Feature-Based Steganalysis for JPEG Images and its Implications for Future Design of Steganographic Schemes
|
|
- Amelia Hope Fisher
- 6 years ago
- Views:
Transcription
1 Feature-Based Steganalysis for JPEG Images and its Implications for Future Design of Steganograpic Scemes Jessica Fridric Dept. of Electrical Engineering, SUNY Bingamton, Bingamton, NY , USA ttp:// Abstract. In tis paper, we introduce a new feature-based steganalytic metod for JPEG images and use it as a bencmark for comparing JPEG steganograpic algoritms and evaluating teir embedding mecanisms. Te detection metod is a linear classifier trained on feature vectors corresponding to cover and stego images. In contrast to previous blind approaces, te features are calculated as an norm of te difference between a specific macroscopic functional calculated from te stego image and te same functional obtained from a decompressed, cropped, and recompressed stego image. Te functionals are built from marginal and joint statistics of DCT coefficients. Because te features are calculated directly from DCT coefficients, conclusions can be drawn about te impact of embedding modifications on detectability. Tree different steganograpic paradigms are tested and compared. Experimental results reveal new facts about current steganograpic metods for JPEGs and new design principles for more secure JPEG steganograpy. Introduction Steganograpy is te art of invisible communication. Its purpose is to ide te very presence of communication by embedding messages into innocuous-looking cover objects. Eac steganograpic communication system consists of an embedding algoritm and an extraction algoritm. To accommodate a secret message in a digital image, te original cover image is sligtly modified by te embedding algoritm. As a result, te stego image is obtained. Steganalysis is te art of discovering idden data in cover objects. As in cryptanalysis, it is assumed tat te steganograpic metod is publicly known wit te exception of a secret key. Steganograpy is considered secure if te stego-images do not contain any detectable artifacts due to message embedding. In oter words, te set of stego-images sould ave te same statistical properties as te set of cover-images. If tere exists an algoritm tat can guess weter or not a given image contains a secret message wit a success rate better tan random guessing, te steganograpic
2 system is considered broken. For a more exact treatment of te concept of steganograpic security, te reader is referred to [,2].. Steganalytic Metods Several trends ave recently appeared in steganalysis. One of te first general steganalytic metods was te ci-square attack by Westfeld [3]. Te original version of tis attack could detect sequentially embedded messages and was later generalized to randomly scattered messages [4,5]. Because tis approac is based solely on te first order statistics and is applicable only to idempotent embedding operations, suc as SB (east Significant Bit) flipping, its applicability to modern steganograpic scemes, tat are aware of te Cacin criterion [2], is rater limited. Anoter major stream in steganalysis is based on te concept of a distinguising statistic [6]. In tis approac, te steganalyst first carefully inspects te embedding algoritm and ten identifies a quantity (te distinguising statistics) tat canges predictably wit te lengt of te embedded message, yet one tat can be calibrated for cover images. For JPEG images, tis calibration is done by decompressing te stego image, cropping by a few pixels in eac direction, and recompressing using te same quantization table. Te distinguising statistic calculated from tis image is used as an estimate for te same quantity from te cover image. Using tis calibration, igly accurate and reliable estimation of te embedded message lengt can be constructed for many scemes [6]. Te detection pilosopy is not limited to any specific type of te embedding operation and works for randomly scattered messages as well. One disadvantage of tis approac is tat te detection needs to be customized to eac embedding paradigm and te design of proper distinguising statistics cannot be easily automatized. Te tird direction in steganalysis is formed by blind classifiers. Pioneered by Memon and Farid [7,5], a blind detector learns wat a typical, unmodified image looks like in a multi-dimensional feature space. A classifier is ten trained to learn te differences between cover and stego image features. Te 72 features proposed by Farid are calculated in te wavelet decomposition of te stego image as te first four moments of coefficients and te log error between te coefficients and teir globally optimal linear prediction from neigboring wavelet modes. Tis metodology combined wit a powerful Support Vector Macine classifier gives very impressive results for most current steganograpic scemes. Farid demonstrated a very reliable detection for J-Steg, bot versions of OutGuess, and for F5 (color images only). Te biggest advantage of blind detectors is teir potential ability to detect any embedding sceme and even to classify embedding tecniques by teir position in te feature space. Among te disadvantages is tat te metodology will always likely be less accurate tan targeted approaces and it may not be possible to accurately estimate te secret message lengt, wic is an important piece of information for te steganalyst. Introducing blind detectors prompted furter researc in steganograpy. Based on te previous work of Eggers [8], Tzscoppe [9] constructed a JPEG steganograpic sceme (HPDM) tat is undetectable using Farid s sceme. However, te same
3 sceme is easily detectable [0] using a single scalar feature te calibrated spatial blockiness [6]. Tis suggests tat it sould be possible to construct a very powerful feature-based detector (blind on te class of JPEG images) if we used calibrated features computed directly in te DCT domain rater tan from a somewat arbitrary wavelet decomposition. Tis is te approac taken in tis paper..2 Proposed Researc We combine te concept of calibration wit te feature-based classification to devise a blind detector specific to JPEG images. By calculating te features directly in te JPEG domain rater tan in te wavelet domain, it appears tat te detection can be made more sensitive to a wider type of embedding algoritms because te calibration process (for details, see Sec. 2) increases te features sensitivity to te embedding modifications wile suppressing image-to-image variations. Anoter advantage of calculating te features in te DCT domain is tat it enables more straigtforward interpretation of te influence of individual features on detection as well as easier formulation of design principles leading to more secure steganograpy. Te proposed detection can also be viewed as a new approac to te definition of steganograpic security. According to Cacin, a steganograpic sceme is considered secure if te Kullback-eibler distance between te distribution of stego and cover images is zero (or small for ε-security). Farid s blind detection is essentially a reflection of tis principle. Farid first determines te statistical model for natural images in te feature space and ten calculates te distance between a specific image and te statistical model. Tis distance is ten used to determine weter te image is a stego image. In our approac, we cange te security model and use te stego image as a side-information to recover some statistics of te cover image. Instead of measuring te distance between te image and a statistical model, we measure te distance between certain parameters of te stego image and te same parameters related to te original image tat we succeeded to capture by calibration. Te paper is organized as follows. In te next section, we explain ow te features are calculated and wy. In Section 3, we give te details of te detection sceme and discuss te experimental results for OutGuess [], F5 [3], and Model Based Steganograpy [2,4]. Implications for future design of steganograpic scemes are discussed in Section 4. Te paper is summarized in Section 5. 2 Calibrated Features Two types of features will be used in our analysis first order features and second order features. Also, some features will be constructed in te DCT domain, wile oters in te spatial domain. In te wole paper, scalar quantities will be represented wit a non-bold italic font, wile vectors and matrices will always be in bold italics. Te norm is defined for a vector (or matrix) as a sum of absolute values of all vector (or matrix) elements.
