A Comparison between Digital Images Watermarking in Tow Different Color Spaces Using DWT2*
|
|
- Branden Horton
- 6 years ago
- Views:
Transcription
1 A Comparson between Dgtal s ng n Tow Dfferent Color Spaces Usng DWT* Mehd Khall Natonal Academy of Scence of Armena Yerevan, Armena e-mal: khall.mehd@yahoo.com ABSTRACT A novel dgtal watermarkng for ownershp verfcaton and mage authentcaton applcatons usng dscrete wavelet transform (DWT) s proposed n ths paper. Most prevous proposed watermarkng algorthms embed sequences of random numbers as watermarks. Here bnary mages are taken as watermark for embeddng. In the proposed approach, the host mage s converted nto the YCbCr color space and then ts Y channel decomposed nto wavelet coeffcents. The selected approxmaton coeffcents are quantzed and then ther four least sgnfcant bts of the quantzed coeffcents are replaced by the watermark usng LSB nserton technque. At last, the watermarked mage s syntheszed from the changed and unchanged DWT coeffcents. The experments show that the proposed approach provdes extra mperceptblty and robustness aganst wavelet compresson compared to the tradtonal embeddng methods n RGB color space. Moreover, the proposed approach has no need of the orgnal mage to extract watermarks. Keywords Dgtal watermarkng, dscrete wavelet transform, YCbCr color space, LSB nserton technque, mperceptblty, wavelet compresson. 1. INTRODUCTION Wth the rapd growth of Internet technologes and wde avalablty of multmeda computng facltes, the enforcement of multmeda copyrght protecton becomes an mportant ssue [1]. Dgtal meda, e.g., mages, audo, and vdeo, are readly manpulated, reproduced, and dstrbuted over nformaton networks. These effcences lead to problems regardng copyrght protecton. As a result, creators and dstrbutors of dgtal data are hestant to provde access to ther dgtal ntellectual property. Techncal solutons for copyrght protecton of multmeda data are actvely beng pursued [, 3]. ng, whch allows for the mperceptbly embeddng nformaton n an orgnal multmeda data, has wdely emerged for copyrght protecton and ownershp dentfcaton. All watermarkng methods must satsfy three mportant requrements: perceptual nvsblty, robustness aganst varous mages processng, such as compresson and geometrc dstortons (for example croppng), and fnally ablty of watermarkng detecton wthout ambguty [4]. In ths paper dgtal mage watermarkng for ownershp verfcaton and mage authentcaton applcatons s presented, where watermark s a bnary mage that embeds n Y channel of YCbCr color space. Current technques descrbed n the lterature for the watermarkng of mages can be grouped nto two classes: spatal doman technques [5, 6] whch embed the data by drectly modfyng the pxel values of the orgnal mage, and transform doman methods [7,8] whch embed the data by modulatng the transform doman coeffcents. A varety of watermarkng technques has been proposed n recent years. One of the earler watermarkng technques, whch used wavelet transform, was based on the addng pseudo random codes to the large coeffcents at the hgh and mddle frequency bands of the dscrete wavelet transform [9]. The fundamental advantage of our wavelet-based technque les n the method used to embed the watermark n four bts of lowest sgnfcant bts of Y channel DWT approxmaton coeffcents of YCbCr color space of host mage usng LSB nserton technque. Wth ths proposed algorthm, we can obtan relatvely hgh payload (almost 0%). Expermental results show the effcency of proposed technques among other technques of dgtal mages watermarkng n wavelet transform doman. Ths results shows that watermarkng n YCbCr color space aganst compresson attacks s more robust than watermarkng n RGB color space, and has hgher transparency n same payload.. WAVELET TRANSFORM OF IMAGES The wavelet transform has been extensvely studed n the last two decades. Here, we ntroduce the necessary concepts of the DWT for the purposes of ths paper. The dscrete wavelet transform (DWT) s dentcal to a herarchcal subband system, where the subbands are logarthmcally spaced n frequency [10]. For an nput sequence of length n, DWT wll generate an output sequence of length n. The 1-D DWT can be completed by the drect pyramd algorthm developed by Mallat [11]. For a -D mage, a wavelet Ψ and a scalng functon Φ are chosen such that the scalng functon ΦLL (x, y) of low-low subband n a -D wavelet transform can be wrtten as ΦLL(x,y) Φ(x)Φ(y). Three other -dmensonal wavelets can also be obtaned by usng the wavelet assocated functon Ψ(x) as follows [9, 1, and 13]: ΨLH(x, y) Φ(x) Ψ(y); horzontal ΨHL(x, y) Ψ(x) Φ(y); vertcal ΨHH(x, y) Ψ(x) Ψ(y); dagonal Where H s a hghpass flter and L s a lowpass flter. The basc dea for the DWT of a -D mage s as follows: An mage s frstly decomposed nto four parts of hgh, mddle, and low frequency (.e., LL1, HL1, LH1, HH1) subbands by cascadng the mage horzontally and vertcally wth crtcally subsampled flter banks. The subbands labeled HL1, LH1, and HH1 represent the fnest-scaled wavelet coeffcents. To obtan the coarser-scaled wavelet coeffcents, the subband LL1 s further decomposed and crtcally subsampled. Ths
2 process s repeatedly a number of arbtrary tmes whch s determned by the applcaton at hand. Fg 1 shows an orgnal mage and ts DWT decomposton. In ths fgure, mage s decomposed nto three levels wth ten subbands. Each level has varous band-nformaton such as low-low, low-hgh, hgh-low, and hgh-hgh frequency bands [9]. Note that n Fg 1, the lowest frequency subband s at the top left, and the hghest frequency subband s at the bottom rght. Furthermore, from DWT coeffcents, the orgnal mage can be reconstructed. Ths reconstructon process s called the nverse DWT (IDWT). If I [m, n] represent an mage, the DWT and IDWT for I [m, n] can be smlarly defned by mplementng the DWT and IDWT on each dmenson m and n separately [9]. hde vsually recognzable patterns n mages. The proposed approach s based on the dscrete wavelet transform (DWT). In the proposed approach, the host mage s converted nto YCbCr channels; the Y channel s then decomposed nto wavelet coeffcents. Then, we embed watermark n the approxmaton coeffcents of DWT of the host mage by modfyng four least sgnfcant bts. The block dagram of the proposed watermarkng approach s shown n Fg. Fg1. A real case of DWT decomposton. (a) The orgnal mage. (b) Its DWT decomposton. 