Research of Multiple Text Watermarks Technique in Electric Power System Texts

Size: px
Start display at page:

Download "Research of Multiple Text Watermarks Technique in Electric Power System Texts"

Transcription

1 Sensors & Transducers 203 by IFSA Research of Multple Text atermarks Technque n Electrc Power System Texts Xao-X XING, Qng CHEN, 2 Lan-X FU School of Optcal-Electrcal and Computer Engneerng, Unversty of Shangha for Scence and Technology, Shangha, Chna, State Grd Jbe Electrc Power Co. Ltd., Bejng, Chna, 0240 Tel: E-mal: wealthxaox@63.com Receved: 2 July /Accepted: 25 October 203 /Publshed: 3 October 203 Abstract: Amng at the relable transmsson securty problems of electrc power system texts, multple text watermarkng algorthm s frst appled nto protectng t. Take protectng the transmsson of electrcty prce n the n electrc power system text and authentcatng the content from the sender for example, and robustness watermarkng algorthm s employed to transmt the electrcty prce wth covert communcaton whch makes t possble to resst dfferent knds of attacks. The sem-fragle watermark s utlzed to confrm the dentty of the sender whch can show whether the text s stolen or msused, and fnd where the contents are tampered. The experments show that multple text watermarkng algorthm can protect the data effectvely amng at dfferent purpose whch acheves ts applcaton value. Those also show the valdty of multple text watermarkng technque used n the relable transmsson of electrc power system texts and that ths technque has a vast applcaton prospect. Copyrght 203 IFSA. Keywords: Text watermarkng technque, Multple watermarkng, Power system, Content authentcaton, Semfragle watermarkng, Robustness watermarkng.. Introducton th the popularty of modern technology n the power system and the development of multmeda technology, nformaton securty has become an urgent problem to be solved n the power system. Dgtal watermarkng technology as a powerful means to solve the securty of multmeda nformaton has been gradually appled n electrc power system. Image [, 2] and vdeo [3] watermarkng technology both can be used for covert communcaton of mportant nformaton about electrcty bargan prce and so on to mprove the securty of nformaton transmsson. Audo watermarkng technology [4] can protect the copyrght of audo fles to prevent ts theft or msuse. Mesh watermarkng technology [5, 6] can protect the copyrght of mesh model wth propretary ntellectual property rghts. Lterature [7] proposes an dea that text watermarkng technology can be appled nto relable transmsson of power system texts, but dd not practce t. Currently, text watermarkng technologes can be manly categorzed two groups: the format and content. Maxemchuk and Brassl [8] proposed an algorthm whch changes lne spacng, the character spacng and character [9] to embed watermarkng nformaton slghtly, changes of whch cannot be Artcle number P_434 33

2 dentfed by the naked eye. These three methods have hgh mperceptblty, but cannot guarantee the robustness and capacty s the best. Though the robustness of text watermarkng algorthm based on the content s very strong, t wll cause the ambguty of natural language [0], and ts mperceptblty s not hgh, and t s easy to cause the opponent s attack. These algorthms can t cater to the characterstcs of strong robustness, large capacty and hgh mperceptblty. Therefore, the method of embeddng multple watermarks s employed to meet the needs of dfferent performances. Amng at mprovng the securty of convert communcaton of mportant nformaton n electrc power system and confrmng the source of the fles by usng content authentcaton method, a multple watermarks algorthm appled nto the relable transmsson of electrc power system text s proposed. The algorthm based on changng character spacng whch has a strong robustness s used to hde electrcty bargan prce, and sem-fragle watermarkng embeddng algorthm based on changng color RGB value of characters whch has a hgh mperceptblty s also employed to confrm the dentty of the sender. The proposed multple watermarkng algorthm s tested wth embeddng, extractng watermarkng nformaton and attack experments respectvely. And the expermental results show that the system s hghly feasble, can mprove the securty of covert communcaton, and fnd precsely where the content s tampered when the text suffers from malcous attacks. It s sutable for relable transmsson of electrc power system texts and content authentcaton. 2. Text atermarkng Technology Dgtal watermarkng technology s an effectve securty technology used for copyrght protecton, covert communcaton, content authentcaton, qualty detecton of multmeda nformaton. Multmeda redundant space s utlzed to embed watermarkng nformaton to acheve the purpose of securty protecton 2.. Text atermarkng Algorthm Text watermarkng technology, based on human vsual system (HVS), by fne-tunng the text format or content [, 2], embeds the watermarkng nformaton. atermarkng algorthm based on fnetunng manly the text format fne-tunngs the lne spacng, characters spacng and character propertes to embed watermarkng nformaton. Ths knd of watermarkng algorthm has good robustness, and can resst certan attack. It also has hgh mperceptblty, large capacty. atermarkng algorthm based on changng the content of a text to embed the watermarkng nformaton manly rely on the synonyms and equvalent sentence replacement to acheve the watermarkng embeddng, The robustness of ths algorthm s hgher than that based on changng format, however, due to the changes of the content, ts mperceptblty s poorer and t s less capacty Text atermarkng Framework Dgtal watermarkng system s manly composed of four parts: watermarkng generatng Gen, watermarkng embeddng Emb, watermarkng attack Att, watermarkng detecton Det. By detectng the text after the attack, the watermarkng nformaton can be extracted correctly to determne the robustness of watermarkng system. e represent the watermarkng attack model as [3] AM, AM =< { C, M,, K, C, '}, { A, C ', ata lg, atdet, atpar}, { Gen, Emb, Det, Att} > In order to facltate the understandng of ths model, some varables are descrbed as follows: C : watermarkng carrer; C : watermarked carrer; M : watermarkng message; : watermarkng; ' : extracted watermarkng; A : attack; ' : attacked watermarked carrer C C ' C + A () K : secret key; K gen, K emb, K det represent the set of secret keys used n the process of watermarkng generatng, embeddng and detecton, respectvely. atalg denotes watermarkng algorthm; atdet denotes watermarkng detector; atpar denotes watermarkng parameter. In a set, the small letter represents an element of the set of the correspondng captal letter. gen Gen : Gen([ C], M,[ K ]) (2) emb Emb : C Emb( C,, K ) (3) w Att : A Att([ atalg],[ atdet], atpar) (4) Det yes no Det C K (5) det : ([ '],[, ]) ( ',,[ ]) 3. Solutons Based on Text Dgtal atermarkng In the relable transmsson of texts n electrc power system, the mperceptblty of the algorthm s requred to be very hgh, the text cannot be changed wth perceptble changes, whch may cause the attacker s nterest, and the content of the text cannot 332

