Research of Multiple Text Watermarks Technique in Electric Power System Texts
|
|
- Ernest Daniel
- 6 years ago
- Views:
Transcription
1 Sensors & Transducers 203 by IFSA Research of Multple Text atermarks Technque n Electrc Power System Texts Xao-X XING, Qng CHEN, 2 Lan-X FU School of Optcal-Electrcal and Computer Engneerng, Unversty of Shangha for Scence and Technology, Shangha, Chna, State Grd Jbe Electrc Power Co. Ltd., Bejng, Chna, 0240 Tel: E-mal: wealthxaox@63.com Receved: 2 July /Accepted: 25 October 203 /Publshed: 3 October 203 Abstract: Amng at the relable transmsson securty problems of electrc power system texts, multple text watermarkng algorthm s frst appled nto protectng t. Take protectng the transmsson of electrcty prce n the n electrc power system text and authentcatng the content from the sender for example, and robustness watermarkng algorthm s employed to transmt the electrcty prce wth covert communcaton whch makes t possble to resst dfferent knds of attacks. The sem-fragle watermark s utlzed to confrm the dentty of the sender whch can show whether the text s stolen or msused, and fnd where the contents are tampered. The experments show that multple text watermarkng algorthm can protect the data effectvely amng at dfferent purpose whch acheves ts applcaton value. Those also show the valdty of multple text watermarkng technque used n the relable transmsson of electrc power system texts and that ths technque has a vast applcaton prospect. Copyrght 203 IFSA. Keywords: Text watermarkng technque, Multple watermarkng, Power system, Content authentcaton, Semfragle watermarkng, Robustness watermarkng.. Introducton th the popularty of modern technology n the power system and the development of multmeda technology, nformaton securty has become an urgent problem to be solved n the power system. Dgtal watermarkng technology as a powerful means to solve the securty of multmeda nformaton has been gradually appled n electrc power system. Image [, 2] and vdeo [3] watermarkng technology both can be used for covert communcaton of mportant nformaton about electrcty bargan prce and so on to mprove the securty of nformaton transmsson. Audo watermarkng technology [4] can protect the copyrght of audo fles to prevent ts theft or msuse. Mesh watermarkng technology [5, 6] can protect the copyrght of mesh model wth propretary ntellectual property rghts. Lterature [7] proposes an dea that text watermarkng technology can be appled nto relable transmsson of power system texts, but dd not practce t. Currently, text watermarkng technologes can be manly categorzed two groups: the format and content. Maxemchuk and Brassl [8] proposed an algorthm whch changes lne spacng, the character spacng and character [9] to embed watermarkng nformaton slghtly, changes of whch cannot be Artcle number P_434 33
2 dentfed by the naked eye. These three methods have hgh mperceptblty, but cannot guarantee the robustness and capacty s the best. Though the robustness of text watermarkng algorthm based on the content s very strong, t wll cause the ambguty of natural language [0], and ts mperceptblty s not hgh, and t s easy to cause the opponent s attack. These algorthms can t cater to the characterstcs of strong robustness, large capacty and hgh mperceptblty. Therefore, the method of embeddng multple watermarks s employed to meet the needs of dfferent performances. Amng at mprovng the securty of convert communcaton of mportant nformaton n electrc power system and confrmng the source of the fles by usng content authentcaton method, a multple watermarks algorthm appled nto the relable transmsson of electrc power system text s proposed. The algorthm based on changng character spacng whch has a strong robustness s used to hde electrcty bargan prce, and sem-fragle watermarkng embeddng algorthm based on changng color RGB value of characters whch has a hgh mperceptblty s also employed to confrm the dentty of the sender. The proposed multple watermarkng algorthm s tested wth embeddng, extractng watermarkng nformaton and attack experments respectvely. And the expermental results show that the system s hghly feasble, can mprove the securty of covert communcaton, and fnd precsely where the content s tampered when the text suffers from malcous attacks. It s sutable for relable transmsson of electrc power system texts and content authentcaton. 2. Text atermarkng Technology Dgtal watermarkng technology s an effectve securty technology used for copyrght protecton, covert communcaton, content authentcaton, qualty detecton of multmeda nformaton. Multmeda redundant space s utlzed to embed watermarkng nformaton to acheve the purpose of securty protecton 2.. Text atermarkng Algorthm Text watermarkng technology, based on human vsual system (HVS), by fne-tunng the text format or content [, 2], embeds the watermarkng nformaton. atermarkng algorthm based on fnetunng manly the text format fne-tunngs the lne spacng, characters spacng and character propertes to embed watermarkng nformaton. Ths knd of watermarkng algorthm has good robustness, and can resst certan attack. It also has hgh mperceptblty, large capacty. atermarkng algorthm based on changng the content of a text to embed the watermarkng nformaton manly rely on the synonyms and equvalent sentence replacement to acheve the watermarkng embeddng, The robustness of ths algorthm s hgher than that based on changng format, however, due to the changes of the content, ts mperceptblty s poorer and t s less capacty Text atermarkng Framework Dgtal watermarkng system s manly composed of four parts: watermarkng generatng Gen, watermarkng embeddng Emb, watermarkng attack Att, watermarkng detecton Det. By detectng the text after the attack, the watermarkng nformaton can be extracted correctly to determne the robustness of watermarkng system. e represent the watermarkng attack model as [3] AM, AM =< { C, M,, K, C, '}, { A, C ', ata lg, atdet, atpar}, { Gen, Emb, Det, Att} > In order to facltate the understandng of ths model, some varables are descrbed as follows: C : watermarkng carrer; C : watermarked carrer; M : watermarkng message; : watermarkng; ' : extracted watermarkng; A : attack; ' : attacked watermarked carrer C C ' C + A () K : secret key; K gen, K emb, K det represent the set of secret keys used n the process of watermarkng generatng, embeddng and detecton, respectvely. atalg denotes watermarkng algorthm; atdet denotes watermarkng detector; atpar denotes watermarkng parameter. In a set, the small letter represents an element of the set of the correspondng captal letter. gen Gen : Gen([ C], M,[ K ]) (2) emb Emb : C Emb( C,, K ) (3) w Att : A Att([ atalg],[ atdet], atpar) (4) Det yes no Det C K (5) det : ([ '],[, ]) ( ',,[ ]) 3. Solutons Based on Text Dgtal atermarkng In the relable transmsson of texts n electrc power system, the mperceptblty of the algorthm s requred to be very hgh, the text cannot be changed wth perceptble changes, whch may cause the attacker s nterest, and the content of the text cannot 332
