Digital Image Watermarking Algorithm Based on Fast Curvelet Transform

Size: px
Start display at page:

Download "Digital Image Watermarking Algorithm Based on Fast Curvelet Transform"

Transcription

1 J. Software Engineering & Appications, 010, 3, doi:10.436/jsea Pubished Onine October 010 ( 939 igita Image Watermarking Agorithm Based on Fast Curveet Transform Jindong Xu, Huimin Pang, Jianping Zhao Coege of Physica Engineering, Qufu Norma University, Shandong, China. Emai: Received Juy 15 th, 010; revised August 18 th, 010; accepted August 1 st, 010. ABSTRACT A digita image ing agorithm based on fast curveet transform is proposed. Firsty, the carrier image is decomposed by fast curveet transform, and, the ing image is scrambed by Arnod transform. Secondy, the binary ing image is embedded into the medium frequency coefficients according to the human visua characteristics and curveet coefficients. Experiment resuts show that the proposed agorithm has good performance in both invisibiity and security and aso has good robustness against the noise, cropping, fitering, JPEG compression and other attacks. Keywords: igita Image Watermarking, Fast Curveet Transform, Human Visua Characters, Robustness, Invisibiity 1. Introduction In the past two decades, more and more researchers have devoted to the transform domain which shows good performance and robustness. Recenty, Candès and onoho [1,] have deveoped a new mutiscae transform which is caed the Curveet transform. It is anisotropic with strong direction, and provides optimay sparse representations of objects aong a genera curve with bounded curvature. Hence, it has been widey used in image processing fied. At the same time, many research papers proposed to embed based on the first curveet transform [3-8]. Shi et a. [3] proposed a semi-fragie ing agorithm by embedding the wartermark in the maximum modue of curveet coefficient. This agorithm keeps good toerance against JPEG compression. The method of Thai et a. [4] embedded a in curveet coefficients which are seected by a threshod. This method has good invisibiity and robustness. Thai et a. [5] embedded the in the curveet transform which contain as much edge information as possibe. It has good invisibiity but poor robustness. The impementation of the first curveet transform incudes subband decomposition, smooth partitioning, renormaize and ridgeet anaysis. So these agorithms have many probems such as impementation compexity and arge amount of redundancy. This paper proposes a digita image ing agorithm based on fast curveet transform. Firsty, we take a binary-vaued image which contains copyright information as, and adapt Arnod transform to it to improve its security. Secondy, according to the human visua characteristics, we embed the in curveet coefficients of the origina image. This agorithm is simpe and easy to impement. Experiment resuts show that our agorithm has good invisibiity and security, and is robustness to the noise, cropping, fitering, JPEG compression and other attacks.. Curveet Transform Simiar to the waveet transform and the ridgeet transform, the curveet transform theory is based on sparsity theory [8]. The idea of curveet is to cacuate the inner reationship between the signa and the curveet function to reaize the sparse representation of the signa..1. Continuous Time Curveet Transform The curveet transform can be expressed as f,, c j,, k :, j k (1) here, j = 0, 1,,, is a scae parameter; = 0, 1,,, is an orientation parameter; and k = (k 1, k ) Z is a transation parameter. The mother curveet is φ j (x), its Fourier transform is φ j (ω) = U j (ω), where U j is fre-

2 940 igita Image Watermarking Agorithm Based on Fast Curveet Transform quency window defined in the poar coordinate system such as: 3/4 j j j / U j r, W rv () W and V are radia and anguar windows respectivey and wi aways obey certain admissibiity conditions. Curveet at scae -j, orientation θ and position j, 1 j j xk R k1, k can be expressed as: j, jk,, x j R xx k (3) So, for f L (R ), curveet transform is expressed as: 1 cik,, : fˆ ˆ jk,, ( )d (4) 1 ˆ j, f U j Rθ ωexpi xk, d.. igita Curveet Transform igita curveet transform is inear and takes as input Cartesian arrays of the form f [t 1, t ], 0 t 1, t < n, which aows the output as a coection of coefficients:,, : 1, jk,. 1, c j k f t t t t 0 t1, tn In order to improve the curveet transform in the sense that they are conceptuay simper, faster and far ess redundant. Paper [] proposed the Fast iscrete Curveet Transform (FCT). There are two digita impementation of FCT. The first is based on unequay-spaced fast Fourier transform (USFFT) whie the second is based on the wrapping of speciay seected Fourier sampes. The FCT-Wrapping uses simper choice of spatia grid to transate curveets at each scae and ange. It needs ess two-dimensiona FFTs than FCT-USFFT, so it is quicky. The architecture of FCT via Wrapping is then roughy as foows: 1) Appy the FFT and obtain Fourier sampe f n1, n, -n/ n 1, n n/ (n is the size of the picture). ) For each scae/ange pair (j, ), form the product U, 1 ˆ j n, n f n1, n. 3) Wrap this product around the origin and obtain f, 1 ˆ j n, n W U j, f n1, n, where the range for n and 1 n is now 0 n1 L1,j and 0 n L, j (for in the range ( /4, /4). 4) Appy the inverse FFT to each f j,, hence coecting the discrete coefficients c j,, k. 3. Watermarking Agorithm Based on FCT 3.1. Watermark (5) In this agorithm, the is a binary-vaued image with 3 3 pixes (Figure 1). Arnod transform is used to increase the data security, and its function is defined as (6). x 1 1 x mod N (6) y k k1y Adapt n (here, n = 8) times Arnod transform to the origina W, then we obtain scrambing (Figure ). 3.. Watermark Embedding According to the Human Visua Characteristic, we choose to embed the into medium-frequency. In seected scae, the coefficients of each orientation are sorted and find criterion T i by ampitude factor λ (λ 0). Then choose the minimum T i as embedding parameter T. Finay, the is embedded to coefficients which are chosen by T. The embedding procedure (Figure 3) is described as foows. 1) Appy FCT to the origina image, get curveet coefficient C. ) Seect the curveet coefficient to embed a bit according to the foowing conditions. For 0 0 C j, k T or T C j, k3t For 1 T C j, kt (7) Then record the positions of these coefficients and the positions of 0 and 1 in the. 3) The embedded coefficients are modified by the foowing equations. Embed 0 C jk,, C jk,, mod C j, k, TT 4 (8) Embed 1 C jk,, C jk,, mod C j, k, T 3T 4 4) o inverse FCT to C, obtain the ed image Watermark Extraction The extraction procedure is composed of 4 steps and each step is described as foows. Figure 1. Watermark. Figure. Scrambed.

