Article Reversible Dual-Image-Based Hiding Scheme Using Block Folding Technique

Size: px
Start display at page:

Download "Article Reversible Dual-Image-Based Hiding Scheme Using Block Folding Technique"

Transcription

1 Artcle Reversble Dual-Image-Based Hdng Scheme Usng Block Foldng Technque Tzu-Chuen Lu, * and Hu-Shh Leng Department of Informaton Management, Chaoyang Unversty of Technology, Tachung 4349, Tawan Department of Mathematcs, Natonal Changhua Unversty of Educaton, Changhua 50058, Tawan; lenghs@cc.ncue.edu.tw * Correspondence: tclu@cyut.edu.tw; Tel.: (ext. 4558) Receved: 9 September 07; Accepted: 9 October 07; Publshed: October 07 Abstract: The concept of a dual-mage based scheme n nformaton sharng conssts of concealng secret messages n two cover mages; only someone who has both stego-mages can extract the secret messages. In 05, Lu et al. proposed a center-foldng strategy where each secret symbol s folded nto the reduced dgt to reduce the dstorton of the stego-mage. Then, n 06, Lu et al. used a frequency-based encodng strategy to reduce the dstorton of the frequency of occurrence of the maxmum absolute value. Because the foldng strategy can obvously reduce the value, the proposed scheme ncludes the foldng operaton twce to further decrease the reduced dgt. We use a frequency-based encodng strategy to encode a secret message and then use the block foldng technque by performng the center-foldng operaton twce to embed secret messages. An ndcator s needed to dentfy the sequence number of the foldng operaton. The proposed scheme collects several ndcators to produce a combned code and hdes the code n a pxel to reduce the sze of the ndcators. The expermental results show that the proposed method can acheve hgher mage qualty under the same embeddng rate or hgher payload, whch s better than other methods. Keywords: dual stego-mages; nformaton hdng; center-foldng strategy; block foldng. Introducton Informaton hdng s a technque that conceals secret messages n dgtal meda. The sender embeds secret messages n a cover mage to generate a stego-mage and then sends t to the recever. The recever can extract the secret messages from the stego-mage (Fgure ). Fgure. Dagram of the nformaton hdng process. Symmetry 07, 9, 3; do:0.3390/sym9003

2 Symmetry 07, 9, 3 of 5 In general, nformaton hdng schemes can be classfed nto two categores,.e., reversble data hdng and rreversble data hdng, as shown n Fgure. The most commonly used rreversble data hdng methods nclude the least sgnfcant bt (LSB) substtuton method, the pxel-value dfferencng (PVD) method, and the explotng modfcaton drecton method (EMD) [ 4]. The LSB method s a well-known rreversble data hdng technque because of ts hgh payload and low dstorton. It drectly replaces the bts of the cover pxel wth secret bts for embeddng. Melkanen (006) proposes a modfcaton to the LSB method called LSB matchng []. In hs method, the secret bts are embedded by usng the bnary functon and four embeddng rules. Fgure. Informaton hdng categores. LSB: least sgnfcant bt substtuton method, PVD: the pxelvalue dfferencng method, EMD: the explotng modfcaton drecton method, DE: dfference expanson, HS: hstogram shftng, PVO: pxel-value orderng method. Wu and Tsa (003) proposed the PVD method []. In ther method, the dfference of two pxels n the cover mage s calculated to determne the number of bts to be embedded n these two pxels and a pre-defned range table. The technque can embed a large number of secret bts nto the cover mage wth hgh mperceptblty as t makes use of the characterstc of human vson senstvty. Chang and Tseng (004) utlzed the dfference of the predcted value and the target pxels to estmate the degree of smoothness or contrast of pxels to determne the number of bts to be embedded n the target pxels [3]. Zhang and Wang (006) proposed the EMD method [4]. The EMD method provdes a good mage qualty for the stego-mage wth a peak sgnal-to-nose rato (PSNR) of more than 5 db, snce, at most, only one pxel n each pxel group needs to be ncreased or decreased by one. Keu and Chang (0) mproved the EMD method by explotng eght modfcaton drectons to embed several secret bts nto a cover par at a tme [5]. Compared wth rreversble data hdng schemes, reversble data hdng schemes can recover the cover mage wthout any dstorton from the stego-mage after the secret messages have been extracted. The most commonly used reversble data hdng methods nclude the dfference expanson (DE) method, hstogram shftng (HS) method, and pxel-value orderng (PVO) method. Tan (003) proposed the DE method [6] that embeds a secret bt nto the LSB of the expanded dfference of each pxel par of the cover mage. The scheme provdes a hgh payload; however, the dstorton caused by the DE s sgnfcant. Alattar (004) mproved Tan s scheme wth double the respectve dfferences between four neghborng pxels and acheved more secret bts wth the expanded dfference [7]. N et al. (006) proposed the HS method n 006 [8]. Ther method s to frstly generate the hstogram by the pxel ntensty value and shft the bns between the zero and peak pont to create empty bns for data embeddng. The advantage of the HS method s ts low dstorton; however, ts drawback s a low payload, because the embeddng capacty s determned by the number of ponts

3 Symmetry 07, 9, 3 3 of 5 n the peak pont of the bn. L et al. and Gu et al. proposed an adaptve embeddng technque that dvdes pxels nto dfferent types to enhance the embeddng capacty of a predcton error [9,0]. L et al. (03) proposed the PVO method []. In ther method, for each block, the pxels are reordered nto a pxel vector, then the smallest pxel s predcted by the second smallest pxel, and the largest pxel s predcted by the second largest pxel. It uses predcton errors and to embed data, whereas predcton error 0 s unchanged. Peng et al. (04) mproved the PVO method to use larger blocks for embeddng and take better advantage of mage redundancy to yeld a hgher PSNR []. Qu and Km (05) modfed the PVO method so that each pxel s predcted usng ts sorted context pxels to acheve a better embeddng capacty n smooth mage regons [3]. Wang et al. (05) used a dynamc blockng strategy to dvde the cover mage adaptvely nto varous-szed blocks. Thus, the flat mage areas are preferentally dvded nto smaller blocks to retan a hgh embeddng capacty and the rough areas are dvded nto larger blocks to avod decreasng PSNR value [4]. The dual-mage-based hdng scheme s a new technology n the nformaton hdng feld. The concept of dual-mage, based on nformaton sharng, conssts of concealng secret messages n two of the same cover mages; only someone who has both stego-mages can extract the secret messages. A dagram of the dual-mage based hdng scheme s shown n Fgure 3. There are many advantages to usng dual-mage n data hdng, such as a hgh payload, reversblty, and strong robustness. (a) (b) Fgure 3. Dual-mage based hdng scheme. (a) Embed secret messages nto two of the same cover mages; (b) Extract secret messages from the two stego-mages. In the dual-mage-based hdng scheme, mage qualty and payload are affected by embeddng rules [5 ]. Chang et al. (007) combned the EMD method wth the dual-mage technque to

4 Symmetry 07, 9, 3 4 of 5 acheve a hgh payload and reduce dstorton [5]. Lee et al. (009) used combnatons of pxel orentaton locatons wth dual-mage to enhance embeddng capacty and preserve good vsual qualty [6]. Lee and Huang (03) converted secret messages nto qunary-based secret symbols and combned every two secret symbols as a set embedded n the dual-mage [7]. Chang et al. (03) converted secret messages nto decmal-based secret symbols, then embedded secret symbols n a rght dagonal lne [8]. Qn et al. (04) embedded secret messages n the frst mage usng the EMD method and n the second mage usng other rules that were dependent on the frst mage [9]. Lu et al. (05) used the LSB matchng method and modfed the non-reversble stego-pxels based on a rule table to restore the cover mage [0]. They proposed the center-foldng strategy to reduce the value of the secret symbols. Then, they embedded secret symbols n two stego-mages through an averagng method []. Lu et al. (06) proposed a frequency-based encodng method to reduce the dstorton derved by the maxmum secret dgt []. In [], Lu et al. propose a center-foldng strategy n whch each secret symbol s folded nto the reduced dgt before the embeddng procedure to reduce the dstorton of the stego-mage. The foldng strategy s smple and effectve, to the extent that the mage qualty of the stego-mage s very good. Because the foldng strategy can obvously reduce the value, the proposed scheme performs the foldng operaton twce to further decrease the reduced dgt. Furthermore, n [], Lu et al. use a frequency-based encodng strategy to reduce the dstorton of the frequency of occurrence of the maxmum absolute value. The re-encoded technque also can be used to reduce the number of the secret dgt and narrow down the dstance between the stegopxel and the orgnal pxel. Therefore, the proposed scheme frst uses a frequency-based encodng strategy to encode the secret message and then uses the block foldng technque by ncludng the center-foldng operaton twce to embed secret messages. In addton, several steganalyss technques are used to prove the strong robustness of the proposed scheme, ncludng hstogram steganalyss, Regular and sngular groups (RS) steganalyss [3], prmary sets, Ch square, sample pars RS analyss, and fuson detecton [4]. The rest of ths paper s organzed as follows. Secton descrbes related works. Secton 3 ntroduces the proposed scheme. Secton 4 summarzes the experment results. The conclusons are presented n Secton 5.. Related Works In ths secton, we brefly ntroduce Lee et al. s scheme, the center-foldng strategy, and the frequency-based encodng strategy... Lee et al. s Methods Lee et al. [6,7] proposed a drecton-based dual-mage method. In ther scheme, two pxels P and P are used to conceal four secret bts and a drecton map s used to represent the embeddng rules. Fgure 4 shows the drecton map. Suppose that two pxels are P = 5, P = 0 and the secret bts are 00. The drecton map ndcates that P = P + = 5 + = 6 and P = 0 for embeddng 00 n the frst stego-mage. If the next two secret bts are 0, then the stego-pxels are P = P = 5 and P = P + = 0 + = for the second stego-mage.

