Detecting MP3Stego using Calibrated Side Information Features
|
|
- Emory McBride
- 5 years ago
- Views:
Transcription
1 2628 JOURNAL OF SOFTWARE, VOL. 8, NO. 10, OCTOBER 2013 Detectng P3Stego usng Calbrated Sde Informaton Features Xanmn Yu School of Informaton Scence and Engneerng, Nngbo Unversty Emal: Rangdng Wang and Dqun Yan School of Informaton Scence and Engneerng, Nngbo Unversty Emal: Abstract P3Stego s a typcal steganographc tool for P3 audo, whch embeds secret message nto P3 audo accordng to the party of the block length. In ths work, we present a steganalytc method to attack P3Stego. The bg_values nsde nformaton s consdered to extract the steganalytc feature. Re-compresson calbraton has been appled n order to mprove the feature's senstvty. Expermental results show that the extracted feature can reflect the P3Stego trace effectvely. Index Terms steganalyss, P3, bg_values, calbraton I. INTRODUCTION Steganography s the art of hdng the present of communcaton by embeddng secret messages nto nnocent lookng covers, such as dgtal mages, vdeos, and audos [1]. Its am s to avod drawng suspcon to the transmsson of hdden nformaton. Steganalyss s the art of detectng secret messages hdden usng steganography [2]. The goal of steganalyss s to reveal the presence of embedded message and to break the covert communcaton. P3, as a standard for transmsson and storage of compressed audo, s a promsng carrer format for steganography. Frst, P3 s the most popular and wdely used audo fle format. When audos n P3 format are taken as cover sgnals, the stego-audos wll be less lkely to be notced by steganalyzers than other audo formats. Also, t s a challenge for steganalyzers to dstngush whether the dstorton s caused by stego operaton or by P3 encodng snce P3 s a lossy compresson algorthm. For these reasons, P3 audo s easly to be chosen as carrer for steganography and hence the competton between P3 steganography and P3 steganalyss has escalated over the past few years. Several stego tools for P3 audos have been arsen, such as P3Stego [3], UnderP3Cover [4], P3Stegz [5], and Stego-Lame [6]. In the early works of our group members, we also have proposed two novel steganographc methods for P3 audos [7, 8]. As far as P3 steganography tools are concerned, P3Stego s the most typcal one. In P3Stego, wth the beneft of the dstorton adjustment mechansm of the P3 codec, the sum of the dstorton caused by quantzaton and P3Stego s effectvely controlled below the maskng threshold whch s the mnmum sound level that human can perceve. Once the cover audo s unavalable, t s hard to dstngush whether the test audo has been operated by P3Stego or not. In order to defeat P3Stego, some steganalytc methods have been proposed n recent years. Snce P3Stego changes the behavor of quantzaton n P3 encodng, Westfeld [9, 10] proposed an attack method based on the varance of the block length whch s a parameter related to quantzaton. Smlarly, Dttmann [11, 12] consdered that there would be more dfferent block lengths after P3Stego embeddng. Hence, the number of dfferent block lengths s taken as a steganalytc feature n ther method. However, the performance of ths method can be stll mproved especally at low embeddng rates. Qao [13] ntroduced a detecton method based on an nter-frame feature set whch contans the moment statstcal features on the second dervatves, as well as arkov transton features and neghborng jont densty of DCT coeffcents. In hs another work [14], the statstcal moments of GGD (Generalzed Gaussan Dstrbuton) shape parameters for DCT coeffcents are also taken as the steganalytc features. Ozer et al. [15, 16] presented a method for detectng audo steganography based on audo qualty metrcs. Although ths method can expose the presence of P3Stego, relatvely hgh false postve rate s one of the lmtatons. Addtonally, the dmensonalty of the feature space s the man nconvenence of Qao s and Ozer s methods. Generally, the steganalytc detector wll be more straghtforward and effectve f the features can be extracted drectly from the poston where the steganography takes place. Snce P3Stego happens durng quantzaton, more attentons should be pad to the parameters assocated wth the quantzaton. In ths work, the bg_values whch represents the number of quantzed DCT (QDCT) coeffcents n Bg_value regon s ntroduced nto steganalyss to attack P3Stego. In order to weaken the nfluence of the audo content and expose the stego nose, the calbrated feature s extracted by recompresson. The results demonstrate that the proposed do: /jsw
2 JOURNAL OF SOFTWARE, VOL. 8, NO. 10, OCTOBER method can acheve a good dscrmnatory ablty for P3Stego. The rest of ths paper s organzed as follows. Secton II brefly covers the basc operatons of the P3Stego algorthm. Secton III presents the proposed method. The effectveness of the proposed method under varous condtons wth expermental results s verfed n Secton IV. Fnally, conclusons are drawn n Secton V. II. BACKGROUND In ths secton, the prncple of P3 compresson s frst revewed n order to better understand P3Stego and then the P3Stego steganography algorthm are analyzed. A. Prncple of P3 Compresson Pulse Code odulaton (PC) s a standard format for storng or transmttng uncompressed dgtal audo. There are two parameters for PC: sample rate Hz and bt-rate Bt. The sample rate descrbes how many samples per second, and the bt-rate descrbes how bg the dgtal word s that wll hold the sample value. PEG-1 Audo Layer 3, or P3, s an audo-specfc format that was desgned by the ovng Pcture Experts Group as part of ts PEG-1 standard [17]. The lossy compresson algorthm of P3 s desgned to greatly reduce the amount of data requred to represent the audo recordng wth a fathful reproducton of the orgnal uncompressed audo for most lsteners. Fg.1 llustrates the entre P3 encodng, whch conssts of the followng steps [18]: Fgure 1. Block dagram of P3 encodng (1) Through a polyphase flter analyss, a sequence of 1152 PC samples are fltered nto 32 equally spaced frequency sub-bands dependng of the Nyqust frequency of the PC sgnal. If the sample frequency of the PC sgnal s 44.1 khz, the Nyqust frequency wll be khz. Each sub-band wll be approxmately 22050/32 = 689Hz wde. The lowest sub-band wll have a range from 0 to 689Hz, the next sub-band Hz, etc. (2) By applyng a modfed dscrete cosne transform (DCT) to each tme frame of sub-band samples, the 32 sub-bands wll be splt nto 18 fner sub-bands creatng a granule wth a total of 576 frequency lnes. To reduce artfacts caused by the edges of the tme-lmted sgnal segment, each sub-band sgnal has to be wndowed pror to the DCT. If the sub-band sgnal at the present tme frame shows lttle dfference from the prevous tme frame, then the long wndow type s appled, whch enhance the spectral resoluton gven by the DCT. Alternatvely, f the sub-band sgnal shows consderable dfference from the prevous tme frame, then the short wndow s appled, whch enhance the temporal resoluton. (3) Smultaneously, the sgnal s also transformed to the frequency doman by a Fast Fourer Transform as the sgnal s processed by the polyphase flterbank, to obtan hgher frequency resoluton and nformaton on the spectral changes over tme. (4) Psychoacoustc model retreves the frequency nformaton from the FFT output and provdes nformaton about whch parts of the audo sgnals that s audble and whch parts are not. The two presently FFT spectra and the two prevous spectra are compared. If consderable dfferences are found, a request of adoptng short wndows wll be sent to the DCT block. As soon as the dfference fades away, the DCT block wll be changed back to long wndows. At the same tme, the Psychoacoustc model detects the domnant tonal components and for each crtcal band maskng thresholds are calculated. Frequency components below the thresholds are masked out. (5) The scalng and quantzaton are appled to 576 spectral values at a tme, whch s done teratvely n two nested loops, a dstorton control loop(outer loop, whch ams to keep the quantzaton nose below the maskng threshold) and a rate control loop (nner loop, whch determnes the quantzaton step sze and the quantzaton of the frequency doman samples). (6) The Huffman codng, whch retans PEG-1 Layer III a hgh qualty at low bt-rates, s appled to the quantzed values. All parameters generated by the encoder resde n the sde nformaton part of the frame. The frame header, sde nformaton, CRC, Huffman coded frequency lnes etc. are put together to form frames.
