Robust Video Watermarking Using Image Normalization, Motion Vector and Perceptual Information

Size: px
Start display at page:

Download "Robust Video Watermarking Using Image Normalization, Motion Vector and Perceptual Information"

Transcription

1 Robust Vdeo Watermarkng Usng Image ormalzaton, Moton Vector and Perceptual Informaton Cedllo-Hernández Antono 1, Cedllo-Hernández Manuel 1, akano-myatake Marko 1, García-Vázquez Mreya S. 2 1 Postgraduate Secton of Mechancal and Electrcal Engneerng School, atonal Polytechnc Insttute of Mexco, Mexco Cty, Mexco 2 Research and Development of Dgtal Technology Center, atonal Polytechnc Insttute of Mexco, Tjuana, Mexco Abstract Ths paper proposes a vdeo watermarkng algorthm robust aganst geometrc dstortons, several attacks of sgnal processng and ntentonal common attacks for vdeo. Image normalzaton s used to get geometrc nvarant feature of vdeo frames. Watermark embeddng and detecton process are carred out n the Dscrete Cosne Transform (DCT) doman. Watermark energy s computed adaptvely usng perceptual nformaton and moton vectors, to get major Watermark mperceptblty and robustness. Watermark Imperceptblty s evaluated by conventonal PSR and perceptual vdeo qualty measurement, takng suffcently good vsual qualty. Computer smulaton results show the watermark robustness to common sgnal dstortons such as contamnaton by nose, JPEG compresson, geometrcal dstortons and vdeo common ntentonal attacks: frame droppng, frame swappng and frame averagng, among others. Keywords: Vdeo Watermarkng, Moton Vectors, Image ormalzaton, Block Classfcaton, Perceptual Sensblty 1 Introducton Hgh speed computer networks, the Internet and the World Wde Web have revolutonzed the way n whch dgtal data s dstrbuted. The wdespread and easy accesses to multmeda contents and the possblty to make unlmted copy wthout loss of consderable fdelty arouse the need of dgtal rghts management. Dgtal watermarkng s consdered as a technology that can serve ths purpose. A large number of watermarkng schemes have been proposed to hde copyrght marks and other nformaton n dgtal mages, vdeo, audo and other multmeda objects [1]. Usually watermarkng algorthms for stll mages are not effcent when these are used n vdeo sequences, because they are not consdered the temporal redundancy of vdeo sgnal and common attacks to the vdeo sgnals [2]. In the case of a watermarkng system for copyrght protecton, the embedded watermark should be mperceptble and robust aganst common attacks such as croppng, contamnaton by nose, flterng and compresson [3]. In addton to the requrement of mperceptblty and robustness technques, furthermore the vdeo watermarkng must satsfy the followng requrements: a blnd detecton,.e. the detecton process does not requre the orgnal vdeo sgnal and the conservaton of fle sze after the nserton of the watermark. Due to the redundancy exstng n the vdeo sequences, some ntentonal attacks, such as frame droppng, frame swappng and frame averagng, that try to destroy the embedded watermark should be consdered n desgn of vdeo watermarkng algorthms [3]. In ths paper, we propose a vdeo watermarkng algorthm based on mage normalzaton, n whch a watermark pattern s normalzed usng the same geometrc factors obtaned n the mage normalzaton. The proposed algorthm uses three crtera based on Human Vsual System (HVS) to nsert a robust watermark, preservng ther mperceptblty. The frst crteron s based on the senstvty of the HVS to dfferent basc color channels, the second one s based on spatal defcency of HVS, whch s determned usng the texture and edge maskng proposed by [4], and the last crteron s based on tracng defcency of the HVS n the regons wth hgh moton speed n vdeo sequences, whch s determned usng moton vector. The computer smulaton results show the watermark mperceptblty and the robustness aganst common sgnal processng, geometrcal dstortons and some ntentonal attacks to the vdeo sequence. The watermark mperceptblty s measured usng the Peak Sgnal ose Raton (PSR) and a qualty assessment based on HVS proposed by [5]. The rest of the paper s organzed as follows: In Secton 2, the proposed system s descrbed n detal and the evaluaton results of the proposed system are shown n Secton 3. Fnally Secton 4 provdes some conclusons. 2 Proposed system The proposed vdeo watermarkng system conssts of several procedures, such as mage normalzaton, block classfcaton usng the perceptual nformaton based on HVS, watermark embeddng and extracton. In ths secton, each procedure wll be descrbed.

2 2.1 Image normalzaton The normalzaton procedure of a mage f(x,y) conssts of the followng steps [6]: 1) Center the mage f(x,y), through the Affne Transformaton as gven by: x y a a x = A d y 1 0 where matrx A d = and the vector 1 d = wth 0 1 d2 m10 m01 d1 =, d2 m = 00 m (2) 00 where m 10,m 01 and m 00 are the moments of f(x,y), and d 1, d 2 are the densty center of f(x,y) [7]. Ths step elmnates the translaton effect by assgnng the center of the normalzed mage at the densty center of the mage. The resultng centered mage s denoted as f 1 (x,y). 2) Apply a shearng transform to f 1 (x,y) n the x-drecton 1 usng the matrx β A x =. The resultng mage s denoted 0 1 by f 2 (x,y). Ths step elmnates shearng effect n the x- drecton. (1) (a) Fgure 1 (a) Orgnal mage (b) ormalzed verson from (a). These crtera are based on the less senstvty of the HVS to the blue channel and the detal regons such as texture regon, and also t s less ablty to track a regon wth hgh speed moton. Accordng to the human eye structure, the retna contans two types of photoreceptors, rods and cones. The last one s dvded n 3, each senstve to the three basc colors there are three types of cones that react wth the three basc colors: Red, Green and Blue. The number of blue-senstve cones s 30 tmes less than the number of cones senstve to the other two colors [10]. Fgure 2 shows the fracton of lght absorbed by each of three types of cones, here R, G, B represents the cones senstve to red, green and blue, respectvely. Ths fgure shows that the HVS s less senstve to blue channel than the other two basc color channels (Red and Green). (b) 3) Apply a shearng transform to f 2 (x,y) n the y-drecton 1 0 usng the matrx A y =. The resultng mage s denoted γ 1 by f 3 (x,y). Ths step elmnates shearng effect n the y- drecton. 4) Scale f 3 (x,y) n both x and y drectons wth the matrx α 0 A s = and the resultng mage s denoted by f 4 (x,y). Ths 0 δ step elmnates the scalng effect by forcng the normalzed mage to a standard sze. The fnal mage f 4 (x,y) s the normalzed verson. It s mportant to denote that each step n the normalzaton procedure s nvertble, whch allows us to convert the normalzed mage back to ts orgnal verson. The determnaton of transformaton parameters β, γ, α and δ, assocated wth the transforms A x, A y, and A s are shown n detal n [9]. In the fgure 1, an example of the orgnal mage and the normalzed verson s shown. 2.2 Perceptual Informaton The proposed system uses three crtera, employed prevously n [8], to embed an mperceptble and robust watermark n a vdeo sgnal. Fgure 2 Senstvty of the three types of cones R (red), G (green) and B (blue). [13] The proposed algorthm embeds the watermark n the blue channel, takng advantage of the weakness of HVS. The blue channel of each vdeo frame s dvded nto blocks wth 8x8 pxels and then the 2D Dscrete Cosne Transform (DCT) s appled n each block. In the DCT doman, each block s classfed nto three categores: plan block, edge block and texture block accordng to the algorthm proposed n [4]. Fgure 3 shows the result of applyng the block classfcaton algorthm to a vdeo frame.

