Mobile Application Security for Video Streaming Authentication and Data Integrity Combining Digital Signature and Watermarking Techniques
|
|
- Jewel Miller
- 6 years ago
- Views:
Transcription
1 Moble Applcaton Securty for Vdeo Streamng Authentcaton and Data Integrty Combnng Dgtal Sgnature and Watermarkng Technques Stefano Chessa, Roberto D Petro, Erna Ferro, Gaetano Gunta, Gabrele Olger ISTI-CNR, Area della Rcerca d Psa, Va G.Moruzz 1, Psa, Italy Dpartmento d Informatca, Unverstà d Psa, Largo. Pontecorvo 3, Psa, Italy Dpartmento d Matematca, Unverstà d Roma Tre, L.go S. Muraldo 1, 046 Rome, Italy. Dpartmento d Elettronca Applcata, Unverstà d Roma Tre, Va della Vasca Navale 84, 046 Rome, Italy. Abstract Satellte lnk presents pecular characterstcs lke no packet reorderng and low bt error rate. In ths paper we leverage these characterstcs combned wth watermarkng technques to propose a novel authentcaton algorthm for multcast vdeo streamng. Ths algorthm combnes a sngle dgtal ature wth a hash chan pre-computed on the transmtter sde; the hash chan s embedded n the vdeo stream by means of a watermarkng technque. Our proposal shows several nterestng features: Authentcaton s enforced, as well as ntegrty of the receved multcast stream; receved blocks can be authentcated on the fly; no storage s requred on the recever sde, except for the amount of memory needed to store a sngle hash; overhead computatons requred on the recever sum up to sngle hash per block, whle a dgtal ature verfcaton s amortzed over the whole receved stream. Fnally, note that the bandwdth overhead ntroduced s neglgble, snce the appled watermarkng technque ntroduces vrtually no modfcatons (at least, not recognzable by humans) on the orgnal vdeo stream pctures. I. INTRODUCTION In a secure vdeo-streamng system, sender authentcaton must be performed to prevent unauthorsed use of the shared meda [1]. Conventonal methods for securely dentfyng mages use hash functons. Dgtal ature standard, used n cryptosystem to dspute authentcaton documents, also nvolve the use of hash functons. A dgtal ature s a bt stream dependent on a prvate key and the content of the document to be ed. For each document, the dgtal ature algorthm provdes a unque output bt stream [2]. Authentcaton schemes assert that an adversary cannot compute the same ature wth two dfferent messages. In cryptosystems, ths type of process s largely used to ensure data ntegrty, data orgn authentcaton and non repudaton. The dgtal ature s based on a hash functon (or a oneway hash functon -OWH-) and an encrypton algorthm [3]. Ths work has been supported by the CNR/MIUR program Legge 449/97 (project IS-Manet) and by the European Commsson wthn the 6th Research Framework Programme n the framework of the European Satellte Communcatons Network of Excellence (SatNEx II, IST-27393) for the FT4 Vdeo Streamng Authentcaton n satellte communcatons (VStA) of the JA 2240 Securty. One-way functons and cryptographc hash functons are computed by cryptographc prmtves wthout key. For example, MD5 [4] and SHA-1 [5] are customzed hash functons n cryptographc process. Another method for securely dentfyng mages s watermarkng. In order to be effcent n mages [1], the dgtal ature should be dfferent f and only f the mage contents are dfferent. Dgtal watermarkng [6] s a multdscplnary feld that combnes meda and al processng wth cryptography, communcaton theory, codng theory, al compresson, theory of human percepton, and qualty of servce requrements [7]. Technques based on watermarkng are largely used for copyrght protecton and fast search of mages n databases [6]. In authentcaton or copyrght watermark, the embedded ature watermarks the data wth the owner s or producer s dentfcaton. Ths s the enablng technology to prove ownershp on copyrghted materal, ether to montor the use of the copyrghted multmeda data, or to analyse where the data s n use over networks and servers. Ths technology bulds on the dea of hdng meta-nformaton, lke an owner s ature, n physcal materal n whch content s represented, such as the pxels of an mage. From the dgtal form, authorsed recpents can extract the embedded nformaton when necessary to show proof of ownershp. In general, we have a watermarkng embeddng functon that nserts a watermark h nto meda data and generates the watermarked data w. A detector can check for the exstence of the watermark and extracts t (h) from data w. The embeddng and detector functons are usually publc but they are ntalsed by keys to acheve securty. Referrng to the exstng lterature, to the best of our knowledge, no publshed papers deal wth proposals of a combned procedure nvolvng dgtal watermarkng together wth publc/prvate key securty mechansm. Dgtal watermarkng technques should be robust and fragle at once [6]. Copyrght, fngerprnt, and copy-control watermarks should have a hgh robustness, consstng of resstance to blnd, non-targeted modfcatons, or common meda operaton. For manpulaton recognton, the ntegrty watermark /$ IEEE 634
2 0 1 RSA(H( 1)) H( ) 1 2 H( ) Fg. 2. Hash chan constructed on three blocks. Fg. 1. Multcast satellte scenaro. must be fragle (t dsappears f someone has altered the fle) to detect altered meda. Secure watermarkng mples that embedded nformaton cannot be removed by targeted attacks wthout these modfcatons beng detected. Moreover, watermark must be transparent accordng to the propertes of the human sensory system, n order that a transparent watermark causes no artfacts or qualty loss. Furthermore, ether a prvate verfcaton (by a prvate-key functon) or a publc verfcaton (by a publc-key algorthm) of the embedded watermark has to be mplemented, dependng on the partcular applcaton. All these characterstcs should operate at a reasonable level of complexty: The ntroduced overhead requred to embed and retreve a watermark should be low, especally for real-tme applcatons such as vdeo-streamng. II. SYSTEM MODEL Multcast satellte networks present pecular characterstcs lke hgh round trp tme, no packet reorderng and low bt error rate (ER). For nstance, geostatonary satelltes placed n equatoral orbt at 36,000 km alttude, ntroduce a transmsson delay between transmtter and recever of about 250 ms, whle satellte lnk presents a low ER of about 10 8 n the majorty of cases [8]. Ths low ER s due to de requrements and structural constrants. Leveragng the low ER and the no packet reorderng feature, we propose a novel schema for authentcatng