Research Article High Capacity Reversible Watermarking for Audio by Histogram Shifting and Predicted Error Expansion

Size: px
Start display at page:

Download "Research Article High Capacity Reversible Watermarking for Audio by Histogram Shifting and Predicted Error Expansion"

Transcription

1 e Scentfc World Journal, Artcle ID , 7 pages Research Artcle Hgh Capacty Reversble Watermarkng for Audo by Hstogram Shftng and Predcted Error Expanson Fe Wang, 1 Zhaoxn Xe, 2,3 and Zuo Chen 1 1 School of Informaton Scence and Engneerng, Hunan Unversty, Lushan South Rood, Changsha 4182, Chna 2 College of Computer Scence and Technology, Zhejang Unversty, Hangzhou 3127, Chna 3 Chu Kochen Honors College, Zhejang Unversty, Hangzhou 3158, Chna Correspondence should be addressed to Zhaoxn Xe; xzxverson@126.com Receved 6 March 214; Accepted 22 Aprl 214; Publshed 14 May 214 Academc Edtor: Fe Yu Copyrght 214 Fe Wang et al. Ths s an open access artcle dstrbuted under the Creatve Commons Attrbuton Lcense, whch permts unrestrcted use, dstrbuton, and reproducton n any medum, provded the orgnal work s properly cted. Beng reversble, the watermarkng nformaton embedded n audo sgnals can be extracted whle the orgnal audo data can acheve lossless recovery. Currently, the few reversble audo watermarkng algorthms are confronted wth followng problems: relatvely low SNR (sgnal-to-nose) of embedded audo; a large amount of auxlary embedded locaton nformaton; and the absence of accurate capacty control capablty. In ths paper, we present a novel reversble audo watermarkng scheme based on mproved predcton error expanson and hstogram shftng. Frst, we use dfferental evoluton algorthm to optmze predcton coeffcents and then apply predcton error expanson to output stego data. Second, n order to reduce locaton map bts length, we ntroduced hstogram shftng scheme. Meanwhle, the predcton error modfcaton threshold accordng to a gven embeddng capacty can be computed by our proposed scheme. Experments show that ths algorthm mproves the SNR of embedded audo sgnals and embeddng capacty, drastcally reduces locaton map bts length, and enhances capacty control capablty. 1. Introducton Reversble watermarkng s a technque that means after watermark nformaton was embedded nto the host data, orgnal data can be restored whle watermark nformaton s extracted through a seres of processes. Because the reversble watermarkng schemes can acheve lossless recovery, they can be wdely used n mltary communcaton, medcal mage, and dgtal forenscs felds [1 3]. At present, the reversble watermarkng technology research manly concentrates on mage [4 6]. Tan [7] proposed an mage reversble watermarkng algorthm usng dfference expanson technque. Ths algorthm frst appled an nteger wavelet transform on two adjacent pxels n the mage and then embedded the watermark data n host pxel by expandng the dfference of adjacent pxel. Fnally, the algorthm restored pxel data through the nverse nteger transform. In [8], a reversble watermarkng algorthm was presented usng predcton error expanson. Frst, the algorthm predcted a pxel value accordng to three pxels adjacent to the current pxel and then extended the dfference between predcton and current value to acheve watermark nformaton embeddng. The algorthm has hgher embeddng capacty capablty and better qualty of embedded mage than Tan s scheme. Dgtal speech s one of the mportant forms of dgtal meda, but reversble watermarkng algorthm for dgtal audo s relatvely less. Reversble audo watermarkng schemes manly face the followng problems: (1) audo n WAV format s a floatng number ranged from 1 to 1. In order to transform these data, we must map the data to nteger space; (2) human audo system s more senstve than the human vsual system,soevenslghtalteratonofaudosgnalcaneaslybe perceved; (3) the process of audo sgnal s much trcker than dgtal mage [9]. In [1], Yan and Wang proposed a reversble audo watermarkng scheme based on predcton error expanson method. Frst, three prevous samples of the audo sample were multpled by nteger coeffcents ndvdually and then the sum of three results was used to

2 2 The Scentfc World Journal predct the current sample. Second, watermarkng nformaton was embedded by expandng the dfference between the predcton and current ampltude. Ths algorthm mapped the audo data to nteger nterval and acheved recovery of orgnal audo sgnals. In the algorthm, a locaton map was used to mark the samples wthout watermark bts. However, the method suffers from lack of embeddng capacty due to large auxlary embedded locaton nformaton. In [11], a reversble audo data hdng algorthm based on lnear predcton and error expanson was present by A. Nshmura. Relatve to [1], ths paper mproved the predcton coeffcents usng Burg method and obtaned a hgher SNR and embeddng capacty. However, ts capacty has the same drawback wth [1] and capacty control capablty was not consdered. Dfferental evoluton (DE) algorthm s an optmzaton algorthm based on swarm ntellgence. It can smulate the bologcal natural selecton and evoluton. Ths algorthm was frst present by Stron and Prce n 1995 [12]. DE algorthm can solve multparameters optmzaton wthout dependng on the contnuty of objectve functon and the conductvty of the constrants. Meanwhle, ths algorthm has good robustness and unversalty. It s wdely used n many felds [13 16]. The applcaton of hstogram to reversble watermarkng technquefrstappearednmagefeld.netal.[17]proposed a reversble watermarkng algorthm based on hstogram shftng, where watermark s embedded nto the hstogram bns. A novel watermarkng technque has been presented by Thod and Rodrígez n [18], where locaton nformaton s dramatcally compressed by usng hstogram shftng technque. To our best knowledge, however, reversble audo watermarkng based on hstogram technque has not been reported yet. So, we cannot apply the hstogram technque of magefeldtoaudodatadrectly. In ths paper, we proposed a novel reversble audo watermarkng scheme based on mproved predcton error expanson and hstogram shftng whch combned wth the characterstcs of dgtal audo data. Dfferent from usng the fxed set of lnear predcton coeffcents, we propose the optmzaton model of predcton coeffcents and then use the dfferental optmzaton algorthm to determne the optmal lnear predcton coeffcents, so that the overall predcton errors are as small as possble. In addton, accordng to the characterstcs of audo data, we ntroduced hstogram shftng technque whch can dramatcally reduce the embeddng locaton nformaton. Meanwhle, we present the method whch can compute the predcton error modfcaton threshold accordng to a gven embeddng capacty. The experments show that ths algorthm can enhance capacty control capablty. The organzaton of ths paper s as follows. In Secton 2, we propose predcton error expanson based on dfferental evoluton. Secton 3 descrbes how nformaton embeddng and extracton are done by usng hstogram shftng and predcton error expanson. The experment results and analyss are presented n Sectons 4 and 5, respectvely.the conclusons are n Secton Predcton Error Expanson Based on Dfferental Evoluton 2.1. Dfferental Evoluton Algorthm. Dfferental evoluton algorthm has the advantages of hgh effcency, good convergence, and robustness. It can perform well when deal wth multparameter optmzaton problem, especally when the soluton space s stochastc. Dfferental evoluton algorthm can be dvded nto the followng operatons. (1) The mutaton: the mutaton of DE s drven by the dfference between the parent ndvduals; the mutaton of vector u g s as follows: V g+1 =u g r1 +F(ug r2 ug r3 ), r 1 =r 2 =r 3 =, (1) where r 1, r 2, r 3 are unform random ntegers [1, N p ], F [,2]represents the control parameters, and g means the ndex of generaton. (2) Crossover: n the DE algorthm, the crossover operaton guarantees the dversty of populaton. When applyng crossover on mutant vector V g+1 and current ndvdual u g, we can get new vector wg+1,j. The formula of crossover operaton s as follows: w g+1,j ={ Vg+1,j, (rand () C R or j=l ) u g,j, otherwse, (2) where j (1,2,...,D) and D s the dmenson of the problem, rand () means the random values [, 1], andc R represents the probablty of crossover operaton. l [1,2,...D]s a randomly chosen value. (3) Selecton: the selecton operaton of DE algorthm s basedonagreedyselectonscheme.wechoosethe ndvdual whch has better ftness between the vector w g+1 and the ndvdual of orgnal populaton u g.the formula s descrbed as follows: u g+1 ={ wg+1, f(w g+1 ) f(u g ) u g, otherwse, where f( ) represents ftness functon The Optmzaton of Lnear Predcton Coeffcents Based on DE Algorthm. Fgure 1 presents a typcal hstogram of predcton errors for classc musc. The predcton errors hstogram for most natural audo would be smlar to ths. Consder a process of expanson embeddng. The smaller the magntude of the predcton errors, the smaller the dstorton oftheaudo.inthesense,thepredctonerrorsoccurmore frequently n the central regon. Snce embeddng capacty and dstorton performance are most mportant ndcators for reversble audo watermarkng scheme, the optmzaton am s to maxmze SNR of embedded audo and capacty. The formula s presented as follows: (3) L =1 F=1log 1 ( S2 () L =1 [S2 () S 2 ()] ) l L, (4)

