Information Hiding: Steganography & Steganalysis
|
|
- Marilyn Hodge
- 5 years ago
- Views:
Transcription
1 Information Hiding: Steganography & Steganalysis 1
2 Steganography ( covered writing ) From Herodotus to Thatcher. Messages should be undetectable. Messages concealed in media files. Perceptually insignificant data is common in media representations. 2
3 Steganalysis Detecting the presence of a message. Statistically based. Extraction of message itself is secondary. 3
4 Steganography: Definition Simmons 1983: Prisoners problem USA USSR non-proliferation treaty compliance checking Alice and Bob are prisoners, Wendy is a warden. Alice and Bob are allowed to exchange messages, say images, but Wendy checks all messages. Alice and Bob try to hide information in their messages so that Wendy cannot detect it. Wendy cannot arbitrarily suppress all messages; the prisoners human rights cannot be violated without some proof of illegal activity. 4
5 Hiding by Matching Input LSB sequence c 1,c 2,c 3,...,c n. Message bits m 1,m 2,m 3,...,m k, k<n. Look for a good approximate match. Theorem: If the the number of matching bits should exceed chance then the cover should be exponentially longer that the message. Hiding by matching is very wasteful (you can hide very few bits this way) 5
6 LSB Methods (least significant bit) The given cover is an image. Image represented by pixel values raw images: each pixel is a byte (gray value) raw images: each pixel is a byte (color index in a palette) raw images: each pixel is three bytes (r,g,b values) Image represented by a sequence of JPEG coefficients. LSBs of pixel values or JPEG coefficients can be altered freely. There are many LSBs in an image. 6
7 Original Image 7
8 80% JPEG 8
9 JPEG Inserted into the Original Image 9
10 Image File Formats An image is a two-dimensional array of image points or pixels. Gray-level images: each pixel is described by one number corresponding to its brightness. Color images: each pixel is described by three numbers corresponding to the brightnesses of the three primary colors e.g., red, green, and blue. A typical image file has two parts, the header and the raster data. The header contains the magic number identifying the format, the image dimensions, and other format-specific information that describes how the raster data relates to image points or pixels. The raster data is a sequence of numbers that contains specific information about colors and brightnesses of image points. 10
11 Raw Image File Formats (e.g. BMP and PGM, TIFF) The header contains the magic number and image dimensions. The raster data is a sequence of numbers corresponding to either one or three color values at each pixel. Raw (uncompressed) images are quite large and require a lot of storage space. Some space saving can be obtained by compressing the raster data by using loss-less compression (e.g. TIFF and PNG formats). 11
12 Pallete Images Frequently, raw images contain much more information than required. In images saved for human viewing the reduction of the number of possible colors. In some formats (e.g. GIF and PNG) the image is saved using a reduced color set. Each pixel value is represented by a single number corresponding to an index in the color palette that is stored in the image header. The palette contains the information needed to restore colors of all image pixels. The image file can be made even smaller by using loss-less compression of the raster data e.g., run-length encoding represents a sequence of several pixels of the same color by just two numbers, the length and the color of the sequence (run). 12
13 Lossy Compression: JPEG Removes some image details to obtain considerable saving of storage space without much loss of image quality. The savings are based on the fact that humans are more sensitive to changes in lower spatial frequencies than in than the higher ones. In addition, it is believed that humans perceive brightness more accurately than chromaticity. JPEG uses YCrCbformat to save brightness information (Y )infull resolution and chromaticity information (Cr and Cb) in half resolution. At the encoder side each channel is divided into 8 8 blocks and transformed using the two-dimensional discrete cosine transform (DCT). 13
14 JPEG: DCT Transform Let f(i, j), i,j=0,...,n 1 be an N N image block in any of the channels and let F (u, v), u,v=0,...,n 1 be its DCT transform. The relationship between f(i, j) and F (u, v) is given by F (u, v) = 2 N 1 N C(u)C(v) f(i, j) = 2 N N 1 u=0 N 1 v=0 i=0 N 1 j=0 f(i, j)cos C(u)C(v)F (u, v)cos ( πu(2i +1) 2N ( πu(2i +1) 2N where C(u) =1/ 2 for u =0and C(u) =1otherwise. ) ) cos cos ( πv(2j +1) 2N ( πv(2j +1) 2N ) ) 14