3 generate ambguty after beng changed. Therefore, algorthm based on content s not sutable and ths paper uses the algorthm based on fne-tunng text format to embed the watermarkng nformaton. In order to protect the texts n the securty of relable transmsson n the electrc power system and ncrease the trust between users, sem-fragle watermarkng and robust watermarkng are embedded at the same tme. The sem-fragle watermarkng havng hgh mperceptblty and hgh securty whch can resst some attacks can be used to authentcate contents after texts are receved, dstngush the dentty of the sender, embed the personal nformaton, send date and so on, and fnd where the contents are tampered. Robust watermarkng has a hgh ablty to resst attacks whch can be used for covert communcaton of mportant nformaton, and requres a large watermarkng capacty. It employs the method of loop embeddng watermarkng nformaton, whch ensures the text s, as long as there s at least one watermarkng nformaton avalable, stll can be extracted correctly. Therefore, the sem-fragle watermarkng embeddng algorthm based on changng character colors s used for content authentcaton, whle the robust watermarkng algorthm based on character spacng s used for hdng mportant nformaton. 4. The Text atermarkng Algorthm As descrbed n lterature [4], the RGB value combnatons varyng from (0,0,0) to (60,60,60) s very close to the ord default black, the naked eye cannot dstngush changes. Maxemchuk [5] ponts out that horzontal word dsplacements of /50 n and less readly go unnotced, vertcal lne dsplacements of /300 n and less go unnotced by readers. 4.. Based on Change the Font Color RGB Values s Sem-Fragle atermarkng Algorthm The purpose of ths algorthm s to authentcate the content of the transmtted texts. Therefore, semfragle watermarkng can be employed. It s requred to have the followng features: ) Imperceptblty. After embeddng watermarkng nformaton, the text does not produce vsble changes, because capacty and mperceptblty are mutually contradctory and the ncrease n capacty wll result n the declne n mperceptblty. Therefore, ths algorthm sacrfces part of capacty to ensure mperceptblty; 2) Detectng and sgnng tampered contents. It s an mportant property of the sem-fragle watermarkng. The tampered content must be precsely postoned and dsplayed; 3) Securty. The key space should be large enough to resst exhaustve attack method. Accordng to the test of human cone s senstvty to color shows that the senstvty of the naked eye to dfferent RGB components of color s dfferent, and the human eye s most senstve to red, followed by green and blue. Therefore, the algorthm changes lower two bts of the font color of G components and lower two bts of B components to acheve the watermarkng embeddng. By usng ths algorthm, though each two characters can be embedded wth a watermarkng byte wthout calculatng error correcton codng at the expense of a certan capacty, the mperceptblty can be better protected Pretreatment In order to enhance the robustness and securty of the watermarkng nformaton, t needs encryptng and error correcton codng before beng embedded. Take transmttng the electrcty bargan prce of electrc power system for example, where the watermarkng nformaton s the sender s nformaton State Grd Tel0000. The watermarkng nformaton and the key to be embedded are converted nto bnary sequences ww 2w3 wn = { } K kk2k3 km = { } w 0,, n (6) k 0,, m (7) A one-to-one crcular modulo encrypton method s used to obtan a new watermarkng sequence: M mmm (8) = 2 3 mn m = w k n ( mod m) Take advantage of the Hammng code aaaaaaa 2 0to encode the encrypted watermarkng sequence. S, S2, S 3 represents the correcton factor n the supervsory relatonshp. Table 2 shows that when mod 4 = 0, a new bnary sequences s generated: where t 7* l /4 H = hhh 2 3 ht, (9) = { } h 0,, t Table. Error correctng codes and wrong code poston correspondng relaton table. Fault code S, S2, S3 poston 00 a0 0 4 S, S, S 2 3 Fault code poston a 00 a 0 a5 00 a2 a6 0 a3 000 none 333
4 Table 2. Informaton bts and supervson bt correspondence table. nformaton supervson bt bt aaaa 2 0 aaa nformaton supervson bt bt aaaa aaa aaaa aaa 2 0 aaaa aaa atermarkng Embedded ) In order to make the poston where the watermarkng nformaton s embedded random to prevent the attackers from gettng the watermarkng nformaton, Lnear Congruence Generator (LCG) s employed. Pre-embeddng space D of a text s calculated, and the RGB values of all the characters are changed to (0,0,0), the most common used color n ord. The Lnear Congruence Generator s used to generate the pseudo random sequence { y j }, j =, 2, 3 t The basc Lnear Congruence Generator teratve formula s: y = n ( a* y + n c)mod m ( m > + 0), (0) y [0, m ] 0 where y 0 s the seed, a s known as the multpler, c s the ncrement and m s the modulus. The currently generated random number, y n+,depends only on the prevous one, y n,when the values of a, c and m are gven. 2) Step : Traverse the word text and, for the character j ( j <N), t s embedded wth watermarkng nterval dentfer sgnsart. RGB values are modfed to (,3,3) and (,3,4) respectvely. Step 2: Select character j. If j <N, go to step 5; Otherwse, judge nterval dentfer. If the dentfer embeddng has been completed, go to step 3. Otherwse, go to step ; Step 3: If h =, set the RGB value of the current character to (,,); set the RGB value of the next character to (,,2); If h = 0, set the RGB value of the current character to (,2,2); set the RGB value of the next character to (,2,3); Step 4: Repeat step -3 to embed watermarkng nformaton. Step 5: Complete the embeddng watermarkng nformaton and save the text atermarkng Detecton Step : Input key and convert t nto bnary sequence K ; Step 2: Traverses the text and fnd where of the RGB value of font color s modfed. Accordng to the rules of embeddng, extract 0, and obtan the bnary sequence S ; Step 3: Sequence S s decoded and corrected to get the bnary sequence M ; f mod 7 = 0, calculate correcton factor. If each bt of the three-bt correcton factor s 0, the watermarkng has not been tampered. If other values are obtaned, fnd where the content s tampered, make a wrong code corrected and remove supervson bt. Step 4: Cycle modulus s operated on Key K and the bnary sequence M to get bnary sequence of watermarkng and convert t to obtan the watermarkng sgnal Robust atermarkng Algorthm Based on Changng Character Spacng to Embed atermarkng Informaton Ths algorthm s desgned for covert communcaton of fle contents whch requres hgh robustness and suffcent capacty for hdden nformaton, hgh mperceptblty and safety. Therefore, watermarkng algorthm based on changng the character spacng s chosen as a robust algorthm used n power system. Based on HVS, the changes n character spacng should not exceed the threshold Pretreatment The pretreatment method s the same as s used n the algorthm based on changng the RGB values of character. But here the hdden message s electrcty bargan prce: 0000YUAN atermarkng Embedded ) The lnear congruence method s used to make the poston where the watermarkng nformaton s embedded random, text character spacng s unfed and s set to no. In order to prevent the character spacng from beng modfed whch wll cause lne overflow n the text, bndng two adjacent characters, and ndentng and wdenng ther spacng respectvely are used. 2) Step : Traverse the word text and, for the character j (j<n), t s embedded wth watermarkng nterval dentfcaton sgnsart. Here the character spacng s ncreased by 0. pounds, the next character spacng s decreased by 0. pounds. Step 2: Select character j. If j <N, go to step 5; Otherwse, judge nterval. If the dentty embeddng 334
