A Frequency Domain Scrambling Using Different Sized Empty Block Gwanggil Jeon and Young-Sup Lee Department of Embedded Systems Engineering, Incheon National.

Slides:



Advertisements
Similar presentations
1 Adjustable prediction-based reversible data hiding Authors: Chin-Feng Lee and Hsing-Ling Chen Source: Digital Signal Processing, Vol. 22, No. 6, pp.
Advertisements

A New Scheme For Robust Blind Digital Video Watermarking Supervised by Prof. LYU, Rung Tsong Michael Presented by Chan Pik Wah, Pat Mar 5, 2002 Department.
Adviser : Ming-Yuan Shieh Student ID : M Student : Chung-Chieh Lien VIDEO OBJECT SEGMENTATION AND ITS SALIENT MOTION DETECTION USING ADAPTIVE BACKGROUND.
VIPER DSPS 1998 Slide 1 A DSP Solution to Error Concealment in Digital Video Eduardo Asbun and Edward J. Delp Video and Image Processing Laboratory (VIPER)
A KLT-Based Approach for Occlusion Handling in Human Tracking Chenyuan Zhang, Jiu Xu, Axel Beaugendre and Satoshi Goto 2012 Picture Coding Symposium.
Ai-Mei Huang and Truong Nguyen Image Processing (ICIP), th IEEE International Conference on 1.
Real-time Embedded Face Recognition for Smart Home Fei Zuo, Student Member, IEEE, Peter H. N. de With, Senior Member, IEEE.
Multimedia Security Digital Video Watermarking Supervised by Prof. LYU, Rung Tsong Michael Presented by Chan Pik Wah, Pat Nov 20, 2002 Department of Computer.
WATERLOO ELECTRICAL AND COMPUTER ENGINEERING 10s: Communications and Information Systems 1 WATERLOO ELECTRICAL AND COMPUTER ENGINEERING 10s Communications.
DIGITAL SIGNAL PROCESSING IN ANALYSIS OF BIOMEDICAL IMAGES Prof. Aleš Procházka Institute of Chemical Technology in Prague Department of Computing and.
Jason Li Jeremy Fowers Ground Target Following for Unmanned Aerial Vehicles.
A Fast and Robust Fingertips Tracking Algorithm for Vision-Based Multi-touch Interaction Qunqun Xie, Guoyuan Liang, Cheng Tang, and Xinyu Wu th.
Fingertip Tracking Based Active Contour for General HCI Application Proceedings of the First International Conference on Advanced Data and Information.
Compressive Sensing Based on Local Regional Data in Wireless Sensor Networks Hao Yang, Liusheng Huang, Hongli Xu, Wei Yang 2012 IEEE Wireless Communications.
IMAGE COMPRESSION USING BTC Presented By: Akash Agrawal Guided By: Prof.R.Welekar.
CSCE 5013 Computer Vision Fall 2011 Prof. John Gauch
Project title : Automated Detection of Sign Language Patterns Faculty: Sudeep Sarkar, Barbara Loeding, Students: Sunita Nayak, Alan Yang Department of.
Digital Watermarking -Interim Report (EE5359: Multimedia processing) Under the Guidance of Dr. K. R. Rao Submitted by: Ehsan Syed
DIGITAL WATERMARKING SRINIVAS KHARSADA PATNAIK [1] AN ANALYSIS OF DIGITAL WATERMARKING IN FREQUENCY DOMAIN Presented by SRINIVAS KHARSADA PATNAIK ROLL.
Sadaf Ahamed G/4G Cellular Telephony Figure 1.Typical situation on 3G/4G cellular telephony [8]
EE 5359 TOPICS IN SIGNAL PROCESSING PROJECT ANALYSIS OF AVS-M FOR LOW PICTURE RESOLUTION MOBILE APPLICATIONS Under Guidance of: Dr. K. R. Rao Dept. of.
Low-Power H.264 Video Compression Architecture for Mobile Communication Student: Tai-Jung Huang Advisor: Jar-Ferr Yang Teacher: Jenn-Jier Lien.
Online Kinect Handwritten Digit Recognition Based on Dynamic Time Warping and Support Vector Machine Journal of Information & Computational Science, 2015.
Figure 1.a AVS China encoder [3] Video Bit stream.
PERFORMANCE ANALYSIS OF AVS-M AND ITS APPLICATION IN MOBILE ENVIRONMENT By Vidur Vajani ( ) Under the guidance of Dr.
Digital Watermarking -Project Proposal (EE5359: Multimedia processing) Under the Guidance of Dr. K. R. Rao Submitted by: Ehsan Syed
IMPLEMENTATION OF H.264/AVC, AVS China Part 7 and Dirac VIDEO CODING STANDARDS Under the guidance of Dr. K R. Rao Electrical Engineering Department The.
-BY KUSHAL KUNIGAL UNDER GUIDANCE OF DR. K.R.RAO. SPRING 2011, ELECTRICAL ENGINEERING DEPARTMENT, UNIVERSITY OF TEXAS AT ARLINGTON FPGA Implementation.
Advances in digital image compression techniques Guojun Lu, Computer Communications, Vol. 16, No. 4, Apr, 1993, pp
Fingertip Detection with Morphology and Geometric Calculation Dung Duc Nguyen ; Thien Cong Pham ; Jae Wook Jeon Intelligent Robots and Systems, IEEE/RSJ.
Vamsi Krishna Vegunta University of Texas, Arlington
An Improved Method Of Content Based Image Watermarking Arvind Kumar Parthasarathy and Subhash Kak 黃阡廷 2008/12/3.
