Image hiding with an improved genetic algorithm and an optimal pixel adjustment process
|
|
- Kevin Anderson
- 5 years ago
- Views:
Transcription
1 Eighth International Conference on Intelligent Systes Design and Applications Iage hiding with an iproved genetic algorith and an optial pixel adjustent process Lin-Yu Tseng Yung-Kuan Chan Yu-An Ho Yen-Ping Chu Departent of Coputer Departent of Manageent Departent of Coputer Departent of Coputer Science and Engineering Inforation Systes Science and Engineering Science and Engineering Chung Hsing University Chung Hsing University Chung Hsing University Chung Hsing University Taichung, Taiwan, R.O.C. Taichung, Taiwan, R.O.C. Taichung, Taiwan, R.O.C. Taichung, Taiwan, R.O.C. Abstract Iage hiding techniques ebed a secret iage into a cover iage. The fusion of the two, called a stegoiage, fools grabbers who would not be conscious of the differences between the cover iage and. the stegoiage. A secret iage can be transferred safely using this technique. In general, we would disarrange each pixel in the secret iage and adjust all of the to for a suitable string of bits that could be ebedded. Then these bits are ebedded into the cover iage in corresponding places, and this iage would becoe a stego-iage that hides secret data. This paper suggests a new iage disarranging technique. It uses an iproved genetic algorith and an Optial Pixel Adjustent Process, OPAP, to enhance the quality of a Stego-iage. Experiental results show that a stegoiage is indistinguishable fro the cover-iage. The stego-iage can ebed bits per pixel, and the eansquare error of a stego-iage is uch lower than results for previous ethods [,,, ].. Introduction Using the Internet, secret data can be transitted speedily. However receivers and senders use various encryption ethods to prevent exposure to hacers [6-7, 9, 3, ]. In order to protect transitted data, iportant data is encrypted using encrypting and decrypting calculations. The process ay use a series of ciphers that see to be disordered nonsense to encrypt data before sending it []. At the receiving end, a decryption calculation is used. Through this ethod, encrypted data can be transitted over the Internet. Even if hacers do obtain the encoding ciphers, if they cannot obtain the original secret data, they will never uncover the inforation that was hidden in the cipher. The above-entioned ethod has one weaness: encrypted ciphers attract hacers attention. Therefore, if ciphers can be ebedded into a general, natural iage, hacers would be isdirected. This ethod is called data hiding. Iage hiding techniques ainly deal with a secret iage ebedded within a cover iage to get a Stego-iage. This Stego-iage conceals hidden data without advertising that it is hiding anything. One coon ethod is called Leastsignificant-bit (LSB) [5, 8, 5-6]. LSB replaces a cover-iage directly, after hiding a secret iage within it. In general, bit-apped iages are coonly used. Every iage is coprised of pixels, and each pixel indicates one color. If an iage is shown in gray-scale, with a range of values fro 0 to 55, lower values signify darness, and higher values, lightness. Therefore, a gray-level iage can be adjusted by adjusting the values. At least 8 bits are required to represent these values, and the binary syste stores the fro the ost signification bit to the least signification bit a a...a. LSB substitution replaces 8 7 the least signification bit a to ae iperceptible changes that can t be recognized by huan vision. For exaple, one pixel s gray-level ay be 00. When it hides a, we odify the least signification bit to becoe pixel 0. This difference can t be recognized by huan vision. In this way, we can hide another iage. Though LSB can easily ebed secret data into an iage, it would degrade iage quality in a way that ight alert hacers. Wang et al. [0] proposed a ethod called the oderately significant bit (MSB) which ebedded secret data into a cover-iage. Here the MSB eans that the fourth bit of a gray pixel is a. When ebedding, a genetic algorith can be used to find the optial substitution atrix for each pixel, and then perfor a local pixel adjustent process (LPAP) to iprove the quality of the stego-iage. Chan et al /08 $ IEEE DOI 0.09/ISDA
2 [3] pointed out that the LPAP adjusts the fourth bit against LSB. Thus, the ethod cannot be applied for siple LSB substitution. This ethod uses a loo-up table to adjust the iage ebedding. In addition to the fourth bit of LSB, other bits ight be odified to achieve the best result. Afterwards, Wang et al. [] proposed a ethod which uses bijective apping function to disarrange the secret data prior to ebedding the into the cover iage. Because of the nuerous cobinations after disarranging, this ethod goes a step further by utilizing a genetic algorith to see and find the optial solution. Though this ethod has reduced calculating tie, acquired bijective apping function only approxiates optial solution. Chang et al. [] utilized a dynaic prograing strategy to deterine the optial solution, and even reduced the calculating tie. In 003, Thien et al., [] proposed a highhiding-capacity ethod which can ebed data via a digit by digit syste in real tie and achieve a uch higher vision quality than LSB can, while avoiding resulting artificial edges of LSB. Against iage hiding technique, Chan et al. [] proposed an optial pixel adjustent process, OPAP. The concept follows the ethod subitted by Wang et al. [0]. It handles the last bits of the iage and eploys an optial pixel adjustent process to lessen the related coplicated calculating. Although the ethod that was subitted by Wang et al. [0] has iproved the iage quality substantially, in order to provide uch greater cover iage quality, this paper proposes a whole new iage disarrange technique. We utilize an iproved genetic algorith and Optial Pixel Adjustent Process, OPAP to enhance the quality of the cover iage. The reainder of the paper is organized as follows. The adjustent procedure of the optial pixel will be introduced in the second section. The third section will introduce the hiding iage technique that is proposed in this paper. The fourth section is the experiental results of the proposed ethod, and a contrast with other ethods. The fifth section is the conclusion.. Optial pixel adjustent process This section will introduce OPAP as proposed by Chan et al. []. The ain construct of OPAP follows the ethod that was