Detecting MP3Stego using Calibrated Side Information Features

Size: px
Start display at page:

Download "Detecting MP3Stego using Calibrated Side Information Features"

Transcription

1 2628 JOURNAL OF SOFTWARE, VOL. 8, NO. 10, OCTOBER 2013 Detectng P3Stego usng Calbrated Sde Informaton Features Xanmn Yu School of Informaton Scence and Engneerng, Nngbo Unversty Emal: Rangdng Wang and Dqun Yan School of Informaton Scence and Engneerng, Nngbo Unversty Emal: Abstract P3Stego s a typcal steganographc tool for P3 audo, whch embeds secret message nto P3 audo accordng to the party of the block length. In ths work, we present a steganalytc method to attack P3Stego. The bg_values nsde nformaton s consdered to extract the steganalytc feature. Re-compresson calbraton has been appled n order to mprove the feature's senstvty. Expermental results show that the extracted feature can reflect the P3Stego trace effectvely. Index Terms steganalyss, P3, bg_values, calbraton I. INTRODUCTION Steganography s the art of hdng the present of communcaton by embeddng secret messages nto nnocent lookng covers, such as dgtal mages, vdeos, and audos [1]. Its am s to avod drawng suspcon to the transmsson of hdden nformaton. Steganalyss s the art of detectng secret messages hdden usng steganography [2]. The goal of steganalyss s to reveal the presence of embedded message and to break the covert communcaton. P3, as a standard for transmsson and storage of compressed audo, s a promsng carrer format for steganography. Frst, P3 s the most popular and wdely used audo fle format. When audos n P3 format are taken as cover sgnals, the stego-audos wll be less lkely to be notced by steganalyzers than other audo formats. Also, t s a challenge for steganalyzers to dstngush whether the dstorton s caused by stego operaton or by P3 encodng snce P3 s a lossy compresson algorthm. For these reasons, P3 audo s easly to be chosen as carrer for steganography and hence the competton between P3 steganography and P3 steganalyss has escalated over the past few years. Several stego tools for P3 audos have been arsen, such as P3Stego [3], UnderP3Cover [4], P3Stegz [5], and Stego-Lame [6]. In the early works of our group members, we also have proposed two novel steganographc methods for P3 audos [7, 8]. As far as P3 steganography tools are concerned, P3Stego s the most typcal one. In P3Stego, wth the beneft of the dstorton adjustment mechansm of the P3 codec, the sum of the dstorton caused by quantzaton and P3Stego s effectvely controlled below the maskng threshold whch s the mnmum sound level that human can perceve. Once the cover audo s unavalable, t s hard to dstngush whether the test audo has been operated by P3Stego or not. In order to defeat P3Stego, some steganalytc methods have been proposed n recent years. Snce P3Stego changes the behavor of quantzaton n P3 encodng, Westfeld [9, 10] proposed an attack method based on the varance of the block length whch s a parameter related to quantzaton. Smlarly, Dttmann [11, 12] consdered that there would be more dfferent block lengths after P3Stego embeddng. Hence, the number of dfferent block lengths s taken as a steganalytc feature n ther method. However, the performance of ths method can be stll mproved especally at low embeddng rates. Qao [13] ntroduced a detecton method based on an nter-frame feature set whch contans the moment statstcal features on the second dervatves, as well as arkov transton features and neghborng jont densty of DCT coeffcents. In hs another work [14], the statstcal moments of GGD (Generalzed Gaussan Dstrbuton) shape parameters for DCT coeffcents are also taken as the steganalytc features. Ozer et al. [15, 16] presented a method for detectng audo steganography based on audo qualty metrcs. Although ths method can expose the presence of P3Stego, relatvely hgh false postve rate s one of the lmtatons. Addtonally, the dmensonalty of the feature space s the man nconvenence of Qao s and Ozer s methods. Generally, the steganalytc detector wll be more straghtforward and effectve f the features can be extracted drectly from the poston where the steganography takes place. Snce P3Stego happens durng quantzaton, more attentons should be pad to the parameters assocated wth the quantzaton. In ths work, the bg_values whch represents the number of quantzed DCT (QDCT) coeffcents n Bg_value regon s ntroduced nto steganalyss to attack P3Stego. In order to weaken the nfluence of the audo content and expose the stego nose, the calbrated feature s extracted by recompresson. The results demonstrate that the proposed do: /jsw

2 JOURNAL OF SOFTWARE, VOL. 8, NO. 10, OCTOBER method can acheve a good dscrmnatory ablty for P3Stego. The rest of ths paper s organzed as follows. Secton II brefly covers the basc operatons of the P3Stego algorthm. Secton III presents the proposed method. The effectveness of the proposed method under varous condtons wth expermental results s verfed n Secton IV. Fnally, conclusons are drawn n Secton V. II. BACKGROUND In ths secton, the prncple of P3 compresson s frst revewed n order to better understand P3Stego and then the P3Stego steganography algorthm are analyzed. A. Prncple of P3 Compresson Pulse Code odulaton (PC) s a standard format for storng or transmttng uncompressed dgtal audo. There are two parameters for PC: sample rate Hz and bt-rate Bt. The sample rate descrbes how many samples per second, and the bt-rate descrbes how bg the dgtal word s that wll hold the sample value. PEG-1 Audo Layer 3, or P3, s an audo-specfc format that was desgned by the ovng Pcture Experts Group as part of ts PEG-1 standard [17]. The lossy compresson algorthm of P3 s desgned to greatly reduce the amount of data requred to represent the audo recordng wth a fathful reproducton of the orgnal uncompressed audo for most lsteners. Fg.1 llustrates the entre P3 encodng, whch conssts of the followng steps [18]: Fgure 1. Block dagram of P3 encodng (1) Through a polyphase flter analyss, a sequence of 1152 PC samples are fltered nto 32 equally spaced frequency sub-bands dependng of the Nyqust frequency of the PC sgnal. If the sample frequency of the PC sgnal s 44.1 khz, the Nyqust frequency wll be khz. Each sub-band wll be approxmately 22050/32 = 689Hz wde. The lowest sub-band wll have a range from 0 to 689Hz, the next sub-band Hz, etc. (2) By applyng a modfed dscrete cosne transform (DCT) to each tme frame of sub-band samples, the 32 sub-bands wll be splt nto 18 fner sub-bands creatng a granule wth a total of 576 frequency lnes. To reduce artfacts caused by the edges of the tme-lmted sgnal segment, each sub-band sgnal has to be wndowed pror to the DCT. If the sub-band sgnal at the present tme frame shows lttle dfference from the prevous tme frame, then the long wndow type s appled, whch enhance the spectral resoluton gven by the DCT. Alternatvely, f the sub-band sgnal shows consderable dfference from the prevous tme frame, then the short wndow s appled, whch enhance the temporal resoluton. (3) Smultaneously, the sgnal s also transformed to the frequency doman by a Fast Fourer Transform as the sgnal s processed by the polyphase flterbank, to obtan hgher frequency resoluton and nformaton on the spectral changes over tme. (4) Psychoacoustc model retreves the frequency nformaton from the FFT output and provdes nformaton about whch parts of the audo sgnals that s audble and whch parts are not. The two presently FFT spectra and the two prevous spectra are compared. If consderable dfferences are found, a request of adoptng short wndows wll be sent to the DCT block. As soon as the dfference fades away, the DCT block wll be changed back to long wndows. At the same tme, the Psychoacoustc model detects the domnant tonal components and for each crtcal band maskng thresholds are calculated. Frequency components below the thresholds are masked out. (5) The scalng and quantzaton are appled to 576 spectral values at a tme, whch s done teratvely n two nested loops, a dstorton control loop(outer loop, whch ams to keep the quantzaton nose below the maskng threshold) and a rate control loop (nner loop, whch determnes the quantzaton step sze and the quantzaton of the frequency doman samples). (6) The Huffman codng, whch retans PEG-1 Layer III a hgh qualty at low bt-rates, s appled to the quantzed values. All parameters generated by the encoder resde n the sde nformaton part of the frame. The frame header, sde nformaton, CRC, Huffman coded frequency lnes etc. are put together to form frames.

