A NEW AUDIO WATERMARKING METHOD BASED

Size: px
Start display at page:

Download "A NEW AUDIO WATERMARKING METHOD BASED"

Transcription

1 A NEW AUDIO WATERMARKING METHOD BASED ON DISCRETE COSINE TRANSFORM WITH A GRAY IMAGE Mohammad Ibrahm Khan 1, Md. Iqbal Hasan Sarker 2, Kaushk Deb 3 and Md. Hasan Furhad 4 1,2,3 Department of Computer Scence & Engneerng, Chttagong Unversty of Engneerng & Technology,Chttagong-4349, Bangladesh. 4 Department of Computer Engneerng & Informaton Technology, EUCS Lab, Unversty of Ulsan, South Korea. 1 muhammad_khan@cuet.ac.bd, 2 qbal@cuet.ac.bd, 3 debkaushk99@cuet.ac.bd, 4 hfurhad@gmal.com ABSTRACT Many effectve watermarkng algorthms have been proposed and mplemented for dgtal mages and dgtal vdeo. However, a few algorthms have been proposed for audo watermarkng. Ths s due to the fact that, human audtory system (HAS) s far more complex and senstve than human vsual system (HVS). In ths research work, a new method of embeddng mage data nto the audo sgnal and addtve audo watermarkng algorthm based on Dscrete Cosne Transformaton (DCT) doman s proposed. Frst, the orgnal audo s transformed nto DCT doman. The DCT coeffcents are dvded nto a fxed number of subsectons and the energy of each subsecton s calculated. Next, watermark s generated from mage by mage processng algorthm. Watermarks are then embedded nto selected peaks of hghest energy subsecton. Expermental results demonstrate that the watermark s naudble and ths algorthm s robust to common operatons of dgtal audo sgnal processng, such as nose addton, re-samplng, requantzaton and so on. To evaluate the performance of the proposed audo watermarkng method, subjectve and objectve qualty tests ncludng Bt Error Rate (BER) and Sgnal to Nose rato (SNR) are conducted. KEYWORDS Audo watermarkng, Dscrete Cosne Transformaton, Arnold Transformaton, BER, SNR. 1. INTRODUCTION Along wth the rapd growth of Internet, the transmsson of audovsual meda becomes easer. It leads to the problems regardng copyrght protecton. Among them, copyrght protecton s the prmary concern and the hotspot of nternatonal area n recent areas. Dgtal product nformaton hdng and dgtal watermarkng technology s generated on ths bass and developed along wth the protecton of copyrght; ths technology s wdely used n protectng the copyrght of mage, audo and vdeo by means of extractng or detectng the watermark for ts varous applcaton ncludng copyrght protecton, broadcast and publcaton montorng, authentcaton, copy control. Audo watermarkng should satsfy the followng features. They are as followng: DOI : /jcst

2 I. Imperceptblty: The dgtal watermark should not affect the qualty of orgnal audo sgnal after t s watermarked. II. Robustness: The embedded watermark data should not be removed or elmnated by unauthorzed dstrbutors usng common sgnal processng operatons and attacks. III. Capacty: Capacty refers to the numbers of bts that can be embedded nto the audo sgnal wthn a unt of tme. IV. Securty: Securty mples that the watermark can only be detectable by the authorzed person. In ths paper, we propose a new watermarkng technque usng Dscrete Cosne Transformaton (DCT) for audo copyrght protecton. The watermarks are embedded nto the selected peaks of the hghest energy segment of DCT coeffcents. Expermental results ndcate that the proposed watermarkng method provde strong robustness aganst several knds of attacks such as nose addton, re-samplng, re-quantzaton and so on and acheves Bt Error Rate (BER) almost zero. In addton, our proposed method acheves SNR (sgnal -to-nose rato) values rangng up to 29 db. The rest of the paper s organzed as follows: Secton 2 provdes a bref descrpton of prevous works related to audo watermarkng. Secton 3 ntroduces tradtonal Arnold transformaton. Secton 4 ntroduces our proposed watermarkng method ncludng watermark embeddng process and watermark detecton process. Secton 5 and 6 dscusses the performance of our proposed method n terms of mperceptblty and robustness. Fnally, secton 7 concludes ths paper. 2. RELATED RESEARCH A sgnfcant number of watermarkng technques have been reported n recent years n order to create robust and mperceptble audo watermarks. Le et al. [1] propose a method of watermarkng system for audo sgnals n the tme doman. Ths proposed algorthm uses dfferental average-of-absolute-ampltude relatons. In whch samples are kept n group and each group of audo samples uses to represent one-bt nformaton. Ths method also uses the low frequency ampltude modfcaton technque so that t can scale the ampltudes n selected sectons of samples. In [2], authors propose a blnd audo watermarkng method whch nserts watermark nto audo sgnal n the tme doman. For watermark detecton, the strength of the audo sgnal modfcatons s lmted by the necessty for producng an output sgnal. The watermark s generated usng a key. The watermark embeddng also depends on the ampltude and frequency of audo sgnal so that t mnmzes the audblty of the watermarked sgnal. In [3], authors explan a blnd watermarkng method whch nserts watermarks nto Dscrete Cosne Transform ( DCT) coeffcents usng quantzaton ndex modulaton method. In [4], authors propose a blnd audo watermarkng method by usng adaptve quantzaton aganst synchronzaton attack. In addton the multresoluton characterstcs of dscrete wavelet transform (DWT) and the energy compresson characterstcs of dscrete cosne transform (DCT) are combned n ths method. It also mproves the transparency of dgtal watermark. Watermark s then nserted nto low frequency components usng adaptve quantzaton accordng to human audtory system (HAS). In [5], authors propose a watermarkng method n cepstrum doman for audo sgnal n whch a pseudo-random sequence s used as a watermark. The watermark s then weghted n the cepstrum doman accordng to the dstrbuton of cepstrum coeffcents and the frequency maskng characterstcs of human audtory system (HAS). In [6], authors propose a blnd watermarkng system whch takes the advantages of the attack-nvarant feature of the cepstrum doman and error-correcton capablty of BCH code to ncrease the mperceptblty and robustness of audo watermarkng. In [7], authors propose a survey of watermarkng systems 120

3 whch are appled to Multmeda. In [8], watermarks are embedded nto the hghest m DCT coeffcents of the whole sound excludng the DC component by the followng equaton: v = v ( 1+ x ) (1) Where, m s the length of the watermark sequence, v s a magntude coeffcent nto whch a watermark s embedded, x s a watermark to be nserted nto v, s a scalng factor, v s an adjusted magntude coeffcent. The watermark sequence s extracted by performng the nverse operaton of (1) represented by the followng equaton: x v = ( 1) / v (2) In [9], the authors ntroduce a new method for nsertng watermarks nto audo sgnals by usng components whch have low frequency. Ths proposed method uses lftng-based wavelet transform (LBWT). The novel technology of nsertng mage data nto the audo sgnal and addtve audo watermarkng algorthm based on DCT doman s proposed n [10]. In [11], the authors propose a watermarkng method where DCT coeffcents are used. In [12], the authors ntroduce a watermarkng method whch nserts synchronzaton sgnals n tme doman. In [13] and [14], the authors propose a new watermarkng system usng Dscrete Fourer Transform (DFT) and Frst Fourer Transform (FFT) of dgtal contents for copyrght protecton respectvely. In [15], the authors propose a novel method to generate a unque personalzed watermark whch can act authentcatng nformaton for any watermarkng algorthm. In [16], the authors descrbe the watermark constructon process where scrambled verson of watermark s obtaned wth the help of Arnold transform. 3. TRADITIONAL ARNOLD TRANSFORM A dgtal mage can be consdered as a two unt functon f(x,y) n the plane Z. It can be represented as Z = f(x,y) where x,y {0,1,2,3...N-1}. Hence, N represents order of dgtal mage. The matrx of mage can be changed nto a new matrx by usng the Arnold transform whch results n a scrambled verson to offer better securty. It s a mappng functon whch changes a pont (x,y) to another pont ( x, y ) by usng the equaton (3) and (4). x = (x + y) mod N (3) y = (x + 2y) mod N (4) If the orgnal mage teratve n tmes to come to some scrambled state, the scrambled mage also need to teratve n tmes usng new ant-arnold transform to come to orgnal mage. 4. PROPOSED WATERMARKING METHOD In ths secton, we propose our algorthm based on a Dscrete Cosne Transform (DCT) on audo sgnal n whch a watermark mage s embedded. The algorthm conssts of two procedures; watermark embeddng procedure and watermark extracton procedure. 121