IEEE Transactions on Consumer Electronics, Vol. 58, No. 2, May 2012 Kyungmin Lim, Seongwan Kim, Jaeho Lee, Daehyun Pak and Sangyoun Lee, Member, IEEE 報告者:劉冠宇.
Implementation, Comparison and Literature Review of Spatio-temporal and Compressed domains Object detection. By Gokul Krishna Srinivasan Submitted to Dr.
Development of a Software Renderer for utilizing 3D Contents on a 2D-based Mobile System Sungkwan Kang 1, Joonseub Cha 2, Jimin Lee 1 and Jongan Park 1,
Longitudinal Motion Characteristics between a Non- Matched Piezoelectric Sensor and Actuator Pair Young-Sup Lee Department of Embedded Systems Engineering,
-BY KUSHAL KUNIGAL UNDER GUIDANCE OF DR. K.R.RAO. SPRING 2011, ELECTRICAL ENGINEERING DEPARTMENT, UNIVERSITY OF TEXAS AT ARLINGTON FPGA Implementation.
Design of Context-Aware based Information Prevention Sungmo Jung 1, Younsam Chae 2, Jonghun Shin 2, Uyeol Baek 2, Seoksoo Kim ∗ 1, * Department of Multimedia,
A Study of Secure Communications in WiFi Networks Bumjo Park 1 and Namgi Kim 11 1 Dept. Of Computer Science, Kyonggi Univ. San 94-1, Iui, Yeongtong, Suwon,
A New Threat Evaluation Method Based on Cloud Model Wang Bailing 1*, Guo Shi 1, Qu Yun 1, Wang Xiaopeng 1, Liu Yang 1 1 Harbin Institute of Technology,
Advanced Science and Technology Letters Vol.35(Security 2013), pp Image Steganograpy via Video Using Lifting.
Interactive Mirror System based on Personal Purchase Information Donghyun Kim 1, Younsam Chae 2, Jonghun Shin 2, Uyeol Baek 2, Seoksoo Kim * 1,* Dept of.
Advanced Science and Technology Letters Vol.28 (EEC 2013), pp Histogram Equalization- Based Color Image.
A Framework with Behavior-Based Identification and PnP Supporting Architecture for Task Cooperation of Networked Mobile Robots Joo-Hyung Kiml, Yong-Guk.
Advanced Science and Technology Letters Vol.28 (EEC 2013), pp Certainty Measurement with Fuzzy Entropy.
International Journal of Smart Home Vol.7, No.5 (2013), pp Digital Watermarking for Image Tamper Detection.
Artifact Evaluation on Noisy Contents Gwanggil Jeon and Young-Sup Lee Department of Embedded Systems Engineering, Incheon National University, 12-1 Songdo-dong,
A Study for Yamanaka Images for Camera Gwanggil Jeon and Young-Sup Lee Department of Embedded Systems Engineering, Incheon National University, 12-1 Songdo-dong,
Advanced Science and Technology Letters Vol.28 (EEC 2013), pp Fuzzy Technique for Color Quality Transformation.
Particle Filtering for Symmetry Detection and Segmentation Pramod Vemulapalli.
What is Multimedia Anyway? David Millard and Paul Lewis.
WLD: A Robust Local Image Descriptor Jie Chen, Shiguang Shan, Chu He, Guoying Zhao, Matti Pietikäinen, Xilin Chen, Wen Gao 报告人:蒲薇榄.
Implementation of Real Time Image Processing System with FPGA and DSP Presented by M V Ganeswara Rao Co- author Dr. P Rajesh Kumar Co- author Dr. A Mallikarjuna.
Advanced Science and Technology Letters Vol.53 (AITS 2014), pp An Improved Algorithm for Ad hoc Network.
Implementation and comparison study of H.264 and AVS china EE 5359 Multimedia Processing Spring 2012 Guidance : Prof K R Rao Pavan Kumar Reddy Gajjala.
Visual Information Processing. Human Perception V.S. Machine Perception  Human perception: pictorial information improvement for human interpretation.
 Digital images store large amounts of data and information. This data can be manipulated to some extend without being detected by human eyes.  DWT(Discrete.
Video object segmentation and its salient motion detection using adaptive background generation Kim, T.K.; Im, J.H.; Paik, J.K.;  Electronics Letters 
Advisor: Chang, Chin-Chen Student: Chen, Chang-Chu
Fuzzy type Image Fusion using hybrid DCT-FFT based Laplacian Pyramid Transform Authors: Rajesh Kumar Kakerda, Mahendra Kumar, Garima Mathur, R P Yadav,
(k, n)-Image Reversible Data Hiding
Reversible Data Hiding in Encrypted Images With Distributed Source Encoding Source: IEEE Transactions on Circuits and Systems for Video Technology Vol.26.
Early termination for tz search in hevc motion estimation
Seunghui Cha1, Wookhyun Kim1
Image Segmentation Techniques
Source:Multimedia Tools and Applications, Vol. 77, No. 20, pp , Oct
A Block Based MAP Segmentation for Image Compression
New Framework for Reversible Data Hiding in Encrypted Domain
Unconstraint Optimal Selection of Side Information for Histogram Shifting Based Reversible Data Hiding Source:  IEEE Access. March, doi: /ACCESS
An imperceptible spatial domain color image watermarking scheme
Presentation transcript:

A Frequency Domain Scrambling Using Different Sized Empty Block Gwanggil Jeon and Young-Sup Lee Department of Embedded Systems Engineering, Incheon National University, 12-1 Songdo-dong, Yeonsu-gu, Incheon , Korea Abstract. The pay-per-view (PPV) service is a promising industry. In this paper, we study how to protect contents from pirates. The presented method is based on the spectrum domain. The experimental results show that the presented algorithm is effective for scrambling contents in spectrum domain. Keywords: scrambling, block size, spectrum domain, ppv. 1 Introduction The data security is important for commerce on the in TV or internet [1-5]. In this article, we study a novel spectrum domain scrambling algorithm, where image data are effectively scrambled in the spectrum domain by arbitrarily selected empty blocks [627]. The performance is examined by varying the block size. Section 2 discusses Fourier transform preliminaries. Section 3 discusses different simulation results. Finally, we give our conclusion remarks in Section 4 2 Transform Preliminaries The Fourier transform is defined as Eq. (1),  F b   f a e da    2  jba  . (1)  This is generally known as the forward Fourier transform. On the other hand, Eq. (2) is inverse Fourier transform.  jba (2) f a 2       F b e  db.  This definition can be stated in another way using Euler's formula which is Eq. (3)

SoftTech 2013, ASTL Vol. 19, pp , 2013 © SERSC 2013

Proceedings, The 2nd International Conference on Software Technology e j 0 = cos j sin. (3) (a) Fig. 1. PSNR results comparison according to block size, 1≤log 2 (BS)≤8. (a) F(0,0)=0 and (b) F(0,0)=1. (a) 220

A Frequency Domain Scrambling Using Different Sized Empty Block 3 Block Size and Its Performance for Scrambling We consider the block size (BS) is BS={2,4,8,16,32,64,128, 258}. The intensity values of each block are either 0 or 1 depends on Eq. (6). The Matlab command ‘rand()’ returned any values between 0 and 1, thus after applying ‘round()’ command we obtain 0 or 1 values. round [ rand() ] (4) The scrambled spectral domain Fourier 1 is F calculated l block as Eq.. (5). [ ] (5) 4 Performance Studies of Scrambled Results Figure 1 shows the PSNR results comparison according to block size, 1≤log 2 (BS) ≤8. 5 Conclusions Data security is a crucial issue for protecting knowledge from hackers. In this paper, frequency domain based scrambling method was presented. The experimental results inform that the proposed method is efficient for scrambling contents. References 1.B. Macq and J. Quisquater, “Cryptology for digital TV broadcasting,” in Proc. Of the IEEE, vol. 83, no. 6, pp , (1995). 2.B. Macq and J. Quisquater, “Digital images multiresolution encryption,” J. Interactive Multimedia Assoc. Intell. Property Proj., vol. 1, no. 1, pp , Jan., (1994). 3.G. L. Hobbs, “Video scrambling,” US patent , Sept. 29, (1998). 4.D. Zeidler and J. Griffin, “Method and apparatus for television signal scrambling using block shuffling,” US patent , June 14, (1994). 5.T. Maples and G. Spanos, “Performance study of a selective encryption scheme for the security of networked, real-time video,” in Proc. 4th Inter. Conf. Computer Communications and Networks, Las Vegas, Nevada, Sept. (1995). 6.J. Wu, A. Paul, Y. Xing, Y. Fang, J. Jeong, L. Jiao, G. Shi, Morphological dilation image coding with context weights prediction. Signal Processing: Image Communication, vol. 25, no. 10, pp , (2010). 7.M. Anisetti, C. A. Ardagna, E. Damiani, F. Frati, H. A. Müller, and A. Pahlevan: Web Service Assurance: The Notion and the Issues. Future Internet 4(1): (2012). 221