3 2630 JOURNAL OF SOFTWARE, VOL. 8, NO. 10, OCTOBER 2013 In flter bank analyss, a polyphase flter [n] s gven by: H π (2 + 1) ( n 16) H [ n] = h[ n] cos[ ], = 0 31, n = (1) Where h[n] s a low-pass flter. The orgnal PC sgnal and fltered sgnals and fltered sgnals are denoted by x[n] P[n] and respectvely. P [ n] = 511 m= 0 x[ n m] H [ m], = 0 31 (2) We obtan sub-band sgnals P[n] s down-sampled by 32. S [ n] = P[32n] = n = 1 S [n], whch x[32n m] H [ m], = 0 31 (3) As a lapped transform, the DCT s a bt unusual compared to other Fourer-related transforms n that t has half as many outputs as nputs (nstead of the same number). To obtan DCT coeffcents, P3 defnes long wndow and short wndow to enhance frequency resoluton and temporal resoluton, respectvely. The product of selected wndow coeffcents and sub-band sgnal s denoted by Z k. The DCT coeffcents are gven by : n 1 = π n n X Z k cos[ ( zk + 1+ ) (2 + 1)], = 0,1,, 1 k= 0 2n 2 2 (4) For the long wndow, n equals 36, otherwse n equals 12 for the short wndow. In Psychoacoustc odel II, NR(m) ndcates the mask-to-nose rato at m bts quantzaton, whch measures the threshold of perceptble dstorton. Wth the sgnal-to-nose rato (SNR) of the sgnal, SR(m) s calculated as: SR( m) = SNR( m) NR( m) (5) The P3 compresson algorthm reles on explotng weakness of human audtory percepton and hdes the fact that a sgnfcant amount of nformaton s dscarded wthout any notceable degradaton of qualty. In P3 compresson, several bt-rates are specfed n the PEG-1 Layer 3 standard: 32, 40, 48, 56, 64, 80, 96, 112, 128, 160, 192, 224, 256, and 320kbt/s, and the avalable samplng frequences are 32, 44.1, and 48 khz. The P3 decodng, demonstrated n Fg.2, s the nverse process of encodng contans the steps n the order of Huffman decodng, nverse quantzaton, nverse DCT and alasng cancellaton, and flter-bank synthess. Frst Huffman decodng s performed on the P3 btstream, then the decoder restore the quantzed DCT coeffcent values and the sde nformaton related to them, such as the wndow type that s assgned to each frame. After nverse quantzaton, the coeffcents are transformed back to the sub-band doman by applyng an nverse DCT on the coeffcents. Fnally, the waveform n the PC format s reconstructed by the synthess flterbank. Fgure 2. Block dagram of P3 decodng B. Revew of P3Stego Steganography Algorthm The embeddng of P3Stego s ntegrated wth the nner loop functon that controls the bt rate of P3 encoder. The pseudo-code for the nner loop functon wth P3Stego s gven n Fg. 3.

4 JOURNAL OF SOFTWARE, VOL. 8, NO. 10, OCTOBER Algorthm: P3Stego Embeddng (nner loop functon) Input: DCT Coeffcents ( I ), Secret bt ( b ) Input Parameters: Number of avalable bts ( B ), Output: Part2_3_length ( P 32 ) Begn 1. q = q + 1 s s 2. Iˆ = Quantzer( q, I) then goto Step 1 Else goto Step 4. Quantzaton Step ( q ) s s 3. If I ˆ > 8205 max 4. P = HuffmanCodng( Iˆ ) embedrule = ( P %2) ( b) 6. If P > B or embedrule = 1 32 max then goto Step 1 Else goto Step return P 32 max coeffcents can be coded wth the avalable number of bts. The varable P 32 contans the number of the bts used for scalefactors and Huffman code data for current granule, whch s also called block length. Wthout embeddng, the nner loop wll be fnshed when the P 32 s wthn the range of the number of bts avalable. In P3Stego, the nner loop wll contnue to terate untl the party of the P 32 s equal to the hdden bt b and the bt demand for Huffman codng s met. Once the nner loop s done, another loop, namely outer loop, wll check the dstortons ntroduced by the quantzaton operaton. If the allowed dstorton s exceeded, the nner loop wll be called agan. The above process wll be terated untl the bt rate and dstorton requrements are both met. III. PROPOSED STEGANALYTIC ETHOD Obtanng the features that can reflect the dfferences between stego audos and cover audos s a crucal step for steganalyss. Snce P3Stego'nformaton hdng takes place durng the quantzaton process, t s natural and reasonable to generate feature from the parameters related to quantzaton. The parameter concerned n the proposed method s bg_values n sde nformaton. In ths secton, the steganographc mpact on bg_values s analyzed frst. The calbrated feature s obtaned by re-compresson n order to reduce the nfluence of the audo content. At last, we present the attackng algorthm for P3Stego. A. Steganographc Effect on Bg_values In order to mprove the compresson effcency, lossless huffman codng s adopted n P3 encodng. Quantzed DCT(QDCT) coeffcents s dvded nto three zones from hgh to low frequency: the all-zero regon(rzero), the small value regon(count1) and the large value regon(bg_value),shown n Fg.4. End Fgure 3. Pseudo-code for nner loop functon wth P3Stego The nner loop quantzes the DCT coeffcents and ncreases the quantzaton step untl the quantzed Fgure 4. The partton of QDCT coeffcents The Rzero regon s not requred to be encoded. In Count1 regon, each of the four QDCT coeffcents s encoded. Each of the two QDCT coeffcents s encoded n Bg_value regon, whch can be subdvded nto Regon0, Regon1 and Regon1 regon. The number of QDCT coeffcents n Bg_value, Count1 and Rzero

5 2632 JOURNAL OF SOFTWARE, VOL. 8, NO. 10, OCTOBER 2013 regon s represented by bg_values,count1 and rzero respectvely. The value of bg_values, count1 and rzero has followng rules: f the value of two consecutve QDCT coeffcents s zero, then the value of rzero plus one; f the absolute value of four consecutve QDCT coeffcents s less than one, then the value of count1 plus one. As the value of bg_values, count1 and rzero has the followng condton: 2 * rzero+ 4* count1 + 2* bg_ values= 576 (6) so the value of bg_values can be obtaned wth rzero and count1.because the relatonshp of rzero,count1 and bg_values, the parameter of bg_values s concerned n ths artcle. As descrbed n Secton2, t s obvous that more teratons are requred to ext the nner loop due to the embeddng. Consequently, we wll have a larger quantzaton step at the end of the loop n stego case. The larger the quantzaton step s, the smaller the value of the QDCT coeffcents. So the value of bg_values becomes small and the next frame's bg_values becomes larger n stego case. Fnally, the varance of bg_values s larger than n non-stego case. Ths phenomenon s clearly seen n Fg.2 whch s the dstrbuton of bg_values of the same P3 audo n non-stego case and stego case. The horzontal axs represents the ndex of frame and the vertcal axs represents the value of bg_values. In stego case, the audo s embedded wth 50% messages(100% corresponds to the maxmum sze of a message that can be embedded by P3Stego). (a)non-stego From Fg. 2, t s obvous to take the varance of bg_values as feature to detect P3Stego. That s Where N 2 g g = 1 f = N 1 (7) g { 1,2, N } ( ) s the value of bg_values n th granule and g s the mean value of bg_values n all granules. B. Calbraton Feature by Re-compresson In steganalyss, t s almost mpossble to have access to the cover durng the process of steganalyss. If we can obtan the estmaton of the cover from the suspect one as effectvely as possble, the steganalystc performance wll be mproved. Several methods for cover estmaton have been arsen n recent years, such as flterng [19], down-samplng [20], re-embeddng [21], and re-compresson [22]. One of the most famous approaches for creatng an estmate of the cover mage s the model proposed by Jessca Frdrch n [22] known as JPEG re-compresson calbraton. Smlarly, we conjectured that the steganographc effect on bg_values would be removed through re-compresson calbraton. Denote d as an P3 audo under scrutny and e s the P3 audo that d s decompressed to the tme doman and the compressed back to P3 wth the same compresson rato. That s, = C ( D( ) CR) e d, (8) Where C and D denote the P3 compresson and decompresson algorthm respectvely, and CR s the compresson rato. Then we can obtan the fnal calbrated feature f, that s f = f d f e Where and e f d and f e (9) s the feature extracted from d respectvely by equaton (7). Fgure 5. (b)stego Dstrbuton of bg_values n non-stego case and stego case C. Detectng P3Stego d Denote as an P3 audo under scrutny and t contans totally N granules. The process of detectng P3Stego s descrbed as follows. Step1: Obtan the cover estmaton d and compressng agan. e by decodng

