Next generation image compression standards: JPEG XR and AICTouradj Ebrahimi
Invited talk at Mobile Multimedia/Image Processing, Security, and Applications 2009, SPIE Defense, Security and Sensing Symposium, Orlando, FL, April 13-17, 2009
A New Cross Diamond Search Motion Estimation Algorithm for HEVCIJERA Editor
In this project, a novel approach for motion estimation is proposed. There are few block matching algorithm existing for motion estimation. In motion estimation a new cross diamond search algorithm is implemented compared to diamond search it uses less search point. Because of this we can reduce the computational complexity. The performance of the algorithm is compared with other algorithm by means of search points. This algorithm achieves close performance than that of three step search and diamond search. Compared to all the algorithm cross diamond uses less logic elements, delay and power dissipation.
This document discusses image processing with MATLAB. It provides an overview of the different image formats supported by MATLAB, including JPEG, TIFF, and BMP. It also describes the different types of images like binary, grayscale, and RGB images. It explains how to read images into MATLAB, extract color channels, remove noise, and find properties like the centroid and area. Finally, it discusses how to do serial communication between MATLAB and an Arduino board to process images in real-time and send signals to a microcontroller.
Final Project Presentation,
Introduction to Computer Engineering,
Spring 2018,
Instructor: Professor Lei Jiang
:https://www.sice.indiana.edu/all-people/profile.html?profile_id=453
Intelligent Systems Engineering,
Indiana University Bloomington,
Authors:
Vibhatha Abeykoon: www.vibhatha.org
Jcs Kadupitiya: www.kadupitiya.lk
This document describes a project to implement an optimized feedforward convolutional neural network using XNOR operations. It discusses convolutional networks, including their biological inspiration and applications. It then describes binary neural networks and XNOR networks specifically. The objectives of the project are to study existing approaches, implement XNOR and popcount operations in VHDL, and compare the VHDL output to a hand-calculated convolution. Literature on binary convolutional networks and hardware acceleration is reviewed. The proposed methodology, file formats, and deliverables are outlined.
This document describes a project to implement an optimized feedforward convolutional neural network using XNOR operations. It discusses convolutional networks, including their biological inspiration and applications. It then describes binary neural networks and XNOR networks specifically. The objectives of the project are to study existing approaches, implement XNOR and popcount operations in VHDL, and compare the VHDL output to a hand-calculated convolution. Literature on binary convolutional networks and hardware acceleration is reviewed. The proposed methodology, file formats, and deliverables are outlined.
A team from ITMO University worked from autumn 2010 to spring 2011 to improve lossless compression of JPEG files. They developed an encoder and decoder that uses techniques like arithmetic coding to encode DC values, runs of zeros, and AC coefficients in a way that maintains bit-level identical compression and decompression. They tested their algorithm on several images and saw file size reductions of up to 30% compared to the original JPEG files. Maintaining full bit-level compatibility with the JPEG standard presented some challenges around parsing file structures versus a stream-based approach.
Lossless Grey-scale Image Compression Using Source Symbols Reduction and Huff...CSCJournals
Usage of Images have been increased and used in many applications. Image compression plays vital role in saving storage space and saving time while sending images over network. A new compression technique has been proposed to achieve more compression ratio by reducing number of source symbols. The source symbols are reduced by applying source symbols reduction and further the Huffman Coding is applied to achieve compression. The source symbols reduction technique reduces the number of source symbols by combining together to form a new symbol. Thus the number of Huffman Code to be generated also reduced. The Huffman code symbols reduction achieves better compression ratio. The experiment has been conducted using the proposed technique and the Huffman Coding on standard images. The experiment result has been analyzed and the result shows that the newly proposed compression technique achieves 10% more compression ratio than the regular Huffman Coding.
Next generation image compression standards: JPEG XR and AICTouradj Ebrahimi
Invited talk at Mobile Multimedia/Image Processing, Security, and Applications 2009, SPIE Defense, Security and Sensing Symposium, Orlando, FL, April 13-17, 2009
A New Cross Diamond Search Motion Estimation Algorithm for HEVCIJERA Editor
In this project, a novel approach for motion estimation is proposed. There are few block matching algorithm existing for motion estimation. In motion estimation a new cross diamond search algorithm is implemented compared to diamond search it uses less search point. Because of this we can reduce the computational complexity. The performance of the algorithm is compared with other algorithm by means of search points. This algorithm achieves close performance than that of three step search and diamond search. Compared to all the algorithm cross diamond uses less logic elements, delay and power dissipation.
This document discusses image processing with MATLAB. It provides an overview of the different image formats supported by MATLAB, including JPEG, TIFF, and BMP. It also describes the different types of images like binary, grayscale, and RGB images. It explains how to read images into MATLAB, extract color channels, remove noise, and find properties like the centroid and area. Finally, it discusses how to do serial communication between MATLAB and an Arduino board to process images in real-time and send signals to a microcontroller.
Final Project Presentation,
Introduction to Computer Engineering,
Spring 2018,
Instructor: Professor Lei Jiang
:https://www.sice.indiana.edu/all-people/profile.html?profile_id=453
Intelligent Systems Engineering,
Indiana University Bloomington,
Authors:
Vibhatha Abeykoon: www.vibhatha.org
Jcs Kadupitiya: www.kadupitiya.lk
This document describes a project to implement an optimized feedforward convolutional neural network using XNOR operations. It discusses convolutional networks, including their biological inspiration and applications. It then describes binary neural networks and XNOR networks specifically. The objectives of the project are to study existing approaches, implement XNOR and popcount operations in VHDL, and compare the VHDL output to a hand-calculated convolution. Literature on binary convolutional networks and hardware acceleration is reviewed. The proposed methodology, file formats, and deliverables are outlined.
This document describes a project to implement an optimized feedforward convolutional neural network using XNOR operations. It discusses convolutional networks, including their biological inspiration and applications. It then describes binary neural networks and XNOR networks specifically. The objectives of the project are to study existing approaches, implement XNOR and popcount operations in VHDL, and compare the VHDL output to a hand-calculated convolution. Literature on binary convolutional networks and hardware acceleration is reviewed. The proposed methodology, file formats, and deliverables are outlined.
A team from ITMO University worked from autumn 2010 to spring 2011 to improve lossless compression of JPEG files. They developed an encoder and decoder that uses techniques like arithmetic coding to encode DC values, runs of zeros, and AC coefficients in a way that maintains bit-level identical compression and decompression. They tested their algorithm on several images and saw file size reductions of up to 30% compared to the original JPEG files. Maintaining full bit-level compatibility with the JPEG standard presented some challenges around parsing file structures versus a stream-based approach.
Lossless Grey-scale Image Compression Using Source Symbols Reduction and Huff...CSCJournals
Usage of Images have been increased and used in many applications. Image compression plays vital role in saving storage space and saving time while sending images over network. A new compression technique has been proposed to achieve more compression ratio by reducing number of source symbols. The source symbols are reduced by applying source symbols reduction and further the Huffman Coding is applied to achieve compression. The source symbols reduction technique reduces the number of source symbols by combining together to form a new symbol. Thus the number of Huffman Code to be generated also reduced. The Huffman code symbols reduction achieves better compression ratio. The experiment has been conducted using the proposed technique and the Huffman Coding on standard images. The experiment result has been analyzed and the result shows that the newly proposed compression technique achieves 10% more compression ratio than the regular Huffman Coding.
