Video Watermarking Algorithm Based on Relative Relationship of DCT Coefficients

Size: px
Start display at page:

Download "Video Watermarking Algorithm Based on Relative Relationship of DCT Coefficients"

Transcription

1 756 JOURAL OF COPUTERS, VOL. 8, O., OVEBER 03 Vdeo Watermarkng Algorthm Based on Relatve Relatonshp of DCT Coeffcents Cheng ngzh, Du Yanpng, Wang Yan Bejng Insttute of Graphc Communcaton, Bejng, Chna Emal: X nchao, Yuan Kaguo School of Computng, Bejng Unversty of Posts and Telecommuncatons, Bejng, Chna Emal: flyngdreamng@gmal.com Abstract A vdeo watermarkng algorthm based on relatve relatonshp of DCT coeffcents s proposed n ths paper. By modfcaton of coeffcents on chosen postons, the robustness of watermark embeddng s ensured. eanwhle, as the relatonshp of coeffcents remans unchanged, the qualty of vdeo s not affected. The analyss results shows that the performance of proposed algorthm s better than the typcal algorthms. Index Terms Vdeo Watermark; Relatve Relatonshp; DCT; BCH; Arnold Transformaton I. ITRODUCTIO In recent decade, as mult-meda nformaton become more and more dgtalzed, technology of vdeo dgtalzaton becomes rapdly advanced n way of nformaton nqury, presentaton, storage and transfer. However, ssues have been rased smultaneously wth the most phenomenon one as ntellectual property theft. The cause of ths ssue should be prmarly blamed on the low lmtaton of duplcaton. Watermarkng technology become more often used n the area of copy protecton, wth ths method, orgnal vdeo owner could nsert the property dentfcaton nformaton nto the vdeo. The vdeo fle could stll be used or transferred normally. The orgnalty of vdeo s always traceable, ntellectual property s as a result beng protected. Although watermarkng technology cannot prevent llegal duplcaton of vdeo data, authors and publshers could stll track the source of unauthorzed vdeo, and stop the llegal behavor as soon as possble. Smlar wth nformaton hdng technques, watermark algorthms work by embeddng a encodng sgnal nto the vdeo fle. The sgnal could generally nclude the owner dentfcaton, publshng dates and seral number. All the nformaton s used to track the status of publshng and usage of protected vdeos [] []. Vdeo watermarks can be ether vsble or nvsble. The logo of authors, photocopy of lbrary books etc. always showed as the vsble watermark. Invsble watermarks n the other way, does not affect the vdeo appearance, copy nformaton s coded nsde wthout other nfluence. Accordng to the preservaton of vdeo qualty, nvsble watermarks are more commonly used []. Vdeo watermarkng algorthms could also be classfed nto two categores: watermark of spatal doman and watermark of frequency doman. Spatal doman watermarkng algorthms embed the watermark by drectly modfyng the pxel values of the host vdeo, whle frequency doman watermarkng algorthms embed watermark by modulatng the frequency coeffcents. The latter one s more robust when sufferng ordnary vdeo manpulatons. Furthermore, among the several frequency domans-dct, DWT, DFT, algorthms based on DCT doman are more capablty n dgtal vdeo codec standards, so t draws majorty attentons of researchers [3]. In ths paper, the algorthm we are presentng modfes coeffcents wthout changng ther relatve relatonshp, whle the former algorthms tends to change coeffcents arbtrarly, causng problem n the qualty of vdeo. In fact, vdeo qualty could be even better, as the characterstcs of the mage data have been taken advantage. The man contrbutons of ths paper are as follows. We reveal the prncple of common watermarkng algorthms: storng bnary nformaton n the host data usng bnary relatonshp. And we proposed a new vdeo watermarkng algorthm storng nformaton by a dfferent bnary relatonshp whch mproves the vdeo qualty. The rest of ths paper s organzed as follows. Defntons of DCT and BCH code are ntroduced n secton II. Prncple and procedures of the proposed watermark algorthm are dscussed n detal n secton III. In secton IV, performances of our algorthm are evaluated and analyzed. Fnally, conclusons and future works are rased n secton V. II. RELATED WORK A. DCT and Vdeo Codec Standards DCT, short for Dscrete Cosne Transform, s wdely used n popular vdeo compresson standards, such as 03 ACADEY PUBLISHER do:0.4304/jcp

2 JOURAL OF COPUTERS, VOL. 8, O., OVEBER H.64 and PEG4. The purpose of DCT transform n vdeo codec s to convert mage or moton-compensated resdual data nto another doman, the frequency, or more commonly called, transform doman. The choce of transform depends on a number of crtera: ) Data n the transform doman should be decorrelated,.e. separated nto components wthn mnmal nter-dependence, and compact,.e. most of the energy n the transformed data should be concentrated nto a small number of values. ) The transform should be reversble. 3) The transform should be computatonally tractable, e.g. less memory requrement, achevable usng lmtedprecson arthmetc, fewer arthmetc operatons, etc. There are plenty of vdeo compresson algorthms and the most popular transforms tend to fall nto two categores, block-based and mage-based. Examples of block-based transforms nclude the KLT (Karhunen- Loeve Transform), SVD (Sngular Value Decomposton), and the ever-popular DCT (Dscrete Cosne Transform). Each of these operates on blocks of * mage or resdual samples and hence the mage s processed n unts of a block. Block transforms have less memory requrements and are well suted to compresson of blockbased moton compensaton resduals whle sufferng from artfacts at block edges, however. Image-based transforms operate on an entre mage or frame or a large secton of the mage known as a tle. The most popular mage transform s the DWT (Dscrete Wavelet Transform), or wavelet. Image transforms such as the DWT have been shown to out-perform block transforms for stll mage compresson but they tend to have hgher memory requrements because the whole mage or tle s processed as a unt and they do not necessarly ft well wth block-based moton compresson whch s the most mportant and effectve operaton of vdeo compresson. The approxmatons to the DCT are featured n H.64 for ts hgh effcency and consderable ablty of decorrelaton. The Dscrete Cosne Transform operates on X, a block of * samples, typcally mage samples or resdual values after predcton, to create Y, an * block of coeffcents. The acton of the forward DCT of a sample block s gven by [4]: ( ) ( ) ( ) ( ) ( ) ( ) + uπ j + vπ Y u, v = a u a v X, j cos cos () a = 0 j= 0, u = 0, u =,,..., ( u) =, a() v =, v = 0, v =,,..., Where Y stands for the DCT coeffcent matrx of X, n whch Y ( 0,0) s called DC coeffcent, and others are mentoned as AC coeffcents. The nverse DCT of a sample block s gven by: ( ) ( ) ( ) ( ) ( ) ( ) + uπ j + vπ (3) X, j = a u a v Y u, v cos cos u= 0 v= 0 = 0,,,...,, j = 0,,,...,. () B. BCH Code In codng theory, BCH code s one of the cyclc errorcorrectng codes that are constructed usng fnte felds. BCH code s nvented n 959 by Hocquenghem, Bose, Chaudhur ndependently. One of the key features of BCH codes s that durng code desgn, there s a precse control over the number of symbol errors correctable by the code. In partcular, t s possble to desgn bnary BCH codes that can correct multple bt errors. Another advantage of BCH codes s the ease of use as they can be decoded, namely, va an algebrac method known as syndrome decodng. Ths smplfes the desgn of the decoder for these codes, usng small low-power electronc hardware. Wth all these advantages, BCH code s wdely used n modern communcaton systems. Gven t as the number of errors desgns to correct, ( x) m be the mnmal polynomal, d stands for the code mnmal dstance, where d d 0 = t +, BCH code has the length of n = m, whose generator polynomal s [5]: g( x) = LC [ m ( x), m3 ( x)... mt ( x) ] (4) III. PROPOSED ETHOD A. Bnary Relatve Relatonshp The storage of watermarkng nformaton n vdeo frames usually depends on the relatonshps of coeffcents, and most of whch are bnary relatonshp. Ether watermarkng algorthms based on energy modulaton [4], or the ones depend on correlaton detecton and spread spectrum, the most basc prncple could be expressed as followng [][6-0]. As the basc nformaton unt n dgtal storage, bnary relatonshp s the most basc relatonshp, as the formula below: W = R ( x, x ) (5) Where x, x are the values based on mage contents, or const values whch are pre-defned. For nstance, a knd of watermarkng algorthm based on energy modulaton s proposed n paper [4]. In whch the watermark nformaton are kept on the bnary relatonshp of the coeffcent energy n each block and the average energy of the whole mage. Ths could be represented as ths formula, whch has represented a knd of bnary relatonshp:, f P P W = R( P, P ) = (6) 0, f P < P Where W stands for the th bt of watermark nformaton, P expresses the energy of th block, and P s the average energy of blocks of the whole mage. Another knd of example algorthms comes from artcles [][6-0], whch proposed watermark algorthms based on spread spectrum and correlaton detecton. Wthn these algorthms, watermark nformaton are stored by ths formula, whch also represents a knd of bnary relatonshp: 03 ACADEY PUBLISHER