5 dentfcaton has been completed, go to step 3. Otherwse, go to Step ; Step 3: If h =, set the current character spacng to ncrease by 0.05 pounds; set the next character spacng to reduce by 0.05 pounds; If h = 0, set the current character spacng to ncrease by 0.5 pounds; set the next character spacng to reduce by 0.5 pounds; Step 4: Repeat step -3 to embed watermarkng nformaton. Step 5: Complete the embeddng watermarkng nformaton and save the text atermarkng Detecton The watermarkng detecton method s the same as s used n the algorthm based on changng the RGB values of character. 5. Expermental Results and Analyss For both algorthms, watermarkng embeddng and extracton experments are made to verfy whether the change of text n vsual happens after the embedded watermarkng nformaton s embedded nto t, and check whether watermarkng nformaton can be extracted correctly. Through attack experments, robustness of both algorthms s tested. 5.. atermarkng Embeddng and Extractng Experment The algorthm based on changng character RGB values of color s tested by embeddng experment, and the watermarkng nformaton s State Grd Tel0000, whle the algorthm based on changng character spacng s also tested by embeddng experment, and the watermarkng nformaton s electrcty bargan prce: 0000YUAN.Both of the keys are 223. By extractng test, all watermarkng nformaton can be extracted correctly on the texts wthout sufferng attacks. And through the vsual, t s mpossble to fnd the text has been modfed after beng embedded watermarkng nformaton. Fg. 2. Text after embeddng watermarkng nformaton Attack Experment The purpose of dgtal watermarkng attack s desgned to make t mpossble to detect and extract watermarkng nformaton correctly. The robustness of watermarkng algorthm can be determned by checkng whether the watermarkng nformaton can be detected and extracted correctly after beng attacked. The texts embedded wth watermarkng nformaton are tested by attack experments. Repeat the test to prevent from generatng a rght result by chance. ) Attack based on the format. The text format attrbutes s changed n dfferent degree. a) Based on changng the RGB values of font color. Color attack on text, wholly or randomly, shows a weak robustness. But color attack on parts of the texts and any other attack on the texts show a strong robustness. And watermarkng nformaton can be detected and extracted correctly. b) Based on changng character spacng. Character spacng attack on whole texts show a weak robustness. But character spacng attack on parts of the texts and any other attack on the texts show a strong robustness. And watermarkng nformaton can be detected and extracted correctly. 2) Attack based on the content. Delete and paste operatons on text content n varyng degrees. a) Based on changng the RGB values of font color. Senstve to the tampered text content. b) Based on changng character spacng. Have a strong robustness and be able to resst attacks. 3) The Fg. 3 shows that f ether the text content or the font color changes, watermarkng algorthm based on changng RGB values of font color can accurately determne the specfc postons where the watermarkng bts are damaged to acheve content certfcaton. Fg.. The orgnal text. Fg. 3. Postonng the tampered content. 335
6 The expermental results show that the watermarkng algorthm based on changng the RGB value of font color show a poor robustness when the content s tampered, and can accurately poston the changed contents and characters whose color are changed so that the recever can dentfy whether the text has been tampered whch can effectvely acheve the content authentcaton. The algorthm based on changng character spacng has a strong robustness and can resst varous formats and contend attacks except attacks wth changng character spacng. It won t lower text qualty and s an effectve algorthm wth strong robustness whch can be used to hde electrc power nformaton. Through dgtal watermarkng system composed of two above mentoned algorthms, when the text s edted or suffers from other damages, the electrcty bargan prce can be stll extracted, and the dentty of the sender can also be confrmed whch helps to confrm the authentcty of texts. The combnaton of multple watermarkng algorthm may be, to some extents, complementary when texts suffer from attacks, and can acheve varous purposes, whch makes up for the weakness of a sngle watermarkng algorthm Algorthm Performance Analyss The most mportant performance features of dgtal watermarkng technology are capacty, robustness, mperceptblty, securty and so on whch determne whether the watermarkng algorthm has a practcal value. ) Robustness analyss. a) Algorthm based on changng RGB values of font color to embed watermarkng nformaton can resst basc format attacks, but shows a poor robustness when the content s tampered. It can be used for effectve content authentcaton of texts. Once the text content s malcously modfed, t wll be hard to extract watermarkng correctly. b) Algorthm based on changng character spacng to embed algorthm watermarkng nformaton has a very strong robustness, and t can resst format and content attacks. As for the credble transmsson of electronc text n power system, t provdes an effectve protecton to resst the malcously tamperng. 2) Capacty analyss. Both watermarkng algorthms are usng (7,4) Hammng code. Each of the 7 code words contans 4-bt nformaton and 3-bt supervson. It can detect two fault codes and correct an error code. atermarkng algorthm based on font color to code modfed lower two bts of G and B component respectvely to embed watermarkng nformaton, therefore, a character can be embedded wth four-bt nformaton. Though the use of error correcton codng affects the capacty, the algorthm stll has a large capacty. atermarkng algorthm based on the character spacng to code. Through the theoretcal analyss, P=N (P s the total capacty provded for loadng watermarkng nformaton nto the text, N s the number of characters of the text), so the number of bts of watermarkng nformaton s consstent wth that of characters. Although, n order to mprove the robustness and securty, error correcton codng s ntroduced at the expense of certan data capacty, the requrement of embeddng capacty of watermarkng nformaton s enough. 3) Imperceptblty analyss. Both algorthms are desgned based on human vsual system. The changed values are wthn the thresholds where the changes are ndscernble by naked eye. In prncple, the algorthms have very hgh mperceptblty. Through embeddng watermarkng nformaton experments, t can be seen that the text doesn t be changed or be degraded vsually. 4) Securty analyss. The two algorthm uses encrypton algorthm to encrypt the watermarkng nformaton. Even f the attacker knows the watermarkng embeddng algorthm, watermarkng nformaton would not be completely obtaned wthout the key. And t embeds the nformaton n the random place whch makes t much harder for rvals to attack t. Through the above performance analyss, the proposed multple text watermarkng algorthm can acheve convert communcaton of mportant nformaton and content authentcaton n power system by takng advantage of the combnaton of two dfferent text watermarkng algorthms. 6. Conclusons Dgtal watermarkng technology can effectvely acheve covert communcaton and content authentcaton. The robust watermarkng and the sem-fragle watermarkng algorthm are used for text transmsson of electrc power system and can hde electrcty bargan prce effectvely n the transmsson to resst all knds of attacks n the transmsson. The sem-fragle watermarkng algorthm s used to authentcate the sender, whch can ncrease the trust between the sender and recever. Expermental results show that the use of multple watermarks technology can effectvely resst attacks for dfferent purposes, protect the data n many ways and mprove the securty of the data. Electrc power ndustry s the natonal pllar ndustry and, wth the mprovement of normalzaton level n the electrc power system, nformaton securty has emerges gradually. th the development of dgtal watermarkng, dgtal watermarkng technology wll have a broad applcaton space n the power system securty feld as an effectve technque to solve the problem of nformaton securty. 336
