PERFORMANCE STUDY OF ECC-BASED COLLUSION-RESISTANT MULTIMEDIA FINGERPRINTING

Size: px
Start display at page:

Download "PERFORMANCE STUDY OF ECC-BASED COLLUSION-RESISTANT MULTIMEDIA FINGERPRINTING"

Transcription

1 PERFORMANCE STUDY OF ECC-BASED COLLUSION-RESISTANT MULTIMEDIA FINGERPRINTING Shan He and Min Wu ECE Department, University of Maryland, College Park ABSTRACT * Digital fingerprinting is a tool to protect multimedia content from illegal redistribution by uniquely marking copies of the content distributed to each user. Fingerprinting based on error correction coding (ECC) handle the important issue of how to embed the fingerprint into host data in an abstract way known as the marking assumptions, which often do not fully account for multimedia specific issues. In this paper, we examine the performance of ECC based fingerprinting by considering both coding and embedding issues. We provide performance comparison of ECC-based scheme and a major alternative of orthogonal fingerprinting. As averaging is a feasible and cost-effective collusion attack against multimedia fingerprints yet is generally not considered in the ECC-based system, we also investigate the resistance against averaging collusion and identify avenues for improving collusion resistance. 1. INTRODUCTION Digital fingerprinting is an emerging technology to protect multimedia content from unauthorized dissemination, whereby each user s copy is identified by a unique ID embedded in his/her copy and the ID can be extracted to help identify culprits when a suspicious copy is found. A powerful, cost-effective attack from a group of users is collusion, where the users combine their copies of the same content to generate a new version. If designed improperly, the fingerprints can be weakened or removed by the collusion attacks. A growing number of techniques have been proposed in the literature to provide collusion resistance in multimedia fingerprinting systems [1]-[8]. Many of them fall in one of the two categories, namely, the orthogonal fingerprinting and coded fingerprinting. The orthogonal fingerprinting assigns each user a spread spectrum sequence as fingerprint and the sequence is mutually orthogonal to those for other users [3][4]. An early work on coded fingerprinting focused on generic data and introduced a two-level construction in code domain to resist up to c colluders with high probability [1]. This binary code was later used to modulate a direct spread spectrum sequence to embed the fingerprints in multimedia signals [2]. A q-ary ECC code resisting c The authors can be reached at {shanhe, minwu}@umd.edu. colluders, known as the c-traceability code or c-ta in short, was proposed and later extended to deal with symbol erasures contributed by noise or cropping in multimedia signal domain [6][9]. A recent code based on combinatorial design was embedded in multimedia through spread spectrum code modulation and can identify colluders through the code bits shared by them [7]. Many existing fingerprinting systems based on random code or ECC handle the embedding issues in a rather abstract level through models known as the marking assumption [1][6]. For example, it typically assumes that colluders can only change fingerprint codebits in which they have different values [1], and the colluders assemble pieces of their codes to generate a colluded version [6]. Many of these assumptions work well with generic data, but do not fully account for the unique issues when fingerprints are embedded in multimedia[8]. Colluders can manipulate fingerprinted multimedia in the signal domain, bringing changes in the code domain beyond the marking assumption. For example, the colluders may average the corresponding signal components or features from multiple copies [7][8]. Thus it is important to examine the fingerprinting performance from signal domain, taking into account coding, embedding, attack, and detection issues. We evaluate the performance of ECC-based fingerprinting in this paper with a focus on two issues. First, there is little comparison in the literature on the performance between the ECC-based coded fingerprinting and the orthogonal fingerprinting (denoted as ORTH ), where the ORTH scheme is conceptually simple and easy to implement. By incorporating embedding issues, we provide a common ground for the two types of fingerprinting and compare their performance in identifying traitors and resisting collusion. Second, we have discussed that multiuser averaging is a feasible and representative way to signal-domain collusion. While it is important for a fingerprinting system to resist averaging collusion, the current design of ECC based fingerprinting typically considers only interleaving collusion. Investigating their resistance against averaging collusion is a key step toward understanding and improving the collusion resistance of fingerprinting systems for multimedia. The paper is organized as follows. Section 2 presents the system setup of ECC-based embedded fingerprinting for multimedia. Section 3 discusses the selection of important parameters and unique issues incurred by embedding. We

2 examine in Section 4 the system performance under different scenarios and compare with the performance of the ORTH scheme. Finally conclusion is drawn in Section ECC-BASED FINGERPRINTING SYSTEM 2.1 System Framework Fingerprint encoding and embedding are two important issues for fingerprinting multimedia. We illustrate a fingerprinting system that employ an ECC based fingerprint code and spread spectrum embedding in Fig.1. The system has two layers: the outer code layer is an ECC-based traceability code of N u codewords resisting c colluders and having alphabet size q; and the inner embedding layer is for embedding each code symbol in multimedia. Fingerprinting ECC encoding (c-ta code) with alphabet size q Orthogonal modulation with q colors Fingerprinted Multimedia Channel Attacks ECC decoding (c-ta code) with alphabet size q Orthogonal demodulation with q colors Suspicious Multimedia Fig.1 Framework of ECC based fingerprinting scheme Fingerprinting We first choose an ECC code with an alphabet size of q and a large minimum distance, and assign to each user a codeword. We call each symbol from the above alphabet a color as in [2]. The design of this ECC fingerprint code will be discussed in Section 2.2. We partition the host signal into non-overlapped segments (such as frames of video or audio), where each segment is to carry one color of the fingerprint code. Within each segment, we use q mutually orthogonal spread spectrum sequences to represent the possible color values, and add one of these sequences into the segment (with perceptual scaling) according to the color value in the fingerprint code. This spread spectrum embedding technique from [10] has been shown highly robust against a variety of processings and attacks. It is also a common signal processing technique for embedding orthogonal, coded, and other correlated fingerprints [8][10]. The ORTH scheme can be regarded as a special case of ECC-based fingerprinting, which has code length 1, alphabet size N u, and uses the entire multimedia signal as one segment. Each fingerprinted segment can be modeled as yij = uij + x j (1) where u ij is the spread spectrum sequence for embedding the j-th color of the i-th user s codeword, x j is the j-th segment of host signal, and y ij is the fingerprinted segment. Then the concatenation of all fingerprinted segments forms the ultimate fingerprinted signal. Detection Collusion Attacks Interleaving collusion is considered by most ECC-based fingerprinting works. Each colluder contributes a non-overlapped set of segments and these segments are assembled together to form a colluded copy. Additional noise may be added to the multimedia signal during the collusion. As few colluders would be willing to take higher risk than others, they generally would make contributions of approximately equal amount in the collusion. We have discussed in the introduction that colluders can contribute one segment in a partial way and can perform signal domain combining that is not captured by the interleaving attack. A simple yet effective way is by averaging differently fingerprinted copies, i.e. 1 z = s + x+ d (2) i c i Sc where s i represent the fingerprint sequence for user i, S c the colluder set, c the total number of colluders, x the host signal, and d the noise term. For simplicity in analysis, we assume that the noise in interleaving and averaging collusion follows i.i.d. Gaussian distribution. Detection To identify colluders who have contributed to a suspicious copy of multimedia content, we first determine which color is present in each multimedia segment using a correlation detector commonly used for spread spectrum embedding [4][10]. If the host signal is available to detectors in fingerprinting applications, we register the suspicious copy with the host signal and subtract the host from the suspicious copy to obtain a test signal; otherwise, we use the signal itself as a test signal. We then correlate this test signal with each of the q spreading sequences, identify the sequence giving the maximum correlation, and record the corresponding color. From the sequence of colors extracted from all media segments using this maximum detector [4], we proceed to the ECC code layer and apply a decoding algorithm to identify colluders whose codewords have the most matches with the extracted color sequence. 2.2 ECC Code Layer A common practice in fingerprint code design treats the colors contributed from other colluders as errors, and makes the minimum distance between codewords large enough to tolerate the errors. The minimum distance requirement ensures that the best match with a colluded codeword (referred to as the descendant) comes from one of the true colluders. The c-ta code [11] is such an example and is defined as follows: Definition: Let Г Σ L be a code over an alphabet Σ with length L. Without loss of generality, we represent the set of c colluders as C = {u 1,..,u c } Г, where a codeword u i Г represents the i-th colluder and consists of a sequence of L colors u i = {w (i) 1, w (i) 2,..,w (i) L }. A codeword set that can descend from this colluder set is denoted as desc(c) =

