Pattern Recognition 43 (2010) Contents lists available at ScienceDirect. Pattern Recognition. journal homepage:

Size: px
Start display at page:

Download "Pattern Recognition 43 (2010) Contents lists available at ScienceDirect. Pattern Recognition. journal homepage:"

Transcription

1 Pattern Recognton 43 (2010) Contents lsts avalable at ScenceDrect Pattern Recognton ournal homepage: Secret mage sharng based on cellular automata and steganography Z. Eslam, S.H. Razzagh, J. Zarepour Ahmadabad Department of Computer Scence, Shahd Behesht Unversty, G.C., Tehran, Iran A R T I C L E I N F O A B S T R A C T Artcle hstory: Receved 29 January 2009 Receved n revsed form 9 June 2009 Accepted 15 June 2009 Keywords: Secret sharng scheme Lnear memory cellular automata Dgtal sgnature Authentcaton Verfablty Recently Ln and Tsa [Secret mage sharng wth steganography and authentcaton, The Journal of Systems and Software 73 (2004) ] and Yang et al. [Improvements of mage sharng wth steganography and authentcaton, The Journal of Systems and Software 80 (2007) ] proposed secret mage sharng schemes combnng steganography and authentcaton based on Shamr's polynomals. The schemes dvde a secret mage nto some shadows whch are then embedded n cover mages n order to produce stego mages for dstrbutng among partcpants. To acheve better authentcaton ablty Chang et al. [Sharng secrets n stego mages wth authentcaton, Pattern Recognton 41 (2008) ] proposed n 2008 an mproved scheme whch enhances the vsual qualty of the stego mages as well and the probablty of successful verfcaton for a fae stego bloc s 1/16. In ths paper, we employ lnear cellular automata, dgtal sgnatures, and hash functons to propose a novel (t, n)-threshold mage sharng scheme wth steganographc propertes n whch a double authentcaton mechansm s ntroduced whch can detect tamperng wth probablty 255/256. Employng cellular automata nstead of Shamr's polynomals not only mproves computatonal complexty from O(n log 2 n) to O(n) but obvates the need to modfy pxels of cover mages unnecessarly. Compared to prevous methods [C. Ln, W. Tsa, Secret mage sharng wth steganography and authentcaton, The Journal of Systems and Software 73 (2004) ; C. Yang, T. Chen, K. Yu, C. Wang, Improvements of mage sharng wth steganography and authentcaton, The Journal of Systems and Software 80 (2007) ; C. Chang, Y. Hseh, C. Ln, Sharng secrets n stego mages wth authentcaton, Pattern Recognton 41 (2008) ], we use fewer number of bts n each pxel of cover mages for embeddng data so that a better vsual qualty s guaranteed. We further present some expermental results Elsever Ltd. All rghts reserved. 1. Introducton Technques to share a secret mage have attracted consderable attenton n the recent years [1 8]. However, there are mportant ssues that such technques should deal wth. The frst one s accdental or ntentonal loss/corrupton of mages that mght occur f only a sngle party has access to the data. On the other hand, f several partcpants share parts of the secret mage, care must be taen to ensure that no malcous shareholder s able to manpulate hs/her data. The second ssue s the need to eep nvaders unaware not only of the content of the secret mage tself but also of the very fact that an mage s beng transferred. Secret sharng schemes whch protect and dstrbute a secret content among a group of partcpants provde solutons to the frst Correspondng author. Tel.: ; fax: E-mal addresses: z_eslam@sbu.ac.r (Z. Eslam), s.razzagh@mal.sbu.ac.r (S.H. Razzagh), J.zarepour@mal.sbu.ac.r zarepouramal@gmal.com (J. Zarepour Ahmadabad). ssue. In ths regard, the basc example, proposed frst by Shamr [9] and Blaley [10], s the concept of a (t, n)-threshold secret sharng scheme whch encodes a secret data set nto n shares and dstrbutes them among n partcpants n such a way that any t or more of the shares can be collected to recover the secret data, but any t 1or fewer of them provdes no nformaton about the secret. Moreover, to ensure recovery of the orgnal secret nformaton some authentcaton process must be employed so that any manpulaton of shares s detected wth hgh probablty. To tacle the second concern, steganographc technques are usually employed [1 3,11 14]. In these methods, frst some nnocentloong mages, called cover mages, are selected. Then the secret data are embedded nto cover mages and the resultng stego mages are dstrbuted among partcpants usng some secret sharng scheme. Clearly, n order not to nvoe suspcon, the embeddng should create hgh-qualty stego mages such that the changes are not vsually perceptble. So far, two most popular steganographc methods are the least sgnfcant bts (LSBs) replacement [15 17] and the modulus operaton [18 20]. For example, Wu et al. [8] proposed a sharng and /$ - see front matter 2009 Elsever Ltd. All rghts reserved. do: /.patcog

2 398 Z. Eslam et al. / Pattern Recognton 43 (2010) hdng method that compresses the secret mage frst and then produces stegos based on the modulus concept. Therefore, although the method can generate smaller stego mages, these mages may be dstorted severely and attract the attenton of malcous attacers. Moreover, the orgnal secret mage cannot be retreved completely n the reconstructon procedure. Ln and Tsa [1] proposed a method of secret mage sharng wth steganography and authentcaton n Ther scheme s an example of a lossy polynomal-based mage sharng and the reconstructed secret mage may be dstorted slghtly. Further, the authentcaton mechansm n ths scheme s rather wea. In 2007, Yang et al. [2] proposed an mproved verson to overcome the defects n Ln and Tsa's scheme. Although Yang et al.'s method can restore a dstorton-free secret mage, t not only reduces the qualty of the stego mages but also allows a sgnfcant probablty that the fae stego mage can be authentcated successfully. In Chang et al. [3], the authors proposed an enhanced scheme n whch the concepts of Then and Ln's secret mage sharng [21] s used to ensure that no dstorton s ntroduced nto the secret mage. Furthermore, an authentcaton method based on the Chnese remander theorem (CRT) s used to mprove authentcaton ablty. However, we can notce the followng shortcomngs n the method of Chang et al. Frst, the use of Shamr's polynomals (as descrbed n Secton 3.1) and the fact that ths scheme changes (at most) 3 bts n each pxel of a gven cover mage can ntroduce a sde effect on the vsual qualty of the resultng stego mages. Furthermore, n order to detect tamperng of data, t may be necessary to process all blocs of a gven stego mage and the probablty of successful verfcaton for a fae stego bloc s 1/16 whch can be consdered hgh n some applcatons. In [22], a partcular type of dscrete dynamcal system called onedmensonal memory cellular automata (CA) s employed to desgn a(t, n)-threshold scheme n whch at least t consecutve shares are needed to reconstruct the secret. To share secret color mages, twodmensonal cellular automata are used n [23]. In ths paper, we employ cellular automata and ntroduce a double authentcaton mechansm to propose a new (t, n)-threshold mage sharng scheme wth steganographc propertes. Our proposed scheme uses 2 bts n each pxel of cover mages for embeddng data and so a better vsual qualty for the produced stego mages s acheved. We ntroduce no dstorton to the secret mage. Moreover, the authentcaton ablty of the scheme can detect a fae stego bloc wth probablty 255/256. In contrast to O(n log 2 n)-complexty of polynomal evaluaton and nterpolaton algorthms [24], the proposed scheme s of order O(n). The rest of ths paper s organzed as follows: related wor s covered n Secton 2. In Secton 3, the proposed scheme as well as our motvaton to employ CA nstead of Shamr's sharng scheme s outlned. Secton 4 provdes comparson between our proposed scheme and other methods n the lterature. Fnally, the conclusons of ths paper are presented n Secton Related wors In ths secton, we brefly revew cellular automata and the scheme of Chang et al. [3] One-dmensonal memory cellular automata One-dmensonal fnte boolean cellular automata are dscrete dynamcal systems formed by a fnte array of N dentcal obects called cells, where each cell can assume a state s {0, 1}, updated synchronously n dscrete tme steps accordng to a local transton functon. The updated state of each cell depends on the varables of ths functon whch are the prevous states of a set of cells, ncludng the cell tself, and consttute ts neghborhood. For the -th cell, denoted by, we consder the symmetrc neghborhood of radus r whch s defned as N ={ r,...,,..., + r }. Leta (T) denote the state of at tme T. Then, the local transton functon of the cellular automata wth radus r has the followng form: a (T+1) = f (a (T) r,...,a(t),...,a (T) ), 0 N 1 (1) +r or equvalently, a (T+1) = f (N (T) ), 0 N 1, (2) where N (T) (Z 2 ) 2r+1 stands for the states of the neghbor cells of at tme T. Furthermore, f (mod N), then t s assumed that a (T) = a (T) to ensure well-defned dynamcs of the CA. The vector C (T) = (a (T) 0,...,a(T) N 1 ) s called the confguraton of CA at tme T and C (0) s the ntal confguraton. Moreover, the sequence {C (T) } 0 T s called the evoluton of order of the CA and the set of all possble confguratons of the CA s denoted by C. The global functon of the CA s a lnear transformaton, Φ : C C, whch determnes the confguraton at the next tme step durng the evoluton of the CA, that s, C (T+1) =Φ(C (T) ). For a CA wth bectve Φ, there exsts another cellular automaton, called ts nverse, wth global functon Φ 1, and the CA tself s called reversble. InsuchCAs the evoluton bacward s possble (see [25]). The local transton functon of a lnear cellular automata (LCA) wth radus r s of the followng form: a (T+1) = r = r α a (T) (mod 2), 0 N 1, (3) + where α Z 2 for every. Snce there are 2r + 1 neghbor cells for, there exst 2 2r+1 LCAs and each of them can be specfed by an nteger w called rule number whch s defned as follows: r w = α 2 r+, (4) = r where 0 w 2 2r+1 1. The CAs consdered so far are memoryless,.e., the updated state of a cell depends on ts neghborhood confguraton only at the precedng tme step. Nevertheless, one can consder cellular automata for whch the state of neghborng cells at tme T as well as T 1, T 2,... contrbutes to determne the state at tme T +1. Ths s the concept of the memory cellular automata (MCA) [26]. Hereafter, by a CA, we mean a partcular type of MCA called the t-th order lnear MCA (LMCA) whose local transton functon taes the followng form: a (T+1) = f 1 (N (T) ) + f 2 (N (T 1) ) + +f t (N (T t+1) )(mod2), 0 N 1, (5) where f s the local transton functon of a partcular LCA wth radus r, for 1 t. In ths case, we requre t ntal confguratons C (0),...,C (t 1) to start the evoluton of LMCA. Furthermore, n order for ths cellular automaton to be reversble, we have the followng proposton. A proof for ths proposton can be found n [22]. Proposton 1. If f t (N (T t+1) ) = a (T t+1), then the LMCA gven by (5) s reversble and ts nverse s another LMCA wth the followng local transton functon: a (T+1) t 2 = f t m 1 (N (T m) ) + a (T t+1) (mod 2), 0 N 1. (6) m= Revew of Chang et al.'s (t, n)-threshold secret mage sharng scheme The scheme dvdes the secret mage, denoted by SI, nto some shadows whch are then embedded n n cover mages CI 1,...,CI n,n

