Steganalysis in JPEG
|
|
- Conrad Owens
- 5 years ago
- Views:
Transcription
1 Steganalysis in JPEG CSM25 Secure Information Hiding Dr Hans Georg Schaathun University of Surrey Spring 2007 Dr Hans Georg Schaathun Steganalysis in JPEG Spring / 24
2 Learning Outcomes learn additional techniques for steganalysis in the JPEG domain. Dr Hans Georg Schaathun Steganalysis in JPEG Spring / 24
3 Reading Core Reading Jessica Fridrich, Miroslav Goljan, Dorin Hogea: «Steganalysis of JPEG Images: Breaking the F5 Algorithm» 5th Information Hiding Workshop, Noordwijkerhout, The Netherlands, 7 9 October 2002, pp Dr Hans Georg Schaathun Steganalysis in JPEG Spring / 24
4 Outline JPEG Histogramme Histogramme 1 JPEG Histogramme Histogramme 2 JPEG Calibration The idea 3 Conclusion Dr Hans Georg Schaathun Steganalysis in JPEG Spring / 24
5 JPEG Histogramme The JPEG Coefficients Histogramme Recall that JPEG uses the blockwise DCT transform 8 8 blocks called DCT coefficients (floating point) The entries are quantised, called JPEG coefficients (integers) Each block has one DC coefficient, (0, 0) 63 AC coefficients, (i, j) (0, 0), 0 i, j 7 Dr Hans Georg Schaathun Steganalysis in JPEG Spring / 24
6 JPEG Histogramme Histogramme Histogramme We calculate the histogramme of the AC JPEG coefficients h(x) is the number of coefficients equal to x Frequency-wise histogramme h ij (x) is the number of blocks where coefficient (i, j) is equal to x DC histogramme h 00 (x) The histogramme can be plotted curve bar chart Dr Hans Georg Schaathun Steganalysis in JPEG Spring / 24
7 JPEG Histogramme Histogramme Histogramme We calculate the histogramme of the AC JPEG coefficients h(x) is the number of coefficients equal to x Frequency-wise histogramme h ij (x) is the number of blocks where coefficient (i, j) is equal to x DC histogramme h 00 (x) The histogramme can be plotted curve bar chart Dr Hans Georg Schaathun Steganalysis in JPEG Spring / 24
8 JPEG Histogramme Histogramme Histogramme We calculate the histogramme of the AC JPEG coefficients h(x) is the number of coefficients equal to x Frequency-wise histogramme h ij (x) is the number of blocks where coefficient (i, j) is equal to x DC histogramme h 00 (x) The histogramme can be plotted curve bar chart Dr Hans Georg Schaathun Steganalysis in JPEG Spring / 24
9 Outline JPEG Histogramme 1 JPEG Histogramme Histogramme 2 JPEG Calibration The idea 3 Conclusion Dr Hans Georg Schaathun Steganalysis in JPEG Spring / 24
10 JPEG Toolbox Reading a JPEG image JPEG Histogramme» im = jpeg_read ( Kerckhoffs.jpg ) im = image_width: 180 image_height: 247 image_components: 3 image_color_space: 2 jpeg_components: 3 jpeg_color_space: 3 comments: {} coef_arrays: {[248x184 double] [128x96 double] [128x96 quant_tables: {[8x8 double] [8x8 double]} ac_huff_tables: [1x2 struct] dc_huff_tables: [1x2 struct] optimize_coding: 0 comp_info: [1x3 struct] progressive_mode: 0» Dr Hans Georg Schaathun Steganalysis in JPEG Spring / 24
11 JPEG Toolbox JPEG data JPEG Histogramme» Xy = im.coef_arraysim.comp_info(1).component_id ;» whos Xy Name Size Bytes Class Attributes Xy 248x double» Q = im.quant_tablesim.comp_info(1).quant_tbl_no Q =» Dr Hans Georg Schaathun Steganalysis in JPEG Spring / 24
12 JPEG Histogramme w/o the toolbox Load/Save workspace jpeg_read and jpeg_write are compiled functions, Non-trivial to install In the exercises, can load presaved workspaces» load image.mat» whos Name Size Bytes Class Attributes im 1x struct There is one mat-file for each image on the web page Dr Hans Georg Schaathun Steganalysis in JPEG Spring / 24
13 JPEG Histogramme Other toolbox functions I recommend that you use the other toolbox functions bdct, ibdct, quantize, dequantize These are m-files, which can be copied into current directory. Alternatively, use matlab on tweek which has the toolbox. Dr Hans Georg Schaathun Steganalysis in JPEG Spring / 24
14 JPEG Histogramme Extracting AC coefficients Consider N M matrix, A If B is a boolean (logical) N M matrix, then A(B) is a vector consisting of all elements from A corresponding to a 1 (true) in B Suppose we run (where A is N M DCT image) 1 B = logical(ones(8,8)) % Make 8x8 matrix of ones 2 B(1,1) = 0 % DC coefficient : zero 3 BB = repmat ( B, N/8, M/8 ) % Concatenate block for full image 4 X = A(B) % Vector of AC coefficients Dr Hans Georg Schaathun Steganalysis in JPEG Spring / 24
15 Histogramme JPEG Histogramme We have discussed histogrammes before Essentially you need two functions hist to extract frequencies bar to make the plot Refer to help files and to exercise sheet Dr Hans Georg Schaathun Steganalysis in JPEG Spring / 24
16 JPEG Histogramme Exercise JPEG Histogramme 1 Refer to details on the exercise sheet. 2 Download Image A from the web site; and load it in. 3 Make a vector X of AC coefficients (luminence) from A 4 Plot a histogramme of the JPEG AC coefficients of A. Dr Hans Georg Schaathun Steganalysis in JPEG Spring / 24
17 Outline JPEG Calibration The idea 1 JPEG Histogramme Histogramme 2 JPEG Calibration The idea 3 Conclusion Dr Hans Georg Schaathun Steganalysis in JPEG Spring / 24
