Research Article Hamming Code Based Watermarking Scheme for 3D Model Verification

Size: px
Start display at page:

Download "Research Article Hamming Code Based Watermarking Scheme for 3D Model Verification"

Transcription

1 Mathematcal Problems n Engneerng, Artcle ID , 7 pages Research Artcle Hammng Code Based Watermarkng Scheme for 3D Model Verfcaton Jen-Tse Wang, 1 Y-Chng Chang, 2 Chun-Yuan Yu, 2,3 and Shyr-Shen Yu 2 1 Department of Informaton Management, Hsupng Unversty of Scence and Technology, 11 Gongye Road, Dal Dstrct, Tachung Cty 412, Tawan 2 Department of Computer Scence and Engneerng, Natonal Chung-Hsng Unversty, 250 Kuo-Kuang Road,Tachung 402, Tawan 3 Department of Dgtal Lvng Innovaton, Nan Ka Unversty of Technology, 568 Chung-Cheng Road, TsaoTun 542, Nantou County, Tawan Correspondence should be addressed to Shyr-Shen Yu; pyu@nchu.edu.tw Receved 25 February 2014; Accepted 13 Aprl 2014; Publshed 30 Aprl 2014 Academc Edtor: Her-Terng Yau Copyrght 2014 Jen-Tse Wang et al. Ths s an open access artcle dstrbuted under the Creatve Commons Attrbuton Lcense, whch permts unrestrcted use, dstrbuton, and reproducton n any medum, provded the orgnal work s properly cted. Due to the explosve growth of the Internet and maturng of 3D hardware technques, protectng 3D objects becomes a more and more mportant ssue. In ths paper, a publc hammng code based fragle watermarkng technque s proposed for 3D objects verfcaton. An adaptve watermark s generated from each cover model by usng the hammng code technque. A smple least sgnfcant bt (LSB) substtuton technque s employed for watermark embeddng. In the extracton stage, the hammng code based watermark can be verfed by usng the hammng code checkng wthout embeddng any verfcaton nformaton. Expermental results shows that 100% vertces of the cover model can be watermarked, extracted, and verfed. It also shows that the proposed method can mprove securty and acheve low dstorton of stego object. 1. Introducton The dgtal era already came to our lves thanks to the nterestngly sophstcated hardware and software technologes. Especally the nternet, t made our lfe more convenent and even changed our lfestyles. Tradtonal publshers, for nstance, gradually translated the products to onlnedgtalzed stores. Ths allowed any wrter s work to be searchedanddscoveredoncetheyuploadthemtothese onlne stores by publshers. Besdes ths, varous multmeda, bothaudoandvsual,alsotakepartnthsdgtalera. But everythng has ts pros and cons. Whle the nternet does make our lves easer, t also presents a rsk towards the copyrght or other personal nformaton. All of these lead to praces, tamperng, and stealng of data. In order to fx these leaks and mprove the data s securty, many experts and scholars endeavor n felds known as nformaton hdng research [1 6], anddgtalsgnature [7 10], dedcated tosolve these problems. Accordng to the dfference of applcaton purpose, nformaton hdng technques can be dvded nto data hdng and watermarkng. The former has another common termnology called steganography. The latter, watermarkng [11 13], s modeled to embed meanngful text or mages wth copyrght nformaton nto cover model to acheve copyrght protecton or mage authentcaton [14, 15]. Watermarkng technque [11 13] can be dvded nto vsble watermarkng and nvsble watermarkng by vsualzaton, or can be separated as blnd, semblnd, and nonblnd by extracton strateges, or can be dstngushed from specal doman [16 19] and frequency doman [19 24] by embeddng space, or can be dfferentated between robust watermarkng and fragle watermarkng accordng to applcaton purpose. The man goal of robust watermarkng s to make the embedded watermarks reman detectable after beng attacked. In contrast, the requrements of fragle watermarkng are to verfy the slghtest unauthorzed alteraton and be able to locate the changed regons. 2. Background and Related Works Among the dfferent meda types, watermarkng of 3D objects s comparatvely dffcult nherently. Intally, Ohbuch et al. [25 28] proposed a large varety of technques for embeddng

2 2 Mathematcal Problems n Engneerng data nto 3D polygonal models. In [26], Ohbuch et al. proposed a nonblnd algorthm that works n the transformaton doman. It embeds a watermark nto a 3D polygonal model by deformng the low-frequency components of the shape by usng the mesh spectral analyss. Cayre and Macq [29] descrbed a blnd data hdng scheme n the spatal doman. The key dea s to consder a trangle as a two-state geometrcal object. Each trangle that can be embedded s called an admssble trangle. In [30], Alface et al. presented a way to extend the robustness of blnd and robust 3D watermarkng schemes to the dffcult croppng attack. C.- M. Wang and P.-C. Wang [31, 32] proposeanovelscheme for dgtal steganography n the spatal doman. It employs a prncpal component analyss (PCA), resultng n a blnd approach. Kana et al. [33] were the frst to apply a transform doman watermarkng approach on 3D polygonal model. It s a nonblnd algorthm, whch frst decomposes an orgnal polygonal model by applyng wavelet transform several tmes. Ths algorthm embeds the watermarks nto the wavelet coeffcentvectorsandtsrobustaganstaffnetransformaton and random nose attacks. The exstng fragle watermarkng algorthms that are desgned for 3D models are relatvely few. In fragle watermarkng, the embedded watermark wll be modfed when the stego object s altered. Therefore, the fragle watermark canbeusedtoverfyastegoobject.yeoandyeung[19]frstly proposed a fragle watermarkng algorthm for authentcatng 3D polygonal meshes. Two ndces were calculated for every vertex: the locaton ndex and the value ndex. Accordng to the coordnates of t and ts neghborng vertces, the locaton ndex was calculated by a hash functon and the value ndex s calculated by another hash functon for each vertex. Then they slghtly perturbed every vertex to make these two hash functons equal. Ther scheme s both blnd and fragle, but there arse two problems: the causalty problem and the convergence problem. The causalty problem s that the locaton ndex of a former processed vertex wll be changed by the perturbng of later processed neghborng vertces. The convergence problem s that the user cannot control the dstorton nduced by the teratvely perturbng process. Fornaro and Sanna [17] proposed a publc key scheme to authentcatng constructve sold geometry (CSG) models whch has a serous drawback that t cannot locate the tampered regon(s). Yeo and Yeung [19] proposedtheuseof content-based sgnature to authentcate 3D volume data. Ln et al. [18] proposed a modfed fragle watermarkng scheme smlar to Yeo and Yeung s method [19]. The causalty problem s conquered n ths method by applyng two dfferent hash functons on the vertex coordnates, wthout consderng the neghborng vertces of a vertex. In the watermark embeddng stage, they slghtly perturbed every vertex makng these two hash functon values equal. However, the convergence problem stll occurs n ths scheme. To avod heavy dstorton due to vertex perturbng, they set a threshold and smply skp the vertces that could not meet the requrement under the threshold. Ths causes some embeddng holes whch cause false alarms n the watermark extracton stage. Chou and Tseng [16] proposedafraglewatermarkng scheme for authentcatng 3D mesh models. A watermark embedded by ths method s robust to translaton, rotaton, and unform scalng but s senstve to other operatons. The man dea of the method s to keep the rato between thedstancefromthemeshcentertoeachsurfacefaceand a quantzaton step remanng the same after the model s translated, rotated, or unformly scaled. There are two major drawbacks n ths scheme. Frstly, t s a sempublc watermarkng scheme snce the orgnal watermark s needed n the decodng stage to authentcate the watermarked model. But a publc watermarkng scheme s preferred n fragle watermarkng. Secondly, t fals n locatng the changed regons snce the center poston of the mesh wll be changed when any vertex has been changed. Chou and Tseng [34]proposeablndfraglewatermarkng technque whch can embed watermark nto at most half the number of total ponts. In [35], a publc fragle watermarkng scheme based on the senstvty of vertex geometry for 3D model authentcaton s proposed. In ths paper, Chou and Tseng propose a multfuncton vertex embeddng methodandanadjustng-vertexmethodtoovercomethe causalty problem and the convergence problem. The average dstorton of the marked models s under user control wth proper key value settng, and ths scheme can detect and locate all unauthorzed modfcatons. But ths scheme stll has the embeddng holes problem. In [36], the coordnates of each vertex of the cover model are transformed to sphercal coordnates. The quantzaton ndex modulaton technque s employed to embed the watermark nto the r coordnates by usng the center of gravty of the cover model. The drawback of [36] s that the reference pont would be changed f any coordnate of the model s modfed. In [37], Wang et al. proposed a multple reference pont embeddng process to overcome the drawback of [36]. In ths paper, a hammng code based fragle watermark scheme s performed on 3D polygonal meshes n spatal doman. The proposed method can provde the capablty of accurately verfyng, locatng the tampered regon to protect the ntegrty of 3D objects and there has no embeddng holes problem. The remanng sectons of ths paper are organzed as follows. The proposed hammng code based fragle watermarkng scheme s descrbed n Secton 3. Expermental results and dscusson are presented n Secton 4. Fnally, conclusons are provded n Secton Proposed Hammng Code Based Fragle Watermark Algorthm In ths paper, a hammng code based fragle watermark scheme for 3D objects s proposed n spatal doman. It s publc and fragle. The logstc map [38]s utlzed to produce the ntermngled embeddng order of vertces. There does not need embeddng any verfcaton nformaton for tamperng detecton n the proposed method. An adaptve watermark s generated from each cover model by usng the hammng code technque [39 42]. Instead of the comparson of the hash functon, the hammng code based watermark can be verfed by usng the hammng code checkng n the extracton stage.

