Robust Video Watermarking for MPEG Compression and DA-AD Conversion
|
|
- Victor Murphy
- 5 years ago
- Views:
Transcription
1 Robust Video ing for MPEG Compression and DA-AD Conversion Jong-Uk Hou, Jin-Seok Park, Do-Guk Kim, Seung-Hun Nam, Heung-Kyu Lee Division of Web Science and Technology, KAIST Department of Computer Science, KAIST Graduate School of Information Security, KAIST 335 Gwahangno, Yuseong-gu, Daejeon, Republic of Korea {juheo, jspark, dgkim, shnam, ABSTRACT In this paper, we proposed a robust watermarking system. Using DCT domain spread-spectrum watermarking, our system achieved robustness to various non-hostile processings such as MPEG compression, and DA-AD conversion. Our proposed system guarantees that 16-bit data can be extracted in any 15 second interval, even in a long, by using adaptive frame selection. To verify the performance of the proposed system, various experiments were carried out under a DA-AD conversion environment. Experimental results show that the proposed method is not only robust to non-hostile processings but also achieves invisibility. Categories and Subject Descriptors I.4.9 [Image Processing and Computer Vision]: Applications Keywords Digital watermarking; watermark; compression; signal processing 1. INTRODUCTION Digital watermarking is a process that alters a cover work imperceptibly to embed a watermark message [4]. One of the main applications of digital watermarking is copyright protection. In particular, digital watermarking is robust against analog hole piracy [5], which is difficult to prevent with other copyright protection techniques, such as Digital Rights Management (DRM). In the case of digital watermarking, an embedded watermark should endure various non-hostile processings. Photometric attacks, spatial desynchronization, temporal desynchronization, and editing are included in Corresponding author Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from permissions@acm.org. IWIHC 14, June 3, 2014, Kyoto, Japan. Copyright 2014 ACM /14/06...$ non-hostile processings [6]. Photometric attacks are attacks which modify the pixel values in a frame. Noise addition and Digital/Analog - Analog/Digital (DA-AD) conversion belong to this category. Spatial desynchronization can occur with changes of display format and changes of spatial resolution. Temporal desynchronization is mainly due to changes of frame rate. Video editing involves various editing techniques, such as cut-and-splice and fade-and-dissolve. This paper presents a robust watermarking system. The proposed watermarking system achieves robustness to temporal desynchronization by using adaptive selection of watermarking frames. In the adaptive frame selection, a sample watermark is embedded, and the watermarked is compressed. Then, frames that are robust to the compression are selected for watermarking. We adopt a DCT-based spread-spectrum image watermarking [1] which is robust to lossy compression, noise addition, DA-AD conversion, and uniform scaling. Therefore, the embedded watermark can endure various non-hostile processing. Experimental results show that the proposed method achieves robustness and perceptual invisibility. The rest of the paper is organized as follows. The proposed watermarking method is described in Section 2. The experimental setup and results are shown in Section 3. Finally, the conclusion is presented in Section PROPOSED METHOD 2.1 Overall Process In the proposed watermarking system, we extended the DCT domain spread-spectrum image watermarking [1] to work for the environment. A pseudo-random sequence of length N is used as the watermark. The overall process of the proposed method is summarized in Figure 1. The frames are adaptively selected for watermarking. For every 7.5 seconds in the, a one second interval is chosen for watermarking. Before watermarking of the selected frames, 512 watermarks are generated to encode 16 bits, that is, 256 watermarks for encoding the front 8 bits, and the other 256 watermarks for encoding the back 8 bits. Therefore, two watermarks are embedded in the selected frames. s are embedded in the blue channel, since variation in the blue channel is less perceptible than variation in other channels [7]. In the watermarking extraction step, watermarks are extracted from the entire frames. If two watermarks are precisely extracted, 16 bits of data are recovered from these watermarks. 2
2 Adaptive Frame selection Video compression Frame selection Embedding process ed Video All Frames... Sample watermark Embedding process DCT DCT Original Selected frames embedding Set of pseudo random sequences extraction 16-bit data Sequence selection s Inverse DCT Decoding s Sequence generation Set of Pseudo random sequences Data encoding ed 16-bit data (a) Embedding process (b) Extraction process Figure 1: ing embedding and extraction processes 2.2 Adaptive frame selection In our proposed scheme, watermarks are embedded in the frames robust to compression. The details of the adaptive frame selection process are summarized as following. First, a sample watermark is repeatedly embedded in each frame by using the algorithm introduced in Section 2.4, and the file is compressed by a compression algorithm. Then, the extractor responses in each frame are computed by using the procedure described in Section 2.5. Figure 2 shows an example of the computed extractor responses. The extractor responses are degraded in the middle interval which includes a lot of motion. In the case of compressed, the extractor responses are entirely degraded, and there are periodic peaks in the sequence of the extractor responses. These peaks appear in the I-frames in group of pictures (GOP) [2]. I-frames are more robust to compression than other kinds of frames in GOP, since it is less affected by motion estimation. Using this property, watermarks can be embedded efficiently. For instance, it is inefficient to embed watermarks in frames that are not robust to compression. Therefore, the one second intervals with the highest extractor responses are selected from every 7.5 second interval (See Figure 3). In the watermark embedding step, the selected frames are watermarked, and the other frames remain unchanged. After the adaptive frame selection, a watermarked interval exists in any 15-second interval in the, since the maximum value of the time between two consecutive watermarked intervals is 13 seconds. Therefore, the proposed Correlation Original MPEG (QF=58) MPEG (QF=0) Frame number Figure 2: MPEG 4 compression effect on extractor response ( : ITE/ARIB test sequence #2) system guarantees that 16 bits of data can be extracted from any 15-second interval in the. 2.3 Data encoding process In our proposed system, two pseudo-random sequences X, Y are used for watermarking: sequence X for encoding the front 8 bits, and sequence Y for encoding the back 8 bits. To represent 8 bits information, 256(= 2 8 ) unique codes are generated. From this, 16 bits of data can be encoded with two sets X, Y of 256 pseudo-random sequences. X = {X 0,X 1,X 2,...,X 255}, Y = { Y 0,Y 1, Y 2,..., Y 255}. Therefore, two sequences X i,y j areselectedineachsequence set for data encoding where index i, and j correspond to input data. For instance, if input data is 0x00FF, twosequences X i,y j are selected where i = 0x00 and j = 0xFF. 2.4 embedding In the watermarking embedding process, the discrete cosine transform (DCT) of frame F is computed. Then, the N coefficients in fixed position are used to form vector V.The vector of the original coefficients V = {v 1,v 2,v 3,..., v N } is watermarked, and it becomes a vector of watermarked coefficients V = {v 1,v 2,v 3,..., v N } according to the following embedding rule: v i = v i + α v i (1) xi + yi, (1 i N), (2) 2 ed frames Unchanged frames... X, Y X, Y X, Y time (sec) Frame sequence of input Figure 3: Example of watermarked sequence. ed intervals are selected from every 7.5 second. 3
