Zero-Based Code Modulation Technique for Digital Video Fingerprinting

Size: px
Start display at page:

Download "Zero-Based Code Modulation Technique for Digital Video Fingerprinting"

Transcription

1 Zero-Based Code Modulation Technique for Digital Video Fingerprinting In Koo Kang 1, Hae-Yeoun Lee 1, Won-Young Yoo 2, and Heung-Kyu Lee 1 1 Department of EECS, Korea Advanced Institute of Science and Technology, Guseong-dong, Yuseong-Gu, Deajeon, Korea (Republic of) ikkang@mmc.kaist.ac.kr 2 Digital Contents Research Division, Electronics and Telecommunications Research Institute, 161 Gajeong-dong, Yuseong-gu, Daejeon, , Korea zero2@etri.re.kr Abstract. Digital fingerprinting is a technique to protect digital contents from illegal reproduction and redistribution by marking unique information for individual user. A powerful but simple attack to diminish fingerprint signals is averaging. While several fingerprinting schemes against collusion attacks were proposed, they often do not fully account for multimedia data. In this paper, we propose a zero-based code modulation method which fully reflects marking assumption concept to embedding and detection of signals and anti-collusion code working mechanism as well. By manipulating 0-bit information of binary codes, detection accuracy and code separation under averaging attacks were enhanced. To demonstrate our method, we used an averaging-resilient fingerprint code based on GD-PBIBD theory and applied it video fingerprinting systems. Through the experimental results, we convince our method improves averaging resiliency of fingerprinting systems. 1 Introduction Digital fingerprinting is a copyright protection technique that traces illegal distributions of copyrighted contents. A unique fingerprint code that identifies a recipient is inserted into host contents. When copies of the content are found from illegal routes, the content seller can identify traitors who had distributed the content by extracting the embedded fingerprint code. This technique can be employed as a part system in DRM applications [1]. Averaging attack is a serious problem in digital fingerprinting applications. The averaging attack is an attempt to remove the inserted fingerprints by averaging several copies of the content. There are two main categories for averaging attack-resistant fingerprinting techniques. One is orthogonal modulation fingerprinting techniques; each user is assigned a spread spectrum sequence which is mutually orthogonal to each other as a fingerprint. The other approach is known as coded modulation methods that use collusionresistant fingerprint codes. Boneh et al. introduced a code working concept named Frame-proof code that prevents false alarm of recipients who did not join in averaging attacks up to c colluders [2]. Trappe presented a fingerprinting architecture that adopted the frame-proof idea using BIBD (Balanced Incomplete Block Design) R. Khosla et al. (Eds.): KES 2005, LNAI 3683, pp , Springer-Verlag Berlin Heidelberg 2005

2 Zero-Based Code Modulation Technique for Digital Video Fingerprinting 1109 theory [3]. Most of coded modulation methods are working based on marking assumption which assuming colluders can only change fingerprint code bits in which they have different values [2]. Since most of existing coded modulation works focus on generic data, they do not explore special properties of multimedia data for fingerprint system design. In this paper, we propose a zero-based code modulation method against the averaging attack, which fully reflects the marking assumption to multimedia data. Our method modulates only 0 bit information in fingerprint code so that signal interruptions and signal strength diminution were eliminated. Our experimental results show the proposed method can efficiently embed and detect the fingerprints under averaging attacks along with multimedia data. This paper organized as follows. Section 2 addresses major features of orthogonal modulation methods and coded modulation methods to figure out their problems. In section 3, we describe our fingerprint code scheme and propose the zero-based code modulation method. Its effectiveness is demonstrated in Section 4 through experiments and conclusion is presented in Section 5. 2 Previous Fingerprinting Schemes 2.1 Orthogonal Modulation Method Orthogonal modulation approach is a straightforward method for digital fingerprinting. In this method, N orthogonal signals are used to accommodate N users, i.e. a mutually orthogonal signal is assigned to each user as a fingerprint. To decide the content owner or to trace colluders who made illegal copies, the same number of correlation as the number of users is required so that the detection complexity is high. An additional drawback is that when the number of contents involved in the averaging attack increases, the strength of orthogonal signals is attenuated deservedly so that the detector cannot correctly trace colluders. Assume that correlation is used as a detection statistics and M users join to the coalition to make illegal copy V. The signal of each user is orthogonal so that correlation values will be decreased in inversely proportional to the number of colluders M as follows. 1 1 L. C. = W[] i V[], i wherev = Cj. N M M (1) 1 = Wi [] Ci [] j NM This shows a limitation of detector when orthogonal signals are averaged and we can expect when the large number of users joins to make illegal copies, orthogonal modulation scheme will fail to retrieve colluders successfully. More detail study is well-defined in [4]. 2.2 Coded Modulation Method The coded modulation method was designed to accommodate more users than that of orthogonal method with the same amount of signals. Trappe proposed a representative coded modulation method [3]. The binary fingerprint codes derived from BIBD

3 1110 In Koo Kang et al. theory serve up to c-user averaging resistance. Averaging of up to c codes results in a unique code which can identify all codes associated with the averaging. A fingerprint signal for one user is composed of code bits and orthogonal signals as follows. w j = M i= 1 where b ij are {±1}, which is multiplied by u i according to i-th bit of j-th user code and u i are orthogonal signals for i-th bit position. At the detector, b ij are determined by correlation between w j and u i with a threshold value. When several fingerprint codes are averaged, the detected code is a bit-wise logical AND of those fingerprint codes. By comparing bit positions where the value is 1 in averaged code with a code book, the detector can find out which codes are involved in the alliance. One problem of this method is a difficulty to decide a threshold value. What the detector would concern is magnitudes of detected values. Let suppose 7 users join to the averaging; one code begins with (0,1, ) and all the others begin with (1,1, ), respectively. In order to trace colluders correctly, the colluded code should be recognized as (0,1, ) for the first two bits. However, extracted results could be different from the theoretical result in blind detection. As shown in Fig. 3, some correlation results for the first bit represent bigger values than that of second bit, and that means detector cannot decide the constant threshold value to separate two groups. Mess of correlation points results in incorrect binary result codes and detector will deservedly report innocent users as pirates. For this reason, the embedding method of equation 2 may not guarantee the marking assumption; the main working mechanism of averaging-resilient fingerprint code. b ij u i (2) 3 Zero-Based Code Modulation Technique 3.1 Anti-collusion Fingerprint Code and Embedding Anti-collusion fingerprint codes have a resiliency property for averaging attacks. Averaging attack on anti-collusion codes assumes that the result code is bitwise AND operation of those codes [3]; if at least one 0 is included in the codes at same bit positions, the result code bit at that position should be 0 no matter how many 1s are included in other codes. We used ( v, b, r, k, λ 1, λ2) GD-PBIBD (Group Divisible Partially Balanced Incomplete Block Design) theory to generate our test code for averaging attack-resiliency [5][6]. In ( v, b, r, k, λ 1, λ2 ) GD-PBIBD codes, the k indicates the number of 0s in a v-length code and also means the number of patterns to be embedded in our scheme. The k should be a smaller number than v [6] and that means our code modulation method is more efficient than that of conventional coded modulation method. For tests, we adopted (72,81,9,8,0,1) GD-PBIBD. The length of each fingerprint code is 72 bits and total 81 users can have a unique fingerprint code; each fingerprint code has bit 0s at different positions each other. This code scheme can trace up to 7 users when they deliver averaging attacks with their own codes. In a proposed scheme, the embedder modulates only 0 bit information in codes to fingerprint signals and inserts them to a host data. By utilizing only 0 bit information

