Adaptive digital watermarking of images using Genetic Algorithm
|
|
- Sabrina Fletcher
- 5 years ago
- Views:
Transcription
1 Adaptve dgtal watermarkng of mages usng Genetc Algorthm Bushra Skander, Muhammad Ishtaq, M. Arfan Jaffar, Muhammad Tarq, Anwar M. Mrza Department of Computer Scence, Natonal Unversty of Computer and Emergng Scences, A. K. Broh Road, H-/4, Islamabad, Pakstan. {bushra.skander, m.shtaq, arfan.jaffar, m.tarq, Abstract- Ths paper presents a new method for adaptve watermark strength optmzaton n Dscrete Cosne Transform (DCT) doman. Watermarkng s a method to embed secret nformaton n the host medum. Optmal strength selecton for watermark s the most crtcal aspect n the whole process and t had attracted many researchers n the recent past. In the proposed method watermark strength s ntellgently selected through Genetc Algorthm (GA). GA helps n perceptual shapng of the watermark such that t s less percevable to the human vsual system. Proposed method shows promsng results aganst dfferent attacks, such as lowpass flter, hgh-pass flter, medan flters, shftng and croppng the marked mage. Expermental results have shown better performance of the proposed method than the current approaches n practce. Index Terms: Dgtal watermarkng, dscrete cosne transform, perceptual shapng, genetc algorthm. I. INTRODUCTION Due to the rapd ncrease n the usage of nternet n the recent past, dgtal data such as audo, vdeo or mages are easly avalable to the publc. Hence protectng such nformaton has become more mportant. Due to ths avalablty many copyrght owners are concerned about protectng ther data or work from llegal replcaton. So t s necessary that some serous work must be done so that such llegal dstrbuton of data must be protected. Ths concern has drawn the attenton of the researchers towards the development of the dgtal mage protecton schemes. Out of many approaches proposed so far to protect the vsual data, dgtal watermarkng s the one that has possbly receved the most mportance. Dgtal watermarkng s embeddng any nformaton wthn the mage, vdeo [22], [23], [24], audo [25], [26], text or 3D [2], [22] models n order to make t secure from unauthorzed usage. A dgtal watermark can be descrbed as an nvsble or vsble recognton code that s embedded nto the data permanently. It means that unlke cryptography the watermarks can protect the content even after the decodng process. The watermark must be embedded n such a way that t does not affect the marked mage qualty and the sgnal embedded s hdden. The frst property s called robustness and the later one s called mperceptblty. Generally n dgtal watermarkng, the watermark s embedded wth the same strength nsde the whole mage. In ths process the local dstrbuton of the cover mage s not consdered. Such embeddng leads to some unwanted vsble objects n the watermarked mage. Mostly these are observed n smooth regons as they are more senstve to nose. The watermarkng strength should be decreased n order to decrease these deformatons. However, there s a possblty that the robustness of the mage s affected or s lost. Thus a sutable watermarkng strength should be selected for each pxel of the mage. Watermarkng s performed n spatal [27], [28], [29] as well as n frequency doman [5], [6], [7]. Recently researchers have been usng frequency doman watermarkng as t allows drect understandng of the content of the mage. When decdng about the strength and poston of the watermark to be embedded nto the mage, the human vsual system characterstcs can be taken nto account more easly. Cox et al., [5] and Pva et al., [3] have performed transformaton on the mage as a whole whle Boland et al., [4] have performed transformaton on block by block bass. Khan et al., [] optmzed the perceptual shapng of the watermark n the whole DCT doman. Hernandez et al., [5] Cox et al., [6] have used Watson s perceptual model [7] to shape the watermark n accordance wth the orgnal mage before the embeddng process. But they are usng an 8x8 block based DCT doman watermarkng. Hung et al., [8], [9] has used the Genetc algorthm to fnd the most favorable embeddng postons n the block-based DCT watermarkng scheme so that the marked mage qualty can be mproved. In ths paper we have used Genetc algorthm to adaptvely select the strength of watermark n the DCT doman. The md-band DCT coeffcents are selected to embed the watermark. In ths way better mperceptblty and robustness have been observed. The rest of the paper s organzed as follows. In secton 2 an ntroducton to genetc algorthm s descrbed. In secton 3 the proposed technque of watermark embeddng and detecton s descrbed. In secton 4 the mplementaton detals are dscussed. The results and dscusson are gven n secton 5. Fnally n secton 6 we conclude the remarks. II. GENETIC ALGORITHM Genetc algorthm (GA) [30] s an evolutonary global optmzaton technque. GA starts wth an ntal populaton of chromosomes.e. a randomly selected set of /0/$ IEEE
2 chromosomes that encode a set of possble solutons. In GA, genes n a chromosome represent the varable of a problem and the chromosomes are evaluated accordng to a ftness crteron. Generally two genetc operators; crossover and mutaton are used for recombnaton. These genetc operators are used to alter the composton of the genes to create new chromosomes (offsprngs). Mutaton alters a small part of the chromosomes whereas crossover changes the genetc materal of the chromosomes. The selecton operator, the Darwnan survval of the fttest among the populaton, s an artfcal verson of natural selecton. Ths s the process of selectng the best chromosomes to create new populaton from one generaton to another. The chromosomes that have hgher ftness have the hgher probablty of beng selected for the next generaton. The GA s shown as follows [8-]. Let P(t) and C(t) be the parent and chld (offsprng) n generaton t. Procedure: GenetcAlgorthm Begn: t 0; Intalze P(t); Evaluate P(t); Whle (not meet termnaton crteron) do Recombne P(t) to create C(t); Evaluate C(t); Select P(t+) from P(t) and C(t); t t + ; End; End; III. PROPOSED METHOD Dgtal watermarkng s the process of embeddng some nformaton nto the dgtal mage or meda by makng some small modfcatons. But these small modfcatons should not affect the mage s vsblty to a large extent. These small modfcatons should also be able to survve some ntentonal or unntentonal attacks. Snce we are focusng on only dgtal mage watermarkng, therefore the mage should be able to survve the common forgery attacks. Even f the attacker s able to remove the watermark from the host mage, the usablty of the mage s lost, hence the watermark must survve n the host medum tll the usablty of the medum s ntact. Cox et al. [5] proposed the usage of a pseudo random sequence of real numbers as the watermark so that nvsblty can be acheved. These sequences should be easly retrevable and should be numerous. Therefore followng hs dea our watermark s also a pseudo-random sequence of real numbers. Watermark should be able to resst the ntentonal attacks. Also the watermark could be easly detectable or extractable from the corrupted and nosy mage. There are two types of watermarkng technques [2] blnd [6] and non-blnd [5]. The frst does not requre the orgnal mage at the tme of detecton whle the later requres the orgnal mage n the extracton process. We have followed the frst technque. A. Dgtal watermark embeddng process In embeddng phase, a pseudo random sequence as the watermark W s nserted nto the orgnal mage I of sze M x N. The embeddng algorthm s as followng: Step : The DCT transformed mage D of I can be obtaned as M 2 (, ) ( ) ( ) N D u v = a u a v x I ( m. n)... MN m= 0 n= 0 (2m + ) uπ (2n + ) vπ cos cos () 2 2 M N / M for u = 0 where a ( u ) = 2 / M for u =,2,..., M / N for v = 0 and a ( v ) = 2 / N for v =, 2,..., N