7 References []. Junj u, Sheng Q, Jfeng He, et al., Applcaton of wavelet-based dgtal watermarkng n power system nformaton securty, Electrc Power Automaton Equpment, Vol. 24, Issue 2, 2004, pp [2]. Yuancheng L, Xaole ang, Technology of dgtal rdgelet transform watermarkng n electrc power system, Electrc Power Informaton Technology, Vol. 5, Issue 0, 2007, pp [3]. C. Yn, L. L, A. Lv, et al., Technology of dgtal vdeo watermarkng n electrc power system, Relay, No. 20, 2007, pp [4]. Ronghu Tu, Jyng Zhao, A sem-fragle audo watermarkng scheme based on dgtal wavelet transform and quantzaton and ts applcaton n power system, Transactons of the Chnese Socety of Electrcal Engneerng, Vol. 25, No. 2, 2005, pp [5]. S. Zhu, J. Lu, An adaptve watermarkng-quantfyng algorthm for 3-D meshs model of ultra hgh voltage equpment, Transactons of Chna Electrotechncal Socety, No. 2, 20. [6]. S. Zhu, J. Lu, Electrc power equpment 3D mesh model adaptve robust watermarkng algorthm, Transactons of Chna Electrotechncal Socety, No. 2, 20, 029. [7].. Xanpe, Y. enxa,. Quande, Applcaton of dgtal watermarkng technque to credble delvery of texts n power systems, Automaton of Electrc Power Systems, Vol. 26, Issue 8, 2002, pp [8]. S. H. Low, N. F. Maxemchuk, Performance comparson of two text markng methods, IEEE Journal on Selected Areas n Communcatons, Vo. 6, Issue 4, 998, pp [9]. K. T. Ahern, Invsble encodng of attrbute data n character based texts and fles: European Patent EP 4540, [0] M. J. Atallah, V. Raskn, C. F. Hempelmann, et al. Natural language watermarkng and tamperproofng, Informaton Hdng, Lecture Notes n Computer Scence, Vol. 2578, 2003, pp []. Z. Yu, X. Lu, A new dgtal watermarkng scheme based on text, n Proceedngs of the Internatonal Conference on Multmeda Informaton Networkng and Securty MINES 09, Vol. 2, 2009, pp [2]. B. Yang,. Sh,. Q, et al., Methods and apparatus for embeddng and detectng dgtal watermarks n a text texts: U.S. Patent 8,07,29, [3]. X. Zhou, Z. ang,. Zhao, et al. Attack model of text watermarkng based on communcatons, n Proceedngs of the IEEE Internatonal Conference on Informaton Management, Innovaton Management and Industral Engneerng, Vol. 4, 2009, pp [4]. X. e, Sne-wave-based text watermarkng for ORD text, n Proceedngs of the IEEE Internatonal Conference on Computer and Informaton Applcaton (ICCIA), 200, pp [5]. J. T. Brassl, S. Low, N. F. Maxemchuk, Copyrght protecton for the electronc dstrbuton of text documents, n Proceedngs of the IEEE, Vol. 87, No. 7, pp Copyrght, Internatonal Frequency Sensor Assocaton (IFSA). All rghts reserved. ( 337
A Robust Webpage Information Hiding Method Based on the Slash of Tag
Advanced Engneerng Forum Onlne: 2012-09-26 ISSN: 2234-991X, Vols. 6-7, pp 361-366 do:10.4028/www.scentfc.net/aef.6-7.361 2012 Trans Tech Publcatons, Swtzerland A Robust Webpage Informaton Hdng Method Based
More informationCluster Analysis of Electrical Behavior
Journal of Computer and Communcatons, 205, 3, 88-93 Publshed Onlne May 205 n ScRes. http://www.scrp.org/ournal/cc http://dx.do.org/0.4236/cc.205.350 Cluster Analyss of Electrcal Behavor Ln Lu Ln Lu, School
More informationHybrid Non-Blind Color Image Watermarking
Hybrd Non-Blnd Color Image Watermarkng Ms C.N.Sujatha 1, Dr. P. Satyanarayana 2 1 Assocate Professor, Dept. of ECE, SNIST, Yamnampet, Ghatkesar Hyderabad-501301, Telangana 2 Professor, Dept. of ECE, AITS,
More informationA Lossless Watermarking Scheme for Halftone Image Authentication
IJCSNS Internatonal Journal of Computer Scence and Network Securty, VOL.6 No.2B, February 2006 147 A Lossless Watermarkng Scheme for Halftone Image Authentcaton Jeng-Shyang Pan, Hao Luo, and Zhe-Mng Lu,
More informationIdentify the Attack in Embedded Image with Steganalysis Detection Method by PSNR and RGB Intensity
Internatonal Journal of Computer Systems (ISSN: 394-1065), Volume 03 Issue 07, July, 016 Avalable at http://www.jcsonlne.com/ Identfy the Attack n Embedded Image wth Steganalyss Detecton Method by PSNR
More informationData Hiding and Image Authentication for Color-Palette Images
Data Hdng and Image Authentcaton for Color-Palette Images Chh-Yang Yn ( 殷志揚 ) and Wen-Hsang Tsa ( 蔡文祥 ) Department of Computer & Informaton Scence Natonal Chao Tung Unversty 00 Ta Hsueh Rd., Hsnchu, Tawan
More informationImprovement of Spatial Resolution Using BlockMatching Based Motion Estimation and Frame. Integration
Improvement of Spatal Resoluton Usng BlockMatchng Based Moton Estmaton and Frame Integraton Danya Suga and Takayuk Hamamoto Graduate School of Engneerng, Tokyo Unversty of Scence, 6-3-1, Nuku, Katsuska-ku,
More informationSemi-Fragile Watermarking Scheme for Authentication of JPEG Images
Tamkang Journal of Scence and Engneerng, Vol. 10, No 1, pp. 5766 (2007) 57 Sem-Fragle Watermarkng Scheme for Authentcaton of JPEG Images Chh-Hung n 1 *, Tung-Shh Su 2 and Wen-Shyong Hseh 2,3 1 Department
More informationSecurity Vulnerabilities of an Enhanced Remote User Authentication Scheme
Contemporary Engneerng Scences, Vol. 7, 2014, no. 26, 1475-1482 HIKARI Ltd, www.m-hkar.com http://dx.do.org/10.12988/ces.2014.49186 Securty Vulnerabltes of an Enhanced Remote User Authentcaton Scheme Hae-Soon
More informationInformation Hiding Watermarking Detection Technique by PSNR and RGB Intensity
www..org 3 Informaton Hdng Watermarkng Detecton Technque by PSNR and RGB Intensty 1 Neha Chauhan, Akhlesh A. Waoo, 3 P. S. Patheja 1 Research Scholar, BIST, Bhopal, Inda.,3 Assstant Professor, BIST, Bhopal,
More informationRobust Blind Video Watermark Algorithm in Transform Domain Combining with 3D Video Correlation
JOURNAL OF MULTIMEDIA, VOL. 8, NO. 2, APRIL 2013 161 Robust Blnd Vdeo Watermark Algorthm n Transform Doman Combnng wth 3D Vdeo Correlaton DING Ha-yang 1,3 1. Informaton Securty Center, Bejng Unversty of
More informationAn Optimal Algorithm for Prufer Codes *
J. Software Engneerng & Applcatons, 2009, 2: 111-115 do:10.4236/jsea.2009.22016 Publshed Onlne July 2009 (www.scrp.org/journal/jsea) An Optmal Algorthm for Prufer Codes * Xaodong Wang 1, 2, Le Wang 3,
More informationKey-Selective Patchwork Method for Audio Watermarking
Internatonal Journal of Dgtal Content Technology and ts Applcatons Volume 4, Number 4, July 2010 Key-Selectve Patchwork Method for Audo Watermarkng 1 Ch-Man Pun, 2 Jng-Jng Jang 1, Frst and Correspondng
More informationRelated-Mode Attacks on CTR Encryption Mode
Internatonal Journal of Network Securty, Vol.4, No.3, PP.282 287, May 2007 282 Related-Mode Attacks on CTR Encrypton Mode Dayn Wang, Dongda Ln, and Wenlng Wu (Correspondng author: Dayn Wang) Key Laboratory