3 2630 JOURNAL OF SOFTWARE, VOL. 8, NO. 10, OCTOBER 2013 In flter bank analyss, a polyphase flter [n] s gven by: H π (2 + 1) ( n 16) H [ n] = h[ n] cos[ ], = 0 31, n = (1) Where h[n] s a low-pass flter. The orgnal PC sgnal and fltered sgnals and fltered sgnals are denoted by x[n] P[n] and respectvely. P [ n] = 511 m= 0 x[ n m] H [ m], = 0 31 (2) We obtan sub-band sgnals P[n] s down-sampled by 32. S [ n] = P[32n] = n = 1 S [n], whch x[32n m] H [ m], = 0 31 (3) As a lapped transform, the DCT s a bt unusual compared to other Fourer-related transforms n that t has half as many outputs as nputs (nstead of the same number). To obtan DCT coeffcents, P3 defnes long wndow and short wndow to enhance frequency resoluton and temporal resoluton, respectvely. The product of selected wndow coeffcents and sub-band sgnal s denoted by Z k. The DCT coeffcents are gven by : n 1 = π n n X Z k cos[ ( zk + 1+ ) (2 + 1)], = 0,1,, 1 k= 0 2n 2 2 (4) For the long wndow, n equals 36, otherwse n equals 12 for the short wndow. In Psychoacoustc odel II, NR(m) ndcates the mask-to-nose rato at m bts quantzaton, whch measures the threshold of perceptble dstorton. Wth the sgnal-to-nose rato (SNR) of the sgnal, SR(m) s calculated as: SR( m) = SNR( m) NR( m) (5) The P3 compresson algorthm reles on explotng weakness of human audtory percepton and hdes the fact that a sgnfcant amount of nformaton s dscarded wthout any notceable degradaton of qualty. In P3 compresson, several bt-rates are specfed n the PEG-1 Layer 3 standard: 32, 40, 48, 56, 64, 80, 96, 112, 128, 160, 192, 224, 256, and 320kbt/s, and the avalable samplng frequences are 32, 44.1, and 48 khz. The P3 decodng, demonstrated n Fg.2, s the nverse process of encodng contans the steps n the order of Huffman decodng, nverse quantzaton, nverse DCT and alasng cancellaton, and flter-bank synthess. Frst Huffman decodng s performed on the P3 btstream, then the decoder restore the quantzed DCT coeffcent values and the sde nformaton related to them, such as the wndow type that s assgned to each frame. After nverse quantzaton, the coeffcents are transformed back to the sub-band doman by applyng an nverse DCT on the coeffcents. Fnally, the waveform n the PC format s reconstructed by the synthess flterbank. Fgure 2. Block dagram of P3 decodng B. Revew of P3Stego Steganography Algorthm The embeddng of P3Stego s ntegrated wth the nner loop functon that controls the bt rate of P3 encoder. The pseudo-code for the nner loop functon wth P3Stego s gven n Fg. 3.
4 JOURNAL OF SOFTWARE, VOL. 8, NO. 10, OCTOBER Algorthm: P3Stego Embeddng (nner loop functon) Input: DCT Coeffcents ( I ), Secret bt ( b ) Input Parameters: Number of avalable bts ( B ), Output: Part2_3_length ( P 32 ) Begn 1. q = q + 1 s s 2. Iˆ = Quantzer( q, I) then goto Step 1 Else goto Step 4. Quantzaton Step ( q ) s s 3. If I ˆ > 8205 max 4. P = HuffmanCodng( Iˆ ) embedrule = ( P %2) ( b) 6. If P > B or embedrule = 1 32 max then goto Step 1 Else goto Step return P 32 max coeffcents can be coded wth the avalable number of bts. The varable P 32 contans the number of the bts used for scalefactors and Huffman code data for current granule, whch s also called block length. Wthout embeddng, the nner loop wll be fnshed when the P 32 s wthn the range of the number of bts avalable. In P3Stego, the nner loop wll contnue to terate untl the party of the P 32 s equal to the hdden bt b and the bt demand for Huffman codng s met. Once the nner loop s done, another loop, namely outer loop, wll check the dstortons ntroduced by the quantzaton operaton. If the allowed dstorton s exceeded, the nner loop wll be called agan. The above process wll be terated untl the bt rate and dstorton requrements are both met. III. PROPOSED STEGANALYTIC ETHOD Obtanng the features that can reflect the dfferences between stego audos and cover audos s a crucal step for steganalyss. Snce P3Stego'nformaton hdng takes place durng the quantzaton process, t s natural and reasonable to generate feature from the parameters related to quantzaton. The parameter concerned n the proposed method s bg_values n sde nformaton. In ths secton, the steganographc mpact on bg_values s analyzed frst. The calbrated feature s obtaned by re-compresson n order to reduce the nfluence of the audo content. At last, we present the attackng algorthm for P3Stego. A. Steganographc Effect on Bg_values In order to mprove the compresson effcency, lossless huffman codng s adopted n P3 encodng. Quantzed DCT(QDCT) coeffcents s dvded nto three zones from hgh to low frequency: the all-zero regon(rzero), the small value regon(count1) and the large value regon(bg_value),shown n Fg.4. End Fgure 3. Pseudo-code for nner loop functon wth P3Stego The nner loop quantzes the DCT coeffcents and ncreases the quantzaton step untl the quantzed Fgure 4. The partton of QDCT coeffcents The Rzero regon s not requred to be encoded. In Count1 regon, each of the four QDCT coeffcents s encoded. Each of the two QDCT coeffcents s encoded n Bg_value regon, whch can be subdvded nto Regon0, Regon1 and Regon1 regon. The number of QDCT coeffcents n Bg_value, Count1 and Rzero
5 2632 JOURNAL OF SOFTWARE, VOL. 8, NO. 10, OCTOBER 2013 regon s represented by bg_values,count1 and rzero respectvely. The value of bg_values, count1 and rzero has followng rules: f the value of two consecutve QDCT coeffcents s zero, then the value of rzero plus one; f the absolute value of four consecutve QDCT coeffcents s less than one, then the value of count1 plus one. As the value of bg_values, count1 and rzero has the followng condton: 2 * rzero+ 4* count1 + 2* bg_ values= 576 (6) so the value of bg_values can be obtaned wth rzero and count1.because the relatonshp of rzero,count1 and bg_values, the parameter of bg_values s concerned n ths artcle. As descrbed n Secton2, t s obvous that more teratons are requred to ext the nner loop due to the embeddng. Consequently, we wll have a larger quantzaton step at the end of the loop n stego case. The larger the quantzaton step s, the smaller the value of the QDCT coeffcents. So the value of bg_values becomes small and the next frame's bg_values becomes larger n stego case. Fnally, the varance of bg_values s larger than n non-stego case. Ths phenomenon s clearly seen n Fg.2 whch s the dstrbuton of bg_values of the same P3 audo n non-stego case and stego case. The horzontal axs represents the ndex of frame and the vertcal axs represents the value of bg_values. In stego case, the audo s embedded wth 50% messages(100% corresponds to the maxmum sze of a message that can be embedded by P3Stego). (a)non-stego From Fg. 2, t s obvous to take the varance of bg_values as feature to detect P3Stego. That s Where