Steganography System using Slantlet Transform

Size: px
Start display at page:

Download "Steganography System using Slantlet Transform"

Transcription

1 ISSN: Journal of Inmaton Communcaton and Intellgence Systems (JICIS) Volume Issue February 06 Steganography System usng Slantlet Transm Ryadh Bassl Abduljabbar Abstract An approach hdng nmaton has been proposed securng nmaton usng Slanlet transm and the T-codes. Same as the wavelet transm the Slantlet transm s better n compresson sgnal and good tme localzaton sgnal compresson than the conventonal transms lke (DCT) dscrete cosne transms. The proposed method provdes effcent securty because the orgnal secret mage s encrypted bee embeddng n order to buld a robust system that s no attacker can defeat t. Some of the well known fdelty measures lke (PSNR and AR) were used to measure the qualty of the Steganography mage and the mage after extracted. The results show that the stego-mage s closed related to the cover mage wth (PSNR) Peak Sgnal to Nose Rato s about 55dB. The recovered secret mage s extracted (00%) f stego-mage has no attack. These methods can provde good hdng capacty and mage qualty. Several types of attacks have been appled to the proposed methods n order to measure the robustness lke (compresson add nose and croppng). The proposed algorthm has been mplemented by usng computer smulaton program MATLAB verson 7.9 under wndows 7 operatng system by Mcrosoft cooperaton. Index Terms dscrete wavelet transm Accuracy Rato Hgh-Hgh band and Hgh-Low band. I. INTRODUCTION Steganography can be consdered as good technque securng nmaton by hdng t n cover mage. Inmaton to be hdden n the cover mage s known as the message and the modfed sgnal whch carres ths message s known as stego. In order to carry the stego data text mage audo and the vdeo are consdered as good meda carryng the hdden data []. Image can be consdered as a wde medum that can be used Steganography. The Steganography of mage depend on the lmted abltes of the Human Vsual System (HVS) all Steganography technques that are used n mage make advantage of the lmted abltes n human eye []. Ryadh Bassl Abduljabbar Dept. of Computer Technques Engneerng Djlah Unversty College (e-mal: ryadh.bassl@duc.edu.q). Baghdad Iraq. There are two wde felds hdng nmaton: Transm doman and the Spatal doman. In the spatal doman mage pxels are processed drectly lke the least sgnfcant bt algorthm. The computatons the spatal doman technques are smple and fast. But the dsadvantage of spatal doman technque s low capablty to bear some sgnal processng or nose. In contrast the transm doman technque the data mage s frst transmed to the frequency doman usng lnear transmatons lke DCT FFT or DWT by hdng the mage data n the coeffcents to get the orgnal mage nverse transm must be permed. In ths way the resulted modfed mage s called stego-mage. For that the frequency doman technques are found to be more robust than the tme doman technques [3]. II. THEORY Transmaton dea can be consdered mostly famlar to mathematcans and engneers. It s powerful tool that s used solvng problems n many felds of scence and engneerng areas nvolvng computer magng. The man dea of transm s changng a mathematcal quantty from one m to another whch t may seem unfamlar but can exhbt good features. Consderng the dscrete wavelet transm (DWT) that mplement by usng flter bank teraton; however but a lmted number of zero moments ths does not produce a dscrete-tme bass whch s very optmal as compared to tme localzaton [4]. The bass of Slantlet transm bass does not depend on flter bank teraton method; nstead of a dversty of flters s used every scale. By consderng two scale DWT terated usng flter bank shown n fgure (-a) and the equvalent m fgure (-b). The flter bank of Slantlet depends on the structure of ts equvalent m shown n fgure (-b) but s occuped by dfferent flters that are not products. For example a two channel case Daubeches flter s the shortest flter that makes the flter bank orthogonal wth K zero moments. For K= zero moments the terated flters of fgure (-b) are of values 0 and 4 but wth the Slantlet flter bank wth K= zero moments shown n fgure () has flter length 8 and 4. Thus the two-scale Slantlet flter bank has a flter length whch s two samples less than that of a two-scale terated Daubeches- flter bank. All Rghts Reserved 06 JICIS

2 ISSN: Journal of Inmaton Communcaton and Intellgence Systems (JICIS) Volume Issue February 06 Fg. (a) Flter banks DWT (b) The equvalent after usng DWT Manly flters that construct Slantlet bank flters are g (n) f (n) and h (n). The scale length the flters s ί that wll be proportonal to. Ths approxmaton s true nternatonal flter banks; however t s the same as Slantlet flter banks. In general the support of g (n) f (n) and h (n) wll be +. In fgure () t s obvous that the flterbank teraton s has more support than the Slantlet flters. One mportant note s the dfference the general l-scale case. The terated flter bank wth Daubeches length-4 flters analyzes scale wth a flter of length (3. ί )-. On the other hand the Slantlet flter bank analyzes scale wth the flter g (n) of length ί+. Gettng a reducton of samples by ί - the ί scale whch provde good tme localzaton propertes yeld good edges representaton. The mplementaton of Slantlet flter bank wth a parallel structure by usng dfferent flter each scale. The DWT s mplemented n a m of an terated flter bank utlzng a tree structure. By provdng a scale dlaton factor of the Slantlet has less frequency selectve because of the shorter support of component flters whereas DWT flters approxmately provde dlaton factor scale of [7 8]. The flters shown on the rght-hand sde of fgure () are [0 ]: ( ) G z z z z ( ) F z z z z z z z z ( ) H z z z z z z z z 7 III. SLANTLET FILTER BANK PROPERTIES [9-0] Fg. The dfference between two-scale terated D flterbank (left hand sde) and two scale (rght hand sde) Slantlet flterbank. In general the algorthm to obtan the l the scale length flter banks of Slantlet as follows: Consderng l flter banks l-scale Slantlet. Low pass flter (LPF) s the frst flter bank and the transfer functon of t s h (n). The transfer functon of the adjacent to the LPF flter bank has s f (n). Were Both f(n) and h (n) are followed wth a down samplng of l. Consderng the remaned l - flter banks wth transfer functon g (n) and ts shfted tme reverse g( + -)-n) = l - l -. Each g (n) and ts shfted tme reverse must be followed by + down samplng of each value [6].. Slantlet flter bank (equvalently dscrete-tme bass) s orthogonal.. Two zero moments each Slantlet flter bank. 3. Every flter bank has characterstc of an octave-band. 4. Each flter bank has scale-dlaton factor of. 5. The decomposton of each flter bank provdes mult resoluton. The hgh-pass channels are dscarded and passng only the low-pass channel outputs through the synthess flter bank n ths way lower resoluton verson of the orgnal sgnal s obtaned. 6. DWT flter bank dffer from Slantlet flter bank because Slantlet flter s less frequency selectve due to the shorter length of the flters. An mprovement tme localzaton wth a degradaton of frequency selectvty. 7. The flters of Slantlet transm are consdered to be pecewse lnear. 8. Fast because no structure tree and mplemented parallel structure. 9. Gves a hgh order of approxmaton. All Rghts Reserved 06 JICIS

