A FIBONACCI LSB DATA HIDING TECNIQUE

Size: px
Start display at page:

Download "A FIBONACCI LSB DATA HIDING TECNIQUE"

Transcription

1 A FIBONACCI LSB DATA HIDING TECNIQUE Dego De Luca Pcone (*)(**), Federca Battst (*)(**), Marco Carl (*), Jaakko Astola (**), and Karen Egazaran (**) (*) AE Department, Unverst of Roma TRE, Rome, Ital, (**) Insttute of Sgnal Processng, Tampere Unverst of Technolog, Tampere, Fnland emals: (jta, ABSTRACT In ths paper, a novel data-hdng technque based on the Fbonacc representaton of dgtal mages s presented. A generalzaton of the classcal Least Sgnfcant Bt (LSB) embeddng method s performed. The Fbonacc representaton of gre level mages requres 12 bt planes nstead of the usual 8 planes of bnar representaton. Expermental results show that, such a redundant scheme outperforms the classcal LSB method resultng n marked mages havng less perceptual dstorton even f dfferent planes from the lowest bt plane are selected for embeddng. The computatonal cost of the embeddng scheme s compatble wth the classcal LSB data hdng scheme. 1. INTRODUCTION The use of multmeda dgtal data has become ver popular n the last decade due to the spread of Internet-based servces, and the ntroducton of the thrd-generaton moble communcaton sstems (UMTS/CDMA2000). Thanks to the avalablt of low cost edtng tools, dgtal data can be easl captured or coped, modfed and retransmtted n the network b an user. To effectvel support the growth of multmeda communcatons, t s essental to develop tools that protect and authentcate dgtal nformaton. In ths contrbuton, we present a novel embeddng scheme based on the Fbonacc decomposton. The results of the new scheme are compared wth the classcal LSB method wth respect to PSNR. In Secton 2, the classcal LSB scheme s descrbed. Secton 3 deals wth the Fbonacc decomposton and ts related propertes. In Secton 4, the embeddng scheme s descrbed; Secton 5 reports the results of smulatons. We conclude n Secton 6 wth some bref remarks. 2. LSB DECOMPOSITION One of the smplest sstems for embeddng dgtal data nto a dgtal cover s the Least Sgnfcant Bt method [10] Consder an NxM mage n whch each pxel value s represented b a decmal number n the range determned b the number of bts used. In a gra-scale mage, wth 8 bt precson per pxel, each pxel assumes a value between [0, 255] and each postve number β 10 can be represented b: n 1 2 β10 = b0 + bg 1 + b2g + = bg = 0 where G s equal to 2. Ths propert allows the decomposton of an mage nto a collecton of bnar mages b separatng the b nto n bt planes. In the classcal LSB embeddng methods, the secret message s nserted nto the least-sgnfcant bt plane of the cover mage ether b drectl replacng those bts or b modfng those bts accordng to a partcular nverse functon. The embeddng strateg can also be based on sequental nserton or selectve embeddng of the message n "nos" areas or random scatterng throughout the mage. Recent methods appl LSB not onl n the least sgnfcant plane but also n other btplanes or a mxture of both [10]. The amount of data to be embedded ma also be fxed or varable n sze dependng on the number of pxels selected dependng on lumnance and contrast features. The man advantage of such a technque s that the modfcaton of the LSB plane does not affect the human percepton of the overall mage qualt as the ampltude varaton of the pxel values s bounded b ±1. The maskng propertes of the Human Vsual Sstem allows sgnfcant amounts of embedded nformaton to be unnotced b mperceptble b the average observer under normal vewng condtons. Maskng refers to the phenomenon where a sgnal can be mperceptble to an observer n the presence of another sgnal. A detaled revew of these technques s gven n [1] [3] [4] Other advantages of LSB data hdng ncluded hgh embeddng capact and low computatonal complext. The man dsadvantages are the weaknesses wth respect to robustness, tamperng, geometrc attacks, flterng, and compresson. 3. FIBONACCI DECOMPOSITION The classcal Fbonacc numbers were ntroduced n the 13th centur b Leonardo of Psa a.k.a. Fbonacc n hs book, Lber Abac [2] He ntroduced there the famous rabbt problem leadng to the sequence 1, 1, 2, 3, 5, 8, 13, 21, 34, 55, 89, 144, 233,.

2 The sequence of Fbonacc numbers s defned b the followng recurrent relaton: 0 1 F( n 1) + F( n 2) n < 0 n = 0 n > 0 The bass F n of the Fbonacc representaton are the numbers of the sequences F n = F n 1 + F n 2 n 2 ( ) ( ) ( ) Table 1: The sstem of bnar and Fbonacc numbers, for some values of n. N Bn Fb Table 2: Maxmum bt error for each plane after embeddng. Bt Plane Bn Fb From Table 1, t s eas to see the dfference between the two representatons: For the same number of bts (for N>2), a larger numerc range s avalable for bnar representaton. For 8 bts, the range s [0, 255] for bnar representaton compared to [0, 54] for Fbonacc representaton. The bnar representaton does not ntroduce redundanc. To represent values n the range [0, 255] n Fbonacc doman, we need 12 bts, 4 bts more than n the bnar representaton. As a result, a gre level mage wll be represented n 12 bt Fbonacc planes. As shown n Table 2, the dstorton amount ntroduced b changng the bt value n the planes s bgger n power of two representatons than n Fbonacc representaton. The Fbonacc representaton s redundant, snce a gven natural number can have man representatons as a sum of Fbonacc numbers. For example, the number 16 can be represented as 13+3, as well as 8+5+3, or Nevertheless, there s one Fbonacc representaton, called the normal representaton, whch allow a unque decomposton of a natural number. It s based on Zeckendorf s theorem [8] whch states that Each postve nteger m can be represented as the sum of dstnct numbers n the sequence of Fbonacc numbers usng no two consecutve Fbonacc numbers. As a consequence of the Zeckendorf s theorem, an postve nteger can be represented as n 1 2 βf = b0 + bf 1 + b2f + = bf = 0 where there are no 2 consecutve 1 s n the sequence. 4. EMBEDDING SCHEME The embeddng procedure conssts of the followng two steps. Frst, the selecton of areas n an mage to embed the mark s performed. In the classcal scheme, one bt s embedded n each pxel of the mage. To ncrease the amount of data to be embedded, more than one bt-plane ma be used. These methods acheve hgh capact but ntroduce notceable dstortons n the mage. Recent studes show that the annoance and vsblt of artefacts depend on the salenc of the affected areas whose map can be computed b drect explotaton of the characterstcs of the HVS [11] [12] [14] Pschophscal studes demonstrate that among the factors mpactng the human attenton, contrast, colour, moton, brghtness, object sze and shape are the most sgnfcant. The relatve mportance of these factors has et to be determned. We have appled dfferent strateges to select areas of embeddng, ncludng local varance [5], spatal segmentaton b LPA-ICI rule [9]. The selecton of areas provdes an embeddng map for selectng pxels to be decomposed n the Fbonacc doman. The watermark s a sequence of N bts B = (b 0, b 1,.., b N-1 ) that s spread b a pseudo-random sequence p(x; ) of ±1 representng the secret ke. The second step n the embeddng procedure s to decompose the selected pxels n the Fbonacc doman, and also to select the plane n whch to embed. The same embeddng scheme can be also appled to dfferent planes resultng n more robust data hdng and possbl hgher vsual dstorton. Wth respect to the classcal LSB methods, Fbonacc LSB usuall does not allow a fxed sze embeddng snce not ever pxel n the block s a good canddate for the embeddng. To deal wth Fbonacc redundanc, t s necessar to compl wth Zeckendorf s theorem. If the selected pxel s not a good canddate (meanng that the current bt to be changed b 1 has a neghbour n the prevous bt plane havng also a value 1), then the next canddate pxel s selected and a sde nformaton table, contanng embeddng nformaton, s updated. It s mportant to note that the scope of ths work was to determne f the Fbonacc doman s sutable for spatal embeddng. The robustness or securt of the data hdng sstem are not fundamental as n an LSB based scheme. The fnal am s to nvestgate the possblt of nsertng a mark wthout alterng the perceptual qualt of the fnal mage. The extracton of the watermark requres the knowledge of the secret mage S and the ke K used for spatal dsperson of the watermark mage. The extracton operaton s the nverse of the embeddng operaton. The watermarked mage under nspecton s parttoned nto areas n a manner smlar to the selecton of embeddng area. Usng the sde nformaton, onl the selected pxels are tested for mark presence. Followng, a de-spreadng operaton s performed, the receved watermark s obtaned.

