IMPLEMENTATION OF QIM BASED AUDIO WATERMARKING USING HYBRID TRANSFORM OF SWT-DCT-SVD METHODS OPTIMIZED WITH GENETIC ALORITHM

Size: px
Start display at page:

Download "IMPLEMENTATION OF QIM BASED AUDIO WATERMARKING USING HYBRID TRANSFORM OF SWT-DCT-SVD METHODS OPTIMIZED WITH GENETIC ALORITHM"

Transcription

1 IMPLEMENTATION OF QIM BASED AUDIO WATERMARKING USING HYBRID TRANSFORM OF SWT-DCT-SVD METHODS OPTIMIZED WITH GENETIC ALORITHM Ryan Amnullah 1, Gelar Budman 2, Irma Saftr 3 1, 2, 3 FakultasTeknk Elektro, Unverstas Telkom 1 ryanamnullah@students.telkomunversty.ac.d, 2 gelarbudman@telkomunversty.ac.d, 3 rmasaf@telkomunversty.ac.d Abstract Nowadays, almost all data transacton s done through the nternet because t s easy and could be accessed anywhere. The fle s uploaded drectly wthout any securty or scannng makng people able to upload llegal fles or fles that s not owned by them. Ths volaton of copyrght becomes a huge problem as t reduces the owner s proft. That s why watermarkng method s created. Watermarkng s a method of embeddng secret nformaton to a host data. The nformaton could be embedded nto an audo, mage or vdeo data. Ths research wll desgn an audo watermarkng by combnng 3 methods of transformaton: Statonary Wavelet Transform (SWT), Dscrete Cosne Transform (DCT), and Sngular Value Decomposton (SVD). SWT separates data s frequency nto hgh and low. After that, DCT maps correlated hgh frequency data nto uncorrelated coeffcent. Then those coeffcents wll be deconstructed nto three matrces u, s, and v usng SVD method. Later, the s matrc wll be embedded wth the watermark. Wth these methods, watermarked audo produce SNR>20dB and BER 0,1170 n average. Keywords: audo, watermarkng, SWT, DCT, SVD, QIM. 1. Introducton Now nformaton could be easly obtaned and uploaded n the nternet. As nternet s a complex lnks of computers around the world, securty and survellance of all ts content s very complcated. Many rresponsble people explot ths weakness to share data that s not thers to gan proft. Pracy s usually done to multmeda fles (audo, mage, and vdeo) and causes loss to the orgnal owner of that fle. That s why watermarkng methods s researched. Watermarkng s a technque n sgnal processng where a host data s embedded wth an nformaton or logo that works as an dentty of the data owner to protect the partcular data from pracy [2]. There are some qualtes whch a watermarked audo should have [1, 2]: 1) Inaudble. Watermark should not affect audo qualty wth sgnal-to-nose rato (SNR) value not more than 20 db; 2) Robust. Informaton that s embedded should last aganst attacks and manpulaton that s done by prates; 3) Secure. Watermark data that s embedded should not able to be extracted except by the maker. Transformaton doman has performance beneft compared to watermarks n tme doman because transform doman could better explot human audtory system. In ths paper three methods wll combned, Sngular Wavelet Transform (SWT) [3], Dscrete Cosne Transform (DCT) [4, 5], and Sngular Value Decomposton (SVD) to produce watermarked audo that s naudble, and robust aganst attacks lke nose addng, flterng, MP3 compresson, tme and frequency modfcatons. Many researchers develop hybrd algorthm to seek better performance. Chen and Zhu proposed a scheme that combnes DWT and DCT [6]. Two characterstcs of the transform were combned; DWT mult resoluton and DCT energy compresson. The embeddng s done through zerowatermarkng technque whch keeps the watermark n a secret key and not the sgnal. Another research of the same DWT-DCT hybrd algorthm also proposed to prevent damage from synchronzaton attack by nsertng the watermark nto hgh power low frequency component wth adaptve quantzaton [7]. Ths research combnes the three methods because of ths followng reasons; SWT s used to splt data nto two types hgh and low. The SWT process s used to protect the watermark from flterng attack. DCT s used to convert data nto frequency doman and also compress the data meanng that t could reduce the BER value produced. Then the obtaned DCT coeffcents wll be structured nto a symmetrcal matrx to be processed usng SVD to produce U, S, and V matrces whch also wll reduce the BER value produced. The S matrx then wll be used for embeddng usng QIM method. Optmzaton wth genetc algorthm s used n ths method snce each processng technque requre parameter nputs such as length of frame, threshold, number of bts used, and etc. genetc algorthm works to do combnaton tral of those parameters to see whch combnaton produce the best result.

2 The paper s structured as follows. The frst secton conssts of ntroducton; n ths secton the general explanaton of the paper s presented. Secton two wll tell you about the theoretcal bases of the proposed watermarkng scheme. The thrd secton wll talk about desgn and ts step by step processes. The fourth secton wll talk about result and analyss whle the last secton concludes the paper. 2. Theoretcal Bases 2.1. Statonary Wavelet Transform Wavelets Transformaton s used to decompose data nto two parts; hgh frequency data and low frequency data. The number of decomposton n ths process s usually decded by usage and the length of orgnal data. The data that s created from ths method s called SWT coeffcent. Orgnal fle could be reconstructed from those coeffcent trough nverse SWT process. SWT s a smplfcaton of DWT n whch there s no down samplng process n SWT. SWT sgnal s formed through a calculaton by passng through x sgnal nto several flters. The calculaton of approxmaton coeffcent ) and detal coeffcent could be calculated wth equaton 1 and 2 [9]: 1 x k c k = ( f ( x), ) (1) 1 / x k d k = ( f ( x), (2) 1 2 /2 2 Matchng wth the transformaton formula, the nverse process of approxmaton coeffcent of SWT can be calculated through equaton 3 [9]: 1 x k c k ( ), ( ) 1 = f x = h l c ( + 2)/2 ( + 2) (3) 1k + 2 l 2 2 l= Whle the detal coeffcent of SWT can be obtaned by equaton 4: d = h() l h (4) + 1 k 1k + 2 l = Sgnal s also decomposed smultaneously by usng hgh pass flter h. Result from both fltratons wll produce detal coeffcent (sgnal from hgh pass flter) and approxmaton coeffcent (sgnal from low pass flter). SWT could be appled n a nose removal applcaton n a sgnal, pattern scanner, bran mage classfcaton, and bran dsease detecton Dscrete Cosne Transform As n other transformatons, Dscrete Cosne Transform (DCT) ams to de-correlate audo data. Every transform coeffcent could be encoded ndependently wthout losng compresson effcency. DCT transform that wll be used n ths ournal s one dmensonal DCT defned as equaton 5 [7]. n 1 (2n 1)( k 1) y( k) = w( k) x( n)cos (5) n= 0 2N Where y(k) s the one dmensonal DCT coeffcent, x(n) s the orgnal fle audo, N s the length of fle audo and k equals to 0,1,2,,N-1. Matchng wth ts transformaton equaton, the nverse equaton (IDCT) shown on 6: n 1 (2n 1)( k 1) x( n) = w( k) y( k)cos n= 0 2N (6) Where n = 0,1,2,,N-1. In both formulas, w (k) s defned as equaton 7:, k = 0, (7) As such, the frst transform coeffcent s the sample sequence mean known as DC coeffcent. DCT normally used n sgnal or mage processng, especally lossy compresson because DCT has a strong energy compresson characterstc Sngular Value Decomposton SVD s a factorzaton process of a real or complex matrx. Is a generalzaton of Egen decomposton of asymmetrcal matrces (dfferent length and wdth). Say A s a matrx wth n x n sze. Through SVD process ths matrx can be decomposed followng equaton 8 [14]: n t A UDV SU V = 0 = = (8) Where U & V matrces are an n x n matrx whch s orthogonal and matrx s the dagonal elements of D wth postve real numbers. The nonzero value of the matrx s called sngular values of matrx A. Equaton 2.8 s devsed from the fact that A T A s symmetrcal. Thus ts egenvector form orthonormal bass. Take x egenvector and λ as ts egenvalue. Then take σ = and r = Ax Those varables the followng matrces could be bult; dagonal matrx S, wth σ as ts dagonal value, U matrx wth r as ts columns, and V matrx wth x as ts columns. If we multply U wth S, thus equaton 2.9 wll be created: σ r = σ = Ax = Ax (9) Then f we multply US wth V T would mean multplyng Ax wth rows of x. Then matrx consstng of Ax x T wll be created. Due to symmetrcal characterstc of the matrx x and x they wll form an orthonormal bass. Meanng that egenvector that s dfferent wll be orthogonal to each other. Then x x T = 0 f ( ) and x x T = 1 on