3 generate ambguty after beng changed. Therefore, algorthm based on content s not sutable and ths paper uses the algorthm based on fne-tunng text format to embed the watermarkng nformaton. In order to protect the texts n the securty of relable transmsson n the electrc power system and ncrease the trust between users, sem-fragle watermarkng and robust watermarkng are embedded at the same tme. The sem-fragle watermarkng havng hgh mperceptblty and hgh securty whch can resst some attacks can be used to authentcate contents after texts are receved, dstngush the dentty of the sender, embed the personal nformaton, send date and so on, and fnd where the contents are tampered. Robust watermarkng has a hgh ablty to resst attacks whch can be used for covert communcaton of mportant nformaton, and requres a large watermarkng capacty. It employs the method of loop embeddng watermarkng nformaton, whch ensures the text s, as long as there s at least one watermarkng nformaton avalable, stll can be extracted correctly. Therefore, the sem-fragle watermarkng embeddng algorthm based on changng character colors s used for content authentcaton, whle the robust watermarkng algorthm based on character spacng s used for hdng mportant nformaton. 4. The Text atermarkng Algorthm As descrbed n lterature [4], the RGB value combnatons varyng from (0,0,0) to (60,60,60) s very close to the ord default black, the naked eye cannot dstngush changes. Maxemchuk [5] ponts out that horzontal word dsplacements of /50 n and less readly go unnotced, vertcal lne dsplacements of /300 n and less go unnotced by readers. 4.. Based on Change the Font Color RGB Values s Sem-Fragle atermarkng Algorthm The purpose of ths algorthm s to authentcate the content of the transmtted texts. Therefore, semfragle watermarkng can be employed. It s requred to have the followng features: ) Imperceptblty. After embeddng watermarkng nformaton, the text does not produce vsble changes, because capacty and mperceptblty are mutually contradctory and the ncrease n capacty wll result n the declne n mperceptblty. Therefore, ths algorthm sacrfces part of capacty to ensure mperceptblty; 2) Detectng and sgnng tampered contents. It s an mportant property of the sem-fragle watermarkng. The tampered content must be precsely postoned and dsplayed; 3) Securty. The key space should be large enough to resst exhaustve attack method. Accordng to the test of human cone s senstvty to color shows that the senstvty of the naked eye to dfferent RGB components of color s dfferent, and the human eye s most senstve to red, followed by green and blue. Therefore, the algorthm changes lower two bts of the font color of G components and lower two bts of B components to acheve the watermarkng embeddng. By usng ths algorthm, though each two characters can be embedded wth a watermarkng byte wthout calculatng error correcton codng at the expense of a certan capacty, the mperceptblty can be better protected Pretreatment In order to enhance the robustness and securty of the watermarkng nformaton, t needs encryptng and error correcton codng before beng embedded. Take transmttng the electrcty bargan prce of electrc power system for example, where the watermarkng nformaton s the sender s nformaton State Grd Tel0000. The watermarkng nformaton and the key to be embedded are converted nto bnary sequences ww 2w3 wn = { } K kk2k3 km = { } w 0,, n (6) k 0,, m (7) A one-to-one crcular modulo encrypton method s used to obtan a new watermarkng sequence: M mmm (8) = 2 3 mn m = w k n ( mod m) Take advantage of the Hammng code aaaaaaa 2 0to encode the encrypted watermarkng sequence. S, S2, S 3 represents the correcton factor n the supervsory relatonshp. Table 2 shows that when mod 4 = 0, a new bnary sequences s generated: where t 7* l /4 H = hhh 2 3 ht, (9) = { } h 0,, t Table. Error correctng codes and wrong code poston correspondng relaton table. Fault code S, S2, S3 poston 00 a0 0 4 S, S, S 2 3 Fault code poston a 00 a 0 a5 00 a2 a6 0 a3 000 none 333

4 Table 2. Informaton bts and supervson bt correspondence table. nformaton supervson bt bt aaaa 2 0 aaa nformaton supervson bt bt aaaa aaa aaaa aaa 2 0 aaaa aaa atermarkng Embedded ) In order to make the poston where the watermarkng nformaton s embedded random to prevent the attackers from gettng the watermarkng nformaton, Lnear Congruence Generator (LCG) s employed. Pre-embeddng space D of a text s calculated, and the RGB values of all the characters are changed to (0,0,0), the most common used color n ord. The Lnear Congruence Generator s used to generate the pseudo random sequence { y j }, j =, 2, 3 t The basc Lnear Congruence Generator teratve formula s: y = n ( a* y + n c)mod m ( m > + 0), (0) y [0, m ] 0 where y 0 s the seed, a s known as the multpler, c s the ncrement and m s the modulus. The currently generated random number, y n+,depends only on the prevous one, y n,when the values of a, c and m are gven. 2) Step : Traverse the word text and, for the character j ( j <N), t s embedded wth watermarkng nterval dentfer sgnsart. RGB values are modfed to (,3,3) and (,3,4) respectvely. Step 2: Select character j. If j <N, go to step 5; Otherwse, judge nterval dentfer. If the dentfer embeddng has been completed, go to step 3. Otherwse, go to step ; Step 3: If h =, set the RGB value of the current character to (,,); set the RGB value of the next character to (,,2); If h = 0, set the RGB value of the current character to (,2,2); set the RGB value of the next character to (,2,3); Step 4: Repeat step -3 to embed watermarkng nformaton. Step 5: Complete the embeddng watermarkng nformaton and save the text atermarkng Detecton Step : Input key and convert t nto bnary sequence K ; Step 2: Traverses the text and fnd where of the RGB value of font color s modfed. Accordng to the rules of embeddng, extract 0, and obtan the bnary sequence S ; Step 3: Sequence S s decoded and corrected to get the bnary sequence M ; f mod 7 = 0, calculate correcton factor. If each bt of the three-bt correcton factor s 0, the watermarkng has not been tampered. If other values are obtaned, fnd where the content s tampered, make a wrong code corrected and remove supervson bt. Step 4: Cycle modulus s operated on Key K and the bnary sequence M to get bnary sequence of watermarkng and convert t to obtan the watermarkng sgnal Robust atermarkng Algorthm Based on Changng Character Spacng to Embed atermarkng Informaton Ths algorthm s desgned for covert communcaton of fle contents whch requres hgh robustness and suffcent capacty for hdden nformaton, hgh mperceptblty and safety. Therefore, watermarkng algorthm based on changng the character spacng s chosen as a robust algorthm used n power system. Based on HVS, the changes n character spacng should not exceed the threshold Pretreatment The pretreatment method s the same as s used n the algorthm based on changng the RGB values of character. But here the hdden message s electrcty bargan prce: 0000YUAN atermarkng Embedded ) The lnear congruence method s used to make the poston where the watermarkng nformaton s embedded random, text character spacng s unfed and s set to no. In order to prevent the character spacng from beng modfed whch wll cause lne overflow n the text, bndng two adjacent characters, and ndentng and wdenng ther spacng respectvely are used. 2) Step : Traverse the word text and, for the character j (j<n), t s embedded wth watermarkng nterval dentfcaton sgnsart. Here the character spacng s ncreased by 0. pounds, the next character spacng s decreased by 0. pounds. Step 2: Select character j. If j <N, go to step 5; Otherwse, judge nterval. If the dentty embeddng 334

5 dentfcaton has been completed, go to step 3. Otherwse, go to Step ; Step 3: If h =, set the current character spacng to ncrease by 0.05 pounds; set the next character spacng to reduce by 0.05 pounds; If h = 0, set the current character spacng to ncrease by 0.5 pounds; set the next character spacng to reduce by 0.5 pounds; Step 4: Repeat step -3 to embed watermarkng nformaton. Step 5: Complete the embeddng watermarkng nformaton and save the text atermarkng Detecton The watermarkng detecton method s the same as s used n the algorthm based on changng the RGB values of character. 5. Expermental Results and Analyss For both algorthms, watermarkng embeddng and extracton experments are made to verfy whether the change of text n vsual happens after the embedded watermarkng nformaton s embedded nto t, and check whether watermarkng nformaton can be extracted correctly. Through attack experments, robustness of both algorthms s tested. 5.. atermarkng Embeddng and Extractng Experment The algorthm based on changng character RGB values of color s tested by embeddng experment, and the watermarkng nformaton s State Grd Tel0000, whle the algorthm based on changng character spacng s also tested by embeddng experment, and the watermarkng nformaton s electrcty bargan prce: 0000YUAN.Both of the keys are 223. By extractng test, all watermarkng nformaton can be extracted correctly on the texts wthout sufferng attacks. And through the vsual, t s mpossble to fnd the text has been modfed after beng embedded watermarkng nformaton. Fg. 2. Text after embeddng watermarkng nformaton Attack Experment The purpose of dgtal watermarkng attack s desgned to make t mpossble to detect and extract watermarkng nformaton correctly. The robustness of watermarkng algorthm can be determned by checkng whether the watermarkng nformaton can be detected and extracted correctly after beng attacked. The texts embedded wth watermarkng nformaton are tested by attack experments. Repeat the test to prevent from generatng a rght result by chance. ) Attack based on the format. The text format attrbutes s changed n dfferent degree. a) Based on changng the RGB values of font color. Color attack on text, wholly or randomly, shows a weak robustness. But color attack on parts of the texts and any other attack on the texts show a strong robustness. And watermarkng nformaton can be detected and extracted correctly. b) Based on changng character spacng. Character spacng attack on whole texts show a weak robustness. But character spacng attack on parts of the texts and any other attack on the texts show a strong robustness. And watermarkng nformaton can be detected and extracted correctly. 2) Attack based on the content. Delete and paste operatons on text content n varyng degrees. a) Based on changng the RGB values of font color. Senstve to the tampered text content. b) Based on changng character spacng. Have a strong robustness and be able to resst attacks. 3) The Fg. 3 shows that f ether the text content or the font color changes, watermarkng algorthm based on changng RGB values of font color can accurately determne the specfc postons where the watermarkng bts are damaged to acheve content certfcaton. Fg.. The orgnal text. Fg. 3. Postonng the tampered content. 335