Step 2: After obtanng D, a zgzag scannng s done n order to select the coeffcents for embeddng [6] Zgzag scannng order s gven n fg. 4. Snce the perturbaton n low frequency components as compared to hgh frequency components s generally more percevable to the human eyes therefore ths task s equvalent to sortng accordng to the mportance. Step 3: The ntalzaton of GA s performed. For each chromosome of the GA followng steps are performed. a: The frst L coeffcents are left ntact and the watermark s beng embedded nto the next L+M coeffcents. Suppose the frst L+M DCT coeffcents are: C = { c, c 2,, c L, c L +,, c L + M } (2) And the pseudo-random watermark s gven by W = { w, w2,, w } (3) M The new coeffcents obtaned after embeddng are ~ c L+ = cl+ + α cl+ w (4) where s the watermarkng strength and has values from L to M. b: These newly obtaned coeffcents are renserted nto the zgzag scannng. c: Then by takng the nverse of the modfed DCT coeffcents the watermark mage n the spatal doman s obtaned. d: Calculate the ftness of each chromosome so that the GA operators.e. crossover and mutaton can be appled. Step 4: Repeat steps a-d untl the termnaton crtera s acheved. The block dagram of embeddng process and the GA smulaton are shown n Fgure and Fgure 2 respectvely as below B. Dgtal watermark detecton process Durng the detecton process, Pva et al., [6] used the reverse process for a gven corrupted mage. The detecton algorthm s as followng:
3 Step : Frst the DCT coeffcent matrx of sze M x N s computed. Step 2: Then t s reordered by the zgzag scan. Step 3: Watermark coeffcents from L+ to L+M are selected to form a matrx as follows. ~ C = c,..., ~ L+ c L+ M (5) Step 4: The correlaton of and any matrx s calculated as: Z = W C = M M M = w c L + α (6) Step 5: Ths correlaton Z s then compared to a predefned threshold to determne whether the watermark exsts or not. The block dagram of watermark detecton s shown n Fgure 3. Fgure 2: Chromosome encodng The ftness s computed for each chromosome and then the chromosomes wth hgher ftness are selected for matng usng the crossover and mutaton operators, so that a new populaton of chromosomes s created for the next generaton. Intally, for a populaton sze of 0 chromosomes and 50 generaton, the GA smulaton takes 0 mnute on a Pentum IV- 2.0 GHz machne. Orgnal mage of sze N x N Intalze GA Fnd the DCT coeffcents Apply DCT on mage Evaluate each ndvdual (chromosome) Apply zgzag scan DCT coeffcents are reordered Recombnaton (Crossover/Mutaton) Key Pck selected frequency coeffcents GA Smulaton Evaluate the offsprngs created Watermark Embeddng process Watermarkng strength Selecton of parent and off sprngs Obtan marked DCT coeffcents Apply nverse zgzag scan No Meet termnaton crtera? Watermark mage obtaned Apply nverse DCT Yes Fnd watermarked mage Fgure : Watermark embeddng process IV. IMPLEMENTATION DETAILS To represent a possble soluton usng GA, the chromosome structure, ftness functon, sutable crossover rate, and mutaton rate, populaton sze and maxmum generaton sze must be defned. For the manpulaton of mages ncludng the DCT of the orgnal mage and the selecton of the DCT coeffcents Matlab [20] has been used. The selected coeffcent array and the watermarkng strength are used to embed the watermark nto the mage. The selected DCT coeffcents and the watermarkng strength together make a sngle chromosome as shown n fgure below. Fgure 3: GA Smulaton Fgure 4: Zgzag scan
4 Table : Orgnal and marked mages of sze 52 x 52 Orgnal mage of sze N x N Name Orgnal mage Watermarked mage Apply DCT on mage Fnd the DCT coeffcents Apply zgzag scan DCT coeffcents are reordered Pck selected frequency coeffcents Dfferent Watermarks Watermarkng strength Compute Correlaton Watermark found? Fgure 4: Watermark Detecton The chromosome wth the hghest ftness of the last generaton s then coped and t s used for watermark embeddng n the Matlab envronment. Mean Squared Error (MSE) and Peak Sgnal to Nose Rato () as gven by (7) and (8) are used to check the perceptual mperceptblty of the watermarked mage. MSE = MN M N [ I (m, n) I (m, n)] ' 2 (7) m = 0 n =0 ( I MAX ) 2 = 0 log0 MSE ¹ (8) Where I s the orgnal mage and I' s the watermarked mage. IMAX s the maxmum possble value of the mage I, for an 8-bt per pxel representaton IMAX s 255. Table 2: Performance by varyng generaton sze, best values are n bold face. Standard mages V. EXPERIMENTAL RESULTS AND DISCUSSION A. Watermark embeddng: We have frstly used the standard mage as the cover mage n order to check the robustness of our proposed watermarkng method. The marked mages are shown n table. The mage s marked usng L = and M = The watermarkng strength for each DCT coeffcent s optmzed usng GA. The optmzed strength s n the nterval [0, ]. Followng seres of experments were performed on the standard watermarkng mages to fnd the optmal value of the GA parameters for adaptve watermark strength selecton. Results for 4 mages.e.,, and mages are provded n the paper. Experment seres : Effect of Generaton sze By keepng all the parameters of GA constant and only varyng the no. of generatons from 50 to 250 wth an nterval of 50, the mean, MSE and SSIM readngs over 00 runs of each experment are gven as follows: Performance MSE SSIM MSE SSIM MSE SSIM MSE SSIM Generatons Evolved Here the value of populaton sze was kept 30 chromosomes, the crossover rate was chosen as 70% and the mutaton rate was selected as 30%. From table 2 we can see that for and mage the best s obtaned for 50 generatons and for and mage t s obtaned at 200 generatons. So n next experment.e. varyng the populaton sze we wll use the respectve best generatons of the mages. Experment seres 2: Effect of Populaton sze
5 By only varyng the populaton sze from 0 to 30 wth an nterval of 0 whle keepng the rest of the parameters of GA constant, the mean, MSE and SSIM readngs over 00 runs of each experment are gven as follows: Standard mages Table 3: Performance by varyng populaton sze Performance Populaton sze MSE SSIM MSE SSIM MSE SSIM MSE SSIM Here the value of maxmum no. of generaton was kept 50 for and and 200 for both and mages. The best, MSE and SSIM were obtaned for these generaton no. on these mages n the prevous experment. The crossover rate was kept constant as 70% and mutaton rate as 30% for the standard mages. From table 5 t can be seen that for both and mage the best s obtaned for populaton sze of 20 chromosomes and for both and mage the best s obtaned for populaton sze of 30 chromosomes. So now we wll use these values of populaton szes of respectve mages n the next experment of varyng the crossover rate. Experment seres 3: Effect of Crossover rate Now by varyng the crossover rate and keepng the rest of the GA parameters constant we get the followng results. Table 4: Performance by varyng crossover rate Standard mages Performance Crossover rate MSE SSIM MSE SSIM MSE SSIM MSE SSIM Standard mages Performance Crossover rate MSE SSIM MSE SSIM MSE SSIM MSE SSIM The generaton sze and populaton sze was selected from the best s of experment and 2. And mutaton rate was kept 0.3. From table 8 we can compare the mean, MSE and SSIM; best crossover rate for each mage s gven n boldface. Experment seres 4: Effect of Mutaton rate Followng table s obtaned by varyng the mutaton rate and keepng the remanng GA parameters constant. Table 5: Performance by varyng mutaton rate Standard mages Performance Mutaton rate MSE SSIM MSE SSIM MSE SSIM MSE SSIM The values of the GA parameters as obtaned from experment, 2 and 3 were chosen for the standard mages. The best results were observed at mutaton rate of 0.3 for and and 0.4 for and mages. We have compared our results wth Khan et al., []. The comparson table s shown below: Table 6: Comparson of our technque wth other technques Standard mages Proposed method MSE MSS SSIM A. Khan et al. [] MSE MSS WPM MSE SSIM A. Khan et al. [2] GPM MSE SSIM