15 JPEG: Quantization ADCTofan8 8 block of integers is an 8 8 block of real numbers. The coefficient F (0, 0) is the DC coefficient and all others are called the AC coefficients. JPEG divides the coefficients by values from a quantization table to replace the real number values by integers. It is expected that many coefficients for higher values of u + v become zero and that only a fraction of all coefficients will remain nonzero. The coefficients are reordered into a linear array by placing higher frequency coefficients (higher values of u + v) at the end of the array; those coefficients are most likely to be zeroes. Huffman codding is applied to all coefficients from all blocks in the image; zero valued coefficients are encoded separately using special markers and their count for additional saving. 15
16 A header consists of image type and dimensions, compression parameters, and the quantization table. It is combined with the Huffman encoded coefficients packed as a sequence of bits to form a JPEG encoded image. On the decoder side the integer valued coefficients are restored by Huffman decoding. The quantization is reversed and the inverse DCT is applied to obtain the image. Huffman coding is loss-less; the losses occur in quantization process. 16
17 JPEG: Quantization Table (u,v) Default JPEG quantization table. The coefficients are divided by their corresponding values and then rounded to the nearest integer. 17
18 Secret Key Based Steganography If system depends on the secrecy of the method there is no key involved pure steganography. Not desirable Kerkhoff s principle Compression + Encryption of the message Secret Key based staganography Public/Private Key Steganography 18
19 Lossy vs. Lossless Steganography Lossless steganography: modify lossless compression methods. An example would be modifying run length encoding process to embed messages. During the encoding process the method checks all run lengths longer than one pixel. Suppose that a run length of ten pixels is considered and that one bit needs to be embedded. To embed a bit one the run length is split into two parts whose lengths add to ten, say nine and one; to embed a bit zero the run length is left unmodified. The receivers check all run lengths. Two run lengths of the same color are decoded as a one. 19
20 A run length longer than one pixel, preceded and followed by run lengths of different colors, are decoded as a zero. Clearly, this technique relies on obscurity since detecting a file with information embedded by this technique is not hard. Lossy steganography: replace LSBs (least significant bits), modify PoVs (pairs of values) We are interested in lossy steganography. 20
21 Embedding by Modifying Carrier Bits First approach identifies the carrier bits i.e. the bits that will encode a message and modifies them to encode the message. These carrier bits could be one or more LSBs of selected bytes of raster data the selection process itself can use a key to select these bytes in pseudo-random order. Also, the raster data can be either raw image bytes (brightnesses and colors), or JPEG coefficients. Embedding is done by modifying the carrier bits suitably to encode the message. The message can be decoded from the carrier bits only i.e., the receiver identifies the carrier bits and extracts the message using the key and the algorithm. 21
22 These techniques can be compared using the following criteria (Westfeld, F5): The embedding rate the number of embedded bits per a carrier bit. The embedding efficiency the expected number of embedded message bits per modified carrier bit. The change rate the average percentage of modified carrier bits. 22
Chapter 3 LEAST SIGNIFICANT BIT STEGANOGRAPHY TECHNIQUE FOR HIDING COMPRESSED ENCRYPTED DATA USING VARIOUS FILE FORMATS
44 Chapter 3 LEAST SIGNIFICANT BIT STEGANOGRAPHY TECHNIQUE FOR HIDING COMPRESSED ENCRYPTED DATA USING VARIOUS FILE FORMATS 45 CHAPTER 3 Chapter 3: LEAST SIGNIFICANT BIT STEGANOGRAPHY TECHNIQUE FOR HIDING
More informationThe Strengths and Weaknesses of Different Image Compression Methods. Samuel Teare and Brady Jacobson
The Strengths and Weaknesses of Different Image Compression Methods Samuel Teare and Brady Jacobson Lossy vs Lossless Lossy compression reduces a file size by permanently removing parts of the data that
More informationA Study on Steganography to Hide Secret Message inside an Image
A Study on Steganography to Hide Secret Message inside an Image D. Seetha 1, Dr.P.Eswaran 2 1 Research Scholar, School of Computer Science and Engineering, 2 Assistant Professor, School of Computer Science
More informationBasic concepts of Digital Watermarking. Prof. Mehul S Raval
Basic concepts of Digital Watermarking Prof. Mehul S Raval Mutual dependencies Perceptual Transparency Payload Robustness Security Oblivious Versus non oblivious Cryptography Vs Steganography Cryptography
More informationCompression and Image Formats
Compression Compression and Image Formats Reduce amount of data used to represent an image/video Bit rate and quality requirements Necessary to facilitate transmission and storage Required quality is application