3 ISSN: Journal of Inmaton Communcaton and Intellgence Systems (JICIS) Volume Issue February 06 IV. DERIVATION OF THE SLANTLET FILTERS COEFFICIENTS Because the sought-after flter g (n) s to be lnear t s descrbed by four parameters and can be wrtten as: a g ( n) a 00 0 a a 0 n ( n ) n 0... n... For each condton an algebrac equaton can be wrtten as n terms of the four parameters a 00 a 0 a 0 and a to obtan g (n) Where: t 3 (.( )) m m 0 s.( m ) 0 (( m ). s 3 mt)( m ) m 00 ( s0 t0) 0 ( s0 t0) a0 ( s t ) m s t a a a ( s ) t Note that the parameters a 00 a 0 a 0 and a depend on The same approach works f (n) and h (n). Usng agan a pecewse lnear m f (n) and h (n) can be wrtten n terms of eght unknown parameters b 00 b 0 b 0 b c 00 c 0 c 0 and c [9] The hgher symbols frequency occurrence codes are shorter than those codes the symbols that have a lower frequency occurrence. The Huffman technque depends on the creaton of nodes of bnary tree m. Type s nodes are ether a leaf code or an nternal node. At the begnnng all nodes are leaf nodes leaf codes have a symbol and weght (number of appearance) of the symbol and optonally a lnk to a parent node whch makes t easy to read the code (n reverse) startng from a leaf node. The Internal nodes contan symbol weght lnks to two small nodes an optonal lnk to a base node. Where bt zero represents followng the left chld and bt one represents the rght chld. A complete tree has n- nternal nodes and n leaf nodes. The man operaton starts wth the leaf nodes wth the probabltes of the represented symbols they contan The creaton of the chldren nodes wth smallest probablty such that the probablty of the new node s s equal to the probablty of sum of the chldren. Then the prevous nodes are merged nto one node and wth the new node beng now consdered the procedure s terated untl one node remans [-]. The Proposed procedure The procedure s mplemented usng the proposed Steganography system s used non-blnd method; t s called non-blnd because t needs the exact mage to recover the data (mage or text). In ths proposed method embeds ether text or mage n cover mage of gray scale or color. Hdng Image n Image Many stages are needed n order to hde mage n mage based on non-blnd method as n fgure (3). b h ( n) b 00 0 c f ( n) c 00 0 b b c c 0 n ( n ) 0 n ( n ) n 0... n... n 0... n... Huffman Encodng The mappng of one code word to one symbol s optmal wth Huffman codes. The secret text got each letter a bnary code assgned by Huffman; by usng mathematcal propertes of the source stream characters and the producton of the respectve codes of characters s done. The produced codes are of varable length an ntegral number of bts s used. Fg. 3 Block dagram hdng usng proposed method Encrypton Process: The secret mage frst encrypted by combnatonal permutaton encrypton Block Pxel and Bt permutaton as descrbed n the frst method. Converson Process: In ths stage the encrypted secret mage converted to bnary stream. Each pxel All Rghts Reserved 06 JICIS 3

4 ISSN: Journal of Inmaton Communcaton and Intellgence Systems (JICIS) Volume Issue February 06 converts from decmal to bnary to obtan D array of bnary then reshape D to D array of bnary stream. Embeddng Process: In ths process after the converson stage s completed frstly the cover mage s taken and -D (DSLT) s appled to the mage the second step s taken converted secret mage and embeddng one bt of bnary per pxel n cover mage. Durng embeddng the sze of the secret mage should be smaller enough than the cover mage. The embeddng steps are shown n fgure below and algorthm. k q: Scalng factor cover and secret mage. Step8: Obtan the encrypted-mage by usng the nverse of DSLT Step9: Fnsh. When the orgnal mage and carrer mage are both color the steps of embeddng and extracton process each color plane of mage are permed separately then combne the resultant of the three color planes n order to obtan color stego-mage. Extracton Process: When the recever wants to extract the secret mage many steps appled n the embeddng process are appled n a reverse manner as explaned below n algorthm 4 and fgure (5). Algorthm : Extracton Steps Second Proposed Method Input: Stego-mage Scalng factor (kq) Orgnal mage Keys Output: Secret mage. Step: The dmenson of encrypted mage should be power of. Step: Use Slantlet method to stego-mage and orgnal mage to get 4-subbands (LL LH HL and HH). Fg. 4 Schematc of embeddng steps usng proposed method Algorthm : Embeddng Steps Second Proposed Method Input: Secret mage Cover mage Scalng factor (q k). Output: Stego-mage. Step: The dmenson of carrer mage should be power of f not by requred paddng. Step: Encrypt the orgnal mage. Step3: Transm the encrypted orgnal mage to D bnary sequence. Step4: Convert the D bnary sequence to one dmenson bnary sequence. Step3: Extract the bnary strng by applyng the reverse of alpha blendng as n equaton: Sc=(S- k * C)/q Step4: Convert the bnary strng to decmal. Step5: Reshape from D decmal to D decmal mage. Step6: Reconstruct the encrypted secret mage by nverse DSLT. Step7: Apply decrypton steps based on keys. Step8: Dsplay secret mage. Step9: End. Step5: Apply Slantlet transm to the orgnal mage to get (LL LH HL and HH) sub bands by usng -D SLT. Step6: Check over flow. Step7: Embed the bnary sequence accordng to the mula of alpha blendng as n equaton: S=k*C + q*sc Where C: The coeffcent of cover mage Sc: Bnary stream of secret mage. All Rghts Reserved 06 JICIS 4

5 ISSN: Journal of Inmaton Communcaton and Intellgence Systems (JICIS) Volume Issue February 06 k q: scalng factor cover mage and secret text where each of k and q equal Step6: Reconstruct the stego-mage by applyng IDSLT. Step6: End. Fg. 5 Schematc of extractng steps usng proposed method Hdng Text n Image: By usng the same embeddng method alpha blendng method secret text can be embedded n gray or color mage and the only dfference s that the text s encoded and compressed by Huffman codng rather than permutaton encrypton. A bref descrpton the stages of embeddng s explaned as follow and s shown n fgure (6). Huffman Encodng Secret text: Frst the orgnal text should be encoded usng Huffman codng bee embeddng t nto carrer mage t. Bt stream length must be less than the space needs to embed n cover mage. Embeddng Secret Text n Image: The followng algorthm 5 and fgure (6) descrbe the embeddng steps hdng text n mage: Algorthm 3: Embeddng Secret Text second proposed method Input: Cover mage Text fle Scalng factor (k q) and Huffman table Output: Stego-Image Step: The dmenson of orgnal mage should be power of f not by requred paddng. Step: Apply Slantlet transm to carrer mage to get 4-subbands (LL LH HL and HH) by usng -D SLT. Step3: Encode the orgnal text by Huffman code as bnary sequence. Step4: Check the over flow of cover mage. Step5: Embed the bnary stream nto hgh frequency coeffcent of cover mage accordng to the mula of alpha blendng as n equaton: S=k * C + q * Scr Where: C: coeffcent of cover mage Scr: bnary stream of secret text Fg. 6 Schematc of embeddng text n mage steps usng proposed method Extracton Text from Image: To obtan the orgnal text from the encrypted mage the followng steps descrbed n algorthm 5 are appled and shown n fgure (7). Algorthm 4: Extracton text from mage Input: Stego-mage Scalng factor (k q) Orgnal mage Huffman table Output: Secret text Step: Dmenson of orgnal mage should be power of f not by requred paddng. Step: Use Slantlet transm to the encrypted mage and orgnal mage to get 4-subbands (LL LH HL and HH). Step3: Extract the bnary strng from hgh frequency coeffcent by applyng the reverse of Alpha-blendng as n equaton Scr =(S - k*c)/q Step4: Reconstruct the text from bnary strng by usng Huffman decoder steps. Step5: Dsplay the secret text. Step6: End. All Rghts Reserved 06 JICIS 5

