Performance Analysis of Data Hiding in MPEG-4 AAC Audio *

Size: px
Start display at page:

Download "Performance Analysis of Data Hiding in MPEG-4 AAC Audio *"

Transcription

1 TSINGHUA SCIENCE AND TECHNOLOGY ISSNll ll07/21llpp55-61 Volume 14, Number 1, February 2009 Performance Analyss of Data Hdng n MPEG-4 AAC Audo * XU Shuzheng ( ) **, ZHANG Peng ( ), WANG Pengjun ( ), YANG Huazhong ( ) Insttute of Crcuts and Systems, Department of Electronc Engneerng, Tsnghua Unversty, Bejng , Chna Abstract: A hgh capacty data hdng technque was developed for compressed dgtal audo. As perceptual audo codng has become the accepted technology for storage and transmsson of audo sgnals, compressed audo nformaton hdng enables robust, mperceptble transmsson of data wthn audo sgnals, thus allowng valuable nformaton to be attached to the content, such as the song ttle, lyrcs, composer s name, and artst or property rghts related data. Ths paper descrbes smultaneous low btrate encodng and nformaton hdng for hghly compressed audo sgnals. The nformaton hdng s mplemented n the quantzaton process of the audo content whch mproves robustness, sgnal qualty, and securty. The mperceptblty of the embedded data s ensured based on the maskng property of the human audtory system (HAS). The robustness and securty are evaluated by varous attackng algorthms. Tests wth an extended MPEG4 advanced audo codng (AAC) encoder confrm that the method s robust to the regular and sngular groups method (RS) and sample par analyss (SPA) attacks as well as other statstcal steganalyss method attacks. Key words: advanced audo codng (AAC); steganography; steganalyss; human audtory system (HAS); data hdng; nformaton hdng Introducton Data hdng, or steganography, s a challengng area of research whch has attracted much attenton for centures [1]. As an actve area of research, new technques are constantly emergng. In contrast to the actve research focusng on mage or vdeo schemes, there s lttle research on data hdng n audo schemes, especally n hgh compressed audo lke the MPEG-4 advanced audo codng (AAC). Human ears can detect even a small amount of embedded nose especally when the sgnal s weak. Receved: ; revsed: * Supported by the Chuanxn Foundaton (No ) and the Basc Research Foundaton of Tsnghua Natonal Laboratory for Informaton Scence and Technology (TNLst) ** To whom correspondence should be addressed. E-mal: xusz@mal.tsnghua.edu.cn; Tel: However, effectve data hdng n audo can create robust and mperceptble data wthn audo sgnals, thus allowng property rghts protecton or secret data exchange. Data hdng acts as an ntentonal nose nserted nto dgtal audo sgnals. Data hdng s a good method for preventng llct copyng and dssemnaton of copyrghted audo and can also be used to transfer secret nformaton n convert communcatons. A number of systems are currently avalable to transmt a watermark n a hdden channel wthn uncompressed audo sgnals. However, compressed audo, usng a perceptual audo encoder to save storage space as well as to mnmze the transmsson bandwdth and tme, s very popular and wdely used over the Internet and n wreless communcatons. Current research has manly focused on the pulse code modulaton (PCM) doman for AAC fles [2], where the hdden nformaton dsturbs the sgnal durng quantzaton n the audo

2 56 encoder. There s also some research that hdes data drectly nto the compressed audo [3]. The dsadvantage of ths method s that the hdden data treated as an addtonal dsturbance to the quantzaton nose, results n obvous degradaton of the audo qualty. Ths paper presents a method for data hdng durng the encodng process of the MPEG-4 AAC audo. The scheme has flexblty n hdng the data and obtans a good balance between robustness, securty, and capacty. 1 State of the Art 1.1 Advanced audo codng n MPEG-4 AAC, whch s ncluded n the MPEG-4 audo standard, s a compatble successor to the MPEG-2 audo codng [4]. As perceptual encoders, they explot knowledge of human percepton to shape the nose dstrbuton ntroduced by the rrelevancy reducton to acheve the best possble audo qualty. The basc structure of the perceptual encoder used n the MPEG audo famly s Tsnghua Scence and Technology, February 2009, 14(1): shown n Fg. 1. AAC encodng conssts of frequency transform, quantzaton, entropy codng, and btstream multplexng steps. AAC typcally employs modfed dscrete cosne transform (MDCT) wth 1024 samples per frame. The 1024 frequency samples n each tme frame are separated nto 49 frequency bands. Wthn the same frequency band, samples are consdered to have smlar perceptual effect to the human ear and, hence, share the same quantzaton step sze. Perceptual modelng s appled to the MDCT coeffcents to estmate the maxmum amount of dstorton that can be wthstood by each coeffcent. The quantzaton step sze s teratvely modfed untl the rate s below the target bt rate and the dstorton s below the maxmum acceptable value obtaned from the perceptual model. Huffman codng s used to encode the quantzed coeffcents and the quantzaton step sze. Fnally, the coded bts wth some sde nformaton are multplexed nto a sngle btstream to be transmtted or saved. Fg. 1 Basc structure of a perceptual encoder The man task of the perceptual encodng s to compress the dgtal audo as much as possble such that the sound qualty of the reconstructed sgnal s exactly the same as or as close as possble to the orgnal audo sgnal. There are also some other requrements lke low complexty and flexblty for a wde applcaton area. The modern hghly developed perceptual models and effcent redundancy reducton audo encodng systems offer a multtude of codng tools lke temporal nose shapng (TNS), jont stereo codng, and perceptual nose substtuton (PNS) to fulfll these requrements. 1.2 Data hdng Varous schemes are used for data hdng n audo, such as echo hdng [5], tme doman modfcaton [6], and spread spectrum technology [7]. Data hdng n audo must satsfy at least the three constrants of securty or mperceptblty, robustness, and capacty. These terms are commonly used to descrbe the propertes of dfferent data hdng schemes. Securty Data hdng n audo s also called naudblty. In most cases, securty, ncludng perceptual transparency of the hdden data, s consdered to be the most mportant ssue. In other words, the nose ntroduced by the hdden data should be almost naudble and should not degrade the audo qualty. The statstcal propertes of the embedded audo sgnal should be exactly the same as the orgnal audo to ensure that the hdden data s mperceptble and undetectable by thrd partes. Robustness The algorthm should be robust enough to wthstand unntentonal or ntentonal attempts such as removal or alteraton of the hdden data. Even wth unfavorable condtons such as bad wreless channels whch degrade the audo qualty, the hdden data should be recovered successfully. Capacty Often, the capacty of the hdden data s also a very demandng aspect. Capacty refers to the number of bts per second that can be transmtted by the data hdng system. Ths depends on the underlyng

3 XU Shuzheng ( ) et al Performance Analyss of Data Hdng n MPEG-4 AAC Audo 57 technology and the choce of parameters for the hdng scheme. At present, the data rates reach several hundred bts per second. Securty, robustness, and capacty have contradctory arguments so they cannot be adjusted ndependently. For nstance, ncreases of the data hdng capacty wll degrade the robustness and securty. These trade-offs form the trangle shown n Fg. 2 wth an approprate operatng pont wthn the lmts of the trangle chosen for dfferent applcatons. Fg. 2 Trade-off between securty, robustness, and capacty 2 Data Hdng Scheme 2.1 Basc structure The present scheme alters the quantzaton and codng process by modfyng the scale factor to produce more bts, wth the redundant bts replaced by hdden data. The basc structure of the system ncludng all of the relevant parts of the MPEG-4 AAC perceptual encoder s shown n Fg. 3. The encodng scheme s very effcent. The uncompressed nput audo sgnal s processed by the analyss flterbank wth parameters gathered from both the sgnal tself and the perceptual model. The data s frst compressed, encrypted, and then hdden n the AAC btstream. The hdng process takes place at the heart of the Layer III encodng process n the nner loop. The nner loop quantzes the nput data and reduces the quantzaton step sze untl the quantzed data can be coded wth the avalable number of bts. Another loop checks that the dstortons ntroduced by the quantzaton do not exceed the threshold defned by the psychoacoustc model. Fnally, the multplexer produces a btstream ncludng data and sde nformaton to complete the data hdng process. The adherence to the psychoacoustc model makes t very dffcult to hear the hdden data. For example, durng the tradtonal quantzaton and codng process, the compressed sgnal can be represented as 3 T 3T Xs 2 X 2 X (1) where T s the scale factor calculated by the perceptual model and X (=1,, 960) represents the quantzed data. For the same sgnal X s, the scale factor T s reduced, the quantzaton step 2 T becomes smaller, and X becomes larger, and has to be represented by more bnary bts. If the scale factor T s 4 whch means that the maskng threshold for psychologcal hearng s 2 T 16, and the sgnal X s s 128, then X s 8 (the bnary form s 1000). If the scale factor Fg. 3 Basc data hdng structure for the AAC perceptual encoder