More informationA Secured Method for Image Steganography Based On Pixel Values
A Secured Method for Image Steganography Based On Pxel Values Tarun Gulat #, Sanskrt Gupta * # Assocate Professor, Electroncs and Communcaton Engneerng Department, MMEC, M.M.U., Mullana, Ambala, Haryana,
More informationA NEW AUDIO WATERMARKING METHOD BASED
A NEW AUDIO WATERMARKING METHOD BASED ON DISCRETE COSINE TRANSFORM WITH A GRAY IMAGE Mohammad Ibrahm Khan 1, Md. Iqbal Hasan Sarker 2, Kaushk Deb 3 and Md. Hasan Furhad 4 1,2,3 Department of Computer Scence
More informationParallelism for Nested Loops with Non-uniform and Flow Dependences
Parallelsm for Nested Loops wth Non-unform and Flow Dependences Sam-Jn Jeong Dept. of Informaton & Communcaton Engneerng, Cheonan Unversty, 5, Anseo-dong, Cheonan, Chungnam, 330-80, Korea. seong@cheonan.ac.kr
More informationAn Image Fusion Approach Based on Segmentation Region
Rong Wang, L-Qun Gao, Shu Yang, Yu-Hua Cha, and Yan-Chun Lu An Image Fuson Approach Based On Segmentaton Regon An Image Fuson Approach Based on Segmentaton Regon Rong Wang, L-Qun Gao, Shu Yang 3, Yu-Hua
More informationResearch and Application of Fingerprint Recognition Based on MATLAB
Send Orders for Reprnts to reprnts@benthamscence.ae The Open Automaton and Control Systems Journal, 205, 7, 07-07 Open Access Research and Applcaton of Fngerprnt Recognton Based on MATLAB Nng Lu* Department
More informationPerformance Analysis of Data Hiding in MPEG-4 AAC Audio *
TSINGHUA SCIENCE AND TECHNOLOGY ISSNll1007-0214ll07/21llpp55-61 Volume 14, Number 1, February 2009 Performance Analyss of Data Hdng n MPEG-4 AAC Audo * XU Shuzheng ( ) **, ZHANG Peng ( ), WANG Pengjun
More informationA Fast Content-Based Multimedia Retrieval Technique Using Compressed Data
A Fast Content-Based Multmeda Retreval Technque Usng Compressed Data Borko Furht and Pornvt Saksobhavvat NSF Multmeda Laboratory Florda Atlantc Unversty, Boca Raton, Florda 3343 ABSTRACT In ths paper,
More informationShape-adaptive DCT and Its Application in Region-based Image Coding
Internatonal Journal of Sgnal Processng, Image Processng and Pattern Recognton, pp.99-108 http://dx.do.org/10.14257/sp.2014.7.1.10 Shape-adaptve DCT and Its Applcaton n Regon-based Image Codng Yamn Zheng,
More informationThe Research of Ellipse Parameter Fitting Algorithm of Ultrasonic Imaging Logging in the Casing Hole
Appled Mathematcs, 04, 5, 37-3 Publshed Onlne May 04 n ScRes. http://www.scrp.org/journal/am http://dx.do.org/0.436/am.04.584 The Research of Ellpse Parameter Fttng Algorthm of Ultrasonc Imagng Loggng
More informationVirtual Machine Migration based on Trust Measurement of Computer Node
Appled Mechancs and Materals Onlne: 2014-04-04 ISSN: 1662-7482, Vols. 536-537, pp 678-682 do:10.4028/www.scentfc.net/amm.536-537.678 2014 Trans Tech Publcatons, Swtzerland Vrtual Machne Mgraton based on
More informationContent Based Image Retrieval Using 2-D Discrete Wavelet with Texture Feature with Different Classifiers
IOSR Journal of Electroncs and Communcaton Engneerng (IOSR-JECE) e-issn: 78-834,p- ISSN: 78-8735.Volume 9, Issue, Ver. IV (Mar - Apr. 04), PP 0-07 Content Based Image Retreval Usng -D Dscrete Wavelet wth
More informationEnhanced AMBTC for Image Compression using Block Classification and Interpolation
Internatonal Journal of Computer Applcatons (0975 8887) Volume 5 No.0, August 0 Enhanced AMBTC for Image Compresson usng Block Classfcaton and Interpolaton S. Vmala Dept. of Comp. Scence Mother Teresa
More informationSpecifications in 2001
Specfcatons n 200 MISTY (updated : May 3, 2002) September 27, 200 Mtsubsh Electrc Corporaton Block Cpher Algorthm MISTY Ths document shows a complete descrpton of encrypton algorthm MISTY, whch are secret-key
More informationHigh Payload Reversible Data Hiding Scheme Using Difference Segmentation and Histogram Shifting
JOURNAL OF ELECTRONIC SCIENCE AND TECHNOLOGY, VOL. 11, NO. 1, MARCH 2013 9 Hgh Payload Reversble Data Hdng Scheme Usng Dfference Segmentaton and Hstogram Shftng Yung-Chen Chou and Huang-Chng L Abstract
More informationA Hybrid Semi-Blind Gray Scale Image Watermarking Algorithm Based on DWT-SVD using Human Visual System Model
A Hybrd Sem-Blnd Gray Scale Image Watermarkng Algorthm Based on DWT-SVD usng Human Vsual System Model Rajesh Mehta r Scence & Engneerng, USICT Guru Gobnd Sngh Indrarprastha Unversty New Delh, Inda rajesh00ust@gmal.com
More informationRobust Shot Boundary Detection from Video Using Dynamic Texture
Sensors & Transducers 204 by IFSA Publshng, S. L. http://www.sensorsportal.com Robust Shot Boundary Detecton from Vdeo Usng Dynamc Teture, 3 Peng Tale, 2 Zhang Wenjun School of Communcaton & Informaton
More informationRobust and Reversible Relational Database Watermarking Algorithm Based on Clustering and Polar Angle Expansion
Robust and Reversble Relatonal Database Watermarkng Algorthm Based on Clusterng and Polar Angle Expanson Zhyong L, Junmn Lu and Wecheng Tao College of Informaton Scence and Engneerng, Hunan Unversty, Changsha,
More informationEnhanced Watermarking Technique for Color Images using Visual Cryptography
Informaton Assurance and Securty Letters 1 (2010) 024-028 Enhanced Watermarkng Technque for Color Images usng Vsual Cryptography Enas F. Al rawashdeh 1, Rawan I.Zaghloul 2 1 Balqa Appled Unversty, MIS
More informationPrivate Information Retrieval (PIR)
2 Levente Buttyán Problem formulaton Alce wants to obtan nformaton from a database, but she does not want the database to learn whch nformaton she wanted e.g., Alce s an nvestor queryng a stock-market
More informationUser Authentication Based On Behavioral Mouse Dynamics Biometrics
User Authentcaton Based On Behavoral Mouse Dynamcs Bometrcs Chee-Hyung Yoon Danel Donghyun Km Department of Computer Scence Department of Computer Scence Stanford Unversty Stanford Unversty Stanford, CA
More informationA Fast Visual Tracking Algorithm Based on Circle Pixels Matching
A Fast Vsual Trackng Algorthm Based on Crcle Pxels Matchng Zhqang Hou hou_zhq@sohu.com Chongzhao Han czhan@mal.xjtu.edu.cn Ln Zheng Abstract: A fast vsual trackng algorthm based on crcle pxels matchng
More informationRobust Watermarking for Text Images Based on Arnold Scrambling and DWT-DCT
Internatonal Conference on Mechatroncs Electronc Industral and Control Engneerng (MEIC 015) Robust Watermarkng for Text Images Based on Arnold Scramblng and DWT-DCT Fan Wu College of Informaton Scence
More informationConcurrent Apriori Data Mining Algorithms
Concurrent Apror Data Mnng Algorthms Vassl Halatchev Department of Electrcal Engneerng and Computer Scence York Unversty, Toronto October 8, 2015 Outlne Why t s mportant Introducton to Assocaton Rule Mnng
More informationA Binarization Algorithm specialized on Document Images and Photos
A Bnarzaton Algorthm specalzed on Document mages and Photos Ergna Kavalleratou Dept. of nformaton and Communcaton Systems Engneerng Unversty of the Aegean kavalleratou@aegean.gr Abstract n ths paper, a
More informationA Comparison between Digital Images Watermarking in Tow Different Color Spaces Using DWT2*
A Comparson between Dgtal s ng n Tow Dfferent Color Spaces Usng DWT* Mehd Khall Natonal Academy of Scence of Armena Yerevan, Armena e-mal: khall.mehd@yahoo.com ABSTRACT A novel dgtal watermarkng for ownershp
More informationKEYWORDS: Digital Image Watermarking, Discrete Wavelet Transform, General Regression Neural Network, Human Visual System. 1.