3 Z. Eslam et al. / Pattern Recognton 43 (2010) The proposed scheme In ths secton, we frst outlne why we employ CA and then proceed to descrbe the proposed scheme Our motvaton to use cellular automata nstead of Shamr's sharng scheme Fg. 1. The bloc ˆB of the -th stego mage n Chang et al.'s scheme. order to produce stego mages STG 1,...,STG n, for dstrbutng among partcpants P 1,...,P n, respectvely. There are two procedures: (1) sharng and embeddng, (2) authentcaton and revealng Sharng and embeddng procedure Frst, all pxel values n SI that are greater than or equal to 250 are represented as two values, 250 and the value of the dfference between the pxel value and 250, respectvely. Therefore, a modfed secret mage (MSI) s generated n whch pxel values are ranged from 0 to 250. In addton, a secret ey K s used to generate a random bt-stream as the watermar bts. Ths ey s further splt nto n sub-eys whch are gven to the partcpants. Next, every t pxels n MSI are consdered as a unt. Each unt s used to generate n shared pxels whch must be embedded nto four-pxel blocs of CI to fnally produce STG,1 n. Let U be the (, )-th unt of MSI. Thet pxels of U are consdered as coeffcents of a polynomal functon of degree t 1: q(x) = (c 0 + c 1 x + +c t 1 x t 1 ) (mod 251). (7) Let B ={X, V, W, Z } be the bloc wth poston (, ) n CI wth bnary representaton (x 1,...,x 8 ), (v 1,...,v 8 ), (w 1,...,w 8 ), and (z 1,...,z 8 ), for X, V, W,andZ,1 n, respectvely. Denote the correspondng stego bloc by ˆB.For1 n, nput the decmal value of x 1 x 2,...,x 5 nto q(x) to generate the shared pxel S, wth bnary representaton (s 1,...,s 8 ). Now, the shared pxel S s embedded n the bloc B by replacng the eght bts x 6 x 7 v 6 v 7 w 6 w 7 z 6 z 7 wth s 1,...,s 8. Fnally, to ensure authentcty of stego blocs, four CRT-based authentcaton bts are computed and combned wth the current watermar bts to produce chec bts (p 1, p 2, p 3, p 4 ). The chec bts replace x 8 v 8 w 8 z 8 of B. The bloc ˆB of STG s depcted n Fg. 1. The sharng and embeddng procedure s repeated untl all pxels of MSI are processed. After that, the stego mages are produced and transmtted to P 1,...,P n Authentcaton and revealng procedure In order to restore the secret mage, any group of t or more stego mages wth sub-eys are gathered together. Then, these sub-eys can be used to reveal the secret ey K from whch the watermar bts can be generated. Next, each of the stego mages s dvded nto a set of four-pxel blocs. The authentcaton bts and the watermar bts are used to compute the chec bts correspondng to the bloc. If the chec bts are dentcal to the hdden bts of the stego mage, the bloc s verfed successfully and a shared pxel s retreved. Ths procedure s repeated untl all the hdden shared pxels are retreved. Fnally Lagrange's nterpolaton s used to get the secret mage. Cellular automata are very powerful computatonal tools wth synchronous update mechansm for ther ndvdual components (cells) and are specally adopted for mage related wors. In partcular, n secret mage sharng applcatons n whch Shamr's sharng scheme s used, we must provde dstnct nput values for Shamr's secret polynomal. Now, to economze on the sze of data to be embedded, these values are usually obtaned from pxels of cover mages. Therefore, as the number of partcpants ncreases, t may become necessary to modfy some pxels n cover mages and ths can ntroduce a sde effect on the vsual qualty of the resultng stego mages. Snce we need no nput values to start evolutons of CA, ths effect s removed when usng cellular automata whch means that pxels of the cover mages can be used more effcently. Another drawbac n Shamr-based sharng schemes s that we are forced to calculate mod a prme number p whle CA do not mpose such restrctons. In calculatng mod prmes, we should perform a preprocessng on the secret mage to produce pxel values n proper range (.e ). Ths process results n modfed secret mages whose sze s greater than the orgnal mage (see, e.g. [3,27]). The ncrease n the sze of data to be embedded affects the qualty of stego mages The scheme The scheme conssts of four phases: (1) the setup phase, (2) the sharng phase, (3) the embeddng phase, and (4) the verfcaton and recovery phase. In setup phase, a trusted party called the dealer constructs a reversble LMCA (M)of ordert. The dealer further creates a set of publc/prvate eys that wll later be used to add sgnature on the data for the purpose of authentcaton. In sharng phase, the dealer dvdes the secret mage nto some unts and derves from each unt t ntal confguratons necessary to evolve M. The evolutons of M are used to produce shared pxels for partcpants. These shares plus other nformaton about M and necessary data to reconstruct the secret mage are then sgned by the dealer and embedded n cover mages n the embeddng phase and the resultng stego mages are gven to the partcpants (Fg. 2). The sgnature s used so that manpulaton of stego mages can be detected wthout processng of pxels n verfcaton and recovery phase. Fnally, evolutons of the nverse machne are used to recover the orgnal secret (Fg. 4) Notatons We use the followng notatons to descrbe the scheme. SI the secret mage, U 1,...,U l the (t 1)-pxel unts of SI, U 1,...,Ut 1 the pxels n the -th unt U, Wdth, Heght wdth and heght of SI, P 1,...,P n the partcpants, CI the cover mage correspondng to P, STG the stego mage correspondng to P, Aut authentcaton strng correspondng to P, SH the share of P from unt U, r radus of neghborhood for the LMCA, w s the startng rule number of LMCA, C (T) confguraton of the LMCA at tme T,