4 All features are constructed in te following manner. A vector functional F is applied to te stego JPEG image J. Tis functional could be te global DCT coefficient istogram, a co-occurrence matrix, spatial blockiness, etc. Te stego image J is decompressed to te spatial domain, cropped by 4 pixels in eac direction, and recompressed wit te same quantization table as J to obtain J 2. Te same vector functional F is ten applied to J 2. Te final feature f is obtained as an norm of te difference f = F. () ( J) F ( J 2) J 4 pixels J 2 F F(J ) F(J 2 ) F Te logic beind tis coice for features is te following. Te cropping and recompression sould produce a calibrated image wit most macroscopic features similar to te original cover image. Tis is because te cropped stego image is perceptually similar to te cover image and tus its DCT coefficients sould ave approximately te same statistical properties as te cover image. Te cropping by 4 pixels is important because te 8 8 grid of recompression does not see te previous JPEG compression and tus te obtained DCT coefficients are not influenced by previous quantization (and embedding) in te DCT domain. One can tink of te cropped /recompressed image as an approximation to te cover image or as a sideinformation. Te use of te calibrated image as a side-information as proven very useful for design of very accurate targeted steganalytic metods in te past [6]. 2. First Order Features Te simplest first order statistic of DCT coefficients is teir istogram. Suppose te stego JPEG file is represented wit a DCT coefficient array d k (i, j) and te quantization matrix Q(i, j), i, j =,,8, k =,, B. Te symbol d k (i, j) denotes te (i, j)-t quantized DCT coefficient in te k-t block (tere are total of B blocks). Te global istogram of all 64k DCT coefficients will be denoted as H r, were r =,, R, = min k,i,j d k (i, j) and R = max k,i,j d k (i, j). Tere are steganograpic programs tat preserve H [8,0,]. However, te scemes in [8,9,] only preserve te global istogram and not necessarily istograms of individual DCT modes. Tus, we add individual istograms for low frequency DCT modes to our set of functionals. For a fixed DCT mode (i, j), let, r ij = r
5 ,, R, denote te individual istogram of values d k (i, j), k =,, B. We only use istograms of low frequency DCT coefficients because istograms of coefficients from medium and iger frequencies are usually statistically unimportant due to te small number of non-zero coefficients. To provide additional first order macroscopic statistics to our set of functionals, we ave decided to include dual istograms. For a fixed coefficient value d, te dual d istogram is an 8 8 matrix g ij g d ij B = k = were δ(u,v)= if u=v and 0 oterwise. In words, δ ( d, d ( i, j)), (2) k is te number of ow many times te value d occurs as te (i, j)-t DCT coefficient over all B blocks in te JPEG image. Te dual istogram captures ow a given coefficient value d is distributed among different DCT modes. Obviously, if a steganograpic metod preserves all individual istograms, it also preserves all dual istograms and vice versa. d g ij 2.2 Second Order Features If te corresponding DCT coefficients from different blocks were independent, ten any embedding sceme tat preserves te first order statistics te istogram would be undetectable by Cacin s definition of steganograpic security [2]. However, because natural images can exibit iger-order correlations over distances larger tan 8 pixels, individual DCT modes from neigboring blocks are not independent. Tus, it makes sense to use features tat capture inter-block dependencies because tey will likely be violated by most steganograpic algoritms. et I r and I c denote te vectors of block indices wile scanning te image by rows and by columns, respectively. Te first functional capturing inter-block dependency is te variation V defined as V = 8 i, j= I r k = d I r ( k) ( i, j) d I r ( k + ) ( i, j) + I r 8 i, j= + I c Ic k = d Ic ( k) ( i, j) d Ic ( k + ) ( i, j). (3) Most steganograpic tecniques in some sense add entropy to te array of quantized DCT coefficients and tus are more likely to increase te variation V tan decrease. Embedding canges are also likely to increase te discontinuities along te 8 8 block boundaries. In fact, tis property as proved very useful in steganalysis in te past [6,0,2]. Tus, we include two blockiness measures B α, α =, 2, to our set of functionals. Te blockiness is calculated from te decompressed JPEG image and tus represents an integral measure of inter-block dependency over all DCT modes over te wole image:
6 ( M ) / 8 N ( N ) / 8 M α α x8i, j x8i +, j + xi,8 j xi,8 j+ i= j= j= i= Bα = N ( M ) /8 + M ( N ) /8. (4) In te expression above, M and N are image dimensions and x ij are grayscale values of te decompressed JPEG image. Te final tree functionals are calculated from te co-occurrence matrix of neigboring DCT coefficients. Recalling te notation, d k (i, j) R, te cooccurrence matrix C is a square D D matrix, D = R +, defined as follows C st = I r 8 δ k= i, j= c 8 ( s, di ( k) ( i, j) ) δ ( t, di ( k ) ( i, j) ) ( s, di ( k) ( i, j) ) ( t, di ( k ) ( i, j) ) r r + + δ δ c c + I r I + I k= i, j= Te co-occurrence matrix describes te probability distribution of pairs of neigboring DCT coefficients. It usually as a sarp peak at (0,0) and ten quickly falls off. et C(J ) and C(J 2 ) be te co-occurrence matrices for te JPEG image J and its calibrated version J 2, respectively. Due to te approximate symmetry of C st around (s, t) = (0, 0), te differences C st (J ) C st (J 2 ) for (s, t) {(0,), (,0), (,0), (0, )} are strongly positively correlated. Te same is true for te group (s, t) {(,), (,), (, ), (, )}. For practically all steganograpic scemes, te embedding canges to DCT coefficients are essentially perturbations by some small value. Tus, te cooccurrence matrix for te embedded image can be obtained as a convolution C P(q), were P is te probability distribution of te embedding distortion, wic depends on te relative message lengt q. Tis means tat te values of te co-occurrence matrix C P(q) will be more spread out. To quantify tis spreading, we took te following tree quantities as our features: N 00 =C 0,0 (J ) C 0,0 (J 2 ) (6) N 0 =C 0, (J ) C 0, (J 2 )+C,0 (J ) C,0 (J 2 )+C,0 (J ) C,0 (J 2 )+C 0, (J ) C 0, (J 2 ) N =C, (J ) C, (J 2 )+C, (J ) C, (J 2 )+C, (J ) C, (J 2 )+C, (J ) C, (J 2 ). Te final set of 23 functionals (te last tree are directly features) used in tis paper is summarized in Table. c (5) 3 Steganalytic Classifier We used te Greenspun image database ( consisting of 84 images of size approximately All images were converted to grayscale, te black border frame was cropped away, and te images were compressed using an 80% quality JPEG. We selected te F5 algoritm [3], OutGuess 0.2 [], and te
7 recently developed Model based Steganograpy witout (MB) and wit (MB2) deblocking [2,4] as tree examples of different steganograpic paradigms for JPEG images. Eac steganograpic tecnique was analyzed separately. For a fixed relative message lengt expressed in terms of bits per non-zero DCT coefficient of te cover image, we created a training database of embedded images. Te Fiser inear Discriminant classifier was trained on 34 cover and 34 stego images. Te generalized eigenvector obtained from tis training was ten used to calculate te ROC curve for te remaining 500 cover and 500 stego images. Te detection performance was evaluated using detection reliability ρ defined below. Table. All 23 distinguising functionals Functional/feature name Global istogram H / H Individual istograms for 5 DCT modes Dual istograms for DCT values ( 5,, 5) 2 g g 2 5 5, 3 3 Functional F, 2 2, g,, 4 g Variation V and 2 blockiness B, B 2 Co-occurrences N 00, N 0, N (features, not functionals), Te reason wy we used in our tests message lengts proportional to te number of non-zero DCT coefficients in eac image was to create stego image databases for wic te detection is approximately of te same level of difficulty. In our experience, it is easier to detect a 0000-bit message in a smaller JPEG file tan in a larger JPEG file. Te testing was done for te following relative embedding rates expressed in bpc (Bits Per non-zero DCT Coefficient), bpc = 0, 0.05, 0., 0.2, 0.4, 0.6, 0.8. If, for a given image, te bpc rate was larger tan te maximal bpc rate bpc max determined by te image capacity, we took bpc max as te embedding rate. Te only exception to tis rule was te MB2 metod, were we took 0.95 bpc max as te maximal rate because, for te maximal embedding rate, te deblocking algoritm in MB2 frequently failed to embed te wole message. Fig. sows te capacity for all tree metods expressed in bits per non-zero DCT coefficient. Te detection results were evaluated using detection reliability ρ defined as g g 4 4 ρ = 2A, (7) were A is te area under te Receiver Operating Caracteristic (ROC) curve, also called an accuracy. We scaled te accuracy in order to obtain ρ = for a perfect detection and ρ = 0 wen te ROC coincides wit te diagonal line (reliability of detection is 0). Te detection reliability for all tree metods is sown in Table , 22 g g 5 5, 3 3
8 0.8 F Capacity (bpc) MB2 OG image number Fig.. Capacity for te tested tecniques expressed in bits per non-zero DCT coefficient. Te capacity for MB is double tat of MB2. Te F5 and MB algoritms provide te igest capacity Table 2. Detection reliability ρ for F5 wit matrix embedding (, k, 2 k ), F5 wit turned off matrix embedding (,,), OutGuess 0.2 (OG), Model based Steganograpy witout and wit deblocking (MB and MB2, respectively) for different embedding rates (U = unacievable rate) bpc F5 F5_ OG MB MB U U U U U One can clearly see tat te OutGuess algoritm is te most detectable. Also, it provides te smallest capacity. Te detection reliability is relatively ig even for embedding rates as small as 0.05 bpc and te metod becomes igly detectable for messages above 0. bpc. To guarantee a fair comparison, we ave tested F5 bot wit and witout matrix embedding because some programs could be easily adapted to incorporate it (e.g., OutGuess). Turning off te matrix embedding, te F5 algoritm still performs better tan OutGuess. Te matrix embedding significantly decreases te detectability for sort messages. Tis is understandable because it improves te embedding efficiency (number of bits embedded per cange). Because OutGuess needs
