach and Frank Y.
Image steganography and steganalysis Mayra Bachrach and Frank Y. Shih Image steganography is used to embed covert messages in the form of files, text, or other images in digital images. The intent is to
More informationWatermarking Moble Phone Color Images With Error Correction Codes
IOSR Journal of Electronics & Communication Engineering (IOSR-JECE) ISSN(e) : 2278-1684 ISSN(p) : 2320-334X, PP 05-09 www.iosrjournals.org Watermarking Moble Phone Color Images With Error Correction Codes
More informationA Steganography method for JPEG2000 Baseline System
A Steganography method for JPEG2000 Baseline System P.Ramakrishna Rao M.Tech.,[CSE], Teaching Associate, Department of Computer Science, Dr.B.R.Ambedkar University, Etcherla Srikaulam, 532 410. Abstract
More informationImage, video and audio coding concepts. Roadmap. Rationale. Stefan Alfredsson. (based on material by Johan Garcia)
Image, video and audio coding concepts Stefan Alfredsson (based on material by Johan Garcia) Roadmap XML Data structuring Loss-less compression (huffman, LZ77,...) Lossy compression Rationale Compression
More informationBit Adjusting Image Steganography in Blue Channel using AES and Secured Hash Function
Available Online at www.ijcsmc.com International Journal of Computer Science and Mobile Computing A Monthly Journal of Computer Science and Information Technology ISSN 2320 088X IMPACT FACTOR: 6.017 IJCSMC,
More informationNios II Embedded Electronic Photo Album
Nios II Embedded Electronic Photo Album Second Prize Nios II Embedded Electronic Photo Album Institution: Participants: Instructor: Electrical Engineering Institute, St. John s University Hong-Zhi Zhang,
More informationJPEG Compression Using MATLAB
JPEG Compression Using MATLAB Anurag, Sonia Rani M.Tech Student, HOD CSE CSE Department, ITS Bhiwani India ABSTRACT Creating, editing, and generating s in a very regular system today is a major priority.
More informationCompression of Stereo Images using a Huffman-Zip Scheme
Compression of Stereo Images using a Huffman-Zip Scheme John Hamann, Vickey Yeh Department of Electrical Engineering, Stanford University Stanford, CA 94304 jhamann@stanford.edu, vickey@stanford.edu Abstract
More informationSign-up Sheet posted outside of my office HFH 1121
Lecture 14: Digital Watermarking II Some slides from Prof. M. Wu, UMCP Lab2 Demo Csil Monday: May 24, 1 4pm Optional (9:30 11am) 10 minutes per Group 5 Minutes Presentation 5 Minutes Demo Sign-up Sheet
More informationInvisible Image Watermarking Using Hybrid DWT Compression-Decompression Technique
Invisible Image Watermarking Using Hybrid DWT Compression-Decompression Technique A. Shesha Chary 1 M.Tech in DSCE B. Srinivas 2 Assistant Professor K. Ashok Babu 3 professor & HOD Dept of ECE Synopsis:
More informationDigital Video Processing
Video signal is basically any sequence of time varying images. In a digital video, the picture information is digitized both spatially and temporally and the resultant pixel intensities are quantized.