3 the same condton. That s why x x T wll form dentty matrx, because dagonal multplcaton wll produce 1 ( = ) whle on other poston zero wll be emulated ( ) whch means USV T = AI = A Quantzaton Index Modulaton QIM s a watermark embeddng method by usng two or more quantzer, where each quantzer has ts own ndex [6]. In desgnng, functon range should be desgned so each functon reach not overlaps each other. Ths s done so n extracton process, m value could be defned unquely. To reach the desred result, functon range should be dscontnued followng the quantzer characterstc. 10 are the formula for QIM Embeddng [9]: { Ak, fw= 1,arg mn F (0) Ak Bk, fw= 0,arg mn F (0) Bk (10) Wth F (o) = watermarked audo, F(o) = orgnal audo, w = watermark bt and & defned as follows: = (2k + 0.5) Δ and k = ±0, ±1, ±2, = (2k - 0.5) Δ and k = ±0, ±1, ±2, Whle the extracton formula s stated n 12 [9]: F(0) V ( k) = mod( cel 2) (12) Where s an estmate of nformaton n the receved sgnals Genetc Algorthm (11) Genetc algorthm s adapted from evoluton mechansm and natural genetcs [10] and works to fnd the best, most optmum parameter. Parameter fndng mechansm s done usng selecton, crossover and populaton mutaton process so a soluton called as chromosome could be produced. Chromosome buldng components s called as gen, where gen could be n a form of character, symbol, bnary or numerc number followng the problem wshed to be solved. Those chromosomes wll be contnually produces wth dfferent genes to produce the best output; ths evoluton s done contnuously n a generaton. Chromosomes wth a good success rate wll be further evolved n the next generaton. Chromosome success rate s measure by ftness functon (FF) parameter, so chromosome wth hgh FF value wll be chosen n the next generaton [11]. In a generaton, chromosomes produced by dong crossover between chromosomes. The number of chromosomes undergong crossover depends on the crossover probablty nputted. Besdes that, chromosomes could also be produced through mutaton or the alteraton of one or more gen value randomly (not through crossover). Mutaton probablty that s nputted decdes how many mutatons wll happen. In the end chromosomes wth convergent value wll produce the best soluton towards the problem [11]. 3. Desgn In ths paper there wll be three desgns of audo watermarkng algorthm usng text shaped mage watermark data. Those algorthms wll have the same transformaton methods whch are SWT-DCT- SVD but wll have a dfferent framng process. The desgns, whch wll be called A, B, and C desgn defned as follows: Desgn A: outsde SWT and DCT + SVD + QIM Desgn B: outsde SWT nsde DCT + SVD + QIM Desgn C: nsde SWT dan DCT + SVD + QIM Where outsde means that framng wll be done after SWT/DCT process. Whle nsde means that framng s done before SWT/DCT process. Part 3.1 wll explan general embeddng and extractng process of the desgned system regardless of when the framng process s done Embeddng Process Embeddng process s a process of nsertng watermark nto audo host. Inserton done through some steps shown n fgure 1. Step 1: Before embeddng, watermark mage s frst converted nto W vector n a sze of m x n. Then orgnal audo fle s sampled by samples per second samplng rate. Then sampled data s framed nto many. The sum of all frames equal all audo sgnals sampled wth equaton 13: A = A ; 1 < < N (13) Step 2: Do SWT transformaton on every A. Ths operaton wll create sub-bands wth same sze: Ds and A (s n Ds represent the number of sub-bands created). Where Ds represent detal sub-bands and A represent approxmaton sub-bands (see fgure 2). Step 3: Then transform those sub-bands usng DCT to produce Dx and Ax, whch are DCT transformed Ds and A. Those sub-bands wll be constructed nto a DC matrx wth s x (L/2) as ts sze, where L s the length of every frame and s s the number of sub-bands created by SWT. If the number of sub-bands created amounted to four, the DC matrx wll look lke fgure 3. Step 4: Then, decompose DC usng SVD operaton (see equaton 3.2). Ths operaton wll create three orthonormal matrces u, s, and v whch are factorzatons of DC matrx. DC = U x S x V T (14) Where s s dagonal 4 x 4 matrx wth non-zero sngular value n ts dagonal. Those values wll be used for embeddng. Step 5: Then S matrx wll be embedded usng QIM by modulatng ts value wth m ndex. The value of m could ranges from 1-10 depends on the system nput.

4 3.2. Extracton Process Extracton process s a process of retrevng watermark data from watermarked audo. Extracton process s the nverse of embeddng process and could be seen n fgure 4: Step 1: Take watermarked audo and sample t wth samplng rate of samples per second to avod alasng. Then frame sampled data nto many, n whch the sum of all framed data equals to all audo sgnal. Step 2: Perform SWT on every frame and produce approxmaton and detal coeffcents. Take the approxmaton coeffcent and process t wth DCT to produce wavelets. Step 3: The created wavelets wll be n a form of sub bands n regards to SWT output. Make a matrx out of those sub bands, a smlar one wth embeddng process. Then factorze the created matrx usng SVD to produce U, S, and V matrx. Step 4: Take the S matrx and extract t usng QIM extracton equaton and the watermark data wll be produced Genetc Algorthm Process In ths step, watermarkng parameters wll be optmzed to produce optmum output. Generally optmzng process wth genetc algorthm could be seen n fgure 5: Step 1: Intalze the parameter of the algorthm. Defne the number of generatons, ndvduals, mutaton and also crossover probablty that s desred. Step 2: Intalze the parameter to be optmzed; n ths paper those parameters are level decomposton of SWT, QIM quantzaton number, sze of frame n framng process, threshold of audo power that s allowed, and audo quantzaton bt. Step 3: After ntalzatons start the algorthm. The algorthm then wll start producng chromosomes (solutons) wth the parameter to be optmzed as ts genes. The calculaton of ftness functon wll be done through embeddng, attackng and extractng processes. As explaned on theoretcal bases, chromosomes wth good ftness functon wll be selected nto the next generaton and be used to produce new chromosomes trough crossover and mutaton processes. Step 4: When the generaton desred or ftness functon has reached the value of 1, the algorthm wll stop producng the chromosomes and the optmzed parameters wll be produced. 4. Result and Analyss 4.1. Early System Test and Analyss In early system test, tral by changng parameter combnaton wll be conducted. Ths experment wll Fgure 1. Embeddng Process Fgure 2. Coeffcents product of SWT Transform Fgure 3. Matrx DC Fgure 4. Extracton Dagram Fgure 5. Genetcs Algorthm Optmzng Process Dagram [9] conclude an analyss of how N (decomposton level), Nframe (frame number), Nbt (number of QIM bt), thr (threshold), and bt (quantzaton depth) affect the watermarked audo. Experments are held by changng the least sgnfcant parameters towards more sgnfcant parameters. Table 1 shows the ntal parameters Table 2 shows the result of early parameter test: Table 2. shows that desgn A produce the worst result compared to the other desgn. Whle B & C shows a good result wth BER = 0.

