Image Steganography Scheme using Chaos and Fractals with the Wavelet Transform
|
|
- Jean Curtis
- 5 years ago
- Views:
Transcription
1 International Journal of Innovation, Management and Tehnology, Vol. 3, o. 3, June Image Steganography Sheme using Chaos and Fratals with the Wavelet Transform Yue Wu and Joseph P. oonan bstrat This paper introdues a novel image steganographi method for embedding seret image information into digital images. The proposed algorithm uses a fratal image as the over image, takes a random-like sequene generated by a haoti map as the referene for embedded position and employs a wavelet transform to realize the embedding proedure. The fratal over image that an be parametrially generated implies a over image ould be unique in the world. The haoti logisti map guarantees that the sequene of embedding positions is ompletely unknown for an adversary and the embedding proedure is almost random-like. The wavelet transform ensures the seret information is only embedded within edges with the least visual distortion. The proposed sheme is tested over different over images and seret images and simulations results demonstrate its effetiveness and robustness. Index Terms Steganography, hao fratal, logisti map, wavelet transform. I. ITRODUCTIO The term steganography [] originates from the Greek word steganos meaning overed or proteted and graphein meaning to write. owaday it often refers to the siene of invisible ommuniation. Generally speaking, steganography an be lassified into two ategories: image watermarking and image data hiding. Image watermarking tehniques are aimed to provide opyright protetion [-5] and authentiation [6, 7]. Image data hiding tehniques is aim to amouflage a seret message within a arrier message suh that the seret message an be sent without making any notie. This study fouses on data hiding. There are two kinds of image steganography for image data hiding: spatial-domain based and transform-domain based methods. Spatial-domain based methods embed messages in the intensity of pixels of images diretly [8, 9]. mong them, the least signifiant bit (LSB) method is the most well-known [-]. This method embeds the fixed-length seret bits in the same fixed-length LSBs of pixels. This tehnique is simple and fast but it may ause notieable distortion when the number of embedded bits for eah pixel exeeds three []. While transform-domain based methods first transform a over image into a new domain and then messages are embedded in as the transform oeffiients Manusript reeived pril, ; revised May 9,. Y. Wu is with the Department of Eletrial and Computer Engineering, Tufts University, M 55, US ( ywu3@ee.tufts.edu). J. P. oonan is with the the Department of Eletrial and Computer Engineering, Tufts University, M 55, ( jnoonan@ees. tufts.edu). [3, 4]. The proposed method is one of the transform-domain based steganographi tehniques. Unlike those related works [5, 6] fousing on hiding the seret message with oding sheme we diretly used the wavelet oeffiients to embed the message. In addition, we onstrut a series of over images via fratal iterative funtion whih guarantee that ) a over image an easily regenerated with a given set of parameters; ) a over image is almost unique and novel; and 3) a over image is inaessible for an adversary without knowing the orret set of parameters. Moreover, based on the fat of the image has different wavelet oeffiients when using different wavelets. We use the wavelet funtion as a part of our shared key to further enhane the seurity level. The remainder of the paper is organized as follows: in Setion II, bakgrounds related to the proposed method are reviewed; in Setion III, the proposed steganographi tehnique is disussed in details; in Setion IV, omputer simulation results and related analysis are presented; In Setion V, we onlude this paper and make disussions on the future work. II. BCKGROUDS Simply speaking, the proposed algorithm uses a fratal image as the over image, takes a random-like sequene generated by a haoti map as the referene for embedded position and employs a wavelet transform to realize the embedding proedure. More details about the proposed algorithm are disussed in Setion III. In the rest of the setion, we will briefly review the wavelet transform, the haoti map and the fratal image.. Wavelet Transforms wavelet transform is used to divide a ontinuous-time/ disrete time funtion into wavelets. Unlike the Fourier transform, whih only onstrut a frequeny representation of a signal, the wavelet transform is able to onstrut a time-frequeny representation of a signal. Therefore, the wavelet transform offers very good time and frequeny loalization. Mathematially, the Continuous Wavelet Transform (CWT) of a ontinuou square-integrable funtion f ( x ) at a ertain sale s > and a translation value R an be defined as Eq. (), where ( x) is defined in Eq. () [7]. Here ( x) is alled the mother wavelet and ( x) is alled a daughter wavelet at sale s and translation of ( x). To reover the original funtion f ( x ), inverse wavelet transform is defined in Eq. (3), where C is defined in Eq. (4) 85
2 International Journal of Innovation, Management and Tehnology, Vol. 3, o. 3, June and Ψ ( μ) is the Fourier transform of ( x). Eqs. () to (4) define a reversible transformation as long as the so-allled admissibility riterion C < is satisfied [8]. In 989 Fast Wavelet Transform (FWT) is developed and provided a good way of alulating wavelet transforms of a given signal. W (, s ) = f() x () x dx () x ( x) = ( ) s s () ( x) f ( x) = W ( ) d ds C s (3) Ψ( μ) C d = μ (4) μ One dimensional wavelet transforms an be easily extended to two dimensional ases like images. In two dimension a two-dimensional saling funtion φ ( x, y) and H V three two-dimensional wavelet ( x, y), ( x, y) and D ( x, y) are required for the horizontal, vertial and diagonal diretions respetively. Eah of above four funtions is the produt of two one-dimensional funtions as Eqs. (5) (8) show, where φ ( d) is the one dimensional saling funtion along diretion d ; ( d) is the one dimensional wavelet mother funtion along diretion d. In this paper, various two dimensional wavelet funtions are used to deompose images. φ( x, y) = φ( x) φ( y) (5) H ( x, y) = ( x) φ( y) (6) V ( x, y) = φ( x) ( y) (7) D ( x, y) = ( x) ( y) (8) B. Chaoti Maps Generally speaking, the haoti map refers to any map that exhibits some sort of haoti behavior: any slight hange in the initial onditions yields widely diverged outomes whih makes impossible for long-term predition. lthough haoti behavior an be observed in many dynami system we fous on the