148 research outputs found

    A new approach for improving transparency of audio watermarking.

    Get PDF
    Chen Benrong.Thesis (M.Phil.)--Chinese University of Hong Kong, 2003.Includes bibliographical references (leaves 125-130).Abstracts in English and Chinese.Chapter 1 --- Introduction --- p.1Chapter 1.1 --- What' s Watermarking --- p.1Chapter 1.2 --- "Information Hiding, Steganography, and Watermarking" --- p.3Chapter 1.3 --- History of Watermarking --- p.5Chapter 1.4 --- Importance of Digital Watermarking --- p.8Chapter 1.5 --- Objectives of the Thesis --- p.9Chapter 1.6 --- Thesis Outline --- p.10Chapter 2 --- Applications and Properties of Audio Watermarking --- p.12Chapter 2.1 --- Applications --- p.13Chapter 2.1.1 --- Ownership Identification and Proof --- p.13Chapter 2.1.2 --- Broadcast Monitoring --- p.16Chapter 2.1.3 --- Other Applications --- p.18Chapter 2.2 --- Properties --- p.19Chapter 2.2.1 --- Transparency --- p.20Chapter 2.2.2 --- Robustness --- p.20Chapter 2.2.3 --- Other Properties --- p.21Chapter 3 --- Possible Methods for Audio Watermarking --- p.24Chapter 3.1 --- Overview of Digital Audio Watermarking System --- p.25Chapter 3.2 --- Review of Current Methods --- p.27Chapter 3.2.1 --- Low Bit Coding --- p.27Chapter 3.2.2 --- Phase Coding --- p.28Chapter 3.2.3 --- Echo Coding --- p.29Chapter 3.2.4 --- Spread Spectrum Watermarking --- p.30Chapter 3.3 --- Other Related Approaches --- p.31Chapter 3.4 --- Outline of Proposed New Method --- p.33Chapter 4 --- Audio Watermarking System Based on Spread Spectrum --- p.36Chapter 4.1 --- Introduction --- p.36Chapter 4.2 --- Embedding and Detecting Information Bit --- p.39Chapter 4.2.1 --- General Embedding Process --- p.39Chapter 4.2.2 --- General Detection Process --- p.43Chapter 4.2.3 --- Pseudorandom Bit Sequences (PRBS) --- p.45Chapter 4.3 --- An Optimal Embedding Process --- p.48Chapter 4.3.1 --- Objective Metrics for Embedding Process --- p.48Chapter 4.3.2 --- Content Adaptive Embedding --- p.52Chapter 4.3.3 --- Determination of Frame Length L --- p.57Chapter 4.4 --- Requirement For Transparency Improvement --- p.58Chapter 5 --- Sample and Frame Selection For Transparency Improvement --- p.60Chapter 5.1 --- Introduction --- p.60Chapter 5.2 --- Sample Selection --- p.61Chapter 5.2.1 --- General Sample Selection --- p.62Chapter 5.2.2 --- Objective Evaluation Metrics --- p.65Chapter 5.2.3 --- Sample Selection For Transparency Improvement --- p.66Chapter 5.2.4 --- Theoretical Analysis of Sample Selection --- p.87Chapter 5.3 --- Frame Sclcction --- p.90Chapter 5.3.1 --- General Frame Selection --- p.91Chapter 5.3.2 --- Frame Selection For Transparency Improvement --- p.94Chapter 5.4 --- Watermark Information Retrieve --- p.103Chapter 6 --- Psychoacoustic Model For Robustness Verification --- p.105Chapter 6.1 --- Introduction of Human Auditory System --- p.106Chapter 6.1.1 --- Absolute Hearing Threshold --- p.106Chapter 6.1.2 --- Critical Bands --- p.108Chapter 6.1.3 --- Masking Effect --- p.111Chapter 6.2 --- Psychoacoustic Model of Human Auditory System --- p.112Chapter 6.3 --- Robustness Verification by Psychoacoustic Model Analysis --- p.117Chapter 7 --- Conclusions and Suggestions For Future Research --- p.121Chapter 7.1 --- Conclusions --- p.121Chapter 7.2 --- Suggestions For Future Research --- p.123Bibliography --- p.12

    Study and Implementation of Watermarking Algorithms

    Get PDF
    Water Making is the process of embedding data called a watermark into a multimedia object such that watermark can be detected or extracted later to make an assertion about the object. The object may be an audio, image or video. A copy of a digital image is identical to the original. This has in many instances, led to the use of digital content with malicious intent. One way to protect multimedia data against illegal recording and retransmission is to embed a signal, called digital signature or copyright label or watermark that authenticates the owner of the data. Data hiding, schemes to embed secondary data in digital media, have made considerable progress in recent years and attracted attention from both academia and industry. Techniques have been proposed for a variety of applications, including ownership protection, authentication and access control. Imperceptibility, robustness against moderate processing such as compression, and the ability to hide many bits are the basic but rat..