4 58 T s reduced from 4 to 2, then X wll become 16 (10 000). If the least sgnfcant bt (LSB) of X s replaced by the hdden data, then the hdden data wll sound lke nose n the audo sgnal wth the ntroduced nose energy stll below the maskng threshold level so t wll not affect the audo qualty. Ths actve modfcaton method can flexbly ncrease the hdden data capacty by varyng the scale factors and the number of spectral subbands. The robustness and securty of the hdden data are acheved by the spread spectrum and the pseudo selecton of the subbands for data hdng. 2.2 Data extracton The extracton process should be mplemented before reconstructng the MDCT coeffcents because the nformaton s embedded n the quantzed coeffcent. Blnd extracton ntroduces two problems nto the data extracton process. A normal audo frame whch does not have any nformaton may be treated as a specal audo frame when the crcle redundant check (CRC) byte s passed wth a very low probablty. However, a specal audo frame may be treated as a normal audo frame when mstakes occur n the channel. These two problems are common n wreless communcatons. Thus, the nformaton should be changed to a specal data format wth a CRC byte nserted nto the nformaton for wreless transmssons. 2.3 Characterstcs Compared wth current data hdng schemes, the algorthm presented here has the followng advantages: (1) The scheme enables optmal coordnaton between the quantzaton strategy of the encoder and the data hdng process. All nformaton about the modfcaton of the quantzaton parameters s taken nto account by the data hdng process. (2) The scheme can flexbly vary the data hdng capacty by adjustng the number of coeffcents for the quantzaton, and thus ths scheme provdes adaptve data hdng. When the embedded data bt rate needs to be changed, the scheme can adaptvely change the quantzaton parameters. (3) The scheme assures hgh data hdng securty. The coeffcents whch carry the hdden data are pcked up by a pseudo random mechansm whch s unlkely to be ntercepted by a thrd party. Tsnghua Scence and Technology, February 2009, 14(1): Test Results 3.1 Audo qualty The qualty of the data hdng AAC sgnals was carefully assessed by subjectve lstenng tests. The AAC test tems represent a varety of typcal materals from dgtal rado broadcastng source sgnals [8] and the test used a MUSHRA lstenng test [9]. The qualty was evaluated by ten lsteners who were all experenced and famlar wth the set of test tems. Fgure 4 shows the mean values and 95% confdence level for the crtcal test tems. The results show that there s no statstcally sgnfcant degradaton between the orgnal AAC encoded tems and the modfed sgnals for all hdden data capactes vares from 10% to 100%. Fg. 4 Evaluated qualty of orgnal MPEG-4 AAC audo and modfed AAC audo Sgnal-to-nose rato (SNR) s a typcal objectve measure of audo qualty. In the compresson doman, the sgnal s defned as the orgnal uncompressed audo and the nose s defned as the dstorton between the decompressed audo and the uncompressed audo. The SNR of MPEG-4 AAC compresson s typcally db. The hdden data wll ntroduce some quantzaton nose whch wll slghtly reduce the SNR value. Statstcal calculatons wth large test sets show that there s only about db loss n the SNR when hdng messages at the maxmum bt rate. In addton, the use of the psychoacoustc model guarantees that the nose ntroduced by the data embeddng process does not exceed the threshold and only slghtly degrades the audo qualty. 3.2 Hdng data capacty Snce the actve modfcaton scheme requres more bts to represent the sgnal, the compressed audo wll be enlarged. Fgure 5 shows how the sze of the carrer

5 XU Shuzheng ( ) et al Performance Analyss of Data Hdng n MPEG-4 AAC Audo 59 of the AAC fle s ncreased as the hdden data ncreases, wth the ncreased sze of the AAC fle beng much smaller than that of the hdden data. For nstance, when the hdden data sze s ncreased by 60%, the rato of the hdden AAC fle to the orgnal fle sze s 132%, only ncreased by 32%. There are also some flat regons n the curve whch ndcate that the hdden data sze do not affect the AAC fle sze. Snce the strategy s to modfy the scale factors of some spectral subbands whose length are fxed, dfferent hdden data capactes may requre the same number of modfed subband scale factors. Fg. 6 Frequency doman waveform of the MPEG-4 AAC and converted AAC audo streams Fg. 5 Fle szes of the orgnal MPEG-4 AAC and converted AAC audo fles 3.3 Tme and spectrum waves Tests were also run to evaluate whether the hdden data n an AAC audo can be detected through more qualtatve methods, and the characterstcs of the changes. Further research could yeld a set of analytcal formulas descrbng the relatonshps between the hdden data, the voce or carrer data, the measurements, and the results. Ths research only analyzed the sound waveforms n the tme and frequency domans. CoolEdt2000 was used for the tme and spectral analyses. The orgnal AAC audo waveforms are compared wth the recordng contanng the encrypted hdden data. The resultng waveforms n the tme and frequency doman are shown n Fgs. 6 and 7. Both the tme and frequency analyses do not show any dstngushng dfferences between the orgnal recordng and the recordng wth the hdden data. However, there seems to be a slght amount of sgnal loss and a slght ncrease n dstorton due to the hdden data, but the overall measurement scores are Fg. 7 Tme doman waveform of the MPEG-4 AAC and converted AAC audo streams very good. The very mnor alteratons of the orgnal recordng when the data s hdden are so small as to not be perceptble. 3.4 RS and SPA detecton The regular and sngular groups method (RS) ntroduced by Frdrch et al. [10,11] and the sample par analyss (SPA) ntroduced by Dumtrescu et al. [12] have proven to be the most useful tools for detectng least sgnfcant bt (LSB) embeddng [13]. The RS estmates the length of the embedded data by countng the length varaton of the regular set and the sngular set. When the data s embedded n a random order, the length of the embedded data can be accurately estmated by ths