5 Symmetry 07, 9, 3 5 of 5 Fgure 4. Drecton-based embeddng rules. However, n some cases, the method cannot conceal secret data n the second stego-mage. Therefore, only the frst mage s modfed to embed the frst two secret bts. In 03, Lee and Huang mproved the above method by ncreasng the number of drecton rules from four drectons to fve drectons and redesgned the embeddng rule to ncrease the embeddng payload. The drecton map s shown n Fgure 5... Center-Foldng Strategy Fgure 5. Data embeddng method usng fve drectons. In [], Lu et al. proposed a center-foldng strategy where each secret symbol s folded nto the reduced dgt before the embeddng procedure to reduce the dstorton of the stego-mage. For example, K bts of secret data were taken as a set and converted nto the secret symbol d. The centerfoldng strategy changed the range of secret symbols from ={0,,,, } to = {, +,,,0,,,, }. The formula s as follows: d = d K, () where s a folded secret symbol and s an ntermedate value. After the foldng, the value range of the secret symbol changed to [, ]. Fgure 6 shows an example where s set to be 3. The maxmum value of the value range s 7. Assume that a pxel value s 38. If the secret symbol d = 7 s added drectly to the pxel to get the stego-pxel 38

6 Symmetry 07, 9, 3 6 of = 45, then the mage dstorton nflcted s (45 38) =7 =49. However, n Lu et al. s scheme, the symbol s folded as = 7 = 3. The folded symbol =3 nstead of the orgnal symbol 7 s added wth the pxel 38 to get the stego-pxel = 4. The mage dstorton caused by Lu et al. s method s (4 38) =3 =9. The mage dstorton s reduced from 49 to 9. Fgure 6. Example value range of the central-foldng strategy wth = 3. It s obvous that the center-foldng strategy s smple and effectve; t can reduce the dstorton of the stego-mage after the embeddng procedure. Therefore, n the proposed scheme, we perform the foldng operaton twce to further decrease the reduced dgt..3. Frequency-Based Encodng Strategy In [], Lu et al. used a frequency-based encodng strategy to reduce the dstorton of the frequency of occurrence of the maxmum absolute value. For example, suppose that the secret bt stream s Frst, the scheme converts each three bts (K = 3) as a group to a decmal dgt stream as Next, t uses the center-foldng strategy to reduce the dgt stream as Then, the frequency table can be made as Table, whch records the rank of each reduced dgt and map number of ts new ndex n descendng order by occurrence frequency. Table. Example of the frequency-based encodng table (K = 3). Decmal Dgt Reduced Dgt Occurrence Frequency Order Indces Compared wth embeddng the re-encoded secret dgt and the orgnal secret dgt, the frequency-based encodng strategy can be used to reduce the number of the secret dgt and narrow down the dstance between the orgnal pxel and the stego-pxel..4. Proposed Method In Lu s scheme, each secret symbol s reduced to the reduced dgt usng the center-foldng strategy. A dagram of Lu s center-foldng strategy s shown n Fgure 7. In the fgure, the center value 5 s subtracted from each decmal message to generate the reduced dgt. The value range of Fgure 7 can be seen as a band. The maxmum value of the band s 7 n Fgure 7. After the foldng, the band s separated nto two sub-bands. The maxmum absolute value of the two sub-bands s 4.

7 Symmetry 07, 9, 3 7 of 5 Fgure 7. Dagram of Lu s center-foldng strategy. Because the foldng strategy can obvously reduce the value, the proposed scheme ncludes the foldng operaton twce to further decrease the reduced dgt. The concept of the proposed scheme s shown n Fgure 8. In the fgure, the value range of s frst dvded nto two sub-bands SB and SB. Each sub-band performs a one-tme center-foldng strategy. For example, the value range of subband SB s shown n Fgure 8a. The center value of SB s. The center value s subtracted from the values n SB to generate the reduced dgt. We can see that the maxmum absolute value of the two sub-bands s, whch s smaller than the value 4 n Fgure 8. Fgure 8. Dagram of the proposed block foldng technque. However, the sub-bands SB and SB have the same reduced values. We cannot dstngush the orgnal value from. Hence, an ndcator s needed to dentfy whch sub-band the reduced value s located n. If the reduced value s located n the sub-band SB, then the ndcator s set to be 0, where =0. In contrast, f the reduced value s located n the sub-band SB, then the ndcator s set to be, where =. The orgnal value s mapped to a code par (, ) to reduce the mage dstorton. For example, the decmal value = 7 s mapped to the code par (, ) = (, ). However, the ndcator s extra nformaton that also needs to be concealed n the cover mage and wll decrease the hdng capacty. To solve ths problem, the proposed scheme collects several ndcators to produce a combned code and hdes the code n a pxel. In the proposed scheme, the cover mage s dvded nto several blocks. Each block has pxels n t. The last pxel n the block s used to embed the combned code. The other pxels are used to conceal the reduced dgt. Furthermore, the proposed scheme consders the occurrence frequency of the decmal dgt to reassgn proper code to the reduced dgt that can sgnfcantly shrnk the mage dstorton..5. Embeddng Procedure In the proposed scheme, a cover mage s dvded nto several blocks. Each block has pxels n t. Let = {,,, } be the block. A secret mage s formed as a bnary strng. The strng s separated nto several substrngs the sze of. Each substrng s transformed nto a decmal dgt. The scheme computes the occurrence frequency of each decmal dgt to generate a hstogram and sort the hstogram n descendng order. The dgt wth the maxmum frequency s I ', d ˆ'. encoded wth the smallest dstorton code par ( )

8 Symmetry 07, 9, 3 8 of 5 Each block can be used to hde ( ) code pars. The scheme conceals the reduced dgt n the pxel by usng an averagng method to generate the stego-pxels and, where. The ndcators are collected to form a combned code, and the code s concealed nto the last pxel of the block to generate and. Fgure 9 shows the nformaton hdng dagram of the proposed method. More detals of the procedures are gven below. Fgure 9. Informaton hdng dagram of the proposed scheme. Step : Transform a set of K secret bts nto a decmal dgt. Let d be the decmal dgt that s computed by d = where d [0, K ] and s j denotes the jth secret bt n the set. K j j s, () j= Step : Compute the occurrence frequency of each decmal dgt. Let F ( d ) be the occurrence frequency of each decmal dgt. These frequences are sorted n descendng order, and the ndex of sorted results s denoted as O ( d ). Step 3: Compute the reduced code d ˆ for each decmal dgt. In Fgure 6, the decmal dgt d has been folded twce to generate the reduced code dˆ and the ndcator I. Table shows the reduced codes and ndcators wth K = 3. The decmal dgts are reduced effectvely from [0, K ] to [ K, K ]. Table. Example code pars of Fgure 6 wth K = 3. d I dˆ 0 0 ( I, d ˆ ) (0, ) (0, ) (0, 0) (0, ) (, ) (, ) (, 0) (, ) However, the reduced dgts n Table do not show the feature of the secret mage. In Table, the absolutely reduced code d ˆ = s the maxmum reduced code, whch causes maxmum dstorton when drectly concealed nto the pxel. If the maxmum reduced code s occurrence

9 Symmetry 07, 9, 3 9 of 5 frequency s hgh, then drectly embeddng t n the mage wll decrease the vsual qualty. Hence, the proposed scheme further re-encodes the reduced code and ndcator code accordng to the order ˆ s computed by of O ( d ). The re-encoded code d where ˆ O( d) = sgn( O( d)), 4 d (3), ( v) =, f v s an odd number, sgn. (4) otherwse. Step 4: Compute the re-encoded ndcator I ' by 0, f O( d) = 0, I =, f mod( ( O( d) + ),4) = 0 or mod( O( d),4) = 0, (5) 0, otherwse. The above procedure re-encodes the reduced dgts and ndcators, whch occurs most frequently as the mnmum absolute value. The re-encoded code pars of Table are shown n Table 3. Table 3. The re-encoded code pars of Table. O ( d ) I' d ˆ 0 ( I',d' ˆ ) (0, 0) (0, ) (0, ) (, ) (, ) (0, ) (0, ) (, ) Step 5: Generate a mappng table for further embeddng and recovery processes. Integrate the reencoded code pars ( I ', d ˆ' ) wth the ndces d to form a mappng table. The mappng relatonshp must be recorded for use n the recovery phases. Table 4 shows an example mappng table wth K = 3. Table 4. Example mappng table wth K = 3. d F ( d) ( d) O I d ˆ ( I,dˆ ) 0 787,558 0 (0, ) 90, (0, ) 33,73 7 (, ) 3 90,853 3 (, ) 4 90,36 4 (, ) 5 34, (0, ) 6 90,853 0 (0, ) 7 879, (0, 0) Step 6: Step 7: Dvde a cover mage nto server blocks. Let = {,,, } be a block. Pck ( ) code pars,,,,,, to embed nto the block. () Conceal the re-encoded reduced dgt n the pxel by usng and BK = BK ˆd +, (6)

10 Symmetry 07, 9, 3 0 of 5 K = BK d ˆ B, (7) where, B K denotes the th pxel of the frst stego-block and B K denotes the th pxel of the second stego-block. Fgure 0 shows that the proposed ˆd method can control the dstorton wthn. () Collect the ndcators to form a combned code () = (,,, ). The combned code s computed by B = ID = (8) I (3) Embed the combned code n the pxel Step 8: BK = BK ID + B B, and (9) BK = BK ID Repeat Step 6 untl all blocks have been processed. B B (0) Fgure 0. Dagram of the averagng embeddng method. Fgure shows an example to llustrate the embeddng process. Fgure a s a secret strng wth 4 secret bts. Let K = 3, and the frst three secret bts 0 are transformed nto a decmal dgt 3 3 d = s = = 6. The scheme maps the decmal dgt d to the = mappng table as shown n Table 4 to obtan the re-encoded code par, = (0, ). The transformaton of the other secret bts follows the same procedure descrbed above. Assume a cover mage s dvded nto several blocks szed B = 3. Each block can be used to hde ( ) = (3 ) = code pars. In Fgure a, the code pars are,,, = {(0, ), (,)}. Fgure 8b shows a cover mage. The frst block s = {05, 49,3 }. The reduced dgts = and = are concealed nto = 05 and = 49, respectvely. The stegopxels of the frst cover pxel = 05 are computed by B K = BK + = 05 + ( ) = 04 and B K = BK = 05 0 = 05. The stego-pxels of the second cover pxel = 49 are computed by B K = 49 + = 49 and B K = 49 = 48. Then, the scheme collects the ndcators to form a combned code = ( ) = (0) = (). The combned code s embedded n the pxel = 3 by B K 3 = BK3 + = = 3 and B K 3 = BK3 = 3 = 3. Two stego-blocks are shown n Fgure b.