N 2 g g = 1 f = N 1 (7) g { 1,2, N } ( ) s the value of bg_values n th granule and g s the mean value of bg_values n all granules. B. Calbraton Feature by Re-compresson In steganalyss, t s almost mpossble to have access to the cover durng the process of steganalyss. If we can obtan the estmaton of the cover from the suspect one as effectvely as possble, the steganalystc performance wll be mproved. Several methods for cover estmaton have been arsen n recent years, such as flterng [19], down-samplng [20], re-embeddng [21], and re-compresson [22]. One of the most famous approaches for creatng an estmate of the cover mage s the model proposed by Jessca Frdrch n [22] known as JPEG re-compresson calbraton. Smlarly, we conjectured that the steganographc effect on bg_values would be removed through re-compresson calbraton. Denote d as an P3 audo under scrutny and e s the P3 audo that d s decompressed to the tme doman and the compressed back to P3 wth the same compresson rato. That s, = C ( D( ) CR) e d, (8) Where C and D denote the P3 compresson and decompresson algorthm respectvely, and CR s the compresson rato. Then we can obtan the fnal calbrated feature f, that s f = f d f e Where and e f d and f e (9) s the feature extracted from d respectvely by equaton (7). Fgure 5. (b)stego Dstrbuton of bg_values n non-stego case and stego case C. Detectng P3Stego d Denote as an P3 audo under scrutny and t contans totally N granules. The process of detectng P3Stego s descrbed as follows. Step1: Obtan the cover estmaton d and compressng agan. e by decodng
6 JOURNAL OF SOFTWARE, VOL. 8, NO. 10, OCTOBER Step2: For the th granule n d and e, obtan the value of bg_values by the sde nformaton respectvely. Step3: Repeat Step 2 untl reach the end. Fnally, we can get the sequence of the value of bg_values. f Step 4: Calculate d f and e by equaton (7) and f = f then extract the feature d f e. Step5: Take the f as nput for SV classfer. Apply SV classfer and determne whether the testng P3 audo has been deal wth P3Stego or not. IV. EXPERIENTAL RESULTS A. Expermental Setup A total number of 500 mono audos wth dfferent styles are used and each audo s sampled at 44.1 khz, 16 bts/sample and has the duraton of 10s. They have never been P3 compressed. Random sequence wth 0 and 1 s taken as the secret message and no preprocessng such as compresson or encrypton s done to the message before embeddng. All audos are embedded wth 10%, 20%, 50%, 80%, 100% messages (100% corresponds to the maxmum sze of a message that can be embedded by P3Stego). In the experments, half of the nature and stego audos are randomly selected to tran the SV classfer and the rest are used for testng. TABLE I. AVERAGE RESULTS UNDER DIFFERENT BIT-RATES B. Expermental Results and Dscussons In our experments, true postve ( TP ) means that stego P3 audo s predcted as stego P3 audo, and true negatve ( TN ) means that the nature P3 audo s predcted as nature P3 audo. Consequently, false negatve ( FN ) means that the stego P3 audo s predcted as nature P3 audo, false postve ( FP ) means that the nature P3 audo s predcted as stego P3 audo. Snce the stego P3 audo and the nature P3 audo to be detected have the same quanttes n our experments, the fnal detecton accuracy rate ( AR ) s AR = ( TPR + TNR) / 2 computed as, where TPR = TP /( TP + FN),and TNR = TN /( TN + FP). For each case, we average the ten tmes test results. Table 1 lsts the average results under dfferent bt-rates. It s observed from Table I that the accuracy rate ncreases wth the ncrease of embeddng rate. It s n lne wth our expecton because the more the nformaton s hdden, the easer the audo after the operaton of steganography wll be detected.the detecton results s good when the embeddng rate s over 50%: all the results are over 90%. Especally when the embeddng rate s less than 50%, the detecton results are not good. Ths shows that the steganalyss of P3Stego s stll very challengng n cases wth low embeddng rates. CR (kbps) ER (%) TPR(%) TNR(%) AR (%) In order to show the detecton relablty performance, recever operatng characterstc (ROC) curve has been used to verfy the effectveness of the proposed method. Fg. 6 gves the ROC curves under dfferent compresson ratos. The curves ndcate that the proposed scheme s able to relably detect the trace of P3Stego. For nstance, n Fg. 6(a), a probablty of detecton of approxmately 95% s acheved at a false postve rate of 10%, when the embeddng rate s 50%.
7 2634 JOURNAL OF SOFTWARE, VOL. 8, NO. 10, OCTOBER 2013 Whle the ROC curve contans most of the nformaton about the accuracy of the classfer, t s sometmes desrable to produce quanttatve summary measures of the ROC curve. The most commonly used such measure s the area under the ROC curves (AUC). In ths paper, the detecton relablty [22] s adopted to evaluate the detecton performance, whch s defned as, ρ = 2A 1 (10) where A s the AUC. A ρ = 1 s scaled to obtan ρ = 0 for a perfect detecton and for a random guessng. The results for detecton relabltes under dfferent embeddng rates and dfferent compresson ratos are shown n Table II. The results n Table II show that the detecton performance depends on the embeddng rate. The less the embeddng rate, the more dffcult t s to detect. Fgure 6. ROC curves under dfferent embeddng rates (a) 96kbps (b) 112kbps (c) 128kbps. TABLE II. AUC RESULTS UNDER DIFFERENT EBEDDING RATES CR (kbps) ER (%) AUC ρ V. CONCLUSIONS In ths paper, the effect on the bg_values caused by P3Stego embeddng, s analyzed. The steganalytc features s obtaned from the detectng and estmated audos obtaned by re-compresson calbraton. The extracton of the feature s smple and rapd because they
8 JOURNAL OF SOFTWARE, VOL. 8, NO. 10, OCTOBER can be obtaned drectly from the P3 btstream wthout fully decodng. The expermental results show that the proposed method s effectve to detect P3Stego. ACKNOWLEDGEENT Ths work s supported by the Natonal Natural Scence Foundaton of Chna (NSFC: , ), Doctoral Fund of nstry of Educaton of Chna( ), Scentfc Research Fund of Zhejang Provncal Educaton Department (Grant No. Y ), Key Innovaton Team of Zhejang Provnce (Grant No. C ), The Outstandng (Postgraduate) Dssertaton Growth Foundaton of Nngbo Unversty (Grant No. 10Y ),Zhejang natural scence foundaton of Chna (ZJNSF:Z ,Y ), Zhejang scence & technology preferred projects of Chna(2010C11025), Zhejang provnce educaton department key project of Chna (ZD ), Nngbo scence & technology preferred projects of Chna(2009B10003), Nngbo key servce professonal educaton project of Chna(2010A610115). REFERENCES [1] S. Dumtrescu, X. Wu, Z. Wang, Detecton of LSB steganography va sample par analyss, IEEE Transactons on Sgnal Processng, 2003, vol. 51, pp [2] N. Provos, P. Honeyman, Hde and seek: an ntroducton to steganography, IEEE Securty & Prvacy, 2003, vol.1, pp [3] F. Pettcolas, P3Stego [4] C. Platt, UnderP3Cover [5] Z. Achmad, P3Stegz [6] Noch, Stego-Lame [7] D. Yan, R. Wang, L. Zhang, Quantzaton step party-based steganography for P3 audo, Fundamenta Informatcae, 2009, vol.97, pp [8] D. Yan, R. Wang, Huffman table swappng-based steganography for P3 audo, ultmeda Tools and Applcatons, 2011, vol. 52, pp [9] A. Westfeld, Detectng low embeddng rates, Proceedngs of Internatonal Conference on Informaton Hdng, 2003, pp [10] R. Bohme, A. Westfeld, Statstcal charactersaton of P3 encoders for steganalyss, Proceedngs of AC Workshop on ultmeda and Securty, 2004, pp [11] J. Dttmann, D. Hesse, Network based ntruson detecton to detect steganographc communcaton channels: on the example of audo data, Proceedngs of IEEE Internatonal Workshop on ultmeda Sgnal Processng, 2004, pp [12] 12 C. Kraetzer, J. Dttman J, Pros and cons of mel-cepstrum based audo steganalyss usng SV classfcaton, Proceedngs of Internatonal Conference on Informaton Hdng, 2007, pp [13]. Qao, A. Sung, Q. Lu, Steganalyss of P3Stego. Proceedngs of Internatonal Jont Conference on Neural Networks, 2009, pp [14]. Qao, A. Sung, Q. Lu, Feature mnng and ntellgent computng for P3 steganalyss, Proceedngs of Internatonal Jont Conference on Bonformatcs, Systems Bology and Intellgent Computng, 2009, pp [15] H. Ozer, B. Sankur, N. emon, I. Avcbas, Detecton of audo covert channels usng statstcal footprnts of hdden messages, Dgtal Sgnal Processng, 2006, vol.16, pp [16] I. Avcbas, Audo steganalyss wth content-ndependent dstorton measures, IEEE Sgnal Processng Letters, 2006, vol. 13, pp [17] ISO/IEC : Informaton technology - codng of movng pctures and assocated audo for dgtal storage meda at up to about 1.5 bt/s - part3: audo, [18] _aac.pdf [19] 19. AD. Ker, R. Bohme, Revstng weghted stego-mage steganalyss, Proceedngs of SPIE on Securty, Forenscs, Steganography, and Watermarkng of ultmeda Contents X, 2008, pp [20] 20. AD. Ker, Steganalyss of LSB matchng n grayscale mages, IEEE Sgnal Processng Letters, 2005, vol. 12, pp [21] 21. H. alk, Steganalyss of qm steganography usng rregularty measure, Proceedngs of AC Workshop on ultmeda and Securty, 2008, pp [22] 22. J. Frdrch J (2004) Feature-based steganalyss for JPEG mages and ts mplcatons for future desgn of steganographc schemes, Proceedngs of Internatonal Conference on Informaton Hdng, 2004, pp Xanmn Yu s born n He s currently pursung hs.s. degree n College of Informaton Scence and Engneerng, Nngbo Unversty, Chna. Hs research nterests manly nclude multmeda retreve and securty. Rangdng Wang s born n 1962, receved hs.s. degree n the Department of Computer Scence and Engneerng from the Northwest Polytechnc Unversty, Xan n 1987, and receved hs Ph.D. degree n the School of Electronc and Informaton Engneerng from Tongj Unversty, Shangha, Chna, n He s now a professor at Faculty of Informaton Scence and Engneerng, Nngbo Unversty, Chna. Hs research nterests manly nclude multmeda securty, dgtal watermarkng for dgtal rghts management, data hdng, and steganography for computer forenscs.
9 2636 JOURNAL OF SOFTWARE, VOL. 8, NO. 10, OCTOBER 2013 Dqun Yan s born n 1979 and receved hs.s. degree n crcut and system, n 2008, and hs Ph.D. n communcaton and nformaton system, n 2012, both from the College of Informaton Scence and Engneerng at the Nngbo Unversty n Chna. Hs research nterests nclude audo processng and multmeda securty.
Performance Analysis of Data Hiding in MPEG-4 AAC Audio *
TSINGHUA SCIENCE AND TECHNOLOGY ISSNll1007-0214ll07/21llpp55-61 Volume 14, Number 1, February 2009 Performance Analyss of Data Hdng n MPEG-4 AAC Audo * XU Shuzheng ( ) **, ZHANG Peng ( ), WANG Pengjun
More informationShape-adaptive DCT and Its Application in Region-based Image Coding
Internatonal Journal of Sgnal Processng, Image Processng and Pattern Recognton, pp.99-108 http://dx.do.org/10.14257/sp.2014.7.1.10 Shape-adaptve DCT and Its Applcaton n Regon-based Image Codng Yamn Zheng,
More informationImprovement of Spatial Resolution Using BlockMatching Based Motion Estimation and Frame. Integration
Improvement of Spatal Resoluton Usng BlockMatchng Based Moton Estmaton and Frame Integraton Danya Suga and Takayuk Hamamoto Graduate School of Engneerng, Tokyo Unversty of Scence, 6-3-1, Nuku, Katsuska-ku,
More informationAn Image Fusion Approach Based on Segmentation Region
Rong Wang, L-Qun Gao, Shu Yang, Yu-Hua Cha, and Yan-Chun Lu An Image Fuson Approach Based On Segmentaton Regon An Image Fuson Approach Based on Segmentaton Regon Rong Wang, L-Qun Gao, Shu Yang 3, Yu-Hua
More informationContent Based Image Retrieval Using 2-D Discrete Wavelet with Texture Feature with Different Classifiers
IOSR Journal of Electroncs and Communcaton Engneerng (IOSR-JECE) e-issn: 78-834,p- ISSN: 78-8735.Volume 9, Issue, Ver. IV (Mar - Apr. 04), PP 0-07 Content Based Image Retreval Usng -D Dscrete Wavelet wth
More informationA Secured Method for Image Steganography Based On Pixel Values
A Secured Method for Image Steganography Based On Pxel Values Tarun Gulat #, Sanskrt Gupta * # Assocate Professor, Electroncs and Communcaton Engneerng Department, MMEC, M.M.U., Mullana, Ambala, Haryana,
More informationA Fast Content-Based Multimedia Retrieval Technique Using Compressed Data
A Fast Content-Based Multmeda Retreval Technque Usng Compressed Data Borko Furht and Pornvt Saksobhavvat NSF Multmeda Laboratory Florda Atlantc Unversty, Boca Raton, Florda 3343 ABSTRACT In ths paper,
More informationCluster Analysis of Electrical Behavior
Journal of Computer and Communcatons, 205, 3, 88-93 Publshed Onlne May 205 n ScRes. http://www.scrp.org/ournal/cc http://dx.do.org/0.4236/cc.205.350 Cluster Analyss of Electrcal Behavor Ln Lu Ln Lu, School
More informationKey-Selective Patchwork Method for Audio Watermarking
Internatonal Journal of Dgtal Content Technology and ts Applcatons Volume 4, Number 4, July 2010 Key-Selectve Patchwork Method for Audo Watermarkng 1 Ch-Man Pun, 2 Jng-Jng Jang 1, Frst and Correspondng
More informationA Binarization Algorithm specialized on Document Images and Photos
A Bnarzaton Algorthm specalzed on Document mages and Photos Ergna Kavalleratou Dept. of nformaton and Communcaton Systems Engneerng Unversty of the Aegean kavalleratou@aegean.gr Abstract n ths paper, a
More informationEnhanced AMBTC for Image Compression using Block Classification and Interpolation
Internatonal Journal of Computer Applcatons (0975 8887) Volume 5 No.0, August 0 Enhanced AMBTC for Image Compresson usng Block Classfcaton and Interpolaton S. Vmala Dept. of Comp. Scence Mother Teresa