9 to reserve a relatively large portion of coefficients for te correction step, its embedding efficiency is lower compared to F5. Tis seems to ave a bigger impact on te detectability tan te fact tat OutGuess preserves te global istogram of DCT coefficients. Table 3. Detection reliability for individual features for all tree embedding algoritms for fully embedded images (for fully embedded images, F5 wit matrix embedding and witout matrix embedding coincide) Functional/feature Metod F5 OutGuess 0.2 MB MB2 Global istogram Indiv. istogram for (2,) Indiv. istogram for (3,) Indiv. istogram for (,2) Indiv. istogram for (2,2) Indiv. istogram for (,3) Dual istogram for Dual istogram for Dual istogram for Dual istogram for Dual istogram for Dual istogram for Dual istogram for Dual istogram for Dual istogram for Dual istogram for Dual istogram for Variation blockiness blockiness Co-occurrence N Co-occurrence N Co-occurrence N Bot MB and MB2 metods clearly ave te best performance of all tree tested algoritms. MB preserves not only te global istogram, but all marginal statistics (istograms) for eac individual DCT mode. It is quite remarkable tat tis can be acieved wit an embedding efficiency sligtly over 2 bits per cange (compared to.5 bits per cange for F5 and rougly for OutGuess 0.2). Tis is likely because MB does not avoid any oter coefficients tan 0 and its embedding mecanism is guaranteed to embed te maximal number of bits given te fact tat marginal statistics of all coefficients must be preserved. Te MB2 algoritm as te same embedding mecanism as MB but reserves one alf of te capacity for modifications tat bring te blockiness of te stego image to its original value. As a result, MB2 is less detectable tan MB at te expense of a two times smaller embedding capacity. Bot metods perform better tan F5 wit matrix embedding and are significantly better tan F5 witout matrix embedding. Even for messages close to 00% capacity, te
10 detection of MB2 is not very reliable. An ROC wit ρ = 0.82 does not allow reliable detection wit a small false positive rate (c.f., Fig. 2). Never te less, in te strict formulation of steganograpic security, wenever te embedded images can be distinguised from cover images wit a better algoritm tan random guessing, te steganograpy is detectable. Tus, we conclude tat te Model based Steganograpy is detectable using our feature-based approac on our test database. F5 OG MB Fig. 2. ROC curves for embedding capacities and metods from Table 2. MB2 For eac steganograpic metod, we also measured te influence of eac individual feature f as its detection reliability ρ(f) obtained from te ROC curve calculated from te single feature f and no oter features. We acknowledge tat te collection of individual reliabilities ρ(f) does not ave to necessarily capture te performance of te wole detection algoritm in te 23 dimensional space. Tis is because it is possible tat none of te individual features temselves as any distinguising power, yet te collection of all features acieves a perfect detection. Never te less, we use ρ(f) as an indication of ow muc eac feature contributes to te detection. In Table 2, we sow te influence of eac feature for eac steganograpic metod for te maximal bpc rate. In te next section, we interpret te results and draw conclusions concerning te existing and future design principles of steganograpic scemes for JPEG images. We note tat in our tests, we did not include double compressed images. It is likely tat suc images would worsen our detection results. In agreement wit te
11 conclusion reaced in [6], te double compression needs to be first estimated and ten corrected for during te feature calibration. Altoug we ave not tested tis, we believe tat te feature-based blind steganalysis would work in tis case as well. 4 Implications for Steganograpy Te F5 algoritm uses a non-idempotent embedding operation (subtracting ) to prevent te attacks based on te ci-square attack and its generalizations [3 5]. It also makes sure tat te global stego image istogram is free of any obvious artifacts and looks natural. In fact, it as been argued by its autors [3] tat te stego image looks as if te cover image was originally compressed wit a lower JPEG quality factor. However, te F5 predictably modifies te first order statistics and tis is wy te first six functionals are so influential (see Table 2). It is also not surprising tat te dual istogram for 0 as a big influence because of te srinkage. Note tat te second-order statistics significantly contribute to te detection as well. Most features wit te exception of dual istograms ave ig influence on detection. OutGuess 0.2 was specifically designed to preserve te global coefficient istogram. However, OutGuess does not ave to necessarily preserve te individual istograms or te dual istograms, wic is reflected by a relatively large influence for tese functionals in Table 2. Te most influential functional is te dual istogram for te values and 2. Tis is again, understandable, considering te embedding mecanism of OutGuess. Te values and 2 determine te maximum correctable capacity of te metod and tus form te most canged pair of values during te embedding (and te correction step). Altoug te coefficient counts are preserved, teir positions in te JPEG file are igly disturbed, wic is wy we see a very ig influence of features based on dual istograms for values and 2. Anoter reason wy OutGuess is more detectable tan F5 is its low embedding efficiency of bit per cange compared to.5 for F5. Considering te large influence of te dual istogram, it seems feasible tat one could design a targeted steganalytic sceme of te type described in [6] by using te dual istograms for values and 2 as te distinguising statistic. Tis is an example ow te blind analysis may, in turn, give us direct ideas ow to estimate te lengt of te embedded message. Wat is somewat surprising is tat te global istogram also as quite a large influence on detection, despite te fact tat it is preserved by OutGuess. We will revisit tis peculiar finding wen we discuss te results for Model Based Steganograpy below. Anoter seemingly surprising fact is tat altoug blockiness proved very useful in designing successful attacks against OutGuess [6], its influence in te proposed detection sceme is relatively small (0.6). Tis fact is peraps less surprising if we realize tat te distinguising statistic in [6] was te increase of blockiness after full re-embedding rater tan te blockiness itself, wic appears to be rater volatile. ooking at te results in Table and 2, tere is no doubt tat te Model Based Steganograpy [2,4] is by far te most secure metod out of te tree tested paradigms. MB and MB2 preserve not only te global istogram but also all istograms
12 of individual DCT coefficients. Tus, all dual istograms are also preserved. Moreover, MB2 also preserves one second-order functional te blockiness. Tus, we conclude tat te more statistical measures an embedding metod preserves, te more difficult it is to detect it. Consequently, our analysis indicates tat it is possible to increase te security of JPEG steganograpic scemes by identifying a set of key macroscopic statistical features tat sould be preserved by te embedding. It is most likely not necessary to preserve all 23 features to substantially decrease te detectability because many of te features are not independent. One of te most surprising facts revealed by te experiments is tat even features based on functionals tat are preserved by te embedding may ave substantial influence. One migt intuitively expect tat suc features would ave very small influence. However, as sown in te next paragrap, preserving a specific functional does not automatically mean tat te calibrated feature will be preserved. et us take a closer look at te blockiness as an example. Preserving te blockiness along te original 8 8 grid (solid lines) does not mean tat te blockiness along te sifted grid will also be preserved (see Fig. 2). Tis is because te embedding and deblocking canges are likely to introduce distortion into te middle of te blocks and tus disturb te blockiness feature, wic is te difference between te blockiness along te solid and dased lines. Consequently, it is not surprising tat features constructed from functionals tat are preserved still ave some residual (and not necessarily small) influence in our feature-based detection. Tis is seen in Table 2 for bot OutGuess 0.2 and te Model Based Steganograpy. Terefore, te designers of future steganograpic scemes for JPEG images sould consider adding calibrated statistics into te set of quantities tat sould be preserved during embedding. We furter point out tat te features derived from te co-occurrence matrix are very influential for all tree scemes. For te Model based Steganograpy, tese features are, in fact, te most influential. Te MB2 metod is currently te only JPEG steganograpic metod tat takes into account inter-block dependencies between DCT coefficients by preserving te blockiness, wic is an integral measure of tese dependencies. Not surprisingly, te scalar blockiness feature does not capture all iger-order statistics of DCT coefficients. Tus, it seems tat te next generation of steganograpic metods for JPEG images sould preserve bot te marginal statistics of DCT coefficients and te probability distribution of coefficient pairs from neigboring blocks (te co-occurrence matrix). Eventually, if te stego algoritm preserved all possible statistics of te cover image, te embedding would be presumably undetectable. Altoug tis goal will likely never be acieved, as te embedding algoritm preserves more ortogonal or independent statistics, its detectability will quickly decrease. We firmly believe tat incorporating a model for te cooccurrence matrices and preserving it would probably lead to significantly less detectable scemes. Te Model based Steganograpy [4] seems to be an appropriate guiding principle to acieve tis goal. However, te embedding operation sould not be idempotent, oterwise targeted attacks based on re-embedding (c.f., te attack on OutGuess [6]) could likely be mounted.
