Practical methods for digital video forensic authentication

Size: px
Start display at page:

Download "Practical methods for digital video forensic authentication"

Transcription

1 Practical methods for digital video forensic authentication Jinhua Zeng, * Shaopei Shi, Yan Li, Qimeng Lu, Xiulian Qiu Institute of Forensic Science, Ministry of Justice, Shanghai , China *Corresponding Author Abstract With more and more emphasis on dairy security surveillance and lower cost of video recording devices, digital videos have been an important multimedia for case examination, evidence demonstration, and security surveillance. The forensic authentication of digital videos has become an important part of multimedia forensic examination, and has been of important significance and value both in theory research and practical applications. In this paper, the state-of-the-arts of the standard development in digital video forensic authentication in China were introduced. The advance of the academic research in video forensic authentication was described. After that, practical methods for video forensic authentication were analyzed and discussed in the point of examinations on video metadata, contents, attached audios and camcorder forensic identification. Finally feasible solutions and future trends of practical video forensic authentication were summarized. Our work would provide practical guidances for related examiners and researchers in future case examinations and theoretical research. Keywords: Digital video, Forensic authentication, Digital forensics, Pattern recognition, Camcorder forensic identification 1. Introduction With more and more important roles of digital video materials in case investigation, proof of evidence, and security surveillance, the authentication of digital video materials has been an essential problem which is in large focuses. Nowadays, main video editors include Adobe Premiere, Sony Vegas, Corel VideoStudio, etc. People are more familiar with these editors and have more chances to use them in practice. All of these factors contribute to demands of developing corresponding policies, regulations, and scientific methods for digital video forensic authentication. In China, current technical specifications for digital video forensic authentication include General Specification for Audio-Video Forensic Examination (No. SF/Z JD ) and its essential parts Specification for Video Forensic Examination (No. SF/Z JD ), Specification for Audio Forensic Examination (No. SF/Z JD ). All were issued in 2010 by Ministry of Justice, China. For the guidance of data recovery operations in the process of device examination during digital video forensic authentication, General Specification for Digital Science Forensics (No. GA/T ) issued in 2012 by Ministry of Public Security, China, and General Specification for Digital Forensics (No. SF/Z JD ) issued in 2014 by Ministry of Justice, China, could be used. In this paper, we focus on the analysis of the practical methods applied in digital video forensic authentication, which can be summarized as metadata examination, video content examination, attached audio examination, digital camcorder forensic identification, etc. The main problems and challenges encountered in practical case examination with regard to video authentication were then discussed. Finally, the feasible solutions for digital video forensic authentication and future trends were described. The main goal of the paper is to provide practical guidance and comprehensive analysis for related examiners and researchers in future case examinations and theoretical research. 2. Related works One digital video can be disassembled into a frame collection and its temporally sequential relationships, which is encoded by specific algorithms into a data set with certain formats. Researchers made full uses of these inherent features of the digital videos, and proposed lots of methods, which International Journal of Digital Content Technology and its Applications(JDCTA) Volume 9, Number 1, February

2 could be categorized into intra-frame and inter-frame based examination methods [1], or coding-related and content-related detection methods. The core principle of the frame-based detection methods was that inherent patterns were extracted in each frame and then were built into pattern sequences. After that, the continuity, similarities or differences of the elements in the sequence were analyzed to detect tampering, such as the method proposed in [2]. The encoding algorithms of videos might affect effectiveness and stability of extracted pattern features. The methods of coding artifact detection were mainly focused on coding parameter identification and multi-compression artifact detection in specific compression algorithms, such as MPEG [3][4], etc. In addition, camcorder identification by video recording analysis was widely concerned and was considered as a valuable method for practical applications. In the camcorder identification, the main works were concentrated in the extraction of background noises from recorded videos, which were originated by used camcorders. Kurosawa et al. [5] firstly proposed a method for camcorder identification by extraction of additive noises from CCD chips, which were fixed pattern noises physically induced by chip dark-current. Through the detection of defected pixels in imaging sensors, Geradts et al. [6] offered a method to identify the source of a given video. With the advances of device manufacture and post-processing techniques, more and more camcorder artifacts were concealed and made indiscoverable. Later, a stronger and more reliable fingerprint of camcorders was proposed, which was called photo-response non-uniformity (PRNU) noise pattern [7,8]. Nowadays, the PRNU pattern was widely applied in video doctoring detection both in academic research and forensic tool development, such as PRNU Compare [9], as shown in Figure 1. Figure 1. The main window of the PRNU Compare 3. Practical methods for digital video forensic authentication In China, digital video forensic authentication must follow certain technical specifications described above. The methods used in practical case examination should be tested and verified, and were approved by experts. 24

3 3.1. Video metadata examination In this paper, we further divided video metadata into video attribute data and digital attribute data. Video metadata examination should be comprehensive and accurate. Video attribute data covered the information with regard to the codec and contents, such as codec ID, duration, etc. A typical video attribute data of a given video recording was shown in figure 2. Figure 2. A typical video attribute data of a given video recording Digital attribute data referred to other digital information apart from video attribute data in videos, such as the extra digital data added in the end of video data by specific video editors. Currently, the useful tools for video attribute data examination include MediaInfo, ExifInfo, etc. For the digital attribute data examination, the software of Winhex and Beyond Compare can be used. One video recorded by a Sony digital camcorder with 3 minutes and 13 seconds duration was edited by using Adobe Premier and Photoshop. Some video segments were deleted and some frames were replaced with doctored ones edited by Adobe Photoshop. After the above operations, the video was rebuilt by using the same parameters as possible as to the original one. Using the MediaInfo, we found that, comparing with the original video, several video attribute data were changed or erased, such as encoded time, encoding related GOP parameter and used matrix coefficients, as shown in figure 3. In addition, by using Winhex, we found extra data were added in the end of the video, such as the 25

4 information of the used editors Adobe Photoshop CS5 and Adobe Premier Pro, as shown in figure 4. Figure 3. The video attribute data difference between the original video (a) and the doctored one (b) 26

5 Figure 4. The abnormal digital attribute data found in the doctored video 3.2. Video content examination According to examination contents and used methods, video content examination could be categorized into macroscopic and microscopic examinations. In the macroscopic examination, one video was considered as a unit, and was played by using corresponding players in the examination. Experts watched the video carefully in the visual inspection, analyzed and evaluated its continuity, rationality and consistency. Video examination consisted of the inspection both in semantic and imaging levels. In the continuity examination, one intact video usually had a progressive story and the steady intra-frame and inter-frame changes. Any abnormal interruption or discontinuity may indicate forgery. Rationality inspection mainly focused on the feasibility and possibility of video imaging and contents. Moreover, since the resolution and shooting performances of videos were largely depended on used camcorders, the image quality of questioned videos should be matched with the alleged recording devices. Any illogical event presented in questioned videos might mean artificial modification, such as some scenes in science fiction films, as shown in Fig. 5. Consistency examination inspected conformity of video contents in the contextual, and the matching between video contents and the proved evidence in the cases. 27

