Spread Spectrum Watermarking. Information Technologies for IPR Protection
|
|
- Mitchell Berry
- 5 years ago
- Views:
Transcription
1 Spread Spectrum Watermarking Information Technologies for IPR Protection
2 Spread Spectrum Communication A Narrow-band signal is transmitted over a much larger bandwidth such that the signal energy presented in any signal frequency is undetectable. 2
3 Watermarking (1/3) A watermark is spread over many frequency bins so that the energy in one bin is very small and certainly undetectable. 3
4 Watermarking (2/3) Because the watermark verification process knows the location and content of the watermark, it is possible to concentrate these weak signals into a single output with high SNR. 4
5 Watermarking (3/3) Remark: To destroy such a watermark would require noise of high amplitude to be added to all frequency bins. 5
6 Why it is secure? The location of the watermark is not obvious Frequency regions should be selected that ensures degradation of the original data following any attack on the watermark 6
7 Why/How it is imperceptible? (1/2) The energy in the watermark is sufficiently small in any single frequency coefficient It is possible to increase the energy present in particular frequencies by exploiting knowledge of masking phenomena in human auditory and visual systems 7
8 Why/How it is imperceptible? (2/2) Upon applying a frequency transformation (FFT/DCT) to the data, a perceptual mask is computed that highlights perceptual significant regions in the spectrum that can support the watermark without affecting perceptual fidelity. 8
9 Why it is robust? (1/2) To be confident of eliminating a watermark, an attack must attack all possible frequency bins with modifications of certain strength create visible defects in the data 9
10 Why it is robust? (2/2) Unintentional signal distortions due to compression or image manipulation, must leave the perceptually significant spectra components intact, otherwise the resulting image will be severely degraded. 10
11 Spread Spectrum Watermarking (1/2) In order to place a length n watermark into an N N image, the N N DCT of the image is computed and watermark is placed into the n highest magnitude coefficients (which are data dependent) of the transformed image, excluding the DC component (not necessary). 11
12 Spread Spectrum Watermarking (2/2) A watermark consists of a sequence of real numbers X = x 1,, x n, where each value x i is chosen independently according to N(0,1) : normal distribution assumption 12
13 Watermark Insertion (1/2) When we insert X into V to obtain V we specify a scaling parameter α, which determines the extent to which X alters V. 13
14 Watermark Insertion (2/2) (1) v i = v i + α x i (2) v i = v i (1 +α x i ) = v i +α x i v i (3) v i = v i ( e α x i ) or log v i = log v i + α x i (1) may not be appropriate when the values of v i varying widely!! Insertion based on (2) or (3) are more robust against different in scales. 14
15 Determination of α (1/5) A single α may not be applicable for perturbing all of the values v i, since different spectral components may exhibit more or less tolerance to modification 15
16 Determination of α (2/5) v i = v i (1 +α i x i ) Where α i can be viewed as a relative measure of how much one must alter v i to alter the perceptual quality of the host. 16
17 Determination of α (3/5) A large α i means that one can perceptually get away with altering v i by a large factor without degrading the host. (2) can be viewed as a special case of the generalized (1) ( v i = v i (1 +α i x i ) ), for α i = α v i 17
18 Determination of α (4/5) A large value is less sensitive to additive alternations than a small value 18
19 Determination of α (5/5) Question How sensitive a image to various additive alternations is highly related to Human perceptual systems. Subjective distance measurement : JND Objective distance measurement mean α j ~ median v j * - v j max 19
20 Choice of n (1/2) The choice of n indicated the degree to which the watermark is spread out among the relevant components of the image. In general, as the number of altered components are increased the extent to which they must be altered decreases - the ability to against attacks 20
21 Choice of n (2/2) Information theoretic assessment Channel Capacity Rate-Distortion Theory 21
22 Evaluating the Similarity : Detection scheme X* : the extracted mark Sim ( X, X* ) = ( X* X ) / sqrt ( X* X* ) X and X* match, if Sim ( X, X* ) > T Minimize the rate of False Negatives (missed detections) False Positive (false alarms) 22
