Zero-Based Code Modulation Technique for Digital Video Fingerprinting
|
|
- Gervais Harrison
- 5 years ago
- Views:
Transcription
1 Zero-Based Code Modulation Technique for Digital Video Fingerprinting In Koo Kang 1, Hae-Yeoun Lee 1, Won-Young Yoo 2, and Heung-Kyu Lee 1 1 Department of EECS, Korea Advanced Institute of Science and Technology, Guseong-dong, Yuseong-Gu, Deajeon, Korea (Republic of) ikkang@mmc.kaist.ac.kr 2 Digital Contents Research Division, Electronics and Telecommunications Research Institute, 161 Gajeong-dong, Yuseong-gu, Daejeon, , Korea zero2@etri.re.kr Abstract. Digital fingerprinting is a technique to protect digital contents from illegal reproduction and redistribution by marking unique information for individual user. A powerful but simple attack to diminish fingerprint signals is averaging. While several fingerprinting schemes against collusion attacks were proposed, they often do not fully account for multimedia data. In this paper, we propose a zero-based code modulation method which fully reflects marking assumption concept to embedding and detection of signals and anti-collusion code working mechanism as well. By manipulating 0-bit information of binary codes, detection accuracy and code separation under averaging attacks were enhanced. To demonstrate our method, we used an averaging-resilient fingerprint code based on GD-PBIBD theory and applied it video fingerprinting systems. Through the experimental results, we convince our method improves averaging resiliency of fingerprinting systems. 1 Introduction Digital fingerprinting is a copyright protection technique that traces illegal distributions of copyrighted contents. A unique fingerprint code that identifies a recipient is inserted into host contents. When copies of the content are found from illegal routes, the content seller can identify traitors who had distributed the content by extracting the embedded fingerprint code. This technique can be employed as a part system in DRM applications [1]. Averaging attack is a serious problem in digital fingerprinting applications. The averaging attack is an attempt to remove the inserted fingerprints by averaging several copies of the content. There are two main categories for averaging attack-resistant fingerprinting techniques. One is orthogonal modulation fingerprinting techniques; each user is assigned a spread spectrum sequence which is mutually orthogonal to each other as a fingerprint. The other approach is known as coded modulation methods that use collusionresistant fingerprint codes. Boneh et al. introduced a code working concept named Frame-proof code that prevents false alarm of recipients who did not join in averaging attacks up to c colluders [2]. Trappe presented a fingerprinting architecture that adopted the frame-proof idea using BIBD (Balanced Incomplete Block Design) R. Khosla et al. (Eds.): KES 2005, LNAI 3683, pp , Springer-Verlag Berlin Heidelberg 2005
2 Zero-Based Code Modulation Technique for Digital Video Fingerprinting 1109 theory [3]. Most of coded modulation methods are working based on marking assumption which assuming colluders can only change fingerprint code bits in which they have different values [2]. Since most of existing coded modulation works focus on generic data, they do not explore special properties of multimedia data for fingerprint system design. In this paper, we propose a zero-based code modulation method against the averaging attack, which fully reflects the marking assumption to multimedia data. Our method modulates only 0 bit information in fingerprint code so that signal interruptions and signal strength diminution were eliminated. Our experimental results show the proposed method can efficiently embed and detect the fingerprints under averaging attacks along with multimedia data. This paper organized as follows. Section 2 addresses major features of orthogonal modulation methods and coded modulation methods to figure out their problems. In section 3, we describe our fingerprint code scheme and propose the zero-based code modulation method. Its effectiveness is demonstrated in Section 4 through experiments and conclusion is presented in Section 5. 2 Previous Fingerprinting Schemes 2.1 Orthogonal Modulation Method Orthogonal modulation approach is a straightforward method for digital fingerprinting. In this method, N orthogonal signals are used to accommodate N users, i.e. a mutually orthogonal signal is assigned to each user as a fingerprint. To decide the content owner or to trace colluders who made illegal copies, the same number of correlation as the number of users is required so that the detection complexity is high. An additional drawback is that when the number of contents involved in the averaging attack increases, the strength of orthogonal signals is attenuated deservedly so that the detector cannot correctly trace colluders. Assume that correlation is used as a detection statistics and M users join to the coalition to make illegal copy V. The signal of each user is orthogonal so that correlation values will be decreased in inversely proportional to the number of colluders M as follows. 1 1 L. C. = W[] i V[], i wherev = Cj. N M M (1) 1 = Wi [] Ci [] j NM This shows a limitation of detector when orthogonal signals are averaged and we can expect when the large number of users joins to make illegal copies, orthogonal modulation scheme will fail to retrieve colluders successfully. More detail study is well-defined in [4]. 2.2 Coded Modulation Method The coded modulation method was designed to accommodate more users than that of orthogonal method with the same amount of signals. Trappe proposed a representative coded modulation method [3]. The binary fingerprint codes derived from BIBD
3 1110 In Koo Kang et al. theory serve up to c-user averaging resistance. Averaging of up to c codes results in a unique code which can identify all codes associated with the averaging. A fingerprint signal for one user is composed of code bits and orthogonal signals as follows. w j = M i= 1 where b ij are {±1}, which is multiplied by u i according to i-th bit of j-th user code and u i are orthogonal signals for i-th bit position. At the detector, b ij are determined by correlation between w j and u i with a threshold value. When several fingerprint codes are averaged, the detected code is a bit-wise logical AND of those fingerprint codes. By comparing bit positions where the value is 1 in averaged code with a code book, the detector can find out which codes are involved in the alliance. One problem of this method is a difficulty to decide a threshold value. What the detector would concern is magnitudes of detected values. Let suppose 7 users join to the averaging; one code begins with (0,1, ) and all the others begin with (1,1, ), respectively. In order to trace colluders correctly, the colluded code should be recognized