Robust Watermarking for Text Images Based on Arnold Scrambling and DWT-DCT

Size: px
Start display at page:

Download "Robust Watermarking for Text Images Based on Arnold Scrambling and DWT-DCT"

Transcription

1 Internatonal Conference on Mechatroncs Electronc Industral and Control Engneerng (MEIC 015) Robust Watermarkng for Text Images Based on Arnold Scramblng and DWT-DCT Fan Wu College of Informaton Scence and Technology Hanan Unversty Hakou Chna Mengxng Huang College of Informaton Scence and Technology Hanan Unversty Hakou Chna Jngbng L* College of Informaton Scence and Technology Hanan Unversty Hakou Chna Abstract Wth the popularzaton of Internet and the development at full speed of the mult-meda technology the copyrght protecton of dgtal works has already become the hot ssue at present. The paper proposes lnd watermarkng algorthm for text mages authentcaton and protecton based on DWT-DCT. Frstly the text mage s decomposed nto a low frequency horzontal vertcal and dagonal four components though DWT transformaton then the low frequency component s made the whole DCT transform to get rd of coeffcent correlaton n order to obtan the vsual feature vectors. Based on the studes of the document dgtal watermarkng methods and technques ths dssertaton presents that the problems of exsted documents watermarkng algorthms can be solved by Arnold Scramblng and DCT technque. The expermental results show that the scheme has strong robustness aganst common attacks and geometrc attacks. Keywords-Arnold scramblng; Dgtal Watermarkng; DWT; DCT; Zero-watermarkng; Text mage. I. INTRODUCTION Wth the rapd development of computer scence and technology and multmeda communcaton technology dgtal meda s becomng more and more unversal. Dgtal watermarkng s an mportant method for protectng dgtal meda copyrght. Most work focuses on audo vdeo grayscale and color mages. However bnary mages are very useful for securty records nsurance nformaton fnancal document fax mages case hstory contract e-busness e- Government etc. Therefore t may be very useful to embed and extract watermarkng n bnary mages. Currently the dgtal watermarkng technque s appled n the transform doman more popular than appled n the spatal doman []. DCT s wdely used among the transform doman and DWT based technques have also been popular appled because of ts excellent spatal localzaton and multresoluton propertes. In ths paper we have proposed a DWT -DCT based blnd watermarkng algorthm for copyrght protecton. The combnaton of the two transforms mproves the watermarkng performance compared to the DWT or DCT only watermarkng approach. In addton the watermarkng s scrambled and embedded n a spread spectrum pattern so as to enhance the securty and robustness further. Experment evaluaton results show that the proposed algorthm has strong ablty n resstng common attacks and geometrc attacks. II. THE FUNDAMENTAL THEORY A. The Dscrete Wavelet Transform The wavelet transform proposed by S. Mallat n 1988 frstly s a new sgnal analyss theory and a tme-frequency method. The basc dea s to decompose the sgnal f t based on wavelet functon t. Wf ( a b) f ( t) a b( t) dt R t Where wavelet functon s a set of functons whch are obtaned by translatng and stretchng of the same base functon t. 1 ( t ) a (( t b ) a ) a b R a 0 a b Where s the basc wavelet a and b are the dlaton factor and the translaton factor respectvely. The decomposng equaton of Mallat algorthm s defned as follows: c 1 k c nh k R nk nz d c g 1 k n nk nz k z The reconstructon equaton of the Mallat algorthm s gven by: c k c 1 nhkn d k z 1 ng k n nz By the one-layer wavelet decomposton of the orgnal mage four subband mages can be acqured. Where LL1 s the approxmated subband mage wth low frequency nz 015. The authors - Publshed by Atlants Press 568

2 characterstcs that are robust to attacks. The others (LH1 HL1 and HH1) wth hgh frequency characterstcs are easly affected by attacks. Therefore embeddng the watermarkng nto the low frequency subgraph can provde better robustness. B. The Dscrete Cosne Transform DCT transform s compatble wth nternatonal data compresson standard (JPEG MPEG) and s wdely used. It s well known for the best balance between operaton speed and hgh precson of extractng the feature vector [3]. The M N text mage s DCT transform s defned by: M 1 N 1 (x 1) u (y 1) v F( u v) c( u) c( v) f ( x y)cos cos M N x0 y0 u M 1; v N 1 1 M u 0 1 N v 0 c( u) c( v) M u 1... M 1 N v 1... N 1 Where x y s sampled value n the spatal doman samplng; u v s the frequency doman samplng. Usually dgtal mage s expressed by pxels square namely M=N. C. Arnold scramblng Transform (AT) Scramblng transformaton as a means of encrypted technology s appled n the pretreatment stage of the watermarkng after scramblng transformaton one meanngful watermarkng wll become a meanngless chaotc mage. If you do not know the scramblng algorthm and keys an attacker even got the embedded watermark can't restore t. And thus plays a role of secondary encrypton. Addtonally after scramblng transformaton t wll upset the relatonshp between the space locatons of pxels and make t evenly dstrbuted n all space of the carrer mage. Ths wll mprove the robustness of the algorthm. Two-dmensonal Arnold scramblng transformaton s defned as follows: x ' 1 1 x mod N x y 01 N 1 y ' 1 y (7) Wheren x y s the pxel coordnates of the orgnal space: x' y' s the pxel coordnates after teratve computaton scramblng N s the sze of the rectangular mage also referred to as a step number. By the above formula the correspondng nverse transform formula can be obtaned: x 1 x ' N mod N x ' y ' 01 N 1 y 1 1 y ' N (8) It s easy to restore the orgnal ntal state accordng to the correspondng teratons. Arnold transformaton s cyclcal when terate to a step wll regan orgnal mage. So f you do not know cycle and teratons you wll not be able to restore the mage. Therefore cycle and teratons can exst as a prvate key. Meanwhle dfferent mage because the desred effect s dfferent teratons should also be changed accordng to your need. D. A method to obtan the feature vector of text mage Feature extracton means to obtan the feature vector whch s used to descrbe the mage content. In lterature the common characterstcs are usually the followng types: gray feature Shape and locaton [4] texture features [5] and semantc features. Frstly DWT s appled on the orgnal text mage to obtan the approxmated subband LL1. Then DCT of the whole LL1 s computed and the DCT coeffcent matrx s acqured. We choose 5 low-frequency DWT-DCT coeffcents (F(11) F(1) F(15)) for formaton of the feature vector shown n Table I. We fnd that the value of the low-frequent coeffcents may change after the mage has undergone an attack partcularly geometrc attacks. However the sgns of the coeffcents reman unchanged even wth strong geometrc attacks as also shown n Table I. Let 1 represents a postve or zero coeffcent and 0 represents a negatve coeffcent and then we can obtan the sgn sequence of low-frequency coeffcents as shown n the column Sequence of coeffcent sgns n Table I. After attacks the sgn sequence s unchanged and the normalzed cross-correlaton (NC) s equal to 1.0. Ths means that the sgns of the sequence can be regarded as the feature vector of the text mage. Furthermore t proves that the sequence of the DWT-DCT coeffcent sgns can reflect the man vsual characterstcs of text mages. T ABLE Ⅰ. CHANGE OF DWT-DCT LOW-FREQUENCY COEFFICIENTS WITH RESPECT TO DIFFERENT ATTACKS. C1 C C3 C4 C5 C6 C7 C8 C9 C10 C11 C1 C13 C14 Image processng PSNR F(11) F(1) F(13) F(14) F(15) F(16) F(17) F(18) F(19) F(110) Sequence of coeffcent sgns NC Orgnal mage Gaussan nose (4%) 13.0dB JPEG compresson (5%) 17.71dB Medan flter [3 3] 8.535dB Croppng(%) 5.439dB (fromy drecton) Rotaton (1.5 ) 5.598dB Scalng( 0.5) DCT transform coeffcent unt 1.0e