5 Table 1. Intal Parameter of Each Desgn Parameter Desgn A Desgn B Desgn C N Nframe Nbt Thr Typew Bt Table 2. Early Parameter Trals and Error Test Result Desgn N Nframe A B C Table 3. Desgn B robustness aganst attack Attack LPF (fc 3 khz, 6 khz, 9 khz) BPF (fc 100, 50, 10 6khz) Nose Addng (5db, 10db, 20db) Resamplng (11khz, 16khz, 22khz) Tme Scale Modfcaton (0.97s, 0.99s, 1.01s) Ptch Shftng (96s, 99s) MP3 Compresson (32, 64, 128, 256 kbps) Voce 0, Next B & C parameters wll be tested wth attacks. Shown n table 3 and 4 are the results of attacks aganst BER. From attack test result t could be concluded that desgn B and C s strong aganst LPF, BPF, nose addng and resamplng attacks shown from BER = 0 value that s constant even after attack but both desgn s weak aganst tme and frequency modfcaton and compresson attack Fnal System Test and Analyss nbt Thr Bt BER 10 0,1 16 0, , , Mean BER Value Desgn B Instrume class Rock Jazz nt c 0, 0, 0, 0, 0.41, 0.50, 0.38, 0.29, 0.19, , 0.29, 0.28, , 0.51, 0.54, 0.46, Early system test has shown desgns performance before and after attack. In fnal system test and analyss, all desgn wll be. optmzed wth genetc algorthm to fnd the best parameters combnaton After the best combnaton s obtaned the desgn wll be tested and be compared wth ts early test result. In ths test parameters that wll be optmzed are N, Table 4. Desgn C robustness aganst attack Attack LPF (fc 3 khz, 6 khz, 9 khz) BPF (fc 100, 50, 10 6khz) Nose Addng (5db, 10db, 20db) Resamplng (11khz, 16khz, 22khz) Tme Scale Modfcaton (0.97s, 0.99s, 1.01s) Ptch Shftng (96s, 99s) MP3 Compresson (32, 64, 128, 256 kbps) Ftness Functon -0,22516 Voce Mean BER Value Desgn C nstrume nt rock Jazz classc 0.51, 0.01, 0.40, 0.41, 0.46, , 0.41, 0.46, Table 5. Optmzed Parameters N 0.53, 0.52, 0.02, Nframe , 0.38, 0.38, 0.52, 0.39, 0.46, 0.13, 0.34, 0.50, 0.07, Nbt Thr bt 7 0,5 32 Nframe, nbt, thr, and bt. Genetc algorthm wll be used to search for the optmum parameter by usng these terms: Number of generaton = 300 Number of ndvdual = 20 Crossover probablty = 0.8 Mutaton probablty = 0.5 Audo = rock.wav Optmzed Attack = ptch shftng & MP3 compresson Rock audo and ptch shftng attack were chosen because both produce the worst BER. MP3 compresson was chosen because t s the most common attack used n current status quo. Optmzaton shows that desgn C (mean BER after attack = 0,1170) has better robustness compared to desgn B (mean BER after attack = 0,1553). Table 5 shows the obtaned optmzed parameters. Where the most robust audo s nstrumental.wav wth mean BER value = Fgure 6. Shows hgh resstance aganst attacks. Though the audo stll weak aganst ptch shftng and MP3 compresson. Table 6 shows the result of attack aganst optmzed nstrumental wav:

6 Table 6. Optmzed Parameter Aganst Attack Attack Parameter Or. BER (Des. B) nstrumental.wav Or. BER (Des. C) pt.ber (Des. C Extracted Image Ptch Fc 3 khz ,3900 LPF Fc 6 khz kbps ,3900 Fc 9 khz kbps ,3800 MP3 Fc khz kbps ,4100 BPF Fc Hz kbps Fc Hz Mean BER Value Db Nose 10 db db Hz Fgure 6. Ftness Functon to number of generaton graphc on Desgn C ptch shftng optmzaton Resample Hz Hz Both B and C desgns wth orgnal parameters are weak aganst tme scale modfcaton, ptch shftng and MP3 compresson (column 3 and 4, row 15 22). Through optmzaton we can see that the audo become more robust aganst tme scale modfcaton and ptch shftng to a certan level. Meanng that optmzaton create better robustness. TSM Tempo 0.97 s ,0100 Tempo 0.99 s Tempo 1.01 s 5. Concluson From the test that has been conducted t could be concluded that out of three desgned system, B desgn has the best performance and could also be concluded that framng that s done after DCT transformaton runs watermarkng result. Shown from A desgn that dd not produce any BER = 0, and framng that s done before both transformaton produce output that s slghtly worse compared to framng that s done after SWT. Watermarkng

7 scheme wth three transformatons of SWT-DCT- SVD could produce watermarked audo wth mean output value of BER = 01170, ODG 0,15 and SNR 30 db. Lastly, optmzng lowers BER value on ptch shftng, tme scale modfcaton and MP3 compresson and produce audo qualty that are better compared to before optmzng. References [1] R. F. Olanrewau and O. Khalfa, Dgtal Audo Watermarkng; Technques and Applcatons, Internatonal Conference on Computer and Communcaton Engneerng (ICCCE), 3-5. July, pp. 3 5, [2] B. Laurence, T. ahmed H., H. Khaled N. Dgtal Watermarks for Audo Sgnals, IEEE Int. Conference on Multmeda Computng and Systems, June 17-23, Hroshma, Japan, 1996, [3] Al-Ha. Al, T. Chrstna, and M. Ahmad, Hybrd DWT-DWT Audo Watermarkng, Ffth Internatonal Conference on Dgtal Informaton Management (ICDIM), 5-8 July, [4] Khayam, Syed Al, The Dscrete Cosne Transform (DCT): Theory and Applcaton, ECE : Informaton Theory and Codng, Department of Electrcal &Computer Engneerng, Mchgan State Unversty Semnar, March 10 th, [5] R. M. Zhao, H. Lan, H. W. Pang, B.N. Hu, A Watermarkng Algorthm by Modfyng AC Coeffcent n DCT Doman, Internatonal Symposum on Informaton Scence and Engneerng, pp IEEE, [6] N. Chen and J. Zhu, A Robust Zero- Watermarkng Algorthm for Audo, EURASIP Journal on Advances n Sgnal Processng, pp. 1-7, do: /2008/453580, Artcle ID , [7] X. Wang and H. Zhao, A Novel Synchronzaton Invarant Audo Watermarkng Scheme Based on DWT and DCT, IEEE Trans. Sgnal Processng, vol. 54, no. 12, pp , [8] S. Zhong and S. O. Oyad, Crack detecton n smply supported beams wthout baselne modal parameters by statonary wavelet transform, Mech. Syst. Sgnal Process., vol. 21, pp , [9] B. Chen and G. W. Wornell, Quantzaton ndex modulaton: A class of provably good methods for dgtal watermarkng and nformaton embeddng, IEEE Trans. Inf. Theory, vol. 47, no. 4, pp , [10] Shekh, R. H. M. M. Raghuwansh, and A. N. Jaswal, Genetc Algorthm Based Clusterng: A Survey, 2008 Frst Int. Conf. Emerg. Trends Eng. Technol., vol. 2, no. 6, pp , 2008 [11] Suyanto, Algortma Genetka Dalam Matlab, 1st ed. Yogyakarta: And Offset, [12] M. Sadeghzadeh and M. Taherbaghal, A New Method for Watermarkng usng Genetc Algorthms, Internatonal Conference on Machne Learnng, Electrcal and Mechancal Engneerng (ICMLEME 2014), January 8-9, pp. 1 8, [13] Y. Ln and W. Abdulla, Obectve qualty measures for perceptual evaluaton n dgtal audo watermarkng, Sgnal Process. IET, vol. 5, no. January, pp , [14] B. Boudraa and M. Hems, Dgtal Watermarkng n audo for copyrght protecton, Internatonal Conference on Advanced Computer Scence and Informaton System (ICACSIS), October [15] K.K Kothamasu, Seghal V.K, An Audo Watermarkng Algorthm Usng Encrypton, Transformatons and Quantzaton Internatonal Journal of Advances n Engneerng Scence and Technology, ISSN : /IJAEST/V2N1: [16] Ambka D., Radha V., Speech Watermarkng Usng Dscrete Wavelet Transform, Dscrete Cosne Transform And Sngular Value Decomposton Internatonal Journal of Computer Scence & Engneerng Technology (IJCSET), ISSN : , Vol. 5 No. 11 Nov 2014.

