DESIGNING STEGANOGRAPHIC DISTORTION USING DIRECTIONAL FILTERS. Vojtěch Holub and Jessica Fridrich

Size: px
Start display at page:

Download "DESIGNING STEGANOGRAPHIC DISTORTION USING DIRECTIONAL FILTERS. Vojtěch Holub and Jessica Fridrich"

Transcription

1 DESIGNING STEGANOGRAPHIC DISTORTION USING DIRECTIONAL FILTERS Vojtěch Holub an Jessica Fririch Department of ECE, SUNY Binghamton, NY, USA {vholub1, ABSTRACT This paper presents a new approach to efining aitive steganographic istortion in the spatial omain. The change in the output of irectional high-pass filters after changing one pixel is weighte an then aggregate using the reciprocal Höler norm to efine the iniviual pixel costs. In contrast to other aaptive embeing schemes, the aggregation rule is esigne to force the embeing changes to highly texture or noisy regions an to avoi clean eges. Consequently, the new embeing scheme appears markely more resistant to steganalysis using rich moels. The actual embeing algorithm is realize using synrome-trellis coes to minimize the expecte istortion for a given payloa. 1. INTRODUCTION Designing steganographic algorithms for empirical cover sources, such as igital images, is very challenging ue to the funamental lack of accurate moels. The most successful approach toay avois estimating the cover source istribution because this task is infeasible for complex an highly non stationary sources. Instea, the steganography problem is formulate as source coing with fielity constraint [2] the sener embes her message while minimizing an appropriately efine istortion. Practical algorithms that embe near the theoretical payloa istortion boun are available for a very general class of istortion functions [4, 2]. Within this framework, the only task left to the sener is essentially the esign of the istortion function. In an attempt to relate istortion with statistical etectability, the authors of [3] parametrize the istortion function an then searche for such values of the parameters that gave the smallest etectability evaluate as a margin between classes within a selecte feature space (cover moel). However, unless the cover moel is a complete statistical escriptor of the The work on this paper was supporte by Air Force Office of Scientific Research uner the research grant number FA The U.S. Government is authorize to reprouce an istribute reprints for Governmental purposes notwithstaning any copyright notation there on. The views an conclusions containe herein are those of the authors an shoul not be interprete as necessarily representing the official policies, either expresse or implie of AFOSR or the U.S. Government. The authors woul like to thank Jan Koovský for useful iscussions. empirical source [1], such optimize schemes may, paraoxically, en up being more etectable if the Waren esigns the etector outsie of the moel [11], which brings us back to the main an rather ifficult problem moeling the source. All of toay s most secure steganographic schemes for igital images use heuristically efine istortion functions that constrain the embeing changes to those parts of the image that are ifficult to moel (e.g., complex textures or noisy areas). In the JPEG omain, by far the most successful approach is built aroun istortion functions that measure istortion w.r.t. the raw, uncompresse image [9, 15, 16]. A natural way to efine the istortion function in the spatial omain is to assign pixel costs by measuring the impact of changing each pixel in a feature (moel) space using a weighte norm. Making the weights epenent on the pixel s local neighborhoo introuces esirable content aaptivity. An example of this approach is the embeing algorithm HUGO [14], which employs the SPAM feature moel. To the best knowlege of the authors, an base on the recent steganalysis stuy [6], HUGO is currently the most secure algorithm for embeing in the spatial omain even though its secure payloa has been substantially lowere by moern attacks initiate uring the BOSS competition [5] that employ high-imensional rich moels. In this paper, we approach the task of builing istortion functions in the spatial omain using a ifferent strategy. Instea of using a weighte norm in some steganalytic moel to compute the pixel costs, we employ a bank of irectional high-pass filters to obtain the so-calle irectional resiuals, which are relate to the preictability of the pixel in a certain irection. By measuring the impact of embeing on every irectional resiual an by suitably aggregating these impacts, we force the embeing cost to be high where the content is preictable in at least one irection (smooth areas an along eges) an low where the content is unpreictable in every irection (e.g., in texture or noisy areas). The resulting algorithm thus becomes highly aaptive an better resists steganalysis using rich moels. After introucing basic notation in Section 2, we list three steganographic methos with which new schemes will be compare using an empirical measure of security. In Section 3, we escribe the istortion function, incluing the filter banks for computing the irectional resiuals an the

2 aggregation rule. The purpose of the exploratory analysis of Section 4 is to assess the effect of various esign elements on security an select the setting that provies the highest empirical security. In Section 5, we subject the new scheme to steganalysis in the wavelet omain where the embeing costs are compute. The paper is conclue in Section PRELIMINARIES Capital an lower-case bolface symbols stan for matrices an vectors, respectively. The symbols X = (X ij ),Y = (Y ij ) {,...,255} n1 n2 will always be use an 8-bit grayscale cover (an the corresponing stego) image withn 1 n 2 pixels. For matrix X, X T is its transpose, X is X rotate by 18 egrees, an X is the matrix of absolute values Empirical security All experiments are conucte on BOSSbase ver. 1. [5] with 1 images. The steganographic security is evaluate empirically using binary classifiers traine on a given cover source an its stego version embee with a fixe payloa. With the exception of Section 5, we use the Spatial Rich Moel (SRM) [6] consisting of 16 symmetrize submoels with a total imension of 34, 671. All classifiers were implemente using the ensemble [12] with Fisher linear iscriminants as base learners. Security is quantifie using the ensemble s out-of-bag (OOB) error E OOB, which is an unbiase estimate of the testing error average over multiple bootstrap samples of the image source uring training [12] Steganography methos We compare the propose methos with HUGO, the Ege Aaptive (EA) algorithm [13], an Least Significant Bit Matching (LSBM). We use the embeing simulator [5] for HUGO operating at the theoretical payloa istortion boun with efault settings γ = 1, σ = 1, an the switch --T with T = 255 to remove the weakness reporte in [11]. LSBM was simulate at the ternary entropy boun. The coe for the EA algorithm with its custom coing scheme was obtaine from the authors. 3. DISTORTION FUNCTION DESIGN We restrict our esign to aitive istortion in the form: n 1 n 2 D(X,Y) = ρ ij (X,Y ij ) X ij Y ij, (1) i=1 j=1 where ρ ij are the costs of changing pixel X ij to Y ij. The aitivity means that we o not consier the effects of iniviual embeing changes influencing each other. We opte KB K (1) = Sobel K (1) =, K (2) = (K (1) ) T WDFB-H WDFB-D h = Haar wavelet ecomp. low-pass g = Haar wavelet ecomp. high-pass h = Daubechies 8 wavelet ecomp. low-pass g = Daubechies 8 wavelet ecomp. high-pass K (1) = h g T, K (2) = g h T, K (3) = g g T Table 1. Filter banks use in this paper. for this mainly to simplify the esign. Since the embeing algorithm will be force to concentrate the embeing moifications into highly texture/noisy areas, using the Gibbs construction [2] with non-aitive istortion functions may have an aitional beneficial impact on security. The authors contemplate investigating this irection as part of future research. Having efine the pixel costsρ ij, embeing a (pseuo) ranom sequence of bits with minimal expecte istortion (1) is equivalent to source coing with a fielity criterion. A practical algorithm, base on Synrome-Trellis Coes (STCs), that embes near the payloa istortion boun was propose in [4]. It works in the ual omain to better cover the range of small payloas typically neee for steganography. The STC Toolbox, which we also use in this paper to implement all our schemes, can be ownloae from Directional Filters As alreay reporte by its authors, the istortion function of HUGO concentrates the embeing changes primarily in textures an eges. However, the content along an ege can usually be well moele using locally polynomial moels, which ais the etection [7, 6, 8]. Thus, whenever possible the embeing algorithm shoul embe into texture/noisy areas that are not easily moellable in any irection. To this en, we evaluate the smoothness in multiple irections using a filter bankb n = {K (1),...,K (n) } consisting ofnmultiple irectional high-pass filters represente by their kernels normalize so that alll 2 -norms K (k) 2 are the same. Thek-th resiualr (k),k = 1,...,n, is compute asr (k) = K (k) X, where is a convolution mirror-pae so that R (k) has

