cac annual meeting data hiding in compressed multimedia signals bijan mobasseri, pi s. r. nelatury...
TRANSCRIPT
![Page 1: CAC ANNUAL MEETING DATA HIDING IN COMPRESSED MULTIMEDIA SIGNALS Bijan Mobasseri, PI S. R. Nelatury Dom Cinalli Dan Cross Aaron Evans Colin O’Connor Sathya](https://reader034.vdocuments.mx/reader034/viewer/2022051517/56649eb35503460f94bbb091/html5/thumbnails/1.jpg)
CAC ANNUAL MEETING
DATA HIDING IN COMPRESSED MULTIMEDIA SIGNALS
Bijan Mobasseri, PIS. R. NelaturyDom CinalliDan CrossAaron EvansColin O’Connor Sathya Akunuru
ECE DepartmentVillanova UniversityVillanova, PA 19085
October 30, 2002
![Page 2: CAC ANNUAL MEETING DATA HIDING IN COMPRESSED MULTIMEDIA SIGNALS Bijan Mobasseri, PI S. R. Nelatury Dom Cinalli Dan Cross Aaron Evans Colin O’Connor Sathya](https://reader034.vdocuments.mx/reader034/viewer/2022051517/56649eb35503460f94bbb091/html5/thumbnails/2.jpg)
2/46
Background info
• Funding agency: The US Air Force Office of Scientific Research(AFOSR)
• Monitor: AFRL/IFEC, Information Directorate, Rome, NY
• Project: Smart Digital Video• PI: Bijan Mobasseri
![Page 3: CAC ANNUAL MEETING DATA HIDING IN COMPRESSED MULTIMEDIA SIGNALS Bijan Mobasseri, PI S. R. Nelatury Dom Cinalli Dan Cross Aaron Evans Colin O’Connor Sathya](https://reader034.vdocuments.mx/reader034/viewer/2022051517/56649eb35503460f94bbb091/html5/thumbnails/3.jpg)
3/46
Outline
• Data hiding/watermarking requirements• Established watermarking approaches• Project summaries:
– Compressed media watermarking– Video authentication through self-watermarking– Lossless watermarking using error-resilient coding– Time-frequency watermarking– Metadata embedding
![Page 4: CAC ANNUAL MEETING DATA HIDING IN COMPRESSED MULTIMEDIA SIGNALS Bijan Mobasseri, PI S. R. Nelatury Dom Cinalli Dan Cross Aaron Evans Colin O’Connor Sathya](https://reader034.vdocuments.mx/reader034/viewer/2022051517/56649eb35503460f94bbb091/html5/thumbnails/4.jpg)
4/46
Data hiding/watermarking requirements
• Data hiding must at least meet the following three conditions:– Transparency; no visible impact on cover signal– Robustness; filtering, compression, cropping– Security; must assume the algorithm is known
• Places to hide data are:– Spatial- pixel amplitudes, LSB, QIM– Transform domain- spread spectrum, Fourier/wavelet, LPM– Joint- time/frequency distribution
![Page 5: CAC ANNUAL MEETING DATA HIDING IN COMPRESSED MULTIMEDIA SIGNALS Bijan Mobasseri, PI S. R. Nelatury Dom Cinalli Dan Cross Aaron Evans Colin O’Connor Sathya](https://reader034.vdocuments.mx/reader034/viewer/2022051517/56649eb35503460f94bbb091/html5/thumbnails/5.jpg)
5/46
Applications of watermarking
• Here are few, and growing list– Copyright protection- prevent unauthorized duplication– Fingerprinting-to find out who gave it away– Copy protection- to keep a tab on the number of copies
made– Broadcast monitoring- automatic monitoring of commercials– Authentication- insuring data integrity and tamper
