Research Article Improved Encrypted-Signals-Based Reversible Data Hiding Using Code Division Multiplexing and Value Expansion

Size: px
Start display at page:

Download "Research Article Improved Encrypted-Signals-Based Reversible Data Hiding Using Code Division Multiplexing and Value Expansion"

Transcription

1 Securty and Communcaton Networks Volume 2018, Artcle ID , 9 pages Research Artcle Improved Encrypted-Sgnals-Based Reversble Data Hdng Usng Code Dvson Multplexng and Value Expanson Xany Chen, Hadong Zhong, Lzh Xong, and Zhhua Xa Jangsu Engneerng Center of Network Montorng, Jangsu Collaboratve Innovaton Center on Atmospherc Envronment and Equpment Technology, School of Computer and Software, Nanjng Unversty of Informaton Scence and Technology, Nanjng , Chna Correspondence should be addressed to Zhhua Xa; xa zhhua@163.com Receved 28 September 2017; Revsed 1 December 2017; Accepted 21 January 2018; Publshed 15 February 2018 Academc Edtor: Rém Cogranne Copyrght 2018 Xany Chen et al. Ths s an open access artcle dstrbuted under the Creatve Commons Attrbuton Lcense, whch permts unrestrcted use, dstrbuton, and reproducton n any medum, provded the orgnal work s properly cted. Compared to the encrypted-mage-based reversble data hdng (EIRDH) method, the encrypted-sgnals-based reversble data hdng (ESRDH) technque s a novel way to acheve a greater embeddng rate and better qualty of the decrypted sgnals. Motvated by ESRDH usng sgnal energy transfer, we propose an mproved ESRDH method usng code dvson multplexng and value expanson. At the begnnng, each pxel of the orgnal mage s dvded nto several parts contanng a lttle sgnal and multple equal sgnals. Next, all sgnals are encrypted by Paller encrypton. And then a large number of secret bts are embedded nto the encrypted sgnals usng code dvson multplexng and value expanson. Snce the sum of elements n any spreadng sequence s equal to 0, lossless qualty of drectly decrypted sgnals can be acheved usng code dvson multplexng on the encrypted equal sgnals. Although the vsual qualty s reduced, hgh-capacty data hdng can be accomplshed by conductng value expanson on the encrypted lttle sgnal. The expermental results show that our method s better than other methods n terms of the embeddng rate and average PSNR. 1. Introducton Encrypton and data hdng are two common approaches for protectng aganst nformaton leakage [1 3]; the former s used to protect the content tself [4], whereas the latter s used to protect the hdden data [5]. Whle t s a problem for senstve applcatons, such as mltary mages and medcal mages, reversble data hdng (RDH) s an effectve method for these specal scenaros, whch ams to recover both embedded data and the orgnal mage. In the past two decades, many classc RDH algorthms have been proposed, such as lossless mage compresson-based methods [6], dfference expanson- (DE-) based methods [7], hstogram shftng- (HS-) based methods [8], nteger-to-nteger transform-based methods [9], and dual-mage-based methods [10]. However, wth the popularty of outsourced storage servces [11, 12], the tradtonal RDH s not sutable n these scenaros, especally wth regard to the requrement of hgh securty. Therefore, the research of prvacy protecton n cloud computng has attracted consderable attenton n recent years [13 15]. Among these studes, encrypted-magebased reversble data hdng (EIRDH) provdes the possblty that the mage owner can encrypt the mage before uploadng t to the servce provder, and then the servce provder can embed some addtonal message nto the ncomprehensble encrypted mage for steganography or authentcaton. The authorzed users or recevers can recover both the addtonal message and the orgnal mage. The exstng EIRDH methods can be grouped nto three categores: vacatng room after encrypton (VRAE) methods [16 22], reservng room before encrypton (RRBE) methods [23 25], and reversble mage transform (RIT) methods [26, 27]. The framework of VRAE was proposed by Zhang [18], n whch secret bts can be embedded after encryptng the orgnal mage. Specfcally, the data hder can dvde the encrypted mage block nto two sets and embed secret bts by flppng three LSBs of a set. To decrease the extracted-bts error rate, Hong et al. [19] and Lao and Shu [20] evaluated the complexty of mage blocks. Recently,

2 2 Securty and Communcaton Networks Y and Zhou [21] proposed a novel EIRDH method usng bnary-block embeddng for jont decrypton and extracton, n whch a bt-level scramblng process can prevent secret bts from loss. The methods [18 21] can embed an addtonal message from the decrypted mage. To extract secret bts n the encrypted mage, Zhang [22] proposed a novel separable EIRDH method, n whch three cases are consdered accordng to the encrypton key or data hdng key. However, t s hard to use the tradtonal RDH method for the data hder n the VRAE snce the correlaton between neghbor pxels n the encrypted mage s destroyed. The framework of RRBE was desgned by Ma et al. [23]. The data owner can reverse the room of LSBs usng the tradtonal RDH method and then encrypt the self-embedded mage. After that, the data hder embeds secret data nto the reversed LSBs of the encrypted mage. Cao et al. [24] compressed pxels n the local patch by sparse representaton and acheved a hgher reversed room than other prevous methods. To transform the orgnal mage nto an encrypted mage whch looks lke the target mage, Zhang et al. [26] proposed the EIRDH framework based on RIT, n whch an mage block s pared by smlar means and standard devaton between the orgnal and target mages. Snce the correlaton of transformed mages s not destroyed, the data hder can embed secret bts by the tradtonal RDH method. However, ths method has hgh mage dstorton snce much auxlary nformaton must be self-embedded nto the transformed mage for recoverng the orgnal mage. Recently, Hou et al. [27] mproved the vsual qualty of camouflage mages and reduced the auxlary nformaton for recordng block ndexes by adoptng k-means clusterng. Dfferent from the EIRDH, Chen et al. [28] desgned an encrypted-sgnals-based reversble data hdng (ESRDH) method, n whch the data owner dvdes each pxel of the cover mage nto two sgnals and then encrypts them by a publc key. After that, the data hder embeds secret bts nto the encrypted sgnals by the addtve homomorphsm. To reduce data expanson, Shu et al. [29] adopted a dfference expanson method to embed the message. Zhang et al. [30] proposed a lossless, a reversble, and a combned data hdng scheme for cphertext mages, respectvely, whch wereencryptedbyapublckeycryptosystemwthhomomorphc propertes. Recently, Wu et al. [31] presented an mproved ESRDH method, n whch the orgnal mage canberecoveredcompletelybydecryptngallsgnals.the method can acheve a hgher embeddng capacty and better qualty of decrypted mages than prevous ESRDH methods. In addton, compared to the tradtonal EIRDH method, the cost spent, on a relable key management system n a multparty envronment, s reduced snce the recever can share the publc key wth other denttes. Inthspaper,weproposeanmprovedESRDHmethod usng code dvson multplexng (CDM) and value expanson (VE), n whch the tradtonal CDM technology s utlzed to acheve lossless vsual qualty of decrypted sgnals, and VE technology s desgned accordng to the RDH method based on DE for further ncreasng the embeddng capacty. Compared to the current ESRDH method, the proposed method acheves a hgh embeddng capacty and good vsual qualty. Therestofthspapersarrangedasfollows.InSecton2, the related works are descrbed. In partcular, communcaton technologybasedoncdm,rdhmethodbasedonde,and ESRDH method based on sgnal energy transfer are gven. Secton 3 presents a lossless vsual qualty ESRDH method usng code dvson multplexng and hgh embeddng capacty ESRDH method usng value expanson. Secton 4 dsplays the performance of the proposed method by expermental results and Secton 5 concludes ths paper. 2. Related Works 2.1. Communcaton Technology Based on CDM. In communcaton systems, CDM s a knd of spectrum spreadng technology for ensurng secure nformaton transmsson and channel multplexng, n whch the sender encodes to-betransmtted bts wth a predetermned spreadng sequence, and then the recever can obtan the secret bts by the same spreadng sequences. So, the sequences that are derved by Walsh Hadamard matrx play an mportant role n CDMbased communcaton technology. Walsh Hadamard matrx conssts of 1 and 1. In addton to the frst row (column) of the matrx, other row (column) vectors are selected as the spreadng sequences, and they have two propertes. Frst, the sum of elements s equal to 0 for any sequence. Second, they are orthogonal to each other of any two dfferent sequences, so the cross-correlaton s 0. Suppose the spreadng sequences generated by Walsh Hadamard matrx are S z, z = 1,...,q} and the compound sequence C s the lnear combnaton of S z ; when the secret bt s 0, the coeffcent of S z s set as 1. Otherwse, the coeffcent s set as 1. Thus, the recever can decode the secret bts accordng to the results of dot product between S z and C. For example, three spreadng sequences from a 4-level Hadamard matrx ares 1 = (1, 1, 1, 1), S 2 = (1, 1, 1, 1), and S 3 = (1, 1, 1, 1). Obvously,S 1, S 2,andS 3 are zero means and orthogonal to each other. Suppose the secret bts are 010 ;then,thesequencesaredenotedass 1, S 2,andS 3, respectvely, and the three sequences are added to form the compound sequence C=S 1 S 2 +S 3 =(1, 3,1,1). On the recever sde, for the recever wth the spreadng sequence S 1, the decodng result s (C S 1 )/ S 1 2 = ((S 1 S 2 + S 3 ) S 1 )/ S 1 2 =(S 1 S 1 )/ S 1 2 =1, whch represents the noton that the secret bt s 1; for the recever wth S 2,theresults (C S 2 )/ S 2 2 =( S 2 S 2 )/ S 2 2 = 1, whch represents bt 0; for the recever wth S 3,theresults(C S 3 )/ S 3 2 =(S 3 S 3 )/ S 3 2 =1, whch represents bt 1. Therefore, the secret bts can be extracted. Moreover, snce a large number of secret bts are represented and transmtted by the compound sequences n dfferent ways and t s mpossble for an ntruder to guess them, the CDM-based communcaton technology s secure and can provde hgh capacty RDH Method Based on DE. The RDH method based on DEwasproposedbyTan.Assumethetwoneghborpxelsof