Hybrid Non-Blind Color Image Watermarking

Hybrid Non-Blind Color Image Watermarking Hybrd Non-Blnd Color Image Watermarkng Ms C.N.Sujatha 1, Dr. P. Satyanarayana 2 1 Assocate Professor, Dept. of ECE, SNIST, Yamnampet, Ghatkesar Hyderabad-501301, Telangana 2 Professor, Dept. of ECE, AITS,

More information

Key-Selective Patchwork Method for Audio Watermarking

Key-Selective Patchwork Method for Audio Watermarking Internatonal Journal of Dgtal Content Technology and ts Applcatons Volume 4, Number 4, July 2010 Key-Selectve Patchwork Method for Audo Watermarkng 1 Ch-Man Pun, 2 Jng-Jng Jang 1, Frst and Correspondng

More information

A Hybrid Semi-Blind Gray Scale Image Watermarking Algorithm Based on DWT-SVD using Human Visual System Model

A Hybrid Semi-Blind Gray Scale Image Watermarking Algorithm Based on DWT-SVD using Human Visual System Model A Hybrd Sem-Blnd Gray Scale Image Watermarkng Algorthm Based on DWT-SVD usng Human Vsual System Model Rajesh Mehta r Scence & Engneerng, USICT Guru Gobnd Sngh Indrarprastha Unversty New Delh, Inda rajesh00ust@gmal.com

More information

A NEW AUDIO WATERMARKING METHOD BASED

A NEW AUDIO WATERMARKING METHOD BASED A NEW AUDIO WATERMARKING METHOD BASED ON DISCRETE COSINE TRANSFORM WITH A GRAY IMAGE Mohammad Ibrahm Khan 1, Md. Iqbal Hasan Sarker 2, Kaushk Deb 3 and Md. Hasan Furhad 4 1,2,3 Department of Computer Scence

More information

Adaptive digital watermarking of images using Genetic Algorithm

Adaptive digital watermarking of images using Genetic Algorithm Adaptve dgtal watermarkng of mages usng Genetc Algorthm Bushra Skander, Muhammad Ishtaq, M. Arfan Jaffar, Muhammad Tarq, Anwar M. Mrza Department of Computer Scence, Natonal Unversty of Computer and Emergng

More information

Enhanced Watermarking Technique for Color Images using Visual Cryptography

Enhanced Watermarking Technique for Color Images using Visual Cryptography Informaton Assurance and Securty Letters 1 (2010) 024-028 Enhanced Watermarkng Technque for Color Images usng Vsual Cryptography Enas F. Al rawashdeh 1, Rawan I.Zaghloul 2 1 Balqa Appled Unversty, MIS

More information

Shape-adaptive DCT and Its Application in Region-based Image Coding

Shape-adaptive DCT and Its Application in Region-based Image Coding Internatonal Journal of Sgnal Processng, Image Processng and Pattern Recognton, pp.99-108 http://dx.do.org/10.14257/sp.2014.7.1.10 Shape-adaptve DCT and Its Applcaton n Regon-based Image Codng Yamn Zheng,

More information

Cluster Analysis of Electrical Behavior

Cluster Analysis of Electrical Behavior Journal of Computer and Communcatons, 205, 3, 88-93 Publshed Onlne May 205 n ScRes. http://www.scrp.org/ournal/cc http://dx.do.org/0.4236/cc.205.350 Cluster Analyss of Electrcal Behavor Ln Lu Ln Lu, School

More information

Content Based Image Retrieval Using 2-D Discrete Wavelet with Texture Feature with Different Classifiers

Content Based Image Retrieval Using 2-D Discrete Wavelet with Texture Feature with Different Classifiers IOSR Journal of Electroncs and Communcaton Engneerng (IOSR-JECE) e-issn: 78-834,p- ISSN: 78-8735.Volume 9, Issue, Ver. IV (Mar - Apr. 04), PP 0-07 Content Based Image Retreval Usng -D Dscrete Wavelet wth

More information

A Fast Content-Based Multimedia Retrieval Technique Using Compressed Data

A Fast Content-Based Multimedia Retrieval Technique Using Compressed Data A Fast Content-Based Multmeda Retreval Technque Usng Compressed Data Borko Furht and Pornvt Saksobhavvat NSF Multmeda Laboratory Florda Atlantc Unversty, Boca Raton, Florda 3343 ABSTRACT In ths paper,

More information

Cracking of the Merkle Hellman Cryptosystem Using Genetic Algorithm

Cracking of the Merkle Hellman Cryptosystem Using Genetic Algorithm Crackng of the Merkle Hellman Cryptosystem Usng Genetc Algorthm Zurab Kochladze 1 * & Lal Besela 2 1 Ivane Javakhshvl Tbls State Unversty, 1, I.Chavchavadze av 1, 0128, Tbls, Georga 2 Sokhum State Unversty,

More information

An Image Compression Algorithm based on Wavelet Transform and LZW

An Image Compression Algorithm based on Wavelet Transform and LZW An Image Compresson Algorthm based on Wavelet Transform and LZW Png Luo a, Janyong Yu b School of Chongqng Unversty of Posts and Telecommuncatons, Chongqng, 400065, Chna Abstract a cylpng@63.com, b y27769864@sna.cn

More information

Robust Watermarking for Text Images Based on Arnold Scrambling and DWT-DCT

Robust Watermarking for Text Images Based on Arnold Scrambling and DWT-DCT Internatonal Conference on Mechatroncs Electronc Industral and Control Engneerng (MEIC 015) Robust Watermarkng for Text Images Based on Arnold Scramblng and DWT-DCT Fan Wu College of Informaton Scence

More information

Improvement of Spatial Resolution Using BlockMatching Based Motion Estimation and Frame. Integration

Improvement of Spatial Resolution Using BlockMatching Based Motion Estimation and Frame. Integration Improvement of Spatal Resoluton Usng BlockMatchng Based Moton Estmaton and Frame Integraton Danya Suga and Takayuk Hamamoto Graduate School of Engneerng, Tokyo Unversty of Scence, 6-3-1, Nuku, Katsuska-ku,

More information

Robust Blind Video Watermark Algorithm in Transform Domain Combining with 3D Video Correlation

Robust Blind Video Watermark Algorithm in Transform Domain Combining with 3D Video Correlation JOURNAL OF MULTIMEDIA, VOL. 8, NO. 2, APRIL 2013 161 Robust Blnd Vdeo Watermark Algorthm n Transform Doman Combnng wth 3D Vdeo Correlaton DING Ha-yang 1,3 1. Informaton Securty Center, Bejng Unversty of

More information

Semi-Fragile Watermarking Scheme for Authentication of JPEG Images

Semi-Fragile Watermarking Scheme for Authentication of JPEG Images Tamkang Journal of Scence and Engneerng, Vol. 10, No 1, pp. 5766 (2007) 57 Sem-Fragle Watermarkng Scheme for Authentcaton of JPEG Images Chh-Hung n 1 *, Tung-Shh Su 2 and Wen-Shyong Hseh 2,3 1 Department

More information

Identify the Attack in Embedded Image with Steganalysis Detection Method by PSNR and RGB Intensity

Identify the Attack in Embedded Image with Steganalysis Detection Method by PSNR and RGB Intensity Internatonal Journal of Computer Systems (ISSN: 394-1065), Volume 03 Issue 07, July, 016 Avalable at http://www.jcsonlne.com/ Identfy the Attack n Embedded Image wth Steganalyss Detecton Method by PSNR

More information

Face Recognition University at Buffalo CSE666 Lecture Slides Resources:

Face Recognition University at Buffalo CSE666 Lecture Slides Resources: Face Recognton Unversty at Buffalo CSE666 Lecture Sldes Resources: http://www.face-rec.org/algorthms/ Overvew of face recognton algorthms Correlaton - Pxel based correspondence between two face mages Structural

More information

Enhanced AMBTC for Image Compression using Block Classification and Interpolation

Enhanced AMBTC for Image Compression using Block Classification and Interpolation Internatonal Journal of Computer Applcatons (0975 8887) Volume 5 No.0, August 0 Enhanced AMBTC for Image Compresson usng Block Classfcaton and Interpolaton S. Vmala Dept. of Comp. Scence Mother Teresa

More information

Assignment # 2. Farrukh Jabeen Algorithms 510 Assignment #2 Due Date: June 15, 2009.

Assignment # 2. Farrukh Jabeen Algorithms 510 Assignment #2 Due Date: June 15, 2009. Farrukh Jabeen Algorthms 51 Assgnment #2 Due Date: June 15, 29. Assgnment # 2 Chapter 3 Dscrete Fourer Transforms Implement the FFT for the DFT. Descrbed n sectons 3.1 and 3.2. Delverables: 1. Concse descrpton

More information

A Fast Visual Tracking Algorithm Based on Circle Pixels Matching

A Fast Visual Tracking Algorithm Based on Circle Pixels Matching A Fast Vsual Trackng Algorthm Based on Crcle Pxels Matchng Zhqang Hou hou_zhq@sohu.com Chongzhao Han czhan@mal.xjtu.edu.cn Ln Zheng Abstract: A fast vsual trackng algorthm based on crcle pxels matchng

More information

Information Hiding Watermarking Detection Technique by PSNR and RGB Intensity

Information Hiding Watermarking Detection Technique by PSNR and RGB Intensity www..org 3 Informaton Hdng Watermarkng Detecton Technque by PSNR and RGB Intensty 1 Neha Chauhan, Akhlesh A. Waoo, 3 P. S. Patheja 1 Research Scholar, BIST, Bhopal, Inda.,3 Assstant Professor, BIST, Bhopal,

More information

KEYWORDS: Digital Image Watermarking, Discrete Wavelet Transform, General Regression Neural Network, Human Visual System. 1.

