Robust Video Watermarking Using Image Normalization, Motion Vector and Perceptual Information
|
|
- Steven Francis
- 5 years ago
- Views:
Transcription
1 Robust Vdeo Watermarkng Usng Image ormalzaton, Moton Vector and Perceptual Informaton Cedllo-Hernández Antono 1, Cedllo-Hernández Manuel 1, akano-myatake Marko 1, García-Vázquez Mreya S. 2 1 Postgraduate Secton of Mechancal and Electrcal Engneerng School, atonal Polytechnc Insttute of Mexco, Mexco Cty, Mexco 2 Research and Development of Dgtal Technology Center, atonal Polytechnc Insttute of Mexco, Tjuana, Mexco Abstract Ths paper proposes a vdeo watermarkng algorthm robust aganst geometrc dstortons, several attacks of sgnal processng and ntentonal common attacks for vdeo. Image normalzaton s used to get geometrc nvarant feature of vdeo frames. Watermark embeddng and detecton process are carred out n the Dscrete Cosne Transform (DCT) doman. Watermark energy s computed adaptvely usng perceptual nformaton and moton vectors, to get major Watermark mperceptblty and robustness. Watermark Imperceptblty s evaluated by conventonal PSR and perceptual vdeo qualty measurement, takng suffcently good vsual qualty. Computer smulaton results show the watermark robustness to common sgnal dstortons such as contamnaton by nose, JPEG compresson, geometrcal dstortons and vdeo common ntentonal attacks: frame droppng, frame swappng and frame averagng, among others. Keywords: Vdeo Watermarkng, Moton Vectors, Image ormalzaton, Block Classfcaton, Perceptual Sensblty 1 Introducton Hgh speed computer networks, the Internet and the World Wde Web have revolutonzed the way n whch dgtal data s dstrbuted. The wdespread and easy accesses to multmeda contents and the possblty to make unlmted copy wthout loss of consderable fdelty arouse the need of dgtal rghts management. Dgtal watermarkng s consdered as a technology that can serve ths purpose. A large number of watermarkng schemes have been proposed to hde copyrght marks and other nformaton n dgtal mages, vdeo, audo and other multmeda objects [1]. Usually watermarkng algorthms for stll mages are not effcent when these are used n vdeo sequences, because they are not consdered the temporal redundancy of vdeo sgnal and common attacks to the vdeo sgnals [2]. In the case of a watermarkng system for copyrght protecton, the embedded watermark should be mperceptble and robust aganst common attacks such as croppng, contamnaton by nose, flterng and compresson [3]. In addton to the requrement of mperceptblty and robustness technques, furthermore the vdeo watermarkng must satsfy the followng requrements: a blnd detecton,.e. the detecton process does not requre the orgnal vdeo sgnal and the conservaton of fle sze after the nserton of the watermark. Due to the redundancy exstng n the vdeo sequences, some ntentonal attacks, such as frame droppng, frame swappng and frame averagng, that try to destroy the embedded watermark should be consdered n desgn of vdeo watermarkng algorthms [3]. In ths paper, we propose a vdeo watermarkng algorthm based on mage normalzaton, n whch a watermark pattern s normalzed usng the same geometrc factors obtaned n the mage normalzaton. The proposed algorthm uses three crtera based on Human Vsual System (HVS) to nsert a robust watermark, preservng ther mperceptblty. The frst crteron s based on the senstvty of the HVS to dfferent basc color channels, the second one s based on spatal defcency of HVS, whch s determned usng the texture and edge maskng proposed by [4], and the last crteron s based on tracng defcency of the HVS n the regons wth hgh moton speed n vdeo sequences, whch s determned usng moton vector. The computer smulaton results show the watermark mperceptblty and the robustness aganst common sgnal processng, geometrcal dstortons and some ntentonal attacks to the vdeo sequence. The watermark mperceptblty s measured usng the Peak Sgnal ose Raton (PSR) and a qualty assessment based on HVS proposed by [5]. The rest of the paper s organzed as follows: In Secton 2, the proposed system s descrbed n detal and the evaluaton results of the proposed system are shown n Secton 3. Fnally Secton 4 provdes some conclusons. 2 Proposed system The proposed vdeo watermarkng system conssts of several procedures, such as mage normalzaton, block classfcaton usng the perceptual nformaton based on HVS, watermark embeddng and extracton. In ths secton, each procedure wll be descrbed.
2 2.1 Image normalzaton The normalzaton procedure of a mage f(x,y) conssts of the followng steps [6]: 1) Center the mage f(x,y), through the Affne Transformaton as gven by: x y a a x = A d y 1 0 where matrx A d = and the vector 1 d = wth 0 1 d2 m10 m01 d1 =, d2 m = 00 m (2) 00 where m 10,m 01 and m 00 are the moments of f(x,y), and d 1, d 2 are the densty center of f(x,y) [7]. Ths step elmnates the translaton effect by assgnng the center of the normalzed mage at the densty center of the mage. The resultng centered mage s denoted as f 1 (x,y). 2) Apply a shearng transform to f 1 (x,y) n the x-drecton 1 usng the matrx β A x =. The resultng mage s denoted 0 1 by f 2 (x,y). Ths step elmnates shearng effect n the x- drecton. (1) (a) Fgure 1 (a) Orgnal mage (b) ormalzed verson from (a). These crtera are based on the less senstvty of the HVS to the blue channel and the detal regons such as texture regon, and also t s less ablty to track a regon wth hgh speed moton. Accordng to the human eye structure, the retna contans two types of photoreceptors, rods and cones. The last one s dvded n 3, each senstve to the three basc colors there are three types of cones that react wth the three basc colors: Red, Green and Blue. The number of blue-senstve cones s 30 tmes less than the number of cones senstve to the other two colors [10]. Fgure 2 shows the fracton of lght absorbed by each of three types of cones, here R, G, B represents the cones senstve to red, green and blue, respectvely. Ths fgure shows that the HVS s less senstve to blue channel than the other two basc color channels (Red and Green). (b) 3) Apply a shearng transform to f 2 (x,y) n the y-drecton 1 0 usng the matrx A y =. The resultng mage s denoted γ 1 by f 3 (x,y). Ths step elmnates shearng effect n the y- drecton. 4) Scale f 3 (x,y) n both x and y drectons wth the matrx α 0 A s = and the resultng mage s denoted by f 4 (x,y). Ths 0 δ step elmnates the scalng effect by forcng the normalzed mage to a standard sze. The fnal mage f 4 (x,y) s the normalzed verson. It s mportant to denote that each step n the normalzaton procedure s nvertble, whch allows us to convert the normalzed mage back to ts orgnal verson. The determnaton of transformaton parameters β, γ, α and δ, assocated wth the transforms A x, A y, and A s are shown n detal n [9]. In the fgure 1, an example of the orgnal mage and the normalzed verson s shown. 2.2 Perceptual Informaton The proposed system uses three crtera, employed prevously n [8], to embed an mperceptble and robust watermark n a vdeo sgnal. Fgure 2 Senstvty of the three types of cones R (red), G (green) and B (blue). [13] The proposed algorthm embeds the watermark n the blue channel, takng advantage of the weakness of HVS. The blue channel of each vdeo frame s dvded nto blocks wth 8x8 pxels and then the 2D Dscrete Cosne Transform (DCT) s appled n each block. In the DCT doman, each block s classfed nto three categores: plan block, edge block and texture block accordng to the algorthm proposed n [4]. Fgure 3 shows the result of applyng the block classfcaton algorthm to a vdeo frame.