This document discusses various aspects of forensic analysis in Windows operating systems. It describes the location of recycle bin files, prefetch files, thumbnail caches, and volume shadow copies in different versions of Windows. It also discusses how timelines can be analyzed from files, registry entries, and other artifacts to reconstruct system activity. Time stamps are stored differently depending on the file system. The document provides examples of analyzing timelines, thumbnails, recycle bins, and shadow copies to investigate activity on a system.
This document discusses tools for recovering a partially lost Truecrypt password using a GPU when 4-5 symbols of the password are unknown. It describes the tools TrueCrack and oclHashCat, how they work by using the salt and encrypted string in the Truecrypt header to brute force possible passwords, and provides an example command to use oclHashCat to try passwords with unknown case and symbols replaced with wildcards.
Steganography is the practice of concealing a file, message, image, or video within another file, message, image, or video. The history of steganography dates back to ancient Greece with the use of wax tablets and includes the use of invisible inks and coded messages in postage stamps. Modern steganography hides data in digital files like images, audio, video, and text using techniques such as least significant bit encoding that modify redundant bits in files without damaging them or drawing suspicion.
Greek students worked on an eTwinning project called LEGENDS from 2015 to 2016 where they learned how to decode QR codes. The students worked in their classroom on this project to learn about decoding quick response barcodes. Their project involved figuring out how to read QR codes.
This document discusses steganography, which is the practice of concealing secret messages within other non-secret text or media. It begins with an introduction and history of steganography, then describes the basic model of hiding a secret message within a cover message. It outlines some steganography techniques, requirements for effective techniques, applications, and attacks against steganography. It concludes by listing several references on the topic.
Shift ciphers are substitution ciphers where each letter is shifted a fixed number of positions in the alphabet. Substitution ciphers replace each letter with another letter or symbol according to a key. Frequency analysis involves analyzing letter frequencies in ciphertext to break substitution ciphers. The Vigenère cipher uses multiple substitution ciphers with different keys, making it harder to break using frequency analysis alone.
DWT based approach for steganography using biometricsSri Madhur
This document discusses biometric steganography, which is a method of hiding secret data within skin regions of images. It begins by providing background on steganography and defining key terms. It then describes the specific steganography method used, which embeds secret data in the skin tone region of an image using the discrete wavelet transform after detecting skin tones via HSV color space. The document outlines the process, including carrier image, embedding in DWT sub-bands, extraction, and defines terms like PSNR. It concludes that embedding only in skin regions rather than the whole image enhances security, and cropping the image before transmission provides additional security.
DATA SECURITY THROUGH QR CODE ENCRYPTION AND STEGANOGRAPHYacijjournal
The art of information hiding has become an important issue in the recent years as security of information
has become a big concern in this internet era. Cryptography and Steganography play major role for
secured data transfer. Steganography stands for concealed writing; it hides the message inside a cover
medium. Cryptography conceals the content of a message by encryption. QR (Quick Response) Codes are
2-dimensional bar codes that encode text strings. They are able to encode information in both vertical and
horizontal direction, thus able to encode more information. In this paper a novel approach is proposed for
secret communication by combining the concepts of Steganography and QR codes. The suggested method
includes two phases: (i) Encrypting the message by a QR code encoder and thus creating a QR code (ii)
Hiding the QR code inside a colour image. This hiding process embeds the quantised QR code so that it
will not make any visible distortion in the cover image and it introduces very minimum Bit Error Rate
(BER). Experimental result shows that the proposed method has high imperceptibility, integrity and
security..
One-Byte Modification for Breaking Memory Forensic AnalysisTakahiro Haruyama
The document proposes a one-byte modification method to potentially abort memory forensic analysis tools without impacting the running system or hiding specific objects. It identifies three sensitive operations in memory analysis: 1) virtual address translation in kernel space, 2) guessing the OS version and architecture, and 3) getting kernel objects like processes. For each operation, it outlines how top tools like Volatility and Memoryze perform the operation and identifies specific "abort factors", or one-byte values that could be modified to abort the analysis without direct detection. Modifying these factors could stop analysis tools from functioning properly without blue screening the system or hiding specific objects.
Memory Forensics Presentation from one of my lectures. I have tried to explain the functioning of memory in 32 bit architecture, how paging works, how windows manage its memory pages and how memory forensics job is done. The forensics part focuses on collecting data and analyzing the same
PDF secrets - hiding & revealing secrets in PDF documentsAnge Albertini
This document provides a three-part summary of a presentation on hiding and revealing secrets in PDF documents:
1. Common methods for hiding text or images in a PDF can be circumvented, as extraction tools can still access even hidden content. Text can be copied and imaged extracted from layers or formatting meant to conceal them.
2. PDF documents are composed of objects, streams, and other elements that provide structure but also opportunities to manipulate content. Understanding the PDF format internals can enable more advanced techniques for hiding or encrypting sensitive information.
3. While some viewers or protections try to block copying or extraction, workarounds usually exist. The presenter demonstrates various hiding methods and their limitations, encouraging studying
The document discusses performing memory forensic analysis on Windows systems using EnCase, including acquiring memory images using tools like WinEn and MoonSols Windows Memory Toolkit, and analyzing the images using EnScripts to extract information on processes, modules, and open files through techniques like traversing kernel data structures and searching for object fingerprints. Hands-on examples are provided to demonstrate acquiring memory from a system and analyzing it using EnScripts to identify processes and differences before and after terminating a process.
The Caesar cipher is a simple encryption technique where each letter in the plaintext is replaced by a letter some fixed number of positions down the alphabet. For example, with a shift of 1, A would be replaced by B, and so on. It is one of the earliest known ciphers and is still used in modern ROT13 encryption. While simple, the Caesar cipher has no security against decryption by brute force since there are only 26 possible keys. More complex ciphers are needed to securely encrypt messages.
https://mloey.github.io/courses/security2017.html
https://www.youtube.com/watch?v=td_8AM80DUA&list=PLKYmvyjH53q13_6aS4VwgXU0Nb_4sjwuf&index=2&t=37s
We will discuss the following: Symmetric Encryption, Substitution Techniques, Caesar Cipher, Monoalphabetic Cipher, Playfair Cipher, Hill Cipher
This document discusses QR codes and 2D barcodes. It begins with an introduction comparing 1D and 2D barcodes, specifically looking at their information density and capacity. It then focuses on QR codes, providing details on their data capacity compared to other 2D codes, as well as their features. The document outlines the steps to implement QR codes for mobile use, including installing barcode readers on phones and generating codes. It provides examples of QR code implementation and applications. Finally, it discusses trends in 2D barcode use.
Made PowerPoint presentation on QR codes for Advanced Microsoft Computer Applications(which was shown at GTGA) (GA Technology Educators Conference in November 2013). It runs all on its own all a person has to do is start it from the beginning, sit back, and enjoy.
