The DCT domain and JPEG

Size: px
Start display at page:

Download "The DCT domain and JPEG"

Transcription

1 The DCT domain and JPEG CSM25 Secure Information Hiding Dr Hans Georg Schaathun University of Surrey Spring 2009 Week 3 Dr Hans Georg Schaathun The DCT domain and JPEG Spring 2009 Week 3 1 / 47

2 Learning Objectives Be able to work with and JPEG images and other representations in the transform domain. Understand what happens during JPEG compression, and its potential consequence to watermarking and steganography. Be able to apply simple LSB embedding in the JPEG domain. Dr Hans Georg Schaathun The DCT domain and JPEG Spring 2009 Week 3 2 / 47

3 Outline Overview 1 Overview 2 Image Representation 3 Compression 4 Steganography in JPEG 5 Matlab Dr Hans Georg Schaathun The DCT domain and JPEG Spring 2009 Week 3 3 / 47

4 Overview The elements of JPEG Operates on luminence and chrominance (YCbCr) (not on RGB) Grayscale images have luminence component only. Downsampling Works in the DCT domain (not the spatial domain) Quantisation Entropy coding (lossless compression) Dr Hans Georg Schaathun The DCT domain and JPEG Spring 2009 Week 3 4 / 47

5 Overview JPEG is not a file format JPEG is a compression system The system employs three different compression techniques JPEG is not a file format. Files with extension.jpeg are often JFIF or EXIF. JFIF is traditionally the most common file format for JPEG. EXIF is made for digital cameras and contain extra meta information. Dr Hans Georg Schaathun The DCT domain and JPEG Spring 2009 Week 3 5 / 47

6 Overview Reading Core Reading Digital Image Processing Using MATLAB. Chapter 6: colour images Representation Processing Conversion Chapter 8.5: JPEG compression Chapter 4: Frequency domain processing Dr Hans Georg Schaathun The DCT domain and JPEG Spring 2009 Week 3 6 / 47

7 Outline Image Representation 1 Overview 2 Image Representation Alternatives to RGB The blockwise DCT domain 3 Compression 4 Steganography in JPEG 5 Matlab Dr Hans Georg Schaathun The DCT domain and JPEG Spring 2009 Week 3 7 / 47

8 Image Representation Alternatives to RGB The RGB colour representations RGB : A colour is a vector (R, G, B) R is amount of red light. G is amount of green light. B is amount of blue light. Each pixel can be either A colour vector (R, G, B); or a reference to an array of colour vectors (the palette) Each coefficient can be [0, 1]; floating point (double in matlab) {0, 1,..., 255}; 8-bit integer (uint8 in matlab) {0, 1,..., }; 16-bit integer (uint16 in matlab) Dr Hans Georg Schaathun The DCT domain and JPEG Spring 2009 Week 3 8 / 47

9 Alternatives to RGB Image Representation Alternatives to RGB NTSC : (Y, I, Q) where R, G, B [0, 1]. YCbCr : (Y, Cb, Cr) Y R I = G Q B Y R Cb = G Cr B where R, G, B [0, 1] and Y, Cb, Cr [0, 255]. Dr Hans Georg Schaathun The DCT domain and JPEG Spring 2009 Week 3 9 / 47

10 Image Representation The blockwise DCT domain Block-wise Each colour-channel (Y,Cb,Cr) considered separately M N matrix divided into 8 8 blocks Each block is handled separately Dr Hans Georg Schaathun The DCT domain and JPEG Spring 2009 Week 3 10 / 47

11 The DCT transform Image Representation The blockwise DCT domain Several different DCT transform. We use the following. T f (u, v) = M 1 N 1 x=0 y=0 α(u)α(v) f (x, y) cos MN (2x + 1)uπ 2M cos (2y + 1)vπ 2N where α(a) = M = N = 8, { 1, if a = 0, 2, otherwise. Dr Hans Georg Schaathun The DCT domain and JPEG Spring 2009 Week 3 11 / 47

12 The DCT transform Image Representation The blockwise DCT domain The inverse is similar f (x, y) = M 1 N 1 u=0 v=0 α(u)α(v) T f (u, v) cos MN (2x + 1)uπ 2M cos (2y + 1)vπ 2N where α(a) = M = N = 8, { 1, if a = 0, 2, otherwise. Dr Hans Georg Schaathun The DCT domain and JPEG Spring 2009 Week 3 12 / 47

13 Image Representation The blockwise DCT domain Matlab Matlab functions dct2 (2D DCT transform) idct2 (Inverse) blkproc ( X, [M N], FUN ) For instance blkproc ( X, [8 ) Use help system for details Do not use imread for JPEG images converts images to the spatial domain. you don t even know the compression parameters... Dr Hans Georg Schaathun The DCT domain and JPEG Spring 2009 Week 3 13 / 47

14 Image Representation The blockwise DCT domain Transform image Linear combination of patterns (see right) DC (upper left) gives average colour intensity Low frequency: coarse structure High frequency: fine details Dr Hans Georg Schaathun The DCT domain and JPEG Spring 2009 Week 3 14 / 47

15 Outline Compression 1 Overview 2 Image Representation 3 Compression Downsampling Quantisation Source Coding 4 Steganography in JPEG 5 Matlab Dr Hans Georg Schaathun The DCT domain and JPEG Spring 2009 Week 3 15 / 47

16 Compression Downsampling What is sampling? Fact The human eye is more sensitive to changes in luminance than in chrominance. To sample is to collect measurements. Each pixel is a sample (measuring the colour of the image). Lower resolution means fewer samples. Reducing resolution = downsampling Basic M N image: N M samples per component (Y, Cb, Cr). Y is more useful than Cb and Cr. Therefore we can downsample Cb and Cr M/2 N/2 is common for Cb and Cr Still use M M for Y Dr Hans Georg Schaathun The DCT domain and JPEG Spring 2009 Week 3 16 / 47

17 Compression Downsampling What is sampling? Fact The human eye is more sensitive to changes in luminance than in chrominance. To sample is to collect measurements. Each pixel is a sample (measuring the colour of the image). Lower resolution means fewer samples. Reducing resolution = downsampling Basic M N image: N M samples per component (Y, Cb, Cr). Y is more useful than Cb and Cr. Therefore we can downsample Cb and Cr M/2 N/2 is common for Cb and Cr Still use M M for Y Dr Hans Georg Schaathun The DCT domain and JPEG Spring 2009 Week 3 16 / 47

18 Compression Downsampling What is sampling? Fact The human eye is more sensitive to changes in luminance than in chrominance. To sample is to collect measurements. Each pixel is a sample (measuring the colour of the image). Lower resolution means fewer samples. Reducing resolution = downsampling Basic M N image: N M samples per component (Y, Cb, Cr). Y is more useful than Cb and Cr. Therefore we can downsample Cb and Cr M/2 N/2 is common for Cb and Cr Still use M M for Y Dr Hans Georg Schaathun The DCT domain and JPEG Spring 2009 Week 3 16 / 47

19 Compression Downsampling What is sampling? Fact The human eye is more sensitive to changes in luminance than in chrominance. To sample is to collect measurements. Each pixel is a sample (measuring the colour of the image). Lower resolution means fewer samples. Reducing resolution = downsampling Basic M N image: N M samples per component (Y, Cb, Cr). Y is more useful than Cb and Cr. Therefore we can downsample Cb and Cr M/2 N/2 is common for Cb and Cr Still use M M for Y Dr Hans Georg Schaathun The DCT domain and JPEG Spring 2009 Week 3 16 / 47

20 Compression Downsampling What is sampling? Fact The human eye is more sensitive to changes in luminance than in chrominance. To sample is to collect measurements. Each pixel is a sample (measuring the colour of the image). Lower resolution means fewer samples. Reducing resolution = downsampling Basic M N image: N M samples per component (Y, Cb, Cr). Y is more useful than Cb and Cr. Therefore we can downsample Cb and Cr M/2 N/2 is common for Cb and Cr Still use M M for Y Dr Hans Georg Schaathun The DCT domain and JPEG Spring 2009 Week 3 16 / 47

21 Compression Downsampling What is sampling? Fact The human eye is more sensitive to changes in luminance than in chrominance. To sample is to collect measurements. Each pixel is a sample (measuring the colour of the image). Lower resolution means fewer samples. Reducing resolution = downsampling Basic M N image: N M samples per component (Y, Cb, Cr). Y is more useful than Cb and Cr. Therefore we can downsample Cb and Cr M/2 N/2 is common for Cb and Cr Still use M M for Y Dr Hans Georg Schaathun The DCT domain and JPEG Spring 2009 Week 3 16 / 47

