Image and Video Watermarking

Size: px
Start display at page:

Download "Image and Video Watermarking"

Transcription

1 Telecommunications Seminar WS 1998 Data Hiding, Digital Watermarking and Secure Communications Image and Video Watermarking Herbert Buchner University of Erlangen-Nuremberg

2 Outline 1. Introduction: Watermarking of Visual Data 2. Some Approaches for Image Data Spread spectrum concept Image adaptive schemes Robustness to geometric distortions 3. Watermarking of Video Data Uncompressed video Compressed video 4. Conclusions 2

3 1.Watermarking of Images and Video Data embedding / data hiding Watermarking Steganography... in host signal: Image Video Audio Formatted text... 3

4 General Requirements Invisibility for the human visual system (HVS) Robustness to intentional and unintentional attacks: Lossy compression schemes (JPEG, MPEG,...) Linear and nonlinear filtering Geometric distortions (scaling, cropping, rotation...) Collusion... Security 4

5 Building a Watermark I consists of two parts: INSERTION STRATEGY Where in the host signal shall we place the information? WATERMARK STRUCTURE How shall we place the additional information into the signal? in order to comply with the requirements 5

6 Building a Watermark II Basic principle of all approaches for data embedding: exploitation of the limitations of the HVS: Minimum intensity or contrast sensitivity Masking phenomena: - spatial masking - temporal masking - freq. masking contrast min. spatial freq. spatial freq. Note: framework has no general optimum solution! 6

7 2. Some Approaches for Image Data LSB-type methods - one of the simplest concepts for data embedding in noise-free environments. LSBs of the image are replaced by other data bits. Embedded data invisible (LSBs=least perceptible bits!) original bit plane 8 bit plane 5 bit plane 4 bit plane 1 INSECURE: it is known where the information bits are NOT ROBUST: since changes of LSBs invisible! 7

8 Spread Spectrum Concept I Greater robustness: How to imperceptibly insert a watermark into perceptually significant portions of the image? Spread spectrum approach in the spatial domain (1D watermark) Embedding: image (line-scanned) information bits spreading PN seq. (secret key) inform. bits scalar factor spread seq. cr cr cr cr cr Watermarked image Retrieval: PN seq. (secret key) Σ sign recovered information bits (+1/-1) Matched filter: Original image not necessary for watermark retrieval. 8

9 Spread Spectrum Concept II Extension: 2D watermark in the spatial domain (by Kutter) image information bits b i watermark Σ + scalar factor α Watermarked image N i= 1 wxy (, ) = α( xy, ) bφ ( xy, ) i i set of orthogonal, nonoverlapping 2D sequences Φ i (secret key) 9

10 Spread Spectrum Concept III Watermarking in frequency domain increases robustness Robustness to cropping: watermark spread over whole spatial extent Lossy compression (JPEG) usually eliminates non-salient spectral comp. Shrinking leads to loss in HF components only Approach by Cox et al.: Watermark embedded in largest magnitude DCT coefficients (>1000 coeff. recommended) frequency spreading! image DCT + IDCT watermarked image scalar factor (->HVS/ robustness) watermark (chosen according to normal distribution) 10

11 Spread Spectrum Concept IV Extraction of the watermark (Cox et al.) (possibly) watermarked image DCT + - DCT Original image extracted watermark X similiar? original watermark X 0 Properties of the method: Very reliable (robust to JPEG encoding, dithering, clipping with JPEG encoding, averaging of separately watermarked images, and combination of printing, photocopying, subsequent rescanning and rescaling) Major drawback: watermarked and original images necessary! y/n 11

12 Image Adaptive Schemes I Can make explicit use of characteristics of the image and/or HVS. Simple example in spatial domain: image adaptive separation in histogram (by Langelaar et al.): Select (secret key 1) one 8x8 block B of the image Create a low quality copy of the block (preventive simulation of JPEG image to increase the robustness!): original Q low quality 8x8 block DCT IDCT 8x8 block B b Create a binary 8x8 pseudo-random pattern (secret key 2) PN: stencil 12

13 Image Adaptive Schemes II Watermarking procedure for each bit: Calc. mean I o (I 1 ) of luminance values in B, where PN is 0 (1) Difference of means: :=I 1 -I 0 Similar procedure for low quality image b: δ:=i 1 -i PN B I 1 I 0 0 bit to 1 embed B B-PN B I 0 I 1 no <0 AND δ<0? yes Process next 8x8 block >T AND δ>t? yes no B B+PN B I 1 I 0 13

14 Robustness to Geometric Distortions Two different types of approaches possible: Watermarking in a transformation invariant domain (e.g. magnitude of Fourier transform is shift invariant) Embedding some additional hidden grid to determine and invert the distortion before watermark retrieval Method by Kutter: multiple embedding at shifted locations watermarked image autocorrelation funct. extracted peaks Method allows watermark recovery after translation, cropping, scaling, rotation, shearing, change of aspect ratio 14

15 3. Watermarking of Video Data Main differences to image watermarking: Fingerprinting: mark 1 Much higher volume of data (bandwidth) Real-time embedding Digital Library mark 2 mark 3... illegal copy Possible requirements (in addition to those of still image watermarking): Constant bit-rate (with/without watermark) Low complexity Compressed domain processing Interoperability 15

16 Watermarking of Uncompressed Video If real-time embedding is not required: uncompressed video can be watermarked frame by frame using the conventional methods for still images One watermark bit can be distributed over several video frames to increase robustness 16

17 Hybrid Coding Schemes I Basic principles: (MPEG, H.261, H.263) Block-based transform coding (DCT) Motion compensated prediction Intra-coded frames ( I-frames ) 8x8 block of frame DCT Q zig-zag scan DCT coeff. run-level coding threshold entropy coding bit stream Inter-coded frames ( P-frames, B-frames ) Residual prediction error signal frames are used prediction Group of pictures : I B B P B B P B B I B... pred. / interpol. 17

18 Hybrid Coding Schemes II Simplified Block Diagram of a Generic Hybrid Coding Scheme: Coding control Video in + - DCT intraframe DCT coder Q intraframe decoder VLC bit stream out Intra inter Motion compensated predictor + motion vectors 18

