0:15
A Student's Guide To Coding And Information Theory - , Po-ning Chen
ll4.me A Student's Guide To Coding And Information Theory - , Po-ning Chen This easy-t...
published: 18 Sep 2012
Author: jonibrown2525
A Student's Guide To Coding And Information Theory - , Po-ning Chen
ll4.me A Student's Guide To Coding And Information Theory - , Po-ning Chen This easy-to-read guide provides a concise introduction to the engineering background of modern communication systems, from mobile phones to data compression and storage. Background mathematics and specific engineering techniques are kept to a minimum so that only a basic knowledge of high-school mathematics is needed to understand the material covered. The authors begin with many practical applications in coding, including the repetition code, the Hamming code and the Huffman code. They then explain the corresponding information theory, from entropy and mutual information to channel capacity and the information transmission theorem. Finally, they provide insights into the connections between coding theory and other fields. Many worked examples are given throughout the book, using practical applications to illustrate theoretical definitions. Exercises are also included, enabling readers to double-check what they have learned and gain glimpses into more advanced topics, making this perfect for anyone who needs a quick introduction to the subject.Author: Moser, Stefan M. Author: Chen, Po-Ning Publisher: Cambridge University Press Illustration: N Language: ENG Title: A Student's Guide to Coding and Information Theory Pages: 00208 (Encrypted PDF) On Sale: 2012-01-31 SKU-13/ISBN: 9781107015838 Category: Technology & Engineering : Signals & Signal Processing Category: Computers : Information Theory <b>...</b>
56:01
Information Theory Today: ECE Lecturer Series
Founded by Claude Shannon in 1948, information theory has taken on renewed vibrancy with t...
published: 11 Sep 2012
Author: UnivDelaware
Information Theory Today: ECE Lecturer Series
Founded by Claude Shannon in 1948, information theory has taken on renewed vibrancy with technological advances that pave the way for attaining the fundamental limits of communication channels and information sources. Increasingly playing a role as a design driver, information theory is becoming more closely integrated with associated fields such as coding, signal processing and networks. In this talk, Sergio Verdu reviews the current research trends in the field as well as some of its longstanding open problems. Sergio Verdu is the Eugene Higgins Professor of Electrical Engineering at Princeton University where he teaches and conducts research on information theory. He was elected a Fellow of the IEEE in 1992 and a member of the National Academy of Engineering in 2007. He received the 2000 Frederick E. Terman Award from the American Society for Engineering Education and the IEEE Third Millennium Medal in 2000. In 2005, he received a Doctorate Honoris Causa from the Universitat Politecnica de Catalunya. He is the recipient of the 2007 Claude E. Shannon Award and the 2008 IEEE Richard W. Hamming Medal. In 1998, Cambridge University Press published his book Multiuser Detection. His papers have received several awards: the 1992 IEEE Donald Fink Paper Award, the 1998 Information Theory Outstanding Paper Award, an IEEE Information Theory Golden Jubilee Paper Award, the 2000 Paper Award from the Japan Telecommunications Advancement Foundation, the 2002 Leonard G. Abraham Prize <b>...</b>
69:22
Compressed Sensing Meets Information Theory
Google Tech Talk October 7, 2009 ABSTRACT Presented by Dror Baron, Visiting Scientist, Tec...
published: 09 Oct 2009
Author: GoogleTechTalks
Compressed Sensing Meets Information Theory
Google Tech Talk October 7, 2009 ABSTRACT Presented by Dror Baron, Visiting Scientist, Technion - Israel Institute of Technology. Traditional signal acquisition techniques sample band-limited analog signals above the Nyquist rate, which is related to the highest analog frequency in the signal. Compressed sensing (CS) is based on the revelation that optimization routines can reconstruct a sparse signal from a small number of linear projections of the signal. Therefore, CS-based techniques can acquire and process sparse signals at much lower rates. CS offers tremendous potential in applications such as broadband analog-to-digital conversion, where the Nyquist rate exceeds the state of the art. Information theory has numerous insights to offer CS; I will describe several investigations along these lines. First, distributed compressed sensing (DCS) provides new distributed signal acquisition algorithms that exploit both intra- and inter-signal correlation structures in multi-signal ensembles. DCS is immediately applicable in sensor networks. Next, we leverage the remarkable success of graph reduction algorithms and LDPC channel codes to design low-complexity CS reconstruction algorithms. Linear measurements play a crucial role not only in compressed sensing but in disciplines such as finance, where numerous noisy measurements are needed to estimate various statistical characteristics. Indeed, many areas of science and engineering seek to extract information from linearly <b>...</b>
5:14
Mantaro Sparse Representation Video
A video presentation of Sparsense Technology by Mantaro....
