PERFORMANCE STUDY OF ECC-BASED COLLUSION-RESISTANT MULTIMEDIA FINGERPRINTING
|
|
- Naomi McKenzie
- 5 years ago
- Views:
Transcription
1 PERFORMANCE STUDY OF ECC-BASED COLLUSION-RESISTANT MULTIMEDIA FINGERPRINTING Shan He and Min Wu ECE Department, University of Maryland, College Park ABSTRACT * Digital fingerprinting is a tool to protect multimedia content from illegal redistribution by uniquely marking copies of the content distributed to each user. Fingerprinting based on error correction coding (ECC) handle the important issue of how to embed the fingerprint into host data in an abstract way known as the marking assumptions, which often do not fully account for multimedia specific issues. In this paper, we examine the performance of ECC based fingerprinting by considering both coding and embedding issues. We provide performance comparison of ECC-based scheme and a major alternative of orthogonal fingerprinting. As averaging is a feasible and cost-effective collusion attack against multimedia fingerprints yet is generally not considered in the ECC-based system, we also investigate the resistance against averaging collusion and identify avenues for improving collusion resistance. 1. INTRODUCTION Digital fingerprinting is an emerging technology to protect multimedia content from unauthorized dissemination, whereby each user s copy is identified by a unique ID embedded in his/her copy and the ID can be extracted to help identify culprits when a suspicious copy is found. A powerful, cost-effective attack from a group of users is collusion, where the users combine their copies of the same content to generate a new version. If designed improperly, the fingerprints can be weakened or removed by the collusion attacks. A growing number of techniques have been proposed in the literature to provide collusion resistance in multimedia fingerprinting systems [1]-[8]. Many of them fall in one of the two categories, namely, the orthogonal fingerprinting and coded fingerprinting. The orthogonal fingerprinting assigns each user a spread spectrum sequence as fingerprint and the sequence is mutually orthogonal to those for other users [3][4]. An early work on coded fingerprinting focused on generic data and introduced a two-level construction in code domain to resist up to c colluders with high probability [1]. This binary code was later used to modulate a direct spread spectrum sequence to embed the fingerprints in multimedia signals [2]. A q-ary ECC code resisting c The authors can be reached at {shanhe, minwu}@umd.edu. colluders, known as the c-traceability code or c-ta in short, was proposed and later extended to deal with symbol erasures contributed by noise or cropping in multimedia signal domain [6][9]. A recent code based on combinatorial design was embedded in multimedia through spread spectrum code modulation and can identify colluders through the code bits shared by them [7]. Many existing fingerprinting systems based on random code or ECC handle the embedding issues in a rather abstract level through models known as the marking assumption [1][6]. For example, it typically assumes that colluders can only change fingerprint codebits in which they have different values [1], and the colluders assemble pieces of their codes to generate a colluded version [6]. Many of these assumptions work well with generic data, but do not fully account for the unique issues when fingerprints are embedded in multimedia[8]. Colluders can manipulate fingerprinted multimedia in the signal domain, bringing changes in the code domain beyond the marking assumption. For example, the colluders may average the corresponding signal components or features from multiple copies [7][8]. Thus it is important to examine the fingerprinting performance from signal domain, taking into account coding, embedding, attack, and detection issues. We evaluate the performance of ECC-based fingerprinting in this paper with a focus on two issues. First, there is little comparison in the literature on the performance between the ECC-based coded fingerprinting and the orthogonal fingerprinting (denoted as ORTH ), where the ORTH scheme is conceptually simple and easy to implement. By incorporating embedding issues, we provide a common ground for the two types of fingerprinting and compare their performance in identifying traitors and resisting collusion. Second, we have discussed that multiuser averaging is a feasible and representative way to signal-domain collusion. While it is important for a fingerprinting system to resist averaging collusion, the current design of ECC based fingerprinting typically considers only interleaving collusion. Investigating their resistance against averaging collusion is a key step toward understanding and improving the collusion resistance of fingerprinting systems for multimedia. The paper is organized as follows. Section 2 presents the system setup of ECC-based embedded fingerprinting for multimedia. Section 3 discusses the selection of important parameters and unique issues incurred by embedding. We
2 examine in Section 4 the system performance under different scenarios and compare with the performance of the ORTH scheme. Finally conclusion is drawn in Section ECC-BASED FINGERPRINTING SYSTEM 2.1 System Framework Fingerprint encoding and embedding are two important issues for fingerprinting multimedia. We illustrate a fingerprinting system that employ an ECC based fingerprint code and spread spectrum embedding in Fig.1. The system has two layers: the outer code layer is an ECC-based traceability code of N u codewords resisting c colluders and having alphabet size q; and the inner embedding layer is for embedding each code symbol in multimedia. Fingerprinting ECC encoding (c-ta code) with alphabet size q Orthogonal modulation with q colors Fingerprinted Multimedia Channel Attacks ECC decoding (c-ta code) with alphabet size q Orthogonal demodulation with q colors Suspicious Multimedia Fig.1 Framework of ECC based fingerprinting scheme Fingerprinting We first choose an ECC code with an alphabet size of q and a large minimum distance, and assign to each user a codeword. We call each symbol from the above alphabet a color as in [2]. The design of this ECC fingerprint code will be discussed in Section 2.2. We partition the host signal into non-overlapped segments (such as frames of video or audio), where each segment is to carry one color of the fingerprint code. Within each segment, we use q mutually orthogonal spread spectrum sequences to represent the possible color values, and add one of these sequences into the segment (with perceptual scaling) according to the color value in the fingerprint code. This spread spectrum embedding technique from [10] has been shown highly robust against a variety of processings and attacks. It is also a common signal processing technique for embedding orthogonal, coded, and other correlated fingerprints [8][10]. The ORTH scheme can be regarded as a special case of ECC-based fingerprinting, which has code length 1, alphabet size N u, and uses the entire multimedia signal as one segment. Each fingerprinted segment can be modeled as yij = uij + x j (1) where u ij is the spread spectrum sequence for embedding the j-th color of the i-th user s codeword, x j is the j-th segment of host signal, and y ij is the fingerprinted segment. Then the concatenation of all fingerprinted segments forms the ultimate fingerprinted signal. Detection Collusion Attacks Interleaving collusion is considered by most ECC-based fingerprinting works. Each colluder contributes a non-overlapped set of segments and these segments are assembled together to form a colluded copy. Additional noise may be added to the multimedia signal