subitted by Wang et al. [0]. It does optial adjustent with the last bits of an iage, and uses low coplicated calculating. The ain calculation of OPAP is eployed as algorith opap: Algorith opap Inputs: Transfored secret iage Output: Stego-iage { C S, Cover iage C For j 0 to M- Do for i 0 to N- Do D[ od S[ If ( D [ > ) Then if ( C [ < 55 ) Then C [ + Else C [ Else if ( D [ < ) Then if ( C [ > ) Then C [ Else C [ Else C [ } Inputs are secret iage S and cover iage C; then secret iage S is rearranged to becoe S which is the sae size as the cover iage. The bit plane of S is saller than the bit plane of C which is an ebedded bit plane. M and N are the height and the width, and j and i are the coordinate of the iage. D [ is the value that subtracts secret iage S fro the place of LSB of C. If C [ = 00, S [ = 5, =, then D [ = 00 od 5 = is saller than 3. As a result, we tae 00-(-)-6=95. This way, the difference will be saller than 00+= which is the direct ebedding of LSB bits fro 00, and it could also reduce the value of the ean square error. In the end, it outputs adjusted stego-iage C. 3. The proposed ethod This section introduces a secret iage transfor ethod. This ethod utilizes a genetic algorith to deterine the optial transfor seed to get the best quality cover iage. 3.. A secret iage transfor ethod First, our ethod adjusts secret iage S to be the sae size as the cover-iage. Suppose that the value of the pixel of gray-level is g-bit pixel value, the size of the cover-iage is M N, and the size of the c c secret iage M N ; according to equation (), it can s s then obtain the inforation on the lowest nuber of deand bits of one pixel of the cover-iage in order to ebed it totally within the secret iage. Therefore, it can transfor the size of the secret iage to equal 3
3 that of the cover iage, and be shown as S. Furtherore, each pixel is shown at least as bits. g M M s s =. () M N c c Then, tae the acquired S to perfor the transfor using a rando seed. While transforing, at first it will result in a fixed size of transfor bloc expressed R = r[ 0 i, j n, where by: { } r [ { 0,,,..., } bloc size,. Moreover, according to the S will be segented by n n size, S = q[ ] 0 i i, j n, here becoing { } q [ { 0,,,..., }. is the serial nuber of the segented blocs. Then add each S to R, and tae the reainder of. As a result, it can get a disarranged secret iage S which is shown as equation (): " S = ( S + R)od. () Assue that n is, is, and is (ean of the first bloc). There is a siple exaple as follows: S =, R =, " S = ( S + R) od = The acquired " S is the reainder of which is the result of adding S to R. Finally, ebed S " to C to get the stego-iage C. We can use equation (3) pea signal-to-noise (PSNR) and equation () ean square error (MSE) to estiate the quality difference between C and C. The definition of the function of PSNR is as follows: PSNR = 0log (55) db MSE (3) And the definition of MSE is as follow: MSE = M N () It can return to the M N ( C C ) j= i= S only by subtracting R fro " S. If there was a negative nuber in the resulting blocs, then add to return to S. 3.. Iproved genetic algorith According to all possible results of R in Section 3., n n they can bring ( ) inds of changes. Therefore, calculating every change would tae lots of tie. The following introduce how to find out the approxiate optial solution by algorith A. Algorith A Inputs: Define the fitness function, nuber of generation size of population, crossover rate, utation rate and selection rate. Output: The best chroosoe. { enerate the chroosoes of the first generation by rando selection. For g 0 to generation Do Optial Pixel Adjustent Process by chroosoe Evaluate the fitness value MSE by chroosoe If Satisfy the ending condition Than Obtain the best solution Brea Select the better chroosoes Recobine new chroosoes by using crossover Recobine new chroosoes by using utation. } First, it has to input the secret iage, transfored by the chroosoes that were built in the first generation, and then ebed it into the cover iage as well as calculate the value of MSE. In the second step, it has to execute a loop according the set nubers of generation. If it is satisfied with the set value of MSE while executing, it will then brea fro the loop and output the suitable chroosoe. If it is not satisfied with the value of MSE, it will choose a better one fro aong these chroosoes. Furtherore, it will result a new generation of chroosoes through crossover and utation, and then transfer the to the next generation for evaluation. When it is satisfied with the nuber of ties of generation or the set value of MSE, it will stop reproducing and output the best transfored bloc. The procedure of crossover can be handled by one point or two points. At first, transfor the two diension R transfor into a one diension bloc. The handling process is as follows: a a a a 0 3 a a5 a 6 a 7 [ a a... a ]. 0 5 a a a a a a a a 3 5 Then, tae this one diension bloc as a chroosoe. If there were two chroosoes, and which are shown as Figure (a), the gene of is 3
4 shown by boldface while the gene of is in regular font. After a one point crossover, the result is shown as Figure (b). It results in new chroosoes and (a) (b) Figure. A siple exaple: after crossover, (a) and (b) becoe and. Mutation ainly provides each gene with a probability. If the gene falls into the range of probability, then it will reproduce a new eleent at rando. Figure is the utation results of. Boldface nubers are the reproduced genes which fall into a given probability. " Figure. The result is utation of. Boldface nubers are the reproduced genes which fall into a given probability Discussion of set way of atrix There are various inds of design ethods of transfor bloc. One anner uses a n n bloc R to handle a whole iage. The second anner segents the iage into four sub-iages and individually trains each sub-iage by a ( n / ) ( n / ) bloc. Then, it will get the best four ( n / ) ( n / ) blocs, with the total size equal to a n n bloc. The third anner segents the iage into 6 sub-iages, and individually trains each sub-iage by a ( n / ) ( n / ) bloc. Then, it will get the best 6 ( n / ) ( n / ) blocs. Here the total size is equal to a n n bloc. The experiental result will show that the third anner spends uch less tie while obtaining the highest quality.. Experiental results This section ainly discusses the quality of a hidden iage by the ethod that is proposed in this