3 5. EXPERIMENTAL TEST To evaluate the performance of the proposed scheme, we have compared the results of LSB embeddng performed n the bnar doman [5] [6] [7] wth the one adapted to the Fbonacc decomposton. In [6], the authors, n order to reduce the detectablt of watermark, have used m sequences to encode the LSB of the mage data. Due to ther balance, random appearance, and good autocorrelaton propertes (a sngle peak wth no sde-lobes), applcaton of these codes does not ntroduce apparent mage degradaton or detectablt b a casual vewer. The m sequences of maxmal length (2n 1) for a vector of length n, can be formed from startng vectors b a Fbonacc recurson relaton. The man propert s that the autocorrelaton functon (and hence, the spectral dstrbuton) of the m sequences resemble that of a random Gaussan nose dstrbuton. Ths smlart becomes closer as the sequence length ncreases. That s, mages encoded wth m sequences and one bt Gaussan nose are shown to be ndstngushable from the orgnal and from each other. In practce, longer m sequences were emploed that were commensurate wth the mage sze (2n) and exhbted a null n the autocorrelaton around the man peak. To nsert a watermark, t s necessar to frst generate a watermarkng sgnal usng a ke to seed a generator for m sequences (a maxmum-length random sequence). The elements (bnar valued) of the m sequences are then arranged nto a 2D watermarkng sgnal. Thus, the obtaned m sequences are now embedded nto the LSB of the mage. The decodng process makes use of the unque and optmal autocorrelaton functon of m-sequences. The second technque [15], s based on the prelmnar computaton of a checksum of the mage data, followed b the embeddng of the checksum nto the LSB plane of randoml chosen pxels. The goal s a selecton of a checksum scheme wthout ntroducng artefacts n the mage. A checksum s the modulo-2 addton of a sequence of fxed-length bnar words. A unforml dstrbuted pseudo random number generator s used to map the checksum bts onto a path of randoml selected pxel locatons wthn the lmts of the mage (random walk). At each locaton, the LSB of the pxel value s forced to match the value of the correspondng n-th checksum bt as n goes from 0 to N 1. When adoptng Fbonacc representaton, onl small modfcatons are needed n computng the checksum (sequences to be added are 8 11 bt segments) and to the fnal embeddng scheme (whch s not completel random due to Zeckendorf s representaton). The last scheme consdered s based on [5]. The embeddng algorthm can be summarzed as follows: The cover mage s parttoned nto nonoverlappng blocks of sze (8 8) pxels. For each block the varance s computed and the blocks are then sorted accordng to ther varance values. For each block, the LSB plane s selected and the mark nserted. The same scheme ma also be appled to dfferent planes resultng n more robust data hdng whch mght result n hgher vsual dstorton. The watermark, after a classcal spreadng operaton, s nserted pxel b pxel n each block, startng from blocks of lower varance. The same method s also performed n the Fbonacc doman wth onl few modfcatons. The extracton of the watermark requres knowledge of the secret mage S and the ke K used for spatal dsperson of the watermark mage. The watermarked mage under nspecton s parttoned nto nonoverlappng block of sze 8 8 pxels. Usng the sde nformaton, onl the selected blocks are tested for mark presence. Followng, a de-spreadng operaton, the watermark s recovered. A qualtatve estmaton of the extracted watermark W x,, W ( x, ), wth respect to the embedded verson ( ) ma be expressed as a Normalzed Cross Correlaton (NCC): W x, W x, NCC = x x ( ) ( ) (, ) 2 W x where the maxmum value of NCC = 1 corresponds to a perfect match. We have performed several tests on mages watermarked n both the bnar and Fbonacc domans usng PSNR and NCC as a performance measure. Our results ndcate that embeddng n the Fbonacc doman ma ntroduce less perceptual dstorton and hgher PSNR. The LSB based methods are well known to be not robust. We have tred some smple modfcatons on to evaluate the robustness of the Fbonacc-based method. The followng modfcatons were consdered: Medan flterng wth 3x3 wndow; Addtve Gaussan nose: varance 0.1 on the 50% of pxels of mages; Reszng: the watermarked mages were scaled to one half of ther orgnal sze and back to the orgnal dmensons; JPEG compresson (compresson rato 1:45) Image croppng. We have used three test mages: Cameraman, Clock, and Fshng Boat. The results of the frst three modfcatons are shown n Table 3. From our smulatons, we found that there are no sgnfcant dfferences n results obtaned usng bnar and Fbonacc representatons. The frst embeddng method modfes just the LSB plane resultng n lttle changes n the PSNR for both representatons. Fgure 1 (a) shows the Cameraman mage used as a cover mage (b) shows the watermark, M,

4 (c) and (d) are the watermarked mages. Note that PSNR=46.71 db means that the qualt degradatons could hardl be perceved b a human ee. In the Fbonacc doman, the PSNR for the watermarked mage s about db. Robustness aganst dfferent attacks for the thrd method s shown n Table 3. Table 3. Performance comparson between the classcal LSB and Fbonacc-based LSB embeddng for the Cameraman mage. Bnar doman Fbonacc doman PSNR db NCC PSNR db NCC JPEG Medan Nose Reszng We have performed a correlaton test between the two representatons. Usuall, the computaton of the correlaton wth orgnal mage s a useful wa to measure the level of degradaton ntroduced. Fgure 2 shows ths tendenc. On the x- axs of both plots we have the normalzed pxel value (from 0 to 1) of orgnal mage I, and on the -axs we have the normalzed pxel value of watermarked mage I2 and the Fbonacc watermarked mage (IF). When two mages are smlar, the correlaton between pxels at the same locaton (x,) s hgh. Hence, the closer are the ponts to the dagonal lne, the hgher s the correlaton between correspondng pxels, and, therefore, the smaller s a degradaton ntroduced. 6. CONCLUDING REMARKS In ths paper, we have presented our prelmnar stud on the use of Fbonacc representaton of dgtal mages for embeddng purposes. The comparson has been performed wth respect to the classcal LSB embeddng methods. When Fbonacc representaton s used under the constrant that the same embeddng condtons are used as n the bnar case, a smlar or hgher PSNR s obtaned. If the embeddng s done not to the LSB, but prevous btplanes, the artefacts ntroduced are less annong for Fbonacc than for a bnar representaton. Test performed to measure the robustness aganst an addtve nose confrms the weakness of the spatal doman LSBbased methods. Fnall, we have performed a test of the marked mage croppng modfcaton. To mprove the method, a prelmnar reshufflng of the mark data have been per-formed usng a Fbonacc scramblng technque proposed n [13]. It demonstrated ncreased robustness relatve to the LSB embeddng method. Fgure 1: Fgure (a) s the orgnal mage Cameraman 256x256. Fgure (b) s the watermark used, two level mage 16x16. Fgure c) s the watermarked mage bnar representaton, Fgure (d) the watermarked mage n Fbonacc doman. Fgure 2: Correlaton between mages. The plot at left s between the orgnal mage I and the bnar watermarked mage I2; and at rght s between mage I and the Fbonacc watermarked mage IF