6 ISSN: Journal of Inmaton Communcaton and Intellgence Systems (JICIS) Volume Issue February 06 Theree the TCP source can estmate the bottleneck Fg. 7 Schematc of extracton text from mage steps usng proposed method V. RESULTS Usng the weght method fgure (8) and fgure (9) show the results embeddng and extractng steps where the test mages used are gray mages (Barbara 5*5 and Ensten 8 *8). Fg. 9 The extracton steps weght method usng gray mages In fgure (0) the result of hstogram carrer mage hdden mage and the dfference between the two hstograms are shown. A sental data amount per RTT perod as shown n Eq. 3: Fg. 0 Hstogram embeddng and extractng gray mage usng second proposed method REFERENCES [] Faben A. P. Pettcolas Ross J. Anderson and Markus G. Kuhn Inmaton Hdng A Survey Proceedngs of the IEEE specal ssue on protecton of multmeda content Vol 87 No 7 pp July 999. [] Al-Saedy M. "Image n Image Steganography Usng Fourer Transm Codng" M.Sc. thess n computer scence Unversty of Technology 004. [3] Ndaa Hassan Abbas Robust and Hgh Capacty Watermarkng System usng Error Correctng Codes M.Sc.thess Electrcal Eng. Dep. Al-Mustansryah Unversty 005. [4] Mutt S.K. and Sushl Kumar Secure Image Steganography Based on Slantlet Transm Internatonal Conference on Methods and Models n Computer Scence 009. [5] Mutt S.K. and Sushl Kumar Data Hdng Technques Based On Wavelet-Lke Transm and Complex Wavelet Transms IEEE 00. [6] Al Daneshkhah Hassan Aghaena Seyed Hamed Seyed A More Secure Steganography Method n Spatal Doman Second Internatonal Conference on Intellgent Systems Modellng and Smulaton 0. [7] Khzar Hayat Wavelet Based Data Hdng of Dem n the Context of Realtme 3D Vsualzaton M.Sc.thess Master Research n Inmatcs Unversty de Montpeller II [8] Navneet Kumar Mandhan Watermarkng usng Decmal Sequence A Thess Lousana State Unversty and Agrcultural and Mechancal College n partal fulfllment of the requrements the degree of Master of Scence n Electrcal Engneerng August 004. [9] Katzenbesser S. Pettcolas F.A.P. Inmaton Hdng Technques Steganography and Dgtal Watermarkng Artech House Publshers 000. [0] Al Al-Ataby and Fawz Al-Nama A Modfed Hgh Capacty Image Steganography Technque Based on Wavelet Transm The Internatonal Arab Journal of Inmaton Technology Vol. 7 No. 4 October 00. [] Hkmat N. Abdullah Safa'a A. Al "Implementaton of 8-Pont Slantlet Transm Based Polynomal Cancellaton Codng-OFDM System Usng FPGA" 7th Internatonal Mult-Conference on Systems Sgnals and Devces 00. [] Cormen T.H. Leserson C.E. Rvest R.L. & Sten C. Introducton to Algorthms Second Edton. MIT Press and McGraw-Hll 00. Fg. 0 Hstogram embeddng and extractng gray mage usng second proposed method All Rghts Reserved 06 JICIS 6

Hybrid Non-Blind Color Image Watermarking

Hybrid Non-Blind Color Image Watermarking Hybrd Non-Blnd Color Image Watermarkng Ms C.N.Sujatha 1, Dr. P. Satyanarayana 2 1 Assocate Professor, Dept. of ECE, SNIST, Yamnampet, Ghatkesar Hyderabad-501301, Telangana 2 Professor, Dept. of ECE, AITS,

More information

Content Based Image Retrieval Using 2-D Discrete Wavelet with Texture Feature with Different Classifiers

Content Based Image Retrieval Using 2-D Discrete Wavelet with Texture Feature with Different Classifiers IOSR Journal of Electroncs and Communcaton Engneerng (IOSR-JECE) e-issn: 78-834,p- ISSN: 78-8735.Volume 9, Issue, Ver. IV (Mar - Apr. 04), PP 0-07 Content Based Image Retreval Usng -D Dscrete Wavelet wth

More information

A Secured Method for Image Steganography Based On Pixel Values

A Secured Method for Image Steganography Based On Pixel Values A Secured Method for Image Steganography Based On Pxel Values Tarun Gulat #, Sanskrt Gupta * # Assocate Professor, Electroncs and Communcaton Engneerng Department, MMEC, M.M.U., Mullana, Ambala, Haryana,

More information

Robust Watermarking for Text Images Based on Arnold Scrambling and DWT-DCT

Robust Watermarking for Text Images Based on Arnold Scrambling and DWT-DCT Internatonal Conference on Mechatroncs Electronc Industral and Control Engneerng (MEIC 015) Robust Watermarkng for Text Images Based on Arnold Scramblng and DWT-DCT Fan Wu College of Informaton Scence

More information

A Binarization Algorithm specialized on Document Images and Photos

A Binarization Algorithm specialized on Document Images and Photos A Bnarzaton Algorthm specalzed on Document mages and Photos Ergna Kavalleratou Dept. of nformaton and Communcaton Systems Engneerng Unversty of the Aegean kavalleratou@aegean.gr Abstract n ths paper, a

More information

Key-Selective Patchwork Method for Audio Watermarking

Key-Selective Patchwork Method for Audio Watermarking Internatonal Journal of Dgtal Content Technology and ts Applcatons Volume 4, Number 4, July 2010 Key-Selectve Patchwork Method for Audo Watermarkng 1 Ch-Man Pun, 2 Jng-Jng Jang 1, Frst and Correspondng

More information

Enhanced Watermarking Technique for Color Images using Visual Cryptography

Enhanced Watermarking Technique for Color Images using Visual Cryptography Informaton Assurance and Securty Letters 1 (2010) 024-028 Enhanced Watermarkng Technque for Color Images usng Vsual Cryptography Enas F. Al rawashdeh 1, Rawan I.Zaghloul 2 1 Balqa Appled Unversty, MIS

More information

A Fast Content-Based Multimedia Retrieval Technique Using Compressed Data

A Fast Content-Based Multimedia Retrieval Technique Using Compressed Data A Fast Content-Based Multmeda Retreval Technque Usng Compressed Data Borko Furht and Pornvt Saksobhavvat NSF Multmeda Laboratory Florda Atlantc Unversty, Boca Raton, Florda 3343 ABSTRACT In ths paper,

More information

Improvement of Spatial Resolution Using BlockMatching Based Motion Estimation and Frame. Integration

Improvement of Spatial Resolution Using BlockMatching Based Motion Estimation and Frame. Integration Improvement of Spatal Resoluton Usng BlockMatchng Based Moton Estmaton and Frame Integraton Danya Suga and Takayuk Hamamoto Graduate School of Engneerng, Tokyo Unversty of Scence, 6-3-1, Nuku, Katsuska-ku,

More information

A Hybrid Semi-Blind Gray Scale Image Watermarking Algorithm Based on DWT-SVD using Human Visual System Model

A Hybrid Semi-Blind Gray Scale Image Watermarking Algorithm Based on DWT-SVD using Human Visual System Model A Hybrd Sem-Blnd Gray Scale Image Watermarkng Algorthm Based on DWT-SVD usng Human Vsual System Model Rajesh Mehta r Scence & Engneerng, USICT Guru Gobnd Sngh Indrarprastha Unversty New Delh, Inda rajesh00ust@gmal.com

More information

High Payload Reversible Data Hiding Scheme Using Difference Segmentation and Histogram Shifting

High Payload Reversible Data Hiding Scheme Using Difference Segmentation and Histogram Shifting JOURNAL OF ELECTRONIC SCIENCE AND TECHNOLOGY, VOL. 11, NO. 1, MARCH 2013 9 Hgh Payload Reversble Data Hdng Scheme Usng Dfference Segmentaton and Hstogram Shftng Yung-Chen Chou and Huang-Chng L Abstract

More information

KEYWORDS: Digital Image Watermarking, Discrete Wavelet Transform, General Regression Neural Network, Human Visual System. 1.