6 Here MSS s the mean squared strength of the watermark. It can be calculated as follows: MSS = G G = α 2 (9) Were G s the number of coeffcents selected for watermark embeddng and s the strength of watermark for each th coeffcent. In our case hgh strength watermark was used for embeddng then Khan et al. [], but stll our, MSE and SSIM shows better performance because n our case the watermark s dstrbuted n the less percevable regons of the mages. B. GA Parameters: The values of GA parameters are gven n Table 5 as below. Table 7: GA Parameters Selecton Rank based Max. Generatons 50 (for and ) 200 (for and ) Populaton sze 20 (for and ) 30 (for and ) Crossover rate 70% Mutaton rate 30% (for and ) 40% (for and ) Ftness measure The value of maxmum generaton no., populaton sze, crossover rate and mutaton rate are obtaned by the above experments performed. C. Watermark detecton: The values of L = and M = 6000 has been used for the standard mages durng the detecton process. Then the marked mage s checked for correlaton wth randomly generated 000 watermarks. The hghest correlaton s consdered to be representng the orgnal watermark used n the embeddng process. The detected watermark for the standard mage s shown below: Fgure 5 and Table 8, 9, 0 confrm the robustness of our proposed watermarkng technque wth dfferent attacks. Fgure 6: Detector response wth 3x3 medan attack on mage Dfferent attacks were carred out on the watermarked mages and t survved all the attacks wth the excepton of croppng 90% of the mage, n ths case the usablty of the mage s also lost due to croppng. Hence, n our case watermark survved all the attacks tll the usablty of the watermarked mages s ntact. Table 8: Comparson of the system under dfferent attacks for mage and results comparson wth [] Attack MSE MSE Proposed [] Proposed [] 2x Medan 3x flter 4x x x Low-pass 3x flter 4x x Hgh-pass flter 3x Table 9: Performance on cropped mages Image Croppng MSE SSIM x x x x x Fgure 5: Detecton of watermark for mage D. Survval aganst attacks:
7 Table 0: Watermark detecton of cropped mages Cropped mage Correlaton VI. CONCLUSION AND FUTURE WORK In ths paper a new adaptve dgtal mage watermarkng method s presented. The proposed method uses genetc algorthm to optmze the strength of the watermark for mdband DCT coeffcents. As the watermark strength for the selected coeffcents s not the same but rather t s kept adaptve, n ths way the watermark s spread n the regons of the mage whch have least effect on the mperceptblty of the mage. The mperceptblty and robustness tests show better performance of the proposed method n comparson to other approaches n practce. In future one can use the ftness functon ncorporated wth robustness measure to smultaneously optmze both the requrements of watermarkng. Mult-objectve optmzaton methods can be nvestgated whch mght help n optmzng mperceptblty and robustness at the same tme. REFERENCES [] A. Khan, A. M. Mrza and A. Majd, Optmzng Perceptual shapng of a dgtal watermark usng Genetc Programmng, n Iranan Journal of Electrcal and Computer Engneerng (IJECE), vol. 3, No. 2, pp , 2004 [2] A. Khan, A. M. Mrza and A. Majd, Intellgent perceptual shapng of a dgtal watermark: explotng characterstcs of human vsual system, n Internatonal Journal of Knowledge-based Intellgent Engneerng Systems, (KES), vol. 9, pp. -, 2005 [3] A. Khan, A. M. Mrza, Genetc Perceptual shapng: utlzng cover mage and concevable attack nformaton durng watermark embeddng, n Informaton fuson, vol. 8, ssue 4, pp , 2007 [4] I. Usman, A. Khan, BCH codng and ntellgent watermark embeddng: Employng both frequency and strength selecton, n Appl. Soft Comput., pp , vol. 0, ssue, Jan. 200 [5] I. J. Cox, J. Klan, T. Leghton and T. Shamoon, A Secure, robust watermark for multmeda, Workshop on Informaton Hdng, Newton Insttute, Unv. of Cambrdge, May 996 [6] A. Pva, M. Barn, F. Bartoln, V. Cappelln, DCTbased watermark recoverng wthout resortng to the uncorrupted orgnal mage, Proc Int. Conf. Image Processng, vol. pp , Oct. 997 [7] F. Bartoln, M. Barn, V. Cappelln and A. Pva, Mask buldng for perceptually hdng frequency embedded watermarks, Proceedng of 5th IEEE nternatonal Conference on mage Processng, ICIP 98, Chcago, Illnos, USA, vol., pp , Oct [8]L. Zne-Jung, L. Shh-We, S. Shun-Feng, L. Chun-Yen, A hybrd watermarkng technque appled to dgtal mages, n Appl. Soft Comput., pp , vol. 8, ssue, Jan 2008 [9] D.A. Goldberg, Genetc Algorthms n Search, Optmzaton and Machne Learnng, Addson- Wesley, Readng, MA, 989 [0] Z. Mchalewcz, Genetc algorthms + data structure = evoluton programs, Sprnger-Verlag, Berln, 994 [] M. Gen, R. Cheng, Genetc Algorthms and Engneerng Desgn, John Wley & Sons, Inc., 997 [2] K. Su. Jonathan and B. Grod, Power-spectrum condtons for energy-effcent watermarkng, n IEEE Transacton on multmeda, vol. 4, no. 4, Dec [3]M. Barn, F. Bartolne, V. cappelln and A. Pva, A DCT doman system for Robust Image Watermarkng, Techncal report, department d Ingegnera Ellettronca, Unversta Frenze, 3, 5039 Frenze, Italy, 200 [4] F. M. Boland, J. J. K. O. Ruanadh and C. Dautzenberg, Watermarkng dgtal mages for copyrght protecton, Proc. IEEE Conference on Image Processng and Its Applcatons, pp , July 995 [5] J. R. Hernandez, M. Amado, and F. Perez-Gonzalez, DCT-Doman watermarkng technques for stll mages: Detector performance analyss and a new structure, In IEEE Transactons on Image Processng, vol. 9, Jan [6] M. L. Mller, G. J. Doerr and I. J. Cox, Applyng nformed codng and embeddng to desgn a
8 robust, hgh capacty watermark, IEEE Transacton on Image Processng, 2004 [7] A. B. Watson, Vsual optmzaton of DCT quantzaton matrces for ndvdual mages, n Proc. AIAA Computng n Aerospace 9,.San Dego, CA, pp , 993 [8] Huang and Wu, A watermark optmzaton technque based on genetc algorthm, Proc. SPIE, Vsual Comm. Image, Feb [9] Sheh, Huang, Wang and Pan, Genetc watermarkng based on transform doman technque, Pattern Recognton, vol. 37, pp , 2004 [20] The Math Works, 2009, [2] Q. S. A, Q. Lu, Z. D. Zhou, L. Yang, A new dgtal watermarkng scheme for 3D trangular mesh models, n Sgnal Processng, vol. 89, ssue, pp , Nov [22] W. Wang, G. Zheng, J. Yong, H. Gu, A numercally stable fragle watermarkng scheme for authentcatng 3D models, n Computer Aded Desgn, vol. 40, ssue 5, pp , May 2008 [23] G. Chen, Y. Cheng, Y. Wang, A Robust Adaptve Vdeo Watermarkng Algorthm based on HVS, n Proceedngs of The 9 th Internatonal Conference for Young Computer Scentsts, pp , 2008 [24] Y. Ln, J. Zhao, A new vdeo watermarkng algorthm based on D DFT and random transform source, n Sgnal Processng, vol. 90, ssue 2, pp , Feb. 200 [25] E. Erceleb, L. Batakçı, Audo watermarkng scheme based on embeddng strategy n low frequency components wth a bnary mage source, n Dgtal Sgnal Processng, vol. 9, ssue 2, pp , March 2009 [26] X. Yang, P. Nu, W. Q, A new adaptve dgtal audo watermarkng based on support vector machne, n Journal of Network and Computer Applcatons, vol. 3, ssue 4, pp , Nov [27] O. Fndk, I. Babaoglu, E. Ulker, Watermarkng scheme usng an artfcal mmune system n spatal doman, n Proceedngs of the 2 nd Internatonal conference on Internatonal scences: Informaton Technology, Culture and Human, pp , 2009 [28] Xanyong Wu, Zh-Hong Guan, Zhengpng Wu, A Chaos based robust spatal doman watermarkng algorthm, n Proceedngs of the 4 th nternatonal symposum on Neural Networks: Part II- Advances n Neural Networks, pp. 3-9, 2007 [29] L. Jun, L. LZh, An mproved watermarkng detect algorthm for color mage n spatal doman, n Proceedngs of the 2008 Internatonal Semnar on Future BoMedcal Informaton Engneerng, pp , [30] John H Holland, Adaptaton n Natural and Artfcal Systems, Unversty of Mchgan Press, Ann Arbor, 975.