6 Figure 5. The artificial scene in the movie Upside Down issued in 2012 In the microscopic examination, questioned videos were further disassembled into frames. The basic unit in the examination was the video frames. The general steps in the microscopic examination included frame acquisition and frame-based image forensic authentication. Some image enhancement operations could be used, such as image super-resolution, alignment of image intensity, etc. The pattern recognition methods, such as copy-move detection, could also be applied to find abnormities. To sum up, in the video content examination, the macroscopic inspection was a basic and essential part for video forensic authentication, which can preview and select the region of interest for the subsequent microscopic examination. Meanwhile, the later offers a more detailed inspection of videos Attached audio examination Audio information is an important part of videos. Its authentication examination offers an essential point for video forensic authentication. First of all, we have to discern whether or not there are attached audio data in videos. The direct method for this problem is through auditory inspection by using specific video players. Note that the metadata examination cannot solve the question well because of vast varieties of video coding formats. In addition, in the auditory inspection, we must select specific video players. For example, for videos with suffix of.dav, Smart Player is a rational player for information decoding in the auditory inspection, while some other players can only properly decode image information but not audio data. For the audio forensic authentication, researchers have proposed many of solutions for it. The audio recording consists of target voices, device-related pattern noises and recording environment-related noises [10]. Target voice authentication can be implemented in the process of human voice forensic identification. Device-related pattern noises can be identified through audio recording device forensic identification. With regard to recording environments, environmental elements may include the recording time and location. The electric network frequency criterion was used to evaluate the recording time of questioned audio materials [11,12]. Acoustic reverberation effects were applied to analyze the spatial configuration of audio recording locations [13]. In addition, audio coding artifacts were also used to detection forgeries, such as multi-compression detection [14], etc. Currently, the normal methods in the practice of audio authentication examination include auditory inspection, audio metadata examination, audio recording device forensic identification, and some other pattern recognition methods based on statistical feature computation, such as Fourier coefficient computation [15], higher-order statistics [16], etc. The state-of-the-arts and detailed practical methods 28

7 for this problem can be referred to [10]. In addition, the mutual relationship between the video and audio information should also be noted Camcorder forensic identification Camcorder forensic identification is to analyze features of the questioned video and the alleged recording device. The features may include metadata, video imaging features, pattern noises, etc. As described above, metadata should cover the video attribute data and digital attribute data. Video imaging features may be resorted to factors such as video quality, visual and auditory flickers, etc. Pattern noises could be computed by statistical methods, and currently the PRNU pattern noise is a feasible measure for camcorder forensic identification although the video compression operations and low-quality of videos could hinder its identification. What s more, the digital data forensic examination methods, such as data recovery, are also valuable tools to evaluate the authentication of questioned videos. The data recovery can be implemented in the alleged camcorder to find the original one as far as possible. In some cases, a questioned video was provided for authentication examination, however, a different video with similar contents was found in the alleged camcorder through data recovery. 4. Future challenges and trends Currently, there are various digital video formats in the markets. Video manufacturers usually draw up their own video formats through the package, modification or encryption of original video coding standards. The varieties of video encoding formats make video normal operations such as decoding and frame acquisition, more difficult in the practice of video forensic examination. It is still absent of video processing software which could deal with lots of different encoded videos. Many dominant and mature video players, which could load decoders according to different video formats, didn t have perfect and user-friendly functions for video processing. The compromising implementation is through screen duplication. The questioned video was firstly decoded by using video players and was shown in the screen, and then interested images were continuously captured and saved in a lossless or limited loss video encoding formats. The limitations of the above operations may include distortion of video images and consume large amounts of storage spaces. With the advance of digital video editors, the practices of video forensic authentication must resort to more techniques and methods for abnormal artifact detection of doctored videos. The methods used in digital forensics would be valuable ones to inspect the authentication of digital video materials. On the one hand, the digital attribute data examination using Winhex, etc. should be emphasized in practices. On the other hand, the operation of data recovery in digital camcorders is also worth a try. Currently, most practical methods for video forensic authentication are manual dependence and are heavily relied on expert experiences. Once dealing with videos with long duration, the workload in the examination would be heavy onerous, which could cause artificial negligence and mistakes during the practice. The automatic techniques introduced in the fields of artificial intelligence and pattern recognition would offer a prospective and feasible solution. The outcomes in the study of camcorder forensic identification, coding artifact analysis, and copy-move detection all can be applied in practice. The mature commercial products for automatic video authentication examination are expectable. In the future, the multidisciplinary methods, such as digital forensics, will be promoted. The methods applied in video forensic authentication will be manual and automatic coexistence and codependence. 5. Acknowledgements This work was supported by Grants from the National Science and Technology Pillar Program during the 12th Five-Year Plan Period of China [2012BAK16B06], Ministry of Finance, PR China [GY2014G-2 and GY2013G-3], and Institute of Forensic Science, Ministry of Justice, PR China [GY2014Z-3]. 29

8 6. References [1] Simone Milani, Marco Fontani, Paolo Bestagini, Mauro Barni, Alessandro Piva, Marco Tagliasacchi and Stefano Tubaro. An overview on video forensics. APSIPA Transactions on Signal and Information Processing, 1, e2, [2] Mondaini, N.; Caldelli, R.; Piva, A.; Barni, M.; Cappellini, V.: Detection of malevolent changes in digital video for forensic applications, in Proc. Of SPIE, Security, Steganography, and Watermarking of Multimedia Contents IX, E.J.D.III and P.W.Wong, eds., vol.6505, no.1, SPIE, 2007, 65050T. [3] W. Wang, H. Farid. Exposing digital forgeries in video by detecting double MPEG compression, in MM&Sec, S.Voloshynovskiy, J. Dittmann, and J. J. Fridrich, eds., ACM, 2006, [4] Wang, W.; Farid, H.: Exposing digital forgeries in video by detecting double quantization, in Proc. 11th ACM Workshop on Multimedia and Security, MM&Sec 09, ACM, New York, NY, 2009, [5] K. Kurosawa, K. Kuroki, and N. Saitoh. Ccd fingerprint method identification of a video camera from videotaped images. In ICIP99, pages Kobe, Japan, [6] Z.J.Geradts, J.Bijhold, M.Kieft, K.Kurosawa, K.Kuroki, and N. Saitoh. Methods for identification of images acquired with digital cameras. SPIE, Enabling Technologies for Law Enforcement and Security, 4232: , [7] J. Lukas, J. Fridrich, and M. Goljan. Digital camera identification from sensor pattern noise. IEEE Transactions Information Forensics and Security, 1(2): , [8] M. Chen, J. Fridrich, M. Goljan, and J. Lukas. Source digital camcorder identification using sensor photo response non-uniformity. SPIE, Electronic Imaging, Security, Steganography, and Watermarking of Multimedia Contents IX, 6505:1G 1H, January 28-February [9] PRNU Compare, [10] J. Zeng, S. Shi, X. Yang, J. Xi, X. bian, Y. LI, and Q. Lu, The state of the art in digital audio forensic authentication, Chinese Journal of Forensic Science, 75:57-61, [11] Grigoras C. Digital audio recording analysis: The electric network frequency criterion. Forensic Science International, 2005, 12(1). [12] Huijbregtse M, Geradts Z. Using the ENF criterion for determining the timing of recording of short digital audio recordings. Proc. 3rd International Workshop Computational Forensics, Springer-Verlag, 2009: [13] Malik H, Farid H. Audio forensics from acoustic reverberation. Proc. IEEE Int. Conf. Acoustics, Speech, and Signal Processing, [14] Liu Q, Sung A H, Qiao M. Detection of double MP3 compression. J. Cognitive Computing, 2010, 2(4): [15] Buchholz R, Kraetzer C, Dittman J. Microphone Classification Using Fourier Coefficients. Information Hiding, LNCS 5806, Springer, 2009: [16] Malik H, Miller J W. Microphone identification using higher-order statistics, AES 46th international conference, Denver, USA,