3 Securty and Communcaton Networks 3 O Raster scan Cover Preprocess Orgnal unt Encrypt Encrypted unt pxel p (a 0,a 1,t ) (E(a 0 ),E(a 1 ),E(t )) H Marked unt (E(a 0 ),E(a 1 ),E(t )) Embed secret bt b Encrypted unt (E(a 0 ),E(a 1 ),E(t )) If b=0, E(a0 ) =E( 1);E(a 1 ) =E(a 0) E(a 1 ) E( 1); If b=1, E(a0 ) =E(a 0) E(a 1 ) E( 1);E(a1 ) =E( 1). R Marked unt Decrypt Decrypted unt Extract (E (a 0 ),E(a 1 ),E(t )) (a 0,a 1,t ) secret bt b If a 0 <a 1,b= 0 If a 0 >a 1,b= 1 Fgure 1: The framework of ESRDH method based on sgnal energy transfer. the mage are x and y. The sender can compute the average m and the dfference h between x and y: m= x+y, 2 h=x y. Then, the secret bt b canbeembeddedastheleastsgnfcant bt (lsb) of h. And the new dfference value h can be obtaned: (1) h =2h+b. (2) Fnally, the correspondng values x and y canbecomputed and transmtted by the sender: x =m+ h +1, 2 y =m h 2. From the pxels par (x,y ), the recever can extract secret bts and recover the orgnal mage. The ntal average value m and new dfference value h canbecomputed: m= x +y, 2 h =x y. (3) (4) The secret bt b and dfference value h canbeobtanedbyh : b=lsb (h ), h= h 2. (5) And the orgnal par (x, y) can be recovered by m and h: x=m+ h+1 2, y=m h 2. (6) DE s a smple and effcent RDH method that utlzes the redundancy between two neghbor pxels to embed secret bts and acheve reversblty. In addton, we can use the data-embeddng algorthm for an mage more than once for multple-layer embeddng. When the dfference s small, a hgher embeddng capacty and better vsual qualty of thecovermagecanbeacheved.however,thetransformed values x and y should be restrcted n the range of [0, 255] ESRDH Method Based on Sgnal Energy Transfer. ESRDH method based on sgnal energy transfer was proposed by Wu et al. It conssts of three phases: mage encrypton phase, dataembeddng phase, and data extracton and mage recovery phase. There are three actve denttes n ths method. They are mage owner O, data hder H, and recever R. The framework of ths method s descrbed n Fgure 1.

4 4 Securty and Communcaton Networks SupposetheszeofthecovermagesN 1 N 2 and the pxel s p [0, 255], 1 N 1 N 2.Inspredbythesgnal energy transfer, one sgnal can be represented by the sum of other sgnals. Therefore, p can be represented as a 0 +a 1 + t,wherea 0 s selected randomly from 0,1,2,...,x }, x s obtaned by x =2 p /2, a 1 s equal to a 0,andt s set to be t =p 2a 0.Andthen,themageownercanencryptthethree sgnals accordng to the publc key that was generated by the Paller encrypton algorthm. Let the encrypted pxels be represented by (E(a 0 ), E(a 1 ), E(t )). The data hder embeds the secret bt b nto E(a 0 ) and E(a 1 ) and generates the marked sgnals E(a 0 ) and E(a 1 ).Ifthesecretbts0,thenE(a 0 ) = E(a 0 a 1 1), E(a 1 )=E(a 0 +a 1 +1). If the bt s 1, then E(a 0 )=E(a 0 + a 1 +1), E(a 1 )=E(a 0 a 1 1).Sncea 0 =a 1 and Paller encrypton mantans the addtve homomorphc propertes, then the embedded formulas can be reduced to E(a 0 )= E ( 1), E(a 0 )E(a 1 )E(1), E(a 1 )= E(a 0 )E(a 1 )E(1), E ( 1), f b=0, f b=1, f b=0, f b=1. To extract the secret bt and recover the cover mage, the recevercandecryptthemarkedsgnals(e(a 0 ), E(a 1 ), E(t )) accordng to the prvate key generated by Paller encrypton and obtan the decrypted unt (a 0,a 1,t ). Then,the decrypted pxel s denoted by p =a 0 +a 1 +t.becauseofa 0 + a 1 =a 0+a 1, the decrypted mage s a cover mage. After that, the bt b can be extracted by comparng a 0 and a 1 : (7) b= 0, f a 0 <a 1, 1, f a 0 >a 1. (8) Ths method acheves a lossless vsual qualty snce the decrypted mage s the orgnal one. It also can process encoded multmeda snce each separated unt of the encoded multmeda can be recovered completely. Therefore, there s no underflow or overflow problem and there s no need to embed any auxlary nformaton. 3. The Proposed Method 3.1. Lossless Qualty ESRDH Method Based on CDM. To mantan the lossless qualty of the decrypted mage and mprove the embeddng capacty, nspred by communcaton technology based on CDM, we propose a lossless vsual qualty ESRDH method only usng CDM. Suppose that the generated spreadng sequences are S z,z = 1,...,q} and the length s denoted as l = q + 1, where l must be the power of 2 such as 2, 4, 8. Therefore, the preprocess and encrypton can be summarzed as follows. Frstly, dvde each pxel unt p as p =a 1 + +a l +t, where t s obtaned by t =p mod l and a 1,...,a l are set to be (p t )/l. Secondly, defne the vector V =[a 1,...,a l ] as an embedded vector, so each unt p canberepresentedas (V,t ). Fnally, the mage owner encrypts each unt by a publc key generated by Paller encrypton, and the encrypted unt (E(V ), E(t )) s generated, where E(V ) = [E(a 1 ),...,E(a l )]. Now, the data hder can embed secret bts b z (z = 1,...,q}) nto E(V ) usng CDM. Ths means the number of bts whch can be embedded nto the th (1 N 1 N 2 ) pxel s q. At the begnnng, the secret bts b z can be transformed to w z whch consst of 1and1: w z = 1, f b z =0 1, f b z =1. Then, we can obtan the compound sequence C by C = w 1 S w q S q ; the elements of C are [C (1),...,C (l)]. Theycanbeencryptedbythepublckeyand can generate an encrypted compound sequence EC = [E(C (1)),...,E(C (l))]. Snce Paller encrypton has addtve homomorphc propertes, EC can be embedded nto E(V ) by the followng formula: E(V ) = (E (a 1 ),...,E(a l )) =(E(a 1 +C (1)),...,E(a l +C (l))) =(E(a 1 ) E(C (1)),...,E(a l ) E(C (l))), (9) (10) where the new vector E(V ) can be denoted as E(V ) = [E(a 1 ),...,E(a l )]. Fnally, the recever can decrypt the marked sgnals (E(V ), E(t )) by a prvate key and obtan (V,t ). V can be represented by V = [a 1,...,a l ] or V =V +C.Because of a 1 = = a l and for any dfferent spreadng sequences, they are zero means and orthogonal to each other; the result of dot product between V and S z (z = 1,...,l}) can be summarzed as V S z =C S z =l 2 w z. (11) Therefore, w z canbeobtanedbythefollowngformula: w z = V S z l 2 = sgn (V S z ). (12) And b z can nversely be transformed by formula (9). Snce the sum of elements s equal to 0 for any spreadng sequences, we have a 1 + +a l =a 1 + +a l. (13) The drectly decrypted pxel s p,andwehavep =a 1 + +a l +t =p.asaresult,thedecryptedpxelstheorgnal one. In other words, based on CDM, ESRDH acheves lossless vsual qualty of mages. And the data-embeddng process does not cause an underflow/overflow problem. In addton, the embeddng rate can be mproved to be q bts per pxel (bpp) such as q = 1,3}. So, t can be determned by the number of spreadng sequences q.