4 4.1. Watermark Embeddng Procedure The embeddng procedure performs three major operatons; watermark pre-processng, DCTbased frequency decomposton of the audo sgnal and watermark embeddng n the DCTtransformed audo sgnal. The operatons are descrbed n the followng steps. 1. Express the gray-sale watermark mage as a two-dmensonal matrx whose sze s M1 M2. Image = { Image(k,j), 0 k<m1, 0 j<m2 } (5) 2. Convert the gray scale watermark mage nto bnary format and also perform Arnold transform to scramble the watermark mage and get scrambled mage. 3. Convert two-dmensonal mage matrx nto a one-dmensonal vector W of length M1 M2. W = { W() = Image(k,j), 0 < M1 M2, 0 k<m1, 0 j<m2} (6) 4. Apply DCT to the orgnal host sgnal to calculate the DCT coeffcents. Audo host sgnal Watermark mage Apply DCT to audo sgnal Convert bnary format Dvde nto sub sectons Arnold Transformaton Calculate Energy Watermark generaton Sub secton Selecton Perform Embeddng algorthm Apply Inverse DCT Watermarked Audo sgnal Fgure 1: Watermark embeddng process 5. Absolute values of the DCT coeffcents are dvded nto subsectons. 6. Energy of each secton s then calculated usng the followng equaton; 122

5 2 E = v( ) (7) 7. Fnd the most promnent peaks from the hghest energy secton usng peak detecton algorthm. 8. The watermark s then embedded nto the selected N peaks of the selected secton by usng the equaton (1) shown n [8], where N s the length of normalzed one dmensonal vector of mage. 9. Apply the nverse Dscrete Cosne Transformaton (IDCT) to obtan the watermarked audo sgnal Watermark Extracton Procedure Audo host sgnal Apply DCT to audo sgnal Dvde nto sub sectons Calculate Energy Watermarked sgnal Pre-embeddng Process Sub secton Selecton Pre-embeddng Process Perform Detecton algorthm Convert two dmensonal matrx whch represents scrambled bnary mage Ant-Arnold Transform Convert to gray mage Watermark mage Fgure 2: Watermark extracton process 123

6 The extracton process s mplemented n the followng steps: 1. The watermarked audo sgnal s transformed nto DCT doman. 2. Extract the hghest promnent peaks from the DCT coeffcents whch are located at the same poston n the embeddng process above. 3. The watermarked vector s then calculated by performng the extracton algorthm usng the nverse operaton of (1) represented by equaton (2). 4. Convert extracted watermarked vector back nto two dmensonal matrx whch represents scrambled mage. 5. Apply ant-arnold transform to get the orgnal mage of bnary format. 6. Convert bnary mage to gray-scale mage. 5. PERFORMANCE EVALUATION FRAMEWORK In ths secton, we ntroduce performance evaluaton of our proposed system Bt Error Rate (BER) The robustness s measured as the BER correspondng to correctly formed bnary values of the mage. The BER (n present) s gven by k BER = a (8) k n= 0 If ( w [ n] = w[ n] ) then a = 0 otherwse a =1, where w [n] represents the set of bnary values formed from the watermarked audo host sgnal and w[n] ndcates the set of the bnary values of the orgnal mage Perceptual Qualty Perceptual qualty refers to the mperceptblty of embedded watermark data wthn the host sgnal. In most applcatons t s mportant that the watermark s undetectable to a lstener or a vewer. Ths ensures that the qualty of the host sgnal s not percevably dstorted and does not ndcate the presence or locaton of a watermark. In ths paper, the sgnal-to-nose rato (SNR) of the watermarked sgnal versus the host sgnal was used as a qualty measure. In order to evaluate the qualty of watermarked sgnal, the followng sgnal-to-nose rato (SNR) equaton s used. N 2 S ( n) n= 1 SNR = 10 log10 N (9) 2 [ S( n) S ( n)] n= 1 where S(n) s a host audo sgnal of length N samples and S (n) be watermarked audo sgnal Subjectve Qualty Evaluaton The naudblty of our watermarkng method has been done by lstenng tests nvolvng ten persons. Each lstener was presented wth the pars of orgnal sgnal and the watermarked sgnal and was asked to report whether any dfference could be detected between the two sgnals. The ten people lsted to each par for 10 tmes and they have a grade for ths par, usng the ITU-R BS.1284 standardzed 5-pont gradng scale. The average grade for of each par from all lsteners s the fnal grade for ths par. 124

7 Table 1. Gradng Scale (ITU-R) Grade Qualty Imparment 5 Excellent Imperceptble 4 Good Perceptble but not annoyng 3 Far Slghtly annoyng 2 Poor Annoyng 1 Bad Very Annoyng 6. EXPERIMENTAL RESULTS In ths secton, we evaluate the performance of our watermarkng system for four dfferent types of 16 bt mono audo sgnals sampled at 44.1 khz: (a) an nstrumental song Hey Jude played by a Korean tradtonal muscal nstrument called the gayageum; (b) the song Let t Be by the Beatles; (c) the begnnng of Symphony No. 5 n C mnor, Op.67, by Ludwg van Beethoven; (d) a human voce provdng TOEIC (Test of Englsh for Internatonal Communcaton) lstenng test nstructon. A gray-scale mage shown n fgure 3 was used as watermark for embeddng n the audo fles. We choose gray-scale mage as watermark mage. The sze of the watermark mage was chosen after takng nto consderaton the length of the audo fles Fgure 3: The orgnal watermark mage Performance of audo watermarkng algorthm s commonly evaluated wth respect to two common metrcs: (a) Imperceptblty (Inaudblty) and (b) Robustness Imperceptblty Test Imperceptblty s related to the perceptual qualty of the watermarked sgnal. It ensures that the qualty of the sgnal s not perceptble to a lstener. To measure mperceptblty, we use Sgnalto-Nose rato (SNR) as an objectve measure and a lstenng test as a subjectve measure. Table 2. SNR and Average ITU-R grade value of the proposed watermarkng system Type of Sgnal Sgnal-to-Nose rato (SNR) Average Grade(ITU-R) Hey Jude Let t be Symphony No Human Voce Robustness Test The robustness of a watermarkng method s defned as the ablty of watermark detector to extract the embedded watermark after common sgnal processng operatons and attacks. In ths paper, robustness s measured n terms of the Bt Error Rate (BER). 125

8 Table 3. Bt Error Rate (BER) of the proposed method wthout attack Hey Jude Let t be Human Voce Table 4. Bt Error Rate (BER) of the proposed method aganst re-samplng Hey Jude Let t be Human Voce Table 5. Bt Error Rate (BER) of the proposed method aganst re-quantzaton Hey Jude Let t be Human Voce Table 6. Bt Error Rate (BER) of the proposed method aganst flter attacks Hey Jude Let t be Human Voce Table 7. Bt Error Rate (BER) of the proposed method aganst random nose Hey Jude Let t be Human Voce Table 8. Bt Error Rate (BER) of the proposed method aganst AWGN Hey Jude Let t be Human Voce

