Key-Selective Patchwork Method for Audio Watermarking

Size: px
Start display at page:

Download "Key-Selective Patchwork Method for Audio Watermarking"

Transcription

1 Internatonal Journal of Dgtal Content Technology and ts Applcatons Volume 4, Number 4, July 2010 Key-Selectve Patchwork Method for Audo Watermarkng 1 Ch-Man Pun, 2 Jng-Jng Jang 1, Frst and Correspondng Author,2 Department of Computer and Informaton Scence Unversty of Macau, Macau SAR, Chna cmpun@umac.mo, ma96525@umac.mo do: /jdcta.vol4.ssue4.12 Abstract Ths paper presents a Key-Selectve Patchwork Algorthm for audo watermarkng. Two specal subsets of the host sgnal features were selected to embed the watermark sgnal, addng a small constant value to one subset and subtractng the same to another patch. The method s based on wavelet doman and the watermark sgnals were embedded n approxmaton coeffcents. In order to control the naudblty of watermark nserton we try to use varous constant values and select the optmal one to guarantee a desred qualty for the watermarked audo sgnal. The qualty of the watermarked sgnal s evaluated by PSNR (Peak Sgnal Nose Rato) method and Extract Rato(ER) after varous attacks. Smulaton results show that Key-Selectve Patch Method s robust aganst varous common attacks such as flterng, resample and so on. 1. Introducton Keywords: Dscrete wavelet transform, patchwork, dgtal watermarkng Many watermarkng algorthms have been proposed [1-3]. Most of them are produced for mage or vdeo. However, the number of audo watermarkng algorthms s relatvely few [1-3]. There are several reasons for the dffculty of developng audo watermarkng algorthms. Most of all, comparng to other human sensory organs, such lke eyes noses, the human ear s far more senstve. Human ears are so senstve that even a small amount of embedded nose can be detected, especally when the watermark s embedded to the sgnal whose power s weak. It s found that audo watermarkng s a good soluton to address the problems, such as llegal usage of copyrghted audo. When the copyrght volaton has occurred, audo watermarkng can be used as the evdence of copyrght nfrngements and show the owner of the dgtal products. Audo watermark nformaton s a techncal and ntentonal nose. The nformaton such as author, create date, usage methods and other nformaton related to the copyrght can be embedded to the orgnal audo sgnal to dentfy the copyrght of the dgtal products. Moreover, the watermark can possbly be employed to trace the usage of the dgtal products or to lmt the number of copes exsts by nsertng the counter or some specal trackers to the sgnals. In addton, usng the author been embedded n the audo sgnal, rghtful ownershp problem can be addressed. Dgtal watermarkng s the technology that embeds the watermark nformaton nto the orgnal sgnal and generates watermarked sgnal, and make sure that the watermarked sgnal does not mpact normal usage of the sgnal. At least two mportant constrants, whch should be satsfed n each audo watermarkng algorthm, are: robustness and naudblty. Inaudblty s the ablty of the watermarked sgnal to keep audble dstorton free after watermark nformaton nserton. Robustness means that the watermarkng algorthms own the capablty to wthdraw attempts such as modfy or removal of embedded watermarks. In the other word, after varous attacks such as compresson, flterng, nose addton, the more the watermarkng nformaton stll can be detected from the watermarked sgnal, the more robust the watermark algorthm s. However, these two constrants may seem to be contradctory. For example, keepng robustness to attacks n a good level wll lead naudblty of the watermarked sgnal to be at lower level. In addton to these ssues, the other constrants such as securty and complexty of the watermarkng algorthm should also be taken nto consderaton. 117

2 Key-Selectve Patchwork Method for Audo Watermarkng Ch-Man Pun, Jng-Jng Jang Recently, audo watermarkng technques have acheved notable progress, and several dfferent knds of algorthms for embeddng watermarks nto audo sgnal have been proposed [4]. Makng full use of temporal maskng phenomenon n human audtory systems, Cvej et al. [5] gven a spread spectrum approach for audo watermarkng. Swanson et al. [6] proposed a watermarkng algorthm to embed watermark by drectly modfyng the audo samples. In the way of breakng each audo clp nto smaller peces and addng a perceptually shaped pseudorandom sequence, nserton of the watermark nformaton can be accomplshed. In order to embed more water mark nformaton to the audo sgnal under the two constran of naudblty an robustness, Seok et al. [7] delvered an audo watermarkng method by takng advantage of the human perceptual characterstcs of the audo sgnal to adapts the embeddng strength, so that more watermarkng data can be nserted and more robustness wll mplemented. Grn et al. [8] ntroduced a audo sgnal watermarkng whch use the snusodal model and phases, ampltudes, and dgtal frequences modulatons of the partals. Nma et al. [9] proposed a multplcatve patchwork method for audo watermarkng to stronger watermark nserton wth less audblty. In ths paper, a Key-Selectve Patchwork Algorthm for audo watermarkng s proposed. A revew of the patchwork algorthm s ntroduced n next secton. In secton 3 and 4, the watermark embeddng and extracton algorthms are descrbed n detals. Expermental results are dscussed n secton 5. Fnally, conclusons are drawn n secton Revew of the patchwork Algorthm Patchwork s proposed as a perfect watermarkng algorthm for mages[10]. Bender et al. delvered the man dea of patchwork. The sgnfcant steps n the patchwork embed algorthm are: () usng a gven key to choose two patches randomly, () add a small constant value, d, to the sample values of one patch A and at same tme subtract the same constant value from the sample values of another patch B. Mathematcally speakng s as follow. * * a a d, b b d where a and b represent sample values of the patchwork sets A and B, respectvely. By dong ths, a slght change of the orgnal sample values had occurred. The strength of constant value d wll affect the naudblty of the watermarkng algorthm. In a smlar way, there are two major procedures n the watermarkng detect algorthm. ()choose two patches by usng the same key used n the embed procedure, () calculate the dfference of the sample values between the two patches. Then, compare the expected value of the dfferences of the sample means and the calculate dfference to determne whether the watermark nformaton had been nserted to the orgnal host sgnal or not. Because the dfference of two patches s used to detect the watermark nformaton, t does not need the orgnal sgnal n the retrevng procedure. In ths way a blnd watermarkng algorthm can be acheved. Patchwork tself s a very good algorthm, because t use some mportant mathematcs features to embed the watermark nformaton. Note that * * E[ a b ] E[( a d) ( b d)] E[ a b] 2d where a and b are sample means of the ndvdual sample algorthm assumes E[ a b] 0, so the E[ a b ] 2d. 3. Embeddng the watermarks * * a and b, respectvely. The patchwork The two major steps n the algorthm are: () usng a selectve-key, whch make the dfference between the two patches to be chosen s around zero, to generate two sets of pseudo-random numbers whch wll be used as ndexes to choose two patches, A and B, whose sze s n, n the frequency doman of audo sgnal and () add the small constant value d to the each element of one patch, A, whose elements sum s greater. And subtract the same value from the each element of another patch, B, 118

