Feature-Based Steganalysis for JPEG Images and its Implications for Future Design of Steganographic Schemes

Size: px
Start display at page:

Download "Feature-Based Steganalysis for JPEG Images and its Implications for Future Design of Steganographic Schemes"

Transcription

1 Feature-Based Steganalysis for JPEG Images and its Implications for Future Design of Steganograpic Scemes Jessica Fridric Dept. of Electrical Engineering, SUNY Bingamton, Bingamton, NY , USA ttp:// Abstract. In tis paper, we introduce a new feature-based steganalytic metod for JPEG images and use it as a bencmark for comparing JPEG steganograpic algoritms and evaluating teir embedding mecanisms. Te detection metod is a linear classifier trained on feature vectors corresponding to cover and stego images. In contrast to previous blind approaces, te features are calculated as an norm of te difference between a specific macroscopic functional calculated from te stego image and te same functional obtained from a decompressed, cropped, and recompressed stego image. Te functionals are built from marginal and joint statistics of DCT coefficients. Because te features are calculated directly from DCT coefficients, conclusions can be drawn about te impact of embedding modifications on detectability. Tree different steganograpic paradigms are tested and compared. Experimental results reveal new facts about current steganograpic metods for JPEGs and new design principles for more secure JPEG steganograpy. Introduction Steganograpy is te art of invisible communication. Its purpose is to ide te very presence of communication by embedding messages into innocuous-looking cover objects. Eac steganograpic communication system consists of an embedding algoritm and an extraction algoritm. To accommodate a secret message in a digital image, te original cover image is sligtly modified by te embedding algoritm. As a result, te stego image is obtained. Steganalysis is te art of discovering idden data in cover objects. As in cryptanalysis, it is assumed tat te steganograpic metod is publicly known wit te exception of a secret key. Steganograpy is considered secure if te stego-images do not contain any detectable artifacts due to message embedding. In oter words, te set of stego-images sould ave te same statistical properties as te set of cover-images. If tere exists an algoritm tat can guess weter or not a given image contains a secret message wit a success rate better tan random guessing, te steganograpic

2 system is considered broken. For a more exact treatment of te concept of steganograpic security, te reader is referred to [,2].. Steganalytic Metods Several trends ave recently appeared in steganalysis. One of te first general steganalytic metods was te ci-square attack by Westfeld [3]. Te original version of tis attack could detect sequentially embedded messages and was later generalized to randomly scattered messages [4,5]. Because tis approac is based solely on te first order statistics and is applicable only to idempotent embedding operations, suc as SB (east Significant Bit) flipping, its applicability to modern steganograpic scemes, tat are aware of te Cacin criterion [2], is rater limited. Anoter major stream in steganalysis is based on te concept of a distinguising statistic [6]. In tis approac, te steganalyst first carefully inspects te embedding algoritm and ten identifies a quantity (te distinguising statistics) tat canges predictably wit te lengt of te embedded message, yet one tat can be calibrated for cover images. For JPEG images, tis calibration is done by decompressing te stego image, cropping by a few pixels in eac direction, and recompressing using te same quantization table. Te distinguising statistic calculated from tis image is used as an estimate for te same quantity from te cover image. Using tis calibration, igly accurate and reliable estimation of te embedded message lengt can be constructed for many scemes [6]. Te detection pilosopy is not limited to any specific type of te embedding operation and works for randomly scattered messages as well. One disadvantage of tis approac is tat te detection needs to be customized to eac embedding paradigm and te design of proper distinguising statistics cannot be easily automatized. Te tird direction in steganalysis is formed by blind classifiers. Pioneered by Memon and Farid [7,5], a blind detector learns wat a typical, unmodified image looks like in a multi-dimensional feature space. A classifier is ten trained to learn te differences between cover and stego image features. Te 72 features proposed by Farid are calculated in te wavelet decomposition of te stego image as te first four moments of coefficients and te log error between te coefficients and teir globally optimal linear prediction from neigboring wavelet modes. Tis metodology combined wit a powerful Support Vector Macine classifier gives very impressive results for most current steganograpic scemes. Farid demonstrated a very reliable detection for J-Steg, bot versions of OutGuess, and for F5 (color images only). Te biggest advantage of blind detectors is teir potential ability to detect any embedding sceme and even to classify embedding tecniques by teir position in te feature space. Among te disadvantages is tat te metodology will always likely be less accurate tan targeted approaces and it may not be possible to accurately estimate te secret message lengt, wic is an important piece of information for te steganalyst. Introducing blind detectors prompted furter researc in steganograpy. Based on te previous work of Eggers [8], Tzscoppe [9] constructed a JPEG steganograpic sceme (HPDM) tat is undetectable using Farid s sceme. However, te same

3 sceme is easily detectable [0] using a single scalar feature te calibrated spatial blockiness [6]. Tis suggests tat it sould be possible to construct a very powerful feature-based detector (blind on te class of JPEG images) if we used calibrated features computed directly in te DCT domain rater tan from a somewat arbitrary wavelet decomposition. Tis is te approac taken in tis paper..2 Proposed Researc We combine te concept of calibration wit te feature-based classification to devise a blind detector specific to JPEG images. By calculating te features directly in te JPEG domain rater tan in te wavelet domain, it appears tat te detection can be made more sensitive to a wider type of embedding algoritms because te calibration process (for details, see Sec. 2) increases te features sensitivity to te embedding modifications wile suppressing image-to-image variations. Anoter advantage of calculating te features in te DCT domain is tat it enables more straigtforward interpretation of te influence of individual features on detection as well as easier formulation of design principles leading to more secure steganograpy. Te proposed detection can also be viewed as a new approac to te definition of steganograpic security. According to Cacin, a steganograpic sceme is considered secure if te Kullback-eibler distance between te distribution of stego and cover images is zero (or small for ε-security). Farid s blind detection is essentially a reflection of tis principle. Farid first determines te statistical model for natural images in te feature space and ten calculates te distance between a specific image and te statistical model. Tis distance is ten used to determine weter te image is a stego image. In our approac, we cange te security model and use te stego image as a side-information to recover some statistics of te cover image. Instead of measuring te distance between te image and a statistical model, we measure te distance between certain parameters of te stego image and te same parameters related to te original image tat we succeeded to capture by calibration. Te paper is organized as follows. In te next section, we explain ow te features are calculated and wy. In Section 3, we give te details of te detection sceme and discuss te experimental results for OutGuess [], F5 [3], and Model Based Steganograpy [2,4]. Implications for future design of steganograpic scemes are discussed in Section 4. Te paper is summarized in Section 5. 2 Calibrated Features Two types of features will be used in our analysis first order features and second order features. Also, some features will be constructed in te DCT domain, wile oters in te spatial domain. In te wole paper, scalar quantities will be represented wit a non-bold italic font, wile vectors and matrices will always be in bold italics. Te norm is defined for a vector (or matrix) as a sum of absolute values of all vector (or matrix) elements.

4 All features are constructed in te following manner. A vector functional F is applied to te stego JPEG image J. Tis functional could be te global DCT coefficient istogram, a co-occurrence matrix, spatial blockiness, etc. Te stego image J is decompressed to te spatial domain, cropped by 4 pixels in eac direction, and recompressed wit te same quantization table as J to obtain J 2. Te same vector functional F is ten applied to J 2. Te final feature f is obtained as an norm of te difference f = F. () ( J) F ( J 2) J 4 pixels J 2 F F(J ) F(J 2 ) F Te logic beind tis coice for features is te following. Te cropping and recompression sould produce a calibrated image wit most macroscopic features similar to te original cover image. Tis is because te cropped stego image is perceptually similar to te cover image and tus its DCT coefficients sould ave approximately te same statistical properties as te cover image. Te cropping by 4 pixels is important because te 8 8 grid of recompression does not see te previous JPEG compression and tus te obtained DCT coefficients are not influenced by previous quantization (and embedding) in te DCT domain. One can tink of te cropped /recompressed image as an approximation to te cover image or as a sideinformation. Te use of te calibrated image as a side-information as proven very useful for design of very accurate targeted steganalytic metods in te past [6]. 2. First Order Features Te simplest first order statistic of DCT coefficients is teir istogram. Suppose te stego JPEG file is represented wit a DCT coefficient array d k (i, j) and te quantization matrix Q(i, j), i, j =,,8, k =,, B. Te symbol d k (i, j) denotes te (i, j)-t quantized DCT coefficient in te k-t block (tere are total of B blocks). Te global istogram of all 64k DCT coefficients will be denoted as H r, were r =,, R, = min k,i,j d k (i, j) and R = max k,i,j d k (i, j). Tere are steganograpic programs tat preserve H [8,0,]. However, te scemes in [8,9,] only preserve te global istogram and not necessarily istograms of individual DCT modes. Tus, we add individual istograms for low frequency DCT modes to our set of functionals. For a fixed DCT mode (i, j), let, r ij = r