3. YCbCr COLOR SPACE YCbCr color space s used for color mages cryptography. In ths color space, the Y denotes the lumnance component. It means that Y shows the brghtness (luma). Also both of Cb and Cr represent the chromnance actors. It means that Cb s blue color mnus luma (B_Y) and Cr s red color mnus luma (R_Y) [13]. The dfference between YCbCr color space and RGB color space s that YCbCr color space represents color as brghtness and two color dfference sgnals, whle RGB represents color as red, green and blue. Equatons 1 and show transformatons between RGB color space and YCbCr color space [14]. Y R Cb G Cr 18 B (1) R G B () Y Cb 18 Cr PROPOSED WATERMARKING TECHNIQUE The current study task of dgtal watermarkng s to make watermarks nvsble to human eyes as well as robust to varous attacks. The proposed watermarkng approach can Fg. Block dagrams of the proposed watermarkng approach. (a) Embeddng procedure. (b) Extractng procedure embeddng method The algorthm for embeddng watermark n LL3 coeffcents of the host mage Y channel s descrbed as follows: Step 1: Convert RGB channels of a host mage W nto YCbCr channels usng the CCIR 601 standard. Step : Decompose the Y channel nto a three-level wavelet pyramd structure wth ten DWT subbands, F(H). The coarsest subband LL3 s taken as the target subband for embeddng watermarks. Step 3: Save the sgns of selecton coeffcents n a matrx sgn. Step 4: Quantze absolute values of selecton coeffcents. Step 5: Embed watermark W1. For robustness, mperceptblty, and securty, the watermark W s embedded n four least sgnfcant bts that have smallest quantzaton error. Step 6: Effect matrx sgn nto the embedded coeffcents. Step 7: Reconvert YCbCr channels of a changed host mage nto RGB channels. Step 8: A watermarked mage W' s then generated by nverse DWT wth all changed and unchanged DWT coeffcents. Step 9: Save ndexes of changed selecton coeffcents, and ndex of the embedded subband as the authentcated key. 4.. extractng method The embedded watermark can be extracted usng the stored authentcated key after wavelet decomposton of the
3 watermarked mage. The extractng process s descrbed as follows: Step 1: The RGB channels of the watermarked mage are converted nto YCbCr channels. Step : Decompose the Y channel nto ten DWT subbands. Step 3: Re-fetch the stored authentcated key. Step 4: Quantze absolute values of LL3 subband. Step 5: Extract four least sgnfcant bts of re-fetched key. The proposed watermarkng approach yelds satsfactory results n watermark mperceptblty and robustness. The PSNRs of the watermarked mages produced by the proposed approach are all greater than 37.5 dbs, NCs between orgnal watermark mages and extracted watermark mages are all equal 1, and correlatons between host mages and watermarked mages are all greater than 0.999, whch are perceptually mperceptble as shown n Fg EXPERIMENTAL RESULTS The proposed perceptual watermarkng framework was mplemented for evaluatng both propertes of mperceptblty and robustness n a hgh payload. Three mages: Lena, Peppers and Arm, shown n Fg 3(a-c) were taken as the host mages to embed a bnary watermark mage, shown n Fg 3(d). For the entre test results n ths paper, MATLAB R007a software s used. Also for computng the wavelet transforms, 9-7 borthogonal splne (Bsplne) wavelet flter are used. Cause of use of B-splne functon wavelet s that, B-splne functons, do not have compact support, but are orthogonal and have better smoothness propertes than other wavelet functons [15]. After watermark embeddng, we calculate the percentage of the payload as follows: % Payload W W 100 (3) Fg3. The host mages for watermarkng. (a-c) Lena, Peppers, and Arm. (d) mage In our scheme, we can obtan a payload, equal to %0. We also measure the smlarty of orgnal host mage and watermarked mages by the standard correlaton coeffcent (Corr) as [9]: ( x x )( y y ) ( x x ) ( y x ) (4) Correlato Moreover, the peak sgnal-to-nose rato (PSNR) was used to evaluate the qualty of the watermarked mage. The PSNR s defned as [9, 16]: 55 PSNR 10 log10 ( db) (5) MSE Where mean-square error (MSE) s defned as: 1 m n ( mn 1 1 h, and { } MSE h, h, ) (6) Where{ } h, are the gray levels of pxels n the host and watermarked mages, respectvely. The larger PSNR s, the better the mage qualty s. In general, a watermarked mage s acceptable by human percepton f ts PSNR s greater than 30 dbs. In other words, the correlaton s used for evaluatng the robustness of watermarkng technque and the PSNR s used for evaluatng the transparency of watermarkng technque [9]. We also used the normalzed correlaton (NC) coeffcent to measure the smlarty between orgnal watermarks W and the extracted watermarks W' that s defned as [17]: Fg4. The watermarked mages by the proposed approach Table 1 shows the extractng results and the watermarked mages usng the proposed method wthout any attacks. As t s vsble the watermarked results are excellent. Table 1. Obtaned results of watermark extractng PSNR Corr NC Error (db) Bts Lena Peppers Arm Robustness Examnatons After able to acheve the desred fdelty, watermarks robustness and ther watermarked mages detectablty evaluate under compresson and croppng attacks. w * w, NC w (7) Robustness to Compresson Attacks We here examne the watermark robustness wth wavelet compresson. We compress the watermarked mages wth dfferent compresson thresholds usng wavelet compresson.
4 Then, we extract the watermark from the compressed watermarked mages. The compresson results are llustrated n Table. From the table, we can fnd that proposed method yelds satsfactory mperceptble watermarked mages. All PSNRs are greater than 37 db, and all NC are greater than 0.83 under dfferent compresson thresholds of equal or less than 6. Table. Obtaned results of wavelet compresson attacks wth dfferent compresson thresholds Threshold 1.0 PSNR (db) NC Error Bts Threshold 3.0 PSNR (db) NC Error Bts Threshold 6.0 PSNR (db) NC Error Bts Furthermore, computng complcaton n YCbCr color space s greater than n RGB color space, too. Table 3. Obtaned results of croppng attacks Area 1 NC Error Bts Area NC Error Bts Table 4. Obtaned results of watermark extractng n RGB color space PSNR (db) Corr NC Error Bts Lena Peppers Robustness to Croppng Attacks In ths examnaton, we crop two dfferent areas of the watermarked mages and then, from the cropped mages, we extract the watermark mage. The results of the extracted watermarks are shown n Table 3. In ths table the cropped areas of watermarked maged and ther extracted watermarks are shown, too. As t s obvous, NCs are stll greater than WATERMARKING PROCESS IN RGB COLOR SPACE To consderaton of proposed technque effcency, we here perform watermarkng process n RGB color space by the same method. Then we compare the obtaned results of watermark extractng and robustness examnatons shown n tables 4, 5, 6, wth the prevous obtaned results. From the table 4, t can shown that transparency of watermarkng technque n YCbCr color space s better than n RGB color space, because of ts PSNRs. Also tables 5 and 6 show that, robustness to compresson attacks, n YCbCr color space s obvously greater than n RGB color space. In spte of these advantages, robustness to croppng attacks, n YCbCr color space s less than n RGB color space. Arm CONCLUSION We have proposed a watermarkng framework for embeddng vsually recognzable bnary watermark n color mages, whch can resst mage-processng attacks, especally the wavelet compresson attacks. In most DWT-based watermarkng frameworks, watermarks are often n the form of random-number sequences or gray-level mages. In ths paper, we proposed an mage accredtaton technque by embeddng bnary mage watermark nto color mages. In the proposed approach, a host mage was converted nto YCbCr color space usng the CCIR 601 standard, and then, the Y channel was decomposed nto wavelet coeffcents. Then, the watermark was embedded nto the four least sgnfcant bts of host coeffcents n the approxmaton coeffcents subband, usng LSB nserton technque. The expermental results show that the proposed method provdes extra mperceptblty and robustness of watermarkng aganst wavelet compresson attacks compared to the tradtonal methods n RGB color space. Moreover, the proposed approach has no need of the orgnal host mage to extract watermarks.