4 Zero-Based Code Modulation Technique for Digital Video Fingerprinting 1111 in codes, the embedder handles only core factors of colluder tracing mechanism and the marking assumption. The way of M bits-length fingerprint code modulation is depicted in Fig. 1 and we embedded those signals to host data using commonly used spread spectrum embedding method [7]. Fig. 1. Zero-Based Code Modulation 3.2 Detection Process The detection steps are composed of three stages; estimation of fingerprint signals, examination of fingerprint codes and tracing of pirates. At the estimation step, the detector extracts expected noise-like fingerprint signals from corrupted contents. Because noise-like orthogonal signals are added to original contents, some noise-pass filters are available. At the next step, our detector examines which indexes patterns are embedded in the estimated pattern through a normalized correlation strategy [7] as depicted in Algorithm 1. Since our fingerprint code has fixed number of 0 bit information, k, what the detector has to know is indexes of embedded signals. In case of the number of 0s are over the number k, the content must have been attacked by the way of averaging because the codes cannot have k number of 0 bits at exactly same positions. At the final step, we can find out the pirates by examining the fingerprint code book and the result code. The colluder tracing method is the same way as that of conventional system [3]. 1. Initialize result code bits R 1, R 2,..., R M to 1 2. For estimated signals E 1, E 2,...E K and detector generated signals S 1, S 2,..., S M - calculate correlation between E i and S j (1 I K, 1 j M) - if correlation > threshold then set R j to 0 and resume correlation between E i and S j+1 - else if correlation < threshold then resume correlation between E i and S j+1 Algorithm 1. Fingerprint detection and code decoding 4 Experimental Performance 4.1 Code Separation Experiments We will show experiments of detection value separations and results. This experiment is aimed to see how well the detection values are separated because the reason marking assumption does not work on multimedia is due to unclear separation of detected values. For this purpose, we made a fake code to demonstrate the worst cases of averaging attacks as shown in Fig 2. In a case of 0 bit detection tests, only one, among n

5 1112 In Koo Kang et al. bits at the same bit position in n codes, has a bit 0 and the others have 1. Theoretically, all bits of averaged code are 0. We illustrated detection results of both systems in Fig 3. In (a), (c) and (e), we can see the detected values are getting blended up as the number of collusion increases. This situation happens because as the signals for bit 1are increased in equation 2, the linear correlation values are also increased. However in the proposed scheme, correlation points are clearly divided into two groups and the threshold can be easily determined. Even though detected values for bit 0 are decreased as collusions are increased, we can see two obvious partitions even in 7 collusion case. Therefore, our proposed scheme enhances code detection capabilities to decode the averaged code and to capture the colluders who delivered averaging attacks on multimedia data. Test code for bit 1 detection for a 7 averaging attack (7 codes of 72 bits) user 1~n : 1,1,1,1,1,1,...,1,1,1,1,1,1 Test codes for bit 0 detection for a 7 averaging attack (7 codes of 72 bits) user 1 : 0,1,1,1,1,1,1,0,1,1,1,1,1,1,0,1,1,...,0,1,1,1,1,1,1 user 2 : 1,0,1,1,1,1,1,1,0,1,1,1,1,1,1,0,1,...,1,0,1,1,1,1,1 user 3 : 1,1,0,1,1,1,1,1,1,0,1,1,1,1,1,1,0,...,1,1,0,1,1,1,1... user n : 1,1,1,1,1,1,0,1,1,1,1,1,1,0,1,1,1,...,1,1,1,1,1,1, averaged : 0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,...,0,0,0,0,0,0,0 Fig. 2. Fake codes for 0 and 1 bit detection experiments 4.2 Colluder Tracing Experiments on Video We applied our approach to video data extracted from DVDs and measured the performance of tracing colluders. We used fingerprint code from (72,81,9,8,0,1) GD- PBIBD and CIF (352x288) sized video data as host signals. For the video fingerprinting performance assess, we averaged uniquely fingerprinted contents from 2 collusions to 7 collusion cases 100 times, respectively, and extracted the colluders. Table 1 shows the result of test; the number of correctly extracted colluders for each collusion case. When the number of colluders was below 4, we could trace all colluders successfully. When the colluder number exceeded 4, our detector partially failed to catch all colluders, but could trace at least one user and there was no report on innocent users. Table 1. Detection results from 10 illegal copies of 10 videos for each collusion case Number of extracted colluders collusion collusion collusion collusion collusion collusion collusion

6 Zero-Based Code Modulation Technique for Digital Video Fingerprinting 1113 Fig. 3. Correlation value separation results both systems: detected correlation values for 0 bit (black colored shape) and 1 bit (white colored shape). (a), (c) and (e) are result of legacy systems and (b), (d) and (f) are of the proposed system 5 Conclusions The anti-collusion fingerprint code scheme has a property of the colluder tracing function based on a marking assumption concept. The marking assumption, however, does not work well in multimedia data because the detection scheme of fingerprint signals works with correlation-based method and the results are not always agree with its theoretical result. This disagreement cause wrong detections of innocent users,

7 1114 In Koo Kang et al. which is the most serious problem in fingerprinting applications. To get rid of this trouble, we proposed a zero-based code modulation method which fully reflects running mechanisms of marking assumption and anti-collusion codes. We modulated and embedded only 0 bit information of binary codes so that correlation results for bit 0 and 1 could be separated as maximally as possible. Through code bit separation experiments, we convinced our proposed method is effective to classify two groups of correlation points even though the worst cases of averaging attacks. From video data experiments, we confirmed that the bit separation property was maintained and the detector could trace colluders successfully in the corrupted contents. References 1. Junseok Lee, Seong O.H.: A DRM Framework for Distributing Digital Contents through the Internet, ETRI Journal, 2003, pp D. Boneh, J. Shaw: Collusion-secure fingerprinting for digital data, IEEE Trans. On Information Theory, Vol. 44. (1998) W. Trappe, M. Wu, Zhen Wang, K.J.R. Liu: Anti-collusion Fingerprinting for Multimedia, IEEE Trans. On Signal Processing, Vol. 51. (2003) Z. Jane Wang, Min Wu, Hong Zhao, K. J. Liu and Wade Trappe: Resistance of orthogonal Gaussian fingerprinting to collusion attacks, Proc. of ICASSP, pp , Apr C. J. Colbourn, J. H. Dinitz: The CRC Handbook of Combinatorial Designs, CRC (1996) 6. Willard H. Clatworthy: Tables of two-associate-class partially balanced designs, National Bureau of Standards Washington D.C. U.S. (1973) 7. I. J. Cox, M.L. Miller, J.A. Broom: Digital Watermarking, Morgan Kaufmann Publishers: San Francisco CA (2002)