(JBE Vol. 23, No. 6, November 2018) Detection of Frame Deletion Using Convolutional Neural Network. Abstract

(JBE Vol. 23, No. 6, November 2018) Detection of Frame Deletion Using Convolutional Neural Network. Abstract (JBE Vol. 23, No. 6, November 2018) (Regular Paper) 23 6, 2018 11 (JBE Vol. 23, No. 6, November 2018) https://doi.org/10.5909/jbe.2018.23.6.886 ISSN 2287-9137 (Online) ISSN 1226-7953 (Print) CNN a), a),

More information

AN OVERVIEW ON VIDEO FORENSICS

AN OVERVIEW ON VIDEO FORENSICS AN OVERVIEW ON VIDEO FORENSICS P. Bestagini,M. Fontani,, S. Milani, M. Barni,, A.Piva,,M. Tagliasacchi, S.Tubaro Politecnico di Milano, Dipartimento di Elettronica e Informazione, Milano, Italy University

More information

VoIP Forgery Detection

VoIP Forgery Detection VoIP Forgery Detection Satish Tummala, Yanxin Liu and Qingzhong Liu Department of Computer Science Sam Houston State University Huntsville, TX, USA Emails: sct137@shsu.edu; yanxin@shsu.edu; liu@shsu.edu

More information

FRAGILE WATERMARKING USING SUBBAND CODING

FRAGILE WATERMARKING USING SUBBAND CODING ICCVG 2002 Zakopane, 25-29 Sept. 2002 Roger ŚWIERCZYŃSKI Institute of Electronics and Telecommunication Poznań University of Technology roger@et.put.poznan.pl FRAGILE WATERMARKING USING SUBBAND CODING

More information

Deliverable D6.3 Release of publicly available datasets and software tools

Deliverable D6.3 Release of publicly available datasets and software tools Grant Agreement No. 268478 Deliverable D6.3 Release of publicly available datasets and software tools Lead partner for this deliverable: PoliMI Version: 1.0 Dissemination level: Public April 29, 2013 Contents

More information

Video Inter-frame Forgery Identification Based on Optical Flow Consistency

Video Inter-frame Forgery Identification Based on Optical Flow Consistency Sensors & Transducers 24 by IFSA Publishing, S. L. http://www.sensorsportal.com Video Inter-frame Forgery Identification Based on Optical Flow Consistency Qi Wang, Zhaohong Li, Zhenzhen Zhang, Qinglong

More information

Identifying Compression History of Wave Audio and Its Applications

Identifying Compression History of Wave Audio and Its Applications Identifying Compression History of Wave Audio and Its Applications DA LUO, WEIQI LUO, RUI YANG, Sun Yat-sen University JIWU HUANG, Shenzhen University Audio signal is sometimes stored and/or processed

More information

The Watchful Forensic Analyst: Multi-Clue Information Fusion with Background Knowledge

The Watchful Forensic Analyst: Multi-Clue Information Fusion with Background Knowledge WIFS 13 The Watchful Forensic Analyst: Multi-Clue Information Fusion with Background Knowledge Marco Fontani #, Enrique Argones-Rúa*, Carmela Troncoso*, Mauro Barni # # University of Siena (IT) * GRADIANT:

More information

Novel Forensic And Anti-Forensic Techniques Identification Based On Game Theory Frame Work

Novel Forensic And Anti-Forensic Techniques Identification Based On Game Theory Frame Work Novel Forensic And Anti-Forensic Techniques Identification Based On Game Theory Frame Work Geetha S Raveendran PSN College of Engineering and Technology Tirunelveli, Tamilnadu R. LakshmiPriya PSN College

More information

Data Hiding on Text Using Big-5 Code

Data Hiding on Text Using Big-5 Code Data Hiding on Text Using Big-5 Code Jun-Chou Chuang 1 and Yu-Chen Hu 2 1 Department of Computer Science and Communication Engineering Providence University 200 Chung-Chi Rd., Shalu, Taichung 43301, Republic

More information

An overview on video forensics

An overview on video forensics An overview on video forensics 1 S. Milani 1, M. Fontani 2,4, P. Bestagini 1, M. Barni 2,4, A. Piva 3,4, M. Tagliasacchi 1, S. Tubaro 1 1 Politecnico di Milano, Dipartimento di Elettronica e Informazione,

More information

JPEG Copy Paste Forgery Detection Using BAG Optimized for Complex Images

JPEG Copy Paste Forgery Detection Using BAG Optimized for Complex Images JPEG Copy Paste Forgery Detection Using BAG Optimized for Complex Images Dessalegn Atnafu AYALNEH*, Hyoung Joong KIM*, Yong Soo CHOI** *CIST (Center for Information Security Technologies), Korea University

More information

Detection of Blue Screen Special Effects in Videos

Detection of Blue Screen Special Effects in Videos Available online at www.sciencedirect.com Physics Procedia 33 (2012 ) 1316 1322 2012 International Conference on Medical Physics and Biomedical Engineering Detection of Blue Screen Special Effects in Videos

More information

High Capacity Reversible Watermarking Scheme for 2D Vector Maps

High Capacity Reversible Watermarking Scheme for 2D Vector Maps Scheme for 2D Vector Maps 1 Information Management Department, China National Petroleum Corporation, Beijing, 100007, China E-mail: jxw@petrochina.com.cn Mei Feng Research Institute of Petroleum Exploration

More information

Advanced Digital Image Forgery Detection by Using SIFT

Advanced Digital Image Forgery Detection by Using SIFT RESEARCH ARTICLE OPEN ACCESS Advanced Digital Image Forgery Detection by Using SIFT Priyanka G. Gomase, Nisha R. Wankhade Department of Information Technology, Yeshwantrao Chavan College of Engineering