paper, by experient. The progra is written in C++ Builder, and executed under an AMD Athlon 600+ and RAM WinXP syste. The size of the experiental stego-iage is 5 5 pixels graylevel, as shown as Figure 3(a) and 3(b). The secret iage is 56 5 pixels gray-level iages, shown as Figure 3(b), (c) and (d). Therefore, the data hiding rate is bits of each pixel. Then, an 8 8 bloc R, four bloc R, and bloc R are taen as the transfor bloc, and the secret iage is disarranged by three ethods: a whole iage, sub-iages, and 6 sub-iages. As a result, these 56 bits are secret eys. First, we transfor a secret iage by one 8 8 bloc R. In the process of genetic algorith, it will produce forty R, and treat the lie chroosoes. If these forty R were handled by set 0.5 crossover rates and 0.3 utation rates, it would reproduce another new forty chroosoes. Then, we pic out 0 chroosoes whose value of MSE are uch lower aong the 80 chroosoes, and tae these 0 chroosoes as the next generation chroosoes. Therefore, the selection rate is 0.5. The last generation, which is tested 000 ties, will tae the lowest value of MSE which is produced by R as transfor bloc. After 000 generations, we will now that the MSE still can be iproved when it is transfored at the 75st generation. Therefore, the 000 cycles of generation tae 33 inutes and 9 seconds, and the value of MSE is.3. Then, the stego-iage is segented into four subiages and each sub-iage is transfored individually by a bloc. In the process of genetic algorith, it will produce forty R for each sub-iage, tae the as chroosoes and handled by set 0.5 crossover rates, 0.3 utation rates and 0.5 selection rates. After 500 generations, it will tae the lowest value of MSE which is produced by a bloc as transfor bloc. There will be four blocs in the whole iage, and the cobined size will equal that of a 8 8 bloc. After 00 generations, we will now that the iproved range of generation deceases. It is finished after 500 ties generation, taes 7 inutes and 3 seconds, and the value of MSE is Finally, the stego-iage is segented into sixteen sub-iages, and each sub-iage is individually transfored by one bloc. In the process of genetic algorith, it will be handled by set 0.5 crossover rates, 0.3 utation rates and 0.5 selection rates. After 00 generations, it will tae the lowest value of MSE which is produced by the bloc as 33
5 the transfor bloc. There will be sixteen blocs in the whole iage, and the cobined size will be equal to that of the 8 8 bloc. After 0 generations, we will now that the iproved range of generation greatly decreases. It is finished after 00 ties generation, taes four inutes and five seconds, and the value of MSE is By genetic algorith, it can set the initial transfor bloc at rando fro the enorous transfor bloc, then use crossover, utation and selection to produce new generation, and explore if there is a better transfor bloc. The experient too lots of test tie, but in reality, it can set fewer nubers of generations to deterine the better transfor bloc. Table shows the results of the proposed ethods: 8 8, four, and sixteen of the cover iage Lena and three secret iages. It also lists the contrast result of siple LSB substitution, genetic algorith [], dynaic prograing [] and optial pixel adjustent process [, ]. Table shows the contrast between the proposed ethod and other ethods of the cover iage pepper and other three secret iages. We understand that the proposed ethod can obtain the least value of MSE. 5. Conclusions While transferring data over the Internet, we face any unnowns. To transfer data securely, a safety syste is needed. This paper proposes an effective, siple iage-hiding technique to iprove the quality of stego-iages. It can raise the quality of the stegoiage, and hacers ay ignore the stego-iage with its ebedded secret iage. The experiental result shows that the stego-iage and cover iage can not be distinguished. The hiding capacity can reach four bits in a pixel, and the eansquare error of the stego-iage is uch lower than for the iages which were produced by previous ethods. In the future, we hope that we can find an even better technique to hide ore data in a cover iage. Furtherore, we also have to ae efforts in cover iage odification. Less odifying or even no odifying should be the focus of future research. based on odulus function, Pattern Recognition, vol. 36, no., 003, pp [3] C. K. Chan and L.M. Cheng, Iproved hiding data in iages by optial oderately significant-bit replaceent, IEE Electronics Letters, vol. 37, no. 6, 00, pp [] C. K. Chan and L. M. Cheng, Hiding data in iage by siple LSB substitution, Pattern Recognition, vol. 37, no. 3, 00, pp [5] E. Adelson, Digital signal encoding and decoding apparatus, US Patent, no , 990. [6] J. Wang and L. Ji, A region and data hiding based error concealent schee for iages, IEEE Transactions on Consuer Electronics, vol. 7, no., 00, pp [7] K. L. Chung, C. H. Shen, and L. C. Chang, A novel SVD- and VQ-based iage hiding schee, Pattern Recognition Letters, vol., no. 9, 00, pp [8] L. F. Turner, Digital data security syste, Patent IPN WO 89/0895, 989. [9] L. M. Marvel, C.. Boncelet, and C. T. Retter, Spread spectru iage steganography, IEEE Transactions on Iage Processing, vol. 8, no. 8, 999, pp [0] R. Z. Wang, C. F. Lin, and J. C. Lin, Hiding data in iages by optial oderately significant-bit replaceent, IEE Electronics Letters, vol. 36, no. 5, 000, pp []N.. Bourbais and C. Alexopoulos, Picture data encryption using SCAN patterns, Pattern Recognition, vol. 5, no. 6, 99, pp [] R. Z. Wang, C. F. Lin, and J. C. Lin, Iage hiding by optial LSB substitution and genetic algorith, Pattern Recognition, vol. 3, no. 3, 00, pp [3] T. J. Chuang and J. C. Lin, New approach to iage encryption, Journal of Electronic Iaging, vol. 7, no., April 998, pp [] T. S. Chen, C. C. Chang, and M. S. Hwang, A virtual iage cryptosyste based upon vector quantization, IEEE Transactions on Iage Processing, vol. 7, no. 0, 998, pp [5] W. Bender, D. ruhl, N. Morioto, and A. Lu, Techniques for data hiding, IBM Systes J. vol. 35, no. 3-, 996, pp [6] W. Bender, F.J. Paiz, W. Butera, S. Pogreb, D. ruhl, and R. Hwang, Applications for data hiding, IBM Systes J. vol. 39, no. 3-, 000, pp Rerferences [] C. C. Chang, J. Y. Hsiao, and C. S. Chan, Finding optial least-significant-bit substitute in iage hiding by dynaic prograing strategy, Pattern Recognition, vol. 36, no. 7, 003, pp [] C. C. Thien and J. C. Lin, A siple and high-hiding capacity ethod for hiding digit-by-digit data in iages 3