6 The expermental results show that the watermarkng algorthm based on changng the RGB value of font color show a poor robustness when the content s tampered, and can accurately poston the changed contents and characters whose color are changed so that the recever can dentfy whether the text has been tampered whch can effectvely acheve the content authentcaton. The algorthm based on changng character spacng has a strong robustness and can resst varous formats and contend attacks except attacks wth changng character spacng. It won t lower text qualty and s an effectve algorthm wth strong robustness whch can be used to hde electrc power nformaton. Through dgtal watermarkng system composed of two above mentoned algorthms, when the text s edted or suffers from other damages, the electrcty bargan prce can be stll extracted, and the dentty of the sender can also be confrmed whch helps to confrm the authentcty of texts. The combnaton of multple watermarkng algorthm may be, to some extents, complementary when texts suffer from attacks, and can acheve varous purposes, whch makes up for the weakness of a sngle watermarkng algorthm Algorthm Performance Analyss The most mportant performance features of dgtal watermarkng technology are capacty, robustness, mperceptblty, securty and so on whch determne whether the watermarkng algorthm has a practcal value. ) Robustness analyss. a) Algorthm based on changng RGB values of font color to embed watermarkng nformaton can resst basc format attacks, but shows a poor robustness when the content s tampered. It can be used for effectve content authentcaton of texts. Once the text content s malcously modfed, t wll be hard to extract watermarkng correctly. b) Algorthm based on changng character spacng to embed algorthm watermarkng nformaton has a very strong robustness, and t can resst format and content attacks. As for the credble transmsson of electronc text n power system, t provdes an effectve protecton to resst the malcously tamperng. 2) Capacty analyss. Both watermarkng algorthms are usng (7,4) Hammng code. Each of the 7 code words contans 4-bt nformaton and 3-bt supervson. It can detect two fault codes and correct an error code. atermarkng algorthm based on font color to code modfed lower two bts of G and B component respectvely to embed watermarkng nformaton, therefore, a character can be embedded wth four-bt nformaton. Though the use of error correcton codng affects the capacty, the algorthm stll has a large capacty. atermarkng algorthm based on the character spacng to code. Through the theoretcal analyss, P=N (P s the total capacty provded for loadng watermarkng nformaton nto the text, N s the number of characters of the text), so the number of bts of watermarkng nformaton s consstent wth that of characters. Although, n order to mprove the robustness and securty, error correcton codng s ntroduced at the expense of certan data capacty, the requrement of embeddng capacty of watermarkng nformaton s enough. 3) Imperceptblty analyss. Both algorthms are desgned based on human vsual system. The changed values are wthn the thresholds where the changes are ndscernble by naked eye. In prncple, the algorthms have very hgh mperceptblty. Through embeddng watermarkng nformaton experments, t can be seen that the text doesn t be changed or be degraded vsually. 4) Securty analyss. The two algorthm uses encrypton algorthm to encrypt the watermarkng nformaton. Even f the attacker knows the watermarkng embeddng algorthm, watermarkng nformaton would not be completely obtaned wthout the key. And t embeds the nformaton n the random place whch makes t much harder for rvals to attack t. Through the above performance analyss, the proposed multple text watermarkng algorthm can acheve convert communcaton of mportant nformaton and content authentcaton n power system by takng advantage of the combnaton of two dfferent text watermarkng algorthms. 6. Conclusons Dgtal watermarkng technology can effectvely acheve covert communcaton and content authentcaton. The robust watermarkng and the sem-fragle watermarkng algorthm are used for text transmsson of electrc power system and can hde electrcty bargan prce effectvely n the transmsson to resst all knds of attacks n the transmsson. The sem-fragle watermarkng algorthm s used to authentcate the sender, whch can ncrease the trust between the sender and recever. Expermental results show that the use of multple watermarks technology can effectvely resst attacks for dfferent purposes, protect the data n many ways and mprove the securty of the data. Electrc power ndustry s the natonal pllar ndustry and, wth the mprovement of normalzaton level n the electrc power system, nformaton securty has emerges gradually. th the development of dgtal watermarkng, dgtal watermarkng technology wll have a broad applcaton space n the power system securty feld as an effectve technque to solve the problem of nformaton securty. 336

7 References []. Junj u, Sheng Q, Jfeng He, et al., Applcaton of wavelet-based dgtal watermarkng n power system nformaton securty, Electrc Power Automaton Equpment, Vol. 24, Issue 2, 2004, pp [2]. Yuancheng L, Xaole ang, Technology of dgtal rdgelet transform watermarkng n electrc power system, Electrc Power Informaton Technology, Vol. 5, Issue 0, 2007, pp [3]. C. Yn, L. L, A. Lv, et al., Technology of dgtal vdeo watermarkng n electrc power system, Relay, No. 20, 2007, pp [4]. Ronghu Tu, Jyng Zhao, A sem-fragle audo watermarkng scheme based on dgtal wavelet transform and quantzaton and ts applcaton n power system, Transactons of the Chnese Socety of Electrcal Engneerng, Vol. 25, No. 2, 2005, pp [5]. S. Zhu, J. Lu, An adaptve watermarkng-quantfyng algorthm for 3-D meshs model of ultra hgh voltage equpment, Transactons of Chna Electrotechncal Socety, No. 2, 20. [6]. S. Zhu, J. Lu, Electrc power equpment 3D mesh model adaptve robust watermarkng algorthm, Transactons of Chna Electrotechncal Socety, No. 2, 20, 029. [7].. Xanpe, Y. enxa,. Quande, Applcaton of dgtal watermarkng technque to credble delvery of texts n power systems, Automaton of Electrc Power Systems, Vol. 26, Issue 8, 2002, pp [8]. S. H. Low, N. F. Maxemchuk, Performance comparson of two text markng methods, IEEE Journal on Selected Areas n Communcatons, Vo. 6, Issue 4, 998, pp [9]. K. T. Ahern, Invsble encodng of attrbute data n character based texts and fles: European Patent EP 4540, [0] M. J. Atallah, V. Raskn, C. F. Hempelmann, et al. Natural language watermarkng and tamperproofng, Informaton Hdng, Lecture Notes n Computer Scence, Vol. 2578, 2003, pp []. Z. Yu, X. Lu, A new dgtal watermarkng scheme based on text, n Proceedngs of the Internatonal Conference on Multmeda Informaton Networkng and Securty MINES 09, Vol. 2, 2009, pp [2]. B. Yang,. Sh,. Q, et al., Methods and apparatus for embeddng and detectng dgtal watermarks n a text texts: U.S. Patent 8,07,29, [3]. X. Zhou, Z. ang,. Zhao, et al. Attack model of text watermarkng based on communcatons, n Proceedngs of the IEEE Internatonal Conference on Informaton Management, Innovaton Management and Industral Engneerng, Vol. 4, 2009, pp [4]. X. e, Sne-wave-based text watermarkng for ORD text, n Proceedngs of the IEEE Internatonal Conference on Computer and Informaton Applcaton (ICCIA), 200, pp [5]. J. T. Brassl, S. Low, N. F. Maxemchuk, Copyrght protecton for the electronc dstrbuton of text documents, n Proceedngs of the IEEE, Vol. 87, No. 7, pp Copyrght, Internatonal Frequency Sensor Assocaton (IFSA). All rghts reserved. ( 337

A Robust Webpage Information Hiding Method Based on the Slash of Tag

A Robust Webpage Information Hiding Method Based on the Slash of Tag Advanced Engneerng Forum Onlne: 2012-09-26 ISSN: 2234-991X, Vols. 6-7, pp 361-366 do:10.4028/www.scentfc.net/aef.6-7.361 2012 Trans Tech Publcatons, Swtzerland A Robust Webpage Informaton Hdng Method Based

More information

Cluster Analysis of Electrical Behavior

Cluster Analysis of Electrical Behavior Journal of Computer and Communcatons, 205, 3, 88-93 Publshed Onlne May 205 n ScRes. http://www.scrp.org/ournal/cc http://dx.do.org/0.4236/cc.205.350 Cluster Analyss of Electrcal Behavor Ln Lu Ln Lu, School