More information

Local tampering detection in video sequences

Local tampering detection in video sequences Local tampering detection in video sequences Paolo Bestagini, Simone Milani, Marco Tagliasacchi, Stefano Tubaro Dipartimento di Elettronica, Informazione e Bioingegneria, Politecnico di Milano piazza Leonardo

More information

Face Recognition Using Vector Quantization Histogram and Support Vector Machine Classifier Rong-sheng LI, Fei-fei LEE *, Yan YAN and Qiu CHEN

Face Recognition Using Vector Quantization Histogram and Support Vector Machine Classifier Rong-sheng LI, Fei-fei LEE *, Yan YAN and Qiu CHEN 2016 International Conference on Artificial Intelligence: Techniques and Applications (AITA 2016) ISBN: 978-1-60595-389-2 Face Recognition Using Vector Quantization Histogram and Support Vector Machine

More information

A Flexible Scheme of Self Recovery for Digital Image Protection

A Flexible Scheme of Self Recovery for Digital Image Protection www.ijcsi.org 460 A Flexible Scheme of Self Recoery for Digital Image Protection Zhenxing Qian, Lili Zhao 2 School of Communication and Information Engineering, Shanghai Uniersity, Shanghai 200072, China

More information

Politecnico di Torino. Porto Institutional Repository

Politecnico di Torino. Porto Institutional Repository Politecnico di Torino Porto Institutional Repository [Proceeding] Detection and classification of double compressed MP3 audio tracks Original Citation: Tiziano Bianchi;Alessia De Rosa;Marco Fontani;Giovanni

More information

Detecting Re-captured Videos using Shot-Based Photo Response Non-Uniformity

Detecting Re-captured Videos using Shot-Based Photo Response Non-Uniformity Detecting Re-captured Videos using Shot-Based Photo Response Non-Uniformity Dae-Jin Jung 1, Dai-Kyung Hyun 1, Seung-Jin Ryu 1, Ji-Won Lee 1, Hae-Yeoun Lee 2, and Heung-Kyu Lee 1 1 Department of CS, Korea

More information

arxiv: v2 [eess.iv] 1 Apr 2019

arxiv: v2 [eess.iv] 1 Apr 2019 PRNU-Based Source Device Attribution for YouTube Videos Emmanuel Kiegaing Kouokam a, Ahmet Emir Dirik b, a Department of Electronic Engineering, Uludağ University, Bursa-Turkey b Department of Computer

More information

Block Mean Value Based Image Perceptual Hashing for Content Identification

Block Mean Value Based Image Perceptual Hashing for Content Identification Block Mean Value Based Image Perceptual Hashing for Content Identification Abstract. Image perceptual hashing has been proposed to identify or authenticate image contents in a robust way against distortions

More information

ON THE EFFECTIVENESS OF LOCAL WARPING AGAINST SIFT-BASED COPY-MOVE DETECTION

ON THE EFFECTIVENESS OF LOCAL WARPING AGAINST SIFT-BASED COPY-MOVE DETECTION ON THE EFFECTIVENESS OF LOCAL WARPING AGAINST SIFT-BASED COPY-MOVE DETECTION R. Caldelli, I. Amerini, L. Ballan, G. Serra Media Integration and Communication Center University of Florence Viale Morgagni,

More information

REVVIND REVerse engineering of audio-visual content Data

REVVIND REVerse engineering of audio-visual content Data FP7-ICT-2007-C GA No. 268478 footprint detectors LAST MODIFICATION: 30.04.2014 REPORTING ORGANIZATION: FRAUNHOFER (INSTITUTE FOR DIGITAL MEDIA TECHNOLOGY) AUTHORS: LUCA CUCCOVILLO, PATRICK AICHROTH, DANIEL

More information

Evaluation of Image Forgery Detection Using Multi-scale Weber Local Descriptors

Evaluation of Image Forgery Detection Using Multi-scale Weber Local Descriptors Evaluation of Image Forgery Detection Using Multi-scale Weber Local Descriptors Sahar Q. Saleh 1, Muhammad Hussain 1, Ghulam Muhammad 1, and George Bebis 2 1 College of Computer and Information Sciences,

More information

A Novel Method for Block Size Forensics Based on Morphological Operations

A Novel Method for Block Size Forensics Based on Morphological Operations A Novel Method for Block Size Forensics Based on Morphological Operations Weiqi Luo, Jiwu Huang, and Guoping Qiu 2 Guangdong Key Lab. of Information Security Technology Sun Yat-Sen University, Guangdong,

More information

Information Cloaking Technique with Tree Based Similarity

Information Cloaking Technique with Tree Based Similarity Information Cloaking Technique with Tree Based Similarity C.Bharathipriya [1], K.Lakshminarayanan [2] 1 Final Year, Computer Science and Engineering, Mailam Engineering College, 2 Assistant Professor,

More information

Exposing MP3 Audio Forgeries Using Frame Offsets

Exposing MP3 Audio Forgeries Using Frame Offsets Exposing MP3 Audio Forgeries Using Frame Offsets RUI YANG, ZHENHUA QU, and JIWU HUANG, Sun Yat-sen University Audio recordings should be authenticated before they are used as evidence. Although audio watermaring

More information

Data Hiding in Video

Data Hiding in Video Data Hiding in Video J. J. Chae and B. S. Manjunath Department of Electrical and Computer Engineering University of California, Santa Barbara, CA 9316-956 Email: chaejj, manj@iplab.ece.ucsb.edu Abstract

More information

IMAGE COMPRESSION USING ANTI-FORENSICS METHOD

IMAGE COMPRESSION USING ANTI-FORENSICS METHOD IMAGE COMPRESSION USING ANTI-FORENSICS METHOD M.S.Sreelakshmi and D. Venkataraman Department of Computer Science and Engineering, Amrita Vishwa Vidyapeetham, Coimbatore, India mssreelakshmi@yahoo.com d_venkat@cb.amrita.edu

More information

Copy Move Forgery using Hu s Invariant Moments and Log-Polar Transformations

Copy Move Forgery using Hu s Invariant Moments and Log-Polar Transformations Copy Move Forgery using Hu s Invariant Moments and Log-Polar Transformations Tejas K, Swathi C, Rajesh Kumar M, Senior member, IEEE School of Electronics Engineering Vellore Institute of Technology Vellore,

More information

arxiv: v1 [cs.cr] 31 Dec 2018

arxiv: v1 [cs.cr] 31 Dec 2018 Security analysis of a self-embedding fragile image watermark scheme Xinhui Gong, Feng Yu, Xiaohong Zhao, Shihong Wang School of Science, Beijing University of Posts and Telecommunications, Beijing 100876,

More information

Comparative Analysis of 2-Level and 4-Level DWT for Watermarking and Tampering Detection

Comparative Analysis of 2-Level and 4-Level DWT for Watermarking and Tampering Detection International Journal of Latest Engineering and Management Research (IJLEMR) ISSN: 2455-4847 Volume 1 Issue 4 ǁ May 2016 ǁ PP.01-07 Comparative Analysis of 2-Level and 4-Level for Watermarking and Tampering