3 The Scentfc World Journal Classc Inner regon Outer regon Outer regon 2 Occurrence 15 1 Occurrence Dfference Fgure 1: Hstogram of predcton errors for classc musc. where S 2 () and S 2 () mean orgnal and embedded audo, respectvely, L s the length of the audo data, and l means the number of embedded bts. 3. Predcton Error Expanson Based on Hstogram Shftng 3.1. Hstogram Shftng. In [18], hstogram of predcton error for a host data s dvded nto two nonoverlappng regons, the outer and the nner regons, whch are shown n Fgure 1. Expanson of the predcton errors expands the hstogram of the nner regon. As s shown n Fgure 2, afteraprocessof expanson, the peak of the hstogram has fallen by almost 5%. Because the hstogram of predcton errors for audo does not strctly satsfy the contnuty, the algorthm n [18], n whch the determnaton of embedded locaton was based on symmetrcal hstogram, cannot be appled to audo reversble watermarkng algorthm. In ths paper, we assume two thresholds T l and T r,whchcanbeusedtocontrolthe boundares of the nner regon and outer regon. We frst set T l =, T r = 1. Gven a capacty, we can determne the boundares of nner regon and outer regon accordng to the Algorthm 1. Where D means all the predcton errors, functon num ( ) returns the ndex of the gven value. In the process of determnng the thresholds, we consdered the cumulatve mpact by all expansve bns rather than only the current expansve bn Embeddng and Extracton. All steps of the watermark embeddng procedure based on mproved predcton error expanson and hstogram shftng are shown n Fgure 3.The detals are descrbed as follows. Step 1. Assume a host audo data A = {a 1,a 2,a 3,...,a N a [ 1,1]}.Foraudosamplea, we defne a 3,a 2,a 1 as Dfference DE DE-embed Fgure 2: Hstogram after expanson of nner regon and orgnal predcton errors. sort(d) set T l =,T r =1 set =num(t l ), j = num(t r ) whle(p < P set ) f (num l + num())/cnt l < (num r + num(j))/cnt r P=P+num(j + 1) num r=num r+num(j + 1) j=j+1 cnt r=cntr+1 else P=P+num( 1) num l=num l+num( 1) = 1 cnt l=cntl+1 end T l =D() T r =D(j) Algorthm 1 ts neghborhood samples and a as ts predcted value. As n formula (5), F( ) represents predctor: a =F(a 3,a 2,a 1 ). (5) Step 2. Defne p as predcton error p = a a ;thenwe embedded watermarkng bt b by expanson of predcton error p. The formula s as follows: p =2 p +b. (6) Step 3. Determne the lnear predcton coeffcents based on DE algorthm. We can defne F( ) = round(c 1 a 3 +c 2 a 2 +c 3 a 1 )(>3). Accordng to the optmzaton scheme

4 4 The Scentfc World Journal Orgnal audo Watermark nformaton Generate lnear predcton coeffcents usng DE algorthm Encrypton Determne threshold of modfcaton predcton errors Locaton map Lossless compresson Buld embedded bts Usng expanson of predcton errors and hstogram shftng to embed nformaton nto audo data Fgure 3: Dagram of watermark embeddng process. proposed n Secton 2, wecanobtanoptmalpredcton coeffcents C=[c 1best,c 2best,c 3best ]. Step 4. Gve capacty P.WecanobtanthresholdT l,t r based on Algorthm 1. Step 5. Embed watermarkng nformaton usng hstogram shftng and expanson of predcton errors. T eml and T emr are left and rght boundares of hstogram. We can obtan nner regon [T l,t r ] and outer regons [T eml,t l ) (T r,t emr ]. Fnally, embed the watermarkng nformaton usng expanson of predcton errors or acheve locaton markng usng hstogram shftng. The formula s descrbed as follows: p { abs (T l ) f p [T eml,t l ) p = 2 p { +b else f p [T eml,t emr ] { p + abs (T r )+1 otherwse. Step 6. Buldlocatonmap.Sncea [32767, 32768], n order to prevent overflow and underflow problems durng embeddng process, we assgn a value 1 n locaton map when the above stuatons occur. Otherwse we assgn a value. The locaton map should be lossless compressed. We use run-length codng and Huffman codng scheme. In the process of decodng, we can extract the watermark nformaton and restore host audo data. The detals are as follows. Step 1. The current audo sample s obtaned from (5)byusng restored host data a() ( > 3). If the value of locaton map s 1, keep the audo sample unchanged. For predcton errors (7) ranges n [2T l,2t r +1], we can extract the watermark bt and restore audo sample usng b=mod (p,2), p = p b, 2 a =a p. Step 2. For hstogram shftng, we can restore the audo data by the followng formula: p ={ p + abs (T l) f p <2 T l p abs (T r) 1 f p >2 T r Experment Set In ths secton, we choose fve common audo types to demonstrate the performance of the proposed algorthm. All audo fles are 16-bt mono n wave format and the samplng rates of them are 44.1 khz. The detaled descrpton s lsted n Table 1. For optmzaton of lnear predcton coeffcents basedondealgorthm,wesettheszeofntalpopulaton to 65. The teraton s set to 5. The probablty of crossover and mutaton are.9 and.9, respectvely Evaluaton Method. In order to evaluate the performance of the proposed algorthm, we choose two common ndcators SNR and capacty. SNR s a statstcal dfference metrc (8) (9)

5 The Scentfc World Journal 5 1 Orgnal audo sgnal 1 Watermarked host audo sgnal Ampltude.5.5 Ampltude Tme Tme 1 5 (a) (b) Fgure 4: Orgnal pop audo and the watermarked audo sgnal. Table 1: Test database 16 bts. Index Audo descrpton 1 Blues 2 Classc 3 Jazz 4 Pop 5 Country to measure the perceptual smlarty between orgnal audo andembeddedaudo.theformulasasfollows: SNR (S, S L =1 ) =1log 1 ( S2 () L =1 [S () S ()] 2 ), (1) where S(), S () are orgnal audo sample and embedded audo sample, respectvely. Capacty s used to measure how much nformaton can be embedded nto a host data. The formula s as follows: where N L means the requred number of audo sample when embeddng one bt watermark durng embeddng procedure p= 1 N L. (11) 5. The Expermental Results and Analyss Usng the ED algorthm settngs n Secton 4,theconvergence curves of object functon wth DE algorthm are shown n Fgure 5. The best ftness of an ndvdual can converge fast to a stable value n the twenty-ffth generaton. The comparson of SNR and capacty between embedded audo usng the optmal lnear predcton coeffcents and best lnear predcton coeffcents proposed n [1] wasshownn Table 2.We can see that the lnear predcton coeffcents generated by DE algorthm acheve better SNR and capacty than fxed coeffcents for all the types of test audos n the same condton. Fgure6 presents the performance of the 64 predcton coeffcent sets and optmal predcton coeffcent setforclasscaudo.itcanbeseenthatlnearpredcton coeffcents obtaned by DE have obvous advantage n SNR and capacty. The orgnal and watermarked audo sgnals n tme doman are shown n Fgure 4; the dfference between them s nvsble. The best ftness Generatons Fgure 5: Convergence curves of object functon wth DE algorthm. Table2:ThecomparsonofSNRandcapactybetweenembedded audo usng the optmal lnear predcton coeffcents and best lnear predcton coeffcents proposed n [1]. Set T = 5 Audo Ours [1] SNR Capacty SNR Capacty Blues Classc Jazz Pop Country Fgure 7 graphcally depcts the embeddng capacty versus the embedded audo qualty curve of fve types of audo. We can see that the SNR of embedded audo decreased wth the ncrease of embeddng capacty. Accordng to the gven embeddng capacty, we can convenently determne and modfy the threshold of predcton error. That enhances capacty control capablty. In order to evaluate the performanceofproposedalgorthmbasedonhstogramshftng, we use run-length codng and Huffman codng scheme to