An Adaptve Dgtal Image Watermarkng Based on Image Features n Dscrete Wavelet Transform Doman and General Regresson Neural Network Ayoub Taher Group of IT Engneerng, Payam Noor Unversty, Broujen, Iran ABSTRACT:
More informationFEATURE EXTRACTION. Dr. K.Vijayarekha. Associate Dean School of Electrical and Electronics Engineering SASTRA University, Thanjavur
FEATURE EXTRACTION Dr. K.Vjayarekha Assocate Dean School of Electrcal and Electroncs Engneerng SASTRA Unversty, Thanjavur613 41 Jont Intatve of IITs and IISc Funded by MHRD Page 1 of 8 Table of Contents
More informationUsing Counter-propagation Neural Network for Digital Audio Watermarking
Usng Counter-propagaton Neural Network for Dgtal Audo Watermarkng Chuan-Yu Chang and Wen-Chh Shen Graduate School of Computer Scence and Informaton Engneerng Natonal Yunln Unversty of Scence & Technology
More informationResearch Article High Capacity Reversible Watermarking for Audio by Histogram Shifting and Predicted Error Expansion
e Scentfc World Journal, Artcle ID 656251, 7 pages http://dx.do.org/1.1155/214/656251 Research Artcle Hgh Capacty Reversble Watermarkng for Audo by Hstogram Shftng and Predcted Error Expanson Fe Wang,
More informationAn Improved User Authentication and Key Agreement Scheme Providing User Anonymity
35 JOURNAL OF ELECTRONIC SCIENCE AND TECHNOLOGY, VOL. 9, NO. 4, DECEMBER 0 An Improved User Authentcaton and Key Agreement Scheme Provdng User Anonymty Ya-Fen Chang and Pe-Yu Chang Abstract When accessng
More informationSLAM Summer School 2006 Practical 2: SLAM using Monocular Vision
SLAM Summer School 2006 Practcal 2: SLAM usng Monocular Vson Javer Cvera, Unversty of Zaragoza Andrew J. Davson, Imperal College London J.M.M Montel, Unversty of Zaragoza. josemar@unzar.es, jcvera@unzar.es,
More informationTECHNIQUE OF FORMATION HOMOGENEOUS SAMPLE SAME OBJECTS. Muradaliyev A.Z.
TECHNIQUE OF FORMATION HOMOGENEOUS SAMPLE SAME OBJECTS Muradalyev AZ Azerbajan Scentfc-Research and Desgn-Prospectng Insttute of Energetc AZ1012, Ave HZardab-94 E-mal:aydn_murad@yahoocom Importance of
More informationAn Image Compression Algorithm based on Wavelet Transform and LZW
An Image Compresson Algorthm based on Wavelet Transform and LZW Png Luo a, Janyong Yu b School of Chongqng Unversty of Posts and Telecommuncatons, Chongqng, 400065, Chna Abstract a cylpng@63.com, b y27769864@sna.cn
More informationA new remote user authentication scheme for multi-server architecture
Future Generaton Computer Systems 19 (2003) 13 22 A new remote user authentcaton scheme for mult-server archtecture Iuon-Chang Ln a, Mn-Shang Hwang b,, L-Hua L b a Department of Computer Scence and Informaton
More informationProfessional competences training path for an e-commerce major, based on the ISM method
World Transactons on Engneerng and Technology Educaton Vol.14, No.4, 2016 2016 WIETE Professonal competences tranng path for an e-commerce maor, based on the ISM method Ru Wang, Pn Peng, L-gang Lu & Lng
More informationA mathematical programming approach to the analysis, design and scheduling of offshore oilfields
17 th European Symposum on Computer Aded Process Engneerng ESCAPE17 V. Plesu and P.S. Agach (Edtors) 2007 Elsever B.V. All rghts reserved. 1 A mathematcal programmng approach to the analyss, desgn and
More informationSecure and Fast Fingerprint Authentication on Smart Card
SETIT 2005 3 rd Internatonal Conference: Scences of Electronc, Technologes of Informaton and Telecommuncatons March 27-31, 2005 TUNISIA Secure and Fast Fngerprnt Authentcaton on Smart Card Y. S. Moon*,
More informationAudio Content Classification Method Research Based on Two-step Strategy
(IJACSA) Internatonal Journal of Advanced Computer Scence and Applcatons, Audo Content Classfcaton Method Research Based on Two-step Strategy Sume Lang Department of Computer Scence and Technology Chongqng
More informationA Clustering Algorithm for Key Frame Extraction Based on Density Peak
Journal of Computer and Communcatons, 2018, 6, 118-128 http://www.scrp.org/ournal/cc ISSN Onlne: 2327-5227 ISSN Prnt: 2327-5219 A Clusterng Algorthm for Key Frame Extracton Based on Densty Peak Hong Zhao
More informationRobust Video Watermarking Using Image Normalization, Motion Vector and Perceptual Information
Robust Vdeo Watermarkng Usng Image ormalzaton, Moton Vector and Perceptual Informaton Cedllo-Hernández Antono 1, Cedllo-Hernández Manuel 1, akano-myatake Marko 1, García-Vázquez Mreya S. 2 1 Postgraduate
More informationTN348: Openlab Module - Colocalization
TN348: Openlab Module - Colocalzaton Topc The Colocalzaton module provdes the faclty to vsualze and quantfy colocalzaton between pars of mages. The Colocalzaton wndow contans a prevew of the two mages
More informationSolving two-person zero-sum game by Matlab
Appled Mechancs and Materals Onlne: 2011-02-02 ISSN: 1662-7482, Vols. 50-51, pp 262-265 do:10.4028/www.scentfc.net/amm.50-51.262 2011 Trans Tech Publcatons, Swtzerland Solvng two-person zero-sum game by
More informationAdaptive digital watermarking of images using Genetic Algorithm
Adaptve dgtal watermarkng of mages usng Genetc Algorthm Bushra Skander, Muhammad Ishtaq, M. Arfan Jaffar, Muhammad Tarq, Anwar M. Mrza Department of Computer Scence, Natonal Unversty of Computer and Emergng
More informationMULTISPECTRAL IMAGES CLASSIFICATION BASED ON KLT AND ATR AUTOMATIC TARGET RECOGNITION
MULTISPECTRAL IMAGES CLASSIFICATION BASED ON KLT AND ATR AUTOMATIC TARGET RECOGNITION Paulo Quntlano 1 & Antono Santa-Rosa 1 Federal Polce Department, Brasla, Brazl. E-mals: quntlano.pqs@dpf.gov.br and
More informationSecurity Enhanced Dynamic ID based Remote User Authentication Scheme for Multi-Server Environments
Internatonal Journal of u- and e- ervce, cence and Technology Vol8, o 7 0), pp7-6 http://dxdoorg/07/unesst087 ecurty Enhanced Dynamc ID based Remote ser Authentcaton cheme for ult-erver Envronments Jun-ub
More informationCracking of the Merkle Hellman Cryptosystem Using Genetic Algorithm
Crackng of the Merkle Hellman Cryptosystem Usng Genetc Algorthm Zurab Kochladze 1 * & Lal Besela 2 1 Ivane Javakhshvl Tbls State Unversty, 1, I.Chavchavadze av 1, 0128, Tbls, Georga 2 Sokhum State Unversty,
More informationNetwork Coding as a Dynamical System
Network Codng as a Dynamcal System Narayan B. Mandayam IEEE Dstngushed Lecture (jont work wth Dan Zhang and a Su) Department of Electrcal and Computer Engneerng Rutgers Unversty Outlne. Introducton 2.