Steganography is the art and science of hiding information by embedding messages within other harmless media so as not to arouse suspicion. It differs from cryptography in that the goal is to conceal the very existence of the message, not just its content. Common techniques include hiding data in the least significant bits of images, altering text formatting, and embedding signals in audio files like echoes. Detection methods involve looking for anomalies introduced by hidden data or disabling embedded data through compression or filtering. Steganography has applications in secure communication, copyright protection, and covert messaging.
The document provides an overview of steganography, including its definition, history, techniques, applications, and future scope. It discusses different types of steganography such as text, image, and audio steganography. For image steganography, it describes techniques such as LSB insertion and compares image and transform domain methods. It also provides examples of steganography tools and their usage for confidential communication and data protection.
This document provides an overview of cryptography. It defines cryptography as the science of securing messages from attacks. It discusses basic cryptography terms like plain text, cipher text, encryption, decryption, and keys. It describes symmetric key cryptography, where the same key is used for encryption and decryption, and asymmetric key cryptography, which uses different public and private keys. It also covers traditional cipher techniques like substitution and transposition ciphers. The document concludes by listing some applications of cryptography like e-commerce, secure data, and access control.
The document provides an overview of steganography and steganalysis techniques. It discusses image file formats like BMP, JPEG and GIF and how they can be used to hide data. Common data hiding methods include least significant bit substitution and palette manipulation. Steganalysis techniques to detect hidden data include least significant bit analysis, chi-square tests and histogram analysis. Encrypting data before hiding can help prevent detection by statistical analysis.
This document discusses various aspects of forensic analysis in Windows operating systems. It describes the location of recycle bin files, prefetch files, thumbnail caches, and volume shadow copies in different versions of Windows. It also discusses how timelines can be analyzed from files, registry entries, and other artifacts to reconstruct system activity. Time stamps are stored differently depending on the file system. The document provides examples of analyzing timelines, thumbnails, recycle bins, and shadow copies to investigate activity on a system.
This document discusses tools for recovering a partially lost Truecrypt password using a GPU when 4-5 symbols of the password are unknown. It describes the tools TrueCrack and oclHashCat, how they work by using the salt and encrypted string in the Truecrypt header to brute force possible passwords, and provides an example command to use oclHashCat to try passwords with unknown case and symbols replaced with wildcards.
Steganography is the practice of concealing a file, message, image, or video within another file, message, image, or video. The history of steganography dates back to ancient Greece with the use of wax tablets and includes the use of invisible inks and coded messages in postage stamps. Modern steganography hides data in digital files like images, audio, video, and text using techniques such as least significant bit encoding that modify redundant bits in files without damaging them or drawing suspicion.
Greek students worked on an eTwinning project called LEGENDS from 2015 to 2016 where they learned how to decode QR codes. The students worked in their classroom on this project to learn about decoding quick response barcodes. Their project involved figuring out how to read QR codes.
This document discusses steganography, which is the practice of concealing secret messages within other non-secret text or media. It begins with an introduction and history of steganography, then describes the basic model of hiding a secret message within a cover message. It outlines some steganography techniques, requirements for effective techniques, applications, and attacks against steganography. It concludes by listing several references on the topic.
Shift ciphers are substitution ciphers where each letter is shifted a fixed number of positions in the alphabet. Substitution ciphers replace each letter with another letter or symbol according to a key. Frequency analysis involves analyzing letter frequencies in ciphertext to break substitution ciphers. The Vigenère cipher uses multiple substitution ciphers with different keys, making it harder to break using frequency analysis alone.
DWT based approach for steganography using biometricsSri Madhur
This document discusses biometric steganography, which is a method of hiding secret data within skin regions of images. It begins by providing background on steganography and defining key terms. It then describes the specific steganography method used, which embeds secret data in the skin tone region of an image using the discrete wavelet transform after detecting skin tones via HSV color space. The document outlines the process, including carrier image, embedding in DWT sub-bands, extraction, and defines terms like PSNR. It concludes that embedding only in skin regions rather than the whole image enhances security, and cropping the image before transmission provides additional security.
DATA SECURITY THROUGH QR CODE ENCRYPTION AND STEGANOGRAPHYacijjournal
The art of information hiding has become an important issue in the recent years as security of information
has become a big concern in this internet era. Cryptography and Steganography play major role for
secured data transfer. Steganography stands for concealed writing; it hides the message inside a cover
medium. Cryptography conceals the content of a message by encryption. QR (Quick Response) Codes are
2-dimensional bar codes that encode text strings. They are able to encode information in both vertical and
horizontal direction, thus able to encode more information. In this paper a novel approach is proposed for
secret communication by combining the concepts of Steganography and QR codes. The suggested method
includes two phases: (i) Encrypting the message by a QR code encoder and thus creating a QR code (ii)
Hiding the QR code inside a colour image. This hiding process embeds the quantised QR code so that it
will not make any visible distortion in the cover image and it introduces very minimum Bit Error Rate
(BER). Experimental result shows that the proposed method has high imperceptibility, integrity and
security..
One-Byte Modification for Breaking Memory Forensic AnalysisTakahiro Haruyama
The document proposes a one-byte modification method to potentially abort memory forensic analysis tools without impacting the running system or hiding specific objects. It identifies three sensitive operations in memory analysis: 1) virtual address translation in kernel space, 2) guessing the OS version and architecture, and 3) getting kernel objects like processes. For each operation, it outlines how top tools like Volatility and Memoryze perform the operation and identifies specific "abort factors", or one-byte values that could be modified to abort the analysis without direct detection. Modifying these factors could stop analysis tools from functioning properly without blue screening the system or hiding specific objects.
Memory Forensics Presentation from one of my lectures. I have tried to explain the functioning of memory in 32 bit architecture, how paging works, how windows manage its memory pages and how memory forensics job is done. The forensics part focuses on collecting data and analyzing the same
PDF secrets - hiding & revealing secrets in PDF documentsAnge Albertini
This document provides a three-part summary of a presentation on hiding and revealing secrets in PDF documents:
1. Common methods for hiding text or images in a PDF can be circumvented, as extraction tools can still access even hidden content. Text can be copied and imaged extracted from layers or formatting meant to conceal them.
2. PDF documents are composed of objects, streams, and other elements that provide structure but also opportunities to manipulate content. Understanding the PDF format internals can enable more advanced techniques for hiding or encrypting sensitive information.
3. While some viewers or protections try to block copying or extraction, workarounds usually exist. The presenter demonstrates various hiding methods and their limitations, encouraging studying
The document discusses performing memory forensic analysis on Windows systems using EnCase, including acquiring memory images using tools like WinEn and MoonSols Windows Memory Toolkit, and analyzing the images using EnScripts to extract information on processes, modules, and open files through techniques like traversing kernel data structures and searching for object fingerprints. Hands-on examples are provided to demonstrate acquiring memory from a system and analyzing it using EnScripts to identify processes and differences before and after terminating a process.