published: 02 Aug 2009
Author: mantaropds
Mantaro Sparse Representation Video
A video presentation of Sparsense Technology by Mantaro.
430:39
Recent Trends in Femtocell Research
Abstract: Femtocells have not only gained industrial attraction, but are also of increasin...
published: 17 Feb 2012
Author: Mischa Dohler
Recent Trends in Femtocell Research
Abstract: Femtocells have not only gained industrial attraction, but are also of increasing interest to the academic community. This is mainly due to the enormous challenges related to facilitating a viable femtocell deployment. The research community thus has and needs to tackle problems related to advanced PHY layers, scheduling and interference management, self-organizing networking techniques, among others. This talk will thus review trends, techniques and taxonomies from a rather academic and research point of view. There will also be ample opportunities to discuss open challenges and problems. It will serve as an introduction to the technical talks over subsequent days during this femto school. Biography: Josep Vidal received the Telecommunication Engineering and Ph.D. degrees from the Universitat Politècnica de Catalunya (UPC), where is he currently Professor. From 1989 to 1990, he was with the LTS at the Ecole Polytechnique de Lausanne as an Associate Researcher. He was awarded the Premio Extraordinario de Doctorado in 1996. He has been doing research and teaching on different areas in telecommunication engineering: statistical signal processing, information theory and communication theory, areas on which he has authored more than 140 journal and conference papers, plus 5 book chapters. Since 2000 has led UPC participation in projects SATURN, FIREWORKS, ROMANTIK and ROCKET, of the 5th, 6th and 7th Framework Programme of the European Commission (he served as <b>...</b>
3:36
Safe and Secure Communications:Ohtsuki Group,Keio University
In recent years, wireless communication has become very familiar, as exemplified by the ra...
published: 05 Jan 2010
Author: keiouniversity
Safe and Secure Communications:Ohtsuki Group,Keio University
In recent years, wireless communication has become very familiar, as exemplified by the rapid spread of mobile phones. However, because the available frequencies are limited, the transmission speed of mobile phones is lower than that of fiberoptic communication, audio quality fluctuates, and there is a risk of eavesdropping. To solve these problems, the Ohtsuki Group is developing communication technologies based on information theory and signal processing. Q.For example, one topic in our recent research is multidimensional signal processing for communications and security. Until now, signal processing has often been done in time or frequency domains, but were extending it to include spatial domain as well. In other words, we can do signal processing with respect to time, or space and frequency, or time and space, or time, space, and frequency. For example, when you're using a mobile phone, until now, sending or receiving a large data file has taken a very long time. But if you use this kind of technology, we can realize high-speed wireless communications like optical communications with mobile phones, high-quality transmission is possible, so DVDs or movies can be downloaded very quickly. Alternatively, by giving a network some capabilities of mobile phones, a secure mobile phone system can be created. We expect to be able to do a variety of things. They are also looking at positioning systems that could replace GPS. They are researching and developing positioning <b>...</b>
29:48
Hak5 - The Nyquist-Shannon sampling theorem, Nintendo DS emulators and QT programming
This time on the show Shannon joins us "in studio" to go over a little signal sa...
published: 09 Dec 2010
Author: Hak5Darren
Hak5 - The Nyquist-Shannon sampling theorem, Nintendo DS emulators and QT programming
This time on the show Shannon joins us "in studio" to go over a little signal sampling. Jenn has just the emulator for the Nintendo DS-less, and Jason kicks off a series on programming using the QT SDK.