multcast vdeo streamng that does not affect avalable bandwdth. Our scenaro s n Fgure 1: The center has to dstrbute an uncompressed vdeo stream through a multcast satellte network. oth transmtter and recever can perform preprocessng elaboratons, lke MPEG2 codng/decodng, before the transmsson and after recepton respectvely. The use of MPEG2 [9] algorthm s justfed f we assume our satellte network usng DV-S [10]. The sender preprocesses the uncompressed vdeo stream nsertng n t the authentcaton nformaton. Ths s acheved wth watermarkng technque. The next step for the sender s frst to perform MPEG2 compresson and then to transmt the al to the varous recever statons through the satellte net- work. It s worth notcng that usng watermarkng technque to embed authentcaton nformaton wthn the vdeo stream avods to ncur n any bandwdth overhead. Indeed, the authentcaton nformaton ntroduce just transparent modfcatons to the vdeo pctures (that s, modfcatons that wll not affect the perceved qualty of the vdeo). Each recever staton decompresses the vdeo stream and then authentcates t. Ths goal s obtaned combnng a a dgtal ature lke RSA [11] wth a hash chan. Fgure 2 syntheszes the authentcaton schema, where x s the compressed verson of the block x (GOP). Ths approach amortses also the computatonal overhead due to the sngle asymmetrc ature over the whole vdeo stream, tradng off the overhead related to dgtal ature, wth the overhead requred by one way hash functons, lke SHA-1 [12], charactersed by a low computatonal overhead. III. THE AUTHENTICATION PROCEDURE In ths secton we present a novel authentcaton procedure for multcast vdeo streamng. We propose a new authentcaton schema based on sngle dgtal ature lke RSA [11], authentcatng a one-tme ature chan. The hash chan, (that could be bult over SHA-1 [12]) s hdden n the vdeo stream pctures, by means of the watermarkng technque descrbed n Secton IV. An MPEG2 vdeo stream can be consdered as a GOP (Group Of Pctures) sequence, lke n Fgure 3. A GOP s composed of three dfferent types of pctures: I-pcture (Intra), P-pcture (Predctve), and -pcture (drectonally predctve). Insde a GOP there s only one I-pcture and one or more and P-pctures. Compresson s computed over two dfferent levels: The spatal and the temporal ones [9]. Spatal compresson s performed only over the I-pcture, whle temporal compresson s carred out over the and the P-pctures. These pctures are obtaned va dfference from the I-pcture. A GOP, hereafter G, represents n the MPEG2 doman a well known pcture sequence (block) n the uncompressed doman. Let H( ) and Sgnature( ) be the functons that mplement a SHA-1 hash and an RSA ature respectvely. The functon Mpeg2( ) computes the GOP assocated wth the specfc nput block usng the MPEG2 algorthm. Fnally, W (x, y) nserts the data y nto a block of x pctures accordng to the watermarkng algorthm descrbed n Secton IV. Table I descrbes n detals how the sender bulds up the hash chan. Transmtter s provded wth an uncompressed vdeo stream S and nterprets t as sequence of blocks of pctures 635
3 S G 1 G2 G3 G4 G n 1 Gn Fg. 3. IP... Vdeo stream as a pcture sequence. [ 1,..., n ], so that each block wll be codfed afterwards as a GOP by the MPEG2 algorthm. The last block of the vdeo sequence s compressed: G c = Mpeg2( n ). The constructon of the hash chan starts from the block of ndex n 1. The hash value h s calculated over the GOP G c through the functon h = H(G c ). Ths value (h ) s nserted nto the block by means of the watermarkng functon W (,h ).The watermarked block s now encoded wth G c = Mpeg2( w), obtanng the GOP G c that wll be the argument for the next hash calculaton. The procedure s terated over all the blocks up to the frst one ( 1 ). Fnally, the frst GOP (G c ) s authentcated through a dgtal ature wth Sgnature(H(G c )). Note that ths s the only asymmetrc operaton performed by the sender. The marked block sequence s now codfed wth MPEG2 by the functon Mpeg2([1 w,...,n w ]). Note that each block belongng to S s codfed nto a GOP n S c. Hence, each block n the uncompressed doman corresponds to a GOP n the compressed doman. TALE I Constructon of the sngle hash chan let S =[ 1,..., n] be the uncompressed vdeo stream block sequence; G c = Mpeg2( n) ; for = n 1 to 1 h = H(G c); w = W (,h ); G c = Mpeg2( w ) ; Sg = Sgnature(H(G c)); S c = Mpeg2([1 w,...,n w ]) ; Transmt (Sg,S c); On the recever sde, the authentcaton procedure work as follows: Once the recever has stored (Sg,S c ), t decodes the MPEG2 stream and extracts a GOP sequence from the compressed vdeo stream S c va ExtGOP( ), that s: [G 1,...,G n ]=ExtGOP(S c ). Now, the recever has to authentcate the anchor of the authentcaton chan. Note that ths operaton s the only operaton based on asymmetrc key cryptography on the recever sde. Hence, once the hash over the frst GOP s computed: h = H(G 1 ), ths value s employed to verfy the dgtal ature (Sg) wth V ersgnature(sg,h). If the test succeeds, the recever can subsequently authentcate the vdeo stream checkng for the authentcty of each block of the hash chan. The hash value h nserted by the sender s extracted from the block u through the watermark retreval functon E( u ). u s obtaned repeatedly from each GOP belongng to the vdeo stream through u = UnMpeg2(G ). The value h s then compared wth the hash calculated by the recever over the GOP G +1, that s H(G +1 ). The executon proceeds teratvely only f the test s successful for all of the blocks. If a pcture s corrupted (for nstance, forged or changed durng the channel transmsson) ts hash changes, and the authentcaton test fals. Note that once a falure s trggered, all the subsequent pctures cannot be authentcated. Table II shows n detals the algorthm run by the recever. TALE II Verfcaton of the authentcty of sequence Sg,S c Receve (Sg,S c); [G 1,...,G n]=extgop (S c) ; h = H(G 1); f not ( V ersgnature(sg,h) ) authentcaton faled; ext; for =1to n u = UnMpeg2(G ) ; h = E( u); f h =H(G +1); authentcaton faled; ext; Wthout losng of generalty, we assumed that the sequence (Sg,S c ) s receved correctly. Whle ths assumpton s acceptable due to the low ER of satellte lnk, t should be noted that f message corrupton should become an ssue, t could be tackled consderng redundant hash chan or usng FEC [13]. For nstance, robustness could be obtaned embeddng nto the same block more than one hash calculated over several GOP. IV. THE EMEDDING PROCEDURE A. Embeddng nformaton as watermark In ths secton we descrbe the technque used to embed the hash chan nto the vdeo stream. In partcular, we descrbe the functons W ( ) and E( ) used n the prevous secton. Note that our use of watermarkng technques s not standard; classcal watermarkng s used to embed a logo (generally a pcture) wthn a vdeo stream. Ths embeddng s hdden n the vdeo and t can be extracted to wtness the ownershp of the vdeo. It s acceptable that the extracton 636