PERFORMANCE STUDY OF ECC-BASED COLLUSION-RESISTANT MULTIMEDIA FINGERPRINTING

PERFORMANCE STUDY OF ECC-BASED COLLUSION-RESISTANT MULTIMEDIA FINGERPRINTING PERFORMANCE STUDY OF ECC-BASED COLLUSION-RESISTANT MULTIMEDIA FINGERPRINTING Shan He and Min Wu ECE Department, University of Maryland, College Park ABSTRACT * Digital fingerprinting is a tool to protect

More information

Anti-Collusion Fingerprinting for Multimedia

Anti-Collusion Fingerprinting for Multimedia Anti-Collusion Fingerprinting for Multimedia Wade Trappe, Min Wu, Zhen Wang, and K. J. Ray Liu Department of Electrical and Computer Engineering University of Maryland, College Park, MD 20742 E-mail: wxt,

More information

Audio Watermarking Based on Multiple Echoes Hiding for FM Radio

Audio Watermarking Based on Multiple Echoes Hiding for FM Radio INTERSPEECH 2014 Audio Watermarking Based on Multiple Echoes Hiding for FM Radio Xuejun Zhang, Xiang Xie Beijing Institute of Technology Zhangxuejun0910@163.com,xiexiang@bit.edu.cn Abstract An audio watermarking

More information

MULTIMEDIA content can be easily distributed over

MULTIMEDIA content can be easily distributed over 302 IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, VOL. 4, NO. 3, SEPTEMBER 2009 Robust MC-CDMA-Based Fingerprinting Against Time-Varying Collusion Attacks Byung-Ho Cha, Student Member, IEEE,

More information

Practical fingerprinting system for images

Practical fingerprinting system for images 46 5, 057004 May 2007 Practical fingerprinting system for images Yu-Tzu Lin National Taiwan University Communications and Multimedia Laboratory Department of Computer Science and Information Engineering

More information

Capacity of collusion secure fingerprinting a tradeoff between rate and efficiency

Capacity of collusion secure fingerprinting a tradeoff between rate and efficiency Capacity of collusion secure fingerprinting a tradeoff between rate and efficiency Gábor Tardos School of Computing Science Simon Fraser University and Rényi Institute, Budapest tardos@cs.sfu.ca Abstract

More information

Digital Watermarking Using Homogeneity in Image

Digital Watermarking Using Homogeneity in Image Digital Watermarking Using Homogeneity in Image S. K. Mitra, M. K. Kundu, C. A. Murthy, B. B. Bhattacharya and T. Acharya Dhirubhai Ambani Institute of Information and Communication Technology Gandhinagar

More information

Digital Audio Watermarking With Discrete Wavelet Transform Using Fibonacci Numbers

Digital Audio Watermarking With Discrete Wavelet Transform Using Fibonacci Numbers Digital Audio Watermarking With Discrete Wavelet Transform Using Fibonacci Numbers P. Mohan Kumar 1, Dr. M. Sailaja 2 M. Tech scholar, Dept. of E.C.E, Jawaharlal Nehru Technological University Kakinada,

More information

Reversible data hiding based on histogram modification using S-type and Hilbert curve scanning

Reversible data hiding based on histogram modification using S-type and Hilbert curve scanning Advances in Engineering Research (AER), volume 116 International Conference on Communication and Electronic Information Engineering (CEIE 016) Reversible data hiding based on histogram modification using

More information

Collusion Secure Fingerprinting. CMLab

Collusion Secure Fingerprinting. CMLab Collusion Secure Fingerprinting CMLab 2 Outline Introduction Collusion attack Collusion-resilient fingerprinting Combinatorial designed code Error correction code Orthogonal signals Research issues 3 Introduction

More information

Local prediction based reversible watermarking framework for digital videos

Local prediction based reversible watermarking framework for digital videos Local prediction based reversible watermarking framework for digital videos J.Priyanka (M.tech.) 1 K.Chaintanya (Asst.proff,M.tech(Ph.D)) 2 M.Tech, Computer science and engineering, Acharya Nagarjuna University,

More information

TAC Reconfiguration for Paging Optimization in LTE-Based Mobile Communication Systems

TAC Reconfiguration for Paging Optimization in LTE-Based Mobile Communication Systems TAC Reconfiguration for Paging Optimization in LTE-Based Mobile Communication Systems Hyung-Woo Kang 1, Seok-Joo Koh 1,*, Sang-Kyu Lim 2, and Tae-Gyu Kang 2 1 School of Computer Science and Engineering,

More information

Journal of mathematics and computer science 11 (2014),

Journal of mathematics and computer science 11 (2014), Journal of mathematics and computer science 11 (2014), 137-146 Application of Unsharp Mask in Augmenting the Quality of Extracted Watermark in Spatial Domain Watermarking Saeed Amirgholipour 1 *,Ahmad

More information

An Improved Edge Adaptive Grid Technique To Authenticate Grey Scale Images

An Improved Edge Adaptive Grid Technique To Authenticate Grey Scale Images An Improved Edge Adaptive Grid Technique To Authenticate Grey Scale Images Ishwarya.M 1, Mary shamala.l 2 M.E, Dept of CSE, IFET College of Engineering, Villupuram, TamilNadu, India 1 Associate Professor,

More information

Analysis of cognitive radio networks with imperfect sensing

Analysis of cognitive radio networks with imperfect sensing Analysis of cognitive radio networks with imperfect sensing Isameldin Suliman, Janne Lehtomäki and Timo Bräysy Centre for Wireless Communications CWC University of Oulu Oulu, Finland Kenta Umebayashi Tokyo

More information

Department of Electronic Engineering FINAL YEAR PROJECT REPORT

Department of Electronic Engineering FINAL YEAR PROJECT REPORT Department of Electronic Engineering FINAL YEAR PROJECT REPORT BEngECE-2009/10-- Student Name: CHEUNG Yik Juen Student ID: Supervisor: Prof.

More information

Reversible Data Hiding in Encrypted color images by Reserving Room before Encryption with LSB Method

Reversible Data Hiding in Encrypted color images by Reserving Room before Encryption with LSB Method ISSN (e): 2250 3005 Vol, 04 Issue, 10 October 2014 International Journal of Computational Engineering Research (IJCER) Reversible Data Hiding in Encrypted color images by Reserving Room before Encryption

More information

DWT BASED AUDIO WATERMARKING USING ENERGY COMPARISON

DWT BASED AUDIO WATERMARKING USING ENERGY COMPARISON DWT BASED AUDIO WATERMARKING USING ENERGY COMPARISON K.Thamizhazhakan #1, S.Maheswari *2 # PG Scholar,Department of Electrical and Electronics Engineering, Kongu Engineering College,Erode-638052,India.