5 Fgure 3: 8 bt planes decompostons. Fgure 4: Fbonacc s 12 bt planes decomposton. ACKNOWLEDGMENT The authors would lke to thanks Chn Koh for hs help n fnal stage of paper preparaton. [3] M.M. Yeung and F.C. Mntzer, "An Invsble Watermarkng Technque for Image Verfcaton," Proc. IEEE Int l Conf. Image Processng 1997, Vol. 2, Oct. 1997, pp. II [4] N. Memon and P.W. Wong, "Protectng Dgtal Meda Content," Comm. ACM, Vol. 41, No. 7, Jul 1998, pp [5] S.P.Mat and M.K.Kundu, "Robust and Blnd Spatal Watermarkng n Dgtal Image," Proc. 3rd Indan Conf. on Computer Vson, Graphcs and Image Processng (ICVGIP 2002), pp , Ahmedabad, Inda, 16-18th December, [6] R.G. van Schndel, A.Z. Trkel, and C.F. Osborne, "A dgtal watermark," n Proc.IEEE Int. Conf. Image Processng, vol. 2, Austn, TX, Nov. 1994, pp [7] M.M. Yeung and F.C. Mntzer, "An Invsble Watermarkng Technque for Image Verfcaton," Proc. IEEE Int l Conf. Image Processng 1997, Vol. 2, Oct. 1997, pp. II [8] Verner E. Jr. Hoggatt, Fbonacc and Lucas Numbers, The Fbonacc Assocaton, Santa Clara, Calforna, USA, [9] Katkovnk V., A. Fo, K. Egazaran, and J. Astola, Ansotropc local lkelhood: theor, algorthms, applcatons, Proc. of SPIE Electronc Imagng 2005: Image Processng: Algorthm and Sstems IV, , [10] L. Shao-Hu, C. Tan-Hang, Y. Hong-Xun,G. Wen, - "A varable depth LSB data hdng technque n mages" n Proc. Machne Learnng and Cbernetcs, Proceedngs of 2004 Internatonal Conference on Volume 7, Aug Page(s): vol.7 [11] M.S. Moore, Pschophscal Measurement and Predcton of Dgtal Vdeo Qualt, Ph.D. thess, Unverst of Calforna Santa Barbara, June [12] A. J. Maeder W. Osberger, Automatc dentfcaton of perceptuall mportant regons n a mage, n Internatonal Conference on Pattern Recognton, Brsbane, Australa, pp: , vol.1, [13] Jancheng Zou, Rabab K. Ward, Dongxu Q, A new dgtal mage scramblng method based on Fbonacc numbers, n Proc. IEEE ISCAS 2004, vo. III, pp [14] X. Zhang and S. Wang, Steganograph usng multplebase notatonal sstem and human vson senstvt, IEEE Sgnal Process. Lett., vol. 12, no. 1, pp , Jan [15] A. Ker, Improved detecton of LSB steganograph n grascale mages, n Proc. Informaton Hdng Workshop, vol. 3200, Sprnger LNCS, 2004, pp REFERENCES [1] E. T. Ln and E. J. Delp, "A Revew of Data Hdng n Dgtal Images," Proceedngs of the Image Processng, Image Qualt, Image Capture Sstems Conference (PICS '99), Savannah, GA, Aprl 25-28, 1999, pp [2] A. Hordam, "A generalzed Fbonacc sequence", Amercan Mathematcal Monthl, no. 68, pp , 1961.

Hybrid Non-Blind Color Image Watermarking

Hybrid Non-Blind Color Image Watermarking Hybrd Non-Blnd Color Image Watermarkng Ms C.N.Sujatha 1, Dr. P. Satyanarayana 2 1 Assocate Professor, Dept. of ECE, SNIST, Yamnampet, Ghatkesar Hyderabad-501301, Telangana 2 Professor, Dept. of ECE, AITS,

More information

A Binarization Algorithm specialized on Document Images and Photos

A Binarization Algorithm specialized on Document Images and Photos A Bnarzaton Algorthm specalzed on Document mages and Photos Ergna Kavalleratou Dept. of nformaton and Communcaton Systems Engneerng Unversty of the Aegean kavalleratou@aegean.gr Abstract n ths paper, a

More information

A Fast Visual Tracking Algorithm Based on Circle Pixels Matching

A Fast Visual Tracking Algorithm Based on Circle Pixels Matching A Fast Vsual Trackng Algorthm Based on Crcle Pxels Matchng Zhqang Hou hou_zhq@sohu.com Chongzhao Han czhan@mal.xjtu.edu.cn Ln Zheng Abstract: A fast vsual trackng algorthm based on crcle pxels matchng

More information

Key-Selective Patchwork Method for Audio Watermarking

Key-Selective Patchwork Method for Audio Watermarking Internatonal Journal of Dgtal Content Technology and ts Applcatons Volume 4, Number 4, July 2010 Key-Selectve Patchwork Method for Audo Watermarkng 1 Ch-Man Pun, 2 Jng-Jng Jang 1, Frst and Correspondng

More information

Parallelism for Nested Loops with Non-uniform and Flow Dependences

Parallelism for Nested Loops with Non-uniform and Flow Dependences Parallelsm for Nested Loops wth Non-unform and Flow Dependences Sam-Jn Jeong Dept. of Informaton & Communcaton Engneerng, Cheonan Unversty, 5, Anseo-dong, Cheonan, Chungnam, 330-80, Korea. seong@cheonan.ac.kr

More information

Content Based Image Retrieval Using 2-D Discrete Wavelet with Texture Feature with Different Classifiers

Content Based Image Retrieval Using 2-D Discrete Wavelet with Texture Feature with Different Classifiers IOSR Journal of Electroncs and Communcaton Engneerng (IOSR-JECE) e-issn: 78-834,p- ISSN: 78-8735.Volume 9, Issue, Ver. IV (Mar - Apr. 04), PP 0-07 Content Based Image Retreval Usng -D Dscrete Wavelet wth

More information

A Fast Content-Based Multimedia Retrieval Technique Using Compressed Data

A Fast Content-Based Multimedia Retrieval Technique Using Compressed Data A Fast Content-Based Multmeda Retreval Technque Usng Compressed Data Borko Furht and Pornvt Saksobhavvat NSF Multmeda Laboratory Florda Atlantc Unversty, Boca Raton, Florda 3343 ABSTRACT In ths paper,

More information

FEATURE EXTRACTION. Dr. K.Vijayarekha. Associate Dean School of Electrical and Electronics Engineering SASTRA University, Thanjavur

FEATURE EXTRACTION. Dr. K.Vijayarekha. Associate Dean School of Electrical and Electronics Engineering SASTRA University, Thanjavur FEATURE EXTRACTION Dr. K.Vjayarekha Assocate Dean School of Electrcal and Electroncs Engneerng SASTRA Unversty, Thanjavur613 41 Jont Intatve of IITs and IISc Funded by MHRD Page 1 of 8 Table of Contents

