A {k, n}-secret Sharing Scheme for Color Images
|
|
- Philomena Moody
- 5 years ago
- Views:
Transcription
1 A {k, n}-seret Sharing Sheme for Color Images Rastislav Luka, Konstantinos N. Plataniotis, and Anastasios N. Venetsanopoulos The Edward S. Rogers Sr. Dept. of Eletrial and Computer Engineering, University of Toronto, 10 King s College Road, Toronto, M5S 3G4, Canada {lukar,kostas,anv}@dsp.utoronto.a Abstrat. This paper introdues a new {k, n}-seret sharing sheme for olor images. The proposed method enrypts the olor image into n olor shares. The seret information is reovered only if the k (or more) allowed shares are available for deryption. The proposed method utilizes the onventional {k, n}-seret sharing strategy by operating at the bit-levels of the deomposed olor image. Modifying the spatial arrangements of the binary omponents, the method produes olor shares with varied both the spetral harateristis among the RGB omponents and the spatial orrelation between the neighboring olor vetors. Sine enryption is done in the deomposed binary domain, there is no obvious relationship in the RGB olor domain between any two olor shares or between the original olor image and any of the n shares. This inreases protetion of the seret information. Inverse ryptographi proessing of the shares must be realized in the deomposed binary domain and the proedure reveals the original olor image with perfet reonstrution. 1 Introdution Visual ryptography [2],[3],[4],[8],[11] is a popular ryptographi tool used for protetion of sanned douments and natural digital images whih are distributed via publi networks. These tehniques are based on the priniple of sharing seret information among a group of partiipants. The shared seret an be reovered only when a oalition of willing partiipants are polling their enrypted images, the so-alled shares, together. Seret sharing shemes are usually termed visual sine the seret (original) information an be diretly revealed from staked shares (e.g realized as transparenies) through simple visual inspetion, without any omputer-guided proessing [9],[11]. A {k, n}-threshold visual ryptography sheme [5],[6],[11] often alled {k, n}- visual seret sharing (VSS), is used to enrypt an input image by splitting the original ontent into n, seemingly random, shares. To reover the seret information, k (or more) allowed shares must be staked together. M. Bubak et al. (Eds.): ICCS 2004, LNCS 3039, pp , Springer-Verlag Berlin Heidelberg 2004
2 A {k, n}-seret Sharing Sheme for Color Images 73 (a) (b) () Fig. 1. Visual ryptography: (a) original binary image, (b,) share images, derypted, output image 2 {k, n}-seret Sharing Sheme Due to its algorithmi nature, onventional visual ryptography shemes operate on a binary input (Fig. 1) [10]. Assuming a K 1 K 2 binary image (blak and white image with 0 values denoting the blak and 1 values denoting the white), eah binary pixel r (i,j) determined by spatial oordinates i =1, 2,..., K 1 and j =1, 2,..., K 2 is replaed via an enryption funtion f e ( ) with a m 1 m 2 blok of blak and white pixels in eah of the n shares. Repeating the proess for eah input pixel, a K 1 K 2 input binary image is enrypted into n binary shares eah one with a spatial resolution of m 1 K 1 m 2 K 2 pixels. Sine the spatial arrangement of the pixels varies from blok to blok, the original information annot be revealed without aessing a predefined number of shares. Let as assume a basi {2, 2}-threshold struture whih is the basi ase designed within the {k, n}-vss framework [1],[7]. Assuming for simpliity a basi struture with 2 2 bloks s 1 =[s (2i 1,2j 1),s (2i 1,2j),s (2i,2j 1),s (2i,2j) ] S 1 and s 2 =[s (2i 1,2j 1),s (2i 1,2j),s (2i,2j 1),s (2i,2j) ] S 2, the enryption proess is defined as follows: f e (r (i,j) )= { [s1, s 2 ] T C 0 for r (i,j) =0 [s 1, s 2 ] T C 1 for r (i,j) =1 (1) where C 0 and C 1 are the sets obtained by permuting the olumns of the n m 1 m 2 basis matries A 0 and A 1, respetively [10]. Sine m 1 m 2 represents the fator by whih eah share is larger than the original image, it is desirable to make m 1 m 2 as small as possible. In the ase of the {2, 2}-VSS the optimal hoie m 1 and m 2 leads to m 1 = 2 and m 2 = 2 resulting in 2 2 bloks s 1 and s 2.
3 74 R. Luka, K.N. Plataniotis, and A.N. Venetsanopoulos (a) (b) (e) () Fig. 2. Halftoning-based seret sharing of olor images: (a) original olor image, (b) halftone image obtained using Floyd-Steinberg filter [12], (,d) share images, (e) derypted, output image Assuming the {2, 2}-VSS the sets { } C 0 = [ 0,1,0,1 1,0,1,0 0,0,1,1 1,1,0,0 1,0,0,1 0,1,1,0 1,0,1,0 0,1,0,1 1,1,0,0 0,0,1,1 0,1,1,0 1,0,0,1 ] (2) { } C 1 = [ 0,1,0,1 1,0,1,0 0,0,1,1 1,1,0,0 1,0,0,1 0,1,1,0 0,1,0,1 1,0,1,0 0,0,1,1 1,1,0,0 1,0,0,1 0,1,1,0 ] (3) inlude all matries obtained by permuting the olumns of the 2 4 basis matries A 0 and A 1, respetively [10],[11]. The basi matries onsidered here are defined as follows: [ ] [ ] A 0 =,A = (4) 0101 If a seret pixel is white, i.e. r (i,j) = 1, then eah pixel in s 1 is equivalent to eah pixel in s 2, and thus, [s 1, s 2 ] T an be any member of set C 1. If a seret pixel is blak, i.e. r (i,j) = 0, then eah pixel in s 1 should omplement eah pixel in s 2 and thus, [s 1, s 2 ] T should be seleted from set C 0. The hoie of [s 1, s 2 ] T is guided by a random number generator, whih determines the random harater of the shares. The derypted blok is produed through a deryption funtion f d ( ). In the ase of the {2, 2}-sheme based on the basis matries of (4), f d ( ) an be defined as follows: { s1 for s y 2 2 = f d (s 1, s 2 )= 1 = s 2 (5) [0, 0, 0, 0] for s 1 s 2
4 A {k, n}-seret Sharing Sheme for Color Images 75 (a) (b) (e) () Fig. 3. Halftoning-based seret sharing of olor images: (a) original olor image, (b) halftone image obtained using Floyd-Steinberg filter [12], (,d) share images, (e) derypted, output image where s 1 =[s (u,v),s (u,v+1),s (u+1,v),s (u+1,v+1) ] S 1 and s 2 =[s (u,v),s s (u+1,v),s (u,v+1), (u+1,v+1) ] S 2, for u = 1, 3,..., 2K 1 1 and v = 1, 3,..., 2K 2 1, are 2 2 share bloks whih are used to reover the output blok y 2 2 = y (u,v),y (u,v+1),y (u+1,v),y (u+1,v+1) as s (u,v) or blak pixels desribed as [0, 0, 0, 0]. The appliation of a onventional {k, n}-vss sheme to a K 1 K 2 natural image requires halftoning [7],[10]. The image is first transformed into a K 1 K 2 halftone image by using the density of the net dots to simulate the intensity levels [12]. Applying the proedure for eah olor hannel of the original image ( Fig. 2a) independently, eah olor hannel of the halftone image (Fig. 2b) is a binary image and thus appropriate for the VSS. Assuming {2, 2}-VSS, the two olor shares obtained by the proedure are depited in Fig. 2,d. Figure 2e shows the 2K 1 2K 2 derypted image (result) obtained by staking the two shares together.