3 igita Image Watermarking Agorithm Based on Fast Curveet Transform 941 j 1 j j j 4 j 5 n j 3 j, k / Cj, k 3T / C j, k C j, kmodc j, k, TT / 4 0 C T T T / C, j, k T C j, k C j, k modc j, k, T 3T / 4 IFCT Figure 3. Embedding procedure. 1) Appy curveet transform to ed image, obtain curveet coefficient C. ) Locate the positions from the origina image by using embedding procedure step. Then extract the coefficients C from the ed image using those position. 3) Extract the W from C with the foowing rue 1 if mod C j, k, T T i (9) 0 if mod C j, k, T T 4) Appy T -n (T is Arnod transform period) times Arnod transform to W, obtain the binary image. 4. Experimenta Resuts In this program, the image is transformed through FCT via Wrapping. We use standard pixe image Lena (Figure 4) for evauation of our proposed method, and conduct experiments binary-vaued image ing with the noted above parameter scae = 3, λ = We have investigated the invisibiity and the robustness of our ing system, anayzed the agorithm performance by objective and subjective standards Invisibiity Tests The ed image is shown in Figure 5(a), the detected from ed image is shown in Figure 5(b). Figure 4. Origina image. (a) Figure 5. Invisibiity Tests. (a) Watermarked image [PSNR = dB]; (b) etected [NC = 1.00]. (b)

4 94 igita Image Watermarking Agorithm Based on Fast Curveet Transform Tabe 1. JPEG compression attack. Q PSNR NC etected Tabe. Gaussian ow pass fitering attack. Standard eviation (Window) 0.5(3) 1.5(3) 0.5(5) 1.5(5) 3(5) PSNR NC etected Tabe 3. Other attacks. Attacks Gaussian noise (0.001) Sat & Pepper noise (0.01) Random cropping (1/16) Random cropping (1/3) Change contrast PSNR NC etected Subjectivey, the ed image has good invisibiity. Compare Figure 5(b) with Figure, they are fuy consistent. The origina is accuratey recovered. 4.. Robustness Tests To evauate the robustness of agorithm, a the attacks are tested by the software of Stirmark [10,11]. The Peak Signa to Noise Ratio (PSNR) is empoyed to evauate the quaity of ed image after attack, and the Normaized Correation Coefficient (NC) is used to evauate the quaity of extracted for some attacks such as JPEG compression (Quaity factor Q), Gaussian ow pass fitering, adding noise, cropping and so on. The simuation resuts are shown as foowing Tabes. It can be seen from Tabe 1 and Tabe, the proposed method show very good robustness to JPEG compression and Gaussian ow pass fitering. From Tabe 3, the method aso has good robustness against noise, cropping and so on. 5. Concusions This paper proposes a method by embedding a into the origina image based on FCT. At the same time, Arnod transform is appied to improve the security of the system. The experimenta resuts show that the ed image has good invisibiity and robustness against JPEG compression and Gaussian ow pass fitering. There are many unstabe coefficients are discovered from the experiments. For instance, a sma change of the image wi arouse big changes of these coefficients. These unstabe factors can infuence the extracting of. Therefore, the proposed agorithm can not give a good performance of rotation and scaing, etc. In the future, we wi unceasing devote ourseves to the study of the robustness system against geometric attacks based on curveet transform. REFERENCES [1]. L. onoho and M. R. uncan, igita Curveet

5 igita Image Watermarking Agorithm Based on Fast Curveet Transform 943 Transform: Strategy, Impementation and Experiments, Proceeding of the SPIE on Waveet Appication VII, Orando, 000, pp [] E. J. Candes, L. emanet and. L. onoho, Fast iscrete Curveet Transforms [R], Appied and Computationa Mathematics, 005, pp [3] J. P. Shi and Z. J. Zhai, Curveet Transform for Image Authentication, Rough Set and Knowedge Technoogy, LNAI 406, 006, pp [4] T.. Hien, I. Kei, H. Harak, et a., Curveet-omain Image Watermarking Based on Edge-Embedding, Lecture Notes in Computer Science, Vo. 4693, No. 010, 007, pp [5] T.. Hien, K. Miyara, et a., Curveet Transform Based Logo Watermarking, Innovative Ago-Rithms and Techniques in Automation, Industria Eectronics and Teecommunication, 007, pp [6] H. Y. Leung, L. M. Cheng and L. L. Cheng, igita Watermarking Schemes Using Muti-Resoution Curveet and HVS Mode Lecture Notes in Computer Science, Vo. 5703, 009, pp [7] H. Y. Leung, L. M. Cheng and L. L. Cheng. A Robust Watermarking Scheme Using Seective Curveet Coefficients, Internationa Conference on Inteigient Information Hiding and Mutimedia Signa Processing, Harbin, August 008, pp [8] T.. Hien, K. Miyara, I. Kei and F. F. Ai, igita Watermarking Based on Curveet Transform, 9th Internationa Symposium on Signa Processing and Its Appications, Sharjah, Feburary 007, pp [9] J. L. Cheng and T. Shan. eveopment and Prospect of Image Mutiscae Geometric Anaysis, Acta Eectronic Sinica, Vo. 31, No. 1 A, pp [10] A. P. Fabien and Petitcoas. Watermarking Schemes Evauation, IEEE. Signa Processing, Vo. 17, No. 5, 000, pp [11] Stirmark. /stirmark/

Fuzzy Perceptual Watermarking For Ownership Verification

Fuzzy Perceptual Watermarking For Ownership Verification Fuzzy Perceptua Watermarking For Ownership Verification Mukesh Motwani 1 and Frederick C. Harris, Jr. 1 1 Computer Science & Engineering Department, University of Nevada, Reno, NV, USA Abstract - An adaptive

More information

WATERMARKING GIS DATA FOR DIGITAL MAP COPYRIGHT PROTECTION

WATERMARKING GIS DATA FOR DIGITAL MAP COPYRIGHT PROTECTION WATERMARKING GIS DATA FOR DIGITAL MAP COPYRIGHT PROTECTION Shen Tao Chinese Academy of Surveying and Mapping, Beijing 100039, China shentao@casm.ac.cn Xu Dehe Institute of resources and environment, North

More information

Hiding secrete data in compressed images using histogram analysis

Hiding secrete data in compressed images using histogram analysis University of Woongong Research Onine University of Woongong in Dubai - Papers University of Woongong in Dubai 2 iding secrete data in compressed images using histogram anaysis Farhad Keissarian University

More information

Application of Image Fusion Techniques on Medical Images

Application of Image Fusion Techniques on Medical Images Internationa Journa of Current Engineering and Technoogy E-ISS 77 406, P-ISS 347 56 07 IPRESSCO, A Rights Reserved Avaiabe at http://inpressco.com/category/icet Research Artice Appication of Image usion