3 (a) Fgure 3 Block classfcaton (a) vdeo frame and (b) classfcaton of blocks, black blocks are plan, gray blocks are textures and whte blocks are edges, respectvely. (b) embeddng energy to the vdeo frame s determned expermentally usng 10 vdeo sequences, whch s shown n Table 1. In Table 1, B 8 s the block of 8x8 pxels n vdeo frames and MB MOTIO s the macro-block wth hgh-speed moton, each macro-block contans 4 blocks B 8. Ths assgnaton of the watermark embeddng energy s appled to the normalzed vdeo frames generated n the mage normalzaton process. Fgure 5 shows an example of the classfcaton of blocks together wth the watermark embeddng energy determned usng the crtera mentoned above. The last crteron s based on defcency of HVS to follow regons wth hgh-speed moton. To classfy regons of vdeo frame by moton speed, the moton compensaton predcton, whch s a powerful tool to reduce temporal redundancy n MPEG codng, can be used. The macro-blocks (MB) wth larger moton vector are classfed as regons of hgh-speed movement, n whch a watermark wth greater energy can be embedded wthout causng degradaton n the vdeo sgnal. The magntude of the moton vector s calculated usng equaton (3). Mmv mvh + mvv, = 1... = (3) 2 2 MB Where mvh 2,mvv 2 are the horzontal and vertcal components of moton vector of the th macro-block and MB s the total number of macro-blocks. To determne the regon wth a hgh-speed moton, we ntroduce a threshold value Th_mv and then each macro-block s classfed as hghspeed moton block and low-speed moton block (or wthout movement) as follows: If If Mmv < Th_mv then block are low-speed Mmv > Th_mv then block are hgh-speed Fgure 4 (a), (b)two consecutve frames of vdeo and (c) and (d) moton vectors before and after classfcaton Table 1 Watermark embeddng energy Where threshold Th_mv s calculated by equaton (4) 1 MB Th _ mv = Mmv (4) MB = 1 B B 8 8 Frame MB MOTIO B 8 Bplan B8 Bedge B8 Btex Fgure 4 shows two consecutve vdeo frames (Fgure 4 (a) and (b)) and the moton vectors before and after classfcaton (Fgure 4 (c) and (d), respectvely), the macro-blocks wth arrows of some orentaton are classfed as hgh-speed blocks and blocks wth black pont are consdered as low-speed blocks (or wthout movement). 2.3 Adequate watermark energy assgnment Combnng the last two crtera: the classfcaton of blocks (8x8) usng DCT coeffcents and the classfcaton of macro-blocks (16x16) usng moton vector, the watermark 2.4 Watermark embeddng process The watermark generaton and embeddng process are descrbed as follows: 1) Apply the normalzaton procedure to the orgnal mage to get the normalzed mage. 2) Dvde the normalzed mage n blocks of 8x8 pxels and get the watermark energy for every block mentoned n 2.3.
4 The result of ths operaton s a watermark embeddng energy. Iw = Io + ( WP α2) where Io and I w are orgnal and watermarked mage, and WP s watermark pattern generated by step 9. (5) The whole procedure s equvalent to embeddng the watermark nto the DCT doman of the normalzed mage. The adequate watermark embeddng energy allows embeddng strong watermark wthout causng any vsual dstorton to watermarked mage. The fgure 6 shows the watermark generaton and embeddng procedures. Fgure 5 An example of the embeddng watermark energy to each block 3) Generate the 2-D pseudo-random pattern R of the same sze of orgnal mage wth any key. Because ths pattern s only used as the support of the watermark pattern, any key can be used and t s not necessary to save. 4) Generate a watermark vector W [ w1, w2,... w n ] user s secret key, where w = { 1, 1}, =1..n. = usng a 5) Create a mask mage M, whch s a bnary mage, takng 1s wthn normalzed mage area and 0s elsewhere, to generate masked pseudo-random pattern MR wth same scale and rotaton factors as these of the normalzed mage. 6) Watermark vector W s multpled by a watermark energy vector determned by the prevous secton. 7) Dvde the watermark vector W nto groups of L elements, where L must be one number from 1 to 22 (number of coeffcents that compose the mddle frequency range n DCT doman), thus, for example, f L = 5 and sze of W s 500, the number of groups = 500 / 5 = ) The coeffcents n mddle frequency range of each block are replaced wth L elements of each group of watermark sequence. Then apply the IDCT to each watermarked block to get watermarked pattern MR. W 9) Apply the nverse normalzaton to the watermarked pattern MRW to get watermarked pattern WP wth same sze as the cover mage. 10) WP s embedded nto the orgnal mage addtvely wth a gan factor α 2. Ths produces the watermarked mage. Fgure 6 Watermark embeddng process 2.5 Watermark Extracton The process of the watermark detecton s as follows: 1) Apply the mage normalzaton procedure to watermarked mage to get the normalzed watermarked mage. 2) Apply the DCT to each block of the normalzed watermarked mage, the mddle range of the DCT coeffcents CW are extracted. From CW the watermark vector W ˆ s extracted by (6). [ w1 w2 w 1 w] sgn( CW ) Wˆ =,,, wk = k where w k s the extracted watermark sequence (L bts) from k-th block and sgn s a sgn functon. (6)
5 3 Expermental Results To evaluate the proposed system, we used 20 vdeo sequences wth YUV-CIF format at 30 FPS. All vdeo data have at least 150 frames whch are avalable n [11]. The proposed system s evaluated from the watermark mperceptblty and robustness ponts of vew. 3.1 Watermark mperceptblty We evaluate watermark mperceptblty of the proposed system usng numercal evaluaton: Peak Sgnal ose Rato (PSR) and perceptual objectve evaluaton proposed n [5]. Fgure 7 shows the PSR value calculated between orgnal and watermarked frames n the proposed method. Perceptual qualty assessment proposed n [5] evaluates vdeo qualty n perceptual manner, whch gves the qualty ndex calculated usng mage structure and moton vector. The qualty ndex s n range [0.0,1.0], when vdeo sequence under evaluaton s numercally dentcal wth ts orgnal verson, ts qualty ndex s 1.0. The qualty ndex of the watermarked vdeo sequence generated by the proposed algorthm s approxmately 0.96, whch means that degradaton of the watermarked vdeo qualty s mnmum by HVS. droppng s drop some frames from vdeo sequence, frame swappng s nterchange two frames and frame averagng s generate one frame takng the average of some consecutve frames. Due to that watermark sequence s embedded