18 JPEG Calibration The idea The calibrated image JPEG has a block-structure Steganography in JPEG follows the block-structure What happens if we de- and re-compress the image with different block structure? Dr Hans Georg Schaathun Steganalysis in JPEG Spring / 24
19 JPEG Calibration The idea The calibrated image JPEG has a block-structure Steganography in JPEG follows the block-structure What happens if we de- and re-compress the image with different block structure? Dr Hans Georg Schaathun Steganalysis in JPEG Spring / 24
20 JPEG Calibration The idea The calibrated image JPEG has a block-structure Steganography in JPEG follows the block-structure What happens if we de- and re-compress the image with different block structure? Dr Hans Georg Schaathun Steganalysis in JPEG Spring / 24
21 The calibrated image JPEG Calibration The idea JPEG has a block-structure Steganography in JPEG follows the block-structure What happens if we de- and re-compress the image with different block structure? Dr Hans Georg Schaathun Steganalysis in JPEG Spring / 24
22 JPEG Calibration The idea The calibrated image JPEG has a block-structure Steganography in JPEG follows the block-structure What happens if we de- and re-compress the image with different block structure? Dr Hans Georg Schaathun Steganalysis in JPEG Spring / 24
23 JPEG Calibration Histogramme comparison The idea 1 Decompress the image 2 Crop 4 pixels; either 4 rows at top and bottom 4 columns left and right 4 pixels on each edge 3 Recompress using same quality factor and quantisation matrix called calibrated image 4 Compare histogramme of original and calibrated images 5 What do you see? Dr Hans Georg Schaathun Steganalysis in JPEG Spring / 24
24 Outline JPEG Calibration 1 JPEG Histogramme Histogramme 2 JPEG Calibration The idea 3 Conclusion Dr Hans Georg Schaathun Steganalysis in JPEG Spring / 24
25 JPEG Calibration JPEG Toolbox Decompression Dequantisation» Xy2 = dequantize ( Xy, Q ) ; Inverse transform» Xy3 = ibdct ( Xy2 ) ; Normalisation» Xy4 = uint8( Xy ) ; Did it work?» imshow ( Xy4 ) Note, we have only used grayscale information. Dr Hans Georg Schaathun Steganalysis in JPEG Spring / 24
26 JPEG Toolbox Recompression JPEG Calibration New range» Xy3 = double( Xy4-128 ) ; Inverse transform» Xy2 = bdct ( Xy3 ) ; Quantisation» Xy = quantize ( Xy2, Q ) ; Reinsertion» im.coef_arrays{im.comp_info(1).component_id} = Xy ; Dr Hans Georg Schaathun Steganalysis in JPEG Spring / 24
27 JPEG Calibration Exercise JPEG Image Calibration 1 Refer to details on the exercise sheet. 2 You still have the image A from the previous exercise. 3 Make an m-file which takes an image as input and outputs the calibrated image. Make a calibrated image A from A. 4 Plot a histogramme of the JPEG AC coefficients of A. 5 Compare the two histogrammes and comment. Dr Hans Georg Schaathun Steganalysis in JPEG Spring / 24
28 Exercise (Part 2) JPEG Image Calibration JPEG Calibration 1 Refer to details on the exercise sheet. 2 Download Image B from the web site; and load it in. 3 Make a calibrated image B from B, as in Part 1. 4 Plot histogrammes (JPEG coefficients) of B and B (as in the previous part) 5 Compare the histogrammes of A, B, A, and B. What do you see? Do you think A and/or B is a stegogramme? Dr Hans Georg Schaathun Steganalysis in JPEG Spring / 24
29 Conclusion Conclusion Compare an image and its calibrated image Normally very similar statistics,... because neighbour blocks are similar (visually) Data embedding change blocks independently Changes block structure and block statistics,... but the calibrated image is not changed in the same way We can use the calibrated image to estimate statistics in the original coverimage. Dr Hans Georg Schaathun Steganalysis in JPEG Spring / 24
30 In general Conclusion Main challenge in stegananalysis what is the expected statistics for a normal image? a.k.a. baseline value (Extra) Structural Steganalysis Look out for features in the JPEG format What is in the comments field? gives you access to this field... See Image D Dr Hans Georg Schaathun Steganalysis in JPEG Spring / 24
Learning outcomes. Palettes and GIF. The colour palette. Using the colour palette The GIF file. CSM25 Secure Information Hiding
Learning outcomes Palettes and GIF CSM25 Secure Information Hiding Dr Hans Georg Schaathun University of Surrey Learn how images are represented using a palette Get an overview of hiding techniques in
More informationLearning Outcomes. Information Theory and Synthetic Steganography. Reading. The communications problem
Learning Outcomes Information Theory and Synthetic Steganography CSM25 Secure Information Hiding Dr Hans Georg Schaathun University of Surrey Spring 2009 Week 8 understand the relationship between steganography
More informationInformation Theory and Synthetic Steganography
Information Theory and Synthetic Steganography CSM25 Secure Information Hiding Dr Hans Georg Schaathun University of Surrey Spring 2009 Week 8 Dr Hans Georg Schaathun Information Theory and Synthetic Steganography
More informationCompression. Reality Check 11 on page 527 explores implementation of the MDCT into a simple, working algorithm to compress audio.