11 Symmetry 07, 9, 3 of 5 The embeddng procedure s executed repeatedly untl all code pars are embedded. The fnal stego-mages, along wth the mappng table, are sent to the recever for extracton and recovery. (a) (b) Fgure. Example of the proposed method. (a) Secret encodng; (b) Embeddng example..6. Overflow/Underflow Problem In the embeddng process, an underflow/overflow problem mght occur as a result of the reduced code. For example, f the pxel s BK = 54 and ˆd = 3, then the two together would cause the overflow problem. In the proposed scheme, the range of dˆ s [ K, K ]. If a pxel s larger than 55 ( K ) = 56 K, then the overflow problem mght occur because of the addton of K. If a pxel that s less than K, then t mght cause the underflow problem because of the addton of K. For example, assume K = 4, and the range of dˆ s [ 4, 3]. Suppose that dˆ = 3, and ˆd 3 = =. Then, the stego-pxel s BK ˆd BK = 0, =, and there s an underflow problem. Hence, the embeddable pxel s defned as beng n the range of K and 56 K. In the embeddng process, the proposed scheme determnes whether the pxel BK s n the range of [ K,

12 Symmetry 07, 9, 3 of 5 56 K ] or not. If the pxel s wthn the range, then t could be classfed nto a block. However, the pxel mght cause an underflow/overflow problem and the pxel s non-embeddable. For the nonembeddable pxel, the stego-pxels are set to equal the value of the orgnal pxels. For example, assume that K = 4 and a pxel n the range of [ 4, 56 4 ] = [4, 5] s embeddable. In Fgure, the pxel 54 s out of the range, whch means t s non-embeddable. The stego-pxels are set to equal ts orgnal pxel. The next pxels 3 and 05 are embeddable. However, the next pxel s nonembeddable and cannot be classfed nto a block. So, the next pxel 50 s gathered wth pxels 3 and 05 to form block BK ={3,05,50}, and the embeddng process s performed..7. Extracton and Recovery Fgure. Example of a block wth three embeddable pxels. In ths secton, we descrbe the extracton and recovery processes by whch re-encoded reduced dgts and secret bts are extracted from the stego-mage as well as the process of cover mage recovery. There are ( ) code pars concealed n an embeddable block. Hence, the recever dvdes the stego-mages nto several blocks the sze of B. The re-encoded reduced dgts dˆ can be extracted by computng the dfferences between two stego-pxels, where d ˆ = BK BK and. The combned code s extracted from the last pxels of the stego-blocks by ID = BK B BK. B Then, the recever transforms the combned code ID nto ( ) bnary bts. Each bt represents an ndcator I. One ndcator I along wth one re-encoded reduced dgt d ˆ forms the code par ( I, d ˆ ). After the code par s obtaned, t s then mapped to the mappng table to obtan the orgnal decmal dgt d. Each decmal dgt d s transformed nto K secret bts. In the recovery process, the cover pxel BK can be recovered by the average between two stegopxels,.e., BK + BK BK =. Fgure 3 shows the data extracton and recovery procedure of the proposed method. Fgure 3. Dagram of the extracton and recovery processes.

13 Symmetry 07, 9, 3 3 of 5 Followng the same example presented n Fgure b. The stego-blocks are = {04, 49, 3} and B K ={05,48,3}. The re-encoded reduced codes are d ˆ = BK BK = = and d ˆ = BK BK = =, and the combned code s ID = BK 3 BK 3 = 3 3=. The combned code s transformed nto (3 ) = bnary bts ID = ( 0), where I = 0 and I =. The code pars are ( I, d ˆ ) = (0, ) and ( I, d ˆ ) = (, ). The orgnal decmal dgts d = 6 and d = 3 can be derved by mappng them nto the mappng table as shown n Fgure a. Fnally, the decmal dgts d = 6 and d = 3 are transformed nto three secret bts,.e., 0 and 0. Furthermore, the orgnal pxel can be recovered by the average between B K and B K,.e., BK + BK BK = = = 05, BK = = 49, and BK 3 = = 3. In the extracton process, the proposed scheme determnes whether the two stego-pxels are both outsde the range [ K, 56 ]. If so, then the pxels are non-embeddable. If the two stego-pxels are not equal and more than one pxel s wthn the range, then the pxels are embeddable and data are concealed wthn. The secret nformaton can be extracted, and the pxels can be restored followng the extracton procedure..8. Re-Encodng of the Combned Code In the embeddng process, the combned code s used to ndcate the number of sub-bands of the re-encoded code. The value range of ID s [0, () ]. For example, assume that the block sze s set to be = 5. The value range of ID s [0, () ] = [0, 5]. The maxmum value of the range s 5. The value s drectly added to the last pxel of the block to generate the stego-pxel. However, f the maxmum value occurrence frequency s hgh, then drectly embeddng t n the pxel wll decrease the vsual qualty. Therefore, the proposed scheme selectvely re-encodes the combned code accordng to ts occurrence frequency and generates a mappng table to record the relatonshp between the combned code and the re-encoded combned code. The re-encodng procedure s the same as the re-encodng procedure of the reduced code. 3. Results In the proposed scheme, the block sze B and the hdng bt K are key factors that nfluence the hdng performance. To fnd out proper values of B and K, eght schemes wth dfferent values are mplemented. They are BlockFoldng (B = 3, K = 3, RE = 0), BlockFoldng (B = 3, K = 3, RE = ), BlockFoldng (B = 3, K = 4, RE = 0), BlockFoldng (B = 3, K = 4, RE = ), BlockFoldng (B = 5, K = 3, RE = 0), BlockFoldng (B = 5, K = 3, RE = ), BlockFoldng (B = 5, K = 4, RE = 0), and BlockFoldng (B = 5, K = 4, RE = ). The parameters B and K are the block sze and the hdng bts, respectvely. The parameter RE ndcates whether the combned code s re-encoded or not. RE = 0 means the combned code s the orgnal value wthout re-encodng. In contrast, RE = means the combned code s re-encoded accordng to ts occurrence frequency. Fve related methods are also mplemented for a comparson wth the proposed schemes. These are Lee s dual steganographc scheme (Lee009), Lee s orentaton combnaton scheme (Lee03), Chang s magc matrx scheme (Chang03), Lu et al. s center-foldng scheme (Lu05), and Lu s scheme wthout the center-foldng strategy (NonFoldng). Two measurements are used to measure the performance of the hdng methods, the embeddng rate and the mage qualty. The embeddng rate R s calculated by C E R = (bpp), () h w

14 Symmetry 07, 9, 3 4 of 5 where C s the total hdng capacty of the two stego-mages, E s the sze of the mappng table, and h w s the sze of the mage. A hgh embeddng rate means that the proposed scheme has great embeddng ablty. Image qualty s calculated by usng the PSNR gven by PSNR_z = 0 log0 55 (db), MSE_z () where PSNR_z s the PSNR value of the zth stego-mage, db represents the decbels, and MSE_z s the mean squared error between the cover mage and the stego-mage, and s obtaned by MSE = (P P), hw (3) where P s the cover pxel and P s the stego-mage. The PSNR values n the expermental results are the average values of all PSNR_z, whch can be computed by PSNR_avg = PSNR_z (db). z (4) In general, t s very dffcult to determne the dfference between the cover mage and the stegomage by human eyes when the PSNR value s greater than 30 db. Sx grayscale mages were used to test the hdng performance. Fgure 4 shows the mages Lena, Mandrll, Arplane, Peppers, Lake, and Tffany. The sze of the mage s 5 5. Four secret mages, namely, random (5 5), Dolphn (375 35), Bran (40 35), and TffanySec (5 5) are shown n Fgure 5. (a) Lena (b) Mandrll (c) Arplane (d) Peppers (e) Lake (f) Tffany Fgure 4. Sx test mages.

15 Symmetry 07, 9, 3 5 of 5 (a) random (5 5) (b) Dolphn (75 35) (c) TffanySec (5 5) (d) Bran (40 35) Fgure 5. Four secret mages. In the frst experment, we tested the performance of the proposed scheme wth varous B, K, and RE. Fgure 6 shows the expermental results. BlockFoldng s the proposed scheme. Under the same embeddng rate, BlockFoldng (B = 3, K = 3, RE = 0) can acheve the hghest mage qualty. BlockFoldng (B = 5, K = 4, RE = ) can get the hghest hdng payload. When B = 3 and K = 3, the mage qualty wth RE = 0 s hgher than that wth RE =. However, when B = 5 and K = 4, the mage qualty wth RE = s hgher than that wth RE = 0. The reason s that f the block sze s small, then the combned code s small enough that t does not need to be re-encoded. However, for a block wth a large sze, the combned code s usually large enough that t needs to be re-encoded. For example, f the value range of the combned code wth B = 5 s [0, ( ) ] = [0, 5], the maxmum value 5 wll cause great mage dstorton. The re-encodng process can effectvely narrow down the dstorton.

16 Symmetry 07, 9, 3 6 of 5

17 Symmetry 07, 9, 3 7 of 5 Fgure 6. Results of the frst experment. To compare for a comparson of the proposed scheme wth other related methods, the value of B s set to 3 and 5, the value of K s set to 3 and 4, and RE s set to be 0 and. Tables 5 8 show the results of the comparson among the proposed scheme and the related works wth the cover mage Lena and the secret mages random, TffanySec, Dolphn, and Bran, respectvely. Table 5. Experment results for the secret mage random. Method B K RE PSNR_ PSNR_ PSNR_avg Capacty R Tme , , , BlockFoldng , , , , , Lu , ,048, NonFoldng , Lee , Lee , Chang , Table 6. Experment results for the secret mage Tffany. Method B K RE PSNR_ PSNR_ PSNR_avg Capacty R Tme , , , BlockFoldng , , , , , Lu , ,048, NonFoldng , Lee , Lee , Chang ,

18 Symmetry 07, 9, 3 8 of 5 Table 7. Experment results for the secret mage Dolphn. Method B K RE PSNR_ PSNR_ PSNR_avg Capacty R Tme , , , BlockFoldng , , , , , Lu , ,048, NonFoldng , Lee , Lee , Chang , Table 8. Experment results for the secret mage Bran. Method B K RE PSNR_ PSNR_ PSNR_avg Capacty R Tme , , , BlockFoldng , , , , , Lu , ,048, NonFoldng , Lee , Lee , Chang , In Table 5, wth the secret mage random, the PSNR_avg of the proposed scheme wth B = 5, K = 4, and RE = for the cover mage Lena s db, whch s greater than the value of db for Lu05. The mage qualty of the proposed scheme s hgher than the value of 9.48 db obtaned by Lu s scheme. At the same tme, the hdng rate of the proposed scheme s.6 bpp, whch s hgher than that of Lu05 s 0. bpp. Under the same hdng capacty, the mage qualty of the proposed scheme wth B = 3, K = 3, and RE = 0 s db, whch s hgher than that of Lee03 s 5.63 db. Although Lu05 wth K = 4 acheves the hghest hdng rate,.0 bpp, the mage qualty of Lu05 s decreased to db. In Table 6, although Lee009 has hghest mage qualty 5.90 db, the hdng rate of Lee009 s only 0.7 db. The results for dfferent secret mages have the same stuaton. In Table 8, for the secret mage Bran, the mage qualty obtaned by Lee009 s the hghest. However, ts hdng capacty s 0.53 bpp, whch s the lowest among all results obtaned by other methods. The proposed scheme wth B = 3, K = 3, and RE = 0 has the same hdng payloads as those of Lee03. The mage qualty of the proposed scheme s db, whch s greater than that of the other methods, thereby ndcatng that the proposed scheme stll exhbts better embeddng performance compared wth the others. From the results of the experment, we can see that the proposed scheme wth a small block sze B = 3 acheves a hgher mage qualty. Because the combned code n the small block sze s small, the code does not need to be re-encoded where RE = 0. In contrast, the proposed scheme wth a large

19 Symmetry 07, 9, 3 9 of 5 block sze B = 5 has a hgher hdng capacty. The combned code n a large block sze needs to be reencoded, as the value of the code s usually very large. Hence, RE s set to be RE = for B = 5. The second experment compared the proposed scheme wth the other methods. Fgure 7 shows the comparson among all fve related methods and the proposed scheme n terms of embeddng rate and PSNR value. Fgure 7 shows that the mage qualty of BlockFoldng (B = 3, K = 3, RE = 0) s hgher than those of the other methods. Under the same embeddng rate, the proposed method can acheve a greater PSNR value than the related methods. The hdng capacty of BlockFoldng (B = 5, K = 4, RE = ) s hgher than those of the other methods.

