Steganalysis in JPEG

Size: px
Start display at page:

Download "Steganalysis in JPEG"

Transcription

1 Steganalysis in JPEG CSM25 Secure Information Hiding Dr Hans Georg Schaathun University of Surrey Spring 2007 Dr Hans Georg Schaathun Steganalysis in JPEG Spring / 24

2 Learning Outcomes learn additional techniques for steganalysis in the JPEG domain. Dr Hans Georg Schaathun Steganalysis in JPEG Spring / 24

3 Reading Core Reading Jessica Fridrich, Miroslav Goljan, Dorin Hogea: «Steganalysis of JPEG Images: Breaking the F5 Algorithm» 5th Information Hiding Workshop, Noordwijkerhout, The Netherlands, 7 9 October 2002, pp Dr Hans Georg Schaathun Steganalysis in JPEG Spring / 24

4 Outline JPEG Histogramme Histogramme 1 JPEG Histogramme Histogramme 2 JPEG Calibration The idea 3 Conclusion Dr Hans Georg Schaathun Steganalysis in JPEG Spring / 24

5 JPEG Histogramme The JPEG Coefficients Histogramme Recall that JPEG uses the blockwise DCT transform 8 8 blocks called DCT coefficients (floating point) The entries are quantised, called JPEG coefficients (integers) Each block has one DC coefficient, (0, 0) 63 AC coefficients, (i, j) (0, 0), 0 i, j 7 Dr Hans Georg Schaathun Steganalysis in JPEG Spring / 24

6 JPEG Histogramme Histogramme Histogramme We calculate the histogramme of the AC JPEG coefficients h(x) is the number of coefficients equal to x Frequency-wise histogramme h ij (x) is the number of blocks where coefficient (i, j) is equal to x DC histogramme h 00 (x) The histogramme can be plotted curve bar chart Dr Hans Georg Schaathun Steganalysis in JPEG Spring / 24

7 JPEG Histogramme Histogramme Histogramme We calculate the histogramme of the AC JPEG coefficients h(x) is the number of coefficients equal to x Frequency-wise histogramme h ij (x) is the number of blocks where coefficient (i, j) is equal to x DC histogramme h 00 (x) The histogramme can be plotted curve bar chart Dr Hans Georg Schaathun Steganalysis in JPEG Spring / 24

8 JPEG Histogramme Histogramme Histogramme We calculate the histogramme of the AC JPEG coefficients h(x) is the number of coefficients equal to x Frequency-wise histogramme h ij (x) is the number of blocks where coefficient (i, j) is equal to x DC histogramme h 00 (x) The histogramme can be plotted curve bar chart Dr Hans Georg Schaathun Steganalysis in JPEG Spring / 24

9 Outline JPEG Histogramme 1 JPEG Histogramme Histogramme 2 JPEG Calibration The idea 3 Conclusion Dr Hans Georg Schaathun Steganalysis in JPEG Spring / 24

10 JPEG Toolbox Reading a JPEG image JPEG Histogramme» im = jpeg_read ( Kerckhoffs.jpg ) im = image_width: 180 image_height: 247 image_components: 3 image_color_space: 2 jpeg_components: 3 jpeg_color_space: 3 comments: {} coef_arrays: {[248x184 double] [128x96 double] [128x96 quant_tables: {[8x8 double] [8x8 double]} ac_huff_tables: [1x2 struct] dc_huff_tables: [1x2 struct] optimize_coding: 0 comp_info: [1x3 struct] progressive_mode: 0» Dr Hans Georg Schaathun Steganalysis in JPEG Spring / 24

11 JPEG Toolbox JPEG data JPEG Histogramme» Xy = im.coef_arraysim.comp_info(1).component_id ;» whos Xy Name Size Bytes Class Attributes Xy 248x double» Q = im.quant_tablesim.comp_info(1).quant_tbl_no Q =» Dr Hans Georg Schaathun Steganalysis in JPEG Spring / 24

12 JPEG Histogramme w/o the toolbox Load/Save workspace jpeg_read and jpeg_write are compiled functions, Non-trivial to install In the exercises, can load presaved workspaces» load image.mat» whos Name Size Bytes Class Attributes im 1x struct There is one mat-file for each image on the web page Dr Hans Georg Schaathun Steganalysis in JPEG Spring / 24

13 JPEG Histogramme Other toolbox functions I recommend that you use the other toolbox functions bdct, ibdct, quantize, dequantize These are m-files, which can be copied into current directory. Alternatively, use matlab on tweek which has the toolbox. Dr Hans Georg Schaathun Steganalysis in JPEG Spring / 24

14 JPEG Histogramme Extracting AC coefficients Consider N M matrix, A If B is a boolean (logical) N M matrix, then A(B) is a vector consisting of all elements from A corresponding to a 1 (true) in B Suppose we run (where A is N M DCT image) 1 B = logical(ones(8,8)) % Make 8x8 matrix of ones 2 B(1,1) = 0 % DC coefficient : zero 3 BB = repmat ( B, N/8, M/8 ) % Concatenate block for full image 4 X = A(B) % Vector of AC coefficients Dr Hans Georg Schaathun Steganalysis in JPEG Spring / 24

15 Histogramme JPEG Histogramme We have discussed histogrammes before Essentially you need two functions hist to extract frequencies bar to make the plot Refer to help files and to exercise sheet Dr Hans Georg Schaathun Steganalysis in JPEG Spring / 24

16 JPEG Histogramme Exercise JPEG Histogramme 1 Refer to details on the exercise sheet. 2 Download Image A from the web site; and load it in. 3 Make a vector X of AC coefficients (luminence) from A 4 Plot a histogramme of the JPEG AC coefficients of A. Dr Hans Georg Schaathun Steganalysis in JPEG Spring / 24

17 Outline JPEG Calibration The idea 1 JPEG Histogramme Histogramme 2 JPEG Calibration The idea 3 Conclusion Dr Hans Georg Schaathun Steganalysis in JPEG Spring / 24