More information

Copy-Move Forgery Detection using DCT and SIFT

Copy-Move Forgery Detection using DCT and SIFT Copy-Move Forgery Detection using DCT and SIFT Amanpreet Kaur Department of Computer Science and Engineering, Lovely Professional University, Punjab, India. Richa Sharma Department of Computer Science

More information

BIG DATA-DRIVEN FAST REDUCING THE VISUAL BLOCK ARTIFACTS OF DCT COMPRESSED IMAGES FOR URBAN SURVEILLANCE SYSTEMS

BIG DATA-DRIVEN FAST REDUCING THE VISUAL BLOCK ARTIFACTS OF DCT COMPRESSED IMAGES FOR URBAN SURVEILLANCE SYSTEMS BIG DATA-DRIVEN FAST REDUCING THE VISUAL BLOCK ARTIFACTS OF DCT COMPRESSED IMAGES FOR URBAN SURVEILLANCE SYSTEMS Ling Hu and Qiang Ni School of Computing and Communications, Lancaster University, LA1 4WA,

More information

Image Error Concealment Based on Watermarking

Image Error Concealment Based on Watermarking Image Error Concealment Based on Watermarking Shinfeng D. Lin, Shih-Chieh Shie and Jie-Wei Chen Department of Computer Science and Information Engineering,National Dong Hwa Universuty, Hualien, Taiwan,

More information

Detecting Digital Image Forgeries By Multi-illuminant Estimators

Detecting Digital Image Forgeries By Multi-illuminant Estimators Research Paper Volume 2 Issue 8 April 2015 International Journal of Informative & Futuristic Research ISSN (Online): 2347-1697 Detecting Digital Image Forgeries By Multi-illuminant Estimators Paper ID

More information

A BTC-COMPRESSED DOMAIN INFORMATION HIDING METHOD BASED ON HISTOGRAM MODIFICATION AND VISUAL CRYPTOGRAPHY. Hang-Yu Fan and Zhe-Ming Lu

A BTC-COMPRESSED DOMAIN INFORMATION HIDING METHOD BASED ON HISTOGRAM MODIFICATION AND VISUAL CRYPTOGRAPHY. Hang-Yu Fan and Zhe-Ming Lu International Journal of Innovative Computing, Information and Control ICIC International c 2016 ISSN 1349-4198 Volume 12, Number 2, April 2016 pp. 395 405 A BTC-COMPRESSED DOMAIN INFORMATION HIDING METHOD

More information

VIDEO CODEC IDENTIFICATION

VIDEO CODEC IDENTIFICATION POLITECNICO DI MILANO Thesis of (Master of Science) in Computer Engineering Department of Informatics VIDEO CODEC IDENTIFICATION Assistant: Paolo Bestagini Supervisor: Assistant Professor Marco Tagliasacchi

More information

AN EFFICIENT VIDEO WATERMARKING USING COLOR HISTOGRAM ANALYSIS AND BITPLANE IMAGE ARRAYS

AN EFFICIENT VIDEO WATERMARKING USING COLOR HISTOGRAM ANALYSIS AND BITPLANE IMAGE ARRAYS AN EFFICIENT VIDEO WATERMARKING USING COLOR HISTOGRAM ANALYSIS AND BITPLANE IMAGE ARRAYS G Prakash 1,TVS Gowtham Prasad 2, T.Ravi Kumar Naidu 3 1MTech(DECS) student, Department of ECE, sree vidyanikethan

More information

Image Segmentation Techniques for Object-Based Coding

Image Segmentation Techniques for Object-Based Coding Image Techniques for Object-Based Coding Junaid Ahmed, Joseph Bosworth, and Scott T. Acton The Oklahoma Imaging Laboratory School of Electrical and Computer Engineering Oklahoma State University {ajunaid,bosworj,sacton}@okstate.edu

More information

On-line Signature Verification on a Mobile Platform

On-line Signature Verification on a Mobile Platform On-line Signature Verification on a Mobile Platform Nesma Houmani, Sonia Garcia-Salicetti, Bernadette Dorizzi, and Mounim El-Yacoubi Institut Telecom; Telecom SudParis; Intermedia Team, 9 rue Charles Fourier,

More information

The Essential Guide to Video Processing

The Essential Guide to Video Processing The Essential Guide to Video Processing Second Edition EDITOR Al Bovik Department of Electrical and Computer Engineering The University of Texas at Austin Austin, Texas AMSTERDAM BOSTON HEIDELBERG LONDON

More information

Frequency Band Coding Mode Selection for Key Frames of Wyner-Ziv Video Coding

Frequency Band Coding Mode Selection for Key Frames of Wyner-Ziv Video Coding 2009 11th IEEE International Symposium on Multimedia Frequency Band Coding Mode Selection for Key Frames of Wyner-Ziv Video Coding Ghazaleh R. Esmaili and Pamela C. Cosman Department of Electrical and

More information

CHAPTER 1: INTRODUCTION

CHAPTER 1: INTRODUCTION CHAPTER 1: INTRODUCTION In the modern age, digital images and videos have become the main information carriers to disseminate knowledge and establish the bridge among several sources. Visual information

More information

VIDEO CODEC IDENTIFICATION EXTENDING THE IDEMPOTENCY PROPERTY. P. Bestagini, S. Milani, M. Tagliasacchi, S. Tubaro

VIDEO CODEC IDENTIFICATION EXTENDING THE IDEMPOTENCY PROPERTY. P. Bestagini, S. Milani, M. Tagliasacchi, S. Tubaro VIDEO CODEC IDENTIFICATION EXTENDING THE IDEMPOTENCY PROPERTY P. Bestagini, S. Milani, M. Tagliasacchi, S. Tubaro Dipartimento di Elettronica ed Informazione, Politecnico di Milano piazza Leonardo da Vinci

More information

DOI: /jos Tel/Fax: by Journal of Software. All rights reserved. , )

DOI: /jos Tel/Fax: by Journal of Software. All rights reserved. , ) ISSN 1000-9825, CODEN RUXUEW E-mail: jos@iscasaccn Journal of Software, Vol17, No2, February 2006, pp315 324 http://wwwjosorgcn DOI: 101360/jos170315 Tel/Fax: +86-10-62562563 2006 by Journal of Software

More information

A Detailed look of Audio Steganography Techniques using LSB and Genetic Algorithm Approach

A Detailed look of Audio Steganography Techniques using LSB and Genetic Algorithm Approach www.ijcsi.org 402 A Detailed look of Audio Steganography Techniques using LSB and Genetic Algorithm Approach Gunjan Nehru 1, Puja Dhar 2 1 Department of Information Technology, IEC-Group of Institutions

More information

H.264 STREAM REPLACEMENT WATERMARKING WITH CABAC ENCODING

H.264 STREAM REPLACEMENT WATERMARKING WITH CABAC ENCODING H.264 STREAM REPLACEMENT WATERMARKING WITH CABAC ENCODING Dekun Zou * and Jeffrey A Bloom ** * Technicolor Corporate Research dekun.zou@technicolor.com ABSTRACT This paper describes a watermarking method