3 againn 1 n 2 elements. (The mirror-paing prevents introucing embeing artifacts at image bounary.) If the resiual values R (k) ij are large for some ij an for all k, it means that the local content at pixel x ij is not smooth in any irection an thus ifficult to moel. Since we want to etect eges in all irections, it is natural to use establishe ege etectors for the filter banks (see Table 1). The non-irectional KB filter [1] is often use in steganalysis, while the Sobel operator is a common ege etector. Wavelet-base Directional Filter Banks WDFB-H an WDFB-D use the Haar an Daubechies 8-tap wavelets. The computation of the resiual coincies with the first-level wavelet ecomposition with no ecimation. The wavelet banks consist of three filters, K (1),K (2),K (3), using which the LH, HL, an HH irectional resiuals are obtaine. Given the wavelet s 1-D low-pass ecomposition filter h an a highpass ecomposition filter g, the 2-D irectional filters are compute as shown in Table Aggregating embeing suitability The embeing shoul prefer changing large values of irectional resiuals, where the textures an eges are, an preserve the small values, where the content is preictable. One way to achieve this is to weigh the ifference between R (k) an the same resiual after changing only one pixel atij (enoter (k) [ij] ) by the wavelet coefficient itself: ξ (k) ij = R (k) R (k) R (k) [ij] (a) = R (k) K (k). (2) The quantity ξ (k) ij, which we call embeing suitability, is formally a correlation between the absolute value of the cover resiual with the absolute value of the resiual change. Since R (k) R (k) [ij] is the spatially shifte irectional filter K(k), ξ (k) ij can be compute for all pixels at once (equality(a)). Next, we compute the embeing costs ρ ij by aggregating all suitabilities ξ (k) ij, k = 1,...,n. Since we wish to restrict the embeing changes to those pixels with complex content in every irection, the aggregation rule ρ : R n R +, ρ ij = ρ(ξ (1) ij,...,ξ(n) ij ) is require to have the following properties: A1. The larger the values of ξ (k) ij, the smaller the ρ ij shoul be. A2. If there exists k {1,...,n} such that ξ (k) ij =, then ρ ij = +. A simple function that meets both requirements is the reciprocal Höler norm with p < : ρ (p) ij = ( n k=1 ) 1 p ξ (k) ij p. (3) SRM EOOB p Fig. 1. E OOB as a function of the Höler-norm parameter p when embeing at bpp with the WDFB. SRM EOOB.5 Payloa (bpp) HUGO KB Sobel WDFB-H WDFB-D Fig. 2. Evaluating the security of several ifferent filter banks using the OOB estimate of the testing error,e OOB. We restrict the embeing changes to±1, X ij Y ij = 1. Note that ue to the absolute value in (2), both changes result in the same embeing cost, which allows us to use the more powerful multi-layere version of STCs [4] also available in the STC Toolbox (see Section 4.4 for a iscussion of how ifferent coing schemes affect the security). 4. EXPERIMENTS In this section, we first assess how various esign parameters, such as p, the filter bank, an coing, affect security. Then, the most secure setting is ientifie an compare with HUGO, EA, an LSBM Aggregation rule To obtain an insight as to which value of p shoul be use in the aggregation rule (3), in Fig. 1 we plot E OOB (p) for the WDFB when embeing the payloa of bpp (bits per pixel). While for p < the security appears almost constant, for p > the requirement A2 is longer vali the costs at

4 smooth eges ecrease, which lowers the security. A similar epenence of security on p was observe for other filter banks. Thus, for concreteness an simplicity, we fix the value of the parameterp top = Assessing filter banks Fig. 2 shows the OOB error estimate for filter banks liste in Table 1. Among them, the WDFB-D achieves the best steganographic security. We call this embeing algorithm WOW (Wavelet Obtaine Weights). All the other filters achieve comparable security with HUGO, even the WDFB-H with support of size only2 2. Encourage with the success of the Daubechies 8-tap wavelet-base filter bank, we experimente with several other wavelet bases, incluing the Biorthogonal 44 wavelets, only to achieve very similar results in terms of the E OOB. SRM EOOB.5 Payloa (bpp) WOW ternary sim. WOW ternary STC WOW binary sim. WOW binary STC HUGO sim Comparison to prior art Fig. 3 shows the comparison between WOW an three other algorithms using the SRM moel (left) an a moel constructe using epenencies in the wavelet omain (see Section 5 for more etails). The improvement over HUGO is especially apparent for large payloas at bpp, thee OOB of WOW is almost twice as high as that of HUGO. Fig. 4. OOB error estimate of the testing error, E OOB, for WOW implemente using binary an ternary STCs versus simulate optimal embeing. Note the large gain of ternary STCs versus their binary version. Also note that the coing loss is quite small The effect of coing As alreay mentione in Section 3.2, since the costs (3) o not epen on the irection of the embeing change, WOW can use the ternary multi-layere version of STCs. Fig. 4 shows that the gain of using the ternary STCs over their binary version is quite significant. At the same time, the coing loss of STCs w.r.t. optimal embeing operating at the payloa istortion boun is rather small. The last comment above might suggest that HUGO might be improve using ternary embeing instea of binary. However, since HUGO embes only in the irection of smaller istortion an allows interaction among moifications, it is not clear how to implement ternary embeing an what the security impact woul be WOW aaptivity In Fig. 5, we contrast the placement of embeing changes for HUGO an for WOW. The selecte cover image has numerous horizontal an vertical eges an also some texture areas. While HUGO embes with high probability into the pillar eges as well as the horizontal lines above the pillars, WOW embes solely into the texture areas as ictate by the aggregation rule (3)..6 Fig. 5. Embeing probability for payloa bpp using HUGO (bottom left) an WOW (bottom right) for a grayscale cover image (top).