3 (a) Fgure 3 Block classfcaton (a) vdeo frame and (b) classfcaton of blocks, black blocks are plan, gray blocks are textures and whte blocks are edges, respectvely. (b) embeddng energy to the vdeo frame s determned expermentally usng 10 vdeo sequences, whch s shown n Table 1. In Table 1, B 8 s the block of 8x8 pxels n vdeo frames and MB MOTIO s the macro-block wth hgh-speed moton, each macro-block contans 4 blocks B 8. Ths assgnaton of the watermark embeddng energy s appled to the normalzed vdeo frames generated n the mage normalzaton process. Fgure 5 shows an example of the classfcaton of blocks together wth the watermark embeddng energy determned usng the crtera mentoned above. The last crteron s based on defcency of HVS to follow regons wth hgh-speed moton. To classfy regons of vdeo frame by moton speed, the moton compensaton predcton, whch s a powerful tool to reduce temporal redundancy n MPEG codng, can be used. The macro-blocks (MB) wth larger moton vector are classfed as regons of hgh-speed movement, n whch a watermark wth greater energy can be embedded wthout causng degradaton n the vdeo sgnal. The magntude of the moton vector s calculated usng equaton (3). Mmv mvh + mvv, = 1... = (3) 2 2 MB Where mvh 2,mvv 2 are the horzontal and vertcal components of moton vector of the th macro-block and MB s the total number of macro-blocks. To determne the regon wth a hgh-speed moton, we ntroduce a threshold value Th_mv and then each macro-block s classfed as hghspeed moton block and low-speed moton block (or wthout movement) as follows: If If Mmv < Th_mv then block are low-speed Mmv > Th_mv then block are hgh-speed Fgure 4 (a), (b)two consecutve frames of vdeo and (c) and (d) moton vectors before and after classfcaton Table 1 Watermark embeddng energy Where threshold Th_mv s calculated by equaton (4) 1 MB Th _ mv = Mmv (4) MB = 1 B B 8 8 Frame MB MOTIO B 8 Bplan B8 Bedge B8 Btex Fgure 4 shows two consecutve vdeo frames (Fgure 4 (a) and (b)) and the moton vectors before and after classfcaton (Fgure 4 (c) and (d), respectvely), the macro-blocks wth arrows of some orentaton are classfed as hgh-speed blocks and blocks wth black pont are consdered as low-speed blocks (or wthout movement). 2.3 Adequate watermark energy assgnment Combnng the last two crtera: the classfcaton of blocks (8x8) usng DCT coeffcents and the classfcaton of macro-blocks (16x16) usng moton vector, the watermark 2.4 Watermark embeddng process The watermark generaton and embeddng process are descrbed as follows: 1) Apply the normalzaton procedure to the orgnal mage to get the normalzed mage. 2) Dvde the normalzed mage n blocks of 8x8 pxels and get the watermark energy for every block mentoned n 2.3.

4 The result of ths operaton s a watermark embeddng energy. Iw = Io + ( WP α2) where Io and I w are orgnal and watermarked mage, and WP s watermark pattern generated by step 9. (5) The whole procedure s equvalent to embeddng the watermark nto the DCT doman of the normalzed mage. The adequate watermark embeddng energy allows embeddng strong watermark wthout causng any vsual dstorton to watermarked mage. The fgure 6 shows the watermark generaton and embeddng procedures. Fgure 5 An example of the embeddng watermark energy to each block 3) Generate the 2-D pseudo-random pattern R of the same sze of orgnal mage wth any key. Because ths pattern s only used as the support of the watermark pattern, any key can be used and t s not necessary to save. 4) Generate a watermark vector W [ w1, w2,... w n ] user s secret key, where w = { 1, 1}, =1..n. = usng a 5) Create a mask mage M, whch s a bnary mage, takng 1s wthn normalzed mage area and 0s elsewhere, to generate masked pseudo-random pattern MR wth same scale and rotaton factors as these of the normalzed mage. 6) Watermark vector W s multpled by a watermark energy vector determned by the prevous secton. 7) Dvde the watermark vector W nto groups of L elements, where L must be one number from 1 to 22 (number of coeffcents that compose the mddle frequency range n DCT doman), thus, for example, f L = 5 and sze of W s 500, the number of groups = 500 / 5 = ) The coeffcents n mddle frequency range of each block are replaced wth L elements of each group of watermark sequence. Then apply the IDCT to each watermarked block to get watermarked pattern MR. W 9) Apply the nverse normalzaton to the watermarked pattern MRW to get watermarked pattern WP wth same sze as the cover mage. 10) WP s embedded nto the orgnal mage addtvely wth a gan factor α 2. Ths produces the watermarked mage. Fgure 6 Watermark embeddng process 2.5 Watermark Extracton The process of the watermark detecton s as follows: 1) Apply the mage normalzaton procedure to watermarked mage to get the normalzed watermarked mage. 2) Apply the DCT to each block of the normalzed watermarked mage, the mddle range of the DCT coeffcents CW are extracted. From CW the watermark vector W ˆ s extracted by (6). [ w1 w2 w 1 w] sgn( CW ) Wˆ =,,, wk = k where w k s the extracted watermark sequence (L bts) from k-th block and sgn s a sgn functon. (6)

5 3 Expermental Results To evaluate the proposed system, we used 20 vdeo sequences wth YUV-CIF format at 30 FPS. All vdeo data have at least 150 frames whch are avalable n [11]. The proposed system s evaluated from the watermark mperceptblty and robustness ponts of vew. 3.1 Watermark mperceptblty We evaluate watermark mperceptblty of the proposed system usng numercal evaluaton: Peak Sgnal ose Rato (PSR) and perceptual objectve evaluaton proposed n [5]. Fgure 7 shows the PSR value calculated between orgnal and watermarked frames n the proposed method. Perceptual qualty assessment proposed n [5] evaluates vdeo qualty n perceptual manner, whch gves the qualty ndex calculated usng mage structure and moton vector. The qualty ndex s n range [0.0,1.0], when vdeo sequence under evaluaton s numercally dentcal wth ts orgnal verson, ts qualty ndex s 1.0. The qualty ndex of the watermarked vdeo sequence generated by the proposed algorthm s approxmately 0.96, whch means that degradaton of the watermarked vdeo qualty s mnmum by HVS. droppng s drop some frames from vdeo sequence, frame swappng s nterchange two frames and frame averagng s generate one frame takng the average of some consecutve frames. Due to that watermark sequence s embedded through temporal vdeo frames n the proposed algorthm; embedded watermark s robust aganst these types of attacks. Table 3 shows the performance comparson of our proposed system and the recently reported system by Soumk whch present an nvestgaton smlar to our proposal because t consders the content of vdeo as a sequence of mages and the watermark s nserted frame by frame wth an nvsble watermarkng scheme, further extracton of the watermark s blnd and s reported as a method extremely approprate n areas such as copyrght and fngerprntng [12]. Table 2. The embedded watermark sgnal s suffcently robust to geometrcal dstortons and common sgnal processng.. Attack Watermark frame attack BER Geometrc Rotaton Aspect Rato (1:2) Gaussan nose Fgure 7 Peak Sgnal to ose Rato of the proposed method. Impulsve nose Watermark Robustness To evaluate watermark robustness of the proposed algorthm, the watermarked vdeo sequences are attacked by some common sgnal and mage processng, such as codfcaton rate change, nose contamnaton by mpulsve nose and Gaussan nose, geometrcal dstortons, frame droppng, frame swappng and frame averagng. The results are shown n Table 2, n whch the bt-error-rate (BER) of the extracted watermark bt sequence respect to the embedded one s shown. In all cases the values correspond to the average values usng the 20 vdeo sequences wth YUV-CIF format. Frame droppng, frame swappng and frame averagng are ntentonal attacks for vdeo sequence. Frame MPEG Codfcaton (50% qualty) 4 Conclusons In ths paper, we proposed a vdeo watermarkng algorthm based on mage normalzaton, n whch watermark embeddng and detecton process are carred out n the