3 III. THE ALGORITHM Use a meanngful bnary mage as the watermarkng Represented by W F represents the orgnal text mage The W={ w() w() =01;1 M11 M} as dgtal watermarkng At the same tme we select a paragraph n an artcle as the orgnal text mage. It s descrbe as: F={ f() f() R;1 N11 N} where w (( )) and f ( ) denote the pxel gray values of the watermarkng and the orgnal text mage Let M1 = M = M N1 = N = N. A. The algorthm of the embedded watermarkng. Step1 the bnary watermarkng mage s scrambled by Arnold scramblng transform BW(). BW ( ) AT ( W (. )) (9) Step L-level decomposton of the wavelet transform to the orgnal text mage and obtanng the approxmaton subgraph FA L. The orgnal text mage after L level wavelet decomposton Can get more detals sub-graph coeffcent FD k (k=13;=13 L) and an approxmaton sub-graph coeffcent FA L. Wavelet decomposton level L floor(log(n/m)) f L level wavelet decomposton seres s hgh the wavelet coeffcent resstance to gaussan JPEG compresson and conventonal attack ablty wll become strong but wavelet decomposton and the reconstructed tme correspondng lengthened. Here take L = 1. FA( ) DWT ( F( )) (10) Step3 Full fgure DCT transformaton on approxmaton subgraph FA L get text mage vsual feature vector V (). Frstly DCT of the whole approxmated subband LL1 FA L () s computed and the DCT coeffcent matrx FF() s acqured. Then Zg - Zag sort to FF(). Next the frequency sequence Y() from low to hgh frequency can be obtaned. Fnally the feature vector V() V { v( ) v( ) 0.1;1 J} s acheved as the sgns sequence of the low-frequency DWT-DCT coeffcents where the value of J can tune the robustness and capablty of the embedded watermarkng. FF( ) DCT ( FAL ( )) (11) Y ( ) Zg Zag( FF( )) (1) V ( ) Sgn( Y ( )) (13) Step4 Use HASH functon propertes and vsual feature vector Acqure the key sequence. Key( ) V ( ) BW ( ) (14) Key ( ) s by the mage vsual feature vector and the embed watermarkng BW ( ) generated by the HASH functon of cryptography. Key ( ) s used to extract the watermarkng Furthermore Key ( ) can be regarded as a secret key and regstered to the thrd part to preserve the ownershp of the orgnal text mage so as to acheve the purpose of the protecton of text mages. C. The algorthm of the extracted watermarkng. Step1 Get the approxmaton sub-graph of the beng tested mage by the wavelet transform. Let the beng tested mage for Test_F '( ) abbrevated as T_F '( ) L-level decomposton of the wavelet transform to the beng tested mage and obtanng the approxmaton subgraph T_FA L ' (). FA( ) DWT ( F( )) (15) Step Full fgure DCT transformaton on approxmaton subgraph T_FA L (). get text mage vsual feature vector T_V (). ' ' FF DCT FAL ( ) ( ( )) (16) Y ( ) Zg Zag( FF( )) (17) T _ V '( ) Sgn( Y '( )) (18) Step3 Extractng the watermarkng BW ' ( ). Accordng to the key whch generated n the embedded watermarkng and the vsual feature vector T_V '() of the beng tested mage use HASH functon propertes to extract the watermarkng BW ' ( ). Extractng watermarkng doesn't need orgnal mage so t can protect the orgnal mage better. BW '( ) Key( ) T _ V '( ) (19) Step4 Usng the Arnold scramblng nverse transform to restore the extracted watermarkng BW '( ) get the watermarkng of the beng tested mage W (). W ( ) IAT ( BW ( )) (0) D. Detecton algorthm of the watermarkng. Step1 By calculatng NC (Normalzed Cross-Correlaton) to determne whether there s the exstence of the watermarkng. The larger the value of NC s the more approxmaton between W '( ) and W ( ). Defned as: NC W W ' W (1) Where W ( ) s the orgnal watermarkng W '( ) s the extracted watermarkng. Step Evaluaton of the qualty of the text mage after Embed watermarkng by calculatng the peak sgnal-to-nose rato PSNR (db) we often use peak value sgnal-to-nose rato PSNR (db) to reflect the qualty of sgnal defned as: 570

4 PSNR I MN max I 10lg I' () where I() I'() denote the pxel gray values of the coordnates () n the orgnal mage and the watermarkng respectvely; M N represent the mage row and column numbers of pxels respectvely. IV. EXPERIMENTS To verfy the effectveness of our proposed algorthm we carred out the smulaton n Matlab010a platform. We choose a sgnfcant bnary mage as the orgnal watermarkng and select a paragraph n an artcle as the orgnal text mage. the orgnal watermarkng W= {w() w()=0 or 1; }. the orgnal text mage F={f () }. In the experment the parameter values: Arnold scramblng perod s 4 and the number of transform tmes are 8.e. T=4 n=8. It can be seen vsually from Fgure 1 that the qualty of the text mage embedded has hardly any change. The qualty of extracted watermarkng s of hgh-qualty wth no dfference wth the orgnal n normal case (no attackng on watermarkng). (c) Fgure 1. The watermarkng s scrambled by Arnold scramblng transform. The watermarked text mage wthout attacks the orgnal bnary watermarkng. (c) the scrambled watermarkng. In order to nvestgate ths approach of embeddng watermarkng robust performance I chose the followng verfcaton: A. Common attacks. 1) Addng Gaussan nose. In the watermarked text mage Gaussan nose s added by the mnose functon wth dfferent nose level. The text mage under the attack of Gaussan nose (10%) wth PSNR=13.0Db. At ths tme the watermarked text mage has been very vague as shown n Fg. 3. The watermarkng can obvously be extracted wth NC=1.0. As shown n Fg. 3. Table Ⅱ shows the NC values between the extracted and embedded watermarkng and the PSNR of the attacked watermarked mage. TABLEⅡ THE PSNR AND NC UNDER GAUSSIAN NOISE ATTACKS Nose parameters (%) PSNR(dB) NC ) JPEG attacks. JPEG compresson process s done by usng the percentage of mage qualty as a parameter to measure. The watermarked text mage wth PSNR=17.71dB under JPEG attacks (10%) s shown n Fg4. the watermarkng can obvously be extracted wth NC=0.93. As shown n Fg. 4. Table Ⅲ shows the NC values between the extracted and embedded watermarkng and the PSNR of the attacked watermarked mage. Fgure 3. The watermarked text mage under Gaussan nose attacks(10%). the watermarked text mage under nose attack. the extracted watermarkng Fgure 4. The watermarked text mage under JPEG attacks (10%). the watermarked text mage under JPEG attacks. the extracted watermarkng.. TABLEⅢ THE PSNR AND NC UNDER JPEG 571