KEYWORDS: Digital Image Watermarking, Discrete Wavelet Transform, General Regression Neural Network, Human Visual System. 1. An Adaptve Dgtal Image Watermarkng Based on Image Features n Dscrete Wavelet Transform Doman and General Regresson Neural Network Ayoub Taher Group of IT Engneerng, Payam Noor Unversty, Broujen, Iran ABSTRACT:

More information

An Image Compression Algorithm based on Wavelet Transform and LZW

An Image Compression Algorithm based on Wavelet Transform and LZW An Image Compresson Algorthm based on Wavelet Transform and LZW Png Luo a, Janyong Yu b School of Chongqng Unversty of Posts and Telecommuncatons, Chongqng, 400065, Chna Abstract a cylpng@63.com, b y27769864@sna.cn

More information

Cluster Analysis of Electrical Behavior

Cluster Analysis of Electrical Behavior Journal of Computer and Communcatons, 205, 3, 88-93 Publshed Onlne May 205 n ScRes. http://www.scrp.org/ournal/cc http://dx.do.org/0.4236/cc.205.350 Cluster Analyss of Electrcal Behavor Ln Lu Ln Lu, School

More information

A Hybrid Digital Image Watermarking based on Discrete Wavelet Transform, Discrete Cosine Transform, and General Regression Neural Network

A Hybrid Digital Image Watermarking based on Discrete Wavelet Transform, Discrete Cosine Transform, and General Regression Neural Network A Hybrd Dgtal Image Watermarkng based on Dscrete Wavelet Transform, Dscrete Cosne Transform, and General Regresson Neural Network Ayoub Taher ; ABSTRACT In ths paper, a new hybrd dgtal watermarkng technque

More information

Face Recognition University at Buffalo CSE666 Lecture Slides Resources:

Face Recognition University at Buffalo CSE666 Lecture Slides Resources: Face Recognton Unversty at Buffalo CSE666 Lecture Sldes Resources: http://www.face-rec.org/algorthms/ Overvew of face recognton algorthms Correlaton - Pxel based correspondence between two face mages Structural

More information

Load Balancing for Hex-Cell Interconnection Network

Load Balancing for Hex-Cell Interconnection Network Int. J. Communcatons, Network and System Scences,,, - Publshed Onlne Aprl n ScRes. http://www.scrp.org/journal/jcns http://dx.do.org/./jcns.. Load Balancng for Hex-Cell Interconnecton Network Saher Manaseer,

More information

A Comparison between Digital Images Watermarking in Tow Different Color Spaces Using DWT2*

A Comparison between Digital Images Watermarking in Tow Different Color Spaces Using DWT2* A Comparson between Dgtal s ng n Tow Dfferent Color Spaces Usng DWT* Mehd Khall Natonal Academy of Scence of Armena Yerevan, Armena e-mal: khall.mehd@yahoo.com ABSTRACT A novel dgtal watermarkng for ownershp

More information

Identify the Attack in Embedded Image with Steganalysis Detection Method by PSNR and RGB Intensity

Identify the Attack in Embedded Image with Steganalysis Detection Method by PSNR and RGB Intensity Internatonal Journal of Computer Systems (ISSN: 394-1065), Volume 03 Issue 07, July, 016 Avalable at http://www.jcsonlne.com/ Identfy the Attack n Embedded Image wth Steganalyss Detecton Method by PSNR

More information

Lecture 5: Multilayer Perceptrons

Lecture 5: Multilayer Perceptrons Lecture 5: Multlayer Perceptrons Roger Grosse 1 Introducton So far, we ve only talked about lnear models: lnear regresson and lnear bnary classfers. We noted that there are functons that can t be represented

More information

Parallel Inverse Halftoning by Look-Up Table (LUT) Partitioning

Parallel Inverse Halftoning by Look-Up Table (LUT) Partitioning Parallel Inverse Halftonng by Look-Up Table (LUT) Parttonng Umar F. Sddq and Sadq M. Sat umar@ccse.kfupm.edu.sa, sadq@kfupm.edu.sa KFUPM Box: Department of Computer Engneerng, Kng Fahd Unversty of Petroleum

More information

Information Hiding Watermarking Detection Technique by PSNR and RGB Intensity

Information Hiding Watermarking Detection Technique by PSNR and RGB Intensity www..org 3 Informaton Hdng Watermarkng Detecton Technque by PSNR and RGB Intensty 1 Neha Chauhan, Akhlesh A. Waoo, 3 P. S. Patheja 1 Research Scholar, BIST, Bhopal, Inda.,3 Assstant Professor, BIST, Bhopal,

More information

Performance Analysis of Data Hiding in MPEG-4 AAC Audio *

Performance Analysis of Data Hiding in MPEG-4 AAC Audio * TSINGHUA SCIENCE AND TECHNOLOGY ISSNll1007-0214ll07/21llpp55-61 Volume 14, Number 1, February 2009 Performance Analyss of Data Hdng n MPEG-4 AAC Audo * XU Shuzheng ( ) **, ZHANG Peng ( ), WANG Pengjun

More information

Image Representation & Visualization Basic Imaging Algorithms Shape Representation and Analysis. outline

Image Representation & Visualization Basic Imaging Algorithms Shape Representation and Analysis. outline mage Vsualzaton mage Vsualzaton mage Representaton & Vsualzaton Basc magng Algorthms Shape Representaton and Analyss outlne mage Representaton & Vsualzaton Basc magng Algorthms Shape Representaton and

More information

Detecting MP3Stego using Calibrated Side Information Features

Detecting MP3Stego using Calibrated Side Information Features 2628 JOURNAL OF SOFTWARE, VOL. 8, NO. 10, OCTOBER 2013 Detectng P3Stego usng Calbrated Sde Informaton Features Xanmn Yu School of Informaton Scence and Engneerng, Nngbo Unversty Emal: mlhappy1016@163.com

More information

Enhanced AMBTC for Image Compression using Block Classification and Interpolation

Enhanced AMBTC for Image Compression using Block Classification and Interpolation Internatonal Journal of Computer Applcatons (0975 8887) Volume 5 No.0, August 0 Enhanced AMBTC for Image Compresson usng Block Classfcaton and Interpolaton S. Vmala Dept. of Comp. Scence Mother Teresa

More information

Specifications in 2001

Specifications in 2001 Specfcatons n 200 MISTY (updated : May 3, 2002) September 27, 200 Mtsubsh Electrc Corporaton Block Cpher Algorthm MISTY Ths document shows a complete descrpton of encrypton algorthm MISTY, whch are secret-key

More information

FEATURE EXTRACTION. Dr. K.Vijayarekha. Associate Dean School of Electrical and Electronics Engineering SASTRA University, Thanjavur

FEATURE EXTRACTION. Dr. K.Vijayarekha. Associate Dean School of Electrical and Electronics Engineering SASTRA University, Thanjavur FEATURE EXTRACTION Dr. K.Vjayarekha Assocate Dean School of Electrcal and Electroncs Engneerng SASTRA Unversty, Thanjavur613 41 Jont Intatve of IITs and IISc Funded by MHRD Page 1 of 8 Table of Contents

More information

SLAM Summer School 2006 Practical 2: SLAM using Monocular Vision

SLAM Summer School 2006 Practical 2: SLAM using Monocular Vision SLAM Summer School 2006 Practcal 2: SLAM usng Monocular Vson Javer Cvera, Unversty of Zaragoza Andrew J. Davson, Imperal College London J.M.M Montel, Unversty of Zaragoza. josemar@unzar.es, jcvera@unzar.es,

