DESIGNING STEGANOGRAPHIC DISTORTION USING DIRECTIONAL FILTERS. Vojtěch Holub and Jessica Fridrich
|
|
- Sharon Whitehead
- 5 years ago
- Views:
Transcription
1 DESIGNING STEGANOGRAPHIC DISTORTION USING DIRECTIONAL FILTERS Vojtěch Holub an Jessica Fririch Department of ECE, SUNY Binghamton, NY, USA {vholub1, ABSTRACT This paper presents a new approach to efining aitive steganographic istortion in the spatial omain. The change in the output of irectional high-pass filters after changing one pixel is weighte an then aggregate using the reciprocal Höler norm to efine the iniviual pixel costs. In contrast to other aaptive embeing schemes, the aggregation rule is esigne to force the embeing changes to highly texture or noisy regions an to avoi clean eges. Consequently, the new embeing scheme appears markely more resistant to steganalysis using rich moels. The actual embeing algorithm is realize using synrome-trellis coes to minimize the expecte istortion for a given payloa. 1. INTRODUCTION Designing steganographic algorithms for empirical cover sources, such as igital images, is very challenging ue to the funamental lack of accurate moels. The most successful approach toay avois estimating the cover source istribution because this task is infeasible for complex an highly non stationary sources. Instea, the steganography problem is formulate as source coing with fielity constraint [2] the sener embes her message while minimizing an appropriately efine istortion. Practical algorithms that embe near the theoretical payloa istortion boun are available for a very general class of istortion functions [4, 2]. Within this framework, the only task left to the sener is essentially the esign of the istortion function. In an attempt to relate istortion with statistical etectability, the authors of [3] parametrize the istortion function an then searche for such values of the parameters that gave the smallest etectability evaluate as a margin between classes within a selecte feature space (cover moel). However, unless the cover moel is a complete statistical escriptor of the The work on this paper was supporte by Air Force Office of Scientific Research uner the research grant number FA The U.S. Government is authorize to reprouce an istribute reprints for Governmental purposes notwithstaning any copyright notation there on. The views an conclusions containe herein are those of the authors an shoul not be interprete as necessarily representing the official policies, either expresse or implie of AFOSR or the U.S. Government. The authors woul like to thank Jan Koovský for useful iscussions. empirical source [1], such optimize schemes may, paraoxically, en up being more etectable if the Waren esigns the etector outsie of the moel [11], which brings us back to the main an rather ifficult problem moeling the source. All of toay s most secure steganographic schemes for igital images use heuristically efine istortion functions that constrain the embeing changes to those parts of the image that are ifficult to moel (e.g., complex textures or noisy areas). In the JPEG omain, by far the most successful approach is built aroun istortion functions that measure istortion w.r.t. the raw, uncompresse image [9, 15, 16]. A natural way to efine the istortion function in the spatial omain is to assign pixel costs by measuring the impact of changing each pixel in a feature (moel) space using a weighte norm. Making the weights epenent on the pixel s local neighborhoo introuces esirable content aaptivity. An example of this approach is the embeing algorithm HUGO [14], which employs the SPAM feature moel. To the best knowlege of the authors, an base on the recent steganalysis stuy [6], HUGO is currently the most secure algorithm for embeing in the spatial omain even though its secure payloa has been substantially lowere by moern attacks initiate uring the BOSS competition [5] that employ high-imensional rich moels. In this paper, we approach the task of builing istortion functions in the spatial omain using a ifferent strategy. Instea of using a weighte norm in some steganalytic moel to compute the pixel costs, we employ a bank of irectional high-pass filters to obtain the so-calle irectional resiuals, which are relate to the preictability of the pixel in a certain irection. By measuring the impact of embeing on every irectional resiual an by suitably aggregating these impacts, we force the embeing cost to be high where the content is preictable in at least one irection (smooth areas an along eges) an low where the content is unpreictable in every irection (e.g., in texture or noisy areas). The resulting algorithm thus becomes highly aaptive an better resists steganalysis using rich moels. After introucing basic notation in Section 2, we list three steganographic methos with which new schemes will be compare using an empirical measure of security. In Section 3, we escribe the istortion function, incluing the filter banks for computing the irectional resiuals an the
2 aggregation rule. The purpose of the exploratory analysis of Section 4 is to assess the effect of various esign elements on security an select the setting that provies the highest empirical security. In Section 5, we subject the new scheme to steganalysis in the wavelet omain where the embeing costs are compute. The paper is conclue in Section PRELIMINARIES Capital an lower-case bolface symbols stan for matrices an vectors, respectively. The symbols X = (X ij ),Y = (Y ij ) {,...,255} n1 n2 will always be use an 8-bit grayscale cover (an the corresponing stego) image withn 1 n 2 pixels. For matrix X, X T is its transpose, X is X rotate by 18 egrees, an X is the matrix of absolute values Empirical security All experiments are conucte on BOSSbase ver. 1. [5] with 1 images. The steganographic security is evaluate empirically using binary classifiers traine on a given cover source an its stego version embee with a fixe payloa. With the exception of Section 5, we use the Spatial Rich Moel (SRM) [6] consisting of 16 symmetrize submoels with a total imension of 34, 671. All classifiers were implemente using the ensemble [12] with Fisher linear iscriminants as base learners. Security is quantifie using the ensemble s out-of-bag (OOB) error E OOB, which is an unbiase estimate of the testing error average over multiple bootstrap samples of the image source uring training [12] Steganography methos We compare the propose methos with HUGO, the Ege Aaptive (EA) algorithm [13], an Least Significant Bit Matching (LSBM). We use the embeing simulator [5] for HUGO operating at the theoretical payloa istortion boun with efault settings γ = 1, σ = 1, an the switch --T with T = 255 to remove the weakness reporte in [11]. LSBM was simulate at the ternary entropy boun. The coe for the EA algorithm with its custom coing scheme was obtaine from the authors. 