3 {(x 1,..,x L ): x j {w (i) j : 1 i c}, 1 j L}. If for any descendant (x 1,..,x L ) desc(c), there is a u i C such that {j: x j = w (i) j } > {j: x j = s j } for any innocent user s codeword (s 1,..,s L ) Г \C, then Г is called c-traceability (c-ta) code. The minimum distance requirement for constructing a c- TA code under typical marking assumptions was discussed in [11], and extensions made to tolerate L e erasures [6]. We will derive conditions in Section 3 to address the unique issues incurred by embedding. 2.3 System Design Procedures We summarize the design procedure for an ECC-based multimedia fingerprinting system that aims at surviving interleaving attack. Step1: Given a multimedia signal, obtain the signal length N and determine the segment size N s. Select the alphabet size q. The value of L can be computed by L= N / Ns. Step2: For each segment, under the use of spread spectrum embedding and the maximum detector, compute the probability of correctly detecting a guilty color that is contributed from at least one colluder (denoted as P d ) and the probability of false detection of a color (denoted as P fa =1 P d ). For simplicity, we assume that such probability is identical from segment to segment. Step3: Denote the total number of extracted colors that are contributed from colluder set as N correct. Given n, we examine the probability of an event A that N correct n: L L k L k Pr ( A) = Pr ( Ncorrect n) = Pd ( 1 Pd ) k= n k (3) Step 4: The probability of correctly identifying at least one colluder, denoted as P d_all, is bounded by: Pd_ all Pr ( catch at least one colluder A) Pr ( A) (4) With n = L-L e and a c-ta code from [6] that can handle L e erasures, we ensure Pr(catch at least one colluder A)=1. To meet the minimum probability of positive detection P d_all_req that the system is designed to satisfy, it is sufficient to keep Pr(A) equal to or greater than P d_all_req. Thus with the properties of c-ta code derived in [6], we can establish a relationship between L e, P d_all_req, and the c-ta code capacity (namely, C max the maximum colluder resistance, and N u the number of codewords for representing different users). Using this relationship and for a fixed N u, we can obtain C max and the corresponding c-ta code to meet a given detection requirement P d_all_req. Alternatively, we can examine the detection probability P d_all for a c-ta code with a specific C max. 3. UNIQUE ISSUES INCURRED BY EMBEDDING Minimum Distance Requirement The distortions and attacks mounted by adversaries on fingerprinted multimedia can lead to errors in detecting fingerprint code symbols/colors. The existing work on c-ta code has extended to tolerate erasures only [6]. We note that there is nontrivial probability for false alarms in color detection, which contributes to the non-erased erroneous colors that are not contributed by any colluders. Thus we need to consider both erasure and non-erasure errors when designing fingerprint code. In the following, we extend the definition of c-ta code to account for both types of errors and develop a minimum distance requirement with a similar strategy used in [6]. As before, we consider a code Γ of length L over an alphabet Σ of size q. This code is called a c-traceability code tolerating L e erasures and L FA errors and denoted as c-ta q (L, N u ; L FA, L e ) if for any (x 1,..,x L ) X(C), there is a colluder s codeword u i C such that {j: x j = w (i) j } > {j: x j = s j } for any innocent user s codeword (s 1,..,s L ) Г \C. Here X(C) denotes the set of the codeword with no more than L e erasures and no more than L FA erroneous colors over an extended alphabet Σ {?}, where {?} is the erasure symbol. We derive the following minimum distance conditions for c-ta(l, N u ; L FA, L e ). Theorem 1 Let Γ be an (L,N u,d) q -ECC, and c an 1 c integer. If D > 1 L L FA + L 2 e (5) c c c then Γ is c-ta q (L,N u ; L e, L FA ). We can construct c-ta code using a Reed-Solomon code that satisfies the above condition. The design can be simplified by treating erasures as errors, which reflects the case of color extraction by such schemes as the maximum correlation detector described in Section 2.2. This simplification leads to the following theorem. Theorem 2 Among Reed-Solomon code with alphabet size q, there exists a c-ta q (L,N u ; L FA ) code with minimum 1 c + 1 distance D > 1 L L FA, (6) c c where the codeword number N u = q t L c+ 1 and t= L 2 2 FA c c. With these conditions, we modify the Step 4 in Section 2.3 as follows. We follow the same procedure up to choosing Pr(A) equal to or greater than P d_all_req. We then use L FA = L n in place of former L e = L n, and employ Theorem 2 to establish the relation between L FA, P d_all_req, and the c-ta code capacity (C max and N u ). We set t=2 in this paper for tolerating as many as possible colluders while accommodating a moderate number of users. We plot the relation between C max and L FA under various levels of the detection requirement P d_all_req and refer it as the System Design Figure. A point (P d_all_req, C max, L FA ) in this figure corresponds to a system that can resist up to C max colluders with a probability of at least P d_all_req if the number of falsely detected colors is no greater than L FA.

4 Choosing Alphabet Size As we use the orthogonal embedding to put a desired color in a segment of multimedia, the color detection algorithm in Section 2.1 implies that the alphabet size q of the outer code determines the computational complexity in identifying suspicious color(s) from each segment [8][10]. Furthermore, the study in [4] has suggested that fingerprinting through orthogonal modulation has a fundamental limit in the number of colluders that it can resist under averaging collusion. Thus there is a limit on the number of guilty colors that we can tolerate when the system encounters averaging collusion. The overall collusion resistance is determined by the limits from both the embedding layer and the outer code layer. In view of these limits, we select the alphabet size q on the order of several dozens for the studies in this paper. 4. PERFORMANCE EVALUATION We first compare the performance of the ECC-based fingerprinting for multimedia with that of the ORTH fingerprinting under interleaving collusion. We then examine the impact of averaging collusion, as well as the resilience toward a large group of colluders. 4.1 Comparison with ORTH Fingerprinting For a fair comparison between the ECC-based fingerprinting and the ORTH fingerprinting, we choose the same values for the targeted collusion resistance C max and the total number of users N u, and apply the two fingerprinting schemes to the same host signal. To facilitate the analysis, we use i.i.d. Gaussian sequence with length N to emulate the host signal in this paper. We design the ECC-based fingerprinting system using a Reed-Solomon code with q=2 5, L=30, N s = 1000, and N u = q 2 =1024. Fig. 2 is the System Design Figures obtained from the steps in Section 2. For watermark-to-noise ratio (WNR) of -17dB (corresponding to blind detection or severe attacks) shown in Fig. 2(a), we see that the system can resist up to 5 colluders to meet the required detection probability P d_all_req in the range of , and this is achieved with codes constructed without the need of explicitly tolerating any color detection errors (i.e. L FA =0). Further, when the system is designed to achieve P d_all_req in the range of , it can resist up to 4 colluders with codes that are constructed to explicitly tolerate one color error (L FA =1). For the case of WNR = 0dB (corresponding to non-blind detection and moderate distortions) shown in Fig. 2(b), the system can resist up to 5 colluders over a wide range of required detection probability, and the codes used do not need to explicitly tolerating color detection errors (L FA =0). For the ORTH fingerprinting, we can obtain the relationship between the required detection probability P d_orth_req and C max according to the study in [4]. Fig. 3 shows the System Design Figures for the ORTH system with the same host signal length N and the total number of users N u. These are in terms of the maximum number of colluders that the system can tolerate while meeting the required colluder detection probability P all-req. Note that owing to the employment of maximum correlation detector, the false accusation probability is 1 - P all-req. The above figures indicate that for a medium-scale host signal of tens of thousands elements and a moderate user group size of about a thousand, ORTH fingerprinting can catch much more colluders than the ECC based system at the same level of colluder detection requirement. The difference in colluder resistance is one order of magnitude in the high WNR case. Several factors contribute to this performance gap. First, the two-layer design in ECC-based fingerprinting imposes structural constraints on the signal space of fingerprints. For example, the number of colors represented by orthogonal sequences is substantially smaller than in the ORTH scheme. Second, the current decoding of ECC-based fingerprinting makes a hard decision on the color values, while the ORTH detection aggregates the contribution from each part of the multimedia signal through a correlation detector and does not make hard decision until the whole signal is processed. Our preliminary test shows that soft decoding can potentially improve the detection performance of ECC fingerprinting. Furthermore, the design conditions of (4)(5)(6) for ECC fingerprinting are stronger than necessary, leading to a conservative C max. On the other hand, we note that q orthogonal sequences of length N/L is used in ECC based system, while the ORTH system requires q t mutually orthogonal sequences of length N. This suggested that the ECC based system has the advantage of providing a more compact way of representing users and consuming less resource in terms of the orthogonal sequences. Overall, the ECC-based fingerprinting is attractive for applications that have a large number of users but a very small number of colluders at a time; and the ORTH system provides better protection for applications having a larger group of potential colluders. 4.2 Resistance Against Averaging Collusion Our second performance study is on the resistance against averaging collusion by the ECC-based fingerprinting systems that primarily target at surviving interleaving collusion. We take an ECC-based fingerprinting system designed following the aforementioned procedures with the same parameters as Section 4.1, and examine its colluder detection probability P A d_all under averaging attack. The analysis for P A d_all is similar to that for the interleaving case in the Step 3 and 4 of Section 2, except that the color detection probability P d now should be derived from averaging attack and n=l-l FA. Noticing from Section 4.1 that the original system survives 5-user interleaving collusion, we examine the performance of averaging collusion with 2 to 5 colluders. The code parameter L FA is set to 2 from the results in Section 4.1. The lower bound of P A d_all from analysis is

