Image hiding with an improved genetic algorithm and an optimal pixel adjustment process

Size: px
Start display at page:

Download "Image hiding with an improved genetic algorithm and an optimal pixel adjustment process"

Transcription

1 Eighth International Conference on Intelligent Systes Design and Applications Iage hiding with an iproved genetic algorith and an optial pixel adjustent process Lin-Yu Tseng Yung-Kuan Chan Yu-An Ho Yen-Ping Chu Departent of Coputer Departent of Manageent Departent of Coputer Departent of Coputer Science and Engineering Inforation Systes Science and Engineering Science and Engineering Chung Hsing University Chung Hsing University Chung Hsing University Chung Hsing University Taichung, Taiwan, R.O.C. Taichung, Taiwan, R.O.C. Taichung, Taiwan, R.O.C. Taichung, Taiwan, R.O.C. Abstract Iage hiding techniques ebed a secret iage into a cover iage. The fusion of the two, called a stegoiage, fools grabbers who would not be conscious of the differences between the cover iage and. the stegoiage. A secret iage can be transferred safely using this technique. In general, we would disarrange each pixel in the secret iage and adjust all of the to for a suitable string of bits that could be ebedded. Then these bits are ebedded into the cover iage in corresponding places, and this iage would becoe a stego-iage that hides secret data. This paper suggests a new iage disarranging technique. It uses an iproved genetic algorith and an Optial Pixel Adjustent Process, OPAP, to enhance the quality of a Stego-iage. Experiental results show that a stegoiage is indistinguishable fro the cover-iage. The stego-iage can ebed bits per pixel, and the eansquare error of a stego-iage is uch lower than results for previous ethods [,,, ].. Introduction Using the Internet, secret data can be transitted speedily. However receivers and senders use various encryption ethods to prevent exposure to hacers [6-7, 9, 3, ]. In order to protect transitted data, iportant data is encrypted using encrypting and decrypting calculations. The process ay use a series of ciphers that see to be disordered nonsense to encrypt data before sending it []. At the receiving end, a decryption calculation is used. Through this ethod, encrypted data can be transitted over the Internet. Even if hacers do obtain the encoding ciphers, if they cannot obtain the original secret data, they will never uncover the inforation that was hidden in the cipher. The above-entioned ethod has one weaness: encrypted ciphers attract hacers attention. Therefore, if ciphers can be ebedded into a general, natural iage, hacers would be isdirected. This ethod is called data hiding. Iage hiding techniques ainly deal with a secret iage ebedded within a cover iage to get a Stego-iage. This Stego-iage conceals hidden data without advertising that it is hiding anything. One coon ethod is called Leastsignificant-bit (LSB) [5, 8, 5-6]. LSB replaces a cover-iage directly, after hiding a secret iage within it. In general, bit-apped iages are coonly used. Every iage is coprised of pixels, and each pixel indicates one color. If an iage is shown in gray-scale, with a range of values fro 0 to 55, lower values signify darness, and higher values, lightness. Therefore, a gray-level iage can be adjusted by adjusting the values. At least 8 bits are required to represent these values, and the binary syste stores the fro the ost signification bit to the least signification bit a a...a. LSB substitution replaces 8 7 the least signification bit a to ae iperceptible changes that can t be recognized by huan vision. For exaple, one pixel s gray-level ay be 00. When it hides a, we odify the least signification bit to becoe pixel 0. This difference can t be recognized by huan vision. In this way, we can hide another iage. Though LSB can easily ebed secret data into an iage, it would degrade iage quality in a way that ight alert hacers. Wang et al. [0] proposed a ethod called the oderately significant bit (MSB) which ebedded secret data into a cover-iage. Here the MSB eans that the fourth bit of a gray pixel is a. When ebedding, a genetic algorith can be used to find the optial substitution atrix for each pixel, and then perfor a local pixel adjustent process (LPAP) to iprove the quality of the stego-iage. Chan et al /08 $ IEEE DOI 0.09/ISDA

2 [3] pointed out that the LPAP adjusts the fourth bit against LSB. Thus, the ethod cannot be applied for siple LSB substitution. This ethod uses a loo-up table to adjust the iage ebedding. In addition to the fourth bit of LSB, other bits ight be odified to achieve the best result. Afterwards, Wang et al. [] proposed a ethod which uses bijective apping function to disarrange the secret data prior to ebedding the into the cover iage. Because of the nuerous cobinations after disarranging, this ethod goes a step further by utilizing a genetic algorith to see and find the optial solution. Though this ethod has reduced calculating tie, acquired bijective apping function only approxiates optial solution. Chang et al. [] utilized a dynaic prograing strategy to deterine the optial solution, and even reduced the calculating tie. In 003, Thien et al., [] proposed a highhiding-capacity ethod which can ebed data via a digit by digit syste in real tie and achieve a uch higher vision quality than LSB can, while avoiding resulting artificial edges of LSB. Against iage hiding technique, Chan et al. [] proposed an optial pixel adjustent process, OPAP. The concept follows the ethod subitted by Wang et al. [0]. It handles the last bits of the iage and eploys an optial pixel adjustent process to lessen the related coplicated calculating. Although the ethod that was subitted by Wang et al. [0] has iproved the iage quality substantially, in order to provide uch greater cover iage quality, this paper proposes a whole new iage disarrange technique. We utilize an iproved genetic algorith and Optial Pixel Adjustent Process, OPAP to enhance the quality of the cover iage. The reainder of the paper is organized as follows. The adjustent procedure of the optial pixel will be introduced in the second section. The third section will introduce the hiding iage technique that is proposed in this paper. The fourth section is the experiental results of the proposed ethod, and a contrast with other ethods. The fifth section is the conclusion.. Optial pixel adjustent process This section will introduce OPAP as proposed by Chan et al. []. The ain construct of OPAP follows the ethod that was subitted by Wang et al. [0]. It does optial adjustent with the last bits of an iage, and uses low coplicated calculating. The ain calculation of OPAP is eployed as algorith opap: Algorith opap Inputs: Transfored secret iage Output: Stego-iage { C S, Cover iage C For j 0 to M- Do for i 0 to N- Do D[ od S[ If ( D [ > ) Then if ( C [ < 55 ) Then C [ + Else C [ Else if ( D [ < ) Then if ( C [ > ) Then C [ Else C [ Else C [ } Inputs are secret iage S and cover iage C; then secret iage S is rearranged to becoe S which is the sae size as the cover iage. The bit plane of S is saller than the bit plane of C which is an ebedded bit plane. M and N are the height and the width, and j and i are the coordinate of the iage. D [ is the value that subtracts secret iage S fro the place of LSB of C. If C [ = 00, S [ = 5, =, then D [ = 00 od 5 = is saller than 3. As a result, we tae 00-(-)-6=95. This way, the difference will be saller than 00+= which is the direct ebedding of LSB bits fro 00, and it could also reduce the value of the ean square error. In the end, it outputs adjusted stego-iage C. 3. The proposed ethod This section introduces a secret iage transfor ethod. This ethod utilizes a genetic algorith to deterine the optial transfor seed to get the best quality cover iage. 3.. A secret iage transfor ethod First, our ethod adjusts secret iage S to be the sae size as the cover-iage. Suppose that the value of the pixel of gray-level is g-bit pixel value, the size of the cover-iage is M N, and the size of the c c secret iage M N ; according to equation (), it can s s then obtain the inforation on the lowest nuber of deand bits of one pixel of the cover-iage in order to ebed it totally within the secret iage. Therefore, it can transfor the size of the secret iage to equal 3

