1 Image Integrity and Correction Using Parities of Error Control Coding By Jaejin Lee and Chee Sun Won Presented by Du-Xiao Cai

Slides:



Advertisements
Similar presentations
Capacity-Approaching Codes for Reversible Data Hiding Weiming Zhang, Biao Chen, and Nenghai Yu Department of Electrical Engineering & Information Science.
Advertisements

1 Self-Recovery Fragile Watermarking Scheme with Variable Watermark Payload Fan Chen, Hong-Jie He, Yaoran Huo, Hongxia Wang Southwest Jiaotong University,
1 Adjustable prediction-based reversible data hiding Authors: Chin-Feng Lee and Hsing-Ling Chen Source: Digital Signal Processing, Vol. 22, No. 6, pp.
A New Scheme For Robust Blind Digital Video Watermarking Supervised by Prof. LYU, Rung Tsong Michael Presented by Chan Pik Wah, Pat Mar 5, 2002 Department.
Arbitrary Bit Generation and Correction Technique for Encoding QC-LDPC Codes with Dual-Diagonal Parity Structure Chanho Yoon, Eunyoung Choi, Minho Cheong.
1 Outline  Introduction to JEPG2000  Why another image compression technique  Features  Discrete Wavelet Transform  Wavelet transform  Wavelet implementation.
» Copying images is easy » Distributing images is easy » But what if we want to protect our rights to an image?
Video Coding with Spatio-temporal Texture Synthesis and Edge-based inpainting Chunbo Zhu, Xiaoyan Sun, Feng Wu, and Houqiang Li ICME 2008.
Fifth International Conference on Information
Efficient Moving Object Segmentation Algorithm Using Background Registration Technique Shao-Yi Chien, Shyh-Yih Ma, and Liang-Gee Chen, Fellow, IEEE Hsin-Hua.
Enhanced images watermarking based on amplitude modulation Image and Vision Computing, 24 (2006), 111 – 119 Authors :T. Amornraksa, K. Janthawongwilai.
Watermarking For Image Authentication Presented by San-Hao Wang.
Distributed Video Coding Bernd Girod, Anne Margot Aagon and Shantanu Rane, Proceedings of IEEE, Jan, 2005 Presented by Peter.
Error Concealment For Fine Granularity Scalable Video Transmission Hua Cai; Guobin Shen; Feng Wu; Shipeng Li; Bing Zeng; Multimedia and Expo, Proceedings.
A Novel Scheme for Hybrid Digital Video Watermarking By Pat P. W. Chan Supervised by Michael R. Lyu 2/2/2004 Computer Science and Engineering Department.
Lossless Compression - I Hao Jiang Computer Science Department Sept. 13, 2007.
Robust Digital Right Management Scheme (DRM) for Multimedia Anuj Maheshwari Victor Sutan
Image Watermarking For Tampering Protection and Self-Recovery
A Method for Protecting Digital Images from Being Copied Illegally Chin-Chen Chang, Jyh-Chiang Yeh, and Ju-Yuan Hsiao.
Robust Mesh-based Hashing for Copy Detection and Tracing of Images Chun-Shien Lu, Chao-Yong Hsu, Shih-Wei Sun, and Pao-Chi Chang Proc. IEEE Int. Conf.
Recover the tampered image based on VQ indexing Source: Signal Processing, Volume 90, Issue 1, Jan. 2010, pp Authors: Chun-Wei Yang and Jau-Ji.
Technical Seminar Presentation-2004 Presented by : ASHOK KUMAR SAHOO (EI ) NATIONAL INSTITUTE OF SCIENCE & TECHNOLOGY Presented By Ashok Kumar.
Colored Watermarking Technology Based on Visual Cryptography Author: Hsien-Chu Wu, Chwei-Shyong Tsai, Shu-Chuan Huang Speaker: Shu-Chuan Huang Date: May.
A Memory-efficient Huffman Decoding Algorithm
Chih-Ming Chen, Student Member, IEEE, Ying-ping Chen, Member, IEEE, Tzu-Ching Shen, and John K. Zao, Senior Member, IEEE Evolutionary Computation (CEC),
1 Wave Steganography Approach by Modified LSB 2009 Adviser: 吳坤熹 Student: 陳奕君 Presentation Data:2013/11/5 Second International Conference on Emerging Trends.
Reed Solomon Code Doug Young Suh Last updated : Aug 1, 2009.
1 影像偽裝術的最新發展 Chair Professor Chin-Chen Chang Feng Chia University National Chung Cheng University National Tsing Hua University.
Digital Watermarking -Project Proposal (EE5359: Multimedia processing) Under the Guidance of Dr. K. R. Rao Submitted by: Ehsan Syed
Detection of Image Alterations Using Semi-fragile Watermarks
A Robust Luby Transform Encoding Pattern-Aware Symbol Packetization Algorithm for Video Streaming Over Wireless Network Dongju Lee and Hwangjun Song IEEE.
1 © Unitec New Zealand CRC calculation and Hammings code.
Blind Quality Assessment System for Multimedia Communications Using Tracing Watermarking P. Campisi, M. Carli, G. Giunta and A. Neri IEEE Transactions.
Phen-Lan Lin, Chung-Kai Hsieh, and Po-Whei Huang