3 Internatonal Journal of Dgtal Content Technology and ts Applcatons Volume 4, Number 4, July 2010 whose element sum s small. Mathematcally speakng ' ' a a d, b b d. By repeatng step () and step () M tmes, M pars of patches are obtaned. And the 2M sets of pseudo-random numbers, whch are used as ndexes to choose the patches, wll be the watermarkng nformaton n ths proposed algorthm. By dong ths, the orgnal sample values had been slghtly modfed. Accordng to the statstc features, the expected value of the dfferences of the sample values before embeddng s zero. After embeddng, the expected value becomes 2nd. The detect process starts from (1)usng frst two sets of pseudo-random numbers as ndex to choose two patches n the frequency doman of audo sgnal, (2) then calculate the dfference of the two patches. If the dfference s around threshold 2nd, then make the Counter ncreases one. Repeated step(1) and step(2) M tmes. Then compute the value of Extract Rato(ER) = (M-Counter) / M whch s used to decde whether the samples contan watermark nformaton or not. If ER s greater than the decson threshold, then watermarkng s embedded, else the watermarkng s not embedded. The proposed algorthm n ths paper nserts watermarks n the frequency doman. Even though the experment of the proposed algorthm s based on the DWT doman, t can be appled to all frequency domans such as DFT and DCT and so forth. The proposed algorthm n ths paper nserts watermarks n the frequency doman. Even though the experment of the proposed algorthm s based on the DWT doman, t can be appled to all frequency domans such as DFT and DCT and so forth. Embeddng steps are summarzed as follows. 1. Read the orgnal host audo sgnal on whch apply Dscrete Wavelet Transform based on dfferent levels. Next we wll get approxmate coeffcents of the host audo fle F { F1,..., F N }. 2. Use the selectve-key of a random number generator, whch wll guarantee the sum of dfference of the two patches to be more closed to zero. Then generate an ndex set I { I,..., I } 1 2 n 1 whose elements are pseudo-randomly selected nteger values from [ K1, K 2]. 1 K1 K2 N. Splt I nto two parts I 0 { I 1,..., I n } and I 1 { In 1,..., I 2 n}. 3. Defne A { a,..., a } { F,..., F } as the subset of F whose subscrpt corresponds to n I1 I n the element of I 0. Usng the same method, we wll get the smlar defnton for B { b,..., b } { F,..., F }, tll now we had got the TWO patches A and B. 1 n In 1 I2n 4. Calculate the dfference d between 1) f d 0, change a and 2) If d 0, change a and a and b, change the a a d b by equaton a and b base on b b d d :, and respectvely. a a d, andb b d respectvely. b by equaton 5. Apply Inverse Dscrete Wavelet Transform base on the same level as step1 to the modfed approxmate coeffcents and correspondng detal coeffcents to get the watermarked audo sgnals. Selectv-Key Usng the key to generate two ndex sets Orgnal Audo Sgnal DWT Approxmaton Coeffcents Usng the ndex sets to generate two patches Modfy each elements of the patches by addng or subtractng d IDWT Watermarked Audo Sgnal Fgure 1. The flowchart of embed watermark procedure 119

4 4. Detectng the watermarks Key-Selectve Patchwork Method for Audo Watermarkng Ch-Man Pun, Jng-Jng Jang Detectng the watermark 1. Read the audo sgnals to be detected, on whch apply Dscrete Wavelet Transform based on level three. Next we wll get approxmate coeffcents of the host audo ' ' ' sgnal F { F1,..., F N }. 2. Use the same Selectve-key of a random number generator, whch s used n step2 of watermark embed procedure. Then generate an ndex set I { I1,..., I2 n }, whose elements are nteger values pseudo-randomly selected from [ K1, K 2]. 1 K1 K2 N. Splt I nto two parts I 0 { I 1,..., I n } and I1 { In 1,..., I2n}. ' ' ' 3. Defne A { a,..., a } { F,..., F } as the subset of 1 n I1 I n ' F whose subscrpt corresponds to the element of I 0. Wth the same method, we wll get the smlar defnton ' ' ' ' for B { b,..., b } { F,..., F }, tll now we get the TWO patches A and B '. 1 n In 1 I2n ' ' ' ' 4. Calculate the mean value of dfferences d between A and B, d A B, f the mean value s greater than 2nd, the watermark s detected, otherwse the audo sgnal s not watermarked. Selectve-Key Usng the key to generate two ndex sets Audo Sgnal to be detected DWT Approxmaton Coeffcents Usng the ndex sets to generate two patches Calculate dfference between two patches Decde the watermark embedded or not 5. Expermental Results Fgure 2. The flowchart of detectng watermark procedure To test the robustness of the proposed watermarkng algorthm, many attacks were appled n ths algorthm. All audo sgnals to be tested were 16bts sgned stereo sampled at 44.1kHz. The type of audo samples been tested nclude Rock, Jazz, and Classcal. The sze of each patch was set as n = And the number of pars of the patches used was set as M = 100. In order to test the naudblty of the algorthm, we attempt dfferent values of d to embed the watermark to the audo sgnal. And the PSNR(Peak Sgnal Nose Rato), whch s used to verfy the naudblty of the watermarked sgnal, was calculated. Through several rounds tests, we found that gven the same d the PNSR value has nothng to do wth whch level of DWT s appled. The PSNR values are the functon of d, and ther relaton s shown as follow. Table 1. Varous PSNR values correspond to dfferent constant values used when embeddng PSNR

5 Internatonal Journal of Dgtal Content Technology and ts Applcatons Volume 4, Number 4, July 2010 Fgure 3. The relaton between d and PSNR In order to nspect the robustness of the algorthm aganst varous types of manpulatons, the followng types of sgnal processng were employed. 1) Down-samplng: The watermarked audo sgnals wth a samplng rate of 44.1kHz were reduced to 22.5kHz Table 2. Extract Rato after down-samplng attack based on varous levels of DWT and constant value d threshold Level1-ER 100% 100% 100% 100% 100% 100% 100% Level2-ER 100% 100% 100% 100% 100% 100% 100% Level3-ER 100% 100% 100% 100% 100% 100% 100% Key-Selectve-Level3-ER 100% 100% 100% 100% 100% 100% 100% 2) Hgh-pass flterng: The cut-off frequences were 800Hz. The second order Butterworth flter was appled. Table 3. Extract Rato after Hgh-pass flterng attack based on varous levels of DWT and constant value threshold Level1-ER 93% 92% 91% 88% 87% 83% 70% Level2-ER 93% 91% 90% 85% 83% 79% 64% Level3-ER 92% 90% 87% 81% 78% 72% 56% Key-Selectve-Level3-ER 94% 93% 92% 89% 87% 83% 81% 121

6 Key-Selectve Patchwork Method for Audo Watermarkng Ch-Man Pun, Jng-Jng Jang Fgure 4. The relaton between ER and d after Hgh-pass flterng attack, the compare ER between Key-selectve methods used and that dd not used 3) Low-pass flterng: the cut-off frequences were 8000Hz. The second order Butterworth flter was appled. Table 4. Extract Rato after low-pass flterng attack based on varous levels of DWT and constant value d threshold Level1-ER 82% 61% 43% 32% 20% 13% 3% Level2-ER 90% 87% 81% 75% 70% 66% 66% Level3-ER 100% 100% 100% 100% 100% 100% 100% Key-Selectve-Level3-ER 100% 100% 100% 100% 100% 100% 100% Fgure 5. The relaton between ER and d after Low-pass flterng attack, the compare ER between Key-selectve methods used and that dd not used 122

7 Internatonal Journal of Dgtal Content Technology and ts Applcatons Volume 4, Number 4, July ) Requantzaton: Requantze the audo sgnal from 16bts to 8bts. Table 5. Extract Rato after requantzaton attack based on varous levels of DWT and constant value d threshold Level1-ER 100% 100% 100% 100% 100% 100% 100% Level2-ER 100% 100% 100% 100% 100% 100% 100% Level3-ER 100% 100% 100% 100% 100% 100% 100% Key-SelectveLevel3-ER 100% 100% 100% 100% 100% 100% 100% 5) Mp3 compress: Compress the audo sgnal wth compresson rates of 32, 64, 96kbps. The expermental results are presented n Table 6 and Fgure 8-Fgure 10 Table 6. Extract Rato after mp3 compress attack based on varous levels of DWT and constant value d threshold Mp3-96kbps-ER 95% 95% 96% 97% 100% 100% 100% Mp3-64kbps-ER 86% 87% 87% 89% 90% 90% 91% Mp3-32kbps-ER 73% 74% 76% 76% 77% 78% 78% Key-Selectve-96-ER 95% 96% 97% 98% 100% 100% 100% Key-Selectve-64-ER 89% 90% 91% 91% 92% 93% 94% Key-Selectve-32-ER 78% 79% 81% 82% 82% 83% 84% Fgure 6. The relaton between ER and d after Mp3 attack wth compresson rate 96 kbps based on level3 DWT frequency doman, and the compare ER between Key-selectve methods used and that dd not used 123

