EXPOSING THE DOUBLE COMPRESSION IN MP3 AUDIO BY FREQUENCY VIBRATION. Tianzhuo Wang, Xiangwei Kong, Yanqing Guo, Bo Wang

Size: px
Start display at page:

Download "EXPOSING THE DOUBLE COMPRESSION IN MP3 AUDIO BY FREQUENCY VIBRATION. Tianzhuo Wang, Xiangwei Kong, Yanqing Guo, Bo Wang"

Transcription

1 EXPOSIG THE DOUBLE COMPRESSIO I MP3 AUDIO BY FREQUECY VIBRATIO Tianzhuo Wang, Xiangwei Kong, Yanqing Guo, Bo Wang School of Information and Communication Engineering Dalian University of Technology, Dalian, 64, China ABSTRACT A novel approach is presented to detect doule compressed MP3 audio y frequency viration. With the analysis of doule compression effect on MDCT (Modified Discrete Cosine Transform coefficients in MP3 audio, we propose a simple feature called FVV (frequency viration value to measure the viration caused y doule compression. The experimental results on challenging dataset show that our method outperforms most of the existing methods in doule MP3 compression detection, especially with a second itrate higher than the first one. Besides, we can also estimate the original it-rate for a doule compressed MP3 y this technique. Index Terms MP3, audio forensics, doule compression detection, frequency viration, MDCT coefficients. ITRODUCTIO The past decades witness the fast development of digital and networ technologies, which had een integrated into people s life, and ecome an indispensale part. People are ale to record the information in everyday life with the increasing popularity of moile terminals. And everyone could share the convenience gifted y digital multimedia. However, the authenticity of digital multimedia is difficult to e guaranteed with the occurrence of intelligent editing software, and people can easily tamper the digital multimedia without professional training. As a part of multimedia, MP3 audio is one of the most commonly used audio format, and some methods of authenticity detection [][][3][4] have een proposed in recent years. However, it also faces some challenges and some prolems cannot e solved perfectly. Doule compression is used frequently in the process of tampering in MP3 audios, as the audio must e saved after modifying. Doule compression detection is then put forward, which can assign two inds of issues [5] : Up-transcoding (corresponding to the second compression using a higher quality than the first one and down-transcode (corresponding to the second compression using a lower quality than the first one. Due to the complexity of the MP3 coding process, it is very difficult to detect doule compression of audios in MP3 formats. Yang et al. [6] used the numer of smallvalue MDCT coefficients as features to detect the audio authenticity. It is ased on the oservation that the coefficient distriution is variant etween the fae-quality MP3 and a normal one. Still, in [7], Yang et al. extracted the first 9 ins of quantized MDCT coefficients as features, and put these features into SVM classifier. In particular, gloal distriution, as well as and distriution is also exploited to distinguish the normal MP3 from a doule compressed one. Though this method has an impressive result in detecting an up-transcoded audio, it has a limited performance in detecting a down-transcoded one. M. Qiao et al. extracted statistical features of quantized MDCT coefficients of MP3 audio, and exploited these features in a discriminative model [8][9][5]. However, these methods ased statistical features are limited in application as their high computation complexity. Bianchi et al. [] proposed a method of doule compressed detection considering simulated normal MP3 file, which is achieved y removing a given numer of PCM samples of decompressed audio file and recompressing the remaining samples to the same compression quality of the file. However this method still needs other statistical features to wor together, which is time-consuming. In this paper, we present a novel approach with sincerely respect to detecting doule compression for oth up-transcoded and down-transcoded MP3 audios, and estimate the original it-rate for the first compression. As we now, the ey issue for doule MP3 compression detection is to develop effective features which are discriminative etween oth inds of audios. Previous methods focus on the properties of MDCT coefficients in spatial domain, ut we find that these coefficients in transform domain have etter and more regular distriution. We extract a feature vector called FVV (frequency viration value to measure the viration caused y doule compression, and give a more effective detection. Experimental results show that our method outperforms the state of-the-art method in oth up-transcoding and downtranscoding cases. The rest of the paper is organized as follows. The detailed description of the proposed algorithm is shown in Section ; experiments and discussion are presented in Section 3, followed y conclusion in Section /4/$3. 4 IEEE 45 ChinaSIP 4

2 . PROPOSED ALGORITHM. Analysis of doule MP3 compression As we now, doule MP3 compression contains doule quantization on the MDCT coefficients, which maes the MDCT coefficients different from that of the normal one. The coefficient of a normal MP3 approximately oeys a Laplace distriution []. After the doule compression process, this distriution can t e ensured, and this property mae it possile to distinguish a normal MP3 audio from a doule compressed one. It is not easy to tell whether a coefficient distriution oey a Laplace distriution of a normal map3 audio. Figure shows the coefficient distriution of a normal MP3 and a doule compressed one. The figure demonstrates that the coefficient distriutions of oth audios are nearly the same, though with some minor differences in local. (a. The normal MP3 audio (. Doule compressed MP3 Figure MDCT distriution in transform domain (a normal MP3 ( doule compressed MP3 Figure MDCT coefficient distriution In view of this case, we consider to descrie the coefficient distriution in a transform domain, for the reason that an orthogonal transform (e.g. DFT can re-distriuted the energy, and some good properties occur. We otain two inds of the quantized MDCT coefficients which are respectively a normal and a doule compressed one with Hoffman decoding. Then MDCT coefficient distriution is computed, which is then transformed in a DFT method. We show the coefficient distriution in transform domain in Figure to find out the answer whether they are still discriminatory if looing in transform domain. In Figure, the normal MP3 audio has a smooth distriution in side loe, contrary to the distriution in a doule compressed MP3 audio with apparent viration. So it is possile to detect doule compression utilizing the volatility of the MDCT coefficient in transform domain.. Calculation of frequency viration value As the quantized MDCT coefficients has discrete value, its discrete Laplace distriution can e rewritten as n xa ( exp( ( n is the quantization threshold etween - to. The causal sequence of x a (n can e denoted as: n exp( n x( x a ( n n (3 exp( n Then the DFT of it is as follows: X ( x( W x ( n W n ( n xa ( exp( ( x ( exp( a n a n ( exp( n exp( Here we denote g exp( /, and Eq. (4 can e rewritten as: X ( ( g n exp( (4 After the oservation and analysis, we certify the proposed method through mathematic derivation, and then calculate the feature vector called FVV (frequency viration value to measure the viration. In general, a typical continuous Laplace distriution can e defined y xa t ( t exp( ( g g ( g cos jg sin( g g cos( (5 45