C H A P T E R 11 Compression The increasingly rapid movement of information around the world relies on ingenious methods of data representation, which are in turn made possible by orthogonal transformations.the
More informationMAT 343 Laboratory 6 The SVD decomposition and Image Compression
MA 4 Laboratory 6 he SVD decomposition and Image Compression In this laboratory session we will learn how to Find the SVD decomposition of a matrix using MALAB Use the SVD to perform Image Compression
More informationFisher Information Determines Capacity of ε-secure Steganography
Fisher Information Determines Capacity of ε-secure Steganography Tomáš Filler and Jessica Fridrich Dept. of Electrical and Computer Engineering SUNY Binghamton, New York 11th Information Hiding, Darmstadt,
More informationSurvey of JPEG compression history analysis
Survey of JPEG compression history analysis Andrew B. Lewis Computer Laboratory Topics in security forensic signal analysis References Neelamani et al.: JPEG compression history estimation for color images,
More informationIntroduction to SVD and Applications
Introduction to SVD and Applications Eric Kostelich and Dave Kuhl MSRI Climate Change Summer School July 18, 2008 Introduction The goal of this exercise is to familiarize you with the basics of the singular
More informationMultimedia & Computer Visualization. Exercise #5. JPEG compression
dr inż. Jacek Jarnicki, dr inż. Marek Woda Institute of Computer Engineering, Control and Robotics Wroclaw University of Technology {jacek.jarnicki, marek.woda}@pwr.wroc.pl Exercise #5 JPEG compression
More informationLow Complexity Features for JPEG Steganalysis Using Undecimated DCT
1 Low Complexity Features for JPEG Steganalysis Using Undecimated DCT Vojtěch Holub and Jessica Fridrich, Member, IEEE Abstract This article introduces a novel feature set for steganalysis of JPEG images
More informationSteganalysis with a Computational Immune System
DIGITAL FORENSIC RESEARCH CONFERENCE Steganalysis with a Computational Immune System By Jacob Jackson, Gregg Gunsch, Roger Claypoole, Gary Lamont Presented At The Digital Forensic Research Conference DFRWS
More informationHomework 5 Solutions
18-290 Signals and Systems Profs. Byron Yu and Pulkit Grover Fall 2018 Homework 5 Solutions. Part One 1. (12 points) Calculate the following convolutions: (a) x[n] δ[n n 0 ] (b) 2 n u[n] u[n] (c) 2 n u[n]
More informationPerturbed Quantization Steganography
Perturbed Quantization Steganography Jessica Fridrich SUNY Binghamton Department of ECE Binghamton, NY 13902-6000 001 607 777 2577 fridrich@binghamton.edu Miroslav Goljan SUNY Binghamton Department of
More informationInformation Hiding and Covert Communication
Information Hiding and Covert Communication Andrew Ker adk @ comlab.ox.ac.uk Royal Society University Research Fellow Oxford University Computing Laboratory Foundations of Security Analysis and Design
More informationDepartment of Electrical Engineering, Polytechnic University, Brooklyn Fall 05 EL DIGITAL IMAGE PROCESSING (I) Final Exam 1/5/06, 1PM-4PM
Department of Electrical Engineering, Polytechnic University, Brooklyn Fall 05 EL512 --- DIGITAL IMAGE PROCESSING (I) Y. Wang Final Exam 1/5/06, 1PM-4PM Your Name: ID Number: Closed book. One sheet of
More informationStego key searching for LSB steganography on JPEG decompressed image
. RESEARCH PAPER. SCIENCE CHINA Information Sciences March 2016, Vol. 59 032105:1 032105:15 doi: 10.1007/s11432-015-5367-x Stego key searching for LSB steganography on JPEG decompressed image Jiufen LIU
More informationDetecting Doubly Compressed JPEG Images by Factor Histogram
APSIPA ASC 2 Xi an Detecting Doubly Compressed JPEG Images by Factor Histogram Jianquan Yang a, Guopu Zhu a, and Jiwu Huang b a Shenzhen Institutes o Advanced Technology, Chinese Academy o Sciences, Shenzhen,
More informationQuantitative Steganalysis of LSB Embedding in JPEG Domain
Quantitative Steganalysis of LSB Embedding in JPEG Domain Jan Kodovský, Jessica Fridrich September 10, 2010 / ACM MM&Sec 10 1 / 17 Motivation Least Significant Bit (LSB) embedding Simplicity, high embedding
More informationNumerical Analysis. Carmen Arévalo Lund University Arévalo FMN011