5 ,, R, denote te individual istogram of values d k (i, j), k =,, B. We only use istograms of low frequency DCT coefficients because istograms of coefficients from medium and iger frequencies are usually statistically unimportant due to te small number of non-zero coefficients. To provide additional first order macroscopic statistics to our set of functionals, we ave decided to include dual istograms. For a fixed coefficient value d, te dual d istogram is an 8 8 matrix g ij g d ij B = k = were δ(u,v)= if u=v and 0 oterwise. In words, δ ( d, d ( i, j)), (2) k is te number of ow many times te value d occurs as te (i, j)-t DCT coefficient over all B blocks in te JPEG image. Te dual istogram captures ow a given coefficient value d is distributed among different DCT modes. Obviously, if a steganograpic metod preserves all individual istograms, it also preserves all dual istograms and vice versa. d g ij 2.2 Second Order Features If te corresponding DCT coefficients from different blocks were independent, ten any embedding sceme tat preserves te first order statistics te istogram would be undetectable by Cacin s definition of steganograpic security [2]. However, because natural images can exibit iger-order correlations over distances larger tan 8 pixels, individual DCT modes from neigboring blocks are not independent. Tus, it makes sense to use features tat capture inter-block dependencies because tey will likely be violated by most steganograpic algoritms. et I r and I c denote te vectors of block indices wile scanning te image by rows and by columns, respectively. Te first functional capturing inter-block dependency is te variation V defined as V = 8 i, j= I r k = d I r ( k) ( i, j) d I r ( k + ) ( i, j) + I r 8 i, j= + I c Ic k = d Ic ( k) ( i, j) d Ic ( k + ) ( i, j). (3) Most steganograpic tecniques in some sense add entropy to te array of quantized DCT coefficients and tus are more likely to increase te variation V tan decrease. Embedding canges are also likely to increase te discontinuities along te 8 8 block boundaries. In fact, tis property as proved very useful in steganalysis in te past [6,0,2]. Tus, we include two blockiness measures B α, α =, 2, to our set of functionals. Te blockiness is calculated from te decompressed JPEG image and tus represents an integral measure of inter-block dependency over all DCT modes over te wole image:

6 ( M ) / 8 N ( N ) / 8 M α α x8i, j x8i +, j + xi,8 j xi,8 j+ i= j= j= i= Bα = N ( M ) /8 + M ( N ) /8. (4) In te expression above, M and N are image dimensions and x ij are grayscale values of te decompressed JPEG image. Te final tree functionals are calculated from te co-occurrence matrix of neigboring DCT coefficients. Recalling te notation, d k (i, j) R, te cooccurrence matrix C is a square D D matrix, D = R +, defined as follows C st = I r 8 δ k= i, j= c 8 ( s, di ( k) ( i, j) ) δ ( t, di ( k ) ( i, j) ) ( s, di ( k) ( i, j) ) ( t, di ( k ) ( i, j) ) r r + + δ δ c c + I r I + I k= i, j= Te co-occurrence matrix describes te probability distribution of pairs of neigboring DCT coefficients. It usually as a sarp peak at (0,0) and ten quickly falls off. et C(J ) and C(J 2 ) be te co-occurrence matrices for te JPEG image J and its calibrated version J 2, respectively. Due to te approximate symmetry of C st around (s, t) = (0, 0), te differences C st (J ) C st (J 2 ) for (s, t) {(0,), (,0), (,0), (0, )} are strongly positively correlated. Te same is true for te group (s, t) {(,), (,), (, ), (, )}. For practically all steganograpic scemes, te embedding canges to DCT coefficients are essentially perturbations by some small value. Tus, te cooccurrence matrix for te embedded image can be obtained as a convolution C P(q), were P is te probability distribution of te embedding distortion, wic depends on te relative message lengt q. Tis means tat te values of te co-occurrence matrix C P(q) will be more spread out. To quantify tis spreading, we took te following tree quantities as our features: N 00 =C 0,0 (J ) C 0,0 (J 2 ) (6) N 0 =C 0, (J ) C 0, (J 2 )+C,0 (J ) C,0 (J 2 )+C,0 (J ) C,0 (J 2 )+C 0, (J ) C 0, (J 2 ) N =C, (J ) C, (J 2 )+C, (J ) C, (J 2 )+C, (J ) C, (J 2 )+C, (J ) C, (J 2 ). Te final set of 23 functionals (te last tree are directly features) used in tis paper is summarized in Table. c (5) 3 Steganalytic Classifier We used te Greenspun image database ( consisting of 84 images of size approximately All images were converted to grayscale, te black border frame was cropped away, and te images were compressed using an 80% quality JPEG. We selected te F5 algoritm [3], OutGuess 0.2 [], and te

7 recently developed Model based Steganograpy witout (MB) and wit (MB2) deblocking [2,4] as tree examples of different steganograpic paradigms for JPEG images. Eac steganograpic tecnique was analyzed separately. For a fixed relative message lengt expressed in terms of bits per non-zero DCT coefficient of te cover image, we created a training database of embedded images. Te Fiser inear Discriminant classifier was trained on 34 cover and 34 stego images. Te generalized eigenvector obtained from tis training was ten used to calculate te ROC curve for te remaining 500 cover and 500 stego images. Te detection performance was evaluated using detection reliability ρ defined below. Table. All 23 distinguising functionals Functional/feature name Global istogram H / H Individual istograms for 5 DCT modes Dual istograms for DCT values ( 5,, 5) 2 g g 2 5 5, 3 3 Functional F, 2 2, g,, 4 g Variation V and 2 blockiness B, B 2 Co-occurrences N 00, N 0, N (features, not functionals), Te reason wy we used in our tests message lengts proportional to te number of non-zero DCT coefficients in eac image was to create stego image databases for wic te detection is approximately of te same level of difficulty. In our experience, it is easier to detect a 0000-bit message in a smaller JPEG file tan in a larger JPEG file. Te testing was done for te following relative embedding rates expressed in bpc (Bits Per non-zero DCT Coefficient), bpc = 0, 0.05, 0., 0.2, 0.4, 0.6, 0.8. If, for a given image, te bpc rate was larger tan te maximal bpc rate bpc max determined by te image capacity, we took bpc max as te embedding rate. Te only exception to tis rule was te MB2 metod, were we took 0.95 bpc max as te maximal rate because, for te maximal embedding rate, te deblocking algoritm in MB2 frequently failed to embed te wole message. Fig. sows te capacity for all tree metods expressed in bits per non-zero DCT coefficient. Te detection results were evaluated using detection reliability ρ defined as g g 4 4 ρ = 2A, (7) were A is te area under te Receiver Operating Caracteristic (ROC) curve, also called an accuracy. We scaled te accuracy in order to obtain ρ = for a perfect detection and ρ = 0 wen te ROC coincides wit te diagonal line (reliability of detection is 0). Te detection reliability for all tree metods is sown in Table , 22 g g 5 5, 3 3

8 0.8 F Capacity (bpc) MB2 OG image number Fig.. Capacity for te tested tecniques expressed in bits per non-zero DCT coefficient. Te capacity for MB is double tat of MB2. Te F5 and MB algoritms provide te igest capacity Table 2. Detection reliability ρ for F5 wit matrix embedding (, k, 2 k ), F5 wit turned off matrix embedding (,,), OutGuess 0.2 (OG), Model based Steganograpy witout and wit deblocking (MB and MB2, respectively) for different embedding rates (U = unacievable rate) bpc F5 F5_ OG MB MB U U U U U One can clearly see tat te OutGuess algoritm is te most detectable. Also, it provides te smallest capacity. Te detection reliability is relatively ig even for embedding rates as small as 0.05 bpc and te metod becomes igly detectable for messages above 0. bpc. To guarantee a fair comparison, we ave tested F5 bot wit and witout matrix embedding because some programs could be easily adapted to incorporate it (e.g., OutGuess). Turning off te matrix embedding, te F5 algoritm still performs better tan OutGuess. Te matrix embedding significantly decreases te detectability for sort messages. Tis is understandable because it improves te embedding efficiency (number of bits embedded per cange). Because OutGuess needs

9 to reserve a relatively large portion of coefficients for te correction step, its embedding efficiency is lower compared to F5. Tis seems to ave a bigger impact on te detectability tan te fact tat OutGuess preserves te global istogram of DCT coefficients. Table 3. Detection reliability for individual features for all tree embedding algoritms for fully embedded images (for fully embedded images, F5 wit matrix embedding and witout matrix embedding coincide) Functional/feature Metod F5 OutGuess 0.2 MB MB2 Global istogram Indiv. istogram for (2,) Indiv. istogram for (3,) Indiv. istogram for (,2) Indiv. istogram for (2,2) Indiv. istogram for (,3) Dual istogram for Dual istogram for Dual istogram for Dual istogram for Dual istogram for Dual istogram for Dual istogram for Dual istogram for Dual istogram for Dual istogram for Dual istogram for Variation blockiness blockiness Co-occurrence N Co-occurrence N Co-occurrence N Bot MB and MB2 metods clearly ave te best performance of all tree tested algoritms. MB preserves not only te global istogram, but all marginal statistics (istograms) for eac individual DCT mode. It is quite remarkable tat tis can be acieved wit an embedding efficiency sligtly over 2 bits per cange (compared to.5 bits per cange for F5 and rougly for OutGuess 0.2). Tis is likely because MB does not avoid any oter coefficients tan 0 and its embedding mecanism is guaranteed to embed te maximal number of bits given te fact tat marginal statistics of all coefficients must be preserved. Te MB2 algoritm as te same embedding mecanism as MB but reserves one alf of te capacity for modifications tat bring te blockiness of te stego image to its original value. As a result, MB2 is less detectable tan MB at te expense of a two times smaller embedding capacity. Bot metods perform better tan F5 wit matrix embedding and are significantly better tan F5 witout matrix embedding. Even for messages close to 00% capacity, te

