Authors:Bijan G. Mobasseri、Domenick Cinalli

Slides:



Advertisements
Similar presentations
Multicast and Unicast Real-Time Video Streaming Over Wireless LANs Abhik Majumdar, Daniel Grobe Sachs, Igor V. Kozintsev, Kannan Ramchandran, and Minerva.
Advertisements

Error Resilience for MPEG-4 Environment Nimrod Peleg Nov
VIPER DSPS 1998 Slide 1 A DSP Solution to Error Concealment in Digital Video Eduardo Asbun and Edward J. Delp Video and Image Processing Laboratory (VIPER)
Error detection and concealment for Multimedia Communications Senior Design Fall 06 and Spring 07.
Sang-Chun Han Hwangjun Song Jun Heo International Conference on Intelligent Hiding and Multimedia Signal Processing (IIH-MSP), Feb, /05 Feb 2009.
CS335 Principles of Multimedia Systems Multimedia Over IP Networks -- III Hao Jiang Computer Science Department Boston College Nov. 13, 2007.
Error Concealment For Fine Granularity Scalable Video Transmission Hua Cai; Guobin Shen; Feng Wu; Shipeng Li; Bing Zeng; Multimedia and Expo, Proceedings.
Video Streaming: An FEC-Based Novel Approach Jianfei Cai, Chang Wen Chen Electrical and Computer Engineering, Canadian Conference on.
Error Resilience in a Generic Compressed Video Stream Transmitted over a Wireless Channel Muhammad Bilal
On Packetization of Embedded Multimedia Bitstreams Xiaolin Wu, Samuel Cheng, and Zixiang Xiong IEEE Transactions On Multimedia, March 2001.
A Concealment Method for Shape Information in MPEG-4 Coded Video Sequences Shahram Shirani, Berna Erol, and Faouzi Kossentini IEEE TRANSACTIONS ON MULTIMEDIA,
MPEG-2 Transport streams tMyn1 MPEG-2 Transport streams The MPEG-2 Systems Standard specifies two methods for multiplexing the audio, video and other data.
NETWORKING CONCEPTS. DATA LINK LAYER Data Link Control main functions of the data link layer are Data link control media access control. Data link control.
DIGITAL WATERMARKING OF AUDIO SIGNALS USING A PSYCHOACOUSTIC AUDITORY MODEL AND SPREAD SPECTRUM THEORY * By: Ricardo A. Garcia *Research done at: University.
DIGITAL WATERMARKING OF AUDIO SIGNALS USING A PSYCHOACOUSTIC AUDITORY MODEL AND SPREAD SPECTRUM THEORY By: Ricardo A. Garcia University of Miami School.
Electrical Engineering National Central University Video-Audio Processing Laboratory Data Error in (Networked) Video M.K.Tsai 04 / 08 / 2003.
Secure Steganography in Audio using Inactive Frames of VoIP Streams
CAC ANNUAL MEETING DATA HIDING IN COMPRESSED MULTIMEDIA SIGNALS Bijan Mobasseri, PI S. R. Nelatury Dom Cinalli Dan Cross Aaron Evans Colin O’Connor Sathya.
Reversible Color Image Watermarking in YCoCg-R Color Space Aniket Roy under the supervision of Dr. Rajat Subhra Chakraborty.
1 Security and Robustness Enhancement for Image Data Hiding Authors: Ning Liu, Palak Amin, and K. P. Subbalakshmi, Senior Member, IEEE IEEE TRANSACTIONS.
1 Lecture 17 – March 21, 2002 Content-delivery services. Multimedia services Reminder  next week individual meetings and project status report are due.
AFOSR PROGRAM REVIEW DATA HIDING IN COMPRESED DIGITAL VIDEO Bijan Mobasseri, PI Dom Cinalli, Aaron Evans, Dan Cross, Sathya Akunuru ECE Department Villanova.
Final Review by Amy Zhang Digital Media Computing.
Image Processing and Computer Vision: 91. Image and Video Coding Compressing data to a smaller volume without losing (too much) information.
Codec structuretMyn1 Codec structure In an MPEG system, the DCT and motion- compensated interframe prediction are combined. The coder subtracts the motion-compensated.
8. 1 MPEG MPEG is Moving Picture Experts Group On 1992 MPEG-1 was the standard, but was replaced only a year after by MPEG-2. Nowadays, MPEG-2 is gradually.
Compression video overview 演講者:林崇元. Outline Introduction Fundamentals of video compression Picture type Signal quality measure Video encoder and decoder.
A New Approach to Image Authentication Using Chaotic Map and Sudoku Puzzle 2009 Fifth International Conference on Intelligent Information Hiding and Multimedia.
Watermarking Part 2: Future Work Electrical and Computer Engineering Department Villanova University 18 August 2004 Robert J. Berger II Michael P. Marcinak.
Reversible hiding in DCT-based compressed images Authors:Chin-Chen Chang, Chia-Chen Lin, Chun-Sen Tseng and Wei-Liang Tai Adviser: Jui-Che Teng Speaker:
Coding Theory Efficient and Reliable Transfer of Information
Spring 2000CS 4611 Multimedia Outline Compression RTP Scheduling.
Methods of Handling Packet Loss for Multimedia Applications by Hansen Bow.
Secure Spread Spectrum Watermarking for Multimedia Young K Hwang.
CS654: Digital Image Analysis Lecture 34: Different Coding Techniques.
An Algorithm for Construction of Error-Correcting Symmetrical Reversible Variable Length Codes Chia-Wei Lin, Ja-Ling Wu, Jun-Cheng Chen Presented by Jun-Cheng.
Blind image data hiding based on self reference Source : Pattern Recognition Letters, Vol. 25, Aug. 2004, pp Authors: Yulin Wang and Alan Pearmain.
STATISTIC & INFORMATION THEORY (CSNB134) MODULE 11 COMPRESSION.
An improved unequal error protection technique for the wireless transmission of MPEG-4 Video Bo Yan, Kam Wing NG The Chinese University of Hong Kong ICICS-PCM.
南台科技大學 資訊工程系 Data hiding based on the similarity between neighboring pixels with reversibility Author:Y.-C. Li, C.-M. Yeh, C.-C. Chang. Date:
1 Reversible visible watermarking and lossless recovery of original images Source: IEEE transactions on circuits and systems for video technology, vol.
Efficient Huffman Decoding Aggarwal, M. and Narayan, A., International Conference on Image Processing, vol. 1, pp. 936 – 939, 2000 Presenter :Yu-Cheng.
Networked Multimedia Basics. Network Characteristics.
Network Models. 2.1 what is the Protocol? A protocol defines the rules that both the sender and receiver and all intermediate devices need to follow,
H. 261 Video Compression Techniques 1. H.261  H.261: An earlier digital video compression standard, its principle of MC-based compression is retained.
Source: IEEE Signal Processing Letters (Accepted)2016
Multimedia Outline Compression RTP Scheduling Spring 2000 CS 461.
Injong Rhee ICMCS’98 Presented by Wenyu Ren
Model-based Steganography
Source : Signal Processing, Volume 133, April 2017, Pages
New Framework of Reversible Data Hiding in Encrypted JPEG Bitstreams
Separable and error-free reversible data hiding in encrypted images
An efficient reversible data hiding method for AMBTC compressed images
Source : Signal Processing Image Communication Vol. 66, pp , Aug 2018
Information Hiding and Its Applications
Authors:Tae-Yun Chung; Min-Suk Hong; Young-Nam Oh;
Partial reversible data hiding scheme using (7, 4) hamming code
Author: Minoru Kuribayashi, Hatsukazu Tanaka
Chapter 8 – Compression Aims: Outline the objectives of compression.
Partial reversible data hiding scheme using (7, 4) hamming code
A Self-Reference Watermarking Scheme Based on Wet Paper Coding
Blind Reversible Authentication Based on PEE and CS Reconstruction
DIGITAL WATERMARKING OF AUDIO SIGNALS USING A PSYCHOACOUSTIC AUDITORY MODEL AND SPREAD SPECTRUM THEORY By: Ricardo A. Garcia University of Miami School.
Source: IEEE Access. (2019/05/13). DOI: /ACCESS
Authors: J.J. Murillo-Fuentes
Data Link Layer. Position of the data-link layer.
Lossless Data Hiding in the Spatial Domain for High Quality Images
A Quadratic-Residue-based Fragile Watermarking Scheme
Privacy-Preserving Reversible Watermarking for Data Exfiltration Prevention Through Lexicographic Permutations Source: IIH-MSP(2018): Authors:
Hiding Information in VQ Index Tables with Reversibility
Presentation transcript:

Lossless watermarking of compressed media using reversibly decodable packets Authors:Bijan G. Mobasseri、Domenick Cinalli Source:Signal Processing 86 Reporter:楊蹕齊

Outline Objective Two-way decodable packet Watermark detection Establishing synchronization in watermarked bitstream Experimental result Conclusion

Objective Entropy coded multimedia signals such as JPEG and MPEG-1 and 2 have little or no error resiliency. To counter this situation, researchers have proposed using reversible VLCs (RVLC) to identify and limit error propagation. The objective in this paper is to embed the watermark directly in the compressed bitstream of a popular compression standard, specifically MPEG-2, and restore the cover signal with no loss.

Two-way decodable packet Bidirectional packet Watermark embedding Instant error detection and reverse decoding

Bidirectional packet Define a packet P consisting of N consecutive VLCs as follows: If

Watermark embedding

Instant error detection and reverse decoding To ensure forward detection failure right at the edge of a watermarked VLC, the decoded Cw must begin with a sequence of flag bits of length lf. The flag bits have a single job: to guarantee detection failure.

Watermark detection Packet length known to the decoder Packet length unknown to the decoder-reverse flag

Packet length known to the decoder

Packet length unknown to the decoder-reverse flag

Establishing synchronization in watermarked bitstream Variable length packet watermarking can only be implemented if the end-of-packet can be reliably identified. Authors propose the following resynchronization algorithm: once the forward flag is encountered, the decoder will parse the bitstream forward and pause at every end-of-packet emulation it finds. They call these emulations potential end-of-packets (PEOPs).

Experimental result

Conclusion Authors proposed a lossless watermarking algorithm for compressed media. They used a two-way decodable packet, originally designed to counter channels errors, to recover watermark bits. Decoding does not require access to the original title; thus, the algorithm is both lossless and blind.