18 JPEG Calibration The idea The calibrated image JPEG has a block-structure Steganography in JPEG follows the block-structure What happens if we de- and re-compress the image with different block structure? Dr Hans Georg Schaathun Steganalysis in JPEG Spring / 24

19 JPEG Calibration The idea The calibrated image JPEG has a block-structure Steganography in JPEG follows the block-structure What happens if we de- and re-compress the image with different block structure? Dr Hans Georg Schaathun Steganalysis in JPEG Spring / 24

20 JPEG Calibration The idea The calibrated image JPEG has a block-structure Steganography in JPEG follows the block-structure What happens if we de- and re-compress the image with different block structure? Dr Hans Georg Schaathun Steganalysis in JPEG Spring / 24

21 The calibrated image JPEG Calibration The idea JPEG has a block-structure Steganography in JPEG follows the block-structure What happens if we de- and re-compress the image with different block structure? Dr Hans Georg Schaathun Steganalysis in JPEG Spring / 24

22 JPEG Calibration The idea The calibrated image JPEG has a block-structure Steganography in JPEG follows the block-structure What happens if we de- and re-compress the image with different block structure? Dr Hans Georg Schaathun Steganalysis in JPEG Spring / 24

23 JPEG Calibration Histogramme comparison The idea 1 Decompress the image 2 Crop 4 pixels; either 4 rows at top and bottom 4 columns left and right 4 pixels on each edge 3 Recompress using same quality factor and quantisation matrix called calibrated image 4 Compare histogramme of original and calibrated images 5 What do you see? Dr Hans Georg Schaathun Steganalysis in JPEG Spring / 24

24 Outline JPEG Calibration 1 JPEG Histogramme Histogramme 2 JPEG Calibration The idea 3 Conclusion Dr Hans Georg Schaathun Steganalysis in JPEG Spring / 24

25 JPEG Calibration JPEG Toolbox Decompression Dequantisation» Xy2 = dequantize ( Xy, Q ) ; Inverse transform» Xy3 = ibdct ( Xy2 ) ; Normalisation» Xy4 = uint8( Xy ) ; Did it work?» imshow ( Xy4 ) Note, we have only used grayscale information. Dr Hans Georg Schaathun Steganalysis in JPEG Spring / 24

26 JPEG Toolbox Recompression JPEG Calibration New range» Xy3 = double( Xy4-128 ) ; Inverse transform» Xy2 = bdct ( Xy3 ) ; Quantisation» Xy = quantize ( Xy2, Q ) ; Reinsertion» im.coef_arrays{im.comp_info(1).component_id} = Xy ; Dr Hans Georg Schaathun Steganalysis in JPEG Spring / 24

27 JPEG Calibration Exercise JPEG Image Calibration 1 Refer to details on the exercise sheet. 2 You still have the image A from the previous exercise. 3 Make an m-file which takes an image as input and outputs the calibrated image. Make a calibrated image A from A. 4 Plot a histogramme of the JPEG AC coefficients of A. 5 Compare the two histogrammes and comment. Dr Hans Georg Schaathun Steganalysis in JPEG Spring / 24

28 Exercise (Part 2) JPEG Image Calibration JPEG Calibration 1 Refer to details on the exercise sheet. 2 Download Image B from the web site; and load it in. 3 Make a calibrated image B from B, as in Part 1. 4 Plot histogrammes (JPEG coefficients) of B and B (as in the previous part) 5 Compare the histogrammes of A, B, A, and B. What do you see? Do you think A and/or B is a stegogramme? Dr Hans Georg Schaathun Steganalysis in JPEG Spring / 24

29 Conclusion Conclusion Compare an image and its calibrated image Normally very similar statistics,... because neighbour blocks are similar (visually) Data embedding change blocks independently Changes block structure and block statistics,... but the calibrated image is not changed in the same way We can use the calibrated image to estimate statistics in the original coverimage. Dr Hans Georg Schaathun Steganalysis in JPEG Spring / 24

30 In general Conclusion Main challenge in stegananalysis what is the expected statistics for a normal image? a.k.a. baseline value (Extra) Structural Steganalysis Look out for features in the JPEG format What is in the comments field? gives you access to this field... See Image D Dr Hans Georg Schaathun Steganalysis in JPEG Spring / 24

Learning outcomes. Palettes and GIF. The colour palette. Using the colour palette The GIF file. CSM25 Secure Information Hiding

Learning outcomes. Palettes and GIF. The colour palette. Using the colour palette The GIF file. CSM25 Secure Information Hiding Learning outcomes Palettes and GIF CSM25 Secure Information Hiding Dr Hans Georg Schaathun University of Surrey Learn how images are represented using a palette Get an overview of hiding techniques in

More information

Learning Outcomes. Information Theory and Synthetic Steganography. Reading. The communications problem

Learning Outcomes. Information Theory and Synthetic Steganography. Reading. The communications problem Learning Outcomes Information Theory and Synthetic Steganography CSM25 Secure Information Hiding Dr Hans Georg Schaathun University of Surrey Spring 2009 Week 8 understand the relationship between steganography

More information

Information Theory and Synthetic Steganography

Information Theory and Synthetic Steganography Information Theory and Synthetic Steganography CSM25 Secure Information Hiding Dr Hans Georg Schaathun University of Surrey Spring 2009 Week 8 Dr Hans Georg Schaathun Information Theory and Synthetic Steganography

More information

Compression. Reality Check 11 on page 527 explores implementation of the MDCT into a simple, working algorithm to compress audio.

