Distortion Function Designing for JPEG Steganography with Uncompressed Side-image

Size: px
Start display at page:

Download "Distortion Function Designing for JPEG Steganography with Uncompressed Side-image"

Transcription

1 Dstorton Functon Desgnng for JPEG Steganography wth Uncompressed Sde-mage Fangjun Huang School of Informaton Scence and Technology, Sun Yat-Sen Unversty, GD 56, Chna Jwu Huang School of Informaton Scence and Technology, Sun Yat-Sen Unversty, GD 56, Chna Weq Luo School of Software, Sun Yat-Sen Unversty, GD 56, Chna Yun-Qng Sh Department of Electrcal and Computer Engneerng, New Jersey Insttute of Technology, NJ 72, USA ABSTRACT In ths paper, we present a new framework for desgnng dstorton functons of jont photographc experts group (JPEG) steganography wth uncompressed sde-mage. In our framework, the dscrete cosne transform (DCT) coeffcents, ncludng all drect current (DC) coeffcents and alternatng current (AC) coeffcents, are dvded nto two groups: frst-prorty group (FPG) and second-prorty group (SPG). Dfferent strateges are establshed to assocate the dstorton values to the coeffcents n FPG and SPG, respectvely. In ths paper, three scenaros for dvdng the coeffcents nto FPG and SPG are exemplfed, whch can be utlzed to form a seres of new dstorton functons. Expermental results demonstrate that whle applyng these generated dstorton functons to JPEG steganography, the ntrnsc statstcal characterstcs of the carrer mage wll be preserved better than the pror-art, and consequently the securty performance of the correspondng JPEG steganography can be mproved sgnfcantly. Categores and Subject Descrptors I.4 [Image Processng and computer vson] Keywords JPEG, steganography, steganalyzer, dstorton functon. INTRODUCTION The key concept behnd the securty of steganographc systems s the statstcal un-detectablty. It may be nfluenced by many factors [], such as the choce of cover object, the type of modfcaton operaton on cover elements, the number of embeddng changes (related to the payload), and the dstorton functons used to dentfy ndvdual elements of cover that could be modfed durng embeddng. Assume that the frst three factors mentoned above are the same, desgnng the dstorton functon wll be an mportant approach to mnmzng the mpact caused by embeddng, and thus mprove the securty performance of steganography. Permsson to make dgtal or hard copes of all or part of ths work for personal or classroom use s granted wthout fee provded that copes are not made or dstrbuted for proft or commercal advantage and that copes bear ths notce and the full ctaton on the frst page. To copy otherwse, or republsh, to post on servers or to redstrbute to lsts, requres pror specfc permsson and/or a fee. IH&MMSec 3, June 7 9, 23, Montpeller, France. Copyrght ACM /3/6...$5.. To mnmze the mpact caused by data embeddng, the sender should choose to modfy those elements (pxels/coeffcents) n such a way that the caused detectable dstorton s as small as possble. Embeddng the secret message bts under the gudance of mnmzng dstorton functon can mprove the securty performance of steganography and has been known for a long tme. In [2], Frdrch et al. presented the perturbed quantzaton (PQ) steganography. As a specfc case, they ponted out that the sender can constran the embeddng changes to those DCT coeffcents that experence the largest quantzaton error,.e., the coeffcents wth the quantzaton error of ± ( s a small postve number). Such knd of coeffcents, when rounded to the other value, may leave the smallest embeddng dstorton. In [3], another two adaptve versons of PQ,.e., texture-adaptve PQ (PQt) and energy-adaptve PQ (PQe) have been presented. Through consderng the local block content such as texture complexty and energy capacty, JPEG steganography wth hgher securty performance can be obtaned. In [4-6], the authors have combned quantzaton step wth quantzaton error n ther dstorton functon to mprove the securty performance of JPEG steganography. Besdes the quantzaton step, Wang and N [7] presented a new JPEG dstorton functon wth consderaton of the block entropy, and the expermental results demonstrate that ths new dstorton functon may lead to less detectablty of steganalyzers. Recently, Huang et al. [8] presented another dstorton functon for JPEG steganography, whch s called new PQ (NPQ). Three factors are consdered,.e., the quantzaton error, the quantzaton step and the magntude of quantzed DCT coeffcents to be modfed. Va nonlnearly combnng these three dfferent factors, the new dstorton functon, NPQ, can mprove the securty performance of JPEG steganography sgnfcantly as demonstrated n [8]. All the aforementoned dstorton functons are employed to fnd the DCT coeffcents that may result n less detectable dstorton after modfcaton. Generally, they are appled together wth the utlzaton of matrx encodng (embeddng) technology [9, ]. For example, n [2] Frdrch et al. have exemplfed how to mplement PQ dstorton functon n JPEG steganography wth the help of Wet paper codes [, 2]. In [3], Km et al. provded a smple and practcal scheme to apply PQ dstorton functon wth matrx encodng, whch s based on modfed bnary Hammng codes [4]. Ths new matrx encodng strategy allows more than one embeddng change n each coeffcent block. Va a bruteforce search, the modfcatons are made on those coeffcents that may ntroduce mnmal detectable dstorton, and thus mprovng 69

2 the securty performance of the correspondng JPEG steganography. Accordng to the number of allowable changng bts n each coeffcent block, these modfed matrx encodng (MME) schemes are called MME2, MME3, etc. Smlar approach can also be made based on BCH (Bose, Chaudhur and Hocquenghem) codes [4] to mprove the embeddng effcency of matrx encodng as descrbed n [4, 6, 5, 6]. However, snce the decodng of BCH codes s much more complcated than Hammng codes, some specfc technques need to be adopted by the sender to reduce the tme complexty and storage complexty n the embeddng process. In [5], Fller et al. provded the syndrome-trells codes (STCs), whch can be utlzed for embeddng whle mnmzng an arbtrary addtve dstorton functon wth a performance near the theoretcal bound. Ths new methodology can drectly mprove the securty performance of many exstng steganographc schemes, allowng them to communcate larger payloads at the same embeddng dstorton or to decrease the dstorton for a gven payload. In ths paper, we present a new framework for desgnng dstorton functons wth uncompressed sde-mage, whch can be appled to JPEG steganography usng any of the above mentoned matrx encodng strateges. In our framework, the DCT coeffcents, ncludng the drect current (DC) coeffcents and all the alternatng current (AC) coeffcents of JPEG mage are dvded nto two groups: frst-prorty group (FPG) and secondprorty group (SPG). Dfferent strateges wll be establshed to assocate the dstorton values to the coeffcents n FPG and SPG, respectvely. Generally, the coeffcents that may result n less detectable dstorton n the embeddng process are grouped nto FPG and the rest are nto SPG. Note that n our framework, all DCT coeffcents are utlzed for matrx encodng, and we beleve that any DCT coeffcent can be modfed n the embeddng process. In an extreme case, we can change any sngle coeffcent n a gven JPEG mage and the ntroduced dstorton wll not be perceved by today s most powerful JPEG steganalyzers. Thus n our framework, no coeffcent s consdered as un-changeable, and any DCT coeffcent can be modfed f needed n the embeddng process. That s also the man dfference between the dstorton functons generated from our framework and those prevously presented n the lterature. In ths paper, three dfferent scenaros for dvdng the coeffcents nto FPG and SPG are exemplfed, whch can be utlzed to form a seres of new dstorton functons. Va applyng these generated dstorton functons n JPEG steganography wth matrx encodng, the modfcatons wll manly be made on those coeffcents that may result n less detectable dstorton n the embeddng process. Thus JPEG steganography wth hgher securty performance can be obtaned. The rest of ths paper s organzed as follows. In Secton II, the proposed new framework s ntroduced. Expermental results and analyss are llustrated n Secton III, and the concluson s drawn n Secton IV. 2. PROPOSED FRAMEWORK Suppose the raw, uncompressed sde-mage s avalable to the sender. The DCT coeffcents that have been dvded by quantzaton steps and not yet rounded are called un-rounded DCT coeffcents, and those that have been dvded by the quantzaton steps and rounded are called quantzed DCT coeffcents, respectvely. To facltate the explanaton, the exstng dstorton functons such as PQ [2] and are referred to as ordnary dstorton functons, and those to be proposed below n ths paper are referred to as advanced dstorton functons. To make ths paper self-contaned, we wll ntroduce the PQ and NPQ dstorton functons frstly. 2. PQ and NPQ Wthout loss of generalty, the quantzed coeffcents and unrounded DCT coeffcents utlzed for data hdng are represented by C = c, c,, c ) and C = ( c', c',, c' ), ( 2 N ' 2 N respectvely, where N represents the number of DCT coeffcents n the quantzed and un-rounded coeffcent sequence. The relatonshp between c ( N) and c' ( N) s as follows. c = round( c' ) () where round(x) s a functon that rounds the element x to the nearest nteger. Note that n Equaton (), c represents the quantzed DCT coeffcent that s obtaned n JPEG compresson wthout secret message embeddng. Suppose that whle embeddng the secret message the modfcaton needs to be made on c, and the coeffcent after beng modfed s represented by s. The PQ dstorton functon s represented as follows. d PQ c = c c' s c' (2) where x s a functon that returns the absolute value of the correspondng element x. For any coeffcent c, the PQ dstorton PQ value d c can be computed accordng to Equaton (2). As ponted out n [2, 3], whle embeddng the secret message bts, the sender should select those coeffcents wth mnmal PQ dstorton values for modfcaton. NPQ can be regarded as an mproved verson of PQ consderng the quantzaton step and the magntude of the quantzed DCT coeffcents to be modfed. Suppose the quantzaton step assocated wth the coeffcent c s q. Accordng to [8], the NPQ dstorton functon s represented as follows. d NPQ PQ λ λ2 c = dc ( q ) ( μ+ c ) (3) where λ and λ 2 are two parameters that are used to control the q and c, respectvely. As recommended mpacts caused by n [8], the two control parameters λ and λ 2 can be selected n the rage of (, ]. The parameter μ s utlzed to avod the zero dvsors n Equaton (3). When NPQ s only utlzed to compute the dstorton value correspondng to the non-zero DCT coeffcents, μ s selected as. Otherwse, the parameter μ can be selected as a small number, e.g., the number of. For any NPQ coeffcent c, the NPQ dstorton value d c can be computed accordng to Equaton (3). As ponted out n [8], whle embeddng the secret message bts, the sender can select those coeffcents 7