5 76 R. Luka, K.N. Plataniotis, and A.N. Venetsanopoulos Visual inspetion of both the original image ( Fig. 1a and Fig. 2a) and the reovered image (Fig. 1d and Fig. 2e) indiates that: i) the derypted image is darker, and ii) the input image is of quarter size ompared to the derypted output. Moreover, the derypted olor image depited in Fig. 2e ontains a number of olor artifats due to nature of the algorithm. To end this, the onventional {k, n}-threshold visual ryptography i) annot provide perfet reonstrution, either in terms of pixel intensity or spatial resolution, and ii) is not appropriate for real-time appliations. Figure 3 shows the images obtained using the onventional {2, 2}-seret sharing sheme applied to the image with the different olor senario ompared to Fig. 2. It an be again observed that the derypted image depited in Fig. 3e ontains shifted olors whih often prohibit orret pereption of fine image details. Is has to be mentioned that the halftoning-based {k, n}-visual seret sharing shemes are the most popular hoie for natural image seret sharing. Another seret sharing approah for olor images is based on mean olor-mixing [8]. However, this method is not appropriate for pratial appliations due to signifiant redution of olor gamut and the extreme inrease in the spatial resolution of the shares. Other works, e.g. [9],[13] deals with analytial onstrution of the seret sharing shemes for olor images. 3 {k, n}-color Seret Sharing Let x : Z 2 Z 3 be a K 1 K 2 Red-Green-Blue (RGB) olor image representing a two-dimensional matrix of the three-omponent olor vetors (pixels) x (i,j) = [x (i,j)1,x (i,j)2,x (i,j)3 ] loated at the spatial position (i, j), for i =1, 2,..., K 1 and j =1, 2,..., K 2. Assuming that desribes the olor hannel (i.e. = 1 for Red, = 2 for Green, and = 3 for Blue) and the olor omponent x (i,j) is oded with B bits allowing x (i,j) to take an integer value between 0 and 2 B 1, the olor vetor x (p,q) an be equivalently expressed in a binary form as follows: x (i,j) = B b=1 xb (i,j) 2B b (6) where x b (i,j) =[xb (i,j)1,xb (i,j)2,xb (i,j)3 ] {0, 1}3 denotes the binary vetor at the b-bit level, with b = 1 denoting the most signifiant bits (MSB). 3.1 Enryption If the -th omponent of the binary vetor x b (i,j) is white (xb (i,j) = 1), enryption is performed through [s 1, s 2 ] T C 1 replaing x b (i,j) by binary bloks s 1 and s 2 in eah of the two shares. Otherwise, the referene binary omponent is blak (x b (p,q) = 0), and enryption is defined via [s 1, s 2 ] T C 0. This forms an enryption funtion defined as follows: f e (x b (i,j) )= { [s1, s 2 ] T C 0 for x b (i,j) =0 [s 1, s 2 ] T C 1 for x b (i,j) =1 (7)
6 A {k, n}-seret Sharing Sheme for Color Images 77 (a) (b) () Fig. 4. Proposed {2, 2}-seret sharing sheme for olor images: (a) original olor image, (b,) share images, derypted, output image By replaing the binary omponents x b (i,j) with binary bloks s 1 and s 2 for one partiular b, the proess generates two 2K 1 2K 2 vetor-valued binary shares S1 b and S2, b respetively. A random number generator guides the hoie of [s b 1, s b 2] T and determines the random harater of S1 b and S2. b Thus, the proess modifies both the spatial orrelation between spatially neighboring binary vetors s b (u,v) = [s b (u,v)1,s b (u,v)2,s b (u,v)3 ] Sb 1 or s b (u,v) = [s b (u,v)1,s b (u,v)2,s b (u,v)3 ] Sb 1, for u = 1, 2,..., 2K 1 and v =1, 2,..., 2K 2, and the spetral orrelation among omponents s b (u,v) or s b (u,v), for =1, 2, 3, of the individual binary vetors s b (u,v) or s b (u,v), respetively. Bit-level staking of the enrypted bit-levels produes the olor vetors s (u,v) S 1 and s (u,v) S 2 as s (u,v) = B b=1 s b (u,v) 2B b and s (u,v) = B b=1 s b (u,v) 2B b (8) Due to random proessing taking plae at the bit-levels, S 1 and S 2 ontain only random, olor noise like information (Fig. 4b,). Sine enryption is realized in the deomposed binary vetor spae, no detetable relationship between the original olor vetors x (p,q) and the olor noise of S 1 or S 2 an be found in the RGB olor domain. This onsiderably inreases seurity and prevents unauthorized deryption through brute-fore enumeration. 3.2 Deryption The deryption proedure is designed to satisfy the perfet reonstrution property. The original olor data must be reovered from the olor shares S 1 and S 2 using inverse algorithmi steps. Therefore, the deryption proedure is applied to the deomposed binary vetor arrays of the olor shares. Assuming that (i, j), for i =1, 2,..., K 1 and j =1, 2,..., K 2, denotes the spatial position in the original image and denotes the olor hannel, the orresponding 2 2 binary share bloks are s b = {s b (2i 1,2j 1),s b (2i 1,2j),s b (2i,2j 1),s b (2i,2j) } and s b = {s b (2i 1,2j 1),s b (2i 1,2j),s b (2i,2j 1),s b (2i,2j)}. Based on the arrangements of the basis matries A 0 and A 1 in (4) used in the proposed {2, 2}-seret sharing