Numerical Analysis Carmen Arévalo Lund University carmen@maths.lth.se Discrete cosine transform C = 2 n 1 2 1 2 1 2 cos π 2n cos 3π 2n cos (2n 1)π 2n cos 6π 2n cos 2(2n 1)π 2n cos 2π 2n... cos (n 1)π 2n
More informationencoding without prediction) (Server) Quantization: Initial Data 0, 1, 2, Quantized Data 0, 1, 2, 3, 4, 8, 16, 32, 64, 128, 256
General Models for Compression / Decompression -they apply to symbols data, text, and to image but not video 1. Simplest model (Lossless ( encoding without prediction) (server) Signal Encode Transmit (client)
More informationComplete characterization of perfectly secure stego-systems with mutually independent embedding operation
Complete characterization of perfectly secure stego-systems with mutually independent embedding operation Tomáš Filler and Jessica Fridrich Dept. of Electrical and Computer Engineering SUNY Binghamton,
More informationJPEG-Compatibility Steganalysis Using Block-Histogram of Recompression Artifacts
JPEG-Compatibility Steganalysis Using Block-Histogram of Recompression Artifacts Jan Kodovský and Jessica Fridrich Department of ECE, Binghamton University, NY, USA {fridrich,jan.kodovsky}@binghamton.edu
More informationMatrix Embedding with Pseudorandom Coefficient Selection and Error Correction for Robust and Secure Steganography
Matrix Embedding with Pseudorandom Coefficient Selection and Error Correction for Robust and Secure Steganography Anindya Sarkar, Student Member, IEEE, Upamanyu Madhow, Fellow, IEEE, and B. S. Manjunath,
More informationMinimizing Embedding Impact in Steganography using Trellis-Coded Quantization
Minimizing Embedding Impact in Steganography using Trellis-Coded Quantization Tomáš Filler, Jan Judas, and Jessica Fridrich Department of Electrical and Computer Engineering SUNY Binghamton, Binghamton,
More informationDetecting LSB Matching by Applying Calibration Technique for Difference Image
Detecting LSB atching by Applying Calibration Technique for Difference Image iaolong Li Institute of Computer Science & Technology Peking University 87, Beijing, P. R. China lixiaolong@icst.pku.edu.cn
More informationMatrix-Vector Operations
Week3 Matrix-Vector Operations 31 Opening Remarks 311 Timmy Two Space View at edx Homework 3111 Click on the below link to open a browser window with the Timmy Two Space exercise This exercise was suggested
More informationHomework 5 Solutions
18-290 Signals and Systems Profs. Byron Yu and Pulkit Grover Fall 2017 Homework 5 Solutions Part One 1. (18 points) For each of the following impulse responses, determine whether the corresponding LTI
More informationNumber Representation and Waveform Quantization
1 Number Representation and Waveform Quantization 1 Introduction This lab presents two important concepts for working with digital signals. The first section discusses how numbers are stored in memory.
More informationImage Compression. Fundamentals: Coding redundancy. The gray level histogram of an image can reveal a great deal of information about the image
Fundamentals: Coding redundancy The gray level histogram of an image can reveal a great deal of information about the image That probability (frequency) of occurrence of gray level r k is p(r k ), p n
More informationSteganalysis of Spread Spectrum Data Hiding Exploiting Cover Memory
Steganalysis of Spread Spectrum Data Hiding Exploiting Cover Memory Kenneth Sullivan, Upamanyu Madhow, Shivkumar Chandrasekaran, and B.S. Manjunath Department of Electrical and Computer Engineering University
More information1. Write a program to calculate distance traveled by light
G. H. R a i s o n i C o l l e g e O f E n g i n e e r i n g D i g d o h H i l l s, H i n g n a R o a d, N a g p u r D e p a r t m e n t O f C o m p u t e r S c i e n c e & E n g g P r a c t i c a l M a
More informationWavelet Scalable Video Codec Part 1: image compression by JPEG2000
1 Wavelet Scalable Video Codec Part 1: image compression by JPEG2000 Aline Roumy aline.roumy@inria.fr May 2011 2 Motivation for Video Compression Digital video studio standard ITU-R Rec. 601 Y luminance
More informationLearning goals: students learn to use the SVD to find good approximations to matrices and to compute the pseudoinverse.
