Digital Image Watermarking Algorithm Based on Fast Curvelet Transform
|
|
- Kerry Horton
- 5 years ago
- Views:
Transcription
1 J. Software Engineering & Appications, 010, 3, doi:10.436/jsea Pubished Onine October 010 ( 939 igita Image Watermarking Agorithm Based on Fast Curveet Transform Jindong Xu, Huimin Pang, Jianping Zhao Coege of Physica Engineering, Qufu Norma University, Shandong, China. Emai: Received Juy 15 th, 010; revised August 18 th, 010; accepted August 1 st, 010. ABSTRACT A digita image ing agorithm based on fast curveet transform is proposed. Firsty, the carrier image is decomposed by fast curveet transform, and, the ing image is scrambed by Arnod transform. Secondy, the binary ing image is embedded into the medium frequency coefficients according to the human visua characteristics and curveet coefficients. Experiment resuts show that the proposed agorithm has good performance in both invisibiity and security and aso has good robustness against the noise, cropping, fitering, JPEG compression and other attacks. Keywords: igita Image Watermarking, Fast Curveet Transform, Human Visua Characters, Robustness, Invisibiity 1. Introduction In the past two decades, more and more researchers have devoted to the transform domain which shows good performance and robustness. Recenty, Candès and onoho [1,] have deveoped a new mutiscae transform which is caed the Curveet transform. It is anisotropic with strong direction, and provides optimay sparse representations of objects aong a genera curve with bounded curvature. Hence, it has been widey used in image processing fied. At the same time, many research papers proposed to embed based on the first curveet transform [3-8]. Shi et a. [3] proposed a semi-fragie ing agorithm by embedding the wartermark in the maximum modue of curveet coefficient. This agorithm keeps good toerance against JPEG compression. The method of Thai et a. [4] embedded a in curveet coefficients which are seected by a threshod. This method has good invisibiity and robustness. Thai et a. [5] embedded the in the curveet transform which contain as much edge information as possibe. It has good invisibiity but poor robustness. The impementation of the first curveet transform incudes subband decomposition, smooth partitioning, renormaize and ridgeet anaysis. So these agorithms have many probems such as impementation compexity and arge amount of redundancy. This paper proposes a digita image ing agorithm based on fast curveet transform. Firsty, we take a binary-vaued image which contains copyright information as, and adapt Arnod transform to it to improve its security. Secondy, according to the human visua characteristics, we embed the in curveet coefficients of the origina image. This agorithm is simpe and easy to impement. Experiment resuts show that our agorithm has good invisibiity and security, and is robustness to the noise, cropping, fitering, JPEG compression and other attacks.. Curveet Transform Simiar to the waveet transform and the ridgeet transform, the curveet transform theory is based on sparsity theory [8]. The idea of curveet is to cacuate the inner reationship between the signa and the curveet function to reaize the sparse representation of the signa..1. Continuous Time Curveet Transform The curveet transform can be expressed as f,, c j,, k :, j k (1) here, j = 0, 1,,, is a scae parameter; = 0, 1,,, is an orientation parameter; and k = (k 1, k ) Z is a transation parameter. The mother curveet is φ j (x), its Fourier transform is φ j (ω) = U j (ω), where U j is fre-
2 940 igita Image Watermarking Agorithm Based on Fast Curveet Transform quency window defined in the poar coordinate system such as: 3/4 j j j / U j r, W rv () W and V are radia and anguar windows respectivey and wi aways obey certain admissibiity conditions. Curveet at scae -j, orientation θ and position j, 1 j j xk R k1, k can be expressed as: j, jk,, x j R xx k (3) So, for f L (R ), curveet transform is expressed as: 1 cik,, : fˆ ˆ jk,, ( )d (4) 1 ˆ j, f U j Rθ ωexpi xk, d.. igita Curveet Transform igita curveet transform is inear and takes as input Cartesian arrays of the form f [t 1, t ], 0 t 1, t < n, which aows the output as a coection of coefficients:,, : 1, jk,. 1, c j k f t t t t 0 t1, tn In order to improve the curveet transform in the sense that they are conceptuay simper, faster and far ess redundant. Paper [] proposed the Fast iscrete Curveet Transform (FCT). There are two digita impementation of FCT. The first is based on unequay-spaced fast Fourier transform (USFFT) whie the second is based on the wrapping of speciay seected Fourier sampes. The FCT-Wrapping uses simper choice of spatia grid to transate curveets at each scae and ange. It needs ess two-dimensiona FFTs than FCT-USFFT, so it is quicky. The architecture of FCT via Wrapping is then roughy as foows: 1) Appy the FFT and obtain Fourier sampe f n1, n, -n/ n 1, n n/ (n is the size of the picture). ) For each scae/ange pair (j, ), form the product U, 1 ˆ j n, n f n1, n. 3) Wrap this product around the origin and obtain f, 1 ˆ j n, n W U j, f n1, n, where the range for n and 1 n is now 0 n1 L1,j and 0 n L, j (for in the range ( /4, /4). 4) Appy the inverse FFT to each f j,, hence coecting the discrete coefficients c j,, k. 3. Watermarking Agorithm Based on FCT 3.1. Watermark (5) In this agorithm, the is a binary-vaued image with 3 3 pixes (Figure 1). Arnod transform is used to increase the data security, and its function is defined as (6). x 1 1 x mod N (6) y k k1y Adapt n (here, n = 8) times Arnod transform to the origina W, then we obtain scrambing (Figure ). 3.. Watermark Embedding According to the Human Visua Characteristic, we choose to embed the into medium-frequency. In seected scae, the coefficients of each orientation are sorted and find criterion T i by ampitude factor λ (λ 0). Then choose the minimum T i as embedding parameter T. Finay, the is embedded to coefficients which are chosen by T. The embedding procedure (Figure 3) is described as foows. 1) Appy FCT to the origina image, get curveet coefficient C. ) Seect the curveet coefficient to embed a bit according to the foowing conditions. For 0 0 C j, k T or T C j, k3t For 1 T C j, kt (7) Then record the positions of these coefficients and the positions of 0 and 1 in the. 3) The embedded coefficients are modified by the foowing equations. Embed 0 C jk,, C jk,, mod C j, k, TT 4 (8) Embed 1 C jk,, C jk,, mod C j, k, T 3T 4 4) o inverse FCT to C, obtain the ed image Watermark Extraction The extraction procedure is composed of 4 steps and each step is described as foows. Figure 1. Watermark. Figure. Scrambed.