3. DISTORTION FUNCTION DESIGN We restrict our esign to aitive istortion in the form: n 1 n 2 D(X,Y) = ρ ij (X,Y ij ) X ij Y ij, (1) i=1 j=1 where ρ ij are the costs of changing pixel X ij to Y ij. The aitivity means that we o not consier the effects of iniviual embeing changes influencing each other. We opte KB K (1) = Sobel K (1) =, K (2) = (K (1) ) T WDFB-H WDFB-D h = Haar wavelet ecomp. low-pass g = Haar wavelet ecomp. high-pass h = Daubechies 8 wavelet ecomp. low-pass g = Daubechies 8 wavelet ecomp. high-pass K (1) = h g T, K (2) = g h T, K (3) = g g T Table 1. Filter banks use in this paper. for this mainly to simplify the esign. Since the embeing algorithm will be force to concentrate the embeing moifications into highly texture/noisy areas, using the Gibbs construction [2] with non-aitive istortion functions may have an aitional beneficial impact on security. The authors contemplate investigating this irection as part of future research. Having efine the pixel costsρ ij, embeing a (pseuo) ranom sequence of bits with minimal expecte istortion (1) is equivalent to source coing with a fielity criterion. A practical algorithm, base on Synrome-Trellis Coes (STCs), that embes near the payloa istortion boun was propose in [4]. It works in the ual omain to better cover the range of small payloas typically neee for steganography. The STC Toolbox, which we also use in this paper to implement all our schemes, can be ownloae from Directional Filters As alreay reporte by its authors, the istortion function of HUGO concentrates the embeing changes primarily in textures an eges. However, the content along an ege can usually be well moele using locally polynomial moels, which ais the etection [7, 6, 8]. Thus, whenever possible the embeing algorithm shoul embe into texture/noisy areas that are not easily moellable in any irection. To this en, we evaluate the smoothness in multiple irections using a filter bankb n = {K (1),...,K (n) } consisting ofnmultiple irectional high-pass filters represente by their kernels normalize so that alll 2 -norms K (k) 2 are the same. Thek-th resiualr (k),k = 1,...,n, is compute asr (k) = K (k) X, where is a convolution mirror-pae so that R (k) has
3 againn 1 n 2 elements. (The mirror-paing prevents introucing embeing artifacts at image bounary.) If the resiual values R (k) ij are large for some ij an for all k, it means that the local content at pixel x ij is not smooth in any irection an thus ifficult to moel. Since we want to etect eges in all irections, it is natural to use establishe ege etectors for the filter banks (see Table 1). The non-irectional KB filter [1] is often use in steganalysis, while the Sobel operator is a common ege etector. Wavelet-base Directional Filter Banks WDFB-H an WDFB-D use the Haar an Daubechies 8-tap wavelets. The computation of the resiual coincies with the first-level wavelet ecomposition with no ecimation. The wavelet banks consist of three filters, K (1),K (2),K (3), using which the LH, HL, an HH irectional resiuals are obtaine. Given the wavelet s 1-D low-pass ecomposition filter h an a highpass ecomposition filter g, the 2-D irectional filters are compute as shown in Table Aggregating embeing suitability The embeing shoul prefer changing large values of irectional resiuals, where the textures an eges are, an preserve the small values, where the content is preictable. One way to achieve this is to weigh the ifference between R (k) an the same resiual after changing only one pixel atij (enoter (k) [ij] ) by the wavelet coefficient itself: ξ (k) ij = R (k) R (k) R (k) [ij] (a) = R (k) K (k). (2) The quantity ξ (k) ij, which we call embeing suitability, is formally a correlation between the absolute value of the cover resiual with the absolute value of the resiual change. Since R (k) R (k) [ij] is the spatially shifte irectional filter K(k), ξ (k) ij can be compute for all pixels at once (equality(a)). Next, we compute the embeing costs ρ ij by aggregating all suitabilities ξ (k) ij, k = 1,...,n. Since we wish to restrict the embeing changes to those pixels with complex content in every irection, the aggregation rule ρ : R n R +, ρ ij = ρ(ξ (1) ij,...,ξ(n) ij ) is require to have the following properties: A1. The larger the values of ξ (k) ij, the smaller the ρ ij shoul be. A2. If there exists k {1,...,n} such that ξ (k) ij =, then ρ ij = +. A simple function that meets both requirements is the reciprocal Höler norm with p < : ρ (p) ij = ( n k=1 ) 1 p ξ (k) ij p. (3) SRM EOOB p Fig. 1. E OOB as a function of the Höler-norm parameter p when embeing at bpp with the WDFB. SRM EOOB.5 Payloa (bpp) HUGO KB Sobel WDFB-H WDFB-D Fig. 2. Evaluating the security of several ifferent filter banks using the OOB estimate of the testing error,e OOB. We restrict the embeing changes to±1, X ij Y ij = 1. Note that ue to the absolute value in (2), both changes result in the same embeing cost, which allows us to use the more powerful multi-layere version of STCs [4] also available in the STC Toolbox (see Section 4.4 for a iscussion of how ifferent coing schemes affect the security). 4. EXPERIMENTS In this section, we first assess how various esign parameters, such as p, the filter bank, an coing, affect security. Then, the most secure setting is ientifie an compare with HUGO, EA, an LSBM Aggregation rule To obtain an insight as to which value of p shoul be use in the aggregation rule (3), in Fig. 1 we plot E OOB (p) for the WDFB when embeing the payloa of bpp (bits per pixel). While for p < the security appears almost constant, for p > the requirement A2 is longer vali the costs at
4 smooth eges ecrease, which lowers the security. A similar epenence of security on p was observe for other filter banks. Thus, for concreteness an simplicity, we fix the value of the parameterp top = Assessing filter banks Fig. 2 shows the OOB error estimate for filter banks liste in Table 1. Among them, the WDFB-D achieves the best steganographic security. We call this embeing algorithm WOW (Wavelet Obtaine Weights). All the other filters achieve comparable security with HUGO, even the WDFB-H with support of size only2 2. Encourage with the success of the Daubechies 8-tap wavelet-base filter bank, we experimente with several other wavelet bases, incluing the Biorthogonal 44 wavelets, only to achieve very similar results in terms of the E OOB. SRM EOOB.5 Payloa (bpp) WOW ternary sim. WOW ternary STC WOW binary sim. WOW binary STC HUGO sim Comparison to prior art Fig. 3 shows the comparison between WOW an three other algorithms using the SRM moel (left) an a moel constructe using epenencies in the wavelet omain (see Section 5 for more etails). The improvement over HUGO is especially apparent for large payloas at bpp, thee OOB of WOW is almost twice as high as that of HUGO. Fig. 4. OOB error estimate of the testing error, E OOB, for WOW implemente using binary an ternary STCs versus simulate optimal embeing. Note the large gain of ternary STCs versus their binary version. Also note that the coing loss is quite small The effect of coing As alreay mentione in Section 3.2, since the costs (3) o not epen on the irection of the embeing change, WOW can use the ternary multi-layere version of STCs. Fig. 4 shows that the gain of using the ternary STCs over their binary version is quite significant. At the same time, the coing loss of STCs w.r.t. optimal embeing operating at the payloa istortion boun is rather small. The last comment above might suggest that HUGO might be improve using ternary embeing instea of binary. However, since HUGO embes only in the irection of smaller istortion an allows interaction among moifications, it is not clear how to implement ternary embeing an what the security impact woul be WOW aaptivity In Fig. 5, we contrast the placement of embeing changes for HUGO an for WOW. The selecte cover image has numerous horizontal an vertical eges an also some texture areas. While HUGO embes with high probability into the pillar eges as well as the horizontal lines above the pillars, WOW embes solely into the texture areas as ictate by the aggregation rule (3)..6 Fig. 5. Embeing probability for payloa bpp using HUGO (bottom left) an WOW (bottom right) for a grayscale cover image (top).