More information

Information Retrieval System Based on Context-aware in Internet of Things. Ma Junhong 1, a *

Information Retrieval System Based on Context-aware in Internet of Things. Ma Junhong 1, a * Information Retrieval System Based on Context-aware in Internet of Things Ma Junhong 1, a * 1 Xi an International University, Shaanxi, China, 710000 a sufeiya913@qq.com Keywords: Context-aware computing,

More information

A SURVEY ON VIDEO FORGERY DETECTION

A SURVEY ON VIDEO FORGERY DETECTION A SURVEY ON VIDEO FORGERY DETECTION Sowmya K.N. 1, H.R. Chennamma 2 1 Asst. Prof., Department of ISE, JSSATE, Bangalore, 2 Asst. Prof., Department of MCA, Sri Jayachamarajendra College of Engg., Mysuru,

More information

Production of Video Images by Computer Controlled Cameras and Its Application to TV Conference System

Production of Video Images by Computer Controlled Cameras and Its Application to TV Conference System Proc. of IEEE Conference on Computer Vision and Pattern Recognition, vol.2, II-131 II-137, Dec. 2001. Production of Video Images by Computer Controlled Cameras and Its Application to TV Conference System

More information

Robust Steganography Using Texture Synthesis

Robust Steganography Using Texture Synthesis Robust Steganography Using Texture Synthesis Zhenxing Qian 1, Hang Zhou 2, Weiming Zhang 2, Xinpeng Zhang 1 1. School of Communication and Information Engineering, Shanghai University, Shanghai, 200444,

More information

Story Unit Segmentation with Friendly Acoustic Perception *

Story Unit Segmentation with Friendly Acoustic Perception * Story Unit Segmentation with Friendly Acoustic Perception * Longchuan Yan 1,3, Jun Du 2, Qingming Huang 3, and Shuqiang Jiang 1 1 Institute of Computing Technology, Chinese Academy of Sciences, Beijing,

More information

A New Approach to Authenticate Images in Different Datasets Using a Lossless Image Watermarking Technique

A New Approach to Authenticate Images in Different Datasets Using a Lossless Image Watermarking Technique A New Approach to Authenticate Images in Different Datasets Using a Lossless Image Watermarking Technique 1 Arathi Chitla, 2 Dr. M. Chandra Mohan 1 Associate Professor, Department of Computer Science &

More information

CV of Qixiang Ye. University of Chinese Academy of Sciences

CV of Qixiang Ye. University of Chinese Academy of Sciences 2012-12-12 University of Chinese Academy of Sciences Qixiang Ye received B.S. and M.S. degrees in mechanical & electronic engineering from Harbin Institute of Technology (HIT) in 1999 and 2001 respectively,

More information

The University of Jordan. Accreditation & Quality Assurance Center. Curriculum for Doctorate Degree

The University of Jordan. Accreditation & Quality Assurance Center. Curriculum for Doctorate Degree Accreditation & Quality Assurance Center Curriculum for Doctorate Degree 1. Faculty King Abdullah II School for Information Technology 2. Department Computer Science الدكتوراة في علم الحاسوب (Arabic).3

More information

A Framework to Reversible Data Hiding Using Histogram-Modification

A Framework to Reversible Data Hiding Using Histogram-Modification A Framework to Reversible Data Hiding Using Histogram-Modification R. Neeraja 1 PG Student, ECE Department Gokula Krishna College of Engineering Sullurpet, India e-mail:r.p.neeru@gmail.com M. Gnana Priya

More information

Image and Video Coding I: Fundamentals

Image and Video Coding I: Fundamentals Image and Video Coding I: Fundamentals Thomas Wiegand Technische Universität Berlin T. Wiegand (TU Berlin) Image and Video Coding Organization Vorlesung: Donnerstag 10:15-11:45 Raum EN-368 Material: http://www.ic.tu-berlin.de/menue/studium_und_lehre/

More information

FRAME BASED RECOVERY OF CORRUPTED VIDEO FILES

FRAME BASED RECOVERY OF CORRUPTED VIDEO FILES FRAME BASED RECOVERY OF CORRUPTED VIDEO FILES D.Suresh 1, D.V.Ramana 2, D.Arun Kumar 3 * 1 Assistant Professor, Department of ECE, GMRIT, RAJAM, AP, INDIA 2 Assistant Professor, Department of ECE, GMRIT,

More information

An Information Hiding Algorithm for HEVC Based on Angle Differences of Intra Prediction Mode

An Information Hiding Algorithm for HEVC Based on Angle Differences of Intra Prediction Mode An Information Hiding Algorithm for HEVC Based on Angle Differences of Intra Prediction Mode Jia-Ji Wang1, Rang-Ding Wang1*, Da-Wen Xu1, Wei Li1 CKC Software Lab, Ningbo University, Ningbo, Zhejiang 3152,

More information

Research of the Development of Multimedia Key Technology Zhongsheng Wang1, a and Xin Zhan1

Research of the Development of Multimedia Key Technology Zhongsheng Wang1, a and Xin Zhan1 6th International Conference on Sensor Network and Computer Engineering (ICSNCE 2016) Research of the Development of Multimedia Key Technology Zhongsheng Wang1, a and Xin Zhan1 1 School of Computer Science

More information

Hybrid Stegnography using ImagesVaried PVD+ LSB Detection Program

Hybrid Stegnography using ImagesVaried PVD+ LSB Detection Program www.ijecs.in International Journal Of Engineering And Computer Science ISSN:2319-7242 Volume 4 Issue 5 May 2015, Page No. 12086-12090 Hybrid Stegnography using ImagesVaried PVD+ LSB Detection Program Shruti

More information

Video Compression Method for On-Board Systems of Construction Robots

Video Compression Method for On-Board Systems of Construction Robots Video Compression Method for On-Board Systems of Construction Robots Andrei Petukhov, Michael Rachkov Moscow State Industrial University Department of Automatics, Informatics and Control Systems ul. Avtozavodskaya,

More information

Fabric Defect Detection Based on Computer Vision

Fabric Defect Detection Based on Computer Vision Fabric Defect Detection Based on Computer Vision Jing Sun and Zhiyu Zhou College of Information and Electronics, Zhejiang Sci-Tech University, Hangzhou, China {jings531,zhouzhiyu1993}@163.com Abstract.