6 JOURNAL OF SOFTWARE, VOL. 8, NO. 10, OCTOBER Step2: For the th granule n d and e, obtan the value of bg_values by the sde nformaton respectvely. Step3: Repeat Step 2 untl reach the end. Fnally, we can get the sequence of the value of bg_values. f Step 4: Calculate d f and e by equaton (7) and f = f then extract the feature d f e. Step5: Take the f as nput for SV classfer. Apply SV classfer and determne whether the testng P3 audo has been deal wth P3Stego or not. IV. EXPERIENTAL RESULTS A. Expermental Setup A total number of 500 mono audos wth dfferent styles are used and each audo s sampled at 44.1 khz, 16 bts/sample and has the duraton of 10s. They have never been P3 compressed. Random sequence wth 0 and 1 s taken as the secret message and no preprocessng such as compresson or encrypton s done to the message before embeddng. All audos are embedded wth 10%, 20%, 50%, 80%, 100% messages (100% corresponds to the maxmum sze of a message that can be embedded by P3Stego). In the experments, half of the nature and stego audos are randomly selected to tran the SV classfer and the rest are used for testng. TABLE I. AVERAGE RESULTS UNDER DIFFERENT BIT-RATES B. Expermental Results and Dscussons In our experments, true postve ( TP ) means that stego P3 audo s predcted as stego P3 audo, and true negatve ( TN ) means that the nature P3 audo s predcted as nature P3 audo. Consequently, false negatve ( FN ) means that the stego P3 audo s predcted as nature P3 audo, false postve ( FP ) means that the nature P3 audo s predcted as stego P3 audo. Snce the stego P3 audo and the nature P3 audo to be detected have the same quanttes n our experments, the fnal detecton accuracy rate ( AR ) s AR = ( TPR + TNR) / 2 computed as, where TPR = TP /( TP + FN),and TNR = TN /( TN + FP). For each case, we average the ten tmes test results. Table 1 lsts the average results under dfferent bt-rates. It s observed from Table I that the accuracy rate ncreases wth the ncrease of embeddng rate. It s n lne wth our expecton because the more the nformaton s hdden, the easer the audo after the operaton of steganography wll be detected.the detecton results s good when the embeddng rate s over 50%: all the results are over 90%. Especally when the embeddng rate s less than 50%, the detecton results are not good. Ths shows that the steganalyss of P3Stego s stll very challengng n cases wth low embeddng rates. CR (kbps) ER (%) TPR(%) TNR(%) AR (%) In order to show the detecton relablty performance, recever operatng characterstc (ROC) curve has been used to verfy the effectveness of the proposed method. Fg. 6 gves the ROC curves under dfferent compresson ratos. The curves ndcate that the proposed scheme s able to relably detect the trace of P3Stego. For nstance, n Fg. 6(a), a probablty of detecton of approxmately 95% s acheved at a false postve rate of 10%, when the embeddng rate s 50%.

7 2634 JOURNAL OF SOFTWARE, VOL. 8, NO. 10, OCTOBER 2013 Whle the ROC curve contans most of the nformaton about the accuracy of the classfer, t s sometmes desrable to produce quanttatve summary measures of the ROC curve. The most commonly used such measure s the area under the ROC curves (AUC). In ths paper, the detecton relablty [22] s adopted to evaluate the detecton performance, whch s defned as, ρ = 2A 1 (10) where A s the AUC. A ρ = 1 s scaled to obtan ρ = 0 for a perfect detecton and for a random guessng. The results for detecton relabltes under dfferent embeddng rates and dfferent compresson ratos are shown n Table II. The results n Table II show that the detecton performance depends on the embeddng rate. The less the embeddng rate, the more dffcult t s to detect. Fgure 6. ROC curves under dfferent embeddng rates (a) 96kbps (b) 112kbps (c) 128kbps. TABLE II. AUC RESULTS UNDER DIFFERENT EBEDDING RATES CR (kbps) ER (%) AUC ρ V. CONCLUSIONS In ths paper, the effect on the bg_values caused by P3Stego embeddng, s analyzed. The steganalytc features s obtaned from the detectng and estmated audos obtaned by re-compresson calbraton. The extracton of the feature s smple and rapd because they

8 JOURNAL OF SOFTWARE, VOL. 8, NO. 10, OCTOBER can be obtaned drectly from the P3 btstream wthout fully decodng. The expermental results show that the proposed method s effectve to detect P3Stego. ACKNOWLEDGEENT Ths work s supported by the Natonal Natural Scence Foundaton of Chna (NSFC: , ), Doctoral Fund of nstry of Educaton of Chna( ), Scentfc Research Fund of Zhejang Provncal Educaton Department (Grant No. Y ), Key Innovaton Team of Zhejang Provnce (Grant No. C ), The Outstandng (Postgraduate) Dssertaton Growth Foundaton of Nngbo Unversty (Grant No. 10Y ),Zhejang natural scence foundaton of Chna (ZJNSF:Z ,Y ), Zhejang scence & technology preferred projects of Chna(2010C11025), Zhejang provnce educaton department key project of Chna (ZD ), Nngbo scence & technology preferred projects of Chna(2009B10003), Nngbo key servce professonal educaton project of Chna(2010A610115). REFERENCES [1] S. Dumtrescu, X. Wu, Z. Wang, Detecton of LSB steganography va sample par analyss, IEEE Transactons on Sgnal Processng, 2003, vol. 51, pp [2] N. Provos, P. Honeyman, Hde and seek: an ntroducton to steganography, IEEE Securty & Prvacy, 2003, vol.1, pp [3] F. Pettcolas, P3Stego [4] C. Platt, UnderP3Cover [5] Z. Achmad, P3Stegz [6] Noch, Stego-Lame [7] D. Yan, R. Wang, L. Zhang, Quantzaton step party-based steganography for P3 audo, Fundamenta Informatcae, 2009, vol.97, pp [8] D. Yan, R. Wang, Huffman table swappng-based steganography for P3 audo, ultmeda Tools and Applcatons, 2011, vol. 52, pp [9] A. Westfeld, Detectng low embeddng rates, Proceedngs of Internatonal Conference on Informaton Hdng, 2003, pp [10] R. Bohme, A. Westfeld, Statstcal charactersaton of P3 encoders for steganalyss, Proceedngs of AC Workshop on ultmeda and Securty, 2004, pp [11] J. Dttmann, D. Hesse, Network based ntruson detecton to detect steganographc communcaton channels: on the example of audo data, Proceedngs of IEEE Internatonal Workshop on ultmeda Sgnal Processng, 2004, pp [12] 12 C. Kraetzer, J. Dttman J, Pros and cons of mel-cepstrum based audo steganalyss usng SV classfcaton, Proceedngs of Internatonal Conference on Informaton Hdng, 2007, pp [13]. Qao, A. Sung, Q. Lu, Steganalyss of P3Stego. Proceedngs of Internatonal Jont Conference on Neural Networks, 2009, pp [14]. Qao, A. Sung, Q. Lu, Feature mnng and ntellgent computng for P3 steganalyss, Proceedngs of Internatonal Jont Conference on Bonformatcs, Systems Bology and Intellgent Computng, 2009, pp [15] H. Ozer, B. Sankur, N. emon, I. Avcbas, Detecton of audo covert channels usng statstcal footprnts of hdden messages, Dgtal Sgnal Processng, 2006, vol.16, pp [16] I. Avcbas, Audo steganalyss wth content-ndependent dstorton measures, IEEE Sgnal Processng Letters, 2006, vol. 13, pp [17] ISO/IEC : Informaton technology - codng of movng pctures and assocated audo for dgtal storage meda at up to about 1.5 bt/s - part3: audo, [18] _aac.pdf [19] 19. AD. Ker, R. Bohme, Revstng weghted stego-mage steganalyss, Proceedngs of SPIE on Securty, Forenscs, Steganography, and Watermarkng of ultmeda Contents X, 2008, pp [20] 20. AD. Ker, Steganalyss of LSB matchng n grayscale mages, IEEE Sgnal Processng Letters, 2005, vol. 12, pp [21] 21. H. alk, Steganalyss of qm steganography usng rregularty measure, Proceedngs of AC Workshop on ultmeda and Securty, 2008, pp [22] 22. J. Frdrch J (2004) Feature-based steganalyss for JPEG mages and ts mplcatons for future desgn of steganographc schemes, Proceedngs of Internatonal Conference on Informaton Hdng, 2004, pp Xanmn Yu s born n He s currently pursung hs.s. degree n College of Informaton Scence and Engneerng, Nngbo Unversty, Chna. Hs research nterests manly nclude multmeda retreve and securty. Rangdng Wang s born n 1962, receved hs.s. degree n the Department of Computer Scence and Engneerng from the Northwest Polytechnc Unversty, Xan n 1987, and receved hs Ph.D. degree n the School of Electronc and Informaton Engneerng from Tongj Unversty, Shangha, Chna, n He s now a professor at Faculty of Informaton Scence and Engneerng, Nngbo Unversty, Chna. Hs research nterests manly nclude multmeda securty, dgtal watermarkng for dgtal rghts management, data hdng, and steganography for computer forenscs.

