TECHNICAL POINTS ABOUT ADAPTIVE STEGANOGRAPHY BY ORACLE (ASO) 161, rue Ada, 34095, Montpellier Cedex 05, France

Size: px
Start display at page:

Download "TECHNICAL POINTS ABOUT ADAPTIVE STEGANOGRAPHY BY ORACLE (ASO) 161, rue Ada, 34095, Montpellier Cedex 05, France"

Transcription

1 20th European Sgnal Processng Conference (EUSIPCO 2012) Bucharest, Romana, August 27-31, 2012 TECHNICAL POINTS ABOUT ADAPTIVE STEGANOGRAPHY BY ORACLE (ASO) Sarra Kouder 2, Marc Chaumont 1,2, Wllam Puech 2 1 Unversty of Nîmes, F Nîmes Cedex 1, France 2 LIRMM Laboratory, UMR 5506 CNRS, Unversty of Montpeller II, 161, rue Ada, 34095, Montpeller Cedex 05, France {sarra.kouder, marc.chaumont, wllam.puech}@lrmm.fr ABSTRACT ASO [1] s an adaptve embeddng scheme that has proved ts effcency compared to HUGO [2] algorthm. It s based on the use of a detectablty map that s correlated to the securty of the embeddng process. The detectablty map s calculated usng the Kodovský s ensemble classfers [3] as an oracle, whch preserves the dstrbuton of the cover mage and of the sender s database. In ths artcle, we gve the techncal ponts about ASO. We gve the detals of the detectablty map computaton, then we study the securty of the communcaton phase of ASO through the paradgm of the steganography by database. Snce the ntroduced paradgm allows the sender to choose the most secure stego mage(s) durng the transmsson of hs message, we propose some securty metrcs that can help hm to dstngush between secure and nsecure mages. We thus sgnfcantly ncrease the securty of ASO. Index Terms Steganography, Detectablty map, Ensemble classfers, Oracle, Steganography by database. 1. INTRODUCTION Steganography s the art of secret communcaton. The goal s to hde a secret message n an unsuspcous object n such a way that no one can detect t. Wth the Internet spread, several phlosophes of desgnng steganographc methods were proposed. One of the most used embeddng methods for real dgtal mages s the steganography by mnmzng of the embeddng mpact 1. Let x = (x 1,..., x n ) be a cover support composed of n elements. The goal of steganography by mnmzng the embeddng mpact s to communcate a secret message m = (m 1,..., m m ) by makng small perturbatons of cover object x to produce a stego object y = (y 1,..., y n ). For ths, we defne a dstorton functon D(x, y) that we mnmze under the constrant of a fxed payload. Ths dstorton functon s generally based on the use of a detectablty map ρ R n + 1 The prncple of mnmzng the embeddng mpact was proposed n 2007 [4]. It s based on the adaptvty of the embeddng operaton by the use of a detectablty map. whch assgns to each cover element x wth {1,..., n}, a detectablty cost ρ R + that models the mpact on the securty caused by the modfcaton of the th element. The HUGO algorthm [2] used durng the BOSS 2 competton [5] uses a detectablty map, whch attrbutes to each pxel of a cover mage a detectablty cost ρ [0, ], as suggested n [6]. The calculaton of the detectablty cost s based on the use of hgh-dmensonal features, whch are calculated from the cover mage. These features correspond to the condtonal probabltes n each pxel of the fltered mage. The MOD 3 algorthm proposed n 2011 [7], extends the HUGO proposal by defnng a parametrc detectablty cost ρ [0, ], whch s parametrzed by a hgh number of parameters. The ASO 4 embeddng algorthm that we proposed n [1], mproves the concept of the detectablty map ntroduced by HUGO. It uses a non parametrc detectablty map whereas MOD use a parametrc approach. The detectablty map ρ = {ρ [0, [} n =1 s defned by usng the functonaltes of the Kodovský s ensemble classfers [3] as an oracle. Ths preserves not only the cover mage dstrbuton, but also the dstrbuton of the sender s database. Thus, ASO ntroduces a new paradgm n steganography whch s the steganography by database that, furthermore, offers to the sender the possblty to choose the most secure mage(s) durng the transmsson phase. In ths paper, we pursue the study about the adaptve steganography by oracle [1]. We gve the techncal ponts about the embeddng algorthm (ASO), and we dscuss about the securty of the ASO s embeddng process thanks to the steganography by database paradgm. For ths, we propose some new securty measures that reflect the securty level of the stego mages. The rest of ths paper s organzed as follows. In Secton 2.1, we recall some notons about the ASO algorthm. In Sec- 2 BOSS (Break Our Steganography System) s the frst challenge on Steganalyss. The challenge started the September 9th 2010 and ended the 10th of January The goal of the player was to fgure out, whch mages contan a hdden message and whch mages do not. The steganographc algorthm was HUGO [2]. 3 MOD: Model Optmzed Dstorton. 4 ASO: Adaptve Steganography by Oracle [1]. EURASIP, ISSN

2 ton 2.2, we gve the techncal ponts about the detectablty map constructon. In Secton 2.3, we dscuss the paradgm of the steganography by database and we propose the securty metrcs. We gve expermental results n Secton 3, and we conclude n Secton 4. For the sake of smplcty, we denote by x = (x 1,..., x n ) X = {0,..., 255} n and y = (y 1,..., y n ) Y = {0,..., 255} n grayscale cover and stego mages wth n pxels. The use of any other dgtal meda s also possble. 2. ADAPTIVE STEGANOGRAPHY BY ORACLE (ASO) 2.1. General scheme ASO 5 [1] s an adaptve embeddng scheme that s based on the prncple of mnmzng embeddng mpact [4, 6]. It strves to hde a gven message m n a cover support x, whle mnmzng an ad hoc dstorton measure that s correlated to the securty of the embeddng process. The embeddng s ether smulated [4], or done by usng the STC 6 approach [6]. These embeddng algorthms requre to defne a detectablty map ρ that model the statstcal detectablty. In ASO an oracle s used to calculate a detectablty map ρ = {ρ R} n =1 that assgns a detectablty costs ρ to each pxel x : ( ρ = mn ρ (+), ρ ( ) ), (1) wth ρ (+) (resp. ρ ( ) ) the detectablty cost of changng the th pxel by +1 (resp. 1). Snce the Kodovský s FLD ensemble classfers [3] allows to splt the features space nto cover and stego regons, ASO [1] uses ths separaton as an oracle to defne the detectablty costs ρ (+) ρ (+) = where ρ (l)(+) and ρ ( ) : ρ (l)(+), and ρ ( ) =, (2) (resp. ) s the detectablty cost provded by the l th classfer, and L s the number of the FLD classfers. For each FLD classfer F l, wth l {1,..L}, that performed ts learnng on a subspace of d red dmenson, the detectablty cost ρ (l)(+) s defned as: w (l). (f ) (l)(+) (l) x x ρ (l)(+) f x =, (3) s (l) and the detectablty cost by: w (l). (f ) (l)( ) (l) x x f x =, (4) s (l) 5 For more detals about the ASO embeddng algorthm, please refer to [1], avalable on: kouder/publcatons.html. 6 STC: Syndrome Trells Codes. wth w (l) the vector orthogonal to the hyperplane separatng the two classes calculated by the classfer F l, f x (l) the feature vector that we wsh to classfy by the classfer F l, f x x (l)(+) (resp. f x x (l)( ) ) the feature vector obtaned after the modfcaton of the th pxel by +1 (resp. 1), and s (l) R + the normalzaton factor of the l th classfer F l (see [1]). By usng the functonaltes of the Kodovský s ensemble classfers [3] and the acqured knowledge of the learnng phase, ASO [1] manages to preserve not only the dstrbuton model of the current cover mage, but also the dstrbuton model of the sender s database. It thus mproves the securty of the embeddng process. ASO I II cover mage cover database Kodovský s FLD classfers «HUGO» Calculaton of the detectablty map Kodovský s FLD classfers «ASO» Calculaton of the detectablty map Process of message embeddng Process of message embeddng stego mage stego database Fg. 1. General scheme of the Adaptve Steganography by Oracle (ASO) [1]. As shown n Fgure 1, the embeddng process of ASO [1] conssts of two steps. The frst step (labeled I n Fgure 1) ams to produce a frst draft of ASO s stego mages. In ths step, the computaton of the detectablty map ρ (Eq. 1) s performed by usng the Kodovský s ensemble classfers [3] that s traned to dstngush between cover and the stego mages embedded wth HUGO [2]. The second step (labeled II n Fgure 1) s an teratve step that ams to mprove the securty of ASO. The detectablty map s calculated usng a Kodovský s ensemble classfers [3] that s traned to dstngush between the cover and the ASO s stego mages from the prevous teraton. At the end of the embeddng process, ASO allows to obtan a set of a stego mages, rather than only one stego mage Techncal ponts about detectablty map computaton The computaton of a feature vector f x R d, wth vector dmenson d d red, s CPU consumng. In our case f x s obtaned by frst applyng many hgh-pass flter and then count the m-uplets co-occurrences n the dfferent hgh-pass mages. In the ASO algorthm, the computaton of the detectablty map ρ requres to compute the values ρ (l)(+) and for each pxel x, whch nvolves the calculaton of the 1704