3 It is clear that x ( has a smooth amplitude-frequency curve. While, in a doule compressed audio, the quantized MDCT coefficients distriution is different from Eq. (, i.e. coefficients in high frequency are lost. In other words, quantized MDCT coefficients distriution is cut off in the edge. To simplify analysis, we use the distriution multiplied y an orthogonal window to simulate this process. An orthogonal window can e rewritten as A, t h ( t (6, t Discrete sequence h (t and causal discrete sequence h (t are donated as follows: d A, t h ( (7 d, t h ( A d n d (8 So the distriution after cutting off is as follows x ( x( h( (9 X ( X ( * H ( ( Where * means convolution, H ( is the DFT of h (. H ( h ( W ( h( W h( n W sin( d / cos j sin sin( d / sin( / It is ovious that distriution has viration in side loe. As a result, convolution X ( of X ( and H ( will also has apparent viration in side loe. In conclusion, we can directly use the volatility of the MDCT coefficient in transform domain to judge a doule compressed MP3. We propose T to donate the frequency viration value (FVV, and it is defined y m T ydx y' dx Y ( i Y '( i ( i ( Where y is the MDCT coefficient in frequency domain, y is a fitting line of the curve, m is the numer of fitting, and T is the area formed y the y and y '. Y (i and Y ' ( i are the discrete form of y and y '..3 algorithm pipeline Recognizing the properties of MP3 doule compression, we are going to present our proposed method ased on the frequency viration value. The diagram of the method is shown in Figure 3. The steps of algorithm implementation are as follows: (a Decompress the MP3 audio file to get the quantized MDCT coefficients; ( Transform it y DFT; (c Calculate the FVV; (d Determine doule compression. ote that the parameter Th is only related to the property of normal and doule compressed MP3 files. Its value can e predetermined through experiment with any fixed first itrate and second itrate. Figure 3 The diagram of the detecting method 3. EXPERIMETAL RESULTS AD AALYSIS An audio dataset has een uilt to validate the ideas proposed in previous sections. It contains all 4 audio files, each of which in MSWAVE format and 5s long []. The audio files elong to four different categories: speech alone: containing dialogues; music alone: containing music only; 3 speech-over-music: containing speech with music; 4 environmental sound: the files relative to recording environmental. Each of WAV file has een compressed with it-rate BR chosen in [64, 96, 8, 6, 9] Kit/s. These single compressed MP3 files have een decompressed and compressed again with it-rate BR chosen in [64, 96, 8, 6, 9] Kits/s. 3. Effect of our proposed feature To prove the effect of frequency viration value, we computed the values assumed y the proposed feature, which is shown in Figure 4, where the horizontal axis represents sequence numer of MP3 audio files, and the vertical axis represents the feature proposed. It shows x normal 9ps 96ps-9ps ps-9ps 8ps-9ps 6ps-9ps 9ps-9ps 4ps-9ps 56ps-9ps 3ps-9ps 样本数量 Figure 4 Comparison of the proposed feature 45

4 comparison of the proposed feature etween normal 9Kps MP3 and 8 types of recompressed MP3. ormal 9Kps means normal MP3 with the it-rate 9Kps. 96Kps-9Kps means doule compressed MP3 transcoded from 96Kps to 9Kps and so on The feature of normal MP3 are all near to zero, whereas those of doule compressed MP3 are all lager than zero. By comparing the feature with a threshold, it is possile to discriminate these two inds of files: doule compressed files and normal ones. 3. Doule Compression Detection To prove the effect of proposed method ased on the viration frequency, we set up experiments using different methods. The results are shown in Tales,,3,4, where BR means the first itrate and BR means the second itrate. The Tale Detection accuracy of our method BR vs BR Tale Detection accuracy of [7] BR vs BR Tale 3 Detection accuracy of [5] BR vs BR Tale 4 Detection accuracy of [] BR vs BR The results in tale show that our method is accurate and stale to detect doule compressed MP3 files. In the comparison experimental, we introduce Yang et al. Method [7], Qiao et al. Method [5] and Bianchi et al. Method [], and the results are shown in Tale, 3, 4. Figure 5 shows detection accuracy of different method with BR=6Kps. With BR declining, all of the four methods get worse. But our method still achieves the etter performance. Besides, the proposed wor with only one-dimensional feature. ot only the method solves the prolem of down-transcode much etter, ut also has higher detection accuracy in up-transcode. Accuracy[%] Proposed Yang et al qiao et al Bianchi et al Different compression Figure 5 Detection accuracy of different method with BR=6Kps 3.3 Reveal the Real Bit-Rate We utilize a earest eighor classifier to reveal the real it-rate. Tale 5 shows the confusion matrix of average multi-classification results. R means the real first compression it-rate of doule compressed MP3. E means the estimation of the first it-rate. Tale 5. The estimate result E vs R The estimate result shows that the proposed method could reveal the real it-rate of doule compressed MP3. Similar to the results of doule compression detection, the performance of revealing the real it-rate is etter in the uptranscoded than in down-transcoded. 4. COCLUSIOS In this paper, we present a novel and simple method to detect doule MP3 compression ased on the frequency viration of MDCT coefficients. To estimate the effect of doule MP3 compression on the quantized MDCT coefficients, we ring the frequency viration value and prove its reasonaility. Experimental results show that our method is very effective to detect doule compression than the typical method in the field. Besides, we can also estimate the original it-rate for a doule compressed MP3. However, the detection of down-transcoding is still an issue for more people to loo into it. 453

5 5. REFERECES [] R. Yang, Z. Qu, and J. Huang. Detecting digital audio forgeries y checing frame offsets. In ACM Multimedia and Security Worshop, pages 6, 8. [] Maher R. Audio forensic examination [J]. Signal Processing Magazine, 6(: 84-94,9. [3] Koenig B E, Lacey D S. Forensic authentication of digital audio recordings [J]. Journal of the Audio Engineering Society, 57(9: ,9. [4] Rodríguez D P, Apolinário J A, Biscainho L W P. Audio authenticity: Detecting EF discontinuity with high precision phase analysis [J]. IEEE Transactions on Information Forensics and Security, 5(3: ,. [5] Qiao M, Sung A H, Liu Q. Improved detection of MP3 doule compression using content-independent features [C]. In ICSPCC, 3. [6] Yang R, Shi Y Q, Huang J. Defeating fae-quality MP3 [C]. Proceedings of the th ACM worshop on Multimedia and security. ACM, 7-4, 9. [7] Yang R, Shi Y Q, Huang J. Detecting doule compression of audio signal [C]. International Society for Optics and Photonics,. [8] Liu Q, Sung A H, Qiao M. Detection of doule MP3 compression [J]. Cognitive Computation, (4: 9-96,. [9] Qiao M, Sung A H, Liu Q. Revealing real quality of doule compressed MP3 audio [C]. Proceedings of the international conference on Multimedia,. [] Bianchi T, De Rosa A, Fontani M, et al. Detection and classification of doule compressed MP3 audio tracs [C]. Proceedings of the first ACM worshop on Information hiding and multimedia security, 3. [] Yu R, Lin X, Rahardja S, et al. A statistics study of the MDCT coefficient distriution for audio [C]. In ICME, 4. [] 454