9 7. CONCLUSIONS In ths paper, we have presented a new watermarkng system usng Dscrete Cosne Transform (DCT) for copyrght protecton of audo sound. Expermental results ndcate that our proposed watermarkng system has compromsed audblty and robustness better. Ths method also shows strong robustness aganst several knds of attacks such as nose addton, re-samplng, requantzaton, flterng etc. Ths results obtaned verfy the effectveness of audo watermarkng as a relable soluton to the copyrght protecton problem whch s facng the musc ndustry. REFERENCES [1] W. N. Le and L. C. Chang, (2006) Robust and Hgh -Qualty Tme-Doman Audo Watermarkng Based on Low Frequency Ampltude Modfcaton, IEEE Transactons on Multmeda, Vol. 8, No. 1, pp [2] P. Bassa, I. Ptas and N. Nkolads, (2001) Robust Audo Watermarkng n the Tme doman, IEEE Transactons on Multmeda, Vol. 3, No. 2, pp [3] G. Zeng and Z. Qu, (2008) Audo watermarkng n DCT; Embeddng Strategy and Algorthm, n Proceedngs of 9th Internatonal Conference on Sgnal Processng, (ISP 09), pp [4] X. Y. Wang and H. Zaho, (2006) A novel Synchronzaton Invarant Audo Watermarkng Schem e Based on DWT and DCT, IEEE Transactons on Sgnal Processng, Vol. 54, No. 12, pp [5] S. K. Lee and Y. S. Ho, (2000) Dgtal Audo Watermarkng n the cepstrum doman, IEEE Transactons on Consumer Electroncs, Vol. 46, No. 3, pp [6] S. C. Lu and S. D. Ln (2006) BCH code based robust audo watermarkng n the cepstrum doman, Journal of Informaton Scence and Engneerng, Vol. 22, pp [7] S.J. Lee, S. H. Jung (2001) A Survey of Watermarkng Technques Appled to Multmeda, IEEE Transactons on Industral Electroncs, Vol. 12, pp [8] I. Cox, J. Kllan, F. Leghton and T. Ahamoon, (1997) Secure Spread Spectrum Watermarkng for Multmeda, IEEE Transactons on Image Processng, Vol. 6, No. 12, pp [9] E. Erceleb. And L.Batakc., (2009) Audo Watermarkng Scheme Based on Embeddng Strategy n Low Frequency Components wth a Bnary Image., Dgtal Sgnal Processng, Vol. 19, No. 2, pp [10] Yan Yang, Rong Huang and Mntau Xu (2009) A Novel Audo Watermarkng Algorthm for Copyrght Protecton Based on DCT Doman. 2nd Internatonal Symposum on Electronc Commerce and Securty,pp [11] P.K Dhar, M.I.Khan and S. Ahmad (2010) A New DCT-Based Watermarkng Method for Copyrght Protecton of Dgtal Audo., Internatonal Journal of Computer Scence & Informaton Technology(IJCSIT), Vol. 2 No.5. [12] J. Huang, Y. Wang and Y.Q. Sh,(2002) A Blnd Audo Watermarkng Algorthm wth Self Synchronzaton., IEEE Internatonal Symposum on Crcut and Systems, Vol. 3 pp [13] P.K Dhar, M.I.Khan and J.M.Km (2010) A New Audo Watermarkng System usng Dscrete Fourer Transform for Copyrght Protecton., Internatonal Journal of Computer Scence & Network Securty (IJCSNS), Vol. 10 No.6. [14] P.K Dhar and J.M.Km (2011) Dgtal Watermarkng Scheme Based on Frst Fourer Transformaton for Audo Copyrght Protecton., Internatonal Journal of Securty and ts Applcatons (IJSIA), Vol. 5 No.2. [15] T.K. Tewar, V.Saxena and J.P Gupta (2012) A Novel Approach to Generate Watermarks Usng Audtory Features for Audo Watermarkng., Journal of Theoretcal and Appled Informaton Technology (JATIT), Vol. 35 No.2. [16] Dr. M. Sathk and S. S. Sujatha (2010) An Improved Invsble Watermarkng Technque for Image Authentcaton., Internatonal Journal of Advanced Scence and Technology (IJAST), Vol

10 Authors Dr. Mohammad Ibrahm Khan receved the B.S. degree n Electrcal and Electronc Engneerng from Bangladesh Unversty of Engneerng and Technology (BUET), Bangladesh n He receved M.S. degree n Computer Scence and Engneerng from the same Unversty n He receved hs Ph.D. degree n Computer Scence and Engneerng from Jahangrnagar Unversty n Snce 1999, he has been servng as a faculty member n the Department of Computer Scence and Engneerng at Chttagong Unversty of Engneerng & Technology (CUET), Chttagong, Bangladesh. Hs research nterest ncludes Dgtal Image Processng, Graph Theory, Cryptography, Dgtal Watermarkng, Multmeda Systems, and Dgtal Sgnal Processng. Md. Iqbal Hasan Sarker receved the B.Sc degree n Computer Scence & Engneerng from Chttagong Unversty of Engneerng & Technology (CUET), Bangladesh n Currently, he s pursung M.Sc n Computer Scence & Engneerng n the same Unversty. Snce 2010, he has been servng as a faculty member n the same department and unversty. Hs research nterest ncludes Dgtal Watermarkng, Computer Vson, Dgtal Image Processng, Cryptography and data mnng. Dr. Kaushk Deb receved hs B. Tech. and M. Tech. degrees from Department of Computer Scence & Engneerng of Tula State Unversty, Tula, Russa, n 1999 and 2000, respectvely. He receved hs Ph.D. degree n Electrcal Engneerng & Informaton systems from Unversty of Ulsan, Ulsan, South Korea n Snce 2001, he has been servng as a faculty member n the Department of Computer Scence and Engneerng of Chttagong Unversty of Engneerng & Technology (CUET), Chttagong, Bangladesh. Hs research nterests nclude computer vson, pattern recognton, ntellgent transportaton systems (ITSs) and human-computer nteracton. Md. Hasan Furhad receved hs B. Sc degree n Computer Scence & Engneerng from Rajshah Unversty of Engneerng & Technology (RUET), Bangladesh n Currently, he s pursung MS n Unversty of Ulsan, South Korea. He s a Lecturer n Faculty of Engneerng at Unversty of Informaton Technology & Scences (UITS), Chttagong, Bangladesh. Hs research nterests nclude Embedded Systems, Computer Archtecture and Computer Vson. 128

Hybrid Non-Blind Color Image Watermarking

Hybrid Non-Blind Color Image Watermarking Hybrd Non-Blnd Color Image Watermarkng Ms C.N.Sujatha 1, Dr. P. Satyanarayana 2 1 Assocate Professor, Dept. of ECE, SNIST, Yamnampet, Ghatkesar Hyderabad-501301, Telangana 2 Professor, Dept. of ECE, AITS,

More information

Key-Selective Patchwork Method for Audio Watermarking

Key-Selective Patchwork Method for Audio Watermarking Internatonal Journal of Dgtal Content Technology and ts Applcatons Volume 4, Number 4, July 2010 Key-Selectve Patchwork Method for Audo Watermarkng 1 Ch-Man Pun, 2 Jng-Jng Jang 1, Frst and Correspondng

More information

A Hybrid Semi-Blind Gray Scale Image Watermarking Algorithm Based on DWT-SVD using Human Visual System Model

A Hybrid Semi-Blind Gray Scale Image Watermarking Algorithm Based on DWT-SVD using Human Visual System Model A Hybrd Sem-Blnd Gray Scale Image Watermarkng Algorthm Based on DWT-SVD usng Human Vsual System Model Rajesh Mehta r Scence & Engneerng, USICT Guru Gobnd Sngh Indrarprastha Unversty New Delh, Inda rajesh00ust@gmal.com

More information

Enhanced Watermarking Technique for Color Images using Visual Cryptography

Enhanced Watermarking Technique for Color Images using Visual Cryptography Informaton Assurance and Securty Letters 1 (2010) 024-028 Enhanced Watermarkng Technque for Color Images usng Vsual Cryptography Enas F. Al rawashdeh 1, Rawan I.Zaghloul 2 1 Balqa Appled Unversty, MIS

More information

Robust Watermarking for Text Images Based on Arnold Scrambling and DWT-DCT

Robust Watermarking for Text Images Based on Arnold Scrambling and DWT-DCT Internatonal Conference on Mechatroncs Electronc Industral and Control Engneerng (MEIC 015) Robust Watermarkng for Text Images Based on Arnold Scramblng and DWT-DCT Fan Wu College of Informaton Scence

More information

Robust Video Watermarking Using Image Normalization, Motion Vector and Perceptual Information

Robust Video Watermarking Using Image Normalization, Motion Vector and Perceptual Information Robust Vdeo Watermarkng Usng Image ormalzaton, Moton Vector and Perceptual Informaton Cedllo-Hernández Antono 1, Cedllo-Hernández Manuel 1, akano-myatake Marko 1, García-Vázquez Mreya S. 2 1 Postgraduate