19 Watermarking of Compressed Video I Method for additive spread spectrum watermarkíng in hybrid coding schemes by Hartung and Girod: Adding video data and watermark for each 8x8 block in the DCT domain: AC coefficients: non-zero DCT coeffs. of 8x8 block + EC -1 Q -1 Q EC compare no. of bits and select lowest marked DCT coeff. DCT DCT watermark signal drift compensation signal DC coefficients of I-blocks are always watermarked (fixed length code - comparison of code length not necessary) 19

20 Watermarking of Compressed Video II Scheme works with all additive watermark signals Visible artifacts avoided by addition of a drift compensation signal (motion-compensated hybrid coding works recursively!) Complexity comparable to MPEG decoding Method exploits masking characteristics indirectly, since only non-zero DCT coefficients are watermarked The watermark can be retrieved from the decoded sequence 20

21 4. Conclusions Watermarking is data embedding with several strict requirements Watermarks must be invisible: All approaches for watermarking of visual data implicitly or explicitly exploit the limitations of the human visual system Watermarks should be placed in perceptibly significant portions of the image/video to ensure robustness Most additive methods based on spread spectrum concept Applications for video watermarking usually require more sophisticated approaches if real time embedding is desired (embedding in the compressed domain) 21

22 References B. Girod, Image Communication, Lecture, Univ. of Erlangen-Nuremberg H. Niemann, Mustererkennung, Lecture, Univ. of Erlangen-Nuremberg M.D. Swanson, M. Kobayashi, A.H.Tewfik, Multimedia Data-Embedding and Watermarking Technologies, Proc. IEEE, vol. 86, no. 6, June 1998 I.J. Cox, J. Kilian, T. Leighton, T. Shamoon, Secure Spread Spectrum Watermarking for Multimedia, IEEE Trans. Image Processing, vol. 6, no. 12, Dec F. Hartung, B. Girod, Watermarking of uncompressed and compressed video, Signal Processing, vol. 66, 1998 F. Hartung, U. Horn, Codierung digitaler Videosignale nach dem MPEG- Standard, me, vol. 9, 1995 (in German) 22

23 References F. Hartung, B. Girod, Digital watermarking of MPEG-2 coded video in the bitstream domain, Proc. ICASSP97, Apr E. Koch, J. Zhao, Towards Robust and Hidden Image Copyright Labeling, Proc. Of 1995 IEEE Workshop on Nonlinear Signal and Image Processing, June 1995 (available at: G. C. Langelaar, J. C. A. van der Lubbe, J. Biemond, Copy Protection for Multimedia Data based on Labeling Techniques (available at: wwwit.et.tudelft.nl/html/research/smash/public/benlx96/benelux_cr.html) M. Kutter, F. Jordan, F. Bossen, Digital Signature of Color Images using Amplitude Modulation, Proc. SPIE-E197, 1997, pp M. Kutter, Watermarking resisting to translation, rotation and scaling, Proc. of SPIE, Nov

Data Hiding in Video

Data Hiding in Video Data Hiding in Video J. J. Chae and B. S. Manjunath Department of Electrical and Computer Engineering University of California, Santa Barbara, CA 9316-956 Email: chaejj, manj@iplab.ece.ucsb.edu Abstract

More information

Copy Protection for Multimedia Data based on Labeling Techniques

Copy Protection for Multimedia Data based on Labeling Techniques Copy Protection for Multimedia Data based on Labeling Techniques G.C. Langelaar, J.C.A. van der Lubbe, J. Biemond Department of Electrical Engineering, Information Theory Group Delft University of Technology

More information

A Video Watermarking Algorithm Based on the Human Visual System Properties

A Video Watermarking Algorithm Based on the Human Visual System Properties A Video Watermarking Algorithm Based on the Human Visual System Properties Ji-Young Moon 1 and Yo-Sung Ho 2 1 Samsung Electronics Co., LTD 416, Maetan3-dong, Paldal-gu, Suwon-si, Gyenggi-do, Korea jiyoung.moon@samsung.com

More information

Video Compression Standards (II) A/Prof. Jian Zhang

Video Compression Standards (II) A/Prof. Jian Zhang Video Compression Standards (II) A/Prof. Jian Zhang NICTA & CSE UNSW COMP9519 Multimedia Systems S2 2009 jzhang@cse.unsw.edu.au Tutorial 2 : Image/video Coding Techniques Basic Transform coding Tutorial

More information

DIGITAL IMAGE WATERMARKING BASED ON A RELATION BETWEEN SPATIAL AND FREQUENCY DOMAINS

DIGITAL IMAGE WATERMARKING BASED ON A RELATION BETWEEN SPATIAL AND FREQUENCY DOMAINS DIGITAL IMAGE WATERMARKING BASED ON A RELATION BETWEEN SPATIAL AND FREQUENCY DOMAINS Murat Furat Mustafa Oral e-mail: mfurat@cu.edu.tr e-mail: moral@mku.edu.tr Cukurova University, Faculty of Engineering,

More information

A NOVEL APPROACH FOR IMAGE WATERMARKING USING DCT AND JND TECHNIQUES

A NOVEL APPROACH FOR IMAGE WATERMARKING USING DCT AND JND TECHNIQUES A NOVEL APPROACH FOR IMAGE WATERMARKING USING DCT AND JND TECHNIQUES Mrs. R.J. Shelke, Dept of Electronics Engineering, Walchand Institute of Technology, Solapur 43002, India ABSTRACT Dr. Mrs. S.S. Apte,

More information

Sign-up Sheet posted outside of my office HFH 1121

Sign-up Sheet posted outside of my office HFH 1121 Lecture 14: Digital Watermarking II Some slides from Prof. M. Wu, UMCP Lab2 Demo Csil Monday: May 24, 1 4pm Optional (9:30 11am) 10 minutes per Group 5 Minutes Presentation 5 Minutes Demo Sign-up Sheet

More information

JPEG: An Image Compression System. Nimrod Peleg update: Nov. 2003

JPEG: An Image Compression System. Nimrod Peleg update: Nov. 2003 JPEG: An Image Compression System Nimrod Peleg update: Nov. 2003 Basic Structure Source Image Data Reconstructed Image Data Encoder Compressed Data Decoder Encoder Structure Source Image Data Compressed