5 (a) (a) (a) (b) (b) (b) Fig. 2 System design figures of ECC fingerprinting at WNR = -17dB(a) and WNR = 0dB (b). Fig. 3 System design figures of ORTH scheme at WNR = -17dB (a) and WNR = 0dB (b). Fig. 4 Performance of ECC fingerprinting under averaging collusion at WNR = -17dB (a) and WNR = 0dB (b). plotted numerically in Fig.4. We can see that for very low WNR in Fig.4(a), the unexpected averaging collusion has a significant negative impact on the detection performance. The system can no longer be guaranteed to meet the colluder identification requirement P d_all_req after averaging collusion. On the other hand, for moderately high WNR as in Fig.4(b), the system can resist averaging collusion and identify colluders with probability higher than the requirement. We now use simulations of 500 runs to evaluate the actual detection performance for WNR of -17dB and 0dB, respectively. For WNR = -17dB, we choose the point of (P d_all,c max, L FA ) = (0.91,5,0) from the system design figure. This indicates that the system can achieve detection probability of at least 0.91 and tolerate up to 5 colluders under interleaving attacks. The results of interleaving and averaging collusion on this system are shown in Fig. 5, along with the results by the ORTH scheme. As we can see, the system survives interleaving attacks as it is designed for, but cannot track down colluder with desired probability under averaging collusion. The actual probability of correct detection is higher than the lower bound from our analysis shown in Fig.4, but is still below the required level. On the contrary, the result confirms that the averaging and interleaving collusions have almost identical effect on the ORTH system [8]. For WNR = 0dB, we choose a working point of (P d_all, C max, L FA ) = (0.99,5,0) from the System Design Figure. Simulation results Fig. 6 show that the system can resist both interleaving collusion and averaging collusion. The different impacts by averaging collusion on the two types of fingerprinting can be explained as follows. For every media segment in ECC fingerprinting, interleaving collusion preserves a color in its entirety, while averaging collusion reduces the power of the color from each colluder. This makes colors less likely to be correctly detected under low WNR after averaging collusion. The increased color errors will be propagated to the code level and lead to performance degradation in tracing colluders. On the other hand, ORTH scheme aggregates the correlation over the entire signal. In terms of the overall fingerprint energy for each user, averaging and interleaving collusions have approximately the same effect [8]. 4.3 Performance for Colluder Number Beyond C max We note that the system design based on Theorem 1 concerns the worst-case scenario, which may not happen often in a particular realization. To explore the ECC fingerprinting s potential in collusion resistance, we examine through simulation the performance when the colluder number becomes greater than C max and compare it with ORTH under the same collusion scenario. The result of 1000 runs, shown in Fig.7, indicates that the ORTH scheme still substantially outperform the ECC-based fingerprinting. One interesting observation is that as c increases, the resistance of ECC fingerprinting against interleaving collusion decreases quickly, but it survives averaging collusion. Our study shows that this survival is contributed in part by the inherent correlation between the codewords through shared colors at some symbol positions. After

6 (a) (a) (a) (b) (b) (b) Fig. 5 Simulation results of different schemes at WNR = -17dB under interleaving(a) and averaging collusion(b). Fig. 6 Simulation results of different schemes at WNR = 0dB under interleaving(a) and averaging collusion(b). Fig. 7 Performance with increased colluder number at WNR=0dB under interleaving(a) and averaging collusion (b). averaging collusion, the colors shared among colluders are likely to be extracted by the maximum correlation detector, and these shared colors rarely appear in the innocent user s codeword. This suggests that strategically introducing correlation between fingerprints can be equally important as introducing separations. The benefit of correlation has been demonstrated by several recent non-ecc based fingerprinting schemes [7][8]. 5. CONCLUSIONS In this paper, we have examined the performance of the ECC-based multimedia fingerprinting by taking into account both coding and embedding issues. Our studies have shown that the orthogonal fingerprinting has superb collusion resistance and can catch colluders one order of magnitude more than the ECC based system, while the ECC-based fingerprinting consumes less orthogonal spreading sequences. Regarding different types of collusions, the ECC fingerprinting systems that are intended for resisting interleaving collusion is unable to resist averaging collusion under low WNR, while it can resist both averaging and interleaving collusion under high WNR. Our studies also suggest the benefit of correlation between fingerprints constructed via ECC in combating collusions. Acknowledgement This work was supported by the Air Force Research Laboratory Grant#F and the National Science Foundation Award#CCR The authors thank Dr. Z. Jane Wang of UMD for the enlightening discussions. REFERENCES [1] D. Boneh and J. Shaw, Collusion-Secure Fingerprinting for Digital Data, IEEE Tran. on Info. Theory, 44(5), [2] Y. Yacobi, Improved Boneh-Shaw Content Fingerprinting, CT-RSA 2001, LNCS 2020, pp , [3] F.Ergun, J.Kilian and R.Kumar, A Note on the limits of Collusion-Resistant Watermarks, Eurocrypt 99, [4] Z.J. Wang, M. Wu, H. Zhao, W. Trappe, and K.J.R. Liu, Collusion Resistance of Multimedia Fingerprinting using Orthogonal Modulation, submitted to Trans. on Image Proc. [5] F. Zane, Efficient Watermark Detection and Collusion Security, FC 2000, LNCS 1962, pp , 2001 [6] R. Safavi-Naini and Y. Wang, Collusion Secure q-ary Finger-printing for Perceptual Content, Security and Privacy in Digital Rights Management (SPDRM'01), pp , [7] W. Trappe, M. Wu, Z.J. Wang and K.J.R. Liu, Anti-collusion Fingerprinting for Multimedia, IEEE Transactions on Signal Processing, vol. 51, no. 4, April [8] M. Wu, W. Trappe, Z. Wang, and K.J.R. Liu, "Collusion Resistant Fingerprinting for Multimedia", to appear in IEEE Signal Processing Magazine, [9] R. Safavi-Naini and Y. Wang, Traitor Tracing for Shortened and Corrupted Fingerprints, Digital Right Management (DRM'02), pp , [10] I. Cox, J. Kilian, F. Leighton, and T. Shamoon, Secure Spread Spectrum Watermarking for Multimedia, IEEE Trans. on Image Processing, 6(12), pp , [11] J.N. Staddon, D. R. Stinson, and R. Wei, Combinatorial Properties of Frameproof and Traceability Codes, IEEE Trans. on Information Theory, vol. 47, no. 3, March 2001.