23:31
Q1: Guest Lecture: Sundeep Rangan
Sundeep Rangan received the BASc. at the University of Waterloo, Canada and the M.Sc. and ...
published: 23 Sep 2012
Author: Network20Q
Q1: Guest Lecture: Sundeep Rangan
Sundeep Rangan received the BASc. at the University of Waterloo, Canada and the M.Sc. and Ph.D. at the University of California, Berkeley, all in Electrical Engineering. He has held postdoctoral appointments at the University of Michigan, Ann Arbor and Bell Labs. In 2000, he co-founded (with four others) Flarion Technologies, a spin off of Bell Labs, that developed Flash OFDM, one of the first cellular OFDM data systems. Flarion grew to over 150 employees with trials worldwide. In 2006, Flarion was acquired by Qualcomm Technologies where Dr. Rangan was a Director of Engineering involved in OFDM infrastructure products. He joined the ECE department at Poly in 2010. His research interests are in wireless communications, signal processing, information theory and control theory.
80:58
01 BeFEMTO-Recent Trends in Femtocell Research
Visit FP7 BeFEMTO EU project:www.ict-befemto.eu Abstract: Femtocells have not only gained ...
published: 18 May 2012
Author: BeFEMTO
01 BeFEMTO-Recent Trends in Femtocell Research
Visit FP7 BeFEMTO EU project:www.ict-befemto.eu Abstract: Femtocells have not only gained industrial attraction, but are also of increasing interest to the academic community. This is mainly due to the enormous challenges related to facilitating a viable femtocell deployment. The research community thus has and needs to tackle problems related to advanced PHY layers, scheduling and interference management, self-organizing networking techniques, among others. This talk will thus review trends, techniques and taxonomies from a rather academic and research point of view. There will also be ample opportunities to discuss open challenges and problems. It will serve as an introduction to the technical talks over subsequent days during this femto school. Biography: Josep Vidal received the Telecommunication Engineering and Ph.D. degrees from the Universitat Politècnica de Catalunya (UPC), where is he currently Professor. From 1989 to 1990, he was with the LTS at the Ecole Polytechnique de Lausanne as an Associate Researcher. He was awarded the Premio Extraordinario de Doctorado in 1996. He has been doing research and teaching on different areas in telecommunication engineering: statistical signal processing, information theory and communication theory, areas on which he has authored more than 140 journal and conference papers, plus 5 book chapters. Since 2000 has led UPC participation in projects SATURN, FIREWORKS, ROMANTIK and ROCKET, of the 5th, 6th and 7th Framework Programme <b>...</b>
9:59
CERIAS Security: John Oritz: Steganography 1/6
Clip 1/6 Speaker: John Oritz · SRA International Steganography is a discipline of c...
published: 30 Apr 2010
Author: ChRiStIaAn008
CERIAS Security: John Oritz: Steganography 1/6
Clip 1/6 Speaker: John Oritz · SRA International Steganography is a discipline of computer science whose aim is to conceal the existence of information. Steganography synergizes various technologies including data compression, digital signal processing, information theory, data networks, cryptography, coding theory, and the human audio and visual system. Strap on your seatbelt. I will present some key concepts of steganography, describe a number of basic and advanced spatial and transform domain techniques (with lots of pictures and sounds for the attention-challenged), and demonstrate these techniques using custom steganography software. The demonstrations include a Least Significant Bit (LSB) technique, High-Capacity Hiding in Jpegs, and time modulation in audio. For more information go to the Cerias website (bit.ly
9:59
CERIAS Security: John Oritz: Steganography 2/6
Clip 2/6 Speaker: John Oritz · SRA International Steganography is a discipline of c...
published: 30 Apr 2010
Author: ChRiStIaAn008
CERIAS Security: John Oritz: Steganography 2/6
Clip 2/6 Speaker: John Oritz · SRA International Steganography is a discipline of computer science whose aim is to conceal the existence of information. Steganography synergizes various technologies including data compression, digital signal processing, information theory, data networks, cryptography, coding theory, and the human audio and visual system. Strap on your seatbelt. I will present some key concepts of steganography, describe a number of basic and advanced spatial and transform domain techniques (with lots of pictures and sounds for the attention-challenged), and demonstrate these techniques using custom steganography software. The demonstrations include a Least Significant Bit (LSB) technique, High-Capacity Hiding in Jpegs, and time modulation in audio. For more information go to the Cerias website (bit.ly
0:30
Claude Elwood Shannon
1916: Claude Elwood Shannon, the father of information theory and the man who coined the t...