5 Compresson Qualty(% ) PSNR(dB) NC B. Geometrcal attacks. 1) Rotaton attacks. We nvestgate the effectveness of our proposed watermarkng algorthm aganst rotaton angle as the parameter. The watermarked text mage under rotaton attacks (clockwse by 5 ) wth PSNR=6.31dB under rotaton attacks s shown n Fg. 5. The watermarkng can obvously be extracted wth NC=0.76. As shown n Fg. 5. Table Ⅳshows the NC values between the extracted and embedded watermarkng and the PSNR of the attacked watermarked mage. Fgure 5. The watermarked text mage under rotaton attacks. (clockwse by 5 ). the watermarked text mage under rotaton attacks. the extracted watermarkng.. TABLE Ⅳ THE PSNR AND NC UNDER ROTATION ATTACKS Rotaton (clockwse) PSNR(dB) NC Can be seen the extracted watermarkng s very smlar to the orgnal watermarkng. ) Scalng attacks. We use the scalng factor as parameter to valdate the effectveness of our proposed algorthm on dfferent scalng attacks. When the watermarked mage s scaled 0.5 tmes ts pxel pont has become a quarter of the orgnal. The resoluton has sent a lot of. Fg. 6 shows that the watermarked mage shrunk wth a scale factor of 0.5. Moreover Fg. 6 shows that the watermarkng can be extracted wth NC=1.0. Table Ⅴ shows the NC values between the extracted and embedded watermarkng wth scalng attacks on the watermarked mage wth multple scale parameters. Fgure 6. The watermarked text mage under scalng attacks. (0.5 tmes). the watermarked text mage under scalng attacks. the extracted watermarkng. TABLEⅤ THE NC UNDER SCALING ATTACKS Scalng factor NC V. CONCLUSION Many watermarkng algorthms exst for the frequency doman usng ether the DCT or the DWT. In ths paper we propose a new watermarkng algorthm usng the DWT pror to the DCT to provde better mperceptblty n harmony wth the human vsual system. Experments show that ts robustness s better than DWT or DCT algorthm alone after applyng the same attacks. In addton t can be used to mprove the PSNR and enable to blnd extracton. ACKNOWLEDGEMENT Ths work s supported by the Natonal Natural Scence Foundaton of Chna (No: ) and the Insttutons of Hgher Learnng Scentfc Research Specal Proect of Hanan (Hnkyzx014-)and the Internatonal Scence and Technology Cooperaton proect of Hanan (No: KJHZ014-16) and the Key Scence and Technology Proect of Hanan (No: ZDXM ). REFERENCES [1] Alar Kuusk Enar Relent Ivor Loobas Marko Parve "Software Archtecture for Modern Telehealth Care Systems" AISS Vol. 3 No. pp. 141 ~ [] Xuemng L Guangun He "Effcent Audo Zero-Watermarkng Algorthm for Copyrght Protecton Based on BIC and DWCM Matrx" IJACT Vol. 4 No. 6 pp. 109 ~ [3] Al AI-Ha "Combned DWT-DCT Dgtal Image Watermarkng" Journal of Computer Scence 3(9): [4] M. Unok R. Myauch Reversble Watermarkng for Dgtal Audo Based on Cochlear Delay Characterstcs In Proceedngs of the 011 Seventh Internatonal Conference on Intellgent Informaton Hdng and Multmeda Sgnal Processng Oct. 011 pp [5] B.S.Manunath Gabor wavelet transform and applcaton to problems n computer vson n 6th Aslomar Conference on SgnalsSystems and ComputersPacfc GroveCAl99 PP [6] Xa X. G. Boncelet C. G. and Arce G.R. A multresoluton watermark for dgtal mages Proc. Int. Conf. on Image Processng 97 Santa Barbara CA U. S. A. Vol. I pp [7] Huang D Yan H. Interword dstance changes represented by sne waves for watermarkng text mages IEEE Trans. Syst. Vdeo Technol. 11(1)pp [8] Cox I Klan J Leghton T Shamoon T Secure spread spectrum watermarkng for multmeda IEEE Transactons on Image Processng6(1)pp [9] Hseh C. T. Lu Y. L. Luo C. P. and Kuo F. J. A study of enhancng the robustness of watermark Proc. IEEE Int. Sym. on Multmeda Software Engneerng Tawan pp [10] Ester Yen and L-Hsen Ln"Rubk s cube watermark technology for grayscale mages" Vol 37(6) pp Jun [11] GAO Xn-yu LV Jan-png. A block-based DCT algorthm of dgtal mage watermarkng.journal OF XI AN UNIVERSITY OF POSTS AND TELECOMMUNICATIONS.Vol.1 No.5 Sep

Hybrid Non-Blind Color Image Watermarking

Hybrid Non-Blind Color Image Watermarking Hybrd Non-Blnd Color Image Watermarkng Ms C.N.Sujatha 1, Dr. P. Satyanarayana 2 1 Assocate Professor, Dept. of ECE, SNIST, Yamnampet, Ghatkesar Hyderabad-501301, Telangana 2 Professor, Dept. of ECE, AITS,

More information

A Hybrid Semi-Blind Gray Scale Image Watermarking Algorithm Based on DWT-SVD using Human Visual System Model

A Hybrid Semi-Blind Gray Scale Image Watermarking Algorithm Based on DWT-SVD using Human Visual System Model A Hybrd Sem-Blnd Gray Scale Image Watermarkng Algorthm Based on DWT-SVD usng Human Vsual System Model Rajesh Mehta r Scence & Engneerng, USICT Guru Gobnd Sngh Indrarprastha Unversty New Delh, Inda rajesh00ust@gmal.com

More information

Content Based Image Retrieval Using 2-D Discrete Wavelet with Texture Feature with Different Classifiers

Content Based Image Retrieval Using 2-D Discrete Wavelet with Texture Feature with Different Classifiers IOSR Journal of Electroncs and Communcaton Engneerng (IOSR-JECE) e-issn: 78-834,p- ISSN: 78-8735.Volume 9, Issue, Ver. IV (Mar - Apr. 04), PP 0-07 Content Based Image Retreval Usng -D Dscrete Wavelet wth

More information

Enhanced Watermarking Technique for Color Images using Visual Cryptography

Enhanced Watermarking Technique for Color Images using Visual Cryptography Informaton Assurance and Securty Letters 1 (2010) 024-028 Enhanced Watermarkng Technque for Color Images usng Vsual Cryptography Enas F. Al rawashdeh 1, Rawan I.Zaghloul 2 1 Balqa Appled Unversty, MIS

More information

Semi-Fragile Watermarking Scheme for Authentication of JPEG Images

Semi-Fragile Watermarking Scheme for Authentication of JPEG Images Tamkang Journal of Scence and Engneerng, Vol. 10, No 1, pp. 5766 (2007) 57 Sem-Fragle Watermarkng Scheme for Authentcaton of JPEG Images Chh-Hung n 1 *, Tung-Shh Su 2 and Wen-Shyong Hseh 2,3 1 Department

More information

Improvement of Spatial Resolution Using BlockMatching Based Motion Estimation and Frame. Integration

Improvement of Spatial Resolution Using BlockMatching Based Motion Estimation and Frame. Integration Improvement of Spatal Resoluton Usng BlockMatchng Based Moton Estmaton and Frame Integraton Danya Suga and Takayuk Hamamoto Graduate School of Engneerng, Tokyo Unversty of Scence, 6-3-1, Nuku, Katsuska-ku,

More information

Key-Selective Patchwork Method for Audio Watermarking

Key-Selective Patchwork Method for Audio Watermarking Internatonal Journal of Dgtal Content Technology and ts Applcatons Volume 4, Number 4, July 2010 Key-Selectve Patchwork Method for Audo Watermarkng 1 Ch-Man Pun, 2 Jng-Jng Jang 1, Frst and Correspondng

More information

A Hybrid Digital Image Watermarking based on Discrete Wavelet Transform, Discrete Cosine Transform, and General Regression Neural Network

A Hybrid Digital Image Watermarking based on Discrete Wavelet Transform, Discrete Cosine Transform, and General Regression Neural Network A Hybrd Dgtal Image Watermarkng based on Dscrete Wavelet Transform, Dscrete Cosne Transform, and General Regresson Neural Network Ayoub Taher ; ABSTRACT In ths paper, a new hybrd dgtal watermarkng technque

More information

A Comparison between Digital Images Watermarking in Tow Different Color Spaces Using DWT2*

A Comparison between Digital Images Watermarking in Tow Different Color Spaces Using DWT2* A Comparson between Dgtal s ng n Tow Dfferent Color Spaces Usng DWT* Mehd Khall Natonal Academy of Scence of Armena Yerevan, Armena e-mal: khall.mehd@yahoo.com ABSTRACT A novel dgtal watermarkng for ownershp

More information

KEYWORDS: Digital Image Watermarking, Discrete Wavelet Transform, General Regression Neural Network, Human Visual System. 1.