More information

CODING METHOD FOR EMBEDDING AUDIO IN VIDEO STREAM. Harri Sorokin, Jari Koivusaari, Moncef Gabbouj, and Jarmo Takala

CODING METHOD FOR EMBEDDING AUDIO IN VIDEO STREAM. Harri Sorokin, Jari Koivusaari, Moncef Gabbouj, and Jarmo Takala CODING METHOD FOR EMBEDDING AUDIO IN VIDEO STREAM Harri Sorokin, Jari Koivusaari, Moncef Gabbouj, and Jarmo Takala Tampere University of Technology Korkeakoulunkatu 1, 720 Tampere, Finland ABSTRACT In

More information

Reversible Watermarking in JPEG Images Based on Modified RZL Codes and Histogram Shift

Reversible Watermarking in JPEG Images Based on Modified RZL Codes and Histogram Shift 203, Vol.8 No.2, 26-32 Article ID 007-202(203)02-026-07 DOI 0.007/s859-03-0904- Reversible Watermarking in JPEG Images Based on Modified RZL Codes and Histogram Shift CHEN Biao, ZHANG Weiming,2, YU Nenghai.

More information

Reversible Image Data Hiding with Local Adaptive Contrast Enhancement

Reversible Image Data Hiding with Local Adaptive Contrast Enhancement Reversible Image Data Hiding with Local Adaptive Contrast Enhancement Ruiqi Jiang, Weiming Zhang, Jiajia Xu, Nenghai Yu and Xiaocheng Hu Abstract Recently, a novel reversible data hiding scheme is proposed

More information

Research on Construction of Road Network Database Based on Video Retrieval Technology

Research on Construction of Road Network Database Based on Video Retrieval Technology Research on Construction of Road Network Database Based on Video Retrieval Technology Fengling Wang 1 1 Hezhou University, School of Mathematics and Computer Hezhou Guangxi 542899, China Abstract. Based

More information

Improved LBP and K-Nearest Neighbors Algorithm

Improved LBP and K-Nearest Neighbors Algorithm Image-Splicing Forgery Detection Based On Improved LBP and K-Nearest Neighbors Algorithm Fahime Hakimi, Department of Electrical and Computer engineering. Zanjan branch, Islamic Azad University. Zanjan,

More information

Secured Double Layer Data Hiding Using Encryption and Decryption Techniques

Secured Double Layer Data Hiding Using Encryption and Decryption Techniques Secured Double Layer Data Hiding Using Encryption and Decryption Techniques H.MaheshKumar M.Vignesh Abstract In this period of Internet every digitized object is transferable and exchangeable over internet

More information

Improving the Efficiency of Fast Using Semantic Similarity Algorithm

Improving the Efficiency of Fast Using Semantic Similarity Algorithm International Journal of Scientific and Research Publications, Volume 4, Issue 1, January 2014 1 Improving the Efficiency of Fast Using Semantic Similarity Algorithm D.KARTHIKA 1, S. DIVAKAR 2 Final year

More information

Optimized Watermarking Using Swarm-Based Bacterial Foraging

Optimized Watermarking Using Swarm-Based Bacterial Foraging Journal of Information Hiding and Multimedia Signal Processing c 2009 ISSN 2073-4212 Ubiquitous International Volume 1, Number 1, January 2010 Optimized Watermarking Using Swarm-Based Bacterial Foraging

More information

OVERVIEW OF IEEE 1857 VIDEO CODING STANDARD

OVERVIEW OF IEEE 1857 VIDEO CODING STANDARD OVERVIEW OF IEEE 1857 VIDEO CODING STANDARD Siwei Ma, Shiqi Wang, Wen Gao {swma,sqwang, wgao}@pku.edu.cn Institute of Digital Media, Peking University ABSTRACT IEEE 1857 is a multi-part standard for multimedia

More information

A Novel Image Super-resolution Reconstruction Algorithm based on Modified Sparse Representation

A Novel Image Super-resolution Reconstruction Algorithm based on Modified Sparse Representation , pp.162-167 http://dx.doi.org/10.14257/astl.2016.138.33 A Novel Image Super-resolution Reconstruction Algorithm based on Modified Sparse Representation Liqiang Hu, Chaofeng He Shijiazhuang Tiedao University,

More information

Course Curriculum for Master Degree in Network Engineering and Security

Course Curriculum for Master Degree in Network Engineering and Security Course Curriculum for Master Degree in Network Engineering and Security The Master Degree in Network Engineering and Security is awarded by the Faculty of Graduate Studies at Jordan University of Science

More information

Secret Sharing in Audio Steganography

Secret Sharing in Audio Steganography Secret Sharing in Audio Steganography Ka Fai Peter Chan Defence, Peace, Safety & Security (DPSS) Council for Scientific and Industrial Research Pretoria, South Africa kchan@csir.co.za Abstract This paper

More information

DATA hiding [1] and watermarking in digital images

DATA hiding [1] and watermarking in digital images 14 IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, VOL. 6, NO. 1, MARCH 2011 Data Hiding in Motion Vectors of Compressed Video Based on Their Associated Prediction Error Hussein A. Aly, Member,

More information

Video Copy Detection Based on Source Device Characteristics: A Complementary Approach to Content-Based Methods

Video Copy Detection Based on Source Device Characteristics: A Complementary Approach to Content-Based Methods Video Copy Detection Based on Source Device Characteristics: A Complementary Approach to Content-Based Methods Sevinc Bayram Polytechnic University Department of Electrical and Computer Engineering Brooklyn,

More information

COMP116 Final Project. Shuyan Guo Advisor: Ming Chow

COMP116 Final Project. Shuyan Guo Advisor: Ming Chow Digital Forensics with ios Devices COMP116 Final Project Shuyan Guo Shuyan.guo@tufts.edu Advisor: Ming Chow Abstract This project focuses on ios device forensics. The study provides a general overview

More information

H.264/AVC Video Watermarking Algorithm Against Recoding

H.264/AVC Video Watermarking Algorithm Against Recoding Sensors & Transducers 2014 by IFSA Publishing, S. L. http://www.sensorsportal.com H.264/AVC Video Watermarking Algorithm Against Recoding Rangding Wang, Qian Li, Lujian Hu, Dawen Xu College of Information

More information

Moment-preserving Based Watermarking for Color Image Authentication and Recovery

Moment-preserving Based Watermarking for Color Image Authentication and Recovery 2012 IACSIT Hong Kong Conferences IPCSIT vol. 30 (2012) (2012) IACSIT Press, Singapore Moment-preserving Based Watermarking for Color Image Authentication and Recovery Kuo-Cheng Liu + Information Educating

More information

Digital Image Stabilization and Its Integration with Video Encoder

Digital Image Stabilization and Its Integration with Video Encoder Digital Image Stabilization and Its Integration with Video Encoder Yu-Chun Peng, Hung-An Chang, Homer H. Chen Graduate Institute of Communication Engineering National Taiwan University Taipei, Taiwan {b889189,

More information

A CAVLC-BASED VIDEO WATERMARKING SCHEME FOR H.264/AVC CODEC. Received May 2010; revised October 2010

A CAVLC-BASED VIDEO WATERMARKING SCHEME FOR H.264/AVC CODEC. Received May 2010; revised October 2010 International Journal of Innovative Computing, Information and Control ICIC International c 2011 ISSN 1349-4198 Volume 7, Number 11, November 2011 pp. 6359 6367 A CAVLC-BASED VIDEO WATERMARKING SCHEME