3 758 JOURAL OF COPUTERS, VOL. 8, O., OVEBER 03, f Corr( S, Sw) Threshold W = R( S, S ) = (7) w 0, f Corr( S, Sw) < Threshold Where S stands for the coeffcent sequence, S s the w detecton sequence generated by watermark nformaton. Based on the prncples mentoned before, a watermark algorthm based on bnary relatonshp of three coeffcents s proposed, whch stores watermark nformaton by modulatng the dstances between coeffcents. Compared wth other algorthms whch modfed the coeffcents arbtrarly, ths algorthm changes the coeffcents when the relatonshp of whch s kept, and takes advantage of the characterstcs of mage data, whch could mproves the vdeo qualty. The proposed algorthm could be expressed n the followng formula: 0, f D D W = R( D, D ) = (8), f D > D D md Coef D Coef md It should be emphaszed that Coef, Coef, and md Coef are not coeffcents whose postons are fxed. They are a ordered coeffcent sequence from three predefned postons, where Coef Coefmd Coef. The proposed algorthm keeps the relatonshp of three coeffcents unchanged whle embeddng the watermarks, whch means the characterstc of vdeo mage data are sustaned, and excess modfcatons are avod. B. Watermark Embeddng Gven a vdeo of sze *. The vdeo frame are dvded nto blocks of 8*8, whch are expressed as D ( x, y), x, y =,,3,..., 8, =,,3..., L, L = ( / 8 * / 8 ). For each block, a block of DCT coeffcents s generated, marked as C ( u, v), u, v =,,3,...,8, =,,3..., L. To generate watermark nformaton, a H * H bnary btmap s converted to bt stream W. Then, encode W wth a BCH encoder by the parameters = 63, K = 8, a bt stream of W ' s generated. Embed W ' nto each 8*8 DCT coeffcent block C ( u, v) bt by bt usng the followng steps. a) Select three coeffcents from C, sort them nto Coef Coef md Coef. b) Calculate the dstance between Coef and Coef, D total Coef. To ensure the robustness of algorthm, a threshold Threshold s defned to ndcate the mnmal dstance of Coef and Coef. If D total < Threshold, then the algorthm modfes the values of Coef and Coef, to ncrease the dstance of them to Threshold, as followng: Threshold Dtotal Threshold Dtotal + (9) If D total Threshold, then wll not be modfed, that s : c) Embed W ' nto C to get C', where W ' { 0,}. If W '= 0, then do the followng operaton: Dtotal md = + (0) Scale If W '=, then do the followng operaton: Dtotal md = () Scale Where Scale 3 s a predefned const. Ths const number stands for the dstance of and md +. The bgger the value s, the stronger the watermark sgnals are embedded. d) Convert each embedded coeffcent block C' to spatal doman- a embedded pxel block D'. Compose all the embedded blocks nto a vdeo frame I '. C. Watermark Detecton Just lke the embeddng procedure, gven a suspcous vdeo of sze *. The vdeo frame are dvded nto 8*8 blocks D' ( x, y), x, y =,,3,..., 8, =,,3..., L, L = ( / 8 * /8 ). For each block, a block of DCT coeffcents s generated, marked as C' ( u, v), u, v =,,3,...,8, =,,3..., L. Detect watermark nformaton WE ' from each 8*8 DCT coeffcent block C' ( u, v) bt by bt usng the followng steps. a) Select the three coeffcents used n the embeddng procedure. Then sort them to generate the coeffcent sequence md. b) Calculate D = md Coef ' and D Coef, then each bt of WE ' s md generated. If D D, then WE ' = 0. If D > D, then WE ' =. () To generate watermark nformaton, a H * H bnary btmap s converted to bt stream W. Then, encode W wth a BCH encoder by the parameters = 63, K = 8, a bt stream of W ' s generated. Decode WE ' wth a BCH decoder by the parameters = 63, K = 8, a bt stream WE s generated. Then, WE s converted to a H * H bnary btmap, as the extracted watermark mage. 03 ACADEY PUBLISHER

4 JOURAL OF COPUTERS, VOL. 8, O., OVEBER IV. A. Algorthm Parameters EXPERIETAL RESULTS Parameters Threshold = 40 and Scale = 6 are selected to evaluated the performances of the algorthm. Four test vdeos are chosen to evaluate the algorthm: flower (35*88), foreman (35*88), mother (35*88), waterfall (35*88). A 6*6 bnary btmap s used as the watermark mage, as followng: B. Embed Performances Some of the embedded vdeo frames are showed n Fgure to Fgure 8. Fgure 4. Watermarked frames n foreman_cf.yuv. PSR= Fgure. Orgnal frames n flower_cf.yuv. PSR= Fgure 5. Orgnal frames n mother_cf.yuv. PSR= Fgure. Watermarked frames n flower_cf.yuv. PSR= Fgure 6. Watermarked frames n mother_cf.yuv. PSR= Fgure 3. Orgnal frames n foreman_cf.yuv. PSR= Fgure 7. Orgnal frames n waterfall_cf.yuv. PSR= ACADEY PUBLISHER

5 760 JOURAL OF COPUTERS, VOL. 8, O., OVEBER 03 Fgure 8. Watermarked frames n waterfall_cf.yuv. PSR= C. Extract Performances Ths paper evaluates the algorthm robustness aganst JPEG compresson (Wth the compresson strengths of 35, 40, 50, 60, 70, 80, 90, 00) and vdeo zoomng attacks (Wth the scales of 50%, 75%, 90%, 0%, 50%, 00%). The PSR between embedded vdeo frames and orgnal frames are calculated, and C values between extracted watermark mage and orgnal one are also evaluated. PSR(Peak Sgnal to ose Rato) s used to evaluate the vsual qualty after watermark embeddng, larger value means the better vsual qualty. Defnton s lsted below: 55 (3) PSR = 0*lg ( I(, j) I '(, j) ) * = j= Where I s the orgnal vdeo frame, and I ' means embedded frame. C (ormalzed utual Correlaton Coeffcent) s the standard to evaluate the smlarty between extracted watermark mage and orgnal one, the larger the better. C = L = L = W W () WE() () * WE() L = The evaluate results are gven n table I. TABLE I. EXTRACTED WATERARK RESULTS flower foreman mother waterfall PSR JPEG_ JPEG_ JPEG_ JPEG_ JPEG_ JPEG_ JPEG_ JPEG_ RESC_ RESC_ RESC_ RESC_ RESC_ RESC_ D. Algorthm Comparson In [], a typcal DCT watermark algorthm mentoned before s evaluated. Wth the proposed algorthm, results are showed n Fgure 9 and Fgure 0. The comparson results between the typcal algorthm and the proposed algorthm are gven n table II. Compared wth the typcal algorthm, the robust of proposed algorthm aganst JEPG compresson and rescalng s mproved, and the vsual qualty of embedded vdeo s better. (4) 03 ACADEY PUBLISHER

