Robust Blind Video Watermark Algorithm in Transform Domain Combining with 3D Video Correlation

Size: px
Start display at page:

Download "Robust Blind Video Watermark Algorithm in Transform Domain Combining with 3D Video Correlation"

Transcription

1 JOURNAL OF MULTIMEDIA, VOL. 8, NO. 2, APRIL Robust Blnd Vdeo Watermark Algorthm n Transform Doman Combnng wth 3D Vdeo Correlaton DING Ha-yang 1,3 1. Informaton Securty Center, Bejng Unversty of Posts and Telecommuncatons, Bejng , Chna; 3. College of Informaton & Mechancal Engneerng, Bejng Insttute of Graphc Communcaton, Bejng , Chna Emal: o_dhy@163.com ZHOU Ya-jan 1,2, YANG Y-xan 1,2, ZHANG Ru 1,2 1. Informaton Securty Center, Bejng Unversty of Posts and Telecommuncatons, Bejng , Chna; 2. Key Laboratory of Trustworthy Dstrbuted Computng and Servce (BUPT), Mnstry of Educaton, Bejng Unversty of Posts and Telecommuncatons, Bejng , Chna; Emal: yajan@bupt.edu.cn, yxyang@bupt.edu.cn, zhangru@bupt.edu.cn Abstract Accordng to the features of DCT-based and DFT-based vdeo watermark algorthms aganst attacks and consderng 3D vdeo structural characterstc, a new robust blnd vdeo watermark algorthm n transform doman combnng wth 3D vdeo correlaton s proposed. DCT-based watermark and DFT-based watermark are embedded n left and rght mages of a vdeo frame usng opposte embeddng rules, and the watermark can be extracted by ntegratng 3D vdeo correlaton, and more robust watermark s extracted from the DCT-based watermark and the DFT-based watermark by comparng ther performance. The algorthm can sgnfcantly mprove the robustness of 3D vdeo watermark aganst resoluton attack and codng attack. The expermental results show that the proposed algorthm has excellent performance aganst resoluton attack and codng attack, and s obvously better than DCT-based and DFT-based algorthms. Index Terms Vdeo Watermark; DCT; DFT; correlaton I. INTRODUCTION Vdeo watermark s an emergng technology for copyrght protecton and authentcaton of dgtal vdeo. Accordng whether need the orgnal vdeo when extractng the watermark, vdeo watermark can be dvded nto blnd watermark and non-blnd watermark [1]. If extractng the watermark wthout the orgnal vdeo, then known as blnd watermark, on the contrary, called non-blnd watermark. In ths aspect, the method n [2] utlzes a blnd vdeo watermark scheme based on ndependent component analyss; the approach n [3] explots a blnd watermark algorthm based on three-dmensonal DWT vdeo. Embeddng doman of watermark can be categorzed nto two domans: spatal doman and transform doman [4]. LSB algorthm [5] s a common method n spatal doman. Bascally, watermark algorthm n transform doman can be dvded nto DFT-based algorthm, DCT-based algorthm and DWT-based algorthm, and the dea of realzaton s smlar, watermark value can be embedded by control specfc coeffcents of transform doman. The approach n [6] presents a watermark algorthm based on DFT transform whch selects groups of DFT coeffcents n the low-mddle frequency band, and the coeffcents n every group are dvded nto two sub-groups based on a pre-defned pattern, and the energy relatonshp between these two sub-groups s used to hde the watermark. The method n [7] present an approach usng the fast Fourer transform, whch added a template n the Fourer transform doman to render the method robust aganst rotaton and scalng, or aspect rato changes. The method n [8] proposes the dfferental energy watermark (DEW) algorthm for JPEG/MPEG streams whch embeds label bts by selectvely dscardng hgh frequency DCT coeffcents n certan mage regons. The approach n [9] presents a DCT-based Watson's mperceptve watermark model ressted downsamplng attack. The approach n [10] proposes a novel watermark scheme that can combat the MC-TFA attack. The approach n [11] presents an algorthm whch embeds watermark by usng DC coeffcent of block DCT. The method n [12] proposes a scheme whch ndcates watermark value through odd-even of the number of hgh frequency coeffcents equal 0. The method n [13] presents a method whch embeds watermark usng relatonshp of one coeffcent and average of some coeffcents. The method n [14] presents an algorthm can resst the JPEG attach and avod the some weaknesses of JPEG quantfcaton. The method n [15] do: /jmm

2 162 JOURNAL OF MULTIMEDIA, VOL. 8, NO. 2, APRIL 2013 proposes a novel oblvous mage watermarkng technque for the copyrght protecton and authentcaton of stll mages, based on Dscrete Multwavelet Transform (DMWT) and Quantzaton Index Modulus Modulaton (QIMM). The method n [16] proposes a novel audo zero-watermarkng scheme based on dscrete wavelet transform (DWT). The paper [17] has studed and mplemented three knds of DCT-based vdeo watermark algorthms and one DFT-based vdeo watermark algorthm, and experments show that the transparency of DCT algorthms s superor to the DFT algorthm; and the robustness of the DFT algorthm aganst geometrcal attacks s better than DCT algorthms, the robustness of DCT algorthms aganst codng attacks s better than the DFT algorthm. In order to meet people s ncreasng vsual demand, 3D vdeo s to be more wdely used. Nowadays there s lttle research on 3D vdeo watermark. The approach n [18] proposes a vdeo watermark scheme for 3D vdeo watermark, whch embeds watermark by modfyng the dsparty vectors n 3D vdeo. In ths paper, a new 3D vdeo watermark algorthm s proposed. Accordng the features of DCT-based and DFT-based vdeo watermark algorthms aganst attacks, and consderng 3D vdeo structural characterstc, a new robust blnd vdeo watermark algorthm n transform doman combnng wth 3D vdeo correlaton was proposed. DCT-based watermark and DFT-based watermark are embedded n left and rght channels of a vdeo frame by usng opposte embeddng rules, and the watermark can be extracted by ntegratng 3D vdeo correlaton, and more robust watermark s extracted from the DCT-based watermark and the DFT-based watermark by comparng ther performance. The extracton process of the algorthm does not requre the orgnal vdeo, so the algorthm s a blnd watermark algorthm. The algorthm can sgnfcantly mprove the robustness of 3D vdeo watermark aganst resoluton attack and codng attack. The paper s organzed as follows. Secton 2 descrbes three parts of our mprovement of exstng algorthm. Secton 3 s the descrpton of our watermark embeddng and extracton algorthm. Expermental results and conclusons are presented n Secton 4 and 5 respectvely. II.COMPOSITION OF ALGORITHM IMPROVEMENT 3D vdeo s bnocular stereo vdeo, and each frame contans left and rght vew mages whch s to left and rght eye vew respectvely, and two mages are smlar, but wth a certan parallax. In ths paper, accordng to the structural characterstcs of the 3D vdeo, DCT-based vdeo watermark algorthms and the DFT-based vdeo watermark algorthm wll be mproved, and the mproved algorthm conssts of three parts: A. Preferred to Use Better one of DCT and DFT Algorthm Test results n [14] show that the DCT algorthm and the DFT algorthm have dfferent robustness aganst dfferent attacks. In order to mprove the robustness of vdeo watermark, ths paper presents the watermark algorthm preferred to use better one of DCT and DFT algorthm. Algorthm dea: (1) Add standard nformaton at the begnnng of the orgnal watermark, and new watermark nformaton wth standard nformaton s obtaned. (2) The vdeo frame to be watermarked s dvded nto left part and rght part, whch were embedded the DCT-based watermark and DFT-based watermark respectvely; (3) When extractng watermark, the standard nformaton s extracted respectvely from left part and rght part usng DCT algorthm and DFT algorthm; (4) Calculatng and comparng the correct rate of standard nformaton obtaned from two algorthms, f the correct rate of the DCT algorthm s better, and then extractng all watermark nformaton from the left part usng DCT algorthm; otherwse, extractng all watermark nformaton from the rght part usng DFT algorthm. B. DCT Watermark Algorthm combnng wth 3D Vdeo Correlaton Embeddng watermark n left and rght mages of a frame usng DCT algorthm, and extractng watermark after attacks, and then t can be found that the BER obtaned from two mages under the same attack s not always the same. The test results show that the mpact of the same attack s dfferent n the same locaton of two mages. So sometmes t happens that n one mage an error occurs, but n the other mage the watermark data s stll correct. Therefore, n order to mprove the robustness of the DCT algorthm, DCT watermark algorthm combnng wth 3D vdeo correlaton s proposed. Algorthm dea: (1) Left and rght mages of the frame to be watermarked are dvded nto 4 4 blocks, and coeffcent matrx can be gotten after 2D DCT transform on each block, and C13 denotes the 13th coeffcent of the -th block, and C13 s chosen to embed watermark. (2) Opposte embeddng rules were used n left and rght mages, specfcally, n left mage uses C13 >0 to ndcate watermark value 1, and n rght mage uses C13 >0 to ndcate watermark value 0; (3) When extractng the watermark, extractng watermark respectvely from left and rght mages usng the DCT algorthm and opposte extracton rules; (4) When two watermark values from two mages are dfferent, ndcatng an error occurs n one mage, and the watermark value can be obtaned correspondng to relatonshp between C13 of left mage and C13 of rght mage.