KEYWORDS: Digital Image Watermarking, Discrete Wavelet Transform, General Regression Neural Network, Human Visual System. 1. An Adaptve Dgtal Image Watermarkng Based on Image Features n Dscrete Wavelet Transform Doman and General Regresson Neural Network Ayoub Taher Group of IT Engneerng, Payam Noor Unversty, Broujen, Iran ABSTRACT:

More information

Discrete Cosine Transform Optimization in Image Compression Based on Genetic Algorithm

Discrete Cosine Transform Optimization in Image Compression Based on Genetic Algorithm 015 8th Internatonal Congress on Image and Sgnal Processng (CISP 015) Dscrete Cosne Transform Optmzaton n Image Compresson Based on Genetc Algorthm LIU Yuan-yuan 1 CHE He-xn 1 College of Communcaton Engneerng,

More information

Research Article High Capacity Reversible Watermarking for Audio by Histogram Shifting and Predicted Error Expansion

Research Article High Capacity Reversible Watermarking for Audio by Histogram Shifting and Predicted Error Expansion e Scentfc World Journal, Artcle ID 656251, 7 pages http://dx.do.org/1.1155/214/656251 Research Artcle Hgh Capacty Reversble Watermarkng for Audo by Hstogram Shftng and Predcted Error Expanson Fe Wang,

More information

NUMERICAL SOLVING OPTIMAL CONTROL PROBLEMS BY THE METHOD OF VARIATIONS

NUMERICAL SOLVING OPTIMAL CONTROL PROBLEMS BY THE METHOD OF VARIATIONS ARPN Journal of Engneerng and Appled Scences 006-017 Asan Research Publshng Network (ARPN). All rghts reserved. NUMERICAL SOLVING OPTIMAL CONTROL PROBLEMS BY THE METHOD OF VARIATIONS Igor Grgoryev, Svetlana

More information

Digital Video Watermarking using Discrete Wavelet Transform and Principal Component Analysis

Digital Video Watermarking using Discrete Wavelet Transform and Principal Component Analysis Internatonal Journal of Wsdom Based Computng, Vol. 1 (2), August 2011 7 Dgtal Vdeo Watermarkng usng Dscrete Wavelet Transform and Prncpal Component Analyss Sanjana Snha, Prajnat Bardhan, Swarnal Pramanck,

More information

A Binarization Algorithm specialized on Document Images and Photos

A Binarization Algorithm specialized on Document Images and Photos A Bnarzaton Algorthm specalzed on Document mages and Photos Ergna Kavalleratou Dept. of nformaton and Communcaton Systems Engneerng Unversty of the Aegean kavalleratou@aegean.gr Abstract n ths paper, a

More information

Coding Artifact Reduction Using Edge Map Guided Adaptive and Fuzzy Filter

Coding Artifact Reduction Using Edge Map Guided Adaptive and Fuzzy Filter MEL A MITSUBISHI ELECTIC ESEACH LABOATOY http://www.merl.com Codng Artfact educton Usng Edge Map Guded Adaptve and Fuzzy Flter Hao-Song Kong Yao Ne Anthony Vetro Hufang Sun Kenneth E. Barner T-2004-056

More information

Deep learning is a good steganalysis tool when embedding key is reused for different images, even if there is a cover source-mismatch

Deep learning is a good steganalysis tool when embedding key is reused for different images, even if there is a cover source-mismatch Deep learnng s a good steganalyss tool when embeddng key s reused for dfferent mages, even f there s a cover source-msmatch Lonel PIBRE 2,3, Jérôme PASQUET 2,3, Dno IENCO 2,3, Marc CHAUMONT 1,2,3 (1) Unversty

More information

A Comparison between Digital Images Watermarking in Tow Different Color Spaces Using DWT2*

A Comparison between Digital Images Watermarking in Tow Different Color Spaces Using DWT2* A Comparson between Dgtal s ng n Tow Dfferent Color Spaces Usng DWT* Mehd Khall Natonal Academy of Scence of Armena Yerevan, Armena e-mal: khall.mehd@yahoo.com ABSTRACT A novel dgtal watermarkng for ownershp

More information

An Image Fusion Approach Based on Segmentation Region

An Image Fusion Approach Based on Segmentation Region Rong Wang, L-Qun Gao, Shu Yang, Yu-Hua Cha, and Yan-Chun Lu An Image Fuson Approach Based On Segmentaton Regon An Image Fuson Approach Based on Segmentaton Regon Rong Wang, L-Qun Gao, Shu Yang 3, Yu-Hua

More information

Research and Application of Fingerprint Recognition Based on MATLAB

Research and Application of Fingerprint Recognition Based on MATLAB Send Orders for Reprnts to reprnts@benthamscence.ae The Open Automaton and Control Systems Journal, 205, 7, 07-07 Open Access Research and Applcaton of Fngerprnt Recognton Based on MATLAB Nng Lu* Department

More information

Robust Video Watermarking Using Image Normalization, Motion Vector and Perceptual Information

Robust Video Watermarking Using Image Normalization, Motion Vector and Perceptual Information Robust Vdeo Watermarkng Usng Image ormalzaton, Moton Vector and Perceptual Informaton Cedllo-Hernández Antono 1, Cedllo-Hernández Manuel 1, akano-myatake Marko 1, García-Vázquez Mreya S. 2 1 Postgraduate

More information

Learning the Kernel Parameters in Kernel Minimum Distance Classifier

Learning the Kernel Parameters in Kernel Minimum Distance Classifier Learnng the Kernel Parameters n Kernel Mnmum Dstance Classfer Daoqang Zhang 1,, Songcan Chen and Zh-Hua Zhou 1* 1 Natonal Laboratory for Novel Software Technology Nanjng Unversty, Nanjng 193, Chna Department

More information

Detection of an Object by using Principal Component Analysis

Detection of an Object by using Principal Component Analysis Detecton of an Object by usng Prncpal Component Analyss 1. G. Nagaven, 2. Dr. T. Sreenvasulu Reddy 1. M.Tech, Department of EEE, SVUCE, Trupath, Inda. 2. Assoc. Professor, Department of ECE, SVUCE, Trupath,

More information

A Hybrid Digital Image Watermarking based on Discrete Wavelet Transform, Discrete Cosine Transform, and General Regression Neural Network

A Hybrid Digital Image Watermarking based on Discrete Wavelet Transform, Discrete Cosine Transform, and General Regression Neural Network A Hybrd Dgtal Image Watermarkng based on Dscrete Wavelet Transform, Dscrete Cosne Transform, and General Regresson Neural Network Ayoub Taher ; ABSTRACT In ths paper, a new hybrd dgtal watermarkng technque

More information

RECOGNIZING GENDER THROUGH FACIAL IMAGE USING SUPPORT VECTOR MACHINE

RECOGNIZING GENDER THROUGH FACIAL IMAGE USING SUPPORT VECTOR MACHINE Journal of Theoretcal and Appled Informaton Technology 30 th June 06. Vol.88. No.3 005-06 JATIT & LLS. All rghts reserved. ISSN: 99-8645 www.jatt.org E-ISSN: 87-395 RECOGNIZING GENDER THROUGH FACIAL IMAGE

More information

Solving two-person zero-sum game by Matlab

Solving two-person zero-sum game by Matlab Appled Mechancs and Materals Onlne: 2011-02-02 ISSN: 1662-7482, Vols. 50-51, pp 262-265 do:10.4028/www.scentfc.net/amm.50-51.262 2011 Trans Tech Publcatons, Swtzerland Solvng two-person zero-sum game by

More information

High-Boost Mesh Filtering for 3-D Shape Enhancement

High-Boost Mesh Filtering for 3-D Shape Enhancement Hgh-Boost Mesh Flterng for 3-D Shape Enhancement Hrokazu Yagou Λ Alexander Belyaev y Damng We z Λ y z ; ; Shape Modelng Laboratory, Unversty of Azu, Azu-Wakamatsu 965-8580 Japan y Computer Graphcs Group,