Zero-Based Code Modulation Technique for Digital Video Fingerprinting

Zero-Based Code Modulation Technique for Digital Video Fingerprinting Zero-Based Code Modulation Technique for Digital Video Fingerprinting In Koo Kang 1, Hae-Yeoun Lee 1, Won-Young Yoo 2, and Heung-Kyu Lee 1 1 Department of EECS, Korea Advanced Institute of Science and

More information

Practical fingerprinting system for images

Practical fingerprinting system for images 46 5, 057004 May 2007 Practical fingerprinting system for images Yu-Tzu Lin National Taiwan University Communications and Multimedia Laboratory Department of Computer Science and Information Engineering

More information

MULTIMEDIA content can be easily distributed over

MULTIMEDIA content can be easily distributed over 302 IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, VOL. 4, NO. 3, SEPTEMBER 2009 Robust MC-CDMA-Based Fingerprinting Against Time-Varying Collusion Attacks Byung-Ho Cha, Student Member, IEEE,

More information

Collusion Secure Fingerprinting. CMLab

Collusion Secure Fingerprinting. CMLab Collusion Secure Fingerprinting CMLab 2 Outline Introduction Collusion attack Collusion-resilient fingerprinting Combinatorial designed code Error correction code Orthogonal signals Research issues 3 Introduction

More information

Anti-Collusion Fingerprinting for Multimedia

Anti-Collusion Fingerprinting for Multimedia Anti-Collusion Fingerprinting for Multimedia Wade Trappe, Min Wu, Zhen Wang, and K. J. Ray Liu Department of Electrical and Computer Engineering University of Maryland, College Park, MD 20742 E-mail: wxt,

More information

Digital Communications I: Modulation and Coding Course. Term Catharina Logothetis Lecture 12

Digital Communications I: Modulation and Coding Course. Term Catharina Logothetis Lecture 12 Digital Communications I: Modulation and Coding Course Term 3-8 Catharina Logothetis Lecture Last time, we talked about: How decoding is performed for Convolutional codes? What is a Maximum likelihood

More information

Capacity of collusion secure fingerprinting a tradeoff between rate and efficiency

Capacity of collusion secure fingerprinting a tradeoff between rate and efficiency Capacity of collusion secure fingerprinting a tradeoff between rate and efficiency Gábor Tardos School of Computing Science Simon Fraser University and Rényi Institute, Budapest tardos@cs.sfu.ca Abstract

More information

Frequency-Hopped Spread-Spectrum

Frequency-Hopped Spread-Spectrum Chapter Frequency-Hopped Spread-Spectrum In this chapter we discuss frequency-hopped spread-spectrum. We first describe the antijam capability, then the multiple-access capability and finally the fading

More information

ECE 6640 Digital Communications

ECE 6640 Digital Communications ECE 6640 Digital Communications Dr. Bradley J. Bazuin Assistant Professor Department of Electrical and Computer Engineering College of Engineering and Applied Sciences Chapter 8 8. Channel Coding: Part

More information

ECE 6640 Digital Communications

ECE 6640 Digital Communications ECE 6640 Digital Communications Dr. Bradley J. Bazuin Assistant Professor Department of Electrical and Computer Engineering College of Engineering and Applied Sciences Chapter 8 8. Channel Coding: Part

More information

Digital Audio Watermarking With Discrete Wavelet Transform Using Fibonacci Numbers

Digital Audio Watermarking With Discrete Wavelet Transform Using Fibonacci Numbers Digital Audio Watermarking With Discrete Wavelet Transform Using Fibonacci Numbers P. Mohan Kumar 1, Dr. M. Sailaja 2 M. Tech scholar, Dept. of E.C.E, Jawaharlal Nehru Technological University Kakinada,

More information

Encryption Data in Wireless Sensor Network

Encryption Data in Wireless Sensor Network Available Online at www.ijcsmc.com International Journal of Computer Science and Mobile Computing A Monthly Journal of Computer Science and Information Technology ISSN 2320 088X IMPACT FACTOR: 6.017 IJCSMC,

More information

Reversible Data Hiding in Encrypted color images by Reserving Room before Encryption with LSB Method

Reversible Data Hiding in Encrypted color images by Reserving Room before Encryption with LSB Method ISSN (e): 2250 3005 Vol, 04 Issue, 10 October 2014 International Journal of Computational Engineering Research (IJCER) Reversible Data Hiding in Encrypted color images by Reserving Room before Encryption

More information

A Combinatorial Framework for Frequency Hopping Multiple Access

A Combinatorial Framework for Frequency Hopping Multiple Access Fourteenth International Workshop on Algebraic and Combinatorial Coding Theory September 7 13, 2014, Svetlogorsk (Kaliningrad region), Russia pp. 271 276 A Combinatorial Framework for Frequency Hopping

More information

Improved Spread Spectrum: A New Modulation Technique for Robust Watermarking

Improved Spread Spectrum: A New Modulation Technique for Robust Watermarking 898 IEEE TRANSACTIONS ON SIGNAL PROCESSING, VOL. 51, NO. 4, APRIL 2003 Improved Spread Spectrum: A New Modulation Technique for Robust Watermarking Henrique S. Malvar, Fellow, IEEE, and Dinei A. F. Florêncio,

More information

Department of Electronic Engineering FINAL YEAR PROJECT REPORT

Department of Electronic Engineering FINAL YEAR PROJECT REPORT Department of Electronic Engineering FINAL YEAR PROJECT REPORT BEngECE-2009/10-- Student Name: CHEUNG Yik Juen Student ID: Supervisor: Prof.

More information

Digital Television Lecture 5

Digital Television Lecture 5 Digital Television Lecture 5 Forward Error Correction (FEC) Åbo Akademi University Domkyrkotorget 5 Åbo 8.4. Error Correction in Transmissions Need for error correction in transmissions Loss of data during

More information

Performance Analysis of Cognitive Radio based on Cooperative Spectrum Sensing

Performance Analysis of Cognitive Radio based on Cooperative Spectrum Sensing Performance Analysis of Cognitive Radio based on Cooperative Spectrum Sensing Sai kiran pudi 1, T. Syama Sundara 2, Dr. Nimmagadda Padmaja 3 Department of Electronics and Communication Engineering, Sree

More information

Watermarking-based Image Authentication with Recovery Capability using Halftoning and IWT

Watermarking-based Image Authentication with Recovery Capability using Halftoning and IWT Watermarking-based Image Authentication with Recovery Capability using Halftoning and IWT Luis Rosales-Roldan, Manuel Cedillo-Hernández, Mariko Nakano-Miyatake, Héctor Pérez-Meana Postgraduate Section,

More information

Introduction to Audio Watermarking Schemes

Introduction to Audio Watermarking Schemes Introduction to Audio Watermarking Schemes N. Lazic and P. Aarabi, Communication over an Acoustic Channel Using Data Hiding Techniques, IEEE Transactions on Multimedia, Vol. 8, No. 5, October 2006 Multimedia

More information

IMPROVING AUDIO WATERMARK DETECTION USING NOISE MODELLING AND TURBO CODING

IMPROVING AUDIO WATERMARK DETECTION USING NOISE MODELLING AND TURBO CODING IMPROVING AUDIO WATERMARK DETECTION USING NOISE MODELLING AND TURBO CODING Nedeljko Cvejic, Tapio Seppänen MediaTeam Oulu, Information Processing Laboratory, University of Oulu P.O. Box 4500, 4STOINF,

More information

Digital Image Watermarking by Spread Spectrum method

Digital Image Watermarking by Spread Spectrum method Digital Image Watermarking by Spread Spectrum method Andreja Samčovi ović Faculty of Transport and Traffic Engineering University of Belgrade, Serbia Belgrade, november 2014. I Spread Spectrum Techniques

More information

ENF ANALYSIS ON RECAPTURED AUDIO RECORDINGS

ENF ANALYSIS ON RECAPTURED AUDIO RECORDINGS ENF ANALYSIS ON RECAPTURED AUDIO RECORDINGS Hui Su, Ravi Garg, Adi Hajj-Ahmad, and Min Wu {hsu, ravig, adiha, minwu}@umd.edu University of Maryland, College Park ABSTRACT Electric Network (ENF) based forensic