Hybrid Non-Blind Color Image Watermarking
Hybrd Non-Blnd Color Image Watermarkng Ms C.N.Sujatha 1, Dr. P. Satyanarayana 2 1 Assocate Professor, Dept. of ECE, SNIST, Yamnampet, Ghatkesar Hyderabad-501301, Telangana 2 Professor, Dept. of ECE, AITS,
More informationMeta-heuristics for Multidimensional Knapsack Problems
2012 4th Internatonal Conference on Computer Research and Development IPCSIT vol.39 (2012) (2012) IACSIT Press, Sngapore Meta-heurstcs for Multdmensonal Knapsack Problems Zhbao Man + Computer Scence Department,
More informationIMPLEMENTATION OF QIM BASED AUDIO WATERMARKING USING HYBRID TRANSFORM OF SWT-DCT-SVD METHODS OPTIMIZED WITH GENETIC ALORITHM
IMPLEMENTATION OF QIM BASED AUDIO WATERMARKING USING HYBRID TRANSFORM OF SWT-DCT-SVD METHODS OPTIMIZED WITH GENETIC ALORITHM Ryan Amnullah 1, Gelar Budman 2, Irma Saftr 3 1, 2, 3 FakultasTeknk Elektro,
More informationEnhanced Watermarking Technique for Color Images using Visual Cryptography
Informaton Assurance and Securty Letters 1 (2010) 024-028 Enhanced Watermarkng Technque for Color Images usng Vsual Cryptography Enas F. Al rawashdeh 1, Rawan I.Zaghloul 2 1 Balqa Appled Unversty, MIS
More informationA Binarization Algorithm specialized on Document Images and Photos
A Bnarzaton Algorthm specalzed on Document mages and Photos Ergna Kavalleratou Dept. of nformaton and Communcaton Systems Engneerng Unversty of the Aegean kavalleratou@aegean.gr Abstract n ths paper, a
More informationA NEW AUDIO WATERMARKING METHOD BASED
A NEW AUDIO WATERMARKING METHOD BASED ON DISCRETE COSINE TRANSFORM WITH A GRAY IMAGE Mohammad Ibrahm Khan 1, Md. Iqbal Hasan Sarker 2, Kaushk Deb 3 and Md. Hasan Furhad 4 1,2,3 Department of Computer Scence
More informationA Fast Content-Based Multimedia Retrieval Technique Using Compressed Data
A Fast Content-Based Multmeda Retreval Technque Usng Compressed Data Borko Furht and Pornvt Saksobhavvat NSF Multmeda Laboratory Florda Atlantc Unversty, Boca Raton, Florda 3343 ABSTRACT In ths paper,
More informationA Hybrid Semi-Blind Gray Scale Image Watermarking Algorithm Based on DWT-SVD using Human Visual System Model
A Hybrd Sem-Blnd Gray Scale Image Watermarkng Algorthm Based on DWT-SVD usng Human Vsual System Model Rajesh Mehta r Scence & Engneerng, USICT Guru Gobnd Sngh Indrarprastha Unversty New Delh, Inda rajesh00ust@gmal.com
More informationSemi-Fragile Watermarking Scheme for Authentication of JPEG Images
Tamkang Journal of Scence and Engneerng, Vol. 10, No 1, pp. 5766 (2007) 57 Sem-Fragle Watermarkng Scheme for Authentcaton of JPEG Images Chh-Hung n 1 *, Tung-Shh Su 2 and Wen-Shyong Hseh 2,3 1 Department
More informationParallelism for Nested Loops with Non-uniform and Flow Dependences
Parallelsm for Nested Loops wth Non-unform and Flow Dependences Sam-Jn Jeong Dept. of Informaton & Communcaton Engneerng, Cheonan Unversty, 5, Anseo-dong, Cheonan, Chungnam, 330-80, Korea. seong@cheonan.ac.kr
More informationRobust Video Watermarking Using Image Normalization, Motion Vector and Perceptual Information
Robust Vdeo Watermarkng Usng Image ormalzaton, Moton Vector and Perceptual Informaton Cedllo-Hernández Antono 1, Cedllo-Hernández Manuel 1, akano-myatake Marko 1, García-Vázquez Mreya S. 2 1 Postgraduate
More informationA Lossless Watermarking Scheme for Halftone Image Authentication
IJCSNS Internatonal Journal of Computer Scence and Network Securty, VOL.6 No.2B, February 2006 147 A Lossless Watermarkng Scheme for Halftone Image Authentcaton Jeng-Shyang Pan, Hao Luo, and Zhe-Mng Lu,
More informationKey-Selective Patchwork Method for Audio Watermarking
Internatonal Journal of Dgtal Content Technology and ts Applcatons Volume 4, Number 4, July 2010 Key-Selectve Patchwork Method for Audo Watermarkng 1 Ch-Man Pun, 2 Jng-Jng Jang 1, Frst and Correspondng
More informationContent Based Image Retrieval Using 2-D Discrete Wavelet with Texture Feature with Different Classifiers
IOSR Journal of Electroncs and Communcaton Engneerng (IOSR-JECE) e-issn: 78-834,p- ISSN: 78-8735.Volume 9, Issue, Ver. IV (Mar - Apr. 04), PP 0-07 Content Based Image Retreval Usng -D Dscrete Wavelet wth
More informationResearch Article High Capacity Reversible Watermarking for Audio by Histogram Shifting and Predicted Error Expansion
e Scentfc World Journal, Artcle ID 656251, 7 pages http://dx.do.org/1.1155/214/656251 Research Artcle Hgh Capacty Reversble Watermarkng for Audo by Hstogram Shftng and Predcted Error Expanson Fe Wang,
More informationInformation Hiding Watermarking Detection Technique by PSNR and RGB Intensity
www..org 3 Informaton Hdng Watermarkng Detecton Technque by PSNR and RGB Intensty 1 Neha Chauhan, Akhlesh A. Waoo, 3 P. S. Patheja 1 Research Scholar, BIST, Bhopal, Inda.,3 Assstant Professor, BIST, Bhopal,
More informationDigital Video Watermarking using Discrete Wavelet Transform and Principal Component Analysis
Internatonal Journal of Wsdom Based Computng, Vol. 1 (2), August 2011 7 Dgtal Vdeo Watermarkng usng Dscrete Wavelet Transform and Prncpal Component Analyss Sanjana Snha, Prajnat Bardhan, Swarnal Pramanck,
More informationEVALUATION OF THE PERFORMANCES OF ARTIFICIAL BEE COLONY AND INVASIVE WEED OPTIMIZATION ALGORITHMS ON THE MODIFIED BENCHMARK FUNCTIONS
Academc Research Internatonal ISS-L: 3-9553, ISS: 3-9944 Vol., o. 3, May 0 EVALUATIO OF THE PERFORMACES OF ARTIFICIAL BEE COLOY AD IVASIVE WEED OPTIMIZATIO ALGORITHMS O THE MODIFIED BECHMARK FUCTIOS Dlay
More informationProblem Definitions and Evaluation Criteria for Computational Expensive Optimization