5 SRM EOOB.5 Payloa (bpp) WOW HUGO EA LSBM IaB EOOB WOW HUGO EA LSBM.5 Payloa (bpp) Fig. 3. Comparing statistical etectability of WOW an three state-of-the-art embeing algorithms using the SRM (left) an wavelet-omain epenencies (right). 5. STEGANALYSIS IN WAVELET DOMAIN The most successful steganalysis attacks have always been built in the embeing omain. Although WOW embes in the spatial omain, which is well covere by the SRM, the costs are compute in a transform omain. The goal of this section is to investigate whether WOW can be attacke in the wavelet omain by forming features that capture epenencies among wavelet coefficients. Inspire by how steganalysis features are built in the JPEG omain, we explore the following four logical possibilities graphically shown in Fig. 6: 4-D co-occurrence matrices built from four consecutive wavelet coefficients exploiting epenencies a) intra ban (IaB), b) inter level, c) a mix of intra level an inter level, an ) intra level, inter ban. The IaB features are similar in spirit to the SRM provie the wavelet coefficients are interprete as noise resiuals. Since the IaB features were much more successful in etecting WOW when compare to the other three possibilities b) ), we only provie etaile iscussion for case a). The coefficients were compute using the stanar unecimate iscrete wavelet ecomposition with the Daubechies 8 wavelet (to steganalyze in the omain where WOW computes its costs). Let S (l,s) = {c (l,s) ij }, l {1,2,3}, s {LH,HL,HH}, be the unecimate sth subban in the lth level of the wavelet transform. Assuming that n 1 = 2 k1, n 2 = 2 k2 for some k 1,k 2 Z, the range of subscripts for c (l,s) ij is i = {1,...,2 k1 l+1 } anj = {1,...,2 k2 l+1 }. The steganalytic features are four-imensional co-occurrence matrices forme by groups of four horizontally an vertically ajacent coefficients after truncation an quantization to a ( ) finite ynamic range, c (l,s) ij roun trunc T (c (l,s) ij /q), where q is a quantization step an trunc T (x) = x for x [ T,T], trunc T (x) = T sign(x) otherwise. The horizontal co-occurrence matrix is enote as { C (h,l,s), = ( 1,..., 4 ) { T,...,T} 4, C (h,l,s) = 1,c (l,s) i,j+1 = 2,c (l,s) i,j+2 = 3,c (l,s) i,j+3 = 4 matrixc (v,l,s) (i,j) }, with the vertical c (l,s) ij = efine analogically. We built three co-occurrence matrices for each level l {1,2,3}. In Fig. 6a), enote by a triangle is the cooccurrence C (1,l) C (h,l,lh) + C (v,l,hl). The squares correspon to C (2,l) C (v,l,lh) + C (h,l,hl), while the circles markc (3,l) C (h,l,hh) +C (v,l,hh). In this paper, we use T = 2, which gave each cooccurrence matrix C (i,l) the imensionality of (2T + 1) 4 = 625. Since i {1,2,3} an l {1,2,3}, the total number of co-occurrence matrices is 9, giving the final feature vector a imensionality of = 5,625. A brief stuy on the effect of the quantization step q [,5] on E OOB showe that the best performance was usually obtaine for q 1. Thus, in all our experiments, we setq = 1. Fig. 3 (right) shows the results of steganalysis using the IaB features. WOW still achieves better security than any other teste metho. The overall etection performance of the IaB features is, however, inferior to the SRM (left). 6. CONCLUSION This paper confirms what has been suspecte before restricting the embeing changes to textures while avoiing clean

6 a) b) c) ) Fig. 6. Four types of groups of wavelet coefficients from which 4-D co-occurrence matrices were built to steganalyze WOW. eges greatly improves steganographic security. This high level of aaptivity was achieve through a novel esign of the steganographic istortion function. First, a irectional filter bank is use to etect eges in local neighborhoos of each pixel. Then the changes in the resiuals cause by embeing are weighte an aggregate using a special rule esigne to output a low embeing cost only when the local content is not smooth in any irection. Accoring to our experiments, 2-D wavelet ecomposition filters provie the highest level of steganographic security measure empirically for a given image source (atabase) an classifiers operating in high-imensional feature spaces (rich image moels). The propose algorithm, WOW, outperforms the current state-of-the-art HUGO by a significant margin especially for large payloas. Further potential improvement is possible by employing better irectional filter banks an by using non-aitive istortion to moel interaction of embeing changes. 7. REFERENCES [1] R. Böhme. Improve Statistical Steganalysis Using Moels of Heterogeneous Cover Signals. PhD thesis, Faculty of Comp. Sci., TU Dresen, Germany, 28. [2] T. Filler an J. Fririch. Gibbs construction in steganography. IEEE TIFS, 5(4):75 72, 21. [3] T. Filler an J. Fririch. Design of aaptive steganographic schemes for igital images. In Proc. SPIE, Elec. Img., Meia Watermarking, Sec. an Forensics of Multimeia XIII, volume 788, pages OF 1 14, 211. [4] T. Filler, J. Juas, an J. Fririch. Minimizing aitive istortion in steganography using synrome-trellis coes. IEEE TIFS, 6(3):92 935, September 211. [5] T. Filler, T. Pevný, an P. Bas. BOSS (Break Our Steganography System). July 21. [6] J. Fririch an J. Koovský. Rich moels for steganalysis of igital images. IEEE TIFS, 7(3): , 211. [7] J. Fririch, J. Koovský, M. Goljan, an V. Holub. Steganalysis of content-aaptive steganography in spatial omain. In Information Hiing, 13th Int. Conf., volume 6958 of Springer LNCS, pages , 211. [8] G. Gül an F. Kurugollu. A new methoology in steganalysis : Breaking highly unetactable steganograpy (HUGO). In Information Hiing, 13th Int. Conf., volume 6958 of Springer LNCS, pages 71 84, 211. [9] Y. Kim, Z. Duric, an D. Richars. Moifie matrix encoing technique for minimal istortion steganography. In Information Hiing, 8th Int. Workshop, volume 4437 of Springer LNCS, pages , 26. [1] J. Koovský an J. Fririch. On completeness of feature spaces in blin steganalysis. In Proc. of the 1th ACM MM&Sec Workshop, pages , 28. [11] J. Koovský, J. Fririch, an V. Holub. On angers of overtraining steganography to incomplete cover moel. In Proc. of the 13th ACM MM&Sec Workshop, pages 69 76, 211. [12] J. Koovský, J. Fririch, an V. Holub. Ensemble classifiers for steganalysis of igital meia. IEEE TIFS, 7(2): , 212. [13] W. Luo, F. Huang, an J. Huang. Ege aaptive image steganography base on LSB matching revisite. IEEE TIFS, 5(2):21 214, June 21. [14] T. Pevný, T. Filler, an P. Bas. Using high-imensional image moels to perform highly unetectable steganography. In Information Hiing, 12th Int. Conf., volume 6387 of Springer LNCS, pages , 21. [15] V. Sachnev, H. J. Kim, an R. Zhang. Less etectable JPEG steganography metho base on heuristic optimization an BCH synrome coing. In Proc. of the 11th ACM MM&Sec Workshop, pages , 29. [16] C. Wang an J. Ni. An efficient JPEG steganographic scheme base on the block entropy of DCT coefficents. In Proc. of IEEE ICASSP, Kyoto, Japan, 212.

On Dangers of Overtraining Steganography to Incomplete Cover Model

On Dangers of Overtraining Steganography to Incomplete Cover Model On Dangers of Overtraining Steganography to Incomplete Cover Moel Jan Koovský Binghamton University Department of ECE Binghamton, NY 1392-6 jan.koovsky@ binghamton.eu Jessica Fririch Binghamton University

More information

Optimizing Pixel Predictors for Steganalysis

Optimizing Pixel Predictors for Steganalysis Optimizing Pixel Predictors for Steganalysis Vojtěch Holub and Jessica Fridrich Dept. of Electrical and Computer Engineering SUNY Binghamton, New York IS&T / SPIE 2012, San Francisco, CA Steganography

More information

Adaptive Spatial Steganography Based on the Correlation of Wavelet Coefficients for Digital Images in Spatial Domain Ningbo Li, Pan Feng, Liu Jia

Adaptive Spatial Steganography Based on the Correlation of Wavelet Coefficients for Digital Images in Spatial Domain Ningbo Li, Pan Feng, Liu Jia 216 International Conference on Information Engineering and Communications Technology (IECT 216) ISBN: 978-1-69-37- Adaptive Spatial Steganography Based on the Correlation of Wavelet Coefficients for Digital

More information

Reversible Image Watermarking using Bit Plane Coding and Lifting Wavelet Transform

Reversible Image Watermarking using Bit Plane Coding and Lifting Wavelet Transform 250 IJCSNS International Journal of Computer Science an Network Security, VOL.9 No.11, November 2009 Reversible Image Watermarking using Bit Plane Coing an Lifting Wavelet Transform S. Kurshi Jinna, Dr.