6 Dscrete Cosne Transform (DCT) doman. The watermark extracton has done blndly.e., nether the watermark nor the orgnal vdeo s needed at the tme of the watermark extracton. The proposed algorthm uses three crtera based on Human Vsual System (HVS) to embed a robust watermark, preservng ther mperceptblty. These crtera are based on the senstvty of the HVS to dfferent basc color channels, the texture and edge maskng classfcaton and the estmaton of the moton vectors n vdeo sequences. The computer smulaton results show the watermark mperceptblty and the robustness of the scheme aganst common sgnal processng, geometrcal dstortons and some ntentonal attacks to the vdeo sequence. Table 3. Robustness comparson between the proposed vdeo watermarkng and Soumk method s [12] Attack Method proposed Soumk method s [12] Geometrc Rotaton Detected - Aspect Rato Detected - Gaussan nose Detected - Impulsve nose Detected - MPEG Codfcaton Detected - Frame Droppng Detected Detected Frame Swappng Detected Detected Frame Averagng Detected Detected 5 References [1] Sourav Bhattacharya, T. Chattopadhyay and Arpan Pal, A Survey on Dfferent Vdeo Watermarkng Technques and Comparatve Analyss wth Reference to H.264/AVC. IEEE 10th Internatonal Symposum on Consumer Electroncs, June 2006, pp.1-6. Elsever Sgnal Processng: Image Communcaton, vol. 19, pp , 2004 [6] M. Cedllo-Hernández, M. akano-myatake and H. Perez-Meana, Robust Watermarkng Technque based on Image ormalzaton (Spansh), Revsta Facultad de Ingenería Unversdad de Antoqua, no. 52, pp , Marzo [7] M. K. Hu, Vsual Pattern Recognton by Moment Invarants, IRE Trans. on Informaton Theory, vol. 8, pp , [8] A. Cedllo, M. akano, H. Perez and L. Rojas, Watermarkng Technque for MPEG Vdeo usng Vsual Sensblty and Moton Vector (Spansh), Revsta Informacón Tecnología, vol. 19, no. 2, pp , [9] P. Dong, J. B. Brankov,. P. Galatsanos, Y. Yang and F. Davone, Dgtal Watermarkng robust to geometrc dstortons,, IEEE Trans. on Image Processng, vol. 14, no. 12, pp , [10] K. Sayood, Introducton to Data Compresson, 2nd Edton, Morgan Kaufmann Publshers, [11] [12] Soumk Das, Pradosh Bandyopadhyay, Shauvk Paul, Chaudhur Atal and Monalsa Banerjee, An Invsble Color Watermarkng Framework for Uncompressed Vdeo Authentcaton, Internatonal Journal of Computer Applcatons, vol. 1, no. 11, pp , February [13] Font-Color-Is-Best-For-Eyes [2] M. Swanson, B. Zhu y A. Tewfk, Mult-resoluton scene-based vdeo watermarkng usng perceptual models, IEEE J. Select areas Communcaton, vol. 16, no. 4, pp , May [3] Wolfgang, R.B, C.I. Podlchuk y E.J. Delp, Perceptual watermarks for dgtal mages and vdeo, Proceedng IEEE, vol. 87, no. 7, pp , [4] H.Y. Tong an d A.. Venetsanopoulos, A Perceptual model for JPEG applcatons based on block classfcaton, texture maskng and lumnance maskng, Int. Conf. on Image Processng (ICIP), vol. 3, pp , [5] Z. Wang, L. Lu and A. C. Bovk, Vdeo qualty assessment based on structural dstorton measurement,

Hybrid Non-Blind Color Image Watermarking

Hybrid Non-Blind Color Image Watermarking Hybrd Non-Blnd Color Image Watermarkng Ms C.N.Sujatha 1, Dr. P. Satyanarayana 2 1 Assocate Professor, Dept. of ECE, SNIST, Yamnampet, Ghatkesar Hyderabad-501301, Telangana 2 Professor, Dept. of ECE, AITS,

More information

A Fast Content-Based Multimedia Retrieval Technique Using Compressed Data

A Fast Content-Based Multimedia Retrieval Technique Using Compressed Data A Fast Content-Based Multmeda Retreval Technque Usng Compressed Data Borko Furht and Pornvt Saksobhavvat NSF Multmeda Laboratory Florda Atlantc Unversty, Boca Raton, Florda 3343 ABSTRACT In ths paper,

More information

A Hybrid Semi-Blind Gray Scale Image Watermarking Algorithm Based on DWT-SVD using Human Visual System Model

A Hybrid Semi-Blind Gray Scale Image Watermarking Algorithm Based on DWT-SVD using Human Visual System Model A Hybrd Sem-Blnd Gray Scale Image Watermarkng Algorthm Based on DWT-SVD usng Human Vsual System Model Rajesh Mehta r Scence & Engneerng, USICT Guru Gobnd Sngh Indrarprastha Unversty New Delh, Inda rajesh00ust@gmal.com

More information

A NEW AUDIO WATERMARKING METHOD BASED

A NEW AUDIO WATERMARKING METHOD BASED A NEW AUDIO WATERMARKING METHOD BASED ON DISCRETE COSINE TRANSFORM WITH A GRAY IMAGE Mohammad Ibrahm Khan 1, Md. Iqbal Hasan Sarker 2, Kaushk Deb 3 and Md. Hasan Furhad 4 1,2,3 Department of Computer Scence

More information

Key-Selective Patchwork Method for Audio Watermarking

Key-Selective Patchwork Method for Audio Watermarking Internatonal Journal of Dgtal Content Technology and ts Applcatons Volume 4, Number 4, July 2010 Key-Selectve Patchwork Method for Audo Watermarkng 1 Ch-Man Pun, 2 Jng-Jng Jang 1, Frst and Correspondng

More information

A Fast Visual Tracking Algorithm Based on Circle Pixels Matching

A Fast Visual Tracking Algorithm Based on Circle Pixels Matching A Fast Vsual Trackng Algorthm Based on Crcle Pxels Matchng Zhqang Hou hou_zhq@sohu.com Chongzhao Han czhan@mal.xjtu.edu.cn Ln Zheng Abstract: A fast vsual trackng algorthm based on crcle pxels matchng

More information

Content Based Image Retrieval Using 2-D Discrete Wavelet with Texture Feature with Different Classifiers

Content Based Image Retrieval Using 2-D Discrete Wavelet with Texture Feature with Different Classifiers IOSR Journal of Electroncs and Communcaton Engneerng (IOSR-JECE) e-issn: 78-834,p- ISSN: 78-8735.Volume 9, Issue, Ver. IV (Mar - Apr. 04), PP 0-07 Content Based Image Retreval Usng -D Dscrete Wavelet wth

More information

Enhanced Watermarking Technique for Color Images using Visual Cryptography

Enhanced Watermarking Technique for Color Images using Visual Cryptography Informaton Assurance and Securty Letters 1 (2010) 024-028 Enhanced Watermarkng Technque for Color Images usng Vsual Cryptography Enas F. Al rawashdeh 1, Rawan I.Zaghloul 2 1 Balqa Appled Unversty, MIS

More information

A Binarization Algorithm specialized on Document Images and Photos

A Binarization Algorithm specialized on Document Images and Photos A Bnarzaton Algorthm specalzed on Document mages and Photos Ergna Kavalleratou Dept. of nformaton and Communcaton Systems Engneerng Unversty of the Aegean kavalleratou@aegean.gr Abstract n ths paper, a

More information

IAJIT First Online Publication

IAJIT First Online Publication Content Protecton n Vdeo Data Based on Robust Dgtal Watermarkng Resstant to Intentonal and Unntentonal Attacks Mad Masoum and Shervn Amr Department of Electrcal Engneerng, Islamc Azad Unversty Qazvn Branch,

More information

Digital Video Watermarking using Discrete Wavelet Transform and Principal Component Analysis

