A Secured Method for Image Steganography Based On Pixel Values

Size: px
Start display at page:

Download "A Secured Method for Image Steganography Based On Pixel Values"

Transcription

1 A Secured Method for Image Steganography Based On Pxel Values Tarun Gulat #, Sanskrt Gupta * # Assocate Professor, Electroncs and Communcaton Engneerng Department, MMEC, M.M.U., Mullana, Ambala, Haryana, Inda * Research Scholar, Electroncs and Communcaton Engneerng Department, MMEC, M.M.U., Mullana, Ambala, Haryana, Inda Abstract: Steganography s the scence of communcaton that hdes secret nformaton nsde the multmeda sgnal n such a way that the exstence of secret nformaton s concealed. In ths paper mage steganography s done. The text strng s concealed n the cover mage as a payload. The technque s based on pxel value dfferencng and pxel value sum. A secret key s used to control the message embeddng process. At the recever stego mage s manpulated to get the text out of t. PSNR and capacty are used to measure the stego mage qualty. Keywords Steganography, Pxel Value Dfferencng, Pxel Value Sum, Securty. I. INTRODUCTION Durng the last few decades, nternet s becomng a very popular medum for communcaton. But data securty durng transfer through t has become a major challenge. There are two approaches [1] to send the nformaton. One s cryptography, n whch the nformaton s transferred n form of unntellgble text. But n cryptography, ntruder can easly detect the presence of some secret nformaton by observng t. Also, ntruder can apply the cryptanalyss to obtan the nformaton. Another approach s steganography. Steganography makes communcaton unntellgble for the ntruder. In steganography, the secret message s hdden nsde the another carrer so that t looks nnocent as t s not hdng any secret message. Only the authorzed recpent can detect the presence of some ntellgble nformaton. Steganography [2] s art and scence of secret communcaton whch hdes the exstence of the secret data nsde another data to protect t from unauthorzed users. Many dfferent carrers such as audo, vdeo and dgtal mages can be used, but dgtal mages are mostly used because of ther frequency over the nternet. In mage steganography nformaton can be exclusvely stored n mage. The mage used for hdng the secret nformaton s called cover mage. Steganography hdes the nformaton n the cover mage [3] and the fnal mage so formed s called stego mage. Also, the reverse of ths.e. breakng of steganography s called steganalyss. It s mportant that the stego mage must be free from notceable change, so that the thrd party wll not be able to detect any changes and treat ths cover mage as usual mage and secret data send through ths cover mage remans safe. Steganography can be done usng dfferent methods lke Least Sgnfcant Bt Substtuton method, Pxel Value Dfferencng Method, Pxel Value Sum and Dfferencng. In the processng of LSB substtuton [4], the secret data s embedded n the LSB of the pxels n the cover mage. PVD technque [5] s a steganographc method based on dfference of the two consecutve pxels. It hdes the secret data nsde the mage n the nonoverlappng consecutve pxels by changng the dfference value. On the other hand PVS deals wth the sum of the two consecutve pxels n the cover mage. The methods are mplemented n order to obtan the hgh embeddng capacty, more securty and the vsual effects of the mage fle remans preserve. The proposed method of mage steganography s an mprovement to PVS and PVD technque [6] by nsertng a secret key nsde t to make the system more secured [7]. Ths paper s organzed as follows. In secton II prevous work done for both PVD and LSB s presented. In secton III methodology used for hdng secret data along wth securty key s descrbed. In secton IV results of all the technques descrbed n ths paper are compared and fnally conclusons are gven n secton IV. II. PREVIOUS WORK Work has been done n the feld of mage steganography and authors have proposed varous algorthms: A. Least sgnfcant bt substtuton Method The LSB s the lowest sgnfcant bt n the byte of each pxel n the mage. Ths steganography embeds the secret nformaton n the least sgnfcant bts of pxel values of the cover mage. Ths type of embeddng procedure s qute smple. It requres eght bytes of the pxels to store 1 byte of the secret data.e. LSB. Rest of the bts n the pxels remans the same. ISSN: Page 610

2 Suppose the frst eght pxels of the orgnal mage have the followng gray scale values: The letter C whose bnary value s To hde ths bnary value t can replace the LSBs of these pxels to have the followng new gray scale values: In ths example, the underlned LSB s of the pxel values has been changed. The dfference between the cover (.e. orgnal) mage and the stego mage s dffcult to observe by human eye. Many algorthms have been proposed n the lterature based on LSB. Although LSB substtuton s the smplest steganography approach so far but t s not effcent n terms of securty as t s predctable. A very well-known LSB approach s presented n [8] and proposed an adaptve method based on nter pxel relatonshp. Ths approach produces very attractve results but ts retreval s very easy by applyng retreval method. There s no need of any secret nformaton or key before retreval. Ths makes t vulnerable to attacks. Another effcent approach s presented n [9] whch used neghbourhood nformaton to calculate the amount of data that can be hdden n pxels of cover mage. In ths approach, some pxels are overloaded wth data whle some pxels reman unchanged. In ths approach also, secret nformaton can be easly retreved easly. There s another effcent approach presented n [10] n whch secret key s used only to decde whether the secret nformaton bts wll be hdden n green or blue. After decdng ths, secret nformaton bts hdes n LSB of ether blue or green. Although, ths approach ntally promses securty but after that hdng secret bts n LSB s agan not secure and secret data can be extracted after puttng some effort. The major lmtaton of LSB s small sze of data whch can be embedded n such type of mages usng only LSB. The LSB s extremely vulnerable to attacks. B. Pxel Value Dfferencng Method In ths method, the secret data s embeddng n the cover mage. The cover mage pxels and secret data s gven. To hde the data by PVD, the dfference value d s calculated from the two consecutve pxel values p and p +1.e. d p p 1. Then the varous ranges s defned for value such that R [l, u ] and l <d <u. Then the wdth of the range s calculated whose logarthm wll gve the number of secret data bts(t) that wll be hde n ths range. Then a new dfference value s calculated as d' b l, where b s the decmal value of t bts of secret data. The pxel value p and p +1 can be modfed as: Where All the pxel values accordng to the dfference value are set and hence the secret data s embedded. The pxel value dfferencng method s proposed prevously by usng dfferent approaches. Wu and Tsa [11] proposed a steganographc scheme for gray level mages n 2002 to mprove the qualty of the stego-mage, whch utlzed the Human Vsual System senstvty to ntensty varatons from smoothness to hgh contrast by the selecton of the wdth of the range whch the dfference value of two neghbour pxels belongs to. Mandal and Das [12] proposed a method whch mproves the vsual qualty of the PVD method. It also estmate the fallng off problem.pvd ssued for secret data embeddng for each component(red, Green and Blue) separately. Varable number of bts are embedded n each pxel for provng the secured transmsson. Hmaksh et al. [13] provde the another steganographc method whch s based on the pxel value dfferencng scheme dscussed n [11] and [12]. The data s embedded n ths method by embeddng the secret message n odd pxel pars and the addtonal detals were stored n even pxel par. Ths method mproved the mage qualty and also the compresson rato. Han lng et al. [14] proposed a method for steganography whch uses the largest pxel value between the other three pxels close to target pxel to estmate the no of bts that can be embedded n that target pxel. The method enhances the mage qualty and ncreased embeddng capacty. C. Pxel Value sum Dfferencng Method In ths method, the sum s of the two consecutve pxel values s calculated. If, then the embeddng s done usng Pxel Value Dfferencng. For, the range of s s searched such that r [l,u ] n the same manner as n PVD, the number of t secret bts can be obtaned usng formulalog(w)+1. And then transform t bts of secret data nto decmal value b. The new sum value s calculated usng s' l b. The pxel values p and p +1 can be modfed as: ISSN: Page 611