one dimensional logisti map in this paper. Mathematially, a logisti map an be defined as an iterative funtion in Eq. (9), where r is the parameter and x is used as the initial value. x = rx ( x ) n+ n n (9) Fig.. The haoti logisti map. ormally, parameter r is set to (3.58, 4) and x is set to (,) for keeping the haoti behavior. In Fig., the x oordinate value represents the parameter value r and the y oordinate value represents the generated x sequenes. It is lear to see that for r (3.6, 4), the map generates random-like x sequenes. It is worthwhile to note that sequenes with initial value falling in the region around r = 3.83 are periodi. In order to avoid trapping the sequene into osillation, we simply use r (3.9, 4) in this paper. The purpose of using the logisti map in the paper is to generate a random-like but deterministi sequene for embedded positions. Therefore, the logisti map an be substituted by any haoti map. C. Fratal Images The term fratal was oined by Benoit Mandelbrot in 975 and was derived from the Latin fratus meaning broken or fratured. Mathematially, a fratal is based on an equation undergoing iteration whih is a form of reursive feedbaks. fratal usually has the following harateristis as desribed in [9]: ) It has a fine struture at any arbitrarily small sale. ) It is too irregular to be easily desribed in traditional Eulidean geometri language. 3) It is self-similar or at least approximately similar. 4) It has a simple and reursive definition. 5) Its Hausdorff dimension is higher than its topologial dimension. In this paper, we use the fratal images generated by Ultra Fratal [] as over image eah of whih is uniquely defined by a set of fratal parameters suh as type, formula, sale, loation, olor spae et. In other word the fratal image an be perfetly restored as long as this set of parameters is known. In Ultra Fratal this set of parameters an be saved as a partiular file, whih an be transported very easily. Therefore, the over image an be perfetly restored. III. THE STEGOGRPHIC LGORITHM The proposed steganographi algorithm relies on the wavelet transform and embeds seret data as the wavelet oeffiients in a over image. Here, we assume a over image is a RGB olor image. The flowhart of the proposed steganographi algorithm is skethed in Fig. The details of eah stage will be disussed in the rest of this setion.. Stage I: Transforming Image in Wavelet Domain This stage is the start of the steganography. The olor over image C is deomposed in the YCr olor spae and only the omponent C is used for future proessing. This hoie of omponent is heuristi and is seleted based on our experiment results. This hoie is supposed to ahieve a higher ovariane between the stego image S and the over image C than using Cr or Y omponent. Later both the C and the seret image I are transformed using wavelet W and W respetively, and beome W ( C ) 86
3 International Journal of Innovation, Management and Tehnology, Vol. 3, o. 3, June and W ( I ). Here W and W are determined by the key and they may or may not be neessarily the same. One benefit of this design is to ahieve a larger key spae. Unless the orret wavelet mother funtion W is used, one annot extrat the exat embedded seret information from a over image; unless the orret wavelet mother funtion W is used, one annot restore the seret information from extrated seret information in the spatial domain. Stage I Stage II Seret Image Ι W(Ι) DWT W(S) Logisti Map Seleting Positions Energy Equalization Embedding Data IDWT Stage III W(C) S DWT IYCr C Cover Image C YCr CCr CY Stego Image S Fig.. The flowhart of the proposed steganographi sheme. B. Stage II: Seret Data Embedding This stage is the ore of the steganography. It embeds the transformed seret image W ( I ) in the transformed over image W ( C ). First, the initial value x and the parameter value r of the logisti map in Eq. (9) are determined by the key. Based on the number of oeffiients in W ( I ), the logisti map generates an equal length haoti sequene Seq. However, this sequene Seq has to be quantized before used for extrating wavelet oeffiients in W ( C ). The number of quantization sales is alulated via Eq. (), where #(.) omputes the number of elements and dt. rounds the number towards to zero. Then Seq is quantized with respet to the bin numbers of the equal-length bins in (,), namely k k B =,,, B,,, B, k = = Consequently, Seq is translated to a random-like sequene Seq omposed of only numbers from to. However Seq is still not the sequene whih an be used to extrat wavelet oeffiient in W ( C ). Seq is alulated for partial sum and the Seq is obtained aording to Eq. (). Seq is used to extrat wavelet oeffiients in W ( C ). It is worthwhile to note that W ( C ) is omposed of four regions (see Fig. ), namely approximation region (passed by the low-pass filter along y and followed by the low-pass filter along x ), horizontal-details region (passed by the low-pass filter along y and followed by the high-pass filter along x ), vertial-details region VH(passed by the high-pass filter along y and followed by the low-pass filter along x ), and diagonal-details (passed by the high-pass filter along y and followed by the high-pass filter along x ). We keep region but hoose to substitute oeffiients in, and by the wavelet oeffiients of W ( I ). This is the reason why Eq. () ontains a fator of 3/4. In fat, the region an be onsidered as the DC omponent of the image C. ny hange in this DC omponent may lead to big hanges in the future. However,, and are more or less about the edge strength of C. Fratal over images normally have a large number of edges and rely on the DC omponent of the image to have the fratal-like patterns. 3 #( C ) = () 4 #( W ( I)) k Seq ( k) = Seq ( k) () i= The seleted oeffiients in W ( C ) are uniquely determined by Seq and we named the set of the hosen oeffiients as P. Eq. () is used as the ratio of energy in set X to that in set Y, where E(.) represents the energy funtion. EX ( ) x RXY (, ) = EY ( ) = () y We then ompute L = R( P, W ( I)) and lift wavelet oeffiients orrespondingly, Consequently, the lifted energy LE( W ( I )) approximately math the energy of the original EP ( ). Finally, we all these modified wavelet oeffiients W ( S ). C. Stage III: Transforming Image Bak to Spatial Domain Parallel to the Stage I, the main task of the Stage III is to inverse transform everything in the wavelet domain to the spatial domain. W ( S ) is inverse wavelet transformed to the spatial domain and beomes the image S. The S is used to replae the original omponent C for the olor over image C. Eventually, the omponent set { C, S, C } is onverted Y Cr from the YCr olor spae to the RGB olor spae. IV. SIMULTIO RESULTS D DISCUSSIO Our omputer simulation is run in the MTLB R9a environment under Window XP operation system with 3GB memory and Core Quad.6GHz CPU. The key we used in the simulation has the format of { x, r, width, height, db #, db #}, where x and r are used in C I the logisti map for generating the embedding/ extrating positions; width and height are used to reform the rebuilt 87
