EXPOSING THE DOUBLE COMPRESSION IN MP3 AUDIO BY FREQUENCY VIBRATION. Tianzhuo Wang, Xiangwei Kong, Yanqing Guo, Bo Wang
|
|
- Pearl Barnett
- 6 years ago
- Views:
Transcription
1 EXPOSIG THE DOUBLE COMPRESSIO I MP3 AUDIO BY FREQUECY VIBRATIO Tianzhuo Wang, Xiangwei Kong, Yanqing Guo, Bo Wang School of Information and Communication Engineering Dalian University of Technology, Dalian, 64, China ABSTRACT A novel approach is presented to detect doule compressed MP3 audio y frequency viration. With the analysis of doule compression effect on MDCT (Modified Discrete Cosine Transform coefficients in MP3 audio, we propose a simple feature called FVV (frequency viration value to measure the viration caused y doule compression. The experimental results on challenging dataset show that our method outperforms most of the existing methods in doule MP3 compression detection, especially with a second itrate higher than the first one. Besides, we can also estimate the original it-rate for a doule compressed MP3 y this technique. Index Terms MP3, audio forensics, doule compression detection, frequency viration, MDCT coefficients. ITRODUCTIO The past decades witness the fast development of digital and networ technologies, which had een integrated into people s life, and ecome an indispensale part. People are ale to record the information in everyday life with the increasing popularity of moile terminals. And everyone could share the convenience gifted y digital multimedia. However, the authenticity of digital multimedia is difficult to e guaranteed with the occurrence of intelligent editing software, and people can easily tamper the digital multimedia without professional training. As a part of multimedia, MP3 audio is one of the most commonly used audio format, and some methods of authenticity detection [][][3][4] have een proposed in recent years. However, it also faces some challenges and some prolems cannot e solved perfectly. Doule compression is used frequently in the process of tampering in MP3 audios, as the audio must e saved after modifying. Doule compression detection is then put forward, which can assign two inds of issues [5] : Up-transcoding (corresponding to the second compression using a higher quality than the first one and down-transcode (corresponding to the second compression using a lower quality than the first one. Due to the complexity of the MP3 coding process, it is very difficult to detect doule compression of audios in MP3 formats. Yang et al. [6] used the numer of smallvalue MDCT coefficients as features to detect the audio authenticity. It is ased on the oservation that the coefficient distriution is variant etween the fae-quality MP3 and a normal one. Still, in [7], Yang et al. extracted the first 9 ins of quantized MDCT coefficients as features, and put these features into SVM classifier. In particular, gloal distriution, as well as and distriution is also exploited to distinguish the normal MP3 from a doule compressed one. Though this method has an impressive result in detecting an up-transcoded audio, it has a limited performance in detecting a down-transcoded one. M. Qiao et al. extracted statistical features of quantized MDCT coefficients of MP3 audio, and exploited these features in a discriminative model [8][9][5]. However, these methods ased statistical features are limited in application as their high computation complexity. Bianchi et al. [] proposed a method of doule compressed detection considering simulated normal MP3 file, which is achieved y removing a given numer of PCM samples of decompressed audio file and recompressing the remaining samples to the same compression quality of the file. However this method still needs other statistical features to wor together, which is time-consuming. In this paper, we present a novel approach with sincerely respect to detecting doule compression for oth up-transcoded and down-transcoded MP3 audios, and estimate the original it-rate for the first compression. As we now, the ey issue for doule MP3 compression detection is to develop effective features which are discriminative etween oth inds of audios. Previous methods focus on the properties of MDCT coefficients in spatial domain, ut we find that these coefficients in transform domain have etter and more regular distriution. We extract a feature vector called FVV (frequency viration value to measure the viration caused y doule compression, and give a more effective detection. Experimental results show that our method outperforms the state of-the-art method in oth up-transcoding and downtranscoding cases. The rest of the paper is organized as follows. The detailed description of the proposed algorithm is shown in Section ; experiments and discussion are presented in Section 3, followed y conclusion in Section /4/$3. 4 IEEE 45 ChinaSIP 4
2 . PROPOSED ALGORITHM. Analysis of doule MP3 compression As we now, doule MP3 compression contains doule quantization on the MDCT coefficients, which maes the MDCT coefficients different from that of the normal one. The coefficient of a normal MP3 approximately oeys a Laplace distriution []. After the doule compression process, this distriution can t e ensured, and this property mae it possile to distinguish a normal MP3 audio from a doule compressed one. It is not easy to tell whether a coefficient distriution oey a Laplace distriution of a normal map3 audio. Figure shows the coefficient distriution of a normal MP3 and a doule compressed one. The figure demonstrates that the coefficient distriutions of oth audios are nearly the same, though with some minor differences in local. (a. The normal MP3 audio (. Doule compressed MP3 Figure MDCT distriution in transform domain (a normal MP3 ( doule compressed MP3 Figure MDCT coefficient distriution In view of this case, we consider to descrie the coefficient distriution in a transform domain, for the reason that an orthogonal transform (e.g. DFT