3 III. METHODOLOGY The method s based on pxel value dfferencng and pxel value sum [6]. It s modfed to gve a hghly secured and hgh capacty data as n PVD. An mage baboon.jpg as n fg1 s a cover mage that embed the text stream. A stego mage s sent to the recever havng nformaton and fnally the text message s extracted from the stego mage as llustrated below. At Sender, Cover Image Secret Data At Recever, Embeddng Procedure Stego Image Stego Image A. Data Embeddng 1. Read the cover mage and partton t nto nonoverlappng blocks of two consecutve pxels. 2. Insert the secret key by XORng the LSB wth the 7th bt n each pxel. 3. Determne the capacty of pxels n the mage. 4. If there s a match.e. the XOR value s 0. Embed the n bts of secret message drectly usng Pxel value sum and Dfferencng. 5. Otherwse data s nverted before embeddng. 6. Repeat the procedure untl all the secret data bts s embedded. 7. Data s wrtten n the form of mage fle to obtan a Stego-mage. B. Data Extracton 1. Open the stego-mage and agan partton t nto non-overlappng blocks of two consecutve pxels. 2. Apply the secret key. 3. XOR the LSB wth 7th bt of each pxel. 4. If the XOR value s 0. Extract the n bts of the secret data drectly. 5. Otherwse the data s frst extracted and the reverse of the strng s done n order get the correct data. 6. Repeat the procedure untl all the bts of the secret data are extracted. IV. RESULTS To evaluate the performance of proposed method an mage of Taj of sze 256 X 256 s taken as cover mage as age shown n Fg. 2. The secret data stream s generated randomly. Frstly the proposed method s appled on the gray mage and then on the colored mage. The algorthm s tested for the vsual dstorton and capacty of the cover mage. Extracton Procedure Secret Data Fg. 1 Illustraton of Steganography GRAY SCALE Fg. 2 Cover Image The cover mage dstorton produced due to secret data embeddng can be measured n terms of Mean Square Error and Peak Sgnal to Nose Rato. ISSN: Page 612

4 These are defned as: Where I 1 and I 2 n the MSE equaton are the pxel values n the cover and stego mage respectvely and m, n are the dmensons of the cover mage along the horzontal and vertcal axes. The MSE value for mages s calculated for each colour plane of the mage and then the average of the MSE of all the planes gves the Mean Squared Error between Cover and stego mage. Capacty s another parameter. It s the sze of the data n a cover mage. Capacty depends on the total number of bts per pxel and the number of bts embedded n each pxel of the mage. Capacty s represented by bts per pxel (bpp) P S N R Proposed scheme Fg. 4 Varaton n PSNR PVD Gray scale Method The expermental data presented n Table1 and 2 ndcate the Capacty and PSNR respectvely of mage for proposed scheme. The aforesad table also provde comperatve data for the other methods. Table 1. CAPACITY Image Proposed PVD PVD Scheme and PVS Gray scale GRAY SCALE Fg. 5 Stego Image The stego mage s obtaned from cover mage by embeddng secret data stream to t. The secret key s also used for the secured transmsson of the message to protect t from ntruders attack. Stego mages correspondng to the cover mages s shown n Fg. 5. The mages look smlar and are mperceptble to human eye. C A P A C I T Y Table 2.PSNR Image Proposed PVD and PVD Scheme PVS Gray scale Proposed scheme PVD and PVS PVD Fg. 3 Varaton n Capacty Gray Scale Method V. CONCLUSION In ths paper, a technque for mage steganography have been studed. Ths technque utlzes the sum or dfference values for a partcular pxel along wth the secret key for better securty. By the expermental results t has been concluded that the proposed method has good capacty and good vsual fdelty. The PSNR value and capacty s compared for dfferent technques dscussed n ths paper. The secret key s requred to keep the prvacy of the data. The low PSNR value of the mage does not change the vsualty of the mage and also by seeng the mage ntruder wll not get to know the presence of some useful nformaton. A trade off between these three terms s requred whle selectng a steganographc scheme. REFERENCES [1] Shamm Ahmed Laskar and Kattamanch Hemachandran, Hgh Capacty data hdng usng LSB Steganography and Encrypton, Internatonal Journal of Database Management Systems ( IJDMS ) Vol.4, No.6, pp , December [2] Lpng J, Xaolong L, Bn Yang and Zhhong Lu, A further study on a PVD-based steganography, Proceedng of IEEE conference [3] Chn-ChenChanga,Ju-YuanHsaob and Ch-ShangChana Fndng optmal least-sgnfcant-bt substtuton n mage ISSN: Page 613

5 hdng by dynamc programmng strategy Pattern Recognton Socety, Publshed by Elsever Scence,2002. [4] Champakamala, B.S, Padmn.K and Radhka DK Least Sgnfcant Bt algorthm for mage steganography IJACT Vol 3, No. 4, pp , [5] V. S. Shrgupp, A Novel Approach for hdng data n Image Steganography by usng Three Pxel Par Dfferencng Method, Internatonal Journal of Advanced Research n Electroncs and Communcaton Engneerng, Vol. 4(12), pp , [6] A. Tyag, R. Roy, S. Changder, Hgh Capacty Image Steganography based on Pxel Value Dfferencng and Pxel Value Sum, Proceedng of IEEE, [7] Ankta Sanchet Pxel Value Dfferencng Image Steganography Usng Secret Key IJITEE, Vol. 2(1), Dec [8] Na-I Wu, "A Study on Data Hdng/or Gray-Level and Bnary Images." [9] M. Hossan, SA Haque, F. Sharmn, "Varable Rate Steganography n Gray Scale Dgtal Images Usng Neghborhood Pxel Irformaton", Proceedngs of Internatonal Conference on Computer and Informaton Technology, Bangladesh, [10] S. M. Masud Karm, Md. Safur Rahman, Md. Ismal Hossan, "A New Approach for LSB Based Image Steganography Usng Secret Key", Proceedngs of 14th Internatonal Conference on Computer and InformatonTechnology, Bangladesh, [11] Da-Chun Wu, Wen-Hsang Tsa, A steganographc method for mages by pxel-value dfferencng Pattern Recognton Socety, Publshed by Elsever Scence,pp , [12] J. K. Mandal and Debashs Das Colour Image Steganography Based On Pxel Value Dfferencng In Spatal Doman IJIST Vol.2, No.4, July [13] Hmaksh, Verma,H.K., Sngh, R.K., Sngh,C.K., B- Drectonal pxel-value dfferencng approach for Color Image.,Proceedng of IEEE, [14] Han-lng Zhang, Guang-zh Geng and Ca-qong Xong Image Steganography usng Pxel-Value Dfferencng Second Internatonal Symposum on Electronc Commerce and Securty,IEEE, ISSN: Page 614

