Key-Selective Patchwork Method for Audio Watermarking
|
|
- Edmund Barker
- 5 years ago
- Views:
Transcription
1 Internatonal Journal of Dgtal Content Technology and ts Applcatons Volume 4, Number 4, July 2010 Key-Selectve Patchwork Method for Audo Watermarkng 1 Ch-Man Pun, 2 Jng-Jng Jang 1, Frst and Correspondng Author,2 Department of Computer and Informaton Scence Unversty of Macau, Macau SAR, Chna cmpun@umac.mo, ma96525@umac.mo do: /jdcta.vol4.ssue4.12 Abstract Ths paper presents a Key-Selectve Patchwork Algorthm for audo watermarkng. Two specal subsets of the host sgnal features were selected to embed the watermark sgnal, addng a small constant value to one subset and subtractng the same to another patch. The method s based on wavelet doman and the watermark sgnals were embedded n approxmaton coeffcents. In order to control the naudblty of watermark nserton we try to use varous constant values and select the optmal one to guarantee a desred qualty for the watermarked audo sgnal. The qualty of the watermarked sgnal s evaluated by PSNR (Peak Sgnal Nose Rato) method and Extract Rato(ER) after varous attacks. Smulaton results show that Key-Selectve Patch Method s robust aganst varous common attacks such as flterng, resample and so on. 1. Introducton Keywords: Dscrete wavelet transform, patchwork, dgtal watermarkng Many watermarkng algorthms have been proposed [1-3]. Most of them are produced for mage or vdeo. However, the number of audo watermarkng algorthms s relatvely few [1-3]. There are several reasons for the dffculty of developng audo watermarkng algorthms. Most of all, comparng to other human sensory organs, such lke eyes noses, the human ear s far more senstve. Human ears are so senstve that even a small amount of embedded nose can be detected, especally when the watermark s embedded to the sgnal whose power s weak. It s found that audo watermarkng s a good soluton to address the problems, such as llegal usage of copyrghted audo. When the copyrght volaton has occurred, audo watermarkng can be used as the evdence of copyrght nfrngements and show the owner of the dgtal products. Audo watermark nformaton s a techncal and ntentonal nose. The nformaton such as author, create date, usage methods and other nformaton related to the copyrght can be embedded to the orgnal audo sgnal to dentfy the copyrght of the dgtal products. Moreover, the watermark can possbly be employed to trace the usage of the dgtal products or to lmt the number of copes exsts by nsertng the counter or some specal trackers to the sgnals. In addton, usng the author been embedded n the audo sgnal, rghtful ownershp problem can be addressed. Dgtal watermarkng s the technology that embeds the watermark nformaton nto the orgnal sgnal and generates watermarked sgnal, and make sure that the watermarked sgnal does not mpact normal usage of the sgnal. At least two mportant constrants, whch should be satsfed n each audo watermarkng algorthm, are: robustness and naudblty. Inaudblty s the ablty of the watermarked sgnal to keep audble dstorton free after watermark nformaton nserton. Robustness means that the watermarkng algorthms own the capablty to wthdraw attempts such as modfy or removal of embedded watermarks. In the other word, after varous attacks such as compresson, flterng, nose addton, the more the watermarkng nformaton stll can be detected from the watermarked sgnal, the more robust the watermark algorthm s. However, these two constrants may seem to be contradctory. For example, keepng robustness to attacks n a good level wll lead naudblty of the watermarked sgnal to be at lower level. In addton to these ssues, the other constrants such as securty and complexty of the watermarkng algorthm should also be taken nto consderaton. 117
2 Key-Selectve Patchwork Method for Audo Watermarkng Ch-Man Pun, Jng-Jng Jang Recently, audo watermarkng technques have acheved notable progress, and several dfferent knds of algorthms for embeddng watermarks nto audo sgnal have been proposed [4]. Makng full use of temporal maskng phenomenon n human audtory systems, Cvej et al. [5] gven a spread spectrum approach for audo watermarkng. Swanson et al. [6] proposed a watermarkng algorthm to embed watermark by drectly modfyng the audo samples. In the way of breakng each audo clp nto smaller peces and addng a perceptually shaped pseudorandom sequence, nserton of the watermark nformaton can be accomplshed. In order to embed more water mark nformaton to the audo sgnal under the two constran of naudblty an robustness, Seok et al. [7] delvered an audo watermarkng method by takng advantage of the human perceptual characterstcs of the audo sgnal to adapts the embeddng strength, so that more watermarkng data can be nserted and more robustness wll mplemented. Grn et al. [8] ntroduced a audo sgnal watermarkng whch use the snusodal model and phases, ampltudes, and dgtal frequences modulatons of the partals. Nma et al. [9] proposed a multplcatve patchwork method for audo watermarkng to stronger watermark nserton wth less audblty. In ths paper, a Key-Selectve Patchwork Algorthm for audo watermarkng s proposed. A revew of the patchwork algorthm s ntroduced n next secton. In secton 3 and 4, the watermark embeddng and extracton algorthms are descrbed n detals. Expermental results are dscussed n secton 5. Fnally, conclusons are drawn n secton Revew of the patchwork Algorthm Patchwork s proposed as a perfect watermarkng algorthm for mages[10]. Bender et al. delvered the man dea of patchwork. The sgnfcant steps n the patchwork embed algorthm are: () usng a gven key to choose two patches randomly, () add a small constant value, d, to the sample values of one patch A and at same tme subtract the same constant value from the sample values of another patch B. Mathematcally speakng s as follow. * * a a d, b b d where a and b represent sample values of the patchwork sets A and B, respectvely. By dong ths, a slght change of the orgnal sample values had occurred. The strength of constant value d wll affect the naudblty of the watermarkng algorthm. In a smlar way, there are two major procedures n the watermarkng detect algorthm. ()choose two patches by usng the same key used n the embed procedure, () calculate the dfference of the sample values between the two patches. Then, compare the expected value of the dfferences of the sample means and