3 wth mnmal NPQ dstorton values for modfcaton to obtan JPEG steganography wth hgh securty performance. 2.2 The Proposed Dstorton functon As mentoned above, n our new framework the DCT coeffcents are dvded nto two groups: FPG and SPG. The coeffcents n FPG and SPG are assocated wth dstorton values calculated va usng dfferent strateges. Frstly, the mpact caused by the modfcatons of coeffcents n FPG and SPG are measured usng some ordnary dstorton functons. Secondly, those obtaned dstorton values assocated wth the coeffcents n SPG are multpled by a penalty factor, whch s a bg value. Thus the dstorton values assocated wth the coeffcents n FPG may be much less than that n SPG n general n our advanced dstorton functon. When conductng matrx encodng wth some syndrome codes as n [4-8, 3, 6], several alternatve solutons may be produced and those coeffcents n FPG that may result n less dstorton n the embeddng process wll take precedence for modfcaton. Even f all the alternatve solutons are restrcted to those coeffcents n SPG, the coeffcents n SPG assocated wth smaller ordnary dstorton values wll stll take precedence for modfcaton. That s, the advanced dstorton functons generated from our framework can orentate us to make as less dstorton as possble n embeddng the secret message bts, and thus the securty performance of JPEG steganography wll be mproved. The proposed advanced dstorton functon s defned n Equaton (4). d ADV = d ORD ( + ρ) (4) c In Equaton (4), the c d represents the mpact caused by ORD c modfcaton operaton on coeffcent c, whch s computed accordng to the ordnary (abbrevated as ORD ) dstorton functons such as PQ, NPQ and some others. The penalty factor ρ s selected as a bg value (e.g., 6 ) f the coeffcent c SPG, otherwse t s selected as. Accordng to Equaton (4), for any coeffcent c n the nput mage, the advanced (abbrevated as ADV ) dstorton value d ADV can be easly computed. Va applyng the advanced dstorton functons generated from our framework to JPEG steganography, no specal processng needs to be made on those DCT coeffcents wth the values of + and - as that n [7, 8, 3]. Note that n [7, 8, 3], the dstorton functons have only been appled on the non-zero AC DCT coeffcents. If the coeffcent wth value of + or - s flpped to, the recpent wll not be able to accurately locate the correspondng non-zero coeffcents utlzed for matrx encodng n the transmttng end, and the embedded secret message bts may not be extracted successfully. Thus specal modfcaton operaton should be made by the sender on those coeffcents wth the quantzed values of + and -. For example, n [7, 8, 3] the coeffcents wth the quantzed values of + and - can only be flpped to +2 and -2, respectvely. Snce the dstorton functons generated from framework are appled on all the DCT coeffcents,.e., all the DCT coeffcents are utlzed for matrx encodng, no such specal modfcaton operaton needs to be made whle c applyng our advanced dstorton functons to JPEG steganography. For any coeffcent c ( N) to be modfed, the operaton s conducted as follows. c +, = c, f ( c f ( c c' ) s (5) c' ) > where s s the coeffcent after havng been modfed. Furthermore, snce all the DCT coeffcents (ncludng DC coeffcents and numerous zero AC coeffcents besdes the nonzero AC coeffcents) are ncluded n our framework whle applyng those advanced dstorton functons to JPEG steganography, the embeddng effcency (the number of bts embedded per embeddng change [7]) of matrx encodng wll be mproved sgnfcantly. For example, f we select MME2 embeddng strategy for matrx encodng, wth the usage of k [ 2 -, k] ( k ) modfed bnary Hammng codes, k secret message bts can be embedded nto 2 k - quantzed DCT coeffcents by changng at most two of them. That s, the larger the k, more effcently the matrx encodng wll be accomplshed. Accordng to [8, 9, 3], the parameter k of Hammng codes s determned by the number of secret message bts (represented by n) and the number of DCT coeffcents (represented by N) utlzed for matrx encodng. In general we wll select the mum k that qualfes the nequalty k 2 - k > n N. It s obvously that wth embeddng the same number of secret message bts, the algorthms utlzng more DCT coeffcents for data hdng wll result n a more effcent matrx encodng. Note that n order to exchange the secret message bts successfully, both the sender and recpent should utlze the same coeffcents to accomplsh the matrx encodng. For example, n [7, 8, 3], the recpent needs to accurately locate the non-zero AC DCT that have been used n the embeddng process to conduct the matrx encodng, otherwse the secret message bts cannot be extracted accurately. A specal note of nterest s that whle applyng those advanced dstorton functons generated from our framework to JPEG steganography, the sender should frst dvde all the DCT coeffcents nto FPG and SPG. However, the sender does not need to share the dvdng scenaro wth the recpent, snce they (.e., the sender and recpent) both use all the DCT coeffcents to conduct matrx encodng. The recpent does not need to locate the DCT coeffcents n FPG or SFG n the recevng end, and he/she can exchange the secret message wth the sender easly va selectng the same matrx encodng strategy. 2.3 Three Dfferent Scenaros for Dvdng FPG and SPG The statstcs of DCT coeffcents are complcated and they may nteract wth each other whle beng modfed. Moreover the statstcs of DCT coeffcents may also have a close relatonshp wth the secret message bts to be embedded, and the type of embeddng operaton that modfes the coeffcents, etc. It s not easy to derve an optmal strategy for dvdng the coeffcents nto FPG and SPG. However, a seres of suboptmal scenaros can be found easly. 7

4 In the followng, three scenaros for dvdng the coeffcents nto FPG and SPG are exemplfed. Scenaro s a smple and drect way. Its separaton performance may not be as good as the followng two scenaros. However, our experments n next secton wll demonstrate that wth approprate selecton of the ordnary dstorton functon, hgh secure performance can stll be obtaned. The fundamental dea of the next two scenaros s that n the texture area of a carrer mage more coeffcents wll be dvded nto FPG, and n the flat area fewer coeffcents wll be dvded nto FPG. In Scenaro 2, the frst-prorty and secondprorty coeffcents are classfed accordng to the statstcs of coeffcents n DCT doman. In Scenaro 3, the coeffcents are dvded nto FPG and SPG wth resortng to the statstcs of JPEG mage n spatal doman. Scenaro : The AC DCT coeffcents are consdered as frstprorty coeffcents, and the DC DCT coeffcents are classfed as the second-prorty coeffcents. Scenaro 2: Compute the standard devaton ( N) of the quantzed AC DCT coeffcents n each 8 D 8 block of JPEG mage, where N represents the total number of 8 8 blocks n JPEG mage. The average value of all the standard devatons s D = N N D =, and the mum value among all the standard devatons s D = ( D, D2,, DN ). In each block, the number of AC DCT coeffcents that belongs to FPG s computed as follows., 64 ( D / D), A = 2 64 ( + D / D 2 63, ), f D f 32 < 32 D D f D D f D = D < D D < D where A ( N) represents the number of AC DCT coeffcents that should be dvded n FPG n each 8 8 block, and x s a functon that rounds the element x to ts nearest nteger less than or equal to x. In Equaton (6), the number 64 represents that there are 64 DCT coeffcents n each 8 8 block. As we ponted above, any DCT coeffcent can be modfed, and we can change any sngle coeffcent n a gven JPEG mage n the embeddng process. Other methods for dvdng the coeffcents nto FPG and SPG may stll work, e.g., we can change the number 32 to 3 or 3 n Equaton (6), and the obtaned dstorton functon may stll result n JPEG steganography wth hgh securty performance. Here, we only try to llustrate the applcablty of our framework and do not try to make a clear boundary between FPG and SPG. Scenaro 3: Compute the standard devaton ( N) of pxel values n each 8 8 block of the decompressed JPEG mage, P (6) where N represents the total number of 8 8 blocks n JPEG mage. The average value of all the standard devatons N s P = P, and the mum value among all the standard N = devatons s P = ( P, P2,, PN ). In each block, the number of AC DCT coeffcents that belongs to FPG s computed as follows., f P < P ( P / P), f P P < P (7) B = ( + P / P ), f P P < P 2 63, f P = P where B ( N) represents the number of AC DCT coeffcents that should be dvded n FPG n each 8 8 block. As seen, the phlosophy for choosng the frst-prorty coeffcents n Equaton (7) s smlar to that n Equaton (6). Dfferently, n Scenaro 3 the DCT coeffcents are dvded nto FPG and SPG accordng to the statstcal characterstcs of JPEG mage n spatal doman. Snce decompressng the JPEG mage s a nonlnear process (ncludng de-quantzaton and roundng process [8]), the selected frst-prorty coeffcents n Scenaro 3 wll be dfferent from that n Scenaro 2. In Scenaro 3, the B ( N) frst-prorty coeffcents n each block are also selected accordng to the zg-zag scannng order, and the rest AC and DC coeffcents are consdered as second-prorty coeffcents. In ths secton, we have ntroduced two ordnary dstorton functons and exemplfed three dfferent dvdng scenaros. Accordng to Equaton (4), sx dfferent advanced dstorton functons can be generated va combnng those dfferent ordnary dstorton functons and dvdng scenaros. Note that the framework proposed n ths paper s an open system. Frstly, PQ, NPQ and any other ordnary dstorton functon can be used on our framework. For nstance, n Equaton (4) the superscrpt ORD stands for the ordnary dstorton functon. Secondly, more advanced scenaros for splttng the DCT coeffcents nto FPG and SPG can also be used n our framework. For example, f the more advanced scenaro s found, the FPG and SPG n Equaton (4) may be updated accordngly. 3. EXPERIMENTAL RESULTS In ths secton, expermental results and analyss are presented to demonstrate the effcency of our proposed framework. The test mage set conssts of uncompressed mages whch are downloaded from the BOSSBase mage dataset [9]. All the mages are wth the sze of In the followng, the uncompressed mage s called nput mage and the JPEG compressed mage wthout any message embeddng s called cover mage. The cover and stego mages are created usng the same JPEG encoder [2], and the qualty factor s selected as 75 n all of our testng. The secret message bts are randomly 72