Politecnico di Torino. Porto Institutional Repository

Politecnico di Torino. Porto Institutional Repository Politecnico di Torino Porto Institutional Repository [Proceeding] Detection and classification of double compressed MP3 audio tracks Original Citation: Tiziano Bianchi;Alessia De Rosa;Marco Fontani;Giovanni

More information

Detection and localization of double compression in MP3 audio tracks

Detection and localization of double compression in MP3 audio tracks Bianchi et al. EURASIP Journal on Information Security 214, 214:1 http://jis.eurasipjournals.com/content/214/1/1 RESEARCH Detection and localization of double compression in MP3 audio tracks Tiziano Bianchi

More information

Identifying Compression History of Wave Audio and Its Applications

Identifying Compression History of Wave Audio and Its Applications Identifying Compression History of Wave Audio and Its Applications DA LUO, WEIQI LUO, RUI YANG, Sun Yat-sen University JIWU HUANG, Shenzhen University Audio signal is sometimes stored and/or processed

More information

VoIP Forgery Detection

VoIP Forgery Detection VoIP Forgery Detection Satish Tummala, Yanxin Liu and Qingzhong Liu Department of Computer Science Sam Houston State University Huntsville, TX, USA Emails: sct137@shsu.edu; yanxin@shsu.edu; liu@shsu.edu

More information

Exposing MP3 Audio Forgeries Using Frame Offsets

Exposing MP3 Audio Forgeries Using Frame Offsets Exposing MP3 Audio Forgeries Using Frame Offsets RUI YANG, ZHENHUA QU, and JIWU HUANG, Sun Yat-sen University Audio recordings should be authenticated before they are used as evidence. Although audio watermaring

More information

A Novel Approach of Area-Efficient FIR Filter Design Using Distributed Arithmetic with Decomposed LUT

A Novel Approach of Area-Efficient FIR Filter Design Using Distributed Arithmetic with Decomposed LUT IOSR Journal of Electronics and Communication Engineering (IOSR-JECE) e-issn: 2278-2834,p- ISSN: 2278-8735. Volume 7, Issue 2 (Jul. - Aug. 2013), PP 13-18 A Novel Approach of Area-Efficient FIR Filter

More information

Video Inter-frame Forgery Identification Based on Optical Flow Consistency

Video Inter-frame Forgery Identification Based on Optical Flow Consistency Sensors & Transducers 24 by IFSA Publishing, S. L. http://www.sensorsportal.com Video Inter-frame Forgery Identification Based on Optical Flow Consistency Qi Wang, Zhaohong Li, Zhenzhen Zhang, Qinglong

More information

JPEG Copy Paste Forgery Detection Using BAG Optimized for Complex Images

JPEG Copy Paste Forgery Detection Using BAG Optimized for Complex Images JPEG Copy Paste Forgery Detection Using BAG Optimized for Complex Images Dessalegn Atnafu AYALNEH*, Hyoung Joong KIM*, Yong Soo CHOI** *CIST (Center for Information Security Technologies), Korea University

More information

The Watchful Forensic Analyst: Multi-Clue Information Fusion with Background Knowledge

The Watchful Forensic Analyst: Multi-Clue Information Fusion with Background Knowledge WIFS 13 The Watchful Forensic Analyst: Multi-Clue Information Fusion with Background Knowledge Marco Fontani #, Enrique Argones-Rúa*, Carmela Troncoso*, Mauro Barni # # University of Siena (IT) * GRADIANT:

More information

Perceptual Coding. Lossless vs. lossy compression Perceptual models Selecting info to eliminate Quantization and entropy encoding

Perceptual Coding. Lossless vs. lossy compression Perceptual models Selecting info to eliminate Quantization and entropy encoding Perceptual Coding Lossless vs. lossy compression Perceptual models Selecting info to eliminate Quantization and entropy encoding Part II wrap up 6.082 Fall 2006 Perceptual Coding, Slide 1 Lossless vs.

More information

CHAPTER 6. 6 Huffman Coding Based Image Compression Using Complex Wavelet Transform. 6.3 Wavelet Transform based compression technique 106

CHAPTER 6. 6 Huffman Coding Based Image Compression Using Complex Wavelet Transform. 6.3 Wavelet Transform based compression technique 106 CHAPTER 6 6 Huffman Coding Based Image Compression Using Complex Wavelet Transform Page No 6.1 Introduction 103 6.2 Compression Techniques 104 103 6.2.1 Lossless compression 105 6.2.2 Lossy compression

More information

DYADIC WAVELETS AND DCT BASED BLIND COPY-MOVE IMAGE FORGERY DETECTION

DYADIC WAVELETS AND DCT BASED BLIND COPY-MOVE IMAGE FORGERY DETECTION DYADIC WAVELETS AND DCT BASED BLIND COPY-MOVE IMAGE FORGERY DETECTION Ghulam Muhammad*,1, Muhammad Hussain 2, Anwar M. Mirza 1, and George Bebis 3 1 Department of Computer Engineering, 2 Department of

More information

Deliverable D6.3 Release of publicly available datasets and software tools

Deliverable D6.3 Release of publicly available datasets and software tools Grant Agreement No. 268478 Deliverable D6.3 Release of publicly available datasets and software tools Lead partner for this deliverable: PoliMI Version: 1.0 Dissemination level: Public April 29, 2013 Contents

More information

User-Friendly Sharing System using Polynomials with Different Primes in Two Images

User-Friendly Sharing System using Polynomials with Different Primes in Two Images User-Friendly Sharing System using Polynomials with Different Primes in Two Images Hung P. Vo Department of Engineering and Technology, Tra Vinh University, No. 16 National Road 53, Tra Vinh City, Tra

More information

Pedestrian Detection Using Structured SVM

Pedestrian Detection Using Structured SVM Pedestrian Detection Using Structured SVM Wonhui Kim Stanford University Department of Electrical Engineering wonhui@stanford.edu Seungmin Lee Stanford University Department of Electrical Engineering smlee729@stanford.edu.