More information

IMPLEMENTATION OF QIM BASED AUDIO WATERMARKING USING HYBRID TRANSFORM OF SWT-DCT-SVD METHODS OPTIMIZED WITH GENETIC ALORITHM

IMPLEMENTATION OF QIM BASED AUDIO WATERMARKING USING HYBRID TRANSFORM OF SWT-DCT-SVD METHODS OPTIMIZED WITH GENETIC ALORITHM IMPLEMENTATION OF QIM BASED AUDIO WATERMARKING USING HYBRID TRANSFORM OF SWT-DCT-SVD METHODS OPTIMIZED WITH GENETIC ALORITHM Ryan Amnullah 1, Gelar Budman 2, Irma Saftr 3 1, 2, 3 FakultasTeknk Elektro,

More information

A Fast Content-Based Multimedia Retrieval Technique Using Compressed Data

A Fast Content-Based Multimedia Retrieval Technique Using Compressed Data A Fast Content-Based Multmeda Retreval Technque Usng Compressed Data Borko Furht and Pornvt Saksobhavvat NSF Multmeda Laboratory Florda Atlantc Unversty, Boca Raton, Florda 3343 ABSTRACT In ths paper,

More information

Semi-Fragile Watermarking Scheme for Authentication of JPEG Images

Semi-Fragile Watermarking Scheme for Authentication of JPEG Images Tamkang Journal of Scence and Engneerng, Vol. 10, No 1, pp. 5766 (2007) 57 Sem-Fragle Watermarkng Scheme for Authentcaton of JPEG Images Chh-Hung n 1 *, Tung-Shh Su 2 and Wen-Shyong Hseh 2,3 1 Department

More information

Shape-adaptive DCT and Its Application in Region-based Image Coding

Shape-adaptive DCT and Its Application in Region-based Image Coding Internatonal Journal of Sgnal Processng, Image Processng and Pattern Recognton, pp.99-108 http://dx.do.org/10.14257/sp.2014.7.1.10 Shape-adaptve DCT and Its Applcaton n Regon-based Image Codng Yamn Zheng,

More information

IAJIT First Online Publication

IAJIT First Online Publication Content Protecton n Vdeo Data Based on Robust Dgtal Watermarkng Resstant to Intentonal and Unntentonal Attacks Mad Masoum and Shervn Amr Department of Electrcal Engneerng, Islamc Azad Unversty Qazvn Branch,

More information

Content Based Image Retrieval Using 2-D Discrete Wavelet with Texture Feature with Different Classifiers

Content Based Image Retrieval Using 2-D Discrete Wavelet with Texture Feature with Different Classifiers IOSR Journal of Electroncs and Communcaton Engneerng (IOSR-JECE) e-issn: 78-834,p- ISSN: 78-8735.Volume 9, Issue, Ver. IV (Mar - Apr. 04), PP 0-07 Content Based Image Retreval Usng -D Dscrete Wavelet wth

More information

Performance Analysis of Data Hiding in MPEG-4 AAC Audio *

Performance Analysis of Data Hiding in MPEG-4 AAC Audio * TSINGHUA SCIENCE AND TECHNOLOGY ISSNll1007-0214ll07/21llpp55-61 Volume 14, Number 1, February 2009 Performance Analyss of Data Hdng n MPEG-4 AAC Audo * XU Shuzheng ( ) **, ZHANG Peng ( ), WANG Pengjun

More information

KEYWORDS: Digital Image Watermarking, Discrete Wavelet Transform, General Regression Neural Network, Human Visual System. 1.

KEYWORDS: Digital Image Watermarking, Discrete Wavelet Transform, General Regression Neural Network, Human Visual System. 1. An Adaptve Dgtal Image Watermarkng Based on Image Features n Dscrete Wavelet Transform Doman and General Regresson Neural Network Ayoub Taher Group of IT Engneerng, Payam Noor Unversty, Broujen, Iran ABSTRACT:

More information

A Hybrid Digital Image Watermarking based on Discrete Wavelet Transform, Discrete Cosine Transform, and General Regression Neural Network

A Hybrid Digital Image Watermarking based on Discrete Wavelet Transform, Discrete Cosine Transform, and General Regression Neural Network A Hybrd Dgtal Image Watermarkng based on Dscrete Wavelet Transform, Dscrete Cosne Transform, and General Regresson Neural Network Ayoub Taher ; ABSTRACT In ths paper, a new hybrd dgtal watermarkng technque

More information

A NEW DCT-BASED WATERMARKING METHOD FOR COPYRIGHT PROTECTION OF DIGITAL AUDIO

A NEW DCT-BASED WATERMARKING METHOD FOR COPYRIGHT PROTECTION OF DIGITAL AUDIO International journal of computer science & information Technology (IJCSIT) Vol., No.5, October A NEW DCT-BASED WATERMARKING METHOD FOR COPYRIGHT PROTECTION OF DIGITAL AUDIO Pranab Kumar Dhar *, Mohammad

More information

Robust Blind Video Watermark Algorithm in Transform Domain Combining with 3D Video Correlation

Robust Blind Video Watermark Algorithm in Transform Domain Combining with 3D Video Correlation JOURNAL OF MULTIMEDIA, VOL. 8, NO. 2, APRIL 2013 161 Robust Blnd Vdeo Watermark Algorthm n Transform Doman Combnng wth 3D Vdeo Correlaton DING Ha-yang 1,3 1. Informaton Securty Center, Bejng Unversty of

More information

Research of Multiple Text Watermarks Technique in Electric Power System Texts

Research of Multiple Text Watermarks Technique in Electric Power System Texts Sensors & Transducers 203 by IFSA http://www.sensorsportal.com Research of Multple Text atermarks Technque n Electrc Power System Texts Xao-X XING, Qng CHEN, 2 Lan-X FU School of Optcal-Electrcal and Computer

More information

A Lossless Watermarking Scheme for Halftone Image Authentication

A Lossless Watermarking Scheme for Halftone Image Authentication IJCSNS Internatonal Journal of Computer Scence and Network Securty, VOL.6 No.2B, February 2006 147 A Lossless Watermarkng Scheme for Halftone Image Authentcaton Jeng-Shyang Pan, Hao Luo, and Zhe-Mng Lu,

More information

Using Counter-propagation Neural Network for Digital Audio Watermarking

Using Counter-propagation Neural Network for Digital Audio Watermarking Usng Counter-propagaton Neural Network for Dgtal Audo Watermarkng Chuan-Yu Chang and Wen-Chh Shen Graduate School of Computer Scence and Informaton Engneerng Natonal Yunln Unversty of Scence & Technology

More information

Information Hiding Watermarking Detection Technique by PSNR and RGB Intensity

Information Hiding Watermarking Detection Technique by PSNR and RGB Intensity www..org 3 Informaton Hdng Watermarkng Detecton Technque by PSNR and RGB Intensty 1 Neha Chauhan, Akhlesh A. Waoo, 3 P. S. Patheja 1 Research Scholar, BIST, Bhopal, Inda.,3 Assstant Professor, BIST, Bhopal,

More information

Adaptive digital watermarking of images using Genetic Algorithm

Adaptive digital watermarking of images using Genetic Algorithm Adaptve dgtal watermarkng of mages usng Genetc Algorthm Bushra Skander, Muhammad Ishtaq, M. Arfan Jaffar, Muhammad Tarq, Anwar M. Mrza Department of Computer Scence, Natonal Unversty of Computer and Emergng

More information

An Image Fusion Approach Based on Segmentation Region

An Image Fusion Approach Based on Segmentation Region Rong Wang, L-Qun Gao, Shu Yang, Yu-Hua Cha, and Yan-Chun Lu An Image Fuson Approach Based On Segmentaton Regon An Image Fuson Approach Based on Segmentaton Regon Rong Wang, L-Qun Gao, Shu Yang 3, Yu-Hua

More information

Research Article High Capacity Reversible Watermarking for Audio by Histogram Shifting and Predicted Error Expansion

Research Article High Capacity Reversible Watermarking for Audio by Histogram Shifting and Predicted Error Expansion e Scentfc World Journal, Artcle ID 656251, 7 pages http://dx.do.org/1.1155/214/656251 Research Artcle Hgh Capacty Reversble Watermarkng for Audo by Hstogram Shftng and Predcted Error Expanson Fe Wang,