Digital Video Watermarking using Discrete Wavelet Transform and Principal Component Analysis Internatonal Journal of Wsdom Based Computng, Vol. 1 (2), August 2011 7 Dgtal Vdeo Watermarkng usng Dscrete Wavelet Transform and Prncpal Component Analyss Sanjana Snha, Prajnat Bardhan, Swarnal Pramanck,

More information

Parallelism for Nested Loops with Non-uniform and Flow Dependences

Parallelism for Nested Loops with Non-uniform and Flow Dependences Parallelsm for Nested Loops wth Non-unform and Flow Dependences Sam-Jn Jeong Dept. of Informaton & Communcaton Engneerng, Cheonan Unversty, 5, Anseo-dong, Cheonan, Chungnam, 330-80, Korea. seong@cheonan.ac.kr

More information

Shape-adaptive DCT and Its Application in Region-based Image Coding

Shape-adaptive DCT and Its Application in Region-based Image Coding Internatonal Journal of Sgnal Processng, Image Processng and Pattern Recognton, pp.99-108 http://dx.do.org/10.14257/sp.2014.7.1.10 Shape-adaptve DCT and Its Applcaton n Regon-based Image Codng Yamn Zheng,

More information

An Image Fusion Approach Based on Segmentation Region

An Image Fusion Approach Based on Segmentation Region Rong Wang, L-Qun Gao, Shu Yang, Yu-Hua Cha, and Yan-Chun Lu An Image Fuson Approach Based On Segmentaton Regon An Image Fuson Approach Based on Segmentaton Regon Rong Wang, L-Qun Gao, Shu Yang 3, Yu-Hua

More information

Coding Artifact Reduction Using Edge Map Guided Adaptive and Fuzzy Filter

Coding Artifact Reduction Using Edge Map Guided Adaptive and Fuzzy Filter MEL A MITSUBISHI ELECTIC ESEACH LABOATOY http://www.merl.com Codng Artfact educton Usng Edge Map Guded Adaptve and Fuzzy Flter Hao-Song Kong Yao Ne Anthony Vetro Hufang Sun Kenneth E. Barner T-2004-056

More information

Robust Watermarking for Text Images Based on Arnold Scrambling and DWT-DCT

Robust Watermarking for Text Images Based on Arnold Scrambling and DWT-DCT Internatonal Conference on Mechatroncs Electronc Industral and Control Engneerng (MEIC 015) Robust Watermarkng for Text Images Based on Arnold Scramblng and DWT-DCT Fan Wu College of Informaton Scence

More information

Improvement of Spatial Resolution Using BlockMatching Based Motion Estimation and Frame. Integration

Improvement of Spatial Resolution Using BlockMatching Based Motion Estimation and Frame. Integration Improvement of Spatal Resoluton Usng BlockMatchng Based Moton Estmaton and Frame Integraton Danya Suga and Takayuk Hamamoto Graduate School of Engneerng, Tokyo Unversty of Scence, 6-3-1, Nuku, Katsuska-ku,

More information

Semi-Fragile Watermarking Scheme for Authentication of JPEG Images

Semi-Fragile Watermarking Scheme for Authentication of JPEG Images Tamkang Journal of Scence and Engneerng, Vol. 10, No 1, pp. 5766 (2007) 57 Sem-Fragle Watermarkng Scheme for Authentcaton of JPEG Images Chh-Hung n 1 *, Tung-Shh Su 2 and Wen-Shyong Hseh 2,3 1 Department

More information

A Comparison between Digital Images Watermarking in Tow Different Color Spaces Using DWT2*

A Comparison between Digital Images Watermarking in Tow Different Color Spaces Using DWT2* A Comparson between Dgtal s ng n Tow Dfferent Color Spaces Usng DWT* Mehd Khall Natonal Academy of Scence of Armena Yerevan, Armena e-mal: khall.mehd@yahoo.com ABSTRACT A novel dgtal watermarkng for ownershp

More information

KEYWORDS: Digital Image Watermarking, Discrete Wavelet Transform, General Regression Neural Network, Human Visual System. 1.

KEYWORDS: Digital Image Watermarking, Discrete Wavelet Transform, General Regression Neural Network, Human Visual System. 1. An Adaptve Dgtal Image Watermarkng Based on Image Features n Dscrete Wavelet Transform Doman and General Regresson Neural Network Ayoub Taher Group of IT Engneerng, Payam Noor Unversty, Broujen, Iran ABSTRACT:

More information

Edge Detection in Noisy Images Using the Support Vector Machines

Edge Detection in Noisy Images Using the Support Vector Machines Edge Detecton n Nosy Images Usng the Support Vector Machnes Hlaro Gómez-Moreno, Saturnno Maldonado-Bascón, Francsco López-Ferreras Sgnal Theory and Communcatons Department. Unversty of Alcalá Crta. Madrd-Barcelona

More information

Fuzzy Filtering Algorithms for Image Processing: Performance Evaluation of Various Approaches

Fuzzy Filtering Algorithms for Image Processing: Performance Evaluation of Various Approaches Proceedngs of the Internatonal Conference on Cognton and Recognton Fuzzy Flterng Algorthms for Image Processng: Performance Evaluaton of Varous Approaches Rajoo Pandey and Umesh Ghanekar Department of

More information

Detection of an Object by using Principal Component Analysis

Detection of an Object by using Principal Component Analysis Detecton of an Object by usng Prncpal Component Analyss 1. G. Nagaven, 2. Dr. T. Sreenvasulu Reddy 1. M.Tech, Department of EEE, SVUCE, Trupath, Inda. 2. Assoc. Professor, Department of ECE, SVUCE, Trupath,

More information

A Hybrid Digital Image Watermarking based on Discrete Wavelet Transform, Discrete Cosine Transform, and General Regression Neural Network

A Hybrid Digital Image Watermarking based on Discrete Wavelet Transform, Discrete Cosine Transform, and General Regression Neural Network A Hybrd Dgtal Image Watermarkng based on Dscrete Wavelet Transform, Dscrete Cosne Transform, and General Regresson Neural Network Ayoub Taher ; ABSTRACT In ths paper, a new hybrd dgtal watermarkng technque

More information

Skew Angle Estimation and Correction of Hand Written, Textual and Large areas of Non-Textual Document Images: A Novel Approach

Skew Angle Estimation and Correction of Hand Written, Textual and Large areas of Non-Textual Document Images: A Novel Approach Angle Estmaton and Correcton of Hand Wrtten, Textual and Large areas of Non-Textual Document Images: A Novel Approach D.R.Ramesh Babu Pyush M Kumat Mahesh D Dhannawat PES Insttute of Technology Research

More information

Adaptive digital watermarking of images using Genetic Algorithm

Adaptive digital watermarking of images using Genetic Algorithm Adaptve dgtal watermarkng of mages usng Genetc Algorthm Bushra Skander, Muhammad Ishtaq, M. Arfan Jaffar, Muhammad Tarq, Anwar M. Mrza Department of Computer Scence, Natonal Unversty of Computer and Emergng

More information

Classifier Selection Based on Data Complexity Measures *

Classifier Selection Based on Data Complexity Measures * Classfer Selecton Based on Data Complexty Measures * Edth Hernández-Reyes, J.A. Carrasco-Ochoa, and J.Fco. Martínez-Trndad Natonal Insttute for Astrophyscs, Optcs and Electroncs, Lus Enrque Erro No.1 Sta.

