A NEW AUDIO WATERMARKING METHOD BASED
|
|
- Adelia Paul
- 6 years ago
- Views:
Transcription
1 A NEW AUDIO WATERMARKING METHOD BASED ON DISCRETE COSINE TRANSFORM WITH A GRAY IMAGE Mohammad Ibrahm Khan 1, Md. Iqbal Hasan Sarker 2, Kaushk Deb 3 and Md. Hasan Furhad 4 1,2,3 Department of Computer Scence & Engneerng, Chttagong Unversty of Engneerng & Technology,Chttagong-4349, Bangladesh. 4 Department of Computer Engneerng & Informaton Technology, EUCS Lab, Unversty of Ulsan, South Korea. 1 muhammad_khan@cuet.ac.bd, 2 qbal@cuet.ac.bd, 3 debkaushk99@cuet.ac.bd, 4 hfurhad@gmal.com ABSTRACT Many effectve watermarkng algorthms have been proposed and mplemented for dgtal mages and dgtal vdeo. However, a few algorthms have been proposed for audo watermarkng. Ths s due to the fact that, human audtory system (HAS) s far more complex and senstve than human vsual system (HVS). In ths research work, a new method of embeddng mage data nto the audo sgnal and addtve audo watermarkng algorthm based on Dscrete Cosne Transformaton (DCT) doman s proposed. Frst, the orgnal audo s transformed nto DCT doman. The DCT coeffcents are dvded nto a fxed number of subsectons and the energy of each subsecton s calculated. Next, watermark s generated from mage by mage processng algorthm. Watermarks are then embedded nto selected peaks of hghest energy subsecton. Expermental results demonstrate that the watermark s naudble and ths algorthm s robust to common operatons of dgtal audo sgnal processng, such as nose addton, re-samplng, requantzaton and so on. To evaluate the performance of the proposed audo watermarkng method, subjectve and objectve qualty tests ncludng Bt Error Rate (BER) and Sgnal to Nose rato (SNR) are conducted. KEYWORDS Audo watermarkng, Dscrete Cosne Transformaton, Arnold Transformaton, BER, SNR. 1. INTRODUCTION Along wth the rapd growth of Internet, the transmsson of audovsual meda becomes easer. It leads to the problems regardng copyrght protecton. Among them, copyrght protecton s the prmary concern and the hotspot of nternatonal area n recent areas. Dgtal product nformaton hdng and dgtal watermarkng technology s generated on ths bass and developed along wth the protecton of copyrght; ths technology s wdely used n protectng the copyrght of mage, audo and vdeo by means of extractng or detectng the watermark for ts varous applcaton ncludng copyrght protecton, broadcast and publcaton montorng, authentcaton, copy control. Audo watermarkng should satsfy the followng features. They are as followng: DOI : /jcst
2 I. Imperceptblty: The dgtal watermark should not affect the qualty of orgnal audo sgnal after t s watermarked. II. Robustness: The embedded watermark data should not be removed or elmnated by unauthorzed dstrbutors usng common sgnal processng operatons and attacks. III. Capacty: Capacty refers to the numbers of bts that can be embedded nto the audo sgnal wthn a unt of tme. IV. Securty: Securty mples that the watermark can only be detectable by the authorzed person. In ths paper, we propose a new watermarkng technque usng Dscrete Cosne Transformaton (DCT) for audo copyrght protecton. The watermarks are embedded nto the selected peaks of the hghest energy segment of DCT coeffcents. Expermental results ndcate that the proposed watermarkng method provde strong robustness aganst several knds of attacks such as nose addton, re-samplng, re-quantzaton and so on and acheves Bt Error Rate (BER) almost zero. In addton, our proposed method acheves SNR (sgnal -to-nose rato) values rangng up to 29 db. The rest of the paper s organzed as follows: Secton 2 provdes a bref descrpton of prevous works related to audo watermarkng. Secton 3 ntroduces tradtonal Arnold transformaton. Secton 4 ntroduces our proposed watermarkng method ncludng watermark embeddng process and watermark detecton process. Secton 5 and 6 dscusses the performance of our proposed method n terms of mperceptblty and robustness. Fnally, secton 7 concludes ths paper. 2. RELATED RESEARCH A sgnfcant number of watermarkng technques have been reported n recent years n order to create robust and mperceptble audo watermarks. Le et al. [1] propose a method of watermarkng system for audo sgnals n the tme doman. Ths proposed algorthm uses dfferental average-of-absolute-ampltude relatons. In whch samples are kept n group and each group of audo samples uses to represent one-bt nformaton. Ths method also uses the low frequency ampltude modfcaton technque so that t can scale the ampltudes n selected sectons of samples. In [2], authors propose a blnd audo watermarkng method whch nserts watermark nto audo sgnal n the tme doman. For watermark detecton, the strength of the audo sgnal modfcatons s lmted by the necessty for producng an output sgnal. The watermark s generated usng a key. The watermark embeddng also depends on the ampltude and frequency of audo sgnal so that t mnmzes the audblty of the watermarked sgnal. In [3], authors explan a blnd watermarkng method whch nserts watermarks nto Dscrete Cosne Transform ( DCT) coeffcents usng quantzaton ndex modulaton method. In [4], authors propose a blnd audo watermarkng method by usng adaptve quantzaton aganst synchronzaton attack. In addton the multresoluton characterstcs of dscrete wavelet transform (DWT) and the energy compresson characterstcs of dscrete cosne transform (DCT) are combned n ths method. It also mproves the transparency of dgtal watermark. Watermark s then nserted nto low frequency components usng adaptve quantzaton accordng to human audtory system (HAS). In [5], authors propose a watermarkng method n cepstrum doman for audo sgnal n whch a pseudo-random sequence s used as a watermark. The watermark s then weghted n the cepstrum doman accordng to the dstrbuton of cepstrum coeffcents and the frequency maskng characterstcs of human audtory system (HAS). In [6], authors propose a blnd watermarkng system whch takes the advantages of the attack-nvarant feature of the cepstrum doman and error-correcton capablty of BCH code to ncrease the mperceptblty and robustness of audo watermarkng. In [7], authors propose a survey of watermarkng systems 120