4 International Journal of Innovation, Management and Tehnology, Vol. 3, o. 3, June seret image; db # and db # C I refer the used Daubehies wavelets for the over/stego image C/ S and the seret image I respetively. Fig. 3 shows the used over images for simulation. They are all generated from Ultra Fratal []. The image an be saved as a parameter file and thus an be easily transported and perfetly restored in other omputers installed Ultra Fratal. Here all over images are at size of (a) Leaf (b) Feather () Fragment (d) Storm Fig. 3. The over image generated by Ultral Fratal. Fig. 4 shows the test seret images in the simulation. The image of Tufts Logo is of size of 8 8 while the image of ameraman is at size of (PSR) and the root-mean-square error (RMSE) of the embedding results are two ommon measurements for evaluating the quality of reonstruted signal. RMSE is defined by the Eq. (3), where C and S represents the over image and the stego image respetively; m and n refer to the width and height of the image. PSR an be defined based on RMSE as Eq. (4) shows. TBLE I: PSR D RMSE OF STEGO IMGES Tufts Logo Cameraman Cover Image PSR RMSE PSR RMSE Leaf Feather Fragment Storm The PSR and the RMSE test on the stego image using the proposed method are shown in Table I. It is worthwhile to note that what we exatly alulated is RMSE ( C, S ). From Table I, it is easy to see that the over image with a larger portion of homogenous regions produes a lower RMSE and thus a higher PSR. This is beause no wavelet oeffiient has been replaed in the approximation region, whih an be onsidered as the DC omponent the image. Component Color Image Cover Image (a) Tufts Logo (b) Cameraman Fig. 4. The test images used in the simulation. We test all four over images and they produe more or less the similar results. nd thus only the results of fratal over Leaf are shown in Fig. 5 as an example. Here, we use Haar wavelet for both the over image and the seret image. From the point view of human visual inspetion, the seret image and the over image are very lose to eah other. The differenes of two images onentrate on the edge pixel whih are very hard to be notie without omparisons. strong benefit of using this type of fratal images is to largely redue the risk of known over image, beause all used over images are synthesized by a set of fratal parameters. If a over image is not aessible by any unauthorized user, it is then very diffiult to differentiate a true fratal image and a fratal image with seret information. Consequently, the seurity of seret information in the stego image is largely enhaned. m n RMSE( C, S) = ( C( i, j) S( I, j) ) (3) mn i = j = MX PSR log = RMSE (4) In signal proessing, the peaks of the signal-to-noise ratio Stego Image bsolute Differene Fig. 5. The omparison of the over image and the seret image. We also investigated the influene of using different types of wavelet funtions for both the over image and the seret image. These results are shown in Fig. 6, axis indiates the used wavelet funtion and db refers to the Daubehies wavelet family. We tested the Daubehies wavelets (built-in funtions in MTLB) on both the over image C and the seret image I. x Reall we used W for the image C and W for the image I. Here tree image is used as the over image and tufts logo is used as the seret image. The red solid urve is obtained by fixing W = db while keep hanging W ; the 88
5 International Journal of Innovation, Management and Tehnology, Vol. 3, o. 3, June blue dotted urve is obtained by fixing W = db while keep hanging W. We used the ovariane of the over image C and the stego image S to measure the quality, namely a high ovariane value implies a better quality. Generally speaking, the proposed method works well regardless to the seleted wavelet. However, different wavelets do produe different performanes and a periodi-like urve is observed when hanging the wavelet funtion for W. The reason behind this phenomenon is still unknown. Fig. 6. The influene of using different wavelet funtion. V. COCLUSIOS new steganographi method based on wavelet transforms and fratal images are proposed. This new method is able to embed the seret image into a fratal over image without produing notieable hanges. s long as the user has the orret key, the seret image an be extrated from the stego image without knowing the over image. lthough theoretially the attaker is able to sense the positions of the seret image information by omparing the stego image and the over image, it is very safe for the proposed method. Beause the over image itself is onsidered to be seure for it is synthesized and an be uniquely expressed as a set of fratal parameters. In other word the only way for an attaker to obtain the over image is to use the exatly set of fratal parameters and generate the over image. Moreover, the wavelets used to transform the over image and the seret image provide another level of seurity. Even in the worst ase, the attaker raked the over image and knew the seret image position but the seret image annot be derypted without knowing the used wavelets. Furthermore, sine wavelet is a big family of funtion ustomized wavelets an also be used. One an easily build up a look up table of wavelets and share this table with his/her ommuniator. If that so, even the brute fore attak may fail in finding the orret wavelet funtion. In future, we will investigate the periodi-like urve in Fig. 6 and try to find out a best wavelet for our sheme if it is possible. REFERECES [] D. Kahn, The Codebreakers: the Story of Seret Writing: Sribner Book Company, 996. [] L. Zhe-Ming, X. Dian-Guo, and S. Sheng-He, "Multipurpose image watermarking algorithm based on multistage vetor quantization," Image Proessing, IEEE Transations on, vol. 4, pp. 8-83, 5. [3] L. Ghouti,. Bouridane, M. K. Ibrahim, and S. Boussakta, "Digital image watermarking using balaned multiwavelet" Signal Proessing, IEEE Transations on, vol. 54, pp , 6. [4] C. C. Lai and C. C. Tsai, "Digital image watermarking using disrete wavelet transform and singular value deomposition," Instrumentation and Measurement, IEEE Transations on, vol. PP, pp. -3. [5] C. Bo and S. Hong, " new robust-fragile double image watermarking algorithm," in Multimedia and Ubiquitous Engineering, 9. MUE '9. Third International Conferene on, 9, pp [6] L. Chun-Shien and H. Y. M. Liao, "Multipurpose watermarking for image authentiation and protetion," Image Proessing, IEEE Transations on, vol., pp ,. [7] L. Yao-Chung, D. Varodayan, and B. Girod, "Image authentiation based on distributed soure oding," in Image Proessing, 7. ICIP 7. IEEE International Conferene on, 7, pp. III - 5-III - 8. [8] W. Hong, T.