Problem efntons and Evaluaton Crtera for Computatonal Expensve Optmzaton B. Lu 1, Q. Chen and Q. Zhang 3, J. J. Lang 4, P. N. Suganthan, B. Y. Qu 6 1 epartment of Computng, Glyndwr Unversty, UK Faclty
More informationA Fast Visual Tracking Algorithm Based on Circle Pixels Matching
A Fast Vsual Trackng Algorthm Based on Crcle Pxels Matchng Zhqang Hou hou_zhq@sohu.com Chongzhao Han czhan@mal.xjtu.edu.cn Ln Zheng Abstract: A fast vsual trackng algorthm based on crcle pxels matchng
More informationRobust Watermarking for Text Images Based on Arnold Scrambling and DWT-DCT
Internatonal Conference on Mechatroncs Electronc Industral and Control Engneerng (MEIC 015) Robust Watermarkng for Text Images Based on Arnold Scramblng and DWT-DCT Fan Wu College of Informaton Scence
More informationFace Recognition University at Buffalo CSE666 Lecture Slides Resources:
Face Recognton Unversty at Buffalo CSE666 Lecture Sldes Resources: http://www.face-rec.org/algorthms/ Overvew of face recognton algorthms Correlaton - Pxel based correspondence between two face mages Structural
More informationSLAM Summer School 2006 Practical 2: SLAM using Monocular Vision
SLAM Summer School 2006 Practcal 2: SLAM usng Monocular Vson Javer Cvera, Unversty of Zaragoza Andrew J. Davson, Imperal College London J.M.M Montel, Unversty of Zaragoza. josemar@unzar.es, jcvera@unzar.es,
More informationTN348: Openlab Module - Colocalization
TN348: Openlab Module - Colocalzaton Topc The Colocalzaton module provdes the faclty to vsualze and quantfy colocalzaton between pars of mages. The Colocalzaton wndow contans a prevew of the two mages
More informationCluster Analysis of Electrical Behavior
Journal of Computer and Communcatons, 205, 3, 88-93 Publshed Onlne May 205 n ScRes. http://www.scrp.org/ournal/cc http://dx.do.org/0.4236/cc.205.350 Cluster Analyss of Electrcal Behavor Ln Lu Ln Lu, School
More informationShape-adaptive DCT and Its Application in Region-based Image Coding
Internatonal Journal of Sgnal Processng, Image Processng and Pattern Recognton, pp.99-108 http://dx.do.org/10.14257/sp.2014.7.1.10 Shape-adaptve DCT and Its Applcaton n Regon-based Image Codng Yamn Zheng,
More informationImprovement of Spatial Resolution Using BlockMatching Based Motion Estimation and Frame. Integration
Improvement of Spatal Resoluton Usng BlockMatchng Based Moton Estmaton and Frame Integraton Danya Suga and Takayuk Hamamoto Graduate School of Engneerng, Tokyo Unversty of Scence, 6-3-1, Nuku, Katsuska-ku,
More informationA New Token Allocation Algorithm for TCP Traffic in Diffserv Network
A New Token Allocaton Algorthm for TCP Traffc n Dffserv Network A New Token Allocaton Algorthm for TCP Traffc n Dffserv Network S. Sudha and N. Ammasagounden Natonal Insttute of Technology, Truchrappall,
More informationAn Optimal Algorithm for Prufer Codes *
J. Software Engneerng & Applcatons, 2009, 2: 111-115 do:10.4236/jsea.2009.22016 Publshed Onlne July 2009 (www.scrp.org/journal/jsea) An Optmal Algorthm for Prufer Codes * Xaodong Wang 1, 2, Le Wang 3,
More informationDiscrete Cosine Transform Optimization in Image Compression Based on Genetic Algorithm
015 8th Internatonal Congress on Image and Sgnal Processng (CISP 015) Dscrete Cosne Transform Optmzaton n Image Compresson Based on Genetc Algorthm LIU Yuan-yuan 1 CHE He-xn 1 College of Communcaton Engneerng,
More informationA Robust Webpage Information Hiding Method Based on the Slash of Tag
Advanced Engneerng Forum Onlne: 2012-09-26 ISSN: 2234-991X, Vols. 6-7, pp 361-366 do:10.4028/www.scentfc.net/aef.6-7.361 2012 Trans Tech Publcatons, Swtzerland A Robust Webpage Informaton Hdng Method Based
More informationAn Image Compression Algorithm based on Wavelet Transform and LZW
An Image Compresson Algorthm based on Wavelet Transform and LZW Png Luo a, Janyong Yu b School of Chongqng Unversty of Posts and Telecommuncatons, Chongqng, 400065, Chna Abstract a cylpng@63.com, b y27769864@sna.cn
More informationData Hiding and Image Authentication for Color-Palette Images
Data Hdng and Image Authentcaton for Color-Palette Images Chh-Yang Yn ( 殷志揚 ) and Wen-Hsang Tsa ( 蔡文祥 ) Department of Computer & Informaton Scence Natonal Chao Tung Unversty 00 Ta Hsueh Rd., Hsnchu, Tawan
More informationAn Image Fusion Approach Based on Segmentation Region
Rong Wang, L-Qun Gao, Shu Yang, Yu-Hua Cha, and Yan-Chun Lu An Image Fuson Approach Based On Segmentaton Regon An Image Fuson Approach Based on Segmentaton Regon Rong Wang, L-Qun Gao, Shu Yang 3, Yu-Hua
More informationDetermining the Optimal Bandwidth Based on Multi-criterion Fusion
Proceedngs of 01 4th Internatonal Conference on Machne Learnng and Computng IPCSIT vol. 5 (01) (01) IACSIT Press, Sngapore Determnng the Optmal Bandwdth Based on Mult-crteron Fuson Ha-L Lang 1+, Xan-Mn
More informationMaximum Variance Combined with Adaptive Genetic Algorithm for Infrared Image Segmentation
Internatonal Conference on Logstcs Engneerng, Management and Computer Scence (LEMCS 5) Maxmum Varance Combned wth Adaptve Genetc Algorthm for Infrared Image Segmentaton Huxuan Fu College of Automaton Harbn
More informationPARETO BAYESIAN OPTIMIZATION ALGORITHM FOR THE MULTIOBJECTIVE 0/1 KNAPSACK PROBLEM
PARETO BAYESIAN OPTIMIZATION ALGORITHM FOR THE MULTIOBJECTIVE 0/ KNAPSACK PROBLEM Josef Schwarz Jří Očenáše Brno Unversty of Technology Faculty of Engneerng and Computer Scence Department of Computer Scence
More informationKEYWORDS: Digital Image Watermarking, Discrete Wavelet Transform, General Regression Neural Network, Human Visual System. 1.