5 Securty and Communcaton Networks Hgh Embeddng Capacty ESRDH Method Based on VE. In Wu et al. s method and ESRDH method based on CDM, the sgnal t s not used to embed secret bts. To further ncrease the embeddng capacty, the ESRDH method based onvesproposed.inwuetal. smethod,therangeoft s [p 4 p /2, p ], whch wll decrease the vsual qualty of the decryptedmagebecausetheabsolutevalueoft s too large. However, n the ESRDH method based on CDM, the range of t s [1, q], and t s enough small, so the ESRDH based on VE s an effcent method. In Secton 3.1, the pxel unt (V,t ) s encrypted and sent to the data hder. Instead of only embeddng secret bts nto V, t also can embed bts n ths secton. Suppose t s expanded 2 k (k=1,2)tmes and the decmal number of (b 1 b k ) 2 s D.So,k LSBs of t can be empted to embedded secret bts by t =2 k t +D.Then,p canbeconstructedbythesum of a 1,...,a l,t, and t can be reduced to p +t t.snce p [0, 255] and t t [0,Rmax], thusp [0, R max], wherer max =(2 k 1) (q+1). Therefore, data embeddng can possbly cause an overflow problem. To solve ths problem, t should be preprocessed, and the formula can be summarzed as ts = t, 0 p 255 R max, (14) t Rmax, 255 R max <p 255. The range of t s changed from [0, q] to ts [ Rmax,q R max] [0,q].So,fts < 0, ts s the changeable one. Otherwse, t s the orgnal one. Frstly, the encrypted unt (E(V ), E(ts )) can be obtaned by a publc key. Secondly, D should be encrypted to E(D ) by the same key.andthentsembeddedntoe(ts ), so a new encrypted value E(ts ) canbegenerated,whchcanbesummarzedas E(ts )=E(2k ts +D )=E(ts ) 2k E(D ). (15) Thrdly, the recever decrypts E(ts ) by the correspondng prvate key and denotes t as ts. After that, the embedded bts (b 1 b k ) 2 can be obtaned by extractng k LSBs of ts.so,ts canbecalculatedby ts = ts D 2 k, (16) where D s the decmal number of (b 1 b k ) 2. Fnally, the orgnal t should be recovered by t = ts, ts 0, (17) ts +Rmax, ts <0. And the pxel p canberecoveredbythesumofothersgnals. Based on ESRDH usng CDM, the proposed method can further mprove the embeddng rate usng VE. The embedded rate can be ncreased by k bpp such as k = 1, 2}. Furthermore, there s no need to embed any auxlary nformaton to recover the orgnal t.however,theresa possblty that an overflow problem arses, whch may cause mage dstorton Algorthm of ESRDH Method Based on CDM and VE. AccordngtoSectons3.1and3.2,theframeworkofESRDH methodbasedoncdmandvesshownnfgure2,and thealgorthmcanbedvdedntothreephases:preprocess and sgnal encrypton phase, data-embeddng phase, and data extracton and mage recovery phase. The detals are descrbed as n Algorthm Expermental Results As s shown n Fgures 3(a) 3(d), four dfferent grayscale mages wth dfferent features are selected as the test mages, whcharelena,pepper,salboat,andbaboon.theszeof these pctures s ThedevelopmenttoolsMyeclpse8.6, whch s used on an Intel Core 5 CPU (2.8 GHz) wth 8 GB of memory. The embeddng rate (ER) and vsual qualty of the decrypted mage are two mportant ndcators to measure the performance of the EIRDH method, and they can be calculated by ER = Embeddng Capacty The sze of cover mage, PSNR =10lg 2552 N 1 N 2 N 1 N 2 =1 (p p ) 2, (18) where p and p are the orgnal and modfed pxel values, respectvely. In the proposed method, f the ESRDH method based on CDM s used to embed secret bts, the ER s q bpp, and PSNR s +. InTable1,whenq = 1 and q = 3, the embeddng capacty (EC) s = and = , and the correspondng ER s 1 bpp and 3 bpp, respectvely. And lossless vsual qualty of the decrypted mage can be acheved. The decrypted mages wth the hdden data were not further processed, as shown n Fgure 4. The plan text mages recovered from the four encrypted mages were all dentcal to the orgnal one. In addton, we can utlze the VE method to further mprove ER, and up to q+kbpp can be acheved. In addton, PSNR wll be changed by settng k. For example, bts can be embedded usng CDM and VE methods when q=1, k=2. However, PSNR of Lena s decreased to db. The other results about EC, ER, and PSNR of dfferent test mages are shown n Table 1. Furthermore, although the ER of the four mages s 3 bpp when q=1, k=2,orq=3,thepsnrof these decrypted mages are dfferent. To assess the tme overheads on encrypton, embeddng, and decrypton, we assessed the statstc effcency performance of the proposed method for dfferent test mages when q=3and k=1n Table 2. In ths table, the embeddng tme s small because secret bts are embedded by multplcaton, whch also reflects the noton that sgnals encrypton and decrypton spend a long tme. However, snce the operatons of CDM and VE were all performed n a homomorphc encrypton doman, the encrypted sgnals wth the hdden data were protected by the Paller cryptosystem. Therefore, the Paller cryptosystem n our method s an mportant

6 6 Securty and Communcaton Networks O Raster scannng Cover Preprocess Orgnal Encrypt Encrypted pxel p unt U unt %5 H Compound Encrypt Encrypted sequence C value E(C ) Embed usng CDM 30 1 Secret bts 30 2 Encoded Encrypt Encrypted bts D value E(D ) Embed usng VE R Recover Extract Extract Decrypted Decrypt Marked pxel usng VE usng CDM unt U unt EU Fgure 2: The framework of the ESRDH method based on CDM and VE. (a) (b) (c) (d) Fgure 3: Four test mages. (a) Lena, (b) Pepper, (c) Salboat, and (d) Baboon. (a) (b) (c) (d) Fgure 4: Drectly decrypted mages. (a) Lena, (b) Pepper, (c) Salboat, and (d) Baboon.

7 Securty and Communcaton Networks 7 Preprocess and sgnal encrypton phase Input: An orgnal mage wth a sze of N 1 N 2, the number of spreadng sequences q (q = 1, 3}), the expanded parameter k (k = 1, 2}), and publc key pk. Output: The encrypted unt EU. Step 1: Obtan the separated sgnals from the orgnal pxel p =a 1 + +a l +t, 1 N 1 N 2, whch can be calculated n Secton 3.1. Defne the embedded vector V =[a 1,...,a l ], and each pxel unt s represented as (V,t ). Step 2: Modfy t to be ts by formula (14) for preventng overflow. Step 3: Encrypt U =(V,ts ) by pk and generate an encrypted unt EU = (E(V ), E(ts )). Data embeddng phase Input: The encrypted unt EU, the number of spreadng sequences q, the expanded parameter k,publckeypk,and secret bts. Output: Marked unt EU. Step 1: Dvde secret bts nto two parts SP 1 and SP 2,whereSP 1 contans q N 1 N 2 secret bts and SP 2 contans the remanng bts. Step 2: Transform secret bts b z, z=1,...,q}n SP 1 to w z usng formula (9), and then obtan the compound sequence C for each unt EU. Step 3: Encrypt C by pk and denote t as E(C ). Step 4: Embed E(C ) nto E(V ) usng CDM. By formula (10), obtan a new vector E(V ). Step 5: Encode secret bts (b 1 b k ) 2 n SP 2 to D. D s the decmal of (b 1 b k ) 2 for each unt EU. Step 6: Encrypt D by pk and denote t as E(D ). Step 7: Embed E(D ) nto E(ts ) usng VE. By formula (15), obtan a new sgnal E(ts ).Then, generate a marked unt EU = (E(V ), E(ts )). Data extracton and mage recovery phase Input: The marked unt EU, the number of spreadng sequences q, the expanded parameter k,andprvatekeysk. Output: Secret bts and the orgnal mage. Step 1: Decrypt EU usng sk to generate U =(V,ts ). Step 2: Extract q N 1 N 2 secret bts from V by formulas (9) and (12). Step 3: Obtan (b 1 b k ) 2 by extractng k LSBs of ts. Step 4: Calculate ts by formula (16) and recover t by formula (17). Step 5: Recover the orgnal mage by calculatng p =a 1 + +a l +t. Algorthm 1 Table 1: The performance of EC, ER, and PSNR for dfferent mages. Test mage q and k EC (bts) ER (bpp) PSNR (db) q= q=1, k= Lena q=1, k= q= q=3, k= q= q=1, k= Pepper q=1, k= q= q=3, k= q= q=1, k= Salboat q=1, k= q= q=3, k= q= q=1, k= Baboon q=1, k= q= q=3, k=

8 8 Securty and Communcaton Networks Test mages Table 2: Effcency performance of the proposed method. Encrypton (m) Embeddng (m) Decrypton (m) Lena Pepper Salboat Baboon Table3:Thesgnalexpansonbetweenourmethodandtheselected methods. Methods Input sgnal (bts) Output sgnal (bts) Our method 8 2 (q + 2) 512 Wu et al. [31] Shu et al. [29] Chen et al. [28] technology for protectng mage content securty although t s not effcent enough. Table 3 denotes sgnal expanson between our method and the selected methods, ncludng Wu et al. [31], Shu et al. [29], and Chen et al. [28]. Accordng to Paller encrypton, theszeofthecpherspacessquareoftheszeofthe message space. In the table, Paller encrypton wth 512-level securty s adopted, and the plan text and the cphertext arerepresentedby512btsand1024bts,respectvely.the output sgnal of our method s related to q and can reach 2 (q + 2) 512. To solve the problem of data expanson, three alternatve methods can be consdered. The frst s to use a lower securty level, such as a 128-bt securty level and 64-bt securty level. Thus, the length of output sgnal wll be reduced to 2 (q + 2) 128 bts and 2 (q+2) 64bts, respectvely. The second s to reduce the value of q. When q=1,ts and the same as Wu et al. s method. The thrd s to use a pxel block nstead of a sngle pxel as the nput sgnal. If a 512-bt securty level s used, an 8 8pxel block canbeadoptedsncesuchablockconsstsof8 8 8 = 512 bts. Now, the length of the output sgnal s 2 (q + 2) tmes that of the nput sgnal. The average PSNR of dfferent mages when q = 1and k = 2 areshownnfgure5.atthebegnnng,thesecret bts can be embedded usng CDM, and the embeddng rate can reach 1 bpp. Snce the decrypted mage s the same as the orgnal mage, PSNR s +. Tofurthermprovethe embeddng rate, the PSNR wll be reduced and more secret bts wll be embedded usng VE. Compared wth other related methods ncludng Wu et al. [31], Shu et al. [29], and Chen et al. [28], the proposed method has a better performance n terms of the embeddng rate and PSNR. Moreover, snce the decrypted mage s the orgnal mage, the proposed method, whch only uses CDM, can be appled to deal wth encoded meda such as H.264 vdeo and JPEG mages. Besdes, real reversblty can be acheved by the proposed method. Average PSNR (db) Inf Embeddng rate (bpp) Proposed Wu et al Shu et al Chen et al Fgure 5: The average PSNR n dfferent test mages when q=1and k=2. 5. Concluson Ths paper proposes mproved encrypted sgnals-based reversble data hdng based on code dvson multplexng and value expanson. When only usng code dvson multplexng to embed bts, lossless vsual qualty of drectly decrypted mages can be acheved, and the embeddng rate can reach q (q = 1, 3}) bpp. When usng code dvson multplexng and value expanson method, the decrypted mage wll have some dstorton, but the embeddng rate can be mproved to q+k(k=1,2})bpp. The secret bts and the orgnal mage can be recovered from the decrypted mage completely. However, the sze of the encrypted mage wll be expanded because of Paller encrypton. In further work, the expanson problem may be solved usng other encrypton ways, and the property of multplcatve homomorphsm maybeutlzedtofurthermprovetheperformanceonthe embeddng rate and PSNR. Conflcts of Interest The authors declare that they have no conflcts of nterest. Acknowledgments Ths work s supported by the Natonal Natural Scence Foundaton of Chna (NSFC) ( , U , , , , , , , andu ),jangsubascresearchprograms-natural Scence Foundaton (BK ), Startup Foundaton for Introducng Talent of Nanjng Unversty of Informaton Scence and Technology (2014r026#), Open Fund of Demonstraton Base of Internet Applcaton Innovatve Open Platform of Department of Educaton (KJRP1402), Prorty Academc Program Development of Jangsu Hgher Educaton Insttutons (PAPD) Fund, Collaboratve Innovaton Center