3 Fg. 2. Computaton of the feature varatons on a square wndow area of r = 9 wdth. The resdual 1-Dmenson flter used to compute the features has a sze (s = 3). two new feature vectors f x x (l)(+) and f x x (l)( ) resultng from the modfcaton +1 or 1 of the th pxel (see Eq. 3 and Eq. 4). Snce the vector w (l) and the normalsaton factor s (l) are calculated durng the learnng phase of the classfer, we do not need to calculate them agan durng the computaton of ρ (l)(+) and. The computatonal complexty for the constructon of the detectablty map ρ comes manly from the computaton of f x x (l)(+) and f x x (l)( ). To address ths problem, nstead of calculatng separately the feature vectors f x x (l)(+) and f x x (l)( ), we propose to only calculate, on a reduced area, the varaton (f x x (l)(+) f x (l) ) and (f x x (l)( ) f x (l) ) ntroduced by the modfcaton +1 or 1 of each pxel x. We thus defne for each pxel x a square wndow area of r wdth centred on x. Ths wndow area gves the set of pxels responsble of the changes between the vectors f x (l) and f x x (l)(+) (resp. f x x (l)( ) and f x (l) ). The pxels that are outsde of ths area do not ntroduce change between f x (l) and f x x (l)(+) (resp. f x x (l)( ) and f x (l) ). We thus do not consder those pxels durng the computaton of the feature varatons. The wdth r of the square wndow area depends on the sze s of the hgh-pass 1-Dmenson flter, and the order m of the co-occurrence matrce used to calculate the feature vectors [8]. The sze of the wndow area, on whch we calculate the varatons (f x x (l)(+) f (l) x ) and (f x x (l)( ) f (l) x ), must be large enough to cover all possble modfcatons nvolved by changng the pxel x. Knowng that changng a gven pxel x by +1 or 1 may affect (non pathologcal case) the m-uplets (x +a, x +(a+1),..., x +(a+m) ), wth a { r 2,..., r 2 m}, n all drectons, choosng r = s + 2(m 1) guarantees a vald result for the computaton of the feature varatons (f (l)(+) x x f (l) x ) and (f (l)( ) x x f (l) x ). To take an example, for a resdual 1-Dmenson flter wth s = 3 sze and m = 4 (Fgure 2), the nvolved varatons (f x x (l)(+) f x (l) ) and (f x x (l)( ) f x (l) ) are calculated on a square wndow area of wdth r = 9. Our mplementaton of ASO, for d = 5330, L = 30, d red = 250, and N = mages of , usng the parallel OpenMP lbrary on an archtecture of 8 processors Quad-Core AMD Opeteron(tm) Processor 8384, at 2.69 GHz, took less than one day and half. Knowng that on a monoprocessor, wthout the trck of the square wndow (Eq. 3 and Eq. 4), the calculaton of one feature vector f x took about 0.013s, the computaton tme of the detectablty map ρ of the mages would take 0.013s = s (more than two years) Paradgm of the steganography by database As mentoned n Secton 2.1, ASO ntroduces the new steganography by database paradgm. The embeddng process of ASO takes nto account not only the model dstrbuton of the current cover mage, but also the dstrbuton of the sender s database, thus mprovng the securty of the embeddng process. Moreover, t allows to obtan a set of stego mages nstead of just one stego mage, whch offers to the sender the opportunty to choose the most secure mage(s) durng the transmsson of hs secret message. Choosng the most relable mage(s) durng the transmsson phase can mprove the securty of ASO. In order to select the less detectable stego mage(s), we compute for each stego mage a score value that reflects ts securty level. One possble powerful method that offers ASO conssts to compute for each stego mage the number of FLD classfers that have classfed t as cover nstead of stego, from the Kodovský s ensemble classfers [3]. We thus defne the securty score as: where: S F LD f : R d {0,..., L} x Sf F LD (x), Sf F LD (x) = L F l (f x ), (5) wth F l (f x ) the decson of the classfer F l (1 for stego and 0 for cover), and f x the feature vector of the stego mage x. The hgher the score Sf F LD (x) s, the greater s the securty of the stego mage. Note that wth that measure, we obtan several stego mages wth the same score. For more fner granularty of the score value, we may use the sparsty measures that are generally used wth the One Class Neghbor Machne (OC-NM) steganalyzer [9, 10]. Let us assume that we have K cover mages from whch we compute K d-dmensonal features. By takng the set of cover mages as a tranng base, the OC-NM computes for each samples x a sparsty measure Sf oc (x) that characterzes the closeness of x to the cover mages. The OC-NM steganalyzer strves to dentfy the best threshold γ so that all samples x wth Sf oc (x) > γ are classfed as stego. Several types of sparsty measures are proposed n the orgnal publcaton on OC-NM [9]. One of the most used measure that can be adopted as a securty score, s the socalled Hlbert kernel densty estmator: Sf oc : R d R x Sf oc (x), 1705

4 where: ( ) Sf oc 1 (x) = log K k=1 1/ ( ), (6) f x f k hd 2 wth f x the feature vector of the stego mage x, f k the feature vector of the k th cover mage of the tranng set,. 2 the L 2 norm, d the feature vectors dmenson, and h a parameter of smoothness. Intutvely, snce the sparsty measures reflect the closeness of a gven mage to the covers, usng these measures as a securty score allows us to evaluate the detectablty of the used stego mage(s). The smaller s the sparsty Sf oc (x) of a gven stego mage, the greater s ts securty. 3. EXPERIMENTAL RESULTS Our experments were conducted usng the BossBase v1.00 cover database 7 contanng grayscale cover mages n the pgm format, and the same mages embedded wth ASO 8 for each payload from 0.1 bpp to 0.5 bpp. Each mage s represented by a feature vector of d = 5330 MINMAX features. The set of features comes from the 1458 dmensonal MINMAX vector wth the truncaton threshold T = 4, and the 3872 dmensonal SUM3 vector from the HOLMES features [8]. To evaluate the necessty and the mportance of the ntroduced paradgm of the steganography by database, we have bult for each payload α from 0.1 bpp to 0.5 bpp two testng databases of 500 ASO s stego mages. The base B (α) 1 conssts of 500 ASO s stego mages that have been randomly selected from the BossBase v1.00 ASO s stego mages. The base B (α) 2 s composed of the most secure 500 ASO s stego mages selected from the BossBase v1.00 ASO s stego mages usng the securty measure Sf F LD (see Eq. 5). Once calculated, for each payload, the two testng databases are then steganalyzed usng the One-Class Support Vector Machne (OC-SVM) of LIBSVM 9. The OC-SVM was traned on the BossBase v1.00 cover database usng the Gaussan kernel k(x, y) = exp( γ x y 2 ) wth γ = and ν = 0.01 whch s the desred false postve rate. The tranng data were scaled before, so that all features were n the range [ 1, +1] (the scalng parameters were derved from cover mages only). By usng the OC-SVM for the steganalyss of the two testng databases (B (α) 1 and B (α) 2 ) for each relatve payload α from 0.1 bpp to 0.5 bpp, we seek to test f the stego mages that have been selected usng the securty measure crteron 7 BossBase v1.00: A database of mages avalable on 8 The embeddng process of ASO was done usng L = 30 classfers, d = 5330, and d red = 250 [1]. 9 LIBSVM: A Lbrary for Support Vector Machnes, avalable on cjln/lbsvm/. (Eq. 5 and Eq. 6) are more secure than those selected randomly by the sender. In other words, we want to prove the mportance of choosng the most relable mage(s) durng the secret communcaton phase (.e. prove the addtonal securty feature of the steganography by database paradgm). Detecton Recall (%) Relatve payload (bpp) ASO random(b ( α ) 1 ) ASO secure(b ( α ) ) 2 Fg. 3. Detecton Recall (R) of B (α) 1 and B (α) 2 for fve relatve payloads. From the results shown n Fgure 3, for the fve relatve payloads from 0.1 bpp to 0.5 bpp the securty of the stego database B (α) 2 bult usng the securty measure crteron, s better than the securty of the randomly selected stego database B (α) 1. For all relatve payloads the detecton recall 10 R of the OC-SVM steganalyzer on B (α) 2 s lower than that on B (α) 1. For nstance, for α = 0.5 bpp, the detecton S F LD f recall R on B (α) 1 s 78%, whereas t s only 56% on B (α) 2. Smlarly, the detecton recall R on B (α) 2 at 0.4 bpp s less than that on B (α) 1 ; 55% compared to 66%. In bref, the detecton recall R on B (α) 2 for all relatve payloads s close to 50-55%. The OC-SVM steganalyzer classfes ncorrectly one out of two tmes a gven stego mage as cover mage. In other words, on B (α) 2, the OC-SVM has a random behavour, snce t can not dstngush between the cover and stego mages. secure than the stego base B (α) 1 Ths confrms that the stego database B (α) 2 s more Note that the detecton recall R of B (α) 2 at 0.1 bpp s hgher than that at 0.2 bpp. It s 53.6% at 0.1 bpp, whereas t s 50.2% at 0.2 bpp. Indeed, for payloads under 0.2 bpp, the ASO embeddng algorthm does not perform as well as at hgher payloads, snce the oracle used for computng the detectablty map (Secton 2.1) can not manage to dstngush between secure and nsecure areas [1]. The obtaned results show that the set B (α) 2 of the stego mages selected usng the securty measure Sf F LD are more secure than those of B (α) 1 that have been randomly selected. 10 number of stego mages correctly classfed The detecton recall R =. total number of stego mages 1706