3 JOURNAL OF MULTIMEDIA, VOL. 8, NO. 2, APRIL C. DFT Watermark Algorthm combnng wth 3D Vdeo Correlaton Embeddng watermark n left and rght mages of a frame usng DFT algorthm reference [6], and extractng watermark after attacks, and fndng a smlar concluson wth 2.2 that the mpact of the same attack s dfferent n the same locaton of two mages. Therefore, n order to mprove the robustness of the DFT algorthm, DFT watermark algorthm combnng wth 3D vdeo correlaton s proposed. Algorthm dea: (1) Frequency doman data of Left and rght mages s obtaned after the whole 2D DFT of each mage, and the data s dvded nto 4 4 block, and the -th blocks of two mages are selected to embed watermark. (2) Coeffcents n each block are dvded nto two sub-groups based on a pre-defned pattern; fnally the energy relatonshp between these two sub-groups s used to hde the watermark. Fg. 1 shows the locaton of the two sub-groups n a 4 4 block. mages of a vdeo frame usng opposte embeddng rules, and the watermark can be extracted by ntegratng 3D vdeo correlaton, and more robust watermark s extracted from the DCT-based watermark and the DFT-based watermark by comparng ther performance. A. Watermark Embeddng The dagram of watermark embeddng s shown n Fg.2, and the process of watermark embeddng s descrbed as follows: (1) Add standard nformaton at the begnnng of the orgnal watermark, and new watermark nformaton wth standard nformaton s obtaned. (2) Left mage of the frame to be watermarked s dvded nto left part and rght part, and rght mage of the frame s also dvded nto left part and rght part; (3) Left part of left mage and left part of rght mage compose a new 3D vdeo data, whch s embedded watermark usng DCT watermark algorthm combnng wth 3D vdeo correlaton. Fgure 1. the locaton of the two sub-groups In the -th 4 4 block, "O" ndcates the four elements of sub-group 1, and E1 denotes energy of sub-group 1, and the calculaton method s shown n (1); "X" ndcates the four elements of sub-group 2, and E2 denotes energy of sub-group 2, and the calculaton method s shown n (2) : E1 = E2 = 4 2 m= 3 n= e( m, n) e( m, n) m n= 3 (2) (3) The opposte embeddng rules were used n left and rght mages, specfcally, n left mage uses E2 E1 to ndcate watermark value 1, and n rght mage uses E2 E1 to ndcate watermark value 0; (4) When extractng the watermark, extractng watermark respectvely from left and rght mages usng the DFT algorthm and opposte extracton rules; (5) When two watermark values from two mages are dfferent, ndcatng an error occurs n one mage, and the watermark value can be obtaned accordng to relatonshp between E1 and E2 of two mages. (1) III.PROPOSED WATERMARKING SCHEME In ths paper, a new robust blnd vdeo watermark algorthm n transform doman combnng wth 3D vdeo correlaton was proposed. DCT-based watermark and DFT-based watermark are embedded n left and rght Fgure 2. the dagram of watermark embeddng Embeddng process: (a) denotes the 13th coeffcent of the -th block n left mage, and RC13 denotes the 13th coeffcent of the -th block n rght mage, and W denotes the -th watermark value, and opposte embeddng rules were used n left and rght mages, and embeddng rule n left mage s defned n (3), and embeddng rule n rght mage s defned n (4) k W k W (3) RC13 k W RC13 k W (4) k s the strength of watermark, and k> 0. (b) Embeddng process n left mage When W =1, to ensure k, the embeddng rule s defned as follows: > k = k k k < k (5) When W =0, to ensure -k, the embeddng rule s

4 164 JOURNAL OF MULTIMEDIA, VOL. 8, NO. 2, APRIL 2013 defned as follows: > k = k k k < k (6) (c) Embeddng process n rght mage When W =1, to ensure RC13 -k; When W =0, to ensure RC13 k. (4) Rght part of left mage and rght part of rght mage compose a new 3D vdeo data, whch s embedded watermark usng DFT watermark algorthm combnng wth 3D vdeo correlaton. Embeddng process: (a) LE1 and LE2 denote energy of sub-group 1 and sub-group 2 of the -th block n left mage; RE1 and RE2 denote energys of sub-group 1 and sub-group 2 of the -th block n rght mage; and opposte embeddng rules were used n left and rght mages, and embeddng rule n left mage s defned n (7), and embeddng rule n rght mage s defned n (8): LE2 LE1 + k W LE1 LE2 + k W (7) RE1 RE2 + k W RE2 RE1 + k W (8) k s the strength of watermark, and k> 0. (b) Embeddng process n left mage When W =1, to ensure LE1 and LE2 meet the demand n (7), If not meet the demand embeddng rule s defned as follows: delta = ( k + LE1 LE2 ) / 2 LE2 = LE2 + delta LE1 = LE1 delta (9) When W =0, to ensure LE1 and LE2 meet the demand n (7), If not meet the demand embeddng rule s defned as follows: delta = ( k + LE2 LE1 ) / 2 LE1 = LE1 + delta LE2 = LE2 delta (10) (c) Embeddng process n rght mage When W =1, to ensure RE1 RE2 +k; When W =0, to ensure RE2 RE1 +k. B. Watermark Extracton The dagram of watermark extracton s shown n Fg.3, and the process of watermark extracton s descrbed as follows: (1) Left mage of the frame to be watermarked s dvded nto left part and rght part, and rght mage of the frame s also dvded nto left part and rght part; (2) Left part of left mage and left part of rght mage compose a 3D vdeo data, n whch extractng standard nformaton usng DCT watermark algorthm combnng wth 3D vdeo correlaton, and usng DCT-SI to denote the extracted nformaton. Extractng process: (a) Extractng watermark respectvely from left mage and rght mage, and extractng rule n left mage s defned n (11), and LW denotes the watermark value extracted from left mage; extractng rule n rght mage s defned n (12), and RW denotes the watermark value extracted from rght mage. Fgure 3. 1 LW = 0 1 RW = 0 the dagram of watermark extracton 0 < 0 RC13 < 0 RC13 0 (11) (12) (b) When LW and RW are the same, and LW denotes the fnal watermark value W ; (C) When LW and RW are dfferent, the fnal watermark value W can be obtaned accordng to relatonshp between and RC13. The rule s defned as follows: 1 W = 0 RC13 < RC13 (13) (3) Rght part of left mage and rght part of rght mage compose a 3D vdeo data, n whch extractng standard nformaton usng DFT watermark algorthm combnng wth 3D vdeo correlaton, and usng DFT-SI to denote the extracted nformaton. Extractng process: (a) Extractng watermark respectvely from left mage and rght mage, and extractng rule n left mage s defned n (14), and LW denotes the watermark value extracted from left mage; extractng rule n rght mage s defned n (15), and RW denotes the watermark value extracted from rght mage. 1 LE2 LE1 LW = 0 LE2 < LE1 (14)