5 SRM EOOB.5 Payloa (bpp) WOW HUGO EA LSBM IaB EOOB WOW HUGO EA LSBM.5 Payloa (bpp) Fig. 3. Comparing statistical etectability of WOW an three state-of-the-art embeing algorithms using the SRM (left) an wavelet-omain epenencies (right). 5. STEGANALYSIS IN WAVELET DOMAIN The most successful steganalysis attacks have always been built in the embeing omain. Although WOW embes in the spatial omain, which is well covere by the SRM, the costs are compute in a transform omain. The goal of this section is to investigate whether WOW can be attacke in the wavelet omain by forming features that capture epenencies among wavelet coefficients. Inspire by how steganalysis features are built in the JPEG omain, we explore the following four logical possibilities graphically shown in Fig. 6: 4-D co-occurrence matrices built from four consecutive wavelet coefficients exploiting epenencies a) intra ban (IaB), b) inter level, c) a mix of intra level an inter level, an ) intra level, inter ban. The IaB features are similar in spirit to the SRM provie the wavelet coefficients are interprete as noise resiuals. Since the IaB features were much more successful in etecting WOW when compare to the other three possibilities b) ), we only provie etaile iscussion for case a). The coefficients were compute using the stanar unecimate iscrete wavelet ecomposition with the Daubechies 8 wavelet (to steganalyze in the omain where WOW computes its costs). Let S (l,s) = {c (l,s) ij }, l {1,2,3}, s {LH,HL,HH}, be the unecimate sth subban in the lth level of the wavelet transform. Assuming that n 1 = 2 k1, n 2 = 2 k2 for some k 1,k 2 Z, the range of subscripts for c (l,s) ij is i = {1,...,2 k1 l+1 } anj = {1,...,2 k2 l+1 }. The steganalytic features are four-imensional co-occurrence matrices forme by groups of four horizontally an vertically ajacent coefficients after truncation an quantization to a ( ) finite ynamic range, c (l,s) ij roun trunc T (c (l,s) ij /q), where q is a quantization step an trunc T (x) = x for x [ T,T], trunc T (x) = T sign(x) otherwise. The horizontal co-occurrence matrix is enote as { C (h,l,s), = ( 1,..., 4 ) { T,...,T} 4, C (h,l,s) = 1,c (l,s) i,j+1 = 2,c (l,s) i,j+2 = 3,c (l,s) i,j+3 = 4 matrixc (v,l,s) (i,j) }, with the vertical c (l,s) ij = efine analogically. We built three co-occurrence matrices for each level l {1,2,3}. In Fig. 6a), enote by a triangle is the cooccurrence C (1,l) C (h,l,lh) + C (v,l,hl). The squares correspon to C (2,l) C (v,l,lh) + C (h,l,hl), while the circles markc (3,l) C (h,l,hh) +C (v,l,hh). In this paper, we use T = 2, which gave each cooccurrence matrix C (i,l) the imensionality of (2T + 1) 4 = 625. Since i {1,2,3} an l {1,2,3}, the total number of co-occurrence matrices is 9, giving the final feature vector a imensionality of = 5,625. A brief stuy on the effect of the quantization step q [,5] on E OOB showe that the best performance was usually obtaine for q 1. Thus, in all our experiments, we setq = 1. Fig. 3 (right) shows the results of steganalysis using the IaB features. WOW still achieves better security than any other teste metho. The overall etection performance of the IaB features is, however, inferior to the SRM (left). 6. CONCLUSION This paper confirms what has been suspecte before restricting the embeing changes to textures while avoiing clean
6 a) b) c) ) Fig. 6. Four types of groups of wavelet coefficients from which 4-D co-occurrence matrices were built to steganalyze WOW. eges greatly improves steganographic security. This high level of aaptivity was achieve through a novel esign of the steganographic istortion function. First, a irectional filter bank is use to etect eges in local neighborhoos of each pixel. Then the changes in the resiuals cause by embeing are weighte an aggregate using a special rule esigne to output a low embeing cost only when the local content is not smooth in any irection. Accoring to our experiments, 2-D wavelet ecomposition filters provie the highest level of steganographic security measure empirically for a given image source (atabase) an classifiers operating in high-imensional feature spaces (rich image moels). The propose algorithm, WOW, outperforms the current state-of-the-art HUGO by a significant margin especially for large payloas. Further potential improvement is possible by employing better irectional filter banks an by using non-aitive istortion to moel interaction of embeing changes. 7. REFERENCES [1] R. Böhme. Improve Statistical Steganalysis Using Moels of Heterogeneous Cover Signals. PhD thesis, Faculty of Comp. Sci., TU Dresen, Germany, 28. [2] T. Filler an J. Fririch. Gibbs construction in steganography. IEEE TIFS, 5(4):75 72, 21. [3] T. Filler an J. Fririch. Design of aaptive steganographic schemes for igital images. In Proc. SPIE, Elec. Img., Meia Watermarking, Sec. an Forensics of Multimeia XIII, volume 788, pages OF 1 14, 211. [4] T. Filler, J. Juas, an J. Fririch. Minimizing aitive istortion in steganography using synrome-trellis coes. IEEE TIFS, 6(3):92 935, September 211. [5] T. Filler, T. Pevný, an P. Bas. BOSS (Break Our Steganography System). July 21. [6] J. Fririch an J. Koovský. Rich moels for steganalysis of igital images. IEEE TIFS, 7(3): , 211. [7] J. Fririch, J. Koovský, M. Goljan, an V. Holub. Steganalysis of content-aaptive steganography in spatial omain. In Information Hiing, 13th Int. Conf., volume 6958 of Springer LNCS, pages , 211. [8] G. Gül an F. Kurugollu. A new methoology in steganalysis : Breaking highly unetactable steganograpy (HUGO). In Information Hiing, 13th Int. Conf., volume 6958 of Springer LNCS, pages 71 84, 211. [9] Y. Kim, Z. Duric, an D. Richars. Moifie matrix encoing technique for minimal istortion steganography. In Information Hiing, 8th Int. Workshop, volume 4437 of Springer LNCS, pages , 26. [1] J. Koovský an J. Fririch. On completeness of feature spaces in blin steganalysis. In Proc. of the 1th ACM MM&Sec Workshop, pages , 28. [11] J. Koovský, J. Fririch, an V. Holub. On angers of overtraining steganography to incomplete cover moel. In Proc. of the 13th ACM MM&Sec Workshop, pages 69 76, 211. [12] J. Koovský, J. Fririch, an V. Holub. Ensemble classifiers for steganalysis of igital meia. IEEE TIFS, 7(2): , 212. [13] W. Luo, F. Huang, an J. Huang. Ege aaptive image steganography base on LSB matching revisite. IEEE TIFS, 5(2):21 214, June 21. [14] T. Pevný, T. Filler, an P. Bas. Using high-imensional image moels to perform highly unetectable steganography. In Information Hiing, 12th Int. Conf., volume 6387 of Springer LNCS, pages , 21. [15] V. Sachnev, H. J. Kim, an R. Zhang. Less etectable JPEG steganography metho base on heuristic optimization an BCH synrome coing. In Proc. of the 11th ACM MM&Sec Workshop, pages , 29. [16] C. Wang an J. Ni. An efficient JPEG steganographic scheme base on the block entropy of DCT coefficents. In Proc. of IEEE ICASSP, Kyoto, Japan, 212.