5 SfFLD(x) = 30 SfFLD(x) = 28 SfFLD(x) = 29 SfFLD(x) = 27 Fg. 4. Some exemples of the selected stego mages usng the securty measure SfF LD crteron (α = 0.5 bpp, and L = 30). By usng a smple securty metrcs, such as SfF LD, we obtan a strong securty. The used steganalyzer can not dstngush between cover and stego mages. Ths confrms the relevance of choosng the most relable mage(s) durng the transmsson phase of the secret message. Moreover, we beleve that usng a more fner securty measure such as Sfoc (Eq. 6) may mprove even more the securty of the message communcaton11. Some examples of the stego mages that have been selected usng the securty measure SfF LD crteron are gven n Fgure 4. As we can see, the selected stego mages that have been judged as the most secure mages correspond to the nosy and textured mages. [3] [4] [5] 4. CONCLUSION In ths paper, we present the techncal ponts about the adaptve steganography by oracle (ASO). Frst, we dscuss about the detectablty map computaton of ASO that reduce sgnfcantly ts computatonal complexty. Then, we study the securty of ASO thanks to the paradgm of the steganography by database. Snce our embeddng ASO algorthm allows to obtan a set of stego mages nstead of just one stego mage, we offer to the sender the opportunty to choose the most undetectable stego mage(s) durng the transmsson of hs secret message. To do ths, we propose some securty metrcs that help hm to select the most relable stego mage(s). Expermental results show that usng a smple securty metrc, such as SfF LD (Eq. 5), for choosng the most secure stego mage(s), mproves sgnfcantly the securty of the communcaton phase of ASO. [6] [7] [8] ACKNOWLEDGMENTS. Ths work was supported by the Mnstry of Hgher Educaton and Scentfc Research of Peoples Democratc Republc of Algera. 5. REFERENCES [9] [1] Sarra Kouder, Marc Chaumont, and Wllam Puech, Adaptve Steganography by Oracle (ASO), n submsson. [2] Tom asˇ Pevn y, Tom asˇ Fller, and Patrck Bas, Usng HghDmensonal Image Models to Perform. Hghly Undetectable Steganography, n Informaton Hdng - 12th Internatonal 11 Because of lack of tme, we dd not test the S oc securty measure crtef ron [10] Conference, Berln, Hedelberg, October , vol of Lecture Notes n Computer Scence, IH 10, pp , Sprnger-Verlag. Jan Kodovsk y and Jessca J. Frdrch, Steganalyss n Hgh Dmensons: Fusng Classfers Bult on Random Subspaces, n Meda Watermarkng, Securty, and Forenscs XIII, part of IS&T SPIE Electronc Imagng Symposum, San Francsco, CA, January , vol. 7880, paper. 21, pp. L Jessca J. Frdrch and Tom asˇ Fller, Practcal Methods for Mnmzng Embeddng Impact n Steganography, n Securty, Steganography, and Watermarkng of Multmeda Contents IX, part of IS&T SPIE Electronc Imagng Symposum, San Jose, CA, January 29-February , vol. 6505, pp Patrck Bas, Tom asˇ Fller, and Tom as Pevn y, Break Our Steganographc System the ns and outs of organzng BOSS, n Informaton Hdng - 13th Internatonal Workshop, Prague, Czech Republc, May , vol of Lecture Notes n Computer Scence, IH 11, pp , SprngerVerlag. Tom asˇ Fller, Jan Judas, and Jessca J. Frdrch, Mnmzng Embeddng Impact n Steganography usng Trells-Coded Quantzaton, n Meda Forenscs and Securty II, part of IS&T SPIE Electronc Imagng Symposum, San Jose, CA, USA, January , vol. 7541, paper. 05. Tom asˇ Fller and Jessca J. Frdrch, Desgn of Adaptve Steganographc Schemes for Dgtal Images, n Meda Watermarkng, Securty, and Forenscs XIII, part of IS&T SPIE Electronc Imagng Symposum, San Francsco, CA, January , vol. 7880, paper. 13, pp. F Jessca J. Frdrch, Jan Kodovsk y, Vojtech Holub, and Mroslav Goljan, Steganalyss of Content Adaptve Steganography n Spatal Doman, n Informaton Hdng - 13th Internatonal Conference, Tom as Fller, Tom as Pevn y, Scott Craver, and Andrew D. Ker, Eds., Prague, Czech Republc, May , vol of Lecture Notes n Computer Scence, IH 11, Sprnger. Alberto Munoz and Javer M. Moguerza, Estmaton of hghdensty regons usng one-class neghbor machnes, IEEE Transactons on Pattern Analyss and Machne Intellgence, vol. 28(3), pp , March Tom as Pevn y and Jessca J. Frdrch, Novelty detecton n blnd steganalyss, n workshop on Multmeda and securty, part of MM&Sec 08 Proceedngs of the 10th ACM multmeda, New York, NY, USA, September , pp , ACM.