5 JOURNAL OF MULTIMEDIA, VOL. 8, NO. 2, APRIL RE2 < RE1 RW = (15) 0 RE2 RE1 (b) When LW and RW are the same, and LW denotes the fnal watermark value W ; (C) When LW and RW are dfferent, and the watermark value can be obtaned accordng to relatonshp of LE1, LE2, RE1, RE2. The rule s defned as follows: 1 LE2 + RE1 LE1 + RE2 W = 0 LE2 + RE1 < LE1 + RE2 (16) (4)Calculatng and comparng the correct rate of DCT-SI and DFT-SI. (5) If the correct rate of DCT-SI s better, and then extractng all watermark nformaton from the left part of left and rght mages usng DCT algorthm combnng wth 3D vdeo correlaton; Otherwse, extractng all watermark nformaton from the rght part of left and rght mages usng DFT algorthm combnng wth 3D vdeo correlaton. IV. EXPERIMENTAL RESULTS AND PERFORMANCE ANALYSIS In ths paper, cactus, Flower, rose_sbs_dvx and Ume614x2x384 s used as a test set, and frame rate s 29/sec, and the length of watermarked content s 288 bts. A. Transparency Fg. 4 shows the ffth frame of 4 vdeos and watermarked frame used the proposed algorthm: (a) cactus orgnal (c) flower orgnal (e)rose orgnal (b)cactus watermarked (c)flower watermarked (f)rose watermarked dfferent vdeo, but the average of PNSR s better than 35db, ndcatng that the proposed algorthm has outstandng transparency. TABLE I. PNSR STATISTICAL RESULTS Vdeo name Resuloton PSNR1 PSNR2 PSNR3 cactus flower rose_sbs_dvx Ume614x2x Average of PSNR B. Robustness In ths paper, watermarked vdeo s suffered wth resoluton attack and encodng attack, and calculatng bt error rate (BER) after extractng the watermark, and statstcal results are shown n Table II: TABLE II. TABLE II BER (%) AGAINST ATTACKS Vdeo name 60% rescale 50% rescale h.264- h kbps 1150kbp cactus flower rose_sbs_dvx Ume614x2x Average of BER Embeddng strength of DCT method s 30 and embeddng strength of DFT method s It can be seen from Table II that the propose algorthm has excellent robustness aganst resoluton attack and codng attack. Comparng the proposed algorthm and other 3 algorthms whch nclude DCT-based algorthm, DFT-based algorthm, preferred to use better one of DCT and DFT algorthm (mentoned n 2.1), and expermental results are shown n Fg.5, and DCT denotes DCT-based algorthm, and DFT denotes DFT-based algorthm, and DCT+DFT denotes preferred to use better one of DCT and DFT algorthm, and DCTR+DFTR denotes the proposed algorthm. (g)ume orgnal (h)ume watermarked Fgure 4. Frames of 4 vdeos Embeddng strength of DCT algorthm s 30, and Embeddng strength of DFT algorthm s From Fg.4 t can be seen that the transparency of the proposed algorthm s excellent. PSNR statstcal results of the proposed algorthm are shown n Table I. Embeddng strength of DCT method s 10,30,50 and embeddng strength of DFT method s 10000,30000,50000 correspondng wth PSNR1, PSNR2, PSNR3. It can be seen from Table I that the propose algorthm usng the same strength has dfferent mpact on (a) BER under 60% resoluton attack

6 166 JOURNAL OF MULTIMEDIA, VOL. 8, NO. 2, APRIL 2013 results show that the proposed algorthm has excellent performance aganst resoluton attack and codng attack. (b) BER under 50% resoluton attack ACKNOWLEDGMENT Ths work was supported by the Scentfc Research Common Program of Bejng Muncpal Commsson of Educaton (KM , KM ), Bejng Natural Scence Foundaton( , ), General Admnstraton of Press and Publcaton of the People's Republc of Chna (GXTC-CZ /15-1), the NSFC project ( ). REFERENCES (c) BER under 8000kbps encodng attack (d) BER under 1150kbps encodng attack Fgure 5. BER under attacks From Fg. 5 t can be seen that sufferng wth resoluton attack and codng attack the propose algorthm has excellent robustness, and s obvously better than other 3 algorthms. V. CONCLUSIONS In ths paper, a new 3D vdeo watermark algorthm s proposed. Accordng to the features of DCT-based and DFT-based vdeo watermark algorthms aganst attacks, and consderng 3D vdeo structural characterstc, a new robust blnd vdeo watermark algorthm n transform doman combnng wth 3D vdeo correlaton was proposed. DCT-based watermark and DFT-based watermark are embedded n left and rght channels of a vdeo frame by usng opposte embeddng rules, and the watermark can be extracted by ntegratng 3D vdeo correlaton, and more robust watermark s extracted from the DCT-based watermark and the DFT-based watermark by comparng ther performance. The expermental [1] Yuan Wugang, "Research of Robust Vdeo Watermark Technology", WuHan: Huazhong Unversty of Scence and Technology, [2] SUN Jande and LIU Ju, "A Blnd Vdeo Watermark Scheme Based on Independent Component Analyss", ACTA ELECTRONICA SINICA, Vol.32, No.9, pp , Sep [3] Ce Wang, Chao Zhang, and Pengwe Hao, A BLIND VIDEO WATERMARK DETECTION METHOD BASED ON 3D-DWT TRANSFORM, 2010 IEEE 17th Internatonal Conference on Image Processng, 2010(9): [4] T.JAYAMALAR, V. RADHA. Survey on Dgtal Vdeo Watermark Technques and Attacks on Watermarks, Internatonal Journal of Engneerng Scence and Technology, Vol. 2(12),pp , [5] Eugene T. Ln and Edward J. Delp, A revew of data hdng n dgtal mages, Proceedngs of the conference on Image processng, 1999(4): [6] Dajun He, Qbn Sun and Q Tan. AN OBJECT BASED WATERMARK SOLUTION FOR MPEG4 VIDEO AUTHENTICATION. ICASSP [7] Shelby Perera, Joseph J. K. ORuanadh and Frederc Degullaume, Template Based Recovery of Fourer-Based Watermarks Usng Log-polar and Log-log Maps, Conf on Multmeda Computng and Systems, vol.1, pp , Jul [8] Gerrt C. Langelaar and Regnald L. Lagendjk, Optmal Dfferental Energy Watermark of DCT Encoded Images and Vdeo, IEEE TRANSACTIONS ON IMAGE PROCESSING. VOL.10, NO.1, pp , Oct [9] DU Yao-gang, CAI An-n2 and SUN Jng-ao, "DCT-based Vdeo Watermark Technque Usng Downsamplng", ACTA ELECTRONICA SINICA, Vol.33, No.12, pp , Dec [10] LIU Shao-hu, HAN Lu and YAO Hong-xun, "Vdeo watermark algorthm for resstng colluson attacks", Journal on Communcatons, Vol. 31, No. 1, pp.14-19, January, [11] Lu Lanshan and L Renhou, "Bl nd Vdeo Watermark Scheme Based on Drect Current Component n Dscrete Cosne Transformaton Doman", JOURNAL OF XI'AN JIAO TONG UNIVERSITY, Vol.40, No.4, pp , Apr [12] Qn Janjun, "Research of Dgtal Vdeo Watermark Technology". Chang Sha: Hunan Normal Unversty,2010 [13] Cao Junme, "A Robust Dgtal Watermark Algorthm Base on DCT", Mcrocomputer Applcatons VoL.16, No.1, pp.11-12, 2010.

7 JOURNAL OF MULTIMEDIA, VOL. 8, NO. 2, APRIL [14] Chen Huang-Ch; Chang Yu-Wen; Hwang Rey-Chue. "A watermarkng technque based on the frequency doman". Journal of Multmeda (JMM).Vol.7, No.1, pp.82-89,2012. [15] Leelavathy N, Prasad E.V., Srnvas Kumar S., Chandra Mohan, B. "Oblvous mage watermarkng n dscrete multwavelet doman usng QIMM". Journal of Multmeda(JMM).Vol.6, No.4, pp ,2011. [16] Yang Yu, Le Mn, Lu Huaqun, Zhou Yaan, Luo Oun."A novel robust zero-watermarkng scheme based on dscrete wavelet transform", Journal of Multmeda.Vol.7, No.4, pp , [17] DING Ha-yang. "Research and Implementaton on Blnd Vdeo Watermarkng Algorthms Based on DCT and DFT". Journal of Bejng Insttute of Graphc Communcaton. Vol. 20, No. 4,pp: 32-35,2012 [18] Zengnan Zhang, Zhongje Zhu, Lfeng X. Novel Scheme for Watermark Stereo Vdeo, Internatonal Journal of Nonlnear Scence, Vol.3, No.1, pp.74-80, Dng Ha-yang receved hs M.S. degree n sgnal and nformaton processng from Bejng Jaotong Unversty, Bejng n 2004, and hs B.S. degree n electroncs and nformaton technology from Bejng Jaotong Unversty, Bejng n He s currently a Ph.D. canddate at Bejng Unversty of Posts and Telecommuncatons, Bejng, Chna. Hs current research nterests nclude nformaton securty, dgtal mage processng, DSP technology. Yang Y-Xan receved hs Ph.D. degree n sgnal and nformaton processng from Bejng Unversty of Posts and Telecommuncatons n He s now the drector of Natonal Engneerng Laboratory for Dsaster Backup and Recovery, the drector of Key Laboratory of Network and Informaton Attack Defence Technology of MOE, the drector of Informaton Securty Center, and the Deputy Drector of State Key Laboratory of Networkng and Swtchng Technology. Meanwhle, he s a Changjang Scholars Dstngushed Professor and the edtor-n-chef of "Journal on Communcatons" and "The Journal of Chna Unversty of Posts and Telecommuncatons". Hs current research nterests nclude network and nformaton securty theory and applcatons, network-based computer applcaton technology, codng theory and technology. Zhang Ru was born n Chna n She s currently an assocate professor n School of Computer Scence and Technology of Bejng Unversty of Posts and Telecommuncatons. Her man research nterests nclude nformaton securty, dgtal watermarkng, cryptography, etc. Zhou Ya-Jan was born n Chna n He receved hs Ph.D. degree n 2003 n communcatons engneerng from Xdan Unversty at X'an. He receved hs M.S. degree n 1996 and B.S. degree n 1993, both from the Department of Materal Scence and Engneerng of Bejng Unversty of Aeronautcs and Astronautcs. He s currently an assocate professor n School of Computer Scence and Technology of Bejng Unversty of Posts and Telecommuncatons. Hs man research nterests nclude moble communcatons, securty of wreless networks, securty of databases, cryptography theory and ts applcaton, etc. He s now the project leader of two projects from the Natonal Natural Scence Foundaton of Chna and the Natonal Hgh Technology Research and Development 863 Program of Chna, spectvely. Meanwhle, he s n charge of a project from Bejng Muncpal Natural Scence Foundaton. He has publshed about 20 techncal papers and two books.