4 could be lossy, that s, the logo can be extracted wth errors, provded t remans recognsable. Instead, n our case, we use watermarkng to embed the result of a hash computaton. The extracton of the hash must not be affected by errors, otherwse the hash chan would break and the recever could not authentcate the remanng of the vdeo stream. For ths reason, n ths secton we propose an embeddng technque that provdes error-free hash extracton. An uncompressed vdeo stream can be consdered as a three dmensonal al, where ts components are a bdmensonal matrx (the pcture) and the tme. Each pcture s formed by a w h matrx of pxels; each pxel expresses a colour that can be represented by three values: R (red), G (green), (blue) or, equvalently, by Y(lumnance) and U, V (chromnance) components. In our algorthm, we consder the Y-U-V representaton, and we embed a mark (hash) on each pcture of the vdeo stream on ts lumnance component (Y). We use a Fourer doman method based on the DCT (dscrete cosne transform). Ths method assures robustness wth regard to varous types of compresson methods lke MPEG2 or MPEG4 [14], [15]. Ths procedure works modfyng the mage frequency doman coeffcents; t thus has a mnmal mpact n the spatal doman of the pcture. Let us consder as a block of pctures and h the hash value that should be embedded n each pcture belongng to the block. Note that, due to specfc features of the mark extracton (dscussed n Secton IV-), the mark must be represented as a sequence of 1, 1. For ths reason h (whch s a sequence of 0, 1) s frst smply converted nto a sequence of 1, 1. Then, for each pcture p (wth 1 m) n, themarkh s embedded n p usng the followng equaton: P = DCTp (Y) (1) TALE III Functon W ( ) embeddng a hash value nto vdeo stream pctures let be a vdeo block belongng to the stream S; let h be the hash value to be embedded n ; let p 1,...,p m be the pctures belongng to ; let α be an amplfcaton factor; let PRSG( ) be a pseudo random sequence generator algorthm; H Rep =[h,h,...,h] // concatenaton of the // h replcatons h Rep M ( = Reshape to a ) square matrx h Rep 0 0 // Place data nto hgh h W = 0 h Rep M // frequency DCT doman for =1to k n = PRSG() P = DCTp (Y) = P HF + P HF P h p (Y )=DCT 1 P h (Y) α n h W TALE IV Functon E( ) retrevng the hash value from a block of vdeo pctures let be a vdeo block belongng to the stream S; let p 1,...,p m be the pctures belongng to ; let PRSG( ) a pseudo random sequence generator algorthm; let SIGN s the mathematcal um functon x =0 for =1to m n = PRSG() P = DCTp (Y) n P HF = Extract hgh frequency from P P HFV = Reshape P HF to a vector // Consder P HFV h = h j as [h,...,h j,...,h] x = x + h h = SIGNx P H = P HF + P HF α n h W (2) Equaton 1 computes the DCT transformaton over the lumnance (Y) component p (Y ), obtanng P. Equaton 2 embeds h W, a repeated and reshaped verson of vector h, n the hgh frequency of P, denoted P HF. To ths goal, we defne the parameters α, an amplfcaton factor, and n,a pseudo-nose sequence whch s changed for each pcture. In partcular, n s a matrx of bnary ( 1, 1) pseudo nose sequences. The spread sequence n h s multpled by an amplfcaton factor (α), replcated accordng to a replcaton factor, and fnally reshaped to a matrx of the same dmensons of the pcture. The mark s scaled by the lumnance frequency coeffcents, so that t s spread proportonally to the DCT coeffcents. Fnally, the resultng sequence s summed up to the hghest of the DCT transformed pcture P. The pseudo code of the embeddng algorthm s shown n Table III. frequences coeffcents P HF. Retreval of nformaton Snce the mark has been embedded n each pcture of the block, the recever extracts the mark from each pcture. Ths s necessary because the extracton from a sngle pcture s, n general, affected by errors. Thus, the mark s obtaned combnng the nformaton extracted from all the pctures n the block. Gven a pcture p n an ncomng block, the recever performs a DCT transform over the lumnance component (Y) of the pcture denoted P. Then, t extracts the mark from the hgh frequences of P (whch are the frequences where the mark was embedded). Ths s acheved usng the followng equatons: P HF n = P HF = P HF n + P HF α n h W n n + P HF α h W 637
5 Let h (j) be the j th replca of the hash nsde pcture and Red be the number of hash replcatons n each pcture. The recever combnes the marks extracted from each pcture usng the followng equaton: =k j=red =1 P (j) n (j)+ P (j) α h (j) (3) where the nner sum accumulates mark replcated wthn a gven pcture, and the outer sum accumulates all the marks extracted from all the pctures n the block. The choce of the number of pctures to be embedded n a block s essental: If the number of pctures s too small, the ntroduced mark redundancy could be nsuffcent and the extracton fal. lock dmensonng s an essental operaton that must be done by the sender n the preprocessng phase of the vdeo streamng. Snce the frst term n Equaton 3 (P (j) n (j)) expresses uncorrelated als, ther sum tends to 0 thus, f the number of pctures n a block s suffcently hgh, Equaton 3 becomes: =k j=red =1 P (j) α h (j). (4) Thus, mark extracton s performed over Equaton 4 usng the um functon as: but =k j=red =1 =k j=red =1 =k j=red =1 P (j) α h (j) P (j) α h P (j) α 1. The pseudo code of the extracton algorthm s shown n Table IV. V. CONCLUSIONS We have presented a novel scheme for authentcatng vdeo streamng n a multcast satellte network. The proposed scheme leverages pecular features of satellte lnk, lke low ER and no packet reorderng. In partcular, ths work shows how t t possble to use watermarkng to embed securty related nformaton. The securty propertes enforced are authentcaton and ntegrty of the multcast stream. These features are acheved usng just one dgtal ature, combned wth a pre-computed hash chan. In partcular, we embed the hash chan nsde the vdeo by means of a watermarkng technque. Ths soluton provdes several benefts; on the sender sde: The computaton overhead sums up to a dgtal ature