6 (a) (b) (c) (d) (e) Figure 3. Testing iages (a) and (b) are cover iages: Lena and pepper. (c)(d)(e) are secret iages Jet, Tiffany, and Boat. Table. The MSE between the cover iage Lena and the stego-iage Methods Jet Tiff Boat LSB enetic Algorith [] Dynaic prograing strategy [] OPAP [, ] Table. The MSE between the cover iage Pepper and the stego-iage Methods Jet Tiff Boat LSB enetic Algorith [] Dynaic prograing strategy [] OPAP [, ]
A Novel Fast Constructive Algorithm for Neural Classifier
A Novel Fast Constructive Algorith for Neural Classifier Xudong Jiang Centre for Signal Processing, School of Electrical and Electronic Engineering Nanyang Technological University Nanyang Avenue, Singapore
More informationA Novel 2D Texture Classifier For Gray Level Images
2012, TextRoad Publication ISSN 2090-4304 Journal of Basic and Applied Scientific Research www.textroad.co A Novel 2D Texture Classifier For Gray Level Iages B.S. Mousavi 1 Young Researchers Club, Zahedan
More informationNovel Image Representation and Description Technique using Density Histogram of Feature Points
Novel Iage Representation and Description Technique using Density Histogra of Feature Points Keneilwe ZUVA Departent of Coputer Science, University of Botswana, P/Bag 00704 UB, Gaborone, Botswana and Tranos
More informationComputer Aided Drafting, Design and Manufacturing Volume 26, Number 2, June 2016, Page 13
Coputer Aided Drafting, Design and Manufacturing Volue 26, uber 2, June 2016, Page 13 CADDM 3D reconstruction of coplex curved objects fro line drawings Sun Yanling, Dong Lijun Institute of Mechanical
More informationCOLOR HISTOGRAM AND DISCRETE COSINE TRANSFORM FOR COLOR IMAGE RETRIEVAL
COLOR HISTOGRAM AND DISCRETE COSINE TRANSFORM FOR COLOR IMAGE RETRIEVAL 1 Te-Wei Chiang ( 蔣德威 ), 2 Tienwei Tsai ( 蔡殿偉 ), 3 Jeng-Ping Lin ( 林正平 ) 1 Dept. of Accounting Inforation Systes, Chilee Institute
More informationTensorFlow and Keras-based Convolutional Neural Network in CAT Image Recognition Ang LI 1,*, Yi-xiang LI 2 and Xue-hui LI 3
2017 2nd International Conference on Coputational Modeling, Siulation and Applied Matheatics (CMSAM 2017) ISBN: 978-1-60595-499-8 TensorFlow and Keras-based Convolutional Neural Network in CAT Iage Recognition
More informationMeaningful Shadows for Image Secret Sharing with Steganography and Authentication Techniques
Journal of Information Hiding and Multimedia Signal Processing 2014 ISSN 2073-4212 Ubiquitous International Volume 5, Number 3, July 2014 Meaningful Shadows for Image Secret Sharing with Steganography
More informationThe optimization design of microphone array layout for wideband noise sources
PROCEEDINGS of the 22 nd International Congress on Acoustics Acoustic Array Systes: Paper ICA2016-903 The optiization design of icrophone array layout for wideband noise sources Pengxiao Teng (a), Jun
More informationA Revisit to LSB Substitution Based Data Hiding for Embedding More Information
A Revisit to LSB Substitution Based Data Hiding for Embedding More Information Yanjun Liu 1,, Chin-Chen Chang 1, and Tzu-Yi Chien 2 1 Department of Information Engineering and Computer Science, Feng Chia
More informationMULTI-INDEX VOTING FOR ASYMMETRIC DISTANCE COMPUTATION IN A LARGE-SCALE BINARY CODES. Chih-Yi Chiu, Yu-Cyuan Liou, and Sheng-Hao Chou
MULTI-INDEX VOTING FOR ASYMMETRIC DISTANCE COMPUTATION IN A LARGE-SCALE BINARY CODES Chih-Yi Chiu, Yu-Cyuan Liou, and Sheng-Hao Chou Departent of Coputer Science and Inforation Engineering, National Chiayi
More informationA Broadband Spectrum Sensing Algorithm in TDCS Based on ICoSaMP Reconstruction
MATEC Web of Conferences 73, 03073(08) https://doi.org/0.05/atecconf/087303073 SMIMA 08 A roadband Spectru Sensing Algorith in TDCS ased on I Reconstruction Liu Yang, Ren Qinghua, Xu ingzheng and Li Xiazhao
More informationUser-Friendly Sharing System using Polynomials with Different Primes in Two Images
User-Friendly Sharing System using Polynomials with Different Primes in Two Images Hung P. Vo Department of Engineering and Technology, Tra Vinh University, No. 16 National Road 53, Tra Vinh City, Tra
More informationImage Filter Using with Gaussian Curvature and Total Variation Model
IJECT Vo l. 7, Is s u e 3, Ju l y - Se p t 016 ISSN : 30-7109 (Online) ISSN : 30-9543 (Print) Iage Using with Gaussian Curvature and Total Variation Model 1 Deepak Kuar Gour, Sanjay Kuar Shara 1, Dept.
More informationEnergy-Efficient Disk Replacement and File Placement Techniques for Mobile Systems with Hard Disks
Energy-Efficient Disk Replaceent and File Placeent Techniques for Mobile Systes with Hard Disks Young-Jin Ki School of Coputer Science & Engineering Seoul National University Seoul 151-742, KOREA youngjk@davinci.snu.ac.kr
More informationStructural Balance in Networks. An Optimizational Approach. Andrej Mrvar. Faculty of Social Sciences. University of Ljubljana. Kardeljeva pl.
Structural Balance in Networks An Optiizational Approach Andrej Mrvar Faculty of Social Sciences University of Ljubljana Kardeljeva pl. 5 61109 Ljubljana March 23 1994 Contents 1 Balanced and clusterable
More informationAffine Invariant Texture Analysis Based on Structural Properties 1
ACCV: The 5th Asian Conference on Coputer Vision, --5 January, Melbourne, Australia Affine Invariant Texture Analysis Based on tructural Properties Jianguo Zhang, Tieniu Tan National Laboratory of Pattern
More informationMiniaturized Spectrometers Chapter 1. 1 Miniaturized Spectrometers. 1.1 General Set-up
Miniaturized Spectroeters Chapter 1 1 Miniaturized Spectroeters 1.1 General Set-up The classical spectroeter consists of an input slit, a rotating dispersive eleent (pris or grating), an output slit and
More informationResearch Article A Novel Image Data Hiding Scheme with Diamond Encoding
Hindawi Publishing Corporation EURASIP Journal on Information Security Volume 9, Article ID 65847, 9 pages doi:.55/9/65847 Research Article A Novel Image Data Hiding Scheme with Diamond Encoding Ruey-Ming
More information3D Building Detection and Reconstruction from Aerial Images Using Perceptual Organization and Fast Graph Search
436 Journal of Electrical Engineering & Technology, Vol. 3, No. 3, pp. 436~443, 008 3D Building Detection and Reconstruction fro Aerial Iages Using Perceptual Organization and Fast Graph Search Dong-Min