5 Table 5. Obtaned results of wavelet compresson attacks wth dfferent compresson thresholds n RGB color space Threshold 1.0 PSNR (db) NC Error Bts Threshold 3.0 PSNR (db) NC Error Bts Threshold 6.0 PSNR (db) NC Error Bts Table 6. Obtaned results of croppng attacks n RGB color space Area 1 NC Error Bts Area art overvew, IEEE Sgnal Processng Magazne, 17(9), pp. 0-46, 000. [3] P. Samulelson, Legally speakng, Dgtal meda and the law, Commune, ACM, 34(10), pp. 3-8, [4] V.V. Hernández Guzmán, M. N.Myatake, H.M. Pérez Meana, Analyss of a Wavelet-based ng Algorthm, IEEE, Proceedngs of the 14th Internatonal Conference on Electroncs, Communcatons and Computers (CONIELECOMP 04), 004. [5] R. G. van Schyndel, A. Z. Trkel, and C. F. Osborne, A dgtal watermark, In Proc. Int. Conference n Processng, vol., pp , [6] A. G. Bors and I. Ptas, watermarkng usng DCT doman constrants, In Proc, IEEE Int, Conference on Processng, vol. 3, pp , [7] J. Ohnsh and K. Matsu Embeddng a seal nto a pcture under orthogonal wavelet transform, In Proc, Int. Conference on Multmeda Computng and Systems, pp , June [8] Reza Safabakhsh, Shva Zabol and Arash Tabbazar, Dgtal ng on Stll s Usng Wavelet Transform, In IEEE Conf, Codng and Computng (ITCC 04), August 004. [9] X.G. Xa, C. G. Boncelet and G. R. Arce, Wavelet transform based watermark for dgtal mages, Optcs Express, pp , Dec [10] Mng-Shng Hseh, Wavelet-based ng and Compresson, Ph-D Thess, Insttute of Computer Scence and Informaton Engneerng Natonal Central Unversty, Tawan, Dec [11] S. Mallat, Multfrequency channel decomposton of mages and wavelets models, IEEE Trans. Acoustcs Speech and Sgnal Processng, vol. 37, no. 1, pp , Dec [1] Shh-Chung B. Lo, Hua L and Matthew T. Freedman, Optmzaton of Wavelet Decomposton for Compresson and Feature Preservaton, IEEE Transactons on Medcal Imagng, Vol., NO. 9, pp , September 003. [13] Manesh Kokare, P. K. Bswas and B. N. Chatter Texture Retreval Usng New Rotated Complex Wavelet Flters, IEEE Transactons on Systems, Vol. 35, No. 6, pp , December 005. [14] Douglas Cha Abdesselam Bouzerdoum, A Bayesan Approach to Skn Classfcaton n YCbCr Color Space. [15] Ingnemar Cox, Jeffrey Bloom and Matthew Mller, Dgtal ng: Prncple & Practce, Morgan Kaufnann Publshers, 1st edton, 001. [16] Martn Zlomek, Vdeo ng, M.S. Thess, Faculty of Mathematcs and Physcs, Charles Unversty n Prague, Aprl 007. [17] Jong Jn Chane, Robust Technques for Hdng Data n s and Vdeo, Ph.D Thess, Santa Barbara, Unversty of Calforna, June 000 NC Error Bts REFERENCES [1] H.M. Wang, P. Su and C.C. J. Kuo, Wavelet-based dgtal mage watermarkng, Dgtal Processng, Optcs Express 49, Vol. 3, No. 1, 7 December [] G. C. Langelaar, I. Setyawan, and R. L. Lagendk, ng dgtal mage and vdeo data, a state of the
Hybrid Non-Blind Color Image Watermarking
Hybrd Non-Blnd Color Image Watermarkng Ms C.N.Sujatha 1, Dr. P. Satyanarayana 2 1 Assocate Professor, Dept. of ECE, SNIST, Yamnampet, Ghatkesar Hyderabad-501301, Telangana 2 Professor, Dept. of ECE, AITS,
More informationA Hybrid Semi-Blind Gray Scale Image Watermarking Algorithm Based on DWT-SVD using Human Visual System Model
A Hybrd Sem-Blnd Gray Scale Image Watermarkng Algorthm Based on DWT-SVD usng Human Vsual System Model Rajesh Mehta r Scence & Engneerng, USICT Guru Gobnd Sngh Indrarprastha Unversty New Delh, Inda rajesh00ust@gmal.com
More informationRobust Watermarking for Text Images Based on Arnold Scrambling and DWT-DCT
Internatonal Conference on Mechatroncs Electronc Industral and Control Engneerng (MEIC 015) Robust Watermarkng for Text Images Based on Arnold Scramblng and DWT-DCT Fan Wu College of Informaton Scence
More informationKey-Selective Patchwork Method for Audio Watermarking
Internatonal Journal of Dgtal Content Technology and ts Applcatons Volume 4, Number 4, July 2010 Key-Selectve Patchwork Method for Audo Watermarkng 1 Ch-Man Pun, 2 Jng-Jng Jang 1, Frst and Correspondng
More informationContent Based Image Retrieval Using 2-D Discrete Wavelet with Texture Feature with Different Classifiers
IOSR Journal of Electroncs and Communcaton Engneerng (IOSR-JECE) e-issn: 78-834,p- ISSN: 78-8735.Volume 9, Issue, Ver. IV (Mar - Apr. 04), PP 0-07 Content Based Image Retreval Usng -D Dscrete Wavelet wth
More informationDigital Video Watermarking using Discrete Wavelet Transform and Principal Component Analysis
Internatonal Journal of Wsdom Based Computng, Vol. 1 (2), August 2011 7 Dgtal Vdeo Watermarkng usng Dscrete Wavelet Transform and Prncpal Component Analyss Sanjana Snha, Prajnat Bardhan, Swarnal Pramanck,
More informationEnhanced Watermarking Technique for Color Images using Visual Cryptography
Informaton Assurance and Securty Letters 1 (2010) 024-028 Enhanced Watermarkng Technque for Color Images usng Vsual Cryptography Enas F. Al rawashdeh 1, Rawan I.Zaghloul 2 1 Balqa Appled Unversty, MIS
More informationSemi-Fragile Watermarking Scheme for Authentication of JPEG Images
Tamkang Journal of Scence and Engneerng, Vol. 10, No 1, pp. 5766 (2007) 57 Sem-Fragle Watermarkng Scheme for Authentcaton of JPEG Images Chh-Hung n 1 *, Tung-Shh Su 2 and Wen-Shyong Hseh 2,3 1 Department
More informationShape-adaptive DCT and Its Application in Region-based Image Coding
Internatonal Journal of Sgnal Processng, Image Processng and Pattern Recognton, pp.99-108 http://dx.do.org/10.14257/sp.2014.7.1.10 Shape-adaptve DCT and Its Applcaton n Regon-based Image Codng Yamn Zheng,