3 whch are appled to Multmeda. In [8], watermarks are embedded nto the hghest m DCT coeffcents of the whole sound excludng the DC component by the followng equaton: v = v ( 1+ x ) (1) Where, m s the length of the watermark sequence, v s a magntude coeffcent nto whch a watermark s embedded, x s a watermark to be nserted nto v, s a scalng factor, v s an adjusted magntude coeffcent. The watermark sequence s extracted by performng the nverse operaton of (1) represented by the followng equaton: x v = ( 1) / v (2) In [9], the authors ntroduce a new method for nsertng watermarks nto audo sgnals by usng components whch have low frequency. Ths proposed method uses lftng-based wavelet transform (LBWT). The novel technology of nsertng mage data nto the audo sgnal and addtve audo watermarkng algorthm based on DCT doman s proposed n [10]. In [11], the authors propose a watermarkng method where DCT coeffcents are used. In [12], the authors ntroduce a watermarkng method whch nserts synchronzaton sgnals n tme doman. In [13] and [14], the authors propose a new watermarkng system usng Dscrete Fourer Transform (DFT) and Frst Fourer Transform (FFT) of dgtal contents for copyrght protecton respectvely. In [15], the authors propose a novel method to generate a unque personalzed watermark whch can act authentcatng nformaton for any watermarkng algorthm. In [16], the authors descrbe the watermark constructon process where scrambled verson of watermark s obtaned wth the help of Arnold transform. 3. TRADITIONAL ARNOLD TRANSFORM A dgtal mage can be consdered as a two unt functon f(x,y) n the plane Z. It can be represented as Z = f(x,y) where x,y {0,1,2,3...N-1}. Hence, N represents order of dgtal mage. The matrx of mage can be changed nto a new matrx by usng the Arnold transform whch results n a scrambled verson to offer better securty. It s a mappng functon whch changes a pont (x,y) to another pont ( x, y ) by usng the equaton (3) and (4). x = (x + y) mod N (3) y = (x + 2y) mod N (4) If the orgnal mage teratve n tmes to come to some scrambled state, the scrambled mage also need to teratve n tmes usng new ant-arnold transform to come to orgnal mage. 4. PROPOSED WATERMARKING METHOD In ths secton, we propose our algorthm based on a Dscrete Cosne Transform (DCT) on audo sgnal n whch a watermark mage s embedded. The algorthm conssts of two procedures; watermark embeddng procedure and watermark extracton procedure. 121
4 4.1. Watermark Embeddng Procedure The embeddng procedure performs three major operatons; watermark pre-processng, DCTbased frequency decomposton of the audo sgnal and watermark embeddng n the DCTtransformed audo sgnal. The operatons are descrbed n the followng steps. 1. Express the gray-sale watermark mage as a two-dmensonal matrx whose sze s M1 M2. Image = { Image(k,j), 0 k<m1, 0 j<m2 } (5) 2. Convert the gray scale watermark mage nto bnary format and also perform Arnold transform to scramble the watermark mage and get scrambled mage. 3. Convert two-dmensonal mage matrx nto a one-dmensonal vector W of length M1 M2. W = { W() = Image(k,j), 0 < M1 M2, 0 k<m1, 0 j<m2} (6) 4. Apply DCT to the orgnal host sgnal to calculate the DCT coeffcents. Audo host sgnal Watermark mage Apply DCT to audo sgnal Convert bnary format Dvde nto sub sectons Arnold Transformaton Calculate Energy Watermark generaton Sub secton Selecton Perform Embeddng algorthm Apply Inverse DCT Watermarked Audo sgnal Fgure 1: Watermark embeddng process 5. Absolute values of the DCT coeffcents are dvded nto subsectons. 6. Energy of each secton s then calculated usng the followng equaton; 122
5 2 E = v( ) (7) 7. Fnd the most promnent peaks from the hghest energy secton usng peak detecton algorthm. 8. The watermark s then embedded nto the selected N peaks of the selected secton by usng the equaton (1) shown n [8], where N s the length of normalzed one dmensonal vector of mage. 9. Apply the nverse Dscrete Cosne Transformaton (IDCT) to obtan the watermarked audo sgnal Watermark Extracton Procedure Audo host sgnal Apply DCT to audo sgnal Dvde nto sub sectons Calculate Energy Watermarked sgnal Pre-embeddng Process Sub secton Selecton Pre-embeddng Process Perform Detecton algorthm Convert two dmensonal matrx whch represents scrambled bnary mage Ant-Arnold Transform Convert to gray mage Watermark mage Fgure 2: Watermark extracton process 123
6 The extracton process s mplemented n the followng steps: 1. The watermarked audo sgnal s transformed nto DCT doman. 2. Extract the hghest promnent peaks from the DCT coeffcents whch are located at the same poston n the embeddng process above. 3. The watermarked vector s then calculated by performng the extracton algorthm usng the nverse operaton of (1) represented by equaton (2). 4. Convert extracted watermarked vector back nto two dmensonal matrx whch represents scrambled mage. 5. Apply ant-arnold transform to get the orgnal mage of bnary format. 6. Convert bnary mage to gray-scale mage. 5. PERFORMANCE EVALUATION FRAMEWORK In ths secton, we ntroduce performance evaluaton of our proposed system Bt Error Rate (BER) The robustness s measured as the BER correspondng to correctly formed bnary values of the mage. The BER (n present) s gven by k BER = a (8) k n= 0 If ( w [ n] = w[ n] ) then a = 0 otherwse a =1, where w [n] represents the set of bnary values formed from the watermarked audo host sgnal and w[n] ndcates the set of the bnary values of the orgnal mage Perceptual Qualty Perceptual qualty refers to the mperceptblty of embedded watermark data wthn the host sgnal. In most applcatons t s mportant that the watermark s undetectable to a lstener or a vewer. Ths ensures that the qualty of the host sgnal s not percevably dstorted and does not ndcate the presence or locaton of a watermark. In ths paper, the sgnal-to-nose rato (SNR) of the watermarked sgnal versus the host sgnal was used as a qualty measure. In order to evaluate the qualty of watermarked sgnal, the followng sgnal-to-nose rato (SNR) equaton s used. N 2 S ( n) n= 1 SNR = 10 log10 N (9) 2 [ S( n) S ( n)] n= 1 where S(n) s a host audo sgnal of length N samples and S (n) be watermarked audo sgnal Subjectve Qualty Evaluaton The naudblty of our watermarkng method has been done by lstenng tests nvolvng ten persons. Each lstener was presented wth the pars of orgnal sgnal and the watermarked sgnal and was asked to report whether any dfference could be detected between the two sgnals. The ten people lsted to each par for 10 tmes and they have a grade for ths par, usng the ITU-R BS.1284 standardzed 5-pont gradng scale. The average grade for of each par from all lsteners s the fnal grade for ths par. 124