More information

Semi-Fragile Watermarking Scheme for Authentication of JPEG Images

Semi-Fragile Watermarking Scheme for Authentication of JPEG Images Tamkang Journal of Scence and Engneerng, Vol. 10, No 1, pp. 5766 (2007) 57 Sem-Fragle Watermarkng Scheme for Authentcaton of JPEG Images Chh-Hung n 1 *, Tung-Shh Su 2 and Wen-Shyong Hseh 2,3 1 Department

More information

Grading Image Retrieval Based on DCT and DWT Compressed Domains Using Low-Level Features

Grading Image Retrieval Based on DCT and DWT Compressed Domains Using Low-Level Features Journal of Communcatons Vol. 0 No. January 0 Gradng Image Retreval Based on DCT and DWT Compressed Domans Usng Low-Level Features Chengyou Wang Xnyue Zhang Rongyang Shan and Xao Zhou School of echancal

More information

High resolution 3D Tau-p transform by matching pursuit Weiping Cao* and Warren S. Ross, Shearwater GeoServices

High resolution 3D Tau-p transform by matching pursuit Weiping Cao* and Warren S. Ross, Shearwater GeoServices Hgh resoluton 3D Tau-p transform by matchng pursut Wepng Cao* and Warren S. Ross, Shearwater GeoServces Summary The 3D Tau-p transform s of vtal sgnfcance for processng sesmc data acqured wth modern wde

More information

High-Boost Mesh Filtering for 3-D Shape Enhancement

High-Boost Mesh Filtering for 3-D Shape Enhancement Hgh-Boost Mesh Flterng for 3-D Shape Enhancement Hrokazu Yagou Λ Alexander Belyaev y Damng We z Λ y z ; ; Shape Modelng Laboratory, Unversty of Azu, Azu-Wakamatsu 965-8580 Japan y Computer Graphcs Group,

More information

IAJIT First Online Publication

IAJIT First Online Publication Content Protecton n Vdeo Data Based on Robust Dgtal Watermarkng Resstant to Intentonal and Unntentonal Attacks Mad Masoum and Shervn Amr Department of Electrcal Engneerng, Islamc Azad Unversty Qazvn Branch,

More information

Assignment # 2. Farrukh Jabeen Algorithms 510 Assignment #2 Due Date: June 15, 2009.

Assignment # 2. Farrukh Jabeen Algorithms 510 Assignment #2 Due Date: June 15, 2009. Farrukh Jabeen Algorthms 51 Assgnment #2 Due Date: June 15, 29. Assgnment # 2 Chapter 3 Dscrete Fourer Transforms Implement the FFT for the DFT. Descrbed n sectons 3.1 and 3.2. Delverables: 1. Concse descrpton

More information

IMPLEMENTATION OF QIM BASED AUDIO WATERMARKING USING HYBRID TRANSFORM OF SWT-DCT-SVD METHODS OPTIMIZED WITH GENETIC ALORITHM

IMPLEMENTATION OF QIM BASED AUDIO WATERMARKING USING HYBRID TRANSFORM OF SWT-DCT-SVD METHODS OPTIMIZED WITH GENETIC ALORITHM IMPLEMENTATION OF QIM BASED AUDIO WATERMARKING USING HYBRID TRANSFORM OF SWT-DCT-SVD METHODS OPTIMIZED WITH GENETIC ALORITHM Ryan Amnullah 1, Gelar Budman 2, Irma Saftr 3 1, 2, 3 FakultasTeknk Elektro,

More information

An Optimal Algorithm for Prufer Codes *

An Optimal Algorithm for Prufer Codes * J. Software Engneerng & Applcatons, 2009, 2: 111-115 do:10.4236/jsea.2009.22016 Publshed Onlne July 2009 (www.scrp.org/journal/jsea) An Optmal Algorthm for Prufer Codes * Xaodong Wang 1, 2, Le Wang 3,

More information

RESOLUTION ENHANCEMENT OF SATELLITE IMAGES USING DUAL-TREE COMPLEX WAVELET AND CURVELET TRANSFORM

RESOLUTION ENHANCEMENT OF SATELLITE IMAGES USING DUAL-TREE COMPLEX WAVELET AND CURVELET TRANSFORM Avalable Onlne at www.csmc.com Internatonal Journal of Computer Scence and Moble Computng A Monthly Journal of Computer Scence and Informaton Technology IJCSMC, Vol. 3, Issue. 4, Aprl 2014, pg.1315 1320

More information

A Robust Webpage Information Hiding Method Based on the Slash of Tag

A Robust Webpage Information Hiding Method Based on the Slash of Tag Advanced Engneerng Forum Onlne: 2012-09-26 ISSN: 2234-991X, Vols. 6-7, pp 361-366 do:10.4028/www.scentfc.net/aef.6-7.361 2012 Trans Tech Publcatons, Swtzerland A Robust Webpage Informaton Hdng Method Based

More information

Robust Blind Video Watermark Algorithm in Transform Domain Combining with 3D Video Correlation

Robust Blind Video Watermark Algorithm in Transform Domain Combining with 3D Video Correlation JOURNAL OF MULTIMEDIA, VOL. 8, NO. 2, APRIL 2013 161 Robust Blnd Vdeo Watermark Algorthm n Transform Doman Combnng wth 3D Vdeo Correlaton DING Ha-yang 1,3 1. Informaton Securty Center, Bejng Unversty of

More information

[33]. As we have seen there are different algorithms for compressing the speech. The

[33]. As we have seen there are different algorithms for compressing the speech. The 49 5. LD-CELP SPEECH CODER 5.1 INTRODUCTION Speech compresson s one of the mportant doman n dgtal communcaton [33]. As we have seen there are dfferent algorthms for compressng the speech. The mportant

More information

An Image Fusion Approach Based on Segmentation Region

An Image Fusion Approach Based on Segmentation Region Rong Wang, L-Qun Gao, Shu Yang, Yu-Hua Cha, and Yan-Chun Lu An Image Fuson Approach Based On Segmentaton Regon An Image Fuson Approach Based on Segmentaton Regon Rong Wang, L-Qun Gao, Shu Yang 3, Yu-Hua

More information

Edge Detection in Noisy Images Using the Support Vector Machines

Edge Detection in Noisy Images Using the Support Vector Machines Edge Detecton n Nosy Images Usng the Support Vector Machnes Hlaro Gómez-Moreno, Saturnno Maldonado-Bascón, Francsco López-Ferreras Sgnal Theory and Communcatons Department. Unversty of Alcalá Crta. Madrd-Barcelona

More information

Digital Video Watermarking using Discrete Wavelet Transform and Principal Component Analysis

Digital Video Watermarking using Discrete Wavelet Transform and Principal Component Analysis Internatonal Journal of Wsdom Based Computng, Vol. 1 (2), August 2011 7 Dgtal Vdeo Watermarkng usng Dscrete Wavelet Transform and Prncpal Component Analyss Sanjana Snha, Prajnat Bardhan, Swarnal Pramanck,

More information

Mathematics 256 a course in differential equations for engineering students

Mathematics 256 a course in differential equations for engineering students Mathematcs 56 a course n dfferental equatons for engneerng students Chapter 5. More effcent methods of numercal soluton Euler s method s qute neffcent. Because the error s essentally proportonal to the

More information

Research Article High Capacity Reversible Watermarking for Audio by Histogram Shifting and Predicted Error Expansion