More informationRobust Video Watermarking Using Image Normalization, Motion Vector and Perceptual Information
Robust Vdeo Watermarkng Usng Image ormalzaton, Moton Vector and Perceptual Informaton Cedllo-Hernández Antono 1, Cedllo-Hernández Manuel 1, akano-myatake Marko 1, García-Vázquez Mreya S. 2 1 Postgraduate
More informationA Fast Content-Based Multimedia Retrieval Technique Using Compressed Data
A Fast Content-Based Multmeda Retreval Technque Usng Compressed Data Borko Furht and Pornvt Saksobhavvat NSF Multmeda Laboratory Florda Atlantc Unversty, Boca Raton, Florda 3343 ABSTRACT In ths paper,
More informationImprovement of Spatial Resolution Using BlockMatching Based Motion Estimation and Frame. Integration
Improvement of Spatal Resoluton Usng BlockMatchng Based Moton Estmaton and Frame Integraton Danya Suga and Takayuk Hamamoto Graduate School of Engneerng, Tokyo Unversty of Scence, 6-3-1, Nuku, Katsuska-ku,
More informationAn Image Compression Algorithm based on Wavelet Transform and LZW
An Image Compresson Algorthm based on Wavelet Transform and LZW Png Luo a, Janyong Yu b School of Chongqng Unversty of Posts and Telecommuncatons, Chongqng, 400065, Chna Abstract a cylpng@63.com, b y27769864@sna.cn
More informationInformation Hiding Watermarking Detection Technique by PSNR and RGB Intensity
www..org 3 Informaton Hdng Watermarkng Detecton Technque by PSNR and RGB Intensty 1 Neha Chauhan, Akhlesh A. Waoo, 3 P. S. Patheja 1 Research Scholar, BIST, Bhopal, Inda.,3 Assstant Professor, BIST, Bhopal,
More informationRobust Blind Video Watermark Algorithm in Transform Domain Combining with 3D Video Correlation
JOURNAL OF MULTIMEDIA, VOL. 8, NO. 2, APRIL 2013 161 Robust Blnd Vdeo Watermark Algorthm n Transform Doman Combnng wth 3D Vdeo Correlaton DING Ha-yang 1,3 1. Informaton Securty Center, Bejng Unversty of
More informationData Hiding and Image Authentication for Color-Palette Images
Data Hdng and Image Authentcaton for Color-Palette Images Chh-Yang Yn ( 殷志揚 ) and Wen-Hsang Tsa ( 蔡文祥 ) Department of Computer & Informaton Scence Natonal Chao Tung Unversty 00 Ta Hsueh Rd., Hsnchu, Tawan
More informationA Fast Visual Tracking Algorithm Based on Circle Pixels Matching
A Fast Vsual Trackng Algorthm Based on Crcle Pxels Matchng Zhqang Hou hou_zhq@sohu.com Chongzhao Han czhan@mal.xjtu.edu.cn Ln Zheng Abstract: A fast vsual trackng algorthm based on crcle pxels matchng
More informationEnhanced AMBTC for Image Compression using Block Classification and Interpolation
Internatonal Journal of Computer Applcatons (0975 8887) Volume 5 No.0, August 0 Enhanced AMBTC for Image Compresson usng Block Classfcaton and Interpolaton S. Vmala Dept. of Comp. Scence Mother Teresa
More informationSteganography System using Slantlet Transform
ISSN:43-6999 Journal of Inmaton Communcaton and Intellgence Systems (JICIS) Volume Issue February 06 Steganography System usng Slantlet Transm Ryadh Bassl Abduljabbar Abstract An approach hdng nmaton has
More informationKEYWORDS: Digital Image Watermarking, Discrete Wavelet Transform, General Regression Neural Network, Human Visual System. 1.
An Adaptve Dgtal Image Watermarkng Based on Image Features n Dscrete Wavelet Transform Doman and General Regresson Neural Network Ayoub Taher Group of IT Engneerng, Payam Noor Unversty, Broujen, Iran ABSTRACT:
More informationUsing Counter-propagation Neural Network for Digital Audio Watermarking
Usng Counter-propagaton Neural Network for Dgtal Audo Watermarkng Chuan-Yu Chang and Wen-Chh Shen Graduate School of Computer Scence and Informaton Engneerng Natonal Yunln Unversty of Scence & Technology
More informationIdentify the Attack in Embedded Image with Steganalysis Detection Method by PSNR and RGB Intensity
Internatonal Journal of Computer Systems (ISSN: 394-1065), Volume 03 Issue 07, July, 016 Avalable at http://www.jcsonlne.com/ Identfy the Attack n Embedded Image wth Steganalyss Detecton Method by PSNR
More informationA Robust Webpage Information Hiding Method Based on the Slash of Tag
Advanced Engneerng Forum Onlne: 2012-09-26 ISSN: 2234-991X, Vols. 6-7, pp 361-366 do:10.4028/www.scentfc.net/aef.6-7.361 2012 Trans Tech Publcatons, Swtzerland A Robust Webpage Informaton Hdng Method Based
More informationIMPLEMENTATION OF QIM BASED AUDIO WATERMARKING USING HYBRID TRANSFORM OF SWT-DCT-SVD METHODS OPTIMIZED WITH GENETIC ALORITHM
IMPLEMENTATION OF QIM BASED AUDIO WATERMARKING USING HYBRID TRANSFORM OF SWT-DCT-SVD METHODS OPTIMIZED WITH GENETIC ALORITHM Ryan Amnullah 1, Gelar Budman 2, Irma Saftr 3 1, 2, 3 FakultasTeknk Elektro,
More informationAn Image Fusion Approach Based on Segmentation Region
Rong Wang, L-Qun Gao, Shu Yang, Yu-Hua Cha, and Yan-Chun Lu An Image Fuson Approach Based On Segmentaton Regon An Image Fuson Approach Based on Segmentaton Regon Rong Wang, L-Qun Gao, Shu Yang 3, Yu-Hua
More informationAdaptive digital watermarking of images using Genetic Algorithm
Adaptve dgtal watermarkng of mages usng Genetc Algorthm Bushra Skander, Muhammad Ishtaq, M. Arfan Jaffar, Muhammad Tarq, Anwar M. Mrza Department of Computer Scence, Natonal Unversty of Computer and Emergng
More informationA NEW AUDIO WATERMARKING METHOD BASED
A NEW AUDIO WATERMARKING METHOD BASED ON DISCRETE COSINE TRANSFORM WITH A GRAY IMAGE Mohammad Ibrahm Khan 1, Md. Iqbal Hasan Sarker 2, Kaushk Deb 3 and Md. Hasan Furhad 4 1,2,3 Department of Computer Scence