8 Key-Selectve Patchwork Method for Audo Watermarkng Ch-Man Pun, Jng-Jng Jang Fgure 7. The relaton between ER and d after Mp3 attack wth compresson rate 64 kbps based on level3 DWT frequency doman, and the compare ER between Key-selectve methods used and that dd not used Fgure 8. The relaton between ER and d after Mp3 attack wth compresson rate 32 kbps based on level3 DWT frequency doman, the compare ER between Key-selectve methods used and that dd not used The expermental results from Fgure 3 are obvous that the larger the constant value used, the less PSNR values wll get, whch means that wth declne of constant value used for embeddng, the stronger naudblty of the watermarked audo sgnal wll acheved no matter whch level of DWT s appled. We can also easly get the nformaton from Table 2 and Table 5 that watermark s not affected by down-samplng, and requantzaton attacks n all three level of DWT, for the Extract Rato after these two attacks are always one hundred percent. The hgher energy the audo sgnal possesses, the greater mperceptblty tends to be acheved, even f the approxmaton coeffcents are been modfed. It s transparent that the relatvely low frequency 124

9 Internatonal Journal of Dgtal Content Technology and ts Applcatons Volume 4, Number 4, July 2010 components contan more sgnfcant nformaton about the dgtal sgnal, and the relatvely low frequency components seem to be more stable than the hgher one. So f the watermark nformaton s embedded n the relatvely lower frequency feld, the watermarkng algorthm wll be consdered as more robust one, for very lttle data loss occurs at lower frequency felds after varous attacks. So n ths proposed algorthm, the relatvely low frequency components are exploted to embed the watermarkng nformaton. The experment results n the Fgure 4 show that the less level of DWT s appled, more robustness wll be acheved when attacked by Hgh-pass flterng, gven the same embed constant value d. The fgures from Fgure 5 tell that the hgher level of DWT s exploted, the more robustness wll be offered when attacked by Low-pass flterng. From Fgure 6-8, t s evdent that ths proposed algorthm s robust aganst Mp3 compress attack. The hgher compresson rate used, the more robust wll be acheved. From Fgure 4-8, the compare n these fgures showed clearly that after the key-selectve methods used the robustness aganst all knd of attacks had been better mproved. 6. Concluson In ths paper, a selectve-key patchwork method for audo watermarkng has been proposed. Many methods have been appled. Frst, n order to enhance the robustness aganst all knds of attacks, a selectve-key patchwork method was exploted. Second, to guarantee the naudblty of the watermark, we calculate PSNR n ths algorthm. Thrd, by embeddng the watermark base on three dfferent levels of Dscrete Wavelet Transform, we found that t wll be more robust f embed the watermark nformaton base on hgher level of DWT. Fourth, for the relatvely lower frequency components are perceptually sgnfcant, these components are selected to embed the watermarkng to get more robustness feature of dgtal watermarkng. In addton, although the proposed method has been extensvely tested on many dfferent attacks such as flterng, resample and so on, more attacks such as tme shftng, croppng wth half left and so on should be tested and dscussed n the future work. 7. Acknowledgment The authors would lke to thank the referees for ther valuable comments. Ths work was supported n part by the Research Commttee of the Unversty of Macau. 8. References [1] Arnold, M., Audo watermarkng: features, applcatons and algorthms. Multmeda and Expo, ICME IEEE Internatonal Conference on, : p vol.2. [2] Hong, J.W.S.a.J.W., Audo watermarkng for copyrght protecton of dgtal audo data. Electron. Lett., : p [3] In-Kwon, Y. and K. Hyoung Joong. Modfed Patchwork Algorthm: a novel audo watermarkng scheme. n Informaton Technology: Codng and Computng, Proceedngs. Internatonal Conference on [4] ProceedngsM. Barn, I.J.C., and T. Kalker, Eds., Dgtal Watermarkng. 4th Internatonal Workshop, IWDW 2005, Sena, Italy, September 15-17, 2005, 2005: p [5] C. Cvej, A.K., and T. Seppanen, Audo watermarkng usng m-sequence and temporal maskng. 7th IEEEWorkshop Applcat. Sgnal Process. Audo Acoust., New York, 2001: p [6] M.D. Swanson, B.Z., A. H. Twefk, and L. Boney, Robust audo watermarkng usng perceptual maskng. Sgnal Process., : p [7] J. Seok, J.H., and J. Km, A novel audo watermarkng algorthm for copyrght protecton of dgtal audo. ETRI J., : p [8] Marchand, L.G.a.S., Watermarkng of speech sgnals usng the snusodal model and frequency modulaton of the partals. IEEE Int. Conf. Acoust., Speech, Sgnal Process, 2004: p [9] Ahad, N.K.K.a.S.M., Robust Multplcatve Patchwork Method for Audo Watermarkng,. IEEE Trans. Audo,Speech and Language Process, (6): p

10 Key-Selectve Patchwork Method for Audo Watermarkng Ch-Man Pun, Jng-Jng Jang [10] W. Bender, D.G., N. Mormoto, and A. Lu, Technques for data hdng. IBM Syst. J., (3/4): p

Hybrid Non-Blind Color Image Watermarking

Hybrid Non-Blind Color Image Watermarking Hybrd Non-Blnd Color Image Watermarkng Ms C.N.Sujatha 1, Dr. P. Satyanarayana 2 1 Assocate Professor, Dept. of ECE, SNIST, Yamnampet, Ghatkesar Hyderabad-501301, Telangana 2 Professor, Dept. of ECE, AITS,

More information

A Hybrid Semi-Blind Gray Scale Image Watermarking Algorithm Based on DWT-SVD using Human Visual System Model

A Hybrid Semi-Blind Gray Scale Image Watermarking Algorithm Based on DWT-SVD using Human Visual System Model A Hybrd Sem-Blnd Gray Scale Image Watermarkng Algorthm Based on DWT-SVD usng Human Vsual System Model Rajesh Mehta r Scence & Engneerng, USICT Guru Gobnd Sngh Indrarprastha Unversty New Delh, Inda rajesh00ust@gmal.com

More information

Enhanced Watermarking Technique for Color Images using Visual Cryptography

Enhanced Watermarking Technique for Color Images using Visual Cryptography Informaton Assurance and Securty Letters 1 (2010) 024-028 Enhanced Watermarkng Technque for Color Images usng Vsual Cryptography Enas F. Al rawashdeh 1, Rawan I.Zaghloul 2 1 Balqa Appled Unversty, MIS

More information

A NEW AUDIO WATERMARKING METHOD BASED

A NEW AUDIO WATERMARKING METHOD BASED A NEW AUDIO WATERMARKING METHOD BASED ON DISCRETE COSINE TRANSFORM WITH A GRAY IMAGE Mohammad Ibrahm Khan 1, Md. Iqbal Hasan Sarker 2, Kaushk Deb 3 and Md. Hasan Furhad 4 1,2,3 Department of Computer Scence

More information

Robust Blind Video Watermark Algorithm in Transform Domain Combining with 3D Video Correlation

Robust Blind Video Watermark Algorithm in Transform Domain Combining with 3D Video Correlation JOURNAL OF MULTIMEDIA, VOL. 8, NO. 2, APRIL 2013 161 Robust Blnd Vdeo Watermark Algorthm n Transform Doman Combnng wth 3D Vdeo Correlaton DING Ha-yang 1,3 1. Informaton Securty Center, Bejng Unversty of

More information

IMPLEMENTATION OF QIM BASED AUDIO WATERMARKING USING HYBRID TRANSFORM OF SWT-DCT-SVD METHODS OPTIMIZED WITH GENETIC ALORITHM