10 detection of MB2 is not very reliable. An ROC wit ρ = 0.82 does not allow reliable detection wit a small false positive rate (c.f., Fig. 2). Never te less, in te strict formulation of steganograpic security, wenever te embedded images can be distinguised from cover images wit a better algoritm tan random guessing, te steganograpy is detectable. Tus, we conclude tat te Model based Steganograpy is detectable using our feature-based approac on our test database. F5 OG MB Fig. 2. ROC curves for embedding capacities and metods from Table 2. MB2 For eac steganograpic metod, we also measured te influence of eac individual feature f as its detection reliability ρ(f) obtained from te ROC curve calculated from te single feature f and no oter features. We acknowledge tat te collection of individual reliabilities ρ(f) does not ave to necessarily capture te performance of te wole detection algoritm in te 23 dimensional space. Tis is because it is possible tat none of te individual features temselves as any distinguising power, yet te collection of all features acieves a perfect detection. Never te less, we use ρ(f) as an indication of ow muc eac feature contributes to te detection. In Table 2, we sow te influence of eac feature for eac steganograpic metod for te maximal bpc rate. In te next section, we interpret te results and draw conclusions concerning te existing and future design principles of steganograpic scemes for JPEG images. We note tat in our tests, we did not include double compressed images. It is likely tat suc images would worsen our detection results. In agreement wit te

11 conclusion reaced in [6], te double compression needs to be first estimated and ten corrected for during te feature calibration. Altoug we ave not tested tis, we believe tat te feature-based blind steganalysis would work in tis case as well. 4 Implications for Steganograpy Te F5 algoritm uses a non-idempotent embedding operation (subtracting ) to prevent te attacks based on te ci-square attack and its generalizations [3 5]. It also makes sure tat te global stego image istogram is free of any obvious artifacts and looks natural. In fact, it as been argued by its autors [3] tat te stego image looks as if te cover image was originally compressed wit a lower JPEG quality factor. However, te F5 predictably modifies te first order statistics and tis is wy te first six functionals are so influential (see Table 2). It is also not surprising tat te dual istogram for 0 as a big influence because of te srinkage. Note tat te second-order statistics significantly contribute to te detection as well. Most features wit te exception of dual istograms ave ig influence on detection. OutGuess 0.2 was specifically designed to preserve te global coefficient istogram. However, OutGuess does not ave to necessarily preserve te individual istograms or te dual istograms, wic is reflected by a relatively large influence for tese functionals in Table 2. Te most influential functional is te dual istogram for te values and 2. Tis is again, understandable, considering te embedding mecanism of OutGuess. Te values and 2 determine te maximum correctable capacity of te metod and tus form te most canged pair of values during te embedding (and te correction step). Altoug te coefficient counts are preserved, teir positions in te JPEG file are igly disturbed, wic is wy we see a very ig influence of features based on dual istograms for values and 2. Anoter reason wy OutGuess is more detectable tan F5 is its low embedding efficiency of bit per cange compared to.5 for F5. Considering te large influence of te dual istogram, it seems feasible tat one could design a targeted steganalytic sceme of te type described in [6] by using te dual istograms for values and 2 as te distinguising statistic. Tis is an example ow te blind analysis may, in turn, give us direct ideas ow to estimate te lengt of te embedded message. Wat is somewat surprising is tat te global istogram also as quite a large influence on detection, despite te fact tat it is preserved by OutGuess. We will revisit tis peculiar finding wen we discuss te results for Model Based Steganograpy below. Anoter seemingly surprising fact is tat altoug blockiness proved very useful in designing successful attacks against OutGuess [6], its influence in te proposed detection sceme is relatively small (0.6). Tis fact is peraps less surprising if we realize tat te distinguising statistic in [6] was te increase of blockiness after full re-embedding rater tan te blockiness itself, wic appears to be rater volatile. ooking at te results in Table and 2, tere is no doubt tat te Model Based Steganograpy [2,4] is by far te most secure metod out of te tree tested paradigms. MB and MB2 preserve not only te global istogram but also all istograms

12 of individual DCT coefficients. Tus, all dual istograms are also preserved. Moreover, MB2 also preserves one second-order functional te blockiness. Tus, we conclude tat te more statistical measures an embedding metod preserves, te more difficult it is to detect it. Consequently, our analysis indicates tat it is possible to increase te security of JPEG steganograpic scemes by identifying a set of key macroscopic statistical features tat sould be preserved by te embedding. It is most likely not necessary to preserve all 23 features to substantially decrease te detectability because many of te features are not independent. One of te most surprising facts revealed by te experiments is tat even features based on functionals tat are preserved by te embedding may ave substantial influence. One migt intuitively expect tat suc features would ave very small influence. However, as sown in te next paragrap, preserving a specific functional does not automatically mean tat te calibrated feature will be preserved. et us take a closer look at te blockiness as an example. Preserving te blockiness along te original 8 8 grid (solid lines) does not mean tat te blockiness along te sifted grid will also be preserved (see Fig. 2). Tis is because te embedding and deblocking canges are likely to introduce distortion into te middle of te blocks and tus disturb te blockiness feature, wic is te difference between te blockiness along te solid and dased lines. Consequently, it is not surprising tat features constructed from functionals tat are preserved still ave some residual (and not necessarily small) influence in our feature-based detection. Tis is seen in Table 2 for bot OutGuess 0.2 and te Model Based Steganograpy. Terefore, te designers of future steganograpic scemes for JPEG images sould consider adding calibrated statistics into te set of quantities tat sould be preserved during embedding. We furter point out tat te features derived from te co-occurrence matrix are very influential for all tree scemes. For te Model based Steganograpy, tese features are, in fact, te most influential. Te MB2 metod is currently te only JPEG steganograpic metod tat takes into account inter-block dependencies between DCT coefficients by preserving te blockiness, wic is an integral measure of tese dependencies. Not surprisingly, te scalar blockiness feature does not capture all iger-order statistics of DCT coefficients. Tus, it seems tat te next generation of steganograpic metods for JPEG images sould preserve bot te marginal statistics of DCT coefficients and te probability distribution of coefficient pairs from neigboring blocks (te co-occurrence matrix). Eventually, if te stego algoritm preserved all possible statistics of te cover image, te embedding would be presumably undetectable. Altoug tis goal will likely never be acieved, as te embedding algoritm preserves more ortogonal or independent statistics, its detectability will quickly decrease. We firmly believe tat incorporating a model for te cooccurrence matrices and preserving it would probably lead to significantly less detectable scemes. Te Model based Steganograpy [4] seems to be an appropriate guiding principle to acieve tis goal. However, te embedding operation sould not be idempotent, oterwise targeted attacks based on re-embedding (c.f., te attack on OutGuess [6]) could likely be mounted.

13 Embedding Cover image Stego image 8 pixels Fig. 2. Blockiness is preserved along te solid lines but not necessarily along te dased lines 5 Summary and Future Researc In tis paper, we developed a new blind feature-based steganalytic metod for JPEG images. Eac feature is calculated as te norm of te difference between a specific functional of te stego image and its cropped/recompressed version. Tis calibration can be interpreted as using te stego image as side information to approximately recover some parameters of te cover image. As a result, te calibration decreases image-to-image variations and tus enables more accurate detection. Te features were calculated directly in te DCT domain as first and iger order statistics of DCT coefficients. Tis enables easier explanation of te impact of embedding modifications on detection as well as direct interpretation of te detection results and easy formulation of design principles for future steganograpic metods. We ave applied te detection to several current steganograpic scemes some of wic are aware of te Cacin criterion [2]. Te experimental results were carefully evaluated and interpreted. Conclusions concerning current and future steganograpic scemes for JPEGs were also drawn. In particular, we concluded tat. Secure steganograpic scemes must preserve as many statistics of DCT coefficients as possible. It is not enoug to preserve te marginal statistics, e.g., te istograms. DCT coefficients exibit block-to-block dependencies tat must be preserved as well. 2. A sceme tat preserves more statistics is likely to be more secure tan a sceme tat preserves fewer statistics. Surprisingly, preserving more statistics may not necessarily lead to small capacity, as sown by Model Based Steganograpy. Tis is also because many statistical features one can identify in an image are likely to be dependent. 3. Even toug a sceme may preserve a specific statistic ζ(x) of te cover JPEG image X, te calibrated statistic ζ(compress(crop(x))) calculated from te cropped/recompressed image may not necessarily be preserved, tus opening te door for attacks. Future steganograpic scemes sould add calibrated statistics to teir set of preserved statistics.