7 78 R. Luka, K.N. Plataniotis, and A.N. Venetsanopoulos (a) (b) () Fig. 5. Proposed {2, 2}-seret sharing sheme for olor images: (a) original olor image, (b,) share images, derypted, output image sheme, if both bloks are onsistent, i.e. s b = s b, the derypted original bit x b (i,j) is assign white, i.e. xb (i,j) = 1. Otherwise, the bloks are inonsistent, i.e. s b s b and the original bit is reovered as blak, i.e. x b (i,j) omparison forms the following deryption funtion x b (i,j) = f d(s b, s b )= { 1 for s b 0 for s b = s b s b = 0. This logial whih is used to restore the binary vetors x b (i,j). The proedure ompletes with the bit-level staking (6) resulting in the original olor vetor x (i,j). Figure 4d shows the derypted olor output. Sine the proposed method satisfies the perfet reonstrution property, the output image is idential to the original depited in Fig 4a. Note that perfet reonstrution is demonstrated also in Fig 5, whih depits two full olor shares (Fig 5b,) and the derypted output ( Fig 5d) obtained by the proposed {2, 2}-seret sharing sheme applied to the test image Atlas ( Fig 5a). It has to be mentioned that (9), whih is defined for a {2, 2}-sheme, an be more generally desribed as follows: { 1 for [s b, s b ] T C 1 o b (i,j) = f d(s b 1, s b 2)= 0 for [s b, s b ] T (10) C 0 This onept an be further generalized for the share bloks {s b, s b, s b,...} defined in the speifi {k, n}-threshold shemes. 4 Conlusion A {k, n} seret sharing sheme with perfet reonstrution of the olor inputs was introdued. The method ryptographially proesses the olor images replaing (9)
8 A {k, n}-seret Sharing Sheme for Color Images 79 the bit omponents with a blok of bits for eah of the n shares. By separate enrypting eah bit plane of the deomposed olor image, the method produes olor shares with varied spetral and spatial harateristis. Sine enryption is realized in the deomposed binary domain, the proedure inreases protetion against attaks performed in the RGB olor domain. This makes the method attrative for seure transmission over the untrusted publi hannel. Moreover, the perfet reonstrution property allows to reveal the original olor image without visual impairments or olor shifts. Referenes 1. Adhikari, A., Sikdar, S.: A new (2,n)-visual threshold sheme for olor images. Pro. INDOCRYPT 2003, LNCS 2904 (2003) Ateniese, G., Blundo, C, de Santis, A., Stinson, D.G.: Visual ryptography for general aess strutures. Information and Computation 129 (1996) Ateniese, G., Blundo, C, de Santis, A., Stinson, D.G.: Extended apabilities for visual ryptography. Theoretial Computer Siene 250 (2001) Droste, S.: New results on visual ryptography. Pro. Advanes in Cryptology - CRYPTO 96, LNCS 1109 (1996) Eisen, P.A., Stinson, D.R.: Threshold visual ryptography shemes with speified levels of reonstruted pixels. Design, Codes and Cryptography 25 (2002) Hofmeister, T., Krause, M., Simon, H.U.: Contrast optimal k out of n seret sharing shemes in visual ryptography. Theoretial Computer Siene 240 (2000) Hou, J.C.: Visual ryptography for olor images. Pattern Reognition 36 (2003) Ishihara, T., Koga, H.: A visual seret sharing sheme for olor images based on meanvalue-olor mixing. IEICE Trans. Fundamentals E86-A (2003) Koga, H., Iwamoto, M., Yakamoto, H.: An analyti onstrution of the visual seret sharing sheme for olor images. IEICE Trans. Fundamentals E84-A (2001) Lin, C.C., Tsai, W.H.: Visual ryptography for gray-level images by dithering tehniques. Pattern Reognition Letters 24 (2003) Naor, M., Shamir, A.: Visual Cryptography. Pro. EUROCRYPT 94, LNCS 950 (1994) Ulihney, R.A.: Dithering with blue noise. Proeedings of the IEEE 76 (1988) Yang, C.N.: A note on olor visual enryption. Journal of Information Siene and Engineering 18 (2002)
Australian Journal of Basic and Applied Sciences. A new Divide and Shuffle Based algorithm of Encryption for Text Message
ISSN:1991-8178 Australian Journal of Basi and Applied Sienes Journal home page: www.ajbasweb.om A new Divide and Shuffle Based algorithm of Enryption for Text Message Dr. S. Muthusundari R.M.D. Engineering
More informationA DYNAMIC ACCESS CONTROL WITH BINARY KEY-PAIR
Malaysian Journal of Computer Siene, Vol 10 No 1, June 1997, pp 36-41 A DYNAMIC ACCESS CONTROL WITH BINARY KEY-PAIR Md Rafiqul Islam, Harihodin Selamat and Mohd Noor Md Sap Faulty of Computer Siene and
More informationPipelined Multipliers for Reconfigurable Hardware
Pipelined Multipliers for Reonfigurable Hardware Mithell J. Myjak and José G. Delgado-Frias Shool of Eletrial Engineering and Computer Siene, Washington State University Pullman, WA 99164-2752 USA {mmyjak,
More informationAn Optimized Approach on Applying Genetic Algorithm to Adaptive Cluster Validity Index
IJCSES International Journal of Computer Sienes and Engineering Systems, ol., No.4, Otober 2007 CSES International 2007 ISSN 0973-4406 253 An Optimized Approah on Applying Geneti Algorithm to Adaptive
More informationA Novel Validity Index for Determination of the Optimal Number of Clusters
IEICE TRANS. INF. & SYST., VOL.E84 D, NO.2 FEBRUARY 2001 281 LETTER A Novel Validity Index for Determination of the Optimal Number of Clusters Do-Jong KIM, Yong-Woon PARK, and Dong-Jo PARK, Nonmembers
More informationGray Codes for Reflectable Languages
Gray Codes for Refletable Languages Yue Li Joe Sawada Marh 8, 2008 Abstrat We lassify a type of language alled a refletable language. We then develop a generi algorithm that an be used to list all strings
More informationAbstract. Key Words: Image Filters, Fuzzy Filters, Order Statistics Filters, Rank Ordered Mean Filters, Channel Noise. 1.