More information

Research of Classification based on Deep Neural Network

Research of  Classification based on Deep Neural Network 2018 Internationa Conference on Sensor Network and Computer Engineering (ICSNCE 2018) Research of Emai Cassification based on Deep Neura Network Wang Yawen Schoo of Computer Science and Engineering Xi

More information

Image Segmentation Using Semi-Supervised k-means

Image Segmentation Using Semi-Supervised k-means I J C T A, 9(34) 2016, pp. 595-601 Internationa Science Press Image Segmentation Using Semi-Supervised k-means Reza Monsefi * and Saeed Zahedi * ABSTRACT Extracting the region of interest is a very chaenging

More information

A NEW APPROACH FOR BLOCK BASED STEGANALYSIS USING A MULTI-CLASSIFIER

A NEW APPROACH FOR BLOCK BASED STEGANALYSIS USING A MULTI-CLASSIFIER Internationa Journa on Technica and Physica Probems of Engineering (IJTPE) Pubished by Internationa Organization of IOTPE ISSN 077-358 IJTPE Journa www.iotpe.com ijtpe@iotpe.com September 014 Issue 0 Voume

More information

A New Supervised Clustering Algorithm Based on Min-Max Modular Network with Gaussian-Zero-Crossing Functions

A New Supervised Clustering Algorithm Based on Min-Max Modular Network with Gaussian-Zero-Crossing Functions 2006 Internationa Joint Conference on Neura Networks Sheraton Vancouver Wa Centre Hote, Vancouver, BC, Canada Juy 16-21, 2006 A New Supervised Custering Agorithm Based on Min-Max Moduar Network with Gaussian-Zero-Crossing

More information

Multi-level Shape Recognition based on Wavelet-Transform. Modulus Maxima

Multi-level Shape Recognition based on Wavelet-Transform. Modulus Maxima uti-eve Shape Recognition based on Waveet-Transform oduus axima Faouzi Aaya Cheikh, Azhar Quddus and oncef Gabbouj Tampere University of Technoogy (TUT), Signa Processing aboratory, P.O. Box 553, FIN-33101

More information

Language Identification for Texts Written in Transliteration

Language Identification for Texts Written in Transliteration Language Identification for Texts Written in Transiteration Andrey Chepovskiy, Sergey Gusev, Margarita Kurbatova Higher Schoo of Economics, Data Anaysis and Artificia Inteigence Department, Pokrovskiy

More information

Non-linear adaptive image enhancement in wireless sensor networks based on nonsubsampled

Non-linear adaptive image enhancement in wireless sensor networks based on nonsubsampled Tong and Chen EURASIP Journa on Wireess Communications and Networking (2017) 2017:46 DOI 10.1186/s13638-017-0829-z RESEARCH Non-inear adaptive image enhancement in wireess sensor networks based on nonsubsamped

More information

JOINT IMAGE REGISTRATION AND EXAMPLE-BASED SUPER-RESOLUTION ALGORITHM

JOINT IMAGE REGISTRATION AND EXAMPLE-BASED SUPER-RESOLUTION ALGORITHM JOINT IMAGE REGISTRATION AND AMPLE-BASED SUPER-RESOLUTION ALGORITHM Hyo-Song Kim, Jeyong Shin, and Rae-Hong Park Department of Eectronic Engineering, Schoo of Engineering, Sogang University 35 Baekbeom-ro,

More information

A study of comparative evaluation of methods for image processing using color features

A study of comparative evaluation of methods for image processing using color features A study of comparative evauation of methods for image processing using coor features FLORENTINA MAGDA ENESCU,CAZACU DUMITRU Department Eectronics, Computers and Eectrica Engineering University Pitești

More information

Endoscopic Motion Compensation of High Speed Videoendoscopy

Endoscopic Motion Compensation of High Speed Videoendoscopy Endoscopic Motion Compensation of High Speed Videoendoscopy Bharath avuri Department of Computer Science and Engineering, University of South Caroina, Coumbia, SC - 901. ravuri@cse.sc.edu Abstract. High

More information

A Fast Block Matching Algorithm Based on the Winner-Update Strategy

A Fast Block Matching Algorithm Based on the Winner-Update Strategy In Proceedings of the Fourth Asian Conference on Computer Vision, Taipei, Taiwan, Jan. 000, Voume, pages 977 98 A Fast Bock Matching Agorithm Based on the Winner-Update Strategy Yong-Sheng Chenyz Yi-Ping

More information

Contourlet Tranform Based Human Emotion Recognition System

Contourlet Tranform Based Human Emotion Recognition System Internationa Journa of Signa Processing Systems Vo. 2, No. 1 June 2014 Contouret Tranform Based Human Emotion Recognition System R. Suresh and S. Audithan Department of computer science and Engineering,

More information

Backing-up Fuzzy Control of a Truck-trailer Equipped with a Kingpin Sliding Mechanism

Backing-up Fuzzy Control of a Truck-trailer Equipped with a Kingpin Sliding Mechanism Backing-up Fuzzy Contro of a Truck-traier Equipped with a Kingpin Siding Mechanism G. Siamantas and S. Manesis Eectrica & Computer Engineering Dept., University of Patras, Patras, Greece gsiama@upatras.gr;stam.manesis@ece.upatras.gr

More information

Collinearity and Coplanarity Constraints for Structure from Motion

Collinearity and Coplanarity Constraints for Structure from Motion Coinearity and Copanarity Constraints for Structure from Motion Gang Liu 1, Reinhard Kette 2, and Bodo Rosenhahn 3 1 Institute of Information Sciences and Technoogy, Massey University, New Zeaand, Department

More information

A Memory Grouping Method for Sharing Memory BIST Logic

A Memory Grouping Method for Sharing Memory BIST Logic A Memory Grouping Method for Sharing Memory BIST Logic Masahide Miyazai, Tomoazu Yoneda, and Hideo Fuiwara Graduate Schoo of Information Science, Nara Institute of Science and Technoogy (NAIST), 8916-5

More information

Quality Assessment for Stereoscopic Images by Distortion Separation

Quality Assessment for Stereoscopic Images by Distortion Separation JOURNAL OF SOFTWARE, VOL. 9, NO. 1, JANUARY 14 37 Quaity Assessment for Stereoscopic Images by Distortion Separation Chaozheng Hu, Feng Shao*, Gangyi Jiang, Mei Yu, Fucui Li, Zongju Peng Facuty of Information

More information

University of Illinois at Urbana-Champaign, Urbana, IL 61801, /11/$ IEEE 162

University of Illinois at Urbana-Champaign, Urbana, IL 61801, /11/$ IEEE 162 oward Efficient Spatia Variation Decomposition via Sparse Regression Wangyang Zhang, Karthik Baakrishnan, Xin Li, Duane Boning and Rob Rutenbar 3 Carnegie Meon University, Pittsburgh, PA 53, wangyan@ece.cmu.edu,