3 that of the cover iage, and be shown as S. Furtherore, each pixel is shown at least as bits. g M M s s =. () M N c c Then, tae the acquired S to perfor the transfor using a rando seed. While transforing, at first it will result in a fixed size of transfor bloc expressed R = r[ 0 i, j n, where by: { } r [ { 0,,,..., } bloc size,. Moreover, according to the S will be segented by n n size, S = q[ ] 0 i i, j n, here becoing { } q [ { 0,,,..., }. is the serial nuber of the segented blocs. Then add each S to R, and tae the reainder of. As a result, it can get a disarranged secret iage S which is shown as equation (): " S = ( S + R)od. () Assue that n is, is, and is (ean of the first bloc). There is a siple exaple as follows: S =, R =, " S = ( S + R) od = The acquired " S is the reainder of which is the result of adding S to R. Finally, ebed S " to C to get the stego-iage C. We can use equation (3) pea signal-to-noise (PSNR) and equation () ean square error (MSE) to estiate the quality difference between C and C. The definition of the function of PSNR is as follows: PSNR = 0log (55) db MSE (3) And the definition of MSE is as follow: MSE = M N () It can return to the M N ( C C ) j= i= S only by subtracting R fro " S. If there was a negative nuber in the resulting blocs, then add to return to S. 3.. Iproved genetic algorith According to all possible results of R in Section 3., n n they can bring ( ) inds of changes. Therefore, calculating every change would tae lots of tie. The following introduce how to find out the approxiate optial solution by algorith A. Algorith A Inputs: Define the fitness function, nuber of generation size of population, crossover rate, utation rate and selection rate. Output: The best chroosoe. { enerate the chroosoes of the first generation by rando selection. For g 0 to generation Do Optial Pixel Adjustent Process by chroosoe Evaluate the fitness value MSE by chroosoe If Satisfy the ending condition Than Obtain the best solution Brea Select the better chroosoes Recobine new chroosoes by using crossover Recobine new chroosoes by using utation. } First, it has to input the secret iage, transfored by the chroosoes that were built in the first generation, and then ebed it into the cover iage as well as calculate the value of MSE. In the second step, it has to execute a loop according the set nubers of generation. If it is satisfied with the set value of MSE while executing, it will then brea fro the loop and output the suitable chroosoe. If it is not satisfied with the value of MSE, it will choose a better one fro aong these chroosoes. Furtherore, it will result a new generation of chroosoes through crossover and utation, and then transfer the to the next generation for evaluation. When it is satisfied with the nuber of ties of generation or the set value of MSE, it will stop reproducing and output the best transfored bloc. The procedure of crossover can be handled by one point or two points. At first, transfor the two diension R transfor into a one diension bloc. The handling process is as follows: a a a a 0 3 a a5 a 6 a 7 [ a a... a ]. 0 5 a a a a a a a a 3 5 Then, tae this one diension bloc as a chroosoe. If there were two chroosoes, and which are shown as Figure (a), the gene of is 3

4 shown by boldface while the gene of is in regular font. After a one point crossover, the result is shown as Figure (b). It results in new chroosoes and (a) (b) Figure. A siple exaple: after crossover, (a) and (b) becoe and. Mutation ainly provides each gene with a probability. If the gene falls into the range of probability, then it will reproduce a new eleent at rando. Figure is the utation results of. Boldface nubers are the reproduced genes which fall into a given probability. " Figure. The result is utation of. Boldface nubers are the reproduced genes which fall into a given probability Discussion of set way of atrix There are various inds of design ethods of transfor bloc. One anner uses a n n bloc R to handle a whole iage. The second anner segents the iage into four sub-iages and individually trains each sub-iage by a ( n / ) ( n / ) bloc. Then, it will get the best four ( n / ) ( n / ) blocs, with the total size equal to a n n bloc. The third anner segents the iage into 6 sub-iages, and individually trains each sub-iage by a ( n / ) ( n / ) bloc. Then, it will get the best 6 ( n / ) ( n / ) blocs. Here the total size is equal to a n n bloc. The experiental result will show that the third anner spends uch less tie while obtaining the highest quality.. Experiental results This section ainly discusses the quality of a hidden iage by the ethod that is proposed in this paper, by experient. The progra is written in C++ Builder, and executed under an AMD Athlon 600+ and RAM WinXP syste. The size of the experiental stego-iage is 5 5 pixels graylevel, as shown as Figure 3(a) and 3(b). The secret iage is 56 5 pixels gray-level iages, shown as Figure 3(b), (c) and (d). Therefore, the data hiding rate is bits of each pixel. Then, an 8 8 bloc R, four bloc R, and bloc R are taen as the transfor bloc, and the secret iage is disarranged by three ethods: a whole iage, sub-iages, and 6 sub-iages. As a result, these 56 bits are secret eys. First, we transfor a secret iage by one 8 8 bloc R. In the process of genetic algorith, it will produce forty R, and treat the lie chroosoes. If these forty R were handled by set 0.5 crossover rates and 0.3 utation rates, it would reproduce another new forty chroosoes. Then, we pic out 0 chroosoes whose value of MSE are uch lower aong the 80 chroosoes, and tae these 0 chroosoes as the next generation chroosoes. Therefore, the selection rate is 0.5. The last generation, which is tested 000 ties, will tae the lowest value of MSE which is produced by R as transfor bloc. After 000 generations, we will now that the MSE still can be iproved when it is transfored at the 75st generation. Therefore, the 000 cycles of generation tae 33 inutes and 9 seconds, and the value of MSE is.3. Then, the stego-iage is segented into four subiages and each sub-iage is transfored individually by a bloc. In the process of genetic algorith, it will produce forty R for each sub-iage, tae the as chroosoes and handled by set 0.5 crossover rates, 0.3 utation rates and 0.5 selection rates. After 500 generations, it will tae the lowest value of MSE which is produced by a bloc as transfor bloc. There will be four blocs in the whole iage, and the cobined size will equal that of a 8 8 bloc. After 00 generations, we will now that the iproved range of generation deceases. It is finished after 500 ties generation, taes 7 inutes and 3 seconds, and the value of MSE is Finally, the stego-iage is segented into sixteen sub-iages, and each sub-iage is individually transfored by one bloc. In the process of genetic algorith, it will be handled by set 0.5 crossover rates, 0.3 utation rates and 0.5 selection rates. After 00 generations, it will tae the lowest value of MSE which is produced by the bloc as 33

