Adaptive digital watermarking of images using Genetic Algorithm

Size: px
Start display at page:

Download "Adaptive digital watermarking of images using Genetic Algorithm"

Transcription

1 Adaptve dgtal watermarkng of mages usng Genetc Algorthm Bushra Skander, Muhammad Ishtaq, M. Arfan Jaffar, Muhammad Tarq, Anwar M. Mrza Department of Computer Scence, Natonal Unversty of Computer and Emergng Scences, A. K. Broh Road, H-/4, Islamabad, Pakstan. {bushra.skander, m.shtaq, arfan.jaffar, m.tarq, Abstract- Ths paper presents a new method for adaptve watermark strength optmzaton n Dscrete Cosne Transform (DCT) doman. Watermarkng s a method to embed secret nformaton n the host medum. Optmal strength selecton for watermark s the most crtcal aspect n the whole process and t had attracted many researchers n the recent past. In the proposed method watermark strength s ntellgently selected through Genetc Algorthm (GA). GA helps n perceptual shapng of the watermark such that t s less percevable to the human vsual system. Proposed method shows promsng results aganst dfferent attacks, such as lowpass flter, hgh-pass flter, medan flters, shftng and croppng the marked mage. Expermental results have shown better performance of the proposed method than the current approaches n practce. Index Terms: Dgtal watermarkng, dscrete cosne transform, perceptual shapng, genetc algorthm. I. INTRODUCTION Due to the rapd ncrease n the usage of nternet n the recent past, dgtal data such as audo, vdeo or mages are easly avalable to the publc. Hence protectng such nformaton has become more mportant. Due to ths avalablty many copyrght owners are concerned about protectng ther data or work from llegal replcaton. So t s necessary that some serous work must be done so that such llegal dstrbuton of data must be protected. Ths concern has drawn the attenton of the researchers towards the development of the dgtal mage protecton schemes. Out of many approaches proposed so far to protect the vsual data, dgtal watermarkng s the one that has possbly receved the most mportance. Dgtal watermarkng s embeddng any nformaton wthn the mage, vdeo [22], [23], [24], audo [25], [26], text or 3D [2], [22] models n order to make t secure from unauthorzed usage. A dgtal watermark can be descrbed as an nvsble or vsble recognton code that s embedded nto the data permanently. It means that unlke cryptography the watermarks can protect the content even after the decodng process. The watermark must be embedded n such a way that t does not affect the marked mage qualty and the sgnal embedded s hdden. The frst property s called robustness and the later one s called mperceptblty. Generally n dgtal watermarkng, the watermark s embedded wth the same strength nsde the whole mage. In ths process the local dstrbuton of the cover mage s not consdered. Such embeddng leads to some unwanted vsble objects n the watermarked mage. Mostly these are observed n smooth regons as they are more senstve to nose. The watermarkng strength should be decreased n order to decrease these deformatons. However, there s a possblty that the robustness of the mage s affected or s lost. Thus a sutable watermarkng strength should be selected for each pxel of the mage. Watermarkng s performed n spatal [27], [28], [29] as well as n frequency doman [5], [6], [7]. Recently researchers have been usng frequency doman watermarkng as t allows drect understandng of the content of the mage. When decdng about the strength and poston of the watermark to be embedded nto the mage, the human vsual system characterstcs can be taken nto account more easly. Cox et al., [5] and Pva et al., [3] have performed transformaton on the mage as a whole whle Boland et al., [4] have performed transformaton on block by block bass. Khan et al., [] optmzed the perceptual shapng of the watermark n the whole DCT doman. Hernandez et al., [5] Cox et al., [6] have used Watson s perceptual model [7] to shape the watermark n accordance wth the orgnal mage before the embeddng process. But they are usng an 8x8 block based DCT doman watermarkng. Hung et al., [8], [9] has used the Genetc algorthm to fnd the most favorable embeddng postons n the block-based DCT watermarkng scheme so that the marked mage qualty can be mproved. In ths paper we have used Genetc algorthm to adaptvely select the strength of watermark n the DCT doman. The md-band DCT coeffcents are selected to embed the watermark. In ths way better mperceptblty and robustness have been observed. The rest of the paper s organzed as follows. In secton 2 an ntroducton to genetc algorthm s descrbed. In secton 3 the proposed technque of watermark embeddng and detecton s descrbed. In secton 4 the mplementaton detals are dscussed. The results and dscusson are gven n secton 5. Fnally n secton 6 we conclude the remarks. II. GENETIC ALGORITHM Genetc algorthm (GA) [30] s an evolutonary global optmzaton technque. GA starts wth an ntal populaton of chromosomes.e. a randomly selected set of /0/$ IEEE

2 chromosomes that encode a set of possble solutons. In GA, genes n a chromosome represent the varable of a problem and the chromosomes are evaluated accordng to a ftness crteron. Generally two genetc operators; crossover and mutaton are used for recombnaton. These genetc operators are used to alter the composton of the genes to create new chromosomes (offsprngs). Mutaton alters a small part of the chromosomes whereas crossover changes the genetc materal of the chromosomes. The selecton operator, the Darwnan survval of the fttest among the populaton, s an artfcal verson of natural selecton. Ths s the process of selectng the best chromosomes to create new populaton from one generaton to another. The chromosomes that have hgher ftness have the hgher probablty of beng selected for the next generaton. The GA s shown as follows [8-]. Let P(t) and C(t) be the parent and chld (offsprng) n generaton t. Procedure: GenetcAlgorthm Begn: t 0; Intalze P(t); Evaluate P(t); Whle (not meet termnaton crteron) do Recombne P(t) to create C(t); Evaluate C(t); Select P(t+) from P(t) and C(t); t t + ; End; End; III. PROPOSED METHOD Dgtal watermarkng s the process of embeddng some nformaton nto the dgtal mage or meda by makng some small modfcatons. But these small modfcatons should not affect the mage s vsblty to a large extent. These small modfcatons should also be able to survve some ntentonal or unntentonal attacks. Snce we are focusng on only dgtal mage watermarkng, therefore the mage should be able to survve the common forgery attacks. Even f the attacker s able to remove the watermark from the host mage, the usablty of the mage s lost, hence the watermark must survve n the host medum tll the usablty of the medum s ntact. Cox et al. [5] proposed the usage of a pseudo random sequence of real numbers as the watermark so that nvsblty can be acheved. These sequences should be easly retrevable and should be numerous. Therefore followng hs dea our watermark s also a pseudo-random sequence of real numbers. Watermark should be able to resst the ntentonal attacks. Also the watermark could be easly detectable or extractable from the corrupted and nosy mage. There are two types of watermarkng technques [2] blnd [6] and non-blnd [5]. The frst does not requre the orgnal mage at the tme of detecton whle the later requres the orgnal mage n the extracton process. We have followed the frst technque. A. Dgtal watermark embeddng process In embeddng phase, a pseudo random sequence as the watermark W s nserted nto the orgnal mage I of sze M x N. The embeddng algorthm s as followng: Step : The DCT transformed mage D of I can be obtaned as M 2 (, ) ( ) ( ) N D u v = a u a v x I ( m. n)... MN m= 0 n= 0 (2m + ) uπ (2n + ) vπ cos cos () 2 2 M N / M for u = 0 where a ( u ) = 2 / M for u =,2,..., M / N for v = 0 and a ( v ) = 2 / N for v =, 2,..., N Step 2: After obtanng D, a zgzag scannng s done n order to select the coeffcents for embeddng [6] Zgzag scannng order s gven n fg. 4. Snce the perturbaton n low frequency components as compared to hgh frequency components s generally more percevable to the human eyes therefore ths task s equvalent to sortng accordng to the mportance. Step 3: The ntalzaton of GA s performed. For each chromosome of the GA followng steps are performed. a: The frst L coeffcents are left ntact and the watermark s beng embedded nto the next L+M coeffcents. Suppose the frst L+M DCT coeffcents are: C = { c, c 2,, c L, c L +,, c L + M } (2) And the pseudo-random watermark s gven by W = { w, w2,, w } (3) M The new coeffcents obtaned after embeddng are ~ c L+ = cl+ + α cl+ w (4) where s the watermarkng strength and has values from L to M. b: These newly obtaned coeffcents are renserted nto the zgzag scannng. c: Then by takng the nverse of the modfed DCT coeffcents the watermark mage n the spatal doman s obtaned. d: Calculate the ftness of each chromosome so that the GA operators.e. crossover and mutaton can be appled. Step 4: Repeat steps a-d untl the termnaton crtera s acheved. The block dagram of embeddng process and the GA smulaton are shown n Fgure and Fgure 2 respectvely as below B. Dgtal watermark detecton process Durng the detecton process, Pva et al., [6] used the reverse process for a gven corrupted mage. The detecton algorthm s as followng:

3 Step : Frst the DCT coeffcent matrx of sze M x N s computed. Step 2: Then t s reordered by the zgzag scan. Step 3: Watermark coeffcents from L+ to L+M are selected to form a matrx as follows. ~ C = c,..., ~ L+ c L+ M (5) Step 4: The correlaton of and any matrx s calculated as: Z = W C = M M M = w c L + α (6) Step 5: Ths correlaton Z s then compared to a predefned threshold to determne whether the watermark exsts or not. The block dagram of watermark detecton s shown n Fgure 3. Fgure 2: Chromosome encodng The ftness s computed for each chromosome and then the chromosomes wth hgher ftness are selected for matng usng the crossover and mutaton operators, so that a new populaton of chromosomes s created for the next generaton. Intally, for a populaton sze of 0 chromosomes and 50 generaton, the GA smulaton takes 0 mnute on a Pentum IV- 2.0 GHz machne. Orgnal mage of sze N x N Intalze GA Fnd the DCT coeffcents Apply DCT on mage Evaluate each ndvdual (chromosome) Apply zgzag scan DCT coeffcents are reordered Recombnaton (Crossover/Mutaton) Key Pck selected frequency coeffcents GA Smulaton Evaluate the offsprngs created Watermark Embeddng process Watermarkng strength Selecton of parent and off sprngs Obtan marked DCT coeffcents Apply nverse zgzag scan No Meet termnaton crtera? Watermark mage obtaned Apply nverse DCT Yes Fnd watermarked mage Fgure : Watermark embeddng process IV. IMPLEMENTATION DETAILS To represent a possble soluton usng GA, the chromosome structure, ftness functon, sutable crossover rate, and mutaton rate, populaton sze and maxmum generaton sze must be defned. For the manpulaton of mages ncludng the DCT of the orgnal mage and the selecton of the DCT coeffcents Matlab [20] has been used. The selected coeffcent array and the watermarkng strength are used to embed the watermark nto the mage. The selected DCT coeffcents and the watermarkng strength together make a sngle chromosome as shown n fgure below. Fgure 3: GA Smulaton Fgure 4: Zgzag scan

4 Table : Orgnal and marked mages of sze 52 x 52 Orgnal mage of sze N x N Name Orgnal mage Watermarked mage Apply DCT on mage Fnd the DCT coeffcents Apply zgzag scan DCT coeffcents are reordered Pck selected frequency coeffcents Dfferent Watermarks Watermarkng strength Compute Correlaton Watermark found? Fgure 4: Watermark Detecton The chromosome wth the hghest ftness of the last generaton s then coped and t s used for watermark embeddng n the Matlab envronment. Mean Squared Error (MSE) and Peak Sgnal to Nose Rato () as gven by (7) and (8) are used to check the perceptual mperceptblty of the watermarked mage. MSE = MN M N [ I (m, n) I (m, n)] ' 2 (7) m = 0 n =0 ( I MAX ) 2 = 0 log0 MSE ¹ (8) Where I s the orgnal mage and I' s the watermarked mage. IMAX s the maxmum possble value of the mage I, for an 8-bt per pxel representaton IMAX s 255. Table 2: Performance by varyng generaton sze, best values are n bold face. Standard mages V. EXPERIMENTAL RESULTS AND DISCUSSION A. Watermark embeddng: We have frstly used the standard mage as the cover mage n order to check the robustness of our proposed watermarkng method. The marked mages are shown n table. The mage s marked usng L = and M = The watermarkng strength for each DCT coeffcent s optmzed usng GA. The optmzed strength s n the nterval [0, ]. Followng seres of experments were performed on the standard watermarkng mages to fnd the optmal value of the GA parameters for adaptve watermark strength selecton. Results for 4 mages.e.,, and mages are provded n the paper. Experment seres : Effect of Generaton sze By keepng all the parameters of GA constant and only varyng the no. of generatons from 50 to 250 wth an nterval of 50, the mean, MSE and SSIM readngs over 00 runs of each experment are gven as follows: Performance MSE SSIM MSE SSIM MSE SSIM MSE SSIM Generatons Evolved Here the value of populaton sze was kept 30 chromosomes, the crossover rate was chosen as 70% and the mutaton rate was selected as 30%. From table 2 we can see that for and mage the best s obtaned for 50 generatons and for and mage t s obtaned at 200 generatons. So n next experment.e. varyng the populaton sze we wll use the respectve best generatons of the mages. Experment seres 2: Effect of Populaton sze

5 By only varyng the populaton sze from 0 to 30 wth an nterval of 0 whle keepng the rest of the parameters of GA constant, the mean, MSE and SSIM readngs over 00 runs of each experment are gven as follows: Standard mages Table 3: Performance by varyng populaton sze Performance Populaton sze MSE SSIM MSE SSIM MSE SSIM MSE SSIM Here the value of maxmum no. of generaton was kept 50 for and and 200 for both and mages. The best, MSE and SSIM were obtaned for these generaton no. on these mages n the prevous experment. The crossover rate was kept constant as 70% and mutaton rate as 30% for the standard mages. From table 5 t can be seen that for both and mage the best s obtaned for populaton sze of 20 chromosomes and for both and mage the best s obtaned for populaton sze of 30 chromosomes. So now we wll use these values of populaton szes of respectve mages n the next experment of varyng the crossover rate. Experment seres 3: Effect of Crossover rate Now by varyng the crossover rate and keepng the rest of the GA parameters constant we get the followng results. Table 4: Performance by varyng crossover rate Standard mages Performance Crossover rate MSE SSIM MSE SSIM MSE SSIM MSE SSIM Standard mages Performance Crossover rate MSE SSIM MSE SSIM MSE SSIM MSE SSIM The generaton sze and populaton sze was selected from the best s of experment and 2. And mutaton rate was kept 0.3. From table 8 we can compare the mean, MSE and SSIM; best crossover rate for each mage s gven n boldface. Experment seres 4: Effect of Mutaton rate Followng table s obtaned by varyng the mutaton rate and keepng the remanng GA parameters constant. Table 5: Performance by varyng mutaton rate Standard mages Performance Mutaton rate MSE SSIM MSE SSIM MSE SSIM MSE SSIM The values of the GA parameters as obtaned from experment, 2 and 3 were chosen for the standard mages. The best results were observed at mutaton rate of 0.3 for and and 0.4 for and mages. We have compared our results wth Khan et al., []. The comparson table s shown below: Table 6: Comparson of our technque wth other technques Standard mages Proposed method MSE MSS SSIM A. Khan et al. [] MSE MSS WPM MSE SSIM A. Khan et al. [2] GPM MSE SSIM

6 Here MSS s the mean squared strength of the watermark. It can be calculated as follows: MSS = G G = α 2 (9) Were G s the number of coeffcents selected for watermark embeddng and s the strength of watermark for each th coeffcent. In our case hgh strength watermark was used for embeddng then Khan et al. [], but stll our, MSE and SSIM shows better performance because n our case the watermark s dstrbuted n the less percevable regons of the mages. B. GA Parameters: The values of GA parameters are gven n Table 5 as below. Table 7: GA Parameters Selecton Rank based Max. Generatons 50 (for and ) 200 (for and ) Populaton sze 20 (for and ) 30 (for and ) Crossover rate 70% Mutaton rate 30% (for and ) 40% (for and ) Ftness measure The value of maxmum generaton no., populaton sze, crossover rate and mutaton rate are obtaned by the above experments performed. C. Watermark detecton: The values of L = and M = 6000 has been used for the standard mages durng the detecton process. Then the marked mage s checked for correlaton wth randomly generated 000 watermarks. The hghest correlaton s consdered to be representng the orgnal watermark used n the embeddng process. The detected watermark for the standard mage s shown below: Fgure 5 and Table 8, 9, 0 confrm the robustness of our proposed watermarkng technque wth dfferent attacks. Fgure 6: Detector response wth 3x3 medan attack on mage Dfferent attacks were carred out on the watermarked mages and t survved all the attacks wth the excepton of croppng 90% of the mage, n ths case the usablty of the mage s also lost due to croppng. Hence, n our case watermark survved all the attacks tll the usablty of the watermarked mages s ntact. Table 8: Comparson of the system under dfferent attacks for mage and results comparson wth [] Attack MSE MSE Proposed [] Proposed [] 2x Medan 3x flter 4x x x Low-pass 3x flter 4x x Hgh-pass flter 3x Table 9: Performance on cropped mages Image Croppng MSE SSIM x x x x x Fgure 5: Detecton of watermark for mage D. Survval aganst attacks:

7 Table 0: Watermark detecton of cropped mages Cropped mage Correlaton VI. CONCLUSION AND FUTURE WORK In ths paper a new adaptve dgtal mage watermarkng method s presented. The proposed method uses genetc algorthm to optmze the strength of the watermark for mdband DCT coeffcents. As the watermark strength for the selected coeffcents s not the same but rather t s kept adaptve, n ths way the watermark s spread n the regons of the mage whch have least effect on the mperceptblty of the mage. The mperceptblty and robustness tests show better performance of the proposed method n comparson to other approaches n practce. In future one can use the ftness functon ncorporated wth robustness measure to smultaneously optmze both the requrements of watermarkng. Mult-objectve optmzaton methods can be nvestgated whch mght help n optmzng mperceptblty and robustness at the same tme. REFERENCES [] A. Khan, A. M. Mrza and A. Majd, Optmzng Perceptual shapng of a dgtal watermark usng Genetc Programmng, n Iranan Journal of Electrcal and Computer Engneerng (IJECE), vol. 3, No. 2, pp , 2004 [2] A. Khan, A. M. Mrza and A. Majd, Intellgent perceptual shapng of a dgtal watermark: explotng characterstcs of human vsual system, n Internatonal Journal of Knowledge-based Intellgent Engneerng Systems, (KES), vol. 9, pp. -, 2005 [3] A. Khan, A. M. Mrza, Genetc Perceptual shapng: utlzng cover mage and concevable attack nformaton durng watermark embeddng, n Informaton fuson, vol. 8, ssue 4, pp , 2007 [4] I. Usman, A. Khan, BCH codng and ntellgent watermark embeddng: Employng both frequency and strength selecton, n Appl. Soft Comput., pp , vol. 0, ssue, Jan. 200 [5] I. J. Cox, J. Klan, T. Leghton and T. Shamoon, A Secure, robust watermark for multmeda, Workshop on Informaton Hdng, Newton Insttute, Unv. of Cambrdge, May 996 [6] A. Pva, M. Barn, F. Bartoln, V. Cappelln, DCTbased watermark recoverng wthout resortng to the uncorrupted orgnal mage, Proc Int. Conf. Image Processng, vol. pp , Oct. 997 [7] F. Bartoln, M. Barn, V. Cappelln and A. Pva, Mask buldng for perceptually hdng frequency embedded watermarks, Proceedng of 5th IEEE nternatonal Conference on mage Processng, ICIP 98, Chcago, Illnos, USA, vol., pp , Oct [8]L. Zne-Jung, L. Shh-We, S. Shun-Feng, L. Chun-Yen, A hybrd watermarkng technque appled to dgtal mages, n Appl. Soft Comput., pp , vol. 8, ssue, Jan 2008 [9] D.A. Goldberg, Genetc Algorthms n Search, Optmzaton and Machne Learnng, Addson- Wesley, Readng, MA, 989 [0] Z. Mchalewcz, Genetc algorthms + data structure = evoluton programs, Sprnger-Verlag, Berln, 994 [] M. Gen, R. Cheng, Genetc Algorthms and Engneerng Desgn, John Wley & Sons, Inc., 997 [2] K. Su. Jonathan and B. Grod, Power-spectrum condtons for energy-effcent watermarkng, n IEEE Transacton on multmeda, vol. 4, no. 4, Dec [3]M. Barn, F. Bartolne, V. cappelln and A. Pva, A DCT doman system for Robust Image Watermarkng, Techncal report, department d Ingegnera Ellettronca, Unversta Frenze, 3, 5039 Frenze, Italy, 200 [4] F. M. Boland, J. J. K. O. Ruanadh and C. Dautzenberg, Watermarkng dgtal mages for copyrght protecton, Proc. IEEE Conference on Image Processng and Its Applcatons, pp , July 995 [5] J. R. Hernandez, M. Amado, and F. Perez-Gonzalez, DCT-Doman watermarkng technques for stll mages: Detector performance analyss and a new structure, In IEEE Transactons on Image Processng, vol. 9, Jan [6] M. L. Mller, G. J. Doerr and I. J. Cox, Applyng nformed codng and embeddng to desgn a

8 robust, hgh capacty watermark, IEEE Transacton on Image Processng, 2004 [7] A. B. Watson, Vsual optmzaton of DCT quantzaton matrces for ndvdual mages, n Proc. AIAA Computng n Aerospace 9,.San Dego, CA, pp , 993 [8] Huang and Wu, A watermark optmzaton technque based on genetc algorthm, Proc. SPIE, Vsual Comm. Image, Feb [9] Sheh, Huang, Wang and Pan, Genetc watermarkng based on transform doman technque, Pattern Recognton, vol. 37, pp , 2004 [20] The Math Works, 2009, [2] Q. S. A, Q. Lu, Z. D. Zhou, L. Yang, A new dgtal watermarkng scheme for 3D trangular mesh models, n Sgnal Processng, vol. 89, ssue, pp , Nov [22] W. Wang, G. Zheng, J. Yong, H. Gu, A numercally stable fragle watermarkng scheme for authentcatng 3D models, n Computer Aded Desgn, vol. 40, ssue 5, pp , May 2008 [23] G. Chen, Y. Cheng, Y. Wang, A Robust Adaptve Vdeo Watermarkng Algorthm based on HVS, n Proceedngs of The 9 th Internatonal Conference for Young Computer Scentsts, pp , 2008 [24] Y. Ln, J. Zhao, A new vdeo watermarkng algorthm based on D DFT and random transform source, n Sgnal Processng, vol. 90, ssue 2, pp , Feb. 200 [25] E. Erceleb, L. Batakçı, Audo watermarkng scheme based on embeddng strategy n low frequency components wth a bnary mage source, n Dgtal Sgnal Processng, vol. 9, ssue 2, pp , March 2009 [26] X. Yang, P. Nu, W. Q, A new adaptve dgtal audo watermarkng based on support vector machne, n Journal of Network and Computer Applcatons, vol. 3, ssue 4, pp , Nov [27] O. Fndk, I. Babaoglu, E. Ulker, Watermarkng scheme usng an artfcal mmune system n spatal doman, n Proceedngs of the 2 nd Internatonal conference on Internatonal scences: Informaton Technology, Culture and Human, pp , 2009 [28] Xanyong Wu, Zh-Hong Guan, Zhengpng Wu, A Chaos based robust spatal doman watermarkng algorthm, n Proceedngs of the 4 th nternatonal symposum on Neural Networks: Part II- Advances n Neural Networks, pp. 3-9, 2007 [29] L. Jun, L. LZh, An mproved watermarkng detect algorthm for color mage n spatal doman, n Proceedngs of the 2008 Internatonal Semnar on Future BoMedcal Informaton Engneerng, pp , [30] John H Holland, Adaptaton n Natural and Artfcal Systems, Unversty of Mchgan Press, Ann Arbor, 975.

Hybrid Non-Blind Color Image Watermarking

Hybrid Non-Blind Color Image Watermarking Hybrd Non-Blnd Color Image Watermarkng Ms C.N.Sujatha 1, Dr. P. Satyanarayana 2 1 Assocate Professor, Dept. of ECE, SNIST, Yamnampet, Ghatkesar Hyderabad-501301, Telangana 2 Professor, Dept. of ECE, AITS,

More information

Meta-heuristics for Multidimensional Knapsack Problems

Meta-heuristics for Multidimensional Knapsack Problems 2012 4th Internatonal Conference on Computer Research and Development IPCSIT vol.39 (2012) (2012) IACSIT Press, Sngapore Meta-heurstcs for Multdmensonal Knapsack Problems Zhbao Man + Computer Scence Department,

More information

IMPLEMENTATION OF QIM BASED AUDIO WATERMARKING USING HYBRID TRANSFORM OF SWT-DCT-SVD METHODS OPTIMIZED WITH GENETIC ALORITHM

IMPLEMENTATION OF QIM BASED AUDIO WATERMARKING USING HYBRID TRANSFORM OF SWT-DCT-SVD METHODS OPTIMIZED WITH GENETIC ALORITHM IMPLEMENTATION OF QIM BASED AUDIO WATERMARKING USING HYBRID TRANSFORM OF SWT-DCT-SVD METHODS OPTIMIZED WITH GENETIC ALORITHM Ryan Amnullah 1, Gelar Budman 2, Irma Saftr 3 1, 2, 3 FakultasTeknk Elektro,