through temporal vdeo frames n the proposed algorthm; embedded watermark s robust aganst these types of attacks. Table 3 shows the performance comparson of our proposed system and the recently reported system by Soumk whch present an nvestgaton smlar to our proposal because t consders the content of vdeo as a sequence of mages and the watermark s nserted frame by frame wth an nvsble watermarkng scheme, further extracton of the watermark s blnd and s reported as a method extremely approprate n areas such as copyrght and fngerprntng [12]. Table 2. The embedded watermark sgnal s suffcently robust to geometrcal dstortons and common sgnal processng.. Attack Watermark frame attack BER Geometrc Rotaton Aspect Rato (1:2) Gaussan nose Fgure 7 Peak Sgnal to ose Rato of the proposed method. Impulsve nose Watermark Robustness To evaluate watermark robustness of the proposed algorthm, the watermarked vdeo sequences are attacked by some common sgnal and mage processng, such as codfcaton rate change, nose contamnaton by mpulsve nose and Gaussan nose, geometrcal dstortons, frame droppng, frame swappng and frame averagng. The results are shown n Table 2, n whch the bt-error-rate (BER) of the extracted watermark bt sequence respect to the embedded one s shown. In all cases the values correspond to the average values usng the 20 vdeo sequences wth YUV-CIF format. Frame droppng, frame swappng and frame averagng are ntentonal attacks for vdeo sequence. Frame MPEG Codfcaton (50% qualty) 4 Conclusons In ths paper, we proposed a vdeo watermarkng algorthm based on mage normalzaton, n whch watermark embeddng and detecton process are carred out n the
6 Dscrete Cosne Transform (DCT) doman. The watermark extracton has done blndly.e., nether the watermark nor the orgnal vdeo s needed at the tme of the watermark extracton. The proposed algorthm uses three crtera based on Human Vsual System (HVS) to embed a robust watermark, preservng ther mperceptblty. These crtera are based on the senstvty of the HVS to dfferent basc color channels, the texture and edge maskng classfcaton and the estmaton of the moton vectors n vdeo sequences. The computer smulaton results show the watermark mperceptblty and the robustness of the scheme aganst common sgnal processng, geometrcal dstortons and some ntentonal attacks to the vdeo sequence. Table 3. Robustness comparson between the proposed vdeo watermarkng and Soumk method s [12] Attack Method proposed Soumk method s [12] Geometrc Rotaton Detected - Aspect Rato Detected - Gaussan nose Detected - Impulsve nose Detected - MPEG Codfcaton Detected - Frame Droppng Detected Detected Frame Swappng Detected Detected Frame Averagng Detected Detected 5 References [1] Sourav Bhattacharya, T. Chattopadhyay and Arpan Pal, A Survey on Dfferent Vdeo Watermarkng Technques and Comparatve Analyss wth Reference to H.264/AVC. IEEE 10th Internatonal Symposum on Consumer Electroncs, June 2006, pp.1-6. Elsever Sgnal Processng: Image Communcaton, vol. 19, pp , 2004 [6] M. Cedllo-Hernández, M. akano-myatake and H. Perez-Meana, Robust Watermarkng Technque based on Image ormalzaton (Spansh), Revsta Facultad de Ingenería Unversdad de Antoqua, no. 52, pp , Marzo [7] M. K. Hu, Vsual Pattern Recognton by Moment Invarants, IRE Trans. on Informaton Theory, vol. 8, pp , [8] A. Cedllo, M. akano, H. Perez and L. Rojas, Watermarkng Technque for MPEG Vdeo usng Vsual Sensblty and Moton Vector (Spansh), Revsta Informacón Tecnología, vol. 19, no. 2, pp , [9] P. Dong, J. B. Brankov,. P. Galatsanos, Y. Yang and F. Davone, Dgtal Watermarkng robust to geometrc dstortons,, IEEE Trans. on Image Processng, vol. 14, no. 12, pp , [10] K. Sayood, Introducton to Data Compresson, 2nd Edton, Morgan Kaufmann Publshers, [11] [12] Soumk Das, Pradosh Bandyopadhyay, Shauvk Paul, Chaudhur Atal and Monalsa Banerjee, An Invsble Color Watermarkng Framework for Uncompressed Vdeo Authentcaton, Internatonal Journal of Computer Applcatons, vol. 1, no. 11, pp , February [13] Font-Color-Is-Best-For-Eyes [2] M. Swanson, B. Zhu y A. Tewfk, Mult-resoluton scene-based vdeo watermarkng usng perceptual models, IEEE J. Select areas Communcaton, vol. 16, no. 4, pp , May [3] Wolfgang, R.B, C.I. Podlchuk y E.J. Delp, Perceptual watermarks for dgtal mages and vdeo, Proceedng IEEE, vol. 87, no. 7, pp , [4] H.Y. Tong an d A.. Venetsanopoulos, A Perceptual model for JPEG applcatons based on block classfcaton, texture maskng and lumnance maskng, Int. Conf. on Image Processng (ICIP), vol. 3, pp , [5] Z. Wang, L. Lu and A. C. Bovk, Vdeo qualty assessment based on structural dstorton measurement,
Hybrid Non-Blind Color Image Watermarking
Hybrd Non-Blnd Color Image Watermarkng Ms C.N.Sujatha 1, Dr. P. Satyanarayana 2 1 Assocate Professor, Dept. of ECE, SNIST, Yamnampet, Ghatkesar Hyderabad-501301, Telangana 2 Professor, Dept. of ECE, AITS,
More informationA Fast Content-Based Multimedia Retrieval Technique Using Compressed Data
A Fast Content-Based Multmeda Retreval Technque Usng Compressed Data Borko Furht and Pornvt Saksobhavvat NSF Multmeda Laboratory Florda Atlantc Unversty, Boca Raton, Florda 3343 ABSTRACT In ths paper,
More informationA Hybrid Semi-Blind Gray Scale Image Watermarking Algorithm Based on DWT-SVD using Human Visual System Model
A Hybrd Sem-Blnd Gray Scale Image Watermarkng Algorthm Based on DWT-SVD usng Human Vsual System Model Rajesh Mehta r Scence & Engneerng, USICT Guru Gobnd Sngh Indrarprastha Unversty New Delh, Inda rajesh00ust@gmal.com
More informationA NEW AUDIO WATERMARKING METHOD BASED
A NEW AUDIO WATERMARKING METHOD BASED ON DISCRETE COSINE TRANSFORM WITH A GRAY IMAGE Mohammad Ibrahm Khan 1, Md. Iqbal Hasan Sarker 2, Kaushk Deb 3 and Md. Hasan Furhad 4 1,2,3 Department of Computer Scence
More informationKey-Selective Patchwork Method for Audio Watermarking
Internatonal Journal of Dgtal Content Technology and ts Applcatons Volume 4, Number 4, July 2010 Key-Selectve Patchwork Method for Audo Watermarkng 1 Ch-Man Pun, 2 Jng-Jng Jang 1, Frst and Correspondng
More informationA Fast Visual Tracking Algorithm Based on Circle Pixels Matching
A Fast Vsual Trackng Algorthm Based on Crcle Pxels Matchng Zhqang Hou hou_zhq@sohu.com Chongzhao Han czhan@mal.xjtu.edu.cn Ln Zheng Abstract: A fast vsual trackng algorthm based on crcle pxels matchng