the calculate dfference to determne whether the watermark nformaton had been nserted to the orgnal host sgnal or not. Because the dfference of two patches s used to detect the watermark nformaton, t does not need the orgnal sgnal n the retrevng procedure. In ths way a blnd watermarkng algorthm can be acheved. Patchwork tself s a very good algorthm, because t use some mportant mathematcs features to embed the watermark nformaton. Note that * * E[ a b ] E[( a d) ( b d)] E[ a b] 2d where a and b are sample means of the ndvdual sample algorthm assumes E[ a b] 0, so the E[ a b ] 2d. 3. Embeddng the watermarks * * a and b, respectvely. The patchwork The two major steps n the algorthm are: () usng a selectve-key, whch make the dfference between the two patches to be chosen s around zero, to generate two sets of pseudo-random numbers whch wll be used as ndexes to choose two patches, A and B, whose sze s n, n the frequency doman of audo sgnal and () add the small constant value d to the each element of one patch, A, whose elements sum s greater. And subtract the same value from the each element of another patch, B, 118
3 Internatonal Journal of Dgtal Content Technology and ts Applcatons Volume 4, Number 4, July 2010 whose element sum s small. Mathematcally speakng ' ' a a d, b b d. By repeatng step () and step () M tmes, M pars of patches are obtaned. And the 2M sets of pseudo-random numbers, whch are used as ndexes to choose the patches, wll be the watermarkng nformaton n ths proposed algorthm. By dong ths, the orgnal sample values had been slghtly modfed. Accordng to the statstc features, the expected value of the dfferences of the sample values before embeddng s zero. After embeddng, the expected value becomes 2nd. The detect process starts from (1)usng frst two sets of pseudo-random numbers as ndex to choose two patches n the frequency doman of audo sgnal, (2) then calculate the dfference of the two patches. If the dfference s around threshold 2nd, then make the Counter ncreases one. Repeated step(1) and step(2) M tmes. Then compute the value of Extract Rato(ER) = (M-Counter) / M whch s used to decde whether the samples contan watermark nformaton or not. If ER s greater than the decson threshold, then watermarkng s embedded, else the watermarkng s not embedded. The proposed algorthm n ths paper nserts watermarks n the frequency doman. Even though the experment of the proposed algorthm s based on the DWT doman, t can be appled to all frequency domans such as DFT and DCT and so forth. The proposed algorthm n ths paper nserts watermarks n the frequency doman. Even though the experment of the proposed algorthm s based on the DWT doman, t can be appled to all frequency domans such as DFT and DCT and so forth. Embeddng steps are summarzed as follows. 1. Read the orgnal host audo sgnal on whch apply Dscrete Wavelet Transform based on dfferent levels. Next we wll get approxmate coeffcents of the host audo fle F { F1,..., F N }. 2. Use the selectve-key of a random number generator, whch wll guarantee the sum of dfference of the two patches to be more closed to zero. Then generate an ndex set I { I,..., I } 1 2 n 1 whose elements are pseudo-randomly selected nteger values from [ K1, K 2]. 1 K1 K2 N. Splt I nto two parts I 0 { I 1,..., I n } and I 1 { In 1,..., I 2 n}. 3. Defne A { a,..., a } { F,..., F } as the subset of F whose subscrpt corresponds to n I1 I n the element of I 0. Usng the same method, we wll get the smlar defnton for B { b,..., b } { F,..., F }, tll now we had got the TWO patches A and B. 1 n In 1 I2n 4. Calculate the dfference d between 1) f d 0, change a and 2) If d 0, change a and a and b, change the a a d b by equaton a and b base on b b d d :, and respectvely. a a d, andb b d respectvely. b by equaton 5. Apply Inverse Dscrete Wavelet Transform base on the same level as step1 to the modfed approxmate coeffcents and correspondng detal coeffcents to get the watermarked audo sgnals. Selectv-Key Usng the key to generate two ndex sets Orgnal Audo Sgnal DWT Approxmaton Coeffcents Usng the ndex sets to generate two patches Modfy each elements of the patches by addng or subtractng d IDWT Watermarked Audo Sgnal Fgure 1. The flowchart of embed watermark procedure 119
4 4. Detectng the watermarks Key-Selectve Patchwork Method for Audo Watermarkng Ch-Man Pun, Jng-Jng Jang Detectng the watermark 1. Read the audo sgnals to be detected, on whch apply Dscrete Wavelet Transform based on level three. Next we wll get approxmate coeffcents of the host audo ' ' ' sgnal F { F1,..., F N }. 2. Use the same Selectve-key of a random number generator, whch s used n step2 of watermark embed procedure. Then generate an ndex set I { I1,..., I2 n }, whose elements are nteger values pseudo-randomly selected from [ K1, K 2]. 1 K1 K2 N. Splt I nto two parts I 0 { I 1,..., I n } and I1 { In 1,..., I2n}. ' ' ' 3. Defne A { a,..., a } { F,..., F } as the subset of 1 n I1 I n ' F whose subscrpt corresponds to the element of I 0. Wth the same method, we wll get the smlar defnton ' ' ' ' for B { b,..., b } { F,..., F }, tll now we get the TWO patches A and B '. 1 n In 1 I2n ' ' ' ' 4. Calculate the mean value of dfferences d between A and B, d A B, f the mean value s greater than 2nd, the watermark s detected, otherwse the audo sgnal s not watermarked. Selectve-Key Usng the key to generate two ndex sets Audo Sgnal to be detected DWT Approxmaton Coeffcents Usng the ndex sets to generate two patches Calculate dfference between two patches Decde the watermark embedded or not 5. Expermental Results Fgure 2. The flowchart of detectng watermark procedure To test the robustness of the proposed watermarkng algorthm, many attacks were appled n ths algorthm. All audo sgnals to be tested were 16bts sgned stereo sampled at 44.1kHz. The type of audo samples been tested nclude Rock, Jazz, and Classcal. The sze of each patch was set as n = And the number of pars of the patches used was set as M = 100. In order to test the naudblty of the algorthm, we attempt dfferent values of d to embed the watermark to the audo sgnal. And the PSNR(Peak Sgnal Nose Rato), whch s used to verfy the naudblty of the watermarked sgnal, was calculated. Through several rounds tests, we found that gven the same d the PNSR value has nothng to do wth whch level of DWT s appled. The PSNR values are the functon of d, and ther relaton s shown as follow. Table 1. Varous PSNR values correspond to dfferent constant values used when embeddng PSNR