3 igita Image Watermarking Agorithm Based on Fast Curveet Transform 941 j 1 j j j 4 j 5 n j 3 j, k / Cj, k 3T / C j, k C j, kmodc j, k, TT / 4 0 C T T T / C, j, k T C j, k C j, k modc j, k, T 3T / 4 IFCT Figure 3. Embedding procedure. 1) Appy curveet transform to ed image, obtain curveet coefficient C. ) Locate the positions from the origina image by using embedding procedure step. Then extract the coefficients C from the ed image using those position. 3) Extract the W from C with the foowing rue 1 if mod C j, k, T T i (9) 0 if mod C j, k, T T 4) Appy T -n (T is Arnod transform period) times Arnod transform to W, obtain the binary image. 4. Experimenta Resuts In this program, the image is transformed through FCT via Wrapping. We use standard pixe image Lena (Figure 4) for evauation of our proposed method, and conduct experiments binary-vaued image ing with the noted above parameter scae = 3, λ = We have investigated the invisibiity and the robustness of our ing system, anayzed the agorithm performance by objective and subjective standards Invisibiity Tests The ed image is shown in Figure 5(a), the detected from ed image is shown in Figure 5(b). Figure 4. Origina image. (a) Figure 5. Invisibiity Tests. (a) Watermarked image [PSNR = dB]; (b) etected [NC = 1.00]. (b)
4 94 igita Image Watermarking Agorithm Based on Fast Curveet Transform Tabe 1. JPEG compression attack. Q PSNR NC etected Tabe. Gaussian ow pass fitering attack. Standard eviation (Window) 0.5(3) 1.5(3) 0.5(5) 1.5(5) 3(5) PSNR NC etected Tabe 3. Other attacks. Attacks Gaussian noise (0.001) Sat & Pepper noise (0.01) Random cropping (1/16) Random cropping (1/3) Change contrast PSNR NC etected Subjectivey, the ed image has good invisibiity. Compare Figure 5(b) with Figure, they are fuy consistent. The origina is accuratey recovered. 4.. Robustness Tests To evauate the robustness of agorithm, a the attacks are tested by the software of Stirmark [10,11]. The Peak Signa to Noise Ratio (PSNR) is empoyed to evauate the quaity of ed image after attack, and the Normaized Correation Coefficient (NC) is used to evauate the quaity of extracted for some attacks such as JPEG compression (Quaity factor Q), Gaussian ow pass fitering, adding noise, cropping and so on. The simuation resuts are shown as foowing Tabes. It can be seen from Tabe 1 and Tabe, the proposed method show very good robustness to JPEG compression and Gaussian ow pass fitering. From Tabe 3, the method aso has good robustness against noise, cropping and so on. 5. Concusions This paper proposes a method by embedding a into the origina image based on FCT. At the same time, Arnod transform is appied to improve the security of the system. The experimenta resuts show that the ed image has good invisibiity and robustness against JPEG compression and Gaussian ow pass fitering. There are many unstabe coefficients are discovered from the experiments. For instance, a sma change of the image wi arouse big changes of these coefficients. These unstabe factors can infuence the extracting of. Therefore, the proposed agorithm can not give a good performance of rotation and scaing, etc. In the future, we wi unceasing devote ourseves to the study of the robustness system against geometric attacks based on curveet transform. REFERENCES [1]. L. onoho and M. R. uncan, igita Curveet
5 igita Image Watermarking Agorithm Based on Fast Curveet Transform 943 Transform: Strategy, Impementation and Experiments, Proceeding of the SPIE on Waveet Appication VII, Orando, 000, pp [] E. J. Candes, L. emanet and. L. onoho, Fast iscrete Curveet Transforms [R], Appied and Computationa Mathematics, 005, pp [3] J. P. Shi and Z. J. Zhai, Curveet Transform for Image Authentication, Rough Set and Knowedge Technoogy, LNAI 406, 006, pp [4] T.. Hien, I. Kei, H. Harak, et a., Curveet-omain Image Watermarking Based on Edge-Embedding, Lecture Notes in Computer Science, Vo. 4693, No. 010, 007, pp [5] T.. Hien, K. Miyara, et a., Curveet Transform Based Logo Watermarking, Innovative Ago-Rithms and Techniques in Automation, Industria Eectronics and Teecommunication, 007, pp [6] H. Y. Leung, L. M. Cheng and L. L. Cheng, igita Watermarking Schemes Using Muti-Resoution Curveet and HVS Mode Lecture Notes in Computer Science, Vo. 5703, 009, pp [7] H. Y. Leung, L. M. Cheng and L. L. Cheng. A Robust Watermarking Scheme Using Seective Curveet Coefficients, Internationa Conference on Inteigient Information Hiding and Mutimedia Signa Processing, Harbin, August 008, pp [8] T.. Hien, K. Miyara, I. Kei and F. F. Ai, igita Watermarking Based on Curveet Transform, 9th Internationa Symposium on Signa Processing and Its Appications, Sharjah, Feburary 007, pp [9] J. L. Cheng and T. Shan. eveopment and Prospect of Image Mutiscae Geometric Anaysis, Acta Eectronic Sinica, Vo. 31, No. 1 A, pp [10] A. P. Fabien and Petitcoas. Watermarking Schemes Evauation, IEEE. Signa Processing, Vo. 17, No. 5, 000, pp [11] Stirmark. /stirmark/