KEYWORDS: Digital Image Watermarking, Discrete Wavelet Transform, General Regression Neural Network, Human Visual System. 1. An Adaptve Dgtal Image Watermarkng Based on Image Features n Dscrete Wavelet Transform Doman and General Regresson Neural Network Ayoub Taher Group of IT Engneerng, Payam Noor Unversty, Broujen, Iran ABSTRACT:

More information

Digital Video Watermarking using Discrete Wavelet Transform and Principal Component Analysis

Digital Video Watermarking using Discrete Wavelet Transform and Principal Component Analysis Internatonal Journal of Wsdom Based Computng, Vol. 1 (2), August 2011 7 Dgtal Vdeo Watermarkng usng Dscrete Wavelet Transform and Prncpal Component Analyss Sanjana Snha, Prajnat Bardhan, Swarnal Pramanck,

More information

An Image Compression Algorithm based on Wavelet Transform and LZW

An Image Compression Algorithm based on Wavelet Transform and LZW An Image Compresson Algorthm based on Wavelet Transform and LZW Png Luo a, Janyong Yu b School of Chongqng Unversty of Posts and Telecommuncatons, Chongqng, 400065, Chna Abstract a cylpng@63.com, b y27769864@sna.cn

More information

A NEW AUDIO WATERMARKING METHOD BASED

A NEW AUDIO WATERMARKING METHOD BASED A NEW AUDIO WATERMARKING METHOD BASED ON DISCRETE COSINE TRANSFORM WITH A GRAY IMAGE Mohammad Ibrahm Khan 1, Md. Iqbal Hasan Sarker 2, Kaushk Deb 3 and Md. Hasan Furhad 4 1,2,3 Department of Computer Scence

More information

IAJIT First Online Publication

IAJIT First Online Publication Content Protecton n Vdeo Data Based on Robust Dgtal Watermarkng Resstant to Intentonal and Unntentonal Attacks Mad Masoum and Shervn Amr Department of Electrcal Engneerng, Islamc Azad Unversty Qazvn Branch,

More information

An Image Fusion Approach Based on Segmentation Region

An Image Fusion Approach Based on Segmentation Region Rong Wang, L-Qun Gao, Shu Yang, Yu-Hua Cha, and Yan-Chun Lu An Image Fuson Approach Based On Segmentaton Regon An Image Fuson Approach Based on Segmentaton Regon Rong Wang, L-Qun Gao, Shu Yang 3, Yu-Hua

More information

Steganography System using Slantlet Transform

Steganography System using Slantlet Transform ISSN:43-6999 Journal of Inmaton Communcaton and Intellgence Systems (JICIS) Volume Issue February 06 Steganography System usng Slantlet Transm Ryadh Bassl Abduljabbar Abstract An approach hdng nmaton has

More information

A Fast Visual Tracking Algorithm Based on Circle Pixels Matching

A Fast Visual Tracking Algorithm Based on Circle Pixels Matching A Fast Vsual Trackng Algorthm Based on Crcle Pxels Matchng Zhqang Hou hou_zhq@sohu.com Chongzhao Han czhan@mal.xjtu.edu.cn Ln Zheng Abstract: A fast vsual trackng algorthm based on crcle pxels matchng

More information

Cluster Analysis of Electrical Behavior

Cluster Analysis of Electrical Behavior Journal of Computer and Communcatons, 205, 3, 88-93 Publshed Onlne May 205 n ScRes. http://www.scrp.org/ournal/cc http://dx.do.org/0.4236/cc.205.350 Cluster Analyss of Electrcal Behavor Ln Lu Ln Lu, School

More information

Information Hiding Watermarking Detection Technique by PSNR and RGB Intensity

Information Hiding Watermarking Detection Technique by PSNR and RGB Intensity www..org 3 Informaton Hdng Watermarkng Detecton Technque by PSNR and RGB Intensty 1 Neha Chauhan, Akhlesh A. Waoo, 3 P. S. Patheja 1 Research Scholar, BIST, Bhopal, Inda.,3 Assstant Professor, BIST, Bhopal,

More information

Robust Blind Video Watermark Algorithm in Transform Domain Combining with 3D Video Correlation

Robust Blind Video Watermark Algorithm in Transform Domain Combining with 3D Video Correlation JOURNAL OF MULTIMEDIA, VOL. 8, NO. 2, APRIL 2013 161 Robust Blnd Vdeo Watermark Algorthm n Transform Doman Combnng wth 3D Vdeo Correlaton DING Ha-yang 1,3 1. Informaton Securty Center, Bejng Unversty of

More information

IMPLEMENTATION OF QIM BASED AUDIO WATERMARKING USING HYBRID TRANSFORM OF SWT-DCT-SVD METHODS OPTIMIZED WITH GENETIC ALORITHM

IMPLEMENTATION OF QIM BASED AUDIO WATERMARKING USING HYBRID TRANSFORM OF SWT-DCT-SVD METHODS OPTIMIZED WITH GENETIC ALORITHM IMPLEMENTATION OF QIM BASED AUDIO WATERMARKING USING HYBRID TRANSFORM OF SWT-DCT-SVD METHODS OPTIMIZED WITH GENETIC ALORITHM Ryan Amnullah 1, Gelar Budman 2, Irma Saftr 3 1, 2, 3 FakultasTeknk Elektro,

More information

Identify the Attack in Embedded Image with Steganalysis Detection Method by PSNR and RGB Intensity

Identify the Attack in Embedded Image with Steganalysis Detection Method by PSNR and RGB Intensity Internatonal Journal of Computer Systems (ISSN: 394-1065), Volume 03 Issue 07, July, 016 Avalable at http://www.jcsonlne.com/ Identfy the Attack n Embedded Image wth Steganalyss Detecton Method by PSNR

More information

Shape-adaptive DCT and Its Application in Region-based Image Coding

Shape-adaptive DCT and Its Application in Region-based Image Coding Internatonal Journal of Sgnal Processng, Image Processng and Pattern Recognton, pp.99-108 http://dx.do.org/10.14257/sp.2014.7.1.10 Shape-adaptve DCT and Its Applcaton n Regon-based Image Codng Yamn Zheng,

More information

Parallelism for Nested Loops with Non-uniform and Flow Dependences

Parallelism for Nested Loops with Non-uniform and Flow Dependences Parallelsm for Nested Loops wth Non-unform and Flow Dependences Sam-Jn Jeong Dept. of Informaton & Communcaton Engneerng, Cheonan Unversty, 5, Anseo-dong, Cheonan, Chungnam, 330-80, Korea. seong@cheonan.ac.kr

More information

A Fast Content-Based Multimedia Retrieval Technique Using Compressed Data

A Fast Content-Based Multimedia Retrieval Technique Using Compressed Data A Fast Content-Based Multmeda Retreval Technque Usng Compressed Data Borko Furht and Pornvt Saksobhavvat NSF Multmeda Laboratory Florda Atlantc Unversty, Boca Raton, Florda 3343 ABSTRACT In ths paper,

More information

The Research of Ellipse Parameter Fitting Algorithm of Ultrasonic Imaging Logging in the Casing Hole

The Research of Ellipse Parameter Fitting Algorithm of Ultrasonic Imaging Logging in the Casing Hole Appled Mathematcs, 04, 5, 37-3 Publshed Onlne May 04 n ScRes. http://www.scrp.org/journal/am http://dx.do.org/0.436/am.04.584 The Research of Ellpse Parameter Fttng Algorthm of Ultrasonc Imagng Loggng

More information

Robust Video Watermarking Using Image Normalization, Motion Vector and Perceptual Information

Robust Video Watermarking Using Image Normalization, Motion Vector and Perceptual Information Robust Vdeo Watermarkng Usng Image ormalzaton, Moton Vector and Perceptual Informaton Cedllo-Hernández Antono 1, Cedllo-Hernández Manuel 1, akano-myatake Marko 1, García-Vázquez Mreya S. 2 1 Postgraduate