resistance/detection– Indexing- helping multimedia search capability– Metadata hiding- embedding patient’s records in their
medical images– Data hiding- covert communications in plain sight
![Page 6: CAC ANNUAL MEETING DATA HIDING IN COMPRESSED MULTIMEDIA SIGNALS Bijan Mobasseri, PI S. R. Nelatury Dom Cinalli Dan Cross Aaron Evans Colin O’Connor Sathya](https://reader034.vdocuments.mx/reader034/viewer/2022051517/56649eb35503460f94bbb091/html5/thumbnails/6.jpg)
6/46
Basic idea
![Page 7: CAC ANNUAL MEETING DATA HIDING IN COMPRESSED MULTIMEDIA SIGNALS Bijan Mobasseri, PI S. R. Nelatury Dom Cinalli Dan Cross Aaron Evans Colin O’Connor Sathya](https://reader034.vdocuments.mx/reader034/viewer/2022051517/56649eb35503460f94bbb091/html5/thumbnails/7.jpg)
7/46
Watermark Embedding and Extraction
• Cover image: f• Watermark: w• Embedding
function:E• Secret key:kStego image=S=E(f,w,k)
• AuthenticationT(S): tampered
signal
ˆ w =g(T (S))
ρ=<w, ˆ w >
ρ>Threshold ⇒
watermark present
![Page 8: CAC ANNUAL MEETING DATA HIDING IN COMPRESSED MULTIMEDIA SIGNALS Bijan Mobasseri, PI S. R. Nelatury Dom Cinalli Dan Cross Aaron Evans Colin O’Connor Sathya](https://reader034.vdocuments.mx/reader034/viewer/2022051517/56649eb35503460f94bbb091/html5/thumbnails/8.jpg)
8/46
Detector response to forgeries
• Let’s say someone attempts to forge a watermarked document using their own signature
• We then have
• None of the two terms register significant response
Iw =I +kW*
λ =<Iw,W x,y( )>=
< I +kW *( ),W >=
<I,W >+k <W,W * >
![Page 9: CAC ANNUAL MEETING DATA HIDING IN COMPRESSED MULTIMEDIA SIGNALS Bijan Mobasseri, PI S. R. Nelatury Dom Cinalli Dan Cross Aaron Evans Colin O’Connor Sathya](https://reader034.vdocuments.mx/reader034/viewer/2022051517/56649eb35503460f94bbb091/html5/thumbnails/9.jpg)
9/46
Block Diagram
• Embedding
• Watermark extraction
SOURCEWATER
MARKING
TAMPERINGCORRUPTED WM SOURCE
CORRUPTED WM SOURCE -
SOURCE
DISTORTEDWM X
ORIGINALWM
![Page 10: CAC ANNUAL MEETING DATA HIDING IN COMPRESSED MULTIMEDIA SIGNALS Bijan Mobasseri, PI S. R. Nelatury Dom Cinalli Dan Cross Aaron Evans Colin O’Connor Sathya](https://reader034.vdocuments.mx/reader034/viewer/2022051517/56649eb35503460f94bbb091/html5/thumbnails/10.jpg)
10/46
Quality of extracted watermark
![Page 11: CAC ANNUAL MEETING DATA HIDING IN COMPRESSED MULTIMEDIA SIGNALS Bijan Mobasseri, PI S. R. Nelatury Dom Cinalli Dan Cross Aaron Evans Colin O’Connor Sathya](https://reader034.vdocuments.mx/reader034/viewer/2022051517/56649eb35503460f94bbb091/html5/thumbnails/11.jpg)
11/46
Trade-offs
![Page 12: CAC ANNUAL MEETING DATA HIDING IN COMPRESSED MULTIMEDIA SIGNALS Bijan Mobasseri, PI S. R. Nelatury Dom Cinalli Dan Cross Aaron Evans Colin O’Connor Sathya](https://reader034.vdocuments.mx/reader034/viewer/2022051517/56649eb35503460f94bbb091/html5/thumbnails/12.jpg)
12/46
LSB watermarking
• Probably the earliest attempt at watermarking was to flip the least significant bit of each pixel
• LSB being at noise level, would have no impact on quality. However, the slightest change in pixel intensity would make the watermark unreadable