23 Other Issues Is there any post processing that can improve the watermark detection performance? Statistical approach Optimization approach: NN, GA With the aid of the knowledge of the host : Communication with side information Game Theory 23
24 Attacks (1/2) Collision attack Image Scaling JPEG Compression Dithering Distortion Cropping attack Print, Xerox, and Scan 24
25 Attacks (2/2) Attack by Watermarking Watermarked Image - multiple watermarking Sometimes, this is a must Sometimes, this produces Watermark Dilemma 25
Information Theoretical Analysis of Digital Watermarking. Multimedia Security
Information Theoretical Analysis of Digital Watermaring Multimedia Security Definitions: X : the output of a source with alphabet X W : a message in a discrete alphabet W={1,2,,M} Assumption : X is a discrete
More informationUniversity of Siena. Multimedia Security. Watermark extraction. Mauro Barni University of Siena. M. Barni, University of Siena
Multimedia Security Mauro Barni University of Siena : summary Optimum decoding/detection Additive SS watermarks Decoding/detection of QIM watermarks The dilemma of de-synchronization attacks Geometric
More informationWavelet Packet Based Digital Image Watermarking
Wavelet Packet Based Digital Image ing A.Adhipathi Reddy, B.N.Chatterji Department of Electronics and Electrical Communication Engg. Indian Institute of Technology, Kharagpur 72 32 {aar, bnc}@ece.iitkgp.ernet.in
More informationDigital Image Watermarking Algorithm Based on Wavelet Packet
www.ijcsi.org 403 Digital Image ing Algorithm Based on Wavelet Packet 1 A.Geetha, 2 B.Vijayakumari, 3 C.Nagavani, 4 T.Pandiselvi 1 3 4 Faculty of Kamaraj College of Engineering and Technology Department
More informationResearch Article Effect of Different Places in Applying Laplacian Filter on the Recovery Algorithm in Spatial Domain Watermarking
Research Journal of Applied Sciences, Engineering and Technology 7(24): 5157-5162, 2014 DOI:10.19026/rjaset.7.912 ISSN: 2040-7459; e-issn: 2040-7467 2014 Maxwell Scientific Publication Corp. Submitted:
More informationA Modified Moment-Based Image Watermarking Method Robust to Cropping Attack
A Modified Moment-Based Watermarking Method Robust to Cropping Attack Tianrui Zong, Yong Xiang, and Suzan Elbadry School of Information Technology Deakin University, Burwood Campus Melbourne, Australia
More informationAbstract The aim of this paper is to improve the performance of spatial domain watermarking. To this end, a new perceptual mask
Efficient Spatial Image Watermarking via New Perceptual Masking and Blind Detection Schemes Irene G. Karybali, Member, IEEE, and Kostas Berberidis, Member, IEEE Abstract The aim of this paper is to improve
More informationWitsenhausen s counterexample and its links with multimedia security problems
Witsenhausen s counterexample and its links with multimedia security problems Pedro Comesaña-Alfaro Fernando Pérez-González Chaouki T. Abdallah IWDW 2011 Atlantic City, New Jersey Outline Introduction
More informationQuantization Index Modulation: A Class of Provably Good Methods for Digital Watermarking and Information Embedding
To appear in IEEE Trans. Inform. Theory. Quantization Index Modulation: A Class of Provably Good Methods for Digital Watermarking and Information Embedding Brian Chen and Gregory W. Wornell Submitted June
More informationDouble Sided Watermark Embedding and Detection with Perceptual Analysis
DOUBLE SIDED WATERMARK EMBEDDIG AD DETECTIO WITH PERCEPTUAL AALYSIS Double Sided Watermark Embedding and Detection with Perceptual Analysis Jidong Zhong and Shangteng Huang Abstract In our previous work,
More informationROTATION, TRANSLATION AND SCALING INVARIANT WATERMARKING USING A GENERALIZED RADON TRANSFORMATION
ROTATION, TRANSLATION AND SCALING INVARIANT WATERMARKING USING A GENERALIZED RADON TRANSFORMATION D. SIMITOPOULOS, A. OIKONOMOPOULOS, AND M. G. STRINTZIS Aristotle University of Thessaloniki Electrical
More informationFault Tolerance Technique in Huffman Coding applies to Baseline JPEG
Fault Tolerance Technique in Huffman Coding applies to Baseline JPEG Cung Nguyen and Robert G. Redinbo Department of Electrical and Computer Engineering University of California, Davis, CA email: cunguyen,
More informationCS6956: Wireless and Mobile Networks Lecture Notes: 2/4/2015
CS6956: Wireless and Mobile Networks Lecture Notes: 2/4/2015 [Most of the material for this lecture has been taken from the Wireless Communications & Networks book by Stallings (2 nd edition).] Effective
More informationImage Dependent Log-likelihood Ratio Allocation for Repeat Accumulate Code based Decoding in Data Hiding Channels
