DIGIT VIDEO SYSTEMS Lecture 0 COURSE REVIEW.

Slides:



Advertisements
Similar presentations
[1] AN ANALYSIS OF DIGITAL WATERMARKING IN FREQUENCY DOMAIN.
Advertisements

Prepared for DA 201  Introduction to Digital Watermarking.
Digital rights management Audio watermark Jiamian.
Introduction to Watermarking Anna Ukovich Image Processing Laboratory (IPL)
Information Hiding: Watermarking and Steganography
A New Scheme For Robust Blind Digital Video Watermarking Supervised by Prof. LYU, Rung Tsong Michael Presented by Chan Pik Wah, Pat Mar 5, 2002 Department.
DIGIT VIDEO SYSTEMS A. ASTAPKOVICH State University of Aerospace Instrumentations, Saint-Petersburg, 2012 Lecture 0 COURSE REVIEW.
PROPOSAL “EDGE DIGIT WATERMARK” A. Astapkovich, B. Krivosheev Saint-Petersburg State University of Aerospace Instrumentation State University of Saint-Petersburg.
Digital Watermarking for Multimedia Security R. Chandramouli MSyNC:Multimedia Systems, Networking, and Communications Lab Stevens Institute of Technology.
T H E U N I V E R S I T Y O F B R I T I S H C O L U M B I A November 2005Analysis of Attacks on Common Watermarking Techniques 1 A study on the robustness.
Applications of Image Processing. Outline What YOU are going to learn Image Processing in use.
Fifth International Conference on Information
Issues for Multimedia Privacy & Security ---- Video Content Privacy Protection, Copyright Protection & Database Access Control Jianping Fan Dept of Computer.
In the last part of the course we make a review of selected technical problems in multimedia signal processing First problem: CONTENT SECURITY AND WATERMARKING.
Bit-Plane Watermarking for SPIHT-Coded Images 台北科技大學資工所 指導教授:楊士萱 學生:廖武傑 2003/07/29.
Digital Watermarking. Introduction Relation to Cryptography –Cryptography is Reversibility (no evidence) Established –Watermarking (1990s) Non-reversible.
Watermarking and Steganography Watermarking is the practice of hiding a message about an image, audio clip, video clip, or other work of media within that.
Multimedia Security Digital Video Watermarking Supervised by Prof. LYU, Rung Tsong Michael Presented by Chan Pik Wah, Pat Nov 20, 2002 Department of Computer.
Applications of Signals and Systems Fall 2002 Application Areas Control Communications Signal Processing.
Coding techniques for digital cinema Andreja Samčović University of Belgrade Faculty of Transport and Traffic Engineering.
Digital Watermarking Parag Agarwal
Adam Day.  Applications  Classification  Common watermarking methods  Types of verification/detection  Implementing watermarking using wavelets.
MULTIMEDIA: CRYPTO IS NOT ENOUGH 9/09/2015 | pag. 2.
Applications of Signals and Systems Application Areas Control Communications Signal Processing (our concern)
Watermarking University of Palestine Eng. Wisam Zaqoot May 2010.
Introduction to Multimedia Security Topics Covered in this Course Multimedia Security.
Computer Networks: Multimedia Applications Ivan Marsic Rutgers University Chapter 3 – Multimedia & Real-time Applications.
Media Protection Media Encryption Media Watermark Media Protection Media Encryption Media Watermark Lesson 10.
Thái Chí Minh Trần Lương Khiêm 1. Content  Introduction  History  Applications  Requirements  Techniques  Attacks 2.