Fuzzy Weighted Rank Ordered Mean (FWROM) Filters for Mixed Noise Suppression from Images S. Meher, G. Panda, B. Majhi 3, M.R. Meher 4,,4 Department of Eletronis and I.E., National Institute of Tehnology,
More informationUnsupervised Stereoscopic Video Object Segmentation Based on Active Contours and Retrainable Neural Networks
Unsupervised Stereosopi Video Objet Segmentation Based on Ative Contours and Retrainable Neural Networks KLIMIS NTALIANIS, ANASTASIOS DOULAMIS, and NIKOLAOS DOULAMIS National Tehnial University of Athens
More informationDETECTION METHOD FOR NETWORK PENETRATING BEHAVIOR BASED ON COMMUNICATION FINGERPRINT
DETECTION METHOD FOR NETWORK PENETRATING BEHAVIOR BASED ON COMMUNICATION FINGERPRINT 1 ZHANGGUO TANG, 2 HUANZHOU LI, 3 MINGQUAN ZHONG, 4 JIAN ZHANG 1 Institute of Computer Network and Communiation Tehnology,
More informationNONLINEAR BACK PROJECTION FOR TOMOGRAPHIC IMAGE RECONSTRUCTION. Ken Sauer and Charles A. Bouman
NONLINEAR BACK PROJECTION FOR TOMOGRAPHIC IMAGE RECONSTRUCTION Ken Sauer and Charles A. Bouman Department of Eletrial Engineering, University of Notre Dame Notre Dame, IN 46556, (219) 631-6999 Shool of
More informationDr.Hazeem Al-Khafaji Dept. of Computer Science, Thi-Qar University, College of Science, Iraq
Volume 4 Issue 6 June 014 ISSN: 77 18X International Journal of Advaned Researh in Computer Siene and Software Engineering Researh Paper Available online at: www.ijarsse.om Medial Image Compression using
More informationFast Elliptic Curve Algorithm of Embedded Mobile Equipment
Send Orders for Reprints to reprints@benthamsiene.net 8 The Open Eletrial & Eletroni Engineering Journal, 0, 7, 8-4 Fast Ellipti Curve Algorithm of Embedded Mobile Equipment Open Aess Lihong Zhang *, Shuqian
More informationOn - Line Path Delay Fault Testing of Omega MINs M. Bellos 1, E. Kalligeros 1, D. Nikolos 1,2 & H. T. Vergos 1,2
On - Line Path Delay Fault Testing of Omega MINs M. Bellos, E. Kalligeros, D. Nikolos,2 & H. T. Vergos,2 Dept. of Computer Engineering and Informatis 2 Computer Tehnology Institute University of Patras,
More informationAlgorithms, Mechanisms and Procedures for the Computer-aided Project Generation System
Algorithms, Mehanisms and Proedures for the Computer-aided Projet Generation System Anton O. Butko 1*, Aleksandr P. Briukhovetskii 2, Dmitry E. Grigoriev 2# and Konstantin S. Kalashnikov 3 1 Department
More informationDynamic Algorithms Multiple Choice Test
3226 Dynami Algorithms Multiple Choie Test Sample test: only 8 questions 32 minutes (Real test has 30 questions 120 minutes) Årskort Name Eah of the following 8 questions has 4 possible answers of whih
More information1. Introduction. 2. The Probable Stope Algorithm
1. Introdution Optimization in underground mine design has reeived less attention than that in open pit mines. This is mostly due to the diversity o underground mining methods and omplexity o underground
More informationA Partial Sorting Algorithm in Multi-Hop Wireless Sensor Networks
A Partial Sorting Algorithm in Multi-Hop Wireless Sensor Networks Abouberine Ould Cheikhna Department of Computer Siene University of Piardie Jules Verne 80039 Amiens Frane Ould.heikhna.abouberine @u-piardie.fr
More informationBatch Auditing for Multiclient Data in Multicloud Storage
Advaned Siene and Tehnology Letters, pp.67-73 http://dx.doi.org/0.4257/astl.204.50. Bath Auditing for Multilient Data in Multiloud Storage Zhihua Xia, Xinhui Wang, Xingming Sun, Yafeng Zhu, Peng Ji and
More informationImage Steganography Scheme using Chaos and Fractals with the Wavelet Transform
International Journal of Innovation, Management and Tehnology, Vol. 3, o. 3, June Image Steganography Sheme using Chaos and Fratals with the Wavelet Transform Yue Wu and Joseph P. oonan bstrat This paper
More informationPerformance of Histogram-Based Skin Colour Segmentation for Arms Detection in Human Motion Analysis Application
World Aademy of Siene, Engineering and Tehnology 8 009 Performane of Histogram-Based Skin Colour Segmentation for Arms Detetion in Human Motion Analysis Appliation Rosalyn R. Porle, Ali Chekima, Farrah
More informationGraph-Based vs Depth-Based Data Representation for Multiview Images
Graph-Based vs Depth-Based Data Representation for Multiview Images Thomas Maugey, Antonio Ortega, Pasal Frossard Signal Proessing Laboratory (LTS), Eole Polytehnique Fédérale de Lausanne (EPFL) Email:
More informationA Novel Bit Level Time Series Representation with Implication of Similarity Search and Clustering
A Novel Bit Level Time Series Representation with Impliation of Similarity Searh and lustering hotirat Ratanamahatana, Eamonn Keogh, Anthony J. Bagnall 2, and Stefano Lonardi Dept. of omputer Siene & Engineering,
More informationRobust Dynamic Provable Data Possession
Robust Dynami Provable Data Possession Bo Chen Reza Curtmola Department of Computer Siene New Jersey Institute of Tehnology Newark, USA Email: b47@njit.edu, rix@njit.edu Abstrat Remote Data Cheking (RDC)
More informationAnalysis of input and output configurations for use in four-valued CCD programmable logic arrays
nalysis of input and output onfigurations for use in four-valued D programmable logi arrays J.T. utler H.G. Kerkhoff ndexing terms: Logi, iruit theory and design, harge-oupled devies bstrat: s in binary,