-S. Chen, and C.-W. Shiu, "Lossless steganography for ambt-ompressed image" in Image and Signal Proessing, 8. CISP '8. Congress on, 8, pp [9] D.-C. Wu and W.-H. Tsai, " steganographi method for images by pixel-value differening," Pattern Reognition Letter vol. 4, pp , 3. [] L. Shao-Hui, C. Tian-Hang, Y. Hong-Xun, and G. Wen, " variable depth LSB data hiding tehnique in image" in Mahine Learning and Cyberneti 4. Proeedings of 4 International Conferene on, 4, pp vol.7. [] W. Bender, D. Gruhl,. Morimoto, and. Lu, "Tehniques for data hiding," IBM Systems Journal, vol. 35, pp , 996. [] C.-C. Chang, C.-Y. Lin, and Y.-Z. Wang, "ew image steganographi methods using run-length approah," Information Siene vol. 76, pp , 6. [3]. Kafri and H. Y. Suleiman, "Bit-4 of frequeny domain-dct steganography tehnique," in etworked Digital Tehnologie 9. DT '9. First International Conferene on, 9, pp [4] V. K. Munirajan, E. Cole, and S. Ring, "Transform domain steganography detetion using fuzzy inferene system" in Multimedia Software Engineering, 4. Proeedings. IEEE Sixth International Symposium on, 4, pp [5] L. Zhang, "Wavelet domain steganography for JPEG," in Communiation Ciruits and Systems Proeeding 6 International Conferene on, 6, pp [6] J. Spaulding, H. oda, M.. Shirazi, and E. Kawaguhi, "BPCS steganography using EZW lossy ompressed image" Pattern Reognition Letter vol. 3, pp ,. [7] R. González and R. Wood "Digital image proessing. 8," Prentie Hall. [8]. Grossmann and J. Morlet, "Deomposition of hardy funtions into square integrable wavelets of onstant shape," SIM Journal on Mathematial nalysi vol. 5, pp , 984. [9] H. Peitgen, H. Jürgen and D. Saupe, Chaos and Fratals: ew Frontiers of Siene: Springer Verlag, 4. [] F. Slijkerman, Ultra Fratal 5,. 89
A {k, n}-secret Sharing Scheme for Color Images
A {k, n}-seret Sharing Sheme for Color Images Rastislav Luka, Konstantinos N. Plataniotis, and Anastasios N. Venetsanopoulos The Edward S. Rogers Sr. Dept. of Eletrial and Computer Engineering, University
More informationA Novel Validity Index for Determination of the Optimal Number of Clusters
IEICE TRANS. INF. & SYST., VOL.E84 D, NO.2 FEBRUARY 2001 281 LETTER A Novel Validity Index for Determination of the Optimal Number of Clusters Do-Jong KIM, Yong-Woon PARK, and Dong-Jo PARK, Nonmembers
More informationDr.Hazeem Al-Khafaji Dept. of Computer Science, Thi-Qar University, College of Science, Iraq
Volume 4 Issue 6 June 014 ISSN: 77 18X International Journal of Advaned Researh in Computer Siene and Software Engineering Researh Paper Available online at: www.ijarsse.om Medial Image Compression using
More informationGray Codes for Reflectable Languages
Gray Codes for Refletable Languages Yue Li Joe Sawada Marh 8, 2008 Abstrat We lassify a type of language alled a refletable language. We then develop a generi algorithm that an be used to list all strings
More informationA DYNAMIC ACCESS CONTROL WITH BINARY KEY-PAIR
Malaysian Journal of Computer Siene, Vol 10 No 1, June 1997, pp 36-41 A DYNAMIC ACCESS CONTROL WITH BINARY KEY-PAIR Md Rafiqul Islam, Harihodin Selamat and Mohd Noor Md Sap Faulty of Computer Siene and
More informationPerformance of Histogram-Based Skin Colour Segmentation for Arms Detection in Human Motion Analysis Application
World Aademy of Siene, Engineering and Tehnology 8 009 Performane of Histogram-Based Skin Colour Segmentation for Arms Detetion in Human Motion Analysis Appliation Rosalyn R. Porle, Ali Chekima, Farrah
More informationNew Fuzzy Object Segmentation Algorithm for Video Sequences *
JOURNAL OF INFORMATION SCIENCE AND ENGINEERING 24, 521-537 (2008) New Fuzzy Obet Segmentation Algorithm for Video Sequenes * KUO-LIANG CHUNG, SHIH-WEI YU, HSUEH-JU YEH, YONG-HUAI HUANG AND TA-JEN YAO Department
More informationarxiv: v1 [cs.gr] 10 Apr 2015
REAL-TIME TOOL FOR AFFINE TRANSFORMATIONS OF TWO DIMENSIONAL IFS FRACTALS ELENA HADZIEVA AND MARIJA SHUMINOSKA arxiv:1504.02744v1 s.gr 10 Apr 2015 Abstrat. This work introdues a novel tool for interative,
More informationDrawing lines. Naïve line drawing algorithm. drawpixel(x, round(y)); double dy = y1 - y0; double dx = x1 - x0; double m = dy / dx; double y = y0;
Naïve line drawing algorithm // Connet to grid points(x0,y0) and // (x1,y1) by a line. void drawline(int x0, int y0, int x1, int y1) { int x; double dy = y1 - y0; double dx = x1 - x0; double m = dy / dx;
More informationAbstract. Key Words: Image Filters, Fuzzy Filters, Order Statistics Filters, Rank Ordered Mean Filters, Channel Noise. 1.
Fuzzy Weighted Rank Ordered Mean (FWROM) Filters for Mixed Noise Suppression from Images S. Meher, G. Panda, B. Majhi 3, M.R. Meher 4,,4 Department of Eletronis and I.E., National Institute of Tehnology,
More informationPipelined Multipliers for Reconfigurable Hardware
Pipelined Multipliers for Reonfigurable Hardware Mithell J. Myjak and José G. Delgado-Frias Shool of Eletrial Engineering and Computer Siene, Washington State University Pullman, WA 99164-2752 USA {mmyjak,
More informationVideo Data and Sonar Data: Real World Data Fusion Example
14th International Conferene on Information Fusion Chiago, Illinois, USA, July 5-8, 2011 Video Data and Sonar Data: Real World Data Fusion Example David W. Krout Applied Physis Lab dkrout@apl.washington.edu
More informationthe data. Structured Principal Component Analysis (SPCA)
Strutured Prinipal Component Analysis Kristin M. Branson and Sameer Agarwal Department of Computer Siene and Engineering University of California, San Diego La Jolla, CA 9193-114 Abstrat Many tasks involving
More informationPreliminary investigation of multi-wavelet denoising in partial discharge detection
Preliminary investigation of multi-wavelet denoising in partial disharge detetion QIAN YONG Department of Eletrial Engineering Shanghai Jiaotong University 8#, Donghuan Road, Minhang distrit, Shanghai
More informationLearning Convention Propagation in BeerAdvocate Reviews from a etwork Perspective. Abstract
CS 9 Projet Final Report: Learning Convention Propagation in BeerAdvoate Reviews from a etwork Perspetive Abstrat We look at the way onventions propagate between reviews on the BeerAdvoate dataset, and