Image Dependent Log-likelihood Ratio Allocation for Repeat Accumulate Code based Decoding in Data Hiding Channels Anindya Sarkar and B. S. Manjunath Department of Electrical and Computer Engineering, University
More informationResearch Article A New QIM-Based Watermarking Method Robust to Gain Attack
International Journal of Digital Multimedia Broadcasting, Article ID 9188, 14 pages http://dx.doi.org/1.1155/214/9188 Research Article A New QIM-Based Watermarking Method Robust to Gain Attack Yevhen Zolotavkin
More informationA Hypothesis Testing Approach for Achieving Semi-fragility in Multimedia Authentication
A Hypothesis Testing Approach for Achieving Semi-fragility in Multimedia Authentication Chuhong Fei a, Deepa Kundur b, and Raymond Kwong a a University of Toronto, 10 King s College Road, Toronto, ON Canada
More informationOverview. Analog capturing device (camera, microphone) PCM encoded or raw signal ( wav, bmp, ) A/D CONVERTER. Compressed bit stream (mp3, jpg, )
Overview Analog capturing device (camera, microphone) Sampling Fine Quantization A/D CONVERTER PCM encoded or raw signal ( wav, bmp, ) Transform Quantizer VLC encoding Compressed bit stream (mp3, jpg,
More informationStudy of Wavelet Functions of Discrete Wavelet Transformation in Image Watermarking
Study of Wavelet Functions of Discrete Wavelet Transformation in Image Watermarking Navdeep Goel 1,a, Gurwinder Singh 2,b 1ECE Section, Yadavindra College of Engineering, Talwandi Sabo 2Research Scholar,
More informationFrequency Domain Speech Analysis
Frequency Domain Speech Analysis Short Time Fourier Analysis Cepstral Analysis Windowed (short time) Fourier Transform Spectrogram of speech signals Filter bank implementation* (Real) cepstrum and complex
More informationWatermark Detection after Quantization Attacks
Watermark Detection after Quantization Attacks Joachim J. Eggers and Bernd Girod Telecommunications Laboratory University of Erlangen-Nuremberg Cauerstr. 7/NT, 9158 Erlangen, Germany feggers,girodg@lnt.de
More informationMatrix Embedding with Pseudorandom Coefficient Selection and Error Correction for Robust and Secure Steganography
Matrix Embedding with Pseudorandom Coefficient Selection and Error Correction for Robust and Secure Steganography Anindya Sarkar, Student Member, IEEE, Upamanyu Madhow, Fellow, IEEE, and B. S. Manjunath,
More information3.8 Combining Spatial Enhancement Methods 137
3.8 Combining Spatial Enhancement Methods 137 a b FIGURE 3.45 Optical image of contact lens (note defects on the boundary at 4 and 5 o clock). (b) Sobel gradient. (Original image courtesy of Mr. Pete Sites,
More informationDirty Paper Writing and Watermarking Applications
Dirty Paper Writing and Watermarking Applications G.RaviKiran February 10, 2003 1 Introduction Following an underlying theme in Communication is the duo of Dirty Paper Writing and Watermarking. In 1983
More informationRotation, scale and translation invariant digital image watermarking. O'RUANAIDH, Joséph John, PUN, Thierry. Abstract
Proceedings Chapter Rotation, scale and translation invariant digital image watermarking O'RUANAIDH, Joséph John, PUN, Thierry Abstract A digital watermark is an invisible mark embedded in a digital image
More information1. INTRODUCTION. Yen-Chung Chiu. Wen-Hsiang Tsai.
Copyright Protection by Watermarking for Color Images against Rotation and Scaling Attacks Using Coding and Synchronization of Peak Locations in DFT Domain Yen-Chung Chiu Department of Computer and Information
More informationThis is a repository copy of The effect of quality scalable image compression on robust watermarking.
This is a repository copy of The effect of quality scalable image compression on robust watermarking. White Rose Research Online URL for this paper: http://eprints.whiterose.ac.uk/7613/ Conference or Workshop
More informationSCALE INVARIANT AND ROTATION INVARIANT IMAGE WATERMARKING. Spandana Bodapati. Bachelor of Science. Jawaharlal Nehru Technological University
SCALE INVARIANT AND ROTATION INVARIANT IMAGE WATERMARKING By Spandana Bodapati Bachelor of Science Jawaharlal Nehru Technological University Hyderabad, India 200 Submitted to the Faculty of the Graduate
More informationTCQ PRACTICAL EVALUATION IN THE HYPER-CUBE WATERMARKING FRAMEWORK. 161, rue Ada, Montpellier cedex 05, France contact:
TCQ PRACTICAL EVALUATION IN THE HYPER-CUBE WATERMARKING FRAMEWORK Marc CHAUMONT 1,2 and Dalila GOUDIA 2 1 University of Nîmes, Place Gabriel Péri, 30000 Nîmes, France 2 Laboratory LIRMM, UMR CNRS 5506,
More informationNature Methods: doi: /nmeth Supplementary Figure 1. Fragment indexing allows efficient spectra similarity comparisons.