Application of the SVD: Compression and Pseudoinverse Learning goals: students learn to use the SVD to find good approximations to matrices and to compute the pseudoinverse. Low rank approximation One
More informationSCIENTIFIC COMPUTING 7P-100-SCI
Engineering cycle, 2nd year 1 SCIENTIFIC COMPUTING 7P-100-SCI Lesson 1: General introduction and reminder on Matlab Hervé Sauer, Charles Bourassin-Bouchet, Mondher Besbes Ludivine Emeric, Léo Wojszvzyk
More informationProblem Set 8 - Solution
Problem Set 8 - Solution Jonasz Słomka Unless otherwise specified, you may use MATLAB to assist with computations. provide a print-out of the code used and its output with your assignment. Please 1. More
More informationNEW PIXEL SORTING METHOD FOR PALETTE BASED STEGANOGRAPHY AND COLOR MODEL SELECTION
NEW PIXEL SORTING METHOD FOR PALETTE BASED STEGANOGRAPHY AND COLOR MODEL SELECTION Sos S. Agaian 1 and Juan P. Perez 2 1NSP Lab, The University of Texas at San Antonio, Electrical Engineering Department,
More informationImage Compression. 1. Introduction. Greg Ames Dec 07, 2002
Image Compression Greg Ames Dec 07, 2002 Abstract Digital images require large amounts of memory to store and, when retrieved from the internet, can take a considerable amount of time to download. The
More informationOutline. Linear maps. 1 Vector addition is commutative: summands can be swapped: 2 addition is associative: grouping of summands is irrelevant:
Outline Wiskunde : Vector Spaces and Linear Maps B Jacobs Institute for Computing and Information Sciences Digital Security Version: spring 0 B Jacobs Version: spring 0 Wiskunde / 55 Points in plane The
More informationObtaining Higher Rates for Steganographic Schemes while Maintaining the Same Detectability
Obtaining Higher Rates for Steganographic Schemes while Maintaining the Same Detectability Anindya Sarkar, Kaushal Solanki and and B. S. Manjunath Department of Electrical and Computer Engineering, University
More informationLec 05 Arithmetic Coding
ECE 5578 Multimedia Communication Lec 05 Arithmetic Coding Zhu Li Dept of CSEE, UMKC web: http://l.web.umkc.edu/lizhu phone: x2346 Z. Li, Multimedia Communciation, 208 p. Outline Lecture 04 ReCap Arithmetic
More informationDigital Systems and Information Part II
Digital Systems and Information Part II Overview Arithmetic Operations General Remarks Unsigned and Signed Binary Operations Number representation using Decimal Codes BCD code and Seven-Segment Code Text
More informationLab 2 Worksheet. Problems. Problem 1: Geometry and Linear Equations
Lab 2 Worksheet Problems Problem : Geometry and Linear Equations Linear algebra is, first and foremost, the study of systems of linear equations. You are going to encounter linear systems frequently in
More informationA TGV-based framework for variational image decompression, zooming and reconstruction. Part I: Analytics
A TGV-based framework for variational image decompression, zooming and reconstruction. Part I: Analytics Kristian Bredies and Martin Holler Abstract A variational model for image reconstruction is introduced
More informationOptimal Detection of OutGuess using an Accurate Model of DCT Coefficients
Optimal Detection of OutGuess using an Accurate Model of DCT Coefficients Thanh Hai Thai, Rémi Cogranne, Florent Retraint ICD - ROSAS - LMS - Troyes University of Technology - UMR 68, CNRS Troyes - France
More informationVector Spaces. 1 Theory. 2 Matlab. Rules and Operations
Vector Spaces Rules and Operations 1 Theory Recall that we can specify a point in the plane by an ordered pair of numbers or coordinates (x, y) and a point in space with an order triple of numbers (x,
More informationProject 2: Using linear systems for numerical solution of boundary value problems
LINEAR ALGEBRA, MATH 124 Instructor: Dr. T.I. Lakoba Project 2: Using linear systems for numerical solution of boundary value problems Goal Introduce one of the most important applications of Linear Algebra
More informationThe Square Root Law of Steganographic Capacity
The Square Root Law of Steganographic Capacity ABSTRACT Andrew D. Ker Oxford University Computing Laboratory Parks Road Oxford OX1 3QD, UK adk@comlab.ox.ac.uk Jan Kodovský Dept. of Electrical and Computer
More informationInformation and Entropy. Professor Kevin Gold
Information and Entropy Professor Kevin Gold What s Information? Informally, when I communicate a message to you, that s information. Your grade is 100/100 Information can be encoded as a signal. Words
More informationMatrix-Vector Operations
Week3 Matrix-Vector Operations 31 Opening Remarks 311 Timmy Two Space View at edx Homework 3111 Click on the below link to open a browser window with the Timmy Two Space exercise This exercise was suggested
More informationImproving Selection-Channel-Aware Steganalysis Features
Improving Selection-Channel-Aware Steganalysis Features Tomáš Denemark and Jessica Fridrich, Department of ECE, SUNY Binghamton, NY, USA, {tdenema1,fridrich}@binghamton.edu, Pedro Comesaña-Alfaro, Department
More information4x4 Transform and Quantization in H.264/AVC
Video compression design, analysis, consulting and research White Paper: 4x4 Transform and Quantization in H.264/AVC Iain Richardson / VCodex Limited Version 1.2 Revised November 2010 H.264 Transform and
More informationon a per-coecient basis in large images is computationally expensive. Further, the algorithm in [CR95] needs to be rerun, every time a new rate of com
Extending RD-OPT with Global Thresholding for JPEG Optimization Viresh Ratnakar University of Wisconsin-Madison Computer Sciences Department Madison, WI 53706 Phone: (608) 262-6627 Email: ratnakar@cs.wisc.edu
More informationDistances and similarities Based in part on slides from textbook, slides of Susan Holmes. October 3, Statistics 202: Data Mining
Distances and similarities Based in part on slides from textbook, slides of Susan Holmes October 3, 2012 1 / 1 Similarities Start with X which we assume is centered and standardized. The PCA loadings were
More informationInformation Hiding. Andrew D. Ker. 10 Lectures, Hilary Term (complete) Department of Computer Science, Oxford University
Information Hiding (complete) Andrew D. Ker 10 Lectures, Hilary Term 2016 Department of Computer Science, Oxford University ii Contents 0 Introduction 1 0.1 Preliminary Material..............................