5 generated, and the embeddng rates are represented n terms of (bts per non-zero quantzed AC DCT coeffcents) values. The effcency of our proposed dstorton functons s tested wth three state-of-the-art feature-based steganalyzers, whch are called CC-PEV (Cartesan-calbrated Pevný) [2], SPAM (subtractve pxel adjacency matrx) [22] and CDF (cross doman feature) [23], respectvely. The 548-dmensonal CC-PEV feature vector s manly extracted from JPEG doman, whch s extended to twce ts sze by Cartesan calbraton from the 274 feature vector desgned for JPEG mages [24]. The 686-dmensonal SPAM feature vector s extracted from spatal doman, whch s the second-order Markov model of pxel dfferences. Through combng the CC-PEV and SPAM feature vector, we can get the,234-dmensonal CDF feature vector. Those feature vectors or ther mproved versons are popularly utlzed [25-28] n detectng the classcal algorthms such as F5 [5] and MB [29], and some modern steganographc schemes [3-33]. Snce the CDF feature vector s extracted n cross doman, t may have better detecton performance than CC-PEV and SPAM n general. The ensemble classfer presented n [34] s employed n our testng wth default parameters. It s a fully automatc framework wth an effcent utlzaton of out-of-bag (OOB) error estmates for stoppng crteron. As ponted out n [25], the proposed ensemble classfer conssts of a lot of base learners ndependently traned on a set of cover and stego mages. The decson threshold of each base learner s adjusted to mnmze the total detecton error under equal prors on the tranng set: P E = mn ( PFA + PMD( PFA)) (8) PFA 2 where P FA, P MD are the probabltes of false alarms and mssed detecton, respectvely. Matrx Embeddng: MME2; Steganalyzer: SPAM-686 Matrx Embeddng: MME2; Steganalyzer: CC-PEV PQ [] SN+PQ SN+NPQ. SN2+PQ.5 SN3+PQ.5..2 (a) Matrx Embeddng: MME3; Steganalyzer: CC-PEV PQ [] SN+PQ SN+NPQ. SN2+PQ.5 SN3+PQ.5..2 (b) Fg. The detecton error rates wth the steganalyzer CC-PEV-548. (a) MME2 embeddng strategy. (b) MME3 embeddng strategy..2 PQ [] SN+PQ SN+NPQ. SN2+PQ.5 SN3+PQ.5..2 (a) Matrx Embeddng: MME3; Steganalyzer: SPAM-686 PQ [].2 SN+PQ SN+NPQ SN2+PQ. SN3+PQ (b) Fg. 2 The detecton error rates wth the steganalyzer SPAM-686. (a) MME2 embeddng strategy. (b) MME3 embeddng strategy. Frstly, we have appled the advanced dstorton functons to JPEG steganography wth MME2 and MME3 embeddng strateges for a detal comparson. The PQ and NPQ are selected as the ordnary dstorton functons for a demonstraton. In Secton 2.3, we have exemplfed three scenaros for dvdng the DCT coeffcents nto FPG and SPG. The algorthms resulted 73

6 from dfferent dvdng scenaros (abbrevated as SN ) and ordnary dstorton functons are represented as SN+PQ, SN+NPQ, SN2+PQ, SN3+PQ,, respectvely. The orgnal PQ and NPQ dstorton functons are appled wth MME2 and MME3 embeddng strateges as n [8, 3]. Totally there are sxteen dfferent steganographc schemes. Half of them are conducted wth MME2 embeddng strategy, and the other half are conducted wth MME3 embeddng strategy. Note that n all our testng, the two control parameters of NPQ are selected as λ =, λ.2). ( 2 = The detecton error rates (ERs) correspondng to the three steganalyzers CC-PEV, SPAM, and CDF are llustrated n Fgs., 2 and 3, respectvely. In these three fgures, the horzontal axes represent the values, and the vertcal axes represent the detecton error rates. For the aforementoned sxteen steganographc schemes, the embeddng rates are ncreased from.5 to wth the step sze of.5. The embeddng strategy and the steganalyzer wth the dmenson sze of feature vector are llustrated n the ttle of each fgure Matrx Embeddng: MME2; Steganalyzer: CDF-234 PQ [] SN+PQ SN+NPQ SN2+PQ SN3+PQ (a) Matrx Embeddng: MME3; Steganalyzer: CDF-234 PQ [] SN+PQ SN+NPQ SN2+PQ SN3+PQ.5..2 (b) Fg. 3 The detecton error rates wth the steganalyzer CDF-234. (a) MME2 embeddng strategy. (b) MME3 embeddng strategy. It s observed from Fgs., 2 and 3 that whchever dvdng scenaro or ordnary dstorton functon s selected, the securty performance of the obtaned JPEG steganography may be greatly mproved under the gudance of those dstorton functons generated from our framework. Our expermental results also demonstrate that the selecton of dvdng scenaros and ordnary dstorton functons may have great mportance n our framework. Dfferent dvdng scenaros and ordnary dstorton functons may result n JPEG steganography wth dfferent securty performance. As seen, wth usng the same ordnary dstorton functon, JPEG steganography resulted from Scenaro 2 and Scenaro 3 may have hgher securty performance than that from Scenaro. Wth adoptng the same dvdng scenaro, PQ and NPQ may result n JPEG steganography wth dfferent securty performance too. Fortunately, va usng our proposed framework, the dfferent dvdng scenaros and ordnary dstorton functons can easly be combned to form effcent advanced dstorton functons, even though the dvdng scenaros and ordnary dstorton functons are not optmal. Secondly, n order to demonstrate the unversalty of our proposed framework, we have appled those generated dstorton functons to JPEG steganography wth STC. The Wang and N s method [7] has also been conducted for a comparson, whch s one of the most secure JPEG steganographc schemes wth usng STC. The steganalyzer CDF s selected for testng, and the expermental results are shown n Fg. 4. The horzontal axes represent the values, the vertcal axes represent the detecton error rates, and the dstorton functons are shown on the legend. As seen, when the embeddng rate s no more than, all the steganographc schemes resulted from our proposed and Wang and N s method have the smlar securty performance, and the obtaned detecton accuracy rates are near random guessng. However, wth the ncreasng of embeddng rate, the JPEG steganographc schemes resulted from our proposed dstorton functon may have much better securty performance than that resulted from Wang and N s method. Va comparng Fg. 4 and Fg. 3, we can also fnd out that va usng more effcent embeddng strategy, the securty performance of JPEG steganography resulted from our advanced dstorton functon can be mproved further..2 Embeddng Codes: STC; Steganalyzer: CDF-234 SN+NPQ Wang&N[7] Fg. 4 The effcency of our proposed framework wth usng STC. 74