Supplementary Figure 1 Fragment indexing allows efficient spectra similarity comparisons. The cost and efficiency of spectra similarity calculations can be approximated by the number of fragment comparisons
More informationRFI Mitigation for the Parkes Galactic All-Sky Survey (GASS)
RFI Mitigation for the Parkes Galactic All-Sky Survey (GASS) Peter Kalberla Argelander-Institut für Astronomie, Auf dem Hügel 71, D-53121 Bonn, Germany E-mail: pkalberla@astro.uni-bonn.de The GASS is a
More informationPerceptual Feedback in Multigrid Motion Estimation Using an Improved DCT Quantization
IEEE TRANSACTIONS ON IMAGE PROCESSING, VOL. 10, NO. 10, OCTOBER 2001 1411 Perceptual Feedback in Multigrid Motion Estimation Using an Improved DCT Quantization Jesús Malo, Juan Gutiérrez, I. Epifanio,
More informationA Vision-Based Masking Model for Spread-Spectrum Image Watermarking
A Vision-Based Masking Model for Spread-Spectrum Image Watermarking Martin Kutter and Stefan Winkler Signal Processing Laboratory Swiss Federal Institute of Technology 5 Lausanne, Switzerland http://ltswww.epfl.ch/
More informationIntensity Transformations and Spatial Filtering: WHICH ONE LOOKS BETTER? Intensity Transformations and Spatial Filtering: WHICH ONE LOOKS BETTER?
: WHICH ONE LOOKS BETTER? 3.1 : WHICH ONE LOOKS BETTER? 3.2 1 Goal: Image enhancement seeks to improve the visual appearance of an image, or convert it to a form suited for analysis by a human or a machine.
More informationRanging detection algorithm for indoor UWB channels
Ranging detection algorithm for indoor UWB channels Choi Look LAW and Chi XU Positioning and Wireless Technology Centre Nanyang Technological University 1. Measurement Campaign Objectives Obtain a database
More informationImage Compression. Fundamentals: Coding redundancy. The gray level histogram of an image can reveal a great deal of information about the image
Fundamentals: Coding redundancy The gray level histogram of an image can reveal a great deal of information about the image That probability (frequency) of occurrence of gray level r k is p(r k ), p n
More informationCompression and Coding
Compression and Coding Theory and Applications Part 1: Fundamentals Gloria Menegaz 1 Transmitter (Encoder) What is the problem? Receiver (Decoder) Transformation information unit Channel Ordering (significance)
More informationNovelty detection. Juan Pablo Bello EL9173 Selected Topics in Signal Processing: Audio Content Analysis NYU Poly
Novelty detection Juan Pablo Bello EL9173 Selected Topics in Signal Processing: Audio Content Analysis NYU Poly Novelty detection Energy burst Find the start time (onset) of new events in the audio signal.
More information1782 IEEE TRANSACTIONS ON IMAGE PROCESSING, VOL. 18, NO. 8, AUGUST 2009
1782 IEEE TRANSACTIONS ON IMAGE PROCESSING, VOL. 18, NO. 8, AUGUST 2009 A New Statistical Detector for DWT-Based Additive Image Watermarking Using the Gauss Hermite Expansion S. M. Mahbubur Rahman, M.
More informationA NO-REFERENCE SHARPNESS METRIC SENSITIVE TO BLUR AND NOISE. Xiang Zhu and Peyman Milanfar
A NO-REFERENCE SARPNESS METRIC SENSITIVE TO BLUR AND NOISE Xiang Zhu and Peyman Milanfar Electrical Engineering Department University of California at Santa Cruz, CA, 9564 xzhu@soeucscedu ABSTRACT A no-reference
More informationX 1 Q 3 Q 2 Y 1. quantizers. watermark decoder N S N
Quantizer characteristics important for Quantization Index Modulation Hugh Brunk Digimarc, 19801 SW 72nd Ave., Tualatin, OR 97062 ABSTRACT Quantization Index Modulation (QIM) has been shown to be a promising
More informationUse of Agilent Feature Extraction Software (v8.1) QC Report to Evaluate Microarray Performance
Use of Agilent Feature Extraction Software (v8.1) QC Report to Evaluate Microarray Performance Anthea Dokidis Glenda Delenstarr Abstract The performance of the Agilent microarray system can now be evaluated
More informationObtaining Higher Rates for Steganographic Schemes while Maintaining the Same Detectability
Obtaining Higher Rates for Steganographic Schemes while Maintaining the Same Detectability Anindya Sarkar, Kaushal Solanki and and B. S. Manjunath Department of Electrical and Computer Engineering, University
More informationNAS Report MTI FROM SAR. Prof. Chris Oliver, CBE NASoftware Ltd. 19th January 2007
NAS Report MTI FROM SAR Prof. Chris Oliver, CBE NASoftware Ltd. 19th January 27 1. Introduction NASoftware have devised and implemented a series of algorithms for deriving moving target information from
More informationSIGNAL COMPRESSION. 8. Lossy image compression: Principle of embedding
SIGNAL COMPRESSION 8. Lossy image compression: Principle of embedding 8.1 Lossy compression 8.2 Embedded Zerotree Coder 161 8.1 Lossy compression - many degrees of freedom and many viewpoints The fundamental
More informationHowever, reliability analysis is not limited to calculation of the probability of failure.