More informationROI Based Image Compression in Baseline JPEG
168-173 RESEARCH ARTICLE OPEN ACCESS ROI Based Image Compression in Baseline JPEG M M M Kumar Varma #1, Madhuri. Bagadi #2 Associate professor 1, M.Tech Student 2 Sri Sivani College of Engineering, Department
More informationLecture 6 Introduction to JPEG compression
INF5442/INF9442 Image Sensor Circuits and Systems Lecture 6 Introduction to JPEG compression 11-October-2017 Course Project schedule Task/milestone Start Finish Decide topic and high level requirements
More information2014 Summer School on MPEG/VCEG Video. Video Coding Concept
2014 Summer School on MPEG/VCEG Video 1 Video Coding Concept Outline 2 Introduction Capture and representation of digital video Fundamentals of video coding Summary Outline 3 Introduction Capture and representation
More informationColor Imaging Seminar. Yair Moshe
Color Imaging Seminar Lecture in the subject of Yair Moshe Nov. 24 th, 2004 Original by Yair Moshe - November, 2004 Extended By Hagit Hel-Or June 2007 Additional Sources: Dr. Philip TseMultimedia Coding
More informationRobbery Detection Camera
Robbery Detection Camera Vincenzo Caglioti Simone Gasparini Giacomo Boracchi Pierluigi Taddei Alessandro Giusti Camera and DSP 2 Camera used VGA camera (640x480) [Y, Cb, Cr] color coding, chroma interlaced
More informationSteganography and Steganalysis
Steganography and Steganalysis J.R. Krenn January 2004 What is steganography? Steganography, coming from the Greek words stegos, meaning roof or covered and graphia which means writing, is the art and
More informationContent-independent steganography and steganalysis of JPEG images
Content-independent steganography and steganalysis of JPEG images Mohammad Rezaei Security Analysis Laboratory Tehran, Iran rezaei@salab.ir M. Bagher Salahshoor Security Analysis Laboratory Tehran, Iran
More informationIntroduction to Video Compression
Insight, Analysis, and Advice on Signal Processing Technology Introduction to Video Compression Jeff Bier Berkeley Design Technology, Inc. info@bdti.com http://www.bdti.com Outline Motivation and scope
More informationA Secure Image Communication Scheme based on combination of Compression, Cryptography and Steganography
A Secure Image Communication Scheme based on combination of Compression, Cryptography and Steganography Bhavya Ahuja 1, S. K. Muttoo 2, Deepika Aggarwal 3 ABSTRACT In this paper we propose a new technique
More informationSteganography: Dct Coefficient Replacement Method and Compare With JSteg Algorithm
Steganography: Dct Coefficient Replacement Method and Compare With JSteg Algorithm Hossein Sheisi, Jafar Mesgarian, and Mostafa Rahmani Abstract Due to the rapid development in digital communication through
More informationInterframe coding A video scene captured as a sequence of frames can be efficiently coded by estimating and compensating for motion between frames pri
MPEG MPEG video is broken up into a hierarchy of layer From the top level, the first layer is known as the video sequence layer, and is any self contained bitstream, for example a coded movie. The second
More informationSteganalysis Techniques: A Comparative Study
University of New Orleans ScholarWorks@UNO University of New Orleans Theses and Dissertations Dissertations and Theses 5-18-2007 Steganalysis Techniques: A Comparative Study Swaroop Kumar Pedda Reddy University
More informationLecture 3 Image and Video (MPEG) Coding
CS 598KN Advanced Multimedia Systems Design Lecture 3 Image and Video (MPEG) Coding Klara Nahrstedt Fall 2017 Overview JPEG Compression MPEG Basics MPEG-4 MPEG-7 JPEG COMPRESSION JPEG Compression 8x8 blocks
More informationDIGITAL IMAGE WATERMARKING BASED ON A RELATION BETWEEN SPATIAL AND FREQUENCY DOMAINS
DIGITAL IMAGE WATERMARKING BASED ON A RELATION BETWEEN SPATIAL AND FREQUENCY DOMAINS Murat Furat Mustafa Oral e-mail: mfurat@cu.edu.tr e-mail: moral@mku.edu.tr Cukurova University, Faculty of Engineering,
More informationAbstract. Keywords: Semi-fragile watermarking, DCT embedding, Localisation, Restoration
Abstract This report introduces two semi-fragile watermarking algorithms in details, including how they are deigned and implemented using Matlab. The first algorithm relies on embedding the watermark,
More informationImage Compression Standard: Jpeg/Jpeg 2000
Image Compression Standard: Jpeg/Jpeg 2000 Sebastiano Battiato, Ph.D. battiato@dmi.unict.it Image Compression Standard LOSSLESS compression GIF, BMP RLE, (PkZip). Mainly based on the elimination of spatial
More informationVIDEO SIGNALS. Lossless coding
VIDEO SIGNALS Lossless coding LOSSLESS CODING The goal of lossless image compression is to represent an image signal with the smallest possible number of bits without loss of any information, thereby speeding
More informationMotivation. Gray Levels
Motivation Image Intensity and Point Operations Dr. Edmund Lam Department of Electrical and Electronic Engineering The University of Hong ong A digital image is a matrix of numbers, each corresponding
More informationImage Compression Algorithm and JPEG Standard
International Journal of Scientific and Research Publications, Volume 7, Issue 12, December 2017 150 Image Compression Algorithm and JPEG Standard Suman Kunwar sumn2u@gmail.com Summary. The interest in
More informationJPEG Compression. What is JPEG?