More information

A Lossless Watermarking Scheme for Halftone Image Authentication

A Lossless Watermarking Scheme for Halftone Image Authentication IJCSNS Internatonal Journal of Computer Scence and Network Securty, VOL.6 No.2B, February 2006 147 A Lossless Watermarkng Scheme for Halftone Image Authentcaton Jeng-Shyang Pan, Hao Luo, and Zhe-Mng Lu,

More information

Corner-Based Image Alignment using Pyramid Structure with Gradient Vector Similarity

Corner-Based Image Alignment using Pyramid Structure with Gradient Vector Similarity Journal of Sgnal and Informaton Processng, 013, 4, 114-119 do:10.436/jsp.013.43b00 Publshed Onlne August 013 (http://www.scrp.org/journal/jsp) Corner-Based Image Algnment usng Pyramd Structure wth Gradent

More information

Quantization Noise Power Injection In Subband Audio Coding Using Low Selectivity Filter Banks

Quantization Noise Power Injection In Subband Audio Coding Using Low Selectivity Filter Banks Quantzaton Nose Power Injecton In Subband Audo Codng Usng Low Selectvty Flter Banks D. ARTÍNEZ -UÑOZ, N. RUIZ-REYES, P. VERA-CANDEAS, P.J. RECHE-LÓPEZ, J. CURPIÁN-ALONSO Departamento de Electrónca Unversdad

More information

Image Representation & Visualization Basic Imaging Algorithms Shape Representation and Analysis. outline

Image Representation & Visualization Basic Imaging Algorithms Shape Representation and Analysis. outline mage Vsualzaton mage Vsualzaton mage Representaton & Vsualzaton Basc magng Algorthms Shape Representaton and Analyss outlne mage Representaton & Vsualzaton Basc magng Algorthms Shape Representaton and

More information

Information Hiding Watermarking Detection Technique by PSNR and RGB Intensity

Information Hiding Watermarking Detection Technique by PSNR and RGB Intensity www..org 3 Informaton Hdng Watermarkng Detecton Technque by PSNR and RGB Intensty 1 Neha Chauhan, Akhlesh A. Waoo, 3 P. S. Patheja 1 Research Scholar, BIST, Bhopal, Inda.,3 Assstant Professor, BIST, Bhopal,

More information

A Robust Webpage Information Hiding Method Based on the Slash of Tag

A Robust Webpage Information Hiding Method Based on the Slash of Tag Advanced Engneerng Forum Onlne: 2012-09-26 ISSN: 2234-991X, Vols. 6-7, pp 361-366 do:10.4028/www.scentfc.net/aef.6-7.361 2012 Trans Tech Publcatons, Swtzerland A Robust Webpage Informaton Hdng Method Based

More information

Tsinghua University at TAC 2009: Summarizing Multi-documents by Information Distance

Tsinghua University at TAC 2009: Summarizing Multi-documents by Information Distance Tsnghua Unversty at TAC 2009: Summarzng Mult-documents by Informaton Dstance Chong Long, Mnle Huang, Xaoyan Zhu State Key Laboratory of Intellgent Technology and Systems, Tsnghua Natonal Laboratory for

More information

An Image Compression Algorithm based on Wavelet Transform and LZW

An Image Compression Algorithm based on Wavelet Transform and LZW An Image Compresson Algorthm based on Wavelet Transform and LZW Png Luo a, Janyong Yu b School of Chongqng Unversty of Posts and Telecommuncatons, Chongqng, 400065, Chna Abstract a cylpng@63.com, b y27769864@sna.cn

More information

Robust Blind Video Watermark Algorithm in Transform Domain Combining with 3D Video Correlation

Robust Blind Video Watermark Algorithm in Transform Domain Combining with 3D Video Correlation JOURNAL OF MULTIMEDIA, VOL. 8, NO. 2, APRIL 2013 161 Robust Blnd Vdeo Watermark Algorthm n Transform Doman Combnng wth 3D Vdeo Correlaton DING Ha-yang 1,3 1. Informaton Securty Center, Bejng Unversty of

More information

SLAM Summer School 2006 Practical 2: SLAM using Monocular Vision

SLAM Summer School 2006 Practical 2: SLAM using Monocular Vision SLAM Summer School 2006 Practcal 2: SLAM usng Monocular Vson Javer Cvera, Unversty of Zaragoza Andrew J. Davson, Imperal College London J.M.M Montel, Unversty of Zaragoza. josemar@unzar.es, jcvera@unzar.es,

More information

A Desynchronization Resilient Watermarking Scheme

A Desynchronization Resilient Watermarking Scheme A Desynchronzaton Reslent Watermarkng Scheme Xaojun Q and J Q Department of Computer Scence, Utah State Unversty, Logan, UT 84322-4205 Xaojun.Q@usu.edu, jq79@gmal.com Abstract. Ths paper presents a content-based

More information

A Secured Method for Image Steganography Based On Pixel Values

A Secured Method for Image Steganography Based On Pixel Values A Secured Method for Image Steganography Based On Pxel Values Tarun Gulat #, Sanskrt Gupta * # Assocate Professor, Electroncs and Communcaton Engneerng Department, MMEC, M.M.U., Mullana, Ambala, Haryana,

More information

IMPLEMENTATION OF QIM BASED AUDIO WATERMARKING USING HYBRID TRANSFORM OF SWT-DCT-SVD METHODS OPTIMIZED WITH GENETIC ALORITHM

IMPLEMENTATION OF QIM BASED AUDIO WATERMARKING USING HYBRID TRANSFORM OF SWT-DCT-SVD METHODS OPTIMIZED WITH GENETIC ALORITHM IMPLEMENTATION OF QIM BASED AUDIO WATERMARKING USING HYBRID TRANSFORM OF SWT-DCT-SVD METHODS OPTIMIZED WITH GENETIC ALORITHM Ryan Amnullah 1, Gelar Budman 2, Irma Saftr 3 1, 2, 3 FakultasTeknk Elektro,

More information

Cluster Analysis of Electrical Behavior

Cluster Analysis of Electrical Behavior Journal of Computer and Communcatons, 205, 3, 88-93 Publshed Onlne May 205 n ScRes. http://www.scrp.org/ournal/cc http://dx.do.org/0.4236/cc.205.350 Cluster Analyss of Electrcal Behavor Ln Lu Ln Lu, School

More information

Identify the Attack in Embedded Image with Steganalysis Detection Method by PSNR and RGB Intensity

Identify the Attack in Embedded Image with Steganalysis Detection Method by PSNR and RGB Intensity Internatonal Journal of Computer Systems (ISSN: 394-1065), Volume 03 Issue 07, July, 016 Avalable at http://www.jcsonlne.com/ Identfy the Attack n Embedded Image wth Steganalyss Detecton Method by PSNR

More information

TN348: Openlab Module - Colocalization

TN348: Openlab Module - Colocalization TN348: Openlab Module - Colocalzaton Topc The Colocalzaton module provdes the faclty to vsualze and quantfy colocalzaton between pars of mages. The Colocalzaton wndow contans a prevew of the two mages

More information

Palmprint Feature Extraction Using 2-D Gabor Filters

Palmprint Feature Extraction Using 2-D Gabor Filters Palmprnt Feature Extracton Usng 2-D Gabor Flters Wa Kn Kong Davd Zhang and Wenxn L Bometrcs Research Centre Department of Computng The Hong Kong Polytechnc Unversty Kowloon Hong Kong Correspondng author:

More information

The Research of Ellipse Parameter Fitting Algorithm of Ultrasonic Imaging Logging in the Casing Hole

The Research of Ellipse Parameter Fitting Algorithm of Ultrasonic Imaging Logging in the Casing Hole Appled Mathematcs, 04, 5, 37-3 Publshed Onlne May 04 n ScRes. http://www.scrp.org/journal/am http://dx.do.org/0.436/am.04.584 The Research of Ellpse Parameter Fttng Algorthm of Ultrasonc Imagng Loggng

More information

A New Feature of Uniformity of Image Texture Directions Coinciding with the Human Eyes Perception 1

A New Feature of Uniformity of Image Texture Directions Coinciding with the Human Eyes Perception 1 A New Feature of Unformty of Image Texture Drectons Concdng wth the Human Eyes Percepton Xng-Jan He, De-Shuang Huang, Yue Zhang, Tat-Mng Lo 2, and Mchael R. Lyu 3 Intellgent Computng Lab, Insttute of Intellgent

