Mobile Application Security for Video Streaming Authentication and Data Integrity Combining Digital Signature and Watermarking Techniques

Size: px
Start display at page:

Download "Mobile Application Security for Video Streaming Authentication and Data Integrity Combining Digital Signature and Watermarking Techniques"

Transcription

1 Moble Applcaton Securty for Vdeo Streamng Authentcaton and Data Integrty Combnng Dgtal Sgnature and Watermarkng Technques Stefano Chessa, Roberto D Petro, Erna Ferro, Gaetano Gunta, Gabrele Olger ISTI-CNR, Area della Rcerca d Psa, Va G.Moruzz 1, Psa, Italy Dpartmento d Informatca, Unverstà d Psa, Largo. Pontecorvo 3, Psa, Italy Dpartmento d Matematca, Unverstà d Roma Tre, L.go S. Muraldo 1, 046 Rome, Italy. Dpartmento d Elettronca Applcata, Unverstà d Roma Tre, Va della Vasca Navale 84, 046 Rome, Italy. Abstract Satellte lnk presents pecular characterstcs lke no packet reorderng and low bt error rate. In ths paper we leverage these characterstcs combned wth watermarkng technques to propose a novel authentcaton algorthm for multcast vdeo streamng. Ths algorthm combnes a sngle dgtal ature wth a hash chan pre-computed on the transmtter sde; the hash chan s embedded n the vdeo stream by means of a watermarkng technque. Our proposal shows several nterestng features: Authentcaton s enforced, as well as ntegrty of the receved multcast stream; receved blocks can be authentcated on the fly; no storage s requred on the recever sde, except for the amount of memory needed to store a sngle hash; overhead computatons requred on the recever sum up to sngle hash per block, whle a dgtal ature verfcaton s amortzed over the whole receved stream. Fnally, note that the bandwdth overhead ntroduced s neglgble, snce the appled watermarkng technque ntroduces vrtually no modfcatons (at least, not recognzable by humans) on the orgnal vdeo stream pctures. I. INTRODUCTION In a secure vdeo-streamng system, sender authentcaton must be performed to prevent unauthorsed use of the shared meda [1]. Conventonal methods for securely dentfyng mages use hash functons. Dgtal ature standard, used n cryptosystem to dspute authentcaton documents, also nvolve the use of hash functons. A dgtal ature s a bt stream dependent on a prvate key and the content of the document to be ed. For each document, the dgtal ature algorthm provdes a unque output bt stream [2]. Authentcaton schemes assert that an adversary cannot compute the same ature wth two dfferent messages. In cryptosystems, ths type of process s largely used to ensure data ntegrty, data orgn authentcaton and non repudaton. The dgtal ature s based on a hash functon (or a oneway hash functon -OWH-) and an encrypton algorthm [3]. Ths work has been supported by the CNR/MIUR program Legge 449/97 (project IS-Manet) and by the European Commsson wthn the 6th Research Framework Programme n the framework of the European Satellte Communcatons Network of Excellence (SatNEx II, IST-27393) for the FT4 Vdeo Streamng Authentcaton n satellte communcatons (VStA) of the JA 2240 Securty. One-way functons and cryptographc hash functons are computed by cryptographc prmtves wthout key. For example, MD5 [4] and SHA-1 [5] are customzed hash functons n cryptographc process. Another method for securely dentfyng mages s watermarkng. In order to be effcent n mages [1], the dgtal ature should be dfferent f and only f the mage contents are dfferent. Dgtal watermarkng [6] s a multdscplnary feld that combnes meda and al processng wth cryptography, communcaton theory, codng theory, al compresson, theory of human percepton, and qualty of servce requrements [7]. Technques based on watermarkng are largely used for copyrght protecton and fast search of mages n databases [6]. In authentcaton or copyrght watermark, the embedded ature watermarks the data wth the owner s or producer s dentfcaton. Ths s the enablng technology to prove ownershp on copyrghted materal, ether to montor the use of the copyrghted multmeda data, or to analyse where the data s n use over networks and servers. Ths technology bulds on the dea of hdng meta-nformaton, lke an owner s ature, n physcal materal n whch content s represented, such as the pxels of an mage. From the dgtal form, authorsed recpents can extract the embedded nformaton when necessary to show proof of ownershp. In general, we have a watermarkng embeddng functon that nserts a watermark h nto meda data and generates the watermarked data w. A detector can check for the exstence of the watermark and extracts t (h) from data w. The embeddng and detector functons are usually publc but they are ntalsed by keys to acheve securty. Referrng to the exstng lterature, to the best of our knowledge, no publshed papers deal wth proposals of a combned procedure nvolvng dgtal watermarkng together wth publc/prvate key securty mechansm. Dgtal watermarkng technques should be robust and fragle at once [6]. Copyrght, fngerprnt, and copy-control watermarks should have a hgh robustness, consstng of resstance to blnd, non-targeted modfcatons, or common meda operaton. For manpulaton recognton, the ntegrty watermark /$ IEEE 634

2 0 1 RSA(H( 1)) H( ) 1 2 H( ) Fg. 2. Hash chan constructed on three blocks. Fg. 1. Multcast satellte scenaro. must be fragle (t dsappears f someone has altered the fle) to detect altered meda. Secure watermarkng mples that embedded nformaton cannot be removed by targeted attacks wthout these modfcatons beng detected. Moreover, watermark must be transparent accordng to the propertes of the human sensory system, n order that a transparent watermark causes no artfacts or qualty loss. Furthermore, ether a prvate verfcaton (by a prvate-key functon) or a publc verfcaton (by a publc-key algorthm) of the embedded watermark has to be mplemented, dependng on the partcular applcaton. All these characterstcs should operate at a reasonable level of complexty: The ntroduced overhead requred to embed and retreve a watermark should be low, especally for real-tme applcatons such as vdeo-streamng. II. SYSTEM MODEL Multcast satellte networks present pecular characterstcs lke hgh round trp tme, no packet reorderng and low bt error rate (ER). For nstance, geostatonary satelltes placed n equatoral orbt at 36,000 km alttude, ntroduce a transmsson delay between transmtter and recever of about 250 ms, whle satellte lnk presents a low ER of about 10 8 n the majorty of cases [8]. Ths low ER s due to de requrements and structural constrants. Leveragng the low ER and the no packet reorderng feature, we propose a novel schema for authentcatng multcast vdeo streamng that does not affect avalable bandwdth. Our scenaro s n Fgure 1: The center has to dstrbute an uncompressed vdeo stream through a multcast satellte network. oth transmtter and recever can perform preprocessng elaboratons, lke MPEG2 codng/decodng, before the transmsson and after recepton respectvely. The use of MPEG2 [9] algorthm s justfed f we assume our satellte network usng DV-S [10]. The sender preprocesses the uncompressed vdeo stream nsertng n t the authentcaton nformaton. Ths s acheved wth watermarkng technque. The next step for the sender s frst to perform MPEG2 compresson and then to transmt the al to the varous recever statons through the satellte net- work. It s worth notcng that usng watermarkng technque to embed authentcaton nformaton wthn the vdeo stream avods to ncur n any bandwdth overhead. Indeed, the authentcaton nformaton ntroduce just transparent modfcatons to the vdeo pctures (that s, modfcatons that wll not affect the perceved qualty of the vdeo). Each recever staton decompresses the vdeo stream and then authentcates t. Ths goal s obtaned combnng a a dgtal ature lke RSA [11] wth a hash chan. Fgure 2 syntheszes the authentcaton schema, where x s the compressed verson of the block x (GOP). Ths approach amortses also the computatonal overhead due to the sngle asymmetrc ature over the whole vdeo stream, tradng off the overhead related to dgtal ature, wth the overhead requred by one way hash functons, lke SHA-1 [12], charactersed by a low computatonal overhead. III. THE AUTHENTICATION PROCEDURE In ths secton we present a novel authentcaton procedure for multcast vdeo streamng. We propose a new authentcaton schema based on sngle dgtal ature lke RSA [11], authentcatng a one-tme ature chan. The hash chan, (that could be bult over SHA-1 [12]) s hdden n the vdeo stream pctures, by means of the watermarkng technque descrbed n Secton IV. An MPEG2 vdeo stream can be consdered as a GOP (Group Of Pctures) sequence, lke n Fgure 3. A GOP s composed of three dfferent types of pctures: I-pcture (Intra), P-pcture (Predctve), and -pcture (drectonally predctve). Insde a GOP there s only one I-pcture and one or more and P-pctures. Compresson s computed over two dfferent levels: The spatal and the temporal ones [9]. Spatal compresson s performed only over the I-pcture, whle temporal compresson s carred out over the and the P-pctures. These pctures are obtaned va dfference from the I-pcture. A GOP, hereafter G, represents n the MPEG2 doman a well known pcture sequence (block) n the uncompressed doman. Let H( ) and Sgnature( ) be the functons that mplement a SHA-1 hash and an RSA ature respectvely. The functon Mpeg2( ) computes the GOP assocated wth the specfc nput block usng the MPEG2 algorthm. Fnally, W (x, y) nserts the data y nto a block of x pctures accordng to the watermarkng algorthm descrbed n Secton IV. Table I descrbes n detals how the sender bulds up the hash chan. Transmtter s provded wth an uncompressed vdeo stream S and nterprets t as sequence of blocks of pctures 635