An Adaptve Dgtal Image Watermarkng Based on Image Features n Dscrete Wavelet Transform Doman and General Regresson Neural Network Ayoub Taher Group of IT Engneerng, Payam Noor Unversty, Broujen, Iran ABSTRACT:
More informationLearning the Kernel Parameters in Kernel Minimum Distance Classifier
Learnng the Kernel Parameters n Kernel Mnmum Dstance Classfer Daoqang Zhang 1,, Songcan Chen and Zh-Hua Zhou 1* 1 Natonal Laboratory for Novel Software Technology Nanjng Unversty, Nanjng 193, Chna Department
More informationSolving two-person zero-sum game by Matlab
Appled Mechancs and Materals Onlne: 2011-02-02 ISSN: 1662-7482, Vols. 50-51, pp 262-265 do:10.4028/www.scentfc.net/amm.50-51.262 2011 Trans Tech Publcatons, Swtzerland Solvng two-person zero-sum game by
More informationResearch of Multiple Text Watermarks Technique in Electric Power System Texts
Sensors & Transducers 203 by IFSA http://www.sensorsportal.com Research of Multple Text atermarks Technque n Electrc Power System Texts Xao-X XING, Qng CHEN, 2 Lan-X FU School of Optcal-Electrcal and Computer
More informationEnhanced AMBTC for Image Compression using Block Classification and Interpolation
Internatonal Journal of Computer Applcatons (0975 8887) Volume 5 No.0, August 0 Enhanced AMBTC for Image Compresson usng Block Classfcaton and Interpolaton S. Vmala Dept. of Comp. Scence Mother Teresa
More informationClassifier Selection Based on Data Complexity Measures *
Classfer Selecton Based on Data Complexty Measures * Edth Hernández-Reyes, J.A. Carrasco-Ochoa, and J.Fco. Martínez-Trndad Natonal Insttute for Astrophyscs, Optcs and Electroncs, Lus Enrque Erro No.1 Sta.
More informationResearch and Application of Fingerprint Recognition Based on MATLAB
Send Orders for Reprnts to reprnts@benthamscence.ae The Open Automaton and Control Systems Journal, 205, 7, 07-07 Open Access Research and Applcaton of Fngerprnt Recognton Based on MATLAB Nng Lu* Department
More informationGA-Based Learning Algorithms to Identify Fuzzy Rules for Fuzzy Neural Networks
Seventh Internatonal Conference on Intellgent Systems Desgn and Applcatons GA-Based Learnng Algorthms to Identfy Fuzzy Rules for Fuzzy Neural Networks K Almejall, K Dahal, Member IEEE, and A Hossan, Member
More informationA Comparison between Digital Images Watermarking in Tow Different Color Spaces Using DWT2*
A Comparson between Dgtal s ng n Tow Dfferent Color Spaces Usng DWT* Mehd Khall Natonal Academy of Scence of Armena Yerevan, Armena e-mal: khall.mehd@yahoo.com ABSTRACT A novel dgtal watermarkng for ownershp
More informationA Secured Method for Image Steganography Based On Pixel Values
A Secured Method for Image Steganography Based On Pxel Values Tarun Gulat #, Sanskrt Gupta * # Assocate Professor, Electroncs and Communcaton Engneerng Department, MMEC, M.M.U., Mullana, Ambala, Haryana,
More informationCracking of the Merkle Hellman Cryptosystem Using Genetic Algorithm
Crackng of the Merkle Hellman Cryptosystem Usng Genetc Algorthm Zurab Kochladze 1 * & Lal Besela 2 1 Ivane Javakhshvl Tbls State Unversty, 1, I.Chavchavadze av 1, 0128, Tbls, Georga 2 Sokhum State Unversty,
More informationAn Efficient Genetic Algorithm with Fuzzy c-means Clustering for Traveling Salesman Problem
An Effcent Genetc Algorthm wth Fuzzy c-means Clusterng for Travelng Salesman Problem Jong-Won Yoon and Sung-Bae Cho Dept. of Computer Scence Yonse Unversty Seoul, Korea jwyoon@sclab.yonse.ac.r, sbcho@cs.yonse.ac.r
More informationIAJIT First Online Publication
Content Protecton n Vdeo Data Based on Robust Dgtal Watermarkng Resstant to Intentonal and Unntentonal Attacks Mad Masoum and Shervn Amr Department of Electrcal Engneerng, Islamc Azad Unversty Qazvn Branch,
More informationSubspace clustering. Clustering. Fundamental to all clustering techniques is the choice of distance measure between data points;
Subspace clusterng Clusterng Fundamental to all clusterng technques s the choce of dstance measure between data ponts; D q ( ) ( ) 2 x x = x x, j k = 1 k jk Squared Eucldean dstance Assumpton: All features
More informationDeep learning is a good steganalysis tool when embedding key is reused for different images, even if there is a cover source-mismatch
Deep learnng s a good steganalyss tool when embeddng key s reused for dfferent mages, even f there s a cover source-msmatch Lonel PIBRE 2,3, Jérôme PASQUET 2,3, Dno IENCO 2,3, Marc CHAUMONT 1,2,3 (1) Unversty
More informationA Novel Approach for an Early Test Case Generation using Genetic Algorithm and Dominance Concept based on Use cases
Alekhya Varkut et al, / (IJCSIT) Internatonal Journal of Computer Scence and Informaton Technologes, Vol. 3 (3), 2012,4218-4224 A Novel Approach for an Early Test Case Generaton usng Genetc Algorthm and
More informationRobust Blind Video Watermark Algorithm in Transform Domain Combining with 3D Video Correlation
JOURNAL OF MULTIMEDIA, VOL. 8, NO. 2, APRIL 2013 161 Robust Blnd Vdeo Watermark Algorthm n Transform Doman Combnng wth 3D Vdeo Correlaton DING Ha-yang 1,3 1. Informaton Securty Center, Bejng Unversty of
More informationA PATTERN RECOGNITION APPROACH TO IMAGE SEGMENTATION
1 THE PUBLISHING HOUSE PROCEEDINGS OF THE ROMANIAN ACADEMY, Seres A, OF THE ROMANIAN ACADEMY Volume 4, Number 2/2003, pp.000-000 A PATTERN RECOGNITION APPROACH TO IMAGE SEGMENTATION Tudor BARBU Insttute
More informationPerformance Analysis of Data Hiding in MPEG-4 AAC Audio *
TSINGHUA SCIENCE AND TECHNOLOGY ISSNll1007-0214ll07/21llpp55-61 Volume 14, Number 1, February 2009 Performance Analyss of Data Hdng n MPEG-4 AAC Audo * XU Shuzheng ( ) **, ZHANG Peng ( ), WANG Pengjun
More informationUsing Counter-propagation Neural Network for Digital Audio Watermarking
Usng Counter-propagaton Neural Network for Dgtal Audo Watermarkng Chuan-Yu Chang and Wen-Chh Shen Graduate School of Computer Scence and Informaton Engneerng Natonal Yunln Unversty of Scence & Technology
More informationAn Improved Image Segmentation Algorithm Based on the Otsu Method
3th ACIS Internatonal Conference on Software Engneerng, Artfcal Intellgence, Networkng arallel/dstrbuted Computng An Improved Image Segmentaton Algorthm Based on the Otsu Method Mengxng Huang, enjao Yu,
More informationPrivate Information Retrieval (PIR)