6 JOURAL OF COPUTERS, VOL. 8, O., OVEBER o. K , K and KZ000505, BIGC Project o. E-a-0-5, E-6-0-8, E-a-0-7 and E-b-03-6, Bejng Unversty of Posts and Telecommuncatons under Grant 0RC07. REFERECES Fgure 9. Orgnal mage of Lena.bmp. PSR= Fgure 0. Watermarked mage of Lena.bmp. PSR= TABLE II. COPARISO OF THE PROPOSED ETHOD WITH THE TYPICAL ALGORITH Lena Proposed Alg. Typcal Alg. PSR JPEG_ JPEG_ JPEG_ V. COCLUSIO In ths paper, a vdeo watermark algorthm n DCT doman based on bnary relatonshp of three coeffcents s proposed, whch stores watermark nformaton by modulatng the dstances between coeffcents. The processes of ths watermarkng scheme, ncludng embeddng detecton, are descrbed n detal. The evaluaton has proved that our method can survve compresson and rescale attacks, and further mprovements could be made to get better performance. Improvements could be made from followng aspects: ) Increasng the number of embeddng postons. ) Scramblng the watermark mage before embeddng to mprove the robustness. 3) Evaluatng the robustness of coeffcents n dfferent postons. ACKOWLEDGET Ths work was supported n part by a grant from Bejng atural Scence Foundaton under Grant o. 406, Scentfc Research Common Program of Bejng uncpal Commsson of Educaton under Grant [] Xangpng eng, Yan Gao. Electrc Systems Analyss []. Bejng: Hgher Educaton Press, 004: 3-. [] Pk Wah Chan, chael R. Lyu, and Roland T. Chn. A ovel Scheme for Hybrd Dgtal Vdeo Watermarkng: Approach, Evaluaton and Expermentaton [J]. IEEE Transactons on Crcuts and Systems for Vdeo Technology, VOL. 5, O., December 005: [3] Alexa Brassoul, Panagots Tsakaldes, and Athanasos Stourats. Hdden essages n Heavy-Tals: DCT- Doman Watermark Detecton Usng Alpha-Stable odels [J]. IEEE Transactons on ultmeda. VOL. 7, O. 4, August 005: [4] Gerhard C. Langelaar, Iwan Setyawan, and Regnald L. Lagendjk. Watermakng Dgtal Image and Vdeo Data [J]. IEEE Sgnal Processng agazne. September 000: [5] Jongpan Zhou, Qnhua Pang,Dawo Xu,Welng Wu. Communcaton Theory []. BUPT Press,00: 6. [6] Zhou Xnmn, Yu Janpng. Attack odel and Performance Evaluaton of Text Dgtal Watermarkng. Journal of Computers, 00, (5): [7] J.J.K. Ó Ruanadh and T. Pun, Rotaton, scale and translaton nvarant spread spectrum dgtal mage watermarkng [J], Sgnal Processng, vol. 66, ay 998, no.3, pp [8] A. Herrgel, H. Petersen, J. Ó Ruanadh, T. Pun, and P. Shelby, Copy technques for dgtal mages based on asymmetrc cryptographc technques [C], presented at Workshop on Informaton Hdng, Portland, Oregon, USA, Apr [9] Deng nghu, Zeng Qngshuang, Zhou Xul. A Robust Watermarkng Aganst Shearng Based on Improved S- Radon Transformaton. Journal of Computers, 0, 0(7): [0] S. Perera, J.J.K. Ó Ruanadh, F. Degullaume, G. Csurka, and T. Pun, Template based recovery of Fourer-based watermarks usng log-polar and log-log maps [C], n Proc. IEEE ultmeda Systems 99, Int. Conf. ultmeda Computng and Systems, Florence, Italy, June 7-, [] Rao Zhjan, Chang Janpng, Adaptve Spread Spectrum Watermarkng Algorthem Based on DCT blocks, Technology Square, 005.5: 9-4. ngzh Cheng was born n 974 n Hube Chna. He receved hs B.S. degree n Communcaton Engneerng from Chongqng Unversty of Posts and Telecommuncatons, Chongqng, Chna, n 996, and receved hs Ph.D. degree n Cryptography from Bejng Unversty of Posts and Telecommuncatons, Bejng, Chna, n 00. From 00, Dr. Cheng s workng n Packagng Antcounterfetng and Dgtal Content Securty n Bejng Insttute of Graphc Communcaton as a lecturer. 03 ACADEY PUBLISHER

7 76 JOURAL OF COPUTERS, VOL. 8, O., OVEBER 03 Yanpng Du was born n 97 n Shanx Chna. She receved her B.S. degree n computer scence and technology from Shanx Unversty, Shanx, Chna, n 994, and receved her Ph.D. degree n control theory and engneerng from Bejng Jaotong Unversty, Bejng, Chna, n 005. From 006, Dr. Du s workng n Packagng Antcounterfetng and Dgtal Content Securty n Bejng Insttute of Graphc Communcaton as a professor. Yan Wang was born n 975 n Hube Chna. She receved her B.S. degree n hgh voltage technology from Huazhong Unversty of Scence and Technology, Hube, Chna, n 996, and receved her Ph.D. degree n weapon system and applcaton engneerng from Bejng Insttute of Technology, Bejng, Chna, n 005. Her research topc s electronc nformaton and sgnal processng. From 006, Dr. Wang s workng n Bejng Insttute of Graphc Communcaton as a lecturer. nchao X was born 987 n Shanx Chna. He receved hs B.S. degree n computer scence and technology from Shanx Unversty, Shanx, Chna, n 009, and receved hs Ph.D. degree n computer scence and technology from Bejng Unversty of Posts and Telecommuncatons, Bejng, Chna, n 03. Dr. X s workng n Image and Vdeo Watermarkng Theory as a lecturer n Bejng Unversty of Posts and Telecommuncatons. Kaguo Yuan was born n 98 n Guzhou Chna. He receved hs Ph.D degree n sngal and nformaton processng from Bejng Unversty of Posts and Telecommuncatons, Bejng, Chna, n 009. Dr. Yuan s workng n Informaton Securty as a lecturer n Bejng Unversty of Posts and Telecommuncatons. 03 ACADEY PUBLISHER

Hybrid Non-Blind Color Image Watermarking

Hybrid Non-Blind Color Image Watermarking Hybrd Non-Blnd Color Image Watermarkng Ms C.N.Sujatha 1, Dr. P. Satyanarayana 2 1 Assocate Professor, Dept. of ECE, SNIST, Yamnampet, Ghatkesar Hyderabad-501301, Telangana 2 Professor, Dept. of ECE, AITS,

More information

Robust Blind Video Watermark Algorithm in Transform Domain Combining with 3D Video Correlation

Robust Blind Video Watermark Algorithm in Transform Domain Combining with 3D Video Correlation JOURNAL OF MULTIMEDIA, VOL. 8, NO. 2, APRIL 2013 161 Robust Blnd Vdeo Watermark Algorthm n Transform Doman Combnng wth 3D Vdeo Correlaton DING Ha-yang 1,3 1. Informaton Securty Center, Bejng Unversty of

More information

Shape-adaptive DCT and Its Application in Region-based Image Coding

Shape-adaptive DCT and Its Application in Region-based Image Coding Internatonal Journal of Sgnal Processng, Image Processng and Pattern Recognton, pp.99-108 http://dx.do.org/10.14257/sp.2014.7.1.10 Shape-adaptve DCT and Its Applcaton n Regon-based Image Codng Yamn Zheng,

More information

Enhanced Watermarking Technique for Color Images using Visual Cryptography

Enhanced Watermarking Technique for Color Images using Visual Cryptography Informaton Assurance and Securty Letters 1 (2010) 024-028 Enhanced Watermarkng Technque for Color Images usng Vsual Cryptography Enas F. Al rawashdeh 1, Rawan I.Zaghloul 2 1 Balqa Appled Unversty, MIS

More information

A Hybrid Semi-Blind Gray Scale Image Watermarking Algorithm Based on DWT-SVD using Human Visual System Model

A Hybrid Semi-Blind Gray Scale Image Watermarking Algorithm Based on DWT-SVD using Human Visual System Model A Hybrd Sem-Blnd Gray Scale Image Watermarkng Algorthm Based on DWT-SVD usng Human Vsual System Model Rajesh Mehta r Scence & Engneerng, USICT Guru Gobnd Sngh Indrarprastha Unversty New Delh, Inda rajesh00ust@gmal.com