On Dangers of Overtraining Steganography to Incomplete Cover Model
On Dangers of Overtraining Steganography to Incomplete Cover Moel Jan Koovský Binghamton University Department of ECE Binghamton, NY 1392-6 jan.koovsky@ binghamton.eu Jessica Fririch Binghamton University
More informationOptimizing Pixel Predictors for Steganalysis
Optimizing Pixel Predictors for Steganalysis Vojtěch Holub and Jessica Fridrich Dept. of Electrical and Computer Engineering SUNY Binghamton, New York IS&T / SPIE 2012, San Francisco, CA Steganography
More informationAdaptive Spatial Steganography Based on the Correlation of Wavelet Coefficients for Digital Images in Spatial Domain Ningbo Li, Pan Feng, Liu Jia
216 International Conference on Information Engineering and Communications Technology (IECT 216) ISBN: 978-1-69-37- Adaptive Spatial Steganography Based on the Correlation of Wavelet Coefficients for Digital
More informationReversible Image Watermarking using Bit Plane Coding and Lifting Wavelet Transform
250 IJCSNS International Journal of Computer Science an Network Security, VOL.9 No.11, November 2009 Reversible Image Watermarking using Bit Plane Coing an Lifting Wavelet Transform S. Kurshi Jinna, Dr.
More informationDefining Cost Functions for Adaptive Steganography at the Microscale
Defining Cost Functions for Adaptive Steganography at the Microscale Kejiang Chen, Weiming Zhang, Hang Zhou, Nenghai Yu CAS Key Laboratory of Electromagnetic Space Information University of Science and
More informationTransient analysis of wave propagation in 3D soil by using the scaled boundary finite element method
Southern Cross University epublications@scu 23r Australasian Conference on the Mechanics of Structures an Materials 214 Transient analysis of wave propagation in 3D soil by using the scale bounary finite
More informationA Study on Different JPEG Steganograhic Schemes
A Study on Different JPEG Steganograhic Schemes Alphy Ros Mathew, Sreekumar K Department of Computer Science, College of Engineering,Ponjar, Cochin University of Science And Technology Kottayam,Kerala,India
More informationThe Journal of Systems and Software
The Journal of Systems an Software 83 (010) 1864 187 Contents lists available at ScienceDirect The Journal of Systems an Software journal homepage: www.elsevier.com/locate/jss Embeing capacity raising
More informationTight Wavelet Frame Decomposition and Its Application in Image Processing
ITB J. Sci. Vol. 40 A, No., 008, 151-165 151 Tight Wavelet Frame Decomposition an Its Application in Image Processing Mahmu Yunus 1, & Henra Gunawan 1 1 Analysis an Geometry Group, FMIPA ITB, Banung Department
More informationShift-map Image Registration
Shift-map Image Registration Svärm, Linus; Stranmark, Petter Unpublishe: 2010-01-01 Link to publication Citation for publishe version (APA): Svärm, L., & Stranmark, P. (2010). Shift-map Image Registration.
More informationToss that BOSSbase, Alice!
Toss that BOSSbase, Alice! Vahid Sedighi, Jessica Fridrich, Rémi Cogranne To cite this version: Vahid Sedighi, Jessica Fridrich, Rémi Cogranne. Toss that BOSSbase, Alice!. IS&T intl symposium on Electronic
More informationRich Models for Steganalysis of Digital Images
1 Rich Models for Steganalysis of Digital Images Jessica Fridrich, Member, IEEE and Jan Kodovský Abstract We describe a novel general strategy for building steganography detectors for digital images. The
More informationBreaking the OutGuess
Breaking the OutGuess Jessica Fridrich, Miroslav Goljan, Dorin Hogea * presented by Deepa Kundur Department of Electrical and Computer Engineering * Department of Computer Science SUNY Binghamton, Binghamton,
More informationOptimizing Pixel Predictors for Steganalysis
Optimizing Pixel Predictors for Steganalysis Vojtěch Holub and Jessica Fridrich Department of C, SUNY Binghamton, NY, USA {vholub1,fridrich}@binghamton.edu ABSTRACT A standard way to design steganalysis
More informationEvolving Distortion Function By Exploiting The Differences Among Comparable Adaptive Steganography
2016 12th International Conference on Natural Computation, Fuzzy Systems and Knowledge Discovery (ICNC-FSKD) Evolving Distortion Function By Exploiting The Differences Among Comparable Adaptive Steganography
More informationRough Set Approach for Classification of Breast Cancer Mammogram Images
Rough Set Approach for Classification of Breast Cancer Mammogram Images Aboul Ella Hassanien Jafar M. H. Ali. Kuwait University, Faculty of Aministrative Science, Quantitative Methos an Information Systems
More informationSelection-Channel-Aware Rich Model for Steganalysis of Digital Images
Selection-Channel-Aware Rich Model for Steganalysis of Digital Images Tomáš Denemark, Vahid Sedighi, Vojtěch Holub Department of ECE Binghamton University Binghamton, NY 13902-6000 {tdenema1,vsedigh1}@binghamton.edu
More informationSTEGANOGRAPHY is a technique for covert communication,
This article has been accepted for publication in a future issue of this journal, but has not been fully edited. Content may change prior to final publication. Citation information: DOI 0.09/TCSVT.206.2587388,
More informationFeature Extraction and Rule Classification Algorithm of Digital Mammography based on Rough Set Theory