More information

A Binarization Algorithm specialized on Document Images and Photos

A Binarization Algorithm specialized on Document Images and Photos A Bnarzaton Algorthm specalzed on Document mages and Photos Ergna Kavalleratou Dept. of nformaton and Communcaton Systems Engneerng Unversty of the Aegean kavalleratou@aegean.gr Abstract n ths paper, a

More information

Digital Video Watermarking using Discrete Wavelet Transform and Principal Component Analysis

Digital Video Watermarking using Discrete Wavelet Transform and Principal Component Analysis Internatonal Journal of Wsdom Based Computng, Vol. 1 (2), August 2011 7 Dgtal Vdeo Watermarkng usng Dscrete Wavelet Transform and Prncpal Component Analyss Sanjana Snha, Prajnat Bardhan, Swarnal Pramanck,

More information

Improvement of Spatial Resolution Using BlockMatching Based Motion Estimation and Frame. Integration

Improvement of Spatial Resolution Using BlockMatching Based Motion Estimation and Frame. Integration Improvement of Spatal Resoluton Usng BlockMatchng Based Moton Estmaton and Frame Integraton Danya Suga and Takayuk Hamamoto Graduate School of Engneerng, Tokyo Unversty of Scence, 6-3-1, Nuku, Katsuska-ku,

More information

A Comparison between Digital Images Watermarking in Tow Different Color Spaces Using DWT2*

A Comparison between Digital Images Watermarking in Tow Different Color Spaces Using DWT2* A Comparson between Dgtal s ng n Tow Dfferent Color Spaces Usng DWT* Mehd Khall Natonal Academy of Scence of Armena Yerevan, Armena e-mal: khall.mehd@yahoo.com ABSTRACT A novel dgtal watermarkng for ownershp

More information

A Robust Webpage Information Hiding Method Based on the Slash of Tag

A Robust Webpage Information Hiding Method Based on the Slash of Tag Advanced Engneerng Forum Onlne: 2012-09-26 ISSN: 2234-991X, Vols. 6-7, pp 361-366 do:10.4028/www.scentfc.net/aef.6-7.361 2012 Trans Tech Publcatons, Swtzerland A Robust Webpage Informaton Hdng Method Based

More information

Parallelism for Nested Loops with Non-uniform and Flow Dependences

Parallelism for Nested Loops with Non-uniform and Flow Dependences Parallelsm for Nested Loops wth Non-unform and Flow Dependences Sam-Jn Jeong Dept. of Informaton & Communcaton Engneerng, Cheonan Unversty, 5, Anseo-dong, Cheonan, Chungnam, 330-80, Korea. seong@cheonan.ac.kr

More information

An Image Compression Algorithm based on Wavelet Transform and LZW

An Image Compression Algorithm based on Wavelet Transform and LZW An Image Compresson Algorthm based on Wavelet Transform and LZW Png Luo a, Janyong Yu b School of Chongqng Unversty of Posts and Telecommuncatons, Chongqng, 400065, Chna Abstract a cylpng@63.com, b y27769864@sna.cn

More information

Identify the Attack in Embedded Image with Steganalysis Detection Method by PSNR and RGB Intensity

Identify the Attack in Embedded Image with Steganalysis Detection Method by PSNR and RGB Intensity Internatonal Journal of Computer Systems (ISSN: 394-1065), Volume 03 Issue 07, July, 016 Avalable at http://www.jcsonlne.com/ Identfy the Attack n Embedded Image wth Steganalyss Detecton Method by PSNR

More information

A Fast Visual Tracking Algorithm Based on Circle Pixels Matching

A Fast Visual Tracking Algorithm Based on Circle Pixels Matching A Fast Vsual Trackng Algorthm Based on Crcle Pxels Matchng Zhqang Hou hou_zhq@sohu.com Chongzhao Han czhan@mal.xjtu.edu.cn Ln Zheng Abstract: A fast vsual trackng algorthm based on crcle pxels matchng

More information

High-Boost Mesh Filtering for 3-D Shape Enhancement

High-Boost Mesh Filtering for 3-D Shape Enhancement Hgh-Boost Mesh Flterng for 3-D Shape Enhancement Hrokazu Yagou Λ Alexander Belyaev y Damng We z Λ y z ; ; Shape Modelng Laboratory, Unversty of Azu, Azu-Wakamatsu 965-8580 Japan y Computer Graphcs Group,

More information

Robust and Reversible Relational Database Watermarking Algorithm Based on Clustering and Polar Angle Expansion

Robust and Reversible Relational Database Watermarking Algorithm Based on Clustering and Polar Angle Expansion Robust and Reversble Relatonal Database Watermarkng Algorthm Based on Clusterng and Polar Angle Expanson Zhyong L, Junmn Lu and Wecheng Tao College of Informaton Scence and Engneerng, Hunan Unversty, Changsha,

More information

Grading Image Retrieval Based on DCT and DWT Compressed Domains Using Low-Level Features

Grading Image Retrieval Based on DCT and DWT Compressed Domains Using Low-Level Features Journal of Communcatons Vol. 0 No. January 0 Gradng Image Retreval Based on DCT and DWT Compressed Domans Usng Low-Level Features Chengyou Wang Xnyue Zhang Rongyang Shan and Xao Zhou School of echancal

More information

High Payload Reversible Data Hiding Scheme Using Difference Segmentation and Histogram Shifting

High Payload Reversible Data Hiding Scheme Using Difference Segmentation and Histogram Shifting JOURNAL OF ELECTRONIC SCIENCE AND TECHNOLOGY, VOL. 11, NO. 1, MARCH 2013 9 Hgh Payload Reversble Data Hdng Scheme Usng Dfference Segmentaton and Hstogram Shftng Yung-Chen Chou and Huang-Chng L Abstract

More information

A Secured Method for Image Steganography Based On Pixel Values

A Secured Method for Image Steganography Based On Pixel Values A Secured Method for Image Steganography Based On Pxel Values Tarun Gulat #, Sanskrt Gupta * # Assocate Professor, Electroncs and Communcaton Engneerng Department, MMEC, M.M.U., Mullana, Ambala, Haryana,

More information

The Research of Ellipse Parameter Fitting Algorithm of Ultrasonic Imaging Logging in the Casing Hole

The Research of Ellipse Parameter Fitting Algorithm of Ultrasonic Imaging Logging in the Casing Hole Appled Mathematcs, 04, 5, 37-3 Publshed Onlne May 04 n ScRes. http://www.scrp.org/journal/am http://dx.do.org/0.436/am.04.584 The Research of Ellpse Parameter Fttng Algorthm of Ultrasonc Imagng Loggng

More information

CLASSIFICATION OF ULTRASONIC SIGNALS

CLASSIFICATION OF ULTRASONIC SIGNALS The 8 th Internatonal Conference of the Slovenan Socety for Non-Destructve Testng»Applcaton of Contemporary Non-Destructve Testng n Engneerng«September -3, 5, Portorož, Slovena, pp. 7-33 CLASSIFICATION

More information

Robust Spread Spectrum Based Digital Video Watermarking Scheme in Frequency Domain Nisha Chaudhary 1 Savita Shivani 2

Robust Spread Spectrum Based Digital Video Watermarking Scheme in Frequency Domain Nisha Chaudhary 1 Savita Shivani 2 IJSRD Internatonal Journal for Scentfc Research & Development Vol. 2, Issue 6, 2 ISSN (onlne): 23263 Robust Spread Spectrum Based Dgtal Vdeo Watermarkng Scheme n Frequency Doman Nsha Chaudhary Savta Shvan

More information

Research and Application of Fingerprint Recognition Based on MATLAB

Research and Application of Fingerprint Recognition Based on MATLAB Send Orders for Reprnts to reprnts@benthamscence.ae The Open Automaton and Control Systems Journal, 205, 7, 07-07 Open Access Research and Applcaton of Fngerprnt Recognton Based on MATLAB Nng Lu* Department

More information

Article Reversible Dual-Image-Based Hiding Scheme Using Block Folding Technique

Article Reversible Dual-Image-Based Hiding Scheme Using Block Folding Technique Artcle Reversble Dual-Image-Based Hdng Scheme Usng Block Foldng Technque Tzu-Chuen Lu, * and Hu-Shh Leng Department of Informaton Management, Chaoyang Unversty of Technology, Tachung 4349, Tawan Department