7 Table 1. Gradng Scale (ITU-R) Grade Qualty Imparment 5 Excellent Imperceptble 4 Good Perceptble but not annoyng 3 Far Slghtly annoyng 2 Poor Annoyng 1 Bad Very Annoyng 6. EXPERIMENTAL RESULTS In ths secton, we evaluate the performance of our watermarkng system for four dfferent types of 16 bt mono audo sgnals sampled at 44.1 khz: (a) an nstrumental song Hey Jude played by a Korean tradtonal muscal nstrument called the gayageum; (b) the song Let t Be by the Beatles; (c) the begnnng of Symphony No. 5 n C mnor, Op.67, by Ludwg van Beethoven; (d) a human voce provdng TOEIC (Test of Englsh for Internatonal Communcaton) lstenng test nstructon. A gray-scale mage shown n fgure 3 was used as watermark for embeddng n the audo fles. We choose gray-scale mage as watermark mage. The sze of the watermark mage was chosen after takng nto consderaton the length of the audo fles Fgure 3: The orgnal watermark mage Performance of audo watermarkng algorthm s commonly evaluated wth respect to two common metrcs: (a) Imperceptblty (Inaudblty) and (b) Robustness Imperceptblty Test Imperceptblty s related to the perceptual qualty of the watermarked sgnal. It ensures that the qualty of the sgnal s not perceptble to a lstener. To measure mperceptblty, we use Sgnalto-Nose rato (SNR) as an objectve measure and a lstenng test as a subjectve measure. Table 2. SNR and Average ITU-R grade value of the proposed watermarkng system Type of Sgnal Sgnal-to-Nose rato (SNR) Average Grade(ITU-R) Hey Jude Let t be Symphony No Human Voce Robustness Test The robustness of a watermarkng method s defned as the ablty of watermark detector to extract the embedded watermark after common sgnal processng operatons and attacks. In ths paper, robustness s measured n terms of the Bt Error Rate (BER). 125
8 Table 3. Bt Error Rate (BER) of the proposed method wthout attack Hey Jude Let t be Human Voce Table 4. Bt Error Rate (BER) of the proposed method aganst re-samplng Hey Jude Let t be Human Voce Table 5. Bt Error Rate (BER) of the proposed method aganst re-quantzaton Hey Jude Let t be Human Voce Table 6. Bt Error Rate (BER) of the proposed method aganst flter attacks Hey Jude Let t be Human Voce Table 7. Bt Error Rate (BER) of the proposed method aganst random nose Hey Jude Let t be Human Voce Table 8. Bt Error Rate (BER) of the proposed method aganst AWGN Hey Jude Let t be Human Voce
9 7. CONCLUSIONS In ths paper, we have presented a new watermarkng system usng Dscrete Cosne Transform (DCT) for copyrght protecton of audo sound. Expermental results ndcate that our proposed watermarkng system has compromsed audblty and robustness better. Ths method also shows strong robustness aganst several knds of attacks such as nose addton, re-samplng, requantzaton, flterng etc. Ths results obtaned verfy the effectveness of audo watermarkng as a relable soluton to the copyrght protecton problem whch s facng the musc ndustry. REFERENCES [1] W. N. Le and L. C. Chang, (2006) Robust and Hgh -Qualty Tme-Doman Audo Watermarkng Based on Low Frequency Ampltude Modfcaton, IEEE Transactons on Multmeda, Vol. 8, No. 1, pp [2] P. Bassa, I. Ptas and N. Nkolads, (2001) Robust Audo Watermarkng n the Tme doman, IEEE Transactons on Multmeda, Vol. 3, No. 2, pp [3] G. Zeng and Z. Qu, (2008) Audo watermarkng n DCT; Embeddng Strategy and Algorthm, n Proceedngs of 9th Internatonal Conference on Sgnal Processng, (ISP 09), pp [4] X. Y. Wang and H. Zaho, (2006) A novel Synchronzaton Invarant Audo Watermarkng Schem e Based on DWT and DCT, IEEE Transactons on Sgnal Processng, Vol. 54, No. 12, pp [5] S. K. Lee and Y. S. Ho, (2000) Dgtal Audo Watermarkng n the cepstrum doman, IEEE Transactons on Consumer Electroncs, Vol. 46, No. 3, pp [6] S. C. Lu and S. D. Ln (2006) BCH code based robust audo watermarkng n the cepstrum doman, Journal of Informaton Scence and Engneerng, Vol. 22, pp [7] S.J. Lee, S. H. Jung (2001) A Survey of Watermarkng Technques Appled to Multmeda, IEEE Transactons on Industral Electroncs, Vol. 12, pp [8] I. Cox, J. Kllan, F. Leghton and T. Ahamoon, (1997) Secure Spread Spectrum Watermarkng for Multmeda, IEEE Transactons on Image Processng, Vol. 6, No. 12, pp [9] E. Erceleb. And L.Batakc., (2009) Audo Watermarkng Scheme Based on Embeddng Strategy n Low Frequency Components wth a Bnary Image., Dgtal Sgnal Processng, Vol. 19, No. 2, pp [10] Yan Yang, Rong Huang and Mntau Xu (2009) A Novel Audo Watermarkng Algorthm for Copyrght Protecton Based on DCT Doman. 2nd Internatonal Symposum on Electronc Commerce and Securty,pp [11] P.K Dhar, M.I.Khan and S. Ahmad (2010) A New DCT-Based Watermarkng Method for Copyrght Protecton of Dgtal Audo., Internatonal Journal of Computer Scence & Informaton Technology(IJCSIT), Vol. 2 No.5. [12] J. Huang, Y. Wang and Y.Q. Sh,(2002) A Blnd Audo Watermarkng Algorthm wth Self Synchronzaton., IEEE Internatonal Symposum on Crcut and Systems, Vol. 3 pp [13] P.K Dhar, M.I.Khan and J.M.Km (2010) A New Audo Watermarkng System usng Dscrete Fourer Transform for Copyrght Protecton., Internatonal Journal of Computer Scence & Network Securty (IJCSNS), Vol. 10 No.6. [14] P.K Dhar and J.M.Km (2011) Dgtal Watermarkng Scheme Based on Frst Fourer Transformaton for Audo Copyrght Protecton., Internatonal Journal of Securty and ts Applcatons (IJSIA), Vol. 5 No.2. [15] T.K. Tewar, V.Saxena and J.P Gupta (2012) A Novel Approach to Generate Watermarks Usng Audtory Features for Audo Watermarkng., Journal of Theoretcal and Appled Informaton Technology (JATIT), Vol. 35 No.2. [16] Dr. M. Sathk and S. S. Sujatha (2010) An Improved Invsble Watermarkng Technque for Image Authentcaton., Internatonal Journal of Advanced Scence and Technology (IJAST), Vol