Fuzzy Perceptual Watermarking For Ownership Verification
Fuzzy Perceptua Watermarking For Ownership Verification Mukesh Motwani 1 and Frederick C. Harris, Jr. 1 1 Computer Science & Engineering Department, University of Nevada, Reno, NV, USA Abstract - An adaptive
More informationWATERMARKING GIS DATA FOR DIGITAL MAP COPYRIGHT PROTECTION
WATERMARKING GIS DATA FOR DIGITAL MAP COPYRIGHT PROTECTION Shen Tao Chinese Academy of Surveying and Mapping, Beijing 100039, China shentao@casm.ac.cn Xu Dehe Institute of resources and environment, North
More informationHiding secrete data in compressed images using histogram analysis
University of Woongong Research Onine University of Woongong in Dubai - Papers University of Woongong in Dubai 2 iding secrete data in compressed images using histogram anaysis Farhad Keissarian University
More informationApplication of Image Fusion Techniques on Medical Images
Internationa Journa of Current Engineering and Technoogy E-ISS 77 406, P-ISS 347 56 07 IPRESSCO, A Rights Reserved Avaiabe at http://inpressco.com/category/icet Research Artice Appication of Image usion
More informationResearch of Classification based on Deep Neural Network
2018 Internationa Conference on Sensor Network and Computer Engineering (ICSNCE 2018) Research of Emai Cassification based on Deep Neura Network Wang Yawen Schoo of Computer Science and Engineering Xi
More informationImage Segmentation Using Semi-Supervised k-means
I J C T A, 9(34) 2016, pp. 595-601 Internationa Science Press Image Segmentation Using Semi-Supervised k-means Reza Monsefi * and Saeed Zahedi * ABSTRACT Extracting the region of interest is a very chaenging
More informationA NEW APPROACH FOR BLOCK BASED STEGANALYSIS USING A MULTI-CLASSIFIER
Internationa Journa on Technica and Physica Probems of Engineering (IJTPE) Pubished by Internationa Organization of IOTPE ISSN 077-358 IJTPE Journa www.iotpe.com ijtpe@iotpe.com September 014 Issue 0 Voume
More informationA New Supervised Clustering Algorithm Based on Min-Max Modular Network with Gaussian-Zero-Crossing Functions
2006 Internationa Joint Conference on Neura Networks Sheraton Vancouver Wa Centre Hote, Vancouver, BC, Canada Juy 16-21, 2006 A New Supervised Custering Agorithm Based on Min-Max Moduar Network with Gaussian-Zero-Crossing
More informationMulti-level Shape Recognition based on Wavelet-Transform. Modulus Maxima
uti-eve Shape Recognition based on Waveet-Transform oduus axima Faouzi Aaya Cheikh, Azhar Quddus and oncef Gabbouj Tampere University of Technoogy (TUT), Signa Processing aboratory, P.O. Box 553, FIN-33101
More informationLanguage Identification for Texts Written in Transliteration
Language Identification for Texts Written in Transiteration Andrey Chepovskiy, Sergey Gusev, Margarita Kurbatova Higher Schoo of Economics, Data Anaysis and Artificia Inteigence Department, Pokrovskiy
More informationNon-linear adaptive image enhancement in wireless sensor networks based on nonsubsampled
Tong and Chen EURASIP Journa on Wireess Communications and Networking (2017) 2017:46 DOI 10.1186/s13638-017-0829-z RESEARCH Non-inear adaptive image enhancement in wireess sensor networks based on nonsubsamped
More informationJOINT IMAGE REGISTRATION AND EXAMPLE-BASED SUPER-RESOLUTION ALGORITHM
JOINT IMAGE REGISTRATION AND AMPLE-BASED SUPER-RESOLUTION ALGORITHM Hyo-Song Kim, Jeyong Shin, and Rae-Hong Park Department of Eectronic Engineering, Schoo of Engineering, Sogang University 35 Baekbeom-ro,
More informationA study of comparative evaluation of methods for image processing using color features
A study of comparative evauation of methods for image processing using coor features FLORENTINA MAGDA ENESCU,CAZACU DUMITRU Department Eectronics, Computers and Eectrica Engineering University Pitești
More informationEndoscopic Motion Compensation of High Speed Videoendoscopy
Endoscopic Motion Compensation of High Speed Videoendoscopy Bharath avuri Department of Computer Science and Engineering, University of South Caroina, Coumbia, SC - 901. ravuri@cse.sc.edu Abstract. High
More informationA Fast Block Matching Algorithm Based on the Winner-Update Strategy
In Proceedings of the Fourth Asian Conference on Computer Vision, Taipei, Taiwan, Jan. 000, Voume, pages 977 98 A Fast Bock Matching Agorithm Based on the Winner-Update Strategy Yong-Sheng Chenyz Yi-Ping
More informationContourlet Tranform Based Human Emotion Recognition System
Internationa Journa of Signa Processing Systems Vo. 2, No. 1 June 2014 Contouret Tranform Based Human Emotion Recognition System R. Suresh and S. Audithan Department of computer science and Engineering,