More information

Defining Cost Functions for Adaptive Steganography at the Microscale

Defining Cost Functions for Adaptive Steganography at the Microscale Defining Cost Functions for Adaptive Steganography at the Microscale Kejiang Chen, Weiming Zhang, Hang Zhou, Nenghai Yu CAS Key Laboratory of Electromagnetic Space Information University of Science and

More information

Transient analysis of wave propagation in 3D soil by using the scaled boundary finite element method

Transient analysis of wave propagation in 3D soil by using the scaled boundary finite element method Southern Cross University epublications@scu 23r Australasian Conference on the Mechanics of Structures an Materials 214 Transient analysis of wave propagation in 3D soil by using the scale bounary finite

More information

A Study on Different JPEG Steganograhic Schemes

A Study on Different JPEG Steganograhic Schemes A Study on Different JPEG Steganograhic Schemes Alphy Ros Mathew, Sreekumar K Department of Computer Science, College of Engineering,Ponjar, Cochin University of Science And Technology Kottayam,Kerala,India

More information

The Journal of Systems and Software

The Journal of Systems and Software The Journal of Systems an Software 83 (010) 1864 187 Contents lists available at ScienceDirect The Journal of Systems an Software journal homepage: www.elsevier.com/locate/jss Embeing capacity raising

More information

Tight Wavelet Frame Decomposition and Its Application in Image Processing

Tight Wavelet Frame Decomposition and Its Application in Image Processing ITB J. Sci. Vol. 40 A, No., 008, 151-165 151 Tight Wavelet Frame Decomposition an Its Application in Image Processing Mahmu Yunus 1, & Henra Gunawan 1 1 Analysis an Geometry Group, FMIPA ITB, Banung Department

More information

Shift-map Image Registration

Shift-map Image Registration Shift-map Image Registration Svärm, Linus; Stranmark, Petter Unpublishe: 2010-01-01 Link to publication Citation for publishe version (APA): Svärm, L., & Stranmark, P. (2010). Shift-map Image Registration.

More information

Toss that BOSSbase, Alice!

Toss that BOSSbase, Alice! Toss that BOSSbase, Alice! Vahid Sedighi, Jessica Fridrich, Rémi Cogranne To cite this version: Vahid Sedighi, Jessica Fridrich, Rémi Cogranne. Toss that BOSSbase, Alice!. IS&T intl symposium on Electronic

More information

Rich Models for Steganalysis of Digital Images

Rich Models for Steganalysis of Digital Images 1 Rich Models for Steganalysis of Digital Images Jessica Fridrich, Member, IEEE and Jan Kodovský Abstract We describe a novel general strategy for building steganography detectors for digital images. The

More information

Breaking the OutGuess

Breaking the OutGuess Breaking the OutGuess Jessica Fridrich, Miroslav Goljan, Dorin Hogea * presented by Deepa Kundur Department of Electrical and Computer Engineering * Department of Computer Science SUNY Binghamton, Binghamton,

More information

Optimizing Pixel Predictors for Steganalysis

Optimizing Pixel Predictors for Steganalysis Optimizing Pixel Predictors for Steganalysis Vojtěch Holub and Jessica Fridrich Department of C, SUNY Binghamton, NY, USA {vholub1,fridrich}@binghamton.edu ABSTRACT A standard way to design steganalysis

More information

Evolving Distortion Function By Exploiting The Differences Among Comparable Adaptive Steganography

Evolving Distortion Function By Exploiting The Differences Among Comparable Adaptive Steganography 2016 12th International Conference on Natural Computation, Fuzzy Systems and Knowledge Discovery (ICNC-FSKD) Evolving Distortion Function By Exploiting The Differences Among Comparable Adaptive Steganography

More information

Rough Set Approach for Classification of Breast Cancer Mammogram Images

Rough Set Approach for Classification of Breast Cancer Mammogram Images Rough Set Approach for Classification of Breast Cancer Mammogram Images Aboul Ella Hassanien Jafar M. H. Ali. Kuwait University, Faculty of Aministrative Science, Quantitative Methos an Information Systems

More information

Selection-Channel-Aware Rich Model for Steganalysis of Digital Images

Selection-Channel-Aware Rich Model for Steganalysis of Digital Images Selection-Channel-Aware Rich Model for Steganalysis of Digital Images Tomáš Denemark, Vahid Sedighi, Vojtěch Holub Department of ECE Binghamton University Binghamton, NY 13902-6000 {tdenema1,vsedigh1}@binghamton.edu

More information

STEGANOGRAPHY is a technique for covert communication,

STEGANOGRAPHY is a technique for covert communication, This article has been accepted for publication in a future issue of this journal, but has not been fully edited. Content may change prior to final publication. Citation information: DOI 0.09/TCSVT.206.2587388,

More information

Feature Extraction and Rule Classification Algorithm of Digital Mammography based on Rough Set Theory

Feature Extraction and Rule Classification Algorithm of Digital Mammography based on Rough Set Theory Feature Extraction an Rule Classification Algorithm of Digital Mammography base on Rough Set Theory Aboul Ella Hassanien Jafar M. H. Ali. Kuwait University, Faculty of Aministrative Science, Quantitative

More information

Open Access Adaptive Image Enhancement Algorithm with Complex Background

Open Access Adaptive Image Enhancement Algorithm with Complex Background Sen Orers for Reprints to reprints@benthamscience.ae 594 The Open Cybernetics & Systemics Journal, 205, 9, 594-600 Open Access Aaptive Image Enhancement Algorithm with Complex Bacgroun Zhang Pai * epartment

More information

Using Vector and Raster-Based Techniques in Categorical Map Generalization

Using Vector and Raster-Based Techniques in Categorical Map Generalization Thir ICA Workshop on Progress in Automate Map Generalization, Ottawa, 12-14 August 1999 1 Using Vector an Raster-Base Techniques in Categorical Map Generalization Beat Peter an Robert Weibel Department

More information

With ever-increasing growth of electronic

With ever-increasing growth of electronic Journal of Advances in Computer Engineering and Technology, 3(2) 2017 Parallelization of Rich Models for Steganalysis of Digital Images using a CUDA-based Approach Mahmoud Kazemi 1, Meysam Mirzaee 2, Reza

More information

Fast Fractal Image Compression using PSO Based Optimization Techniques

Fast Fractal Image Compression using PSO Based Optimization Techniques Fast Fractal Compression using PSO Base Optimization Techniques A.Krishnamoorthy Visiting faculty Department Of ECE University College of Engineering panruti rishpci89@gmail.com S.Buvaneswari Visiting

More information

Image Segmentation using K-means clustering and Thresholding

Image Segmentation using K-means clustering and Thresholding Image Segmentation using Kmeans clustering an Thresholing Preeti Panwar 1, Girhar Gopal 2, Rakesh Kumar 3 1M.Tech Stuent, Department of Computer Science & Applications, Kurukshetra University, Kurukshetra,

More information

Universal distortion function for steganography in an arbitrary domain

Universal distortion function for steganography in an arbitrary domain Holub et al. EURASIP Journal on Information Security 2014, 2014:1 RESEARCH Open Access Universal distortion function for steganography in an arbitrary domain Vojtěch Holub *, Jessica Fridrich and Tomáš