3 S G 1 G2 G3 G4 G n 1 Gn Fg. 3. IP... Vdeo stream as a pcture sequence. [ 1,..., n ], so that each block wll be codfed afterwards as a GOP by the MPEG2 algorthm. The last block of the vdeo sequence s compressed: G c = Mpeg2( n ). The constructon of the hash chan starts from the block of ndex n 1. The hash value h s calculated over the GOP G c through the functon h = H(G c ). Ths value (h ) s nserted nto the block by means of the watermarkng functon W (,h ).The watermarked block s now encoded wth G c = Mpeg2( w), obtanng the GOP G c that wll be the argument for the next hash calculaton. The procedure s terated over all the blocks up to the frst one ( 1 ). Fnally, the frst GOP (G c ) s authentcated through a dgtal ature wth Sgnature(H(G c )). Note that ths s the only asymmetrc operaton performed by the sender. The marked block sequence s now codfed wth MPEG2 by the functon Mpeg2([1 w,...,n w ]). Note that each block belongng to S s codfed nto a GOP n S c. Hence, each block n the uncompressed doman corresponds to a GOP n the compressed doman. TALE I Constructon of the sngle hash chan let S =[ 1,..., n] be the uncompressed vdeo stream block sequence; G c = Mpeg2( n) ; for = n 1 to 1 h = H(G c); w = W (,h ); G c = Mpeg2( w ) ; Sg = Sgnature(H(G c)); S c = Mpeg2([1 w,...,n w ]) ; Transmt (Sg,S c); On the recever sde, the authentcaton procedure work as follows: Once the recever has stored (Sg,S c ), t decodes the MPEG2 stream and extracts a GOP sequence from the compressed vdeo stream S c va ExtGOP( ), that s: [G 1,...,G n ]=ExtGOP(S c ). Now, the recever has to authentcate the anchor of the authentcaton chan. Note that ths operaton s the only operaton based on asymmetrc key cryptography on the recever sde. Hence, once the hash over the frst GOP s computed: h = H(G 1 ), ths value s employed to verfy the dgtal ature (Sg) wth V ersgnature(sg,h). If the test succeeds, the recever can subsequently authentcate the vdeo stream checkng for the authentcty of each block of the hash chan. The hash value h nserted by the sender s extracted from the block u through the watermark retreval functon E( u ). u s obtaned repeatedly from each GOP belongng to the vdeo stream through u = UnMpeg2(G ). The value h s then compared wth the hash calculated by the recever over the GOP G +1, that s H(G +1 ). The executon proceeds teratvely only f the test s successful for all of the blocks. If a pcture s corrupted (for nstance, forged or changed durng the channel transmsson) ts hash changes, and the authentcaton test fals. Note that once a falure s trggered, all the subsequent pctures cannot be authentcated. Table II shows n detals the algorthm run by the recever. TALE II Verfcaton of the authentcty of sequence Sg,S c Receve (Sg,S c); [G 1,...,G n]=extgop (S c) ; h = H(G 1); f not ( V ersgnature(sg,h) ) authentcaton faled; ext; for =1to n u = UnMpeg2(G ) ; h = E( u); f h =H(G +1); authentcaton faled; ext; Wthout losng of generalty, we assumed that the sequence (Sg,S c ) s receved correctly. Whle ths assumpton s acceptable due to the low ER of satellte lnk, t should be noted that f message corrupton should become an ssue, t could be tackled consderng redundant hash chan or usng FEC [13]. For nstance, robustness could be obtaned embeddng nto the same block more than one hash calculated over several GOP. IV. THE EMEDDING PROCEDURE A. Embeddng nformaton as watermark In ths secton we descrbe the technque used to embed the hash chan nto the vdeo stream. In partcular, we descrbe the functons W ( ) and E( ) used n the prevous secton. Note that our use of watermarkng technques s not standard; classcal watermarkng s used to embed a logo (generally a pcture) wthn a vdeo stream. Ths embeddng s hdden n the vdeo and t can be extracted to wtness the ownershp of the vdeo. It s acceptable that the extracton 636

4 could be lossy, that s, the logo can be extracted wth errors, provded t remans recognsable. Instead, n our case, we use watermarkng to embed the result of a hash computaton. The extracton of the hash must not be affected by errors, otherwse the hash chan would break and the recever could not authentcate the remanng of the vdeo stream. For ths reason, n ths secton we propose an embeddng technque that provdes error-free hash extracton. An uncompressed vdeo stream can be consdered as a three dmensonal al, where ts components are a bdmensonal matrx (the pcture) and the tme. Each pcture s formed by a w h matrx of pxels; each pxel expresses a colour that can be represented by three values: R (red), G (green), (blue) or, equvalently, by Y(lumnance) and U, V (chromnance) components. In our algorthm, we consder the Y-U-V representaton, and we embed a mark (hash) on each pcture of the vdeo stream on ts lumnance component (Y). We use a Fourer doman method based on the DCT (dscrete cosne transform). Ths method assures robustness wth regard to varous types of compresson methods lke MPEG2 or MPEG4 [14], [15]. Ths procedure works modfyng the mage frequency doman coeffcents; t thus has a mnmal mpact n the spatal doman of the pcture. Let us consder as a block of pctures and h the hash value that should be embedded n each pcture belongng to the block. Note that, due to specfc features of the mark extracton (dscussed n Secton IV-), the mark must be represented as a sequence of 1, 1. For ths reason h (whch s a sequence of 0, 1) s frst smply converted nto a sequence of 1, 1. Then, for each pcture p (wth 1 m) n, themarkh s embedded n p usng the followng equaton: P = DCTp (Y) (1) TALE III Functon W ( ) embeddng a hash value nto vdeo stream pctures let be a vdeo block belongng to the stream S; let h be the hash value to be embedded n ; let p 1,...,p m be the pctures belongng to ; let α be an amplfcaton factor; let PRSG( ) be a pseudo random sequence generator algorthm; H Rep =[h,h,...,h] // concatenaton of the // h replcatons h Rep M ( = Reshape to a ) square matrx h Rep 0 0 // Place data nto hgh h W = 0 h Rep M // frequency DCT doman for =1to k n = PRSG() P = DCTp (Y) = P HF + P HF P h p (Y )=DCT 1 P h (Y) α n h W TALE IV Functon E( ) retrevng the hash value from a block of vdeo pctures let be a vdeo block belongng to the stream S; let p 1,...,p m be the pctures belongng to ; let PRSG( ) a pseudo random sequence generator algorthm; let SIGN s the mathematcal um functon x =0 for =1to m n = PRSG() P = DCTp (Y) n P HF = Extract hgh frequency from P P HFV = Reshape P HF to a vector // Consder P HFV h = h j as [h,...,h j,...,h] x = x + h h = SIGNx P H = P HF + P HF α n h W (2) Equaton 1 computes the DCT transformaton over the lumnance (Y) component p (Y ), obtanng P. Equaton 2 embeds h W, a repeated and reshaped verson of vector h, n the hgh frequency of P, denoted P HF. To ths goal, we defne the parameters α, an amplfcaton factor, and n,a pseudo-nose sequence whch s changed for each pcture. In partcular, n s a matrx of bnary ( 1, 1) pseudo nose sequences. The spread sequence n h s multpled by an amplfcaton factor (α), replcated accordng to a replcaton factor, and fnally reshaped to a matrx of the same dmensons of the pcture. The mark s scaled by the lumnance frequency coeffcents, so that t s spread proportonally to the DCT coeffcents. Fnally, the resultng sequence s summed up to the hghest of the DCT transformed pcture P. The pseudo code of the embeddng algorthm s shown n Table III. frequences coeffcents P HF. Retreval of nformaton Snce the mark has been embedded n each pcture of the block, the recever extracts the mark from each pcture. Ths s necessary because the extracton from a sngle pcture s, n general, affected by errors. Thus, the mark s obtaned combnng the nformaton extracted from all the pctures n the block. Gven a pcture p n an ncomng block, the recever performs a DCT transform over the lumnance component (Y) of the pcture denoted P. Then, t extracts the mark from the hgh frequences of P (whch are the frequences where the mark was embedded). Ths s acheved usng the followng equatons: P HF n = P HF = P HF n + P HF α n h W n n + P HF α h W 637