7 4. CONCLUSIONS In ths paper, we have presented a new framework for desgnng dstorton functons of JPEG steganography wth uncompressed sde-mage, and a seres of advanced dstorton functons that may result n hgh secure JPEG steganography are exemplfed. Note that our proposed framework s an open system. It wll not be constraned to the aforementoned dvdng scenaros and ordnary dstorton functons. Other dvdng scenaros and ordnary dstorton functons can be adopted easly n our framework to form a seres of new dstorton functons. 5. ACKNOWLEDGEMENTS Ths work was supported by the Natonal Natural Scence Foundaton of Chna (67347, U35), the 973 Program of Chna (2CB3224), the Key Projects n the Natonal Scence & Technology Pllar Program (22BAK6B6), the Fundamental Research Funds for Central Unverstes (2lgpy3), and the Project Sponsored by the Scentfc Research Foundaton for the Returned Overseas Chnese Scholars, State Educaton Mnstry ([22]77). 6. REFERENCES [] J. Frdrch, P. Lsoněk and D. Soukal, On Steganographc embeddng effcency, n Proc. Informaton Hdng Workshop 26, LNCS 4437, pp , 27 [2] J. Frdrch, M. Goljan and D. Soukal, Perturbed quantzaton steganography wth wet paper codes, n Proc. the ACM Workshop on Multmeda & Securty, Magdeburg, Germany, September 2-2, pp. 4-5, 24. [3] J. Frdrch, T. Pevný and J. Kodovský, Statstcally undetectable JPEG steganography: dead ends, challenges, and opportuntes, n Proc. the ACM Workshop on Multmeda and Securty, Dallas, Texas, September 2-2, pp. 3-4, 27. [4] V. Sachnev, H. J. Km, and R. Zhang, Less detectable JPEG steganography method based on heurstc optmzaton and BCH syndrome codng, n Proc. the ACM Workshop on Multmeda & Securty, Prnceton, New Jersey, Sep. 7-9, pp. 3 4, 29. [5] T. Fller, J. Judas, and J. Frdrch, Mnmzng addtve dstorton n steganography usng Syndrome-Trells Codes, IEEE Transactons on Informaton Forenscs and Securty, vol. 6, no. 3, pp , 2. [6] V. Sachnev, H. J. Km, Modfed BCH data hdng scheme for JPEG steganography, Eurasp Journal on advances n sgnal processng, vol. 22, no., pp , 22 [7] C. Wang, J. N, An effcent JPEG steganographc scheme based on block-entropy of DCT coeffcents, n Proc. of IEEE ICASSP, Kyoto, Japan, Mar. 25-3, pp , 22 [8] F. Huang, J. Huang, and Y. Q. Sh, New channel selecton rule for JPEG steganography, IEEE Trans. Informaton Forenscs and Securty, vol. 7, no. 4, pp. 8-9, 22. [9] R. Crandall, Some notes on steganography, Posted on Steganography Malng Lst, westfeld/crandall.pdf [] A. Westfeld, Hgh capacty despte better steganalyss (F5-a steganographc algorthm), n Proc. Informaton Hdng, 4 th Internatonal Workshop, volume 237 of Lecture Notes n Computer Scence, pp , 2. [] J. Frdrch, M. Goljan, P. Lsoněk, and D. Soukal, Wrtng on wet paper, IEEE Trans. Sgnal Processng, vol. 53, no., pp , 25. [2] J. Frdrch, M. Goljan and D. Soukal, Wet paper codes wth mproved embeddng effcency, IEEE Trans. Informaton Forenscs and Securty, vol., no., pp. 2-, 26. [3] Y. Km, Z. Durc and D. Rchards, Modfed matrx encodng technque for mnmal dstorton steganography, n Proc. Informaton Hdng Workshop 26, LNCS 4437, pp , 27. [4] T. K. Moon, Error Correcton Codng, Mathematcal Methods and Algorthms. Hoboken, NJ: Wley, 25. [5] D. Schönfeld, A. Wnkler, Embeddng wth syndrome codng based on BCH codes, n Proc. the ACM Workshop on Multmeda & Securty, Geneva, Swtzerland, Sep , pp , 26 [6] R. Zhang, V. Sachnev, and H. J. Km, Fast BCH syndrome codng for steganography, n Proc. Informaton Hdng Workshop 29, LNCS 586, pp , 29. [7] J. Frdrch, and D. Soukal, Matrx embeddng for large payloads, IEEE Trans. Informaton Forenscs and Securty, vol., no. 3, pp , 26. [8] F. Huang, J. Huang, and Y. Q. Sh, Detectng double JPEG compresson wth the same quantzaton matrx, IEEE Trans. Informaton Forenscs and Securty, vol. 5, no. 4, pp , 2. [9] T. Fller, T. Pevny, and P. Bas. BOSS (Break Our Steganography System). July 2. [2] P. Shllee, Matlab JPEG Toolbox [Onlne]. Avalable: [2] J. Kodovský and J. Frdrch, Calbraton revsted, n Proc. the ACM Multmeda & Securty Workshop, Prnceton, New Jersey, Sep. 7-9, pp , 29. [22] T. Pevný, P. Bas, ad J. Frdrch, Steganalyss by subtractve pxel adjacency matrx, IEEE Trans. Informaton Forenscs and Securty, vol. 52, no. 2, pp , 2 [23] J. Kodovský, T. Pevný, and J. Frdrch, Modern steganalyss can detect YASS, n Proc. SPIE, Electronc Imagng, Securty Forenscs of Multmeda XII, San Jose, Calforna, Jan. 7 2, 2, vol. 754, pp [24] T. Pevný and J. Frdrch, Mergng Markov and DCT features for mult-class JPEG steganalyss, n Proc. SPIE Electronc Imagng, Securty, Steganography, and Watermarkng of Multmeda Contents Ⅸ, San Jose, Calforna, Jan Feb., 27, vol. 655, pp [25] F. Huang, J. Huang, and Y. Q. Sh, An expermental study on the securty performance of YASS, IEEE Trans. Informaton Forenscs and Securty, vol. 5, no. 3, pp , 2. [26] J. Kodovský and J. Frdrch, Steganalyss of JPEG mages usng rch models, n Proc. SPIE, Electronc Imagng, 75

8 Meda Watermarkng, Securty, and Forenscs of Multmeda XIV, San Francsco, CA, Jan , 22, vol. 833, pp. A- -A-3. [27] J. Frdrch and J. Kodovský, Rch models for steganalyss of dgtal mages, IEEE Trans. Informaton Forenscs and Securty, vol. 7, no. 3, pp , 22. [28] Q. Lu, A. Sung, and M. Qao, Neghborng jont denstybased JPEG Steganalyss, ACM Transactons on Intellgent Systems and Technology, vol. 2, no. 2, pp. -6, 2. [29] P. Sallee, Model based methods for steganography and steganalyss, Internatonal Journal of Image Graphcs, vol. 5, no., pp. 67-9, 25. [3] W. Luo, F. Huang, and J. Huang, Edge adaptve mage steganography based on LSB matchng revsted, IEEE Trans. Informaton Forenscs and Securty, vol. 5, no. 2, pp. 2-24, 2. [3] T. Pevný, T. Fller, and P. Bas, Usng hgh-dmensonal mage models to perform hghly undetectable steganography, n Proc. Informaton Hdng Workshop 2, LNCS 6387, pp. 6 77, 2 [32] K. Solank, A. Sarkar, and B. S. Manjunath, YASS: Yet another steganographc scheme that ressts blnd steganalyss, n Proc. Informaton Hdng Workshop 27, LNCS 4567, pp. 6-3, 27. [33] A. Sarkar, K. Solank, and B. S. Manjunath, Further study on YASS: Steganography based on randomzed embeddng to resst blnd steganalyss, n Proc. SPIE Electronc Imagng, Securty, Steganography, and Watermarkng of Multmeda Contents IX, 28, vol. 689, pp [34] J. Kodovský, J. Frdrch and V. Holub, Ensemble calssfers for steganalyss of dgtal meda, IEEE Trans. Informaton Forenscs and Securty, vol. 2, no. 7, pp , 22 76

TECHNICAL POINTS ABOUT ADAPTIVE STEGANOGRAPHY BY ORACLE (ASO) 161, rue Ada, 34095, Montpellier Cedex 05, France

TECHNICAL POINTS ABOUT ADAPTIVE STEGANOGRAPHY BY ORACLE (ASO) 161, rue Ada, 34095, Montpellier Cedex 05, France 20th European Sgnal Processng Conference (EUSIPCO 2012) Bucharest, Romana, August 27-31, 2012 TECHNICAL POINTS ABOUT ADAPTIVE STEGANOGRAPHY BY ORACLE (ASO) Sarra Kouder 2, Marc Chaumont 1,2, Wllam Puech

More information

A Binarization Algorithm specialized on Document Images and Photos

A Binarization Algorithm specialized on Document Images and Photos A Bnarzaton Algorthm specalzed on Document mages and Photos Ergna Kavalleratou Dept. of nformaton and Communcaton Systems Engneerng Unversty of the Aegean kavalleratou@aegean.gr Abstract n ths paper, a

More information

An Optimal Algorithm for Prufer Codes *

An Optimal Algorithm for Prufer Codes * J. Software Engneerng & Applcatons, 2009, 2: 111-115 do:10.4236/jsea.2009.22016 Publshed Onlne July 2009 (www.scrp.org/journal/jsea) An Optmal Algorthm for Prufer Codes * Xaodong Wang 1, 2, Le Wang 3,

More information

A Fast Content-Based Multimedia Retrieval Technique Using Compressed Data

A Fast Content-Based Multimedia Retrieval Technique Using Compressed Data A Fast Content-Based Multmeda Retreval Technque Usng Compressed Data Borko Furht and Pornvt Saksobhavvat NSF Multmeda Laboratory Florda Atlantc Unversty, Boca Raton, Florda 3343 ABSTRACT In ths paper,

More information

Hybrid Non-Blind Color Image Watermarking

Hybrid Non-Blind Color Image Watermarking Hybrd Non-Blnd Color Image Watermarkng Ms C.N.Sujatha 1, Dr. P. Satyanarayana 2 1 Assocate Professor, Dept. of ECE, SNIST, Yamnampet, Ghatkesar Hyderabad-501301, Telangana 2 Professor, Dept. of ECE, AITS,

More information

Shape-adaptive DCT and Its Application in Region-based Image Coding

Shape-adaptive DCT and Its Application in Region-based Image Coding Internatonal Journal of Sgnal Processng, Image Processng and Pattern Recognton, pp.99-108 http://dx.do.org/10.14257/sp.2014.7.1.10 Shape-adaptve DCT and Its Applcaton n Regon-based Image Codng Yamn Zheng,

More information

Problem Definitions and Evaluation Criteria for Computational Expensive Optimization

Problem Definitions and Evaluation Criteria for Computational Expensive Optimization Problem efntons and Evaluaton Crtera for Computatonal Expensve Optmzaton B. Lu 1, Q. Chen and Q. Zhang 3, J. J. Lang 4, P. N. Suganthan, B. Y. Qu 6 1 epartment of Computng, Glyndwr Unversty, UK Faclty

More information

Deep learning is a good steganalysis tool when embedding key is reused for different images, even if there is a cover source-mismatch