More informationArticle Reversible Dual-Image-Based Hiding Scheme Using Block Folding Technique
Artcle Reversble Dual-Image-Based Hdng Scheme Usng Block Foldng Technque Tzu-Chuen Lu, * and Hu-Shh Leng Department of Informaton Management, Chaoyang Unversty of Technology, Tachung 4349, Tawan Department
More informationA high precision collaborative vision measurement of gear chamfering profile
Internatonal Conference on Advances n Mechancal Engneerng and Industral Informatcs (AMEII 05) A hgh precson collaboratve vson measurement of gear chamferng profle Conglng Zhou, a, Zengpu Xu, b, Chunmng
More informationModular PCA Face Recognition Based on Weighted Average
odern Appled Scence odular PCA Face Recognton Based on Weghted Average Chengmao Han (Correspondng author) Department of athematcs, Lny Normal Unversty Lny 76005, Chna E-mal: hanchengmao@163.com Abstract
More informationDetermining the Optimal Bandwidth Based on Multi-criterion Fusion
Proceedngs of 01 4th Internatonal Conference on Machne Learnng and Computng IPCSIT vol. 5 (01) (01) IACSIT Press, Sngapore Determnng the Optmal Bandwdth Based on Mult-crteron Fuson Ha-L Lang 1+, Xan-Mn
More informationFast Computation of Shortest Path for Visiting Segments in the Plane
Send Orders for Reprnts to reprnts@benthamscence.ae 4 The Open Cybernetcs & Systemcs Journal, 04, 8, 4-9 Open Access Fast Computaton of Shortest Path for Vstng Segments n the Plane Ljuan Wang,, Bo Jang
More informationProblem Definitions and Evaluation Criteria for Computational Expensive Optimization
Problem efntons and Evaluaton Crtera for Computatonal Expensve Optmzaton B. Lu 1, Q. Chen and Q. Zhang 3, J. J. Lang 4, P. N. Suganthan, B. Y. Qu 6 1 epartment of Computng, Glyndwr Unversty, UK Faclty
More informationSimulation Based Analysis of FAST TCP using OMNET++
Smulaton Based Analyss of FAST TCP usng OMNET++ Umar ul Hassan 04030038@lums.edu.pk Md Term Report CS678 Topcs n Internet Research Sprng, 2006 Introducton Internet traffc s doublng roughly every 3 months
More informationAvailable online at Available online at Advanced in Control Engineering and Information Science
Avalable onlne at wwwscencedrectcom Avalable onlne at wwwscencedrectcom Proceda Proceda Engneerng Engneerng 00 (2011) 15000 000 (2011) 1642 1646 Proceda Engneerng wwwelsevercom/locate/proceda Advanced
More informationDetecting MP3Stego using Calibrated Side Information Features
2628 JOURNAL OF SOFTWARE, VOL. 8, NO. 10, OCTOBER 2013 Detectng P3Stego usng Calbrated Sde Informaton Features Xanmn Yu School of Informaton Scence and Engneerng, Nngbo Unversty Emal: mlhappy1016@163.com
More informationResearch Article Hamming Code Based Watermarking Scheme for 3D Model Verification
Mathematcal Problems n Engneerng, Artcle ID 241093, 7 pages http://dx.do.org/10.1155/2014/241093 Research Artcle Hammng Code Based Watermarkng Scheme for 3D Model Verfcaton Jen-Tse Wang, 1 Y-Chng Chang,
More informationThe stream cipher MICKEY-128 (version 1) Algorithm specification issue 1.0
The stream cpher MICKEY-128 (verson 1 Algorthm specfcaton ssue 1. Steve Babbage Vodafone Group R&D, Newbury, UK steve.babbage@vodafone.com Matthew Dodd Independent consultant matthew@mdodd.net www.mdodd.net
More informationImprovement ofmanik et al. s remote user authentication scheme
Improvement ofmank et al. s remote user authentcaton scheme Abstract Jue-Sam Chou, a,yaln Chen b Jyun-Yu Ln c a Department of Informaton Management, Nanhua Unversty Chay, 622, Tawan schou@mal.nhu.edu.tw
More informationPositive Semi-definite Programming Localization in Wireless Sensor Networks
Postve Sem-defnte Programmng Localzaton n Wreless Sensor etworks Shengdong Xe 1,, Jn Wang, Aqun Hu 1, Yunl Gu, Jang Xu, 1 School of Informaton Scence and Engneerng, Southeast Unversty, 10096, anjng Computer
More informationTsinghua University at TAC 2009: Summarizing Multi-documents by Information Distance
Tsnghua Unversty at TAC 2009: Summarzng Mult-documents by Informaton Dstance Chong Long, Mnle Huang, Xaoyan Zhu State Key Laboratory of Intellgent Technology and Systems, Tsnghua Natonal Laboratory for
More informationIR-HARQ vs. Joint Channel-Network coding for Cooperative Wireless Communication
Cyber Journals: ultdscplnary Journals n Scence and Technology, Journal of Selected Areas n Telecommuncatons (JSAT), August Edton, 2 IR-HARQ vs. Jont Channel-Network codng for Cooperatve Wreless Communcaton
More informationAnalysis on the Workspace of Six-degrees-of-freedom Industrial Robot Based on AutoCAD
Analyss on the Workspace of Sx-degrees-of-freedom Industral Robot Based on AutoCAD Jn-quan L 1, Ru Zhang 1,a, Fang Cu 1, Q Guan 1 and Yang Zhang 1 1 School of Automaton, Bejng Unversty of Posts and Telecommuncatons,
More informationLoad Balancing for Hex-Cell Interconnection Network
Int. J. Communcatons, Network and System Scences,,, - Publshed Onlne Aprl n ScRes. http://www.scrp.org/journal/jcns http://dx.do.org/./jcns.. Load Balancng for Hex-Cell Interconnecton Network Saher Manaseer,
More informationVideo Proxy System for a Large-scale VOD System (DINA)
Vdeo Proxy System for a Large-scale VOD System (DINA) KWUN-CHUNG CHAN #, KWOK-WAI CHEUNG *# #Department of Informaton Engneerng *Centre of Innovaton and Technology The Chnese Unversty of Hong Kong SHATIN,
More informationIP Camera Configuration Software Instruction Manual
IP Camera 9483 - Confguraton Software Instructon Manual VBD 612-4 (10.14) Dear Customer, Wth your purchase of ths IP Camera, you have chosen a qualty product manufactured by RADEMACHER. Thank you for the
More informationPerformance Evaluation of an ANFIS Based Power System Stabilizer Applied in Multi-Machine Power Systems
Performance Evaluaton of an ANFIS Based Power System Stablzer Appled n Mult-Machne Power Systems A. A GHARAVEISI 1,2 A.DARABI 3 M. MONADI 4 A. KHAJEH-ZADEH 5 M. RASHIDI-NEJAD 1,2,5 1. Shahd Bahonar Unversty