6 6 The Scentfc World Journal Audo qualty SNR (db) Classc Set of parameters Alg. P1 Alg. DE (a) Payload sze (bpp) Set of parameters Alg. P1 Alg. DE (b) Fgure 6: The performance of the 64 predcton coeffcent sets and optmal predcton coeffcent set for classc audo. SNR (db) Locaton map length Embeddng rado (bts/sample) Country Jazz Pop Blues Classc Fgure 7: The embeddng capacty versus the embedded Embeddng rado (bts/sample) Country Jazz Pop Blues Classc Fgure 8: The embeddng capacty versus compressed locaton map length curve of fve types audo qualty curve of fve types audo. compress the locaton map.fgure 8 presents the embeddng capacty versus compressed locaton map length curve of fve types of audo. The locaton map s generated usng algorthm proposed n [11]. We can see that locaton map of algorthm compared has a large length and the compressblty of locaton map s low. The large auxlary locaton map wll take a lot of capacty. In ths paper, we adopt hstogram shftng to reduce the locaton map. As we know, we can map the audo data to nteger ranged from to As the range of audo data s very wde, the overflow phenomenon rarely occurs. Meanwhle, the locaton map of proposed algorthm only needs overflow locaton nformaton, so the length of locaton map can be reduced drastcally. The experments showed that the length of locaton map usng proposed algorthm s neglgble. 6. Concluson Ths paper proposed a novel reversble audo watermarkng algorthm based on mproved predcton error expanson and hstogram shftng. As the performance of reversble audo scheme usng predcton error expanson s affected by the predctor, we proposed the optmzaton of lnear predcton coeffcents usng dfferental evoluton algorthm. The experments have shown that the proposed scheme can acheve better embedded audo qualty and hgher capacty. In order to reduce the length of locaton map, we ntroduced hstogram shftng scheme. In addton, we proposed the scheme whch can be used to compute predcton error modfcaton threshold accordng to a gven embeddng capacty. The smulaton results verfy our scheme can drastcally

7 The Scentfc World Journal 7 reduce locaton map bts length and enhance capacty control capablty. Conflct of Interests The authors declare that there s no conflct of nterests regardng the publcaton of ths paper. Acknowledgments Ths work was sponsored by Natonal Nature Scence Foundaton of Chna ( ), Specalzed Research Fund for the Doctoral Program of Hgher Educaton, Chna ( ), and the Young Teacher s Growth Program of Hunan Unversty. References [1]J.B.Feng,I.C.Ln,C.S.Tsa,andY.P.Chu, Reversble watermarkng: current status and key ssues, Internatonal Network Securty,vol.2,no.3,pp ,26. [2] M.Vogt,B.Yang,andC.Busch, Reversblewatermarkngof 2D-vector data, n Proceedngs of the Multmeda and Securty Workshop, pp , ACM, September 24. [3] D. Coltuc, Low dstorton transform for reversble watermarkng, IEEE Transactons on Image Processng, vol. 21, no. 1, pp , 212. [4] S.Lee,C.D.Yoo,andT.Kalker, Reversblemagewatermarkng based on nteger-to-nteger wavelet transform, IEEE Transactons on Informaton Forenscs and Securty,vol.2,no.3,pp , 27. [5] L.Luo,Z.Chen,M.Chen,X.Zeng,andZ.Xong, Reversble mage watermarkng usng nterpolaton technque, IEEE Transactons on Informaton Forenscs and Securty, vol.5,no. 1,pp ,21. [6] D. Coltuc and J.-M. Chassery, Very fast watermarkng by reversble contrast mappng, IEEE Sgnal Processng Letters,vol. 14, no. 4, pp , 27. [7] J. Tan, Reversble data embeddng usng a dfference expanson, IEEE Transactons on Crcuts and Systems for Vdeo Technology,vol.13,no.8,pp ,23. [8] D. M. Thod and J. J. Rodríguez, Reversble watermarkng by predcton-error expanson, n Proceedngs of the 6th IEEE Southwest Symposum on Image Analyss and Interpretaton,pp , March 24. [9] H. Zhao, F. Wang, Z. Chen, and J. Lu, A robust audo watermarkng algorthm based on SVD-DWT, Electroncs & Electrcal Engneerng,vol.2,no.1,pp.75 8,214. [1] D. Yan and R. Wang, Reversble data hdng for audo based on predcton error expanson, n Proceedngs of the 4th Internatonal Conference on Intellgent Informaton Hdng and Multeda Sgnal Processng (IIHMSP 8), pp , August 28. [11] A. Nshmura, Reversble audo data hdng usng lnear predcton and error expanson, n Proceedngs of the 7th Internatonal Conference on Intellgent Informaton Hdng and Multmeda Sgnal Processng (IIHMSP 11),pp ,October 211. [12] R. Storn and K. Prce, Mnmzng the real functons of the ICEC 96 contest by dfferental evoluton, n Proceedngs of the IEEE Internatonal Conference on Evolutonary Computaton, pp ,1996. [13] J. Vesterstrøm and R. Thomsen, A comparatve study of dfferental evoluton, partcle swarm optmzaton, and evolutonary algorthms on numercal benchmark problems, n Proceedngs of the Congress on Evolutonary Computaton (CEC 4), vol.2, pp , June 24. [14] B. V. Babu and R. Angra, Modfed dfferental evoluton (MDE) for optmzaton of non-lnear chemcal processes, Computers and Chemcal Engneerng,vol.3,no.6-7,pp , 26. [15]B.Lu,J.Lu,Y.Wang,andY.Tang, Aneffectveparameter extracton method based on memetc dfferental evoluton algorthm, Mcroelectroncs Journal, vol.39,no.12,pp , 28. [16] W. Zhang, X. Wang, B. Lu, and T. Km, Secure encapsulaton and publcaton of bologcal servces n the cloud computng envronment, BoMed Research Internatonal,vol.213,Artcle ID 1758, 8 pages, 213. [17] Z. N, Y.-Q. Sh, N. Ansar, and W. Su, Reversble data hdng, IEEE Transactons on Crcuts and Systems for Vdeo Technology, vol.16,no.3,pp ,26. [18] D. M. Thod and J. J. Rodríguez, Expanson embeddng technques for reversble watermarkng, IEEE Transactons on Image Processng, vol. 16, no. 3, pp , 27.

8 Rotatng Machnery Engneerng The Scentfc World Journal Dstrbuted Sensor Networks Sensors Control Scence and Engneerng Advances n Cvl Engneerng Submt your manuscrpts at Electrcal and Computer Engneerng Robotcs VLSI Desgn Advances n OptoElectroncs Navgaton and Observaton Chemcal Engneerng Actve and Passve Electronc Components Antennas and Propagaton Aerospace Engneerng Modellng & Smulaton n Engneerng Shock and Vbraton Advances n Acoustcs and Vbraton

Hybrid Non-Blind Color Image Watermarking

Hybrid Non-Blind Color Image Watermarking Hybrd Non-Blnd Color Image Watermarkng Ms C.N.Sujatha 1, Dr. P. Satyanarayana 2 1 Assocate Professor, Dept. of ECE, SNIST, Yamnampet, Ghatkesar Hyderabad-501301, Telangana 2 Professor, Dept. of ECE, AITS,

More information

A Fast Content-Based Multimedia Retrieval Technique Using Compressed Data

A Fast Content-Based Multimedia Retrieval Technique Using Compressed Data A Fast Content-Based Multmeda Retreval Technque Usng Compressed Data Borko Furht and Pornvt Saksobhavvat NSF Multmeda Laboratory Florda Atlantc Unversty, Boca Raton, Florda 3343 ABSTRACT In ths paper,

More information

Cluster Analysis of Electrical Behavior

Cluster Analysis of Electrical Behavior Journal of Computer and Communcatons, 205, 3, 88-93 Publshed Onlne May 205 n ScRes. http://www.scrp.org/ournal/cc http://dx.do.org/0.4236/cc.205.350 Cluster Analyss of Electrcal Behavor Ln Lu Ln Lu, School

More information

Content Based Image Retrieval Using 2-D Discrete Wavelet with Texture Feature with Different Classifiers