More informationAn Image Compression Algorithm based on Wavelet Transform and LZW
An Image Compresson Algorthm based on Wavelet Transform and LZW Png Luo a, Janyong Yu b School of Chongqng Unversty of Posts and Telecommuncatons, Chongqng, 400065, Chna Abstract a cylpng@63.com, b y27769864@sna.cn
More informationQuantization Noise Power Injection In Subband Audio Coding Using Low Selectivity Filter Banks
Quantzaton Nose Power Injecton In Subband Audo Codng Usng Low Selectvty Flter Banks D. ARTÍNEZ -UÑOZ, N. RUIZ-REYES, P. VERA-CANDEAS, P.J. RECHE-LÓPEZ, J. CURPIÁN-ALONSO Departamento de Electrónca Unversdad
More informationHybrid Non-Blind Color Image Watermarking
Hybrd Non-Blnd Color Image Watermarkng Ms C.N.Sujatha 1, Dr. P. Satyanarayana 2 1 Assocate Professor, Dept. of ECE, SNIST, Yamnampet, Ghatkesar Hyderabad-501301, Telangana 2 Professor, Dept. of ECE, AITS,
More informationDistortion Function Designing for JPEG Steganography with Uncompressed Side-image
Dstorton Functon Desgnng for JPEG Steganography wth Uncompressed Sde-mage Fangjun Huang School of Informaton Scence and Technology, Sun Yat-Sen Unversty, GD 56, Chna huangfj@mal.sysu.edu.cn Jwu Huang School
More informationTN348: Openlab Module - Colocalization
TN348: Openlab Module - Colocalzaton Topc The Colocalzaton module provdes the faclty to vsualze and quantfy colocalzaton between pars of mages. The Colocalzaton wndow contans a prevew of the two mages
More informationEnhanced Watermarking Technique for Color Images using Visual Cryptography
Informaton Assurance and Securty Letters 1 (2010) 024-028 Enhanced Watermarkng Technque for Color Images usng Vsual Cryptography Enas F. Al rawashdeh 1, Rawan I.Zaghloul 2 1 Balqa Appled Unversty, MIS
More informationParallelism for Nested Loops with Non-uniform and Flow Dependences
Parallelsm for Nested Loops wth Non-unform and Flow Dependences Sam-Jn Jeong Dept. of Informaton & Communcaton Engneerng, Cheonan Unversty, 5, Anseo-dong, Cheonan, Chungnam, 330-80, Korea. seong@cheonan.ac.kr
More informationResearch Article High Capacity Reversible Watermarking for Audio by Histogram Shifting and Predicted Error Expansion
e Scentfc World Journal, Artcle ID 656251, 7 pages http://dx.do.org/1.1155/214/656251 Research Artcle Hgh Capacty Reversble Watermarkng for Audo by Hstogram Shftng and Predcted Error Expanson Fe Wang,
More informationRelated-Mode Attacks on CTR Encryption Mode
Internatonal Journal of Network Securty, Vol.4, No.3, PP.282 287, May 2007 282 Related-Mode Attacks on CTR Encrypton Mode Dayn Wang, Dongda Ln, and Wenlng Wu (Correspondng author: Dayn Wang) Key Laboratory
More informationLearning the Kernel Parameters in Kernel Minimum Distance Classifier
Learnng the Kernel Parameters n Kernel Mnmum Dstance Classfer Daoqang Zhang 1,, Songcan Chen and Zh-Hua Zhou 1* 1 Natonal Laboratory for Novel Software Technology Nanjng Unversty, Nanjng 193, Chna Department
More informationRobust Blind Video Watermark Algorithm in Transform Domain Combining with 3D Video Correlation
JOURNAL OF MULTIMEDIA, VOL. 8, NO. 2, APRIL 2013 161 Robust Blnd Vdeo Watermark Algorthm n Transform Doman Combnng wth 3D Vdeo Correlaton DING Ha-yang 1,3 1. Informaton Securty Center, Bejng Unversty of
More informationA Robust Webpage Information Hiding Method Based on the Slash of Tag
Advanced Engneerng Forum Onlne: 2012-09-26 ISSN: 2234-991X, Vols. 6-7, pp 361-366 do:10.4028/www.scentfc.net/aef.6-7.361 2012 Trans Tech Publcatons, Swtzerland A Robust Webpage Informaton Hdng Method Based
More informationTECHNICAL POINTS ABOUT ADAPTIVE STEGANOGRAPHY BY ORACLE (ASO) 161, rue Ada, 34095, Montpellier Cedex 05, France
20th European Sgnal Processng Conference (EUSIPCO 2012) Bucharest, Romana, August 27-31, 2012 TECHNICAL POINTS ABOUT ADAPTIVE STEGANOGRAPHY BY ORACLE (ASO) Sarra Kouder 2, Marc Chaumont 1,2, Wllam Puech
More informationA Fast Visual Tracking Algorithm Based on Circle Pixels Matching
A Fast Vsual Trackng Algorthm Based on Crcle Pxels Matchng Zhqang Hou hou_zhq@sohu.com Chongzhao Han czhan@mal.xjtu.edu.cn Ln Zheng Abstract: A fast vsual trackng algorthm based on crcle pxels matchng
More informationArticle Reversible Dual-Image-Based Hiding Scheme Using Block Folding Technique
Artcle Reversble Dual-Image-Based Hdng Scheme Usng Block Foldng Technque Tzu-Chuen Lu, * and Hu-Shh Leng Department of Informaton Management, Chaoyang Unversty of Technology, Tachung 4349, Tawan Department
More informationLoad Balancing for Hex-Cell Interconnection Network
Int. J. Communcatons, Network and System Scences,,, - Publshed Onlne Aprl n ScRes. http://www.scrp.org/journal/jcns http://dx.do.org/./jcns.. Load Balancng for Hex-Cell Interconnecton Network Saher Manaseer,
More informationHigh Payload Reversible Data Hiding Scheme Using Difference Segmentation and Histogram Shifting
JOURNAL OF ELECTRONIC SCIENCE AND TECHNOLOGY, VOL. 11, NO. 1, MARCH 2013 9 Hgh Payload Reversble Data Hdng Scheme Usng Dfference Segmentaton and Hstogram Shftng Yung-Chen Chou and Huang-Chng L Abstract
More informationA Novel Adaptive Descriptor Algorithm for Ternary Pattern Textures
A Novel Adaptve Descrptor Algorthm for Ternary Pattern Textures Fahuan Hu 1,2, Guopng Lu 1 *, Zengwen Dong 1 1.School of Mechancal & Electrcal Engneerng, Nanchang Unversty, Nanchang, 330031, Chna; 2. School
More informationData Mining: Model Evaluation
Data Mnng: Model Evaluaton Aprl 16, 2013 1 Issues: Evaluatng Classfcaton Methods Accurac classfer accurac: predctng class label predctor accurac: guessng value of predcted attrbutes Speed tme to construct
More informationIdentify the Attack in Embedded Image with Steganalysis Detection Method by PSNR and RGB Intensity
Internatonal Journal of Computer Systems (ISSN: 394-1065), Volume 03 Issue 07, July, 016 Avalable at http://www.jcsonlne.com/ Identfy the Attack n Embedded Image wth Steganalyss Detecton Method by PSNR
More informationSLAM Summer School 2006 Practical 2: SLAM using Monocular Vision
SLAM Summer School 2006 Practcal 2: SLAM usng Monocular Vson Javer Cvera, Unversty of Zaragoza Andrew J. Davson, Imperal College London J.M.M Montel, Unversty of Zaragoza. josemar@unzar.es, jcvera@unzar.es,
More informationSemi-Fragile Watermarking Scheme for Authentication of JPEG Images
Tamkang Journal of Scence and Engneerng, Vol. 10, No 1, pp. 5766 (2007) 57 Sem-Fragle Watermarkng Scheme for Authentcaton of JPEG Images Chh-Hung n 1 *, Tung-Shh Su 2 and Wen-Shyong Hseh 2,3 1 Department
More informationClassifier Selection Based on Data Complexity Measures *
Classfer Selecton Based on Data Complexty Measures * Edth Hernández-Reyes, J.A. Carrasco-Ochoa, and J.Fco. Martínez-Trndad Natonal Insttute for Astrophyscs, Optcs and Electroncs, Lus Enrque Erro No.1 Sta.