More information

CONTENT ADAPTIVE SCREEN IMAGE SCALING

CONTENT ADAPTIVE SCREEN IMAGE SCALING CONTENT ADAPTIVE SCREEN IMAGE SCALING Yao Zhai (*), Qifei Wang, Yan Lu, Shipeng Li University of Science and Technology of China, Hefei, Anhui, 37, China Microsoft Research, Beijing, 8, China ABSTRACT

More information

Detection and localization of double compression in MP3 audio tracks

Detection and localization of double compression in MP3 audio tracks Bianchi et al. EURASIP Journal on Information Security 214, 214:1 http://jis.eurasipjournals.com/content/214/1/1 RESEARCH Detection and localization of double compression in MP3 audio tracks Tiziano Bianchi

More information

Vector Bank Based Multimedia Codec System-on-a-Chip (SoC) Design

Vector Bank Based Multimedia Codec System-on-a-Chip (SoC) Design 2009 10th International Symposium on Pervasive Systems, Algorithms, and Networks Vector Bank Based Multimedia Codec System-on-a-Chip (SoC) Design Ruei-Xi Chen, Wei Zhao, Jeffrey Fan andasaddavari Computer

More information

Prediction of traffic flow based on the EMD and wavelet neural network Teng Feng 1,a,Xiaohong Wang 1,b,Yunlai He 1,c

Prediction of traffic flow based on the EMD and wavelet neural network Teng Feng 1,a,Xiaohong Wang 1,b,Yunlai He 1,c 2nd International Conference on Electrical, Computer Engineering and Electronics (ICECEE 215) Prediction of traffic flow based on the EMD and wavelet neural network Teng Feng 1,a,Xiaohong Wang 1,b,Yunlai

More information

A Miniature-Based Image Retrieval System

A Miniature-Based Image Retrieval System A Miniature-Based Image Retrieval System Md. Saiful Islam 1 and Md. Haider Ali 2 Institute of Information Technology 1, Dept. of Computer Science and Engineering 2, University of Dhaka 1, 2, Dhaka-1000,

More information

An Automatic Timestamp Replanting Algorithm for Panorama Video Surveillance *

An Automatic Timestamp Replanting Algorithm for Panorama Video Surveillance * An Automatic Timestamp Replanting Algorithm for Panorama Video Surveillance * Xinguo Yu, Wu Song, Jun Cheng, Bo Qiu, and Bin He National Engineering Research Center for E-Learning, Central China Normal

More information

Adaptive Pixel Pair Matching Technique for Data Embedding

Adaptive Pixel Pair Matching Technique for Data Embedding Available Online at www.ijcsmc.com International Journal of Computer Science and Mobile Computing A Monthly Journal of Computer Science and Information Technology IJCSMC, Vol. 3, Issue. 1, January 2014,

More information

ADVANCED IMAGE PROCESSING METHODS FOR ULTRASONIC NDE RESEARCH C. H. Chen, University of Massachusetts Dartmouth, N.

ADVANCED IMAGE PROCESSING METHODS FOR ULTRASONIC NDE RESEARCH C. H. Chen, University of Massachusetts Dartmouth, N. ADVANCED IMAGE PROCESSING METHODS FOR ULTRASONIC NDE RESEARCH C. H. Chen, University of Massachusetts Dartmouth, N. Dartmouth, MA USA Abstract: The significant progress in ultrasonic NDE systems has now

More information

IMPROVING THE RELIABILITY OF DETECTION OF LSB REPLACEMENT STEGANOGRAPHY

IMPROVING THE RELIABILITY OF DETECTION OF LSB REPLACEMENT STEGANOGRAPHY IMPROVING THE RELIABILITY OF DETECTION OF LSB REPLACEMENT STEGANOGRAPHY Shreelekshmi R, Wilscy M 2 and C E Veni Madhavan 3 Department of Computer Science & Engineering, College of Engineering, Trivandrum,

More information

Keywords Stegnography, stego-image, Diamond Encoding, DCT,stego-frame and stego video. BLOCK DIAGRAM

Keywords Stegnography, stego-image, Diamond Encoding, DCT,stego-frame and stego video. BLOCK DIAGRAM Volume 6, Issue 1, January 2016 ISSN: 2277 128X International Journal of Advanced Research in Computer Science and Software Engineering Research Paper Available online at: www.ijarcsse.com Information

More information

EFFICIENT ATTRIBUTE REDUCTION ALGORITHM

EFFICIENT ATTRIBUTE REDUCTION ALGORITHM EFFICIENT ATTRIBUTE REDUCTION ALGORITHM Zhongzhi Shi, Shaohui Liu, Zheng Zheng Institute Of Computing Technology,Chinese Academy of Sciences, Beijing, China Abstract: Key words: Efficiency of algorithms

More information

A Novel Secure Digital Watermark Generation from Public Share by Using Visual Cryptography and MAC Techniques

A Novel Secure Digital Watermark Generation from Public Share by Using Visual Cryptography and MAC Techniques Bashar S. Mahdi Alia K. Abdul Hassan Department of Computer Science, University of Technology, Baghdad, Iraq A Novel Secure Digital Watermark Generation from Public Share by Using Visual Cryptography and

More information

AUTOMATIC VISUAL CONCEPT DETECTION IN VIDEOS

AUTOMATIC VISUAL CONCEPT DETECTION IN VIDEOS AUTOMATIC VISUAL CONCEPT DETECTION IN VIDEOS Nilam B. Lonkar 1, Dinesh B. Hanchate 2 Student of Computer Engineering, Pune University VPKBIET, Baramati, India Computer Engineering, Pune University VPKBIET,

More information

Authentication and Secret Message Transmission Technique Using Discrete Fourier Transformation

Authentication and Secret Message Transmission Technique Using Discrete Fourier Transformation , 2009, 5, 363-370 doi:10.4236/ijcns.2009.25040 Published Online August 2009 (http://www.scirp.org/journal/ijcns/). Authentication and Secret Message Transmission Technique Using Discrete Fourier Transformation

More information

A Linear Approximation Based Method for Noise-Robust and Illumination-Invariant Image Change Detection

A Linear Approximation Based Method for Noise-Robust and Illumination-Invariant Image Change Detection A Linear Approximation Based Method for Noise-Robust and Illumination-Invariant Image Change Detection Bin Gao 2, Tie-Yan Liu 1, Qian-Sheng Cheng 2, and Wei-Ying Ma 1 1 Microsoft Research Asia, No.49 Zhichun

More information

VIDEO WATERMARKING ALGORITHM FOR CONTENT AUTHORISATION

VIDEO WATERMARKING ALGORITHM FOR CONTENT AUTHORISATION Volume, Issue 3, March 2015 VIDEO WATERMARKING ALGORITHM FOR CONTENT AUTHORISATION V.Rajendhiran J.Elavanthan M.Vengadapathiraj R.Vinothkumar Dr.M.Saravanan Abstract:-In this paper proposed a novel video

More information