Hybrid Non-Blind Color Image Watermarking

Hybrid Non-Blind Color Image Watermarking Hybrd Non-Blnd Color Image Watermarkng Ms C.N.Sujatha 1, Dr. P. Satyanarayana 2 1 Assocate Professor, Dept. of ECE, SNIST, Yamnampet, Ghatkesar Hyderabad-501301, Telangana 2 Professor, Dept. of ECE, AITS,

More information

Key-Selective Patchwork Method for Audio Watermarking

Key-Selective Patchwork Method for Audio Watermarking Internatonal Journal of Dgtal Content Technology and ts Applcatons Volume 4, Number 4, July 2010 Key-Selectve Patchwork Method for Audo Watermarkng 1 Ch-Man Pun, 2 Jng-Jng Jang 1, Frst and Correspondng

More information

Shape-adaptive DCT and Its Application in Region-based Image Coding

Shape-adaptive DCT and Its Application in Region-based Image Coding Internatonal Journal of Sgnal Processng, Image Processng and Pattern Recognton, pp.99-108 http://dx.do.org/10.14257/sp.2014.7.1.10 Shape-adaptve DCT and Its Applcaton n Regon-based Image Codng Yamn Zheng,

More information

Robust Watermarking for Text Images Based on Arnold Scrambling and DWT-DCT

Robust Watermarking for Text Images Based on Arnold Scrambling and DWT-DCT Internatonal Conference on Mechatroncs Electronc Industral and Control Engneerng (MEIC 015) Robust Watermarkng for Text Images Based on Arnold Scramblng and DWT-DCT Fan Wu College of Informaton Scence

More information

A Hybrid Semi-Blind Gray Scale Image Watermarking Algorithm Based on DWT-SVD using Human Visual System Model

A Hybrid Semi-Blind Gray Scale Image Watermarking Algorithm Based on DWT-SVD using Human Visual System Model A Hybrd Sem-Blnd Gray Scale Image Watermarkng Algorthm Based on DWT-SVD usng Human Vsual System Model Rajesh Mehta r Scence & Engneerng, USICT Guru Gobnd Sngh Indrarprastha Unversty New Delh, Inda rajesh00ust@gmal.com

More information

A Lossless Watermarking Scheme for Halftone Image Authentication

A Lossless Watermarking Scheme for Halftone Image Authentication IJCSNS Internatonal Journal of Computer Scence and Network Securty, VOL.6 No.2B, February 2006 147 A Lossless Watermarkng Scheme for Halftone Image Authentcaton Jeng-Shyang Pan, Hao Luo, and Zhe-Mng Lu,

More information

A Fast Content-Based Multimedia Retrieval Technique Using Compressed Data

A Fast Content-Based Multimedia Retrieval Technique Using Compressed Data A Fast Content-Based Multmeda Retreval Technque Usng Compressed Data Borko Furht and Pornvt Saksobhavvat NSF Multmeda Laboratory Florda Atlantc Unversty, Boca Raton, Florda 3343 ABSTRACT In ths paper,

More information

Related-Mode Attacks on CTR Encryption Mode

Related-Mode Attacks on CTR Encryption Mode Internatonal Journal of Network Securty, Vol.4, No.3, PP.282 287, May 2007 282 Related-Mode Attacks on CTR Encrypton Mode Dayn Wang, Dongda Ln, and Wenlng Wu (Correspondng author: Dayn Wang) Key Laboratory

More information

Enhanced Watermarking Technique for Color Images using Visual Cryptography

Enhanced Watermarking Technique for Color Images using Visual Cryptography Informaton Assurance and Securty Letters 1 (2010) 024-028 Enhanced Watermarkng Technque for Color Images usng Vsual Cryptography Enas F. Al rawashdeh 1, Rawan I.Zaghloul 2 1 Balqa Appled Unversty, MIS

More information

Content Based Image Retrieval Using 2-D Discrete Wavelet with Texture Feature with Different Classifiers

Content Based Image Retrieval Using 2-D Discrete Wavelet with Texture Feature with Different Classifiers IOSR Journal of Electroncs and Communcaton Engneerng (IOSR-JECE) e-issn: 78-834,p- ISSN: 78-8735.Volume 9, Issue, Ver. IV (Mar - Apr. 04), PP 0-07 Content Based Image Retreval Usng -D Dscrete Wavelet wth

More information

A NEW AUDIO WATERMARKING METHOD BASED

A NEW AUDIO WATERMARKING METHOD BASED A NEW AUDIO WATERMARKING METHOD BASED ON DISCRETE COSINE TRANSFORM WITH A GRAY IMAGE Mohammad Ibrahm Khan 1, Md. Iqbal Hasan Sarker 2, Kaushk Deb 3 and Md. Hasan Furhad 4 1,2,3 Department of Computer Scence

More information

Cluster Analysis of Electrical Behavior

Cluster Analysis of Electrical Behavior Journal of Computer and Communcatons, 205, 3, 88-93 Publshed Onlne May 205 n ScRes. http://www.scrp.org/ournal/cc http://dx.do.org/0.4236/cc.205.350 Cluster Analyss of Electrcal Behavor Ln Lu Ln Lu, School

More information

Video Watermarking Algorithm Based on Relative Relationship of DCT Coefficients

Video Watermarking Algorithm Based on Relative Relationship of DCT Coefficients 756 JOURAL OF COPUTERS, VOL. 8, O., OVEBER 03 Vdeo Watermarkng Algorthm Based on Relatve Relatonshp of DCT Coeffcents Cheng ngzh, Du Yanpng, Wang Yan Bejng Insttute of Graphc Communcaton, Bejng, Chna Emal:

More information

Semi-Fragile Watermarking Scheme for Authentication of JPEG Images

Semi-Fragile Watermarking Scheme for Authentication of JPEG Images Tamkang Journal of Scence and Engneerng, Vol. 10, No 1, pp. 5766 (2007) 57 Sem-Fragle Watermarkng Scheme for Authentcaton of JPEG Images Chh-Hung n 1 *, Tung-Shh Su 2 and Wen-Shyong Hseh 2,3 1 Department

More information

A Fast Visual Tracking Algorithm Based on Circle Pixels Matching

A Fast Visual Tracking Algorithm Based on Circle Pixels Matching A Fast Vsual Trackng Algorthm Based on Crcle Pxels Matchng Zhqang Hou hou_zhq@sohu.com Chongzhao Han czhan@mal.xjtu.edu.cn Ln Zheng Abstract: A fast vsual trackng algorthm based on crcle pxels matchng

More information

A Robust Webpage Information Hiding Method Based on the Slash of Tag

A Robust Webpage Information Hiding Method Based on the Slash of Tag Advanced Engneerng Forum Onlne: 2012-09-26 ISSN: 2234-991X, Vols. 6-7, pp 361-366 do:10.4028/www.scentfc.net/aef.6-7.361 2012 Trans Tech Publcatons, Swtzerland A Robust Webpage Informaton Hdng Method Based

More information

KEYWORDS: Digital Image Watermarking, Discrete Wavelet Transform, General Regression Neural Network, Human Visual System. 1.