More information

R s s f. m y s. SPH3UW Unit 7.3 Spherical Concave Mirrors Page 1 of 12. Notes

R s s f. m y s. SPH3UW Unit 7.3 Spherical Concave Mirrors Page 1 of 12. Notes SPH3UW Unt 7.3 Sphercal Concave Mrrors Page 1 of 1 Notes Physcs Tool box Concave Mrror If the reflectng surface takes place on the nner surface of the sphercal shape so that the centre of the mrror bulges

More information

A PATTERN RECOGNITION APPROACH TO IMAGE SEGMENTATION

A PATTERN RECOGNITION APPROACH TO IMAGE SEGMENTATION 1 THE PUBLISHING HOUSE PROCEEDINGS OF THE ROMANIAN ACADEMY, Seres A, OF THE ROMANIAN ACADEMY Volume 4, Number 2/2003, pp.000-000 A PATTERN RECOGNITION APPROACH TO IMAGE SEGMENTATION Tudor BARBU Insttute

More information

High Payload Reversible Data Hiding Scheme Using Difference Segmentation and Histogram Shifting

High Payload Reversible Data Hiding Scheme Using Difference Segmentation and Histogram Shifting JOURNAL OF ELECTRONIC SCIENCE AND TECHNOLOGY, VOL. 11, NO. 1, MARCH 2013 9 Hgh Payload Reversble Data Hdng Scheme Usng Dfference Segmentaton and Hstogram Shftng Yung-Chen Chou and Huang-Chng L Abstract

More information

A FIBONACCI LSB DATA HIDING TECNIQUE

A FIBONACCI LSB DATA HIDING TECNIQUE A FIBONACCI LSB DATA HIDING TECNIQUE Dego De Luca Pcone (*)(**), Federca Battst (*)(**), Marco Carl (*), Jaakko Astola (**), and Karen Egazaran (**) (*) AE Department, Unverst of Roma TRE, Rome, Ital,

More information

Article Reversible Dual-Image-Based Hiding Scheme Using Block Folding Technique

Article Reversible Dual-Image-Based Hiding Scheme Using Block Folding Technique Artcle Reversble Dual-Image-Based Hdng Scheme Usng Block Foldng Technque Tzu-Chuen Lu, * and Hu-Shh Leng Department of Informaton Management, Chaoyang Unversty of Technology, Tachung 4349, Tawan Department

More information

Enhanced AMBTC for Image Compression using Block Classification and Interpolation

Enhanced AMBTC for Image Compression using Block Classification and Interpolation Internatonal Journal of Computer Applcatons (0975 8887) Volume 5 No.0, August 0 Enhanced AMBTC for Image Compresson usng Block Classfcaton and Interpolaton S. Vmala Dept. of Comp. Scence Mother Teresa

More information

Accounting for the Use of Different Length Scale Factors in x, y and z Directions

Accounting for the Use of Different Length Scale Factors in x, y and z Directions 1 Accountng for the Use of Dfferent Length Scale Factors n x, y and z Drectons Taha Soch (taha.soch@kcl.ac.uk) Imagng Scences & Bomedcal Engneerng, Kng s College London, The Rayne Insttute, St Thomas Hosptal,

More information

Using Fuzzy Logic to Enhance the Large Size Remote Sensing Images

Using Fuzzy Logic to Enhance the Large Size Remote Sensing Images Internatonal Journal of Informaton and Electroncs Engneerng Vol. 5 No. 6 November 015 Usng Fuzzy Logc to Enhance the Large Sze Remote Sensng Images Trung Nguyen Tu Huy Ngo Hoang and Thoa Vu Van Abstract

More information

High-Boost Mesh Filtering for 3-D Shape Enhancement

High-Boost Mesh Filtering for 3-D Shape Enhancement Hgh-Boost Mesh Flterng for 3-D Shape Enhancement Hrokazu Yagou Λ Alexander Belyaev y Damng We z Λ y z ; ; Shape Modelng Laboratory, Unversty of Azu, Azu-Wakamatsu 965-8580 Japan y Computer Graphcs Group,

More information

Lobachevsky State University of Nizhni Novgorod. Polyhedron. Quick Start Guide

Lobachevsky State University of Nizhni Novgorod. Polyhedron. Quick Start Guide Lobachevsky State Unversty of Nzhn Novgorod Polyhedron Quck Start Gude Nzhn Novgorod 2016 Contents Specfcaton of Polyhedron software... 3 Theoretcal background... 4 1. Interface of Polyhedron... 6 1.1.

More information

An Optimal Algorithm for Prufer Codes *

An Optimal Algorithm for Prufer Codes * J. Software Engneerng & Applcatons, 2009, 2: 111-115 do:10.4236/jsea.2009.22016 Publshed Onlne July 2009 (www.scrp.org/journal/jsea) An Optmal Algorthm for Prufer Codes * Xaodong Wang 1, 2, Le Wang 3,

More information

COMPLEX WAVELET TRANSFORM-BASED COLOR INDEXING FOR CONTENT-BASED IMAGE RETRIEVAL

COMPLEX WAVELET TRANSFORM-BASED COLOR INDEXING FOR CONTENT-BASED IMAGE RETRIEVAL COMPLEX WAVELET TRANSFORM-BASED COLOR INDEXING FOR CONTENT-BASED IMAGE RETRIEVAL Nader Safavan and Shohreh Kasae Department of Computer Engneerng Sharf Unversty of Technology Tehran, Iran skasae@sharf.edu

More information

Steganography System using Slantlet Transform

Steganography System using Slantlet Transform ISSN:43-6999 Journal of Inmaton Communcaton and Intellgence Systems (JICIS) Volume Issue February 06 Steganography System usng Slantlet Transm Ryadh Bassl Abduljabbar Abstract An approach hdng nmaton has

More information

Performance Analysis of Data Hiding in MPEG-4 AAC Audio *

Performance Analysis of Data Hiding in MPEG-4 AAC Audio * TSINGHUA SCIENCE AND TECHNOLOGY ISSNll1007-0214ll07/21llpp55-61 Volume 14, Number 1, February 2009 Performance Analyss of Data Hdng n MPEG-4 AAC Audo * XU Shuzheng ( ) **, ZHANG Peng ( ), WANG Pengjun

More information

Video Denoising Algorithm in Sliding 3D DCT domain

Video Denoising Algorithm in Sliding 3D DCT domain Dmytro Rusanovskyy and Karen Egazaran, ACIVS 2005, Antwerp, Belgum Vdeo Denosng Algorthm n Sldng 3D DCT doman Dmytro Rusanovskyy and Karen Egazaran Insttute of Sgnal Processng Tampere Unversty of Technology,

More information

A Background Subtraction for a Vision-based User Interface *

A Background Subtraction for a Vision-based User Interface * A Background Subtracton for a Vson-based User Interface * Dongpyo Hong and Woontack Woo KJIST U-VR Lab. {dhon wwoo}@kjst.ac.kr Abstract In ths paper, we propose a robust and effcent background subtracton

More information

Robust Spread Spectrum Based Digital Video Watermarking Scheme in Frequency Domain Nisha Chaudhary 1 Savita Shivani 2

Robust Spread Spectrum Based Digital Video Watermarking Scheme in Frequency Domain Nisha Chaudhary 1 Savita Shivani 2 IJSRD Internatonal Journal for Scentfc Research & Development Vol. 2, Issue 6, 2 ISSN (onlne): 23263 Robust Spread Spectrum Based Dgtal Vdeo Watermarkng Scheme n Frequency Doman Nsha Chaudhary Savta Shvan

More information

Research of Multiple Text Watermarks Technique in Electric Power System Texts

Research of Multiple Text Watermarks Technique in Electric Power System Texts Sensors & Transducers 203 by IFSA http://www.sensorsportal.com Research of Multple Text atermarks Technque n Electrc Power System Texts Xao-X XING, Qng CHEN, 2 Lan-X FU School of Optcal-Electrcal and Computer