More informationResearch of Multiple Text Watermarks Technique in Electric Power System Texts
Sensors & Transducers 203 by IFSA http://www.sensorsportal.com Research of Multple Text atermarks Technque n Electrc Power System Texts Xao-X XING, Qng CHEN, 2 Lan-X FU School of Optcal-Electrcal and Computer
More informationA Hybrid Digital Image Watermarking based on Discrete Wavelet Transform, Discrete Cosine Transform, and General Regression Neural Network
A Hybrd Dgtal Image Watermarkng based on Dscrete Wavelet Transform, Dscrete Cosne Transform, and General Regresson Neural Network Ayoub Taher ; ABSTRACT In ths paper, a new hybrd dgtal watermarkng technque
More informationA Lossless Watermarking Scheme for Halftone Image Authentication
IJCSNS Internatonal Journal of Computer Scence and Network Securty, VOL.6 No.2B, February 2006 147 A Lossless Watermarkng Scheme for Halftone Image Authentcaton Jeng-Shyang Pan, Hao Luo, and Zhe-Mng Lu,
More informationA NOVEL SECURE, IMPERCEPTIBLE AND ROBUST CDMA DIGITAL IMAGE WATERMARKING IN JPEG-YCBCR CHANNEL USING DWT2
International Journal of Enterprise Computing and Business Systems ISSN (Online : 2230-8849 http://www.ijecbs.com Vol. 1 Issue 2 July 2011 A NOVEL SECURE, IMPERCEPTIBLE AND ROBUST CDMA DIGITAL IMAGE WATERMARKING
More informationFace Recognition University at Buffalo CSE666 Lecture Slides Resources:
Face Recognton Unversty at Buffalo CSE666 Lecture Sldes Resources: http://www.face-rec.org/algorthms/ Overvew of face recognton algorthms Correlaton - Pxel based correspondence between two face mages Structural
More informationHigh Payload Reversible Data Hiding Scheme Using Difference Segmentation and Histogram Shifting
JOURNAL OF ELECTRONIC SCIENCE AND TECHNOLOGY, VOL. 11, NO. 1, MARCH 2013 9 Hgh Payload Reversble Data Hdng Scheme Usng Dfference Segmentaton and Hstogram Shftng Yung-Chen Chou and Huang-Chng L Abstract
More informationShape Representation Robust to the Sketching Order Using Distance Map and Direction Histogram
Shape Representaton Robust to the Sketchng Order Usng Dstance Map and Drecton Hstogram Department of Computer Scence Yonse Unversty Kwon Yun CONTENTS Revew Topc Proposed Method System Overvew Sketch Normalzaton
More informationIAJIT First Online Publication
Content Protecton n Vdeo Data Based on Robust Dgtal Watermarkng Resstant to Intentonal and Unntentonal Attacks Mad Masoum and Shervn Amr Department of Electrcal Engneerng, Islamc Azad Unversty Qazvn Branch,
More informationNovel Pattern-based Fingerprint Recognition Technique Using 2D Wavelet Decomposition
Mathematcal Methods for Informaton Scence and Economcs Novel Pattern-based Fngerprnt Recognton Technque Usng D Wavelet Decomposton TUDOR BARBU Insttute of Computer Scence of the Romanan Academy T. Codrescu,,
More informationA Secured Method for Image Steganography Based On Pixel Values
A Secured Method for Image Steganography Based On Pxel Values Tarun Gulat #, Sanskrt Gupta * # Assocate Professor, Electroncs and Communcaton Engneerng Department, MMEC, M.M.U., Mullana, Ambala, Haryana,
More informationMULTISPECTRAL IMAGES CLASSIFICATION BASED ON KLT AND ATR AUTOMATIC TARGET RECOGNITION
MULTISPECTRAL IMAGES CLASSIFICATION BASED ON KLT AND ATR AUTOMATIC TARGET RECOGNITION Paulo Quntlano 1 & Antono Santa-Rosa 1 Federal Polce Department, Brasla, Brazl. E-mals: quntlano.pqs@dpf.gov.br and
More informationGrading Image Retrieval Based on DCT and DWT Compressed Domains Using Low-Level Features
Journal of Communcatons Vol. 0 No. January 0 Gradng Image Retreval Based on DCT and DWT Compressed Domans Usng Low-Level Features Chengyou Wang Xnyue Zhang Rongyang Shan and Xao Zhou School of echancal
More informationA Clustering Algorithm for Key Frame Extraction Based on Density Peak
Journal of Computer and Communcatons, 2018, 6, 118-128 http://www.scrp.org/ournal/cc ISSN Onlne: 2327-5227 ISSN Prnt: 2327-5219 A Clusterng Algorthm for Key Frame Extracton Based on Densty Peak Hong Zhao
More informationTsinghua University at TAC 2009: Summarizing Multi-documents by Information Distance
Tsnghua Unversty at TAC 2009: Summarzng Mult-documents by Informaton Dstance Chong Long, Mnle Huang, Xaoyan Zhu State Key Laboratory of Intellgent Technology and Systems, Tsnghua Natonal Laboratory for
More informationParallelism for Nested Loops with Non-uniform and Flow Dependences
Parallelsm for Nested Loops wth Non-unform and Flow Dependences Sam-Jn Jeong Dept. of Informaton & Communcaton Engneerng, Cheonan Unversty, 5, Anseo-dong, Cheonan, Chungnam, 330-80, Korea. seong@cheonan.ac.kr
More informationAn efficient method to build panoramic image mosaics
An effcent method to buld panoramc mage mosacs Pattern Recognton Letters vol. 4 003 Dae-Hyun Km Yong-In Yoon Jong-Soo Cho School of Electrcal Engneerng and Computer Scence Kyungpook Natonal Unv. Abstract
More informationPerformance Analysis of Data Hiding in MPEG-4 AAC Audio *
TSINGHUA SCIENCE AND TECHNOLOGY ISSNll1007-0214ll07/21llpp55-61 Volume 14, Number 1, February 2009 Performance Analyss of Data Hdng n MPEG-4 AAC Audo * XU Shuzheng ( ) **, ZHANG Peng ( ), WANG Pengjun
More informationAlgorithm for Human Skin Detection Using Fuzzy Logic
Algorthm for Human Skn Detecton Usng Fuzzy Logc Mrtunjay Ra, R. K. Yadav, Gaurav Snha Department of Electroncs & Communcaton Engneerng JRE Group of Insttutons, Greater Noda, Inda er.mrtunjayra@gmal.com