More information

Hybrid Non-Blind Color Image Watermarking

Hybrid Non-Blind Color Image Watermarking Hybrd Non-Blnd Color Image Watermarkng Ms C.N.Sujatha 1, Dr. P. Satyanarayana 2 1 Assocate Professor, Dept. of ECE, SNIST, Yamnampet, Ghatkesar Hyderabad-501301, Telangana 2 Professor, Dept. of ECE, AITS,

More information

A Lossless Watermarking Scheme for Halftone Image Authentication

A Lossless Watermarking Scheme for Halftone Image Authentication IJCSNS Internatonal Journal of Computer Scence and Network Securty, VOL.6 No.2B, February 2006 147 A Lossless Watermarkng Scheme for Halftone Image Authentcaton Jeng-Shyang Pan, Hao Luo, and Zhe-Mng Lu,

More information

Identify the Attack in Embedded Image with Steganalysis Detection Method by PSNR and RGB Intensity

Identify the Attack in Embedded Image with Steganalysis Detection Method by PSNR and RGB Intensity Internatonal Journal of Computer Systems (ISSN: 394-1065), Volume 03 Issue 07, July, 016 Avalable at http://www.jcsonlne.com/ Identfy the Attack n Embedded Image wth Steganalyss Detecton Method by PSNR

More information

Data Hiding and Image Authentication for Color-Palette Images

Data Hiding and Image Authentication for Color-Palette Images Data Hdng and Image Authentcaton for Color-Palette Images Chh-Yang Yn ( 殷志揚 ) and Wen-Hsang Tsa ( 蔡文祥 ) Department of Computer & Informaton Scence Natonal Chao Tung Unversty 00 Ta Hsueh Rd., Hsnchu, Tawan

More information

Improvement of Spatial Resolution Using BlockMatching Based Motion Estimation and Frame. Integration

Improvement of Spatial Resolution Using BlockMatching Based Motion Estimation and Frame. Integration Improvement of Spatal Resoluton Usng BlockMatchng Based Moton Estmaton and Frame Integraton Danya Suga and Takayuk Hamamoto Graduate School of Engneerng, Tokyo Unversty of Scence, 6-3-1, Nuku, Katsuska-ku,

More information

Semi-Fragile Watermarking Scheme for Authentication of JPEG Images

Semi-Fragile Watermarking Scheme for Authentication of JPEG Images Tamkang Journal of Scence and Engneerng, Vol. 10, No 1, pp. 5766 (2007) 57 Sem-Fragle Watermarkng Scheme for Authentcaton of JPEG Images Chh-Hung n 1 *, Tung-Shh Su 2 and Wen-Shyong Hseh 2,3 1 Department

More information

Security Vulnerabilities of an Enhanced Remote User Authentication Scheme

Security Vulnerabilities of an Enhanced Remote User Authentication Scheme Contemporary Engneerng Scences, Vol. 7, 2014, no. 26, 1475-1482 HIKARI Ltd, www.m-hkar.com http://dx.do.org/10.12988/ces.2014.49186 Securty Vulnerabltes of an Enhanced Remote User Authentcaton Scheme Hae-Soon

More information

Information Hiding Watermarking Detection Technique by PSNR and RGB Intensity

Information Hiding Watermarking Detection Technique by PSNR and RGB Intensity www..org 3 Informaton Hdng Watermarkng Detecton Technque by PSNR and RGB Intensty 1 Neha Chauhan, Akhlesh A. Waoo, 3 P. S. Patheja 1 Research Scholar, BIST, Bhopal, Inda.,3 Assstant Professor, BIST, Bhopal,

More information

Robust Blind Video Watermark Algorithm in Transform Domain Combining with 3D Video Correlation

Robust Blind Video Watermark Algorithm in Transform Domain Combining with 3D Video Correlation JOURNAL OF MULTIMEDIA, VOL. 8, NO. 2, APRIL 2013 161 Robust Blnd Vdeo Watermark Algorthm n Transform Doman Combnng wth 3D Vdeo Correlaton DING Ha-yang 1,3 1. Informaton Securty Center, Bejng Unversty of

More information

An Optimal Algorithm for Prufer Codes *

An Optimal Algorithm for Prufer Codes * J. Software Engneerng & Applcatons, 2009, 2: 111-115 do:10.4236/jsea.2009.22016 Publshed Onlne July 2009 (www.scrp.org/journal/jsea) An Optmal Algorthm for Prufer Codes * Xaodong Wang 1, 2, Le Wang 3,

More information

Key-Selective Patchwork Method for Audio Watermarking

Key-Selective Patchwork Method for Audio Watermarking Internatonal Journal of Dgtal Content Technology and ts Applcatons Volume 4, Number 4, July 2010 Key-Selectve Patchwork Method for Audo Watermarkng 1 Ch-Man Pun, 2 Jng-Jng Jang 1, Frst and Correspondng

More information

Related-Mode Attacks on CTR Encryption Mode

Related-Mode Attacks on CTR Encryption Mode Internatonal Journal of Network Securty, Vol.4, No.3, PP.282 287, May 2007 282 Related-Mode Attacks on CTR Encrypton Mode Dayn Wang, Dongda Ln, and Wenlng Wu (Correspondng author: Dayn Wang) Key Laboratory

More information

A Secured Method for Image Steganography Based On Pixel Values

A Secured Method for Image Steganography Based On Pixel Values A Secured Method for Image Steganography Based On Pxel Values Tarun Gulat #, Sanskrt Gupta * # Assocate Professor, Electroncs and Communcaton Engneerng Department, MMEC, M.M.U., Mullana, Ambala, Haryana,

More information

A NEW AUDIO WATERMARKING METHOD BASED

A NEW AUDIO WATERMARKING METHOD BASED A NEW AUDIO WATERMARKING METHOD BASED ON DISCRETE COSINE TRANSFORM WITH A GRAY IMAGE Mohammad Ibrahm Khan 1, Md. Iqbal Hasan Sarker 2, Kaushk Deb 3 and Md. Hasan Furhad 4 1,2,3 Department of Computer Scence

More information

Parallelism for Nested Loops with Non-uniform and Flow Dependences

Parallelism for Nested Loops with Non-uniform and Flow Dependences Parallelsm for Nested Loops wth Non-unform and Flow Dependences Sam-Jn Jeong Dept. of Informaton & Communcaton Engneerng, Cheonan Unversty, 5, Anseo-dong, Cheonan, Chungnam, 330-80, Korea. seong@cheonan.ac.kr

More information

An Image Fusion Approach Based on Segmentation Region

An Image Fusion Approach Based on Segmentation Region Rong Wang, L-Qun Gao, Shu Yang, Yu-Hua Cha, and Yan-Chun Lu An Image Fuson Approach Based On Segmentaton Regon An Image Fuson Approach Based on Segmentaton Regon Rong Wang, L-Qun Gao, Shu Yang 3, Yu-Hua

More information

Research and Application of Fingerprint Recognition Based on MATLAB

Research and Application of Fingerprint Recognition Based on MATLAB Send Orders for Reprnts to reprnts@benthamscence.ae The Open Automaton and Control Systems Journal, 205, 7, 07-07 Open Access Research and Applcaton of Fngerprnt Recognton Based on MATLAB Nng Lu* Department

More information

Performance Analysis of Data Hiding in MPEG-4 AAC Audio *

Performance Analysis of Data Hiding in MPEG-4 AAC Audio * TSINGHUA SCIENCE AND TECHNOLOGY ISSNll1007-0214ll07/21llpp55-61 Volume 14, Number 1, February 2009 Performance Analyss of Data Hdng n MPEG-4 AAC Audo * XU Shuzheng ( ) **, ZHANG Peng ( ), WANG Pengjun

More information

A Fast Content-Based Multimedia Retrieval Technique Using Compressed Data

A Fast Content-Based Multimedia Retrieval Technique Using Compressed Data A Fast Content-Based Multmeda Retreval Technque Usng Compressed Data Borko Furht and Pornvt Saksobhavvat NSF Multmeda Laboratory Florda Atlantc Unversty, Boca Raton, Florda 3343 ABSTRACT In ths paper,

More information

Shape-adaptive DCT and Its Application in Region-based Image Coding

Shape-adaptive DCT and Its Application in Region-based Image Coding Internatonal Journal of Sgnal Processng, Image Processng and Pattern Recognton, pp.99-108 http://dx.do.org/10.14257/sp.2014.7.1.10 Shape-adaptve DCT and Its Applcaton n Regon-based Image Codng Yamn Zheng,