A Binarization Algorithm specialized on Document Images and Photos

A Binarization Algorithm specialized on Document Images and Photos A Bnarzaton Algorthm specalzed on Document mages and Photos Ergna Kavalleratou Dept. of nformaton and Communcaton Systems Engneerng Unversty of the Aegean kavalleratou@aegean.gr Abstract n ths paper, a

More information

Hybrid Non-Blind Color Image Watermarking

Hybrid Non-Blind Color Image Watermarking Hybrd Non-Blnd Color Image Watermarkng Ms C.N.Sujatha 1, Dr. P. Satyanarayana 2 1 Assocate Professor, Dept. of ECE, SNIST, Yamnampet, Ghatkesar Hyderabad-501301, Telangana 2 Professor, Dept. of ECE, AITS,

More information

Article Reversible Dual-Image-Based Hiding Scheme Using Block Folding Technique

Article Reversible Dual-Image-Based Hiding Scheme Using Block Folding Technique Artcle Reversble Dual-Image-Based Hdng Scheme Usng Block Foldng Technque Tzu-Chuen Lu, * and Hu-Shh Leng Department of Informaton Management, Chaoyang Unversty of Technology, Tachung 4349, Tawan Department

More information

Content Based Image Retrieval Using 2-D Discrete Wavelet with Texture Feature with Different Classifiers

Content Based Image Retrieval Using 2-D Discrete Wavelet with Texture Feature with Different Classifiers IOSR Journal of Electroncs and Communcaton Engneerng (IOSR-JECE) e-issn: 78-834,p- ISSN: 78-8735.Volume 9, Issue, Ver. IV (Mar - Apr. 04), PP 0-07 Content Based Image Retreval Usng -D Dscrete Wavelet wth

More information

High Payload Reversible Data Hiding Scheme Using Difference Segmentation and Histogram Shifting

High Payload Reversible Data Hiding Scheme Using Difference Segmentation and Histogram Shifting JOURNAL OF ELECTRONIC SCIENCE AND TECHNOLOGY, VOL. 11, NO. 1, MARCH 2013 9 Hgh Payload Reversble Data Hdng Scheme Usng Dfference Segmentaton and Hstogram Shftng Yung-Chen Chou and Huang-Chng L Abstract

More information

Enhanced Watermarking Technique for Color Images using Visual Cryptography

Enhanced Watermarking Technique for Color Images using Visual Cryptography Informaton Assurance and Securty Letters 1 (2010) 024-028 Enhanced Watermarkng Technque for Color Images usng Vsual Cryptography Enas F. Al rawashdeh 1, Rawan I.Zaghloul 2 1 Balqa Appled Unversty, MIS

More information

Improvement of Spatial Resolution Using BlockMatching Based Motion Estimation and Frame. Integration

Improvement of Spatial Resolution Using BlockMatching Based Motion Estimation and Frame. Integration Improvement of Spatal Resoluton Usng BlockMatchng Based Moton Estmaton and Frame Integraton Danya Suga and Takayuk Hamamoto Graduate School of Engneerng, Tokyo Unversty of Scence, 6-3-1, Nuku, Katsuska-ku,

More information

Parallelism for Nested Loops with Non-uniform and Flow Dependences

Parallelism for Nested Loops with Non-uniform and Flow Dependences Parallelsm for Nested Loops wth Non-unform and Flow Dependences Sam-Jn Jeong Dept. of Informaton & Communcaton Engneerng, Cheonan Unversty, 5, Anseo-dong, Cheonan, Chungnam, 330-80, Korea. seong@cheonan.ac.kr

More information

A Hybrid Semi-Blind Gray Scale Image Watermarking Algorithm Based on DWT-SVD using Human Visual System Model

A Hybrid Semi-Blind Gray Scale Image Watermarking Algorithm Based on DWT-SVD using Human Visual System Model A Hybrd Sem-Blnd Gray Scale Image Watermarkng Algorthm Based on DWT-SVD usng Human Vsual System Model Rajesh Mehta r Scence & Engneerng, USICT Guru Gobnd Sngh Indrarprastha Unversty New Delh, Inda rajesh00ust@gmal.com

More information

A Robust Webpage Information Hiding Method Based on the Slash of Tag

A Robust Webpage Information Hiding Method Based on the Slash of Tag Advanced Engneerng Forum Onlne: 2012-09-26 ISSN: 2234-991X, Vols. 6-7, pp 361-366 do:10.4028/www.scentfc.net/aef.6-7.361 2012 Trans Tech Publcatons, Swtzerland A Robust Webpage Informaton Hdng Method Based

More information

Data Hiding and Image Authentication for Color-Palette Images

Data Hiding and Image Authentication for Color-Palette Images Data Hdng and Image Authentcaton for Color-Palette Images Chh-Yang Yn ( 殷志揚 ) and Wen-Hsang Tsa ( 蔡文祥 ) Department of Computer & Informaton Scence Natonal Chao Tung Unversty 00 Ta Hsueh Rd., Hsnchu, Tawan

More information

Reversible Dual-Image-Based Hiding Scheme Using Block Folding Technique

Reversible Dual-Image-Based Hiding Scheme Using Block Folding Technique S S symmetry Artcle Reversble Dual-Image-Based Hdng Scheme Usng Block Foldng Technque Tzu-Chuen Lu Tzu-Chuen Lu 1, 1, * and Hu-Shh Leng * ID and Hu-Shh Leng 1 Department Informaton Management, Chaoyang

More information

A Fast Content-Based Multimedia Retrieval Technique Using Compressed Data

A Fast Content-Based Multimedia Retrieval Technique Using Compressed Data A Fast Content-Based Multmeda Retreval Technque Usng Compressed Data Borko Furht and Pornvt Saksobhavvat NSF Multmeda Laboratory Florda Atlantc Unversty, Boca Raton, Florda 3343 ABSTRACT In ths paper,

More information

Shape-adaptive DCT and Its Application in Region-based Image Coding

Shape-adaptive DCT and Its Application in Region-based Image Coding Internatonal Journal of Sgnal Processng, Image Processng and Pattern Recognton, pp.99-108 http://dx.do.org/10.14257/sp.2014.7.1.10 Shape-adaptve DCT and Its Applcaton n Regon-based Image Codng Yamn Zheng,

More information

An Image Compression Algorithm based on Wavelet Transform and LZW

An Image Compression Algorithm based on Wavelet Transform and LZW An Image Compresson Algorthm based on Wavelet Transform and LZW Png Luo a, Janyong Yu b School of Chongqng Unversty of Posts and Telecommuncatons, Chongqng, 400065, Chna Abstract a cylpng@63.com, b y27769864@sna.cn

More information

Enhanced AMBTC for Image Compression using Block Classification and Interpolation

Enhanced AMBTC for Image Compression using Block Classification and Interpolation Internatonal Journal of Computer Applcatons (0975 8887) Volume 5 No.0, August 0 Enhanced AMBTC for Image Compresson usng Block Classfcaton and Interpolaton S. Vmala Dept. of Comp. Scence Mother Teresa

More information

Pattern Recognition 43 (2010) Contents lists available at ScienceDirect. Pattern Recognition. journal homepage:

Pattern Recognition 43 (2010) Contents lists available at ScienceDirect. Pattern Recognition. journal homepage: Pattern Recognton 43 (2010) 397 -- 404 Contents lsts avalable at ScenceDrect Pattern Recognton ournal homepage: www.elsever.com/locate/pr Secret mage sharng based on cellular automata and steganography

More information

Identify the Attack in Embedded Image with Steganalysis Detection Method by PSNR and RGB Intensity

Identify the Attack in Embedded Image with Steganalysis Detection Method by PSNR and RGB Intensity Internatonal Journal of Computer Systems (ISSN: 394-1065), Volume 03 Issue 07, July, 016 Avalable at http://www.jcsonlne.com/ Identfy the Attack n Embedded Image wth Steganalyss Detecton Method by PSNR

More information

A Lossless Watermarking Scheme for Halftone Image Authentication

A Lossless Watermarking Scheme for Halftone Image Authentication IJCSNS Internatonal Journal of Computer Scence and Network Securty, VOL.6 No.2B, February 2006 147 A Lossless Watermarkng Scheme for Halftone Image Authentcaton Jeng-Shyang Pan, Hao Luo, and Zhe-Mng Lu,

More information

An Image Fusion Approach Based on Segmentation Region

An Image Fusion Approach Based on Segmentation Region Rong Wang, L-Qun Gao, Shu Yang, Yu-Hua Cha, and Yan-Chun Lu An Image Fuson Approach Based On Segmentaton Regon An Image Fuson Approach Based on Segmentaton Regon Rong Wang, L-Qun Gao, Shu Yang 3, Yu-Hua

More information

Key-Selective Patchwork Method for Audio Watermarking

Key-Selective Patchwork Method for Audio Watermarking Internatonal Journal of Dgtal Content Technology and ts Applcatons Volume 4, Number 4, July 2010 Key-Selectve Patchwork Method for Audo Watermarkng 1 Ch-Man Pun, 2 Jng-Jng Jang 1, Frst and Correspondng

More information

Steganography System using Slantlet Transform

Steganography System using Slantlet Transform ISSN:43-6999 Journal of Inmaton Communcaton and Intellgence Systems (JICIS) Volume Issue February 06 Steganography System usng Slantlet Transm Ryadh Bassl Abduljabbar Abstract An approach hdng nmaton has

More information

Specifications in 2001

Specifications in 2001 Specfcatons n 200 MISTY (updated : May 3, 2002) September 27, 200 Mtsubsh Electrc Corporaton Block Cpher Algorthm MISTY Ths document shows a complete descrpton of encrypton algorthm MISTY, whch are secret-key

More information

Performance Analysis of Data Hiding in MPEG-4 AAC Audio *

Performance Analysis of Data Hiding in MPEG-4 AAC Audio * TSINGHUA SCIENCE AND TECHNOLOGY ISSNll1007-0214ll07/21llpp55-61 Volume 14, Number 1, February 2009 Performance Analyss of Data Hdng n MPEG-4 AAC Audo * XU Shuzheng ( ) **, ZHANG Peng ( ), WANG Pengjun

More information

Distortion Function Designing for JPEG Steganography with Uncompressed Side-image

Distortion Function Designing for JPEG Steganography with Uncompressed Side-image Dstorton Functon Desgnng for JPEG Steganography wth Uncompressed Sde-mage Fangjun Huang School of Informaton Scence and Technology, Sun Yat-Sen Unversty, GD 56, Chna huangfj@mal.sysu.edu.cn Jwu Huang School

More information

Semi-Fragile Watermarking Scheme for Authentication of JPEG Images

Semi-Fragile Watermarking Scheme for Authentication of JPEG Images Tamkang Journal of Scence and Engneerng, Vol. 10, No 1, pp. 5766 (2007) 57 Sem-Fragle Watermarkng Scheme for Authentcaton of JPEG Images Chh-Hung n 1 *, Tung-Shh Su 2 and Wen-Shyong Hseh 2,3 1 Department

More information

Research of Multiple Text Watermarks Technique in Electric Power System Texts

Research of Multiple Text Watermarks Technique in Electric Power System Texts Sensors & Transducers 203 by IFSA http://www.sensorsportal.com Research of Multple Text atermarks Technque n Electrc Power System Texts Xao-X XING, Qng CHEN, 2 Lan-X FU School of Optcal-Electrcal and Computer

More information

PYTHON IMPLEMENTATION OF VISUAL SECRET SHARING SCHEMES

PYTHON IMPLEMENTATION OF VISUAL SECRET SHARING SCHEMES PYTHON IMPLEMENTATION OF VISUAL SECRET SHARING SCHEMES Ruxandra Olmd Faculty of Mathematcs and Computer Scence, Unversty of Bucharest Emal: ruxandra.olmd@fm.unbuc.ro Abstract Vsual secret sharng schemes

More information

Related-Mode Attacks on CTR Encryption Mode

Related-Mode Attacks on CTR Encryption Mode Internatonal Journal of Network Securty, Vol.4, No.3, PP.282 287, May 2007 282 Related-Mode Attacks on CTR Encrypton Mode Dayn Wang, Dongda Ln, and Wenlng Wu (Correspondng author: Dayn Wang) Key Laboratory

More information

Research Article Improved Encrypted-Signals-Based Reversible Data Hiding Using Code Division Multiplexing and Value Expansion

Research Article Improved Encrypted-Signals-Based Reversible Data Hiding Using Code Division Multiplexing and Value Expansion Securty and Communcaton Networks Volume 2018, Artcle ID 1326235, 9 pages https://do.org/10.1155/2018/1326235 Research Artcle Improved Encrypted-Sgnals-Based Reversble Data Hdng Usng Code Dvson Multplexng

More information

A Fast Visual Tracking Algorithm Based on Circle Pixels Matching

A Fast Visual Tracking Algorithm Based on Circle Pixels Matching A Fast Vsual Trackng Algorthm Based on Crcle Pxels Matchng Zhqang Hou hou_zhq@sohu.com Chongzhao Han czhan@mal.xjtu.edu.cn Ln Zheng Abstract: A fast vsual trackng algorthm based on crcle pxels matchng

More information

Term Weighting Classification System Using the Chi-square Statistic for the Classification Subtask at NTCIR-6 Patent Retrieval Task

Term Weighting Classification System Using the Chi-square Statistic for the Classification Subtask at NTCIR-6 Patent Retrieval Task Proceedngs of NTCIR-6 Workshop Meetng, May 15-18, 2007, Tokyo, Japan Term Weghtng Classfcaton System Usng the Ch-square Statstc for the Classfcaton Subtask at NTCIR-6 Patent Retreval Task Kotaro Hashmoto

More information

An Efficient Chaos-Based Feedback Stream cipher (ECBFSC) for Image Cryptosystems

An Efficient Chaos-Based Feedback Stream cipher (ECBFSC) for Image Cryptosystems An Effcent Chaos-Based Feedback Stream cpher (ECBFSC) for Image Cryptosystems Hossam El-dn H. Ahmed, Hamdy M. Kalash, and Osama S. Farag Allah Abstract. The chaos based cryptographc algorthms have suggested