More information

Enhanced Watermarking Technique for Color Images using Visual Cryptography

Enhanced Watermarking Technique for Color Images using Visual Cryptography Informaton Assurance and Securty Letters 1 (2010) 024-028 Enhanced Watermarkng Technque for Color Images usng Vsual Cryptography Enas F. Al rawashdeh 1, Rawan I.Zaghloul 2 1 Balqa Appled Unversty, MIS

More information

A Binarization Algorithm specialized on Document Images and Photos

A Binarization Algorithm specialized on Document Images and Photos A Bnarzaton Algorthm specalzed on Document mages and Photos Ergna Kavalleratou Dept. of nformaton and Communcaton Systems Engneerng Unversty of the Aegean kavalleratou@aegean.gr Abstract n ths paper, a

More information

A NEW AUDIO WATERMARKING METHOD BASED

A NEW AUDIO WATERMARKING METHOD BASED A NEW AUDIO WATERMARKING METHOD BASED ON DISCRETE COSINE TRANSFORM WITH A GRAY IMAGE Mohammad Ibrahm Khan 1, Md. Iqbal Hasan Sarker 2, Kaushk Deb 3 and Md. Hasan Furhad 4 1,2,3 Department of Computer Scence

More information

A Fast Content-Based Multimedia Retrieval Technique Using Compressed Data

A Fast Content-Based Multimedia Retrieval Technique Using Compressed Data A Fast Content-Based Multmeda Retreval Technque Usng Compressed Data Borko Furht and Pornvt Saksobhavvat NSF Multmeda Laboratory Florda Atlantc Unversty, Boca Raton, Florda 3343 ABSTRACT In ths paper,

More information

A Hybrid Semi-Blind Gray Scale Image Watermarking Algorithm Based on DWT-SVD using Human Visual System Model

A Hybrid Semi-Blind Gray Scale Image Watermarking Algorithm Based on DWT-SVD using Human Visual System Model A Hybrd Sem-Blnd Gray Scale Image Watermarkng Algorthm Based on DWT-SVD usng Human Vsual System Model Rajesh Mehta r Scence & Engneerng, USICT Guru Gobnd Sngh Indrarprastha Unversty New Delh, Inda rajesh00ust@gmal.com

More information

Semi-Fragile Watermarking Scheme for Authentication of JPEG Images

Semi-Fragile Watermarking Scheme for Authentication of JPEG Images Tamkang Journal of Scence and Engneerng, Vol. 10, No 1, pp. 5766 (2007) 57 Sem-Fragle Watermarkng Scheme for Authentcaton of JPEG Images Chh-Hung n 1 *, Tung-Shh Su 2 and Wen-Shyong Hseh 2,3 1 Department

More information

Parallelism for Nested Loops with Non-uniform and Flow Dependences

Parallelism for Nested Loops with Non-uniform and Flow Dependences Parallelsm for Nested Loops wth Non-unform and Flow Dependences Sam-Jn Jeong Dept. of Informaton & Communcaton Engneerng, Cheonan Unversty, 5, Anseo-dong, Cheonan, Chungnam, 330-80, Korea. seong@cheonan.ac.kr

More information

Robust Video Watermarking Using Image Normalization, Motion Vector and Perceptual Information

Robust Video Watermarking Using Image Normalization, Motion Vector and Perceptual Information Robust Vdeo Watermarkng Usng Image ormalzaton, Moton Vector and Perceptual Informaton Cedllo-Hernández Antono 1, Cedllo-Hernández Manuel 1, akano-myatake Marko 1, García-Vázquez Mreya S. 2 1 Postgraduate

More information

A Lossless Watermarking Scheme for Halftone Image Authentication

A Lossless Watermarking Scheme for Halftone Image Authentication IJCSNS Internatonal Journal of Computer Scence and Network Securty, VOL.6 No.2B, February 2006 147 A Lossless Watermarkng Scheme for Halftone Image Authentcaton Jeng-Shyang Pan, Hao Luo, and Zhe-Mng Lu,

More information

Key-Selective Patchwork Method for Audio Watermarking

Key-Selective Patchwork Method for Audio Watermarking Internatonal Journal of Dgtal Content Technology and ts Applcatons Volume 4, Number 4, July 2010 Key-Selectve Patchwork Method for Audo Watermarkng 1 Ch-Man Pun, 2 Jng-Jng Jang 1, Frst and Correspondng

More information

Content Based Image Retrieval Using 2-D Discrete Wavelet with Texture Feature with Different Classifiers

Content Based Image Retrieval Using 2-D Discrete Wavelet with Texture Feature with Different Classifiers IOSR Journal of Electroncs and Communcaton Engneerng (IOSR-JECE) e-issn: 78-834,p- ISSN: 78-8735.Volume 9, Issue, Ver. IV (Mar - Apr. 04), PP 0-07 Content Based Image Retreval Usng -D Dscrete Wavelet wth

More information

Research Article High Capacity Reversible Watermarking for Audio by Histogram Shifting and Predicted Error Expansion

Research Article High Capacity Reversible Watermarking for Audio by Histogram Shifting and Predicted Error Expansion e Scentfc World Journal, Artcle ID 656251, 7 pages http://dx.do.org/1.1155/214/656251 Research Artcle Hgh Capacty Reversble Watermarkng for Audo by Hstogram Shftng and Predcted Error Expanson Fe Wang,

More information

Information Hiding Watermarking Detection Technique by PSNR and RGB Intensity

Information Hiding Watermarking Detection Technique by PSNR and RGB Intensity www..org 3 Informaton Hdng Watermarkng Detecton Technque by PSNR and RGB Intensty 1 Neha Chauhan, Akhlesh A. Waoo, 3 P. S. Patheja 1 Research Scholar, BIST, Bhopal, Inda.,3 Assstant Professor, BIST, Bhopal,

More information

Digital Video Watermarking using Discrete Wavelet Transform and Principal Component Analysis

Digital Video Watermarking using Discrete Wavelet Transform and Principal Component Analysis Internatonal Journal of Wsdom Based Computng, Vol. 1 (2), August 2011 7 Dgtal Vdeo Watermarkng usng Dscrete Wavelet Transform and Prncpal Component Analyss Sanjana Snha, Prajnat Bardhan, Swarnal Pramanck,

More information

EVALUATION OF THE PERFORMANCES OF ARTIFICIAL BEE COLONY AND INVASIVE WEED OPTIMIZATION ALGORITHMS ON THE MODIFIED BENCHMARK FUNCTIONS

EVALUATION OF THE PERFORMANCES OF ARTIFICIAL BEE COLONY AND INVASIVE WEED OPTIMIZATION ALGORITHMS ON THE MODIFIED BENCHMARK FUNCTIONS Academc Research Internatonal ISS-L: 3-9553, ISS: 3-9944 Vol., o. 3, May 0 EVALUATIO OF THE PERFORMACES OF ARTIFICIAL BEE COLOY AD IVASIVE WEED OPTIMIZATIO ALGORITHMS O THE MODIFIED BECHMARK FUCTIOS Dlay

More information

Problem Definitions and Evaluation Criteria for Computational Expensive Optimization

Problem Definitions and Evaluation Criteria for Computational Expensive Optimization Problem efntons and Evaluaton Crtera for Computatonal Expensve Optmzaton B. Lu 1, Q. Chen and Q. Zhang 3, J. J. Lang 4, P. N. Suganthan, B. Y. Qu 6 1 epartment of Computng, Glyndwr Unversty, UK Faclty

More information

A Fast Visual Tracking Algorithm Based on Circle Pixels Matching

A Fast Visual Tracking Algorithm Based on Circle Pixels Matching A Fast Vsual Trackng Algorthm Based on Crcle Pxels Matchng Zhqang Hou hou_zhq@sohu.com Chongzhao Han czhan@mal.xjtu.edu.cn Ln Zheng Abstract: A fast vsual trackng algorthm based on crcle pxels matchng

More information

Robust Watermarking for Text Images Based on Arnold Scrambling and DWT-DCT

Robust Watermarking for Text Images Based on Arnold Scrambling and DWT-DCT Internatonal Conference on Mechatroncs Electronc Industral and Control Engneerng (MEIC 015) Robust Watermarkng for Text Images Based on Arnold Scramblng and DWT-DCT Fan Wu College of Informaton Scence

More information

Face Recognition University at Buffalo CSE666 Lecture Slides Resources:

Face Recognition University at Buffalo CSE666 Lecture Slides Resources: Face Recognton Unversty at Buffalo CSE666 Lecture Sldes Resources: http://www.face-rec.org/algorthms/ Overvew of face recognton algorthms Correlaton - Pxel based correspondence between two face mages Structural