4 400 Z. Eslam et al. / Pattern Recognton 43 (2010) Fg. 2. Dagram of the sharng and embeddng procedure n the proposed scheme. btstrng ths operator dvdes btstrng from rght to left nto substrngs of length and then XORs them to obtan a strng of length, wth paddng done f necessary, DS (btstrng) dgtal sgnature on the btstrng wth ey, Ver (Sgn, m) verfcaton functon of the dgtal sgnature on message m and sgnature Sgn wth ey, Seq a unque sequence number assgned to P, H a collson-free hash functon, D the dealer, (PU D, PR D ) publc and prvate eys of the dealer correspondng to sgnature scheme DS, the concatenaton operator for strngs The setup phase In ths phase, the dealer D fxes some parameters and constructs a reversble LMCA of order t through the followng steps: 1. Assgns a cover mage (CI ) and a sequence number Seq to each partcpant P. 2. Generates a set of publc/prvate eys (PU D, PR D ). 3. Constructs a reversble LMCA (M): (a) Selects 1 r 3 as the radus of the symmetrc neghborhood of the LMCA. (b) Selects a random number 0 w s 2 2r+1 t + 1. The rule numbers of the LMCA are then w s, w s + 1,...,w s + t 2. (c) Constructs M of order t by a (T+1) = f ws (N (T) )+ +f ws+t 2(N (T t+2) )+a (T t+1) (mod 2), where 0 7andf ws+ s the local transton functon of the LMCA wth radus r and rule numbers w s +, 0 t 2. The par (PU D, PR D ) wll be used to prohbt tamperng of stego mages. The dealer sgns the embedded data wth PR D and hdes the sgnature together wth the correspondng publc ey PU D n stego mages for the purpose of verfcaton n the recovery phase. Note that n our scheme, we consder 1 byte for each pxel. Therefore, the number of cells n each confguraton of M s 8 and ths s why we assume 1 r 3. Note also that for a rule number w we must have 0 w 2 2r+1 1. Fnally, the evolutons of M areusedtocreaten shares SH 1,...,SH n correspondng to partcpants. The detals are as follows: Step 1. D: 1 Dvdes SI nto (t 1)-pxel unts U 1, U 2,...,U l. 2 Repeats for = 1,...,l. 2.1 Sets ntal confguratons C (0),...,C (t 2) of M as the bnary representaton of t 1 pxels n the unt U : (U 1,...,Ut 1 ). 2.2 Computes C (t 1) as H(C (0),..., C (t 2) ) Computes evolutons of M of order n + t 1, wth these ntal confguratons C (0),...,C (t 1) and obtans C (t),...,c (t+n 1). 2.4 Assgns to each partcpant one of the confguratons as hs/her share,.e. SH 1 = C(t),...,SH n = C (t+n 1). Step 2. D: 1 Repeats for = Seq 1,...,Seq n. 1.1 Sgn = DS PRD (PU D Wdth Heght l Seq w s t r SH 1 SH 2,..., SHl ), 1.2 Aut = PU D Sgn. So far, wth l as the total number of unts of SI, the strng SH 1 SH2,..., SHl, plus other nformaton about M and SI must be embedded n the P 's cover mage (CI ). In ths step, the dealer sgns these nformaton wth hs prvate ey PR D. The sgnature and the correspondng publc ey PU D are concatenated to form the authentcaton strng Aut whch wll also be embedded n CI to prevent P from manpulaton of hs/her share. Consderng the ntal confguraton C (t 1) as H(C (0),..., C (t 2) ) 8 provdes what we call double authentcaton. Even f the cheaters succeed n forgng the dealer's sgnature on stego mages and therefore pass the frst authentcaton chec (wth very small probablty), ther manpulaton wll be revealed by ths technque. We elaborate on how ths s done n the verfcaton and recovery phase. Note that Seq s the sequence number devoted to P n the setup phase. It s used to prevent partcpants from exchangng ther shares or announcng an ncorrect dentfcaton number (that s not consecutve) n the recovery phase The sharng phase The detals of the sharng phase are depcted n Fgs. 2 and 3. Frst, D dvdes SI nto unts U 1, U 2,...,U l, where U conssts of (t 1) pxels U 1,...,Ut 1 (wth paddng done on the last unt f necessary) (Fg. 2). For each U, the dealer employs ts pxels as ntal confguratons C (0),...,C (t 2) of M. Thet-th ntal confguraton C (t 1) s then computed as the hash value of the frst t 1 ntal confguratons The embeddng phase In ths phase, the dealer produces fnal stego mages by embeddng the data obtaned n prevous phases nto the cover mages. The embeddng s such that frst the vsual qualty of the results have no serous downtrend, and second t s dffcult to recognze that any data s hdden n the stego mages. Our embeddng procedures satsfes both of these requrements.

5 Z. Eslam et al. / Pattern Recognton 43 (2010) Fg. 3. Dagram of the sharng phase. Fg. 4. Dagram of the recovery phase. As descrbed n prevous phases, we need to embed n each CI the followng data: Seq, to ensure consecutve orderng of the partcpants n the recovery phase. ws, r, t, for reconstructon of the LMCA M. Wdth, Heght and l, for proper recovery of the secret mage. The shares assgned to P,.e. SH,0 l. The authentcaton strng Aut correspondng to P, for the purpose of authentcaton. We now outlne the detals of embeddng procedure n the - th cover mage CI. The forgong data, wth the same orderng, are consdered as an array of bytes. Each byte of data s embedded nto one bloc of CI consstng of 4 bytes. Let (d 1,...,d 8 ) be the bnary representaton of the byte to be embedded n bloc B of CI wth pxels X, V, W and Z wth bnary representaton as n Fg. 5. The embeddng replaces the least sgnfcant bts of X, V, W and Z wth d 1,...,d 8 as depcted n Fg. 6. Note that the embeddng changes at most two of the LSBs n each byte of B. Ths mantans the qualty of stego mages The verfcaton and recovery phase The detals of ths phase are depcted n Fg. 4. Suppose that t consecutve partcpants, P α, P α+1,...,p α+t 1,1 α n t+1, present the stego mages STG α, STG α+1,...,stg α+t 1 to recover the secret

6 402 Z. Eslam et al. / Pattern Recognton 43 (2010) Comparson and expermental results In [3], the scheme of Chang et al. s shown to outperform the methods presented n [1,2]. Therefore, n ths secton, we compare the proposed scheme and the scheme of Chang et al. The results of ths secton show that our proposed method acheves the followng merts: Fg. 5. One bloc of CI consstng of 4 bytes. Our method employs lnear cellular automata whle best polynomal evaluaton and nterpolaton algorthms are of order O(n log 2 n) [24]. We use at most 2 bts n each pxel of cover mages for embeddng data whle ths number s 3 for Chang et al.'s scheme. Moreover, snce we employ cellular automata, we are not forced to change any more bts n cover mages as Shamr-based methods do. Ths guarantees a better vsual qualty for our stego mages. We perform some experments for llustraton. Gven a stego mage, our scheme detects whether t s tampered or not wthout processng of ts blocs. Other methods may need to process all blocs of the mage to fnd ths. Moreover, each fae stego bloc s verfed successfully wth probablty 1/256 n contrast to 1/16 for Chang et al.'s method. Expermental results are also provded for comparson. Fg. 6. The embeddng of the hdden byte (d 1,...,d 8) n a stego bloc. mage SI. EachSTG s dvded nto a set of blocs wth four pxels from whch the embedded data can be retreved. (1) Retreve from STG, Seq, ws, r, t, Heght, Wdth, l, SH,0 l and Aut = PU D Sgn for each P, α α + t 1, (2) Chec f the derved sequence numbers Seq are consecutve. (3) Each P, α α + t 1 can verfy the nformaton gven by P,, as follows: PU D of P should equal PU D of P, for α α + t 1. Ver PUD (Sgn, PU D Wdth Heght l Seq w s t r SH 1 SH2,..., SH l ) = true. (4) Repeat for = 1,...,l (to reconstruct the -th unt): (4.1) Construct the nverse of M,.e. M, by Eq. (6), wth radus r, rule numbers determned by w s, and ntal confguratons C (0) = SH α+t 1, C (1) = SH α+t 2,..., C (t 1) = SH α, and evolve M, t+α 1 tmes to obtan C (2t+α 2),..., C (t+α 1). (4.2) Chec f Hash( C (2t+α 2),..., C (t+α 2) ) 8 equals C (t+α 1) or not. (4.3) The pxels of the -th unt of SI, that s, U 1,...,Ut 1,are taen as the bnary representaton of C (2t+α 2),..., C (t+α 2), respectvely. The stego mages whch fal the sgnature verfcaton test are tampered. We have the opton to totally reect them and stop, or mar them suspcous and proceed wth the recovery phase. Now, tampered stego blocs whch are nput to M would satsfy, wth probablty 1/256, the test n step 4.2 of the verfcaton phase and the correspondng unt of the secret mage wll be nvaldated wth probablty 255/256. Note that snce the shares presented n recovery phase consttute confguratons of a reversble t-th order LMCA, then at least t shares are requred to compute evolutons of the nverse automata and nowng t 1 or fewer shares s nsuffcent. We frst consder vsual qualty of stego mages. We perform experments for n = 4andt = 3. We tae Jet-F16 wth sze as the secret mage whle Lena, Pepper, Baboon and flower serve as cover mages wth szes (Fg. 7). The crteron for the vsual qualty of the stego mages s the pea-sgnal-to-nose rato (PSNR) defned as (255) 2 PSNR = 10 log 10 db, (8) MSE where MSE s the mean-square error between the cover mage and the stego mage. If the cover mage s szed f g, MSE s defned as MSE = 1 f g f g (x y ) 2, (9) =1 =1 where x and y denote the cover and the stego pxel values, respectvely. The stego mages generated by the scheme of Chang et al. and ther PSNR are gven n Fg. 8(a). The same data are reported for our scheme n Fg. 8(b). The results show that our scheme acheves hgher PSNR. We now compare the two schemes n terms of authentcaton capabltes. In the scheme of Chang et al., the probablty that a fae bloc can be verfed successfully s 1/16. Now, suppose that P modfes a bloc of hs/her stego mage. Therefore, the sgnature Sgn hdden n STG cannot be verfed successfully. Next, the fae blocs n ths stego mage are used to compute the evolutons of M and obtan C (2t+α 2),..., C (t+α 1). The modfcaton maes Hash( C (2t+α 2),..., C (t+α 2) ) 8 dfferent from C (t+α 1) and the fae bloc s detected. Hence, the probablty that a modfed bloc s verfed successfully s about 1/256. Note also that our scheme can detect a tampered stego mage wth a sngle test whle Chang et al.'s scheme should obtan ths nformaton from tampered blocs. We also conducted experments to confrm authentcaton abltes of the two schemes. To do ths, we follow the method used n [3] and consder DR = NTPD/NTP the crteron for ntegrty verfcaton, where NTP s the number of the tampered pxels, and NTPD s the number of the tampered pxels that are detected. We consder agan the stego mage lena constructed by the two schemes and manpulate t twce wth two dfferent mages: flower wth sze , and Pepper of sze These mages are added to the top-left corner of the vctm stego mage, as

7 Z. Eslam et al. / Pattern Recognton 43 (2010) Fg. 7. Test mages. (a) Jet-F16, (b) lena, (c) Baboon, (d) Pepper, and (e) flower. Fg. 8. The expermental results for (3, 4)-threshold secret mage sharng scheme. (a) The stego mages generated by Chang et al.'s scheme and (b) the stego mages generated by the proposed scheme. shown n Fg. 9. The detecton ratos for tamperng wth flower are and for Chang et al.'s scheme and our proposed scheme, respectvely, whle tamperng wth Pepper reports and for the correspondng schemes. 5. Conclusons In ths paper, we propose a new (t, n)-threshold mage sharng scheme wth steganographc propertes. The scheme s based on lnear cellular automata and ntroduces no dstorton to the orgnal secret mage; however, consecutve shares must be provded to recover the secret mage. We change at most 2 bts n each pxel of a gven cover mage to preserve ts vsual qualty. In order to manpulate even a sngle bloc n a stego mage and reman unnotced, a malcous partcpant has to forge a secure dgtal sgnature and even n that case, a double authentcaton mechansm s employed such that the correspondng nformaton n the secret mage wll be nvaldated wth probablty 255/256. Moreover,