published: 30 Oct 2011
Author: Mirko Petrincic
Claude Elwood Shannon
1916: Claude Elwood Shannon, the father of information theory and the man who coined the term bit, is born. Shannon was educated at the University of Michigan and the Massachusetts Institute of Technology and spent most of his career working for Bell Labs. Shannon's 1938 master's thesis, A Symbolic Analysis of Relay and Switching Circuits, used Boolean algebra to establish the theoretical basis of modern digital circuits. The paper came out of Shannon's insight that the binary nature of Boolean logic was analogous to the ones and zeros used by digital circuits. His paper was widely cited, laying the foundations for modern information theory. It has been called "one of the most significant master's theses of the 20th century." Not bad for a 22-year-old kid from a small town in Michigan. That paper includes the first known use of the term bit to refer to a "binary digit." Later wags would expand the terminology to include byte (usually an 8-digit binary number) and even nybble (half a byte, or 4 binary digits). Shannon's later work, capped by the landmark 1948 A Mathematical Theory of Communication, more fully fleshed out communications theory, defining key concepts and predicting the upper limits of communications rates over telephone lines as well as more modern optical and wireless transmissions. His framework and terminology remain standard to this date. Shannon's interests were eclectic and included cryptography (on which he briefly collaborated with Alan Turing during <b>...</b>
103:01
LTE-A PHY Layer Overview & Femto Design Challenges
Abstract: In this talk we first provide a detailed tutorial overview of the PHY layer proc...
published: 16 Mar 2012
Author: Mischa Dohler
LTE-A PHY Layer Overview & Femto Design Challenges
Abstract: In this talk we first provide a detailed tutorial overview of the PHY layer procedures, techniques and features in LTE and their evolution towards LTE-Advanced (Rel. 8-10). We will start with the revision of the fundamental basics of LTE, including the LTE frame structure for TDD and FDD, the reference and synchronization signal and the physical channels in uplink and downlink, as well as the synchronization, Random Access and HARQ procedures. We will further address the most important LTE PHY layer system blocks and requirements both from the base station (eNB) and user equipment (UE) perspective. Finally, we provide a detailed overview on the available channel state feedback mechanism and reporting schemes devised in LTE and LTE-A that enable efficient channel aware scheduling and multi-antenna operation. Furthermore, based on the above, we will discuss here in great details the implications of the standardization work onto the PHY layer design. In this talk will specifically focus on multi-antenna techniques that are supported in LTE and illustrate the implementational aspect associated with these schemes. We will outline how multi-antenna techniques for interference mitigation have evolved in the LTE standard from merely interference randomization types of open-loop approaches in LTE towards powerful interference coordination and interfere suppression types of closed-loop schemes in LTE-Advanced. Biography: Marius Pesavento (M'00) received the Dipl.-Ing. and <b>...</b>
7:29
Space Scale Awareness
Scale-space theory is a framework for multi-scale signal representation developed by the c...
published: 29 Oct 2008
Author: dorinel2001
Space Scale Awareness
Scale-space theory is a framework for multi-scale signal representation developed by the computer vision, image processing and signal processing communities with complementary motivations from physics and biological vision. It is a formal theory for handling image structures at different scales, by representing an image as a one-parameter family of smoothed images, the scale-space representation, parametrized by the size of the smoothing kernel used for suppressing fine-scale structures. The parameter t in this family is referred to as the scale parameter, with the interpretation that image structures of spatial size smaller than about \sqrt{t} have largely been smoothed away in the scale-space level at scale t. The main type of scale-space is the linear (Gaussian) scale-space, which has wide applicability as well as the attractive property of being possible to derive from a small set of scale-space axioms. The corresponding scale-space framework encompasses a theory for Gaussian derivative operators, which can be used as a basis for expressing a large class of visual operations for computerized systems that process visual information. This framework also allows visual operations to be made scale invariant, which is necessary for dealing with the size variations that may occur in image data, because real-world objects may be of different sizes and in addition the distance between the object and the camera may be unknown and may vary depending on the circumstances.