More information

SLAM Summer School 2006 Practical 2: SLAM using Monocular Vision

SLAM Summer School 2006 Practical 2: SLAM using Monocular Vision SLAM Summer School 2006 Practcal 2: SLAM usng Monocular Vson Javer Cvera, Unversty of Zaragoza Andrew J. Davson, Imperal College London J.M.M Montel, Unversty of Zaragoza. josemar@unzar.es, jcvera@unzar.es,

More information

TN348: Openlab Module - Colocalization

TN348: Openlab Module - Colocalization TN348: Openlab Module - Colocalzaton Topc The Colocalzaton module provdes the faclty to vsualze and quantfy colocalzaton between pars of mages. The Colocalzaton wndow contans a prevew of the two mages

More information

Cluster Analysis of Electrical Behavior

Cluster Analysis of Electrical Behavior Journal of Computer and Communcatons, 205, 3, 88-93 Publshed Onlne May 205 n ScRes. http://www.scrp.org/ournal/cc http://dx.do.org/0.4236/cc.205.350 Cluster Analyss of Electrcal Behavor Ln Lu Ln Lu, School

More information

Shape-adaptive DCT and Its Application in Region-based Image Coding

Shape-adaptive DCT and Its Application in Region-based Image Coding Internatonal Journal of Sgnal Processng, Image Processng and Pattern Recognton, pp.99-108 http://dx.do.org/10.14257/sp.2014.7.1.10 Shape-adaptve DCT and Its Applcaton n Regon-based Image Codng Yamn Zheng,

More information

Improvement of Spatial Resolution Using BlockMatching Based Motion Estimation and Frame. Integration

Improvement of Spatial Resolution Using BlockMatching Based Motion Estimation and Frame. Integration Improvement of Spatal Resoluton Usng BlockMatchng Based Moton Estmaton and Frame Integraton Danya Suga and Takayuk Hamamoto Graduate School of Engneerng, Tokyo Unversty of Scence, 6-3-1, Nuku, Katsuska-ku,

More information

A New Token Allocation Algorithm for TCP Traffic in Diffserv Network

A New Token Allocation Algorithm for TCP Traffic in Diffserv Network A New Token Allocaton Algorthm for TCP Traffc n Dffserv Network A New Token Allocaton Algorthm for TCP Traffc n Dffserv Network S. Sudha and N. Ammasagounden Natonal Insttute of Technology, Truchrappall,

More information

An Optimal Algorithm for Prufer Codes *

An Optimal Algorithm for Prufer Codes * J. Software Engneerng & Applcatons, 2009, 2: 111-115 do:10.4236/jsea.2009.22016 Publshed Onlne July 2009 (www.scrp.org/journal/jsea) An Optmal Algorthm for Prufer Codes * Xaodong Wang 1, 2, Le Wang 3,

More information

Discrete Cosine Transform Optimization in Image Compression Based on Genetic Algorithm

Discrete Cosine Transform Optimization in Image Compression Based on Genetic Algorithm 015 8th Internatonal Congress on Image and Sgnal Processng (CISP 015) Dscrete Cosne Transform Optmzaton n Image Compresson Based on Genetc Algorthm LIU Yuan-yuan 1 CHE He-xn 1 College of Communcaton Engneerng,

More information

A Robust Webpage Information Hiding Method Based on the Slash of Tag

A Robust Webpage Information Hiding Method Based on the Slash of Tag Advanced Engneerng Forum Onlne: 2012-09-26 ISSN: 2234-991X, Vols. 6-7, pp 361-366 do:10.4028/www.scentfc.net/aef.6-7.361 2012 Trans Tech Publcatons, Swtzerland A Robust Webpage Informaton Hdng Method Based

More information

An Image Compression Algorithm based on Wavelet Transform and LZW

An Image Compression Algorithm based on Wavelet Transform and LZW An Image Compresson Algorthm based on Wavelet Transform and LZW Png Luo a, Janyong Yu b School of Chongqng Unversty of Posts and Telecommuncatons, Chongqng, 400065, Chna Abstract a cylpng@63.com, b y27769864@sna.cn

More information

Data Hiding and Image Authentication for Color-Palette Images

Data Hiding and Image Authentication for Color-Palette Images Data Hdng and Image Authentcaton for Color-Palette Images Chh-Yang Yn ( 殷志揚 ) and Wen-Hsang Tsa ( 蔡文祥 ) Department of Computer & Informaton Scence Natonal Chao Tung Unversty 00 Ta Hsueh Rd., Hsnchu, Tawan

More information

An Image Fusion Approach Based on Segmentation Region

An Image Fusion Approach Based on Segmentation Region Rong Wang, L-Qun Gao, Shu Yang, Yu-Hua Cha, and Yan-Chun Lu An Image Fuson Approach Based On Segmentaton Regon An Image Fuson Approach Based on Segmentaton Regon Rong Wang, L-Qun Gao, Shu Yang 3, Yu-Hua

More information

Determining the Optimal Bandwidth Based on Multi-criterion Fusion

Determining the Optimal Bandwidth Based on Multi-criterion Fusion Proceedngs of 01 4th Internatonal Conference on Machne Learnng and Computng IPCSIT vol. 5 (01) (01) IACSIT Press, Sngapore Determnng the Optmal Bandwdth Based on Mult-crteron Fuson Ha-L Lang 1+, Xan-Mn

More information

Maximum Variance Combined with Adaptive Genetic Algorithm for Infrared Image Segmentation

Maximum Variance Combined with Adaptive Genetic Algorithm for Infrared Image Segmentation Internatonal Conference on Logstcs Engneerng, Management and Computer Scence (LEMCS 5) Maxmum Varance Combned wth Adaptve Genetc Algorthm for Infrared Image Segmentaton Huxuan Fu College of Automaton Harbn

More information

PARETO BAYESIAN OPTIMIZATION ALGORITHM FOR THE MULTIOBJECTIVE 0/1 KNAPSACK PROBLEM

PARETO BAYESIAN OPTIMIZATION ALGORITHM FOR THE MULTIOBJECTIVE 0/1 KNAPSACK PROBLEM PARETO BAYESIAN OPTIMIZATION ALGORITHM FOR THE MULTIOBJECTIVE 0/ KNAPSACK PROBLEM Josef Schwarz Jří Očenáše Brno Unversty of Technology Faculty of Engneerng and Computer Scence Department of Computer Scence

More information

KEYWORDS: Digital Image Watermarking, Discrete Wavelet Transform, General Regression Neural Network, Human Visual System. 1.

KEYWORDS: Digital Image Watermarking, Discrete Wavelet Transform, General Regression Neural Network, Human Visual System. 1. An Adaptve Dgtal Image Watermarkng Based on Image Features n Dscrete Wavelet Transform Doman and General Regresson Neural Network Ayoub Taher Group of IT Engneerng, Payam Noor Unversty, Broujen, Iran ABSTRACT:

More information

Learning the Kernel Parameters in Kernel Minimum Distance Classifier

Learning the Kernel Parameters in Kernel Minimum Distance Classifier Learnng the Kernel Parameters n Kernel Mnmum Dstance Classfer Daoqang Zhang 1,, Songcan Chen and Zh-Hua Zhou 1* 1 Natonal Laboratory for Novel Software Technology Nanjng Unversty, Nanjng 193, Chna Department

More information

Solving two-person zero-sum game by Matlab

Solving two-person zero-sum game by Matlab Appled Mechancs and Materals Onlne: 2011-02-02 ISSN: 1662-7482, Vols. 50-51, pp 262-265 do:10.4028/www.scentfc.net/amm.50-51.262 2011 Trans Tech Publcatons, Swtzerland Solvng two-person zero-sum game by

More information

Research of Multiple Text Watermarks Technique in Electric Power System Texts

Research of Multiple Text Watermarks Technique in Electric Power System Texts Sensors & Transducers 203 by IFSA http://www.sensorsportal.com Research of Multple Text atermarks Technque n Electrc Power System Texts Xao-X XING, Qng CHEN, 2 Lan-X FU School of Optcal-Electrcal and Computer

More information

Enhanced AMBTC for Image Compression using Block Classification and Interpolation

Enhanced AMBTC for Image Compression using Block Classification and Interpolation Internatonal Journal of Computer Applcatons (0975 8887) Volume 5 No.0, August 0 Enhanced AMBTC for Image Compresson usng Block Classfcaton and Interpolaton S. Vmala Dept. of Comp. Scence Mother Teresa

More information

Classifier Selection Based on Data Complexity Measures *

Classifier Selection Based on Data Complexity Measures * Classfer Selecton Based on Data Complexty Measures * Edth Hernández-Reyes, J.A. Carrasco-Ochoa, and J.Fco. Martínez-Trndad Natonal Insttute for Astrophyscs, Optcs and Electroncs, Lus Enrque Erro No.1 Sta.