More information

An Improved Edge Adaptive Grid Technique To Authenticate Grey Scale Images

An Improved Edge Adaptive Grid Technique To Authenticate Grey Scale Images An Improved Edge Adaptive Grid Technique To Authenticate Grey Scale Images Ishwarya.M 1, Mary shamala.l 2 M.E, Dept of CSE, IFET College of Engineering, Villupuram, TamilNadu, India 1 Associate Professor,

More information

Audio Watermark Detection Improvement by Using Noise Modelling

Audio Watermark Detection Improvement by Using Noise Modelling Audio Watermark Detection Improvement by Using Noise Modelling NEDELJKO CVEJIC, TAPIO SEPPÄNEN*, DAVID BULL Dept. of Electrical and Electronic Engineering University of Bristol Merchant Venturers Building,

More information

A Soft-Limiting Receiver Structure for Time-Hopping UWB in Multiple Access Interference

A Soft-Limiting Receiver Structure for Time-Hopping UWB in Multiple Access Interference 2006 IEEE Ninth International Symposium on Spread Spectrum Techniques and Applications A Soft-Limiting Receiver Structure for Time-Hopping UWB in Multiple Access Interference Norman C. Beaulieu, Fellow,

More information

3432 IEEE TRANSACTIONS ON INFORMATION THEORY, VOL. 53, NO. 10, OCTOBER 2007

3432 IEEE TRANSACTIONS ON INFORMATION THEORY, VOL. 53, NO. 10, OCTOBER 2007 3432 IEEE TRANSACTIONS ON INFORMATION THEORY, VOL 53, NO 10, OCTOBER 2007 Resource Allocation for Wireless Fading Relay Channels: Max-Min Solution Yingbin Liang, Member, IEEE, Venugopal V Veeravalli, Fellow,

More information

Implementation of Reed-Solomon RS(255,239) Code

Implementation of Reed-Solomon RS(255,239) Code Implementation of Reed-Solomon RS(255,239) Code Maja Malenko SS. Cyril and Methodius University - Faculty of Electrical Engineering and Information Technologies Karpos II bb, PO Box 574, 1000 Skopje, Macedonia

More information

DEGRADED broadcast channels were first studied by

DEGRADED broadcast channels were first studied by 4296 IEEE TRANSACTIONS ON INFORMATION THEORY, VOL 54, NO 9, SEPTEMBER 2008 Optimal Transmission Strategy Explicit Capacity Region for Broadcast Z Channels Bike Xie, Student Member, IEEE, Miguel Griot,

More information

REVIEW OF COOPERATIVE SCHEMES BASED ON DISTRIBUTED CODING STRATEGY

REVIEW OF COOPERATIVE SCHEMES BASED ON DISTRIBUTED CODING STRATEGY INTERNATIONAL JOURNAL OF RESEARCH IN COMPUTER APPLICATIONS AND ROBOTICS ISSN 2320-7345 REVIEW OF COOPERATIVE SCHEMES BASED ON DISTRIBUTED CODING STRATEGY P. Suresh Kumar 1, A. Deepika 2 1 Assistant Professor,

More information

Performance of Combined Error Correction and Error Detection for very Short Block Length Codes

Performance of Combined Error Correction and Error Detection for very Short Block Length Codes Performance of Combined Error Correction and Error Detection for very Short Block Length Codes Matthias Breuninger and Joachim Speidel Institute of Telecommunications, University of Stuttgart Pfaffenwaldring

More information

Study of Turbo Coded OFDM over Fading Channel

Study of Turbo Coded OFDM over Fading Channel International Journal of Engineering Research and Development e-issn: 2278-067X, p-issn: 2278-800X, www.ijerd.com Volume 3, Issue 2 (August 2012), PP. 54-58 Study of Turbo Coded OFDM over Fading Channel

More information

Implementation of a Visible Watermarking in a Secure Still Digital Camera Using VLSI Design

Implementation of a Visible Watermarking in a Secure Still Digital Camera Using VLSI Design 2009 nternational Symposium on Computing, Communication, and Control (SCCC 2009) Proc.of CST vol.1 (2011) (2011) ACST Press, Singapore mplementation of a Visible Watermarking in a Secure Still Digital

More information

Jamming Mitigation Based on Coded Message-Driven Frequency Hopping

Jamming Mitigation Based on Coded Message-Driven Frequency Hopping Jamming Mitigation Based on Coded Message-Driven Frequency Hopping Huahui Wang and Tongtong Li Department of Electrical & Computer Engineering Michigan State University, East Lansing, Michigan 48824, USA

More information

TCM-coded OFDM assisted by ANN in Wireless Channels

TCM-coded OFDM assisted by ANN in Wireless Channels 1 Aradhana Misra & 2 Kandarpa Kumar Sarma Dept. of Electronics and Communication Technology Gauhati University Guwahati-781014. Assam, India Email: aradhana66@yahoo.co.in, kandarpaks@gmail.com Abstract

More information

International Journal of Digital Application & Contemporary research Website: (Volume 1, Issue 7, February 2013)

International Journal of Digital Application & Contemporary research Website:   (Volume 1, Issue 7, February 2013) Performance Analysis of OFDM under DWT, DCT based Image Processing Anshul Soni soni.anshulec14@gmail.com Ashok Chandra Tiwari Abstract In this paper, the performance of conventional discrete cosine transform

More information

Method to Improve Watermark Reliability. Adam Brickman. EE381K - Multidimensional Signal Processing. May 08, 2003 ABSTRACT

Method to Improve Watermark Reliability. Adam Brickman. EE381K - Multidimensional Signal Processing. May 08, 2003 ABSTRACT Method to Improve Watermark Reliability Adam Brickman EE381K - Multidimensional Signal Processing May 08, 2003 ABSTRACT This paper presents a methodology for increasing audio watermark robustness. The

More information

MULTILEVEL CODING (MLC) with multistage decoding

MULTILEVEL CODING (MLC) with multistage decoding 350 IEEE TRANSACTIONS ON COMMUNICATIONS, VOL. 52, NO. 3, MARCH 2004 Power- and Bandwidth-Efficient Communications Using LDPC Codes Piraporn Limpaphayom, Student Member, IEEE, and Kim A. Winick, Senior

More information

MATHEMATICS IN COMMUNICATIONS: INTRODUCTION TO CODING. A Public Lecture to the Uganda Mathematics Society

MATHEMATICS IN COMMUNICATIONS: INTRODUCTION TO CODING. A Public Lecture to the Uganda Mathematics Society Abstract MATHEMATICS IN COMMUNICATIONS: INTRODUCTION TO CODING A Public Lecture to the Uganda Mathematics Society F F Tusubira, PhD, MUIPE, MIEE, REng, CEng Mathematical theory and techniques play a vital

More information

Enhancement of Speech Signal Based on Improved Minima Controlled Recursive Averaging and Independent Component Analysis

Enhancement of Speech Signal Based on Improved Minima Controlled Recursive Averaging and Independent Component Analysis Enhancement of Speech Signal Based on Improved Minima Controlled Recursive Averaging and Independent Component Analysis Mohini Avatade & S.L. Sahare Electronics & Telecommunication Department, Cummins

More information

Digital Watermarking Using Homogeneity in Image

Digital Watermarking Using Homogeneity in Image Digital Watermarking Using Homogeneity in Image S. K. Mitra, M. K. Kundu, C. A. Murthy, B. B. Bhattacharya and T. Acharya Dhirubhai Ambani Institute of Information and Communication Technology Gandhinagar

More information

Optimal Power Allocation over Fading Channels with Stringent Delay Constraints

Optimal Power Allocation over Fading Channels with Stringent Delay Constraints 1 Optimal Power Allocation over Fading Channels with Stringent Delay Constraints Xiangheng Liu Andrea Goldsmith Dept. of Electrical Engineering, Stanford University Email: liuxh,andrea@wsl.stanford.edu

More information

Sound Quality Evaluation for Audio Watermarking Based on Phase Shift Keying Using BCH Code

Sound Quality Evaluation for Audio Watermarking Based on Phase Shift Keying Using BCH Code IEICE TRANS. INF. & SYST., VOL.E98 D, NO.1 JANUARY 2015 89 LETTER Special Section on Enriched Multimedia Sound Quality Evaluation for Audio Watermarking Based on Phase Shift Keying Using BCH Code Harumi