10 Authors Dr. Mohammad Ibrahm Khan receved the B.S. degree n Electrcal and Electronc Engneerng from Bangladesh Unversty of Engneerng and Technology (BUET), Bangladesh n He receved M.S. degree n Computer Scence and Engneerng from the same Unversty n He receved hs Ph.D. degree n Computer Scence and Engneerng from Jahangrnagar Unversty n Snce 1999, he has been servng as a faculty member n the Department of Computer Scence and Engneerng at Chttagong Unversty of Engneerng & Technology (CUET), Chttagong, Bangladesh. Hs research nterest ncludes Dgtal Image Processng, Graph Theory, Cryptography, Dgtal Watermarkng, Multmeda Systems, and Dgtal Sgnal Processng. Md. Iqbal Hasan Sarker receved the B.Sc degree n Computer Scence & Engneerng from Chttagong Unversty of Engneerng & Technology (CUET), Bangladesh n Currently, he s pursung M.Sc n Computer Scence & Engneerng n the same Unversty. Snce 2010, he has been servng as a faculty member n the same department and unversty. Hs research nterest ncludes Dgtal Watermarkng, Computer Vson, Dgtal Image Processng, Cryptography and data mnng. Dr. Kaushk Deb receved hs B. Tech. and M. Tech. degrees from Department of Computer Scence & Engneerng of Tula State Unversty, Tula, Russa, n 1999 and 2000, respectvely. He receved hs Ph.D. degree n Electrcal Engneerng & Informaton systems from Unversty of Ulsan, Ulsan, South Korea n Snce 2001, he has been servng as a faculty member n the Department of Computer Scence and Engneerng of Chttagong Unversty of Engneerng & Technology (CUET), Chttagong, Bangladesh. Hs research nterests nclude computer vson, pattern recognton, ntellgent transportaton systems (ITSs) and human-computer nteracton. Md. Hasan Furhad receved hs B. Sc degree n Computer Scence & Engneerng from Rajshah Unversty of Engneerng & Technology (RUET), Bangladesh n Currently, he s pursung MS n Unversty of Ulsan, South Korea. He s a Lecturer n Faculty of Engneerng at Unversty of Informaton Technology & Scences (UITS), Chttagong, Bangladesh. Hs research nterests nclude Embedded Systems, Computer Archtecture and Computer Vson. 128
Hybrid Non-Blind Color Image Watermarking
Hybrd Non-Blnd Color Image Watermarkng Ms C.N.Sujatha 1, Dr. P. Satyanarayana 2 1 Assocate Professor, Dept. of ECE, SNIST, Yamnampet, Ghatkesar Hyderabad-501301, Telangana 2 Professor, Dept. of ECE, AITS,
More informationKey-Selective Patchwork Method for Audio Watermarking
Internatonal Journal of Dgtal Content Technology and ts Applcatons Volume 4, Number 4, July 2010 Key-Selectve Patchwork Method for Audo Watermarkng 1 Ch-Man Pun, 2 Jng-Jng Jang 1, Frst and Correspondng
More informationA Hybrid Semi-Blind Gray Scale Image Watermarking Algorithm Based on DWT-SVD using Human Visual System Model
A Hybrd Sem-Blnd Gray Scale Image Watermarkng Algorthm Based on DWT-SVD usng Human Vsual System Model Rajesh Mehta r Scence & Engneerng, USICT Guru Gobnd Sngh Indrarprastha Unversty New Delh, Inda rajesh00ust@gmal.com
More informationEnhanced Watermarking Technique for Color Images using Visual Cryptography
Informaton Assurance and Securty Letters 1 (2010) 024-028 Enhanced Watermarkng Technque for Color Images usng Vsual Cryptography Enas F. Al rawashdeh 1, Rawan I.Zaghloul 2 1 Balqa Appled Unversty, MIS
More informationRobust Watermarking for Text Images Based on Arnold Scrambling and DWT-DCT
Internatonal Conference on Mechatroncs Electronc Industral and Control Engneerng (MEIC 015) Robust Watermarkng for Text Images Based on Arnold Scramblng and DWT-DCT Fan Wu College of Informaton Scence
More informationRobust Video Watermarking Using Image Normalization, Motion Vector and Perceptual Information
Robust Vdeo Watermarkng Usng Image ormalzaton, Moton Vector and Perceptual Informaton Cedllo-Hernández Antono 1, Cedllo-Hernández Manuel 1, akano-myatake Marko 1, García-Vázquez Mreya S. 2 1 Postgraduate
More informationIMPLEMENTATION OF QIM BASED AUDIO WATERMARKING USING HYBRID TRANSFORM OF SWT-DCT-SVD METHODS OPTIMIZED WITH GENETIC ALORITHM
IMPLEMENTATION OF QIM BASED AUDIO WATERMARKING USING HYBRID TRANSFORM OF SWT-DCT-SVD METHODS OPTIMIZED WITH GENETIC ALORITHM Ryan Amnullah 1, Gelar Budman 2, Irma Saftr 3 1, 2, 3 FakultasTeknk Elektro,
More informationA Fast Content-Based Multimedia Retrieval Technique Using Compressed Data
A Fast Content-Based Multmeda Retreval Technque Usng Compressed Data Borko Furht and Pornvt Saksobhavvat NSF Multmeda Laboratory Florda Atlantc Unversty, Boca Raton, Florda 3343 ABSTRACT In ths paper,
More informationSemi-Fragile Watermarking Scheme for Authentication of JPEG Images
Tamkang Journal of Scence and Engneerng, Vol. 10, No 1, pp. 5766 (2007) 57 Sem-Fragle Watermarkng Scheme for Authentcaton of JPEG Images Chh-Hung n 1 *, Tung-Shh Su 2 and Wen-Shyong Hseh 2,3 1 Department
More informationShape-adaptive DCT and Its Application in Region-based Image Coding
Internatonal Journal of Sgnal Processng, Image Processng and Pattern Recognton, pp.99-108 http://dx.do.org/10.14257/sp.2014.7.1.10 Shape-adaptve DCT and Its Applcaton n Regon-based Image Codng Yamn Zheng,
More informationIAJIT First Online Publication
Content Protecton n Vdeo Data Based on Robust Dgtal Watermarkng Resstant to Intentonal and Unntentonal Attacks Mad Masoum and Shervn Amr Department of Electrcal Engneerng, Islamc Azad Unversty Qazvn Branch,
More informationContent Based Image Retrieval Using 2-D Discrete Wavelet with Texture Feature with Different Classifiers
IOSR Journal of Electroncs and Communcaton Engneerng (IOSR-JECE) e-issn: 78-834,p- ISSN: 78-8735.Volume 9, Issue, Ver. IV (Mar - Apr. 04), PP 0-07 Content Based Image Retreval Usng -D Dscrete Wavelet wth
More informationPerformance Analysis of Data Hiding in MPEG-4 AAC Audio *
TSINGHUA SCIENCE AND TECHNOLOGY ISSNll1007-0214ll07/21llpp55-61 Volume 14, Number 1, February 2009 Performance Analyss of Data Hdng n MPEG-4 AAC Audo * XU Shuzheng ( ) **, ZHANG Peng ( ), WANG Pengjun
More informationKEYWORDS: Digital Image Watermarking, Discrete Wavelet Transform, General Regression Neural Network, Human Visual System. 1.
