Vishnu Vardhan Reddy Mukku Mav ID : 1000989621 Under the guidance of.

Slides:



Advertisements
Similar presentations
Capacity-Approaching Codes for Reversible Data Hiding Weiming Zhang, Biao Chen, and Nenghai Yu Department of Electrical Engineering & Information Science.
Advertisements

Vishnu Vardhan Reddy Mukku Mav ID : Under the guidance of Dr. K. R. Rao.
Digital Image Watermarking ELE 488 Final Project, Fall 2011 Princeton University Ali JavadiAbhari.
1 Adjustable prediction-based reversible data hiding Authors: Chin-Feng Lee and Hsing-Ling Chen Source: Digital Signal Processing, Vol. 22, No. 6, pp.
A High Performance Multi-layer Reversible Data Hiding Scheme Using Two-Step Embedding Authors: Jinxiang Wang Jiangqun Ni Jinwei Pan.
Steganography of Reversible Data Hiding Producer: Chia-Chen Lin Speaker: Paul 2013/06/26.
Digital watermarking technique for protecting digital images
Chinese University of Hong Kong Department of Information Engineering A Capacity Estimate Technique for JPEG-to-JPEG Image Watermarking Peter Hon Wah Wong.
Digital Watermarking. Introduction Relation to Cryptography –Cryptography is Reversibility (no evidence) Established –Watermarking (1990s) Non-reversible.
BY AMRUTA KULKARNI STUDENT ID : UNDER SUPERVISION OF DR. K.R. RAO Complexity Reduction Algorithm for Intra Mode Selection in H.264/AVC Video.
A Review on: Spread Spectrum Watermarking Techniques
Digital Image Watermarking Er-Hsien Fu EE381K Student Presentation.
Multimedia Processing
Priyadarshini Anjanappa UTA ID:
By : Vladimir Novikov. Digital Watermarking? Allows users to embed SPECIAL PATTERN or SOME DATA into digital contents without changing its perceptual.
Multimedia Copyright Protection Technologies M. A. Suhail, I. A. Niazy
Multimedia Network Security Lab. On STUT Adaptive Weighting Color Palette Image Speaker:Jiin-Chiou Cheng Date:99/12/16.
Multimedia Processing Analysis of Information Hiding Techniques in HEVC. Multimedia Processing EE 5359 Spring 2015 Advisor: Dr. K. R. Rao Department of.
Thái Chí Minh Trần Lương Khiêm 1. Content  Introduction  History  Applications  Requirements  Techniques  Attacks 2.
Watermarking Matt Elliott Brian Schuette. Overview Goals Methods Comparison Attacks References.
Robustness Studies For a Multi-Mode Information Embedding Scheme for Digital Images Daniel Eliades Mentor: Dr. Neelu Sinha Department of Math and Computer.
Digital Watermarking -Interim Report (EE5359: Multimedia processing) Under the Guidance of Dr. K. R. Rao Submitted by: Ehsan Syed
Yarmouk university Hijjawi faculty for engineering technology Computer engineering department Primary Graduation project Document security using watermarking.
Sadaf Ahamed G/4G Cellular Telephony Figure 1.Typical situation on 3G/4G cellular telephony [8]
1 Reversible data hiding for high quality images using modification of prediction errors Source: The Journal of Systems and Software, In Press, Corrected.
A Novel steganographic method for JPEG images by Vasiliy Sachnev - Introduction  JPEG compression  Steganography - Block based steganography method (F5)
1 影像偽裝術的最新發展 Chair Professor Chin-Chen Chang Feng Chia University National Chung Cheng University National Tsing Hua University.
Figure 1.a AVS China encoder [3] Video Bit stream.
ECE643 Course Project, Fall /21/20081 Optimum histogram pair based image lossless data embedding By G. Xuan, Y. Q. Shi, etc. Summarized By: Zhi.
Reversible watermarking Wu Dan Introduction What?