3 Mathematcal Problems n Engneerng 3 Table 1: Relatonshp between party check bts and data bts. D 1 D 2 D 3 D 4 P 1 P 2 P 3 Cover model Embeddng Secret key Stego model Hammng code s named after Rchard Hammng and s a lnear forward error correcton code whch works by addng party check bts at the output data stream. Because of the smplcty of hammng codes, they are wdely used n computer memory RAM [42]. The most wdely used hammng code s (7, 4) hammng code, whch encodes four data bts (D 1, D 2, D 3,andD 4 ) nto seven bts by addng three party check bts (P 1, P 2,and P 3 ). Each party check bt s created by ts assocated data bts. Table 1 llustrates the relatonshp between party check btsanddatabts,where ndcates the relatonshp exsts between party check bts and assocated data bts. As shown n Table 1,thepartycheckbtscanbecreated by usng the assocated date bts, and the results are shown n Table 2,where donates an exclusve or (XOR) operaton. The hammng code detects errors by ensurng each party check bt and ts correspondng data bts acheve the even party. Ths detecton procedure s called party checkng. In mathematcal pont of vew, hammng code s a class of bnary lnear block code. Regardless the form of H and G, H and G for lnear block codes must satsfy HG T = 0, where 0 s an all-zeros matrx due to [7, 4, 3] = [n, k, q] = [2 m 1,2 m m 1,m]. There s a code wth m party bts and 2 m m 1data bts for each nteger, where m must satsfy m 2.ThepartycheckmatrxH of a hammng code s constructed by lstng all columns of length m that are parwse ndependent. Gven a generator matrx G of the code, where G s that so-called systematc form. It means that the leftmost or rghtmost k columns of G form a k kdentty matrx I k. For the detaled formulas, one s referred to [43]. In ths paper, the party check matrx H and the code generator matrx G are: H=[ ], [ ]3,7 G= [ [ ] [ ]4,7 Accordng to the descrpton above, (1) are rewrtten as follows: H=[I n k,p T ], (2) G=[P,I k ]. After calculate (3), the matrces H and G used n ths paper satsfy the theory of hammng code.. (1) HG T =[I n k,p T ][ PT I k ]=P T P T =0. (3) Attacked stego model Extracton Recovery watermark Fgure 1: Proposed fragle watermarkng scheme. Addng the party bts allows the recever checkng and correctng f there are errors. The (7, 4) hammng codes can detect up to two-bt errors, and correct sngle-bt error, but cannot dentfy the error type. Therefore, hammng codes are an example of perfect codes whch exactly match the theoretcal upper bound on the number of dstnct code words for a gven number of bts and ablty to correct errors. Fgure 1 llustrates the outlne of ths proposed scheme. In ths paper, the hammng code technology s adopted as the premse of our 3D model fragle watermarkng scheme. A smple LSB substtuton technque s employed for watermark embeddng. Moreover, the hammng code based watermark can be verfed by usng the hammng code checkng wthout embeddng any verfcaton nformaton n the extracton stage. In summary, the proposed scheme has several advantages: (1) t s publc and blnd; (2) the verfcaton rate acheves 100% (watermarked vertces/total vertces); (3) the vertex based localzaton of unauthorzed modfcaton can be acheved; (4) the key sze used n the proposed scheme s small; (5) Fnally,theproposedmethodsmmunetothe causalty, convergence, and embeddng holes problems The Embeddng Process. Wthout loss of generalty, let each 3D object of nterest be descrbed by a sequence of coordnates P 0,P 1,P 2,...,P N 1, 0 N 1.Moreover,each vertex of the sequence s represented by ts 3D coordnates (x,y,z ). The embeddng algorthm takes two nputs: the cover model and the secret key to produce the stego model. As shown n Fgure 2, t embeds a watermark accordng to the followng four steps: Step 1 (normalzaton). The coordnates of each pont are normalzed nto the range 0 to 1. Consder q x = q y = q z = x orgnal q Mn (X orgnal) Max (X orgnal) Mn (X orgnal) y orgnal q Mn (Y orgnal) Max (Y orgnal) Mn (Y orgnal) z orgnal q Mn (Z orgnal) Max (Z orgnal) Mn (Z orgnal), where x, y, z denote the X, Y, Z axs; s the vertex 0 N 1; Max (X orgnal) denotes the maxmum value of the cover model at X axs, and so as Max (Y orgnal) and Max (Z orgnal), Mn (X orgnal) denotes the mnmum value (4)

4 4 Mathematcal Problems n Engneerng Table 2: Create party check bts. Party check bts Assocated date bts P 1 D 1 D 2 D 4 P 2 D 1 D 3 D 4 P 3 D 2 D 3 D 4 of the cover model at X axs, and so as Mn (Y orgnal) and Mn (Z orgnal). Step 2 (extracton of data bts). Wthout loss of generalty, suppose q r s the pont to be embedded, where r denotes the axs usedand 0 N 1.The4bts,whcharethe 4th least sgnfcant bt to 7th least sgnfcant bt of pont q r, are consdered as an nput data bts D 1, D 2, D 3,andD 4 of hammng procedure. Cover model Normalzaton Extracton of data bts Generaton of party check bts Watermark embeddng Secret key Step 3 (generaton of party check bts). Then, the hammng code procedure s performed to generate the party check bts. As shown n Table 1, the three party check bts P 1, P 2,andP 3 can be generated from the hammng procedure. Moreover, these three party check bts P 1, P 2,andP 3 are regarded as watermark w r n ths paper. Step 4 (watermark embeddng). For securty reasons, a secret key K s employed to generate a random sequence of ntegers. They represent the ndex orders for embeddng watermark to correspondng pont. The party bts are then embedded nto the 3 least sgnfcant bts (LSB) of pont q r by user least sgnfcant bt substtuton. Note that every numerc of random sequence wll never duplcate and only cooperate to one vertex of the cover model. Every vertex has ts own unque watermark. If any part of the stego model s modfed, then the tampered regon wll be verfed n extracton stage The Extracton Process. The watermark extracton process s performed to extract the embedded watermark and verfy the ntegrty of the stego model. The extracton process takes two nputs: the attacked stego model and the secret key K to extract the embedded watermark. As shown n Fgure 3, t extracts the watermark accordng to the followng fve steps: Step 1 (normalzaton). The coordnates of each pont are normalzed wthn the range 0 to 1. Step 2 (extracton of data bts). A secret key K s employed to generate a random sequence of ntegers. The random number generator s the same as that used n embeddng process. The 4 bts whch are the 4th least sgnfcant bt to 7th least sgnfcant bt of pont q r n stego model are extracted and consdered as nput data bts for hammng code. Step 3 (calculaton of party check bts). After hammng code encodng, the three output party bts are regarded as watermark w r. Step 4 (extracton of watermark). The embedded watermark h r can be extracted from the 3 least sgnfcant bts of pont n stego model. q r Stego model Fgure 2: The flow chart of embeddng process. Step 5 (verfcaton). The verfcaton s acheved when the watermark w r s equal to the embedded watermark h r. R(w r no tempered, )={ modfed, w r =h r w r =h r. Note that ths process s a publc blnd fragle watermark scheme whch does not need orgnal model and orgnal watermark for verfy forgery. 4. Expermental Results and Dscussons The proposed publc hammng code based fragle watermarkng method was mplemented usng Mcrosoft Vsual C++ programmng language. A seres of experments were conducted to test the performance of the proposed fragle watermarkng method. We shall present a set of vsualzaton results that can demonstrate the performance of the proposed method and valdate the feasblty of our algorthms. Table 3 shows the cover models of experments n ths paper and the vsual effect of the stego models. No vsual dstorton can be perceved between the cover models and stego models. Moreover, the precson level s used for these experments. No vsual dstorton can be perceved between the cover models and stego models. The drawback of spatal doman s that t has poor resstancetodstortoncompresson.therearesomeapproaches for measure dstorton, such as sgnal-to-nose (SNR), the Haussdorff dstance, Laplacan [44], and root mean square (RMS) rato [31, 32]. SNR used only on the stll mages. The HaussdorffdstanceandLaplacanwereusedtoevaluatethe dstorton of 3D polygonal models. But for a zoomed model, to measure RMS of dstorton s a better choce. Here,weusedRMSbyformula(7) andrmsratoby formula (6) to present the comparson of dstorton control. The RMS rato conssts of the RMS values over the dagonal (5)