More informationUsing Imperialist Competitive Algorithm in Optimization of Nonlinear Multiple Responses
International Journal of Industrial Engineering & Production Research Septeber 03, Volue 4, Nuber 3 pp. 9-35 ISSN: 008-4889 http://ijiepr.iust.ac.ir/ Using Iperialist Copetitive Algorith in Optiization
More informationFeature Based Registration for Panoramic Image Generation
IJCSI International Journal of Coputer Science Issues, Vol. 10, Issue 6, No, Noveber 013 www.ijcsi.org 13 Feature Based Registration for Panoraic Iage Generation Kawther Abbas Sallal 1, Abdul-Mone Saleh
More informationCLUSTERING OF AE SIGNAL AMPLITUDES BY MEANS OF FUZZY C-MEANS ALGORITHM
The 12 th International Conference of the Slovenian Society for Non-Destructive Testing»Application of Conteporary Non-Destructive Testing in Engineering«Septeber 4-6, 213, Portorož, Slovenia More info
More informationInternational Journal of Scientific & Engineering Research, Volume 4, Issue 10, October ISSN
International Journal of Scientific & Engineering Research, Volue 4, Issue 0, October-203 483 Design an Encoding Technique Using Forbidden Transition free Algorith to Reduce Cross-Talk for On-Chip VLSI
More informationDefining and Surveying Wireless Link Virtualization and Wireless Network Virtualization
1 Defining and Surveying Wireless Link Virtualization and Wireless Network Virtualization Jonathan van de Belt, Haed Ahadi, and Linda E. Doyle The Centre for Future Networks and Counications - CONNECT,
More informationA Reversible Data Hiding Scheme for BTC- Compressed Images
IJACSA International Journal of Advanced Computer Science and Applications, A Reversible Data Hiding Scheme for BTC- Compressed Images Ching-Chiuan Lin Shih-Chieh Chen Department of Multimedia and Game
More informationClustering. Cluster Analysis of Microarray Data. Microarray Data for Clustering. Data for Clustering
Clustering Cluster Analysis of Microarray Data 4/3/009 Copyright 009 Dan Nettleton Group obects that are siilar to one another together in a cluster. Separate obects that are dissiilar fro each other into
More informationCOMPUTER GENERATED HOLOGRAMS Optical Sciences 627 W.J. Dallas (Monday, August 23, 2004, 12:38 PM) PART III: CHAPTER ONE DIFFUSERS FOR CGH S
COPUTER GEERATED HOLOGRAS Optical Sciences 67 W.J. Dallas (onday, August 3, 004, 1:38 P) PART III: CHAPTER OE DIFFUSERS FOR CGH S Part III: Chapter One Page 1 of 8 Introduction Hologras for display purposes
More informationEvaluation of a multi-frame blind deconvolution algorithm using Cramér-Rao bounds
Evaluation of a ulti-frae blind deconvolution algorith using Craér-Rao bounds Charles C. Beckner, Jr. Air Force Research Laboratory, 3550 Aberdeen Ave SE, Kirtland AFB, New Mexico, USA 87117-5776 Charles
More informationEE 364B Convex Optimization An ADMM Solution to the Sparse Coding Problem. Sonia Bhaskar, Will Zou Final Project Spring 2011
EE 364B Convex Optiization An ADMM Solution to the Sparse Coding Proble Sonia Bhaskar, Will Zou Final Project Spring 20 I. INTRODUCTION For our project, we apply the ethod of the alternating direction
More informationFeature Selection to Relate Words and Images
The Open Inforation Systes Journal, 2009, 3, 9-13 9 Feature Selection to Relate Words and Iages Wei-Chao Lin 1 and Chih-Fong Tsai*,2 Open Access 1 Departent of Coputing, Engineering and Technology, University
More informationPOSITION-PATCH BASED FACE HALLUCINATION VIA LOCALITY-CONSTRAINED REPRESENTATION. Junjun Jiang, Ruimin Hu, Zhen Han, Tao Lu, and Kebin Huang
IEEE International Conference on ultiedia and Expo POSITION-PATCH BASED FACE HALLUCINATION VIA LOCALITY-CONSTRAINED REPRESENTATION Junjun Jiang, Ruiin Hu, Zhen Han, Tao Lu, and Kebin Huang National Engineering
More informationA Grayscale Image Steganography Based upon Discrete Cosine Transformation
A Grayscale Image Steganography Based upon Discrete Cosine Transformation Chin-Chen Chang 1, Pei-Yu Lin, and Jun-Chou Chuang 3 1 Department of Information Engineering and Computer Science, Feng Chia University,
More informationAdaptive Steganography Method Based on Two Tiers Pixel Value Differencing
Adaptive Steganography Method Based on Two Tiers Pixel Value Differencing Chi-Yao Weng 1, Yen-Chia Huang 1, Chin-Feng Lee 2(&), and Dong-Peng Lin 2 1 Department of Computer Science, National Pingtung University,
More informationA Beam Search Method to Solve the Problem of Assignment Cells to Switches in a Cellular Mobile Network
A Bea Search Method to Solve the Proble of Assignent Cells to Switches in a Cellular Mobile Networ Cassilda Maria Ribeiro Faculdade de Engenharia de Guaratinguetá - DMA UNESP - São Paulo State University
More informationGromov-Hausdorff Distance Between Metric Graphs
Groov-Hausdorff Distance Between Metric Graphs Jiwon Choi St Mark s School January, 019 Abstract In this paper we study the Groov-Hausdorff distance between two etric graphs We copute the precise value
More informationA Fast Multi-Objective Genetic Algorithm for Hardware-Software Partitioning In Embedded System Design
A Fast Multi-Obective Genetic Algorith for Hardware-Software Partitioning In Ebedded Syste Design 1 M.Jagadeeswari, 2 M.C.Bhuvaneswari 1 Research Scholar, P.S.G College of Technology, Coibatore, India
More informationNews Events Clustering Method Based on Staging Incremental Single-Pass Technique
News Events Clustering Method Based on Staging Increental Single-Pass Technique LI Yongyi 1,a *, Gao Yin 2 1 School of Electronics and Inforation Engineering QinZhou University 535099 Guangxi, China 2
More informationMinimax Sensor Location to Monitor a Piecewise Linear Curve
NSF GRANT #040040 NSF PROGRAM NAME: Operations Research Miniax Sensor Location to Monitor a Piecewise Linear Curve To M. Cavalier The Pennsylvania State University University Par, PA 680 Whitney A. Conner
More informationDifferent criteria of dynamic routing
Procedia Coputer Science Volue 66, 2015, Pages 166 173 YSC 2015. 4th International Young Scientists Conference on Coputational Science Different criteria of dynaic routing Kurochkin 1*, Grinberg 1 1 Kharkevich
More informationA Periodic Dynamic Load Balancing Method
2016 3 rd International Conference on Engineering Technology and Application (ICETA 2016) ISBN: 978-1-60595-383-0 A Periodic Dynaic Load Balancing Method Taotao Fan* State Key Laboratory of Inforation
More informationEFFICIENT VIDEO SEARCH USING IMAGE QUERIES A. Araujo1, M. Makar2, V. Chandrasekhar3, D. Chen1, S. Tsai1, H. Chen1, R. Angst1 and B.