Deep learning is a good steganalysis tool when embedding key is reused for different images, even if there is a cover source-mismatch

Deep learning is a good steganalysis tool when embedding key is reused for different images, even if there is a cover source-mismatch Deep learnng s a good steganalyss tool when embeddng key s reused for dfferent mages, even f there s a cover source-msmatch Lonel PIBRE 2,3, Jérôme PASQUET 2,3, Dno IENCO 2,3, Marc CHAUMONT 1,2,3 (1) Unversty

More information

Distortion Function Designing for JPEG Steganography with Uncompressed Side-image

Distortion Function Designing for JPEG Steganography with Uncompressed Side-image Dstorton Functon Desgnng for JPEG Steganography wth Uncompressed Sde-mage Fangjun Huang School of Informaton Scence and Technology, Sun Yat-Sen Unversty, GD 56, Chna huangfj@mal.sysu.edu.cn Jwu Huang School

More information

Content Based Image Retrieval Using 2-D Discrete Wavelet with Texture Feature with Different Classifiers

Content Based Image Retrieval Using 2-D Discrete Wavelet with Texture Feature with Different Classifiers IOSR Journal of Electroncs and Communcaton Engneerng (IOSR-JECE) e-issn: 78-834,p- ISSN: 78-8735.Volume 9, Issue, Ver. IV (Mar - Apr. 04), PP 0-07 Content Based Image Retreval Usng -D Dscrete Wavelet wth

More information

A Fast Content-Based Multimedia Retrieval Technique Using Compressed Data

A Fast Content-Based Multimedia Retrieval Technique Using Compressed Data A Fast Content-Based Multmeda Retreval Technque Usng Compressed Data Borko Furht and Pornvt Saksobhavvat NSF Multmeda Laboratory Florda Atlantc Unversty, Boca Raton, Florda 3343 ABSTRACT In ths paper,

More information

Learning the Kernel Parameters in Kernel Minimum Distance Classifier

Learning the Kernel Parameters in Kernel Minimum Distance Classifier Learnng the Kernel Parameters n Kernel Mnmum Dstance Classfer Daoqang Zhang 1,, Songcan Chen and Zh-Hua Zhou 1* 1 Natonal Laboratory for Novel Software Technology Nanjng Unversty, Nanjng 193, Chna Department

More information

A Modified Median Filter for the Removal of Impulse Noise Based on the Support Vector Machines

A Modified Median Filter for the Removal of Impulse Noise Based on the Support Vector Machines A Modfed Medan Flter for the Removal of Impulse Nose Based on the Support Vector Machnes H. GOMEZ-MORENO, S. MALDONADO-BASCON, F. LOPEZ-FERRERAS, M. UTRILLA- MANSO AND P. GIL-JIMENEZ Departamento de Teoría

More information

Detecting MP3Stego using Calibrated Side Information Features

Detecting MP3Stego using Calibrated Side Information Features 2628 JOURNAL OF SOFTWARE, VOL. 8, NO. 10, OCTOBER 2013 Detectng P3Stego usng Calbrated Sde Informaton Features Xanmn Yu School of Informaton Scence and Engneerng, Nngbo Unversty Emal: mlhappy1016@163.com

More information

Classifier Selection Based on Data Complexity Measures *

Classifier Selection Based on Data Complexity Measures * Classfer Selecton Based on Data Complexty Measures * Edth Hernández-Reyes, J.A. Carrasco-Ochoa, and J.Fco. Martínez-Trndad Natonal Insttute for Astrophyscs, Optcs and Electroncs, Lus Enrque Erro No.1 Sta.

More information

Parallelism for Nested Loops with Non-uniform and Flow Dependences

Parallelism for Nested Loops with Non-uniform and Flow Dependences Parallelsm for Nested Loops wth Non-unform and Flow Dependences Sam-Jn Jeong Dept. of Informaton & Communcaton Engneerng, Cheonan Unversty, 5, Anseo-dong, Cheonan, Chungnam, 330-80, Korea. seong@cheonan.ac.kr

More information

A Binarization Algorithm specialized on Document Images and Photos

A Binarization Algorithm specialized on Document Images and Photos A Bnarzaton Algorthm specalzed on Document mages and Photos Ergna Kavalleratou Dept. of nformaton and Communcaton Systems Engneerng Unversty of the Aegean kavalleratou@aegean.gr Abstract n ths paper, a

More information

Classifying Acoustic Transient Signals Using Artificial Intelligence

Classifying Acoustic Transient Signals Using Artificial Intelligence Classfyng Acoustc Transent Sgnals Usng Artfcal Intellgence Steve Sutton, Unversty of North Carolna At Wlmngton (suttons@charter.net) Greg Huff, Unversty of North Carolna At Wlmngton (jgh7476@uncwl.edu)

More information

Hybrid Non-Blind Color Image Watermarking

Hybrid Non-Blind Color Image Watermarking Hybrd Non-Blnd Color Image Watermarkng Ms C.N.Sujatha 1, Dr. P. Satyanarayana 2 1 Assocate Professor, Dept. of ECE, SNIST, Yamnampet, Ghatkesar Hyderabad-501301, Telangana 2 Professor, Dept. of ECE, AITS,

More information

Outline. Discriminative classifiers for image recognition. Where in the World? A nearest neighbor recognition example 4/14/2011. CS 376 Lecture 22 1

Outline. Discriminative classifiers for image recognition. Where in the World? A nearest neighbor recognition example 4/14/2011. CS 376 Lecture 22 1 4/14/011 Outlne Dscrmnatve classfers for mage recognton Wednesday, Aprl 13 Krsten Grauman UT-Austn Last tme: wndow-based generc obect detecton basc ppelne face detecton wth boostng as case study Today:

More information

Edge Detection in Noisy Images Using the Support Vector Machines

Edge Detection in Noisy Images Using the Support Vector Machines Edge Detecton n Nosy Images Usng the Support Vector Machnes Hlaro Gómez-Moreno, Saturnno Maldonado-Bascón, Francsco López-Ferreras Sgnal Theory and Communcatons Department. Unversty of Alcalá Crta. Madrd-Barcelona

More information

Support Vector Machines

Support Vector Machines /9/207 MIST.6060 Busness Intellgence and Data Mnng What are Support Vector Machnes? Support Vector Machnes Support Vector Machnes (SVMs) are supervsed learnng technques that analyze data and recognze patterns.

More information

Fuzzy Filtering Algorithms for Image Processing: Performance Evaluation of Various Approaches

Fuzzy Filtering Algorithms for Image Processing: Performance Evaluation of Various Approaches Proceedngs of the Internatonal Conference on Cognton and Recognton Fuzzy Flterng Algorthms for Image Processng: Performance Evaluaton of Varous Approaches Rajoo Pandey and Umesh Ghanekar Department of

More information

12/2/2009. Announcements. Parametric / Non-parametric. Case-Based Reasoning. Nearest-Neighbor on Images. Nearest-Neighbor Classification

12/2/2009. Announcements. Parametric / Non-parametric. Case-Based Reasoning. Nearest-Neighbor on Images. Nearest-Neighbor Classification Introducton to Artfcal Intellgence V22.0472-001 Fall 2009 Lecture 24: Nearest-Neghbors & Support Vector Machnes Rob Fergus Dept of Computer Scence, Courant Insttute, NYU Sldes from Danel Yeung, John DeNero

More information

TN348: Openlab Module - Colocalization

TN348: Openlab Module - Colocalization TN348: Openlab Module - Colocalzaton Topc The Colocalzaton module provdes the faclty to vsualze and quantfy colocalzaton between pars of mages. The Colocalzaton wndow contans a prevew of the two mages

More information

Improvement of Spatial Resolution Using BlockMatching Based Motion Estimation and Frame. Integration

Improvement of Spatial Resolution Using BlockMatching Based Motion Estimation and Frame. Integration Improvement of Spatal Resoluton Usng BlockMatchng Based Moton Estmaton and Frame Integraton Danya Suga and Takayuk Hamamoto Graduate School of Engneerng, Tokyo Unversty of Scence, 6-3-1, Nuku, Katsuska-ku,

More information

The Research of Support Vector Machine in Agricultural Data Classification

The Research of Support Vector Machine in Agricultural Data Classification The Research of Support Vector Machne n Agrcultural Data Classfcaton Le Sh, Qguo Duan, Xnmng Ma, Me Weng College of Informaton and Management Scence, HeNan Agrcultural Unversty, Zhengzhou 45000 Chna Zhengzhou

More information

Determining the Optimal Bandwidth Based on Multi-criterion Fusion

Determining the Optimal Bandwidth Based on Multi-criterion Fusion Proceedngs of 01 4th Internatonal Conference on Machne Learnng and Computng IPCSIT vol. 5 (01) (01) IACSIT Press, Sngapore Determnng the Optmal Bandwdth Based on Mult-crteron Fuson Ha-L Lang 1+, Xan-Mn

More information

Lecture 5: Multilayer Perceptrons

Lecture 5: Multilayer Perceptrons Lecture 5: Multlayer Perceptrons Roger Grosse 1 Introducton So far, we ve only talked about lnear models: lnear regresson and lnear bnary classfers. We noted that there are functons that can t be represented