Pixel 1 Pixel 2
LSB
![Page 13: CAC ANNUAL MEETING DATA HIDING IN COMPRESSED MULTIMEDIA SIGNALS Bijan Mobasseri, PI S. R. Nelatury Dom Cinalli Dan Cross Aaron Evans Colin O’Connor Sathya](https://reader034.vdocuments.mx/reader034/viewer/2022051517/56649eb35503460f94bbb091/html5/thumbnails/13.jpg)
13/46
BITPLANE WATERMAKRING
![Page 14: CAC ANNUAL MEETING DATA HIDING IN COMPRESSED MULTIMEDIA SIGNALS Bijan Mobasseri, PI S. R. Nelatury Dom Cinalli Dan Cross Aaron Evans Colin O’Connor Sathya](https://reader034.vdocuments.mx/reader034/viewer/2022051517/56649eb35503460f94bbb091/html5/thumbnails/14.jpg)
14/46
Hiding information in 24 bit images
• A 1024x768 24-bit color image can potentially hide 2,359,296 bits
• How would you hide the letter A? “A” can be hidden in the LSB of 3 pixels such as
• The binary value of A is 10000011. Changed bits are shown
00100111 11101001 1100100000100111 11001000 1110100111001000 00100111 11101001
00100111 11101000 1100100000100111 11001000 1110100111001000 00100111 11101001
![Page 15: CAC ANNUAL MEETING DATA HIDING IN COMPRESSED MULTIMEDIA SIGNALS Bijan Mobasseri, PI S. R. Nelatury Dom Cinalli Dan Cross Aaron Evans Colin O’Connor Sathya](https://reader034.vdocuments.mx/reader034/viewer/2022051517/56649eb35503460f94bbb091/html5/thumbnails/15.jpg)
15/46
Transform domain watermarking
• Spatial watermarking is fast but brittle.• It is best to do watermarking in
transformed domains DFT– DCT– DWT
• The first successful implementation was done by Cox et al at NEC/Princeton under spread spectrum watermarking
![Page 16: CAC ANNUAL MEETING DATA HIDING IN COMPRESSED MULTIMEDIA SIGNALS Bijan Mobasseri, PI S. R. Nelatury Dom Cinalli Dan Cross Aaron Evans Colin O’Connor Sathya](https://reader034.vdocuments.mx/reader034/viewer/2022051517/56649eb35503460f94bbb091/html5/thumbnails/16.jpg)
16/46
Basic idea
• Instead of tweaking pixels, alter selected coefficients of image transform
• Then do inverse transform. This way, watermark spreads throughout the image affecting every pixel in some way
• It is not possible to find the watermark in the spatial domain
1 2 3 4 5 6 7 8
1
2
3
4
5
6
7
8
![Page 17: CAC ANNUAL MEETING DATA HIDING IN COMPRESSED MULTIMEDIA SIGNALS Bijan Mobasseri, PI S. R. Nelatury Dom Cinalli Dan Cross Aaron Evans Colin O’Connor Sathya](https://reader034.vdocuments.mx/reader034/viewer/2022051517/56649eb35503460f94bbb091/html5/thumbnails/17.jpg)
17/46
SPREAD SPECTRUM WATERMARKING(Cox, NEC)
555555 55555555 55555555 55
555555 55
DCT
550 10 -1 0
2 3 2 0
-1 2 0 0
0 0 0 0
16 1 0 0
0 -1 0 0
-1 2 0 0
0 0 0 0
Quan
16 1 -1 0
1 -1 0 0
-1 2 0 0
0 0 0 0
Original frame
![Page 18: CAC ANNUAL MEETING DATA HIDING IN COMPRESSED MULTIMEDIA SIGNALS Bijan Mobasseri, PI S. R. Nelatury Dom Cinalli Dan Cross Aaron Evans Colin O’Connor Sathya](https://reader034.vdocuments.mx/reader034/viewer/2022051517/56649eb35503460f94bbb091/html5/thumbnails/18.jpg)
18/46
Challenges
• Which DCT coefficients should you choose?