More information

Problem Definitions and Evaluation Criteria for Computational Expensive Optimization

Problem Definitions and Evaluation Criteria for Computational Expensive Optimization Problem efntons and Evaluaton Crtera for Computatonal Expensve Optmzaton B. Lu 1, Q. Chen and Q. Zhang 3, J. J. Lang 4, P. N. Suganthan, B. Y. Qu 6 1 epartment of Computng, Glyndwr Unversty, UK Faclty

More information

Video Watermarking Algorithm Based on Relative Relationship of DCT Coefficients

Video Watermarking Algorithm Based on Relative Relationship of DCT Coefficients 756 JOURAL OF COPUTERS, VOL. 8, O., OVEBER 03 Vdeo Watermarkng Algorthm Based on Relatve Relatonshp of DCT Coeffcents Cheng ngzh, Du Yanpng, Wang Yan Bejng Insttute of Graphc Communcaton, Bejng, Chna Emal:

More information

Analysis of Continuous Beams in General

Analysis of Continuous Beams in General Analyss of Contnuous Beams n General Contnuous beams consdered here are prsmatc, rgdly connected to each beam segment and supported at varous ponts along the beam. onts are selected at ponts of support,

More information

Brushlet Features for Texture Image Retrieval

Brushlet Features for Texture Image Retrieval DICTA00: Dgtal Image Computng Technques and Applcatons, 1 January 00, Melbourne, Australa 1 Brushlet Features for Texture Image Retreval Chbao Chen and Kap Luk Chan Informaton System Research Lab, School

More information

Research Article High Capacity Reversible Watermarking for Audio by Histogram Shifting and Predicted Error Expansion

Research Article High Capacity Reversible Watermarking for Audio by Histogram Shifting and Predicted Error Expansion e Scentfc World Journal, Artcle ID 656251, 7 pages http://dx.do.org/1.1155/214/656251 Research Artcle Hgh Capacty Reversble Watermarkng for Audo by Hstogram Shftng and Predcted Error Expanson Fe Wang,

More information

Extraction of Uncorrelated Sparse Sources from Signal Mixtures using a. Clustering Method

Extraction of Uncorrelated Sparse Sources from Signal Mixtures using a. Clustering Method 1 Extracton of Uncorrelated Sparse Sources from Sgnal Mxtures usng a Malcolm Woolfson Clusterng Method Department of Electrcal and Electronc Engneerng, Faculty of Engneerng, Unversty of Nottngham, Nottngham.

More information

MULTISPECTRAL IMAGES CLASSIFICATION BASED ON KLT AND ATR AUTOMATIC TARGET RECOGNITION

MULTISPECTRAL IMAGES CLASSIFICATION BASED ON KLT AND ATR AUTOMATIC TARGET RECOGNITION MULTISPECTRAL IMAGES CLASSIFICATION BASED ON KLT AND ATR AUTOMATIC TARGET RECOGNITION Paulo Quntlano 1 & Antono Santa-Rosa 1 Federal Polce Department, Brasla, Brazl. E-mals: quntlano.pqs@dpf.gov.br and

More information

Efficient Content Representation in MPEG Video Databases

Efficient Content Representation in MPEG Video Databases Effcent Content Representaton n MPEG Vdeo Databases Yanns S. Avrths, Nkolaos D. Doulams, Anastasos D. Doulams and Stefanos D. Kollas Department of Electrcal and Computer Engneerng Natonal Techncal Unversty

More information

Novel Pattern-based Fingerprint Recognition Technique Using 2D Wavelet Decomposition

Novel Pattern-based Fingerprint Recognition Technique Using 2D Wavelet Decomposition Mathematcal Methods for Informaton Scence and Economcs Novel Pattern-based Fngerprnt Recognton Technque Usng D Wavelet Decomposton TUDOR BARBU Insttute of Computer Scence of the Romanan Academy T. Codrescu,,

More information

EYE CENTER LOCALIZATION ON A FACIAL IMAGE BASED ON MULTI-BLOCK LOCAL BINARY PATTERNS

EYE CENTER LOCALIZATION ON A FACIAL IMAGE BASED ON MULTI-BLOCK LOCAL BINARY PATTERNS P.G. Demdov Yaroslavl State Unversty Anatoly Ntn, Vladmr Khryashchev, Olga Stepanova, Igor Kostern EYE CENTER LOCALIZATION ON A FACIAL IMAGE BASED ON MULTI-BLOCK LOCAL BINARY PATTERNS Yaroslavl, 2015 Eye

More information

CHAPTER 3 ENCODING VIDEO SEQUENCES IN FRACTAL BASED COMPRESSION. Day by day, the demands for higher and faster technologies are rapidly

CHAPTER 3 ENCODING VIDEO SEQUENCES IN FRACTAL BASED COMPRESSION. Day by day, the demands for higher and faster technologies are rapidly 65 CHAPTER 3 ENCODING VIDEO SEQUENCES IN FRACTAL BASED COMPRESSION 3.1 Introducton Day by day, the demands for hgher and faster technologes are rapdly ncreasng. Although the technologes avalable now are

More information

Compiler Design. Spring Register Allocation. Sample Exercises and Solutions. Prof. Pedro C. Diniz

Compiler Design. Spring Register Allocation. Sample Exercises and Solutions. Prof. Pedro C. Diniz Compler Desgn Sprng 2014 Regster Allocaton Sample Exercses and Solutons Prof. Pedro C. Dnz USC / Informaton Scences Insttute 4676 Admralty Way, Sute 1001 Marna del Rey, Calforna 90292 pedro@s.edu Regster

More information

Security Enhanced Dynamic ID based Remote User Authentication Scheme for Multi-Server Environments

Security Enhanced Dynamic ID based Remote User Authentication Scheme for Multi-Server Environments Internatonal Journal of u- and e- ervce, cence and Technology Vol8, o 7 0), pp7-6 http://dxdoorg/07/unesst087 ecurty Enhanced Dynamc ID based Remote ser Authentcaton cheme for ult-erver Envronments Jun-ub

More information

Face Recognition University at Buffalo CSE666 Lecture Slides Resources:

Face Recognition University at Buffalo CSE666 Lecture Slides Resources: Face Recognton Unversty at Buffalo CSE666 Lecture Sldes Resources: http://www.face-rec.org/algorthms/ Overvew of face recognton algorthms Correlaton - Pxel based correspondence between two face mages Structural

More information

A DCVS Reconstruction Algorithm for Mine Video Monitoring Image Based on Block Classification

A DCVS Reconstruction Algorithm for Mine Video Monitoring Image Based on Block Classification 1 3 4 5 6 7 8 9 10 11 1 13 14 15 16 17 18 19 0 1 Artcle A DCVS Reconstructon Algorthm for Mne Vdeo Montorng Image Based on Block Classfcaton Xaohu Zhao 1,, Xueru Shen 1,, *, Kuan Wang 1, and Wanme L 1,

More information

A fast algorithm for color image segmentation

A fast algorithm for color image segmentation Unersty of Wollongong Research Onlne Faculty of Informatcs - Papers (Arche) Faculty of Engneerng and Informaton Scences 006 A fast algorthm for color mage segmentaton L. Dong Unersty of Wollongong, lju@uow.edu.au

More information

A Clustering Algorithm for Key Frame Extraction Based on Density Peak

A Clustering Algorithm for Key Frame Extraction Based on Density Peak Journal of Computer and Communcatons, 2018, 6, 118-128 http://www.scrp.org/ournal/cc ISSN Onlne: 2327-5227 ISSN Prnt: 2327-5219 A Clusterng Algorthm for Key Frame Extracton Based on Densty Peak Hong Zhao

More information

Load Balancing for Hex-Cell Interconnection Network

Load Balancing for Hex-Cell Interconnection Network Int. J. Communcatons, Network and System Scences,,, - Publshed Onlne Aprl n ScRes. http://www.scrp.org/journal/jcns http://dx.do.org/./jcns.. Load Balancng for Hex-Cell Interconnecton Network Saher Manaseer,