More information

SPREAD SPECTRUM AUDIO WATERMARKING SCHEME BASED ON PSYCHOACOUSTIC MODEL

SPREAD SPECTRUM AUDIO WATERMARKING SCHEME BASED ON PSYCHOACOUSTIC MODEL SPREAD SPECTRUM WATERMARKING SCHEME BASED ON PSYCHOACOUSTIC MODEL 1 Yüksel Tokur 2 Ergun Erçelebi e-mail: tokur@gantep.edu.tr e-mail: ercelebi@gantep.edu.tr 1 Gaziantep University, MYO, 27310, Gaziantep,

More information

AN AUDIO WATERMARKING SCHEME ROBUST TO MPEG AUDIO COMPRESSION

AN AUDIO WATERMARKING SCHEME ROBUST TO MPEG AUDIO COMPRESSION AN AUDIO WATERMARKING SCHEME ROBUST TO MPEG AUDIO COMPRESSION Won-Gyum Kim, *Jong Chan Lee and Won Don Lee Dept. of Computer Science, ChungNam Nat l Univ., Daeduk Science Town, Taejon, Korea *Dept. of

More information

COMPARISONS OF DCT-BASED AND DWT-BASED WATERMARKING TECHNIQUES

COMPARISONS OF DCT-BASED AND DWT-BASED WATERMARKING TECHNIQUES COMPARISONS OF DCT-BASED AND DWT-BASED WATERMARKING TECHNIQUES H. I. Saleh 1, M. E. Elhadedy 2, M. A. Ashour 1, M. A. Aboelsaud 3 1 Radiation Engineering Dept., NCRRT, AEA, Egypt. 2 Reactor Dept., NRC,

More information

arxiv: v1 [cs.mm] 9 Aug 2017

arxiv: v1 [cs.mm] 9 Aug 2017 Robust Video Watermarking against H.264 and H.265 Compression Attacks Nematollah Zarmehi 1* and Mohammad Javad Barikbin 2 1 Advanced Communication Research Institute, Electrical Engineering Department,

More information

Interframe coding of video signals

Interframe coding of video signals Interframe coding of video signals Adaptive intra-interframe prediction Conditional replenishment Rate-distortion optimized mode selection Motion-compensated prediction Hybrid coding: combining interframe

More information

Digital Video Processing

Digital Video Processing Video signal is basically any sequence of time varying images. In a digital video, the picture information is digitized both spatially and temporally and the resultant pixel intensities are quantized.

More information

Multibit Digital Watermarking Robust against Local Nonlinear Geometrical Distortions

Multibit Digital Watermarking Robust against Local Nonlinear Geometrical Distortions Multibit Digital Watermarking Robust against Local Nonlinear Geometrical Distortions Sviatoslav Voloshynovskiy Frédéric Deguillaume, and Thierry Pun CUI - University of Geneva 24, rue du Général Dufour

More information

Comparison of Digital Image Watermarking Algorithms. Xu Zhou Colorado School of Mines December 1, 2014

Comparison of Digital Image Watermarking Algorithms. Xu Zhou Colorado School of Mines December 1, 2014 Comparison of Digital Image Watermarking Algorithms Xu Zhou Colorado School of Mines December 1, 2014 Outlier Introduction Background on digital image watermarking Comparison of several algorithms Experimental

More information

Audio-coding standards

Audio-coding standards Audio-coding standards The goal is to provide CD-quality audio over telecommunications networks. Almost all CD audio coders are based on the so-called psychoacoustic model of the human auditory system.

More information

( ) ; For N=1: g 1. g n

( ) ; For N=1: g 1. g n L. Yaroslavsky Course 51.7211 Digital Image Processing: Applications Lect. 4. Principles of signal and image coding. General principles General digitization. Epsilon-entropy (rate distortion function).

More information

Image Steganography (cont.)

Image Steganography (cont.) Image Steganography (cont.) 2.2) Image Steganography: Use of Discrete Cosine Transform (DCT) DCT is one of key components of JPEG compression JPEG algorithm: (1) algorithm is split in 8x8 pixel squares

More information

A Robust Wavelet-Based Watermarking Algorithm Using Edge Detection

A Robust Wavelet-Based Watermarking Algorithm Using Edge Detection A Robust Wavelet-Based Watermarking Algorithm Using Edge Detection John N. Ellinas Abstract In this paper, a robust watermarking algorithm using the wavelet transform and edge detection is presented. The

More information

Lecture 5: Video Compression Standards (Part2) Tutorial 3 : Introduction to Histogram

Lecture 5: Video Compression Standards (Part2) Tutorial 3 : Introduction to Histogram Lecture 5: Video Compression Standards (Part) Tutorial 3 : Dr. Jian Zhang Conjoint Associate Professor NICTA & CSE UNSW COMP9519 Multimedia Systems S 006 jzhang@cse.unsw.edu.au Introduction to Histogram

More information

Data hiding technique in JPEG compressed domain

Data hiding technique in JPEG compressed domain See discussions, stats, and author profiles for this publication at: https://www.researchgate.net/publication/253537666 Data hiding technique in JPEG compressed domain Article in Proceedings of SPIE -

More information

Interframe coding A video scene captured as a sequence of frames can be efficiently coded by estimating and compensating for motion between frames pri

Interframe coding A video scene captured as a sequence of frames can be efficiently coded by estimating and compensating for motion between frames pri MPEG MPEG video is broken up into a hierarchy of layer From the top level, the first layer is known as the video sequence layer, and is any self contained bitstream, for example a coded movie. The second

More information

Video Compression An Introduction

Video Compression An Introduction Video Compression An Introduction The increasing demand to incorporate video data into telecommunications services, the corporate environment, the entertainment industry, and even at home has made digital

More information

ENTROPY-BASED IMAGE WATERMARKING USING DWT AND HVS

ENTROPY-BASED IMAGE WATERMARKING USING DWT AND HVS SETIT 2005 3 rd International Conference: Sciences of Electronic, Technologies of Information and Telecommunications March 27-31, 2005 TUNISIA ENTROPY-BASED IMAGE WATERMARKING USING DWT AND HVS Shiva Zaboli