5 Let h (j) be the j th replca of the hash nsde pcture and Red be the number of hash replcatons n each pcture. The recever combnes the marks extracted from each pcture usng the followng equaton: =k j=red =1 P (j) n (j)+ P (j) α h (j) (3) where the nner sum accumulates mark replcated wthn a gven pcture, and the outer sum accumulates all the marks extracted from all the pctures n the block. The choce of the number of pctures to be embedded n a block s essental: If the number of pctures s too small, the ntroduced mark redundancy could be nsuffcent and the extracton fal. lock dmensonng s an essental operaton that must be done by the sender n the preprocessng phase of the vdeo streamng. Snce the frst term n Equaton 3 (P (j) n (j)) expresses uncorrelated als, ther sum tends to 0 thus, f the number of pctures n a block s suffcently hgh, Equaton 3 becomes: =k j=red =1 P (j) α h (j). (4) Thus, mark extracton s performed over Equaton 4 usng the um functon as: but =k j=red =1 =k j=red =1 =k j=red =1 P (j) α h (j) P (j) α h P (j) α 1. The pseudo code of the extracton algorthm s shown n Table IV. V. CONCLUSIONS We have presented a novel scheme for authentcatng vdeo streamng n a multcast satellte network. The proposed scheme leverages pecular features of satellte lnk, lke low ER and no packet reorderng. In partcular, ths work shows how t t possble to use watermarkng to embed securty related nformaton. The securty propertes enforced are authentcaton and ntegrty of the multcast stream. These features are acheved usng just one dgtal ature, combned wth a pre-computed hash chan. In partcular, we embed the hash chan nsde the vdeo by means of a watermarkng technque. Ths soluton provdes several benefts; on the sender sde: The computaton overhead sums up to a dgtal ature for the whole stream and a hash per block; as for bandwdth, securty related nformaton does not consume ths resource, snce these data are nserted n the vdeo stream pctures through neglgble modfcatons (at least, not recognzable by humans). On the recever sde: Authentcaton s performed on a per block bass; no extra storage s requred on the recever, except for the storng of a hash value; the computatonal overhead on the recever sde s lmted to one dgtal ature verfcaton, that s amortzed over the whole multcast stream, and one extra hash computaton per block. Future work strves to extend the proposed scheme provdng reslence to ncreasngly lossy channel. REFERENCES [1] F. Lefèbvre, J. Czyz, and. M. Macq, A robust soft hash algorthm for dgtal mage ature. n ICIP (2), 2003, pp [2] O. Goldrech, Two remarks concernng the goldwasser-mcal-rvest ature scheme, n CRYPTO, 1986, pp [3] Dgtal ature standard (DSS). Washngton: Natonal Insttute of Standards and Technology, 2000, federal Informaton Processng Standard [4] R. Rvest, The MD5 message-dgest algorthm, RFC 1321, [5] N.. of Standards, Dgtal ature standard, Natonal ureau of Standards, Tech. Rep. FIPS Publcaton 186, [6] J. Dttmann and F. Nack, Copyrght-copywrong, IEEE MultMeda, vol. 07, no. 4, pp , [7] F. enedetto, G. Gunta, and A. Ner, End-to-end qualty of servce assessment n moble applcatons for user-centrc multmeda networks by tracng watermarkng, n IEEE 12 th Symp. on Communcaton and Vehcular Tecnology, Twente, Netherland, [8] A. Annese, P. arsocch, N. Celandron, and E. Ferro, Performance evaluaton of udp multmeda traffc flows n satellte-wlan ntegrated paths, n Proceedngs of the 11th Ka and roadband Communcatons Conference, Sept. 2005, pp [9] D. L. Gall, Mpeg: a vdeo compresson standard for multmeda applcatons, Commun. ACM, vol. 34, no. 4, pp , [10] R. de run and J. Smts, Dgtal vdeo broadcastng: technology, standards, and regulatons. Norwood, MA, USA: Artech House, Inc., [11] R. L. Rvest, A. Shamr, and L. M. Adelman, A method for obtanng dgtal atures and publc-key cryptosystems, Tech. Rep. MIT/LCS/TM-82, [12] D. Eastlake 3rd and P. Jones, US Secure Hash Algorthm 1 (SHA1), RFC 3174, Sept. 20. [13] M. Luby, L. Vcsano, J. Gemmell, L. Rzzo, M. Handley, and J. Crowcroft, Forward error correcton (fec) buldng block,, Unted States, [14] M. arn, F. artoln, and N. Checcacc, Watermarkng of mpeg-4 vdeo objects. IEEE Transactons on Multmeda, vol. 7, no. 1, pp , [15] S. swas, S. R. Das, and E. M.Petru, An adaptve compressed mpeg- 2 vdeo watermarkng scheme, IEEE Transactons on Instrumentaton and Measuremnent, vol. 54, no. 5, pp ,

Hybrid Non-Blind Color Image Watermarking

Hybrid Non-Blind Color Image Watermarking Hybrd Non-Blnd Color Image Watermarkng Ms C.N.Sujatha 1, Dr. P. Satyanarayana 2 1 Assocate Professor, Dept. of ECE, SNIST, Yamnampet, Ghatkesar Hyderabad-501301, Telangana 2 Professor, Dept. of ECE, AITS,

More information

A Fast Content-Based Multimedia Retrieval Technique Using Compressed Data

A Fast Content-Based Multimedia Retrieval Technique Using Compressed Data A Fast Content-Based Multmeda Retreval Technque Usng Compressed Data Borko Furht and Pornvt Saksobhavvat NSF Multmeda Laboratory Florda Atlantc Unversty, Boca Raton, Florda 3343 ABSTRACT In ths paper,

More information

A Lossless Watermarking Scheme for Halftone Image Authentication

A Lossless Watermarking Scheme for Halftone Image Authentication IJCSNS Internatonal Journal of Computer Scence and Network Securty, VOL.6 No.2B, February 2006 147 A Lossless Watermarkng Scheme for Halftone Image Authentcaton Jeng-Shyang Pan, Hao Luo, and Zhe-Mng Lu,

More information

A Binarization Algorithm specialized on Document Images and Photos

A Binarization Algorithm specialized on Document Images and Photos A Bnarzaton Algorthm specalzed on Document mages and Photos Ergna Kavalleratou Dept. of nformaton and Communcaton Systems Engneerng Unversty of the Aegean kavalleratou@aegean.gr Abstract n ths paper, a