5 Mathematcal Problems n Engneerng 5 Table 3: The cover model used n ths paper. Model (sze) Cover model Stego model Model (sze) Cover model Stego model Angelfsh (19724) Teapot (28922) Bunny (34837) Venus (33591) Lon (17352) Wolf (30084) Table 4: The comparson of RMS and RMS rato of dstorton control. Methods Models RMS RMS rato Yang s method Wang s method Proposed Yang s method Wang s method Proposed Anglefsh Bunny Lon Teapot Venus Wolf length of the boundng volume for a 3D stego model. The small RMS ratos ndcate nsgnfcant postonal changes durng the watermark embeddng. Consder where RMS = N 1 =0 RMS Rato = ((q x q x orgnal RMS Dagonal Length, (6) ) 2 +(q y q +(q z z orgnal q ) 2 ) 1/2 (N) 1, y orgnal ) 2 where q x denotes the x coordnate of the pont n stego model, so as q y and q z, 0 N 1, (7) Dagonal Length = X sze 2 +Y sze 2 +Z sze 2. (8) The RMS and the RMS rato comparson results of [36, 37] and the proposed method are as shown n Table 4. In ths paper, a publc hammng code based fragle watermarkng technque s proposed for 3D objects verfcaton. An adaptve watermark of each cover model can be generated from tself by usng the hammng code technque. In the embeddng stage, a smple least sgnfcant bt substtuton technque s employed for watermark embeddng. In the extracton stage, the hammng code based watermark can be verfed by usng the hammng code checkng wthout embeddng any verfcaton nformaton. The verfcaton nformaton should be embedded for achevng the verfcaton tasks n all the prevously mentoned 3D fragle watermarkng schemes. A comparson of the proposed scheme wth Ln s method [18], Yeo and Yeung s method [19], and Chou and Tseng s methods [34, 35] s gven n Table 5, where ndcates that the relatonshp exsts between methods and comparson tems and ndcates there s no relatonshp between methods and comparson tems. 5. Conclusons The proposed publc hammng code based fragle watermarkng s a blnd approach n spatal doman. It s smple to mplement and t does not need the orgnal model or the watermark for verfcaton and localzaton of tamperng detecton of 3D objects. Furthermore, the causalty problem, convergence problem, and embeddng holes problem can be overcome by the proposed scheme.

6 6 Mathematcal Problems n Engneerng Comparson tems Table 5: Comparson of prevous methods and the proposed method. Yeo and Yeung s method Ln et al. s method Methods Chou and Tseng s method (2006) Chou and Tseng s method (2009) Proposed method No verfcaton nformaton No causalty problem No convergence problem No embeddng holes Verfcaton rate 42% 12% 16% 100% Data hdng rate (bts/vertex) <1 <1 <1.5 <1.5 3 Tamperng detecton Localzaton of tampered regon Dstorton control Attacked stego model Normalzaton Extracton of data bts Calculaton of party check bts Extracton of watermark Verfcaton Recovery watermark Secret key Fgure 3: The flow chart of extracton process. The man purpose n ths paper s to authentcate the ntegrty of 3D polygonal messes n the spatal doman. The dstorton rate can be controlled below Theverfcaton rate acheves 100%. Consequently, every regon of the 3D model can be embedded n the embeddng stage and can be verfed n the extracton stage. Conflct of Interests The authors declare that there s no conflct of nterests regardng the publcaton of ths paper. Acknowledgments Ths research was supported by the Natonal Scence Councl, Tawan, under the Grants NSC E and NSC E References [1] B. Pftzmann, Informaton hdng termnology results of an nformal plenary meetng and addtonal proposals, n Proceedngs of the 1st Internatonal Workshop on Informaton Hdng,pp , [2] F. A. P. Pettcolas, R. J. Anderson, and M. G. Kuhn, Informaton hdng a survey, Proceedngs of the IEEE, vol. 87, no. 7, pp , [3] N.F.Johnson,Z.Durc,andS.Jajoda,Informaton Hdng: Steganography and Watermarkng Attacks and Countermeasures, Kluwer Academc Publshers, London, UK, [4] P. Wayner, Dsappearng Cryptography Informaton Hdng: Steganography & Watermarkng, Morgan Kaufmann, San Francsco, Calf, USA, 2nd edton, [5] S. Katzenbesser and F. A. P. Pettcolas, Informaton Hdng Technques for Steganography and Dgtal Watermarkng, Artech House, London, UK, [6] F. Daraee and S. Mozaffar, Watermarkng n bnary document mages usng fractal codes, Pattern Recognton Letters,vol.35, pp ,2014. [7] J.L.Hernandez-Ardeta,A.I.Gonzalez-Tablas,J.M.deFuentes, and B. Ramos, A taxonomy and survey of attacks on dgtal sgnatures, Computers & Securty,vol.34,pp ,2013. [8] C.-F.Chou,W.C.Cheng,andL.Golubchk, Performancestudy of onlne batch-based dgtal sgnature schemes, Network and Computer Applcatons, vol. 33, no. 2, pp , [9] J. Zhang, A knd of message-recoverable farness blnd dgtal sgnature scheme, Proceda Engneerng, vol.15,pp , [10] D.-R. Ln, C.-I. Wang, Z.-K. Zhang, and D. J. Guan, A dgtal sgnature wth multple sublmnal channels and ts applcatons, Computers and Mathematcs wth Applcatons,vol.60, no. 2, pp , [11] I. Cox, M. Mller, and J. Bloom, Dgtal Watermarkng,Morgan Kauffman Publshers, San Francsco, Calf, USA, [12] J. Setz, Dgtal Watermarkng for Dgtal Meda, Informaton Scence Publshers, Hershey, Pa, USA, [13] M. Arnold, S. D. Wolthusen, and M. Schmucker, Technques and Applcatons of Dgtal Watermarkng and Content Protecton, Artech House Publshers, Morwood, Mass, USA, 2003.

7 Mathematcal Problems n Engneerng 7 [14] C. W. Wu, Multmeda data hdng and authentcaton va halftonng and coordnate projecton, EURASIP Journal on Advances n Sgnal Processng, vol. 2002, Artcle ID , pp , [15] J. R. Goldschneder, E. A. Rskn, and P. W. Wong, Embedded multlevel error dffuson, IEEE Transactons on Image Processng,vol.6,no.7,pp ,1997. [16] C.-M. Chou and D.-C. Tseng, A publc fragle watermarkng scheme for 3D model authentcaton, Computer-Aded Desgn, vol. 38, no. 11, pp , [17] C. Fornaro and A. Sanna, Publc key watermarkng for authentcaton of CSG models, Computer-Aded Desgn,vol.32,no.12, pp , [18] H.-Y. S. Ln, H.-Y. M. Lao, C.-S. Lu, and J.-C. Ln, Fragle watermarkng for authentcatng 3-D polygonal meshes, IEEE Transactons on Multmeda, vol. 7, no. 6, pp , [19] B.-L.YeoandM.M.Yeung, Watermarkng3Dobjectsforverfcaton, IEEE Computer Graphcs and Applcatons,vol.19,no. 1,pp.36 45,1999. [20] J. Lang and Z. Zhang, Blnd dgtal watermarkng method n the fractonal Fourer transform doman, Optcs and Lasers n Engneerng,vol.53,pp ,2014. [21] S. Perera, S. Voloshynosky, and T. Pun, Optmal transform doman watermark embeddng va lnear programmng, Sgnal Processng,vol.81,no.6,pp ,2001. [22] X. Wang, C. Wang, H. Yang, and P. Nu, A robust blnd color mage watermarkng n quaternon Fourer transform doman, JournalofSystemsandSoftware,vol.86,no.2,pp ,2013. [23] M. Cancellaro, F. Battst, M. Carl, G. Boato, F. G. B. de Natale, and A. Ner, A commutatve dgtal mage watermarkng and encrypton method n the tree structured Haar transform doman, Sgnal Processng: Image Communcaton, vol. 26, no. 1, pp. 1 12, [24] H. Yang, X. Wang, and C. Wang, A robust dgtal watermarkng algorthm n undecmated dscrete wavelet transform doman, Computers & Electrcal Engneerng,vol.39,no.3,pp , [25] R. Ohbuch, H. Masuda, and M. Aono, Watermarkng threedmensonal polygonal models, n Proceedngs of the 5th ACM Internatonal Multmeda Conference, pp , November [26] R. Ohbuch, S. Takahash, T. Myazawa, and A. Mukayama, Watermarkng 3D polygonal meshes n the mesh spectral doman, n Proceedngs of the Graphcs Interface, pp. 9 17, June [27] R. Ohbuch, A. Mukayama, and S. Takahash, A frequencydoman approach to watermarkng 3D shapes, Computer Graphcs Forum,vol.21,no.3,pp ,2002. [28] R. Ohbuch, H. Masuda, and M. Aono, Watermarkng threedmensonal polygonal models through geometrc and topologcal modfcatons, IEEE Journal on Selected Areas n Communcatons, vol. 16, no. 4, pp , [29] F. Cayre and B. Macq, Data hdng on 3-D trangle meshes, IEEE Transactons on Sgnal Processng, vol.51,no.4,pp , [30] P. R. Alface, B. Macq, and F. Cayre, Blnd and robust watermarkngof3dmodels:howtowthstandthecroppngattack? n Proceedngsofthe14thIEEEInternatonalConferenceon Image Processng (ICIP 07),vol.5,pp ,September2007. [31] C.-M. Wang and P.-C. Wang, Data hdng approach for pontsampled geometry, IEICE Transactons on Communcatons, vol. 88-B, no. 1, pp , [32] C.-M. Wang and P.-C. Wang, Steganography on pont-sampled geometry, Computers and Graphcs,vol.30,no.2,pp , [33] S. Kana, H. Date, and T. Kshnam, Dgtal watermarkng for 3D polygons usng multresoluton wavelet decomposton, n Proceedngs of the 6th IFIP WG 5.2 Internatonal Workshop on Geometrc Modelng: Fundamentals and Applcatons (GEO 98), pp , [34] C.-M. Chou and D.-C. Tseng, A publc fragle watermarkng scheme for 3D model authentcaton, Computer-Aded Desgn, vol. 38, no. 11, pp , [35] C.-M. Chou and D.-C. Tseng, Affne-transformaton-nvarant publc fragle watermarkng for 3D model authentcaton, IEEE Computer Graphcs and Applcatons, vol.29,no.2,pp.72 79, [36] Y. W. Yang, A study on the sphercal coordnate based fragle watermarkng scheme for 3D models [M.S. thess], Department of Computer Scence and Engneerng, Natonal Chung-Hsng Unversty, [37] J.T.Wang,Y.T.Chang,Y.C.Chang,C.C.Huang,andC.M.Fan, A reference-pont-based fragle watermarkng scheme for 3D model n spatal doman, n Proceedngs of the 2nd Conference on Applcatons of Innovaton and Inventon,2012. [38] C. M. Kung, A robust oblvous watermark system base on hybrd error correct code, Multmeda, vol.5,no.3,pp , [39] C.-C. Chang, K.-N. Chen, C.-F. Lee, and L.-J. Lu, A secure fragle watermarkng scheme based on chaos-and-hammng code, JournalofSystemsandSoftware,vol.84,no.9,pp , [40] C. Desset, B. Macq, and L. Vandendorpe, Block error-correctng codes for systems wth a very hgh BER: theoretcal analyss and applcaton to the protecton of watermarks, Sgnal Processng: Image Communcaton, vol.17,no.5,pp , [41] J.-M. Guo, S.-C. Pe, and H. Lee, Watermarkng n halftone mages wth party-matched error dffuson, Sgnal Processng, vol. 91, no. 1, pp , [42] R. W. Hammng, Error detectng and error correctng codes, The Bell System Techncal Journal,vol.29,pp ,1950. [43] J. S. chtode, Dgtal Communcatons, Techncal Publcatons, Pune, Inda, 1st edton, [44] J. Bennour and J.-L. Dugelay, Toward a 3D watermarkng benchmark, n Proceedngs of the 9th IEEE Internatonal Workshop on Multmeda Sgnal Processng (MMSP 07), pp , October 2007.