More information

A NEW DCT-BASED WATERMARKING METHOD FOR COPYRIGHT PROTECTION OF DIGITAL AUDIO

A NEW DCT-BASED WATERMARKING METHOD FOR COPYRIGHT PROTECTION OF DIGITAL AUDIO International journal of computer science & information Technology (IJCSIT) Vol., No.5, October A NEW DCT-BASED WATERMARKING METHOD FOR COPYRIGHT PROTECTION OF DIGITAL AUDIO Pranab Kumar Dhar *, Mohammad

More information

Laboratoire d'informatique, de Robotique et de Microélectronique de Montpellier Montpellier Cedex 5 France

Laboratoire d'informatique, de Robotique et de Microélectronique de Montpellier Montpellier Cedex 5 France Video Compression Zafar Javed SHAHID, Marc CHAUMONT and William PUECH Laboratoire LIRMM VOODDO project Laboratoire d'informatique, de Robotique et de Microélectronique de Montpellier LIRMM UMR 5506 Université

More information

COMPARISON BETWEEN TWO WATERMARKING ALGORITHMS USING DCT COEFFICIENT, AND LSB REPLACEMENT

COMPARISON BETWEEN TWO WATERMARKING ALGORITHMS USING DCT COEFFICIENT, AND LSB REPLACEMENT COMPARISO BETWEE TWO WATERMARKIG ALGORITHMS USIG DCT COEFFICIET, AD LSB REPLACEMET Mona M. El-Ghoneimy Associate Professor, Elect. & Comm. Dept., Faculty of Engineering, Cairo University, Post code 12316

More information

Audio Watermarking using Empirical Mode Decomposition

Audio Watermarking using Empirical Mode Decomposition Audio Watermarking using Empirical Mode Decomposition Charulata P. Talele 1, Dr A. M. Patil 2 1ME Student, Electronics and Telecommunication Department J. T. Mahajan College of Engineering, Faizpur, Maharashtra,

More information

Low Cost Spatial Watermarking

Low Cost Spatial Watermarking Low Cost Spatial Watermarking 1. Abstract V. Darmstaedter, J.-F. Delaigle, J.J. Quisquater, B. Macq Laboratoire de Télécommunication et Télédétection Université catholique de Louvain Bâtiment Stévin -

More information

Week 14. Video Compression. Ref: Fundamentals of Multimedia

Week 14. Video Compression. Ref: Fundamentals of Multimedia Week 14 Video Compression Ref: Fundamentals of Multimedia Last lecture review Prediction from the previous frame is called forward prediction Prediction from the next frame is called forward prediction

More information

A ROBUST WATERMARKING SCHEME BASED ON EDGE DETECTION AND CONTRAST SENSITIVITY FUNCTION

A ROBUST WATERMARKING SCHEME BASED ON EDGE DETECTION AND CONTRAST SENSITIVITY FUNCTION A ROBUST WATERMARKING SCHEME BASED ON EDGE DETECTION AND CONTRAST SENSITIVITY FUNCTION John N. Ellinas Department of Electronic Computer Systems,Technological Education Institute of Piraeus, 12244 Egaleo,

More information

Multimedia Security: So What s the Big Deal?

Multimedia Security: So What s the Big Deal? Multimedia Security: So What s the Big Deal? Edward J. Delp Purdue University School of Electrical and Computer Engineering Video and Image Processing Laboratory (VIPER) West Lafayette, Indiana email:

More information

AN EFFICIENT VIDEO WATERMARKING USING COLOR HISTOGRAM ANALYSIS AND BITPLANE IMAGE ARRAYS

AN EFFICIENT VIDEO WATERMARKING USING COLOR HISTOGRAM ANALYSIS AND BITPLANE IMAGE ARRAYS AN EFFICIENT VIDEO WATERMARKING USING COLOR HISTOGRAM ANALYSIS AND BITPLANE IMAGE ARRAYS G Prakash 1,TVS Gowtham Prasad 2, T.Ravi Kumar Naidu 3 1MTech(DECS) student, Department of ECE, sree vidyanikethan

More information

Filtering. -If we denote the original image as f(x,y), then the noisy image can be denoted as f(x,y)+n(x,y) where n(x,y) is a cosine function.

Filtering. -If we denote the original image as f(x,y), then the noisy image can be denoted as f(x,y)+n(x,y) where n(x,y) is a cosine function. Filtering -The image shown below has been generated by adding some noise in the form of a cosine function. -If we denote the original image as f(x,y), then the noisy image can be denoted as f(x,y)+n(x,y)

More information

Outline Introduction MPEG-2 MPEG-4. Video Compression. Introduction to MPEG. Prof. Pratikgiri Goswami

Outline Introduction MPEG-2 MPEG-4. Video Compression. Introduction to MPEG. Prof. Pratikgiri Goswami to MPEG Prof. Pratikgiri Goswami Electronics & Communication Department, Shree Swami Atmanand Saraswati Institute of Technology, Surat. Outline of Topics 1 2 Coding 3 Video Object Representation Outline

More information

CHAPTER-6 WATERMARKING OF JPEG IMAGES

CHAPTER-6 WATERMARKING OF JPEG IMAGES CHAPTER-6 WATERMARKING OF JPEG IMAGES 6.1 INTRODUCTION In the Chapter 4, we have discussed that we can improve the robustness of DCT and DWT based watermarking schemes against some well known attacks by

More information

An Improved Images Watermarking Scheme Using FABEMD Decomposition and DCT

An Improved Images Watermarking Scheme Using FABEMD Decomposition and DCT An Improved Images Watermarking Scheme Using FABEMD Decomposition and DCT Noura Aherrahrou and Hamid Tairi University Sidi Mohamed Ben Abdellah, Faculty of Sciences, Dhar El mahraz, LIIAN, Department of

More information

Block Mean Value Based Image Perceptual Hashing for Content Identification

Block Mean Value Based Image Perceptual Hashing for Content Identification Block Mean Value Based Image Perceptual Hashing for Content Identification Abstract. Image perceptual hashing has been proposed to identify or authenticate image contents in a robust way against distortions

More information

Audio-coding standards

Audio-coding standards Audio-coding standards The goal is to provide CD-quality audio over telecommunications networks. Almost all CD audio coders are based on the so-called psychoacoustic model of the human auditory system.