Vimeo results:
1:37
HDR Video Demonstration Using Two Canon 5D mark II's
Our HDR rig used to film this is now for sale, to raise money for the next generation! Con...
published: 09 Sep 2010
Author: Soviet Montage
HDR Video Demonstration Using Two Canon 5D mark II's
Our HDR rig used to film this is now for sale, to raise money for the next generation! Contact us for details or to submit an offer.
Check out our iOS app for Photoshop-level photo editing: http://proc.es
This video highlights several clips we've made using our new High Dynamic Range (HDR) process. Video is captured on two Canon 5D mark II DSLRs, each capturing the exact same subject via a beam splitter. The cameras are configured so that they record different exposure values, e.g., one camera is overexposed, the other underexposed. After the footage has been recorded, we use a variety of HDR processing tools to combine the video from the two cameras, yielding the clips you see above.
HDR Video provides filmmakers with many exciting new opportunities. Not only can HDR video create interesting effects, it can also allow for even exposure where artificial lighting is unavailable or impractical. For example, when a subject is backlit, one camera could be set to properly expose the subject, the other the sky, resulting in video with perfect exposure throughout.
We will continue to develop and improve the HDR video process for better results and efficiency. For more information, check out our website
www.sovietmontage.com
http://twitter.com/sovietmontage
http://www.facebook.com/sovietmontage
Music
Pyotr Ilyich Tchaikovsky
Opus 40, Number 9
Performed by Kevin MacLeod
Licensed Under Creative Commons "Attribution 3.0"
19:21
Zimoun : Compilation Video V.2.9 | Sound Sculptures & Installations, Sound Architectures
Zimoun : Sound Sculptures & Installations, Sound Architectrues
Compilation Video V.2.9 / L...
published: 24 Oct 2009
Author: STUDIO ZIMOUN
Zimoun : Compilation Video V.2.9 | Sound Sculptures & Installations, Sound Architectures
Zimoun : Sound Sculptures & Installations, Sound Architectrues
Compilation Video V.2.9 / Last update: December 4, 2011
Using simple and functional components, Zimoun builds architecturally-minded platforms of sound. Exploring mechanical rhythm and flow in prepared systems, his installations incorporate commonplace industrial objects. In an obsessive display of simple and functional materials, these works articulate a tension between the orderly patterns of Modernism and the chaotic forces of life. Carrying an emotional depth, the acoustic hum of natural phenomena in Zimoun's minimalist constructions effortlessly reverberates.
More works & information:
http://www.zimoun.ch
Next Events:
http://zimoun.ch/events.html
Newsletter:
http://www.zimoun.ch/newsletter.html
Facebook:
http://www.facebook.com/pages/Zimoun/134817185765
HD Video Archive:
http://vimeo.com/zimoun/videos/sort:plays
Galleries:
bitforms gallery nyc
http://www.bitforms.com
Galerie Denise René Paris
http://www.deniserene.com
_
«The sound sculptures and installations of Zimoun are graceful, mechanized works of playful poetry, their structural simplicity opens like an industrial bloom to reveal a complex and intricate series of relationships, an ongoing interplay between the «artificial» and the «organic». It‘s an artistic research of simple and elegant systems to generate and study complex behaviors in sound and motion. Zimoun creates sound pieces from basic components, often using multiples of the same prepared mechanical elements to examine the creation and degeneration of patterns.» Tim Beck
«Zimoun is best compared to a watchmaker of a self-reproducing time constructing his own gauging station.» Radjo Monk
«The clean, elegant sound sculptures combine visual, sonic, and spatial elements in an organically balanced entirely artwork. Using simple and well- conceived mechanical systems, Zimouns‘s work transforms and activates the space.» Jury Prix Ars Electronica 2010
«Zimoun creates complex kinetic sound sculptures by arranging industrially produced parts according to seemingly simple rules. Using motors, wires, ventilators, etc.., he creates closed systems that develop their own behavior and rules similarly to artificial creatures. Once running, they are left to themselves and go through an indeterminable process of (de)generation.