Compression. Reality Check 11 on page 527 explores implementation of the MDCT into a simple, working algorithm to compress audio. C H A P T E R 11 Compression The increasingly rapid movement of information around the world relies on ingenious methods of data representation, which are in turn made possible by orthogonal transformations.the

More information

MAT 343 Laboratory 6 The SVD decomposition and Image Compression

MAT 343 Laboratory 6 The SVD decomposition and Image Compression MA 4 Laboratory 6 he SVD decomposition and Image Compression In this laboratory session we will learn how to Find the SVD decomposition of a matrix using MALAB Use the SVD to perform Image Compression

More information

Fisher Information Determines Capacity of ε-secure Steganography

Fisher Information Determines Capacity of ε-secure Steganography Fisher Information Determines Capacity of ε-secure Steganography Tomáš Filler and Jessica Fridrich Dept. of Electrical and Computer Engineering SUNY Binghamton, New York 11th Information Hiding, Darmstadt,

More information

Survey of JPEG compression history analysis

Survey of JPEG compression history analysis Survey of JPEG compression history analysis Andrew B. Lewis Computer Laboratory Topics in security forensic signal analysis References Neelamani et al.: JPEG compression history estimation for color images,

More information

Introduction to SVD and Applications

Introduction to SVD and Applications Introduction to SVD and Applications Eric Kostelich and Dave Kuhl MSRI Climate Change Summer School July 18, 2008 Introduction The goal of this exercise is to familiarize you with the basics of the singular

More information

Multimedia & Computer Visualization. Exercise #5. JPEG compression

Multimedia & Computer Visualization. Exercise #5. JPEG compression dr inż. Jacek Jarnicki, dr inż. Marek Woda Institute of Computer Engineering, Control and Robotics Wroclaw University of Technology {jacek.jarnicki, marek.woda}@pwr.wroc.pl Exercise #5 JPEG compression

More information

Low Complexity Features for JPEG Steganalysis Using Undecimated DCT

Low Complexity Features for JPEG Steganalysis Using Undecimated DCT 1 Low Complexity Features for JPEG Steganalysis Using Undecimated DCT Vojtěch Holub and Jessica Fridrich, Member, IEEE Abstract This article introduces a novel feature set for steganalysis of JPEG images

More information

Steganalysis with a Computational Immune System

Steganalysis with a Computational Immune System DIGITAL FORENSIC RESEARCH CONFERENCE Steganalysis with a Computational Immune System By Jacob Jackson, Gregg Gunsch, Roger Claypoole, Gary Lamont Presented At The Digital Forensic Research Conference DFRWS

More information

Homework 5 Solutions

Homework 5 Solutions 18-290 Signals and Systems Profs. Byron Yu and Pulkit Grover Fall 2018 Homework 5 Solutions. Part One 1. (12 points) Calculate the following convolutions: (a) x[n] δ[n n 0 ] (b) 2 n u[n] u[n] (c) 2 n u[n]

More information

Perturbed Quantization Steganography

Perturbed Quantization Steganography Perturbed Quantization Steganography Jessica Fridrich SUNY Binghamton Department of ECE Binghamton, NY 13902-6000 001 607 777 2577 fridrich@binghamton.edu Miroslav Goljan SUNY Binghamton Department of

More information

Information Hiding and Covert Communication

Information Hiding and Covert Communication Information Hiding and Covert Communication Andrew Ker adk @ comlab.ox.ac.uk Royal Society University Research Fellow Oxford University Computing Laboratory Foundations of Security Analysis and Design

More information

Department of Electrical Engineering, Polytechnic University, Brooklyn Fall 05 EL DIGITAL IMAGE PROCESSING (I) Final Exam 1/5/06, 1PM-4PM

Department of Electrical Engineering, Polytechnic University, Brooklyn Fall 05 EL DIGITAL IMAGE PROCESSING (I) Final Exam 1/5/06, 1PM-4PM Department of Electrical Engineering, Polytechnic University, Brooklyn Fall 05 EL512 --- DIGITAL IMAGE PROCESSING (I) Y. Wang Final Exam 1/5/06, 1PM-4PM Your Name: ID Number: Closed book. One sheet of

More information

Stego key searching for LSB steganography on JPEG decompressed image

Stego key searching for LSB steganography on JPEG decompressed image . RESEARCH PAPER. SCIENCE CHINA Information Sciences March 2016, Vol. 59 032105:1 032105:15 doi: 10.1007/s11432-015-5367-x Stego key searching for LSB steganography on JPEG decompressed image Jiufen LIU

More information

Detecting Doubly Compressed JPEG Images by Factor Histogram

Detecting Doubly Compressed JPEG Images by Factor Histogram APSIPA ASC 2 Xi an Detecting Doubly Compressed JPEG Images by Factor Histogram Jianquan Yang a, Guopu Zhu a, and Jiwu Huang b a Shenzhen Institutes o Advanced Technology, Chinese Academy o Sciences, Shenzhen,

More information

Quantitative Steganalysis of LSB Embedding in JPEG Domain

Quantitative Steganalysis of LSB Embedding in JPEG Domain Quantitative Steganalysis of LSB Embedding in JPEG Domain Jan Kodovský, Jessica Fridrich September 10, 2010 / ACM MM&Sec 10 1 / 17 Motivation Least Significant Bit (LSB) embedding Simplicity, high embedding

More information

Numerical Analysis. Carmen Arévalo Lund University Arévalo FMN011

Numerical Analysis. Carmen Arévalo Lund University Arévalo FMN011 Numerical Analysis Carmen Arévalo Lund University carmen@maths.lth.se Discrete cosine transform C = 2 n 1 2 1 2 1 2 cos π 2n cos 3π 2n cos (2n 1)π 2n cos 6π 2n cos 2(2n 1)π 2n cos 2π 2n... cos (n 1)π 2n

More information

encoding without prediction) (Server) Quantization: Initial Data 0, 1, 2, Quantized Data 0, 1, 2, 3, 4, 8, 16, 32, 64, 128, 256

encoding without prediction) (Server) Quantization: Initial Data 0, 1, 2, Quantized Data 0, 1, 2, 3, 4, 8, 16, 32, 64, 128, 256 General Models for Compression / Decompression -they apply to symbols data, text, and to image but not video 1. Simplest model (Lossless ( encoding without prediction) (server) Signal Encode Transmit (client)