Feature Extraction an Rule Classification Algorithm of Digital Mammography base on Rough Set Theory Aboul Ella Hassanien Jafar M. H. Ali. Kuwait University, Faculty of Aministrative Science, Quantitative
More informationOpen Access Adaptive Image Enhancement Algorithm with Complex Background
Sen Orers for Reprints to reprints@benthamscience.ae 594 The Open Cybernetics & Systemics Journal, 205, 9, 594-600 Open Access Aaptive Image Enhancement Algorithm with Complex Bacgroun Zhang Pai * epartment
More informationUsing Vector and Raster-Based Techniques in Categorical Map Generalization
Thir ICA Workshop on Progress in Automate Map Generalization, Ottawa, 12-14 August 1999 1 Using Vector an Raster-Base Techniques in Categorical Map Generalization Beat Peter an Robert Weibel Department
More informationWith ever-increasing growth of electronic
Journal of Advances in Computer Engineering and Technology, 3(2) 2017 Parallelization of Rich Models for Steganalysis of Digital Images using a CUDA-based Approach Mahmoud Kazemi 1, Meysam Mirzaee 2, Reza
More informationFast Fractal Image Compression using PSO Based Optimization Techniques
Fast Fractal Compression using PSO Base Optimization Techniques A.Krishnamoorthy Visiting faculty Department Of ECE University College of Engineering panruti rishpci89@gmail.com S.Buvaneswari Visiting
More informationImage Segmentation using K-means clustering and Thresholding
Image Segmentation using Kmeans clustering an Thresholing Preeti Panwar 1, Girhar Gopal 2, Rakesh Kumar 3 1M.Tech Stuent, Department of Computer Science & Applications, Kurukshetra University, Kurukshetra,
More informationUniversal distortion function for steganography in an arbitrary domain
Holub et al. EURASIP Journal on Information Security 2014, 2014:1 RESEARCH Open Access Universal distortion function for steganography in an arbitrary domain Vojtěch Holub *, Jessica Fridrich and Tomáš
More informationSteganalysis of Content-Adaptive Steganography in Spatial Domain
Steganalysis of Content-Adaptive Steganography in Spatial Domain Jessica Fridrich, Jan Kodovský, Vojtěch Holub, and Miroslav Goljan Department of ECE, SUNY Binghamton, NY, USA {fridrich,jan.kodovsky,vholub1,mgoljan}@binghamton.edu
More informationDesign of Policy-Aware Differentially Private Algorithms
Design of Policy-Aware Differentially Private Algorithms Samuel Haney Due University Durham, NC, USA shaney@cs.ue.eu Ashwin Machanavajjhala Due University Durham, NC, USA ashwin@cs.ue.eu Bolin Ding Microsoft
More informationResearch Article A Novel Steganalytic Algorithm based on III Level DWT with Energy as Feature
Research Journal of Applied Sciences, Engineering and Technology 7(19): 4100-4105, 2014 DOI:10.19026/rjaset.7.773 ISSN: 2040-7459; e-issn: 2040-7467 2014 Maxwell Scientific Publication Corp. Submitted:
More informationTHE BAYESIAN RECEIVER OPERATING CHARACTERISTIC CURVE AN EFFECTIVE APPROACH TO EVALUATE THE IDS PERFORMANCE
БСУ Международна конференция - 2 THE BAYESIAN RECEIVER OPERATING CHARACTERISTIC CURVE AN EFFECTIVE APPROACH TO EVALUATE THE IDS PERFORMANCE Evgeniya Nikolova, Veselina Jecheva Burgas Free University Abstract:
More informationCharacterizing Decoding Robustness under Parametric Channel Uncertainty
Characterizing Decoing Robustness uner Parametric Channel Uncertainty Jay D. Wierer, Wahee U. Bajwa, Nigel Boston, an Robert D. Nowak Abstract This paper characterizes the robustness of ecoing uner parametric
More informationAdaptive Pixel Pair Matching Technique for Data Embedding
Available Online at www.ijcsmc.com International Journal of Computer Science and Mobile Computing A Monthly Journal of Computer Science and Information Technology IJCSMC, Vol. 3, Issue. 1, January 2014,
More informationTexture Recognition with combined GLCM, Wavelet and Rotated Wavelet Features
International Journal of Computer an Electrical Engineering, Vol.3, No., February, 793-863 Texture Recognition with combine GLCM, Wavelet an Rotate Wavelet Features Dipankar Hazra Abstract Aim of this
More informationModern Steganalysis Can Detect YASS
Jan Kodovský, Tomáš Pevný, Jessica Fridrich January 18, 2010 / SPIE 1 / 13 YASS Curriculum Vitae Birth Location: University of California, Santa Barbara Birth Date: More than 2 years ago [Solanki-2007],
More informationAn Algorithm for Building an Enterprise Network Topology Using Widespread Data Sources
An Algorithm for Builing an Enterprise Network Topology Using Wiesprea Data Sources Anton Anreev, Iurii Bogoiavlenskii Petrozavosk State University Petrozavosk, Russia {anreev, ybgv}@cs.petrsu.ru Abstract
More informationShift-map Image Registration
Shift-map Image Registration Linus Svärm Petter Stranmark Centre for Mathematical Sciences, Lun University {linus,petter}@maths.lth.se Abstract Shift-map image processing is a new framework base on energy
More informationwhere ρ i (x, y i ) denotes the cost of changing the i-th cover element from x i to y i. With the syndrome coding, the minimal
814 IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, VOL. 9, NO. 5, MAY 2014 Uniform Embedding for Efficient JPEG Steganography Linjie Guo, Student Member, IEEE, Jiangqun Ni, Member, IEEE, and
More informationWhich gray level should be given the smallest cost for adaptive steganography?