Proceedings, The 2nd International Conference on Software Technology 8. M. Anisetti, C. A. Ardagna, V. Bellandi, E. Damiani, M. Döller, F. Stegmaier, T. Rabl, H. Kosch, and L. Brunie: Landmark-assisted location and tracking in outdoor mobile network. Multimedia Tools Appl. 59(1): (2012). 9.M. Anisetti, C. A. Ardagna, E. Damiani, and J. Maggesi: Security certification-aware service discovery and selection. SOCA (2012): M. Anisetti, C. A. Ardagna, and E. Damiani: A Low-Cost Security Certification Scheme for Evolving Services. ICWS (2012): M. Anisetti, C. A. Ardagna, V. Bellandi, E. Damiani, and S. Reale: Map-Based Location and Tracking in Multipath Outdoor Mobile Networks. IEEE Transactions on Wireless Communications 10(3): (2011). 2.M. Anisetti, C. A. Ardagna, V. Bellandi, E. Damiani, and S. Reale: Advanced Localization of Mobile Terminal in Cellular Network. IJCNS 1(1): (2008) 3.C.-T. Hsieh, Y.-K. Wu, and K.-M. Hung, Hybrid Watermarking Scheme for Halftone Images, International Journal of Advanced Science and Technology, 9-20, (2008). 4.R. Adipranata, E. Cherry, G. Ballangan and R. P. Ongkodjojo, Fast Method for Multiple Human Face Segmentation in Color Image, International Journal of Advanced Science and Technology, 19-32, (2009). 5.D. Bhattacharyya, A. Roy, P. Roy and T.-h. Kim, Receiver Compatible Data Hiding in Color Image, International Journal of Advanced Science and Technology, 15-24, (2009). 6.M. Drahanský, Realization of Experiments with Image Quality of Fingerprints, International Journal of Advanced Science and Technology, 79-88, (2009). 7.B.V. Ramana Reddy, A. Suresh, M. Radhika Mani and V.Vijaya Kumar, Classification of Textures Based on Features Extracted from Preprocessing Images on Random Windows, International Journal of Advanced Science and Technology, 9-18, (2009). 8.W. Wu, Z. Liu, X. He, Learning-based super resolution using kernel partial least squares, Image Vision Comput 29, , (2011). 9.W. Wu, Z. Liu, W. Gueaieb, X. He, Single-image super-resolution based on markov random field and contourlet transform, J. Electron. Imaging, 20, , (2011). 10.W. Wu, Z. Liu, D. Krys, Improving laser image resolution for pitting corrosion measurement using markov random field method, Autom. Constr. 21, , (2012). 11.W. Wu, Z. Liu, M. Chen, X. Yang, X. He, An automated vision system for container- code recognition, Expert Systems with Applications, 39, , (2012). 12.W. Wu, X. Yang, X. He, Handwritten numeral recognition by model reconstruction based on manifold learning, in: The 2007 International Conference on Information Computing and Automation (ICICA’07), (2007) 13.J. Wu, C. Liang, J. Han, Z. Hu, D. Huang, H. Hu, Y. Fang, L. Jiao, A Two-Stage Lossless Compression Algorithm for Aurora Image Using Weighted Motion Compensation and Context-Based Model, Optics Communications. Vol.290, pp.19-27, October 22, (2012). 14.Y. Fang, J. Wu, and B. Huang, 2D sparse signal recovery via 2D orthogonal matching pursuit. Science China: Inf. Sci., 55: , (2012). 15.J. Wu, T. Li, T.-J. Hsieh, Y.-L. Chang, and B. Huang, Digital Signal Processor- based 3D Wavelet Error-resilient Lossless Compression of High-resolution Spectrometer Data. Journal of Applied Remote Sensing, Vol. 5, , November 28, (2011). 16.A. Paul, J. Wu, J.-F. Yang, and J. Jeong, Gradient-based edge detection for motion estimation in H.264/AVC. IET Image Processing. Vol.5,No.4, pp.323–327, (2011). 17.J. Wu, J. Huang, G. Jeon, J. Jeong, L.C. Jiao, An adaptive autoregressive de- interlacing method. Optical Engineering, Vol.5, 50, , (2011). 222