for the whole stream and a hash per block; as for bandwdth, securty related nformaton does not consume ths resource, snce these data are nserted n the vdeo stream pctures through neglgble modfcatons (at least, not recognzable by humans). On the recever sde: Authentcaton s performed on a per block bass; no extra storage s requred on the recever, except for the storng of a hash value; the computatonal overhead on the recever sde s lmted to one dgtal ature verfcaton, that s amortzed over the whole multcast stream, and one extra hash computaton per block. Future work strves to extend the proposed scheme provdng reslence to ncreasngly lossy channel. REFERENCES [1] F. Lefèbvre, J. Czyz, and. M. Macq, A robust soft hash algorthm for dgtal mage ature. n ICIP (2), 2003, pp [2] O. Goldrech, Two remarks concernng the goldwasser-mcal-rvest ature scheme, n CRYPTO, 1986, pp [3] Dgtal ature standard (DSS). Washngton: Natonal Insttute of Standards and Technology, 2000, federal Informaton Processng Standard [4] R. Rvest, The MD5 message-dgest algorthm, RFC 1321, [5] N.. of Standards, Dgtal ature standard, Natonal ureau of Standards, Tech. Rep. FIPS Publcaton 186, [6] J. Dttmann and F. Nack, Copyrght-copywrong, IEEE MultMeda, vol. 07, no. 4, pp , [7] F. enedetto, G. Gunta, and A. Ner, End-to-end qualty of servce assessment n moble applcatons for user-centrc multmeda networks by tracng watermarkng, n IEEE 12 th Symp. on Communcaton and Vehcular Tecnology, Twente, Netherland, [8] A. Annese, P. arsocch, N. Celandron, and E. Ferro, Performance evaluaton of udp multmeda traffc flows n satellte-wlan ntegrated paths, n Proceedngs of the 11th Ka and roadband Communcatons Conference, Sept. 2005, pp [9] D. L. Gall, Mpeg: a vdeo compresson standard for multmeda applcatons, Commun. ACM, vol. 34, no. 4, pp , [10] R. de run and J. Smts, Dgtal vdeo broadcastng: technology, standards, and regulatons. Norwood, MA, USA: Artech House, Inc., [11] R. L. Rvest, A. Shamr, and L. M. Adelman, A method for obtanng dgtal atures and publc-key cryptosystems, Tech. Rep. MIT/LCS/TM-82, [12] D. Eastlake 3rd and P. Jones, US Secure Hash Algorthm 1 (SHA1), RFC 3174, Sept. 20. [13] M. Luby, L. Vcsano, J. Gemmell, L. Rzzo, M. Handley, and J. Crowcroft, Forward error correcton (fec) buldng block,, Unted States, [14] M. arn, F. artoln, and N. Checcacc, Watermarkng of mpeg-4 vdeo objects. IEEE Transactons on Multmeda, vol. 7, no. 1, pp , [15] S. swas, S. R. Das, and E. M.Petru, An adaptve compressed mpeg- 2 vdeo watermarkng scheme, IEEE Transactons on Instrumentaton and Measuremnent, vol. 54, no. 5, pp ,
Hybrid Non-Blind Color Image Watermarking
Hybrd Non-Blnd Color Image Watermarkng Ms C.N.Sujatha 1, Dr. P. Satyanarayana 2 1 Assocate Professor, Dept. of ECE, SNIST, Yamnampet, Ghatkesar Hyderabad-501301, Telangana 2 Professor, Dept. of ECE, AITS,
More informationA Fast Content-Based Multimedia Retrieval Technique Using Compressed Data
A Fast Content-Based Multmeda Retreval Technque Usng Compressed Data Borko Furht and Pornvt Saksobhavvat NSF Multmeda Laboratory Florda Atlantc Unversty, Boca Raton, Florda 3343 ABSTRACT In ths paper,
More informationA Lossless Watermarking Scheme for Halftone Image Authentication
IJCSNS Internatonal Journal of Computer Scence and Network Securty, VOL.6 No.2B, February 2006 147 A Lossless Watermarkng Scheme for Halftone Image Authentcaton Jeng-Shyang Pan, Hao Luo, and Zhe-Mng Lu,
More informationA Binarization Algorithm specialized on Document Images and Photos
A Bnarzaton Algorthm specalzed on Document mages and Photos Ergna Kavalleratou Dept. of nformaton and Communcaton Systems Engneerng Unversty of the Aegean kavalleratou@aegean.gr Abstract n ths paper, a
More informationAn Optimal Algorithm for Prufer Codes *
J. Software Engneerng & Applcatons, 2009, 2: 111-115 do:10.4236/jsea.2009.22016 Publshed Onlne July 2009 (www.scrp.org/journal/jsea) An Optmal Algorthm for Prufer Codes * Xaodong Wang 1, 2, Le Wang 3,
More informationImprovement ofmanik et al. s remote user authentication scheme
Improvement ofmank et al. s remote user authentcaton scheme Abstract Jue-Sam Chou, a,yaln Chen b Jyun-Yu Ln c a Department of Informaton Management, Nanhua Unversty Chay, 622, Tawan schou@mal.nhu.edu.tw
More informationPrivate Information Retrieval (PIR)
2 Levente Buttyán Problem formulaton Alce wants to obtan nformaton from a database, but she does not want the database to learn whch nformaton she wanted e.g., Alce s an nvestor queryng a stock-market
More informationKey-Selective Patchwork Method for Audio Watermarking
Internatonal Journal of Dgtal Content Technology and ts Applcatons Volume 4, Number 4, July 2010 Key-Selectve Patchwork Method for Audo Watermarkng 1 Ch-Man Pun, 2 Jng-Jng Jang 1, Frst and Correspondng
More informationSemi-Fragile Watermarking Scheme for Authentication of JPEG Images
Tamkang Journal of Scence and Engneerng, Vol. 10, No 1, pp. 5766 (2007) 57 Sem-Fragle Watermarkng Scheme for Authentcaton of JPEG Images Chh-Hung n 1 *, Tung-Shh Su 2 and Wen-Shyong Hseh 2,3 1 Department
More informationEnhanced Watermarking Technique for Color Images using Visual Cryptography
Informaton Assurance and Securty Letters 1 (2010) 024-028 Enhanced Watermarkng Technque for Color Images usng Vsual Cryptography Enas F. Al rawashdeh 1, Rawan I.Zaghloul 2 1 Balqa Appled Unversty, MIS
More informationSimulation Based Analysis of FAST TCP using OMNET++
Smulaton Based Analyss of FAST TCP usng OMNET++ Umar ul Hassan 04030038@lums.edu.pk Md Term Report CS678 Topcs n Internet Research Sprng, 2006 Introducton Internet traffc s doublng roughly every 3 months
More informationRelated-Mode Attacks on CTR Encryption Mode
Internatonal Journal of Network Securty, Vol.4, No.3, PP.282 287, May 2007 282 Related-Mode Attacks on CTR Encrypton Mode Dayn Wang, Dongda Ln, and Wenlng Wu (Correspondng author: Dayn Wang) Key Laboratory
More informationA NEW AUDIO WATERMARKING METHOD BASED
A NEW AUDIO WATERMARKING METHOD BASED ON DISCRETE COSINE TRANSFORM WITH A GRAY IMAGE Mohammad Ibrahm Khan 1, Md. Iqbal Hasan Sarker 2, Kaushk Deb 3 and Md. Hasan Furhad 4 1,2,3 Department of Computer Scence
More informationData Hiding and Image Authentication for Color-Palette Images
Data Hdng and Image Authentcaton for Color-Palette Images Chh-Yang Yn ( 殷志揚 ) and Wen-Hsang Tsa ( 蔡文祥 ) Department of Computer & Informaton Scence Natonal Chao Tung Unversty 00 Ta Hsueh Rd., Hsnchu, Tawan