3 Data 16bits Video #2, #8, #20, #23, #46 embedder Video encoder (MPEG-4) Decompressed D-A converter Analog signal A-D converter extractor Video encoder (MPEG-4) Decompressed PSNR & SSIM Extracted data 16bits bit error rate Figure 4: Overall process of our test system where α is the scaling factor which decides the strength of the watermark signal, and X = {x 1,x 2,x 3,..., x N }, Y = {y 1,y 2,y 3,..., y N } are selected watermarks. To encode 16 bits, two watermarks X, Y are embedded in each selected frame. The coefficients in the mid-band frequency spectrum are used for embedding so that a trade-off between robustness to compression and perceptual invisibility is achieved. After the coefficient value modification, inverse DCT is performed, and the watermarked frame F is obtained. 2.5 extraction The watermarking extraction process is carried out as follows. The DCT of the possibly corrupted watermarked frame F is computed, and vector V is extracted from the DCT coefficients in the fixed position. Then, the correlation between vector V and the watermarks from the sets X, Y are computed and used as a measure of the presence of the watermark. The correlation z is defined as z = X V N = 1 N N x i vi. (3) The presence of watermark X is decided by comparison between the correlation and a threshold T. The threshold is computed by T = 1 20 N i=1 N vi. (4) The threshold equation is obtained from the experimental results to minimize a false-positive rate. The presence of each watermark among the total 512 watermarks from the sets X, Y in frame F is determined by thresholding. In this manner, the watermarks in all frames are extracted. Then, each extracted watermark is matched to the proper 8 bits of data and the whole 16 bits of data are recovered. i=1 with 16 GB main memory was used to measure the performance. For our test set, we used clips from the ITE/ARIB Hi-Vision Test Sequence 1st Edition: numbers 2, 8, 20, 23, and 46. First, we converted raw YPbPr into uncompressed RGB by the following equation: R = Y P r G = Y (0.159P b P r)/0.701 B = Y P b. The original frames of each clip were 20 seconds in duration with 600 frames and display resolution. The MPEG-4 part 10 (H.264) codec in MATLAB automatically resizes the resolution to ; thus, we cropped the last three rows. Then, we removed the first 150 frames to get a 15-second. Finally, we got uncompressed AVI s: display resolution ; 30 frames per second; 15 seconds; 1, 430, 826 kbps; and 2.49 GB size. The experiment was conducted in the following manner. First, we inserted 16-bit data into the original clips by using the proposed embedding algorithm. After the embedding process, the watermarked clips were compressed using the MPEG-4 part 10 (H.264) codec with various quality factors. Then the compressed was converted into analog signal using a digital-to-analog (DA) converter. Analog component (YPbPr) was selected as the format of analog signal because YPbPr accommodates full HD display resolution (1080p). To process DA conversion, a âăÿfosmon HD- MI to component (YPbPr) / VGA & SPDIF output converter boxâăź was used (See Figure 5(a)). The converted YPbPr signal was converted into digital signal again, and the converted digital was saved in YUV422 format, which is an uncompressed format. For this process, we used âăÿskyhd capturex HDMIâĂŹ for the AD converter (See Figure 5(b)). The converted di- (5) 3. EXPERIMENTAL RESULTS 3.1 Experimental setup In this section, the test environment for the proposed method is explained. Figure 4 shows the overall process of our test for verification of our proposed scheme. The test included the processes of watermark embedding, watermark extraction, compression (MPEG-4 part 10), DA-AD conversion, and calculation of the average bit error rate of the embedded information. The proposed watermarking algorithm was implemented in the MATLAB 2012b environment, and a machine consisting of Intel i (3.40 GHz) (a) DA converter (b) AD converter Figure 5: Converters for DA-AD conversion. (a) Fosmon HDMI to component converter box, (b) skyhd capturex HDMI 4
4 Figure 6: Selected DCT coefficients (red area) for watermarking process. gital had different display resolution ( ) and frame rate in comparison with the original. Lastly, we extracted the watermarks embedded in the clips through the watermark extracting system. The extracted watermarks were decoded into 16-bit data, and the bit error rate of the extracted data was calculated. To achieve robustness and invisibility, several parameters of our algorithm have to be carefully set. To implement our watermarking process, we selected N = coefficients from the fixed position of DCT domain described in Figure 6. It was found experimentally that this choice yields maximum watermark robustness while preserving invisibility. 3.2 Experimental results Image quality assessment To assess image quality, we inserted 16 bits of data into the original clips by using the proposed embedding algorithm in various watermark strengths α. The watermarked s were generated to yield an average PSNR of more than 36dB. Figure 7 shows the example of the original and watermarked images. After the embedding process, the watermarked clips were compressed using the MPEG-4 part 10 (H.264) codec with various quality factors between 56 and 59 (See Table 1). Video clips compressed with quality factor between 56 and 59 satisfy the bit rate of 1/100 compared to the uncompressed. Also, the unwatermarked original clips were compressed using the same quality factor. Both watermarked clips and unwatermarked original clips were decompressed, and the SSIM [8] and PSNR were calculated for each pair of the luminance signal calculated by following equation: Y =0.7152G B R. (6) Table 2 shows the bit error rate (BER), PNSR, and SSIM results for various watermark strengths α. According to the results, no error occured in our tests when α 0.4. The