Content Based Image Retrieval Using 2-D Discrete Wavelet with Texture Feature with Different Classifiers IOSR Journal of Electroncs and Communcaton Engneerng (IOSR-JECE) e-issn: 78-834,p- ISSN: 78-8735.Volume 9, Issue, Ver. IV (Mar - Apr. 04), PP 0-07 Content Based Image Retreval Usng -D Dscrete Wavelet wth

More information

Key-Selective Patchwork Method for Audio Watermarking

Key-Selective Patchwork Method for Audio Watermarking Internatonal Journal of Dgtal Content Technology and ts Applcatons Volume 4, Number 4, July 2010 Key-Selectve Patchwork Method for Audo Watermarkng 1 Ch-Man Pun, 2 Jng-Jng Jang 1, Frst and Correspondng

More information

Improvement of Spatial Resolution Using BlockMatching Based Motion Estimation and Frame. Integration

Improvement of Spatial Resolution Using BlockMatching Based Motion Estimation and Frame. Integration Improvement of Spatal Resoluton Usng BlockMatchng Based Moton Estmaton and Frame Integraton Danya Suga and Takayuk Hamamoto Graduate School of Engneerng, Tokyo Unversty of Scence, 6-3-1, Nuku, Katsuska-ku,

More information

An Optimal Algorithm for Prufer Codes *

An Optimal Algorithm for Prufer Codes * J. Software Engneerng & Applcatons, 2009, 2: 111-115 do:10.4236/jsea.2009.22016 Publshed Onlne July 2009 (www.scrp.org/journal/jsea) An Optmal Algorthm for Prufer Codes * Xaodong Wang 1, 2, Le Wang 3,

More information

Parallelism for Nested Loops with Non-uniform and Flow Dependences

Parallelism for Nested Loops with Non-uniform and Flow Dependences Parallelsm for Nested Loops wth Non-unform and Flow Dependences Sam-Jn Jeong Dept. of Informaton & Communcaton Engneerng, Cheonan Unversty, 5, Anseo-dong, Cheonan, Chungnam, 330-80, Korea. seong@cheonan.ac.kr

More information

High Payload Reversible Data Hiding Scheme Using Difference Segmentation and Histogram Shifting

High Payload Reversible Data Hiding Scheme Using Difference Segmentation and Histogram Shifting JOURNAL OF ELECTRONIC SCIENCE AND TECHNOLOGY, VOL. 11, NO. 1, MARCH 2013 9 Hgh Payload Reversble Data Hdng Scheme Usng Dfference Segmentaton and Hstogram Shftng Yung-Chen Chou and Huang-Chng L Abstract

More information

A Binarization Algorithm specialized on Document Images and Photos

A Binarization Algorithm specialized on Document Images and Photos A Bnarzaton Algorthm specalzed on Document mages and Photos Ergna Kavalleratou Dept. of nformaton and Communcaton Systems Engneerng Unversty of the Aegean kavalleratou@aegean.gr Abstract n ths paper, a

More information

Enhanced Watermarking Technique for Color Images using Visual Cryptography

Enhanced Watermarking Technique for Color Images using Visual Cryptography Informaton Assurance and Securty Letters 1 (2010) 024-028 Enhanced Watermarkng Technque for Color Images usng Vsual Cryptography Enas F. Al rawashdeh 1, Rawan I.Zaghloul 2 1 Balqa Appled Unversty, MIS

More information

An Image Compression Algorithm based on Wavelet Transform and LZW

An Image Compression Algorithm based on Wavelet Transform and LZW An Image Compresson Algorthm based on Wavelet Transform and LZW Png Luo a, Janyong Yu b School of Chongqng Unversty of Posts and Telecommuncatons, Chongqng, 400065, Chna Abstract a cylpng@63.com, b y27769864@sna.cn

More information

An Influence of the Noise on the Imaging Algorithm in the Electrical Impedance Tomography *

An Influence of the Noise on the Imaging Algorithm in the Electrical Impedance Tomography * Open Journal of Bophyscs, 3, 3, 7- http://dx.do.org/.436/ojbphy.3.347 Publshed Onlne October 3 (http://www.scrp.org/journal/ojbphy) An Influence of the Nose on the Imagng Algorthm n the Electrcal Impedance

More information

The Research of Ellipse Parameter Fitting Algorithm of Ultrasonic Imaging Logging in the Casing Hole

The Research of Ellipse Parameter Fitting Algorithm of Ultrasonic Imaging Logging in the Casing Hole Appled Mathematcs, 04, 5, 37-3 Publshed Onlne May 04 n ScRes. http://www.scrp.org/journal/am http://dx.do.org/0.436/am.04.584 The Research of Ellpse Parameter Fttng Algorthm of Ultrasonc Imagng Loggng

More information

EVALUATION OF THE PERFORMANCES OF ARTIFICIAL BEE COLONY AND INVASIVE WEED OPTIMIZATION ALGORITHMS ON THE MODIFIED BENCHMARK FUNCTIONS

EVALUATION OF THE PERFORMANCES OF ARTIFICIAL BEE COLONY AND INVASIVE WEED OPTIMIZATION ALGORITHMS ON THE MODIFIED BENCHMARK FUNCTIONS Academc Research Internatonal ISS-L: 3-9553, ISS: 3-9944 Vol., o. 3, May 0 EVALUATIO OF THE PERFORMACES OF ARTIFICIAL BEE COLOY AD IVASIVE WEED OPTIMIZATIO ALGORITHMS O THE MODIFIED BECHMARK FUCTIOS Dlay

More information

A Lossless Watermarking Scheme for Halftone Image Authentication

A Lossless Watermarking Scheme for Halftone Image Authentication IJCSNS Internatonal Journal of Computer Scence and Network Securty, VOL.6 No.2B, February 2006 147 A Lossless Watermarkng Scheme for Halftone Image Authentcaton Jeng-Shyang Pan, Hao Luo, and Zhe-Mng Lu,

More information

Article Reversible Dual-Image-Based Hiding Scheme Using Block Folding Technique

Article Reversible Dual-Image-Based Hiding Scheme Using Block Folding Technique Artcle Reversble Dual-Image-Based Hdng Scheme Usng Block Foldng Technque Tzu-Chuen Lu, * and Hu-Shh Leng Department of Informaton Management, Chaoyang Unversty of Technology, Tachung 4349, Tawan Department

More information

Shape-adaptive DCT and Its Application in Region-based Image Coding

Shape-adaptive DCT and Its Application in Region-based Image Coding Internatonal Journal of Sgnal Processng, Image Processng and Pattern Recognton, pp.99-108 http://dx.do.org/10.14257/sp.2014.7.1.10 Shape-adaptve DCT and Its Applcaton n Regon-based Image Codng Yamn Zheng,

More information

IMPLEMENTATION OF QIM BASED AUDIO WATERMARKING USING HYBRID TRANSFORM OF SWT-DCT-SVD METHODS OPTIMIZED WITH GENETIC ALORITHM

IMPLEMENTATION OF QIM BASED AUDIO WATERMARKING USING HYBRID TRANSFORM OF SWT-DCT-SVD METHODS OPTIMIZED WITH GENETIC ALORITHM IMPLEMENTATION OF QIM BASED AUDIO WATERMARKING USING HYBRID TRANSFORM OF SWT-DCT-SVD METHODS OPTIMIZED WITH GENETIC ALORITHM Ryan Amnullah 1, Gelar Budman 2, Irma Saftr 3 1, 2, 3 FakultasTeknk Elektro,

More information

Recommended Items Rating Prediction based on RBF Neural Network Optimized by PSO Algorithm

Recommended Items Rating Prediction based on RBF Neural Network Optimized by PSO Algorithm Recommended Items Ratng Predcton based on RBF Neural Network Optmzed by PSO Algorthm Chengfang Tan, Cayn Wang, Yuln L and Xx Q Abstract In order to mtgate the data sparsty and cold-start problems of recommendaton

More information

Adaptive digital watermarking of images using Genetic Algorithm

Adaptive digital watermarking of images using Genetic Algorithm Adaptve dgtal watermarkng of mages usng Genetc Algorthm Bushra Skander, Muhammad Ishtaq, M. Arfan Jaffar, Muhammad Tarq, Anwar M. Mrza Department of Computer Scence, Natonal Unversty of Computer and Emergng

More information

An Image Fusion Approach Based on Segmentation Region

An Image Fusion Approach Based on Segmentation Region Rong Wang, L-Qun Gao, Shu Yang, Yu-Hua Cha, and Yan-Chun Lu An Image Fuson Approach Based On Segmentaton Regon An Image Fuson Approach Based on Segmentaton Regon Rong Wang, L-Qun Gao, Shu Yang 3, Yu-Hua