20 Symmetry 07, 9, 3 0 of 5 Fgure 7. Comparson of the proposed and related methods. The thrd experment was amed at provng the vablty of the proposed scheme. Several steganalyss technques such as hstogram steganalyss, RS steganalyss, prmary sets, Ch square, sample pars, RS analyss, and fuson detecton were used to test the performance of the proposed scheme. The hstogram steganalyss method compares the shapes between the cover mage and the stego-mage to detect whether there s a concealed message. Fgure 8 shows hstogram comparsons of Lena wth dfferent parameters. The curve startng wth the symbol * s the hstogram of the stego-mage. We can see that the shape of the stego-mage s almost the same as that of the cover mage.

21 Symmetry 07, 9, 3 of 5 Fgure 8. Hstogram steganalyss of Lena wth dfferent parameters. RS steganalyss s a knd of attack method proposed by Frdrch et al. In the method, pxels are classfed nto several groups. The method uses a dscrmnaton functon to quantfy smoothness or regularty and uses a flppng functon to defne three groups, regular (R), sngular (S), and unusable

22 Symmetry 07, 9, 3 of 5 (U). The percentages of each group wth mask M = [ 0 0 ] and M = [ 0 0 ] are represented as R_M_G, R_FM_G, S_M_G, S_FM_G, U_M_G, and U_FM_G, respectvely. The hypotheses are R_M_G R_FM_G, S_M_G S_FM_G, and U_M_G U_FM_G. Fgure 9 shows the RS steganalyss results for Lena wth dfferent parameters. In the fgures, the curve of R_M_G s very smlar to that of R_FM_G. The method judges there s no secret message hdden n the mage. The curves of S_M_G, S_FM_G, U_M_G, and U_FM_G have the same stuatons. Hence, the proposed scheme cannot be detected by the RS steganalyss. Stego Stego Fgure 9. RS-dagram steganalyss of Lena wth the secret mage random.

23 Symmetry 07, 9, 3 3 of 5 Other tests ncludng prmary sets, Ch square, sample pars, RS analyss, and fuson detecton were appled to examne the proposed scheme. Table 9 shows the experment report. All numbers n the table are very small, whch means the proposed scheme s robust aganst the steganalytc attacks. Table 9. Steganalyss report for StegExpose. Cover B K Stego Prmary Sets Ch Square Sample Pars RS Analyss Fuson (Mean) 3 4 Stego Stego Arplane 5 3 Stego Stego Stego Stego Stego Stego Lake 5 3 Stego Stego Stego Stego Stego Stego Lena 5 3 Stego Stego Stego Stego Stego Stego Mandrll 5 3 Stego Stego Stego Stego Stego Stego Pepper 5 3 Stego Stego Stego Stego Stego Stego Tffany 5 3 Stego Stego Stego Stego Conclusons The dual-mage-based hdng scheme s a new technology n the data hdng feld. The concept of dual-mage, based on nformaton sharng, conssts of concealng secret messages n two of the same cover mages; only someone who has both stego-mages can extract the secret messages. There are many advantages to usng dual-mage n data hdng, such as ts hgh payload, reversblty, and strong robustness. The proposed method mproves Lu s center-foldng strategy by ncludng the foldng operaton twce and usng an ndcator to dentfy the second foldng operaton as a means of dstngushng dfferent sub-bands to further decrease the reduced dgt. In addton, the proposed method effectvely solves the overflow/underflow problem. In order to evaluate the performance of the proposed scheme, eght schemes wth dfferent B and K values were mplemented. Moreover, fve related methods were mplemented for a comparson wth the proposed scheme. The frst experment showed that a small B value acheves hgher mage qualty, a large K value acheves a large payload, and the re-encodng process can effectvely narrow down the dstorton when B s larger. The second experment compared the

24 Symmetry 07, 9, 3 4 of 5 proposed and related methods. The results showed that the proposed scheme can acheve hgher mage qualty (B = 3, K = 3, RE = 0), better mage qualty under the same embeddng rate, and a hgher payload than other schemes (B = 5, K = 4, RE = ). The thrd experment used several steganalyss technques to prove the strong robustness of the proposed scheme, nclude hstogram steganalyss, RS steganalyss, prmary sets, Ch square, sample pars RS analyss, and fuson detecton. Acknowledgments: Ths study was fnancally supported by a research grant from Tawan s Mnstry of Scence and Technology (MOST 05--E ). Author Contrbutons: Tzu-Chuen Lu desgned the algorthm, conducted all experments, analyzed the results, wrote the manuscrpt, and conducted the lterature revew. Hu-Shh Leng conceved the algorthm and wrote the manuscrpt. Conflcts of Interest: The authors declare no conflct of nterest. References. Melkanen, J. LSB matchng revsted. IEEE Sgnal Process. Lett. 006, 3, Wu, D.-C.; Tsa, W.-H. A steganographc method for mages by pxel-value dfferencng. Pattern Recognt. Lett. 003, 4, Chang, C.C.; Tseng, H.W. A steganographc method for dgtal mages usng sde match. Pattern Recognt. Lett. 004, 5, Zhang, X.; Wang, S. Effcent steganographc embeddng by explotng modfcaton drecton. IEEE Commun. Lett. 006, 0, Keu, T.D.; Chang, C.C. A steganographc scheme by fully explotng modfcaton drectons. Expert Syst. Appl. 0, 38, N, Z.; Sh, Y.Q.; Ansar, N.; Su, W. Reversble data hdng. IEEE Trans. Crcuts Syst. Vdeo Technol. 006, 6, Alattar, A. Reversble watermarks usng a dfference expanson. In Internet and Communcatons Multmeda Securty Handbook; Furht, B, Krovsk, D, Eds.; CRC Press: Boca Raton, FL, USA; Tan, J. Reversble data embeddng usng a dfference expanson. IEEE Trans. Crcuts Syst. Vdeo Technol. 003, 3, L, X.; Yang, B.; Zeng, T. Effcent reversble watermarkng based on adaptve predcton-error expanson and pxel selecton. IEEE Trans. Image Process. 0, 0, Gu, X.; L, X.; Yang, B. A hgh capacty reversble data hdng scheme based on generalzed predctonerror expanson and adaptve embeddng. Sgnal Process. 04, 98, L, X.; L, J.; L, B.; Yang, B. Hgh-fdelty reversble data hdng scheme based on pxel-value-orderng and predcton-error expanson. Sgnal Process. 03, 93, Peng, F.; L, X.; Yang, B. Improved PVO-based reversble data hdng. Dgt. Sgnal Process. 04, 5, Qu, X.; Km, H.J. Pxel-based pxel value orderng predctor for hgh-fdelty reversble data hdng. Sgnal Process. 05,, Wang, X.; Dng, J.; Pe, Q. A novel reversble mage data hdng scheme based on pxel value orderng and dynamc pxel block partton. Inf. Sc. 05, 30, Chang, C.C.; Keu, T.D.; Chou, Y.C. Reversble data hdng scheme usng two steganographc mages. In Proceedngs of the 007 IEEE Regon 0 Internatonal Conference (TENCON), Tape, Tawan, 30 Ocotber November 007; pp Lee, C.F.; Wang, K.H.; Chang, C.C.; Huang, Y.L. A reversble data hdng scheme based on dual steganographc mages. In Proceedngs of the 3rd Internatonal Conference on Ubqutous Informaton Management and Communcaton (ICUIMC 09), Suwon, Korea, 5 6 January 009; pp Lee, C.F.; Huang, Y.L. Reversble data hdng scheme based on dual stegano-mages usng orentaton combnatons. Telecommun. Syst. 03, 5, Chang, C.C.; Lu, T.C.; Horng, G.; Huang, Y.H.; Hsu, Y.M. A hgh payload data embeddng scheme usng dual stego-mages wth reversblty. In Proceedngs of the 03 9th Internatonal Conference on Informaton, Communcatons and Sgnal Processng, Tanan, Tawan, 0 3 December 03; pp. 5.