Probabilistic Analysis probabilistic analysis methods, including the first and second-order reliability methods, Monte Carlo simulation, Importance sampling, Latin Hypercube sampling, and stochastic expansions
More informationQuantization Based Watermarking Methods Against Valumetric Distortions
International Journal of Automation and Computing 14(6), December 2017, 672-685 DOI: 10.1007/s11633-016-1010-6 Quantization Based Watermarking Methods Against Valumetric Distortions Zai-Ran Wang 1,2 Jing
More informationTransform Coding. Transform Coding Principle
Transform Coding Principle of block-wise transform coding Properties of orthonormal transforms Discrete cosine transform (DCT) Bit allocation for transform coefficients Entropy coding of transform coefficients
More informationBurst Markers in EPoC Syed Rahman, Huawei Nicola Varanese, Qualcomm
Burst Markers in EPoC Syed Rahman, Huawei Nicola Varanese, Qualcomm Page 1 Introduction Burst markers are used to indicate the start and end of each burst in EPoC burst mode The same marker delimits the
More informationNovelty detection. Juan Pablo Bello MPATE-GE 2623 Music Information Retrieval New York University
Novelty detection Juan Pablo Bello MPATE-GE 2623 Music Information Retrieval New York University Novelty detection Energy burst Find the start time (onset) of new events (notes) in the music signal. Short
More informationDigital Watermark Detection in Visual Multimedia Content
Digital Watermark Detection in Visual Multimedia Content PhD Thesis Defense Peter Meerwald Dept. of Computer Sciences, University of Salzburg September 2010 Watermarking Watermarking is a technology to
More informationThe peculiarities of the model: - it is allowed to use by attacker only noisy version of SG C w (n), - CO can be known exactly for attacker.
Lecture 6. SG based on noisy channels [4]. CO Detection of SG The peculiarities of the model: - it is alloed to use by attacker only noisy version of SG C (n), - CO can be knon exactly for attacker. Practical
More informationQuantization Index Modulation using the E 8 lattice
1 Quantization Index Modulation using the E 8 lattice Qian Zhang and Nigel Boston Dept of Electrical and Computer Engineering University of Wisconsin Madison 1415 Engineering Drive, Madison, WI 53706 Email:
More informationNOISE can sometimes improve nonlinear signal processing
488 IEEE TRANSACTIONS ON SIGNAL PROCESSING, VOL. 59, NO. 2, FEBRUARY 2011 Noise Benefits in Quantizer-Array Correlation Detection and Watermark Decoding Ashok Patel, Member, IEEE, and Bart Kosko, Fellow,
More informationPractical Watermarking scheme based on Wide Spread Spectrum and Game Theory
Practical Watermarking scheme based on Wide Spread Spectrum and Game Theory Stéphane Pateux,Gaëtan Le Guelvouit IRISA / INRIA-Rennes Campus de Beaulieu 35042 Rennes Cedex, FRANCE. Abstract In this paper,
More informationGAUSSIANIZATION METHOD FOR IDENTIFICATION OF MEMORYLESS NONLINEAR AUDIO SYSTEMS
GAUSSIANIATION METHOD FOR IDENTIFICATION OF MEMORYLESS NONLINEAR AUDIO SYSTEMS I. Marrakchi-Mezghani (1),G. Mahé (2), M. Jaïdane-Saïdane (1), S. Djaziri-Larbi (1), M. Turki-Hadj Alouane (1) (1) Unité Signaux
More informationWatermarking in the Space/Spatial-Frequency Domain Using Two-Dimensional Radon Wigner Distribution
650 IEEE TRANSACTIONS ON IMAGE PROCESSING, VOL. 10, NO. 4, APRIL 2001 Watermarking in the Space/Spatial-Frequency Domain Using Two-Dimensional Radon Wigner Distribution Srdjan Stanković, Member, IEEE,
More informationImproving Resolution with Spectral Balancing- A Case study
P-299 Improving Resolution with Spectral Balancing- A Case study M Fatima, Lavendra Kumar, RK Bhattacharjee, PH Rao, DP Sinha Western Offshore Basin, ONGC, Panvel, Mumbai Summary: The resolution limit
More informationGeometric Invariant Semi-fragile Image Watermarking Using Real Symmetric Matrix