More information

Quality Improvement Algorithm for Tetrahedral Mesh Based on Optimal Delaunay Triangulation

Quality Improvement Algorithm for Tetrahedral Mesh Based on Optimal Delaunay Triangulation Intellgent Informaton Management, 013, 5, 191-195 Publshed Onlne November 013 (http://www.scrp.org/journal/m) http://dx.do.org/10.36/m.013.5601 Qualty Improvement Algorthm for Tetrahedral Mesh Based on

More information

A Fast Visual Tracking Algorithm Based on Circle Pixels Matching

A Fast Visual Tracking Algorithm Based on Circle Pixels Matching A Fast Vsual Trackng Algorthm Based on Crcle Pxels Matchng Zhqang Hou hou_zhq@sohu.com Chongzhao Han czhan@mal.xjtu.edu.cn Ln Zheng Abstract: A fast vsual trackng algorthm based on crcle pxels matchng

More information

The Shortest Path of Touring Lines given in the Plane

The Shortest Path of Touring Lines given in the Plane Send Orders for Reprnts to reprnts@benthamscence.ae 262 The Open Cybernetcs & Systemcs Journal, 2015, 9, 262-267 The Shortest Path of Tourng Lnes gven n the Plane Open Access Ljuan Wang 1,2, Dandan He

More information

Determining the Optimal Bandwidth Based on Multi-criterion Fusion

Determining the Optimal Bandwidth Based on Multi-criterion Fusion Proceedngs of 01 4th Internatonal Conference on Machne Learnng and Computng IPCSIT vol. 5 (01) (01) IACSIT Press, Sngapore Determnng the Optmal Bandwdth Based on Mult-crteron Fuson Ha-L Lang 1+, Xan-Mn

More information

A Robust Webpage Information Hiding Method Based on the Slash of Tag

A Robust Webpage Information Hiding Method Based on the Slash of Tag Advanced Engneerng Forum Onlne: 2012-09-26 ISSN: 2234-991X, Vols. 6-7, pp 361-366 do:10.4028/www.scentfc.net/aef.6-7.361 2012 Trans Tech Publcatons, Swtzerland A Robust Webpage Informaton Hdng Method Based

More information

Enhanced AMBTC for Image Compression using Block Classification and Interpolation

Enhanced AMBTC for Image Compression using Block Classification and Interpolation Internatonal Journal of Computer Applcatons (0975 8887) Volume 5 No.0, August 0 Enhanced AMBTC for Image Compresson usng Block Classfcaton and Interpolaton S. Vmala Dept. of Comp. Scence Mother Teresa

More information

Semi-Fragile Watermarking Scheme for Authentication of JPEG Images

Semi-Fragile Watermarking Scheme for Authentication of JPEG Images Tamkang Journal of Scence and Engneerng, Vol. 10, No 1, pp. 5766 (2007) 57 Sem-Fragle Watermarkng Scheme for Authentcaton of JPEG Images Chh-Hung n 1 *, Tung-Shh Su 2 and Wen-Shyong Hseh 2,3 1 Department

More information

A mathematical programming approach to the analysis, design and scheduling of offshore oilfields

A mathematical programming approach to the analysis, design and scheduling of offshore oilfields 17 th European Symposum on Computer Aded Process Engneerng ESCAPE17 V. Plesu and P.S. Agach (Edtors) 2007 Elsever B.V. All rghts reserved. 1 A mathematcal programmng approach to the analyss, desgn and

More information

Research Article Improved Encrypted-Signals-Based Reversible Data Hiding Using Code Division Multiplexing and Value Expansion

Research Article Improved Encrypted-Signals-Based Reversible Data Hiding Using Code Division Multiplexing and Value Expansion Securty and Communcaton Networks Volume 2018, Artcle ID 1326235, 9 pages https://do.org/10.1155/2018/1326235 Research Artcle Improved Encrypted-Sgnals-Based Reversble Data Hdng Usng Code Dvson Multplexng

More information

An Iterative Solution Approach to Process Plant Layout using Mixed Integer Optimisation

An Iterative Solution Approach to Process Plant Layout using Mixed Integer Optimisation 17 th European Symposum on Computer Aded Process Engneerng ESCAPE17 V. Plesu and P.S. Agach (Edtors) 2007 Elsever B.V. All rghts reserved. 1 An Iteratve Soluton Approach to Process Plant Layout usng Mxed

More information

A Five-Point Subdivision Scheme with Two Parameters and a Four-Point Shape-Preserving Scheme

A Five-Point Subdivision Scheme with Two Parameters and a Four-Point Shape-Preserving Scheme Mathematcal and Computatonal Applcatons Artcle A Fve-Pont Subdvson Scheme wth Two Parameters and a Four-Pont Shape-Preservng Scheme Jeqng Tan,2, Bo Wang, * and Jun Sh School of Mathematcs, Hefe Unversty

More information

Positive Semi-definite Programming Localization in Wireless Sensor Networks

Positive Semi-definite Programming Localization in Wireless Sensor Networks Postve Sem-defnte Programmng Localzaton n Wreless Sensor etworks Shengdong Xe 1,, Jn Wang, Aqun Hu 1, Yunl Gu, Jang Xu, 1 School of Informaton Scence and Engneerng, Southeast Unversty, 10096, anjng Computer

More information

Meta-heuristics for Multidimensional Knapsack Problems

Meta-heuristics for Multidimensional Knapsack Problems 2012 4th Internatonal Conference on Computer Research and Development IPCSIT vol.39 (2012) (2012) IACSIT Press, Sngapore Meta-heurstcs for Multdmensonal Knapsack Problems Zhbao Man + Computer Scence Department,

More information

Detecting MP3Stego using Calibrated Side Information Features

Detecting MP3Stego using Calibrated Side Information Features 2628 JOURNAL OF SOFTWARE, VOL. 8, NO. 10, OCTOBER 2013 Detectng P3Stego usng Calbrated Sde Informaton Features Xanmn Yu School of Informaton Scence and Engneerng, Nngbo Unversty Emal: mlhappy1016@163.com

More information

Data Hiding and Image Authentication for Color-Palette Images

Data Hiding and Image Authentication for Color-Palette Images Data Hdng and Image Authentcaton for Color-Palette Images Chh-Yang Yn ( 殷志揚 ) and Wen-Hsang Tsa ( 蔡文祥 ) Department of Computer & Informaton Scence Natonal Chao Tung Unversty 00 Ta Hsueh Rd., Hsnchu, Tawan

More information

Analysis on the Workspace of Six-degrees-of-freedom Industrial Robot Based on AutoCAD

Analysis on the Workspace of Six-degrees-of-freedom Industrial Robot Based on AutoCAD Analyss on the Workspace of Sx-degrees-of-freedom Industral Robot Based on AutoCAD Jn-quan L 1, Ru Zhang 1,a, Fang Cu 1, Q Guan 1 and Yang Zhang 1 1 School of Automaton, Bejng Unversty of Posts and Telecommuncatons,

More information

Load Balancing for Hex-Cell Interconnection Network

Load Balancing for Hex-Cell Interconnection Network Int. J. Communcatons, Network and System Scences,,, - Publshed Onlne Aprl n ScRes. http://www.scrp.org/journal/jcns http://dx.do.org/./jcns.. Load Balancng for Hex-Cell Interconnecton Network Saher Manaseer,

More information

Discrete Cosine Transform Optimization in Image Compression Based on Genetic Algorithm

Discrete Cosine Transform Optimization in Image Compression Based on Genetic Algorithm 015 8th Internatonal Congress on Image and Sgnal Processng (CISP 015) Dscrete Cosne Transform Optmzaton n Image Compresson Based on Genetc Algorthm LIU Yuan-yuan 1 CHE He-xn 1 College of Communcaton Engneerng,

More information

Simulation Based Analysis of FAST TCP using OMNET++

Simulation Based Analysis of FAST TCP using OMNET++ Smulaton Based Analyss of FAST TCP usng OMNET++ Umar ul Hassan 04030038@lums.edu.pk Md Term Report CS678 Topcs n Internet Research Sprng, 2006 Introducton Internet traffc s doublng roughly every 3 months