during the collusion. As few colluders would be willing to take higher risk than others, they generally would make contributions of approximately equal amount in the collusion. We have discussed in the introduction that colluders can contribute one segment in a partial way and can perform signal domain combining that is not captured by the interleaving attack. A simple yet effective way is by averaging differently fingerprinted copies, i.e. 1 z = s + x+ d (2) i c i Sc where s i represent the fingerprint sequence for user i, S c the colluder set, c the total number of colluders, x the host signal, and d the noise term. For simplicity in analysis, we assume that the noise in interleaving and averaging collusion follows i.i.d. Gaussian distribution. Detection To identify colluders who have contributed to a suspicious copy of multimedia content, we first determine which color is present in each multimedia segment using a correlation detector commonly used for spread spectrum embedding [4][10]. If the host signal is available to detectors in fingerprinting applications, we register the suspicious copy with the host signal and subtract the host from the suspicious copy to obtain a test signal; otherwise, we use the signal itself as a test signal. We then correlate this test signal with each of the q spreading sequences, identify the sequence giving the maximum correlation, and record the corresponding color. From the sequence of colors extracted from all media segments using this maximum detector [4], we proceed to the ECC code layer and apply a decoding algorithm to identify colluders whose codewords have the most matches with the extracted color sequence. 2.2 ECC Code Layer A common practice in fingerprint code design treats the colors contributed from other colluders as errors, and makes the minimum distance between codewords large enough to tolerate the errors. The minimum distance requirement ensures that the best match with a colluded codeword (referred to as the descendant) comes from one of the true colluders. The c-ta code [11] is such an example and is defined as follows: Definition: Let Г Σ L be a code over an alphabet Σ with length L. Without loss of generality, we represent the set of c colluders as C = {u 1,..,u c } Г, where a codeword u i Г represents the i-th colluder and consists of a sequence of L colors u i = {w (i) 1, w (i) 2,..,w (i) L }. A codeword set that can descend from this colluder set is denoted as desc(c) =
3 {(x 1,..,x L ): x j {w (i) j : 1 i c}, 1 j L}. If for any descendant (x 1,..,x L ) desc(c), there is a u i C such that {j: x j = w (i) j } > {j: x j = s j } for any innocent user s codeword (s 1,..,s L ) Г \C, then Г is called c-traceability (c-ta) code. The minimum distance requirement for constructing a c- TA code under typical marking assumptions was discussed in [11], and extensions made to tolerate L e erasures [6]. We will derive conditions in Section 3 to address the unique issues incurred by embedding. 2.3 System Design Procedures We summarize the design procedure for an ECC-based multimedia fingerprinting system that aims at surviving interleaving attack. Step1: Given a multimedia signal, obtain the signal length N and determine the segment size N s. Select the alphabet size q. The value of L can be computed by L= N / Ns. Step2: For each segment, under the use of spread spectrum embedding and the maximum detector, compute the probability of correctly detecting a guilty color that is contributed from at least one colluder (denoted as P d ) and the probability of false detection of a color (denoted as P fa =1 P d ). For simplicity, we assume that such probability is identical from segment to segment. Step3: Denote the total number of extracted colors that are contributed from colluder set as N correct. Given n, we examine the probability of an event A that N correct n: L L k L k Pr ( A) = Pr ( Ncorrect n) = Pd ( 1 Pd ) k= n k (3) Step 4: The probability of correctly identifying at least one colluder, denoted as P d_all, is bounded by: Pd_ all Pr ( catch at least one colluder A) Pr ( A) (4) With n = L-L e and a c-ta code from [6] that can handle L e erasures, we ensure Pr(catch at least one colluder A)=1. To meet the minimum probability of positive detection P d_all_req that the system is designed to satisfy, it is sufficient to keep Pr(A) equal to or greater than P d_all_req. Thus with the properties of c-ta code derived in [6], we can establish a relationship between L e, P d_all_req, and the c-ta code capacity (namely, C max the maximum colluder resistance, and N u the number of codewords for representing different users). Using this relationship and for a fixed N u, we can obtain C max and the corresponding c-ta code to meet a given detection requirement P d_all_req. Alternatively, we can examine the detection probability P d_all for a c-ta code with a specific C max. 3. UNIQUE ISSUES INCURRED BY EMBEDDING Minimum Distance Requirement The distortions and attacks mounted by adversaries on fingerprinted multimedia can lead to errors in detecting fingerprint code symbols/colors. The existing work on c-ta code has extended to tolerate erasures only [6]. We note that there is nontrivial probability for false alarms in color detection, which contributes to the non-erased erroneous colors that are not contributed by any colluders. Thus we need to consider both erasure and non-erasure errors when designing fingerprint code. In the following, we extend the definition of c-ta code to account for both types of errors and develop a minimum distance requirement with a similar strategy used in [6]. As before, we consider a code Γ of length L over an alphabet Σ of size q. This code is called a c-traceability code tolerating L e erasures and L FA errors and denoted as c-ta q (L, N u ; L FA, L e ) if for any (x 1,..,x L ) X(C), there is a colluder s codeword u i C such that {j: x j = w (i) j } > {j: x j = s j } for any innocent user s codeword (s 1,..,s L ) Г \C. Here X(C) denotes the set of the codeword with no more than L e erasures and no more than L FA erroneous colors over an extended alphabet Σ {?}, where {?} is the erasure symbol. We derive the following minimum distance conditions for c-ta(l, N u ; L FA, L e ). Theorem 1 Let Γ be an (L,N u,d) q -ECC, and c an 1 c integer. If D > 1 L L FA + L 2 e (5) c c c then Γ is c-ta q (L,N u ; L e, L FA ). We can construct c-ta code using a Reed-Solomon code that satisfies the above condition. The design can be simplified by treating erasures as errors, which reflects the case of color extraction by such schemes as the maximum correlation detector described in Section 2.2. This simplification leads to the following theorem. Theorem 2 Among Reed-Solomon code with alphabet size q, there exists a c-ta q (L,N u ; L FA ) code with minimum 1 c + 1 distance D > 1 L L FA, (6) c c where the codeword number N u = q t L c+ 1 and t= L 2 2 FA c c. With these conditions, we modify the Step 4 in Section 2.3 as follows. We follow the same procedure up to choosing Pr(A) equal to or greater than P d_all_req. We then use L FA = L n in place of former L e = L n, and employ Theorem 2 to establish the relation between L FA, P d_all_req, and the c-ta code capacity (C max and N u ). We set t=2 in this paper for tolerating as many as possible colluders while accommodating a moderate number of users. We plot the relation between C max and L FA under various levels of the detection requirement P d_all_req and refer it as the System Design Figure. A point (P d_all_req, C max, L FA ) in this figure corresponds to a system that can resist up to C max colluders with a probability of at least P d_all_req if the number of falsely detected colors is no greater than L FA.