can re-distriuted the energy, and some good properties occur. We otain two inds of the quantized MDCT coefficients which are respectively a normal and a doule compressed one with Hoffman decoding. Then MDCT coefficient distriution is computed, which is then transformed in a DFT method. We show the coefficient distriution in transform domain in Figure to find out the answer whether they are still discriminatory if looing in transform domain. In Figure, the normal MP3 audio has a smooth distriution in side loe, contrary to the distriution in a doule compressed MP3 audio with apparent viration. So it is possile to detect doule compression utilizing the volatility of the MDCT coefficient in transform domain.. Calculation of frequency viration value As the quantized MDCT coefficients has discrete value, its discrete Laplace distriution can e rewritten as n xa ( exp( ( n is the quantization threshold etween - to. The causal sequence of x a (n can e denoted as: n exp( n x( x a ( n n (3 exp( n Then the DFT of it is as follows: X ( x( W x ( n W n ( n xa ( exp( ( x ( exp( a n a n ( exp( n exp( Here we denote g exp( /, and Eq. (4 can e rewritten as: X ( ( g n exp( (4 After the oservation and analysis, we certify the proposed method through mathematic derivation, and then calculate the feature vector called FVV (frequency viration value to measure the viration. In general, a typical continuous Laplace distriution can e defined y xa t ( t exp( ( g g ( g cos jg sin( g g cos( (5 45
3 It is clear that x ( has a smooth amplitude-frequency curve. While, in a doule compressed audio, the quantized MDCT coefficients distriution is different from Eq. (, i.e. coefficients in high frequency are lost. In other words, quantized MDCT coefficients distriution is cut off in the edge. To simplify analysis, we use the distriution multiplied y an orthogonal window to simulate this process. An orthogonal window can e rewritten as A, t h ( t (6, t Discrete sequence h (t and causal discrete sequence h (t are donated as follows: d A, t h ( (7 d, t h ( A d n d (8 So the distriution after cutting off is as follows x ( x( h( (9 X ( X ( * H ( ( Where * means convolution, H ( is the DFT of h (. H ( h ( W ( h( W h( n W sin( d / cos j sin sin( d / sin( / It is ovious that distriution has viration in side loe. As a result, convolution X ( of X ( and H ( will also has apparent viration in side loe. In conclusion, we can directly use the volatility of the MDCT coefficient in transform domain to judge a doule compressed MP3. We propose T to donate the frequency viration value (FVV, and it is defined y m T ydx y' dx Y ( i Y '( i ( i ( Where y is the MDCT coefficient in frequency domain, y is a fitting line of the curve, m is the numer of fitting, and T is the area formed y the y and y '. Y (i and Y ' ( i are the discrete form of y and y '..3 algorithm pipeline Recognizing the properties of MP3 doule compression, we are going to present our proposed method ased on the frequency viration value. The diagram of the method is shown in Figure 3. The steps of algorithm implementation are as follows: (a Decompress the MP3 audio file to get the quantized MDCT coefficients; ( Transform it y DFT; (c Calculate the FVV; (d Determine doule compression. ote that the parameter Th is only related to the property of normal and doule compressed MP3 files. Its value can e predetermined through experiment with any fixed first itrate and second itrate. Figure 3 The diagram of the detecting method 3. EXPERIMETAL RESULTS AD AALYSIS An audio dataset has een uilt to validate the ideas proposed in previous sections. It contains all 4 audio files, each of which in MSWAVE format and 5s long []. The audio files elong to four different categories: speech alone: containing dialogues; music alone: containing music only; 3 speech-over-music: containing speech with music; 4 environmental sound: the files relative to recording environmental. Each of WAV file has een compressed with it-rate BR chosen in [64, 96, 8, 6, 9] Kit/s. These single compressed MP3 files have een decompressed and compressed again with it-rate BR chosen in [64, 96, 8, 6, 9] Kits/s. 3. Effect of our proposed feature To prove the effect of frequency viration value, we computed the values assumed y the proposed feature, which is shown in Figure 4, where the horizontal axis represents sequence numer of MP3 audio files, and the vertical axis represents the feature proposed. It shows x normal 9ps 96ps-9ps ps-9ps 8ps-9ps 6ps-9ps 9ps-9ps 4ps-9ps 56ps-9ps 3ps-9ps 样本数量 Figure 4 Comparison of the proposed feature 45
4 comparison of the proposed feature etween normal 9Kps MP3 and 8 types of recompressed MP3. ormal 9Kps means normal MP3 with the it-rate 9Kps. 96Kps-9Kps means doule compressed MP3 transcoded from 96Kps to 9Kps and so on The feature of normal MP3 are all near to zero, whereas those of doule compressed MP3 are all lager than zero. By comparing the feature with a threshold, it is possile to discriminate these two inds of files: doule compressed files and normal ones. 3. Doule Compression Detection To prove the effect of proposed method ased on the viration frequency, we set up experiments using different methods. The results are shown in Tales,,3,4, where BR means the first itrate and BR means the second itrate. The Tale Detection accuracy of our method BR vs BR Tale Detection accuracy of [7] BR vs BR Tale 3 Detection accuracy of [5] BR vs BR Tale 4 Detection accuracy of [] BR vs BR The results in tale show that our method is accurate and stale to detect doule compressed MP3 files. In the comparison experimental, we introduce Yang et al. Method [7], Qiao et al. Method [5] and Bianchi et al. Method [], and the results are shown in Tale, 3, 4. Figure 5 shows detection accuracy of different method with BR=6Kps. With BR declining, all of the four methods get worse. But our method still achieves the etter performance. Besides, the proposed wor with only one-dimensional feature. ot only the method solves the prolem of down-transcode much etter, ut also has higher detection accuracy in up-transcode. Accuracy[%] Proposed Yang et al qiao et al Bianchi et al Different compression Figure 5 Detection accuracy of different method with BR=6Kps 3.3 Reveal the Real Bit-Rate We utilize a earest eighor classifier to reveal the real it-rate. Tale 5 shows the confusion matrix of average multi-classification results. R means the real first compression it-rate of doule compressed MP3. E means the estimation of the first it-rate. Tale 5. The estimate result E vs R The estimate result shows that the proposed method could reveal the real it-rate of doule compressed MP3. Similar to the results of doule compression detection, the performance of revealing the real it-rate is etter in the uptranscoded than in down-transcoded. 