More information

A NEW AUDIO WATERMARKING METHOD BASED

A NEW AUDIO WATERMARKING METHOD BASED A NEW AUDIO WATERMARKING METHOD BASED ON DISCRETE COSINE TRANSFORM WITH A GRAY IMAGE Mohammad Ibrahm Khan 1, Md. Iqbal Hasan Sarker 2, Kaushk Deb 3 and Md. Hasan Furhad 4 1,2,3 Department of Computer Scence

More information

THE PATH PLANNING ALGORITHM AND SIMULATION FOR MOBILE ROBOT

THE PATH PLANNING ALGORITHM AND SIMULATION FOR MOBILE ROBOT Journal of Theoretcal and Appled Informaton Technology 30 th Aprl 013. Vol. 50 No.3 005-013 JATIT & LLS. All rghts reserved. ISSN: 199-8645 www.jatt.org E-ISSN: 1817-3195 THE PATH PLANNING ALGORITHM AND

More information

NUMERICAL SOLVING OPTIMAL CONTROL PROBLEMS BY THE METHOD OF VARIATIONS

NUMERICAL SOLVING OPTIMAL CONTROL PROBLEMS BY THE METHOD OF VARIATIONS ARPN Journal of Engneerng and Appled Scences 006-017 Asan Research Publshng Network (ARPN). All rghts reserved. NUMERICAL SOLVING OPTIMAL CONTROL PROBLEMS BY THE METHOD OF VARIATIONS Igor Grgoryev, Svetlana

More information

High-Boost Mesh Filtering for 3-D Shape Enhancement

High-Boost Mesh Filtering for 3-D Shape Enhancement Hgh-Boost Mesh Flterng for 3-D Shape Enhancement Hrokazu Yagou Λ Alexander Belyaev y Damng We z Λ y z ; ; Shape Modelng Laboratory, Unversty of Azu, Azu-Wakamatsu 965-8580 Japan y Computer Graphcs Group,

More information

A Hybrid Semi-Blind Gray Scale Image Watermarking Algorithm Based on DWT-SVD using Human Visual System Model

A Hybrid Semi-Blind Gray Scale Image Watermarking Algorithm Based on DWT-SVD using Human Visual System Model A Hybrd Sem-Blnd Gray Scale Image Watermarkng Algorthm Based on DWT-SVD usng Human Vsual System Model Rajesh Mehta r Scence & Engneerng, USICT Guru Gobnd Sngh Indrarprastha Unversty New Delh, Inda rajesh00ust@gmal.com

More information

Maximum Variance Combined with Adaptive Genetic Algorithm for Infrared Image Segmentation

Maximum Variance Combined with Adaptive Genetic Algorithm for Infrared Image Segmentation Internatonal Conference on Logstcs Engneerng, Management and Computer Scence (LEMCS 5) Maxmum Varance Combned wth Adaptve Genetc Algorthm for Infrared Image Segmentaton Huxuan Fu College of Automaton Harbn

More information

Load-Balanced Anycast Routing

Load-Balanced Anycast Routing Load-Balanced Anycast Routng Chng-Yu Ln, Jung-Hua Lo, and Sy-Yen Kuo Department of Electrcal Engneerng atonal Tawan Unversty, Tape, Tawan sykuo@cc.ee.ntu.edu.tw Abstract For fault-tolerance and load-balance

More information

Robust Blind Video Watermark Algorithm in Transform Domain Combining with 3D Video Correlation

Robust Blind Video Watermark Algorithm in Transform Domain Combining with 3D Video Correlation JOURNAL OF MULTIMEDIA, VOL. 8, NO. 2, APRIL 2013 161 Robust Blnd Vdeo Watermark Algorthm n Transform Doman Combnng wth 3D Vdeo Correlaton DING Ha-yang 1,3 1. Informaton Securty Center, Bejng Unversty of

More information

Learning the Kernel Parameters in Kernel Minimum Distance Classifier

Learning the Kernel Parameters in Kernel Minimum Distance Classifier Learnng the Kernel Parameters n Kernel Mnmum Dstance Classfer Daoqang Zhang 1,, Songcan Chen and Zh-Hua Zhou 1* 1 Natonal Laboratory for Novel Software Technology Nanjng Unversty, Nanjng 193, Chna Department

More information

Research and Application of Fingerprint Recognition Based on MATLAB

Research and Application of Fingerprint Recognition Based on MATLAB Send Orders for Reprnts to reprnts@benthamscence.ae The Open Automaton and Control Systems Journal, 205, 7, 07-07 Open Access Research and Applcaton of Fngerprnt Recognton Based on MATLAB Nng Lu* Department

More information

A fast algorithm for color image segmentation

A fast algorithm for color image segmentation Unersty of Wollongong Research Onlne Faculty of Informatcs - Papers (Arche) Faculty of Engneerng and Informaton Scences 006 A fast algorthm for color mage segmentaton L. Dong Unersty of Wollongong, lju@uow.edu.au

More information

Resource and Virtual Function Status Monitoring in Network Function Virtualization Environment

Resource and Virtual Function Status Monitoring in Network Function Virtualization Environment Journal of Physcs: Conference Seres PAPER OPEN ACCESS Resource and Vrtual Functon Status Montorng n Network Functon Vrtualzaton Envronment To cte ths artcle: MS Ha et al 2018 J. Phys.: Conf. Ser. 1087

More information

Wavelet-Based Image Compression System with Linear Distortion Control

Wavelet-Based Image Compression System with Linear Distortion Control Je-Hung Lu, Kng-Chu Hung Wavelet-Based Image Compresson System wth Lnear Dstorton Control Je-Hung Lu, Kng-Chu Hung Insttute of Engneerng Scence and Technology Natonal Kaohsung Frst Unversty of Scence and

More information

Fast Computation of Shortest Path for Visiting Segments in the Plane

Fast Computation of Shortest Path for Visiting Segments in the Plane Send Orders for Reprnts to reprnts@benthamscence.ae 4 The Open Cybernetcs & Systemcs Journal, 04, 8, 4-9 Open Access Fast Computaton of Shortest Path for Vstng Segments n the Plane Ljuan Wang,, Bo Jang

More information

Application of Improved Fish Swarm Algorithm in Cloud Computing Resource Scheduling

Application of Improved Fish Swarm Algorithm in Cloud Computing Resource Scheduling , pp.40-45 http://dx.do.org/10.14257/astl.2017.143.08 Applcaton of Improved Fsh Swarm Algorthm n Cloud Computng Resource Schedulng Yu Lu, Fangtao Lu School of Informaton Engneerng, Chongqng Vocatonal Insttute

More information

A Secured Method for Image Steganography Based On Pixel Values

A Secured Method for Image Steganography Based On Pixel Values A Secured Method for Image Steganography Based On Pxel Values Tarun Gulat #, Sanskrt Gupta * # Assocate Professor, Electroncs and Communcaton Engneerng Department, MMEC, M.M.U., Mullana, Ambala, Haryana,

More information

Clustering Algorithm Combining CPSO with K-Means Chunqin Gu 1, a, Qian Tao 2, b

Clustering Algorithm Combining CPSO with K-Means Chunqin Gu 1, a, Qian Tao 2, b Internatonal Conference on Advances n Mechancal Engneerng and Industral Informatcs (AMEII 05) Clusterng Algorthm Combnng CPSO wth K-Means Chunqn Gu, a, Qan Tao, b Department of Informaton Scence, Zhongka

More information

Smoothing Spline ANOVA for variable screening

Smoothing Spline ANOVA for variable screening Smoothng Splne ANOVA for varable screenng a useful tool for metamodels tranng and mult-objectve optmzaton L. Rcco, E. Rgon, A. Turco Outlne RSM Introducton Possble couplng Test case MOO MOO wth Game Theory

More information

Reversible Dual-Image-Based Hiding Scheme Using Block Folding Technique

Reversible Dual-Image-Based Hiding Scheme Using Block Folding Technique S S symmetry Artcle Reversble Dual-Image-Based Hdng Scheme Usng Block Foldng Technque Tzu-Chuen Lu Tzu-Chuen Lu 1, 1, * and Hu-Shh Leng * ID and Hu-Shh Leng 1 Department Informaton Management, Chaoyang

More information

Scheduling Remote Access to Scientific Instruments in Cyberinfrastructure for Education and Research

Scheduling Remote Access to Scientific Instruments in Cyberinfrastructure for Education and Research Schedulng Remote Access to Scentfc Instruments n Cybernfrastructure for Educaton and Research Je Yn 1, Junwe Cao 2,3,*, Yuexuan Wang 4, Lanchen Lu 1,3 and Cheng Wu 1,3 1 Natonal CIMS Engneerng and Research