More informationA Hybrid Semi-Blind Gray Scale Image Watermarking Algorithm Based on DWT-SVD using Human Visual System Model
A Hybrd Sem-Blnd Gray Scale Image Watermarkng Algorthm Based on DWT-SVD usng Human Vsual System Model Rajesh Mehta r Scence & Engneerng, USICT Guru Gobnd Sngh Indrarprastha Unversty New Delh, Inda rajesh00ust@gmal.com
More informationRobust Watermarking for Text Images Based on Arnold Scrambling and DWT-DCT
Internatonal Conference on Mechatroncs Electronc Industral and Control Engneerng (MEIC 015) Robust Watermarkng for Text Images Based on Arnold Scramblng and DWT-DCT Fan Wu College of Informaton Scence
More informationParallelism for Nested Loops with Non-uniform and Flow Dependences
Parallelsm for Nested Loops wth Non-unform and Flow Dependences Sam-Jn Jeong Dept. of Informaton & Communcaton Engneerng, Cheonan Unversty, 5, Anseo-dong, Cheonan, Chungnam, 330-80, Korea. seong@cheonan.ac.kr
More informationIdentify the Attack in Embedded Image with Steganalysis Detection Method by PSNR and RGB Intensity
Internatonal Journal of Computer Systems (ISSN: 394-1065), Volume 03 Issue 07, July, 016 Avalable at http://www.jcsonlne.com/ Identfy the Attack n Embedded Image wth Steganalyss Detecton Method by PSNR
More informationSecurity Enhanced Dynamic ID based Remote User Authentication Scheme for Multi-Server Environments
Internatonal Journal of u- and e- ervce, cence and Technology Vol8, o 7 0), pp7-6 http://dxdoorg/07/unesst087 ecurty Enhanced Dynamc ID based Remote ser Authentcaton cheme for ult-erver Envronments Jun-ub
More informationHigh Payload Reversible Data Hiding Scheme Using Difference Segmentation and Histogram Shifting
JOURNAL OF ELECTRONIC SCIENCE AND TECHNOLOGY, VOL. 11, NO. 1, MARCH 2013 9 Hgh Payload Reversble Data Hdng Scheme Usng Dfference Segmentaton and Hstogram Shftng Yung-Chen Chou and Huang-Chng L Abstract
More informationHermite Splines in Lie Groups as Products of Geodesics
Hermte Splnes n Le Groups as Products of Geodescs Ethan Eade Updated May 28, 2017 1 Introducton 1.1 Goal Ths document defnes a curve n the Le group G parametrzed by tme and by structural parameters n the
More informationEnd-to-end Distortion Estimation for RD-based Robust Delivery of Pre-compressed Video
End-to-end Dstorton Estmaton for RD-based Robust Delvery of Pre-compressed Vdeo Ru Zhang, Shankar L. Regunathan and Kenneth Rose Department of Electrcal and Computer Engneerng Unversty of Calforna, Santa
More informationContent Based Image Retrieval Using 2-D Discrete Wavelet with Texture Feature with Different Classifiers
IOSR Journal of Electroncs and Communcaton Engneerng (IOSR-JECE) e-issn: 78-834,p- ISSN: 78-8735.Volume 9, Issue, Ver. IV (Mar - Apr. 04), PP 0-07 Content Based Image Retreval Usng -D Dscrete Wavelet wth
More informationIMPLEMENTATION OF QIM BASED AUDIO WATERMARKING USING HYBRID TRANSFORM OF SWT-DCT-SVD METHODS OPTIMIZED WITH GENETIC ALORITHM
IMPLEMENTATION OF QIM BASED AUDIO WATERMARKING USING HYBRID TRANSFORM OF SWT-DCT-SVD METHODS OPTIMIZED WITH GENETIC ALORITHM Ryan Amnullah 1, Gelar Budman 2, Irma Saftr 3 1, 2, 3 FakultasTeknk Elektro,
More informationLecture #15 Lecture Notes
Lecture #15 Lecture Notes The ocean water column s very much a 3-D spatal entt and we need to represent that structure n an economcal way to deal wth t n calculatons. We wll dscuss one way to do so, emprcal
More informationProblem Set 3 Solutions
Introducton to Algorthms October 4, 2002 Massachusetts Insttute of Technology 6046J/18410J Professors Erk Demane and Shaf Goldwasser Handout 14 Problem Set 3 Solutons (Exercses were not to be turned n,
More informationPattern Recognition 43 (2010) Contents lists available at ScienceDirect. Pattern Recognition. journal homepage:
Pattern Recognton 43 (2010) 397 -- 404 Contents lsts avalable at ScenceDrect Pattern Recognton ournal homepage: www.elsever.com/locate/pr Secret mage sharng based on cellular automata and steganography
More informationAn Optimized Pseudorandom Generator using Packed Matrices
An Optmzed Pseudorandom Generator usng Packed Matrces JOSE-VICENTE AGUIRRE 1, RAFAEL ÁLVAREZ, LEANDRO TORTOSA 3, ANTONIO ZAMORA 4 Dpt. of Computer Scence and Artfcal Intellgence Unversty of Alcante Campus
More informationCompiler Design. Spring Register Allocation. Sample Exercises and Solutions. Prof. Pedro C. Diniz
Compler Desgn Sprng 2014 Regster Allocaton Sample Exercses and Solutons Prof. Pedro C. Dnz USC / Informaton Scences Insttute 4676 Admralty Way, Sute 1001 Marna del Rey, Calforna 90292 pedro@s.edu Regster
More informationInformation Hiding Watermarking Detection Technique by PSNR and RGB Intensity
www..org 3 Informaton Hdng Watermarkng Detecton Technque by PSNR and RGB Intensty 1 Neha Chauhan, Akhlesh A. Waoo, 3 P. S. Patheja 1 Research Scholar, BIST, Bhopal, Inda.,3 Assstant Professor, BIST, Bhopal,
More informationA Comparison between Digital Images Watermarking in Tow Different Color Spaces Using DWT2*
A Comparson between Dgtal s ng n Tow Dfferent Color Spaces Usng DWT* Mehd Khall Natonal Academy of Scence of Armena Yerevan, Armena e-mal: khall.mehd@yahoo.com ABSTRACT A novel dgtal watermarkng for ownershp
More informationEnhanced AMBTC for Image Compression using Block Classification and Interpolation
Internatonal Journal of Computer Applcatons (0975 8887) Volume 5 No.0, August 0 Enhanced AMBTC for Image Compresson usng Block Classfcaton and Interpolaton S. Vmala Dept. of Comp. Scence Mother Teresa
More informationShape-adaptive DCT and Its Application in Region-based Image Coding
Internatonal Journal of Sgnal Processng, Image Processng and Pattern Recognton, pp.99-108 http://dx.do.org/10.14257/sp.2014.7.1.10 Shape-adaptve DCT and Its Applcaton n Regon-based Image Codng Yamn Zheng,
More informationRobust Video Watermarking Using Image Normalization, Motion Vector and Perceptual Information
Robust Vdeo Watermarkng Usng Image ormalzaton, Moton Vector and Perceptual Informaton Cedllo-Hernández Antono 1, Cedllo-Hernández Manuel 1, akano-myatake Marko 1, García-Vázquez Mreya S. 2 1 Postgraduate
More informationSecurity Vulnerabilities of an Enhanced Remote User Authentication Scheme
Contemporary Engneerng Scences, Vol. 7, 2014, no. 26, 1475-1482 HIKARI Ltd, www.m-hkar.com http://dx.do.org/10.12988/ces.2014.49186 Securty Vulnerabltes of an Enhanced Remote User Authentcaton Scheme Hae-Soon
More informationProper Choice of Data Used for the Estimation of Datum Transformation Parameters