14 4. For all tested scemes, one of te most influential features of te proposed detection was te co-occurrence matrix of DCT coefficients (5), wic is te probability distribution of coefficient pairs from neigboring blocks. We ypotesize tat a sceme tat preserves marginal statistics of DCT coefficients and te co-occurrence matrix (wic captures block-to-block dependencies) is likely to exibit improved resistance to attacks. For tis purpose, we propose te Model Based Steganograpy paradigm [2,4] expanded by te model for joint probability distribution of neigboring DCT coefficients. Altoug te calibration process is very intuitive, we currently do not ave a quantitative understanding of ow muc information about te cover image can be obtained from te stego image by calibration. For example, for images tat contain periodic spatial structures wit a period tat is an integer multiple of 8, te calibration process may give misleading results (c.f., te spatial resonance penomenon [6]). In tis case, it may be more beneficial to replace te cropping by oter operations tat will also break te block structure of JPEG images, suc as sligt rotation, scaling, or random warping. Furter investigation of tis issue will be part of our future researc. In te future, we also plan to replace te Fiser inear Discriminant wit more sopisticated classifiers, suc as Support Vector Macines, to furter improve te detection reliability of te proposed steganalytic algoritm. We also plan to develop a multiple-class classifier capable of recognizing stego images produced by different embedding algoritms (steganograpic program identification). Acknowledgements Te work on tis paper was supported by te Air Force Researc aboratory, Air Force Material Command, USAF, under researc grant number F Te U.S. Government is autorized to reproduce and distribute reprints for Governmental purposes notwitstanding any copyrigt notation tere on. Te views and conclusions contained erein are tose of te autors and sould not be interpreted as necessarily representing te official policies, eiter expressed or implied, of Air Force Researc aboratory, or te U. S. Government. Special tanks belong to Pil Sallee for many useful discussions during preparation of tis paper and for providing te code for Model Based Steganograpy. References. Anderson, R. J. and Petitcolas, F.A.P.: On te imits of Steganograpy. IEEE Journal of Selected Areas in Communications. Special Issue on Copyrigt and Privacy Protection, vol. 6(4) (998) Cacin, C.: An Information-Teoretic Model for Steganograpy. In: Aucsmit, D. (ed.): Information Hiding. 2 nd International Worksop. ecture Notes in Computer Science, Vol. 525, Springer-Verlag, Berlin Heidelberg New York (998) pp

15 3. Westfeld, A. and Pfitzmann, A.: Attacks on Steganograpic Systems. In: Pfitzmann A. (eds.): 3rd International Worksop. ecture Notes in Computer Science, Vol.768. Springer-Verlag, Berlin Heidelberg New York (2000) Westfeld, A.: Detecting ow Embedding Rates. In: Petitcolas, F.A.P. (ed.): Information Hiding. 5 t International Worksop. ecture Notes in Computer Science, Vol Springer-Verlag, Berlin Heidelberg New York (2002) Provos, N. and Honeyman, P.: Detecting Steganograpic Content on te Internet. CITI Tecnical Report 0- (200) 6. Fridric, J., Goljan, M., Hogea, D., and Soukal, D.: Quantitative Steganalysis: Estimating Secret Message engt. ACM Multimedia Systems Journal. Special issue on Multimedia Security, Vol. 9(3) (2003) Farid H. and Siwei,.: Detecting Hidden Messages Using Higer-Order Statistics and Support Vector Macines. In: Petitcolas, F.A.P. (ed.): Information Hiding. 5 t International Worksop. ecture Notes in Computer Science, Vol Springer-Verlag, Berlin Heidelberg New York (2002) Eggers, J., Bäuml, R., and Girod, B.: A Communications Approac to Steganograpy. In Proc. EI SPIE Electronic Imaging SPIE Vol (2002) Tzscoppe, R., Bäuml, R., Huber, J.B., and Kaup, A.: Steganograpic System based on Higer-Order Statistics. Proc. EI SPIE Electronic Imaging. Santa Clara (2003) Tzscoppe, R.: Personal communication. February (2003). Provos, N.: Defending Against Statistical Steganalysis. 0t USENIX Security Symposium. Wasington, DC (200) 2. Sallee, P.: Model Based Steganograpy. International Worksop on Digital Watermarking. Seoul, October (2003) Westfeld, A. and Pfitzmann, A.: Hig Capacity Despite Better Steganalysis (F5 A Steganograpic Algoritm). In: Moskowitz, I.S. (eds.): Information Hiding. 4 t International Worksop. ecture Notes in Computer Science, Vol.237. Springer-Verlag, Berlin Heidelberg New York (200) Sallee, P.: Model-based metods for steganograpy and steganalysis. Submitted to International Journal of Image and Grapics. Special issue on Image Data Hiding (2004) 5. I. Avcibas, N. Memon, and B. Sankur, Steganalysis using Image Quality Metrics, SPIE Security and Watermarking of Multimedia Contents II, Electronic Imaging, San Jose, CA, Jan. 200.

Breaking the OutGuess

Breaking the OutGuess Breaking the OutGuess Jessica Fridrich, Miroslav Goljan, Dorin Hogea * presented by Deepa Kundur Department of Electrical and Computer Engineering * Department of Computer Science SUNY Binghamton, Binghamton,

More information

Bounding Tree Cover Number and Positive Semidefinite Zero Forcing Number

Bounding Tree Cover Number and Positive Semidefinite Zero Forcing Number Bounding Tree Cover Number and Positive Semidefinite Zero Forcing Number Sofia Burille Mentor: Micael Natanson September 15, 2014 Abstract Given a grap, G, wit a set of vertices, v, and edges, various

More information

Minimizing the Embedding Impact in Steganography

Minimizing the Embedding Impact in Steganography Minimizing te Embedding Impact in Steganograpy Jessica Fridric SUNY Bingamton Department of ECE Bingamton, NY 3902-6000 00 607 777 677 fridric@bingamton.edu ABSTRACT In tis paper, we study te trade-off

More information

Haar Transform CS 430 Denbigh Starkey

Haar Transform CS 430 Denbigh Starkey Haar Transform CS Denbig Starkey. Background. Computing te transform. Restoring te original image from te transform 7. Producing te transform matrix 8 5. Using Haar for lossless compression 6. Using Haar

More information

4.1 Tangent Lines. y 2 y 1 = y 2 y 1

4.1 Tangent Lines. y 2 y 1 = y 2 y 1 41 Tangent Lines Introduction Recall tat te slope of a line tells us ow fast te line rises or falls Given distinct points (x 1, y 1 ) and (x 2, y 2 ), te slope of te line troug tese two points is cange

More information

More on Functions and Their Graphs

More on Functions and Their Graphs More on Functions and Teir Graps Difference Quotient ( + ) ( ) f a f a is known as te difference quotient and is used exclusively wit functions. Te objective to keep in mind is to factor te appearing in

More information

Our Calibrated Model has No Predictive Value: An Example from the Petroleum Industry

Our Calibrated Model has No Predictive Value: An Example from the Petroleum Industry Our Calibrated Model as No Predictive Value: An Example from te Petroleum Industry J.N. Carter a, P.J. Ballester a, Z. Tavassoli a and P.R. King a a Department of Eart Sciences and Engineering, Imperial

More information

4.2 The Derivative. f(x + h) f(x) lim

4.2 The Derivative. f(x + h) f(x) lim 4.2 Te Derivative Introduction In te previous section, it was sown tat if a function f as a nonvertical tangent line at a point (x, f(x)), ten its slope is given by te it f(x + ) f(x). (*) Tis is potentially

More information

1.4 RATIONAL EXPRESSIONS

1.4 RATIONAL EXPRESSIONS 6 CHAPTER Fundamentals.4 RATIONAL EXPRESSIONS Te Domain of an Algebraic Epression Simplifying Rational Epressions Multiplying and Dividing Rational Epressions Adding and Subtracting Rational Epressions

More information

Density Estimation Over Data Stream

Density Estimation Over Data Stream Density Estimation Over Data Stream Aoying Zou Dept. of Computer Science, Fudan University 22 Handan Rd. Sangai, 2433, P.R. Cina ayzou@fudan.edu.cn Ziyuan Cai Dept. of Computer Science, Fudan University

More information

Merging Markov and DCT Features for Multi-Class JPEG Steganalysis

Merging Markov and DCT Features for Multi-Class JPEG Steganalysis Merging Markov and DCT Features for Multi-Class JPEG Steganalysis Tomáš Pevný a, Jessica Fridrich b a Department of Computer Science, Binghamton University, State University of New York b Department of