4 Choosing Alphabet Size As we use the orthogonal embedding to put a desired color in a segment of multimedia, the color detection algorithm in Section 2.1 implies that the alphabet size q of the outer code determines the computational complexity in identifying suspicious color(s) from each segment [8][10]. Furthermore, the study in [4] has suggested that fingerprinting through orthogonal modulation has a fundamental limit in the number of colluders that it can resist under averaging collusion. Thus there is a limit on the number of guilty colors that we can tolerate when the system encounters averaging collusion. The overall collusion resistance is determined by the limits from both the embedding layer and the outer code layer. In view of these limits, we select the alphabet size q on the order of several dozens for the studies in this paper. 4. PERFORMANCE EVALUATION We first compare the performance of the ECC-based fingerprinting for multimedia with that of the ORTH fingerprinting under interleaving collusion. We then examine the impact of averaging collusion, as well as the resilience toward a large group of colluders. 4.1 Comparison with ORTH Fingerprinting For a fair comparison between the ECC-based fingerprinting and the ORTH fingerprinting, we choose the same values for the targeted collusion resistance C max and the total number of users N u, and apply the two fingerprinting schemes to the same host signal. To facilitate the analysis, we use i.i.d. Gaussian sequence with length N to emulate the host signal in this paper. We design the ECC-based fingerprinting system using a Reed-Solomon code with q=2 5, L=30, N s = 1000, and N u = q 2 =1024. Fig. 2 is the System Design Figures obtained from the steps in Section 2. For watermark-to-noise ratio (WNR) of -17dB (corresponding to blind detection or severe attacks) shown in Fig. 2(a), we see that the system can resist up to 5 colluders to meet the required detection probability P d_all_req in the range of , and this is achieved with codes constructed without the need of explicitly tolerating any color detection errors (i.e. L FA =0). Further, when the system is designed to achieve P d_all_req in the range of , it can resist up to 4 colluders with codes that are constructed to explicitly tolerate one color error (L FA =1). For the case of WNR = 0dB (corresponding to non-blind detection and moderate distortions) shown in Fig. 2(b), the system can resist up to 5 colluders over a wide range of required detection probability, and the codes used do not need to explicitly tolerating color detection errors (L FA =0). For the ORTH fingerprinting, we can obtain the relationship between the required detection probability P d_orth_req and C max according to the study in [4]. Fig. 3 shows the System Design Figures for the ORTH system with the same host signal length N and the total number of users N u. These are in terms of the maximum number of colluders that the system can tolerate while meeting the required colluder detection probability P all-req. Note that owing to the employment of maximum correlation detector, the false accusation probability is 1 - P all-req. The above figures indicate that for a medium-scale host signal of tens of thousands elements and a moderate user group size of about a thousand, ORTH fingerprinting can catch much more colluders than the ECC based system at the same level of colluder detection requirement. The difference in colluder resistance is one order of magnitude in the high WNR case. Several factors contribute to this performance gap. First, the two-layer design in ECC-based fingerprinting imposes structural constraints on the signal space of fingerprints. For example, the number of colors represented by orthogonal sequences is substantially smaller than in the ORTH scheme. Second, the current decoding of ECC-based fingerprinting makes a hard decision on the color values, while the ORTH detection aggregates the contribution from each part of the multimedia signal through a correlation detector and does not make hard decision until the whole signal is processed. Our preliminary test shows that soft decoding can potentially improve the detection performance of ECC fingerprinting. Furthermore, the design conditions of (4)(5)(6) for ECC fingerprinting are stronger than necessary, leading to a conservative C max. On the other hand, we note that q orthogonal sequences of length N/L is used in ECC based system, while the ORTH system requires q t mutually orthogonal sequences of length N. This suggested that the ECC based system has the advantage of providing a more compact way of representing users and consuming less resource in terms of the orthogonal sequences. Overall, the ECC-based fingerprinting is attractive for applications that have a large number of users but a very small number of colluders at a time; and the ORTH system provides better protection for applications having a larger group of potential colluders. 4.2 Resistance Against Averaging Collusion Our second performance study is on the resistance against averaging collusion by the ECC-based fingerprinting systems that primarily target at surviving interleaving collusion. We take an ECC-based fingerprinting system designed following the aforementioned procedures with the same parameters as Section 4.1, and examine its colluder detection probability P A d_all under averaging attack. The analysis for P A d_all is similar to that for the interleaving case in the Step 3 and 4 of Section 2, except that the color detection probability P d now should be derived from averaging attack and n=l-l FA. Noticing from Section 4.1 that the original system survives 5-user interleaving collusion, we examine the performance of averaging collusion with 2 to 5 colluders. The code parameter L FA is set to 2 from the results in Section 4.1. The lower bound of P A d_all from analysis is
5 (a) (a) (a) (b) (b) (b) Fig. 2 System design figures of ECC fingerprinting at WNR = -17dB(a) and WNR = 0dB (b). Fig. 3 System design figures of ORTH scheme at WNR = -17dB (a) and WNR = 0dB (b). Fig. 4 Performance of ECC fingerprinting under averaging collusion at WNR = -17dB (a) and WNR = 0dB (b). plotted numerically in Fig.4. We can see that for very low WNR in Fig.4(a), the unexpected averaging collusion has a significant negative impact on the detection performance. The system can no longer be guaranteed to meet the colluder identification requirement P d_all_req after averaging collusion. On the other hand, for moderately high WNR as in Fig.4(b), the system can resist averaging collusion and identify colluders with probability higher than the requirement. We now use simulations of 500 runs to evaluate the actual detection performance for WNR of -17dB and 0dB, respectively. For WNR = -17dB, we choose the point of (P d_all,c max, L FA ) = (0.91,5,0) from the system design figure. This indicates that the system can achieve detection probability of at least 0.91 and tolerate up to 5 colluders under interleaving attacks. The results of interleaving and averaging collusion on this system are shown in Fig. 5, along with the results by the ORTH scheme. As we can see, the system survives interleaving attacks as it is designed for, but cannot track down colluder with desired probability under averaging collusion. The actual probability of correct detection is higher than the lower bound from our analysis shown in Fig.4, but is still below the required level. On the contrary, the result confirms that the averaging and interleaving collusions have almost identical effect on the ORTH system [8]. For WNR = 0dB, we choose a working point of (P d_all, C max, L FA ) = (0.99,5,0) from the System Design Figure. Simulation results Fig. 6 show that the system can resist both interleaving collusion and averaging collusion. The different impacts by averaging collusion on the two types of fingerprinting can be explained as follows. For every media segment in ECC fingerprinting, interleaving collusion preserves a color in its entirety, while averaging collusion reduces the power of the color from each colluder. This makes colors less likely to be correctly detected under low WNR after averaging collusion. The increased color errors will be propagated to the code level and lead to performance degradation in tracing colluders. On the other hand, ORTH scheme aggregates the correlation over the entire signal. In terms of the overall fingerprint energy for each user, averaging and interleaving collusions have approximately the same effect [8]. 4.3 Performance for Colluder Number Beyond C max We note that the system design based on Theorem 1 concerns the worst-case scenario, which may not happen often in a particular realization. To explore the ECC fingerprinting s potential in collusion resistance, we examine through simulation the performance when the colluder number becomes greater than C max and compare it with ORTH under the same collusion scenario. The result of 1000 runs, shown in Fig.7, indicates that the ORTH scheme still substantially outperform the ECC-based fingerprinting. One interesting observation is that as c increases, the resistance of ECC fingerprinting against interleaving collusion decreases quickly, but it survives averaging collusion. Our study shows that this survival is contributed in part by the inherent correlation between the codewords through shared colors at some symbol positions. After