More information

TWO ALGORITHMS IN DIGITAL AUDIO STEGANOGRAPHY USING QUANTIZED FREQUENCY DOMAIN EMBEDDING AND REVERSIBLE INTEGER TRANSFORMS

TWO ALGORITHMS IN DIGITAL AUDIO STEGANOGRAPHY USING QUANTIZED FREQUENCY DOMAIN EMBEDDING AND REVERSIBLE INTEGER TRANSFORMS TWO ALGORITHMS IN DIGITAL AUDIO STEGANOGRAPHY USING QUANTIZED FREQUENCY DOMAIN EMBEDDING AND REVERSIBLE INTEGER TRANSFORMS Sos S. Agaian 1, David Akopian 1 and Sunil A. D Souza 1 1Non-linear Signal Processing

More information

Capacity-Achieving Rateless Polar Codes

Capacity-Achieving Rateless Polar Codes Capacity-Achieving Rateless Polar Codes arxiv:1508.03112v1 [cs.it] 13 Aug 2015 Bin Li, David Tse, Kai Chen, and Hui Shen August 14, 2015 Abstract A rateless coding scheme transmits incrementally more and

More information

Quantization Index Modulation: A Class of Provably Good Methods for Digital Watermarking and Information Embedding

Quantization Index Modulation: A Class of Provably Good Methods for Digital Watermarking and Information Embedding IEEE TRANSACTION ON INFORMATION THEORY, VOL. 47, NO. 4, MAY 2001 1423 Quantization Index Modulation: A Class of Provably Good Methods for Digital Watermarking and Information Embedding Brian Chen, Member,

More information

The Capability of Error Correction for Burst-noise Channels Using Error Estimating Code

The Capability of Error Correction for Burst-noise Channels Using Error Estimating Code The Capability of Error Correction for Burst-noise Channels Using Error Estimating Code Yaoyu Wang Nanjing University yaoyu.wang.nju@gmail.com June 10, 2016 Yaoyu Wang (NJU) Error correction with EEC June

More information

Scale estimation in two-band filter attacks on QIM watermarks

Scale estimation in two-band filter attacks on QIM watermarks Scale estimation in two-band filter attacks on QM watermarks Jinshen Wang a,b, vo D. Shterev a, and Reginald L. Lagendijk a a Delft University of Technology, 8 CD Delft, etherlands; b anjing University

More information

ORTHOGONAL frequency division multiplexing (OFDM)

ORTHOGONAL frequency division multiplexing (OFDM) IEEE TRANSACTIONS ON BROADCASTING, VOL. 50, NO. 3, SEPTEMBER 2004 335 Modified Selected Mapping Technique for PAPR Reduction of Coded OFDM Signal Seung Hee Han, Student Member, IEEE, and Jae Hong Lee,

More information

Multilevel RS/Convolutional Concatenated Coded QAM for Hybrid IBOC-AM Broadcasting

Multilevel RS/Convolutional Concatenated Coded QAM for Hybrid IBOC-AM Broadcasting IEEE TRANSACTIONS ON BROADCASTING, VOL. 46, NO. 1, MARCH 2000 49 Multilevel RS/Convolutional Concatenated Coded QAM for Hybrid IBOC-AM Broadcasting Sae-Young Chung and Hui-Ling Lou Abstract Bandwidth efficient

More information

Physical-Layer Network Coding Using GF(q) Forward Error Correction Codes

Physical-Layer Network Coding Using GF(q) Forward Error Correction Codes Physical-Layer Network Coding Using GF(q) Forward Error Correction Codes Weimin Liu, Rui Yang, and Philip Pietraski InterDigital Communications, LLC. King of Prussia, PA, and Melville, NY, USA Abstract

More information

Noncoherent Demodulation for Cooperative Diversity in Wireless Systems

Noncoherent Demodulation for Cooperative Diversity in Wireless Systems Noncoherent Demodulation for Cooperative Diversity in Wireless Systems Deqiang Chen and J. Nicholas Laneman Department of Electrical Engineering University of Notre Dame Notre Dame IN 46556 Email: {dchen

More information

Trellis-Coded-Modulation-OFDMA for Spectrum Sharing in Cognitive Environment

Trellis-Coded-Modulation-OFDMA for Spectrum Sharing in Cognitive Environment Trellis-Coded-Modulation-OFDMA for Spectrum Sharing in Cognitive Environment Nader Mokari Department of ECE Tarbiat Modares University Tehran, Iran Keivan Navaie School of Electronic & Electrical Eng.

More information

OPPORTUNISTIC ALOHA AND CROSS LAYER DESIGN FOR SENSOR NETWORKS. Parvathinathan Venkitasubramaniam, Srihari Adireddy and Lang Tong

OPPORTUNISTIC ALOHA AND CROSS LAYER DESIGN FOR SENSOR NETWORKS. Parvathinathan Venkitasubramaniam, Srihari Adireddy and Lang Tong OPPORTUNISTIC ALOHA AND CROSS LAYER DESIGN FOR SENSOR NETWORKS Parvathinathan Venkitasubramaniam Srihari Adireddy and Lang Tong School of Electrical and Computer Engineering Cornell University Ithaca NY

More information

Spatial Correlation Effects on Channel Estimation of UCA-MIMO Receivers

Spatial Correlation Effects on Channel Estimation of UCA-MIMO Receivers 11 International Conference on Communication Engineering and Networks IPCSIT vol.19 (11) (11) IACSIT Press, Singapore Spatial Correlation Effects on Channel Estimation of UCA-MIMO Receivers M. A. Mangoud

More information

An Iterative Noncoherent Relay Receiver for the Two-way Relay Channel

An Iterative Noncoherent Relay Receiver for the Two-way Relay Channel An Iterative Noncoherent Relay Receiver for the Two-way Relay Channel Terry Ferrett 1 Matthew Valenti 1 Don Torrieri 2 1 West Virginia University 2 U.S. Army Research Laboratory June 12th, 2013 1 / 26

More information

The Z Channel. Nihar Jindal Department of Electrical Engineering Stanford University, Stanford, CA

The Z Channel. Nihar Jindal Department of Electrical Engineering Stanford University, Stanford, CA The Z Channel Sriram Vishwanath Dept. of Elec. and Computer Engg. Univ. of Texas at Austin, Austin, TX E-mail : sriram@ece.utexas.edu Nihar Jindal Department of Electrical Engineering Stanford University,

More information

High capacity robust audio watermarking scheme based on DWT transform

High capacity robust audio watermarking scheme based on DWT transform High capacity robust audio watermarking scheme based on DWT transform Davod Zangene * (Sama technical and vocational training college, Islamic Azad University, Mahshahr Branch, Mahshahr, Iran) davodzangene@mail.com

More information

A Scheme for Digital Audio Watermarking Using Empirical Mode Decomposition with IMF

A Scheme for Digital Audio Watermarking Using Empirical Mode Decomposition with IMF International Journal of Research Studies in Science, Engineering and Technology Volume 1, Issue 7, October 2014, PP 7-12 ISSN 2349-4751 (Print) & ISSN 2349-476X (Online) A Scheme for Digital Audio Watermarking

More information

Performance Study on Multimedia Fingerprinting Employing Traceability Codes

Performance Study on Multimedia Fingerprinting Employing Traceability Codes Performane Study on Multimedia Fingerprinting Employing Traeability Codes Shan He and Min Wu University of Maryland, College Park, U.S.A. Abstrat. Digital fingerprinting is a tool to protet multimedia

More information

Lossless Image Watermarking for HDR Images Using Tone Mapping

Lossless Image Watermarking for HDR Images Using Tone Mapping IJCSNS International Journal of Computer Science and Network Security, VOL.13 No.5, May 2013 113 Lossless Image Watermarking for HDR Images Using Tone Mapping A.Nagurammal 1, T.Meyyappan 2 1 M. Phil Scholar

More information

Optimum Power Allocation in Cooperative Networks

Optimum Power Allocation in Cooperative Networks Optimum Power Allocation in Cooperative Networks Jaime Adeane, Miguel R.D. Rodrigues, and Ian J. Wassell Laboratory for Communication Engineering Department of Engineering University of Cambridge 5 JJ

