1,291 research outputs found

    Spread spectrum-based video watermarking algorithms for copyright protection

    Get PDF
    Merged with duplicate record 10026.1/2263 on 14.03.2017 by CS (TIS)Digital technologies know an unprecedented expansion in the last years. The consumer can now benefit from hardware and software which was considered state-of-the-art several years ago. The advantages offered by the digital technologies are major but the same digital technology opens the door for unlimited piracy. Copying an analogue VCR tape was certainly possible and relatively easy, in spite of various forms of protection, but due to the analogue environment, the subsequent copies had an inherent loss in quality. This was a natural way of limiting the multiple copying of a video material. With digital technology, this barrier disappears, being possible to make as many copies as desired, without any loss in quality whatsoever. Digital watermarking is one of the best available tools for fighting this threat. The aim of the present work was to develop a digital watermarking system compliant with the recommendations drawn by the EBU, for video broadcast monitoring. Since the watermark can be inserted in either spatial domain or transform domain, this aspect was investigated and led to the conclusion that wavelet transform is one of the best solutions available. Since watermarking is not an easy task, especially considering the robustness under various attacks several techniques were employed in order to increase the capacity/robustness of the system: spread-spectrum and modulation techniques to cast the watermark, powerful error correction to protect the mark, human visual models to insert a robust mark and to ensure its invisibility. The combination of these methods led to a major improvement, but yet the system wasn't robust to several important geometrical attacks. In order to achieve this last milestone, the system uses two distinct watermarks: a spatial domain reference watermark and the main watermark embedded in the wavelet domain. By using this reference watermark and techniques specific to image registration, the system is able to determine the parameters of the attack and revert it. Once the attack was reverted, the main watermark is recovered. The final result is a high capacity, blind DWr-based video watermarking system, robust to a wide range of attacks.BBC Research & Developmen

    Multibiometric security in wireless communication systems

    Get PDF
    This thesis was submitted for the degree of Doctor of Philosophy and awarded by Brunel University, 05/08/2010.This thesis has aimed to explore an application of Multibiometrics to secured wireless communications. The medium of study for this purpose included Wi-Fi, 3G, and WiMAX, over which simulations and experimental studies were carried out to assess the performance. In specific, restriction of access to authorized users only is provided by a technique referred to hereafter as multibiometric cryptosystem. In brief, the system is built upon a complete challenge/response methodology in order to obtain a high level of security on the basis of user identification by fingerprint and further confirmation by verification of the user through text-dependent speaker recognition. First is the enrolment phase by which the database of watermarked fingerprints with memorable texts along with the voice features, based on the same texts, is created by sending them to the server through wireless channel. Later is the verification stage at which claimed users, ones who claim are genuine, are verified against the database, and it consists of five steps. Initially faced by the identification level, one is asked to first present one’s fingerprint and a memorable word, former is watermarked into latter, in order for system to authenticate the fingerprint and verify the validity of it by retrieving the challenge for accepted user. The following three steps then involve speaker recognition including the user responding to the challenge by text-dependent voice, server authenticating the response, and finally server accepting/rejecting the user. In order to implement fingerprint watermarking, i.e. incorporating the memorable word as a watermark message into the fingerprint image, an algorithm of five steps has been developed. The first three novel steps having to do with the fingerprint image enhancement (CLAHE with 'Clip Limit', standard deviation analysis and sliding neighborhood) have been followed with further two steps for embedding, and extracting the watermark into the enhanced fingerprint image utilising Discrete Wavelet Transform (DWT). In the speaker recognition stage, the limitations of this technique in wireless communication have been addressed by sending voice feature (cepstral coefficients) instead of raw sample. This scheme is to reap the advantages of reducing the transmission time and dependency of the data on communication channel, together with no loss of packet. Finally, the obtained results have verified the claims

    A digital signature and watermarking based authentication system for JPEG2000 images

    Get PDF
    In this thesis, digital signature based authentication system was introduced, which is able to protect JPEG2000 images in different flavors, including fragile authentication and semi-fragile authentication. The fragile authentication is to protect the image at code-stream level, and the semi-fragile is to protect the image at the content level. The semi-fragile can be further classified into lossy and lossless authentication. With lossless authentication, the original image can be recovered after verification. The lossless authentication and the new image compression standard, JPEG2000 is mainly discussed in this thesis

    Discrete Wavelet Transforms

    Get PDF
    The discrete wavelet transform (DWT) algorithms have a firm position in processing of signals in several areas of research and industry. As DWT provides both octave-scale frequency and spatial timing of the analyzed signal, it is constantly used to solve and treat more and more advanced problems. The present book: Discrete Wavelet Transforms: Algorithms and Applications reviews the recent progress in discrete wavelet transform algorithms and applications. The book covers a wide range of methods (e.g. lifting, shift invariance, multi-scale analysis) for constructing DWTs. The book chapters are organized into four major parts. Part I describes the progress in hardware implementations of the DWT algorithms. Applications include multitone modulation for ADSL and equalization techniques, a scalable architecture for FPGA-implementation, lifting based algorithm for VLSI implementation, comparison between DWT and FFT based OFDM and modified SPIHT codec. Part II addresses image processing algorithms such as multiresolution approach for edge detection, low bit rate image compression, low complexity implementation of CQF wavelets and compression of multi-component images. Part III focuses watermaking DWT algorithms. Finally, Part IV describes shift invariant DWTs, DC lossless property, DWT based analysis and estimation of colored noise and an application of the wavelet Galerkin method. The chapters of the present book consist of both tutorial and highly advanced material. Therefore, the book is intended to be a reference text for graduate students and researchers to obtain state-of-the-art knowledge on specific applications