An Adaptve Dgtal Image Watermarkng Based on Image Features n Dscrete Wavelet Transform Doman and General Regresson Neural Network Ayoub Taher Group of IT Engneerng, Payam Noor Unversty, Broujen, Iran ABSTRACT:
More informationA Hybrid Digital Image Watermarking based on Discrete Wavelet Transform, Discrete Cosine Transform, and General Regression Neural Network
A Hybrd Dgtal Image Watermarkng based on Dscrete Wavelet Transform, Dscrete Cosne Transform, and General Regresson Neural Network Ayoub Taher ; ABSTRACT In ths paper, a new hybrd dgtal watermarkng technque
More informationA NEW DCT-BASED WATERMARKING METHOD FOR COPYRIGHT PROTECTION OF DIGITAL AUDIO
International journal of computer science & information Technology (IJCSIT) Vol., No.5, October A NEW DCT-BASED WATERMARKING METHOD FOR COPYRIGHT PROTECTION OF DIGITAL AUDIO Pranab Kumar Dhar *, Mohammad
More informationRobust Blind Video Watermark Algorithm in Transform Domain Combining with 3D Video Correlation
JOURNAL OF MULTIMEDIA, VOL. 8, NO. 2, APRIL 2013 161 Robust Blnd Vdeo Watermark Algorthm n Transform Doman Combnng wth 3D Vdeo Correlaton DING Ha-yang 1,3 1. Informaton Securty Center, Bejng Unversty of
More informationResearch of Multiple Text Watermarks Technique in Electric Power System Texts
Sensors & Transducers 203 by IFSA http://www.sensorsportal.com Research of Multple Text atermarks Technque n Electrc Power System Texts Xao-X XING, Qng CHEN, 2 Lan-X FU School of Optcal-Electrcal and Computer
More informationA Lossless Watermarking Scheme for Halftone Image Authentication
IJCSNS Internatonal Journal of Computer Scence and Network Securty, VOL.6 No.2B, February 2006 147 A Lossless Watermarkng Scheme for Halftone Image Authentcaton Jeng-Shyang Pan, Hao Luo, and Zhe-Mng Lu,
More informationUsing Counter-propagation Neural Network for Digital Audio Watermarking
Usng Counter-propagaton Neural Network for Dgtal Audo Watermarkng Chuan-Yu Chang and Wen-Chh Shen Graduate School of Computer Scence and Informaton Engneerng Natonal Yunln Unversty of Scence & Technology
More informationInformation Hiding Watermarking Detection Technique by PSNR and RGB Intensity
www..org 3 Informaton Hdng Watermarkng Detecton Technque by PSNR and RGB Intensty 1 Neha Chauhan, Akhlesh A. Waoo, 3 P. S. Patheja 1 Research Scholar, BIST, Bhopal, Inda.,3 Assstant Professor, BIST, Bhopal,
More informationAdaptive digital watermarking of images using Genetic Algorithm
Adaptve dgtal watermarkng of mages usng Genetc Algorthm Bushra Skander, Muhammad Ishtaq, M. Arfan Jaffar, Muhammad Tarq, Anwar M. Mrza Department of Computer Scence, Natonal Unversty of Computer and Emergng
More informationAn Image Fusion Approach Based on Segmentation Region
Rong Wang, L-Qun Gao, Shu Yang, Yu-Hua Cha, and Yan-Chun Lu An Image Fuson Approach Based On Segmentaton Regon An Image Fuson Approach Based on Segmentaton Regon Rong Wang, L-Qun Gao, Shu Yang 3, Yu-Hua
More informationResearch Article High Capacity Reversible Watermarking for Audio by Histogram Shifting and Predicted Error Expansion
e Scentfc World Journal, Artcle ID 656251, 7 pages http://dx.do.org/1.1155/214/656251 Research Artcle Hgh Capacty Reversble Watermarkng for Audo by Hstogram Shftng and Predcted Error Expanson Fe Wang,
More informationA Binarization Algorithm specialized on Document Images and Photos
A Bnarzaton Algorthm specalzed on Document mages and Photos Ergna Kavalleratou Dept. of nformaton and Communcaton Systems Engneerng Unversty of the Aegean kavalleratou@aegean.gr Abstract n ths paper, a
More informationDigital Video Watermarking using Discrete Wavelet Transform and Principal Component Analysis
Internatonal Journal of Wsdom Based Computng, Vol. 1 (2), August 2011 7 Dgtal Vdeo Watermarkng usng Dscrete Wavelet Transform and Prncpal Component Analyss Sanjana Snha, Prajnat Bardhan, Swarnal Pramanck,
More informationImprovement of Spatial Resolution Using BlockMatching Based Motion Estimation and Frame. Integration
Improvement of Spatal Resoluton Usng BlockMatchng Based Moton Estmaton and Frame Integraton Danya Suga and Takayuk Hamamoto Graduate School of Engneerng, Tokyo Unversty of Scence, 6-3-1, Nuku, Katsuska-ku,
More informationA Comparison between Digital Images Watermarking in Tow Different Color Spaces Using DWT2*
A Comparson between Dgtal s ng n Tow Dfferent Color Spaces Usng DWT* Mehd Khall Natonal Academy of Scence of Armena Yerevan, Armena e-mal: khall.mehd@yahoo.com ABSTRACT A novel dgtal watermarkng for ownershp
More informationA Robust Webpage Information Hiding Method Based on the Slash of Tag
Advanced Engneerng Forum Onlne: 2012-09-26 ISSN: 2234-991X, Vols. 6-7, pp 361-366 do:10.4028/www.scentfc.net/aef.6-7.361 2012 Trans Tech Publcatons, Swtzerland A Robust Webpage Informaton Hdng Method Based
More informationParallelism for Nested Loops with Non-uniform and Flow Dependences
Parallelsm for Nested Loops wth Non-unform and Flow Dependences Sam-Jn Jeong Dept. of Informaton & Communcaton Engneerng, Cheonan Unversty, 5, Anseo-dong, Cheonan, Chungnam, 330-80, Korea. seong@cheonan.ac.kr
More informationAn Image Compression Algorithm based on Wavelet Transform and LZW
An Image Compresson Algorthm based on Wavelet Transform and LZW Png Luo a, Janyong Yu b School of Chongqng Unversty of Posts and Telecommuncatons, Chongqng, 400065, Chna Abstract a cylpng@63.com, b y27769864@sna.cn
More informationIdentify the Attack in Embedded Image with Steganalysis Detection Method by PSNR and RGB Intensity
Internatonal Journal of Computer Systems (ISSN: 394-1065), Volume 03 Issue 07, July, 016 Avalable at http://www.jcsonlne.com/ Identfy the Attack n Embedded Image wth Steganalyss Detecton Method by PSNR
More informationA Fast Visual Tracking Algorithm Based on Circle Pixels Matching
A Fast Vsual Trackng Algorthm Based on Crcle Pxels Matchng Zhqang Hou hou_zhq@sohu.com Chongzhao Han czhan@mal.xjtu.edu.cn Ln Zheng Abstract: A fast vsual trackng algorthm based on crcle pxels matchng
More informationHigh-Boost Mesh Filtering for 3-D Shape Enhancement
Hgh-Boost Mesh Flterng for 3-D Shape Enhancement Hrokazu Yagou Λ Alexander Belyaev y Damng We z Λ y z ; ; Shape Modelng Laboratory, Unversty of Azu, Azu-Wakamatsu 965-8580 Japan y Computer Graphcs Group,
More informationRobust and Reversible Relational Database Watermarking Algorithm Based on Clustering and Polar Angle Expansion