4. COCLUSIOS In this paper, we present a novel and simple method to detect doule MP3 compression ased on the frequency viration of MDCT coefficients. To estimate the effect of doule MP3 compression on the quantized MDCT coefficients, we ring the frequency viration value and prove its reasonaility. Experimental results show that our method is very effective to detect doule compression than the typical method in the field. Besides, we can also estimate the original it-rate for a doule compressed MP3. However, the detection of down-transcoding is still an issue for more people to loo into it. 453
5 5. REFERECES [] R. Yang, Z. Qu, and J. Huang. Detecting digital audio forgeries y checing frame offsets. In ACM Multimedia and Security Worshop, pages 6, 8. [] Maher R. Audio forensic examination [J]. Signal Processing Magazine, 6(: 84-94,9. [3] Koenig B E, Lacey D S. Forensic authentication of digital audio recordings [J]. Journal of the Audio Engineering Society, 57(9: ,9. [4] Rodríguez D P, Apolinário J A, Biscainho L W P. Audio authenticity: Detecting EF discontinuity with high precision phase analysis [J]. IEEE Transactions on Information Forensics and Security, 5(3: ,. [5] Qiao M, Sung A H, Liu Q. Improved detection of MP3 doule compression using content-independent features [C]. In ICSPCC, 3. [6] Yang R, Shi Y Q, Huang J. Defeating fae-quality MP3 [C]. Proceedings of the th ACM worshop on Multimedia and security. ACM, 7-4, 9. [7] Yang R, Shi Y Q, Huang J. Detecting doule compression of audio signal [C]. International Society for Optics and Photonics,. [8] Liu Q, Sung A H, Qiao M. Detection of doule MP3 compression [J]. Cognitive Computation, (4: 9-96,. [9] Qiao M, Sung A H, Liu Q. Revealing real quality of doule compressed MP3 audio [C]. Proceedings of the international conference on Multimedia,. [] Bianchi T, De Rosa A, Fontani M, et al. Detection and classification of doule compressed MP3 audio tracs [C]. Proceedings of the first ACM worshop on Information hiding and multimedia security, 3. [] Yu R, Lin X, Rahardja S, et al. A statistics study of the MDCT coefficient distriution for audio [C]. In ICME, 4. [] 454
Politecnico di Torino. Porto Institutional Repository
Politecnico di Torino Porto Institutional Repository [Proceeding] Detection and classification of double compressed MP3 audio tracks Original Citation: Tiziano Bianchi;Alessia De Rosa;Marco Fontani;Giovanni
More informationDetection and localization of double compression in MP3 audio tracks
Bianchi et al. EURASIP Journal on Information Security 214, 214:1 http://jis.eurasipjournals.com/content/214/1/1 RESEARCH Detection and localization of double compression in MP3 audio tracks Tiziano Bianchi
More informationIdentifying Compression History of Wave Audio and Its Applications
Identifying Compression History of Wave Audio and Its Applications DA LUO, WEIQI LUO, RUI YANG, Sun Yat-sen University JIWU HUANG, Shenzhen University Audio signal is sometimes stored and/or processed
More informationVoIP Forgery Detection
VoIP Forgery Detection Satish Tummala, Yanxin Liu and Qingzhong Liu Department of Computer Science Sam Houston State University Huntsville, TX, USA Emails: sct137@shsu.edu; yanxin@shsu.edu; liu@shsu.edu
More informationExposing MP3 Audio Forgeries Using Frame Offsets
Exposing MP3 Audio Forgeries Using Frame Offsets RUI YANG, ZHENHUA QU, and JIWU HUANG, Sun Yat-sen University Audio recordings should be authenticated before they are used as evidence. Although audio watermaring
More informationA Novel Approach of Area-Efficient FIR Filter Design Using Distributed Arithmetic with Decomposed LUT
IOSR Journal of Electronics and Communication Engineering (IOSR-JECE) e-issn: 2278-2834,p- ISSN: 2278-8735. Volume 7, Issue 2 (Jul. - Aug. 2013), PP 13-18 A Novel Approach of Area-Efficient FIR Filter
More informationVideo Inter-frame Forgery Identification Based on Optical Flow Consistency
Sensors & Transducers 24 by IFSA Publishing, S. L. http://www.sensorsportal.com Video Inter-frame Forgery Identification Based on Optical Flow Consistency Qi Wang, Zhaohong Li, Zhenzhen Zhang, Qinglong
More informationJPEG Copy Paste Forgery Detection Using BAG Optimized for Complex Images
JPEG Copy Paste Forgery Detection Using BAG Optimized for Complex Images Dessalegn Atnafu AYALNEH*, Hyoung Joong KIM*, Yong Soo CHOI** *CIST (Center for Information Security Technologies), Korea University
More informationThe Watchful Forensic Analyst: Multi-Clue Information Fusion with Background Knowledge
WIFS 13 The Watchful Forensic Analyst: Multi-Clue Information Fusion with Background Knowledge Marco Fontani #, Enrique Argones-Rúa*, Carmela Troncoso*, Mauro Barni # # University of Siena (IT) * GRADIANT:
More informationPerceptual Coding. Lossless vs. lossy compression Perceptual models Selecting info to eliminate Quantization and entropy encoding
Perceptual Coding Lossless vs. lossy compression Perceptual models Selecting info to eliminate Quantization and entropy encoding Part II wrap up 6.082 Fall 2006 Perceptual Coding, Slide 1 Lossless vs.