More information

Related-Mode Attacks on CTR Encryption Mode

Related-Mode Attacks on CTR Encryption Mode Internatonal Journal of Network Securty, Vol.4, No.3, PP.282 287, May 2007 282 Related-Mode Attacks on CTR Encrypton Mode Dayn Wang, Dongda Ln, and Wenlng Wu (Correspondng author: Dayn Wang) Key Laboratory

More information

Classification Based Mode Decisions for Video over Networks

Classification Based Mode Decisions for Video over Networks Classfcaton Based Mode Decsons for Vdeo over Networks Deepak S. Turaga and Tsuhan Chen Advanced Multmeda Processng Lab Tranng data for Inter-Intra Decson Inter-Intra Decson Regons pdf 6 5 6 5 Energy 4

More information

A Gradient Difference based Technique for Video Text Detection

A Gradient Difference based Technique for Video Text Detection A Gradent Dfference based Technque for Vdeo Text Detecton Palaahnakote Shvakumara, Trung Quy Phan and Chew Lm Tan School of Computng, Natonal Unversty of Sngapore {shva, phanquyt, tancl }@comp.nus.edu.sg

More information

REMOTE SENSING REQUIREMENTS DEVELOPMENT: A SIMULATION-BASED APPROACH

REMOTE SENSING REQUIREMENTS DEVELOPMENT: A SIMULATION-BASED APPROACH REMOTE SENSING REQUIREMENTS DEVEOPMENT: A SIMUATION-BASED APPROAC V. Zanon a, B. Davs a, R. Ryan b, G. Gasser c, S. Blonsk b a Earth Scence Applcatons Drectorate, Natonal Aeronautcs and Space Admnstraton,

More information

Geometrically Invariant Watermarking Scheme Based on Local Feature Points

Geometrically Invariant Watermarking Scheme Based on Local Feature Points JOURNAL OF MULTIMEDIA, VOL. 7, NO. 3, JUNE 0 3 Geometrcally Invarant Watermarkng Scheme Based on Local Feature Ponts L Jng School of Computer and Informaton Engneerng, Henan Unversty of Economcs and Law,

More information

Shape Representation Robust to the Sketching Order Using Distance Map and Direction Histogram

Shape Representation Robust to the Sketching Order Using Distance Map and Direction Histogram Shape Representaton Robust to the Sketchng Order Usng Dstance Map and Drecton Hstogram Department of Computer Scence Yonse Unversty Kwon Yun CONTENTS Revew Topc Proposed Method System Overvew Sketch Normalzaton

More information

Local Quaternary Patterns and Feature Local Quaternary Patterns

Local Quaternary Patterns and Feature Local Quaternary Patterns Local Quaternary Patterns and Feature Local Quaternary Patterns Jayu Gu and Chengjun Lu The Department of Computer Scence, New Jersey Insttute of Technology, Newark, NJ 0102, USA Abstract - Ths paper presents

More information

Fuzzy C-Means Initialized by Fixed Threshold Clustering for Improving Image Retrieval

Fuzzy C-Means Initialized by Fixed Threshold Clustering for Improving Image Retrieval Fuzzy -Means Intalzed by Fxed Threshold lusterng for Improvng Image Retreval NAWARA HANSIRI, SIRIPORN SUPRATID,HOM KIMPAN 3 Faculty of Informaton Technology Rangst Unversty Muang-Ake, Paholyotn Road, Patumtan,

More information

FEATURE EXTRACTION. Dr. K.Vijayarekha. Associate Dean School of Electrical and Electronics Engineering SASTRA University, Thanjavur

FEATURE EXTRACTION. Dr. K.Vijayarekha. Associate Dean School of Electrical and Electronics Engineering SASTRA University, Thanjavur FEATURE EXTRACTION Dr. K.Vjayarekha Assocate Dean School of Electrcal and Electroncs Engneerng SASTRA Unversty, Thanjavur613 41 Jont Intatve of IITs and IISc Funded by MHRD Page 1 of 8 Table of Contents

More information

A Gradient Difference based Technique for Video Text Detection

A Gradient Difference based Technique for Video Text Detection 2009 10th Internatonal Conference on Document Analyss and Recognton A Gradent Dfference based Technque for Vdeo Text Detecton Palaahnakote Shvakumara, Trung Quy Phan and Chew Lm Tan School of Computng,

More information

Data Hiding and Image Authentication for Color-Palette Images

Data Hiding and Image Authentication for Color-Palette Images Data Hdng and Image Authentcaton for Color-Palette Images Chh-Yang Yn ( 殷志揚 ) and Wen-Hsang Tsa ( 蔡文祥 ) Department of Computer & Informaton Scence Natonal Chao Tung Unversty 00 Ta Hsueh Rd., Hsnchu, Tawan

More information

MOTION BLUR ESTIMATION AT CORNERS

MOTION BLUR ESTIMATION AT CORNERS Gacomo Boracch and Vncenzo Caglot Dpartmento d Elettronca e Informazone, Poltecnco d Mlano, Va Ponzo, 34/5-20133 MILANO boracch@elet.polm.t, caglot@elet.polm.t Keywords: Abstract: Pont Spread Functon Parameter

More information

Computer Animation and Visualisation. Lecture 4. Rigging / Skinning

Computer Animation and Visualisation. Lecture 4. Rigging / Skinning Computer Anmaton and Vsualsaton Lecture 4. Rggng / Sknnng Taku Komura Overvew Sknnng / Rggng Background knowledge Lnear Blendng How to decde weghts? Example-based Method Anatomcal models Sknnng Assume

More information

Simulation Based Analysis of FAST TCP using OMNET++

Simulation Based Analysis of FAST TCP using OMNET++ Smulaton Based Analyss of FAST TCP usng OMNET++ Umar ul Hassan 04030038@lums.edu.pk Md Term Report CS678 Topcs n Internet Research Sprng, 2006 Introducton Internet traffc s doublng roughly every 3 months

More information

Dynamic Code Block Size for JPEG 2000

Dynamic Code Block Size for JPEG 2000 Dynamc Code Block Sze for JPEG 2000 Png-Sng Tsa a, Yann LeCornec b a Dept. of Computer Scence, Unv. of Texas Pan Amercan, 1201 W. Unv. Dr., Ednburg, TX USA 78539-2999; b Sgma Desgns, Inc., 1778 McCarthy

More information

Protection of Real and Artwork Human Objects based on a Chaotic Moments Modulation Method

Protection of Real and Artwork Human Objects based on a Chaotic Moments Modulation Method 1 Protecton of Real and Artwork Human Objects based on a Chaotc Moments Modulaton Method Klms Ntalans 1, Paraskev Tzouvel 1, Stefanos Kollas 1 and Athanasos Drgkas 1 Natonal Techncal Unversty of Athens,

More information

PYTHON IMPLEMENTATION OF VISUAL SECRET SHARING SCHEMES

PYTHON IMPLEMENTATION OF VISUAL SECRET SHARING SCHEMES PYTHON IMPLEMENTATION OF VISUAL SECRET SHARING SCHEMES Ruxandra Olmd Faculty of Mathematcs and Computer Scence, Unversty of Bucharest Emal: ruxandra.olmd@fm.unbuc.ro Abstract Vsual secret sharng schemes

More information

Deep learning is a good steganalysis tool when embedding key is reused for different images, even if there is a cover source-mismatch

Deep learning is a good steganalysis tool when embedding key is reused for different images, even if there is a cover source-mismatch Deep learnng s a good steganalyss tool when embeddng key s reused for dfferent mages, even f there s a cover source-msmatch Lonel PIBRE 2,3, Jérôme PASQUET 2,3, Dno IENCO 2,3, Marc CHAUMONT 1,2,3 (1) Unversty

More information