More information

Digital Image Watermarking by Spread Spectrum method

Digital Image Watermarking by Spread Spectrum method Digital Image Watermarking by Spread Spectrum method Andreja Samčovi ović Faculty of Transport and Traffic Engineering University of Belgrade, Serbia Belgrade, november 2014. I Spread Spectrum Techniques

More information

Scale estimation in two-band filter attacks on QIM watermarks

Scale estimation in two-band filter attacks on QIM watermarks Scale estimation in two-band filter attacks on QM watermarks Jinshen Wang a,b, vo D. Shterev a, and Reginald L. Lagendijk a a Delft University of Technology, 8 CD Delft, etherlands; b anjing University

More information

and compared to a detection threshold to decide whether is watermarked or not. If the detection function is deterministic, the set (1)

and compared to a detection threshold to decide whether is watermarked or not. If the detection function is deterministic, the set (1) IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, VOL. 4, NO. 3, SEPTEMBER 2009 273 On Reliability and Security of Randomized Detectors Against Sensitivity Analysis Attacks Maha El Choubassi, Member,

More information

Blind Image Fidelity Assessment Using the Histogram

Blind Image Fidelity Assessment Using the Histogram Blind Image Fidelity Assessment Using the Histogram M. I. Khalil Abstract An image fidelity assessment and tamper detection using two histogram components of the color image is presented in this paper.

More information

Watermarking-based Image Authentication with Recovery Capability using Halftoning and IWT

Watermarking-based Image Authentication with Recovery Capability using Halftoning and IWT Watermarking-based Image Authentication with Recovery Capability using Halftoning and IWT Luis Rosales-Roldan, Manuel Cedillo-Hernández, Mariko Nakano-Miyatake, Héctor Pérez-Meana Postgraduate Section,

More information

Methods for Reducing the Activity Switching Factor

Methods for Reducing the Activity Switching Factor International Journal of Engineering Research and Development e-issn: 2278-67X, p-issn: 2278-8X, www.ijerd.com Volume, Issue 3 (March 25), PP.7-25 Antony Johnson Chenginimattom, Don P John M.Tech Student,

More information

FPGA implementation of DWT for Audio Watermarking Application

FPGA implementation of DWT for Audio Watermarking Application FPGA implementation of DWT for Audio Watermarking Application Naveen.S.Hampannavar 1, Sajeevan Joseph 2, C.B.Bidhul 3, Arunachalam V 4 1, 2, 3 M.Tech VLSI Students, 4 Assistant Professor Selection Grade

More information

Study on OFDM Symbol Timing Synchronization Algorithm

Study on OFDM Symbol Timing Synchronization Algorithm Vol.7, No. (4), pp.43-5 http://dx.doi.org/.457/ijfgcn.4.7..4 Study on OFDM Symbol Timing Synchronization Algorithm Jing Dai and Yanmei Wang* College of Information Science and Engineering, Shenyang Ligong

More information

Blind Dereverberation of Single-Channel Speech Signals Using an ICA-Based Generative Model

Blind Dereverberation of Single-Channel Speech Signals Using an ICA-Based Generative Model Blind Dereverberation of Single-Channel Speech Signals Using an ICA-Based Generative Model Jong-Hwan Lee 1, Sang-Hoon Oh 2, and Soo-Young Lee 3 1 Brain Science Research Center and Department of Electrial

More information

Multi-Resolution Estimation of Optical Flow on Vehicle Tracking under Unpredictable Environments

Multi-Resolution Estimation of Optical Flow on Vehicle Tracking under Unpredictable Environments , pp.32-36 http://dx.doi.org/10.14257/astl.2016.129.07 Multi-Resolution Estimation of Optical Flow on Vehicle Tracking under Unpredictable Environments Viet Dung Do 1 and Dong-Min Woo 1 1 Department of

More information

Symbol Timing Detection for OFDM Signals with Time Varying Gain

Symbol Timing Detection for OFDM Signals with Time Varying Gain International Journal of Control and Automation, pp.4-48 http://dx.doi.org/.4257/ijca.23.6.5.35 Symbol Timing Detection for OFDM Signals with Time Varying Gain Jihye Lee and Taehyun Jeon Seoul National

More information

University of Bristol - Explore Bristol Research. Peer reviewed version Link to published version (if available): /ISCAS.1999.

University of Bristol - Explore Bristol Research. Peer reviewed version Link to published version (if available): /ISCAS.1999. Fernando, W. A. C., Canagarajah, C. N., & Bull, D. R. (1999). Automatic detection of fade-in and fade-out in video sequences. In Proceddings of ISACAS, Image and Video Processing, Multimedia and Communications,

More information

Data Word Length Reduction for Low-Power DSP Software

Data Word Length Reduction for Low-Power DSP Software EE382C: LITERATURE SURVEY, APRIL 2, 2004 1 Data Word Length Reduction for Low-Power DSP Software Kyungtae Han Abstract The increasing demand for portable computing accelerates the study of minimizing power

More information

Available online at ScienceDirect. The 4th International Conference on Electrical Engineering and Informatics (ICEEI 2013)

Available online at  ScienceDirect. The 4th International Conference on Electrical Engineering and Informatics (ICEEI 2013) Available online at www.sciencedirect.com ScienceDirect Procedia Technology ( 23 ) 7 3 The 4th International Conference on Electrical Engineering and Informatics (ICEEI 23) BER Performance of Audio Watermarking

More information

IJMIE Volume 2, Issue 4 ISSN:

IJMIE Volume 2, Issue 4 ISSN: Reducing PAPR using PTS Technique having standard array in OFDM Deepak Verma* Vijay Kumar Anand* Ashok Kumar* Abstract: Orthogonal frequency division multiplexing is an attractive technique for modern

More information

GENERIC CODE DESIGN ALGORITHMS FOR REVERSIBLE VARIABLE-LENGTH CODES FROM THE HUFFMAN CODE

GENERIC CODE DESIGN ALGORITHMS FOR REVERSIBLE VARIABLE-LENGTH CODES FROM THE HUFFMAN CODE GENERIC CODE DESIGN ALGORITHMS FOR REVERSIBLE VARIABLE-LENGTH CODES FROM THE HUFFMAN CODE Wook-Hyun Jeong and Yo-Sung Ho Kwangju Institute of Science and Technology (K-JIST) Oryong-dong, Buk-gu, Kwangju,

More information

Simulative Investigations for Robust Frequency Estimation Technique in OFDM System

Simulative Investigations for Robust Frequency Estimation Technique in OFDM System , pp. 187-192 http://dx.doi.org/10.14257/ijfgcn.2015.8.4.18 Simulative Investigations for Robust Frequency Estimation Technique in OFDM System Kussum Bhagat 1 and Jyoteesh Malhotra 2 1 ECE Department,

More information

Face Detector using Network-based Services for a Remote Robot Application

Face Detector using Network-based Services for a Remote Robot Application Face Detector using Network-based Services for a Remote Robot Application Yong-Ho Seo Department of Intelligent Robot Engineering, Mokwon University Mokwon Gil 21, Seo-gu, Daejeon, Republic of Korea yhseo@mokwon.ac.kr

