9 research outputs found

    Data Hiding in Digital Video

    Get PDF
    With the rapid development of digital multimedia technologies, an old method which is called steganography has been sought to be a solution for data hiding applications such as digital watermarking and covert communication. Steganography is the art of secret communication using a cover signal, e.g., video, audio, image etc., whereas the counter-technique, detecting the existence of such as a channel through a statistically trained classifier, is called steganalysis. The state-of-the art data hiding algorithms utilize features; such as Discrete Cosine Transform (DCT) coefficients, pixel values, motion vectors etc., of the cover signal to convey the message to the receiver side. The goal of embedding algorithm is to maximize the number of bits sent to the decoder side (embedding capacity) with maximum robustness against attacks while keeping the perceptual and statistical distortions (security) low. Data Hiding schemes are characterized by these three conflicting requirements: security against steganalysis, robustness against channel associated and/or intentional distortions, and the capacity in terms of the embedded payload. Depending upon the application it is the designer\u27s task to find an optimum solution amongst them. The goal of this thesis is to develop a novel data hiding scheme to establish a covert channel satisfying statistical and perceptual invisibility with moderate rate capacity and robustness to combat steganalysis based detection. The idea behind the proposed method is the alteration of Video Object (VO) trajectory coordinates to convey the message to the receiver side by perturbing the centroid coordinates of the VO. Firstly, the VO is selected by the user and tracked through the frames by using a simple region based search strategy and morphological operations. After the trajectory coordinates are obtained, the perturbation of the coordinates implemented through the usage of a non-linear embedding function, such as a polar quantizer where both the magnitude and phase of the motion is used. However, the perturbations made to the motion magnitude and phase were kept small to preserve the semantic meaning of the object motion trajectory. The proposed method is well suited to the video sequences in which VOs have smooth motion trajectories. Examples of these types could be found in sports videos in which the ball is the focus of attention and exhibits various motion types, e.g., rolling on the ground, flying in the air, being possessed by a player, etc. Different sports video sequences have been tested by using the proposed method. Through the experimental results, it is shown that the proposed method achieved the goal of both statistical and perceptual invisibility with moderate rate embedding capacity under AWGN channel with varying noise variances. This achievement is important as the first step for both active and passive steganalysis is the detection of the existence of covert channel. This work has multiple contributions in the field of data hiding. Firstly, it is the first example of a data hiding method in which the trajectory of a VO is used. Secondly, this work has contributed towards improving steganographic security by providing new features: the coordinate location and semantic meaning of the object

    Secure steganography, compression and diagnoses of electrocardiograms in wireless body sensor networks

    Get PDF
    Submission of this completed form results in your thesis/project being lodged online at the RMIT Research Repository. Further information about the RMIT Research Repository is available at http://researchbank.rmit.edu.au Please complete abstract and keywords below for cataloguing and indexing your thesis/project. Abstract (Minimum 200 words, maximum 500 words) The usage of e-health applications is increasing in the modern era. Remote cardiac patients monitoring application is an important example of these e-health applications. Diagnosing cardiac disease in time is of crucial importance to save many patients lives. More than 3.5 million Australians suffer from long-term cardiac diseases. Therefore, in an ideal situation, a continuous cardiac monitoring system should be provided for this large number of patients. However, health-care providers lack the technology required to achieve this objective. Cloud services can be utilized to fill the technology gap for health-care providers. However, three main problems prevent health-care providers from using cloud services. Privacy, performance and accuracy of diagnoses. In this thesis we are addressing these three problems. To provide strong privacy protection services, two steganography techniques are proposed. Both techniques could achieve promising results in terms of security and distortion measurement. The differences between original and resultant watermarked ECG signals were less then 1%. Accordingly, the resultant ECG signal can be still used for diagnoses purposes, and only authorized persons who have the required security information, can extract the hidden secret data in the ECG signal. Consequently, to solve the performance problem of storing huge amount of data concerning ECG into the cloud, two types of compression techniques are introduced: Fractal based lossy compression technique and Gaussian based lossless compression technique. This thesis proves that, fractal models can be efficiently used in ECG lossy compression. Moreover, the proposed fractal technique is a multi-processing ready technique that is suitable to be implemented inside a cloud to make use of its multi processing capability. A high compression ratio could be achieved with low distortion effects. The Gaussian lossless compression technique is proposed to provide a high compression ratio. Moreover, because the compressed files are stored in the cloud, its services should be able to provide automatic diagnosis capability. Therefore, cloud services should be able to diagnose compressed ECG files without undergoing a decompression stage to reduce additional processing overhead. Accordingly, the proposed Gaussian compression provides the ability to diagnose the resultant compressed file. Subsequently, to make use of this homomorphic feature of the proposed Gaussian compression algorithm, in this thesis we have introduced a new diagnoses technique that can be used to detect life-threatening cardiac diseases such as Ventricular Tachycardia and Ventricular Fibrillation. The proposed technique is applied directly to the compressed ECG files without going through the decompression stage. The proposed technique could achieve high accuracy results near to 100% for detecting Ventricular Arrhythmia and 96% for detecting Left Bundle Branch Block. Finally, we believe that in this thesis, the first steps towards encouraging health-care providers to use cloud services have been taken. However, this journey is still long