More information

SLAM Summer School 2006 Practical 2: SLAM using Monocular Vision

SLAM Summer School 2006 Practical 2: SLAM using Monocular Vision SLAM Summer School 2006 Practcal 2: SLAM usng Monocular Vson Javer Cvera, Unversty of Zaragoza Andrew J. Davson, Imperal College London J.M.M Montel, Unversty of Zaragoza. josemar@unzar.es, jcvera@unzar.es,

More information

Robust Video Watermarking Using Image Normalization, Motion Vector and Perceptual Information

Robust Video Watermarking Using Image Normalization, Motion Vector and Perceptual Information Robust Vdeo Watermarkng Usng Image ormalzaton, Moton Vector and Perceptual Informaton Cedllo-Hernández Antono 1, Cedllo-Hernández Manuel 1, akano-myatake Marko 1, García-Vázquez Mreya S. 2 1 Postgraduate

More information

Improvement of Spatial Resolution Using BlockMatching Based Motion Estimation and Frame. Integration

Improvement of Spatial Resolution Using BlockMatching Based Motion Estimation and Frame. Integration Improvement of Spatal Resoluton Usng BlockMatchng Based Moton Estmaton and Frame Integraton Danya Suga and Takayuk Hamamoto Graduate School of Engneerng, Tokyo Unversty of Scence, 6-3-1, Nuku, Katsuska-ku,

More information

TN348: Openlab Module - Colocalization

TN348: Openlab Module - Colocalization TN348: Openlab Module - Colocalzaton Topc The Colocalzaton module provdes the faclty to vsualze and quantfy colocalzaton between pars of mages. The Colocalzaton wndow contans a prevew of the two mages

More information

A Hybrid Semi-Blind Gray Scale Image Watermarking Algorithm Based on DWT-SVD using Human Visual System Model

A Hybrid Semi-Blind Gray Scale Image Watermarking Algorithm Based on DWT-SVD using Human Visual System Model A Hybrd Sem-Blnd Gray Scale Image Watermarkng Algorthm Based on DWT-SVD usng Human Vsual System Model Rajesh Mehta r Scence & Engneerng, USICT Guru Gobnd Sngh Indrarprastha Unversty New Delh, Inda rajesh00ust@gmal.com

More information

Fuzzy Filtering Algorithms for Image Processing: Performance Evaluation of Various Approaches

Fuzzy Filtering Algorithms for Image Processing: Performance Evaluation of Various Approaches Proceedngs of the Internatonal Conference on Cognton and Recognton Fuzzy Flterng Algorthms for Image Processng: Performance Evaluaton of Varous Approaches Rajoo Pandey and Umesh Ghanekar Department of

More information

An Optimal Algorithm for Prufer Codes *

An Optimal Algorithm for Prufer Codes * J. Software Engneerng & Applcatons, 2009, 2: 111-115 do:10.4236/jsea.2009.22016 Publshed Onlne July 2009 (www.scrp.org/journal/jsea) An Optmal Algorthm for Prufer Codes * Xaodong Wang 1, 2, Le Wang 3,

More information

Enhanced AMBTC for Image Compression using Block Classification and Interpolation

Enhanced AMBTC for Image Compression using Block Classification and Interpolation Internatonal Journal of Computer Applcatons (0975 8887) Volume 5 No.0, August 0 Enhanced AMBTC for Image Compresson usng Block Classfcaton and Interpolaton S. Vmala Dept. of Comp. Scence Mother Teresa

More information

R s s f. m y s. SPH3UW Unit 7.3 Spherical Concave Mirrors Page 1 of 12. Notes

R s s f. m y s. SPH3UW Unit 7.3 Spherical Concave Mirrors Page 1 of 12. Notes SPH3UW Unt 7.3 Sphercal Concave Mrrors Page 1 of 1 Notes Physcs Tool box Concave Mrror If the reflectng surface takes place on the nner surface of the sphercal shape so that the centre of the mrror bulges

More information

Related-Mode Attacks on CTR Encryption Mode

Related-Mode Attacks on CTR Encryption Mode Internatonal Journal of Network Securty, Vol.4, No.3, PP.282 287, May 2007 282 Related-Mode Attacks on CTR Encrypton Mode Dayn Wang, Dongda Ln, and Wenlng Wu (Correspondng author: Dayn Wang) Key Laboratory

More information

Enhanced Watermarking Technique for Color Images using Visual Cryptography

Enhanced Watermarking Technique for Color Images using Visual Cryptography Informaton Assurance and Securty Letters 1 (2010) 024-028 Enhanced Watermarkng Technque for Color Images usng Vsual Cryptography Enas F. Al rawashdeh 1, Rawan I.Zaghloul 2 1 Balqa Appled Unversty, MIS

More information

KEYWORDS: Digital Image Watermarking, Discrete Wavelet Transform, General Regression Neural Network, Human Visual System. 1.

KEYWORDS: Digital Image Watermarking, Discrete Wavelet Transform, General Regression Neural Network, Human Visual System. 1. An Adaptve Dgtal Image Watermarkng Based on Image Features n Dscrete Wavelet Transform Doman and General Regresson Neural Network Ayoub Taher Group of IT Engneerng, Payam Noor Unversty, Broujen, Iran ABSTRACT:

More information

Data Mining: Model Evaluation

Data Mining: Model Evaluation Data Mnng: Model Evaluaton Aprl 16, 2013 1 Issues: Evaluatng Classfcaton Methods Accurac classfer accurac: predctng class label predctor accurac: guessng value of predcted attrbutes Speed tme to construct

More information

High Payload Reversible Data Hiding Scheme Using Difference Segmentation and Histogram Shifting

High Payload Reversible Data Hiding Scheme Using Difference Segmentation and Histogram Shifting JOURNAL OF ELECTRONIC SCIENCE AND TECHNOLOGY, VOL. 11, NO. 1, MARCH 2013 9 Hgh Payload Reversble Data Hdng Scheme Usng Dfference Segmentaton and Hstogram Shftng Yung-Chen Chou and Huang-Chng L Abstract

More information

A Secured Method for Image Steganography Based On Pixel Values

A Secured Method for Image Steganography Based On Pixel Values A Secured Method for Image Steganography Based On Pxel Values Tarun Gulat #, Sanskrt Gupta * # Assocate Professor, Electroncs and Communcaton Engneerng Department, MMEC, M.M.U., Mullana, Ambala, Haryana,

More information

Smoothing Spline ANOVA for variable screening

Smoothing Spline ANOVA for variable screening Smoothng Splne ANOVA for varable screenng a useful tool for metamodels tranng and mult-objectve optmzaton L. Rcco, E. Rgon, A. Turco Outlne RSM Introducton Possble couplng Test case MOO MOO wth Game Theory

More information

An Image Fusion Approach Based on Segmentation Region

An Image Fusion Approach Based on Segmentation Region Rong Wang, L-Qun Gao, Shu Yang, Yu-Hua Cha, and Yan-Chun Lu An Image Fuson Approach Based On Segmentaton Regon An Image Fuson Approach Based on Segmentaton Regon Rong Wang, L-Qun Gao, Shu Yang 3, Yu-Hua

More information

Classifier Selection Based on Data Complexity Measures *

Classifier Selection Based on Data Complexity Measures * Classfer Selecton Based on Data Complexty Measures * Edth Hernández-Reyes, J.A. Carrasco-Ochoa, and J.Fco. Martínez-Trndad Natonal Insttute for Astrophyscs, Optcs and Electroncs, Lus Enrque Erro No.1 Sta.