More information

MATH 5a Spring 2018 READING ASSIGNMENTS FOR CHAPTER 2

MATH 5a Spring 2018 READING ASSIGNMENTS FOR CHAPTER 2 MATH 5a Spring 2018 READING ASSIGNMENTS FOR CHAPTER 2 Note: Tere will be a very sort online reading quiz (WebWork) on eac reading assignment due one our before class on its due date. Due dates can be found

More information

Vector Processing Contours

Vector Processing Contours Vector Processing Contours Andrey Kirsanov Department of Automation and Control Processes MAMI Moscow State Tecnical University Moscow, Russia AndKirsanov@yandex.ru A.Vavilin and K-H. Jo Department of

More information

Two Modifications of Weight Calculation of the Non-Local Means Denoising Method

Two Modifications of Weight Calculation of the Non-Local Means Denoising Method Engineering, 2013, 5, 522-526 ttp://dx.doi.org/10.4236/eng.2013.510b107 Publised Online October 2013 (ttp://www.scirp.org/journal/eng) Two Modifications of Weigt Calculation of te Non-Local Means Denoising

More information

Numerical Derivatives

Numerical Derivatives Lab 15 Numerical Derivatives Lab Objective: Understand and implement finite difference approximations of te derivative in single and multiple dimensions. Evaluate te accuracy of tese approximations. Ten

More information

A Blind Steganalysis on JPEG Gray Level Image Based on Statistical Features and its Performance Analysis

A Blind Steganalysis on JPEG Gray Level Image Based on Statistical Features and its Performance Analysis International Journal of Engineering Research and Development e-issn: 2278-067X, p-issn: 2278-800X, www.ijerd.com Volume 11, Issue 09 (September 2015), PP.27-31 A Blind Steganalysis on JPEG Gray Level

More information

Fast Calculation of Thermodynamic Properties of Water and Steam in Process Modelling using Spline Interpolation

Fast Calculation of Thermodynamic Properties of Water and Steam in Process Modelling using Spline Interpolation P R E P R N T CPWS XV Berlin, September 8, 008 Fast Calculation of Termodynamic Properties of Water and Steam in Process Modelling using Spline nterpolation Mattias Kunick a, Hans-Joacim Kretzscmar a,

More information

Multi-Stack Boundary Labeling Problems

Multi-Stack Boundary Labeling Problems Multi-Stack Boundary Labeling Problems Micael A. Bekos 1, Micael Kaufmann 2, Katerina Potika 1 Antonios Symvonis 1 1 National Tecnical University of Atens, Scool of Applied Matematical & Pysical Sciences,

More information

Investigating an automated method for the sensitivity analysis of functions

Investigating an automated method for the sensitivity analysis of functions Investigating an automated metod for te sensitivity analysis of functions Sibel EKER s.eker@student.tudelft.nl Jill SLINGER j..slinger@tudelft.nl Delft University of Tecnology 2628 BX, Delft, te Neterlands

More information

3.6 Directional Derivatives and the Gradient Vector

3.6 Directional Derivatives and the Gradient Vector 288 CHAPTER 3. FUNCTIONS OF SEVERAL VARIABLES 3.6 Directional Derivatives and te Gradient Vector 3.6.1 Functions of two Variables Directional Derivatives Let us first quickly review, one more time, te

More information

CESILA: Communication Circle External Square Intersection-Based WSN Localization Algorithm

CESILA: Communication Circle External Square Intersection-Based WSN Localization Algorithm Sensors & Transducers 2013 by IFSA ttp://www.sensorsportal.com CESILA: Communication Circle External Square Intersection-Based WSN Localization Algoritm Sun Hongyu, Fang Ziyi, Qu Guannan College of Computer

More information

PYRAMID FILTERS BASED ON BILINEAR INTERPOLATION

PYRAMID FILTERS BASED ON BILINEAR INTERPOLATION PYRAMID FILTERS BASED ON BILINEAR INTERPOLATION Martin Kraus Computer Grapics and Visualization Group, Tecnisce Universität Müncen, Germany krausma@in.tum.de Magnus Strengert Visualization and Interactive

More information

Unsupervised Learning for Hierarchical Clustering Using Statistical Information

Unsupervised Learning for Hierarchical Clustering Using Statistical Information Unsupervised Learning for Hierarcical Clustering Using Statistical Information Masaru Okamoto, Nan Bu, and Tosio Tsuji Department of Artificial Complex System Engineering Hirosima University Kagamiyama

More information

EMPIRICAL ANALYSIS ON STEGANOGRAPHY USING JSTEG, OUTGUESS 0.1 AND F5 ALGORITHMS

EMPIRICAL ANALYSIS ON STEGANOGRAPHY USING JSTEG, OUTGUESS 0.1 AND F5 ALGORITHMS EMPIRICAL ANALYSIS ON STEGANOGRAPHY USING JSTEG, OUTGUESS 0.1 AND F5 ALGORITHMS Dr. N.MANOHARAN 1 Dr.R.BALASUBRAMANIAN 2 S.UMA NANDHINI 3 V.SUJATHA 4 1 Assistant Professor in Department of Computer Science,

More information

MAC-CPTM Situations Project

MAC-CPTM Situations Project raft o not use witout permission -P ituations Project ituation 20: rea of Plane Figures Prompt teacer in a geometry class introduces formulas for te areas of parallelograms, trapezoids, and romi. e removes

More information

Symmetric Tree Replication Protocol for Efficient Distributed Storage System*

Symmetric Tree Replication Protocol for Efficient Distributed Storage System* ymmetric Tree Replication Protocol for Efficient Distributed torage ystem* ung Cune Coi 1, Hee Yong Youn 1, and Joong up Coi 2 1 cool of Information and Communications Engineering ungkyunkwan University

More information

ANTENNA SPHERICAL COORDINATE SYSTEMS AND THEIR APPLICATION IN COMBINING RESULTS FROM DIFFERENT ANTENNA ORIENTATIONS

ANTENNA SPHERICAL COORDINATE SYSTEMS AND THEIR APPLICATION IN COMBINING RESULTS FROM DIFFERENT ANTENNA ORIENTATIONS NTNN SPHRICL COORDINT SSTMS ND THIR PPLICTION IN COMBINING RSULTS FROM DIFFRNT NTNN ORINTTIONS llen C. Newell, Greg Hindman Nearfield Systems Incorporated 133. 223 rd St. Bldg. 524 Carson, C 9745 US BSTRCT

More information

REVERSIBLE DATA HIDING USING IMPROVED INTERPOLATION TECHNIQUE

REVERSIBLE DATA HIDING USING IMPROVED INTERPOLATION TECHNIQUE International Researc Journal of Engineering and Tecnology (IRJET) e-issn: 2395-0056 REVERSIBLE DATA HIDING USING IMPROVED INTERPOLATION TECHNIQUE Devendra Kumar 1, Dr. Krisna Raj 2 (Professor in ECE Department

More information

Cubic smoothing spline

Cubic smoothing spline Cubic smooting spline Menu: QCExpert Regression Cubic spline e module Cubic Spline is used to fit any functional regression curve troug data wit one independent variable x and one dependent random variable

More information

The Euler and trapezoidal stencils to solve d d x y x = f x, y x

The Euler and trapezoidal stencils to solve d d x y x = f x, y x restart; Te Euler and trapezoidal stencils to solve d d x y x = y x Te purpose of tis workseet is to derive te tree simplest numerical stencils to solve te first order d equation y x d x = y x, and study

More information

2 The Derivative. 2.0 Introduction to Derivatives. Slopes of Tangent Lines: Graphically

2 The Derivative. 2.0 Introduction to Derivatives. Slopes of Tangent Lines: Graphically 2 Te Derivative Te two previous capters ave laid te foundation for te study of calculus. Tey provided a review of some material you will need and started to empasize te various ways we will view and use

More information

Linear Interpolating Splines

Linear Interpolating Splines Jim Lambers MAT 772 Fall Semester 2010-11 Lecture 17 Notes Tese notes correspond to Sections 112, 11, and 114 in te text Linear Interpolating Splines We ave seen tat ig-degree polynomial interpolation

More information

An Algorithm for Loopless Deflection in Photonic Packet-Switched Networks

An Algorithm for Loopless Deflection in Photonic Packet-Switched Networks An Algoritm for Loopless Deflection in Potonic Packet-Switced Networks Jason P. Jue Center for Advanced Telecommunications Systems and Services Te University of Texas at Dallas Ricardson, TX 75083-0688

More information

Tuning MAX MIN Ant System with off-line and on-line methods

Tuning MAX MIN Ant System with off-line and on-line methods Université Libre de Bruxelles Institut de Recerces Interdisciplinaires et de Développements en Intelligence Artificielle Tuning MAX MIN Ant System wit off-line and on-line metods Paola Pellegrini, Tomas