Proper Choce of Data Used for the Estmaton of Datum Transformaton Parameters Hakan S. KUTOGLU, Turkey Key words: Coordnate systems; transformaton; estmaton, relablty. SUMMARY Advances n technologes and
More informationSteganography System using Slantlet Transform
ISSN:43-6999 Journal of Inmaton Communcaton and Intellgence Systems (JICIS) Volume Issue February 06 Steganography System usng Slantlet Transm Ryadh Bassl Abduljabbar Abstract An approach hdng nmaton has
More informationA Secured Method for Image Steganography Based On Pixel Values
A Secured Method for Image Steganography Based On Pxel Values Tarun Gulat #, Sanskrt Gupta * # Assocate Professor, Electroncs and Communcaton Engneerng Department, MMEC, M.M.U., Mullana, Ambala, Haryana,
More informationARTICLE IN PRESS. Signal Processing: Image Communication
Sgnal Processng: Image Communcaton 23 (2008) 754 768 Contents lsts avalable at ScenceDrect Sgnal Processng: Image Communcaton journal homepage: www.elsever.com/locate/mage Dstrbuted meda rate allocaton
More informationOPTIMIZED NESTED PROTECTION FOR VIDEO REGION OF INTEREST WITH RAPTOR CODES
OPTIMIZED NESTED PROTETION OR VIDEO REGION O INTEREST WITH RAPTOR ODES Zhengy Luo 2 L Song 23 Shbao Zheng 2 and Nam Lng 3 Shangha Dgtal Meda Processng and Transmsson Key Lab 2 Shangha Jao Tong Unversty
More informationNeeded Information to do Allocation
Complexty n the Database Allocaton Desgn Must tae relatonshp between fragments nto account Cost of ntegrty enforcements Constrants on response-tme, storage, and processng capablty Needed Informaton to
More informationMULTISPECTRAL IMAGES CLASSIFICATION BASED ON KLT AND ATR AUTOMATIC TARGET RECOGNITION
MULTISPECTRAL IMAGES CLASSIFICATION BASED ON KLT AND ATR AUTOMATIC TARGET RECOGNITION Paulo Quntlano 1 & Antono Santa-Rosa 1 Federal Polce Department, Brasla, Brazl. E-mals: quntlano.pqs@dpf.gov.br and
More informationDigital Video Watermarking using Discrete Wavelet Transform and Principal Component Analysis
Internatonal Journal of Wsdom Based Computng, Vol. 1 (2), August 2011 7 Dgtal Vdeo Watermarkng usng Dscrete Wavelet Transform and Prncpal Component Analyss Sanjana Snha, Prajnat Bardhan, Swarnal Pramanck,
More informationTwo-Factor User Authentication in Multi-Server Networks
Internatonal Journal of ecurty and Its Applcatons Vol. 6, No., Aprl, 0 Two-Factor ser Authentcaton n Mult-erver Networks Chun-Ta L, Ch-Yao Weng,* and Chun-I Fan Department of Informaton Management, Tanan
More informationRobust Blind Video Watermark Algorithm in Transform Domain Combining with 3D Video Correlation
JOURNAL OF MULTIMEDIA, VOL. 8, NO. 2, APRIL 2013 161 Robust Blnd Vdeo Watermark Algorthm n Transform Doman Combnng wth 3D Vdeo Correlaton DING Ha-yang 1,3 1. Informaton Securty Center, Bejng Unversty of
More informationA Time-Bound Ticket-Based Mutual Authentication Scheme for Cloud Computing
Int. J. of Computers, Communcatons & Control, ISSN 1841-9836, E-ISSN 1841-9844 Vol. VI (2011), No. 2 (June), pp. 227-235 A Tme-Bound Tcket-Based Mutual Authentcaton Scheme for Cloud Computng Z. Hao, S.
More informationEvaluation of an Enhanced Scheme for High-level Nested Network Mobility
IJCSNS Internatonal Journal of Computer Scence and Network Securty, VOL.15 No.10, October 2015 1 Evaluaton of an Enhanced Scheme for Hgh-level Nested Network Moblty Mohammed Babker Al Mohammed, Asha Hassan.
More informationUser Authentication Based On Behavioral Mouse Dynamics Biometrics
User Authentcaton Based On Behavoral Mouse Dynamcs Bometrcs Chee-Hyung Yoon Danel Donghyun Km Department of Computer Scence Department of Computer Scence Stanford Unversty Stanford Unversty Stanford, CA
More informationS1 Note. Basis functions.
S1 Note. Bass functons. Contents Types of bass functons...1 The Fourer bass...2 B-splne bass...3 Power and type I error rates wth dfferent numbers of bass functons...4 Table S1. Smulaton results of type
More informationVideo Proxy System for a Large-scale VOD System (DINA)
Vdeo Proxy System for a Large-scale VOD System (DINA) KWUN-CHUNG CHAN #, KWOK-WAI CHEUNG *# #Department of Informaton Engneerng *Centre of Innovaton and Technology The Chnese Unversty of Hong Kong SHATIN,
More informationIMAGE FUSION TECHNIQUES
Int. J. Chem. Sc.: 14(S3), 2016, 812-816 ISSN 0972-768X www.sadgurupublcatons.com IMAGE FUSION TECHNIQUES A Short Note P. SUBRAMANIAN *, M. SOWNDARIYA, S. SWATHI and SAINTA MONICA ECE Department, Aarupada
More informationLecture 5: Multilayer Perceptrons
Lecture 5: Multlayer Perceptrons Roger Grosse 1 Introducton So far, we ve only talked about lnear models: lnear regresson and lnear bnary classfers. We noted that there are functons that can t be represented
More informationAn Improved User Authentication and Key Agreement Scheme Providing User Anonymity
35 JOURNAL OF ELECTRONIC SCIENCE AND TECHNOLOGY, VOL. 9, NO. 4, DECEMBER 0 An Improved User Authentcaton and Key Agreement Scheme Provdng User Anonymty Ya-Fen Chang and Pe-Yu Chang Abstract When accessng
More informationVideo streaming over the Internet is becoming very popular and
Streamng MPEG-4 AudoVsual Objects Usng TCP-Frendly Rate Control and Unequal Error Protecton Toufk Ahmed 1, Ahmed Mehaoua 1 and Vncent Lecure 2 1 2 CNRS-PRSM LabUnversty of Versalles CRAN lab CNRS UMR 739
More informationAnalysis of Collaborative Distributed Admission Control in x Networks
1 Analyss of Collaboratve Dstrbuted Admsson Control n 82.11x Networks Thnh Nguyen, Member, IEEE, Ken Nguyen, Member, IEEE, Lnha He, Member, IEEE, Abstract Wth the recent surge of wreless home networks,
More informationDistributed Secret Key Management Based on ECC for Ad-hoc Network Yi-xuan WU, Hua-wei CHEN * and Lei WANG
2017 2nd Internatonal Conference on Computer, Network Securty and Communcaton Engneerng (CNSCE 2017) ISBN: 978-1-60595-439-4 Dstrbuted Secret Key Management Based on ECC for Ad-hoc Network Y-xuan WU, Hua-we
More informationVirtual Machine Migration based on Trust Measurement of Computer Node
Appled Mechancs and Materals Onlne: 2014-04-04 ISSN: 1662-7482, Vols. 536-537, pp 678-682 do:10.4028/www.scentfc.net/amm.536-537.678 2014 Trans Tech Publcatons, Swtzerland Vrtual Machne Mgraton based on
More informationThe Codesign Challenge
ECE 4530 Codesgn Challenge Fall 2007 Hardware/Software Codesgn The Codesgn Challenge Objectves In the codesgn challenge, your task s to accelerate a gven software reference mplementaton as fast as possble.