8 Advances n Operatons Research Advances n Decson Scences Appled Mathematcs Algebra Probablty and Statstcs The Scentfc World Journal Internatonal Dfferental Equatons Submt your manuscrpts at Internatonal Advances n Combnatorcs Mathematcal Physcs Complex Analyss Internatonal Mathematcs and Mathematcal Scences Mathematcal Problems n Engneerng Mathematcs Dscrete Mathematcs Dscrete Dynamcs n Nature and Socety Functon Spaces Abstract and Appled Analyss Internatonal Stochastc Analyss Optmzaton

Hybrid Non-Blind Color Image Watermarking

Hybrid Non-Blind Color Image Watermarking Hybrd Non-Blnd Color Image Watermarkng Ms C.N.Sujatha 1, Dr. P. Satyanarayana 2 1 Assocate Professor, Dept. of ECE, SNIST, Yamnampet, Ghatkesar Hyderabad-501301, Telangana 2 Professor, Dept. of ECE, AITS,

More information

Semi-Fragile Watermarking Scheme for Authentication of JPEG Images

Semi-Fragile Watermarking Scheme for Authentication of JPEG Images Tamkang Journal of Scence and Engneerng, Vol. 10, No 1, pp. 5766 (2007) 57 Sem-Fragle Watermarkng Scheme for Authentcaton of JPEG Images Chh-Hung n 1 *, Tung-Shh Su 2 and Wen-Shyong Hseh 2,3 1 Department

More information

Enhanced Watermarking Technique for Color Images using Visual Cryptography

Enhanced Watermarking Technique for Color Images using Visual Cryptography Informaton Assurance and Securty Letters 1 (2010) 024-028 Enhanced Watermarkng Technque for Color Images usng Vsual Cryptography Enas F. Al rawashdeh 1, Rawan I.Zaghloul 2 1 Balqa Appled Unversty, MIS

More information

A Lossless Watermarking Scheme for Halftone Image Authentication

A Lossless Watermarking Scheme for Halftone Image Authentication IJCSNS Internatonal Journal of Computer Scence and Network Securty, VOL.6 No.2B, February 2006 147 A Lossless Watermarkng Scheme for Halftone Image Authentcaton Jeng-Shyang Pan, Hao Luo, and Zhe-Mng Lu,

More information

Data Hiding and Image Authentication for Color-Palette Images

Data Hiding and Image Authentication for Color-Palette Images Data Hdng and Image Authentcaton for Color-Palette Images Chh-Yang Yn ( 殷志揚 ) and Wen-Hsang Tsa ( 蔡文祥 ) Department of Computer & Informaton Scence Natonal Chao Tung Unversty 00 Ta Hsueh Rd., Hsnchu, Tawan

More information

Parallelism for Nested Loops with Non-uniform and Flow Dependences

Parallelism for Nested Loops with Non-uniform and Flow Dependences Parallelsm for Nested Loops wth Non-unform and Flow Dependences Sam-Jn Jeong Dept. of Informaton & Communcaton Engneerng, Cheonan Unversty, 5, Anseo-dong, Cheonan, Chungnam, 330-80, Korea. seong@cheonan.ac.kr

More information

A Fast Content-Based Multimedia Retrieval Technique Using Compressed Data

A Fast Content-Based Multimedia Retrieval Technique Using Compressed Data A Fast Content-Based Multmeda Retreval Technque Usng Compressed Data Borko Furht and Pornvt Saksobhavvat NSF Multmeda Laboratory Florda Atlantc Unversty, Boca Raton, Florda 3343 ABSTRACT In ths paper,

More information

High-Boost Mesh Filtering for 3-D Shape Enhancement

High-Boost Mesh Filtering for 3-D Shape Enhancement Hgh-Boost Mesh Flterng for 3-D Shape Enhancement Hrokazu Yagou Λ Alexander Belyaev y Damng We z Λ y z ; ; Shape Modelng Laboratory, Unversty of Azu, Azu-Wakamatsu 965-8580 Japan y Computer Graphcs Group,

More information

An Optimal Algorithm for Prufer Codes *

An Optimal Algorithm for Prufer Codes * J. Software Engneerng & Applcatons, 2009, 2: 111-115 do:10.4236/jsea.2009.22016 Publshed Onlne July 2009 (www.scrp.org/journal/jsea) An Optmal Algorthm for Prufer Codes * Xaodong Wang 1, 2, Le Wang 3,

More information

A Fast Visual Tracking Algorithm Based on Circle Pixels Matching

A Fast Visual Tracking Algorithm Based on Circle Pixels Matching A Fast Vsual Trackng Algorthm Based on Crcle Pxels Matchng Zhqang Hou hou_zhq@sohu.com Chongzhao Han czhan@mal.xjtu.edu.cn Ln Zheng Abstract: A fast vsual trackng algorthm based on crcle pxels matchng

More information

A Binarization Algorithm specialized on Document Images and Photos

A Binarization Algorithm specialized on Document Images and Photos A Bnarzaton Algorthm specalzed on Document mages and Photos Ergna Kavalleratou Dept. of nformaton and Communcaton Systems Engneerng Unversty of the Aegean kavalleratou@aegean.gr Abstract n ths paper, a

More information

Load Balancing for Hex-Cell Interconnection Network

Load Balancing for Hex-Cell Interconnection Network Int. J. Communcatons, Network and System Scences,,, - Publshed Onlne Aprl n ScRes. http://www.scrp.org/journal/jcns http://dx.do.org/./jcns.. Load Balancng for Hex-Cell Interconnecton Network Saher Manaseer,

More information

Cluster Analysis of Electrical Behavior

Cluster Analysis of Electrical Behavior Journal of Computer and Communcatons, 205, 3, 88-93 Publshed Onlne May 205 n ScRes. http://www.scrp.org/ournal/cc http://dx.do.org/0.4236/cc.205.350 Cluster Analyss of Electrcal Behavor Ln Lu Ln Lu, School

More information

Key-Selective Patchwork Method for Audio Watermarking

Key-Selective Patchwork Method for Audio Watermarking Internatonal Journal of Dgtal Content Technology and ts Applcatons Volume 4, Number 4, July 2010 Key-Selectve Patchwork Method for Audo Watermarkng 1 Ch-Man Pun, 2 Jng-Jng Jang 1, Frst and Correspondng

More information

A Hybrid Semi-Blind Gray Scale Image Watermarking Algorithm Based on DWT-SVD using Human Visual System Model

A Hybrid Semi-Blind Gray Scale Image Watermarking Algorithm Based on DWT-SVD using Human Visual System Model A Hybrd Sem-Blnd Gray Scale Image Watermarkng Algorthm Based on DWT-SVD usng Human Vsual System Model Rajesh Mehta r Scence & Engneerng, USICT Guru Gobnd Sngh Indrarprastha Unversty New Delh, Inda rajesh00ust@gmal.com