5 the transfor bloc. There will be sixteen blocs in the whole iage, and the cobined size will be equal to that of the 8 8 bloc. After 0 generations, we will now that the iproved range of generation greatly decreases. It is finished after 00 ties generation, taes four inutes and five seconds, and the value of MSE is By genetic algorith, it can set the initial transfor bloc at rando fro the enorous transfor bloc, then use crossover, utation and selection to produce new generation, and explore if there is a better transfor bloc. The experient too lots of test tie, but in reality, it can set fewer nubers of generations to deterine the better transfor bloc. Table shows the results of the proposed ethods: 8 8, four, and sixteen of the cover iage Lena and three secret iages. It also lists the contrast result of siple LSB substitution, genetic algorith [], dynaic prograing [] and optial pixel adjustent process [, ]. Table shows the contrast between the proposed ethod and other ethods of the cover iage pepper and other three secret iages. We understand that the proposed ethod can obtain the least value of MSE. 5. Conclusions While transferring data over the Internet, we face any unnowns. To transfer data securely, a safety syste is needed. This paper proposes an effective, siple iage-hiding technique to iprove the quality of stego-iages. It can raise the quality of the stegoiage, and hacers ay ignore the stego-iage with its ebedded secret iage. The experiental result shows that the stego-iage and cover iage can not be distinguished. The hiding capacity can reach four bits in a pixel, and the eansquare error of the stego-iage is uch lower than for the iages which were produced by previous ethods. In the future, we hope that we can find an even better technique to hide ore data in a cover iage. Furtherore, we also have to ae efforts in cover iage odification. Less odifying or even no odifying should be the focus of future research. based on odulus function, Pattern Recognition, vol. 36, no., 003, pp [3] C. K. Chan and L.M. Cheng, Iproved hiding data in iages by optial oderately significant-bit replaceent, IEE Electronics Letters, vol. 37, no. 6, 00, pp [] C. K. Chan and L. M. Cheng, Hiding data in iage by siple LSB substitution, Pattern Recognition, vol. 37, no. 3, 00, pp [5] E. Adelson, Digital signal encoding and decoding apparatus, US Patent, no , 990. [6] J. Wang and L. Ji, A region and data hiding based error concealent schee for iages, IEEE Transactions on Consuer Electronics, vol. 7, no., 00, pp [7] K. L. Chung, C. H. Shen, and L. C. Chang, A novel SVD- and VQ-based iage hiding schee, Pattern Recognition Letters, vol., no. 9, 00, pp [8] L. F. Turner, Digital data security syste, Patent IPN WO 89/0895, 989. [9] L. M. Marvel, C.. Boncelet, and C. T. Retter, Spread spectru iage steganography, IEEE Transactions on Iage Processing, vol. 8, no. 8, 999, pp [0] R. Z. Wang, C. F. Lin, and J. C. Lin, Hiding data in iages by optial oderately significant-bit replaceent, IEE Electronics Letters, vol. 36, no. 5, 000, pp []N.. Bourbais and C. Alexopoulos, Picture data encryption using SCAN patterns, Pattern Recognition, vol. 5, no. 6, 99, pp [] R. Z. Wang, C. F. Lin, and J. C. Lin, Iage hiding by optial LSB substitution and genetic algorith, Pattern Recognition, vol. 3, no. 3, 00, pp [3] T. J. Chuang and J. C. Lin, New approach to iage encryption, Journal of Electronic Iaging, vol. 7, no., April 998, pp [] T. S. Chen, C. C. Chang, and M. S. Hwang, A virtual iage cryptosyste based upon vector quantization, IEEE Transactions on Iage Processing, vol. 7, no. 0, 998, pp [5] W. Bender, D. ruhl, N. Morioto, and A. Lu, Techniques for data hiding, IBM Systes J. vol. 35, no. 3-, 996, pp [6] W. Bender, F.J. Paiz, W. Butera, S. Pogreb, D. ruhl, and R. Hwang, Applications for data hiding, IBM Systes J. vol. 39, no. 3-, 000, pp Rerferences [] C. C. Chang, J. Y. Hsiao, and C. S. Chan, Finding optial least-significant-bit substitute in iage hiding by dynaic prograing strategy, Pattern Recognition, vol. 36, no. 7, 003, pp [] C. C. Thien and J. C. Lin, A siple and high-hiding capacity ethod for hiding digit-by-digit data in iages 3

6 (a) (b) (c) (d) (e) Figure 3. Testing iages (a) and (b) are cover iages: Lena and pepper. (c)(d)(e) are secret iages Jet, Tiffany, and Boat. Table. The MSE between the cover iage Lena and the stego-iage Methods Jet Tiff Boat LSB enetic Algorith [] Dynaic prograing strategy [] OPAP [, ] Table. The MSE between the cover iage Pepper and the stego-iage Methods Jet Tiff Boat LSB enetic Algorith [] Dynaic prograing strategy [] OPAP [, ]

A Novel Fast Constructive Algorithm for Neural Classifier

A Novel Fast Constructive Algorithm for Neural Classifier A Novel Fast Constructive Algorith for Neural Classifier Xudong Jiang Centre for Signal Processing, School of Electrical and Electronic Engineering Nanyang Technological University Nanyang Avenue, Singapore

More information

A Novel 2D Texture Classifier For Gray Level Images

A Novel 2D Texture Classifier For Gray Level Images 2012, TextRoad Publication ISSN 2090-4304 Journal of Basic and Applied Scientific Research www.textroad.co A Novel 2D Texture Classifier For Gray Level Iages B.S. Mousavi 1 Young Researchers Club, Zahedan

More information

Novel Image Representation and Description Technique using Density Histogram of Feature Points

Novel Image Representation and Description Technique using Density Histogram of Feature Points Novel Iage Representation and Description Technique using Density Histogra of Feature Points Keneilwe ZUVA Departent of Coputer Science, University of Botswana, P/Bag 00704 UB, Gaborone, Botswana and Tranos

More information

Computer Aided Drafting, Design and Manufacturing Volume 26, Number 2, June 2016, Page 13

Computer Aided Drafting, Design and Manufacturing Volume 26, Number 2, June 2016, Page 13 Coputer Aided Drafting, Design and Manufacturing Volue 26, uber 2, June 2016, Page 13 CADDM 3D reconstruction of coplex curved objects fro line drawings Sun Yanling, Dong Lijun Institute of Mechanical

More information

COLOR HISTOGRAM AND DISCRETE COSINE TRANSFORM FOR COLOR IMAGE RETRIEVAL

COLOR HISTOGRAM AND DISCRETE COSINE TRANSFORM FOR COLOR IMAGE RETRIEVAL COLOR HISTOGRAM AND DISCRETE COSINE TRANSFORM FOR COLOR IMAGE RETRIEVAL 1 Te-Wei Chiang ( 蔣德威 ), 2 Tienwei Tsai ( 蔡殿偉 ), 3 Jeng-Ping Lin ( 林正平 ) 1 Dept. of Accounting Inforation Systes, Chilee Institute

More information

TensorFlow and Keras-based Convolutional Neural Network in CAT Image Recognition Ang LI 1,*, Yi-xiang LI 2 and Xue-hui LI 3

TensorFlow and Keras-based Convolutional Neural Network in CAT Image Recognition Ang LI 1,*, Yi-xiang LI 2 and Xue-hui LI 3 2017 2nd International Conference on Coputational Modeling, Siulation and Applied Matheatics (CMSAM 2017) ISBN: 978-1-60595-499-8 TensorFlow and Keras-based Convolutional Neural Network in CAT Iage Recognition

More information

Meaningful Shadows for Image Secret Sharing with Steganography and Authentication Techniques

Meaningful Shadows for Image Secret Sharing with Steganography and Authentication Techniques Journal of Information Hiding and Multimedia Signal Processing 2014 ISSN 2073-4212 Ubiquitous International Volume 5, Number 3, July 2014 Meaningful Shadows for Image Secret Sharing with Steganography

More information

The optimization design of microphone array layout for wideband noise sources

The optimization design of microphone array layout for wideband noise sources PROCEEDINGS of the 22 nd International Congress on Acoustics Acoustic Array Systes: Paper ICA2016-903 The optiization design of icrophone array layout for wideband noise sources Pengxiao Teng (a), Jun

More information

A Revisit to LSB Substitution Based Data Hiding for Embedding More Information

A Revisit to LSB Substitution Based Data Hiding for Embedding More Information A Revisit to LSB Substitution Based Data Hiding for Embedding More Information Yanjun Liu 1,, Chin-Chen Chang 1, and Tzu-Yi Chien 2 1 Department of Information Engineering and Computer Science, Feng Chia

More information

MULTI-INDEX VOTING FOR ASYMMETRIC DISTANCE COMPUTATION IN A LARGE-SCALE BINARY CODES. Chih-Yi Chiu, Yu-Cyuan Liou, and Sheng-Hao Chou