9 2636 JOURNAL OF SOFTWARE, VOL. 8, NO. 10, OCTOBER 2013 Dqun Yan s born n 1979 and receved hs.s. degree n crcut and system, n 2008, and hs Ph.D. n communcaton and nformaton system, n 2012, both from the College of Informaton Scence and Engneerng at the Nngbo Unversty n Chna. Hs research nterests nclude audo processng and multmeda securty.

Performance Analysis of Data Hiding in MPEG-4 AAC Audio *

Performance Analysis of Data Hiding in MPEG-4 AAC Audio * TSINGHUA SCIENCE AND TECHNOLOGY ISSNll1007-0214ll07/21llpp55-61 Volume 14, Number 1, February 2009 Performance Analyss of Data Hdng n MPEG-4 AAC Audo * XU Shuzheng ( ) **, ZHANG Peng ( ), WANG Pengjun

More information

Shape-adaptive DCT and Its Application in Region-based Image Coding

Shape-adaptive DCT and Its Application in Region-based Image Coding Internatonal Journal of Sgnal Processng, Image Processng and Pattern Recognton, pp.99-108 http://dx.do.org/10.14257/sp.2014.7.1.10 Shape-adaptve DCT and Its Applcaton n Regon-based Image Codng Yamn Zheng,

More information

Improvement of Spatial Resolution Using BlockMatching Based Motion Estimation and Frame. Integration

Improvement of Spatial Resolution Using BlockMatching Based Motion Estimation and Frame. Integration Improvement of Spatal Resoluton Usng BlockMatchng Based Moton Estmaton and Frame Integraton Danya Suga and Takayuk Hamamoto Graduate School of Engneerng, Tokyo Unversty of Scence, 6-3-1, Nuku, Katsuska-ku,

More information

An Image Fusion Approach Based on Segmentation Region

An Image Fusion Approach Based on Segmentation Region Rong Wang, L-Qun Gao, Shu Yang, Yu-Hua Cha, and Yan-Chun Lu An Image Fuson Approach Based On Segmentaton Regon An Image Fuson Approach Based on Segmentaton Regon Rong Wang, L-Qun Gao, Shu Yang 3, Yu-Hua

More information

Content Based Image Retrieval Using 2-D Discrete Wavelet with Texture Feature with Different Classifiers

Content Based Image Retrieval Using 2-D Discrete Wavelet with Texture Feature with Different Classifiers IOSR Journal of Electroncs and Communcaton Engneerng (IOSR-JECE) e-issn: 78-834,p- ISSN: 78-8735.Volume 9, Issue, Ver. IV (Mar - Apr. 04), PP 0-07 Content Based Image Retreval Usng -D Dscrete Wavelet wth

More information

A Secured Method for Image Steganography Based On Pixel Values

A Secured Method for Image Steganography Based On Pixel Values A Secured Method for Image Steganography Based On Pxel Values Tarun Gulat #, Sanskrt Gupta * # Assocate Professor, Electroncs and Communcaton Engneerng Department, MMEC, M.M.U., Mullana, Ambala, Haryana,

More information

A Fast Content-Based Multimedia Retrieval Technique Using Compressed Data

A Fast Content-Based Multimedia Retrieval Technique Using Compressed Data A Fast Content-Based Multmeda Retreval Technque Usng Compressed Data Borko Furht and Pornvt Saksobhavvat NSF Multmeda Laboratory Florda Atlantc Unversty, Boca Raton, Florda 3343 ABSTRACT In ths paper,

More information

Cluster Analysis of Electrical Behavior

Cluster Analysis of Electrical Behavior Journal of Computer and Communcatons, 205, 3, 88-93 Publshed Onlne May 205 n ScRes. http://www.scrp.org/ournal/cc http://dx.do.org/0.4236/cc.205.350 Cluster Analyss of Electrcal Behavor Ln Lu Ln Lu, School

More information

Key-Selective Patchwork Method for Audio Watermarking

Key-Selective Patchwork Method for Audio Watermarking Internatonal Journal of Dgtal Content Technology and ts Applcatons Volume 4, Number 4, July 2010 Key-Selectve Patchwork Method for Audo Watermarkng 1 Ch-Man Pun, 2 Jng-Jng Jang 1, Frst and Correspondng

More information

A Binarization Algorithm specialized on Document Images and Photos

A Binarization Algorithm specialized on Document Images and Photos A Bnarzaton Algorthm specalzed on Document mages and Photos Ergna Kavalleratou Dept. of nformaton and Communcaton Systems Engneerng Unversty of the Aegean kavalleratou@aegean.gr Abstract n ths paper, a

More information

Enhanced AMBTC for Image Compression using Block Classification and Interpolation

Enhanced AMBTC for Image Compression using Block Classification and Interpolation Internatonal Journal of Computer Applcatons (0975 8887) Volume 5 No.0, August 0 Enhanced AMBTC for Image Compresson usng Block Classfcaton and Interpolaton S. Vmala Dept. of Comp. Scence Mother Teresa

More information

An Image Compression Algorithm based on Wavelet Transform and LZW

An Image Compression Algorithm based on Wavelet Transform and LZW An Image Compresson Algorthm based on Wavelet Transform and LZW Png Luo a, Janyong Yu b School of Chongqng Unversty of Posts and Telecommuncatons, Chongqng, 400065, Chna Abstract a cylpng@63.com, b y27769864@sna.cn

More information

Quantization Noise Power Injection In Subband Audio Coding Using Low Selectivity Filter Banks

Quantization Noise Power Injection In Subband Audio Coding Using Low Selectivity Filter Banks Quantzaton Nose Power Injecton In Subband Audo Codng Usng Low Selectvty Flter Banks D. ARTÍNEZ -UÑOZ, N. RUIZ-REYES, P. VERA-CANDEAS, P.J. RECHE-LÓPEZ, J. CURPIÁN-ALONSO Departamento de Electrónca Unversdad

More information

Hybrid Non-Blind Color Image Watermarking

Hybrid Non-Blind Color Image Watermarking Hybrd Non-Blnd Color Image Watermarkng Ms C.N.Sujatha 1, Dr. P. Satyanarayana 2 1 Assocate Professor, Dept. of ECE, SNIST, Yamnampet, Ghatkesar Hyderabad-501301, Telangana 2 Professor, Dept. of ECE, AITS,

More information

Distortion Function Designing for JPEG Steganography with Uncompressed Side-image

Distortion Function Designing for JPEG Steganography with Uncompressed Side-image Dstorton Functon Desgnng for JPEG Steganography wth Uncompressed Sde-mage Fangjun Huang School of Informaton Scence and Technology, Sun Yat-Sen Unversty, GD 56, Chna huangfj@mal.sysu.edu.cn Jwu Huang School

More information

TN348: Openlab Module - Colocalization

TN348: Openlab Module - Colocalization TN348: Openlab Module - Colocalzaton Topc The Colocalzaton module provdes the faclty to vsualze and quantfy colocalzaton between pars of mages. The Colocalzaton wndow contans a prevew of the two mages

More information

Enhanced Watermarking Technique for Color Images using Visual Cryptography

Enhanced Watermarking Technique for Color Images using Visual Cryptography Informaton Assurance and Securty Letters 1 (2010) 024-028 Enhanced Watermarkng Technque for Color Images usng Vsual Cryptography Enas F. Al rawashdeh 1, Rawan I.Zaghloul 2 1 Balqa Appled Unversty, MIS

More information

Parallelism for Nested Loops with Non-uniform and Flow Dependences

Parallelism for Nested Loops with Non-uniform and Flow Dependences Parallelsm for Nested Loops wth Non-unform and Flow Dependences Sam-Jn Jeong Dept. of Informaton & Communcaton Engneerng, Cheonan Unversty, 5, Anseo-dong, Cheonan, Chungnam, 330-80, Korea. seong@cheonan.ac.kr

More information

Research Article High Capacity Reversible Watermarking for Audio by Histogram Shifting and Predicted Error Expansion

Research Article High Capacity Reversible Watermarking for Audio by Histogram Shifting and Predicted Error Expansion e Scentfc World Journal, Artcle ID 656251, 7 pages http://dx.do.org/1.1155/214/656251 Research Artcle Hgh Capacty Reversble Watermarkng for Audo by Hstogram Shftng and Predcted Error Expanson Fe Wang,