More informationCHAPTER 6. 6 Huffman Coding Based Image Compression Using Complex Wavelet Transform. 6.3 Wavelet Transform based compression technique 106
CHAPTER 6 6 Huffman Coding Based Image Compression Using Complex Wavelet Transform Page No 6.1 Introduction 103 6.2 Compression Techniques 104 103 6.2.1 Lossless compression 105 6.2.2 Lossy compression
More informationDYADIC WAVELETS AND DCT BASED BLIND COPY-MOVE IMAGE FORGERY DETECTION
DYADIC WAVELETS AND DCT BASED BLIND COPY-MOVE IMAGE FORGERY DETECTION Ghulam Muhammad*,1, Muhammad Hussain 2, Anwar M. Mirza 1, and George Bebis 3 1 Department of Computer Engineering, 2 Department of
More informationDeliverable D6.3 Release of publicly available datasets and software tools
Grant Agreement No. 268478 Deliverable D6.3 Release of publicly available datasets and software tools Lead partner for this deliverable: PoliMI Version: 1.0 Dissemination level: Public April 29, 2013 Contents
More informationUser-Friendly Sharing System using Polynomials with Different Primes in Two Images
User-Friendly Sharing System using Polynomials with Different Primes in Two Images Hung P. Vo Department of Engineering and Technology, Tra Vinh University, No. 16 National Road 53, Tra Vinh City, Tra
More informationPedestrian Detection Using Structured SVM
Pedestrian Detection Using Structured SVM Wonhui Kim Stanford University Department of Electrical Engineering wonhui@stanford.edu Seungmin Lee Stanford University Department of Electrical Engineering smlee729@stanford.edu.
More informationELL 788 Computational Perception & Cognition July November 2015
ELL 788 Computational Perception & Cognition July November 2015 Module 11 Audio Engineering: Perceptual coding Coding and decoding Signal (analog) Encoder Code (Digital) Code (Digital) Decoder Signal (analog)
More informationReal-Time Median Filtering for Embedded Smart Cameras
Real-Time Median Filtering for Emedded Smart Cameras Yong Zhao Brown University Yong Zhao@rown.edu Gariel Tauin Brown University tauin@rown.edu Figure 1: System architecture of our proof-of-concept Visual
More informationData Hiding on Text Using Big-5 Code
Data Hiding on Text Using Big-5 Code Jun-Chou Chuang 1 and Yu-Chen Hu 2 1 Department of Computer Science and Communication Engineering Providence University 200 Chung-Chi Rd., Shalu, Taichung 43301, Republic
More informationDiagonal Principal Component Analysis for Face Recognition
Diagonal Principal Component nalysis for Face Recognition Daoqiang Zhang,2, Zhi-Hua Zhou * and Songcan Chen 2 National Laboratory for Novel Software echnology Nanjing University, Nanjing 20093, China 2
More informationMethods for Identifying Traces of Compression in Audio
Methods for Identifying Traces of Compression in Audio Samet Hicsonmez Computer Engineering Department, TOBB University of Economics and Technology, Ankara, Turkey Email: shicsonmez@etu.edu.tr Erkam Uzun
More informationAdaptive Spatial Steganography Based on the Correlation of Wavelet Coefficients for Digital Images in Spatial Domain Ningbo Li, Pan Feng, Liu Jia
216 International Conference on Information Engineering and Communications Technology (IECT 216) ISBN: 978-1-69-37- Adaptive Spatial Steganography Based on the Correlation of Wavelet Coefficients for Digital
More informationModeling of an MPEG Audio Layer-3 Encoder in Ptolemy
Modeling of an MPEG Audio Layer-3 Encoder in Ptolemy Patrick Brown EE382C Embedded Software Systems May 10, 2000 $EVWUDFW MPEG Audio Layer-3 is a standard for the compression of high-quality digital audio.
More informationDetection of Blue Screen Special Effects in Videos
Available online at www.sciencedirect.com Physics Procedia 33 (2012 ) 1316 1322 2012 International Conference on Medical Physics and Biomedical Engineering Detection of Blue Screen Special Effects in Videos
More informationImage Compression Algorithm and JPEG Standard
International Journal of Scientific and Research Publications, Volume 7, Issue 12, December 2017 150 Image Compression Algorithm and JPEG Standard Suman Kunwar sumn2u@gmail.com Summary. The interest in
More informationRecent Results from Analyzing the Performance of Heuristic Search
Recent Results from Analyzing the Performance of Heuristic Search Teresa M. Breyer and Richard E. Korf Computer Science Department University of California, Los Angeles Los Angeles, CA 90095 {treyer,korf}@cs.ucla.edu
More information15 Data Compression 2014/9/21. Objectives After studying this chapter, the student should be able to: 15-1 LOSSLESS COMPRESSION
15 Data Compression Data compression implies sending or storing a smaller number of bits. Although many methods are used for this purpose, in general these methods can be divided into two broad categories:
More informationImage Transformation Techniques Dr. Rajeev Srivastava Dept. of Computer Engineering, ITBHU, Varanasi
Image Transformation Techniques Dr. Rajeev Srivastava Dept. of Computer Engineering, ITBHU, Varanasi 1. Introduction The choice of a particular transform in a given application depends on the amount of
More informationJPEG IMAGE CODING WITH ADAPTIVE QUANTIZATION
JPEG IMAGE CODING WITH ADAPTIVE QUANTIZATION Julio Pons 1, Miguel Mateo 1, Josep Prades 2, Román Garcia 1 Universidad Politécnica de Valencia Spain 1 {jpons,mimateo,roman}@disca.upv.es 2 jprades@dcom.upv.es
More informationForensic analysis of JPEG image compression