IMPLEMENTATION OF QIM BASED AUDIO WATERMARKING USING HYBRID TRANSFORM OF SWT-DCT-SVD METHODS OPTIMIZED WITH GENETIC ALORITHM IMPLEMENTATION OF QIM BASED AUDIO WATERMARKING USING HYBRID TRANSFORM OF SWT-DCT-SVD METHODS OPTIMIZED WITH GENETIC ALORITHM Ryan Amnullah 1, Gelar Budman 2, Irma Saftr 3 1, 2, 3 FakultasTeknk Elektro,

More information

A Fast Content-Based Multimedia Retrieval Technique Using Compressed Data

A Fast Content-Based Multimedia Retrieval Technique Using Compressed Data A Fast Content-Based Multmeda Retreval Technque Usng Compressed Data Borko Furht and Pornvt Saksobhavvat NSF Multmeda Laboratory Florda Atlantc Unversty, Boca Raton, Florda 3343 ABSTRACT In ths paper,

More information

Robust Watermarking for Text Images Based on Arnold Scrambling and DWT-DCT

Robust Watermarking for Text Images Based on Arnold Scrambling and DWT-DCT Internatonal Conference on Mechatroncs Electronc Industral and Control Engneerng (MEIC 015) Robust Watermarkng for Text Images Based on Arnold Scramblng and DWT-DCT Fan Wu College of Informaton Scence

More information

Improvement of Spatial Resolution Using BlockMatching Based Motion Estimation and Frame. Integration

Improvement of Spatial Resolution Using BlockMatching Based Motion Estimation and Frame. Integration Improvement of Spatal Resoluton Usng BlockMatchng Based Moton Estmaton and Frame Integraton Danya Suga and Takayuk Hamamoto Graduate School of Engneerng, Tokyo Unversty of Scence, 6-3-1, Nuku, Katsuska-ku,

More information

Robust Video Watermarking Using Image Normalization, Motion Vector and Perceptual Information

Robust Video Watermarking Using Image Normalization, Motion Vector and Perceptual Information Robust Vdeo Watermarkng Usng Image ormalzaton, Moton Vector and Perceptual Informaton Cedllo-Hernández Antono 1, Cedllo-Hernández Manuel 1, akano-myatake Marko 1, García-Vázquez Mreya S. 2 1 Postgraduate

More information

Research Article High Capacity Reversible Watermarking for Audio by Histogram Shifting and Predicted Error Expansion

Research Article High Capacity Reversible Watermarking for Audio by Histogram Shifting and Predicted Error Expansion e Scentfc World Journal, Artcle ID 656251, 7 pages http://dx.do.org/1.1155/214/656251 Research Artcle Hgh Capacty Reversble Watermarkng for Audo by Hstogram Shftng and Predcted Error Expanson Fe Wang,

More information

Semi-Fragile Watermarking Scheme for Authentication of JPEG Images

Semi-Fragile Watermarking Scheme for Authentication of JPEG Images Tamkang Journal of Scence and Engneerng, Vol. 10, No 1, pp. 5766 (2007) 57 Sem-Fragle Watermarkng Scheme for Authentcaton of JPEG Images Chh-Hung n 1 *, Tung-Shh Su 2 and Wen-Shyong Hseh 2,3 1 Department

More information

Content Based Image Retrieval Using 2-D Discrete Wavelet with Texture Feature with Different Classifiers

Content Based Image Retrieval Using 2-D Discrete Wavelet with Texture Feature with Different Classifiers IOSR Journal of Electroncs and Communcaton Engneerng (IOSR-JECE) e-issn: 78-834,p- ISSN: 78-8735.Volume 9, Issue, Ver. IV (Mar - Apr. 04), PP 0-07 Content Based Image Retreval Usng -D Dscrete Wavelet wth

More information

An Optimal Algorithm for Prufer Codes *

An Optimal Algorithm for Prufer Codes * J. Software Engneerng & Applcatons, 2009, 2: 111-115 do:10.4236/jsea.2009.22016 Publshed Onlne July 2009 (www.scrp.org/journal/jsea) An Optmal Algorthm for Prufer Codes * Xaodong Wang 1, 2, Le Wang 3,

More information

A Binarization Algorithm specialized on Document Images and Photos

A Binarization Algorithm specialized on Document Images and Photos A Bnarzaton Algorthm specalzed on Document mages and Photos Ergna Kavalleratou Dept. of nformaton and Communcaton Systems Engneerng Unversty of the Aegean kavalleratou@aegean.gr Abstract n ths paper, a

More information

KEYWORDS: Digital Image Watermarking, Discrete Wavelet Transform, General Regression Neural Network, Human Visual System. 1.

KEYWORDS: Digital Image Watermarking, Discrete Wavelet Transform, General Regression Neural Network, Human Visual System. 1. An Adaptve Dgtal Image Watermarkng Based on Image Features n Dscrete Wavelet Transform Doman and General Regresson Neural Network Ayoub Taher Group of IT Engneerng, Payam Noor Unversty, Broujen, Iran ABSTRACT:

More information

A Comparison between Digital Images Watermarking in Tow Different Color Spaces Using DWT2*

A Comparison between Digital Images Watermarking in Tow Different Color Spaces Using DWT2* A Comparson between Dgtal s ng n Tow Dfferent Color Spaces Usng DWT* Mehd Khall Natonal Academy of Scence of Armena Yerevan, Armena e-mal: khall.mehd@yahoo.com ABSTRACT A novel dgtal watermarkng for ownershp

More information

Performance Analysis of Data Hiding in MPEG-4 AAC Audio *

Performance Analysis of Data Hiding in MPEG-4 AAC Audio * TSINGHUA SCIENCE AND TECHNOLOGY ISSNll1007-0214ll07/21llpp55-61 Volume 14, Number 1, February 2009 Performance Analyss of Data Hdng n MPEG-4 AAC Audo * XU Shuzheng ( ) **, ZHANG Peng ( ), WANG Pengjun

More information

Digital Video Watermarking using Discrete Wavelet Transform and Principal Component Analysis

Digital Video Watermarking using Discrete Wavelet Transform and Principal Component Analysis Internatonal Journal of Wsdom Based Computng, Vol. 1 (2), August 2011 7 Dgtal Vdeo Watermarkng usng Dscrete Wavelet Transform and Prncpal Component Analyss Sanjana Snha, Prajnat Bardhan, Swarnal Pramanck,

More information

High-Boost Mesh Filtering for 3-D Shape Enhancement

High-Boost Mesh Filtering for 3-D Shape Enhancement Hgh-Boost Mesh Flterng for 3-D Shape Enhancement Hrokazu Yagou Λ Alexander Belyaev y Damng We z Λ y z ; ; Shape Modelng Laboratory, Unversty of Azu, Azu-Wakamatsu 965-8580 Japan y Computer Graphcs Group,

More information

Identify the Attack in Embedded Image with Steganalysis Detection Method by PSNR and RGB Intensity

Identify the Attack in Embedded Image with Steganalysis Detection Method by PSNR and RGB Intensity Internatonal Journal of Computer Systems (ISSN: 394-1065), Volume 03 Issue 07, July, 016 Avalable at http://www.jcsonlne.com/ Identfy the Attack n Embedded Image wth Steganalyss Detecton Method by PSNR

More information

A Fast Visual Tracking Algorithm Based on Circle Pixels Matching

A Fast Visual Tracking Algorithm Based on Circle Pixels Matching A Fast Vsual Trackng Algorthm Based on Crcle Pxels Matchng Zhqang Hou hou_zhq@sohu.com Chongzhao Han czhan@mal.xjtu.edu.cn Ln Zheng Abstract: A fast vsual trackng algorthm based on crcle pxels matchng

More information

Parallelism for Nested Loops with Non-uniform and Flow Dependences

Parallelism for Nested Loops with Non-uniform and Flow Dependences Parallelsm for Nested Loops wth Non-unform and Flow Dependences Sam-Jn Jeong Dept. of Informaton & Communcaton Engneerng, Cheonan Unversty, 5, Anseo-dong, Cheonan, Chungnam, 330-80, Korea. seong@cheonan.ac.kr