6 60 method. The SPA accurately estmates the length of the embedded data when more than 3% of the data s embedded n LSB. Andrew [13] verfed the credblty of the RS and the SPA n many tests. The present scheme s an LSB embedded method. However, the scheme can effectvely resst the RS and SPA detectons snce the embedded process works n the frequency and compresson doman. The AAC V2 correlaton s much hgher than that of LSB by RS detecton algorthm, and the correlaton becomes better as the hdng data ncreased. Fgures 8 and 9 show the results of usng RS and SPA to analyze sequence sets embedded data by a normal LSB scheme and the current AAC V2 scheme, whch ndcate that the later has better performance of securty. Tsnghua Scence and Technology, February 2009, 14(1): to be classfed wth the condton that the carrer and the stego are both blnd to the classfer. A judgment result very close to 50% ndcates hgh securty wth an absolutely secure system havng a result of 50%. The classfer structure s shown n Fg. 10. The dstance measurement module calculates the characterstc dfference between the converted and the orgnal AAC fles. Snce the analyss does not know what knds of characterstcs have been changed durng the data hdng process and to assure the generalty of the analyss, the system analyzes as many characterstcs as possble. Fg. 10 Basc classfer structure Fg. 8 RS analyss results for detectng hdden nformaton Fg. 9 SPA analyss results for detectng hdden nformaton 3.5 Detecton analyss Steganalyss can be charaterzed as classfcaton of two elements. The carrer and the stego are objectves Three knds of characterstcs are consdered n the classfer [14,15]. (1) Tme doman measurements nclude the SNR, segment SNR (SNRseg), Czenakowsk dstance (CAD), and Mnkowsky measurement (MM). (2) Frequency doman measurements nclude the logarthm lkelhood rato, Itakura-Sato dstance, COSH dstance, nverse spectrum dstance, multtude spectrum dstorton, and phase spectrum dstorton. (3) Perceptual doman measurements nclude the BARK dstorton. Lnearty regresson, classfcaton tree, vector support, and projecton were selected as the classfcaton algorthms n the classfer. Generally speakng, the two classfer results are detecton and false detecton. The testng sets nclude 200 groups of AAC fles compressed from khz to 48 khz, 16 bts, mono and stereo PCM btstreams. The test results are shown n Table 1. The data n Table 1 shows that the measurement probablty of the AAC data hdng algorthm s almost 50% whle the possbltes for other hdng algorthms, LSB, ECHO, Hde4PGP, and Steghde, are much hgher. Thus, the AAC data hdng algorthm has comparatvely hgher securty.

7 XU Shuzheng ( ) et al Performance Analyss of Data Hdng n MPEG-4 AAC Audo 61 Table 1 Performance comparson of dfferent data hdng algorthms Algorthm Probablty of detecton/probablty of false detecton Lnearty regresson Vector support Classfcaton tree Projecton LSB 0.72/ / / /0.44 ECHO 0.78/ / / /0.22 Hde4PGP 0.75/ / / /0.32 Steghde 0.67/ / / /0.39 AAC(BPF * 8) 0.52/ / / /0.44 * BPF: Byte per frame. 4 Concludng Remarks Ths paper frst gves an overvew of data hdng compressed audo sgnals and the state-of-the-art technologes for source compresson especally AAC formats. A data hdng scheme for MPEG4 AAC s presented based on the human audtory system. The data hdng occurs n the quantzaton process of the MDCT procedure of the AAC codng, and the hdden data capacty can be adaptve to the orgnal data rate by actve modfcaton of scale factors wthout degradaton of audo qualty. The mplementaton s very effcent wth good robustness acheved by enablng optmum coordnaton of the AAC quantzaton and data hdng processes. Tests confrm the potental of ths new technology and show t to be an attractve soluton for property rghts protecton and covert communcatons. References [1] Pettcolas F A P, Anderson R J, Kuhn M G. Informaton hdng A survey. In: Proceedngs of the IEEE Specal Issue on Protecton of Multmeda Content, 1999, 87(7): eee99-nfohdng.pdf. [2] Cheng S, Yu H, Xong Z. Enhanced spread spectrum watermarkng of AAC audo. In: Proceedng ICASSP 02. Orlando, FL, USA, 2002: [3] Neubauer C, Herre J. Audo watermarkng of MPEG-2 AAC btstreams. In: 108th AES Conventon, Audo Engneerng Socety Preprnt Pars, France, 2000: [4] Koenen R. Overvew of the MPEG-4 standard. Document, M-arz ISO/IEC JTC1/SC29/WG11 N, [5] Gruhl D, Lu A, Bender W. Echo hdng. Lecture Notes n Computer Scence, 1996, 1174: [6] Xu Chansheng, Wu Jankang, Sun Qubn, et al. Applcatons of dgtal watermarkng technology n audo sgnals. Journal of Audo Engneerng Socety, 1999, 47(10): [7] Garca R A. Dgtal watermarkng of audo sgnals usng a psychoacoustc audtory model and spread spectrum theory. In: 107th AES Conventon. New York, USA, 1999: [8] Dgtal Rado Mondale (DRM) System Specfcaton (ETSI) , V2.1.1, [9] Stoll G, Kozamernk F. A method for subjectve lstenng tests of ntermedate audo qualty. ITU Workng Party 10-11Q, Sept [10] Frdrch J, Goljan M. Practcal steganalyss of dgtal mages State of the art. In: Proceedngs of SPIE: Securty and Watermarkng of Multmeda Contents IV. 2002: [11] Frdrch J, Goljan M, Du R. Relable detecton of LSB steganography n color and grayscale mages. In: Proceedngs of the ACM Workshop Multmeda Securty. Ottawa, Canada, 2001: [12] Dumtrescu S, Wu Xaoln, Wang Zhe. Detecton of LSB steganography va sample par analyss. IEEE Transactons on Sgnal Processng, 2003, 51(7): [13] Andrew D K. Improved detecton of LSB steganography n grayscale mages. Lecture Notes n Computer Scence, 2004, 3200: [14] Ozer H, Avcbas I, Sankur B, et al. Steganalyss of audo based on audo qualty metrcs. In: Securty and Watermarkng of Multmeda Contents. Santa Clara, USA, 2003: [15] Yang Bo. Extensve bark spectral dstorton measurement for objectve speech qualty assessment. Journal of Unversty of Electronc Scence and Technology of Chna, 2006, 35(3):

Hybrid Non-Blind Color Image Watermarking

Hybrid Non-Blind Color Image Watermarking Hybrd Non-Blnd Color Image Watermarkng Ms C.N.Sujatha 1, Dr. P. Satyanarayana 2 1 Assocate Professor, Dept. of ECE, SNIST, Yamnampet, Ghatkesar Hyderabad-501301, Telangana 2 Professor, Dept. of ECE, AITS,

More information

Key-Selective Patchwork Method for Audio Watermarking

Key-Selective Patchwork Method for Audio Watermarking Internatonal Journal of Dgtal Content Technology and ts Applcatons Volume 4, Number 4, July 2010 Key-Selectve Patchwork Method for Audo Watermarkng 1 Ch-Man Pun, 2 Jng-Jng Jang 1, Frst and Correspondng

More information

A NEW AUDIO WATERMARKING METHOD BASED

A NEW AUDIO WATERMARKING METHOD BASED A NEW AUDIO WATERMARKING METHOD BASED ON DISCRETE COSINE TRANSFORM WITH A GRAY IMAGE Mohammad Ibrahm Khan 1, Md. Iqbal Hasan Sarker 2, Kaushk Deb 3 and Md. Hasan Furhad 4 1,2,3 Department of Computer Scence

More information

Detecting MP3Stego using Calibrated Side Information Features

Detecting MP3Stego using Calibrated Side Information Features 2628 JOURNAL OF SOFTWARE, VOL. 8, NO. 10, OCTOBER 2013 Detectng P3Stego usng Calbrated Sde Informaton Features Xanmn Yu School of Informaton Scence and Engneerng, Nngbo Unversty Emal: mlhappy1016@163.com

More information

A Binarization Algorithm specialized on Document Images and Photos

A Binarization Algorithm specialized on Document Images and Photos A Bnarzaton Algorthm specalzed on Document mages and Photos Ergna Kavalleratou Dept. of nformaton and Communcaton Systems Engneerng Unversty of the Aegean kavalleratou@aegean.gr Abstract n ths paper, a

More information

A Secured Method for Image Steganography Based On Pixel Values

A Secured Method for Image Steganography Based On Pixel Values A Secured Method for Image Steganography Based On Pxel Values Tarun Gulat #, Sanskrt Gupta * # Assocate Professor, Electroncs and Communcaton Engneerng Department, MMEC, M.M.U., Mullana, Ambala, Haryana,

More information

A Fast Visual Tracking Algorithm Based on Circle Pixels Matching

A Fast Visual Tracking Algorithm Based on Circle Pixels Matching A Fast Vsual Trackng Algorthm Based on Crcle Pxels Matchng Zhqang Hou hou_zhq@sohu.com Chongzhao Han czhan@mal.xjtu.edu.cn Ln Zheng Abstract: A fast vsual trackng algorthm based on crcle pxels matchng