More information

CLASSIFICATION OF ULTRASONIC SIGNALS

CLASSIFICATION OF ULTRASONIC SIGNALS The 8 th Internatonal Conference of the Slovenan Socety for Non-Destructve Testng»Applcaton of Contemporary Non-Destructve Testng n Engneerng«September -3, 5, Portorož, Slovena, pp. 7-33 CLASSIFICATION

More information

Simulation Based Analysis of FAST TCP using OMNET++

Simulation Based Analysis of FAST TCP using OMNET++ Smulaton Based Analyss of FAST TCP usng OMNET++ Umar ul Hassan 04030038@lums.edu.pk Md Term Report CS678 Topcs n Internet Research Sprng, 2006 Introducton Internet traffc s doublng roughly every 3 months

More information

Statistical Steganalyis of Images Using Open Source Software

Statistical Steganalyis of Images Using Open Source Software Statstcal Steganalys of Images Usng Open Source Software Bhargav Kapa, Stefan A. Robla Department of Computer Scence Montclar State Unversty Montclar, NJ 07043 roblas@mal.montclar.edu Abstract In ths paper

More information

Machine Learning. Support Vector Machines. (contains material adapted from talks by Constantin F. Aliferis & Ioannis Tsamardinos, and Martin Law)

Machine Learning. Support Vector Machines. (contains material adapted from talks by Constantin F. Aliferis & Ioannis Tsamardinos, and Martin Law) Machne Learnng Support Vector Machnes (contans materal adapted from talks by Constantn F. Alfers & Ioanns Tsamardnos, and Martn Law) Bryan Pardo, Machne Learnng: EECS 349 Fall 2014 Support Vector Machnes

More information

Skew Angle Estimation and Correction of Hand Written, Textual and Large areas of Non-Textual Document Images: A Novel Approach

Skew Angle Estimation and Correction of Hand Written, Textual and Large areas of Non-Textual Document Images: A Novel Approach Angle Estmaton and Correcton of Hand Wrtten, Textual and Large areas of Non-Textual Document Images: A Novel Approach D.R.Ramesh Babu Pyush M Kumat Mahesh D Dhannawat PES Insttute of Technology Research

More information

Data Mining: Model Evaluation

Data Mining: Model Evaluation Data Mnng: Model Evaluaton Aprl 16, 2013 1 Issues: Evaluatng Classfcaton Methods Accurac classfer accurac: predctng class label predctor accurac: guessng value of predcted attrbutes Speed tme to construct

More information

Identify the Attack in Embedded Image with Steganalysis Detection Method by PSNR and RGB Intensity

Identify the Attack in Embedded Image with Steganalysis Detection Method by PSNR and RGB Intensity Internatonal Journal of Computer Systems (ISSN: 394-1065), Volume 03 Issue 07, July, 016 Avalable at http://www.jcsonlne.com/ Identfy the Attack n Embedded Image wth Steganalyss Detecton Method by PSNR

More information

A Secured Method for Image Steganography Based On Pixel Values

A Secured Method for Image Steganography Based On Pixel Values A Secured Method for Image Steganography Based On Pxel Values Tarun Gulat #, Sanskrt Gupta * # Assocate Professor, Electroncs and Communcaton Engneerng Department, MMEC, M.M.U., Mullana, Ambala, Haryana,

More information

Parallel matrix-vector multiplication

Parallel matrix-vector multiplication Appendx A Parallel matrx-vector multplcaton The reduced transton matrx of the three-dmensonal cage model for gel electrophoress, descrbed n secton 3.2, becomes excessvely large for polymer lengths more

More information

Enhanced AMBTC for Image Compression using Block Classification and Interpolation

Enhanced AMBTC for Image Compression using Block Classification and Interpolation Internatonal Journal of Computer Applcatons (0975 8887) Volume 5 No.0, August 0 Enhanced AMBTC for Image Compresson usng Block Classfcaton and Interpolaton S. Vmala Dept. of Comp. Scence Mother Teresa

More information

A PATTERN RECOGNITION APPROACH TO IMAGE SEGMENTATION

A PATTERN RECOGNITION APPROACH TO IMAGE SEGMENTATION 1 THE PUBLISHING HOUSE PROCEEDINGS OF THE ROMANIAN ACADEMY, Seres A, OF THE ROMANIAN ACADEMY Volume 4, Number 2/2003, pp.000-000 A PATTERN RECOGNITION APPROACH TO IMAGE SEGMENTATION Tudor BARBU Insttute

More information

Term Weighting Classification System Using the Chi-square Statistic for the Classification Subtask at NTCIR-6 Patent Retrieval Task

Term Weighting Classification System Using the Chi-square Statistic for the Classification Subtask at NTCIR-6 Patent Retrieval Task Proceedngs of NTCIR-6 Workshop Meetng, May 15-18, 2007, Tokyo, Japan Term Weghtng Classfcaton System Usng the Ch-square Statstc for the Classfcaton Subtask at NTCIR-6 Patent Retreval Task Kotaro Hashmoto

More information

Support Vector Machines

Support Vector Machines Support Vector Machnes Decson surface s a hyperplane (lne n 2D) n feature space (smlar to the Perceptron) Arguably, the most mportant recent dscovery n machne learnng In a nutshell: map the data to a predetermned

More information

BOOSTING CLASSIFICATION ACCURACY WITH SAMPLES CHOSEN FROM A VALIDATION SET

BOOSTING CLASSIFICATION ACCURACY WITH SAMPLES CHOSEN FROM A VALIDATION SET 1 BOOSTING CLASSIFICATION ACCURACY WITH SAMPLES CHOSEN FROM A VALIDATION SET TZU-CHENG CHUANG School of Electrcal and Computer Engneerng, Purdue Unversty, West Lafayette, Indana 47907 SAUL B. GELFAND School

More information

A Fusion Steganographic Algorithm Based on Faster R-CNN

A Fusion Steganographic Algorithm Based on Faster R-CNN Copyrght 2018 Tech Scence Press CMC, vol.55, no.1, pp.1-16, 2018 A Fuson Steganographc Algorthm Based on Faster R-CNN Ruohan Meng 1, 2, Steven G. Rce 3, Jn Wang 4 1, 2, * and Xngmng Sun Abstract: The am

More information

EYE CENTER LOCALIZATION ON A FACIAL IMAGE BASED ON MULTI-BLOCK LOCAL BINARY PATTERNS

EYE CENTER LOCALIZATION ON A FACIAL IMAGE BASED ON MULTI-BLOCK LOCAL BINARY PATTERNS P.G. Demdov Yaroslavl State Unversty Anatoly Ntn, Vladmr Khryashchev, Olga Stepanova, Igor Kostern EYE CENTER LOCALIZATION ON A FACIAL IMAGE BASED ON MULTI-BLOCK LOCAL BINARY PATTERNS Yaroslavl, 2015 Eye

More information

Accounting for the Use of Different Length Scale Factors in x, y and z Directions

Accounting for the Use of Different Length Scale Factors in x, y and z Directions 1 Accountng for the Use of Dfferent Length Scale Factors n x, y and z Drectons Taha Soch (taha.soch@kcl.ac.uk) Imagng Scences & Bomedcal Engneerng, Kng s College London, The Rayne Insttute, St Thomas Hosptal,

More information

Face Recognition University at Buffalo CSE666 Lecture Slides Resources:

Face Recognition University at Buffalo CSE666 Lecture Slides Resources: Face Recognton Unversty at Buffalo CSE666 Lecture Sldes Resources: http://www.face-rec.org/algorthms/ Overvew of face recognton algorthms Correlaton - Pxel based correspondence between two face mages Structural

More information

FEATURE EXTRACTION. Dr. K.Vijayarekha. Associate Dean School of Electrical and Electronics Engineering SASTRA University, Thanjavur

FEATURE EXTRACTION. Dr. K.Vijayarekha. Associate Dean School of Electrical and Electronics Engineering SASTRA University, Thanjavur FEATURE EXTRACTION Dr. K.Vjayarekha Assocate Dean School of Electrcal and Electroncs Engneerng SASTRA Unversty, Thanjavur613 41 Jont Intatve of IITs and IISc Funded by MHRD Page 1 of 8 Table of Contents