More informationFUZZY WATERSHED FOR IMAGE SEGMENTATION
FUZZY WATERSHED FOR IMAGE SEGMENTATION Ramón Moreno, Manuel Graña Computational Intelligene Group, Universidad del País Vaso, Spain http://www.ehu.es/winto; {ramon.moreno,manuel.grana}@ehu.es Abstrat The
More informationPartial Character Decoding for Improved Regular Expression Matching in FPGAs
Partial Charater Deoding for Improved Regular Expression Mathing in FPGAs Peter Sutton Shool of Information Tehnology and Eletrial Engineering The University of Queensland Brisbane, Queensland, 4072, Australia
More informationColor Image Fusion for Concealed Weapon Detection
In: E.M. Carapezza (Ed.), Sensors, and ommand, ontrol, ommuniations, and intelligene (C3I) tehnologies for homeland defense and law enforement II, SPIE-571 (pp. 372-379). Bellingham, WA., USA: The International
More informationThe Minimum Redundancy Maximum Relevance Approach to Building Sparse Support Vector Machines
The Minimum Redundany Maximum Relevane Approah to Building Sparse Support Vetor Mahines Xiaoxing Yang, Ke Tang, and Xin Yao, Nature Inspired Computation and Appliations Laboratory (NICAL), Shool of Computer
More informationHEXA: Compact Data Structures for Faster Packet Processing
Washington University in St. Louis Washington University Open Sholarship All Computer Siene and Engineering Researh Computer Siene and Engineering Report Number: 27-26 27 HEXA: Compat Data Strutures for
More informationA Load-Balanced Clustering Protocol for Hierarchical Wireless Sensor Networks
International Journal of Advanes in Computer Networks and Its Seurity IJCNS A Load-Balaned Clustering Protool for Hierarhial Wireless Sensor Networks Mehdi Tarhani, Yousef S. Kavian, Saman Siavoshi, Ali
More informationTime delay estimation of reverberant meeting speech: on the use of multichannel linear prediction
University of Wollongong Researh Online Faulty of Informatis - apers (Arhive) Faulty of Engineering and Information Sienes 7 Time delay estimation of reverberant meeting speeh: on the use of multihannel
More informationThreshold Visual Cryptography Scheme for Color Images with No Pixel Expansion
ISBN 978-952-5726-07-7 (Print), 978-952-5726-08-4 (CD-ROM) Proceedings of the Second Symposium International Computer Science and Computational Technology(ISCSCT 09) Huangshan, P. R. China, 26-28,Dec.
More information3-D IMAGE MODELS AND COMPRESSION - SYNTHETIC HYBRID OR NATURAL FIT?
3-D IMAGE MODELS AND COMPRESSION - SYNTHETIC HYBRID OR NATURAL FIT? Bernd Girod, Peter Eisert, Marus Magnor, Ekehard Steinbah, Thomas Wiegand Te {girod eommuniations Laboratory, University of Erlangen-Nuremberg
More informationChapter 2: Introduction to Maple V
Chapter 2: Introdution to Maple V 2-1 Working with Maple Worksheets Try It! (p. 15) Start a Maple session with an empty worksheet. The name of the worksheet should be Untitled (1). Use one of the standard
More informationOutline: Software Design
Outline: Software Design. Goals History of software design ideas Design priniples Design methods Life belt or leg iron? (Budgen) Copyright Nany Leveson, Sept. 1999 A Little History... At first, struggling
More informationLearning Convention Propagation in BeerAdvocate Reviews from a etwork Perspective. Abstract
CS 9 Projet Final Report: Learning Convention Propagation in BeerAdvoate Reviews from a etwork Perspetive Abstrat We look at the way onventions propagate between reviews on the BeerAdvoate dataset, and
More informationCA Privileged Identity Manager r12.x (CA ControlMinder) Implementation Proven Professional Exam (CAT-480) Study Guide Version 1.5
Proven Professional Exam (CAT-480) Study Guide Version 1.5 PROPRIETARY AND CONFIDENTIAL INFORMATION 2016 CA. All rights reserved. CA onfidential & proprietary information. For CA, CA Partner and CA Customer
More informationSimulation of Crystallographic Texture and Anisotropie of Polycrystals during Metal Forming with Respect to Scaling Aspects
Raabe, Roters, Wang Simulation of Crystallographi Texture and Anisotropie of Polyrystals during Metal Forming with Respet to Saling Aspets D. Raabe, F. Roters, Y. Wang Max-Plank-Institut für Eisenforshung,
More informationMachine Vision. Laboratory Exercise Name: Student ID: S
Mahine Vision 521466S Laoratory Eerise 2011 Name: Student D: General nformation To pass these laoratory works, you should answer all questions (Q.y) with an understandale handwriting either in English
More informationExtracting Partition Statistics from Semistructured Data
Extrating Partition Statistis from Semistrutured Data John N. Wilson Rihard Gourlay Robert Japp Mathias Neumüller Department of Computer and Information Sienes University of Strathlyde, Glasgow, UK {jnw,rsg,rpj,mathias}@is.strath.a.uk
More informationEstablishing Secure Ethernet LANs Using Intelligent Switching Hubs in Internet Environments
Establishing Seure Ethernet LANs Using Intelligent Swithing Hubs in Internet Environments WOEIJIUNN TSAUR AND SHIJINN HORNG Department of Eletrial Engineering, National Taiwan University of Siene and Tehnology,
More informationMeasurement of the stereoscopic rangefinder beam angular velocity using the digital image processing method
Measurement of the stereosopi rangefinder beam angular veloity using the digital image proessing method ROMAN VÍTEK Department of weapons and ammunition University of defense Kouniova 65, 62 Brno CZECH