More information

Novel Pattern-based Fingerprint Recognition Technique Using 2D Wavelet Decomposition

Novel Pattern-based Fingerprint Recognition Technique Using 2D Wavelet Decomposition Mathematcal Methods for Informaton Scence and Economcs Novel Pattern-based Fngerprnt Recognton Technque Usng D Wavelet Decomposton TUDOR BARBU Insttute of Computer Scence of the Romanan Academy T. Codrescu,,

More information

High Payload Reversible Data Hiding Scheme Using Difference Segmentation and Histogram Shifting

High Payload Reversible Data Hiding Scheme Using Difference Segmentation and Histogram Shifting JOURNAL OF ELECTRONIC SCIENCE AND TECHNOLOGY, VOL. 11, NO. 1, MARCH 2013 9 Hgh Payload Reversble Data Hdng Scheme Usng Dfference Segmentaton and Hstogram Shftng Yung-Chen Chou and Huang-Chng L Abstract

More information

Data Hiding and Image Authentication for Color-Palette Images

Data Hiding and Image Authentication for Color-Palette Images Data Hdng and Image Authentcaton for Color-Palette Images Chh-Yang Yn ( 殷志揚 ) and Wen-Hsang Tsa ( 蔡文祥 ) Department of Computer & Informaton Scence Natonal Chao Tung Unversty 00 Ta Hsueh Rd., Hsnchu, Tawan

More information

A Robust Webpage Information Hiding Method Based on the Slash of Tag

A Robust Webpage Information Hiding Method Based on the Slash of Tag Advanced Engneerng Forum Onlne: 2012-09-26 ISSN: 2234-991X, Vols. 6-7, pp 361-366 do:10.4028/www.scentfc.net/aef.6-7.361 2012 Trans Tech Publcatons, Swtzerland A Robust Webpage Informaton Hdng Method Based

More information

Using Fuzzy Logic to Enhance the Large Size Remote Sensing Images

Using Fuzzy Logic to Enhance the Large Size Remote Sensing Images Internatonal Journal of Informaton and Electroncs Engneerng Vol. 5 No. 6 November 015 Usng Fuzzy Logc to Enhance the Large Sze Remote Sensng Images Trung Nguyen Tu Huy Ngo Hoang and Thoa Vu Van Abstract

More information

Research Article High Capacity Reversible Watermarking for Audio by Histogram Shifting and Predicted Error Expansion

Research Article High Capacity Reversible Watermarking for Audio by Histogram Shifting and Predicted Error Expansion e Scentfc World Journal, Artcle ID 656251, 7 pages http://dx.do.org/1.1155/214/656251 Research Artcle Hgh Capacty Reversble Watermarkng for Audo by Hstogram Shftng and Predcted Error Expanson Fe Wang,

More information

Adaptive digital watermarking of images using Genetic Algorithm

Adaptive digital watermarking of images using Genetic Algorithm Adaptve dgtal watermarkng of mages usng Genetc Algorthm Bushra Skander, Muhammad Ishtaq, M. Arfan Jaffar, Muhammad Tarq, Anwar M. Mrza Department of Computer Scence, Natonal Unversty of Computer and Emergng

More information

A Lossless Watermarking Scheme for Halftone Image Authentication

A Lossless Watermarking Scheme for Halftone Image Authentication IJCSNS Internatonal Journal of Computer Scence and Network Securty, VOL.6 No.2B, February 2006 147 A Lossless Watermarkng Scheme for Halftone Image Authentcaton Jeng-Shyang Pan, Hao Luo, and Zhe-Mng Lu,

More information

A New Feature of Uniformity of Image Texture Directions Coinciding with the Human Eyes Perception 1

A New Feature of Uniformity of Image Texture Directions Coinciding with the Human Eyes Perception 1 A New Feature of Unformty of Image Texture Drectons Concdng wth the Human Eyes Percepton Xng-Jan He, De-Shuang Huang, Yue Zhang, Tat-Mng Lo 2, and Mchael R. Lyu 3 Intellgent Computng Lab, Insttute of Intellgent

More information

An Improved Image Segmentation Algorithm Based on the Otsu Method

An Improved Image Segmentation Algorithm Based on the Otsu Method 3th ACIS Internatonal Conference on Software Engneerng, Artfcal Intellgence, Networkng arallel/dstrbuted Computng An Improved Image Segmentaton Algorthm Based on the Otsu Method Mengxng Huang, enjao Yu,

More information

S1 Note. Basis functions.

S1 Note. Basis functions. S1 Note. Bass functons. Contents Types of bass functons...1 The Fourer bass...2 B-splne bass...3 Power and type I error rates wth dfferent numbers of bass functons...4 Table S1. Smulaton results of type

More information

Detection of an Object by using Principal Component Analysis

Detection of an Object by using Principal Component Analysis Detecton of an Object by usng Prncpal Component Analyss 1. G. Nagaven, 2. Dr. T. Sreenvasulu Reddy 1. M.Tech, Department of EEE, SVUCE, Trupath, Inda. 2. Assoc. Professor, Department of ECE, SVUCE, Trupath,

More information

Using Counter-propagation Neural Network for Digital Audio Watermarking

Using Counter-propagation Neural Network for Digital Audio Watermarking Usng Counter-propagaton Neural Network for Dgtal Audo Watermarkng Chuan-Yu Chang and Wen-Chh Shen Graduate School of Computer Scence and Informaton Engneerng Natonal Yunln Unversty of Scence & Technology

More information

A Secured Method for Image Steganography Based On Pixel Values

A Secured Method for Image Steganography Based On Pixel Values A Secured Method for Image Steganography Based On Pxel Values Tarun Gulat #, Sanskrt Gupta * # Assocate Professor, Electroncs and Communcaton Engneerng Department, MMEC, M.M.U., Mullana, Ambala, Haryana,

More information

Type-2 Fuzzy Non-uniform Rational B-spline Model with Type-2 Fuzzy Data

Type-2 Fuzzy Non-uniform Rational B-spline Model with Type-2 Fuzzy Data Malaysan Journal of Mathematcal Scences 11(S) Aprl : 35 46 (2017) Specal Issue: The 2nd Internatonal Conference and Workshop on Mathematcal Analyss (ICWOMA 2016) MALAYSIAN JOURNAL OF MATHEMATICAL SCIENCES

More information

Grading Image Retrieval Based on DCT and DWT Compressed Domains Using Low-Level Features

Grading Image Retrieval Based on DCT and DWT Compressed Domains Using Low-Level Features Journal of Communcatons Vol. 0 No. January 0 Gradng Image Retreval Based on DCT and DWT Compressed Domans Usng Low-Level Features Chengyou Wang Xnyue Zhang Rongyang Shan and Xao Zhou School of echancal

More information

Brushlet Features for Texture Image Retrieval

Brushlet Features for Texture Image Retrieval DICTA00: Dgtal Image Computng Technques and Applcatons, 1 January 00, Melbourne, Australa 1 Brushlet Features for Texture Image Retreval Chbao Chen and Kap Luk Chan Informaton System Research Lab, School

More information

Robust and Reversible Relational Database Watermarking Algorithm Based on Clustering and Polar Angle Expansion

Robust and Reversible Relational Database Watermarking Algorithm Based on Clustering and Polar Angle Expansion Robust and Reversble Relatonal Database Watermarkng Algorthm Based on Clusterng and Polar Angle Expanson Zhyong L, Junmn Lu and Wecheng Tao College of Informaton Scence and Engneerng, Hunan Unversty, Changsha,

More information

Local Quaternary Patterns and Feature Local Quaternary Patterns

Local Quaternary Patterns and Feature Local Quaternary Patterns Local Quaternary Patterns and Feature Local Quaternary Patterns Jayu Gu and Chengjun Lu The Department of Computer Scence, New Jersey Insttute of Technology, Newark, NJ 0102, USA Abstract - Ths paper presents