More information

An Optimal Algorithm for Prufer Codes *

An Optimal Algorithm for Prufer Codes * J. Software Engneerng & Applcatons, 2009, 2: 111-115 do:10.4236/jsea.2009.22016 Publshed Onlne July 2009 (www.scrp.org/journal/jsea) An Optmal Algorthm for Prufer Codes * Xaodong Wang 1, 2, Le Wang 3,

More information

Improvement ofmanik et al. s remote user authentication scheme

Improvement ofmanik et al. s remote user authentication scheme Improvement ofmank et al. s remote user authentcaton scheme Abstract Jue-Sam Chou, a,yaln Chen b Jyun-Yu Ln c a Department of Informaton Management, Nanhua Unversty Chay, 622, Tawan schou@mal.nhu.edu.tw

More information

Private Information Retrieval (PIR)

Private Information Retrieval (PIR) 2 Levente Buttyán Problem formulaton Alce wants to obtan nformaton from a database, but she does not want the database to learn whch nformaton she wanted e.g., Alce s an nvestor queryng a stock-market

More information

Key-Selective Patchwork Method for Audio Watermarking

Key-Selective Patchwork Method for Audio Watermarking Internatonal Journal of Dgtal Content Technology and ts Applcatons Volume 4, Number 4, July 2010 Key-Selectve Patchwork Method for Audo Watermarkng 1 Ch-Man Pun, 2 Jng-Jng Jang 1, Frst and Correspondng

More information

Semi-Fragile Watermarking Scheme for Authentication of JPEG Images

Semi-Fragile Watermarking Scheme for Authentication of JPEG Images Tamkang Journal of Scence and Engneerng, Vol. 10, No 1, pp. 5766 (2007) 57 Sem-Fragle Watermarkng Scheme for Authentcaton of JPEG Images Chh-Hung n 1 *, Tung-Shh Su 2 and Wen-Shyong Hseh 2,3 1 Department

More information

Enhanced Watermarking Technique for Color Images using Visual Cryptography

Enhanced Watermarking Technique for Color Images using Visual Cryptography Informaton Assurance and Securty Letters 1 (2010) 024-028 Enhanced Watermarkng Technque for Color Images usng Vsual Cryptography Enas F. Al rawashdeh 1, Rawan I.Zaghloul 2 1 Balqa Appled Unversty, MIS

More information

Simulation Based Analysis of FAST TCP using OMNET++

Simulation Based Analysis of FAST TCP using OMNET++ Smulaton Based Analyss of FAST TCP usng OMNET++ Umar ul Hassan 04030038@lums.edu.pk Md Term Report CS678 Topcs n Internet Research Sprng, 2006 Introducton Internet traffc s doublng roughly every 3 months

More information

Related-Mode Attacks on CTR Encryption Mode

Related-Mode Attacks on CTR Encryption Mode Internatonal Journal of Network Securty, Vol.4, No.3, PP.282 287, May 2007 282 Related-Mode Attacks on CTR Encrypton Mode Dayn Wang, Dongda Ln, and Wenlng Wu (Correspondng author: Dayn Wang) Key Laboratory

More information

A NEW AUDIO WATERMARKING METHOD BASED

A NEW AUDIO WATERMARKING METHOD BASED A NEW AUDIO WATERMARKING METHOD BASED ON DISCRETE COSINE TRANSFORM WITH A GRAY IMAGE Mohammad Ibrahm Khan 1, Md. Iqbal Hasan Sarker 2, Kaushk Deb 3 and Md. Hasan Furhad 4 1,2,3 Department of Computer Scence

More information

Data Hiding and Image Authentication for Color-Palette Images

Data Hiding and Image Authentication for Color-Palette Images Data Hdng and Image Authentcaton for Color-Palette Images Chh-Yang Yn ( 殷志揚 ) and Wen-Hsang Tsa ( 蔡文祥 ) Department of Computer & Informaton Scence Natonal Chao Tung Unversty 00 Ta Hsueh Rd., Hsnchu, Tawan

More information

A Hybrid Semi-Blind Gray Scale Image Watermarking Algorithm Based on DWT-SVD using Human Visual System Model

A Hybrid Semi-Blind Gray Scale Image Watermarking Algorithm Based on DWT-SVD using Human Visual System Model A Hybrd Sem-Blnd Gray Scale Image Watermarkng Algorthm Based on DWT-SVD usng Human Vsual System Model Rajesh Mehta r Scence & Engneerng, USICT Guru Gobnd Sngh Indrarprastha Unversty New Delh, Inda rajesh00ust@gmal.com

More information

Robust Watermarking for Text Images Based on Arnold Scrambling and DWT-DCT

Robust Watermarking for Text Images Based on Arnold Scrambling and DWT-DCT Internatonal Conference on Mechatroncs Electronc Industral and Control Engneerng (MEIC 015) Robust Watermarkng for Text Images Based on Arnold Scramblng and DWT-DCT Fan Wu College of Informaton Scence

More information

Parallelism for Nested Loops with Non-uniform and Flow Dependences

Parallelism for Nested Loops with Non-uniform and Flow Dependences Parallelsm for Nested Loops wth Non-unform and Flow Dependences Sam-Jn Jeong Dept. of Informaton & Communcaton Engneerng, Cheonan Unversty, 5, Anseo-dong, Cheonan, Chungnam, 330-80, Korea. seong@cheonan.ac.kr

More information

Identify the Attack in Embedded Image with Steganalysis Detection Method by PSNR and RGB Intensity

Identify the Attack in Embedded Image with Steganalysis Detection Method by PSNR and RGB Intensity Internatonal Journal of Computer Systems (ISSN: 394-1065), Volume 03 Issue 07, July, 016 Avalable at http://www.jcsonlne.com/ Identfy the Attack n Embedded Image wth Steganalyss Detecton Method by PSNR

More information

Security Enhanced Dynamic ID based Remote User Authentication Scheme for Multi-Server Environments

Security Enhanced Dynamic ID based Remote User Authentication Scheme for Multi-Server Environments Internatonal Journal of u- and e- ervce, cence and Technology Vol8, o 7 0), pp7-6 http://dxdoorg/07/unesst087 ecurty Enhanced Dynamc ID based Remote ser Authentcaton cheme for ult-erver Envronments Jun-ub

More information

High Payload Reversible Data Hiding Scheme Using Difference Segmentation and Histogram Shifting

High Payload Reversible Data Hiding Scheme Using Difference Segmentation and Histogram Shifting JOURNAL OF ELECTRONIC SCIENCE AND TECHNOLOGY, VOL. 11, NO. 1, MARCH 2013 9 Hgh Payload Reversble Data Hdng Scheme Usng Dfference Segmentaton and Hstogram Shftng Yung-Chen Chou and Huang-Chng L Abstract

More information

Hermite Splines in Lie Groups as Products of Geodesics

Hermite Splines in Lie Groups as Products of Geodesics Hermte Splnes n Le Groups as Products of Geodescs Ethan Eade Updated May 28, 2017 1 Introducton 1.1 Goal Ths document defnes a curve n the Le group G parametrzed by tme and by structural parameters n the

More information

End-to-end Distortion Estimation for RD-based Robust Delivery of Pre-compressed Video

End-to-end Distortion Estimation for RD-based Robust Delivery of Pre-compressed Video End-to-end Dstorton Estmaton for RD-based Robust Delvery of Pre-compressed Vdeo Ru Zhang, Shankar L. Regunathan and Kenneth Rose Department of Electrcal and Computer Engneerng Unversty of Calforna, Santa

More information

Content Based Image Retrieval Using 2-D Discrete Wavelet with Texture Feature with Different Classifiers

Content Based Image Retrieval Using 2-D Discrete Wavelet with Texture Feature with Different Classifiers IOSR Journal of Electroncs and Communcaton Engneerng (IOSR-JECE) e-issn: 78-834,p- ISSN: 78-8735.Volume 9, Issue, Ver. IV (Mar - Apr. 04), PP 0-07 Content Based Image Retreval Usng -D Dscrete Wavelet wth