More information

Steganalysis of Content-Adaptive Steganography in Spatial Domain

Steganalysis of Content-Adaptive Steganography in Spatial Domain Steganalysis of Content-Adaptive Steganography in Spatial Domain Jessica Fridrich, Jan Kodovský, Vojtěch Holub, and Miroslav Goljan Department of ECE, SUNY Binghamton, NY, USA {fridrich,jan.kodovsky,vholub1,mgoljan}@binghamton.edu

More information

Design of Policy-Aware Differentially Private Algorithms

Design of Policy-Aware Differentially Private Algorithms Design of Policy-Aware Differentially Private Algorithms Samuel Haney Due University Durham, NC, USA shaney@cs.ue.eu Ashwin Machanavajjhala Due University Durham, NC, USA ashwin@cs.ue.eu Bolin Ding Microsoft

More information

Research Article A Novel Steganalytic Algorithm based on III Level DWT with Energy as Feature

Research Article A Novel Steganalytic Algorithm based on III Level DWT with Energy as Feature Research Journal of Applied Sciences, Engineering and Technology 7(19): 4100-4105, 2014 DOI:10.19026/rjaset.7.773 ISSN: 2040-7459; e-issn: 2040-7467 2014 Maxwell Scientific Publication Corp. Submitted:

More information

THE BAYESIAN RECEIVER OPERATING CHARACTERISTIC CURVE AN EFFECTIVE APPROACH TO EVALUATE THE IDS PERFORMANCE

THE BAYESIAN RECEIVER OPERATING CHARACTERISTIC CURVE AN EFFECTIVE APPROACH TO EVALUATE THE IDS PERFORMANCE БСУ Международна конференция - 2 THE BAYESIAN RECEIVER OPERATING CHARACTERISTIC CURVE AN EFFECTIVE APPROACH TO EVALUATE THE IDS PERFORMANCE Evgeniya Nikolova, Veselina Jecheva Burgas Free University Abstract:

More information

Characterizing Decoding Robustness under Parametric Channel Uncertainty

Characterizing Decoding Robustness under Parametric Channel Uncertainty Characterizing Decoing Robustness uner Parametric Channel Uncertainty Jay D. Wierer, Wahee U. Bajwa, Nigel Boston, an Robert D. Nowak Abstract This paper characterizes the robustness of ecoing uner parametric

More information

Adaptive Pixel Pair Matching Technique for Data Embedding

Adaptive Pixel Pair Matching Technique for Data Embedding Available Online at www.ijcsmc.com International Journal of Computer Science and Mobile Computing A Monthly Journal of Computer Science and Information Technology IJCSMC, Vol. 3, Issue. 1, January 2014,

More information

Texture Recognition with combined GLCM, Wavelet and Rotated Wavelet Features

Texture Recognition with combined GLCM, Wavelet and Rotated Wavelet Features International Journal of Computer an Electrical Engineering, Vol.3, No., February, 793-863 Texture Recognition with combine GLCM, Wavelet an Rotate Wavelet Features Dipankar Hazra Abstract Aim of this

More information

Modern Steganalysis Can Detect YASS

Modern Steganalysis Can Detect YASS Jan Kodovský, Tomáš Pevný, Jessica Fridrich January 18, 2010 / SPIE 1 / 13 YASS Curriculum Vitae Birth Location: University of California, Santa Barbara Birth Date: More than 2 years ago [Solanki-2007],

More information

An Algorithm for Building an Enterprise Network Topology Using Widespread Data Sources

An Algorithm for Building an Enterprise Network Topology Using Widespread Data Sources An Algorithm for Builing an Enterprise Network Topology Using Wiesprea Data Sources Anton Anreev, Iurii Bogoiavlenskii Petrozavosk State University Petrozavosk, Russia {anreev, ybgv}@cs.petrsu.ru Abstract

More information

Shift-map Image Registration

Shift-map Image Registration Shift-map Image Registration Linus Svärm Petter Stranmark Centre for Mathematical Sciences, Lun University {linus,petter}@maths.lth.se Abstract Shift-map image processing is a new framework base on energy

More information

where ρ i (x, y i ) denotes the cost of changing the i-th cover element from x i to y i. With the syndrome coding, the minimal

where ρ i (x, y i ) denotes the cost of changing the i-th cover element from x i to y i. With the syndrome coding, the minimal 814 IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, VOL. 9, NO. 5, MAY 2014 Uniform Embedding for Efficient JPEG Steganography Linjie Guo, Student Member, IEEE, Jiangqun Ni, Member, IEEE, and

More information

Which gray level should be given the smallest cost for adaptive steganography?

Which gray level should be given the smallest cost for adaptive steganography? DOI 10.1007/s11042-017-4565-5 Which gray level should be given the smallest cost for adaptive steganography? Yao Wei 1,2 Weiming Zhang 1 Weihai Li 1,2 Nenghai Yu 1,2 Xi Sun 1,2 Received: 9 September 2016

More information

A fast embedded selection approach for color texture classification using degraded LBP

A fast embedded selection approach for color texture classification using degraded LBP A fast embee selection approach for color texture classification using egrae A. Porebski, N. Vanenbroucke an D. Hama Laboratoire LISIC - EA 4491 - Université u Littoral Côte Opale - 50, rue Ferinan Buisson

More information

Text Particles Multi-band Fusion for Robust Text Detection

Text Particles Multi-band Fusion for Robust Text Detection Text Particles Multi-ban Fusion for Robust Text Detection Pengfei Xu, Rongrong Ji, Hongxun Yao, Xiaoshuai Sun, Tianqiang Liu, an Xianming Liu School of Computer Science an Engineering Harbin Institute

More information

Comparative Study of Projection/Back-projection Schemes in Cryo-EM Tomography

Comparative Study of Projection/Back-projection Schemes in Cryo-EM Tomography Comparative Stuy of Projection/Back-projection Schemes in Cryo-EM Tomography Yu Liu an Jong Chul Ye Department of BioSystems Korea Avance Institute of Science an Technology, Daejeon, Korea ABSTRACT In

More information

Message Transport With The User Datagram Protocol

Message Transport With The User Datagram Protocol Message Transport With The User Datagram Protocol User Datagram Protocol (UDP) Use During startup For VoIP an some vieo applications Accounts for less than 10% of Internet traffic Blocke by some ISPs Computer

More information

Correlation-based color mosaic interpolation using a connectionist approach

Correlation-based color mosaic interpolation using a connectionist approach Correlation-base color mosaic interpolation using a connectionist approach Gary L. Embler * Agilent Technologies, Inc. 75 Bowers Avenue, MS 87H Santa Clara, California 9554 USA ABSTRACT This paper presents

More information

Refinement of scene depth from stereo camera ego-motion parameters

Refinement of scene depth from stereo camera ego-motion parameters Refinement of scene epth from stereo camera ego-motion parameters Piotr Skulimowski, Pawel Strumillo An algorithm for refinement of isparity (epth) map from stereoscopic sequences is propose. The metho

More information

Evolutionary Optimisation Methods for Template Based Image Registration

Evolutionary Optimisation Methods for Template Based Image Registration Evolutionary Optimisation Methos for Template Base Image Registration Lukasz A Machowski, Tshilizi Marwala School of Electrical an Information Engineering University of Witwatersran, Johannesburg, South

More information

Steganalysis of Overlapping Images

Steganalysis of Overlapping Images Steganalysis of Overlapping Images James M. Whitaker and Andrew D. Ker Oxford University Department of Computer Science, Parks Road, Oxford OX1 3QD, England. ABSTRACT We examine whether steganographic