as (0,1, ) for the first two bits. However, extracted results could be different from the theoretical result in blind detection. As shown in Fig. 3, some correlation results for the first bit represent bigger values than that of second bit, and that means detector cannot decide the constant threshold value to separate two groups. Mess of correlation points results in incorrect binary result codes and detector will deservedly report innocent users as pirates. For this reason, the embedding method of equation 2 may not guarantee the marking assumption; the main working mechanism of averaging-resilient fingerprint code. b ij u i (2) 3 Zero-Based Code Modulation Technique 3.1 Anti-collusion Fingerprint Code and Embedding Anti-collusion fingerprint codes have a resiliency property for averaging attacks. Averaging attack on anti-collusion codes assumes that the result code is bitwise AND operation of those codes [3]; if at least one 0 is included in the codes at same bit positions, the result code bit at that position should be 0 no matter how many 1s are included in other codes. We used ( v, b, r, k, λ 1, λ2) GD-PBIBD (Group Divisible Partially Balanced Incomplete Block Design) theory to generate our test code for averaging attack-resiliency [5][6]. In ( v, b, r, k, λ 1, λ2 ) GD-PBIBD codes, the k indicates the number of 0s in a v-length code and also means the number of patterns to be embedded in our scheme. The k should be a smaller number than v [6] and that means our code modulation method is more efficient than that of conventional coded modulation method. For tests, we adopted (72,81,9,8,0,1) GD-PBIBD. The length of each fingerprint code is 72 bits and total 81 users can have a unique fingerprint code; each fingerprint code has bit 0s at different positions each other. This code scheme can trace up to 7 users when they deliver averaging attacks with their own codes. In a proposed scheme, the embedder modulates only 0 bit information in codes to fingerprint signals and inserts them to a host data. By utilizing only 0 bit information
4 Zero-Based Code Modulation Technique for Digital Video Fingerprinting 1111 in codes, the embedder handles only core factors of colluder tracing mechanism and the marking assumption. The way of M bits-length fingerprint code modulation is depicted in Fig. 1 and we embedded those signals to host data using commonly used spread spectrum embedding method [7]. Fig. 1. Zero-Based Code Modulation 3.2 Detection Process The detection steps are composed of three stages; estimation of fingerprint signals, examination of fingerprint codes and tracing of pirates. At the estimation step, the detector extracts expected noise-like fingerprint signals from corrupted contents. Because noise-like orthogonal signals are added to original contents, some noise-pass filters are available. At the next step, our detector examines which indexes patterns are embedded in the estimated pattern through a normalized correlation strategy [7] as depicted in Algorithm 1. Since our fingerprint code has fixed number of 0 bit information, k, what the detector has to know is indexes of embedded signals. In case of the number of 0s are over the number k, the content must have been attacked by the way of averaging because the codes cannot have k number of 0 bits at exactly same positions. At the final step, we can find out the pirates by examining the fingerprint code book and the result code. The colluder tracing method is the same way as that of conventional system [3]. 1. Initialize result code bits R 1, R 2,..., R M to 1 2. For estimated signals E 1, E 2,...E K and detector generated signals S 1, S 2,..., S M - calculate correlation between E i and S j (1 I K, 1 j M) - if correlation > threshold then set R j to 0 and resume correlation between E i and S j+1 - else if correlation < threshold then resume correlation between E i and S j+1 Algorithm 1. Fingerprint detection and code decoding 4 Experimental Performance 4.1 Code Separation Experiments We will show experiments of detection value separations and results. This experiment is aimed to see how well the detection values are separated because the reason marking assumption does not work on multimedia is due to unclear separation of detected values. For this purpose, we made a fake code to demonstrate the worst cases of averaging attacks as shown in Fig 2. In a case of 0 bit detection tests, only one, among n
5 1112 In Koo Kang et al. bits at the same bit position in n codes, has a bit 0 and the others have 1. Theoretically, all bits of averaged code are 0. We illustrated detection results of both systems in Fig 3. In (a), (c) and (e), we can see the detected values are getting blended up as the number of collusion increases. This situation happens because as the signals for bit 1are increased in equation 2, the linear correlation values are also increased. However in the proposed scheme, correlation points are clearly divided into two groups and the threshold can be easily determined. Even though detected values for bit 0 are decreased as collusions are increased, we can see two obvious partitions even in 7 collusion case. Therefore, our proposed scheme enhances code detection capabilities to decode the averaged code and to capture the colluders who delivered averaging attacks on multimedia data. Test code for bit 1 detection for a 7 averaging attack (7 codes of 72 bits) user 1~n : 1,1,1,1,1,1,...,1,1,1,1,1,1 Test codes for bit 0 detection for a 7 averaging attack (7 codes of 72 bits) user 1 : 0,1,1,1,1,1,1,0,1,1,1,1,1,1,0,1,1,...,0,1,1,1,1,1,1 user 2 : 1,0,1,1,1,1,1,1,0,1,1,1,1,1,1,0,1,...,1,0,1,1,1,1,1 user 3 : 1,1,0,1,1,1,1,1,1,0,1,1,1,1,1,1,0,...,1,1,0,1,1,1,1... user n : 1,1,1,1,1,1,0,1,1,1,1,1,1,0,1,1,1,...,1,1,1,1,1,1, averaged : 0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,...,0,0,0,0,0,0,0 Fig. 2. Fake codes for 0 and 1 bit detection experiments 4.2 Colluder Tracing Experiments on Video We applied our approach to video data extracted from DVDs and measured the performance of tracing colluders. We used fingerprint code from (72,81,9,8,0,1) GD- PBIBD and CIF (352x288) sized video data as host signals. For the video fingerprinting performance assess, we averaged uniquely fingerprinted contents from 2 collusions to 7 collusion cases 100 times, respectively, and extracted the colluders. Table 1 shows the result of test; the number of correctly extracted colluders for each collusion case. When the number of colluders was below 4, we could trace all colluders successfully. When the colluder number exceeded 4, our detector partially failed to catch all colluders, but could trace at least one user and there was no report on innocent users. Table 1. Detection results from 10 illegal copies of 10 videos for each collusion case Number of extracted colluders collusion collusion collusion collusion collusion collusion collusion