More information

Complete characterization of perfectly secure stego-systems with mutually independent embedding operation

Complete characterization of perfectly secure stego-systems with mutually independent embedding operation Complete characterization of perfectly secure stego-systems with mutually independent embedding operation Tomáš Filler and Jessica Fridrich Dept. of Electrical and Computer Engineering SUNY Binghamton,

More information

JPEG-Compatibility Steganalysis Using Block-Histogram of Recompression Artifacts

JPEG-Compatibility Steganalysis Using Block-Histogram of Recompression Artifacts JPEG-Compatibility Steganalysis Using Block-Histogram of Recompression Artifacts Jan Kodovský and Jessica Fridrich Department of ECE, Binghamton University, NY, USA {fridrich,jan.kodovsky}@binghamton.edu

More information

Matrix Embedding with Pseudorandom Coefficient Selection and Error Correction for Robust and Secure Steganography

Matrix Embedding with Pseudorandom Coefficient Selection and Error Correction for Robust and Secure Steganography Matrix Embedding with Pseudorandom Coefficient Selection and Error Correction for Robust and Secure Steganography Anindya Sarkar, Student Member, IEEE, Upamanyu Madhow, Fellow, IEEE, and B. S. Manjunath,

More information

Minimizing Embedding Impact in Steganography using Trellis-Coded Quantization

Minimizing Embedding Impact in Steganography using Trellis-Coded Quantization Minimizing Embedding Impact in Steganography using Trellis-Coded Quantization Tomáš Filler, Jan Judas, and Jessica Fridrich Department of Electrical and Computer Engineering SUNY Binghamton, Binghamton,

More information

Detecting LSB Matching by Applying Calibration Technique for Difference Image

Detecting LSB Matching by Applying Calibration Technique for Difference Image Detecting LSB atching by Applying Calibration Technique for Difference Image iaolong Li Institute of Computer Science & Technology Peking University 87, Beijing, P. R. China lixiaolong@icst.pku.edu.cn

More information

Matrix-Vector Operations

Matrix-Vector Operations Week3 Matrix-Vector Operations 31 Opening Remarks 311 Timmy Two Space View at edx Homework 3111 Click on the below link to open a browser window with the Timmy Two Space exercise This exercise was suggested

More information

Homework 5 Solutions

Homework 5 Solutions 18-290 Signals and Systems Profs. Byron Yu and Pulkit Grover Fall 2017 Homework 5 Solutions Part One 1. (18 points) For each of the following impulse responses, determine whether the corresponding LTI

More information

Number Representation and Waveform Quantization

Number Representation and Waveform Quantization 1 Number Representation and Waveform Quantization 1 Introduction This lab presents two important concepts for working with digital signals. The first section discusses how numbers are stored in memory.

More information

Image Compression. Fundamentals: Coding redundancy. The gray level histogram of an image can reveal a great deal of information about the image

Image Compression. Fundamentals: Coding redundancy. The gray level histogram of an image can reveal a great deal of information about the image Fundamentals: Coding redundancy The gray level histogram of an image can reveal a great deal of information about the image That probability (frequency) of occurrence of gray level r k is p(r k ), p n

More information

Steganalysis of Spread Spectrum Data Hiding Exploiting Cover Memory

Steganalysis of Spread Spectrum Data Hiding Exploiting Cover Memory Steganalysis of Spread Spectrum Data Hiding Exploiting Cover Memory Kenneth Sullivan, Upamanyu Madhow, Shivkumar Chandrasekaran, and B.S. Manjunath Department of Electrical and Computer Engineering University

More information

1. Write a program to calculate distance traveled by light

1. Write a program to calculate distance traveled by light G. H. R a i s o n i C o l l e g e O f E n g i n e e r i n g D i g d o h H i l l s, H i n g n a R o a d, N a g p u r D e p a r t m e n t O f C o m p u t e r S c i e n c e & E n g g P r a c t i c a l M a

More information

Wavelet Scalable Video Codec Part 1: image compression by JPEG2000

Wavelet Scalable Video Codec Part 1: image compression by JPEG2000 1 Wavelet Scalable Video Codec Part 1: image compression by JPEG2000 Aline Roumy aline.roumy@inria.fr May 2011 2 Motivation for Video Compression Digital video studio standard ITU-R Rec. 601 Y luminance

More information

Learning goals: students learn to use the SVD to find good approximations to matrices and to compute the pseudoinverse.

Learning goals: students learn to use the SVD to find good approximations to matrices and to compute the pseudoinverse. Application of the SVD: Compression and Pseudoinverse Learning goals: students learn to use the SVD to find good approximations to matrices and to compute the pseudoinverse. Low rank approximation One

More information

SCIENTIFIC COMPUTING 7P-100-SCI

SCIENTIFIC COMPUTING 7P-100-SCI Engineering cycle, 2nd year 1 SCIENTIFIC COMPUTING 7P-100-SCI Lesson 1: General introduction and reminder on Matlab Hervé Sauer, Charles Bourassin-Bouchet, Mondher Besbes Ludivine Emeric, Léo Wojszvzyk

More information

Problem Set 8 - Solution

Problem Set 8 - Solution Problem Set 8 - Solution Jonasz Słomka Unless otherwise specified, you may use MATLAB to assist with computations. provide a print-out of the code used and its output with your assignment. Please 1. More

More information

NEW PIXEL SORTING METHOD FOR PALETTE BASED STEGANOGRAPHY AND COLOR MODEL SELECTION

NEW PIXEL SORTING METHOD FOR PALETTE BASED STEGANOGRAPHY AND COLOR MODEL SELECTION NEW PIXEL SORTING METHOD FOR PALETTE BASED STEGANOGRAPHY AND COLOR MODEL SELECTION Sos S. Agaian 1 and Juan P. Perez 2 1NSP Lab, The University of Texas at San Antonio, Electrical Engineering Department,