5 Internatonal Journal of Dgtal Content Technology and ts Applcatons Volume 4, Number 4, July 2010 Fgure 3. The relaton between d and PSNR In order to nspect the robustness of the algorthm aganst varous types of manpulatons, the followng types of sgnal processng were employed. 1) Down-samplng: The watermarked audo sgnals wth a samplng rate of 44.1kHz were reduced to 22.5kHz Table 2. Extract Rato after down-samplng attack based on varous levels of DWT and constant value d threshold Level1-ER 100% 100% 100% 100% 100% 100% 100% Level2-ER 100% 100% 100% 100% 100% 100% 100% Level3-ER 100% 100% 100% 100% 100% 100% 100% Key-Selectve-Level3-ER 100% 100% 100% 100% 100% 100% 100% 2) Hgh-pass flterng: The cut-off frequences were 800Hz. The second order Butterworth flter was appled. Table 3. Extract Rato after Hgh-pass flterng attack based on varous levels of DWT and constant value threshold Level1-ER 93% 92% 91% 88% 87% 83% 70% Level2-ER 93% 91% 90% 85% 83% 79% 64% Level3-ER 92% 90% 87% 81% 78% 72% 56% Key-Selectve-Level3-ER 94% 93% 92% 89% 87% 83% 81% 121
6 Key-Selectve Patchwork Method for Audo Watermarkng Ch-Man Pun, Jng-Jng Jang Fgure 4. The relaton between ER and d after Hgh-pass flterng attack, the compare ER between Key-selectve methods used and that dd not used 3) Low-pass flterng: the cut-off frequences were 8000Hz. The second order Butterworth flter was appled. Table 4. Extract Rato after low-pass flterng attack based on varous levels of DWT and constant value d threshold Level1-ER 82% 61% 43% 32% 20% 13% 3% Level2-ER 90% 87% 81% 75% 70% 66% 66% Level3-ER 100% 100% 100% 100% 100% 100% 100% Key-Selectve-Level3-ER 100% 100% 100% 100% 100% 100% 100% Fgure 5. The relaton between ER and d after Low-pass flterng attack, the compare ER between Key-selectve methods used and that dd not used 122
7 Internatonal Journal of Dgtal Content Technology and ts Applcatons Volume 4, Number 4, July ) Requantzaton: Requantze the audo sgnal from 16bts to 8bts. Table 5. Extract Rato after requantzaton attack based on varous levels of DWT and constant value d threshold Level1-ER 100% 100% 100% 100% 100% 100% 100% Level2-ER 100% 100% 100% 100% 100% 100% 100% Level3-ER 100% 100% 100% 100% 100% 100% 100% Key-SelectveLevel3-ER 100% 100% 100% 100% 100% 100% 100% 5) Mp3 compress: Compress the audo sgnal wth compresson rates of 32, 64, 96kbps. The expermental results are presented n Table 6 and Fgure 8-Fgure 10 Table 6. Extract Rato after mp3 compress attack based on varous levels of DWT and constant value d threshold Mp3-96kbps-ER 95% 95% 96% 97% 100% 100% 100% Mp3-64kbps-ER 86% 87% 87% 89% 90% 90% 91% Mp3-32kbps-ER 73% 74% 76% 76% 77% 78% 78% Key-Selectve-96-ER 95% 96% 97% 98% 100% 100% 100% Key-Selectve-64-ER 89% 90% 91% 91% 92% 93% 94% Key-Selectve-32-ER 78% 79% 81% 82% 82% 83% 84% Fgure 6. The relaton between ER and d after Mp3 attack wth compresson rate 96 kbps based on level3 DWT frequency doman, and the compare ER between Key-selectve methods used and that dd not used 123
8 Key-Selectve Patchwork Method for Audo Watermarkng Ch-Man Pun, Jng-Jng Jang Fgure 7. The relaton between ER and d after Mp3 attack wth compresson rate 64 kbps based on level3 DWT frequency doman, and the compare ER between Key-selectve methods used and that dd not used Fgure 8. The relaton between ER and d after Mp3 attack wth compresson rate 32 kbps based on level3 DWT frequency doman, the compare ER between Key-selectve methods used and that dd not used The expermental results from Fgure 3 are obvous that the larger the constant value used, the less PSNR values wll get, whch means that wth declne of constant value used for embeddng, the stronger naudblty of the watermarked audo sgnal wll acheved no matter whch level of DWT s appled. We can also easly get the nformaton from Table 2 and Table 5 that watermark s not affected by down-samplng, and requantzaton attacks n all three level of DWT, for the Extract Rato after these two attacks are always one hundred percent. The hgher energy the audo sgnal possesses, the greater mperceptblty tends to be acheved, even f the approxmaton coeffcents are been modfed. It s transparent that the relatvely low frequency 124
9 Internatonal Journal of Dgtal Content Technology and ts Applcatons Volume 4, Number 4, July 2010 components contan more sgnfcant nformaton about the dgtal sgnal, and the relatvely low frequency components seem to be more stable than the hgher one. So f the watermark nformaton s embedded n the relatvely lower frequency feld, the watermarkng algorthm wll be consdered as more robust one, for very lttle data loss occurs at lower frequency felds after varous attacks. So n ths proposed algorthm, the relatvely low frequency components are exploted to embed the watermarkng nformaton. The experment results n the Fgure 4 show that the less level of DWT s appled, more robustness wll be acheved when attacked by Hgh-pass flterng, gven the same embed constant value d. The fgures from Fgure 5 tell that the hgher level of DWT s exploted, the more robustness wll be offered when attacked by Low-pass flterng. From Fgure 6-8, t s evdent that ths proposed algorthm s robust aganst Mp3 compress attack. The hgher compresson rate used, the more robust wll be acheved. From Fgure 4-8, the compare n these fgures showed clearly that after the key-selectve methods used the robustness aganst all knd of attacks had been better mproved. 6. Concluson In ths paper, a selectve-key patchwork method for audo watermarkng has been proposed. Many methods have been appled. Frst, n order to enhance the robustness aganst all knds of attacks, a selectve-key patchwork method was exploted. Second, to guarantee the naudblty of the watermark, we calculate PSNR n ths algorthm. Thrd, by embeddng the watermark base on three dfferent levels of Dscrete Wavelet Transform, we found that t wll be more robust f embed the watermark nformaton base on hgher level of DWT. Fourth, for the relatvely lower frequency components are perceptually sgnfcant, these components are selected to embed the watermarkng to get more robustness feature of dgtal watermarkng. In addton, although the proposed method has been extensvely tested on many dfferent attacks such as flterng, resample and so on, more attacks such as tme shftng, croppng wth half left and so on should be tested and dscussed n the future work. 7. Acknowledgment The authors would lke to thank the referees for ther valuable comments. Ths work was supported n part by the Research Commttee of the Unversty of Macau. 