6 Zero-Based Code Modulation Technique for Digital Video Fingerprinting 1113 Fig. 3. Correlation value separation results both systems: detected correlation values for 0 bit (black colored shape) and 1 bit (white colored shape). (a), (c) and (e) are result of legacy systems and (b), (d) and (f) are of the proposed system 5 Conclusions The anti-collusion fingerprint code scheme has a property of the colluder tracing function based on a marking assumption concept. The marking assumption, however, does not work well in multimedia data because the detection scheme of fingerprint signals works with correlation-based method and the results are not always agree with its theoretical result. This disagreement cause wrong detections of innocent users,
7 1114 In Koo Kang et al. which is the most serious problem in fingerprinting applications. To get rid of this trouble, we proposed a zero-based code modulation method which fully reflects running mechanisms of marking assumption and anti-collusion codes. We modulated and embedded only 0 bit information of binary codes so that correlation results for bit 0 and 1 could be separated as maximally as possible. Through code bit separation experiments, we convinced our proposed method is effective to classify two groups of correlation points even though the worst cases of averaging attacks. From video data experiments, we confirmed that the bit separation property was maintained and the detector could trace colluders successfully in the corrupted contents. References 1. Junseok Lee, Seong O.H.: A DRM Framework for Distributing Digital Contents through the Internet, ETRI Journal, 2003, pp D. Boneh, J. Shaw: Collusion-secure fingerprinting for digital data, IEEE Trans. On Information Theory, Vol. 44. (1998) W. Trappe, M. Wu, Zhen Wang, K.J.R. Liu: Anti-collusion Fingerprinting for Multimedia, IEEE Trans. On Signal Processing, Vol. 51. (2003) Z. Jane Wang, Min Wu, Hong Zhao, K. J. Liu and Wade Trappe: Resistance of orthogonal Gaussian fingerprinting to collusion attacks, Proc. of ICASSP, pp , Apr C. J. Colbourn, J. H. Dinitz: The CRC Handbook of Combinatorial Designs, CRC (1996) 6. Willard H. Clatworthy: Tables of two-associate-class partially balanced designs, National Bureau of Standards Washington D.C. U.S. (1973) 7. I. J. Cox, M.L. Miller, J.A. Broom: Digital Watermarking, Morgan Kaufmann Publishers: San Francisco CA (2002)
PERFORMANCE STUDY OF ECC-BASED COLLUSION-RESISTANT MULTIMEDIA FINGERPRINTING
PERFORMANCE STUDY OF ECC-BASED COLLUSION-RESISTANT MULTIMEDIA FINGERPRINTING Shan He and Min Wu ECE Department, University of Maryland, College Park ABSTRACT * Digital fingerprinting is a tool to protect
More informationAnti-Collusion Fingerprinting for Multimedia
Anti-Collusion Fingerprinting for Multimedia Wade Trappe, Min Wu, Zhen Wang, and K. J. Ray Liu Department of Electrical and Computer Engineering University of Maryland, College Park, MD 20742 E-mail: wxt,
More informationAudio Watermarking Based on Multiple Echoes Hiding for FM Radio
INTERSPEECH 2014 Audio Watermarking Based on Multiple Echoes Hiding for FM Radio Xuejun Zhang, Xiang Xie Beijing Institute of Technology Zhangxuejun0910@163.com,xiexiang@bit.edu.cn Abstract An audio watermarking
More informationMULTIMEDIA content can be easily distributed over
302 IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, VOL. 4, NO. 3, SEPTEMBER 2009 Robust MC-CDMA-Based Fingerprinting Against Time-Varying Collusion Attacks Byung-Ho Cha, Student Member, IEEE,
More informationPractical fingerprinting system for images
46 5, 057004 May 2007 Practical fingerprinting system for images Yu-Tzu Lin National Taiwan University Communications and Multimedia Laboratory Department of Computer Science and Information Engineering
More informationCapacity of collusion secure fingerprinting a tradeoff between rate and efficiency
Capacity of collusion secure fingerprinting a tradeoff between rate and efficiency Gábor Tardos School of Computing Science Simon Fraser University and Rényi Institute, Budapest tardos@cs.sfu.ca Abstract
More informationDigital Watermarking Using Homogeneity in Image
Digital Watermarking Using Homogeneity in Image S. K. Mitra, M. K. Kundu, C. A. Murthy, B. B. Bhattacharya and T. Acharya Dhirubhai Ambani Institute of Information and Communication Technology Gandhinagar
More informationDigital Audio Watermarking With Discrete Wavelet Transform Using Fibonacci Numbers
Digital Audio Watermarking With Discrete Wavelet Transform Using Fibonacci Numbers P. Mohan Kumar 1, Dr. M. Sailaja 2 M. Tech scholar, Dept. of E.C.E, Jawaharlal Nehru Technological University Kakinada,
More informationReversible data hiding based on histogram modification using S-type and Hilbert curve scanning
Advances in Engineering Research (AER), volume 116 International Conference on Communication and Electronic Information Engineering (CEIE 016) Reversible data hiding based on histogram modification using
More informationCollusion Secure Fingerprinting. CMLab
Collusion Secure Fingerprinting CMLab 2 Outline Introduction Collusion attack Collusion-resilient fingerprinting Combinatorial designed code Error correction code Orthogonal signals Research issues 3 Introduction
More informationLocal prediction based reversible watermarking framework for digital videos
Local prediction based reversible watermarking framework for digital videos J.Priyanka (M.tech.) 1 K.Chaintanya (Asst.proff,M.tech(Ph.D)) 2 M.Tech, Computer science and engineering, Acharya Nagarjuna University,
More informationTAC Reconfiguration for Paging Optimization in LTE-Based Mobile Communication Systems
TAC Reconfiguration for Paging Optimization in LTE-Based Mobile Communication Systems Hyung-Woo Kang 1, Seok-Joo Koh 1,*, Sang-Kyu Lim 2, and Tae-Gyu Kang 2 1 School of Computer Science and Engineering,
More informationJournal of mathematics and computer science 11 (2014),
Journal of mathematics and computer science 11 (2014), 137-146 Application of Unsharp Mask in Augmenting the Quality of Extracted Watermark in Spatial Domain Watermarking Saeed Amirgholipour 1 *,Ahmad
More informationAn Improved Edge Adaptive Grid Technique To Authenticate Grey Scale Images
An Improved Edge Adaptive Grid Technique To Authenticate Grey Scale Images Ishwarya.M 1, Mary shamala.l 2 M.E, Dept of CSE, IFET College of Engineering, Villupuram, TamilNadu, India 1 Associate Professor,
More informationAnalysis of cognitive radio networks with imperfect sensing
Analysis of cognitive radio networks with imperfect sensing Isameldin Suliman, Janne Lehtomäki and Timo Bräysy Centre for Wireless Communications CWC University of Oulu Oulu, Finland Kenta Umebayashi Tokyo
More informationDepartment of Electronic Engineering FINAL YEAR PROJECT REPORT
Department of Electronic Engineering FINAL YEAR PROJECT REPORT BEngECE-2009/10-- Student Name: CHEUNG Yik Juen Student ID: Supervisor: Prof.