Deep learning is a good steganalysis tool when embedding key is reused for different images, even if there is a cover source-mismatch Deep learnng s a good steganalyss tool when embeddng key s reused for dfferent mages, even f there s a cover source-msmatch Lonel PIBRE 2,3, Jérôme PASQUET 2,3, Dno IENCO 2,3, Marc CHAUMONT 1,2,3 (1) Unversty

More information

Cluster Analysis of Electrical Behavior

Cluster Analysis of Electrical Behavior Journal of Computer and Communcatons, 205, 3, 88-93 Publshed Onlne May 205 n ScRes. http://www.scrp.org/ournal/cc http://dx.do.org/0.4236/cc.205.350 Cluster Analyss of Electrcal Behavor Ln Lu Ln Lu, School

More information

Learning the Kernel Parameters in Kernel Minimum Distance Classifier

Learning the Kernel Parameters in Kernel Minimum Distance Classifier Learnng the Kernel Parameters n Kernel Mnmum Dstance Classfer Daoqang Zhang 1,, Songcan Chen and Zh-Hua Zhou 1* 1 Natonal Laboratory for Novel Software Technology Nanjng Unversty, Nanjng 193, Chna Department

More information

Content Based Image Retrieval Using 2-D Discrete Wavelet with Texture Feature with Different Classifiers

Content Based Image Retrieval Using 2-D Discrete Wavelet with Texture Feature with Different Classifiers IOSR Journal of Electroncs and Communcaton Engneerng (IOSR-JECE) e-issn: 78-834,p- ISSN: 78-8735.Volume 9, Issue, Ver. IV (Mar - Apr. 04), PP 0-07 Content Based Image Retreval Usng -D Dscrete Wavelet wth

More information

Support Vector Machines

Support Vector Machines /9/207 MIST.6060 Busness Intellgence and Data Mnng What are Support Vector Machnes? Support Vector Machnes Support Vector Machnes (SVMs) are supervsed learnng technques that analyze data and recognze patterns.

More information

High Payload Reversible Data Hiding Scheme Using Difference Segmentation and Histogram Shifting

High Payload Reversible Data Hiding Scheme Using Difference Segmentation and Histogram Shifting JOURNAL OF ELECTRONIC SCIENCE AND TECHNOLOGY, VOL. 11, NO. 1, MARCH 2013 9 Hgh Payload Reversble Data Hdng Scheme Usng Dfference Segmentaton and Hstogram Shftng Yung-Chen Chou and Huang-Chng L Abstract

More information

A Lossless Watermarking Scheme for Halftone Image Authentication

A Lossless Watermarking Scheme for Halftone Image Authentication IJCSNS Internatonal Journal of Computer Scence and Network Securty, VOL.6 No.2B, February 2006 147 A Lossless Watermarkng Scheme for Halftone Image Authentcaton Jeng-Shyang Pan, Hao Luo, and Zhe-Mng Lu,

More information

Detecting MP3Stego using Calibrated Side Information Features

Detecting MP3Stego using Calibrated Side Information Features 2628 JOURNAL OF SOFTWARE, VOL. 8, NO. 10, OCTOBER 2013 Detectng P3Stego usng Calbrated Sde Informaton Features Xanmn Yu School of Informaton Scence and Engneerng, Nngbo Unversty Emal: mlhappy1016@163.com

More information

FINDING IMPORTANT NODES IN SOCIAL NETWORKS BASED ON MODIFIED PAGERANK

FINDING IMPORTANT NODES IN SOCIAL NETWORKS BASED ON MODIFIED PAGERANK FINDING IMPORTANT NODES IN SOCIAL NETWORKS BASED ON MODIFIED PAGERANK L-qng Qu, Yong-quan Lang 2, Jng-Chen 3, 2 College of Informaton Scence and Technology, Shandong Unversty of Scence and Technology,

More information

Parallelism for Nested Loops with Non-uniform and Flow Dependences

Parallelism for Nested Loops with Non-uniform and Flow Dependences Parallelsm for Nested Loops wth Non-unform and Flow Dependences Sam-Jn Jeong Dept. of Informaton & Communcaton Engneerng, Cheonan Unversty, 5, Anseo-dong, Cheonan, Chungnam, 330-80, Korea. seong@cheonan.ac.kr

More information

Related-Mode Attacks on CTR Encryption Mode

Related-Mode Attacks on CTR Encryption Mode Internatonal Journal of Network Securty, Vol.4, No.3, PP.282 287, May 2007 282 Related-Mode Attacks on CTR Encrypton Mode Dayn Wang, Dongda Ln, and Wenlng Wu (Correspondng author: Dayn Wang) Key Laboratory

More information

An Image Fusion Approach Based on Segmentation Region

An Image Fusion Approach Based on Segmentation Region Rong Wang, L-Qun Gao, Shu Yang, Yu-Hua Cha, and Yan-Chun Lu An Image Fuson Approach Based On Segmentaton Regon An Image Fuson Approach Based on Segmentaton Regon Rong Wang, L-Qun Gao, Shu Yang 3, Yu-Hua

More information

An Image Compression Algorithm based on Wavelet Transform and LZW

An Image Compression Algorithm based on Wavelet Transform and LZW An Image Compresson Algorthm based on Wavelet Transform and LZW Png Luo a, Janyong Yu b School of Chongqng Unversty of Posts and Telecommuncatons, Chongqng, 400065, Chna Abstract a cylpng@63.com, b y27769864@sna.cn

More information

A Fast Visual Tracking Algorithm Based on Circle Pixels Matching

A Fast Visual Tracking Algorithm Based on Circle Pixels Matching A Fast Vsual Trackng Algorthm Based on Crcle Pxels Matchng Zhqang Hou hou_zhq@sohu.com Chongzhao Han czhan@mal.xjtu.edu.cn Ln Zheng Abstract: A fast vsual trackng algorthm based on crcle pxels matchng

More information

Semi-Fragile Watermarking Scheme for Authentication of JPEG Images

Semi-Fragile Watermarking Scheme for Authentication of JPEG Images Tamkang Journal of Scence and Engneerng, Vol. 10, No 1, pp. 5766 (2007) 57 Sem-Fragle Watermarkng Scheme for Authentcaton of JPEG Images Chh-Hung n 1 *, Tung-Shh Su 2 and Wen-Shyong Hseh 2,3 1 Department

More information

Available online at Available online at Advanced in Control Engineering and Information Science

Available online at   Available online at   Advanced in Control Engineering and Information Science Avalable onlne at wwwscencedrectcom Avalable onlne at wwwscencedrectcom Proceda Proceda Engneerng Engneerng 00 (2011) 15000 000 (2011) 1642 1646 Proceda Engneerng wwwelsevercom/locate/proceda Advanced

More information

Proper Choice of Data Used for the Estimation of Datum Transformation Parameters

Proper Choice of Data Used for the Estimation of Datum Transformation Parameters Proper Choce of Data Used for the Estmaton of Datum Transformaton Parameters Hakan S. KUTOGLU, Turkey Key words: Coordnate systems; transformaton; estmaton, relablty. SUMMARY Advances n technologes and

More information

Tsinghua University at TAC 2009: Summarizing Multi-documents by Information Distance

Tsinghua University at TAC 2009: Summarizing Multi-documents by Information Distance Tsnghua Unversty at TAC 2009: Summarzng Mult-documents by Informaton Dstance Chong Long, Mnle Huang, Xaoyan Zhu State Key Laboratory of Intellgent Technology and Systems, Tsnghua Natonal Laboratory for

More information

Quality Improvement Algorithm for Tetrahedral Mesh Based on Optimal Delaunay Triangulation

Quality Improvement Algorithm for Tetrahedral Mesh Based on Optimal Delaunay Triangulation Intellgent Informaton Management, 013, 5, 191-195 Publshed Onlne November 013 (http://www.scrp.org/journal/m) http://dx.do.org/10.36/m.013.5601 Qualty Improvement Algorthm for Tetrahedral Mesh Based on

More information

Using Fuzzy Logic to Enhance the Large Size Remote Sensing Images

Using Fuzzy Logic to Enhance the Large Size Remote Sensing Images Internatonal Journal of Informaton and Electroncs Engneerng Vol. 5 No. 6 November 015 Usng Fuzzy Logc to Enhance the Large Sze Remote Sensng Images Trung Nguyen Tu Huy Ngo Hoang and Thoa Vu Van Abstract

More information

Robust Blind Video Watermark Algorithm in Transform Domain Combining with 3D Video Correlation

Robust Blind Video Watermark Algorithm in Transform Domain Combining with 3D Video Correlation JOURNAL OF MULTIMEDIA, VOL. 8, NO. 2, APRIL 2013 161 Robust Blnd Vdeo Watermark Algorthm n Transform Doman Combnng wth 3D Vdeo Correlaton DING Ha-yang 1,3 1. Informaton Securty Center, Bejng Unversty of

More information

FEATURE EXTRACTION. Dr. K.Vijayarekha. Associate Dean School of Electrical and Electronics Engineering SASTRA University, Thanjavur

FEATURE EXTRACTION. Dr. K.Vijayarekha. Associate Dean School of Electrical and Electronics Engineering SASTRA University, Thanjavur FEATURE EXTRACTION Dr. K.Vjayarekha Assocate Dean School of Electrcal and Electroncs Engneerng SASTRA Unversty, Thanjavur613 41 Jont Intatve of IITs and IISc Funded by MHRD Page 1 of 8 Table of Contents