More information

EE 382C Literature Survey. Adaptive Power Control Module in Cellular Radio System. Jianhua Gan. Abstract

EE 382C Literature Survey. Adaptive Power Control Module in Cellular Radio System. Jianhua Gan. Abstract EE 382C Literature Survey Adaptive Power Control Module in Cellular Radio System Jianhua Gan Abstract Several power control methods in cellular radio system are reviewed. Adaptive power control scheme

More information

Iterative Joint Source/Channel Decoding for JPEG2000

Iterative Joint Source/Channel Decoding for JPEG2000 Iterative Joint Source/Channel Decoding for JPEG Lingling Pu, Zhenyu Wu, Ali Bilgin, Michael W. Marcellin, and Bane Vasic Dept. of Electrical and Computer Engineering The University of Arizona, Tucson,

More information

On the Construction and Decoding of Concatenated Polar Codes

On the Construction and Decoding of Concatenated Polar Codes On the Construction and Decoding of Concatenated Polar Codes Hessam Mahdavifar, Mostafa El-Khamy, Jungwon Lee, Inyup Kang Mobile Solutions Lab, Samsung Information Systems America 4921 Directors Place,

More information

A Sliding Window PDA for Asynchronous CDMA, and a Proposal for Deliberate Asynchronicity

A Sliding Window PDA for Asynchronous CDMA, and a Proposal for Deliberate Asynchronicity 1970 IEEE TRANSACTIONS ON COMMUNICATIONS, VOL. 51, NO. 12, DECEMBER 2003 A Sliding Window PDA for Asynchronous CDMA, and a Proposal for Deliberate Asynchronicity Jie Luo, Member, IEEE, Krishna R. Pattipati,

More information

Convolutional Coding Using Booth Algorithm For Application in Wireless Communication

Convolutional Coding Using Booth Algorithm For Application in Wireless Communication Available online at www.interscience.in Convolutional Coding Using Booth Algorithm For Application in Wireless Communication Sishir Kalita, Parismita Gogoi & Kandarpa Kumar Sarma Department of Electronics

More information

Sense in Order: Channel Selection for Sensing in Cognitive Radio Networks

Sense in Order: Channel Selection for Sensing in Cognitive Radio Networks Sense in Order: Channel Selection for Sensing in Cognitive Radio Networks Ying Dai and Jie Wu Department of Computer and Information Sciences Temple University, Philadelphia, PA 19122 Email: {ying.dai,

More information

Temporal phase mask encrypted optical steganography carried by amplified spontaneous emission noise

Temporal phase mask encrypted optical steganography carried by amplified spontaneous emission noise Temporal phase mask encrypted optical steganography carried by amplified spontaneous emission noise Ben Wu, * Zhenxing Wang, Bhavin J. Shastri, Matthew P. Chang, Nicholas A. Frost, and Paul R. Prucnal

More information

Chaos based Communication System Using Reed Solomon (RS) Coding for AWGN & Rayleigh Fading Channels

Chaos based Communication System Using Reed Solomon (RS) Coding for AWGN & Rayleigh Fading Channels 2015 IJSRSET Volume 1 Issue 1 Print ISSN : 2395-1990 Online ISSN : 2394-4099 Themed Section: Engineering and Technology Chaos based Communication System Using Reed Solomon (RS) Coding for AWGN & Rayleigh

More information

DWT BASED AUDIO WATERMARKING USING ENERGY COMPARISON

DWT BASED AUDIO WATERMARKING USING ENERGY COMPARISON DWT BASED AUDIO WATERMARKING USING ENERGY COMPARISON K.Thamizhazhakan #1, S.Maheswari *2 # PG Scholar,Department of Electrical and Electronics Engineering, Kongu Engineering College,Erode-638052,India.

More information

Performance Analysis of Cooperative Communication System with a SISO system in Flat Fading Rayleigh channel

Performance Analysis of Cooperative Communication System with a SISO system in Flat Fading Rayleigh channel Performance Analysis of Cooperative Communication System with a SISO system in Flat Fading Rayleigh channel Sara Viqar 1, Shoab Ahmed 2, Zaka ul Mustafa 3 and Waleed Ejaz 4 1, 2, 3 National University

More information

BANDWIDTH-PERFORMANCE TRADEOFFS FOR A TRANSMISSION WITH CONCURRENT SIGNALS

BANDWIDTH-PERFORMANCE TRADEOFFS FOR A TRANSMISSION WITH CONCURRENT SIGNALS BANDWIDTH-PERFORMANCE TRADEOFFS FOR A TRANSMISSION WITH CONCURRENT SIGNALS Aminata A. Garba Dept. of Electrical and Computer Engineering, Carnegie Mellon University aminata@ece.cmu.edu ABSTRACT We consider

More information

EFFECTIVE CHANNEL CODING OF SERIALLY CONCATENATED ENCODERS AND CPM OVER AWGN AND RICIAN CHANNELS

EFFECTIVE CHANNEL CODING OF SERIALLY CONCATENATED ENCODERS AND CPM OVER AWGN AND RICIAN CHANNELS EFFECTIVE CHANNEL CODING OF SERIALLY CONCATENATED ENCODERS AND CPM OVER AWGN AND RICIAN CHANNELS Manjeet Singh (ms308@eng.cam.ac.uk) Ian J. Wassell (ijw24@eng.cam.ac.uk) Laboratory for Communications Engineering

More information

Joint Transmitter-Receiver Adaptive Forward-Link DS-CDMA System

Joint Transmitter-Receiver Adaptive Forward-Link DS-CDMA System # - Joint Transmitter-Receiver Adaptive orward-link D-CDMA ystem Li Gao and Tan. Wong Department of Electrical & Computer Engineering University of lorida Gainesville lorida 3-3 Abstract A joint transmitter-receiver

More information

Soft Channel Encoding; A Comparison of Algorithms for Soft Information Relaying

Soft Channel Encoding; A Comparison of Algorithms for Soft Information Relaying IWSSIP, -3 April, Vienna, Austria ISBN 978-3--38-4 Soft Channel Encoding; A Comparison of Algorithms for Soft Information Relaying Mehdi Mortazawi Molu Institute of Telecommunications Vienna University

More information

Background Dirty Paper Coding Codeword Binning Code construction Remaining problems. Information Hiding. Phil Regalia

Background Dirty Paper Coding Codeword Binning Code construction Remaining problems. Information Hiding. Phil Regalia Information Hiding Phil Regalia Department of Electrical Engineering and Computer Science Catholic University of America Washington, DC 20064 regalia@cua.edu Baltimore IEEE Signal Processing Society Chapter,

More information

Reversible data hiding based on histogram modification using S-type and Hilbert curve scanning

Reversible data hiding based on histogram modification using S-type and Hilbert curve scanning Advances in Engineering Research (AER), volume 116 International Conference on Communication and Electronic Information Engineering (CEIE 016) Reversible data hiding based on histogram modification using

More information

Fundamentals of Digital Communication

Fundamentals of Digital Communication Fundamentals of Digital Communication Network Infrastructures A.A. 2017/18 Digital communication system Analog Digital Input Signal Analog/ Digital Low Pass Filter Sampler Quantizer Source Encoder Channel

More information

Notes 15: Concatenated Codes, Turbo Codes and Iterative Processing

Notes 15: Concatenated Codes, Turbo Codes and Iterative Processing 16.548 Notes 15: Concatenated Codes, Turbo Codes and Iterative Processing Outline! Introduction " Pushing the Bounds on Channel Capacity " Theory of Iterative Decoding " Recursive Convolutional Coding

More information

Fractional Cooperation and the Max-Min Rate in a Multi-Source Cooperative Network

Fractional Cooperation and the Max-Min Rate in a Multi-Source Cooperative Network Fractional Cooperation and the Max-Min Rate in a Multi-Source Cooperative Network Ehsan Karamad and Raviraj Adve The Edward S. Rogers Sr. Department of Electrical and Computer Engineering, University of