Robust and Reversble Relatonal Database Watermarkng Algorthm Based on Clusterng and Polar Angle Expanson Zhyong L, Junmn Lu and Wecheng Tao College of Informaton Scence and Engneerng, Hunan Unversty, Changsha,
More informationGrading Image Retrieval Based on DCT and DWT Compressed Domains Using Low-Level Features
Journal of Communcatons Vol. 0 No. January 0 Gradng Image Retreval Based on DCT and DWT Compressed Domans Usng Low-Level Features Chengyou Wang Xnyue Zhang Rongyang Shan and Xao Zhou School of echancal
More informationHigh Payload Reversible Data Hiding Scheme Using Difference Segmentation and Histogram Shifting
JOURNAL OF ELECTRONIC SCIENCE AND TECHNOLOGY, VOL. 11, NO. 1, MARCH 2013 9 Hgh Payload Reversble Data Hdng Scheme Usng Dfference Segmentaton and Hstogram Shftng Yung-Chen Chou and Huang-Chng L Abstract
More informationA Secured Method for Image Steganography Based On Pixel Values
A Secured Method for Image Steganography Based On Pxel Values Tarun Gulat #, Sanskrt Gupta * # Assocate Professor, Electroncs and Communcaton Engneerng Department, MMEC, M.M.U., Mullana, Ambala, Haryana,
More informationThe Research of Ellipse Parameter Fitting Algorithm of Ultrasonic Imaging Logging in the Casing Hole
Appled Mathematcs, 04, 5, 37-3 Publshed Onlne May 04 n ScRes. http://www.scrp.org/journal/am http://dx.do.org/0.436/am.04.584 The Research of Ellpse Parameter Fttng Algorthm of Ultrasonc Imagng Loggng
More informationCLASSIFICATION OF ULTRASONIC SIGNALS
The 8 th Internatonal Conference of the Slovenan Socety for Non-Destructve Testng»Applcaton of Contemporary Non-Destructve Testng n Engneerng«September -3, 5, Portorož, Slovena, pp. 7-33 CLASSIFICATION
More informationRobust Spread Spectrum Based Digital Video Watermarking Scheme in Frequency Domain Nisha Chaudhary 1 Savita Shivani 2
IJSRD Internatonal Journal for Scentfc Research & Development Vol. 2, Issue 6, 2 ISSN (onlne): 23263 Robust Spread Spectrum Based Dgtal Vdeo Watermarkng Scheme n Frequency Doman Nsha Chaudhary Savta Shvan
More informationResearch and Application of Fingerprint Recognition Based on MATLAB
Send Orders for Reprnts to reprnts@benthamscence.ae The Open Automaton and Control Systems Journal, 205, 7, 07-07 Open Access Research and Applcaton of Fngerprnt Recognton Based on MATLAB Nng Lu* Department
More informationArticle Reversible Dual-Image-Based Hiding Scheme Using Block Folding Technique
Artcle Reversble Dual-Image-Based Hdng Scheme Usng Block Foldng Technque Tzu-Chuen Lu, * and Hu-Shh Leng Department of Informaton Management, Chaoyang Unversty of Technology, Tachung 4349, Tawan Department
More informationImage Representation & Visualization Basic Imaging Algorithms Shape Representation and Analysis. outline
mage Vsualzaton mage Vsualzaton mage Representaton & Vsualzaton Basc magng Algorthms Shape Representaton and Analyss outlne mage Representaton & Vsualzaton Basc magng Algorthms Shape Representaton and
More informationData Hiding and Image Authentication for Color-Palette Images
Data Hdng and Image Authentcaton for Color-Palette Images Chh-Yang Yn ( 殷志揚 ) and Wen-Hsang Tsa ( 蔡文祥 ) Department of Computer & Informaton Scence Natonal Chao Tung Unversty 00 Ta Hsueh Rd., Hsnchu, Tawan
More informationCluster Analysis of Electrical Behavior
Journal of Computer and Communcatons, 205, 3, 88-93 Publshed Onlne May 205 n ScRes. http://www.scrp.org/ournal/cc http://dx.do.org/0.4236/cc.205.350 Cluster Analyss of Electrcal Behavor Ln Lu Ln Lu, School
More informationQuantization Noise Power Injection In Subband Audio Coding Using Low Selectivity Filter Banks
Quantzaton Nose Power Injecton In Subband Audo Codng Usng Low Selectvty Flter Banks D. ARTÍNEZ -UÑOZ, N. RUIZ-REYES, P. VERA-CANDEAS, P.J. RECHE-LÓPEZ, J. CURPIÁN-ALONSO Departamento de Electrónca Unversdad
More informationLoad Balancing for Hex-Cell Interconnection Network
Int. J. Communcatons, Network and System Scences,,, - Publshed Onlne Aprl n ScRes. http://www.scrp.org/journal/jcns http://dx.do.org/./jcns.. Load Balancng for Hex-Cell Interconnecton Network Saher Manaseer,
More informationCoding Artifact Reduction Using Edge Map Guided Adaptive and Fuzzy Filter
MEL A MITSUBISHI ELECTIC ESEACH LABOATOY http://www.merl.com Codng Artfact educton Usng Edge Map Guded Adaptve and Fuzzy Flter Hao-Song Kong Yao Ne Anthony Vetro Hufang Sun Kenneth E. Barner T-2004-056
More informationDetecting MP3Stego using Calibrated Side Information Features
2628 JOURNAL OF SOFTWARE, VOL. 8, NO. 10, OCTOBER 2013 Detectng P3Stego usng Calbrated Sde Informaton Features Xanmn Yu School of Informaton Scence and Engneerng, Nngbo Unversty Emal: mlhappy1016@163.com
More informationTerm Weighting Classification System Using the Chi-square Statistic for the Classification Subtask at NTCIR-6 Patent Retrieval Task
Proceedngs of NTCIR-6 Workshop Meetng, May 15-18, 2007, Tokyo, Japan Term Weghtng Classfcaton System Usng the Ch-square Statstc for the Classfcaton Subtask at NTCIR-6 Patent Retreval Task Kotaro Hashmoto
More informationEnhanced AMBTC for Image Compression using Block Classification and Interpolation
Internatonal Journal of Computer Applcatons (0975 8887) Volume 5 No.0, August 0 Enhanced AMBTC for Image Compresson usng Block Classfcaton and Interpolaton S. Vmala Dept. of Comp. Scence Mother Teresa
More informationRelated-Mode Attacks on CTR Encryption Mode
Internatonal Journal of Network Securty, Vol.4, No.3, PP.282 287, May 2007 282 Related-Mode Attacks on CTR Encrypton Mode Dayn Wang, Dongda Ln, and Wenlng Wu (Correspondng author: Dayn Wang) Key Laboratory
More informationAn Improved Image Segmentation Algorithm Based on the Otsu Method
3th ACIS Internatonal Conference on Software Engneerng, Artfcal Intellgence, Networkng arallel/dstrbuted Computng An Improved Image Segmentaton Algorthm Based on the Otsu Method Mengxng Huang, enjao Yu,
More informationA Novel Adaptive Descriptor Algorithm for Ternary Pattern Textures
A Novel Adaptve Descrptor Algorthm for Ternary Pattern Textures Fahuan Hu 1,2, Guopng Lu 1 *, Zengwen Dong 1 1.School of Mechancal & Electrcal Engneerng, Nanchang Unversty, Nanchang, 330031, Chna; 2. School
More informationDiscrete Cosine Transform Optimization in Image Compression Based on Genetic Algorithm
015 8th Internatonal Congress on Image and Sgnal Processng (CISP 015) Dscrete Cosne Transform Optmzaton n Image Compresson Based on Genetc Algorthm LIU Yuan-yuan 1 CHE He-xn 1 College of Communcaton Engneerng,
More informationFEATURE EXTRACTION. Dr. K.Vijayarekha. Associate Dean School of Electrical and Electronics Engineering SASTRA University, Thanjavur