More information

The Research of Ellipse Parameter Fitting Algorithm of Ultrasonic Imaging Logging in the Casing Hole

The Research of Ellipse Parameter Fitting Algorithm of Ultrasonic Imaging Logging in the Casing Hole Appled Mathematcs, 04, 5, 37-3 Publshed Onlne May 04 n ScRes. http://www.scrp.org/journal/am http://dx.do.org/0.436/am.04.584 The Research of Ellpse Parameter Fttng Algorthm of Ultrasonc Imagng Loggng

More information

Virtual Machine Migration based on Trust Measurement of Computer Node

Virtual Machine Migration based on Trust Measurement of Computer Node Appled Mechancs and Materals Onlne: 2014-04-04 ISSN: 1662-7482, Vols. 536-537, pp 678-682 do:10.4028/www.scentfc.net/amm.536-537.678 2014 Trans Tech Publcatons, Swtzerland Vrtual Machne Mgraton based on

More information

Content Based Image Retrieval Using 2-D Discrete Wavelet with Texture Feature with Different Classifiers

Content Based Image Retrieval Using 2-D Discrete Wavelet with Texture Feature with Different Classifiers IOSR Journal of Electroncs and Communcaton Engneerng (IOSR-JECE) e-issn: 78-834,p- ISSN: 78-8735.Volume 9, Issue, Ver. IV (Mar - Apr. 04), PP 0-07 Content Based Image Retreval Usng -D Dscrete Wavelet wth

More information

Enhanced AMBTC for Image Compression using Block Classification and Interpolation

Enhanced AMBTC for Image Compression using Block Classification and Interpolation Internatonal Journal of Computer Applcatons (0975 8887) Volume 5 No.0, August 0 Enhanced AMBTC for Image Compresson usng Block Classfcaton and Interpolaton S. Vmala Dept. of Comp. Scence Mother Teresa

More information

Specifications in 2001

Specifications in 2001 Specfcatons n 200 MISTY (updated : May 3, 2002) September 27, 200 Mtsubsh Electrc Corporaton Block Cpher Algorthm MISTY Ths document shows a complete descrpton of encrypton algorthm MISTY, whch are secret-key

More information

High Payload Reversible Data Hiding Scheme Using Difference Segmentation and Histogram Shifting

High Payload Reversible Data Hiding Scheme Using Difference Segmentation and Histogram Shifting JOURNAL OF ELECTRONIC SCIENCE AND TECHNOLOGY, VOL. 11, NO. 1, MARCH 2013 9 Hgh Payload Reversble Data Hdng Scheme Usng Dfference Segmentaton and Hstogram Shftng Yung-Chen Chou and Huang-Chng L Abstract

More information

A Hybrid Semi-Blind Gray Scale Image Watermarking Algorithm Based on DWT-SVD using Human Visual System Model

A Hybrid Semi-Blind Gray Scale Image Watermarking Algorithm Based on DWT-SVD using Human Visual System Model A Hybrd Sem-Blnd Gray Scale Image Watermarkng Algorthm Based on DWT-SVD usng Human Vsual System Model Rajesh Mehta r Scence & Engneerng, USICT Guru Gobnd Sngh Indrarprastha Unversty New Delh, Inda rajesh00ust@gmal.com

More information

Robust Shot Boundary Detection from Video Using Dynamic Texture

Robust Shot Boundary Detection from Video Using Dynamic Texture Sensors & Transducers 204 by IFSA Publshng, S. L. http://www.sensorsportal.com Robust Shot Boundary Detecton from Vdeo Usng Dynamc Teture, 3 Peng Tale, 2 Zhang Wenjun School of Communcaton & Informaton

More information

Robust and Reversible Relational Database Watermarking Algorithm Based on Clustering and Polar Angle Expansion

Robust and Reversible Relational Database Watermarking Algorithm Based on Clustering and Polar Angle Expansion Robust and Reversble Relatonal Database Watermarkng Algorthm Based on Clusterng and Polar Angle Expanson Zhyong L, Junmn Lu and Wecheng Tao College of Informaton Scence and Engneerng, Hunan Unversty, Changsha,

More information

Enhanced Watermarking Technique for Color Images using Visual Cryptography

Enhanced Watermarking Technique for Color Images using Visual Cryptography Informaton Assurance and Securty Letters 1 (2010) 024-028 Enhanced Watermarkng Technque for Color Images usng Vsual Cryptography Enas F. Al rawashdeh 1, Rawan I.Zaghloul 2 1 Balqa Appled Unversty, MIS

More information

Private Information Retrieval (PIR)

Private Information Retrieval (PIR) 2 Levente Buttyán Problem formulaton Alce wants to obtan nformaton from a database, but she does not want the database to learn whch nformaton she wanted e.g., Alce s an nvestor queryng a stock-market

More information

User Authentication Based On Behavioral Mouse Dynamics Biometrics

User Authentication Based On Behavioral Mouse Dynamics Biometrics User Authentcaton Based On Behavoral Mouse Dynamcs Bometrcs Chee-Hyung Yoon Danel Donghyun Km Department of Computer Scence Department of Computer Scence Stanford Unversty Stanford Unversty Stanford, CA

More information

A Fast Visual Tracking Algorithm Based on Circle Pixels Matching

A Fast Visual Tracking Algorithm Based on Circle Pixels Matching A Fast Vsual Trackng Algorthm Based on Crcle Pxels Matchng Zhqang Hou hou_zhq@sohu.com Chongzhao Han czhan@mal.xjtu.edu.cn Ln Zheng Abstract: A fast vsual trackng algorthm based on crcle pxels matchng

More information

Robust Watermarking for Text Images Based on Arnold Scrambling and DWT-DCT

Robust Watermarking for Text Images Based on Arnold Scrambling and DWT-DCT Internatonal Conference on Mechatroncs Electronc Industral and Control Engneerng (MEIC 015) Robust Watermarkng for Text Images Based on Arnold Scramblng and DWT-DCT Fan Wu College of Informaton Scence

More information

Concurrent Apriori Data Mining Algorithms

Concurrent Apriori Data Mining Algorithms Concurrent Apror Data Mnng Algorthms Vassl Halatchev Department of Electrcal Engneerng and Computer Scence York Unversty, Toronto October 8, 2015 Outlne Why t s mportant Introducton to Assocaton Rule Mnng

More information

A Binarization Algorithm specialized on Document Images and Photos

A Binarization Algorithm specialized on Document Images and Photos A Bnarzaton Algorthm specalzed on Document mages and Photos Ergna Kavalleratou Dept. of nformaton and Communcaton Systems Engneerng Unversty of the Aegean kavalleratou@aegean.gr Abstract n ths paper, a

More information

A Comparison between Digital Images Watermarking in Tow Different Color Spaces Using DWT2*

A Comparison between Digital Images Watermarking in Tow Different Color Spaces Using DWT2* A Comparson between Dgtal s ng n Tow Dfferent Color Spaces Usng DWT* Mehd Khall Natonal Academy of Scence of Armena Yerevan, Armena e-mal: khall.mehd@yahoo.com ABSTRACT A novel dgtal watermarkng for ownershp

More information

KEYWORDS: Digital Image Watermarking, Discrete Wavelet Transform, General Regression Neural Network, Human Visual System. 1.