More information

Using Counter-propagation Neural Network for Digital Audio Watermarking

Using Counter-propagation Neural Network for Digital Audio Watermarking Usng Counter-propagaton Neural Network for Dgtal Audo Watermarkng Chuan-Yu Chang and Wen-Chh Shen Graduate School of Computer Scence and Informaton Engneerng Natonal Yunln Unversty of Scence & Technology

More information

A Robust Webpage Information Hiding Method Based on the Slash of Tag

A Robust Webpage Information Hiding Method Based on the Slash of Tag Advanced Engneerng Forum Onlne: 2012-09-26 ISSN: 2234-991X, Vols. 6-7, pp 361-366 do:10.4028/www.scentfc.net/aef.6-7.361 2012 Trans Tech Publcatons, Swtzerland A Robust Webpage Informaton Hdng Method Based

More information

A Hybrid Digital Image Watermarking based on Discrete Wavelet Transform, Discrete Cosine Transform, and General Regression Neural Network

A Hybrid Digital Image Watermarking based on Discrete Wavelet Transform, Discrete Cosine Transform, and General Regression Neural Network A Hybrd Dgtal Image Watermarkng based on Dscrete Wavelet Transform, Dscrete Cosne Transform, and General Regresson Neural Network Ayoub Taher ; ABSTRACT In ths paper, a new hybrd dgtal watermarkng technque

More information

High Payload Reversible Data Hiding Scheme Using Difference Segmentation and Histogram Shifting

High Payload Reversible Data Hiding Scheme Using Difference Segmentation and Histogram Shifting JOURNAL OF ELECTRONIC SCIENCE AND TECHNOLOGY, VOL. 11, NO. 1, MARCH 2013 9 Hgh Payload Reversble Data Hdng Scheme Usng Dfference Segmentaton and Hstogram Shftng Yung-Chen Chou and Huang-Chng L Abstract

More information

A Lossless Watermarking Scheme for Halftone Image Authentication

A Lossless Watermarking Scheme for Halftone Image Authentication IJCSNS Internatonal Journal of Computer Scence and Network Securty, VOL.6 No.2B, February 2006 147 A Lossless Watermarkng Scheme for Halftone Image Authentcaton Jeng-Shyang Pan, Hao Luo, and Zhe-Mng Lu,

More information

IAJIT First Online Publication

IAJIT First Online Publication Content Protecton n Vdeo Data Based on Robust Dgtal Watermarkng Resstant to Intentonal and Unntentonal Attacks Mad Masoum and Shervn Amr Department of Electrcal Engneerng, Islamc Azad Unversty Qazvn Branch,

More information

The Codesign Challenge

The Codesign Challenge ECE 4530 Codesgn Challenge Fall 2007 Hardware/Software Codesgn The Codesgn Challenge Objectves In the codesgn challenge, your task s to accelerate a gven software reference mplementaton as fast as possble.

More information

Information Hiding Watermarking Detection Technique by PSNR and RGB Intensity

Information Hiding Watermarking Detection Technique by PSNR and RGB Intensity www..org 3 Informaton Hdng Watermarkng Detecton Technque by PSNR and RGB Intensty 1 Neha Chauhan, Akhlesh A. Waoo, 3 P. S. Patheja 1 Research Scholar, BIST, Bhopal, Inda.,3 Assstant Professor, BIST, Bhopal,

More information

Enhanced AMBTC for Image Compression using Block Classification and Interpolation

Enhanced AMBTC for Image Compression using Block Classification and Interpolation Internatonal Journal of Computer Applcatons (0975 8887) Volume 5 No.0, August 0 Enhanced AMBTC for Image Compresson usng Block Classfcaton and Interpolaton S. Vmala Dept. of Comp. Scence Mother Teresa

More information

Adaptive digital watermarking of images using Genetic Algorithm

Adaptive digital watermarking of images using Genetic Algorithm Adaptve dgtal watermarkng of mages usng Genetc Algorthm Bushra Skander, Muhammad Ishtaq, M. Arfan Jaffar, Muhammad Tarq, Anwar M. Mrza Department of Computer Scence, Natonal Unversty of Computer and Emergng

More information

Cluster Analysis of Electrical Behavior

Cluster Analysis of Electrical Behavior Journal of Computer and Communcatons, 205, 3, 88-93 Publshed Onlne May 205 n ScRes. http://www.scrp.org/ournal/cc http://dx.do.org/0.4236/cc.205.350 Cluster Analyss of Electrcal Behavor Ln Lu Ln Lu, School

More information

Complex Numbers. Now we also saw that if a and b were both positive then ab = a b. For a second let s forget that restriction and do the following.

Complex Numbers. Now we also saw that if a and b were both positive then ab = a b. For a second let s forget that restriction and do the following. Complex Numbers The last topc n ths secton s not really related to most of what we ve done n ths chapter, although t s somewhat related to the radcals secton as we wll see. We also won t need the materal

More information

An Image Compression Algorithm based on Wavelet Transform and LZW

An Image Compression Algorithm based on Wavelet Transform and LZW An Image Compresson Algorthm based on Wavelet Transform and LZW Png Luo a, Janyong Yu b School of Chongqng Unversty of Posts and Telecommuncatons, Chongqng, 400065, Chna Abstract a cylpng@63.com, b y27769864@sna.cn

More information

Data Hiding and Image Authentication for Color-Palette Images

Data Hiding and Image Authentication for Color-Palette Images Data Hdng and Image Authentcaton for Color-Palette Images Chh-Yang Yn ( 殷志揚 ) and Wen-Hsang Tsa ( 蔡文祥 ) Department of Computer & Informaton Scence Natonal Chao Tung Unversty 00 Ta Hsueh Rd., Hsnchu, Tawan

More information

Shape-adaptive DCT and Its Application in Region-based Image Coding

Shape-adaptive DCT and Its Application in Region-based Image Coding Internatonal Journal of Sgnal Processng, Image Processng and Pattern Recognton, pp.99-108 http://dx.do.org/10.14257/sp.2014.7.1.10 Shape-adaptve DCT and Its Applcaton n Regon-based Image Codng Yamn Zheng,

More information

An Image Fusion Approach Based on Segmentation Region

An Image Fusion Approach Based on Segmentation Region Rong Wang, L-Qun Gao, Shu Yang, Yu-Hua Cha, and Yan-Chun Lu An Image Fuson Approach Based On Segmentaton Regon An Image Fuson Approach Based on Segmentaton Regon Rong Wang, L-Qun Gao, Shu Yang 3, Yu-Hua

More information

Steganography System using Slantlet Transform

Steganography System using Slantlet Transform ISSN:43-6999 Journal of Inmaton Communcaton and Intellgence Systems (JICIS) Volume Issue February 06 Steganography System usng Slantlet Transm Ryadh Bassl Abduljabbar Abstract An approach hdng nmaton has

More information

A Modified Median Filter for the Removal of Impulse Noise Based on the Support Vector Machines

A Modified Median Filter for the Removal of Impulse Noise Based on the Support Vector Machines A Modfed Medan Flter for the Removal of Impulse Nose Based on the Support Vector Machnes H. GOMEZ-MORENO, S. MALDONADO-BASCON, F. LOPEZ-FERRERAS, M. UTRILLA- MANSO AND P. GIL-JIMENEZ Departamento de Teoría

More information

UB at GeoCLEF Department of Geography Abstract

UB at GeoCLEF Department of Geography   Abstract UB at GeoCLEF 2006 Mguel E. Ruz (1), Stuart Shapro (2), June Abbas (1), Slva B. Southwck (1) and Davd Mark (3) State Unversty of New York at Buffalo (1) Department of Lbrary and Informaton Studes (2) Department

More information

Problem Definitions and Evaluation Criteria for Computational Expensive Optimization