More information

Performance Analysis of Data Hiding in MPEG-4 AAC Audio *

Performance Analysis of Data Hiding in MPEG-4 AAC Audio * TSINGHUA SCIENCE AND TECHNOLOGY ISSNll1007-0214ll07/21llpp55-61 Volume 14, Number 1, February 2009 Performance Analyss of Data Hdng n MPEG-4 AAC Audo * XU Shuzheng ( ) **, ZHANG Peng ( ), WANG Pengjun

More information

A Novel Adaptive Descriptor Algorithm for Ternary Pattern Textures

A Novel Adaptive Descriptor Algorithm for Ternary Pattern Textures A Novel Adaptve Descrptor Algorthm for Ternary Pattern Textures Fahuan Hu 1,2, Guopng Lu 1 *, Zengwen Dong 1 1.School of Mechancal & Electrcal Engneerng, Nanchang Unversty, Nanchang, 330031, Chna; 2. School

More information

Skew Angle Estimation and Correction of Hand Written, Textual and Large areas of Non-Textual Document Images: A Novel Approach

Skew Angle Estimation and Correction of Hand Written, Textual and Large areas of Non-Textual Document Images: A Novel Approach Angle Estmaton and Correcton of Hand Wrtten, Textual and Large areas of Non-Textual Document Images: A Novel Approach D.R.Ramesh Babu Pyush M Kumat Mahesh D Dhannawat PES Insttute of Technology Research

More information

Identify the Attack in Embedded Image with Steganalysis Detection Method by PSNR and RGB Intensity

Identify the Attack in Embedded Image with Steganalysis Detection Method by PSNR and RGB Intensity Internatonal Journal of Computer Systems (ISSN: 394-1065), Volume 03 Issue 07, July, 016 Avalable at http://www.jcsonlne.com/ Identfy the Attack n Embedded Image wth Steganalyss Detecton Method by PSNR

More information

TN348: Openlab Module - Colocalization

TN348: Openlab Module - Colocalization TN348: Openlab Module - Colocalzaton Topc The Colocalzaton module provdes the faclty to vsualze and quantfy colocalzaton between pars of mages. The Colocalzaton wndow contans a prevew of the two mages

More information

Article Reversible Dual-Image-Based Hiding Scheme Using Block Folding Technique

Article Reversible Dual-Image-Based Hiding Scheme Using Block Folding Technique Artcle Reversble Dual-Image-Based Hdng Scheme Usng Block Foldng Technque Tzu-Chuen Lu, * and Hu-Shh Leng Department of Informaton Management, Chaoyang Unversty of Technology, Tachung 4349, Tawan Department

More information

K-means and Hierarchical Clustering

K-means and Hierarchical Clustering Note to other teachers and users of these sldes. Andrew would be delghted f you found ths source materal useful n gvng your own lectures. Feel free to use these sldes verbatm, or to modfy them to ft your

More information

Key-Selective Patchwork Method for Audio Watermarking

Key-Selective Patchwork Method for Audio Watermarking Internatonal Journal of Dgtal Content Technology and ts Applcatons Volume 4, Number 4, July 2010 Key-Selectve Patchwork Method for Audo Watermarkng 1 Ch-Man Pun, 2 Jng-Jng Jang 1, Frst and Correspondng

More information

A Secured Method for Image Steganography Based On Pixel Values

A Secured Method for Image Steganography Based On Pixel Values A Secured Method for Image Steganography Based On Pxel Values Tarun Gulat #, Sanskrt Gupta * # Assocate Professor, Electroncs and Communcaton Engneerng Department, MMEC, M.M.U., Mullana, Ambala, Haryana,

More information

Classifier Selection Based on Data Complexity Measures *

Classifier Selection Based on Data Complexity Measures * Classfer Selecton Based on Data Complexty Measures * Edth Hernández-Reyes, J.A. Carrasco-Ochoa, and J.Fco. Martínez-Trndad Natonal Insttute for Astrophyscs, Optcs and Electroncs, Lus Enrque Erro No.1 Sta.

More information

Improvement of Spatial Resolution Using BlockMatching Based Motion Estimation and Frame. Integration

Improvement of Spatial Resolution Using BlockMatching Based Motion Estimation and Frame. Integration Improvement of Spatal Resoluton Usng BlockMatchng Based Moton Estmaton and Frame Integraton Danya Suga and Takayuk Hamamoto Graduate School of Engneerng, Tokyo Unversty of Scence, 6-3-1, Nuku, Katsuska-ku,

More information

SLAM Summer School 2006 Practical 2: SLAM using Monocular Vision

SLAM Summer School 2006 Practical 2: SLAM using Monocular Vision SLAM Summer School 2006 Practcal 2: SLAM usng Monocular Vson Javer Cvera, Unversty of Zaragoza Andrew J. Davson, Imperal College London J.M.M Montel, Unversty of Zaragoza. josemar@unzar.es, jcvera@unzar.es,

More information

Reducing Frame Rate for Object Tracking

Reducing Frame Rate for Object Tracking Reducng Frame Rate for Object Trackng Pavel Korshunov 1 and We Tsang Oo 2 1 Natonal Unversty of Sngapore, Sngapore 11977, pavelkor@comp.nus.edu.sg 2 Natonal Unversty of Sngapore, Sngapore 11977, oowt@comp.nus.edu.sg

More information

Smoothing Spline ANOVA for variable screening

Smoothing Spline ANOVA for variable screening Smoothng Splne ANOVA for varable screenng a useful tool for metamodels tranng and mult-objectve optmzaton L. Rcco, E. Rgon, A. Turco Outlne RSM Introducton Possble couplng Test case MOO MOO wth Game Theory

More information

Determining the Optimal Bandwidth Based on Multi-criterion Fusion

Determining the Optimal Bandwidth Based on Multi-criterion Fusion Proceedngs of 01 4th Internatonal Conference on Machne Learnng and Computng IPCSIT vol. 5 (01) (01) IACSIT Press, Sngapore Determnng the Optmal Bandwdth Based on Mult-crteron Fuson Ha-L Lang 1+, Xan-Mn

More information

An Indian Journal FULL PAPER ABSTRACT KEYWORDS. Trade Science Inc.

An Indian Journal FULL PAPER ABSTRACT KEYWORDS. Trade Science Inc. [Type text] [Type text] [Type text] ISSN : 97-735 Volume Issue 9 BoTechnology An Indan Journal FULL PAPER BTAIJ, (9), [333-3] Matlab mult-dmensonal model-based - 3 Chnese football assocaton super league

More information

Face Recognition University at Buffalo CSE666 Lecture Slides Resources:

Face Recognition University at Buffalo CSE666 Lecture Slides Resources: Face Recognton Unversty at Buffalo CSE666 Lecture Sldes Resources: http://www.face-rec.org/algorthms/ Overvew of face recognton algorthms Correlaton - Pxel based correspondence between two face mages Structural

More information

Research Article High Capacity Reversible Watermarking for Audio by Histogram Shifting and Predicted Error Expansion

Research Article High Capacity Reversible Watermarking for Audio by Histogram Shifting and Predicted Error Expansion e Scentfc World Journal, Artcle ID 656251, 7 pages http://dx.do.org/1.1155/214/656251 Research Artcle Hgh Capacty Reversble Watermarkng for Audo by Hstogram Shftng and Predcted Error Expanson Fe Wang,

More information

S1 Note. Basis functions.

S1 Note. Basis functions. S1 Note. Bass functons. Contents Types of bass functons...1 The Fourer bass...2 B-splne bass...3 Power and type I error rates wth dfferent numbers of bass functons...4 Table S1. Smulaton results of type

More information

The Greedy Method. Outline and Reading. Change Money Problem. Greedy Algorithms. Applications of the Greedy Strategy. The Greedy Method Technique

The Greedy Method. Outline and Reading. Change Money Problem. Greedy Algorithms. Applications of the Greedy Strategy. The Greedy Method Technique //00 :0 AM Outlne and Readng The Greedy Method The Greedy Method Technque (secton.) Fractonal Knapsack Problem (secton..) Task Schedulng (secton..) Mnmum Spannng Trees (secton.) Change Money Problem Greedy

More information

X- Chart Using ANOM Approach

X- Chart Using ANOM Approach ISSN 1684-8403 Journal of Statstcs Volume 17, 010, pp. 3-3 Abstract X- Chart Usng ANOM Approach Gullapall Chakravarth 1 and Chaluvad Venkateswara Rao Control lmts for ndvdual measurements (X) chart are

More information

CS 534: Computer Vision Model Fitting

CS 534: Computer Vision Model Fitting CS 534: Computer Vson Model Fttng Sprng 004 Ahmed Elgammal Dept of Computer Scence CS 534 Model Fttng - 1 Outlnes Model fttng s mportant Least-squares fttng Maxmum lkelhood estmaton MAP estmaton Robust

More information

Module Management Tool in Software Development Organizations

Module Management Tool in Software Development Organizations Journal of Computer Scence (5): 8-, 7 ISSN 59-66 7 Scence Publcatons Management Tool n Software Development Organzatons Ahmad A. Al-Rababah and Mohammad A. Al-Rababah Faculty of IT, Al-Ahlyyah Amman Unversty,

More information

A NEW AUDIO WATERMARKING METHOD BASED

A NEW AUDIO WATERMARKING METHOD BASED A NEW AUDIO WATERMARKING METHOD BASED ON DISCRETE COSINE TRANSFORM WITH A GRAY IMAGE Mohammad Ibrahm Khan 1, Md. Iqbal Hasan Sarker 2, Kaushk Deb 3 and Md. Hasan Furhad 4 1,2,3 Department of Computer Scence