Multi resolution Watermarking For Digital Images Presented by: Mohammed Alnatheer Kareem Ammar Instructor: Dr. Donald Adjeroh CS591K Multimedia Systems.
Integrity of multimedia data ● Techniques for digital watermarking ● An example in the Wavelet domain ● Experimental results: evaluation.
Reed-Solomon Codes in Slow Frequency Hop Spread Spectrum Andrew Bolstad Iowa State University Advisor: Dr. John J. Komo Clemson University.
Digital Watermarking Multimedia Security. 2 What is the Watermark ? Paper Watermark –the technique of impressing into the paper a form, image, or text.
1 Reversible visible watermarking and lossless recovery of original images Source: IEEE transactions on circuits and systems for video technology, vol.
1 Department of Electrical Engineering, Stanford University EE 392J Final Project Presentation Shantanu Rane Hash-Aided Motion Estimation & Rate Control.
1 SWE 423 – Multimedia System. 2 SWE Multimedia System Introduction  Compression is the process of coding that will effectively reduce the total.
Security Protection of Software Programs by Information Sharing and Authentication Techniques Using Invisible ASCII Control Codes Authors : I-Shi Lee and.
On-Chip ECC for Low-Power SRAM Design
Source: IEEE Transactions on Multimedia, Vol. 5, No
Robust Data Hiding for MCLT Based Acoustic Data Transmission
Source: Mobile Information Systems, vol. 2017, 2017.
QR Code Authentication with Embedded Message Authentication Code
Efficient QR Code Beautification With High Quality Visual Content
Source : Signal Processing Image Communication Vol. 66, pp , Aug 2018
A Self-Reference Watermarking Scheme Based on Wet Paper Coding
Partial reversible data hiding scheme using (7, 4) hamming code
A Data-Hiding Technique with Authentication, Integration, and Confidentiality for Electronic Patient Records Chao, Hui-Mei, Hsu, Chin-Ming, and Miaou,
Digital Watermarking for Image Authentication with Localization
A Robust and Recoverable Tamper Proofing Technique for Image Authentication Authors: Chin-Chen Chang & Kuo-Lung Hung Speaker : Chin-Chen Chang.
Title Introduction: Discussion & Conclusion: Methods & Results:
Partial reversible data hiding scheme using (7, 4) hamming code
A Data-Hiding Technique With Authentication, Integration, and Confidentiality for Electronic Patient Records Chao, Hui-Mei, Hsu, Chin-Ming, and Miaou,
Novel Multiple Spatial Watermarking Technique in Color Images
A Self-Reference Watermarking Scheme Based on Wet Paper Coding
An efficient reversible data hiding with reduplicated exploiting modification direction using image interpolation and edge detection Source: Multimedia.
A Robust Digital Watermarking Of Satellite Image at Third Level DWT Decomposition Source:International Conference on Computational Intelligence and Multimedia.
Secret image sharing with steganography and authentication
Communication Theory as Applied to Wireless Sensor Networks
Hidden Digital Watermarks in Images
Source : Digital Signal Processing. Vol. 73, pp , Feb
An Efficient Spatial Prediction-Based Image Compression Scheme
Digital Watermarking Lecture 2
Source: Circuits and Systems for Video Technology,
A Quadratic-Residue-based Fragile Watermarking Scheme
Rich QR Codes With Three-Layer Information Using Hamming Code
Presentation transcript:

1 Image Integrity and Correction Using Parities of Error Control Coding By Jaejin Lee and Chee Sun Won Presented by Du-Xiao Cai IEEE International Conference on Multimedia and Expo (III) 2000

2 Outline Introduction Watermark Encoding Authentication and Correction ECC for the Watermark Sequence Experimental Results Conclusions Comments

3 Introduction Adopt ECC technique to generate the watermark. The scrambling key 1. Increase the correction capability. 2. Used as a key for the authentication.

4 Watermark Encoding

5 Authentication and Correction

6 ECC for the Watermark Sequence Reed-Solomon(RS) 1. A Reed-Solomon code is specified as RS(n,k) with s-bit symbols. n = 2 s – 1 2. Can correct up to t symbols,2t=n-k N=2 8 -1=255 T=11 K=255-22(2t) =233

7 ECC for the Watermark Sequence

8 Experimental Results

9 Conclusions Watermarking sequence can be used for correction of illegal modifications. RS technique. Scrambling key used for authentication and increase the correction capability indirectly.correction capability

10 Comments 1. Invisible but not undeletable. 2. Not resistant to lossy data compression. 3. Important information require more RS parity bytes,but not.