More information

Optimization and Application of Support Vector Machine Based on SVM Algorithm Parameters

Optimization and Application of Support Vector Machine Based on SVM Algorithm Parameters Optimization and Appication of Support Vector Machine Based on SVM Agorithm Parameters YAN Hui-feng 1, WANG Wei-feng 1, LIU Jie 2 1 ChongQing University of Posts and Teecom 400065, China 2 Schoo Of Civi

More information

Multiple Plane Phase Retrieval Based On Inverse Regularized Imaging and Discrete Diffraction Transform

Multiple Plane Phase Retrieval Based On Inverse Regularized Imaging and Discrete Diffraction Transform Mutipe Pane Phase Retrieva Based On Inverse Reguaried Imaging and Discrete Diffraction Transform Artem Migukin, Vadimir Katkovnik, and Jaakko Astoa Department of Signa Processing, Tampere University of

More information

Joint disparity and motion eld estimation in. stereoscopic image sequences. Ioannis Patras, Nikos Alvertos and Georgios Tziritas y.

Joint disparity and motion eld estimation in. stereoscopic image sequences. Ioannis Patras, Nikos Alvertos and Georgios Tziritas y. FORTH-ICS / TR-157 December 1995 Joint disparity and motion ed estimation in stereoscopic image sequences Ioannis Patras, Nikos Avertos and Georgios Tziritas y Abstract This work aims at determining four

More information

AUTOMATIC gender classification based on facial images

AUTOMATIC gender classification based on facial images SUBMITTED TO IEEE TRANSACTIONS ON NEURAL NETWORKS 1 Gender Cassification Using a Min-Max Moduar Support Vector Machine with Incorporating Prior Knowedge Hui-Cheng Lian and Bao-Liang Lu, Senior Member,

More information

Further Optimization of the Decoding Method for Shortened Binary Cyclic Fire Code

Further Optimization of the Decoding Method for Shortened Binary Cyclic Fire Code Further Optimization of the Decoding Method for Shortened Binary Cycic Fire Code Ch. Nanda Kishore Heosoft (India) Private Limited 8-2-703, Road No-12 Banjara His, Hyderabad, INDIA Phone: +91-040-3378222

More information

Subgrade Cumulative Plastic Deformation under the Bridge in the Transitional Period of Orbit Dynamics Analysis

Subgrade Cumulative Plastic Deformation under the Bridge in the Transitional Period of Orbit Dynamics Analysis 499 A pubication of CHEMICAL ENGINEERING TRANSACTIONS VOL. 59, 2017 Guest Editors: Zhuo Yang, Junjie Ba, Jing Pan Copyright 2017, AIDIC Servizi S.r.. ISBN 978-88-95608-49-5; ISSN 2283-9216 The Itaian Association

More information

A Petrel Plugin for Surface Modeling

A Petrel Plugin for Surface Modeling A Petre Pugin for Surface Modeing R. M. Hassanpour, S. H. Derakhshan and C. V. Deutsch Structure and thickness uncertainty are important components of any uncertainty study. The exact ocations of the geoogica

More information

Real-Time Feature Descriptor Matching via a Multi-Resolution Exhaustive Search Method

Real-Time Feature Descriptor Matching via a Multi-Resolution Exhaustive Search Method 297 Rea-Time Feature escriptor Matching via a Muti-Resoution Ehaustive Search Method Chi-Yi Tsai, An-Hung Tsao, and Chuan-Wei Wang epartment of Eectrica Engineering, Tamang University, New Taipei City,

More information

A VIDEO-BASED APPROACH FOR RAILWAY BRIDGE SURFACE CRACK DETECTION

A VIDEO-BASED APPROACH FOR RAILWAY BRIDGE SURFACE CRACK DETECTION 6 th Internationa Symposium on Mobie Mapping Technoogy, Presidente Prudente, São Pauo, Brazi, Juy 21-24, 2009 A VIDEO-BASED APPROACH FOR RAILWAY BRIDGE SURFACE CRACK DETECTION LI Qingquan a,c, CHEN Long

More information

Pneumo-Mechanical Simulation of a 2 Dof Planar Manipulator

Pneumo-Mechanical Simulation of a 2 Dof Planar Manipulator Pneumo-Mechanica Simuation of a 2 Dof Panar Manipuator Hermes GIBERTI, Simone CINQUEMANI Mechanica Engineering Department, Poitecnico di Miano, Campus Bovisa Sud, via La Masa 34, 2156, Miano, Itay ABSTRACT

More information

Lossless Authentication Watermarking Based on Adaptive Modular Arithmetic

Lossless Authentication Watermarking Based on Adaptive Modular Arithmetic 5 HENGFU YANG, ET AL, LOSSLESS AUTHENTICATION WATERMARKING BASED ON ADAPTIVE MODULAR ARITHMETIC Lossess Authentication Watermarking Based on Adaptive Moduar Arithmetic Hengfu YANG 1,, Xingming SUN 1, Guang

More information

Quality Assessment using Tone Mapping Algorithm

Quality Assessment using Tone Mapping Algorithm Quaity Assessment using Tone Mapping Agorithm Nandiki.pushpa atha, Kuriti.Rajendra Prasad Research Schoar, Assistant Professor, Vignan s institute of engineering for women, Visakhapatnam, Andhra Pradesh,

More information

FREE-FORM ANISOTROPY: A NEW METHOD FOR CRACK DETECTION ON PAVEMENT SURFACE IMAGES

FREE-FORM ANISOTROPY: A NEW METHOD FOR CRACK DETECTION ON PAVEMENT SURFACE IMAGES FREE-FORM ANISOTROPY: A NEW METHOD FOR CRACK DETECTION ON PAVEMENT SURFACE IMAGES Tien Sy Nguyen, Stéphane Begot, Forent Ducuty, Manue Avia To cite this version: Tien Sy Nguyen, Stéphane Begot, Forent

More information

A Robust Technique for Feature-based Image Mosaicing using Image Fusion

A Robust Technique for Feature-based Image Mosaicing using Image Fusion A Robust Technique for Feature-based Image Mosaicing using Image Fusion Vima Singh Bind, Priya Ranjan Mudui, Umesh Chandra Pati Dept. of Eectronics and Communication Engg., NIT, Rourkea vimasinghbindeex@gmai.com

More information

Automatic Hidden Web Database Classification

Automatic Hidden Web Database Classification Automatic idden Web atabase Cassification Zhiguo Gong, Jingbai Zhang, and Qian Liu Facuty of Science and Technoogy niversity of Macau Macao, PRC {fstzgg,ma46597,ma46620}@umac.mo Abstract. In this paper,