KEYWORDS: Digital Image Watermarking, Discrete Wavelet Transform, General Regression Neural Network, Human Visual System. 1. An Adaptve Dgtal Image Watermarkng Based on Image Features n Dscrete Wavelet Transform Doman and General Regresson Neural Network Ayoub Taher Group of IT Engneerng, Payam Noor Unversty, Broujen, Iran ABSTRACT:

More information

High Payload Reversible Data Hiding Scheme Using Difference Segmentation and Histogram Shifting

High Payload Reversible Data Hiding Scheme Using Difference Segmentation and Histogram Shifting JOURNAL OF ELECTRONIC SCIENCE AND TECHNOLOGY, VOL. 11, NO. 1, MARCH 2013 9 Hgh Payload Reversble Data Hdng Scheme Usng Dfference Segmentaton and Hstogram Shftng Yung-Chen Chou and Huang-Chng L Abstract

More information

Identify the Attack in Embedded Image with Steganalysis Detection Method by PSNR and RGB Intensity

Identify the Attack in Embedded Image with Steganalysis Detection Method by PSNR and RGB Intensity Internatonal Journal of Computer Systems (ISSN: 394-1065), Volume 03 Issue 07, July, 016 Avalable at http://www.jcsonlne.com/ Identfy the Attack n Embedded Image wth Steganalyss Detecton Method by PSNR

More information

A Comparison between Digital Images Watermarking in Tow Different Color Spaces Using DWT2*

A Comparison between Digital Images Watermarking in Tow Different Color Spaces Using DWT2* A Comparson between Dgtal s ng n Tow Dfferent Color Spaces Usng DWT* Mehd Khall Natonal Academy of Scence of Armena Yerevan, Armena e-mal: khall.mehd@yahoo.com ABSTRACT A novel dgtal watermarkng for ownershp

More information

Robust Video Watermarking Using Image Normalization, Motion Vector and Perceptual Information

Robust Video Watermarking Using Image Normalization, Motion Vector and Perceptual Information Robust Vdeo Watermarkng Usng Image ormalzaton, Moton Vector and Perceptual Informaton Cedllo-Hernández Antono 1, Cedllo-Hernández Manuel 1, akano-myatake Marko 1, García-Vázquez Mreya S. 2 1 Postgraduate

More information

A Hybrid Digital Image Watermarking based on Discrete Wavelet Transform, Discrete Cosine Transform, and General Regression Neural Network

A Hybrid Digital Image Watermarking based on Discrete Wavelet Transform, Discrete Cosine Transform, and General Regression Neural Network A Hybrd Dgtal Image Watermarkng based on Dscrete Wavelet Transform, Dscrete Cosne Transform, and General Regresson Neural Network Ayoub Taher ; ABSTRACT In ths paper, a new hybrd dgtal watermarkng technque

More information

Information Hiding Watermarking Detection Technique by PSNR and RGB Intensity

Information Hiding Watermarking Detection Technique by PSNR and RGB Intensity www..org 3 Informaton Hdng Watermarkng Detecton Technque by PSNR and RGB Intensty 1 Neha Chauhan, Akhlesh A. Waoo, 3 P. S. Patheja 1 Research Scholar, BIST, Bhopal, Inda.,3 Assstant Professor, BIST, Bhopal,

More information

An Optimal Algorithm for Prufer Codes *

An Optimal Algorithm for Prufer Codes * J. Software Engneerng & Applcatons, 2009, 2: 111-115 do:10.4236/jsea.2009.22016 Publshed Onlne July 2009 (www.scrp.org/journal/jsea) An Optmal Algorthm for Prufer Codes * Xaodong Wang 1, 2, Le Wang 3,

More information

Improvement of Spatial Resolution Using BlockMatching Based Motion Estimation and Frame. Integration

Improvement of Spatial Resolution Using BlockMatching Based Motion Estimation and Frame. Integration Improvement of Spatal Resoluton Usng BlockMatchng Based Moton Estmaton and Frame Integraton Danya Suga and Takayuk Hamamoto Graduate School of Engneerng, Tokyo Unversty of Scence, 6-3-1, Nuku, Katsuska-ku,

More information

Research of Multiple Text Watermarks Technique in Electric Power System Texts

Research of Multiple Text Watermarks Technique in Electric Power System Texts Sensors & Transducers 203 by IFSA http://www.sensorsportal.com Research of Multple Text atermarks Technque n Electrc Power System Texts Xao-X XING, Qng CHEN, 2 Lan-X FU School of Optcal-Electrcal and Computer

More information

Positive Semi-definite Programming Localization in Wireless Sensor Networks

Positive Semi-definite Programming Localization in Wireless Sensor Networks Postve Sem-defnte Programmng Localzaton n Wreless Sensor etworks Shengdong Xe 1,, Jn Wang, Aqun Hu 1, Yunl Gu, Jang Xu, 1 School of Informaton Scence and Engneerng, Southeast Unversty, 10096, anjng Computer

More information

An Image Fusion Approach Based on Segmentation Region

An Image Fusion Approach Based on Segmentation Region Rong Wang, L-Qun Gao, Shu Yang, Yu-Hua Cha, and Yan-Chun Lu An Image Fuson Approach Based On Segmentaton Regon An Image Fuson Approach Based on Segmentaton Regon Rong Wang, L-Qun Gao, Shu Yang 3, Yu-Hua

More information

IAJIT First Online Publication

IAJIT First Online Publication Content Protecton n Vdeo Data Based on Robust Dgtal Watermarkng Resstant to Intentonal and Unntentonal Attacks Mad Masoum and Shervn Amr Department of Electrcal Engneerng, Islamc Azad Unversty Qazvn Branch,

More information

An Image Compression Algorithm based on Wavelet Transform and LZW

An Image Compression Algorithm based on Wavelet Transform and LZW An Image Compresson Algorthm based on Wavelet Transform and LZW Png Luo a, Janyong Yu b School of Chongqng Unversty of Posts and Telecommuncatons, Chongqng, 400065, Chna Abstract a cylpng@63.com, b y27769864@sna.cn

More information

Local Quaternary Patterns and Feature Local Quaternary Patterns

Local Quaternary Patterns and Feature Local Quaternary Patterns Local Quaternary Patterns and Feature Local Quaternary Patterns Jayu Gu and Chengjun Lu The Department of Computer Scence, New Jersey Insttute of Technology, Newark, NJ 0102, USA Abstract - Ths paper presents

More information

A New Feature of Uniformity of Image Texture Directions Coinciding with the Human Eyes Perception 1

A New Feature of Uniformity of Image Texture Directions Coinciding with the Human Eyes Perception 1 A New Feature of Unformty of Image Texture Drectons Concdng wth the Human Eyes Percepton Xng-Jan He, De-Shuang Huang, Yue Zhang, Tat-Mng Lo 2, and Mchael R. Lyu 3 Intellgent Computng Lab, Insttute of Intellgent

More information

Grading Image Retrieval Based on DCT and DWT Compressed Domains Using Low-Level Features

Grading Image Retrieval Based on DCT and DWT Compressed Domains Using Low-Level Features Journal of Communcatons Vol. 0 No. January 0 Gradng Image Retreval Based on DCT and DWT Compressed Domans Usng Low-Level Features Chengyou Wang Xnyue Zhang Rongyang Shan and Xao Zhou School of echancal

More information

Digital Video Watermarking using Discrete Wavelet Transform and Principal Component Analysis

Digital Video Watermarking using Discrete Wavelet Transform and Principal Component Analysis Internatonal Journal of Wsdom Based Computng, Vol. 1 (2), August 2011 7 Dgtal Vdeo Watermarkng usng Dscrete Wavelet Transform and Prncpal Component Analyss Sanjana Snha, Prajnat Bardhan, Swarnal Pramanck,

More information

An Improved Image Segmentation Algorithm Based on the Otsu Method

An Improved Image Segmentation Algorithm Based on the Otsu Method 3th ACIS Internatonal Conference on Software Engneerng, Artfcal Intellgence, Networkng arallel/dstrbuted Computng An Improved Image Segmentaton Algorthm Based on the Otsu Method Mengxng Huang, enjao Yu,

More information

Research Article High Capacity Reversible Watermarking for Audio by Histogram Shifting and Predicted Error Expansion

Research Article High Capacity Reversible Watermarking for Audio by Histogram Shifting and Predicted Error Expansion e Scentfc World Journal, Artcle ID 656251, 7 pages http://dx.do.org/1.1155/214/656251 Research Artcle Hgh Capacty Reversble Watermarkng for Audo by Hstogram Shftng and Predcted Error Expanson Fe Wang,

More information

Using Fuzzy Logic to Enhance the Large Size Remote Sensing Images

Using Fuzzy Logic to Enhance the Large Size Remote Sensing Images Internatonal Journal of Informaton and Electroncs Engneerng Vol. 5 No. 6 November 015 Usng Fuzzy Logc to Enhance the Large Sze Remote Sensng Images Trung Nguyen Tu Huy Ngo Hoang and Thoa Vu Van Abstract

More information

Data Hiding and Image Authentication for Color-Palette Images

Data Hiding and Image Authentication for Color-Palette Images Data Hdng and Image Authentcaton for Color-Palette Images Chh-Yang Yn ( 殷志揚 ) and Wen-Hsang Tsa ( 蔡文祥 ) Department of Computer & Informaton Scence Natonal Chao Tung Unversty 00 Ta Hsueh Rd., Hsnchu, Tawan