More informationContent Based Image Retrieval Using 2-D Discrete Wavelet with Texture Feature with Different Classifiers
IOSR Journal of Electroncs and Communcaton Engneerng (IOSR-JECE) e-issn: 78-834,p- ISSN: 78-8735.Volume 9, Issue, Ver. IV (Mar - Apr. 04), PP 0-07 Content Based Image Retreval Usng -D Dscrete Wavelet wth
More informationEnhanced Watermarking Technique for Color Images using Visual Cryptography
Informaton Assurance and Securty Letters 1 (2010) 024-028 Enhanced Watermarkng Technque for Color Images usng Vsual Cryptography Enas F. Al rawashdeh 1, Rawan I.Zaghloul 2 1 Balqa Appled Unversty, MIS
More informationA Binarization Algorithm specialized on Document Images and Photos
A Bnarzaton Algorthm specalzed on Document mages and Photos Ergna Kavalleratou Dept. of nformaton and Communcaton Systems Engneerng Unversty of the Aegean kavalleratou@aegean.gr Abstract n ths paper, a
More informationIAJIT First Online Publication
Content Protecton n Vdeo Data Based on Robust Dgtal Watermarkng Resstant to Intentonal and Unntentonal Attacks Mad Masoum and Shervn Amr Department of Electrcal Engneerng, Islamc Azad Unversty Qazvn Branch,
More informationDigital Video Watermarking using Discrete Wavelet Transform and Principal Component Analysis
Internatonal Journal of Wsdom Based Computng, Vol. 1 (2), August 2011 7 Dgtal Vdeo Watermarkng usng Dscrete Wavelet Transform and Prncpal Component Analyss Sanjana Snha, Prajnat Bardhan, Swarnal Pramanck,
More informationParallelism for Nested Loops with Non-uniform and Flow Dependences
Parallelsm for Nested Loops wth Non-unform and Flow Dependences Sam-Jn Jeong Dept. of Informaton & Communcaton Engneerng, Cheonan Unversty, 5, Anseo-dong, Cheonan, Chungnam, 330-80, Korea. seong@cheonan.ac.kr
More informationShape-adaptive DCT and Its Application in Region-based Image Coding
Internatonal Journal of Sgnal Processng, Image Processng and Pattern Recognton, pp.99-108 http://dx.do.org/10.14257/sp.2014.7.1.10 Shape-adaptve DCT and Its Applcaton n Regon-based Image Codng Yamn Zheng,
More informationAn Image Fusion Approach Based on Segmentation Region
Rong Wang, L-Qun Gao, Shu Yang, Yu-Hua Cha, and Yan-Chun Lu An Image Fuson Approach Based On Segmentaton Regon An Image Fuson Approach Based on Segmentaton Regon Rong Wang, L-Qun Gao, Shu Yang 3, Yu-Hua
More informationCoding Artifact Reduction Using Edge Map Guided Adaptive and Fuzzy Filter
MEL A MITSUBISHI ELECTIC ESEACH LABOATOY http://www.merl.com Codng Artfact educton Usng Edge Map Guded Adaptve and Fuzzy Flter Hao-Song Kong Yao Ne Anthony Vetro Hufang Sun Kenneth E. Barner T-2004-056
More informationRobust Watermarking for Text Images Based on Arnold Scrambling and DWT-DCT
Internatonal Conference on Mechatroncs Electronc Industral and Control Engneerng (MEIC 015) Robust Watermarkng for Text Images Based on Arnold Scramblng and DWT-DCT Fan Wu College of Informaton Scence
More informationImprovement of Spatial Resolution Using BlockMatching Based Motion Estimation and Frame. Integration
Improvement of Spatal Resoluton Usng BlockMatchng Based Moton Estmaton and Frame Integraton Danya Suga and Takayuk Hamamoto Graduate School of Engneerng, Tokyo Unversty of Scence, 6-3-1, Nuku, Katsuska-ku,
More informationSemi-Fragile Watermarking Scheme for Authentication of JPEG Images
Tamkang Journal of Scence and Engneerng, Vol. 10, No 1, pp. 5766 (2007) 57 Sem-Fragle Watermarkng Scheme for Authentcaton of JPEG Images Chh-Hung n 1 *, Tung-Shh Su 2 and Wen-Shyong Hseh 2,3 1 Department
More informationA Comparison between Digital Images Watermarking in Tow Different Color Spaces Using DWT2*
A Comparson between Dgtal s ng n Tow Dfferent Color Spaces Usng DWT* Mehd Khall Natonal Academy of Scence of Armena Yerevan, Armena e-mal: khall.mehd@yahoo.com ABSTRACT A novel dgtal watermarkng for ownershp
More informationKEYWORDS: Digital Image Watermarking, Discrete Wavelet Transform, General Regression Neural Network, Human Visual System. 1.
An Adaptve Dgtal Image Watermarkng Based on Image Features n Dscrete Wavelet Transform Doman and General Regresson Neural Network Ayoub Taher Group of IT Engneerng, Payam Noor Unversty, Broujen, Iran ABSTRACT:
More informationEdge Detection in Noisy Images Using the Support Vector Machines
Edge Detecton n Nosy Images Usng the Support Vector Machnes Hlaro Gómez-Moreno, Saturnno Maldonado-Bascón, Francsco López-Ferreras Sgnal Theory and Communcatons Department. Unversty of Alcalá Crta. Madrd-Barcelona
More informationFuzzy Filtering Algorithms for Image Processing: Performance Evaluation of Various Approaches
Proceedngs of the Internatonal Conference on Cognton and Recognton Fuzzy Flterng Algorthms for Image Processng: Performance Evaluaton of Varous Approaches Rajoo Pandey and Umesh Ghanekar Department of
More informationDetection of an Object by using Principal Component Analysis
Detecton of an Object by usng Prncpal Component Analyss 1. G. Nagaven, 2. Dr. T. Sreenvasulu Reddy 1. M.Tech, Department of EEE, SVUCE, Trupath, Inda. 2. Assoc. Professor, Department of ECE, SVUCE, Trupath,
More informationA Hybrid Digital Image Watermarking based on Discrete Wavelet Transform, Discrete Cosine Transform, and General Regression Neural Network
A Hybrd Dgtal Image Watermarkng based on Dscrete Wavelet Transform, Dscrete Cosne Transform, and General Regresson Neural Network Ayoub Taher ; ABSTRACT In ths paper, a new hybrd dgtal watermarkng technque
More informationSkew Angle Estimation and Correction of Hand Written, Textual and Large areas of Non-Textual Document Images: A Novel Approach
Angle Estmaton and Correcton of Hand Wrtten, Textual and Large areas of Non-Textual Document Images: A Novel Approach D.R.Ramesh Babu Pyush M Kumat Mahesh D Dhannawat PES Insttute of Technology Research
More informationAdaptive digital watermarking of images using Genetic Algorithm
Adaptve dgtal watermarkng of mages usng Genetc Algorthm Bushra Skander, Muhammad Ishtaq, M. Arfan Jaffar, Muhammad Tarq, Anwar M. Mrza Department of Computer Scence, Natonal Unversty of Computer and Emergng
More informationClassifier Selection Based on Data Complexity Measures *
Classfer Selecton Based on Data Complexty Measures * Edth Hernández-Reyes, J.A. Carrasco-Ochoa, and J.Fco. Martínez-Trndad Natonal Insttute for Astrophyscs, Optcs and Electroncs, Lus Enrque Erro No.1 Sta.