22 Compression Downsampling What is sampling? Fact The human eye is more sensitive to changes in luminance than in chrominance. To sample is to collect measurements. Each pixel is a sample (measuring the colour of the image). Lower resolution means fewer samples. Reducing resolution = downsampling Basic M N image: N M samples per component (Y, Cb, Cr). Y is more useful than Cb and Cr. Therefore we can downsample Cb and Cr M/2 N/2 is common for Cb and Cr Still use M M for Y Dr Hans Georg Schaathun The DCT domain and JPEG Spring 2009 Week 3 16 / 47

23 Compression Downsampling What is sampling? Fact The human eye is more sensitive to changes in luminance than in chrominance. To sample is to collect measurements. Each pixel is a sample (measuring the colour of the image). Lower resolution means fewer samples. Reducing resolution = downsampling Basic M N image: N M samples per component (Y, Cb, Cr). Y is more useful than Cb and Cr. Therefore we can downsample Cb and Cr M/2 N/2 is common for Cb and Cr Still use M M for Y Dr Hans Georg Schaathun The DCT domain and JPEG Spring 2009 Week 3 16 / 47

24 Compression Downsampling What is sampling? Fact The human eye is more sensitive to changes in luminance than in chrominance. To sample is to collect measurements. Each pixel is a sample (measuring the colour of the image). Lower resolution means fewer samples. Reducing resolution = downsampling Basic M N image: N M samples per component (Y, Cb, Cr). Y is more useful than Cb and Cr. Therefore we can downsample Cb and Cr M/2 N/2 is common for Cb and Cr Still use M M for Y Dr Hans Georg Schaathun The DCT domain and JPEG Spring 2009 Week 3 16 / 47

25 Compression Downsampling What is sampling? Fact The human eye is more sensitive to changes in luminance than in chrominance. To sample is to collect measurements. Each pixel is a sample (measuring the colour of the image). Lower resolution means fewer samples. Reducing resolution = downsampling Basic M N image: N M samples per component (Y, Cb, Cr). Y is more useful than Cb and Cr. Therefore we can downsample Cb and Cr M/2 N/2 is common for Cb and Cr Still use M M for Y Dr Hans Georg Schaathun The DCT domain and JPEG Spring 2009 Week 3 16 / 47

26 Compression Downsampling What do we save? Original: M N pixels 3 components. Compressed: 2 M 2 N 2 + M N = 11 2 M N Ratio We just saved 50% Compressed Original = MN 3MN = 1 2. Dr Hans Georg Schaathun The DCT domain and JPEG Spring 2009 Week 3 17 / 47

27 Compression Downsampling What do we save? Original: M N pixels 3 components. Compressed: 2 M 2 N 2 + M N = 11 2 M N Ratio We just saved 50% Compressed Original = MN 3MN = 1 2. Dr Hans Georg Schaathun The DCT domain and JPEG Spring 2009 Week 3 17 / 47

28 Compression Downsampling What do we save? Original: M N pixels 3 components. Compressed: 2 M 2 N 2 + M N = 11 2 M N Ratio We just saved 50% Compressed Original = MN 3MN = 1 2. Dr Hans Georg Schaathun The DCT domain and JPEG Spring 2009 Week 3 17 / 47

29 Compression Downsampling What do we save? Original: M N pixels 3 components. Compressed: 2 M 2 N 2 + M N = 11 2 M N Ratio We just saved 50% Compressed Original = MN 3MN = 1 2. Dr Hans Georg Schaathun The DCT domain and JPEG Spring 2009 Week 3 17 / 47

30 Compression Downsampling Chrominance versus Luminence Fact The human eye is more sensitive to changes in luminance than in chrominance. Watermarking tend to embed in Y (luminence) Embedding in Cb and Cr would more easily be destroyed by JPEG Dr Hans Georg Schaathun The DCT domain and JPEG Spring 2009 Week 3 18 / 47

31 Compression Downsampling Chrominance versus Luminence Fact The human eye is more sensitive to changes in luminance than in chrominance. Watermarking tend to embed in Y (luminence) Embedding in Cb and Cr would more easily be destroyed by JPEG Dr Hans Georg Schaathun The DCT domain and JPEG Spring 2009 Week 3 18 / 47

32 Compression Downsampling Chrominance versus Luminence Fact The human eye is more sensitive to changes in luminance than in chrominance. Watermarking tend to embed in Y (luminence) Embedding in Cb and Cr would more easily be destroyed by JPEG Dr Hans Georg Schaathun The DCT domain and JPEG Spring 2009 Week 3 18 / 47

33 Compression Downsampling Downsampling in JPEG 1 Translation to YCbCr. 2 Downsampling 3 DCT transform Each downsampled component matrix Y, Cb, Cr is Divided into 8 8 blocks DCT transformed blockwise An 8 8 block in Cb can be associated with 1,2 or 4 Y blocks depending on downsampling. Dr Hans Georg Schaathun The DCT domain and JPEG Spring 2009 Week 3 19 / 47

34 What is quantisation? Rounding in general Compression Quantisation Rounding numbers is quantisation. Measuring gives continuous numbers Whether you measure pixel luminence, or the length of your garage. No matter how close to points are, there is a point in between. However, our precision is limited. We give lengths to the nearest unit. Luminence is categorised into 256 intervals (8bit integers). Computer memory is finite, 256 different possibilites for a byte Dr Hans Georg Schaathun The DCT domain and JPEG Spring 2009 Week 3 20 / 47

35 Compression Quantisation Quantisation in JPEG Quantisation in the DCT domain Each coefficient is divided by the quantisation constant. The result is rounded to nearest integer. Different quantisation constants for each coefficient in the block. Dr Hans Georg Schaathun The DCT domain and JPEG Spring 2009 Week 3 21 / 47

36 Compression Quantisation Example Quantisation in JPEG DCT matrix Quantisation matrix / Quantised DCT matrix Example from Wikipedia. Dr Hans Georg Schaathun The DCT domain and JPEG Spring 2009 Week 3 22 / 47

37 Entropy Coding Compression Source Coding Recall Observe 0 is extremely common ±1 is common Two-digit numbers are very rare This is typical Dr Hans Georg Schaathun The DCT domain and JPEG Spring 2009 Week 3 23 / 47

38 Entropy Coding Compression Source Coding In order to compress the data Use few bits (short codewords) for frequent symbols Many bits (long codewords) only for rare symbols Usually, JPEG uses a simple Huffman code. it can use other codes (saving space, but computionally costly) For instance, a single short codeword to say the rest of the block is zero Dr Hans Georg Schaathun The DCT domain and JPEG Spring 2009 Week 3 24 / 47

39 Outline Steganography in JPEG 1 Overview 2 Image Representation 3 Compression 4 Steganography in JPEG Into the compressed domain JSteg and OutGuess Matlab Dr Hans Georg Schaathun The DCT domain and JPEG Spring 2009 Week 3 25 / 47

40 Steganography in JPEG Before or after compression Into the compressed domain pixmap message LSB embedding JPEG compression stegoimage pixmap JPEG compression message LSB embedding stegoimage Dr Hans Georg Schaathun The DCT domain and JPEG Spring 2009 Week 3 26 / 47

41 Steganography in JPEG Into the compressed domain Fragility of LSB LSB embedding is criticised for being fragile JPEG removes insignificant information... such as the LSB JPEG compression after embedding (probably) ruins the message When is this a problem? Dr Hans Georg Schaathun The DCT domain and JPEG Spring 2009 Week 3 27 / 47

42 Steganography in JPEG When fragility is a problem Into the compressed domain It is a problem in robust watermarking JPEG compression is common-place most applications need robustness If the purpose is steganography, and Alice and Bob are allowed to exchange pixmaps, then it is not a problem. Obviously, if your steganogram is supposed to be JPEG... Do not do LSB in the pixmap. Dr Hans Georg Schaathun The DCT domain and JPEG Spring 2009 Week 3 28 / 47

43 Steganography in JPEG When fragility is a problem Into the compressed domain It is a problem in robust watermarking JPEG compression is common-place most applications need robustness If the purpose is steganography, and Alice and Bob are allowed to exchange pixmaps, then it is not a problem. Obviously, if your steganogram is supposed to be JPEG... Do not do LSB in the pixmap. Dr Hans Georg Schaathun The DCT domain and JPEG Spring 2009 Week 3 28 / 47