More informationCh. 3: Image Compression Multimedia Systems
4/24/213 Ch. 3: Image Compression Multimedia Systems Prof. Ben Lee (modified by Prof. Nguyen) Oregon State University School of Electrical Engineering and Computer Science Outline Introduction JPEG Standard
More informationIntroduction to More Advanced Steganography. John Ortiz. Crucial Security Inc. San Antonio
Introduction to More Advanced Steganography John Ortiz Crucial Security Inc. San Antonio John.Ortiz@Harris.com 210 977-6615 11/17/2011 Advanced Steganography 1 Can YOU See the Difference? Which one of
More information<Simple LSB Steganography and LSB Steganalysis of BMP Images>
COMP 4230-201 Computer Vision Final Project, UMass Lowell Abstract This document describes a
More informationAn Integrated Image Steganography System. with Improved Image Quality
Applied Mathematical Sciences, Vol. 7, 2013, no. 71, 3545-3553 HIKARI Ltd, www.m-hikari.com http://dx.doi.org/10.12988/ams.2013.34236 An Integrated Image Steganography System with Improved Image Quality
More informationA SECURE IMAGE STEGANOGRAPHY USING LEAST SIGNIFICANT BIT TECHNIQUE
Int. J. Engg. Res. & Sci. & Tech. 2014 Amit and Jyoti Pruthi, 2014 Research Paper A SECURE IMAGE STEGANOGRAPHY USING LEAST SIGNIFICANT BIT TECHNIQUE Amit 1 * and Jyoti Pruthi 1 *Corresponding Author: Amit
More informationInternational Journal of Advance Engineering and Research Development IMAGE BASED STEGANOGRAPHY REVIEW OF LSB AND HASH-LSB TECHNIQUES
Scientific Journal of Impact Factor (SJIF) : 3.134 ISSN (Print) : 2348-6406 ISSN (Online): 2348-4470 ed International Journal of Advance Engineering and Research Development IMAGE BASED STEGANOGRAPHY REVIEW
More information2.1. General Purpose Run Length Encoding Relative Encoding Tokanization or Pattern Substitution
2.1. General Purpose There are many popular general purpose lossless compression techniques, that can be applied to any type of data. 2.1.1. Run Length Encoding Run Length Encoding is a compression technique
More informationColored Digital Image Watermarking using the Wavelet Technique
American Journal of Applied Sciences 4 (9): 658-662, 2007 ISSN 1546-9239 2007 Science Publications Corresponding Author: Colored Digital Image Watermarking using the Wavelet Technique 1 Mohammed F. Al-Hunaity,
More informationISSN (PRINT): , (ONLINE): , VOLUME-4, ISSUE-11,
FPGA IMPLEMENTATION OF LSB REPLACEMENT STEGANOGRAPHY USING DWT M.Sathya 1, S.Chitra 2 Assistant Professor, Prince Dr. K.Vasudevan College of Engineering and Technology ABSTRACT An enhancement of data protection
More informationA New Steganographic Method for Palette-Based Images
A New Steganographic Method for Palette-Based Images Jiri Fridrich Center for Intelligent Systems, SUNY Binghamton, Binghamton, NY 13902-6000 Abstract In this paper, we present a new steganographic technique
More informationDifferent Steganography Methods and Performance Analysis
International Journal of Engineering Inventions ISSN: 2278-7461, ISBN: 2319-6491 Volume 2, Issue 1 (January 2013) PP: 37-45 Different Steganography Methods and Performance Analysis Shantala.C.P 1, K.V
More informationDigital Images: A Technical Introduction
Digital Images: A Technical Introduction Images comprise a significant portion of a multimedia application This is an introduction to what is under the technical hood that drives digital images particularly
More informationAn Enhanced Least Significant Bit Steganography Technique
An Enhanced Least Significant Bit Steganography Technique Mohit Abstract - Message transmission through internet as medium, is becoming increasingly popular. Hence issues like information security are
More informationImages with (a) coding redundancy; (b) spatial redundancy; (c) irrelevant information
Images with (a) coding redundancy; (b) spatial redundancy; (c) irrelevant information 1992 2008 R. C. Gonzalez & R. E. Woods For the image in Fig. 8.1(a): 1992 2008 R. C. Gonzalez & R. E. Woods Measuring
More informationSteganography & Steganalysis of Images. Mr C Rafferty Msc Comms Sys Theory 2005
Steganography & Steganalysis of Images Mr C Rafferty Msc Comms Sys Theory 2005 Definitions Steganography is hiding a message in an image so the manner that the very existence of the message is unknown.
More informationAssistant Lecturer Sama S. Samaan
MP3 Not only does MPEG define how video is compressed, but it also defines a standard for compressing audio. This standard can be used to compress the audio portion of a movie (in which case the MPEG standard
More informationLSB Encoding. Technical Paper by Mark David Gan
Technical Paper by Mark David Gan Chameleon is an image steganography software developed by Mark David Gan for his thesis at STI College Bacoor, a computer college of the STI Network in the Philippines.