The Caesar cipher is a simple encryption technique where each letter in the plaintext is replaced by a letter some fixed number of positions down the alphabet. For example, with a shift of 1, A would be replaced by B, and so on. It is one of the earliest known ciphers and is still used in modern ROT13 encryption. While simple, the Caesar cipher has no security against decryption by brute force since there are only 26 possible keys. More complex ciphers are needed to securely encrypt messages.
https://mloey.github.io/courses/security2017.html
https://www.youtube.com/watch?v=td_8AM80DUA&list=PLKYmvyjH53q13_6aS4VwgXU0Nb_4sjwuf&index=2&t=37s
We will discuss the following: Symmetric Encryption, Substitution Techniques, Caesar Cipher, Monoalphabetic Cipher, Playfair Cipher, Hill Cipher
This document discusses QR codes and 2D barcodes. It begins with an introduction comparing 1D and 2D barcodes, specifically looking at their information density and capacity. It then focuses on QR codes, providing details on their data capacity compared to other 2D codes, as well as their features. The document outlines the steps to implement QR codes for mobile use, including installing barcode readers on phones and generating codes. It provides examples of QR code implementation and applications. Finally, it discusses trends in 2D barcode use.
Made PowerPoint presentation on QR codes for Advanced Microsoft Computer Applications(which was shown at GTGA) (GA Technology Educators Conference in November 2013). It runs all on its own all a person has to do is start it from the beginning, sit back, and enjoy.
Steganography is the art and science of hiding information by embedding messages within other harmless media so as not to arouse suspicion. It differs from cryptography in that the goal is to conceal the very existence of the message, not just its content. Common techniques include hiding data in the least significant bits of images, altering text formatting, and embedding signals in audio files like echoes. Detection methods involve looking for anomalies introduced by hidden data or disabling embedded data through compression or filtering. Steganography has applications in secure communication, copyright protection, and covert messaging.
The document provides an overview of steganography, including its definition, history, techniques, applications, and future scope. It discusses different types of steganography such as text, image, and audio steganography. For image steganography, it describes techniques such as LSB insertion and compares image and transform domain methods. It also provides examples of steganography tools and their usage for confidential communication and data protection.
This document provides an overview of cryptography. It defines cryptography as the science of securing messages from attacks. It discusses basic cryptography terms like plain text, cipher text, encryption, decryption, and keys. It describes symmetric key cryptography, where the same key is used for encryption and decryption, and asymmetric key cryptography, which uses different public and private keys. It also covers traditional cipher techniques like substitution and transposition ciphers. The document concludes by listing some applications of cryptography like e-commerce, secure data, and access control.
The document provides an overview of steganography and steganalysis techniques. It discusses image file formats like BMP, JPEG and GIF and how they can be used to hide data. Common data hiding methods include least significant bit substitution and palette manipulation. Steganalysis techniques to detect hidden data include least significant bit analysis, chi-square tests and histogram analysis. Encrypting data before hiding can help prevent detection by statistical analysis.
//STEIM Workshop: A Vernacular of File FormatsRosa ɯǝukɯɐn
This document provides definitions and explanations of various file formats and compression techniques, including:
- Lossless vs lossy data compression
- Raster images and how color depth affects stored color values
- Image glitching techniques like imagebending and databending
- How bytes and binary files are structured
- Components of image files like headers, channels, and interleaved vs non-interleaved formats
- Explanations of formats like BMP, GIF, PNG, PSD, JPG, TIFF, and others
This document discusses different types of images and image formats. It begins by explaining bits per pixel (BPP) and how it determines the number of colors an image can display. It then discusses binary, grayscale, and color images. For image formats, it explains common formats like TIFF, JPEG, GIF, PNG, BMP, EPS, and RAW. TIFF is lossless and large in size, good for printing. JPEG is lossy but smaller in size, good for web. GIF supports animation and 256 colors. PNG is lossless and supports more colors than GIF. BMP and TIFF are similar but BMP is proprietary. EPS is for vector images. RAW holds unprocessed camera data.
This document discusses different types of images and image formats. It begins by explaining bits per pixel (BPP) and how it determines the number of colors an image can display. It then discusses binary, grayscale, and color images. For image formats, it explains common formats like TIFF, JPEG, GIF, PNG, BMP, EPS, and RAW. TIFF is lossless and best for printing while JPEG and PNG are best for web due to their ability to compress files sizes without significant quality loss. The document provides details on characteristics of each format.
JPEG compression involves four key steps:
1) Applying the discrete cosine transform (DCT) to 8x8 pixel blocks, transforming spatial information to frequency information.
2) Quantizing the transformed coefficients, discarding less important high-frequency information to reduce file size.
3) Scanning coefficients in zigzag order to group similar frequencies together, further compressing the data.
4) Entropy encoding the output, typically using Huffman coding, to remove statistical redundancy and achieve further compression.
This document discusses various media compression techniques including JPEG for images, MP3 and AAC for audio, and MPEG standards for video. JPEG takes advantage of human insensitivity to high spatial frequencies to compress images. MP3 audio compression utilizes properties of human hearing like insensitivity to quiet frequencies. MPEG video standards like H.261 and MPEG-2 achieve higher compression by exploiting both spatial and temporal redundancy between frames.
The document discusses different types of multimedia compression formats including GIF, JPEG, MPEG, and WAV. It explains the differences between lossy compression formats like JPEG and MPEG which can lose some data quality versus lossless formats like GIF and ZIP. The document also covers color spaces, digital image representation, and the compression algorithms used in common formats such as GIF using LZW compression and JPEG using discrete cosine transform quantization.
basic information about image files and why we use lots of kinds image file formats.
Some key terms like pixels, pixel depths, resolution, monochore, grayscale and colored images which will be used in the next sections of the presentation.
Basic compression methods which are used in image compression and give information about lossy/lossles images.
JPEG, PNG, GIF and BMP detailed
File types photorestoration and panoramicsdaviddiener
The document discusses different file types used in digital photography, including JPEG, RAW, TIFF, and bit depth. JPEG files use lossy compression to reduce file size, while RAW files contain uncompressed sensor data. Higher bit depths like 16 or 24 bits can capture more color information than 8 bits. Metadata is also discussed, which provides information about the photo like camera details and copyright. Different standards help govern photographic metadata.
H.264 and VC-1 are two video compression standards. While H.264 is an open standard, VC-1 was initially developed by Microsoft. Transcoding involves converting a video from one compression format to another. Transcoding H.264 to VC-1 allows content in both formats to be viewed by any VC-1 decoder. Compared to H.264, VC-1 requires less computational power while still providing good compression and quality, especially at bit rates around 6-8 Mbps. Both standards use techniques like block-based transforms, motion compensation, and entropy coding.
This document provides instructions for installing and using a JPEG XR plug-in for Adobe Photoshop. It can be installed on Windows or Mac systems and allows opening and saving images in the JPEG XR format within Photoshop. The document reviews how to install the plug-in, supported pixel formats, and basic and advanced encoding options when saving JPEG XR files.