More information

Research and Application of Fingerprint Recognition Based on MATLAB

Research and Application of Fingerprint Recognition Based on MATLAB Send Orders for Reprnts to reprnts@benthamscence.ae The Open Automaton and Control Systems Journal, 205, 7, 07-07 Open Access Research and Applcaton of Fngerprnt Recognton Based on MATLAB Nng Lu* Department

More information

Image Representation & Visualization Basic Imaging Algorithms Shape Representation and Analysis. outline

Image Representation & Visualization Basic Imaging Algorithms Shape Representation and Analysis. outline mage Vsualzaton mage Vsualzaton mage Representaton & Vsualzaton Basc magng Algorthms Shape Representaton and Analyss outlne mage Representaton & Vsualzaton Basc magng Algorthms Shape Representaton and

More information

Research of Multiple Text Watermarks Technique in Electric Power System Texts

Research of Multiple Text Watermarks Technique in Electric Power System Texts Sensors & Transducers 203 by IFSA http://www.sensorsportal.com Research of Multple Text atermarks Technque n Electrc Power System Texts Xao-X XING, Qng CHEN, 2 Lan-X FU School of Optcal-Electrcal and Computer

More information

Comparison Study of Textural Descriptors for Training Neural Network Classifiers

Comparison Study of Textural Descriptors for Training Neural Network Classifiers Comparson Study of Textural Descrptors for Tranng Neural Network Classfers G.D. MAGOULAS (1) S.A. KARKANIS (1) D.A. KARRAS () and M.N. VRAHATIS (3) (1) Department of Informatcs Unversty of Athens GR-157.84

More information

Tsinghua University at TAC 2009: Summarizing Multi-documents by Information Distance

Tsinghua University at TAC 2009: Summarizing Multi-documents by Information Distance Tsnghua Unversty at TAC 2009: Summarzng Mult-documents by Informaton Dstance Chong Long, Mnle Huang, Xaoyan Zhu State Key Laboratory of Intellgent Technology and Systems, Tsnghua Natonal Laboratory for

More information

Palmprint Feature Extraction Using 2-D Gabor Filters

Palmprint Feature Extraction Using 2-D Gabor Filters Palmprnt Feature Extracton Usng 2-D Gabor Flters Wa Kn Kong Davd Zhang and Wenxn L Bometrcs Research Centre Department of Computng The Hong Kong Polytechnc Unversty Kowloon Hong Kong Correspondng author:

More information

High-Boost Mesh Filtering for 3-D Shape Enhancement

High-Boost Mesh Filtering for 3-D Shape Enhancement Hgh-Boost Mesh Flterng for 3-D Shape Enhancement Hrokazu Yagou Λ Alexander Belyaev y Damng We z Λ y z ; ; Shape Modelng Laboratory, Unversty of Azu, Azu-Wakamatsu 965-8580 Japan y Computer Graphcs Group,

More information

Shape Representation Robust to the Sketching Order Using Distance Map and Direction Histogram

Shape Representation Robust to the Sketching Order Using Distance Map and Direction Histogram Shape Representaton Robust to the Sketchng Order Usng Dstance Map and Drecton Hstogram Department of Computer Scence Yonse Unversty Kwon Yun CONTENTS Revew Topc Proposed Method System Overvew Sketch Normalzaton

More information

A Binarization Algorithm specialized on Document Images and Photos

A Binarization Algorithm specialized on Document Images and Photos A Bnarzaton Algorthm specalzed on Document mages and Photos Ergna Kavalleratou Dept. of nformaton and Communcaton Systems Engneerng Unversty of the Aegean kavalleratou@aegean.gr Abstract n ths paper, a

More information

Research Article Improved Encrypted-Signals-Based Reversible Data Hiding Using Code Division Multiplexing and Value Expansion

Research Article Improved Encrypted-Signals-Based Reversible Data Hiding Using Code Division Multiplexing and Value Expansion Securty and Communcaton Networks Volume 2018, Artcle ID 1326235, 9 pages https://do.org/10.1155/2018/1326235 Research Artcle Improved Encrypted-Sgnals-Based Reversble Data Hdng Usng Code Dvson Multplexng

More information

Corner-Based Image Alignment using Pyramid Structure with Gradient Vector Similarity

Corner-Based Image Alignment using Pyramid Structure with Gradient Vector Similarity Journal of Sgnal and Informaton Processng, 013, 4, 114-119 do:10.436/jsp.013.43b00 Publshed Onlne August 013 (http://www.scrp.org/journal/jsp) Corner-Based Image Algnment usng Pyramd Structure wth Gradent

More information

A Clustering Algorithm for Key Frame Extraction Based on Density Peak

A Clustering Algorithm for Key Frame Extraction Based on Density Peak Journal of Computer and Communcatons, 2018, 6, 118-128 http://www.scrp.org/ournal/cc ISSN Onlne: 2327-5227 ISSN Prnt: 2327-5219 A Clusterng Algorthm for Key Frame Extracton Based on Densty Peak Hong Zhao

More information

Palmprint Minutia Point Matching Algorithmand GPU Application

Palmprint Minutia Point Matching Algorithmand GPU Application Palmprnt Mnuta Pont Matchng Algorthmand GPU Applcaton 1 Beng Crmnal Scence Insttuton, Beng, 100054,Chna E-mal: wucs@sccas.cn Zhgang Lu 2 Publc Securty Bureau of Beng s Dongcheng, Beng, 100061, Chna Cagang

More information

Target Tracking Analysis Based on Corner Registration Zhengxi Kang 1, a, Hui Zhao 1, b, Yuanzhen Dang 1, c

Target Tracking Analysis Based on Corner Registration Zhengxi Kang 1, a, Hui Zhao 1, b, Yuanzhen Dang 1, c Advanced Materals Research Onlne: 03-09-8 ISSN: 66-8985, Vols. 760-76, pp 997-00 do:0.408/www.scentfc.net/amr.760-76.997 03 Trans Tech Publcatons, Swtzerland Target Trackng Analyss Based on Corner Regstraton

More information

The Codesign Challenge

The Codesign Challenge ECE 4530 Codesgn Challenge Fall 2007 Hardware/Software Codesgn The Codesgn Challenge Objectves In the codesgn challenge, your task s to accelerate a gven software reference mplementaton as fast as possble.

More information

Evaluation of the application of BIM technology based on PCA - Q Clustering Algorithm and Choquet Integral

Evaluation of the application of BIM technology based on PCA - Q Clustering Algorithm and Choquet Integral IETI Transactons on Busness and Management Scences, 2016, Volume 1, Issue 1, 47-55. http://www.et.net/tc An Internatonal Open Access Journal Evaluaton of the applcaton of BIM technology based on PCA -

More information

PERFORMANCE EVALUATION FOR SCENE MATCHING ALGORITHMS BY SVM

PERFORMANCE EVALUATION FOR SCENE MATCHING ALGORITHMS BY SVM PERFORMACE EVALUAIO FOR SCEE MACHIG ALGORIHMS BY SVM Zhaohu Yang a, b, *, Yngyng Chen a, Shaomng Zhang a a he Research Center of Remote Sensng and Geomatc, ongj Unversty, Shangha 200092, Chna - yzhac@63.com

More information

Positive Semi-definite Programming Localization in Wireless Sensor Networks

Positive Semi-definite Programming Localization in Wireless Sensor Networks Postve Sem-defnte Programmng Localzaton n Wreless Sensor etworks Shengdong Xe 1,, Jn Wang, Aqun Hu 1, Yunl Gu, Jang Xu, 1 School of Informaton Scence and Engneerng, Southeast Unversty, 10096, anjng Computer

More information

Geometrically Invariant Watermarking Scheme Based on Local Feature Points

Geometrically Invariant Watermarking Scheme Based on Local Feature Points JOURNAL OF MULTIMEDIA, VOL. 7, NO. 3, JUNE 0 3 Geometrcally Invarant Watermarkng Scheme Based on Local Feature Ponts L Jng School of Computer and Informaton Engneerng, Henan Unversty of Economcs and Law,