9 Securty and Communcaton Networks 9 of Atmospherc Envronment and Equpment Technology (CICAEET) Fund, and Natonal Mnstry of Scence and Technology Specal Project Research (GYHY , 2013DFG12860, and BC ). References [1] J. Shen, D. Lu, Q. Lu, and X. Sun, A secure cloud-asssted urban data sharng framework for ubqutous-ctes, Pervasve &MobleComputng,2017. [2] Z. Fu, F. Huang, X. Sun, A. V. Vaslakos, and C. Yang, Enablng semantc search based on conceptual graphs over encrypted outsourced data, n Proceedngs of the IEEE Transactons on Servces Computng,vol.99,1939. [3] C. Yuan, X. Sun, and R. Lv, Fngerprnt lveness detecton based on mult-scale LPQ and PCA, Chna Communcatons, vol.13, no.7,pp.60 65,2016. [4] J. Shen, S. Chang, J. Shen, Q. Lu, and X. Sun, A lghtweght mult-layer authentcaton protocol for wreless body area networks, Future Generaton Computer Systems,2016. [5] X. Chen, S. Chen, and Y. Wu, Coverless nformaton hdng method based on the Chnese character encodng, Journal of Internet Technology,vol.18,no.2,pp ,2017. [6] J. Frdrch, M. Goljan, and R. Du, Lossless data embeddngnew paradgm n dgtal watermarkng, EURASIP Journal on Appled Sgnal Processng,no.2,pp ,2002. [7] J. Tan, Reversble data embeddng usng a dfference expanson, IEEE Transactons on Crcuts and Systems for Vdeo Technology,vol.13,no.8,pp ,2003. [8] Z. N, Y. Q. Sh, N. Ansar, and W. Su, Reversble data hdng, IEEE Transactons on Crcuts Systems for Vdeo Technology,vol. 16, no. 3, pp , [9] S.Lee,C.D.Yoo,andT.Kalker, Reversblemagewatermarkng based on nteger-to-nteger wavelet transform, IEEE Transactons on Informaton Forenscs and Securty,vol.2,no.3,pp , [10] H. Yao, C. Qn, Z. Tang, and Y. Tan, Improved dual-mage reversble data hdng method usng the selecton strategy of shftable pxels coordnates wth mnmum dstorton, Sgnal Processng,vol.135,pp.26 35,2017. [11] Z. Fu, K. Ren, J. Shu, X. Sun, and F. Huang, Enablng personalzed search over encrypted outsourced data wth effcency mprovement, IEEE Transactons on Parallel and Dstrbuted Systems,vol.27,no.9,pp ,2016. [12]Z.Xa,X.Wang,L.Zhang,Z.Qn,X.Sun,andK.Ren, A prvacy-preservng and copy-deterrence content-based mage retreval scheme n cloud computng, IEEE Transactons on Informaton Forenscs and Securty, vol. 11, no. 11, pp , [13] Y. Kong, M. Zhang, and D. Ye, A belef propagaton-based method for task allocaton n open and dynamc cloud envronments, Knowledge-Based Systems, vol. 115, pp , [14] J. Shen, J. Shen, X. Chen, X. Huang, and W. Suslo, An effcent publc audtng protocol wth novel dynamc structure for cloud data, IEEE Transactons on Informaton Forenscs and Securty, vol.12,no.10,pp ,2017. [15] Z. Fu, F. Huang, K. Ren, J. Weng, and C. Wang, Prvacypreservng Smart Semantc Search based on Conceptual Graphs over Encrypted Outsourced Data, IEEE Transactons on Informaton Forenscs Securty,no.99,p.1,2017. [16] X. Zhang, Z. Qan, G. Feng, and Y. Ren, Effcent reversble data hdng n encrypted mages, Journal of Vsual Communcaton and Image Representaton,vol.25,no.2,pp ,2014. [17] L. Xong, Z. Xu, and Y.-Q. Sh, An nteger wavelet transform based scheme for reversble data hdng n encrypted mages, Multdmensonal Systems and Sgnal Processng,pp.1 12,2017. [18] X. P. Zhang, Reversble data hdng n encrypted mage, IEEE Sgnal Processng Letters,vol.18,no.4,pp ,2011. [19] W. Hong, T.-S. Chen, and H.-Y. Wu, An mproved reversble data hdng n encrypted mages usng sde match, IEEE Sgnal Processng Letters,vol.19,no.4,pp ,2012. [20] X. Lao and C. Shu, Reversble data hdng n encrypted mages based on absolute mean dfference of multple neghborng pxels, JournalofVsualCommuncatonandImageRepresentaton, vol. 28, pp , [21] S. Y and Y. Zhou, Bnary-block embeddng for reversble data hdng n encrypted mages, Sgnal Processng,vol.133,pp.40 51, [22] X. P. Zhang, Separable reversble data hdng n encrypted mage, IEEE Transactons on Informaton Forenscs and Securty,vol.7,no.2,pp ,2012. [23] K. Ma, W. Zhang, X. Zhao, N. Yu, and F. L, Reversble data hdng n encrypted mages by reservng room before encrypton, IEEE Transactons on Informaton Forenscs and Securty,vol.8,no.3,pp ,2013. [24] X. Cao, L. Du, X. We, D. Meng, and X. Guo, Hgh Capacty Reversble Data Hdng n Encrypted Images by Patch-Level Sparse Representaton, IEEE Transactons on Cybernetcs, vol. 46, no. 5, pp , [25] W. M. Zhang, K. D. Ma, and N. H. Yu, Reversblty mproved data hdng n encrypted mages, Sgnal Processng,vol.94,no. 1,pp ,2014. [26] W. Zhang, H. Wang, D. Hou, and N. Yu, Reversble data hdng n encrypted mages by reversble mage transformaton, IEEE Transactons on Multmeda,vol.18,no.8,pp ,2016. [27] D. Hou, W. Zhang, and N. Yu, Image camouflage by reversble mage transformaton, Journal of Vsual Communcaton and Image Representaton, vol. 40, pp , [28] Y.-C. Chen, C.-W. Shu, and G. Horng, Encrypted sgnal-based reversble data hdng wth publc key cryptosystem, Journal of Vsual Communcaton and Image Representaton,vol.25,no.5, pp , [29] C.-W. Shu, Y.-C. Chen, and W. Hong, Encrypted magebased reversble data hdng wth publc key cryptography from dfference expanson, Sgnal Processng: Image Communcaton, vol. 39, pp , [30] X. Zhang, J. Long, Z. Wang, and H. Cheng, Lossless and Reversble Data Hdng n Encrypted Images wth Publc-Key Cryptography, IEEE Transactons on Crcuts and Systems for Vdeo Technology,vol.26,no.9,pp ,2016. [31] X. Wu, B. Chen, and J. Weng, Reversble data hdng for encrypted sgnals by homomorphc encrypton and sgnal energy transfer, Journal of Vsual Communcaton and Image Representaton,vol.41,pp.58 64,2016.

10 Publshng Corporaton Internatonal Journal of Rotatng Machnery Advances n Multmeda Journal of Engneerng Volume 2018 The Scentfc World Journal Journal of Sensors Journal of Control Scence and Engneerng Advances n Cvl Engneerng Submt your manuscrpts at Journal of Robotcs Journal of Electrcal and Computer Engneerng Advances n OptoElectroncs Volume 2018 VLSI Desgn Internatonal Journal of Navgaton and Observaton Modellng & Smulaton n Engneerng Internatonal Journal of Aerospace Engneerng Internatonal Journal of Internatonal Journal of Antennas and Chemcal Engneerng Propagaton Actve and Passve Electronc Components Shock and Vbraton Advances n Acoustcs and Vbraton

High Payload Reversible Data Hiding Scheme Using Difference Segmentation and Histogram Shifting

High Payload Reversible Data Hiding Scheme Using Difference Segmentation and Histogram Shifting JOURNAL OF ELECTRONIC SCIENCE AND TECHNOLOGY, VOL. 11, NO. 1, MARCH 2013 9 Hgh Payload Reversble Data Hdng Scheme Usng Dfference Segmentaton and Hstogram Shftng Yung-Chen Chou and Huang-Chng L Abstract

More information

Enhanced Watermarking Technique for Color Images using Visual Cryptography

Enhanced Watermarking Technique for Color Images using Visual Cryptography Informaton Assurance and Securty Letters 1 (2010) 024-028 Enhanced Watermarkng Technque for Color Images usng Vsual Cryptography Enas F. Al rawashdeh 1, Rawan I.Zaghloul 2 1 Balqa Appled Unversty, MIS

More information

Research Article High Capacity Reversible Watermarking for Audio by Histogram Shifting and Predicted Error Expansion

Research Article High Capacity Reversible Watermarking for Audio by Histogram Shifting and Predicted Error Expansion e Scentfc World Journal, Artcle ID 656251, 7 pages http://dx.do.org/1.1155/214/656251 Research Artcle Hgh Capacty Reversble Watermarkng for Audo by Hstogram Shftng and Predcted Error Expanson Fe Wang,

More information

Hybrid Non-Blind Color Image Watermarking

Hybrid Non-Blind Color Image Watermarking Hybrd Non-Blnd Color Image Watermarkng Ms C.N.Sujatha 1, Dr. P. Satyanarayana 2 1 Assocate Professor, Dept. of ECE, SNIST, Yamnampet, Ghatkesar Hyderabad-501301, Telangana 2 Professor, Dept. of ECE, AITS,

More information

A Fast Content-Based Multimedia Retrieval Technique Using Compressed Data

A Fast Content-Based Multimedia Retrieval Technique Using Compressed Data A Fast Content-Based Multmeda Retreval Technque Usng Compressed Data Borko Furht and Pornvt Saksobhavvat NSF Multmeda Laboratory Florda Atlantc Unversty, Boca Raton, Florda 3343 ABSTRACT In ths paper,