EFFICIENT VIDEO SEARCH USING IMAGE QUERIES A. Araujo1, M. Makar2, V. Chandrasekhar3, D. Chen1, S. Tsai1, H. Chen1, R. Angst1 and B. Girod1 1 Stanford University, USA 2 Qualco Inc., USA ABSTRACT We study
More informationGeo-activity Recommendations by using Improved Feature Combination
Geo-activity Recoendations by using Iproved Feature Cobination Masoud Sattari Middle East Technical University Ankara, Turkey e76326@ceng.etu.edu.tr Murat Manguoglu Middle East Technical University Ankara,
More informationCollaborative Web Caching Based on Proxy Affinities
Collaborative Web Caching Based on Proxy Affinities Jiong Yang T J Watson Research Center IBM jiyang@usibco Wei Wang T J Watson Research Center IBM ww1@usibco Richard Muntz Coputer Science Departent UCLA
More informationGalois Homomorphic Fractal Approach for the Recognition of Emotion
Galois Hooorphic Fractal Approach for the Recognition of Eotion T. G. Grace Elizabeth Rani 1, G. Jayalalitha 1 Research Scholar, Bharathiar University, India, Associate Professor, Departent of Matheatics,
More informationInvestigation of The Time-Offset-Based QoS Support with Optical Burst Switching in WDM Networks
Investigation of The Tie-Offset-Based QoS Support with Optical Burst Switching in WDM Networks Pingyi Fan, Chongxi Feng,Yichao Wang, Ning Ge State Key Laboratory on Microwave and Digital Counications,
More informationBoosted Detection of Objects and Attributes
L M M Boosted Detection of Objects and Attributes Abstract We present a new fraework for detection of object and attributes in iages based on boosted cobination of priitive classifiers. The fraework directly
More informationA simplified approach to merging partial plane images
A siplified approach to erging partial plane iages Mária Kruláková 1 This paper introduces a ethod of iage recognition based on the gradual generating and analysis of data structure consisting of the 2D
More informationA new approach to the secret image sharing with steganography and authentication
1 A new approach to the secret image sharing with steganography and authentication C-C Wu a, M-S Hwang* b and S-J Kao a a Department of Computer Science and Engineering, National Chung Hsing University,
More informationHybrid Stegnography using ImagesVaried PVD+ LSB Detection Program
www.ijecs.in International Journal Of Engineering And Computer Science ISSN:2319-7242 Volume 4 Issue 5 May 2015, Page No. 12086-12090 Hybrid Stegnography using ImagesVaried PVD+ LSB Detection Program Shruti
More informationModule Contact: Dr Rudy Lapeer (CMP) Copyright of the University of East Anglia Version 1
UNIVERSITY OF EAST ANGLIA School of Coputing Sciences Main Series UG Exaination 2016-17 GRAPHICS 1 CMP-5010B Tie allowed: 2 hours Answer THREE questions. Notes are not peritted in this exaination Do not
More informationDEBARRED OBJECTS RECOGNITION BY PFL OPERATOR
DEBARRED OBJECTS RECOGNITION BY PFL OPERATOR Manish Kuar Srivastava,Madan Kushwah, Abhishe uar 3 Assistant Professor, Departent of CSE, Lal Bahadur Shastri Group of Institutions Lucnow, Uttar Pradesh,
More informationPerformance Analysis of RAID in Different Workload
Send Orders for Reprints to reprints@benthascience.ae 324 The Open Cybernetics & Systeics Journal, 2015, 9, 324-328 Perforance Analysis of RAID in Different Workload Open Access Zhang Dule *, Ji Xiaoyun,
More informationApproximate String Matching with Reduced Alphabet
Approxiate String Matching with Reduced Alphabet Leena Salela 1 and Jora Tarhio 2 1 University of Helsinki, Departent of Coputer Science leena.salela@cs.helsinki.fi 2 Aalto University Deptartent of Coputer
More informationRelief shape inheritance and graphical editor for the landscape design
Relief shape inheritance and graphical editor for the landscape design Egor A. Yusov Vadi E. Turlapov Nizhny Novgorod State University after N. I. Lobachevsky Nizhny Novgorod Russia yusov_egor@ail.ru vadi.turlapov@cs.vk.unn.ru
More informationOPTIMAL COMPLEX SERVICES COMPOSITION IN SOA SYSTEMS
Key words SOA, optial, coplex service, coposition, Quality of Service Piotr RYGIELSKI*, Paweł ŚWIĄTEK* OPTIMAL COMPLEX SERVICES COMPOSITION IN SOA SYSTEMS One of the ost iportant tasks in service oriented
More informationProblem Solving of graph correspondence using Genetics Algorithm and ACO Algorithm
Proble Solving of graph correspondence using Genetics Algorith and ACO Algorith Alireza Rezaee, 1, Azizeh Ajalli 2 Assistant professor,departent of Mechatronics Engineering, Faculty of New Sciences and
More informationMapping Data in Peer-to-Peer Systems: Semantics and Algorithmic Issues
Mapping Data in Peer-to-Peer Systes: Seantics and Algorithic Issues Anastasios Keentsietsidis Marcelo Arenas Renée J. Miller Departent of Coputer Science University of Toronto {tasos,arenas,iller}@cs.toronto.edu
More informationResearch Article A Comparison of Standard One-Step DDA Circular Interpolators with a New Cheap Two-Step Algorithm
Modelling and Siulation in Engineering, Article ID 916539, 6 pages http://dx.doi.org/10.1155/2014/916539 Research Article A Coparison of Standard One-Step DDA Circular Interpolators with a New Cheap Two-Step
More informationGenetic-Based EM Algorithm for Learning Gaussian Mixture Models
1344 IEEE TRANSACTIONS ON PATTERN ANALYSIS AND MACHINE INTELLIGENCE, VOL. 27, NO. 8, AUGUST 2005 Genetic-Based EM Algorith for Learning Gaussian Mixture Models Franz Pernkopf, Meber, IEEE, and Djael Bouchaffra,
More informationAGV PATH PLANNING BASED ON SMOOTHING A* ALGORITHM
International Journal of Software Engineering & Applications (IJSEA), Vol.6, No.5, Septeber 205 AGV PATH PLANNING BASED ON SMOOTHING A* ALGORITHM Xie Yang and Cheng Wushan College of Mechanical Engineering,
More informationAutomatic Graph Drawing Algorithms
Autoatic Graph Drawing Algoriths Susan Si sisuz@turing.utoronto.ca Deceber 7, 996. Ebeddings of graphs have been of interest to theoreticians for soe tie, in particular those of planar graphs and graphs
More informationDerivation of an Analytical Model for Evaluating the Performance of a Multi- Queue Nodes Network Router