8 404 Z. Eslam et al. / Pattern Recognton 43 (2010) Fg. 9. Manpulated stego mages for the two schemes. (a) Chang scheme (DR=0.951), (b) our scheme (DR=0.997), (c) Chang scheme (DR=0.974), (d) our scheme (DR=0.997). the ntegrty of each stego mage can be verfed wthout processng of ts blocs. References [1] C. Ln, W. Tsa, Secret mage sharng wth steganography and authentcaton, The Journal of Systems and Software 73 (2004) [2] C. Yang, T. Chen, K. Yu, C. Wang, Improvements of mage sharng wth steganography and authentcaton, The Journal of Systems and Software 80 (2007) [3] C. Chang, Y. Hseh, C. Ln, Sharng secrets n stego mages wth authentcaton, Pattern Recognton 41 (2008) [4] N. Noar, A. Shamr, Vsual cryptography, Advances n Cryptology: Eurocrypt'94, vol. 48, Sprnger, Berln, 1995, pp [5] D. Stnson, Vsual cryptography and threshold schemes, IEEE Potentals 18 (1999) [6] S. Shyu, Effcent vsual secret sharng scheme for color mages, Pattern Recognton 39 (2006) [7] T.C.C.N. Yang, Aspect rato nvarant vsual secret sharng schemes wth mnmum pxel expanson, Pattern Recognton 26 (2) (2005) [8] Y. Wu, C. Then, J. Ln, Sharng and hdng sector mages wth sze constrant, Pattern Recognton 37 (2004) [9] A. Shamr, How to share a secret, Communcatons of the ACM 22 (1979) [10] G. Blaley, Safeguardng cryptographc eys, AFIPS Conference Proceedngs 48 (1979) [11] C. Chang, T. Chen, L. Chung, A steganographc method based upon JPEG and quantzaton table modfcaton, Informaton Scences 141 (2002) [12] N. Johnson, S. Jaoda, Explorng steganography: seeng the unseen, IEEE Comput. 31 (2) (1998) [13] L.M. Marvel, C.G. Boncelet Jr., C.T. Retter, Spread spectrum mage steganography, IEEE Transactons on Image Process 8 (8) (1999) [14] D. Wu, W. Tsa, A steganographc method for mages by pxel-value dfferencng, Pattern Recognton Letters 24 (9 10) (2003) [15] C. Chan, L. Cheng, Hdng data n mages by smple LSB substtuton, Pattern Recognton 37 (3) (2004) [16] C. Chang, J. Hsao, C. Chan, Fndng optmal least-sgnfcant-bts substtuton n mage hdng by dynamc programmng strategy, Pattern Recognton 36 (7) (2003) [17] R. Wang, C. Ln, J. Ln, Image hdng by optmal LSB substtuton and genetc algorthm, Pattern Recognton 34 (3) (2001) [18] C. Chang, C. Chan, Y. Fan, Image hdng scheme wth modulus functon and dynamc programmng, Pattern Recognton 39 (6) (2006) [19] C. Then, J. Ln, A smple and hgh-hdng capacty method for hdng dgtbydgt data n mages based on modulus functon, Pattern Recognton 36 (12) (2003) [20] S.J. Wang, Steganography of capacty requred usng modulo operator for embeddng secret mage, Appled Mathematcs and Computaton 164 (1) (2005) [21] C. Then, J. Ln, An mage-sharng method wth user-frendly shadow mages, IEEE Transactons on Crcuts Systems (2003) [22] A.M. del Rey, J.P. Mateus, G.R. Sanchez, A secret sharng scheme based on cellular automata, Appled Mathematcs and Computaton 170 (2005) [23] G. Álvarez Marañón, L.H. Encnas, A.M. del Rey, Sharng secret color mages usng cellular automata wth memory, CoRR (2003). [24] A. Aho, J. Hopcroft, J. Ullman, The Desgn and Analyss of Computer Algorthms, Addson-Wesley, Readng, MA, [25] T. Toffol, N. Margolus, Invertble cellular automata: a revew, Physca D 45 (1990) [26] R. Alonso-Sanz, Reversble cellular automata wth memory: two dmensonal patterns from a sngle seed, Physca D 175 (2003) [27] C. Then, J. Ln, Secret mage sharng, Computer Graphcs 26 (5) (2002) About the Author ZIBA ESLAMI receved her B.S., M.S., and Ph.D. n Appled Mathematcs from Tehran Unversty n Iran. She receved her Ph.D. n From 1991 to 2000, she was a resdent researcher n the Insttute for Studes n Theoretcal Physcs and Mathematcs (IPM), Iran. Durng the academc years , she was a Post Doctoral Fellow n IPM. She served as a non-resdent researcher at IPM durng Currently, she s the Head of and a Professor n the Department of Computer Scences at Shahd Behesht Unversty n Iran. Her research nterests nclude desgn theory, combnatoral algorthms, cryptographc protocols, andsteganography. About the Author SEYYED HOSSEIN RAZZAGHI receved hs B.S. degree n Management Informaton System (MIS) n 2006 from Tabrz Unversty. He s currently an M.S. student of Computer Scence n Shahd Behesht Unversty, Tehran, Iran. About the Author JAMAL ZAREPOUR AHMADABADI receved hs B.S. degree n Management Informaton System (MIS) n 2006 from Yazd Unversty. He s currently an M.S. student of Computer Scence n Shahd Behesht Unversty, Tehran, Iran.

Parallelism for Nested Loops with Non-uniform and Flow Dependences

Parallelism for Nested Loops with Non-uniform and Flow Dependences Parallelsm for Nested Loops wth Non-unform and Flow Dependences Sam-Jn Jeong Dept. of Informaton & Communcaton Engneerng, Cheonan Unversty, 5, Anseo-dong, Cheonan, Chungnam, 330-80, Korea. seong@cheonan.ac.kr

More information

A Binarization Algorithm specialized on Document Images and Photos

A Binarization Algorithm specialized on Document Images and Photos A Bnarzaton Algorthm specalzed on Document mages and Photos Ergna Kavalleratou Dept. of nformaton and Communcaton Systems Engneerng Unversty of the Aegean kavalleratou@aegean.gr Abstract n ths paper, a

More information

An Optimal Algorithm for Prufer Codes *

An Optimal Algorithm for Prufer Codes * J. Software Engneerng & Applcatons, 2009, 2: 111-115 do:10.4236/jsea.2009.22016 Publshed Onlne July 2009 (www.scrp.org/journal/jsea) An Optmal Algorthm for Prufer Codes * Xaodong Wang 1, 2, Le Wang 3,

More information

Course Introduction. Algorithm 8/31/2017. COSC 320 Advanced Data Structures and Algorithms. COSC 320 Advanced Data Structures and Algorithms

Course Introduction. Algorithm 8/31/2017. COSC 320 Advanced Data Structures and Algorithms. COSC 320 Advanced Data Structures and Algorithms Course Introducton Course Topcs Exams, abs, Proects A quc loo at a few algorthms 1 Advanced Data Structures and Algorthms Descrpton: We are gong to dscuss algorthm complexty analyss, algorthm desgn technques

More information

A Secured Method for Image Steganography Based On Pixel Values

A Secured Method for Image Steganography Based On Pixel Values A Secured Method for Image Steganography Based On Pxel Values Tarun Gulat #, Sanskrt Gupta * # Assocate Professor, Electroncs and Communcaton Engneerng Department, MMEC, M.M.U., Mullana, Ambala, Haryana,

More information

Enhanced Watermarking Technique for Color Images using Visual Cryptography

Enhanced Watermarking Technique for Color Images using Visual Cryptography Informaton Assurance and Securty Letters 1 (2010) 024-028 Enhanced Watermarkng Technque for Color Images usng Vsual Cryptography Enas F. Al rawashdeh 1, Rawan I.Zaghloul 2 1 Balqa Appled Unversty, MIS

More information

Private Information Retrieval (PIR)

Private Information Retrieval (PIR) 2 Levente Buttyán Problem formulaton Alce wants to obtan nformaton from a database, but she does not want the database to learn whch nformaton she wanted e.g., Alce s an nvestor queryng a stock-market

More information

Article Reversible Dual-Image-Based Hiding Scheme Using Block Folding Technique

Article Reversible Dual-Image-Based Hiding Scheme Using Block Folding Technique Artcle Reversble Dual-Image-Based Hdng Scheme Usng Block Foldng Technque Tzu-Chuen Lu, * and Hu-Shh Leng Department of Informaton Management, Chaoyang Unversty of Technology, Tachung 4349, Tawan Department

More information

Data Hiding and Image Authentication for Color-Palette Images

Data Hiding and Image Authentication for Color-Palette Images Data Hdng and Image Authentcaton for Color-Palette Images Chh-Yang Yn ( 殷志揚 ) and Wen-Hsang Tsa ( 蔡文祥 ) Department of Computer & Informaton Scence Natonal Chao Tung Unversty 00 Ta Hsueh Rd., Hsnchu, Tawan