More information

A Visual Cryptography Based Watermark Technology for Individual and Group Images

A Visual Cryptography Based Watermark Technology for Individual and Group Images A Visual Cryptography Based Watermark Technology for Individual and Group Images Azzam SLEIT (Previously, Azzam IBRAHIM) King Abdullah II School for Information Technology, University of Jordan, Amman,

More information

A HEURISTIC METHOD FOR ERROR CORRECTION IN PARALLEL PROBE-BASED STORAGE DEVICES

A HEURISTIC METHOD FOR ERROR CORRECTION IN PARALLEL PROBE-BASED STORAGE DEVICES A HEURISTIC METHOD FOR ERROR CORRECTION IN PARALLEL PROBE-BASED STORAGE DEVICES Maria Varsamou and Theodore Antonakopoulos Department of Electrical and Computers Engineering University of Patras, Rio-Patras,

More information

Decoding Distance-preserving Permutation Codes for Power-line Communications

Decoding Distance-preserving Permutation Codes for Power-line Communications Decoding Distance-preserving Permutation Codes for Power-line Communications Theo G. Swart and Hendrik C. Ferreira Department of Electrical and Electronic Engineering Science, University of Johannesburg,

More information

Local prediction based reversible watermarking framework for digital videos

Local prediction based reversible watermarking framework for digital videos Local prediction based reversible watermarking framework for digital videos J.Priyanka (M.tech.) 1 K.Chaintanya (Asst.proff,M.tech(Ph.D)) 2 M.Tech, Computer science and engineering, Acharya Nagarjuna University,

More information

Lossy Compression of Permutations

Lossy Compression of Permutations 204 IEEE International Symposium on Information Theory Lossy Compression of Permutations Da Wang EECS Dept., MIT Cambridge, MA, USA Email: dawang@mit.edu Arya Mazumdar ECE Dept., Univ. of Minnesota Twin

More information

Multi-GI Detector with Shortened and Leakage Correlation for the Chinese DTMB System. Fengkui Gong, Jianhua Ge and Yong Wang

Multi-GI Detector with Shortened and Leakage Correlation for the Chinese DTMB System. Fengkui Gong, Jianhua Ge and Yong Wang 788 IEEE Transactions on Consumer Electronics, Vol. 55, No. 4, NOVEMBER 9 Multi-GI Detector with Shortened and Leakage Correlation for the Chinese DTMB System Fengkui Gong, Jianhua Ge and Yong Wang Abstract

More information

A Simplified Downlink Transmission and Receiving Scheme for IDMA

A Simplified Downlink Transmission and Receiving Scheme for IDMA JOURNAL OF ELECTRONIC SCIENCE AND TECHNOLOGY OF CHINA, VOL. 6, NO. 3, SEPTEM 8 69 A Simplified Downlin Transmission and Receiving Scheme for IDMA Xing-Zhong Xiong and Jian-Hao Hu Abstract In this paper,

More information

Improvement Of Block Product Turbo Coding By Using A New Concept Of Soft Hamming Decoder

Improvement Of Block Product Turbo Coding By Using A New Concept Of Soft Hamming Decoder European Scientific Journal June 26 edition vol.2, No.8 ISSN: 857 788 (Print) e - ISSN 857-743 Improvement Of Block Product Turbo Coding By Using A New Concept Of Soft Hamming Decoder Alaa Ghaith, PhD

More information

Abstract. Keywords - Cognitive Radio, Bit Error Rate, Rician Fading, Reed Solomon encoding, Convolution encoding.

Abstract. Keywords - Cognitive Radio, Bit Error Rate, Rician Fading, Reed Solomon encoding, Convolution encoding. Analysing Cognitive Radio Physical Layer on BER Performance over Rician Fading Amandeep Kaur Virk, Ajay K Sharma Computer Science and Engineering Department, Dr. B.R Ambedkar National Institute of Technology,

More information

ECE 8771, Information Theory & Coding for Digital Communications Summer 2010 Syllabus & Outline (Draft 1 - May 12, 2010)

ECE 8771, Information Theory & Coding for Digital Communications Summer 2010 Syllabus & Outline (Draft 1 - May 12, 2010) ECE 8771, Information Theory & Coding for Digital Communications Summer 2010 Syllabus & Outline (Draft 1 - May 12, 2010) Instructor: Kevin Buckley, Tolentine 433a, 610-519-5658 (W), 610-519-4436 (F), buckley@ece.vill.edu,

More information

Behavior Modeling and Forensics for Multimedia Social Networks. [A case study in multimedia fingerprinting]

Behavior Modeling and Forensics for Multimedia Social Networks. [A case study in multimedia fingerprinting] [ H. Vicky Zhao, W. Sabrina Lin, and K.J. Ray Liu ] Behavior Modeling and Forensics for Multimedia Social Networks Within the past decade, Internet traffic has shifted dramatically from HTML text pages

More information

Nonlinear Multi-Error Correction Codes for Reliable MLC NAND Flash Memories Zhen Wang, Mark Karpovsky, Fellow, IEEE, and Ajay Joshi, Member, IEEE

Nonlinear Multi-Error Correction Codes for Reliable MLC NAND Flash Memories Zhen Wang, Mark Karpovsky, Fellow, IEEE, and Ajay Joshi, Member, IEEE IEEE TRANSACTIONS ON VERY LARGE SCALE INTEGRATION (VLSI) SYSTEMS, VOL. 20, NO. 7, JULY 2012 1221 Nonlinear Multi-Error Correction Codes for Reliable MLC NAND Flash Memories Zhen Wang, Mark Karpovsky, Fellow,

More information

EXIT Chart Analysis for Turbo LDS-OFDM Receivers

EXIT Chart Analysis for Turbo LDS-OFDM Receivers EXIT Chart Analysis for Turbo - Receivers Razieh Razavi, Muhammad Ali Imran and Rahim Tafazolli Centre for Communication Systems Research University of Surrey Guildford GU2 7XH, Surrey, U.K. Email:{R.Razavi,

More information

The Influence of Image Enhancement Filters on a Watermark Detection Rate Authors

The Influence of Image Enhancement Filters on a Watermark Detection Rate Authors acta graphica 194 udc 004.056.55:655.36 original scientific paper received: -09-011 accepted: 11-11-011 The Influence of Image Enhancement Filters on a Watermark Detection Rate Authors Ante Poljičak, Lidija

More information

Efficient and Robust Audio Watermarking for Content Authentication and Copyright Protection

Efficient and Robust Audio Watermarking for Content Authentication and Copyright Protection Efficient and Robust Audio Watermarking for Content Authentication and Copyright Protection Neethu V PG Scholar, Dept. of ECE, Coimbatore Institute of Technology, Coimbatore, India. R.Kalaivani Assistant

More information

Chapter 3 Convolutional Codes and Trellis Coded Modulation

Chapter 3 Convolutional Codes and Trellis Coded Modulation Chapter 3 Convolutional Codes and Trellis Coded Modulation 3. Encoder Structure and Trellis Representation 3. Systematic Convolutional Codes 3.3 Viterbi Decoding Algorithm 3.4 BCJR Decoding Algorithm 3.5

More information

Communication Theory II

Communication Theory II Communication Theory II Lecture 13: Information Theory (cont d) Ahmed Elnakib, PhD Assistant Professor, Mansoura University, Egypt March 22 th, 2015 1 o Source Code Generation Lecture Outlines Source Coding

More information

Modulation Classification based on Modified Kolmogorov-Smirnov Test

Modulation Classification based on Modified Kolmogorov-Smirnov Test Modulation Classification based on Modified Kolmogorov-Smirnov Test Ali Waqar Azim, Syed Safwan Khalid, Shafayat Abrar ENSIMAG, Institut Polytechnique de Grenoble, 38406, Grenoble, France Email: ali-waqar.azim@ensimag.grenoble-inp.fr

More information

Performance Analysis of Different Ultra Wideband Modulation Schemes in the Presence of Multipath

Performance Analysis of Different Ultra Wideband Modulation Schemes in the Presence of Multipath Application Note AN143 Nov 6, 23 Performance Analysis of Different Ultra Wideband Modulation Schemes in the Presence of Multipath Maurice Schiff, Chief Scientist, Elanix, Inc. Yasaman Bahreini, Consultant

More information