Forensic analysis of JPEG image compression Visual Information Privacy and Protection (VIPP Group) Course on Multimedia Security 2015/2016 Introduction Summary Introduction The JPEG (Joint Photographic
More informationAgus Harjoko Lab. Elektronika dan Instrumentasi, FMIPA, Universitas Gadjah Mada, Yogyakarta, Indonesia
A Comparison Study of the Performance of the Fourier Transform Based Algorithm and the Artificial Neural Network Based Algorithm in Detecting Faric Texture Defect Agus Harjoko La. Elektronika dan Instrumentasi,
More informationReal Time Motion Authoring of a 3D Avatar
Vol.46 (Games and Graphics and 2014), pp.170-174 http://dx.doi.org/10.14257/astl.2014.46.38 Real Time Motion Authoring of a 3D Avatar Harinadha Reddy Chintalapalli and Young-Ho Chai Graduate School of
More informationA Hybrid Approach to News Video Classification with Multi-modal Features
A Hybrid Approach to News Video Classification with Multi-modal Features Peng Wang, Rui Cai and Shi-Qiang Yang Department of Computer Science and Technology, Tsinghua University, Beijing 00084, China Email:
More informationA dynamic background subtraction method for detecting walkers using mobile stereo-camera
A dynamic ackground sutraction method for detecting walkers using moile stereo-camera Masaki Kasahara 1 and Hiroshi Hanaizumi 1 1 Hosei University Graduate School of Computer and Information Sciences Tokyo
More informationImage Tampering Detection
Image Tampering Detection Yun Q. Shi and Patchara Sutthiwan Intelligent Multimedia Lab New Jersey Institute of Technology shi@njit.edu 24 April 2009 A Natural Image Model Approach to Tampering Detection
More informationA NEW DCT-BASED WATERMARKING METHOD FOR COPYRIGHT PROTECTION OF DIGITAL AUDIO
International journal of computer science & information Technology (IJCSIT) Vol., No.5, October A NEW DCT-BASED WATERMARKING METHOD FOR COPYRIGHT PROTECTION OF DIGITAL AUDIO Pranab Kumar Dhar *, Mohammad
More informationFace Recognition Based on LDA and Improved Pairwise-Constrained Multiple Metric Learning Method
Journal of Information Hiding and Multimedia Signal Processing c 2016 ISSN 2073-4212 Ubiquitous International Volume 7, Number 5, September 2016 Face Recognition ased on LDA and Improved Pairwise-Constrained
More informationOCR J276 GCSE Computer Science
Name: Class Teacher: Date: OCR J76 GCSE Computer Science MARK SCHEME.6 DATA REPRESENTATION Content in J76 GCSE Computer Science: 1.1 Systems Architecture 1. Memory 1.3 Storage 1.4 Wireless and Wired Networks
More informationIMPROVING THE RELIABILITY OF DETECTION OF LSB REPLACEMENT STEGANOGRAPHY
IMPROVING THE RELIABILITY OF DETECTION OF LSB REPLACEMENT STEGANOGRAPHY Shreelekshmi R, Wilscy M 2 and C E Veni Madhavan 3 Department of Computer Science & Engineering, College of Engineering, Trivandrum,
More informationUniversity of Mustansiriyah, Baghdad, Iraq
Volume 5, Issue 9, September 2015 ISSN: 2277 128X International Journal of Advanced Research in Computer Science and Software Engineering Research Paper Available online at: www.ijarcsse.com Audio Compression
More informationDFA: Automata where the next state is uniquely given by the current state and the current input character.
Chapter : SCANNING (Lexical Analysis).3 Finite Automata Introduction to Finite Automata Finite automata (finite-state machines) are a mathematical way of descriing particular kinds of algorithms. A strong
More informationSDP Memo 048: Two Dimensional Sparse Fourier Transform Algorithms
SDP Memo 048: Two Dimensional Sparse Fourier Transform Algorithms Document Number......................................................... SDP Memo 048 Document Type.....................................................................
More informationSpatial Enhancement Definition
Spatial Enhancement Nickolas Faust The Electro- Optics, Environment, and Materials Laboratory Georgia Tech Research Institute Georgia Institute of Technology Definition Spectral enhancement relies on changing
More informationFRAME-LEVEL QUALITY AND MEMORY TRAFFIC ALLOCATION FOR LOSSY EMBEDDED COMPRESSION IN VIDEO CODEC SYSTEMS
FRAME-LEVEL QUALITY AD MEMORY TRAFFIC ALLOCATIO FOR LOSSY EMBEDDED COMPRESSIO I VIDEO CODEC SYSTEMS Li Guo, Dajiang Zhou, Shinji Kimura, and Satoshi Goto Graduate School of Information, Production and
More informationThe Analysis and Detection of Double JPEG2000 Compression Based on Statistical Characterization of DWT Coefficients
Available online at www.sciencedirect.com Energy Procedia 17 (2012 ) 623 629 2012 International Conference on Future Electrical Power and Energy Systems The Analysis and Detection of Double JPEG2000 Compression
More informationCODEC INDEPENDENT LOSSY AUDIO COMPRESSION DETECTION. Romain Hennequin Jimena Royo-Letelier Manuel Moussallam
CODEC INDEPENDENT LOSSY AUDIO COMPRESSION DETECTION Romain Hennequin Jimena Royo-Letelier Manuel Moussallam Deezer, 12 rue d Athènes, 75009 Paris, France research@deezer.com ABSTRACT In this paper, we
More informationA Feature Selection Method to Handle Imbalanced Data in Text Classification
A Feature Selection Method to Handle Imbalanced Data in Text Classification Fengxiang Chang 1*, Jun Guo 1, Weiran Xu 1, Kejun Yao 2 1 School of Information and Communication Engineering Beijing University
More informationIMAGE COMPRESSION USING ANTI-FORENSICS METHOD