More information

ELL 788 Computational Perception & Cognition July November 2015

ELL 788 Computational Perception & Cognition July November 2015 ELL 788 Computational Perception & Cognition July November 2015 Module 11 Audio Engineering: Perceptual coding Coding and decoding Signal (analog) Encoder Code (Digital) Code (Digital) Decoder Signal (analog)

More information

Real-Time Median Filtering for Embedded Smart Cameras

Real-Time Median Filtering for Embedded Smart Cameras Real-Time Median Filtering for Emedded Smart Cameras Yong Zhao Brown University Yong Zhao@rown.edu Gariel Tauin Brown University tauin@rown.edu Figure 1: System architecture of our proof-of-concept Visual

More information

Data Hiding on Text Using Big-5 Code

Data Hiding on Text Using Big-5 Code Data Hiding on Text Using Big-5 Code Jun-Chou Chuang 1 and Yu-Chen Hu 2 1 Department of Computer Science and Communication Engineering Providence University 200 Chung-Chi Rd., Shalu, Taichung 43301, Republic

More information

Diagonal Principal Component Analysis for Face Recognition

Diagonal Principal Component Analysis for Face Recognition Diagonal Principal Component nalysis for Face Recognition Daoqiang Zhang,2, Zhi-Hua Zhou * and Songcan Chen 2 National Laboratory for Novel Software echnology Nanjing University, Nanjing 20093, China 2

More information

Methods for Identifying Traces of Compression in Audio

Methods for Identifying Traces of Compression in Audio Methods for Identifying Traces of Compression in Audio Samet Hicsonmez Computer Engineering Department, TOBB University of Economics and Technology, Ankara, Turkey Email: shicsonmez@etu.edu.tr Erkam Uzun

More information

Adaptive Spatial Steganography Based on the Correlation of Wavelet Coefficients for Digital Images in Spatial Domain Ningbo Li, Pan Feng, Liu Jia

Adaptive Spatial Steganography Based on the Correlation of Wavelet Coefficients for Digital Images in Spatial Domain Ningbo Li, Pan Feng, Liu Jia 216 International Conference on Information Engineering and Communications Technology (IECT 216) ISBN: 978-1-69-37- Adaptive Spatial Steganography Based on the Correlation of Wavelet Coefficients for Digital

More information

Modeling of an MPEG Audio Layer-3 Encoder in Ptolemy

Modeling of an MPEG Audio Layer-3 Encoder in Ptolemy Modeling of an MPEG Audio Layer-3 Encoder in Ptolemy Patrick Brown EE382C Embedded Software Systems May 10, 2000 $EVWUDFW MPEG Audio Layer-3 is a standard for the compression of high-quality digital audio.

More information

Detection of Blue Screen Special Effects in Videos

Detection of Blue Screen Special Effects in Videos Available online at www.sciencedirect.com Physics Procedia 33 (2012 ) 1316 1322 2012 International Conference on Medical Physics and Biomedical Engineering Detection of Blue Screen Special Effects in Videos

More information

Image Compression Algorithm and JPEG Standard

Image Compression Algorithm and JPEG Standard International Journal of Scientific and Research Publications, Volume 7, Issue 12, December 2017 150 Image Compression Algorithm and JPEG Standard Suman Kunwar sumn2u@gmail.com Summary. The interest in

More information

Recent Results from Analyzing the Performance of Heuristic Search

Recent Results from Analyzing the Performance of Heuristic Search Recent Results from Analyzing the Performance of Heuristic Search Teresa M. Breyer and Richard E. Korf Computer Science Department University of California, Los Angeles Los Angeles, CA 90095 {treyer,korf}@cs.ucla.edu

More information

15 Data Compression 2014/9/21. Objectives After studying this chapter, the student should be able to: 15-1 LOSSLESS COMPRESSION

15 Data Compression 2014/9/21. Objectives After studying this chapter, the student should be able to: 15-1 LOSSLESS COMPRESSION 15 Data Compression Data compression implies sending or storing a smaller number of bits. Although many methods are used for this purpose, in general these methods can be divided into two broad categories:

More information

Image Transformation Techniques Dr. Rajeev Srivastava Dept. of Computer Engineering, ITBHU, Varanasi

Image Transformation Techniques Dr. Rajeev Srivastava Dept. of Computer Engineering, ITBHU, Varanasi Image Transformation Techniques Dr. Rajeev Srivastava Dept. of Computer Engineering, ITBHU, Varanasi 1. Introduction The choice of a particular transform in a given application depends on the amount of

More information

JPEG IMAGE CODING WITH ADAPTIVE QUANTIZATION

JPEG IMAGE CODING WITH ADAPTIVE QUANTIZATION JPEG IMAGE CODING WITH ADAPTIVE QUANTIZATION Julio Pons 1, Miguel Mateo 1, Josep Prades 2, Román Garcia 1 Universidad Politécnica de Valencia Spain 1 {jpons,mimateo,roman}@disca.upv.es 2 jprades@dcom.upv.es

More information

Forensic analysis of JPEG image compression

Forensic analysis of JPEG image compression Forensic analysis of JPEG image compression Visual Information Privacy and Protection (VIPP Group) Course on Multimedia Security 2015/2016 Introduction Summary Introduction The JPEG (Joint Photographic

More information

Agus Harjoko Lab. Elektronika dan Instrumentasi, FMIPA, Universitas Gadjah Mada, Yogyakarta, Indonesia

Agus Harjoko Lab. Elektronika dan Instrumentasi, FMIPA, Universitas Gadjah Mada, Yogyakarta, Indonesia A Comparison Study of the Performance of the Fourier Transform Based Algorithm and the Artificial Neural Network Based Algorithm in Detecting Faric Texture Defect Agus Harjoko La. Elektronika dan Instrumentasi,

More information

Real Time Motion Authoring of a 3D Avatar

Real Time Motion Authoring of a 3D Avatar Vol.46 (Games and Graphics and 2014), pp.170-174 http://dx.doi.org/10.14257/astl.2014.46.38 Real Time Motion Authoring of a 3D Avatar Harinadha Reddy Chintalapalli and Young-Ho Chai Graduate School of

More information

A Hybrid Approach to News Video Classification with Multi-modal Features

A Hybrid Approach to News Video Classification with Multi-modal Features A Hybrid Approach to News Video Classification with Multi-modal Features Peng Wang, Rui Cai and Shi-Qiang Yang Department of Computer Science and Technology, Tsinghua University, Beijing 00084, China Email:

More information

A dynamic background subtraction method for detecting walkers using mobile stereo-camera

A dynamic background subtraction method for detecting walkers using mobile stereo-camera A dynamic ackground sutraction method for detecting walkers using moile stereo-camera Masaki Kasahara 1 and Hiroshi Hanaizumi 1 1 Hosei University Graduate School of Computer and Information Sciences Tokyo

More information

Image Tampering Detection

Image Tampering Detection Image Tampering Detection Yun Q. Shi and Patchara Sutthiwan Intelligent Multimedia Lab New Jersey Institute of Technology shi@njit.edu 24 April 2009 A Natural Image Model Approach to Tampering Detection