More information

IAJIT First Online Publication

IAJIT First Online Publication Content Protecton n Vdeo Data Based on Robust Dgtal Watermarkng Resstant to Intentonal and Unntentonal Attacks Mad Masoum and Shervn Amr Department of Electrcal Engneerng, Islamc Azad Unversty Qazvn Branch,

More information

Lecture 4: Principal components

Lecture 4: Principal components /3/6 Lecture 4: Prncpal components 3..6 Multvarate lnear regresson MLR s optmal for the estmaton data...but poor for handlng collnear data Covarance matrx s not nvertble (large condton number) Robustness

More information

Performance Analysis of Data Hiding in MPEG-4 AAC Audio *

Performance Analysis of Data Hiding in MPEG-4 AAC Audio * TSINGHUA SCIENCE AND TECHNOLOGY ISSNll1007-0214ll07/21llpp55-61 Volume 14, Number 1, February 2009 Performance Analyss of Data Hdng n MPEG-4 AAC Audo * XU Shuzheng ( ) **, ZHANG Peng ( ), WANG Pengjun

More information

Kent State University CS 4/ Design and Analysis of Algorithms. Dept. of Math & Computer Science LECT-16. Dynamic Programming

Kent State University CS 4/ Design and Analysis of Algorithms. Dept. of Math & Computer Science LECT-16. Dynamic Programming CS 4/560 Desgn and Analyss of Algorthms Kent State Unversty Dept. of Math & Computer Scence LECT-6 Dynamc Programmng 2 Dynamc Programmng Dynamc Programmng, lke the dvde-and-conquer method, solves problems

More information

Problem Definitions and Evaluation Criteria for Computational Expensive Optimization

Problem Definitions and Evaluation Criteria for Computational Expensive Optimization Problem efntons and Evaluaton Crtera for Computatonal Expensve Optmzaton B. Lu 1, Q. Chen and Q. Zhang 3, J. J. Lang 4, P. N. Suganthan, B. Y. Qu 6 1 epartment of Computng, Glyndwr Unversty, UK Faclty

More information

MULTISPECTRAL IMAGES CLASSIFICATION BASED ON KLT AND ATR AUTOMATIC TARGET RECOGNITION

MULTISPECTRAL IMAGES CLASSIFICATION BASED ON KLT AND ATR AUTOMATIC TARGET RECOGNITION MULTISPECTRAL IMAGES CLASSIFICATION BASED ON KLT AND ATR AUTOMATIC TARGET RECOGNITION Paulo Quntlano 1 & Antono Santa-Rosa 1 Federal Polce Department, Brasla, Brazl. E-mals: quntlano.pqs@dpf.gov.br and

More information

Parallelism for Nested Loops with Non-uniform and Flow Dependences

Parallelism for Nested Loops with Non-uniform and Flow Dependences Parallelsm for Nested Loops wth Non-unform and Flow Dependences Sam-Jn Jeong Dept. of Informaton & Communcaton Engneerng, Cheonan Unversty, 5, Anseo-dong, Cheonan, Chungnam, 330-80, Korea. seong@cheonan.ac.kr

More information

Music/Voice Separation using the Similarity Matrix. Zafar Rafii & Bryan Pardo

Music/Voice Separation using the Similarity Matrix. Zafar Rafii & Bryan Pardo Musc/Voce Separaton usng the Smlarty Matrx Zafar Raf & Bryan Pardo Introducton Muscal peces are often characterzed by an underlyng repeatng structure over whch varyng elements are supermposed Propellerheads

More information

[33]. As we have seen there are different algorithms for compressing the speech. The

[33]. As we have seen there are different algorithms for compressing the speech. The 49 5. LD-CELP SPEECH CODER 5.1 INTRODUCTION Speech compresson s one of the mportant doman n dgtal communcaton [33]. As we have seen there are dfferent algorthms for compressng the speech. The mportant

More information

Brushlet Features for Texture Image Retrieval

Brushlet Features for Texture Image Retrieval DICTA00: Dgtal Image Computng Technques and Applcatons, 1 January 00, Melbourne, Australa 1 Brushlet Features for Texture Image Retreval Chbao Chen and Kap Luk Chan Informaton System Research Lab, School

More information

Lecture #15 Lecture Notes

Lecture #15 Lecture Notes Lecture #15 Lecture Notes The ocean water column s very much a 3-D spatal entt and we need to represent that structure n an economcal way to deal wth t n calculatons. We wll dscuss one way to do so, emprcal

More information

SLAM Summer School 2006 Practical 2: SLAM using Monocular Vision

SLAM Summer School 2006 Practical 2: SLAM using Monocular Vision SLAM Summer School 2006 Practcal 2: SLAM usng Monocular Vson Javer Cvera, Unversty of Zaragoza Andrew J. Davson, Imperal College London J.M.M Montel, Unversty of Zaragoza. josemar@unzar.es, jcvera@unzar.es,

More information

An Optimal Algorithm for Prufer Codes *

An Optimal Algorithm for Prufer Codes * J. Software Engneerng & Applcatons, 2009, 2: 111-115 do:10.4236/jsea.2009.22016 Publshed Onlne July 2009 (www.scrp.org/journal/jsea) An Optmal Algorthm for Prufer Codes * Xaodong Wang 1, 2, Le Wang 3,

More information

Meta-heuristics for Multidimensional Knapsack Problems

Meta-heuristics for Multidimensional Knapsack Problems 2012 4th Internatonal Conference on Computer Research and Development IPCSIT vol.39 (2012) (2012) IACSIT Press, Sngapore Meta-heurstcs for Multdmensonal Knapsack Problems Zhbao Man + Computer Scence Department,

More information

Positive Semi-definite Programming Localization in Wireless Sensor Networks

Positive Semi-definite Programming Localization in Wireless Sensor Networks Postve Sem-defnte Programmng Localzaton n Wreless Sensor etworks Shengdong Xe 1,, Jn Wang, Aqun Hu 1, Yunl Gu, Jang Xu, 1 School of Informaton Scence and Engneerng, Southeast Unversty, 10096, anjng Computer

More information

A Lossless Watermarking Scheme for Halftone Image Authentication

A Lossless Watermarking Scheme for Halftone Image Authentication IJCSNS Internatonal Journal of Computer Scence and Network Securty, VOL.6 No.2B, February 2006 147 A Lossless Watermarkng Scheme for Halftone Image Authentcaton Jeng-Shyang Pan, Hao Luo, and Zhe-Mng Lu,

More information

Programming in Fortran 90 : 2017/2018

Programming in Fortran 90 : 2017/2018 Programmng n Fortran 90 : 2017/2018 Programmng n Fortran 90 : 2017/2018 Exercse 1 : Evaluaton of functon dependng on nput Wrte a program who evaluate the functon f (x,y) for any two user specfed values

More information

Face Recognition Based on SVM and 2DPCA

Face Recognition Based on SVM and 2DPCA Vol. 4, o. 3, September, 2011 Face Recognton Based on SVM and 2DPCA Tha Hoang Le, Len Bu Faculty of Informaton Technology, HCMC Unversty of Scence Faculty of Informaton Scences and Engneerng, Unversty

More information

Maximum Variance Combined with Adaptive Genetic Algorithm for Infrared Image Segmentation

Maximum Variance Combined with Adaptive Genetic Algorithm for Infrared Image Segmentation Internatonal Conference on Logstcs Engneerng, Management and Computer Scence (LEMCS 5) Maxmum Varance Combned wth Adaptve Genetc Algorthm for Infrared Image Segmentaton Huxuan Fu College of Automaton Harbn

More information

Using Counter-propagation Neural Network for Digital Audio Watermarking

Using Counter-propagation Neural Network for Digital Audio Watermarking Usng Counter-propagaton Neural Network for Dgtal Audo Watermarkng Chuan-Yu Chang and Wen-Chh Shen Graduate School of Computer Scence and Informaton Engneerng Natonal Yunln Unversty of Scence & Technology

More information

Subspace clustering. Clustering. Fundamental to all clustering techniques is the choice of distance measure between data points;

Subspace clustering. Clustering. Fundamental to all clustering techniques is the choice of distance measure between data points; Subspace clusterng Clusterng Fundamental to all clusterng technques s the choce of dstance measure between data ponts; D q ( ) ( ) 2 x x = x x, j k = 1 k jk Squared Eucldean dstance Assumpton: All features