More information

CHAPTER 3 SEQUENTIAL MINIMAL OPTIMIZATION TRAINED SUPPORT VECTOR CLASSIFIER FOR CANCER PREDICTION

CHAPTER 3 SEQUENTIAL MINIMAL OPTIMIZATION TRAINED SUPPORT VECTOR CLASSIFIER FOR CANCER PREDICTION 48 CHAPTER 3 SEQUENTIAL MINIMAL OPTIMIZATION TRAINED SUPPORT VECTOR CLASSIFIER FOR CANCER PREDICTION 3.1 INTRODUCTION The raw mcroarray data s bascally an mage wth dfferent colors ndcatng hybrdzaton (Xue

More information

Local Quaternary Patterns and Feature Local Quaternary Patterns

Local Quaternary Patterns and Feature Local Quaternary Patterns Local Quaternary Patterns and Feature Local Quaternary Patterns Jayu Gu and Chengjun Lu The Department of Computer Scence, New Jersey Insttute of Technology, Newark, NJ 0102, USA Abstract - Ths paper presents

More information

A Robust Webpage Information Hiding Method Based on the Slash of Tag

A Robust Webpage Information Hiding Method Based on the Slash of Tag Advanced Engneerng Forum Onlne: 2012-09-26 ISSN: 2234-991X, Vols. 6-7, pp 361-366 do:10.4028/www.scentfc.net/aef.6-7.361 2012 Trans Tech Publcatons, Swtzerland A Robust Webpage Informaton Hdng Method Based

More information

MULTISPECTRAL IMAGES CLASSIFICATION BASED ON KLT AND ATR AUTOMATIC TARGET RECOGNITION

MULTISPECTRAL IMAGES CLASSIFICATION BASED ON KLT AND ATR AUTOMATIC TARGET RECOGNITION MULTISPECTRAL IMAGES CLASSIFICATION BASED ON KLT AND ATR AUTOMATIC TARGET RECOGNITION Paulo Quntlano 1 & Antono Santa-Rosa 1 Federal Polce Department, Brasla, Brazl. E-mals: quntlano.pqs@dpf.gov.br and

More information

Related-Mode Attacks on CTR Encryption Mode

Related-Mode Attacks on CTR Encryption Mode Internatonal Journal of Network Securty, Vol.4, No.3, PP.282 287, May 2007 282 Related-Mode Attacks on CTR Encrypton Mode Dayn Wang, Dongda Ln, and Wenlng Wu (Correspondng author: Dayn Wang) Key Laboratory

More information

Efficient Text Classification by Weighted Proximal SVM *

Efficient Text Classification by Weighted Proximal SVM * Effcent ext Classfcaton by Weghted Proxmal SVM * Dong Zhuang 1, Benyu Zhang, Qang Yang 3, Jun Yan 4, Zheng Chen, Yng Chen 1 1 Computer Scence and Engneerng, Bejng Insttute of echnology, Bejng 100081, Chna

More information

User Authentication Based On Behavioral Mouse Dynamics Biometrics

User Authentication Based On Behavioral Mouse Dynamics Biometrics User Authentcaton Based On Behavoral Mouse Dynamcs Bometrcs Chee-Hyung Yoon Danel Donghyun Km Department of Computer Scence Department of Computer Scence Stanford Unversty Stanford Unversty Stanford, CA

More information

Detection of an Object by using Principal Component Analysis

Detection of an Object by using Principal Component Analysis Detecton of an Object by usng Prncpal Component Analyss 1. G. Nagaven, 2. Dr. T. Sreenvasulu Reddy 1. M.Tech, Department of EEE, SVUCE, Trupath, Inda. 2. Assoc. Professor, Department of ECE, SVUCE, Trupath,

More information

Comparison Study of Textural Descriptors for Training Neural Network Classifiers

Comparison Study of Textural Descriptors for Training Neural Network Classifiers Comparson Study of Textural Descrptors for Tranng Neural Network Classfers G.D. MAGOULAS (1) S.A. KARKANIS (1) D.A. KARRAS () and M.N. VRAHATIS (3) (1) Department of Informatcs Unversty of Athens GR-157.84

More information

High Payload Reversible Data Hiding Scheme Using Difference Segmentation and Histogram Shifting

High Payload Reversible Data Hiding Scheme Using Difference Segmentation and Histogram Shifting JOURNAL OF ELECTRONIC SCIENCE AND TECHNOLOGY, VOL. 11, NO. 1, MARCH 2013 9 Hgh Payload Reversble Data Hdng Scheme Usng Dfference Segmentaton and Hstogram Shftng Yung-Chen Chou and Huang-Chng L Abstract

More information

Network Intrusion Detection Based on PSO-SVM

Network Intrusion Detection Based on PSO-SVM TELKOMNIKA Indonesan Journal of Electrcal Engneerng Vol.1, No., February 014, pp. 150 ~ 1508 DOI: http://dx.do.org/10.11591/telkomnka.v1.386 150 Network Intruson Detecton Based on PSO-SVM Changsheng Xang*

More information

Learning-based License Plate Detection on Edge Features

Learning-based License Plate Detection on Edge Features Learnng-based Lcense Plate Detecton on Edge Features Wng Teng Ho, Woo Hen Yap, Yong Haur Tay Computer Vson and Intellgent Systems (CVIS) Group Unverst Tunku Abdul Rahman, Malaysa wngteng_h@yahoo.com, woohen@yahoo.com,

More information

CAN COMPUTERS LEARN FASTER? Seyda Ertekin Computer Science & Engineering The Pennsylvania State University

CAN COMPUTERS LEARN FASTER? Seyda Ertekin Computer Science & Engineering The Pennsylvania State University CAN COMPUTERS LEARN FASTER? Seyda Ertekn Computer Scence & Engneerng The Pennsylvana State Unversty sertekn@cse.psu.edu ABSTRACT Ever snce computers were nvented, manknd wondered whether they mght be made

More information

Fast Feature Value Searching for Face Detection

Fast Feature Value Searching for Face Detection Vol., No. 2 Computer and Informaton Scence Fast Feature Value Searchng for Face Detecton Yunyang Yan Department of Computer Engneerng Huayn Insttute of Technology Hua an 22300, Chna E-mal: areyyyke@63.com

More information

Incremental Learning with Support Vector Machines and Fuzzy Set Theory

Incremental Learning with Support Vector Machines and Fuzzy Set Theory The 25th Workshop on Combnatoral Mathematcs and Computaton Theory Incremental Learnng wth Support Vector Machnes and Fuzzy Set Theory Yu-Mng Chuang 1 and Cha-Hwa Ln 2* 1 Department of Computer Scence and

More information

FINDING IMPORTANT NODES IN SOCIAL NETWORKS BASED ON MODIFIED PAGERANK

FINDING IMPORTANT NODES IN SOCIAL NETWORKS BASED ON MODIFIED PAGERANK FINDING IMPORTANT NODES IN SOCIAL NETWORKS BASED ON MODIFIED PAGERANK L-qng Qu, Yong-quan Lang 2, Jng-Chen 3, 2 College of Informaton Scence and Technology, Shandong Unversty of Scence and Technology,

More information

Lecture 13: High-dimensional Images

Lecture 13: High-dimensional Images Lec : Hgh-dmensonal Images Grayscale Images Lecture : Hgh-dmensonal Images Math 90 Prof. Todd Wttman The Ctadel A grayscale mage s an nteger-valued D matrx. An 8-bt mage takes on values between 0 and 55.