More information

A Detailed look of Audio Steganography Techniques using LSB and Genetic Algorithm Approach

A Detailed look of Audio Steganography Techniques using LSB and Genetic Algorithm Approach www.ijcsi.org 402 A Detailed look of Audio Steganography Techniques using LSB and Genetic Algorithm Approach Gunjan Nehru 1, Puja Dhar 2 1 Department of Information Technology, IEC-Group of Institutions

More information

DIGITAL TELEVISION 1. DIGITAL VIDEO FUNDAMENTALS

DIGITAL TELEVISION 1. DIGITAL VIDEO FUNDAMENTALS DIGITAL TELEVISION 1. DIGITAL VIDEO FUNDAMENTALS Television services in Europe currently broadcast video at a frame rate of 25 Hz. Each frame consists of two interlaced fields, giving a field rate of 50

More information

Speech Modulation for Image Watermarking

Speech Modulation for Image Watermarking Speech Modulation for Image Watermarking Mourad Talbi 1, Ben Fatima Sira 2 1 Center of Researches and Technologies of Energy, Tunisia 2 Engineering School of Tunis, Tunisia Abstract Embedding a hidden

More information

JPEG: An Image Compression System

JPEG: An Image Compression System JPEG: An Image Compression System ISO/IEC DIS 10918-1 ITU-T Recommendation T.81 http://www.jpeg.org/ Nimrod Peleg update: April 2007 Basic Structure Source Image Data Reconstructed Image Data Encoder Compressed

More information

ECE 417 Guest Lecture Video Compression in MPEG-1/2/4. Min-Hsuan Tsai Apr 02, 2013

ECE 417 Guest Lecture Video Compression in MPEG-1/2/4. Min-Hsuan Tsai Apr 02, 2013 ECE 417 Guest Lecture Video Compression in MPEG-1/2/4 Min-Hsuan Tsai Apr 2, 213 What is MPEG and its standards MPEG stands for Moving Picture Expert Group Develop standards for video/audio compression

More information

Compression of Stereo Images using a Huffman-Zip Scheme

Compression of Stereo Images using a Huffman-Zip Scheme Compression of Stereo Images using a Huffman-Zip Scheme John Hamann, Vickey Yeh Department of Electrical Engineering, Stanford University Stanford, CA 94304 jhamann@stanford.edu, vickey@stanford.edu Abstract

More information

Professor Laurence S. Dooley. School of Computing and Communications Milton Keynes, UK

Professor Laurence S. Dooley. School of Computing and Communications Milton Keynes, UK Professor Laurence S. Dooley School of Computing and Communications Milton Keynes, UK How many bits required? 2.4Mbytes 84Kbytes 9.8Kbytes 50Kbytes Data Information Data and information are NOT the same!

More information

Scalable Video Watermarking. Peter Meerwald June 25, 2007

Scalable Video Watermarking. Peter Meerwald June 25, 2007 Scalable Video Watermarking Peter Meerwald June 25, 2007 Watermarking Watermarking is imperceptible embedding of information into multimedia data [Cox02a] Applications: copyright protection, data authentication,

More information

Authentication and Secret Message Transmission Technique Using Discrete Fourier Transformation

Authentication and Secret Message Transmission Technique Using Discrete Fourier Transformation , 2009, 5, 363-370 doi:10.4236/ijcns.2009.25040 Published Online August 2009 (http://www.scirp.org/journal/ijcns/). Authentication and Secret Message Transmission Technique Using Discrete Fourier Transformation

More information

Introduction to Visible Watermarking. IPR Course: TA Lecture 2002/12/18 NTU CSIE R105

Introduction to Visible Watermarking. IPR Course: TA Lecture 2002/12/18 NTU CSIE R105 Introduction to Visible Watermarking IPR Course: TA Lecture 2002/12/18 NTU CSIE R105 Outline Introduction State-of of-the-art Characteristics of Visible Watermarking Schemes Attacking Visible Watermarking

More information

DIGITAL WATERMARKING FOR GRAY-LEVEL WATERMARKS

DIGITAL WATERMARKING FOR GRAY-LEVEL WATERMARKS DICTA22: Digital Image Computing Techniques and Applications, 2 22 January 22, Melbourne, Australia. DIGITAL WATERMARKING FOR GRAY-LEVEL WATERMARKS *Yuk Ying CHUNG, Man To WONG *Basser Department of Computer

More information

06/12/2017. Image compression. Image compression. Image compression. Image compression. Coding redundancy: image 1 has four gray levels

06/12/2017. Image compression. Image compression. Image compression. Image compression. Coding redundancy: image 1 has four gray levels Theoretical size of a file representing a 5k x 4k colour photograph: 5000 x 4000 x 3 = 60 MB 1 min of UHD tv movie: 3840 x 2160 x 3 x 24 x 60 = 36 GB 1. Exploit coding redundancy 2. Exploit spatial and

More information

Anatomy of a Video Codec

Anatomy of a Video Codec Anatomy of a Video Codec The inner workings of Ogg Theora Dr. Timothy B. Terriberry Outline Introduction Video Structure Motion Compensation The DCT Transform Quantization and Coding The Loop Filter Conclusion

More information

2014 Summer School on MPEG/VCEG Video. Video Coding Concept

2014 Summer School on MPEG/VCEG Video. Video Coding Concept 2014 Summer School on MPEG/VCEG Video 1 Video Coding Concept Outline 2 Introduction Capture and representation of digital video Fundamentals of video coding Summary Outline 3 Introduction Capture and representation

More information

Improved Content Based Image Watermarking

Improved Content Based Image Watermarking Improved Content Based Image Watermarking Arvind Kumar Parthasarathy Abstract Due to improvements in imaging technologies and the ease with which digital content can be created and manipulated, there is