More information

Related-Mode Attacks on CTR Encryption Mode

Related-Mode Attacks on CTR Encryption Mode Internatonal Journal of Network Securty, Vol.4, No.3, PP.282 287, May 2007 282 Related-Mode Attacks on CTR Encrypton Mode Dayn Wang, Dongda Ln, and Wenlng Wu (Correspondng author: Dayn Wang) Key Laboratory

More information

Robust Watermarking for Text Images Based on Arnold Scrambling and DWT-DCT

Robust Watermarking for Text Images Based on Arnold Scrambling and DWT-DCT Internatonal Conference on Mechatroncs Electronc Industral and Control Engneerng (MEIC 015) Robust Watermarkng for Text Images Based on Arnold Scramblng and DWT-DCT Fan Wu College of Informaton Scence

More information

Virtual Machine Migration based on Trust Measurement of Computer Node

Virtual Machine Migration based on Trust Measurement of Computer Node Appled Mechancs and Materals Onlne: 2014-04-04 ISSN: 1662-7482, Vols. 536-537, pp 678-682 do:10.4028/www.scentfc.net/amm.536-537.678 2014 Trans Tech Publcatons, Swtzerland Vrtual Machne Mgraton based on

More information

Tsinghua University at TAC 2009: Summarizing Multi-documents by Information Distance

Tsinghua University at TAC 2009: Summarizing Multi-documents by Information Distance Tsnghua Unversty at TAC 2009: Summarzng Mult-documents by Informaton Dstance Chong Long, Mnle Huang, Xaoyan Zhu State Key Laboratory of Intellgent Technology and Systems, Tsnghua Natonal Laboratory for

More information

A New Token Allocation Algorithm for TCP Traffic in Diffserv Network

A New Token Allocation Algorithm for TCP Traffic in Diffserv Network A New Token Allocaton Algorthm for TCP Traffc n Dffserv Network A New Token Allocaton Algorthm for TCP Traffc n Dffserv Network S. Sudha and N. Ammasagounden Natonal Insttute of Technology, Truchrappall,

More information

Open Access Early Fire Smoke Image Segmentation in a Complex Large Space

Open Access Early Fire Smoke Image Segmentation in a Complex Large Space Send Orders for Reprnts to reprnts@benthamscence.ae The Open Constructon and Buldng Technology Journal, 2015, 9, 27-31 27 Open Access Early Fre Smoke Image Segmentaton n a Complex Large Space Hu Yan 1,2,*,

More information

Deep learning is a good steganalysis tool when embedding key is reused for different images, even if there is a cover source-mismatch

Deep learning is a good steganalysis tool when embedding key is reused for different images, even if there is a cover source-mismatch Deep learnng s a good steganalyss tool when embeddng key s reused for dfferent mages, even f there s a cover source-msmatch Lonel PIBRE 2,3, Jérôme PASQUET 2,3, Dno IENCO 2,3, Marc CHAUMONT 1,2,3 (1) Unversty

More information

Classifier Selection Based on Data Complexity Measures *

Classifier Selection Based on Data Complexity Measures * Classfer Selecton Based on Data Complexty Measures * Edth Hernández-Reyes, J.A. Carrasco-Ochoa, and J.Fco. Martínez-Trndad Natonal Insttute for Astrophyscs, Optcs and Electroncs, Lus Enrque Erro No.1 Sta.

More information

Research of Multiple Text Watermarks Technique in Electric Power System Texts

Research of Multiple Text Watermarks Technique in Electric Power System Texts Sensors & Transducers 203 by IFSA http://www.sensorsportal.com Research of Multple Text atermarks Technque n Electrc Power System Texts Xao-X XING, Qng CHEN, 2 Lan-X FU School of Optcal-Electrcal and Computer

More information

Empirical Distributions of Parameter Estimates. in Binary Logistic Regression Using Bootstrap

Empirical Distributions of Parameter Estimates. in Binary Logistic Regression Using Bootstrap Int. Journal of Math. Analyss, Vol. 8, 4, no. 5, 7-7 HIKARI Ltd, www.m-hkar.com http://dx.do.org/.988/jma.4.494 Emprcal Dstrbutons of Parameter Estmates n Bnary Logstc Regresson Usng Bootstrap Anwar Ftranto*

More information

A MOVING MESH APPROACH FOR SIMULATION BUDGET ALLOCATION ON CONTINUOUS DOMAINS

A MOVING MESH APPROACH FOR SIMULATION BUDGET ALLOCATION ON CONTINUOUS DOMAINS Proceedngs of the Wnter Smulaton Conference M E Kuhl, N M Steger, F B Armstrong, and J A Jones, eds A MOVING MESH APPROACH FOR SIMULATION BUDGET ALLOCATION ON CONTINUOUS DOMAINS Mark W Brantley Chun-Hung

More information

Problem Definitions and Evaluation Criteria for Computational Expensive Optimization

Problem Definitions and Evaluation Criteria for Computational Expensive Optimization Problem efntons and Evaluaton Crtera for Computatonal Expensve Optmzaton B. Lu 1, Q. Chen and Q. Zhang 3, J. J. Lang 4, P. N. Suganthan, B. Y. Qu 6 1 epartment of Computng, Glyndwr Unversty, UK Faclty

More information

A New Approach For the Ranking of Fuzzy Sets With Different Heights

A New Approach For the Ranking of Fuzzy Sets With Different Heights New pproach For the ankng of Fuzzy Sets Wth Dfferent Heghts Pushpnder Sngh School of Mathematcs Computer pplcatons Thapar Unversty, Patala-7 00 Inda pushpndersnl@gmalcom STCT ankng of fuzzy sets plays

More information

Available online at Available online at Advanced in Control Engineering and Information Science

Available online at   Available online at   Advanced in Control Engineering and Information Science Avalable onlne at wwwscencedrectcom Avalable onlne at wwwscencedrectcom Proceda Proceda Engneerng Engneerng 00 (2011) 15000 000 (2011) 1642 1646 Proceda Engneerng wwwelsevercom/locate/proceda Advanced

More information

A New Feature of Uniformity of Image Texture Directions Coinciding with the Human Eyes Perception 1

A New Feature of Uniformity of Image Texture Directions Coinciding with the Human Eyes Perception 1 A New Feature of Unformty of Image Texture Drectons Concdng wth the Human Eyes Percepton Xng-Jan He, De-Shuang Huang, Yue Zhang, Tat-Mng Lo 2, and Mchael R. Lyu 3 Intellgent Computng Lab, Insttute of Intellgent

More information

Private Information Retrieval (PIR)

Private Information Retrieval (PIR) 2 Levente Buttyán Problem formulaton Alce wants to obtan nformaton from a database, but she does not want the database to learn whch nformaton she wanted e.g., Alce s an nvestor queryng a stock-market

More information

OPTIMAL VIDEO SUMMARY GENERATION AND ENCODING. (ICIP Draft v0.2, )

OPTIMAL VIDEO SUMMARY GENERATION AND ENCODING. (ICIP Draft v0.2, ) OPTIMAL VIDEO SUMMARY GENERATION AND ENCODING + Zhu L, * Aggelos atsaggelos and + Bhavan Gandh (ICIP Draft v.2, -2-23) + Multmeda Communcaton Research Lab, Motorola Labs, Schaumburg * Department of Electrcal

More information

Robust and Reversible Relational Database Watermarking Algorithm Based on Clustering and Polar Angle Expansion

Robust and Reversible Relational Database Watermarking Algorithm Based on Clustering and Polar Angle Expansion Robust and Reversble Relatonal Database Watermarkng Algorthm Based on Clusterng and Polar Angle Expanson Zhyong L, Junmn Lu and Wecheng Tao College of Informaton Scence and Engneerng, Hunan Unversty, Changsha,

More information

Grading Image Retrieval Based on DCT and DWT Compressed Domains Using Low-Level Features

Grading Image Retrieval Based on DCT and DWT Compressed Domains Using Low-Level Features Journal of Communcatons Vol. 0 No. January 0 Gradng Image Retreval Based on DCT and DWT Compressed Domans Usng Low-Level Features Chengyou Wang Xnyue Zhang Rongyang Shan and Xao Zhou School of echancal

More information

Identify the Attack in Embedded Image with Steganalysis Detection Method by PSNR and RGB Intensity