More information

Research on UAV Fixed Area Inspection based on Image Reconstruction

Research on UAV Fixed Area Inspection based on Image Reconstruction Research on UAV Fixed Area Inspection based on Image Reconstruction Kun Cao a, Fei Wu b Schoo of Eectronic and Eectrica Engineering, Shanghai University of Engineering Science, Abstract Shanghai 20600,

More information

Mobile App Recommendation: Maximize the Total App Downloads

Mobile App Recommendation: Maximize the Total App Downloads Mobie App Recommendation: Maximize the Tota App Downoads Zhuohua Chen Schoo of Economics and Management Tsinghua University chenzhh3.12@sem.tsinghua.edu.cn Yinghui (Catherine) Yang Graduate Schoo of Management

More information

Lecture Notes for Chapter 4 Part III. Introduction to Data Mining

Lecture Notes for Chapter 4 Part III. Introduction to Data Mining Data Mining Cassification: Basic Concepts, Decision Trees, and Mode Evauation Lecture Notes for Chapter 4 Part III Introduction to Data Mining by Tan, Steinbach, Kumar Adapted by Qiang Yang (2010) Tan,Steinbach,

More information

M-BAND DUAL TREE COMPLEX WAVELET TRANSFORM

M-BAND DUAL TREE COMPLEX WAVELET TRANSFORM Internationa Journa of Advances in Engineering & Technoogy, Juy 22. M-BAND DUAL TREE COMPLEX WAVELET TRANSFORM FOR TEXTURE IMAGE INDEXING AND RETRIEVAL K. N. Prakash and K. Satya Prasad 2 Research Schoar,

More information

FACE RECOGNITION WITH HARMONIC DE-LIGHTING. s: {lyqing, sgshan, wgao}jdl.ac.cn

FACE RECOGNITION WITH HARMONIC DE-LIGHTING.  s: {lyqing, sgshan, wgao}jdl.ac.cn FACE RECOGNITION WITH HARMONIC DE-LIGHTING Laiyun Qing 1,, Shiguang Shan, Wen Gao 1, 1 Graduate Schoo, CAS, Beijing, China, 100080 ICT-ISVISION Joint R&D Laboratory for Face Recognition, CAS, Beijing,

More information

Classification of EEG Signal by STFT-CNN Framework: Identification of Right-/left-hand Motor Imagination in BCI Systems

Classification of EEG Signal by STFT-CNN Framework: Identification of Right-/left-hand Motor Imagination in BCI Systems Cassification of EEG Signa by STFT-CNN Framework: Identification of Right-/eft-hand Motor Imagination in BCI Systems 12 Brain Cognitive Computing Lab, Schoo of Information Engineering, Minzu University

More information

An Indian Journal FULL PAPER ABSTRACT KEYWORDS. Trade Science Inc.

An Indian Journal FULL PAPER ABSTRACT KEYWORDS. Trade Science Inc. [Type text] [Type text] [Type text] ISSN : 0974-7435 Voume 10 Issue 16 BioTechnoogy 014 An Indian Journa FULL PAPER BTAIJ, 10(16), 014 [999-9307] Study on prediction of type- fuzzy ogic power system based

More information

Reference trajectory tracking for a multi-dof robot arm

Reference trajectory tracking for a multi-dof robot arm Archives of Contro Sciences Voume 5LXI, 5 No. 4, pages 53 57 Reference trajectory tracking for a muti-dof robot arm RÓBERT KRASŇANSKÝ, PETER VALACH, DÁVID SOÓS, JAVAD ZARBAKHSH This paper presents the

More information

Efficient method to design RF pulses for parallel excitation MRI using gridding and conjugate gradient

Efficient method to design RF pulses for parallel excitation MRI using gridding and conjugate gradient Origina rtice Efficient method to design RF puses for parae excitation MRI using gridding and conjugate gradient Shuo Feng, Jim Ji Department of Eectrica & Computer Engineering, Texas & M University, Texas,

More information

Computer Graphics. - Shading & Texturing -

Computer Graphics. - Shading & Texturing - Computer Graphics - Shading & Texturing - Empirica BRDF Approximation Purey heuristic mode Initiay without units (vaues [0,1] r = r,a + r,d + r,s ( + r,m + r,t r,a : Ambient term Approximate indirect iumination

More information

Resource Optimization to Provision a Virtual Private Network Using the Hose Model

Resource Optimization to Provision a Virtual Private Network Using the Hose Model Resource Optimization to Provision a Virtua Private Network Using the Hose Mode Monia Ghobadi, Sudhakar Ganti, Ghoamai C. Shoja University of Victoria, Victoria C, Canada V8W 3P6 e-mai: {monia, sganti,

More information

A Novel Linear-Polynomial Kernel to Construct Support Vector Machines for Speech Recognition

A Novel Linear-Polynomial Kernel to Construct Support Vector Machines for Speech Recognition Journa of Computer Science 7 (7): 99-996, 20 ISSN 549-3636 20 Science Pubications A Nove Linear-Poynomia Kerne to Construct Support Vector Machines for Speech Recognition Bawant A. Sonkambe and 2 D.D.

More information

Service Scheduling for General Packet Radio Service Classes

Service Scheduling for General Packet Radio Service Classes Service Scheduing for Genera Packet Radio Service Casses Qixiang Pang, Amir Bigoo, Victor C. M. Leung, Chris Schoefied Department of Eectrica and Computer Engineering, University of British Coumbia, Vancouver,

More information

A Robust Sign Language Recognition System with Sparsely Labeled Instances Using Wi-Fi Signals

A Robust Sign Language Recognition System with Sparsely Labeled Instances Using Wi-Fi Signals A Robust Sign Language Recognition System with Sparsey Labeed Instances Using Wi-Fi Signas Jiacheng Shang, Jie Wu Center for Networked Computing Dept. of Computer and Info. Sciences Tempe University Motivation

More information

Substitute Model of Deep-groove Ball Bearings in Numeric Analysis of Complex Constructions Like Manipulators

Substitute Model of Deep-groove Ball Bearings in Numeric Analysis of Complex Constructions Like Manipulators Mechanics and Mechanica Engineering Vo. 12, No. 4 (2008) 349 356 c Technica University of Lodz Substitute Mode of Deep-groove Ba Bearings in Numeric Anaysis of Compex Constructions Like Manipuators Leszek

More information

COMPRESSIVE sensing (CS), which aims at recovering

COMPRESSIVE sensing (CS), which aims at recovering D-Net: Deep Learning pproach for Compressive Sensing RI Yan Yang, Jian Sun, Huibin Li, and Zongben u ariv:705.06869v [cs.cv] 9 ay 07 bstract Compressive sensing (CS) is an effective approach for fast agnetic