More informationBoosted Random Forest
Boosted Random Forest Yohei Mishina, Masamitsu suhiya and Hironobu Fujiyoshi Department of Computer Siene, Chubu University, 1200 Matsumoto-ho, Kasugai, Aihi, Japan {mishi, mtdoll}@vision.s.hubu.a.jp,
More informationAlgorithms for External Memory Lecture 6 Graph Algorithms - Weighted List Ranking
Algorithms for External Memory Leture 6 Graph Algorithms - Weighted List Ranking Leturer: Nodari Sithinava Sribe: Andi Hellmund, Simon Ohsenreither 1 Introdution & Motivation After talking about I/O-effiient
More informationCross-layer Resource Allocation on Broadband Power Line Based on Novel QoS-priority Scheduling Function in MAC Layer
Communiations and Networ, 2013, 5, 69-73 http://dx.doi.org/10.4236/n.2013.53b2014 Published Online September 2013 (http://www.sirp.org/journal/n) Cross-layer Resoure Alloation on Broadband Power Line Based
More informationCleanUp: Improving Quadrilateral Finite Element Meshes
CleanUp: Improving Quadrilateral Finite Element Meshes Paul Kinney MD-10 ECC P.O. Box 203 Ford Motor Company Dearborn, MI. 8121 (313) 28-1228 pkinney@ford.om Abstrat: Unless an all quadrilateral (quad)
More informationCapturing Large Intra-class Variations of Biometric Data by Template Co-updating
Capturing Large Intra-lass Variations of Biometri Data by Template Co-updating Ajita Rattani University of Cagliari Piazza d'armi, Cagliari, Italy ajita.rattani@diee.unia.it Gian Lua Marialis University
More informationA Dictionary based Efficient Text Compression Technique using Replacement Strategy
A based Effiient Text Compression Tehnique using Replaement Strategy Debashis Chakraborty Assistant Professor, Department of CSE, St. Thomas College of Engineering and Tehnology, Kolkata, 700023, India
More informationImproved Circuit-to-CNF Transformation for SAT-based ATPG
Improved Ciruit-to-CNF Transformation for SAT-based ATPG Daniel Tille 1 René Krenz-Bååth 2 Juergen Shloeffel 2 Rolf Drehsler 1 1 Institute of Computer Siene, University of Bremen, 28359 Bremen, Germany
More informationCluster-Based Cumulative Ensembles
Cluster-Based Cumulative Ensembles Hanan G. Ayad and Mohamed S. Kamel Pattern Analysis and Mahine Intelligene Lab, Eletrial and Computer Engineering, University of Waterloo, Waterloo, Ontario N2L 3G1,
More informationDetection and Recognition of Non-Occluded Objects using Signature Map
6th WSEAS International Conferene on CIRCUITS, SYSTEMS, ELECTRONICS,CONTROL & SIGNAL PROCESSING, Cairo, Egypt, De 9-31, 007 65 Detetion and Reognition of Non-Oluded Objets using Signature Map Sangbum Park,
More informationWe P9 16 Eigenray Tracing in 3D Heterogeneous Media
We P9 Eigenray Traing in 3D Heterogeneous Media Z. Koren* (Emerson), I. Ravve (Emerson) Summary Conventional two-point ray traing in a general 3D heterogeneous medium is normally performed by a shooting
More informationEvolutionary Feature Synthesis for Image Databases
Evolutionary Feature Synthesis for Image Databases Anlei Dong, Bir Bhanu, Yingqiang Lin Center for Researh in Intelligent Systems University of California, Riverside, California 92521, USA {adong, bhanu,
More informationSystem-Level Parallelism and Throughput Optimization in Designing Reconfigurable Computing Applications
System-Level Parallelism and hroughput Optimization in Designing Reonfigurable Computing Appliations Esam El-Araby 1, Mohamed aher 1, Kris Gaj 2, arek El-Ghazawi 1, David Caliga 3, and Nikitas Alexandridis
More informationPlot-to-track correlation in A-SMGCS using the target images from a Surface Movement Radar
Plot-to-trak orrelation in A-SMGCS using the target images from a Surfae Movement Radar G. Golino Radar & ehnology Division AMS, Italy ggolino@amsjv.it Abstrat he main topi of this paper is the formulation
More informationA Coarse-to-Fine Classification Scheme for Facial Expression Recognition
A Coarse-to-Fine Classifiation Sheme for Faial Expression Reognition Xiaoyi Feng 1,, Abdenour Hadid 1 and Matti Pietikäinen 1 1 Mahine Vision Group Infoteh Oulu and Dept. of Eletrial and Information Engineering
More informationFuzzy Meta Node Fuzzy Metagraph and its Cluster Analysis
Journal of Computer Siene 4 (): 9-97, 008 ISSN 549-3636 008 Siene Publiations Fuzzy Meta Node Fuzzy Metagraph and its Cluster Analysis Deepti Gaur, Aditya Shastri and Ranjit Biswas Department of Computer
More informationFlow Demands Oriented Node Placement in Multi-Hop Wireless Networks
Flow Demands Oriented Node Plaement in Multi-Hop Wireless Networks Zimu Yuan Institute of Computing Tehnology, CAS, China {zimu.yuan}@gmail.om arxiv:153.8396v1 [s.ni] 29 Mar 215 Abstrat In multi-hop wireless
More informationFOREGROUND OBJECT EXTRACTION USING FUZZY C MEANS WITH BIT-PLANE SLICING AND OPTICAL FLOW
FOREGROUND OBJECT EXTRACTION USING FUZZY C EANS WITH BIT-PLANE SLICING AND OPTICAL FLOW SIVAGAI., REVATHI.T, JEGANATHAN.L 3 APSG, SCSE, VIT University, Chennai, India JRF, DST, Dehi, India. 3 Professor,
More informationSimultaneous image orientation in GRASS
Simultaneous image orientation in GRASS Alessandro BERGAMINI, Alfonso VITTI, Paolo ATELLI Dipartimento di Ingegneria Civile e Ambientale, Università degli Studi di Trento, via Mesiano 77, 38 Trento, tel.