More information

Detection of an Object by using Principal Component Analysis

Detection of an Object by using Principal Component Analysis Detecton of an Object by usng Prncpal Component Analyss 1. G. Nagaven, 2. Dr. T. Sreenvasulu Reddy 1. M.Tech, Department of EEE, SVUCE, Trupath, Inda. 2. Assoc. Professor, Department of ECE, SVUCE, Trupath,

More information

Reducing Frame Rate for Object Tracking

Reducing Frame Rate for Object Tracking Reducng Frame Rate for Object Trackng Pavel Korshunov 1 and We Tsang Oo 2 1 Natonal Unversty of Sngapore, Sngapore 11977, pavelkor@comp.nus.edu.sg 2 Natonal Unversty of Sngapore, Sngapore 11977, oowt@comp.nus.edu.sg

More information

A Modified Median Filter for the Removal of Impulse Noise Based on the Support Vector Machines

A Modified Median Filter for the Removal of Impulse Noise Based on the Support Vector Machines A Modfed Medan Flter for the Removal of Impulse Nose Based on the Support Vector Machnes H. GOMEZ-MORENO, S. MALDONADO-BASCON, F. LOPEZ-FERRERAS, M. UTRILLA- MANSO AND P. GIL-JIMENEZ Departamento de Teoría

More information

Steps for Computing the Dissimilarity, Entropy, Herfindahl-Hirschman and. Accessibility (Gravity with Competition) Indices

Steps for Computing the Dissimilarity, Entropy, Herfindahl-Hirschman and. Accessibility (Gravity with Competition) Indices Steps for Computng the Dssmlarty, Entropy, Herfndahl-Hrschman and Accessblty (Gravty wth Competton) Indces I. Dssmlarty Index Measurement: The followng formula can be used to measure the evenness between

More information

Meta-heuristics for Multidimensional Knapsack Problems

Meta-heuristics for Multidimensional Knapsack Problems 2012 4th Internatonal Conference on Computer Research and Development IPCSIT vol.39 (2012) (2012) IACSIT Press, Sngapore Meta-heurstcs for Multdmensonal Knapsack Problems Zhbao Man + Computer Scence Department,

More information

Security Vulnerabilities of an Enhanced Remote User Authentication Scheme

Security Vulnerabilities of an Enhanced Remote User Authentication Scheme Contemporary Engneerng Scences, Vol. 7, 2014, no. 26, 1475-1482 HIKARI Ltd, www.m-hkar.com http://dx.do.org/10.12988/ces.2014.49186 Securty Vulnerabltes of an Enhanced Remote User Authentcaton Scheme Hae-Soon

More information

Statistical Steganalyis of Images Using Open Source Software

Statistical Steganalyis of Images Using Open Source Software Statstcal Steganalys of Images Usng Open Source Software Bhargav Kapa, Stefan A. Robla Department of Computer Scence Montclar State Unversty Montclar, NJ 07043 roblas@mal.montclar.edu Abstract In ths paper

More information

High-Boost Mesh Filtering for 3-D Shape Enhancement

High-Boost Mesh Filtering for 3-D Shape Enhancement Hgh-Boost Mesh Flterng for 3-D Shape Enhancement Hrokazu Yagou Λ Alexander Belyaev y Damng We z Λ y z ; ; Shape Modelng Laboratory, Unversty of Azu, Azu-Wakamatsu 965-8580 Japan y Computer Graphcs Group,

More information

FEATURE EXTRACTION. Dr. K.Vijayarekha. Associate Dean School of Electrical and Electronics Engineering SASTRA University, Thanjavur

FEATURE EXTRACTION. Dr. K.Vijayarekha. Associate Dean School of Electrical and Electronics Engineering SASTRA University, Thanjavur FEATURE EXTRACTION Dr. K.Vjayarekha Assocate Dean School of Electrcal and Electroncs Engneerng SASTRA Unversty, Thanjavur613 41 Jont Intatve of IITs and IISc Funded by MHRD Page 1 of 8 Table of Contents

More information

Load Balancing for Hex-Cell Interconnection Network

Load Balancing for Hex-Cell Interconnection Network Int. J. Communcatons, Network and System Scences,,, - Publshed Onlne Aprl n ScRes. http://www.scrp.org/journal/jcns http://dx.do.org/./jcns.. Load Balancng for Hex-Cell Interconnecton Network Saher Manaseer,

More information

TN348: Openlab Module - Colocalization

TN348: Openlab Module - Colocalization TN348: Openlab Module - Colocalzaton Topc The Colocalzaton module provdes the faclty to vsualze and quantfy colocalzaton between pars of mages. The Colocalzaton wndow contans a prevew of the two mages

More information

Subspace clustering. Clustering. Fundamental to all clustering techniques is the choice of distance measure between data points;

Subspace clustering. Clustering. Fundamental to all clustering techniques is the choice of distance measure between data points; Subspace clusterng Clusterng Fundamental to all clusterng technques s the choce of dstance measure between data ponts; D q ( ) ( ) 2 x x = x x, j k = 1 k jk Squared Eucldean dstance Assumpton: All features

More information

Information Hiding Watermarking Detection Technique by PSNR and RGB Intensity

Information Hiding Watermarking Detection Technique by PSNR and RGB Intensity www..org 3 Informaton Hdng Watermarkng Detecton Technque by PSNR and RGB Intensty 1 Neha Chauhan, Akhlesh A. Waoo, 3 P. S. Patheja 1 Research Scholar, BIST, Bhopal, Inda.,3 Assstant Professor, BIST, Bhopal,

More information

A new remote user authentication scheme for multi-server architecture

A new remote user authentication scheme for multi-server architecture Future Generaton Computer Systems 19 (2003) 13 22 A new remote user authentcaton scheme for mult-server archtecture Iuon-Chang Ln a, Mn-Shang Hwang b,, L-Hua L b a Department of Computer Scence and Informaton

More information

Research Article High Capacity Reversible Watermarking for Audio by Histogram Shifting and Predicted Error Expansion

Research Article High Capacity Reversible Watermarking for Audio by Histogram Shifting and Predicted Error Expansion e Scentfc World Journal, Artcle ID 656251, 7 pages http://dx.do.org/1.1155/214/656251 Research Artcle Hgh Capacty Reversble Watermarkng for Audo by Hstogram Shftng and Predcted Error Expanson Fe Wang,

More information

Algorithm for Human Skin Detection Using Fuzzy Logic

Algorithm for Human Skin Detection Using Fuzzy Logic Algorthm for Human Skn Detecton Usng Fuzzy Logc Mrtunjay Ra, R. K. Yadav, Gaurav Snha Department of Electroncs & Communcaton Engneerng JRE Group of Insttutons, Greater Noda, Inda er.mrtunjayra@gmal.com

More information

Simulation Based Analysis of FAST TCP using OMNET++

Simulation Based Analysis of FAST TCP using OMNET++ Smulaton Based Analyss of FAST TCP usng OMNET++ Umar ul Hassan 04030038@lums.edu.pk Md Term Report CS678 Topcs n Internet Research Sprng, 2006 Introducton Internet traffc s doublng roughly every 3 months