More informationBioTechnology. An Indian Journal FULL PAPER. Trade Science Inc. Improvement of low illumination image enhancement algorithm based on physical mode
[Type text] [Type text] [Type text] ISSN : 0974-7435 Volume 10 Issue 22 BioTehnology 2014 An Indian Journal FULL PAPER BTAIJ, 10(22), 2014 [13995-14001] Improvement of low illumination image enhanement
More informationDetecting Moving Targets in Clutter in Airborne SAR via Keystoning and Multiple Phase Center Interferometry
Deteting Moving Targets in Clutter in Airborne SAR via Keystoning and Multiple Phase Center Interferometry D. M. Zasada, P. K. Sanyal The MITRE Corp., 6 Eletroni Parkway, Rome, NY 134 (dmzasada, psanyal)@mitre.org
More informationDETECTION METHOD FOR NETWORK PENETRATING BEHAVIOR BASED ON COMMUNICATION FINGERPRINT
DETECTION METHOD FOR NETWORK PENETRATING BEHAVIOR BASED ON COMMUNICATION FINGERPRINT 1 ZHANGGUO TANG, 2 HUANZHOU LI, 3 MINGQUAN ZHONG, 4 JIAN ZHANG 1 Institute of Computer Network and Communiation Tehnology,
More informationDynamic Algorithms Multiple Choice Test
3226 Dynami Algorithms Multiple Choie Test Sample test: only 8 questions 32 minutes (Real test has 30 questions 120 minutes) Årskort Name Eah of the following 8 questions has 4 possible answers of whih
More informationA Partial Sorting Algorithm in Multi-Hop Wireless Sensor Networks
A Partial Sorting Algorithm in Multi-Hop Wireless Sensor Networks Abouberine Ould Cheikhna Department of Computer Siene University of Piardie Jules Verne 80039 Amiens Frane Ould.heikhna.abouberine @u-piardie.fr
More informationSystem-Level Parallelism and Throughput Optimization in Designing Reconfigurable Computing Applications
System-Level Parallelism and hroughput Optimization in Designing Reonfigurable Computing Appliations Esam El-Araby 1, Mohamed aher 1, Kris Gaj 2, arek El-Ghazawi 1, David Caliga 3, and Nikitas Alexandridis
More informationRotation Invariant Spherical Harmonic Representation of 3D Shape Descriptors
Eurographis Symposium on Geometry Proessing (003) L. Kobbelt, P. Shröder, H. Hoppe (Editors) Rotation Invariant Spherial Harmoni Representation of 3D Shape Desriptors Mihael Kazhdan, Thomas Funkhouser,
More informationCross-layer Resource Allocation on Broadband Power Line Based on Novel QoS-priority Scheduling Function in MAC Layer
Communiations and Networ, 2013, 5, 69-73 http://dx.doi.org/10.4236/n.2013.53b2014 Published Online September 2013 (http://www.sirp.org/journal/n) Cross-layer Resoure Alloation on Broadband Power Line Based
More informationMeasurement of the stereoscopic rangefinder beam angular velocity using the digital image processing method
Measurement of the stereosopi rangefinder beam angular veloity using the digital image proessing method ROMAN VÍTEK Department of weapons and ammunition University of defense Kouniova 65, 62 Brno CZECH
More informationAlgorithms, Mechanisms and Procedures for the Computer-aided Project Generation System
Algorithms, Mehanisms and Proedures for the Computer-aided Projet Generation System Anton O. Butko 1*, Aleksandr P. Briukhovetskii 2, Dmitry E. Grigoriev 2# and Konstantin S. Kalashnikov 3 1 Department
More information特集 Road Border Recognition Using FIR Images and LIDAR Signal Processing
デンソーテクニカルレビュー Vol. 15 2010 特集 Road Border Reognition Using FIR Images and LIDAR Signal Proessing 高木聖和 バーゼル ファルディ Kiyokazu TAKAGI Basel Fardi ヘンドリック ヴァイゲル Hendrik Weigel ゲルド ヴァニーリック Gerd Wanielik This paper
More informationA Unified Subdivision Scheme for Polygonal Modeling
EUROGRAPHICS 2 / A. Chalmers and T.-M. Rhyne (Guest Editors) Volume 2 (2), Number 3 A Unified Subdivision Sheme for Polygonal Modeling Jérôme Maillot Jos Stam Alias Wavefront Alias Wavefront 2 King St.
More informationOn - Line Path Delay Fault Testing of Omega MINs M. Bellos 1, E. Kalligeros 1, D. Nikolos 1,2 & H. T. Vergos 1,2
On - Line Path Delay Fault Testing of Omega MINs M. Bellos, E. Kalligeros, D. Nikolos,2 & H. T. Vergos,2 Dept. of Computer Engineering and Informatis 2 Computer Tehnology Institute University of Patras,
More informationExtracting Partition Statistics from Semistructured Data
Extrating Partition Statistis from Semistrutured Data John N. Wilson Rihard Gourlay Robert Japp Mathias Neumüller Department of Computer and Information Sienes University of Strathlyde, Glasgow, UK {jnw,rsg,rpj,mathias}@is.strath.a.uk
More informationNONLINEAR BACK PROJECTION FOR TOMOGRAPHIC IMAGE RECONSTRUCTION. Ken Sauer and Charles A. Bouman
NONLINEAR BACK PROJECTION FOR TOMOGRAPHIC IMAGE RECONSTRUCTION Ken Sauer and Charles A. Bouman Department of Eletrial Engineering, University of Notre Dame Notre Dame, IN 46556, (219) 631-6999 Shool of
More informationFOREGROUND OBJECT EXTRACTION USING FUZZY C MEANS WITH BIT-PLANE SLICING AND OPTICAL FLOW
FOREGROUND OBJECT EXTRACTION USING FUZZY C EANS WITH BIT-PLANE SLICING AND OPTICAL FLOW SIVAGAI., REVATHI.T, JEGANATHAN.L 3 APSG, SCSE, VIT University, Chennai, India JRF, DST, Dehi, India. 3 Professor,
More informationDetection and Recognition of Non-Occluded Objects using Signature Map
6th WSEAS International Conferene on CIRCUITS, SYSTEMS, ELECTRONICS,CONTROL & SIGNAL PROCESSING, Cairo, Egypt, De 9-31, 007 65 Detetion and Reognition of Non-Oluded Objets using Signature Map Sangbum Park,
More informationGraph-Based vs Depth-Based Data Representation for Multiview Images
Graph-Based vs Depth-Based Data Representation for Multiview Images Thomas Maugey, Antonio Ortega, Pasal Frossard Signal Proessing Laboratory (LTS), Eole Polytehnique Fédérale de Lausanne (EPFL) Email:
More informationThe Minimum Redundancy Maximum Relevance Approach to Building Sparse Support Vector Machines
The Minimum Redundany Maximum Relevane Approah to Building Sparse Support Vetor Mahines Xiaoxing Yang, Ke Tang, and Xin Yao, Nature Inspired Computation and Appliations Laboratory (NICAL), Shool of Computer
More informationCluster-Based Cumulative Ensembles
Cluster-Based Cumulative Ensembles Hanan G. Ayad and Mohamed S. Kamel Pattern Analysis and Mahine Intelligene Lab, Eletrial and Computer Engineering, University of Waterloo, Waterloo, Ontario N2L 3G1,
More informationSmooth Trajectory Planning Along Bezier Curve for Mobile Robots with Velocity Constraints
Smooth Trajetory Planning Along Bezier Curve for Mobile Robots with Veloity Constraints Gil Jin Yang and Byoung Wook Choi Department of Eletrial and Information Engineering Seoul National University of
More informationBoosted Random Forest
Boosted Random Forest Yohei Mishina, Masamitsu suhiya and Hironobu Fujiyoshi Department of Computer Siene, Chubu University, 1200 Matsumoto-ho, Kasugai, Aihi, Japan {mishi, mtdoll}@vision.s.hubu.a.jp,