MULTI-INDEX VOTING FOR ASYMMETRIC DISTANCE COMPUTATION IN A LARGE-SCALE BINARY CODES. Chih-Yi Chiu, Yu-Cyuan Liou, and Sheng-Hao Chou MULTI-INDEX VOTING FOR ASYMMETRIC DISTANCE COMPUTATION IN A LARGE-SCALE BINARY CODES Chih-Yi Chiu, Yu-Cyuan Liou, and Sheng-Hao Chou Departent of Coputer Science and Inforation Engineering, National Chiayi

More information

A Broadband Spectrum Sensing Algorithm in TDCS Based on ICoSaMP Reconstruction

A Broadband Spectrum Sensing Algorithm in TDCS Based on ICoSaMP Reconstruction MATEC Web of Conferences 73, 03073(08) https://doi.org/0.05/atecconf/087303073 SMIMA 08 A roadband Spectru Sensing Algorith in TDCS ased on I Reconstruction Liu Yang, Ren Qinghua, Xu ingzheng and Li Xiazhao

More information

User-Friendly Sharing System using Polynomials with Different Primes in Two Images

User-Friendly Sharing System using Polynomials with Different Primes in Two Images User-Friendly Sharing System using Polynomials with Different Primes in Two Images Hung P. Vo Department of Engineering and Technology, Tra Vinh University, No. 16 National Road 53, Tra Vinh City, Tra

More information

Image Filter Using with Gaussian Curvature and Total Variation Model

Image Filter Using with Gaussian Curvature and Total Variation Model IJECT Vo l. 7, Is s u e 3, Ju l y - Se p t 016 ISSN : 30-7109 (Online) ISSN : 30-9543 (Print) Iage Using with Gaussian Curvature and Total Variation Model 1 Deepak Kuar Gour, Sanjay Kuar Shara 1, Dept.

More information

Energy-Efficient Disk Replacement and File Placement Techniques for Mobile Systems with Hard Disks

Energy-Efficient Disk Replacement and File Placement Techniques for Mobile Systems with Hard Disks Energy-Efficient Disk Replaceent and File Placeent Techniques for Mobile Systes with Hard Disks Young-Jin Ki School of Coputer Science & Engineering Seoul National University Seoul 151-742, KOREA youngjk@davinci.snu.ac.kr

More information

Structural Balance in Networks. An Optimizational Approach. Andrej Mrvar. Faculty of Social Sciences. University of Ljubljana. Kardeljeva pl.

Structural Balance in Networks. An Optimizational Approach. Andrej Mrvar. Faculty of Social Sciences. University of Ljubljana. Kardeljeva pl. Structural Balance in Networks An Optiizational Approach Andrej Mrvar Faculty of Social Sciences University of Ljubljana Kardeljeva pl. 5 61109 Ljubljana March 23 1994 Contents 1 Balanced and clusterable

More information

Affine Invariant Texture Analysis Based on Structural Properties 1

Affine Invariant Texture Analysis Based on Structural Properties 1 ACCV: The 5th Asian Conference on Coputer Vision, --5 January, Melbourne, Australia Affine Invariant Texture Analysis Based on tructural Properties Jianguo Zhang, Tieniu Tan National Laboratory of Pattern

More information

Miniaturized Spectrometers Chapter 1. 1 Miniaturized Spectrometers. 1.1 General Set-up

Miniaturized Spectrometers Chapter 1. 1 Miniaturized Spectrometers. 1.1 General Set-up Miniaturized Spectroeters Chapter 1 1 Miniaturized Spectroeters 1.1 General Set-up The classical spectroeter consists of an input slit, a rotating dispersive eleent (pris or grating), an output slit and

More information

Research Article A Novel Image Data Hiding Scheme with Diamond Encoding

Research Article A Novel Image Data Hiding Scheme with Diamond Encoding Hindawi Publishing Corporation EURASIP Journal on Information Security Volume 9, Article ID 65847, 9 pages doi:.55/9/65847 Research Article A Novel Image Data Hiding Scheme with Diamond Encoding Ruey-Ming

More information

3D Building Detection and Reconstruction from Aerial Images Using Perceptual Organization and Fast Graph Search

3D Building Detection and Reconstruction from Aerial Images Using Perceptual Organization and Fast Graph Search 436 Journal of Electrical Engineering & Technology, Vol. 3, No. 3, pp. 436~443, 008 3D Building Detection and Reconstruction fro Aerial Iages Using Perceptual Organization and Fast Graph Search Dong-Min

More information

Using Imperialist Competitive Algorithm in Optimization of Nonlinear Multiple Responses

Using Imperialist Competitive Algorithm in Optimization of Nonlinear Multiple Responses International Journal of Industrial Engineering & Production Research Septeber 03, Volue 4, Nuber 3 pp. 9-35 ISSN: 008-4889 http://ijiepr.iust.ac.ir/ Using Iperialist Copetitive Algorith in Optiization

More information

Feature Based Registration for Panoramic Image Generation

Feature Based Registration for Panoramic Image Generation IJCSI International Journal of Coputer Science Issues, Vol. 10, Issue 6, No, Noveber 013 www.ijcsi.org 13 Feature Based Registration for Panoraic Iage Generation Kawther Abbas Sallal 1, Abdul-Mone Saleh

More information

CLUSTERING OF AE SIGNAL AMPLITUDES BY MEANS OF FUZZY C-MEANS ALGORITHM

CLUSTERING OF AE SIGNAL AMPLITUDES BY MEANS OF FUZZY C-MEANS ALGORITHM The 12 th International Conference of the Slovenian Society for Non-Destructive Testing»Application of Conteporary Non-Destructive Testing in Engineering«Septeber 4-6, 213, Portorož, Slovenia More info

More information

International Journal of Scientific & Engineering Research, Volume 4, Issue 10, October ISSN

International Journal of Scientific & Engineering Research, Volume 4, Issue 10, October ISSN International Journal of Scientific & Engineering Research, Volue 4, Issue 0, October-203 483 Design an Encoding Technique Using Forbidden Transition free Algorith to Reduce Cross-Talk for On-Chip VLSI

More information

Defining and Surveying Wireless Link Virtualization and Wireless Network Virtualization

Defining and Surveying Wireless Link Virtualization and Wireless Network Virtualization 1 Defining and Surveying Wireless Link Virtualization and Wireless Network Virtualization Jonathan van de Belt, Haed Ahadi, and Linda E. Doyle The Centre for Future Networks and Counications - CONNECT,

More information

A Reversible Data Hiding Scheme for BTC- Compressed Images

A Reversible Data Hiding Scheme for BTC- Compressed Images IJACSA International Journal of Advanced Computer Science and Applications, A Reversible Data Hiding Scheme for BTC- Compressed Images Ching-Chiuan Lin Shih-Chieh Chen Department of Multimedia and Game

More information

Clustering. Cluster Analysis of Microarray Data. Microarray Data for Clustering. Data for Clustering

Clustering. Cluster Analysis of Microarray Data. Microarray Data for Clustering. Data for Clustering Clustering Cluster Analysis of Microarray Data 4/3/009 Copyright 009 Dan Nettleton Group obects that are siilar to one another together in a cluster. Separate obects that are dissiilar fro each other into

More information

COMPUTER GENERATED HOLOGRAMS Optical Sciences 627 W.J. Dallas (Monday, August 23, 2004, 12:38 PM) PART III: CHAPTER ONE DIFFUSERS FOR CGH S