6 (a) (a) (a) (b) (b) (b) Fig. 5 Simulation results of different schemes at WNR = -17dB under interleaving(a) and averaging collusion(b). Fig. 6 Simulation results of different schemes at WNR = 0dB under interleaving(a) and averaging collusion(b). Fig. 7 Performance with increased colluder number at WNR=0dB under interleaving(a) and averaging collusion (b). averaging collusion, the colors shared among colluders are likely to be extracted by the maximum correlation detector, and these shared colors rarely appear in the innocent user s codeword. This suggests that strategically introducing correlation between fingerprints can be equally important as introducing separations. The benefit of correlation has been demonstrated by several recent non-ecc based fingerprinting schemes [7][8]. 5. CONCLUSIONS In this paper, we have examined the performance of the ECC-based multimedia fingerprinting by taking into account both coding and embedding issues. Our studies have shown that the orthogonal fingerprinting has superb collusion resistance and can catch colluders one order of magnitude more than the ECC based system, while the ECC-based fingerprinting consumes less orthogonal spreading sequences. Regarding different types of collusions, the ECC fingerprinting systems that are intended for resisting interleaving collusion is unable to resist averaging collusion under low WNR, while it can resist both averaging and interleaving collusion under high WNR. Our studies also suggest the benefit of correlation between fingerprints constructed via ECC in combating collusions. Acknowledgement This work was supported by the Air Force Research Laboratory Grant#F and the National Science Foundation Award#CCR The authors thank Dr. Z. Jane Wang of UMD for the enlightening discussions. REFERENCES [1] D. Boneh and J. Shaw, Collusion-Secure Fingerprinting for Digital Data, IEEE Tran. on Info. Theory, 44(5), [2] Y. Yacobi, Improved Boneh-Shaw Content Fingerprinting, CT-RSA 2001, LNCS 2020, pp , [3] F.Ergun, J.Kilian and R.Kumar, A Note on the limits of Collusion-Resistant Watermarks, Eurocrypt 99, [4] Z.J. Wang, M. Wu, H. Zhao, W. Trappe, and K.J.R. Liu, Collusion Resistance of Multimedia Fingerprinting using Orthogonal Modulation, submitted to Trans. on Image Proc. [5] F. Zane, Efficient Watermark Detection and Collusion Security, FC 2000, LNCS 1962, pp , 2001 [6] R. Safavi-Naini and Y. Wang, Collusion Secure q-ary Finger-printing for Perceptual Content, Security and Privacy in Digital Rights Management (SPDRM'01), pp , [7] W. Trappe, M. Wu, Z.J. Wang and K.J.R. Liu, Anti-collusion Fingerprinting for Multimedia, IEEE Transactions on Signal Processing, vol. 51, no. 4, April [8] M. Wu, W. Trappe, Z. Wang, and K.J.R. Liu, "Collusion Resistant Fingerprinting for Multimedia", to appear in IEEE Signal Processing Magazine, [9] R. Safavi-Naini and Y. Wang, Traitor Tracing for Shortened and Corrupted Fingerprints, Digital Right Management (DRM'02), pp , [10] I. Cox, J. Kilian, F. Leighton, and T. Shamoon, Secure Spread Spectrum Watermarking for Multimedia, IEEE Trans. on Image Processing, 6(12), pp , [11] J.N. Staddon, D. R. Stinson, and R. Wei, Combinatorial Properties of Frameproof and Traceability Codes, IEEE Trans. on Information Theory, vol. 47, no. 3, March 2001.
Zero-Based Code Modulation Technique for Digital Video Fingerprinting
Zero-Based Code Modulation Technique for Digital Video Fingerprinting In Koo Kang 1, Hae-Yeoun Lee 1, Won-Young Yoo 2, and Heung-Kyu Lee 1 1 Department of EECS, Korea Advanced Institute of Science and
More informationPractical fingerprinting system for images
46 5, 057004 May 2007 Practical fingerprinting system for images Yu-Tzu Lin National Taiwan University Communications and Multimedia Laboratory Department of Computer Science and Information Engineering
More informationMULTIMEDIA content can be easily distributed over
302 IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, VOL. 4, NO. 3, SEPTEMBER 2009 Robust MC-CDMA-Based Fingerprinting Against Time-Varying Collusion Attacks Byung-Ho Cha, Student Member, IEEE,
More informationCollusion Secure Fingerprinting. CMLab
Collusion Secure Fingerprinting CMLab 2 Outline Introduction Collusion attack Collusion-resilient fingerprinting Combinatorial designed code Error correction code Orthogonal signals Research issues 3 Introduction
More informationAnti-Collusion Fingerprinting for Multimedia
Anti-Collusion Fingerprinting for Multimedia Wade Trappe, Min Wu, Zhen Wang, and K. J. Ray Liu Department of Electrical and Computer Engineering University of Maryland, College Park, MD 20742 E-mail: wxt,
More informationDigital Communications I: Modulation and Coding Course. Term Catharina Logothetis Lecture 12
Digital Communications I: Modulation and Coding Course Term 3-8 Catharina Logothetis Lecture Last time, we talked about: How decoding is performed for Convolutional codes? What is a Maximum likelihood
More informationCapacity of collusion secure fingerprinting a tradeoff between rate and efficiency
Capacity of collusion secure fingerprinting a tradeoff between rate and efficiency Gábor Tardos School of Computing Science Simon Fraser University and Rényi Institute, Budapest tardos@cs.sfu.ca Abstract
More informationFrequency-Hopped Spread-Spectrum
Chapter Frequency-Hopped Spread-Spectrum In this chapter we discuss frequency-hopped spread-spectrum. We first describe the antijam capability, then the multiple-access capability and finally the fading
More informationECE 6640 Digital Communications
ECE 6640 Digital Communications Dr. Bradley J. Bazuin Assistant Professor Department of Electrical and Computer Engineering College of Engineering and Applied Sciences Chapter 8 8. Channel Coding: Part
More informationECE 6640 Digital Communications
ECE 6640 Digital Communications Dr. Bradley J. Bazuin Assistant Professor Department of Electrical and Computer Engineering College of Engineering and Applied Sciences Chapter 8 8. Channel Coding: Part
More informationDigital Audio Watermarking With Discrete Wavelet Transform Using Fibonacci Numbers
Digital Audio Watermarking With Discrete Wavelet Transform Using Fibonacci Numbers P. Mohan Kumar 1, Dr. M. Sailaja 2 M. Tech scholar, Dept. of E.C.E, Jawaharlal Nehru Technological University Kakinada,
More informationEncryption Data in Wireless Sensor Network
Available Online at www.ijcsmc.com International Journal of Computer Science and Mobile Computing A Monthly Journal of Computer Science and Information Technology ISSN 2320 088X IMPACT FACTOR: 6.017 IJCSMC,
More informationReversible Data Hiding in Encrypted color images by Reserving Room before Encryption with LSB Method
ISSN (e): 2250 3005 Vol, 04 Issue, 10 October 2014 International Journal of Computational Engineering Research (IJCER) Reversible Data Hiding in Encrypted color images by Reserving Room before Encryption
More informationA Combinatorial Framework for Frequency Hopping Multiple Access
Fourteenth International Workshop on Algebraic and Combinatorial Coding Theory September 7 13, 2014, Svetlogorsk (Kaliningrad region), Russia pp. 271 276 A Combinatorial Framework for Frequency Hopping
More informationImproved Spread Spectrum: A New Modulation Technique for Robust Watermarking
898 IEEE TRANSACTIONS ON SIGNAL PROCESSING, VOL. 51, NO. 4, APRIL 2003 Improved Spread Spectrum: A New Modulation Technique for Robust Watermarking Henrique S. Malvar, Fellow, IEEE, and Dinei A. F. Florêncio,
More informationDepartment of Electronic Engineering FINAL YEAR PROJECT REPORT
Department of Electronic Engineering FINAL YEAR PROJECT REPORT BEngECE-2009/10-- Student Name: CHEUNG Yik Juen Student ID: Supervisor: Prof.