KEYWORDS: Digital Image Watermarking, Discrete Wavelet Transform, General Regression Neural Network, Human Visual System. 1. An Adaptve Dgtal Image Watermarkng Based on Image Features n Dscrete Wavelet Transform Doman and General Regresson Neural Network Ayoub Taher Group of IT Engneerng, Payam Noor Unversty, Broujen, Iran ABSTRACT:

More information

FEATURE EXTRACTION. Dr. K.Vijayarekha. Associate Dean School of Electrical and Electronics Engineering SASTRA University, Thanjavur

FEATURE EXTRACTION. Dr. K.Vijayarekha. Associate Dean School of Electrical and Electronics Engineering SASTRA University, Thanjavur FEATURE EXTRACTION Dr. K.Vjayarekha Assocate Dean School of Electrcal and Electroncs Engneerng SASTRA Unversty, Thanjavur613 41 Jont Intatve of IITs and IISc Funded by MHRD Page 1 of 8 Table of Contents

More information

Using Counter-propagation Neural Network for Digital Audio Watermarking

Using Counter-propagation Neural Network for Digital Audio Watermarking Usng Counter-propagaton Neural Network for Dgtal Audo Watermarkng Chuan-Yu Chang and Wen-Chh Shen Graduate School of Computer Scence and Informaton Engneerng Natonal Yunln Unversty of Scence & Technology

More information

Research Article High Capacity Reversible Watermarking for Audio by Histogram Shifting and Predicted Error Expansion

Research Article High Capacity Reversible Watermarking for Audio by Histogram Shifting and Predicted Error Expansion e Scentfc World Journal, Artcle ID 656251, 7 pages http://dx.do.org/1.1155/214/656251 Research Artcle Hgh Capacty Reversble Watermarkng for Audo by Hstogram Shftng and Predcted Error Expanson Fe Wang,

More information

An Improved User Authentication and Key Agreement Scheme Providing User Anonymity

An Improved User Authentication and Key Agreement Scheme Providing User Anonymity 35 JOURNAL OF ELECTRONIC SCIENCE AND TECHNOLOGY, VOL. 9, NO. 4, DECEMBER 0 An Improved User Authentcaton and Key Agreement Scheme Provdng User Anonymty Ya-Fen Chang and Pe-Yu Chang Abstract When accessng

More information

SLAM Summer School 2006 Practical 2: SLAM using Monocular Vision

SLAM Summer School 2006 Practical 2: SLAM using Monocular Vision SLAM Summer School 2006 Practcal 2: SLAM usng Monocular Vson Javer Cvera, Unversty of Zaragoza Andrew J. Davson, Imperal College London J.M.M Montel, Unversty of Zaragoza. josemar@unzar.es, jcvera@unzar.es,

More information

TECHNIQUE OF FORMATION HOMOGENEOUS SAMPLE SAME OBJECTS. Muradaliyev A.Z.

TECHNIQUE OF FORMATION HOMOGENEOUS SAMPLE SAME OBJECTS. Muradaliyev A.Z. TECHNIQUE OF FORMATION HOMOGENEOUS SAMPLE SAME OBJECTS Muradalyev AZ Azerbajan Scentfc-Research and Desgn-Prospectng Insttute of Energetc AZ1012, Ave HZardab-94 E-mal:aydn_murad@yahoocom Importance of

More information

An Image Compression Algorithm based on Wavelet Transform and LZW

An Image Compression Algorithm based on Wavelet Transform and LZW An Image Compresson Algorthm based on Wavelet Transform and LZW Png Luo a, Janyong Yu b School of Chongqng Unversty of Posts and Telecommuncatons, Chongqng, 400065, Chna Abstract a cylpng@63.com, b y27769864@sna.cn

More information

A new remote user authentication scheme for multi-server architecture

A new remote user authentication scheme for multi-server architecture Future Generaton Computer Systems 19 (2003) 13 22 A new remote user authentcaton scheme for mult-server archtecture Iuon-Chang Ln a, Mn-Shang Hwang b,, L-Hua L b a Department of Computer Scence and Informaton

More information

Professional competences training path for an e-commerce major, based on the ISM method

Professional competences training path for an e-commerce major, based on the ISM method World Transactons on Engneerng and Technology Educaton Vol.14, No.4, 2016 2016 WIETE Professonal competences tranng path for an e-commerce maor, based on the ISM method Ru Wang, Pn Peng, L-gang Lu & Lng

More information

A mathematical programming approach to the analysis, design and scheduling of offshore oilfields

A mathematical programming approach to the analysis, design and scheduling of offshore oilfields 17 th European Symposum on Computer Aded Process Engneerng ESCAPE17 V. Plesu and P.S. Agach (Edtors) 2007 Elsever B.V. All rghts reserved. 1 A mathematcal programmng approach to the analyss, desgn and

More information

Secure and Fast Fingerprint Authentication on Smart Card

Secure and Fast Fingerprint Authentication on Smart Card SETIT 2005 3 rd Internatonal Conference: Scences of Electronc, Technologes of Informaton and Telecommuncatons March 27-31, 2005 TUNISIA Secure and Fast Fngerprnt Authentcaton on Smart Card Y. S. Moon*,

More information

Audio Content Classification Method Research Based on Two-step Strategy

Audio Content Classification Method Research Based on Two-step Strategy (IJACSA) Internatonal Journal of Advanced Computer Scence and Applcatons, Audo Content Classfcaton Method Research Based on Two-step Strategy Sume Lang Department of Computer Scence and Technology Chongqng

More information

A Clustering Algorithm for Key Frame Extraction Based on Density Peak

A Clustering Algorithm for Key Frame Extraction Based on Density Peak Journal of Computer and Communcatons, 2018, 6, 118-128 http://www.scrp.org/ournal/cc ISSN Onlne: 2327-5227 ISSN Prnt: 2327-5219 A Clusterng Algorthm for Key Frame Extracton Based on Densty Peak Hong Zhao

More information

Robust Video Watermarking Using Image Normalization, Motion Vector and Perceptual Information

Robust Video Watermarking Using Image Normalization, Motion Vector and Perceptual Information Robust Vdeo Watermarkng Usng Image ormalzaton, Moton Vector and Perceptual Informaton Cedllo-Hernández Antono 1, Cedllo-Hernández Manuel 1, akano-myatake Marko 1, García-Vázquez Mreya S. 2 1 Postgraduate

More information

TN348: Openlab Module - Colocalization

TN348: Openlab Module - Colocalization TN348: Openlab Module - Colocalzaton Topc The Colocalzaton module provdes the faclty to vsualze and quantfy colocalzaton between pars of mages. The Colocalzaton wndow contans a prevew of the two mages

More information

Solving two-person zero-sum game by Matlab

Solving two-person zero-sum game by Matlab Appled Mechancs and Materals Onlne: 2011-02-02 ISSN: 1662-7482, Vols. 50-51, pp 262-265 do:10.4028/www.scentfc.net/amm.50-51.262 2011 Trans Tech Publcatons, Swtzerland Solvng two-person zero-sum game by

More information

Adaptive digital watermarking of images using Genetic Algorithm

Adaptive digital watermarking of images using Genetic Algorithm Adaptve dgtal watermarkng of mages usng Genetc Algorthm Bushra Skander, Muhammad Ishtaq, M. Arfan Jaffar, Muhammad Tarq, Anwar M. Mrza Department of Computer Scence, Natonal Unversty of Computer and Emergng

More information

MULTISPECTRAL IMAGES CLASSIFICATION BASED ON KLT AND ATR AUTOMATIC TARGET RECOGNITION

MULTISPECTRAL IMAGES CLASSIFICATION BASED ON KLT AND ATR AUTOMATIC TARGET RECOGNITION MULTISPECTRAL IMAGES CLASSIFICATION BASED ON KLT AND ATR AUTOMATIC TARGET RECOGNITION Paulo Quntlano 1 & Antono Santa-Rosa 1 Federal Polce Department, Brasla, Brazl. E-mals: quntlano.pqs@dpf.gov.br and

More information

Security Enhanced Dynamic ID based Remote User Authentication Scheme for Multi-Server Environments

Security Enhanced Dynamic ID based Remote User Authentication Scheme for Multi-Server Environments Internatonal Journal of u- and e- ervce, cence and Technology Vol8, o 7 0), pp7-6 http://dxdoorg/07/unesst087 ecurty Enhanced Dynamc ID based Remote ser Authentcaton cheme for ult-erver Envronments Jun-ub

More information

Cracking of the Merkle Hellman Cryptosystem Using Genetic Algorithm

Cracking of the Merkle Hellman Cryptosystem Using Genetic Algorithm Crackng of the Merkle Hellman Cryptosystem Usng Genetc Algorthm Zurab Kochladze 1 * & Lal Besela 2 1 Ivane Javakhshvl Tbls State Unversty, 1, I.Chavchavadze av 1, 0128, Tbls, Georga 2 Sokhum State Unversty,

More information

Network Coding as a Dynamical System

Network Coding as a Dynamical System Network Codng as a Dynamcal System Narayan B. Mandayam IEEE Dstngushed Lecture (jont work wth Dan Zhang and a Su) Department of Electrcal and Computer Engneerng Rutgers Unversty Outlne. Introducton 2.