• We have to worry about two competing requirements– Robustness - means low
frequency terms should be modified
– Imperceptibility - means low frequency terms should be avoided
![Page 19: CAC ANNUAL MEETING DATA HIDING IN COMPRESSED MULTIMEDIA SIGNALS Bijan Mobasseri, PI S. R. Nelatury Dom Cinalli Dan Cross Aaron Evans Colin O’Connor Sathya](https://reader034.vdocuments.mx/reader034/viewer/2022051517/56649eb35503460f94bbb091/html5/thumbnails/19.jpg)
19/46
DFT watermarking
![Page 20: CAC ANNUAL MEETING DATA HIDING IN COMPRESSED MULTIMEDIA SIGNALS Bijan Mobasseri, PI S. R. Nelatury Dom Cinalli Dan Cross Aaron Evans Colin O’Connor Sathya](https://reader034.vdocuments.mx/reader034/viewer/2022051517/56649eb35503460f94bbb091/html5/thumbnails/20.jpg)
20/46
Watermarking DWT
![Page 21: CAC ANNUAL MEETING DATA HIDING IN COMPRESSED MULTIMEDIA SIGNALS Bijan Mobasseri, PI S. R. Nelatury Dom Cinalli Dan Cross Aaron Evans Colin O’Connor Sathya](https://reader034.vdocuments.mx/reader034/viewer/2022051517/56649eb35503460f94bbb091/html5/thumbnails/21.jpg)
VIDEO WATERMAKING
![Page 22: CAC ANNUAL MEETING DATA HIDING IN COMPRESSED MULTIMEDIA SIGNALS Bijan Mobasseri, PI S. R. Nelatury Dom Cinalli Dan Cross Aaron Evans Colin O’Connor Sathya](https://reader034.vdocuments.mx/reader034/viewer/2022051517/56649eb35503460f94bbb091/html5/thumbnails/22.jpg)
22/46
Tampering scenarios: cut and splice of surveillance video
• A block of frames removed and video spliced
• Video must be embedded with proper sequencing codes so as to reveal the breakage
![Page 23: CAC ANNUAL MEETING DATA HIDING IN COMPRESSED MULTIMEDIA SIGNALS Bijan Mobasseri, PI S. R. Nelatury Dom Cinalli Dan Cross Aaron Evans Colin O’Connor Sathya](https://reader034.vdocuments.mx/reader034/viewer/2022051517/56649eb35503460f94bbb091/html5/thumbnails/23.jpg)
23/46
Cut, insert and splice
• Incriminating/sensitive portion is removed and replaced
![Page 24: CAC ANNUAL MEETING DATA HIDING IN COMPRESSED MULTIMEDIA SIGNALS Bijan Mobasseri, PI S. R. Nelatury Dom Cinalli Dan Cross Aaron Evans Colin O’Connor Sathya](https://reader034.vdocuments.mx/reader034/viewer/2022051517/56649eb35503460f94bbb091/html5/thumbnails/24.jpg)
24/46
Cut, swap and splice
![Page 25: CAC ANNUAL MEETING DATA HIDING IN COMPRESSED MULTIMEDIA SIGNALS Bijan Mobasseri, PI S. R. Nelatury Dom Cinalli Dan Cross Aaron Evans Colin O’Connor Sathya](https://reader034.vdocuments.mx/reader034/viewer/2022051517/56649eb35503460f94bbb091/html5/thumbnails/25.jpg)
25/46
Collusion attack
![Page 26: CAC ANNUAL MEETING DATA HIDING IN COMPRESSED MULTIMEDIA SIGNALS Bijan Mobasseri, PI S. R. Nelatury Dom Cinalli Dan Cross Aaron Evans Colin O’Connor Sathya](https://reader034.vdocuments.mx/reader034/viewer/2022051517/56649eb35503460f94bbb091/html5/thumbnails/26.jpg)
26/46
MPEG bitstream syntax
![Page 27: CAC ANNUAL MEETING DATA HIDING IN COMPRESSED MULTIMEDIA SIGNALS Bijan Mobasseri, PI S. R. Nelatury Dom Cinalli Dan Cross Aaron Evans Colin O’Connor Sathya](https://reader034.vdocuments.mx/reader034/viewer/2022051517/56649eb35503460f94bbb091/html5/thumbnails/27.jpg)
27/46
Embedding watermark bits in VLCs
• Variable length codes are the lynchpin of MPEG
• There is a subset of MPEG VLC codes that represent identical runs but differ in level by
just one