More informationA Binarization Algorithm specialized on Document Images and Photos
A Bnarzaton Algorthm specalzed on Document mages and Photos Ergna Kavalleratou Dept. of nformaton and Communcaton Systems Engneerng Unversty of the Aegean kavalleratou@aegean.gr Abstract n ths paper, a
More informationImage Representation & Visualization Basic Imaging Algorithms Shape Representation and Analysis. outline
mage Vsualzaton mage Vsualzaton mage Representaton & Vsualzaton Basc magng Algorthms Shape Representaton and Analyss outlne mage Representaton & Vsualzaton Basc magng Algorthms Shape Representaton and
More informationDiscrete Cosine Transform Optimization in Image Compression Based on Genetic Algorithm
015 8th Internatonal Congress on Image and Sgnal Processng (CISP 015) Dscrete Cosne Transform Optmzaton n Image Compresson Based on Genetc Algorthm LIU Yuan-yuan 1 CHE He-xn 1 College of Communcaton Engneerng,
More informationCLASSIFICATION OF ULTRASONIC SIGNALS
The 8 th Internatonal Conference of the Slovenan Socety for Non-Destructve Testng»Applcaton of Contemporary Non-Destructve Testng n Engneerng«September -3, 5, Portorož, Slovena, pp. 7-33 CLASSIFICATION
More informationUsing Fuzzy Logic to Enhance the Large Size Remote Sensing Images
Internatonal Journal of Informaton and Electroncs Engneerng Vol. 5 No. 6 November 015 Usng Fuzzy Logc to Enhance the Large Sze Remote Sensng Images Trung Nguyen Tu Huy Ngo Hoang and Thoa Vu Van Abstract
More informationDeep learning is a good steganalysis tool when embedding key is reused for different images, even if there is a cover source-mismatch
Deep learnng s a good steganalyss tool when embeddng key s reused for dfferent mages, even f there s a cover source-msmatch Lonel PIBRE 2,3, Jérôme PASQUET 2,3, Dno IENCO 2,3, Marc CHAUMONT 1,2,3 (1) Unversty
More informationVideo Watermarking Algorithm Based on Relative Relationship of DCT Coefficients
756 JOURAL OF COPUTERS, VOL. 8, O., OVEBER 03 Vdeo Watermarkng Algorthm Based on Relatve Relatonshp of DCT Coeffcents Cheng ngzh, Du Yanpng, Wang Yan Bejng Insttute of Graphc Communcaton, Bejng, Chna Emal:
More informationFEATURE EXTRACTION. Dr. K.Vijayarekha. Associate Dean School of Electrical and Electronics Engineering SASTRA University, Thanjavur
FEATURE EXTRACTION Dr. K.Vjayarekha Assocate Dean School of Electrcal and Electroncs Engneerng SASTRA Unversty, Thanjavur613 41 Jont Intatve of IITs and IISc Funded by MHRD Page 1 of 8 Table of Contents
More informationResearch and Application of Fingerprint Recognition Based on MATLAB
Send Orders for Reprnts to reprnts@benthamscence.ae The Open Automaton and Control Systems Journal, 205, 7, 07-07 Open Access Research and Applcaton of Fngerprnt Recognton Based on MATLAB Nng Lu* Department
More informationEfficient Video Coding with R-D Constrained Quadtree Segmentation
Publshed on Pcture Codng Symposum 1999, March 1999 Effcent Vdeo Codng wth R-D Constraned Quadtree Segmentaton Cha-Wen Ln Computer and Communcaton Research Labs Industral Technology Research Insttute Hsnchu,
More informationCluster Analysis of Electrical Behavior
Journal of Computer and Communcatons, 205, 3, 88-93 Publshed Onlne May 205 n ScRes. http://www.scrp.org/ournal/cc http://dx.do.org/0.4236/cc.205.350 Cluster Analyss of Electrcal Behavor Ln Lu Ln Lu, School
More informationCodebook Generation for Vector Quantization using Interpolations to Compress Gray Scale Images
Internatonal Journal of Computer Applcatons (097 8887) Volume No.9, March 0 Codebook Generaton for Vector Quantzaton usng Interpolatons to Compress Gray Scale Images S.Vmala Dept. of Comp. Sc. Mother Teresa
More informationA WAVELET CODEC FOR INTERLACED VIDEO
A WAVELET CODEC FOR INTERLACED VIDEO L.M. Me, H.R. Wu and D.M. Tan School of Electrcal and Computer Engneerng, RMIT Unversty, Vctora 3000, Australa Tel: +61-3-9925 5376 Fax: +61-3-9925 2007 E-mal: henry.wu@rmt.edu.au
More informationAn Optimal Algorithm for Prufer Codes *
J. Software Engneerng & Applcatons, 2009, 2: 111-115 do:10.4236/jsea.2009.22016 Publshed Onlne July 2009 (www.scrp.org/journal/jsea) An Optmal Algorthm for Prufer Codes * Xaodong Wang 1, 2, Le Wang 3,
More informationArticle Reversible Dual-Image-Based Hiding Scheme Using Block Folding Technique
Artcle Reversble Dual-Image-Based Hdng Scheme Usng Block Foldng Technque Tzu-Chuen Lu, * and Hu-Shh Leng Department of Informaton Management, Chaoyang Unversty of Technology, Tachung 4349, Tawan Department
More informationVideo Content Representation using Optimal Extraction of Frames and Scenes
Vdeo Content Representaton usng Optmal Etracton of rames and Scenes Nkolaos D. Doulam Anastasos D. Doulam Yanns S. Avrths and Stefanos D. ollas Natonal Techncal Unversty of Athens Department of Electrcal
More informationLearning the Kernel Parameters in Kernel Minimum Distance Classifier
Learnng the Kernel Parameters n Kernel Mnmum Dstance Classfer Daoqang Zhang 1,, Songcan Chen and Zh-Hua Zhou 1* 1 Natonal Laboratory for Novel Software Technology Nanjng Unversty, Nanjng 193, Chna Department
More informationResearch Article Hamming Code Based Watermarking Scheme for 3D Model Verification
Mathematcal Problems n Engneerng, Artcle ID 241093, 7 pages http://dx.do.org/10.1155/2014/241093 Research Artcle Hammng Code Based Watermarkng Scheme for 3D Model Verfcaton Jen-Tse Wang, 1 Y-Chng Chang,