8. References [1] Arnold, M., Audo watermarkng: features, applcatons and algorthms. Multmeda and Expo, ICME IEEE Internatonal Conference on, : p vol.2. [2] Hong, J.W.S.a.J.W., Audo watermarkng for copyrght protecton of dgtal audo data. Electron. Lett., : p [3] In-Kwon, Y. and K. Hyoung Joong. Modfed Patchwork Algorthm: a novel audo watermarkng scheme. n Informaton Technology: Codng and Computng, Proceedngs. Internatonal Conference on [4] ProceedngsM. Barn, I.J.C., and T. Kalker, Eds., Dgtal Watermarkng. 4th Internatonal Workshop, IWDW 2005, Sena, Italy, September 15-17, 2005, 2005: p [5] C. Cvej, A.K., and T. Seppanen, Audo watermarkng usng m-sequence and temporal maskng. 7th IEEEWorkshop Applcat. Sgnal Process. Audo Acoust., New York, 2001: p [6] M.D. Swanson, B.Z., A. H. Twefk, and L. Boney, Robust audo watermarkng usng perceptual maskng. Sgnal Process., : p [7] J. Seok, J.H., and J. Km, A novel audo watermarkng algorthm for copyrght protecton of dgtal audo. ETRI J., : p [8] Marchand, L.G.a.S., Watermarkng of speech sgnals usng the snusodal model and frequency modulaton of the partals. IEEE Int. Conf. Acoust., Speech, Sgnal Process, 2004: p [9] Ahad, N.K.K.a.S.M., Robust Multplcatve Patchwork Method for Audo Watermarkng,. IEEE Trans. Audo,Speech and Language Process, (6): p
10 Key-Selectve Patchwork Method for Audo Watermarkng Ch-Man Pun, Jng-Jng Jang [10] W. Bender, D.G., N. Mormoto, and A. Lu, Technques for data hdng. IBM Syst. J., (3/4): p
Hybrid Non-Blind Color Image Watermarking
Hybrd Non-Blnd Color Image Watermarkng Ms C.N.Sujatha 1, Dr. P. Satyanarayana 2 1 Assocate Professor, Dept. of ECE, SNIST, Yamnampet, Ghatkesar Hyderabad-501301, Telangana 2 Professor, Dept. of ECE, AITS,
More informationA Hybrid Semi-Blind Gray Scale Image Watermarking Algorithm Based on DWT-SVD using Human Visual System Model
A Hybrd Sem-Blnd Gray Scale Image Watermarkng Algorthm Based on DWT-SVD usng Human Vsual System Model Rajesh Mehta r Scence & Engneerng, USICT Guru Gobnd Sngh Indrarprastha Unversty New Delh, Inda rajesh00ust@gmal.com
More informationEnhanced Watermarking Technique for Color Images using Visual Cryptography
Informaton Assurance and Securty Letters 1 (2010) 024-028 Enhanced Watermarkng Technque for Color Images usng Vsual Cryptography Enas F. Al rawashdeh 1, Rawan I.Zaghloul 2 1 Balqa Appled Unversty, MIS
More informationA NEW AUDIO WATERMARKING METHOD BASED
A NEW AUDIO WATERMARKING METHOD BASED ON DISCRETE COSINE TRANSFORM WITH A GRAY IMAGE Mohammad Ibrahm Khan 1, Md. Iqbal Hasan Sarker 2, Kaushk Deb 3 and Md. Hasan Furhad 4 1,2,3 Department of Computer Scence
More informationRobust Blind Video Watermark Algorithm in Transform Domain Combining with 3D Video Correlation
JOURNAL OF MULTIMEDIA, VOL. 8, NO. 2, APRIL 2013 161 Robust Blnd Vdeo Watermark Algorthm n Transform Doman Combnng wth 3D Vdeo Correlaton DING Ha-yang 1,3 1. Informaton Securty Center, Bejng Unversty of
More informationIMPLEMENTATION OF QIM BASED AUDIO WATERMARKING USING HYBRID TRANSFORM OF SWT-DCT-SVD METHODS OPTIMIZED WITH GENETIC ALORITHM
IMPLEMENTATION OF QIM BASED AUDIO WATERMARKING USING HYBRID TRANSFORM OF SWT-DCT-SVD METHODS OPTIMIZED WITH GENETIC ALORITHM Ryan Amnullah 1, Gelar Budman 2, Irma Saftr 3 1, 2, 3 FakultasTeknk Elektro,
More informationA Fast Content-Based Multimedia Retrieval Technique Using Compressed Data
A Fast Content-Based Multmeda Retreval Technque Usng Compressed Data Borko Furht and Pornvt Saksobhavvat NSF Multmeda Laboratory Florda Atlantc Unversty, Boca Raton, Florda 3343 ABSTRACT In ths paper,
More informationRobust Watermarking for Text Images Based on Arnold Scrambling and DWT-DCT
Internatonal Conference on Mechatroncs Electronc Industral and Control Engneerng (MEIC 015) Robust Watermarkng for Text Images Based on Arnold Scramblng and DWT-DCT Fan Wu College of Informaton Scence
More informationImprovement of Spatial Resolution Using BlockMatching Based Motion Estimation and Frame. Integration
Improvement of Spatal Resoluton Usng BlockMatchng Based Moton Estmaton and Frame Integraton Danya Suga and Takayuk Hamamoto Graduate School of Engneerng, Tokyo Unversty of Scence, 6-3-1, Nuku, Katsuska-ku,
More informationRobust Video Watermarking Using Image Normalization, Motion Vector and Perceptual Information
Robust Vdeo Watermarkng Usng Image ormalzaton, Moton Vector and Perceptual Informaton Cedllo-Hernández Antono 1, Cedllo-Hernández Manuel 1, akano-myatake Marko 1, García-Vázquez Mreya S. 2 1 Postgraduate
More informationResearch Article High Capacity Reversible Watermarking for Audio by Histogram Shifting and Predicted Error Expansion
e Scentfc World Journal, Artcle ID 656251, 7 pages http://dx.do.org/1.1155/214/656251 Research Artcle Hgh Capacty Reversble Watermarkng for Audo by Hstogram Shftng and Predcted Error Expanson Fe Wang,
More informationSemi-Fragile Watermarking Scheme for Authentication of JPEG Images
Tamkang Journal of Scence and Engneerng, Vol. 10, No 1, pp. 5766 (2007) 57 Sem-Fragle Watermarkng Scheme for Authentcaton of JPEG Images Chh-Hung n 1 *, Tung-Shh Su 2 and Wen-Shyong Hseh 2,3 1 Department
More informationContent Based Image Retrieval Using 2-D Discrete Wavelet with Texture Feature with Different Classifiers
IOSR Journal of Electroncs and Communcaton Engneerng (IOSR-JECE) e-issn: 78-834,p- ISSN: 78-8735.Volume 9, Issue, Ver. IV (Mar - Apr. 04), PP 0-07 Content Based Image Retreval Usng -D Dscrete Wavelet wth
More informationAn Optimal Algorithm for Prufer Codes *
J. Software Engneerng & Applcatons, 2009, 2: 111-115 do:10.4236/jsea.2009.22016 Publshed Onlne July 2009 (www.scrp.org/journal/jsea) An Optmal Algorthm for Prufer Codes * Xaodong Wang 1, 2, Le Wang 3,
More informationA Binarization Algorithm specialized on Document Images and Photos
A Bnarzaton Algorthm specalzed on Document mages and Photos Ergna Kavalleratou Dept. of nformaton and Communcaton Systems Engneerng Unversty of the Aegean kavalleratou@aegean.gr Abstract n ths paper, a
More informationKEYWORDS: Digital Image Watermarking, Discrete Wavelet Transform, General Regression Neural Network, Human Visual System. 1.