13 Embedding Cover image Stego image 8 pixels Fig. 2. Blockiness is preserved along te solid lines but not necessarily along te dased lines 5 Summary and Future Researc In tis paper, we developed a new blind feature-based steganalytic metod for JPEG images. Eac feature is calculated as te norm of te difference between a specific functional of te stego image and its cropped/recompressed version. Tis calibration can be interpreted as using te stego image as side information to approximately recover some parameters of te cover image. As a result, te calibration decreases image-to-image variations and tus enables more accurate detection. Te features were calculated directly in te DCT domain as first and iger order statistics of DCT coefficients. Tis enables easier explanation of te impact of embedding modifications on detection as well as direct interpretation of te detection results and easy formulation of design principles for future steganograpic metods. We ave applied te detection to several current steganograpic scemes some of wic are aware of te Cacin criterion [2]. Te experimental results were carefully evaluated and interpreted. Conclusions concerning current and future steganograpic scemes for JPEGs were also drawn. In particular, we concluded tat. Secure steganograpic scemes must preserve as many statistics of DCT coefficients as possible. It is not enoug to preserve te marginal statistics, e.g., te istograms. DCT coefficients exibit block-to-block dependencies tat must be preserved as well. 2. A sceme tat preserves more statistics is likely to be more secure tan a sceme tat preserves fewer statistics. Surprisingly, preserving more statistics may not necessarily lead to small capacity, as sown by Model Based Steganograpy. Tis is also because many statistical features one can identify in an image are likely to be dependent. 3. Even toug a sceme may preserve a specific statistic ζ(x) of te cover JPEG image X, te calibrated statistic ζ(compress(crop(x))) calculated from te cropped/recompressed image may not necessarily be preserved, tus opening te door for attacks. Future steganograpic scemes sould add calibrated statistics to teir set of preserved statistics.
14 4. For all tested scemes, one of te most influential features of te proposed detection was te co-occurrence matrix of DCT coefficients (5), wic is te probability distribution of coefficient pairs from neigboring blocks. We ypotesize tat a sceme tat preserves marginal statistics of DCT coefficients and te co-occurrence matrix (wic captures block-to-block dependencies) is likely to exibit improved resistance to attacks. For tis purpose, we propose te Model Based Steganograpy paradigm [2,4] expanded by te model for joint probability distribution of neigboring DCT coefficients. Altoug te calibration process is very intuitive, we currently do not ave a quantitative understanding of ow muc information about te cover image can be obtained from te stego image by calibration. For example, for images tat contain periodic spatial structures wit a period tat is an integer multiple of 8, te calibration process may give misleading results (c.f., te spatial resonance penomenon [6]). In tis case, it may be more beneficial to replace te cropping by oter operations tat will also break te block structure of JPEG images, suc as sligt rotation, scaling, or random warping. Furter investigation of tis issue will be part of our future researc. In te future, we also plan to replace te Fiser inear Discriminant wit more sopisticated classifiers, suc as Support Vector Macines, to furter improve te detection reliability of te proposed steganalytic algoritm. We also plan to develop a multiple-class classifier capable of recognizing stego images produced by different embedding algoritms (steganograpic program identification). Acknowledgements Te work on tis paper was supported by te Air Force Researc aboratory, Air Force Material Command, USAF, under researc grant number F Te U.S. Government is autorized to reproduce and distribute reprints for Governmental purposes notwitstanding any copyrigt notation tere on. Te views and conclusions contained erein are tose of te autors and sould not be interpreted as necessarily representing te official policies, eiter expressed or implied, of Air Force Researc aboratory, or te U. S. Government. Special tanks belong to Pil Sallee for many useful discussions during preparation of tis paper and for providing te code for Model Based Steganograpy. References. Anderson, R. J. and Petitcolas, F.A.P.: On te imits of Steganograpy. IEEE Journal of Selected Areas in Communications. Special Issue on Copyrigt and Privacy Protection, vol. 6(4) (998) Cacin, C.: An Information-Teoretic Model for Steganograpy. In: Aucsmit, D. (ed.): Information Hiding. 2 nd International Worksop. ecture Notes in Computer Science, Vol. 525, Springer-Verlag, Berlin Heidelberg New York (998) pp
15 3. Westfeld, A. and Pfitzmann, A.: Attacks on Steganograpic Systems. In: Pfitzmann A. (eds.): 3rd International Worksop. ecture Notes in Computer Science, Vol.768. Springer-Verlag, Berlin Heidelberg New York (2000) Westfeld, A.: Detecting ow Embedding Rates. In: Petitcolas, F.A.P. (ed.): Information Hiding. 5 t International Worksop. ecture Notes in Computer Science, Vol Springer-Verlag, Berlin Heidelberg New York (2002) Provos, N. and Honeyman, P.: Detecting Steganograpic Content on te Internet. CITI Tecnical Report 0- (200) 6. Fridric, J., Goljan, M., Hogea, D., and Soukal, D.: Quantitative Steganalysis: Estimating Secret Message engt. ACM Multimedia Systems Journal. Special issue on Multimedia Security, Vol. 9(3) (2003) Farid H. and Siwei,.: Detecting Hidden Messages Using Higer-Order Statistics and Support Vector Macines. In: Petitcolas, F.A.P. (ed.): Information Hiding. 5 t International Worksop. ecture Notes in Computer Science, Vol Springer-Verlag, Berlin Heidelberg New York (2002) Eggers, J., Bäuml, R., and Girod, B.: A Communications Approac to Steganograpy. In Proc. EI SPIE Electronic Imaging SPIE Vol (2002) Tzscoppe, R., Bäuml, R., Huber, J.B., and Kaup, A.: Steganograpic System based on Higer-Order Statistics. Proc. EI SPIE Electronic Imaging. Santa Clara (2003) Tzscoppe, R.: Personal communication. February (2003). Provos, N.: Defending Against Statistical Steganalysis. 0t USENIX Security Symposium. Wasington, DC (200) 2. Sallee, P.: Model Based Steganograpy. International Worksop on Digital Watermarking. Seoul, October (2003) Westfeld, A. and Pfitzmann, A.: Hig Capacity Despite Better Steganalysis (F5 A Steganograpic Algoritm). In: Moskowitz, I.S. (eds.): Information Hiding. 4 t International Worksop. ecture Notes in Computer Science, Vol.237. Springer-Verlag, Berlin Heidelberg New York (200) Sallee, P.: Model-based metods for steganograpy and steganalysis. Submitted to International Journal of Image and Grapics. Special issue on Image Data Hiding (2004) 5. I. Avcibas, N. Memon, and B. Sankur, Steganalysis using Image Quality Metrics, SPIE Security and Watermarking of Multimedia Contents II, Electronic Imaging, San Jose, CA, Jan. 200.