44 Steganography in JPEG When fragility is a problem Into the compressed domain It is a problem in robust watermarking JPEG compression is common-place most applications need robustness If the purpose is steganography, and Alice and Bob are allowed to exchange pixmaps, then it is not a problem. Obviously, if your steganogram is supposed to be JPEG... Do not do LSB in the pixmap. Dr Hans Georg Schaathun The DCT domain and JPEG Spring 2009 Week 3 28 / 47

45 Steganography in JPEG Into the compressed domain Double compression Common bug in existing software Read an arbitrary image file JPEG is decompressed on reading... pixmap Embedding works on JPEG image is compressed to produce JPEG signal quality factor (QF) either default or supplied by user A JPEG steganogram has now been compressed twice different QF produces an artifact Is there any reason for de- and recompressing? Dr Hans Georg Schaathun The DCT domain and JPEG Spring 2009 Week 3 29 / 47

46 Important lessons Steganography in JPEG Into the compressed domain 1 Do not make unnecessary image conversions. 2 Many techniques apply to any format LSB applies to JPEG signals... but it is called Jsteg 3 Use a technique which fits the target (stego-) format i.e. the format you are allowed to use on the channel. Dr Hans Georg Schaathun The DCT domain and JPEG Spring 2009 Week 3 30 / 47

47 Steganography in JPEG Into the compressed domain Main development The past at a glance Core Reading Hide and Seek: An Introduction to Steganography by Niels Provos and Peter Honeyman, in IEEE Security & Privacy JSteg was published 2 JSteg was broken 3 OutGuess was published 4 OutGuess was broken 5 F5 was published 6 F5 was broken Dr Hans Georg Schaathun The DCT domain and JPEG Spring 2009 Week 3 31 / 47

48 Steganography in JPEG Into the compressed domain Main development The past at a glance Core Reading Hide and Seek: An Introduction to Steganography by Niels Provos and Peter Honeyman, in IEEE Security & Privacy JSteg was published 2 JSteg was broken 3 OutGuess was published 4 OutGuess was broken 5 F5 was published 6 F5 was broken Dr Hans Georg Schaathun The DCT domain and JPEG Spring 2009 Week 3 31 / 47

49 Steganography in JPEG Into the compressed domain Main development The past at a glance Core Reading Hide and Seek: An Introduction to Steganography by Niels Provos and Peter Honeyman, in IEEE Security & Privacy JSteg was published 2 JSteg was broken 3 OutGuess was published 4 OutGuess was broken 5 F5 was published 6 F5 was broken Dr Hans Georg Schaathun The DCT domain and JPEG Spring 2009 Week 3 31 / 47

50 Steganography in JPEG Into the compressed domain Main development The past at a glance Core Reading Hide and Seek: An Introduction to Steganography by Niels Provos and Peter Honeyman, in IEEE Security & Privacy JSteg was published 2 JSteg was broken 3 OutGuess was published 4 OutGuess was broken 5 F5 was published 6 F5 was broken Dr Hans Georg Schaathun The DCT domain and JPEG Spring 2009 Week 3 31 / 47

51 Steganography in JPEG Into the compressed domain Main development The past at a glance Core Reading Hide and Seek: An Introduction to Steganography by Niels Provos and Peter Honeyman, in IEEE Security & Privacy JSteg was published 2 JSteg was broken 3 OutGuess was published 4 OutGuess was broken 5 F5 was published 6 F5 was broken Dr Hans Georg Schaathun The DCT domain and JPEG Spring 2009 Week 3 31 / 47

52 Steganography in JPEG Into the compressed domain Main development The past at a glance Core Reading Hide and Seek: An Introduction to Steganography by Niels Provos and Peter Honeyman, in IEEE Security & Privacy JSteg was published 2 JSteg was broken 3 OutGuess was published 4 OutGuess was broken 5 F5 was published 6 F5 was broken Dr Hans Georg Schaathun The DCT domain and JPEG Spring 2009 Week 3 31 / 47

53 Steganography in JPEG JSteg and OutGuess 0.1 The JSteg algorithm JSteg denotes a software package. Approach: simple LSB in the DCT domain. No different from LSB in the spatial domain χ 2 analysis applies Dr Hans Georg Schaathun The DCT domain and JPEG Spring 2009 Week 3 32 / 47

54 Steganography in JPEG JSteg and OutGuess 0.1 Pseudocode The JSteg algorithm Input: Image I, Message m Output: Image J for each bit b of m c := next DCT coefficient from I while c = 0 or c = 1, c := next DCT coefficient from I end while c := c c mod 2 + b replace coefficient in I by c end for May ignore high and/or low frequency coefficients Dr Hans Georg Schaathun The DCT domain and JPEG Spring 2009 Week 3 33 / 47

55 Bitflips in JSteg Steganography in JPEG JSteg and OutGuess 0.1 Cover Stego Typical JPEG. Typical JSteg. Dr Hans Georg Schaathun The DCT domain and JPEG Spring 2009 Week 3 34 / 47

56 Pros and Cons Steganography in JPEG JSteg and OutGuess 0.1 Why is JSteg important? First publicly available solution. Simple solution What are the disadvantages? Similar to LSB in Spatial domain. Histogramme analysis applies χ 2 /pairs of values applies Dr Hans Georg Schaathun The DCT domain and JPEG Spring 2009 Week 3 35 / 47

57 Pros and Cons Steganography in JPEG JSteg and OutGuess 0.1 Why is JSteg important? First publicly available solution. Simple solution What are the disadvantages? Similar to LSB in Spatial domain. Histogramme analysis applies χ 2 /pairs of values applies Dr Hans Georg Schaathun The DCT domain and JPEG Spring 2009 Week 3 35 / 47

58 Pros and Cons Steganography in JPEG JSteg and OutGuess 0.1 Why is JSteg important? First publicly available solution. Simple solution What are the disadvantages? Similar to LSB in Spatial domain. Histogramme analysis applies χ 2 /pairs of values applies Dr Hans Georg Schaathun The DCT domain and JPEG Spring 2009 Week 3 35 / 47

59 Pros and Cons Steganography in JPEG JSteg and OutGuess 0.1 Why is JSteg important? First publicly available solution. Simple solution What are the disadvantages? Similar to LSB in Spatial domain. Histogramme analysis applies χ 2 /pairs of values applies Dr Hans Georg Schaathun The DCT domain and JPEG Spring 2009 Week 3 35 / 47

60 Pros and Cons Steganography in JPEG JSteg and OutGuess 0.1 Why is JSteg important? First publicly available solution. Simple solution What are the disadvantages? Similar to LSB in Spatial domain. Histogramme analysis applies χ 2 /pairs of values applies Dr Hans Georg Schaathun The DCT domain and JPEG Spring 2009 Week 3 35 / 47

61 Pros and Cons Steganography in JPEG JSteg and OutGuess 0.1 Why is JSteg important? First publicly available solution. Simple solution What are the disadvantages? Similar to LSB in Spatial domain. Histogramme analysis applies χ 2 /pairs of values applies Dr Hans Georg Schaathun The DCT domain and JPEG Spring 2009 Week 3 35 / 47

62 Pros and Cons Steganography in JPEG JSteg and OutGuess 0.1 Why is JSteg important? First publicly available solution. Simple solution What are the disadvantages? Similar to LSB in Spatial domain. Histogramme analysis applies χ 2 /pairs of values applies Dr Hans Georg Schaathun The DCT domain and JPEG Spring 2009 Week 3 35 / 47

63 Steganography in JPEG JSteg and OutGuess 0.1 Outguess 0.1 How can we improve JSteg? How did we improve LSB in the Spatial Domain? Solution Choose random coefficients from the entire image. Dr Hans Georg Schaathun The DCT domain and JPEG Spring 2009 Week 3 36 / 47

64 Steganography in JPEG JSteg and OutGuess 0.1 Outguess 0.1 How can we improve JSteg? How did we improve LSB in the Spatial Domain? Solution Choose random coefficients from the entire image. Dr Hans Georg Schaathun The DCT domain and JPEG Spring 2009 Week 3 36 / 47