More information

Article Reversible Dual-Image-Based Hiding Scheme Using Block Folding Technique

Article Reversible Dual-Image-Based Hiding Scheme Using Block Folding Technique Artcle Reversble Dual-Image-Based Hdng Scheme Usng Block Foldng Technque Tzu-Chuen Lu, * and Hu-Shh Leng Department of Informaton Management, Chaoyang Unversty of Technology, Tachung 4349, Tawan Department

More information

A high precision collaborative vision measurement of gear chamfering profile

A high precision collaborative vision measurement of gear chamfering profile Internatonal Conference on Advances n Mechancal Engneerng and Industral Informatcs (AMEII 05) A hgh precson collaboratve vson measurement of gear chamferng profle Conglng Zhou, a, Zengpu Xu, b, Chunmng

More information

Modular PCA Face Recognition Based on Weighted Average

Modular PCA Face Recognition Based on Weighted Average odern Appled Scence odular PCA Face Recognton Based on Weghted Average Chengmao Han (Correspondng author) Department of athematcs, Lny Normal Unversty Lny 76005, Chna E-mal: hanchengmao@163.com Abstract

More information

Determining the Optimal Bandwidth Based on Multi-criterion Fusion

Determining the Optimal Bandwidth Based on Multi-criterion Fusion Proceedngs of 01 4th Internatonal Conference on Machne Learnng and Computng IPCSIT vol. 5 (01) (01) IACSIT Press, Sngapore Determnng the Optmal Bandwdth Based on Mult-crteron Fuson Ha-L Lang 1+, Xan-Mn

More information

Fast Computation of Shortest Path for Visiting Segments in the Plane

Fast Computation of Shortest Path for Visiting Segments in the Plane Send Orders for Reprnts to reprnts@benthamscence.ae 4 The Open Cybernetcs & Systemcs Journal, 04, 8, 4-9 Open Access Fast Computaton of Shortest Path for Vstng Segments n the Plane Ljuan Wang,, Bo Jang

More information

Problem Definitions and Evaluation Criteria for Computational Expensive Optimization

Problem Definitions and Evaluation Criteria for Computational Expensive Optimization Problem efntons and Evaluaton Crtera for Computatonal Expensve Optmzaton B. Lu 1, Q. Chen and Q. Zhang 3, J. J. Lang 4, P. N. Suganthan, B. Y. Qu 6 1 epartment of Computng, Glyndwr Unversty, UK Faclty

More information

Simulation Based Analysis of FAST TCP using OMNET++

Simulation Based Analysis of FAST TCP using OMNET++ Smulaton Based Analyss of FAST TCP usng OMNET++ Umar ul Hassan 04030038@lums.edu.pk Md Term Report CS678 Topcs n Internet Research Sprng, 2006 Introducton Internet traffc s doublng roughly every 3 months

More information

Available online at Available online at Advanced in Control Engineering and Information Science

Available online at   Available online at   Advanced in Control Engineering and Information Science Avalable onlne at wwwscencedrectcom Avalable onlne at wwwscencedrectcom Proceda Proceda Engneerng Engneerng 00 (2011) 15000 000 (2011) 1642 1646 Proceda Engneerng wwwelsevercom/locate/proceda Advanced

More information

Detecting MP3Stego using Calibrated Side Information Features

Detecting MP3Stego using Calibrated Side Information Features 2628 JOURNAL OF SOFTWARE, VOL. 8, NO. 10, OCTOBER 2013 Detectng P3Stego usng Calbrated Sde Informaton Features Xanmn Yu School of Informaton Scence and Engneerng, Nngbo Unversty Emal: mlhappy1016@163.com

More information

Research Article Hamming Code Based Watermarking Scheme for 3D Model Verification

Research Article Hamming Code Based Watermarking Scheme for 3D Model Verification Mathematcal Problems n Engneerng, Artcle ID 241093, 7 pages http://dx.do.org/10.1155/2014/241093 Research Artcle Hammng Code Based Watermarkng Scheme for 3D Model Verfcaton Jen-Tse Wang, 1 Y-Chng Chang,

More information

The stream cipher MICKEY-128 (version 1) Algorithm specification issue 1.0

The stream cipher MICKEY-128 (version 1) Algorithm specification issue 1.0 The stream cpher MICKEY-128 (verson 1 Algorthm specfcaton ssue 1. Steve Babbage Vodafone Group R&D, Newbury, UK steve.babbage@vodafone.com Matthew Dodd Independent consultant matthew@mdodd.net www.mdodd.net

More information

Improvement ofmanik et al. s remote user authentication scheme

Improvement ofmanik et al. s remote user authentication scheme Improvement ofmank et al. s remote user authentcaton scheme Abstract Jue-Sam Chou, a,yaln Chen b Jyun-Yu Ln c a Department of Informaton Management, Nanhua Unversty Chay, 622, Tawan schou@mal.nhu.edu.tw

More information

Positive Semi-definite Programming Localization in Wireless Sensor Networks

Positive Semi-definite Programming Localization in Wireless Sensor Networks Postve Sem-defnte Programmng Localzaton n Wreless Sensor etworks Shengdong Xe 1,, Jn Wang, Aqun Hu 1, Yunl Gu, Jang Xu, 1 School of Informaton Scence and Engneerng, Southeast Unversty, 10096, anjng Computer

More information

Tsinghua University at TAC 2009: Summarizing Multi-documents by Information Distance

Tsinghua University at TAC 2009: Summarizing Multi-documents by Information Distance Tsnghua Unversty at TAC 2009: Summarzng Mult-documents by Informaton Dstance Chong Long, Mnle Huang, Xaoyan Zhu State Key Laboratory of Intellgent Technology and Systems, Tsnghua Natonal Laboratory for

More information

IR-HARQ vs. Joint Channel-Network coding for Cooperative Wireless Communication

IR-HARQ vs. Joint Channel-Network coding for Cooperative Wireless Communication Cyber Journals: ultdscplnary Journals n Scence and Technology, Journal of Selected Areas n Telecommuncatons (JSAT), August Edton, 2 IR-HARQ vs. Jont Channel-Network codng for Cooperatve Wreless Communcaton

More information

Analysis on the Workspace of Six-degrees-of-freedom Industrial Robot Based on AutoCAD

Analysis on the Workspace of Six-degrees-of-freedom Industrial Robot Based on AutoCAD Analyss on the Workspace of Sx-degrees-of-freedom Industral Robot Based on AutoCAD Jn-quan L 1, Ru Zhang 1,a, Fang Cu 1, Q Guan 1 and Yang Zhang 1 1 School of Automaton, Bejng Unversty of Posts and Telecommuncatons,

More information

Load Balancing for Hex-Cell Interconnection Network

Load Balancing for Hex-Cell Interconnection Network Int. J. Communcatons, Network and System Scences,,, - Publshed Onlne Aprl n ScRes. http://www.scrp.org/journal/jcns http://dx.do.org/./jcns.. Load Balancng for Hex-Cell Interconnecton Network Saher Manaseer,

More information

Video Proxy System for a Large-scale VOD System (DINA)

Video Proxy System for a Large-scale VOD System (DINA) Vdeo Proxy System for a Large-scale VOD System (DINA) KWUN-CHUNG CHAN #, KWOK-WAI CHEUNG *# #Department of Informaton Engneerng *Centre of Innovaton and Technology The Chnese Unversty of Hong Kong SHATIN,

More information

IP Camera Configuration Software Instruction Manual

IP Camera Configuration Software Instruction Manual IP Camera 9483 - Confguraton Software Instructon Manual VBD 612-4 (10.14) Dear Customer, Wth your purchase of ths IP Camera, you have chosen a qualty product manufactured by RADEMACHER. Thank you for the

More information

Performance Evaluation of an ANFIS Based Power System Stabilizer Applied in Multi-Machine Power Systems

Performance Evaluation of an ANFIS Based Power System Stabilizer Applied in Multi-Machine Power Systems Performance Evaluaton of an ANFIS Based Power System Stablzer Appled n Mult-Machne Power Systems A. A GHARAVEISI 1,2 A.DARABI 3 M. MONADI 4 A. KHAJEH-ZADEH 5 M. RASHIDI-NEJAD 1,2,5 1. Shahd Bahonar Unversty