More informationDigital Television Lecture 5
Digital Television Lecture 5 Forward Error Correction (FEC) Åbo Akademi University Domkyrkotorget 5 Åbo 8.4. Error Correction in Transmissions Need for error correction in transmissions Loss of data during
More informationPerformance Analysis of Cognitive Radio based on Cooperative Spectrum Sensing
Performance Analysis of Cognitive Radio based on Cooperative Spectrum Sensing Sai kiran pudi 1, T. Syama Sundara 2, Dr. Nimmagadda Padmaja 3 Department of Electronics and Communication Engineering, Sree
More informationWatermarking-based Image Authentication with Recovery Capability using Halftoning and IWT
Watermarking-based Image Authentication with Recovery Capability using Halftoning and IWT Luis Rosales-Roldan, Manuel Cedillo-Hernández, Mariko Nakano-Miyatake, Héctor Pérez-Meana Postgraduate Section,
More informationIntroduction to Audio Watermarking Schemes
Introduction to Audio Watermarking Schemes N. Lazic and P. Aarabi, Communication over an Acoustic Channel Using Data Hiding Techniques, IEEE Transactions on Multimedia, Vol. 8, No. 5, October 2006 Multimedia
More informationIMPROVING AUDIO WATERMARK DETECTION USING NOISE MODELLING AND TURBO CODING
IMPROVING AUDIO WATERMARK DETECTION USING NOISE MODELLING AND TURBO CODING Nedeljko Cvejic, Tapio Seppänen MediaTeam Oulu, Information Processing Laboratory, University of Oulu P.O. Box 4500, 4STOINF,
More informationDigital Image Watermarking by Spread Spectrum method
Digital Image Watermarking by Spread Spectrum method Andreja Samčovi ović Faculty of Transport and Traffic Engineering University of Belgrade, Serbia Belgrade, november 2014. I Spread Spectrum Techniques
More informationENF ANALYSIS ON RECAPTURED AUDIO RECORDINGS
ENF ANALYSIS ON RECAPTURED AUDIO RECORDINGS Hui Su, Ravi Garg, Adi Hajj-Ahmad, and Min Wu {hsu, ravig, adiha, minwu}@umd.edu University of Maryland, College Park ABSTRACT Electric Network (ENF) based forensic
More informationAn Improved Edge Adaptive Grid Technique To Authenticate Grey Scale Images
An Improved Edge Adaptive Grid Technique To Authenticate Grey Scale Images Ishwarya.M 1, Mary shamala.l 2 M.E, Dept of CSE, IFET College of Engineering, Villupuram, TamilNadu, India 1 Associate Professor,
More informationAudio Watermark Detection Improvement by Using Noise Modelling
Audio Watermark Detection Improvement by Using Noise Modelling NEDELJKO CVEJIC, TAPIO SEPPÄNEN*, DAVID BULL Dept. of Electrical and Electronic Engineering University of Bristol Merchant Venturers Building,
More informationA Soft-Limiting Receiver Structure for Time-Hopping UWB in Multiple Access Interference
2006 IEEE Ninth International Symposium on Spread Spectrum Techniques and Applications A Soft-Limiting Receiver Structure for Time-Hopping UWB in Multiple Access Interference Norman C. Beaulieu, Fellow,
More information3432 IEEE TRANSACTIONS ON INFORMATION THEORY, VOL. 53, NO. 10, OCTOBER 2007
3432 IEEE TRANSACTIONS ON INFORMATION THEORY, VOL 53, NO 10, OCTOBER 2007 Resource Allocation for Wireless Fading Relay Channels: Max-Min Solution Yingbin Liang, Member, IEEE, Venugopal V Veeravalli, Fellow,
More informationImplementation of Reed-Solomon RS(255,239) Code
Implementation of Reed-Solomon RS(255,239) Code Maja Malenko SS. Cyril and Methodius University - Faculty of Electrical Engineering and Information Technologies Karpos II bb, PO Box 574, 1000 Skopje, Macedonia
More informationDEGRADED broadcast channels were first studied by
4296 IEEE TRANSACTIONS ON INFORMATION THEORY, VOL 54, NO 9, SEPTEMBER 2008 Optimal Transmission Strategy Explicit Capacity Region for Broadcast Z Channels Bike Xie, Student Member, IEEE, Miguel Griot,
More informationREVIEW OF COOPERATIVE SCHEMES BASED ON DISTRIBUTED CODING STRATEGY
INTERNATIONAL JOURNAL OF RESEARCH IN COMPUTER APPLICATIONS AND ROBOTICS ISSN 2320-7345 REVIEW OF COOPERATIVE SCHEMES BASED ON DISTRIBUTED CODING STRATEGY P. Suresh Kumar 1, A. Deepika 2 1 Assistant Professor,
More informationPerformance of Combined Error Correction and Error Detection for very Short Block Length Codes
Performance of Combined Error Correction and Error Detection for very Short Block Length Codes Matthias Breuninger and Joachim Speidel Institute of Telecommunications, University of Stuttgart Pfaffenwaldring
More informationStudy of Turbo Coded OFDM over Fading Channel
International Journal of Engineering Research and Development e-issn: 2278-067X, p-issn: 2278-800X, www.ijerd.com Volume 3, Issue 2 (August 2012), PP. 54-58 Study of Turbo Coded OFDM over Fading Channel
More informationImplementation of a Visible Watermarking in a Secure Still Digital Camera Using VLSI Design
2009 nternational Symposium on Computing, Communication, and Control (SCCC 2009) Proc.of CST vol.1 (2011) (2011) ACST Press, Singapore mplementation of a Visible Watermarking in a Secure Still Digital
More informationJamming Mitigation Based on Coded Message-Driven Frequency Hopping
Jamming Mitigation Based on Coded Message-Driven Frequency Hopping Huahui Wang and Tongtong Li Department of Electrical & Computer Engineering Michigan State University, East Lansing, Michigan 48824, USA
More informationTCM-coded OFDM assisted by ANN in Wireless Channels
1 Aradhana Misra & 2 Kandarpa Kumar Sarma Dept. of Electronics and Communication Technology Gauhati University Guwahati-781014. Assam, India Email: aradhana66@yahoo.co.in, kandarpaks@gmail.com Abstract