More informationA Lossless Watermarking Scheme for Halftone Image Authentication
IJCSNS Internatonal Journal of Computer Scence and Network Securty, VOL.6 No.2B, February 2006 147 A Lossless Watermarkng Scheme for Halftone Image Authentcaton Jeng-Shyang Pan, Hao Luo, and Zhe-Mng Lu,
More informationCorner-Based Image Alignment using Pyramid Structure with Gradient Vector Similarity
Journal of Sgnal and Informaton Processng, 013, 4, 114-119 do:10.436/jsp.013.43b00 Publshed Onlne August 013 (http://www.scrp.org/journal/jsp) Corner-Based Image Algnment usng Pyramd Structure wth Gradent
More informationQuantization Noise Power Injection In Subband Audio Coding Using Low Selectivity Filter Banks
Quantzaton Nose Power Injecton In Subband Audo Codng Usng Low Selectvty Flter Banks D. ARTÍNEZ -UÑOZ, N. RUIZ-REYES, P. VERA-CANDEAS, P.J. RECHE-LÓPEZ, J. CURPIÁN-ALONSO Departamento de Electrónca Unversdad
More informationImage Representation & Visualization Basic Imaging Algorithms Shape Representation and Analysis. outline
mage Vsualzaton mage Vsualzaton mage Representaton & Vsualzaton Basc magng Algorthms Shape Representaton and Analyss outlne mage Representaton & Vsualzaton Basc magng Algorthms Shape Representaton and
More informationInformation Hiding Watermarking Detection Technique by PSNR and RGB Intensity
www..org 3 Informaton Hdng Watermarkng Detecton Technque by PSNR and RGB Intensty 1 Neha Chauhan, Akhlesh A. Waoo, 3 P. S. Patheja 1 Research Scholar, BIST, Bhopal, Inda.,3 Assstant Professor, BIST, Bhopal,
More informationA Robust Webpage Information Hiding Method Based on the Slash of Tag
Advanced Engneerng Forum Onlne: 2012-09-26 ISSN: 2234-991X, Vols. 6-7, pp 361-366 do:10.4028/www.scentfc.net/aef.6-7.361 2012 Trans Tech Publcatons, Swtzerland A Robust Webpage Informaton Hdng Method Based
More informationTsinghua University at TAC 2009: Summarizing Multi-documents by Information Distance
Tsnghua Unversty at TAC 2009: Summarzng Mult-documents by Informaton Dstance Chong Long, Mnle Huang, Xaoyan Zhu State Key Laboratory of Intellgent Technology and Systems, Tsnghua Natonal Laboratory for
More informationAn Image Compression Algorithm based on Wavelet Transform and LZW
An Image Compresson Algorthm based on Wavelet Transform and LZW Png Luo a, Janyong Yu b School of Chongqng Unversty of Posts and Telecommuncatons, Chongqng, 400065, Chna Abstract a cylpng@63.com, b y27769864@sna.cn
More informationRobust Blind Video Watermark Algorithm in Transform Domain Combining with 3D Video Correlation
JOURNAL OF MULTIMEDIA, VOL. 8, NO. 2, APRIL 2013 161 Robust Blnd Vdeo Watermark Algorthm n Transform Doman Combnng wth 3D Vdeo Correlaton DING Ha-yang 1,3 1. Informaton Securty Center, Bejng Unversty of
More informationSLAM Summer School 2006 Practical 2: SLAM using Monocular Vision
SLAM Summer School 2006 Practcal 2: SLAM usng Monocular Vson Javer Cvera, Unversty of Zaragoza Andrew J. Davson, Imperal College London J.M.M Montel, Unversty of Zaragoza. josemar@unzar.es, jcvera@unzar.es,
More informationA Desynchronization Resilient Watermarking Scheme
A Desynchronzaton Reslent Watermarkng Scheme Xaojun Q and J Q Department of Computer Scence, Utah State Unversty, Logan, UT 84322-4205 Xaojun.Q@usu.edu, jq79@gmal.com Abstract. Ths paper presents a content-based
More informationA Secured Method for Image Steganography Based On Pixel Values
A Secured Method for Image Steganography Based On Pxel Values Tarun Gulat #, Sanskrt Gupta * # Assocate Professor, Electroncs and Communcaton Engneerng Department, MMEC, M.M.U., Mullana, Ambala, Haryana,
More informationIMPLEMENTATION OF QIM BASED AUDIO WATERMARKING USING HYBRID TRANSFORM OF SWT-DCT-SVD METHODS OPTIMIZED WITH GENETIC ALORITHM
IMPLEMENTATION OF QIM BASED AUDIO WATERMARKING USING HYBRID TRANSFORM OF SWT-DCT-SVD METHODS OPTIMIZED WITH GENETIC ALORITHM Ryan Amnullah 1, Gelar Budman 2, Irma Saftr 3 1, 2, 3 FakultasTeknk Elektro,
More informationCluster Analysis of Electrical Behavior
Journal of Computer and Communcatons, 205, 3, 88-93 Publshed Onlne May 205 n ScRes. http://www.scrp.org/ournal/cc http://dx.do.org/0.4236/cc.205.350 Cluster Analyss of Electrcal Behavor Ln Lu Ln Lu, School
More informationIdentify the Attack in Embedded Image with Steganalysis Detection Method by PSNR and RGB Intensity