65 Steganography in JPEG JSteg and OutGuess 0.1 Outguess 0.1 How can we improve JSteg? How did we improve LSB in the Spatial Domain? Solution Choose random coefficients from the entire image. Dr Hans Georg Schaathun The DCT domain and JPEG Spring 2009 Week 3 36 / 47

66 Steganography in JPEG JSteg and OutGuess 0.1 Pseudocode Outguess 0.1 Input: Image I, Message m, Key k Output: Image J Seed PRNG with k for each bit b of m c := pseudo-random DCT coefficient from I while c = 0 or c = 1, c := pseudo-random DCT coefficient from I end while c := c c mod 2 + b replace coefficient in I by c end for May ignore high and/or low frequency coefficients Dr Hans Georg Schaathun The DCT domain and JPEG Spring 2009 Week 3 37 / 47

67 Histogramme analysis Steganalysis Steganography in JPEG JSteg and OutGuess Pairs of values Generalised χ 2 works 2 Symmetry Embedding exchange and 2 1. The DCT histogramme is expected to be symmetric Outguess/JSteg destroy the symmetry. Dr Hans Georg Schaathun The DCT domain and JPEG Spring 2009 Week 3 38 / 47

68 Outline Matlab 1 Overview 2 Image Representation 3 Compression 4 Steganography in JPEG 5 Matlab The JPEG toolbox Randomness Masking Dr Hans Georg Schaathun The DCT domain and JPEG Spring 2009 Week 3 39 / 47

69 JPEG Toolbox Reading a JPEG image Matlab The JPEG toolbox» im = jpeg_read ( Kerckhoffs.jpg ) im = image_width: 180 image_height: 247 image_components: 3 image_color_space: 2 jpeg_components: 3 jpeg_color_space: 3 comments: {} coef_arrays: {[248x184 double] [128x96 double] [128x96 quant_tables: {[8x8 double] [8x8 double]} ac_huff_tables: [1x2 struct] dc_huff_tables: [1x2 struct] optimize_coding: 0 comp_info: [1x3 struct] progressive_mode: 0» Dr Hans Georg Schaathun The DCT domain and JPEG Spring 2009 Week 3 40 / 47

70 JPEG Toolbox JPEG data Matlab The JPEG toolbox» Xy = im.coef_arrays{im.comp_info(1).component_id} ;» whos Xy Name Size Bytes Class Attributes Xy 248x double» Q = im.quant_tables{im.comp_info(1).quant_tbl_no} Q =» Dr Hans Georg Schaathun The DCT domain and JPEG Spring 2009 Week 3 41 / 47

71 Matlab The JPEG toolbox w/o the toolbox Load/Save workspace jpeg_read and jpeg_write are compiled functions, Available on web page for Intel/Linux and Intel/Windows Compilation required for other systems. If you have trouble with the toolbox, it is possible to load/save files as Matlab workspaces.» load image.mat» whos Name Size Bytes Class Attributes im 1x struct There is one mat-file for each image on the web page Dr Hans Georg Schaathun The DCT domain and JPEG Spring 2009 Week 3 42 / 47

72 Other toolbox functions Matlab The JPEG toolbox If you want to write your own (de)compressor, the following functions are useful. bdct, ibdct, quantize, dequantize Dr Hans Georg Schaathun The DCT domain and JPEG Spring 2009 Week 3 43 / 47

73 Matlab Randomness Pseudo-random number generators A pseudo-random number generator (PRNG) finite state machine starting state given by user input the seed each transition outputs a number observing a sequence of number, it is computationally infeasible to predict the next number looks random It is deterministic if sender and receiver share the seed (a key) they can generate the same sequence Dr Hans Georg Schaathun The DCT domain and JPEG Spring 2009 Week 3 44 / 47

74 Random locations Matlab Randomness Many ways to do it but some makes it hard to avoid using the same pixel twice A simple approach 1 randomly permute the pixels 2 embed in the first pixels in the permuted sequence 3 reverse the permutation If the sender and receiver use the same PRNG seed, they get the same pseudo-random permutation Dr Hans Georg Schaathun The DCT domain and JPEG Spring 2009 Week 3 45 / 47

75 Matlab functions Matlab Randomness Many functions using a PRNG rand, randperm, randn And one dedicated for performing random permutations new = randintrlv ( old, seed ) the seed is given directly when the permutation is used reverse: old = randdeintrlv ( new, seed ) new/old should be a 1D vector serialise the image into a vector (im(:)) before randintrlv reshape ( vector, [ N, M ] ) to recover the 2D image after randdeintrlv Dr Hans Georg Schaathun The DCT domain and JPEG Spring 2009 Week 3 46 / 47

76 Matlab Masking Masking Boolean matrix as index Matlab allows Boolean (logical) matrices as indices Say A is an n m matrix B = logical(ones(n,m)) B(1,1) = 0 A(B) will be all elements of A except (1, 1) repmat(b,m,n) replicates B to form a larger matrix m times the heigh n times the width How do you extract the AC coefficients in a JPEG image? Make an 8 8 mask of ones Set the DC entry to 0, e.g. (1, 1) Replicate the mask using repmat Dr Hans Georg Schaathun The DCT domain and JPEG Spring 2009 Week 3 47 / 47

77 Matlab Masking Masking Boolean matrix as index Matlab allows Boolean (logical) matrices as indices Say A is an n m matrix B = logical(ones(n,m)) B(1,1) = 0 A(B) will be all elements of A except (1, 1) repmat(b,m,n) replicates B to form a larger matrix m times the heigh n times the width How do you extract the AC coefficients in a JPEG image? Make an 8 8 mask of ones Set the DC entry to 0, e.g. (1, 1) Replicate the mask using repmat Dr Hans Georg Schaathun The DCT domain and JPEG Spring 2009 Week 3 47 / 47

78 Matlab Masking Masking Boolean matrix as index Matlab allows Boolean (logical) matrices as indices Say A is an n m matrix B = logical(ones(n,m)) B(1,1) = 0 A(B) will be all elements of A except (1, 1) repmat(b,m,n) replicates B to form a larger matrix m times the heigh n times the width How do you extract the AC coefficients in a JPEG image? Make an 8 8 mask of ones Set the DC entry to 0, e.g. (1, 1) Replicate the mask using repmat Dr Hans Georg Schaathun The DCT domain and JPEG Spring 2009 Week 3 47 / 47

INF5063: Programming heterogeneous multi-core processors. September 17, 2010

INF5063: Programming heterogeneous multi-core processors. September 17, 2010 INF5063: Programming heterogeneous multi-core processors September 17, 2010 High data volumes: Need for compression PAL video sequence 25 images per second 3 bytes per pixel RGB (red-green-blue values)

More information

Introduction ti to JPEG

Introduction ti to JPEG Introduction ti to JPEG JPEG: Joint Photographic Expert Group work under 3 standards: ISO, CCITT, IEC Purpose: image compression Compression accuracy Works on full-color or gray-scale image Color Grayscale

More information

Steganography using Odd-even Based Embedding and Compensation Procedure to Restore Histogram

Steganography using Odd-even Based Embedding and Compensation Procedure to Restore Histogram , October 24-26, 2012, San Francisco, USA Steganography using Odd-even Based Embedding and Compensation Procedure to Restore Histogram Neeta Nain, Jaideep Singh, Ishan Dayma, Rajesh Meena The authors are

More information

Breaking the OutGuess

Breaking the OutGuess Breaking the OutGuess Jessica Fridrich, Miroslav Goljan, Dorin Hogea * presented by Deepa Kundur Department of Electrical and Computer Engineering * Department of Computer Science SUNY Binghamton, Binghamton,

More information

Features. Sequential encoding. Progressive encoding. Hierarchical encoding. Lossless encoding using a different strategy

Features. Sequential encoding. Progressive encoding. Hierarchical encoding. Lossless encoding using a different strategy JPEG JPEG Joint Photographic Expert Group Voted as international standard in 1992 Works with color and grayscale images, e.g., satellite, medical,... Motivation: The compression ratio of lossless methods

More information

Steganography: Hiding Data In Plain Sight. Ryan Gibson

Steganography: Hiding Data In Plain Sight. Ryan Gibson Steganography: Hiding Data In Plain Sight Ryan Gibson What Is Steganography? The practice of concealing messages or information within other nonsecret text or data. Comes from the Greek words steganos

More information

AN ANALYSIS OF VARIOUS STEGANOGRAPHIC ALGORITHMS

AN ANALYSIS OF VARIOUS STEGANOGRAPHIC ALGORITHMS AN ANALYSIS OF VARIOUS STEGANOGRAPHIC ALGORITHMS Chinchu Elza Andrews 1, Iwin Thanakumar Joseph 2 1. Post Graduate Student, Department of Computer Science and Engineering, Karunya University, India 2.