More information

Edge Detection in Noisy Images Using the Support Vector Machines

Edge Detection in Noisy Images Using the Support Vector Machines Edge Detecton n Nosy Images Usng the Support Vector Machnes Hlaro Gómez-Moreno, Saturnno Maldonado-Bascón, Francsco López-Ferreras Sgnal Theory and Communcatons Department. Unversty of Alcalá Crta. Madrd-Barcelona

More information

A NEW AUDIO WATERMARKING METHOD BASED

A NEW AUDIO WATERMARKING METHOD BASED A NEW AUDIO WATERMARKING METHOD BASED ON DISCRETE COSINE TRANSFORM WITH A GRAY IMAGE Mohammad Ibrahm Khan 1, Md. Iqbal Hasan Sarker 2, Kaushk Deb 3 and Md. Hasan Furhad 4 1,2,3 Department of Computer Scence

More information

Detecting MP3Stego using Calibrated Side Information Features

Detecting MP3Stego using Calibrated Side Information Features 2628 JOURNAL OF SOFTWARE, VOL. 8, NO. 10, OCTOBER 2013 Detectng P3Stego usng Calbrated Sde Informaton Features Xanmn Yu School of Informaton Scence and Engneerng, Nngbo Unversty Emal: mlhappy1016@163.com

More information

Fuzzy Filtering Algorithms for Image Processing: Performance Evaluation of Various Approaches

Fuzzy Filtering Algorithms for Image Processing: Performance Evaluation of Various Approaches Proceedngs of the Internatonal Conference on Cognton and Recognton Fuzzy Flterng Algorthms for Image Processng: Performance Evaluaton of Varous Approaches Rajoo Pandey and Umesh Ghanekar Department of

More information

An Optimal Algorithm for Prufer Codes *

An Optimal Algorithm for Prufer Codes * J. Software Engneerng & Applcatons, 2009, 2: 111-115 do:10.4236/jsea.2009.22016 Publshed Onlne July 2009 (www.scrp.org/journal/jsea) An Optmal Algorthm for Prufer Codes * Xaodong Wang 1, 2, Le Wang 3,

More information

Digital Video Watermarking using Discrete Wavelet Transform and Principal Component Analysis

Digital Video Watermarking using Discrete Wavelet Transform and Principal Component Analysis Internatonal Journal of Wsdom Based Computng, Vol. 1 (2), August 2011 7 Dgtal Vdeo Watermarkng usng Dscrete Wavelet Transform and Prncpal Component Analyss Sanjana Snha, Prajnat Bardhan, Swarnal Pramanck,

More information

An Iterative Solution Approach to Process Plant Layout using Mixed Integer Optimisation

An Iterative Solution Approach to Process Plant Layout using Mixed Integer Optimisation 17 th European Symposum on Computer Aded Process Engneerng ESCAPE17 V. Plesu and P.S. Agach (Edtors) 2007 Elsever B.V. All rghts reserved. 1 An Iteratve Soluton Approach to Process Plant Layout usng Mxed

More information

CHAPTER 3 ENCODING VIDEO SEQUENCES IN FRACTAL BASED COMPRESSION. Day by day, the demands for higher and faster technologies are rapidly

CHAPTER 3 ENCODING VIDEO SEQUENCES IN FRACTAL BASED COMPRESSION. Day by day, the demands for higher and faster technologies are rapidly 65 CHAPTER 3 ENCODING VIDEO SEQUENCES IN FRACTAL BASED COMPRESSION 3.1 Introducton Day by day, the demands for hgher and faster technologes are rapdly ncreasng. Although the technologes avalable now are

More information

Robust Watermarking for Text Images Based on Arnold Scrambling and DWT-DCT

Robust Watermarking for Text Images Based on Arnold Scrambling and DWT-DCT Internatonal Conference on Mechatroncs Electronc Industral and Control Engneerng (MEIC 015) Robust Watermarkng for Text Images Based on Arnold Scramblng and DWT-DCT Fan Wu College of Informaton Scence

More information

Skew Angle Estimation and Correction of Hand Written, Textual and Large areas of Non-Textual Document Images: A Novel Approach

Skew Angle Estimation and Correction of Hand Written, Textual and Large areas of Non-Textual Document Images: A Novel Approach Angle Estmaton and Correcton of Hand Wrtten, Textual and Large areas of Non-Textual Document Images: A Novel Approach D.R.Ramesh Babu Pyush M Kumat Mahesh D Dhannawat PES Insttute of Technology Research

More information

R s s f. m y s. SPH3UW Unit 7.3 Spherical Concave Mirrors Page 1 of 12. Notes

R s s f. m y s. SPH3UW Unit 7.3 Spherical Concave Mirrors Page 1 of 12. Notes SPH3UW Unt 7.3 Sphercal Concave Mrrors Page 1 of 1 Notes Physcs Tool box Concave Mrror If the reflectng surface takes place on the nner surface of the sphercal shape so that the centre of the mrror bulges

More information

A New Feature of Uniformity of Image Texture Directions Coinciding with the Human Eyes Perception 1

A New Feature of Uniformity of Image Texture Directions Coinciding with the Human Eyes Perception 1 A New Feature of Unformty of Image Texture Drectons Concdng wth the Human Eyes Percepton Xng-Jan He, De-Shuang Huang, Yue Zhang, Tat-Mng Lo 2, and Mchael R. Lyu 3 Intellgent Computng Lab, Insttute of Intellgent

More information

A FIBONACCI LSB DATA HIDING TECNIQUE

A FIBONACCI LSB DATA HIDING TECNIQUE A FIBONACCI LSB DATA HIDING TECNIQUE Dego De Luca Pcone (*)(**), Federca Battst (*)(**), Marco Carl (*), Jaakko Astola (**), and Karen Egazaran (**) (*) AE Department, Unverst of Roma TRE, Rome, Ital,

More information

Fuzzy C-Means Initialized by Fixed Threshold Clustering for Improving Image Retrieval

Fuzzy C-Means Initialized by Fixed Threshold Clustering for Improving Image Retrieval Fuzzy -Means Intalzed by Fxed Threshold lusterng for Improvng Image Retreval NAWARA HANSIRI, SIRIPORN SUPRATID,HOM KIMPAN 3 Faculty of Informaton Technology Rangst Unversty Muang-Ake, Paholyotn Road, Patumtan,

More information

Classifier Selection Based on Data Complexity Measures *

Classifier Selection Based on Data Complexity Measures * Classfer Selecton Based on Data Complexty Measures * Edth Hernández-Reyes, J.A. Carrasco-Ochoa, and J.Fco. Martínez-Trndad Natonal Insttute for Astrophyscs, Optcs and Electroncs, Lus Enrque Erro No.1 Sta.

More information

A fast algorithm for color image segmentation

A fast algorithm for color image segmentation Unersty of Wollongong Research Onlne Faculty of Informatcs - Papers (Arche) Faculty of Engneerng and Informaton Scences 006 A fast algorthm for color mage segmentaton L. Dong Unersty of Wollongong, lju@uow.edu.au

More information

Improved H.264 Rate Control by Enhanced MAD-Based Frame Complexity Prediction

Improved H.264 Rate Control by Enhanced MAD-Based Frame Complexity Prediction Journal of Vsual Communcaton and Image Representaton (Specal Issue on Emergng H.64/AVC Vdeo Codng Standard), Elsever Scence, May 005 Improved H.64 Rate Control by Enhanced -Based Frame Complexty Predcton

More information

2x x l. Module 3: Element Properties Lecture 4: Lagrange and Serendipity Elements

2x x l. Module 3: Element Properties Lecture 4: Lagrange and Serendipity Elements Module 3: Element Propertes Lecture : Lagrange and Serendpty Elements 5 In last lecture note, the nterpolaton functons are derved on the bass of assumed polynomal from Pascal s trangle for the fled varable.