FEATURE EXTRACTION Dr. K.Vjayarekha Assocate Dean School of Electrcal and Electroncs Engneerng SASTRA Unversty, Thanjavur613 41 Jont Intatve of IITs and IISc Funded by MHRD Page 1 of 8 Table of Contents
More informationSteganography System using Slantlet Transform
ISSN:43-6999 Journal of Inmaton Communcaton and Intellgence Systems (JICIS) Volume Issue February 06 Steganography System usng Slantlet Transm Ryadh Bassl Abduljabbar Abstract An approach hdng nmaton has
More informationSecurity Enhanced Dynamic ID based Remote User Authentication Scheme for Multi-Server Environments
Internatonal Journal of u- and e- ervce, cence and Technology Vol8, o 7 0), pp7-6 http://dxdoorg/07/unesst087 ecurty Enhanced Dynamc ID based Remote ser Authentcaton cheme for ult-erver Envronments Jun-ub
More informationAn Optimal Algorithm for Prufer Codes *
J. Software Engneerng & Applcatons, 2009, 2: 111-115 do:10.4236/jsea.2009.22016 Publshed Onlne July 2009 (www.scrp.org/journal/jsea) An Optmal Algorthm for Prufer Codes * Xaodong Wang 1, 2, Le Wang 3,
More informationA DCVS Reconstruction Algorithm for Mine Video Monitoring Image Based on Block Classification
1 3 4 5 6 7 8 9 10 11 1 13 14 15 16 17 18 19 0 1 Artcle A DCVS Reconstructon Algorthm for Mne Vdeo Montorng Image Based on Block Classfcaton Xaohu Zhao 1,, Xueru Shen 1,, *, Kuan Wang 1, and Wanme L 1,
More informationResearch Article Hamming Code Based Watermarking Scheme for 3D Model Verification
Mathematcal Problems n Engneerng, Artcle ID 241093, 7 pages http://dx.do.org/10.1155/2014/241093 Research Artcle Hammng Code Based Watermarkng Scheme for 3D Model Verfcaton Jen-Tse Wang, 1 Y-Chng Chang,
More informationA Novel Video Retrieval Method Based on Web Community Extraction Using Features of Video Materials
IEICE TRANS. FUNDAMENTALS, VOL.E92 A, NO.8 AUGUST 2009 1961 PAPER Specal Secton on Sgnal Processng A Novel Vdeo Retreval Method Based on Web Communty Extracton Usng Features of Vdeo Materals Yasutaka HATAKEYAMA
More informationOptimum Threshold Parameter Estimation of Wavelet Coefficients Using Fisher Discriminant Analysis for Speckle Noise Reduction
he Internatonal Arab Journal of Informaton echnology, Vol., No. 6, November 4 573 Optmum hreshold Parameter Estmaton of Wavelet Coeffcents Usng Fsher Dscrmnant Analyss for Speckle Nose Reducton Mohammad
More informationUser Authentication Based On Behavioral Mouse Dynamics Biometrics
User Authentcaton Based On Behavoral Mouse Dynamcs Bometrcs Chee-Hyung Yoon Danel Donghyun Km Department of Computer Scence Department of Computer Scence Stanford Unversty Stanford Unversty Stanford, CA
More informationVideo Watermarking Algorithm Based on Relative Relationship of DCT Coefficients
756 JOURAL OF COPUTERS, VOL. 8, O., OVEBER 03 Vdeo Watermarkng Algorthm Based on Relatve Relatonshp of DCT Coeffcents Cheng ngzh, Du Yanpng, Wang Yan Bejng Insttute of Graphc Communcaton, Bejng, Chna Emal:
More informationBrushlet Features for Texture Image Retrieval
DICTA00: Dgtal Image Computng Technques and Applcatons, 1 January 00, Melbourne, Australa 1 Brushlet Features for Texture Image Retreval Chbao Chen and Kap Luk Chan Informaton System Research Lab, School
More informationGeometrically Invariant Watermarking Scheme Based on Local Feature Points
JOURNAL OF MULTIMEDIA, VOL. 7, NO. 3, JUNE 0 3 Geometrcally Invarant Watermarkng Scheme Based on Local Feature Ponts L Jng School of Computer and Informaton Engneerng, Henan Unversty of Economcs and Law,
More informationAssignment # 2. Farrukh Jabeen Algorithms 510 Assignment #2 Due Date: June 15, 2009.
Farrukh Jabeen Algorthms 51 Assgnment #2 Due Date: June 15, 29. Assgnment # 2 Chapter 3 Dscrete Fourer Transforms Implement the FFT for the DFT. Descrbed n sectons 3.1 and 3.2. Delverables: 1. Concse descrpton
More informationDWT based Novel Image Denoising by Exploring Internal and External Correlation
ISSN(Onlne): 319-8753 ISSN (Prnt): 347-6710 Internatonal Journal of Innovatve Research n Scence, Engneerng and Technology (An ISO 397: 007 Certfed Organzaton) DWT based Novel Image Denosng by Explorng
More informationAudio Content Classification Method Research Based on Two-step Strategy
(IJACSA) Internatonal Journal of Advanced Computer Scence and Applcatons, Audo Content Classfcaton Method Research Based on Two-step Strategy Sume Lang Department of Computer Scence and Technology Chongqng
More informationThe Codesign Challenge
ECE 4530 Codesgn Challenge Fall 2007 Hardware/Software Codesgn The Codesgn Challenge Objectves In the codesgn challenge, your task s to accelerate a gven software reference mplementaton as fast as possble.
More informationA Clustering Algorithm for Key Frame Extraction Based on Density Peak
Journal of Computer and Communcatons, 2018, 6, 118-128 http://www.scrp.org/ournal/cc ISSN Onlne: 2327-5227 ISSN Prnt: 2327-5219 A Clusterng Algorthm for Key Frame Extracton Based on Densty Peak Hong Zhao
More informationA FIBONACCI LSB DATA HIDING TECNIQUE
A FIBONACCI LSB DATA HIDING TECNIQUE Dego De Luca Pcone (*)(**), Federca Battst (*)(**), Marco Carl (*), Jaakko Astola (**), and Karen Egazaran (**) (*) AE Department, Unverst of Roma TRE, Rome, Ital,
More informationVideo Proxy System for a Large-scale VOD System (DINA)
Vdeo Proxy System for a Large-scale VOD System (DINA) KWUN-CHUNG CHAN #, KWOK-WAI CHEUNG *# #Department of Informaton Engneerng *Centre of Innovaton and Technology The Chnese Unversty of Hong Kong SHATIN,
More informationModule Management Tool in Software Development Organizations
Journal of Computer Scence (5): 8-, 7 ISSN 59-66 7 Scence Publcatons Management Tool n Software Development Organzatons Ahmad A. Al-Rababah and Mohammad A. Al-Rababah Faculty of IT, Al-Ahlyyah Amman Unversty,
More informationAvailable online at Available online at Advanced in Control Engineering and Information Science
Avalable onlne at wwwscencedrectcom Avalable onlne at wwwscencedrectcom Proceda Proceda Engneerng Engneerng 00 (2011) 15000 000 (2011) 1642 1646 Proceda Engneerng wwwelsevercom/locate/proceda Advanced
More informationDistortion Function Designing for JPEG Steganography with Uncompressed Side-image
Dstorton Functon Desgnng for JPEG Steganography wth Uncompressed Sde-mage Fangjun Huang School of Informaton Scence and Technology, Sun Yat-Sen Unversty, GD 56, Chna huangfj@mal.sysu.edu.cn Jwu Huang School