More informationBacking-up Fuzzy Control of a Truck-trailer Equipped with a Kingpin Sliding Mechanism
Backing-up Fuzzy Contro of a Truck-traier Equipped with a Kingpin Siding Mechanism G. Siamantas and S. Manesis Eectrica & Computer Engineering Dept., University of Patras, Patras, Greece gsiama@upatras.gr;stam.manesis@ece.upatras.gr
More informationCollinearity and Coplanarity Constraints for Structure from Motion
Coinearity and Copanarity Constraints for Structure from Motion Gang Liu 1, Reinhard Kette 2, and Bodo Rosenhahn 3 1 Institute of Information Sciences and Technoogy, Massey University, New Zeaand, Department
More informationA Memory Grouping Method for Sharing Memory BIST Logic
A Memory Grouping Method for Sharing Memory BIST Logic Masahide Miyazai, Tomoazu Yoneda, and Hideo Fuiwara Graduate Schoo of Information Science, Nara Institute of Science and Technoogy (NAIST), 8916-5
More informationQuality Assessment for Stereoscopic Images by Distortion Separation
JOURNAL OF SOFTWARE, VOL. 9, NO. 1, JANUARY 14 37 Quaity Assessment for Stereoscopic Images by Distortion Separation Chaozheng Hu, Feng Shao*, Gangyi Jiang, Mei Yu, Fucui Li, Zongju Peng Facuty of Information
More informationUniversity of Illinois at Urbana-Champaign, Urbana, IL 61801, /11/$ IEEE 162
oward Efficient Spatia Variation Decomposition via Sparse Regression Wangyang Zhang, Karthik Baakrishnan, Xin Li, Duane Boning and Rob Rutenbar 3 Carnegie Meon University, Pittsburgh, PA 53, wangyan@ece.cmu.edu,
More informationOptimization and Application of Support Vector Machine Based on SVM Algorithm Parameters
Optimization and Appication of Support Vector Machine Based on SVM Agorithm Parameters YAN Hui-feng 1, WANG Wei-feng 1, LIU Jie 2 1 ChongQing University of Posts and Teecom 400065, China 2 Schoo Of Civi
More informationMultiple Plane Phase Retrieval Based On Inverse Regularized Imaging and Discrete Diffraction Transform
Mutipe Pane Phase Retrieva Based On Inverse Reguaried Imaging and Discrete Diffraction Transform Artem Migukin, Vadimir Katkovnik, and Jaakko Astoa Department of Signa Processing, Tampere University of
More informationJoint disparity and motion eld estimation in. stereoscopic image sequences. Ioannis Patras, Nikos Alvertos and Georgios Tziritas y.
FORTH-ICS / TR-157 December 1995 Joint disparity and motion ed estimation in stereoscopic image sequences Ioannis Patras, Nikos Avertos and Georgios Tziritas y Abstract This work aims at determining four
More informationAUTOMATIC gender classification based on facial images
SUBMITTED TO IEEE TRANSACTIONS ON NEURAL NETWORKS 1 Gender Cassification Using a Min-Max Moduar Support Vector Machine with Incorporating Prior Knowedge Hui-Cheng Lian and Bao-Liang Lu, Senior Member,
More informationFurther Optimization of the Decoding Method for Shortened Binary Cyclic Fire Code
Further Optimization of the Decoding Method for Shortened Binary Cycic Fire Code Ch. Nanda Kishore Heosoft (India) Private Limited 8-2-703, Road No-12 Banjara His, Hyderabad, INDIA Phone: +91-040-3378222
More informationSubgrade Cumulative Plastic Deformation under the Bridge in the Transitional Period of Orbit Dynamics Analysis
499 A pubication of CHEMICAL ENGINEERING TRANSACTIONS VOL. 59, 2017 Guest Editors: Zhuo Yang, Junjie Ba, Jing Pan Copyright 2017, AIDIC Servizi S.r.. ISBN 978-88-95608-49-5; ISSN 2283-9216 The Itaian Association
More informationA Petrel Plugin for Surface Modeling
A Petre Pugin for Surface Modeing R. M. Hassanpour, S. H. Derakhshan and C. V. Deutsch Structure and thickness uncertainty are important components of any uncertainty study. The exact ocations of the geoogica
More informationReal-Time Feature Descriptor Matching via a Multi-Resolution Exhaustive Search Method
297 Rea-Time Feature escriptor Matching via a Muti-Resoution Ehaustive Search Method Chi-Yi Tsai, An-Hung Tsao, and Chuan-Wei Wang epartment of Eectrica Engineering, Tamang University, New Taipei City,
More informationA VIDEO-BASED APPROACH FOR RAILWAY BRIDGE SURFACE CRACK DETECTION
6 th Internationa Symposium on Mobie Mapping Technoogy, Presidente Prudente, São Pauo, Brazi, Juy 21-24, 2009 A VIDEO-BASED APPROACH FOR RAILWAY BRIDGE SURFACE CRACK DETECTION LI Qingquan a,c, CHEN Long
More informationPneumo-Mechanical Simulation of a 2 Dof Planar Manipulator
Pneumo-Mechanica Simuation of a 2 Dof Panar Manipuator Hermes GIBERTI, Simone CINQUEMANI Mechanica Engineering Department, Poitecnico di Miano, Campus Bovisa Sud, via La Masa 34, 2156, Miano, Itay ABSTRACT
More informationLossless Authentication Watermarking Based on Adaptive Modular Arithmetic