More information

IMAGE COMPRESSION USING FOURIER TRANSFORMS

IMAGE COMPRESSION USING FOURIER TRANSFORMS IMAGE COMPRESSION USING FOURIER TRANSFORMS Kevin Cherry May 2, 2008 Math 4325 Compression is a technique for storing files in less space than would normally be required. This in general, has two major

More information

Multimedia Systems Image III (Image Compression, JPEG) Mahdi Amiri April 2011 Sharif University of Technology

Multimedia Systems Image III (Image Compression, JPEG) Mahdi Amiri April 2011 Sharif University of Technology Course Presentation Multimedia Systems Image III (Image Compression, JPEG) Mahdi Amiri April 2011 Sharif University of Technology Image Compression Basics Large amount of data in digital images File size

More information

Image Compression Techniques

Image Compression Techniques ME 535 FINAL PROJECT Image Compression Techniques Mohammed Abdul Kareem, UWID: 1771823 Sai Krishna Madhavaram, UWID: 1725952 Palash Roychowdhury, UWID:1725115 Department of Mechanical Engineering University

More information

Wireless Communication

Wireless Communication Wireless Communication Systems @CS.NCTU Lecture 6: Image Instructor: Kate Ching-Ju Lin ( 林靖茹 ) Chap. 9 of Fundamentals of Multimedia Some reference from http://media.ee.ntu.edu.tw/courses/dvt/15f/ 1 Outline

More information

Lecture 5: Compression I. This Week s Schedule

Lecture 5: Compression I. This Week s Schedule Lecture 5: Compression I Reading: book chapter 6, section 3 &5 chapter 7, section 1, 2, 3, 4, 8 Today: This Week s Schedule The concept behind compression Rate distortion theory Image compression via DCT

More information

An introduction to JPEG compression using MATLAB

An introduction to JPEG compression using MATLAB An introduction to JPEG compression using MATLAB Arno Swart 30 October, 2003 1 Introduction This document describes the popular JPEG still image coding format. The aim is to compress images while maintaining

More information

A Reversible Data Hiding Scheme For JPEG Images

A Reversible Data Hiding Scheme For JPEG Images A Reversible Data Hiding Scheme For JPEG Images Qiming Li, Yongdong Wu, and Feng Bao Institute for Infocomm Research, A*Star, Singapore {qli,wydong,baofeng}@i2r.a-star.edu.sg Abstract. When JPEG images

More information

2.2: Images and Graphics Digital image representation Image formats and color models JPEG, JPEG2000 Image synthesis and graphics systems

2.2: Images and Graphics Digital image representation Image formats and color models JPEG, JPEG2000 Image synthesis and graphics systems Chapter 2: Representation of Multimedia Data Audio Technology Images and Graphics Video Technology Chapter 3: Multimedia Systems Communication Aspects and Services Chapter 4: Multimedia Systems Storage

More information

Digital Image Representation. Image Representation. Color Models

Digital Image Representation. Image Representation. Color Models Digital Representation Chapter : Representation of Multimedia Data Audio Technology s and Graphics Video Technology Chapter 3: Multimedia Systems Communication Aspects and Services Chapter 4: Multimedia

More information

DigiPoints Volume 1. Student Workbook. Module 8 Digital Compression

DigiPoints Volume 1. Student Workbook. Module 8 Digital Compression Digital Compression Page 8.1 DigiPoints Volume 1 Module 8 Digital Compression Summary This module describes the techniques by which digital signals are compressed in order to make it possible to carry

More information

Lecture 8 JPEG Compression (Part 3)

Lecture 8 JPEG Compression (Part 3) CS 414 Multimedia Systems Design Lecture 8 JPEG Compression (Part 3) Klara Nahrstedt Spring 2011 Administrative MP1 is posted Extended Deadline of MP1 is February 18 Friday midnight submit via compass

More information

Jeff Hinson CS525, Spring 2010

Jeff Hinson CS525, Spring 2010 DIGITAL WATERMARKING Jeff Hinson CS525, Spring 2010 Outline Introduction Challenges Algorithms / Methods Detection Existing Programs Lessons Learned / Conclusion Questions Jeff Hinson CS525 Slide #1 Introduction

More information

Robert Matthew Buckley. Nova Southeastern University. Dr. Laszlo. MCIS625 On Line. Module 2 Graphics File Format Essay

Robert Matthew Buckley. Nova Southeastern University. Dr. Laszlo. MCIS625 On Line. Module 2 Graphics File Format Essay 1 Robert Matthew Buckley Nova Southeastern University Dr. Laszlo MCIS625 On Line Module 2 Graphics File Format Essay 2 JPEG COMPRESSION METHOD Joint Photographic Experts Group (JPEG) is the most commonly

More information

Digital Image Representation Image Compression

Digital Image Representation Image Compression Digital Image Representation Image Compression 1 Image Representation Standards Need for compression Compression types Lossless compression Lossy compression Image Compression Basics Redundancy/redundancy

More information

In 2001, US officials stated that they have suspicions that terrorists communicate using steganography in the internet.

In 2001, US officials stated that they have suspicions that terrorists communicate using steganography in the internet. Statistical Steganalysis CHAPTER. INTRODUCTION. Steganography Steganography is an art of secret communications. Its main purpose is to hide the occurrence of communication over a public channel. In contrast

More information

ECE 417 Guest Lecture Video Compression in MPEG-1/2/4. Min-Hsuan Tsai Apr 02, 2013

ECE 417 Guest Lecture Video Compression in MPEG-1/2/4. Min-Hsuan Tsai Apr 02, 2013 ECE 417 Guest Lecture Video Compression in MPEG-1/2/4 Min-Hsuan Tsai Apr 2, 213 What is MPEG and its standards MPEG stands for Moving Picture Expert Group Develop standards for video/audio compression

More information

JPEG. Wikipedia: Felis_silvestris_silvestris.jpg, Michael Gäbler CC BY 3.0

JPEG. Wikipedia: Felis_silvestris_silvestris.jpg, Michael Gäbler CC BY 3.0 JPEG Wikipedia: Felis_silvestris_silvestris.jpg, Michael Gäbler CC BY 3.0 DFT vs. DCT Image Compression Image compression system Input Image MAPPER QUANTIZER SYMBOL ENCODER Compressed output Image Compression

More information

Steganography. Brent McClain Rob Carey

Steganography. Brent McClain Rob Carey Steganography Brent McClain Rob Carey What is Steganography Greek Origin Steganos means covered Graph means writing Hiding information in plain sight Cover Image Another image hidden in the picture Created

More information

Lecture 8 JPEG Compression (Part 3)

Lecture 8 JPEG Compression (Part 3) CS 414 Multimedia Systems Design Lecture 8 JPEG Compression (Part 3) Klara Nahrstedt Spring 2012 Administrative MP1 is posted Today Covered Topics Hybrid Coding: JPEG Coding Reading: Section 7.5 out of

More information

Chaos-based Modified EzStego Algorithm for Improving Security of Message Hiding in GIF Image

Chaos-based Modified EzStego Algorithm for Improving Security of Message Hiding in GIF Image 015 International Conference on Computer, Control, Informatics and Its Applications Chaos-based Modified EzStego Algorithm for Improving Security of Message Hiding in GIF Image Rinaldi Munir Informatics

More information

compression and coding ii

compression and coding ii compression and coding ii Ole-Johan Skrede 03.05.2017 INF2310 - Digital Image Processing Department of Informatics The Faculty of Mathematics and Natural Sciences University of Oslo After original slides

More information

7: Image Compression

7: Image Compression 7: Image Compression Mark Handley Image Compression GIF (Graphics Interchange Format) PNG (Portable Network Graphics) MNG (Multiple-image Network Graphics) JPEG (Join Picture Expert Group) 1 GIF (Graphics

More information

EMPIRICAL ANALYSIS ON STEGANOGRAPHY USING JSTEG, OUTGUESS 0.1 AND F5 ALGORITHMS

EMPIRICAL ANALYSIS ON STEGANOGRAPHY USING JSTEG, OUTGUESS 0.1 AND F5 ALGORITHMS EMPIRICAL ANALYSIS ON STEGANOGRAPHY USING JSTEG, OUTGUESS 0.1 AND F5 ALGORITHMS Dr. N.MANOHARAN 1 Dr.R.BALASUBRAMANIAN 2 S.UMA NANDHINI 3 V.SUJATHA 4 1 Assistant Professor in Department of Computer Science,