More information

Content Based Image Retrieval Using 2-D Discrete Wavelet with Texture Feature with Different Classifiers

Content Based Image Retrieval Using 2-D Discrete Wavelet with Texture Feature with Different Classifiers IOSR Journal of Electroncs and Communcaton Engneerng (IOSR-JECE) e-issn: 78-834,p- ISSN: 78-8735.Volume 9, Issue, Ver. IV (Mar - Apr. 04), PP 0-07 Content Based Image Retreval Usng -D Dscrete Wavelet wth

More information

High Payload Reversible Data Hiding Scheme Using Difference Segmentation and Histogram Shifting

High Payload Reversible Data Hiding Scheme Using Difference Segmentation and Histogram Shifting JOURNAL OF ELECTRONIC SCIENCE AND TECHNOLOGY, VOL. 11, NO. 1, MARCH 2013 9 Hgh Payload Reversble Data Hdng Scheme Usng Dfference Segmentaton and Hstogram Shftng Yung-Chen Chou and Huang-Chng L Abstract

More information

Research Article High Capacity Reversible Watermarking for Audio by Histogram Shifting and Predicted Error Expansion

Research Article High Capacity Reversible Watermarking for Audio by Histogram Shifting and Predicted Error Expansion e Scentfc World Journal, Artcle ID 656251, 7 pages http://dx.do.org/1.1155/214/656251 Research Artcle Hgh Capacty Reversble Watermarkng for Audo by Hstogram Shftng and Predcted Error Expanson Fe Wang,

More information

Quality Improvement Algorithm for Tetrahedral Mesh Based on Optimal Delaunay Triangulation

Quality Improvement Algorithm for Tetrahedral Mesh Based on Optimal Delaunay Triangulation Intellgent Informaton Management, 013, 5, 191-195 Publshed Onlne November 013 (http://www.scrp.org/journal/m) http://dx.do.org/10.36/m.013.5601 Qualty Improvement Algorthm for Tetrahedral Mesh Based on

More information

Detection of an Object by using Principal Component Analysis

Detection of an Object by using Principal Component Analysis Detecton of an Object by usng Prncpal Component Analyss 1. G. Nagaven, 2. Dr. T. Sreenvasulu Reddy 1. M.Tech, Department of EEE, SVUCE, Trupath, Inda. 2. Assoc. Professor, Department of ECE, SVUCE, Trupath,

More information

Private Information Retrieval (PIR)

Private Information Retrieval (PIR) 2 Levente Buttyán Problem formulaton Alce wants to obtan nformaton from a database, but she does not want the database to learn whch nformaton she wanted e.g., Alce s an nvestor queryng a stock-market

More information

Accounting for the Use of Different Length Scale Factors in x, y and z Directions

Accounting for the Use of Different Length Scale Factors in x, y and z Directions 1 Accountng for the Use of Dfferent Length Scale Factors n x, y and z Drectons Taha Soch (taha.soch@kcl.ac.uk) Imagng Scences & Bomedcal Engneerng, Kng s College London, The Rayne Insttute, St Thomas Hosptal,

More information

Robust Watermarking for Text Images Based on Arnold Scrambling and DWT-DCT

Robust Watermarking for Text Images Based on Arnold Scrambling and DWT-DCT Internatonal Conference on Mechatroncs Electronc Industral and Control Engneerng (MEIC 015) Robust Watermarkng for Text Images Based on Arnold Scramblng and DWT-DCT Fan Wu College of Informaton Scence

More information

Solving two-person zero-sum game by Matlab

Solving two-person zero-sum game by Matlab Appled Mechancs and Materals Onlne: 2011-02-02 ISSN: 1662-7482, Vols. 50-51, pp 262-265 do:10.4028/www.scentfc.net/amm.50-51.262 2011 Trans Tech Publcatons, Swtzerland Solvng two-person zero-sum game by

More information

Security Vulnerabilities of an Enhanced Remote User Authentication Scheme

Security Vulnerabilities of an Enhanced Remote User Authentication Scheme Contemporary Engneerng Scences, Vol. 7, 2014, no. 26, 1475-1482 HIKARI Ltd, www.m-hkar.com http://dx.do.org/10.12988/ces.2014.49186 Securty Vulnerabltes of an Enhanced Remote User Authentcaton Scheme Hae-Soon

More information

Research of Multiple Text Watermarks Technique in Electric Power System Texts

Research of Multiple Text Watermarks Technique in Electric Power System Texts Sensors & Transducers 203 by IFSA http://www.sensorsportal.com Research of Multple Text atermarks Technque n Electrc Power System Texts Xao-X XING, Qng CHEN, 2 Lan-X FU School of Optcal-Electrcal and Computer

More information

A NEW AUDIO WATERMARKING METHOD BASED

A NEW AUDIO WATERMARKING METHOD BASED A NEW AUDIO WATERMARKING METHOD BASED ON DISCRETE COSINE TRANSFORM WITH A GRAY IMAGE Mohammad Ibrahm Khan 1, Md. Iqbal Hasan Sarker 2, Kaushk Deb 3 and Md. Hasan Furhad 4 1,2,3 Department of Computer Scence

More information

Improvement of Spatial Resolution Using BlockMatching Based Motion Estimation and Frame. Integration

Improvement of Spatial Resolution Using BlockMatching Based Motion Estimation and Frame. Integration Improvement of Spatal Resoluton Usng BlockMatchng Based Moton Estmaton and Frame Integraton Danya Suga and Takayuk Hamamoto Graduate School of Engneerng, Tokyo Unversty of Scence, 6-3-1, Nuku, Katsuska-ku,

More information

A Robust Webpage Information Hiding Method Based on the Slash of Tag

A Robust Webpage Information Hiding Method Based on the Slash of Tag Advanced Engneerng Forum Onlne: 2012-09-26 ISSN: 2234-991X, Vols. 6-7, pp 361-366 do:10.4028/www.scentfc.net/aef.6-7.361 2012 Trans Tech Publcatons, Swtzerland A Robust Webpage Informaton Hdng Method Based

More information

Empirical Distributions of Parameter Estimates. in Binary Logistic Regression Using Bootstrap

Empirical Distributions of Parameter Estimates. in Binary Logistic Regression Using Bootstrap Int. Journal of Math. Analyss, Vol. 8, 4, no. 5, 7-7 HIKARI Ltd, www.m-hkar.com http://dx.do.org/.988/jma.4.494 Emprcal Dstrbutons of Parameter Estmates n Bnary Logstc Regresson Usng Bootstrap Anwar Ftranto*

More information

TN348: Openlab Module - Colocalization

TN348: Openlab Module - Colocalization TN348: Openlab Module - Colocalzaton Topc The Colocalzaton module provdes the faclty to vsualze and quantfy colocalzaton between pars of mages. The Colocalzaton wndow contans a prevew of the two mages

More information

Robust Video Watermarking Using Image Normalization, Motion Vector and Perceptual Information

Robust Video Watermarking Using Image Normalization, Motion Vector and Perceptual Information Robust Vdeo Watermarkng Usng Image ormalzaton, Moton Vector and Perceptual Informaton Cedllo-Hernández Antono 1, Cedllo-Hernández Manuel 1, akano-myatake Marko 1, García-Vázquez Mreya S. 2 1 Postgraduate

More information

An Iterative Solution Approach to Process Plant Layout using Mixed Integer Optimisation

An Iterative Solution Approach to Process Plant Layout using Mixed Integer Optimisation 17 th European Symposum on Computer Aded Process Engneerng ESCAPE17 V. Plesu and P.S. Agach (Edtors) 2007 Elsever B.V. All rghts reserved. 1 An Iteratve Soluton Approach to Process Plant Layout usng Mxed

More information

An Image Fusion Approach Based on Segmentation Region

An Image Fusion Approach Based on Segmentation Region Rong Wang, L-Qun Gao, Shu Yang, Yu-Hua Cha, and Yan-Chun Lu An Image Fuson Approach Based On Segmentaton Regon An Image Fuson Approach Based on Segmentaton Regon Rong Wang, L-Qun Gao, Shu Yang 3, Yu-Hua

More information

Information Hiding Watermarking Detection Technique by PSNR and RGB Intensity

Information Hiding Watermarking Detection Technique by PSNR and RGB Intensity www..org 3 Informaton Hdng Watermarkng Detecton Technque by PSNR and RGB Intensty 1 Neha Chauhan, Akhlesh A. Waoo, 3 P. S. Patheja 1 Research Scholar, BIST, Bhopal, Inda.,3 Assstant Professor, BIST, Bhopal,

More information

Watermarking 2D Vector Maps in the Mesh-Spectral Domain

Watermarking 2D Vector Maps in the Mesh-Spectral Domain Watermarkng 2D Vector Maps n the Mesh-Spectral Doman 1 Ryutarou Ohbuch, 1 Hroo Ueda, 2 Shuh Endoh ohbuch@acm.org, k7026@kk.yamanash.ac.p, endoshu@p.bm.com 1 Computer Scence Department, Unversty of Yamanash