More information

Image Compression. 1. Introduction. Greg Ames Dec 07, 2002

Image Compression. 1. Introduction. Greg Ames Dec 07, 2002 Image Compression Greg Ames Dec 07, 2002 Abstract Digital images require large amounts of memory to store and, when retrieved from the internet, can take a considerable amount of time to download. The

More information

Outline. Linear maps. 1 Vector addition is commutative: summands can be swapped: 2 addition is associative: grouping of summands is irrelevant:

Outline. Linear maps. 1 Vector addition is commutative: summands can be swapped: 2 addition is associative: grouping of summands is irrelevant: Outline Wiskunde : Vector Spaces and Linear Maps B Jacobs Institute for Computing and Information Sciences Digital Security Version: spring 0 B Jacobs Version: spring 0 Wiskunde / 55 Points in plane The

More information

Obtaining Higher Rates for Steganographic Schemes while Maintaining the Same Detectability

Obtaining Higher Rates for Steganographic Schemes while Maintaining the Same Detectability Obtaining Higher Rates for Steganographic Schemes while Maintaining the Same Detectability Anindya Sarkar, Kaushal Solanki and and B. S. Manjunath Department of Electrical and Computer Engineering, University

More information

Lec 05 Arithmetic Coding

Lec 05 Arithmetic Coding ECE 5578 Multimedia Communication Lec 05 Arithmetic Coding Zhu Li Dept of CSEE, UMKC web: http://l.web.umkc.edu/lizhu phone: x2346 Z. Li, Multimedia Communciation, 208 p. Outline Lecture 04 ReCap Arithmetic

More information

Digital Systems and Information Part II

Digital Systems and Information Part II Digital Systems and Information Part II Overview Arithmetic Operations General Remarks Unsigned and Signed Binary Operations Number representation using Decimal Codes BCD code and Seven-Segment Code Text

More information

Lab 2 Worksheet. Problems. Problem 1: Geometry and Linear Equations

Lab 2 Worksheet. Problems. Problem 1: Geometry and Linear Equations Lab 2 Worksheet Problems Problem : Geometry and Linear Equations Linear algebra is, first and foremost, the study of systems of linear equations. You are going to encounter linear systems frequently in

More information

A TGV-based framework for variational image decompression, zooming and reconstruction. Part I: Analytics

A TGV-based framework for variational image decompression, zooming and reconstruction. Part I: Analytics A TGV-based framework for variational image decompression, zooming and reconstruction. Part I: Analytics Kristian Bredies and Martin Holler Abstract A variational model for image reconstruction is introduced

More information

Optimal Detection of OutGuess using an Accurate Model of DCT Coefficients

Optimal Detection of OutGuess using an Accurate Model of DCT Coefficients Optimal Detection of OutGuess using an Accurate Model of DCT Coefficients Thanh Hai Thai, Rémi Cogranne, Florent Retraint ICD - ROSAS - LMS - Troyes University of Technology - UMR 68, CNRS Troyes - France

More information

Vector Spaces. 1 Theory. 2 Matlab. Rules and Operations

Vector Spaces. 1 Theory. 2 Matlab. Rules and Operations Vector Spaces Rules and Operations 1 Theory Recall that we can specify a point in the plane by an ordered pair of numbers or coordinates (x, y) and a point in space with an order triple of numbers (x,

More information

Project 2: Using linear systems for numerical solution of boundary value problems

Project 2: Using linear systems for numerical solution of boundary value problems LINEAR ALGEBRA, MATH 124 Instructor: Dr. T.I. Lakoba Project 2: Using linear systems for numerical solution of boundary value problems Goal Introduce one of the most important applications of Linear Algebra

More information

The Square Root Law of Steganographic Capacity

The Square Root Law of Steganographic Capacity The Square Root Law of Steganographic Capacity ABSTRACT Andrew D. Ker Oxford University Computing Laboratory Parks Road Oxford OX1 3QD, UK adk@comlab.ox.ac.uk Jan Kodovský Dept. of Electrical and Computer

More information

Information and Entropy. Professor Kevin Gold

Information and Entropy. Professor Kevin Gold Information and Entropy Professor Kevin Gold What s Information? Informally, when I communicate a message to you, that s information. Your grade is 100/100 Information can be encoded as a signal. Words

More information

Matrix-Vector Operations

Matrix-Vector Operations Week3 Matrix-Vector Operations 31 Opening Remarks 311 Timmy Two Space View at edx Homework 3111 Click on the below link to open a browser window with the Timmy Two Space exercise This exercise was suggested

More information

Improving Selection-Channel-Aware Steganalysis Features

Improving Selection-Channel-Aware Steganalysis Features Improving Selection-Channel-Aware Steganalysis Features Tomáš Denemark and Jessica Fridrich, Department of ECE, SUNY Binghamton, NY, USA, {tdenema1,fridrich}@binghamton.edu, Pedro Comesaña-Alfaro, Department

More information

4x4 Transform and Quantization in H.264/AVC

4x4 Transform and Quantization in H.264/AVC Video compression design, analysis, consulting and research White Paper: 4x4 Transform and Quantization in H.264/AVC Iain Richardson / VCodex Limited Version 1.2 Revised November 2010 H.264 Transform and

More information

on a per-coecient basis in large images is computationally expensive. Further, the algorithm in [CR95] needs to be rerun, every time a new rate of com

on a per-coecient basis in large images is computationally expensive. Further, the algorithm in [CR95] needs to be rerun, every time a new rate of com Extending RD-OPT with Global Thresholding for JPEG Optimization Viresh Ratnakar University of Wisconsin-Madison Computer Sciences Department Madison, WI 53706 Phone: (608) 262-6627 Email: ratnakar@cs.wisc.edu

More information

Distances and similarities Based in part on slides from textbook, slides of Susan Holmes. October 3, Statistics 202: Data Mining

Distances and similarities Based in part on slides from textbook, slides of Susan Holmes. October 3, Statistics 202: Data Mining Distances and similarities Based in part on slides from textbook, slides of Susan Holmes October 3, 2012 1 / 1 Similarities Start with X which we assume is centered and standardized. The PCA loadings were

More information

Information Hiding. Andrew D. Ker. 10 Lectures, Hilary Term (complete) Department of Computer Science, Oxford University

Information Hiding. Andrew D. Ker. 10 Lectures, Hilary Term (complete) Department of Computer Science, Oxford University Information Hiding (complete) Andrew D. Ker 10 Lectures, Hilary Term 2016 Department of Computer Science, Oxford University ii Contents 0 Introduction 1 0.1 Preliminary Material..............................