More information

MORA: a Movement-Based Routing Algorithm for Vehicle Ad Hoc Networks

MORA: a Movement-Based Routing Algorithm for Vehicle Ad Hoc Networks : a Movement-Base Routing Algorithm for Vehicle A Hoc Networks Fabrizio Granelli, Senior Member, Giulia Boato, Member, an Dzmitry Kliazovich, Stuent Member Abstract Recent interest in car-to-car communications

More information

Intensive Hypercube Communication: Prearranged Communication in Link-Bound Machines 1 2

Intensive Hypercube Communication: Prearranged Communication in Link-Bound Machines 1 2 This paper appears in J. of Parallel an Distribute Computing 10 (1990), pp. 167 181. Intensive Hypercube Communication: Prearrange Communication in Link-Boun Machines 1 2 Quentin F. Stout an Bruce Wagar

More information

6 Gradient Descent. 6.1 Functions

6 Gradient Descent. 6.1 Functions 6 Graient Descent In this topic we will iscuss optimizing over general functions f. Typically the function is efine f : R! R; that is its omain is multi-imensional (in this case -imensional) an output

More information

A Comparative Evaluation of Iris and Ocular Recognition Methods on Challenging Ocular Images

A Comparative Evaluation of Iris and Ocular Recognition Methods on Challenging Ocular Images A Comparative Evaluation of Iris an Ocular Recognition Methos on Challenging Ocular Images Vishnu Naresh Boeti Carnegie Mellon University Pittsburgh, PA 523 naresh@cmu.eu Jonathon M Smereka Carnegie Mellon

More information

Kinematic Analysis of a Family of 3R Manipulators

Kinematic Analysis of a Family of 3R Manipulators Kinematic Analysis of a Family of R Manipulators Maher Baili, Philippe Wenger an Damien Chablat Institut e Recherche en Communications et Cybernétique e Nantes, UMR C.N.R.S. 6597 1, rue e la Noë, BP 92101,

More information

Generalized Edge Coloring for Channel Assignment in Wireless Networks

Generalized Edge Coloring for Channel Assignment in Wireless Networks Generalize Ege Coloring for Channel Assignment in Wireless Networks Chun-Chen Hsu Institute of Information Science Acaemia Sinica Taipei, Taiwan Da-wei Wang Jan-Jan Wu Institute of Information Science

More information

An Adaptive Routing Algorithm for Communication Networks using Back Pressure Technique

An Adaptive Routing Algorithm for Communication Networks using Back Pressure Technique International OPEN ACCESS Journal Of Moern Engineering Research (IJMER) An Aaptive Routing Algorithm for Communication Networks using Back Pressure Technique Khasimpeera Mohamme 1, K. Kalpana 2 1 M. Tech

More information

Learning Polynomial Functions. by Feature Construction

Learning Polynomial Functions. by Feature Construction I Proceeings of the Eighth International Workshop on Machine Learning Chicago, Illinois, June 27-29 1991 Learning Polynomial Functions by Feature Construction Richar S. Sutton GTE Laboratories Incorporate

More information

THE increasingly digitized power system offers more data,

THE increasingly digitized power system offers more data, 1 Cyber Risk Analysis of Combine Data Attacks Against Power System State Estimation Kaikai Pan, Stuent Member, IEEE, Anré Teixeira, Member, IEEE, Milos Cvetkovic, Member, IEEE, an Peter Palensky, Senior

More information

Classifying Facial Expression with Radial Basis Function Networks, using Gradient Descent and K-means

Classifying Facial Expression with Radial Basis Function Networks, using Gradient Descent and K-means Classifying Facial Expression with Raial Basis Function Networks, using Graient Descent an K-means Neil Allrin Department of Computer Science University of California, San Diego La Jolla, CA 9237 nallrin@cs.ucs.eu

More information

A New Statistical Restoration Method for Spatial Domain Images

A New Statistical Restoration Method for Spatial Domain Images A New Statistical Restoration Method for Spatial Domain Images Arijit Sur 1,,PiyushGoel 2, and Jayanta Mukherjee 2 1 Department of Computer Science and Engineering, Indian Institute of Technology, Guwahati-781039,

More information

CHAPTER 3 DIFFERENT DOMAINS OF WATERMARKING. domain. In spatial domain the watermark bits directly added to the pixels of the cover

CHAPTER 3 DIFFERENT DOMAINS OF WATERMARKING. domain. In spatial domain the watermark bits directly added to the pixels of the cover 38 CHAPTER 3 DIFFERENT DOMAINS OF WATERMARKING Digital image watermarking can be done in both spatial domain and transform domain. In spatial domain the watermark bits directly added to the pixels of the

More information

Particle Swarm Optimization Based on Smoothing Approach for Solving a Class of Bi-Level Multiobjective Programming Problem

Particle Swarm Optimization Based on Smoothing Approach for Solving a Class of Bi-Level Multiobjective Programming Problem BULGARIAN ACADEMY OF SCIENCES CYBERNETICS AND INFORMATION TECHNOLOGIES Volume 17, No 3 Sofia 017 Print ISSN: 1311-970; Online ISSN: 1314-4081 DOI: 10.1515/cait-017-0030 Particle Swarm Optimization Base

More information

Synthesis Distortion Estimation in 3D Video Using Frequency and Spatial Analysis

Synthesis Distortion Estimation in 3D Video Using Frequency and Spatial Analysis MITSUBISHI EECTRIC RESEARCH ABORATORIES http://www.merl.com Synthesis Distortion Estimation in 3D Vieo Using Frequency an Spatial Analysis Fang,.; Cheung, N-M; Tian, D.; Vetro, A.; Sun, H.; Yu,. TR2013-087

More information

AnyTraffic Labeled Routing

AnyTraffic Labeled Routing AnyTraffic Labele Routing Dimitri Papaimitriou 1, Pero Peroso 2, Davie Careglio 2 1 Alcatel-Lucent Bell, Antwerp, Belgium Email: imitri.papaimitriou@alcatel-lucent.com 2 Universitat Politècnica e Catalunya,

More information

Generalized Edge Coloring for Channel Assignment in Wireless Networks

Generalized Edge Coloring for Channel Assignment in Wireless Networks TR-IIS-05-021 Generalize Ege Coloring for Channel Assignment in Wireless Networks Chun-Chen Hsu, Pangfeng Liu, Da-Wei Wang, Jan-Jan Wu December 2005 Technical Report No. TR-IIS-05-021 http://www.iis.sinica.eu.tw/lib/techreport/tr2005/tr05.html

More information

Exercises of PIV. incomplete draft, version 0.0. October 2009

Exercises of PIV. incomplete draft, version 0.0. October 2009 Exercises of PIV incomplete raft, version 0.0 October 2009 1 Images Images are signals efine in 2D or 3D omains. They can be vector value (e.g., color images), real (monocromatic images), complex or binary

More information

Design and Analysis of Optimization Algorithms Using Computational

Design and Analysis of Optimization Algorithms Using Computational Appl. Num. Anal. Comp. Math., No. 3, 43 433 (4) / DOI./anac.47 Design an Analysis of Optimization Algorithms Using Computational Statistics T. Bartz Beielstein, K.E. Parsopoulos,3, an M.N. Vrahatis,3 Department

More information

1 Surprises in high dimensions

1 Surprises in high dimensions 1 Surprises in high imensions Our intuition about space is base on two an three imensions an can often be misleaing in high imensions. It is instructive to analyze the shape an properties of some basic