More information

Key-Selective Patchwork Method for Audio Watermarking

Key-Selective Patchwork Method for Audio Watermarking Internatonal Journal of Dgtal Content Technology and ts Applcatons Volume 4, Number 4, July 2010 Key-Selectve Patchwork Method for Audo Watermarkng 1 Ch-Man Pun, 2 Jng-Jng Jang 1, Frst and Correspondng

More information

A Fast Visual Tracking Algorithm Based on Circle Pixels Matching

A Fast Visual Tracking Algorithm Based on Circle Pixels Matching A Fast Vsual Trackng Algorthm Based on Crcle Pxels Matchng Zhqang Hou hou_zhq@sohu.com Chongzhao Han czhan@mal.xjtu.edu.cn Ln Zheng Abstract: A fast vsual trackng algorthm based on crcle pxels matchng

More information

A Fast Content-Based Multimedia Retrieval Technique Using Compressed Data

A Fast Content-Based Multimedia Retrieval Technique Using Compressed Data A Fast Content-Based Multmeda Retreval Technque Usng Compressed Data Borko Furht and Pornvt Saksobhavvat NSF Multmeda Laboratory Florda Atlantc Unversty, Boca Raton, Florda 3343 ABSTRACT In ths paper,

More information

A NEW AUDIO WATERMARKING METHOD BASED

A NEW AUDIO WATERMARKING METHOD BASED A NEW AUDIO WATERMARKING METHOD BASED ON DISCRETE COSINE TRANSFORM WITH A GRAY IMAGE Mohammad Ibrahm Khan 1, Md. Iqbal Hasan Sarker 2, Kaushk Deb 3 and Md. Hasan Furhad 4 1,2,3 Department of Computer Scence

More information

Robust Video Watermarking Using Image Normalization, Motion Vector and Perceptual Information

Robust Video Watermarking Using Image Normalization, Motion Vector and Perceptual Information Robust Vdeo Watermarkng Usng Image ormalzaton, Moton Vector and Perceptual Informaton Cedllo-Hernández Antono 1, Cedllo-Hernández Manuel 1, akano-myatake Marko 1, García-Vázquez Mreya S. 2 1 Postgraduate

More information

Cluster Analysis of Electrical Behavior

Cluster Analysis of Electrical Behavior Journal of Computer and Communcatons, 205, 3, 88-93 Publshed Onlne May 205 n ScRes. http://www.scrp.org/ournal/cc http://dx.do.org/0.4236/cc.205.350 Cluster Analyss of Electrcal Behavor Ln Lu Ln Lu, School

More information

Semi-Fragile Watermarking Scheme for Authentication of JPEG Images

Semi-Fragile Watermarking Scheme for Authentication of JPEG Images Tamkang Journal of Scence and Engneerng, Vol. 10, No 1, pp. 5766 (2007) 57 Sem-Fragle Watermarkng Scheme for Authentcaton of JPEG Images Chh-Hung n 1 *, Tung-Shh Su 2 and Wen-Shyong Hseh 2,3 1 Department

More information

Improvement of Spatial Resolution Using BlockMatching Based Motion Estimation and Frame. Integration

Improvement of Spatial Resolution Using BlockMatching Based Motion Estimation and Frame. Integration Improvement of Spatal Resoluton Usng BlockMatchng Based Moton Estmaton and Frame Integraton Danya Suga and Takayuk Hamamoto Graduate School of Engneerng, Tokyo Unversty of Scence, 6-3-1, Nuku, Katsuska-ku,

More information

Robust Watermarking for Text Images Based on Arnold Scrambling and DWT-DCT

Robust Watermarking for Text Images Based on Arnold Scrambling and DWT-DCT Internatonal Conference on Mechatroncs Electronc Industral and Control Engneerng (MEIC 015) Robust Watermarkng for Text Images Based on Arnold Scramblng and DWT-DCT Fan Wu College of Informaton Scence

More information

KEYWORDS: Digital Image Watermarking, Discrete Wavelet Transform, General Regression Neural Network, Human Visual System. 1.

KEYWORDS: Digital Image Watermarking, Discrete Wavelet Transform, General Regression Neural Network, Human Visual System. 1. An Adaptve Dgtal Image Watermarkng Based on Image Features n Dscrete Wavelet Transform Doman and General Regresson Neural Network Ayoub Taher Group of IT Engneerng, Payam Noor Unversty, Broujen, Iran ABSTRACT:

More information

A Binarization Algorithm specialized on Document Images and Photos

A Binarization Algorithm specialized on Document Images and Photos A Bnarzaton Algorthm specalzed on Document mages and Photos Ergna Kavalleratou Dept. of nformaton and Communcaton Systems Engneerng Unversty of the Aegean kavalleratou@aegean.gr Abstract n ths paper, a

More information

Enhanced AMBTC for Image Compression using Block Classification and Interpolation

Enhanced AMBTC for Image Compression using Block Classification and Interpolation Internatonal Journal of Computer Applcatons (0975 8887) Volume 5 No.0, August 0 Enhanced AMBTC for Image Compresson usng Block Classfcaton and Interpolaton S. Vmala Dept. of Comp. Scence Mother Teresa

More information

Research Article High Capacity Reversible Watermarking for Audio by Histogram Shifting and Predicted Error Expansion

Research Article High Capacity Reversible Watermarking for Audio by Histogram Shifting and Predicted Error Expansion e Scentfc World Journal, Artcle ID 656251, 7 pages http://dx.do.org/1.1155/214/656251 Research Artcle Hgh Capacty Reversble Watermarkng for Audo by Hstogram Shftng and Predcted Error Expanson Fe Wang,

More information

A Robust Webpage Information Hiding Method Based on the Slash of Tag

A Robust Webpage Information Hiding Method Based on the Slash of Tag Advanced Engneerng Forum Onlne: 2012-09-26 ISSN: 2234-991X, Vols. 6-7, pp 361-366 do:10.4028/www.scentfc.net/aef.6-7.361 2012 Trans Tech Publcatons, Swtzerland A Robust Webpage Informaton Hdng Method Based

More information

A Hybrid Digital Image Watermarking based on Discrete Wavelet Transform, Discrete Cosine Transform, and General Regression Neural Network

A Hybrid Digital Image Watermarking based on Discrete Wavelet Transform, Discrete Cosine Transform, and General Regression Neural Network A Hybrd Dgtal Image Watermarkng based on Dscrete Wavelet Transform, Dscrete Cosne Transform, and General Regresson Neural Network Ayoub Taher ; ABSTRACT In ths paper, a new hybrd dgtal watermarkng technque

More information

A Comparison between Digital Images Watermarking in Tow Different Color Spaces Using DWT2*

A Comparison between Digital Images Watermarking in Tow Different Color Spaces Using DWT2* A Comparson between Dgtal s ng n Tow Dfferent Color Spaces Usng DWT* Mehd Khall Natonal Academy of Scence of Armena Yerevan, Armena e-mal: khall.mehd@yahoo.com ABSTRACT A novel dgtal watermarkng for ownershp

More information

Related-Mode Attacks on CTR Encryption Mode

Related-Mode Attacks on CTR Encryption Mode Internatonal Journal of Network Securty, Vol.4, No.3, PP.282 287, May 2007 282 Related-Mode Attacks on CTR Encrypton Mode Dayn Wang, Dongda Ln, and Wenlng Wu (Correspondng author: Dayn Wang) Key Laboratory

More information

An Image Compression Algorithm based on Wavelet Transform and LZW

An Image Compression Algorithm based on Wavelet Transform and LZW An Image Compresson Algorthm based on Wavelet Transform and LZW Png Luo a, Janyong Yu b School of Chongqng Unversty of Posts and Telecommuncatons, Chongqng, 400065, Chna Abstract a cylpng@63.com, b y27769864@sna.cn

More information

IMPLEMENTATION OF QIM BASED AUDIO WATERMARKING USING HYBRID TRANSFORM OF SWT-DCT-SVD METHODS OPTIMIZED WITH GENETIC ALORITHM

IMPLEMENTATION OF QIM BASED AUDIO WATERMARKING USING HYBRID TRANSFORM OF SWT-DCT-SVD METHODS OPTIMIZED WITH GENETIC ALORITHM IMPLEMENTATION OF QIM BASED AUDIO WATERMARKING USING HYBRID TRANSFORM OF SWT-DCT-SVD METHODS OPTIMIZED WITH GENETIC ALORITHM Ryan Amnullah 1, Gelar Budman 2, Irma Saftr 3 1, 2, 3 FakultasTeknk Elektro,