More information

1 Boolean Algebra Simplification

1 Boolean Algebra Simplification cs281: Computer Organization Lab3 Prelab Our objective in this prelab is to lay the groundwork for simplifying boolean expressions in order to minimize the complexity of the resultant digital logic circuit.

More information

Homework 1 Solutions

Homework 1 Solutions 18-9 Signals and Systems Profs. Byron Yu and Pulkit Grover Fall 18 Homework 1 Solutions Part One 1. (8 points) Consider the DT signal given by the algorithm: x[] = 1 x[1] = x[n] = x[n 1] x[n ] (a) Plot

More information

18.085: Summer 2016 Due: 3 August 2016 (in class) Problem Set 8

18.085: Summer 2016 Due: 3 August 2016 (in class) Problem Set 8 Problem Set 8 Unless otherwise specified, you may use MATLAB to assist with computations. provide a print-out of the code used and its output with your assignment. Please 1. More on relation between Fourier

More information

From Fourier Series to Analysis of Non-stationary Signals - II

From Fourier Series to Analysis of Non-stationary Signals - II From Fourier Series to Analysis of Non-stationary Signals - II prof. Miroslav Vlcek October 10, 2017 Contents Signals 1 Signals 2 3 4 Contents Signals 1 Signals 2 3 4 Contents Signals 1 Signals 2 3 4 Contents

More information

Regression-based Statistical Bounds on Software Execution Time

Regression-based Statistical Bounds on Software Execution Time ecos 17, Montreal Regression-based Statistical Bounds on Software Execution Time Ayoub Nouri P. Poplavko, L. Angelis, A. Zerzelidis, S. Bensalem, P. Katsaros University of Grenoble-Alpes - France August

More information

Notes. Relations. Introduction. Notes. Relations. Notes. Definition. Example. Slides by Christopher M. Bourke Instructor: Berthe Y.

Notes. Relations. Introduction. Notes. Relations. Notes. Definition. Example. Slides by Christopher M. Bourke Instructor: Berthe Y. Relations Slides by Christopher M. Bourke Instructor: Berthe Y. Choueiry Spring 2006 Computer Science & Engineering 235 Introduction to Discrete Mathematics Sections 7.1, 7.3 7.5 of Rosen cse235@cse.unl.edu

More information

Exercise Sheet 1. 1 Probability revision 1: Student-t as an infinite mixture of Gaussians

Exercise Sheet 1. 1 Probability revision 1: Student-t as an infinite mixture of Gaussians Exercise Sheet 1 1 Probability revision 1: Student-t as an infinite mixture of Gaussians Show that an infinite mixture of Gaussian distributions, with Gamma distributions as mixing weights in the following

More information

2. the basis functions have different symmetries. 1 k = 0. x( t) 1 t 0 x(t) 0 t 1

2. the basis functions have different symmetries. 1 k = 0. x( t) 1 t 0 x(t) 0 t 1 In the next few lectures, we will look at a few examples of orthobasis expansions that are used in modern signal processing. Cosine transforms The cosine-i transform is an alternative to Fourier series;

More information

USING MULTIPLE RE-EMBEDDINGS FOR QUANTITATIVE STEGANALYSIS AND IMAGE RELIABILITY ESTIMATION

USING MULTIPLE RE-EMBEDDINGS FOR QUANTITATIVE STEGANALYSIS AND IMAGE RELIABILITY ESTIMATION TKK Reports in Information and Computer Science Espoo 2010 TKK-ICS-R34 USING MULTIPLE RE-EMBEDDINGS FOR QUANTITATIVE STEGANALYSIS AND IMAGE RELIABILITY ESTIMATION Yoan Miche, Patrick Bas and Amaury Lendasse

More information

Experiment 1: Linear Regression

Experiment 1: Linear Regression Experiment 1: Linear Regression August 27, 2018 1 Description This first exercise will give you practice with linear regression. These exercises have been extensively tested with Matlab, but they should

More information

About this class. Yousef Saad 1. Noah Lebovic 2. Jessica Lee 3. Abhishek Vashist Office hours: refer to the class web-page.

About this class. Yousef Saad 1. Noah Lebovic 2. Jessica Lee 3. Abhishek Vashist Office hours: refer to the class web-page. CSCI 2033 Spring 2018 ELEMENTARY COMPUTATIONAL LINEAR ALGEBRA Class time : MWF 10:10-11:00am Room : Blegen Hall 10 Instructor : Yousef Saad URL : www-users.cselabs.umn.edu/classes/spring-2018 /csci2033-morning/

More information

A First Course on Kinetics and Reaction Engineering Example S5.1

A First Course on Kinetics and Reaction Engineering Example S5.1 Example S5.1 Problem Purpose This example illustrates the use of the MATLAB template file SolvBVDif.m to solve a second order boundary value ordinary differential equation. Problem Statement Solve the

More information

A Total-Variation-based JPEG decompression model

A Total-Variation-based JPEG decompression model SpezialForschungsBereich F 32 Karl Franzens Universit at Graz Technische Universit at Graz Medizinische Universit at Graz A Total-Variation-based JPEG decompression model M. Holler K. Bredies SFB-Report

More information

Math 414 Lecture 1. Reading assignment: Text: Pages 1-29 and Scilab Users Guide: Sections 1-3.