ITE/ARIB test sequence Quality factor ITE / ARIB #2 58 ITE / ARIB #8 59 ITE / ARIB #20 58 ITE / ARIB #23 58 ITE / ARIB #46 56 Table 1: Quality factor to generate less than 1/100 of the original bit rate Figure 7: Compressed version of original images (Left), and images from Set-4 (α =0.4, PSNR db, SSIM ) (Right) result of #2 showed the best detection ratio with the highest PSNR. In contrast, the test result of #23 showed the worst performance because it had a lot of motion throughout the whole playing time. In addition, Table 3 compares the PSNR and SSIM values of the uncompressed original and uncompressed watermarked. These results indicate visual degradation of the test s by the compression algorithm Tolerance assessment A watermarking system must be robust, which means that a watermark should be difficult to eliminate by common signal processing including compression, such as MPEG-4 part 10, and DA-AD conversion. Therefore, an embedded watermark should be barely affected by these signal processing. Robustness is evaluated by calculation of the average bit error rate for an embedded watermark after undergoing common signal processing. Tests were conducted with various watermark strengths α = 0.4, 0.9, and 1.5. Tables 4, 5, and 6 show the detection results and compressibilities for various MPEG quality factors. In the test with α =0.9, the embedded data bits were successfully extracted from all s except #46, while the average compressibility was 1/604. The embedded data bits were precisely extracted for all tested MPEG quality factors when α =1.5. 5
5 4. CONCLUSION In this paper, we proposed a robust watermarking system. Our system achieves robustness to non-hostile processings, such as temporal desynchronization, MPEG compression, and DA-AD conversion. We could obtain this property by using adaptive frame selection and DCT domain spread-spectrum watermarking. To verify the performance of the proposed system, various experiments were performed under DA-AD conversion environment. The experimental results demonstrated that the proposed method not only is robust to non-hostile processings but also achieves invisibility. However, our scheme is not secure in some respect because of the spread spectrum watermarking is known to be sensitive to attacks [3]. Therefore, enhancing the security of our system is one of the most important task for our future improvement. Acknowledgments This research project was supported by Government Fund from Korea Copyright Commission and by the National Research Foundation of Korea(NRF) grant funded by the Korea government(mest) (No. 2012R1A2A1A ) 5. REFERENCES [1] M. Barni, F. Bartolini, V. Cappellini, and A. Piva. A dct-domain system for robust image watermarking. Signal Processing, 66(3): , [2] V. Bhaskaran and K. Konstantinides. Image and compression standards: algorithms and architectures. Springer, [3] M. Chaumont. Ensuring security of h.264 s by using watermarking. volume 8063, pages , [4] I.J.Cox.Digital watermarking and steganography. Elsevier Science Limited, [5] E. Diehl and T. Furon. : closing the analog hole. In Consumer Electronics, ICCE IEEE International Conference on, pages 52 53, [6] G. DoÃńrr and J.-L. Dugelay. A guide tour of watermarking. Signal Processing: Image Communication, 18(4): , [7] A. K. Jain. Fundamentals of Digital Image Processing. Prentice Hall, [8] Z. Wang, A. Bovik, H. Sheikh, and E. Simoncelli. Image quality assessment: from error visibility to structural similarity. Image Processing, IEEE Transactions on,
6 Test set No. Set-1 Set-2 Set-3 Set-4 Set-5 Set-6 Set-7 Set-8 WM strength α PSNR(dB) #2 SSIM BER PSNR(dB) #8 SSIM BER PSNR(dB) #20 SSIM BER PSNR(dB) #23 SSIM BER PSNR(dB) #46 SSIM BER PSNR(dB) average SSIM BER Compression quality factor - #2 : 58, #8 : 59, #20 : 58, #23 : 58, #46 : 56 : watermark is not detected (BER is considered as 1.000) Table 2: Result of test for various watermark strength α. Test set No. Set-1 Set-2 Set-3 Set-4 Set-5 Set-6 Set-7 Set-8 WM strength α PSNR(dB) SSIM Table 3: Result of test for uncompressed original and uncompressed watermarked MPEG Quality factor #2 BER compressibility 1/139 1/191 1/232 1/307 1/432 1/1029 #8 compressibility 1/139 1/193 1/253 1/321 1/445 1/606 #20 BER compressibility 1/139 1/190 1/253 1/321 1/444 1/460 #23 BER compressibility 1/138 1/193 1/249 1/322 1/400 1/395 #46 BER compressibility 1/129 1/183 1/236 1/296 1/386 1/443 BER compressibility 1/137 1/190 1/245 1/313 1/422 1/587 : watermark is not detected (BER is considered as 1.000) Table 4: Tolerance test results for the test Set-4 (α =0.4, PSNR db, SSIM ) 7
7 MPEG Quality factor #2 #8 #20 #23 #46 compressibility 1/139 1/188 1/236 1/310 1/444 1/1001 compressibility 1/139 1/192 1/253 1/321 1/446 1/631 compressibility 1/139 1/190 1/239 1/317 1/438 1/501 compressibility 1/138 1/191 1/250 1/322 1/419 1/413 BER compressibility 1/130 1/186 1/236 1/297 1/407 1/473 BER compressibility 1/137 1/189 1/243 1/313 1/431 1/604 : watermark is not detected (BER is considered as 1.000) Table 5: Tolerance test results for the test Set-5 (α =0.9, PSNR db, SSIM ) MPEG Quality factor #2 #8 #20 #23 #46 compressibility 1/136 1/194 1/248 1/315 1/413 1/1029 compressibility 1/140 1/194 1/253 1/323 1/446 1/603 compressibility 1/134 1/193 1/254 1/317 1/446 1/460 compressibility 1/137 1/193 1/253 1/320 1/383 1/380 compressibility 1/131 1/184 1/237 1/297 1/387 1/443 compressibility 1/136 1/192 1/249 1/314 1/415 1/583 Table 6: Tolerance test results for the test Set-6 (α =1.5, PSNR db, SSIM ) 8
Robust Imperceptible Video Watermarking for MPEG Compression and DA-AD Conversion Using Visual Masking
Robust Imperceptible Video Watermarking for MPEG Compression and DA-AD Conversion Using Visual Masking Sang-Keun Ji, Wook-Hyung Kim, Han-Ul Jang, Seung-Min Mun, and Heung-Kyu Lee School of Computing, Korea
More informationA Video Watermarking Algorithm Based on the Human Visual System Properties
A Video Watermarking Algorithm Based on the Human Visual System Properties Ji-Young Moon 1 and Yo-Sung Ho 2 1 Samsung Electronics Co., LTD 416, Maetan3-dong, Paldal-gu, Suwon-si, Gyenggi-do, Korea jiyoung.moon@samsung.com
More informationA Digital Video Watermarking Algorithm Based on LSB and DCT
A Digital Video Watermarking Algorithm Based on LSB and DCT Kirti Jain, U.S.N Raju Department of Computer Science and Engineering NIT Warangal India kirtijain.kj@gmail.com,usnraju@gmail.com ABSTRACT: In
More informationData Hiding in Video
Data Hiding in Video J. J. Chae and B. S. Manjunath Department of Electrical and Computer Engineering University of California, Santa Barbara, CA 9316-956 Email: chaejj, manj@iplab.ece.ucsb.edu Abstract
More informationCHAPTER-5 WATERMARKING OF COLOR IMAGES
CHAPTER-5 WATERMARKING OF COLOR IMAGES 5.1 INTRODUCTION After satisfactorily developing the watermarking schemes for gray level images, we focused on developing the watermarking schemes for the color images.