More information

HYBRID TRANSFORMATION TECHNIQUE FOR IMAGE COMPRESSION

HYBRID TRANSFORMATION TECHNIQUE FOR IMAGE COMPRESSION 31 st July 01. Vol. 41 No. 005-01 JATIT & LLS. All rights reserved. ISSN: 199-8645 www.jatit.org E-ISSN: 1817-3195 HYBRID TRANSFORMATION TECHNIQUE FOR IMAGE COMPRESSION 1 SRIRAM.B, THIYAGARAJAN.S 1, Student,

More information

Multimedia Signals and Systems Still Image Compression - JPEG

Multimedia Signals and Systems Still Image Compression - JPEG Multimedia Signals and Systems Still Image Compression - JPEG Kunio Takaya Electrical and Computer Engineering University of Saskatchewan January 27, 2008 ** Go to full-screen mode now by hitting CTRL-L

More information

Compression-Compatible Fragile and Semi-Fragile Tamper Detection

Compression-Compatible Fragile and Semi-Fragile Tamper Detection Compression-Compatible Fragile and Semi-Fragile Tamper Detection Lisa M. Marvel George W. Hartwig, Jr. Charles Boncelet, Jr. Presentation by Peter Macko Motivation Direct Applications Establishing credibility

More information

F5 A Steganographic Algorithm

F5 A Steganographic Algorithm F5 A Steganographic Algorithm High Capacity Despite Better Steganalysis 1 Outline Benefits of F5 Properties of existing tools From Jsteg to F5 How secure is F5? My challenge to you 2 Benefits of F5 High

More information

LETTER Improvement of JPEG Compression Efficiency Using Information Hiding and Image Restoration

LETTER Improvement of JPEG Compression Efficiency Using Information Hiding and Image Restoration IEICE TRANS. INF. & SYST., VOL.E96 D, NO.5 MAY 2013 1233 LETTER Improvement of JPEG Compression Efficiency Using Information Hiding and Image Restoration Kazumi YAMAWAKI, Member, Fumiya NAKANO, Student

More information

Compression II: Images (JPEG)

Compression II: Images (JPEG) Compression II: Images (JPEG) What is JPEG? JPEG: Joint Photographic Expert Group an international standard in 1992. Works with colour and greyscale images Up 24 bit colour images (Unlike GIF) Target Photographic

More information

Ian Snyder. December 14, 2009

Ian Snyder. December 14, 2009 PEG mage an Snyder December 14, 2009 Complete... Abstract This paper will outline the process of PEG image compression and the use of linear algebra as part of this process. t will introduce the reasons

More information

Video Compression An Introduction

Video Compression An Introduction Video Compression An Introduction The increasing demand to incorporate video data into telecommunications services, the corporate environment, the entertainment industry, and even at home has made digital

More information

Digital Image Processing

Digital Image Processing Lecture 9+10 Image Compression Lecturer: Ha Dai Duong Faculty of Information Technology 1. Introduction Image compression To Solve the problem of reduncing the amount of data required to represent a digital

More information

Forensic analysis of JPEG image compression

Forensic analysis of JPEG image compression Forensic analysis of JPEG image compression Visual Information Privacy and Protection (VIPP Group) Course on Multimedia Security 2015/2016 Introduction Summary Introduction The JPEG (Joint Photographic

More information

Image Steganography (cont.)

Image Steganography (cont.) Image Steganography (cont.) 2.2) Image Steganography: Use of Discrete Cosine Transform (DCT) DCT is one of key components of JPEG compression JPEG algorithm: (1) algorithm is split in 8x8 pixel squares

More information

JPEG Modes of Operation. Nimrod Peleg Dec. 2005

JPEG Modes of Operation. Nimrod Peleg Dec. 2005 JPEG Modes of Operation Nimrod Peleg Dec. 2005 Color Space Conversion Example: R G B = Y Cb Cr Remember: all JPEG process is operating on YCbCr color space! Down-Sampling Another optional action is down-sampling

More information

JPEG decoding using end of block markers to concurrently partition channels on a GPU. Patrick Chieppe (u ) Supervisor: Dr.

JPEG decoding using end of block markers to concurrently partition channels on a GPU. Patrick Chieppe (u ) Supervisor: Dr. JPEG decoding using end of block markers to concurrently partition channels on a GPU Patrick Chieppe (u5333226) Supervisor: Dr. Eric McCreath JPEG Lossy compression Widespread image format Introduction

More information

Digital Image Steganography Techniques: Case Study. Karnataka, India.

Digital Image Steganography Techniques: Case Study. Karnataka, India. ISSN: 2320 8791 (Impact Factor: 1.479) Digital Image Steganography Techniques: Case Study Santosh Kumar.S 1, Archana.M 2 1 Department of Electronicsand Communication Engineering, Sri Venkateshwara College

More information

COLOR IMAGE COMPRESSION USING DISCRETE COSINUS TRANSFORM (DCT)

COLOR IMAGE COMPRESSION USING DISCRETE COSINUS TRANSFORM (DCT) COLOR IMAGE COMPRESSION USING DISCRETE COSINUS TRANSFORM (DCT) Adietiya R. Saputra Fakultas Ilmu Komputer dan Teknologi Informasi, Universitas Gunadarma Jl. Margonda Raya no. 100, Depok 16424, Jawa Barat

More information

Topics. Number Theory Review. Public Key Cryptography

Topics. Number Theory Review. Public Key Cryptography Public Key Cryptography Topics 1. Number Theory Review 2. Public Key Cryptography 3. One-Way Trapdoor Functions 4. Diffie-Helman Key Exchange 5. RSA Cipher 6. Modern Steganography Number Theory Review

More information

VC 12/13 T16 Video Compression

VC 12/13 T16 Video Compression VC 12/13 T16 Video Compression Mestrado em Ciência de Computadores Mestrado Integrado em Engenharia de Redes e Sistemas Informáticos Miguel Tavares Coimbra Outline The need for compression Types of redundancy

More information

Secure Information Hiding Portfolio. Ruoxi Li

Secure Information Hiding Portfolio. Ruoxi Li Secure Information Hiding Portfolio Ruoxi Li 6075338 1 Chi-Square Test and Steganalysis This section uses two scenarios to evaluate the chi-square test function and discusses several factors that may affect

More information

Hiding of Random Permutated Encrypted Text using LSB Steganography with Random Pixels Generator

Hiding of Random Permutated Encrypted Text using LSB Steganography with Random Pixels Generator Hiding of Random Permutated Encrypted Text using LSB Steganography with Random Pixels Generator Noor Kareem Jumaa Department of Computer Technology Engineering Al-Mansour University College, Iraq ABSTRACT

More information

CMPT 365 Multimedia Systems. Media Compression - Image

CMPT 365 Multimedia Systems. Media Compression - Image CMPT 365 Multimedia Systems Media Compression - Image Spring 2017 Edited from slides by Dr. Jiangchuan Liu CMPT365 Multimedia Systems 1 Facts about JPEG JPEG - Joint Photographic Experts Group International

More information

Enhancing the Image Compression Rate Using Steganography

Enhancing the Image Compression Rate Using Steganography The International Journal Of Engineering And Science (IJES) Volume 3 Issue 2 Pages 16-21 2014 ISSN(e): 2319 1813 ISSN(p): 2319 1805 Enhancing the Image Compression Rate Using Steganography 1, Archana Parkhe,

More information

A Image Comparative Study using DCT, Fast Fourier, Wavelet Transforms and Huffman Algorithm

A Image Comparative Study using DCT, Fast Fourier, Wavelet Transforms and Huffman Algorithm International Journal of Engineering Research and General Science Volume 3, Issue 4, July-August, 15 ISSN 91-2730 A Image Comparative Study using DCT, Fast Fourier, Wavelet Transforms and Huffman Algorithm

More information

SD 575 Image Processing

SD 575 Image Processing SD 575 Image Processing Fall 2014 Lab 5: Image Compression and Segmentation Due Thursday November 27 at 10:30am (in class/email) Note: All lab reports will be submitted as hard or soft copies to Robert