Internatonal Journal of Computer Systems (ISSN: 394-1065), Volume 03 Issue 07, July, 016 Avalable at http://www.jcsonlne.com/ Identfy the Attack n Embedded Image wth Steganalyss Detecton Method by PSNR
More informationTN348: Openlab Module - Colocalization
TN348: Openlab Module - Colocalzaton Topc The Colocalzaton module provdes the faclty to vsualze and quantfy colocalzaton between pars of mages. The Colocalzaton wndow contans a prevew of the two mages
More informationPalmprint Feature Extraction Using 2-D Gabor Filters
Palmprnt Feature Extracton Usng 2-D Gabor Flters Wa Kn Kong Davd Zhang and Wenxn L Bometrcs Research Centre Department of Computng The Hong Kong Polytechnc Unversty Kowloon Hong Kong Correspondng author:
More informationThe Research of Ellipse Parameter Fitting Algorithm of Ultrasonic Imaging Logging in the Casing Hole
Appled Mathematcs, 04, 5, 37-3 Publshed Onlne May 04 n ScRes. http://www.scrp.org/journal/am http://dx.do.org/0.436/am.04.584 The Research of Ellpse Parameter Fttng Algorthm of Ultrasonc Imagng Loggng
More informationA New Feature of Uniformity of Image Texture Directions Coinciding with the Human Eyes Perception 1
A New Feature of Unformty of Image Texture Drectons Concdng wth the Human Eyes Percepton Xng-Jan He, De-Shuang Huang, Yue Zhang, Tat-Mng Lo 2, and Mchael R. Lyu 3 Intellgent Computng Lab, Insttute of Intellgent
More informationR s s f. m y s. SPH3UW Unit 7.3 Spherical Concave Mirrors Page 1 of 12. Notes
SPH3UW Unt 7.3 Sphercal Concave Mrrors Page 1 of 1 Notes Physcs Tool box Concave Mrror If the reflectng surface takes place on the nner surface of the sphercal shape so that the centre of the mrror bulges
More informationA PATTERN RECOGNITION APPROACH TO IMAGE SEGMENTATION
1 THE PUBLISHING HOUSE PROCEEDINGS OF THE ROMANIAN ACADEMY, Seres A, OF THE ROMANIAN ACADEMY Volume 4, Number 2/2003, pp.000-000 A PATTERN RECOGNITION APPROACH TO IMAGE SEGMENTATION Tudor BARBU Insttute
More informationHigh Payload Reversible Data Hiding Scheme Using Difference Segmentation and Histogram Shifting
JOURNAL OF ELECTRONIC SCIENCE AND TECHNOLOGY, VOL. 11, NO. 1, MARCH 2013 9 Hgh Payload Reversble Data Hdng Scheme Usng Dfference Segmentaton and Hstogram Shftng Yung-Chen Chou and Huang-Chng L Abstract
More informationA FIBONACCI LSB DATA HIDING TECNIQUE
A FIBONACCI LSB DATA HIDING TECNIQUE Dego De Luca Pcone (*)(**), Federca Battst (*)(**), Marco Carl (*), Jaakko Astola (**), and Karen Egazaran (**) (*) AE Department, Unverst of Roma TRE, Rome, Ital,
More informationArticle Reversible Dual-Image-Based Hiding Scheme Using Block Folding Technique
Artcle Reversble Dual-Image-Based Hdng Scheme Usng Block Foldng Technque Tzu-Chuen Lu, * and Hu-Shh Leng Department of Informaton Management, Chaoyang Unversty of Technology, Tachung 4349, Tawan Department
More informationEnhanced AMBTC for Image Compression using Block Classification and Interpolation
Internatonal Journal of Computer Applcatons (0975 8887) Volume 5 No.0, August 0 Enhanced AMBTC for Image Compresson usng Block Classfcaton and Interpolaton S. Vmala Dept. of Comp. Scence Mother Teresa
More informationAccounting for the Use of Different Length Scale Factors in x, y and z Directions
1 Accountng for the Use of Dfferent Length Scale Factors n x, y and z Drectons Taha Soch (taha.soch@kcl.ac.uk) Imagng Scences & Bomedcal Engneerng, Kng s College London, The Rayne Insttute, St Thomas Hosptal,
More informationUsing Fuzzy Logic to Enhance the Large Size Remote Sensing Images
Internatonal Journal of Informaton and Electroncs Engneerng Vol. 5 No. 6 November 015 Usng Fuzzy Logc to Enhance the Large Sze Remote Sensng Images Trung Nguyen Tu Huy Ngo Hoang and Thoa Vu Van Abstract
More informationHigh-Boost Mesh Filtering for 3-D Shape Enhancement
Hgh-Boost Mesh Flterng for 3-D Shape Enhancement Hrokazu Yagou Λ Alexander Belyaev y Damng We z Λ y z ; ; Shape Modelng Laboratory, Unversty of Azu, Azu-Wakamatsu 965-8580 Japan y Computer Graphcs Group,
More informationLobachevsky State University of Nizhni Novgorod. Polyhedron. Quick Start Guide
Lobachevsky State Unversty of Nzhn Novgorod Polyhedron Quck Start Gude Nzhn Novgorod 2016 Contents Specfcaton of Polyhedron software... 3 Theoretcal background... 4 1. Interface of Polyhedron... 6 1.1.