    Recent Trends in Communication Networks

    Get PDF
    In recent years there has been many developments in communication technology. This has greatly enhanced the computing power of small handheld resource-constrained mobile devices. Different generations of communication technology have evolved. This had led to new research for communication of large volumes of data in different transmission media and the design of different communication protocols. Another direction of research concerns the secure and error-free communication between the sender and receiver despite the risk of the presence of an eavesdropper. For the communication requirement of a huge amount of multimedia streaming data, a lot of research has been carried out in the design of proper overlay networks. The book addresses new research techniques that have evolved to handle these challenges

    Digital Watermarking for Verification of Perception-based Integrity of Audio Data

    Get PDF
    In certain application fields digital audio recordings contain sensitive content. Examples are historical archival material in public archives that preserve our cultural heritage, or digital evidence in the context of law enforcement and civil proceedings. Because of the powerful capabilities of modern editing tools for multimedia such material is vulnerable to doctoring of the content and forgery of its origin with malicious intent. Also inadvertent data modification and mistaken origin can be caused by human error. Hence, the credibility and provenience in terms of an unadulterated and genuine state of such audio content and the confidence about its origin are critical factors. To address this issue, this PhD thesis proposes a mechanism for verifying the integrity and authenticity of digital sound recordings. It is designed and implemented to be insensitive to common post-processing operations of the audio data that influence the subjective acoustic perception only marginally (if at all). Examples of such operations include lossy compression that maintains a high sound quality of the audio media, or lossless format conversions. It is the objective to avoid de facto false alarms that would be expectedly observable in standard crypto-based authentication protocols in the presence of these legitimate post-processing. For achieving this, a feasible combination of the techniques of digital watermarking and audio-specific hashing is investigated. At first, a suitable secret-key dependent audio hashing algorithm is developed. It incorporates and enhances so-called audio fingerprinting technology from the state of the art in contentbased audio identification. The presented algorithm (denoted as ”rMAC” message authentication code) allows ”perception-based” verification of integrity. This means classifying integrity breaches as such not before they become audible. As another objective, this rMAC is embedded and stored silently inside the audio media by means of audio watermarking technology. This approach allows maintaining the authentication code across the above-mentioned admissible post-processing operations and making it available for integrity verification at a later date. For this, an existent secret-key ependent audio watermarking algorithm is used and enhanced in this thesis work. To some extent, the dependency of the rMAC and of the watermarking processing from a secret key also allows authenticating the origin of a protected audio. To elaborate on this security aspect, this work also estimates the brute-force efforts of an adversary attacking this combined rMAC-watermarking approach. The experimental results show that the proposed method provides a good distinction and classification performance of authentic versus doctored audio content. It also allows the temporal localization of audible data modification within a protected audio file. The experimental evaluation finally provides recommendations about technical configuration settings of the combined watermarking-hashing approach. Beyond the main topic of perception-based data integrity and data authenticity for audio, this PhD work provides new general findings in the fields of audio fingerprinting and digital watermarking. The main contributions of this PhD were published and presented mainly at conferences about multimedia security. These publications were cited by a number of other authors and hence had some impact on their works

    TechNews digests: Jan - Nov 2009

    Get PDF
    TechNews is a technology, news and analysis service aimed at anyone in the education sector keen to stay informed about technology developments, trends and issues. TechNews focuses on emerging technologies and other technology news. TechNews service : digests september 2004 till May 2010 Analysis pieces and News combined publish every 2 to 3 month

    Axmedis 2005

    Get PDF
    The AXMEDIS conference aims to promote discussions and interactions among researchers, practitioners, developers and users of tools, technology transfer experts, and project managers, to bring together a variety of participants. The conference focuses on the challenges in the cross-media domain (which include production, protection, management, representation, formats, aggregation, workflow, distribution, business and transaction models), and the integration of content management systems and distribution chains, with particular emphasis on cost reduction and effective solutions for complex cross-domain problems