5 HENGFU YANG, ET AL, LOSSLESS AUTHENTICATION WATERMARKING BASED ON ADAPTIVE MODULAR ARITHMETIC Lossess Authentication Watermarking Based on Adaptive Moduar Arithmetic Hengfu YANG 1,, Xingming SUN 1, Guang
More informationQuality Assessment using Tone Mapping Algorithm
Quaity Assessment using Tone Mapping Agorithm Nandiki.pushpa atha, Kuriti.Rajendra Prasad Research Schoar, Assistant Professor, Vignan s institute of engineering for women, Visakhapatnam, Andhra Pradesh,
More informationFREE-FORM ANISOTROPY: A NEW METHOD FOR CRACK DETECTION ON PAVEMENT SURFACE IMAGES
FREE-FORM ANISOTROPY: A NEW METHOD FOR CRACK DETECTION ON PAVEMENT SURFACE IMAGES Tien Sy Nguyen, Stéphane Begot, Forent Ducuty, Manue Avia To cite this version: Tien Sy Nguyen, Stéphane Begot, Forent
More informationA Robust Technique for Feature-based Image Mosaicing using Image Fusion
A Robust Technique for Feature-based Image Mosaicing using Image Fusion Vima Singh Bind, Priya Ranjan Mudui, Umesh Chandra Pati Dept. of Eectronics and Communication Engg., NIT, Rourkea vimasinghbindeex@gmai.com
More informationAutomatic Hidden Web Database Classification
Automatic idden Web atabase Cassification Zhiguo Gong, Jingbai Zhang, and Qian Liu Facuty of Science and Technoogy niversity of Macau Macao, PRC {fstzgg,ma46597,ma46620}@umac.mo Abstract. In this paper,
More informationResearch on UAV Fixed Area Inspection based on Image Reconstruction
Research on UAV Fixed Area Inspection based on Image Reconstruction Kun Cao a, Fei Wu b Schoo of Eectronic and Eectrica Engineering, Shanghai University of Engineering Science, Abstract Shanghai 20600,
More informationMobile App Recommendation: Maximize the Total App Downloads
Mobie App Recommendation: Maximize the Tota App Downoads Zhuohua Chen Schoo of Economics and Management Tsinghua University chenzhh3.12@sem.tsinghua.edu.cn Yinghui (Catherine) Yang Graduate Schoo of Management
More informationLecture Notes for Chapter 4 Part III. Introduction to Data Mining
Data Mining Cassification: Basic Concepts, Decision Trees, and Mode Evauation Lecture Notes for Chapter 4 Part III Introduction to Data Mining by Tan, Steinbach, Kumar Adapted by Qiang Yang (2010) Tan,Steinbach,
More informationM-BAND DUAL TREE COMPLEX WAVELET TRANSFORM
Internationa Journa of Advances in Engineering & Technoogy, Juy 22. M-BAND DUAL TREE COMPLEX WAVELET TRANSFORM FOR TEXTURE IMAGE INDEXING AND RETRIEVAL K. N. Prakash and K. Satya Prasad 2 Research Schoar,
More informationFACE RECOGNITION WITH HARMONIC DE-LIGHTING. s: {lyqing, sgshan, wgao}jdl.ac.cn
FACE RECOGNITION WITH HARMONIC DE-LIGHTING Laiyun Qing 1,, Shiguang Shan, Wen Gao 1, 1 Graduate Schoo, CAS, Beijing, China, 100080 ICT-ISVISION Joint R&D Laboratory for Face Recognition, CAS, Beijing,
More informationClassification of EEG Signal by STFT-CNN Framework: Identification of Right-/left-hand Motor Imagination in BCI Systems
Cassification of EEG Signa by STFT-CNN Framework: Identification of Right-/eft-hand Motor Imagination in BCI Systems 12 Brain Cognitive Computing Lab, Schoo of Information Engineering, Minzu University
More informationAn Indian Journal FULL PAPER ABSTRACT KEYWORDS. Trade Science Inc.
[Type text] [Type text] [Type text] ISSN : 0974-7435 Voume 10 Issue 16 BioTechnoogy 014 An Indian Journa FULL PAPER BTAIJ, 10(16), 014 [999-9307] Study on prediction of type- fuzzy ogic power system based
More informationReference trajectory tracking for a multi-dof robot arm
Archives of Contro Sciences Voume 5LXI, 5 No. 4, pages 53 57 Reference trajectory tracking for a muti-dof robot arm RÓBERT KRASŇANSKÝ, PETER VALACH, DÁVID SOÓS, JAVAD ZARBAKHSH This paper presents the
More informationEfficient method to design RF pulses for parallel excitation MRI using gridding and conjugate gradient
Origina rtice Efficient method to design RF puses for parae excitation MRI using gridding and conjugate gradient Shuo Feng, Jim Ji Department of Eectrica & Computer Engineering, Texas & M University, Texas,
More informationComputer Graphics. - Shading & Texturing -
Computer Graphics - Shading & Texturing - Empirica BRDF Approximation Purey heuristic mode Initiay without units (vaues [0,1] r = r,a + r,d + r,s ( + r,m + r,t r,a : Ambient term Approximate indirect iumination
More informationResource Optimization to Provision a Virtual Private Network Using the Hose Model
Resource Optimization to Provision a Virtua Private Network Using the Hose Mode Monia Ghobadi, Sudhakar Ganti, Ghoamai C. Shoja University of Victoria, Victoria C, Canada V8W 3P6 e-mai: {monia, sganti,
More informationA Novel Linear-Polynomial Kernel to Construct Support Vector Machines for Speech Recognition
Journa of Computer Science 7 (7): 99-996, 20 ISSN 549-3636 20 Science Pubications A Nove Linear-Poynomia Kerne to Construct Support Vector Machines for Speech Recognition Bawant A. Sonkambe and 2 D.D.