Russell Taylor. How the law supports Copyright Copyright Designs and Patents Act 1988 Copyright arises when an individual or organisation creates a work,
Computer Vision – Overview Hanyang University Jong-Il Park.
1 University of Palestine Information Security Principles ITGD 2202 Ms. Eman Alajrami 2 nd Semester
Information Security Principles Assistant Professor Dr. Sana’a Wafa Al-Sayegh 1 st Semester ITGD 2202 University of Palestine.
DIGITAL WATERMARKING SRINIVAS KHARSADA PATNAIK [1] AN ANALYSIS OF DIGITAL WATERMARKING IN FREQUENCY DOMAIN Presented by SRINIVAS KHARSADA PATNAIK ROLL.
Wavelet-based Coding And its application in JPEG2000 Monia Ghobadi CSC561 final project
PROPOSAL “EDGE STEGO DIGIT WATERMARK” A. Astapkovich State University of Aerospace Instrumentation 2011.
1 影像偽裝術的最新發展 Chair Professor Chin-Chen Chang Feng Chia University National Chung Cheng University National Tsing Hua University.
Digital Watermarking
Advanced Signal Processing Systems and Applications Main research areas Applications Applications –biomedical, media, communications, security Algorithms.
EMBEDDED CONTROL SYSTEMS A. ASTAPKOVITCH State University of Aerospace Instrumentation, Saint-Petersburg, 2011.
COMPARATIVE STUDY OF HEVC and H.264 INTRA FRAME CODING AND JPEG2000 BY Under the Guidance of Harshdeep Brahmasury Jain Dr. K. R. RAO ID MS Electrical.
Chapter 1. SIGNAL PROCESSING:  Signal processing is concerned with the efficient and accurate extraction of information in a signal process.  Signal.
CSE725.  Watermarking dates back in History.  Cryptography for protection.  Need of software for ownership protection.
Digital Watermarking Multimedia Security. 2 What is the Watermark ? Paper Watermark –the technique of impressing into the paper a form, image, or text.
IMAGE AUTHENTICATION TECHNIQUES Based on Automatic video surveillance (AVS) systems Guided by: K ASTURI MISHRA PRESENTED BY: MUKESH KUMAR THAKUR REG NO:
Visual Information Processing. Human Perception V.S. Machine Perception  Human perception: pictorial information improvement for human interpretation.
 Digital images store large amounts of data and information. This data can be manipulated to some extend without being detected by human eyes.  DWT(Discrete.
Introduction to Computer Security ©2004 Matt Bishop Information Security Principles Assistant Professor Dr. Sana’a Wafa Al-Sayegh 1 st Semester
1 Digital Water Marks. 2 History The Italians where the 1 st to use watermarks in the manufacture of paper in the 1270's. A watermark was used in banknote.
Ikhwannul Kholis Universitas 17 Agustus 1945 Jakarta
Pat P. W. Chan,  Michael R. Lyu, Roland T. Chin*
IMAGE PROCESSING IMAGE WATERMARKING
Welcome
High Capacity Data Embedding in JPEG Bit Streams Using Visual Models
DONE BY S.MURALIRAJAN M.NIRMAL
Secure Communications Adaptive Modulation & Coding
Presenter by : Mourad RAHALI
CSE 589 Applied Algorithms Spring 1999
MULTIMEDIA WATERMARKING IN ENHANCING DIGITAL SECURITY
Steganography in digital images
Parag Agarwal Digital Watermarking Parag Agarwal
Digital television systems (DTS)
Interactive media.
Information Hiding and Its Applications
Author: Minoru Kuribayashi, Hatsukazu Tanaka
An Algorithm for Removable Visible Watermarking
On SVD-based watermarking algorithm
Introduction to Multimedia Security Topics Covered in this Course
Digital Watermarking (cont.)
Presentation transcript:

DIGIT VIDEO SYSTEMS Lecture 0 COURSE REVIEW

GOAL OF THE COURSE Establishing the understanding of the basic principals of digit video systems : digit video processing cycle; structure of the modern digit video systems ; applications in multimedia, industrial, security, research ; review of the modern research activities ;

Course structure PHYSICAL PRINCIPALS OF THE DIGIT FRAME FORMING AND HARDWARE/SOFTWARE REALIZATIONS MODERN APPLICATIONS: MULTIMEDIA STANDARTS, DIGIT VIDEO FOR INDUSTRY AND SPACE RESEARCH DIGIT VIDEO PROCESSING BASICS REVIEW OF MODERN RESEARCH ACTIVITY

TOPIC 1. PHYSICAL AND REALIZATION BACKGROUD Lecture 1. DIGIT CAMERA § 1. Digit frame forming § 2. Noise and distortions in digit video § 3. Low level processing § 4. High level processing § 5. Structure of the modern digit video camera Lecture 2. DIGIT VIDEO § 1. Digit video in multimedia § 2. Multimedia standards review § 3. Digit video in industry and space applications § 4. Modern silicon solutions § 5. System architecture and high level software  

DIGIT CAMERA STRUCTURE

TOPIC 2. DIGIT VIDEO BASED SYSTEMS Lecture 3-4. IP-VIDEOPHONE AND SECURITY SYSTEMS §1. Packet communication nets §2. Family of IP-videophones CISCo and basics multimedia standards §3. Family of IP-videophones CISCo and basics multimedia standards §4. Audio codec and the quality of the videophones §5. Multichannel security video systems Cisco IP phone 7985 Videophone Digital Media System-on-Chip(DMSoC) TMS320DM365

APPLICATION EXAMPLES AND SPACE STANDARTS Lecture 5-6. TECHNICAL VISION SYSTEMS §1. Digit video systems for industry applications §2. Review of the mars rover Spirit-Opportunity control system §3. Mars rover video system §4. Video in the mars rover control system loop §5. Special features of the digit channel §6. Space standards of ECSS Mars rover Spirit-Opportunity

TOPIC 3. DIGIT IMAGE PROCESSING Lecture 7. DIGIT VIDEO COMPRESSING BASICS §1. Video stream parameters and and the image quality estimation §2. Video compression basic ideas §3. Wavelet compression and Haar basis §4. Review of the wavelet compression algorithms W0 HAAR wavelet 1 0 ≤ x ≤ ½ Ψ(x) = -1 ½ ≤ x ≤ 1 0 1 ≤ x; x ≤ 0 HAAR basis Ψ j i(x) = Ψ (2j x - i) i= 0..2 j -1 V1 V2 (a+b+c+d)/4 (a-b+c-d)/4 (a+b-c-d)/4 (a-b-c+d)/4 LL LH HL HH

IMAGE PROCESSING Lecture 8-9 IMAGE PROCESSING §1. Image quality estimation §2. Image filtering algorithms §3. Edge detectors §4. Moving object extractions Original image Enhanced contrast PSNR=25 dB JPEG compression

EDGE DETECTORS EDGE DETECTOR CANNY CLEAN AMAGE IMAGE EDGES NOISY IMAGE

Encryption keys - K Container - I information image or audio sample DIGIT VIDEOSTREAM PROTECTION Lecture 10. STEGANOGRAPHY § 1. Basic definitions and digit watermark classifications § 2. Digit watermark system structure § 3. System and algorithm requirements § 4. Attack review § 4. Application examples     Encryption keys - K Container - I image audio sample text code Marking information - M trade mark copy number other EMBEDDING ALGORITHM Marked information or STEGO - I”

Modified Kutter algorithm APPLICATION EXAMPLE Modified Kutter algorithm LL LH HL HH COMPRESSION JPEG, JPEG2000 WATERMARK EXSTRACTION Q=55

MODERN APPROACHES Lecture 11. ADAPTIVE ALGORITM PARADIGM § 1. Modern structural wavelet based norms SSIM and CW-SSIM § 2 Neuron net based algorithms § 3 Adaptive boosting learning ( ADA BOOST) Original image MSE=0 SSIM=1 CW-SSIM=1 MSE=306 SSIM=0.928 CW-SSIM=0.938 Enhanced contrast Distorted brightness MSE=309 SSIM=0.987 Gauss noise SSIM=0.576 CW-SSIM=0.814

Noise proof edge detector on base of ANN filter S1(0,0) S2(0,0) S1(0,1) S2(0,1) ................. 1 ……………………………….. S1(i,j) S2(i,j ) Snsen(i,j) 1 F(0,0) F(0,1) ……… F( i,j) w1 w2 wnsen+1 S * W = F min F(w) = (SW - F, SW – F)+  (W,W) w W = (ST S +  E) –1 ST F