IMAGE COMPRESSION USING ANTI-FORENSICS METHOD M.S.Sreelakshmi and D. Venkataraman Department of Computer Science and Engineering, Amrita Vishwa Vidyapeetham, Coimbatore, India mssreelakshmi@yahoo.com d_venkat@cb.amrita.edu
More informationTotal Variation Based Forensics for JPEG Compression
International Journal of Research Studies in Science, Engineering and Technology Volume 1, Issue 6, September 2014, PP 8-13 ISSN 2349-4751 (Print) & ISSN 2349-476X (Online) Total Variation Based Forensics
More informationAN ACCELERATED K-MEANS CLUSTERING ALGORITHM FOR IMAGE SEGMENTATION
AN ACCELERATED K-MEANS CLUSTERING ALGORITHM FOR IMAGE SEGMENTATION 1 SEYED MOJTABA TAFAGHOD SADAT ZADEH, 1 ALIREZA MEHRSINA, 2 MINA BASIRAT, 1 Faculty of Computer Science and Information Systems, Universiti
More informationDigital Image Steganography Using Bit Flipping
BULGARIAN ACADEMY OF SCIENCES CYBERNETICS AND INFORMATION TECHNOLOGIES Volume 18, No 1 Sofia 2018 Print ISSN: 1311-9702; Online ISSN: 1314-4081 DOI: 10.2478/cait-2018-0006 Digital Image Steganography Using
More informationA Novel Statistical Distortion Model Based on Mixed Laplacian and Uniform Distribution of Mpeg-4 FGS
A Novel Statistical Distortion Model Based on Mixed Laplacian and Uniform Distribution of Mpeg-4 FGS Xie Li and Wenjun Zhang Institute of Image Communication and Information Processing, Shanghai Jiaotong
More informationA New Approach to Compressed Image Steganography Using Wavelet Transform
IOSR Journal of Computer Engineering (IOSR-JCE) e-issn: 2278-0661,p-ISSN: 2278-8727, Volume 17, Issue 5, Ver. III (Sep. Oct. 2015), PP 53-59 www.iosrjournals.org A New Approach to Compressed Image Steganography
More informationReversible Wavelets for Embedded Image Compression. Sri Rama Prasanna Pavani Electrical and Computer Engineering, CU Boulder
Reversible Wavelets for Embedded Image Compression Sri Rama Prasanna Pavani Electrical and Computer Engineering, CU Boulder pavani@colorado.edu APPM 7400 - Wavelets and Imaging Prof. Gregory Beylkin -
More informationTypes of Edges. Why Edge Detection? Types of Edges. Edge Detection. Gradient. Edge Detection
Why Edge Detection? How can an algorithm extract relevant information from an image that is enables the algorithm to recognize objects? The most important information for the interpretation of an image
More informationPrinciples of Audio Coding
Principles of Audio Coding Topics today Introduction VOCODERS Psychoacoustics Equal-Loudness Curve Frequency Masking Temporal Masking (CSIT 410) 2 Introduction Speech compression algorithm focuses on exploiting
More informationDetection of Montage in Lossy Compressed Digital Audio Recordings
ARCHIVES OF ACOUSTICS Vol.39,No.1, pp.65 72(2014) Copyright c 2014byPAN IPPT DOI: 10.2478/aoa-2014-0007 Detection of Montage in Lossy Compressed Digital Audio Recordings Rafał KORYCKI Institute of Radioelectronics,
More informationBinary Decision Tree Using Genetic Algorithm for Recognizing Defect Patterns of Cold Mill Strip
Binary Decision Tree Using Genetic Algorithm for Recognizing Defect Patterns of Cold Mill Strip Kyoung Min Kim 1,4, Joong Jo Park, Myung Hyun Song 3, In Cheol Kim 1, and Ching Y. Suen 1 1 Centre for Pattern
More informationTowards a Fast and Reliable Software Implementation of SLI-FLP Hybrid Computer Arithmetic
Proceedings of the 6th WSEAS Int. Conf. on Systems Theory & Scientific Computation, Elounda, Greece, August 2-23, 2006 (pp0-08) Towards a Fast and Reliale Software Implementation of SLI-FLP Hyrid Computer
More information/06/$20.00 c 2006 IEEE I. INTRODUCTION
Scalale Router Memory Architecture Based on Interleaved DRAM Feng Wang and Mounir Hamdi Computer Science Department of The Hong Kong University of Science and Technology {fwang, hamdi}@cs.ust.hk Astract
More informationA Method for Large-Scale IPTV Quality Estimation
016 International Conference on Artificial Intelligence: Techniques and Applications (AITA 016) ISBN: 978-1-60595-389- A Method for Large-Scale IPTV Quality Estimation Xiao-tong QIU 1, Li-sheng HUANG,
More informationPERFORMANCE ANALYSIS OF INTEGER DCT OF DIFFERENT BLOCK SIZES USED IN H.264, AVS CHINA AND WMV9.
EE 5359: MULTIMEDIA PROCESSING PROJECT PERFORMANCE ANALYSIS OF INTEGER DCT OF DIFFERENT BLOCK SIZES USED IN H.264, AVS CHINA AND WMV9. Guided by Dr. K.R. Rao Presented by: Suvinda Mudigere Srikantaiah
More informationResearch Article Improvements in Geometry-Based Secret Image Sharing Approach with Steganography
Hindawi Publishing Corporation Mathematical Problems in Engineering Volume 2009, Article ID 187874, 11 pages doi:10.1155/2009/187874 Research Article Improvements in Geometry-Based Secret Image Sharing
More informationA Parallel Reconfigurable Architecture for DCT of Lengths N=32/16/8
Page20 A Parallel Reconfigurable Architecture for DCT of Lengths N=32/16/8 ABSTRACT: Parthiban K G* & Sabin.A.B ** * Professor, M.P. Nachimuthu M. Jaganathan Engineering College, Erode, India ** PG Scholar,
More informationAbstract. Keywords: Genetic Algorithm, Mean Square Error, Peak Signal to noise Ratio, Image fidelity. 1. Introduction
A Report on Genetic Algorithm based Steganography for Image Authentication by Amrita Khamrui Enrolled Scholar Department of Computer Science & Engineering, Kalyani University Prof. (Dr.) J K Mandal Professor
More informationFig. 1: The perceptual audio coding procedure and three main embedding domains.