More informationarxiv: v1 [cs.db] 13 Sep 2017
An effiient lustering algorithm from the measure of loal Gaussian distribution Yuan-Yen Tai (Dated: May 27, 2018) In this paper, I will introdue a fast and novel lustering algorithm based on Gaussian distribution
More informationA Coarse-to-Fine Classification Scheme for Facial Expression Recognition
A Coarse-to-Fine Classifiation Sheme for Faial Expression Reognition Xiaoyi Feng 1,, Abdenour Hadid 1 and Matti Pietikäinen 1 1 Mahine Vision Group Infoteh Oulu and Dept. of Eletrial and Information Engineering
More informationIntroduction to Seismology Spring 2008
MIT OpenCourseWare http://ow.mit.edu 1.510 Introdution to Seismology Spring 008 For information about iting these materials or our Terms of Use, visit: http://ow.mit.edu/terms. 1.510 Leture Notes 3.3.007
More informationAn Optimized Approach on Applying Genetic Algorithm to Adaptive Cluster Validity Index
IJCSES International Journal of Computer Sienes and Engineering Systems, ol., No.4, Otober 2007 CSES International 2007 ISSN 0973-4406 253 An Optimized Approah on Applying Geneti Algorithm to Adaptive
More informationUsing Augmented Measurements to Improve the Convergence of ICP
Using Augmented Measurements to Improve the onvergene of IP Jaopo Serafin, Giorgio Grisetti Dept. of omputer, ontrol and Management Engineering, Sapienza University of Rome, Via Ariosto 25, I-0085, Rome,
More informationBatch Auditing for Multiclient Data in Multicloud Storage
Advaned Siene and Tehnology Letters, pp.67-73 http://dx.doi.org/0.4257/astl.204.50. Bath Auditing for Multilient Data in Multiloud Storage Zhihua Xia, Xinhui Wang, Xingming Sun, Yafeng Zhu, Peng Ji and
More information13.1 Numerical Evaluation of Integrals Over One Dimension
13.1 Numerial Evaluation of Integrals Over One Dimension A. Purpose This olletion of subprograms estimates the value of the integral b a f(x) dx where the integrand f(x) and the limits a and b are supplied
More informationGradient based progressive probabilistic Hough transform
Gradient based progressive probabilisti Hough transform C.Galambos, J.Kittler and J.Matas Abstrat: The authors look at the benefits of exploiting gradient information to enhane the progressive probabilisti
More informationMulti-Piece Mold Design Based on Linear Mixed-Integer Program Toward Guaranteed Optimality
INTERNATIONAL CONFERENCE ON MANUFACTURING AUTOMATION (ICMA200) Multi-Piee Mold Design Based on Linear Mixed-Integer Program Toward Guaranteed Optimality Stephen Stoyan, Yong Chen* Epstein Department of
More informationDATA ACQUISITION AND PROCESSING OF PARALLEL FREQUENCY SAR BASED ON COMPRESSIVE SENSING
Progress In Eletromagnetis Researh, Vol. 133, 199 215, 2013 DATA ACQUISITION AND PROCESSING OF PARALLEL FREQUENCY SAR BASED ON COMPRESSIVE SENSING Y. N. You, H. P. Xu *, C. S. Li, and L. Q. Zhang Shool
More informationAnalysis of input and output configurations for use in four-valued CCD programmable logic arrays
nalysis of input and output onfigurations for use in four-valued D programmable logi arrays J.T. utler H.G. Kerkhoff ndexing terms: Logi, iruit theory and design, harge-oupled devies bstrat: s in binary,
More informationAustralian Journal of Basic and Applied Sciences. A new Divide and Shuffle Based algorithm of Encryption for Text Message
ISSN:1991-8178 Australian Journal of Basi and Applied Sienes Journal home page: www.ajbasweb.om A new Divide and Shuffle Based algorithm of Enryption for Text Message Dr. S. Muthusundari R.M.D. Engineering
More informationTransition Detection Using Hilbert Transform and Texture Features
Amerian Journal of Signal Proessing 1, (): 35-4 DOI: 1.593/.asp.1.6 Transition Detetion Using Hilbert Transform and Texture Features G. G. Lashmi Priya *, S. Domni Department of Computer Appliations, National
More informationPARAMETRIC SAR IMAGE FORMATION - A PROMISING APPROACH TO RESOLUTION-UNLIMITED IMAGING. Yesheng Gao, Kaizhi Wang, Xingzhao Liu
20th European Signal Proessing Conferene EUSIPCO 2012) Buharest, Romania, August 27-31, 2012 PARAMETRIC SAR IMAGE FORMATION - A PROMISING APPROACH TO RESOLUTION-UNLIMITED IMAGING Yesheng Gao, Kaizhi Wang,
More informationA Novel Bit Level Time Series Representation with Implication of Similarity Search and Clustering
A Novel Bit Level Time Series Representation with Impliation of Similarity Searh and lustering hotirat Ratanamahatana, Eamonn Keogh, Anthony J. Bagnall 2, and Stefano Lonardi Dept. of omputer Siene & Engineering,
More informationPartial Character Decoding for Improved Regular Expression Matching in FPGAs
Partial Charater Deoding for Improved Regular Expression Mathing in FPGAs Peter Sutton Shool of Information Tehnology and Eletrial Engineering The University of Queensland Brisbane, Queensland, 4072, Australia
More informationChromaticity-matched Superimposition of Foreground Objects in Different Environments
FCV216, the 22nd Korea-Japan Joint Workshop on Frontiers of Computer Vision Chromatiity-mathed Superimposition of Foreground Objets in Different Environments Yohei Ogura Graduate Shool of Siene and Tehnology
More informationKERNEL SPARSE REPRESENTATION WITH LOCAL PATTERNS FOR FACE RECOGNITION
KERNEL SPARSE REPRESENTATION WITH LOCAL PATTERNS FOR FACE RECOGNITION Cuiui Kang 1, Shengai Liao, Shiming Xiang 1, Chunhong Pan 1 1 National Laboratory of Pattern Reognition, Institute of Automation, Chinese
More informationColor Image Fusion for Concealed Weapon Detection
In: E.M. Carapezza (Ed.), Sensors, and ommand, ontrol, ommuniations, and intelligene (C3I) tehnologies for homeland defense and law enforement II, SPIE-571 (pp. 372-379). Bellingham, WA., USA: The International
More informationINTERPOLATED AND WARPED 2-D DIGITAL WAVEGUIDE MESH ALGORITHMS
Proeedings of the COST G-6 Conferene on Digital Audio Effets (DAFX-), Verona, Italy, Deember 7-9, INTERPOLATED AND WARPED -D DIGITAL WAVEGUIDE MESH ALGORITHMS Vesa Välimäki Lab. of Aoustis and Audio Signal
More informationtimestamp, if silhouette(x, y) 0 0 if silhouette(x, y) = 0, mhi(x, y) = and mhi(x, y) < timestamp - duration mhi(x, y), else
3rd International Conferene on Multimedia Tehnolog(ICMT 013) An Effiient Moving Target Traking Strateg Based on OpenCV and CAMShift Theor Dongu Li 1 Abstrat Image movement involved bakground movement and
More informationVolume 3, Issue 9, September 2013 International Journal of Advanced Research in Computer Science and Software Engineering
Volume 3, Issue 9, September 2013 ISSN: 2277 128X International Journal of Advaned Researh in Computer Siene and Software Engineering Researh Paper Available online at: www.ijarsse.om A New-Fangled Algorithm