More informationA Fingerprint Matching Model using Unsupervised Learning Approach
A Fngerprnt Matchng Model usng Unsupervsed Learnng Approach Nasser S. Abouzakhar and Muhammed Bello Abdulazeez School of Computer Scence, The Unversty of Hertfordshre, College Lane, Hatfeld AL 10 9AB,
More informationReal-Time Guarantees. Traffic Characteristics. Flow Control
Real-Tme Guarantees Requrements on RT communcaton protocols: delay (response s) small jtter small throughput hgh error detecton at recever (and sender) small error detecton latency no thrashng under peak
More informationAn Iterative Solution Approach to Process Plant Layout using Mixed Integer Optimisation
17 th European Symposum on Computer Aded Process Engneerng ESCAPE17 V. Plesu and P.S. Agach (Edtors) 2007 Elsever B.V. All rghts reserved. 1 An Iteratve Soluton Approach to Process Plant Layout usng Mxed
More informationReducing Frame Rate for Object Tracking
Reducng Frame Rate for Object Trackng Pavel Korshunov 1 and We Tsang Oo 2 1 Natonal Unversty of Sngapore, Sngapore 11977, pavelkor@comp.nus.edu.sg 2 Natonal Unversty of Sngapore, Sngapore 11977, oowt@comp.nus.edu.sg
More informationType-2 Fuzzy Non-uniform Rational B-spline Model with Type-2 Fuzzy Data
Malaysan Journal of Mathematcal Scences 11(S) Aprl : 35 46 (2017) Specal Issue: The 2nd Internatonal Conference and Workshop on Mathematcal Analyss (ICWOMA 2016) MALAYSIAN JOURNAL OF MATHEMATICAL SCIENCES
More informationFuzzy Filtering Algorithms for Image Processing: Performance Evaluation of Various Approaches
Proceedngs of the Internatonal Conference on Cognton and Recognton Fuzzy Flterng Algorthms for Image Processng: Performance Evaluaton of Varous Approaches Rajoo Pandey and Umesh Ghanekar Department of
More informationPYTHON IMPLEMENTATION OF VISUAL SECRET SHARING SCHEMES
PYTHON IMPLEMENTATION OF VISUAL SECRET SHARING SCHEMES Ruxandra Olmd Faculty of Mathematcs and Computer Scence, Unversty of Bucharest Emal: ruxandra.olmd@fm.unbuc.ro Abstract Vsual secret sharng schemes
More informationA new remote user authentication scheme for multi-server architecture
Future Generaton Computer Systems 19 (2003) 13 22 A new remote user authentcaton scheme for mult-server archtecture Iuon-Chang Ln a, Mn-Shang Hwang b,, L-Hua L b a Department of Computer Scence and Informaton
More informationSupport Vector Machines
/9/207 MIST.6060 Busness Intellgence and Data Mnng What are Support Vector Machnes? Support Vector Machnes Support Vector Machnes (SVMs) are supervsed learnng technques that analyze data and recognze patterns.
More informationMathematics 256 a course in differential equations for engineering students
Mathematcs 56 a course n dfferental equatons for engneerng students Chapter 5. More effcent methods of numercal soluton Euler s method s qute neffcent. Because the error s essentally proportonal to the
More informationResource-Efficient Multi-Source Authentication Utilizing Split-Join One-Way Key Chain
Resource-Effcent Mult-Source Authentcaton Utlzng Splt-Jon One-Way ey Chan Seonho Cho, un Sun, Hyeonsang Eom 3 Department of Computer Scence, Bowe State Unversty, Bowe, Maryland, U.S.A. Center for Secure
More informationKEYWORDS: Digital Image Watermarking, Discrete Wavelet Transform, General Regression Neural Network, Human Visual System. 1.
An Adaptve Dgtal Image Watermarkng Based on Image Features n Dscrete Wavelet Transform Doman and General Regresson Neural Network Ayoub Taher Group of IT Engneerng, Payam Noor Unversty, Broujen, Iran ABSTRACT:
More informationCluster Analysis of Electrical Behavior
Journal of Computer and Communcatons, 205, 3, 88-93 Publshed Onlne May 205 n ScRes. http://www.scrp.org/ournal/cc http://dx.do.org/0.4236/cc.205.350 Cluster Analyss of Electrcal Behavor Ln Lu Ln Lu, School
More informationAccounting for the Use of Different Length Scale Factors in x, y and z Directions
1 Accountng for the Use of Dfferent Length Scale Factors n x, y and z Drectons Taha Soch (taha.soch@kcl.ac.uk) Imagng Scences & Bomedcal Engneerng, Kng s College London, The Rayne Insttute, St Thomas Hosptal,
More informationBrushlet Features for Texture Image Retrieval
DICTA00: Dgtal Image Computng Technques and Applcatons, 1 January 00, Melbourne, Australa 1 Brushlet Features for Texture Image Retreval Chbao Chen and Kap Luk Chan Informaton System Research Lab, School
More informationSmoothing Spline ANOVA for variable screening
Smoothng Splne ANOVA for varable screenng a useful tool for metamodels tranng and mult-objectve optmzaton L. Rcco, E. Rgon, A. Turco Outlne RSM Introducton Possble couplng Test case MOO MOO wth Game Theory
More informationResearch of Multiple Text Watermarks Technique in Electric Power System Texts
Sensors & Transducers 203 by IFSA http://www.sensorsportal.com Research of Multple Text atermarks Technque n Electrc Power System Texts Xao-X XING, Qng CHEN, 2 Lan-X FU School of Optcal-Electrcal and Computer
More informationResearch and Application of Fingerprint Recognition Based on MATLAB
Send Orders for Reprnts to reprnts@benthamscence.ae The Open Automaton and Control Systems Journal, 205, 7, 07-07 Open Access Research and Applcaton of Fngerprnt Recognton Based on MATLAB Nng Lu* Department
More informationModule Management Tool in Software Development Organizations
Journal of Computer Scence (5): 8-, 7 ISSN 59-66 7 Scence Publcatons Management Tool n Software Development Organzatons Ahmad A. Al-Rababah and Mohammad A. Al-Rababah Faculty of IT, Al-Ahlyyah Amman Unversty,
More informationIAJIT First Online Publication
Content Protecton n Vdeo Data Based on Robust Dgtal Watermarkng Resstant to Intentonal and Unntentonal Attacks Mad Masoum and Shervn Amr Department of Electrcal Engneerng, Islamc Azad Unversty Qazvn Branch,
More informationAn Image Fusion Approach Based on Segmentation Region
Rong Wang, L-Qun Gao, Shu Yang, Yu-Hua Cha, and Yan-Chun Lu An Image Fuson Approach Based On Segmentaton Regon An Image Fuson Approach Based on Segmentaton Regon Rong Wang, L-Qun Gao, Shu Yang 3, Yu-Hua
More informationR s s f. m y s. SPH3UW Unit 7.3 Spherical Concave Mirrors Page 1 of 12. Notes