More information

Related-Mode Attacks on CTR Encryption Mode

Related-Mode Attacks on CTR Encryption Mode Internatonal Journal of Network Securty, Vol.4, No.3, PP.282 287, May 2007 282 Related-Mode Attacks on CTR Encrypton Mode Dayn Wang, Dongda Ln, and Wenlng Wu (Correspondng author: Dayn Wang) Key Laboratory

More information

Learning the Kernel Parameters in Kernel Minimum Distance Classifier

Learning the Kernel Parameters in Kernel Minimum Distance Classifier Learnng the Kernel Parameters n Kernel Mnmum Dstance Classfer Daoqang Zhang 1,, Songcan Chen and Zh-Hua Zhou 1* 1 Natonal Laboratory for Novel Software Technology Nanjng Unversty, Nanjng 193, Chna Department

More information

Robust Blind Video Watermark Algorithm in Transform Domain Combining with 3D Video Correlation

Robust Blind Video Watermark Algorithm in Transform Domain Combining with 3D Video Correlation JOURNAL OF MULTIMEDIA, VOL. 8, NO. 2, APRIL 2013 161 Robust Blnd Vdeo Watermark Algorthm n Transform Doman Combnng wth 3D Vdeo Correlaton DING Ha-yang 1,3 1. Informaton Securty Center, Bejng Unversty of

More information

A Robust Webpage Information Hiding Method Based on the Slash of Tag

A Robust Webpage Information Hiding Method Based on the Slash of Tag Advanced Engneerng Forum Onlne: 2012-09-26 ISSN: 2234-991X, Vols. 6-7, pp 361-366 do:10.4028/www.scentfc.net/aef.6-7.361 2012 Trans Tech Publcatons, Swtzerland A Robust Webpage Informaton Hdng Method Based

More information

TECHNICAL POINTS ABOUT ADAPTIVE STEGANOGRAPHY BY ORACLE (ASO) 161, rue Ada, 34095, Montpellier Cedex 05, France

TECHNICAL POINTS ABOUT ADAPTIVE STEGANOGRAPHY BY ORACLE (ASO) 161, rue Ada, 34095, Montpellier Cedex 05, France 20th European Sgnal Processng Conference (EUSIPCO 2012) Bucharest, Romana, August 27-31, 2012 TECHNICAL POINTS ABOUT ADAPTIVE STEGANOGRAPHY BY ORACLE (ASO) Sarra Kouder 2, Marc Chaumont 1,2, Wllam Puech

More information

A Fast Visual Tracking Algorithm Based on Circle Pixels Matching

A Fast Visual Tracking Algorithm Based on Circle Pixels Matching A Fast Vsual Trackng Algorthm Based on Crcle Pxels Matchng Zhqang Hou hou_zhq@sohu.com Chongzhao Han czhan@mal.xjtu.edu.cn Ln Zheng Abstract: A fast vsual trackng algorthm based on crcle pxels matchng

More information

Article Reversible Dual-Image-Based Hiding Scheme Using Block Folding Technique

Article Reversible Dual-Image-Based Hiding Scheme Using Block Folding Technique Artcle Reversble Dual-Image-Based Hdng Scheme Usng Block Foldng Technque Tzu-Chuen Lu, * and Hu-Shh Leng Department of Informaton Management, Chaoyang Unversty of Technology, Tachung 4349, Tawan Department

More information

Load Balancing for Hex-Cell Interconnection Network

Load Balancing for Hex-Cell Interconnection Network Int. J. Communcatons, Network and System Scences,,, - Publshed Onlne Aprl n ScRes. http://www.scrp.org/journal/jcns http://dx.do.org/./jcns.. Load Balancng for Hex-Cell Interconnecton Network Saher Manaseer,

More information

High Payload Reversible Data Hiding Scheme Using Difference Segmentation and Histogram Shifting

High Payload Reversible Data Hiding Scheme Using Difference Segmentation and Histogram Shifting JOURNAL OF ELECTRONIC SCIENCE AND TECHNOLOGY, VOL. 11, NO. 1, MARCH 2013 9 Hgh Payload Reversble Data Hdng Scheme Usng Dfference Segmentaton and Hstogram Shftng Yung-Chen Chou and Huang-Chng L Abstract

More information

A Novel Adaptive Descriptor Algorithm for Ternary Pattern Textures

A Novel Adaptive Descriptor Algorithm for Ternary Pattern Textures A Novel Adaptve Descrptor Algorthm for Ternary Pattern Textures Fahuan Hu 1,2, Guopng Lu 1 *, Zengwen Dong 1 1.School of Mechancal & Electrcal Engneerng, Nanchang Unversty, Nanchang, 330031, Chna; 2. School

More information

Data Mining: Model Evaluation

Data Mining: Model Evaluation Data Mnng: Model Evaluaton Aprl 16, 2013 1 Issues: Evaluatng Classfcaton Methods Accurac classfer accurac: predctng class label predctor accurac: guessng value of predcted attrbutes Speed tme to construct

More information

Identify the Attack in Embedded Image with Steganalysis Detection Method by PSNR and RGB Intensity

Identify the Attack in Embedded Image with Steganalysis Detection Method by PSNR and RGB Intensity Internatonal Journal of Computer Systems (ISSN: 394-1065), Volume 03 Issue 07, July, 016 Avalable at http://www.jcsonlne.com/ Identfy the Attack n Embedded Image wth Steganalyss Detecton Method by PSNR

More information

SLAM Summer School 2006 Practical 2: SLAM using Monocular Vision

SLAM Summer School 2006 Practical 2: SLAM using Monocular Vision SLAM Summer School 2006 Practcal 2: SLAM usng Monocular Vson Javer Cvera, Unversty of Zaragoza Andrew J. Davson, Imperal College London J.M.M Montel, Unversty of Zaragoza. josemar@unzar.es, jcvera@unzar.es,

More information

Semi-Fragile Watermarking Scheme for Authentication of JPEG Images

Semi-Fragile Watermarking Scheme for Authentication of JPEG Images Tamkang Journal of Scence and Engneerng, Vol. 10, No 1, pp. 5766 (2007) 57 Sem-Fragle Watermarkng Scheme for Authentcaton of JPEG Images Chh-Hung n 1 *, Tung-Shh Su 2 and Wen-Shyong Hseh 2,3 1 Department

More information

Classifier Selection Based on Data Complexity Measures *

Classifier Selection Based on Data Complexity Measures * Classfer Selecton Based on Data Complexty Measures * Edth Hernández-Reyes, J.A. Carrasco-Ochoa, and J.Fco. Martínez-Trndad Natonal Insttute for Astrophyscs, Optcs and Electroncs, Lus Enrque Erro No.1 Sta.

More information

Statistical Steganalyis of Images Using Open Source Software

Statistical Steganalyis of Images Using Open Source Software Statstcal Steganalys of Images Usng Open Source Software Bhargav Kapa, Stefan A. Robla Department of Computer Scence Montclar State Unversty Montclar, NJ 07043 roblas@mal.montclar.edu Abstract In ths paper

More information

Reducing Frame Rate for Object Tracking

Reducing Frame Rate for Object Tracking Reducng Frame Rate for Object Trackng Pavel Korshunov 1 and We Tsang Oo 2 1 Natonal Unversty of Sngapore, Sngapore 11977, pavelkor@comp.nus.edu.sg 2 Natonal Unversty of Sngapore, Sngapore 11977, oowt@comp.nus.edu.sg

More information

A Clustering Algorithm for Key Frame Extraction Based on Density Peak

A Clustering Algorithm for Key Frame Extraction Based on Density Peak Journal of Computer and Communcatons, 2018, 6, 118-128 http://www.scrp.org/ournal/cc ISSN Onlne: 2327-5227 ISSN Prnt: 2327-5219 A Clusterng Algorthm for Key Frame Extracton Based on Densty Peak Hong Zhao

More information

A NEW AUDIO WATERMARKING METHOD BASED

A NEW AUDIO WATERMARKING METHOD BASED A NEW AUDIO WATERMARKING METHOD BASED ON DISCRETE COSINE TRANSFORM WITH A GRAY IMAGE Mohammad Ibrahm Khan 1, Md. Iqbal Hasan Sarker 2, Kaushk Deb 3 and Md. Hasan Furhad 4 1,2,3 Department of Computer Scence

More information

Private Information Retrieval (PIR)