More information

Related-Mode Attacks on CTR Encryption Mode

Related-Mode Attacks on CTR Encryption Mode Internatonal Journal of Network Securty, Vol.4, No.3, PP.282 287, May 2007 282 Related-Mode Attacks on CTR Encrypton Mode Dayn Wang, Dongda Ln, and Wenlng Wu (Correspondng author: Dayn Wang) Key Laboratory

More information

Hermite Splines in Lie Groups as Products of Geodesics

Hermite Splines in Lie Groups as Products of Geodesics Hermte Splnes n Le Groups as Products of Geodescs Ethan Eade Updated May 28, 2017 1 Introducton 1.1 Goal Ths document defnes a curve n the Le group G parametrzed by tme and by structural parameters n the

More information

Content Based Image Retrieval Using 2-D Discrete Wavelet with Texture Feature with Different Classifiers

Content Based Image Retrieval Using 2-D Discrete Wavelet with Texture Feature with Different Classifiers IOSR Journal of Electroncs and Communcaton Engneerng (IOSR-JECE) e-issn: 78-834,p- ISSN: 78-8735.Volume 9, Issue, Ver. IV (Mar - Apr. 04), PP 0-07 Content Based Image Retreval Usng -D Dscrete Wavelet wth

More information

Hybrid Non-Blind Color Image Watermarking

Hybrid Non-Blind Color Image Watermarking Hybrd Non-Blnd Color Image Watermarkng Ms C.N.Sujatha 1, Dr. P. Satyanarayana 2 1 Assocate Professor, Dept. of ECE, SNIST, Yamnampet, Ghatkesar Hyderabad-501301, Telangana 2 Professor, Dept. of ECE, AITS,

More information

Problem Set 3 Solutions

Problem Set 3 Solutions Introducton to Algorthms October 4, 2002 Massachusetts Insttute of Technology 6046J/18410J Professors Erk Demane and Shaf Goldwasser Handout 14 Problem Set 3 Solutons (Exercses were not to be turned n,

More information

A Fast Visual Tracking Algorithm Based on Circle Pixels Matching

A Fast Visual Tracking Algorithm Based on Circle Pixels Matching A Fast Vsual Trackng Algorthm Based on Crcle Pxels Matchng Zhqang Hou hou_zhq@sohu.com Chongzhao Han czhan@mal.xjtu.edu.cn Ln Zheng Abstract: A fast vsual trackng algorthm based on crcle pxels matchng

More information

Load Balancing for Hex-Cell Interconnection Network

Load Balancing for Hex-Cell Interconnection Network Int. J. Communcatons, Network and System Scences,,, - Publshed Onlne Aprl n ScRes. http://www.scrp.org/journal/jcns http://dx.do.org/./jcns.. Load Balancng for Hex-Cell Interconnecton Network Saher Manaseer,

More information

A New Approach For the Ranking of Fuzzy Sets With Different Heights

A New Approach For the Ranking of Fuzzy Sets With Different Heights New pproach For the ankng of Fuzzy Sets Wth Dfferent Heghts Pushpnder Sngh School of Mathematcs Computer pplcatons Thapar Unversty, Patala-7 00 Inda pushpndersnl@gmalcom STCT ankng of fuzzy sets plays

More information

Shape-adaptive DCT and Its Application in Region-based Image Coding

Shape-adaptive DCT and Its Application in Region-based Image Coding Internatonal Journal of Sgnal Processng, Image Processng and Pattern Recognton, pp.99-108 http://dx.do.org/10.14257/sp.2014.7.1.10 Shape-adaptve DCT and Its Applcaton n Regon-based Image Codng Yamn Zheng,

More information

High Payload Reversible Data Hiding Scheme Using Difference Segmentation and Histogram Shifting

High Payload Reversible Data Hiding Scheme Using Difference Segmentation and Histogram Shifting JOURNAL OF ELECTRONIC SCIENCE AND TECHNOLOGY, VOL. 11, NO. 1, MARCH 2013 9 Hgh Payload Reversble Data Hdng Scheme Usng Dfference Segmentaton and Hstogram Shftng Yung-Chen Chou and Huang-Chng L Abstract

More information

Semi-Fragile Watermarking Scheme for Authentication of JPEG Images

Semi-Fragile Watermarking Scheme for Authentication of JPEG Images Tamkang Journal of Scence and Engneerng, Vol. 10, No 1, pp. 5766 (2007) 57 Sem-Fragle Watermarkng Scheme for Authentcaton of JPEG Images Chh-Hung n 1 *, Tung-Shh Su 2 and Wen-Shyong Hseh 2,3 1 Department

More information

Research and Application of Fingerprint Recognition Based on MATLAB

Research and Application of Fingerprint Recognition Based on MATLAB Send Orders for Reprnts to reprnts@benthamscence.ae The Open Automaton and Control Systems Journal, 205, 7, 07-07 Open Access Research and Applcaton of Fngerprnt Recognton Based on MATLAB Nng Lu* Department

More information

A Fast Content-Based Multimedia Retrieval Technique Using Compressed Data

A Fast Content-Based Multimedia Retrieval Technique Using Compressed Data A Fast Content-Based Multmeda Retreval Technque Usng Compressed Data Borko Furht and Pornvt Saksobhavvat NSF Multmeda Laboratory Florda Atlantc Unversty, Boca Raton, Florda 3343 ABSTRACT In ths paper,

More information

New Region Incrementing Visual Cryptography Scheme

New Region Incrementing Visual Cryptography Scheme New Regon Incrementng Vsual Cryptography Scheme Chng-Nung Yang Hsang-Wen Shh Yu-Yng Chu Len Harn CSIE Dept Natonal Dong Hwa Unversty Hualen Tawan CSEE Dept Unversty of Mssour-Kansas Cty Kansas Mssour USA

More information

PYTHON IMPLEMENTATION OF VISUAL SECRET SHARING SCHEMES

PYTHON IMPLEMENTATION OF VISUAL SECRET SHARING SCHEMES PYTHON IMPLEMENTATION OF VISUAL SECRET SHARING SCHEMES Ruxandra Olmd Faculty of Mathematcs and Computer Scence, Unversty of Bucharest Emal: ruxandra.olmd@fm.unbuc.ro Abstract Vsual secret sharng schemes

More information

Reversible Dual-Image-Based Hiding Scheme Using Block Folding Technique

Reversible Dual-Image-Based Hiding Scheme Using Block Folding Technique S S symmetry Artcle Reversble Dual-Image-Based Hdng Scheme Usng Block Foldng Technque Tzu-Chuen Lu Tzu-Chuen Lu 1, 1, * and Hu-Shh Leng * ID and Hu-Shh Leng 1 Department Informaton Management, Chaoyang

More information

S1 Note. Basis functions.

S1 Note. Basis functions. S1 Note. Bass functons. Contents Types of bass functons...1 The Fourer bass...2 B-splne bass...3 Power and type I error rates wth dfferent numbers of bass functons...4 Table S1. Smulaton results of type

More information

Module Management Tool in Software Development Organizations

Module Management Tool in Software Development Organizations Journal of Computer Scence (5): 8-, 7 ISSN 59-66 7 Scence Publcatons Management Tool n Software Development Organzatons Ahmad A. Al-Rababah and Mohammad A. Al-Rababah Faculty of IT, Al-Ahlyyah Amman Unversty,

More information

Improvement of Spatial Resolution Using BlockMatching Based Motion Estimation and Frame. Integration

Improvement of Spatial Resolution Using BlockMatching Based Motion Estimation and Frame. Integration Improvement of Spatal Resoluton Usng BlockMatchng Based Moton Estmaton and Frame Integraton Danya Suga and Takayuk Hamamoto Graduate School of Engneerng, Tokyo Unversty of Scence, 6-3-1, Nuku, Katsuska-ku,

More information

Tsinghua University at TAC 2009: Summarizing Multi-documents by Information Distance

Tsinghua University at TAC 2009: Summarizing Multi-documents by Information Distance Tsnghua Unversty at TAC 2009: Summarzng Mult-documents by Informaton Dstance Chong Long, Mnle Huang, Xaoyan Zhu State Key Laboratory of Intellgent Technology and Systems, Tsnghua Natonal Laboratory for

More information

Assignment # 2. Farrukh Jabeen Algorithms 510 Assignment #2 Due Date: June 15, 2009.