Problem Definitions and Evaluation Criteria for Computational Expensive Optimization Problem efntons and Evaluaton Crtera for Computatonal Expensve Optmzaton B. Lu 1, Q. Chen and Q. Zhang 3, J. J. Lang 4, P. N. Suganthan, B. Y. Qu 6 1 epartment of Computng, Glyndwr Unversty, UK Faclty

More information

Vectorization of Image Outlines Using Rational Spline and Genetic Algorithm

Vectorization of Image Outlines Using Rational Spline and Genetic Algorithm 01 Internatonal Conference on Image, Vson and Computng (ICIVC 01) IPCSIT vol. 50 (01) (01) IACSIT Press, Sngapore DOI: 10.776/IPCSIT.01.V50.4 Vectorzaton of Image Outlnes Usng Ratonal Splne and Genetc

More information

Available online at Available online at Advanced in Control Engineering and Information Science

Available online at   Available online at   Advanced in Control Engineering and Information Science Avalable onlne at wwwscencedrectcom Avalable onlne at wwwscencedrectcom Proceda Proceda Engneerng Engneerng 00 (2011) 15000 000 (2011) 1642 1646 Proceda Engneerng wwwelsevercom/locate/proceda Advanced

More information

Learning-Based Top-N Selection Query Evaluation over Relational Databases

Learning-Based Top-N Selection Query Evaluation over Relational Databases Learnng-Based Top-N Selecton Query Evaluaton over Relatonal Databases Lang Zhu *, Wey Meng ** * School of Mathematcs and Computer Scence, Hebe Unversty, Baodng, Hebe 071002, Chna, zhu@mal.hbu.edu.cn **

More information

Geometrically Invariant Watermarking Scheme Based on Local Feature Points

Geometrically Invariant Watermarking Scheme Based on Local Feature Points JOURNAL OF MULTIMEDIA, VOL. 7, NO. 3, JUNE 0 3 Geometrcally Invarant Watermarkng Scheme Based on Local Feature Ponts L Jng School of Computer and Informaton Engneerng, Henan Unversty of Economcs and Law,

More information

Related-Mode Attacks on CTR Encryption Mode

Related-Mode Attacks on CTR Encryption Mode Internatonal Journal of Network Securty, Vol.4, No.3, PP.282 287, May 2007 282 Related-Mode Attacks on CTR Encrypton Mode Dayn Wang, Dongda Ln, and Wenlng Wu (Correspondng author: Dayn Wang) Key Laboratory

More information

Problem Set 3 Solutions

Problem Set 3 Solutions Introducton to Algorthms October 4, 2002 Massachusetts Insttute of Technology 6046J/18410J Professors Erk Demane and Shaf Goldwasser Handout 14 Problem Set 3 Solutons (Exercses were not to be turned n,

More information

Robust and Reversible Relational Database Watermarking Algorithm Based on Clustering and Polar Angle Expansion

Robust and Reversible Relational Database Watermarking Algorithm Based on Clustering and Polar Angle Expansion Robust and Reversble Relatonal Database Watermarkng Algorthm Based on Clusterng and Polar Angle Expanson Zhyong L, Junmn Lu and Wecheng Tao College of Informaton Scence and Engneerng, Hunan Unversty, Changsha,

More information

Mathematics 256 a course in differential equations for engineering students

Mathematics 256 a course in differential equations for engineering students Mathematcs 56 a course n dfferental equatons for engneerng students Chapter 5. More effcent methods of numercal soluton Euler s method s qute neffcent. Because the error s essentally proportonal to the

More information

A NOTE ON FUZZY CLOSURE OF A FUZZY SET

A NOTE ON FUZZY CLOSURE OF A FUZZY SET (JPMNT) Journal of Process Management New Technologes, Internatonal A NOTE ON FUZZY CLOSURE OF A FUZZY SET Bhmraj Basumatary Department of Mathematcal Scences, Bodoland Unversty, Kokrajhar, Assam, Inda,

More information

A Secured Method for Image Steganography Based On Pixel Values

A Secured Method for Image Steganography Based On Pixel Values A Secured Method for Image Steganography Based On Pxel Values Tarun Gulat #, Sanskrt Gupta * # Assocate Professor, Electroncs and Communcaton Engneerng Department, MMEC, M.M.U., Mullana, Ambala, Haryana,

More information

Quantization Noise Power Injection In Subband Audio Coding Using Low Selectivity Filter Banks

Quantization Noise Power Injection In Subband Audio Coding Using Low Selectivity Filter Banks Quantzaton Nose Power Injecton In Subband Audo Codng Usng Low Selectvty Flter Banks D. ARTÍNEZ -UÑOZ, N. RUIZ-REYES, P. VERA-CANDEAS, P.J. RECHE-LÓPEZ, J. CURPIÁN-ALONSO Departamento de Electrónca Unversdad

More information

Term Weighting Classification System Using the Chi-square Statistic for the Classification Subtask at NTCIR-6 Patent Retrieval Task

Term Weighting Classification System Using the Chi-square Statistic for the Classification Subtask at NTCIR-6 Patent Retrieval Task Proceedngs of NTCIR-6 Workshop Meetng, May 15-18, 2007, Tokyo, Japan Term Weghtng Classfcaton System Usng the Ch-square Statstc for the Classfcaton Subtask at NTCIR-6 Patent Retreval Task Kotaro Hashmoto

More information

Non-Split Restrained Dominating Set of an Interval Graph Using an Algorithm

Non-Split Restrained Dominating Set of an Interval Graph Using an Algorithm Internatonal Journal of Advancements n Research & Technology, Volume, Issue, July- ISS - on-splt Restraned Domnatng Set of an Interval Graph Usng an Algorthm ABSTRACT Dr.A.Sudhakaraah *, E. Gnana Deepka,

More information

Tsinghua University at TAC 2009: Summarizing Multi-documents by Information Distance

Tsinghua University at TAC 2009: Summarizing Multi-documents by Information Distance Tsnghua Unversty at TAC 2009: Summarzng Mult-documents by Informaton Dstance Chong Long, Mnle Huang, Xaoyan Zhu State Key Laboratory of Intellgent Technology and Systems, Tsnghua Natonal Laboratory for

More information

Sum of Linear and Fractional Multiobjective Programming Problem under Fuzzy Rules Constraints

Sum of Linear and Fractional Multiobjective Programming Problem under Fuzzy Rules Constraints Australan Journal of Basc and Appled Scences, 2(4): 1204-1208, 2008 ISSN 1991-8178 Sum of Lnear and Fractonal Multobjectve Programmng Problem under Fuzzy Rules Constrants 1 2 Sanjay Jan and Kalash Lachhwan

More information

BioTechnology. An Indian Journal FULL PAPER. Trade Science Inc.

BioTechnology. An Indian Journal FULL PAPER. Trade Science Inc. [Type text] [Type text] [Type text] ISSN : 0974-74 Volume 0 Issue BoTechnology 04 An Indan Journal FULL PAPER BTAIJ 0() 04 [684-689] Revew on Chna s sports ndustry fnancng market based on market -orented

More information

Scheduling Remote Access to Scientific Instruments in Cyberinfrastructure for Education and Research

Scheduling Remote Access to Scientific Instruments in Cyberinfrastructure for Education and Research Schedulng Remote Access to Scentfc Instruments n Cybernfrastructure for Educaton and Research Je Yn 1, Junwe Cao 2,3,*, Yuexuan Wang 4, Lanchen Lu 1,3 and Cheng Wu 1,3 1 Natonal CIMS Engneerng and Research

More information

Virtual Machine Migration based on Trust Measurement of Computer Node

Virtual Machine Migration based on Trust Measurement of Computer Node Appled Mechancs and Materals Onlne: 2014-04-04 ISSN: 1662-7482, Vols. 536-537, pp 678-682 do:10.4028/www.scentfc.net/amm.536-537.678 2014 Trans Tech Publcatons, Swtzerland Vrtual Machne Mgraton based on