25 Symmetry 07, 9, 3 5 of 5 9. Qn, C.; Chang, C.C.; Hsu, T.J. Reversble data hdng scheme based on explotng modfcaton drecton wth two steganographc mages. Multmed. Tools Appl. 04, 74, Lu, T.C.; Tseng, C.Y.; Wu, J.H. Dual magng-based reversble hdng technque usng LSB matchng. Sgnal Process. 05, 08, Lu, T.C.; Wu, J.H.; Huang, C.C. Dual-mage-based reversble data hdng method usng center foldng strategy. Sgnal Process. 05, 5, Lu, T.C.; Ch, L.P.; Wu, C.H.; Chang, H.P. Reversble data hdng n dual stego-mages usng frequencybased encodng strategy. Multmed. Tools Appl. 06, do:0.007/s Frdrch, J.; Goljan, M.; Du, R. Relable detecton of LSB steganography n grayscale and color mages. In Proceedngs of the 00 Workshop on Multmeda and Securty, Ottawa, ON, Canada, 5 October 00; pp Boehm, B. StegExpose A Steganalyss Tool for Detectng LSB Steganography n Images. Avalable onlne: (accessed on 9 September 07). 07 by the authors. Lcensee MDPI, Basel, Swtzerland. Ths artcle s an open access artcle dstrbuted under the terms and condtons of the Creatve Commons Attrbuton (CC BY) lcense (

Reversible Dual-Image-Based Hiding Scheme Using Block Folding Technique

Reversible Dual-Image-Based Hiding Scheme Using Block Folding Technique S S symmetry Artcle Reversble Dual-Image-Based Hdng Scheme Usng Block Foldng Technque Tzu-Chuen Lu Tzu-Chuen Lu 1, 1, * and Hu-Shh Leng * ID and Hu-Shh Leng 1 Department Informaton Management, Chaoyang

More information

High Payload Reversible Data Hiding Scheme Using Difference Segmentation and Histogram Shifting

High Payload Reversible Data Hiding Scheme Using Difference Segmentation and Histogram Shifting JOURNAL OF ELECTRONIC SCIENCE AND TECHNOLOGY, VOL. 11, NO. 1, MARCH 2013 9 Hgh Payload Reversble Data Hdng Scheme Usng Dfference Segmentaton and Hstogram Shftng Yung-Chen Chou and Huang-Chng L Abstract

More information

Hybrid Non-Blind Color Image Watermarking

Hybrid Non-Blind Color Image Watermarking Hybrd Non-Blnd Color Image Watermarkng Ms C.N.Sujatha 1, Dr. P. Satyanarayana 2 1 Assocate Professor, Dept. of ECE, SNIST, Yamnampet, Ghatkesar Hyderabad-501301, Telangana 2 Professor, Dept. of ECE, AITS,

More information

A Secured Method for Image Steganography Based On Pixel Values

A Secured Method for Image Steganography Based On Pixel Values A Secured Method for Image Steganography Based On Pxel Values Tarun Gulat #, Sanskrt Gupta * # Assocate Professor, Electroncs and Communcaton Engneerng Department, MMEC, M.M.U., Mullana, Ambala, Haryana,

More information

A Fast Content-Based Multimedia Retrieval Technique Using Compressed Data

A Fast Content-Based Multimedia Retrieval Technique Using Compressed Data A Fast Content-Based Multmeda Retreval Technque Usng Compressed Data Borko Furht and Pornvt Saksobhavvat NSF Multmeda Laboratory Florda Atlantc Unversty, Boca Raton, Florda 3343 ABSTRACT In ths paper,

More information

Improvement of Spatial Resolution Using BlockMatching Based Motion Estimation and Frame. Integration

Improvement of Spatial Resolution Using BlockMatching Based Motion Estimation and Frame. Integration Improvement of Spatal Resoluton Usng BlockMatchng Based Moton Estmaton and Frame Integraton Danya Suga and Takayuk Hamamoto Graduate School of Engneerng, Tokyo Unversty of Scence, 6-3-1, Nuku, Katsuska-ku,

More information

Parallelism for Nested Loops with Non-uniform and Flow Dependences

Parallelism for Nested Loops with Non-uniform and Flow Dependences Parallelsm for Nested Loops wth Non-unform and Flow Dependences Sam-Jn Jeong Dept. of Informaton & Communcaton Engneerng, Cheonan Unversty, 5, Anseo-dong, Cheonan, Chungnam, 330-80, Korea. seong@cheonan.ac.kr

More information

A Fast Visual Tracking Algorithm Based on Circle Pixels Matching

A Fast Visual Tracking Algorithm Based on Circle Pixels Matching A Fast Vsual Trackng Algorthm Based on Crcle Pxels Matchng Zhqang Hou hou_zhq@sohu.com Chongzhao Han czhan@mal.xjtu.edu.cn Ln Zheng Abstract: A fast vsual trackng algorthm based on crcle pxels matchng

More information

Research Article High Capacity Reversible Watermarking for Audio by Histogram Shifting and Predicted Error Expansion

Research Article High Capacity Reversible Watermarking for Audio by Histogram Shifting and Predicted Error Expansion e Scentfc World Journal, Artcle ID 656251, 7 pages http://dx.do.org/1.1155/214/656251 Research Artcle Hgh Capacty Reversble Watermarkng for Audo by Hstogram Shftng and Predcted Error Expanson Fe Wang,

More information

A Lossless Watermarking Scheme for Halftone Image Authentication

A Lossless Watermarking Scheme for Halftone Image Authentication IJCSNS Internatonal Journal of Computer Scence and Network Securty, VOL.6 No.2B, February 2006 147 A Lossless Watermarkng Scheme for Halftone Image Authentcaton Jeng-Shyang Pan, Hao Luo, and Zhe-Mng Lu,

More information

Load Balancing for Hex-Cell Interconnection Network

Load Balancing for Hex-Cell Interconnection Network Int. J. Communcatons, Network and System Scences,,, - Publshed Onlne Aprl n ScRes. http://www.scrp.org/journal/jcns http://dx.do.org/./jcns.. Load Balancng for Hex-Cell Interconnecton Network Saher Manaseer,

More information

Data Hiding and Image Authentication for Color-Palette Images

Data Hiding and Image Authentication for Color-Palette Images Data Hdng and Image Authentcaton for Color-Palette Images Chh-Yang Yn ( 殷志揚 ) and Wen-Hsang Tsa ( 蔡文祥 ) Department of Computer & Informaton Scence Natonal Chao Tung Unversty 00 Ta Hsueh Rd., Hsnchu, Tawan

More information

A Binarization Algorithm specialized on Document Images and Photos

A Binarization Algorithm specialized on Document Images and Photos A Bnarzaton Algorthm specalzed on Document mages and Photos Ergna Kavalleratou Dept. of nformaton and Communcaton Systems Engneerng Unversty of the Aegean kavalleratou@aegean.gr Abstract n ths paper, a

More information

Enhanced Watermarking Technique for Color Images using Visual Cryptography

Enhanced Watermarking Technique for Color Images using Visual Cryptography Informaton Assurance and Securty Letters 1 (2010) 024-028 Enhanced Watermarkng Technque for Color Images usng Vsual Cryptography Enas F. Al rawashdeh 1, Rawan I.Zaghloul 2 1 Balqa Appled Unversty, MIS

More information

A Robust Webpage Information Hiding Method Based on the Slash of Tag

A Robust Webpage Information Hiding Method Based on the Slash of Tag Advanced Engneerng Forum Onlne: 2012-09-26 ISSN: 2234-991X, Vols. 6-7, pp 361-366 do:10.4028/www.scentfc.net/aef.6-7.361 2012 Trans Tech Publcatons, Swtzerland A Robust Webpage Informaton Hdng Method Based

More information

Content Based Image Retrieval Using 2-D Discrete Wavelet with Texture Feature with Different Classifiers

Content Based Image Retrieval Using 2-D Discrete Wavelet with Texture Feature with Different Classifiers IOSR Journal of Electroncs and Communcaton Engneerng (IOSR-JECE) e-issn: 78-834,p- ISSN: 78-8735.Volume 9, Issue, Ver. IV (Mar - Apr. 04), PP 0-07 Content Based Image Retreval Usng -D Dscrete Wavelet wth

More information

Semi-Fragile Watermarking Scheme for Authentication of JPEG Images

Semi-Fragile Watermarking Scheme for Authentication of JPEG Images Tamkang Journal of Scence and Engneerng, Vol. 10, No 1, pp. 5766 (2007) 57 Sem-Fragle Watermarkng Scheme for Authentcaton of JPEG Images Chh-Hung n 1 *, Tung-Shh Su 2 and Wen-Shyong Hseh 2,3 1 Department

More information

Key-Selective Patchwork Method for Audio Watermarking

Key-Selective Patchwork Method for Audio Watermarking Internatonal Journal of Dgtal Content Technology and ts Applcatons Volume 4, Number 4, July 2010 Key-Selectve Patchwork Method for Audo Watermarkng 1 Ch-Man Pun, 2 Jng-Jng Jang 1, Frst and Correspondng

More information

Research Article Improved Encrypted-Signals-Based Reversible Data Hiding Using Code Division Multiplexing and Value Expansion

Research Article Improved Encrypted-Signals-Based Reversible Data Hiding Using Code Division Multiplexing and Value Expansion Securty and Communcaton Networks Volume 2018, Artcle ID 1326235, 9 pages https://do.org/10.1155/2018/1326235 Research Artcle Improved Encrypted-Sgnals-Based Reversble Data Hdng Usng Code Dvson Multplexng

More information

An Image Compression Algorithm based on Wavelet Transform and LZW

An Image Compression Algorithm based on Wavelet Transform and LZW An Image Compresson Algorthm based on Wavelet Transform and LZW Png Luo a, Janyong Yu b School of Chongqng Unversty of Posts and Telecommuncatons, Chongqng, 400065, Chna Abstract a cylpng@63.com, b y27769864@sna.cn

More information

Steps for Computing the Dissimilarity, Entropy, Herfindahl-Hirschman and. Accessibility (Gravity with Competition) Indices

Steps for Computing the Dissimilarity, Entropy, Herfindahl-Hirschman and. Accessibility (Gravity with Competition) Indices Steps for Computng the Dssmlarty, Entropy, Herfndahl-Hrschman and Accessblty (Gravty wth Competton) Indces I. Dssmlarty Index Measurement: The followng formula can be used to measure the evenness between

More information

Shape Representation Robust to the Sketching Order Using Distance Map and Direction Histogram

Shape Representation Robust to the Sketching Order Using Distance Map and Direction Histogram Shape Representaton Robust to the Sketchng Order Usng Dstance Map and Drecton Hstogram Department of Computer Scence Yonse Unversty Kwon Yun CONTENTS Revew Topc Proposed Method System Overvew Sketch Normalzaton

More information

Related-Mode Attacks on CTR Encryption Mode

Related-Mode Attacks on CTR Encryption Mode Internatonal Journal of Network Securty, Vol.4, No.3, PP.282 287, May 2007 282 Related-Mode Attacks on CTR Encrypton Mode Dayn Wang, Dongda Ln, and Wenlng Wu (Correspondng author: Dayn Wang) Key Laboratory

More information

High-Boost Mesh Filtering for 3-D Shape Enhancement

High-Boost Mesh Filtering for 3-D Shape Enhancement Hgh-Boost Mesh Flterng for 3-D Shape Enhancement Hrokazu Yagou Λ Alexander Belyaev y Damng We z Λ y z ; ; Shape Modelng Laboratory, Unversty of Azu, Azu-Wakamatsu 965-8580 Japan y Computer Graphcs Group,