More information

A Binarization Algorithm specialized on Document Images and Photos

A Binarization Algorithm specialized on Document Images and Photos A Bnarzaton Algorthm specalzed on Document mages and Photos Ergna Kavalleratou Dept. of nformaton and Communcaton Systems Engneerng Unversty of the Aegean kavalleratou@aegean.gr Abstract n ths paper, a

More information

The Research of Ellipse Parameter Fitting Algorithm of Ultrasonic Imaging Logging in the Casing Hole

The Research of Ellipse Parameter Fitting Algorithm of Ultrasonic Imaging Logging in the Casing Hole Appled Mathematcs, 04, 5, 37-3 Publshed Onlne May 04 n ScRes. http://www.scrp.org/journal/am http://dx.do.org/0.436/am.04.584 The Research of Ellpse Parameter Fttng Algorthm of Ultrasonc Imagng Loggng

More information

A Clustering Algorithm for Key Frame Extraction Based on Density Peak

A Clustering Algorithm for Key Frame Extraction Based on Density Peak Journal of Computer and Communcatons, 2018, 6, 118-128 http://www.scrp.org/ournal/cc ISSN Onlne: 2327-5227 ISSN Prnt: 2327-5219 A Clusterng Algorthm for Key Frame Extracton Based on Densty Peak Hong Zhao

More information

Research and Application of Fingerprint Recognition Based on MATLAB

Research and Application of Fingerprint Recognition Based on MATLAB Send Orders for Reprnts to reprnts@benthamscence.ae The Open Automaton and Control Systems Journal, 205, 7, 07-07 Open Access Research and Applcaton of Fngerprnt Recognton Based on MATLAB Nng Lu* Department

More information

Modular PCA Face Recognition Based on Weighted Average

Modular PCA Face Recognition Based on Weighted Average odern Appled Scence odular PCA Face Recognton Based on Weghted Average Chengmao Han (Correspondng author) Department of athematcs, Lny Normal Unversty Lny 76005, Chna E-mal: hanchengmao@163.com Abstract

More information

Security Enhanced Dynamic ID based Remote User Authentication Scheme for Multi-Server Environments

Security Enhanced Dynamic ID based Remote User Authentication Scheme for Multi-Server Environments Internatonal Journal of u- and e- ervce, cence and Technology Vol8, o 7 0), pp7-6 http://dxdoorg/07/unesst087 ecurty Enhanced Dynamc ID based Remote ser Authentcaton cheme for ult-erver Envronments Jun-ub

More information

Virtual Machine Migration based on Trust Measurement of Computer Node

Virtual Machine Migration based on Trust Measurement of Computer Node Appled Mechancs and Materals Onlne: 2014-04-04 ISSN: 1662-7482, Vols. 536-537, pp 678-682 do:10.4028/www.scentfc.net/amm.536-537.678 2014 Trans Tech Publcatons, Swtzerland Vrtual Machne Mgraton based on

More information

Wireless Sensor Network Localization Research

Wireless Sensor Network Localization Research Sensors & Transducers 014 by IFSA Publshng, S L http://wwwsensorsportalcom Wreless Sensor Network Localzaton Research Lang Xn School of Informaton Scence and Engneerng, Hunan Internatonal Economcs Unversty,

More information

IMPLEMENTATION OF QIM BASED AUDIO WATERMARKING USING HYBRID TRANSFORM OF SWT-DCT-SVD METHODS OPTIMIZED WITH GENETIC ALORITHM

IMPLEMENTATION OF QIM BASED AUDIO WATERMARKING USING HYBRID TRANSFORM OF SWT-DCT-SVD METHODS OPTIMIZED WITH GENETIC ALORITHM IMPLEMENTATION OF QIM BASED AUDIO WATERMARKING USING HYBRID TRANSFORM OF SWT-DCT-SVD METHODS OPTIMIZED WITH GENETIC ALORITHM Ryan Amnullah 1, Gelar Budman 2, Irma Saftr 3 1, 2, 3 FakultasTeknk Elektro,

More information

Enhanced AMBTC for Image Compression using Block Classification and Interpolation

Enhanced AMBTC for Image Compression using Block Classification and Interpolation Internatonal Journal of Computer Applcatons (0975 8887) Volume 5 No.0, August 0 Enhanced AMBTC for Image Compresson usng Block Classfcaton and Interpolaton S. Vmala Dept. of Comp. Scence Mother Teresa

More information

Using Counter-propagation Neural Network for Digital Audio Watermarking

Using Counter-propagation Neural Network for Digital Audio Watermarking Usng Counter-propagaton Neural Network for Dgtal Audo Watermarkng Chuan-Yu Chang and Wen-Chh Shen Graduate School of Computer Scence and Informaton Engneerng Natonal Yunln Unversty of Scence & Technology

More information

Analysis on the Workspace of Six-degrees-of-freedom Industrial Robot Based on AutoCAD

Analysis on the Workspace of Six-degrees-of-freedom Industrial Robot Based on AutoCAD Analyss on the Workspace of Sx-degrees-of-freedom Industral Robot Based on AutoCAD Jn-quan L 1, Ru Zhang 1,a, Fang Cu 1, Q Guan 1 and Yang Zhang 1 1 School of Automaton, Bejng Unversty of Posts and Telecommuncatons,

More information

A Novel Video Retrieval Method Based on Web Community Extraction Using Features of Video Materials

A Novel Video Retrieval Method Based on Web Community Extraction Using Features of Video Materials IEICE TRANS. FUNDAMENTALS, VOL.E92 A, NO.8 AUGUST 2009 1961 PAPER Specal Secton on Sgnal Processng A Novel Vdeo Retreval Method Based on Web Communty Extracton Usng Features of Vdeo Materals Yasutaka HATAKEYAMA

More information

Corner-Based Image Alignment using Pyramid Structure with Gradient Vector Similarity

Corner-Based Image Alignment using Pyramid Structure with Gradient Vector Similarity Journal of Sgnal and Informaton Processng, 013, 4, 114-119 do:10.436/jsp.013.43b00 Publshed Onlne August 013 (http://www.scrp.org/journal/jsp) Corner-Based Image Algnment usng Pyramd Structure wth Gradent

More information

Geometrically Invariant Watermarking Scheme Based on Local Feature Points

Geometrically Invariant Watermarking Scheme Based on Local Feature Points JOURNAL OF MULTIMEDIA, VOL. 7, NO. 3, JUNE 0 3 Geometrcally Invarant Watermarkng Scheme Based on Local Feature Ponts L Jng School of Computer and Informaton Engneerng, Henan Unversty of Economcs and Law,

More information

Improved Resource Allocation Algorithms for Practical Image Encoding in a Ubiquitous Computing Environment

Improved Resource Allocation Algorithms for Practical Image Encoding in a Ubiquitous Computing Environment JOURNAL OF COMPUTERS, VOL. 4, NO. 9, SEPTEMBER 2009 873 Improved Resource Allocaton Algorthms for Practcal Image Encodng n a Ubqutous Computng Envronment Manxong Dong, Long Zheng, Kaoru Ota, Song Guo School

More information

Distortion Function Designing for JPEG Steganography with Uncompressed Side-image

Distortion Function Designing for JPEG Steganography with Uncompressed Side-image Dstorton Functon Desgnng for JPEG Steganography wth Uncompressed Sde-mage Fangjun Huang School of Informaton Scence and Technology, Sun Yat-Sen Unversty, GD 56, Chna huangfj@mal.sysu.edu.cn Jwu Huang School

More information

Classifier Selection Based on Data Complexity Measures *

Classifier Selection Based on Data Complexity Measures * Classfer Selecton Based on Data Complexty Measures * Edth Hernández-Reyes, J.A. Carrasco-Ochoa, and J.Fco. Martínez-Trndad Natonal Insttute for Astrophyscs, Optcs and Electroncs, Lus Enrque Erro No.1 Sta.