More informationReversible Data Hiding in Encrypted color images by Reserving Room before Encryption with LSB Method
ISSN (e): 2250 3005 Vol, 04 Issue, 10 October 2014 International Journal of Computational Engineering Research (IJCER) Reversible Data Hiding in Encrypted color images by Reserving Room before Encryption
More informationDWT BASED AUDIO WATERMARKING USING ENERGY COMPARISON
DWT BASED AUDIO WATERMARKING USING ENERGY COMPARISON K.Thamizhazhakan #1, S.Maheswari *2 # PG Scholar,Department of Electrical and Electronics Engineering, Kongu Engineering College,Erode-638052,India.
More informationDigital Image Watermarking by Spread Spectrum method
Digital Image Watermarking by Spread Spectrum method Andreja Samčovi ović Faculty of Transport and Traffic Engineering University of Belgrade, Serbia Belgrade, november 2014. I Spread Spectrum Techniques
More informationScale estimation in two-band filter attacks on QIM watermarks
Scale estimation in two-band filter attacks on QM watermarks Jinshen Wang a,b, vo D. Shterev a, and Reginald L. Lagendijk a a Delft University of Technology, 8 CD Delft, etherlands; b anjing University
More informationand compared to a detection threshold to decide whether is watermarked or not. If the detection function is deterministic, the set (1)
IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, VOL. 4, NO. 3, SEPTEMBER 2009 273 On Reliability and Security of Randomized Detectors Against Sensitivity Analysis Attacks Maha El Choubassi, Member,
More informationBlind Image Fidelity Assessment Using the Histogram
Blind Image Fidelity Assessment Using the Histogram M. I. Khalil Abstract An image fidelity assessment and tamper detection using two histogram components of the color image is presented in this paper.
More informationWatermarking-based Image Authentication with Recovery Capability using Halftoning and IWT
Watermarking-based Image Authentication with Recovery Capability using Halftoning and IWT Luis Rosales-Roldan, Manuel Cedillo-Hernández, Mariko Nakano-Miyatake, Héctor Pérez-Meana Postgraduate Section,
More informationMethods for Reducing the Activity Switching Factor
International Journal of Engineering Research and Development e-issn: 2278-67X, p-issn: 2278-8X, www.ijerd.com Volume, Issue 3 (March 25), PP.7-25 Antony Johnson Chenginimattom, Don P John M.Tech Student,
More informationFPGA implementation of DWT for Audio Watermarking Application
FPGA implementation of DWT for Audio Watermarking Application Naveen.S.Hampannavar 1, Sajeevan Joseph 2, C.B.Bidhul 3, Arunachalam V 4 1, 2, 3 M.Tech VLSI Students, 4 Assistant Professor Selection Grade
More informationStudy on OFDM Symbol Timing Synchronization Algorithm
Vol.7, No. (4), pp.43-5 http://dx.doi.org/.457/ijfgcn.4.7..4 Study on OFDM Symbol Timing Synchronization Algorithm Jing Dai and Yanmei Wang* College of Information Science and Engineering, Shenyang Ligong
More informationBlind Dereverberation of Single-Channel Speech Signals Using an ICA-Based Generative Model
Blind Dereverberation of Single-Channel Speech Signals Using an ICA-Based Generative Model Jong-Hwan Lee 1, Sang-Hoon Oh 2, and Soo-Young Lee 3 1 Brain Science Research Center and Department of Electrial
More informationMulti-Resolution Estimation of Optical Flow on Vehicle Tracking under Unpredictable Environments
, pp.32-36 http://dx.doi.org/10.14257/astl.2016.129.07 Multi-Resolution Estimation of Optical Flow on Vehicle Tracking under Unpredictable Environments Viet Dung Do 1 and Dong-Min Woo 1 1 Department of
More informationSymbol Timing Detection for OFDM Signals with Time Varying Gain
International Journal of Control and Automation, pp.4-48 http://dx.doi.org/.4257/ijca.23.6.5.35 Symbol Timing Detection for OFDM Signals with Time Varying Gain Jihye Lee and Taehyun Jeon Seoul National
More informationUniversity of Bristol - Explore Bristol Research. Peer reviewed version Link to published version (if available): /ISCAS.1999.