More information

SECURITY METHOD FOR COMBINATION STEGANOGRAPHY ALGORITHMS ON TRANSFORM DOMAIN FOR JPEG IMAGES

SECURITY METHOD FOR COMBINATION STEGANOGRAPHY ALGORITHMS ON TRANSFORM DOMAIN FOR JPEG IMAGES INTERNATIONAL JOURNAL ON SMART SENSING AND INTELLIGENT SYSTEMS VOL. 7, NO. 4, DECEMBER 2014 SECURITY METHOD FOR COMBINATION STEGANOGRAPHY ALGORITHMS ON TRANSFORM DOMAIN FOR JPEG IMAGES Hamdan L. Jaheel

More information

DIGITAL TELEVISION 1. DIGITAL VIDEO FUNDAMENTALS

DIGITAL TELEVISION 1. DIGITAL VIDEO FUNDAMENTALS DIGITAL TELEVISION 1. DIGITAL VIDEO FUNDAMENTALS Television services in Europe currently broadcast video at a frame rate of 25 Hz. Each frame consists of two interlaced fields, giving a field rate of 50

More information

AUDIOVISUAL COMMUNICATION

AUDIOVISUAL COMMUNICATION AUDIOVISUAL COMMUNICATION Laboratory Session: Discrete Cosine Transform Fernando Pereira The objective of this lab session about the Discrete Cosine Transform (DCT) is to get the students familiar with

More information

AN4996 Application note

AN4996 Application note Application note Hardware JPEG codec peripheral in STM32F76/77xxx and STM32H7x3 line microcontrollers Introduction This application note describes the use of the hardware JPEG codec peripheral for JPEG

More information

7.5 Dictionary-based Coding

7.5 Dictionary-based Coding 7.5 Dictionary-based Coding LZW uses fixed-length code words to represent variable-length strings of symbols/characters that commonly occur together, e.g., words in English text LZW encoder and decoder

More information

The term, steganography, comes from Greek roots, Image steganography and steganalysis Mayra Bachrach and Frank Y.

The term, steganography, comes from Greek roots, Image steganography and steganalysis Mayra Bachrach and Frank Y. Image steganography and steganalysis Mayra Bachrach and Frank Y. Shih Image steganography is used to embed covert messages in the form of files, text, or other images in digital images. The intent is to

More information

Watermarking Moble Phone Color Images With Error Correction Codes

Watermarking Moble Phone Color Images With Error Correction Codes IOSR Journal of Electronics & Communication Engineering (IOSR-JECE) ISSN(e) : 2278-1684 ISSN(p) : 2320-334X, PP 05-09 www.iosrjournals.org Watermarking Moble Phone Color Images With Error Correction Codes

More information

A Steganography method for JPEG2000 Baseline System

A Steganography method for JPEG2000 Baseline System A Steganography method for JPEG2000 Baseline System P.Ramakrishna Rao M.Tech.,[CSE], Teaching Associate, Department of Computer Science, Dr.B.R.Ambedkar University, Etcherla Srikaulam, 532 410. Abstract

More information

Image, video and audio coding concepts. Roadmap. Rationale. Stefan Alfredsson. (based on material by Johan Garcia)

Image, video and audio coding concepts. Roadmap. Rationale. Stefan Alfredsson. (based on material by Johan Garcia) Image, video and audio coding concepts Stefan Alfredsson (based on material by Johan Garcia) Roadmap XML Data structuring Loss-less compression (huffman, LZ77,...) Lossy compression Rationale Compression

More information

Bit Adjusting Image Steganography in Blue Channel using AES and Secured Hash Function

Bit Adjusting Image Steganography in Blue Channel using AES and Secured Hash Function Available Online at www.ijcsmc.com International Journal of Computer Science and Mobile Computing A Monthly Journal of Computer Science and Information Technology ISSN 2320 088X IMPACT FACTOR: 6.017 IJCSMC,

More information

Nios II Embedded Electronic Photo Album

Nios II Embedded Electronic Photo Album Nios II Embedded Electronic Photo Album Second Prize Nios II Embedded Electronic Photo Album Institution: Participants: Instructor: Electrical Engineering Institute, St. John s University Hong-Zhi Zhang,

More information

JPEG Compression Using MATLAB

JPEG Compression Using MATLAB JPEG Compression Using MATLAB Anurag, Sonia Rani M.Tech Student, HOD CSE CSE Department, ITS Bhiwani India ABSTRACT Creating, editing, and generating s in a very regular system today is a major priority.

More information

Compression of Stereo Images using a Huffman-Zip Scheme

Compression of Stereo Images using a Huffman-Zip Scheme Compression of Stereo Images using a Huffman-Zip Scheme John Hamann, Vickey Yeh Department of Electrical Engineering, Stanford University Stanford, CA 94304 jhamann@stanford.edu, vickey@stanford.edu Abstract

More information

Sign-up Sheet posted outside of my office HFH 1121

Sign-up Sheet posted outside of my office HFH 1121 Lecture 14: Digital Watermarking II Some slides from Prof. M. Wu, UMCP Lab2 Demo Csil Monday: May 24, 1 4pm Optional (9:30 11am) 10 minutes per Group 5 Minutes Presentation 5 Minutes Demo Sign-up Sheet

More information

Invisible Image Watermarking Using Hybrid DWT Compression-Decompression Technique

Invisible Image Watermarking Using Hybrid DWT Compression-Decompression Technique Invisible Image Watermarking Using Hybrid DWT Compression-Decompression Technique A. Shesha Chary 1 M.Tech in DSCE B. Srinivas 2 Assistant Professor K. Ashok Babu 3 professor & HOD Dept of ECE Synopsis:

More information

Digital Video Processing

Digital Video Processing Video signal is basically any sequence of time varying images. In a digital video, the picture information is digitized both spatially and temporally and the resultant pixel intensities are quantized.

More information

ROI Based Image Compression in Baseline JPEG

ROI Based Image Compression in Baseline JPEG 168-173 RESEARCH ARTICLE OPEN ACCESS ROI Based Image Compression in Baseline JPEG M M M Kumar Varma #1, Madhuri. Bagadi #2 Associate professor 1, M.Tech Student 2 Sri Sivani College of Engineering, Department

More information

Lecture 6 Introduction to JPEG compression

Lecture 6 Introduction to JPEG compression INF5442/INF9442 Image Sensor Circuits and Systems Lecture 6 Introduction to JPEG compression 11-October-2017 Course Project schedule Task/milestone Start Finish Decide topic and high level requirements

More information

2014 Summer School on MPEG/VCEG Video. Video Coding Concept

2014 Summer School on MPEG/VCEG Video. Video Coding Concept 2014 Summer School on MPEG/VCEG Video 1 Video Coding Concept Outline 2 Introduction Capture and representation of digital video Fundamentals of video coding Summary Outline 3 Introduction Capture and representation

More information

Color Imaging Seminar. Yair Moshe

Color Imaging Seminar. Yair Moshe Color Imaging Seminar Lecture in the subject of Yair Moshe Nov. 24 th, 2004 Original by Yair Moshe - November, 2004 Extended By Hagit Hel-Or June 2007 Additional Sources: Dr. Philip TseMultimedia Coding

More information

Robbery Detection Camera

Robbery Detection Camera Robbery Detection Camera Vincenzo Caglioti Simone Gasparini Giacomo Boracchi Pierluigi Taddei Alessandro Giusti Camera and DSP 2 Camera used VGA camera (640x480) [Y, Cb, Cr] color coding, chroma interlaced

More information

Steganography and Steganalysis

Steganography and Steganalysis Steganography and Steganalysis J.R. Krenn January 2004 What is steganography? Steganography, coming from the Greek words stegos, meaning roof or covered and graphia which means writing, is the art and

More information

Content-independent steganography and steganalysis of JPEG images

Content-independent steganography and steganalysis of JPEG images Content-independent steganography and steganalysis of JPEG images Mohammad Rezaei Security Analysis Laboratory Tehran, Iran rezaei@salab.ir M. Bagher Salahshoor Security Analysis Laboratory Tehran, Iran

More information

Introduction to Video Compression

Introduction to Video Compression Insight, Analysis, and Advice on Signal Processing Technology Introduction to Video Compression Jeff Bier Berkeley Design Technology, Inc. info@bdti.com http://www.bdti.com Outline Motivation and scope

More information

A Secure Image Communication Scheme based on combination of Compression, Cryptography and Steganography