Tamkang Journal of Science and Engineering, Vol. 10, No. 3, pp. 211220 (2007) 211 Geometric Invariant Semi-fragile Image Watermarking Using Real Symmetric Matrix Ching-Tang Hsieh 1 *, Yeh-Kuang Wu 1 and
More information2. Definition & Classification
Information Hiding Data Hiding K-H Jung Agenda 1. Data Hiding 2. Definition & Classification 3. Related Works 4. Considerations Definition of Data Hiding 3 Data Hiding, Information Hiding Concealing secret
More informationAn Information-Theoretic Analysis of Dirty Paper Coding for Informed Audio Watermarking
1 An Information-Theoretic Analysis of Dirty Paper Coding for Informed Audio Watermarking Andrea Abrardo, Mauro Barni, Andrea Gorrieri, Gianluigi Ferrari Department of Information Engineering and Mathematical
More informationLecture 2: Introduction to Audio, Video & Image Coding Techniques (I) -- Fundaments
Lecture 2: Introduction to Audio, Video & Image Coding Techniques (I) -- Fundaments Dr. Jian Zhang Conjoint Associate Professor NICTA & CSE UNSW COMP9519 Multimedia Systems S2 2006 jzhang@cse.unsw.edu.au
More informationAdaptive Audio Watermarking via the Optimization. Point of View on the Wavelet-Based Entropy
Adaptive Audio Watermarking via the Optimization Point of View on the Wavelet-Based Entropy Shuo-Tsung Chen, Huang-Nan Huang 1 and Chur-Jen Chen Department of Mathematics, Tunghai University, Taichung
More informationAB SCIEX SelexION Technology Used to Improve Mass Spectral Library Searching Scores by Removal of Isobaric Interferences
AB SCIEX SelexION Technology Used to Improve Mass Spectral Library Searching s by Removal of Isobaric Interferences Differential Mobility Used as a Tool to Address Selectivity Challenges Adrian M. Taylor
More informationLast updated: Copyright
Last updated: 2012-08-20 Copyright 2004-2012 plabel (v2.4) User s Manual by Bioinformatics Group, Institute of Computing Technology, Chinese Academy of Sciences Tel: 86-10-62601016 Email: zhangkun01@ict.ac.cn,
More informationLecture 2: Introduction to Audio, Video & Image Coding Techniques (I) -- Fundaments. Tutorial 1. Acknowledgement and References for lectures 1 to 5
Lecture : Introduction to Audio, Video & Image Coding Techniques (I) -- Fundaments Dr. Jian Zhang Conjoint Associate Professor NICTA & CSE UNSW COMP959 Multimedia Systems S 006 jzhang@cse.unsw.edu.au Acknowledgement
More informationAutomatic Speech Recognition (CS753)
Automatic Speech Recognition (CS753) Lecture 12: Acoustic Feature Extraction for ASR Instructor: Preethi Jyothi Feb 13, 2017 Speech Signal Analysis Generate discrete samples A frame Need to focus on short
More informationSecure Multiuser MISO Communication Systems with Quantized Feedback
Secure Multiuser MISO Communication Systems with Quantized Feedback Berna Özbek*, Özgecan Özdoğan*, Güneş Karabulut Kurt** *Department of Electrical and Electronics Engineering Izmir Institute of Technology,Turkey
More informationResearch Article Reverse-Engineering a Watermark Detector Using an Oracle
Hindawi Publishing Corporation EURASIP Journal on Information Security Volume 27, Article ID 4334, 7 pages doi:1.1155/27/4334 Research Article Reverse-Engineering a Watermark Detector Using an Oracle Scott
More informationNatural Image Statistics and Neural Representations
Natural Image Statistics and Neural Representations Michael Lewicki Center for the Neural Basis of Cognition & Department of Computer Science Carnegie Mellon University? 1 Outline 1. Information theory
More informationML Detection of Steganography
ML Detection of Steganography Mark T Hogan, Neil J Hurley, Guénolé CM Silvestre, Félix Balado and Kevin M Whelan Department of Computer Science, University College Dublin, Belfield, Dublin 4, Ireland ABSTRACT
More informationLecture 5. Ideal and Almost-Ideal SG.