More informationBrushlet Features for Texture Image Retrieval
DICTA00: Dgtal Image Computng Technques and Applcatons, 1 January 00, Melbourne, Australa 1 Brushlet Features for Texture Image Retreval Chbao Chen and Kap Luk Chan Informaton System Research Lab, School
More informationCHAPTER 3 ENCODING VIDEO SEQUENCES IN FRACTAL BASED COMPRESSION. Day by day, the demands for higher and faster technologies are rapidly
65 CHAPTER 3 ENCODING VIDEO SEQUENCES IN FRACTAL BASED COMPRESSION 3.1 Introducton Day by day, the demands for hgher and faster technologes are rapdly ncreasng. Although the technologes avalable now are
More informationParallel Inverse Halftoning by Look-Up Table (LUT) Partitioning
Parallel Inverse Halftonng by Look-Up Table (LUT) Parttonng Umar F. Sddq and Sadq M. Sat umar@ccse.kfupm.edu.sa, sadq@kfupm.edu.sa KFUPM Box: Department of Computer Engneerng, Kng Fahd Unversty of Petroleum
More informationA FIBONACCI LSB DATA HIDING TECNIQUE
A FIBONACCI LSB DATA HIDING TECNIQUE Dego De Luca Pcone (*)(**), Federca Battst (*)(**), Marco Carl (*), Jaakko Astola (**), and Karen Egazaran (**) (*) AE Department, Unverst of Roma TRE, Rome, Ital,
More informationA Modified Median Filter for the Removal of Impulse Noise Based on the Support Vector Machines
A Modfed Medan Flter for the Removal of Impulse Nose Based on the Support Vector Machnes H. GOMEZ-MORENO, S. MALDONADO-BASCON, F. LOPEZ-FERRERAS, M. UTRILLA- MANSO AND P. GIL-JIMENEZ Departamento de Teoría
More informationLocal Quaternary Patterns and Feature Local Quaternary Patterns
Local Quaternary Patterns and Feature Local Quaternary Patterns Jayu Gu and Chengjun Lu The Department of Computer Scence, New Jersey Insttute of Technology, Newark, NJ 0102, USA Abstract - Ths paper presents
More informationRESOLUTION ENHANCEMENT OF SATELLITE IMAGES USING DUAL-TREE COMPLEX WAVELET AND CURVELET TRANSFORM
Avalable Onlne at www.csmc.com Internatonal Journal of Computer Scence and Moble Computng A Monthly Journal of Computer Scence and Informaton Technology IJCSMC, Vol. 3, Issue. 4, Aprl 2014, pg.1315 1320
More informationRobust Spread Spectrum Based Digital Video Watermarking Scheme in Frequency Domain Nisha Chaudhary 1 Savita Shivani 2
IJSRD Internatonal Journal for Scentfc Research & Development Vol. 2, Issue 6, 2 ISSN (onlne): 23263 Robust Spread Spectrum Based Dgtal Vdeo Watermarkng Scheme n Frequency Doman Nsha Chaudhary Savta Shvan
More informationWavelet-Based Image Compression System with Linear Distortion Control
Je-Hung Lu, Kng-Chu Hung Wavelet-Based Image Compresson System wth Lnear Dstorton Control Je-Hung Lu, Kng-Chu Hung Insttute of Engneerng Scence and Technology Natonal Kaohsung Frst Unversty of Scence and
More informationTime-Varying Volume Geometry Compression with 4D Lifting Wavelet Transform
Tme-Varyng Volume Geometry Compresson wth 4D Lftng Wavelet Transform Yan Wang and Heba Hamza NSF Center for e-desgn, Unversty of Central Florda, Orlando, FL 32816-2996, USA {wangyan, hhamza}@mal.ucf.edu
More informationNUMERICAL SOLVING OPTIMAL CONTROL PROBLEMS BY THE METHOD OF VARIATIONS
ARPN Journal of Engneerng and Appled Scences 006-017 Asan Research Publshng Network (ARPN). All rghts reserved. NUMERICAL SOLVING OPTIMAL CONTROL PROBLEMS BY THE METHOD OF VARIATIONS Igor Grgoryev, Svetlana
More informationS1 Note. Basis functions.
S1 Note. Bass functons. Contents Types of bass functons...1 The Fourer bass...2 B-splne bass...3 Power and type I error rates wth dfferent numbers of bass functons...4 Table S1. Smulaton results of type
More informationRelated-Mode Attacks on CTR Encryption Mode
Internatonal Journal of Network Securty, Vol.4, No.3, PP.282 287, May 2007 282 Related-Mode Attacks on CTR Encrypton Mode Dayn Wang, Dongda Ln, and Wenlng Wu (Correspondng author: Dayn Wang) Key Laboratory
More informationIMAGE FUSION TECHNIQUES
Int. J. Chem. Sc.: 14(S3), 2016, 812-816 ISSN 0972-768X www.sadgurupublcatons.com IMAGE FUSION TECHNIQUES A Short Note P. SUBRAMANIAN *, M. SOWNDARIYA, S. SWATHI and SAINTA MONICA ECE Department, Aarupada
More informationA New Feature of Uniformity of Image Texture Directions Coinciding with the Human Eyes Perception 1
A New Feature of Unformty of Image Texture Drectons Concdng wth the Human Eyes Percepton Xng-Jan He, De-Shuang Huang, Yue Zhang, Tat-Mng Lo 2, and Mchael R. Lyu 3 Intellgent Computng Lab, Insttute of Intellgent
More informationNovel Fuzzy logic Based Edge Detection Technique
Novel Fuzzy logc Based Edge Detecton Technque Aborsade, D.O Department of Electroncs Engneerng, adoke Akntola Unversty of Tech., Ogbomoso. Oyo-state. doaborsade@yahoo.com Abstract Ths paper s based on
More informationResearch Article High Capacity Reversible Watermarking for Audio by Histogram Shifting and Predicted Error Expansion
e Scentfc World Journal, Artcle ID 656251, 7 pages http://dx.do.org/1.1155/214/656251 Research Artcle Hgh Capacty Reversble Watermarkng for Audo by Hstogram Shftng and Predcted Error Expanson Fe Wang,
More informationSolving two-person zero-sum game by Matlab
Appled Mechancs and Materals Onlne: 2011-02-02 ISSN: 1662-7482, Vols. 50-51, pp 262-265 do:10.4028/www.scentfc.net/amm.50-51.262 2011 Trans Tech Publcatons, Swtzerland Solvng two-person zero-sum game by
More informationCCT. Abdul-Jabbar: Design And Realization Of Circular Contourlet Transform ..VLSI. z 2. z 1.