Unit i mm_chap3_graphics and image data representationEellekwameowusu
This document discusses graphics and image file formats. It begins by describing different types of image data, including 1-bit monochrome images, 8-bit grayscale images, and 24-bit color images. It then discusses popular file formats like GIF and JPEG and compression techniques. Algorithms for dithering and reducing color are presented to convert between data types while preserving quality. Key concepts covered include bitplanes, color lookup tables, and the median-cut algorithm for color reduction.
This document discusses multimedia concepts including audio encoding, video encoding, and digital formats. It provides information on how audio is converted to digital form through sampling and quantization. Key video encoding concepts covered include luminance, chrominance, resolution, and frame rate. Common audio formats like WAV, AIFF, and video formats like MPEG, AVI are also summarized. The document concludes that a lack of standardization across formats has made building multimedia systems more challenging.
The document introduces JPEG and MPEG standards for image and video compression. JPEG uses DCT, quantization and entropy coding on 8x8 pixel blocks to remove spatial redundancy in images. MPEG builds on JPEG and additionally removes temporal redundancy between video frames using motion compensation in interframe coding of P and B frames. MPEG-1 was designed for video at 1.5Mbps while MPEG-2 supports digital TV and DVD with rates over 4Mbps. Later MPEG standards provide more capabilities for multimedia delivery and interaction.
The document discusses various digital image file formats including TIFF, GIF, PNG, and JPEG. TIFF files can contain multiple images and compression methods but have large file sizes. GIF is suitable for images with few colors but loses color variation. PNG uses lossless compression and supports more colors than GIF but may have large file sizes. JPEG is used for photographs and uses lossy compression to reduce file size, but information is lost in the process. The optimal file format depends on the image type and intended use.
There are several common graphic file formats for images, with TIFF, JPEG, and GIF being the most widely used. The best format depends on factors like the image content, intended use, need for editing, and compatibility. TIFF is a versatile, lossless format best for master copies. JPEG uses lossy compression and is best for photos. GIF is limited to 256 colors but works well for logos and is widely compatible. The document provides details on the characteristics and use cases of various formats.
ColorLab is software for working with color data. It contains tools for filtering, analyzing, and converting color data in various formats like images, color patches, and spectral measurements. Some key features include ICC profile conversion, multi-channel color separation, spectral conversion, and test chart generation and editing tools. ColorLab provides functionality for both internal development and public use, with additional tools available for ProfileMaker owners.
The document discusses digital media such as audio, images, and video. It explains that these media are stored as files with different extensions, like BMP, JPG, PNG for images and WAV, MP3 for audio. It describes how media is captured using devices like cameras and microphones, and how the continuous analog signals are converted to discrete digital formats through sampling and digitization. Key concepts covered include the Nyquist sampling theorem, bit depth, color spaces, and gamma correction.
Similar to nullcon 2010 - Steganography & Stegananalysis: A Technical & Psychological Perspective (20)
Arun Mane is the founder and director of AmynaSec Labs. He is a security speaker and trainer who has presented at many conferences including Defcon, Blackhat, Nullcon, and HITB. His areas of expertise include security testing of IoT devices, connected vehicles, medical devices, and industrial control systems. Some common issues he finds include devices being publicly accessible, having backdoors, hardcoded credentials, and crypto or web application management problems. His testing methodology involves assessing web and mobile applications, embedded device communications, hardware testing through reverse engineering, and analyzing communication protocols and stored data.
This document outlines an agenda for a presentation on open-source intelligence (OSINT) gathering techniques. The agenda includes an introduction to OSINT, different types of intelligence gathering, a scenario example, OSINT gathering tactics and tools like Shodan, TheHarvester and Google dorks, applications of OSINT, a demonstration, references for OSINT, and a conclusion. Key OSINT tools that will be demonstrated include Twitter, Shodan, TheHarvester and Google dorks for gathering information from public online sources.
This document provides an overview of server-side request forgery (SSRF) vulnerabilities, including what SSRF is, its impact, common attacks, bypassing filters, and mitigations. SSRF allows an attacker to induce the application to make requests to internal or external servers from the server side, bypassing access controls. This can enable attacks on the server itself or other backend systems and escalate privileges. The document discusses techniques for exploiting trust relationships and bypassing blacklists/whitelists to perform SSRF attacks. It also covers blind SSRF and ways to detect them using out-of-band techniques. Mitigations include avoiding user input that can trigger server requests, sanitizing input, whitelist
Nmap is a network scanning tool that can perform port scanning, operating system detection, and version detection among other features. It works by sending TCP and UDP packets to a target machine and examining the response, comparing it to its database to determine open ports and operating system. There are different scanning techniques that can be used like TCP SYN scanning, UDP scanning, and OS detection. Nmap also includes a scripting engine that allows users to write scripts to automate networking tasks. The presentation concludes with demonstrating Nmap's features through some examples.
The document provides an introduction and overview of the Metasploit Framework. It defines key terms like vulnerability, exploit, and payload. It outlines the scenario of testing a subnet to find vulnerabilities. It describes the main features of msfconsole like searching for modules, using specific modules, and configuring options. It promotes understanding and proper use, emphasizing that Metasploit alone does not make someone a hacker.
1) The document provides guidance on testing APIs for security weaknesses, including enumerating the attack surface, common tools to use, what to test for (e.g. authentication, authorization, injections), and demo apps to practice on.
2) It recommends testing authentication and authorization mechanisms like tokens, injections attacks on state-changing requests, and how data is consumed client-side.
3) The document also discusses testing for denial of service conditions, data smuggling through middleware, API rate limiting, and cross-origin requests.
TLS 1.3 is an update to the Transport Layer Security protocol that improves security and privacy. It removes vulnerable optional parts of TLS 1.2 and only supports strong ciphers to implement perfect forward secrecy. The handshake process is also significantly shortened. TLS 1.3 provides security benefits by removing outdated ciphers and privacy benefits by enabling perfect forward secrecy by default, ensuring only endpoints can decrypt traffic even if server keys are compromised in the future.
This document provides an introduction to hacking mainframes in 2020. It begins with an overview of mainframe systems and terminology. It then discusses reconnaissance methods like port scanning and credential theft to gain initial access. Next, it covers conducting internal reconnaissance to escalate privileges by exploiting surrogate users, APF authorized libraries, and UNIX privilege escalation techniques. The document aims to provide enough context for curiosity about hacking mainframe systems.
The document discusses CRLF injection and SSRF vulnerabilities. CRLF injection occurs when user input is directly parsed into response headers without sanitization, allowing special characters to be injected. SSRF is when a server is induced to make HTTP requests to domains of an attacker's choosing, potentially escalating access. Mitigations include sanitizing user input, implementing whitelists for allowed domains/protocols, and input validation.
The document provides an overview of Active Directory, including its components and how it is used to centrally manage users, computers, and other objects within a network. It discusses key Active Directory concepts such as forests, domains, organizational units, users, computers, and domain trusts. It also provides step-by-step instructions for setting up an Active Directory lab environment for red teaming purposes and integrating a client machine into the domain.
A security engineer discusses how logs and passive reconnaissance can reveal sensitive information like AWS credentials. The engineer searched for open Jenkins and SonarQube instances which led to discovering Slack channels containing AWS access keys. Key lessons are to know your boundaries, automate mundane tasks, don't presume systems mask secrets, and persistence is important in security work.