More information1 Boolean Algebra Simplification
cs281: Computer Organization Lab3 Prelab Our objective in this prelab is to lay the groundwork for simplifying boolean expressions in order to minimize the complexity of the resultant digital logic circuit.
More informationHomework 1 Solutions
18-9 Signals and Systems Profs. Byron Yu and Pulkit Grover Fall 18 Homework 1 Solutions Part One 1. (8 points) Consider the DT signal given by the algorithm: x[] = 1 x[1] = x[n] = x[n 1] x[n ] (a) Plot
More information18.085: Summer 2016 Due: 3 August 2016 (in class) Problem Set 8
Problem Set 8 Unless otherwise specified, you may use MATLAB to assist with computations. provide a print-out of the code used and its output with your assignment. Please 1. More on relation between Fourier
More informationFrom Fourier Series to Analysis of Non-stationary Signals - II
From Fourier Series to Analysis of Non-stationary Signals - II prof. Miroslav Vlcek October 10, 2017 Contents Signals 1 Signals 2 3 4 Contents Signals 1 Signals 2 3 4 Contents Signals 1 Signals 2 3 4 Contents
More informationRegression-based Statistical Bounds on Software Execution Time
ecos 17, Montreal Regression-based Statistical Bounds on Software Execution Time Ayoub Nouri P. Poplavko, L. Angelis, A. Zerzelidis, S. Bensalem, P. Katsaros University of Grenoble-Alpes - France August
More informationNotes. Relations. Introduction. Notes. Relations. Notes. Definition. Example. Slides by Christopher M. Bourke Instructor: Berthe Y.
Relations Slides by Christopher M. Bourke Instructor: Berthe Y. Choueiry Spring 2006 Computer Science & Engineering 235 Introduction to Discrete Mathematics Sections 7.1, 7.3 7.5 of Rosen cse235@cse.unl.edu
More informationExercise Sheet 1. 1 Probability revision 1: Student-t as an infinite mixture of Gaussians
Exercise Sheet 1 1 Probability revision 1: Student-t as an infinite mixture of Gaussians Show that an infinite mixture of Gaussian distributions, with Gamma distributions as mixing weights in the following
More information2. the basis functions have different symmetries. 1 k = 0. x( t) 1 t 0 x(t) 0 t 1
In the next few lectures, we will look at a few examples of orthobasis expansions that are used in modern signal processing. Cosine transforms The cosine-i transform is an alternative to Fourier series;
More informationUSING MULTIPLE RE-EMBEDDINGS FOR QUANTITATIVE STEGANALYSIS AND IMAGE RELIABILITY ESTIMATION
TKK Reports in Information and Computer Science Espoo 2010 TKK-ICS-R34 USING MULTIPLE RE-EMBEDDINGS FOR QUANTITATIVE STEGANALYSIS AND IMAGE RELIABILITY ESTIMATION Yoan Miche, Patrick Bas and Amaury Lendasse
More informationExperiment 1: Linear Regression
Experiment 1: Linear Regression August 27, 2018 1 Description This first exercise will give you practice with linear regression. These exercises have been extensively tested with Matlab, but they should
More informationAbout this class. Yousef Saad 1. Noah Lebovic 2. Jessica Lee 3. Abhishek Vashist Office hours: refer to the class web-page.