More information

A NEW DCT-BASED WATERMARKING METHOD FOR COPYRIGHT PROTECTION OF DIGITAL AUDIO

A NEW DCT-BASED WATERMARKING METHOD FOR COPYRIGHT PROTECTION OF DIGITAL AUDIO International journal of computer science & information Technology (IJCSIT) Vol., No.5, October A NEW DCT-BASED WATERMARKING METHOD FOR COPYRIGHT PROTECTION OF DIGITAL AUDIO Pranab Kumar Dhar *, Mohammad

More information

Face Recognition Based on LDA and Improved Pairwise-Constrained Multiple Metric Learning Method

Face Recognition Based on LDA and Improved Pairwise-Constrained Multiple Metric Learning Method Journal of Information Hiding and Multimedia Signal Processing c 2016 ISSN 2073-4212 Ubiquitous International Volume 7, Number 5, September 2016 Face Recognition ased on LDA and Improved Pairwise-Constrained

More information

OCR J276 GCSE Computer Science

OCR J276 GCSE Computer Science Name: Class Teacher: Date: OCR J76 GCSE Computer Science MARK SCHEME.6 DATA REPRESENTATION Content in J76 GCSE Computer Science: 1.1 Systems Architecture 1. Memory 1.3 Storage 1.4 Wireless and Wired Networks

More information

IMPROVING THE RELIABILITY OF DETECTION OF LSB REPLACEMENT STEGANOGRAPHY

IMPROVING THE RELIABILITY OF DETECTION OF LSB REPLACEMENT STEGANOGRAPHY IMPROVING THE RELIABILITY OF DETECTION OF LSB REPLACEMENT STEGANOGRAPHY Shreelekshmi R, Wilscy M 2 and C E Veni Madhavan 3 Department of Computer Science & Engineering, College of Engineering, Trivandrum,

More information

University of Mustansiriyah, Baghdad, Iraq

University of Mustansiriyah, Baghdad, Iraq Volume 5, Issue 9, September 2015 ISSN: 2277 128X International Journal of Advanced Research in Computer Science and Software Engineering Research Paper Available online at: www.ijarcsse.com Audio Compression

More information

DFA: Automata where the next state is uniquely given by the current state and the current input character.

DFA: Automata where the next state is uniquely given by the current state and the current input character. Chapter : SCANNING (Lexical Analysis).3 Finite Automata Introduction to Finite Automata Finite automata (finite-state machines) are a mathematical way of descriing particular kinds of algorithms. A strong

More information

SDP Memo 048: Two Dimensional Sparse Fourier Transform Algorithms

SDP Memo 048: Two Dimensional Sparse Fourier Transform Algorithms SDP Memo 048: Two Dimensional Sparse Fourier Transform Algorithms Document Number......................................................... SDP Memo 048 Document Type.....................................................................

More information

Spatial Enhancement Definition

Spatial Enhancement Definition Spatial Enhancement Nickolas Faust The Electro- Optics, Environment, and Materials Laboratory Georgia Tech Research Institute Georgia Institute of Technology Definition Spectral enhancement relies on changing

More information

FRAME-LEVEL QUALITY AND MEMORY TRAFFIC ALLOCATION FOR LOSSY EMBEDDED COMPRESSION IN VIDEO CODEC SYSTEMS

FRAME-LEVEL QUALITY AND MEMORY TRAFFIC ALLOCATION FOR LOSSY EMBEDDED COMPRESSION IN VIDEO CODEC SYSTEMS FRAME-LEVEL QUALITY AD MEMORY TRAFFIC ALLOCATIO FOR LOSSY EMBEDDED COMPRESSIO I VIDEO CODEC SYSTEMS Li Guo, Dajiang Zhou, Shinji Kimura, and Satoshi Goto Graduate School of Information, Production and

More information

The Analysis and Detection of Double JPEG2000 Compression Based on Statistical Characterization of DWT Coefficients

The Analysis and Detection of Double JPEG2000 Compression Based on Statistical Characterization of DWT Coefficients Available online at www.sciencedirect.com Energy Procedia 17 (2012 ) 623 629 2012 International Conference on Future Electrical Power and Energy Systems The Analysis and Detection of Double JPEG2000 Compression

More information

CODEC INDEPENDENT LOSSY AUDIO COMPRESSION DETECTION. Romain Hennequin Jimena Royo-Letelier Manuel Moussallam

CODEC INDEPENDENT LOSSY AUDIO COMPRESSION DETECTION. Romain Hennequin Jimena Royo-Letelier Manuel Moussallam CODEC INDEPENDENT LOSSY AUDIO COMPRESSION DETECTION Romain Hennequin Jimena Royo-Letelier Manuel Moussallam Deezer, 12 rue d Athènes, 75009 Paris, France research@deezer.com ABSTRACT In this paper, we

More information

A Feature Selection Method to Handle Imbalanced Data in Text Classification

A Feature Selection Method to Handle Imbalanced Data in Text Classification A Feature Selection Method to Handle Imbalanced Data in Text Classification Fengxiang Chang 1*, Jun Guo 1, Weiran Xu 1, Kejun Yao 2 1 School of Information and Communication Engineering Beijing University

More information

IMAGE COMPRESSION USING ANTI-FORENSICS METHOD

IMAGE COMPRESSION USING ANTI-FORENSICS METHOD IMAGE COMPRESSION USING ANTI-FORENSICS METHOD M.S.Sreelakshmi and D. Venkataraman Department of Computer Science and Engineering, Amrita Vishwa Vidyapeetham, Coimbatore, India mssreelakshmi@yahoo.com d_venkat@cb.amrita.edu

More information

Total Variation Based Forensics for JPEG Compression

Total Variation Based Forensics for JPEG Compression International Journal of Research Studies in Science, Engineering and Technology Volume 1, Issue 6, September 2014, PP 8-13 ISSN 2349-4751 (Print) & ISSN 2349-476X (Online) Total Variation Based Forensics

More information

AN ACCELERATED K-MEANS CLUSTERING ALGORITHM FOR IMAGE SEGMENTATION

AN ACCELERATED K-MEANS CLUSTERING ALGORITHM FOR IMAGE SEGMENTATION AN ACCELERATED K-MEANS CLUSTERING ALGORITHM FOR IMAGE SEGMENTATION 1 SEYED MOJTABA TAFAGHOD SADAT ZADEH, 1 ALIREZA MEHRSINA, 2 MINA BASIRAT, 1 Faculty of Computer Science and Information Systems, Universiti

More information

Digital Image Steganography Using Bit Flipping

Digital Image Steganography Using Bit Flipping BULGARIAN ACADEMY OF SCIENCES CYBERNETICS AND INFORMATION TECHNOLOGIES Volume 18, No 1 Sofia 2018 Print ISSN: 1311-9702; Online ISSN: 1314-4081 DOI: 10.2478/cait-2018-0006 Digital Image Steganography Using

More information

A Novel Statistical Distortion Model Based on Mixed Laplacian and Uniform Distribution of Mpeg-4 FGS