More information

A Background Subtraction for a Vision-based User Interface *

A Background Subtraction for a Vision-based User Interface * A Background Subtracton for a Vson-based User Interface * Dongpyo Hong and Woontack Woo KJIST U-VR Lab. {dhon wwoo}@kjst.ac.kr Abstract In ths paper, we propose a robust and effcent background subtracton

More information

Classification of Face Images Based on Gender using Dimensionality Reduction Techniques and SVM

Classification of Face Images Based on Gender using Dimensionality Reduction Techniques and SVM Classfcaton of Face Images Based on Gender usng Dmensonalty Reducton Technques and SVM Fahm Mannan 260 266 294 School of Computer Scence McGll Unversty Abstract Ths report presents gender classfcaton based

More information

Face Detection with Deep Learning

Face Detection with Deep Learning Face Detecton wth Deep Learnng Yu Shen Yus122@ucsd.edu A13227146 Kuan-We Chen kuc010@ucsd.edu A99045121 Yzhou Hao y3hao@ucsd.edu A98017773 Mn Hsuan Wu mhwu@ucsd.edu A92424998 Abstract The project here

More information

Reducing Frame Rate for Object Tracking

Reducing Frame Rate for Object Tracking Reducng Frame Rate for Object Trackng Pavel Korshunov 1 and We Tsang Oo 2 1 Natonal Unversty of Sngapore, Sngapore 11977, pavelkor@comp.nus.edu.sg 2 Natonal Unversty of Sngapore, Sngapore 11977, oowt@comp.nus.edu.sg

More information

Feature Reduction and Selection

Feature Reduction and Selection Feature Reducton and Selecton Dr. Shuang LIANG School of Software Engneerng TongJ Unversty Fall, 2012 Today s Topcs Introducton Problems of Dmensonalty Feature Reducton Statstc methods Prncpal Components

More information

BAYESIAN MULTI-SOURCE DOMAIN ADAPTATION

BAYESIAN MULTI-SOURCE DOMAIN ADAPTATION BAYESIAN MULTI-SOURCE DOMAIN ADAPTATION SHI-LIANG SUN, HONG-LEI SHI Department of Computer Scence and Technology, East Chna Normal Unversty 500 Dongchuan Road, Shangha 200241, P. R. Chna E-MAIL: slsun@cs.ecnu.edu.cn,

More information

SLAM Summer School 2006 Practical 2: SLAM using Monocular Vision

SLAM Summer School 2006 Practical 2: SLAM using Monocular Vision SLAM Summer School 2006 Practcal 2: SLAM usng Monocular Vson Javer Cvera, Unversty of Zaragoza Andrew J. Davson, Imperal College London J.M.M Montel, Unversty of Zaragoza. josemar@unzar.es, jcvera@unzar.es,

More information

The Shortest Path of Touring Lines given in the Plane

The Shortest Path of Touring Lines given in the Plane Send Orders for Reprnts to reprnts@benthamscence.ae 262 The Open Cybernetcs & Systemcs Journal, 2015, 9, 262-267 The Shortest Path of Tourng Lnes gven n the Plane Open Access Ljuan Wang 1,2, Dandan He

More information

Vol. 5, No. 3 March 2014 ISSN Journal of Emerging Trends in Computing and Information Sciences CIS Journal. All rights reserved.

Vol. 5, No. 3 March 2014 ISSN Journal of Emerging Trends in Computing and Information Sciences CIS Journal. All rights reserved. Journal of Emergng Trends n Computng and Informaton Scences 009-03 CIS Journal. All rghts reserved. http://www.csjournal.org Unhealthy Detecton n Lvestock Texture Images usng Subsampled Contourlet Transform

More information

A Probabilistic Approach to Detect Urban Regions from Remotely Sensed Images Based on Combination of Local Features

A Probabilistic Approach to Detect Urban Regions from Remotely Sensed Images Based on Combination of Local Features A Probablstc Approach to Detect Urban Regons from Remotely Sensed Images Based on Combnaton of Local Features Berl Sırmaçek German Aerospace Center (DLR) Remote Sensng Technology Insttute Weßlng, 82234,

More information

Article Reversible Dual-Image-Based Hiding Scheme Using Block Folding Technique

Article Reversible Dual-Image-Based Hiding Scheme Using Block Folding Technique Artcle Reversble Dual-Image-Based Hdng Scheme Usng Block Foldng Technque Tzu-Chuen Lu, * and Hu-Shh Leng Department of Informaton Management, Chaoyang Unversty of Technology, Tachung 4349, Tawan Department

More information

Random Kernel Perceptron on ATTiny2313 Microcontroller

Random Kernel Perceptron on ATTiny2313 Microcontroller Random Kernel Perceptron on ATTny233 Mcrocontroller Nemanja Djurc Department of Computer and Informaton Scences, Temple Unversty Phladelpha, PA 922, USA nemanja.djurc@temple.edu Slobodan Vucetc Department

More information

Image Representation & Visualization Basic Imaging Algorithms Shape Representation and Analysis. outline

Image Representation & Visualization Basic Imaging Algorithms Shape Representation and Analysis. outline mage Vsualzaton mage Vsualzaton mage Representaton & Vsualzaton Basc magng Algorthms Shape Representaton and Analyss outlne mage Representaton & Vsualzaton Basc magng Algorthms Shape Representaton and

More information

Helsinki University Of Technology, Systems Analysis Laboratory Mat Independent research projects in applied mathematics (3 cr)

Helsinki University Of Technology, Systems Analysis Laboratory Mat Independent research projects in applied mathematics (3 cr) Helsnk Unversty Of Technology, Systems Analyss Laboratory Mat-2.08 Independent research projects n appled mathematcs (3 cr) "! #$&% Antt Laukkanen 506 R ajlaukka@cc.hut.f 2 Introducton...3 2 Multattrbute

More information

Classification Based Mode Decisions for Video over Networks

Classification Based Mode Decisions for Video over Networks Classfcaton Based Mode Decsons for Vdeo over Networks Deepak S. Turaga and Tsuhan Chen Advanced Multmeda Processng Lab Tranng data for Inter-Intra Decson Inter-Intra Decson Regons pdf 6 5 6 5 Energy 4

More information

SVM-based Learning for Multiple Model Estimation

SVM-based Learning for Multiple Model Estimation SVM-based Learnng for Multple Model Estmaton Vladmr Cherkassky and Yunqan Ma Department of Electrcal and Computer Engneerng Unversty of Mnnesota Mnneapols, MN 55455 {cherkass,myq}@ece.umn.edu Abstract:

More information

An Image Fusion Approach Based on Segmentation Region

An Image Fusion Approach Based on Segmentation Region Rong Wang, L-Qun Gao, Shu Yang, Yu-Hua Cha, and Yan-Chun Lu An Image Fuson Approach Based On Segmentaton Regon An Image Fuson Approach Based on Segmentaton Regon Rong Wang, L-Qun Gao, Shu Yang 3, Yu-Hua

More information

NUMERICAL SOLVING OPTIMAL CONTROL PROBLEMS BY THE METHOD OF VARIATIONS

NUMERICAL SOLVING OPTIMAL CONTROL PROBLEMS BY THE METHOD OF VARIATIONS ARPN Journal of Engneerng and Appled Scences 006-017 Asan Research Publshng Network (ARPN). All rghts reserved. NUMERICAL SOLVING OPTIMAL CONTROL PROBLEMS BY THE METHOD OF VARIATIONS Igor Grgoryev, Svetlana

More information

Classification / Regression Support Vector Machines

Classification / Regression Support Vector Machines Classfcaton / Regresson Support Vector Machnes Jeff Howbert Introducton to Machne Learnng Wnter 04 Topcs SVM classfers for lnearly separable classes SVM classfers for non-lnearly separable classes SVM

More information

Modular PCA Face Recognition Based on Weighted Average

Modular PCA Face Recognition Based on Weighted Average odern Appled Scence odular PCA Face Recognton Based on Weghted Average Chengmao Han (Correspondng author) Department of athematcs, Lny Normal Unversty Lny 76005, Chna E-mal: hanchengmao@163.com Abstract

More information

Performance Analysis of Data Hiding in MPEG-4 AAC Audio *

Performance Analysis of Data Hiding in MPEG-4 AAC Audio * TSINGHUA SCIENCE AND TECHNOLOGY ISSNll1007-0214ll07/21llpp55-61 Volume 14, Number 1, February 2009 Performance Analyss of Data Hdng n MPEG-4 AAC Audo * XU Shuzheng ( ) **, ZHANG Peng ( ), WANG Pengjun

More information

X- Chart Using ANOM Approach

X- Chart Using ANOM Approach ISSN 1684-8403 Journal of Statstcs Volume 17, 010, pp. 3-3 Abstract X- Chart Usng ANOM Approach Gullapall Chakravarth 1 and Chaluvad Venkateswara Rao Control lmts for ndvdual measurements (X) chart are

More information

Enhanced Watermarking Technique for Color Images using Visual Cryptography

Enhanced Watermarking Technique for Color Images using Visual Cryptography Informaton Assurance and Securty Letters 1 (2010) 024-028 Enhanced Watermarkng Technque for Color Images usng Vsual Cryptography Enas F. Al rawashdeh 1, Rawan I.Zaghloul 2 1 Balqa Appled Unversty, MIS