COMPUTER GENERATED HOLOGRAMS Optical Sciences 627 W.J. Dallas (Monday, August 23, 2004, 12:38 PM) PART III: CHAPTER ONE DIFFUSERS FOR CGH S COPUTER GEERATED HOLOGRAS Optical Sciences 67 W.J. Dallas (onday, August 3, 004, 1:38 P) PART III: CHAPTER OE DIFFUSERS FOR CGH S Part III: Chapter One Page 1 of 8 Introduction Hologras for display purposes

More information

Evaluation of a multi-frame blind deconvolution algorithm using Cramér-Rao bounds

Evaluation of a multi-frame blind deconvolution algorithm using Cramér-Rao bounds Evaluation of a ulti-frae blind deconvolution algorith using Craér-Rao bounds Charles C. Beckner, Jr. Air Force Research Laboratory, 3550 Aberdeen Ave SE, Kirtland AFB, New Mexico, USA 87117-5776 Charles

More information

EE 364B Convex Optimization An ADMM Solution to the Sparse Coding Problem. Sonia Bhaskar, Will Zou Final Project Spring 2011

EE 364B Convex Optimization An ADMM Solution to the Sparse Coding Problem. Sonia Bhaskar, Will Zou Final Project Spring 2011 EE 364B Convex Optiization An ADMM Solution to the Sparse Coding Proble Sonia Bhaskar, Will Zou Final Project Spring 20 I. INTRODUCTION For our project, we apply the ethod of the alternating direction

More information

Feature Selection to Relate Words and Images

Feature Selection to Relate Words and Images The Open Inforation Systes Journal, 2009, 3, 9-13 9 Feature Selection to Relate Words and Iages Wei-Chao Lin 1 and Chih-Fong Tsai*,2 Open Access 1 Departent of Coputing, Engineering and Technology, University

More information

POSITION-PATCH BASED FACE HALLUCINATION VIA LOCALITY-CONSTRAINED REPRESENTATION. Junjun Jiang, Ruimin Hu, Zhen Han, Tao Lu, and Kebin Huang

POSITION-PATCH BASED FACE HALLUCINATION VIA LOCALITY-CONSTRAINED REPRESENTATION. Junjun Jiang, Ruimin Hu, Zhen Han, Tao Lu, and Kebin Huang IEEE International Conference on ultiedia and Expo POSITION-PATCH BASED FACE HALLUCINATION VIA LOCALITY-CONSTRAINED REPRESENTATION Junjun Jiang, Ruiin Hu, Zhen Han, Tao Lu, and Kebin Huang National Engineering

More information

A Grayscale Image Steganography Based upon Discrete Cosine Transformation

A Grayscale Image Steganography Based upon Discrete Cosine Transformation A Grayscale Image Steganography Based upon Discrete Cosine Transformation Chin-Chen Chang 1, Pei-Yu Lin, and Jun-Chou Chuang 3 1 Department of Information Engineering and Computer Science, Feng Chia University,

More information

Adaptive Steganography Method Based on Two Tiers Pixel Value Differencing

Adaptive Steganography Method Based on Two Tiers Pixel Value Differencing Adaptive Steganography Method Based on Two Tiers Pixel Value Differencing Chi-Yao Weng 1, Yen-Chia Huang 1, Chin-Feng Lee 2(&), and Dong-Peng Lin 2 1 Department of Computer Science, National Pingtung University,

More information

A Beam Search Method to Solve the Problem of Assignment Cells to Switches in a Cellular Mobile Network

A Beam Search Method to Solve the Problem of Assignment Cells to Switches in a Cellular Mobile Network A Bea Search Method to Solve the Proble of Assignent Cells to Switches in a Cellular Mobile Networ Cassilda Maria Ribeiro Faculdade de Engenharia de Guaratinguetá - DMA UNESP - São Paulo State University

More information

Gromov-Hausdorff Distance Between Metric Graphs

Gromov-Hausdorff Distance Between Metric Graphs Groov-Hausdorff Distance Between Metric Graphs Jiwon Choi St Mark s School January, 019 Abstract In this paper we study the Groov-Hausdorff distance between two etric graphs We copute the precise value

More information

A Fast Multi-Objective Genetic Algorithm for Hardware-Software Partitioning In Embedded System Design

A Fast Multi-Objective Genetic Algorithm for Hardware-Software Partitioning In Embedded System Design A Fast Multi-Obective Genetic Algorith for Hardware-Software Partitioning In Ebedded Syste Design 1 M.Jagadeeswari, 2 M.C.Bhuvaneswari 1 Research Scholar, P.S.G College of Technology, Coibatore, India

More information

News Events Clustering Method Based on Staging Incremental Single-Pass Technique

News Events Clustering Method Based on Staging Incremental Single-Pass Technique News Events Clustering Method Based on Staging Increental Single-Pass Technique LI Yongyi 1,a *, Gao Yin 2 1 School of Electronics and Inforation Engineering QinZhou University 535099 Guangxi, China 2

More information

Minimax Sensor Location to Monitor a Piecewise Linear Curve

Minimax Sensor Location to Monitor a Piecewise Linear Curve NSF GRANT #040040 NSF PROGRAM NAME: Operations Research Miniax Sensor Location to Monitor a Piecewise Linear Curve To M. Cavalier The Pennsylvania State University University Par, PA 680 Whitney A. Conner

More information

Different criteria of dynamic routing

Different criteria of dynamic routing Procedia Coputer Science Volue 66, 2015, Pages 166 173 YSC 2015. 4th International Young Scientists Conference on Coputational Science Different criteria of dynaic routing Kurochkin 1*, Grinberg 1 1 Kharkevich

More information

A Periodic Dynamic Load Balancing Method

A Periodic Dynamic Load Balancing Method 2016 3 rd International Conference on Engineering Technology and Application (ICETA 2016) ISBN: 978-1-60595-383-0 A Periodic Dynaic Load Balancing Method Taotao Fan* State Key Laboratory of Inforation

More information

EFFICIENT VIDEO SEARCH USING IMAGE QUERIES A. Araujo1, M. Makar2, V. Chandrasekhar3, D. Chen1, S. Tsai1, H. Chen1, R. Angst1 and B.

EFFICIENT VIDEO SEARCH USING IMAGE QUERIES A. Araujo1, M. Makar2, V. Chandrasekhar3, D. Chen1, S. Tsai1, H. Chen1, R. Angst1 and B. EFFICIENT VIDEO SEARCH USING IMAGE QUERIES A. Araujo1, M. Makar2, V. Chandrasekhar3, D. Chen1, S. Tsai1, H. Chen1, R. Angst1 and B. Girod1 1 Stanford University, USA 2 Qualco Inc., USA ABSTRACT We study

More information

Geo-activity Recommendations by using Improved Feature Combination

Geo-activity Recommendations by using Improved Feature Combination Geo-activity Recoendations by using Iproved Feature Cobination Masoud Sattari Middle East Technical University Ankara, Turkey e76326@ceng.etu.edu.tr Murat Manguoglu Middle East Technical University Ankara,

More information

Collaborative Web Caching Based on Proxy Affinities

Collaborative Web Caching Based on Proxy Affinities Collaborative Web Caching Based on Proxy Affinities Jiong Yang T J Watson Research Center IBM jiyang@usibco Wei Wang T J Watson Research Center IBM ww1@usibco Richard Muntz Coputer Science Departent UCLA

More information

Galois Homomorphic Fractal Approach for the Recognition of Emotion

Galois Homomorphic Fractal Approach for the Recognition of Emotion Galois Hooorphic Fractal Approach for the Recognition of Eotion T. G. Grace Elizabeth Rani 1, G. Jayalalitha 1 Research Scholar, Bharathiar University, India, Associate Professor, Departent of Matheatics,