More information

Local Quaternary Patterns and Feature Local Quaternary Patterns

Local Quaternary Patterns and Feature Local Quaternary Patterns Local Quaternary Patterns and Feature Local Quaternary Patterns Jayu Gu and Chengjun Lu The Department of Computer Scence, New Jersey Insttute of Technology, Newark, NJ 0102, USA Abstract - Ths paper presents

More information

Robust and Reversible Relational Database Watermarking Algorithm Based on Clustering and Polar Angle Expansion

Robust and Reversible Relational Database Watermarking Algorithm Based on Clustering and Polar Angle Expansion Robust and Reversble Relatonal Database Watermarkng Algorthm Based on Clusterng and Polar Angle Expanson Zhyong L, Junmn Lu and Wecheng Tao College of Informaton Scence and Engneerng, Hunan Unversty, Changsha,

More information

A Hybrid Semi-Blind Gray Scale Image Watermarking Algorithm Based on DWT-SVD using Human Visual System Model

A Hybrid Semi-Blind Gray Scale Image Watermarking Algorithm Based on DWT-SVD using Human Visual System Model A Hybrd Sem-Blnd Gray Scale Image Watermarkng Algorthm Based on DWT-SVD usng Human Vsual System Model Rajesh Mehta r Scence & Engneerng, USICT Guru Gobnd Sngh Indrarprastha Unversty New Delh, Inda rajesh00ust@gmal.com

More information

Term Weighting Classification System Using the Chi-square Statistic for the Classification Subtask at NTCIR-6 Patent Retrieval Task

Term Weighting Classification System Using the Chi-square Statistic for the Classification Subtask at NTCIR-6 Patent Retrieval Task Proceedngs of NTCIR-6 Workshop Meetng, May 15-18, 2007, Tokyo, Japan Term Weghtng Classfcaton System Usng the Ch-square Statstc for the Classfcaton Subtask at NTCIR-6 Patent Retreval Task Kotaro Hashmoto

More information

Cluster Analysis of Electrical Behavior

Cluster Analysis of Electrical Behavior Journal of Computer and Communcatons, 205, 3, 88-93 Publshed Onlne May 205 n ScRes. http://www.scrp.org/ournal/cc http://dx.do.org/0.4236/cc.205.350 Cluster Analyss of Electrcal Behavor Ln Lu Ln Lu, School

More information

Reducing Frame Rate for Object Tracking

Reducing Frame Rate for Object Tracking Reducng Frame Rate for Object Trackng Pavel Korshunov 1 and We Tsang Oo 2 1 Natonal Unversty of Sngapore, Sngapore 11977, pavelkor@comp.nus.edu.sg 2 Natonal Unversty of Sngapore, Sngapore 11977, oowt@comp.nus.edu.sg

More information

Shape-adaptive DCT and Its Application in Region-based Image Coding

Shape-adaptive DCT and Its Application in Region-based Image Coding Internatonal Journal of Sgnal Processng, Image Processng and Pattern Recognton, pp.99-108 http://dx.do.org/10.14257/sp.2014.7.1.10 Shape-adaptve DCT and Its Applcaton n Regon-based Image Codng Yamn Zheng,

More information

Pattern Recognition 43 (2010) Contents lists available at ScienceDirect. Pattern Recognition. journal homepage:

Pattern Recognition 43 (2010) Contents lists available at ScienceDirect. Pattern Recognition. journal homepage: Pattern Recognton 43 (2010) 397 -- 404 Contents lsts avalable at ScenceDrect Pattern Recognton ournal homepage: www.elsever.com/locate/pr Secret mage sharng based on cellular automata and steganography

More information

An Image Fusion Approach Based on Segmentation Region

An Image Fusion Approach Based on Segmentation Region Rong Wang, L-Qun Gao, Shu Yang, Yu-Hua Cha, and Yan-Chun Lu An Image Fuson Approach Based On Segmentaton Regon An Image Fuson Approach Based on Segmentaton Regon Rong Wang, L-Qun Gao, Shu Yang 3, Yu-Hua

More information

Enhanced AMBTC for Image Compression using Block Classification and Interpolation

Enhanced AMBTC for Image Compression using Block Classification and Interpolation Internatonal Journal of Computer Applcatons (0975 8887) Volume 5 No.0, August 0 Enhanced AMBTC for Image Compresson usng Block Classfcaton and Interpolaton S. Vmala Dept. of Comp. Scence Mother Teresa

More information

R s s f. m y s. SPH3UW Unit 7.3 Spherical Concave Mirrors Page 1 of 12. Notes

R s s f. m y s. SPH3UW Unit 7.3 Spherical Concave Mirrors Page 1 of 12. Notes SPH3UW Unt 7.3 Sphercal Concave Mrrors Page 1 of 1 Notes Physcs Tool box Concave Mrror If the reflectng surface takes place on the nner surface of the sphercal shape so that the centre of the mrror bulges

More information

FEATURE EXTRACTION. Dr. K.Vijayarekha. Associate Dean School of Electrical and Electronics Engineering SASTRA University, Thanjavur

FEATURE EXTRACTION. Dr. K.Vijayarekha. Associate Dean School of Electrical and Electronics Engineering SASTRA University, Thanjavur FEATURE EXTRACTION Dr. K.Vjayarekha Assocate Dean School of Electrcal and Electroncs Engneerng SASTRA Unversty, Thanjavur613 41 Jont Intatve of IITs and IISc Funded by MHRD Page 1 of 8 Table of Contents

More information

Performance Analysis of Data Hiding in MPEG-4 AAC Audio *

Performance Analysis of Data Hiding in MPEG-4 AAC Audio * TSINGHUA SCIENCE AND TECHNOLOGY ISSNll1007-0214ll07/21llpp55-61 Volume 14, Number 1, February 2009 Performance Analyss of Data Hdng n MPEG-4 AAC Audo * XU Shuzheng ( ) **, ZHANG Peng ( ), WANG Pengjun

More information

A NEW AUDIO WATERMARKING METHOD BASED

A NEW AUDIO WATERMARKING METHOD BASED A NEW AUDIO WATERMARKING METHOD BASED ON DISCRETE COSINE TRANSFORM WITH A GRAY IMAGE Mohammad Ibrahm Khan 1, Md. Iqbal Hasan Sarker 2, Kaushk Deb 3 and Md. Hasan Furhad 4 1,2,3 Department of Computer Scence

More information

Identify the Attack in Embedded Image with Steganalysis Detection Method by PSNR and RGB Intensity

Identify the Attack in Embedded Image with Steganalysis Detection Method by PSNR and RGB Intensity Internatonal Journal of Computer Systems (ISSN: 394-1065), Volume 03 Issue 07, July, 016 Avalable at http://www.jcsonlne.com/ Identfy the Attack n Embedded Image wth Steganalyss Detecton Method by PSNR

More information

Detecting MP3Stego using Calibrated Side Information Features

Detecting MP3Stego using Calibrated Side Information Features 2628 JOURNAL OF SOFTWARE, VOL. 8, NO. 10, OCTOBER 2013 Detectng P3Stego usng Calbrated Sde Informaton Features Xanmn Yu School of Informaton Scence and Engneerng, Nngbo Unversty Emal: mlhappy1016@163.com

More information

Robust Blind Video Watermark Algorithm in Transform Domain Combining with 3D Video Correlation

Robust Blind Video Watermark Algorithm in Transform Domain Combining with 3D Video Correlation JOURNAL OF MULTIMEDIA, VOL. 8, NO. 2, APRIL 2013 161 Robust Blnd Vdeo Watermark Algorthm n Transform Doman Combnng wth 3D Vdeo Correlaton DING Ha-yang 1,3 1. Informaton Securty Center, Bejng Unversty of

More information

The Research of Ellipse Parameter Fitting Algorithm of Ultrasonic Imaging Logging in the Casing Hole

The Research of Ellipse Parameter Fitting Algorithm of Ultrasonic Imaging Logging in the Casing Hole Appled Mathematcs, 04, 5, 37-3 Publshed Onlne May 04 n ScRes. http://www.scrp.org/journal/am http://dx.do.org/0.436/am.04.584 The Research of Ellpse Parameter Fttng Algorthm of Ultrasonc Imagng Loggng

More information

An Optimal Algorithm for Prufer Codes *

An Optimal Algorithm for Prufer Codes * J. Software Engneerng & Applcatons, 2009, 2: 111-115 do:10.4236/jsea.2009.22016 Publshed Onlne July 2009 (www.scrp.org/journal/jsea) An Optmal Algorthm for Prufer Codes * Xaodong Wang 1, 2, Le Wang 3,

More information

Distortion Function Designing for JPEG Steganography with Uncompressed Side-image

Distortion Function Designing for JPEG Steganography with Uncompressed Side-image Dstorton Functon Desgnng for JPEG Steganography wth Uncompressed Sde-mage Fangjun Huang School of Informaton Scence and Technology, Sun Yat-Sen Unversty, GD 56, Chna huangfj@mal.sysu.edu.cn Jwu Huang School

More information

Learning the Kernel Parameters in Kernel Minimum Distance Classifier

Learning the Kernel Parameters in Kernel Minimum Distance Classifier Learnng the Kernel Parameters n Kernel Mnmum Dstance Classfer Daoqang Zhang 1,, Songcan Chen and Zh-Hua Zhou 1* 1 Natonal Laboratory for Novel Software Technology Nanjng Unversty, Nanjng 193, Chna Department

More information

Tsinghua University at TAC 2009: Summarizing Multi-documents by Information Distance

Tsinghua University at TAC 2009: Summarizing Multi-documents by Information Distance Tsnghua Unversty at TAC 2009: Summarzng Mult-documents by Informaton Dstance Chong Long, Mnle Huang, Xaoyan Zhu State Key Laboratory of Intellgent Technology and Systems, Tsnghua Natonal Laboratory for

More information

Specifications in 2001

Specifications in 2001 Specfcatons n 200 MISTY (updated : May 3, 2002) September 27, 200 Mtsubsh Electrc Corporaton Block Cpher Algorthm MISTY Ths document shows a complete descrpton of encrypton algorthm MISTY, whch are secret-key

More information

TN348: Openlab Module - Colocalization

TN348: Openlab Module - Colocalization TN348: Openlab Module - Colocalzaton Topc The Colocalzaton module provdes the faclty to vsualze and quantfy colocalzaton between pars of mages. The Colocalzaton wndow contans a prevew of the two mages