More information

Grating cell operator features for oriented texture segmentation

Grating cell operator features for oriented texture segmentation Appeared in in: Proc. of the 14th Int. Conf. on Pattern Recognition, Brisbane, Austraia, August 16-20, 1998, pp.1010-1014. Grating ce operator features for oriented texture segmentation P. Kruizinga and

More information

Learning Dynamic Guidance for Depth Image Enhancement

Learning Dynamic Guidance for Depth Image Enhancement Learning Dynamic Guidance for Depth Image Enhancement Shuhang Gu 1, Wangmeng Zuo 2, Shi Guo 2, Yunjin Chen 3, Chongyu Chen 4,1, Lei Zhang 1, 1 The Hong Kong Poytechnic University, 2 Harbin Institute of

More information

Providing Hop-by-Hop Authentication and Source Privacy in Wireless Sensor Networks

Providing Hop-by-Hop Authentication and Source Privacy in Wireless Sensor Networks The 31st Annua IEEE Internationa Conference on Computer Communications: Mini-Conference Providing Hop-by-Hop Authentication and Source Privacy in Wireess Sensor Networks Yun Li Jian Li Jian Ren Department

More information

Research Article Frame Interpolation Based on Visual Correspondence and Coherency Sensitive Hashing

Research Article Frame Interpolation Based on Visual Correspondence and Coherency Sensitive Hashing Mathematica Probems in Engineering Voume 2013, Artice ID 453278, 11 pages http://dx.doi.org/10.1155/2013/453278 Research Artice Frame Interpoation Based on Visua Correspondence and Coherency Sensitive

More information

An Edge Guided Image Interpolation Algorithm via Directional Filtering and Data Fusion

An Edge Guided Image Interpolation Algorithm via Directional Filtering and Data Fusion An Edge Guided Image Interpoation Agoritm via Directiona Fitering and Data Fusion Lei Zang *a, Member, IEEE, and Xiaoin Wu b, Senior Member, IEEE a Dept. of Computing, Te Hong Kong Poytecnic University

More information

Multi-task hidden Markov modeling of spectrogram feature from radar high-resolution range profiles

Multi-task hidden Markov modeling of spectrogram feature from radar high-resolution range profiles http://asp.eurasipjournas.com/content/22//86 RESEARCH Open Access Muti-task hidden Markov modeing of spectrogram feature from radar high-resoution range profies Mian Pan, Lan Du *, Penghui Wang, Hongwei

More information

Massively Parallel Part of Speech Tagging Using. Min-Max Modular Neural Networks.

Massively Parallel Part of Speech Tagging Using. Min-Max Modular Neural Networks. assivey Parae Part of Speech Tagging Using in-ax oduar Neura Networks Bao-Liang Lu y, Qing a z, ichinori Ichikawa y, & Hitoshi Isahara z y Lab. for Brain-Operative Device, Brain Science Institute, RIEN

More information

THE PERCENTAGE OCCUPANCY HIT OR MISS TRANSFORM

THE PERCENTAGE OCCUPANCY HIT OR MISS TRANSFORM 17th European Signa Processing Conference (EUSIPCO 2009) Gasgow, Scotand, August 24-28, 2009 THE PERCENTAGE OCCUPANCY HIT OR MISS TRANSFORM P. Murray 1, S. Marsha 1, and E.Buinger 2 1 Dept. of Eectronic

More information

Performance Enhancement of 2D Face Recognition via Mosaicing

Performance Enhancement of 2D Face Recognition via Mosaicing Performance Enhancement of D Face Recognition via Mosaicing Richa Singh, Mayank Vatsa, Arun Ross, Afze Noore West Virginia University, Morgantown, WV 6506 {richas, mayankv, ross, noore}@csee.wvu.edu Abstract

More information

CNN and RNN Based Neural Networks for Action Recognition

CNN and RNN Based Neural Networks for Action Recognition Journa of Physics: Conference Series PAPER OPEN ACCESS CNN and RNN Based Neura Networks for Action Recognition To cite this artice: Chen Zhao et a 2018 J. Phys.: Conf. Ser. 1087 062013 View the artice

More information

Human Action Recognition Using Key Points Displacement

Human Action Recognition Using Key Points Displacement Human Action Recognition Using Key Points Dispacement Kuan-Ting Lai,, Chaur-Heh Hsieh 3, Mao-Fu Lai 4, and Ming-Syan Chen, Research Center for Information Technoogy Innovation, Academia Sinica, Taiwan

More information

Efficient Histogram-based Indexing for Video Copy Detection

Efficient Histogram-based Indexing for Video Copy Detection Efficient Histogram-based Indexing for Video Copy Detection Chih-Yi Chiu, Jenq-Haur Wang*, and Hung-Chi Chang Institute of Information Science, Academia Sinica, Taiwan *Department of Computer Science and

More information

Filtering. Yao Wang Polytechnic University, Brooklyn, NY 11201

Filtering. Yao Wang Polytechnic University, Brooklyn, NY 11201 Spatia Domain Linear Fitering Yao Wang Poytechnic University Brookyn NY With contribution rom Zhu Liu Onur Gueryuz and Gonzaez/Woods Digita Image Processing ed Introduction Outine Noise remova using ow-pass

More information

A Comparison of a Second-Order versus a Fourth- Order Laplacian Operator in the Multigrid Algorithm

A Comparison of a Second-Order versus a Fourth- Order Laplacian Operator in the Multigrid Algorithm A Comparison of a Second-Order versus a Fourth- Order Lapacian Operator in the Mutigrid Agorithm Kaushik Datta (kdatta@cs.berkeey.edu Math Project May 9, 003 Abstract In this paper, the mutigrid agorithm

More information

RETINAL blood vessels generally show a coarse to fine

RETINAL blood vessels generally show a coarse to fine 1 A Hierarchica Image Matting Mode for Bood Vesse Segmentation in Fundus images Zhun Fan, Senior Member, IEEE, Jiewei Lu, Wenji Li, Caimin Wei, Han Huang, Xinye Cai, Xinjian Chen, Senior Member, IEEE,

More information

MACHINE learning techniques can, automatically,

MACHINE learning techniques can, automatically, Proceedings of Internationa Joint Conference on Neura Networks, Daas, Texas, USA, August 4-9, 203 High Leve Data Cassification Based on Network Entropy Fiipe Aves Neto and Liang Zhao Abstract Traditiona

More information

arxiv: v1 [cs.cv] 28 Sep 2015

arxiv: v1 [cs.cv] 28 Sep 2015 Fast Non-oca Stereo Matching based on Hierarchica Disparity Prediction Xuan Luo, Xuejiao Bai, Shuo Li, Hongtao Lu Shanghai Jiao Tong University, No. 800, Dongchuan Road, Shanghai, China {roxanneuo, yukiaya,