More information

Multi-Radio Channel Detecting Jamming Attack Against Enhanced Jump-Stay Based Rendezvous in Cognitive Radio Networks

Multi-Radio Channel Detecting Jamming Attack Against Enhanced Jump-Stay Based Rendezvous in Cognitive Radio Networks Multi-Radio Channel Detecting Jamming Attack Against Enhanced Jump-Stay Based Rendezvous in Cognitive Radio Networks Yang Gao 1, Zhaoquan Gu 1, Qiang-Sheng Hua 2, Hai Jin 2 1 Institute for Interdisciplinary

More information

Combination of Modified Clipping Technique and Selective Mapping for PAPR Reduction

Combination of Modified Clipping Technique and Selective Mapping for PAPR Reduction www.ijecs.in International Journal Of Engineering And Computer Science ISSN:2319-7242 Volume 5 Issue 09 September 2016 Page No.17848-17852 Combination of Modified Clipping Technique and Selective Mapping

More information

DESIGN AND IMPLEMENTATION OF AN ALGORITHM FOR MODULATION IDENTIFICATION OF ANALOG AND DIGITAL SIGNALS

DESIGN AND IMPLEMENTATION OF AN ALGORITHM FOR MODULATION IDENTIFICATION OF ANALOG AND DIGITAL SIGNALS DESIGN AND IMPLEMENTATION OF AN ALGORITHM FOR MODULATION IDENTIFICATION OF ANALOG AND DIGITAL SIGNALS John Yong Jia Chen (Department of Electrical Engineering, San José State University, San José, California,

More information

Spread Spectrum Watermarking Using HVS Model and Wavelets in JPEG 2000 Compression

Spread Spectrum Watermarking Using HVS Model and Wavelets in JPEG 2000 Compression Spread Spectrum Watermarking Using HVS Model and Wavelets in JPEG 2000 Compression Khaly TALL 1, Mamadou Lamine MBOUP 1, Sidi Mohamed FARSSI 1, Idy DIOP 1, Abdou Khadre DIOP 1, Grégoire SISSOKO 2 1. Laboratoire

More information

The Influence of Image Enhancement Filters on a Watermark Detection Rate Authors

The Influence of Image Enhancement Filters on a Watermark Detection Rate Authors acta graphica 194 udc 004.056.55:655.36 original scientific paper received: -09-011 accepted: 11-11-011 The Influence of Image Enhancement Filters on a Watermark Detection Rate Authors Ante Poljičak, Lidija

More information

A Study on the Enhanced Detection Method Considering the Channel Response in OFDM Based WLAN

A Study on the Enhanced Detection Method Considering the Channel Response in OFDM Based WLAN A Study on the Enhanced Detection Method Considering the Channel Response in OFDM Based WLAN Hyoung-Goo Jeon 1, Hyun Lee 2, Won-Chul Choi 2, Hyun-Seo Oh 2, and Kyoung-Rok Cho 3 1 Dong Eui University, Busan,

More information

A Novel Fuzzy Neural Network Based Distance Relaying Scheme

A Novel Fuzzy Neural Network Based Distance Relaying Scheme 902 IEEE TRANSACTIONS ON POWER DELIVERY, VOL. 15, NO. 3, JULY 2000 A Novel Fuzzy Neural Network Based Distance Relaying Scheme P. K. Dash, A. K. Pradhan, and G. Panda Abstract This paper presents a new

More information

UM-Based Image Enhancement in Low-Light Situations

UM-Based Image Enhancement in Low-Light Situations UM-Based Image Enhancement in Low-Light Situations SHWU-HUEY YEN * CHUN-HSIEN LIN HWEI-JEN LIN JUI-CHEN CHIEN Department of Computer Science and Information Engineering Tamkang University, 151 Ying-chuan

More information

A Reversible Data Hiding Scheme Based on Prediction Difference

A Reversible Data Hiding Scheme Based on Prediction Difference 2017 2 nd International Conference on Computer Science and Technology (CST 2017) ISBN: 978-1-60595-461-5 A Reversible Data Hiding Scheme Based on Prediction Difference Ze-rui SUN 1,a*, Guo-en XIA 1,2,

More information

TWO ALGORITHMS IN DIGITAL AUDIO STEGANOGRAPHY USING QUANTIZED FREQUENCY DOMAIN EMBEDDING AND REVERSIBLE INTEGER TRANSFORMS

TWO ALGORITHMS IN DIGITAL AUDIO STEGANOGRAPHY USING QUANTIZED FREQUENCY DOMAIN EMBEDDING AND REVERSIBLE INTEGER TRANSFORMS TWO ALGORITHMS IN DIGITAL AUDIO STEGANOGRAPHY USING QUANTIZED FREQUENCY DOMAIN EMBEDDING AND REVERSIBLE INTEGER TRANSFORMS Sos S. Agaian 1, David Akopian 1 and Sunil A. D Souza 1 1Non-linear Signal Processing

More information

An Optimal Pixel-level Self-repairing Authentication. Method for Grayscale Images under a Minimax. Criterion of Distortion Reduction*

An Optimal Pixel-level Self-repairing Authentication. Method for Grayscale Images under a Minimax. Criterion of Distortion Reduction* An Optimal Pixel-level Self-repairing Authentication Method for Grayscale Images under a Minimax Criterion of Distortion Reduction* Che-Wei Lee 1 and Wen-Hsiang Tsai 1, 2, 1 Department of Computer Science

More information

Background Dirty Paper Coding Codeword Binning Code construction Remaining problems. Information Hiding. Phil Regalia

Background Dirty Paper Coding Codeword Binning Code construction Remaining problems. Information Hiding. Phil Regalia Information Hiding Phil Regalia Department of Electrical Engineering and Computer Science Catholic University of America Washington, DC 20064 regalia@cua.edu Baltimore IEEE Signal Processing Society Chapter,

More information

Image Manipulation Detection using Convolutional Neural Network

Image Manipulation Detection using Convolutional Neural Network Image Manipulation Detection using Convolutional Neural Network Dong-Hyun Kim 1 and Hae-Yeoun Lee 2,* 1 Graduate Student, 2 PhD, Professor 1,2 Department of Computer Software Engineering, Kumoh National

More information

Improved Spread Spectrum: A New Modulation Technique for Robust Watermarking

Improved Spread Spectrum: A New Modulation Technique for Robust Watermarking 898 IEEE TRANSACTIONS ON SIGNAL PROCESSING, VOL. 51, NO. 4, APRIL 2003 Improved Spread Spectrum: A New Modulation Technique for Robust Watermarking Henrique S. Malvar, Fellow, IEEE, and Dinei A. F. Florêncio,

More information

Implementation of a Visible Watermarking in a Secure Still Digital Camera Using VLSI Design

Implementation of a Visible Watermarking in a Secure Still Digital Camera Using VLSI Design 2009 nternational Symposium on Computing, Communication, and Control (SCCC 2009) Proc.of CST vol.1 (2011) (2011) ACST Press, Singapore mplementation of a Visible Watermarking in a Secure Still Digital