More informationStatistical Steganalyis of Images Using Open Source Software
Statstcal Steganalys of Images Usng Open Source Software Bhargav Kapa, Stefan A. Robla Department of Computer Scence Montclar State Unversty Montclar, NJ 07043 roblas@mal.montclar.edu Abstract In ths paper
More informationReducing Frame Rate for Object Tracking
Reducng Frame Rate for Object Trackng Pavel Korshunov 1 and We Tsang Oo 2 1 Natonal Unversty of Sngapore, Sngapore 11977, pavelkor@comp.nus.edu.sg 2 Natonal Unversty of Sngapore, Sngapore 11977, oowt@comp.nus.edu.sg
More informationA Clustering Algorithm for Key Frame Extraction Based on Density Peak
Journal of Computer and Communcatons, 2018, 6, 118-128 http://www.scrp.org/ournal/cc ISSN Onlne: 2327-5227 ISSN Prnt: 2327-5219 A Clusterng Algorthm for Key Frame Extracton Based on Densty Peak Hong Zhao
More informationA NEW AUDIO WATERMARKING METHOD BASED
A NEW AUDIO WATERMARKING METHOD BASED ON DISCRETE COSINE TRANSFORM WITH A GRAY IMAGE Mohammad Ibrahm Khan 1, Md. Iqbal Hasan Sarker 2, Kaushk Deb 3 and Md. Hasan Furhad 4 1,2,3 Department of Computer Scence
More informationPrivate Information Retrieval (PIR)
2 Levente Buttyán Problem formulaton Alce wants to obtan nformaton from a database, but she does not want the database to learn whch nformaton she wanted e.g., Alce s an nvestor queryng a stock-market
More informationFEATURE EXTRACTION. Dr. K.Vijayarekha. Associate Dean School of Electrical and Electronics Engineering SASTRA University, Thanjavur
FEATURE EXTRACTION Dr. K.Vjayarekha Assocate Dean School of Electrcal and Electroncs Engneerng SASTRA Unversty, Thanjavur613 41 Jont Intatve of IITs and IISc Funded by MHRD Page 1 of 8 Table of Contents
More informationSteganography System using Slantlet Transform
ISSN:43-6999 Journal of Inmaton Communcaton and Intellgence Systems (JICIS) Volume Issue February 06 Steganography System usng Slantlet Transm Ryadh Bassl Abduljabbar Abstract An approach hdng nmaton has
More informationAn Optimal Algorithm for Prufer Codes *
J. Software Engneerng & Applcatons, 2009, 2: 111-115 do:10.4236/jsea.2009.22016 Publshed Onlne July 2009 (www.scrp.org/journal/jsea) An Optmal Algorthm for Prufer Codes * Xaodong Wang 1, 2, Le Wang 3,
More informationClassification Based Mode Decisions for Video over Networks
Classfcaton Based Mode Decsons for Vdeo over Networks Deepak S. Turaga and Tsuhan Chen Advanced Multmeda Processng Lab Tranng data for Inter-Intra Decson Inter-Intra Decson Regons pdf 6 5 6 5 Energy 4
More informationCoding Artifact Reduction Using Edge Map Guided Adaptive and Fuzzy Filter
MEL A MITSUBISHI ELECTIC ESEACH LABOATOY http://www.merl.com Codng Artfact educton Usng Edge Map Guded Adaptve and Fuzzy Flter Hao-Song Kong Yao Ne Anthony Vetro Hufang Sun Kenneth E. Barner T-2004-056
More informationGrading Image Retrieval Based on DCT and DWT Compressed Domains Using Low-Level Features
Journal of Communcatons Vol. 0 No. January 0 Gradng Image Retreval Based on DCT and DWT Compressed Domans Usng Low-Level Features Chengyou Wang Xnyue Zhang Rongyang Shan and Xao Zhou School of echancal
More informationTECHNIQUE OF FORMATION HOMOGENEOUS SAMPLE SAME OBJECTS. Muradaliyev A.Z.
TECHNIQUE OF FORMATION HOMOGENEOUS SAMPLE SAME OBJECTS Muradalyev AZ Azerbajan Scentfc-Research and Desgn-Prospectng Insttute of Energetc AZ1012, Ave HZardab-94 E-mal:aydn_murad@yahoocom Importance of
More informationThe Shortest Path of Touring Lines given in the Plane
Send Orders for Reprnts to reprnts@benthamscence.ae 262 The Open Cybernetcs & Systemcs Journal, 2015, 9, 262-267 The Shortest Path of Tourng Lnes gven n the Plane Open Access Ljuan Wang 1,2, Dandan He
More informationThe Research of Ellipse Parameter Fitting Algorithm of Ultrasonic Imaging Logging in the Casing Hole
Appled Mathematcs, 04, 5, 37-3 Publshed Onlne May 04 n ScRes. http://www.scrp.org/journal/am http://dx.do.org/0.436/am.04.584 The Research of Ellpse Parameter Fttng Algorthm of Ultrasonc Imagng Loggng
More informationDeep learning is a good steganalysis tool when embedding key is reused for different images, even if there is a cover source-mismatch
Deep learnng s a good steganalyss tool when embeddng key s reused for dfferent mages, even f there s a cover source-msmatch Lonel PIBRE 2,3, Jérôme PASQUET 2,3, Dno IENCO 2,3, Marc CHAUMONT 1,2,3 (1) Unversty
More informationA MOVING MESH APPROACH FOR SIMULATION BUDGET ALLOCATION ON CONTINUOUS DOMAINS
Proceedngs of the Wnter Smulaton Conference M E Kuhl, N M Steger, F B Armstrong, and J A Jones, eds A MOVING MESH APPROACH FOR SIMULATION BUDGET ALLOCATION ON CONTINUOUS DOMAINS Mark W Brantley Chun-Hung
More informationResearch of Multiple Text Watermarks Technique in Electric Power System Texts
Sensors & Transducers 203 by IFSA http://www.sensorsportal.com Research of Multple Text atermarks Technque n Electrc Power System Texts Xao-X XING, Qng CHEN, 2 Lan-X FU School of Optcal-Electrcal and Computer
More informationRemote Sensing Image Retrieval Algorithm based on MapReduce and Characteristic Information
Remote Sensng Image Retreval Algorthm based on MapReduce and Characterstc Informaton Zhang Meng 1, 1 Computer School, Wuhan Unversty Hube, Wuhan430097 Informaton Center, Wuhan Unversty Hube, Wuhan430097
More informationAn Entropy-Based Approach to Integrated Information Needs Assessment
Dstrbuton Statement A: Approved for publc release; dstrbuton s unlmted. An Entropy-Based Approach to ntegrated nformaton Needs Assessment June 8, 2004 Wllam J. Farrell Lockheed Martn Advanced Technology
More informationHigh-Boost Mesh Filtering for 3-D Shape Enhancement
Hgh-Boost Mesh Flterng for 3-D Shape Enhancement Hrokazu Yagou Λ Alexander Belyaev y Damng We z Λ y z ; ; Shape Modelng Laboratory, Unversty of Azu, Azu-Wakamatsu 965-8580 Japan y Computer Graphcs Group,
More informationResearch and Application of Fingerprint Recognition Based on MATLAB
Send Orders for Reprnts to reprnts@benthamscence.ae The Open Automaton and Control Systems Journal, 205, 7, 07-07 Open Access Research and Applcaton of Fngerprnt Recognton Based on MATLAB Nng Lu* Department
More informationPositive Semi-definite Programming Localization in Wireless Sensor Networks
Postve Sem-defnte Programmng Localzaton n Wreless Sensor etworks Shengdong Xe 1,, Jn Wang, Aqun Hu 1, Yunl Gu, Jang Xu, 1 School of Informaton Scence and Engneerng, Southeast Unversty, 10096, anjng Computer
More informationFast Feature Value Searching for Face Detection