Assignment # 2. Farrukh Jabeen Algorithms 510 Assignment #2 Due Date: June 15, 2009. Farrukh Jabeen Algorthms 51 Assgnment #2 Due Date: June 15, 29. Assgnment # 2 Chapter 3 Dscrete Fourer Transforms Implement the FFT for the DFT. Descrbed n sectons 3.1 and 3.2. Delverables: 1. Concse descrpton

More information

CMPS 10 Introduction to Computer Science Lecture Notes

CMPS 10 Introduction to Computer Science Lecture Notes CPS 0 Introducton to Computer Scence Lecture Notes Chapter : Algorthm Desgn How should we present algorthms? Natural languages lke Englsh, Spansh, or French whch are rch n nterpretaton and meanng are not

More information

Improvement ofmanik et al. s remote user authentication scheme

Improvement ofmanik et al. s remote user authentication scheme Improvement ofmank et al. s remote user authentcaton scheme Abstract Jue-Sam Chou, a,yaln Chen b Jyun-Yu Ln c a Department of Informaton Management, Nanhua Unversty Chay, 622, Tawan schou@mal.nhu.edu.tw

More information

Security Enhanced Dynamic ID based Remote User Authentication Scheme for Multi-Server Environments

Security Enhanced Dynamic ID based Remote User Authentication Scheme for Multi-Server Environments Internatonal Journal of u- and e- ervce, cence and Technology Vol8, o 7 0), pp7-6 http://dxdoorg/07/unesst087 ecurty Enhanced Dynamc ID based Remote ser Authentcaton cheme for ult-erver Envronments Jun-ub

More information

Enhanced AMBTC for Image Compression using Block Classification and Interpolation

Enhanced AMBTC for Image Compression using Block Classification and Interpolation Internatonal Journal of Computer Applcatons (0975 8887) Volume 5 No.0, August 0 Enhanced AMBTC for Image Compresson usng Block Classfcaton and Interpolaton S. Vmala Dept. of Comp. Scence Mother Teresa

More information

R s s f. m y s. SPH3UW Unit 7.3 Spherical Concave Mirrors Page 1 of 12. Notes

R s s f. m y s. SPH3UW Unit 7.3 Spherical Concave Mirrors Page 1 of 12. Notes SPH3UW Unt 7.3 Sphercal Concave Mrrors Page 1 of 1 Notes Physcs Tool box Concave Mrror If the reflectng surface takes place on the nner surface of the sphercal shape so that the centre of the mrror bulges

More information

A Lossless Watermarking Scheme for Halftone Image Authentication

A Lossless Watermarking Scheme for Halftone Image Authentication IJCSNS Internatonal Journal of Computer Scence and Network Securty, VOL.6 No.2B, February 2006 147 A Lossless Watermarkng Scheme for Halftone Image Authentcaton Jeng-Shyang Pan, Hao Luo, and Zhe-Mng Lu,

More information

High-Boost Mesh Filtering for 3-D Shape Enhancement

High-Boost Mesh Filtering for 3-D Shape Enhancement Hgh-Boost Mesh Flterng for 3-D Shape Enhancement Hrokazu Yagou Λ Alexander Belyaev y Damng We z Λ y z ; ; Shape Modelng Laboratory, Unversty of Azu, Azu-Wakamatsu 965-8580 Japan y Computer Graphcs Group,

More information

Solving two-person zero-sum game by Matlab

Solving two-person zero-sum game by Matlab Appled Mechancs and Materals Onlne: 2011-02-02 ISSN: 1662-7482, Vols. 50-51, pp 262-265 do:10.4028/www.scentfc.net/amm.50-51.262 2011 Trans Tech Publcatons, Swtzerland Solvng two-person zero-sum game by

More information

Simulation Based Analysis of FAST TCP using OMNET++

Simulation Based Analysis of FAST TCP using OMNET++ Smulaton Based Analyss of FAST TCP usng OMNET++ Umar ul Hassan 04030038@lums.edu.pk Md Term Report CS678 Topcs n Internet Research Sprng, 2006 Introducton Internet traffc s doublng roughly every 3 months

More information

Parallel Inverse Halftoning by Look-Up Table (LUT) Partitioning

Parallel Inverse Halftoning by Look-Up Table (LUT) Partitioning Parallel Inverse Halftonng by Look-Up Table (LUT) Parttonng Umar F. Sddq and Sadq M. Sat umar@ccse.kfupm.edu.sa, sadq@kfupm.edu.sa KFUPM Box: Department of Computer Engneerng, Kng Fahd Unversty of Petroleum

More information

A Modified Median Filter for the Removal of Impulse Noise Based on the Support Vector Machines

A Modified Median Filter for the Removal of Impulse Noise Based on the Support Vector Machines A Modfed Medan Flter for the Removal of Impulse Nose Based on the Support Vector Machnes H. GOMEZ-MORENO, S. MALDONADO-BASCON, F. LOPEZ-FERRERAS, M. UTRILLA- MANSO AND P. GIL-JIMENEZ Departamento de Teoría

More information

TN348: Openlab Module - Colocalization

TN348: Openlab Module - Colocalization TN348: Openlab Module - Colocalzaton Topc The Colocalzaton module provdes the faclty to vsualze and quantfy colocalzaton between pars of mages. The Colocalzaton wndow contans a prevew of the two mages

More information

Problem Definitions and Evaluation Criteria for Computational Expensive Optimization

Problem Definitions and Evaluation Criteria for Computational Expensive Optimization Problem efntons and Evaluaton Crtera for Computatonal Expensve Optmzaton B. Lu 1, Q. Chen and Q. Zhang 3, J. J. Lang 4, P. N. Suganthan, B. Y. Qu 6 1 epartment of Computng, Glyndwr Unversty, UK Faclty

More information

A Robust Webpage Information Hiding Method Based on the Slash of Tag

A Robust Webpage Information Hiding Method Based on the Slash of Tag Advanced Engneerng Forum Onlne: 2012-09-26 ISSN: 2234-991X, Vols. 6-7, pp 361-366 do:10.4028/www.scentfc.net/aef.6-7.361 2012 Trans Tech Publcatons, Swtzerland A Robust Webpage Informaton Hdng Method Based

More information

SLAM Summer School 2006 Practical 2: SLAM using Monocular Vision

SLAM Summer School 2006 Practical 2: SLAM using Monocular Vision SLAM Summer School 2006 Practcal 2: SLAM usng Monocular Vson Javer Cvera, Unversty of Zaragoza Andrew J. Davson, Imperal College London J.M.M Montel, Unversty of Zaragoza. josemar@unzar.es, jcvera@unzar.es,

More information

Programming in Fortran 90 : 2017/2018

Programming in Fortran 90 : 2017/2018 Programmng n Fortran 90 : 2017/2018 Programmng n Fortran 90 : 2017/2018 Exercse 1 : Evaluaton of functon dependng on nput Wrte a program who evaluate the functon f (x,y) for any two user specfed values

More information

Term Weighting Classification System Using the Chi-square Statistic for the Classification Subtask at NTCIR-6 Patent Retrieval Task

Term Weighting Classification System Using the Chi-square Statistic for the Classification Subtask at NTCIR-6 Patent Retrieval Task Proceedngs of NTCIR-6 Workshop Meetng, May 15-18, 2007, Tokyo, Japan Term Weghtng Classfcaton System Usng the Ch-square Statstc for the Classfcaton Subtask at NTCIR-6 Patent Retreval Task Kotaro Hashmoto

More information

Cordial and 3-Equitable Labeling for Some Star Related Graphs

Cordial and 3-Equitable Labeling for Some Star Related Graphs Internatonal Mathematcal Forum, 4, 009, no. 31, 1543-1553 Cordal and 3-Equtable Labelng for Some Star Related Graphs S. K. Vadya Department of Mathematcs, Saurashtra Unversty Rajkot - 360005, Gujarat,

More information

such that is accepted of states in , where Finite Automata Lecture 2-1: Regular Languages be an FA. A string is the transition function,

such that is accepted of states in , where Finite Automata Lecture 2-1: Regular Languages be an FA. A string is the transition function, * Lecture - Regular Languages S Lecture - Fnte Automata where A fnte automaton s a -tuple s a fnte set called the states s a fnte set called the alphabet s the transton functon s the ntal state s the set

More information

A PATTERN RECOGNITION APPROACH TO IMAGE SEGMENTATION

A PATTERN RECOGNITION APPROACH TO IMAGE SEGMENTATION 1 THE PUBLISHING HOUSE PROCEEDINGS OF THE ROMANIAN ACADEMY, Seres A, OF THE ROMANIAN ACADEMY Volume 4, Number 2/2003, pp.000-000 A PATTERN RECOGNITION APPROACH TO IMAGE SEGMENTATION Tudor BARBU Insttute

More information

EVALUATION OF THE PERFORMANCES OF ARTIFICIAL BEE COLONY AND INVASIVE WEED OPTIMIZATION ALGORITHMS ON THE MODIFIED BENCHMARK FUNCTIONS

EVALUATION OF THE PERFORMANCES OF ARTIFICIAL BEE COLONY AND INVASIVE WEED OPTIMIZATION ALGORITHMS ON THE MODIFIED BENCHMARK FUNCTIONS Academc Research Internatonal ISS-L: 3-9553, ISS: 3-9944 Vol., o. 3, May 0 EVALUATIO OF THE PERFORMACES OF ARTIFICIAL BEE COLOY AD IVASIVE WEED OPTIMIZATIO ALGORITHMS O THE MODIFIED BECHMARK FUCTIOS Dlay

More information

Analysis of Continuous Beams in General

Analysis of Continuous Beams in General Analyss of Contnuous Beams n General Contnuous beams consdered here are prsmatc, rgdly connected to each beam segment and supported at varous ponts along the beam. onts are selected at ponts of support,

More information

Conditional Speculative Decimal Addition*

Conditional Speculative Decimal Addition* Condtonal Speculatve Decmal Addton Alvaro Vazquez and Elsardo Antelo Dep. of Electronc and Computer Engneerng Unv. of Santago de Compostela, Span Ths work was supported n part by Xunta de Galca under grant

More information

An Improved User Authentication and Key Agreement Scheme Providing User Anonymity

An Improved User Authentication and Key Agreement Scheme Providing User Anonymity 35 JOURNAL OF ELECTRONIC SCIENCE AND TECHNOLOGY, VOL. 9, NO. 4, DECEMBER 0 An Improved User Authentcaton and Key Agreement Scheme Provdng User Anonymty Ya-Fen Chang and Pe-Yu Chang Abstract When accessng

More information

Meta-heuristics for Multidimensional Knapsack Problems

Meta-heuristics for Multidimensional Knapsack Problems 2012 4th Internatonal Conference on Computer Research and Development IPCSIT vol.39 (2012) (2012) IACSIT Press, Sngapore Meta-heurstcs for Multdmensonal Knapsack Problems Zhbao Man + Computer Scence Department,