2 Levente Buttyán Problem formulaton Alce wants to obtan nformaton from a database, but she does not want the database to learn whch nformaton she wanted e.g., Alce s an nvestor queryng a stock-market
More informationCHAPTER 2 PROPOSED IMPROVED PARTICLE SWARM OPTIMIZATION
24 CHAPTER 2 PROPOSED IMPROVED PARTICLE SWARM OPTIMIZATION The present chapter proposes an IPSO approach for multprocessor task schedulng problem wth two classfcatons, namely, statc ndependent tasks and
More informationA GENETIC ALGORITHM FOR PROCESS SCHEDULING IN DISTRIBUTED OPERATING SYSTEMS CONSIDERING LOAD BALANCING
A GENETIC ALGORITHM FOR PROCESS SCHEDULING IN DISTRIBUTED OPERATING SYSTEMS CONSIDERING LOAD BALANCING M. Nkravan and M. H. Kashan Department of Electrcal Computer Islamc Azad Unversty, Shahrar Shahreqods
More informationFuzzy C-Means Initialized by Fixed Threshold Clustering for Improving Image Retrieval
Fuzzy -Means Intalzed by Fxed Threshold lusterng for Improvng Image Retreval NAWARA HANSIRI, SIRIPORN SUPRATID,HOM KIMPAN 3 Faculty of Informaton Technology Rangst Unversty Muang-Ake, Paholyotn Road, Patumtan,
More informationVectorization of Image Outlines Using Rational Spline and Genetic Algorithm
01 Internatonal Conference on Image, Vson and Computng (ICIVC 01) IPCSIT vol. 50 (01) (01) IACSIT Press, Sngapore DOI: 10.776/IPCSIT.01.V50.4 Vectorzaton of Image Outlnes Usng Ratonal Splne and Genetc
More informationUnsupervised Learning and Clustering
Unsupervsed Learnng and Clusterng Supervsed vs. Unsupervsed Learnng Up to now we consdered supervsed learnng scenaro, where we are gven 1. samples 1,, n 2. class labels for all samples 1,, n Ths s also
More informationSum of Linear and Fractional Multiobjective Programming Problem under Fuzzy Rules Constraints
Australan Journal of Basc and Appled Scences, 2(4): 1204-1208, 2008 ISSN 1991-8178 Sum of Lnear and Fractonal Multobjectve Programmng Problem under Fuzzy Rules Constrants 1 2 Sanjay Jan and Kalash Lachhwan
More informationApplication of Improved Fish Swarm Algorithm in Cloud Computing Resource Scheduling
, pp.40-45 http://dx.do.org/10.14257/astl.2017.143.08 Applcaton of Improved Fsh Swarm Algorthm n Cloud Computng Resource Schedulng Yu Lu, Fangtao Lu School of Informaton Engneerng, Chongqng Vocatonal Insttute
More informationVirtual Machine Migration based on Trust Measurement of Computer Node
Appled Mechancs and Materals Onlne: 2014-04-04 ISSN: 1662-7482, Vols. 536-537, pp 678-682 do:10.4028/www.scentfc.net/amm.536-537.678 2014 Trans Tech Publcatons, Swtzerland Vrtual Machne Mgraton based on
More informationCHAPTER 4 OPTIMIZATION TECHNIQUES
48 CHAPTER 4 OPTIMIZATION TECHNIQUES 4.1 INTRODUCTION Unfortunately no sngle optmzaton algorthm exsts that can be appled effcently to all types of problems. The method chosen for any partcular case wll
More informationA fast algorithm for color image segmentation
Unersty of Wollongong Research Onlne Faculty of Informatcs - Papers (Arche) Faculty of Engneerng and Informaton Scences 006 A fast algorthm for color mage segmentaton L. Dong Unersty of Wollongong, lju@uow.edu.au
More informationVideo Watermarking Algorithm Based on Relative Relationship of DCT Coefficients
756 JOURAL OF COPUTERS, VOL. 8, O., OVEBER 03 Vdeo Watermarkng Algorthm Based on Relatve Relatonshp of DCT Coeffcents Cheng ngzh, Du Yanpng, Wang Yan Bejng Insttute of Graphc Communcaton, Bejng, Chna Emal:
More informationFeature Selection for Target Detection in SAR Images
Feature Selecton for Detecton n SAR Images Br Bhanu, Yngqang Ln and Shqn Wang Center for Research n Intellgent Systems Unversty of Calforna, Rversde, CA 95, USA Abstract A genetc algorthm (GA) approach
More informationResolving Ambiguity in Depth Extraction for Motion Capture using Genetic Algorithm
Resolvng Ambguty n Depth Extracton for Moton Capture usng Genetc Algorthm Yn Yee Wa, Ch Kn Chow, Tong Lee Computer Vson and Image Processng Laboratory Dept. of Electronc Engneerng The Chnese Unversty of
More informationCoding Artifact Reduction Using Edge Map Guided Adaptive and Fuzzy Filter
MEL A MITSUBISHI ELECTIC ESEACH LABOATOY http://www.merl.com Codng Artfact educton Usng Edge Map Guded Adaptve and Fuzzy Flter Hao-Song Kong Yao Ne Anthony Vetro Hufang Sun Kenneth E. Barner T-2004-056
More informationMULTISPECTRAL IMAGES CLASSIFICATION BASED ON KLT AND ATR AUTOMATIC TARGET RECOGNITION
MULTISPECTRAL IMAGES CLASSIFICATION BASED ON KLT AND ATR AUTOMATIC TARGET RECOGNITION Paulo Quntlano 1 & Antono Santa-Rosa 1 Federal Polce Department, Brasla, Brazl. E-mals: quntlano.pqs@dpf.gov.br and
More informationIdentify the Attack in Embedded Image with Steganalysis Detection Method by PSNR and RGB Intensity
Internatonal Journal of Computer Systems (ISSN: 394-1065), Volume 03 Issue 07, July, 016 Avalable at http://www.jcsonlne.com/ Identfy the Attack n Embedded Image wth Steganalyss Detecton Method by PSNR
More informationA Hybrid Digital Image Watermarking based on Discrete Wavelet Transform, Discrete Cosine Transform, and General Regression Neural Network
A Hybrd Dgtal Image Watermarkng based on Dscrete Wavelet Transform, Dscrete Cosne Transform, and General Regresson Neural Network Ayoub Taher ; ABSTRACT In ths paper, a new hybrd dgtal watermarkng technque
More informationExtraction of Fuzzy Rules from Trained Neural Network Using Evolutionary Algorithm *
Extracton of Fuzzy Rules from Traned Neural Network Usng Evolutonary Algorthm * Urszula Markowska-Kaczmar, Wojcech Trelak Wrocław Unversty of Technology, Poland kaczmar@c.pwr.wroc.pl, trelak@c.pwr.wroc.pl
More informationComparison of Heuristics for Scheduling Independent Tasks on Heterogeneous Distributed Environments
Comparson of Heurstcs for Schedulng Independent Tasks on Heterogeneous Dstrbuted Envronments Hesam Izakan¹, Ath Abraham², Senor Member, IEEE, Václav Snášel³ ¹ Islamc Azad Unversty, Ramsar Branch, Ramsar,
More informationNUMERICAL SOLVING OPTIMAL CONTROL PROBLEMS BY THE METHOD OF VARIATIONS
ARPN Journal of Engneerng and Appled Scences 006-017 Asan Research Publshng Network (ARPN). All rghts reserved. NUMERICAL SOLVING OPTIMAL CONTROL PROBLEMS BY THE METHOD OF VARIATIONS Igor Grgoryev, Svetlana