More information

Load Balancing for Hex-Cell Interconnection Network

Load Balancing for Hex-Cell Interconnection Network Int. J. Communcatons, Network and System Scences,,, - Publshed Onlne Aprl n ScRes. http://www.scrp.org/journal/jcns http://dx.do.org/./jcns.. Load Balancng for Hex-Cell Interconnecton Network Saher Manaseer,

More information

A Lossless Watermarking Scheme for Halftone Image Authentication

A Lossless Watermarking Scheme for Halftone Image Authentication IJCSNS Internatonal Journal of Computer Scence and Network Securty, VOL.6 No.2B, February 2006 147 A Lossless Watermarkng Scheme for Halftone Image Authentcaton Jeng-Shyang Pan, Hao Luo, and Zhe-Mng Lu,

More information

An Optimal Algorithm for Prufer Codes *

An Optimal Algorithm for Prufer Codes * J. Software Engneerng & Applcatons, 2009, 2: 111-115 do:10.4236/jsea.2009.22016 Publshed Onlne July 2009 (www.scrp.org/journal/jsea) An Optmal Algorthm for Prufer Codes * Xaodong Wang 1, 2, Le Wang 3,

More information

Article Reversible Dual-Image-Based Hiding Scheme Using Block Folding Technique

Article Reversible Dual-Image-Based Hiding Scheme Using Block Folding Technique Artcle Reversble Dual-Image-Based Hdng Scheme Usng Block Foldng Technque Tzu-Chuen Lu, * and Hu-Shh Leng Department of Informaton Management, Chaoyang Unversty of Technology, Tachung 4349, Tawan Department

More information

Cluster Analysis of Electrical Behavior

Cluster Analysis of Electrical Behavior Journal of Computer and Communcatons, 205, 3, 88-93 Publshed Onlne May 205 n ScRes. http://www.scrp.org/ournal/cc http://dx.do.org/0.4236/cc.205.350 Cluster Analyss of Electrcal Behavor Ln Lu Ln Lu, School

More information

Enhanced AMBTC for Image Compression using Block Classification and Interpolation

Enhanced AMBTC for Image Compression using Block Classification and Interpolation Internatonal Journal of Computer Applcatons (0975 8887) Volume 5 No.0, August 0 Enhanced AMBTC for Image Compresson usng Block Classfcaton and Interpolaton S. Vmala Dept. of Comp. Scence Mother Teresa

More information

A Secured Method for Image Steganography Based On Pixel Values

A Secured Method for Image Steganography Based On Pixel Values A Secured Method for Image Steganography Based On Pxel Values Tarun Gulat #, Sanskrt Gupta * # Assocate Professor, Electroncs and Communcaton Engneerng Department, MMEC, M.M.U., Mullana, Ambala, Haryana,

More information

An Image Compression Algorithm based on Wavelet Transform and LZW

An Image Compression Algorithm based on Wavelet Transform and LZW An Image Compresson Algorthm based on Wavelet Transform and LZW Png Luo a, Janyong Yu b School of Chongqng Unversty of Posts and Telecommuncatons, Chongqng, 400065, Chna Abstract a cylpng@63.com, b y27769864@sna.cn

More information

Related-Mode Attacks on CTR Encryption Mode

Related-Mode Attacks on CTR Encryption Mode Internatonal Journal of Network Securty, Vol.4, No.3, PP.282 287, May 2007 282 Related-Mode Attacks on CTR Encrypton Mode Dayn Wang, Dongda Ln, and Wenlng Wu (Correspondng author: Dayn Wang) Key Laboratory

More information

A Binarization Algorithm specialized on Document Images and Photos

A Binarization Algorithm specialized on Document Images and Photos A Bnarzaton Algorthm specalzed on Document mages and Photos Ergna Kavalleratou Dept. of nformaton and Communcaton Systems Engneerng Unversty of the Aegean kavalleratou@aegean.gr Abstract n ths paper, a

More information

Key-Selective Patchwork Method for Audio Watermarking

Key-Selective Patchwork Method for Audio Watermarking Internatonal Journal of Dgtal Content Technology and ts Applcatons Volume 4, Number 4, July 2010 Key-Selectve Patchwork Method for Audo Watermarkng 1 Ch-Man Pun, 2 Jng-Jng Jang 1, Frst and Correspondng

More information

Shape-adaptive DCT and Its Application in Region-based Image Coding

Shape-adaptive DCT and Its Application in Region-based Image Coding Internatonal Journal of Sgnal Processng, Image Processng and Pattern Recognton, pp.99-108 http://dx.do.org/10.14257/sp.2014.7.1.10 Shape-adaptve DCT and Its Applcaton n Regon-based Image Codng Yamn Zheng,

More information

A Fast Visual Tracking Algorithm Based on Circle Pixels Matching

A Fast Visual Tracking Algorithm Based on Circle Pixels Matching A Fast Vsual Trackng Algorthm Based on Crcle Pxels Matchng Zhqang Hou hou_zhq@sohu.com Chongzhao Han czhan@mal.xjtu.edu.cn Ln Zheng Abstract: A fast vsual trackng algorthm based on crcle pxels matchng

More information

Parallelism for Nested Loops with Non-uniform and Flow Dependences

Parallelism for Nested Loops with Non-uniform and Flow Dependences Parallelsm for Nested Loops wth Non-unform and Flow Dependences Sam-Jn Jeong Dept. of Informaton & Communcaton Engneerng, Cheonan Unversty, 5, Anseo-dong, Cheonan, Chungnam, 330-80, Korea. seong@cheonan.ac.kr

More information

Private Information Retrieval (PIR)

Private Information Retrieval (PIR) 2 Levente Buttyán Problem formulaton Alce wants to obtan nformaton from a database, but she does not want the database to learn whch nformaton she wanted e.g., Alce s an nvestor queryng a stock-market

More information

Research and Application of Fingerprint Recognition Based on MATLAB

Research and Application of Fingerprint Recognition Based on MATLAB Send Orders for Reprnts to reprnts@benthamscence.ae The Open Automaton and Control Systems Journal, 205, 7, 07-07 Open Access Research and Applcaton of Fngerprnt Recognton Based on MATLAB Nng Lu* Department

More information

Content Based Image Retrieval Using 2-D Discrete Wavelet with Texture Feature with Different Classifiers

Content Based Image Retrieval Using 2-D Discrete Wavelet with Texture Feature with Different Classifiers IOSR Journal of Electroncs and Communcaton Engneerng (IOSR-JECE) e-issn: 78-834,p- ISSN: 78-8735.Volume 9, Issue, Ver. IV (Mar - Apr. 04), PP 0-07 Content Based Image Retreval Usng -D Dscrete Wavelet wth

More information

Robust Watermarking for Text Images Based on Arnold Scrambling and DWT-DCT

Robust Watermarking for Text Images Based on Arnold Scrambling and DWT-DCT Internatonal Conference on Mechatroncs Electronc Industral and Control Engneerng (MEIC 015) Robust Watermarkng for Text Images Based on Arnold Scramblng and DWT-DCT Fan Wu College of Informaton Scence

More information

Positive Semi-definite Programming Localization in Wireless Sensor Networks

Positive Semi-definite Programming Localization in Wireless Sensor Networks Postve Sem-defnte Programmng Localzaton n Wreless Sensor etworks Shengdong Xe 1,, Jn Wang, Aqun Hu 1, Yunl Gu, Jang Xu, 1 School of Informaton Scence and Engneerng, Southeast Unversty, 10096, anjng Computer

More information

Security Vulnerabilities of an Enhanced Remote User Authentication Scheme

Security Vulnerabilities of an Enhanced Remote User Authentication Scheme Contemporary Engneerng Scences, Vol. 7, 2014, no. 26, 1475-1482 HIKARI Ltd, www.m-hkar.com http://dx.do.org/10.12988/ces.2014.49186 Securty Vulnerabltes of an Enhanced Remote User Authentcaton Scheme Hae-Soon

More information

Security Enhanced Dynamic ID based Remote User Authentication Scheme for Multi-Server Environments

Security Enhanced Dynamic ID based Remote User Authentication Scheme for Multi-Server Environments Internatonal Journal of u- and e- ervce, cence and Technology Vol8, o 7 0), pp7-6 http://dxdoorg/07/unesst087 ecurty Enhanced Dynamc ID based Remote ser Authentcaton cheme for ult-erver Envronments Jun-ub

More information

Semi-Fragile Watermarking Scheme for Authentication of JPEG Images

Semi-Fragile Watermarking Scheme for Authentication of JPEG Images Tamkang Journal of Scence and Engneerng, Vol. 10, No 1, pp. 5766 (2007) 57 Sem-Fragle Watermarkng Scheme for Authentcaton of JPEG Images Chh-Hung n 1 *, Tung-Shh Su 2 and Wen-Shyong Hseh 2,3 1 Department

More information

Research of Multiple Text Watermarks Technique in Electric Power System Texts

Research of Multiple Text Watermarks Technique in Electric Power System Texts Sensors & Transducers 203 by IFSA http://www.sensorsportal.com Research of Multple Text atermarks Technque n Electrc Power System Texts Xao-X XING, Qng CHEN, 2 Lan-X FU School of Optcal-Electrcal and Computer

More information

A Robust Webpage Information Hiding Method Based on the Slash of Tag

A Robust Webpage Information Hiding Method Based on the Slash of Tag Advanced Engneerng Forum Onlne: 2012-09-26 ISSN: 2234-991X, Vols. 6-7, pp 361-366 do:10.4028/www.scentfc.net/aef.6-7.361 2012 Trans Tech Publcatons, Swtzerland A Robust Webpage Informaton Hdng Method Based

More information

Tsinghua University at TAC 2009: Summarizing Multi-documents by Information Distance

Tsinghua University at TAC 2009: Summarizing Multi-documents by Information Distance Tsnghua Unversty at TAC 2009: Summarzng Mult-documents by Informaton Dstance Chong Long, Mnle Huang, Xaoyan Zhu State Key Laboratory of Intellgent Technology and Systems, Tsnghua Natonal Laboratory for