More information

Identify the Attack in Embedded Image with Steganalysis Detection Method by PSNR and RGB Intensity

Identify the Attack in Embedded Image with Steganalysis Detection Method by PSNR and RGB Intensity Internatonal Journal of Computer Systems (ISSN: 394-1065), Volume 03 Issue 07, July, 016 Avalable at http://www.jcsonlne.com/ Identfy the Attack n Embedded Image wth Steganalyss Detecton Method by PSNR

More information

A Robust Webpage Information Hiding Method Based on the Slash of Tag

A Robust Webpage Information Hiding Method Based on the Slash of Tag Advanced Engneerng Forum Onlne: 2012-09-26 ISSN: 2234-991X, Vols. 6-7, pp 361-366 do:10.4028/www.scentfc.net/aef.6-7.361 2012 Trans Tech Publcatons, Swtzerland A Robust Webpage Informaton Hdng Method Based

More information

A Fast Content-Based Multimedia Retrieval Technique Using Compressed Data

A Fast Content-Based Multimedia Retrieval Technique Using Compressed Data A Fast Content-Based Multmeda Retreval Technque Usng Compressed Data Borko Furht and Pornvt Saksobhavvat NSF Multmeda Laboratory Florda Atlantc Unversty, Boca Raton, Florda 3343 ABSTRACT In ths paper,

More information

Research of Multiple Text Watermarks Technique in Electric Power System Texts

Research of Multiple Text Watermarks Technique in Electric Power System Texts Sensors & Transducers 203 by IFSA http://www.sensorsportal.com Research of Multple Text atermarks Technque n Electrc Power System Texts Xao-X XING, Qng CHEN, 2 Lan-X FU School of Optcal-Electrcal and Computer

More information

Improvement of Spatial Resolution Using BlockMatching Based Motion Estimation and Frame. Integration

Improvement of Spatial Resolution Using BlockMatching Based Motion Estimation and Frame. Integration Improvement of Spatal Resoluton Usng BlockMatchng Based Moton Estmaton and Frame Integraton Danya Suga and Takayuk Hamamoto Graduate School of Engneerng, Tokyo Unversty of Scence, 6-3-1, Nuku, Katsuska-ku,

More information

Enhanced AMBTC for Image Compression using Block Classification and Interpolation

Enhanced AMBTC for Image Compression using Block Classification and Interpolation Internatonal Journal of Computer Applcatons (0975 8887) Volume 5 No.0, August 0 Enhanced AMBTC for Image Compresson usng Block Classfcaton and Interpolaton S. Vmala Dept. of Comp. Scence Mother Teresa

More information

Quantization Noise Power Injection In Subband Audio Coding Using Low Selectivity Filter Banks

Quantization Noise Power Injection In Subband Audio Coding Using Low Selectivity Filter Banks Quantzaton Nose Power Injecton In Subband Audo Codng Usng Low Selectvty Flter Banks D. ARTÍNEZ -UÑOZ, N. RUIZ-REYES, P. VERA-CANDEAS, P.J. RECHE-LÓPEZ, J. CURPIÁN-ALONSO Departamento de Electrónca Unversdad

More information

Shape-adaptive DCT and Its Application in Region-based Image Coding

Shape-adaptive DCT and Its Application in Region-based Image Coding Internatonal Journal of Sgnal Processng, Image Processng and Pattern Recognton, pp.99-108 http://dx.do.org/10.14257/sp.2014.7.1.10 Shape-adaptve DCT and Its Applcaton n Regon-based Image Codng Yamn Zheng,

More information

FEATURE EXTRACTION. Dr. K.Vijayarekha. Associate Dean School of Electrical and Electronics Engineering SASTRA University, Thanjavur

FEATURE EXTRACTION. Dr. K.Vijayarekha. Associate Dean School of Electrical and Electronics Engineering SASTRA University, Thanjavur FEATURE EXTRACTION Dr. K.Vjayarekha Assocate Dean School of Electrcal and Electroncs Engneerng SASTRA Unversty, Thanjavur613 41 Jont Intatve of IITs and IISc Funded by MHRD Page 1 of 8 Table of Contents

More information

Related-Mode Attacks on CTR Encryption Mode

Related-Mode Attacks on CTR Encryption Mode Internatonal Journal of Network Securty, Vol.4, No.3, PP.282 287, May 2007 282 Related-Mode Attacks on CTR Encrypton Mode Dayn Wang, Dongda Ln, and Wenlng Wu (Correspondng author: Dayn Wang) Key Laboratory

More information

Problem Definitions and Evaluation Criteria for Computational Expensive Optimization

Problem Definitions and Evaluation Criteria for Computational Expensive Optimization Problem efntons and Evaluaton Crtera for Computatonal Expensve Optmzaton B. Lu 1, Q. Chen and Q. Zhang 3, J. J. Lang 4, P. N. Suganthan, B. Y. Qu 6 1 epartment of Computng, Glyndwr Unversty, UK Faclty

More information

Simulation Based Analysis of FAST TCP using OMNET++

Simulation Based Analysis of FAST TCP using OMNET++ Smulaton Based Analyss of FAST TCP usng OMNET++ Umar ul Hassan 04030038@lums.edu.pk Md Term Report CS678 Topcs n Internet Research Sprng, 2006 Introducton Internet traffc s doublng roughly every 3 months

More information

SLAM Summer School 2006 Practical 2: SLAM using Monocular Vision

SLAM Summer School 2006 Practical 2: SLAM using Monocular Vision SLAM Summer School 2006 Practcal 2: SLAM usng Monocular Vson Javer Cvera, Unversty of Zaragoza Andrew J. Davson, Imperal College London J.M.M Montel, Unversty of Zaragoza. josemar@unzar.es, jcvera@unzar.es,

More information

An Image Compression Algorithm based on Wavelet Transform and LZW

An Image Compression Algorithm based on Wavelet Transform and LZW An Image Compresson Algorthm based on Wavelet Transform and LZW Png Luo a, Janyong Yu b School of Chongqng Unversty of Posts and Telecommuncatons, Chongqng, 400065, Chna Abstract a cylpng@63.com, b y27769864@sna.cn

More information

A Hybrid Semi-Blind Gray Scale Image Watermarking Algorithm Based on DWT-SVD using Human Visual System Model

A Hybrid Semi-Blind Gray Scale Image Watermarking Algorithm Based on DWT-SVD using Human Visual System Model A Hybrd Sem-Blnd Gray Scale Image Watermarkng Algorthm Based on DWT-SVD usng Human Vsual System Model Rajesh Mehta r Scence & Engneerng, USICT Guru Gobnd Sngh Indrarprastha Unversty New Delh, Inda rajesh00ust@gmal.com

More information

Article Reversible Dual-Image-Based Hiding Scheme Using Block Folding Technique

Article Reversible Dual-Image-Based Hiding Scheme Using Block Folding Technique Artcle Reversble Dual-Image-Based Hdng Scheme Usng Block Foldng Technque Tzu-Chuen Lu, * and Hu-Shh Leng Department of Informaton Management, Chaoyang Unversty of Technology, Tachung 4349, Tawan Department

More information

Term Weighting Classification System Using the Chi-square Statistic for the Classification Subtask at NTCIR-6 Patent Retrieval Task

Term Weighting Classification System Using the Chi-square Statistic for the Classification Subtask at NTCIR-6 Patent Retrieval Task Proceedngs of NTCIR-6 Workshop Meetng, May 15-18, 2007, Tokyo, Japan Term Weghtng Classfcaton System Usng the Ch-square Statstc for the Classfcaton Subtask at NTCIR-6 Patent Retreval Task Kotaro Hashmoto