More information

IMPLEMENTATION OF QIM BASED AUDIO WATERMARKING USING HYBRID TRANSFORM OF SWT-DCT-SVD METHODS OPTIMIZED WITH GENETIC ALORITHM

IMPLEMENTATION OF QIM BASED AUDIO WATERMARKING USING HYBRID TRANSFORM OF SWT-DCT-SVD METHODS OPTIMIZED WITH GENETIC ALORITHM IMPLEMENTATION OF QIM BASED AUDIO WATERMARKING USING HYBRID TRANSFORM OF SWT-DCT-SVD METHODS OPTIMIZED WITH GENETIC ALORITHM Ryan Amnullah 1, Gelar Budman 2, Irma Saftr 3 1, 2, 3 FakultasTeknk Elektro,

More information

Lecture #15 Lecture Notes

Lecture #15 Lecture Notes Lecture #15 Lecture Notes The ocean water column s very much a 3-D spatal entt and we need to represent that structure n an economcal way to deal wth t n calculatons. We wll dscuss one way to do so, emprcal

More information

Problem Set 3 Solutions

Problem Set 3 Solutions Introducton to Algorthms October 4, 2002 Massachusetts Insttute of Technology 6046J/18410J Professors Erk Demane and Shaf Goldwasser Handout 14 Problem Set 3 Solutons (Exercses were not to be turned n,

More information

Pattern Recognition 43 (2010) Contents lists available at ScienceDirect. Pattern Recognition. journal homepage:

Pattern Recognition 43 (2010) Contents lists available at ScienceDirect. Pattern Recognition. journal homepage: Pattern Recognton 43 (2010) 397 -- 404 Contents lsts avalable at ScenceDrect Pattern Recognton ournal homepage: www.elsever.com/locate/pr Secret mage sharng based on cellular automata and steganography

More information

An Optimized Pseudorandom Generator using Packed Matrices

An Optimized Pseudorandom Generator using Packed Matrices An Optmzed Pseudorandom Generator usng Packed Matrces JOSE-VICENTE AGUIRRE 1, RAFAEL ÁLVAREZ, LEANDRO TORTOSA 3, ANTONIO ZAMORA 4 Dpt. of Computer Scence and Artfcal Intellgence Unversty of Alcante Campus

More information

Compiler Design. Spring Register Allocation. Sample Exercises and Solutions. Prof. Pedro C. Diniz

Compiler Design. Spring Register Allocation. Sample Exercises and Solutions. Prof. Pedro C. Diniz Compler Desgn Sprng 2014 Regster Allocaton Sample Exercses and Solutons Prof. Pedro C. Dnz USC / Informaton Scences Insttute 4676 Admralty Way, Sute 1001 Marna del Rey, Calforna 90292 pedro@s.edu Regster

More information

Information Hiding Watermarking Detection Technique by PSNR and RGB Intensity

Information Hiding Watermarking Detection Technique by PSNR and RGB Intensity www..org 3 Informaton Hdng Watermarkng Detecton Technque by PSNR and RGB Intensty 1 Neha Chauhan, Akhlesh A. Waoo, 3 P. S. Patheja 1 Research Scholar, BIST, Bhopal, Inda.,3 Assstant Professor, BIST, Bhopal,

More information

A Comparison between Digital Images Watermarking in Tow Different Color Spaces Using DWT2*

A Comparison between Digital Images Watermarking in Tow Different Color Spaces Using DWT2* A Comparson between Dgtal s ng n Tow Dfferent Color Spaces Usng DWT* Mehd Khall Natonal Academy of Scence of Armena Yerevan, Armena e-mal: khall.mehd@yahoo.com ABSTRACT A novel dgtal watermarkng for ownershp

More information

Enhanced AMBTC for Image Compression using Block Classification and Interpolation

Enhanced AMBTC for Image Compression using Block Classification and Interpolation Internatonal Journal of Computer Applcatons (0975 8887) Volume 5 No.0, August 0 Enhanced AMBTC for Image Compresson usng Block Classfcaton and Interpolaton S. Vmala Dept. of Comp. Scence Mother Teresa

More information

Shape-adaptive DCT and Its Application in Region-based Image Coding

Shape-adaptive DCT and Its Application in Region-based Image Coding Internatonal Journal of Sgnal Processng, Image Processng and Pattern Recognton, pp.99-108 http://dx.do.org/10.14257/sp.2014.7.1.10 Shape-adaptve DCT and Its Applcaton n Regon-based Image Codng Yamn Zheng,

More information

Robust Video Watermarking Using Image Normalization, Motion Vector and Perceptual Information

Robust Video Watermarking Using Image Normalization, Motion Vector and Perceptual Information Robust Vdeo Watermarkng Usng Image ormalzaton, Moton Vector and Perceptual Informaton Cedllo-Hernández Antono 1, Cedllo-Hernández Manuel 1, akano-myatake Marko 1, García-Vázquez Mreya S. 2 1 Postgraduate

More information

Security Vulnerabilities of an Enhanced Remote User Authentication Scheme

Security Vulnerabilities of an Enhanced Remote User Authentication Scheme Contemporary Engneerng Scences, Vol. 7, 2014, no. 26, 1475-1482 HIKARI Ltd, www.m-hkar.com http://dx.do.org/10.12988/ces.2014.49186 Securty Vulnerabltes of an Enhanced Remote User Authentcaton Scheme Hae-Soon

More information

Proper Choice of Data Used for the Estimation of Datum Transformation Parameters

Proper Choice of Data Used for the Estimation of Datum Transformation Parameters Proper Choce of Data Used for the Estmaton of Datum Transformaton Parameters Hakan S. KUTOGLU, Turkey Key words: Coordnate systems; transformaton; estmaton, relablty. SUMMARY Advances n technologes and

More information

Steganography System using Slantlet Transform

Steganography System using Slantlet Transform ISSN:43-6999 Journal of Inmaton Communcaton and Intellgence Systems (JICIS) Volume Issue February 06 Steganography System usng Slantlet Transm Ryadh Bassl Abduljabbar Abstract An approach hdng nmaton has

More information

A Secured Method for Image Steganography Based On Pixel Values

A Secured Method for Image Steganography Based On Pixel Values A Secured Method for Image Steganography Based On Pxel Values Tarun Gulat #, Sanskrt Gupta * # Assocate Professor, Electroncs and Communcaton Engneerng Department, MMEC, M.M.U., Mullana, Ambala, Haryana,

More information

ARTICLE IN PRESS. Signal Processing: Image Communication

ARTICLE IN PRESS. Signal Processing: Image Communication Sgnal Processng: Image Communcaton 23 (2008) 754 768 Contents lsts avalable at ScenceDrect Sgnal Processng: Image Communcaton journal homepage: www.elsever.com/locate/mage Dstrbuted meda rate allocaton

More information

OPTIMIZED NESTED PROTECTION FOR VIDEO REGION OF INTEREST WITH RAPTOR CODES

OPTIMIZED NESTED PROTECTION FOR VIDEO REGION OF INTEREST WITH RAPTOR CODES OPTIMIZED NESTED PROTETION OR VIDEO REGION O INTEREST WITH RAPTOR ODES Zhengy Luo 2 L Song 23 Shbao Zheng 2 and Nam Lng 3 Shangha Dgtal Meda Processng and Transmsson Key Lab 2 Shangha Jao Tong Unversty

More information

Needed Information to do Allocation

Needed Information to do Allocation Complexty n the Database Allocaton Desgn Must tae relatonshp between fragments nto account Cost of ntegrty enforcements Constrants on response-tme, storage, and processng capablty Needed Informaton to

More information

MULTISPECTRAL IMAGES CLASSIFICATION BASED ON KLT AND ATR AUTOMATIC TARGET RECOGNITION

MULTISPECTRAL IMAGES CLASSIFICATION BASED ON KLT AND ATR AUTOMATIC TARGET RECOGNITION MULTISPECTRAL IMAGES CLASSIFICATION BASED ON KLT AND ATR AUTOMATIC TARGET RECOGNITION Paulo Quntlano 1 & Antono Santa-Rosa 1 Federal Polce Department, Brasla, Brazl. E-mals: quntlano.pqs@dpf.gov.br and