A Novel Statistical Distortion Model Based on Mixed Laplacian and Uniform Distribution of Mpeg-4 FGS A Novel Statistical Distortion Model Based on Mixed Laplacian and Uniform Distribution of Mpeg-4 FGS Xie Li and Wenjun Zhang Institute of Image Communication and Information Processing, Shanghai Jiaotong

More information

A New Approach to Compressed Image Steganography Using Wavelet Transform

A New Approach to Compressed Image Steganography Using Wavelet Transform IOSR Journal of Computer Engineering (IOSR-JCE) e-issn: 2278-0661,p-ISSN: 2278-8727, Volume 17, Issue 5, Ver. III (Sep. Oct. 2015), PP 53-59 www.iosrjournals.org A New Approach to Compressed Image Steganography

More information

Reversible Wavelets for Embedded Image Compression. Sri Rama Prasanna Pavani Electrical and Computer Engineering, CU Boulder

Reversible Wavelets for Embedded Image Compression. Sri Rama Prasanna Pavani Electrical and Computer Engineering, CU Boulder Reversible Wavelets for Embedded Image Compression Sri Rama Prasanna Pavani Electrical and Computer Engineering, CU Boulder pavani@colorado.edu APPM 7400 - Wavelets and Imaging Prof. Gregory Beylkin -

More information

Types of Edges. Why Edge Detection? Types of Edges. Edge Detection. Gradient. Edge Detection

Types of Edges. Why Edge Detection? Types of Edges. Edge Detection. Gradient. Edge Detection Why Edge Detection? How can an algorithm extract relevant information from an image that is enables the algorithm to recognize objects? The most important information for the interpretation of an image

More information

Principles of Audio Coding

Principles of Audio Coding Principles of Audio Coding Topics today Introduction VOCODERS Psychoacoustics Equal-Loudness Curve Frequency Masking Temporal Masking (CSIT 410) 2 Introduction Speech compression algorithm focuses on exploiting

More information

Detection of Montage in Lossy Compressed Digital Audio Recordings

Detection of Montage in Lossy Compressed Digital Audio Recordings ARCHIVES OF ACOUSTICS Vol.39,No.1, pp.65 72(2014) Copyright c 2014byPAN IPPT DOI: 10.2478/aoa-2014-0007 Detection of Montage in Lossy Compressed Digital Audio Recordings Rafał KORYCKI Institute of Radioelectronics,

More information

Binary Decision Tree Using Genetic Algorithm for Recognizing Defect Patterns of Cold Mill Strip

Binary Decision Tree Using Genetic Algorithm for Recognizing Defect Patterns of Cold Mill Strip Binary Decision Tree Using Genetic Algorithm for Recognizing Defect Patterns of Cold Mill Strip Kyoung Min Kim 1,4, Joong Jo Park, Myung Hyun Song 3, In Cheol Kim 1, and Ching Y. Suen 1 1 Centre for Pattern

More information

Towards a Fast and Reliable Software Implementation of SLI-FLP Hybrid Computer Arithmetic

Towards a Fast and Reliable Software Implementation of SLI-FLP Hybrid Computer Arithmetic Proceedings of the 6th WSEAS Int. Conf. on Systems Theory & Scientific Computation, Elounda, Greece, August 2-23, 2006 (pp0-08) Towards a Fast and Reliale Software Implementation of SLI-FLP Hyrid Computer

More information

/06/$20.00 c 2006 IEEE I. INTRODUCTION

/06/$20.00 c 2006 IEEE I. INTRODUCTION Scalale Router Memory Architecture Based on Interleaved DRAM Feng Wang and Mounir Hamdi Computer Science Department of The Hong Kong University of Science and Technology {fwang, hamdi}@cs.ust.hk Astract

More information

A Method for Large-Scale IPTV Quality Estimation

A Method for Large-Scale IPTV Quality Estimation 016 International Conference on Artificial Intelligence: Techniques and Applications (AITA 016) ISBN: 978-1-60595-389- A Method for Large-Scale IPTV Quality Estimation Xiao-tong QIU 1, Li-sheng HUANG,

More information

PERFORMANCE ANALYSIS OF INTEGER DCT OF DIFFERENT BLOCK SIZES USED IN H.264, AVS CHINA AND WMV9.

PERFORMANCE ANALYSIS OF INTEGER DCT OF DIFFERENT BLOCK SIZES USED IN H.264, AVS CHINA AND WMV9. EE 5359: MULTIMEDIA PROCESSING PROJECT PERFORMANCE ANALYSIS OF INTEGER DCT OF DIFFERENT BLOCK SIZES USED IN H.264, AVS CHINA AND WMV9. Guided by Dr. K.R. Rao Presented by: Suvinda Mudigere Srikantaiah

More information

Research Article Improvements in Geometry-Based Secret Image Sharing Approach with Steganography

Research Article Improvements in Geometry-Based Secret Image Sharing Approach with Steganography Hindawi Publishing Corporation Mathematical Problems in Engineering Volume 2009, Article ID 187874, 11 pages doi:10.1155/2009/187874 Research Article Improvements in Geometry-Based Secret Image Sharing

More information

A Parallel Reconfigurable Architecture for DCT of Lengths N=32/16/8

A Parallel Reconfigurable Architecture for DCT of Lengths N=32/16/8 Page20 A Parallel Reconfigurable Architecture for DCT of Lengths N=32/16/8 ABSTRACT: Parthiban K G* & Sabin.A.B ** * Professor, M.P. Nachimuthu M. Jaganathan Engineering College, Erode, India ** PG Scholar,

More information

Abstract. Keywords: Genetic Algorithm, Mean Square Error, Peak Signal to noise Ratio, Image fidelity. 1. Introduction

Abstract. Keywords: Genetic Algorithm, Mean Square Error, Peak Signal to noise Ratio, Image fidelity. 1. Introduction A Report on Genetic Algorithm based Steganography for Image Authentication by Amrita Khamrui Enrolled Scholar Department of Computer Science & Engineering, Kalyani University Prof. (Dr.) J K Mandal Professor

More information

Fig. 1: The perceptual audio coding procedure and three main embedding domains.