More informationImages and Graphics. 4. Images and Graphics - Copyright Denis Hamelin - Ryerson University
Images and Graphics Images and Graphics Graphics and images are non-textual information that can be displayed and printed. Graphics (vector graphics) are an assemblage of lines, curves or circles with
More informationChapter 9 Image Compression Standards
Chapter 9 Image Compression Standards 9.1 The JPEG Standard 9.2 The JPEG2000 Standard 9.3 The JPEG-LS Standard 1IT342 Image Compression Standards The image standard specifies the codec, which defines how
More information15110 Principles of Computing, Carnegie Mellon University
1 Overview Human sensory systems and digital representations Digitizing images Digitizing sounds Video 2 HUMAN SENSORY SYSTEMS 3 Human limitations Range only certain pitches and loudnesses can be heard
More informationA Proposed Technique For Hiding Data Into Video Files
www.ijcsi.org 68 A Proposed Technique For Hiding Data Into Video Files Mohamed Elbayoumy 1, Mohammed Elmogy 2, Ahmed Abouelfetouh 3 and Rasha Elhadary 4 1 Information systems department, Faculty of computer
More informationDigital Media. Lecture 4: Bitmapped images: Compression & Convolution Georgia Gwinnett College School of Science and Technology Dr.
Digital Media Lecture 4: Bitmapped images: Compression & Convolution Georgia Gwinnett College School of Science and Technology Dr. Mark Iken Bitmapped image compression Consider this image: With no compression...
More informationFPGA implementation of LSB Steganography method
FPGA implementation of LSB Steganography method Pangavhane S.M. 1 &Punde S.S. 2 1,2 (E&TC Engg. Dept.,S.I.E.RAgaskhind, SPP Univ., Pune(MS), India) Abstract : "Steganography is a Greek origin word which
More informationDetection of Steganography using Metadata in Jpeg Files
IJoFCS (2015) 1, 23-28 DOI: 10.5769/J201501003 or http://dx.doi.org/10.5769/j201501003 The International Journal of FORENSIC COMPUTER SCIENCE www.ijofcs.org Detection of Steganography using Metadata in
More informationA Novel Approach of Compressing Images and Assessment on Quality with Scaling Factor
A Novel Approach of Compressing Images and Assessment on Quality with Scaling Factor Umesh 1,Mr. Suraj Rana 2 1 M.Tech Student, 2 Associate Professor (ECE) Department of Electronic and Communication Engineering
More information3. Image Formats. Figure1:Example of bitmap and Vector representation images
3. Image Formats. Introduction With the growth in computer graphics and image applications the ability to store images for later manipulation became increasingly important. With no standards for image
More informationSTEGANOGRAPHY. Sergey Grabkovsky
STEGANOGRAPHY Sergey Grabkovsky WHICH OF THESE HAS A HIDDEN MESSAGE? Fishing freshwater bends and saltwater coasts rewards anyone feeling stressed. Resourceful anglers usually find masterful leapers fun
More information15110 Principles of Computing, Carnegie Mellon University
1 Last Time Data Compression Information and redundancy Huffman Codes ALOHA Fixed Width: 0001 0110 1001 0011 0001 20 bits Huffman Code: 10 0000 010 0001 10 15 bits 2 Overview Human sensory systems and
More informationELTYEB E. ABED ELGABAR
35 Evaluation of LSB Data Hiding in Various Images ELTYEB E. ABED ELGABAR Information Technology, College of Computers and Information Technology - Khulais, King Abdul Aziz University, Jeddah, Khulais,
More informationWhat You ll Learn Today
CS101 Lecture 18: Image Compression Aaron Stevens 21 October 2010 Some material form Wikimedia Commons Special thanks to John Magee and his dog 1 What You ll Learn Today Review: how big are image files?