Digital Watermarking -Project Proposal (EE5359: Multimedia processing) Under the Guidance of Dr. K. R. Rao Submitted by: Ehsan Syed
Introduction to Steganalysis Schemes Multimedia Security.
Reversible image hiding scheme using predictive coding and histogram shifting Source: Authors: Reporter: Date: Signal Processing, Vol.89, Issue 6, pp ,
UNDER THE GUIDANCE DR. K. R. RAO SUBMITTED BY SHAHEER AHMED ID : Encoding H.264 by Thread Level Parallelism.
Implementation, Comparison and Literature Review of Spatio-temporal and Compressed domains Object detection. By Gokul Krishna Srinivasan Submitted to Dr.
Multimedia Processing Analysis of Information Hiding Techniques in HEVC. Multimedia Processing EE 5359 Spring 2015 Advisor: Dr. K. R. Rao Department of.
Blind image data hiding based on self reference Source : Pattern Recognition Letters, Vol. 25, Aug. 2004, pp Authors: Yulin Wang and Alan Pearmain.
Program Homework Implementation of the Improved Spread Spectrum Watermarking System.
Blind Quality Assessment System for Multimedia Communications Using Tracing Watermarking P. Campisi, M. Carli, G. Giunta and A. Neri IEEE Transactions.
Digital Watermarking Multimedia Security. 2 What is the Watermark ? Paper Watermark –the technique of impressing into the paper a form, image, or text.
Instructor : Dr. K. R. Rao Presented by : Vigneshwaran Sivaravindiran
Vishnu Vardhan Reddy Mukku Mav ID : Under the guidance of.
Compressive Sensing Techniques for Video Acquisition EE5359 Multimedia Processing December 8,2009 Madhu P. Krishnan.
A DIGITAL IMAGE WATERMARKING PREPARED BY AMAR RAEED KHORSHıD ALHıLALı ıD : R.G. Schyndel, A. Tirkel, and C. Osborne, “A Digital Watermark”, Procedding.
MMC LAB Secure Spread Spectrum Watermarking for Multimedia KAIST MMC LAB Seung jin Ryu 1MMC LAB.
By: U.Aruna M.Shanthi Priya Allows users to embed special pattern or some data into digital contents without changing its perceptual quality. When data.
DCT watermarking Speaker: Paul 1.
(k, n)-Image Reversible Data Hiding
Reversible Data Hiding in Encrypted Images With Distributed Source Encoding Source: IEEE Transactions on Circuits and Systems for Video Technology Vol.26.
Reference Ingemar J. Cox, Joe Kilian, F. Thomson Leighton, and Talal Shamoon, "Secure Spread Spectrum Watermarking for Multimedia," IEEE Trans. on Image.
Fast Decision of Block size, Prediction Mode and Intra Block for H
New Framework of Reversible Data Hiding in Encrypted JPEG Bitstreams
Source : Signal Processing, vol. 150, pp ,  September 2018
Source : Signal Processing, vol. 126, pp ,  November 2016
Spread Spectrum Watermarking
Advisor: Prof. Chin-Chen Chang (張真誠 教授) Student: Wei-Liang Tai (戴維良)
Reversible Data Hiding in JPEG Images
Source : Journal of Visual Communication and Image Representation, vol
Information Hiding and Its Applications
Source : Journal of Visual Communication and Image Representation, vol
Chair Professor Chin-Chen Chang Feng Chia University
Author: Minoru Kuribayashi, Hatsukazu Tanaka
Chair Professor Chin-Chen Chang Feng Chia University
New Framework for Reversible Data Hiding in Encrypted Domain
Source: J. Vis. Commun. Image R. 31 (2015) 64–74
A Self-Reference Watermarking Scheme Based on Wet Paper Coding
Unconstraint Optimal Selection of Side Information for Histogram Shifting Based Reversible Data Hiding Source:  IEEE Access. March, doi: /ACCESS
Source: IEEE Access. (2019/05/13). DOI: /ACCESS
Dynamic improved pixel value ordering reversible data hiding
A Quadratic-Residue-based Fragile Watermarking Scheme
Presentation transcript:

Vishnu Vardhan Reddy Mukku Mav ID : Under the guidance of Dr. K. R. Rao

RDO -- Rate Distortion Optimization DCT -- Discrete Cosine Transform LSB -- Least Significant Bit HM -- Histogram Manipulation

Introduction H.264 compression basics Data representation schemes a)Bit plane replacement b)Spread spectrum c)Histogram manipulation d)Mapping rules e)Divisibility f)Matrix encoding Conclusions References

Information hiding refers to the process of inserting information into a host to serve specific purpose(s) [1]. Information hiding is also referred as data embedding. In video domain, the application of information hiding can be coarsely categorized as watermarking, steganography, error recovery (resilient), and general data embedding. Fig. 1. General framework of information hiding [1]

Introduction (Cont.) Need for Information hiding for the videos includes, 1) tracking illegal distribution of copyrighted video to secure business revenue. 2) hyperlinking related contents while ensuring the hyperlink information always stays intact with the video to enhance user experiences. 3)monitoring video broadcasts and Internet distributions to generate reports regarding when, where, and how many times a video has been streamed. Fig. 2. Original video (left) and visible watermarked video (right) [1]

H.264 encoder: Fig.3: H.264 hybrid video encoder [1]

An information hiding method can be illustrated by the relationship among state, entity, and the meaning of each state. Fig.4: State of the entity and its meaning for information hiding [1]

Fig.5: Classification of data representation schemes for information hiding in H.264 compressed video [1]

Bit plane replacement is widely referred to as least significant bit (LSB), which manipulates the right most bit of an entity. the LSB scheme is the most straightforward way to encode information, with insignificant perceptual quality degradation when applied on the raw pixel values. However, a direct LSB scheme is irreversible.

It is widely utilized for watermarking purposes. These techniques can be formulated as [4] w i ∈ {0,1} is the information; v i, v i ’ are the input and output values, ‘a’ is scaling factor. Equation (1) is invertible, Equation (2), (3) are invertible only if v i ≠0.

It is applicable to both the spatial and frequency domains. It is a common way to achieve reversible information hiding. However, it requires expensive preprocessing (e.g., vacating a bin for data embedding) and suffers from the under/overflow problems. Fig. 6. Hiding information using histogram [1]

Mapping rules rely on a set of codewords for information embedding and extraction purposes. Basically codewords are associated with predefined meaning (e.g., “00,” “01,” “10,” or “11”) and they are chosen based on the information to be embedded. Fig. 7. Mapping rules for macroblock size to embed information [1]

The divisibility of a value by a specific divisor can be exploited as an essential property for reversible information hiding. For example, the magnitude of each coefficient in the macroblock is scaled by a prime number when “1” is to be embedded, or leave them as they are (i.e., no change) to embed “0”. A more sophisticated method considers a pair of neighboring pixels x and y, and the value n. These values are then transformed to obey a simple equation as Y i +n X i+1 ≡0 mod (n+1). Where ‘n’ is an integer.

In this presentation the Commonly considered data representation schemes and the hiding venues were summarized. In the further steps are the implementation of the information hiding(water marking) using intra mode prediction and block size.

[1] Y.Tew and K.Wong, “An Overview of Information Hiding in H.264/AVC Compressed Video,” IEEE Trans. Circuits Syst. Video Technol., vol. 24, NO. 2, pp , Feb [2] J. Mielikainen, “LSB matching revisited,” IEEE Signal Process. Lett., vol. 13, no. 5, pp. 285–287, May [3] X.Li, B.Yang et al., “A generalization of LSB matching,” IEEE Signal Process. Lett., vol. 16, no. 2, pp. 69–72, Feb [4]I. J. Cox, J. Kilian, et al. Shamoon, “Secure spread spectrum watermarking for multimedia,” IEEE Trans. Image Process., vol. 6, no. 12, pp. 1673–1687, Dec [5] Z. Ni, Y.-Q. Shi, N. Ansari, and W. Su, “Reversible data hiding,” IEEE Trans. Circuits Syst. Video Technol., vol. 16, no. 3, pp. 354–362, Mar [6] S. Kapotas, E. Varsaki, and A. Skodras, “Data hiding in H.264 encoded video sequences,” in Proc. IEEE 9th Workshop Multimedia Signal Process., pp. 373–376, Oct

[7] D. Coltuc and J.-M. Chassery, “High capacity reversible watermarking,” in Proc. IEEE Int. Conf. Image Process., pp. 2565–2568 Oct [8] J. Fridrich, M. Goljan, and R. Du, “Invertible authentication watermark for JPEG images,” in Proc. Int. Conf. Inform. Technol. Coding Comput., pp. 223–227, Apr [9] R. Crandall. (1998, Dec.) Some notes on steganography [Online]. Available: /steganografia/LINKS%20LOCALI/matrix-encoding.pdf [10] T. Shanableh, “Matrix encoding for data hiding using multilayer video coding and transcoding solutions,” Signal Process. Image Commun., vol. 27, pp. 1025–1034, Oct References (Cont.)