More information

HASH ALGORITHMS: A DESIGN FOR PARALLEL CALCULATIONS

HASH ALGORITHMS: A DESIGN FOR PARALLEL CALCULATIONS HASH ALGORITHMS: A DESIGN FOR PARALLEL CALCULATIONS N.G.Bardis Researc Associate Hellenic Ministry of te Interior, Public Administration and Decentralization 8, Dragatsaniou str., Klatmonos S. 0559, Greece

More information

An Analytical Approach to Real-Time Misbehavior Detection in IEEE Based Wireless Networks

An Analytical Approach to Real-Time Misbehavior Detection in IEEE Based Wireless Networks Tis paper was presented as part of te main tecnical program at IEEE INFOCOM 20 An Analytical Approac to Real-Time Misbeavior Detection in IEEE 802. Based Wireless Networks Jin Tang, Yu Ceng Electrical

More information

Optimal In-Network Packet Aggregation Policy for Maximum Information Freshness

Optimal In-Network Packet Aggregation Policy for Maximum Information Freshness 1 Optimal In-etwork Packet Aggregation Policy for Maimum Information Fresness Alper Sinan Akyurek, Tajana Simunic Rosing Electrical and Computer Engineering, University of California, San Diego aakyurek@ucsd.edu,

More information

On the Use of Radio Resource Tests in Wireless ad hoc Networks

On the Use of Radio Resource Tests in Wireless ad hoc Networks Tecnical Report RT/29/2009 On te Use of Radio Resource Tests in Wireless ad oc Networks Diogo Mónica diogo.monica@gsd.inesc-id.pt João Leitão jleitao@gsd.inesc-id.pt Luis Rodrigues ler@ist.utl.pt Carlos

More information

12.2 Techniques for Evaluating Limits

12.2 Techniques for Evaluating Limits 335_qd /4/5 :5 PM Page 863 Section Tecniques for Evaluating Limits 863 Tecniques for Evaluating Limits Wat ou sould learn Use te dividing out tecnique to evaluate its of functions Use te rationalizing

More information

Hash-Based Indexes. Chapter 11. Comp 521 Files and Databases Spring

Hash-Based Indexes. Chapter 11. Comp 521 Files and Databases Spring Has-Based Indexes Capter 11 Comp 521 Files and Databases Spring 2010 1 Introduction As for any index, 3 alternatives for data entries k*: Data record wit key value k

More information

CE 221 Data Structures and Algorithms

CE 221 Data Structures and Algorithms CE Data Structures and Algoritms Capter 4: Trees (AVL Trees) Text: Read Weiss, 4.4 Izmir University of Economics AVL Trees An AVL (Adelson-Velskii and Landis) tree is a binary searc tree wit a balance

More information

Minimizing Memory Access By Improving Register Usage Through High-level Transformations

Minimizing Memory Access By Improving Register Usage Through High-level Transformations Minimizing Memory Access By Improving Register Usage Troug Hig-level Transformations San Li Scool of Computer Engineering anyang Tecnological University anyang Avenue, SIGAPORE 639798 Email: p144102711@ntu.edu.sg

More information

Alpha-trimmed Image Estimation for JPEG Steganography Detection

Alpha-trimmed Image Estimation for JPEG Steganography Detection Proceedings of the 2009 IEEE International Conference on Systems, Man, and Cybernetics San Antonio, TX, USA - October 2009 Alpha-trimmed Image Estimation for JPEG Steganography Detection Mei-Ching Chen,

More information

Non-Interferometric Testing

Non-Interferometric Testing NonInterferometric Testing.nb Optics 513 - James C. Wyant 1 Non-Interferometric Testing Introduction In tese notes four non-interferometric tests are described: (1) te Sack-Hartmann test, (2) te Foucault

More information

Solutions Manual for Fundamentals of Fluid Mechanics 7th edition by Munson Rothmayer Okiishi and Huebsch

Solutions Manual for Fundamentals of Fluid Mechanics 7th edition by Munson Rothmayer Okiishi and Huebsch Solutions Manual for Fundamentals of Fluid Mecanics 7t edition by Munson Rotmayer Okiisi and Huebsc Link full download : ttps://digitalcontentmarket.org/download/solutions-manual-forfundamentals-of-fluid-mecanics-7t-edition-by-munson-rotmayer-okiisi-and-uebsc/

More information

Intra- and Inter-Session Network Coding in Wireless Networks

Intra- and Inter-Session Network Coding in Wireless Networks Intra- and Inter-Session Network Coding in Wireless Networks Hulya Seferoglu, Member, IEEE, Atina Markopoulou, Member, IEEE, K K Ramakrisnan, Fellow, IEEE arxiv:857v [csni] 3 Feb Abstract In tis paper,

More information

Mean Shifting Gradient Vector Flow: An Improved External Force Field for Active Surfaces in Widefield Microscopy.

Mean Shifting Gradient Vector Flow: An Improved External Force Field for Active Surfaces in Widefield Microscopy. Mean Sifting Gradient Vector Flow: An Improved External Force Field for Active Surfaces in Widefield Microscopy. Margret Keuper Cair of Pattern Recognition and Image Processing Computer Science Department

More information

Traffic Sign Classification Using Ring Partitioned Method

Traffic Sign Classification Using Ring Partitioned Method Traffic Sign Classification Using Ring Partitioned Metod Aryuanto Soetedjo and Koici Yamada Laboratory for Management and Information Systems Science, Nagaoa University of Tecnology 603- Kamitomioamaci,

More information

An Effective Sensor Deployment Strategy by Linear Density Control in Wireless Sensor Networks Chiming Huang and Rei-Heng Cheng

An Effective Sensor Deployment Strategy by Linear Density Control in Wireless Sensor Networks Chiming Huang and Rei-Heng Cheng An ffective Sensor Deployment Strategy by Linear Density Control in Wireless Sensor Networks Ciming Huang and ei-heng Ceng 5 De c e mbe r0 International Journal of Advanced Information Tecnologies (IJAIT),

More information

A Cost Model for Distributed Shared Memory. Using Competitive Update. Jai-Hoon Kim Nitin H. Vaidya. Department of Computer Science

A Cost Model for Distributed Shared Memory. Using Competitive Update. Jai-Hoon Kim Nitin H. Vaidya. Department of Computer Science A Cost Model for Distributed Sared Memory Using Competitive Update Jai-Hoon Kim Nitin H. Vaidya Department of Computer Science Texas A&M University College Station, Texas, 77843-3112, USA E-mail: fjkim,vaidyag@cs.tamu.edu

More information

Classification of Osteoporosis using Fractal Texture Features

Classification of Osteoporosis using Fractal Texture Features Classification of Osteoporosis using Fractal Texture Features V.Srikant, C.Dines Kumar and A.Tobin Department of Electronics and Communication Engineering Panimalar Engineering College Cennai, Tamil Nadu,

More information

PROTOTYPE OF LOAD CELL APPLICATION IN TORQE MEASUREMENT

PROTOTYPE OF LOAD CELL APPLICATION IN TORQE MEASUREMENT IMEKO 21 TC3, TC5 and TC22 Conferences Metrology in Modern Context November 22 25, 21, Pattaya, Conburi, Tailand PROTOTYPE OF LOAD CELL APPLICATION IN TORQE MEASUREMENT Tassanai Sanponpute 1, Cokcai Wattong

More information

Section 1.2 The Slope of a Tangent

Section 1.2 The Slope of a Tangent Section 1.2 Te Slope of a Tangent You are familiar wit te concept of a tangent to a curve. Wat geometric interpretation can be given to a tangent to te grap of a function at a point? A tangent is te straigt

More information

Redundancy Awareness in SQL Queries

Redundancy Awareness in SQL Queries Redundancy Awareness in QL Queries Bin ao and Antonio Badia omputer Engineering and omputer cience Department University of Louisville bin.cao,abadia @louisville.edu Abstract In tis paper, we study QL

More information

CS231A Final Project - Video to PDF

CS231A Final Project - Video to PDF CS231A Final Project - Video to PDF Yuki Inoue Scool of Electrical Engineering Stanford University Email: yinoue93@stanford.edu Jason Liu Department of Computer Science Stanford University Email: liujas00@stanford.edu

More information

RECONSTRUCTING OF A GIVEN PIXEL S THREE- DIMENSIONAL COORDINATES GIVEN BY A PERSPECTIVE DIGITAL AERIAL PHOTOS BY APPLYING DIGITAL TERRAIN MODEL

RECONSTRUCTING OF A GIVEN PIXEL S THREE- DIMENSIONAL COORDINATES GIVEN BY A PERSPECTIVE DIGITAL AERIAL PHOTOS BY APPLYING DIGITAL TERRAIN MODEL IV. Évfolyam 3. szám - 2009. szeptember Horvát Zoltán orvat.zoltan@zmne.u REONSTRUTING OF GIVEN PIXEL S THREE- DIMENSIONL OORDINTES GIVEN Y PERSPETIVE DIGITL ERIL PHOTOS Y PPLYING DIGITL TERRIN MODEL bsztrakt/bstract