More information

Data Hiding and Image Authentication for Color-Palette Images

Data Hiding and Image Authentication for Color-Palette Images Data Hdng and Image Authentcaton for Color-Palette Images Chh-Yang Yn ( 殷志揚 ) and Wen-Hsang Tsa ( 蔡文祥 ) Department of Computer & Informaton Scence Natonal Chao Tung Unversty 00 Ta Hsueh Rd., Hsnchu, Tawan

More information

Private Information Retrieval (PIR)

Private Information Retrieval (PIR) 2 Levente Buttyán Problem formulaton Alce wants to obtan nformaton from a database, but she does not want the database to learn whch nformaton she wanted e.g., Alce s an nvestor queryng a stock-market

More information

Semi-Fragile Watermarking Scheme for Authentication of JPEG Images

Semi-Fragile Watermarking Scheme for Authentication of JPEG Images Tamkang Journal of Scence and Engneerng, Vol. 10, No 1, pp. 5766 (2007) 57 Sem-Fragle Watermarkng Scheme for Authentcaton of JPEG Images Chh-Hung n 1 *, Tung-Shh Su 2 and Wen-Shyong Hseh 2,3 1 Department

More information

For instance, ; the five basic number-sets are increasingly more n A B & B A A = B (1)

For instance, ; the five basic number-sets are increasingly more n A B & B A A = B (1) Secton 1.2 Subsets and the Boolean operatons on sets If every element of the set A s an element of the set B, we say that A s a subset of B, or that A s contaned n B, or that B contans A, and we wrte A

More information

Information Hiding Watermarking Detection Technique by PSNR and RGB Intensity

Information Hiding Watermarking Detection Technique by PSNR and RGB Intensity www..org 3 Informaton Hdng Watermarkng Detecton Technque by PSNR and RGB Intensty 1 Neha Chauhan, Akhlesh A. Waoo, 3 P. S. Patheja 1 Research Scholar, BIST, Bhopal, Inda.,3 Assstant Professor, BIST, Bhopal,

More information

Corner-Based Image Alignment using Pyramid Structure with Gradient Vector Similarity

Corner-Based Image Alignment using Pyramid Structure with Gradient Vector Similarity Journal of Sgnal and Informaton Processng, 013, 4, 114-119 do:10.436/jsp.013.43b00 Publshed Onlne August 013 (http://www.scrp.org/journal/jsp) Corner-Based Image Algnment usng Pyramd Structure wth Gradent

More information

Mathematics 256 a course in differential equations for engineering students

Mathematics 256 a course in differential equations for engineering students Mathematcs 56 a course n dfferental equatons for engneerng students Chapter 5. More effcent methods of numercal soluton Euler s method s qute neffcent. Because the error s essentally proportonal to the

More information

Image Representation & Visualization Basic Imaging Algorithms Shape Representation and Analysis. outline

Image Representation & Visualization Basic Imaging Algorithms Shape Representation and Analysis. outline mage Vsualzaton mage Vsualzaton mage Representaton & Vsualzaton Basc magng Algorthms Shape Representaton and Analyss outlne mage Representaton & Vsualzaton Basc magng Algorthms Shape Representaton and

More information

3D vector computer graphics

3D vector computer graphics 3D vector computer graphcs Paolo Varagnolo: freelance engneer Padova Aprl 2016 Prvate Practce ----------------------------------- 1. Introducton Vector 3D model representaton n computer graphcs requres

More information

Lobachevsky State University of Nizhni Novgorod. Polyhedron. Quick Start Guide

Lobachevsky State University of Nizhni Novgorod. Polyhedron. Quick Start Guide Lobachevsky State Unversty of Nzhn Novgorod Polyhedron Quck Start Gude Nzhn Novgorod 2016 Contents Specfcaton of Polyhedron software... 3 Theoretcal background... 4 1. Interface of Polyhedron... 6 1.1.

More information

MULTISPECTRAL IMAGES CLASSIFICATION BASED ON KLT AND ATR AUTOMATIC TARGET RECOGNITION

MULTISPECTRAL IMAGES CLASSIFICATION BASED ON KLT AND ATR AUTOMATIC TARGET RECOGNITION MULTISPECTRAL IMAGES CLASSIFICATION BASED ON KLT AND ATR AUTOMATIC TARGET RECOGNITION Paulo Quntlano 1 & Antono Santa-Rosa 1 Federal Polce Department, Brasla, Brazl. E-mals: quntlano.pqs@dpf.gov.br and

More information

2 optmal per-pxel estmate () whch we had proposed for non-scalable vdeo codng [5] [6]. The extended s shown to accurately account for both temporal an

2 optmal per-pxel estmate () whch we had proposed for non-scalable vdeo codng [5] [6]. The extended s shown to accurately account for both temporal an Scalable Vdeo Codng wth Robust Mode Selecton Ru Zhang, Shankar L. Regunathan and Kenneth Rose Department of Electrcal and Computer Engneerng Unversty of Calforna Santa Barbara, CA 906 Abstract We propose

More information

A Comparison between Digital Images Watermarking in Tow Different Color Spaces Using DWT2*

A Comparison between Digital Images Watermarking in Tow Different Color Spaces Using DWT2* A Comparson between Dgtal s ng n Tow Dfferent Color Spaces Usng DWT* Mehd Khall Natonal Academy of Scence of Armena Yerevan, Armena e-mal: khall.mehd@yahoo.com ABSTRACT A novel dgtal watermarkng for ownershp

More information

Digital Video Watermarking using Discrete Wavelet Transform and Principal Component Analysis

Digital Video Watermarking using Discrete Wavelet Transform and Principal Component Analysis Internatonal Journal of Wsdom Based Computng, Vol. 1 (2), August 2011 7 Dgtal Vdeo Watermarkng usng Dscrete Wavelet Transform and Prncpal Component Analyss Sanjana Snha, Prajnat Bardhan, Swarnal Pramanck,

More information

High-Boost Mesh Filtering for 3-D Shape Enhancement

High-Boost Mesh Filtering for 3-D Shape Enhancement Hgh-Boost Mesh Flterng for 3-D Shape Enhancement Hrokazu Yagou Λ Alexander Belyaev y Damng We z Λ y z ; ; Shape Modelng Laboratory, Unversty of Azu, Azu-Wakamatsu 965-8580 Japan y Computer Graphcs Group,

More information

An Image Compression Algorithm based on Wavelet Transform and LZW

An Image Compression Algorithm based on Wavelet Transform and LZW An Image Compresson Algorthm based on Wavelet Transform and LZW Png Luo a, Janyong Yu b School of Chongqng Unversty of Posts and Telecommuncatons, Chongqng, 400065, Chna Abstract a cylpng@63.com, b y27769864@sna.cn

More information

A NEW AUDIO WATERMARKING METHOD BASED

A NEW AUDIO WATERMARKING METHOD BASED A NEW AUDIO WATERMARKING METHOD BASED ON DISCRETE COSINE TRANSFORM WITH A GRAY IMAGE Mohammad Ibrahm Khan 1, Md. Iqbal Hasan Sarker 2, Kaushk Deb 3 and Md. Hasan Furhad 4 1,2,3 Department of Computer Scence

More information

Compiler Design. Spring Register Allocation. Sample Exercises and Solutions. Prof. Pedro C. Diniz

Compiler Design. Spring Register Allocation. Sample Exercises and Solutions. Prof. Pedro C. Diniz Compler Desgn Sprng 2014 Regster Allocaton Sample Exercses and Solutons Prof. Pedro C. Dnz USC / Informaton Scences Insttute 4676 Admralty Way, Sute 1001 Marna del Rey, Calforna 90292 pedro@s.edu Regster

More information

Skew Angle Estimation and Correction of Hand Written, Textual and Large areas of Non-Textual Document Images: A Novel Approach