More informationInternational Journal of Digital Application & Contemporary research Website: (Volume 1, Issue 7, February 2013)
Performance Analysis of OFDM under DWT, DCT based Image Processing Anshul Soni soni.anshulec14@gmail.com Ashok Chandra Tiwari Abstract In this paper, the performance of conventional discrete cosine transform
More informationMethod to Improve Watermark Reliability. Adam Brickman. EE381K - Multidimensional Signal Processing. May 08, 2003 ABSTRACT
Method to Improve Watermark Reliability Adam Brickman EE381K - Multidimensional Signal Processing May 08, 2003 ABSTRACT This paper presents a methodology for increasing audio watermark robustness. The
More informationMULTILEVEL CODING (MLC) with multistage decoding
350 IEEE TRANSACTIONS ON COMMUNICATIONS, VOL. 52, NO. 3, MARCH 2004 Power- and Bandwidth-Efficient Communications Using LDPC Codes Piraporn Limpaphayom, Student Member, IEEE, and Kim A. Winick, Senior
More informationMATHEMATICS IN COMMUNICATIONS: INTRODUCTION TO CODING. A Public Lecture to the Uganda Mathematics Society
Abstract MATHEMATICS IN COMMUNICATIONS: INTRODUCTION TO CODING A Public Lecture to the Uganda Mathematics Society F F Tusubira, PhD, MUIPE, MIEE, REng, CEng Mathematical theory and techniques play a vital
More informationEnhancement of Speech Signal Based on Improved Minima Controlled Recursive Averaging and Independent Component Analysis
Enhancement of Speech Signal Based on Improved Minima Controlled Recursive Averaging and Independent Component Analysis Mohini Avatade & S.L. Sahare Electronics & Telecommunication Department, Cummins
More informationDigital Watermarking Using Homogeneity in Image
Digital Watermarking Using Homogeneity in Image S. K. Mitra, M. K. Kundu, C. A. Murthy, B. B. Bhattacharya and T. Acharya Dhirubhai Ambani Institute of Information and Communication Technology Gandhinagar
More informationOptimal Power Allocation over Fading Channels with Stringent Delay Constraints
1 Optimal Power Allocation over Fading Channels with Stringent Delay Constraints Xiangheng Liu Andrea Goldsmith Dept. of Electrical Engineering, Stanford University Email: liuxh,andrea@wsl.stanford.edu
More informationSound Quality Evaluation for Audio Watermarking Based on Phase Shift Keying Using BCH Code
IEICE TRANS. INF. & SYST., VOL.E98 D, NO.1 JANUARY 2015 89 LETTER Special Section on Enriched Multimedia Sound Quality Evaluation for Audio Watermarking Based on Phase Shift Keying Using BCH Code Harumi
More informationTWO ALGORITHMS IN DIGITAL AUDIO STEGANOGRAPHY USING QUANTIZED FREQUENCY DOMAIN EMBEDDING AND REVERSIBLE INTEGER TRANSFORMS
TWO ALGORITHMS IN DIGITAL AUDIO STEGANOGRAPHY USING QUANTIZED FREQUENCY DOMAIN EMBEDDING AND REVERSIBLE INTEGER TRANSFORMS Sos S. Agaian 1, David Akopian 1 and Sunil A. D Souza 1 1Non-linear Signal Processing
More informationCapacity-Achieving Rateless Polar Codes
Capacity-Achieving Rateless Polar Codes arxiv:1508.03112v1 [cs.it] 13 Aug 2015 Bin Li, David Tse, Kai Chen, and Hui Shen August 14, 2015 Abstract A rateless coding scheme transmits incrementally more and
More informationQuantization Index Modulation: A Class of Provably Good Methods for Digital Watermarking and Information Embedding
IEEE TRANSACTION ON INFORMATION THEORY, VOL. 47, NO. 4, MAY 2001 1423 Quantization Index Modulation: A Class of Provably Good Methods for Digital Watermarking and Information Embedding Brian Chen, Member,
More informationThe Capability of Error Correction for Burst-noise Channels Using Error Estimating Code
The Capability of Error Correction for Burst-noise Channels Using Error Estimating Code Yaoyu Wang Nanjing University yaoyu.wang.nju@gmail.com June 10, 2016 Yaoyu Wang (NJU) Error correction with EEC June
More informationScale estimation in two-band filter attacks on QIM watermarks
Scale estimation in two-band filter attacks on QM watermarks Jinshen Wang a,b, vo D. Shterev a, and Reginald L. Lagendijk a a Delft University of Technology, 8 CD Delft, etherlands; b anjing University
More informationORTHOGONAL frequency division multiplexing (OFDM)
IEEE TRANSACTIONS ON BROADCASTING, VOL. 50, NO. 3, SEPTEMBER 2004 335 Modified Selected Mapping Technique for PAPR Reduction of Coded OFDM Signal Seung Hee Han, Student Member, IEEE, and Jae Hong Lee,
More informationMultilevel RS/Convolutional Concatenated Coded QAM for Hybrid IBOC-AM Broadcasting
IEEE TRANSACTIONS ON BROADCASTING, VOL. 46, NO. 1, MARCH 2000 49 Multilevel RS/Convolutional Concatenated Coded QAM for Hybrid IBOC-AM Broadcasting Sae-Young Chung and Hui-Ling Lou Abstract Bandwidth efficient
More informationPhysical-Layer Network Coding Using GF(q) Forward Error Correction Codes
Physical-Layer Network Coding Using GF(q) Forward Error Correction Codes Weimin Liu, Rui Yang, and Philip Pietraski InterDigital Communications, LLC. King of Prussia, PA, and Melville, NY, USA Abstract
More informationNoncoherent Demodulation for Cooperative Diversity in Wireless Systems
Noncoherent Demodulation for Cooperative Diversity in Wireless Systems Deqiang Chen and J. Nicholas Laneman Department of Electrical Engineering University of Notre Dame Notre Dame IN 46556 Email: {dchen
More informationTrellis-Coded-Modulation-OFDMA for Spectrum Sharing in Cognitive Environment
Trellis-Coded-Modulation-OFDMA for Spectrum Sharing in Cognitive Environment Nader Mokari Department of ECE Tarbiat Modares University Tehran, Iran Keivan Navaie School of Electronic & Electrical Eng.