    Distributed video coding for wireless video sensor networks: a review of the state-of-the-art architectures

    Get PDF
    Distributed video coding (DVC) is a relatively new video coding architecture originated from two fundamental theorems namely, Slepian–Wolf and Wyner–Ziv. Recent research developments have made DVC attractive for applications in the emerging domain of wireless video sensor networks (WVSNs). This paper reviews the state-of-the-art DVC architectures with a focus on understanding their opportunities and gaps in addressing the operational requirements and application needs of WVSNs

    A Survey on Ear Biometrics

    No full text
    Recognizing people by their ear has recently received significant attention in the literature. Several reasons account for this trend: first, ear recognition does not suffer from some problems associated with other non contact biometrics, such as face recognition; second, it is the most promising candidate for combination with the face in the context of multi-pose face recognition; and third, the ear can be used for human recognition in surveillance videos where the face may be occluded completely or in part. Further, the ear appears to degrade little with age. Even though, current ear detection and recognition systems have reached a certain level of maturity, their success is limited to controlled indoor conditions. In addition to variation in illumination, other open research problems include hair occlusion; earprint forensics; ear symmetry; ear classification; and ear individuality. This paper provides a detailed survey of research conducted in ear detection and recognition. It provides an up-to-date review of the existing literature revealing the current state-of-art for not only those who are working in this area but also for those who might exploit this new approach. Furthermore, it offers insights into some unsolved ear recognition problems as well as ear databases available for researchers

    On the data hiding theory and multimedia content security applications

    Get PDF
    This dissertation is a comprehensive study of digital steganography for multimedia content protection. With the increasing development of Internet technology, protection and enforcement of multimedia property rights has become a great concern to multimedia authors and distributors. Watermarking technologies provide a possible solution for this problem. The dissertation first briefly introduces the current watermarking schemes, including their applications in video,, image and audio. Most available embedding schemes are based on direct Spread Sequence (SS) modulation. A small value pseudo random signature sequence is embedded into the host signal and the information is extracted via correlation. The correlation detection problem is discussed at the beginning. It is concluded that the correlator is not optimum in oblivious detection. The Maximum Likelihood detector is derived and some feasible suboptimal detectors are also analyzed. Through the calculation of extraction Bit Error Rate (BER), it is revealed that the SS scheme is not very efficient due to its poor host noise suppression. The watermark domain selection problem is addressed subsequently. Some implications on hiding capacity and reliability are also studied. The last topic in SS modulation scheme is the sequence selection. The relationship between sequence bandwidth and synchronization requirement is detailed in the work. It is demonstrated that the white sequence commonly used in watermarking may not really boost watermark security. To address the host noise suppression problem, the hidden communication is modeled as a general hypothesis testing problem and a set partitioning scheme is proposed. Simulation studies and mathematical analysis confirm that it outperforms the SS schemes in host noise suppression. The proposed scheme demonstrates improvement over the existing embedding schemes. Data hiding in audio signals are explored next. The audio data hiding is believed a more challenging task due to the human sensitivity to audio artifacts and advanced feature of current compression techniques. The human psychoacoustic model and human music understanding are also covered in the work. Then as a typical audio perceptual compression scheme, the popular MP3 compression is visited in some length. Several schemes, amplitude modulation, phase modulation and noise substitution are presented together with some experimental results. As a case study, a music bitstream encryption scheme is proposed. In all these applications, human psychoacoustic model plays a very important role. A more advanced audio analysis model is introduced to reveal implications on music understanding. In the last part, conclusions and future research are presented

    Protection and fault location schemes suited to large-scale multi-vendor high voltage direct current grids