More information

Investigation of The Time-Offset-Based QoS Support with Optical Burst Switching in WDM Networks

Investigation of The Time-Offset-Based QoS Support with Optical Burst Switching in WDM Networks Investigation of The Tie-Offset-Based QoS Support with Optical Burst Switching in WDM Networks Pingyi Fan, Chongxi Feng,Yichao Wang, Ning Ge State Key Laboratory on Microwave and Digital Counications,

More information

Boosted Detection of Objects and Attributes

Boosted Detection of Objects and Attributes L M M Boosted Detection of Objects and Attributes Abstract We present a new fraework for detection of object and attributes in iages based on boosted cobination of priitive classifiers. The fraework directly

More information

A simplified approach to merging partial plane images

A simplified approach to merging partial plane images A siplified approach to erging partial plane iages Mária Kruláková 1 This paper introduces a ethod of iage recognition based on the gradual generating and analysis of data structure consisting of the 2D

More information

A new approach to the secret image sharing with steganography and authentication

A new approach to the secret image sharing with steganography and authentication 1 A new approach to the secret image sharing with steganography and authentication C-C Wu a, M-S Hwang* b and S-J Kao a a Department of Computer Science and Engineering, National Chung Hsing University,

More information

Hybrid Stegnography using ImagesVaried PVD+ LSB Detection Program

Hybrid Stegnography using ImagesVaried PVD+ LSB Detection Program www.ijecs.in International Journal Of Engineering And Computer Science ISSN:2319-7242 Volume 4 Issue 5 May 2015, Page No. 12086-12090 Hybrid Stegnography using ImagesVaried PVD+ LSB Detection Program Shruti

More information

Module Contact: Dr Rudy Lapeer (CMP) Copyright of the University of East Anglia Version 1

Module Contact: Dr Rudy Lapeer (CMP) Copyright of the University of East Anglia Version 1 UNIVERSITY OF EAST ANGLIA School of Coputing Sciences Main Series UG Exaination 2016-17 GRAPHICS 1 CMP-5010B Tie allowed: 2 hours Answer THREE questions. Notes are not peritted in this exaination Do not

More information

DEBARRED OBJECTS RECOGNITION BY PFL OPERATOR

DEBARRED OBJECTS RECOGNITION BY PFL OPERATOR DEBARRED OBJECTS RECOGNITION BY PFL OPERATOR Manish Kuar Srivastava,Madan Kushwah, Abhishe uar 3 Assistant Professor, Departent of CSE, Lal Bahadur Shastri Group of Institutions Lucnow, Uttar Pradesh,

More information

Performance Analysis of RAID in Different Workload

Performance Analysis of RAID in Different Workload Send Orders for Reprints to reprints@benthascience.ae 324 The Open Cybernetics & Systeics Journal, 2015, 9, 324-328 Perforance Analysis of RAID in Different Workload Open Access Zhang Dule *, Ji Xiaoyun,

More information

Approximate String Matching with Reduced Alphabet

Approximate String Matching with Reduced Alphabet Approxiate String Matching with Reduced Alphabet Leena Salela 1 and Jora Tarhio 2 1 University of Helsinki, Departent of Coputer Science leena.salela@cs.helsinki.fi 2 Aalto University Deptartent of Coputer

More information

Relief shape inheritance and graphical editor for the landscape design

Relief shape inheritance and graphical editor for the landscape design Relief shape inheritance and graphical editor for the landscape design Egor A. Yusov Vadi E. Turlapov Nizhny Novgorod State University after N. I. Lobachevsky Nizhny Novgorod Russia yusov_egor@ail.ru vadi.turlapov@cs.vk.unn.ru

More information

OPTIMAL COMPLEX SERVICES COMPOSITION IN SOA SYSTEMS

OPTIMAL COMPLEX SERVICES COMPOSITION IN SOA SYSTEMS Key words SOA, optial, coplex service, coposition, Quality of Service Piotr RYGIELSKI*, Paweł ŚWIĄTEK* OPTIMAL COMPLEX SERVICES COMPOSITION IN SOA SYSTEMS One of the ost iportant tasks in service oriented

More information

Problem Solving of graph correspondence using Genetics Algorithm and ACO Algorithm

Problem Solving of graph correspondence using Genetics Algorithm and ACO Algorithm Proble Solving of graph correspondence using Genetics Algorith and ACO Algorith Alireza Rezaee, 1, Azizeh Ajalli 2 Assistant professor,departent of Mechatronics Engineering, Faculty of New Sciences and

More information

Mapping Data in Peer-to-Peer Systems: Semantics and Algorithmic Issues

Mapping Data in Peer-to-Peer Systems: Semantics and Algorithmic Issues Mapping Data in Peer-to-Peer Systes: Seantics and Algorithic Issues Anastasios Keentsietsidis Marcelo Arenas Renée J. Miller Departent of Coputer Science University of Toronto {tasos,arenas,iller}@cs.toronto.edu

More information

Research Article A Comparison of Standard One-Step DDA Circular Interpolators with a New Cheap Two-Step Algorithm

Research Article A Comparison of Standard One-Step DDA Circular Interpolators with a New Cheap Two-Step Algorithm Modelling and Siulation in Engineering, Article ID 916539, 6 pages http://dx.doi.org/10.1155/2014/916539 Research Article A Coparison of Standard One-Step DDA Circular Interpolators with a New Cheap Two-Step

More information

Genetic-Based EM Algorithm for Learning Gaussian Mixture Models

Genetic-Based EM Algorithm for Learning Gaussian Mixture Models 1344 IEEE TRANSACTIONS ON PATTERN ANALYSIS AND MACHINE INTELLIGENCE, VOL. 27, NO. 8, AUGUST 2005 Genetic-Based EM Algorith for Learning Gaussian Mixture Models Franz Pernkopf, Meber, IEEE, and Djael Bouchaffra,

More information

AGV PATH PLANNING BASED ON SMOOTHING A* ALGORITHM

AGV PATH PLANNING BASED ON SMOOTHING A* ALGORITHM International Journal of Software Engineering & Applications (IJSEA), Vol.6, No.5, Septeber 205 AGV PATH PLANNING BASED ON SMOOTHING A* ALGORITHM Xie Yang and Cheng Wushan College of Mechanical Engineering,

More information

Automatic Graph Drawing Algorithms

Automatic Graph Drawing Algorithms Autoatic Graph Drawing Algoriths Susan Si sisuz@turing.utoronto.ca Deceber 7, 996. Ebeddings of graphs have been of interest to theoreticians for soe tie, in particular those of planar graphs and graphs

More information

Derivation of an Analytical Model for Evaluating the Performance of a Multi- Queue Nodes Network Router

Derivation of an Analytical Model for Evaluating the Performance of a Multi- Queue Nodes Network Router Derivation of an Analytical Model for Evaluating the Perforance of a Multi- Queue Nodes Network Router 1 Hussein Al-Bahadili, 1 Jafar Ababneh, and 2 Fadi Thabtah 1 Coputer Inforation Systes Faculty of

More information

A CRYPTANALYTIC ATTACK ON RC4 STREAM CIPHER

A CRYPTANALYTIC ATTACK ON RC4 STREAM CIPHER A CRYPTANALYTIC ATTACK ON RC4 STREAM CIPHER VIOLETA TOMAŠEVIĆ, SLOBODAN BOJANIĆ 2 and OCTAVIO NIETO-TALADRIZ 2 The Mihajlo Pupin Institute, Volgina 5, 000 Belgrade, SERBIA AND MONTENEGRO 2 Technical University