An Adaptve Dgtal Image Watermarkng Based on Image Features n Dscrete Wavelet Transform Doman and General Regresson Neural Network Ayoub Taher Group of IT Engneerng, Payam Noor Unversty, Broujen, Iran ABSTRACT:
More informationA Comparison between Digital Images Watermarking in Tow Different Color Spaces Using DWT2*
A Comparson between Dgtal s ng n Tow Dfferent Color Spaces Usng DWT* Mehd Khall Natonal Academy of Scence of Armena Yerevan, Armena e-mal: khall.mehd@yahoo.com ABSTRACT A novel dgtal watermarkng for ownershp
More informationPerformance Analysis of Data Hiding in MPEG-4 AAC Audio *
TSINGHUA SCIENCE AND TECHNOLOGY ISSNll1007-0214ll07/21llpp55-61 Volume 14, Number 1, February 2009 Performance Analyss of Data Hdng n MPEG-4 AAC Audo * XU Shuzheng ( ) **, ZHANG Peng ( ), WANG Pengjun
More informationDigital Video Watermarking using Discrete Wavelet Transform and Principal Component Analysis
Internatonal Journal of Wsdom Based Computng, Vol. 1 (2), August 2011 7 Dgtal Vdeo Watermarkng usng Dscrete Wavelet Transform and Prncpal Component Analyss Sanjana Snha, Prajnat Bardhan, Swarnal Pramanck,
More informationHigh-Boost Mesh Filtering for 3-D Shape Enhancement
Hgh-Boost Mesh Flterng for 3-D Shape Enhancement Hrokazu Yagou Λ Alexander Belyaev y Damng We z Λ y z ; ; Shape Modelng Laboratory, Unversty of Azu, Azu-Wakamatsu 965-8580 Japan y Computer Graphcs Group,
More informationIdentify the Attack in Embedded Image with Steganalysis Detection Method by PSNR and RGB Intensity
Internatonal Journal of Computer Systems (ISSN: 394-1065), Volume 03 Issue 07, July, 016 Avalable at http://www.jcsonlne.com/ Identfy the Attack n Embedded Image wth Steganalyss Detecton Method by PSNR
More informationA Fast Visual Tracking Algorithm Based on Circle Pixels Matching
A Fast Vsual Trackng Algorthm Based on Crcle Pxels Matchng Zhqang Hou hou_zhq@sohu.com Chongzhao Han czhan@mal.xjtu.edu.cn Ln Zheng Abstract: A fast vsual trackng algorthm based on crcle pxels matchng
More informationParallelism for Nested Loops with Non-uniform and Flow Dependences
Parallelsm for Nested Loops wth Non-unform and Flow Dependences Sam-Jn Jeong Dept. of Informaton & Communcaton Engneerng, Cheonan Unversty, 5, Anseo-dong, Cheonan, Chungnam, 330-80, Korea. seong@cheonan.ac.kr
More informationUsing Counter-propagation Neural Network for Digital Audio Watermarking
Usng Counter-propagaton Neural Network for Dgtal Audo Watermarkng Chuan-Yu Chang and Wen-Chh Shen Graduate School of Computer Scence and Informaton Engneerng Natonal Yunln Unversty of Scence & Technology
More informationA Robust Webpage Information Hiding Method Based on the Slash of Tag
Advanced Engneerng Forum Onlne: 2012-09-26 ISSN: 2234-991X, Vols. 6-7, pp 361-366 do:10.4028/www.scentfc.net/aef.6-7.361 2012 Trans Tech Publcatons, Swtzerland A Robust Webpage Informaton Hdng Method Based
More informationA Hybrid Digital Image Watermarking based on Discrete Wavelet Transform, Discrete Cosine Transform, and General Regression Neural Network
A Hybrd Dgtal Image Watermarkng based on Dscrete Wavelet Transform, Dscrete Cosne Transform, and General Regresson Neural Network Ayoub Taher ; ABSTRACT In ths paper, a new hybrd dgtal watermarkng technque
More informationHigh Payload Reversible Data Hiding Scheme Using Difference Segmentation and Histogram Shifting
JOURNAL OF ELECTRONIC SCIENCE AND TECHNOLOGY, VOL. 11, NO. 1, MARCH 2013 9 Hgh Payload Reversble Data Hdng Scheme Usng Dfference Segmentaton and Hstogram Shftng Yung-Chen Chou and Huang-Chng L Abstract
More informationA Lossless Watermarking Scheme for Halftone Image Authentication
IJCSNS Internatonal Journal of Computer Scence and Network Securty, VOL.6 No.2B, February 2006 147 A Lossless Watermarkng Scheme for Halftone Image Authentcaton Jeng-Shyang Pan, Hao Luo, and Zhe-Mng Lu,
More informationIAJIT First Online Publication
Content Protecton n Vdeo Data Based on Robust Dgtal Watermarkng Resstant to Intentonal and Unntentonal Attacks Mad Masoum and Shervn Amr Department of Electrcal Engneerng, Islamc Azad Unversty Qazvn Branch,
More informationThe Codesign Challenge
ECE 4530 Codesgn Challenge Fall 2007 Hardware/Software Codesgn The Codesgn Challenge Objectves In the codesgn challenge, your task s to accelerate a gven software reference mplementaton as fast as possble.
More informationInformation Hiding Watermarking Detection Technique by PSNR and RGB Intensity
www..org 3 Informaton Hdng Watermarkng Detecton Technque by PSNR and RGB Intensty 1 Neha Chauhan, Akhlesh A. Waoo, 3 P. S. Patheja 1 Research Scholar, BIST, Bhopal, Inda.,3 Assstant Professor, BIST, Bhopal,
More informationEnhanced AMBTC for Image Compression using Block Classification and Interpolation
Internatonal Journal of Computer Applcatons (0975 8887) Volume 5 No.0, August 0 Enhanced AMBTC for Image Compresson usng Block Classfcaton and Interpolaton S. Vmala Dept. of Comp. Scence Mother Teresa
More informationAdaptive digital watermarking of images using Genetic Algorithm
Adaptve dgtal watermarkng of mages usng Genetc Algorthm Bushra Skander, Muhammad Ishtaq, M. Arfan Jaffar, Muhammad Tarq, Anwar M. Mrza Department of Computer Scence, Natonal Unversty of Computer and Emergng
More informationCluster Analysis of Electrical Behavior
Journal of Computer and Communcatons, 205, 3, 88-93 Publshed Onlne May 205 n ScRes. http://www.scrp.org/ournal/cc http://dx.do.org/0.4236/cc.205.350 Cluster Analyss of Electrcal Behavor Ln Lu Ln Lu, School
More informationComplex Numbers. Now we also saw that if a and b were both positive then ab = a b. For a second let s forget that restriction and do the following.