More information

Multiuser Detection for Synchronous DS-CDMA in AWGN Channel

Multiuser Detection for Synchronous DS-CDMA in AWGN Channel Multiuser Detection for Synchronous DS-CDMA in AWGN Channel MD IMRAAN Department of Electronics and Communication Engineering Gulbarga, 585104. Karnataka, India. Abstract - In conventional correlation

More information

The Seamless Localization System for Interworking in Indoor and Outdoor Environments

The Seamless Localization System for Interworking in Indoor and Outdoor Environments W 12 The Seamless Localization System for Interworking in Indoor and Outdoor Environments Dong Myung Lee 1 1. Dept. of Computer Engineering, Tongmyong University; 428, Sinseon-ro, Namgu, Busan 48520, Republic

More information

Robust and Blind Spatial Watermarking in Digital Image

Robust and Blind Spatial Watermarking in Digital Image Robust and lind Spatial Watermarking in Digital Image Santi Prasad Maity Malay Kumar Kundu Dept.of Electronics Telecomm. Machine Intelligence Unit.E.College(D.U.) Indian Statical Institute Howrah -711

More information

High-Capacity Reversible Data Hiding in Encrypted Images using MSB Prediction

High-Capacity Reversible Data Hiding in Encrypted Images using MSB Prediction High-Capacity Reversible Data Hiding in Encrypted Images using MSB Prediction Pauline Puteaux and William Puech; LIRMM Laboratory UMR 5506 CNRS, University of Montpellier; Montpellier, France Abstract

More information

A Visual Cryptography Based Watermark Technology for Individual and Group Images

A Visual Cryptography Based Watermark Technology for Individual and Group Images A Visual Cryptography Based Watermark Technology for Individual and Group Images Azzam SLEIT (Previously, Azzam IBRAHIM) King Abdullah II School for Information Technology, University of Jordan, Amman,

More information

Sequential Multi-Channel Access Game in Distributed Cognitive Radio Networks

Sequential Multi-Channel Access Game in Distributed Cognitive Radio Networks Sequential Multi-Channel Access Game in Distributed Cognitive Radio Networks Chunxiao Jiang, Yan Chen, and K. J. Ray Liu Department of Electrical and Computer Engineering, University of Maryland, College

More information

APPLYING EDGE INFORMATION IN YCbCr COLOR SPACE ON THE IMAGE WATERMARKING

APPLYING EDGE INFORMATION IN YCbCr COLOR SPACE ON THE IMAGE WATERMARKING APPLYING EDGE INFORMATION IN YCbCr COLOR SPACE ON THE IMAGE WATERMARKING Mansur Jaba 1, Mosbah Elsghair 2, Najib Tanish 1 and Abdusalam Aburgiga 2 1 Alpha University, Serbia and 2 John Naisbitt University,

More information

Direct Binary Search Based Algorithms for Image Hiding

Direct Binary Search Based Algorithms for Image Hiding 1 Xia ZHUGE, 2 Koi NAKANO 1 School of Electron and Information Engineering, Ningbo University of Technology, No.20 Houhe Lane Haishu District, 315016, Ningbo, Zheiang, China zhugexia2@163.com *2 Department

More information

OFDM Transmission Corrupted by Impulsive Noise

OFDM Transmission Corrupted by Impulsive Noise OFDM Transmission Corrupted by Impulsive Noise Jiirgen Haring, Han Vinck University of Essen Institute for Experimental Mathematics Ellernstr. 29 45326 Essen, Germany,. e-mail: haering@exp-math.uni-essen.de

More information

Secure Spread Spectrum Data Embedding and Extraction

Secure Spread Spectrum Data Embedding and Extraction Secure Spread Spectrum Data Embedding and Extraction Vaibhav Dhore 1, Pathan Md. Arfat 2 1 Professor, Department of Computer Engineering, RMD Sinhgad School of Engineering, University of Pune, India 2

More information

Design and Implementation of the DAB/DMB Transmitter Identification Information Decoder

Design and Implementation of the DAB/DMB Transmitter Identification Information Decoder Design and Implementation of the DAB/DMB Transmitter Identification Information Decoder Hongsheng Zhang, Hongyun Wang, Guoyu Wang* and Mingying Lu Abstract The Transmitter Identification Information (TII)

More information

Cracking the Sudoku: A Deterministic Approach

Cracking the Sudoku: A Deterministic Approach Cracking the Sudoku: A Deterministic Approach David Martin Erica Cross Matt Alexander Youngstown State University Youngstown, OH Advisor: George T. Yates Summary Cracking the Sodoku 381 We formulate a

More information

Image Quality Estimation of Tree Based DWT Digital Watermarks

Image Quality Estimation of Tree Based DWT Digital Watermarks International Journal of Engineering Research and General Science Volume 3, Issue 1, January-February, 215 ISSN 291-273 Image Quality Estimation of Tree Based DWT Digital Watermarks MALVIKA SINGH PG Scholar,

More information

Three-level Code Division Multiplex for Local Area Networks

Three-level Code Division Multiplex for Local Area Networks Three-level Code Division Multiplex for Local Area Networks Mokhtar M. 1,2, Quinlan T. 1 and Walker S.D. 1 1. University of Essex, U.K. 2. Universiti Pertanian Malaysia, Malaysia Abstract: This paper reports

More information

3D-Position Estimation for Hand Gesture Interface Using a Single Camera

3D-Position Estimation for Hand Gesture Interface Using a Single Camera 3D-Position Estimation for Hand Gesture Interface Using a Single Camera Seung-Hwan Choi, Ji-Hyeong Han, and Jong-Hwan Kim Department of Electrical Engineering, KAIST, Gusung-Dong, Yusung-Gu, Daejeon, Republic

More information

A JOINT MODULATION IDENTIFICATION AND FREQUENCY OFFSET CORRECTION ALGORITHM FOR QAM SYSTEMS

A JOINT MODULATION IDENTIFICATION AND FREQUENCY OFFSET CORRECTION ALGORITHM FOR QAM SYSTEMS A JOINT MODULATION IDENTIFICATION AND FREQUENCY OFFSET CORRECTION ALGORITHM FOR QAM SYSTEMS Evren Terzi, Hasan B. Celebi, and Huseyin Arslan Department of Electrical Engineering, University of South Florida

More information

Joint Transmitter-Receiver Adaptive Forward-Link DS-CDMA System

Joint Transmitter-Receiver Adaptive Forward-Link DS-CDMA System # - Joint Transmitter-Receiver Adaptive orward-link D-CDMA ystem Li Gao and Tan. Wong Department of Electrical & Computer Engineering University of lorida Gainesville lorida 3-3 Abstract A joint transmitter-receiver

More information

IMPROVED PROBABILITY OF DETECTION AT LOW SNR IN COGNITIVE RADIOS

IMPROVED PROBABILITY OF DETECTION AT LOW SNR IN COGNITIVE RADIOS 87 IMPROVED PROBABILITY OF DETECTION AT LOW SNR IN COGNITIVE RADIOS Parvinder Kumar 1, (parvinderkr123@gmail.com)dr. Rakesh Joon 2 (rakeshjoon11@gmail.com)and Dr. Rajender Kumar 3 (rkumar.kkr@gmail.com)