More information

Analysis on the Workspace of Six-degrees-of-freedom Industrial Robot Based on AutoCAD

Analysis on the Workspace of Six-degrees-of-freedom Industrial Robot Based on AutoCAD Analyss on the Workspace of Sx-degrees-of-freedom Industral Robot Based on AutoCAD Jn-quan L 1, Ru Zhang 1,a, Fang Cu 1, Q Guan 1 and Yang Zhang 1 1 School of Automaton, Bejng Unversty of Posts and Telecommuncatons,

More information

An Image Fusion Approach Based on Segmentation Region

An Image Fusion Approach Based on Segmentation Region Rong Wang, L-Qun Gao, Shu Yang, Yu-Hua Cha, and Yan-Chun Lu An Image Fuson Approach Based On Segmentaton Regon An Image Fuson Approach Based on Segmentaton Regon Rong Wang, L-Qun Gao, Shu Yang 3, Yu-Hua

More information

The Shortest Path of Touring Lines given in the Plane

The Shortest Path of Touring Lines given in the Plane Send Orders for Reprnts to reprnts@benthamscence.ae 262 The Open Cybernetcs & Systemcs Journal, 2015, 9, 262-267 The Shortest Path of Tourng Lnes gven n the Plane Open Access Ljuan Wang 1,2, Dandan He

More information

Identify the Attack in Embedded Image with Steganalysis Detection Method by PSNR and RGB Intensity

Identify the Attack in Embedded Image with Steganalysis Detection Method by PSNR and RGB Intensity Internatonal Journal of Computer Systems (ISSN: 394-1065), Volume 03 Issue 07, July, 016 Avalable at http://www.jcsonlne.com/ Identfy the Attack n Embedded Image wth Steganalyss Detecton Method by PSNR

More information

Improvement of Spatial Resolution Using BlockMatching Based Motion Estimation and Frame. Integration

Improvement of Spatial Resolution Using BlockMatching Based Motion Estimation and Frame. Integration Improvement of Spatal Resoluton Usng BlockMatchng Based Moton Estmaton and Frame Integraton Danya Suga and Takayuk Hamamoto Graduate School of Engneerng, Tokyo Unversty of Scence, 6-3-1, Nuku, Katsuska-ku,

More information

Reversible Dual-Image-Based Hiding Scheme Using Block Folding Technique

Reversible Dual-Image-Based Hiding Scheme Using Block Folding Technique S S symmetry Artcle Reversble Dual-Image-Based Hdng Scheme Usng Block Foldng Technque Tzu-Chuen Lu Tzu-Chuen Lu 1, 1, * and Hu-Shh Leng * ID and Hu-Shh Leng 1 Department Informaton Management, Chaoyang

More information

Distortion Function Designing for JPEG Steganography with Uncompressed Side-image

Distortion Function Designing for JPEG Steganography with Uncompressed Side-image Dstorton Functon Desgnng for JPEG Steganography wth Uncompressed Sde-mage Fangjun Huang School of Informaton Scence and Technology, Sun Yat-Sen Unversty, GD 56, Chna huangfj@mal.sysu.edu.cn Jwu Huang School

More information

Pattern Recognition 43 (2010) Contents lists available at ScienceDirect. Pattern Recognition. journal homepage:

Pattern Recognition 43 (2010) Contents lists available at ScienceDirect. Pattern Recognition. journal homepage: Pattern Recognton 43 (2010) 397 -- 404 Contents lsts avalable at ScenceDrect Pattern Recognton ournal homepage: www.elsever.com/locate/pr Secret mage sharng based on cellular automata and steganography

More information

Simulation Based Analysis of FAST TCP using OMNET++

Simulation Based Analysis of FAST TCP using OMNET++ Smulaton Based Analyss of FAST TCP usng OMNET++ Umar ul Hassan 04030038@lums.edu.pk Md Term Report CS678 Topcs n Internet Research Sprng, 2006 Introducton Internet traffc s doublng roughly every 3 months

More information

Problem Definitions and Evaluation Criteria for Computational Expensive Optimization

Problem Definitions and Evaluation Criteria for Computational Expensive Optimization Problem efntons and Evaluaton Crtera for Computatonal Expensve Optmzaton B. Lu 1, Q. Chen and Q. Zhang 3, J. J. Lang 4, P. N. Suganthan, B. Y. Qu 6 1 epartment of Computng, Glyndwr Unversty, UK Faclty

More information

Data Hiding and Image Authentication for Color-Palette Images

Data Hiding and Image Authentication for Color-Palette Images Data Hdng and Image Authentcaton for Color-Palette Images Chh-Yang Yn ( 殷志揚 ) and Wen-Hsang Tsa ( 蔡文祥 ) Department of Computer & Informaton Scence Natonal Chao Tung Unversty 00 Ta Hsueh Rd., Hsnchu, Tawan

More information

A NEW AUDIO WATERMARKING METHOD BASED

A NEW AUDIO WATERMARKING METHOD BASED A NEW AUDIO WATERMARKING METHOD BASED ON DISCRETE COSINE TRANSFORM WITH A GRAY IMAGE Mohammad Ibrahm Khan 1, Md. Iqbal Hasan Sarker 2, Kaushk Deb 3 and Md. Hasan Furhad 4 1,2,3 Department of Computer Scence

More information

Robust Blind Video Watermark Algorithm in Transform Domain Combining with 3D Video Correlation

Robust Blind Video Watermark Algorithm in Transform Domain Combining with 3D Video Correlation JOURNAL OF MULTIMEDIA, VOL. 8, NO. 2, APRIL 2013 161 Robust Blnd Vdeo Watermark Algorthm n Transform Doman Combnng wth 3D Vdeo Correlaton DING Ha-yang 1,3 1. Informaton Securty Center, Bejng Unversty of

More information

Fast Computation of Shortest Path for Visiting Segments in the Plane

Fast Computation of Shortest Path for Visiting Segments in the Plane Send Orders for Reprnts to reprnts@benthamscence.ae 4 The Open Cybernetcs & Systemcs Journal, 04, 8, 4-9 Open Access Fast Computaton of Shortest Path for Vstng Segments n the Plane Ljuan Wang,, Bo Jang

More information

A New Feature of Uniformity of Image Texture Directions Coinciding with the Human Eyes Perception 1

A New Feature of Uniformity of Image Texture Directions Coinciding with the Human Eyes Perception 1 A New Feature of Unformty of Image Texture Drectons Concdng wth the Human Eyes Percepton Xng-Jan He, De-Shuang Huang, Yue Zhang, Tat-Mng Lo 2, and Mchael R. Lyu 3 Intellgent Computng Lab, Insttute of Intellgent

More information

A Fusion Steganographic Algorithm Based on Faster R-CNN

A Fusion Steganographic Algorithm Based on Faster R-CNN Copyrght 2018 Tech Scence Press CMC, vol.55, no.1, pp.1-16, 2018 A Fuson Steganographc Algorthm Based on Faster R-CNN Ruohan Meng 1, 2, Steven G. Rce 3, Jn Wang 4 1, 2, * and Xngmng Sun Abstract: The am

More information

Evaluation of an Enhanced Scheme for High-level Nested Network Mobility

Evaluation of an Enhanced Scheme for High-level Nested Network Mobility IJCSNS Internatonal Journal of Computer Scence and Network Securty, VOL.15 No.10, October 2015 1 Evaluaton of an Enhanced Scheme for Hgh-level Nested Network Moblty Mohammed Babker Al Mohammed, Asha Hassan.

More information

Quality Improvement Algorithm for Tetrahedral Mesh Based on Optimal Delaunay Triangulation

Quality Improvement Algorithm for Tetrahedral Mesh Based on Optimal Delaunay Triangulation Intellgent Informaton Management, 013, 5, 191-195 Publshed Onlne November 013 (http://www.scrp.org/journal/m) http://dx.do.org/10.36/m.013.5601 Qualty Improvement Algorthm for Tetrahedral Mesh Based on

More information

Specifications in 2001

Specifications in 2001 Specfcatons n 200 MISTY (updated : May 3, 2002) September 27, 200 Mtsubsh Electrc Corporaton Block Cpher Algorthm MISTY Ths document shows a complete descrpton of encrypton algorthm MISTY, whch are secret-key

More information

PYTHON IMPLEMENTATION OF VISUAL SECRET SHARING SCHEMES

PYTHON IMPLEMENTATION OF VISUAL SECRET SHARING SCHEMES PYTHON IMPLEMENTATION OF VISUAL SECRET SHARING SCHEMES Ruxandra Olmd Faculty of Mathematcs and Computer Scence, Unversty of Bucharest Emal: ruxandra.olmd@fm.unbuc.ro Abstract Vsual secret sharng schemes

More information

A Hybrid Semi-Blind Gray Scale Image Watermarking Algorithm Based on DWT-SVD using Human Visual System Model

A Hybrid Semi-Blind Gray Scale Image Watermarking Algorithm Based on DWT-SVD using Human Visual System Model A Hybrd Sem-Blnd Gray Scale Image Watermarkng Algorthm Based on DWT-SVD usng Human Vsual System Model Rajesh Mehta r Scence & Engneerng, USICT Guru Gobnd Sngh Indrarprastha Unversty New Delh, Inda rajesh00ust@gmal.com

More information

A DCVS Reconstruction Algorithm for Mine Video Monitoring Image Based on Block Classification

A DCVS Reconstruction Algorithm for Mine Video Monitoring Image Based on Block Classification 1 3 4 5 6 7 8 9 10 11 1 13 14 15 16 17 18 19 0 1 Artcle A DCVS Reconstructon Algorthm for Mne Vdeo Montorng Image Based on Block Classfcaton Xaohu Zhao 1,, Xueru Shen 1,, *, Kuan Wang 1, and Wanme L 1,

More information

Using Fuzzy Logic to Enhance the Large Size Remote Sensing Images

Using Fuzzy Logic to Enhance the Large Size Remote Sensing Images Internatonal Journal of Informaton and Electroncs Engneerng Vol. 5 No. 6 November 015 Usng Fuzzy Logc to Enhance the Large Sze Remote Sensng Images Trung Nguyen Tu Huy Ngo Hoang and Thoa Vu Van Abstract

More information

Robust and Reversible Relational Database Watermarking Algorithm Based on Clustering and Polar Angle Expansion

Robust and Reversible Relational Database Watermarking Algorithm Based on Clustering and Polar Angle Expansion Robust and Reversble Relatonal Database Watermarkng Algorthm Based on Clusterng and Polar Angle Expanson Zhyong L, Junmn Lu and Wecheng Tao College of Informaton Scence and Engneerng, Hunan Unversty, Changsha,

More information

Network Coding as a Dynamical System

Network Coding as a Dynamical System Network Codng as a Dynamcal System Narayan B. Mandayam IEEE Dstngushed Lecture (jont work wth Dan Zhang and a Su) Department of Electrcal and Computer Engneerng Rutgers Unversty Outlne. Introducton 2.

