Domenick Cinalli ECE Department Villanova University Intelligent Ship Symposium V Monday, May 12, 2003 Metadata Embedding in Compressed UAV Video via Digital.

Slides:



Advertisements
Similar presentations
[1] AN ANALYSIS OF DIGITAL WATERMARKING IN FREQUENCY DOMAIN.
Advertisements

Prepared for DA 201  Introduction to Digital Watermarking.
Data Compression CS 147 Minh Nguyen.
A new Network Concept for transporting and storing digital video…………
Introduction to Watermarking Anna Ukovich Image Processing Laboratory (IPL)
Information Hiding: Watermarking and Steganography
Vishnu Vardhan Reddy Mukku Mav ID : Under the guidance of.
A Survey on Different Video Watermarking Techniques and Comparative Analysis with Reference to H.264/AVC Sourav Bhattacharya ; T. Chattopadhyay ; Arpan.
TAC Vista Security. Target  TAC Vista & Security Integration  Key customer groups –Existing TAC Vista users Provide features and hardware for security.
Digital Watermarking for Multimedia Security R. Chandramouli MSyNC:Multimedia Systems, Networking, and Communications Lab Stevens Institute of Technology.
Discussion on Video Analysis and Extraction, MPEG-4 and MPEG-7 Encoding and Decoding in Java, Java 3D, or OpenGL Presented by: Emmanuel Velasco City College.
Multimedia Search and Retrieval: New Concepts, System Implementation, and Application Qian Huang, Atul Puri, Zhu Liu IEEE TRANSACTION ON CIRCUITS AND SYSTEMS.
Conversion Between Video Compression Protocols Performed by: Dmitry Sezganov, Vitaly Spector Instructor: Stas Lapchev, Artyom Borzin Cooperated with:
Watermarking Technology Ishani Vyas CS590 Winter 2008.
CSCE101 –Chapter 8 Thursday, November 30, Compression MP3 players – MP3 is a compression technology that reduces the size of an audio file to 1/10.
Watermarking For Image Authentication Presented by San-Hao Wang.
Jau-Wu Huang1 Digital Rights Management for Visual Content in Mobile Applications Trimeche, M.; Chebil, F.; Nokia Research Center Control, Communications.
Lab 2: Capturing and Displaying Digital Image
Image Watermarking For Tampering Protection and Self-Recovery
1 Introduction to databases concepts CCIS – IS department Level 4.
MPEG: (Moving Pictures Expert Group) A Video Compression Standard for Multimedia Applications Seo Yeong Geon Dept. of Computer Science in GNU.
Multimedia Copyright Protection Technologies M. A. Suhail, I. A. Niazy
Thái Chí Minh Trần Lương Khiêm 1. Content  Introduction  History  Applications  Requirements  Techniques  Attacks 2.
POSTECH DP & NM Lab. (1)(1) POWER Prototype (1)(1) POWER Prototype : Towards Integrated Policy-based Management Mi-Joung Choi
Digital Watermarking Sapinkumar Amin Guided By: Richard Sinn.
Technical Seminar Presentation-2004 Presented by : ASHOK KUMAR SAHOO (EI ) NATIONAL INSTITUTE OF SCIENCE & TECHNOLOGY Presented By Ashok Kumar.
CAC ANNUAL MEETING DATA HIDING IN COMPRESSED MULTIMEDIA SIGNALS Bijan Mobasseri, PI S. R. Nelatury Dom Cinalli Dan Cross Aaron Evans Colin O’Connor Sathya.
A study for Relational Database watermarking scheme Speaker: Pei-Feng Shiu Date: 2012/09/21.
Computer Vision – Overview Hanyang University Jong-Il Park.
1 University of Palestine Information Security Principles ITGD 2202 Ms. Eman Alajrami 2 nd Semester
Information Security Principles Assistant Professor Dr. Sana’a Wafa Al-Sayegh 1 st Semester ITGD 2202 University of Palestine.
DIGITAL WATERMARKING SRINIVAS KHARSADA PATNAIK [1] AN ANALYSIS OF DIGITAL WATERMARKING IN FREQUENCY DOMAIN Presented by SRINIVAS KHARSADA PATNAIK ROLL.
Computer Concepts 2014 Chapter 8 Digital Media. 8 Digital Audio Basics  Sampling a sound wave Chapter 8: Digital Media 2.