Shodan is a search engine that indexes internet-connected devices and provides information about devices, banners, and metadata. It works by generating random IP addresses and port scans to retrieve banner information from devices. This information is then stored in a searchable database. Users can search Shodan's database using filters like country, city, IP address, operating system, and ports. Shodan can be accessed through its website or command line interface. While useful for security research, Shodan also raises privacy and security concerns by revealing information about unprotected devices.
This document outlines an agenda for discussing cloud security. It begins with an introduction to cloud computing and deployment models. It then discusses challenges of cloud computing and why cloud security is important. Specific threats like data breaches and account hijacking are listed. The document reviews the shared responsibility model and scope of security in public clouds. It describes cloud security penetration testing methods like static and dynamic application testing. Finally, it provides prerequisites and methods for conducting cloud penetration testing, including reconnaissance, threat modeling, and following standard testing methodologies.
This document discusses several techniques for maintaining persistence on Windows systems, including modifying accessibility features, injecting into image file execution options, using AppInit DLLs, application shimming, BITS jobs, registry run keys, and Windows Management Instrumentation event subscriptions. It provides details on how each technique works, common implementations, required privileges, relevant data sources, and example event log entries.
Frida is a dynamic instrumentation toolkit that allows injecting JavaScript into applications. Objection is a runtime mobile exploration toolkit powered by Frida that helps assess the security of mobile apps. It supports iOS and Android. Objection allows exploring apps by listing classes, methods, and injecting scripts to enable dynamic analysis like dumping keychain entries.
Osquery is an open source tool that allows users to perform SQL queries on their system to retrieve information. It supports various platforms and makes it easy to get details about the system. Osquery consists of Osqueryi, Osqueryd, and Osqueryctl components. Basic queries can be run in user context mode to view system information, configuration, and tables. Osqueryd runs in daemon mode and can be configured using packs and decorators to monitor specific events and files. Osqueryctl is used to control the Osquery daemon process.
This document discusses DevSecOps, beginning with an introduction from Tibin Lukose. It then covers some challenges in DevSecOps such as developers lacking security skills, cultural challenges, and difficulties balancing speed, coverage and accuracy in testing. The document proposes a model DevSecOps company, Infosys, and provides a demo and contact information for any further questions.
This document provides an introduction to XML and related technologies like libxml2, XSLT, XPath, and XML attacks. It discusses the basics of XML including elements, tags, attributes, and validation. It also describes common XML libraries and tools like libxml2, xmllint, and xsltproc. Finally, it provides an overview of different types of XML attacks like XML injection, XPath injection, XXE, and XSLT injection.
This document contains the agenda for a presentation on Linux for hackers. The agenda includes discussing the Linux file system, managing virtual machines smartly, command line tools like alias, tee, pipe, grep, cut, uniq, and xargs, Bash scripting, logging, and proxy chaining. It also mentions demonstrating several commands and tools. The presentation aims to be an interactive session where the presenter will answer any questions from attendees.
This document provides an overview of Android penetration testing. It discusses requirements and tools for static and dynamic analysis, including Apptitude, Genymotion, and ADB. It covers analyzing the Android manifest and classes.dex files. It also describes vulnerabilities in WebViews, such as loading cleartext content and improper SSL handling. Best practices for coding securely on Android are also presented.
GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...Neo4j
Leonard Jayamohan, Partner & Generative AI Lead, Deloitte
This keynote will reveal how Deloitte leverages Neo4j’s graph power for groundbreaking digital twin solutions, achieving a staggering 100x performance boost. Discover the essential role knowledge graphs play in successful generative AI implementations. Plus, get an exclusive look at an innovative Neo4j + Generative AI solution Deloitte is developing in-house.
Full-RAG: A modern architecture for hyper-personalizationZilliz
Mike Del Balso, CEO & Co-Founder at Tecton, presents "Full RAG," a novel approach to AI recommendation systems, aiming to push beyond the limitations of traditional models through a deep integration of contextual insights and real-time data, leveraging the Retrieval-Augmented Generation architecture. This talk will outline Full RAG's potential to significantly enhance personalization, address engineering challenges such as data management and model training, and introduce data enrichment with reranking as a key solution. Attendees will gain crucial insights into the importance of hyperpersonalization in AI, the capabilities of Full RAG for advanced personalization, and strategies for managing complex data integrations for deploying cutting-edge AI solutions.
Building RAG with self-deployed Milvus vector database and Snowpark Container...Zilliz
This talk will give hands-on advice on building RAG applications with an open-source Milvus database deployed as a docker container. We will also introduce the integration of Milvus with Snowpark Container Services.
Unlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdfMalak Abu Hammad
Discover how MongoDB Atlas and vector search technology can revolutionize your application's search capabilities. This comprehensive presentation covers:
* What is Vector Search?
* Importance and benefits of vector search
* Practical use cases across various industries
* Step-by-step implementation guide
* Live demos with code snippets
* Enhancing LLM capabilities with vector search
* Best practices and optimization strategies
Perfect for developers, AI enthusiasts, and tech leaders. Learn how to leverage MongoDB Atlas to deliver highly relevant, context-aware search results, transforming your data retrieval process. Stay ahead in tech innovation and maximize the potential of your applications.
#MongoDB #VectorSearch #AI #SemanticSearch #TechInnovation #DataScience #LLM #MachineLearning #SearchTechnology
Maruthi Prithivirajan, Head of ASEAN & IN Solution Architecture, Neo4j
Get an inside look at the latest Neo4j innovations that enable relationship-driven intelligence at scale. Learn more about the newest cloud integrations and product enhancements that make Neo4j an essential choice for developers building apps with interconnected data and generative AI.
Removing Uninteresting Bytes in Software FuzzingAftab Hussain
Imagine a world where software fuzzing, the process of mutating bytes in test seeds to uncover hidden and erroneous program behaviors, becomes faster and more effective. A lot depends on the initial seeds, which can significantly dictate the trajectory of a fuzzing campaign, particularly in terms of how long it takes to uncover interesting behaviour in your code. We introduce DIAR, a technique designed to speedup fuzzing campaigns by pinpointing and eliminating those uninteresting bytes in the seeds. Picture this: instead of wasting valuable resources on meaningless mutations in large, bloated seeds, DIAR removes the unnecessary bytes, streamlining the entire process.
In this work, we equipped AFL, a popular fuzzer, with DIAR and examined two critical Linux libraries -- Libxml's xmllint, a tool for parsing xml documents, and Binutil's readelf, an essential debugging and security analysis command-line tool used to display detailed information about ELF (Executable and Linkable Format). Our preliminary results show that AFL+DIAR does not only discover new paths more quickly but also achieves higher coverage overall. This work thus showcases how starting with lean and optimized seeds can lead to faster, more comprehensive fuzzing campaigns -- and DIAR helps you find such seeds.
- These are slides of the talk given at IEEE International Conference on Software Testing Verification and Validation Workshop, ICSTW 2022.