Complex Numbers The last topc n ths secton s not really related to most of what we ve done n ths chapter, although t s somewhat related to the radcals secton as we wll see. We also won t need the materal
More informationAn Image Compression Algorithm based on Wavelet Transform and LZW
An Image Compresson Algorthm based on Wavelet Transform and LZW Png Luo a, Janyong Yu b School of Chongqng Unversty of Posts and Telecommuncatons, Chongqng, 400065, Chna Abstract a cylpng@63.com, b y27769864@sna.cn
More informationData Hiding and Image Authentication for Color-Palette Images
Data Hdng and Image Authentcaton for Color-Palette Images Chh-Yang Yn ( 殷志揚 ) and Wen-Hsang Tsa ( 蔡文祥 ) Department of Computer & Informaton Scence Natonal Chao Tung Unversty 00 Ta Hsueh Rd., Hsnchu, Tawan
More informationShape-adaptive DCT and Its Application in Region-based Image Coding
Internatonal Journal of Sgnal Processng, Image Processng and Pattern Recognton, pp.99-108 http://dx.do.org/10.14257/sp.2014.7.1.10 Shape-adaptve DCT and Its Applcaton n Regon-based Image Codng Yamn Zheng,
More informationAn Image Fusion Approach Based on Segmentation Region
Rong Wang, L-Qun Gao, Shu Yang, Yu-Hua Cha, and Yan-Chun Lu An Image Fuson Approach Based On Segmentaton Regon An Image Fuson Approach Based on Segmentaton Regon Rong Wang, L-Qun Gao, Shu Yang 3, Yu-Hua
More informationSteganography System using Slantlet Transform
ISSN:43-6999 Journal of Inmaton Communcaton and Intellgence Systems (JICIS) Volume Issue February 06 Steganography System usng Slantlet Transm Ryadh Bassl Abduljabbar Abstract An approach hdng nmaton has
More informationA Modified Median Filter for the Removal of Impulse Noise Based on the Support Vector Machines
A Modfed Medan Flter for the Removal of Impulse Nose Based on the Support Vector Machnes H. GOMEZ-MORENO, S. MALDONADO-BASCON, F. LOPEZ-FERRERAS, M. UTRILLA- MANSO AND P. GIL-JIMENEZ Departamento de Teoría
More informationUB at GeoCLEF Department of Geography Abstract
UB at GeoCLEF 2006 Mguel E. Ruz (1), Stuart Shapro (2), June Abbas (1), Slva B. Southwck (1) and Davd Mark (3) State Unversty of New York at Buffalo (1) Department of Lbrary and Informaton Studes (2) Department
More informationProblem Definitions and Evaluation Criteria for Computational Expensive Optimization
Problem efntons and Evaluaton Crtera for Computatonal Expensve Optmzaton B. Lu 1, Q. Chen and Q. Zhang 3, J. J. Lang 4, P. N. Suganthan, B. Y. Qu 6 1 epartment of Computng, Glyndwr Unversty, UK Faclty
More informationVectorization of Image Outlines Using Rational Spline and Genetic Algorithm
01 Internatonal Conference on Image, Vson and Computng (ICIVC 01) IPCSIT vol. 50 (01) (01) IACSIT Press, Sngapore DOI: 10.776/IPCSIT.01.V50.4 Vectorzaton of Image Outlnes Usng Ratonal Splne and Genetc
More informationAvailable online at Available online at Advanced in Control Engineering and Information Science
Avalable onlne at wwwscencedrectcom Avalable onlne at wwwscencedrectcom Proceda Proceda Engneerng Engneerng 00 (2011) 15000 000 (2011) 1642 1646 Proceda Engneerng wwwelsevercom/locate/proceda Advanced
More informationLearning-Based Top-N Selection Query Evaluation over Relational Databases
Learnng-Based Top-N Selecton Query Evaluaton over Relatonal Databases Lang Zhu *, Wey Meng ** * School of Mathematcs and Computer Scence, Hebe Unversty, Baodng, Hebe 071002, Chna, zhu@mal.hbu.edu.cn **
More informationGeometrically Invariant Watermarking Scheme Based on Local Feature Points
JOURNAL OF MULTIMEDIA, VOL. 7, NO. 3, JUNE 0 3 Geometrcally Invarant Watermarkng Scheme Based on Local Feature Ponts L Jng School of Computer and Informaton Engneerng, Henan Unversty of Economcs and Law,
More informationRelated-Mode Attacks on CTR Encryption Mode
Internatonal Journal of Network Securty, Vol.4, No.3, PP.282 287, May 2007 282 Related-Mode Attacks on CTR Encrypton Mode Dayn Wang, Dongda Ln, and Wenlng Wu (Correspondng author: Dayn Wang) Key Laboratory
More informationProblem Set 3 Solutions
Introducton to Algorthms October 4, 2002 Massachusetts Insttute of Technology 6046J/18410J Professors Erk Demane and Shaf Goldwasser Handout 14 Problem Set 3 Solutons (Exercses were not to be turned n,
More informationRobust and Reversible Relational Database Watermarking Algorithm Based on Clustering and Polar Angle Expansion
Robust and Reversble Relatonal Database Watermarkng Algorthm Based on Clusterng and Polar Angle Expanson Zhyong L, Junmn Lu and Wecheng Tao College of Informaton Scence and Engneerng, Hunan Unversty, Changsha,
More informationMathematics 256 a course in differential equations for engineering students
Mathematcs 56 a course n dfferental equatons for engneerng students Chapter 5. More effcent methods of numercal soluton Euler s method s qute neffcent. Because the error s essentally proportonal to the
More informationA NOTE ON FUZZY CLOSURE OF A FUZZY SET
(JPMNT) Journal of Process Management New Technologes, Internatonal A NOTE ON FUZZY CLOSURE OF A FUZZY SET Bhmraj Basumatary Department of Mathematcal Scences, Bodoland Unversty, Kokrajhar, Assam, Inda,
More informationA Secured Method for Image Steganography Based On Pixel Values
A Secured Method for Image Steganography Based On Pxel Values Tarun Gulat #, Sanskrt Gupta * # Assocate Professor, Electroncs and Communcaton Engneerng Department, MMEC, M.M.U., Mullana, Ambala, Haryana,
More informationQuantization Noise Power Injection In Subband Audio Coding Using Low Selectivity Filter Banks
Quantzaton Nose Power Injecton In Subband Audo Codng Usng Low Selectvty Flter Banks D. ARTÍNEZ -UÑOZ, N. RUIZ-REYES, P. VERA-CANDEAS, P.J. RECHE-LÓPEZ, J. CURPIÁN-ALONSO Departamento de Electrónca Unversdad
More informationTerm Weighting Classification System Using the Chi-square Statistic for the Classification Subtask at NTCIR-6 Patent Retrieval Task
Proceedngs of NTCIR-6 Workshop Meetng, May 15-18, 2007, Tokyo, Japan Term Weghtng Classfcaton System Usng the Ch-square Statstc for the Classfcaton Subtask at NTCIR-6 Patent Retreval Task Kotaro Hashmoto
More informationNon-Split Restrained Dominating Set of an Interval Graph Using an Algorithm
Internatonal Journal of Advancements n Research & Technology, Volume, Issue, July- ISS - on-splt Restraned Domnatng Set of an Interval Graph Usng an Algorthm ABSTRACT Dr.A.Sudhakaraah *, E. Gnana Deepka,
More informationTsinghua University at TAC 2009: Summarizing Multi-documents by Information Distance
Tsnghua Unversty at TAC 2009: Summarzng Mult-documents by Informaton Dstance Chong Long, Mnle Huang, Xaoyan Zhu State Key Laboratory of Intellgent Technology and Systems, Tsnghua Natonal Laboratory for
More informationSum of Linear and Fractional Multiobjective Programming Problem under Fuzzy Rules Constraints
Australan Journal of Basc and Appled Scences, 2(4): 1204-1208, 2008 ISSN 1991-8178 Sum of Lnear and Fractonal Multobjectve Programmng Problem under Fuzzy Rules Constrants 1 2 Sanjay Jan and Kalash Lachhwan
More informationBioTechnology. An Indian Journal FULL PAPER. Trade Science Inc.