More informationAn Optimal Algorithm for Prufer Codes *
J. Software Engneerng & Applcatons, 2009, 2: 111-115 do:10.4236/jsea.2009.22016 Publshed Onlne July 2009 (www.scrp.org/journal/jsea) An Optmal Algorthm for Prufer Codes * Xaodong Wang 1, 2, Le Wang 3,
More informationCOMPLEX WAVELET TRANSFORM-BASED COLOR INDEXING FOR CONTENT-BASED IMAGE RETRIEVAL
COMPLEX WAVELET TRANSFORM-BASED COLOR INDEXING FOR CONTENT-BASED IMAGE RETRIEVAL Nader Safavan and Shohreh Kasae Department of Computer Engneerng Sharf Unversty of Technology Tehran, Iran skasae@sharf.edu
More informationSteganography System using Slantlet Transform
ISSN:43-6999 Journal of Inmaton Communcaton and Intellgence Systems (JICIS) Volume Issue February 06 Steganography System usng Slantlet Transm Ryadh Bassl Abduljabbar Abstract An approach hdng nmaton has
More informationPerformance Analysis of Data Hiding in MPEG-4 AAC Audio *
TSINGHUA SCIENCE AND TECHNOLOGY ISSNll1007-0214ll07/21llpp55-61 Volume 14, Number 1, February 2009 Performance Analyss of Data Hdng n MPEG-4 AAC Audo * XU Shuzheng ( ) **, ZHANG Peng ( ), WANG Pengjun
More informationVideo Denoising Algorithm in Sliding 3D DCT domain
Dmytro Rusanovskyy and Karen Egazaran, ACIVS 2005, Antwerp, Belgum Vdeo Denosng Algorthm n Sldng 3D DCT doman Dmytro Rusanovskyy and Karen Egazaran Insttute of Sgnal Processng Tampere Unversty of Technology,
More informationA Background Subtraction for a Vision-based User Interface *
A Background Subtracton for a Vson-based User Interface * Dongpyo Hong and Woontack Woo KJIST U-VR Lab. {dhon wwoo}@kjst.ac.kr Abstract In ths paper, we propose a robust and effcent background subtracton
More informationRobust Spread Spectrum Based Digital Video Watermarking Scheme in Frequency Domain Nisha Chaudhary 1 Savita Shivani 2
IJSRD Internatonal Journal for Scentfc Research & Development Vol. 2, Issue 6, 2 ISSN (onlne): 23263 Robust Spread Spectrum Based Dgtal Vdeo Watermarkng Scheme n Frequency Doman Nsha Chaudhary Savta Shvan
More informationResearch of Multiple Text Watermarks Technique in Electric Power System Texts
Sensors & Transducers 203 by IFSA http://www.sensorsportal.com Research of Multple Text atermarks Technque n Electrc Power System Texts Xao-X XING, Qng CHEN, 2 Lan-X FU School of Optcal-Electrcal and Computer
More informationProblem Definitions and Evaluation Criteria for Computational Expensive Optimization
Problem efntons and Evaluaton Crtera for Computatonal Expensve Optmzaton B. Lu 1, Q. Chen and Q. Zhang 3, J. J. Lang 4, P. N. Suganthan, B. Y. Qu 6 1 epartment of Computng, Glyndwr Unversty, UK Faclty
More informationVideo Watermarking Algorithm Based on Relative Relationship of DCT Coefficients
756 JOURAL OF COPUTERS, VOL. 8, O., OVEBER 03 Vdeo Watermarkng Algorthm Based on Relatve Relatonshp of DCT Coeffcents Cheng ngzh, Du Yanpng, Wang Yan Bejng Insttute of Graphc Communcaton, Bejng, Chna Emal:
More informationAnalysis of Continuous Beams in General
Analyss of Contnuous Beams n General Contnuous beams consdered here are prsmatc, rgdly connected to each beam segment and supported at varous ponts along the beam. onts are selected at ponts of support,
More informationBrushlet Features for Texture Image Retrieval
DICTA00: Dgtal Image Computng Technques and Applcatons, 1 January 00, Melbourne, Australa 1 Brushlet Features for Texture Image Retreval Chbao Chen and Kap Luk Chan Informaton System Research Lab, School
More informationResearch Article High Capacity Reversible Watermarking for Audio by Histogram Shifting and Predicted Error Expansion
e Scentfc World Journal, Artcle ID 656251, 7 pages http://dx.do.org/1.1155/214/656251 Research Artcle Hgh Capacty Reversble Watermarkng for Audo by Hstogram Shftng and Predcted Error Expanson Fe Wang,
More informationExtraction of Uncorrelated Sparse Sources from Signal Mixtures using a. Clustering Method
1 Extracton of Uncorrelated Sparse Sources from Sgnal Mxtures usng a Malcolm Woolfson Clusterng Method Department of Electrcal and Electronc Engneerng, Faculty of Engneerng, Unversty of Nottngham, Nottngham.
More informationMULTISPECTRAL IMAGES CLASSIFICATION BASED ON KLT AND ATR AUTOMATIC TARGET RECOGNITION
MULTISPECTRAL IMAGES CLASSIFICATION BASED ON KLT AND ATR AUTOMATIC TARGET RECOGNITION Paulo Quntlano 1 & Antono Santa-Rosa 1 Federal Polce Department, Brasla, Brazl. E-mals: quntlano.pqs@dpf.gov.br and
More informationEfficient Content Representation in MPEG Video Databases
Effcent Content Representaton n MPEG Vdeo Databases Yanns S. Avrths, Nkolaos D. Doulams, Anastasos D. Doulams and Stefanos D. Kollas Department of Electrcal and Computer Engneerng Natonal Techncal Unversty
More informationNovel Pattern-based Fingerprint Recognition Technique Using 2D Wavelet Decomposition
Mathematcal Methods for Informaton Scence and Economcs Novel Pattern-based Fngerprnt Recognton Technque Usng D Wavelet Decomposton TUDOR BARBU Insttute of Computer Scence of the Romanan Academy T. Codrescu,,
More informationEYE CENTER LOCALIZATION ON A FACIAL IMAGE BASED ON MULTI-BLOCK LOCAL BINARY PATTERNS
P.G. Demdov Yaroslavl State Unversty Anatoly Ntn, Vladmr Khryashchev, Olga Stepanova, Igor Kostern EYE CENTER LOCALIZATION ON A FACIAL IMAGE BASED ON MULTI-BLOCK LOCAL BINARY PATTERNS Yaroslavl, 2015 Eye
More informationCHAPTER 3 ENCODING VIDEO SEQUENCES IN FRACTAL BASED COMPRESSION. Day by day, the demands for higher and faster technologies are rapidly
65 CHAPTER 3 ENCODING VIDEO SEQUENCES IN FRACTAL BASED COMPRESSION 3.1 Introducton Day by day, the demands for hgher and faster technologes are rapdly ncreasng. Although the technologes avalable now are
More informationCompiler Design. Spring Register Allocation. Sample Exercises and Solutions. Prof. Pedro C. Diniz
Compler Desgn Sprng 2014 Regster Allocaton Sample Exercses and Solutons Prof. Pedro C. Dnz USC / Informaton Scences Insttute 4676 Admralty Way, Sute 1001 Marna del Rey, Calforna 90292 pedro@s.edu Regster
More informationSecurity Enhanced Dynamic ID based Remote User Authentication Scheme for Multi-Server Environments
Internatonal Journal of u- and e- ervce, cence and Technology Vol8, o 7 0), pp7-6 http://dxdoorg/07/unesst087 ecurty Enhanced Dynamc ID based Remote ser Authentcaton cheme for ult-erver Envronments Jun-ub
More informationFace Recognition University at Buffalo CSE666 Lecture Slides Resources:
Face Recognton Unversty at Buffalo CSE666 Lecture Sldes Resources: http://www.face-rec.org/algorthms/ Overvew of face recognton algorthms Correlaton - Pxel based correspondence between two face mages Structural