More informationC 2 C 3 C 1 M S. f e. e f (3,0) (0,1) (2,0) (-1,1) (1,0) (-1,0) (1,-1) (0,-1) (-2,0) (-3,0) (0,-2)
SPECIAL ISSUE OF IEEE TRANSACTIONS ON ROBOTICS AND AUTOMATION: MULTI-ROBOT SSTEMS, 00 Distributed reonfiguration of hexagonal metamorphi robots Jennifer E. Walter, Jennifer L. Welh, and Nany M. Amato Abstrat
More informationMultiple-Criteria Decision Analysis: A Novel Rank Aggregation Method
3537 Multiple-Criteria Deision Analysis: A Novel Rank Aggregation Method Derya Yiltas-Kaplan Department of Computer Engineering, Istanbul University, 34320, Avilar, Istanbul, Turkey Email: dyiltas@ istanbul.edu.tr
More informationCleanUp: Improving Quadrilateral Finite Element Meshes
CleanUp: Improving Quadrilateral Finite Element Meshes Paul Kinney MD-10 ECC P.O. Box 203 Ford Motor Company Dearborn, MI. 8121 (313) 28-1228 pkinney@ford.om Abstrat: Unless an all quadrilateral (quad)
More informationCapturing Large Intra-class Variations of Biometric Data by Template Co-updating
Capturing Large Intra-lass Variations of Biometri Data by Template Co-updating Ajita Rattani University of Cagliari Piazza d'armi, Cagliari, Italy ajita.rattani@diee.unia.it Gian Lua Marialis University
More informationTime delay estimation of reverberant meeting speech: on the use of multichannel linear prediction
University of Wollongong Researh Online Faulty of Informatis - apers (Arhive) Faulty of Engineering and Information Sienes 7 Time delay estimation of reverberant meeting speeh: on the use of multihannel
More informationPerformance Improvement of TCP on Wireless Cellular Networks by Adaptive FEC Combined with Explicit Loss Notification
erformane Improvement of TC on Wireless Cellular Networks by Adaptive Combined with Expliit Loss tifiation Masahiro Miyoshi, Masashi Sugano, Masayuki Murata Department of Infomatis and Mathematial Siene,
More informationWe don t need no generation - a practical approach to sliding window RLNC
We don t need no generation - a pratial approah to sliding window RLNC Simon Wunderlih, Frank Gabriel, Sreekrishna Pandi, Frank H.P. Fitzek Deutshe Telekom Chair of Communiation Networks, TU Dresden, Dresden,
More informationContour Box: Rejecting Object Proposals Without Explicit Closed Contours
Contour Box: Rejeting Objet Proposals Without Expliit Closed Contours Cewu Lu, Shu Liu Jiaya Jia Chi-Keung Tang The Hong Kong University of Siene and Tehnology Stanford University The Chinese University
More informationEstablishing Secure Ethernet LANs Using Intelligent Switching Hubs in Internet Environments
Establishing Seure Ethernet LANs Using Intelligent Swithing Hubs in Internet Environments WOEIJIUNN TSAUR AND SHIJINN HORNG Department of Eletrial Engineering, National Taiwan University of Siene and Tehnology,
More informationCluster Centric Fuzzy Modeling
10.1109/TFUZZ.014.300134, IEEE Transations on Fuzzy Systems TFS-013-0379.R1 1 Cluster Centri Fuzzy Modeling Witold Pedryz, Fellow, IEEE, and Hesam Izakian, Student Member, IEEE Abstrat In this study, we
More informationApproximate logic synthesis for error tolerant applications
Approximate logi synthesis for error tolerant appliations Doohul Shin and Sandeep K. Gupta Eletrial Engineering Department, University of Southern California, Los Angeles, CA 989 {doohuls, sandeep}@us.edu
More informationDiscrete sequential models and CRFs. 1 Case Study: Supervised Part-of-Speech Tagging
0-708: Probabilisti Graphial Models 0-708, Spring 204 Disrete sequential models and CRFs Leturer: Eri P. Xing Sribes: Pankesh Bamotra, Xuanhong Li Case Study: Supervised Part-of-Speeh Tagging The supervised
More informationOutline: Software Design
Outline: Software Design. Goals History of software design ideas Design priniples Design methods Life belt or leg iron? (Budgen) Copyright Nany Leveson, Sept. 1999 A Little History... At first, struggling
More informationA radiometric analysis of projected sinusoidal illumination for opaque surfaces
University of Virginia tehnial report CS-21-7 aompanying A Coaxial Optial Sanner for Synhronous Aquisition of 3D Geometry and Surfae Refletane A radiometri analysis of projeted sinusoidal illumination
More informationHIGHER ORDER full-wave three-dimensional (3-D) large-domain techniques in
FACTA UNIVERSITATIS (NIŠ) SER.: ELEC. ENERG. vol. 21, no. 2, August 2008, 209-220 Comparison of Higher Order FEM and MoM/SIE Approahes in Analyses of Closed- and Open-Region Eletromagneti Problems Milan
More informationUnsupervised Stereoscopic Video Object Segmentation Based on Active Contours and Retrainable Neural Networks
Unsupervised Stereosopi Video Objet Segmentation Based on Ative Contours and Retrainable Neural Networks KLIMIS NTALIANIS, ANASTASIOS DOULAMIS, and NIKOLAOS DOULAMIS National Tehnial University of Athens
More informationWhat are Cycle-Stealing Systems Good For? A Detailed Performance Model Case Study
What are Cyle-Stealing Systems Good For? A Detailed Performane Model Case Study Wayne Kelly and Jiro Sumitomo Queensland University of Tehnology, Australia {w.kelly, j.sumitomo}@qut.edu.au Abstrat The
More informationFlow Demands Oriented Node Placement in Multi-Hop Wireless Networks
Flow Demands Oriented Node Plaement in Multi-Hop Wireless Networks Zimu Yuan Institute of Computing Tehnology, CAS, China {zimu.yuan}@gmail.om arxiv:153.8396v1 [s.ni] 29 Mar 215 Abstrat In multi-hop wireless
More informationCalculation of typical running time of a branch-and-bound algorithm for the vertex-cover problem
Calulation of typial running time of a branh-and-bound algorithm for the vertex-over problem Joni Pajarinen, Joni.Pajarinen@iki.fi Otober 21, 2007 1 Introdution The vertex-over problem is one of a olletion
More informationThe Mathematics of Simple Ultrasonic 2-Dimensional Sensing
The Mathematis of Simple Ultrasoni -Dimensional Sensing President, Bitstream Tehnology The Mathematis of Simple Ultrasoni -Dimensional Sensing Introdution Our ompany, Bitstream Tehnology, has been developing
More informationFUZZY WATERSHED FOR IMAGE SEGMENTATION
FUZZY WATERSHED FOR IMAGE SEGMENTATION Ramón Moreno, Manuel Graña Computational Intelligene Group, Universidad del País Vaso, Spain http://www.ehu.es/winto; {ramon.moreno,manuel.grana}@ehu.es Abstrat The
More informationMATH STUDENT BOOK. 12th Grade Unit 6
MATH STUDENT BOOK 12th Grade Unit 6 Unit 6 TRIGONOMETRIC APPLICATIONS MATH 1206 TRIGONOMETRIC APPLICATIONS INTRODUCTION 3 1. TRIGONOMETRY OF OBLIQUE TRIANGLES 5 LAW OF SINES 5 AMBIGUITY AND AREA OF A TRIANGLE
More information3-D IMAGE MODELS AND COMPRESSION - SYNTHETIC HYBRID OR NATURAL FIT?