[Type text] [Type text] [Type text] ISSN : 0974-74 Volume 0 Issue BoTechnology 04 An Indan Journal FULL PAPER BTAIJ 0() 04 [684-689] Revew on Chna s sports ndustry fnancng market based on market -orented
More informationScheduling Remote Access to Scientific Instruments in Cyberinfrastructure for Education and Research
Schedulng Remote Access to Scentfc Instruments n Cybernfrastructure for Educaton and Research Je Yn 1, Junwe Cao 2,3,*, Yuexuan Wang 4, Lanchen Lu 1,3 and Cheng Wu 1,3 1 Natonal CIMS Engneerng and Research
More informationVirtual Machine Migration based on Trust Measurement of Computer Node
Appled Mechancs and Materals Onlne: 2014-04-04 ISSN: 1662-7482, Vols. 536-537, pp 678-682 do:10.4028/www.scentfc.net/amm.536-537.678 2014 Trans Tech Publcatons, Swtzerland Vrtual Machne Mgraton based on
More informationResearch of Multiple Text Watermarks Technique in Electric Power System Texts
Sensors & Transducers 203 by IFSA http://www.sensorsportal.com Research of Multple Text atermarks Technque n Electrc Power System Texts Xao-X XING, Qng CHEN, 2 Lan-X FU School of Optcal-Electrcal and Computer
More informationR s s f. m y s. SPH3UW Unit 7.3 Spherical Concave Mirrors Page 1 of 12. Notes
SPH3UW Unt 7.3 Sphercal Concave Mrrors Page 1 of 1 Notes Physcs Tool box Concave Mrror If the reflectng surface takes place on the nner surface of the sphercal shape so that the centre of the mrror bulges
More informationA New Approach For the Ranking of Fuzzy Sets With Different Heights
New pproach For the ankng of Fuzzy Sets Wth Dfferent Heghts Pushpnder Sngh School of Mathematcs Computer pplcatons Thapar Unversty, Patala-7 00 Inda pushpndersnl@gmalcom STCT ankng of fuzzy sets plays
More informationA FIBONACCI LSB DATA HIDING TECNIQUE
A FIBONACCI LSB DATA HIDING TECNIQUE Dego De Luca Pcone (*)(**), Federca Battst (*)(**), Marco Carl (*), Jaakko Astola (**), and Karen Egazaran (**) (*) AE Department, Unverst of Roma TRE, Rome, Ital,
More informationMeta-heuristics for Multidimensional Knapsack Problems
2012 4th Internatonal Conference on Computer Research and Development IPCSIT vol.39 (2012) (2012) IACSIT Press, Sngapore Meta-heurstcs for Multdmensonal Knapsack Problems Zhbao Man + Computer Scence Department,
More informationThe Research of Ellipse Parameter Fitting Algorithm of Ultrasonic Imaging Logging in the Casing Hole
Appled Mathematcs, 04, 5, 37-3 Publshed Onlne May 04 n ScRes. http://www.scrp.org/journal/am http://dx.do.org/0.436/am.04.584 The Research of Ellpse Parameter Fttng Algorthm of Ultrasonc Imagng Loggng
More informationDeep learning is a good steganalysis tool when embedding key is reused for different images, even if there is a cover source-mismatch
Deep learnng s a good steganalyss tool when embeddng key s reused for dfferent mages, even f there s a cover source-msmatch Lonel PIBRE 2,3, Jérôme PASQUET 2,3, Dno IENCO 2,3, Marc CHAUMONT 1,2,3 (1) Unversty
More informationCLASSIFICATION OF ULTRASONIC SIGNALS
The 8 th Internatonal Conference of the Slovenan Socety for Non-Destructve Testng»Applcaton of Contemporary Non-Destructve Testng n Engneerng«September -3, 5, Portorož, Slovena, pp. 7-33 CLASSIFICATION
More informationX- Chart Using ANOM Approach
ISSN 1684-8403 Journal of Statstcs Volume 17, 010, pp. 3-3 Abstract X- Chart Usng ANOM Approach Gullapall Chakravarth 1 and Chaluvad Venkateswara Rao Control lmts for ndvdual measurements (X) chart are
More informationModular PCA Face Recognition Based on Weighted Average
odern Appled Scence odular PCA Face Recognton Based on Weghted Average Chengmao Han (Correspondng author) Department of athematcs, Lny Normal Unversty Lny 76005, Chna E-mal: hanchengmao@163.com Abstract
More informationFor instance, ; the five basic number-sets are increasingly more n A B & B A A = B (1)
Secton 1.2 Subsets and the Boolean operatons on sets If every element of the set A s an element of the set B, we say that A s a subset of B, or that A s contaned n B, or that B contans A, and we wrte A
More informationDynamic Code Block Size for JPEG 2000
Dynamc Code Block Sze for JPEG 2000 Png-Sng Tsa a, Yann LeCornec b a Dept. of Computer Scence, Unv. of Texas Pan Amercan, 1201 W. Unv. Dr., Ednburg, TX USA 78539-2999; b Sgma Desgns, Inc., 1778 McCarthy
More informationEdge Detection in Noisy Images Using the Support Vector Machines
Edge Detecton n Nosy Images Usng the Support Vector Machnes Hlaro Gómez-Moreno, Saturnno Maldonado-Bascón, Francsco López-Ferreras Sgnal Theory and Communcatons Department. Unversty of Alcalá Crta. Madrd-Barcelona
More informationCoding Artifact Reduction Using Edge Map Guided Adaptive and Fuzzy Filter
MEL A MITSUBISHI ELECTIC ESEACH LABOATOY http://www.merl.com Codng Artfact educton Usng Edge Map Guded Adaptve and Fuzzy Flter Hao-Song Kong Yao Ne Anthony Vetro Hufang Sun Kenneth E. Barner T-2004-056
More informationAudio Content Classification Method Research Based on Two-step Strategy
(IJACSA) Internatonal Journal of Advanced Computer Scence and Applcatons, Audo Content Classfcaton Method Research Based on Two-step Strategy Sume Lang Department of Computer Scence and Technology Chongqng
More informationOptimal Workload-based Weighted Wavelet Synopses
Optmal Workload-based Weghted Wavelet Synopses Yoss Matas School of Computer Scence Tel Avv Unversty Tel Avv 69978, Israel matas@tau.ac.l Danel Urel School of Computer Scence Tel Avv Unversty Tel Avv 69978,
More informationDiscrete Cosine Transform Optimization in Image Compression Based on Genetic Algorithm
015 8th Internatonal Congress on Image and Sgnal Processng (CISP 015) Dscrete Cosne Transform Optmzaton n Image Compresson Based on Genetc Algorthm LIU Yuan-yuan 1 CHE He-xn 1 College of Communcaton Engneerng,
More informationLearning the Kernel Parameters in Kernel Minimum Distance Classifier
Learnng the Kernel Parameters n Kernel Mnmum Dstance Classfer Daoqang Zhang 1,, Songcan Chen and Zh-Hua Zhou 1* 1 Natonal Laboratory for Novel Software Technology Nanjng Unversty, Nanjng 193, Chna Department