DOI 10.1007/s11042-017-4565-5 Which gray level should be given the smallest cost for adaptive steganography? Yao Wei 1,2 Weiming Zhang 1 Weihai Li 1,2 Nenghai Yu 1,2 Xi Sun 1,2 Received: 9 September 2016
More informationA fast embedded selection approach for color texture classification using degraded LBP
A fast embee selection approach for color texture classification using egrae A. Porebski, N. Vanenbroucke an D. Hama Laboratoire LISIC - EA 4491 - Université u Littoral Côte Opale - 50, rue Ferinan Buisson
More informationText Particles Multi-band Fusion for Robust Text Detection
Text Particles Multi-ban Fusion for Robust Text Detection Pengfei Xu, Rongrong Ji, Hongxun Yao, Xiaoshuai Sun, Tianqiang Liu, an Xianming Liu School of Computer Science an Engineering Harbin Institute
More informationComparative Study of Projection/Back-projection Schemes in Cryo-EM Tomography
Comparative Stuy of Projection/Back-projection Schemes in Cryo-EM Tomography Yu Liu an Jong Chul Ye Department of BioSystems Korea Avance Institute of Science an Technology, Daejeon, Korea ABSTRACT In
More informationMessage Transport With The User Datagram Protocol
Message Transport With The User Datagram Protocol User Datagram Protocol (UDP) Use During startup For VoIP an some vieo applications Accounts for less than 10% of Internet traffic Blocke by some ISPs Computer
More informationCorrelation-based color mosaic interpolation using a connectionist approach
Correlation-base color mosaic interpolation using a connectionist approach Gary L. Embler * Agilent Technologies, Inc. 75 Bowers Avenue, MS 87H Santa Clara, California 9554 USA ABSTRACT This paper presents
More informationRefinement of scene depth from stereo camera ego-motion parameters
Refinement of scene epth from stereo camera ego-motion parameters Piotr Skulimowski, Pawel Strumillo An algorithm for refinement of isparity (epth) map from stereoscopic sequences is propose. The metho
More informationEvolutionary Optimisation Methods for Template Based Image Registration
Evolutionary Optimisation Methos for Template Base Image Registration Lukasz A Machowski, Tshilizi Marwala School of Electrical an Information Engineering University of Witwatersran, Johannesburg, South
More informationSteganalysis of Overlapping Images
Steganalysis of Overlapping Images James M. Whitaker and Andrew D. Ker Oxford University Department of Computer Science, Parks Road, Oxford OX1 3QD, England. ABSTRACT We examine whether steganographic
More informationMORA: a Movement-Based Routing Algorithm for Vehicle Ad Hoc Networks
: a Movement-Base Routing Algorithm for Vehicle A Hoc Networks Fabrizio Granelli, Senior Member, Giulia Boato, Member, an Dzmitry Kliazovich, Stuent Member Abstract Recent interest in car-to-car communications
More informationIntensive Hypercube Communication: Prearranged Communication in Link-Bound Machines 1 2
This paper appears in J. of Parallel an Distribute Computing 10 (1990), pp. 167 181. Intensive Hypercube Communication: Prearrange Communication in Link-Boun Machines 1 2 Quentin F. Stout an Bruce Wagar
More information6 Gradient Descent. 6.1 Functions
6 Graient Descent In this topic we will iscuss optimizing over general functions f. Typically the function is efine f : R! R; that is its omain is multi-imensional (in this case -imensional) an output
More informationA Comparative Evaluation of Iris and Ocular Recognition Methods on Challenging Ocular Images
A Comparative Evaluation of Iris an Ocular Recognition Methos on Challenging Ocular Images Vishnu Naresh Boeti Carnegie Mellon University Pittsburgh, PA 523 naresh@cmu.eu Jonathon M Smereka Carnegie Mellon
More informationKinematic Analysis of a Family of 3R Manipulators
Kinematic Analysis of a Family of R Manipulators Maher Baili, Philippe Wenger an Damien Chablat Institut e Recherche en Communications et Cybernétique e Nantes, UMR C.N.R.S. 6597 1, rue e la Noë, BP 92101,
More informationGeneralized Edge Coloring for Channel Assignment in Wireless Networks
Generalize Ege Coloring for Channel Assignment in Wireless Networks Chun-Chen Hsu Institute of Information Science Acaemia Sinica Taipei, Taiwan Da-wei Wang Jan-Jan Wu Institute of Information Science
More informationAn Adaptive Routing Algorithm for Communication Networks using Back Pressure Technique
International OPEN ACCESS Journal Of Moern Engineering Research (IJMER) An Aaptive Routing Algorithm for Communication Networks using Back Pressure Technique Khasimpeera Mohamme 1, K. Kalpana 2 1 M. Tech
More informationLearning Polynomial Functions. by Feature Construction
I Proceeings of the Eighth International Workshop on Machine Learning Chicago, Illinois, June 27-29 1991 Learning Polynomial Functions by Feature Construction Richar S. Sutton GTE Laboratories Incorporate
More informationTHE increasingly digitized power system offers more data,
1 Cyber Risk Analysis of Combine Data Attacks Against Power System State Estimation Kaikai Pan, Stuent Member, IEEE, Anré Teixeira, Member, IEEE, Milos Cvetkovic, Member, IEEE, an Peter Palensky, Senior
More informationClassifying Facial Expression with Radial Basis Function Networks, using Gradient Descent and K-means
Classifying Facial Expression with Raial Basis Function Networks, using Graient Descent an K-means Neil Allrin Department of Computer Science University of California, San Diego La Jolla, CA 9237 nallrin@cs.ucs.eu
More informationA New Statistical Restoration Method for Spatial Domain Images
A New Statistical Restoration Method for Spatial Domain Images Arijit Sur 1,,PiyushGoel 2, and Jayanta Mukherjee 2 1 Department of Computer Science and Engineering, Indian Institute of Technology, Guwahati-781039,
More informationCHAPTER 3 DIFFERENT DOMAINS OF WATERMARKING. domain. In spatial domain the watermark bits directly added to the pixels of the cover
38 CHAPTER 3 DIFFERENT DOMAINS OF WATERMARKING Digital image watermarking can be done in both spatial domain and transform domain. In spatial domain the watermark bits directly added to the pixels of the
More informationParticle Swarm Optimization Based on Smoothing Approach for Solving a Class of Bi-Level Multiobjective Programming Problem
BULGARIAN ACADEMY OF SCIENCES CYBERNETICS AND INFORMATION TECHNOLOGIES Volume 17, No 3 Sofia 017 Print ISSN: 1311-970; Online ISSN: 1314-4081 DOI: 10.1515/cait-017-0030 Particle Swarm Optimization Base
More informationSynthesis Distortion Estimation in 3D Video Using Frequency and Spatial Analysis
MITSUBISHI EECTRIC RESEARCH ABORATORIES http://www.merl.com Synthesis Distortion Estimation in 3D Vieo Using Frequency an Spatial Analysis Fang,.; Cheung, N-M; Tian, D.; Vetro, A.; Sun, H.; Yu,. TR2013-087