Breaking the OutGuess
Breaking the OutGuess Jessica Fridrich, Miroslav Goljan, Dorin Hogea * presented by Deepa Kundur Department of Electrical and Computer Engineering * Department of Computer Science SUNY Binghamton, Binghamton,
More informationBounding Tree Cover Number and Positive Semidefinite Zero Forcing Number
Bounding Tree Cover Number and Positive Semidefinite Zero Forcing Number Sofia Burille Mentor: Micael Natanson September 15, 2014 Abstract Given a grap, G, wit a set of vertices, v, and edges, various
More informationMinimizing the Embedding Impact in Steganography
Minimizing te Embedding Impact in Steganograpy Jessica Fridric SUNY Bingamton Department of ECE Bingamton, NY 3902-6000 00 607 777 677 fridric@bingamton.edu ABSTRACT In tis paper, we study te trade-off
More informationHaar Transform CS 430 Denbigh Starkey
Haar Transform CS Denbig Starkey. Background. Computing te transform. Restoring te original image from te transform 7. Producing te transform matrix 8 5. Using Haar for lossless compression 6. Using Haar
More information4.1 Tangent Lines. y 2 y 1 = y 2 y 1
41 Tangent Lines Introduction Recall tat te slope of a line tells us ow fast te line rises or falls Given distinct points (x 1, y 1 ) and (x 2, y 2 ), te slope of te line troug tese two points is cange
More informationMore on Functions and Their Graphs
More on Functions and Teir Graps Difference Quotient ( + ) ( ) f a f a is known as te difference quotient and is used exclusively wit functions. Te objective to keep in mind is to factor te appearing in
More informationOur Calibrated Model has No Predictive Value: An Example from the Petroleum Industry
Our Calibrated Model as No Predictive Value: An Example from te Petroleum Industry J.N. Carter a, P.J. Ballester a, Z. Tavassoli a and P.R. King a a Department of Eart Sciences and Engineering, Imperial
More information4.2 The Derivative. f(x + h) f(x) lim
4.2 Te Derivative Introduction In te previous section, it was sown tat if a function f as a nonvertical tangent line at a point (x, f(x)), ten its slope is given by te it f(x + ) f(x). (*) Tis is potentially
More information1.4 RATIONAL EXPRESSIONS
6 CHAPTER Fundamentals.4 RATIONAL EXPRESSIONS Te Domain of an Algebraic Epression Simplifying Rational Epressions Multiplying and Dividing Rational Epressions Adding and Subtracting Rational Epressions
More informationDensity Estimation Over Data Stream
Density Estimation Over Data Stream Aoying Zou Dept. of Computer Science, Fudan University 22 Handan Rd. Sangai, 2433, P.R. Cina ayzou@fudan.edu.cn Ziyuan Cai Dept. of Computer Science, Fudan University
More informationMerging Markov and DCT Features for Multi-Class JPEG Steganalysis
Merging Markov and DCT Features for Multi-Class JPEG Steganalysis Tomáš Pevný a, Jessica Fridrich b a Department of Computer Science, Binghamton University, State University of New York b Department of
More informationMATH 5a Spring 2018 READING ASSIGNMENTS FOR CHAPTER 2
MATH 5a Spring 2018 READING ASSIGNMENTS FOR CHAPTER 2 Note: Tere will be a very sort online reading quiz (WebWork) on eac reading assignment due one our before class on its due date. Due dates can be found
More informationVector Processing Contours
Vector Processing Contours Andrey Kirsanov Department of Automation and Control Processes MAMI Moscow State Tecnical University Moscow, Russia AndKirsanov@yandex.ru A.Vavilin and K-H. Jo Department of
More informationTwo Modifications of Weight Calculation of the Non-Local Means Denoising Method
Engineering, 2013, 5, 522-526 ttp://dx.doi.org/10.4236/eng.2013.510b107 Publised Online October 2013 (ttp://www.scirp.org/journal/eng) Two Modifications of Weigt Calculation of te Non-Local Means Denoising
More informationNumerical Derivatives
Lab 15 Numerical Derivatives Lab Objective: Understand and implement finite difference approximations of te derivative in single and multiple dimensions. Evaluate te accuracy of tese approximations. Ten
More informationA Blind Steganalysis on JPEG Gray Level Image Based on Statistical Features and its Performance Analysis
International Journal of Engineering Research and Development e-issn: 2278-067X, p-issn: 2278-800X, www.ijerd.com Volume 11, Issue 09 (September 2015), PP.27-31 A Blind Steganalysis on JPEG Gray Level
More informationFast Calculation of Thermodynamic Properties of Water and Steam in Process Modelling using Spline Interpolation
P R E P R N T CPWS XV Berlin, September 8, 008 Fast Calculation of Termodynamic Properties of Water and Steam in Process Modelling using Spline nterpolation Mattias Kunick a, Hans-Joacim Kretzscmar a,
More informationMulti-Stack Boundary Labeling Problems
Multi-Stack Boundary Labeling Problems Micael A. Bekos 1, Micael Kaufmann 2, Katerina Potika 1 Antonios Symvonis 1 1 National Tecnical University of Atens, Scool of Applied Matematical & Pysical Sciences,
More informationInvestigating an automated method for the sensitivity analysis of functions
Investigating an automated metod for te sensitivity analysis of functions Sibel EKER s.eker@student.tudelft.nl Jill SLINGER j..slinger@tudelft.nl Delft University of Tecnology 2628 BX, Delft, te Neterlands
More information3.6 Directional Derivatives and the Gradient Vector
288 CHAPTER 3. FUNCTIONS OF SEVERAL VARIABLES 3.6 Directional Derivatives and te Gradient Vector 3.6.1 Functions of two Variables Directional Derivatives Let us first quickly review, one more time, te
More informationCESILA: Communication Circle External Square Intersection-Based WSN Localization Algorithm
Sensors & Transducers 2013 by IFSA ttp://www.sensorsportal.com CESILA: Communication Circle External Square Intersection-Based WSN Localization Algoritm Sun Hongyu, Fang Ziyi, Qu Guannan College of Computer
More informationPYRAMID FILTERS BASED ON BILINEAR INTERPOLATION
PYRAMID FILTERS BASED ON BILINEAR INTERPOLATION Martin Kraus Computer Grapics and Visualization Group, Tecnisce Universität Müncen, Germany krausma@in.tum.de Magnus Strengert Visualization and Interactive
More informationUnsupervised Learning for Hierarchical Clustering Using Statistical Information
Unsupervised Learning for Hierarcical Clustering Using Statistical Information Masaru Okamoto, Nan Bu, and Tosio Tsuji Department of Artificial Complex System Engineering Hirosima University Kagamiyama
More informationEMPIRICAL ANALYSIS ON STEGANOGRAPHY USING JSTEG, OUTGUESS 0.1 AND F5 ALGORITHMS