More information

Yet Another Parallel Hypothesis Search for Inverse Entailment Hiroyuki Nishiyama and Hayato Ohwada Faculty of Sci. and Tech. Tokyo University of Scien

Yet Another Parallel Hypothesis Search for Inverse Entailment Hiroyuki Nishiyama and Hayato Ohwada Faculty of Sci. and Tech. Tokyo University of Scien Yet Another Parallel Hypothesis Search for Inverse Entailment Hiroyuki Nishiyama an Hayato Ohwaa Faculty of Sci. an Tech. Tokyo University of Science, 2641 Yamazaki, Noa-shi, CHIBA, 278-8510, Japan hiroyuki@rs.noa.tus.ac.jp,

More information

Non-homogeneous Generalization in Privacy Preserving Data Publishing

Non-homogeneous Generalization in Privacy Preserving Data Publishing Non-homogeneous Generalization in Privacy Preserving Data Publishing W. K. Wong, Nios Mamoulis an Davi W. Cheung Department of Computer Science, The University of Hong Kong Pofulam Roa, Hong Kong {wwong2,nios,cheung}@cs.hu.h

More information

Skyline Community Search in Multi-valued Networks

Skyline Community Search in Multi-valued Networks Syline Community Search in Multi-value Networs Rong-Hua Li Beijing Institute of Technology Beijing, China lironghuascut@gmail.com Jeffrey Xu Yu Chinese University of Hong Kong Hong Kong, China yu@se.cuh.eu.h

More information

STeganography is a technique for covert communication,

STeganography is a technique for covert communication, 1 A New Rule for Cost Reassignment in Adaptive Steganography Wenbo Zhou, Weiming Zhang, and Nenghai Yu Abstract In steganography schemes, the distortion function is used to define modification costs on

More information

Digital fringe profilometry based on triangular fringe patterns and spatial shift estimation

Digital fringe profilometry based on triangular fringe patterns and spatial shift estimation University of Wollongong Research Online Faculty of Engineering an Information Sciences - Papers: Part A Faculty of Engineering an Information Sciences 4 Digital fringe profilometry base on triangular

More information

Offloading Cellular Traffic through Opportunistic Communications: Analysis and Optimization

Offloading Cellular Traffic through Opportunistic Communications: Analysis and Optimization 1 Offloaing Cellular Traffic through Opportunistic Communications: Analysis an Optimization Vincenzo Sciancalepore, Domenico Giustiniano, Albert Banchs, Anreea Picu arxiv:1405.3548v1 [cs.ni] 14 May 24

More information

Keywords Data compression, image processing, NCD, Kolmogorov complexity, JPEG, ZIP

Keywords Data compression, image processing, NCD, Kolmogorov complexity, JPEG, ZIP Volume 3, Issue 7, July 203 ISSN: 2277 28X International Journal of Avance Research in Computer Science an Software Engineering Research Paper Available online at: wwwijarcssecom Compression Techniques

More information

On the Performance of Wavelet Decomposition Steganalysis with JSteg Steganography

On the Performance of Wavelet Decomposition Steganalysis with JSteg Steganography On the Performance of Wavelet Decomposition Steganalysis with JSteg Steganography Ainuddin Wahid Abdul Wahab, Johann A Briffa and Hans Georg Schaathun Department of Computing, University of Surrey Abstract.

More information

Quantitative and Binary Steganalysis in JPEG: A Comparative Study

Quantitative and Binary Steganalysis in JPEG: A Comparative Study Quantitative and Binary Steganalysis in JPEG: A Comparative Study Ahmad ZAKARIA LIRMM, Univ Montpellier, CNRS ahmad.zakaria@lirmm.fr Marc CHAUMONT LIRMM, Univ Nîmes, CNRS marc.chaumont@lirmm.fr Gérard

More information

Figure 1: Schematic of an SEM [source: ]

Figure 1: Schematic of an SEM [source:   ] EECI Course: -9 May 1 by R. Sanfelice Hybri Control Systems Eelco van Horssen E.P.v.Horssen@tue.nl Project: Scanning Electron Microscopy Introuction In Scanning Electron Microscopy (SEM) a (bunle) beam

More information

Particle Swarm Optimization with Time-Varying Acceleration Coefficients Based on Cellular Neural Network for Color Image Noise Cancellation

Particle Swarm Optimization with Time-Varying Acceleration Coefficients Based on Cellular Neural Network for Color Image Noise Cancellation Particle Swarm Optimization with Time-Varying Acceleration Coefficients Base on Cellular Neural Network for Color Image Noise Cancellation Te-Jen Su Jui-Chuan Cheng Yang-De Sun 3 College of Information

More information

Adjacency Matrix Based Full-Text Indexing Models

Adjacency Matrix Based Full-Text Indexing Models 1000-9825/2002/13(10)1933-10 2002 Journal of Software Vol.13, No.10 Ajacency Matrix Base Full-Text Inexing Moels ZHOU Shui-geng 1, HU Yun-fa 2, GUAN Ji-hong 3 1 (Department of Computer Science an Engineering,

More information

Bayesian localization microscopy reveals nanoscale podosome dynamics

Bayesian localization microscopy reveals nanoscale podosome dynamics Nature Methos Bayesian localization microscopy reveals nanoscale poosome ynamics Susan Cox, Ewar Rosten, James Monypenny, Tijana Jovanovic-Talisman, Dylan T Burnette, Jennifer Lippincott-Schwartz, Gareth

More information

Video-based Characters Creating New Human Performances from a Multi-view Video Database

Video-based Characters Creating New Human Performances from a Multi-view Video Database Vieo-base Characters Creating New Human Performances from a Multi-view Vieo Database Feng Xu Yebin Liu? Carsten Stoll? James Tompkin Gaurav Bharaj? Qionghai Dai Hans-Peter Seiel? Jan Kautz Christian Theobalt?

More information

NEW METHOD FOR FINDING A REFERENCE POINT IN FINGERPRINT IMAGES WITH THE USE OF THE IPAN99 ALGORITHM 1. INTRODUCTION 2.

NEW METHOD FOR FINDING A REFERENCE POINT IN FINGERPRINT IMAGES WITH THE USE OF THE IPAN99 ALGORITHM 1. INTRODUCTION 2. JOURNAL OF MEDICAL INFORMATICS & TECHNOLOGIES Vol. 13/009, ISSN 164-6037 Krzysztof WRÓBEL, Rafał DOROZ * fingerprint, reference point, IPAN99 NEW METHOD FOR FINDING A REFERENCE POINT IN FINGERPRINT IMAGES

More information

What Makes the Stego Image Undetectable?

What Makes the Stego Image Undetectable? What Makes the Stego Image Undetectable? Songtao Wu, Yan Liu Department of Computing The Hong Kong Polytechnic University Hong Kong, P. R. China {csstwu, csyliu} @comp.polyu.edu.hk Shenghua Zhong College

More information

High dimensional Apollonian networks

High dimensional Apollonian networks High imensional Apollonian networks Zhongzhi Zhang Institute of Systems Engineering, Dalian University of Technology, Dalian 11604, Liaoning, China E-mail: lutzzz063@yahoo.com.cn Francesc Comellas Dep.