More information

A DWT-DFT Composite Watermarking Scheme Robust to Both Affine Transform and JPEG Compression

A DWT-DFT Composite Watermarking Scheme Robust to Both Affine Transform and JPEG Compression 776 IEEE TRANSACTIONS ON CIRCUITS AND SYSTEMS FOR VIDEO TECHNOLOGY, VOL 13, NO 8, AUGUST 2003 A DWT-DFT Composite Watermarking Scheme Robust to Both Affine Transform and JPEG Compression Xiangui Kang,

More information

Lecture 6: Compression II. This Week s Schedule

Lecture 6: Compression II. This Week s Schedule Lecture 6: Compression II Reading: book chapter 8, Section 1, 2, 3, 4 Monday This Week s Schedule The concept behind compression Rate distortion theory Image compression via DCT Today Speech compression

More information

Implementation of Audio Watermarking Using Wavelet Families

Implementation of Audio Watermarking Using Wavelet Families Implementation of Audio Watermarking Using Wavelet Families Mr. Kamlesh.C.Badhe, Prof.Jagruti.R.Panchal Dept. of E&TC, SCOE, Sudumbare, Pune, India Dept. of E&TC, SCOE, Sudumbare, Pune, India Abstract

More information

Implementation of Audio Watermarking Using Wavelet Families

Implementation of Audio Watermarking Using Wavelet Families Implementation of Audio Watermarking Using Wavelet Families Mr. Kamlesh.C.Badhe Dept. of E&TC, SCOE Sudumbare, Pune, India kcbadhe@gmail.com Prof.Jagruti.R.Panchal Dept. of E&TC, SCOE Sudumbare, Pune,

More information

SCALED WAVELET TRANSFORM VIDEO WATERMARKING METHOD USING HYBRID TECHNIQUE: SWT-SVD-DCT

SCALED WAVELET TRANSFORM VIDEO WATERMARKING METHOD USING HYBRID TECHNIQUE: SWT-SVD-DCT SCALED WAVELET TRANSFORM VIDEO WATERMARKING METHOD USING HYBRID TECHNIQUE: SWT- Shaveta 1, Daljit Kaur 2 1 PG Scholar, 2 Assistant Professor, Dept of IT, Chandigarh Engineering College, Landran, Mohali,

More information

VIDEO COMPRESSION STANDARDS

VIDEO COMPRESSION STANDARDS VIDEO COMPRESSION STANDARDS Family of standards: the evolution of the coding model state of the art (and implementation technology support): H.261: videoconference x64 (1988) MPEG-1: CD storage (up to

More information

An Improvement Technique based on Structural Similarity Thresholding for Digital Watermarking

An Improvement Technique based on Structural Similarity Thresholding for Digital Watermarking An Improvement Technique based on Structural Similarity Thresholding for Digital Watermarking Amin Banitalebi-Dehkordi1, Mehdi Banitalebi-Dehkordi2, Jamshid Abouei3, and Said Nader-Esfahani4 1 Department

More information

Overview: motion-compensated coding

Overview: motion-compensated coding Overview: motion-compensated coding Motion-compensated prediction Motion-compensated hybrid coding Motion estimation by block-matching Motion estimation with sub-pixel accuracy Power spectral density of

More information

OTP-Steg. One-Time Pad Image Steganography Using OTP-Steg V.1.0 Software October 2015 Dr. Michael J. Pelosi

OTP-Steg. One-Time Pad Image Steganography Using OTP-Steg V.1.0 Software October 2015 Dr. Michael J. Pelosi OTP-Steg One-Time Pad Image Steganography Using OTP-Steg V.1.0 Software October 2015 Dr. Michael J. Pelosi What is Steganography? Steganography literally means covered writing Encompasses methods of transmitting

More information

Image and Video Coding I: Fundamentals

Image and Video Coding I: Fundamentals Image and Video Coding I: Fundamentals Heiko Schwarz Freie Universität Berlin Fachbereich Mathematik und Informatik H. Schwarz (FU Berlin) Image and Video Coding Organization Vorlesung: Montag 14:15-15:45

More information

This document is downloaded from DR-NTU, Nanyang Technological University Library, Singapore.

This document is downloaded from DR-NTU, Nanyang Technological University Library, Singapore. This document is downloaded from DR-NTU, Nanyang Technological University Library, Singapore. Title A robust phase watermarking algorithm using conugate symmetric sequency-ordered complex Hadamard transform

More information

Cover Page. 1) Title of the paper: A robust image watermarking technique based on quantization noise visibility thresholds

Cover Page. 1) Title of the paper: A robust image watermarking technique based on quantization noise visibility thresholds Cover Page 1) Title of the paper: A robust image watermarking technique based on quantization noise visibility thresholds 2) authors affiliation and address: IRCCyN-IVC, (UMR CNRS 6597), Polytech' Nantes

More information

Lecture 4: Video Compression Standards (Part1) Tutorial 2 : Image/video Coding Techniques. Basic Transform coding Tutorial 2

Lecture 4: Video Compression Standards (Part1) Tutorial 2 : Image/video Coding Techniques. Basic Transform coding Tutorial 2 Lecture 4: Video Compression Standards (Part1) Tutorial 2 : Image/video Coding Techniques Dr. Jian Zhang Conjoint Associate Professor NICTA & CSE UNSW COMP9519 Multimedia Systems S2 2006 jzhang@cse.unsw.edu.au

More information

Hiding Fingerprint Minutiae in Images

Hiding Fingerprint Minutiae in Images Hiding Fingerprint Minutiae in Images Anil K. Jain and Umut Uludag Computer Science and Engineering Department, Michigan State University 3115 Engineering Building, East Lansing, MI, 48824, USA {jain,

More information

PREFACE...XIII ACKNOWLEDGEMENTS...XV

PREFACE...XIII ACKNOWLEDGEMENTS...XV Contents PREFACE...XIII ACKNOWLEDGEMENTS...XV 1. MULTIMEDIA SYSTEMS...1 1.1 OVERVIEW OF MPEG-2 SYSTEMS...1 SYSTEMS AND SYNCHRONIZATION...1 TRANSPORT SYNCHRONIZATION...2 INTER-MEDIA SYNCHRONIZATION WITH