More information

Research of Multiple Text Watermarks Technique in Electric Power System Texts

Research of Multiple Text Watermarks Technique in Electric Power System Texts Sensors & Transducers 203 by IFSA http://www.sensorsportal.com Research of Multple Text atermarks Technque n Electrc Power System Texts Xao-X XING, Qng CHEN, 2 Lan-X FU School of Optcal-Electrcal and Computer

More information

R s s f. m y s. SPH3UW Unit 7.3 Spherical Concave Mirrors Page 1 of 12. Notes

R s s f. m y s. SPH3UW Unit 7.3 Spherical Concave Mirrors Page 1 of 12. Notes SPH3UW Unt 7.3 Sphercal Concave Mrrors Page 1 of 1 Notes Physcs Tool box Concave Mrror If the reflectng surface takes place on the nner surface of the sphercal shape so that the centre of the mrror bulges

More information

A New Approach For the Ranking of Fuzzy Sets With Different Heights

A New Approach For the Ranking of Fuzzy Sets With Different Heights New pproach For the ankng of Fuzzy Sets Wth Dfferent Heghts Pushpnder Sngh School of Mathematcs Computer pplcatons Thapar Unversty, Patala-7 00 Inda pushpndersnl@gmalcom STCT ankng of fuzzy sets plays

More information

A FIBONACCI LSB DATA HIDING TECNIQUE

A FIBONACCI LSB DATA HIDING TECNIQUE A FIBONACCI LSB DATA HIDING TECNIQUE Dego De Luca Pcone (*)(**), Federca Battst (*)(**), Marco Carl (*), Jaakko Astola (**), and Karen Egazaran (**) (*) AE Department, Unverst of Roma TRE, Rome, Ital,

More information

Meta-heuristics for Multidimensional Knapsack Problems

Meta-heuristics for Multidimensional Knapsack Problems 2012 4th Internatonal Conference on Computer Research and Development IPCSIT vol.39 (2012) (2012) IACSIT Press, Sngapore Meta-heurstcs for Multdmensonal Knapsack Problems Zhbao Man + Computer Scence Department,

More information

The Research of Ellipse Parameter Fitting Algorithm of Ultrasonic Imaging Logging in the Casing Hole

The Research of Ellipse Parameter Fitting Algorithm of Ultrasonic Imaging Logging in the Casing Hole Appled Mathematcs, 04, 5, 37-3 Publshed Onlne May 04 n ScRes. http://www.scrp.org/journal/am http://dx.do.org/0.436/am.04.584 The Research of Ellpse Parameter Fttng Algorthm of Ultrasonc Imagng Loggng

More information

Deep learning is a good steganalysis tool when embedding key is reused for different images, even if there is a cover source-mismatch

Deep learning is a good steganalysis tool when embedding key is reused for different images, even if there is a cover source-mismatch Deep learnng s a good steganalyss tool when embeddng key s reused for dfferent mages, even f there s a cover source-msmatch Lonel PIBRE 2,3, Jérôme PASQUET 2,3, Dno IENCO 2,3, Marc CHAUMONT 1,2,3 (1) Unversty

More information

CLASSIFICATION OF ULTRASONIC SIGNALS

CLASSIFICATION OF ULTRASONIC SIGNALS The 8 th Internatonal Conference of the Slovenan Socety for Non-Destructve Testng»Applcaton of Contemporary Non-Destructve Testng n Engneerng«September -3, 5, Portorož, Slovena, pp. 7-33 CLASSIFICATION

More information

X- Chart Using ANOM Approach

X- Chart Using ANOM Approach ISSN 1684-8403 Journal of Statstcs Volume 17, 010, pp. 3-3 Abstract X- Chart Usng ANOM Approach Gullapall Chakravarth 1 and Chaluvad Venkateswara Rao Control lmts for ndvdual measurements (X) chart are

More information

Modular PCA Face Recognition Based on Weighted Average

Modular PCA Face Recognition Based on Weighted Average odern Appled Scence odular PCA Face Recognton Based on Weghted Average Chengmao Han (Correspondng author) Department of athematcs, Lny Normal Unversty Lny 76005, Chna E-mal: hanchengmao@163.com Abstract

More information

For instance, ; the five basic number-sets are increasingly more n A B & B A A = B (1)

For instance, ; the five basic number-sets are increasingly more n A B & B A A = B (1) Secton 1.2 Subsets and the Boolean operatons on sets If every element of the set A s an element of the set B, we say that A s a subset of B, or that A s contaned n B, or that B contans A, and we wrte A

More information

Dynamic Code Block Size for JPEG 2000

Dynamic Code Block Size for JPEG 2000 Dynamc Code Block Sze for JPEG 2000 Png-Sng Tsa a, Yann LeCornec b a Dept. of Computer Scence, Unv. of Texas Pan Amercan, 1201 W. Unv. Dr., Ednburg, TX USA 78539-2999; b Sgma Desgns, Inc., 1778 McCarthy

More information

Edge Detection in Noisy Images Using the Support Vector Machines

Edge Detection in Noisy Images Using the Support Vector Machines Edge Detecton n Nosy Images Usng the Support Vector Machnes Hlaro Gómez-Moreno, Saturnno Maldonado-Bascón, Francsco López-Ferreras Sgnal Theory and Communcatons Department. Unversty of Alcalá Crta. Madrd-Barcelona

More information

Coding Artifact Reduction Using Edge Map Guided Adaptive and Fuzzy Filter

Coding Artifact Reduction Using Edge Map Guided Adaptive and Fuzzy Filter MEL A MITSUBISHI ELECTIC ESEACH LABOATOY http://www.merl.com Codng Artfact educton Usng Edge Map Guded Adaptve and Fuzzy Flter Hao-Song Kong Yao Ne Anthony Vetro Hufang Sun Kenneth E. Barner T-2004-056

More information

Audio Content Classification Method Research Based on Two-step Strategy

Audio Content Classification Method Research Based on Two-step Strategy (IJACSA) Internatonal Journal of Advanced Computer Scence and Applcatons, Audo Content Classfcaton Method Research Based on Two-step Strategy Sume Lang Department of Computer Scence and Technology Chongqng

More information

Optimal Workload-based Weighted Wavelet Synopses

Optimal Workload-based Weighted Wavelet Synopses Optmal Workload-based Weghted Wavelet Synopses Yoss Matas School of Computer Scence Tel Avv Unversty Tel Avv 69978, Israel matas@tau.ac.l Danel Urel School of Computer Scence Tel Avv Unversty Tel Avv 69978,

More information

Discrete Cosine Transform Optimization in Image Compression Based on Genetic Algorithm

Discrete Cosine Transform Optimization in Image Compression Based on Genetic Algorithm 015 8th Internatonal Congress on Image and Sgnal Processng (CISP 015) Dscrete Cosne Transform Optmzaton n Image Compresson Based on Genetc Algorthm LIU Yuan-yuan 1 CHE He-xn 1 College of Communcaton Engneerng,

More information

Learning the Kernel Parameters in Kernel Minimum Distance Classifier

Learning the Kernel Parameters in Kernel Minimum Distance Classifier Learnng the Kernel Parameters n Kernel Mnmum Dstance Classfer Daoqang Zhang 1,, Songcan Chen and Zh-Hua Zhou 1* 1 Natonal Laboratory for Novel Software Technology Nanjng Unversty, Nanjng 193, Chna Department

More information

Detecting MP3Stego using Calibrated Side Information Features

Detecting MP3Stego using Calibrated Side Information Features 2628 JOURNAL OF SOFTWARE, VOL. 8, NO. 10, OCTOBER 2013 Detectng P3Stego usng Calbrated Sde Informaton Features Xanmn Yu School of Informaton Scence and Engneerng, Nngbo Unversty Emal: mlhappy1016@163.com

More information

Helsinki University Of Technology, Systems Analysis Laboratory Mat Independent research projects in applied mathematics (3 cr)

