DIGIT VIDEO SYSTEMS A. ASTAPKOVICH State University of Aerospace Instrumentations, Saint-Petersburg, 2012 Lecture 0 COURSE REVIEW.

Slides:



Advertisements
Similar presentations
[1] AN ANALYSIS OF DIGITAL WATERMARKING IN FREQUENCY DOMAIN.
Advertisements

Prepared for DA 201  Introduction to Digital Watermarking.
Digital rights management Audio watermark Jiamian.
An Exploration in the Detection of Hidden Data in Audio Bit Streams Presented by: John Monk CS 525, Spring Semester 2002
Digital Watermarking for Telltale Tamper Proofing and Authentication Deepa Kundur, Dimitrios Hatzinakos Presentation by Kin-chung Wong.
Introduction to Watermarking Anna Ukovich Image Processing Laboratory (IPL)
Information Hiding: Watermarking and Steganography
A New Scheme For Robust Blind Digital Video Watermarking Supervised by Prof. LYU, Rung Tsong Michael Presented by Chan Pik Wah, Pat Mar 5, 2002 Department.
PROPOSAL “EDGE DIGIT WATERMARK” A. Astapkovich, B. Krivosheev Saint-Petersburg State University of Aerospace Instrumentation State University of Saint-Petersburg.
Digital Watermarking for Multimedia Security R. Chandramouli MSyNC:Multimedia Systems, Networking, and Communications Lab Stevens Institute of Technology.
T H E U N I V E R S I T Y O F B R I T I S H C O L U M B I A November 2005Analysis of Attacks on Common Watermarking Techniques 1 A study on the robustness.
Applications of Image Processing. Outline What YOU are going to learn Image Processing in use.
Fifth International Conference on Information
Issues for Multimedia Privacy & Security ---- Video Content Privacy Protection, Copyright Protection & Database Access Control Jianping Fan Dept of Computer.
In the last part of the course we make a review of selected technical problems in multimedia signal processing First problem: CONTENT SECURITY AND WATERMARKING.
Digital Watermarking. Introduction Relation to Cryptography –Cryptography is Reversibility (no evidence) Established –Watermarking (1990s) Non-reversible.
Watermarking and Steganography Watermarking is the practice of hiding a message about an image, audio clip, video clip, or other work of media within that.
Multimedia Security Digital Video Watermarking Supervised by Prof. LYU, Rung Tsong Michael Presented by Chan Pik Wah, Pat Nov 20, 2002 Department of Computer.
WATERLOO ELECTRICAL AND COMPUTER ENGINEERING 10s: Communications and Information Systems 1 WATERLOO ELECTRICAL AND COMPUTER ENGINEERING 10s Communications.
Applications of Signals and Systems Fall 2002 Application Areas Control Communications Signal Processing.
AXIS Q7404 Video Encoder High-performance, full-featured video encoder with H.264.
Coding techniques for digital cinema Andreja Samčović University of Belgrade Faculty of Transport and Traffic Engineering.
Digital Watermarking Parag Agarwal
Adam Day.  Applications  Classification  Common watermarking methods  Types of verification/detection  Implementing watermarking using wavelets.
NYMAN 2004, New York City 1 E. Ganic & Ahmet M. Eskicioglu A DFT-BASED SEMI-BLIND MULTIPLE WATERMARKING SCHEME FOR IMAGES Emir Ganic and Ahmet M. Eskicioglu.
MULTIMEDIA: CRYPTO IS NOT ENOUGH 9/09/2015 | pag. 2.
Applications of Signals and Systems Application Areas Control Communications Signal Processing (our concern)
Watermarking University of Palestine Eng. Wisam Zaqoot May 2010.
Introduction to Multimedia Security Topics Covered in this Course Multimedia Security.
Media Protection Media Encryption Media Watermark Media Protection Media Encryption Media Watermark Lesson 10.
Thái Chí Minh Trần Lương Khiêm 1. Content  Introduction  History  Applications  Requirements  Techniques  Attacks 2.