Research Article High Capacity Reversible Watermarking for Audio by Histogram Shifting and Predicted Error Expansion e Scentfc World Journal, Artcle ID 656251, 7 pages http://dx.do.org/1.1155/214/656251 Research Artcle Hgh Capacty Reversble Watermarkng for Audo by Hstogram Shftng and Predcted Error Expanson Fe Wang,

More information

Shape-adaptive DCT and Its Application in Region-based Image Coding

Shape-adaptive DCT and Its Application in Region-based Image Coding Internatonal Journal of Sgnal Processng, Image Processng and Pattern Recognton, pp.99-108 http://dx.do.org/10.14257/sp.2014.7.1.10 Shape-adaptve DCT and Its Applcaton n Regon-based Image Codng Yamn Zheng,

More information

NUMERICAL SOLVING OPTIMAL CONTROL PROBLEMS BY THE METHOD OF VARIATIONS

NUMERICAL SOLVING OPTIMAL CONTROL PROBLEMS BY THE METHOD OF VARIATIONS ARPN Journal of Engneerng and Appled Scences 006-017 Asan Research Publshng Network (ARPN). All rghts reserved. NUMERICAL SOLVING OPTIMAL CONTROL PROBLEMS BY THE METHOD OF VARIATIONS Igor Grgoryev, Svetlana

More information

A Lossless Watermarking Scheme for Halftone Image Authentication

A Lossless Watermarking Scheme for Halftone Image Authentication IJCSNS Internatonal Journal of Computer Scence and Network Securty, VOL.6 No.2B, February 2006 147 A Lossless Watermarkng Scheme for Halftone Image Authentcaton Jeng-Shyang Pan, Hao Luo, and Zhe-Mng Lu,

More information

A NEW AUDIO WATERMARKING METHOD BASED

A NEW AUDIO WATERMARKING METHOD BASED A NEW AUDIO WATERMARKING METHOD BASED ON DISCRETE COSINE TRANSFORM WITH A GRAY IMAGE Mohammad Ibrahm Khan 1, Md. Iqbal Hasan Sarker 2, Kaushk Deb 3 and Md. Hasan Furhad 4 1,2,3 Department of Computer Scence

More information

Private Information Retrieval (PIR)

Private Information Retrieval (PIR) 2 Levente Buttyán Problem formulaton Alce wants to obtan nformaton from a database, but she does not want the database to learn whch nformaton she wanted e.g., Alce s an nvestor queryng a stock-market

More information

2x x l. Module 3: Element Properties Lecture 4: Lagrange and Serendipity Elements

2x x l. Module 3: Element Properties Lecture 4: Lagrange and Serendipity Elements Module 3: Element Propertes Lecture : Lagrange and Serendpty Elements 5 In last lecture note, the nterpolaton functons are derved on the bass of assumed polynomal from Pascal s trangle for the fled varable.

More information

Article Reversible Dual-Image-Based Hiding Scheme Using Block Folding Technique

Article Reversible Dual-Image-Based Hiding Scheme Using Block Folding Technique Artcle Reversble Dual-Image-Based Hdng Scheme Usng Block Foldng Technque Tzu-Chuen Lu, * and Hu-Shh Leng Department of Informaton Management, Chaoyang Unversty of Technology, Tachung 4349, Tawan Department

More information

S1 Note. Basis functions.

S1 Note. Basis functions. S1 Note. Bass functons. Contents Types of bass functons...1 The Fourer bass...2 B-splne bass...3 Power and type I error rates wth dfferent numbers of bass functons...4 Table S1. Smulaton results of type

More information

IMAGE FUSION TECHNIQUES

IMAGE FUSION TECHNIQUES Int. J. Chem. Sc.: 14(S3), 2016, 812-816 ISSN 0972-768X www.sadgurupublcatons.com IMAGE FUSION TECHNIQUES A Short Note P. SUBRAMANIAN *, M. SOWNDARIYA, S. SWATHI and SAINTA MONICA ECE Department, Aarupada

More information

Simulation Based Analysis of FAST TCP using OMNET++

Simulation Based Analysis of FAST TCP using OMNET++ Smulaton Based Analyss of FAST TCP usng OMNET++ Umar ul Hassan 04030038@lums.edu.pk Md Term Report CS678 Topcs n Internet Research Sprng, 2006 Introducton Internet traffc s doublng roughly every 3 months

More information

A Modified Median Filter for the Removal of Impulse Noise Based on the Support Vector Machines

A Modified Median Filter for the Removal of Impulse Noise Based on the Support Vector Machines A Modfed Medan Flter for the Removal of Impulse Nose Based on the Support Vector Machnes H. GOMEZ-MORENO, S. MALDONADO-BASCON, F. LOPEZ-FERRERAS, M. UTRILLA- MANSO AND P. GIL-JIMENEZ Departamento de Teoría

More information

An Application of the Dulmage-Mendelsohn Decomposition to Sparse Null Space Bases of Full Row Rank Matrices

An Application of the Dulmage-Mendelsohn Decomposition to Sparse Null Space Bases of Full Row Rank Matrices Internatonal Mathematcal Forum, Vol 7, 2012, no 52, 2549-2554 An Applcaton of the Dulmage-Mendelsohn Decomposton to Sparse Null Space Bases of Full Row Rank Matrces Mostafa Khorramzadeh Department of Mathematcal

More information

Comparison Study of Textural Descriptors for Training Neural Network Classifiers

Comparison Study of Textural Descriptors for Training Neural Network Classifiers Comparson Study of Textural Descrptors for Tranng Neural Network Classfers G.D. MAGOULAS (1) S.A. KARKANIS (1) D.A. KARRAS () and M.N. VRAHATIS (3) (1) Department of Informatcs Unversty of Athens GR-157.84

More information

Data Hiding and Image Authentication for Color-Palette Images

Data Hiding and Image Authentication for Color-Palette Images Data Hdng and Image Authentcaton for Color-Palette Images Chh-Yang Yn ( 殷志揚 ) and Wen-Hsang Tsa ( 蔡文祥 ) Department of Computer & Informaton Scence Natonal Chao Tung Unversty 00 Ta Hsueh Rd., Hsnchu, Tawan

More information

Course Introduction. Algorithm 8/31/2017. COSC 320 Advanced Data Structures and Algorithms. COSC 320 Advanced Data Structures and Algorithms

Course Introduction. Algorithm 8/31/2017. COSC 320 Advanced Data Structures and Algorithms. COSC 320 Advanced Data Structures and Algorithms Course Introducton Course Topcs Exams, abs, Proects A quc loo at a few algorthms 1 Advanced Data Structures and Algorthms Descrpton: We are gong to dscuss algorthm complexty analyss, algorthm desgn technques

More information

Parallelism for Nested Loops with Non-uniform and Flow Dependences

Parallelism for Nested Loops with Non-uniform and Flow Dependences Parallelsm for Nested Loops wth Non-unform and Flow Dependences Sam-Jn Jeong Dept. of Informaton & Communcaton Engneerng, Cheonan Unversty, 5, Anseo-dong, Cheonan, Chungnam, 330-80, Korea. seong@cheonan.ac.kr

More information

A Fast Visual Tracking Algorithm Based on Circle Pixels Matching

A Fast Visual Tracking Algorithm Based on Circle Pixels Matching A Fast Vsual Trackng Algorthm Based on Crcle Pxels Matchng Zhqang Hou hou_zhq@sohu.com Chongzhao Han czhan@mal.xjtu.edu.cn Ln Zheng Abstract: A fast vsual trackng algorthm based on crcle pxels matchng

More information

An Accurate Evaluation of Integrals in Convex and Non convex Polygonal Domain by Twelve Node Quadrilateral Finite Element Method