Abdul-Jabbar: Desgn And Realzaton Of Crcular Contourlet Transform DESIGN AND REALIZATION OF CIRCULAR CONTOURLET TRANSFORM Dr Jassm M Abdul-Jabbar * Hala N Fathee ** * Ph D n Elect Eng, Dept of Computer
More informationA PATTERN RECOGNITION APPROACH TO IMAGE SEGMENTATION
1 THE PUBLISHING HOUSE PROCEEDINGS OF THE ROMANIAN ACADEMY, Seres A, OF THE ROMANIAN ACADEMY Volume 4, Number 2/2003, pp.000-000 A PATTERN RECOGNITION APPROACH TO IMAGE SEGMENTATION Tudor BARBU Insttute
More informationDistortion Function Designing for JPEG Steganography with Uncompressed Side-image
Dstorton Functon Desgnng for JPEG Steganography wth Uncompressed Sde-mage Fangjun Huang School of Informaton Scence and Technology, Sun Yat-Sen Unversty, GD 56, Chna huangfj@mal.sysu.edu.cn Jwu Huang School
More informationAn Application of the Dulmage-Mendelsohn Decomposition to Sparse Null Space Bases of Full Row Rank Matrices
Internatonal Mathematcal Forum, Vol 7, 2012, no 52, 2549-2554 An Applcaton of the Dulmage-Mendelsohn Decomposton to Sparse Null Space Bases of Full Row Rank Matrces Mostafa Khorramzadeh Department of Mathematcal
More informationSkew Angle Estimation and Correction of Hand Written, Textual and Large areas of Non-Textual Document Images: A Novel Approach
Angle Estmaton and Correcton of Hand Wrtten, Textual and Large areas of Non-Textual Document Images: A Novel Approach D.R.Ramesh Babu Pyush M Kumat Mahesh D Dhannawat PES Insttute of Technology Research
More informationDynamic Code Block Size for JPEG 2000
Dynamc Code Block Sze for JPEG 2000 Png-Sng Tsa a, Yann LeCornec b a Dept. of Computer Scence, Unv. of Texas Pan Amercan, 1201 W. Unv. Dr., Ednburg, TX USA 78539-2999; b Sgma Desgns, Inc., 1778 McCarthy
More informationVirtual Machine Migration based on Trust Measurement of Computer Node
Appled Mechancs and Materals Onlne: 2014-04-04 ISSN: 1662-7482, Vols. 536-537, pp 678-682 do:10.4028/www.scentfc.net/amm.536-537.678 2014 Trans Tech Publcatons, Swtzerland Vrtual Machne Mgraton based on
More informationContourlet-Based Image Fusion using Information Measures
Proceedngs of the 2nd WSEAS Internatonal Symposum on WAVELETS THEORY & APPLICATIONS n Appled Mathematcs, Sgnal Processng & Modern Scence (WAV '08), Istanbul, Turkey, May 2730, 2008 ContourletBased Image
More informationRobust and Reversible Relational Database Watermarking Algorithm Based on Clustering and Polar Angle Expansion
Robust and Reversble Relatonal Database Watermarkng Algorthm Based on Clusterng and Polar Angle Expanson Zhyong L, Junmn Lu and Wecheng Tao College of Informaton Scence and Engneerng, Hunan Unversty, Changsha,
More informationThe Research of Ellipse Parameter Fitting Algorithm of Ultrasonic Imaging Logging in the Casing Hole
Appled Mathematcs, 04, 5, 37-3 Publshed Onlne May 04 n ScRes. http://www.scrp.org/journal/am http://dx.do.org/0.436/am.04.584 The Research of Ellpse Parameter Fttng Algorthm of Ultrasonc Imagng Loggng
More informationVol. 5, No. 3 March 2014 ISSN Journal of Emerging Trends in Computing and Information Sciences CIS Journal. All rights reserved.
Journal of Emergng Trends n Computng and Informaton Scences 009-03 CIS Journal. All rghts reserved. http://www.csjournal.org Unhealthy Detecton n Lvestock Texture Images usng Subsampled Contourlet Transform
More informationQuantization Noise Power Injection In Subband Audio Coding Using Low Selectivity Filter Banks
Quantzaton Nose Power Injecton In Subband Audo Codng Usng Low Selectvty Flter Banks D. ARTÍNEZ -UÑOZ, N. RUIZ-REYES, P. VERA-CANDEAS, P.J. RECHE-LÓPEZ, J. CURPIÁN-ALONSO Departamento de Electrónca Unversdad
More informationPalmprint Feature Extraction Using 2-D Gabor Filters
Palmprnt Feature Extracton Usng 2-D Gabor Flters Wa Kn Kong Davd Zhang and Wenxn L Bometrcs Research Centre Department of Computng The Hong Kong Polytechnc Unversty Kowloon Hong Kong Correspondng author:
More informationPattern Recognition 43 (2010) Contents lists available at ScienceDirect. Pattern Recognition. journal homepage:
Pattern Recognton 43 (2010) 397 -- 404 Contents lsts avalable at ScenceDrect Pattern Recognton ournal homepage: www.elsever.com/locate/pr Secret mage sharng based on cellular automata and steganography
More informationOutline. Discriminative classifiers for image recognition. Where in the World? A nearest neighbor recognition example 4/14/2011. CS 376 Lecture 22 1
4/14/011 Outlne Dscrmnatve classfers for mage recognton Wednesday, Aprl 13 Krsten Grauman UT-Austn Last tme: wndow-based generc obect detecton basc ppelne face detecton wth boostng as case study Today:
More informationThe Research of Support Vector Machine in Agricultural Data Classification
The Research of Support Vector Machne n Agrcultural Data Classfcaton Le Sh, Qguo Duan, Xnmng Ma, Me Weng College of Informaton and Management Scence, HeNan Agrcultural Unversty, Zhengzhou 45000 Chna Zhengzhou
More informationPRÉSENTATIONS DE PROJETS
PRÉSENTATIONS DE PROJETS Rex Onlne (V. Atanasu) What s Rex? Rex s an onlne browser for collectons of wrtten documents [1]. Asde ths core functon t has however many other applcatons that make t nterestng
More informationDWT-BAT Based Medical Image Watermarking For Telemedicine Applications
DWT-BAT Based Medcal Image Watermarkng For Telemedcne Applcatons 1 N.Venkatram, 2 L.S.S.Reddy, 3 P.V.V.Kshore, 1 K.L.Unversty, Dept of E.C.M, KL Unversty, Vaddeswaram, Green Felds, GUNTUR, AP, INDIA 2
More informationSmoothing Spline ANOVA for variable screening
Smoothng Splne ANOVA for varable screenng a useful tool for metamodels tranng and mult-objectve optmzaton L. Rcco, E. Rgon, A. Turco Outlne RSM Introducton Possble couplng Test case MOO MOO wth Game Theory
More information