More information

Reversible Data Hiding VIA Optimal Code for Image

Reversible Data Hiding VIA Optimal Code for Image Vol. 3, Issue. 3, May - June 2013 pp-1661-1665 ISSN: 2249-6645 Reversible Data Hiding VIA Optimal Code for Image Senthil Rani D. #, Gnana Kumari R. * # PG-Scholar, M.E-CSE, Coimbatore Institute of Engineering

More information

CHAPTER 4 REVERSIBLE IMAGE WATERMARKING USING BIT PLANE CODING AND LIFTING WAVELET TRANSFORM

CHAPTER 4 REVERSIBLE IMAGE WATERMARKING USING BIT PLANE CODING AND LIFTING WAVELET TRANSFORM 74 CHAPTER 4 REVERSIBLE IMAGE WATERMARKING USING BIT PLANE CODING AND LIFTING WAVELET TRANSFORM Many data embedding methods use procedures that in which the original image is distorted by quite a small

More information

Introduction to Video Compression

Introduction to Video Compression Insight, Analysis, and Advice on Signal Processing Technology Introduction to Video Compression Jeff Bier Berkeley Design Technology, Inc. info@bdti.com http://www.bdti.com Outline Motivation and scope

More information

Robust Audio Watermarking Based on Secure Spread Spectrum and Auditory Perception Model

Robust Audio Watermarking Based on Secure Spread Spectrum and Auditory Perception Model Robust Audio Watermarking Based on Secure Spread Spectrum and Auditory Perception Model PETAR HORVATIC, JIAN ZHAO, NIELS J. THORWIRTH Fraunhofer Center for Research in Computer Graphics, Inc. 321 South

More information

Motion Estimation. Original. enhancement layers. Motion Compensation. Baselayer. Scan-Specific Entropy Coding. Prediction Error.

Motion Estimation. Original. enhancement layers. Motion Compensation. Baselayer. Scan-Specific Entropy Coding. Prediction Error. ON VIDEO SNR SCALABILITY Lisimachos P. Kondi, Faisal Ishtiaq and Aggelos K. Katsaggelos Northwestern University Dept. of Electrical and Computer Engineering 2145 Sheridan Road Evanston, IL 60208 E-Mail:

More information

MPEG-4: Simple Profile (SP)

MPEG-4: Simple Profile (SP) MPEG-4: Simple Profile (SP) I-VOP (Intra-coded rectangular VOP, progressive video format) P-VOP (Inter-coded rectangular VOP, progressive video format) Short Header mode (compatibility with H.263 codec)

More information

A Robust A DCT-Based Digital Watermarking Scheme Using Important Feature Points

A Robust A DCT-Based Digital Watermarking Scheme Using Important Feature Points A Robust A DCT-Based Digital Watermarking Scheme Using Important Feature Points Xiaojun Qi and Ji Qi Department of Computer Science, Utah State University Logan, UT, 84322-4205, USA. Xiaojun.Qi@usu.edu

More information

[Patil* et al., 5(7): July, 2016] ISSN: IC Value: 3.00 Impact Factor: 4.116

[Patil* et al., 5(7): July, 2016] ISSN: IC Value: 3.00 Impact Factor: 4.116 IJESRT INTERNATIONAL JOURNAL OF ENGINEERING SCIENCES & RESEARCH TECHNOLOGY A REVIEW OF IMAGE WATERMARKING METHODS Ankush R. Patil*, V. K. Patil * E & TC, M.E., D. N. Patel COE, Shahada, MH, India DOI:

More information

Features. Sequential encoding. Progressive encoding. Hierarchical encoding. Lossless encoding using a different strategy

Features. Sequential encoding. Progressive encoding. Hierarchical encoding. Lossless encoding using a different strategy JPEG JPEG Joint Photographic Expert Group Voted as international standard in 1992 Works with color and grayscale images, e.g., satellite, medical,... Motivation: The compression ratio of lossless methods

More information

CMPT 365 Multimedia Systems. Media Compression - Image

CMPT 365 Multimedia Systems. Media Compression - Image CMPT 365 Multimedia Systems Media Compression - Image Spring 2017 Edited from slides by Dr. Jiangchuan Liu CMPT365 Multimedia Systems 1 Facts about JPEG JPEG - Joint Photographic Experts Group International

More information

Tracing Watermarking for Multimedia Communication Quality Assessment

Tracing Watermarking for Multimedia Communication Quality Assessment Tracing Watermarking for Multimedia Communication Quality Assessment Patrizio Campisi, member, IEEE, Marco Carli, Gaetano Giunta, member, IEEE, Alessandro Neri, member, IEEE Università degli Studi Roma

More information

A New Approach to Compressed Image Steganography Using Wavelet Transform

A New Approach to Compressed Image Steganography Using Wavelet Transform IOSR Journal of Computer Engineering (IOSR-JCE) e-issn: 2278-0661,p-ISSN: 2278-8727, Volume 17, Issue 5, Ver. III (Sep. Oct. 2015), PP 53-59 www.iosrjournals.org A New Approach to Compressed Image Steganography

More information

Frequency Domain Watermarking: An Overview

Frequency Domain Watermarking: An Overview The International Arab Journal of Information Technology, Vol. 2, No. 1, January 2005 33 Frequency Domain Watermarking: An Overview Khaled Mahmoud, Sekharjit Datta, and James Flint Department of Electrical

More information

Robust Watermark Algorithm using Genetic Algorithm

Robust Watermark Algorithm using Genetic Algorithm JOURNAL OF INFORMATION SCIENCE AND ENGINEERING 23, 661-670 (2007) Short Paper Robust Watermark Algorithm using Genetic Algorithm CONG JIN AND SHI-HUI WANG * Department of Computer Science Central China

More information

Video Compression MPEG-4. Market s requirements for Video compression standard

Video Compression MPEG-4. Market s requirements for Video compression standard Video Compression MPEG-4 Catania 10/04/2008 Arcangelo Bruna Market s requirements for Video compression standard Application s dependent Set Top Boxes (High bit rate) Digital Still Cameras (High / mid