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024Albert Hoitingh
In this session I delve into the encryption technology used in Microsoft 365 and Microsoft Purview. Including the concepts of Customer Key and Double Key Encryption.
Communications Mining Series - Zero to Hero - Session 1DianaGray10
This session provides introduction to UiPath Communication Mining, importance and platform overview. You will acquire a good understand of the phases in Communication Mining as we go over the platform with you. Topics covered:
• Communication Mining Overview
• Why is it important?
• How can it help today’s business and the benefits
• Phases in Communication Mining
• Demo on Platform overview
• Q/A
Introducing Milvus Lite: Easy-to-Install, Easy-to-Use vector database for you...Zilliz
Join us to introduce Milvus Lite, a vector database that can run on notebooks and laptops, share the same API with Milvus, and integrate with every popular GenAI framework. This webinar is perfect for developers seeking easy-to-use, well-integrated vector databases for their GenAI apps.
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...James Anderson
Effective Application Security in Software Delivery lifecycle using Deployment Firewall and DBOM
The modern software delivery process (or the CI/CD process) includes many tools, distributed teams, open-source code, and cloud platforms. Constant focus on speed to release software to market, along with the traditional slow and manual security checks has caused gaps in continuous security as an important piece in the software supply chain. Today organizations feel more susceptible to external and internal cyber threats due to the vast attack surface in their applications supply chain and the lack of end-to-end governance and risk management.
The software team must secure its software delivery process to avoid vulnerability and security breaches. This needs to be achieved with existing tool chains and without extensive rework of the delivery processes. This talk will present strategies and techniques for providing visibility into the true risk of the existing vulnerabilities, preventing the introduction of security issues in the software, resolving vulnerabilities in production environments quickly, and capturing the deployment bill of materials (DBOM).
Speakers:
Bob Boule
Robert Boule is a technology enthusiast with PASSION for technology and making things work along with a knack for helping others understand how things work. He comes with around 20 years of solution engineering experience in application security, software continuous delivery, and SaaS platforms. He is known for his dynamic presentations in CI/CD and application security integrated in software delivery lifecycle.
Gopinath Rebala
Gopinath Rebala is the CTO of OpsMx, where he has overall responsibility for the machine learning and data processing architectures for Secure Software Delivery. Gopi also has a strong connection with our customers, leading design and architecture for strategic implementations. Gopi is a frequent speaker and well-known leader in continuous delivery and integrating security into software delivery.
UiPath Test Automation using UiPath Test Suite series, part 5DianaGray10
Welcome to UiPath Test Automation using UiPath Test Suite series part 5. In this session, we will cover CI/CD with devops.
Topics covered:
CI/CD with in UiPath
End-to-end overview of CI/CD pipeline with Azure devops
Speaker:
Lyndsey Byblow, Test Suite Sales Engineer @ UiPath, Inc.
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdfPaige Cruz
Monitoring and observability aren’t traditionally found in software curriculums and many of us cobble this knowledge together from whatever vendor or ecosystem we were first introduced to and whatever is a part of your current company’s observability stack.
While the dev and ops silo continues to crumble….many organizations still relegate monitoring & observability as the purview of ops, infra and SRE teams. This is a mistake - achieving a highly observable system requires collaboration up and down the stack.
I, a former op, would like to extend an invitation to all application developers to join the observability party will share these foundational concepts to build on:
How to Get CNIC Information System with Paksim Ga.pptxdanishmna97
Pakdata Cf is a groundbreaking system designed to streamline and facilitate access to CNIC information. This innovative platform leverages advanced technology to provide users with efficient and secure access to their CNIC details.
Sudheer Mechineni, Head of Application Frameworks, Standard Chartered Bank
Discover how Standard Chartered Bank harnessed the power of Neo4j to transform complex data access challenges into a dynamic, scalable graph database solution. This keynote will cover their journey from initial adoption to deploying a fully automated, enterprise-grade causal cluster, highlighting key strategies for modelling organisational changes and ensuring robust disaster recovery. Learn how these innovations have not only enhanced Standard Chartered Bank’s data infrastructure but also positioned them as pioneers in the banking sector’s adoption of graph technology.
A tale of scale & speed: How the US Navy is enabling software delivery from l...sonjaschweigert1
Rapid and secure feature delivery is a goal across every application team and every branch of the DoD. The Navy’s DevSecOps platform, Party Barge, has achieved:
- Reduction in onboarding time from 5 weeks to 1 day
- Improved developer experience and productivity through actionable findings and reduction of false positives
- Maintenance of superior security standards and inherent policy enforcement with Authorization to Operate (ATO)
Development teams can ship efficiently and ensure applications are cyber ready for Navy Authorizing Officials (AOs). In this webinar, Sigma Defense and Anchore will give attendees a look behind the scenes and demo secure pipeline automation and security artifacts that speed up application ATO and time to production.
We will cover:
- How to remove silos in DevSecOps
- How to build efficient development pipeline roles and component templates
- How to deliver security artifacts that matter for ATO’s (SBOMs, vulnerability reports, and policy evidence)
- How to streamline operations with automated policy checks on container images
14. The BMP header This is intel Processor so Use little Endian system
15. The DIB header Offset # Size Purpose Eh 4 the size of this header (40 bytes) 12h 4 the bitmap width in pixels 16h 4 the bitmap height in pixels. 1Ah 2 the number of color planes being used. Must be set to 1. 1Ch 2 the number of bits per pixel, which is the color depth of the image. Typical values are 1, 4, 8, 16, 24 and 32. 1Eh 4 the compression method being used. 22h 4 the image size. This is the size of the raw bitmap data , and should not be confused with the file size. 26h 4 the horizontal resolution of the image. (pixel per meter, signed integer) 2Ah 4 the vertical resolution of the image. (pixel per meter, signed integer) 2Eh 4 the number of colors in the color palette, or 0 to default to 2 n . 32h 4 the number of important colors used, or 0 when every color is important; generally ignored.
16.
17.