More informationAnyTraffic Labeled Routing
AnyTraffic Labele Routing Dimitri Papaimitriou 1, Pero Peroso 2, Davie Careglio 2 1 Alcatel-Lucent Bell, Antwerp, Belgium Email: imitri.papaimitriou@alcatel-lucent.com 2 Universitat Politècnica e Catalunya,
More informationGeneralized Edge Coloring for Channel Assignment in Wireless Networks
TR-IIS-05-021 Generalize Ege Coloring for Channel Assignment in Wireless Networks Chun-Chen Hsu, Pangfeng Liu, Da-Wei Wang, Jan-Jan Wu December 2005 Technical Report No. TR-IIS-05-021 http://www.iis.sinica.eu.tw/lib/techreport/tr2005/tr05.html
More informationExercises of PIV. incomplete draft, version 0.0. October 2009
Exercises of PIV incomplete raft, version 0.0 October 2009 1 Images Images are signals efine in 2D or 3D omains. They can be vector value (e.g., color images), real (monocromatic images), complex or binary
More informationDesign and Analysis of Optimization Algorithms Using Computational
Appl. Num. Anal. Comp. Math., No. 3, 43 433 (4) / DOI./anac.47 Design an Analysis of Optimization Algorithms Using Computational Statistics T. Bartz Beielstein, K.E. Parsopoulos,3, an M.N. Vrahatis,3 Department
More information1 Surprises in high dimensions
1 Surprises in high imensions Our intuition about space is base on two an three imensions an can often be misleaing in high imensions. It is instructive to analyze the shape an properties of some basic
More informationYet Another Parallel Hypothesis Search for Inverse Entailment Hiroyuki Nishiyama and Hayato Ohwada Faculty of Sci. and Tech. Tokyo University of Scien
Yet Another Parallel Hypothesis Search for Inverse Entailment Hiroyuki Nishiyama an Hayato Ohwaa Faculty of Sci. an Tech. Tokyo University of Science, 2641 Yamazaki, Noa-shi, CHIBA, 278-8510, Japan hiroyuki@rs.noa.tus.ac.jp,
More informationNon-homogeneous Generalization in Privacy Preserving Data Publishing
Non-homogeneous Generalization in Privacy Preserving Data Publishing W. K. Wong, Nios Mamoulis an Davi W. Cheung Department of Computer Science, The University of Hong Kong Pofulam Roa, Hong Kong {wwong2,nios,cheung}@cs.hu.h
More informationSkyline Community Search in Multi-valued Networks
Syline Community Search in Multi-value Networs Rong-Hua Li Beijing Institute of Technology Beijing, China lironghuascut@gmail.com Jeffrey Xu Yu Chinese University of Hong Kong Hong Kong, China yu@se.cuh.eu.h
More informationSTeganography is a technique for covert communication,
1 A New Rule for Cost Reassignment in Adaptive Steganography Wenbo Zhou, Weiming Zhang, and Nenghai Yu Abstract In steganography schemes, the distortion function is used to define modification costs on
More informationDigital fringe profilometry based on triangular fringe patterns and spatial shift estimation
University of Wollongong Research Online Faculty of Engineering an Information Sciences - Papers: Part A Faculty of Engineering an Information Sciences 4 Digital fringe profilometry base on triangular
More informationOffloading Cellular Traffic through Opportunistic Communications: Analysis and Optimization
1 Offloaing Cellular Traffic through Opportunistic Communications: Analysis an Optimization Vincenzo Sciancalepore, Domenico Giustiniano, Albert Banchs, Anreea Picu arxiv:1405.3548v1 [cs.ni] 14 May 24
More informationKeywords Data compression, image processing, NCD, Kolmogorov complexity, JPEG, ZIP
Volume 3, Issue 7, July 203 ISSN: 2277 28X International Journal of Avance Research in Computer Science an Software Engineering Research Paper Available online at: wwwijarcssecom Compression Techniques
More informationOn the Performance of Wavelet Decomposition Steganalysis with JSteg Steganography
On the Performance of Wavelet Decomposition Steganalysis with JSteg Steganography Ainuddin Wahid Abdul Wahab, Johann A Briffa and Hans Georg Schaathun Department of Computing, University of Surrey Abstract.
More informationQuantitative and Binary Steganalysis in JPEG: A Comparative Study
Quantitative and Binary Steganalysis in JPEG: A Comparative Study Ahmad ZAKARIA LIRMM, Univ Montpellier, CNRS ahmad.zakaria@lirmm.fr Marc CHAUMONT LIRMM, Univ Nîmes, CNRS marc.chaumont@lirmm.fr Gérard
More informationFigure 1: Schematic of an SEM [source: ]
EECI Course: -9 May 1 by R. Sanfelice Hybri Control Systems Eelco van Horssen E.P.v.Horssen@tue.nl Project: Scanning Electron Microscopy Introuction In Scanning Electron Microscopy (SEM) a (bunle) beam
More informationParticle Swarm Optimization with Time-Varying Acceleration Coefficients Based on Cellular Neural Network for Color Image Noise Cancellation
Particle Swarm Optimization with Time-Varying Acceleration Coefficients Base on Cellular Neural Network for Color Image Noise Cancellation Te-Jen Su Jui-Chuan Cheng Yang-De Sun 3 College of Information
More informationAdjacency Matrix Based Full-Text Indexing Models
1000-9825/2002/13(10)1933-10 2002 Journal of Software Vol.13, No.10 Ajacency Matrix Base Full-Text Inexing Moels ZHOU Shui-geng 1, HU Yun-fa 2, GUAN Ji-hong 3 1 (Department of Computer Science an Engineering,
More informationBayesian localization microscopy reveals nanoscale podosome dynamics
Nature Methos Bayesian localization microscopy reveals nanoscale poosome ynamics Susan Cox, Ewar Rosten, James Monypenny, Tijana Jovanovic-Talisman, Dylan T Burnette, Jennifer Lippincott-Schwartz, Gareth
More informationVideo-based Characters Creating New Human Performances from a Multi-view Video Database
Vieo-base Characters Creating New Human Performances from a Multi-view Vieo Database Feng Xu Yebin Liu? Carsten Stoll? James Tompkin Gaurav Bharaj? Qionghai Dai Hans-Peter Seiel? Jan Kautz Christian Theobalt?
More informationNEW METHOD FOR FINDING A REFERENCE POINT IN FINGERPRINT IMAGES WITH THE USE OF THE IPAN99 ALGORITHM 1. INTRODUCTION 2.
JOURNAL OF MEDICAL INFORMATICS & TECHNOLOGIES Vol. 13/009, ISSN 164-6037 Krzysztof WRÓBEL, Rafał DOROZ * fingerprint, reference point, IPAN99 NEW METHOD FOR FINDING A REFERENCE POINT IN FINGERPRINT IMAGES
More informationWhat Makes the Stego Image Undetectable?
What Makes the Stego Image Undetectable? Songtao Wu, Yan Liu Department of Computing The Hong Kong Polytechnic University Hong Kong, P. R. China {csstwu, csyliu} @comp.polyu.edu.hk Shenghua Zhong College
More informationHigh dimensional Apollonian networks
High imensional Apollonian networks Zhongzhi Zhang Institute of Systems Engineering, Dalian University of Technology, Dalian 11604, Liaoning, China E-mail: lutzzz063@yahoo.com.cn Francesc Comellas Dep.