More informationA DCVS Reconstruction Algorithm for Mine Video Monitoring Image Based on Block Classification
1 3 4 5 6 7 8 9 10 11 1 13 14 15 16 17 18 19 0 1 Artcle A DCVS Reconstructon Algorthm for Mne Vdeo Montorng Image Based on Block Classfcaton Xaohu Zhao 1,, Xueru Shen 1,, *, Kuan Wang 1, and Wanme L 1,
More informationA fast algorithm for color image segmentation
Unersty of Wollongong Research Onlne Faculty of Informatcs - Papers (Arche) Faculty of Engneerng and Informaton Scences 006 A fast algorthm for color mage segmentaton L. Dong Unersty of Wollongong, lju@uow.edu.au
More informationA Clustering Algorithm for Key Frame Extraction Based on Density Peak
Journal of Computer and Communcatons, 2018, 6, 118-128 http://www.scrp.org/ournal/cc ISSN Onlne: 2327-5227 ISSN Prnt: 2327-5219 A Clusterng Algorthm for Key Frame Extracton Based on Densty Peak Hong Zhao
More informationLoad Balancing for Hex-Cell Interconnection Network
Int. J. Communcatons, Network and System Scences,,, - Publshed Onlne Aprl n ScRes. http://www.scrp.org/journal/jcns http://dx.do.org/./jcns.. Load Balancng for Hex-Cell Interconnecton Network Saher Manaseer,
More informationRelated-Mode Attacks on CTR Encryption Mode
Internatonal Journal of Network Securty, Vol.4, No.3, PP.282 287, May 2007 282 Related-Mode Attacks on CTR Encrypton Mode Dayn Wang, Dongda Ln, and Wenlng Wu (Correspondng author: Dayn Wang) Key Laboratory
More informationClassification Based Mode Decisions for Video over Networks
Classfcaton Based Mode Decsons for Vdeo over Networks Deepak S. Turaga and Tsuhan Chen Advanced Multmeda Processng Lab Tranng data for Inter-Intra Decson Inter-Intra Decson Regons pdf 6 5 6 5 Energy 4
More informationA Gradient Difference based Technique for Video Text Detection
A Gradent Dfference based Technque for Vdeo Text Detecton Palaahnakote Shvakumara, Trung Quy Phan and Chew Lm Tan School of Computng, Natonal Unversty of Sngapore {shva, phanquyt, tancl }@comp.nus.edu.sg
More informationREMOTE SENSING REQUIREMENTS DEVELOPMENT: A SIMULATION-BASED APPROACH
REMOTE SENSING REQUIREMENTS DEVEOPMENT: A SIMUATION-BASED APPROAC V. Zanon a, B. Davs a, R. Ryan b, G. Gasser c, S. Blonsk b a Earth Scence Applcatons Drectorate, Natonal Aeronautcs and Space Admnstraton,
More informationGeometrically Invariant Watermarking Scheme Based on Local Feature Points
JOURNAL OF MULTIMEDIA, VOL. 7, NO. 3, JUNE 0 3 Geometrcally Invarant Watermarkng Scheme Based on Local Feature Ponts L Jng School of Computer and Informaton Engneerng, Henan Unversty of Economcs and Law,
More informationShape Representation Robust to the Sketching Order Using Distance Map and Direction Histogram
Shape Representaton Robust to the Sketchng Order Usng Dstance Map and Drecton Hstogram Department of Computer Scence Yonse Unversty Kwon Yun CONTENTS Revew Topc Proposed Method System Overvew Sketch Normalzaton
More informationLocal Quaternary Patterns and Feature Local Quaternary Patterns
Local Quaternary Patterns and Feature Local Quaternary Patterns Jayu Gu and Chengjun Lu The Department of Computer Scence, New Jersey Insttute of Technology, Newark, NJ 0102, USA Abstract - Ths paper presents
More informationFuzzy C-Means Initialized by Fixed Threshold Clustering for Improving Image Retrieval
Fuzzy -Means Intalzed by Fxed Threshold lusterng for Improvng Image Retreval NAWARA HANSIRI, SIRIPORN SUPRATID,HOM KIMPAN 3 Faculty of Informaton Technology Rangst Unversty Muang-Ake, Paholyotn Road, Patumtan,
More informationFEATURE EXTRACTION. Dr. K.Vijayarekha. Associate Dean School of Electrical and Electronics Engineering SASTRA University, Thanjavur
FEATURE EXTRACTION Dr. K.Vjayarekha Assocate Dean School of Electrcal and Electroncs Engneerng SASTRA Unversty, Thanjavur613 41 Jont Intatve of IITs and IISc Funded by MHRD Page 1 of 8 Table of Contents
More informationA Gradient Difference based Technique for Video Text Detection
2009 10th Internatonal Conference on Document Analyss and Recognton A Gradent Dfference based Technque for Vdeo Text Detecton Palaahnakote Shvakumara, Trung Quy Phan and Chew Lm Tan School of Computng,
More informationData Hiding and Image Authentication for Color-Palette Images
Data Hdng and Image Authentcaton for Color-Palette Images Chh-Yang Yn ( 殷志揚 ) and Wen-Hsang Tsa ( 蔡文祥 ) Department of Computer & Informaton Scence Natonal Chao Tung Unversty 00 Ta Hsueh Rd., Hsnchu, Tawan
More informationMOTION BLUR ESTIMATION AT CORNERS
Gacomo Boracch and Vncenzo Caglot Dpartmento d Elettronca e Informazone, Poltecnco d Mlano, Va Ponzo, 34/5-20133 MILANO boracch@elet.polm.t, caglot@elet.polm.t Keywords: Abstract: Pont Spread Functon Parameter
More informationComputer Animation and Visualisation. Lecture 4. Rigging / Skinning
Computer Anmaton and Vsualsaton Lecture 4. Rggng / Sknnng Taku Komura Overvew Sknnng / Rggng Background knowledge Lnear Blendng How to decde weghts? Example-based Method Anatomcal models Sknnng Assume
More informationSimulation Based Analysis of FAST TCP using OMNET++
Smulaton Based Analyss of FAST TCP usng OMNET++ Umar ul Hassan 04030038@lums.edu.pk Md Term Report CS678 Topcs n Internet Research Sprng, 2006 Introducton Internet traffc s doublng roughly every 3 months
More informationDynamic Code Block Size for JPEG 2000
Dynamc Code Block Sze for JPEG 2000 Png-Sng Tsa a, Yann LeCornec b a Dept. of Computer Scence, Unv. of Texas Pan Amercan, 1201 W. Unv. Dr., Ednburg, TX USA 78539-2999; b Sgma Desgns, Inc., 1778 McCarthy
More informationProtection of Real and Artwork Human Objects based on a Chaotic Moments Modulation Method
1 Protecton of Real and Artwork Human Objects based on a Chaotc Moments Modulaton Method Klms Ntalans 1, Paraskev Tzouvel 1, Stefanos Kollas 1 and Athanasos Drgkas 1 Natonal Techncal Unversty of Athens,
More informationPYTHON IMPLEMENTATION OF VISUAL SECRET SHARING SCHEMES
PYTHON IMPLEMENTATION OF VISUAL SECRET SHARING SCHEMES Ruxandra Olmd Faculty of Mathematcs and Computer Scence, Unversty of Bucharest Emal: ruxandra.olmd@fm.unbuc.ro Abstract Vsual secret sharng schemes
More informationDeep learning is a good steganalysis tool when embedding key is reused for different images, even if there is a cover source-mismatch
Deep learnng s a good steganalyss tool when embeddng key s reused for dfferent mages, even f there s a cover source-msmatch Lonel PIBRE 2,3, Jérôme PASQUET 2,3, Dno IENCO 2,3, Marc CHAUMONT 1,2,3 (1) Unversty
More information