More information

A Novel Adaptive Descriptor Algorithm for Ternary Pattern Textures

A Novel Adaptive Descriptor Algorithm for Ternary Pattern Textures A Novel Adaptve Descrptor Algorthm for Ternary Pattern Textures Fahuan Hu 1,2, Guopng Lu 1 *, Zengwen Dong 1 1.School of Mechancal & Electrcal Engneerng, Nanchang Unversty, Nanchang, 330031, Chna; 2. School

More information

Corner-Based Image Alignment using Pyramid Structure with Gradient Vector Similarity

Corner-Based Image Alignment using Pyramid Structure with Gradient Vector Similarity Journal of Sgnal and Informaton Processng, 013, 4, 114-119 do:10.436/jsp.013.43b00 Publshed Onlne August 013 (http://www.scrp.org/journal/jsp) Corner-Based Image Algnment usng Pyramd Structure wth Gradent

More information

A fast algorithm for color image segmentation

A fast algorithm for color image segmentation Unersty of Wollongong Research Onlne Faculty of Informatcs - Papers (Arche) Faculty of Engneerng and Informaton Scences 006 A fast algorthm for color mage segmentaton L. Dong Unersty of Wollongong, lju@uow.edu.au

More information

Image Representation & Visualization Basic Imaging Algorithms Shape Representation and Analysis. outline

Image Representation & Visualization Basic Imaging Algorithms Shape Representation and Analysis. outline mage Vsualzaton mage Vsualzaton mage Representaton & Vsualzaton Basc magng Algorthms Shape Representaton and Analyss outlne mage Representaton & Vsualzaton Basc magng Algorthms Shape Representaton and

More information

Problem Set 3 Solutions

Problem Set 3 Solutions Introducton to Algorthms October 4, 2002 Massachusetts Insttute of Technology 6046J/18410J Professors Erk Demane and Shaf Goldwasser Handout 14 Problem Set 3 Solutons (Exercses were not to be turned n,

More information

SLAM Summer School 2006 Practical 2: SLAM using Monocular Vision

SLAM Summer School 2006 Practical 2: SLAM using Monocular Vision SLAM Summer School 2006 Practcal 2: SLAM usng Monocular Vson Javer Cvera, Unversty of Zaragoza Andrew J. Davson, Imperal College London J.M.M Montel, Unversty of Zaragoza. josemar@unzar.es, jcvera@unzar.es,

More information

A Five-Point Subdivision Scheme with Two Parameters and a Four-Point Shape-Preserving Scheme

A Five-Point Subdivision Scheme with Two Parameters and a Four-Point Shape-Preserving Scheme Mathematcal and Computatonal Applcatons Artcle A Fve-Pont Subdvson Scheme wth Two Parameters and a Four-Pont Shape-Preservng Scheme Jeqng Tan,2, Bo Wang, * and Jun Sh School of Mathematcs, Hefe Unversty

More information

X- Chart Using ANOM Approach

X- Chart Using ANOM Approach ISSN 1684-8403 Journal of Statstcs Volume 17, 010, pp. 3-3 Abstract X- Chart Usng ANOM Approach Gullapall Chakravarth 1 and Chaluvad Venkateswara Rao Control lmts for ndvdual measurements (X) chart are

More information

FINDING IMPORTANT NODES IN SOCIAL NETWORKS BASED ON MODIFIED PAGERANK

FINDING IMPORTANT NODES IN SOCIAL NETWORKS BASED ON MODIFIED PAGERANK FINDING IMPORTANT NODES IN SOCIAL NETWORKS BASED ON MODIFIED PAGERANK L-qng Qu, Yong-quan Lang 2, Jng-Chen 3, 2 College of Informaton Scence and Technology, Shandong Unversty of Scence and Technology,

More information

Robust Shot Boundary Detection from Video Using Dynamic Texture

Robust Shot Boundary Detection from Video Using Dynamic Texture Sensors & Transducers 204 by IFSA Publshng, S. L. http://www.sensorsportal.com Robust Shot Boundary Detecton from Vdeo Usng Dynamc Teture, 3 Peng Tale, 2 Zhang Wenjun School of Communcaton & Informaton

More information

Subspace clustering. Clustering. Fundamental to all clustering techniques is the choice of distance measure between data points;

Subspace clustering. Clustering. Fundamental to all clustering techniques is the choice of distance measure between data points; Subspace clusterng Clusterng Fundamental to all clusterng technques s the choce of dstance measure between data ponts; D q ( ) ( ) 2 x x = x x, j k = 1 k jk Squared Eucldean dstance Assumpton: All features

More information

Using Fuzzy Logic to Enhance the Large Size Remote Sensing Images

Using Fuzzy Logic to Enhance the Large Size Remote Sensing Images Internatonal Journal of Informaton and Electroncs Engneerng Vol. 5 No. 6 November 015 Usng Fuzzy Logc to Enhance the Large Sze Remote Sensng Images Trung Nguyen Tu Huy Ngo Hoang and Thoa Vu Van Abstract

More information

Research and Application of Fingerprint Recognition Based on MATLAB

Research and Application of Fingerprint Recognition Based on MATLAB Send Orders for Reprnts to reprnts@benthamscence.ae The Open Automaton and Control Systems Journal, 205, 7, 07-07 Open Access Research and Applcaton of Fngerprnt Recognton Based on MATLAB Nng Lu* Department

More information

Suppression for Luminance Difference of Stereo Image-Pair Based on Improved Histogram Equalization

Suppression for Luminance Difference of Stereo Image-Pair Based on Improved Histogram Equalization Suppresson for Lumnance Dfference of Stereo Image-Par Based on Improved Hstogram Equalzaton Zhao Llng,, Zheng Yuhu 3, Sun Quansen, Xa Deshen School of Computer Scence and Technology, NJUST, Nanjng, Chna.School

More information

Edge Detection in Noisy Images Using the Support Vector Machines

Edge Detection in Noisy Images Using the Support Vector Machines Edge Detecton n Nosy Images Usng the Support Vector Machnes Hlaro Gómez-Moreno, Saturnno Maldonado-Bascón, Francsco López-Ferreras Sgnal Theory and Communcatons Department. Unversty of Alcalá Crta. Madrd-Barcelona

More information

Analysis on the Workspace of Six-degrees-of-freedom Industrial Robot Based on AutoCAD

Analysis on the Workspace of Six-degrees-of-freedom Industrial Robot Based on AutoCAD Analyss on the Workspace of Sx-degrees-of-freedom Industral Robot Based on AutoCAD Jn-quan L 1, Ru Zhang 1,a, Fang Cu 1, Q Guan 1 and Yang Zhang 1 1 School of Automaton, Bejng Unversty of Posts and Telecommuncatons,

More information

Private Information Retrieval (PIR)

Private Information Retrieval (PIR) 2 Levente Buttyán Problem formulaton Alce wants to obtan nformaton from a database, but she does not want the database to learn whch nformaton she wanted e.g., Alce s an nvestor queryng a stock-market

More information

Fast Computation of Shortest Path for Visiting Segments in the Plane

Fast Computation of Shortest Path for Visiting Segments in the Plane Send Orders for Reprnts to reprnts@benthamscence.ae 4 The Open Cybernetcs & Systemcs Journal, 04, 8, 4-9 Open Access Fast Computaton of Shortest Path for Vstng Segments n the Plane Ljuan Wang,, Bo Jang

More information

CSCI 104 Sorting Algorithms. Mark Redekopp David Kempe

CSCI 104 Sorting Algorithms. Mark Redekopp David Kempe CSCI 104 Sortng Algorthms Mark Redekopp Davd Kempe Algorthm Effcency SORTING 2 Sortng If we have an unordered lst, sequental search becomes our only choce If we wll perform a lot of searches t may be benefcal

More information

Simulation Based Analysis of FAST TCP using OMNET++

Simulation Based Analysis of FAST TCP using OMNET++ Smulaton Based Analyss of FAST TCP usng OMNET++ Umar ul Hassan 04030038@lums.edu.pk Md Term Report CS678 Topcs n Internet Research Sprng, 2006 Introducton Internet traffc s doublng roughly every 3 months

More information

Robust Watermarking for Text Images Based on Arnold Scrambling and DWT-DCT

Robust Watermarking for Text Images Based on Arnold Scrambling and DWT-DCT Internatonal Conference on Mechatroncs Electronc Industral and Control Engneerng (MEIC 015) Robust Watermarkng for Text Images Based on Arnold Scramblng and DWT-DCT Fan Wu College of Informaton Scence

More information

Classifier Selection Based on Data Complexity Measures *

Classifier Selection Based on Data Complexity Measures * Classfer Selecton Based on Data Complexty Measures * Edth Hernández-Reyes, J.A. Carrasco-Ochoa, and J.Fco. Martínez-Trndad Natonal Insttute for Astrophyscs, Optcs and Electroncs, Lus Enrque Erro No.1 Sta.

More information

MULTISPECTRAL IMAGES CLASSIFICATION BASED ON KLT AND ATR AUTOMATIC TARGET RECOGNITION

MULTISPECTRAL IMAGES CLASSIFICATION BASED ON KLT AND ATR AUTOMATIC TARGET RECOGNITION MULTISPECTRAL IMAGES CLASSIFICATION BASED ON KLT AND ATR AUTOMATIC TARGET RECOGNITION Paulo Quntlano 1 & Antono Santa-Rosa 1 Federal Polce Department, Brasla, Brazl. E-mals: quntlano.pqs@dpf.gov.br and

More information

Research of Multiple Text Watermarks Technique in Electric Power System Texts

Research of Multiple Text Watermarks Technique in Electric Power System Texts Sensors & Transducers 203 by IFSA http://www.sensorsportal.com Research of Multple Text atermarks Technque n Electrc Power System Texts Xao-X XING, Qng CHEN, 2 Lan-X FU School of Optcal-Electrcal and Computer

More information

Vol. 5, No. 3 March 2014 ISSN Journal of Emerging Trends in Computing and Information Sciences CIS Journal. All rights reserved.