More informationAn Improved DCT Based Color Image Watermarking Scheme Xiangguang Xiong1, a
International Symposium on Mechanical Engineering and Material Science (ISMEMS 2016) An Improved DCT Based Color Image Watermarking Scheme Xiangguang Xiong1, a 1 School of Big Data and Computer Science,
More informationReduction of Blocking artifacts in Compressed Medical Images
ISSN 1746-7659, England, UK Journal of Information and Computing Science Vol. 8, No. 2, 2013, pp. 096-102 Reduction of Blocking artifacts in Compressed Medical Images Jagroop Singh 1, Sukhwinder Singh
More informationTampering Detection in Compressed Digital Video Using Watermarking
Tampering Detection in Compressed Digital Video Using Watermarking Mehdi Fallahpour, Shervin Shirmohammadi, Mehdi Semsarzadeh, Jiying Zhao School of Electrical Engineering and Computer Science (EECS),
More informationA NEW DCT-BASED WATERMARKING METHOD FOR COPYRIGHT PROTECTION OF DIGITAL AUDIO
International journal of computer science & information Technology (IJCSIT) Vol., No.5, October A NEW DCT-BASED WATERMARKING METHOD FOR COPYRIGHT PROTECTION OF DIGITAL AUDIO Pranab Kumar Dhar *, Mohammad
More informationWatermarking Method using Concatenated Code for Scaling and Rotation Attacks
Watermarking Method using Concatenated Code for Scaling and Rotation Attacks Nobuhiro Hirata and Masaki Kawamura Graduate School of Science and Engineering, Yamaguchi University 677- Yoshida, Yamaguchi-shi,
More informationCOMPARISONS OF DCT-BASED AND DWT-BASED WATERMARKING TECHNIQUES
COMPARISONS OF DCT-BASED AND DWT-BASED WATERMARKING TECHNIQUES H. I. Saleh 1, M. E. Elhadedy 2, M. A. Ashour 1, M. A. Aboelsaud 3 1 Radiation Engineering Dept., NCRRT, AEA, Egypt. 2 Reactor Dept., NRC,
More informationNo Reference Medical Image Quality Measurement Based on Spread Spectrum and Discrete Wavelet Transform using ROI Processing
No Reference Medical Image Quality Measurement Based on Spread Spectrum and Discrete Wavelet Transform using ROI Processing Arash Ashtari Nakhaie, Shahriar Baradaran Shokouhi Iran University of Science
More informationReview and Implementation of DWT based Scalable Video Coding with Scalable Motion Coding.
Project Title: Review and Implementation of DWT based Scalable Video Coding with Scalable Motion Coding. Midterm Report CS 584 Multimedia Communications Submitted by: Syed Jawwad Bukhari 2004-03-0028 About
More informationRobust Image Watermarking based on DCT-DWT- SVD Method
Robust Image Watermarking based on DCT-DWT- SVD Sneha Jose Rajesh Cherian Roy, PhD. Sreenesh Shashidharan ABSTRACT Hybrid Image watermarking scheme proposed based on Discrete Cosine Transform (DCT)-Discrete
More informationSpeech Modulation for Image Watermarking
Speech Modulation for Image Watermarking Mourad Talbi 1, Ben Fatima Sira 2 1 Center of Researches and Technologies of Energy, Tunisia 2 Engineering School of Tunis, Tunisia Abstract Embedding a hidden
More informationA Novel Secure Digital Watermark Generation from Public Share by Using Visual Cryptography and MAC Techniques
Bashar S. Mahdi Alia K. Abdul Hassan Department of Computer Science, University of Technology, Baghdad, Iraq A Novel Secure Digital Watermark Generation from Public Share by Using Visual Cryptography and
More informationInvisible Watermarking Using Eludician Distance and DWT Technique
Invisible Watermarking Using Eludician Distance and DWT Technique AMARJYOTI BARSAGADE # AND AWADHESH K.G. KANDU* 2 # Department of Electronics and Communication Engineering, Gargi Institute of Science
More informationEnhancing the Image Compression Rate Using Steganography
The International Journal Of Engineering And Science (IJES) Volume 3 Issue 2 Pages 16-21 2014 ISSN(e): 2319 1813 ISSN(p): 2319 1805 Enhancing the Image Compression Rate Using Steganography 1, Archana Parkhe,
More informationCHAPTER-6 WATERMARKING OF JPEG IMAGES
CHAPTER-6 WATERMARKING OF JPEG IMAGES 6.1 INTRODUCTION In the Chapter 4, we have discussed that we can improve the robustness of DCT and DWT based watermarking schemes against some well known attacks by
More informationCombined Copyright Protection and Error Detection Scheme for H.264/AVC
Combined Copyright Protection and Error Detection Scheme for H.264/AVC XIAOMING CHEN, YUK YING CHUNG, FANGFEI XU, AHMED FAWZI OTOOM, *CHANGSEOK BAE School of Information Technologies, The University of
More informationA New DCT based Color Video Watermarking using Luminance Component
IOSR Journal of Computer Engineering (IOSR-JCE) e-issn: 2278-0661, p- ISSN: 2278-8727Volume 16, Issue 2, Ver. XII (Mar-Apr. 2014), PP 83-90 A New DCT based Color Video Watermarking using Luminance Component
More informationA Comparison of Still-Image Compression Standards Using Different Image Quality Metrics and Proposed Methods for Improving Lossy Image Quality
A Comparison of Still-Image Compression Standards Using Different Image Quality Metrics and Proposed Methods for Improving Lossy Image Quality Multidimensional DSP Literature Survey Eric Heinen 3/21/08
More informationCS 260: Seminar in Computer Science: Multimedia Networking
CS 260: Seminar in Computer Science: Multimedia Networking Jiasi Chen Lectures: MWF 4:10-5pm in CHASS http://www.cs.ucr.edu/~jiasi/teaching/cs260_spring17/ Multimedia is User perception Content creation