More information

A Distributed Dynamic Bandwidth Allocation Algorithm in EPON

A Distributed Dynamic Bandwidth Allocation Algorithm in EPON www.ccsenet.org/mas Modern Appled Scence Vol. 4, o. 7; July 2010 A Dstrbuted Dynamc Bandwdth Allocaton Algorthm n EPO Feng Cao, Demng Lu, Mnmng Zhang, Kang Yang & Ynbo Qan School of Optoelectronc Scence

More information

Performance Analysis of Data Hiding in MPEG-4 AAC Audio *

Performance Analysis of Data Hiding in MPEG-4 AAC Audio * TSINGHUA SCIENCE AND TECHNOLOGY ISSNll1007-0214ll07/21llpp55-61 Volume 14, Number 1, February 2009 Performance Analyss of Data Hdng n MPEG-4 AAC Audo * XU Shuzheng ( ) **, ZHANG Peng ( ), WANG Pengjun

More information

TN348: Openlab Module - Colocalization

TN348: Openlab Module - Colocalization TN348: Openlab Module - Colocalzaton Topc The Colocalzaton module provdes the faclty to vsualze and quantfy colocalzaton between pars of mages. The Colocalzaton wndow contans a prevew of the two mages

More information

An Improved User Authentication and Key Agreement Scheme Providing User Anonymity

An Improved User Authentication and Key Agreement Scheme Providing User Anonymity 35 JOURNAL OF ELECTRONIC SCIENCE AND TECHNOLOGY, VOL. 9, NO. 4, DECEMBER 0 An Improved User Authentcaton and Key Agreement Scheme Provdng User Anonymty Ya-Fen Chang and Pe-Yu Chang Abstract When accessng

More information

Efficient Content Distribution in Wireless P2P Networks

Efficient Content Distribution in Wireless P2P Networks Effcent Content Dstrbuton n Wreless P2P Networs Qong Sun, Vctor O. K. L, and Ka-Cheong Leung Department of Electrcal and Electronc Engneerng The Unversty of Hong Kong Pofulam Road, Hong Kong, Chna {oansun,

More information

Available online at Available online at Advanced in Control Engineering and Information Science

Available online at   Available online at   Advanced in Control Engineering and Information Science Avalable onlne at wwwscencedrectcom Avalable onlne at wwwscencedrectcom Proceda Proceda Engneerng Engneerng 00 (2011) 15000 000 (2011) 1642 1646 Proceda Engneerng wwwelsevercom/locate/proceda Advanced

More information

Secure and Fast Fingerprint Authentication on Smart Card

Secure and Fast Fingerprint Authentication on Smart Card SETIT 2005 3 rd Internatonal Conference: Scences of Electronc, Technologes of Informaton and Telecommuncatons March 27-31, 2005 TUNISIA Secure and Fast Fngerprnt Authentcaton on Smart Card Y. S. Moon*,

More information

A Novel Adaptive Descriptor Algorithm for Ternary Pattern Textures

A Novel Adaptive Descriptor Algorithm for Ternary Pattern Textures A Novel Adaptve Descrptor Algorthm for Ternary Pattern Textures Fahuan Hu 1,2, Guopng Lu 1 *, Zengwen Dong 1 1.School of Mechancal & Electrcal Engneerng, Nanchang Unversty, Nanchang, 330031, Chna; 2. School

More information

Steps for Computing the Dissimilarity, Entropy, Herfindahl-Hirschman and. Accessibility (Gravity with Competition) Indices

Steps for Computing the Dissimilarity, Entropy, Herfindahl-Hirschman and. Accessibility (Gravity with Competition) Indices Steps for Computng the Dssmlarty, Entropy, Herfndahl-Hrschman and Accessblty (Gravty wth Competton) Indces I. Dssmlarty Index Measurement: The followng formula can be used to measure the evenness between

More information

Module Management Tool in Software Development Organizations

Module Management Tool in Software Development Organizations Journal of Computer Scence (5): 8-, 7 ISSN 59-66 7 Scence Publcatons Management Tool n Software Development Organzatons Ahmad A. Al-Rababah and Mohammad A. Al-Rababah Faculty of IT, Al-Ahlyyah Amman Unversty,

More information

Wireless Sensor Network Localization Research

Wireless Sensor Network Localization Research Sensors & Transducers 014 by IFSA Publshng, S L http://wwwsensorsportalcom Wreless Sensor Network Localzaton Research Lang Xn School of Informaton Scence and Engneerng, Hunan Internatonal Economcs Unversty,

More information

A new remote user authentication scheme for multi-server architecture

A new remote user authentication scheme for multi-server architecture Future Generaton Computer Systems 19 (2003) 13 22 A new remote user authentcaton scheme for mult-server archtecture Iuon-Chang Ln a, Mn-Shang Hwang b,, L-Hua L b a Department of Computer Scence and Informaton

More information

Scheduling Remote Access to Scientific Instruments in Cyberinfrastructure for Education and Research

Scheduling Remote Access to Scientific Instruments in Cyberinfrastructure for Education and Research Schedulng Remote Access to Scentfc Instruments n Cybernfrastructure for Educaton and Research Je Yn 1, Junwe Cao 2,3,*, Yuexuan Wang 4, Lanchen Lu 1,3 and Cheng Wu 1,3 1 Natonal CIMS Engneerng and Research

More information

Resource and Virtual Function Status Monitoring in Network Function Virtualization Environment

Resource and Virtual Function Status Monitoring in Network Function Virtualization Environment Journal of Physcs: Conference Seres PAPER OPEN ACCESS Resource and Vrtual Functon Status Montorng n Network Functon Vrtualzaton Envronment To cte ths artcle: MS Ha et al 2018 J. Phys.: Conf. Ser. 1087

More information

Video Proxy System for a Large-scale VOD System (DINA)

Video Proxy System for a Large-scale VOD System (DINA) Vdeo Proxy System for a Large-scale VOD System (DINA) KWUN-CHUNG CHAN #, KWOK-WAI CHEUNG *# #Department of Informaton Engneerng *Centre of Innovaton and Technology The Chnese Unversty of Hong Kong SHATIN,

More information

Improved Resource Allocation Algorithms for Practical Image Encoding in a Ubiquitous Computing Environment

Improved Resource Allocation Algorithms for Practical Image Encoding in a Ubiquitous Computing Environment JOURNAL OF COMPUTERS, VOL. 4, NO. 9, SEPTEMBER 2009 873 Improved Resource Allocaton Algorthms for Practcal Image Encodng n a Ubqutous Computng Envronment Manxong Dong, Long Zheng, Kaoru Ota, Song Guo School

More information

THE cloud computing technologies are growing, and it

THE cloud computing technologies are growing, and it IEEE TRANSACTIONS ON IMAGE PROCESSING, VOL. 23, NO. 3, MARCH 204 37 A Compressve Sensng based Secure Watermark Detecton and Prvacy Preservng Storage Framework Qa Wang, Wenjun Zeng, Fellow, IEEE, and Jun

More information

Information Hiding Watermarking Detection Technique by PSNR and RGB Intensity

Information Hiding Watermarking Detection Technique by PSNR and RGB Intensity www..org 3 Informaton Hdng Watermarkng Detecton Technque by PSNR and RGB Intensty 1 Neha Chauhan, Akhlesh A. Waoo, 3 P. S. Patheja 1 Research Scholar, BIST, Bhopal, Inda.,3 Assstant Professor, BIST, Bhopal,

More information

A Five-Point Subdivision Scheme with Two Parameters and a Four-Point Shape-Preserving Scheme

A Five-Point Subdivision Scheme with Two Parameters and a Four-Point Shape-Preserving Scheme Mathematcal and Computatonal Applcatons Artcle A Fve-Pont Subdvson Scheme wth Two Parameters and a Four-Pont Shape-Preservng Scheme Jeqng Tan,2, Bo Wang, * and Jun Sh School of Mathematcs, Hefe Unversty

More information

Novel Pattern-based Fingerprint Recognition Technique Using 2D Wavelet Decomposition

Novel Pattern-based Fingerprint Recognition Technique Using 2D Wavelet Decomposition Mathematcal Methods for Informaton Scence and Economcs Novel Pattern-based Fngerprnt Recognton Technque Usng D Wavelet Decomposton TUDOR BARBU Insttute of Computer Scence of the Romanan Academy T. Codrescu,,

More information

An Improved Image Segmentation Algorithm Based on the Otsu Method

An Improved Image Segmentation Algorithm Based on the Otsu Method 3th ACIS Internatonal Conference on Software Engneerng, Artfcal Intellgence, Networkng arallel/dstrbuted Computng An Improved Image Segmentaton Algorthm Based on the Otsu Method Mengxng Huang, enjao Yu,

More information

Two-Factor User Authentication in Multi-Server Networks

Two-Factor User Authentication in Multi-Server Networks Internatonal Journal of ecurty and Its Applcatons Vol. 6, No., Aprl, 0 Two-Factor ser Authentcaton n Mult-erver Networks Chun-Ta L, Ch-Yao Weng,* and Chun-I Fan Department of Informaton Management, Tanan