JPEG Compression Michael W. Chou Scott Siegrist EEA Spring April, Professor Ingrid Verbauwhede What is JPEG? JPEG is short for the 'Joint Photographic Experts Group'. The JPEG standard is fairly complex
More informationThe Core Technology of Digital TV
the Japan-Vietnam International Student Seminar on Engineering Science in Hanoi The Core Technology of Digital TV Kosuke SATO Osaka University sato@sys.es.osaka-u.ac.jp November 18-24, 2007 What is compression
More informationFrom Wikipedia, the free encyclopedia
JPEG Page 1 of 9 From Wikipedia, the free encyclopedia (Redirected from JPEG file format) In computing, JPEG (pronounced JAY-peg) is a commonly used standard method of compression for photographic images.
More informationIndex. 1. Motivation 2. Background 3. JPEG Compression The Discrete Cosine Transformation Quantization Coding 4. MPEG 5.
Index 1. Motivation 2. Background 3. JPEG Compression The Discrete Cosine Transformation Quantization Coding 4. MPEG 5. Literature Lossy Compression Motivation To meet a given target bit-rate for storage
More informationCS1114 Assignment 5 Part 1
CS1114 Assignment 5 Part 1 out: Friday, March 30, 2012. due: Friday, April 6, 2012, 9PM. This assignment covers two topics: upscaling pixel art and steganography. This document is organized into those
More informationA Blind Steganalysis on JPEG Gray Level Image Based on Statistical Features and its Performance Analysis
International Journal of Engineering Research and Development e-issn: 2278-067X, p-issn: 2278-800X, www.ijerd.com Volume 11, Issue 09 (September 2015), PP.27-31 A Blind Steganalysis on JPEG Gray Level
More informationSTEGANALYSIS OF STEGOSTORAGE LIBRARY
t m Mathematical Publications DOI: 10.1515/tmmp-2016-0034 Tatra Mt. Math. Publ. 67 (2016), 99 116 STEGANALYSIS OF STEGOSTORAGE LIBRARY Michala Gulášová Matúš Jókay ABSTRACT. The main goal of this research
More informationLab # 2 - ACS I Part I - DATA COMPRESSION in IMAGE PROCESSING using SVD
Lab # 2 - ACS I Part I - DATA COMPRESSION in IMAGE PROCESSING using SVD Goals. The goal of the first part of this lab is to demonstrate how the SVD can be used to remove redundancies in data; in this example
More informationSteganography and Steganalysis of JPEG Images
DEPARTMENT OF COMPUTER AND INFORMATION SCIENCES AND ENGINEERING PH.D. PROPOSAL Steganography and Steganalysis of JPEG Images Supervisory Committee: Author: Mahendra Kumar makumar@cise.ufl.edu Dr. Richard
More informationQuo Vadis JPEG : Future of ISO /T.81
Quo Vadis JPEG : Future of ISO 10918-1/T.81 10918/T.81 is still the dominant standard for photographic images An entire toolchain exists to record, manipulate and display images encoded in this specification
More informationRedundant Data Elimination for Image Compression and Internet Transmission using MATLAB
Redundant Data Elimination for Image Compression and Internet Transmission using MATLAB R. Challoo, I.P. Thota, and L. Challoo Texas A&M University-Kingsville Kingsville, Texas 78363-8202, U.S.A. ABSTRACT
More informationThe Analysis and Detection of Double JPEG2000 Compression Based on Statistical Characterization of DWT Coefficients
Available online at www.sciencedirect.com Energy Procedia 17 (2012 ) 623 629 2012 International Conference on Future Electrical Power and Energy Systems The Analysis and Detection of Double JPEG2000 Compression
More information