More information

Digital Video Watermarking using Discrete Wavelet Transform and Principal Component Analysis

Digital Video Watermarking using Discrete Wavelet Transform and Principal Component Analysis Internatonal Journal of Wsdom Based Computng, Vol. 1 (2), August 2011 7 Dgtal Vdeo Watermarkng usng Dscrete Wavelet Transform and Prncpal Component Analyss Sanjana Snha, Prajnat Bardhan, Swarnal Pramanck,

More information

Two-Factor User Authentication in Multi-Server Networks

Two-Factor User Authentication in Multi-Server Networks Internatonal Journal of ecurty and Its Applcatons Vol. 6, No., Aprl, 0 Two-Factor ser Authentcaton n Mult-erver Networks Chun-Ta L, Ch-Yao Weng,* and Chun-I Fan Department of Informaton Management, Tanan

More information

Robust Blind Video Watermark Algorithm in Transform Domain Combining with 3D Video Correlation

Robust Blind Video Watermark Algorithm in Transform Domain Combining with 3D Video Correlation JOURNAL OF MULTIMEDIA, VOL. 8, NO. 2, APRIL 2013 161 Robust Blnd Vdeo Watermark Algorthm n Transform Doman Combnng wth 3D Vdeo Correlaton DING Ha-yang 1,3 1. Informaton Securty Center, Bejng Unversty of

More information

A Time-Bound Ticket-Based Mutual Authentication Scheme for Cloud Computing

A Time-Bound Ticket-Based Mutual Authentication Scheme for Cloud Computing Int. J. of Computers, Communcatons & Control, ISSN 1841-9836, E-ISSN 1841-9844 Vol. VI (2011), No. 2 (June), pp. 227-235 A Tme-Bound Tcket-Based Mutual Authentcaton Scheme for Cloud Computng Z. Hao, S.

More information

Evaluation of an Enhanced Scheme for High-level Nested Network Mobility

Evaluation of an Enhanced Scheme for High-level Nested Network Mobility IJCSNS Internatonal Journal of Computer Scence and Network Securty, VOL.15 No.10, October 2015 1 Evaluaton of an Enhanced Scheme for Hgh-level Nested Network Moblty Mohammed Babker Al Mohammed, Asha Hassan.

More information

User Authentication Based On Behavioral Mouse Dynamics Biometrics

User Authentication Based On Behavioral Mouse Dynamics Biometrics User Authentcaton Based On Behavoral Mouse Dynamcs Bometrcs Chee-Hyung Yoon Danel Donghyun Km Department of Computer Scence Department of Computer Scence Stanford Unversty Stanford Unversty Stanford, CA

More information

S1 Note. Basis functions.

S1 Note. Basis functions. S1 Note. Bass functons. Contents Types of bass functons...1 The Fourer bass...2 B-splne bass...3 Power and type I error rates wth dfferent numbers of bass functons...4 Table S1. Smulaton results of type

More information

Video Proxy System for a Large-scale VOD System (DINA)

Video Proxy System for a Large-scale VOD System (DINA) Vdeo Proxy System for a Large-scale VOD System (DINA) KWUN-CHUNG CHAN #, KWOK-WAI CHEUNG *# #Department of Informaton Engneerng *Centre of Innovaton and Technology The Chnese Unversty of Hong Kong SHATIN,

More information

IMAGE FUSION TECHNIQUES

IMAGE FUSION TECHNIQUES Int. J. Chem. Sc.: 14(S3), 2016, 812-816 ISSN 0972-768X www.sadgurupublcatons.com IMAGE FUSION TECHNIQUES A Short Note P. SUBRAMANIAN *, M. SOWNDARIYA, S. SWATHI and SAINTA MONICA ECE Department, Aarupada

More information

Lecture 5: Multilayer Perceptrons

Lecture 5: Multilayer Perceptrons Lecture 5: Multlayer Perceptrons Roger Grosse 1 Introducton So far, we ve only talked about lnear models: lnear regresson and lnear bnary classfers. We noted that there are functons that can t be represented

More information

An Improved User Authentication and Key Agreement Scheme Providing User Anonymity

An Improved User Authentication and Key Agreement Scheme Providing User Anonymity 35 JOURNAL OF ELECTRONIC SCIENCE AND TECHNOLOGY, VOL. 9, NO. 4, DECEMBER 0 An Improved User Authentcaton and Key Agreement Scheme Provdng User Anonymty Ya-Fen Chang and Pe-Yu Chang Abstract When accessng

More information

Video streaming over the Internet is becoming very popular and

Video streaming over the Internet is becoming very popular and Streamng MPEG-4 AudoVsual Objects Usng TCP-Frendly Rate Control and Unequal Error Protecton Toufk Ahmed 1, Ahmed Mehaoua 1 and Vncent Lecure 2 1 2 CNRS-PRSM LabUnversty of Versalles CRAN lab CNRS UMR 739

More information

Analysis of Collaborative Distributed Admission Control in x Networks

Analysis of Collaborative Distributed Admission Control in x Networks 1 Analyss of Collaboratve Dstrbuted Admsson Control n 82.11x Networks Thnh Nguyen, Member, IEEE, Ken Nguyen, Member, IEEE, Lnha He, Member, IEEE, Abstract Wth the recent surge of wreless home networks,

More information

Distributed Secret Key Management Based on ECC for Ad-hoc Network Yi-xuan WU, Hua-wei CHEN * and Lei WANG

Distributed Secret Key Management Based on ECC for Ad-hoc Network Yi-xuan WU, Hua-wei CHEN * and Lei WANG 2017 2nd Internatonal Conference on Computer, Network Securty and Communcaton Engneerng (CNSCE 2017) ISBN: 978-1-60595-439-4 Dstrbuted Secret Key Management Based on ECC for Ad-hoc Network Y-xuan WU, Hua-we

More information

Virtual Machine Migration based on Trust Measurement of Computer Node

Virtual Machine Migration based on Trust Measurement of Computer Node Appled Mechancs and Materals Onlne: 2014-04-04 ISSN: 1662-7482, Vols. 536-537, pp 678-682 do:10.4028/www.scentfc.net/amm.536-537.678 2014 Trans Tech Publcatons, Swtzerland Vrtual Machne Mgraton based on

More information

The Codesign Challenge

The Codesign Challenge ECE 4530 Codesgn Challenge Fall 2007 Hardware/Software Codesgn The Codesgn Challenge Objectves In the codesgn challenge, your task s to accelerate a gven software reference mplementaton as fast as possble.

More information

A Fingerprint Matching Model using Unsupervised Learning Approach

A Fingerprint Matching Model using Unsupervised Learning Approach A Fngerprnt Matchng Model usng Unsupervsed Learnng Approach Nasser S. Abouzakhar and Muhammed Bello Abdulazeez School of Computer Scence, The Unversty of Hertfordshre, College Lane, Hatfeld AL 10 9AB,

More information

Real-Time Guarantees. Traffic Characteristics. Flow Control

Real-Time Guarantees. Traffic Characteristics. Flow Control Real-Tme Guarantees Requrements on RT communcaton protocols: delay (response s) small jtter small throughput hgh error detecton at recever (and sender) small error detecton latency no thrashng under peak

More information

An Iterative Solution Approach to Process Plant Layout using Mixed Integer Optimisation

An Iterative Solution Approach to Process Plant Layout using Mixed Integer Optimisation 17 th European Symposum on Computer Aded Process Engneerng ESCAPE17 V. Plesu and P.S. Agach (Edtors) 2007 Elsever B.V. All rghts reserved. 1 An Iteratve Soluton Approach to Process Plant Layout usng Mxed