More information

A Novel Adaptive Descriptor Algorithm for Ternary Pattern Textures

A Novel Adaptive Descriptor Algorithm for Ternary Pattern Textures A Novel Adaptve Descrptor Algorthm for Ternary Pattern Textures Fahuan Hu 1,2, Guopng Lu 1 *, Zengwen Dong 1 1.School of Mechancal & Electrcal Engneerng, Nanchang Unversty, Nanchang, 330031, Chna; 2. School

More information

Detecting MP3Stego using Calibrated Side Information Features

Detecting MP3Stego using Calibrated Side Information Features 2628 JOURNAL OF SOFTWARE, VOL. 8, NO. 10, OCTOBER 2013 Detectng P3Stego usng Calbrated Sde Informaton Features Xanmn Yu School of Informaton Scence and Engneerng, Nngbo Unversty Emal: mlhappy1016@163.com

More information

Professional competences training path for an e-commerce major, based on the ISM method

Professional competences training path for an e-commerce major, based on the ISM method World Transactons on Engneerng and Technology Educaton Vol.14, No.4, 2016 2016 WIETE Professonal competences tranng path for an e-commerce maor, based on the ISM method Ru Wang, Pn Peng, L-gang Lu & Lng

More information

FEATURE EXTRACTION. Dr. K.Vijayarekha. Associate Dean School of Electrical and Electronics Engineering SASTRA University, Thanjavur

FEATURE EXTRACTION. Dr. K.Vijayarekha. Associate Dean School of Electrical and Electronics Engineering SASTRA University, Thanjavur FEATURE EXTRACTION Dr. K.Vjayarekha Assocate Dean School of Electrcal and Electroncs Engneerng SASTRA Unversty, Thanjavur613 41 Jont Intatve of IITs and IISc Funded by MHRD Page 1 of 8 Table of Contents

More information

Parallelism for Nested Loops with Non-uniform and Flow Dependences

Parallelism for Nested Loops with Non-uniform and Flow Dependences Parallelsm for Nested Loops wth Non-unform and Flow Dependences Sam-Jn Jeong Dept. of Informaton & Communcaton Engneerng, Cheonan Unversty, 5, Anseo-dong, Cheonan, Chungnam, 330-80, Korea. seong@cheonan.ac.kr

More information

Detection of an Object by using Principal Component Analysis

Detection of an Object by using Principal Component Analysis Detecton of an Object by usng Prncpal Component Analyss 1. G. Nagaven, 2. Dr. T. Sreenvasulu Reddy 1. M.Tech, Department of EEE, SVUCE, Trupath, Inda. 2. Assoc. Professor, Department of ECE, SVUCE, Trupath,

More information

Novel Pattern-based Fingerprint Recognition Technique Using 2D Wavelet Decomposition

Novel Pattern-based Fingerprint Recognition Technique Using 2D Wavelet Decomposition Mathematcal Methods for Informaton Scence and Economcs Novel Pattern-based Fngerprnt Recognton Technque Usng D Wavelet Decomposton TUDOR BARBU Insttute of Computer Scence of the Romanan Academy T. Codrescu,,

More information

Suppression for Luminance Difference of Stereo Image-Pair Based on Improved Histogram Equalization

Suppression for Luminance Difference of Stereo Image-Pair Based on Improved Histogram Equalization Suppresson for Lumnance Dfference of Stereo Image-Par Based on Improved Hstogram Equalzaton Zhao Llng,, Zheng Yuhu 3, Sun Quansen, Xa Deshen School of Computer Scence and Technology, NJUST, Nanjng, Chna.School

More information

Performance Analysis of Data Hiding in MPEG-4 AAC Audio *

Performance Analysis of Data Hiding in MPEG-4 AAC Audio * TSINGHUA SCIENCE AND TECHNOLOGY ISSNll1007-0214ll07/21llpp55-61 Volume 14, Number 1, February 2009 Performance Analyss of Data Hdng n MPEG-4 AAC Audo * XU Shuzheng ( ) **, ZHANG Peng ( ), WANG Pengjun

More information

Tsinghua University at TAC 2009: Summarizing Multi-documents by Information Distance

Tsinghua University at TAC 2009: Summarizing Multi-documents by Information Distance Tsnghua Unversty at TAC 2009: Summarzng Mult-documents by Informaton Dstance Chong Long, Mnle Huang, Xaoyan Zhu State Key Laboratory of Intellgent Technology and Systems, Tsnghua Natonal Laboratory for

More information

Steganography System using Slantlet Transform

Steganography System using Slantlet Transform ISSN:43-6999 Journal of Inmaton Communcaton and Intellgence Systems (JICIS) Volume Issue February 06 Steganography System usng Slantlet Transm Ryadh Bassl Abduljabbar Abstract An approach hdng nmaton has

More information

Available online at Available online at Advanced in Control Engineering and Information Science

Available online at   Available online at   Advanced in Control Engineering and Information Science Avalable onlne at wwwscencedrectcom Avalable onlne at wwwscencedrectcom Proceda Proceda Engneerng Engneerng 00 (2011) 15000 000 (2011) 1642 1646 Proceda Engneerng wwwelsevercom/locate/proceda Advanced

More information

Computer Generated Integral Imaging (II) System Using Depth-Camera

Computer Generated Integral Imaging (II) System Using Depth-Camera Computer Generated Integral Imagng (II) System Usng Depth-Camera Md. Sharful Islam 1, Md. Tarquzzaman 2 1,2 Department of Informaton and Communcaton Engneerng, Islamc Unversty, Kushta-7003, Bangladesh

More information

Learning the Kernel Parameters in Kernel Minimum Distance Classifier

Learning the Kernel Parameters in Kernel Minimum Distance Classifier Learnng the Kernel Parameters n Kernel Mnmum Dstance Classfer Daoqang Zhang 1,, Songcan Chen and Zh-Hua Zhou 1* 1 Natonal Laboratory for Novel Software Technology Nanjng Unversty, Nanjng 193, Chna Department

More information

MULTISPECTRAL IMAGES CLASSIFICATION BASED ON KLT AND ATR AUTOMATIC TARGET RECOGNITION

MULTISPECTRAL IMAGES CLASSIFICATION BASED ON KLT AND ATR AUTOMATIC TARGET RECOGNITION MULTISPECTRAL IMAGES CLASSIFICATION BASED ON KLT AND ATR AUTOMATIC TARGET RECOGNITION Paulo Quntlano 1 & Antono Santa-Rosa 1 Federal Polce Department, Brasla, Brazl. E-mals: quntlano.pqs@dpf.gov.br and

More information

Dynamic Code Block Size for JPEG 2000

Dynamic Code Block Size for JPEG 2000 Dynamc Code Block Sze for JPEG 2000 Png-Sng Tsa a, Yann LeCornec b a Dept. of Computer Scence, Unv. of Texas Pan Amercan, 1201 W. Unv. Dr., Ednburg, TX USA 78539-2999; b Sgma Desgns, Inc., 1778 McCarthy

More information

Research Article Hamming Code Based Watermarking Scheme for 3D Model Verification

Research Article Hamming Code Based Watermarking Scheme for 3D Model Verification Mathematcal Problems n Engneerng, Artcle ID 241093, 7 pages http://dx.do.org/10.1155/2014/241093 Research Artcle Hammng Code Based Watermarkng Scheme for 3D Model Verfcaton Jen-Tse Wang, 1 Y-Chng Chang,

More information

Adaptive digital watermarking of images using Genetic Algorithm

Adaptive digital watermarking of images using Genetic Algorithm Adaptve dgtal watermarkng of mages usng Genetc Algorthm Bushra Skander, Muhammad Ishtaq, M. Arfan Jaffar, Muhammad Tarq, Anwar M. Mrza Department of Computer Scence, Natonal Unversty of Computer and Emergng

More information

User Authentication Based On Behavioral Mouse Dynamics Biometrics

User Authentication Based On Behavioral Mouse Dynamics Biometrics User Authentcaton Based On Behavoral Mouse Dynamcs Bometrcs Chee-Hyung Yoon Danel Donghyun Km Department of Computer Scence Department of Computer Scence Stanford Unversty Stanford Unversty Stanford, CA

More information

Skew Angle Estimation and Correction of Hand Written, Textual and Large areas of Non-Textual Document Images: A Novel Approach

Skew Angle Estimation and Correction of Hand Written, Textual and Large areas of Non-Textual Document Images: A Novel Approach Angle Estmaton and Correcton of Hand Wrtten, Textual and Large areas of Non-Textual Document Images: A Novel Approach D.R.Ramesh Babu Pyush M Kumat Mahesh D Dhannawat PES Insttute of Technology Research

More information

Problem Definitions and Evaluation Criteria for Computational Expensive Optimization

Problem Definitions and Evaluation Criteria for Computational Expensive Optimization Problem efntons and Evaluaton Crtera for Computatonal Expensve Optmzaton B. Lu 1, Q. Chen and Q. Zhang 3, J. J. Lang 4, P. N. Suganthan, B. Y. Qu 6 1 epartment of Computng, Glyndwr Unversty, UK Faclty

More information

Quality Improvement Algorithm for Tetrahedral Mesh Based on Optimal Delaunay Triangulation

Quality Improvement Algorithm for Tetrahedral Mesh Based on Optimal Delaunay Triangulation Intellgent Informaton Management, 013, 5, 191-195 Publshed Onlne November 013 (http://www.scrp.org/journal/m) http://dx.do.org/10.36/m.013.5601 Qualty Improvement Algorthm for Tetrahedral Mesh Based on