More information

Image Representation & Visualization Basic Imaging Algorithms Shape Representation and Analysis. outline

Image Representation & Visualization Basic Imaging Algorithms Shape Representation and Analysis. outline mage Vsualzaton mage Vsualzaton mage Representaton & Vsualzaton Basc magng Algorthms Shape Representaton and Analyss outlne mage Representaton & Vsualzaton Basc magng Algorthms Shape Representaton and

More information

Data Hiding and Image Authentication for Color-Palette Images

Data Hiding and Image Authentication for Color-Palette Images Data Hdng and Image Authentcaton for Color-Palette Images Chh-Yang Yn ( 殷志揚 ) and Wen-Hsang Tsa ( 蔡文祥 ) Department of Computer & Informaton Scence Natonal Chao Tung Unversty 00 Ta Hsueh Rd., Hsnchu, Tawan

More information

Cluster Analysis of Electrical Behavior

Cluster Analysis of Electrical Behavior Journal of Computer and Communcatons, 205, 3, 88-93 Publshed Onlne May 205 n ScRes. http://www.scrp.org/ournal/cc http://dx.do.org/0.4236/cc.205.350 Cluster Analyss of Electrcal Behavor Ln Lu Ln Lu, School

More information

Quantization Noise Power Injection In Subband Audio Coding Using Low Selectivity Filter Banks

Quantization Noise Power Injection In Subband Audio Coding Using Low Selectivity Filter Banks Quantzaton Nose Power Injecton In Subband Audo Codng Usng Low Selectvty Flter Banks D. ARTÍNEZ -UÑOZ, N. RUIZ-REYES, P. VERA-CANDEAS, P.J. RECHE-LÓPEZ, J. CURPIÁN-ALONSO Departamento de Electrónca Unversdad

More information

Load Balancing for Hex-Cell Interconnection Network

Load Balancing for Hex-Cell Interconnection Network Int. J. Communcatons, Network and System Scences,,, - Publshed Onlne Aprl n ScRes. http://www.scrp.org/journal/jcns http://dx.do.org/./jcns.. Load Balancng for Hex-Cell Interconnecton Network Saher Manaseer,

More information

Coding Artifact Reduction Using Edge Map Guided Adaptive and Fuzzy Filter

Coding Artifact Reduction Using Edge Map Guided Adaptive and Fuzzy Filter MEL A MITSUBISHI ELECTIC ESEACH LABOATOY http://www.merl.com Codng Artfact educton Usng Edge Map Guded Adaptve and Fuzzy Flter Hao-Song Kong Yao Ne Anthony Vetro Hufang Sun Kenneth E. Barner T-2004-056

More information

Detecting MP3Stego using Calibrated Side Information Features

Detecting MP3Stego using Calibrated Side Information Features 2628 JOURNAL OF SOFTWARE, VOL. 8, NO. 10, OCTOBER 2013 Detectng P3Stego usng Calbrated Sde Informaton Features Xanmn Yu School of Informaton Scence and Engneerng, Nngbo Unversty Emal: mlhappy1016@163.com

More information

Term Weighting Classification System Using the Chi-square Statistic for the Classification Subtask at NTCIR-6 Patent Retrieval Task

Term Weighting Classification System Using the Chi-square Statistic for the Classification Subtask at NTCIR-6 Patent Retrieval Task Proceedngs of NTCIR-6 Workshop Meetng, May 15-18, 2007, Tokyo, Japan Term Weghtng Classfcaton System Usng the Ch-square Statstc for the Classfcaton Subtask at NTCIR-6 Patent Retreval Task Kotaro Hashmoto

More information

Enhanced AMBTC for Image Compression using Block Classification and Interpolation

Enhanced AMBTC for Image Compression using Block Classification and Interpolation Internatonal Journal of Computer Applcatons (0975 8887) Volume 5 No.0, August 0 Enhanced AMBTC for Image Compresson usng Block Classfcaton and Interpolaton S. Vmala Dept. of Comp. Scence Mother Teresa

More information

Related-Mode Attacks on CTR Encryption Mode

Related-Mode Attacks on CTR Encryption Mode Internatonal Journal of Network Securty, Vol.4, No.3, PP.282 287, May 2007 282 Related-Mode Attacks on CTR Encrypton Mode Dayn Wang, Dongda Ln, and Wenlng Wu (Correspondng author: Dayn Wang) Key Laboratory

More information

An Improved Image Segmentation Algorithm Based on the Otsu Method

An Improved Image Segmentation Algorithm Based on the Otsu Method 3th ACIS Internatonal Conference on Software Engneerng, Artfcal Intellgence, Networkng arallel/dstrbuted Computng An Improved Image Segmentaton Algorthm Based on the Otsu Method Mengxng Huang, enjao Yu,

More information

A Novel Adaptive Descriptor Algorithm for Ternary Pattern Textures

A Novel Adaptive Descriptor Algorithm for Ternary Pattern Textures A Novel Adaptve Descrptor Algorthm for Ternary Pattern Textures Fahuan Hu 1,2, Guopng Lu 1 *, Zengwen Dong 1 1.School of Mechancal & Electrcal Engneerng, Nanchang Unversty, Nanchang, 330031, Chna; 2. School

More information

Discrete Cosine Transform Optimization in Image Compression Based on Genetic Algorithm

Discrete Cosine Transform Optimization in Image Compression Based on Genetic Algorithm 015 8th Internatonal Congress on Image and Sgnal Processng (CISP 015) Dscrete Cosne Transform Optmzaton n Image Compresson Based on Genetc Algorthm LIU Yuan-yuan 1 CHE He-xn 1 College of Communcaton Engneerng,

More information

FEATURE EXTRACTION. Dr. K.Vijayarekha. Associate Dean School of Electrical and Electronics Engineering SASTRA University, Thanjavur

FEATURE EXTRACTION. Dr. K.Vijayarekha. Associate Dean School of Electrical and Electronics Engineering SASTRA University, Thanjavur FEATURE EXTRACTION Dr. K.Vjayarekha Assocate Dean School of Electrcal and Electroncs Engneerng SASTRA Unversty, Thanjavur613 41 Jont Intatve of IITs and IISc Funded by MHRD Page 1 of 8 Table of Contents

More information

Steganography System using Slantlet Transform

Steganography System using Slantlet Transform ISSN:43-6999 Journal of Inmaton Communcaton and Intellgence Systems (JICIS) Volume Issue February 06 Steganography System usng Slantlet Transm Ryadh Bassl Abduljabbar Abstract An approach hdng nmaton has

More information

Security Enhanced Dynamic ID based Remote User Authentication Scheme for Multi-Server Environments

Security Enhanced Dynamic ID based Remote User Authentication Scheme for Multi-Server Environments Internatonal Journal of u- and e- ervce, cence and Technology Vol8, o 7 0), pp7-6 http://dxdoorg/07/unesst087 ecurty Enhanced Dynamc ID based Remote ser Authentcaton cheme for ult-erver Envronments Jun-ub

More information

An Optimal Algorithm for Prufer Codes *

An Optimal Algorithm for Prufer Codes * J. Software Engneerng & Applcatons, 2009, 2: 111-115 do:10.4236/jsea.2009.22016 Publshed Onlne July 2009 (www.scrp.org/journal/jsea) An Optmal Algorthm for Prufer Codes * Xaodong Wang 1, 2, Le Wang 3,

More information

A DCVS Reconstruction Algorithm for Mine Video Monitoring Image Based on Block Classification

A DCVS Reconstruction Algorithm for Mine Video Monitoring Image Based on Block Classification 1 3 4 5 6 7 8 9 10 11 1 13 14 15 16 17 18 19 0 1 Artcle A DCVS Reconstructon Algorthm for Mne Vdeo Montorng Image Based on Block Classfcaton Xaohu Zhao 1,, Xueru Shen 1,, *, Kuan Wang 1, and Wanme L 1,

More information

Research Article Hamming Code Based Watermarking Scheme for 3D Model Verification