Skew Angle Estimation and Correction of Hand Written, Textual and Large areas of Non-Textual Document Images: A Novel Approach Angle Estmaton and Correcton of Hand Wrtten, Textual and Large areas of Non-Textual Document Images: A Novel Approach D.R.Ramesh Babu Pyush M Kumat Mahesh D Dhannawat PES Insttute of Technology Research

More information

MOTION PANORAMA CONSTRUCTION FROM STREAMING VIDEO FOR POWER- CONSTRAINED MOBILE MULTIMEDIA ENVIRONMENTS XUNYU PAN

MOTION PANORAMA CONSTRUCTION FROM STREAMING VIDEO FOR POWER- CONSTRAINED MOBILE MULTIMEDIA ENVIRONMENTS XUNYU PAN MOTION PANORAMA CONSTRUCTION FROM STREAMING VIDEO FOR POWER- CONSTRAINED MOBILE MULTIMEDIA ENVIRONMENTS by XUNYU PAN (Under the Drecton of Suchendra M. Bhandarkar) ABSTRACT In modern tmes, more and more

More information

A Background Subtraction for a Vision-based User Interface *

A Background Subtraction for a Vision-based User Interface * A Background Subtracton for a Vson-based User Interface * Dongpyo Hong and Woontack Woo KJIST U-VR Lab. {dhon wwoo}@kjst.ac.kr Abstract In ths paper, we propose a robust and effcent background subtracton

More information

Identify the Attack in Embedded Image with Steganalysis Detection Method by PSNR and RGB Intensity

Identify the Attack in Embedded Image with Steganalysis Detection Method by PSNR and RGB Intensity Internatonal Journal of Computer Systems (ISSN: 394-1065), Volume 03 Issue 07, July, 016 Avalable at http://www.jcsonlne.com/ Identfy the Attack n Embedded Image wth Steganalyss Detecton Method by PSNR

More information

Cluster Analysis of Electrical Behavior

Cluster Analysis of Electrical Behavior Journal of Computer and Communcatons, 205, 3, 88-93 Publshed Onlne May 205 n ScRes. http://www.scrp.org/ournal/cc http://dx.do.org/0.4236/cc.205.350 Cluster Analyss of Electrcal Behavor Ln Lu Ln Lu, School

More information

Term Weighting Classification System Using the Chi-square Statistic for the Classification Subtask at NTCIR-6 Patent Retrieval Task

Term Weighting Classification System Using the Chi-square Statistic for the Classification Subtask at NTCIR-6 Patent Retrieval Task Proceedngs of NTCIR-6 Workshop Meetng, May 15-18, 2007, Tokyo, Japan Term Weghtng Classfcaton System Usng the Ch-square Statstc for the Classfcaton Subtask at NTCIR-6 Patent Retreval Task Kotaro Hashmoto

More information

Local Quaternary Patterns and Feature Local Quaternary Patterns

Local Quaternary Patterns and Feature Local Quaternary Patterns Local Quaternary Patterns and Feature Local Quaternary Patterns Jayu Gu and Chengjun Lu The Department of Computer Scence, New Jersey Insttute of Technology, Newark, NJ 0102, USA Abstract - Ths paper presents

More information

Edge Detection in Noisy Images Using the Support Vector Machines

Edge Detection in Noisy Images Using the Support Vector Machines Edge Detecton n Nosy Images Usng the Support Vector Machnes Hlaro Gómez-Moreno, Saturnno Maldonado-Bascón, Francsco López-Ferreras Sgnal Theory and Communcatons Department. Unversty of Alcalá Crta. Madrd-Barcelona

More information

X- Chart Using ANOM Approach

X- Chart Using ANOM Approach ISSN 1684-8403 Journal of Statstcs Volume 17, 010, pp. 3-3 Abstract X- Chart Usng ANOM Approach Gullapall Chakravarth 1 and Chaluvad Venkateswara Rao Control lmts for ndvdual measurements (X) chart are

More information

A Modified Median Filter for the Removal of Impulse Noise Based on the Support Vector Machines

A Modified Median Filter for the Removal of Impulse Noise Based on the Support Vector Machines A Modfed Medan Flter for the Removal of Impulse Nose Based on the Support Vector Machnes H. GOMEZ-MORENO, S. MALDONADO-BASCON, F. LOPEZ-FERRERAS, M. UTRILLA- MANSO AND P. GIL-JIMENEZ Departamento de Teoría

More information

Outline. Discriminative classifiers for image recognition. Where in the World? A nearest neighbor recognition example 4/14/2011. CS 376 Lecture 22 1

Outline. Discriminative classifiers for image recognition. Where in the World? A nearest neighbor recognition example 4/14/2011. CS 376 Lecture 22 1 4/14/011 Outlne Dscrmnatve classfers for mage recognton Wednesday, Aprl 13 Krsten Grauman UT-Austn Last tme: wndow-based generc obect detecton basc ppelne face detecton wth boostng as case study Today:

More information

Robust Watermarking for Text Images Based on Arnold Scrambling and DWT-DCT

Robust Watermarking for Text Images Based on Arnold Scrambling and DWT-DCT Internatonal Conference on Mechatroncs Electronc Industral and Control Engneerng (MEIC 015) Robust Watermarkng for Text Images Based on Arnold Scramblng and DWT-DCT Fan Wu College of Informaton Scence

More information

Brushlet Features for Texture Image Retrieval

Brushlet Features for Texture Image Retrieval DICTA00: Dgtal Image Computng Technques and Applcatons, 1 January 00, Melbourne, Australa 1 Brushlet Features for Texture Image Retreval Chbao Chen and Kap Luk Chan Informaton System Research Lab, School

More information

A New Watermarking Method of 3D Mesh Model

A New Watermarking Method of 3D Mesh Model TELKOMNIKA Indonesan Journal of Electrcal Engneerng Vol., No., Februar 4, pp. 6 ~ 67 DOI: http://dx.do.org/.59/telomna.v.85 6 A New Watermarng Method of D Mesh Model Lu Jng*, Wang Ynghu, He Wenjuan, L

More information

Electrical analysis of light-weight, triangular weave reflector antennas

Electrical analysis of light-weight, triangular weave reflector antennas Electrcal analyss of lght-weght, trangular weave reflector antennas Knud Pontoppdan TICRA Laederstraede 34 DK-121 Copenhagen K Denmark Emal: kp@tcra.com INTRODUCTION The new lght-weght reflector antenna

More information

Problem Definitions and Evaluation Criteria for Computational Expensive Optimization

Problem Definitions and Evaluation Criteria for Computational Expensive Optimization Problem efntons and Evaluaton Crtera for Computatonal Expensve Optmzaton B. Lu 1, Q. Chen and Q. Zhang 3, J. J. Lang 4, P. N. Suganthan, B. Y. Qu 6 1 epartment of Computng, Glyndwr Unversty, UK Faclty

More information

Convolutional interleaver for unequal error protection of turbo codes

Convolutional interleaver for unequal error protection of turbo codes Convolutonal nterleaver for unequal error protecton of turbo codes Sna Vaf, Tadeusz Wysock, Ian Burnett Unversty of Wollongong, SW 2522, Australa E-mal:{sv39,wysock,an_burnett}@uow.edu.au Abstract: Ths

More information

Deep learning is a good steganalysis tool when embedding key is reused for different images, even if there is a cover source-mismatch

Deep learning is a good steganalysis tool when embedding key is reused for different images, even if there is a cover source-mismatch Deep learnng s a good steganalyss tool when embeddng key s reused for dfferent mages, even f there s a cover source-msmatch Lonel PIBRE 2,3, Jérôme PASQUET 2,3, Dno IENCO 2,3, Marc CHAUMONT 1,2,3 (1) Unversty

More information

Efficient Video Coding with R-D Constrained Quadtree Segmentation

Efficient Video Coding with R-D Constrained Quadtree Segmentation Publshed on Pcture Codng Symposum 1999, March 1999 Effcent Vdeo Codng wth R-D Constraned Quadtree Segmentaton Cha-Wen Ln Computer and Communcaton Research Labs Industral Technology Research Insttute Hsnchu,

More information

S1 Note. Basis functions.