More informationAn Improved Images Watermarking Scheme Using FABEMD Decomposition and DCT
An Improved Images Watermarking Scheme Using FABEMD Decomposition and DCT Noura Aherrahrou and Hamid Tairi University Sidi Mohamed Ben Abdellah, Faculty of Sciences, Dhar El mahraz, LIIAN, Department of
More informationRobustness Test of Discrete Cosine Transform Algorithm in Digital Image Watermarking on Android Platform
B I O D I V E R S IT A S ISSN: 1412-033X Volume 16, Number 1, April 2015 E-ISSN: 2085-4722 Pages: xx-xx DOI: 10.13057/biodiv/d1601xx Robustness Test of Discrete Cosine Transform Algorithm in Digital Image
More informationImage Error Concealment Based on Watermarking
Image Error Concealment Based on Watermarking Shinfeng D. Lin, Shih-Chieh Shie and Jie-Wei Chen Department of Computer Science and Information Engineering,National Dong Hwa Universuty, Hualien, Taiwan,
More informationDIGITAL IMAGE WATERMARKING BASED ON A RELATION BETWEEN SPATIAL AND FREQUENCY DOMAINS
DIGITAL IMAGE WATERMARKING BASED ON A RELATION BETWEEN SPATIAL AND FREQUENCY DOMAINS Murat Furat Mustafa Oral e-mail: mfurat@cu.edu.tr e-mail: moral@mku.edu.tr Cukurova University, Faculty of Engineering,
More informationA New Watermarking Algorithm for Scanned Grey PDF Files Using Robust Logo and Hash Function
A New Watermarking Algorithm for Scanned Grey PDF Files Using Robust Logo and Hash Function Walid Alakk Electrical and Computer Engineering Department Khalifa University of Science, technology and Research
More informationA Robust Digital Watermarking Scheme using BTC-PF in Wavelet Domain
A Robust Digital Watermarking Scheme using BTC-PF in Wavelet Domain Chinmay Maiti a *, Bibhas Chandra Dhara b a Department of Computer Science & Engineering, College of Engineering & Management, Kolaghat,
More informationRobust and Imperceptible Image Watermarking by DC Coefficients Using Singular Value Decomposition
Robust and Imperceptible Image Watermarking by DC Coefficients Using Singular Value Decomposition Christy Atika Sari atika.sari@dsn.dinus.ac.id Eko Hari Rachmawanto eko.hari@dsn.dinus.ac.id De Rosal Ignatius
More informationDigital Image Watermarking Using DWT and SLR Technique Against Geometric Attacks
Digital Image Watermarking Using DWT and SLR Technique Against Geometric Attacks Sarvesh Kumar Yadav, Mrs. Shital Gupta, Prof. Vineet richariya Abstract- Now days digital watermarking is very popular field
More informationNon-fragile High quality Reversible Watermarking for Compressed PNG image format using Haar Wavelet Transforms and Constraint Difference Expansions
Non-fragile High quality Reversible Watermarking for Compressed PNG image format using Haar Wavelet Transforms and Constraint Difference Expansions Junkyu Park Department of Cyber Security, Sangmyung University,
More informationVIDEO WATERMARKING USING DCT AND DWT TRANSFORMS
International Journal of Advanced Research in Biology Engineering Science and Technology (IJARBEST) VIDEO WATERMARKING USING DCT AND DWT TRANSFORMS Saranya.U 1, Dr. C.Gowri shankar 2, Student Member, IEEE,P.
More informationAnalysis of Robustness of Digital Watermarking Techniques under Various Attacks
International Journal of Engineering Research and Development e-issn : 2278-067X, p-issn : 2278-800X, www.ijerd.com Volume 2, Issue 6 (August 2012), PP. 28-34 Analysis of Robustness of Digital Watermarking
More informationImage and Video Watermarking
Telecommunications Seminar WS 1998 Data Hiding, Digital Watermarking and Secure Communications Image and Video Watermarking Herbert Buchner University of Erlangen-Nuremberg 16.12.1998 Outline 1. Introduction:
More informationarxiv: v1 [cs.mm] 9 Aug 2017
Robust Video Watermarking against H.264 and H.265 Compression Attacks Nematollah Zarmehi 1* and Mohammad Javad Barikbin 2 1 Advanced Communication Research Institute, Electrical Engineering Department,
More informationSCALED WAVELET TRANSFORM VIDEO WATERMARKING METHOD USING HYBRID TECHNIQUE: SWT-SVD-DCT
SCALED WAVELET TRANSFORM VIDEO WATERMARKING METHOD USING HYBRID TECHNIQUE: SWT- Shaveta 1, Daljit Kaur 2 1 PG Scholar, 2 Assistant Professor, Dept of IT, Chandigarh Engineering College, Landran, Mohali,
More informationAdaptive Quantization for Video Compression in Frequency Domain
Adaptive Quantization for Video Compression in Frequency Domain *Aree A. Mohammed and **Alan A. Abdulla * Computer Science Department ** Mathematic Department University of Sulaimani P.O.Box: 334 Sulaimani
More informationImage Classification for JPEG Compression
Image Classification for Compression Jevgenij Tichonov Vilnius University, Institute of Mathematics and Informatics Akademijos str. 4 LT-08663, Vilnius jevgenij.tichonov@gmail.com Olga Kurasova Vilnius
More informationJPEG 2000 vs. JPEG in MPEG Encoding
JPEG 2000 vs. JPEG in MPEG Encoding V.G. Ruiz, M.F. López, I. García and E.M.T. Hendrix Dept. Computer Architecture and Electronics University of Almería. 04120 Almería. Spain. E-mail: vruiz@ual.es, mflopez@ace.ual.es,
More informationSpatial, Transform and Fractional Domain Digital Image Watermarking Techniques
Spatial, Transform and Fractional Domain Digital Image Watermarking Techniques Dr.Harpal Singh Professor, Chandigarh Engineering College, Landran, Mohali, Punjab, Pin code 140307, India Puneet Mehta Faculty,