From: Langelaar et al, IEEE SP Magazine
September 2000
![Page 28: CAC ANNUAL MEETING DATA HIDING IN COMPRESSED MULTIMEDIA SIGNALS Bijan Mobasseri, PI S. R. Nelatury Dom Cinalli Dan Cross Aaron Evans Colin O’Connor Sathya](https://reader034.vdocuments.mx/reader034/viewer/2022051517/56649eb35503460f94bbb091/html5/thumbnails/28.jpg)
28/46
Data hiding capacities
Total lc-VLCs Total VLCs24008 204493
655548 4321760
61298 461027
3614 61985
345315 3290373
24412 204362
run 0 0 0 0 0 0 0level 5 6 8 9 10 11 12406974ai1.mpeg 3734 2630 1835 1423 1122 827 1036% occurrence 15.6 11.0 7.6 5.9 4.7 3.4 4.3status.mpeg 136422 90706 60594 46844 36066 32513 25822% occurrence 20.8 13.8 9.2 7.1 5.5 5.0 3.9avalon.mpeg 13080 9506 5420 4353 3405 2865 2341% occurrence 21.3 15.5 8.8 7.1 5.6 4.7 3.8gtscrush.mpeg 1056 700 281 246 193 131 143% occurrence 29.2 19.4 7.8 6.8 5.3 3.6 4.0final-days.mpg 78900 54245 30487 24116 18751 15464 12791% occurrence 22.8 15.7 8.8 7.0 5.4 4.5 3.7simp.mpg 5997 4007 2438 1441 1627 1225 807% occurrence 24.6 16.4 10.0 5.9 6.7 5.0 3.3
average % occurrence 22.4 15.3 8.7 6.6 5.5 4.4 3.8
![Page 29: CAC ANNUAL MEETING DATA HIDING IN COMPRESSED MULTIMEDIA SIGNALS Bijan Mobasseri, PI S. R. Nelatury Dom Cinalli Dan Cross Aaron Evans Colin O’Connor Sathya](https://reader034.vdocuments.mx/reader034/viewer/2022051517/56649eb35503460f94bbb091/html5/thumbnails/29.jpg)
SELF-WATERMARKING*
*D. Cross, B. Mobasseri, “Watermarking for self-authentication of compressed video,” IEEE ICIP2002,
Rochester, NY, September 22-25, 2002,
![Page 30: CAC ANNUAL MEETING DATA HIDING IN COMPRESSED MULTIMEDIA SIGNALS Bijan Mobasseri, PI S. R. Nelatury Dom Cinalli Dan Cross Aaron Evans Colin O’Connor Sathya](https://reader034.vdocuments.mx/reader034/viewer/2022051517/56649eb35503460f94bbb091/html5/thumbnails/30.jpg)
30/46
Self-watermarking:the concept
• In self-watermarking, the watermark is extracted from the source itself
• Self-watermarking prevents watermark pirating
• Most work on self-watermarking has been done on images.
![Page 31: CAC ANNUAL MEETING DATA HIDING IN COMPRESSED MULTIMEDIA SIGNALS Bijan Mobasseri, PI S. R. Nelatury Dom Cinalli Dan Cross Aaron Evans Colin O’Connor Sathya](https://reader034.vdocuments.mx/reader034/viewer/2022051517/56649eb35503460f94bbb091/html5/thumbnails/31.jpg)
31/46
Self-watermarking of compressed video
1 0
VLC(0,5)
VLC(0,16)
VLC(1,15)
VLC(0,6)
VLC(1,10)
VLC(1,11)
VLC(0,12)
![Page 32: CAC ANNUAL MEETING DATA HIDING IN COMPRESSED MULTIMEDIA SIGNALS Bijan Mobasseri, PI S. R. Nelatury Dom Cinalli Dan Cross Aaron Evans Colin O’Connor Sathya](https://reader034.vdocuments.mx/reader034/viewer/2022051517/56649eb35503460f94bbb091/html5/thumbnails/32.jpg)
Lossless Watermarking of Compressed Media*
*B. Mobasseri, D. Cinalli “Watermarking of Compressed Multimedia using Error-Resilient VLCs,” MMSP02, December 9-11, 2002
![Page 33: CAC ANNUAL MEETING DATA HIDING IN COMPRESSED MULTIMEDIA SIGNALS Bijan Mobasseri, PI S. R. Nelatury Dom Cinalli Dan Cross Aaron Evans Colin O’Connor Sathya](https://reader034.vdocuments.mx/reader034/viewer/2022051517/56649eb35503460f94bbb091/html5/thumbnails/33.jpg)
33/46
The idea:watermark as intentional bit errors
• A close look reveals that watermarking of VLCs is essentially equivalent to channel errors.