Private Information Retrieval (PIR) 2 Levente Buttyán Problem formulaton Alce wants to obtan nformaton from a database, but she does not want the database to learn whch nformaton she wanted e.g., Alce s an nvestor queryng a stock-market

More information

FEATURE EXTRACTION. Dr. K.Vijayarekha. Associate Dean School of Electrical and Electronics Engineering SASTRA University, Thanjavur

FEATURE EXTRACTION. Dr. K.Vijayarekha. Associate Dean School of Electrical and Electronics Engineering SASTRA University, Thanjavur FEATURE EXTRACTION Dr. K.Vjayarekha Assocate Dean School of Electrcal and Electroncs Engneerng SASTRA Unversty, Thanjavur613 41 Jont Intatve of IITs and IISc Funded by MHRD Page 1 of 8 Table of Contents

More information

Steganography System using Slantlet Transform

Steganography System using Slantlet Transform ISSN:43-6999 Journal of Inmaton Communcaton and Intellgence Systems (JICIS) Volume Issue February 06 Steganography System usng Slantlet Transm Ryadh Bassl Abduljabbar Abstract An approach hdng nmaton has

More information

An Optimal Algorithm for Prufer Codes *

An Optimal Algorithm for Prufer Codes * J. Software Engneerng & Applcatons, 2009, 2: 111-115 do:10.4236/jsea.2009.22016 Publshed Onlne July 2009 (www.scrp.org/journal/jsea) An Optmal Algorthm for Prufer Codes * Xaodong Wang 1, 2, Le Wang 3,

More information

Classification Based Mode Decisions for Video over Networks

Classification Based Mode Decisions for Video over Networks Classfcaton Based Mode Decsons for Vdeo over Networks Deepak S. Turaga and Tsuhan Chen Advanced Multmeda Processng Lab Tranng data for Inter-Intra Decson Inter-Intra Decson Regons pdf 6 5 6 5 Energy 4

More information

Coding Artifact Reduction Using Edge Map Guided Adaptive and Fuzzy Filter

Coding Artifact Reduction Using Edge Map Guided Adaptive and Fuzzy Filter MEL A MITSUBISHI ELECTIC ESEACH LABOATOY http://www.merl.com Codng Artfact educton Usng Edge Map Guded Adaptve and Fuzzy Flter Hao-Song Kong Yao Ne Anthony Vetro Hufang Sun Kenneth E. Barner T-2004-056

More information

Grading Image Retrieval Based on DCT and DWT Compressed Domains Using Low-Level Features

Grading Image Retrieval Based on DCT and DWT Compressed Domains Using Low-Level Features Journal of Communcatons Vol. 0 No. January 0 Gradng Image Retreval Based on DCT and DWT Compressed Domans Usng Low-Level Features Chengyou Wang Xnyue Zhang Rongyang Shan and Xao Zhou School of echancal

More information

TECHNIQUE OF FORMATION HOMOGENEOUS SAMPLE SAME OBJECTS. Muradaliyev A.Z.

TECHNIQUE OF FORMATION HOMOGENEOUS SAMPLE SAME OBJECTS. Muradaliyev A.Z. TECHNIQUE OF FORMATION HOMOGENEOUS SAMPLE SAME OBJECTS Muradalyev AZ Azerbajan Scentfc-Research and Desgn-Prospectng Insttute of Energetc AZ1012, Ave HZardab-94 E-mal:aydn_murad@yahoocom Importance of

More information

The Shortest Path of Touring Lines given in the Plane

The Shortest Path of Touring Lines given in the Plane Send Orders for Reprnts to reprnts@benthamscence.ae 262 The Open Cybernetcs & Systemcs Journal, 2015, 9, 262-267 The Shortest Path of Tourng Lnes gven n the Plane Open Access Ljuan Wang 1,2, Dandan He

More information

The Research of Ellipse Parameter Fitting Algorithm of Ultrasonic Imaging Logging in the Casing Hole

The Research of Ellipse Parameter Fitting Algorithm of Ultrasonic Imaging Logging in the Casing Hole Appled Mathematcs, 04, 5, 37-3 Publshed Onlne May 04 n ScRes. http://www.scrp.org/journal/am http://dx.do.org/0.436/am.04.584 The Research of Ellpse Parameter Fttng Algorthm of Ultrasonc Imagng Loggng

More information

Deep learning is a good steganalysis tool when embedding key is reused for different images, even if there is a cover source-mismatch

Deep learning is a good steganalysis tool when embedding key is reused for different images, even if there is a cover source-mismatch Deep learnng s a good steganalyss tool when embeddng key s reused for dfferent mages, even f there s a cover source-msmatch Lonel PIBRE 2,3, Jérôme PASQUET 2,3, Dno IENCO 2,3, Marc CHAUMONT 1,2,3 (1) Unversty

More information

A MOVING MESH APPROACH FOR SIMULATION BUDGET ALLOCATION ON CONTINUOUS DOMAINS

A MOVING MESH APPROACH FOR SIMULATION BUDGET ALLOCATION ON CONTINUOUS DOMAINS Proceedngs of the Wnter Smulaton Conference M E Kuhl, N M Steger, F B Armstrong, and J A Jones, eds A MOVING MESH APPROACH FOR SIMULATION BUDGET ALLOCATION ON CONTINUOUS DOMAINS Mark W Brantley Chun-Hung

More information

Research of Multiple Text Watermarks Technique in Electric Power System Texts

Research of Multiple Text Watermarks Technique in Electric Power System Texts Sensors & Transducers 203 by IFSA http://www.sensorsportal.com Research of Multple Text atermarks Technque n Electrc Power System Texts Xao-X XING, Qng CHEN, 2 Lan-X FU School of Optcal-Electrcal and Computer

More information

Remote Sensing Image Retrieval Algorithm based on MapReduce and Characteristic Information

Remote Sensing Image Retrieval Algorithm based on MapReduce and Characteristic Information Remote Sensng Image Retreval Algorthm based on MapReduce and Characterstc Informaton Zhang Meng 1, 1 Computer School, Wuhan Unversty Hube, Wuhan430097 Informaton Center, Wuhan Unversty Hube, Wuhan430097

More information

An Entropy-Based Approach to Integrated Information Needs Assessment

An Entropy-Based Approach to Integrated Information Needs Assessment Dstrbuton Statement A: Approved for publc release; dstrbuton s unlmted. An Entropy-Based Approach to ntegrated nformaton Needs Assessment June 8, 2004 Wllam J. Farrell Lockheed Martn Advanced Technology

More information

High-Boost Mesh Filtering for 3-D Shape Enhancement

High-Boost Mesh Filtering for 3-D Shape Enhancement Hgh-Boost Mesh Flterng for 3-D Shape Enhancement Hrokazu Yagou Λ Alexander Belyaev y Damng We z Λ y z ; ; Shape Modelng Laboratory, Unversty of Azu, Azu-Wakamatsu 965-8580 Japan y Computer Graphcs Group,

More information

Research and Application of Fingerprint Recognition Based on MATLAB

Research and Application of Fingerprint Recognition Based on MATLAB Send Orders for Reprnts to reprnts@benthamscence.ae The Open Automaton and Control Systems Journal, 205, 7, 07-07 Open Access Research and Applcaton of Fngerprnt Recognton Based on MATLAB Nng Lu* Department

More information

Positive Semi-definite Programming Localization in Wireless Sensor Networks

Positive Semi-definite Programming Localization in Wireless Sensor Networks Postve Sem-defnte Programmng Localzaton n Wreless Sensor etworks Shengdong Xe 1,, Jn Wang, Aqun Hu 1, Yunl Gu, Jang Xu, 1 School of Informaton Scence and Engneerng, Southeast Unversty, 10096, anjng Computer

More information

Fast Feature Value Searching for Face Detection

Fast Feature Value Searching for Face Detection Vol., No. 2 Computer and Informaton Scence Fast Feature Value Searchng for Face Detecton Yunyang Yan Department of Computer Engneerng Huayn Insttute of Technology Hua an 22300, Chna E-mal: areyyyke@63.com

More information

Compiler Design. Spring Register Allocation. Sample Exercises and Solutions. Prof. Pedro C. Diniz

Compiler Design. Spring Register Allocation. Sample Exercises and Solutions. Prof. Pedro C. Diniz Compler Desgn Sprng 2014 Regster Allocaton Sample Exercses and Solutons Prof. Pedro C. Dnz USC / Informaton Scences Insttute 4676 Admralty Way, Sute 1001 Marna del Rey, Calforna 90292 pedro@s.edu Regster