More information

Robust visual tracking based on Informative random fern

Robust visual tracking based on Informative random fern 5th Internatonal Conference on Computer Scences and Automaton Engneerng (ICCSAE 205) Robust vsual trackng based on Informatve random fern Hao Dong, a, Ru Wang, b School of Instrumentaton Scence and Opto-electroncs

More information

Load Balancing for Hex-Cell Interconnection Network

Load Balancing for Hex-Cell Interconnection Network Int. J. Communcatons, Network and System Scences,,, - Publshed Onlne Aprl n ScRes. http://www.scrp.org/journal/jcns http://dx.do.org/./jcns.. Load Balancng for Hex-Cell Interconnecton Network Saher Manaseer,

More information

Brushlet Features for Texture Image Retrieval

Brushlet Features for Texture Image Retrieval DICTA00: Dgtal Image Computng Technques and Applcatons, 1 January 00, Melbourne, Australa 1 Brushlet Features for Texture Image Retreval Chbao Chen and Kap Luk Chan Informaton System Research Lab, School

More information

Querying by sketch geographical databases. Yu Han 1, a *

Querying by sketch geographical databases. Yu Han 1, a * 4th Internatonal Conference on Sensors, Measurement and Intellgent Materals (ICSMIM 2015) Queryng by sketch geographcal databases Yu Han 1, a * 1 Department of Basc Courses, Shenyang Insttute of Artllery,

More information

PCA Based Gait Segmentation

PCA Based Gait Segmentation Honggu L, Cupng Sh & Xngguo L PCA Based Gat Segmentaton PCA Based Gat Segmentaton Honggu L, Cupng Sh, and Xngguo L 2 Electronc Department, Physcs College, Yangzhou Unversty, 225002 Yangzhou, Chna 2 Department

More information

Remote Sensing Image Retrieval Algorithm based on MapReduce and Characteristic Information

Remote Sensing Image Retrieval Algorithm based on MapReduce and Characteristic Information Remote Sensng Image Retreval Algorthm based on MapReduce and Characterstc Informaton Zhang Meng 1, 1 Computer School, Wuhan Unversty Hube, Wuhan430097 Informaton Center, Wuhan Unversty Hube, Wuhan430097

More information

Mining User Similarity Using Spatial-temporal Intersection

Mining User Similarity Using Spatial-temporal Intersection www.ijcsi.org 215 Mnng User Smlarty Usng Spatal-temporal Intersecton Ymn Wang 1, Rumn Hu 1, Wenhua Huang 1 and Jun Chen 1 1 Natonal Engneerng Research Center for Multmeda Software, School of Computer,

More information

A Secured Method for Image Steganography Based On Pixel Values

A Secured Method for Image Steganography Based On Pixel Values A Secured Method for Image Steganography Based On Pxel Values Tarun Gulat #, Sanskrt Gupta * # Assocate Professor, Electroncs and Communcaton Engneerng Department, MMEC, M.M.U., Mullana, Ambala, Haryana,

More information

A fast algorithm for color image segmentation

A fast algorithm for color image segmentation Unersty of Wollongong Research Onlne Faculty of Informatcs - Papers (Arche) Faculty of Engneerng and Informaton Scences 006 A fast algorthm for color mage segmentaton L. Dong Unersty of Wollongong, lju@uow.edu.au

More information

A Low Energy Algorithm of Wireless Sensor Networks Based on Fractal Dimension

A Low Energy Algorithm of Wireless Sensor Networks Based on Fractal Dimension Sensors & Transducers 2014 by IFSA Publshng, S. L. http://www.sensorsportal.com A Low Energy Algorthm of Wreless Sensor Networks ased on Fractal Dmenson Tng Dong, Chunxao Fan, Zhgang Wen School of Electronc

More information

Design of Structure Optimization with APDL

Design of Structure Optimization with APDL Desgn of Structure Optmzaton wth APDL Yanyun School of Cvl Engneerng and Archtecture, East Chna Jaotong Unversty Nanchang 330013 Chna Abstract In ths paper, the desgn process of structure optmzaton wth

More information

Article Reversible Dual-Image-Based Hiding Scheme Using Block Folding Technique

Article Reversible Dual-Image-Based Hiding Scheme Using Block Folding Technique Artcle Reversble Dual-Image-Based Hdng Scheme Usng Block Foldng Technque Tzu-Chuen Lu, * and Hu-Shh Leng Department of Informaton Management, Chaoyang Unversty of Technology, Tachung 4349, Tawan Department

More information

Research Article Improved Encrypted-Signals-Based Reversible Data Hiding Using Code Division Multiplexing and Value Expansion

Research Article Improved Encrypted-Signals-Based Reversible Data Hiding Using Code Division Multiplexing and Value Expansion Securty and Communcaton Networks Volume 2018, Artcle ID 1326235, 9 pages https://do.org/10.1155/2018/1326235 Research Artcle Improved Encrypted-Sgnals-Based Reversble Data Hdng Usng Code Dvson Multplexng

More information

Query Clustering Using a Hybrid Query Similarity Measure

Query Clustering Using a Hybrid Query Similarity Measure Query clusterng usng a hybrd query smlarty measure Fu. L., Goh, D.H., & Foo, S. (2004). WSEAS Transacton on Computers, 3(3), 700-705. Query Clusterng Usng a Hybrd Query Smlarty Measure Ln Fu, Don Hoe-Lan

More information

TN348: Openlab Module - Colocalization

TN348: Openlab Module - Colocalization TN348: Openlab Module - Colocalzaton Topc The Colocalzaton module provdes the faclty to vsualze and quantfy colocalzaton between pars of mages. The Colocalzaton wndow contans a prevew of the two mages

More information

Coding Artifact Reduction Using Edge Map Guided Adaptive and Fuzzy Filter

Coding Artifact Reduction Using Edge Map Guided Adaptive and Fuzzy Filter MEL A MITSUBISHI ELECTIC ESEACH LABOATOY http://www.merl.com Codng Artfact educton Usng Edge Map Guded Adaptve and Fuzzy Flter Hao-Song Kong Yao Ne Anthony Vetro Hufang Sun Kenneth E. Barner T-2004-056

More information

A Distributed Dynamic Bandwidth Allocation Algorithm in EPON

A Distributed Dynamic Bandwidth Allocation Algorithm in EPON www.ccsenet.org/mas Modern Appled Scence Vol. 4, o. 7; July 2010 A Dstrbuted Dynamc Bandwdth Allocaton Algorthm n EPO Feng Cao, Demng Lu, Mnmng Zhang, Kang Yang & Ynbo Qan School of Optoelectronc Scence

More information

Security Vulnerabilities of an Enhanced Remote User Authentication Scheme

Security Vulnerabilities of an Enhanced Remote User Authentication Scheme Contemporary Engneerng Scences, Vol. 7, 2014, no. 26, 1475-1482 HIKARI Ltd, www.m-hkar.com http://dx.do.org/10.12988/ces.2014.49186 Securty Vulnerabltes of an Enhanced Remote User Authentcaton Scheme Hae-Soon

More information

Alignment Results of SOBOM for OAEI 2010

Alignment Results of SOBOM for OAEI 2010 Algnment Results of SOBOM for OAEI 2010 Pegang Xu, Yadong Wang, Lang Cheng, Tany Zang School of Computer Scence and Technology Harbn Insttute of Technology, Harbn, Chna pegang.xu@gmal.com, ydwang@ht.edu.cn,

More information

Joint Example-based Depth Map Super-Resolution

Joint Example-based Depth Map Super-Resolution Jont Example-based Depth Map Super-Resoluton Yanje L 1, Tanfan Xue,3, Lfeng Sun 1, Janzhuang Lu,3,4 1 Informaton Scence and Technology Department, Tsnghua Unversty, Bejng, Chna Department of Informaton

More information

FINDING IMPORTANT NODES IN SOCIAL NETWORKS BASED ON MODIFIED PAGERANK

FINDING IMPORTANT NODES IN SOCIAL NETWORKS BASED ON MODIFIED PAGERANK FINDING IMPORTANT NODES IN SOCIAL NETWORKS BASED ON MODIFIED PAGERANK L-qng Qu, Yong-quan Lang 2, Jng-Chen 3, 2 College of Informaton Scence and Technology, Shandong Unversty of Scence and Technology,

More information

Robust Spread Spectrum Based Digital Video Watermarking Scheme in Frequency Domain Nisha Chaudhary 1 Savita Shivani 2

Robust Spread Spectrum Based Digital Video Watermarking Scheme in Frequency Domain Nisha Chaudhary 1 Savita Shivani 2 IJSRD Internatonal Journal for Scentfc Research & Development Vol. 2, Issue 6, 2 ISSN (onlne): 23263 Robust Spread Spectrum Based Dgtal Vdeo Watermarkng Scheme n Frequency Doman Nsha Chaudhary Savta Shvan

More information