More information

Further Study on YASS: Steganography Based on Randomized Embedding to Resist Blind Steganalysis

Further Study on YASS: Steganography Based on Randomized Embedding to Resist Blind Steganalysis Further Study on YASS: Steganography Based on Randomized Embedding to Resist Blind Steganalysis Anindya Sarkar, Kaushal Solanki and B. S. Manjunath Department of Electrical and Computer Engineering, University

More information

Detection of double-compression for applications in steganography

Detection of double-compression for applications in steganography 1 Detection of double-compression for applications in steganography Tomáš Pevný and Jessica Fridrich Abstract This paper presents a method for detection of double JPEG compression and a maximum likelihood

More information

Hash-Based Indexes. Chapter 11. Comp 521 Files and Databases Fall

Hash-Based Indexes. Chapter 11. Comp 521 Files and Databases Fall Has-Based Indexes Capter 11 Comp 521 Files and Databases Fall 2012 1 Introduction Hasing maps a searc key directly to te pid of te containing page/page-overflow cain Doesn t require intermediate page fetces

More information

A Novel QC-LDPC Code with Flexible Construction and Low Error Floor

A Novel QC-LDPC Code with Flexible Construction and Low Error Floor A Novel QC-LDPC Code wit Flexile Construction and Low Error Floor Hanxin WANG,2, Saoping CHEN,2,CuitaoZHU,2 and Kaiyou SU Department of Electronics and Information Engineering, Sout-Central University

More information

Some Handwritten Signature Parameters in Biometric Recognition Process

Some Handwritten Signature Parameters in Biometric Recognition Process Some Handwritten Signature Parameters in Biometric Recognition Process Piotr Porwik Institute of Informatics, Silesian Uniersity, Bdziska 39, 41- Sosnowiec, Poland porwik@us.edu.pl Tomasz Para Institute

More information

UUV DEPTH MEASUREMENT USING CAMERA IMAGES

UUV DEPTH MEASUREMENT USING CAMERA IMAGES ABCM Symposium Series in Mecatronics - Vol. 3 - pp.292-299 Copyrigt c 2008 by ABCM UUV DEPTH MEASUREMENT USING CAMERA IMAGES Rogerio Yugo Takimoto Graduate Scool of Engineering Yokoama National University

More information

Developing an Efficient Algorithm for Image Fusion Using Dual Tree- Complex Wavelet Transform

Developing an Efficient Algorithm for Image Fusion Using Dual Tree- Complex Wavelet Transform ISSN(Online): 30-980 ISSN (Print): 30-9798 (An ISO 397: 007 Certified Organization) Vol. 3, Issue 4, April 05 Developing an Efficient Algoritm for Image Fusion Using Dual Tree- Complex Wavelet Transform

More information

Detection of double-compression in JPEG images for applications in steganography

Detection of double-compression in JPEG images for applications in steganography 1 Detection of double-compression in JPEG images for applications in steganography Tomáš Pevný and Jessica Fridrich Abstract This paper presents a method for detection of double JPEG compression and a

More information

Coarticulation: An Approach for Generating Concurrent Plans in Markov Decision Processes

Coarticulation: An Approach for Generating Concurrent Plans in Markov Decision Processes Coarticulation: An Approac for Generating Concurrent Plans in Markov Decision Processes Kasayar Roanimanes kas@cs.umass.edu Sridar Maadevan maadeva@cs.umass.edu Department of Computer Science, University

More information

Section 2.3: Calculating Limits using the Limit Laws

Section 2.3: Calculating Limits using the Limit Laws Section 2.3: Calculating Limits using te Limit Laws In previous sections, we used graps and numerics to approimate te value of a it if it eists. Te problem wit tis owever is tat it does not always give

More information

H-Adaptive Multiscale Schemes for the Compressible Navier-Stokes Equations Polyhedral Discretization, Data Compression and Mesh Generation

H-Adaptive Multiscale Schemes for the Compressible Navier-Stokes Equations Polyhedral Discretization, Data Compression and Mesh Generation H-Adaptive Multiscale Scemes for te Compressible Navier-Stokes Equations Polyedral Discretization, Data Compression and Mes Generation F. Bramkamp 1, B. Gottsclic-Müller 2, M. Hesse 1, P. Lamby 2, S. Müller

More information

An Anchor Chain Scheme for IP Mobility Management

An Anchor Chain Scheme for IP Mobility Management An Ancor Cain Sceme for IP Mobility Management Yigal Bejerano and Israel Cidon Department of Electrical Engineering Tecnion - Israel Institute of Tecnology Haifa 32000, Israel E-mail: bej@tx.tecnion.ac.il.

More information

2.8 The derivative as a function

2.8 The derivative as a function CHAPTER 2. LIMITS 56 2.8 Te derivative as a function Definition. Te derivative of f(x) istefunction f (x) defined as follows f f(x + ) f(x) (x). 0 Note: tis differs from te definition in section 2.7 in

More information

Network Coding to Enhance Standard Routing Protocols in Wireless Mesh Networks

Network Coding to Enhance Standard Routing Protocols in Wireless Mesh Networks Downloaded from vbn.aau.dk on: April 7, 09 Aalborg Universitet etwork Coding to Enance Standard Routing Protocols in Wireless Mes etworks Palevani, Peyman; Roetter, Daniel Enrique Lucani; Fitzek, Frank;

More information

Distributed and Optimal Rate Allocation in Application-Layer Multicast

Distributed and Optimal Rate Allocation in Application-Layer Multicast Distributed and Optimal Rate Allocation in Application-Layer Multicast Jinyao Yan, Martin May, Bernard Plattner, Wolfgang Mülbauer Computer Engineering and Networks Laboratory, ETH Zuric, CH-8092, Switzerland

More information

Implementation of Integral based Digital Curvature Estimators in DGtal

Implementation of Integral based Digital Curvature Estimators in DGtal Implementation of Integral based Digital Curvature Estimators in DGtal David Coeurjolly 1, Jacques-Olivier Lacaud 2, Jérémy Levallois 1,2 1 Université de Lyon, CNRS INSA-Lyon, LIRIS, UMR5205, F-69621,

More information

Overcomplete Steerable Pyramid Filters and Rotation Invariance

Overcomplete Steerable Pyramid Filters and Rotation Invariance vercomplete Steerable Pyramid Filters and Rotation Invariance H. Greenspan, S. Belongie R. Goodman and P. Perona S. Raksit and C. H. Anderson Department of Electrical Engineering Department of Anatomy

More information

Proceedings of the 8th WSEAS International Conference on Neural Networks, Vancouver, British Columbia, Canada, June 19-21,

Proceedings of the 8th WSEAS International Conference on Neural Networks, Vancouver, British Columbia, Canada, June 19-21, Proceedings of te 8t WSEAS International Conference on Neural Networks, Vancouver, Britis Columbia, Canada, June 9-2, 2007 3 Neural Network Structures wit Constant Weigts to Implement Dis-Jointly Removed

More information

Introduction to Computer Graphics 5. Clipping

Introduction to Computer Graphics 5. Clipping Introduction to Computer Grapics 5. Clipping I-Cen Lin, Assistant Professor National Ciao Tung Univ., Taiwan Textbook: E.Angel, Interactive Computer Grapics, 5 t Ed., Addison Wesley Ref:Hearn and Baker,

More information

MAP MOSAICKING WITH DISSIMILAR PROJECTIONS, SPATIAL RESOLUTIONS, DATA TYPES AND NUMBER OF BANDS 1. INTRODUCTION

MAP MOSAICKING WITH DISSIMILAR PROJECTIONS, SPATIAL RESOLUTIONS, DATA TYPES AND NUMBER OF BANDS 1. INTRODUCTION MP MOSICKING WITH DISSIMILR PROJECTIONS, SPTIL RESOLUTIONS, DT TYPES ND NUMBER OF BNDS Tyler J. lumbaug and Peter Bajcsy National Center for Supercomputing pplications 605 East Springfield venue, Campaign,

More information

Research Article A Novel Steganalytic Algorithm based on III Level DWT with Energy as Feature

Research Article A Novel Steganalytic Algorithm based on III Level DWT with Energy as Feature Research Journal of Applied Sciences, Engineering and Technology 7(19): 4100-4105, 2014 DOI:10.19026/rjaset.7.773 ISSN: 2040-7459; e-issn: 2040-7467 2014 Maxwell Scientific Publication Corp. Submitted:

More information

MAPI Computer Vision

MAPI Computer Vision MAPI Computer Vision Multiple View Geometry In tis module we intend to present several tecniques in te domain of te 3D vision Manuel Joao University of Mino Dep Industrial Electronics - Applications -

More information

, 1 1, A complex fraction is a quotient of rational expressions (including their sums) that result

, 1 1, A complex fraction is a quotient of rational expressions (including their sums) that result RT. Complex Fractions Wen working wit algebraic expressions, sometimes we come across needing to simplify expressions like tese: xx 9 xx +, xx + xx + xx, yy xx + xx + +, aa Simplifying Complex Fractions