These quasi autonomous creatures exist in an absolutely synthetic sphere of lifeless matter. However, within the precise, determinist systems creative categorioes suddenly reappear, such as deviation, refusal and transcience out of which complex patterns of behavior evolve.» Node10
«It is a poetic and humorous absurdity we find in Zimoun’s work, which opens up a wide, refreshing and enriching space for discoveries, associations and a multitude of approaches.» Nina Terry
«The components used in Zimoun’s work are simple, functional and raw, whereas only aesthetically high-level and purposefully chosen elements and materials are used in minimalist fashion. Through radical reduction, Zimoun creates works of art which allow for a plethora of associations without being pinned down to a specific direction. Radical abstraction functions rather like a code in the background of things, thus elegantly avoiding an insinuation of direct, concrete attribution. Thanks to the abundance of mechanical activity, the range of perception, possibilities and interpretations is wide open.» Amanda Neumann
«Indeed, one of the refreshing elements of this work is the immediacy with which one can understand the sound-making process, where each micro-event is present, visible, and concrete. Yet at the same time the resulting complexity of the total system, conjured before your eyes, defies any attempt to dissect it. You might find yourself feeling there is a «prime mover» at work behind the scenes, but in fact it is just the characteristic reaction of materials behaving together and in unison with the space of their activity. A magic of the real.» Xymara
_
Website:
http://www.zimoun.ch
_
1:30
I LOOK & MOVE
Our work «I LOOK & MOVE» is entered to the shortlist VIMEO FESTIVAL + AWARDS 2012!!!
http...
published: 02 Nov 2011
Author: Constantine Konovalov
I LOOK & MOVE
Our work «I LOOK & MOVE» is entered to the shortlist VIMEO FESTIVAL + AWARDS 2012!!!
https://vimeo.com/awards/shortlist/lyrical
More information:
http://teeter-totter-tam.ru/vimeo_awards
Stop-motion animation
Camera Sony a33/a550 Tamron 17-50/2.8
Soft Apple Motion 5/Final Cut Pro X
Every second our planet is spinning you, but you can begin to spin our world yourself. Every day you are able to go ahead in order to be happy and make happy others. Yes, it is not so simple. There are many obstacles in the way. Life is not a movie. Although it as a movie has a physical end. Nobody knows what will be in the end of our life. And while you live you are the director of each moment.
Our new Stop Motion Animation "I LOOK & MOVE" about all those people who were able to turn this world, to change something, build something, create something and do something that tracks on our planet.
The process of creating this stop-motion animation is described in the blog of our site:
http://teeter-totter-tam.ru/i-look-and-move-en (English)
О создании ролика:
http://teeter-totter-tam.ru/i-look-and-move-ru (Rus)
Our group in Facebook:
http://www.facebook.com/pages/Teeter-totter-tam-Animation/132633960134183
Animation:
http://teeter-totter-tam.ru
Music and Sound Design:
http://fabmartini.com
3:18
Cover creation
After working on the latest cover for Macworld Magazine I wanted to show what is involved ...
published: 06 Aug 2009
Author: Peter Belanger
Cover creation
After working on the latest cover for Macworld Magazine I wanted to show what is involved in making a cover. I focused on the three main areas: the photography, photoshop and design. I chose a time lapse format to convey lots of information in a small amount of time. The only drawback of time lapse is that since half a day goes by in 30 seconds, the whole process seam so easy! Lots of details were left out of the design process (like the cover meetings and rounds of layout options). I began to photograph the design process after the layouts had already been narrowed down to just three cover designs.
On the technical side, for the time lapse video, I used the Canon 5D Mark II with a 24mm-70mm zoom. I chose the 5D because of its great image quality with high ISO's. Canon's sRAW1 gave me the flexibility of a RAW file with the file size of a jpeg. The actual Macworld cover was taken with a Phase One P65+ digital back attached to a 4x5 Sinar X camera with a 65mm lens.
Many thanks to Rob Schultz for allowing me to invade his office and literally shoot over his shoulder.
The music was used with permission by The Brokenmusicbox.