More information

IMAGE TYPE WATER METER CHARACTER RECOGNITION BASED ON EMBEDDED DSP

IMAGE TYPE WATER METER CHARACTER RECOGNITION BASED ON EMBEDDED DSP IMAGE TYPE WATER METER CHARACTER RECOGNITION BASED ON EMBEDDED DSP LIU Ying 1,HAN Yan-bin 2 and ZHANG Yu-lin 3 1 School of Information Science and Engineering, University of Jinan, Jinan 250022, PR China

More information

Distinguishing between Camera and Scanned Images by Means of Frequency Analysis

Distinguishing between Camera and Scanned Images by Means of Frequency Analysis Distinguishing between Camera and Scanned Images by Means of Frequency Analysis Roberto Caldelli, Irene Amerini, and Francesco Picchioni Media Integration and Communication Center - MICC, University of

More information

An Area Efficient FFT Implementation for OFDM

An Area Efficient FFT Implementation for OFDM Vol. 2, Special Issue 1, May 20 An Area Efficient FFT Implementation for OFDM R.KALAIVANI#1, Dr. DEEPA JOSE#1, Dr. P. NIRMAL KUMAR# # Department of Electronics and Communication Engineering, Anna University

More information

Optimum Rate Allocation for Two-Class Services in CDMA Smart Antenna Systems

Optimum Rate Allocation for Two-Class Services in CDMA Smart Antenna Systems 810 IEEE TRANSACTIONS ON COMMUNICATIONS, VOL. 51, NO. 5, MAY 2003 Optimum Rate Allocation for Two-Class Services in CDMA Smart Antenna Systems Il-Min Kim, Member, IEEE, Hyung-Myung Kim, Senior Member,

More information

Signal Recovery from Random Measurements

Signal Recovery from Random Measurements Signal Recovery from Random Measurements Joel A. Tropp Anna C. Gilbert {jtropp annacg}@umich.edu Department of Mathematics The University of Michigan 1 The Signal Recovery Problem Let s be an m-sparse

More information

Spread Spectrum. Chapter 18. FHSS Frequency Hopping Spread Spectrum DSSS Direct Sequence Spread Spectrum DSSS using CDMA Code Division Multiple Access

Spread Spectrum. Chapter 18. FHSS Frequency Hopping Spread Spectrum DSSS Direct Sequence Spread Spectrum DSSS using CDMA Code Division Multiple Access Spread Spectrum Chapter 18 FHSS Frequency Hopping Spread Spectrum DSSS Direct Sequence Spread Spectrum DSSS using CDMA Code Division Multiple Access Single Carrier The traditional way Transmitted signal

More information

Effect of Embedding Multiple Watermarks in Color Image against Cropping and Salt and Pepper Noise Attacks

Effect of Embedding Multiple Watermarks in Color Image against Cropping and Salt and Pepper Noise Attacks International Journal of IT, Engineering and Applied Sciences Research (IJIEASR) ISSN: 239-443 Volume, No., October 202 8 Effect of Embedding Multiple Watermarks in Color Image against Cropping and Salt

More information

TIMA Lab. Research Reports

TIMA Lab. Research Reports ISSN 292-862 TIMA Lab. Research Reports TIMA Laboratory, 46 avenue Félix Viallet, 38 Grenoble France ON-CHIP TESTING OF LINEAR TIME INVARIANT SYSTEMS USING MAXIMUM-LENGTH SEQUENCES Libor Rufer, Emmanuel

More information

Introduction to Video Forgery Detection: Part I

Introduction to Video Forgery Detection: Part I Introduction to Video Forgery Detection: Part I Detecting Forgery From Static-Scene Video Based on Inconsistency in Noise Level Functions IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, VOL. 5,

More information

REVERSIBLE MEDICAL IMAGE WATERMARKING TECHNIQUE USING HISTOGRAM SHIFTING

REVERSIBLE MEDICAL IMAGE WATERMARKING TECHNIQUE USING HISTOGRAM SHIFTING REVERSIBLE MEDICAL IMAGE WATERMARKING TECHNIQUE USING HISTOGRAM SHIFTING S.Mounika 1, M.L. Mittal 2 1 Department of ECE, MRCET, Hyderabad, India 2 Professor Department of ECE, MRCET, Hyderabad, India ABSTRACT

More information

AN EXTENDED VISUAL CRYPTOGRAPHY SCHEME WITHOUT PIXEL EXPANSION FOR HALFTONE IMAGES. N. Askari, H.M. Heys, and C.R. Moloney

AN EXTENDED VISUAL CRYPTOGRAPHY SCHEME WITHOUT PIXEL EXPANSION FOR HALFTONE IMAGES. N. Askari, H.M. Heys, and C.R. Moloney 26TH ANNUAL IEEE CANADIAN CONFERENCE ON ELECTRICAL AND COMPUTER ENGINEERING YEAR 2013 AN EXTENDED VISUAL CRYPTOGRAPHY SCHEME WITHOUT PIXEL EXPANSION FOR HALFTONE IMAGES N. Askari, H.M. Heys, and C.R. Moloney

More information

International Journal of Advance Research in Computer Science and Management Studies

International Journal of Advance Research in Computer Science and Management Studies Volume 3, Issue 2, February 2015 ISSN: 2321 7782 (Online) International Journal of Advance Research in Computer Science and Management Studies Research Article / Survey Paper / Case Study Available online

More information

SINCE orthogonal frequency division multiplexing

SINCE orthogonal frequency division multiplexing IEEE TRANSACTIONS ON BROADCASTING, VOL. 55, NO. 3, SEPTEMBER 2009 679 Bit-Based SLM Schemes for PAPR Reduction in QAM Modulated OFDM Signals Hyun-Bae Jeon, Kyu-Hong Kim, Jong-Seon No, Member, IEEE, and

More information

BEING wideband, chaotic signals are well suited for

BEING wideband, chaotic signals are well suited for 680 IEEE TRANSACTIONS ON CIRCUITS AND SYSTEMS II: EXPRESS BRIEFS, VOL. 51, NO. 12, DECEMBER 2004 Performance of Differential Chaos-Shift-Keying Digital Communication Systems Over a Multipath Fading Channel

More information

Utilization of Multipaths for Spread-Spectrum Code Acquisition in Frequency-Selective Rayleigh Fading Channels

Utilization of Multipaths for Spread-Spectrum Code Acquisition in Frequency-Selective Rayleigh Fading Channels 734 IEEE TRANSACTIONS ON COMMUNICATIONS, VOL. 49, NO. 4, APRIL 2001 Utilization of Multipaths for Spread-Spectrum Code Acquisition in Frequency-Selective Rayleigh Fading Channels Oh-Soon Shin, Student