More information

CHAPTER 6. LSB based data hiding with double Encryption. 6.1 Introduction

CHAPTER 6. LSB based data hiding with double Encryption. 6.1 Introduction CHAPTER 6 LSB based data hiding with double Encryption 6.1 Introduction In image steganography, the amount of secret data that can be embedded depends on the method and the cover-image as capacity limitation

More information

Intelligent Robotic System with Fuzzy Learning Controller and 3D Stereo Vision

Intelligent Robotic System with Fuzzy Learning Controller and 3D Stereo Vision Recent Researches in Syste Science Intelligent Robotic Syste with Fuzzy Learning Controller and D Stereo Vision SHIUH-JER HUANG Departent of echanical Engineering National aiwan University of Science and

More information

Verifying the structure and behavior in UML/OCL models using satisfiability solvers

Verifying the structure and behavior in UML/OCL models using satisfiability solvers IET Cyber-Physical Systes: Theory & Applications Review Article Verifying the structure and behavior in UML/OCL odels using satisfiability solvers ISSN 2398-3396 Received on 20th October 2016 Revised on

More information

2nd Workshop on Advanced Research and Technology in Industry Applications (WARTIA 2016)

2nd Workshop on Advanced Research and Technology in Industry Applications (WARTIA 2016) 2nd Workshop on Advanced Research and Technology in Industry Applications (WARTIA 2016) Method for Marking and Positioning Corrosions in the Autoobile Engine Cylinder Cavity fro the Ultrasonic Phased Array

More information

Digital Image Steganography Using Bit Flipping

Digital Image Steganography Using Bit Flipping BULGARIAN ACADEMY OF SCIENCES CYBERNETICS AND INFORMATION TECHNOLOGIES Volume 18, No 1 Sofia 2018 Print ISSN: 1311-9702; Online ISSN: 1314-4081 DOI: 10.2478/cait-2018-0006 Digital Image Steganography Using

More information

Modal Masses Estimation in OMA by a Consecutive Mass Change Method.

Modal Masses Estimation in OMA by a Consecutive Mass Change Method. Modal Masses Estiation in OMA by a Consecutive Mass Change Method. F. Pelayo University of Oviedo, Departent of Construction and Manufacturing Engineering, Gijón, Spain M. López-Aenlle University of Oviedo,

More information

A high quality steganographic method with pixel-value differencing and modulus function

A high quality steganographic method with pixel-value differencing and modulus function Available online at www.sciencedirect.com The Journal of Systems and Software 81 (2008) 150 158 www.elsevier.com/locate/jss A high quality steganographic method with pixel-value differencing and modulus

More information

Designing High Performance Web-Based Computing Services to Promote Telemedicine Database Management System

Designing High Performance Web-Based Computing Services to Promote Telemedicine Database Management System Designing High Perforance Web-Based Coputing Services to Proote Teleedicine Database Manageent Syste Isail Hababeh 1, Issa Khalil 2, and Abdallah Khreishah 3 1: Coputer Engineering & Inforation Technology,

More information

Implementation of fast motion estimation algorithms and comparison with full search method in H.264

Implementation of fast motion estimation algorithms and comparison with full search method in H.264 IJCSNS International Journal of Coputer Science and Network Security, VOL.8 No.3, March 2008 139 Ipleentation of fast otion estiation algoriths and coparison with full search ethod in H.264 A.Ahadi, M.M.Azadfar

More information

Guillotine subdivisions approximate polygonal subdivisions: Part III { Faster polynomial-time approximation schemes for

Guillotine subdivisions approximate polygonal subdivisions: Part III { Faster polynomial-time approximation schemes for Guillotine subdivisions approxiate polygonal subdivisions: Part III { Faster polynoial-tie approxiation schees for geoetric network optiization Joseph S. B. Mitchell y April 19, 1997; Last revision: May

More information

SECURE DATA EMBEDDING USING REVERSIBLE DATA HIDING FOR ENCRYPTED IMAGES

SECURE DATA EMBEDDING USING REVERSIBLE DATA HIDING FOR ENCRYPTED IMAGES VOL., NO. 7, APRIL 5 ISSN 89-668 6-5 Asian Research Publishing Network (ARPN). All rights reserved. SECURE DATA EMBEDDING USING REVERSIBLE DATA HIDING FOR ENCRYPTED IMAGES R. Selveeswari and P. R. Vijayalakshmi

More information

6.1 Topological relations between two simple geometric objects

6.1 Topological relations between two simple geometric objects Chapter 5 proposed a spatial odel to represent the spatial extent of objects in urban areas. The purpose of the odel, as was clarified in Chapter 3, is ultifunctional, i.e. it has to be capable of supplying

More information

Random Traversing Based Reversible Data Hiding Technique Using PE and LSB

Random Traversing Based Reversible Data Hiding Technique Using PE and LSB Random Traversing Based Reversible Data Hiding Technique Using PE and LSB Rhythm Katira #1, Prof. V. Thanikaiselvan *2 # ECE Department, VIT University Vellore, Tamil-Nadu, India 1 rhythm.katira2009@vit.ac.in

More information

Multipath Selection and Channel Assignment in Wireless Mesh Networks

Multipath Selection and Channel Assignment in Wireless Mesh Networks Multipath Selection and Channel Assignent in Wireless Mesh Networs Soo-young Jang and Chae Y. Lee Dept. of Industrial and Systes Engineering, KAIST, 373-1 Kusung-dong, Taejon, Korea Tel: +82-42-350-5916,

More information

Fast Robust Fuzzy Clustering Algorithm for Grayscale Image Segmentation

Fast Robust Fuzzy Clustering Algorithm for Grayscale Image Segmentation Fast Robust Fuzzy Clustering Algorith for Grayscale Iage Segentation Abdelabbar Cherkaoui, Hanane Barrah To cite this version: Abdelabbar Cherkaoui, Hanane Barrah. Fast Robust Fuzzy Clustering Algorith

More information

Knowledge Discovery Applied to Agriculture Economy Planning

Knowledge Discovery Applied to Agriculture Economy Planning Knowledge Discovery Applied to Agriculture Econoy Planning Bing-ru Yang and Shao-un Huang Inforation Engineering School University of Science and Technology, Beiing, China, 100083 Eail: bingru.yang@b.col.co.cn

More information

ADAPTIVE EVOLUTIONARY ALGORITHMS ON UNITATION, ROYAL ROAD AND LONGPATH FUNCTIONS

ADAPTIVE EVOLUTIONARY ALGORITHMS ON UNITATION, ROYAL ROAD AND LONGPATH FUNCTIONS ADAPTIVE EVOLUTIONARY ALGORITHMS ON UNITATION, ROYAL ROAD AND LONGPATH FUNCTIONS J. Neal Richter, John Paxton Coputer Science Departent, Montana State University, 357 EPS, Bozean, Montana 5974 http://www.cs.ontana.edu

More information

The Internal Conflict of a Belief Function

The Internal Conflict of a Belief Function The Internal Conflict of a Belief Function Johan Schubert Abstract In this paper we define and derive an internal conflict of a belief function We decopose the belief function in question into a set of

More information

Brian Noguchi CS 229 (Fall 05) Project Final Writeup A Hierarchical Application of ICA-based Feature Extraction to Image Classification Brian Noguchi

Brian Noguchi CS 229 (Fall 05) Project Final Writeup A Hierarchical Application of ICA-based Feature Extraction to Image Classification Brian Noguchi A Hierarchical Application of ICA-based Feature Etraction to Iage Classification Introduction Iage classification poses one of the greatest challenges in the achine vision and achine learning counities.