More informationYuan Xu School of automation, Northwestern Polytechnical University, Xian , China. Huifeng Xue. Ailong Liu*
Rev. Téc. Ing. Unv. Zula. Vol. 39, Nº 7, 80-86, 2016 do:10.21311/001.39.7.10 A Parallel Genetc Algorthm for the Verfyng Smulaton of the Performance Prototype Yuan Xu School of automaton, Northwestern Polytechncal
More informationHigh-Boost Mesh Filtering for 3-D Shape Enhancement
Hgh-Boost Mesh Flterng for 3-D Shape Enhancement Hrokazu Yagou Λ Alexander Belyaev y Damng We z Λ y z ; ; Shape Modelng Laboratory, Unversty of Azu, Azu-Wakamatsu 965-8580 Japan y Computer Graphcs Group,
More informationHigh Payload Reversible Data Hiding Scheme Using Difference Segmentation and Histogram Shifting
JOURNAL OF ELECTRONIC SCIENCE AND TECHNOLOGY, VOL. 11, NO. 1, MARCH 2013 9 Hgh Payload Reversble Data Hdng Scheme Usng Dfference Segmentaton and Hstogram Shftng Yung-Chen Chou and Huang-Chng L Abstract
More informationA MOVING MESH APPROACH FOR SIMULATION BUDGET ALLOCATION ON CONTINUOUS DOMAINS
Proceedngs of the Wnter Smulaton Conference M E Kuhl, N M Steger, F B Armstrong, and J A Jones, eds A MOVING MESH APPROACH FOR SIMULATION BUDGET ALLOCATION ON CONTINUOUS DOMAINS Mark W Brantley Chun-Hung
More informationAn Evolvable Clustering Based Algorithm to Learn Distance Function for Supervised Environment
IJCSI Internatonal Journal of Computer Scence Issues, Vol. 7, Issue 5, September 2010 ISSN (Onlne): 1694-0814 www.ijcsi.org 374 An Evolvable Clusterng Based Algorthm to Learn Dstance Functon for Supervsed
More informationMulti-objective Optimization Using Self-adaptive Differential Evolution Algorithm
Mult-objectve Optmzaton Usng Self-adaptve Dfferental Evoluton Algorthm V. L. Huang, S. Z. Zhao, R. Mallpedd and P. N. Suganthan Abstract - In ths paper, we propose a Multobjectve Self-adaptve Dfferental
More informationGENETIC ALGORITHMS APPLIED FOR PATTERN GENERATION FOR DOWNHOLE DYNAMOMETER CARDS
GENETIC ALGORITHMS APPLIED FOR PATTERN GENERATION FOR DOWNHOLE DYNAMOMETER CARDS L. Schntman 1 ; B.C.Brandao 1 ; H.Lepkson 1 ; J.A.M. Felppe de Souza 2 ; J.F.S.Correa 3 1 Unversdade Federal da Baha- Brazl
More informationWavelet-Based Image Compression System with Linear Distortion Control
Je-Hung Lu, Kng-Chu Hung Wavelet-Based Image Compresson System wth Lnear Dstorton Control Je-Hung Lu, Kng-Chu Hung Insttute of Engneerng Scence and Technology Natonal Kaohsung Frst Unversty of Scence and
More informationOutline. Type of Machine Learning. Examples of Application. Unsupervised Learning
Outlne Artfcal Intellgence and ts applcatons Lecture 8 Unsupervsed Learnng Professor Danel Yeung danyeung@eee.org Dr. Patrck Chan patrckchan@eee.org South Chna Unversty of Technology, Chna Introducton
More informationHistogram based Evolutionary Dynamic Image Segmentation
Hstogram based Evolutonary Dynamc Image Segmentaton Amya Halder Computer Scence & Engneerng Department St. Thomas College of Engneerng & Technology Kolkata, Inda amya_halder@ndatmes.com Arndam Kar and
More informationReliable and Efficient Routing Using Adaptive Genetic Algorithm in Packet Switched Networks
IJCSI Internatonal Journal of Computer Scence Issues, Vol. 9, Issue 1, No 3, January 2012 ISSN (Onlne): 1694-0814 www.ijcsi.org 168 Relable and Effcent Routng Usng Adaptve Genetc Algorthm n Packet Swtched
More informationImage Emotional Semantic Retrieval Based on ELM
Internatonal Conference on Logstcs Engneerng, Management and Computer Scence (LEMCS 2014) Image Emotonal Semantc Retreval Based on ELM Pele Zhang, Mn Yao, Shenzhang La College of computer scence & Technology
More informationAn Influence of the Noise on the Imaging Algorithm in the Electrical Impedance Tomography *
Open Journal of Bophyscs, 3, 3, 7- http://dx.do.org/.436/ojbphy.3.347 Publshed Onlne October 3 (http://www.scrp.org/journal/ojbphy) An Influence of the Nose on the Imagng Algorthm n the Electrcal Impedance
More informationSteganography System using Slantlet Transform
ISSN:43-6999 Journal of Inmaton Communcaton and Intellgence Systems (JICIS) Volume Issue February 06 Steganography System usng Slantlet Transm Ryadh Bassl Abduljabbar Abstract An approach hdng nmaton has
More informationA Genetic Programming-PCA Hybrid Face Recognition Algorithm
Journal of Sgnal and Informaton Processng, 20, 2, 70-74 do:0.4236/jsp.20.23022 Publshed Onlne August 20 (http://www.scrp.org/journal/jsp) A Genetc Programmng-PCA Hybrd Face Recognton Algorthm Behzad Bozorgtabar,
More informationProblem Set 3 Solutions
Introducton to Algorthms October 4, 2002 Massachusetts Insttute of Technology 6046J/18410J Professors Erk Demane and Shaf Goldwasser Handout 14 Problem Set 3 Solutons (Exercses were not to be turned n,
More informationCombining Cellular Automata and Particle Swarm Optimization for Edge Detection
Combnng Cellular Automata and Partcle Swarm Optmzaton for Edge Detecton Safa Djemame Ferhat Abbes Unversty Sétf, Algera Mohamed Batouche Mentour Unversty Constantne, Algera ABSTRACT Cellular Automata can
More informationThe Research of Support Vector Machine in Agricultural Data Classification
The Research of Support Vector Machne n Agrcultural Data Classfcaton Le Sh, Qguo Duan, Xnmng Ma, Me Weng College of Informaton and Management Scence, HeNan Agrcultural Unversty, Zhengzhou 45000 Chna Zhengzhou
More informationAn Efficient Genetic Algorithm Based Approach for the Minimum Graph Bisection Problem
118 An Effcent Genetc Algorthm Based Approach for the Mnmum Graph Bsecton Problem Zh-Qang Chen, Rong-Long WAG and Kozo OKAZAKI Faculty of Engneerng, Unversty of Fuku, Bunkyo 3-9-1,Fuku-sh, Japan 910-8507
More informationAn Iterative Solution Approach to Process Plant Layout using Mixed Integer Optimisation
17 th European Symposum on Computer Aded Process Engneerng ESCAPE17 V. Plesu and P.S. Agach (Edtors) 2007 Elsever B.V. All rghts reserved. 1 An Iteratve Soluton Approach to Process Plant Layout usng Mxed
More informationA NEW FUZZY C-MEANS BASED SEGMENTATION STRATEGY. APPLICATIONS TO LIP REGION IDENTIFICATION
A NEW FUZZY C-MEANS BASED SEGMENTATION STRATEGY. APPLICATIONS TO LIP REGION IDENTIFICATION Mhaela Gordan *, Constantne Kotropoulos **, Apostolos Georgaks **, Ioanns Ptas ** * Bass of Electroncs Department,
More information