More information(2, n)-visual Cryptographic Schemes For Color Images With Low Pixel Expansion
(2, n)-visual Cryptographic Schemes For Color Images With Low Pixel Expansion Bhaswar B. Bhattacharya, Abhishek Chakrabortty, Shirshendu Ganguly, Shyamalendu Sinha Indian Statistical Institute, Kolkata
More informationReduced-Complexity Column-Layered Decoding and. Implementation for LDPC Codes
Redued-Complexity Column-Layered Deoding and Implementation for LDPC Codes Zhiqiang Cui 1, Zhongfeng Wang 2, Senior Member, IEEE, and Xinmiao Zhang 3 1 Qualomm In., San Diego, CA 92121, USA 2 Broadom Corp.,
More informationComprehensive Quantification of Signal-to-Noise Ratio and g-factor for Image-Based and k-space-based Parallel Imaging Reconstructions
Magneti Resonane in Mediine 60:895 907 (2008) Comprehensive Quantifiation of Signal-to-Noise Ratio and g-fator for Image-Based and k-spae-based Parallel Imaging Reonstrutions Philip M. Robson, 1 * Aaron
More informationAcoustic Links. Maximizing Channel Utilization for Underwater
Maximizing Channel Utilization for Underwater Aousti Links Albert F Hairris III Davide G. B. Meneghetti Adihele Zorzi Department of Information Engineering University of Padova, Italy Email: {harris,davide.meneghetti,zorzi}@dei.unipd.it
More informationSelf-Adaptive Parent to Mean-Centric Recombination for Real-Parameter Optimization
Self-Adaptive Parent to Mean-Centri Reombination for Real-Parameter Optimization Kalyanmoy Deb and Himanshu Jain Department of Mehanial Engineering Indian Institute of Tehnology Kanpur Kanpur, PIN 86 {deb,hjain}@iitk.a.in
More informationComparison of Zero Knowledge Authentication Protocols SUBHASISH PARAMANIK (110CS0371)
NATIONAL INSTITUTE OF TECHNOLOGY ROURKELA Comparison of Zero Knowledge Authentiation Protools By SUBHASISH PARAMANIK (110CS0371) A THESIS SUBMITTED IN PARTIAL FULFILMENT OF THE REQUIREMENTS FOR THE DEGREE
More informationApproximate logic synthesis for error tolerant applications
Approximate logi synthesis for error tolerant appliations Doohul Shin and Sandeep K. Gupta Eletrial Engineering Department, University of Southern California, Los Angeles, CA 989 {doohuls, sandeep}@us.edu
More informationC 2 C 3 C 1 M S. f e. e f (3,0) (0,1) (2,0) (-1,1) (1,0) (-1,0) (1,-1) (0,-1) (-2,0) (-3,0) (0,-2)
SPECIAL ISSUE OF IEEE TRANSACTIONS ON ROBOTICS AND AUTOMATION: MULTI-ROBOT SSTEMS, 00 Distributed reonfiguration of hexagonal metamorphi robots Jennifer E. Walter, Jennifer L. Welh, and Nany M. Amato Abstrat
More informationPreliminary investigation of multi-wavelet denoising in partial discharge detection
Preliminary investigation of multi-wavelet denoising in partial disharge detetion QIAN YONG Department of Eletrial Engineering Shanghai Jiaotong University 8#, Donghuan Road, Minhang distrit, Shanghai
More informationGradient based progressive probabilistic Hough transform
Gradient based progressive probabilisti Hough transform C.Galambos, J.Kittler and J.Matas Abstrat: The authors look at the benefits of exploiting gradient information to enhane the progressive probabilisti
More informationALPHA-TRIMMED MEAN RADIAL BASIS FUNCTIONS AND THEIR APPLICATION IN OBJECT MODELING
ALPHA-TRIMMED MEAN RADIAL BASIS FUNCTIONS AND THEIR APPLICATION IN OBJECT MODELING Adrian G. Boq Ioannis Pitas Department University Thessaloniki of Informatis of Thessaloniki 54006, Greee ABSTRACT In
More informationWe don t need no generation - a practical approach to sliding window RLNC
We don t need no generation - a pratial approah to sliding window RLNC Simon Wunderlih, Frank Gabriel, Sreekrishna Pandi, Frank H.P. Fitzek Deutshe Telekom Chair of Communiation Networks, TU Dresden, Dresden,
More informationthe data. Structured Principal Component Analysis (SPCA)
Strutured Prinipal Component Analysis Kristin M. Branson and Sameer Agarwal Department of Computer Siene and Engineering University of California, San Diego La Jolla, CA 9193-114 Abstrat Many tasks involving
More informationA Dual-Hamiltonian-Path-Based Multicasting Strategy for Wormhole-Routed Star Graph Interconnection Networks
A Dual-Hamiltonian-Path-Based Multiasting Strategy for Wormhole-Routed Star Graph Interonnetion Networks Nen-Chung Wang Department of Information and Communiation Engineering Chaoyang University of Tehnology,
More informationRecursion examples: Problem 2. (More) Recursion and Lists. Tail recursion. Recursion examples: Problem 2. Recursion examples: Problem 3
Reursion eamples: Problem 2 (More) Reursion and s Reursive funtion to reverse a string publi String revstring(string str) { if(str.equals( )) return str; return revstring(str.substring(1, str.length()))
More informationDrawing lines. Naïve line drawing algorithm. drawpixel(x, round(y)); double dy = y1 - y0; double dx = x1 - x0; double m = dy / dx; double y = y0;
Naïve line drawing algorithm // Connet to grid points(x0,y0) and // (x1,y1) by a line. void drawline(int x0, int y0, int x1, int y1) { int x; double dy = y1 - y0; double dx = x1 - x0; double m = dy / dx;
More informationAn Alternative Approach to the Fuzzifier in Fuzzy Clustering to Obtain Better Clustering Results
An Alternative Approah to the Fuzziier in Fuzzy Clustering to Obtain Better Clustering Results Frank Klawonn Department o Computer Siene University o Applied Sienes BS/WF Salzdahlumer Str. 46/48 D-38302
More information- 1 - S 21. Directory-based Administration of Virtual Private Networks: Policy & Configuration. Charles A Kunzinger.
- 1 - S 21 Diretory-based Administration of Virtual Private Networks: Poliy & Configuration Charles A Kunzinger kunzinge@us.ibm.om - 2 - Clik here Agenda to type page title What is a VPN? What is VPN Poliy?
More informationA PROTOTYPE OF INTELLIGENT VIDEO SURVEILLANCE CAMERAS
INTERNATIONAL JOURNAL OF INFORMATION AND SYSTEMS SCIENCES Volume 1, 3, Number 1, 3, Pages 1-22 365-382 2007 Institute for Sientifi Computing and Information A PROTOTYPE OF INTELLIGENT VIDEO SURVEILLANCE
More informationCalculation of typical running time of a branch-and-bound algorithm for the vertex-cover problem
Calulation of typial running time of a branh-and-bound algorithm for the vertex-over problem Joni Pajarinen, Joni.Pajarinen@iki.fi Otober 21, 2007 1 Introdution The vertex-over problem is one of a olletion
More informationA Unified Subdivision Scheme for Polygonal Modeling
EUROGRAPHICS 2 / A. Chalmers and T.-M. Rhyne (Guest Editors) Volume 2 (2), Number 3 A Unified Subdivision Sheme for Polygonal Modeling Jérôme Maillot Jos Stam Alias Wavefront Alias Wavefront 2 King St.