More information

Private Information Retrieval (PIR)

Private Information Retrieval (PIR) 2 Levente Buttyán Problem formulaton Alce wants to obtan nformaton from a database, but she does not want the database to learn whch nformaton she wanted e.g., Alce s an nvestor queryng a stock-market

More information

Evaluation of an Enhanced Scheme for High-level Nested Network Mobility

Evaluation of an Enhanced Scheme for High-level Nested Network Mobility IJCSNS Internatonal Journal of Computer Scence and Network Securty, VOL.15 No.10, October 2015 1 Evaluaton of an Enhanced Scheme for Hgh-level Nested Network Moblty Mohammed Babker Al Mohammed, Asha Hassan.

More information

Parallel Inverse Halftoning by Look-Up Table (LUT) Partitioning

Parallel Inverse Halftoning by Look-Up Table (LUT) Partitioning Parallel Inverse Halftonng by Look-Up Table (LUT) Parttonng Umar F. Sddq and Sadq M. Sat umar@ccse.kfupm.edu.sa, sadq@kfupm.edu.sa KFUPM Box: Department of Computer Engneerng, Kng Fahd Unversty of Petroleum

More information

A Comparison between Digital Images Watermarking in Tow Different Color Spaces Using DWT2*

A Comparison between Digital Images Watermarking in Tow Different Color Spaces Using DWT2* A Comparson between Dgtal s ng n Tow Dfferent Color Spaces Usng DWT* Mehd Khall Natonal Academy of Scence of Armena Yerevan, Armena e-mal: khall.mehd@yahoo.com ABSTRACT A novel dgtal watermarkng for ownershp

More information

Mathematics 256 a course in differential equations for engineering students

Mathematics 256 a course in differential equations for engineering students Mathematcs 56 a course n dfferental equatons for engneerng students Chapter 5. More effcent methods of numercal soluton Euler s method s qute neffcent. Because the error s essentally proportonal to the

More information

Learning the Kernel Parameters in Kernel Minimum Distance Classifier

Learning the Kernel Parameters in Kernel Minimum Distance Classifier Learnng the Kernel Parameters n Kernel Mnmum Dstance Classfer Daoqang Zhang 1,, Songcan Chen and Zh-Hua Zhou 1* 1 Natonal Laboratory for Novel Software Technology Nanjng Unversty, Nanjng 193, Chna Department

More information

TECHNICAL POINTS ABOUT ADAPTIVE STEGANOGRAPHY BY ORACLE (ASO) 161, rue Ada, 34095, Montpellier Cedex 05, France

TECHNICAL POINTS ABOUT ADAPTIVE STEGANOGRAPHY BY ORACLE (ASO) 161, rue Ada, 34095, Montpellier Cedex 05, France 20th European Sgnal Processng Conference (EUSIPCO 2012) Bucharest, Romana, August 27-31, 2012 TECHNICAL POINTS ABOUT ADAPTIVE STEGANOGRAPHY BY ORACLE (ASO) Sarra Kouder 2, Marc Chaumont 1,2, Wllam Puech

More information

y and the total sum of

y and the total sum of Lnear regresson Testng for non-lnearty In analytcal chemstry, lnear regresson s commonly used n the constructon of calbraton functons requred for analytcal technques such as gas chromatography, atomc absorpton

More information

Object-Based Techniques for Image Retrieval

Object-Based Techniques for Image Retrieval 54 Zhang, Gao, & Luo Chapter VII Object-Based Technques for Image Retreval Y. J. Zhang, Tsnghua Unversty, Chna Y. Y. Gao, Tsnghua Unversty, Chna Y. Luo, Tsnghua Unversty, Chna ABSTRACT To overcome the

More information

Available online at Available online at Advanced in Control Engineering and Information Science

Available online at   Available online at   Advanced in Control Engineering and Information Science Avalable onlne at wwwscencedrectcom Avalable onlne at wwwscencedrectcom Proceda Proceda Engneerng Engneerng 00 (2011) 15000 000 (2011) 1642 1646 Proceda Engneerng wwwelsevercom/locate/proceda Advanced

More information

A Fusion Steganographic Algorithm Based on Faster R-CNN

A Fusion Steganographic Algorithm Based on Faster R-CNN Copyrght 2018 Tech Scence Press CMC, vol.55, no.1, pp.1-16, 2018 A Fuson Steganographc Algorthm Based on Faster R-CNN Ruohan Meng 1, 2, Steven G. Rce 3, Jn Wang 4 1, 2, * and Xngmng Sun Abstract: The am

More information

TRLE An Efficient Data Compression Scheme for Image Composition of Parallel Volume Rendering Systems

TRLE An Efficient Data Compression Scheme for Image Composition of Parallel Volume Rendering Systems TRLE An Effcent Data Compresson Scheme for Image Composton of Parallel Volume Renderng Systems Chn-Feng Ln, Yeh-Chng Chung, and Don-Ln Yang Department of Informaton Engneerng Feng Cha Unversty, Tachung,

More information

An Accurate Evaluation of Integrals in Convex and Non convex Polygonal Domain by Twelve Node Quadrilateral Finite Element Method

An Accurate Evaluation of Integrals in Convex and Non convex Polygonal Domain by Twelve Node Quadrilateral Finite Element Method Internatonal Journal of Computatonal and Appled Mathematcs. ISSN 89-4966 Volume, Number (07), pp. 33-4 Research Inda Publcatons http://www.rpublcaton.com An Accurate Evaluaton of Integrals n Convex and

More information

An Efficient Garbage Collection for Flash Memory-Based Virtual Memory Systems

An Efficient Garbage Collection for Flash Memory-Based Virtual Memory Systems S. J and D. Shn: An Effcent Garbage Collecton for Flash Memory-Based Vrtual Memory Systems 2355 An Effcent Garbage Collecton for Flash Memory-Based Vrtual Memory Systems Seunggu J and Dongkun Shn, Member,

More information

Local Tri-directional Weber Rhombus Co-occurrence Pattern: A New Texture Descriptor for Brodatz Texture Image Retrieval

Local Tri-directional Weber Rhombus Co-occurrence Pattern: A New Texture Descriptor for Brodatz Texture Image Retrieval ISS: 2278 323 Internatonal Journal of Advanced Research n Computer Engneerng & Technology (IJARCET) Local Tr-drectonal Weber Rhombus Co-occurrence Pattern: A ew Texture Descrptor for Brodatz Texture Image

More information

Robust Video Watermarking Using Image Normalization, Motion Vector and Perceptual Information

Robust Video Watermarking Using Image Normalization, Motion Vector and Perceptual Information Robust Vdeo Watermarkng Usng Image ormalzaton, Moton Vector and Perceptual Informaton Cedllo-Hernández Antono 1, Cedllo-Hernández Manuel 1, akano-myatake Marko 1, García-Vázquez Mreya S. 2 1 Postgraduate