Math 414 Lecture 1. Reading assignment: Text: Pages 1-29 and Scilab Users Guide: Sections 1-3. Math 414 Lecture 1 Homework assignments are always due at the beginning of the next lecture. Operations Research studies linear programming and associated algorithms. Businesses use it to find resource

More information

Image Data Compression. Steganography and steganalysis Alexey Pak, PhD, Lehrstuhl für Interak;ve Echtzeitsysteme, Fakultät für Informa;k, KIT

Image Data Compression. Steganography and steganalysis Alexey Pak, PhD, Lehrstuhl für Interak;ve Echtzeitsysteme, Fakultät für Informa;k, KIT Image Data Compression Steganography and steganalysis 1 Stenography vs watermarking Watermarking: impercep'bly altering a Work to embed a message about that Work Steganography: undetectably altering a

More information

Linear Neural Networks

Linear Neural Networks Chapter 10 Linear Neural Networks In this chapter, we introduce the concept of the linear neural network. 10.1 Introduction and Notation 1. The linear neural cell, or node has the schematic form as shown

More information

Machine Learning: Homework 5

Machine Learning: Homework 5 0-60 Machine Learning: Homework 5 Due 5:0 p.m. Thursday, March, 06 TAs: Travis Dick and Han Zhao Instructions Late homework policy: Homework is worth full credit if submitted before the due date, half

More information

Wet Paper Codes with Improved Embedding Efficiency

Wet Paper Codes with Improved Embedding Efficiency 1 Wet Paper Codes with Improved Embedding Efficiency Jessica Fridrich, Member, IEEE, Miroslav Goljan, and David Soukal Abstract Wet paper codes were previously proposed as a tool for construction of steganographic

More information

Star Cluster Photometry and the H-R Diagram

Star Cluster Photometry and the H-R Diagram Star Cluster Photometry and the H-R Diagram Contents Introduction Star Cluster Photometry... 1 Downloads... 1 Part 1: Measuring Star Magnitudes... 2 Part 2: Plotting the Stars on a Colour-Magnitude (H-R)

More information

Image Data Compression

Image Data Compression Image Data Compression Image data compression is important for - image archiving e.g. satellite data - image transmission e.g. web data - multimedia applications e.g. desk-top editing Image data compression

More information

MINIMIZING ADDITIVE DISTORTION FUNCTIONS WITH NON-BINARY EMBEDDING OPERATION IN STEGANOGRAPHY. Tomáš Filler and Jessica Fridrich

MINIMIZING ADDITIVE DISTORTION FUNCTIONS WITH NON-BINARY EMBEDDING OPERATION IN STEGANOGRAPHY. Tomáš Filler and Jessica Fridrich MINIMIZING ADDITIVE DISTORTION FUNCTIONS WITH NON-BINARY EMBEDDING OPERATION IN STEGANOGRAPHY Tomáš Filler and Jessica Fridrich Department of ECE, SUNY Binghamton, NY, USA {tomas.filler, fridrich}@binghamton.edu

More information

(a) Compute the projections of vectors [1,0,0] and [0,1,0] onto the line spanned by a Solution: The projection matrix is P = 1

(a) Compute the projections of vectors [1,0,0] and [0,1,0] onto the line spanned by a Solution: The projection matrix is P = 1 6 [3] 3. Consider the plane S defined by 2u 3v+w = 0, and recall that the normal to this plane is the vector a = [2, 3,1]. (a) Compute the projections of vectors [1,0,0] and [0,1,0] onto the line spanned

More information

The data for Practical 2 is available for download at the dropbox link embedded in the I sent you.

The data for Practical 2 is available for download at the dropbox link embedded in the  I sent you. EGM310 UNDERWATER REMOTE SENSING PRACTICALS RORY QUINN PRACTICAL 2: MBES BACKSCATTER DATA Aim of practical To gain confidence in interpreting backscatter data derived from multi-beam echo-sounder surveys,

More information

Image Compression - JPEG

Image Compression - JPEG Overview of JPEG CpSc 86: Multimedia Systems and Applications Image Compression - JPEG What is JPEG? "Joint Photographic Expert Group". Voted as international standard in 99. Works with colour and greyscale

More information

Light and Optics. Light and Optics. Author: Sarah Roberts

Light and Optics. Light and Optics. Author: Sarah Roberts Activity Instructions Author: Sarah Roberts - Faulkes Telescope Project Activity Instructions Introduction In this activity, you will either search the image archive on the Faulkes Telescope Project website

More information

12. Machine learning I. Regression Overfitting Classification Example: Handwritten digit recognition Support vector machines (SVMs)

12. Machine learning I. Regression Overfitting Classification Example: Handwritten digit recognition Support vector machines (SVMs) 12. Machine learning I Regression Overfitting Classification Example: Handwritten digit recognition Support vector machines (SVMs) 48 Regression Suppose we are given N pairs of a vector x and a scalar

More information

Compression. What. Why. Reduce the amount of information (bits) needed to represent image Video: 720 x 480 res, 30 fps, color

Compression. What. Why. Reduce the amount of information (bits) needed to represent image Video: 720 x 480 res, 30 fps, color Compression What Reduce the amount of information (bits) needed to represent image Video: 720 x 480 res, 30 fps, color Why 720x480x20x3 = 31,104,000 bytes/sec 30x60x120 = 216 Gigabytes for a 2 hour movie

More information

Linear Algebra II. 2 Matrices. Notes 2 21st October Matrix algebra

Linear Algebra II. 2 Matrices. Notes 2 21st October Matrix algebra MTH6140 Linear Algebra II Notes 2 21st October 2010 2 Matrices You have certainly seen matrices before; indeed, we met some in the first chapter of the notes Here we revise matrix algebra, consider row

More information

ROC Curves for Steganalysts

ROC Curves for Steganalysts ROC Curves for Steganalysts Andreas Westfeld Technische Universität Dresden Institut für Systemarchitektur 01062 Dresden mailto:westfeld@inf.tu-dresden.de 1 Introduction There are different approaches

More information

Examples MAT-INF1100. Øyvind Ryan

Examples MAT-INF1100. Øyvind Ryan Examples MAT-INF00 Øyvind Ryan February 9, 20 Example 0.. Instead of converting 76 to base 8 let us convert it to base 6. We find that 76//6 = 2 with remainder. In the next step we find 2//6 = 4 with remainder.