More information

Network Intrusion Detection Based on PSO-SVM

Network Intrusion Detection Based on PSO-SVM TELKOMNIKA Indonesan Journal of Electrcal Engneerng Vol.1, No., February 014, pp. 150 ~ 1508 DOI: http://dx.do.org/10.11591/telkomnka.v1.386 150 Network Intruson Detecton Based on PSO-SVM Changsheng Xang*

More information

Local Quaternary Patterns and Feature Local Quaternary Patterns

Local Quaternary Patterns and Feature Local Quaternary Patterns Local Quaternary Patterns and Feature Local Quaternary Patterns Jayu Gu and Chengjun Lu The Department of Computer Scence, New Jersey Insttute of Technology, Newark, NJ 0102, USA Abstract - Ths paper presents

More information

Wireless Sensor Network Localization Research

Wireless Sensor Network Localization Research Sensors & Transducers 014 by IFSA Publshng, S L http://wwwsensorsportalcom Wreless Sensor Network Localzaton Research Lang Xn School of Informaton Scence and Engneerng, Hunan Internatonal Economcs Unversty,

More information

Research in Algorithm of Image Processing Used in Collision Avoidance Systems

Research in Algorithm of Image Processing Used in Collision Avoidance Systems Sensors & Transducers, Vol 59, Issue, November 203, pp 330-336 Sensors & Transducers 203 by IFSA http://wwwsensorsportalcom Research n Algorthm of Image Processng Used n Collson Avodance Systems Hu Bn

More information

A Hybrid Digital Image Watermarking based on Discrete Wavelet Transform, Discrete Cosine Transform, and General Regression Neural Network

A Hybrid Digital Image Watermarking based on Discrete Wavelet Transform, Discrete Cosine Transform, and General Regression Neural Network A Hybrd Dgtal Image Watermarkng based on Dscrete Wavelet Transform, Dscrete Cosne Transform, and General Regresson Neural Network Ayoub Taher ; ABSTRACT In ths paper, a new hybrd dgtal watermarkng technque

More information

Subspace clustering. Clustering. Fundamental to all clustering techniques is the choice of distance measure between data points;

Subspace clustering. Clustering. Fundamental to all clustering techniques is the choice of distance measure between data points; Subspace clusterng Clusterng Fundamental to all clusterng technques s the choce of dstance measure between data ponts; D q ( ) ( ) 2 x x = x x, j k = 1 k jk Squared Eucldean dstance Assumpton: All features

More information

Skew Angle Estimation and Correction of Hand Written, Textual and Large areas of Non-Textual Document Images: A Novel Approach

Skew Angle Estimation and Correction of Hand Written, Textual and Large areas of Non-Textual Document Images: A Novel Approach Angle Estmaton and Correcton of Hand Wrtten, Textual and Large areas of Non-Textual Document Images: A Novel Approach D.R.Ramesh Babu Pyush M Kumat Mahesh D Dhannawat PES Insttute of Technology Research

More information

Straight Line Detection Based on Particle Swarm Optimization

Straight Line Detection Based on Particle Swarm Optimization Sensors & ransducers 013 b IFSA http://www.sensorsportal.com Straght Lne Detecton Based on Partcle Swarm Optmzaton Shengzhou XU, Jun IE College of computer scence, South-Central Unverst for Natonaltes,

More information

Quality Improvement Algorithm for Tetrahedral Mesh Based on Optimal Delaunay Triangulation

Quality Improvement Algorithm for Tetrahedral Mesh Based on Optimal Delaunay Triangulation Intellgent Informaton Management, 013, 5, 191-195 Publshed Onlne November 013 (http://www.scrp.org/journal/m) http://dx.do.org/10.36/m.013.5601 Qualty Improvement Algorthm for Tetrahedral Mesh Based on

More information

BANDWIDTH OPTIMIZATION OF INDIVIDUAL HOP FOR ROBUST DATA STREAMING ON EMERGENCY MEDICAL APPLICATION

BANDWIDTH OPTIMIZATION OF INDIVIDUAL HOP FOR ROBUST DATA STREAMING ON EMERGENCY MEDICAL APPLICATION ARPN Journal of Engneerng and Appled Scences 2006-2009 Asan Research Publshng Network (ARPN). All rghts reserved. BANDWIDTH OPTIMIZATION OF INDIVIDUA HOP FOR ROBUST DATA STREAMING ON EMERGENCY MEDICA APPICATION

More information

Term Weighting Classification System Using the Chi-square Statistic for the Classification Subtask at NTCIR-6 Patent Retrieval Task

Term Weighting Classification System Using the Chi-square Statistic for the Classification Subtask at NTCIR-6 Patent Retrieval Task Proceedngs of NTCIR-6 Workshop Meetng, May 15-18, 2007, Tokyo, Japan Term Weghtng Classfcaton System Usng the Ch-square Statstc for the Classfcaton Subtask at NTCIR-6 Patent Retreval Task Kotaro Hashmoto

More information

Fault Detection in Rule-Based Software Systems

Fault Detection in Rule-Based Software Systems Fault Detecton n Rule-Based Software Systems Dong Wang, Rubng Hao and Davd Lee Bell Labs Research Chna Bejng, Chna, 100080 {wangd, rbhao, leedavd}@lucent.com Abstract Motvated by packet flterng of frewall

More information

FPGA-based implementation of circular interpolation

FPGA-based implementation of circular interpolation Avalable onlne www.jocpr.com Journal of Chemcal and Pharmaceutcal Research, 04, 6(7):585-593 Research Artcle ISSN : 0975-7384 CODEN(USA) : JCPRC5 FPGA-based mplementaton of crcular nterpolaton Mngyu Gao,

More information

3D Virtual Eyeglass Frames Modeling from Multiple Camera Image Data Based on the GFFD Deformation Method

3D Virtual Eyeglass Frames Modeling from Multiple Camera Image Data Based on the GFFD Deformation Method NICOGRAPH Internatonal 2012, pp. 114-119 3D Vrtual Eyeglass Frames Modelng from Multple Camera Image Data Based on the GFFD Deformaton Method Norak Tamura, Somsangouane Sngthemphone and Katsuhro Ktama

More information

S1 Note. Basis functions.

S1 Note. Basis functions. S1 Note. Bass functons. Contents Types of bass functons...1 The Fourer bass...2 B-splne bass...3 Power and type I error rates wth dfferent numbers of bass functons...4 Table S1. Smulaton results of type

More information

Overview. Basic Setup [9] Motivation and Tasks. Modularization 2008/2/20 IMPROVED COVERAGE CONTROL USING ONLY LOCAL INFORMATION

Overview. Basic Setup [9] Motivation and Tasks. Modularization 2008/2/20 IMPROVED COVERAGE CONTROL USING ONLY LOCAL INFORMATION Overvew 2 IMPROVED COVERAGE CONTROL USING ONLY LOCAL INFORMATION Introducton Mult- Smulator MASIM Theoretcal Work and Smulaton Results Concluson Jay Wagenpfel, Adran Trachte Motvaton and Tasks Basc Setup

More information

Query Clustering Using a Hybrid Query Similarity Measure

Query Clustering Using a Hybrid Query Similarity Measure Query clusterng usng a hybrd query smlarty measure Fu. L., Goh, D.H., & Foo, S. (2004). WSEAS Transacton on Computers, 3(3), 700-705. Query Clusterng Usng a Hybrd Query Smlarty Measure Ln Fu, Don Hoe-Lan

More information

Research on Categorization of Animation Effect Based on Data Mining

Research on Categorization of Animation Effect Based on Data Mining MATEC Web of Conferences 22, 0102 0 ( 2015) DOI: 10.1051/ matecconf/ 2015220102 0 C Owned by the authors, publshed by EDP Scences, 2015 Research on Categorzaton of Anmaton Effect Based on Data Mnng Na

More information

Distortion Function Designing for JPEG Steganography with Uncompressed Side-image

Distortion Function Designing for JPEG Steganography with Uncompressed Side-image Dstorton Functon Desgnng for JPEG Steganography wth Uncompressed Sde-mage Fangjun Huang School of Informaton Scence and Technology, Sun Yat-Sen Unversty, GD 56, Chna huangfj@mal.sysu.edu.cn Jwu Huang School

More information