Lecture 5. Ideal and Almost-Ideal SG. Definition. SG is called ideal (perfect or unconditionally undetectable ISG),if its detection is equivalently to random guessing of this fact even with the use of
More informationNew polynomials for strong algebraic manipulation detection codes 1
Fifteenth International Workshop on Algebraic and Combinatorial Coding Theory June 18-24, 2016, Albena, Bulgaria pp. 7 12 New polynomials for strong algebraic manipulation detection codes 1 Maksim Alekseev
More informationPerformance analysis and improvement of dither modulation under the composite attacks
Zhu and Ding EURASIP Journal on Advances in Signal Processing 212, 212:53 http://asp.eurasipjournals.com/content/212/1/53 RESEARCH Open Access Performance analysis and improvement of dither modulation
More informationSpeech Signal Representations
Speech Signal Representations Berlin Chen 2003 References: 1. X. Huang et. al., Spoken Language Processing, Chapters 5, 6 2. J. R. Deller et. al., Discrete-Time Processing of Speech Signals, Chapters 4-6
More informationHiding Data in a QImage File
Hiding Data in a QImage File Gabriela Mogos Abstract The idea of embedding some information within a digital media, in such a way that the inserted data are intrinsically part of the media itself, has
More informationFeasibility study: Use of Sigma 0 and radar images to extract and classify roads in Central Africa. Progress Reports
: Use of Sigma 0 and radar images to extract and classify roads in Central Africa Progress Reports Study supported by the Canadian Space Agency : Use of Sigma 0 and radar images to extract and classify
More informationPart II. Probability, Design and Management in NDE
Part II Probability, Design and Management in NDE Probability Distributions The probability that a flaw is between x and x + dx is p( xdx ) x p( x ) is the flaw size is the probability density pxdx ( )
More informationLinear and Nonlinear Oblivious Data Hiding
EURASIP Journal on Applied Signal Processing 4:4, c 4 Hindawi Publishing Corporation Linear and Nonlinear Oblivious Data Hiding Litao Gang InfoDesk, Inc., 66 White Plains Road, Tarrytown, NY 59, USA Email:
More informationResearch Article NSCT Domain Additive Watermark Detection Using RAO Hypothesis Test and Cauchy Distribution
Mathematical Problems in Engineering Volume 2016, Article ID 4065215, 18 pages http://dx.doi.org/10.1155/2016/4065215 Research Article SCT Domain Additive Watermark Detection Using RAO Hypothesis Test
More informationAPPLICATIONS. Quantum Communications
SOFT PROCESSING TECHNIQUES FOR QUANTUM KEY DISTRIBUTION APPLICATIONS Marina Mondin January 27, 2012 Quantum Communications In the past decades, the key to improving computer performance has been the reduction
More informationDetection theory. H 0 : x[n] = w[n]
Detection Theory Detection theory A the last topic of the course, we will briefly consider detection theory. The methods are based on estimation theory and attempt to answer questions such as Is a signal
More informationThis file is part of the following reference: Access to this file is available from:
This file is part of the following reference: Page, Geoff () Mass Transport Evaluation using consolidated VHF Radar and Acoustic Doppler Current Profiler data. Masters (Research) thesis, James Cook University.