More information

Content Based Image Retrieval Using 2-D Discrete Wavelet with Texture Feature with Different Classifiers

Content Based Image Retrieval Using 2-D Discrete Wavelet with Texture Feature with Different Classifiers IOSR Journal of Electroncs and Communcaton Engneerng (IOSR-JECE) e-issn: 78-834,p- ISSN: 78-8735.Volume 9, Issue, Ver. IV (Mar - Apr. 04), PP 0-07 Content Based Image Retreval Usng -D Dscrete Wavelet wth

More information

Performance Analysis of Data Hiding in MPEG-4 AAC Audio *

Performance Analysis of Data Hiding in MPEG-4 AAC Audio * TSINGHUA SCIENCE AND TECHNOLOGY ISSNll1007-0214ll07/21llpp55-61 Volume 14, Number 1, February 2009 Performance Analyss of Data Hdng n MPEG-4 AAC Audo * XU Shuzheng ( ) **, ZHANG Peng ( ), WANG Pengjun

More information

An Image Fusion Approach Based on Segmentation Region

An Image Fusion Approach Based on Segmentation Region Rong Wang, L-Qun Gao, Shu Yang, Yu-Hua Cha, and Yan-Chun Lu An Image Fuson Approach Based On Segmentaton Regon An Image Fuson Approach Based on Segmentaton Regon Rong Wang, L-Qun Gao, Shu Yang 3, Yu-Hua

More information

Problem Definitions and Evaluation Criteria for Computational Expensive Optimization

Problem Definitions and Evaluation Criteria for Computational Expensive Optimization Problem efntons and Evaluaton Crtera for Computatonal Expensve Optmzaton B. Lu 1, Q. Chen and Q. Zhang 3, J. J. Lang 4, P. N. Suganthan, B. Y. Qu 6 1 epartment of Computng, Glyndwr Unversty, UK Faclty

More information

Data Hiding and Image Authentication for Color-Palette Images

Data Hiding and Image Authentication for Color-Palette Images Data Hdng and Image Authentcaton for Color-Palette Images Chh-Yang Yn ( 殷志揚 ) and Wen-Hsang Tsa ( 蔡文祥 ) Department of Computer & Informaton Scence Natonal Chao Tung Unversty 00 Ta Hsueh Rd., Hsnchu, Tawan

More information

Adaptive digital watermarking of images using Genetic Algorithm

Adaptive digital watermarking of images using Genetic Algorithm Adaptve dgtal watermarkng of mages usng Genetc Algorthm Bushra Skander, Muhammad Ishtaq, M. Arfan Jaffar, Muhammad Tarq, Anwar M. Mrza Department of Computer Scence, Natonal Unversty of Computer and Emergng

More information

Research of Multiple Text Watermarks Technique in Electric Power System Texts

Research of Multiple Text Watermarks Technique in Electric Power System Texts Sensors & Transducers 203 by IFSA http://www.sensorsportal.com Research of Multple Text atermarks Technque n Electrc Power System Texts Xao-X XING, Qng CHEN, 2 Lan-X FU School of Optcal-Electrcal and Computer

More information

High Payload Reversible Data Hiding Scheme Using Difference Segmentation and Histogram Shifting

High Payload Reversible Data Hiding Scheme Using Difference Segmentation and Histogram Shifting JOURNAL OF ELECTRONIC SCIENCE AND TECHNOLOGY, VOL. 11, NO. 1, MARCH 2013 9 Hgh Payload Reversble Data Hdng Scheme Usng Dfference Segmentaton and Hstogram Shftng Yung-Chen Chou and Huang-Chng L Abstract

More information

PCA Based Gait Segmentation

PCA Based Gait Segmentation Honggu L, Cupng Sh & Xngguo L PCA Based Gat Segmentaton PCA Based Gat Segmentaton Honggu L, Cupng Sh, and Xngguo L 2 Electronc Department, Physcs College, Yangzhou Unversty, 225002 Yangzhou, Chna 2 Department

More information

Analysis on the Workspace of Six-degrees-of-freedom Industrial Robot Based on AutoCAD

Analysis on the Workspace of Six-degrees-of-freedom Industrial Robot Based on AutoCAD Analyss on the Workspace of Sx-degrees-of-freedom Industral Robot Based on AutoCAD Jn-quan L 1, Ru Zhang 1,a, Fang Cu 1, Q Guan 1 and Yang Zhang 1 1 School of Automaton, Bejng Unversty of Posts and Telecommuncatons,

More information

A Lossless Watermarking Scheme for Halftone Image Authentication

A Lossless Watermarking Scheme for Halftone Image Authentication IJCSNS Internatonal Journal of Computer Scence and Network Securty, VOL.6 No.2B, February 2006 147 A Lossless Watermarkng Scheme for Halftone Image Authentcaton Jeng-Shyang Pan, Hao Luo, and Zhe-Mng Lu,

More information

Digital Video Watermarking using Discrete Wavelet Transform and Principal Component Analysis

Digital Video Watermarking using Discrete Wavelet Transform and Principal Component Analysis Internatonal Journal of Wsdom Based Computng, Vol. 1 (2), August 2011 7 Dgtal Vdeo Watermarkng usng Dscrete Wavelet Transform and Prncpal Component Analyss Sanjana Snha, Prajnat Bardhan, Swarnal Pramanck,

More information

Time-Varying Volume Geometry Compression with 4D Lifting Wavelet Transform

Time-Varying Volume Geometry Compression with 4D Lifting Wavelet Transform Tme-Varyng Volume Geometry Compresson wth 4D Lftng Wavelet Transform Yan Wang and Heba Hamza NSF Center for e-desgn, Unversty of Central Florda, Orlando, FL 32816-2996, USA {wangyan, hhamza}@mal.ucf.edu

More information

An Improved Image Segmentation Algorithm Based on the Otsu Method

An Improved Image Segmentation Algorithm Based on the Otsu Method 3th ACIS Internatonal Conference on Software Engneerng, Artfcal Intellgence, Networkng arallel/dstrbuted Computng An Improved Image Segmentaton Algorthm Based on the Otsu Method Mengxng Huang, enjao Yu,

More information

IAJIT First Online Publication

IAJIT First Online Publication Content Protecton n Vdeo Data Based on Robust Dgtal Watermarkng Resstant to Intentonal and Unntentonal Attacks Mad Masoum and Shervn Amr Department of Electrcal Engneerng, Islamc Azad Unversty Qazvn Branch,

More information

Dynamic Code Block Size for JPEG 2000

Dynamic Code Block Size for JPEG 2000 Dynamc Code Block Sze for JPEG 2000 Png-Sng Tsa a, Yann LeCornec b a Dept. of Computer Scence, Unv. of Texas Pan Amercan, 1201 W. Unv. Dr., Ednburg, TX USA 78539-2999; b Sgma Desgns, Inc., 1778 McCarthy

More information

An Optimal Algorithm for Prufer Codes *

An Optimal Algorithm for Prufer Codes * J. Software Engneerng & Applcatons, 2009, 2: 111-115 do:10.4236/jsea.2009.22016 Publshed Onlne July 2009 (www.scrp.org/journal/jsea) An Optmal Algorthm for Prufer Codes * Xaodong Wang 1, 2, Le Wang 3,

More information

Grading Image Retrieval Based on DCT and DWT Compressed Domains Using Low-Level Features

Grading Image Retrieval Based on DCT and DWT Compressed Domains Using Low-Level Features Journal of Communcatons Vol. 0 No. January 0 Gradng Image Retreval Based on DCT and DWT Compressed Domans Usng Low-Level Features Chengyou Wang Xnyue Zhang Rongyang Shan and Xao Zhou School of echancal

More information

Tsinghua University at TAC 2009: Summarizing Multi-documents by Information Distance

Tsinghua University at TAC 2009: Summarizing Multi-documents by Information Distance Tsnghua Unversty at TAC 2009: Summarzng Mult-documents by Informaton Dstance Chong Long, Mnle Huang, Xaoyan Zhu State Key Laboratory of Intellgent Technology and Systems, Tsnghua Natonal Laboratory for