More information特集 Road Border Recognition Using FIR Images and LIDAR Signal Processing
デンソーテクニカルレビュー Vol. 15 2010 特集 Road Border Reognition Using FIR Images and LIDAR Signal Proessing 高木聖和 バーゼル ファルディ Kiyokazu TAKAGI Basel Fardi ヘンドリック ヴァイゲル Hendrik Weigel ゲルド ヴァニーリック Gerd Wanielik This paper
More informationParallelization and Performance of 3D Ultrasound Imaging Beamforming Algorithms on Modern Clusters
Parallelization and Performane of 3D Ultrasound Imaging Beamforming Algorithms on Modern Clusters F. Zhang, A. Bilas, A. Dhanantwari, K.N. Plataniotis, R. Abiprojo, and S. Stergiopoulos Dept. of Eletrial
More informationAdobe Certified Associate
Adobe Certified Assoiate About the Adobe Certified Assoiate (ACA) Program The Adobe Certified Assoiate (ACA) program is for graphi designers, Web designers, video prodution designers, and digital professionals
More informationAbstract. We describe a parametric hybrid Bezier patch that, in addition. schemes are local in that changes to part of the data only aect portions of
A Parametri Hyrid Triangular Bezier Path Stephen Mann and Matthew Davidhuk Astrat. We desrie a parametri hyrid Bezier path that, in addition to lending interior ontrol points, lends oundary ontrol points.
More informationColouring contact graphs of squares and rectilinear polygons de Berg, M.T.; Markovic, A.; Woeginger, G.
Colouring ontat graphs of squares and retilinear polygons de Berg, M.T.; Markovi, A.; Woeginger, G. Published in: nd European Workshop on Computational Geometry (EuroCG 06), 0 Marh - April, Lugano, Switzerland
More informationDynamic Backlight Adaptation for Low Power Handheld Devices 1
Dynami Baklight Adaptation for ow Power Handheld Devies 1 Sudeep Pasriha, Manev uthra, Shivajit Mohapatra, Nikil Dutt and Nalini Venkatasubramanian 444, Computer Siene Building, Shool of Information &
More informationBioTechnology. An Indian Journal FULL PAPER. Trade Science Inc. Improvement of low illumination image enhancement algorithm based on physical mode
[Type text] [Type text] [Type text] ISSN : 0974-7435 Volume 10 Issue 22 BioTehnology 2014 An Indian Journal FULL PAPER BTAIJ, 10(22), 2014 [13995-14001] Improvement of low illumination image enhanement
More informationCA Agile Requirements Designer 2.x Implementation Proven Professional Exam (CAT-720) Study Guide Version 1.0
Exam (CAT-720) Study Guide Version 1.0 PROPRIETARY AND CONFIDENTIAL INFORMATION 2017 CA. All rights reserved. CA onfidential & proprietary information. For CA, CA Partner and CA Customer use only. No unauthorized
More informationNew Fuzzy Object Segmentation Algorithm for Video Sequences *
JOURNAL OF INFORMATION SCIENCE AND ENGINEERING 24, 521-537 (2008) New Fuzzy Obet Segmentation Algorithm for Video Sequenes * KUO-LIANG CHUNG, SHIH-WEI YU, HSUEH-JU YEH, YONG-HUAI HUANG AND TA-JEN YAO Department
More informationCell Projection of Convex Polyhedra
Volume Graphis (2003) I. Fujishiro, K. Mueller, A. Kaufman (Editors) Cell Projetion of Convex Polyhedra Stefan Roettger and Thomas Ertl Visualization and Interative Systems Group University of Stuttgart
More informationCA Test Data Manager 4.x Implementation Proven Professional Exam (CAT-681) Study Guide Version 1.0
Implementation Proven Professional Study Guide Version 1.0 PROPRIETARY AND CONFIDENTIAL INFORMATION 2017 CA. All rights reserved. CA onfidential & proprietary information. For CA, CA Partner and CA Customer
More informationCA Release Automation 5.x Implementation Proven Professional Exam (CAT-600) Study Guide Version 1.1
Exam (CAT-600) Study Guide Version 1.1 PROPRIETARY AND CONFIDENTIAL INFORMATION 2016 CA. All rights reserved. CA onfidential & proprietary information. For CA, CA Partner and CA Customer use only. No unauthorized
More informationCluster-based Cooperative Communication with Network Coding in Wireless Networks
Cluster-based Cooperative Communiation with Network Coding in Wireless Networks Zygmunt J. Haas Shool of Eletrial and Computer Engineering Cornell University Ithaa, NY 4850, U.S.A. Email: haas@ee.ornell.edu
More informationSparse Certificates for 2-Connectivity in Directed Graphs
Sparse Certifiates for 2-Connetivity in Direted Graphs Loukas Georgiadis Giuseppe F. Italiano Aikaterini Karanasiou Charis Papadopoulos Nikos Parotsidis Abstrat Motivated by the emergene of large-sale
More informationarxiv: v1 [cs.db] 13 Sep 2017
An effiient lustering algorithm from the measure of loal Gaussian distribution Yuan-Yen Tai (Dated: May 27, 2018) In this paper, I will introdue a fast and novel lustering algorithm based on Gaussian distribution
More informationVideo Data and Sonar Data: Real World Data Fusion Example
14th International Conferene on Information Fusion Chiago, Illinois, USA, July 5-8, 2011 Video Data and Sonar Data: Real World Data Fusion Example David W. Krout Applied Physis Lab dkrout@apl.washington.edu
More informationVolume 3, Issue 9, September 2013 International Journal of Advanced Research in Computer Science and Software Engineering
Volume 3, Issue 9, September 2013 ISSN: 2277 128X International Journal of Advaned Researh in Computer Siene and Software Engineering Researh Paper Available online at: www.ijarsse.om A New-Fangled Algorithm
More informationImproved Vehicle Classification in Long Traffic Video by Cooperating Tracker and Classifier Modules
Improved Vehile Classifiation in Long Traffi Video by Cooperating Traker and Classifier Modules Brendan Morris and Mohan Trivedi University of California, San Diego San Diego, CA 92093 {b1morris, trivedi}@usd.edu
More informationOne Against One or One Against All : Which One is Better for Handwriting Recognition with SVMs?
One Against One or One Against All : Whih One is Better for Handwriting Reognition with SVMs? Jonathan Milgram, Mohamed Cheriet, Robert Sabourin To ite this version: Jonathan Milgram, Mohamed Cheriet,
More information