More information

Keywords - Wep page classification; bag of words model; topic model; hierarchical classification; Support Vector Machines

Keywords - Wep page classification; bag of words model; topic model; hierarchical classification; Support Vector Machines (IJCSIS) Internatonal Journal of Computer Scence and Informaton Securty, Herarchcal Web Page Classfcaton Based on a Topc Model and Neghborng Pages Integraton Wongkot Srura Phayung Meesad Choochart Haruechayasak

More information

Compiler Design. Spring Register Allocation. Sample Exercises and Solutions. Prof. Pedro C. Diniz

Compiler Design. Spring Register Allocation. Sample Exercises and Solutions. Prof. Pedro C. Diniz Compler Desgn Sprng 2014 Regster Allocaton Sample Exercses and Solutons Prof. Pedro C. Dnz USC / Informaton Scences Insttute 4676 Admralty Way, Sute 1001 Marna del Rey, Calforna 90292 pedro@s.edu Regster

More information

Quality Improvement Algorithm for Tetrahedral Mesh Based on Optimal Delaunay Triangulation

Quality Improvement Algorithm for Tetrahedral Mesh Based on Optimal Delaunay Triangulation Intellgent Informaton Management, 013, 5, 191-195 Publshed Onlne November 013 (http://www.scrp.org/journal/m) http://dx.do.org/10.36/m.013.5601 Qualty Improvement Algorthm for Tetrahedral Mesh Based on

More information

Research Article High Capacity Reversible Watermarking for Audio by Histogram Shifting and Predicted Error Expansion

Research Article High Capacity Reversible Watermarking for Audio by Histogram Shifting and Predicted Error Expansion e Scentfc World Journal, Artcle ID 656251, 7 pages http://dx.do.org/1.1155/214/656251 Research Artcle Hgh Capacty Reversble Watermarkng for Audo by Hstogram Shftng and Predcted Error Expanson Fe Wang,

More information

A Deflected Grid-based Algorithm for Clustering Analysis

A Deflected Grid-based Algorithm for Clustering Analysis A Deflected Grd-based Algorthm for Clusterng Analyss NANCY P. LIN, CHUNG-I CHANG, HAO-EN CHUEH, HUNG-JEN CHEN, WEI-HUA HAO Department of Computer Scence and Informaton Engneerng Tamkang Unversty 5 Yng-chuan

More information

Learning a Class-Specific Dictionary for Facial Expression Recognition

Learning a Class-Specific Dictionary for Facial Expression Recognition BULGARIAN ACADEMY OF SCIENCES CYBERNETICS AND INFORMATION TECHNOLOGIES Volume 16, No 4 Sofa 016 Prnt ISSN: 1311-970; Onlne ISSN: 1314-4081 DOI: 10.1515/cat-016-0067 Learnng a Class-Specfc Dctonary for

More information

High-Boost Mesh Filtering for 3-D Shape Enhancement

High-Boost Mesh Filtering for 3-D Shape Enhancement Hgh-Boost Mesh Flterng for 3-D Shape Enhancement Hrokazu Yagou Λ Alexander Belyaev y Damng We z Λ y z ; ; Shape Modelng Laboratory, Unversty of Azu, Azu-Wakamatsu 965-8580 Japan y Computer Graphcs Group,

More information

Problem Definitions and Evaluation Criteria for Computational Expensive Optimization

Problem Definitions and Evaluation Criteria for Computational Expensive Optimization Problem efntons and Evaluaton Crtera for Computatonal Expensve Optmzaton B. Lu 1, Q. Chen and Q. Zhang 3, J. J. Lang 4, P. N. Suganthan, B. Y. Qu 6 1 epartment of Computng, Glyndwr Unversty, UK Faclty

More information

Face Recognition Method Based on Within-class Clustering SVM

Face Recognition Method Based on Within-class Clustering SVM Face Recognton Method Based on Wthn-class Clusterng SVM Yan Wu, Xao Yao and Yng Xa Department of Computer Scence and Engneerng Tong Unversty Shangha, Chna Abstract - A face recognton method based on Wthn-class

More information

[33]. As we have seen there are different algorithms for compressing the speech. The

[33]. As we have seen there are different algorithms for compressing the speech. The 49 5. LD-CELP SPEECH CODER 5.1 INTRODUCTION Speech compresson s one of the mportant doman n dgtal communcaton [33]. As we have seen there are dfferent algorthms for compressng the speech. The mportant

More information

Coding Artifact Reduction Using Edge Map Guided Adaptive and Fuzzy Filter

Coding Artifact Reduction Using Edge Map Guided Adaptive and Fuzzy Filter MEL A MITSUBISHI ELECTIC ESEACH LABOATOY http://www.merl.com Codng Artfact educton Usng Edge Map Guded Adaptve and Fuzzy Flter Hao-Song Kong Yao Ne Anthony Vetro Hufang Sun Kenneth E. Barner T-2004-056

More information

Information Hiding Watermarking Detection Technique by PSNR and RGB Intensity

Information Hiding Watermarking Detection Technique by PSNR and RGB Intensity www..org 3 Informaton Hdng Watermarkng Detecton Technque by PSNR and RGB Intensty 1 Neha Chauhan, Akhlesh A. Waoo, 3 P. S. Patheja 1 Research Scholar, BIST, Bhopal, Inda.,3 Assstant Professor, BIST, Bhopal,

More information

Evaluation of an Enhanced Scheme for High-level Nested Network Mobility

Evaluation of an Enhanced Scheme for High-level Nested Network Mobility IJCSNS Internatonal Journal of Computer Scence and Network Securty, VOL.15 No.10, October 2015 1 Evaluaton of an Enhanced Scheme for Hgh-level Nested Network Moblty Mohammed Babker Al Mohammed, Asha Hassan.

More information

Smoothing Spline ANOVA for variable screening

Smoothing Spline ANOVA for variable screening Smoothng Splne ANOVA for varable screenng a useful tool for metamodels tranng and mult-objectve optmzaton L. Rcco, E. Rgon, A. Turco Outlne RSM Introducton Possble couplng Test case MOO MOO wth Game Theory

More information

Optimal Workload-based Weighted Wavelet Synopses

Optimal Workload-based Weighted Wavelet Synopses Optmal Workload-based Weghted Wavelet Synopses Yoss Matas School of Computer Scence Tel Avv Unversty Tel Avv 69978, Israel matas@tau.ac.l Danel Urel School of Computer Scence Tel Avv Unversty Tel Avv 69978,

More information

A Novel Adaptive Descriptor Algorithm for Ternary Pattern Textures

A Novel Adaptive Descriptor Algorithm for Ternary Pattern Textures A Novel Adaptve Descrptor Algorthm for Ternary Pattern Textures Fahuan Hu 1,2, Guopng Lu 1 *, Zengwen Dong 1 1.School of Mechancal & Electrcal Engneerng, Nanchang Unversty, Nanchang, 330031, Chna; 2. School

More information

EXTENDED BIC CRITERION FOR MODEL SELECTION

EXTENDED BIC CRITERION FOR MODEL SELECTION IDIAP RESEARCH REPORT EXTEDED BIC CRITERIO FOR ODEL SELECTIO Itshak Lapdot Andrew orrs IDIAP-RR-0-4 Dalle olle Insttute for Perceptual Artfcal Intellgence P.O.Box 59 artgny Valas Swtzerland phone +4 7

More information

Cluster Analysis of Electrical Behavior

Cluster Analysis of Electrical Behavior Journal of Computer and Communcatons, 205, 3, 88-93 Publshed Onlne May 205 n ScRes. http://www.scrp.org/ournal/cc http://dx.do.org/0.4236/cc.205.350 Cluster Analyss of Electrcal Behavor Ln Lu Ln Lu, School

More information

A Computer Vision System for Automated Container Code Recognition

A Computer Vision System for Automated Container Code Recognition A Computer Vson System for Automated Contaner Code Recognton Hsn-Chen Chen, Chh-Ka Chen, Fu-Yu Hsu, Yu-San Ln, Yu-Te Wu, Yung-Nen Sun * Abstract Contaner code examnaton s an essental step n the contaner

More information