More information

A New Transaction Processing Model Based on Optimistic Concurrency Control

A New Transaction Processing Model Based on Optimistic Concurrency Control A New Transacton Processng Model Based on Optmstc Concurrency Control Wang Pedong,Duan Xpng,Jr. Abstract-- In ths paper, to support moblty and dsconnecton of moble clents effectvely n moble computng envronment,

More information

Suppression for Luminance Difference of Stereo Image-Pair Based on Improved Histogram Equalization

Suppression for Luminance Difference of Stereo Image-Pair Based on Improved Histogram Equalization Suppresson for Lumnance Dfference of Stereo Image-Par Based on Improved Hstogram Equalzaton Zhao Llng,, Zheng Yuhu 3, Sun Quansen, Xa Deshen School of Computer Scence and Technology, NJUST, Nanjng, Chna.School

More information

An Efficient Chaos-Based Feedback Stream cipher (ECBFSC) for Image Cryptosystems

An Efficient Chaos-Based Feedback Stream cipher (ECBFSC) for Image Cryptosystems An Effcent Chaos-Based Feedback Stream cpher (ECBFSC) for Image Cryptosystems Hossam El-dn H. Ahmed, Hamdy M. Kalash, and Osama S. Farag Allah Abstract. The chaos based cryptographc algorthms have suggested

More information

HOMOMORPHIC ENCRYPTION SCHEMES: STEPS TO IMPROVE THE PROFICIENCY

HOMOMORPHIC ENCRYPTION SCHEMES: STEPS TO IMPROVE THE PROFICIENCY HOMOMORPHIC ENCRYPTION SCHEMES: STEPS TO IMPROVE THE PROFICIENCY Pallav 1 Masters n Technology, School of Future Studes and Plannng, DAVV, Indore (Inda) ABSTRACT Homomorphc encrypton schemes are malleable

More information

Constructing Minimum Connected Dominating Set: Algorithmic approach

Constructing Minimum Connected Dominating Set: Algorithmic approach Constructng Mnmum Connected Domnatng Set: Algorthmc approach G.N. Puroht and Usha Sharma Centre for Mathematcal Scences, Banasthal Unversty, Rajasthan 304022 usha.sharma94@yahoo.com Abstract: Connected

More information

High-Boost Mesh Filtering for 3-D Shape Enhancement

High-Boost Mesh Filtering for 3-D Shape Enhancement Hgh-Boost Mesh Flterng for 3-D Shape Enhancement Hrokazu Yagou Λ Alexander Belyaev y Damng We z Λ y z ; ; Shape Modelng Laboratory, Unversty of Azu, Azu-Wakamatsu 965-8580 Japan y Computer Graphcs Group,

More information

Query Clustering Using a Hybrid Query Similarity Measure

Query Clustering Using a Hybrid Query Similarity Measure Query clusterng usng a hybrd query smlarty measure Fu. L., Goh, D.H., & Foo, S. (2004). WSEAS Transacton on Computers, 3(3), 700-705. Query Clusterng Usng a Hybrd Query Smlarty Measure Ln Fu, Don Hoe-Lan

More information

Detection of an Object by using Principal Component Analysis

Detection of an Object by using Principal Component Analysis Detecton of an Object by usng Prncpal Component Analyss 1. G. Nagaven, 2. Dr. T. Sreenvasulu Reddy 1. M.Tech, Department of EEE, SVUCE, Trupath, Inda. 2. Assoc. Professor, Department of ECE, SVUCE, Trupath,

More information

Wavelet-Based Image Compression System with Linear Distortion Control

Wavelet-Based Image Compression System with Linear Distortion Control Je-Hung Lu, Kng-Chu Hung Wavelet-Based Image Compresson System wth Lnear Dstorton Control Je-Hung Lu, Kng-Chu Hung Insttute of Engneerng Scence and Technology Natonal Kaohsung Frst Unversty of Scence and

More information

Term Weighting Classification System Using the Chi-square Statistic for the Classification Subtask at NTCIR-6 Patent Retrieval Task

Term Weighting Classification System Using the Chi-square Statistic for the Classification Subtask at NTCIR-6 Patent Retrieval Task Proceedngs of NTCIR-6 Workshop Meetng, May 15-18, 2007, Tokyo, Japan Term Weghtng Classfcaton System Usng the Ch-square Statstc for the Classfcaton Subtask at NTCIR-6 Patent Retreval Task Kotaro Hashmoto

More information

Simple March Tests for PSF Detection in RAM

Simple March Tests for PSF Detection in RAM Smple March Tests for PSF Detecton n RAM Ireneusz Mroze Balysto Techncal Unversty Computer Scence Department Wejsa 45A, 5-35 Balysto POLAND mroze@.pb.balysto.pl Eugena Buslowsa Balysto Techncal Unversty

More information

A Comparison between Digital Images Watermarking in Tow Different Color Spaces Using DWT2*

A Comparison between Digital Images Watermarking in Tow Different Color Spaces Using DWT2* A Comparson between Dgtal s ng n Tow Dfferent Color Spaces Usng DWT* Mehd Khall Natonal Academy of Scence of Armena Yerevan, Armena e-mal: khall.mehd@yahoo.com ABSTRACT A novel dgtal watermarkng for ownershp

More information

College of Information & Computer, Anhui Agricultural University, Hefei, Anhui, , China

College of Information & Computer, Anhui Agricultural University, Hefei, Anhui, , China 4th Internatonal Conference on Mechatroncs Materals Chemstry and Computer Engneerng (ICMMCCE 15) Improved retnex mage enhancement algorthm based on blateral flterng Ya nan Yang 1 a Zhaohu Jang 1 b * Chunhe

More information

Parallel matrix-vector multiplication

Parallel matrix-vector multiplication Appendx A Parallel matrx-vector multplcaton The reduced transton matrx of the three-dmensonal cage model for gel electrophoress, descrbed n secton 3.2, becomes excessvely large for polymer lengths more

More information

VISUAL SELECTION OF SURFACE FEATURES DURING THEIR GEOMETRIC SIMULATION WITH THE HELP OF COMPUTER TECHNOLOGIES

VISUAL SELECTION OF SURFACE FEATURES DURING THEIR GEOMETRIC SIMULATION WITH THE HELP OF COMPUTER TECHNOLOGIES UbCC 2011, Volume 6, 5002981-x manuscrpts OPEN ACCES UbCC Journal ISSN 1992-8424 www.ubcc.org VISUAL SELECTION OF SURFACE FEATURES DURING THEIR GEOMETRIC SIMULATION WITH THE HELP OF COMPUTER TECHNOLOGIES

More information

Learning the Kernel Parameters in Kernel Minimum Distance Classifier

Learning the Kernel Parameters in Kernel Minimum Distance Classifier Learnng the Kernel Parameters n Kernel Mnmum Dstance Classfer Daoqang Zhang 1,, Songcan Chen and Zh-Hua Zhou 1* 1 Natonal Laboratory for Novel Software Technology Nanjng Unversty, Nanjng 193, Chna Department

More information

Real-time Motion Capture System Using One Video Camera Based on Color and Edge Distribution

Real-time Motion Capture System Using One Video Camera Based on Color and Edge Distribution Real-tme Moton Capture System Usng One Vdeo Camera Based on Color and Edge Dstrbuton YOSHIAKI AKAZAWA, YOSHIHIRO OKADA, AND KOICHI NIIJIMA Graduate School of Informaton Scence and Electrcal Engneerng,

More information

Cracking of the Merkle Hellman Cryptosystem Using Genetic Algorithm

Cracking of the Merkle Hellman Cryptosystem Using Genetic Algorithm Crackng of the Merkle Hellman Cryptosystem Usng Genetc Algorthm Zurab Kochladze 1 * & Lal Besela 2 1 Ivane Javakhshvl Tbls State Unversty, 1, I.Chavchavadze av 1, 0128, Tbls, Georga 2 Sokhum State Unversty,

More information

Grading Image Retrieval Based on DCT and DWT Compressed Domains Using Low-Level Features

Grading Image Retrieval Based on DCT and DWT Compressed Domains Using Low-Level Features Journal of Communcatons Vol. 0 No. January 0 Gradng Image Retreval Based on DCT and DWT Compressed Domans Usng Low-Level Features Chengyou Wang Xnyue Zhang Rongyang Shan and Xao Zhou School of echancal

More information

The Research of Ellipse Parameter Fitting Algorithm of Ultrasonic Imaging Logging in the Casing Hole

The Research of Ellipse Parameter Fitting Algorithm of Ultrasonic Imaging Logging in the Casing Hole Appled Mathematcs, 04, 5, 37-3 Publshed Onlne May 04 n ScRes. http://www.scrp.org/journal/am http://dx.do.org/0.436/am.04.584 The Research of Ellpse Parameter Fttng Algorthm of Ultrasonc Imagng Loggng

More information

IAJIT First Online Publication

IAJIT First Online Publication Content Protecton n Vdeo Data Based on Robust Dgtal Watermarkng Resstant to Intentonal and Unntentonal Attacks Mad Masoum and Shervn Amr Department of Electrcal Engneerng, Islamc Azad Unversty Qazvn Branch,

More information

SLAM Summer School 2006 Practical 2: SLAM using Monocular Vision

SLAM Summer School 2006 Practical 2: SLAM using Monocular Vision SLAM Summer School 2006 Practcal 2: SLAM usng Monocular Vson Javer Cvera, Unversty of Zaragoza Andrew J. Davson, Imperal College London J.M.M Montel, Unversty of Zaragoza. josemar@unzar.es, jcvera@unzar.es,

More information

Privacy-preserving crowdsourced site survey in WiFi fingerprint-based localization

Privacy-preserving crowdsourced site survey in WiFi fingerprint-based localization L et al. EURASIP Journal on Wreless Communcatons and Networkng (2016) 2016:123 DOI 10.1186/s13638-016-0624-2 RESEARCH Prvacy-preservng crowdsourced ste survey n WF fngerprnt-based localzaton Shujun L 1*,HongL

More information