Fernando, W. A. C., Canagarajah, C. N., & Bull, D. R. (1999). Automatic detection of fade-in and fade-out in video sequences. In Proceddings of ISACAS, Image and Video Processing, Multimedia and Communications,
More informationData Word Length Reduction for Low-Power DSP Software
EE382C: LITERATURE SURVEY, APRIL 2, 2004 1 Data Word Length Reduction for Low-Power DSP Software Kyungtae Han Abstract The increasing demand for portable computing accelerates the study of minimizing power
More informationAvailable online at ScienceDirect. The 4th International Conference on Electrical Engineering and Informatics (ICEEI 2013)
Available online at www.sciencedirect.com ScienceDirect Procedia Technology ( 23 ) 7 3 The 4th International Conference on Electrical Engineering and Informatics (ICEEI 23) BER Performance of Audio Watermarking
More informationIJMIE Volume 2, Issue 4 ISSN:
Reducing PAPR using PTS Technique having standard array in OFDM Deepak Verma* Vijay Kumar Anand* Ashok Kumar* Abstract: Orthogonal frequency division multiplexing is an attractive technique for modern
More informationGENERIC CODE DESIGN ALGORITHMS FOR REVERSIBLE VARIABLE-LENGTH CODES FROM THE HUFFMAN CODE
GENERIC CODE DESIGN ALGORITHMS FOR REVERSIBLE VARIABLE-LENGTH CODES FROM THE HUFFMAN CODE Wook-Hyun Jeong and Yo-Sung Ho Kwangju Institute of Science and Technology (K-JIST) Oryong-dong, Buk-gu, Kwangju,
More informationSimulative Investigations for Robust Frequency Estimation Technique in OFDM System
, pp. 187-192 http://dx.doi.org/10.14257/ijfgcn.2015.8.4.18 Simulative Investigations for Robust Frequency Estimation Technique in OFDM System Kussum Bhagat 1 and Jyoteesh Malhotra 2 1 ECE Department,
More informationFace Detector using Network-based Services for a Remote Robot Application
Face Detector using Network-based Services for a Remote Robot Application Yong-Ho Seo Department of Intelligent Robot Engineering, Mokwon University Mokwon Gil 21, Seo-gu, Daejeon, Republic of Korea yhseo@mokwon.ac.kr
More informationMulti-Radio Channel Detecting Jamming Attack Against Enhanced Jump-Stay Based Rendezvous in Cognitive Radio Networks
Multi-Radio Channel Detecting Jamming Attack Against Enhanced Jump-Stay Based Rendezvous in Cognitive Radio Networks Yang Gao 1, Zhaoquan Gu 1, Qiang-Sheng Hua 2, Hai Jin 2 1 Institute for Interdisciplinary
More informationCombination of Modified Clipping Technique and Selective Mapping for PAPR Reduction
www.ijecs.in International Journal Of Engineering And Computer Science ISSN:2319-7242 Volume 5 Issue 09 September 2016 Page No.17848-17852 Combination of Modified Clipping Technique and Selective Mapping
More informationDESIGN AND IMPLEMENTATION OF AN ALGORITHM FOR MODULATION IDENTIFICATION OF ANALOG AND DIGITAL SIGNALS
DESIGN AND IMPLEMENTATION OF AN ALGORITHM FOR MODULATION IDENTIFICATION OF ANALOG AND DIGITAL SIGNALS John Yong Jia Chen (Department of Electrical Engineering, San José State University, San José, California,
More informationSpread Spectrum Watermarking Using HVS Model and Wavelets in JPEG 2000 Compression
Spread Spectrum Watermarking Using HVS Model and Wavelets in JPEG 2000 Compression Khaly TALL 1, Mamadou Lamine MBOUP 1, Sidi Mohamed FARSSI 1, Idy DIOP 1, Abdou Khadre DIOP 1, Grégoire SISSOKO 2 1. Laboratoire
More informationThe Influence of Image Enhancement Filters on a Watermark Detection Rate Authors
acta graphica 194 udc 004.056.55:655.36 original scientific paper received: -09-011 accepted: 11-11-011 The Influence of Image Enhancement Filters on a Watermark Detection Rate Authors Ante Poljičak, Lidija
More informationA Study on the Enhanced Detection Method Considering the Channel Response in OFDM Based WLAN
A Study on the Enhanced Detection Method Considering the Channel Response in OFDM Based WLAN Hyoung-Goo Jeon 1, Hyun Lee 2, Won-Chul Choi 2, Hyun-Seo Oh 2, and Kyoung-Rok Cho 3 1 Dong Eui University, Busan,
More informationA Novel Fuzzy Neural Network Based Distance Relaying Scheme
902 IEEE TRANSACTIONS ON POWER DELIVERY, VOL. 15, NO. 3, JULY 2000 A Novel Fuzzy Neural Network Based Distance Relaying Scheme P. K. Dash, A. K. Pradhan, and G. Panda Abstract This paper presents a new
More informationUM-Based Image Enhancement in Low-Light Situations
UM-Based Image Enhancement in Low-Light Situations SHWU-HUEY YEN * CHUN-HSIEN LIN HWEI-JEN LIN JUI-CHEN CHIEN Department of Computer Science and Information Engineering Tamkang University, 151 Ying-chuan
More informationA Reversible Data Hiding Scheme Based on Prediction Difference
2017 2 nd International Conference on Computer Science and Technology (CST 2017) ISBN: 978-1-60595-461-5 A Reversible Data Hiding Scheme Based on Prediction Difference Ze-rui SUN 1,a*, Guo-en XIA 1,2,
More informationTWO ALGORITHMS IN DIGITAL AUDIO STEGANOGRAPHY USING QUANTIZED FREQUENCY DOMAIN EMBEDDING AND REVERSIBLE INTEGER TRANSFORMS
TWO ALGORITHMS IN DIGITAL AUDIO STEGANOGRAPHY USING QUANTIZED FREQUENCY DOMAIN EMBEDDING AND REVERSIBLE INTEGER TRANSFORMS Sos S. Agaian 1, David Akopian 1 and Sunil A. D Souza 1 1Non-linear Signal Processing
More informationAn Optimal Pixel-level Self-repairing Authentication. Method for Grayscale Images under a Minimax. Criterion of Distortion Reduction*