More information

An Improved Image Segmentation Algorithm Based on the Otsu Method

An Improved Image Segmentation Algorithm Based on the Otsu Method 3th ACIS Internatonal Conference on Software Engneerng, Artfcal Intellgence, Networkng arallel/dstrbuted Computng An Improved Image Segmentaton Algorthm Based on the Otsu Method Mengxng Huang, enjao Yu,

More information

A DCVS Reconstruction Algorithm for Mine Video Monitoring Image Based on Block Classification

A DCVS Reconstruction Algorithm for Mine Video Monitoring Image Based on Block Classification 1 3 4 5 6 7 8 9 10 11 1 13 14 15 16 17 18 19 0 1 Artcle A DCVS Reconstructon Algorthm for Mne Vdeo Montorng Image Based on Block Classfcaton Xaohu Zhao 1,, Xueru Shen 1,, *, Kuan Wang 1, and Wanme L 1,

More information

Term Weighting Classification System Using the Chi-square Statistic for the Classification Subtask at NTCIR-6 Patent Retrieval Task

Term Weighting Classification System Using the Chi-square Statistic for the Classification Subtask at NTCIR-6 Patent Retrieval Task Proceedngs of NTCIR-6 Workshop Meetng, May 15-18, 2007, Tokyo, Japan Term Weghtng Classfcaton System Usng the Ch-square Statstc for the Classfcaton Subtask at NTCIR-6 Patent Retreval Task Kotaro Hashmoto

More information

Simulation Based Analysis of FAST TCP using OMNET++

Simulation Based Analysis of FAST TCP using OMNET++ Smulaton Based Analyss of FAST TCP usng OMNET++ Umar ul Hassan 04030038@lums.edu.pk Md Term Report CS678 Topcs n Internet Research Sprng, 2006 Introducton Internet traffc s doublng roughly every 3 months

More information

Edge Detection in Noisy Images Using the Support Vector Machines

Edge Detection in Noisy Images Using the Support Vector Machines Edge Detecton n Nosy Images Usng the Support Vector Machnes Hlaro Gómez-Moreno, Saturnno Maldonado-Bascón, Francsco López-Ferreras Sgnal Theory and Communcatons Department. Unversty of Alcalá Crta. Madrd-Barcelona

More information

Tsinghua University at TAC 2009: Summarizing Multi-documents by Information Distance

Tsinghua University at TAC 2009: Summarizing Multi-documents by Information Distance Tsnghua Unversty at TAC 2009: Summarzng Mult-documents by Informaton Dstance Chong Long, Mnle Huang, Xaoyan Zhu State Key Laboratory of Intellgent Technology and Systems, Tsnghua Natonal Laboratory for

More information

EFFICIENT LOW DELAY FILTERING FOR RESIDUAL ECHO SUPPRESSION

EFFICIENT LOW DELAY FILTERING FOR RESIDUAL ECHO SUPPRESSION EFFICIENT LOW DELAY FILTERING FOR RESIDUAL ECHO SUPPRESSION Chrstelle Yemdj, Moctar Moss Idrssa and Ncholas W. D. Evans EURECOM Insttute 656 Sopha-Antpols, France {yemdj, moss, evans}@eurecom.fr web: www.eurecom.fr

More information

Fast Computation of Shortest Path for Visiting Segments in the Plane

Fast Computation of Shortest Path for Visiting Segments in the Plane Send Orders for Reprnts to reprnts@benthamscence.ae 4 The Open Cybernetcs & Systemcs Journal, 04, 8, 4-9 Open Access Fast Computaton of Shortest Path for Vstng Segments n the Plane Ljuan Wang,, Bo Jang

More information

High resolution 3D Tau-p transform by matching pursuit Weiping Cao* and Warren S. Ross, Shearwater GeoServices

High resolution 3D Tau-p transform by matching pursuit Weiping Cao* and Warren S. Ross, Shearwater GeoServices Hgh resoluton 3D Tau-p transform by matchng pursut Wepng Cao* and Warren S. Ross, Shearwater GeoServces Summary The 3D Tau-p transform s of vtal sgnfcance for processng sesmc data acqured wth modern wde

More information

A Deflected Grid-based Algorithm for Clustering Analysis

A Deflected Grid-based Algorithm for Clustering Analysis A Deflected Grd-based Algorthm for Clusterng Analyss NANCY P. LIN, CHUNG-I CHANG, HAO-EN CHUEH, HUNG-JEN CHEN, WEI-HUA HAO Department of Computer Scence and Informaton Engneerng Tamkang Unversty 5 Yng-chuan

More information

The Research of Support Vector Machine in Agricultural Data Classification

The Research of Support Vector Machine in Agricultural Data Classification The Research of Support Vector Machne n Agrcultural Data Classfcaton Le Sh, Qguo Duan, Xnmng Ma, Me Weng College of Informaton and Management Scence, HeNan Agrcultural Unversty, Zhengzhou 45000 Chna Zhengzhou

More information

Feature Reduction and Selection

Feature Reduction and Selection Feature Reducton and Selecton Dr. Shuang LIANG School of Software Engneerng TongJ Unversty Fall, 2012 Today s Topcs Introducton Problems of Dmensonalty Feature Reducton Statstc methods Prncpal Components

More information

Virtual Memory. Background. No. 10. Virtual Memory: concept. Logical Memory Space (review) Demand Paging(1) Virtual Memory

Virtual Memory. Background. No. 10. Virtual Memory: concept. Logical Memory Space (review) Demand Paging(1) Virtual Memory Background EECS. Operatng System Fundamentals No. Vrtual Memory Prof. Hu Jang Department of Electrcal Engneerng and Computer Scence, York Unversty Memory-management methods normally requres the entre process

More information

Detection of an Object by using Principal Component Analysis

Detection of an Object by using Principal Component Analysis Detecton of an Object by usng Prncpal Component Analyss 1. G. Nagaven, 2. Dr. T. Sreenvasulu Reddy 1. M.Tech, Department of EEE, SVUCE, Trupath, Inda. 2. Assoc. Professor, Department of ECE, SVUCE, Trupath,

More information

Fuzzy Filtering Algorithms for Image Processing: Performance Evaluation of Various Approaches

Fuzzy Filtering Algorithms for Image Processing: Performance Evaluation of Various Approaches Proceedngs of the Internatonal Conference on Cognton and Recognton Fuzzy Flterng Algorthms for Image Processng: Performance Evaluaton of Varous Approaches Rajoo Pandey and Umesh Ghanekar Department of

More information

Data Hiding and Image Authentication for Color-Palette Images

Data Hiding and Image Authentication for Color-Palette Images Data Hdng and Image Authentcaton for Color-Palette Images Chh-Yang Yn ( 殷志揚 ) and Wen-Hsang Tsa ( 蔡文祥 ) Department of Computer & Informaton Scence Natonal Chao Tung Unversty 00 Ta Hsueh Rd., Hsnchu, Tawan

More information

Problem Definitions and Evaluation Criteria for Computational Expensive Optimization

Problem Definitions and Evaluation Criteria for Computational Expensive Optimization Problem efntons and Evaluaton Crtera for Computatonal Expensve Optmzaton B. Lu 1, Q. Chen and Q. Zhang 3, J. J. Lang 4, P. N. Suganthan, B. Y. Qu 6 1 epartment of Computng, Glyndwr Unversty, UK Faclty

More information

Dynamic wetting property investigation of AFM tips in micro/nanoscale

Dynamic wetting property investigation of AFM tips in micro/nanoscale Dynamc wettng property nvestgaton of AFM tps n mcro/nanoscale The wettng propertes of AFM probe tps are of concern n AFM tp related force measurement, fabrcaton, and manpulaton technques, such as dp-pen

More information

Information Hiding Watermarking Detection Technique by PSNR and RGB Intensity

Information Hiding Watermarking Detection Technique by PSNR and RGB Intensity www..org 3 Informaton Hdng Watermarkng Detecton Technque by PSNR and RGB Intensty 1 Neha Chauhan, Akhlesh A. Waoo, 3 P. S. Patheja 1 Research Scholar, BIST, Bhopal, Inda.,3 Assstant Professor, BIST, Bhopal,

More information

A Modified Median Filter for the Removal of Impulse Noise Based on the Support Vector Machines

A Modified Median Filter for the Removal of Impulse Noise Based on the Support Vector Machines A Modfed Medan Flter for the Removal of Impulse Nose Based on the Support Vector Machnes H. GOMEZ-MORENO, S. MALDONADO-BASCON, F. LOPEZ-FERRERAS, M. UTRILLA- MANSO AND P. GIL-JIMENEZ Departamento de Teoría

More information

Wishing you all a Total Quality New Year!