More informationLearning convex bodies is hard
Learning convex boies is har Navin Goyal Microsoft Research Inia navingo@microsoftcom Luis Raemacher Georgia Tech lraemac@ccgatecheu Abstract We show that learning a convex boy in R, given ranom samples
More informationResearch Article Research on Law s Mask Texture Analysis System Reliability
Research Journal of Applie Sciences, Engineering an Technology 7(19): 4002-4007, 2014 DOI:10.19026/rjaset.7.761 ISSN: 2040-7459; e-issn: 2040-7467 2014 Maxwell Scientific Publication Corp. Submitte: November
More informationA Revised Simplex Search Procedure for Stochastic Simulation Response Surface Optimization
272 INFORMS Journal on Computing 0899-1499 100 1204-0272 $05.00 Vol. 12, No. 4, Fall 2000 2000 INFORMS A Revise Simplex Search Proceure for Stochastic Simulation Response Surface Optimization DAVID G.
More informationOn Effectively Determining the Downlink-to-uplink Sub-frame Width Ratio for Mobile WiMAX Networks Using Spline Extrapolation
On Effectively Determining the Downlink-to-uplink Sub-frame With Ratio for Mobile WiMAX Networks Using Spline Extrapolation Panagiotis Sarigianniis, Member, IEEE, Member Malamati Louta, Member, IEEE, Member
More informationMultilevel Linear Dimensionality Reduction using Hypergraphs for Data Analysis
Multilevel Linear Dimensionality Reuction using Hypergraphs for Data Analysis Haw-ren Fang Department of Computer Science an Engineering University of Minnesota; Minneapolis, MN 55455 hrfang@csumneu ABSTRACT
More informationOn the Role of Multiply Sectioned Bayesian Networks to Cooperative Multiagent Systems
On the Role of Multiply Sectione Bayesian Networks to Cooperative Multiagent Systems Y. Xiang University of Guelph, Canaa, yxiang@cis.uoguelph.ca V. Lesser University of Massachusetts at Amherst, USA,
More informationCoupling the User Interfaces of a Multiuser Program
Coupling the User Interfaces of a Multiuser Program PRASUN DEWAN University of North Carolina at Chapel Hill RAJIV CHOUDHARY Intel Corporation We have evelope a new moel for coupling the user-interfaces
More informationImage Watermarking Scheme Based on DWT-DCT and SSVD
pp.191-206 http://x.oi.org/10.14257/ijsia.2016.10.10.18 Image Watermarking Scheme Base on DW-DC an SSVD Zhi Zhang, Chengyou Wang * an Xiao Zhou School of Mechanical, Electrical an Information Engineering,
More informationEFFICIENT ON-LINE TESTING METHOD FOR A FLOATING-POINT ADDER
FFICINT ON-LIN TSTING MTHOD FOR A FLOATING-POINT ADDR A. Droz, M. Lobachev Department of Computer Systems, Oessa State Polytechnic University, Oessa, Ukraine Droz@ukr.net, Lobachev@ukr.net Abstract In
More informationResearch Article Inviscid Uniform Shear Flow past a Smooth Concave Body
International Engineering Mathematics Volume 04, Article ID 46593, 7 pages http://x.oi.org/0.55/04/46593 Research Article Invisci Uniform Shear Flow past a Smooth Concave Boy Abullah Mura Department of
More informationA Novel Message Decomposing and Embedding Scheme for Image Steganography
Journal of Computers Vol. 29 No. 2, 2018, pp. 241-248 doi:10.3966/199115992018042902023 A Novel Message Decomposing and Embedding Scheme for Image Steganography Zhihai Zhuo 1*, Ning Zhong 2, Hongxia Miao
More informationState Indexed Policy Search by Dynamic Programming. Abstract. 1. Introduction. 2. System parameterization. Charles DuHadway
State Inexe Policy Search by Dynamic Programming Charles DuHaway Yi Gu 5435537 503372 December 4, 2007 Abstract We consier the reinforcement learning problem of simultaneous trajectory-following an obstacle
More informationDEVELOPMENT OF DamageCALC APPLICATION FOR AUTOMATIC CALCULATION OF THE DAMAGE INDICATOR
Mechanical Testing an Diagnosis ISSN 2247 9635, 2012 (II), Volume 4, 28-36 DEVELOPMENT OF DamageCALC APPLICATION FOR AUTOMATIC CALCULATION OF THE DAMAGE INDICATOR Valentina GOLUBOVIĆ-BUGARSKI, Branislav
More informationBlind Data Classification using Hyper-Dimensional Convex Polytopes
Blin Data Classification using Hyper-Dimensional Convex Polytopes Brent T. McBrie an Gilbert L. Peterson Department of Electrical an Computer Engineering Air Force Institute of Technology 9 Hobson Way
More informationInterior Permanent Magnet Synchronous Motor (IPMSM) Adaptive Genetic Parameter Estimation
Interior Permanent Magnet Synchronous Motor (IPMSM) Aaptive Genetic Parameter Estimation Java Rezaie, Mehi Gholami, Reza Firouzi, Tohi Alizaeh, Karim Salashoor Abstract - Interior permanent magnet synchronous
More informationarxiv: v1 [cs.mm] 2 Mar 2017
This is a preprint of the paper: arxiv:1703.00817v1 [cs.mm] 2 Mar 2017 Daniel Lerch-Hostalot, David Megías, LSB matching steganalysis based on patterns of pixel differences and random embedding, Computers
More informationSocially-optimal ISP-aware P2P Content Distribution via a Primal-Dual Approach
Socially-optimal ISP-aware P2P Content Distribution via a Primal-Dual Approach Jian Zhao, Chuan Wu The University of Hong Kong {jzhao,cwu}@cs.hku.hk Abstract Peer-to-peer (P2P) technology is popularly
More informationA Duality Based Approach for Realtime TV-L 1 Optical Flow
A Duality Base Approach for Realtime TV-L 1 Optical Flow C. Zach 1, T. Pock 2, an H. Bischof 2 1 VRVis Research Center 2 Institute for Computer Graphics an Vision, TU Graz Abstract. Variational methos
More informationProvisioning Virtualized Cloud Services in IP/MPLS-over-EON Networks
Provisioning Virtualize Clou Services in IP/MPLS-over-EON Networks Pan Yi an Byrav Ramamurthy Department of Computer Science an Engineering, University of Nebraska-Lincoln Lincoln, Nebraska 68588 USA Email:
More information