More information

Robust Shot Boundary Detection from Video Using Dynamic Texture

Robust Shot Boundary Detection from Video Using Dynamic Texture Sensors & Transducers 204 by IFSA Publshng, S. L. http://www.sensorsportal.com Robust Shot Boundary Detecton from Vdeo Usng Dynamc Teture, 3 Peng Tale, 2 Zhang Wenjun School of Communcaton & Informaton

More information

Image Matching Algorithm based on Feature-point and DAISY Descriptor

Image Matching Algorithm based on Feature-point and DAISY Descriptor JOURNAL OF MULTIMEDIA, VOL. 9, NO. 6, JUNE 2014 829 Image Matchng Algorthm based on Feature-pont and DAISY Descrptor L L School of Busness, Schuan Agrcultural Unversty, Schuan Dujanyan 611830, Chna Abstract

More information

DWT based Novel Image Denoising by Exploring Internal and External Correlation

DWT based Novel Image Denoising by Exploring Internal and External Correlation ISSN(Onlne): 319-8753 ISSN (Prnt): 347-6710 Internatonal Journal of Innovatve Research n Scence, Engneerng and Technology (An ISO 397: 007 Certfed Organzaton) DWT based Novel Image Denosng by Explorng

More information

3D Face Reconstruction With Local Feature Refinement

3D Face Reconstruction With Local Feature Refinement ternatonal Journal of Multmeda and Ubqutous Engneerng Vol.9, No.8 (014), pp.59-7 http://dx.do.org/10.1457/jmue.014.9.8.06 3D Face Reconstructon Wth Local Feature Refnement Rudy Adpranata 1, Kartka Gunad

More information

Contours Planning and Visual Servo Control of XXY Positioning System Using NURBS Interpolation Approach

Contours Planning and Visual Servo Control of XXY Positioning System Using NURBS Interpolation Approach Inventon Journal of Research Technology n Engneerng & Management (IJRTEM) ISSN: 2455-3689 www.jrtem.com olume 1 Issue 4 ǁ June. 2016 ǁ PP 16-23 Contours Plannng and sual Servo Control of XXY Postonng System

More information

DWT-BAT Based Medical Image Watermarking For Telemedicine Applications

DWT-BAT Based Medical Image Watermarking For Telemedicine Applications DWT-BAT Based Medcal Image Watermarkng For Telemedcne Applcatons 1 N.Venkatram, 2 L.S.S.Reddy, 3 P.V.V.Kshore, 1 K.L.Unversty, Dept of E.C.M, KL Unversty, Vaddeswaram, Green Felds, GUNTUR, AP, INDIA 2

More information

Edge Detection in Noisy Images Using the Support Vector Machines

Edge Detection in Noisy Images Using the Support Vector Machines Edge Detecton n Nosy Images Usng the Support Vector Machnes Hlaro Gómez-Moreno, Saturnno Maldonado-Bascón, Francsco López-Ferreras Sgnal Theory and Communcatons Department. Unversty of Alcalá Crta. Madrd-Barcelona

More information

A fast algorithm for color image segmentation

A fast algorithm for color image segmentation Unersty of Wollongong Research Onlne Faculty of Informatcs - Papers (Arche) Faculty of Engneerng and Informaton Scences 006 A fast algorthm for color mage segmentaton L. Dong Unersty of Wollongong, lju@uow.edu.au

More information

Robust Spread Spectrum Based Digital Video Watermarking Scheme in Frequency Domain Nisha Chaudhary 1 Savita Shivani 2

Robust Spread Spectrum Based Digital Video Watermarking Scheme in Frequency Domain Nisha Chaudhary 1 Savita Shivani 2 IJSRD Internatonal Journal for Scentfc Research & Development Vol. 2, Issue 6, 2 ISSN (onlne): 23263 Robust Spread Spectrum Based Dgtal Vdeo Watermarkng Scheme n Frequency Doman Nsha Chaudhary Savta Shvan

More information

AUTOMATIC RECOGNITION OF TRAFFIC SIGNS IN NATURAL SCENE IMAGE BASED ON CENTRAL PROJECTION TRANSFORMATION

AUTOMATIC RECOGNITION OF TRAFFIC SIGNS IN NATURAL SCENE IMAGE BASED ON CENTRAL PROJECTION TRANSFORMATION AUTOMATIC RECOGNITION OF TRAFFIC SIGNS IN NATURAL SCENE IMAGE BASED ON CENTRAL PROJECTION TRANSFORMATION Ka Zhang a, Yehua Sheng a, Pefang Wang b, Ln Luo c, Chun Ye a, Zhjun Gong d a Key Laboratory of

More information

3D Face Reconstruction With Local Feature Refinement. Abstract

3D Face Reconstruction With Local Feature Refinement. Abstract , pp.6-74 http://dx.do.org/0.457/jmue.04.9.8.06 3D Face Reconstructon Wth Local Feature Refnement Rudy Adpranata, Kartka Gunad and Wendy Gunawan 3, formatcs Department, Petra Chrstan Unversty, Surabaya,

More information

College of Information & Computer, Anhui Agricultural University, Hefei, Anhui, , China

College of Information & Computer, Anhui Agricultural University, Hefei, Anhui, , China 4th Internatonal Conference on Mechatroncs Materals Chemstry and Computer Engneerng (ICMMCCE 15) Improved retnex mage enhancement algorthm based on blateral flterng Ya nan Yang 1 a Zhaohu Jang 1 b * Chunhe

More information

Discrete Cosine Transform Optimization in Image Compression Based on Genetic Algorithm

Discrete Cosine Transform Optimization in Image Compression Based on Genetic Algorithm 015 8th Internatonal Congress on Image and Sgnal Processng (CISP 015) Dscrete Cosne Transform Optmzaton n Image Compresson Based on Genetc Algorthm LIU Yuan-yuan 1 CHE He-xn 1 College of Communcaton Engneerng,

More information

A high precision collaborative vision measurement of gear chamfering profile

A high precision collaborative vision measurement of gear chamfering profile Internatonal Conference on Advances n Mechancal Engneerng and Industral Informatcs (AMEII 05) A hgh precson collaboratve vson measurement of gear chamferng profle Conglng Zhou, a, Zengpu Xu, b, Chunmng

More information

A Multi-step Strategy for Shape Similarity Search In Kamon Image Database

A Multi-step Strategy for Shape Similarity Search In Kamon Image Database A Mult-step Strategy for Shape Smlarty Search In Kamon Image Database Paul W.H. Kwan, Kazuo Torach 2, Kesuke Kameyama 2, Junbn Gao 3, Nobuyuk Otsu 4 School of Mathematcs, Statstcs and Computer Scence,

More information

Vol. 5, No. 3 March 2014 ISSN Journal of Emerging Trends in Computing and Information Sciences CIS Journal. All rights reserved.