More information

MULTISPECTRAL IMAGES CLASSIFICATION BASED ON KLT AND ATR AUTOMATIC TARGET RECOGNITION

MULTISPECTRAL IMAGES CLASSIFICATION BASED ON KLT AND ATR AUTOMATIC TARGET RECOGNITION MULTISPECTRAL IMAGES CLASSIFICATION BASED ON KLT AND ATR AUTOMATIC TARGET RECOGNITION Paulo Quntlano 1 & Antono Santa-Rosa 1 Federal Polce Department, Brasla, Brazl. E-mals: quntlano.pqs@dpf.gov.br and

More information

Type-2 Fuzzy Non-uniform Rational B-spline Model with Type-2 Fuzzy Data

Type-2 Fuzzy Non-uniform Rational B-spline Model with Type-2 Fuzzy Data Malaysan Journal of Mathematcal Scences 11(S) Aprl : 35 46 (2017) Specal Issue: The 2nd Internatonal Conference and Workshop on Mathematcal Analyss (ICWOMA 2016) MALAYSIAN JOURNAL OF MATHEMATICAL SCIENCES

More information

Related-Mode Attacks on CTR Encryption Mode

Related-Mode Attacks on CTR Encryption Mode Internatonal Journal of Network Securty, Vol.4, No.3, PP.282 287, May 2007 282 Related-Mode Attacks on CTR Encrypton Mode Dayn Wang, Dongda Ln, and Wenlng Wu (Correspondng author: Dayn Wang) Key Laboratory

More information

Identify the Attack in Embedded Image with Steganalysis Detection Method by PSNR and RGB Intensity

Identify the Attack in Embedded Image with Steganalysis Detection Method by PSNR and RGB Intensity Internatonal Journal of Computer Systems (ISSN: 394-1065), Volume 03 Issue 07, July, 016 Avalable at http://www.jcsonlne.com/ Identfy the Attack n Embedded Image wth Steganalyss Detecton Method by PSNR

More information

Complex Numbers. Now we also saw that if a and b were both positive then ab = a b. For a second let s forget that restriction and do the following.

Complex Numbers. Now we also saw that if a and b were both positive then ab = a b. For a second let s forget that restriction and do the following. Complex Numbers The last topc n ths secton s not really related to most of what we ve done n ths chapter, although t s somewhat related to the radcals secton as we wll see. We also won t need the materal

More information

Tsinghua University at TAC 2009: Summarizing Multi-documents by Information Distance

Tsinghua University at TAC 2009: Summarizing Multi-documents by Information Distance Tsnghua Unversty at TAC 2009: Summarzng Mult-documents by Informaton Dstance Chong Long, Mnle Huang, Xaoyan Zhu State Key Laboratory of Intellgent Technology and Systems, Tsnghua Natonal Laboratory for

More information

A Secured Method for Image Steganography Based On Pixel Values

A Secured Method for Image Steganography Based On Pixel Values A Secured Method for Image Steganography Based On Pxel Values Tarun Gulat #, Sanskrt Gupta * # Assocate Professor, Electroncs and Communcaton Engneerng Department, MMEC, M.M.U., Mullana, Ambala, Haryana,

More information

Article Reversible Dual-Image-Based Hiding Scheme Using Block Folding Technique

Article Reversible Dual-Image-Based Hiding Scheme Using Block Folding Technique Artcle Reversble Dual-Image-Based Hdng Scheme Usng Block Foldng Technque Tzu-Chuen Lu, * and Hu-Shh Leng Department of Informaton Management, Chaoyang Unversty of Technology, Tachung 4349, Tawan Department

More information

KEYWORDS: Digital Image Watermarking, Discrete Wavelet Transform, General Regression Neural Network, Human Visual System. 1.

KEYWORDS: Digital Image Watermarking, Discrete Wavelet Transform, General Regression Neural Network, Human Visual System. 1. An Adaptve Dgtal Image Watermarkng Based on Image Features n Dscrete Wavelet Transform Doman and General Regresson Neural Network Ayoub Taher Group of IT Engneerng, Payam Noor Unversty, Broujen, Iran ABSTRACT:

More information

3D vector computer graphics

3D vector computer graphics 3D vector computer graphcs Paolo Varagnolo: freelance engneer Padova Aprl 2016 Prvate Practce ----------------------------------- 1. Introducton Vector 3D model representaton n computer graphcs requres

More information

Protection of Real and Artwork Human Objects based on a Chaotic Moments Modulation Method

Protection of Real and Artwork Human Objects based on a Chaotic Moments Modulation Method 1 Protecton of Real and Artwork Human Objects based on a Chaotc Moments Modulaton Method Klms Ntalans 1, Paraskev Tzouvel 1, Stefanos Kollas 1 and Athanasos Drgkas 1 Natonal Techncal Unversty of Athens,

More information

Face Recognition University at Buffalo CSE666 Lecture Slides Resources:

Face Recognition University at Buffalo CSE666 Lecture Slides Resources: Face Recognton Unversty at Buffalo CSE666 Lecture Sldes Resources: http://www.face-rec.org/algorthms/ Overvew of face recognton algorthms Correlaton - Pxel based correspondence between two face mages Structural

More information

An Application of the Dulmage-Mendelsohn Decomposition to Sparse Null Space Bases of Full Row Rank Matrices

An Application of the Dulmage-Mendelsohn Decomposition to Sparse Null Space Bases of Full Row Rank Matrices Internatonal Mathematcal Forum, Vol 7, 2012, no 52, 2549-2554 An Applcaton of the Dulmage-Mendelsohn Decomposton to Sparse Null Space Bases of Full Row Rank Matrces Mostafa Khorramzadeh Department of Mathematcal

More information

Robust Blind Video Watermark Algorithm in Transform Domain Combining with 3D Video Correlation

Robust Blind Video Watermark Algorithm in Transform Domain Combining with 3D Video Correlation JOURNAL OF MULTIMEDIA, VOL. 8, NO. 2, APRIL 2013 161 Robust Blnd Vdeo Watermark Algorthm n Transform Doman Combnng wth 3D Vdeo Correlaton DING Ha-yang 1,3 1. Informaton Securty Center, Bejng Unversty of

More information

Security Enhanced Dynamic ID based Remote User Authentication Scheme for Multi-Server Environments

Security Enhanced Dynamic ID based Remote User Authentication Scheme for Multi-Server Environments Internatonal Journal of u- and e- ervce, cence and Technology Vol8, o 7 0), pp7-6 http://dxdoorg/07/unesst087 ecurty Enhanced Dynamc ID based Remote ser Authentcaton cheme for ult-erver Envronments Jun-ub

More information

A New Approach For the Ranking of Fuzzy Sets With Different Heights

A New Approach For the Ranking of Fuzzy Sets With Different Heights New pproach For the ankng of Fuzzy Sets Wth Dfferent Heghts Pushpnder Sngh School of Mathematcs Computer pplcatons Thapar Unversty, Patala-7 00 Inda pushpndersnl@gmalcom STCT ankng of fuzzy sets plays

More information

Classifier Selection Based on Data Complexity Measures *

Classifier Selection Based on Data Complexity Measures * Classfer Selecton Based on Data Complexty Measures * Edth Hernández-Reyes, J.A. Carrasco-Ochoa, and J.Fco. Martínez-Trndad Natonal Insttute for Astrophyscs, Optcs and Electroncs, Lus Enrque Erro No.1 Sta.

More information

Digital Video Watermarking using Discrete Wavelet Transform and Principal Component Analysis

Digital Video Watermarking using Discrete Wavelet Transform and Principal Component Analysis Internatonal Journal of Wsdom Based Computng, Vol. 1 (2), August 2011 7 Dgtal Vdeo Watermarkng usng Dscrete Wavelet Transform and Prncpal Component Analyss Sanjana Snha, Prajnat Bardhan, Swarnal Pramanck,

More information

Research and Application of Fingerprint Recognition Based on MATLAB

Research and Application of Fingerprint Recognition Based on MATLAB Send Orders for Reprnts to reprnts@benthamscence.ae The Open Automaton and Control Systems Journal, 205, 7, 07-07 Open Access Research and Applcaton of Fngerprnt Recognton Based on MATLAB Nng Lu* Department

More information

The Research of Ellipse Parameter Fitting Algorithm of Ultrasonic Imaging Logging in the Casing Hole

The Research of Ellipse Parameter Fitting Algorithm of Ultrasonic Imaging Logging in the Casing Hole Appled Mathematcs, 04, 5, 37-3 Publshed Onlne May 04 n ScRes. http://www.scrp.org/journal/am http://dx.do.org/0.436/am.04.584 The Research of Ellpse Parameter Fttng Algorthm of Ultrasonc Imagng Loggng

More information

Proper Choice of Data Used for the Estimation of Datum Transformation Parameters

Proper Choice of Data Used for the Estimation of Datum Transformation Parameters Proper Choce of Data Used for the Estmaton of Datum Transformaton Parameters Hakan S. KUTOGLU, Turkey Key words: Coordnate systems; transformaton; estmaton, relablty. SUMMARY Advances n technologes and

More information

IAJIT First Online Publication

IAJIT First Online Publication Content Protecton n Vdeo Data Based on Robust Dgtal Watermarkng Resstant to Intentonal and Unntentonal Attacks Mad Masoum and Shervn Amr Department of Electrcal Engneerng, Islamc Azad Unversty Qazvn Branch,