More information

Interleaved PC-OFDM to reduce the peak-to-average power ratio

Interleaved PC-OFDM to reduce the peak-to-average power ratio 1 Interleaved PC-OFDM to reduce the peak-to-average power ratio A D S Jayalath and C Tellambura School of Computer Science and Software Engineering Monash University, Clayton, VIC, 3800 e-mail:jayalath@cssemonasheduau

More information

Jayalakshmi M., S. N. Merchant, Uday B. Desai SPANN Lab, Indian Institute of Technology, Bombay jlakshmi, merchant,

Jayalakshmi M., S. N. Merchant, Uday B. Desai SPANN Lab, Indian Institute of Technology, Bombay   jlakshmi, merchant, SIGNIFICANT PIXEL WATERMARKING IN CONTOURLET OMAIN Jayalakshmi M., S. N. Merchant, Uday B. esai SPANN Lab, Indian Institute of Technology, Bombay email: jlakshmi, merchant, ubdesai @ee.iitb.ac.in Keywords:

More information

Encryption Data in Wireless Sensor Network

Encryption Data in Wireless Sensor Network Available Online at www.ijcsmc.com International Journal of Computer Science and Mobile Computing A Monthly Journal of Computer Science and Information Technology ISSN 2320 088X IMPACT FACTOR: 6.017 IJCSMC,

More information

Study on the UWB Rader Synchronization Technology

Study on the UWB Rader Synchronization Technology Study on the UWB Rader Synchronization Technology Guilin Lu Guangxi University of Technology, Liuzhou 545006, China E-mail: lifishspirit@126.com Shaohong Wan Ari Force No.95275, Liuzhou 545005, China E-mail:

More information

SPARSE CHANNEL ESTIMATION BY PILOT ALLOCATION IN MIMO-OFDM SYSTEMS

SPARSE CHANNEL ESTIMATION BY PILOT ALLOCATION IN MIMO-OFDM SYSTEMS SPARSE CHANNEL ESTIMATION BY PILOT ALLOCATION IN MIMO-OFDM SYSTEMS Puneetha R 1, Dr.S.Akhila 2 1 M. Tech in Digital Communication B M S College Of Engineering Karnataka, India 2 Professor Department of

More information

Lecture 3. Direct Sequence Spread Spectrum Systems. COMM 907:Spread Spectrum Communications

Lecture 3. Direct Sequence Spread Spectrum Systems. COMM 907:Spread Spectrum Communications COMM 907: Spread Spectrum Communications Lecture 3 Direct Sequence Spread Spectrum Systems Performance of DSSSS with BPSK Modulation in presence of Interference (Jamming) Broadband Interference (Jamming):

More information

A New Compression Method for Encrypted Images

A New Compression Method for Encrypted Images Technology, Volume-2, Issue-2, March-April, 2014, pp. 15-19 IASTER 2014, www.iaster.com Online: 2347-5099, Print: 2348-0009 ABSTRACT A New Compression Method for Encrypted Images S. Manimurugan, Naveen

More information

SIGNAL DETECTION IN NON-GAUSSIAN NOISE BY A KURTOSIS-BASED PROBABILITY DENSITY FUNCTION MODEL

SIGNAL DETECTION IN NON-GAUSSIAN NOISE BY A KURTOSIS-BASED PROBABILITY DENSITY FUNCTION MODEL SIGNAL DETECTION IN NON-GAUSSIAN NOISE BY A KURTOSIS-BASED PROBABILITY DENSITY FUNCTION MODEL A. Tesei, and C.S. Regazzoni Department of Biophysical and Electronic Engineering (DIBE), University of Genoa

More information

Retrieval of Large Scale Images and Camera Identification via Random Projections

Retrieval of Large Scale Images and Camera Identification via Random Projections Retrieval of Large Scale Images and Camera Identification via Random Projections Renuka S. Deshpande ME Student, Department of Computer Science Engineering, G H Raisoni Institute of Engineering and Management

More information

Digital Image Watermarking using MSLDIP (Modified Substitute Last Digit in Pixel)

Digital Image Watermarking using MSLDIP (Modified Substitute Last Digit in Pixel) Digital Watermarking using MSLDIP (Modified Substitute Last Digit in Pixel) Abdelmgeid A. Ali Ahmed A. Radwan Ahmed H. Ismail ABSTRACT The improvements in Internet technologies and growing requests on

More information

ENF ANALYSIS ON RECAPTURED AUDIO RECORDINGS

ENF ANALYSIS ON RECAPTURED AUDIO RECORDINGS ENF ANALYSIS ON RECAPTURED AUDIO RECORDINGS Hui Su, Ravi Garg, Adi Hajj-Ahmad, and Min Wu {hsu, ravig, adiha, minwu}@umd.edu University of Maryland, College Park ABSTRACT Electric Network (ENF) based forensic

More information

Chapter 3 LEAST SIGNIFICANT BIT STEGANOGRAPHY TECHNIQUE FOR HIDING COMPRESSED ENCRYPTED DATA USING VARIOUS FILE FORMATS

Chapter 3 LEAST SIGNIFICANT BIT STEGANOGRAPHY TECHNIQUE FOR HIDING COMPRESSED ENCRYPTED DATA USING VARIOUS FILE FORMATS 44 Chapter 3 LEAST SIGNIFICANT BIT STEGANOGRAPHY TECHNIQUE FOR HIDING COMPRESSED ENCRYPTED DATA USING VARIOUS FILE FORMATS 45 CHAPTER 3 Chapter 3: LEAST SIGNIFICANT BIT STEGANOGRAPHY TECHNIQUE FOR HIDING

More information

Multi-Band Spectrum Allocation Algorithm Based on First-Price Sealed Auction

Multi-Band Spectrum Allocation Algorithm Based on First-Price Sealed Auction BULGARIAN ACADEMY OF SCIENCES CYBERNETICS AND INFORMATION TECHNOLOGIES Volume 17, No 1 Sofia 2017 Print ISSN: 1311-9702; Online ISSN: 1314-4081 DOI: 10.1515/cait-2017-0008 Multi-Band Spectrum Allocation

More information

Attack-Proof Collaborative Spectrum Sensing in Cognitive Radio Networks

Attack-Proof Collaborative Spectrum Sensing in Cognitive Radio Networks Attack-Proof Collaborative Spectrum Sensing in Cognitive Radio Networks Wenkai Wang, Husheng Li, Yan (Lindsay) Sun, and Zhu Han Department of Electrical, Computer and Biomedical Engineering University

More information

An Audio Fingerprint Algorithm Based on Statistical Characteristics of db4 Wavelet

An Audio Fingerprint Algorithm Based on Statistical Characteristics of db4 Wavelet Journal of Information & Computational Science 8: 14 (2011) 3027 3034 Available at http://www.joics.com An Audio Fingerprint Algorithm Based on Statistical Characteristics of db4 Wavelet Jianguo JIANG

More information

Peak-to-Average Power Ratio (PAPR)

Peak-to-Average Power Ratio (PAPR) Peak-to-Average Power Ratio (PAPR) Wireless Information Transmission System Lab Institute of Communications Engineering National Sun Yat-sen University 2011/07/30 王森弘 Multi-carrier systems The complex

More information