More information

Enhanced Watermarking Technique for Color Images using Visual Cryptography

Enhanced Watermarking Technique for Color Images using Visual Cryptography Informaton Assurance and Securty Letters 1 (2010) 024-028 Enhanced Watermarkng Technque for Color Images usng Vsual Cryptography Enas F. Al rawashdeh 1, Rawan I.Zaghloul 2 1 Balqa Appled Unversty, MIS

More information

Feature Reduction and Selection

Feature Reduction and Selection Feature Reducton and Selecton Dr. Shuang LIANG School of Software Engneerng TongJ Unversty Fall, 2012 Today s Topcs Introducton Problems of Dmensonalty Feature Reducton Statstc methods Prncpal Components

More information

An Optimal Algorithm for Prufer Codes *

An Optimal Algorithm for Prufer Codes * J. Software Engneerng & Applcatons, 2009, 2: 111-115 do:10.4236/jsea.2009.22016 Publshed Onlne July 2009 (www.scrp.org/journal/jsea) An Optmal Algorthm for Prufer Codes * Xaodong Wang 1, 2, Le Wang 3,

More information

Statistical Steganalyis of Images Using Open Source Software

Statistical Steganalyis of Images Using Open Source Software Statstcal Steganalys of Images Usng Open Source Software Bhargav Kapa, Stefan A. Robla Department of Computer Scence Montclar State Unversty Montclar, NJ 07043 roblas@mal.montclar.edu Abstract In ths paper

More information

Distortion Function Designing for JPEG Steganography with Uncompressed Side-image

Distortion Function Designing for JPEG Steganography with Uncompressed Side-image Dstorton Functon Desgnng for JPEG Steganography wth Uncompressed Sde-mage Fangjun Huang School of Informaton Scence and Technology, Sun Yat-Sen Unversty, GD 56, Chna huangfj@mal.sysu.edu.cn Jwu Huang School

More information

Tsinghua University at TAC 2009: Summarizing Multi-documents by Information Distance

Tsinghua University at TAC 2009: Summarizing Multi-documents by Information Distance Tsnghua Unversty at TAC 2009: Summarzng Mult-documents by Informaton Dstance Chong Long, Mnle Huang, Xaoyan Zhu State Key Laboratory of Intellgent Technology and Systems, Tsnghua Natonal Laboratory for

More information

Robust Blind Video Watermark Algorithm in Transform Domain Combining with 3D Video Correlation

Robust Blind Video Watermark Algorithm in Transform Domain Combining with 3D Video Correlation JOURNAL OF MULTIMEDIA, VOL. 8, NO. 2, APRIL 2013 161 Robust Blnd Vdeo Watermark Algorthm n Transform Doman Combnng wth 3D Vdeo Correlaton DING Ha-yang 1,3 1. Informaton Securty Center, Bejng Unversty of

More information

High Payload Reversible Data Hiding Scheme Using Difference Segmentation and Histogram Shifting

High Payload Reversible Data Hiding Scheme Using Difference Segmentation and Histogram Shifting JOURNAL OF ELECTRONIC SCIENCE AND TECHNOLOGY, VOL. 11, NO. 1, MARCH 2013 9 Hgh Payload Reversble Data Hdng Scheme Usng Dfference Segmentaton and Hstogram Shftng Yung-Chen Chou and Huang-Chng L Abstract

More information

Content Based Image Retrieval Using 2-D Discrete Wavelet with Texture Feature with Different Classifiers

Content Based Image Retrieval Using 2-D Discrete Wavelet with Texture Feature with Different Classifiers IOSR Journal of Electroncs and Communcaton Engneerng (IOSR-JECE) e-issn: 78-834,p- ISSN: 78-8735.Volume 9, Issue, Ver. IV (Mar - Apr. 04), PP 0-07 Content Based Image Retreval Usng -D Dscrete Wavelet wth

More information

A Lossless Watermarking Scheme for Halftone Image Authentication

A Lossless Watermarking Scheme for Halftone Image Authentication IJCSNS Internatonal Journal of Computer Scence and Network Securty, VOL.6 No.2B, February 2006 147 A Lossless Watermarkng Scheme for Halftone Image Authentcaton Jeng-Shyang Pan, Hao Luo, and Zhe-Mng Lu,

More information

Semi-Fragile Watermarking Scheme for Authentication of JPEG Images

Semi-Fragile Watermarking Scheme for Authentication of JPEG Images Tamkang Journal of Scence and Engneerng, Vol. 10, No 1, pp. 5766 (2007) 57 Sem-Fragle Watermarkng Scheme for Authentcaton of JPEG Images Chh-Hung n 1 *, Tung-Shh Su 2 and Wen-Shyong Hseh 2,3 1 Department

More information

[33]. As we have seen there are different algorithms for compressing the speech. The

[33]. As we have seen there are different algorithms for compressing the speech. The 49 5. LD-CELP SPEECH CODER 5.1 INTRODUCTION Speech compresson s one of the mportant doman n dgtal communcaton [33]. As we have seen there are dfferent algorthms for compressng the speech. The mportant

More information

Steganography System using Slantlet Transform

Steganography System using Slantlet Transform ISSN:43-6999 Journal of Inmaton Communcaton and Intellgence Systems (JICIS) Volume Issue February 06 Steganography System usng Slantlet Transm Ryadh Bassl Abduljabbar Abstract An approach hdng nmaton has

More information

Learning the Kernel Parameters in Kernel Minimum Distance Classifier

Learning the Kernel Parameters in Kernel Minimum Distance Classifier Learnng the Kernel Parameters n Kernel Mnmum Dstance Classfer Daoqang Zhang 1,, Songcan Chen and Zh-Hua Zhou 1* 1 Natonal Laboratory for Novel Software Technology Nanjng Unversty, Nanjng 193, Chna Department

More information

Cluster Analysis of Electrical Behavior

Cluster Analysis of Electrical Behavior Journal of Computer and Communcatons, 205, 3, 88-93 Publshed Onlne May 205 n ScRes. http://www.scrp.org/ournal/cc http://dx.do.org/0.4236/cc.205.350 Cluster Analyss of Electrcal Behavor Ln Lu Ln Lu, School

More information

Classification Based Mode Decisions for Video over Networks

Classification Based Mode Decisions for Video over Networks Classfcaton Based Mode Decsons for Vdeo over Networks Deepak S. Turaga and Tsuhan Chen Advanced Multmeda Processng Lab Tranng data for Inter-Intra Decson Inter-Intra Decson Regons pdf 6 5 6 5 Energy 4

More information

A Comparison between Digital Images Watermarking in Tow Different Color Spaces Using DWT2*

A Comparison between Digital Images Watermarking in Tow Different Color Spaces Using DWT2* A Comparson between Dgtal s ng n Tow Dfferent Color Spaces Usng DWT* Mehd Khall Natonal Academy of Scence of Armena Yerevan, Armena e-mal: khall.mehd@yahoo.com ABSTRACT A novel dgtal watermarkng for ownershp

More information

Information Hiding Watermarking Detection Technique by PSNR and RGB Intensity

Information Hiding Watermarking Detection Technique by PSNR and RGB Intensity www..org 3 Informaton Hdng Watermarkng Detecton Technque by PSNR and RGB Intensty 1 Neha Chauhan, Akhlesh A. Waoo, 3 P. S. Patheja 1 Research Scholar, BIST, Bhopal, Inda.,3 Assstant Professor, BIST, Bhopal,

More information

Network Coding as a Dynamical System

Network Coding as a Dynamical System Network Codng as a Dynamcal System Narayan B. Mandayam IEEE Dstngushed Lecture (jont work wth Dan Zhang and a Su) Department of Electrcal and Computer Engneerng Rutgers Unversty Outlne. Introducton 2.