Derivation of an Analytical Model for Evaluating the Perforance of a Multi- Queue Nodes Network Router 1 Hussein Al-Bahadili, 1 Jafar Ababneh, and 2 Fadi Thabtah 1 Coputer Inforation Systes Faculty of
More informationA CRYPTANALYTIC ATTACK ON RC4 STREAM CIPHER
A CRYPTANALYTIC ATTACK ON RC4 STREAM CIPHER VIOLETA TOMAŠEVIĆ, SLOBODAN BOJANIĆ 2 and OCTAVIO NIETO-TALADRIZ 2 The Mihajlo Pupin Institute, Volgina 5, 000 Belgrade, SERBIA AND MONTENEGRO 2 Technical University
More informationCHAPTER 6. LSB based data hiding with double Encryption. 6.1 Introduction
CHAPTER 6 LSB based data hiding with double Encryption 6.1 Introduction In image steganography, the amount of secret data that can be embedded depends on the method and the cover-image as capacity limitation
More informationIntelligent Robotic System with Fuzzy Learning Controller and 3D Stereo Vision
Recent Researches in Syste Science Intelligent Robotic Syste with Fuzzy Learning Controller and D Stereo Vision SHIUH-JER HUANG Departent of echanical Engineering National aiwan University of Science and
More informationVerifying the structure and behavior in UML/OCL models using satisfiability solvers
IET Cyber-Physical Systes: Theory & Applications Review Article Verifying the structure and behavior in UML/OCL odels using satisfiability solvers ISSN 2398-3396 Received on 20th October 2016 Revised on
More information2nd Workshop on Advanced Research and Technology in Industry Applications (WARTIA 2016)
2nd Workshop on Advanced Research and Technology in Industry Applications (WARTIA 2016) Method for Marking and Positioning Corrosions in the Autoobile Engine Cylinder Cavity fro the Ultrasonic Phased Array
More informationDigital Image Steganography Using Bit Flipping
BULGARIAN ACADEMY OF SCIENCES CYBERNETICS AND INFORMATION TECHNOLOGIES Volume 18, No 1 Sofia 2018 Print ISSN: 1311-9702; Online ISSN: 1314-4081 DOI: 10.2478/cait-2018-0006 Digital Image Steganography Using
More informationModal Masses Estimation in OMA by a Consecutive Mass Change Method.
Modal Masses Estiation in OMA by a Consecutive Mass Change Method. F. Pelayo University of Oviedo, Departent of Construction and Manufacturing Engineering, Gijón, Spain M. López-Aenlle University of Oviedo,
More informationA high quality steganographic method with pixel-value differencing and modulus function
Available online at www.sciencedirect.com The Journal of Systems and Software 81 (2008) 150 158 www.elsevier.com/locate/jss A high quality steganographic method with pixel-value differencing and modulus
More informationDesigning High Performance Web-Based Computing Services to Promote Telemedicine Database Management System
Designing High Perforance Web-Based Coputing Services to Proote Teleedicine Database Manageent Syste Isail Hababeh 1, Issa Khalil 2, and Abdallah Khreishah 3 1: Coputer Engineering & Inforation Technology,
More informationImplementation of fast motion estimation algorithms and comparison with full search method in H.264
IJCSNS International Journal of Coputer Science and Network Security, VOL.8 No.3, March 2008 139 Ipleentation of fast otion estiation algoriths and coparison with full search ethod in H.264 A.Ahadi, M.M.Azadfar
More informationGuillotine subdivisions approximate polygonal subdivisions: Part III { Faster polynomial-time approximation schemes for
Guillotine subdivisions approxiate polygonal subdivisions: Part III { Faster polynoial-tie approxiation schees for geoetric network optiization Joseph S. B. Mitchell y April 19, 1997; Last revision: May
More informationSECURE DATA EMBEDDING USING REVERSIBLE DATA HIDING FOR ENCRYPTED IMAGES
VOL., NO. 7, APRIL 5 ISSN 89-668 6-5 Asian Research Publishing Network (ARPN). All rights reserved. SECURE DATA EMBEDDING USING REVERSIBLE DATA HIDING FOR ENCRYPTED IMAGES R. Selveeswari and P. R. Vijayalakshmi
More information6.1 Topological relations between two simple geometric objects
Chapter 5 proposed a spatial odel to represent the spatial extent of objects in urban areas. The purpose of the odel, as was clarified in Chapter 3, is ultifunctional, i.e. it has to be capable of supplying
More informationRandom Traversing Based Reversible Data Hiding Technique Using PE and LSB
Random Traversing Based Reversible Data Hiding Technique Using PE and LSB Rhythm Katira #1, Prof. V. Thanikaiselvan *2 # ECE Department, VIT University Vellore, Tamil-Nadu, India 1 rhythm.katira2009@vit.ac.in
More informationMultipath Selection and Channel Assignment in Wireless Mesh Networks
Multipath Selection and Channel Assignent in Wireless Mesh Networs Soo-young Jang and Chae Y. Lee Dept. of Industrial and Systes Engineering, KAIST, 373-1 Kusung-dong, Taejon, Korea Tel: +82-42-350-5916,
More informationFast Robust Fuzzy Clustering Algorithm for Grayscale Image Segmentation
Fast Robust Fuzzy Clustering Algorith for Grayscale Iage Segentation Abdelabbar Cherkaoui, Hanane Barrah To cite this version: Abdelabbar Cherkaoui, Hanane Barrah. Fast Robust Fuzzy Clustering Algorith
More informationKnowledge Discovery Applied to Agriculture Economy Planning
Knowledge Discovery Applied to Agriculture Econoy Planning Bing-ru Yang and Shao-un Huang Inforation Engineering School University of Science and Technology, Beiing, China, 100083 Eail: bingru.yang@b.col.co.cn
More informationADAPTIVE EVOLUTIONARY ALGORITHMS ON UNITATION, ROYAL ROAD AND LONGPATH FUNCTIONS
ADAPTIVE EVOLUTIONARY ALGORITHMS ON UNITATION, ROYAL ROAD AND LONGPATH FUNCTIONS J. Neal Richter, John Paxton Coputer Science Departent, Montana State University, 357 EPS, Bozean, Montana 5974 http://www.cs.ontana.edu
More informationThe Internal Conflict of a Belief Function
The Internal Conflict of a Belief Function Johan Schubert Abstract In this paper we define and derive an internal conflict of a belief function We decopose the belief function in question into a set of
More informationBrian Noguchi CS 229 (Fall 05) Project Final Writeup A Hierarchical Application of ICA-based Feature Extraction to Image Classification Brian Noguchi
A Hierarchical Application of ICA-based Feature Etraction to Iage Classification Introduction Iage classification poses one of the greatest challenges in the achine vision and achine learning counities.