An Accurate Evaluation of Integrals in Convex and Non convex Polygonal Domain by Twelve Node Quadrilateral Finite Element Method Internatonal Journal of Computatonal and Appled Mathematcs. ISSN 89-4966 Volume, Number (07), pp. 33-4 Research Inda Publcatons http://www.rpublcaton.com An Accurate Evaluaton of Integrals n Convex and

More information

Robust Video Watermarking Using Image Normalization, Motion Vector and Perceptual Information

Robust Video Watermarking Using Image Normalization, Motion Vector and Perceptual Information Robust Vdeo Watermarkng Usng Image ormalzaton, Moton Vector and Perceptual Informaton Cedllo-Hernández Antono 1, Cedllo-Hernández Manuel 1, akano-myatake Marko 1, García-Vázquez Mreya S. 2 1 Postgraduate

More information

A WAVELET CODEC FOR INTERLACED VIDEO

A WAVELET CODEC FOR INTERLACED VIDEO A WAVELET CODEC FOR INTERLACED VIDEO L.M. Me, H.R. Wu and D.M. Tan School of Electrcal and Computer Engneerng, RMIT Unversty, Vctora 3000, Australa Tel: +61-3-9925 5376 Fax: +61-3-9925 2007 E-mal: henry.wu@rmt.edu.au

More information

CHAPTER 3 ENCODING VIDEO SEQUENCES IN FRACTAL BASED COMPRESSION. Day by day, the demands for higher and faster technologies are rapidly

CHAPTER 3 ENCODING VIDEO SEQUENCES IN FRACTAL BASED COMPRESSION. Day by day, the demands for higher and faster technologies are rapidly 65 CHAPTER 3 ENCODING VIDEO SEQUENCES IN FRACTAL BASED COMPRESSION 3.1 Introducton Day by day, the demands for hgher and faster technologes are rapdly ncreasng. Although the technologes avalable now are

More information

Detection of an Object by using Principal Component Analysis

Detection of an Object by using Principal Component Analysis Detecton of an Object by usng Prncpal Component Analyss 1. G. Nagaven, 2. Dr. T. Sreenvasulu Reddy 1. M.Tech, Department of EEE, SVUCE, Trupath, Inda. 2. Assoc. Professor, Department of ECE, SVUCE, Trupath,

More information

Hermite Splines in Lie Groups as Products of Geodesics

Hermite Splines in Lie Groups as Products of Geodesics Hermte Splnes n Le Groups as Products of Geodescs Ethan Eade Updated May 28, 2017 1 Introducton 1.1 Goal Ths document defnes a curve n the Le group G parametrzed by tme and by structural parameters n the

More information

A PATTERN RECOGNITION APPROACH TO IMAGE SEGMENTATION

A PATTERN RECOGNITION APPROACH TO IMAGE SEGMENTATION 1 THE PUBLISHING HOUSE PROCEEDINGS OF THE ROMANIAN ACADEMY, Seres A, OF THE ROMANIAN ACADEMY Volume 4, Number 2/2003, pp.000-000 A PATTERN RECOGNITION APPROACH TO IMAGE SEGMENTATION Tudor BARBU Insttute

More information

Type-2 Fuzzy Non-uniform Rational B-spline Model with Type-2 Fuzzy Data

Type-2 Fuzzy Non-uniform Rational B-spline Model with Type-2 Fuzzy Data Malaysan Journal of Mathematcal Scences 11(S) Aprl : 35 46 (2017) Specal Issue: The 2nd Internatonal Conference and Workshop on Mathematcal Analyss (ICWOMA 2016) MALAYSIAN JOURNAL OF MATHEMATICAL SCIENCES

More information

Term Weighting Classification System Using the Chi-square Statistic for the Classification Subtask at NTCIR-6 Patent Retrieval Task

Term Weighting Classification System Using the Chi-square Statistic for the Classification Subtask at NTCIR-6 Patent Retrieval Task Proceedngs of NTCIR-6 Workshop Meetng, May 15-18, 2007, Tokyo, Japan Term Weghtng Classfcaton System Usng the Ch-square Statstc for the Classfcaton Subtask at NTCIR-6 Patent Retreval Task Kotaro Hashmoto

More information

High level vs Low Level. What is a Computer Program? What does gcc do for you? Program = Instructions + Data. Basic Computer Organization

High level vs Low Level. What is a Computer Program? What does gcc do for you? Program = Instructions + Data. Basic Computer Organization What s a Computer Program? Descrpton of algorthms and data structures to acheve a specfc ojectve Could e done n any language, even a natural language lke Englsh Programmng language: A Standard notaton

More information

Dynamic Code Block Size for JPEG 2000

Dynamic Code Block Size for JPEG 2000 Dynamc Code Block Sze for JPEG 2000 Png-Sng Tsa a, Yann LeCornec b a Dept. of Computer Scence, Unv. of Texas Pan Amercan, 1201 W. Unv. Dr., Ednburg, TX USA 78539-2999; b Sgma Desgns, Inc., 1778 McCarthy

More information

Novel Pattern-based Fingerprint Recognition Technique Using 2D Wavelet Decomposition

Novel Pattern-based Fingerprint Recognition Technique Using 2D Wavelet Decomposition Mathematcal Methods for Informaton Scence and Economcs Novel Pattern-based Fngerprnt Recognton Technque Usng D Wavelet Decomposton TUDOR BARBU Insttute of Computer Scence of the Romanan Academy T. Codrescu,,

More information

CCT. Abdul-Jabbar: Design And Realization Of Circular Contourlet Transform ..VLSI. z 2. z 1.

CCT. Abdul-Jabbar: Design And Realization Of Circular Contourlet Transform ..VLSI. z 2. z 1. Abdul-Jabbar: Desgn And Realzaton Of Crcular Contourlet Transform DESIGN AND REALIZATION OF CIRCULAR CONTOURLET TRANSFORM Dr Jassm M Abdul-Jabbar * Hala N Fathee ** * Ph D n Elect Eng, Dept of Computer

More information

Contourlet-Based Image Fusion using Information Measures

Contourlet-Based Image Fusion using Information Measures Proceedngs of the 2nd WSEAS Internatonal Symposum on WAVELETS THEORY & APPLICATIONS n Appled Mathematcs, Sgnal Processng & Modern Scence (WAV '08), Istanbul, Turkey, May 2730, 2008 ContourletBased Image

More information

Tsinghua University at TAC 2009: Summarizing Multi-documents by Information Distance

Tsinghua University at TAC 2009: Summarizing Multi-documents by Information Distance Tsnghua Unversty at TAC 2009: Summarzng Mult-documents by Informaton Dstance Chong Long, Mnle Huang, Xaoyan Zhu State Key Laboratory of Intellgent Technology and Systems, Tsnghua Natonal Laboratory for

More information

Implementation of IMDCT Block of an MP3 Decoder through Optimization on the DCT Matrix

Implementation of IMDCT Block of an MP3 Decoder through Optimization on the DCT Matrix 22 M. GALABOV, IMPLEMENTATION OF IMDCT BLOCK OF AN MP DECODER THROUGH OPTIMIZATION... Implementaton of IMDCT Block of an MP Decoder through Optmzaton on the DCT Matr Mroslav GALABOV Dept. of Computer Systems

More information

Polyhedral Compilation Foundations

Polyhedral Compilation Foundations Polyhedral Complaton Foundatons Lous-Noël Pouchet pouchet@cse.oho-state.edu Dept. of Computer Scence and Engneerng, the Oho State Unversty Feb 8, 200 888., Class # Introducton: Polyhedral Complaton Foundatons

More information

The Research of Ellipse Parameter Fitting Algorithm of Ultrasonic Imaging Logging in the Casing Hole

The Research of Ellipse Parameter Fitting Algorithm of Ultrasonic Imaging Logging in the Casing Hole Appled Mathematcs, 04, 5, 37-3 Publshed Onlne May 04 n ScRes. http://www.scrp.org/journal/am http://dx.do.org/0.436/am.04.584 The Research of Ellpse Parameter Fttng Algorthm of Ultrasonc Imagng Loggng

More information

Smoothing Spline ANOVA for variable screening

Smoothing Spline ANOVA for variable screening Smoothng Splne ANOVA for varable screenng a useful tool for metamodels tranng and mult-objectve optmzaton L. Rcco, E. Rgon, A. Turco Outlne RSM Introducton Possble couplng Test case MOO MOO wth Game Theory

More information

Some Advanced SPC Tools 1. Cumulative Sum Control (Cusum) Chart For the data shown in Table 9-1, the x chart can be generated.