An Optimal Pixel-level Self-repairing Authentication Method for Grayscale Images under a Minimax Criterion of Distortion Reduction* Che-Wei Lee 1 and Wen-Hsiang Tsai 1, 2, 1 Department of Computer Science
More informationBackground Dirty Paper Coding Codeword Binning Code construction Remaining problems. Information Hiding. Phil Regalia
Information Hiding Phil Regalia Department of Electrical Engineering and Computer Science Catholic University of America Washington, DC 20064 regalia@cua.edu Baltimore IEEE Signal Processing Society Chapter,
More informationImage Manipulation Detection using Convolutional Neural Network
Image Manipulation Detection using Convolutional Neural Network Dong-Hyun Kim 1 and Hae-Yeoun Lee 2,* 1 Graduate Student, 2 PhD, Professor 1,2 Department of Computer Software Engineering, Kumoh National
More informationImproved Spread Spectrum: A New Modulation Technique for Robust Watermarking
898 IEEE TRANSACTIONS ON SIGNAL PROCESSING, VOL. 51, NO. 4, APRIL 2003 Improved Spread Spectrum: A New Modulation Technique for Robust Watermarking Henrique S. Malvar, Fellow, IEEE, and Dinei A. F. Florêncio,
More informationImplementation of a Visible Watermarking in a Secure Still Digital Camera Using VLSI Design
2009 nternational Symposium on Computing, Communication, and Control (SCCC 2009) Proc.of CST vol.1 (2011) (2011) ACST Press, Singapore mplementation of a Visible Watermarking in a Secure Still Digital
More informationMultiuser Detection for Synchronous DS-CDMA in AWGN Channel
Multiuser Detection for Synchronous DS-CDMA in AWGN Channel MD IMRAAN Department of Electronics and Communication Engineering Gulbarga, 585104. Karnataka, India. Abstract - In conventional correlation
More informationThe Seamless Localization System for Interworking in Indoor and Outdoor Environments
W 12 The Seamless Localization System for Interworking in Indoor and Outdoor Environments Dong Myung Lee 1 1. Dept. of Computer Engineering, Tongmyong University; 428, Sinseon-ro, Namgu, Busan 48520, Republic
More informationRobust and Blind Spatial Watermarking in Digital Image
Robust and lind Spatial Watermarking in Digital Image Santi Prasad Maity Malay Kumar Kundu Dept.of Electronics Telecomm. Machine Intelligence Unit.E.College(D.U.) Indian Statical Institute Howrah -711
More informationHigh-Capacity Reversible Data Hiding in Encrypted Images using MSB Prediction
High-Capacity Reversible Data Hiding in Encrypted Images using MSB Prediction Pauline Puteaux and William Puech; LIRMM Laboratory UMR 5506 CNRS, University of Montpellier; Montpellier, France Abstract
More informationA Visual Cryptography Based Watermark Technology for Individual and Group Images
A Visual Cryptography Based Watermark Technology for Individual and Group Images Azzam SLEIT (Previously, Azzam IBRAHIM) King Abdullah II School for Information Technology, University of Jordan, Amman,
More informationSequential Multi-Channel Access Game in Distributed Cognitive Radio Networks
Sequential Multi-Channel Access Game in Distributed Cognitive Radio Networks Chunxiao Jiang, Yan Chen, and K. J. Ray Liu Department of Electrical and Computer Engineering, University of Maryland, College
More informationAPPLYING EDGE INFORMATION IN YCbCr COLOR SPACE ON THE IMAGE WATERMARKING
APPLYING EDGE INFORMATION IN YCbCr COLOR SPACE ON THE IMAGE WATERMARKING Mansur Jaba 1, Mosbah Elsghair 2, Najib Tanish 1 and Abdusalam Aburgiga 2 1 Alpha University, Serbia and 2 John Naisbitt University,
More informationDirect Binary Search Based Algorithms for Image Hiding
1 Xia ZHUGE, 2 Koi NAKANO 1 School of Electron and Information Engineering, Ningbo University of Technology, No.20 Houhe Lane Haishu District, 315016, Ningbo, Zheiang, China zhugexia2@163.com *2 Department
More informationOFDM Transmission Corrupted by Impulsive Noise
OFDM Transmission Corrupted by Impulsive Noise Jiirgen Haring, Han Vinck University of Essen Institute for Experimental Mathematics Ellernstr. 29 45326 Essen, Germany,. e-mail: haering@exp-math.uni-essen.de
More informationSecure Spread Spectrum Data Embedding and Extraction
Secure Spread Spectrum Data Embedding and Extraction Vaibhav Dhore 1, Pathan Md. Arfat 2 1 Professor, Department of Computer Engineering, RMD Sinhgad School of Engineering, University of Pune, India 2
More informationDesign and Implementation of the DAB/DMB Transmitter Identification Information Decoder
Design and Implementation of the DAB/DMB Transmitter Identification Information Decoder Hongsheng Zhang, Hongyun Wang, Guoyu Wang* and Mingying Lu Abstract The Transmitter Identification Information (TII)
More informationCracking the Sudoku: A Deterministic Approach
Cracking the Sudoku: A Deterministic Approach David Martin Erica Cross Matt Alexander Youngstown State University Youngstown, OH Advisor: George T. Yates Summary Cracking the Sodoku 381 We formulate a
More informationImage Quality Estimation of Tree Based DWT Digital Watermarks
International Journal of Engineering Research and General Science Volume 3, Issue 1, January-February, 215 ISSN 291-273 Image Quality Estimation of Tree Based DWT Digital Watermarks MALVIKA SINGH PG Scholar,
More informationThree-level Code Division Multiplex for Local Area Networks