More informationService Scheduling for General Packet Radio Service Classes
Service Scheduing for Genera Packet Radio Service Casses Qixiang Pang, Amir Bigoo, Victor C. M. Leung, Chris Schoefied Department of Eectrica and Computer Engineering, University of British Coumbia, Vancouver,
More informationA Robust Sign Language Recognition System with Sparsely Labeled Instances Using Wi-Fi Signals
A Robust Sign Language Recognition System with Sparsey Labeed Instances Using Wi-Fi Signas Jiacheng Shang, Jie Wu Center for Networked Computing Dept. of Computer and Info. Sciences Tempe University Motivation
More informationSubstitute Model of Deep-groove Ball Bearings in Numeric Analysis of Complex Constructions Like Manipulators
Mechanics and Mechanica Engineering Vo. 12, No. 4 (2008) 349 356 c Technica University of Lodz Substitute Mode of Deep-groove Ba Bearings in Numeric Anaysis of Compex Constructions Like Manipuators Leszek
More informationCOMPRESSIVE sensing (CS), which aims at recovering
D-Net: Deep Learning pproach for Compressive Sensing RI Yan Yang, Jian Sun, Huibin Li, and Zongben u ariv:705.06869v [cs.cv] 9 ay 07 bstract Compressive sensing (CS) is an effective approach for fast agnetic
More informationGrating cell operator features for oriented texture segmentation
Appeared in in: Proc. of the 14th Int. Conf. on Pattern Recognition, Brisbane, Austraia, August 16-20, 1998, pp.1010-1014. Grating ce operator features for oriented texture segmentation P. Kruizinga and
More informationLearning Dynamic Guidance for Depth Image Enhancement
Learning Dynamic Guidance for Depth Image Enhancement Shuhang Gu 1, Wangmeng Zuo 2, Shi Guo 2, Yunjin Chen 3, Chongyu Chen 4,1, Lei Zhang 1, 1 The Hong Kong Poytechnic University, 2 Harbin Institute of
More informationProviding Hop-by-Hop Authentication and Source Privacy in Wireless Sensor Networks
The 31st Annua IEEE Internationa Conference on Computer Communications: Mini-Conference Providing Hop-by-Hop Authentication and Source Privacy in Wireess Sensor Networks Yun Li Jian Li Jian Ren Department
More informationResearch Article Frame Interpolation Based on Visual Correspondence and Coherency Sensitive Hashing
Mathematica Probems in Engineering Voume 2013, Artice ID 453278, 11 pages http://dx.doi.org/10.1155/2013/453278 Research Artice Frame Interpoation Based on Visua Correspondence and Coherency Sensitive
More informationAn Edge Guided Image Interpolation Algorithm via Directional Filtering and Data Fusion
An Edge Guided Image Interpoation Agoritm via Directiona Fitering and Data Fusion Lei Zang *a, Member, IEEE, and Xiaoin Wu b, Senior Member, IEEE a Dept. of Computing, Te Hong Kong Poytecnic University
More informationMulti-task hidden Markov modeling of spectrogram feature from radar high-resolution range profiles
http://asp.eurasipjournas.com/content/22//86 RESEARCH Open Access Muti-task hidden Markov modeing of spectrogram feature from radar high-resoution range profies Mian Pan, Lan Du *, Penghui Wang, Hongwei
More informationMassively Parallel Part of Speech Tagging Using. Min-Max Modular Neural Networks.
assivey Parae Part of Speech Tagging Using in-ax oduar Neura Networks Bao-Liang Lu y, Qing a z, ichinori Ichikawa y, & Hitoshi Isahara z y Lab. for Brain-Operative Device, Brain Science Institute, RIEN
More informationTHE PERCENTAGE OCCUPANCY HIT OR MISS TRANSFORM
17th European Signa Processing Conference (EUSIPCO 2009) Gasgow, Scotand, August 24-28, 2009 THE PERCENTAGE OCCUPANCY HIT OR MISS TRANSFORM P. Murray 1, S. Marsha 1, and E.Buinger 2 1 Dept. of Eectronic
More informationPerformance Enhancement of 2D Face Recognition via Mosaicing
Performance Enhancement of D Face Recognition via Mosaicing Richa Singh, Mayank Vatsa, Arun Ross, Afze Noore West Virginia University, Morgantown, WV 6506 {richas, mayankv, ross, noore}@csee.wvu.edu Abstract
More informationCNN and RNN Based Neural Networks for Action Recognition
Journa of Physics: Conference Series PAPER OPEN ACCESS CNN and RNN Based Neura Networks for Action Recognition To cite this artice: Chen Zhao et a 2018 J. Phys.: Conf. Ser. 1087 062013 View the artice
More informationHuman Action Recognition Using Key Points Displacement
Human Action Recognition Using Key Points Dispacement Kuan-Ting Lai,, Chaur-Heh Hsieh 3, Mao-Fu Lai 4, and Ming-Syan Chen, Research Center for Information Technoogy Innovation, Academia Sinica, Taiwan
More informationEfficient Histogram-based Indexing for Video Copy Detection
Efficient Histogram-based Indexing for Video Copy Detection Chih-Yi Chiu, Jenq-Haur Wang*, and Hung-Chi Chang Institute of Information Science, Academia Sinica, Taiwan *Department of Computer Science and
More informationFiltering. Yao Wang Polytechnic University, Brooklyn, NY 11201
Spatia Domain Linear Fitering Yao Wang Poytechnic University Brookyn NY With contribution rom Zhu Liu Onur Gueryuz and Gonzaez/Woods Digita Image Processing ed Introduction Outine Noise remova using ow-pass
More informationA Comparison of a Second-Order versus a Fourth- Order Laplacian Operator in the Multigrid Algorithm
A Comparison of a Second-Order versus a Fourth- Order Lapacian Operator in the Mutigrid Agorithm Kaushik Datta (kdatta@cs.berkeey.edu Math Project May 9, 003 Abstract In this paper, the mutigrid agorithm
More informationRETINAL blood vessels generally show a coarse to fine
1 A Hierarchica Image Matting Mode for Bood Vesse Segmentation in Fundus images Zhun Fan, Senior Member, IEEE, Jiewei Lu, Wenji Li, Caimin Wei, Han Huang, Xinye Cai, Xinjian Chen, Senior Member, IEEE,