More information

Identify the Attack in Embedded Image with Steganalysis Detection Method by PSNR and RGB Intensity

Identify the Attack in Embedded Image with Steganalysis Detection Method by PSNR and RGB Intensity Internatonal Journal of Computer Systems (ISSN: 394-1065), Volume 03 Issue 07, July, 016 Avalable at http://www.jcsonlne.com/ Identfy the Attack n Embedded Image wth Steganalyss Detecton Method by PSNR

More information

Simulation Based Analysis of FAST TCP using OMNET++

Simulation Based Analysis of FAST TCP using OMNET++ Smulaton Based Analyss of FAST TCP usng OMNET++ Umar ul Hassan 04030038@lums.edu.pk Md Term Report CS678 Topcs n Internet Research Sprng, 2006 Introducton Internet traffc s doublng roughly every 3 months

More information

Novel Pattern-based Fingerprint Recognition Technique Using 2D Wavelet Decomposition

Novel Pattern-based Fingerprint Recognition Technique Using 2D Wavelet Decomposition Mathematcal Methods for Informaton Scence and Economcs Novel Pattern-based Fngerprnt Recognton Technque Usng D Wavelet Decomposton TUDOR BARBU Insttute of Computer Scence of the Romanan Academy T. Codrescu,,

More information

Image Representation & Visualization Basic Imaging Algorithms Shape Representation and Analysis. outline

Image Representation & Visualization Basic Imaging Algorithms Shape Representation and Analysis. outline mage Vsualzaton mage Vsualzaton mage Representaton & Vsualzaton Basc magng Algorthms Shape Representaton and Analyss outlne mage Representaton & Vsualzaton Basc magng Algorthms Shape Representaton and

More information

Research and Application of Fingerprint Recognition Based on MATLAB

Research and Application of Fingerprint Recognition Based on MATLAB Send Orders for Reprnts to reprnts@benthamscence.ae The Open Automaton and Control Systems Journal, 205, 7, 07-07 Open Access Research and Applcaton of Fngerprnt Recognton Based on MATLAB Nng Lu* Department

More information

MULTISPECTRAL IMAGES CLASSIFICATION BASED ON KLT AND ATR AUTOMATIC TARGET RECOGNITION

MULTISPECTRAL IMAGES CLASSIFICATION BASED ON KLT AND ATR AUTOMATIC TARGET RECOGNITION MULTISPECTRAL IMAGES CLASSIFICATION BASED ON KLT AND ATR AUTOMATIC TARGET RECOGNITION Paulo Quntlano 1 & Antono Santa-Rosa 1 Federal Polce Department, Brasla, Brazl. E-mals: quntlano.pqs@dpf.gov.br and

More information

A New Approach For the Ranking of Fuzzy Sets With Different Heights

A New Approach For the Ranking of Fuzzy Sets With Different Heights New pproach For the ankng of Fuzzy Sets Wth Dfferent Heghts Pushpnder Sngh School of Mathematcs Computer pplcatons Thapar Unversty, Patala-7 00 Inda pushpndersnl@gmalcom STCT ankng of fuzzy sets plays

More information

CHAPTER 3 ENCODING VIDEO SEQUENCES IN FRACTAL BASED COMPRESSION. Day by day, the demands for higher and faster technologies are rapidly

CHAPTER 3 ENCODING VIDEO SEQUENCES IN FRACTAL BASED COMPRESSION. Day by day, the demands for higher and faster technologies are rapidly 65 CHAPTER 3 ENCODING VIDEO SEQUENCES IN FRACTAL BASED COMPRESSION 3.1 Introducton Day by day, the demands for hgher and faster technologes are rapdly ncreasng. Although the technologes avalable now are

More information

Design of Structure Optimization with APDL

Design of Structure Optimization with APDL Desgn of Structure Optmzaton wth APDL Yanyun School of Cvl Engneerng and Archtecture, East Chna Jaotong Unversty Nanchang 330013 Chna Abstract In ths paper, the desgn process of structure optmzaton wth

More information

Quality Improvement Algorithm for Tetrahedral Mesh Based on Optimal Delaunay Triangulation

Quality Improvement Algorithm for Tetrahedral Mesh Based on Optimal Delaunay Triangulation Intellgent Informaton Management, 013, 5, 191-195 Publshed Onlne November 013 (http://www.scrp.org/journal/m) http://dx.do.org/10.36/m.013.5601 Qualty Improvement Algorthm for Tetrahedral Mesh Based on

More information

Assignment # 2. Farrukh Jabeen Algorithms 510 Assignment #2 Due Date: June 15, 2009.

Assignment # 2. Farrukh Jabeen Algorithms 510 Assignment #2 Due Date: June 15, 2009. Farrukh Jabeen Algorthms 51 Assgnment #2 Due Date: June 15, 29. Assgnment # 2 Chapter 3 Dscrete Fourer Transforms Implement the FFT for the DFT. Descrbed n sectons 3.1 and 3.2. Delverables: 1. Concse descrpton

More information

High-Boost Mesh Filtering for 3-D Shape Enhancement

High-Boost Mesh Filtering for 3-D Shape Enhancement Hgh-Boost Mesh Flterng for 3-D Shape Enhancement Hrokazu Yagou Λ Alexander Belyaev y Damng We z Λ y z ; ; Shape Modelng Laboratory, Unversty of Azu, Azu-Wakamatsu 965-8580 Japan y Computer Graphcs Group,

More information

A WAVELET CODEC FOR INTERLACED VIDEO

A WAVELET CODEC FOR INTERLACED VIDEO A WAVELET CODEC FOR INTERLACED VIDEO L.M. Me, H.R. Wu and D.M. Tan School of Electrcal and Computer Engneerng, RMIT Unversty, Vctora 3000, Australa Tel: +61-3-9925 5376 Fax: +61-3-9925 2007 E-mal: henry.wu@rmt.edu.au

More information

Information Hiding Watermarking Detection Technique by PSNR and RGB Intensity

Information Hiding Watermarking Detection Technique by PSNR and RGB Intensity www..org 3 Informaton Hdng Watermarkng Detecton Technque by PSNR and RGB Intensty 1 Neha Chauhan, Akhlesh A. Waoo, 3 P. S. Patheja 1 Research Scholar, BIST, Bhopal, Inda.,3 Assstant Professor, BIST, Bhopal,

More information

Coding Artifact Reduction Using Edge Map Guided Adaptive and Fuzzy Filter

Coding Artifact Reduction Using Edge Map Guided Adaptive and Fuzzy Filter MEL A MITSUBISHI ELECTIC ESEACH LABOATOY http://www.merl.com Codng Artfact educton Usng Edge Map Guded Adaptve and Fuzzy Flter Hao-Song Kong Yao Ne Anthony Vetro Hufang Sun Kenneth E. Barner T-2004-056

More information

Proper Choice of Data Used for the Estimation of Datum Transformation Parameters

Proper Choice of Data Used for the Estimation of Datum Transformation Parameters Proper Choce of Data Used for the Estmaton of Datum Transformaton Parameters Hakan S. KUTOGLU, Turkey Key words: Coordnate systems; transformaton; estmaton, relablty. SUMMARY Advances n technologes and

More information

A DCVS Reconstruction Algorithm for Mine Video Monitoring Image Based on Block Classification

A DCVS Reconstruction Algorithm for Mine Video Monitoring Image Based on Block Classification 1 3 4 5 6 7 8 9 10 11 1 13 14 15 16 17 18 19 0 1 Artcle A DCVS Reconstructon Algorthm for Mne Vdeo Montorng Image Based on Block Classfcaton Xaohu Zhao 1,, Xueru Shen 1,, *, Kuan Wang 1, and Wanme L 1,

More information

Robust Shot Boundary Detection from Video Using Dynamic Texture

Robust Shot Boundary Detection from Video Using Dynamic Texture Sensors & Transducers 204 by IFSA Publshng, S. L. http://www.sensorsportal.com Robust Shot Boundary Detecton from Vdeo Usng Dynamc Teture, 3 Peng Tale, 2 Zhang Wenjun School of Communcaton & Informaton