Vol., No. 2 Computer and Informaton Scence Fast Feature Value Searchng for Face Detecton Yunyang Yan Department of Computer Engneerng Huayn Insttute of Technology Hua an 22300, Chna E-mal: areyyyke@63.com
More informationCompiler Design. Spring Register Allocation. Sample Exercises and Solutions. Prof. Pedro C. Diniz
Compler Desgn Sprng 2014 Regster Allocaton Sample Exercses and Solutons Prof. Pedro C. Dnz USC / Informaton Scences Insttute 4676 Admralty Way, Sute 1001 Marna del Rey, Calforna 90292 pedro@s.edu Regster
More informationAn Improved Image Segmentation Algorithm Based on the Otsu Method
3th ACIS Internatonal Conference on Software Engneerng, Artfcal Intellgence, Networkng arallel/dstrbuted Computng An Improved Image Segmentaton Algorthm Based on the Otsu Method Mengxng Huang, enjao Yu,
More informationA DCVS Reconstruction Algorithm for Mine Video Monitoring Image Based on Block Classification
1 3 4 5 6 7 8 9 10 11 1 13 14 15 16 17 18 19 0 1 Artcle A DCVS Reconstructon Algorthm for Mne Vdeo Montorng Image Based on Block Classfcaton Xaohu Zhao 1,, Xueru Shen 1,, *, Kuan Wang 1, and Wanme L 1,
More informationTerm Weighting Classification System Using the Chi-square Statistic for the Classification Subtask at NTCIR-6 Patent Retrieval Task
Proceedngs of NTCIR-6 Workshop Meetng, May 15-18, 2007, Tokyo, Japan Term Weghtng Classfcaton System Usng the Ch-square Statstc for the Classfcaton Subtask at NTCIR-6 Patent Retreval Task Kotaro Hashmoto
More informationSimulation Based Analysis of FAST TCP using OMNET++
Smulaton Based Analyss of FAST TCP usng OMNET++ Umar ul Hassan 04030038@lums.edu.pk Md Term Report CS678 Topcs n Internet Research Sprng, 2006 Introducton Internet traffc s doublng roughly every 3 months
More informationEdge Detection in Noisy Images Using the Support Vector Machines
Edge Detecton n Nosy Images Usng the Support Vector Machnes Hlaro Gómez-Moreno, Saturnno Maldonado-Bascón, Francsco López-Ferreras Sgnal Theory and Communcatons Department. Unversty of Alcalá Crta. Madrd-Barcelona
More informationTsinghua University at TAC 2009: Summarizing Multi-documents by Information Distance
Tsnghua Unversty at TAC 2009: Summarzng Mult-documents by Informaton Dstance Chong Long, Mnle Huang, Xaoyan Zhu State Key Laboratory of Intellgent Technology and Systems, Tsnghua Natonal Laboratory for
More informationEFFICIENT LOW DELAY FILTERING FOR RESIDUAL ECHO SUPPRESSION
EFFICIENT LOW DELAY FILTERING FOR RESIDUAL ECHO SUPPRESSION Chrstelle Yemdj, Moctar Moss Idrssa and Ncholas W. D. Evans EURECOM Insttute 656 Sopha-Antpols, France {yemdj, moss, evans}@eurecom.fr web: www.eurecom.fr
More informationFast Computation of Shortest Path for Visiting Segments in the Plane
Send Orders for Reprnts to reprnts@benthamscence.ae 4 The Open Cybernetcs & Systemcs Journal, 04, 8, 4-9 Open Access Fast Computaton of Shortest Path for Vstng Segments n the Plane Ljuan Wang,, Bo Jang
More informationHigh resolution 3D Tau-p transform by matching pursuit Weiping Cao* and Warren S. Ross, Shearwater GeoServices
Hgh resoluton 3D Tau-p transform by matchng pursut Wepng Cao* and Warren S. Ross, Shearwater GeoServces Summary The 3D Tau-p transform s of vtal sgnfcance for processng sesmc data acqured wth modern wde
More informationA Deflected Grid-based Algorithm for Clustering Analysis
A Deflected Grd-based Algorthm for Clusterng Analyss NANCY P. LIN, CHUNG-I CHANG, HAO-EN CHUEH, HUNG-JEN CHEN, WEI-HUA HAO Department of Computer Scence and Informaton Engneerng Tamkang Unversty 5 Yng-chuan
More informationThe Research of Support Vector Machine in Agricultural Data Classification
The Research of Support Vector Machne n Agrcultural Data Classfcaton Le Sh, Qguo Duan, Xnmng Ma, Me Weng College of Informaton and Management Scence, HeNan Agrcultural Unversty, Zhengzhou 45000 Chna Zhengzhou
More informationFeature Reduction and Selection
Feature Reducton and Selecton Dr. Shuang LIANG School of Software Engneerng TongJ Unversty Fall, 2012 Today s Topcs Introducton Problems of Dmensonalty Feature Reducton Statstc methods Prncpal Components
More informationVirtual Memory. Background. No. 10. Virtual Memory: concept. Logical Memory Space (review) Demand Paging(1) Virtual Memory
Background EECS. Operatng System Fundamentals No. Vrtual Memory Prof. Hu Jang Department of Electrcal Engneerng and Computer Scence, York Unversty Memory-management methods normally requres the entre process
More informationDetection of an Object by using Principal Component Analysis
Detecton of an Object by usng Prncpal Component Analyss 1. G. Nagaven, 2. Dr. T. Sreenvasulu Reddy 1. M.Tech, Department of EEE, SVUCE, Trupath, Inda. 2. Assoc. Professor, Department of ECE, SVUCE, Trupath,
More informationFuzzy Filtering Algorithms for Image Processing: Performance Evaluation of Various Approaches
Proceedngs of the Internatonal Conference on Cognton and Recognton Fuzzy Flterng Algorthms for Image Processng: Performance Evaluaton of Varous Approaches Rajoo Pandey and Umesh Ghanekar Department of
More informationData Hiding and Image Authentication for Color-Palette Images
Data Hdng and Image Authentcaton for Color-Palette Images Chh-Yang Yn ( 殷志揚 ) and Wen-Hsang Tsa ( 蔡文祥 ) Department of Computer & Informaton Scence Natonal Chao Tung Unversty 00 Ta Hsueh Rd., Hsnchu, Tawan
More informationProblem Definitions and Evaluation Criteria for Computational Expensive Optimization
Problem efntons and Evaluaton Crtera for Computatonal Expensve Optmzaton B. Lu 1, Q. Chen and Q. Zhang 3, J. J. Lang 4, P. N. Suganthan, B. Y. Qu 6 1 epartment of Computng, Glyndwr Unversty, UK Faclty
More informationDynamic wetting property investigation of AFM tips in micro/nanoscale
Dynamc wettng property nvestgaton of AFM tps n mcro/nanoscale The wettng propertes of AFM probe tps are of concern n AFM tp related force measurement, fabrcaton, and manpulaton technques, such as dp-pen
More informationInformation Hiding Watermarking Detection Technique by PSNR and RGB Intensity
www..org 3 Informaton Hdng Watermarkng Detecton Technque by PSNR and RGB Intensty 1 Neha Chauhan, Akhlesh A. Waoo, 3 P. S. Patheja 1 Research Scholar, BIST, Bhopal, Inda.,3 Assstant Professor, BIST, Bhopal,
More informationA Modified Median Filter for the Removal of Impulse Noise Based on the Support Vector Machines
A Modfed Medan Flter for the Removal of Impulse Nose Based on the Support Vector Machnes H. GOMEZ-MORENO, S. MALDONADO-BASCON, F. LOPEZ-FERRERAS, M. UTRILLA- MANSO AND P. GIL-JIMENEZ Departamento de Teoría
More informationWishing you all a Total Quality New Year!