More information

Digital Watermarking Using 2-DCT

Digital Watermarking Using 2-DCT Digital Watermarking Using 2-DCT Trapti Singh, NamitaArya University School of Information and Communication Technology, Guru Gobind Singh Indraprastha University, Dwarka, New Delhi, India traptisingh23@gmail.com,

More information

Contour Extraction & Compression from Watermarked Image using Discrete Wavelet Transform & Ramer Method

Contour Extraction & Compression from Watermarked Image using Discrete Wavelet Transform & Ramer Method Contour Extraction & Compression from Watermarked Image using Discrete Wavelet Transform & Ramer Method Ali Ukasha, Majdi Elbireki, and Mohammad Abdullah Abstract In this paper we have implemented a digital

More information

Digital Watermarking with Copyright Authentication for Image Communication

Digital Watermarking with Copyright Authentication for Image Communication Digital Watermarking with Copyright Authentication for Image Communication Keta Raval Dept. of Electronics and Communication Patel Institute of Engineering and Science RGPV, Bhopal, M.P., India ketaraval@yahoo.com

More information

Robust Hash Functions for Digital Watermarking

Robust Hash Functions for Digital Watermarking Robust Hash Functions for Digital Watermarking a) Jiri Fridrich and b) Miroslav Goljan a) Center for Intelligent Systems, SUNY Binghamton, Binghamton, NY 13902-6000 a) Mission Research Corporation, 1720

More information

Comparative Study of Partial Closed-loop Versus Open-loop Motion Estimation for Coding of HDTV

Comparative Study of Partial Closed-loop Versus Open-loop Motion Estimation for Coding of HDTV Comparative Study of Partial Closed-loop Versus Open-loop Motion Estimation for Coding of HDTV Jeffrey S. McVeigh 1 and Siu-Wai Wu 2 1 Carnegie Mellon University Department of Electrical and Computer Engineering

More information

Perceptual Watermarks for Digital Images and Video

Perceptual Watermarks for Digital Images and Video Perceptual Watermarks for Digital Images and Video RAYMOND B. WOLFGANG, STUDENT MEMBER, IEEE, CHRISTINE I. PODILCHUK, MEMBER, IEEE, AND EDWARD J. DELP, FELLOW, IEEE Invited Paper The growth of new imaging

More information

No Reference Medical Image Quality Measurement Based on Spread Spectrum and Discrete Wavelet Transform using ROI Processing

No Reference Medical Image Quality Measurement Based on Spread Spectrum and Discrete Wavelet Transform using ROI Processing No Reference Medical Image Quality Measurement Based on Spread Spectrum and Discrete Wavelet Transform using ROI Processing Arash Ashtari Nakhaie, Shahriar Baradaran Shokouhi Iran University of Science

More information

CHAPTER-5 WATERMARKING OF COLOR IMAGES

CHAPTER-5 WATERMARKING OF COLOR IMAGES CHAPTER-5 WATERMARKING OF COLOR IMAGES 5.1 INTRODUCTION After satisfactorily developing the watermarking schemes for gray level images, we focused on developing the watermarking schemes for the color images.

More information

Wireless Communication

Wireless Communication Wireless Communication Systems @CS.NCTU Lecture 6: Image Instructor: Kate Ching-Ju Lin ( 林靖茹 ) Chap. 9 of Fundamentals of Multimedia Some reference from http://media.ee.ntu.edu.tw/courses/dvt/15f/ 1 Outline

More information

DCT-BASED WATERMARKING FOR VIDEO

DCT-BASED WATERMARKING FOR VIDEO 206 EEE Transactions on Consumer Electronics, Vol. 44, No. 1, FEBRUARY 1998 DCT-BASED WATERMARKNG FOR VDEO Chiou-Ting Hsu and Ja-Ling Wu1a2 Communication and Multimedia Lab. Department of Computer Science

More information

A NEW APPROACH OF DIGITAL IMAGE COPYRIGHT PROTECTION USING MULTI-LEVEL DWT ALGORITHM

A NEW APPROACH OF DIGITAL IMAGE COPYRIGHT PROTECTION USING MULTI-LEVEL DWT ALGORITHM A NEW APPROACH OF DIGITAL IMAGE COPYRIGHT PROTECTION USING MULTI-LEVEL DWT ALGORITHM Siva Prasad K, Ganesh Kumar N PG Student [DECS], Assistant professor, Dept of ECE, Thandrapaparaya Institute of science

More information

IMAGE COMPRESSION. Chapter - 5 : (Basic)

IMAGE COMPRESSION. Chapter - 5 : (Basic) Chapter - 5 : IMAGE COMPRESSION (Basic) Q() Explain the different types of redundncies that exists in image.? (8M May6 Comp) [8M, MAY 7, ETRX] A common characteristic of most images is that the neighboring

More information

World Academy of Science, Engineering and Technology International Journal of Electronics and Communication Engineering Vol:4, No:8, 2010

World Academy of Science, Engineering and Technology International Journal of Electronics and Communication Engineering Vol:4, No:8, 2010 A wavelet Based Object Watermarking System for Image and Video Abdessamad Essaouabi, Ibnelhaj Elhassane Abstract Efficient storage, transmission and use of video information are key requirements in many

More information

Steganography: Dct Coefficient Replacement Method and Compare With JSteg Algorithm

Steganography: Dct Coefficient Replacement Method and Compare With JSteg Algorithm Steganography: Dct Coefficient Replacement Method and Compare With JSteg Algorithm Hossein Sheisi, Jafar Mesgarian, and Mostafa Rahmani Abstract Due to the rapid development in digital communication through

More information

Reversible Non-Blind Video Watermarking Based on Interlacing using 3-level DWT & Alpha Blending Technique

Reversible Non-Blind Video Watermarking Based on Interlacing using 3-level DWT & Alpha Blending Technique IOSR Journal of Electronics and Communication Engineering (IOSR-JECE) e-issn: 2278-2834,p- ISSN: 2278-8735.Volume 10, Issue 5, Ver. I (Sep - Oct.2015), PP 06-13 www.iosrjournals.org Reversible Non-Blind

More information