1 Spec-ResNet: A General Audio Steganalysis Scheme based on a Deep Residual Network for Spectrograms Yanzhen Ren, Member, IEEE, Dengkai Liu, Qiaochu Xiong, Jianming Fu, and Lina Wang arxiv:191.6838v2 [cs.mm]
More informationA Novel Multi-Frame Color Images Super-Resolution Framework based on Deep Convolutional Neural Network. Zhe Li, Shu Li, Jianmin Wang and Hongyang Wang
5th International Conference on Measurement, Instrumentation and Automation (ICMIA 2016) A Novel Multi-Frame Color Images Super-Resolution Framewor based on Deep Convolutional Neural Networ Zhe Li, Shu
More informationA Fast Personal Palm print Authentication based on 3D-Multi Wavelet Transformation
A Fast Personal Palm print Authentication based on 3D-Multi Wavelet Transformation * A. H. M. Al-Helali, * W. A. Mahmmoud, and * H. A. Ali * Al- Isra Private University Email: adnan_hadi@yahoo.com Abstract:
More information5: Music Compression. Music Coding. Mark Handley
5: Music Compression Mark Handley Music Coding LPC-based codecs model the sound source to achieve good compression. Works well for voice. Terrible for music. What if you can t model the source? Model the
More informationIntroduction to Machine Learning Spring 2018 Note Sparsity and LASSO. 1.1 Sparsity for SVMs
CS 189 Introduction to Machine Learning Spring 2018 Note 21 1 Sparsity and LASSO 1.1 Sparsity for SVMs Recall the oective function of the soft-margin SVM prolem: w,ξ 1 2 w 2 + C Note that if a point x
More informationLinear Discriminant Analysis for 3D Face Recognition System
Linear Discriminant Analysis for 3D Face Recognition System 3.1 Introduction Face recognition and verification have been at the top of the research agenda of the computer vision community in recent times.
More information(JBE Vol. 23, No. 6, November 2018) Detection of Frame Deletion Using Convolutional Neural Network. Abstract
(JBE Vol. 23, No. 6, November 2018) (Regular Paper) 23 6, 2018 11 (JBE Vol. 23, No. 6, November 2018) https://doi.org/10.5909/jbe.2018.23.6.886 ISSN 2287-9137 (Online) ISSN 1226-7953 (Print) CNN a), a),
More informationCONTENT ADAPTIVE SCREEN IMAGE SCALING
CONTENT ADAPTIVE SCREEN IMAGE SCALING Yao Zhai (*), Qifei Wang, Yan Lu, Shipeng Li University of Science and Technology of China, Hefei, Anhui, 37, China Microsoft Research, Beijing, 8, China ABSTRACT
More informationA A A. Fig.1 image patch. Then the edge gradient magnitude is . (1)
International Conference on Information Science and Computer Applications (ISCA 013) Two-Dimensional Barcode Image Super-Resolution Reconstruction Via Sparse Representation Gaosheng Yang 1,Ningzhong Liu
More informationAggregating Descriptors with Local Gaussian Metrics
Aggregating Descriptors with Local Gaussian Metrics Hideki Nakayama Grad. School of Information Science and Technology The University of Tokyo Tokyo, JAPAN nakayama@ci.i.u-tokyo.ac.jp Abstract Recently,
More informationA Novel Secure Digital Watermark Generation from Public Share by Using Visual Cryptography and MAC Techniques
Bashar S. Mahdi Alia K. Abdul Hassan Department of Computer Science, University of Technology, Baghdad, Iraq A Novel Secure Digital Watermark Generation from Public Share by Using Visual Cryptography and
More informationA Blind Steganalysis on JPEG Gray Level Image Based on Statistical Features and its Performance Analysis
International Journal of Engineering Research and Development e-issn: 2278-067X, p-issn: 2278-800X, www.ijerd.com Volume 11, Issue 09 (September 2015), PP.27-31 A Blind Steganalysis on JPEG Gray Level
More information4. Image Retrieval using Transformed Image Content
4. Image Retrieval using Transformed Image Content The desire of better and faster retrieval techniques has always fuelled to the research in content based image retrieval (CBIR). A class of unitary matrices
More informationApplication of Daubechies Wavelets for Image Compression
Application of Daubechies Wavelets for Image Compression Heydari. Aghile 1,*, Naseri.Roghaye 2 1 Department of Math., Payame Noor University, Mashad, IRAN, Email Address a_heidari@pnu.ac.ir, Funded by
More informationPerceptual coding. A psychoacoustic model is used to identify those signals that are influenced by both these effects.
Perceptual coding Both LPC and CELP are used primarily for telephony applications and hence the compression of a speech signal. Perceptual encoders, however, have been designed for the compression of general
More informationEffects of the Horizontal Projection on the Distribution of the Façade Temperature
International Conference on Advances in Energy and Environmental Science (ICAEES 2015) Effects of the Horizontal Projection on the Distriution of the Façade Temperature Jiajia Fu1, a *, Yinqing i1, and
More informationLearning to Match. Jun Xu, Zhengdong Lu, Tianqi Chen, Hang Li
Learning to Match Jun Xu, Zhengdong Lu, Tianqi Chen, Hang Li 1. Introduction The main tasks in many applications can be formalized as matching between heterogeneous objects, including search, recommendation,
More informationA New Spatial q-log Domain for Image Watermarking
1 Ta Minh Thanh, 2 Pham Thanh Hiep, 3 Ta Minh Tam 1 Department of Network Security, Le Quy Don Technical University, 100 Hoang Quoc Viet, Cau Giay, Hanoi, Vietnam. E-mail: taminhjp@gmail.com 2 Le Quy Don
More informationForensic Image Recognition using a Novel Image Fingerprinting and Hashing Technique
Forensic Image Recognition using a Novel Image Fingerprinting and Hashing Technique R D Neal, R J Shaw and A S Atkins Faculty of Computing, Engineering and Technology, Staffordshire University, Stafford
More informationIndex. 1. Motivation 2. Background 3. JPEG Compression The Discrete Cosine Transformation Quantization Coding 4. MPEG 5.