CSCI 2033 Spring 2018 ELEMENTARY COMPUTATIONAL LINEAR ALGEBRA Class time : MWF 10:10-11:00am Room : Blegen Hall 10 Instructor : Yousef Saad URL : www-users.cselabs.umn.edu/classes/spring-2018 /csci2033-morning/
More informationA First Course on Kinetics and Reaction Engineering Example S5.1
Example S5.1 Problem Purpose This example illustrates the use of the MATLAB template file SolvBVDif.m to solve a second order boundary value ordinary differential equation. Problem Statement Solve the
More informationA Total-Variation-based JPEG decompression model
SpezialForschungsBereich F 32 Karl Franzens Universit at Graz Technische Universit at Graz Medizinische Universit at Graz A Total-Variation-based JPEG decompression model M. Holler K. Bredies SFB-Report
More informationMath 414 Lecture 1. Reading assignment: Text: Pages 1-29 and Scilab Users Guide: Sections 1-3.
Math 414 Lecture 1 Homework assignments are always due at the beginning of the next lecture. Operations Research studies linear programming and associated algorithms. Businesses use it to find resource
More informationImage Data Compression. Steganography and steganalysis Alexey Pak, PhD, Lehrstuhl für Interak;ve Echtzeitsysteme, Fakultät für Informa;k, KIT
Image Data Compression Steganography and steganalysis 1 Stenography vs watermarking Watermarking: impercep'bly altering a Work to embed a message about that Work Steganography: undetectably altering a
More informationLinear Neural Networks
Chapter 10 Linear Neural Networks In this chapter, we introduce the concept of the linear neural network. 10.1 Introduction and Notation 1. The linear neural cell, or node has the schematic form as shown
More informationMachine Learning: Homework 5
0-60 Machine Learning: Homework 5 Due 5:0 p.m. Thursday, March, 06 TAs: Travis Dick and Han Zhao Instructions Late homework policy: Homework is worth full credit if submitted before the due date, half
More informationWet Paper Codes with Improved Embedding Efficiency
1 Wet Paper Codes with Improved Embedding Efficiency Jessica Fridrich, Member, IEEE, Miroslav Goljan, and David Soukal Abstract Wet paper codes were previously proposed as a tool for construction of steganographic
More informationStar Cluster Photometry and the H-R Diagram
Star Cluster Photometry and the H-R Diagram Contents Introduction Star Cluster Photometry... 1 Downloads... 1 Part 1: Measuring Star Magnitudes... 2 Part 2: Plotting the Stars on a Colour-Magnitude (H-R)
More informationImage Data Compression
Image Data Compression Image data compression is important for - image archiving e.g. satellite data - image transmission e.g. web data - multimedia applications e.g. desk-top editing Image data compression
More informationMINIMIZING ADDITIVE DISTORTION FUNCTIONS WITH NON-BINARY EMBEDDING OPERATION IN STEGANOGRAPHY. Tomáš Filler and Jessica Fridrich
MINIMIZING ADDITIVE DISTORTION FUNCTIONS WITH NON-BINARY EMBEDDING OPERATION IN STEGANOGRAPHY Tomáš Filler and Jessica Fridrich Department of ECE, SUNY Binghamton, NY, USA {tomas.filler, fridrich}@binghamton.edu
More information(a) Compute the projections of vectors [1,0,0] and [0,1,0] onto the line spanned by a Solution: The projection matrix is P = 1
6 [3] 3. Consider the plane S defined by 2u 3v+w = 0, and recall that the normal to this plane is the vector a = [2, 3,1]. (a) Compute the projections of vectors [1,0,0] and [0,1,0] onto the line spanned
More informationThe data for Practical 2 is available for download at the dropbox link embedded in the I sent you.
EGM310 UNDERWATER REMOTE SENSING PRACTICALS RORY QUINN PRACTICAL 2: MBES BACKSCATTER DATA Aim of practical To gain confidence in interpreting backscatter data derived from multi-beam echo-sounder surveys,
More informationImage Compression - JPEG
Overview of JPEG CpSc 86: Multimedia Systems and Applications Image Compression - JPEG What is JPEG? "Joint Photographic Expert Group". Voted as international standard in 99. Works with colour and greyscale
More informationLight and Optics. Light and Optics. Author: Sarah Roberts
Activity Instructions Author: Sarah Roberts - Faulkes Telescope Project Activity Instructions Introduction In this activity, you will either search the image archive on the Faulkes Telescope Project website
More information12. Machine learning I. Regression Overfitting Classification Example: Handwritten digit recognition Support vector machines (SVMs)
12. Machine learning I Regression Overfitting Classification Example: Handwritten digit recognition Support vector machines (SVMs) 48 Regression Suppose we are given N pairs of a vector x and a scalar
More informationCompression. What. Why. Reduce the amount of information (bits) needed to represent image Video: 720 x 480 res, 30 fps, color
Compression What Reduce the amount of information (bits) needed to represent image Video: 720 x 480 res, 30 fps, color Why 720x480x20x3 = 31,104,000 bytes/sec 30x60x120 = 216 Gigabytes for a 2 hour movie
More informationLinear Algebra II. 2 Matrices. Notes 2 21st October Matrix algebra
MTH6140 Linear Algebra II Notes 2 21st October 2010 2 Matrices You have certainly seen matrices before; indeed, we met some in the first chapter of the notes Here we revise matrix algebra, consider row
More informationROC Curves for Steganalysts
ROC Curves for Steganalysts Andreas Westfeld Technische Universität Dresden Institut für Systemarchitektur 01062 Dresden mailto:westfeld@inf.tu-dresden.de 1 Introduction There are different approaches
More informationExamples MAT-INF1100. Øyvind Ryan
Examples MAT-INF00 Øyvind Ryan February 9, 20 Example 0.. Instead of converting 76 to base 8 let us convert it to base 6. We find that 76//6 = 2 with remainder. In the next step we find 2//6 = 4 with remainder.