More informationHybrid Coding (JPEG) Image Color Transform Preparation
Hybrid Coding (JPEG) 5/31/2007 Kompressionsverfahren: JPEG 1 Image Color Transform Preparation Example 4: 2: 2 YUV, 4: 1: 1 YUV, and YUV9 Coding Luminance (Y): brightness sampling frequency 13.5 MHz Chrominance
More informationImproved RGB -LSB Steganography Using Secret Key Ankita Gangwar 1, Vishal shrivastava 2
Improved RGB -LSB Steganography Using Secret Key Ankita Gangwar 1, Vishal shrivastava 2 Computer science Department 1, Computer science department 2 Research scholar 1, professor 2 Mewar University, India
More informationImages and Colour COSC342. Lecture 2 2 March 2015
Images and Colour COSC342 Lecture 2 2 March 2015 In this Lecture Images and image formats Digital images in the computer Image compression and formats Colour representation Colour perception Colour spaces
More informationA Study on Image Steganography Approaches in Digital Images
A Study on Image Steganography Approaches in Digital Images R.M. Yadav 1, Dr. Deepak Singh Tomar 2, Dr. R.K. Baghel 3 Department of CSE&IT, ECE, MANIT, Bhopal, M.P., India rmyyadav@rediffmail.com 1, deepaktomarmanit@gmail.com
More informationA New Representation of Image Through Numbering Pixel Combinations
A New Representation of Image Through Numbering Pixel Combinations J. Said 1, R. Souissi, H. Hamam 1 1 Faculty of Engineering Moncton, NB Canada ISET-Sfax Tunisia Habib.Hamam@umoncton.ca ABSTRACT: A new
More informationComputer Graphics. Si Lu. Fall er_graphics.htm 10/02/2015
Computer Graphics Si Lu Fall 2017 http://www.cs.pdx.edu/~lusi/cs447/cs447_547_comput er_graphics.htm 10/02/2015 1 Announcements Free Textbook: Linear Algebra By Jim Hefferon http://joshua.smcvt.edu/linalg.html/
More informationAnalysis of Secure Text Embedding using Steganography
Analysis of Secure Text Embedding using Steganography Rupinder Kaur Department of Computer Science and Engineering BBSBEC, Fatehgarh Sahib, Punjab, India Deepak Aggarwal Department of Computer Science
More informationREVIEW OF IMAGE COMPRESSION TECHNIQUES FOR MULTIMEDIA IMAGES
REVIEW OF IMAGE COMPRESSION TECHNIQUES FOR MULTIMEDIA IMAGES 1 Tamanna, 2 Neha Bassan 1 Student- Department of Computer science, Lovely Professional University Phagwara 2 Assistant Professor, Department
More informationImage Compression Supported By Encryption Using Unitary Transform
Image Compression Supported By Encryption Using Unitary Transform Arathy Nair 1, Sreejith S 2 1 (M.Tech Scholar, Department of CSE, LBS Institute of Technology for Women, Thiruvananthapuram, India) 2 (Assistant
More informationPooja Rani(M.tech) *, Sonal ** * M.Tech Student, ** Assistant Professor
A Study of Image Compression Techniques Pooja Rani(M.tech) *, Sonal ** * M.Tech Student, ** Assistant Professor Department of Computer Science & Engineering, BPS Mahila Vishvavidyalya, Sonipat kulriapooja@gmail.com,
More informationA New Steganographic Method Based on the Run Length of the Stego-Message. Eyas El-Qawasmeh and Alaa Alomari
A New Steganographic Method Based on the Run Length of the Stego-Message Eyas El-Qawasmeh and Alaa Alomari Jordan University of Science and Technology eyas@just.edu.jo Abstract. This work will propose
More informationAn Implementation of LSB Steganography Using DWT Technique
An Implementation of LSB Steganography Using DWT Technique G. Raj Kumar, M. Maruthi Prasada Reddy, T. Lalith Kumar Electronics & Communication Engineering #,JNTU A University Electronics & Communication
More informationThe Scientist and Engineer's Guide to Digital Signal Processing By Steven W. Smith, Ph.D.
The Scientist and Engineer's Guide to Digital Signal Processing By Steven W. Smith, Ph.D. Home The Book by Chapters About the Book Steven W. Smith Blog Contact Book Search Download this chapter in PDF
More informationSteganography using LSB bit Substitution for data hiding
ISSN: 2277 943 Volume 2, Issue 1, October 213 Steganography using LSB bit Substitution for data hiding Himanshu Gupta, Asst.Prof. Ritesh Kumar, Dr.Soni Changlani Department of Electronics and Communication
More informationThe next table shows the suitability of each format to particular applications.
What are suitable file formats to use? The four most common file formats used are: TIF - Tagged Image File Format, uncompressed and compressed formats PNG - Portable Network Graphics, standardized compression
More informationCompression. Encryption. Decryption. Decompression. Presentation of Information to client site
DOCUMENT Anup Basu Audio Image Video Data Graphics Objectives Compression Encryption Network Communications Decryption Decompression Client site Presentation of Information to client site Multimedia -
More informationPRIOR IMAGE JPEG-COMPRESSION DETECTION
Applied Computer Science, vol. 12, no. 3, pp. 17 28 Submitted: 2016-07-27 Revised: 2016-09-05 Accepted: 2016-09-09 Compression detection, Image quality, JPEG Grzegorz KOZIEL * PRIOR IMAGE JPEG-COMPRESSION
More informationLossy and Lossless Compression using Various Algorithms
Available Online at www.ijcsmc.com International Journal of Computer Science and Mobile Computing A Monthly Journal of Computer Science and Information Technology ISSN 2320 088X IMPACT FACTOR: 6.017 IJCSMC,