EMPIRICAL ANALYSIS ON STEGANOGRAPHY USING JSTEG, OUTGUESS 0.1 AND F5 ALGORITHMS Dr. N.MANOHARAN 1 Dr.R.BALASUBRAMANIAN 2 S.UMA NANDHINI 3 V.SUJATHA 4 1 Assistant Professor in Department of Computer Science,
More informationMAC-CPTM Situations Project
raft o not use witout permission -P ituations Project ituation 20: rea of Plane Figures Prompt teacer in a geometry class introduces formulas for te areas of parallelograms, trapezoids, and romi. e removes
More informationSymmetric Tree Replication Protocol for Efficient Distributed Storage System*
ymmetric Tree Replication Protocol for Efficient Distributed torage ystem* ung Cune Coi 1, Hee Yong Youn 1, and Joong up Coi 2 1 cool of Information and Communications Engineering ungkyunkwan University
More informationANTENNA SPHERICAL COORDINATE SYSTEMS AND THEIR APPLICATION IN COMBINING RESULTS FROM DIFFERENT ANTENNA ORIENTATIONS
NTNN SPHRICL COORDINT SSTMS ND THIR PPLICTION IN COMBINING RSULTS FROM DIFFRNT NTNN ORINTTIONS llen C. Newell, Greg Hindman Nearfield Systems Incorporated 133. 223 rd St. Bldg. 524 Carson, C 9745 US BSTRCT
More informationREVERSIBLE DATA HIDING USING IMPROVED INTERPOLATION TECHNIQUE
International Researc Journal of Engineering and Tecnology (IRJET) e-issn: 2395-0056 REVERSIBLE DATA HIDING USING IMPROVED INTERPOLATION TECHNIQUE Devendra Kumar 1, Dr. Krisna Raj 2 (Professor in ECE Department
More informationCubic smoothing spline
Cubic smooting spline Menu: QCExpert Regression Cubic spline e module Cubic Spline is used to fit any functional regression curve troug data wit one independent variable x and one dependent random variable
More informationThe Euler and trapezoidal stencils to solve d d x y x = f x, y x
restart; Te Euler and trapezoidal stencils to solve d d x y x = y x Te purpose of tis workseet is to derive te tree simplest numerical stencils to solve te first order d equation y x d x = y x, and study
More information2 The Derivative. 2.0 Introduction to Derivatives. Slopes of Tangent Lines: Graphically
2 Te Derivative Te two previous capters ave laid te foundation for te study of calculus. Tey provided a review of some material you will need and started to empasize te various ways we will view and use
More informationLinear Interpolating Splines
Jim Lambers MAT 772 Fall Semester 2010-11 Lecture 17 Notes Tese notes correspond to Sections 112, 11, and 114 in te text Linear Interpolating Splines We ave seen tat ig-degree polynomial interpolation
More informationAn Algorithm for Loopless Deflection in Photonic Packet-Switched Networks
An Algoritm for Loopless Deflection in Potonic Packet-Switced Networks Jason P. Jue Center for Advanced Telecommunications Systems and Services Te University of Texas at Dallas Ricardson, TX 75083-0688
More informationTuning MAX MIN Ant System with off-line and on-line methods
Université Libre de Bruxelles Institut de Recerces Interdisciplinaires et de Développements en Intelligence Artificielle Tuning MAX MIN Ant System wit off-line and on-line metods Paola Pellegrini, Tomas
More informationHASH ALGORITHMS: A DESIGN FOR PARALLEL CALCULATIONS
HASH ALGORITHMS: A DESIGN FOR PARALLEL CALCULATIONS N.G.Bardis Researc Associate Hellenic Ministry of te Interior, Public Administration and Decentralization 8, Dragatsaniou str., Klatmonos S. 0559, Greece
More informationAn Analytical Approach to Real-Time Misbehavior Detection in IEEE Based Wireless Networks
Tis paper was presented as part of te main tecnical program at IEEE INFOCOM 20 An Analytical Approac to Real-Time Misbeavior Detection in IEEE 802. Based Wireless Networks Jin Tang, Yu Ceng Electrical
More informationOptimal In-Network Packet Aggregation Policy for Maximum Information Freshness
1 Optimal In-etwork Packet Aggregation Policy for Maimum Information Fresness Alper Sinan Akyurek, Tajana Simunic Rosing Electrical and Computer Engineering, University of California, San Diego aakyurek@ucsd.edu,
More informationOn the Use of Radio Resource Tests in Wireless ad hoc Networks
Tecnical Report RT/29/2009 On te Use of Radio Resource Tests in Wireless ad oc Networks Diogo Mónica diogo.monica@gsd.inesc-id.pt João Leitão jleitao@gsd.inesc-id.pt Luis Rodrigues ler@ist.utl.pt Carlos
More information12.2 Techniques for Evaluating Limits
335_qd /4/5 :5 PM Page 863 Section Tecniques for Evaluating Limits 863 Tecniques for Evaluating Limits Wat ou sould learn Use te dividing out tecnique to evaluate its of functions Use te rationalizing
More informationHash-Based Indexes. Chapter 11. Comp 521 Files and Databases Spring
Has-Based Indexes Capter 11 Comp 521 Files and Databases Spring 2010 1 Introduction As for any index, 3 alternatives for data entries k*: Data record wit key value k
More informationCE 221 Data Structures and Algorithms
CE Data Structures and Algoritms Capter 4: Trees (AVL Trees) Text: Read Weiss, 4.4 Izmir University of Economics AVL Trees An AVL (Adelson-Velskii and Landis) tree is a binary searc tree wit a balance
More informationMinimizing Memory Access By Improving Register Usage Through High-level Transformations
Minimizing Memory Access By Improving Register Usage Troug Hig-level Transformations San Li Scool of Computer Engineering anyang Tecnological University anyang Avenue, SIGAPORE 639798 Email: p144102711@ntu.edu.sg
More informationAlpha-trimmed Image Estimation for JPEG Steganography Detection
Proceedings of the 2009 IEEE International Conference on Systems, Man, and Cybernetics San Antonio, TX, USA - October 2009 Alpha-trimmed Image Estimation for JPEG Steganography Detection Mei-Ching Chen,
More informationNon-Interferometric Testing
NonInterferometric Testing.nb Optics 513 - James C. Wyant 1 Non-Interferometric Testing Introduction In tese notes four non-interferometric tests are described: (1) te Sack-Hartmann test, (2) te Foucault
More informationSolutions Manual for Fundamentals of Fluid Mechanics 7th edition by Munson Rothmayer Okiishi and Huebsch
Solutions Manual for Fundamentals of Fluid Mecanics 7t edition by Munson Rotmayer Okiisi and Huebsc Link full download : ttps://digitalcontentmarket.org/download/solutions-manual-forfundamentals-of-fluid-mecanics-7t-edition-by-munson-rotmayer-okiisi-and-uebsc/
More informationIntra- and Inter-Session Network Coding in Wireless Networks
Intra- and Inter-Session Network Coding in Wireless Networks Hulya Seferoglu, Member, IEEE, Atina Markopoulou, Member, IEEE, K K Ramakrisnan, Fellow, IEEE arxiv:857v [csni] 3 Feb Abstract In tis paper,
More informationMean Shifting Gradient Vector Flow: An Improved External Force Field for Active Surfaces in Widefield Microscopy.