More informationOPPORTUNISTIC ALOHA AND CROSS LAYER DESIGN FOR SENSOR NETWORKS. Parvathinathan Venkitasubramaniam, Srihari Adireddy and Lang Tong
OPPORTUNISTIC ALOHA AND CROSS LAYER DESIGN FOR SENSOR NETWORKS Parvathinathan Venkitasubramaniam Srihari Adireddy and Lang Tong School of Electrical and Computer Engineering Cornell University Ithaca NY
More informationSpatial Correlation Effects on Channel Estimation of UCA-MIMO Receivers
11 International Conference on Communication Engineering and Networks IPCSIT vol.19 (11) (11) IACSIT Press, Singapore Spatial Correlation Effects on Channel Estimation of UCA-MIMO Receivers M. A. Mangoud
More informationAn Iterative Noncoherent Relay Receiver for the Two-way Relay Channel
An Iterative Noncoherent Relay Receiver for the Two-way Relay Channel Terry Ferrett 1 Matthew Valenti 1 Don Torrieri 2 1 West Virginia University 2 U.S. Army Research Laboratory June 12th, 2013 1 / 26
More informationThe Z Channel. Nihar Jindal Department of Electrical Engineering Stanford University, Stanford, CA
The Z Channel Sriram Vishwanath Dept. of Elec. and Computer Engg. Univ. of Texas at Austin, Austin, TX E-mail : sriram@ece.utexas.edu Nihar Jindal Department of Electrical Engineering Stanford University,
More informationHigh capacity robust audio watermarking scheme based on DWT transform
High capacity robust audio watermarking scheme based on DWT transform Davod Zangene * (Sama technical and vocational training college, Islamic Azad University, Mahshahr Branch, Mahshahr, Iran) davodzangene@mail.com
More informationA Scheme for Digital Audio Watermarking Using Empirical Mode Decomposition with IMF
International Journal of Research Studies in Science, Engineering and Technology Volume 1, Issue 7, October 2014, PP 7-12 ISSN 2349-4751 (Print) & ISSN 2349-476X (Online) A Scheme for Digital Audio Watermarking
More informationPerformance Study on Multimedia Fingerprinting Employing Traceability Codes
Performane Study on Multimedia Fingerprinting Employing Traeability Codes Shan He and Min Wu University of Maryland, College Park, U.S.A. Abstrat. Digital fingerprinting is a tool to protet multimedia
More informationLossless Image Watermarking for HDR Images Using Tone Mapping
IJCSNS International Journal of Computer Science and Network Security, VOL.13 No.5, May 2013 113 Lossless Image Watermarking for HDR Images Using Tone Mapping A.Nagurammal 1, T.Meyyappan 2 1 M. Phil Scholar
More informationOptimum Power Allocation in Cooperative Networks
Optimum Power Allocation in Cooperative Networks Jaime Adeane, Miguel R.D. Rodrigues, and Ian J. Wassell Laboratory for Communication Engineering Department of Engineering University of Cambridge 5 JJ
More informationEE 382C Literature Survey. Adaptive Power Control Module in Cellular Radio System. Jianhua Gan. Abstract
EE 382C Literature Survey Adaptive Power Control Module in Cellular Radio System Jianhua Gan Abstract Several power control methods in cellular radio system are reviewed. Adaptive power control scheme
More informationIterative Joint Source/Channel Decoding for JPEG2000
Iterative Joint Source/Channel Decoding for JPEG Lingling Pu, Zhenyu Wu, Ali Bilgin, Michael W. Marcellin, and Bane Vasic Dept. of Electrical and Computer Engineering The University of Arizona, Tucson,
More informationOn the Construction and Decoding of Concatenated Polar Codes
On the Construction and Decoding of Concatenated Polar Codes Hessam Mahdavifar, Mostafa El-Khamy, Jungwon Lee, Inyup Kang Mobile Solutions Lab, Samsung Information Systems America 4921 Directors Place,
More informationA Sliding Window PDA for Asynchronous CDMA, and a Proposal for Deliberate Asynchronicity
1970 IEEE TRANSACTIONS ON COMMUNICATIONS, VOL. 51, NO. 12, DECEMBER 2003 A Sliding Window PDA for Asynchronous CDMA, and a Proposal for Deliberate Asynchronicity Jie Luo, Member, IEEE, Krishna R. Pattipati,
More informationConvolutional Coding Using Booth Algorithm For Application in Wireless Communication
Available online at www.interscience.in Convolutional Coding Using Booth Algorithm For Application in Wireless Communication Sishir Kalita, Parismita Gogoi & Kandarpa Kumar Sarma Department of Electronics
More informationSense in Order: Channel Selection for Sensing in Cognitive Radio Networks
Sense in Order: Channel Selection for Sensing in Cognitive Radio Networks Ying Dai and Jie Wu Department of Computer and Information Sciences Temple University, Philadelphia, PA 19122 Email: {ying.dai,
More informationTemporal phase mask encrypted optical steganography carried by amplified spontaneous emission noise
Temporal phase mask encrypted optical steganography carried by amplified spontaneous emission noise Ben Wu, * Zhenxing Wang, Bhavin J. Shastri, Matthew P. Chang, Nicholas A. Frost, and Paul R. Prucnal
More informationChaos based Communication System Using Reed Solomon (RS) Coding for AWGN & Rayleigh Fading Channels
2015 IJSRSET Volume 1 Issue 1 Print ISSN : 2395-1990 Online ISSN : 2394-4099 Themed Section: Engineering and Technology Chaos based Communication System Using Reed Solomon (RS) Coding for AWGN & Rayleigh
More informationDWT BASED AUDIO WATERMARKING USING ENERGY COMPARISON
DWT BASED AUDIO WATERMARKING USING ENERGY COMPARISON K.Thamizhazhakan #1, S.Maheswari *2 # PG Scholar,Department of Electrical and Electronics Engineering, Kongu Engineering College,Erode-638052,India.
More informationPerformance Analysis of Cooperative Communication System with a SISO system in Flat Fading Rayleigh channel
Performance Analysis of Cooperative Communication System with a SISO system in Flat Fading Rayleigh channel Sara Viqar 1, Shoab Ahmed 2, Zaka ul Mustafa 3 and Waleed Ejaz 4 1, 2, 3 National University
More informationBANDWIDTH-PERFORMANCE TRADEOFFS FOR A TRANSMISSION WITH CONCURRENT SIGNALS
BANDWIDTH-PERFORMANCE TRADEOFFS FOR A TRANSMISSION WITH CONCURRENT SIGNALS Aminata A. Garba Dept. of Electrical and Computer Engineering, Carnegie Mellon University aminata@ece.cmu.edu ABSTRACT We consider
More informationEFFECTIVE CHANNEL CODING OF SERIALLY CONCATENATED ENCODERS AND CPM OVER AWGN AND RICIAN CHANNELS
EFFECTIVE CHANNEL CODING OF SERIALLY CONCATENATED ENCODERS AND CPM OVER AWGN AND RICIAN CHANNELS Manjeet Singh (ms308@eng.cam.ac.uk) Ian J. Wassell (ijw24@eng.cam.ac.uk) Laboratory for Communications Engineering
More informationJoint Transmitter-Receiver Adaptive Forward-Link DS-CDMA System
# - Joint Transmitter-Receiver Adaptive orward-link D-CDMA ystem Li Gao and Tan. Wong Department of Electrical & Computer Engineering University of lorida Gainesville lorida 3-3 Abstract A joint transmitter-receiver
More informationSoft Channel Encoding; A Comparison of Algorithms for Soft Information Relaying
IWSSIP, -3 April, Vienna, Austria ISBN 978-3--38-4 Soft Channel Encoding; A Comparison of Algorithms for Soft Information Relaying Mehdi Mortazawi Molu Institute of Telecommunications Vienna University
More informationBackground Dirty Paper Coding Codeword Binning Code construction Remaining problems. Information Hiding. Phil Regalia