• Bit errors and watermark bits have identical impact. They both cause bit errors in affected VLCs.
![Page 34: CAC ANNUAL MEETING DATA HIDING IN COMPRESSED MULTIMEDIA SIGNALS Bijan Mobasseri, PI S. R. Nelatury Dom Cinalli Dan Cross Aaron Evans Colin O’Connor Sathya](https://reader034.vdocuments.mx/reader034/viewer/2022051517/56649eb35503460f94bbb091/html5/thumbnails/34.jpg)
34/46
The solution:lossless watermarking
• Embed watermark bits in the VLCs as controlled bit errors
• MPEG-2 VLCs, however, have no inherent error protection. Any bit error will cause detection failure up to start code
• Bidirectionally decodable codewords are capable of isolating and reversing channel errors
• This approach leads to lossless watermarking
![Page 35: CAC ANNUAL MEETING DATA HIDING IN COMPRESSED MULTIMEDIA SIGNALS Bijan Mobasseri, PI S. R. Nelatury Dom Cinalli Dan Cross Aaron Evans Colin O’Connor Sathya](https://reader034.vdocuments.mx/reader034/viewer/2022051517/56649eb35503460f94bbb091/html5/thumbnails/35.jpg)
35/46
Bi-directional VLCs
• Each VLC is represented twice in the new bitstream. It is this property that allows error resiliency
• Burst error shall not be so long to simultaneously affect the same bit of identical VLC
![Page 36: CAC ANNUAL MEETING DATA HIDING IN COMPRESSED MULTIMEDIA SIGNALS Bijan Mobasseri, PI S. R. Nelatury Dom Cinalli Dan Cross Aaron Evans Colin O’Connor Sathya](https://reader034.vdocuments.mx/reader034/viewer/2022051517/56649eb35503460f94bbb091/html5/thumbnails/36.jpg)
36/46
Watermarking capacity
• If watermarking begins with the first bit of the VLC and L=l, every bit of the VLC may be watermarked, then
C=L bits/packet• We define packet as one
macroblock
![Page 37: CAC ANNUAL MEETING DATA HIDING IN COMPRESSED MULTIMEDIA SIGNALS Bijan Mobasseri, PI S. R. Nelatury Dom Cinalli Dan Cross Aaron Evans Colin O’Connor Sathya](https://reader034.vdocuments.mx/reader034/viewer/2022051517/56649eb35503460f94bbb091/html5/thumbnails/37.jpg)
37/46
Data
Non- Coded MBsVideo # Coded MBs
Intra & InterInter Skipped
Avg. # ofVLCs / MB
Avg. # ofBits / MB
Avg. % increase insize per MB with
thresholdCapacity
1 902 7,153 45 4.83 25.33 .87% 4,5102 57,326 66,162 40,240 8.02 42.07 13.6% 286,6303 309,740 99,981 42,391 15.38 76.76 18.89% 1,548,700
![Page 38: CAC ANNUAL MEETING DATA HIDING IN COMPRESSED MULTIMEDIA SIGNALS Bijan Mobasseri, PI S. R. Nelatury Dom Cinalli Dan Cross Aaron Evans Colin O’Connor Sathya](https://reader034.vdocuments.mx/reader034/viewer/2022051517/56649eb35503460f94bbb091/html5/thumbnails/38.jpg)
TIME-FREQUENCY WATERMARKING
B. Mobasseri, “Digital watermarking in joint time-frequency domain,”,IEEE ICIP, Rochester, NY, September, 22-25, 2002
![Page 39: CAC ANNUAL MEETING DATA HIDING IN COMPRESSED MULTIMEDIA SIGNALS Bijan Mobasseri, PI S. R. Nelatury Dom Cinalli Dan Cross Aaron Evans Colin O’Connor Sathya](https://reader034.vdocuments.mx/reader034/viewer/2022051517/56649eb35503460f94bbb091/html5/thumbnails/39.jpg)
