In this papar a new hiding mode in DCT domain, named plus and minus cross replacement, is proposed. Based on the mode, a new steganography scheme for JPEG images is designed. This scheme keeps the statistics distribut...
详细信息
In this papar a new hiding mode in DCT domain, named plus and minus cross replacement, is proposed. Based on the mode, a new steganography scheme for JPEG images is designed. This scheme keeps the statistics distributing of quantized DCT coefficients well after embedding. The histogram of DCT coefficients of the original image, the steg image and the calibrated image basically keep consistent. So the arithmetic can resist the steganalysis based on histogram attack. Experimental results show the advantage of this scheme compared with others.
Quantization Index Modulation is an important class of watermark methods, which has been widely used in blind watermark applications. And it is well known that spread transform dither modulation (STDM), as an extensio...
详细信息
ISBN:
(纸本)9781424444618
Quantization Index Modulation is an important class of watermark methods, which has been widely used in blind watermark applications. And it is well known that spread transform dither modulation (STDM), as an extension of QIM, has good performance in robustness to random noise and re-quantization. However, the quantization step sizes used in STDM are random numbers not taking the feature of the image into account. In this paper, we proposed a step projection-based STDM algorithm, which applies a novel way to incorporate the modified perceptual model with STDM framework. Experimental results indicate that our proposed scheme counters the weakness of the original STDM, the excessive sensitivity to volumetric scaling, successfully. Compared with the former proposed modified schemes of STDM, our proposed scheme have considerable advantages, especially in robustness to Gauss Noise, Salt&Pepper Noise and JPEG compression.
Watermarking is the embedding of data into images such that it may or may not visible in the images. It's essential in today's world for copyright protection and identifying the rightful owner of the image in ...
详细信息
Watermarking is the embedding of data into images such that it may or may not visible in the images. It's essential in today's world for copyright protection and identifying the rightful owner of the image in today's world of internet. Generally, watermarking involves two stages namely embedding of watermark and extraction of watermark. There are various attacks which considerably degrade the quality of extracted watermark often resulting in imperceptibility of the watermark. These attacks include Image Compression, Geometric Attacks such as rotation, cropping, Addition of Noise, Filtering in frequency domain etc. It is desirous that any watermarking scheme survives compression attack because in today's world images are compressed before they are uploaded on internet for sharing. In this paper we present a watermarking scheme that involves watermarking a colored image with a colored watermark that can tolerate compression attacks. Furthermore, our scheme involves multiple stages which results in an increased level of copyright protection to colored images.
In this paper, we proposed an image watermarking algorithm based on Human Visual System's perceptual model in the dual tree complex wavelet domain. We took advantages of the regular and the complex wavelets (perfe...
详细信息
In this paper, we proposed an image watermarking algorithm based on Human Visual System's perceptual model in the dual tree complex wavelet domain. We took advantages of the regular and the complex wavelets (perfect reconstruction, approximate shift invariance, and good directional selectivity) for watermark embedding. Firstly we applied the JND (Just Noticeable Difference) to control the watermark embedding strength. Then the host image was decomposed into six sub-bands by the 4-level dual tree complex wavelet transform. We embedded the watermark sequence into the six subbands with the same JND value. Lastly the watermark was extracted by comparing the host image coefficients and the watermarked image coefficients. Experimental results confirm that the proposed method was robust against geometric distortions, Gaussian noise, JPEG compression and Gaussian low pass filtering attacks.
The IEEE 802.15.4 protocol is a well accepted standard for wireless sensor network (WSN). To deliver the video data in WSN, MPEG2 TS over IEEE 802.15.4 networks is constructed. For lower energy consumption, the MPEG2 ...
详细信息
The IEEE 802.15.4 protocol is a well accepted standard for wireless sensor network (WSN). To deliver the video data in WSN, MPEG2 TS over IEEE 802.15.4 networks is constructed. For lower energy consumption, the MPEG2 TS header compression mechanism is proposed. The simulation shows that the proposed mechanism reduces the length of MPEG2 TS packet around 4-5%. The proposed mechanism can save the energy and increase the video quality in low-rate WSN.