More information

Learning convex bodies is hard

Learning convex bodies is hard Learning convex boies is har Navin Goyal Microsoft Research Inia navingo@microsoftcom Luis Raemacher Georgia Tech lraemac@ccgatecheu Abstract We show that learning a convex boy in R, given ranom samples

More information

Research Article Research on Law s Mask Texture Analysis System Reliability

Research Article Research on Law s Mask Texture Analysis System Reliability Research Journal of Applie Sciences, Engineering an Technology 7(19): 4002-4007, 2014 DOI:10.19026/rjaset.7.761 ISSN: 2040-7459; e-issn: 2040-7467 2014 Maxwell Scientific Publication Corp. Submitte: November

More information

A Revised Simplex Search Procedure for Stochastic Simulation Response Surface Optimization

A Revised Simplex Search Procedure for Stochastic Simulation Response Surface Optimization 272 INFORMS Journal on Computing 0899-1499 100 1204-0272 $05.00 Vol. 12, No. 4, Fall 2000 2000 INFORMS A Revise Simplex Search Proceure for Stochastic Simulation Response Surface Optimization DAVID G.

More information

On Effectively Determining the Downlink-to-uplink Sub-frame Width Ratio for Mobile WiMAX Networks Using Spline Extrapolation

On Effectively Determining the Downlink-to-uplink Sub-frame Width Ratio for Mobile WiMAX Networks Using Spline Extrapolation On Effectively Determining the Downlink-to-uplink Sub-frame With Ratio for Mobile WiMAX Networks Using Spline Extrapolation Panagiotis Sarigianniis, Member, IEEE, Member Malamati Louta, Member, IEEE, Member

More information

Multilevel Linear Dimensionality Reduction using Hypergraphs for Data Analysis

Multilevel Linear Dimensionality Reduction using Hypergraphs for Data Analysis Multilevel Linear Dimensionality Reuction using Hypergraphs for Data Analysis Haw-ren Fang Department of Computer Science an Engineering University of Minnesota; Minneapolis, MN 55455 hrfang@csumneu ABSTRACT

More information

On the Role of Multiply Sectioned Bayesian Networks to Cooperative Multiagent Systems

On the Role of Multiply Sectioned Bayesian Networks to Cooperative Multiagent Systems On the Role of Multiply Sectione Bayesian Networks to Cooperative Multiagent Systems Y. Xiang University of Guelph, Canaa, yxiang@cis.uoguelph.ca V. Lesser University of Massachusetts at Amherst, USA,

More information

Coupling the User Interfaces of a Multiuser Program

Coupling the User Interfaces of a Multiuser Program Coupling the User Interfaces of a Multiuser Program PRASUN DEWAN University of North Carolina at Chapel Hill RAJIV CHOUDHARY Intel Corporation We have evelope a new moel for coupling the user-interfaces

More information

Image Watermarking Scheme Based on DWT-DCT and SSVD

Image Watermarking Scheme Based on DWT-DCT and SSVD pp.191-206 http://x.oi.org/10.14257/ijsia.2016.10.10.18 Image Watermarking Scheme Base on DW-DC an SSVD Zhi Zhang, Chengyou Wang * an Xiao Zhou School of Mechanical, Electrical an Information Engineering,

More information

EFFICIENT ON-LINE TESTING METHOD FOR A FLOATING-POINT ADDER

EFFICIENT ON-LINE TESTING METHOD FOR A FLOATING-POINT ADDER FFICINT ON-LIN TSTING MTHOD FOR A FLOATING-POINT ADDR A. Droz, M. Lobachev Department of Computer Systems, Oessa State Polytechnic University, Oessa, Ukraine Droz@ukr.net, Lobachev@ukr.net Abstract In

More information

Research Article Inviscid Uniform Shear Flow past a Smooth Concave Body

Research Article Inviscid Uniform Shear Flow past a Smooth Concave Body International Engineering Mathematics Volume 04, Article ID 46593, 7 pages http://x.oi.org/0.55/04/46593 Research Article Invisci Uniform Shear Flow past a Smooth Concave Boy Abullah Mura Department of

More information

A Novel Message Decomposing and Embedding Scheme for Image Steganography

A Novel Message Decomposing and Embedding Scheme for Image Steganography Journal of Computers Vol. 29 No. 2, 2018, pp. 241-248 doi:10.3966/199115992018042902023 A Novel Message Decomposing and Embedding Scheme for Image Steganography Zhihai Zhuo 1*, Ning Zhong 2, Hongxia Miao

More information

State Indexed Policy Search by Dynamic Programming. Abstract. 1. Introduction. 2. System parameterization. Charles DuHadway

State Indexed Policy Search by Dynamic Programming. Abstract. 1. Introduction. 2. System parameterization. Charles DuHadway State Inexe Policy Search by Dynamic Programming Charles DuHaway Yi Gu 5435537 503372 December 4, 2007 Abstract We consier the reinforcement learning problem of simultaneous trajectory-following an obstacle

More information

DEVELOPMENT OF DamageCALC APPLICATION FOR AUTOMATIC CALCULATION OF THE DAMAGE INDICATOR

DEVELOPMENT OF DamageCALC APPLICATION FOR AUTOMATIC CALCULATION OF THE DAMAGE INDICATOR Mechanical Testing an Diagnosis ISSN 2247 9635, 2012 (II), Volume 4, 28-36 DEVELOPMENT OF DamageCALC APPLICATION FOR AUTOMATIC CALCULATION OF THE DAMAGE INDICATOR Valentina GOLUBOVIĆ-BUGARSKI, Branislav

More information

Blind Data Classification using Hyper-Dimensional Convex Polytopes

Blind Data Classification using Hyper-Dimensional Convex Polytopes Blin Data Classification using Hyper-Dimensional Convex Polytopes Brent T. McBrie an Gilbert L. Peterson Department of Electrical an Computer Engineering Air Force Institute of Technology 9 Hobson Way

More information

Interior Permanent Magnet Synchronous Motor (IPMSM) Adaptive Genetic Parameter Estimation

Interior Permanent Magnet Synchronous Motor (IPMSM) Adaptive Genetic Parameter Estimation Interior Permanent Magnet Synchronous Motor (IPMSM) Aaptive Genetic Parameter Estimation Java Rezaie, Mehi Gholami, Reza Firouzi, Tohi Alizaeh, Karim Salashoor Abstract - Interior permanent magnet synchronous

More information

arxiv: v1 [cs.mm] 2 Mar 2017

arxiv: v1 [cs.mm] 2 Mar 2017 This is a preprint of the paper: arxiv:1703.00817v1 [cs.mm] 2 Mar 2017 Daniel Lerch-Hostalot, David Megías, LSB matching steganalysis based on patterns of pixel differences and random embedding, Computers

More information

Socially-optimal ISP-aware P2P Content Distribution via a Primal-Dual Approach

Socially-optimal ISP-aware P2P Content Distribution via a Primal-Dual Approach Socially-optimal ISP-aware P2P Content Distribution via a Primal-Dual Approach Jian Zhao, Chuan Wu The University of Hong Kong {jzhao,cwu}@cs.hku.hk Abstract Peer-to-peer (P2P) technology is popularly

More information

A Duality Based Approach for Realtime TV-L 1 Optical Flow

A Duality Based Approach for Realtime TV-L 1 Optical Flow A Duality Base Approach for Realtime TV-L 1 Optical Flow C. Zach 1, T. Pock 2, an H. Bischof 2 1 VRVis Research Center 2 Institute for Computer Graphics an Vision, TU Graz Abstract. Variational methos

More information

Provisioning Virtualized Cloud Services in IP/MPLS-over-EON Networks

Provisioning Virtualized Cloud Services in IP/MPLS-over-EON Networks Provisioning Virtualize Clou Services in IP/MPLS-over-EON Networks Pan Yi an Byrav Ramamurthy Department of Computer Science an Engineering, University of Nebraska-Lincoln Lincoln, Nebraska 68588 USA Email:

More information