More information

Tsinghua University at TAC 2009: Summarizing Multi-documents by Information Distance

Tsinghua University at TAC 2009: Summarizing Multi-documents by Information Distance Tsnghua Unversty at TAC 2009: Summarzng Mult-documents by Informaton Dstance Chong Long, Mnle Huang, Xaoyan Zhu State Key Laboratory of Intellgent Technology and Systems, Tsnghua Natonal Laboratory for

More information

Robust Blind Video Watermark Algorithm in Transform Domain Combining with 3D Video Correlation

Robust Blind Video Watermark Algorithm in Transform Domain Combining with 3D Video Correlation JOURNAL OF MULTIMEDIA, VOL. 8, NO. 2, APRIL 2013 161 Robust Blnd Vdeo Watermark Algorthm n Transform Doman Combnng wth 3D Vdeo Correlaton DING Ha-yang 1,3 1. Informaton Securty Center, Bejng Unversty of

More information

Research and Application of Fingerprint Recognition Based on MATLAB

Research and Application of Fingerprint Recognition Based on MATLAB Send Orders for Reprnts to reprnts@benthamscence.ae The Open Automaton and Control Systems Journal, 205, 7, 07-07 Open Access Research and Applcaton of Fngerprnt Recognton Based on MATLAB Nng Lu* Department

More information

Analysis of Continuous Beams in General

Analysis of Continuous Beams in General Analyss of Contnuous Beams n General Contnuous beams consdered here are prsmatc, rgdly connected to each beam segment and supported at varous ponts along the beam. onts are selected at ponts of support,

More information

Mallathahally, Bangalore, India 1 2

Mallathahally, Bangalore, India 1 2 7 IMPLEMENTATION OF HIGH PERFORMANCE BINARY SQUARER PRADEEP M C, RAMESH S, Department of Electroncs and Communcaton Engneerng, Dr. Ambedkar Insttute of Technology, Mallathahally, Bangalore, Inda pradeepmc@gmal.com,

More information

Shape Representation Robust to the Sketching Order Using Distance Map and Direction Histogram

Shape Representation Robust to the Sketching Order Using Distance Map and Direction Histogram Shape Representaton Robust to the Sketchng Order Usng Dstance Map and Drecton Hstogram Department of Computer Scence Yonse Unversty Kwon Yun CONTENTS Revew Topc Proposed Method System Overvew Sketch Normalzaton

More information

A CLASS OF TRANSFORMED EFFICIENT RATIO ESTIMATORS OF FINITE POPULATION MEAN. Department of Statistics, Islamia College, Peshawar, Pakistan 2

A CLASS OF TRANSFORMED EFFICIENT RATIO ESTIMATORS OF FINITE POPULATION MEAN. Department of Statistics, Islamia College, Peshawar, Pakistan 2 Pa. J. Statst. 5 Vol. 3(4), 353-36 A CLASS OF TRANSFORMED EFFICIENT RATIO ESTIMATORS OF FINITE POPULATION MEAN Sajjad Ahmad Khan, Hameed Al, Sadaf Manzoor and Alamgr Department of Statstcs, Islama College,

More information

Grading Image Retrieval Based on DCT and DWT Compressed Domains Using Low-Level Features

Grading Image Retrieval Based on DCT and DWT Compressed Domains Using Low-Level Features Journal of Communcatons Vol. 0 No. January 0 Gradng Image Retreval Based on DCT and DWT Compressed Domans Usng Low-Level Features Chengyou Wang Xnyue Zhang Rongyang Shan and Xao Zhou School of echancal

More information

A mathematical programming approach to the analysis, design and scheduling of offshore oilfields

A mathematical programming approach to the analysis, design and scheduling of offshore oilfields 17 th European Symposum on Computer Aded Process Engneerng ESCAPE17 V. Plesu and P.S. Agach (Edtors) 2007 Elsever B.V. All rghts reserved. 1 A mathematcal programmng approach to the analyss, desgn and

More information

FRACTAL COMPRESSION TECHNIQUE FOR COLOR IMAGES USING VARIABLE BLOCK

FRACTAL COMPRESSION TECHNIQUE FOR COLOR IMAGES USING VARIABLE BLOCK ISSN: 0976-910 (ONLINE) ICTACT JOURNAL ON IMAGE AND VIDEO PROCESSING, NOVEMBER 017, VOLUME: 08, ISSUE: 0 DOI: 10.1917/jvp.017.030 FRACTAL COMPRESSION TECHNIQUE FOR COLOR IMAGES USING VARIABLE BLOCK Nsar

More information

Array transposition in CUDA shared memory

Array transposition in CUDA shared memory Array transposton n CUDA shared memory Mke Gles February 19, 2014 Abstract Ths short note s nspred by some code wrtten by Jeremy Appleyard for the transposton of data through shared memory. I had some

More information

Using Fuzzy Logic to Enhance the Large Size Remote Sensing Images

Using Fuzzy Logic to Enhance the Large Size Remote Sensing Images Internatonal Journal of Informaton and Electroncs Engneerng Vol. 5 No. 6 November 015 Usng Fuzzy Logc to Enhance the Large Sze Remote Sensng Images Trung Nguyen Tu Huy Ngo Hoang and Thoa Vu Van Abstract

More information

KEYWORDS: Digital Image Watermarking, Discrete Wavelet Transform, General Regression Neural Network, Human Visual System. 1.

KEYWORDS: Digital Image Watermarking, Discrete Wavelet Transform, General Regression Neural Network, Human Visual System. 1. An Adaptve Dgtal Image Watermarkng Based on Image Features n Dscrete Wavelet Transform Doman and General Regresson Neural Network Ayoub Taher Group of IT Engneerng, Payam Noor Unversty, Broujen, Iran ABSTRACT:

More information

Non-Split Restrained Dominating Set of an Interval Graph Using an Algorithm

Non-Split Restrained Dominating Set of an Interval Graph Using an Algorithm Internatonal Journal of Advancements n Research & Technology, Volume, Issue, July- ISS - on-splt Restraned Domnatng Set of an Interval Graph Usng an Algorthm ABSTRACT Dr.A.Sudhakaraah *, E. Gnana Deepka,

More information

User Authentication Based On Behavioral Mouse Dynamics Biometrics

User Authentication Based On Behavioral Mouse Dynamics Biometrics User Authentcaton Based On Behavoral Mouse Dynamcs Bometrcs Chee-Hyung Yoon Danel Donghyun Km Department of Computer Scence Department of Computer Scence Stanford Unversty Stanford Unversty Stanford, CA

More information

The Research of Ellipse Parameter Fitting Algorithm of Ultrasonic Imaging Logging in the Casing Hole

The Research of Ellipse Parameter Fitting Algorithm of Ultrasonic Imaging Logging in the Casing Hole Appled Mathematcs, 04, 5, 37-3 Publshed Onlne May 04 n ScRes. http://www.scrp.org/journal/am http://dx.do.org/0.436/am.04.584 The Research of Ellpse Parameter Fttng Algorthm of Ultrasonc Imagng Loggng

More information