18. JPEG File structure (JFIF) nullcon Goa 2010 http://nullcon.net Source: Wikipedia Bytes Payload Name Comments 0xFFD8 none Start Of Image 0xFFC0 variable Start Of Frame (Baseline DCT) Indicates that this is a baseline DCT-based JPEG, and specifies the width, height, number of components, and component subsampling (e.g., 4:2:0). 0xFFC2 variable Start Of Frame (Progressive DCT) Indicates that this is a progressive DCT-based JPEG, and specifies the width, height, number of components, and component subsampling (e.g., 4:2:0). 0xFFC4 variable Huffman Table(s) Specifies one or more Huffman tables. 0xFFDB variable Quantization Table(s) Specifies one or more quantization tables. 0xFFDD 2 bytes Define Restart Interval Specifies the interval between RST n markers, in macroblocks. This marker is followed by two bytes indicating the fixed size so it can be treated like any other variable size segment. 0xFFDA variable Start Of Scan Begins a top-to-bottom scan of the image. In baseline DCT JPEG images, there is generally a single scan. Progressive DCT JPEG images usually contain multiple scans. This marker specifies which slice of data it will contain, and is immediately followed by entropy-coded data. 0xFFD0 … 0xFFD7 none Restart Inserted every r macroblocks, where r is the restart interval set by a DRI marker. Not used if there was no DRI marker. The low 3 bits of the marker code, cycles from 0 to 7. 0xFFE n variable Application-specific For example, an Exif JPEG file uses an APP1 marker to store metadata, laid out in a structure based closely on TIFF . 0xFFFE variable Comment Contains a text comment. 0xFFD9 none End Of Image
19. The Compression Process nullcon Goa 2010 http://nullcon.net Colour space transformation from RGB to YCbCr (Optional) Down Sampling (4:4:4 or 4:2:2 or 4:2:0) (Optional) Block Splitting (8X8, 16 X8 or 16X16) Discrete Cosine transform Quantization Entropy Coding Final JPEG image data Results in higher values at top left of the matrix and a lot of low value at the bottom right The division table resulting in actual compression with lot of zero values at the bottom right corner Arranging the values in zig zag manner to get all the zero values at the end. Thus using a single byte to represent them Data hiding in LSB’s here
20. The JPEG Compression at work nullcon Goa 2010 http://nullcon.net DCT 8 X 8 Pixel data for one component e.g “Y” Averaged out matrix DCT Coefficients of the block
21. Cont…. nullcon Goa 2010 http://nullcon.net Round off quantized DCT Coefficients DCT Coefficients of the block Quantization table
37. Why this pattern emerge (Nature of the ASCII ) Char Decimal Binary Hex a 97 011 00001 61 b 98 011 00010 62 c 99 011 00011 63 d 100 011 00100 64 e 101 011 00101 65 f 102 011 00110 66 g 103 011 00111 67 h 104 011 01000 68 I 105 011 01001 69 j 106 011 01010 6A k 107 011 01011 6B l 108 011 01100 6C m 109 011 01101 6D Char Decimal Binary Hex n 110 011 01110 6E o 111 011 01111 6F p 112 011 10000 70 q 113 011 10001 71 r 114 011 10010 72 s 115 011 10011 73 t 116 011 10100 74 u 117 011 10101 75 v 118 011 10110 76 w 119 011 10111 77 x 120 011 11000 78 y 121 011 11001 79 z 122 011 11010 7A
38.
39. Same text with various encryption and LSB enhanced images Text encrypted as ASCII Text encrypted as Binary with IDEA encryption (S-Tools) Image with no data hidden
40. Which is the better option for hiding the data 1 2 3 4
41. Take a break and look at this Image nullcon Goa 2010 http://nullcon.net
42.
43.
44. Lets see the chi square result of the images shown
45.
46.
47.
48.
49.
50.
51.
52.
53. Check these palettes nullcon Goa 2010 http://nullcon.net Palette of complete black image original Palette of complete black image as changed by S-tools after hiding the data
54. Check these palettes nullcon Goa 2010 http://nullcon.net Original Palette of image with Black red and a custom colour Palette as changed by S-tools
55.
56.
57. Section 5 Beyond Technology Dr. Reena Bhansali Prince Komal Boonlia
62. Deception A successful or unsuccessful deliberate attempt without forewarning, to create in another belief which the communicator considers to be untrue. Deception involves acting in such a way which leads another person to believe something, that you, yourself, do not believe to be true (Ekman, Miller and Stiff). If you have nothing to hide, why not tell the complete truth?
63. Non verbal Behavior and deception Emotions Content Complexity Attempted Control Behaviour
64. Emotions Telling lie evokes emotions undergo Guilt, Fear, Duping Delight Liars might feel guilty because they are lying, might be afraid of getting caught, or might be excited about having the opportunity to fool someone The strength of these emotions depends on the personality of the liar and on the circumstances under which the lie takes place Guilt might results in gaze aversion Fear and Excitement might result in signs of arousal, limb movements, speech fillers, speech errors, facial emotional expressions or a high pitched voice.
65.
66. Attempted Behavioral Control Liars are busy in Impression Management Convincing others requires suppressing nerves effectively, masking evidence of heightened cognitive load, knowledge of how an honest person normally behaves and ability to show the behavior. Usually they tend to over control themselves, resulting in behavior that looks rehearsed and rigid and speech that sounds too smooth. Performance may look contrived due to lack of involvement.
67.
68. Verbal Behavior and deception CBCA:- Criteria Based Content Analysis-is a tool to assess the veracity of written statements, and is used as evidence in criminal courts in several countries in the world. CBCA scores are expected to be higher for truth tellers than for liars. Assumptions:- (i) Lying is cognitively more difficult than truth telling, (ii)Liars are more concerned with the impression they make on others than truth tellers. Three Phase A specific interview procedure to obtain a statement from information about what constitute a properly conducted interview Coding of the transcribed statement using the CBCA procedure An evaluation of the CBCA outcomes
80. Statement Analysis is a very useful interviewing technique for detecting deception on the part of either the suspect or the victim. It's the process of examining a person's words to see exactly what they're saying. I t's based on the principle that people do not lie. Most people want to tell the truth. Even liars will tell a partial truth. It's easier to tell a partial truth than to completely fabricate a statement It's been theorized that the psychological ID part of our personality, the subconscious primitive part, tends to be truthful at all times. If we're being deceptive, a conflict occurs with our ID and it creates stress. "Vrij and Winkel (1993) stated that the deception framework includes both emotional and cognitive components." When a person lies, this causes a conflict within ourselves and creates stress (emotional). That stress then triggers a sympathetic nervous system to act, as part of the "Fight or Flight" syndrome. Statement Analysis
81. Technique Truthful statements differ from fabricated ones in both content and quality Norm Investigators determine what is typical of a truthful statement Deviation from the norm
82. Part of Speech Extraneous Information Lack of Conviction Balance in statement Components
83.
84. Extraneous Information Extraneous information in a statement also can provide clues to deception. A truthful person with nothing to hide, when asked the question, "What happened," will recount the events chronologically and concisely. Any information given that does not answer this question is extraneous. People involved in crimes may feel the need to justify their actions. In such cases, the information in the statements will not follow a logical time frame or will skirt what really happened. They also may include more information than is necessary to tell the story. In such instances, investigators should scrutinize this extraneous information and question why this person felt the need to include it.
85. Lack of conviction When analyzing a statement, investigators should note if the person feigns a loss of memory by repeatedly inserting "I don't remember" or "I can't recall." They also should look to see if the person hedges during the narrative by using such phrases as "I think," "I believe," "to the best of my knowledge," or "kind of." These phrases, also called qualifiers, serve to temper the action about to be described, thereby discounting the message before it even is transmitted.
86. Balance of statement A statement given by a suspect or an alleged victim should be examined by investigators for overall balance. Statements should be more than just a series of details. They need to sound like an account of the event.
87.
88.
89.
90. Time is an important element in the subject's statement. It can give us clues as to how much information the subject has provided. Truthful people will provide a logical statement that follows a chronological time frame. Deceptive people often won't. Gaps in a statement indicate deception. When a person says, "I don't remember," they are often concealing a critical detail. Any missing time elements should raise red flags Time