Index 1. Motivation 2. Background 3. JPEG Compression The Discrete Cosine Transformation Quantization Coding 4. MPEG 5. Literature Lossy Compression Motivation To meet a given target bit-rate for storage
More informationChapter 1. Digital Data Representation and Communication. Part 2
Chapter 1. Digital Data Representation and Communication Part 2 Compression Digital media files are usually very large, and they need to be made smaller compressed Without compression Won t have storage
More informationVS1063 ENCODER DEMONSTRATION
PRELIMINARY DOCUMENT VS1063 ENCODER DEMONSTRATION VLSI Solution Audio Decoder Project Code: Project Name: All information in this document is provided as-is without warranty. Features are subject to change
More informationFusion Method of Fingerprint Quality Evaluation: From the Local Gabor Feature to the Global Spatial-Frequency Structures
Fusion Method of Fingerprint Quality Evaluation: From the Local abor Feature to the lobal Spatial-Frequency Structures Decong Yu, Lihong Ma,, Hanqing Lu, and Zhiqing Chen 3 D Key Lab. of Computer Networ,
More informationComparison of Digital Image Watermarking Algorithms. Xu Zhou Colorado School of Mines December 1, 2014
Comparison of Digital Image Watermarking Algorithms Xu Zhou Colorado School of Mines December 1, 2014 Outlier Introduction Background on digital image watermarking Comparison of several algorithms Experimental
More informationIEEE TRANSACTIONS ON IMAGE PROCESSING, VOL. 24, NO. 3, MARCH
IEEE TRANSACTIONS ON IMAGE PROCESSING, VOL. 24, NO. 3, MARCH 215 187 On Antiforensic Concealability With Rate-Distortion Tradeoff Xiaoyu Chu, Student Member, IEEE, Matthew Christopher Stamm, Member, IEEE,
More informationCIS UDEL Working Notes on ImageCLEF 2015: Compound figure detection task
CIS UDEL Working Notes on ImageCLEF 2015: Compound figure detection task Xiaolong Wang, Xiangying Jiang, Abhishek Kolagunda, Hagit Shatkay and Chandra Kambhamettu Department of Computer and Information
More informationAn Error-Based Statistical Feature Extraction Scheme for Double JPEG Compression Detection
An Error-Based Statistical Feature Extraction Scheme for Double JPEG Compression Detection Nivi Varghese 1, Charlse M Varghese 2 1, 2 Department of Computer Science and Engineering, KMP College of Engineering,
More informationLRLW-LSI: An Improved Latent Semantic Indexing (LSI) Text Classifier
LRLW-LSI: An Improved Latent Semantic Indexing (LSI) Text Classifier Wang Ding, Songnian Yu, Shanqing Yu, Wei Wei, and Qianfeng Wang School of Computer Engineering and Science, Shanghai University, 200072
More informationBoth LPC and CELP are used primarily for telephony applications and hence the compression of a speech signal.
Perceptual coding Both LPC and CELP are used primarily for telephony applications and hence the compression of a speech signal. Perceptual encoders, however, have been designed for the compression of general
More informationError Protection of Wavelet Coded Images Using Residual Source Redundancy
Error Protection of Wavelet Coded Images Using Residual Source Redundancy P. Greg Sherwood and Kenneth Zeger University of California San Diego 95 Gilman Dr MC 47 La Jolla, CA 9293 sherwood,zeger @code.ucsd.edu
More informationForensics of High-Quality JPEG Images with Color Subsampling
MÜNSTER Forensics of High-Quality JPEG Images with Color Subsampling Matthias Carnein Pascal Schöttle Rainer Böhme 19th November 2015 Introduction uncompressed Q = 15 Q = 100 Block convergence analysis
More informationSEG Houston 2009 International Exposition and Annual Meeting
Yu Geng* 1, Ru-Shan Wu and Jinghuai Gao 2 Modeling and Imaging Laboratory, IGPP, University of California, Santa Cruz, CA 95064 Summary Local cosine/sine basis is a localized version of cosine/sine basis
More informationFast Computation of the Gabor Wavelet Transform
DICTA2002: Digital Image Computing Techniques and Applications, 21 22 January 2002, Melourne, Australia 1 Fast Computation of the Gaor Wavelet Transform Gareth Loy Department of Systems Engineering Research
More informationChapter 11 Image Processing
Chapter Image Processing Low-level Image Processing Operates directly on a stored image to improve or enhance it. Stored image consists of a two-dimensional array of pixels (picture elements): Origin (0,
More informationSTEGANOGRAPHY is the technique that conceals secret. Spec-ResNet: A General Audio Steganalysis scheme based on Deep Residual Network of Spectrogram
1 Spec-ResNet: A General Audio Steganalysis scheme based on Deep Residual Network of Spectrogram Yanzhen Ren, Member, IEEE, Dengkai Liu, Qiaochu Xiong, Jianming Fu, and Lina Wang arxiv:191.6838v1 [cs.mm]
More informationThree Dimensional Motion Vectorless Compression
384 IJCSNS International Journal of Computer Science and Network Security, VOL.9 No.4, April 9 Three Dimensional Motion Vectorless Compression Rohini Nagapadma and Narasimha Kaulgud* Department of E &
More information