More informationA. Dong, N. Garcia, A.M. Haimovich
A. Dong, N. Garcia, A.M. Haimovich 2 Goal: Localization (geolocation) of unknown RF emitters in multipath environments Challenges: Conventional methods such as TDOA based on line-of-sight (LOS) Non-line-of-sight
More informationImage Data Compression. Steganography and steganalysis Alexey Pak, PhD, Lehrstuhl für Interak;ve Echtzeitsysteme, Fakultät für Informa;k, KIT
Image Data Compression Steganography and steganalysis 1 Stenography vs watermarking Watermarking: impercep'bly altering a Work to embed a message about that Work Steganography: undetectably altering a
More informationCapacity of Full Frame DCT Image Watermarks
1450 IEEE TRANSACTIONS ON IMAGE PROCESSING, VOL. 9, NO. 8, AUGUST 2000 is always better when the nonseparable algorithm is used (around 1 db) compared with the separable approach. Nevertheless, the quality
More informationLecture 27 Frequency Response 2
Lecture 27 Frequency Response 2 Fundamentals of Digital Signal Processing Spring, 2012 Wei-Ta Chu 2012/6/12 1 Application of Ideal Filters Suppose we can generate a square wave with a fundamental period
More informationDistributed Detection of Information Flows
SUBMITTED TO IEEE TRANS. INFORMATION FORENSICS AND SECURITY, SEPT. 2007. REVISED, MAY 2008. Distributed Detection of Information Flows Ting He, Member, IEEE, and Lang Tong, Fellow, IEEE Abstract Distributed
More informationSimplified Approaches to Impurity Identification using Accurate Mass UPLC/MS
Simplified Approaches to Impurity Identification using Accurate Mass UPLC/MS Marian Twohig, Michael D. Jones, Dominic Moore, Peter Lee, and Robert Plumb Waters Corporation, Milford, MA, USA APPLICATION
More informationContent-based document signature: ongoing work
Content-based document signature: ongoing work Anh Thu Phan Ho, Petra-Krämer Gomez and Mickaël Coustaty L3i laboratory, University of La Rochelle GDR Sécurité Informatique réunion 31 Mai Outline 1 Motivation
More informationDetection of Cosmic-Ray Hits for Single Spectroscopic CCD Images
PUBLICATIONS OF THE ASTRONOMICAL SOCIETY OF THE PACIFIC, 12:814 82, 28 June 28. The Astronomical Society of the Pacific. All rights reserved. Printed in U.S.A. Detection of Cosmic-Ray Hits for Single Spectroscopic
More informationProduct Obsolete/Under Obsolescence. Quantization. Author: Latha Pillai
Application Note: Virtex and Virtex-II Series XAPP615 (v1.1) June 25, 2003 R Quantization Author: Latha Pillai Summary This application note describes a reference design to do a quantization and inverse
More informationAgilent MassHunter Profinder: Solving the Challenge of Isotopologue Extraction for Qualitative Flux Analysis
Agilent MassHunter Profinder: Solving the Challenge of Isotopologue Extraction for Qualitative Flux Analysis Technical Overview Introduction Metabolomics studies measure the relative abundance of metabolites
More informationNew Traceability Codes against a Generalized Collusion Attack for Digital Fingerprinting
New Traceability Codes against a Generalized Collusion Attack for Digital Fingerprinting Hideki Yagi 1, Toshiyasu Matsushima 2, and Shigeichi Hirasawa 2 1 Media Network Center, Waseda University 1-6-1,
More informationat Some sort of quantization is necessary to represent continuous signals in digital form
Quantization at Some sort of quantization is necessary to represent continuous signals in digital form x(n 1,n ) x(t 1,tt ) D Sampler Quantizer x q (n 1,nn ) Digitizer (A/D) Quantization is also used for
More informationThe Duality Between Information Embedding and Source Coding With Side Information and Some Applications
IEEE TRANSACTIONS ON INFORMATION THEORY, VOL. 49, NO. 5, MAY 2003 1159 The Duality Between Information Embedding and Source Coding With Side Information and Some Applications Richard J. Barron, Member,
More information"Robust Automatic Speech Recognition through on-line Semi Blind Source Extraction"
"Robust Automatic Speech Recognition through on-line Semi Blind Source Extraction" Francesco Nesta, Marco Matassoni {nesta, matassoni}@fbk.eu Fondazione Bruno Kessler-Irst, Trento (ITALY) For contacts:
More informationCochlear modeling and its role in human speech recognition
Allen/IPAM February 1, 2005 p. 1/3 Cochlear modeling and its role in human speech recognition Miller Nicely confusions and the articulation index Jont Allen Univ. of IL, Beckman Inst., Urbana IL Allen/IPAM
More informationNew Steganographic scheme based of Reed- Solomon codes
New Steganographic scheme based of Reed- Solomon codes I. DIOP; S.M FARSSI ;O. KHOUMA ; H. B DIOUF ; K.TALL ; K.SYLLA Ecole Supérieure Polytechnique de l Université Dakar Sénégal Email: idydiop@yahoo.fr;
More informationThe verification of the MASS spectral response
The verification of the MASS spectral response Victor Kornilov September 14, 2006 Introduction The paper 1 shows that the weighting functions (WF) used for turbulence profile restoration from the scintillation
More informationINTRODUCTION TO DELTA-SIGMA ADCS
ECE37 Advanced Analog Circuits INTRODUCTION TO DELTA-SIGMA ADCS Richard Schreier richard.schreier@analog.com NLCOTD: Level Translator VDD > VDD2, e.g. 3-V logic? -V logic VDD < VDD2, e.g. -V logic? 3-V
More information