Youtube results:
9:59
CERIAS Security: John Oritz: Steganography 3/6
Clip 3/6 Speaker: John Oritz · SRA International Steganography is a discipline of c...
published: 30 Apr 2010
Author: ChRiStIaAn008
CERIAS Security: John Oritz: Steganography 3/6
Clip 3/6 Speaker: John Oritz · SRA International Steganography is a discipline of computer science whose aim is to conceal the existence of information. Steganography synergizes various technologies including data compression, digital signal processing, information theory, data networks, cryptography, coding theory, and the human audio and visual system. Strap on your seatbelt. I will present some key concepts of steganography, describe a number of basic and advanced spatial and transform domain techniques (with lots of pictures and sounds for the attention-challenged), and demonstrate these techniques using custom steganography software. The demonstrations include a Least Significant Bit (LSB) technique, High-Capacity Hiding in Jpegs, and time modulation in audio. For more information go to the Cerias website (bit.ly
9:59
CERIAS Security: John Oritz: Steganography 4/6
Clip 4/6 Speaker: John Oritz · SRA International Steganography is a discipline of c...
published: 30 Apr 2010
Author: ChRiStIaAn008
CERIAS Security: John Oritz: Steganography 4/6
Clip 4/6 Speaker: John Oritz · SRA International Steganography is a discipline of computer science whose aim is to conceal the existence of information. Steganography synergizes various technologies including data compression, digital signal processing, information theory, data networks, cryptography, coding theory, and the human audio and visual system. Strap on your seatbelt. I will present some key concepts of steganography, describe a number of basic and advanced spatial and transform domain techniques (with lots of pictures and sounds for the attention-challenged), and demonstrate these techniques using custom steganography software. The demonstrations include a Least Significant Bit (LSB) technique, High-Capacity Hiding in Jpegs, and time modulation in audio. For more information go to the Cerias website (bit.ly
9:59
CERIAS Security: John Oritz: Steganography 5/6
Clip 5/6 Speaker: John Oritz · SRA International Steganography is a discipline of c...
published: 30 Apr 2010
Author: ChRiStIaAn008
CERIAS Security: John Oritz: Steganography 5/6
Clip 5/6 Speaker: John Oritz · SRA International Steganography is a discipline of computer science whose aim is to conceal the existence of information. Steganography synergizes various technologies including data compression, digital signal processing, information theory, data networks, cryptography, coding theory, and the human audio and visual system. Strap on your seatbelt. I will present some key concepts of steganography, describe a number of basic and advanced spatial and transform domain techniques (with lots of pictures and sounds for the attention-challenged), and demonstrate these techniques using custom steganography software. The demonstrations include a Least Significant Bit (LSB) technique, High-Capacity Hiding in Jpegs, and time modulation in audio. For more information go to the Cerias website (bit.ly
57:55
2008-11-12 CERIAS - John Oritz, SRA International
Recorded: 11/12/2008 CERIAS Security Seminar at Purdue University John Oritz, SRA Internat...
published: 10 May 2012
Author: ceriaspurdue
2008-11-12 CERIAS - John Oritz, SRA International
Recorded: 11/12/2008 CERIAS Security Seminar at Purdue University John Oritz, SRA International John Oritz, SRA International Steganography is a discipline of computer science whose aim is to conceal the existence of information. Steganography synergizes various technologies including data compression, digital signal processing, information theory, data networks, cryptography, coding theory, and the human audio and visual system. Strap on your seatbelt. I will present some key concepts of steganography, describe a number of basic and advanced spatial and transform domain techniques (with lots of pictures and sounds for the �attention-challenged�), and demonstrate these techniques using custom steganography software. The demonstrations include a Least Significant Bit (LSB) technique, High-Capacity Hiding in Jpegs, and time modulation in audio. John Ortiz is currently a senior computer engineering consultant for SRA International. In this position he researches information hiding techniques and steganography software, assesses the security and feasibility of advanced DoD security applications, examines and deobfuscates malware, and develops forensics tools. Prior to SRA, he spent 5 years at General Dynamics developing source code and network traffic analysis techniques and software.In a second role, Mr. Ortiz teaches a variety of computer science and electrical engineering courses at the University of Texas at San Antonio (UTSA). In particular, he <b>...</b>