More informationDetecting MP3Stego using Calibrated Side Information Features
2628 JOURNAL OF SOFTWARE, VOL. 8, NO. 10, OCTOBER 2013 Detectng P3Stego usng Calbrated Sde Informaton Features Xanmn Yu School of Informaton Scence and Engneerng, Nngbo Unversty Emal: mlhappy1016@163.com
More informationHelsinki University Of Technology, Systems Analysis Laboratory Mat Independent research projects in applied mathematics (3 cr)
Helsnk Unversty Of Technology, Systems Analyss Laboratory Mat-2.08 Independent research projects n appled mathematcs (3 cr) "! #$&% Antt Laukkanen 506 R ajlaukka@cc.hut.f 2 Introducton...3 2 Multattrbute
More informationMining User Similarity Using Spatial-temporal Intersection
www.ijcsi.org 215 Mnng User Smlarty Usng Spatal-temporal Intersecton Ymn Wang 1, Rumn Hu 1, Wenhua Huang 1 and Jun Chen 1 1 Natonal Engneerng Research Center for Multmeda Software, School of Computer,
More informationSimulation Based Analysis of FAST TCP using OMNET++
Smulaton Based Analyss of FAST TCP usng OMNET++ Umar ul Hassan 04030038@lums.edu.pk Md Term Report CS678 Topcs n Internet Research Sprng, 2006 Introducton Internet traffc s doublng roughly every 3 months
More informationTN348: Openlab Module - Colocalization
TN348: Openlab Module - Colocalzaton Topc The Colocalzaton module provdes the faclty to vsualze and quantfy colocalzaton between pars of mages. The Colocalzaton wndow contans a prevew of the two mages
More informationArticle Reversible Dual-Image-Based Hiding Scheme Using Block Folding Technique
Artcle Reversble Dual-Image-Based Hdng Scheme Usng Block Foldng Technque Tzu-Chuen Lu, * and Hu-Shh Leng Department of Informaton Management, Chaoyang Unversty of Technology, Tachung 4349, Tawan Department
More informationCan We Beat the Prefix Filtering? An Adaptive Framework for Similarity Join and Search
Can We Beat the Prefx Flterng? An Adaptve Framework for Smlarty Jon and Search Jannan Wang Guolang L Janhua Feng Department of Computer Scence and Technology, Tsnghua Natonal Laboratory for Informaton
More informationFINDING IMPORTANT NODES IN SOCIAL NETWORKS BASED ON MODIFIED PAGERANK
FINDING IMPORTANT NODES IN SOCIAL NETWORKS BASED ON MODIFIED PAGERANK L-qng Qu, Yong-quan Lang 2, Jng-Chen 3, 2 College of Informaton Scence and Technology, Shandong Unversty of Scence and Technology,
More informationQuery Clustering Using a Hybrid Query Similarity Measure
Query clusterng usng a hybrd query smlarty measure Fu. L., Goh, D.H., & Foo, S. (2004). WSEAS Transacton on Computers, 3(3), 700-705. Query Clusterng Usng a Hybrd Query Smlarty Measure Ln Fu, Don Hoe-Lan
More informationReducing Frame Rate for Object Tracking
Reducng Frame Rate for Object Trackng Pavel Korshunov 1 and We Tsang Oo 2 1 Natonal Unversty of Sngapore, Sngapore 11977, pavelkor@comp.nus.edu.sg 2 Natonal Unversty of Sngapore, Sngapore 11977, oowt@comp.nus.edu.sg
More informationConvolutional interleaver for unequal error protection of turbo codes
Convolutonal nterleaver for unequal error protecton of turbo codes Sna Vaf, Tadeusz Wysock, Ian Burnett Unversty of Wollongong, SW 2522, Australa E-mal:{sv39,wysock,an_burnett}@uow.edu.au Abstract: Ths
More informationPositive Semi-definite Programming Localization in Wireless Sensor Networks
Postve Sem-defnte Programmng Localzaton n Wreless Sensor etworks Shengdong Xe 1,, Jn Wang, Aqun Hu 1, Yunl Gu, Jang Xu, 1 School of Informaton Scence and Engneerng, Southeast Unversty, 10096, anjng Computer
More informationGrading Image Retrieval Based on DCT and DWT Compressed Domains Using Low-Level Features
Journal of Communcatons Vol. 0 No. January 0 Gradng Image Retreval Based on DCT and DWT Compressed Domans Usng Low-Level Features Chengyou Wang Xnyue Zhang Rongyang Shan and Xao Zhou School of echancal
More informationSolving two-person zero-sum game by Matlab
Appled Mechancs and Materals Onlne: 2011-02-02 ISSN: 1662-7482, Vols. 50-51, pp 262-265 do:10.4028/www.scentfc.net/amm.50-51.262 2011 Trans Tech Publcatons, Swtzerland Solvng two-person zero-sum game by
More informationWishing you all a Total Quality New Year!
Total Qualty Management and Sx Sgma Post Graduate Program 214-15 Sesson 4 Vnay Kumar Kalakband Assstant Professor Operatons & Systems Area 1 Wshng you all a Total Qualty New Year! Hope you acheve Sx sgma
More informationLocal Quaternary Patterns and Feature Local Quaternary Patterns
Local Quaternary Patterns and Feature Local Quaternary Patterns Jayu Gu and Chengjun Lu The Department of Computer Scence, New Jersey Insttute of Technology, Newark, NJ 0102, USA Abstract - Ths paper presents
More informationA New Feature of Uniformity of Image Texture Directions Coinciding with the Human Eyes Perception 1
A New Feature of Unformty of Image Texture Drectons Concdng wth the Human Eyes Percepton Xng-Jan He, De-Shuang Huang, Yue Zhang, Tat-Mng Lo 2, and Mchael R. Lyu 3 Intellgent Computng Lab, Insttute of Intellgent
More informationEfficient Video Coding with R-D Constrained Quadtree Segmentation
Publshed on Pcture Codng Symposum 1999, March 1999 Effcent Vdeo Codng wth R-D Constraned Quadtree Segmentaton Cha-Wen Ln Computer and Communcaton Research Labs Industral Technology Research Insttute Hsnchu,
More informationS1 Note. Basis functions.
S1 Note. Bass functons. Contents Types of bass functons...1 The Fourer bass...2 B-splne bass...3 Power and type I error rates wth dfferent numbers of bass functons...4 Table S1. Smulaton results of type
More informationVisual Curvature. 1. Introduction. y C. IEEE Conf. on Computer Vision and Pattern Recognition (CVPR), June 2007
IEEE onf. on omputer Vson and Pattern Recognton (VPR June 7 Vsual urvature HaRong Lu, Longn Jan Lateck, WenYu Lu, Xang Ba HuaZhong Unversty of Scence and Technology, P.R. hna Temple Unversty, US lhrbss@gmal.com,
More informationJoint Example-based Depth Map Super-Resolution
Jont Example-based Depth Map Super-Resoluton Yanje L 1, Tanfan Xue,3, Lfeng Sun 1, Janzhuang Lu,3,4 1 Informaton Scence and Technology Department, Tsnghua Unversty, Bejng, Chna Department of Informaton
More information