More information

End-to-end Distortion Estimation for RD-based Robust Delivery of Pre-compressed Video

End-to-end Distortion Estimation for RD-based Robust Delivery of Pre-compressed Video End-to-end Dstorton Estmaton for RD-based Robust Delvery of Pre-compressed Vdeo Ru Zhang, Shankar L. Regunathan and Kenneth Rose Department of Electrcal and Computer Engneerng Unversty of Calforna, Santa

More information

Edge Detection in Noisy Images Using the Support Vector Machines

Edge Detection in Noisy Images Using the Support Vector Machines Edge Detecton n Nosy Images Usng the Support Vector Machnes Hlaro Gómez-Moreno, Saturnno Maldonado-Bascón, Francsco López-Ferreras Sgnal Theory and Communcatons Department. Unversty of Alcalá Crta. Madrd-Barcelona

More information

Private Information Retrieval (PIR)

Private Information Retrieval (PIR) 2 Levente Buttyán Problem formulaton Alce wants to obtan nformaton from a database, but she does not want the database to learn whch nformaton she wanted e.g., Alce s an nvestor queryng a stock-market

More information

IMPLEMENTATION OF QIM BASED AUDIO WATERMARKING USING HYBRID TRANSFORM OF SWT-DCT-SVD METHODS OPTIMIZED WITH GENETIC ALORITHM

IMPLEMENTATION OF QIM BASED AUDIO WATERMARKING USING HYBRID TRANSFORM OF SWT-DCT-SVD METHODS OPTIMIZED WITH GENETIC ALORITHM IMPLEMENTATION OF QIM BASED AUDIO WATERMARKING USING HYBRID TRANSFORM OF SWT-DCT-SVD METHODS OPTIMIZED WITH GENETIC ALORITHM Ryan Amnullah 1, Gelar Budman 2, Irma Saftr 3 1, 2, 3 FakultasTeknk Elektro,

More information

Positive Semi-definite Programming Localization in Wireless Sensor Networks

Positive Semi-definite Programming Localization in Wireless Sensor Networks Postve Sem-defnte Programmng Localzaton n Wreless Sensor etworks Shengdong Xe 1,, Jn Wang, Aqun Hu 1, Yunl Gu, Jang Xu, 1 School of Informaton Scence and Engneerng, Southeast Unversty, 10096, anjng Computer

More information

X- Chart Using ANOM Approach

X- Chart Using ANOM Approach ISSN 1684-8403 Journal of Statstcs Volume 17, 010, pp. 3-3 Abstract X- Chart Usng ANOM Approach Gullapall Chakravarth 1 and Chaluvad Venkateswara Rao Control lmts for ndvdual measurements (X) chart are

More information

Robust Video Watermarking Using Image Normalization, Motion Vector and Perceptual Information

Robust Video Watermarking Using Image Normalization, Motion Vector and Perceptual Information Robust Vdeo Watermarkng Usng Image ormalzaton, Moton Vector and Perceptual Informaton Cedllo-Hernández Antono 1, Cedllo-Hernández Manuel 1, akano-myatake Marko 1, García-Vázquez Mreya S. 2 1 Postgraduate

More information

Efficient Video Coding with R-D Constrained Quadtree Segmentation

Efficient Video Coding with R-D Constrained Quadtree Segmentation Publshed on Pcture Codng Symposum 1999, March 1999 Effcent Vdeo Codng wth R-D Constraned Quadtree Segmentaton Cha-Wen Ln Computer and Communcaton Research Labs Industral Technology Research Insttute Hsnchu,

More information

MULTISPECTRAL IMAGES CLASSIFICATION BASED ON KLT AND ATR AUTOMATIC TARGET RECOGNITION

MULTISPECTRAL IMAGES CLASSIFICATION BASED ON KLT AND ATR AUTOMATIC TARGET RECOGNITION MULTISPECTRAL IMAGES CLASSIFICATION BASED ON KLT AND ATR AUTOMATIC TARGET RECOGNITION Paulo Quntlano 1 & Antono Santa-Rosa 1 Federal Polce Department, Brasla, Brazl. E-mals: quntlano.pqs@dpf.gov.br and

More information

An Image Fusion Approach Based on Segmentation Region

An Image Fusion Approach Based on Segmentation Region Rong Wang, L-Qun Gao, Shu Yang, Yu-Hua Cha, and Yan-Chun Lu An Image Fuson Approach Based On Segmentaton Regon An Image Fuson Approach Based on Segmentaton Regon Rong Wang, L-Qun Gao, Shu Yang 3, Yu-Hua

More information

IR-HARQ vs. Joint Channel-Network coding for Cooperative Wireless Communication

IR-HARQ vs. Joint Channel-Network coding for Cooperative Wireless Communication Cyber Journals: ultdscplnary Journals n Scence and Technology, Journal of Selected Areas n Telecommuncatons (JSAT), August Edton, 2 IR-HARQ vs. Jont Channel-Network codng for Cooperatve Wreless Communcaton

More information

Video Proxy System for a Large-scale VOD System (DINA)

Video Proxy System for a Large-scale VOD System (DINA) Vdeo Proxy System for a Large-scale VOD System (DINA) KWUN-CHUNG CHAN #, KWOK-WAI CHEUNG *# #Department of Informaton Engneerng *Centre of Innovaton and Technology The Chnese Unversty of Hong Kong SHATIN,

More information

Improved H.264 Rate Control by Enhanced MAD-Based Frame Complexity Prediction

Improved H.264 Rate Control by Enhanced MAD-Based Frame Complexity Prediction Journal of Vsual Communcaton and Image Representaton (Specal Issue on Emergng H.64/AVC Vdeo Codng Standard), Elsever Scence, May 005 Improved H.64 Rate Control by Enhanced -Based Frame Complexty Predcton

More information

Data Hiding and Image Authentication for Color-Palette Images

Data Hiding and Image Authentication for Color-Palette Images Data Hdng and Image Authentcaton for Color-Palette Images Chh-Yang Yn ( 殷志揚 ) and Wen-Hsang Tsa ( 蔡文祥 ) Department of Computer & Informaton Scence Natonal Chao Tung Unversty 00 Ta Hsueh Rd., Hsnchu, Tawan

More information

Research Article High Capacity Reversible Watermarking for Audio by Histogram Shifting and Predicted Error Expansion

Research Article High Capacity Reversible Watermarking for Audio by Histogram Shifting and Predicted Error Expansion e Scentfc World Journal, Artcle ID 656251, 7 pages http://dx.do.org/1.1155/214/656251 Research Artcle Hgh Capacty Reversble Watermarkng for Audo by Hstogram Shftng and Predcted Error Expanson Fe Wang,

More information

Reducing Frame Rate for Object Tracking

Reducing Frame Rate for Object Tracking Reducng Frame Rate for Object Trackng Pavel Korshunov 1 and We Tsang Oo 2 1 Natonal Unversty of Sngapore, Sngapore 11977, pavelkor@comp.nus.edu.sg 2 Natonal Unversty of Sngapore, Sngapore 11977, oowt@comp.nus.edu.sg

More information

Parallelism for Nested Loops with Non-uniform and Flow Dependences

Parallelism for Nested Loops with Non-uniform and Flow Dependences Parallelsm for Nested Loops wth Non-unform and Flow Dependences Sam-Jn Jeong Dept. of Informaton & Communcaton Engneerng, Cheonan Unversty, 5, Anseo-dong, Cheonan, Chungnam, 330-80, Korea. seong@cheonan.ac.kr

More information

NUMERICAL SOLVING OPTIMAL CONTROL PROBLEMS BY THE METHOD OF VARIATIONS

NUMERICAL SOLVING OPTIMAL CONTROL PROBLEMS BY THE METHOD OF VARIATIONS ARPN Journal of Engneerng and Appled Scences 006-017 Asan Research Publshng Network (ARPN). All rghts reserved. NUMERICAL SOLVING OPTIMAL CONTROL PROBLEMS BY THE METHOD OF VARIATIONS Igor Grgoryev, Svetlana

More information

Load Balancing for Hex-Cell Interconnection Network

Load Balancing for Hex-Cell Interconnection Network Int. J. Communcatons, Network and System Scences,,, - Publshed Onlne Aprl n ScRes. http://www.scrp.org/journal/jcns http://dx.do.org/./jcns.. Load Balancng for Hex-Cell Interconnecton Network Saher Manaseer,