More informationCHAPTER 4 REVERSIBLE IMAGE WATERMARKING USING BIT PLANE CODING AND LIFTING WAVELET TRANSFORM
74 CHAPTER 4 REVERSIBLE IMAGE WATERMARKING USING BIT PLANE CODING AND LIFTING WAVELET TRANSFORM Many data embedding methods use procedures that in which the original image is distorted by quite a small
More informationComparison of Wavelet Based Watermarking Techniques for Various Attacks
International Journal of Engineering and Technical Research (IJETR) ISSN: 2321-0869, Volume-3, Issue-4, April 2015 Comparison of Wavelet Based Watermarking Techniques for Various Attacks Sachin B. Patel,
More informationDIGITAL IMAGE WATERMARKING TECHNIQUES FOR IMAGES USING TWO-DIMENSIONAL WALSH CODING
DIGITAL IMAGE WATERMARKING TECHNIQUES FOR IMAGES USING TWO-DIMENSIONAL WALSH CODING Ajeet Pratap Singh 1, Sachin Kumar 2 1,2 Department of ECE, ASET, Amity University, Lucknow, U.P., (India) ABSTRACT The
More informationDigital Watermarking Using 2-DCT
Digital Watermarking Using 2-DCT Trapti Singh, NamitaArya University School of Information and Communication Technology, Guru Gobind Singh Indraprastha University, Dwarka, New Delhi, India traptisingh23@gmail.com,
More informationDigital Watermarking with Copyright Authentication for Image Communication
Digital Watermarking with Copyright Authentication for Image Communication Keta Raval Dept. of Electronics and Communication Patel Institute of Engineering and Science RGPV, Bhopal, M.P., India ketaraval@yahoo.com
More informationA new robust watermarking scheme based on PDE decomposition *
A new robust watermarking scheme based on PDE decomposition * Noura Aherrahrou University Sidi Mohamed Ben Abdellah Faculty of Sciences Dhar El mahraz LIIAN, Department of Informatics Fez, Morocco Hamid
More informationCompression of Stereo Images using a Huffman-Zip Scheme
Compression of Stereo Images using a Huffman-Zip Scheme John Hamann, Vickey Yeh Department of Electrical Engineering, Stanford University Stanford, CA 94304 jhamann@stanford.edu, vickey@stanford.edu Abstract
More informationMr Mohan A Chimanna 1, Prof.S.R.Khot 2
Digital Video Watermarking Techniques for Secure Multimedia Creation and Delivery Mr Mohan A Chimanna 1, Prof.S.R.Khot 2 1 Assistant Professor,Department of E&Tc, S.I.T.College of Engineering, Yadrav,Maharashtra,
More informationA Novel Approach for Deblocking JPEG Images
A Novel Approach for Deblocking JPEG Images Multidimensional DSP Final Report Eric Heinen 5/9/08 Abstract This paper presents a novel approach for deblocking JPEG images. First, original-image pixels are
More informationOpen Access Side-Informed Image Watermarking Scheme Based on Dither Modulation in the Frequency Domain
Send Orders for Reprints to reprints@benthamscience.net The Open Signal Processing Journal, 2013, 5, 1-6 1 Open Access Side-Informed Image ing Scheme Based on Dither Modulation in the Frequency Domain
More informationImage Authentication and Recovery Scheme Based on Watermarking Technique
Image Authentication and Recovery Scheme Based on Watermarking Technique KENJI SUMITOMO 1, MARIKO NAKANO 2, HECTOR PEREZ 2 1 Faculty of Information and Computer Engineering The University of Electro-Communications
More informationAddress for Correspondence
Research Article A ROBUST WATERMARKING APPROACH FOR RAW VIDEO AND IT S DSP IMPLEMENTATION 1 Deepa Satish Khadtare, 2 Prof.M.M.Jadhav, 3 Mr.Mahesh Khadtare Address for Correspondence 1 M.E.Electronics (Digital
More informationFRACTAL IMAGE COMPRESSION OF GRAYSCALE AND RGB IMAGES USING DCT WITH QUADTREE DECOMPOSITION AND HUFFMAN CODING. Moheb R. Girgis and Mohammed M.
322 FRACTAL IMAGE COMPRESSION OF GRAYSCALE AND RGB IMAGES USING DCT WITH QUADTREE DECOMPOSITION AND HUFFMAN CODING Moheb R. Girgis and Mohammed M. Talaat Abstract: Fractal image compression (FIC) is a
More informationA ROBUST WATERMARKING SCHEME BASED ON EDGE DETECTION AND CONTRAST SENSITIVITY FUNCTION
A ROBUST WATERMARKING SCHEME BASED ON EDGE DETECTION AND CONTRAST SENSITIVITY FUNCTION John N. Ellinas Department of Electronic Computer Systems,Technological Education Institute of Piraeus, 12244 Egaleo,
More informationA Robust Color Image Watermarking Using Maximum Wavelet-Tree Difference Scheme
A Robust Color Image Watermarking Using Maximum Wavelet-Tree ifference Scheme Chung-Yen Su 1 and Yen-Lin Chen 1 1 epartment of Applied Electronics Technology, National Taiwan Normal University, Taipei,
More informationStructural Similarity Based Image Quality Assessment Using Full Reference Method
From the SelectedWorks of Innovative Research Publications IRP India Spring April 1, 2015 Structural Similarity Based Image Quality Assessment Using Full Reference Method Innovative Research Publications,
More informationIMAGE COMPRESSION. Image Compression. Why? Reducing transportation times Reducing file size. A two way event - compression and decompression
IMAGE COMPRESSION Image Compression Why? Reducing transportation times Reducing file size A two way event - compression and decompression 1 Compression categories Compression = Image coding Still-image
More informationCHAPTER-4 WATERMARKING OF GRAY IMAGES
CHAPTER-4 WATERMARKING OF GRAY IMAGES 4.1 INTRODUCTION Like most DCT based watermarking schemes, Middle-Band Coefficient Exchange scheme has proven its robustness against those attacks, which anyhow, do