Total Qualty Management and Sx Sgma Post Graduate Program 214-15 Sesson 4 Vnay Kumar Kalakband Assstant Professor Operatons & Systems Area 1 Wshng you all a Total Qualty New Year! Hope you acheve Sx sgma
More informationImplementation of IMDCT Block of an MP3 Decoder through Optimization on the DCT Matrix
22 M. GALABOV, IMPLEMENTATION OF IMDCT BLOCK OF AN MP DECODER THROUGH OPTIMIZATION... Implementaton of IMDCT Block of an MP Decoder through Optmzaton on the DCT Matr Mroslav GALABOV Dept. of Computer Systems
More informationLecture 5: Multilayer Perceptrons
Lecture 5: Multlayer Perceptrons Roger Grosse 1 Introducton So far, we ve only talked about lnear models: lnear regresson and lnear bnary classfers. We noted that there are functons that can t be represented
More informationUsing Fuzzy Logic to Enhance the Large Size Remote Sensing Images
Internatonal Journal of Informaton and Electroncs Engneerng Vol. 5 No. 6 November 015 Usng Fuzzy Logc to Enhance the Large Sze Remote Sensng Images Trung Nguyen Tu Huy Ngo Hoang and Thoa Vu Van Abstract
More informationWavelet-Based Image Compression System with Linear Distortion Control
Je-Hung Lu, Kng-Chu Hung Wavelet-Based Image Compresson System wth Lnear Dstorton Control Je-Hung Lu, Kng-Chu Hung Insttute of Engneerng Scence and Technology Natonal Kaohsung Frst Unversty of Scence and
More information[33]. As we have seen there are different algorithms for compressing the speech. The
49 5. LD-CELP SPEECH CODER 5.1 INTRODUCTION Speech compresson s one of the mportant doman n dgtal communcaton [33]. As we have seen there are dfferent algorthms for compressng the speech. The mportant
More informationA Fusion Steganographic Algorithm Based on Faster R-CNN
Copyrght 2018 Tech Scence Press CMC, vol.55, no.1, pp.1-16, 2018 A Fuson Steganographc Algorthm Based on Faster R-CNN Ruohan Meng 1, 2, Steven G. Rce 3, Jn Wang 4 1, 2, * and Xngmng Sun Abstract: The am
More informationOptimizing Document Scoring for Query Retrieval
Optmzng Document Scorng for Query Retreval Brent Ellwen baellwe@cs.stanford.edu Abstract The goal of ths project was to automate the process of tunng a document query engne. Specfcally, I used machne learnng
More informationLocal Quaternary Patterns and Feature Local Quaternary Patterns
Local Quaternary Patterns and Feature Local Quaternary Patterns Jayu Gu and Chengjun Lu The Department of Computer Scence, New Jersey Insttute of Technology, Newark, NJ 0102, USA Abstract - Ths paper presents
More informationA Lossless Watermarking Scheme for Halftone Image Authentication
IJCSNS Internatonal Journal of Computer Scence and Network Securty, VOL.6 No.2B, February 2006 147 A Lossless Watermarkng Scheme for Halftone Image Authentcaton Jeng-Shyang Pan, Hao Luo, and Zhe-Mng Lu,
More informationSteganography is the art and science of hiding
Hde and Seek: An Introducton to Steganography Although people have hdden secrets n plan sght now called steganography throughout the ages the recent growth n computatonal power and technology has propelled
More informationSynthesizer 1.0. User s Guide. A Varying Coefficient Meta. nalytic Tool. Z. Krizan Employing Microsoft Excel 2007
Syntheszer 1.0 A Varyng Coeffcent Meta Meta-Analytc nalytc Tool Employng Mcrosoft Excel 007.38.17.5 User s Gude Z. Krzan 009 Table of Contents 1. Introducton and Acknowledgments 3. Operatonal Functons
More informationVirtual Machine Migration based on Trust Measurement of Computer Node
Appled Mechancs and Materals Onlne: 2014-04-04 ISSN: 1662-7482, Vols. 536-537, pp 678-682 do:10.4028/www.scentfc.net/amm.536-537.678 2014 Trans Tech Publcatons, Swtzerland Vrtual Machne Mgraton based on
More informationVideo Proxy System for a Large-scale VOD System (DINA)
Vdeo Proxy System for a Large-scale VOD System (DINA) KWUN-CHUNG CHAN #, KWOK-WAI CHEUNG *# #Department of Informaton Engneerng *Centre of Innovaton and Technology The Chnese Unversty of Hong Kong SHATIN,
More informationRobust Watermarking for Text Images Based on Arnold Scrambling and DWT-DCT
Internatonal Conference on Mechatroncs Electronc Industral and Control Engneerng (MEIC 015) Robust Watermarkng for Text Images Based on Arnold Scramblng and DWT-DCT Fan Wu College of Informaton Scence
More informationSubspace clustering. Clustering. Fundamental to all clustering techniques is the choice of distance measure between data points;
Subspace clusterng Clusterng Fundamental to all clusterng technques s the choce of dstance measure between data ponts; D q ( ) ( ) 2 x x = x x, j k = 1 k jk Squared Eucldean dstance Assumpton: All features
More informationCMPS 10 Introduction to Computer Science Lecture Notes
CPS 0 Introducton to Computer Scence Lecture Notes Chapter : Algorthm Desgn How should we present algorthms? Natural languages lke Englsh, Spansh, or French whch are rch n nterpretaton and meanng are not
More informationR s s f. m y s. SPH3UW Unit 7.3 Spherical Concave Mirrors Page 1 of 12. Notes
SPH3UW Unt 7.3 Sphercal Concave Mrrors Page 1 of 1 Notes Physcs Tool box Concave Mrror If the reflectng surface takes place on the nner surface of the sphercal shape so that the centre of the mrror bulges
More informationUsing Counter-propagation Neural Network for Digital Audio Watermarking
Usng Counter-propagaton Neural Network for Dgtal Audo Watermarkng Chuan-Yu Chang and Wen-Chh Shen Graduate School of Computer Scence and Informaton Engneerng Natonal Yunln Unversty of Scence & Technology
More informationVRT012 User s guide V0.1. Address: Žirmūnų g. 27, Vilnius LT-09105, Phone: (370-5) , Fax: (370-5) ,
VRT012 User s gude V0.1 Thank you for purchasng our product. We hope ths user-frendly devce wll be helpful n realsng your deas and brngng comfort to your lfe. Please take few mnutes to read ths manual
More informationy and the total sum of
Lnear regresson Testng for non-lnearty In analytcal chemstry, lnear regresson s commonly used n the constructon of calbraton functons requred for analytcal technques such as gas chromatography, atomc absorpton
More informationProper Choice of Data Used for the Estimation of Datum Transformation Parameters
Proper Choce of Data Used for the Estmaton of Datum Transformaton Parameters Hakan S. KUTOGLU, Turkey Key words: Coordnate systems; transformaton; estmaton, relablty. SUMMARY Advances n technologes and
More information