Mean Sifting Gradient Vector Flow: An Improved External Force Field for Active Surfaces in Widefield Microscopy. Margret Keuper Cair of Pattern Recognition and Image Processing Computer Science Department
More informationTraffic Sign Classification Using Ring Partitioned Method
Traffic Sign Classification Using Ring Partitioned Metod Aryuanto Soetedjo and Koici Yamada Laboratory for Management and Information Systems Science, Nagaoa University of Tecnology 603- Kamitomioamaci,
More informationAn Effective Sensor Deployment Strategy by Linear Density Control in Wireless Sensor Networks Chiming Huang and Rei-Heng Cheng
An ffective Sensor Deployment Strategy by Linear Density Control in Wireless Sensor Networks Ciming Huang and ei-heng Ceng 5 De c e mbe r0 International Journal of Advanced Information Tecnologies (IJAIT),
More informationA Cost Model for Distributed Shared Memory. Using Competitive Update. Jai-Hoon Kim Nitin H. Vaidya. Department of Computer Science
A Cost Model for Distributed Sared Memory Using Competitive Update Jai-Hoon Kim Nitin H. Vaidya Department of Computer Science Texas A&M University College Station, Texas, 77843-3112, USA E-mail: fjkim,vaidyag@cs.tamu.edu
More informationClassification of Osteoporosis using Fractal Texture Features
Classification of Osteoporosis using Fractal Texture Features V.Srikant, C.Dines Kumar and A.Tobin Department of Electronics and Communication Engineering Panimalar Engineering College Cennai, Tamil Nadu,
More informationPROTOTYPE OF LOAD CELL APPLICATION IN TORQE MEASUREMENT
IMEKO 21 TC3, TC5 and TC22 Conferences Metrology in Modern Context November 22 25, 21, Pattaya, Conburi, Tailand PROTOTYPE OF LOAD CELL APPLICATION IN TORQE MEASUREMENT Tassanai Sanponpute 1, Cokcai Wattong
More informationSection 1.2 The Slope of a Tangent
Section 1.2 Te Slope of a Tangent You are familiar wit te concept of a tangent to a curve. Wat geometric interpretation can be given to a tangent to te grap of a function at a point? A tangent is te straigt
More informationRedundancy Awareness in SQL Queries
Redundancy Awareness in QL Queries Bin ao and Antonio Badia omputer Engineering and omputer cience Department University of Louisville bin.cao,abadia @louisville.edu Abstract In tis paper, we study QL
More informationCS231A Final Project - Video to PDF
CS231A Final Project - Video to PDF Yuki Inoue Scool of Electrical Engineering Stanford University Email: yinoue93@stanford.edu Jason Liu Department of Computer Science Stanford University Email: liujas00@stanford.edu
More informationRECONSTRUCTING OF A GIVEN PIXEL S THREE- DIMENSIONAL COORDINATES GIVEN BY A PERSPECTIVE DIGITAL AERIAL PHOTOS BY APPLYING DIGITAL TERRAIN MODEL
IV. Évfolyam 3. szám - 2009. szeptember Horvát Zoltán orvat.zoltan@zmne.u REONSTRUTING OF GIVEN PIXEL S THREE- DIMENSIONL OORDINTES GIVEN Y PERSPETIVE DIGITL ERIL PHOTOS Y PPLYING DIGITL TERRIN MODEL bsztrakt/bstract
More informationFurther Study on YASS: Steganography Based on Randomized Embedding to Resist Blind Steganalysis
Further Study on YASS: Steganography Based on Randomized Embedding to Resist Blind Steganalysis Anindya Sarkar, Kaushal Solanki and B. S. Manjunath Department of Electrical and Computer Engineering, University
More informationDetection of double-compression for applications in steganography
1 Detection of double-compression for applications in steganography Tomáš Pevný and Jessica Fridrich Abstract This paper presents a method for detection of double JPEG compression and a maximum likelihood
More informationHash-Based Indexes. Chapter 11. Comp 521 Files and Databases Fall
Has-Based Indexes Capter 11 Comp 521 Files and Databases Fall 2012 1 Introduction Hasing maps a searc key directly to te pid of te containing page/page-overflow cain Doesn t require intermediate page fetces
More informationA Novel QC-LDPC Code with Flexible Construction and Low Error Floor
A Novel QC-LDPC Code wit Flexile Construction and Low Error Floor Hanxin WANG,2, Saoping CHEN,2,CuitaoZHU,2 and Kaiyou SU Department of Electronics and Information Engineering, Sout-Central University
More informationSome Handwritten Signature Parameters in Biometric Recognition Process
Some Handwritten Signature Parameters in Biometric Recognition Process Piotr Porwik Institute of Informatics, Silesian Uniersity, Bdziska 39, 41- Sosnowiec, Poland porwik@us.edu.pl Tomasz Para Institute
More informationUUV DEPTH MEASUREMENT USING CAMERA IMAGES
ABCM Symposium Series in Mecatronics - Vol. 3 - pp.292-299 Copyrigt c 2008 by ABCM UUV DEPTH MEASUREMENT USING CAMERA IMAGES Rogerio Yugo Takimoto Graduate Scool of Engineering Yokoama National University
More informationDeveloping an Efficient Algorithm for Image Fusion Using Dual Tree- Complex Wavelet Transform
ISSN(Online): 30-980 ISSN (Print): 30-9798 (An ISO 397: 007 Certified Organization) Vol. 3, Issue 4, April 05 Developing an Efficient Algoritm for Image Fusion Using Dual Tree- Complex Wavelet Transform
More informationDetection of double-compression in JPEG images for applications in steganography
1 Detection of double-compression in JPEG images for applications in steganography Tomáš Pevný and Jessica Fridrich Abstract This paper presents a method for detection of double JPEG compression and a
More informationCoarticulation: An Approach for Generating Concurrent Plans in Markov Decision Processes
Coarticulation: An Approac for Generating Concurrent Plans in Markov Decision Processes Kasayar Roanimanes kas@cs.umass.edu Sridar Maadevan maadeva@cs.umass.edu Department of Computer Science, University
More informationSection 2.3: Calculating Limits using the Limit Laws
Section 2.3: Calculating Limits using te Limit Laws In previous sections, we used graps and numerics to approimate te value of a it if it eists. Te problem wit tis owever is tat it does not always give
More informationH-Adaptive Multiscale Schemes for the Compressible Navier-Stokes Equations Polyhedral Discretization, Data Compression and Mesh Generation
H-Adaptive Multiscale Scemes for te Compressible Navier-Stokes Equations Polyedral Discretization, Data Compression and Mes Generation F. Bramkamp 1, B. Gottsclic-Müller 2, M. Hesse 1, P. Lamby 2, S. Müller
More informationAn Anchor Chain Scheme for IP Mobility Management
An Ancor Cain Sceme for IP Mobility Management Yigal Bejerano and Israel Cidon Department of Electrical Engineering Tecnion - Israel Institute of Tecnology Haifa 32000, Israel E-mail: bej@tx.tecnion.ac.il.
More information2.8 The derivative as a function
CHAPTER 2. LIMITS 56 2.8 Te derivative as a function Definition. Te derivative of f(x) istefunction f (x) defined as follows f f(x + ) f(x) (x). 0 Note: tis differs from te definition in section 2.7 in
More informationNetwork Coding to Enhance Standard Routing Protocols in Wireless Mesh Networks
Downloaded from vbn.aau.dk on: April 7, 09 Aalborg Universitet etwork Coding to Enance Standard Routing Protocols in Wireless Mes etworks Palevani, Peyman; Roetter, Daniel Enrique Lucani; Fitzek, Frank;
More informationDistributed and Optimal Rate Allocation in Application-Layer Multicast
Distributed and Optimal Rate Allocation in Application-Layer Multicast Jinyao Yan, Martin May, Bernard Plattner, Wolfgang Mülbauer Computer Engineering and Networks Laboratory, ETH Zuric, CH-8092, Switzerland
More informationImplementation of Integral based Digital Curvature Estimators in DGtal
Implementation of Integral based Digital Curvature Estimators in DGtal David Coeurjolly 1, Jacques-Olivier Lacaud 2, Jérémy Levallois 1,2 1 Université de Lyon, CNRS INSA-Lyon, LIRIS, UMR5205, F-69621,
More informationOvercomplete Steerable Pyramid Filters and Rotation Invariance
vercomplete Steerable Pyramid Filters and Rotation Invariance H. Greenspan, S. Belongie R. Goodman and P. Perona S. Raksit and C. H. Anderson Department of Electrical Engineering Department of Anatomy
More informationProceedings of the 8th WSEAS International Conference on Neural Networks, Vancouver, British Columbia, Canada, June 19-21,
Proceedings of te 8t WSEAS International Conference on Neural Networks, Vancouver, Britis Columbia, Canada, June 9-2, 2007 3 Neural Network Structures wit Constant Weigts to Implement Dis-Jointly Removed
More informationIntroduction to Computer Graphics 5. Clipping
Introduction to Computer Grapics 5. Clipping I-Cen Lin, Assistant Professor National Ciao Tung Univ., Taiwan Textbook: E.Angel, Interactive Computer Grapics, 5 t Ed., Addison Wesley Ref:Hearn and Baker,
More informationMAP MOSAICKING WITH DISSIMILAR PROJECTIONS, SPATIAL RESOLUTIONS, DATA TYPES AND NUMBER OF BANDS 1. INTRODUCTION
MP MOSICKING WITH DISSIMILR PROJECTIONS, SPTIL RESOLUTIONS, DT TYPES ND NUMBER OF BNDS Tyler J. lumbaug and Peter Bajcsy National Center for Supercomputing pplications 605 East Springfield venue, Campaign,
More informationResearch Article A Novel Steganalytic Algorithm based on III Level DWT with Energy as Feature
Research Journal of Applied Sciences, Engineering and Technology 7(19): 4100-4105, 2014 DOI:10.19026/rjaset.7.773 ISSN: 2040-7459; e-issn: 2040-7467 2014 Maxwell Scientific Publication Corp. Submitted:
More informationMAPI Computer Vision
MAPI Computer Vision Multiple View Geometry In tis module we intend to present several tecniques in te domain of te 3D vision Manuel Joao University of Mino Dep Industrial Electronics - Applications -
More information, 1 1, A complex fraction is a quotient of rational expressions (including their sums) that result
RT. Complex Fractions Wen working wit algebraic expressions, sometimes we come across needing to simplify expressions like tese: xx 9 xx +, xx + xx + xx, yy xx + xx + +, aa Simplifying Complex Fractions
More informationIMAGE ENCRYPTION BASED ON CHAOTIC MAP AND REVERSIBLE INTEGER WAVELET TRANSFORM
Journal of ELECTRICAL ENGINEERING, VOL. 65, NO., 014, 90 96 IMAGE ENCRYPTION BASED ON CHAOTIC MAP AND REVERSIBLE INTEGER WAVELET TRANSFORM Xiaopeng Wei Bin Wang Qiang Zang Cao Ce In recent years, tere
More informationAn Interactive X-Ray Image Segmentation Technique for Bone Extraction
An Interactive X-Ray Image Segmentation Tecnique for Bone Extraction Cristina Stolojescu-Crisan and Stefan Holban Politenica University of Timisoara V. Parvan 2, 300223 Timisoara, Romania {cristina.stolojescu@etc.upt.ro
More informationAnnouncements. Lilian s office hours rescheduled: Fri 2-4pm HW2 out tomorrow, due Thursday, 7/7. CSE373: Data Structures & Algorithms
Announcements Lilian s office ours resceduled: Fri 2-4pm HW2 out tomorrow, due Tursday, 7/7 CSE373: Data Structures & Algoritms Deletion in BST 2 5 5 2 9 20 7 0 7 30 Wy migt deletion be arder tan insertion?