S1 Note. Basis functions. S1 Note. Bass functons. Contents Types of bass functons...1 The Fourer bass...2 B-splne bass...3 Power and type I error rates wth dfferent numbers of bass functons...4 Table S1. Smulaton results of type

More information

Title: A Novel Protocol for Accuracy Assessment in Classification of Very High Resolution Images

Title: A Novel Protocol for Accuracy Assessment in Classification of Very High Resolution Images 2009 IEEE. Personal use of ths materal s permtted. Permsson from IEEE must be obtaned for all other uses, n any current or future meda, ncludng reprntng/republshng ths materal for advertsng or promotonal

More information

An Improved Image Segmentation Algorithm Based on the Otsu Method

An Improved Image Segmentation Algorithm Based on the Otsu Method 3th ACIS Internatonal Conference on Software Engneerng, Artfcal Intellgence, Networkng arallel/dstrbuted Computng An Improved Image Segmentaton Algorthm Based on the Otsu Method Mengxng Huang, enjao Yu,

More information

A Lossless Watermarking Scheme for Halftone Image Authentication

A Lossless Watermarking Scheme for Halftone Image Authentication IJCSNS Internatonal Journal of Computer Scence and Network Securty, VOL.6 No.2B, February 2006 147 A Lossless Watermarkng Scheme for Halftone Image Authentcaton Jeng-Shyang Pan, Hao Luo, and Zhe-Mng Lu,

More information

Video Denoising Algorithm in Sliding 3D DCT domain

Video Denoising Algorithm in Sliding 3D DCT domain Dmytro Rusanovskyy and Karen Egazaran, ACIVS 2005, Antwerp, Belgum Vdeo Denosng Algorthm n Sldng 3D DCT doman Dmytro Rusanovskyy and Karen Egazaran Insttute of Sgnal Processng Tampere Unversty of Technology,

More information

Comparison Study of Textural Descriptors for Training Neural Network Classifiers

Comparison Study of Textural Descriptors for Training Neural Network Classifiers Comparson Study of Textural Descrptors for Tranng Neural Network Classfers G.D. MAGOULAS (1) S.A. KARKANIS (1) D.A. KARRAS () and M.N. VRAHATIS (3) (1) Department of Informatcs Unversty of Athens GR-157.84

More information

Determining the Optimal Bandwidth Based on Multi-criterion Fusion

Determining the Optimal Bandwidth Based on Multi-criterion Fusion Proceedngs of 01 4th Internatonal Conference on Machne Learnng and Computng IPCSIT vol. 5 (01) (01) IACSIT Press, Sngapore Determnng the Optmal Bandwdth Based on Mult-crteron Fuson Ha-L Lang 1+, Xan-Mn

More information

Specifications in 2001

Specifications in 2001 Specfcatons n 200 MISTY (updated : May 3, 2002) September 27, 200 Mtsubsh Electrc Corporaton Block Cpher Algorthm MISTY Ths document shows a complete descrpton of encrypton algorthm MISTY, whch are secret-key

More information

Research Article High Capacity Reversible Watermarking for Audio by Histogram Shifting and Predicted Error Expansion

Research Article High Capacity Reversible Watermarking for Audio by Histogram Shifting and Predicted Error Expansion e Scentfc World Journal, Artcle ID 656251, 7 pages http://dx.do.org/1.1155/214/656251 Research Artcle Hgh Capacty Reversble Watermarkng for Audo by Hstogram Shftng and Predcted Error Expanson Fe Wang,

More information

A Hybrid Digital Image Watermarking based on Discrete Wavelet Transform, Discrete Cosine Transform, and General Regression Neural Network

A Hybrid Digital Image Watermarking based on Discrete Wavelet Transform, Discrete Cosine Transform, and General Regression Neural Network A Hybrd Dgtal Image Watermarkng based on Dscrete Wavelet Transform, Dscrete Cosne Transform, and General Regresson Neural Network Ayoub Taher ; ABSTRACT In ths paper, a new hybrd dgtal watermarkng technque

More information

A Study on Clustering for Clustering Based Image De-Noising

A Study on Clustering for Clustering Based Image De-Noising Journal of Informaton Systems and Telecommuncaton, Vol. 2, No. 4, October-December 2014 196 A Study on Clusterng for Clusterng Based Image De-Nosng Hossen Bakhsh Golestan* Department of Electrcal Engneerng,

More information

Subspace clustering. Clustering. Fundamental to all clustering techniques is the choice of distance measure between data points;

Subspace clustering. Clustering. Fundamental to all clustering techniques is the choice of distance measure between data points; Subspace clusterng Clusterng Fundamental to all clusterng technques s the choce of dstance measure between data ponts; D q ( ) ( ) 2 x x = x x, j k = 1 k jk Squared Eucldean dstance Assumpton: All features

More information

EXTENDED BIC CRITERION FOR MODEL SELECTION

EXTENDED BIC CRITERION FOR MODEL SELECTION IDIAP RESEARCH REPORT EXTEDED BIC CRITERIO FOR ODEL SELECTIO Itshak Lapdot Andrew orrs IDIAP-RR-0-4 Dalle olle Insttute for Perceptual Artfcal Intellgence P.O.Box 59 artgny Valas Swtzerland phone +4 7

More information

Parallel matrix-vector multiplication

Parallel matrix-vector multiplication Appendx A Parallel matrx-vector multplcaton The reduced transton matrx of the three-dmensonal cage model for gel electrophoress, descrbed n secton 3.2, becomes excessvely large for polymer lengths more

More information

Rate-Complexity Scalable Multi-view Image Coding with Adaptive Disparity-Compensated Wavelet Lifting

Rate-Complexity Scalable Multi-view Image Coding with Adaptive Disparity-Compensated Wavelet Lifting SSN 746-7659, England, UK Journal of nformaton and Computng Scence Vol. 4, No. 3, 9, pp. -3 Rate-Complext Scalable Mult-vew mage Codng wth Adaptve Dspart-Compensated Wavelet ftng Pongsak asang, Chang-su

More information

Programming in Fortran 90 : 2017/2018

Programming in Fortran 90 : 2017/2018 Programmng n Fortran 90 : 2017/2018 Programmng n Fortran 90 : 2017/2018 Exercse 1 : Evaluaton of functon dependng on nput Wrte a program who evaluate the functon f (x,y) for any two user specfed values

More information

User Authentication Based On Behavioral Mouse Dynamics Biometrics

User Authentication Based On Behavioral Mouse Dynamics Biometrics User Authentcaton Based On Behavoral Mouse Dynamcs Bometrcs Chee-Hyung Yoon Danel Donghyun Km Department of Computer Scence Department of Computer Scence Stanford Unversty Stanford Unversty Stanford, CA

More information

Accounting for the Use of Different Length Scale Factors in x, y and z Directions

Accounting for the Use of Different Length Scale Factors in x, y and z Directions 1 Accountng for the Use of Dfferent Length Scale Factors n x, y and z Drectons Taha Soch (taha.soch@kcl.ac.uk) Imagng Scences & Bomedcal Engneerng, Kng s College London, The Rayne Insttute, St Thomas Hosptal,