3-D IMAGE MODELS AND COMPRESSION - SYNTHETIC HYBRID OR NATURAL FIT? Bernd Girod, Peter Eisert, Marus Magnor, Ekehard Steinbah, Thomas Wiegand Te {girod eommuniations Laboratory, University of Erlangen-Nuremberg
More information8 : Learning Fully Observed Undirected Graphical Models
10-708: Probabilisti Graphial Models 10-708, Spring 2018 8 : Learning Fully Observed Undireted Graphial Models Leturer: Kayhan Batmanghelih Sribes: Chenghui Zhou, Cheng Ran (Harvey) Zhang When learning
More informationSimulation of Crystallographic Texture and Anisotropie of Polycrystals during Metal Forming with Respect to Scaling Aspects
Raabe, Roters, Wang Simulation of Crystallographi Texture and Anisotropie of Polyrystals during Metal Forming with Respet to Saling Aspets D. Raabe, F. Roters, Y. Wang Max-Plank-Institut für Eisenforshung,
More informationHEXA: Compact Data Structures for Faster Packet Processing
Washington University in St. Louis Washington University Open Sholarship All Computer Siene and Engineering Researh Computer Siene and Engineering Report Number: 27-26 27 HEXA: Compat Data Strutures for
More informationAccommodations of QoS DiffServ Over IP and MPLS Networks
Aommodations of QoS DiffServ Over IP and MPLS Networks Abdullah AlWehaibi, Anjali Agarwal, Mihael Kadoh and Ahmed ElHakeem Department of Eletrial and Computer Department de Genie Eletrique Engineering
More informationRobust Dynamic Provable Data Possession
Robust Dynami Provable Data Possession Bo Chen Reza Curtmola Department of Computer Siene New Jersey Institute of Tehnology Newark, USA Email: b47@njit.edu, rix@njit.edu Abstrat Remote Data Cheking (RDC)
More informationDivide-and-conquer algorithms 1
* 1 Multipliation Divide-and-onquer algorithms 1 The mathematiian Gauss one notied that although the produt of two omplex numbers seems to! involve four real-number multipliations it an in fat be done
More informationIntra- and Inter-Stream Synchronisation for Stored Multimedia Streams
IEEE International Conferene on Multimedia Computing & Systems, June 17-23, 1996, in Hiroshima, Japan, p 372-381 Intra- and Inter-Stream Synhronisation for Stored Multimedia Streams Ernst Biersak, Werner
More informationSemi-Supervised Affinity Propagation with Instance-Level Constraints
Semi-Supervised Affinity Propagation with Instane-Level Constraints Inmar E. Givoni, Brendan J. Frey Probabilisti and Statistial Inferene Group University of Toronto 10 King s College Road, Toronto, Ontario,
More informationComparing Images Under Variable Illumination
( This paper appeared in CVPR 8. IEEE ) Comparing Images Under Variable Illumination David W. Jaobs Peter N. Belhumeur Ronen Basri NEC Researh Institute Center for Computational Vision and Control The
More informationCOMBINATION OF INTERSECTION- AND SWEPT-BASED METHODS FOR SINGLE-MATERIAL REMAP
Combination of intersetion- and swept-based methods for single-material remap 11th World Congress on Computational Mehanis WCCM XI) 5th European Conferene on Computational Mehanis ECCM V) 6th European
More informationFast Elliptic Curve Algorithm of Embedded Mobile Equipment
Send Orders for Reprints to reprints@benthamsiene.net 8 The Open Eletrial & Eletroni Engineering Journal, 0, 7, 8-4 Fast Ellipti Curve Algorithm of Embedded Mobile Equipment Open Aess Lihong Zhang *, Shuqian
More informationDiffusion Kernels on Graphs and Other Discrete Structures
Diffusion Kernels on Graphs and Other Disrete Strutures Risi Imre Kondor ohn Lafferty Shool of Computer Siene Carnegie Mellon University Pittsburgh P 523 US KONDOR@CMUEDU LFFERTY@CSCMUEDU bstrat The appliation
More informationZ Combinatorial Filters: Sensor Beams, Obstacles, and Possible Paths
Z Combinatorial Filters: Sensor Beams, Obstales, and Possible Paths BENJAMIN TOVAR, Northwestern University FRED COHEN, University of Rohester LEONARDO BOBADILLA, University of Illinois JUSTIN CZARNOWSKI,
More informationChapter 2: Introduction to Maple V
Chapter 2: Introdution to Maple V 2-1 Working with Maple Worksheets Try It! (p. 15) Start a Maple session with an empty worksheet. The name of the worksheet should be Untitled (1). Use one of the standard
More informationImproved Qualitative Color Image Steganography Based on DWT
Improved Qualitative Color Image Steganography Based on DWT 1 Naresh Goud M, II Arjun Nelikanti I, II M. Tech student I, II Dept. of CSE, I, II Vardhaman College of Eng. Hyderabad, India Muni Sekhar V
More informationA scheme for racquet sports video analysis with the combination of audio-visual information
A sheme for raquet sports video analysis with the ombination of audio-visual information Liyuan Xing a*, Qixiang Ye b, Weigang Zhang, Qingming Huang a and Hua Yu a a Graduate Shool of the Chinese Aadamy
More informationReading Object Code. A Visible/Z Lesson
Reading Objet Code A Visible/Z Lesson The Idea: When programming in a high-level language, we rarely have to think about the speifi ode that is generated for eah instrution by a ompiler. But as an assembly
More informationCluster-based Cooperative Communication with Network Coding in Wireless Networks
Cluster-based Cooperative Communiation with Network Coding in Wireless Networks Zygmunt J. Haas Shool of Eletrial and Computer Engineering Cornell University Ithaa, NY 4850, U.S.A. Email: haas@ee.ornell.edu
More information