Fig. 1: The perceptual audio coding procedure and three main embedding domains. 1 Spec-ResNet: A General Audio Steganalysis Scheme based on a Deep Residual Network for Spectrograms Yanzhen Ren, Member, IEEE, Dengkai Liu, Qiaochu Xiong, Jianming Fu, and Lina Wang arxiv:191.6838v2 [cs.mm]

More information

A Novel Multi-Frame Color Images Super-Resolution Framework based on Deep Convolutional Neural Network. Zhe Li, Shu Li, Jianmin Wang and Hongyang Wang

A Novel Multi-Frame Color Images Super-Resolution Framework based on Deep Convolutional Neural Network. Zhe Li, Shu Li, Jianmin Wang and Hongyang Wang 5th International Conference on Measurement, Instrumentation and Automation (ICMIA 2016) A Novel Multi-Frame Color Images Super-Resolution Framewor based on Deep Convolutional Neural Networ Zhe Li, Shu

More information

A Fast Personal Palm print Authentication based on 3D-Multi Wavelet Transformation

A Fast Personal Palm print Authentication based on 3D-Multi Wavelet Transformation A Fast Personal Palm print Authentication based on 3D-Multi Wavelet Transformation * A. H. M. Al-Helali, * W. A. Mahmmoud, and * H. A. Ali * Al- Isra Private University Email: adnan_hadi@yahoo.com Abstract:

More information

5: Music Compression. Music Coding. Mark Handley

5: Music Compression. Music Coding. Mark Handley 5: Music Compression Mark Handley Music Coding LPC-based codecs model the sound source to achieve good compression. Works well for voice. Terrible for music. What if you can t model the source? Model the

More information

Introduction to Machine Learning Spring 2018 Note Sparsity and LASSO. 1.1 Sparsity for SVMs

Introduction to Machine Learning Spring 2018 Note Sparsity and LASSO. 1.1 Sparsity for SVMs CS 189 Introduction to Machine Learning Spring 2018 Note 21 1 Sparsity and LASSO 1.1 Sparsity for SVMs Recall the oective function of the soft-margin SVM prolem: w,ξ 1 2 w 2 + C Note that if a point x

More information

Linear Discriminant Analysis for 3D Face Recognition System

Linear Discriminant Analysis for 3D Face Recognition System Linear Discriminant Analysis for 3D Face Recognition System 3.1 Introduction Face recognition and verification have been at the top of the research agenda of the computer vision community in recent times.

More information

(JBE Vol. 23, No. 6, November 2018) Detection of Frame Deletion Using Convolutional Neural Network. Abstract

(JBE Vol. 23, No. 6, November 2018) Detection of Frame Deletion Using Convolutional Neural Network. Abstract (JBE Vol. 23, No. 6, November 2018) (Regular Paper) 23 6, 2018 11 (JBE Vol. 23, No. 6, November 2018) https://doi.org/10.5909/jbe.2018.23.6.886 ISSN 2287-9137 (Online) ISSN 1226-7953 (Print) CNN a), a),

More information

CONTENT ADAPTIVE SCREEN IMAGE SCALING

CONTENT ADAPTIVE SCREEN IMAGE SCALING CONTENT ADAPTIVE SCREEN IMAGE SCALING Yao Zhai (*), Qifei Wang, Yan Lu, Shipeng Li University of Science and Technology of China, Hefei, Anhui, 37, China Microsoft Research, Beijing, 8, China ABSTRACT

More information

A A A. Fig.1 image patch. Then the edge gradient magnitude is . (1)

A A A. Fig.1 image patch. Then the edge gradient magnitude is . (1) International Conference on Information Science and Computer Applications (ISCA 013) Two-Dimensional Barcode Image Super-Resolution Reconstruction Via Sparse Representation Gaosheng Yang 1,Ningzhong Liu

More information

Aggregating Descriptors with Local Gaussian Metrics

Aggregating Descriptors with Local Gaussian Metrics Aggregating Descriptors with Local Gaussian Metrics Hideki Nakayama Grad. School of Information Science and Technology The University of Tokyo Tokyo, JAPAN nakayama@ci.i.u-tokyo.ac.jp Abstract Recently,

More information

A Novel Secure Digital Watermark Generation from Public Share by Using Visual Cryptography and MAC Techniques

A Novel Secure Digital Watermark Generation from Public Share by Using Visual Cryptography and MAC Techniques Bashar S. Mahdi Alia K. Abdul Hassan Department of Computer Science, University of Technology, Baghdad, Iraq A Novel Secure Digital Watermark Generation from Public Share by Using Visual Cryptography and

More information

A Blind Steganalysis on JPEG Gray Level Image Based on Statistical Features and its Performance Analysis

A Blind Steganalysis on JPEG Gray Level Image Based on Statistical Features and its Performance Analysis International Journal of Engineering Research and Development e-issn: 2278-067X, p-issn: 2278-800X, www.ijerd.com Volume 11, Issue 09 (September 2015), PP.27-31 A Blind Steganalysis on JPEG Gray Level

More information

4. Image Retrieval using Transformed Image Content

4. Image Retrieval using Transformed Image Content 4. Image Retrieval using Transformed Image Content The desire of better and faster retrieval techniques has always fuelled to the research in content based image retrieval (CBIR). A class of unitary matrices

More information

Application of Daubechies Wavelets for Image Compression

Application of Daubechies Wavelets for Image Compression Application of Daubechies Wavelets for Image Compression Heydari. Aghile 1,*, Naseri.Roghaye 2 1 Department of Math., Payame Noor University, Mashad, IRAN, Email Address a_heidari@pnu.ac.ir, Funded by

More information

Perceptual coding. A psychoacoustic model is used to identify those signals that are influenced by both these effects.

Perceptual coding. A psychoacoustic model is used to identify those signals that are influenced by both these effects. Perceptual coding Both LPC and CELP are used primarily for telephony applications and hence the compression of a speech signal. Perceptual encoders, however, have been designed for the compression of general

More information

Effects of the Horizontal Projection on the Distribution of the Façade Temperature

Effects of the Horizontal Projection on the Distribution of the Façade Temperature International Conference on Advances in Energy and Environmental Science (ICAEES 2015) Effects of the Horizontal Projection on the Distriution of the Façade Temperature Jiajia Fu1, a *, Yinqing i1, and

More information

Learning to Match. Jun Xu, Zhengdong Lu, Tianqi Chen, Hang Li

Learning to Match. Jun Xu, Zhengdong Lu, Tianqi Chen, Hang Li Learning to Match Jun Xu, Zhengdong Lu, Tianqi Chen, Hang Li 1. Introduction The main tasks in many applications can be formalized as matching between heterogeneous objects, including search, recommendation,

More information

A New Spatial q-log Domain for Image Watermarking

A New Spatial q-log Domain for Image Watermarking 1 Ta Minh Thanh, 2 Pham Thanh Hiep, 3 Ta Minh Tam 1 Department of Network Security, Le Quy Don Technical University, 100 Hoang Quoc Viet, Cau Giay, Hanoi, Vietnam. E-mail: taminhjp@gmail.com 2 Le Quy Don

More information

Forensic Image Recognition using a Novel Image Fingerprinting and Hashing Technique

Forensic Image Recognition using a Novel Image Fingerprinting and Hashing Technique Forensic Image Recognition using a Novel Image Fingerprinting and Hashing Technique R D Neal, R J Shaw and A S Atkins Faculty of Computing, Engineering and Technology, Staffordshire University, Stafford

More information

Index. 1. Motivation 2. Background 3. JPEG Compression The Discrete Cosine Transformation Quantization Coding 4. MPEG 5.