More information

Large-Scale Modeling of Parametric Surfaces using Spherical Harmonics

Large-Scale Modeling of Parametric Surfaces using Spherical Harmonics Large-Scae Modeing of Parametric Surfaces using Spherica Harmonics Li Shen Dept of Computer and Info Science University of Massachusetts Dartmouth N Dartmouth, MA 2747 shen@umassdedu Moo K Chung Department

More information

Nearest Neighbor Learning

Nearest Neighbor Learning Nearest Neighbor Learning Cassify based on oca simiarity Ranges from simpe nearest neighbor to case-based and anaogica reasoning Use oca information near the current query instance to decide the cassification

More information

Absolute three-dimensional shape measurement with two-frequency square binary patterns

Absolute three-dimensional shape measurement with two-frequency square binary patterns 871 Vo. 56, No. 31 / November 1 217 / Appied Optics Research Artice Absoute three-dimensiona shape measurement with two-frequency square binary patterns CHUFAN JIANG AND SONG ZHANG* Schoo of Mechanica

More information

A VLSI Architecture of JPEG2000 Encoder

A VLSI Architecture of JPEG2000 Encoder A VLSI Architecture of JPEG2000 Encoder Leibo LIU, Ning CHEN, Hongying MENG, Li ZHANG, Zhihua WANG, and Hongyi CHEN Abstract This paper proposes a VLSI architecture of JPEG2000 encoder, which functionay

More information

Image denoising using curvelet transform: an approach for edge preservation

Image denoising using curvelet transform: an approach for edge preservation Journal of Scientific & Industrial Research Vol. 3469, January 00, pp. 34-38 J SCI IN RES VOL 69 JANUARY 00 Image denoising using curvelet transform: an approach for edge preservation Anil A Patil * and

More information

Robust Multimodal Recognition via Multitask Multivariate Low-Rank Representations

Robust Multimodal Recognition via Multitask Multivariate Low-Rank Representations Robust Mutimoda Recognition via Mutitask Mutivariate Low-Rank Representations Heng Zhang, Visha M. Pate and Rama Cheappa Center for Automation Research, UMIACS, University of Maryand, Coege Park, MD 074

More information

WHILE estimating the depth of a scene from a single image

WHILE estimating the depth of a scene from a single image JOURNAL OF L A T E X CLASS FILES, VOL. 4, NO. 8, AUGUST 05 Monocuar Depth Estimation using Muti-Scae Continuous CRFs as Sequentia Deep Networks Dan Xu, Student Member, IEEE, Eisa Ricci, Member, IEEE, Wani

More information

A HIGH PERFORMANCE, LOW LATENCY, LOW POWER AUDIO PROCESSING SYSTEM FOR WIDEBAND SPEECH OVER WIRELESS LINKS

A HIGH PERFORMANCE, LOW LATENCY, LOW POWER AUDIO PROCESSING SYSTEM FOR WIDEBAND SPEECH OVER WIRELESS LINKS A HIGH PERFORMANCE, LOW LATENCY, LOW POWER AUDIO PROCESSING SYSTEM FOR WIDEBAND SPEECH OVER WIRELESS LINKS Etienne Cornu 1, Aain Dufaux 2, and David Hermann 1 1 AMI Semiconductor Canada, 611 Kumpf Drive,

More information

A Top-to-Bottom View: Energy Analysis for Mobile Application Source Code

A Top-to-Bottom View: Energy Analysis for Mobile Application Source Code A Top-to-Bottom View: Energy Anaysis for Mobie Appication Source Code Xueiang Li John P. Gaagher Roskide University Emai: {xueiang, jpg}@ruc.dk arxiv:1510.04165v1 [cs.oh] 14 Oct 2015 Abstract Energy efficiency

More information

Fuzzy Equivalence Relation Based Clustering and Its Use to Restructuring Websites Hyperlinks and Web Pages

Fuzzy Equivalence Relation Based Clustering and Its Use to Restructuring Websites Hyperlinks and Web Pages Fuzzy Equivaence Reation Based Custering and Its Use to Restructuring Websites Hyperinks and Web Pages Dimitris K. Kardaras,*, Xenia J. Mamakou, and Bi Karakostas 2 Business Informatics Laboratory, Dept.

More information

Minimizing Resource Cost for Camera Stream Scheduling in Video Data Center

Minimizing Resource Cost for Camera Stream Scheduling in Video Data Center Gao YH, Ma HD, Liu W. Minimizing resource cost for camera stream scheduing in video data center. JOURNAL OF COMPUTER SCIENCE AND TECHNOLOGY 32(3): 555 570 May 2017. DOI 10.1007/s11390-017-1743-x Minimizing

More information

DETECTION OF OBSTACLE AND FREESPACE IN AN AUTONOMOUS WHEELCHAIR USING A STEREOSCOPIC CAMERA SYSTEM

DETECTION OF OBSTACLE AND FREESPACE IN AN AUTONOMOUS WHEELCHAIR USING A STEREOSCOPIC CAMERA SYSTEM DETECTION OF OBSTACLE AND FREESPACE IN AN AUTONOMOUS WHEELCHAIR USING A STEREOSCOPIC CAMERA SYSTEM Le Minh 1, Thanh Hai Nguyen 2, Tran Nghia Khanh 2, Vo Văn Toi 2, Ngo Van Thuyen 1 1 University of Technica

More information

Path-Based Protection for Surviving Double-Link Failures in Mesh-Restorable Optical Networks

Path-Based Protection for Surviving Double-Link Failures in Mesh-Restorable Optical Networks Path-Based Protection for Surviving Doube-Link Faiures in Mesh-Restorabe Optica Networks Wensheng He and Arun K. Somani Dependabe Computing and Networking Laboratory Department of Eectrica and Computer

More information

University of Bristol - Explore Bristol Research. Link to published version (if available): /ICIP

University of Bristol - Explore Bristol Research. Link to published version (if available): /ICIP Anantrasirichai, N., & Canagarajah, C. N. (2010). Spatiotempora superresoution for ow bitrate H.264 video. In IEEE Internationa Conference on Image Processing. (pp. 2809-2812). 10.1109/ICIP.2010.5651088

More information

Load Balancing by MPLS in Differentiated Services Networks

Load Balancing by MPLS in Differentiated Services Networks Load Baancing by MPLS in Differentiated Services Networks Riikka Susitaiva, Jorma Virtamo, and Samui Aato Networking Laboratory, Hesinki University of Technoogy P.O.Box 3000, FIN-02015 HUT, Finand {riikka.susitaiva,

More information

Response Surface Model Updating for Nonlinear Structures

Response Surface Model Updating for Nonlinear Structures Response Surface Mode Updating for Noninear Structures Gonaz Shahidi a, Shamim Pakzad b a PhD Student, Department of Civi and Environmenta Engineering, Lehigh University, ATLSS Engineering Research Center,

More information

Design Research of Nanopositioner based on SPM and its simulation of FEM Z.Y. Zhang 1,a,H. Q. Li 1,b,and H.X. Zhou 2,c

Design Research of Nanopositioner based on SPM and its simulation of FEM Z.Y. Zhang 1,a,H. Q. Li 1,b,and H.X. Zhou 2,c Soid State Phenomena Vos. - (7) pp 47-478 Onine: 7--5 (7) Trans Tech Pubications, Switzerand doi:.48/www.scientific.net/ssp.-.47 Design Research of Nanopositioner based on SPM and its simuation of FEM..