More information

Geometrically Invariant Watermarking Scheme Based on Local Feature Points

Geometrically Invariant Watermarking Scheme Based on Local Feature Points JOURNAL OF MULTIMEDIA, VOL. 7, NO. 3, JUNE 0 3 Geometrcally Invarant Watermarkng Scheme Based on Local Feature Ponts L Jng School of Computer and Informaton Engneerng, Henan Unversty of Economcs and Law,

More information

TN348: Openlab Module - Colocalization

TN348: Openlab Module - Colocalization TN348: Openlab Module - Colocalzaton Topc The Colocalzaton module provdes the faclty to vsualze and quantfy colocalzaton between pars of mages. The Colocalzaton wndow contans a prevew of the two mages

More information

Distortion Function Designing for JPEG Steganography with Uncompressed Side-image

Distortion Function Designing for JPEG Steganography with Uncompressed Side-image Dstorton Functon Desgnng for JPEG Steganography wth Uncompressed Sde-mage Fangjun Huang School of Informaton Scence and Technology, Sun Yat-Sen Unversty, GD 56, Chna huangfj@mal.sysu.edu.cn Jwu Huang School

More information

Article Reversible Dual-Image-Based Hiding Scheme Using Block Folding Technique

Article Reversible Dual-Image-Based Hiding Scheme Using Block Folding Technique Artcle Reversble Dual-Image-Based Hdng Scheme Usng Block Foldng Technque Tzu-Chuen Lu, * and Hu-Shh Leng Department of Informaton Management, Chaoyang Unversty of Technology, Tachung 4349, Tawan Department

More information

Quantization Noise Power Injection In Subband Audio Coding Using Low Selectivity Filter Banks

Quantization Noise Power Injection In Subband Audio Coding Using Low Selectivity Filter Banks Quantzaton Nose Power Injecton In Subband Audo Codng Usng Low Selectvty Flter Banks D. ARTÍNEZ -UÑOZ, N. RUIZ-REYES, P. VERA-CANDEAS, P.J. RECHE-LÓPEZ, J. CURPIÁN-ALONSO Departamento de Electrónca Unversdad

More information

A New Feature of Uniformity of Image Texture Directions Coinciding with the Human Eyes Perception 1

A New Feature of Uniformity of Image Texture Directions Coinciding with the Human Eyes Perception 1 A New Feature of Unformty of Image Texture Drectons Concdng wth the Human Eyes Percepton Xng-Jan He, De-Shuang Huang, Yue Zhang, Tat-Mng Lo 2, and Mchael R. Lyu 3 Intellgent Computng Lab, Insttute of Intellgent

More information

Brushlet Features for Texture Image Retrieval

Brushlet Features for Texture Image Retrieval DICTA00: Dgtal Image Computng Technques and Applcatons, 1 January 00, Melbourne, Australa 1 Brushlet Features for Texture Image Retreval Chbao Chen and Kap Luk Chan Informaton System Research Lab, School

More information

A Novel Method for Transforming XML Documents to Time Series and Clustering Them Based on Delaunay Triangulation

A Novel Method for Transforming XML Documents to Time Series and Clustering Them Based on Delaunay Triangulation Appled Mathematcs, 2015, 6, 1076-1085 Publshed Onlne June 2015 n ScRes. http://www.scrp.org/journal/am http://dx.do.org/10.4236/am.2015.66098 A Novel Method for Transformng XML Documents to Tme Seres and

More information

Discrete Cosine Transform Optimization in Image Compression Based on Genetic Algorithm

Discrete Cosine Transform Optimization in Image Compression Based on Genetic Algorithm 015 8th Internatonal Congress on Image and Sgnal Processng (CISP 015) Dscrete Cosne Transform Optmzaton n Image Compresson Based on Genetc Algorthm LIU Yuan-yuan 1 CHE He-xn 1 College of Communcaton Engneerng,

More information

Machine Learning: Algorithms and Applications

Machine Learning: Algorithms and Applications 14/05/1 Machne Learnng: Algorthms and Applcatons Florano Zn Free Unversty of Bozen-Bolzano Faculty of Computer Scence Academc Year 011-01 Lecture 10: 14 May 01 Unsupervsed Learnng cont Sldes courtesy of

More information

Professional competences training path for an e-commerce major, based on the ISM method

Professional competences training path for an e-commerce major, based on the ISM method World Transactons on Engneerng and Technology Educaton Vol.14, No.4, 2016 2016 WIETE Professonal competences tranng path for an e-commerce maor, based on the ISM method Ru Wang, Pn Peng, L-gang Lu & Lng

More information

Detecting MP3Stego using Calibrated Side Information Features

Detecting MP3Stego using Calibrated Side Information Features 2628 JOURNAL OF SOFTWARE, VOL. 8, NO. 10, OCTOBER 2013 Detectng P3Stego usng Calbrated Sde Informaton Features Xanmn Yu School of Informaton Scence and Engneerng, Nngbo Unversty Emal: mlhappy1016@163.com

More information

Parallelism for Nested Loops with Non-uniform and Flow Dependences

Parallelism for Nested Loops with Non-uniform and Flow Dependences Parallelsm for Nested Loops wth Non-unform and Flow Dependences Sam-Jn Jeong Dept. of Informaton & Communcaton Engneerng, Cheonan Unversty, 5, Anseo-dong, Cheonan, Chungnam, 330-80, Korea. seong@cheonan.ac.kr

More information

Corner-Based Image Alignment using Pyramid Structure with Gradient Vector Similarity

Corner-Based Image Alignment using Pyramid Structure with Gradient Vector Similarity Journal of Sgnal and Informaton Processng, 013, 4, 114-119 do:10.436/jsp.013.43b00 Publshed Onlne August 013 (http://www.scrp.org/journal/jsp) Corner-Based Image Algnment usng Pyramd Structure wth Gradent

More information

A Novel Adaptive Descriptor Algorithm for Ternary Pattern Textures

A Novel Adaptive Descriptor Algorithm for Ternary Pattern Textures A Novel Adaptve Descrptor Algorthm for Ternary Pattern Textures Fahuan Hu 1,2, Guopng Lu 1 *, Zengwen Dong 1 1.School of Mechancal & Electrcal Engneerng, Nanchang Unversty, Nanchang, 330031, Chna; 2. School

More information

Load Balancing for Hex-Cell Interconnection Network

Load Balancing for Hex-Cell Interconnection Network Int. J. Communcatons, Network and System Scences,,, - Publshed Onlne Aprl n ScRes. http://www.scrp.org/journal/jcns http://dx.do.org/./jcns.. Load Balancng for Hex-Cell Interconnecton Network Saher Manaseer,

More information

Some material adapted from Mohamed Younis, UMBC CMSC 611 Spr 2003 course slides Some material adapted from Hennessy & Patterson / 2003 Elsevier

Some material adapted from Mohamed Younis, UMBC CMSC 611 Spr 2003 course slides Some material adapted from Hennessy & Patterson / 2003 Elsevier Some materal adapted from Mohamed Youns, UMBC CMSC 611 Spr 2003 course sldes Some materal adapted from Hennessy & Patterson / 2003 Elsever Scence Performance = 1 Executon tme Speedup = Performance (B)

More information

SLAM Summer School 2006 Practical 2: SLAM using Monocular Vision

SLAM Summer School 2006 Practical 2: SLAM using Monocular Vision SLAM Summer School 2006 Practcal 2: SLAM usng Monocular Vson Javer Cvera, Unversty of Zaragoza Andrew J. Davson, Imperal College London J.M.M Montel, Unversty of Zaragoza. josemar@unzar.es, jcvera@unzar.es,

More information

Virtual Machine Migration based on Trust Measurement of Computer Node

Virtual Machine Migration based on Trust Measurement of Computer Node Appled Mechancs and Materals Onlne: 2014-04-04 ISSN: 1662-7482, Vols. 536-537, pp 678-682 do:10.4028/www.scentfc.net/amm.536-537.678 2014 Trans Tech Publcatons, Swtzerland Vrtual Machne Mgraton based on