    3D printing-as-a-service for collaborative engineering

    Get PDF
    3D printing or Additive Manufacturing (AM) are utilised as umbrella terms to denote a variety of technologies to manufacture or create a physical object based on a digital model. Commonly, these technologies create the objects by adding, fusing or melting a raw material in a layer-wise fashion. Apart from the 3D printer itself, no specialised tools are required to create almost any shape or form imaginable and designable. The possibilities of these technologies of these technologies are plentiful and cover the ability to manufacture every object, rapidly, locally and cost-efficiently without wasted resources and material. Objects can be created to specific forms to perform as perfectly fitting functions without consideration of the assembly process. To further the advance the availability and applicability of 3D printing, this thesis identifies the problems that currently exist and attempts to solve them. During the 3D printing process, data (i. e., files) must be converted from their original representation, e. g., CAD file, to the machine instructions for a specific 3D printer. During this process, information is lost, and other information is added. Traceability is lacking in 3D printing. The actual 3D printing can require a long period of time to complete, during which errors can occur. In 3D printing, these errors are often non-recoverable or reversible, which results in wasted material and time. In addition to the lack of closed-loop control systems for 3D printers, careful planning and preparation are required to avoid these costly misprints. 3D printers are usually located remotely from users, due to health and safety considerations, special placement requirements or out of comfort. Remotely placed equipment is impractical to monitor in person; however, such monitoring is essential. Especially considering the proneness of 3D printing to errors and the implications of this as described previously. Utilisation of 3D printers is an issue, especially with expensive 3D printers. As there are a number of differing 3D printing technologies available, having the required 3D printer, might be problematic. 3D printers are equipped with a variety of interfaces, depending on the make and model. These differing interfaces, both hard- and software, hinder the integration of different 3D printers into consistent systems. There exists no proper and complete ontology or resource description schema or mechanism that covers all the different 3D printing technologies. Such a resource description mechanism is essential for the automated scheduling in services or systems. In 3D printing services the selection and matching of appropriate and suitable 3D printers is essential, as not all 3D printing technologies are able to perform on all materials or are able to create certain object features, such as thin walls or hollow forms. The need for companies to sell digital models for AM will increase in scenarios where replacement or customised parts are 3D printed by consumers at home or in local manufacturing centres. Furthermore, requirements to safeguard these digital models will increase to avoid a repetition of the problems from the music industry, e. g., Napster. Replication and ‘theft’ of these models are uncontrollable in the current situation. In a service oriented deployment, or in scenarios where the utilisation is high, estimations of the 3D printing time are required to be available. Common 3D printing time estimations are inaccurate, which hinder the application of scheduling. The complete and comprehensive understanding of the complexity of an object is discordant, especially in the domain of AM. This understanding is required to both support the design of objects for AM and match appropriate manufacturing resources to certain objects. Quality in AM and FDM have been incompletely researched. The quality in general is increased with maturity of the technology; however, research on the quality achievable with consumer-grade 3D printers is lacking. Furthermore, cost-sensitive measurement methods for quality assessment are expandable. This thesis presents the structured design and implementation of a 3D printing service with associated contributions that provide solutions to particular problems present in the AM domain. The 3D printing service is the overarching component of this thesis and provides the platform for the other contributions with the intention to establish an online, cloud-based 3D printing service for use in end-user and professional settings with a focus on collaboration and cooperation

    MediaSync: Handbook on Multimedia Synchronization

    Get PDF
    This book provides an approachable overview of the most recent advances in the fascinating field of media synchronization (mediasync), gathering contributions from the most representative and influential experts. Understanding the challenges of this field in the current multi-sensory, multi-device, and multi-protocol world is not an easy task. The book revisits the foundations of mediasync, including theoretical frameworks and models, highlights ongoing research efforts, like hybrid broadband broadcast (HBB) delivery and users' perception modeling (i.e., Quality of Experience or QoE), and paves the way for the future (e.g., towards the deployment of multi-sensory and ultra-realistic experiences). Although many advances around mediasync have been devised and deployed, this area of research is getting renewed attention to overcome remaining challenges in the next-generation (heterogeneous and ubiquitous) media ecosystem. Given the significant advances in this research area, its current relevance and the multiple disciplines it involves, the availability of a reference book on mediasync becomes necessary. This book fills the gap in this context. In particular, it addresses key aspects and reviews the most relevant contributions within the mediasync research space, from different perspectives. Mediasync: Handbook on Multimedia Synchronization is the perfect companion for scholars and practitioners that want to acquire strong knowledge about this research area, and also approach the challenges behind ensuring the best mediated experiences, by providing the adequate synchronization between the media elements that constitute these experiences

    Modeling and Simulation in Engineering

    Get PDF
    The general aim of this book is to present selected chapters of the following types: chapters with more focus on modeling with some necessary simulation details and chapters with less focus on modeling but with more simulation details. This book contains eleven chapters divided into two sections: Modeling in Continuum Mechanics and Modeling in Electronics and Engineering. We hope our book entitled "Modeling and Simulation in Engineering - Selected Problems" will serve as a useful reference to students, scientists, and engineers
    corecore