SlideShare a Scribd company logo
1 of 1
Robust Video Hashing Using The 3-D DCT TransformMiloud Id Elhaj
mxi10@psu.edu
Southern Methodist University
Dr. Vishal Monga
vmonga@engrpsu.edu
http://signal.ee.psu.edu
Electrical Engineering Department
The Pennsylvania State University
2010 EE
REU
Program
Miloud Id Elhaj
Research Overview Approach
Commercialization or Technology
Transfer Opportunities
Key Results from EE REU Research
•The purpose of this research was to implement a hash
algorithm that is characterized by its robustness against
accidental or deliberate modifications
• To test the robustness we created a set of modified videos
and compare them against their originals to find the probability
of miss-detection
•We also compared original videos to find the probability of
false alarm
•Search content tracking (e.g. copyright
protection)
•Secure authentication of videos
•Security ( e.g. Surveillance )

More Related Content

Similar to EEREU_Quad_Chart_Template

HEC Project Proposal_v1.0
HEC Project Proposal_v1.0HEC Project Proposal_v1.0
HEC Project Proposal_v1.0
Awais Shibli
 
PERFORMANCE ANALYSIS OF FINGERPRINTING EXTRACTION ALGORITHM IN VIDEO COPY DET...
PERFORMANCE ANALYSIS OF FINGERPRINTING EXTRACTION ALGORITHM IN VIDEO COPY DET...PERFORMANCE ANALYSIS OF FINGERPRINTING EXTRACTION ALGORITHM IN VIDEO COPY DET...
PERFORMANCE ANALYSIS OF FINGERPRINTING EXTRACTION ALGORITHM IN VIDEO COPY DET...
IJCSEIT Journal
 

Similar to EEREU_Quad_Chart_Template (12)

HEC Project Proposal_v1.0
HEC Project Proposal_v1.0HEC Project Proposal_v1.0
HEC Project Proposal_v1.0
 
170330 cognitive systems institute speaker series mark sherman - watson pr...
170330 cognitive systems institute speaker series    mark sherman - watson pr...170330 cognitive systems institute speaker series    mark sherman - watson pr...
170330 cognitive systems institute speaker series mark sherman - watson pr...
 
You Build It, You Secure It: Higher Velocity and Better Security with DevSecOps
You Build It, You Secure It: Higher Velocity and Better Security with DevSecOpsYou Build It, You Secure It: Higher Velocity and Better Security with DevSecOps
You Build It, You Secure It: Higher Velocity and Better Security with DevSecOps
 
An Exploration based on Multifarious Video Copy Detection Strategies
An Exploration based on Multifarious Video Copy Detection StrategiesAn Exploration based on Multifarious Video Copy Detection Strategies
An Exploration based on Multifarious Video Copy Detection Strategies
 
How to Break Software: Robustness Edition
How to Break Software: Robustness EditionHow to Break Software: Robustness Edition
How to Break Software: Robustness Edition
 
PERFORMANCE ANALYSIS OF FINGERPRINTING EXTRACTION ALGORITHM IN VIDEO COPY DET...
PERFORMANCE ANALYSIS OF FINGERPRINTING EXTRACTION ALGORITHM IN VIDEO COPY DET...PERFORMANCE ANALYSIS OF FINGERPRINTING EXTRACTION ALGORITHM IN VIDEO COPY DET...
PERFORMANCE ANALYSIS OF FINGERPRINTING EXTRACTION ALGORITHM IN VIDEO COPY DET...
 
Software testing
Software testingSoftware testing
Software testing
 
PACE-IT, Security+2.9: Goals of Security Controls
PACE-IT, Security+2.9: Goals of Security ControlsPACE-IT, Security+2.9: Goals of Security Controls
PACE-IT, Security+2.9: Goals of Security Controls
 
Pass byo bring your own picture for securing graphical passwords
Pass byo bring your own picture for securing graphical passwordsPass byo bring your own picture for securing graphical passwords
Pass byo bring your own picture for securing graphical passwords
 
C1 mala1 akila
C1 mala1 akilaC1 mala1 akila
C1 mala1 akila
 
EdgarDB - the simple, powerful database for scientific research
EdgarDB - the simple, powerful database for scientific researchEdgarDB - the simple, powerful database for scientific research
EdgarDB - the simple, powerful database for scientific research
 
Infragard 2004 - Web Attacks and Defenses
Infragard 2004 - Web Attacks and DefensesInfragard 2004 - Web Attacks and Defenses
Infragard 2004 - Web Attacks and Defenses
 

EEREU_Quad_Chart_Template

  • 1. Robust Video Hashing Using The 3-D DCT TransformMiloud Id Elhaj mxi10@psu.edu Southern Methodist University Dr. Vishal Monga vmonga@engrpsu.edu http://signal.ee.psu.edu Electrical Engineering Department The Pennsylvania State University 2010 EE REU Program Miloud Id Elhaj Research Overview Approach Commercialization or Technology Transfer Opportunities Key Results from EE REU Research •The purpose of this research was to implement a hash algorithm that is characterized by its robustness against accidental or deliberate modifications • To test the robustness we created a set of modified videos and compare them against their originals to find the probability of miss-detection •We also compared original videos to find the probability of false alarm •Search content tracking (e.g. copyright protection) •Secure authentication of videos •Security ( e.g. Surveillance )