Medical imaging applications generate large volumes of medical data leading to challenges for transmission and storage. In this paper, a novel lossless 3D compression scheme for medical image delivery is proposed. It ...
详细信息
Medical imaging applications generate large volumes of medical data leading to challenges for transmission and storage. In this paper, a novel lossless 3D compression scheme for medical image delivery is proposed. It is based on Prediction by Partial Matching (PPM) in combination with 3D JPEG-4 compression. This scheme is intended for accelerating the delivery of data over the Internet and consequently we are concerned with both compression ratio and decompression time. Experimental results illustrate that the proposed scheme is efficient and feasible in terms of both compression ratio and decompression speed.
This work aims to address the fault tolerance issues in design, implemention and testing of a low-cost imaging payload for a small cube satellite using COTS material. It proposes a test-bed for simulating single-event...
详细信息
This work aims to address the fault tolerance issues in design, implemention and testing of a low-cost imaging payload for a small cube satellite using COTS material. It proposes a test-bed for simulating single-event upset (SEU) phenomenon in memory chips of satellite and evaluating tolerance of onboard JPEG compression algorithm. Single event upset (SEU) causes bit flips in memory circuits without any damage or interference in operation. A method is developed for simulating radiation-induced bit flips using Montë Carlo fault-injection method and quantitatively evaluating the sensitivity of JPEG compression algorithm. Markov chains have been used in simulations of random SEU's for N hours. It was found that for low-earth orbit missions, no radiation-hardening of memory is needed and occasional memory `scrubbing' operation will suffice. It was also found that JPEG algorithm has low sensitivity and high tolerance to errors induced by SEU's.
In this paper, a video surveillance system is designed to provide means for ensuring privacy information security and offer the capability of proving authenticity. First, a real-time scrambling approach to conceal vid...
详细信息
In this paper, a video surveillance system is designed to provide means for ensuring privacy information security and offer the capability of proving authenticity. First, a real-time scrambling approach to conceal video information is presented. The sign of transform coefficients for intra macro- block is pseudo-randomly flipped, and so only the authorized persons are allowed to correctly decode the code-stream. At the same time, a method for embedding digital watermark into videos is proposed. The relationship among the DC components in several successive frames is used for hiding data. Simulation results based on MPEG-4 show that a good level of security is provided by the end-to-end security scheme. Furthermore, this is achieved with a small impact on coding performance and computation complexity.
In general, the terrestrial communication resources are limited when infra structure is damaged or excessive traffic. But it is essentially required that an emergency communications should be reliable and flexible for...
详细信息
In general, the terrestrial communication resources are limited when infra structure is damaged or excessive traffic. But it is essentially required that an emergency communications should be reliable and flexible for disaster mitigation and relief operation. All users wish emergency communications is working perfectly everywhere and every time in any circumstances. Moreover the need for broadband communications during disaster or emergency times is gradually increasing recently. Based upon radio links, satellite based systems have several advantages in terms of reliable, available, robust, quickly deployable, and accessible from any locations. In this paper a satellite communications system is introduced as a core network for emergency management and disaster recovery including satellite network topologies, service configuration, and recommended technical specifications.
In this paper, we introduce a unified 1-D IDCT architecture for a video decoder supporting multiple standards including AVS, VC-1, MPEG-4 and H.264. The low-cost architecture is implemented by the method of matrix dec...
详细信息
In this paper, we introduce a unified 1-D IDCT architecture for a video decoder supporting multiple standards including AVS, VC-1, MPEG-4 and H.264. The low-cost architecture is implemented by the method of matrix decomposition and sharing resources such as adders and shifters as far as possible. We make use of the coefficients in AVS and VC-1 to reduce the complexity of IDCT based on MPEG-4 greatly. And multipliers are replaced by shifters and adders, which are much more area-efficient. Researching on the relationship of coefficients among AVS, VC-1, and MPEG-4, we propose a low-cost hardware sharing architectures requiring lower hardware cost than that of the individual and separate implementations.
暂无评论