More information

Detection of an Object by using Principal Component Analysis

Detection of an Object by using Principal Component Analysis Detecton of an Object by usng Prncpal Component Analyss 1. G. Nagaven, 2. Dr. T. Sreenvasulu Reddy 1. M.Tech, Department of EEE, SVUCE, Trupath, Inda. 2. Assoc. Professor, Department of ECE, SVUCE, Trupath,

More information

Shape-adaptive DCT and Its Application in Region-based Image Coding

Shape-adaptive DCT and Its Application in Region-based Image Coding Internatonal Journal of Sgnal Processng, Image Processng and Pattern Recognton, pp.99-108 http://dx.do.org/10.14257/sp.2014.7.1.10 Shape-adaptve DCT and Its Applcaton n Regon-based Image Codng Yamn Zheng,

More information

EDGE DETECTION USING MULTISPECTRAL THRESHOLDING

EDGE DETECTION USING MULTISPECTRAL THRESHOLDING ISSN: 0976-90 (ONLINE) DOI: 0.97/jvp.06.084 ICTACT JOURNAL ON IMAGE AND VIDEO PROCESSING, MAY 06, VOLUME: 06, ISSUE: 04 EDGE DETECTION USING MULTISPECTRAL THRESHOLDING K.P. Svagam, S.K. Jayanth, S. Aranganayag

More information

CSCI 104 Sorting Algorithms. Mark Redekopp David Kempe

CSCI 104 Sorting Algorithms. Mark Redekopp David Kempe CSCI 104 Sortng Algorthms Mark Redekopp Davd Kempe Algorthm Effcency SORTING 2 Sortng If we have an unordered lst, sequental search becomes our only choce If we wll perform a lot of searches t may be benefcal

More information

Cordial and 3-Equitable Labeling for Some Star Related Graphs

Cordial and 3-Equitable Labeling for Some Star Related Graphs Internatonal Mathematcal Forum, 4, 009, no. 31, 1543-1553 Cordal and 3-Equtable Labelng for Some Star Related Graphs S. K. Vadya Department of Mathematcs, Saurashtra Unversty Rajkot - 360005, Gujarat,

More information

Simulation Based Analysis of FAST TCP using OMNET++

Simulation Based Analysis of FAST TCP using OMNET++ Smulaton Based Analyss of FAST TCP usng OMNET++ Umar ul Hassan 04030038@lums.edu.pk Md Term Report CS678 Topcs n Internet Research Sprng, 2006 Introducton Internet traffc s doublng roughly every 3 months

More information

Article Reversible Dual-Image-Based Hiding Scheme Using Block Folding Technique

Article Reversible Dual-Image-Based Hiding Scheme Using Block Folding Technique Artcle Reversble Dual-Image-Based Hdng Scheme Usng Block Foldng Technque Tzu-Chuen Lu, * and Hu-Shh Leng Department of Informaton Management, Chaoyang Unversty of Technology, Tachung 4349, Tawan Department

More information

Reducing Frame Rate for Object Tracking

Reducing Frame Rate for Object Tracking Reducng Frame Rate for Object Trackng Pavel Korshunov 1 and We Tsang Oo 2 1 Natonal Unversty of Sngapore, Sngapore 11977, pavelkor@comp.nus.edu.sg 2 Natonal Unversty of Sngapore, Sngapore 11977, oowt@comp.nus.edu.sg

More information

Load Balancing for Hex-Cell Interconnection Network

Load Balancing for Hex-Cell Interconnection Network Int. J. Communcatons, Network and System Scences,,, - Publshed Onlne Aprl n ScRes. http://www.scrp.org/journal/jcns http://dx.do.org/./jcns.. Load Balancng for Hex-Cell Interconnecton Network Saher Manaseer,

More information

Classification Based Mode Decisions for Video over Networks

Classification Based Mode Decisions for Video over Networks Classfcaton Based Mode Decsons for Vdeo over Networks Deepak S. Turaga and Tsuhan Chen Advanced Multmeda Processng Lab Tranng data for Inter-Intra Decson Inter-Intra Decson Regons pdf 6 5 6 5 Energy 4

More information

CS1100 Introduction to Programming

CS1100 Introduction to Programming Factoral (n) Recursve Program fact(n) = n*fact(n-) CS00 Introducton to Programmng Recurson and Sortng Madhu Mutyam Department of Computer Scence and Engneerng Indan Insttute of Technology Madras nt fact

More information

Problem Set 3 Solutions

Problem Set 3 Solutions Introducton to Algorthms October 4, 2002 Massachusetts Insttute of Technology 6046J/18410J Professors Erk Demane and Shaf Goldwasser Handout 14 Problem Set 3 Solutons (Exercses were not to be turned n,

More information

A New Feature of Uniformity of Image Texture Directions Coinciding with the Human Eyes Perception 1

A New Feature of Uniformity of Image Texture Directions Coinciding with the Human Eyes Perception 1 A New Feature of Unformty of Image Texture Drectons Concdng wth the Human Eyes Percepton Xng-Jan He, De-Shuang Huang, Yue Zhang, Tat-Mng Lo 2, and Mchael R. Lyu 3 Intellgent Computng Lab, Insttute of Intellgent

More information

MOTION BLUR ESTIMATION AT CORNERS

MOTION BLUR ESTIMATION AT CORNERS Gacomo Boracch and Vncenzo Caglot Dpartmento d Elettronca e Informazone, Poltecnco d Mlano, Va Ponzo, 34/5-20133 MILANO boracch@elet.polm.t, caglot@elet.polm.t Keywords: Abstract: Pont Spread Functon Parameter

More information

Feature Reduction and Selection

Feature Reduction and Selection Feature Reducton and Selecton Dr. Shuang LIANG School of Software Engneerng TongJ Unversty Fall, 2012 Today s Topcs Introducton Problems of Dmensonalty Feature Reducton Statstc methods Prncpal Components

More information

A MOVING MESH APPROACH FOR SIMULATION BUDGET ALLOCATION ON CONTINUOUS DOMAINS

A MOVING MESH APPROACH FOR SIMULATION BUDGET ALLOCATION ON CONTINUOUS DOMAINS Proceedngs of the Wnter Smulaton Conference M E Kuhl, N M Steger, F B Armstrong, and J A Jones, eds A MOVING MESH APPROACH FOR SIMULATION BUDGET ALLOCATION ON CONTINUOUS DOMAINS Mark W Brantley Chun-Hung

More information

y and the total sum of

y and the total sum of Lnear regresson Testng for non-lnearty In analytcal chemstry, lnear regresson s commonly used n the constructon of calbraton functons requred for analytcal technques such as gas chromatography, atomc absorpton

More information

Research and Application of Fingerprint Recognition Based on MATLAB

Research and Application of Fingerprint Recognition Based on MATLAB Send Orders for Reprnts to reprnts@benthamscence.ae The Open Automaton and Control Systems Journal, 205, 7, 07-07 Open Access Research and Applcaton of Fngerprnt Recognton Based on MATLAB Nng Lu* Department

More information

Steps for Computing the Dissimilarity, Entropy, Herfindahl-Hirschman and. Accessibility (Gravity with Competition) Indices

Steps for Computing the Dissimilarity, Entropy, Herfindahl-Hirschman and. Accessibility (Gravity with Competition) Indices Steps for Computng the Dssmlarty, Entropy, Herfndahl-Hrschman and Accessblty (Gravty wth Competton) Indces I. Dssmlarty Index Measurement: The followng formula can be used to measure the evenness between

More information