More information

Learning the Kernel Parameters in Kernel Minimum Distance Classifier

Learning the Kernel Parameters in Kernel Minimum Distance Classifier Learnng the Kernel Parameters n Kernel Mnmum Dstance Classfer Daoqang Zhang 1,, Songcan Chen and Zh-Hua Zhou 1* 1 Natonal Laboratory for Novel Software Technology Nanjng Unversty, Nanjng 193, Chna Department

More information

The Research of Support Vector Machine in Agricultural Data Classification

The Research of Support Vector Machine in Agricultural Data Classification The Research of Support Vector Machne n Agrcultural Data Classfcaton Le Sh, Qguo Duan, Xnmng Ma, Me Weng College of Informaton and Management Scence, HeNan Agrcultural Unversty, Zhengzhou 45000 Chna Zhengzhou

More information

NUMERICAL SOLVING OPTIMAL CONTROL PROBLEMS BY THE METHOD OF VARIATIONS

NUMERICAL SOLVING OPTIMAL CONTROL PROBLEMS BY THE METHOD OF VARIATIONS ARPN Journal of Engneerng and Appled Scences 006-017 Asan Research Publshng Network (ARPN). All rghts reserved. NUMERICAL SOLVING OPTIMAL CONTROL PROBLEMS BY THE METHOD OF VARIATIONS Igor Grgoryev, Svetlana

More information

For instance, ; the five basic number-sets are increasingly more n A B & B A A = B (1)

For instance, ; the five basic number-sets are increasingly more n A B & B A A = B (1) Secton 1.2 Subsets and the Boolean operatons on sets If every element of the set A s an element of the set B, we say that A s a subset of B, or that A s contaned n B, or that B contans A, and we wrte A

More information

The Greedy Method. Outline and Reading. Change Money Problem. Greedy Algorithms. Applications of the Greedy Strategy. The Greedy Method Technique

The Greedy Method. Outline and Reading. Change Money Problem. Greedy Algorithms. Applications of the Greedy Strategy. The Greedy Method Technique //00 :0 AM Outlne and Readng The Greedy Method The Greedy Method Technque (secton.) Fractonal Knapsack Problem (secton..) Task Schedulng (secton..) Mnmum Spannng Trees (secton.) Change Money Problem Greedy

More information

Machine Learning: Algorithms and Applications

Machine Learning: Algorithms and Applications 14/05/1 Machne Learnng: Algorthms and Applcatons Florano Zn Free Unversty of Bozen-Bolzano Faculty of Computer Scence Academc Year 011-01 Lecture 10: 14 May 01 Unsupervsed Learnng cont Sldes courtesy of

More information

Virtual Machine Migration based on Trust Measurement of Computer Node

Virtual Machine Migration based on Trust Measurement of Computer Node Appled Mechancs and Materals Onlne: 2014-04-04 ISSN: 1662-7482, Vols. 536-537, pp 678-682 do:10.4028/www.scentfc.net/amm.536-537.678 2014 Trans Tech Publcatons, Swtzerland Vrtual Machne Mgraton based on

More information

Security Vulnerabilities of an Enhanced Remote User Authentication Scheme

Security Vulnerabilities of an Enhanced Remote User Authentication Scheme Contemporary Engneerng Scences, Vol. 7, 2014, no. 26, 1475-1482 HIKARI Ltd, www.m-hkar.com http://dx.do.org/10.12988/ces.2014.49186 Securty Vulnerabltes of an Enhanced Remote User Authentcaton Scheme Hae-Soon

More information

Data Representation in Digital Design, a Single Conversion Equation and a Formal Languages Approach

Data Representation in Digital Design, a Single Conversion Equation and a Formal Languages Approach Data Representaton n Dgtal Desgn, a Sngle Converson Equaton and a Formal Languages Approach Hassan Farhat Unversty of Nebraska at Omaha Abstract- In the study of data representaton n dgtal desgn and computer

More information

Classifier Selection Based on Data Complexity Measures *

Classifier Selection Based on Data Complexity Measures * Classfer Selecton Based on Data Complexty Measures * Edth Hernández-Reyes, J.A. Carrasco-Ochoa, and J.Fco. Martínez-Trndad Natonal Insttute for Astrophyscs, Optcs and Electroncs, Lus Enrque Erro No.1 Sta.

More information

An Iterative Solution Approach to Process Plant Layout using Mixed Integer Optimisation

An Iterative Solution Approach to Process Plant Layout using Mixed Integer Optimisation 17 th European Symposum on Computer Aded Process Engneerng ESCAPE17 V. Plesu and P.S. Agach (Edtors) 2007 Elsever B.V. All rghts reserved. 1 An Iteratve Soluton Approach to Process Plant Layout usng Mxed

More information

An Image Compression Algorithm based on Wavelet Transform and LZW

An Image Compression Algorithm based on Wavelet Transform and LZW An Image Compresson Algorthm based on Wavelet Transform and LZW Png Luo a, Janyong Yu b School of Chongqng Unversty of Posts and Telecommuncatons, Chongqng, 400065, Chna Abstract a cylpng@63.com, b y27769864@sna.cn

More information

Edge Detection in Noisy Images Using the Support Vector Machines

Edge Detection in Noisy Images Using the Support Vector Machines Edge Detecton n Nosy Images Usng the Support Vector Machnes Hlaro Gómez-Moreno, Saturnno Maldonado-Bascón, Francsco López-Ferreras Sgnal Theory and Communcatons Department. Unversty of Alcalá Crta. Madrd-Barcelona

More information

A mathematical programming approach to the analysis, design and scheduling of offshore oilfields

A mathematical programming approach to the analysis, design and scheduling of offshore oilfields 17 th European Symposum on Computer Aded Process Engneerng ESCAPE17 V. Plesu and P.S. Agach (Edtors) 2007 Elsever B.V. All rghts reserved. 1 A mathematcal programmng approach to the analyss, desgn and

More information

6.854 Advanced Algorithms Petar Maymounkov Problem Set 11 (November 23, 2005) With: Benjamin Rossman, Oren Weimann, and Pouya Kheradpour

6.854 Advanced Algorithms Petar Maymounkov Problem Set 11 (November 23, 2005) With: Benjamin Rossman, Oren Weimann, and Pouya Kheradpour 6.854 Advanced Algorthms Petar Maymounkov Problem Set 11 (November 23, 2005) Wth: Benjamn Rossman, Oren Wemann, and Pouya Kheradpour Problem 1. We reduce vertex cover to MAX-SAT wth weghts, such that the

More information

Available online at Available online at Advanced in Control Engineering and Information Science

Available online at   Available online at   Advanced in Control Engineering and Information Science Avalable onlne at wwwscencedrectcom Avalable onlne at wwwscencedrectcom Proceda Proceda Engneerng Engneerng 00 (2011) 15000 000 (2011) 1642 1646 Proceda Engneerng wwwelsevercom/locate/proceda Advanced

More information

The Shortest Path of Touring Lines given in the Plane

The Shortest Path of Touring Lines given in the Plane Send Orders for Reprnts to reprnts@benthamscence.ae 262 The Open Cybernetcs & Systemcs Journal, 2015, 9, 262-267 The Shortest Path of Tourng Lnes gven n the Plane Open Access Ljuan Wang 1,2, Dandan He

More information

Overview. Basic Setup [9] Motivation and Tasks. Modularization 2008/2/20 IMPROVED COVERAGE CONTROL USING ONLY LOCAL INFORMATION

Overview. Basic Setup [9] Motivation and Tasks. Modularization 2008/2/20 IMPROVED COVERAGE CONTROL USING ONLY LOCAL INFORMATION Overvew 2 IMPROVED COVERAGE CONTROL USING ONLY LOCAL INFORMATION Introducton Mult- Smulator MASIM Theoretcal Work and Smulaton Results Concluson Jay Wagenpfel, Adran Trachte Motvaton and Tasks Basc Setup

More information

Accounting for the Use of Different Length Scale Factors in x, y and z Directions

Accounting for the Use of Different Length Scale Factors in x, y and z Directions 1 Accountng for the Use of Dfferent Length Scale Factors n x, y and z Drectons Taha Soch (taha.soch@kcl.ac.uk) Imagng Scences & Bomedcal Engneerng, Kng s College London, The Rayne Insttute, St Thomas Hosptal,

More information

Compiler Design. Spring Register Allocation. Sample Exercises and Solutions. Prof. Pedro C. Diniz

Compiler Design. Spring Register Allocation. Sample Exercises and Solutions. Prof. Pedro C. Diniz Compler Desgn Sprng 2014 Regster Allocaton Sample Exercses and Solutons Prof. Pedro C. Dnz USC / Informaton Scences Insttute 4676 Admralty Way, Sute 1001 Marna del Rey, Calforna 90292 pedro@s.edu Regster

More information

A Novel Adaptive Descriptor Algorithm for Ternary Pattern Textures

A Novel Adaptive Descriptor Algorithm for Ternary Pattern Textures A Novel Adaptve Descrptor Algorthm for Ternary Pattern Textures Fahuan Hu 1,2, Guopng Lu 1 *, Zengwen Dong 1 1.School of Mechancal & Electrcal Engneerng, Nanchang Unversty, Nanchang, 330031, Chna; 2. School

More information

Research Article Improved Encrypted-Signals-Based Reversible Data Hiding Using Code Division Multiplexing and Value Expansion

Research Article Improved Encrypted-Signals-Based Reversible Data Hiding Using Code Division Multiplexing and Value Expansion Securty and Communcaton Networks Volume 2018, Artcle ID 1326235, 9 pages https://do.org/10.1155/2018/1326235 Research Artcle Improved Encrypted-Sgnals-Based Reversble Data Hdng Usng Code Dvson Multplexng

More information

A new remote user authentication scheme for multi-server architecture

A new remote user authentication scheme for multi-server architecture Future Generaton Computer Systems 19 (2003) 13 22 A new remote user authentcaton scheme for mult-server archtecture Iuon-Chang Ln a, Mn-Shang Hwang b,, L-Hua L b a Department of Computer Scence and Informaton

More information

Vol. 5, No. 3 March 2014 ISSN Journal of Emerging Trends in Computing and Information Sciences CIS Journal. All rights reserved.