Wishing you all a Total Quality New Year! Total Qualty Management and Sx Sgma Post Graduate Program 214-15 Sesson 4 Vnay Kumar Kalakband Assstant Professor Operatons & Systems Area 1 Wshng you all a Total Qualty New Year! Hope you acheve Sx sgma

More information

Implementation of IMDCT Block of an MP3 Decoder through Optimization on the DCT Matrix

Implementation of IMDCT Block of an MP3 Decoder through Optimization on the DCT Matrix 22 M. GALABOV, IMPLEMENTATION OF IMDCT BLOCK OF AN MP DECODER THROUGH OPTIMIZATION... Implementaton of IMDCT Block of an MP Decoder through Optmzaton on the DCT Matr Mroslav GALABOV Dept. of Computer Systems

More information

Lecture 5: Multilayer Perceptrons

Lecture 5: Multilayer Perceptrons Lecture 5: Multlayer Perceptrons Roger Grosse 1 Introducton So far, we ve only talked about lnear models: lnear regresson and lnear bnary classfers. We noted that there are functons that can t be represented

More information

Using Fuzzy Logic to Enhance the Large Size Remote Sensing Images

Using Fuzzy Logic to Enhance the Large Size Remote Sensing Images Internatonal Journal of Informaton and Electroncs Engneerng Vol. 5 No. 6 November 015 Usng Fuzzy Logc to Enhance the Large Sze Remote Sensng Images Trung Nguyen Tu Huy Ngo Hoang and Thoa Vu Van Abstract

More information

Wavelet-Based Image Compression System with Linear Distortion Control

Wavelet-Based Image Compression System with Linear Distortion Control Je-Hung Lu, Kng-Chu Hung Wavelet-Based Image Compresson System wth Lnear Dstorton Control Je-Hung Lu, Kng-Chu Hung Insttute of Engneerng Scence and Technology Natonal Kaohsung Frst Unversty of Scence and

More information

[33]. As we have seen there are different algorithms for compressing the speech. The

[33]. As we have seen there are different algorithms for compressing the speech. The 49 5. LD-CELP SPEECH CODER 5.1 INTRODUCTION Speech compresson s one of the mportant doman n dgtal communcaton [33]. As we have seen there are dfferent algorthms for compressng the speech. The mportant

More information

A Fusion Steganographic Algorithm Based on Faster R-CNN

A Fusion Steganographic Algorithm Based on Faster R-CNN Copyrght 2018 Tech Scence Press CMC, vol.55, no.1, pp.1-16, 2018 A Fuson Steganographc Algorthm Based on Faster R-CNN Ruohan Meng 1, 2, Steven G. Rce 3, Jn Wang 4 1, 2, * and Xngmng Sun Abstract: The am

More information

Optimizing Document Scoring for Query Retrieval

Optimizing Document Scoring for Query Retrieval Optmzng Document Scorng for Query Retreval Brent Ellwen baellwe@cs.stanford.edu Abstract The goal of ths project was to automate the process of tunng a document query engne. Specfcally, I used machne learnng

More information

Local Quaternary Patterns and Feature Local Quaternary Patterns

Local Quaternary Patterns and Feature Local Quaternary Patterns Local Quaternary Patterns and Feature Local Quaternary Patterns Jayu Gu and Chengjun Lu The Department of Computer Scence, New Jersey Insttute of Technology, Newark, NJ 0102, USA Abstract - Ths paper presents

More information

A Lossless Watermarking Scheme for Halftone Image Authentication

A Lossless Watermarking Scheme for Halftone Image Authentication IJCSNS Internatonal Journal of Computer Scence and Network Securty, VOL.6 No.2B, February 2006 147 A Lossless Watermarkng Scheme for Halftone Image Authentcaton Jeng-Shyang Pan, Hao Luo, and Zhe-Mng Lu,

More information

Steganography is the art and science of hiding

Steganography is the art and science of hiding Hde and Seek: An Introducton to Steganography Although people have hdden secrets n plan sght now called steganography throughout the ages the recent growth n computatonal power and technology has propelled

More information

Synthesizer 1.0. User s Guide. A Varying Coefficient Meta. nalytic Tool. Z. Krizan Employing Microsoft Excel 2007

Synthesizer 1.0. User s Guide. A Varying Coefficient Meta. nalytic Tool. Z. Krizan Employing Microsoft Excel 2007 Syntheszer 1.0 A Varyng Coeffcent Meta Meta-Analytc nalytc Tool Employng Mcrosoft Excel 007.38.17.5 User s Gude Z. Krzan 009 Table of Contents 1. Introducton and Acknowledgments 3. Operatonal Functons

More information

Virtual Machine Migration based on Trust Measurement of Computer Node

Virtual Machine Migration based on Trust Measurement of Computer Node Appled Mechancs and Materals Onlne: 2014-04-04 ISSN: 1662-7482, Vols. 536-537, pp 678-682 do:10.4028/www.scentfc.net/amm.536-537.678 2014 Trans Tech Publcatons, Swtzerland Vrtual Machne Mgraton based on

More information

Video Proxy System for a Large-scale VOD System (DINA)

Video Proxy System for a Large-scale VOD System (DINA) Vdeo Proxy System for a Large-scale VOD System (DINA) KWUN-CHUNG CHAN #, KWOK-WAI CHEUNG *# #Department of Informaton Engneerng *Centre of Innovaton and Technology The Chnese Unversty of Hong Kong SHATIN,

More information

Robust Watermarking for Text Images Based on Arnold Scrambling and DWT-DCT

Robust Watermarking for Text Images Based on Arnold Scrambling and DWT-DCT Internatonal Conference on Mechatroncs Electronc Industral and Control Engneerng (MEIC 015) Robust Watermarkng for Text Images Based on Arnold Scramblng and DWT-DCT Fan Wu College of Informaton Scence

More information

Subspace clustering. Clustering. Fundamental to all clustering techniques is the choice of distance measure between data points;

Subspace clustering. Clustering. Fundamental to all clustering techniques is the choice of distance measure between data points; Subspace clusterng Clusterng Fundamental to all clusterng technques s the choce of dstance measure between data ponts; D q ( ) ( ) 2 x x = x x, j k = 1 k jk Squared Eucldean dstance Assumpton: All features

More information

CMPS 10 Introduction to Computer Science Lecture Notes

CMPS 10 Introduction to Computer Science Lecture Notes CPS 0 Introducton to Computer Scence Lecture Notes Chapter : Algorthm Desgn How should we present algorthms? Natural languages lke Englsh, Spansh, or French whch are rch n nterpretaton and meanng are not

More information

R s s f. m y s. SPH3UW Unit 7.3 Spherical Concave Mirrors Page 1 of 12. Notes

R s s f. m y s. SPH3UW Unit 7.3 Spherical Concave Mirrors Page 1 of 12. Notes SPH3UW Unt 7.3 Sphercal Concave Mrrors Page 1 of 1 Notes Physcs Tool box Concave Mrror If the reflectng surface takes place on the nner surface of the sphercal shape so that the centre of the mrror bulges

More information

Using Counter-propagation Neural Network for Digital Audio Watermarking

Using Counter-propagation Neural Network for Digital Audio Watermarking Usng Counter-propagaton Neural Network for Dgtal Audo Watermarkng Chuan-Yu Chang and Wen-Chh Shen Graduate School of Computer Scence and Informaton Engneerng Natonal Yunln Unversty of Scence & Technology

More information

VRT012 User s guide V0.1. Address: Žirmūnų g. 27, Vilnius LT-09105, Phone: (370-5) , Fax: (370-5) ,

VRT012 User s guide V0.1. Address: Žirmūnų g. 27, Vilnius LT-09105, Phone: (370-5) , Fax: (370-5) , VRT012 User s gude V0.1 Thank you for purchasng our product. We hope ths user-frendly devce wll be helpful n realsng your deas and brngng comfort to your lfe. Please take few mnutes to read ths manual

More information

y and the total sum of

y and the total sum of Lnear regresson Testng for non-lnearty In analytcal chemstry, lnear regresson s commonly used n the constructon of calbraton functons requred for analytcal technques such as gas chromatography, atomc absorpton

More information

Proper Choice of Data Used for the Estimation of Datum Transformation Parameters

Proper Choice of Data Used for the Estimation of Datum Transformation Parameters Proper Choce of Data Used for the Estmaton of Datum Transformaton Parameters Hakan S. KUTOGLU, Turkey Key words: Coordnate systems; transformaton; estmaton, relablty. SUMMARY Advances n technologes and

More information