More informationParallel Simulation of Equation-Based Models on CUDA-Enabled GPUs
Parallel Simulation of Equation-Based Models on CUDA-Enabled GPUs Per Ostlund Department of Computer and Information Science Linkoping University SE-58183 Linkoping, Sweden per.ostlund@liu.se Kristian
More informationAsynchronous Power Flow on Graphic Processing Units
1 Asyncronous Power Flow on Grapic Processing Units Manuel Marin, Student Member, IEEE, David Defour, and Federico Milano, Senior Member, IEEE Abstract Asyncronous iterations can be used to implement fixed-point
More informationSoftware Fault Prediction using Machine Learning Algorithm Pooja Garg 1 Mr. Bhushan Dua 2
IJSRD - International Journal for Scientific Researc & Development Vol. 3, Issue 04, 2015 ISSN (online): 2321-0613 Software Fault Prediction using Macine Learning Algoritm Pooja Garg 1 Mr. Busan Dua 2
More informationTraffic Pattern-based Adaptive Routing for Intra-group Communication in Dragonfly Networks
Traffic Pattern-based Adaptive Routing for Intra-group Communication in Dragonfly Networks Peyman Faizian, Md Safayat Raman, Md Atiqul Molla, Xin Yuan Department of Computer Science Florida State University
More informationBenchmarking steganographic and steganalysis techniques
Benchmarking steganographic and steganalysis techniques Mehdi Kharrazi a, Husrev T. Sencar b Nasir Memon b a Department of Electrical and Computer Engineering b Department of Computer and Information Science
More informationInterference and Diffraction of Light
Interference and Diffraction of Ligt References: [1] A.P. Frenc: Vibrations and Waves, Norton Publ. 1971, Capter 8, p. 280-297 [2] PASCO Interference and Diffraction EX-9918 guide (written by Ann Hanks)
More informationComparison of the Efficiency of the Various Algorithms in Stratified Sampling when the Initial Solutions are Determined with Geometric Method
International Journal of Statistics and Applications 0, (): -0 DOI: 0.9/j.statistics.000.0 Comparison of te Efficiency of te Various Algoritms in Stratified Sampling wen te Initial Solutions are Determined
More informationTruncated Newton-based multigrid algorithm for centroidal Voronoi diagram calculation
NUMERICAL MATHEMATICS: Teory, Metods and Applications Numer. Mat. Teor. Met. Appl., Vol. xx, No. x, pp. 1-18 (200x) Truncated Newton-based multigrid algoritm for centroidal Voronoi diagram calculation
More informationData Hiding in Video
Data Hiding in Video J. J. Chae and B. S. Manjunath Department of Electrical and Computer Engineering University of California, Santa Barbara, CA 9316-956 Email: chaejj, manj@iplab.ece.ucsb.edu Abstract
More informationUNSUPERVISED HIERARCHICAL IMAGE SEGMENTATION BASED ON THE TS-MRF MODEL AND FAST MEAN-SHIFT CLUSTERING
UNSUPERVISED HIERARCHICAL IMAGE SEGMENTATION BASED ON THE TS-MRF MODEL AND FAST MEAN-SHIFT CLUSTERING Raffaele Gaetano, Giuseppe Scarpa, Giovanni Poggi, and Josiane Zerubia Dip. Ing. Elettronica e Telecomunicazioni,
More informationOptimizing Pixel Predictors for Steganalysis
Optimizing Pixel Predictors for Steganalysis Vojtěch Holub and Jessica Fridrich Dept. of Electrical and Computer Engineering SUNY Binghamton, New York IS&T / SPIE 2012, San Francisco, CA Steganography
More informationSoft sensor modelling by time difference, recursive partial least squares and adaptive model updating
Soft sensor modelling by time difference, recursive partial least squares adaptive model updating Y Fu 1, 2, W Yang 2, O Xu 1, L Zou 3, J Wang 4 1 Zijiang College, Zejiang University of ecnology, Hangzou
More informationIntegrating Constraints and Metric Learning in Semi-Supervised Clustering
Integrating Constraints and Metric Learning in Semi-Supervised Clustering Mikail Bilenko MBILENKO@CS.UTEXAS.EDU Sugato Basu SUGATO@CS.UTEXAS.EDU Raymond J. Mooney MOONEY@CS.UTEXAS.EDU Department of Computer
More informationMulti-Objective Particle Swarm Optimizers: A Survey of the State-of-the-Art
Multi-Objective Particle Swarm Optimizers: A Survey of te State-of-te-Art Margarita Reyes-Sierra and Carlos A. Coello Coello CINVESTAV-IPN (Evolutionary Computation Group) Electrical Engineering Department,
More informationModern Steganalysis Can Detect YASS
Jan Kodovský, Tomáš Pevný, Jessica Fridrich January 18, 2010 / SPIE 1 / 13 YASS Curriculum Vitae Birth Location: University of California, Santa Barbara Birth Date: More than 2 years ago [Solanki-2007],
More informationCRASHWORTHINESS ASSESSMENT IN AIRCRAFT DITCHING INCIDENTS
27 TH INTERNATIONAL CONGRESS OF THE AERONAUTICAL SCIENCES CRASHWORTHINESS ASSESSMENT IN AIRCRAFT DITCHING INCIDENTS C. Candra*, T. Y. Wong* and J. Bayandor** * Te Sir Lawrence Wackett Aerospace Centre
More informationAnalytical CHEMISTRY
ISSN : 974-749 Grap kernels and applications in protein classification Jiang Qiangrong*, Xiong Zikang, Zai Can Department of Computer Science, Beijing University of Tecnology, Beijing, (CHINA) E-mail:
More informationTilings of rectangles with T-tetrominoes
Tilings of rectangles wit T-tetrominoes Micael Korn and Igor Pak Department of Matematics Massacusetts Institute of Tecnology Cambridge, MA, 2139 mikekorn@mit.edu, pak@mat.mit.edu August 26, 23 Abstract
More information