More informationThe Bell-LaPadula Model
The Bell-LaPadula Model CSM27 Computer Security Dr Hans Georg Schaathun University of Surrey Autumn 2007 Dr Hans Georg Schaathun The Bell-LaPadula Model Autumn 2007 1 / 25 The session Session objectives
More informationProperties of Linear Transformations from R n to R m
Properties of Linear Transformations from R n to R m MATH 322, Linear Algebra I J. Robert Buchanan Department of Mathematics Spring 2015 Topic Overview Relationship between the properties of a matrix transformation
More informationDM559 Linear and integer programming
Department of Mathematics and Computer Science University of Southern Denmark, Odense March 8, 2018 Marco Chiarandini DM559 Linear and integer programming Sheet 4, Spring 2018 [pdf format] Included. Exercise
More informationSingular Value Decompsition
Singular Value Decompsition Massoud Malek One of the most useful results from linear algebra, is a matrix decomposition known as the singular value decomposition It has many useful applications in almost
More informationAppendix B Microsoft Office Specialist exam objectives maps
B 1 Appendix B Microsoft Office Specialist exam objectives maps This appendix covers these additional topics: A Excel 2003 Specialist exam objectives with references to corresponding material in Course
More informationHiding Data in a QImage File
Hiding Data in a QImage File Gabriela Mogos Abstract The idea of embedding some information within a digital media, in such a way that the inserted data are intrinsically part of the media itself, has
More informationLecture 5. Ideal and Almost-Ideal SG.
Lecture 5. Ideal and Almost-Ideal SG. Definition. SG is called ideal (perfect or unconditionally undetectable ISG),if its detection is equivalently to random guessing of this fact even with the use of
More informationMPSteg-color: a new steganographic technique for color images
MPSteg-color: a new steganographic technique for color images Giacomo Cancelli, Mauro Barni Università degli Studi di Siena Dipartimento di Ingegneria dell Informazione, Italy {cancelli,barni}@dii.unisi.it
More informationProduct Obsolete/Under Obsolescence. Quantization. Author: Latha Pillai
Application Note: Virtex and Virtex-II Series XAPP615 (v1.1) June 25, 2003 R Quantization Author: Latha Pillai Summary This application note describes a reference design to do a quantization and inverse
More information7 Matrix Operations. 7.0 Matrix Multiplication + 3 = 3 = 4
7 Matrix Operations Copyright 017, Gregory G. Smith 9 October 017 The product of two matrices is a sophisticated operations with a wide range of applications. In this chapter, we defined this binary operation,
More informationStatistical Methods: Introduction, Applications, Histograms, Ch
Outlines Statistical Methods: Introduction, Applications, Histograms, Characteristics November 4, 2004 Outlines Part I: Statistical Methods: Introduction and Applications Part II: Statistical Methods:
More information1111: Linear Algebra I
1111: Linear Algebra I Dr. Vladimir Dotsenko (Vlad) Lecture 13 Dr. Vladimir Dotsenko (Vlad) 1111: Linear Algebra I Lecture 13 1 / 8 The coordinate vector space R n We already used vectors in n dimensions
More informationOutline. Convolution. Filtering
Filtering Outline Convolution Filtering Logistics HW1 HW2 - out tomorrow Recall: what is a digital (grayscale) image? Matrix of integer values Images as height fields Let s think of image as zero-padded
More informationImage compression. Institute of Engineering & Technology, Ahmedabad University. October 20, 2015
Image compression Rahul Patel (121040) rahul.patel@iet.ahduni.edu.in Shashwat Sanghavi (121049) shashwat.sanghavi@iet.ahduni.edu.in Institute of Engineering & Technology, Ahmedabad University October 20,
More informationNumpy. Luis Pedro Coelho. October 22, Programming for Scientists. Luis Pedro Coelho (Programming for Scientists) Numpy October 22, 2012 (1 / 26)
Numpy Luis Pedro Coelho Programming for Scientists October 22, 2012 Luis Pedro Coelho (Programming for Scientists) Numpy October 22, 2012 (1 / 26) Historical Numeric (1995) Numarray (for large arrays)
More informationBasics of DCT, Quantization and Entropy Coding
Basics of DCT, Quantization and Entropy Coding Nimrod Peleg Update: April. 7 Discrete Cosine Transform (DCT) First used in 97 (Ahmed, Natarajan and Rao). Very close to the Karunen-Loeve * (KLT) transform
More information