More information

CLASSIFICATION OF ULTRASONIC SIGNALS

CLASSIFICATION OF ULTRASONIC SIGNALS The 8 th Internatonal Conference of the Slovenan Socety for Non-Destructve Testng»Applcaton of Contemporary Non-Destructve Testng n Engneerng«September -3, 5, Portorož, Slovena, pp. 7-33 CLASSIFICATION

More information

The Research of Support Vector Machine in Agricultural Data Classification

The Research of Support Vector Machine in Agricultural Data Classification The Research of Support Vector Machne n Agrcultural Data Classfcaton Le Sh, Qguo Duan, Xnmng Ma, Me Weng College of Informaton and Management Scence, HeNan Agrcultural Unversty, Zhengzhou 45000 Chna Zhengzhou

More information

Robust Watermarking for Text Images Based on Arnold Scrambling and DWT-DCT

Robust Watermarking for Text Images Based on Arnold Scrambling and DWT-DCT Internatonal Conference on Mechatroncs Electronc Industral and Control Engneerng (MEIC 015) Robust Watermarkng for Text Images Based on Arnold Scramblng and DWT-DCT Fan Wu College of Informaton Scence

More information

Research and Application of Fingerprint Recognition Based on MATLAB

Research and Application of Fingerprint Recognition Based on MATLAB Send Orders for Reprnts to reprnts@benthamscence.ae The Open Automaton and Control Systems Journal, 205, 7, 07-07 Open Access Research and Applcaton of Fngerprnt Recognton Based on MATLAB Nng Lu* Department

More information

Study of System Model of Image Inpainting Combining Subjective Estimation and Impersonal Estimation

Study of System Model of Image Inpainting Combining Subjective Estimation and Impersonal Estimation Study of System Model of Image Inpantng Combnng Subjectve Estmaton and Impersonal Estmaton Welan Wang, Huamng Lu Abstract Amng at the present condton of the fled of dgtal mage npantng lack a all-purpose

More information

A Novel Adaptive Descriptor Algorithm for Ternary Pattern Textures

A Novel Adaptive Descriptor Algorithm for Ternary Pattern Textures A Novel Adaptve Descrptor Algorthm for Ternary Pattern Textures Fahuan Hu 1,2, Guopng Lu 1 *, Zengwen Dong 1 1.School of Mechancal & Electrcal Engneerng, Nanchang Unversty, Nanchang, 330031, Chna; 2. School

More information

Comparative Study of Techniques to minimize packet loss in VoIP Shveni P Mehta

Comparative Study of Techniques to minimize packet loss in VoIP Shveni P Mehta Comparatve Study of Technques to mnmze packet loss n VoIP Shven P Mehta ABSTRACT Voce over IP s an upcomng technology that enables voce communcaton through the Internet. Packet-based network lnks are shared

More information

Virtual Machine Migration based on Trust Measurement of Computer Node

Virtual Machine Migration based on Trust Measurement of Computer Node Appled Mechancs and Materals Onlne: 2014-04-04 ISSN: 1662-7482, Vols. 536-537, pp 678-682 do:10.4028/www.scentfc.net/amm.536-537.678 2014 Trans Tech Publcatons, Swtzerland Vrtual Machne Mgraton based on

More information

Convolutional interleaver for unequal error protection of turbo codes

Convolutional interleaver for unequal error protection of turbo codes Convolutonal nterleaver for unequal error protecton of turbo codes Sna Vaf, Tadeusz Wysock, Ian Burnett Unversty of Wollongong, SW 2522, Australa E-mal:{sv39,wysock,an_burnett}@uow.edu.au Abstract: Ths

More information

Load-Balanced Anycast Routing

Load-Balanced Anycast Routing Load-Balanced Anycast Routng Chng-Yu Ln, Jung-Hua Lo, and Sy-Yen Kuo Department of Electrcal Engneerng atonal Tawan Unversty, Tape, Tawan sykuo@cc.ee.ntu.edu.tw Abstract For fault-tolerance and load-balance

More information

TECHNICAL POINTS ABOUT ADAPTIVE STEGANOGRAPHY BY ORACLE (ASO) 161, rue Ada, 34095, Montpellier Cedex 05, France

TECHNICAL POINTS ABOUT ADAPTIVE STEGANOGRAPHY BY ORACLE (ASO) 161, rue Ada, 34095, Montpellier Cedex 05, France 20th European Sgnal Processng Conference (EUSIPCO 2012) Bucharest, Romana, August 27-31, 2012 TECHNICAL POINTS ABOUT ADAPTIVE STEGANOGRAPHY BY ORACLE (ASO) Sarra Kouder 2, Marc Chaumont 1,2, Wllam Puech

More information

TECHNIQUE OF FORMATION HOMOGENEOUS SAMPLE SAME OBJECTS. Muradaliyev A.Z.

TECHNIQUE OF FORMATION HOMOGENEOUS SAMPLE SAME OBJECTS. Muradaliyev A.Z. TECHNIQUE OF FORMATION HOMOGENEOUS SAMPLE SAME OBJECTS Muradalyev AZ Azerbajan Scentfc-Research and Desgn-Prospectng Insttute of Energetc AZ1012, Ave HZardab-94 E-mal:aydn_murad@yahoocom Importance of

More information

The Research of Ellipse Parameter Fitting Algorithm of Ultrasonic Imaging Logging in the Casing Hole

The Research of Ellipse Parameter Fitting Algorithm of Ultrasonic Imaging Logging in the Casing Hole Appled Mathematcs, 04, 5, 37-3 Publshed Onlne May 04 n ScRes. http://www.scrp.org/journal/am http://dx.do.org/0.436/am.04.584 The Research of Ellpse Parameter Fttng Algorthm of Ultrasonc Imagng Loggng

More information

KEYWORDS: Digital Image Watermarking, Discrete Wavelet Transform, General Regression Neural Network, Human Visual System. 1.

KEYWORDS: Digital Image Watermarking, Discrete Wavelet Transform, General Regression Neural Network, Human Visual System. 1. An Adaptve Dgtal Image Watermarkng Based on Image Features n Dscrete Wavelet Transform Doman and General Regresson Neural Network Ayoub Taher Group of IT Engneerng, Payam Noor Unversty, Broujen, Iran ABSTRACT:

More information

CLUSTERING ALGORITHMS FOR PERCEPTUAL IMAGE HASHING. Vishal Monga, Arindam Banerjee, and Brian L. Evans

CLUSTERING ALGORITHMS FOR PERCEPTUAL IMAGE HASHING. Vishal Monga, Arindam Banerjee, and Brian L. Evans CLUSTERING ALGORITHMS FOR PERCEPTUAL IMAGE HASHING Vshal Monga, Arndam Banerjee, and Bran L. Evans Center for Perceptual Systems The Unversty of Texas at Austn, Austn, TX 7871 vshal,abanerje,bevans}@ece.utexas.edu

More information

Dynamic Code Block Size for JPEG 2000

Dynamic Code Block Size for JPEG 2000 Dynamc Code Block Sze for JPEG 2000 Png-Sng Tsa a, Yann LeCornec b a Dept. of Computer Scence, Unv. of Texas Pan Amercan, 1201 W. Unv. Dr., Ednburg, TX USA 78539-2999; b Sgma Desgns, Inc., 1778 McCarthy

More information

Using Counter-propagation Neural Network for Digital Audio Watermarking

Using Counter-propagation Neural Network for Digital Audio Watermarking Usng Counter-propagaton Neural Network for Dgtal Audo Watermarkng Chuan-Yu Chang and Wen-Chh Shen Graduate School of Computer Scence and Informaton Engneerng Natonal Yunln Unversty of Scence & Technology

More information

TN348: Openlab Module - Colocalization

TN348: Openlab Module - Colocalization TN348: Openlab Module - Colocalzaton Topc The Colocalzaton module provdes the faclty to vsualze and quantfy colocalzaton between pars of mages. The Colocalzaton wndow contans a prevew of the two mages

More information

Efficient Content Representation in MPEG Video Databases

Efficient Content Representation in MPEG Video Databases Effcent Content Representaton n MPEG Vdeo Databases Yanns S. Avrths, Nkolaos D. Doulams, Anastasos D. Doulams and Stefanos D. Kollas Department of Electrcal and Computer Engneerng Natonal Techncal Unversty

More information

Evaluation of an Enhanced Scheme for High-level Nested Network Mobility

Evaluation of an Enhanced Scheme for High-level Nested Network Mobility IJCSNS Internatonal Journal of Computer Scence and Network Securty, VOL.15 No.10, October 2015 1 Evaluaton of an Enhanced Scheme for Hgh-level Nested Network Moblty Mohammed Babker Al Mohammed, Asha Hassan.