More informationModule 6 STILL IMAGE COMPRESSION STANDARDS
Module 6 STILL IMAGE COMPRESSION STANDARDS Lesson 16 Still Image Compression Standards: JBIG and JPEG Instructional Objectives At the end of this lesson, the students should be able to: 1. Explain the
More informationIndexed Color. A browser may support only a certain number of specific colors, creating a palette from which to choose
Indexed Color A browser may support only a certain number of specific colors, creating a palette from which to choose Figure 3.11 The Netscape color palette 1 QUIZ How many bits are needed to represent
More informationThe Need for Data Compression. Data Compression (for Images) -Compressing Graphical Data. Lossy vs Lossless compression
The Need for Data Compression Data Compression (for Images) -Compressing Graphical Data Graphical images in bitmap format take a lot of memory e.g. 1024 x 768 pixels x 24 bits-per-pixel = 2.4Mbyte =18,874,368
More informationINTERNATIONAL JOURNAL OF PURE AND APPLIED RESEARCH IN ENGINEERING AND TECHNOLOGY
INTERNATIONAL JOURNAL OF PURE AND APPLIED RESEARCH IN ENGINEERING AND TECHNOLOGY A PATH FOR HORIZING YOUR INNOVATIVE WORK IMAGE COMPRESSION FOR TROUBLE FREE TRANSMISSION AND LESS STORAGE SHRUTI S PAWAR
More informationCS 262 Lecture 01: Digital Images and Video. John Magee Some material copyright Jones and Bartlett
CS 262 Lecture 01: Digital Images and Video John Magee Some material copyright Jones and Bartlett 1 Overview/Questions What is digital information? What is color? How do pictures get encoded into binary
More informationImage Processing Computer Graphics I Lecture 20. Display Color Models Filters Dithering Image Compression
15-462 Computer Graphics I Lecture 2 Image Processing April 18, 22 Frank Pfenning Carnegie Mellon University http://www.cs.cmu.edu/~fp/courses/graphics/ Display Color Models Filters Dithering Image Compression
More informationExploiting the RGB Intensity Values to Implement a Novel Dynamic Steganography Scheme
Exploiting the RGB Intensity Values to Implement a Novel Dynamic Steganography Scheme Surbhi Gupta 1, Parvinder S. Sandhu 2 Abstract Steganography means covered writing. It is the concealment of information
More informationGuide to Computer Forensics and Investigations Third Edition. Chapter 10 Chapter 10 Recovering Graphics Files
Guide to Computer Forensics and Investigations Third Edition Chapter 10 Chapter 10 Recovering Graphics Files Objectives Describe types of graphics file formats Explain types of data compression Explain
More informationLECTURE 03 BITMAP IMAGE FORMATS
MULTIMEDIA TECHNOLOGIES LECTURE 03 BITMAP IMAGE FORMATS IMRAN IHSAN ASSISTANT PROFESSOR IMAGE FORMATS To store an image, the image is represented in a two dimensional matrix of pixels. Information about
More informationCS101 Lecture 19: Digital Images. John Magee 18 July 2013 Some material copyright Jones and Bartlett. Overview/Questions
CS101 Lecture 19: Digital Images John Magee 18 July 2013 Some material copyright Jones and Bartlett 1 Overview/Questions What is digital information? What is color? How do pictures get encoded into binary
More informationHuffman Coding For Digital Photography
Huffman Coding For Digital Photography Raydhitya Yoseph 13509092 Program Studi Teknik Informatika Sekolah Teknik Elektro dan Informatika Institut Teknologi Bandung, Jl. Ganesha 10 Bandung 40132, Indonesia
More information2. REVIEW OF LITERATURE
2. REVIEW OF LITERATURE Digital image processing is the use of the algorithms and procedures for operations such as image enhancement, image compression, image analysis, mapping. Transmission of information
More informationSubjective evaluation of image color damage based on JPEG compression
2014 Fourth International Conference on Communication Systems and Network Technologies Subjective evaluation of image color damage based on JPEG compression Xiaoqiang He Information Engineering School
More informationSYLLABUS CHAPTER - 2 : INTENSITY TRANSFORMATIONS. Some Basic Intensity Transformation Functions, Histogram Processing.
Contents i SYLLABUS UNIT - I CHAPTER - 1 : INTRODUCTION TO DIGITAL IMAGE PROCESSING Introduction, Origins of Digital Image Processing, Applications of Digital Image Processing, Fundamental Steps, Components,
More informationLecture - 3. by Shahid Farid
Lecture - 3 by Shahid Farid Image Digitization Raster versus vector images Progressive versus interlaced display Popular image file formats Why so many formats? Shahid Farid, PUCIT 2 To create a digital
More information1 Li & Drew c Prentice Hall Li & Drew c Prentice Hall 2003
Chapter 3 Graphics and Image Data Representations 3.1 Graphics/Image Data Types 3.2 Popular File Formats 3.3 Further Exploration 3.1 Graphics/Image Data Types The number of file formats used in multimedia
More informationHTTP transaction with Graphics HTML file + two graphics files
HTTP transaction with Graphics HTML file + two graphics files Graphics are grids of Pixels (Picture Elements) Each pixel is exactly one color. At normal screen resolution you can't tell they are square.