More information

MULTISPECTRAL IMAGES CLASSIFICATION BASED ON KLT AND ATR AUTOMATIC TARGET RECOGNITION

MULTISPECTRAL IMAGES CLASSIFICATION BASED ON KLT AND ATR AUTOMATIC TARGET RECOGNITION MULTISPECTRAL IMAGES CLASSIFICATION BASED ON KLT AND ATR AUTOMATIC TARGET RECOGNITION Paulo Quntlano 1 & Antono Santa-Rosa 1 Federal Polce Department, Brasla, Brazl. E-mals: quntlano.pqs@dpf.gov.br and

More information

A Background Subtraction for a Vision-based User Interface *

A Background Subtraction for a Vision-based User Interface * A Background Subtracton for a Vson-based User Interface * Dongpyo Hong and Woontack Woo KJIST U-VR Lab. {dhon wwoo}@kjst.ac.kr Abstract In ths paper, we propose a robust and effcent background subtracton

More information

Joint Example-based Depth Map Super-Resolution

Joint Example-based Depth Map Super-Resolution Jont Example-based Depth Map Super-Resoluton Yanje L 1, Tanfan Xue,3, Lfeng Sun 1, Janzhuang Lu,3,4 1 Informaton Scence and Technology Department, Tsnghua Unversty, Bejng, Chna Department of Informaton

More information

A PATTERN RECOGNITION APPROACH TO IMAGE SEGMENTATION

A PATTERN RECOGNITION APPROACH TO IMAGE SEGMENTATION 1 THE PUBLISHING HOUSE PROCEEDINGS OF THE ROMANIAN ACADEMY, Seres A, OF THE ROMANIAN ACADEMY Volume 4, Number 2/2003, pp.000-000 A PATTERN RECOGNITION APPROACH TO IMAGE SEGMENTATION Tudor BARBU Insttute

More information

A Modified Median Filter for the Removal of Impulse Noise Based on the Support Vector Machines

A Modified Median Filter for the Removal of Impulse Noise Based on the Support Vector Machines A Modfed Medan Flter for the Removal of Impulse Nose Based on the Support Vector Machnes H. GOMEZ-MORENO, S. MALDONADO-BASCON, F. LOPEZ-FERRERAS, M. UTRILLA- MANSO AND P. GIL-JIMENEZ Departamento de Teoría

More information

Range images. Range image registration. Examples of sampling patterns. Range images and range surfaces

Range images. Range image registration. Examples of sampling patterns. Range images and range surfaces Range mages For many structured lght scanners, the range data forms a hghly regular pattern known as a range mage. he samplng pattern s determned by the specfc scanner. Range mage regstraton 1 Examples

More information

An Improved Image Segmentation Algorithm Based on the Otsu Method

An Improved Image Segmentation Algorithm Based on the Otsu Method 3th ACIS Internatonal Conference on Software Engneerng, Artfcal Intellgence, Networkng arallel/dstrbuted Computng An Improved Image Segmentaton Algorthm Based on the Otsu Method Mengxng Huang, enjao Yu,

More information

Private Information Retrieval (PIR)

Private Information Retrieval (PIR) 2 Levente Buttyán Problem formulaton Alce wants to obtan nformaton from a database, but she does not want the database to learn whch nformaton she wanted e.g., Alce s an nvestor queryng a stock-market

More information

Network Intrusion Detection Based on PSO-SVM

Network Intrusion Detection Based on PSO-SVM TELKOMNIKA Indonesan Journal of Electrcal Engneerng Vol.1, No., February 014, pp. 150 ~ 1508 DOI: http://dx.do.org/10.11591/telkomnka.v1.386 150 Network Intruson Detecton Based on PSO-SVM Changsheng Xang*

More information

A New Feature of Uniformity of Image Texture Directions Coinciding with the Human Eyes Perception 1

A New Feature of Uniformity of Image Texture Directions Coinciding with the Human Eyes Perception 1 A New Feature of Unformty of Image Texture Drectons Concdng wth the Human Eyes Percepton Xng-Jan He, De-Shuang Huang, Yue Zhang, Tat-Mng Lo 2, and Mchael R. Lyu 3 Intellgent Computng Lab, Insttute of Intellgent

More information

The Research of Ellipse Parameter Fitting Algorithm of Ultrasonic Imaging Logging in the Casing Hole

The Research of Ellipse Parameter Fitting Algorithm of Ultrasonic Imaging Logging in the Casing Hole Appled Mathematcs, 04, 5, 37-3 Publshed Onlne May 04 n ScRes. http://www.scrp.org/journal/am http://dx.do.org/0.436/am.04.584 The Research of Ellpse Parameter Fttng Algorthm of Ultrasonc Imagng Loggng

More information

Meta-heuristics for Multidimensional Knapsack Problems

Meta-heuristics for Multidimensional Knapsack Problems 2012 4th Internatonal Conference on Computer Research and Development IPCSIT vol.39 (2012) (2012) IACSIT Press, Sngapore Meta-heurstcs for Multdmensonal Knapsack Problems Zhbao Man + Computer Scence Department,

More information

Solving two-person zero-sum game by Matlab

Solving two-person zero-sum game by Matlab Appled Mechancs and Materals Onlne: 2011-02-02 ISSN: 1662-7482, Vols. 50-51, pp 262-265 do:10.4028/www.scentfc.net/amm.50-51.262 2011 Trans Tech Publcatons, Swtzerland Solvng two-person zero-sum game by

More information

Analysis of Continuous Beams in General

Analysis of Continuous Beams in General Analyss of Contnuous Beams n General Contnuous beams consdered here are prsmatc, rgdly connected to each beam segment and supported at varous ponts along the beam. onts are selected at ponts of support,

More information

Sum of Linear and Fractional Multiobjective Programming Problem under Fuzzy Rules Constraints

Sum of Linear and Fractional Multiobjective Programming Problem under Fuzzy Rules Constraints Australan Journal of Basc and Appled Scences, 2(4): 1204-1208, 2008 ISSN 1991-8178 Sum of Lnear and Fractonal Multobjectve Programmng Problem under Fuzzy Rules Constrants 1 2 Sanjay Jan and Kalash Lachhwan

More information

Enhanced Watermarking Technique for Color Images using Visual Cryptography

Enhanced Watermarking Technique for Color Images using Visual Cryptography Informaton Assurance and Securty Letters 1 (2010) 024-028 Enhanced Watermarkng Technque for Color Images usng Vsual Cryptography Enas F. Al rawashdeh 1, Rawan I.Zaghloul 2 1 Balqa Appled Unversty, MIS

More information

Positive Semi-definite Programming Localization in Wireless Sensor Networks

Positive Semi-definite Programming Localization in Wireless Sensor Networks Postve Sem-defnte Programmng Localzaton n Wreless Sensor etworks Shengdong Xe 1,, Jn Wang, Aqun Hu 1, Yunl Gu, Jang Xu, 1 School of Informaton Scence and Engneerng, Southeast Unversty, 10096, anjng Computer

More information

Data Hiding and Image Authentication for Color-Palette Images

Data Hiding and Image Authentication for Color-Palette Images Data Hdng and Image Authentcaton for Color-Palette Images Chh-Yang Yn ( 殷志揚 ) and Wen-Hsang Tsa ( 蔡文祥 ) Department of Computer & Informaton Scence Natonal Chao Tung Unversty 00 Ta Hsueh Rd., Hsnchu, Tawan

More information

Local Quaternary Patterns and Feature Local Quaternary Patterns

Local Quaternary Patterns and Feature Local Quaternary Patterns Local Quaternary Patterns and Feature Local Quaternary Patterns Jayu Gu and Chengjun Lu The Department of Computer Scence, New Jersey Insttute of Technology, Newark, NJ 0102, USA Abstract - Ths paper presents

More information

The Shortest Path of Touring Lines given in the Plane

The Shortest Path of Touring Lines given in the Plane Send Orders for Reprnts to reprnts@benthamscence.ae 262 The Open Cybernetcs & Systemcs Journal, 2015, 9, 262-267 The Shortest Path of Tourng Lnes gven n the Plane Open Access Ljuan Wang 1,2, Dandan He

More information

PYTHON IMPLEMENTATION OF VISUAL SECRET SHARING SCHEMES

PYTHON IMPLEMENTATION OF VISUAL SECRET SHARING SCHEMES PYTHON IMPLEMENTATION OF VISUAL SECRET SHARING SCHEMES Ruxandra Olmd Faculty of Mathematcs and Computer Scence, Unversty of Bucharest Emal: ruxandra.olmd@fm.unbuc.ro Abstract Vsual secret sharng schemes

More information

A Fusion Steganographic Algorithm Based on Faster R-CNN

A Fusion Steganographic Algorithm Based on Faster R-CNN Copyrght 2018 Tech Scence Press CMC, vol.55, no.1, pp.1-16, 2018 A Fuson Steganographc Algorthm Based on Faster R-CNN Ruohan Meng 1, 2, Steven G. Rce 3, Jn Wang 4 1, 2, * and Xngmng Sun Abstract: The am

More information

A Robust Webpage Information Hiding Method Based on the Slash of Tag

A Robust Webpage Information Hiding Method Based on the Slash of Tag Advanced Engneerng Forum Onlne: 2012-09-26 ISSN: 2234-991X, Vols. 6-7, pp 361-366 do:10.4028/www.scentfc.net/aef.6-7.361 2012 Trans Tech Publcatons, Swtzerland A Robust Webpage Informaton Hdng Method Based

More information

Suppression for Luminance Difference of Stereo Image-Pair Based on Improved Histogram Equalization

Suppression for Luminance Difference of Stereo Image-Pair Based on Improved Histogram Equalization Suppresson for Lumnance Dfference of Stereo Image-Par Based on Improved Hstogram Equalzaton Zhao Llng,, Zheng Yuhu 3, Sun Quansen, Xa Deshen School of Computer Scence and Technology, NJUST, Nanjng, Chna.School