More informationMACHINE learning techniques can, automatically,
Proceedings of Internationa Joint Conference on Neura Networks, Daas, Texas, USA, August 4-9, 203 High Leve Data Cassification Based on Network Entropy Fiipe Aves Neto and Liang Zhao Abstract Traditiona
More informationarxiv: v1 [cs.cv] 28 Sep 2015
Fast Non-oca Stereo Matching based on Hierarchica Disparity Prediction Xuan Luo, Xuejiao Bai, Shuo Li, Hongtao Lu Shanghai Jiao Tong University, No. 800, Dongchuan Road, Shanghai, China {roxanneuo, yukiaya,
More informationLarge-Scale Modeling of Parametric Surfaces using Spherical Harmonics
Large-Scae Modeing of Parametric Surfaces using Spherica Harmonics Li Shen Dept of Computer and Info Science University of Massachusetts Dartmouth N Dartmouth, MA 2747 shen@umassdedu Moo K Chung Department
More informationNearest Neighbor Learning
Nearest Neighbor Learning Cassify based on oca simiarity Ranges from simpe nearest neighbor to case-based and anaogica reasoning Use oca information near the current query instance to decide the cassification
More informationAbsolute three-dimensional shape measurement with two-frequency square binary patterns
871 Vo. 56, No. 31 / November 1 217 / Appied Optics Research Artice Absoute three-dimensiona shape measurement with two-frequency square binary patterns CHUFAN JIANG AND SONG ZHANG* Schoo of Mechanica
More informationA VLSI Architecture of JPEG2000 Encoder
A VLSI Architecture of JPEG2000 Encoder Leibo LIU, Ning CHEN, Hongying MENG, Li ZHANG, Zhihua WANG, and Hongyi CHEN Abstract This paper proposes a VLSI architecture of JPEG2000 encoder, which functionay
More informationImage denoising using curvelet transform: an approach for edge preservation
Journal of Scientific & Industrial Research Vol. 3469, January 00, pp. 34-38 J SCI IN RES VOL 69 JANUARY 00 Image denoising using curvelet transform: an approach for edge preservation Anil A Patil * and
More informationRobust Multimodal Recognition via Multitask Multivariate Low-Rank Representations
Robust Mutimoda Recognition via Mutitask Mutivariate Low-Rank Representations Heng Zhang, Visha M. Pate and Rama Cheappa Center for Automation Research, UMIACS, University of Maryand, Coege Park, MD 074
More informationWHILE estimating the depth of a scene from a single image
JOURNAL OF L A T E X CLASS FILES, VOL. 4, NO. 8, AUGUST 05 Monocuar Depth Estimation using Muti-Scae Continuous CRFs as Sequentia Deep Networks Dan Xu, Student Member, IEEE, Eisa Ricci, Member, IEEE, Wani
More informationA HIGH PERFORMANCE, LOW LATENCY, LOW POWER AUDIO PROCESSING SYSTEM FOR WIDEBAND SPEECH OVER WIRELESS LINKS
A HIGH PERFORMANCE, LOW LATENCY, LOW POWER AUDIO PROCESSING SYSTEM FOR WIDEBAND SPEECH OVER WIRELESS LINKS Etienne Cornu 1, Aain Dufaux 2, and David Hermann 1 1 AMI Semiconductor Canada, 611 Kumpf Drive,
More informationA Top-to-Bottom View: Energy Analysis for Mobile Application Source Code
A Top-to-Bottom View: Energy Anaysis for Mobie Appication Source Code Xueiang Li John P. Gaagher Roskide University Emai: {xueiang, jpg}@ruc.dk arxiv:1510.04165v1 [cs.oh] 14 Oct 2015 Abstract Energy efficiency
More informationFuzzy Equivalence Relation Based Clustering and Its Use to Restructuring Websites Hyperlinks and Web Pages
Fuzzy Equivaence Reation Based Custering and Its Use to Restructuring Websites Hyperinks and Web Pages Dimitris K. Kardaras,*, Xenia J. Mamakou, and Bi Karakostas 2 Business Informatics Laboratory, Dept.
More informationMinimizing Resource Cost for Camera Stream Scheduling in Video Data Center
Gao YH, Ma HD, Liu W. Minimizing resource cost for camera stream scheduing in video data center. JOURNAL OF COMPUTER SCIENCE AND TECHNOLOGY 32(3): 555 570 May 2017. DOI 10.1007/s11390-017-1743-x Minimizing
More informationDETECTION OF OBSTACLE AND FREESPACE IN AN AUTONOMOUS WHEELCHAIR USING A STEREOSCOPIC CAMERA SYSTEM
DETECTION OF OBSTACLE AND FREESPACE IN AN AUTONOMOUS WHEELCHAIR USING A STEREOSCOPIC CAMERA SYSTEM Le Minh 1, Thanh Hai Nguyen 2, Tran Nghia Khanh 2, Vo Văn Toi 2, Ngo Van Thuyen 1 1 University of Technica
More informationPath-Based Protection for Surviving Double-Link Failures in Mesh-Restorable Optical Networks
Path-Based Protection for Surviving Doube-Link Faiures in Mesh-Restorabe Optica Networks Wensheng He and Arun K. Somani Dependabe Computing and Networking Laboratory Department of Eectrica and Computer
More informationUniversity of Bristol - Explore Bristol Research. Link to published version (if available): /ICIP
Anantrasirichai, N., & Canagarajah, C. N. (2010). Spatiotempora superresoution for ow bitrate H.264 video. In IEEE Internationa Conference on Image Processing. (pp. 2809-2812). 10.1109/ICIP.2010.5651088
More informationLoad Balancing by MPLS in Differentiated Services Networks
Load Baancing by MPLS in Differentiated Services Networks Riikka Susitaiva, Jorma Virtamo, and Samui Aato Networking Laboratory, Hesinki University of Technoogy P.O.Box 3000, FIN-02015 HUT, Finand {riikka.susitaiva,
More informationResponse Surface Model Updating for Nonlinear Structures
Response Surface Mode Updating for Noninear Structures Gonaz Shahidi a, Shamim Pakzad b a PhD Student, Department of Civi and Environmenta Engineering, Lehigh University, ATLSS Engineering Research Center,
More informationDesign Research of Nanopositioner based on SPM and its simulation of FEM Z.Y. Zhang 1,a,H. Q. Li 1,b,and H.X. Zhou 2,c
Soid State Phenomena Vos. - (7) pp 47-478 Onine: 7--5 (7) Trans Tech Pubications, Switzerand doi:.48/www.scientific.net/ssp.-.47 Design Research of Nanopositioner based on SPM and its simuation of FEM..