More informationPrivacy-preserving String-Matching With PRAM Algorithms
Privacy-preserving String-Matching With PRAM Algoriths Report in MTAT.07.022 Research Seinar in Cryptography, Fall 2014 Author: Sander Sii Supervisor: Peeter Laud Deceber 14, 2014 Abstract In this report,
More informationDetection of Outliers and Reduction of their Undesirable Effects for Improving the Accuracy of K-means Clustering Algorithm
Detection of Outliers and Reduction of their Undesirable Effects for Iproving the Accuracy of K-eans Clustering Algorith Bahan Askari Departent of Coputer Science and Research Branch, Islaic Azad University,
More informationAn Optimization Clustering Algorithm Based on Texture Feature Fusion for Color Image Segmentation
Algoriths 2015, 8, 234-247; doi:10.3390/a8020234 Article OPEN ACCESS algoriths ISSN 1999-4893 www.dpi.co/journal/algoriths An Optiization Clustering Algorith Based on Texture Feature Fusion for Color Iage
More information1 P a g e. F x,x...,x,.,.' written as F D, is the same.
11. The security syste at an IT office is coposed of 10 coputers of which exactly four are working. To check whether the syste is functional, the officials inspect four of the coputers picked at rando
More information(12) United States Patent Kumar et al.
(12) United States Patent Kuar et al. US006795434B1 (10) Patent N0.: (45) Date of Patent: US 6,795,434 B1 Sep. 21, 2004 (54) REPLICATED SERVER DISCOVERY IN CLIENT-PROXY SERVERS (75) Inventors: Harlharan
More informationIMAGE MOSAICKING FOR ESTIMATING THE MOTION OF AN UNDERWATER VEHICLE. Rafael García, Xevi Cufí and Lluís Pacheco
IMAGE MOSAICKING FOR ESTIMATING THE MOTION OF AN UNDERWATER VEHICLE Rafael García, Xevi Cufí and Lluís Pacheco Coputer Vision and Robotics Group Institute of Inforatics and Applications, University of
More informationMassive amounts of high-dimensional data are pervasive in multiple domains,
Challenges of Feature Selection for Big Data Analytics Jundong Li and Huan Liu, Arizona State University Massive aounts of high-diensional data are pervasive in ultiple doains, ranging fro social edia,
More informationClassification and Segmentation of Glaucomatous Image Using Probabilistic Neural Network (PNN), K-Means and Fuzzy C- Means(FCM)
IJSRD - International Journal for Scientific Research & Developent Vol., Issue 7, 03 ISSN (online): 3-063 Classification and Segentation of Glaucoatous Iage Using Probabilistic Neural Network (PNN), K-Means
More informationGenerating Mechanisms for Evolving Software Mirror Graph
Journal of Modern Physics, 2012, 3, 1050-1059 http://dx.doi.org/10.4236/jp.2012.39139 Published Online Septeber 2012 (http://www.scirp.org/journal/jp) Generating Mechaniss for Evolving Software Mirror
More informationResearch Article Improvements in Geometry-Based Secret Image Sharing Approach with Steganography
Hindawi Publishing Corporation Mathematical Problems in Engineering Volume 2009, Article ID 187874, 11 pages doi:10.1155/2009/187874 Research Article Improvements in Geometry-Based Secret Image Sharing
More informationA Model Free Automatic Tuning Method for a Restricted Structured Controller. by using Simultaneous Perturbation Stochastic Approximation
28 Aerican Control Conference Westin Seattle Hotel, Seattle, Washington, USA June -3, 28 WeC9.5 A Model Free Autoatic Tuning Method for a Restricted Structured Controller by Using Siultaneous Perturbation
More informationWeeks 1 3 Weeks 4 6 Unit/Topic Number and Operations in Base 10
Weeks 1 3 Weeks 4 6 Unit/Topic Nuber and Operations in Base 10 FLOYD COUNTY SCHOOLS CURRICULUM RESOURCES Building a Better Future for Every Child - Every Day! Suer 2013 Subject Content: Math Grade 3rd
More information3 Conference on Inforation Sciences and Systes, The Johns Hopkins University, March, 3 Sensitivity Characteristics of Cross-Correlation Distance Metric and Model Function F. Porikli Mitsubishi Electric
More informationData Hiding on Text Using Big-5 Code
Data Hiding on Text Using Big-5 Code Jun-Chou Chuang 1 and Yu-Chen Hu 2 1 Department of Computer Science and Communication Engineering Providence University 200 Chung-Chi Rd., Shalu, Taichung 43301, Republic
More informationResearch on a Kind of QoS-Sensitive Semantic Web Services Composition Method Based on Genetic Algorithm
roceedings of the 7th International Conference on Innovation & Manageent 893 Research on a Kind of QoS-Sensitive Seantic Web Services Coposition Method Based on Genetic Algorith Cao Hongjiang, Nie Guihua,
More informationA NEW METHOD FOR COLOURIZING OF MULTICHANNEL MR IMAGES BASED ON REAL COLOUR OF HUMAN BRAIN
A NEW METHOD FOR OLOURIZING OF MULTIHANNEL MR IMAGES BASED ON REAL OLOUR OF HUMAN BRAIN Mohaad Hossein Kadbi; Eadoddin Fateizaheh; Abouzar Eslai; and arya khosroshahi Electrical Engineering Dept., Sharif
More informationQUERY ROUTING OPTIMIZATION IN SENSOR COMMUNICATION NETWORKS
QUERY ROUTING OPTIMIZATION IN SENSOR COMMUNICATION NETWORKS Guofei Jiang and George Cybenko Institute for Security Technology Studies and Thayer School of Engineering Dartouth College, Hanover NH 03755
More information488 IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, VOL. 3, NO. 3, SEPTEMBER 2008
488 IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, VOL 3, NO 3, SEPTEMBER 2008 Adaptive Data Hiding in Edge Areas of Images With Spatial LSB Domain Systems Cheng-Hsing Yang, Chi-Yao Weng, Shiuh-Jeng
More information