More information

Privacy-preserving String-Matching With PRAM Algorithms

Privacy-preserving String-Matching With PRAM Algorithms Privacy-preserving String-Matching With PRAM Algoriths Report in MTAT.07.022 Research Seinar in Cryptography, Fall 2014 Author: Sander Sii Supervisor: Peeter Laud Deceber 14, 2014 Abstract In this report,

More information

Detection of Outliers and Reduction of their Undesirable Effects for Improving the Accuracy of K-means Clustering Algorithm

Detection of Outliers and Reduction of their Undesirable Effects for Improving the Accuracy of K-means Clustering Algorithm Detection of Outliers and Reduction of their Undesirable Effects for Iproving the Accuracy of K-eans Clustering Algorith Bahan Askari Departent of Coputer Science and Research Branch, Islaic Azad University,

More information

An Optimization Clustering Algorithm Based on Texture Feature Fusion for Color Image Segmentation

An Optimization Clustering Algorithm Based on Texture Feature Fusion for Color Image Segmentation Algoriths 2015, 8, 234-247; doi:10.3390/a8020234 Article OPEN ACCESS algoriths ISSN 1999-4893 www.dpi.co/journal/algoriths An Optiization Clustering Algorith Based on Texture Feature Fusion for Color Iage

More information

1 P a g e. F x,x...,x,.,.' written as F D, is the same.

1 P a g e. F x,x...,x,.,.' written as F D, is the same. 11. The security syste at an IT office is coposed of 10 coputers of which exactly four are working. To check whether the syste is functional, the officials inspect four of the coputers picked at rando

More information

(12) United States Patent Kumar et al.

(12) United States Patent Kumar et al. (12) United States Patent Kuar et al. US006795434B1 (10) Patent N0.: (45) Date of Patent: US 6,795,434 B1 Sep. 21, 2004 (54) REPLICATED SERVER DISCOVERY IN CLIENT-PROXY SERVERS (75) Inventors: Harlharan

More information

IMAGE MOSAICKING FOR ESTIMATING THE MOTION OF AN UNDERWATER VEHICLE. Rafael García, Xevi Cufí and Lluís Pacheco

IMAGE MOSAICKING FOR ESTIMATING THE MOTION OF AN UNDERWATER VEHICLE. Rafael García, Xevi Cufí and Lluís Pacheco IMAGE MOSAICKING FOR ESTIMATING THE MOTION OF AN UNDERWATER VEHICLE Rafael García, Xevi Cufí and Lluís Pacheco Coputer Vision and Robotics Group Institute of Inforatics and Applications, University of

More information

Massive amounts of high-dimensional data are pervasive in multiple domains,

Massive amounts of high-dimensional data are pervasive in multiple domains, Challenges of Feature Selection for Big Data Analytics Jundong Li and Huan Liu, Arizona State University Massive aounts of high-diensional data are pervasive in ultiple doains, ranging fro social edia,

More information

Classification and Segmentation of Glaucomatous Image Using Probabilistic Neural Network (PNN), K-Means and Fuzzy C- Means(FCM)

Classification and Segmentation of Glaucomatous Image Using Probabilistic Neural Network (PNN), K-Means and Fuzzy C- Means(FCM) IJSRD - International Journal for Scientific Research & Developent Vol., Issue 7, 03 ISSN (online): 3-063 Classification and Segentation of Glaucoatous Iage Using Probabilistic Neural Network (PNN), K-Means

More information

Generating Mechanisms for Evolving Software Mirror Graph

Generating Mechanisms for Evolving Software Mirror Graph Journal of Modern Physics, 2012, 3, 1050-1059 http://dx.doi.org/10.4236/jp.2012.39139 Published Online Septeber 2012 (http://www.scirp.org/journal/jp) Generating Mechaniss for Evolving Software Mirror

More information

Research Article Improvements in Geometry-Based Secret Image Sharing Approach with Steganography

Research Article Improvements in Geometry-Based Secret Image Sharing Approach with Steganography Hindawi Publishing Corporation Mathematical Problems in Engineering Volume 2009, Article ID 187874, 11 pages doi:10.1155/2009/187874 Research Article Improvements in Geometry-Based Secret Image Sharing

More information

A Model Free Automatic Tuning Method for a Restricted Structured Controller. by using Simultaneous Perturbation Stochastic Approximation

A Model Free Automatic Tuning Method for a Restricted Structured Controller. by using Simultaneous Perturbation Stochastic Approximation 28 Aerican Control Conference Westin Seattle Hotel, Seattle, Washington, USA June -3, 28 WeC9.5 A Model Free Autoatic Tuning Method for a Restricted Structured Controller by Using Siultaneous Perturbation

More information

Weeks 1 3 Weeks 4 6 Unit/Topic Number and Operations in Base 10

Weeks 1 3 Weeks 4 6 Unit/Topic Number and Operations in Base 10 Weeks 1 3 Weeks 4 6 Unit/Topic Nuber and Operations in Base 10 FLOYD COUNTY SCHOOLS CURRICULUM RESOURCES Building a Better Future for Every Child - Every Day! Suer 2013 Subject Content: Math Grade 3rd

More information

3 Conference on Inforation Sciences and Systes, The Johns Hopkins University, March, 3 Sensitivity Characteristics of Cross-Correlation Distance Metric and Model Function F. Porikli Mitsubishi Electric

More information

Data Hiding on Text Using Big-5 Code

Data Hiding on Text Using Big-5 Code Data Hiding on Text Using Big-5 Code Jun-Chou Chuang 1 and Yu-Chen Hu 2 1 Department of Computer Science and Communication Engineering Providence University 200 Chung-Chi Rd., Shalu, Taichung 43301, Republic

More information

Research on a Kind of QoS-Sensitive Semantic Web Services Composition Method Based on Genetic Algorithm

Research on a Kind of QoS-Sensitive Semantic Web Services Composition Method Based on Genetic Algorithm roceedings of the 7th International Conference on Innovation & Manageent 893 Research on a Kind of QoS-Sensitive Seantic Web Services Coposition Method Based on Genetic Algorith Cao Hongjiang, Nie Guihua,

More information

A NEW METHOD FOR COLOURIZING OF MULTICHANNEL MR IMAGES BASED ON REAL COLOUR OF HUMAN BRAIN

A NEW METHOD FOR COLOURIZING OF MULTICHANNEL MR IMAGES BASED ON REAL COLOUR OF HUMAN BRAIN A NEW METHOD FOR OLOURIZING OF MULTIHANNEL MR IMAGES BASED ON REAL OLOUR OF HUMAN BRAIN Mohaad Hossein Kadbi; Eadoddin Fateizaheh; Abouzar Eslai; and arya khosroshahi Electrical Engineering Dept., Sharif

More information

QUERY ROUTING OPTIMIZATION IN SENSOR COMMUNICATION NETWORKS

QUERY ROUTING OPTIMIZATION IN SENSOR COMMUNICATION NETWORKS QUERY ROUTING OPTIMIZATION IN SENSOR COMMUNICATION NETWORKS Guofei Jiang and George Cybenko Institute for Security Technology Studies and Thayer School of Engineering Dartouth College, Hanover NH 03755

More information

488 IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, VOL. 3, NO. 3, SEPTEMBER 2008

488 IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, VOL. 3, NO. 3, SEPTEMBER 2008 488 IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, VOL 3, NO 3, SEPTEMBER 2008 Adaptive Data Hiding in Edge Areas of Images With Spatial LSB Domain Systems Cheng-Hsing Yang, Chi-Yao Weng, Shiuh-Jeng

More information