Vol. 5, No. 3 March 2014 ISSN Journal of Emerging Trends in Computing and Information Sciences CIS Journal. All rights reserved. Journal of Emergng Trends n Computng and Informaton Scences 009-03 CIS Journal. All rghts reserved. http://www.csjournal.org Unhealthy Detecton n Lvestock Texture Images usng Subsampled Contourlet Transform

More information

Related-Mode Attacks on CTR Encryption Mode

Related-Mode Attacks on CTR Encryption Mode Internatonal Journal of Network Securty, Vol.4, No.3, PP.282 287, May 2007 282 Related-Mode Attacks on CTR Encrypton Mode Dayn Wang, Dongda Ln, and Wenlng Wu (Correspondng author: Dayn Wang) Key Laboratory

More information

A Unified Framework for Semantics and Feature Based Relevance Feedback in Image Retrieval Systems

A Unified Framework for Semantics and Feature Based Relevance Feedback in Image Retrieval Systems A Unfed Framework for Semantcs and Feature Based Relevance Feedback n Image Retreval Systems Ye Lu *, Chunhu Hu 2, Xngquan Zhu 3*, HongJang Zhang 2, Qang Yang * School of Computng Scence Smon Fraser Unversty

More information

Article Reversible Dual-Image-Based Hiding Scheme Using Block Folding Technique

Article Reversible Dual-Image-Based Hiding Scheme Using Block Folding Technique Artcle Reversble Dual-Image-Based Hdng Scheme Usng Block Foldng Technque Tzu-Chuen Lu, * and Hu-Shh Leng Department of Informaton Management, Chaoyang Unversty of Technology, Tachung 4349, Tawan Department

More information

PCA Based Gait Segmentation

PCA Based Gait Segmentation Honggu L, Cupng Sh & Xngguo L PCA Based Gat Segmentaton PCA Based Gat Segmentaton Honggu L, Cupng Sh, and Xngguo L 2 Electronc Department, Physcs College, Yangzhou Unversty, 225002 Yangzhou, Chna 2 Department

More information

Contourlet-Based Image Fusion using Information Measures

Contourlet-Based Image Fusion using Information Measures Proceedngs of the 2nd WSEAS Internatonal Symposum on WAVELETS THEORY & APPLICATIONS n Appled Mathematcs, Sgnal Processng & Modern Scence (WAV '08), Istanbul, Turkey, May 2730, 2008 ContourletBased Image

More information

Vectorization of Image Outlines Using Rational Spline and Genetic Algorithm

Vectorization of Image Outlines Using Rational Spline and Genetic Algorithm 01 Internatonal Conference on Image, Vson and Computng (ICIVC 01) IPCSIT vol. 50 (01) (01) IACSIT Press, Sngapore DOI: 10.776/IPCSIT.01.V50.4 Vectorzaton of Image Outlnes Usng Ratonal Splne and Genetc

More information

Audio Content Classification Method Research Based on Two-step Strategy

Audio Content Classification Method Research Based on Two-step Strategy (IJACSA) Internatonal Journal of Advanced Computer Scence and Applcatons, Audo Content Classfcaton Method Research Based on Two-step Strategy Sume Lang Department of Computer Scence and Technology Chongqng

More information

REMOTE SENSING REQUIREMENTS DEVELOPMENT: A SIMULATION-BASED APPROACH

REMOTE SENSING REQUIREMENTS DEVELOPMENT: A SIMULATION-BASED APPROACH REMOTE SENSING REQUIREMENTS DEVEOPMENT: A SIMUATION-BASED APPROAC V. Zanon a, B. Davs a, R. Ryan b, G. Gasser c, S. Blonsk b a Earth Scence Applcatons Drectorate, Natonal Aeronautcs and Space Admnstraton,

More information

Learning the Kernel Parameters in Kernel Minimum Distance Classifier

Learning the Kernel Parameters in Kernel Minimum Distance Classifier Learnng the Kernel Parameters n Kernel Mnmum Dstance Classfer Daoqang Zhang 1,, Songcan Chen and Zh-Hua Zhou 1* 1 Natonal Laboratory for Novel Software Technology Nanjng Unversty, Nanjng 193, Chna Department

More information

MULTISPECTRAL IMAGES CLASSIFICATION BASED ON KLT AND ATR AUTOMATIC TARGET RECOGNITION

MULTISPECTRAL IMAGES CLASSIFICATION BASED ON KLT AND ATR AUTOMATIC TARGET RECOGNITION MULTISPECTRAL IMAGES CLASSIFICATION BASED ON KLT AND ATR AUTOMATIC TARGET RECOGNITION Paulo Quntlano 1 & Antono Santa-Rosa 1 Federal Polce Department, Brasla, Brazl. E-mals: quntlano.pqs@dpf.gov.br and

More information

An efficient method to build panoramic image mosaics

An efficient method to build panoramic image mosaics An effcent method to buld panoramc mage mosacs Pattern Recognton Letters vol. 4 003 Dae-Hyun Km Yong-In Yoon Jong-Soo Cho School of Electrcal Engneerng and Computer Scence Kyungpook Natonal Unv. Abstract

More information

A Super-resolution Algorithm Based on SURF and POCS for 3D Bionics PTZ

A Super-resolution Algorithm Based on SURF and POCS for 3D Bionics PTZ Sensors & Transducers 204 by IFSA Publshng, S. L. http://www.sensorsportal.com A Super-resoluton Algorthm Based on SURF and POCS for 3D Boncs PTZ Hengyu LI, Jqng CHEN, Shaorong XIE and Jun LUO School of

More information

R s s f. m y s. SPH3UW Unit 7.3 Spherical Concave Mirrors Page 1 of 12. Notes

R s s f. m y s. SPH3UW Unit 7.3 Spherical Concave Mirrors Page 1 of 12. Notes SPH3UW Unt 7.3 Sphercal Concave Mrrors Page 1 of 1 Notes Physcs Tool box Concave Mrror If the reflectng surface takes place on the nner surface of the sphercal shape so that the centre of the mrror bulges

More information

A DCVS Reconstruction Algorithm for Mine Video Monitoring Image Based on Block Classification

A DCVS Reconstruction Algorithm for Mine Video Monitoring Image Based on Block Classification 1 3 4 5 6 7 8 9 10 11 1 13 14 15 16 17 18 19 0 1 Artcle A DCVS Reconstructon Algorthm for Mne Vdeo Montorng Image Based on Block Classfcaton Xaohu Zhao 1,, Xueru Shen 1,, *, Kuan Wang 1, and Wanme L 1,

More information

Accurate Overlay Text Extraction for Digital Video Analysis

Accurate Overlay Text Extraction for Digital Video Analysis Accurate Overlay Text Extracton for Dgtal Vdeo Analyss Dongqng Zhang, and Shh-Fu Chang Electrcal Engneerng Department, Columba Unversty, New York, NY 10027. (Emal: dqzhang, sfchang@ee.columba.edu) Abstract

More information

A Novel Adaptive Descriptor Algorithm for Ternary Pattern Textures

A Novel Adaptive Descriptor Algorithm for Ternary Pattern Textures A Novel Adaptve Descrptor Algorthm for Ternary Pattern Textures Fahuan Hu 1,2, Guopng Lu 1 *, Zengwen Dong 1 1.School of Mechancal & Electrcal Engneerng, Nanchang Unversty, Nanchang, 330031, Chna; 2. School

More information

Distortion Function Designing for JPEG Steganography with Uncompressed Side-image

Distortion Function Designing for JPEG Steganography with Uncompressed Side-image Dstorton Functon Desgnng for JPEG Steganography wth Uncompressed Sde-mage Fangjun Huang School of Informaton Scence and Technology, Sun Yat-Sen Unversty, GD 56, Chna huangfj@mal.sysu.edu.cn Jwu Huang School

More information

Modular PCA Face Recognition Based on Weighted Average

Modular PCA Face Recognition Based on Weighted Average odern Appled Scence odular PCA Face Recognton Based on Weghted Average Chengmao Han (Correspondng author) Department of athematcs, Lny Normal Unversty Lny 76005, Chna E-mal: hanchengmao@163.com Abstract

More information

EYE CENTER LOCALIZATION ON A FACIAL IMAGE BASED ON MULTI-BLOCK LOCAL BINARY PATTERNS

EYE CENTER LOCALIZATION ON A FACIAL IMAGE BASED ON MULTI-BLOCK LOCAL BINARY PATTERNS P.G. Demdov Yaroslavl State Unversty Anatoly Ntn, Vladmr Khryashchev, Olga Stepanova, Igor Kostern EYE CENTER LOCALIZATION ON A FACIAL IMAGE BASED ON MULTI-BLOCK LOCAL BINARY PATTERNS Yaroslavl, 2015 Eye

More information