More information

A Unified Framework for Semantics and Feature Based Relevance Feedback in Image Retrieval Systems

A Unified Framework for Semantics and Feature Based Relevance Feedback in Image Retrieval Systems A Unfed Framework for Semantcs and Feature Based Relevance Feedback n Image Retreval Systems Ye Lu *, Chunhu Hu 2, Xngquan Zhu 3*, HongJang Zhang 2, Qang Yang * School of Computng Scence Smon Fraser Unversty

More information

Programming in Fortran 90 : 2017/2018

Programming in Fortran 90 : 2017/2018 Programmng n Fortran 90 : 2017/2018 Programmng n Fortran 90 : 2017/2018 Exercse 1 : Evaluaton of functon dependng on nput Wrte a program who evaluate the functon f (x,y) for any two user specfed values

More information

Edge Detection in Noisy Images Using the Support Vector Machines

Edge Detection in Noisy Images Using the Support Vector Machines Edge Detecton n Nosy Images Usng the Support Vector Machnes Hlaro Gómez-Moreno, Saturnno Maldonado-Bascón, Francsco López-Ferreras Sgnal Theory and Communcatons Department. Unversty of Alcalá Crta. Madrd-Barcelona

More information

Remote Sensing Image Retrieval Algorithm based on MapReduce and Characteristic Information

Remote Sensing Image Retrieval Algorithm based on MapReduce and Characteristic Information Remote Sensng Image Retreval Algorthm based on MapReduce and Characterstc Informaton Zhang Meng 1, 1 Computer School, Wuhan Unversty Hube, Wuhan430097 Informaton Center, Wuhan Unversty Hube, Wuhan430097

More information

Discrete Cosine Transform Optimization in Image Compression Based on Genetic Algorithm

Discrete Cosine Transform Optimization in Image Compression Based on Genetic Algorithm 015 8th Internatonal Congress on Image and Sgnal Processng (CISP 015) Dscrete Cosne Transform Optmzaton n Image Compresson Based on Genetc Algorthm LIU Yuan-yuan 1 CHE He-xn 1 College of Communcaton Engneerng,

More information

A Simple and Efficient Goal Programming Model for Computing of Fuzzy Linear Regression Parameters with Considering Outliers

A Simple and Efficient Goal Programming Model for Computing of Fuzzy Linear Regression Parameters with Considering Outliers 62626262621 Journal of Uncertan Systems Vol.5, No.1, pp.62-71, 211 Onlne at: www.us.org.u A Smple and Effcent Goal Programmng Model for Computng of Fuzzy Lnear Regresson Parameters wth Consderng Outlers

More information

Classifying Acoustic Transient Signals Using Artificial Intelligence

Classifying Acoustic Transient Signals Using Artificial Intelligence Classfyng Acoustc Transent Sgnals Usng Artfcal Intellgence Steve Sutton, Unversty of North Carolna At Wlmngton (suttons@charter.net) Greg Huff, Unversty of North Carolna At Wlmngton (jgh7476@uncwl.edu)

More information

The Research of Support Vector Machine in Agricultural Data Classification

The Research of Support Vector Machine in Agricultural Data Classification The Research of Support Vector Machne n Agrcultural Data Classfcaton Le Sh, Qguo Duan, Xnmng Ma, Me Weng College of Informaton and Management Scence, HeNan Agrcultural Unversty, Zhengzhou 45000 Chna Zhengzhou

More information

Statistical Steganalyis of Images Using Open Source Software

Statistical Steganalyis of Images Using Open Source Software Statstcal Steganalys of Images Usng Open Source Software Bhargav Kapa, Stefan A. Robla Department of Computer Scence Montclar State Unversty Montclar, NJ 07043 roblas@mal.montclar.edu Abstract In ths paper

More information

Feature Reduction and Selection

Feature Reduction and Selection Feature Reducton and Selecton Dr. Shuang LIANG School of Software Engneerng TongJ Unversty Fall, 2012 Today s Topcs Introducton Problems of Dmensonalty Feature Reducton Statstc methods Prncpal Components

More information

The Codesign Challenge

The Codesign Challenge ECE 4530 Codesgn Challenge Fall 2007 Hardware/Software Codesgn The Codesgn Challenge Objectves In the codesgn challenge, your task s to accelerate a gven software reference mplementaton as fast as possble.

More information

Enhanced AMBTC for Image Compression using Block Classification and Interpolation

Enhanced AMBTC for Image Compression using Block Classification and Interpolation Internatonal Journal of Computer Applcatons (0975 8887) Volume 5 No.0, August 0 Enhanced AMBTC for Image Compresson usng Block Classfcaton and Interpolaton S. Vmala Dept. of Comp. Scence Mother Teresa

More information

Research of Multiple Text Watermarks Technique in Electric Power System Texts

Research of Multiple Text Watermarks Technique in Electric Power System Texts Sensors & Transducers 203 by IFSA http://www.sensorsportal.com Research of Multple Text atermarks Technque n Electrc Power System Texts Xao-X XING, Qng CHEN, 2 Lan-X FU School of Optcal-Electrcal and Computer

More information

Resource and Virtual Function Status Monitoring in Network Function Virtualization Environment

Resource and Virtual Function Status Monitoring in Network Function Virtualization Environment Journal of Physcs: Conference Seres PAPER OPEN ACCESS Resource and Vrtual Functon Status Montorng n Network Functon Vrtualzaton Envronment To cte ths artcle: MS Ha et al 2018 J. Phys.: Conf. Ser. 1087

More information

A mathematical programming approach to the analysis, design and scheduling of offshore oilfields

A mathematical programming approach to the analysis, design and scheduling of offshore oilfields 17 th European Symposum on Computer Aded Process Engneerng ESCAPE17 V. Plesu and P.S. Agach (Edtors) 2007 Elsever B.V. All rghts reserved. 1 A mathematcal programmng approach to the analyss, desgn and

More information

Course Introduction. Algorithm 8/31/2017. COSC 320 Advanced Data Structures and Algorithms. COSC 320 Advanced Data Structures and Algorithms

Course Introduction. Algorithm 8/31/2017. COSC 320 Advanced Data Structures and Algorithms. COSC 320 Advanced Data Structures and Algorithms Course Introducton Course Topcs Exams, abs, Proects A quc loo at a few algorthms 1 Advanced Data Structures and Algorthms Descrpton: We are gong to dscuss algorthm complexty analyss, algorthm desgn technques

More information

An Application of the Dulmage-Mendelsohn Decomposition to Sparse Null Space Bases of Full Row Rank Matrices

An Application of the Dulmage-Mendelsohn Decomposition to Sparse Null Space Bases of Full Row Rank Matrices Internatonal Mathematcal Forum, Vol 7, 2012, no 52, 2549-2554 An Applcaton of the Dulmage-Mendelsohn Decomposton to Sparse Null Space Bases of Full Row Rank Matrces Mostafa Khorramzadeh Department of Mathematcal

More information

A Deflected Grid-based Algorithm for Clustering Analysis

A Deflected Grid-based Algorithm for Clustering Analysis A Deflected Grd-based Algorthm for Clusterng Analyss NANCY P. LIN, CHUNG-I CHANG, HAO-EN CHUEH, HUNG-JEN CHEN, WEI-HUA HAO Department of Computer Scence and Informaton Engneerng Tamkang Unversty 5 Yng-chuan

More information

Information Hiding Watermarking Detection Technique by PSNR and RGB Intensity

Information Hiding Watermarking Detection Technique by PSNR and RGB Intensity www..org 3 Informaton Hdng Watermarkng Detecton Technque by PSNR and RGB Intensty 1 Neha Chauhan, Akhlesh A. Waoo, 3 P. S. Patheja 1 Research Scholar, BIST, Bhopal, Inda.,3 Assstant Professor, BIST, Bhopal,

More information

BioTechnology. An Indian Journal FULL PAPER. Trade Science Inc.

BioTechnology. An Indian Journal FULL PAPER. Trade Science Inc. [Type text] [Type text] [Type text] ISSN : 0974-74 Volume 0 Issue BoTechnology 04 An Indan Journal FULL PAPER BTAIJ 0() 04 [684-689] Revew on Chna s sports ndustry fnancng market based on market -orented

More information

Vectorization of Image Outlines Using Rational Spline and Genetic Algorithm

Vectorization of Image Outlines Using Rational Spline and Genetic Algorithm 01 Internatonal Conference on Image, Vson and Computng (ICIVC 01) IPCSIT vol. 50 (01) (01) IACSIT Press, Sngapore DOI: 10.776/IPCSIT.01.V50.4 Vectorzaton of Image Outlnes Usng Ratonal Splne and Genetc

More information

Repeater Insertion for Two-Terminal Nets in Three-Dimensional Integrated Circuits

Repeater Insertion for Two-Terminal Nets in Three-Dimensional Integrated Circuits Repeater Inserton for Two-Termnal Nets n Three-Dmensonal Integrated Crcuts Hu Xu, Vasls F. Pavlds, and Govann De Mchel LSI - EPFL, CH-5, Swtzerland, {hu.xu,vasleos.pavlds,govann.demchel}@epfl.ch Abstract.

More information

Correlative features for the classification of textural images

Correlative features for the classification of textural images Correlatve features for the classfcaton of textural mages M A Turkova 1 and A V Gadel 1, 1 Samara Natonal Research Unversty, Moskovskoe Shosse 34, Samara, Russa, 443086 Image Processng Systems Insttute

More information