More informationInternational Journal of Advance Research in Computer Science and Management Studies
Volume 2, Issue 12, December 2014 ISSN: 2321 7782 (Online) International Journal of Advance Research in Computer Science and Management Studies Research Article / Survey Paper / Case Study Available online
More informationScalable Video Watermarking. Peter Meerwald June 25, 2007
Scalable Video Watermarking Peter Meerwald June 25, 2007 Watermarking Watermarking is imperceptible embedding of information into multimedia data [Cox02a] Applications: copyright protection, data authentication,
More informationIntroduction to Visible Watermarking. IPR Course: TA Lecture 2002/12/18 NTU CSIE R105
Introduction to Visible Watermarking IPR Course: TA Lecture 2002/12/18 NTU CSIE R105 Outline Introduction State-of of-the-art Characteristics of Visible Watermarking Schemes Attacking Visible Watermarking
More informationRegion Based Even Odd Watermarking Method With Fuzzy Wavelet
Region Based Even Odd Watermarking Method With Fuzzy Wavelet S.Maruthuperumal 1, G.Rosline Nesakumari 1, Dr.V.Vijayakumar 2 1 Research Scholar, Dr.MGR University Chennai. Associate Professor, GIET Rajahmundry,
More informationDigital Image Watermarking using Fuzzy Logic approach based on DWT and SVD
Digital Watermarking using Fuzzy Logic approach based on DWT and SVD T.Sridevi Associate Professor CBIT Hyderabad,India S Sameena Fatima,Ph.D Professor, OU, Hyderabad,India ABSTRACT Digital image watermarking
More informationComparison of Digital Image Watermarking Algorithms. Xu Zhou Colorado School of Mines December 1, 2014
Comparison of Digital Image Watermarking Algorithms Xu Zhou Colorado School of Mines December 1, 2014 Outlier Introduction Background on digital image watermarking Comparison of several algorithms Experimental
More informationA NEW ROBUST IMAGE WATERMARKING SCHEME BASED ON DWT WITH SVD
A NEW ROBUST IMAGE WATERMARKING SCHEME BASED ON WITH S.Shanmugaprabha PG Scholar, Dept of Computer Science & Engineering VMKV Engineering College, Salem India N.Malmurugan Director Sri Ranganathar Institute
More informationA Robust Wavelet-Based Watermarking Algorithm Using Edge Detection
A Robust Wavelet-Based Watermarking Algorithm Using Edge Detection John N. Ellinas Abstract In this paper, a robust watermarking algorithm using the wavelet transform and edge detection is presented. The
More informationDeblocking Filter Algorithm with Low Complexity for H.264 Video Coding
Deblocking Filter Algorithm with Low Complexity for H.264 Video Coding Jung-Ah Choi and Yo-Sung Ho Gwangju Institute of Science and Technology (GIST) 261 Cheomdan-gwagiro, Buk-gu, Gwangju, 500-712, Korea
More informationIntra-Mode Indexed Nonuniform Quantization Parameter Matrices in AVC/H.264
Intra-Mode Indexed Nonuniform Quantization Parameter Matrices in AVC/H.264 Jing Hu and Jerry D. Gibson Department of Electrical and Computer Engineering University of California, Santa Barbara, California
More informationVideo Compression An Introduction
Video Compression An Introduction The increasing demand to incorporate video data into telecommunications services, the corporate environment, the entertainment industry, and even at home has made digital
More informationCOMPARISON OF WATERMARKING TECHNIQUES DWT, DWT-DCT & DWT-DCT-PSO ON THE BASIS OF PSNR & MSE
COMPARISON OF WATERMARKING TECHNIQUES DWT, DWT-DCT & DWT-DCT-PSO ON THE BASIS OF PSNR & MSE Rashmi Dewangan 1, Yojana Yadav 2 1,2 Electronics and Telecommunication Department, Chhatrapati Shivaji Institute
More informationQR Code Watermarking Algorithm based on Wavelet Transform
2013 13th International Symposium on Communications and Information Technologies (ISCIT) QR Code Watermarking Algorithm based on Wavelet Transform Jantana Panyavaraporn 1, Paramate Horkaew 2, Wannaree
More informationJeff Hinson CS525, Spring 2010
DIGITAL WATERMARKING Jeff Hinson CS525, Spring 2010 Outline Introduction Challenges Algorithms / Methods Detection Existing Programs Lessons Learned / Conclusion Questions Jeff Hinson CS525 Slide #1 Introduction
More informationMedical Image Compression using DCT and DWT Techniques
Medical Image Compression using DCT and DWT Techniques Gullanar M. Hadi College of Engineering-Software Engineering Dept. Salahaddin University-Erbil, Iraq gullanarm@yahoo.com ABSTRACT In this paper we
More informationCombined Hashing/Watermarking Method for Image Authentication
Combined Hashing/Watermarking Method for Image Authentication Vlado Kitanovski, Dimitar Taskovski, and Sofija Bogdanova Abstract In this paper we present a combined hashing/watermarking method for image
More informationA NEW APPROACH OF DIGITAL IMAGE COPYRIGHT PROTECTION USING MULTI-LEVEL DWT ALGORITHM
A NEW APPROACH OF DIGITAL IMAGE COPYRIGHT PROTECTION USING MULTI-LEVEL DWT ALGORITHM Siva Prasad K, Ganesh Kumar N PG Student [DECS], Assistant professor, Dept of ECE, Thandrapaparaya Institute of science
More informationUniversity of Mustansiriyah, Baghdad, Iraq
Volume 5, Issue 9, September 2015 ISSN: 2277 128X International Journal of Advanced Research in Computer Science and Software Engineering Research Paper Available online at: www.ijarcsse.com Audio Compression
More informationThis document is downloaded from DR-NTU, Nanyang Technological University Library, Singapore.