Vol. 5, No. 3 March 2014 ISSN Journal of Emerging Trends in Computing and Information Sciences CIS Journal. All rights reserved. Journal of Emergng Trends n Computng and Informaton Scences 009-03 CIS Journal. All rghts reserved. http://www.csjournal.org Unhealthy Detecton n Lvestock Texture Images usng Subsampled Contourlet Transform

More information

Available online at Available online at Advanced in Control Engineering and Information Science

Available online at   Available online at   Advanced in Control Engineering and Information Science Avalable onlne at wwwscencedrectcom Avalable onlne at wwwscencedrectcom Proceda Proceda Engneerng Engneerng 00 (2011) 15000 000 (2011) 1642 1646 Proceda Engneerng wwwelsevercom/locate/proceda Advanced

More information

MATHEMATICS FORM ONE SCHEME OF WORK 2004

MATHEMATICS FORM ONE SCHEME OF WORK 2004 MATHEMATICS FORM ONE SCHEME OF WORK 2004 WEEK TOPICS/SUBTOPICS LEARNING OBJECTIVES LEARNING OUTCOMES VALUES CREATIVE & CRITICAL THINKING 1 WHOLE NUMBER Students wll be able to: GENERICS 1 1.1 Concept of

More information

Object-Based Techniques for Image Retrieval

Object-Based Techniques for Image Retrieval 54 Zhang, Gao, & Luo Chapter VII Object-Based Technques for Image Retreval Y. J. Zhang, Tsnghua Unversty, Chna Y. Y. Gao, Tsnghua Unversty, Chna Y. Luo, Tsnghua Unversty, Chna ABSTRACT To overcome the

More information

Virtual Machine Migration based on Trust Measurement of Computer Node

Virtual Machine Migration based on Trust Measurement of Computer Node Appled Mechancs and Materals Onlne: 2014-04-04 ISSN: 1662-7482, Vols. 536-537, pp 678-682 do:10.4028/www.scentfc.net/amm.536-537.678 2014 Trans Tech Publcatons, Swtzerland Vrtual Machne Mgraton based on

More information

Wishing you all a Total Quality New Year!

Wishing you all a Total Quality New Year! Total Qualty Management and Sx Sgma Post Graduate Program 214-15 Sesson 4 Vnay Kumar Kalakband Assstant Professor Operatons & Systems Area 1 Wshng you all a Total Qualty New Year! Hope you acheve Sx sgma

More information

The Shortest Path of Touring Lines given in the Plane

The Shortest Path of Touring Lines given in the Plane Send Orders for Reprnts to reprnts@benthamscence.ae 262 The Open Cybernetcs & Systemcs Journal, 2015, 9, 262-267 The Shortest Path of Tourng Lnes gven n the Plane Open Access Ljuan Wang 1,2, Dandan He

More information

A Clustering Algorithm for Key Frame Extraction Based on Density Peak

A Clustering Algorithm for Key Frame Extraction Based on Density Peak Journal of Computer and Communcatons, 2018, 6, 118-128 http://www.scrp.org/ournal/cc ISSN Onlne: 2327-5227 ISSN Prnt: 2327-5219 A Clusterng Algorthm for Key Frame Extracton Based on Densty Peak Hong Zhao

More information

Robust Video Watermarking Using Image Normalization, Motion Vector and Perceptual Information

Robust Video Watermarking Using Image Normalization, Motion Vector and Perceptual Information Robust Vdeo Watermarkng Usng Image ormalzaton, Moton Vector and Perceptual Informaton Cedllo-Hernández Antono 1, Cedllo-Hernández Manuel 1, akano-myatake Marko 1, García-Vázquez Mreya S. 2 1 Postgraduate

More information

Information Hiding Watermarking Detection Technique by PSNR and RGB Intensity

Information Hiding Watermarking Detection Technique by PSNR and RGB Intensity www..org 3 Informaton Hdng Watermarkng Detecton Technque by PSNR and RGB Intensty 1 Neha Chauhan, Akhlesh A. Waoo, 3 P. S. Patheja 1 Research Scholar, BIST, Bhopal, Inda.,3 Assstant Professor, BIST, Bhopal,

More information

Parallel matrix-vector multiplication

Parallel matrix-vector multiplication Appendx A Parallel matrx-vector multplcaton The reduced transton matrx of the three-dmensonal cage model for gel electrophoress, descrbed n secton 3.2, becomes excessvely large for polymer lengths more

More information

A Computer Vision System for Automated Container Code Recognition

A Computer Vision System for Automated Container Code Recognition A Computer Vson System for Automated Contaner Code Recognton Hsn-Chen Chen, Chh-Ka Chen, Fu-Yu Hsu, Yu-San Ln, Yu-Te Wu, Yung-Nen Sun * Abstract Contaner code examnaton s an essental step n the contaner

More information

An Improved Image Segmentation Algorithm Based on the Otsu Method

An Improved Image Segmentation Algorithm Based on the Otsu Method 3th ACIS Internatonal Conference on Software Engneerng, Artfcal Intellgence, Networkng arallel/dstrbuted Computng An Improved Image Segmentaton Algorthm Based on the Otsu Method Mengxng Huang, enjao Yu,

More information

An efficient method to build panoramic image mosaics

An efficient method to build panoramic image mosaics An effcent method to buld panoramc mage mosacs Pattern Recognton Letters vol. 4 003 Dae-Hyun Km Yong-In Yoon Jong-Soo Cho School of Electrcal Engneerng and Computer Scence Kyungpook Natonal Unv. Abstract

More information

A Deflected Grid-based Algorithm for Clustering Analysis

A Deflected Grid-based Algorithm for Clustering Analysis A Deflected Grd-based Algorthm for Clusterng Analyss NANCY P. LIN, CHUNG-I CHANG, HAO-EN CHUEH, HUNG-JEN CHEN, WEI-HUA HAO Department of Computer Scence and Informaton Engneerng Tamkang Unversty 5 Yng-chuan

More information

Statistical Steganalyis of Images Using Open Source Software

Statistical Steganalyis of Images Using Open Source Software Statstcal Steganalys of Images Usng Open Source Software Bhargav Kapa, Stefan A. Robla Department of Computer Scence Montclar State Unversty Montclar, NJ 07043 roblas@mal.montclar.edu Abstract In ths paper

More information

A New Approach For the Ranking of Fuzzy Sets With Different Heights

A New Approach For the Ranking of Fuzzy Sets With Different Heights New pproach For the ankng of Fuzzy Sets Wth Dfferent Heghts Pushpnder Sngh School of Mathematcs Computer pplcatons Thapar Unversty, Patala-7 00 Inda pushpndersnl@gmalcom STCT ankng of fuzzy sets plays

More information

Background Removal in Image indexing and Retrieval

Background Removal in Image indexing and Retrieval Background Removal n Image ndexng and Retreval Y Lu and Hong Guo Department of Electrcal and Computer Engneerng The Unversty of Mchgan-Dearborn Dearborn Mchgan 4818-1491, U.S.A. Voce: 313-593-508, Fax:

More information

TECHNICAL POINTS ABOUT ADAPTIVE STEGANOGRAPHY BY ORACLE (ASO) 161, rue Ada, 34095, Montpellier Cedex 05, France

TECHNICAL POINTS ABOUT ADAPTIVE STEGANOGRAPHY BY ORACLE (ASO) 161, rue Ada, 34095, Montpellier Cedex 05, France 20th European Sgnal Processng Conference (EUSIPCO 2012) Bucharest, Romana, August 27-31, 2012 TECHNICAL POINTS ABOUT ADAPTIVE STEGANOGRAPHY BY ORACLE (ASO) Sarra Kouder 2, Marc Chaumont 1,2, Wllam Puech

More information

Feature Reduction and Selection

Feature Reduction and Selection Feature Reducton and Selecton Dr. Shuang LIANG School of Software Engneerng TongJ Unversty Fall, 2012 Today s Topcs Introducton Problems of Dmensonalty Feature Reducton Statstc methods Prncpal Components

More information

UB at GeoCLEF Department of Geography Abstract

UB at GeoCLEF Department of Geography   Abstract UB at GeoCLEF 2006 Mguel E. Ruz (1), Stuart Shapro (2), June Abbas (1), Slva B. Southwck (1) and Davd Mark (3) State Unversty of New York at Buffalo (1) Department of Lbrary and Informaton Studes (2) Department

More information

Audio Content Classification Method Research Based on Two-step Strategy

Audio Content Classification Method Research Based on Two-step Strategy (IJACSA) Internatonal Journal of Advanced Computer Scence and Applcatons, Audo Content Classfcaton Method Research Based on Two-step Strategy Sume Lang Department of Computer Scence and Technology Chongqng

More information

Video Proxy System for a Large-scale VOD System (DINA)

Video Proxy System for a Large-scale VOD System (DINA) Vdeo Proxy System for a Large-scale VOD System (DINA) KWUN-CHUNG CHAN #, KWOK-WAI CHEUNG *# #Department of Informaton Engneerng *Centre of Innovaton and Technology The Chnese Unversty of Hong Kong SHATIN,

More information

Research Article Hamming Code Based Watermarking Scheme for 3D Model Verification

Research Article Hamming Code Based Watermarking Scheme for 3D Model Verification Mathematcal Problems n Engneerng, Artcle ID 241093, 7 pages http://dx.do.org/10.1155/2014/241093 Research Artcle Hammng Code Based Watermarkng Scheme for 3D Model Verfcaton Jen-Tse Wang, 1 Y-Chng Chang,

More information

Simulation: Solving Dynamic Models ABE 5646 Week 11 Chapter 2, Spring 2010

Simulation: Solving Dynamic Models ABE 5646 Week 11 Chapter 2, Spring 2010 Smulaton: Solvng Dynamc Models ABE 5646 Week Chapter 2, Sprng 200 Week Descrpton Readng Materal Mar 5- Mar 9 Evaluatng [Crop] Models Comparng a model wth data - Graphcal, errors - Measures of agreement

More information

Learning-Based Top-N Selection Query Evaluation over Relational Databases

Learning-Based Top-N Selection Query Evaluation over Relational Databases Learnng-Based Top-N Selecton Query Evaluaton over Relatonal Databases Lang Zhu *, Wey Meng ** * School of Mathematcs and Computer Scence, Hebe Unversty, Baodng, Hebe 071002, Chna, zhu@mal.hbu.edu.cn **

More information

A New Feature of Uniformity of Image Texture Directions Coinciding with the Human Eyes Perception 1

A New Feature of Uniformity of Image Texture Directions Coinciding with the Human Eyes Perception 1 A New Feature of Unformty of Image Texture Drectons Concdng wth the Human Eyes Percepton Xng-Jan He, De-Shuang Huang, Yue Zhang, Tat-Mng Lo 2, and Mchael R. Lyu 3 Intellgent Computng Lab, Insttute of Intellgent

More information

A Fusion Steganographic Algorithm Based on Faster R-CNN

A Fusion Steganographic Algorithm Based on Faster R-CNN Copyrght 2018 Tech Scence Press CMC, vol.55, no.1, pp.1-16, 2018 A Fuson Steganographc Algorthm Based on Faster R-CNN Ruohan Meng 1, 2, Steven G. Rce 3, Jn Wang 4 1, 2, * and Xngmng Sun Abstract: The am

More information