SPH3UW Unt 7.3 Sphercal Concave Mrrors Page 1 of 1 Notes Physcs Tool box Concave Mrror If the reflectng surface takes place on the nner surface of the sphercal shape so that the centre of the mrror bulges
More informationResearch Article Hamming Code Based Watermarking Scheme for 3D Model Verification
Mathematcal Problems n Engneerng, Artcle ID 241093, 7 pages http://dx.do.org/10.1155/2014/241093 Research Artcle Hammng Code Based Watermarkng Scheme for 3D Model Verfcaton Jen-Tse Wang, 1 Y-Chng Chang,
More informationImage Representation & Visualization Basic Imaging Algorithms Shape Representation and Analysis. outline
mage Vsualzaton mage Vsualzaton mage Representaton & Vsualzaton Basc magng Algorthms Shape Representaton and Analyss outlne mage Representaton & Vsualzaton Basc magng Algorthms Shape Representaton and
More informationIEEE n Aggregation Performance Study for the Multicast
IEEE 802.11n Aggregaton Performance Study for the Multcast Yousr Daldoul, Toufk Ahmed, Djamal-Eddne Meddour To cte ths verson: Yousr Daldoul, Toufk Ahmed, Djamal-Eddne Meddour. IEEE 802.11n Aggregaton
More informationCoding Artifact Reduction Using Edge Map Guided Adaptive and Fuzzy Filter
MEL A MITSUBISHI ELECTIC ESEACH LABOATOY http://www.merl.com Codng Artfact educton Usng Edge Map Guded Adaptve and Fuzzy Flter Hao-Song Kong Yao Ne Anthony Vetro Hufang Sun Kenneth E. Barner T-2004-056
More information6.854 Advanced Algorithms Petar Maymounkov Problem Set 11 (November 23, 2005) With: Benjamin Rossman, Oren Weimann, and Pouya Kheradpour
6.854 Advanced Algorthms Petar Maymounkov Problem Set 11 (November 23, 2005) Wth: Benjamn Rossman, Oren Wemann, and Pouya Kheradpour Problem 1. We reduce vertex cover to MAX-SAT wth weghts, such that the
More informationEfficient Content Representation in MPEG Video Databases
Effcent Content Representaton n MPEG Vdeo Databases Yanns S. Avrths, Nkolaos D. Doulams, Anastasos D. Doulams and Stefanos D. Kollas Department of Electrcal and Computer Engneerng Natonal Techncal Unversty
More informationSteps for Computing the Dissimilarity, Entropy, Herfindahl-Hirschman and. Accessibility (Gravity with Competition) Indices
Steps for Computng the Dssmlarty, Entropy, Herfndahl-Hrschman and Accessblty (Gravty wth Competton) Indces I. Dssmlarty Index Measurement: The followng formula can be used to measure the evenness between
More informationCHAPTER 2 DECOMPOSITION OF GRAPHS
CHAPTER DECOMPOSITION OF GRAPHS. INTRODUCTION A graph H s called a Supersubdvson of a graph G f H s obtaned from G by replacng every edge uv of G by a bpartte graph,m (m may vary for each edge by dentfyng
More informationLoad-Balanced Anycast Routing
Load-Balanced Anycast Routng Chng-Yu Ln, Jung-Hua Lo, and Sy-Yen Kuo Department of Electrcal Engneerng atonal Tawan Unversty, Tape, Tawan sykuo@cc.ee.ntu.edu.tw Abstract For fault-tolerance and load-balance
More informationDistortion Function Designing for JPEG Steganography with Uncompressed Side-image
Dstorton Functon Desgnng for JPEG Steganography wth Uncompressed Sde-mage Fangjun Huang School of Informaton Scence and Technology, Sun Yat-Sen Unversty, GD 56, Chna huangfj@mal.sysu.edu.cn Jwu Huang School
More informationSkew Angle Estimation and Correction of Hand Written, Textual and Large areas of Non-Textual Document Images: A Novel Approach
Angle Estmaton and Correcton of Hand Wrtten, Textual and Large areas of Non-Textual Document Images: A Novel Approach D.R.Ramesh Babu Pyush M Kumat Mahesh D Dhannawat PES Insttute of Technology Research
More informationCHAPTER 3 ENCODING VIDEO SEQUENCES IN FRACTAL BASED COMPRESSION. Day by day, the demands for higher and faster technologies are rapidly
65 CHAPTER 3 ENCODING VIDEO SEQUENCES IN FRACTAL BASED COMPRESSION 3.1 Introducton Day by day, the demands for hgher and faster technologes are rapdly ncreasng. Although the technologes avalable now are
More informationA mathematical programming approach to the analysis, design and scheduling of offshore oilfields
17 th European Symposum on Computer Aded Process Engneerng ESCAPE17 V. Plesu and P.S. Agach (Edtors) 2007 Elsever B.V. All rghts reserved. 1 A mathematcal programmng approach to the analyss, desgn and
More informationDetection of an Object by using Principal Component Analysis
Detecton of an Object by usng Prncpal Component Analyss 1. G. Nagaven, 2. Dr. T. Sreenvasulu Reddy 1. M.Tech, Department of EEE, SVUCE, Trupath, Inda. 2. Assoc. Professor, Department of ECE, SVUCE, Trupath,
More informationVRT012 User s guide V0.1. Address: Žirmūnų g. 27, Vilnius LT-09105, Phone: (370-5) , Fax: (370-5) ,
VRT012 User s gude V0.1 Thank you for purchasng our product. We hope ths user-frendly devce wll be helpful n realsng your deas and brngng comfort to your lfe. Please take few mnutes to read ths manual
More informationLecture - Data Encryption Standard 4
The Data Encrypton Standard For an encrypton algorthm we requre: secrecy of the key and not of the algorthm tself s the only thng that s needed to ensure the prvacy of the data the best cryptographc algorthms
More informationNetwork-Driven Layered Multicast with IPv6
Network-Drven Layered Multcast wth IPv6 Ho-pong Sze and Soung C. Lew Department of Informaton Engneerng, The Chnese Unversty of Hong Kong, Shatn, N.T., Hong Kong {hpsze8, soung}@e.cuhk.edu.hk Abstract.
More informationRemote display of large raster images using JPEG2000 and the rectangular FishEye-View
Remote dsplay of large raster mages usng JPEG2000 and the rectangular FshEye-Vew René Rosenbaum* Insttute of Computer Graphcs Unversty of Rostock 18059 Rostock Germany rrosen@nformatk.un-rostock.de Davd
More informationSLAM Summer School 2006 Practical 2: SLAM using Monocular Vision
SLAM Summer School 2006 Practcal 2: SLAM usng Monocular Vson Javer Cvera, Unversty of Zaragoza Andrew J. Davson, Imperal College London J.M.M Montel, Unversty of Zaragoza. josemar@unzar.es, jcvera@unzar.es,
More informationAn Image Compression Algorithm based on Wavelet Transform and LZW
An Image Compresson Algorthm based on Wavelet Transform and LZW Png Luo a, Janyong Yu b School of Chongqng Unversty of Posts and Telecommuncatons, Chongqng, 400065, Chna Abstract a cylpng@63.com, b y27769864@sna.cn
More information