    Get PDF
    Recent developments in voltage source converter (VSC) technology have led to an increased interest in high voltage direct current (HVDC) transmission to support the integration of massive amounts of renewable energy sources (RES) and especially, offshore wind energy. VSC-based HVDC grids are considered to be the natural evolution of existing point-to-point links and are expected to be one of the key enabling technologies towards expediting the integration and better utilisation of offshore energy, dealing with the variable nature of RES, and driving efficient energy balance over wide areas and across countries. Despite the technological advancements and the valuable knowledge gained from the operation of the already built multi-terminal systems, there are several outstanding issues that need to be resolved in order to facilitate the deployment of large-scale meshed HVDC grids. HVDC protection is of utmost importance to ensure the necessary reliability and security of HVDC grids, yet very challenging due to the fast nature of development of DC faults and the abrupt changes they cause in currents and voltages that may damage the system components. This situation is further exacerbated in highly meshed networks, where the effects of a DC fault on a single component (e.g. DC cable) can quickly propagate across the entire HVDC grid. To mitigate the effect of DC faults in large-scale meshed HVDC grids, fast and fully selective approaches using dedicated DC circuit breaker and protection relays are required. As the speed of DC fault isolation is one order of magnitude faster than typical AC protection (i.e. less than 10 ms), there is a need for the development of innovative approaches to system protection, including the design and implementation of more advanced protection algorithms. Moreover, in a multi-vendor environment (in which different or the same type of equipment is supplied by various manufacturers), the impact of the grid elements on the DC fault signature may differ considerably from case to case, thus increasing the complexity of designing reliable protection algorithms for HVDC grids. Consequently, there is a need for a more fundamental approach to the design and development of protection algorithms that will enable their general applicability. Furthermore, following successful fault clearance, the next step is to pinpoint promptly the exact location of the fault along the transmission medium in an effort to expedite inspection and repair time, reduce power outage time and elevate the total availability of the HVDC grid. Successful fault location becomes increasingly challenging in HVDC grids due to the short time windows between fault inception and fault clearance that limit the available fault data records that may be utilised for the execution of fault location methods. This thesis works towards the development of protection and fault location solutions, designed specifically for application in large-scale multi-vendor HVDC grids. First, a methodology is developed for the design of travelling wave based non-unit protection algorithms that can be easily configured for any grid topology and parameters. Second, using this methodology, a non-unit protection algorithm based on wavelet transform is developed that ensures fast, discriminative and enhanced protection performance. Besides offline simulations, the efficacy of the wavelet transform based algorithm is also demonstrated by means of real-time simulation, thereby removing key technical barriers that have impeded the use of wavelet transform in practical protection applications. Third, in an effort to reinforce the technical and economic feasibility of future HVDC grids, a thorough fault management strategy is presented for systems that employ efficient modular multilevel converters with partial fault tolerant capability. Finally, a fault location scheme is developed for accurately estimating the fault location in HVDC grids that are characterised by short post-fault data windows due to the utilisation of fast acting protection systems.Recent developments in voltage source converter (VSC) technology have led to an increased interest in high voltage direct current (HVDC) transmission to support the integration of massive amounts of renewable energy sources (RES) and especially, offshore wind energy. VSC-based HVDC grids are considered to be the natural evolution of existing point-to-point links and are expected to be one of the key enabling technologies towards expediting the integration and better utilisation of offshore energy, dealing with the variable nature of RES, and driving efficient energy balance over wide areas and across countries. Despite the technological advancements and the valuable knowledge gained from the operation of the already built multi-terminal systems, there are several outstanding issues that need to be resolved in order to facilitate the deployment of large-scale meshed HVDC grids. HVDC protection is of utmost importance to ensure the necessary reliability and security of HVDC grids, yet very challenging due to the fast nature of development of DC faults and the abrupt changes they cause in currents and voltages that may damage the system components. This situation is further exacerbated in highly meshed networks, where the effects of a DC fault on a single component (e.g. DC cable) can quickly propagate across the entire HVDC grid. To mitigate the effect of DC faults in large-scale meshed HVDC grids, fast and fully selective approaches using dedicated DC circuit breaker and protection relays are required. As the speed of DC fault isolation is one order of magnitude faster than typical AC protection (i.e. less than 10 ms), there is a need for the development of innovative approaches to system protection, including the design and implementation of more advanced protection algorithms. Moreover, in a multi-vendor environment (in which different or the same type of equipment is supplied by various manufacturers), the impact of the grid elements on the DC fault signature may differ considerably from case to case, thus increasing the complexity of designing reliable protection algorithms for HVDC grids. Consequently, there is a need for a more fundamental approach to the design and development of protection algorithms that will enable their general applicability. Furthermore, following successful fault clearance, the next step is to pinpoint promptly the exact location of the fault along the transmission medium in an effort to expedite inspection and repair time, reduce power outage time and elevate the total availability of the HVDC grid. Successful fault location becomes increasingly challenging in HVDC grids due to the short time windows between fault inception and fault clearance that limit the available fault data records that may be utilised for the execution of fault location methods. This thesis works towards the development of protection and fault location solutions, designed specifically for application in large-scale multi-vendor HVDC grids. First, a methodology is developed for the design of travelling wave based non-unit protection algorithms that can be easily configured for any grid topology and parameters. Second, using this methodology, a non-unit protection algorithm based on wavelet transform is developed that ensures fast, discriminative and enhanced protection performance. Besides offline simulations, the efficacy of the wavelet transform based algorithm is also demonstrated by means of real-time simulation, thereby removing key technical barriers that have impeded the use of wavelet transform in practical protection applications. Third, in an effort to reinforce the technical and economic feasibility of future HVDC grids, a thorough fault management strategy is presented for systems that employ efficient modular multilevel converters with partial fault tolerant capability. Finally, a fault location scheme is developed for accurately estimating the fault location in HVDC grids that are characterised by short post-fault data windows due to the utilisation of fast acting protection systems
    corecore