More information

Reducing Frame Rate for Object Tracking

Reducing Frame Rate for Object Tracking Reducng Frame Rate for Object Trackng Pavel Korshunov 1 and We Tsang Oo 2 1 Natonal Unversty of Sngapore, Sngapore 11977, pavelkor@comp.nus.edu.sg 2 Natonal Unversty of Sngapore, Sngapore 11977, oowt@comp.nus.edu.sg

More information

Type-2 Fuzzy Non-uniform Rational B-spline Model with Type-2 Fuzzy Data

Type-2 Fuzzy Non-uniform Rational B-spline Model with Type-2 Fuzzy Data Malaysan Journal of Mathematcal Scences 11(S) Aprl : 35 46 (2017) Specal Issue: The 2nd Internatonal Conference and Workshop on Mathematcal Analyss (ICWOMA 2016) MALAYSIAN JOURNAL OF MATHEMATICAL SCIENCES

More information

Fuzzy Filtering Algorithms for Image Processing: Performance Evaluation of Various Approaches

Fuzzy Filtering Algorithms for Image Processing: Performance Evaluation of Various Approaches Proceedngs of the Internatonal Conference on Cognton and Recognton Fuzzy Flterng Algorthms for Image Processng: Performance Evaluaton of Varous Approaches Rajoo Pandey and Umesh Ghanekar Department of

More information

PYTHON IMPLEMENTATION OF VISUAL SECRET SHARING SCHEMES

PYTHON IMPLEMENTATION OF VISUAL SECRET SHARING SCHEMES PYTHON IMPLEMENTATION OF VISUAL SECRET SHARING SCHEMES Ruxandra Olmd Faculty of Mathematcs and Computer Scence, Unversty of Bucharest Emal: ruxandra.olmd@fm.unbuc.ro Abstract Vsual secret sharng schemes

More information

A new remote user authentication scheme for multi-server architecture

A new remote user authentication scheme for multi-server architecture Future Generaton Computer Systems 19 (2003) 13 22 A new remote user authentcaton scheme for mult-server archtecture Iuon-Chang Ln a, Mn-Shang Hwang b,, L-Hua L b a Department of Computer Scence and Informaton

More information

Support Vector Machines

Support Vector Machines /9/207 MIST.6060 Busness Intellgence and Data Mnng What are Support Vector Machnes? Support Vector Machnes Support Vector Machnes (SVMs) are supervsed learnng technques that analyze data and recognze patterns.

More information

Mathematics 256 a course in differential equations for engineering students

Mathematics 256 a course in differential equations for engineering students Mathematcs 56 a course n dfferental equatons for engneerng students Chapter 5. More effcent methods of numercal soluton Euler s method s qute neffcent. Because the error s essentally proportonal to the

More information

Resource-Efficient Multi-Source Authentication Utilizing Split-Join One-Way Key Chain

Resource-Efficient Multi-Source Authentication Utilizing Split-Join One-Way Key Chain Resource-Effcent Mult-Source Authentcaton Utlzng Splt-Jon One-Way ey Chan Seonho Cho, un Sun, Hyeonsang Eom 3 Department of Computer Scence, Bowe State Unversty, Bowe, Maryland, U.S.A. Center for Secure

More information

KEYWORDS: Digital Image Watermarking, Discrete Wavelet Transform, General Regression Neural Network, Human Visual System. 1.

KEYWORDS: Digital Image Watermarking, Discrete Wavelet Transform, General Regression Neural Network, Human Visual System. 1. An Adaptve Dgtal Image Watermarkng Based on Image Features n Dscrete Wavelet Transform Doman and General Regresson Neural Network Ayoub Taher Group of IT Engneerng, Payam Noor Unversty, Broujen, Iran ABSTRACT:

More information

Cluster Analysis of Electrical Behavior

Cluster Analysis of Electrical Behavior Journal of Computer and Communcatons, 205, 3, 88-93 Publshed Onlne May 205 n ScRes. http://www.scrp.org/ournal/cc http://dx.do.org/0.4236/cc.205.350 Cluster Analyss of Electrcal Behavor Ln Lu Ln Lu, School

More information

Accounting for the Use of Different Length Scale Factors in x, y and z Directions

Accounting for the Use of Different Length Scale Factors in x, y and z Directions 1 Accountng for the Use of Dfferent Length Scale Factors n x, y and z Drectons Taha Soch (taha.soch@kcl.ac.uk) Imagng Scences & Bomedcal Engneerng, Kng s College London, The Rayne Insttute, St Thomas Hosptal,

More information

Brushlet Features for Texture Image Retrieval

Brushlet Features for Texture Image Retrieval DICTA00: Dgtal Image Computng Technques and Applcatons, 1 January 00, Melbourne, Australa 1 Brushlet Features for Texture Image Retreval Chbao Chen and Kap Luk Chan Informaton System Research Lab, School

More information

Smoothing Spline ANOVA for variable screening

Smoothing Spline ANOVA for variable screening Smoothng Splne ANOVA for varable screenng a useful tool for metamodels tranng and mult-objectve optmzaton L. Rcco, E. Rgon, A. Turco Outlne RSM Introducton Possble couplng Test case MOO MOO wth Game Theory

More information

Research of Multiple Text Watermarks Technique in Electric Power System Texts

Research of Multiple Text Watermarks Technique in Electric Power System Texts Sensors & Transducers 203 by IFSA http://www.sensorsportal.com Research of Multple Text atermarks Technque n Electrc Power System Texts Xao-X XING, Qng CHEN, 2 Lan-X FU School of Optcal-Electrcal and Computer

More information

Research and Application of Fingerprint Recognition Based on MATLAB

Research and Application of Fingerprint Recognition Based on MATLAB Send Orders for Reprnts to reprnts@benthamscence.ae The Open Automaton and Control Systems Journal, 205, 7, 07-07 Open Access Research and Applcaton of Fngerprnt Recognton Based on MATLAB Nng Lu* Department

More information

Module Management Tool in Software Development Organizations

Module Management Tool in Software Development Organizations Journal of Computer Scence (5): 8-, 7 ISSN 59-66 7 Scence Publcatons Management Tool n Software Development Organzatons Ahmad A. Al-Rababah and Mohammad A. Al-Rababah Faculty of IT, Al-Ahlyyah Amman Unversty,

More information

IAJIT First Online Publication

IAJIT First Online Publication Content Protecton n Vdeo Data Based on Robust Dgtal Watermarkng Resstant to Intentonal and Unntentonal Attacks Mad Masoum and Shervn Amr Department of Electrcal Engneerng, Islamc Azad Unversty Qazvn Branch,

More information

An Image Fusion Approach Based on Segmentation Region

An Image Fusion Approach Based on Segmentation Region Rong Wang, L-Qun Gao, Shu Yang, Yu-Hua Cha, and Yan-Chun Lu An Image Fuson Approach Based On Segmentaton Regon An Image Fuson Approach Based on Segmentaton Regon Rong Wang, L-Qun Gao, Shu Yang 3, Yu-Hua

More information

R s s f. m y s. SPH3UW Unit 7.3 Spherical Concave Mirrors Page 1 of 12. Notes

R s s f. m y s. SPH3UW Unit 7.3 Spherical Concave Mirrors Page 1 of 12. Notes SPH3UW Unt 7.3 Sphercal Concave Mrrors Page 1 of 1 Notes Physcs Tool box Concave Mrror If the reflectng surface takes place on the nner surface of the sphercal shape so that the centre of the mrror bulges

More information

Research Article Hamming Code Based Watermarking Scheme for 3D Model Verification

Research Article Hamming Code Based Watermarking Scheme for 3D Model Verification Mathematcal Problems n Engneerng, Artcle ID 241093, 7 pages http://dx.do.org/10.1155/2014/241093 Research Artcle Hammng Code Based Watermarkng Scheme for 3D Model Verfcaton Jen-Tse Wang, 1 Y-Chng Chang,

More information

Image Representation & Visualization Basic Imaging Algorithms Shape Representation and Analysis. outline