More informationA Robust Method for Shape-based 3D Model Retrieval
A Robust Method for Shape-based 3D Mode Retrieva Yi Liu, Jiantao Pu, Guyu Xin, Hongbin Zha Weibin Liu 1, Yusue Uehara ationa Laboratory on Machine Perception Internet Appication Lab, Fujitsu R&D Center
More informationThe Classification of Stored Grain Pests based on Convolutional Neural Network
2017 2nd Internationa Conference on Mechatronics and Information Technoogy (ICMIT 2017) The Cassification of Stored Grain Pests based on Convoutiona Neura Network Dexian Zhang1, Wenun Zhao*, 1 1 Schoo
More informationTesting Whether a Set of Code Words Satisfies a Given Set of Constraints *
JOURNAL OF INFORMATION SCIENCE AND ENGINEERING 6, 333-346 (010) Testing Whether a Set of Code Words Satisfies a Given Set of Constraints * HSIN-WEN WEI, WAN-CHEN LU, PEI-CHI HUANG, WEI-KUAN SHIH AND MING-YANG
More informationDepth Reconstruction from Sparse Samples: Representation, Algorithm, and Sampling
Depth Reconstruction from Sparse Sampes: Representation, Agorithm, and Samping Lee-Kang Liu, Student Member, IEEE, Staney H. Chan, Member, IEEE and Truong Q. Nguyen, Feow, IEEE arxiv:407.3840v4 [cs.cv]
More informationAdaptive 360 VR Video Streaming: Divide and Conquer!
Adaptive 360 VR Video Streaming: Divide and Conquer! Mohammad Hosseini *, Viswanathan Swaminathan * University of Iinois at Urbana-Champaign (UIUC) Adobe Research, San Jose, USA Emai: shossen2@iinois.edu,
More informationA HYBRID FEATURE SELECTION METHOD BASED ON FISHER SCORE AND GENETIC ALGORITHM
Journa of Mathematica Sciences: Advances and Appications Voume 37, 2016, Pages 51-78 Avaiabe at http://scientificadvances.co.in DOI: http://dx.doi.org/10.18642/jmsaa_7100121627 A HYBRID FEATURE SELECTION
More informationA NEW ROBUST IMAGE WATERMARKING SCHEME BASED ON DWT WITH SVD
A NEW ROBUST IMAGE WATERMARKING SCHEME BASED ON WITH S.Shanmugaprabha PG Scholar, Dept of Computer Science & Engineering VMKV Engineering College, Salem India N.Malmurugan Director Sri Ranganathar Institute
More informationA probabilistic fuzzy method for emitter identification based on genetic algorithm
A probabitic fuzzy method for emitter identification based on genetic agorithm Xia Chen, Weidong Hu, Hongwen Yang, Min Tang ATR Key Lab, Coege of Eectronic Science and Engineering Nationa University of
More informationChapter Multidimensional Direct Search Method
Chapter 09.03 Mutidimensiona Direct Search Method After reading this chapter, you shoud be abe to:. Understand the fundamentas of the mutidimensiona direct search methods. Understand how the coordinate
More informationDIGITAL IMAGE WATERMARKING BASED ON A RELATION BETWEEN SPATIAL AND FREQUENCY DOMAINS
DIGITAL IMAGE WATERMARKING BASED ON A RELATION BETWEEN SPATIAL AND FREQUENCY DOMAINS Murat Furat Mustafa Oral e-mail: mfurat@cu.edu.tr e-mail: moral@mku.edu.tr Cukurova University, Faculty of Engineering,
More informationRelative Positioning from Model Indexing
Reative Positioning from Mode Indexing Stefan Carsson Computationa Vision and Active Perception Laboratory (CVAP)* Roya Institute of Technoogy (KTH), Stockhom, Sweden Abstract We show how to determine
More informationMultiscale Representation of Surfaces by Tight Wavelet Frames with Applications to Denoising
Mutiscae Representation of Surfaces by Tight Waveet Frames with Appications to Denoising Bin Dong a, Qingtang Jiang b, Chaoqiang Liu c, and Zuowei Shen c a Department of Mathematics, University of Arizona,
More informationComparison of Digital Image Watermarking Algorithms. Xu Zhou Colorado School of Mines December 1, 2014
Comparison of Digital Image Watermarking Algorithms Xu Zhou Colorado School of Mines December 1, 2014 Outlier Introduction Background on digital image watermarking Comparison of several algorithms Experimental
More informationDistance Weighted Discrimination and Second Order Cone Programming
Distance Weighted Discrimination and Second Order Cone Programming Hanwen Huang, Xiaosun Lu, Yufeng Liu, J. S. Marron, Perry Haaand Apri 3, 2012 1 Introduction This vignette demonstrates the utiity and
More information