More information

Resolving Ambiguity in Depth Extraction for Motion Capture using Genetic Algorithm

Resolving Ambiguity in Depth Extraction for Motion Capture using Genetic Algorithm Resolvng Ambguty n Depth Extracton for Moton Capture usng Genetc Algorthm Yn Yee Wa, Ch Kn Chow, Tong Lee Computer Vson and Image Processng Laboratory Dept. of Electronc Engneerng The Chnese Unversty of

More information

A Modified Median Filter for the Removal of Impulse Noise Based on the Support Vector Machines

A Modified Median Filter for the Removal of Impulse Noise Based on the Support Vector Machines A Modfed Medan Flter for the Removal of Impulse Nose Based on the Support Vector Machnes H. GOMEZ-MORENO, S. MALDONADO-BASCON, F. LOPEZ-FERRERAS, M. UTRILLA- MANSO AND P. GIL-JIMENEZ Departamento de Teoría

More information

Steganography System using Slantlet Transform

Steganography System using Slantlet Transform ISSN:43-6999 Journal of Inmaton Communcaton and Intellgence Systems (JICIS) Volume Issue February 06 Steganography System usng Slantlet Transm Ryadh Bassl Abduljabbar Abstract An approach hdng nmaton has

More information

Performance Assessment and Fault Diagnosis for Hydraulic Pump Based on WPT and SOM

Performance Assessment and Fault Diagnosis for Hydraulic Pump Based on WPT and SOM Performance Assessment and Fault Dagnoss for Hydraulc Pump Based on WPT and SOM Be Jkun, Lu Chen and Wang Zl PERFORMANCE ASSESSMENT AND FAULT DIAGNOSIS FOR HYDRAULIC PUMP BASED ON WPT AND SOM. Be Jkun,

More information

An Application of the Dulmage-Mendelsohn Decomposition to Sparse Null Space Bases of Full Row Rank Matrices

An Application of the Dulmage-Mendelsohn Decomposition to Sparse Null Space Bases of Full Row Rank Matrices Internatonal Mathematcal Forum, Vol 7, 2012, no 52, 2549-2554 An Applcaton of the Dulmage-Mendelsohn Decomposton to Sparse Null Space Bases of Full Row Rank Matrces Mostafa Khorramzadeh Department of Mathematcal

More information

Invariant Shape Object Recognition Using B-Spline, Cardinal Spline, and Genetic Algorithm

Invariant Shape Object Recognition Using B-Spline, Cardinal Spline, and Genetic Algorithm Proceedngs of the 5th WSEAS Int. Conf. on Sgnal Processng, Robotcs and Automaton, Madrd, Span, February 5-7, 6 (pp4-45) Invarant Shape Obect Recognton Usng B-Splne, Cardnal Splne, and Genetc Algorthm PISIT

More information

User Authentication Based On Behavioral Mouse Dynamics Biometrics

User Authentication Based On Behavioral Mouse Dynamics Biometrics User Authentcaton Based On Behavoral Mouse Dynamcs Bometrcs Chee-Hyung Yoon Danel Donghyun Km Department of Computer Scence Department of Computer Scence Stanford Unversty Stanford Unversty Stanford, CA

More information

Lecture 5: Multilayer Perceptrons

Lecture 5: Multilayer Perceptrons Lecture 5: Multlayer Perceptrons Roger Grosse 1 Introducton So far, we ve only talked about lnear models: lnear regresson and lnear bnary classfers. We noted that there are functons that can t be represented

More information

Network Intrusion Detection Based on PSO-SVM

Network Intrusion Detection Based on PSO-SVM TELKOMNIKA Indonesan Journal of Electrcal Engneerng Vol.1, No., February 014, pp. 150 ~ 1508 DOI: http://dx.do.org/10.11591/telkomnka.v1.386 150 Network Intruson Detecton Based on PSO-SVM Changsheng Xang*

More information

Reducing Frame Rate for Object Tracking

Reducing Frame Rate for Object Tracking Reducng Frame Rate for Object Trackng Pavel Korshunov 1 and We Tsang Oo 2 1 Natonal Unversty of Sngapore, Sngapore 11977, pavelkor@comp.nus.edu.sg 2 Natonal Unversty of Sngapore, Sngapore 11977, oowt@comp.nus.edu.sg

More information

Private Information Retrieval (PIR)

Private Information Retrieval (PIR) 2 Levente Buttyán Problem formulaton Alce wants to obtan nformaton from a database, but she does not want the database to learn whch nformaton she wanted e.g., Alce s an nvestor queryng a stock-market

More information

The Research of Ellipse Parameter Fitting Algorithm of Ultrasonic Imaging Logging in the Casing Hole

The Research of Ellipse Parameter Fitting Algorithm of Ultrasonic Imaging Logging in the Casing Hole Appled Mathematcs, 04, 5, 37-3 Publshed Onlne May 04 n ScRes. http://www.scrp.org/journal/am http://dx.do.org/0.436/am.04.584 The Research of Ellpse Parameter Fttng Algorthm of Ultrasonc Imagng Loggng

More information

CLASSIFICATION OF ULTRASONIC SIGNALS

CLASSIFICATION OF ULTRASONIC SIGNALS The 8 th Internatonal Conference of the Slovenan Socety for Non-Destructve Testng»Applcaton of Contemporary Non-Destructve Testng n Engneerng«September -3, 5, Portorož, Slovena, pp. 7-33 CLASSIFICATION

More information

UB at GeoCLEF Department of Geography Abstract

UB at GeoCLEF Department of Geography   Abstract UB at GeoCLEF 2006 Mguel E. Ruz (1), Stuart Shapro (2), June Abbas (1), Slva B. Southwck (1) and Davd Mark (3) State Unversty of New York at Buffalo (1) Department of Lbrary and Informaton Studes (2) Department

More information

A Robust Webpage Information Hiding Method Based on the Slash of Tag

A Robust Webpage Information Hiding Method Based on the Slash of Tag Advanced Engneerng Forum Onlne: 2012-09-26 ISSN: 2234-991X, Vols. 6-7, pp 361-366 do:10.4028/www.scentfc.net/aef.6-7.361 2012 Trans Tech Publcatons, Swtzerland A Robust Webpage Informaton Hdng Method Based

More information

Feature Reduction and Selection

Feature Reduction and Selection Feature Reducton and Selecton Dr. Shuang LIANG School of Software Engneerng TongJ Unversty Fall, 2012 Today s Topcs Introducton Problems of Dmensonalty Feature Reducton Statstc methods Prncpal Components

More information

EVALUATION OF THE PERFORMANCES OF ARTIFICIAL BEE COLONY AND INVASIVE WEED OPTIMIZATION ALGORITHMS ON THE MODIFIED BENCHMARK FUNCTIONS

EVALUATION OF THE PERFORMANCES OF ARTIFICIAL BEE COLONY AND INVASIVE WEED OPTIMIZATION ALGORITHMS ON THE MODIFIED BENCHMARK FUNCTIONS Academc Research Internatonal ISS-L: 3-9553, ISS: 3-9944 Vol., o. 3, May 0 EVALUATIO OF THE PERFORMACES OF ARTIFICIAL BEE COLOY AD IVASIVE WEED OPTIMIZATIO ALGORITHMS O THE MODIFIED BECHMARK FUCTIOS Dlay

More information

Robust and Reversible Relational Database Watermarking Algorithm Based on Clustering and Polar Angle Expansion

Robust and Reversible Relational Database Watermarking Algorithm Based on Clustering and Polar Angle Expansion Robust and Reversble Relatonal Database Watermarkng Algorthm Based on Clusterng and Polar Angle Expanson Zhyong L, Junmn Lu and Wecheng Tao College of Informaton Scence and Engneerng, Hunan Unversty, Changsha,

More information

Tsinghua University at TAC 2009: Summarizing Multi-documents by Information Distance

Tsinghua University at TAC 2009: Summarizing Multi-documents by Information Distance Tsnghua Unversty at TAC 2009: Summarzng Mult-documents by Informaton Dstance Chong Long, Mnle Huang, Xaoyan Zhu State Key Laboratory of Intellgent Technology and Systems, Tsnghua Natonal Laboratory for