This document is downloaded from DR-NTU, Nanyang Technological University Library, Singapore. Title A robust phase watermarking algorithm using conugate symmetric sequency-ordered complex Hadamard transform
More informationMRT based Fixed Block size Transform Coding
3 MRT based Fixed Block size Transform Coding Contents 3.1 Transform Coding..64 3.1.1 Transform Selection...65 3.1.2 Sub-image size selection... 66 3.1.3 Bit Allocation.....67 3.2 Transform coding using
More informationAn Improvement Technique based on Structural Similarity Thresholding for Digital Watermarking
An Improvement Technique based on Structural Similarity Thresholding for Digital Watermarking Amin Banitalebi-Dehkordi1, Mehdi Banitalebi-Dehkordi2, Jamshid Abouei3, and Said Nader-Esfahani4 1 Department
More informationAuthentication and Secret Message Transmission Technique Using Discrete Fourier Transformation
, 2009, 5, 363-370 doi:10.4236/ijcns.2009.25040 Published Online August 2009 (http://www.scirp.org/journal/ijcns/). Authentication and Secret Message Transmission Technique Using Discrete Fourier Transformation
More informationROBUST AND OBLIVIOUS IMAGE WATERMARKING SCHEME IN THE DWT DOMAIN USING GENETIC ALGORITHM K. Ramanjaneyulu 1, K. Rajarajeswari 2
Research Article ROBUST AND OBLIVIOUS IMAGE WATERMARKING SCHEME IN THE DWT DOMAIN USING GENETIC ALGORITHM K. Ramanjaneyulu, K. Rajarajeswari 2 Address for Correspondence Department of Electronics and Communications
More informationCISC 7610 Lecture 3 Multimedia data and data formats
CISC 7610 Lecture 3 Multimedia data and data formats Topics: Perceptual limits of multimedia data JPEG encoding of images MPEG encoding of audio MPEG and H.264 encoding of video Multimedia data: Perceptual
More informationLecture 8 JPEG Compression (Part 3)
CS 414 Multimedia Systems Design Lecture 8 JPEG Compression (Part 3) Klara Nahrstedt Spring 2012 Administrative MP1 is posted Today Covered Topics Hybrid Coding: JPEG Coding Reading: Section 7.5 out of
More informationA Print-Scan Resilient Watermarking based on Fourier Transform and Image Restoration
A Print-Scan Resilient Watermarking based on Fourier Transform and Image Restoration R. Riad H. Douzi M. El Hajji R. Harba PRISME, University of Orleans, Orléans, France F. Ros PRISME, University of Orleans,
More informationImproved Geometric Warping-Based Watermarking
Improved Geometric Warping-Based Watermarking Dima Pröfrock, Mathias Schlauweg, Erika Müller Institute of Communication Engineering, Faculty of Computer Science and Electrical Engineering, University of
More informationDIGITAL TELEVISION 1. DIGITAL VIDEO FUNDAMENTALS
DIGITAL TELEVISION 1. DIGITAL VIDEO FUNDAMENTALS Television services in Europe currently broadcast video at a frame rate of 25 Hz. Each frame consists of two interlaced fields, giving a field rate of 50
More informationOptimizing the Deblocking Algorithm for. H.264 Decoder Implementation
Optimizing the Deblocking Algorithm for H.264 Decoder Implementation Ken Kin-Hung Lam Abstract In the emerging H.264 video coding standard, a deblocking/loop filter is required for improving the visual
More informationFeature Based Watermarking Algorithm by Adopting Arnold Transform
Feature Based Watermarking Algorithm by Adopting Arnold Transform S.S. Sujatha 1 and M. Mohamed Sathik 2 1 Assistant Professor in Computer Science, S.T. Hindu College, Nagercoil, Tamilnadu, India 2 Associate
More informationA Blind Wavelet-Based Digital Watermarking for Video
International Journal of Video&Image Processing and Network Security IJVIPNS-IJENS Vol:09 No:09 37 A Blind Wavelet-Based Digital Watermarking for Video A.Essaouabi and F.Regragui Department of physics,
More informationVideo Compression Method for On-Board Systems of Construction Robots
Video Compression Method for On-Board Systems of Construction Robots Andrei Petukhov, Michael Rachkov Moscow State Industrial University Department of Automatics, Informatics and Control Systems ul. Avtozavodskaya,
More informationRobust Image Watermarking based on Discrete Wavelet Transform, Discrete Cosine Transform & Singular Value Decomposition
Advance in Electronic and Electric Engineering. ISSN 2231-1297, Volume 3, Number 8 (2013), pp. 971-976 Research India Publications http://www.ripublication.com/aeee.htm Robust Image Watermarking based
More informationAUDIOVISUAL COMMUNICATION
AUDIOVISUAL COMMUNICATION Laboratory Session: Discrete Cosine Transform Fernando Pereira The objective of this lab session about the Discrete Cosine Transform (DCT) is to get the students familiar with
More informationAN EFFICIENT VIDEO WATERMARKING USING COLOR HISTOGRAM ANALYSIS AND BITPLANE IMAGE ARRAYS
AN EFFICIENT VIDEO WATERMARKING USING COLOR HISTOGRAM ANALYSIS AND BITPLANE IMAGE ARRAYS G Prakash 1,TVS Gowtham Prasad 2, T.Ravi Kumar Naidu 3 1MTech(DECS) student, Department of ECE, sree vidyanikethan
More informationCOMPARISON BETWEEN TWO WATERMARKING ALGORITHMS USING DCT COEFFICIENT, AND LSB REPLACEMENT
COMPARISO BETWEE TWO WATERMARKIG ALGORITHMS USIG DCT COEFFICIET, AD LSB REPLACEMET Mona M. El-Ghoneimy Associate Professor, Elect. & Comm. Dept., Faculty of Engineering, Cairo University, Post code 12316
More informationA Novel Fast Self-restoration Semi-fragile Watermarking Algorithm for Image Content Authentication Resistant to JPEG Compression
A Novel Fast Self-restoration Semi-fragile Watermarking Algorithm for Image Content Authentication Resistant to JPEG Compression Hui Wang, Anthony TS Ho and Xi Zhao 24 th October 2011 Outline Background
More informationA New hybrid method in watermarking using DCT and AES
International Journal of Engineering Research and Development e-issn: 2278-067X, p-issn: 2278-800X, www.ijerd.com Volume 10, Issue 11 (November 2014), PP.64-69 A New hybrid method in watermarking using
More informationJPEG Copy Paste Forgery Detection Using BAG Optimized for Complex Images
JPEG Copy Paste Forgery Detection Using BAG Optimized for Complex Images Dessalegn Atnafu AYALNEH*, Hyoung Joong KIM*, Yong Soo CHOI** *CIST (Center for Information Security Technologies), Korea University
More informationVideo Watermarking using Fractal Encoding & RLE Encoding
Video Watermarking using Fractal Encoding & RLE Encoding Navdeep Kaur Research Scholar, CEC Landran, Mohali, India. Er. Amandeep Mavi Assistant Professor, CEC Landran, Mohali, India. Abstract Compression
More informationInformation and Communications Security: Encryption and Information Hiding
Short Course on Information and Communications Security: Encryption and Information Hiding Tuesday, 10 March Friday, 13 March, 2015 Lecture 10: Information Hiding Contents Covert Encryption Principles
More information