Some Advanced SPC Tools 1. Cumulative Sum Control (Cusum) Chart For the data shown in Table 9-1, the x chart can be generated. Some Advanced SP Tools 1. umulatve Sum ontrol (usum) hart For the data shown n Table 9-1, the x chart can be generated. However, the shft taken place at sample #21 s not apparent. 92 For ths set samples,

More information

A fault tree analysis strategy using binary decision diagrams

A fault tree analysis strategy using binary decision diagrams Loughborough Unversty Insttutonal Repostory A fault tree analyss strategy usng bnary decson dagrams Ths tem was submtted to Loughborough Unversty's Insttutonal Repostory by the/an author. Addtonal Informaton:

More information

3D vector computer graphics

3D vector computer graphics 3D vector computer graphcs Paolo Varagnolo: freelance engneer Padova Aprl 2016 Prvate Practce ----------------------------------- 1. Introducton Vector 3D model representaton n computer graphcs requres

More information

Using Counter-propagation Neural Network for Digital Audio Watermarking

Using Counter-propagation Neural Network for Digital Audio Watermarking Usng Counter-propagaton Neural Network for Dgtal Audo Watermarkng Chuan-Yu Chang and Wen-Chh Shen Graduate School of Computer Scence and Informaton Engneerng Natonal Yunln Unversty of Scence & Technology

More information

A mathematical programming approach to the analysis, design and scheduling of offshore oilfields

A mathematical programming approach to the analysis, design and scheduling of offshore oilfields 17 th European Symposum on Computer Aded Process Engneerng ESCAPE17 V. Plesu and P.S. Agach (Edtors) 2007 Elsever B.V. All rghts reserved. 1 A mathematcal programmng approach to the analyss, desgn and

More information

Steps for Computing the Dissimilarity, Entropy, Herfindahl-Hirschman and. Accessibility (Gravity with Competition) Indices

Steps for Computing the Dissimilarity, Entropy, Herfindahl-Hirschman and. Accessibility (Gravity with Competition) Indices Steps for Computng the Dssmlarty, Entropy, Herfndahl-Hrschman and Accessblty (Gravty wth Competton) Indces I. Dssmlarty Index Measurement: The followng formula can be used to measure the evenness between

More information

Brushlet Features for Texture Image Retrieval

Brushlet Features for Texture Image Retrieval DICTA00: Dgtal Image Computng Technques and Applcatons, 1 January 00, Melbourne, Australa 1 Brushlet Features for Texture Image Retreval Chbao Chen and Kap Luk Chan Informaton System Research Lab, School

More information

FPGA Based Fixed Width 4 4, 6 6, 8 8 and Bit Multipliers using Spartan-3AN

FPGA Based Fixed Width 4 4, 6 6, 8 8 and Bit Multipliers using Spartan-3AN IJCSNS Internatonal Journal of Computer Scence and Network Securty, VOL.11 No.2, February 211 61 FPGA Based Fxed Wdth 4 4, 6 6, 8 8 and 12 12-Bt Multplers usng Spartan-3AN Muhammad H. Ras and Mohamed H.

More information

Pattern Recognition 43 (2010) Contents lists available at ScienceDirect. Pattern Recognition. journal homepage:

Pattern Recognition 43 (2010) Contents lists available at ScienceDirect. Pattern Recognition. journal homepage: Pattern Recognton 43 (2010) 397 -- 404 Contents lsts avalable at ScenceDrect Pattern Recognton ournal homepage: www.elsever.com/locate/pr Secret mage sharng based on cellular automata and steganography

More information

Problem Set 3 Solutions

Problem Set 3 Solutions Introducton to Algorthms October 4, 2002 Massachusetts Insttute of Technology 6046J/18410J Professors Erk Demane and Shaf Goldwasser Handout 14 Problem Set 3 Solutons (Exercses were not to be turned n,

More information

Efficient Distributed File System (EDFS)

Efficient Distributed File System (EDFS) Effcent Dstrbuted Fle System (EDFS) (Sem-Centralzed) Debessay(Debsh) Fesehaye, Rahul Malk & Klara Naherstedt Unversty of Illnos-Urbana Champagn Contents Problem Statement, Related Work, EDFS Desgn Rate

More information

An Iterative Solution Approach to Process Plant Layout using Mixed Integer Optimisation

An Iterative Solution Approach to Process Plant Layout using Mixed Integer Optimisation 17 th European Symposum on Computer Aded Process Engneerng ESCAPE17 V. Plesu and P.S. Agach (Edtors) 2007 Elsever B.V. All rghts reserved. 1 An Iteratve Soluton Approach to Process Plant Layout usng Mxed

More information

Statistical Steganalyis of Images Using Open Source Software

Statistical Steganalyis of Images Using Open Source Software Statstcal Steganalys of Images Usng Open Source Software Bhargav Kapa, Stefan A. Robla Department of Computer Scence Montclar State Unversty Montclar, NJ 07043 roblas@mal.montclar.edu Abstract In ths paper

More information

LECTURE : MANIFOLD LEARNING

LECTURE : MANIFOLD LEARNING LECTURE : MANIFOLD LEARNING Rta Osadchy Some sldes are due to L.Saul, V. C. Raykar, N. Verma Topcs PCA MDS IsoMap LLE EgenMaps Done! Dmensonalty Reducton Data representaton Inputs are real-valued vectors

More information

CLASSIFICATION OF ULTRASONIC SIGNALS

CLASSIFICATION OF ULTRASONIC SIGNALS The 8 th Internatonal Conference of the Slovenan Socety for Non-Destructve Testng»Applcaton of Contemporary Non-Destructve Testng n Engneerng«September -3, 5, Portorož, Slovena, pp. 7-33 CLASSIFICATION

More information

Parallel matrix-vector multiplication

Parallel matrix-vector multiplication Appendx A Parallel matrx-vector multplcaton The reduced transton matrx of the three-dmensonal cage model for gel electrophoress, descrbed n secton 3.2, becomes excessvely large for polymer lengths more

More information

Feature Reduction and Selection

Feature Reduction and Selection Feature Reducton and Selecton Dr. Shuang LIANG School of Software Engneerng TongJ Unversty Fall, 2012 Today s Topcs Introducton Problems of Dmensonalty Feature Reducton Statstc methods Prncpal Components

More information

RADIX-10 PARALLEL DECIMAL MULTIPLIER

RADIX-10 PARALLEL DECIMAL MULTIPLIER RADIX-10 PARALLEL DECIMAL MULTIPLIER 1 MRUNALINI E. INGLE & 2 TEJASWINI PANSE 1&2 Electroncs Engneerng, Yeshwantrao Chavan College of Engneerng, Nagpur, Inda E-mal : mrunalngle@gmal.com, tejaswn.deshmukh@gmal.com

More information