More information

Research and Application of Fingerprint Recognition Based on MATLAB

Research and Application of Fingerprint Recognition Based on MATLAB Send Orders for Reprnts to reprnts@benthamscence.ae The Open Automaton and Control Systems Journal, 205, 7, 07-07 Open Access Research and Applcaton of Fngerprnt Recognton Based on MATLAB Nng Lu* Department

More information

GA-Based Learning Algorithms to Identify Fuzzy Rules for Fuzzy Neural Networks

GA-Based Learning Algorithms to Identify Fuzzy Rules for Fuzzy Neural Networks Seventh Internatonal Conference on Intellgent Systems Desgn and Applcatons GA-Based Learnng Algorthms to Identfy Fuzzy Rules for Fuzzy Neural Networks K Almejall, K Dahal, Member IEEE, and A Hossan, Member

More information

A Comparison between Digital Images Watermarking in Tow Different Color Spaces Using DWT2*

A Comparison between Digital Images Watermarking in Tow Different Color Spaces Using DWT2* A Comparson between Dgtal s ng n Tow Dfferent Color Spaces Usng DWT* Mehd Khall Natonal Academy of Scence of Armena Yerevan, Armena e-mal: khall.mehd@yahoo.com ABSTRACT A novel dgtal watermarkng for ownershp

More information

A Secured Method for Image Steganography Based On Pixel Values

A Secured Method for Image Steganography Based On Pixel Values A Secured Method for Image Steganography Based On Pxel Values Tarun Gulat #, Sanskrt Gupta * # Assocate Professor, Electroncs and Communcaton Engneerng Department, MMEC, M.M.U., Mullana, Ambala, Haryana,

More information

Cracking of the Merkle Hellman Cryptosystem Using Genetic Algorithm

Cracking of the Merkle Hellman Cryptosystem Using Genetic Algorithm Crackng of the Merkle Hellman Cryptosystem Usng Genetc Algorthm Zurab Kochladze 1 * & Lal Besela 2 1 Ivane Javakhshvl Tbls State Unversty, 1, I.Chavchavadze av 1, 0128, Tbls, Georga 2 Sokhum State Unversty,

More information

An Efficient Genetic Algorithm with Fuzzy c-means Clustering for Traveling Salesman Problem

An Efficient Genetic Algorithm with Fuzzy c-means Clustering for Traveling Salesman Problem An Effcent Genetc Algorthm wth Fuzzy c-means Clusterng for Travelng Salesman Problem Jong-Won Yoon and Sung-Bae Cho Dept. of Computer Scence Yonse Unversty Seoul, Korea jwyoon@sclab.yonse.ac.r, sbcho@cs.yonse.ac.r

More information

IAJIT First Online Publication

IAJIT First Online Publication Content Protecton n Vdeo Data Based on Robust Dgtal Watermarkng Resstant to Intentonal and Unntentonal Attacks Mad Masoum and Shervn Amr Department of Electrcal Engneerng, Islamc Azad Unversty Qazvn Branch,

More information

Subspace clustering. Clustering. Fundamental to all clustering techniques is the choice of distance measure between data points;

Subspace clustering. Clustering. Fundamental to all clustering techniques is the choice of distance measure between data points; Subspace clusterng Clusterng Fundamental to all clusterng technques s the choce of dstance measure between data ponts; D q ( ) ( ) 2 x x = x x, j k = 1 k jk Squared Eucldean dstance Assumpton: All features

More information

Deep learning is a good steganalysis tool when embedding key is reused for different images, even if there is a cover source-mismatch

Deep learning is a good steganalysis tool when embedding key is reused for different images, even if there is a cover source-mismatch Deep learnng s a good steganalyss tool when embeddng key s reused for dfferent mages, even f there s a cover source-msmatch Lonel PIBRE 2,3, Jérôme PASQUET 2,3, Dno IENCO 2,3, Marc CHAUMONT 1,2,3 (1) Unversty

More information

A Novel Approach for an Early Test Case Generation using Genetic Algorithm and Dominance Concept based on Use cases

A Novel Approach for an Early Test Case Generation using Genetic Algorithm and Dominance Concept based on Use cases Alekhya Varkut et al, / (IJCSIT) Internatonal Journal of Computer Scence and Informaton Technologes, Vol. 3 (3), 2012,4218-4224 A Novel Approach for an Early Test Case Generaton usng Genetc Algorthm and

More information

Robust Blind Video Watermark Algorithm in Transform Domain Combining with 3D Video Correlation

Robust Blind Video Watermark Algorithm in Transform Domain Combining with 3D Video Correlation JOURNAL OF MULTIMEDIA, VOL. 8, NO. 2, APRIL 2013 161 Robust Blnd Vdeo Watermark Algorthm n Transform Doman Combnng wth 3D Vdeo Correlaton DING Ha-yang 1,3 1. Informaton Securty Center, Bejng Unversty of

More information

A PATTERN RECOGNITION APPROACH TO IMAGE SEGMENTATION

A PATTERN RECOGNITION APPROACH TO IMAGE SEGMENTATION 1 THE PUBLISHING HOUSE PROCEEDINGS OF THE ROMANIAN ACADEMY, Seres A, OF THE ROMANIAN ACADEMY Volume 4, Number 2/2003, pp.000-000 A PATTERN RECOGNITION APPROACH TO IMAGE SEGMENTATION Tudor BARBU Insttute

More information

Performance Analysis of Data Hiding in MPEG-4 AAC Audio *

Performance Analysis of Data Hiding in MPEG-4 AAC Audio * TSINGHUA SCIENCE AND TECHNOLOGY ISSNll1007-0214ll07/21llpp55-61 Volume 14, Number 1, February 2009 Performance Analyss of Data Hdng n MPEG-4 AAC Audo * XU Shuzheng ( ) **, ZHANG Peng ( ), WANG Pengjun

More information

Using Counter-propagation Neural Network for Digital Audio Watermarking

Using Counter-propagation Neural Network for Digital Audio Watermarking Usng Counter-propagaton Neural Network for Dgtal Audo Watermarkng Chuan-Yu Chang and Wen-Chh Shen Graduate School of Computer Scence and Informaton Engneerng Natonal Yunln Unversty of Scence & Technology

More information

An Improved Image Segmentation Algorithm Based on the Otsu Method

An Improved Image Segmentation Algorithm Based on the Otsu Method 3th ACIS Internatonal Conference on Software Engneerng, Artfcal Intellgence, Networkng arallel/dstrbuted Computng An Improved Image Segmentaton Algorthm Based on the Otsu Method Mengxng Huang, enjao Yu,

More information

Private Information Retrieval (PIR)

Private Information Retrieval (PIR) 2 Levente Buttyán Problem formulaton Alce wants to obtan nformaton from a database, but she does not want the database to learn whch nformaton she wanted e.g., Alce s an nvestor queryng a stock-market

More information

CHAPTER 2 PROPOSED IMPROVED PARTICLE SWARM OPTIMIZATION

CHAPTER 2 PROPOSED IMPROVED PARTICLE SWARM OPTIMIZATION 24 CHAPTER 2 PROPOSED IMPROVED PARTICLE SWARM OPTIMIZATION The present chapter proposes an IPSO approach for multprocessor task schedulng problem wth two classfcatons, namely, statc ndependent tasks and

More information

A GENETIC ALGORITHM FOR PROCESS SCHEDULING IN DISTRIBUTED OPERATING SYSTEMS CONSIDERING LOAD BALANCING

A GENETIC ALGORITHM FOR PROCESS SCHEDULING IN DISTRIBUTED OPERATING SYSTEMS CONSIDERING LOAD BALANCING A GENETIC ALGORITHM FOR PROCESS SCHEDULING IN DISTRIBUTED OPERATING SYSTEMS CONSIDERING LOAD BALANCING M. Nkravan and M. H. Kashan Department of Electrcal Computer Islamc Azad Unversty, Shahrar Shahreqods

More information

Fuzzy C-Means Initialized by Fixed Threshold Clustering for Improving Image Retrieval

Fuzzy C-Means Initialized by Fixed Threshold Clustering for Improving Image Retrieval Fuzzy -Means Intalzed by Fxed Threshold lusterng for Improvng Image Retreval NAWARA HANSIRI, SIRIPORN SUPRATID,HOM KIMPAN 3 Faculty of Informaton Technology Rangst Unversty Muang-Ake, Paholyotn Road, Patumtan,