More information

IMAGE ENCRYPTION BASED ON CHAOTIC MAP AND REVERSIBLE INTEGER WAVELET TRANSFORM

IMAGE ENCRYPTION BASED ON CHAOTIC MAP AND REVERSIBLE INTEGER WAVELET TRANSFORM Journal of ELECTRICAL ENGINEERING, VOL. 65, NO., 014, 90 96 IMAGE ENCRYPTION BASED ON CHAOTIC MAP AND REVERSIBLE INTEGER WAVELET TRANSFORM Xiaopeng Wei Bin Wang Qiang Zang Cao Ce In recent years, tere

More information

An Interactive X-Ray Image Segmentation Technique for Bone Extraction

An Interactive X-Ray Image Segmentation Technique for Bone Extraction An Interactive X-Ray Image Segmentation Tecnique for Bone Extraction Cristina Stolojescu-Crisan and Stefan Holban Politenica University of Timisoara V. Parvan 2, 300223 Timisoara, Romania {cristina.stolojescu@etc.upt.ro

More information

Announcements. Lilian s office hours rescheduled: Fri 2-4pm HW2 out tomorrow, due Thursday, 7/7. CSE373: Data Structures & Algorithms

Announcements. Lilian s office hours rescheduled: Fri 2-4pm HW2 out tomorrow, due Thursday, 7/7. CSE373: Data Structures & Algorithms Announcements Lilian s office ours resceduled: Fri 2-4pm HW2 out tomorrow, due Tursday, 7/7 CSE373: Data Structures & Algoritms Deletion in BST 2 5 5 2 9 20 7 0 7 30 Wy migt deletion be arder tan insertion?

More information

Parallel Simulation of Equation-Based Models on CUDA-Enabled GPUs

Parallel Simulation of Equation-Based Models on CUDA-Enabled GPUs Parallel Simulation of Equation-Based Models on CUDA-Enabled GPUs Per Ostlund Department of Computer and Information Science Linkoping University SE-58183 Linkoping, Sweden per.ostlund@liu.se Kristian

More information

Asynchronous Power Flow on Graphic Processing Units

Asynchronous Power Flow on Graphic Processing Units 1 Asyncronous Power Flow on Grapic Processing Units Manuel Marin, Student Member, IEEE, David Defour, and Federico Milano, Senior Member, IEEE Abstract Asyncronous iterations can be used to implement fixed-point

More information

Software Fault Prediction using Machine Learning Algorithm Pooja Garg 1 Mr. Bhushan Dua 2

Software Fault Prediction using Machine Learning Algorithm Pooja Garg 1 Mr. Bhushan Dua 2 IJSRD - International Journal for Scientific Researc & Development Vol. 3, Issue 04, 2015 ISSN (online): 2321-0613 Software Fault Prediction using Macine Learning Algoritm Pooja Garg 1 Mr. Busan Dua 2

More information

Traffic Pattern-based Adaptive Routing for Intra-group Communication in Dragonfly Networks

Traffic Pattern-based Adaptive Routing for Intra-group Communication in Dragonfly Networks Traffic Pattern-based Adaptive Routing for Intra-group Communication in Dragonfly Networks Peyman Faizian, Md Safayat Raman, Md Atiqul Molla, Xin Yuan Department of Computer Science Florida State University

More information

Benchmarking steganographic and steganalysis techniques

Benchmarking steganographic and steganalysis techniques Benchmarking steganographic and steganalysis techniques Mehdi Kharrazi a, Husrev T. Sencar b Nasir Memon b a Department of Electrical and Computer Engineering b Department of Computer and Information Science

More information

Interference and Diffraction of Light

Interference and Diffraction of Light Interference and Diffraction of Ligt References: [1] A.P. Frenc: Vibrations and Waves, Norton Publ. 1971, Capter 8, p. 280-297 [2] PASCO Interference and Diffraction EX-9918 guide (written by Ann Hanks)

More information

Comparison of the Efficiency of the Various Algorithms in Stratified Sampling when the Initial Solutions are Determined with Geometric Method

Comparison of the Efficiency of the Various Algorithms in Stratified Sampling when the Initial Solutions are Determined with Geometric Method International Journal of Statistics and Applications 0, (): -0 DOI: 0.9/j.statistics.000.0 Comparison of te Efficiency of te Various Algoritms in Stratified Sampling wen te Initial Solutions are Determined

More information

Truncated Newton-based multigrid algorithm for centroidal Voronoi diagram calculation

Truncated Newton-based multigrid algorithm for centroidal Voronoi diagram calculation NUMERICAL MATHEMATICS: Teory, Metods and Applications Numer. Mat. Teor. Met. Appl., Vol. xx, No. x, pp. 1-18 (200x) Truncated Newton-based multigrid algoritm for centroidal Voronoi diagram calculation

More information

Data Hiding in Video

Data Hiding in Video Data Hiding in Video J. J. Chae and B. S. Manjunath Department of Electrical and Computer Engineering University of California, Santa Barbara, CA 9316-956 Email: chaejj, manj@iplab.ece.ucsb.edu Abstract

More information

UNSUPERVISED HIERARCHICAL IMAGE SEGMENTATION BASED ON THE TS-MRF MODEL AND FAST MEAN-SHIFT CLUSTERING

UNSUPERVISED HIERARCHICAL IMAGE SEGMENTATION BASED ON THE TS-MRF MODEL AND FAST MEAN-SHIFT CLUSTERING UNSUPERVISED HIERARCHICAL IMAGE SEGMENTATION BASED ON THE TS-MRF MODEL AND FAST MEAN-SHIFT CLUSTERING Raffaele Gaetano, Giuseppe Scarpa, Giovanni Poggi, and Josiane Zerubia Dip. Ing. Elettronica e Telecomunicazioni,

More information

Optimizing Pixel Predictors for Steganalysis

Optimizing Pixel Predictors for Steganalysis Optimizing Pixel Predictors for Steganalysis Vojtěch Holub and Jessica Fridrich Dept. of Electrical and Computer Engineering SUNY Binghamton, New York IS&T / SPIE 2012, San Francisco, CA Steganography

More information

Soft sensor modelling by time difference, recursive partial least squares and adaptive model updating

Soft sensor modelling by time difference, recursive partial least squares and adaptive model updating Soft sensor modelling by time difference, recursive partial least squares adaptive model updating Y Fu 1, 2, W Yang 2, O Xu 1, L Zou 3, J Wang 4 1 Zijiang College, Zejiang University of ecnology, Hangzou

More information

Integrating Constraints and Metric Learning in Semi-Supervised Clustering

Integrating Constraints and Metric Learning in Semi-Supervised Clustering Integrating Constraints and Metric Learning in Semi-Supervised Clustering Mikail Bilenko MBILENKO@CS.UTEXAS.EDU Sugato Basu SUGATO@CS.UTEXAS.EDU Raymond J. Mooney MOONEY@CS.UTEXAS.EDU Department of Computer

More information

Multi-Objective Particle Swarm Optimizers: A Survey of the State-of-the-Art

Multi-Objective Particle Swarm Optimizers: A Survey of the State-of-the-Art Multi-Objective Particle Swarm Optimizers: A Survey of te State-of-te-Art Margarita Reyes-Sierra and Carlos A. Coello Coello CINVESTAV-IPN (Evolutionary Computation Group) Electrical Engineering Department,

More information

Modern Steganalysis Can Detect YASS

Modern Steganalysis Can Detect YASS Jan Kodovský, Tomáš Pevný, Jessica Fridrich January 18, 2010 / SPIE 1 / 13 YASS Curriculum Vitae Birth Location: University of California, Santa Barbara Birth Date: More than 2 years ago [Solanki-2007],

More information

CRASHWORTHINESS ASSESSMENT IN AIRCRAFT DITCHING INCIDENTS

CRASHWORTHINESS ASSESSMENT IN AIRCRAFT DITCHING INCIDENTS 27 TH INTERNATIONAL CONGRESS OF THE AERONAUTICAL SCIENCES CRASHWORTHINESS ASSESSMENT IN AIRCRAFT DITCHING INCIDENTS C. Candra*, T. Y. Wong* and J. Bayandor** * Te Sir Lawrence Wackett Aerospace Centre

More information

Analytical CHEMISTRY

Analytical CHEMISTRY ISSN : 974-749 Grap kernels and applications in protein classification Jiang Qiangrong*, Xiong Zikang, Zai Can Department of Computer Science, Beijing University of Tecnology, Beijing, (CHINA) E-mail:

More information

Tilings of rectangles with T-tetrominoes

Tilings of rectangles with T-tetrominoes Tilings of rectangles wit T-tetrominoes Micael Korn and Igor Pak Department of Matematics Massacusetts Institute of Tecnology Cambridge, MA, 2139 mikekorn@mit.edu, pak@mat.mit.edu August 26, 23 Abstract

More information