More information

Shape-adaptive DCT and Its Application in Region-based Image Coding

Shape-adaptive DCT and Its Application in Region-based Image Coding Internatonal Journal of Sgnal Processng, Image Processng and Pattern Recognton, pp.99-108 http://dx.do.org/10.14257/sp.2014.7.1.10 Shape-adaptve DCT and Its Applcaton n Regon-based Image Codng Yamn Zheng,

More information

Simulation Based Analysis of FAST TCP using OMNET++

Simulation Based Analysis of FAST TCP using OMNET++ Smulaton Based Analyss of FAST TCP usng OMNET++ Umar ul Hassan 04030038@lums.edu.pk Md Term Report CS678 Topcs n Internet Research Sprng, 2006 Introducton Internet traffc s doublng roughly every 3 months

More information

Determining the Optimal Bandwidth Based on Multi-criterion Fusion

Determining the Optimal Bandwidth Based on Multi-criterion Fusion Proceedngs of 01 4th Internatonal Conference on Machne Learnng and Computng IPCSIT vol. 5 (01) (01) IACSIT Press, Sngapore Determnng the Optmal Bandwdth Based on Mult-crteron Fuson Ha-L Lang 1+, Xan-Mn

More information

Corner-Based Image Alignment using Pyramid Structure with Gradient Vector Similarity

Corner-Based Image Alignment using Pyramid Structure with Gradient Vector Similarity Journal of Sgnal and Informaton Processng, 013, 4, 114-119 do:10.436/jsp.013.43b00 Publshed Onlne August 013 (http://www.scrp.org/journal/jsp) Corner-Based Image Algnment usng Pyramd Structure wth Gradent

More information

Novel Pattern-based Fingerprint Recognition Technique Using 2D Wavelet Decomposition

Novel Pattern-based Fingerprint Recognition Technique Using 2D Wavelet Decomposition Mathematcal Methods for Informaton Scence and Economcs Novel Pattern-based Fngerprnt Recognton Technque Usng D Wavelet Decomposton TUDOR BARBU Insttute of Computer Scence of the Romanan Academy T. Codrescu,,

More information

Image Representation & Visualization Basic Imaging Algorithms Shape Representation and Analysis. outline

Image Representation & Visualization Basic Imaging Algorithms Shape Representation and Analysis. outline mage Vsualzaton mage Vsualzaton mage Representaton & Vsualzaton Basc magng Algorthms Shape Representaton and Analyss outlne mage Representaton & Vsualzaton Basc magng Algorthms Shape Representaton and

More information

The Greedy Method. Outline and Reading. Change Money Problem. Greedy Algorithms. Applications of the Greedy Strategy. The Greedy Method Technique

The Greedy Method. Outline and Reading. Change Money Problem. Greedy Algorithms. Applications of the Greedy Strategy. The Greedy Method Technique //00 :0 AM Outlne and Readng The Greedy Method The Greedy Method Technque (secton.) Fractonal Knapsack Problem (secton..) Task Schedulng (secton..) Mnmum Spannng Trees (secton.) Change Money Problem Greedy

More information

Lecture - Data Encryption Standard 4

Lecture - Data Encryption Standard 4 The Data Encrypton Standard For an encrypton algorthm we requre: secrecy of the key and not of the algorthm tself s the only thng that s needed to ensure the prvacy of the data the best cryptographc algorthms

More information

FEATURE EXTRACTION. Dr. K.Vijayarekha. Associate Dean School of Electrical and Electronics Engineering SASTRA University, Thanjavur

FEATURE EXTRACTION. Dr. K.Vijayarekha. Associate Dean School of Electrical and Electronics Engineering SASTRA University, Thanjavur FEATURE EXTRACTION Dr. K.Vjayarekha Assocate Dean School of Electrcal and Electroncs Engneerng SASTRA Unversty, Thanjavur613 41 Jont Intatve of IITs and IISc Funded by MHRD Page 1 of 8 Table of Contents

More information

Steganography System using Slantlet Transform

Steganography System using Slantlet Transform ISSN:43-6999 Journal of Inmaton Communcaton and Intellgence Systems (JICIS) Volume Issue February 06 Steganography System usng Slantlet Transm Ryadh Bassl Abduljabbar Abstract An approach hdng nmaton has

More information

Problem Definitions and Evaluation Criteria for Computational Expensive Optimization

Problem Definitions and Evaluation Criteria for Computational Expensive Optimization Problem efntons and Evaluaton Crtera for Computatonal Expensve Optmzaton B. Lu 1, Q. Chen and Q. Zhang 3, J. J. Lang 4, P. N. Suganthan, B. Y. Qu 6 1 epartment of Computng, Glyndwr Unversty, UK Faclty

More information

Robust and Reversible Relational Database Watermarking Algorithm Based on Clustering and Polar Angle Expansion

Robust and Reversible Relational Database Watermarking Algorithm Based on Clustering and Polar Angle Expansion Robust and Reversble Relatonal Database Watermarkng Algorthm Based on Clusterng and Polar Angle Expanson Zhyong L, Junmn Lu and Wecheng Tao College of Informaton Scence and Engneerng, Hunan Unversty, Changsha,

More information

Sum of Linear and Fractional Multiobjective Programming Problem under Fuzzy Rules Constraints

Sum of Linear and Fractional Multiobjective Programming Problem under Fuzzy Rules Constraints Australan Journal of Basc and Appled Scences, 2(4): 1204-1208, 2008 ISSN 1991-8178 Sum of Lnear and Fractonal Multobjectve Programmng Problem under Fuzzy Rules Constrants 1 2 Sanjay Jan and Kalash Lachhwan

More information

2-Dimensional Image Representation. Using Beta-Spline

2-Dimensional Image Representation. Using Beta-Spline Appled Mathematcal cences, Vol. 7, 03, no. 9, 4559-4569 HIKARI Ltd, www.m-hkar.com http://dx.do.org/0.988/ams.03.3359 -Dmensonal Image Representaton Usng Beta-plne Norm Abdul Had Faculty of Computer and

More information

Positive Semi-definite Programming Localization in Wireless Sensor Networks

Positive Semi-definite Programming Localization in Wireless Sensor Networks Postve Sem-defnte Programmng Localzaton n Wreless Sensor etworks Shengdong Xe 1,, Jn Wang, Aqun Hu 1, Yunl Gu, Jang Xu, 1 School of Informaton Scence and Engneerng, Southeast Unversty, 10096, anjng Computer

More information

A mathematical programming approach to the analysis, design and scheduling of offshore oilfields

A mathematical programming approach to the analysis, design and scheduling of offshore oilfields 17 th European Symposum on Computer Aded Process Engneerng ESCAPE17 V. Plesu and P.S. Agach (Edtors) 2007 Elsever B.V. All rghts reserved. 1 A mathematcal programmng approach to the analyss, desgn and

More information

Constructing Minimum Connected Dominating Set: Algorithmic approach

Constructing Minimum Connected Dominating Set: Algorithmic approach Constructng Mnmum Connected Domnatng Set: Algorthmc approach G.N. Puroht and Usha Sharma Centre for Mathematcal Scences, Banasthal Unversty, Rajasthan 304022 usha.sharma94@yahoo.com Abstract: Connected

More information

IMPLEMENTATION OF QIM BASED AUDIO WATERMARKING USING HYBRID TRANSFORM OF SWT-DCT-SVD METHODS OPTIMIZED WITH GENETIC ALORITHM

IMPLEMENTATION OF QIM BASED AUDIO WATERMARKING USING HYBRID TRANSFORM OF SWT-DCT-SVD METHODS OPTIMIZED WITH GENETIC ALORITHM IMPLEMENTATION OF QIM BASED AUDIO WATERMARKING USING HYBRID TRANSFORM OF SWT-DCT-SVD METHODS OPTIMIZED WITH GENETIC ALORITHM Ryan Amnullah 1, Gelar Budman 2, Irma Saftr 3 1, 2, 3 FakultasTeknk Elektro,

More information

High resolution 3D Tau-p transform by matching pursuit Weiping Cao* and Warren S. Ross, Shearwater GeoServices

High resolution 3D Tau-p transform by matching pursuit Weiping Cao* and Warren S. Ross, Shearwater GeoServices Hgh resoluton 3D Tau-p transform by matchng pursut Wepng Cao* and Warren S. Ross, Shearwater GeoServces Summary The 3D Tau-p transform s of vtal sgnfcance for processng sesmc data acqured wth modern wde

More information

Skew Angle Estimation and Correction of Hand Written, Textual and Large areas of Non-Textual Document Images: A Novel Approach

Skew Angle Estimation and Correction of Hand Written, Textual and Large areas of Non-Textual Document Images: A Novel Approach Angle Estmaton and Correcton of Hand Wrtten, Textual and Large areas of Non-Textual Document Images: A Novel Approach D.R.Ramesh Babu Pyush M Kumat Mahesh D Dhannawat PES Insttute of Technology Research

More information

Meta-heuristics for Multidimensional Knapsack Problems

Meta-heuristics for Multidimensional Knapsack Problems 2012 4th Internatonal Conference on Computer Research and Development IPCSIT vol.39 (2012) (2012) IACSIT Press, Sngapore Meta-heurstcs for Multdmensonal Knapsack Problems Zhbao Man + Computer Scence Department,