More information

Using Fuzzy Logic to Enhance the Large Size Remote Sensing Images

Using Fuzzy Logic to Enhance the Large Size Remote Sensing Images Internatonal Journal of Informaton and Electroncs Engneerng Vol. 5 No. 6 November 015 Usng Fuzzy Logc to Enhance the Large Sze Remote Sensng Images Trung Nguyen Tu Huy Ngo Hoang and Thoa Vu Van Abstract

More information

Compiler Design. Spring Register Allocation. Sample Exercises and Solutions. Prof. Pedro C. Diniz

Compiler Design. Spring Register Allocation. Sample Exercises and Solutions. Prof. Pedro C. Diniz Compler Desgn Sprng 2014 Regster Allocaton Sample Exercses and Solutons Prof. Pedro C. Dnz USC / Informaton Scences Insttute 4676 Admralty Way, Sute 1001 Marna del Rey, Calforna 90292 pedro@s.edu Regster

More information

Face Recognition University at Buffalo CSE666 Lecture Slides Resources:

Face Recognition University at Buffalo CSE666 Lecture Slides Resources: Face Recognton Unversty at Buffalo CSE666 Lecture Sldes Resources: http://www.face-rec.org/algorthms/ Overvew of face recognton algorthms Correlaton - Pxel based correspondence between two face mages Structural

More information

Term Weighting Classification System Using the Chi-square Statistic for the Classification Subtask at NTCIR-6 Patent Retrieval Task

Term Weighting Classification System Using the Chi-square Statistic for the Classification Subtask at NTCIR-6 Patent Retrieval Task Proceedngs of NTCIR-6 Workshop Meetng, May 15-18, 2007, Tokyo, Japan Term Weghtng Classfcaton System Usng the Ch-square Statstc for the Classfcaton Subtask at NTCIR-6 Patent Retreval Task Kotaro Hashmoto

More information

Deep learning is a good steganalysis tool when embedding key is reused for different images, even if there is a cover source-mismatch

Deep learning is a good steganalysis tool when embedding key is reused for different images, even if there is a cover source-mismatch Deep learnng s a good steganalyss tool when embeddng key s reused for dfferent mages, even f there s a cover source-msmatch Lonel PIBRE 2,3, Jérôme PASQUET 2,3, Dno IENCO 2,3, Marc CHAUMONT 1,2,3 (1) Unversty

More information

Secure and Fast Fingerprint Authentication on Smart Card

Secure and Fast Fingerprint Authentication on Smart Card SETIT 2005 3 rd Internatonal Conference: Scences of Electronc, Technologes of Informaton and Telecommuncatons March 27-31, 2005 TUNISIA Secure and Fast Fngerprnt Authentcaton on Smart Card Y. S. Moon*,

More information

Scheduling Remote Access to Scientific Instruments in Cyberinfrastructure for Education and Research

Scheduling Remote Access to Scientific Instruments in Cyberinfrastructure for Education and Research Schedulng Remote Access to Scentfc Instruments n Cybernfrastructure for Educaton and Research Je Yn 1, Junwe Cao 2,3,*, Yuexuan Wang 4, Lanchen Lu 1,3 and Cheng Wu 1,3 1 Natonal CIMS Engneerng and Research

More information

A Clustering Algorithm for Key Frame Extraction Based on Density Peak

A Clustering Algorithm for Key Frame Extraction Based on Density Peak Journal of Computer and Communcatons, 2018, 6, 118-128 http://www.scrp.org/ournal/cc ISSN Onlne: 2327-5227 ISSN Prnt: 2327-5219 A Clusterng Algorthm for Key Frame Extracton Based on Densty Peak Hong Zhao

More information

3 Image Compression. Multimedia Data Size/Duration Kbits Telephone quality speech. A Page of text 11 x 8.5

3 Image Compression. Multimedia Data Size/Duration Kbits Telephone quality speech. A Page of text 11 x 8.5 3 Image Compresson Multmeda - Department of Computng, Imperal College Professor GZ Yang! http://www.doc.c.ac.uk/~gzy Why Image Compresson Research n compresson technques has stemmed from the ever-ncreasng

More information

PYTHON IMPLEMENTATION OF VISUAL SECRET SHARING SCHEMES

PYTHON IMPLEMENTATION OF VISUAL SECRET SHARING SCHEMES PYTHON IMPLEMENTATION OF VISUAL SECRET SHARING SCHEMES Ruxandra Olmd Faculty of Mathematcs and Computer Scence, Unversty of Bucharest Emal: ruxandra.olmd@fm.unbuc.ro Abstract Vsual secret sharng schemes

More information

Available online at Available online at Advanced in Control Engineering and Information Science

Available online at   Available online at   Advanced in Control Engineering and Information Science Avalable onlne at wwwscencedrectcom Avalable onlne at wwwscencedrectcom Proceda Proceda Engneerng Engneerng 00 (2011) 15000 000 (2011) 1642 1646 Proceda Engneerng wwwelsevercom/locate/proceda Advanced

More information

Convolutional interleaver for unequal error protection of turbo codes

Convolutional interleaver for unequal error protection of turbo codes Convolutonal nterleaver for unequal error protecton of turbo codes Sna Vaf, Tadeusz Wysock, Ian Burnett Unversty of Wollongong, SW 2522, Australa E-mal:{sv39,wysock,an_burnett}@uow.edu.au Abstract: Ths

More information

A Secured Method for Image Steganography Based On Pixel Values

A Secured Method for Image Steganography Based On Pixel Values A Secured Method for Image Steganography Based On Pxel Values Tarun Gulat #, Sanskrt Gupta * # Assocate Professor, Electroncs and Communcaton Engneerng Department, MMEC, M.M.U., Mullana, Ambala, Haryana,

More information

The Research of Support Vector Machine in Agricultural Data Classification

The Research of Support Vector Machine in Agricultural Data Classification The Research of Support Vector Machne n Agrcultural Data Classfcaton Le Sh, Qguo Duan, Xnmng Ma, Me Weng College of Informaton and Management Scence, HeNan Agrcultural Unversty, Zhengzhou 45000 Chna Zhengzhou

More information

Efficient Video Coding with R-D Constrained Quadtree Segmentation

Efficient Video Coding with R-D Constrained Quadtree Segmentation Publshed on Pcture Codng Symposum 1999, March 1999 Effcent Vdeo Codng wth R-D Constraned Quadtree Segmentaton Cha-Wen Ln Computer and Communcaton Research Labs Industral Technology Research Insttute Hsnchu,

More information

A Concurrent Non-Recursive Textured Algorithm for Distributed Multi-Utility State Estimation

A Concurrent Non-Recursive Textured Algorithm for Distributed Multi-Utility State Estimation 1 A Concurrent Non-ecursve Textured Algorthm for Dstrbuted Mult-Utlty State Estmaton Garng M. Huang, Senor Member, IEEE, and Jansheng Le, Student Member, IEEE Abstract: Durng power deregulaton, power companes

More information

A Desynchronization Resilient Watermarking Scheme

A Desynchronization Resilient Watermarking Scheme A Desynchronzaton Reslent Watermarkng Scheme Xaojun Q and J Q Department of Computer Scence, Utah State Unversty, Logan, UT 84322-4205 Xaojun.Q@usu.edu, jq79@gmal.com Abstract. Ths paper presents a content-based

More information

Combination of Color and Local Patterns as a Feature Vector for CBIR

Combination of Color and Local Patterns as a Feature Vector for CBIR Internatonal Journal of Computer Applcatons (975 8887) Volume 99 No.1, August 214 Combnaton of Color and Local Patterns as a Feature Vector for CBIR L.Koteswara Rao Asst.Professor, Dept of ECE Faculty

More information

Open Access Early Fire Smoke Image Segmentation in a Complex Large Space

Open Access Early Fire Smoke Image Segmentation in a Complex Large Space Send Orders for Reprnts to reprnts@benthamscence.ae The Open Constructon and Buldng Technology Journal, 2015, 9, 27-31 27 Open Access Early Fre Smoke Image Segmentaton n a Complex Large Space Hu Yan 1,2,*,

More information

Private Information Retrieval (PIR)

Private Information Retrieval (PIR) 2 Levente Buttyán Problem formulaton Alce wants to obtan nformaton from a database, but she does not want the database to learn whch nformaton she wanted e.g., Alce s an nvestor queryng a stock-market

More information