Chapter 1 : Introduction §Purpose of Database Systems §View of Data §Data Models §Data Definition Language §Data Manipulation Language §Transaction Management.
AFOSR PROGRAM REVIEW DATA HIDING IN COMPRESED DIGITAL VIDEO Bijan Mobasseri, PI Dom Cinalli, Aaron Evans, Dan Cross, Sathya Akunuru ECE Department Villanova.
Lossless Watermarking for Image Authentication: A New Framework and an Implementation IEEE TRANSACTIONS ON IMAGE PROCESSING APRIL 2006 C.M.Chen.
CIS679: Multimedia Basics r Multimedia data type r Basic compression techniques.
©Silberschatz, Korth and Sudarshan1.1Database System Concepts Chapter 1: Introduction Purpose of Database Systems View of Data Data Models Data Definition.
MPEG-4 AVC robust video watermarking based on QIM and perceptual masking principles Marwen HASNAOUI Maher BELHAJ Mihai MITREA Françoise PRETEUX ARTEMIS.
An introduction to audio/video compression Dr. Malcolm Wilson.
Watermarking Part 2: Future Work Electrical and Computer Engineering Department Villanova University 18 August 2004 Robert J. Berger II Michael P. Marcinak.
Video Data Hiding using Forbidden Zone and Selective Embedding Submitted Under Team Members.
STEGANOGRAPHY AND DIGITAL WATERMARKING KAKATIYA INSTITUTE OF TECHNOLOGY AND SCIENCES,WARANGAL.
Reversible hiding in DCT-based compressed images Authors:Chin-Chen Chang, Chia-Chen Lin, Chun-Sen Tseng and Wei-Liang Tai Adviser: Jui-Che Teng Speaker:
Video Watermarking Real-time Labeling of MPEG-2 Compressed Video G. C. Langelaar, R. L. Lagendijk, and J. Biemond ITS, ICTG, Delft University of Technology.
1 Applications of video-content analysis and retrieval IEEE Multimedia Magazine 2002 JUL-SEP Reporter: 林浩棟.
-BY KUSHAL KUNIGAL UNDER GUIDANCE OF DR. K.R.RAO. SPRING 2011, ELECTRICAL ENGINEERING DEPARTMENT, UNIVERSITY OF TEXAS AT ARLINGTON FPGA Implementation.
Program Homework Implementation of the Improved Spread Spectrum Watermarking System.
Blind Quality Assessment System for Multimedia Communications Using Tracing Watermarking P. Campisi, M. Carli, G. Giunta and A. Neri IEEE Transactions.
Multimedia Retrieval Architecture Electrical Communication Engineering, Indian Institute of Science, Bangalore – , India Multimedia Retrieval Architecture.
Vishnu Vardhan Reddy Mukku Mav ID : Under the guidance of.
Introduction to MPEG  Moving Pictures Experts Group,  Geneva based working group under the ISO/IEC standards.  In charge of developing standards for.
DATA EMBEDDING IN SCRAMBLED DIGITAL VIDEO -BY 08L31A L31A L31A L31A0487 UNDER THE GUIDENCE OF Y.SUKANYA.
17 Copyright © 2006, Oracle. All rights reserved. Information Publisher.
Fragile Watermarking Scheme for Relational Database Fragile Watermarking Scheme for Relational Database.
[1] National Institute of Science & Technology Technical Seminar Presentation 2004 Suresh Chandra Martha National Institute of Science & Technology Audio.
Introduction to DBMS Purpose of Database Systems View of Data
Introduction Multimedia initial focus
Source : Signal Processing, Volume 133, April 2017, Pages
Introduction to Database Systems
Watermarking for Image Authentication ( Fragile Watermarking )
New Framework of Reversible Data Hiding in Encrypted JPEG Bitstreams
A Data Hiding Scheme Based Upon Block Truncation Coding
Introduction to DBMS Purpose of Database Systems View of Data
Information Hiding and Its Applications
Authors:Tae-Yun Chung; Min-Suk Hong; Young-Nam Oh;
Digital Watermarking for Image Authentication with Localization
Source: IEEE Access. (2019/05/13). DOI: /ACCESS
Hiding Information in VQ Index Tables with Reversibility
Authors:Bijan G. Mobasseri、Domenick Cinalli
Presentation transcript:

Domenick Cinalli ECE Department Villanova University Intelligent Ship Symposium V Monday, May 12, 2003 Metadata Embedding in Compressed UAV Video via Digital Watermarking Domenick Cinalli Bijan Mobasseri Colin O’Connor

Domenick Cinalli ECE Department Villanova University Intelligent Ship Symposium V Monday, May 12, 2003 Acknowledgments This work was supported in part by a grant from the US Air Force Office of Scientific Research. Predator video footage was provided by Mr. Scott Adams of the Air Force Research Lab, Rome, NY.

Domenick Cinalli ECE Department Villanova University Intelligent Ship Symposium V Monday, May 12, 2003 Objectives Define Watermarking Why Watermark? How to Watermark –MPEG Introduction Metadata Embedding System –Synchronization Metadata Viewer Application –Demo

Domenick Cinalli ECE Department Villanova University Intelligent Ship Symposium V Monday, May 12, 2003 What is Watermarking? Ability to insert a signal into a separate carrier signal without adversely affecting the carrier signal’s perceptual transparency.

Domenick Cinalli ECE Department Villanova University Intelligent Ship Symposium V Monday, May 12, 2003 Watermarked Image Example Langelaar, C., Setyawan, I., and Lagendijk, R., “Watermarking Digital Image and Video Data,” IEEE Signal Processing Magazine, vol. 17, no. 5, pp , Sept

Domenick Cinalli ECE Department Villanova University Intelligent Ship Symposium V Monday, May 12, 2003 Why Watermark? ProtectionInformative Copyright ProtectionIndexing FingerprintingMedical Record Storage Copy Generation ControlData Hiding Broadcast Monitoring Data Authentication

Domenick Cinalli ECE Department Villanova University Intelligent Ship Symposium V Monday, May 12, 2003 Variable length coderunlevel 10 (NOTE 2)End of Block 1 s (NOTE 3)01 11 s (NOTE 4) s s s s s s s s s s s s s s91 MPEG Introduction Table B-14 MPEG Bitstream SliceMacroblock Block

Domenick Cinalli ECE Department Villanova University Intelligent Ship Symposium V Monday, May 12, 2003 Data hiding in label- carrying VLCs Compressed-Domain Scheme Frame data is encoded into MPEG bitstream using Variable-Length Codes. Subset of VLCs, Label-Carrying VLCs, have least significant bit modified to carry watermark.

Domenick Cinalli ECE Department Villanova University Intelligent Ship Symposium V Monday, May 12, 2003 Label-Carrying VLCs To classify as a LC-VLC pair, both VLCs must: 1.Share a run-length 2.Differ in level by one 3.Have exactly the same bit-length

Domenick Cinalli ECE Department Villanova University Intelligent Ship Symposium V Monday, May 12, 2003 LC-VLC Example VLCRun-LengthLevel Insert Label ’11’ 1

Domenick Cinalli ECE Department Villanova University Intelligent Ship Symposium V Monday, May 12, 2003 Metadata Embedding System EmbedExtractDisplay W W -1 Video Metadata v m s v m

Domenick Cinalli ECE Department Villanova University Intelligent Ship Symposium V Monday, May 12, 2003 Metadata Descriptive Information –Date / Time –Direction –Location Video Metadata SuperStream Why Embed? –Bookkeeping –Efficiency of storage –Ease of display

Domenick Cinalli ECE Department Villanova University Intelligent Ship Symposium V Monday, May 12, 2003 Video – Metadata Synchronization Requirements –Metadata sampling starts simultaneously with recording of video –Metadata is sampled at a constant rate Result –Video and metadata are concurrently displayed and maintain synchronization. 5s 10s 15s 20s 25s 1 st Record2 nd Record3 rd Record4 th Record5 th Record6 th Record

Domenick Cinalli ECE Department Villanova University Intelligent Ship Symposium V Monday, May 12, 2003 Metadata Viewer Application Concurrently display metadata & video Graphical User Interface (GUI) Abstract technical detail Easy-To-Use

Domenick Cinalli ECE Department Villanova University Intelligent Ship Symposium V Monday, May 12, 2003 Metadata Viewer Demo Predator UAV video (MPEG) & metadata provided by US Air Force Java-based –Swing API for GUI –Java Media Framework (JMF) for video Watermarking module coded in C

Domenick Cinalli ECE Department Villanova University Intelligent Ship Symposium V Monday, May 12, 2003 Summary Implemented LC-VLC Watermarking to insert metadata into Predator UAV MPEG video Created an application that abstracts watermarking tasks and extracts embedded data for simultaneous display with video

Domenick Cinalli ECE Department Villanova University Intelligent Ship Symposium V Monday, May 12, 2003 Future Work Going beyond proof of concept… –Integrating operational factors –secure embedding –frame content metadata using MPEG-4 –lossless embedding –controlled access to video based on viewer clearance