More informationA New Secure Image Steganography Using Lsb And Spiht Based Compression Method M.J.Thenmozhi 1, Dr.T.Menakadevi 2
A New Secure Image Steganography Using Lsb And Spiht Based Compression Method M.J.Thenmozhi 1, Dr.T.Menakadevi 2 1 PG Scholar, Department of ECE, Adiyamaan college of Engineering,Hosur, Tamilnadu, India
More informationCommon File Formats. Need to store an image on disk Real photos Synthetic renderings Composed images. Desirable Features High quality.
Image File Format 1 Common File Formats Need to store an image on disk Real photos Synthetic renderings Composed images Multiple sources Desirable Features High quality Lossy vs Lossless formats Channel
More informationRaster Image File Formats
Raster Image File Formats 1995-2016 Josef Pelikán & Alexander Wilkie CGG MFF UK Praha pepca@cgg.mff.cuni.cz http://cgg.mff.cuni.cz/~pepca/ 1 / 35 Raster Image Capture Camera Area sensor (CCD, CMOS) Colours:
More informationImage Compression and Decompression Technique Based on Block Truncation Coding (BTC) And Perform Data Hiding Mechanism in Decompressed Image
EUROPEAN ACADEMIC RESEARCH Vol. III, Issue 1/ April 2015 ISSN 2286-4822 www.euacademic.org Impact Factor: 3.4546 (UIF) DRJI Value: 5.9 (B+) Image Compression and Decompression Technique Based on Block
More informationTemplates and Image Pyramids
Templates and Image Pyramids 09/07/17 Computational Photography Derek Hoiem, University of Illinois Why does a lower resolution image still make sense to us? What do we lose? Image: http://www.flickr.com/photos/igorms/136916757/
More informationAnti aliasing and Graphics Formats
Anti aliasing and Graphics Formats Eric C. McCreath School of Computer Science The Australian National University ACT 0200 Australia ericm@cs.anu.edu.au Overview 2 Nyquist sampling frequency supersampling
More informationProf. Feng Liu. Fall /02/2018
Prof. Feng Liu Fall 2018 http://www.cs.pdx.edu/~fliu/courses/cs447/ 10/02/2018 1 Announcements Free Textbook: Linear Algebra By Jim Hefferon http://joshua.smcvt.edu/linalg.html/ Homework 1 due in class
More informationDigital Image Processing Introduction
Digital Processing Introduction Dr. Hatem Elaydi Electrical Engineering Department Islamic University of Gaza Fall 2015 Sep. 7, 2015 Digital Processing manipulation data might experience none-ideal acquisition,
More informationComputers and Imaging
Computers and Imaging Telecommunications 1 P. Mathys Two Different Methods Vector or object-oriented graphics. Images are generated by mathematical descriptions of line (vector) segments. Bitmap or raster
More informationColor & Compression. Robin Strand Centre for Image analysis Swedish University of Agricultural Sciences Uppsala University
Color & Compression Robin Strand Centre for Image analysis Swedish University of Agricultural Sciences Uppsala University Outline Color Color spaces Multispectral images Pseudocoloring Color image processing
More informationA New Image Steganography Depending On Reference & LSB
A New Image Steganography Depending On & LSB Saher Manaseer 1*, Asmaa Aljawawdeh 2 and Dua Alsoudi 3 1 King Abdullah II School for Information Technology, Computer Science Department, The University of
More informationA Hybrid Technique for Image Compression
Australian Journal of Basic and Applied Sciences, 5(7): 32-44, 2011 ISSN 1991-8178 A Hybrid Technique for Image Compression Hazem (Moh'd Said) Abdel Majid Hatamleh Computer DepartmentUniversity of Al-Balqa
More informationComputer and Machine Vision
Computer and Machine Vision Lecture Week 7 Part-2 (Exam #1 Review) February 26, 2014 Sam Siewert Outline of Week 7 Basic Convolution Transform Speed-Up Concepts for Computer Vision Hough Linear Transform
More informationCGT 511. Image. Image. Digital Image. 2D intensity light function z=f(x,y) defined over a square 0 x,y 1. the value of z can be:
Image CGT 511 Computer Images Bedřich Beneš, Ph.D. Purdue University Department of Computer Graphics Technology Is continuous 2D image function 2D intensity light function z=f(x,y) defined over a square
More informationUniversity of Amsterdam System & Network Engineering. Research Project 1. Ranking of manipulated images in a large set using Error Level Analysis
University of Amsterdam System & Network Engineering Research Project 1 Ranking of manipulated images in a large set using Error Level Analysis Authors: Daan Wagenaar daan.wagenaar@os3.nl Jeffrey Bosma
More informationOFFSET AND NOISE COMPENSATION
OFFSET AND NOISE COMPENSATION AO 10V 8.1 Offset and fixed pattern noise reduction Offset variation - shading AO 10V 8.2 Row Noise AO 10V 8.3 Offset compensation Global offset calibration Dark level is
More informationChapter 3 Graphics and Image Data Representations
Chapter 3 Graphics and Image Data Representations 3.1 Graphics/Image Data Types 3.2 Popular File Formats 3.3 Further Exploration 1 Li & Drew c Prentice Hall 2003 3.1 Graphics/Image Data Types The number
More informationTemplates and Image Pyramids
Templates and Image Pyramids 09/06/11 Computational Photography Derek Hoiem, University of Illinois Project 1 Due Monday at 11:59pm Options for displaying results Web interface or redirect (http://www.pa.msu.edu/services/computing/faq/autoredirect.html)
More information3.1 Graphics/Image age Data Types. 3.2 Popular File Formats
Chapter 3 Graphics and Image Data Representations 3.1 Graphics/Image Data Types 3.2 Popular File Formats 3.1 Graphics/Image age Data Types The number of file formats used in multimedia continues to proliferate.