More information

A Modified Median Filter for the Removal of Impulse Noise Based on the Support Vector Machines

A Modified Median Filter for the Removal of Impulse Noise Based on the Support Vector Machines A Modfed Medan Flter for the Removal of Impulse Nose Based on the Support Vector Machnes H. GOMEZ-MORENO, S. MALDONADO-BASCON, F. LOPEZ-FERRERAS, M. UTRILLA- MANSO AND P. GIL-JIMENEZ Departamento de Teoría

More information

Outline. Type of Machine Learning. Examples of Application. Unsupervised Learning

Outline. Type of Machine Learning. Examples of Application. Unsupervised Learning Outlne Artfcal Intellgence and ts applcatons Lecture 8 Unsupervsed Learnng Professor Danel Yeung danyeung@eee.org Dr. Patrck Chan patrckchan@eee.org South Chna Unversty of Technology, Chna Introducton

More information

Audio Content Classification Method Research Based on Two-step Strategy

Audio Content Classification Method Research Based on Two-step Strategy (IJACSA) Internatonal Journal of Advanced Computer Scence and Applcatons, Audo Content Classfcaton Method Research Based on Two-step Strategy Sume Lang Department of Computer Scence and Technology Chongqng

More information

Adaptive digital watermarking of images using Genetic Algorithm

Adaptive digital watermarking of images using Genetic Algorithm Adaptve dgtal watermarkng of mages usng Genetc Algorthm Bushra Skander, Muhammad Ishtaq, M. Arfan Jaffar, Muhammad Tarq, Anwar M. Mrza Department of Computer Scence, Natonal Unversty of Computer and Emergng

More information

Skew Angle Estimation and Correction of Hand Written, Textual and Large areas of Non-Textual Document Images: A Novel Approach

Skew Angle Estimation and Correction of Hand Written, Textual and Large areas of Non-Textual Document Images: A Novel Approach Angle Estmaton and Correcton of Hand Wrtten, Textual and Large areas of Non-Textual Document Images: A Novel Approach D.R.Ramesh Babu Pyush M Kumat Mahesh D Dhannawat PES Insttute of Technology Research

More information

Lecture - Data Encryption Standard 4

Lecture - Data Encryption Standard 4 The Data Encrypton Standard For an encrypton algorthm we requre: secrecy of the key and not of the algorthm tself s the only thng that s needed to ensure the prvacy of the data the best cryptographc algorthms

More information

An Improved Image Segmentation Algorithm Based on the Otsu Method

An Improved Image Segmentation Algorithm Based on the Otsu Method 3th ACIS Internatonal Conference on Software Engneerng, Artfcal Intellgence, Networkng arallel/dstrbuted Computng An Improved Image Segmentaton Algorthm Based on the Otsu Method Mengxng Huang, enjao Yu,

More information

Concurrent Apriori Data Mining Algorithms

Concurrent Apriori Data Mining Algorithms Concurrent Apror Data Mnng Algorthms Vassl Halatchev Department of Electrcal Engneerng and Computer Scence York Unversty, Toronto October 8, 2015 Outlne Why t s mportant Introducton to Assocaton Rule Mnng

More information

Support Vector Machines

Support Vector Machines /9/207 MIST.6060 Busness Intellgence and Data Mnng What are Support Vector Machnes? Support Vector Machnes Support Vector Machnes (SVMs) are supervsed learnng technques that analyze data and recognze patterns.

More information

Robust and Reversible Relational Database Watermarking Algorithm Based on Clustering and Polar Angle Expansion

Robust and Reversible Relational Database Watermarking Algorithm Based on Clustering and Polar Angle Expansion Robust and Reversble Relatonal Database Watermarkng Algorthm Based on Clusterng and Polar Angle Expanson Zhyong L, Junmn Lu and Wecheng Tao College of Informaton Scence and Engneerng, Hunan Unversty, Changsha,

More information

Fast Retransmission of Real-Time Traffic in HIPERLAN/2 Systems

Fast Retransmission of Real-Time Traffic in HIPERLAN/2 Systems Fast Retransmsson of Real-Tme Traffc n HIPERLAN/ Systems José A Afonso and Joaqum E Neves Department of Industral Electroncs Unversty of Mnho, Campus de Azurém 4800-058 Gumarães, Portugal {joseafonso,

More information

Grading Image Retrieval Based on DCT and DWT Compressed Domains Using Low-Level Features

Grading Image Retrieval Based on DCT and DWT Compressed Domains Using Low-Level Features Journal of Communcatons Vol. 0 No. January 0 Gradng Image Retreval Based on DCT and DWT Compressed Domans Usng Low-Level Features Chengyou Wang Xnyue Zhang Rongyang Shan and Xao Zhou School of echancal

More information

3. CR parameters and Multi-Objective Fitness Function

3. CR parameters and Multi-Objective Fitness Function 3 CR parameters and Mult-objectve Ftness Functon 41 3. CR parameters and Mult-Objectve Ftness Functon 3.1. Introducton Cogntve rados dynamcally confgure the wreless communcaton system, whch takes beneft

More information

Digital Video Watermarking using Discrete Wavelet Transform and Principal Component Analysis

Digital Video Watermarking using Discrete Wavelet Transform and Principal Component Analysis Internatonal Journal of Wsdom Based Computng, Vol. 1 (2), August 2011 7 Dgtal Vdeo Watermarkng usng Dscrete Wavelet Transform and Prncpal Component Analyss Sanjana Snha, Prajnat Bardhan, Swarnal Pramanck,

More information

A fair buffer allocation scheme

A fair buffer allocation scheme A far buffer allocaton scheme Juha Henanen and Kalev Klkk Telecom Fnland P.O. Box 228, SF-330 Tampere, Fnland E-mal: juha.henanen@tele.f Abstract An approprate servce for data traffc n ATM networks requres

More information

Using Fuzzy Logic to Enhance the Large Size Remote Sensing Images

Using Fuzzy Logic to Enhance the Large Size Remote Sensing Images Internatonal Journal of Informaton and Electroncs Engneerng Vol. 5 No. 6 November 015 Usng Fuzzy Logc to Enhance the Large Sze Remote Sensng Images Trung Nguyen Tu Huy Ngo Hoang and Thoa Vu Van Abstract

More information

Image Content Dependent Compression of SAR Data

Image Content Dependent Compression of SAR Data Image Content Dependent Compresson of SAR Data Ursula Benz, Jens Fscher, Gunther Jäger Deutsches Zentrum für Luft- und Raumfahrt (DLR) e.v. P.O. Box 1116, D-82230 Wesslng, Germany Tel: ++49 08153 28 2312,

More information

Meta-heuristics for Multidimensional Knapsack Problems

Meta-heuristics for Multidimensional Knapsack Problems 2012 4th Internatonal Conference on Computer Research and Development IPCSIT vol.39 (2012) (2012) IACSIT Press, Sngapore Meta-heurstcs for Multdmensonal Knapsack Problems Zhbao Man + Computer Scence Department,

More information