    Digital watermarking, information embedding, and data hiding systems

    Get PDF
    Thesis (Ph.D.)--Massachusetts Institute of Technology, Dept. of Electrical Engineering and Computer Science, 2000.Includes bibliographical references (p. 139-142).Digital watermarking, information embedding, and data hiding systems embed information, sometimes called a digital watermark, inside a host signal, which is typically an image, audio signal, or video signal. The host signal is not degraded unacceptably in the process, and one can recover the watermark even if the composite host and watermark signal undergo a variety of corruptions and attacks as long as these corruptions do not unacceptably degrade the host signal. These systems play an important role in meeting at least three major challenges that result from the widespread use of digital communication networks to disseminate multimedia content: (1) the relative ease with which one can generate perfect copies of digital signals creates a need for copyright protection mechanisms, (2) the relative ease with which one can alter digital signals creates a need for authentication and tamper-detection methods, and (3) the increase in sheer volume of transmitted data creates a demand for bandwidth-efficient methods to either backwards-compatibly increase capacities of existing legacy networks or deploy new networks backwards-compatibly with legacy networks. We introduce a framework within which to design and analyze digital watermarking and information embedding systems. In this framework performance is characterized by achievable rate-distortion-robustness trade-offs, and this framework leads quite naturally to a new class of embedding methods called quantization index modulation (QIM). These QIM methods, especially when combined with postprocessing called distortion compensation, achieve provably better rate-distortion-robustness performance than previously proposed classes of methods such as spread spectrum methods and generalized low-bit modulation methods in a number of different scenarios, which include both intentional and unintentional attacks. Indeed, we show that distortion-compensated QIM methods can achieve capacity, the information-theoretically best possible rate-distortion-robustness performance, against both additive Gaussian noise attacks and arbitrary squared error distortion-constrained attacks. These results also have implications for the problem of communicating over broadcast channels. We also present practical implementations of QIM methods called dither modulation and demonstrate their performance both analytically and through empirical simulations.by Brian Chen.Ph.D

    Image quality and forgery detection copula-based algorithms

    Get PDF
    Copula functions are important tools to investigate dependence structure between random variables. There are many copulas such as: Gaussian, Marshall-Olkin, Clayton, and Frank copulas. Although, copulas have been used in finance, oceanography, and hydrology, they have been applied in limited applications in the image processing field. In this thesis, copulas are applied to calculate the mutual information of two images, which in turn is used to measure image quality of a targeted image and also used to detect copy-move forgery in images. The proposed algorithms introduce new alternatives for existing image quality assessment and forgery detection methods. These algorithms are easy to use and highly accurate. The results for our image quality assessment algorithm are comparable or better than those of established methods in the literature, while the results for our image forgery detection algorithm are accurate even after applying different manipulation and post-processing techniques on the forged images. --Leaf ii.The original print copy of this thesis may be available here: http://wizard.unbc.ca/record=b214099

    The convergence of telecommunications and broadcasting in Japan

    Get PDF
    Thesis (M.B.A.)--Massachusetts Institute of Technology, Sloan School of Management, 2001.Includes bibliographical references (leaves 114-116).Japan has fallen far behind the United States in the extent and sophistication of its information networks and Internet use. But Japan can catch up. A combination of changes, including the rapid growth of the Internet, advances in broadband technology, the introduction of digital TV, and deregulation are driving a transformation referred to as the "convergence of telecommunications and broadcasting". At the same time, these drivers are dramatically changing the traditional industry structure of telecommunication and broadcasting, from vertical integration to horizontal stratification. Information companies need to plan strategies based on the new industry. NTT, reorganized in 1999 into a holding company system that promotes group management, has committed to an aggressive plan to deploy FTTH (Fiber to the home) everywhere in Japan by 2005. FTTH service has just begun and my research finds that NTT's decision to implement FTTH has encountered fierce competition when analyzed from the basis of Porter's Five Forces. There are fur strategic points that must be dealt with in order to win in the optical fiber service competition: 1) open access, 2) reduction in prices, 3) construction of a platform, and 4) correlation with broadcasters. In addition, cooperation with the regulatory authorities and other information companies is also required, because NTT will find it difficult to win on its own. NTT is a leader in the information/communication industry, and I believe NTT can expand its organizational capability and contribute to the development of the industry by responding to this new era.by Toru Maruoka.M.B.A

    Combining SOA and BPM Technologies for Cross-System Process Automation

    Get PDF
    This paper summarizes the results of an industry case study that introduced a cross-system business process automation solution based on a combination of SOA and BPM standard technologies (i.e., BPMN, BPEL, WSDL). Besides discussing major weaknesses of the existing, custom-built, solution and comparing them against experiences with the developed prototype, the paper presents a course of action for transforming the current solution into the proposed solution. This includes a general approach, consisting of four distinct steps, as well as specific action items that are to be performed for every step. The discussion also covers language and tool support and challenges arising from the transformation

    Watermarking for Authentication of LZ-77 Compressed Documents

    No full text

    Preface

    Get PDF
    corecore