More informationComputer Programming
Computer Programming Dr. Deepak B Phatak Dr. Supratik Chakraborty Department of Computer Science and Engineering Session: Digital Images and Histograms Dr. Deepak B. Phatak & Dr. Supratik Chakraborty,
More informationFigures from Embedded System Design: A Unified Hardware/Software Introduction, Frank Vahid and Tony Givargis, New York, John Wiley, 2002
Figures from Embedded System Design: A Unified Hardware/Software Introduction, Frank Vahid and Tony Givargis, New York, John Wiley, 2002 Data processing flow to implement basic JPEG coding in a simple
More informationDynamic Collage Steganography on Images
ISSN 2278 0211 (Online) Dynamic Collage Steganography on Images Aswathi P. S. Sreedhi Deleepkumar Maya Mohanan Swathy M. Abstract: Collage steganography, a type of steganographic method, introduced to
More informationLOSSLESS CRYPTO-DATA HIDING IN MEDICAL IMAGES WITHOUT INCREASING THE ORIGINAL IMAGE SIZE THE METHOD
LOSSLESS CRYPTO-DATA HIDING IN MEDICAL IMAGES WITHOUT INCREASING THE ORIGINAL IMAGE SIZE J.M. Rodrigues, W. Puech and C. Fiorio Laboratoire d Informatique Robotique et Microlectronique de Montpellier LIRMM,
More informationENHANCED SECURITY SYSTEM FOR REAL TIME APPLICATIONS USING VISUAL CRYPTOGRAPHY
Cell, Manjari Road,Hadapsar,Pune-412307. India,Chief Editor:Dr.K.R.Harne,Editors:Prof R V Patil,Prof Niraja Jain ENHANCED SECURITY SYSTEM FOR REAL TIME APPLICATIONS USING VISUAL CRYPTOGRAPHY AbhishekShinde,
More informationPENGENALAN TEKNIK TELEKOMUNIKASI CLO
PENGENALAN TEKNIK TELEKOMUNIKASI CLO : 4 Digital Image Faculty of Electrical Engineering BANDUNG, 2017 What is a Digital Image A digital image is a representation of a two-dimensional image as a finite
More informationFundamentals of Multimedia
Fundamentals of Multimedia Lecture 2 Graphics & Image Data Representation Mahmoud El-Gayyar elgayyar@ci.suez.edu.eg Outline Black & white imags 1 bit images 8-bit gray-level images Image histogram Dithering
More informationCamera Image Processing Pipeline: Part II
Lecture 14: Camera Image Processing Pipeline: Part II Visual Computing Systems Today Finish image processing pipeline Auto-focus / auto-exposure Camera processing elements Smart phone processing elements
More informationUNIT 7B Data Representa1on: Images and Sound. Pixels. An image is stored in a computer as a sequence of pixels, picture elements.
UNIT 7B Data Representa1on: Images and Sound 1 Pixels An image is stored in a computer as a sequence of pixels, picture elements. 2 1 Resolu1on The resolu1on of an image is the number of pixels used to
More informationBitmap Image Formats
LECTURE 5 Bitmap Image Formats CS 5513 Multimedia Systems Spring 2009 Imran Ihsan Principal Design Consultant OPUSVII www.opuseven.com Faculty of Engineering & Applied Sciences 1. Image Formats To store
More informationSTEGO-HUNTER :ATTACKING LSB BASED IMAGE STEGANOGRAPHIC TECHNIQUE
STEGO-HUNTER :ATTACKING LSB BASED IMAGE STEGANOGRAPHIC TECHNIQUE www.technicalpapers.co.nr ABSTRACT : Steganography is the process of hiding secret information in a cover image. Our aim is to test a set
More information