More information

The Bell-LaPadula Model

The Bell-LaPadula Model The Bell-LaPadula Model CSM27 Computer Security Dr Hans Georg Schaathun University of Surrey Autumn 2007 Dr Hans Georg Schaathun The Bell-LaPadula Model Autumn 2007 1 / 25 The session Session objectives

More information

Properties of Linear Transformations from R n to R m

Properties of Linear Transformations from R n to R m Properties of Linear Transformations from R n to R m MATH 322, Linear Algebra I J. Robert Buchanan Department of Mathematics Spring 2015 Topic Overview Relationship between the properties of a matrix transformation

More information

DM559 Linear and integer programming

DM559 Linear and integer programming Department of Mathematics and Computer Science University of Southern Denmark, Odense March 8, 2018 Marco Chiarandini DM559 Linear and integer programming Sheet 4, Spring 2018 [pdf format] Included. Exercise

More information

Singular Value Decompsition

Singular Value Decompsition Singular Value Decompsition Massoud Malek One of the most useful results from linear algebra, is a matrix decomposition known as the singular value decomposition It has many useful applications in almost

More information

Appendix B Microsoft Office Specialist exam objectives maps

Appendix B Microsoft Office Specialist exam objectives maps B 1 Appendix B Microsoft Office Specialist exam objectives maps This appendix covers these additional topics: A Excel 2003 Specialist exam objectives with references to corresponding material in Course

More information

Hiding Data in a QImage File

Hiding Data in a QImage File Hiding Data in a QImage File Gabriela Mogos Abstract The idea of embedding some information within a digital media, in such a way that the inserted data are intrinsically part of the media itself, has

More information

Lecture 5. Ideal and Almost-Ideal SG.

Lecture 5. Ideal and Almost-Ideal SG. Lecture 5. Ideal and Almost-Ideal SG. Definition. SG is called ideal (perfect or unconditionally undetectable ISG),if its detection is equivalently to random guessing of this fact even with the use of

More information

MPSteg-color: a new steganographic technique for color images

MPSteg-color: a new steganographic technique for color images MPSteg-color: a new steganographic technique for color images Giacomo Cancelli, Mauro Barni Università degli Studi di Siena Dipartimento di Ingegneria dell Informazione, Italy {cancelli,barni}@dii.unisi.it

More information

Product Obsolete/Under Obsolescence. Quantization. Author: Latha Pillai

Product Obsolete/Under Obsolescence. Quantization. Author: Latha Pillai Application Note: Virtex and Virtex-II Series XAPP615 (v1.1) June 25, 2003 R Quantization Author: Latha Pillai Summary This application note describes a reference design to do a quantization and inverse

More information

7 Matrix Operations. 7.0 Matrix Multiplication + 3 = 3 = 4

7 Matrix Operations. 7.0 Matrix Multiplication + 3 = 3 = 4 7 Matrix Operations Copyright 017, Gregory G. Smith 9 October 017 The product of two matrices is a sophisticated operations with a wide range of applications. In this chapter, we defined this binary operation,

More information

Statistical Methods: Introduction, Applications, Histograms, Ch

Statistical Methods: Introduction, Applications, Histograms, Ch Outlines Statistical Methods: Introduction, Applications, Histograms, Characteristics November 4, 2004 Outlines Part I: Statistical Methods: Introduction and Applications Part II: Statistical Methods:

More information

1111: Linear Algebra I

1111: Linear Algebra I 1111: Linear Algebra I Dr. Vladimir Dotsenko (Vlad) Lecture 13 Dr. Vladimir Dotsenko (Vlad) 1111: Linear Algebra I Lecture 13 1 / 8 The coordinate vector space R n We already used vectors in n dimensions

More information

Outline. Convolution. Filtering

Outline. Convolution. Filtering Filtering Outline Convolution Filtering Logistics HW1 HW2 - out tomorrow Recall: what is a digital (grayscale) image? Matrix of integer values Images as height fields Let s think of image as zero-padded

More information

Image compression. Institute of Engineering & Technology, Ahmedabad University. October 20, 2015

Image compression. Institute of Engineering & Technology, Ahmedabad University. October 20, 2015 Image compression Rahul Patel (121040) rahul.patel@iet.ahduni.edu.in Shashwat Sanghavi (121049) shashwat.sanghavi@iet.ahduni.edu.in Institute of Engineering & Technology, Ahmedabad University October 20,

More information

Numpy. Luis Pedro Coelho. October 22, Programming for Scientists. Luis Pedro Coelho (Programming for Scientists) Numpy October 22, 2012 (1 / 26)

Numpy. Luis Pedro Coelho. October 22, Programming for Scientists. Luis Pedro Coelho (Programming for Scientists) Numpy October 22, 2012 (1 / 26) Numpy Luis Pedro Coelho Programming for Scientists October 22, 2012 Luis Pedro Coelho (Programming for Scientists) Numpy October 22, 2012 (1 / 26) Historical Numeric (1995) Numarray (for large arrays)

More information

Basics of DCT, Quantization and Entropy Coding

Basics of DCT, Quantization and Entropy Coding Basics of DCT, Quantization and Entropy Coding Nimrod Peleg Update: April. 7 Discrete Cosine Transform (DCT) First used in 97 (Ahmed, Natarajan and Rao). Very close to the Karunen-Loeve * (KLT) transform

More information