More information

Vectorization of Image Outlines Using Rational Spline and Genetic Algorithm

Vectorization of Image Outlines Using Rational Spline and Genetic Algorithm 01 Internatonal Conference on Image, Vson and Computng (ICIVC 01) IPCSIT vol. 50 (01) (01) IACSIT Press, Sngapore DOI: 10.776/IPCSIT.01.V50.4 Vectorzaton of Image Outlnes Usng Ratonal Splne and Genetc

More information

Unsupervised Learning and Clustering

Unsupervised Learning and Clustering Unsupervsed Learnng and Clusterng Supervsed vs. Unsupervsed Learnng Up to now we consdered supervsed learnng scenaro, where we are gven 1. samples 1,, n 2. class labels for all samples 1,, n Ths s also

More information

Sum of Linear and Fractional Multiobjective Programming Problem under Fuzzy Rules Constraints

Sum of Linear and Fractional Multiobjective Programming Problem under Fuzzy Rules Constraints Australan Journal of Basc and Appled Scences, 2(4): 1204-1208, 2008 ISSN 1991-8178 Sum of Lnear and Fractonal Multobjectve Programmng Problem under Fuzzy Rules Constrants 1 2 Sanjay Jan and Kalash Lachhwan

More information

Application of Improved Fish Swarm Algorithm in Cloud Computing Resource Scheduling

Application of Improved Fish Swarm Algorithm in Cloud Computing Resource Scheduling , pp.40-45 http://dx.do.org/10.14257/astl.2017.143.08 Applcaton of Improved Fsh Swarm Algorthm n Cloud Computng Resource Schedulng Yu Lu, Fangtao Lu School of Informaton Engneerng, Chongqng Vocatonal Insttute

More information

Virtual Machine Migration based on Trust Measurement of Computer Node

Virtual Machine Migration based on Trust Measurement of Computer Node Appled Mechancs and Materals Onlne: 2014-04-04 ISSN: 1662-7482, Vols. 536-537, pp 678-682 do:10.4028/www.scentfc.net/amm.536-537.678 2014 Trans Tech Publcatons, Swtzerland Vrtual Machne Mgraton based on

More information

CHAPTER 4 OPTIMIZATION TECHNIQUES

CHAPTER 4 OPTIMIZATION TECHNIQUES 48 CHAPTER 4 OPTIMIZATION TECHNIQUES 4.1 INTRODUCTION Unfortunately no sngle optmzaton algorthm exsts that can be appled effcently to all types of problems. The method chosen for any partcular case wll

More information

A fast algorithm for color image segmentation

A fast algorithm for color image segmentation Unersty of Wollongong Research Onlne Faculty of Informatcs - Papers (Arche) Faculty of Engneerng and Informaton Scences 006 A fast algorthm for color mage segmentaton L. Dong Unersty of Wollongong, lju@uow.edu.au

More information

Video Watermarking Algorithm Based on Relative Relationship of DCT Coefficients

Video Watermarking Algorithm Based on Relative Relationship of DCT Coefficients 756 JOURAL OF COPUTERS, VOL. 8, O., OVEBER 03 Vdeo Watermarkng Algorthm Based on Relatve Relatonshp of DCT Coeffcents Cheng ngzh, Du Yanpng, Wang Yan Bejng Insttute of Graphc Communcaton, Bejng, Chna Emal:

More information

Feature Selection for Target Detection in SAR Images

Feature Selection for Target Detection in SAR Images Feature Selecton for Detecton n SAR Images Br Bhanu, Yngqang Ln and Shqn Wang Center for Research n Intellgent Systems Unversty of Calforna, Rversde, CA 95, USA Abstract A genetc algorthm (GA) approach

More information

Resolving Ambiguity in Depth Extraction for Motion Capture using Genetic Algorithm

Resolving Ambiguity in Depth Extraction for Motion Capture using Genetic Algorithm Resolvng Ambguty n Depth Extracton for Moton Capture usng Genetc Algorthm Yn Yee Wa, Ch Kn Chow, Tong Lee Computer Vson and Image Processng Laboratory Dept. of Electronc Engneerng The Chnese Unversty of

More information

Coding Artifact Reduction Using Edge Map Guided Adaptive and Fuzzy Filter

Coding Artifact Reduction Using Edge Map Guided Adaptive and Fuzzy Filter MEL A MITSUBISHI ELECTIC ESEACH LABOATOY http://www.merl.com Codng Artfact educton Usng Edge Map Guded Adaptve and Fuzzy Flter Hao-Song Kong Yao Ne Anthony Vetro Hufang Sun Kenneth E. Barner T-2004-056

More information

MULTISPECTRAL IMAGES CLASSIFICATION BASED ON KLT AND ATR AUTOMATIC TARGET RECOGNITION

MULTISPECTRAL IMAGES CLASSIFICATION BASED ON KLT AND ATR AUTOMATIC TARGET RECOGNITION MULTISPECTRAL IMAGES CLASSIFICATION BASED ON KLT AND ATR AUTOMATIC TARGET RECOGNITION Paulo Quntlano 1 & Antono Santa-Rosa 1 Federal Polce Department, Brasla, Brazl. E-mals: quntlano.pqs@dpf.gov.br and

More information

Identify the Attack in Embedded Image with Steganalysis Detection Method by PSNR and RGB Intensity

Identify the Attack in Embedded Image with Steganalysis Detection Method by PSNR and RGB Intensity Internatonal Journal of Computer Systems (ISSN: 394-1065), Volume 03 Issue 07, July, 016 Avalable at http://www.jcsonlne.com/ Identfy the Attack n Embedded Image wth Steganalyss Detecton Method by PSNR

More information

A Hybrid Digital Image Watermarking based on Discrete Wavelet Transform, Discrete Cosine Transform, and General Regression Neural Network

A Hybrid Digital Image Watermarking based on Discrete Wavelet Transform, Discrete Cosine Transform, and General Regression Neural Network A Hybrd Dgtal Image Watermarkng based on Dscrete Wavelet Transform, Dscrete Cosne Transform, and General Regresson Neural Network Ayoub Taher ; ABSTRACT In ths paper, a new hybrd dgtal watermarkng technque

More information

Extraction of Fuzzy Rules from Trained Neural Network Using Evolutionary Algorithm *

Extraction of Fuzzy Rules from Trained Neural Network Using Evolutionary Algorithm * Extracton of Fuzzy Rules from Traned Neural Network Usng Evolutonary Algorthm * Urszula Markowska-Kaczmar, Wojcech Trelak Wrocław Unversty of Technology, Poland kaczmar@c.pwr.wroc.pl, trelak@c.pwr.wroc.pl

More information

Comparison of Heuristics for Scheduling Independent Tasks on Heterogeneous Distributed Environments

Comparison of Heuristics for Scheduling Independent Tasks on Heterogeneous Distributed Environments Comparson of Heurstcs for Schedulng Independent Tasks on Heterogeneous Dstrbuted Envronments Hesam Izakan¹, Ath Abraham², Senor Member, IEEE, Václav Snášel³ ¹ Islamc Azad Unversty, Ramsar Branch, Ramsar,

More information

NUMERICAL SOLVING OPTIMAL CONTROL PROBLEMS BY THE METHOD OF VARIATIONS

NUMERICAL SOLVING OPTIMAL CONTROL PROBLEMS BY THE METHOD OF VARIATIONS ARPN Journal of Engneerng and Appled Scences 006-017 Asan Research Publshng Network (ARPN). All rghts reserved. NUMERICAL SOLVING OPTIMAL CONTROL PROBLEMS BY THE METHOD OF VARIATIONS Igor Grgoryev, Svetlana

More information

Yuan Xu School of automation, Northwestern Polytechnical University, Xian , China. Huifeng Xue. Ailong Liu*

Yuan Xu School of automation, Northwestern Polytechnical University, Xian , China. Huifeng Xue. Ailong Liu* Rev. Téc. Ing. Unv. Zula. Vol. 39, Nº 7, 80-86, 2016 do:10.21311/001.39.7.10 A Parallel Genetc Algorthm for the Verfyng Smulaton of the Performance Prototype Yuan Xu School of automaton, Northwestern Polytechncal

More information

High-Boost Mesh Filtering for 3-D Shape Enhancement

High-Boost Mesh Filtering for 3-D Shape Enhancement Hgh-Boost Mesh Flterng for 3-D Shape Enhancement Hrokazu Yagou Λ Alexander Belyaev y Damng We z Λ y z ; ; Shape Modelng Laboratory, Unversty of Azu, Azu-Wakamatsu 965-8580 Japan y Computer Graphcs Group,