More informationNetwork Intrusion Detection Based on PSO-SVM
TELKOMNIKA Indonesan Journal of Electrcal Engneerng Vol.1, No., February 014, pp. 150 ~ 1508 DOI: http://dx.do.org/10.11591/telkomnka.v1.386 150 Network Intruson Detecton Based on PSO-SVM Changsheng Xang*
More informationLocal Quaternary Patterns and Feature Local Quaternary Patterns
Local Quaternary Patterns and Feature Local Quaternary Patterns Jayu Gu and Chengjun Lu The Department of Computer Scence, New Jersey Insttute of Technology, Newark, NJ 0102, USA Abstract - Ths paper presents
More informationWireless Sensor Network Localization Research
Sensors & Transducers 014 by IFSA Publshng, S L http://wwwsensorsportalcom Wreless Sensor Network Localzaton Research Lang Xn School of Informaton Scence and Engneerng, Hunan Internatonal Economcs Unversty,
More informationResearch in Algorithm of Image Processing Used in Collision Avoidance Systems
Sensors & Transducers, Vol 59, Issue, November 203, pp 330-336 Sensors & Transducers 203 by IFSA http://wwwsensorsportalcom Research n Algorthm of Image Processng Used n Collson Avodance Systems Hu Bn
More informationA Hybrid Digital Image Watermarking based on Discrete Wavelet Transform, Discrete Cosine Transform, and General Regression Neural Network
A Hybrd Dgtal Image Watermarkng based on Dscrete Wavelet Transform, Dscrete Cosne Transform, and General Regresson Neural Network Ayoub Taher ; ABSTRACT In ths paper, a new hybrd dgtal watermarkng technque
More informationSubspace clustering. Clustering. Fundamental to all clustering techniques is the choice of distance measure between data points;
Subspace clusterng Clusterng Fundamental to all clusterng technques s the choce of dstance measure between data ponts; D q ( ) ( ) 2 x x = x x, j k = 1 k jk Squared Eucldean dstance Assumpton: All features
More informationSkew Angle Estimation and Correction of Hand Written, Textual and Large areas of Non-Textual Document Images: A Novel Approach
Angle Estmaton and Correcton of Hand Wrtten, Textual and Large areas of Non-Textual Document Images: A Novel Approach D.R.Ramesh Babu Pyush M Kumat Mahesh D Dhannawat PES Insttute of Technology Research
More informationStraight Line Detection Based on Particle Swarm Optimization
Sensors & ransducers 013 b IFSA http://www.sensorsportal.com Straght Lne Detecton Based on Partcle Swarm Optmzaton Shengzhou XU, Jun IE College of computer scence, South-Central Unverst for Natonaltes,
More informationQuality Improvement Algorithm for Tetrahedral Mesh Based on Optimal Delaunay Triangulation
Intellgent Informaton Management, 013, 5, 191-195 Publshed Onlne November 013 (http://www.scrp.org/journal/m) http://dx.do.org/10.36/m.013.5601 Qualty Improvement Algorthm for Tetrahedral Mesh Based on
More informationBANDWIDTH OPTIMIZATION OF INDIVIDUAL HOP FOR ROBUST DATA STREAMING ON EMERGENCY MEDICAL APPLICATION
ARPN Journal of Engneerng and Appled Scences 2006-2009 Asan Research Publshng Network (ARPN). All rghts reserved. BANDWIDTH OPTIMIZATION OF INDIVIDUA HOP FOR ROBUST DATA STREAMING ON EMERGENCY MEDICA APPICATION
More informationTerm Weighting Classification System Using the Chi-square Statistic for the Classification Subtask at NTCIR-6 Patent Retrieval Task
Proceedngs of NTCIR-6 Workshop Meetng, May 15-18, 2007, Tokyo, Japan Term Weghtng Classfcaton System Usng the Ch-square Statstc for the Classfcaton Subtask at NTCIR-6 Patent Retreval Task Kotaro Hashmoto
More informationFault Detection in Rule-Based Software Systems
Fault Detecton n Rule-Based Software Systems Dong Wang, Rubng Hao and Davd Lee Bell Labs Research Chna Bejng, Chna, 100080 {wangd, rbhao, leedavd}@lucent.com Abstract Motvated by packet flterng of frewall
More informationFPGA-based implementation of circular interpolation
Avalable onlne www.jocpr.com Journal of Chemcal and Pharmaceutcal Research, 04, 6(7):585-593 Research Artcle ISSN : 0975-7384 CODEN(USA) : JCPRC5 FPGA-based mplementaton of crcular nterpolaton Mngyu Gao,
More information3D Virtual Eyeglass Frames Modeling from Multiple Camera Image Data Based on the GFFD Deformation Method
NICOGRAPH Internatonal 2012, pp. 114-119 3D Vrtual Eyeglass Frames Modelng from Multple Camera Image Data Based on the GFFD Deformaton Method Norak Tamura, Somsangouane Sngthemphone and Katsuhro Ktama
More informationS1 Note. Basis functions.
S1 Note. Bass functons. Contents Types of bass functons...1 The Fourer bass...2 B-splne bass...3 Power and type I error rates wth dfferent numbers of bass functons...4 Table S1. Smulaton results of type
More informationOverview. Basic Setup [9] Motivation and Tasks. Modularization 2008/2/20 IMPROVED COVERAGE CONTROL USING ONLY LOCAL INFORMATION
Overvew 2 IMPROVED COVERAGE CONTROL USING ONLY LOCAL INFORMATION Introducton Mult- Smulator MASIM Theoretcal Work and Smulaton Results Concluson Jay Wagenpfel, Adran Trachte Motvaton and Tasks Basc Setup
More informationQuery Clustering Using a Hybrid Query Similarity Measure
Query clusterng usng a hybrd query smlarty measure Fu. L., Goh, D.H., & Foo, S. (2004). WSEAS Transacton on Computers, 3(3), 700-705. Query Clusterng Usng a Hybrd Query Smlarty Measure Ln Fu, Don Hoe-Lan
More informationResearch on Categorization of Animation Effect Based on Data Mining
MATEC Web of Conferences 22, 0102 0 ( 2015) DOI: 10.1051/ matecconf/ 2015220102 0 C Owned by the authors, publshed by EDP Scences, 2015 Research on Categorzaton of Anmaton Effect Based on Data Mnng Na
More informationDistortion Function Designing for JPEG Steganography with Uncompressed Side-image
Dstorton Functon Desgnng for JPEG Steganography wth Uncompressed Sde-mage Fangjun Huang School of Informaton Scence and Technology, Sun Yat-Sen Unversty, GD 56, Chna huangfj@mal.sysu.edu.cn Jwu Huang School
More information