More information

BOOSTING CLASSIFICATION ACCURACY WITH SAMPLES CHOSEN FROM A VALIDATION SET

BOOSTING CLASSIFICATION ACCURACY WITH SAMPLES CHOSEN FROM A VALIDATION SET 1 BOOSTING CLASSIFICATION ACCURACY WITH SAMPLES CHOSEN FROM A VALIDATION SET TZU-CHENG CHUANG School of Electrcal and Computer Engneerng, Purdue Unversty, West Lafayette, Indana 47907 SAUL B. GELFAND School

More information

A PATTERN RECOGNITION APPROACH TO IMAGE SEGMENTATION

A PATTERN RECOGNITION APPROACH TO IMAGE SEGMENTATION 1 THE PUBLISHING HOUSE PROCEEDINGS OF THE ROMANIAN ACADEMY, Seres A, OF THE ROMANIAN ACADEMY Volume 4, Number 2/2003, pp.000-000 A PATTERN RECOGNITION APPROACH TO IMAGE SEGMENTATION Tudor BARBU Insttute

More information

Vector Quantization Codebook Design and Application Based on the Clonal Selection Algorithm

Vector Quantization Codebook Design and Application Based on the Clonal Selection Algorithm Sensors & Transducers 03 by IFSA http://www.sensorsportal.com Vector Quantzaton Codeboo Desgn and Applcaton Based on the Clonal Selecton Algorthm Menglng Zhao, Hongwe Lu School of Scence, Xdan Unversty,

More information

Outline. Self-Organizing Maps (SOM) US Hebbian Learning, Cntd. The learning rule is Hebbian like:

Outline. Self-Organizing Maps (SOM) US Hebbian Learning, Cntd. The learning rule is Hebbian like: Self-Organzng Maps (SOM) Turgay İBRİKÇİ, PhD. Outlne Introducton Structures of SOM SOM Archtecture Neghborhoods SOM Algorthm Examples Summary 1 2 Unsupervsed Hebban Learnng US Hebban Learnng, Cntd 3 A

More information

Some Tutorial about the Project. Computer Graphics

Some Tutorial about the Project. Computer Graphics Some Tutoral about the Project Lecture 6 Rastersaton, Antalasng, Texture Mappng, I have already covered all the topcs needed to fnsh the 1 st practcal Today, I wll brefly explan how to start workng on

More information

Network Coding as a Dynamical System

Network Coding as a Dynamical System Network Codng as a Dynamcal System Narayan B. Mandayam IEEE Dstngushed Lecture (jont work wth Dan Zhang and a Su) Department of Electrcal and Computer Engneerng Rutgers Unversty Outlne. Introducton 2.

More information

Related-Mode Attacks on CTR Encryption Mode

Related-Mode Attacks on CTR Encryption Mode Internatonal Journal of Network Securty, Vol.4, No.3, PP.282 287, May 2007 282 Related-Mode Attacks on CTR Encrypton Mode Dayn Wang, Dongda Ln, and Wenlng Wu (Correspondng author: Dayn Wang) Key Laboratory

More information

A Secured Method for Image Steganography Based On Pixel Values

A Secured Method for Image Steganography Based On Pixel Values A Secured Method for Image Steganography Based On Pxel Values Tarun Gulat #, Sanskrt Gupta * # Assocate Professor, Electroncs and Communcaton Engneerng Department, MMEC, M.M.U., Mullana, Ambala, Haryana,

More information

A Novel Similarity Measure using a Normalized Hausdorff Distance for Trademarks Retrieval Based on Genetic Algorithm

A Novel Similarity Measure using a Normalized Hausdorff Distance for Trademarks Retrieval Based on Genetic Algorithm Internatonal Journal of Computer Informaton Systems and Industral Management Applcatons (IJCISIM) ISSN: 50-7988 Vol. (009), pp.3-30 http://www.mrlabs.org/jcsm A Novel Smlarty Measure usng a Normalzed Hausdorff

More information

DWT-BAT Based Medical Image Watermarking For Telemedicine Applications

DWT-BAT Based Medical Image Watermarking For Telemedicine Applications DWT-BAT Based Medcal Image Watermarkng For Telemedcne Applcatons 1 N.Venkatram, 2 L.S.S.Reddy, 3 P.V.V.Kshore, 1 K.L.Unversty, Dept of E.C.M, KL Unversty, Vaddeswaram, Green Felds, GUNTUR, AP, INDIA 2

More information

Specifications in 2001

Specifications in 2001 Specfcatons n 200 MISTY (updated : May 3, 2002) September 27, 200 Mtsubsh Electrc Corporaton Block Cpher Algorthm MISTY Ths document shows a complete descrpton of encrypton algorthm MISTY, whch are secret-key

More information

GENETIC ALGORITHMS APPLIED FOR PATTERN GENERATION FOR DOWNHOLE DYNAMOMETER CARDS

GENETIC ALGORITHMS APPLIED FOR PATTERN GENERATION FOR DOWNHOLE DYNAMOMETER CARDS GENETIC ALGORITHMS APPLIED FOR PATTERN GENERATION FOR DOWNHOLE DYNAMOMETER CARDS L. Schntman 1 ; B.C.Brandao 1 ; H.Lepkson 1 ; J.A.M. Felppe de Souza 2 ; J.F.S.Correa 3 1 Unversdade Federal da Baha- Brazl

More information

GA-Based Learning Algorithms to Identify Fuzzy Rules for Fuzzy Neural Networks

GA-Based Learning Algorithms to Identify Fuzzy Rules for Fuzzy Neural Networks Seventh Internatonal Conference on Intellgent Systems Desgn and Applcatons GA-Based Learnng Algorthms to Identfy Fuzzy Rules for Fuzzy Neural Networks K Almejall, K Dahal, Member IEEE, and A Hossan, Member

More information

K-means Optimization Clustering Algorithm Based on Hybrid PSO/GA Optimization and CS validity index

K-means Optimization Clustering Algorithm Based on Hybrid PSO/GA Optimization and CS validity index Orgnal Artcle Prnt ISSN: 3-6379 Onlne ISSN: 3-595X DOI: 0.7354/jss/07/33 K-means Optmzaton Clusterng Algorthm Based on Hybrd PSO/GA Optmzaton and CS valdty ndex K Jahanbn *, F Rahmanan, H Rezae 3, Y Farhang

More information

Video Watermarking Algorithm Based on Relative Relationship of DCT Coefficients

Video Watermarking Algorithm Based on Relative Relationship of DCT Coefficients 756 JOURAL OF COPUTERS, VOL. 8, O., OVEBER 03 Vdeo Watermarkng Algorthm Based on Relatve Relatonshp of DCT Coeffcents Cheng ngzh, Du Yanpng, Wang Yan Bejng Insttute of Graphc Communcaton, Bejng, Chna Emal:

More information

Image Emotional Semantic Retrieval Based on ELM

Image Emotional Semantic Retrieval Based on ELM Internatonal Conference on Logstcs Engneerng, Management and Computer Scence (LEMCS 2014) Image Emotonal Semantc Retreval Based on ELM Pele Zhang, Mn Yao, Shenzhang La College of computer scence & Technology

More information

Edge Detection in Noisy Images Using the Support Vector Machines

Edge Detection in Noisy Images Using the Support Vector Machines Edge Detecton n Nosy Images Usng the Support Vector Machnes Hlaro Gómez-Moreno, Saturnno Maldonado-Bascón, Francsco López-Ferreras Sgnal Theory and Communcatons Department. Unversty of Alcalá Crta. Madrd-Barcelona

More information

Classification / Regression Support Vector Machines

Classification / Regression Support Vector Machines Classfcaton / Regresson Support Vector Machnes Jeff Howbert Introducton to Machne Learnng Wnter 04 Topcs SVM classfers for lnearly separable classes SVM classfers for non-lnearly separable classes SVM

More information

Smoothing Spline ANOVA for variable screening

Smoothing Spline ANOVA for variable screening Smoothng Splne ANOVA for varable screenng a useful tool for metamodels tranng and mult-objectve optmzaton L. Rcco, E. Rgon, A. Turco Outlne RSM Introducton Possble couplng Test case MOO MOO wth Game Theory

More information

The Research of Support Vector Machine in Agricultural Data Classification

The Research of Support Vector Machine in Agricultural Data Classification The Research of Support Vector Machne n Agrcultural Data Classfcaton Le Sh, Qguo Duan, Xnmng Ma, Me Weng College of Informaton and Management Scence, HeNan Agrcultural Unversty, Zhengzhou 45000 Chna Zhengzhou

More information