Information Hiding Phil Regalia Department of Electrical Engineering and Computer Science Catholic University of America Washington, DC 20064 regalia@cua.edu Baltimore IEEE Signal Processing Society Chapter,
More informationReversible data hiding based on histogram modification using S-type and Hilbert curve scanning
Advances in Engineering Research (AER), volume 116 International Conference on Communication and Electronic Information Engineering (CEIE 016) Reversible data hiding based on histogram modification using
More informationFundamentals of Digital Communication
Fundamentals of Digital Communication Network Infrastructures A.A. 2017/18 Digital communication system Analog Digital Input Signal Analog/ Digital Low Pass Filter Sampler Quantizer Source Encoder Channel
More informationNotes 15: Concatenated Codes, Turbo Codes and Iterative Processing
16.548 Notes 15: Concatenated Codes, Turbo Codes and Iterative Processing Outline! Introduction " Pushing the Bounds on Channel Capacity " Theory of Iterative Decoding " Recursive Convolutional Coding
More informationFractional Cooperation and the Max-Min Rate in a Multi-Source Cooperative Network
Fractional Cooperation and the Max-Min Rate in a Multi-Source Cooperative Network Ehsan Karamad and Raviraj Adve The Edward S. Rogers Sr. Department of Electrical and Computer Engineering, University of
More informationA Visual Cryptography Based Watermark Technology for Individual and Group Images
A Visual Cryptography Based Watermark Technology for Individual and Group Images Azzam SLEIT (Previously, Azzam IBRAHIM) King Abdullah II School for Information Technology, University of Jordan, Amman,
More informationA HEURISTIC METHOD FOR ERROR CORRECTION IN PARALLEL PROBE-BASED STORAGE DEVICES
A HEURISTIC METHOD FOR ERROR CORRECTION IN PARALLEL PROBE-BASED STORAGE DEVICES Maria Varsamou and Theodore Antonakopoulos Department of Electrical and Computers Engineering University of Patras, Rio-Patras,
More informationDecoding Distance-preserving Permutation Codes for Power-line Communications
Decoding Distance-preserving Permutation Codes for Power-line Communications Theo G. Swart and Hendrik C. Ferreira Department of Electrical and Electronic Engineering Science, University of Johannesburg,
More informationLocal prediction based reversible watermarking framework for digital videos
Local prediction based reversible watermarking framework for digital videos J.Priyanka (M.tech.) 1 K.Chaintanya (Asst.proff,M.tech(Ph.D)) 2 M.Tech, Computer science and engineering, Acharya Nagarjuna University,
More informationLossy Compression of Permutations
204 IEEE International Symposium on Information Theory Lossy Compression of Permutations Da Wang EECS Dept., MIT Cambridge, MA, USA Email: dawang@mit.edu Arya Mazumdar ECE Dept., Univ. of Minnesota Twin
More informationMulti-GI Detector with Shortened and Leakage Correlation for the Chinese DTMB System. Fengkui Gong, Jianhua Ge and Yong Wang
788 IEEE Transactions on Consumer Electronics, Vol. 55, No. 4, NOVEMBER 9 Multi-GI Detector with Shortened and Leakage Correlation for the Chinese DTMB System Fengkui Gong, Jianhua Ge and Yong Wang Abstract
More informationA Simplified Downlink Transmission and Receiving Scheme for IDMA
JOURNAL OF ELECTRONIC SCIENCE AND TECHNOLOGY OF CHINA, VOL. 6, NO. 3, SEPTEM 8 69 A Simplified Downlin Transmission and Receiving Scheme for IDMA Xing-Zhong Xiong and Jian-Hao Hu Abstract In this paper,
More informationImprovement Of Block Product Turbo Coding By Using A New Concept Of Soft Hamming Decoder
European Scientific Journal June 26 edition vol.2, No.8 ISSN: 857 788 (Print) e - ISSN 857-743 Improvement Of Block Product Turbo Coding By Using A New Concept Of Soft Hamming Decoder Alaa Ghaith, PhD
More informationAbstract. Keywords - Cognitive Radio, Bit Error Rate, Rician Fading, Reed Solomon encoding, Convolution encoding.
Analysing Cognitive Radio Physical Layer on BER Performance over Rician Fading Amandeep Kaur Virk, Ajay K Sharma Computer Science and Engineering Department, Dr. B.R Ambedkar National Institute of Technology,
More informationECE 8771, Information Theory & Coding for Digital Communications Summer 2010 Syllabus & Outline (Draft 1 - May 12, 2010)
ECE 8771, Information Theory & Coding for Digital Communications Summer 2010 Syllabus & Outline (Draft 1 - May 12, 2010) Instructor: Kevin Buckley, Tolentine 433a, 610-519-5658 (W), 610-519-4436 (F), buckley@ece.vill.edu,
More informationBehavior Modeling and Forensics for Multimedia Social Networks. [A case study in multimedia fingerprinting]
[ H. Vicky Zhao, W. Sabrina Lin, and K.J. Ray Liu ] Behavior Modeling and Forensics for Multimedia Social Networks Within the past decade, Internet traffic has shifted dramatically from HTML text pages
More informationNonlinear Multi-Error Correction Codes for Reliable MLC NAND Flash Memories Zhen Wang, Mark Karpovsky, Fellow, IEEE, and Ajay Joshi, Member, IEEE
IEEE TRANSACTIONS ON VERY LARGE SCALE INTEGRATION (VLSI) SYSTEMS, VOL. 20, NO. 7, JULY 2012 1221 Nonlinear Multi-Error Correction Codes for Reliable MLC NAND Flash Memories Zhen Wang, Mark Karpovsky, Fellow,
More informationEXIT Chart Analysis for Turbo LDS-OFDM Receivers
EXIT Chart Analysis for Turbo - Receivers Razieh Razavi, Muhammad Ali Imran and Rahim Tafazolli Centre for Communication Systems Research University of Surrey Guildford GU2 7XH, Surrey, U.K. Email:{R.Razavi,
More informationThe Influence of Image Enhancement Filters on a Watermark Detection Rate Authors
acta graphica 194 udc 004.056.55:655.36 original scientific paper received: -09-011 accepted: 11-11-011 The Influence of Image Enhancement Filters on a Watermark Detection Rate Authors Ante Poljičak, Lidija
More informationEfficient and Robust Audio Watermarking for Content Authentication and Copyright Protection
Efficient and Robust Audio Watermarking for Content Authentication and Copyright Protection Neethu V PG Scholar, Dept. of ECE, Coimbatore Institute of Technology, Coimbatore, India. R.Kalaivani Assistant
More informationChapter 3 Convolutional Codes and Trellis Coded Modulation
Chapter 3 Convolutional Codes and Trellis Coded Modulation 3. Encoder Structure and Trellis Representation 3. Systematic Convolutional Codes 3.3 Viterbi Decoding Algorithm 3.4 BCJR Decoding Algorithm 3.5
More informationCommunication Theory II
Communication Theory II Lecture 13: Information Theory (cont d) Ahmed Elnakib, PhD Assistant Professor, Mansoura University, Egypt March 22 th, 2015 1 o Source Code Generation Lecture Outlines Source Coding
More informationModulation Classification based on Modified Kolmogorov-Smirnov Test
Modulation Classification based on Modified Kolmogorov-Smirnov Test Ali Waqar Azim, Syed Safwan Khalid, Shafayat Abrar ENSIMAG, Institut Polytechnique de Grenoble, 38406, Grenoble, France Email: ali-waqar.azim@ensimag.grenoble-inp.fr
More informationPerformance Analysis of Different Ultra Wideband Modulation Schemes in the Presence of Multipath
Application Note AN143 Nov 6, 23 Performance Analysis of Different Ultra Wideband Modulation Schemes in the Presence of Multipath Maurice Schiff, Chief Scientist, Elanix, Inc. Yasaman Bahreini, Consultant
More information