Identify the Attack in Embedded Image with Steganalysis Detection Method by PSNR and RGB Intensity Internatonal Journal of Computer Systems (ISSN: 394-1065), Volume 03 Issue 07, July, 016 Avalable at http://www.jcsonlne.com/ Identfy the Attack n Embedded Image wth Steganalyss Detecton Method by PSNR

More information

Efficient Video Coding with R-D Constrained Quadtree Segmentation

Efficient Video Coding with R-D Constrained Quadtree Segmentation Publshed on Pcture Codng Symposum 1999, March 1999 Effcent Vdeo Codng wth R-D Constraned Quadtree Segmentaton Cha-Wen Ln Computer and Communcaton Research Labs Industral Technology Research Insttute Hsnchu,

More information

Image Emotional Semantic Retrieval Based on ELM

Image Emotional Semantic Retrieval Based on ELM Internatonal Conference on Logstcs Engneerng, Management and Computer Scence (LEMCS 2014) Image Emotonal Semantc Retreval Based on ELM Pele Zhang, Mn Yao, Shenzhang La College of computer scence & Technology

More information

Journal of Chemical and Pharmaceutical Research, 2014, 6(6): Research Article. A selective ensemble classification method on microarray data

Journal of Chemical and Pharmaceutical Research, 2014, 6(6): Research Article. A selective ensemble classification method on microarray data Avalable onlne www.ocpr.com Journal of Chemcal and Pharmaceutcal Research, 2014, 6(6):2860-2866 Research Artcle ISSN : 0975-7384 CODEN(USA) : JCPRC5 A selectve ensemble classfcaton method on mcroarray

More information

Local Quaternary Patterns and Feature Local Quaternary Patterns

Local Quaternary Patterns and Feature Local Quaternary Patterns Local Quaternary Patterns and Feature Local Quaternary Patterns Jayu Gu and Chengjun Lu The Department of Computer Scence, New Jersey Insttute of Technology, Newark, NJ 0102, USA Abstract - Ths paper presents

More information

An Improved Image Segmentation Algorithm Based on the Otsu Method

An Improved Image Segmentation Algorithm Based on the Otsu Method 3th ACIS Internatonal Conference on Software Engneerng, Artfcal Intellgence, Networkng arallel/dstrbuted Computng An Improved Image Segmentaton Algorthm Based on the Otsu Method Mengxng Huang, enjao Yu,

More information

A Clustering Algorithm for Key Frame Extraction Based on Density Peak

A Clustering Algorithm for Key Frame Extraction Based on Density Peak Journal of Computer and Communcatons, 2018, 6, 118-128 http://www.scrp.org/ournal/cc ISSN Onlne: 2327-5227 ISSN Prnt: 2327-5219 A Clusterng Algorthm for Key Frame Extracton Based on Densty Peak Hong Zhao

More information

Steganography System using Slantlet Transform

Steganography System using Slantlet Transform ISSN:43-6999 Journal of Inmaton Communcaton and Intellgence Systems (JICIS) Volume Issue February 06 Steganography System usng Slantlet Transm Ryadh Bassl Abduljabbar Abstract An approach hdng nmaton has

More information

Corner-Based Image Alignment using Pyramid Structure with Gradient Vector Similarity

Corner-Based Image Alignment using Pyramid Structure with Gradient Vector Similarity Journal of Sgnal and Informaton Processng, 013, 4, 114-119 do:10.436/jsp.013.43b00 Publshed Onlne August 013 (http://www.scrp.org/journal/jsp) Corner-Based Image Algnment usng Pyramd Structure wth Gradent

More information

IAJIT First Online Publication

IAJIT First Online Publication Content Protecton n Vdeo Data Based on Robust Dgtal Watermarkng Resstant to Intentonal and Unntentonal Attacks Mad Masoum and Shervn Amr Department of Electrcal Engneerng, Islamc Azad Unversty Qazvn Branch,

More information

X- Chart Using ANOM Approach

X- Chart Using ANOM Approach ISSN 1684-8403 Journal of Statstcs Volume 17, 010, pp. 3-3 Abstract X- Chart Usng ANOM Approach Gullapall Chakravarth 1 and Chaluvad Venkateswara Rao Control lmts for ndvdual measurements (X) chart are

More information

FEATURE EXTRACTION. Dr. K.Vijayarekha. Associate Dean School of Electrical and Electronics Engineering SASTRA University, Thanjavur

FEATURE EXTRACTION. Dr. K.Vijayarekha. Associate Dean School of Electrical and Electronics Engineering SASTRA University, Thanjavur FEATURE EXTRACTION Dr. K.Vjayarekha Assocate Dean School of Electrcal and Electroncs Engneerng SASTRA Unversty, Thanjavur613 41 Jont Intatve of IITs and IISc Funded by MHRD Page 1 of 8 Table of Contents

More information

Vector Quantization Codebook Design and Application Based on the Clonal Selection Algorithm

Vector Quantization Codebook Design and Application Based on the Clonal Selection Algorithm Sensors & Transducers 03 by IFSA http://www.sensorsportal.com Vector Quantzaton Codeboo Desgn and Applcaton Based on the Clonal Selecton Algorthm Menglng Zhao, Hongwe Lu School of Scence, Xdan Unversty,

More information

Using Fuzzy Logic to Enhance the Large Size Remote Sensing Images

Using Fuzzy Logic to Enhance the Large Size Remote Sensing Images Internatonal Journal of Informaton and Electroncs Engneerng Vol. 5 No. 6 November 015 Usng Fuzzy Logc to Enhance the Large Sze Remote Sensng Images Trung Nguyen Tu Huy Ngo Hoang and Thoa Vu Van Abstract

More information

A Novel Adaptive Descriptor Algorithm for Ternary Pattern Textures

A Novel Adaptive Descriptor Algorithm for Ternary Pattern Textures A Novel Adaptve Descrptor Algorthm for Ternary Pattern Textures Fahuan Hu 1,2, Guopng Lu 1 *, Zengwen Dong 1 1.School of Mechancal & Electrcal Engneerng, Nanchang Unversty, Nanchang, 330031, Chna; 2. School

More information

An Efficient Genetic Algorithm with Fuzzy c-means Clustering for Traveling Salesman Problem

An Efficient Genetic Algorithm with Fuzzy c-means Clustering for Traveling Salesman Problem An Effcent Genetc Algorthm wth Fuzzy c-means Clusterng for Travelng Salesman Problem Jong-Won Yoon and Sung-Bae Cho Dept. of Computer Scence Yonse Unversty Seoul, Korea jwyoon@sclab.yonse.ac.r, sbcho@cs.yonse.ac.r

More information

Performance Analysis of Data Hiding in MPEG-4 AAC Audio *

Performance Analysis of Data Hiding in MPEG-4 AAC Audio * TSINGHUA SCIENCE AND TECHNOLOGY ISSNll1007-0214ll07/21llpp55-61 Volume 14, Number 1, February 2009 Performance Analyss of Data Hdng n MPEG-4 AAC Audo * XU Shuzheng ( ) **, ZHANG Peng ( ), WANG Pengjun

More information

Network Intrusion Detection Based on PSO-SVM

Network Intrusion Detection Based on PSO-SVM TELKOMNIKA Indonesan Journal of Electrcal Engneerng Vol.1, No., February 014, pp. 150 ~ 1508 DOI: http://dx.do.org/10.11591/telkomnka.v1.386 150 Network Intruson Detecton Based on PSO-SVM Changsheng Xang*

More information

CHAPTER 2 PROPOSED IMPROVED PARTICLE SWARM OPTIMIZATION

CHAPTER 2 PROPOSED IMPROVED PARTICLE SWARM OPTIMIZATION 24 CHAPTER 2 PROPOSED IMPROVED PARTICLE SWARM OPTIMIZATION The present chapter proposes an IPSO approach for multprocessor task schedulng problem wth two classfcatons, namely, statc ndependent tasks and

More information

Degree-Constrained Minimum Spanning Tree Problem Using Genetic Algorithm

Degree-Constrained Minimum Spanning Tree Problem Using Genetic Algorithm Degree-Constraned Mnmum Spannng Tree Problem Usng Genetc Algorthm Keke Lu, Zhenxang Chen, Ath Abraham *, Wene Cao and Shan Jng Shandong Provncal Key Laboratory of Network Based Intellgent Computng Unversty

More information