Three-level Code Division Multiplex for Local Area Networks Mokhtar M. 1,2, Quinlan T. 1 and Walker S.D. 1 1. University of Essex, U.K. 2. Universiti Pertanian Malaysia, Malaysia Abstract: This paper reports
More information3D-Position Estimation for Hand Gesture Interface Using a Single Camera
3D-Position Estimation for Hand Gesture Interface Using a Single Camera Seung-Hwan Choi, Ji-Hyeong Han, and Jong-Hwan Kim Department of Electrical Engineering, KAIST, Gusung-Dong, Yusung-Gu, Daejeon, Republic
More informationA JOINT MODULATION IDENTIFICATION AND FREQUENCY OFFSET CORRECTION ALGORITHM FOR QAM SYSTEMS
A JOINT MODULATION IDENTIFICATION AND FREQUENCY OFFSET CORRECTION ALGORITHM FOR QAM SYSTEMS Evren Terzi, Hasan B. Celebi, and Huseyin Arslan Department of Electrical Engineering, University of South Florida
More informationJoint Transmitter-Receiver Adaptive Forward-Link DS-CDMA System
# - Joint Transmitter-Receiver Adaptive orward-link D-CDMA ystem Li Gao and Tan. Wong Department of Electrical & Computer Engineering University of lorida Gainesville lorida 3-3 Abstract A joint transmitter-receiver
More informationIMPROVED PROBABILITY OF DETECTION AT LOW SNR IN COGNITIVE RADIOS
87 IMPROVED PROBABILITY OF DETECTION AT LOW SNR IN COGNITIVE RADIOS Parvinder Kumar 1, (parvinderkr123@gmail.com)dr. Rakesh Joon 2 (rakeshjoon11@gmail.com)and Dr. Rajender Kumar 3 (rkumar.kkr@gmail.com)
More informationIMAGE TYPE WATER METER CHARACTER RECOGNITION BASED ON EMBEDDED DSP
IMAGE TYPE WATER METER CHARACTER RECOGNITION BASED ON EMBEDDED DSP LIU Ying 1,HAN Yan-bin 2 and ZHANG Yu-lin 3 1 School of Information Science and Engineering, University of Jinan, Jinan 250022, PR China
More informationDistinguishing between Camera and Scanned Images by Means of Frequency Analysis
Distinguishing between Camera and Scanned Images by Means of Frequency Analysis Roberto Caldelli, Irene Amerini, and Francesco Picchioni Media Integration and Communication Center - MICC, University of
More informationAn Area Efficient FFT Implementation for OFDM
Vol. 2, Special Issue 1, May 20 An Area Efficient FFT Implementation for OFDM R.KALAIVANI#1, Dr. DEEPA JOSE#1, Dr. P. NIRMAL KUMAR# # Department of Electronics and Communication Engineering, Anna University
More informationOptimum Rate Allocation for Two-Class Services in CDMA Smart Antenna Systems
810 IEEE TRANSACTIONS ON COMMUNICATIONS, VOL. 51, NO. 5, MAY 2003 Optimum Rate Allocation for Two-Class Services in CDMA Smart Antenna Systems Il-Min Kim, Member, IEEE, Hyung-Myung Kim, Senior Member,
More informationSignal Recovery from Random Measurements
Signal Recovery from Random Measurements Joel A. Tropp Anna C. Gilbert {jtropp annacg}@umich.edu Department of Mathematics The University of Michigan 1 The Signal Recovery Problem Let s be an m-sparse
More informationSpread Spectrum. Chapter 18. FHSS Frequency Hopping Spread Spectrum DSSS Direct Sequence Spread Spectrum DSSS using CDMA Code Division Multiple Access
Spread Spectrum Chapter 18 FHSS Frequency Hopping Spread Spectrum DSSS Direct Sequence Spread Spectrum DSSS using CDMA Code Division Multiple Access Single Carrier The traditional way Transmitted signal
More informationEffect of Embedding Multiple Watermarks in Color Image against Cropping and Salt and Pepper Noise Attacks
International Journal of IT, Engineering and Applied Sciences Research (IJIEASR) ISSN: 239-443 Volume, No., October 202 8 Effect of Embedding Multiple Watermarks in Color Image against Cropping and Salt
More informationTIMA Lab. Research Reports
ISSN 292-862 TIMA Lab. Research Reports TIMA Laboratory, 46 avenue Félix Viallet, 38 Grenoble France ON-CHIP TESTING OF LINEAR TIME INVARIANT SYSTEMS USING MAXIMUM-LENGTH SEQUENCES Libor Rufer, Emmanuel
More informationIntroduction to Video Forgery Detection: Part I
Introduction to Video Forgery Detection: Part I Detecting Forgery From Static-Scene Video Based on Inconsistency in Noise Level Functions IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, VOL. 5,
More informationREVERSIBLE MEDICAL IMAGE WATERMARKING TECHNIQUE USING HISTOGRAM SHIFTING
REVERSIBLE MEDICAL IMAGE WATERMARKING TECHNIQUE USING HISTOGRAM SHIFTING S.Mounika 1, M.L. Mittal 2 1 Department of ECE, MRCET, Hyderabad, India 2 Professor Department of ECE, MRCET, Hyderabad, India ABSTRACT
More informationAN EXTENDED VISUAL CRYPTOGRAPHY SCHEME WITHOUT PIXEL EXPANSION FOR HALFTONE IMAGES. N. Askari, H.M. Heys, and C.R. Moloney
26TH ANNUAL IEEE CANADIAN CONFERENCE ON ELECTRICAL AND COMPUTER ENGINEERING YEAR 2013 AN EXTENDED VISUAL CRYPTOGRAPHY SCHEME WITHOUT PIXEL EXPANSION FOR HALFTONE IMAGES N. Askari, H.M. Heys, and C.R. Moloney
More informationInternational Journal of Advance Research in Computer Science and Management Studies
Volume 3, Issue 2, February 2015 ISSN: 2321 7782 (Online) International Journal of Advance Research in Computer Science and Management Studies Research Article / Survey Paper / Case Study Available online
More informationSINCE orthogonal frequency division multiplexing
IEEE TRANSACTIONS ON BROADCASTING, VOL. 55, NO. 3, SEPTEMBER 2009 679 Bit-Based SLM Schemes for PAPR Reduction in QAM Modulated OFDM Signals Hyun-Bae Jeon, Kyu-Hong Kim, Jong-Seon No, Member, IEEE, and
More informationBEING wideband, chaotic signals are well suited for