Vol. 5, No. 3 March 2014 ISSN Journal of Emerging Trends in Computing and Information Sciences CIS Journal. All rights reserved. Journal of Emergng Trends n Computng and Informaton Scences 009-03 CIS Journal. All rghts reserved. http://www.csjournal.org Unhealthy Detecton n Lvestock Texture Images usng Subsampled Contourlet Transform

More information

Optimal Workload-based Weighted Wavelet Synopses

Optimal Workload-based Weighted Wavelet Synopses Optmal Workload-based Weghted Wavelet Synopses Yoss Matas School of Computer Scence Tel Avv Unversty Tel Avv 69978, Israel matas@tau.ac.l Danel Urel School of Computer Scence Tel Avv Unversty Tel Avv 69978,

More information

A Five-Point Subdivision Scheme with Two Parameters and a Four-Point Shape-Preserving Scheme

A Five-Point Subdivision Scheme with Two Parameters and a Four-Point Shape-Preserving Scheme Mathematcal and Computatonal Applcatons Artcle A Fve-Pont Subdvson Scheme wth Two Parameters and a Four-Pont Shape-Preservng Scheme Jeqng Tan,2, Bo Wang, * and Jun Sh School of Mathematcs, Hefe Unversty

More information

A Deflected Grid-based Algorithm for Clustering Analysis

A Deflected Grid-based Algorithm for Clustering Analysis A Deflected Grd-based Algorthm for Clusterng Analyss NANCY P. LIN, CHUNG-I CHANG, HAO-EN CHUEH, HUNG-JEN CHEN, WEI-HUA HAO Department of Computer Scence and Informaton Engneerng Tamkang Unversty 5 Yng-chuan

More information

Dynamic wetting property investigation of AFM tips in micro/nanoscale

Dynamic wetting property investigation of AFM tips in micro/nanoscale Dynamc wettng property nvestgaton of AFM tps n mcro/nanoscale The wettng propertes of AFM probe tps are of concern n AFM tp related force measurement, fabrcaton, and manpulaton technques, such as dp-pen

More information

2x x l. Module 3: Element Properties Lecture 4: Lagrange and Serendipity Elements

2x x l. Module 3: Element Properties Lecture 4: Lagrange and Serendipity Elements Module 3: Element Propertes Lecture : Lagrange and Serendpty Elements 5 In last lecture note, the nterpolaton functons are derved on the bass of assumed polynomal from Pascal s trangle for the fled varable.

More information

Cracking of the Merkle Hellman Cryptosystem Using Genetic Algorithm

Cracking of the Merkle Hellman Cryptosystem Using Genetic Algorithm Crackng of the Merkle Hellman Cryptosystem Usng Genetc Algorthm Zurab Kochladze 1 * & Lal Besela 2 1 Ivane Javakhshvl Tbls State Unversty, 1, I.Chavchavadze av 1, 0128, Tbls, Georga 2 Sokhum State Unversty,

More information

CSE 326: Data Structures Quicksort Comparison Sorting Bound

CSE 326: Data Structures Quicksort Comparison Sorting Bound CSE 326: Data Structures Qucksort Comparson Sortng Bound Bran Curless Sprng 2008 Announcements (5/14/08) Homework due at begnnng of class on Frday. Secton tomorrow: Graded homeworks returned More dscusson

More information

Local Quaternary Patterns and Feature Local Quaternary Patterns

Local Quaternary Patterns and Feature Local Quaternary Patterns Local Quaternary Patterns and Feature Local Quaternary Patterns Jayu Gu and Chengjun Lu The Department of Computer Scence, New Jersey Insttute of Technology, Newark, NJ 0102, USA Abstract - Ths paper presents

More information

Lecture 5: Multilayer Perceptrons

Lecture 5: Multilayer Perceptrons Lecture 5: Multlayer Perceptrons Roger Grosse 1 Introducton So far, we ve only talked about lnear models: lnear regresson and lnear bnary classfers. We noted that there are functons that can t be represented

More information

Steps for Computing the Dissimilarity, Entropy, Herfindahl-Hirschman and. Accessibility (Gravity with Competition) Indices

Steps for Computing the Dissimilarity, Entropy, Herfindahl-Hirschman and. Accessibility (Gravity with Competition) Indices Steps for Computng the Dssmlarty, Entropy, Herfndahl-Hrschman and Accessblty (Gravty wth Competton) Indces I. Dssmlarty Index Measurement: The followng formula can be used to measure the evenness between

More information

Support Vector Machines

Support Vector Machines Support Vector Machnes Decson surface s a hyperplane (lne n 2D) n feature space (smlar to the Perceptron) Arguably, the most mportant recent dscovery n machne learnng In a nutshell: map the data to a predetermned

More information

DESIGNING TRANSMISSION SCHEDULES FOR WIRELESS AD HOC NETWORKS TO MAXIMIZE NETWORK THROUGHPUT

DESIGNING TRANSMISSION SCHEDULES FOR WIRELESS AD HOC NETWORKS TO MAXIMIZE NETWORK THROUGHPUT DESIGNING TRANSMISSION SCHEDULES FOR WIRELESS AD HOC NETWORKS TO MAXIMIZE NETWORK THROUGHPUT Bran J. Wolf, Joseph L. Hammond, and Harlan B. Russell Dept. of Electrcal and Computer Engneerng, Clemson Unversty,

More information

12/2/2009. Announcements. Parametric / Non-parametric. Case-Based Reasoning. Nearest-Neighbor on Images. Nearest-Neighbor Classification

12/2/2009. Announcements. Parametric / Non-parametric. Case-Based Reasoning. Nearest-Neighbor on Images. Nearest-Neighbor Classification Introducton to Artfcal Intellgence V22.0472-001 Fall 2009 Lecture 24: Nearest-Neghbors & Support Vector Machnes Rob Fergus Dept of Computer Scence, Courant Insttute, NYU Sldes from Danel Yeung, John DeNero

More information

ELEC 377 Operating Systems. Week 6 Class 3

ELEC 377 Operating Systems. Week 6 Class 3 ELEC 377 Operatng Systems Week 6 Class 3 Last Class Memory Management Memory Pagng Pagng Structure ELEC 377 Operatng Systems Today Pagng Szes Vrtual Memory Concept Demand Pagng ELEC 377 Operatng Systems

More information

Skew Angle Estimation and Correction of Hand Written, Textual and Large areas of Non-Textual Document Images: A Novel Approach

Skew Angle Estimation and Correction of Hand Written, Textual and Large areas of Non-Textual Document Images: A Novel Approach Angle Estmaton and Correcton of Hand Wrtten, Textual and Large areas of Non-Textual Document Images: A Novel Approach D.R.Ramesh Babu Pyush M Kumat Mahesh D Dhannawat PES Insttute of Technology Research

More information

Support Vector Machines

Support Vector Machines /9/207 MIST.6060 Busness Intellgence and Data Mnng What are Support Vector Machnes? Support Vector Machnes Support Vector Machnes (SVMs) are supervsed learnng technques that analyze data and recognze patterns.

More information

Constructing Minimum Connected Dominating Set: Algorithmic approach

Constructing Minimum Connected Dominating Set: Algorithmic approach Constructng Mnmum Connected Domnatng Set: Algorthmc approach G.N. Puroht and Usha Sharma Centre for Mathematcal Scences, Banasthal Unversty, Rajasthan 304022 usha.sharma94@yahoo.com Abstract: Connected

More information

Complex Numbers. Now we also saw that if a and b were both positive then ab = a b. For a second let s forget that restriction and do the following.

Complex Numbers. Now we also saw that if a and b were both positive then ab = a b. For a second let s forget that restriction and do the following. Complex Numbers The last topc n ths secton s not really related to most of what we ve done n ths chapter, although t s somewhat related to the radcals secton as we wll see. We also won t need the materal

More information

Key-Selective Patchwork Method for Audio Watermarking

Key-Selective Patchwork Method for Audio Watermarking Internatonal Journal of Dgtal Content Technology and ts Applcatons Volume 4, Number 4, July 2010 Key-Selectve Patchwork Method for Audo Watermarkng 1 Ch-Man Pun, 2 Jng-Jng Jang 1, Frst and Correspondng

More information

Image Representation & Visualization Basic Imaging Algorithms Shape Representation and Analysis. outline

Image Representation & Visualization Basic Imaging Algorithms Shape Representation and Analysis. outline mage Vsualzaton mage Vsualzaton mage Representaton & Vsualzaton Basc magng Algorthms Shape Representaton and Analyss outlne mage Representaton & Vsualzaton Basc magng Algorthms Shape Representaton and

More information

Collaboratively Regularized Nearest Points for Set Based Recognition

Collaboratively Regularized Nearest Points for Set Based Recognition Academc Center for Computng and Meda Studes, Kyoto Unversty Collaboratvely Regularzed Nearest Ponts for Set Based Recognton Yang Wu, Mchhko Mnoh, Masayuk Mukunok Kyoto Unversty 9/1/013 BMVC 013 @ Brstol,

More information