Image Representation & Visualization Basic Imaging Algorithms Shape Representation and Analysis. outline mage Vsualzaton mage Vsualzaton mage Representaton & Vsualzaton Basc magng Algorthms Shape Representaton and Analyss outlne mage Representaton & Vsualzaton Basc magng Algorthms Shape Representaton and

More information

IEEE n Aggregation Performance Study for the Multicast

IEEE n Aggregation Performance Study for the Multicast IEEE 802.11n Aggregaton Performance Study for the Multcast Yousr Daldoul, Toufk Ahmed, Djamal-Eddne Meddour To cte ths verson: Yousr Daldoul, Toufk Ahmed, Djamal-Eddne Meddour. IEEE 802.11n Aggregaton

More information

Coding Artifact Reduction Using Edge Map Guided Adaptive and Fuzzy Filter

Coding Artifact Reduction Using Edge Map Guided Adaptive and Fuzzy Filter MEL A MITSUBISHI ELECTIC ESEACH LABOATOY http://www.merl.com Codng Artfact educton Usng Edge Map Guded Adaptve and Fuzzy Flter Hao-Song Kong Yao Ne Anthony Vetro Hufang Sun Kenneth E. Barner T-2004-056

More information

6.854 Advanced Algorithms Petar Maymounkov Problem Set 11 (November 23, 2005) With: Benjamin Rossman, Oren Weimann, and Pouya Kheradpour

6.854 Advanced Algorithms Petar Maymounkov Problem Set 11 (November 23, 2005) With: Benjamin Rossman, Oren Weimann, and Pouya Kheradpour 6.854 Advanced Algorthms Petar Maymounkov Problem Set 11 (November 23, 2005) Wth: Benjamn Rossman, Oren Wemann, and Pouya Kheradpour Problem 1. We reduce vertex cover to MAX-SAT wth weghts, such that the

More information

Efficient Content Representation in MPEG Video Databases

Efficient Content Representation in MPEG Video Databases Effcent Content Representaton n MPEG Vdeo Databases Yanns S. Avrths, Nkolaos D. Doulams, Anastasos D. Doulams and Stefanos D. Kollas Department of Electrcal and Computer Engneerng Natonal Techncal Unversty

More information

Steps for Computing the Dissimilarity, Entropy, Herfindahl-Hirschman and. Accessibility (Gravity with Competition) Indices

Steps for Computing the Dissimilarity, Entropy, Herfindahl-Hirschman and. Accessibility (Gravity with Competition) Indices Steps for Computng the Dssmlarty, Entropy, Herfndahl-Hrschman and Accessblty (Gravty wth Competton) Indces I. Dssmlarty Index Measurement: The followng formula can be used to measure the evenness between

More information

CHAPTER 2 DECOMPOSITION OF GRAPHS

CHAPTER 2 DECOMPOSITION OF GRAPHS CHAPTER DECOMPOSITION OF GRAPHS. INTRODUCTION A graph H s called a Supersubdvson of a graph G f H s obtaned from G by replacng every edge uv of G by a bpartte graph,m (m may vary for each edge by dentfyng

More information

Load-Balanced Anycast Routing

Load-Balanced Anycast Routing Load-Balanced Anycast Routng Chng-Yu Ln, Jung-Hua Lo, and Sy-Yen Kuo Department of Electrcal Engneerng atonal Tawan Unversty, Tape, Tawan sykuo@cc.ee.ntu.edu.tw Abstract For fault-tolerance and load-balance

More information

Distortion Function Designing for JPEG Steganography with Uncompressed Side-image

Distortion Function Designing for JPEG Steganography with Uncompressed Side-image Dstorton Functon Desgnng for JPEG Steganography wth Uncompressed Sde-mage Fangjun Huang School of Informaton Scence and Technology, Sun Yat-Sen Unversty, GD 56, Chna huangfj@mal.sysu.edu.cn Jwu Huang School

More information

Skew Angle Estimation and Correction of Hand Written, Textual and Large areas of Non-Textual Document Images: A Novel Approach

Skew Angle Estimation and Correction of Hand Written, Textual and Large areas of Non-Textual Document Images: A Novel Approach Angle Estmaton and Correcton of Hand Wrtten, Textual and Large areas of Non-Textual Document Images: A Novel Approach D.R.Ramesh Babu Pyush M Kumat Mahesh D Dhannawat PES Insttute of Technology Research

More information

CHAPTER 3 ENCODING VIDEO SEQUENCES IN FRACTAL BASED COMPRESSION. Day by day, the demands for higher and faster technologies are rapidly

CHAPTER 3 ENCODING VIDEO SEQUENCES IN FRACTAL BASED COMPRESSION. Day by day, the demands for higher and faster technologies are rapidly 65 CHAPTER 3 ENCODING VIDEO SEQUENCES IN FRACTAL BASED COMPRESSION 3.1 Introducton Day by day, the demands for hgher and faster technologes are rapdly ncreasng. Although the technologes avalable now are

More information

A mathematical programming approach to the analysis, design and scheduling of offshore oilfields

A mathematical programming approach to the analysis, design and scheduling of offshore oilfields 17 th European Symposum on Computer Aded Process Engneerng ESCAPE17 V. Plesu and P.S. Agach (Edtors) 2007 Elsever B.V. All rghts reserved. 1 A mathematcal programmng approach to the analyss, desgn and

More information

Detection of an Object by using Principal Component Analysis

Detection of an Object by using Principal Component Analysis Detecton of an Object by usng Prncpal Component Analyss 1. G. Nagaven, 2. Dr. T. Sreenvasulu Reddy 1. M.Tech, Department of EEE, SVUCE, Trupath, Inda. 2. Assoc. Professor, Department of ECE, SVUCE, Trupath,

More information

VRT012 User s guide V0.1. Address: Žirmūnų g. 27, Vilnius LT-09105, Phone: (370-5) , Fax: (370-5) ,

VRT012 User s guide V0.1. Address: Žirmūnų g. 27, Vilnius LT-09105, Phone: (370-5) , Fax: (370-5) , VRT012 User s gude V0.1 Thank you for purchasng our product. We hope ths user-frendly devce wll be helpful n realsng your deas and brngng comfort to your lfe. Please take few mnutes to read ths manual

More information

Lecture - Data Encryption Standard 4

Lecture - Data Encryption Standard 4 The Data Encrypton Standard For an encrypton algorthm we requre: secrecy of the key and not of the algorthm tself s the only thng that s needed to ensure the prvacy of the data the best cryptographc algorthms

More information

Network-Driven Layered Multicast with IPv6

Network-Driven Layered Multicast with IPv6 Network-Drven Layered Multcast wth IPv6 Ho-pong Sze and Soung C. Lew Department of Informaton Engneerng, The Chnese Unversty of Hong Kong, Shatn, N.T., Hong Kong {hpsze8, soung}@e.cuhk.edu.hk Abstract.

More information

Remote display of large raster images using JPEG2000 and the rectangular FishEye-View

Remote display of large raster images using JPEG2000 and the rectangular FishEye-View Remote dsplay of large raster mages usng JPEG2000 and the rectangular FshEye-Vew René Rosenbaum* Insttute of Computer Graphcs Unversty of Rostock 18059 Rostock Germany rrosen@nformatk.un-rostock.de Davd

More information

SLAM Summer School 2006 Practical 2: SLAM using Monocular Vision

SLAM Summer School 2006 Practical 2: SLAM using Monocular Vision SLAM Summer School 2006 Practcal 2: SLAM usng Monocular Vson Javer Cvera, Unversty of Zaragoza Andrew J. Davson, Imperal College London J.M.M Montel, Unversty of Zaragoza. josemar@unzar.es, jcvera@unzar.es,

More information

An Image Compression Algorithm based on Wavelet Transform and LZW

An Image Compression Algorithm based on Wavelet Transform and LZW An Image Compresson Algorthm based on Wavelet Transform and LZW Png Luo a, Janyong Yu b School of Chongqng Unversty of Posts and Telecommuncatons, Chongqng, 400065, Chna Abstract a cylpng@63.com, b y27769864@sna.cn

More information