More information

A Novel Adaptive Descriptor Algorithm for Ternary Pattern Textures

A Novel Adaptive Descriptor Algorithm for Ternary Pattern Textures A Novel Adaptve Descrptor Algorthm for Ternary Pattern Textures Fahuan Hu 1,2, Guopng Lu 1 *, Zengwen Dong 1 1.School of Mechancal & Electrcal Engneerng, Nanchang Unversty, Nanchang, 330031, Chna; 2. School

More information

Concurrent Apriori Data Mining Algorithms

Concurrent Apriori Data Mining Algorithms Concurrent Apror Data Mnng Algorthms Vassl Halatchev Department of Electrcal Engneerng and Computer Scence York Unversty, Toronto October 8, 2015 Outlne Why t s mportant Introducton to Assocaton Rule Mnng

More information

3D Virtual Eyeglass Frames Modeling from Multiple Camera Image Data Based on the GFFD Deformation Method

3D Virtual Eyeglass Frames Modeling from Multiple Camera Image Data Based on the GFFD Deformation Method NICOGRAPH Internatonal 2012, pp. 114-119 3D Vrtual Eyeglass Frames Modelng from Multple Camera Image Data Based on the GFFD Deformaton Method Norak Tamura, Somsangouane Sngthemphone and Katsuhro Ktama

More information

3D Face Reconstruction With Local Feature Refinement

3D Face Reconstruction With Local Feature Refinement ternatonal Journal of Multmeda and Ubqutous Engneerng Vol.9, No.8 (014), pp.59-7 http://dx.do.org/10.1457/jmue.014.9.8.06 3D Face Reconstructon Wth Local Feature Refnement Rudy Adpranata 1, Kartka Gunad

More information

Palmprint Feature Extraction Using 2-D Gabor Filters

Palmprint Feature Extraction Using 2-D Gabor Filters Palmprnt Feature Extracton Usng 2-D Gabor Flters Wa Kn Kong Davd Zhang and Wenxn L Bometrcs Research Centre Department of Computng The Hong Kong Polytechnc Unversty Kowloon Hong Kong Correspondng author:

More information

A PATTERN RECOGNITION APPROACH TO IMAGE SEGMENTATION

A PATTERN RECOGNITION APPROACH TO IMAGE SEGMENTATION 1 THE PUBLISHING HOUSE PROCEEDINGS OF THE ROMANIAN ACADEMY, Seres A, OF THE ROMANIAN ACADEMY Volume 4, Number 2/2003, pp.000-000 A PATTERN RECOGNITION APPROACH TO IMAGE SEGMENTATION Tudor BARBU Insttute

More information

Adaptive digital watermarking of images using Genetic Algorithm

Adaptive digital watermarking of images using Genetic Algorithm Adaptve dgtal watermarkng of mages usng Genetc Algorthm Bushra Skander, Muhammad Ishtaq, M. Arfan Jaffar, Muhammad Tarq, Anwar M. Mrza Department of Computer Scence, Natonal Unversty of Computer and Emergng

More information

Lobachevsky State University of Nizhni Novgorod. Polyhedron. Quick Start Guide

Lobachevsky State University of Nizhni Novgorod. Polyhedron. Quick Start Guide Lobachevsky State Unversty of Nzhn Novgorod Polyhedron Quck Start Gude Nzhn Novgorod 2016 Contents Specfcaton of Polyhedron software... 3 Theoretcal background... 4 1. Interface of Polyhedron... 6 1.1.

More information

R s s f. m y s. SPH3UW Unit 7.3 Spherical Concave Mirrors Page 1 of 12. Notes

R s s f. m y s. SPH3UW Unit 7.3 Spherical Concave Mirrors Page 1 of 12. Notes SPH3UW Unt 7.3 Sphercal Concave Mrrors Page 1 of 1 Notes Physcs Tool box Concave Mrror If the reflectng surface takes place on the nner surface of the sphercal shape so that the centre of the mrror bulges

More information

Edge Detection in Noisy Images Using the Support Vector Machines

Edge Detection in Noisy Images Using the Support Vector Machines Edge Detecton n Nosy Images Usng the Support Vector Machnes Hlaro Gómez-Moreno, Saturnno Maldonado-Bascón, Francsco López-Ferreras Sgnal Theory and Communcatons Department. Unversty of Alcalá Crta. Madrd-Barcelona

More information

New Region Incrementing Visual Cryptography Scheme

New Region Incrementing Visual Cryptography Scheme New Regon Incrementng Vsual Cryptography Scheme Chng-Nung Yang Hsang-Wen Shh Yu-Yng Chu Len Harn CSIE Dept Natonal Dong Hwa Unversty Hualen Tawan CSEE Dept Unversty of Mssour-Kansas Cty Kansas Mssour USA

More information

Subspace clustering. Clustering. Fundamental to all clustering techniques is the choice of distance measure between data points;

Subspace clustering. Clustering. Fundamental to all clustering techniques is the choice of distance measure between data points; Subspace clusterng Clusterng Fundamental to all clusterng technques s the choce of dstance measure between data ponts; D q ( ) ( ) 2 x x = x x, j k = 1 k jk Squared Eucldean dstance Assumpton: All features

More information

Shape Representation Robust to the Sketching Order Using Distance Map and Direction Histogram

Shape Representation Robust to the Sketching Order Using Distance Map and Direction Histogram Shape Representaton Robust to the Sketchng Order Usng Dstance Map and Drecton Hstogram Department of Computer Scence Yonse Unversty Kwon Yun CONTENTS Revew Topc Proposed Method System Overvew Sketch Normalzaton

More information

SLAM Summer School 2006 Practical 2: SLAM using Monocular Vision

SLAM Summer School 2006 Practical 2: SLAM using Monocular Vision SLAM Summer School 2006 Practcal 2: SLAM usng Monocular Vson Javer Cvera, Unversty of Zaragoza Andrew J. Davson, Imperal College London J.M.M Montel, Unversty of Zaragoza. josemar@unzar.es, jcvera@unzar.es,

More information

A new remote user authentication scheme for multi-server architecture

A new remote user authentication scheme for multi-server architecture Future Generaton Computer Systems 19 (2003) 13 22 A new remote user authentcaton scheme for mult-server archtecture Iuon-Chang Ln a, Mn-Shang Hwang b,, L-Hua L b a Department of Computer Scence and Informaton

More information

A Comparison between Digital Images Watermarking in Tow Different Color Spaces Using DWT2*

A Comparison between Digital Images Watermarking in Tow Different Color Spaces Using DWT2* A Comparson between Dgtal s ng n Tow Dfferent Color Spaces Usng DWT* Mehd Khall Natonal Academy of Scence of Armena Yerevan, Armena e-mal: khall.mehd@yahoo.com ABSTRACT A novel dgtal watermarkng for ownershp

More information

Performance Analysis of Data Hiding in MPEG-4 AAC Audio *

Performance Analysis of Data Hiding in MPEG-4 AAC Audio * TSINGHUA SCIENCE AND TECHNOLOGY ISSNll1007-0214ll07/21llpp55-61 Volume 14, Number 1, February 2009 Performance Analyss of Data Hdng n MPEG-4 AAC Audo * XU Shuzheng ( ) **, ZHANG Peng ( ), WANG Pengjun

More information

CLUSTERING ALGORITHMS FOR PERCEPTUAL IMAGE HASHING. Vishal Monga, Arindam Banerjee, and Brian L. Evans

CLUSTERING ALGORITHMS FOR PERCEPTUAL IMAGE HASHING. Vishal Monga, Arindam Banerjee, and Brian L. Evans CLUSTERING ALGORITHMS FOR PERCEPTUAL IMAGE HASHING Vshal Monga, Arndam Banerjee, and Bran L. Evans Center for Perceptual Systems The Unversty of Texas at Austn, Austn, TX 7871 vshal,abanerje,bevans}@ece.utexas.edu

More information

A MOVING MESH APPROACH FOR SIMULATION BUDGET ALLOCATION ON CONTINUOUS DOMAINS

A MOVING MESH APPROACH FOR SIMULATION BUDGET ALLOCATION ON CONTINUOUS DOMAINS Proceedngs of the Wnter Smulaton Conference M E Kuhl, N M Steger, F B Armstrong, and J A Jones, eds A MOVING MESH APPROACH FOR SIMULATION BUDGET ALLOCATION ON CONTINUOUS DOMAINS Mark W Brantley Chun-Hung

More information

Classifying Acoustic Transient Signals Using Artificial Intelligence

Classifying Acoustic Transient Signals Using Artificial Intelligence Classfyng Acoustc Transent Sgnals Usng Artfcal Intellgence Steve Sutton, Unversty of North Carolna At Wlmngton (suttons@charter.net) Greg Huff, Unversty of North Carolna At Wlmngton (jgh7476@uncwl.edu)

More information

Term Weighting Classification System Using the Chi-square Statistic for the Classification Subtask at NTCIR-6 Patent Retrieval Task

Term Weighting Classification System Using the Chi-square Statistic for the Classification Subtask at NTCIR-6 Patent Retrieval Task Proceedngs of NTCIR-6 Workshop Meetng, May 15-18, 2007, Tokyo, Japan Term Weghtng Classfcaton System Usng the Ch-square Statstc for the Classfcaton Subtask at NTCIR-6 Patent Retreval Task Kotaro Hashmoto

More information