Index. 1. Motivation 2. Background 3. JPEG Compression The Discrete Cosine Transformation Quantization Coding 4. MPEG 5. Index 1. Motivation 2. Background 3. JPEG Compression The Discrete Cosine Transformation Quantization Coding 4. MPEG 5. Literature Lossy Compression Motivation To meet a given target bit-rate for storage

More information

Chapter 1. Digital Data Representation and Communication. Part 2

Chapter 1. Digital Data Representation and Communication. Part 2 Chapter 1. Digital Data Representation and Communication Part 2 Compression Digital media files are usually very large, and they need to be made smaller compressed Without compression Won t have storage

More information

VS1063 ENCODER DEMONSTRATION

VS1063 ENCODER DEMONSTRATION PRELIMINARY DOCUMENT VS1063 ENCODER DEMONSTRATION VLSI Solution Audio Decoder Project Code: Project Name: All information in this document is provided as-is without warranty. Features are subject to change

More information

Fusion Method of Fingerprint Quality Evaluation: From the Local Gabor Feature to the Global Spatial-Frequency Structures

Fusion Method of Fingerprint Quality Evaluation: From the Local Gabor Feature to the Global Spatial-Frequency Structures Fusion Method of Fingerprint Quality Evaluation: From the Local abor Feature to the lobal Spatial-Frequency Structures Decong Yu, Lihong Ma,, Hanqing Lu, and Zhiqing Chen 3 D Key Lab. of Computer Networ,

More information

Comparison of Digital Image Watermarking Algorithms. Xu Zhou Colorado School of Mines December 1, 2014

Comparison of Digital Image Watermarking Algorithms. Xu Zhou Colorado School of Mines December 1, 2014 Comparison of Digital Image Watermarking Algorithms Xu Zhou Colorado School of Mines December 1, 2014 Outlier Introduction Background on digital image watermarking Comparison of several algorithms Experimental

More information

IEEE TRANSACTIONS ON IMAGE PROCESSING, VOL. 24, NO. 3, MARCH

IEEE TRANSACTIONS ON IMAGE PROCESSING, VOL. 24, NO. 3, MARCH IEEE TRANSACTIONS ON IMAGE PROCESSING, VOL. 24, NO. 3, MARCH 215 187 On Antiforensic Concealability With Rate-Distortion Tradeoff Xiaoyu Chu, Student Member, IEEE, Matthew Christopher Stamm, Member, IEEE,

More information

CIS UDEL Working Notes on ImageCLEF 2015: Compound figure detection task

CIS UDEL Working Notes on ImageCLEF 2015: Compound figure detection task CIS UDEL Working Notes on ImageCLEF 2015: Compound figure detection task Xiaolong Wang, Xiangying Jiang, Abhishek Kolagunda, Hagit Shatkay and Chandra Kambhamettu Department of Computer and Information

More information

An Error-Based Statistical Feature Extraction Scheme for Double JPEG Compression Detection

An Error-Based Statistical Feature Extraction Scheme for Double JPEG Compression Detection An Error-Based Statistical Feature Extraction Scheme for Double JPEG Compression Detection Nivi Varghese 1, Charlse M Varghese 2 1, 2 Department of Computer Science and Engineering, KMP College of Engineering,

More information

LRLW-LSI: An Improved Latent Semantic Indexing (LSI) Text Classifier

LRLW-LSI: An Improved Latent Semantic Indexing (LSI) Text Classifier LRLW-LSI: An Improved Latent Semantic Indexing (LSI) Text Classifier Wang Ding, Songnian Yu, Shanqing Yu, Wei Wei, and Qianfeng Wang School of Computer Engineering and Science, Shanghai University, 200072

More information

Both LPC and CELP are used primarily for telephony applications and hence the compression of a speech signal.

Both LPC and CELP are used primarily for telephony applications and hence the compression of a speech signal. Perceptual coding Both LPC and CELP are used primarily for telephony applications and hence the compression of a speech signal. Perceptual encoders, however, have been designed for the compression of general

More information

Error Protection of Wavelet Coded Images Using Residual Source Redundancy

Error Protection of Wavelet Coded Images Using Residual Source Redundancy Error Protection of Wavelet Coded Images Using Residual Source Redundancy P. Greg Sherwood and Kenneth Zeger University of California San Diego 95 Gilman Dr MC 47 La Jolla, CA 9293 sherwood,zeger @code.ucsd.edu

More information

Forensics of High-Quality JPEG Images with Color Subsampling

Forensics of High-Quality JPEG Images with Color Subsampling MÜNSTER Forensics of High-Quality JPEG Images with Color Subsampling Matthias Carnein Pascal Schöttle Rainer Böhme 19th November 2015 Introduction uncompressed Q = 15 Q = 100 Block convergence analysis

More information

SEG Houston 2009 International Exposition and Annual Meeting

SEG Houston 2009 International Exposition and Annual Meeting Yu Geng* 1, Ru-Shan Wu and Jinghuai Gao 2 Modeling and Imaging Laboratory, IGPP, University of California, Santa Cruz, CA 95064 Summary Local cosine/sine basis is a localized version of cosine/sine basis

More information

Fast Computation of the Gabor Wavelet Transform

Fast Computation of the Gabor Wavelet Transform DICTA2002: Digital Image Computing Techniques and Applications, 21 22 January 2002, Melourne, Australia 1 Fast Computation of the Gaor Wavelet Transform Gareth Loy Department of Systems Engineering Research

More information

Chapter 11 Image Processing

Chapter 11 Image Processing Chapter Image Processing Low-level Image Processing Operates directly on a stored image to improve or enhance it. Stored image consists of a two-dimensional array of pixels (picture elements): Origin (0,

More information

STEGANOGRAPHY is the technique that conceals secret. Spec-ResNet: A General Audio Steganalysis scheme based on Deep Residual Network of Spectrogram

STEGANOGRAPHY is the technique that conceals secret. Spec-ResNet: A General Audio Steganalysis scheme based on Deep Residual Network of Spectrogram 1 Spec-ResNet: A General Audio Steganalysis scheme based on Deep Residual Network of Spectrogram Yanzhen Ren, Member, IEEE, Dengkai Liu, Qiaochu Xiong, Jianming Fu, and Lina Wang arxiv:191.6838v1 [cs.mm]

More information

Three Dimensional Motion Vectorless Compression

Three Dimensional Motion Vectorless Compression 384 IJCSNS International Journal of Computer Science and Network Security, VOL.9 No.4, April 9 Three Dimensional Motion Vectorless Compression Rohini Nagapadma and Narasimha Kaulgud* Department of E &

More information