More information

A Robust Method for Shape-based 3D Model Retrieval

A Robust Method for Shape-based 3D Model Retrieval A Robust Method for Shape-based 3D Mode Retrieva Yi Liu, Jiantao Pu, Guyu Xin, Hongbin Zha Weibin Liu 1, Yusue Uehara ationa Laboratory on Machine Perception Internet Appication Lab, Fujitsu R&D Center

More information

The Classification of Stored Grain Pests based on Convolutional Neural Network

The Classification of Stored Grain Pests based on Convolutional Neural Network 2017 2nd Internationa Conference on Mechatronics and Information Technoogy (ICMIT 2017) The Cassification of Stored Grain Pests based on Convoutiona Neura Network Dexian Zhang1, Wenun Zhao*, 1 1 Schoo

More information

Testing Whether a Set of Code Words Satisfies a Given Set of Constraints *

Testing Whether a Set of Code Words Satisfies a Given Set of Constraints * JOURNAL OF INFORMATION SCIENCE AND ENGINEERING 6, 333-346 (010) Testing Whether a Set of Code Words Satisfies a Given Set of Constraints * HSIN-WEN WEI, WAN-CHEN LU, PEI-CHI HUANG, WEI-KUAN SHIH AND MING-YANG

More information

Depth Reconstruction from Sparse Samples: Representation, Algorithm, and Sampling

Depth Reconstruction from Sparse Samples: Representation, Algorithm, and Sampling Depth Reconstruction from Sparse Sampes: Representation, Agorithm, and Samping Lee-Kang Liu, Student Member, IEEE, Staney H. Chan, Member, IEEE and Truong Q. Nguyen, Feow, IEEE arxiv:407.3840v4 [cs.cv]

More information

Adaptive 360 VR Video Streaming: Divide and Conquer!

Adaptive 360 VR Video Streaming: Divide and Conquer! Adaptive 360 VR Video Streaming: Divide and Conquer! Mohammad Hosseini *, Viswanathan Swaminathan * University of Iinois at Urbana-Champaign (UIUC) Adobe Research, San Jose, USA Emai: shossen2@iinois.edu,

More information

A HYBRID FEATURE SELECTION METHOD BASED ON FISHER SCORE AND GENETIC ALGORITHM

A HYBRID FEATURE SELECTION METHOD BASED ON FISHER SCORE AND GENETIC ALGORITHM Journa of Mathematica Sciences: Advances and Appications Voume 37, 2016, Pages 51-78 Avaiabe at http://scientificadvances.co.in DOI: http://dx.doi.org/10.18642/jmsaa_7100121627 A HYBRID FEATURE SELECTION

More information

A NEW ROBUST IMAGE WATERMARKING SCHEME BASED ON DWT WITH SVD

A NEW ROBUST IMAGE WATERMARKING SCHEME BASED ON DWT WITH SVD A NEW ROBUST IMAGE WATERMARKING SCHEME BASED ON WITH S.Shanmugaprabha PG Scholar, Dept of Computer Science & Engineering VMKV Engineering College, Salem India N.Malmurugan Director Sri Ranganathar Institute

More information

A probabilistic fuzzy method for emitter identification based on genetic algorithm

A probabilistic fuzzy method for emitter identification based on genetic algorithm A probabitic fuzzy method for emitter identification based on genetic agorithm Xia Chen, Weidong Hu, Hongwen Yang, Min Tang ATR Key Lab, Coege of Eectronic Science and Engineering Nationa University of

More information

Chapter Multidimensional Direct Search Method

Chapter Multidimensional Direct Search Method Chapter 09.03 Mutidimensiona Direct Search Method After reading this chapter, you shoud be abe to:. Understand the fundamentas of the mutidimensiona direct search methods. Understand how the coordinate

More information

DIGITAL IMAGE WATERMARKING BASED ON A RELATION BETWEEN SPATIAL AND FREQUENCY DOMAINS

DIGITAL IMAGE WATERMARKING BASED ON A RELATION BETWEEN SPATIAL AND FREQUENCY DOMAINS DIGITAL IMAGE WATERMARKING BASED ON A RELATION BETWEEN SPATIAL AND FREQUENCY DOMAINS Murat Furat Mustafa Oral e-mail: mfurat@cu.edu.tr e-mail: moral@mku.edu.tr Cukurova University, Faculty of Engineering,

More information

Relative Positioning from Model Indexing

Relative Positioning from Model Indexing Reative Positioning from Mode Indexing Stefan Carsson Computationa Vision and Active Perception Laboratory (CVAP)* Roya Institute of Technoogy (KTH), Stockhom, Sweden Abstract We show how to determine

More information

Multiscale Representation of Surfaces by Tight Wavelet Frames with Applications to Denoising

Multiscale Representation of Surfaces by Tight Wavelet Frames with Applications to Denoising Mutiscae Representation of Surfaces by Tight Waveet Frames with Appications to Denoising Bin Dong a, Qingtang Jiang b, Chaoqiang Liu c, and Zuowei Shen c a Department of Mathematics, University of Arizona,

More information

Comparison of Digital Image Watermarking Algorithms. Xu Zhou Colorado School of Mines December 1, 2014

Comparison of Digital Image Watermarking Algorithms. Xu Zhou Colorado School of Mines December 1, 2014 Comparison of Digital Image Watermarking Algorithms Xu Zhou Colorado School of Mines December 1, 2014 Outlier Introduction Background on digital image watermarking Comparison of several algorithms Experimental

More information

Distance Weighted Discrimination and Second Order Cone Programming

Distance Weighted Discrimination and Second Order Cone Programming Distance Weighted Discrimination and Second Order Cone Programming Hanwen Huang, Xiaosun Lu, Yufeng Liu, J. S. Marron, Perry Haaand Apri 3, 2012 1 Introduction This vignette demonstrates the utiity and

More information