Digital Watermarking -Interim Report (EE5359: Multimedia processing) Under the Guidance of Dr. K. R. Rao Submitted by: Ehsan Syed
Steganography for Secure Digital Watermarking 1 Pratheepan Yogarajah, Dr. Joan Condell, Dr. Kevin Curran, Prof. Paul Mc Kevitt.
Object Based Processing for Privacy Protected Surveillance Karl Martin Kostas N. Plataniotis University of Toronto Dept. of Electrical and Computer Engineering.
Russell Taylor. How the law supports Copyright Copyright Designs and Patents Act 1988 Copyright arises when an individual or organisation creates a work,
Computer Vision – Overview Hanyang University Jong-Il Park.
1 University of Palestine Information Security Principles ITGD 2202 Ms. Eman Alajrami 2 nd Semester
Information Security Principles Assistant Professor Dr. Sana’a Wafa Al-Sayegh 1 st Semester ITGD 2202 University of Palestine.
DIGITAL WATERMARKING SRINIVAS KHARSADA PATNAIK [1] AN ANALYSIS OF DIGITAL WATERMARKING IN FREQUENCY DOMAIN Presented by SRINIVAS KHARSADA PATNAIK ROLL.
Wavelet-based Coding And its application in JPEG2000 Monia Ghobadi CSC561 final project
PROPOSAL “EDGE STEGO DIGIT WATERMARK” A. Astapkovich State University of Aerospace Instrumentation 2011.
Digital Watermarking
Image Processing Architecture, © 2001, 2002, 2003 Oleh TretiakPage 1 ECE-C490 Image Processing Architecture MP-3 Compression Course Review Oleh Tretiak.
DCT.
Digital Watermarking -Project Proposal (EE5359: Multimedia processing) Under the Guidance of Dr. K. R. Rao Submitted by: Ehsan Syed
Advanced Signal Processing Systems and Applications Main research areas Applications Applications –biomedical, media, communications, security Algorithms.
EMBEDDED CONTROL SYSTEMS A. ASTAPKOVITCH State University of Aerospace Instrumentation, Saint-Petersburg, 2011.
COMPARATIVE STUDY OF HEVC and H.264 INTRA FRAME CODING AND JPEG2000 BY Under the Guidance of Harshdeep Brahmasury Jain Dr. K. R. RAO ID MS Electrical.
Chapter 1. SIGNAL PROCESSING:  Signal processing is concerned with the efficient and accurate extraction of information in a signal process.  Signal.
CSE725.  Watermarking dates back in History.  Cryptography for protection.  Need of software for ownership protection.
Digital Watermarking Multimedia Security. 2 What is the Watermark ? Paper Watermark –the technique of impressing into the paper a form, image, or text.
Frank Bergschneider February 21, 2014 Presented to National Instruments.
Visual Information Processing. Human Perception V.S. Machine Perception  Human perception: pictorial information improvement for human interpretation.
 Digital images store large amounts of data and information. This data can be manipulated to some extend without being detected by human eyes.  DWT(Discrete.
Introduction to Computer Security ©2004 Matt Bishop Information Security Principles Assistant Professor Dr. Sana’a Wafa Al-Sayegh 1 st Semester
1 Digital Water Marks. 2 History The Italians where the 1 st to use watermarks in the manufacture of paper in the 1270's. A watermark was used in banknote.
DIGIT VIDEO SYSTEMS Lecture 0 COURSE REVIEW.
Ikhwannul Kholis Universitas 17 Agustus 1945 Jakarta
Pat P. W. Chan,  Michael R. Lyu, Roland T. Chin*
Welcome
High Capacity Data Embedding in JPEG Bit Streams Using Visual Models
DONE BY S.MURALIRAJAN M.NIRMAL
Presenter by : Mourad RAHALI
MULTIMEDIA WATERMARKING IN ENHANCING DIGITAL SECURITY
Steganography in digital images
Parag Agarwal Digital Watermarking Parag Agarwal
Information Hiding and Its Applications
Introduction to Multimedia Security Topics Covered in this Course
Digital Watermarking (cont.)
Presentation transcript:

DIGIT VIDEO SYSTEMS A. ASTAPKOVICH State University of Aerospace Instrumentations, Saint-Petersburg, 2012 Lecture 0 COURSE REVIEW

GOAL OF THE COURSE  Establishing the understanding of the basic principals of digit video systems :  digit video processing cycle;  structure of the modern digit video systems ;  applications in multimedia, industrial, security, research ;  review of the modern research activities ;

Course structure  PHYSICAL PRINCIPALS OF THE DIGIT FRAME FORMING AND HARDWARE/SOFTWARE REALIZATIONS  MODERN APPLICATIONS: MULTIMEDIA STANDARTS, DIGIT VIDEO FOR INDUSTRY AND SPACE RESEARCH  DIGIT VIDEO PROCESSING BASICS  REVIEW OF MODERN RESEARCH ACTIVITY

TOPIC 1. PHYSICAL AND REALIZATION BACKGROUD Lecture 1. DIGIT CAMERA § 1. Digit frame forming § 2. Noise and distortions in digit video § 3. Low level processing § 4. High level processing § 5. Structure of the modern digit video camera Lecture 2. DIGIT VIDEO § 1. Digit video in multimedia § 2. Multimedia standards review § 3. Digit video in industry and space applications § 4. Modern silicon solutions § 5. System architecture and high level software

DIGIT CAMERA STRUCTURE

Lecture 3-4. IP-VIDEOPHONE AND SECURITY SYSTEMS §1. Packet communication nets §2. Family of IP-videophones CISCo and basics multimedia standards §3. Family of IP-videophones CISCo and basics multimedia standards §4. Audio codec and the quality of the videophones §5. Multichannel security video systems TOPIC 2. DIGIT VIDEO BASED SYSTEMS Cisco IP phone 7985 Videophone Digital Media System-on-Chip(DMSoC) TMS320DM365

Lecture 5-6. TECHNICAL VISION SYSTEMS §1. Digit video systems for industry applications §2. Review of the mars rover Spirit-Opportunity control system §3. Mars rover video system §4. Video in the mars rover control system loop §5. Special features of the digit channel §6. Space standards of ECSS Mars rover Spirit-Opportunity APPLICATION EXAMPLES AND SPACE STANDARTS

TOPIC 3. DIGIT IMAGE PROCESSING Lecture 7. DIGIT VIDEO COMPRESSING BASICS §1. Video stream parameters and and the image quality estimation §2. Video compression basic ideas §3. Wavelet compression and Haar basis §4. Review of the wavelet compression algorithms HAAR wavelet 1 0 ≤ x ≤ ½ Ψ(x) = -1 ½ ≤ x ≤ 1 Ψ(x) = -1 ½ ≤ x ≤ ≤ x; x ≤ ≤ x; x ≤ 0 HAAR basis Ψ j i(x) = Ψ (2 j x - i) i= 0..2 j -1 i= 0..2 j -1 (a+b+c+d)/4(a-b+c-d)/4 (a+b-c-d)/4(a-b-c+d)/4 LLLH HLHH W0W0 V1V1 V2V2

Lecture 8-9 IMAGE PROCESSING §1. Image quality estimation §2. Image filtering algorithms §3. Edge detectors §4. Moving object extractions IMAGE PROCESSING Original image Enhanced contrast PSNR=25 dB JPEG compression PSNR=25 dB

EDGE DETECTORS CLEAN AMAGE NOISY IMAGE IMAGE EDGES EDGE DETECTOR CANNY

DIGIT VIDEOSTREAM PROTECTION Lecture 10. STEGANOGRAPHY § 1. Basic definitions and digit watermark classifications § 2. Digit watermark system structure § 3. System and algorithm requirements § 4. Attack review § 4. Application examples Encryption keys - K Container - I image audio sample text code Marking information - M trade mark copy number other EMBEDDING ALGORITHM Marked information or STEGO - I”

LL LH HL HH Q=55 COMPRESSION JPEG, JPEG2000 WATERMARK EXSTRACTION APPLICATION EXAMPLE Modified Kutter algorithm

MODERN APPROACHES Lecture 11. ADAPTIVE ALGORITM PARADIGM § 1. Modern structural wavelet based norms SSIM and CW-SSIM § 2 Neuron net based algorithms § 3 Adaptive boosting learning ( ADA BOOST) Original image MSE=0 SSIM=1 CW-SSIM=1 MSE=306 SSIM=0.928 CW-SSIM=0.938 Enhanced contrastDistorted brightness MSE=309 SSIM=0.987 CW-SSIM=1 Gauss noise MSE=309 SSIM=0.576 CW-SSIM=0.814

Noise proof edge detector on base of ANN S 1 (0,0) S 2 (0,0) S 1 (0,1) S 2 (0,1) ……………………………….. S 1 ( i,j ) S 2 (i,j ) S nsen ( i,j ) 1 w 1 w 2 w nsen+1 F(0,0) F(0,1) ……… F( i,j) W = (S T S +  E) –1 S T F min F(w) = (SW - F, SW – F)+  (W,W) w S * W = F NN Edge filter