More information

High Payload Reversible Data Hiding Scheme Using Difference Segmentation and Histogram Shifting

High Payload Reversible Data Hiding Scheme Using Difference Segmentation and Histogram Shifting JOURNAL OF ELECTRONIC SCIENCE AND TECHNOLOGY, VOL. 11, NO. 1, MARCH 2013 9 Hgh Payload Reversble Data Hdng Scheme Usng Dfference Segmentaton and Hstogram Shftng Yung-Chen Chou and Huang-Chng L Abstract

More information

A MOVING MESH APPROACH FOR SIMULATION BUDGET ALLOCATION ON CONTINUOUS DOMAINS

A MOVING MESH APPROACH FOR SIMULATION BUDGET ALLOCATION ON CONTINUOUS DOMAINS Proceedngs of the Wnter Smulaton Conference M E Kuhl, N M Steger, F B Armstrong, and J A Jones, eds A MOVING MESH APPROACH FOR SIMULATION BUDGET ALLOCATION ON CONTINUOUS DOMAINS Mark W Brantley Chun-Hung

More information

An Evolvable Clustering Based Algorithm to Learn Distance Function for Supervised Environment

An Evolvable Clustering Based Algorithm to Learn Distance Function for Supervised Environment IJCSI Internatonal Journal of Computer Scence Issues, Vol. 7, Issue 5, September 2010 ISSN (Onlne): 1694-0814 www.ijcsi.org 374 An Evolvable Clusterng Based Algorthm to Learn Dstance Functon for Supervsed

More information

Multi-objective Optimization Using Self-adaptive Differential Evolution Algorithm

Multi-objective Optimization Using Self-adaptive Differential Evolution Algorithm Mult-objectve Optmzaton Usng Self-adaptve Dfferental Evoluton Algorthm V. L. Huang, S. Z. Zhao, R. Mallpedd and P. N. Suganthan Abstract - In ths paper, we propose a Multobjectve Self-adaptve Dfferental

More information

GENETIC ALGORITHMS APPLIED FOR PATTERN GENERATION FOR DOWNHOLE DYNAMOMETER CARDS

GENETIC ALGORITHMS APPLIED FOR PATTERN GENERATION FOR DOWNHOLE DYNAMOMETER CARDS GENETIC ALGORITHMS APPLIED FOR PATTERN GENERATION FOR DOWNHOLE DYNAMOMETER CARDS L. Schntman 1 ; B.C.Brandao 1 ; H.Lepkson 1 ; J.A.M. Felppe de Souza 2 ; J.F.S.Correa 3 1 Unversdade Federal da Baha- Brazl

More information

Wavelet-Based Image Compression System with Linear Distortion Control

Wavelet-Based Image Compression System with Linear Distortion Control Je-Hung Lu, Kng-Chu Hung Wavelet-Based Image Compresson System wth Lnear Dstorton Control Je-Hung Lu, Kng-Chu Hung Insttute of Engneerng Scence and Technology Natonal Kaohsung Frst Unversty of Scence and

More information

Outline. Type of Machine Learning. Examples of Application. Unsupervised Learning

Outline. Type of Machine Learning. Examples of Application. Unsupervised Learning Outlne Artfcal Intellgence and ts applcatons Lecture 8 Unsupervsed Learnng Professor Danel Yeung danyeung@eee.org Dr. Patrck Chan patrckchan@eee.org South Chna Unversty of Technology, Chna Introducton

More information

Histogram based Evolutionary Dynamic Image Segmentation

Histogram based Evolutionary Dynamic Image Segmentation Hstogram based Evolutonary Dynamc Image Segmentaton Amya Halder Computer Scence & Engneerng Department St. Thomas College of Engneerng & Technology Kolkata, Inda amya_halder@ndatmes.com Arndam Kar and

More information

Reliable and Efficient Routing Using Adaptive Genetic Algorithm in Packet Switched Networks

Reliable and Efficient Routing Using Adaptive Genetic Algorithm in Packet Switched Networks IJCSI Internatonal Journal of Computer Scence Issues, Vol. 9, Issue 1, No 3, January 2012 ISSN (Onlne): 1694-0814 www.ijcsi.org 168 Relable and Effcent Routng Usng Adaptve Genetc Algorthm n Packet Swtched

More information

Image Emotional Semantic Retrieval Based on ELM

Image Emotional Semantic Retrieval Based on ELM Internatonal Conference on Logstcs Engneerng, Management and Computer Scence (LEMCS 2014) Image Emotonal Semantc Retreval Based on ELM Pele Zhang, Mn Yao, Shenzhang La College of computer scence & Technology

More information

An Influence of the Noise on the Imaging Algorithm in the Electrical Impedance Tomography *

An Influence of the Noise on the Imaging Algorithm in the Electrical Impedance Tomography * Open Journal of Bophyscs, 3, 3, 7- http://dx.do.org/.436/ojbphy.3.347 Publshed Onlne October 3 (http://www.scrp.org/journal/ojbphy) An Influence of the Nose on the Imagng Algorthm n the Electrcal Impedance

More information

Steganography System using Slantlet Transform

Steganography System using Slantlet Transform ISSN:43-6999 Journal of Inmaton Communcaton and Intellgence Systems (JICIS) Volume Issue February 06 Steganography System usng Slantlet Transm Ryadh Bassl Abduljabbar Abstract An approach hdng nmaton has

More information

A Genetic Programming-PCA Hybrid Face Recognition Algorithm

A Genetic Programming-PCA Hybrid Face Recognition Algorithm Journal of Sgnal and Informaton Processng, 20, 2, 70-74 do:0.4236/jsp.20.23022 Publshed Onlne August 20 (http://www.scrp.org/journal/jsp) A Genetc Programmng-PCA Hybrd Face Recognton Algorthm Behzad Bozorgtabar,

More information

Problem Set 3 Solutions

Problem Set 3 Solutions Introducton to Algorthms October 4, 2002 Massachusetts Insttute of Technology 6046J/18410J Professors Erk Demane and Shaf Goldwasser Handout 14 Problem Set 3 Solutons (Exercses were not to be turned n,

More information

Combining Cellular Automata and Particle Swarm Optimization for Edge Detection

Combining Cellular Automata and Particle Swarm Optimization for Edge Detection Combnng Cellular Automata and Partcle Swarm Optmzaton for Edge Detecton Safa Djemame Ferhat Abbes Unversty Sétf, Algera Mohamed Batouche Mentour Unversty Constantne, Algera ABSTRACT Cellular Automata can

More information

The Research of Support Vector Machine in Agricultural Data Classification

The Research of Support Vector Machine in Agricultural Data Classification The Research of Support Vector Machne n Agrcultural Data Classfcaton Le Sh, Qguo Duan, Xnmng Ma, Me Weng College of Informaton and Management Scence, HeNan Agrcultural Unversty, Zhengzhou 45000 Chna Zhengzhou

More information

An Efficient Genetic Algorithm Based Approach for the Minimum Graph Bisection Problem

An Efficient Genetic Algorithm Based Approach for the Minimum Graph Bisection Problem 118 An Effcent Genetc Algorthm Based Approach for the Mnmum Graph Bsecton Problem Zh-Qang Chen, Rong-Long WAG and Kozo OKAZAKI Faculty of Engneerng, Unversty of Fuku, Bunkyo 3-9-1,Fuku-sh, Japan 910-8507

More information

An Iterative Solution Approach to Process Plant Layout using Mixed Integer Optimisation

An Iterative Solution Approach to Process Plant Layout using Mixed Integer Optimisation 17 th European Symposum on Computer Aded Process Engneerng ESCAPE17 V. Plesu and P.S. Agach (Edtors) 2007 Elsever B.V. All rghts reserved. 1 An Iteratve Soluton Approach to Process Plant Layout usng Mxed

More information

A NEW FUZZY C-MEANS BASED SEGMENTATION STRATEGY. APPLICATIONS TO LIP REGION IDENTIFICATION

A NEW FUZZY C-MEANS BASED SEGMENTATION STRATEGY. APPLICATIONS TO LIP REGION IDENTIFICATION A NEW FUZZY C-MEANS BASED SEGMENTATION STRATEGY. APPLICATIONS TO LIP REGION IDENTIFICATION Mhaela Gordan *, Constantne Kotropoulos **, Apostolos Georgaks **, Ioanns Ptas ** * Bass of Electroncs Department,

More information