More informationAn Application of the Dulmage-Mendelsohn Decomposition to Sparse Null Space Bases of Full Row Rank Matrices
Internatonal Mathematcal Forum, Vol 7, 2012, no 52, 2549-2554 An Applcaton of the Dulmage-Mendelsohn Decomposton to Sparse Null Space Bases of Full Row Rank Matrces Mostafa Khorramzadeh Department of Mathematcal
More informationSimulation Based Analysis of FAST TCP using OMNET++
Smulaton Based Analyss of FAST TCP usng OMNET++ Umar ul Hassan 04030038@lums.edu.pk Md Term Report CS678 Topcs n Internet Research Sprng, 2006 Introducton Internet traffc s doublng roughly every 3 months
More informationUsing Fuzzy Logic to Enhance the Large Size Remote Sensing Images
Internatonal Journal of Informaton and Electroncs Engneerng Vol. 5 No. 6 November 015 Usng Fuzzy Logc to Enhance the Large Sze Remote Sensng Images Trung Nguyen Tu Huy Ngo Hoang and Thoa Vu Van Abstract
More informationMusic/Voice Separation using the Similarity Matrix. Zafar Rafii & Bryan Pardo
Musc/Voce Separaton usng the Smlarty Matrx Zafar Raf & Bryan Pardo Introducton Muscal peces are often characterzed by an underlyng repeatng structure over whch varyng elements are supermposed Propellerheads
More informationDetection of an Object by using Principal Component Analysis
Detecton of an Object by usng Prncpal Component Analyss 1. G. Nagaven, 2. Dr. T. Sreenvasulu Reddy 1. M.Tech, Department of EEE, SVUCE, Trupath, Inda. 2. Assoc. Professor, Department of ECE, SVUCE, Trupath,
More informationClassifying Acoustic Transient Signals Using Artificial Intelligence
Classfyng Acoustc Transent Sgnals Usng Artfcal Intellgence Steve Sutton, Unversty of North Carolna At Wlmngton (suttons@charter.net) Greg Huff, Unversty of North Carolna At Wlmngton (jgh7476@uncwl.edu)
More informationTsinghua University at TAC 2009: Summarizing Multi-documents by Information Distance
Tsnghua Unversty at TAC 2009: Summarzng Mult-documents by Informaton Dstance Chong Long, Mnle Huang, Xaoyan Zhu State Key Laboratory of Intellgent Technology and Systems, Tsnghua Natonal Laboratory for
More informationProtection of Real and Artwork Human Objects based on a Chaotic Moments Modulation Method
1 Protecton of Real and Artwork Human Objects based on a Chaotc Moments Modulaton Method Klms Ntalans 1, Paraskev Tzouvel 1, Stefanos Kollas 1 and Athanasos Drgkas 1 Natonal Techncal Unversty of Athens,
More informationCorner-Based Image Alignment using Pyramid Structure with Gradient Vector Similarity
Journal of Sgnal and Informaton Processng, 013, 4, 114-119 do:10.436/jsp.013.43b00 Publshed Onlne August 013 (http://www.scrp.org/journal/jsp) Corner-Based Image Algnment usng Pyramd Structure wth Gradent
More informationCLUSTERING ALGORITHMS FOR PERCEPTUAL IMAGE HASHING. Vishal Monga, Arindam Banerjee, and Brian L. Evans
CLUSTERING ALGORITHMS FOR PERCEPTUAL IMAGE HASHING Vshal Monga, Arndam Banerjee, and Bran L. Evans Center for Perceptual Systems The Unversty of Texas at Austn, Austn, TX 7871 vshal,abanerje,bevans}@ece.utexas.edu
More informationLearning-Based Top-N Selection Query Evaluation over Relational Databases
Learnng-Based Top-N Selecton Query Evaluaton over Relatonal Databases Lang Zhu *, Wey Meng ** * School of Mathematcs and Computer Scence, Hebe Unversty, Baodng, Hebe 071002, Chna, zhu@mal.hbu.edu.cn **
More informationReducing Frame Rate for Object Tracking
Reducng Frame Rate for Object Trackng Pavel Korshunov 1 and We Tsang Oo 2 1 Natonal Unversty of Sngapore, Sngapore 11977, pavelkor@comp.nus.edu.sg 2 Natonal Unversty of Sngapore, Sngapore 11977, oowt@comp.nus.edu.sg
More informationPerformance Assessment and Fault Diagnosis for Hydraulic Pump Based on WPT and SOM
Performance Assessment and Fault Dagnoss for Hydraulc Pump Based on WPT and SOM Be Jkun, Lu Chen and Wang Zl PERFORMANCE ASSESSMENT AND FAULT DIAGNOSIS FOR HYDRAULIC PUMP BASED ON WPT AND SOM. Be Jkun,
More informationDynamic Code Block Size for JPEG 2000
Dynamc Code Block Sze for JPEG 2000 Png-Sng Tsa a, Yann LeCornec b a Dept. of Computer Scence, Unv. of Texas Pan Amercan, 1201 W. Unv. Dr., Ednburg, TX USA 78539-2999; b Sgma Desgns, Inc., 1778 McCarthy
More informationTN348: Openlab Module - Colocalization
TN348: Openlab Module - Colocalzaton Topc The Colocalzaton module provdes the faclty to vsualze and quantfy colocalzaton between pars of mages. The Colocalzaton wndow contans a prevew of the two mages
More informationVectorization of Image Outlines Using Rational Spline and Genetic Algorithm
01 Internatonal Conference on Image, Vson and Computng (ICIVC 01) IPCSIT vol. 50 (01) (01) IACSIT Press, Sngapore DOI: 10.776/IPCSIT.01.V50.4 Vectorzaton of Image Outlnes Usng Ratonal Splne and Genetc
More informationDevelopment of Face Tracking and Recognition Algorithm for DVR (Digital Video Recorder)
IJCSNS Internatonal Journal of Computer Scence and Network Securty, VOL.6 No.3A, March 2006 7 Development of Face Trackng and Recognton Algorthm for DVR (Dgtal Vdeo Recorder) Jang-Seon Ryu and Eung-Tae
More informationAccurate Overlay Text Extraction for Digital Video Analysis
Accurate Overlay Text Extracton for Dgtal Vdeo Analyss Dongqng Zhang, and Shh-Fu Chang Electrcal Engneerng Department, Columba Unversty, New York, NY 10027. (Emal: dqzhang, sfchang@ee.columba.edu) Abstract
More informationA Desynchronization Resilient Watermarking Scheme
A Desynchronzaton Reslent Watermarkng Scheme Xaojun Q and J Q Department of Computer Scence, Utah State Unversty, Logan, UT 84322-4205 Xaojun.Q@usu.edu, jq79@gmal.com Abstract. Ths paper presents a content-based
More informationVol. 5, No. 3 March 2014 ISSN Journal of Emerging Trends in Computing and Information Sciences CIS Journal. All rights reserved.
Journal of Emergng Trends n Computng and Informaton Scences 009-03 CIS Journal. All rghts reserved. http://www.csjournal.org Unhealthy Detecton n Lvestock Texture Images usng Subsampled Contourlet Transform
More informationAlgorithm for Human Skin Detection Using Fuzzy Logic
Algorthm for Human Skn Detecton Usng Fuzzy Logc Mrtunjay Ra, R. K. Yadav, Gaurav Snha Department of Electroncs & Communcaton Engneerng JRE Group of Insttutons, Greater Noda, Inda er.mrtunjayra@gmal.com
More informationMULTISPECTRAL IMAGES CLASSIFICATION BASED ON KLT AND ATR AUTOMATIC TARGET RECOGNITION
MULTISPECTRAL IMAGES CLASSIFICATION BASED ON KLT AND ATR AUTOMATIC TARGET RECOGNITION Paulo Quntlano 1 & Antono Santa-Rosa 1 Federal Polce Department, Brasla, Brazl. E-mals: quntlano.pqs@dpf.gov.br and
More information