Helsinki University Of Technology, Systems Analysis Laboratory Mat Independent research projects in applied mathematics (3 cr) Helsnk Unversty Of Technology, Systems Analyss Laboratory Mat-2.08 Independent research projects n appled mathematcs (3 cr) "! #$&% Antt Laukkanen 506 R ajlaukka@cc.hut.f 2 Introducton...3 2 Multattrbute

More information

Mining User Similarity Using Spatial-temporal Intersection

Mining User Similarity Using Spatial-temporal Intersection www.ijcsi.org 215 Mnng User Smlarty Usng Spatal-temporal Intersecton Ymn Wang 1, Rumn Hu 1, Wenhua Huang 1 and Jun Chen 1 1 Natonal Engneerng Research Center for Multmeda Software, School of Computer,

More information

Simulation Based Analysis of FAST TCP using OMNET++

Simulation Based Analysis of FAST TCP using OMNET++ Smulaton Based Analyss of FAST TCP usng OMNET++ Umar ul Hassan 04030038@lums.edu.pk Md Term Report CS678 Topcs n Internet Research Sprng, 2006 Introducton Internet traffc s doublng roughly every 3 months

More information

TN348: Openlab Module - Colocalization

TN348: Openlab Module - Colocalization TN348: Openlab Module - Colocalzaton Topc The Colocalzaton module provdes the faclty to vsualze and quantfy colocalzaton between pars of mages. The Colocalzaton wndow contans a prevew of the two mages

More information

Article Reversible Dual-Image-Based Hiding Scheme Using Block Folding Technique

Article Reversible Dual-Image-Based Hiding Scheme Using Block Folding Technique Artcle Reversble Dual-Image-Based Hdng Scheme Usng Block Foldng Technque Tzu-Chuen Lu, * and Hu-Shh Leng Department of Informaton Management, Chaoyang Unversty of Technology, Tachung 4349, Tawan Department

More information

Can We Beat the Prefix Filtering? An Adaptive Framework for Similarity Join and Search

Can We Beat the Prefix Filtering? An Adaptive Framework for Similarity Join and Search Can We Beat the Prefx Flterng? An Adaptve Framework for Smlarty Jon and Search Jannan Wang Guolang L Janhua Feng Department of Computer Scence and Technology, Tsnghua Natonal Laboratory for Informaton

More information

FINDING IMPORTANT NODES IN SOCIAL NETWORKS BASED ON MODIFIED PAGERANK

FINDING IMPORTANT NODES IN SOCIAL NETWORKS BASED ON MODIFIED PAGERANK FINDING IMPORTANT NODES IN SOCIAL NETWORKS BASED ON MODIFIED PAGERANK L-qng Qu, Yong-quan Lang 2, Jng-Chen 3, 2 College of Informaton Scence and Technology, Shandong Unversty of Scence and Technology,

More information

Query Clustering Using a Hybrid Query Similarity Measure

Query Clustering Using a Hybrid Query Similarity Measure Query clusterng usng a hybrd query smlarty measure Fu. L., Goh, D.H., & Foo, S. (2004). WSEAS Transacton on Computers, 3(3), 700-705. Query Clusterng Usng a Hybrd Query Smlarty Measure Ln Fu, Don Hoe-Lan

More information

Reducing Frame Rate for Object Tracking

Reducing Frame Rate for Object Tracking Reducng Frame Rate for Object Trackng Pavel Korshunov 1 and We Tsang Oo 2 1 Natonal Unversty of Sngapore, Sngapore 11977, pavelkor@comp.nus.edu.sg 2 Natonal Unversty of Sngapore, Sngapore 11977, oowt@comp.nus.edu.sg

More information

Convolutional interleaver for unequal error protection of turbo codes

Convolutional interleaver for unequal error protection of turbo codes Convolutonal nterleaver for unequal error protecton of turbo codes Sna Vaf, Tadeusz Wysock, Ian Burnett Unversty of Wollongong, SW 2522, Australa E-mal:{sv39,wysock,an_burnett}@uow.edu.au Abstract: Ths

More information

Positive Semi-definite Programming Localization in Wireless Sensor Networks

Positive Semi-definite Programming Localization in Wireless Sensor Networks Postve Sem-defnte Programmng Localzaton n Wreless Sensor etworks Shengdong Xe 1,, Jn Wang, Aqun Hu 1, Yunl Gu, Jang Xu, 1 School of Informaton Scence and Engneerng, Southeast Unversty, 10096, anjng Computer

More information

Grading Image Retrieval Based on DCT and DWT Compressed Domains Using Low-Level Features

Grading Image Retrieval Based on DCT and DWT Compressed Domains Using Low-Level Features Journal of Communcatons Vol. 0 No. January 0 Gradng Image Retreval Based on DCT and DWT Compressed Domans Usng Low-Level Features Chengyou Wang Xnyue Zhang Rongyang Shan and Xao Zhou School of echancal

More information

Solving two-person zero-sum game by Matlab

Solving two-person zero-sum game by Matlab Appled Mechancs and Materals Onlne: 2011-02-02 ISSN: 1662-7482, Vols. 50-51, pp 262-265 do:10.4028/www.scentfc.net/amm.50-51.262 2011 Trans Tech Publcatons, Swtzerland Solvng two-person zero-sum game by

More information

Wishing you all a Total Quality New Year!

Wishing you all a Total Quality New Year! Total Qualty Management and Sx Sgma Post Graduate Program 214-15 Sesson 4 Vnay Kumar Kalakband Assstant Professor Operatons & Systems Area 1 Wshng you all a Total Qualty New Year! Hope you acheve Sx sgma

More information

Local Quaternary Patterns and Feature Local Quaternary Patterns

Local Quaternary Patterns and Feature Local Quaternary Patterns Local Quaternary Patterns and Feature Local Quaternary Patterns Jayu Gu and Chengjun Lu The Department of Computer Scence, New Jersey Insttute of Technology, Newark, NJ 0102, USA Abstract - Ths paper presents

More information

A New Feature of Uniformity of Image Texture Directions Coinciding with the Human Eyes Perception 1

A New Feature of Uniformity of Image Texture Directions Coinciding with the Human Eyes Perception 1 A New Feature of Unformty of Image Texture Drectons Concdng wth the Human Eyes Percepton Xng-Jan He, De-Shuang Huang, Yue Zhang, Tat-Mng Lo 2, and Mchael R. Lyu 3 Intellgent Computng Lab, Insttute of Intellgent

More information

Efficient Video Coding with R-D Constrained Quadtree Segmentation

Efficient Video Coding with R-D Constrained Quadtree Segmentation Publshed on Pcture Codng Symposum 1999, March 1999 Effcent Vdeo Codng wth R-D Constraned Quadtree Segmentaton Cha-Wen Ln Computer and Communcaton Research Labs Industral Technology Research Insttute Hsnchu,

More information

S1 Note. Basis functions.

S1 Note. Basis functions. S1 Note. Bass functons. Contents Types of bass functons...1 The Fourer bass...2 B-splne bass...3 Power and type I error rates wth dfferent numbers of bass functons...4 Table S1. Smulaton results of type

More information

Visual Curvature. 1. Introduction. y C. IEEE Conf. on Computer Vision and Pattern Recognition (CVPR), June 2007

Visual Curvature. 1. Introduction. y C. IEEE Conf. on Computer Vision and Pattern Recognition (CVPR), June 2007 IEEE onf. on omputer Vson and Pattern Recognton (VPR June 7 Vsual urvature HaRong Lu, Longn Jan Lateck, WenYu Lu, Xang Ba HuaZhong Unversty of Scence and Technology, P.R. hna Temple Unversty, US lhrbss@gmal.com,

More information

Joint Example-based Depth Map Super-Resolution

Joint Example-based Depth Map Super-Resolution Jont Example-based Depth Map Super-Resoluton Yanje L 1, Tanfan Xue,3, Lfeng Sun 1, Janzhuang Lu,3,4 1 Informaton Scence and Technology Department, Tsnghua Unversty, Bejng, Chna Department of Informaton

More information