Research Article Hamming Code Based Watermarking Scheme for 3D Model Verification Mathematcal Problems n Engneerng, Artcle ID 241093, 7 pages http://dx.do.org/10.1155/2014/241093 Research Artcle Hammng Code Based Watermarkng Scheme for 3D Model Verfcaton Jen-Tse Wang, 1 Y-Chng Chang,

More information

A Novel Video Retrieval Method Based on Web Community Extraction Using Features of Video Materials

A Novel Video Retrieval Method Based on Web Community Extraction Using Features of Video Materials IEICE TRANS. FUNDAMENTALS, VOL.E92 A, NO.8 AUGUST 2009 1961 PAPER Specal Secton on Sgnal Processng A Novel Vdeo Retreval Method Based on Web Communty Extracton Usng Features of Vdeo Materals Yasutaka HATAKEYAMA

More information

Optimum Threshold Parameter Estimation of Wavelet Coefficients Using Fisher Discriminant Analysis for Speckle Noise Reduction

Optimum Threshold Parameter Estimation of Wavelet Coefficients Using Fisher Discriminant Analysis for Speckle Noise Reduction he Internatonal Arab Journal of Informaton echnology, Vol., No. 6, November 4 573 Optmum hreshold Parameter Estmaton of Wavelet Coeffcents Usng Fsher Dscrmnant Analyss for Speckle Nose Reducton Mohammad

More information

User Authentication Based On Behavioral Mouse Dynamics Biometrics

User Authentication Based On Behavioral Mouse Dynamics Biometrics User Authentcaton Based On Behavoral Mouse Dynamcs Bometrcs Chee-Hyung Yoon Danel Donghyun Km Department of Computer Scence Department of Computer Scence Stanford Unversty Stanford Unversty Stanford, CA

More information

Video Watermarking Algorithm Based on Relative Relationship of DCT Coefficients

Video Watermarking Algorithm Based on Relative Relationship of DCT Coefficients 756 JOURAL OF COPUTERS, VOL. 8, O., OVEBER 03 Vdeo Watermarkng Algorthm Based on Relatve Relatonshp of DCT Coeffcents Cheng ngzh, Du Yanpng, Wang Yan Bejng Insttute of Graphc Communcaton, Bejng, Chna Emal:

More information

Brushlet Features for Texture Image Retrieval

Brushlet Features for Texture Image Retrieval DICTA00: Dgtal Image Computng Technques and Applcatons, 1 January 00, Melbourne, Australa 1 Brushlet Features for Texture Image Retreval Chbao Chen and Kap Luk Chan Informaton System Research Lab, School

More information

Geometrically Invariant Watermarking Scheme Based on Local Feature Points

Geometrically Invariant Watermarking Scheme Based on Local Feature Points JOURNAL OF MULTIMEDIA, VOL. 7, NO. 3, JUNE 0 3 Geometrcally Invarant Watermarkng Scheme Based on Local Feature Ponts L Jng School of Computer and Informaton Engneerng, Henan Unversty of Economcs and Law,

More information

Assignment # 2. Farrukh Jabeen Algorithms 510 Assignment #2 Due Date: June 15, 2009.

Assignment # 2. Farrukh Jabeen Algorithms 510 Assignment #2 Due Date: June 15, 2009. Farrukh Jabeen Algorthms 51 Assgnment #2 Due Date: June 15, 29. Assgnment # 2 Chapter 3 Dscrete Fourer Transforms Implement the FFT for the DFT. Descrbed n sectons 3.1 and 3.2. Delverables: 1. Concse descrpton

More information

DWT based Novel Image Denoising by Exploring Internal and External Correlation

DWT based Novel Image Denoising by Exploring Internal and External Correlation ISSN(Onlne): 319-8753 ISSN (Prnt): 347-6710 Internatonal Journal of Innovatve Research n Scence, Engneerng and Technology (An ISO 397: 007 Certfed Organzaton) DWT based Novel Image Denosng by Explorng

More information

Audio Content Classification Method Research Based on Two-step Strategy

Audio Content Classification Method Research Based on Two-step Strategy (IJACSA) Internatonal Journal of Advanced Computer Scence and Applcatons, Audo Content Classfcaton Method Research Based on Two-step Strategy Sume Lang Department of Computer Scence and Technology Chongqng

More information

The Codesign Challenge

The Codesign Challenge ECE 4530 Codesgn Challenge Fall 2007 Hardware/Software Codesgn The Codesgn Challenge Objectves In the codesgn challenge, your task s to accelerate a gven software reference mplementaton as fast as possble.

More information

A Clustering Algorithm for Key Frame Extraction Based on Density Peak

A Clustering Algorithm for Key Frame Extraction Based on Density Peak Journal of Computer and Communcatons, 2018, 6, 118-128 http://www.scrp.org/ournal/cc ISSN Onlne: 2327-5227 ISSN Prnt: 2327-5219 A Clusterng Algorthm for Key Frame Extracton Based on Densty Peak Hong Zhao

More information

A FIBONACCI LSB DATA HIDING TECNIQUE

A FIBONACCI LSB DATA HIDING TECNIQUE A FIBONACCI LSB DATA HIDING TECNIQUE Dego De Luca Pcone (*)(**), Federca Battst (*)(**), Marco Carl (*), Jaakko Astola (**), and Karen Egazaran (**) (*) AE Department, Unverst of Roma TRE, Rome, Ital,

More information

Video Proxy System for a Large-scale VOD System (DINA)

Video Proxy System for a Large-scale VOD System (DINA) Vdeo Proxy System for a Large-scale VOD System (DINA) KWUN-CHUNG CHAN #, KWOK-WAI CHEUNG *# #Department of Informaton Engneerng *Centre of Innovaton and Technology The Chnese Unversty of Hong Kong SHATIN,

More information

Module Management Tool in Software Development Organizations

Module Management Tool in Software Development Organizations Journal of Computer Scence (5): 8-, 7 ISSN 59-66 7 Scence Publcatons Management Tool n Software Development Organzatons Ahmad A. Al-Rababah and Mohammad A. Al-Rababah Faculty of IT, Al-Ahlyyah Amman Unversty,

More information

Available online at Available online at Advanced in Control Engineering and Information Science

Available online at   Available online at   Advanced in Control Engineering and Information Science Avalable onlne at wwwscencedrectcom Avalable onlne at wwwscencedrectcom Proceda Proceda Engneerng Engneerng 00 (2011) 15000 000 (2011) 1642 1646 Proceda Engneerng wwwelsevercom/locate/proceda Advanced

More information

Distortion Function Designing for JPEG Steganography with Uncompressed Side-image

Distortion Function Designing for JPEG Steganography with Uncompressed Side-image Dstorton Functon Desgnng for JPEG Steganography wth Uncompressed Sde-mage Fangjun Huang School of Informaton Scence and Technology, Sun Yat-Sen Unversty, GD 56, Chna huangfj@mal.sysu.edu.cn Jwu Huang School

More information

An Application of the Dulmage-Mendelsohn Decomposition to Sparse Null Space Bases of Full Row Rank Matrices

An Application of the Dulmage-Mendelsohn Decomposition to Sparse Null Space Bases of Full Row Rank Matrices Internatonal Mathematcal Forum, Vol 7, 2012, no 52, 2549-2554 An Applcaton of the Dulmage-Mendelsohn Decomposton to Sparse Null Space Bases of Full Row Rank Matrces Mostafa Khorramzadeh Department of Mathematcal

More information

Simulation Based Analysis of FAST TCP using OMNET++

Simulation Based Analysis of FAST TCP using OMNET++ Smulaton Based Analyss of FAST TCP usng OMNET++ Umar ul Hassan 04030038@lums.edu.pk Md Term Report CS678 Topcs n Internet Research Sprng, 2006 Introducton Internet traffc s doublng roughly every 3 months

More information

Using Fuzzy Logic to Enhance the Large Size Remote Sensing Images

Using Fuzzy Logic to Enhance the Large Size Remote Sensing Images Internatonal Journal of Informaton and Electroncs Engneerng Vol. 5 No. 6 November 015 Usng Fuzzy Logc to Enhance the Large Sze Remote Sensng Images Trung Nguyen Tu Huy Ngo Hoang and Thoa Vu Van Abstract