39/46
The Idea
![Page 40: CAC ANNUAL MEETING DATA HIDING IN COMPRESSED MULTIMEDIA SIGNALS Bijan Mobasseri, PI S. R. Nelatury Dom Cinalli Dan Cross Aaron Evans Colin O’Connor Sathya](https://reader034.vdocuments.mx/reader034/viewer/2022051517/56649eb35503460f94bbb091/html5/thumbnails/40.jpg)
40/46
TF watermarking
0 10 20 30 40 50 60 70 80-2
-1.5
-1
-0.5
0
0.5
1
1.5
2x 10
-3
0
20
40
60
80
100
120
140
0
0.02
0.04
0.06
0.08
0.1
0.12
0.14
-505
x 105
original WVD
€
Wx nT , f( ) = 2T x n + m( )m∑ x* n −m( ) exp(− j4πfmT ), f ≤
1
4T
WD +
€
Y t, f( ) = X t, f( ) + w t, f( ); t , f ∈Ω{ }
D
WD-1
0 10 20 30 40 50 60 70 80-2
-1.5
-1
-0.5
0
0.5
1
1.5
2x 10
-3
WD
0
20
40
60
80
100
120
140
0
0.02
0.04
0.06
0.08
0.1
0.12
0.14
-505
x 105
original WVD
WM
JPEG
![Page 41: CAC ANNUAL MEETING DATA HIDING IN COMPRESSED MULTIMEDIA SIGNALS Bijan Mobasseri, PI S. R. Nelatury Dom Cinalli Dan Cross Aaron Evans Colin O’Connor Sathya](https://reader034.vdocuments.mx/reader034/viewer/2022051517/56649eb35503460f94bbb091/html5/thumbnails/41.jpg)
41/46
Results
![Page 42: CAC ANNUAL MEETING DATA HIDING IN COMPRESSED MULTIMEDIA SIGNALS Bijan Mobasseri, PI S. R. Nelatury Dom Cinalli Dan Cross Aaron Evans Colin O’Connor Sathya](https://reader034.vdocuments.mx/reader034/viewer/2022051517/56649eb35503460f94bbb091/html5/thumbnails/42.jpg)
42/46
Effect of compression
JPEG:Q=5
![Page 43: CAC ANNUAL MEETING DATA HIDING IN COMPRESSED MULTIMEDIA SIGNALS Bijan Mobasseri, PI S. R. Nelatury Dom Cinalli Dan Cross Aaron Evans Colin O’Connor Sathya](https://reader034.vdocuments.mx/reader034/viewer/2022051517/56649eb35503460f94bbb091/html5/thumbnails/43.jpg)
Metadata Embedding
![Page 44: CAC ANNUAL MEETING DATA HIDING IN COMPRESSED MULTIMEDIA SIGNALS Bijan Mobasseri, PI S. R. Nelatury Dom Cinalli Dan Cross Aaron Evans Colin O’Connor Sathya](https://reader034.vdocuments.mx/reader034/viewer/2022051517/56649eb35503460f94bbb091/html5/thumbnails/44.jpg)
44/46
Background
• Video images & metadata recorded and handled as two separate streams
– Storage overhead– Bookkeeping issues– Accuracy and human error– Cumbersome to display
• It would be nice to permanently attach metadata to video and make it available during playback
MetadataVideo
![Page 45: CAC ANNUAL MEETING DATA HIDING IN COMPRESSED MULTIMEDIA SIGNALS Bijan Mobasseri, PI S. R. Nelatury Dom Cinalli Dan Cross Aaron Evans Colin O’Connor Sathya](https://reader034.vdocuments.mx/reader034/viewer/2022051517/56649eb35503460f94bbb091/html5/thumbnails/45.jpg)
45/46
Sample Metadata and video footage
Surveillance VideoXML Coded Metadata
![Page 46: CAC ANNUAL MEETING DATA HIDING IN COMPRESSED MULTIMEDIA SIGNALS Bijan Mobasseri, PI S. R. Nelatury Dom Cinalli Dan Cross Aaron Evans Colin O’Connor Sathya](https://reader034.vdocuments.mx/reader034/viewer/2022051517/56649eb35503460f94bbb091/html5/thumbnails/46.jpg)
THE END