680 IEEE TRANSACTIONS ON CIRCUITS AND SYSTEMS II: EXPRESS BRIEFS, VOL. 51, NO. 12, DECEMBER 2004 Performance of Differential Chaos-Shift-Keying Digital Communication Systems Over a Multipath Fading Channel
More informationUtilization of Multipaths for Spread-Spectrum Code Acquisition in Frequency-Selective Rayleigh Fading Channels
734 IEEE TRANSACTIONS ON COMMUNICATIONS, VOL. 49, NO. 4, APRIL 2001 Utilization of Multipaths for Spread-Spectrum Code Acquisition in Frequency-Selective Rayleigh Fading Channels Oh-Soon Shin, Student
More informationInterleaved PC-OFDM to reduce the peak-to-average power ratio
1 Interleaved PC-OFDM to reduce the peak-to-average power ratio A D S Jayalath and C Tellambura School of Computer Science and Software Engineering Monash University, Clayton, VIC, 3800 e-mail:jayalath@cssemonasheduau
More informationJayalakshmi M., S. N. Merchant, Uday B. Desai SPANN Lab, Indian Institute of Technology, Bombay jlakshmi, merchant,
SIGNIFICANT PIXEL WATERMARKING IN CONTOURLET OMAIN Jayalakshmi M., S. N. Merchant, Uday B. esai SPANN Lab, Indian Institute of Technology, Bombay email: jlakshmi, merchant, ubdesai @ee.iitb.ac.in Keywords:
More informationEncryption Data in Wireless Sensor Network
Available Online at www.ijcsmc.com International Journal of Computer Science and Mobile Computing A Monthly Journal of Computer Science and Information Technology ISSN 2320 088X IMPACT FACTOR: 6.017 IJCSMC,
More informationStudy on the UWB Rader Synchronization Technology
Study on the UWB Rader Synchronization Technology Guilin Lu Guangxi University of Technology, Liuzhou 545006, China E-mail: lifishspirit@126.com Shaohong Wan Ari Force No.95275, Liuzhou 545005, China E-mail:
More informationSPARSE CHANNEL ESTIMATION BY PILOT ALLOCATION IN MIMO-OFDM SYSTEMS
SPARSE CHANNEL ESTIMATION BY PILOT ALLOCATION IN MIMO-OFDM SYSTEMS Puneetha R 1, Dr.S.Akhila 2 1 M. Tech in Digital Communication B M S College Of Engineering Karnataka, India 2 Professor Department of
More informationLecture 3. Direct Sequence Spread Spectrum Systems. COMM 907:Spread Spectrum Communications
COMM 907: Spread Spectrum Communications Lecture 3 Direct Sequence Spread Spectrum Systems Performance of DSSSS with BPSK Modulation in presence of Interference (Jamming) Broadband Interference (Jamming):
More informationA New Compression Method for Encrypted Images
Technology, Volume-2, Issue-2, March-April, 2014, pp. 15-19 IASTER 2014, www.iaster.com Online: 2347-5099, Print: 2348-0009 ABSTRACT A New Compression Method for Encrypted Images S. Manimurugan, Naveen
More informationSIGNAL DETECTION IN NON-GAUSSIAN NOISE BY A KURTOSIS-BASED PROBABILITY DENSITY FUNCTION MODEL
SIGNAL DETECTION IN NON-GAUSSIAN NOISE BY A KURTOSIS-BASED PROBABILITY DENSITY FUNCTION MODEL A. Tesei, and C.S. Regazzoni Department of Biophysical and Electronic Engineering (DIBE), University of Genoa
More informationRetrieval of Large Scale Images and Camera Identification via Random Projections
Retrieval of Large Scale Images and Camera Identification via Random Projections Renuka S. Deshpande ME Student, Department of Computer Science Engineering, G H Raisoni Institute of Engineering and Management
More informationDigital Image Watermarking using MSLDIP (Modified Substitute Last Digit in Pixel)
Digital Watermarking using MSLDIP (Modified Substitute Last Digit in Pixel) Abdelmgeid A. Ali Ahmed A. Radwan Ahmed H. Ismail ABSTRACT The improvements in Internet technologies and growing requests on
More informationENF ANALYSIS ON RECAPTURED AUDIO RECORDINGS
ENF ANALYSIS ON RECAPTURED AUDIO RECORDINGS Hui Su, Ravi Garg, Adi Hajj-Ahmad, and Min Wu {hsu, ravig, adiha, minwu}@umd.edu University of Maryland, College Park ABSTRACT Electric Network (ENF) based forensic
More informationChapter 3 LEAST SIGNIFICANT BIT STEGANOGRAPHY TECHNIQUE FOR HIDING COMPRESSED ENCRYPTED DATA USING VARIOUS FILE FORMATS
44 Chapter 3 LEAST SIGNIFICANT BIT STEGANOGRAPHY TECHNIQUE FOR HIDING COMPRESSED ENCRYPTED DATA USING VARIOUS FILE FORMATS 45 CHAPTER 3 Chapter 3: LEAST SIGNIFICANT BIT STEGANOGRAPHY TECHNIQUE FOR HIDING
More informationMulti-Band Spectrum Allocation Algorithm Based on First-Price Sealed Auction
BULGARIAN ACADEMY OF SCIENCES CYBERNETICS AND INFORMATION TECHNOLOGIES Volume 17, No 1 Sofia 2017 Print ISSN: 1311-9702; Online ISSN: 1314-4081 DOI: 10.1515/cait-2017-0008 Multi-Band Spectrum Allocation
More informationAttack-Proof Collaborative Spectrum Sensing in Cognitive Radio Networks
Attack-Proof Collaborative Spectrum Sensing in Cognitive Radio Networks Wenkai Wang, Husheng Li, Yan (Lindsay) Sun, and Zhu Han Department of Electrical, Computer and Biomedical Engineering University
More informationAn Audio Fingerprint Algorithm Based on Statistical Characteristics of db4 Wavelet
Journal of Information & Computational Science 8: 14 (2011) 3027 3034 Available at http://www.joics.com An Audio Fingerprint Algorithm Based on Statistical Characteristics of db4 Wavelet Jianguo JIANG
More informationPeak-to-Average Power Ratio (PAPR)
Peak-to-Average Power Ratio (PAPR) Wireless Information Transmission System Lab Institute of Communications Engineering National Sun Yat-sen University 2011/07/30 王森弘 Multi-carrier systems The complex
More information