More information

Music/Voice Separation using the Similarity Matrix. Zafar Rafii & Bryan Pardo

Music/Voice Separation using the Similarity Matrix. Zafar Rafii & Bryan Pardo Musc/Voce Separaton usng the Smlarty Matrx Zafar Raf & Bryan Pardo Introducton Muscal peces are often characterzed by an underlyng repeatng structure over whch varyng elements are supermposed Propellerheads

More information

Detection of an Object by using Principal Component Analysis

Detection of an Object by using Principal Component Analysis Detecton of an Object by usng Prncpal Component Analyss 1. G. Nagaven, 2. Dr. T. Sreenvasulu Reddy 1. M.Tech, Department of EEE, SVUCE, Trupath, Inda. 2. Assoc. Professor, Department of ECE, SVUCE, Trupath,

More information

Classifying Acoustic Transient Signals Using Artificial Intelligence

Classifying Acoustic Transient Signals Using Artificial Intelligence Classfyng Acoustc Transent Sgnals Usng Artfcal Intellgence Steve Sutton, Unversty of North Carolna At Wlmngton (suttons@charter.net) Greg Huff, Unversty of North Carolna At Wlmngton (jgh7476@uncwl.edu)

More information

Tsinghua University at TAC 2009: Summarizing Multi-documents by Information Distance

Tsinghua University at TAC 2009: Summarizing Multi-documents by Information Distance Tsnghua Unversty at TAC 2009: Summarzng Mult-documents by Informaton Dstance Chong Long, Mnle Huang, Xaoyan Zhu State Key Laboratory of Intellgent Technology and Systems, Tsnghua Natonal Laboratory for

More information

Protection of Real and Artwork Human Objects based on a Chaotic Moments Modulation Method

Protection of Real and Artwork Human Objects based on a Chaotic Moments Modulation Method 1 Protecton of Real and Artwork Human Objects based on a Chaotc Moments Modulaton Method Klms Ntalans 1, Paraskev Tzouvel 1, Stefanos Kollas 1 and Athanasos Drgkas 1 Natonal Techncal Unversty of Athens,

More information

Corner-Based Image Alignment using Pyramid Structure with Gradient Vector Similarity

Corner-Based Image Alignment using Pyramid Structure with Gradient Vector Similarity Journal of Sgnal and Informaton Processng, 013, 4, 114-119 do:10.436/jsp.013.43b00 Publshed Onlne August 013 (http://www.scrp.org/journal/jsp) Corner-Based Image Algnment usng Pyramd Structure wth Gradent

More information

CLUSTERING ALGORITHMS FOR PERCEPTUAL IMAGE HASHING. Vishal Monga, Arindam Banerjee, and Brian L. Evans

CLUSTERING ALGORITHMS FOR PERCEPTUAL IMAGE HASHING. Vishal Monga, Arindam Banerjee, and Brian L. Evans CLUSTERING ALGORITHMS FOR PERCEPTUAL IMAGE HASHING Vshal Monga, Arndam Banerjee, and Bran L. Evans Center for Perceptual Systems The Unversty of Texas at Austn, Austn, TX 7871 vshal,abanerje,bevans}@ece.utexas.edu

More information

Learning-Based Top-N Selection Query Evaluation over Relational Databases

Learning-Based Top-N Selection Query Evaluation over Relational Databases Learnng-Based Top-N Selecton Query Evaluaton over Relatonal Databases Lang Zhu *, Wey Meng ** * School of Mathematcs and Computer Scence, Hebe Unversty, Baodng, Hebe 071002, Chna, zhu@mal.hbu.edu.cn **

More information

Reducing Frame Rate for Object Tracking

Reducing Frame Rate for Object Tracking Reducng Frame Rate for Object Trackng Pavel Korshunov 1 and We Tsang Oo 2 1 Natonal Unversty of Sngapore, Sngapore 11977, pavelkor@comp.nus.edu.sg 2 Natonal Unversty of Sngapore, Sngapore 11977, oowt@comp.nus.edu.sg

More information

Performance Assessment and Fault Diagnosis for Hydraulic Pump Based on WPT and SOM

Performance Assessment and Fault Diagnosis for Hydraulic Pump Based on WPT and SOM Performance Assessment and Fault Dagnoss for Hydraulc Pump Based on WPT and SOM Be Jkun, Lu Chen and Wang Zl PERFORMANCE ASSESSMENT AND FAULT DIAGNOSIS FOR HYDRAULIC PUMP BASED ON WPT AND SOM. Be Jkun,

More information

Dynamic Code Block Size for JPEG 2000

Dynamic Code Block Size for JPEG 2000 Dynamc Code Block Sze for JPEG 2000 Png-Sng Tsa a, Yann LeCornec b a Dept. of Computer Scence, Unv. of Texas Pan Amercan, 1201 W. Unv. Dr., Ednburg, TX USA 78539-2999; b Sgma Desgns, Inc., 1778 McCarthy

More information

TN348: Openlab Module - Colocalization

TN348: Openlab Module - Colocalization TN348: Openlab Module - Colocalzaton Topc The Colocalzaton module provdes the faclty to vsualze and quantfy colocalzaton between pars of mages. The Colocalzaton wndow contans a prevew of the two mages

More information

Vectorization of Image Outlines Using Rational Spline and Genetic Algorithm

Vectorization of Image Outlines Using Rational Spline and Genetic Algorithm 01 Internatonal Conference on Image, Vson and Computng (ICIVC 01) IPCSIT vol. 50 (01) (01) IACSIT Press, Sngapore DOI: 10.776/IPCSIT.01.V50.4 Vectorzaton of Image Outlnes Usng Ratonal Splne and Genetc

More information

Development of Face Tracking and Recognition Algorithm for DVR (Digital Video Recorder)

Development of Face Tracking and Recognition Algorithm for DVR (Digital Video Recorder) IJCSNS Internatonal Journal of Computer Scence and Network Securty, VOL.6 No.3A, March 2006 7 Development of Face Trackng and Recognton Algorthm for DVR (Dgtal Vdeo Recorder) Jang-Seon Ryu and Eung-Tae

More information

Accurate Overlay Text Extraction for Digital Video Analysis

Accurate Overlay Text Extraction for Digital Video Analysis Accurate Overlay Text Extracton for Dgtal Vdeo Analyss Dongqng Zhang, and Shh-Fu Chang Electrcal Engneerng Department, Columba Unversty, New York, NY 10027. (Emal: dqzhang, sfchang@ee.columba.edu) Abstract

More information

A Desynchronization Resilient Watermarking Scheme

A Desynchronization Resilient Watermarking Scheme A Desynchronzaton Reslent Watermarkng Scheme Xaojun Q and J Q Department of Computer Scence, Utah State Unversty, Logan, UT 84322-4205 Xaojun.Q@usu.edu, jq79@gmal.com Abstract. Ths paper presents a content-based

More information

Vol. 5, No. 3 March 2014 ISSN Journal of Emerging Trends in Computing and Information Sciences CIS Journal. All rights reserved.

Vol. 5, No. 3 March 2014 ISSN Journal of Emerging Trends in Computing and Information Sciences CIS Journal. All rights reserved. Journal of Emergng Trends n Computng and Informaton Scences 009-03 CIS Journal. All rghts reserved. http://www.csjournal.org Unhealthy Detecton n Lvestock Texture Images usng Subsampled Contourlet Transform

More information

Algorithm for Human Skin Detection Using Fuzzy Logic

Algorithm for Human Skin Detection Using Fuzzy Logic Algorthm for Human Skn Detecton Usng Fuzzy Logc Mrtunjay Ra, R. K. Yadav, Gaurav Snha Department of Electroncs & Communcaton Engneerng JRE Group of Insttutons, Greater Noda, Inda er.mrtunjayra@gmal.com

More information

MULTISPECTRAL IMAGES CLASSIFICATION BASED ON KLT AND ATR AUTOMATIC TARGET RECOGNITION

MULTISPECTRAL IMAGES CLASSIFICATION BASED ON KLT AND ATR AUTOMATIC TARGET RECOGNITION MULTISPECTRAL IMAGES CLASSIFICATION BASED ON KLT AND ATR AUTOMATIC TARGET RECOGNITION Paulo Quntlano 1 & Antono Santa-Rosa 1 Federal Polce Department, Brasla, Brazl. E-mals: quntlano.pqs@dpf.gov.br and

More information