A Secure Image Communication Scheme based on combination of Compression, Cryptography and Steganography A Secure Image Communication Scheme based on combination of Compression, Cryptography and Steganography Bhavya Ahuja 1, S. K. Muttoo 2, Deepika Aggarwal 3 ABSTRACT In this paper we propose a new technique

More information

Steganography: Dct Coefficient Replacement Method and Compare With JSteg Algorithm

Steganography: Dct Coefficient Replacement Method and Compare With JSteg Algorithm Steganography: Dct Coefficient Replacement Method and Compare With JSteg Algorithm Hossein Sheisi, Jafar Mesgarian, and Mostafa Rahmani Abstract Due to the rapid development in digital communication through

More information

Interframe coding A video scene captured as a sequence of frames can be efficiently coded by estimating and compensating for motion between frames pri

Interframe coding A video scene captured as a sequence of frames can be efficiently coded by estimating and compensating for motion between frames pri MPEG MPEG video is broken up into a hierarchy of layer From the top level, the first layer is known as the video sequence layer, and is any self contained bitstream, for example a coded movie. The second

More information

Steganalysis Techniques: A Comparative Study

Steganalysis Techniques: A Comparative Study University of New Orleans ScholarWorks@UNO University of New Orleans Theses and Dissertations Dissertations and Theses 5-18-2007 Steganalysis Techniques: A Comparative Study Swaroop Kumar Pedda Reddy University

More information

Lecture 3 Image and Video (MPEG) Coding

Lecture 3 Image and Video (MPEG) Coding CS 598KN Advanced Multimedia Systems Design Lecture 3 Image and Video (MPEG) Coding Klara Nahrstedt Fall 2017 Overview JPEG Compression MPEG Basics MPEG-4 MPEG-7 JPEG COMPRESSION JPEG Compression 8x8 blocks

More information

DIGITAL IMAGE WATERMARKING BASED ON A RELATION BETWEEN SPATIAL AND FREQUENCY DOMAINS

DIGITAL IMAGE WATERMARKING BASED ON A RELATION BETWEEN SPATIAL AND FREQUENCY DOMAINS DIGITAL IMAGE WATERMARKING BASED ON A RELATION BETWEEN SPATIAL AND FREQUENCY DOMAINS Murat Furat Mustafa Oral e-mail: mfurat@cu.edu.tr e-mail: moral@mku.edu.tr Cukurova University, Faculty of Engineering,

More information

Abstract. Keywords: Semi-fragile watermarking, DCT embedding, Localisation, Restoration

Abstract. Keywords: Semi-fragile watermarking, DCT embedding, Localisation, Restoration Abstract This report introduces two semi-fragile watermarking algorithms in details, including how they are deigned and implemented using Matlab. The first algorithm relies on embedding the watermark,

More information

Image Compression Standard: Jpeg/Jpeg 2000

Image Compression Standard: Jpeg/Jpeg 2000 Image Compression Standard: Jpeg/Jpeg 2000 Sebastiano Battiato, Ph.D. battiato@dmi.unict.it Image Compression Standard LOSSLESS compression GIF, BMP RLE, (PkZip). Mainly based on the elimination of spatial

More information

VIDEO SIGNALS. Lossless coding

VIDEO SIGNALS. Lossless coding VIDEO SIGNALS Lossless coding LOSSLESS CODING The goal of lossless image compression is to represent an image signal with the smallest possible number of bits without loss of any information, thereby speeding

More information

Motivation. Gray Levels

Motivation. Gray Levels Motivation Image Intensity and Point Operations Dr. Edmund Lam Department of Electrical and Electronic Engineering The University of Hong ong A digital image is a matrix of numbers, each corresponding

More information

Image Compression Algorithm and JPEG Standard

Image Compression Algorithm and JPEG Standard International Journal of Scientific and Research Publications, Volume 7, Issue 12, December 2017 150 Image Compression Algorithm and JPEG Standard Suman Kunwar sumn2u@gmail.com Summary. The interest in

More information

JPEG Compression. What is JPEG?

JPEG Compression. What is JPEG? JPEG Compression Michael W. Chou Scott Siegrist EEA Spring April, Professor Ingrid Verbauwhede What is JPEG? JPEG is short for the 'Joint Photographic Experts Group'. The JPEG standard is fairly complex

More information

The Core Technology of Digital TV

The Core Technology of Digital TV the Japan-Vietnam International Student Seminar on Engineering Science in Hanoi The Core Technology of Digital TV Kosuke SATO Osaka University sato@sys.es.osaka-u.ac.jp November 18-24, 2007 What is compression

More information

From Wikipedia, the free encyclopedia

From Wikipedia, the free encyclopedia JPEG Page 1 of 9 From Wikipedia, the free encyclopedia (Redirected from JPEG file format) In computing, JPEG (pronounced JAY-peg) is a commonly used standard method of compression for photographic images.

More information

Index. 1. Motivation 2. Background 3. JPEG Compression The Discrete Cosine Transformation Quantization Coding 4. MPEG 5.

Index. 1. Motivation 2. Background 3. JPEG Compression The Discrete Cosine Transformation Quantization Coding 4. MPEG 5. Index 1. Motivation 2. Background 3. JPEG Compression The Discrete Cosine Transformation Quantization Coding 4. MPEG 5. Literature Lossy Compression Motivation To meet a given target bit-rate for storage

More information

CS1114 Assignment 5 Part 1

CS1114 Assignment 5 Part 1 CS1114 Assignment 5 Part 1 out: Friday, March 30, 2012. due: Friday, April 6, 2012, 9PM. This assignment covers two topics: upscaling pixel art and steganography. This document is organized into those

More information

A Blind Steganalysis on JPEG Gray Level Image Based on Statistical Features and its Performance Analysis

A Blind Steganalysis on JPEG Gray Level Image Based on Statistical Features and its Performance Analysis International Journal of Engineering Research and Development e-issn: 2278-067X, p-issn: 2278-800X, www.ijerd.com Volume 11, Issue 09 (September 2015), PP.27-31 A Blind Steganalysis on JPEG Gray Level

More information

STEGANALYSIS OF STEGOSTORAGE LIBRARY

STEGANALYSIS OF STEGOSTORAGE LIBRARY t m Mathematical Publications DOI: 10.1515/tmmp-2016-0034 Tatra Mt. Math. Publ. 67 (2016), 99 116 STEGANALYSIS OF STEGOSTORAGE LIBRARY Michala Gulášová Matúš Jókay ABSTRACT. The main goal of this research

More information

Lab # 2 - ACS I Part I - DATA COMPRESSION in IMAGE PROCESSING using SVD

Lab # 2 - ACS I Part I - DATA COMPRESSION in IMAGE PROCESSING using SVD Lab # 2 - ACS I Part I - DATA COMPRESSION in IMAGE PROCESSING using SVD Goals. The goal of the first part of this lab is to demonstrate how the SVD can be used to remove redundancies in data; in this example

More information

Steganography and Steganalysis of JPEG Images

Steganography and Steganalysis of JPEG Images DEPARTMENT OF COMPUTER AND INFORMATION SCIENCES AND ENGINEERING PH.D. PROPOSAL Steganography and Steganalysis of JPEG Images Supervisory Committee: Author: Mahendra Kumar makumar@cise.ufl.edu Dr. Richard

More information

Quo Vadis JPEG : Future of ISO /T.81

Quo Vadis JPEG : Future of ISO /T.81 Quo Vadis JPEG : Future of ISO 10918-1/T.81 10918/T.81 is still the dominant standard for photographic images An entire toolchain exists to record, manipulate and display images encoded in this specification

More information

Redundant Data Elimination for Image Compression and Internet Transmission using MATLAB

Redundant Data Elimination for Image Compression and Internet Transmission using MATLAB Redundant Data Elimination for Image Compression and Internet Transmission using MATLAB R. Challoo, I.P. Thota, and L. Challoo Texas A&M University-Kingsville Kingsville, Texas 78363-8202, U.S.A. ABSTRACT

More information

The Analysis and Detection of Double JPEG2000 Compression Based on Statistical Characterization of DWT Coefficients

The Analysis and Detection of Double JPEG2000 Compression Based on Statistical Characterization of DWT Coefficients Available online at www.sciencedirect.com Energy Procedia 17 (2012 ) 623 629 2012 International Conference on Future Electrical Power and Energy Systems The Analysis and Detection of Double JPEG2000 Compression

More information