High Payload Reversible Data Hiding Scheme Using Difference Segmentation and Histogram Shifting

Size: px
Start display at page:

Download "High Payload Reversible Data Hiding Scheme Using Difference Segmentation and Histogram Shifting"

Transcription

1 JOURNAL OF ELECTRONIC SCIENCE AND TECHNOLOGY, VOL. 11, NO. 1, MARCH Hgh Payload Reversble Data Hdng Scheme Usng Dfference Segmentaton and Hstogram Shftng Yung-Chen Chou and Huang-Chng L Abstract Steganography s a technque that conceals secret data nto a cover medum for delverng secret data over publc computer networks. Reversble data hdng schemes not only can acheve secret data delvery, but also can restore the cover medum. Hstogram shftng s one of the most popular reversble data hdng technques. Luo et al. presented a reversble data hdng technque that shfts the hstogram of predcton error. But the embeddng payload of Luo et al. s method can further be mproved. The proposed method uses a dfference segmentaton strategy and pseudo pxel generaton to ncrease the heght of peak n the predcton error hstogram. The expermental results show that the embeddng payload of the proposed method s hgher than that of Luo et al. s method. Index Terms Data hdng, hstogram sftng, secret data delvery, steganography. 1. Introducton Tradtonally, prvate data can be securely delvered to the recever by adoptng a cryptosystem. The cryptosystem generates keys to encrypt/decrypt prvate data. Usng an encryptng procedure makes encrypted prvate data look lke random nose. Encrypted data make t hard for an unntended user to know the nformaton wthout rght keys. Therefore, only the ntended recever wth the correct decrypton key can fully decrypt the cpher data nto plantext. However, usng a cryptosystem to assst secret data delvery has two drawbacks. Frst, the encrypton process may lead to a hgh computaton cost due to a large sze of secret nformaton. Second, the secret data delveres may fal f an unexpected user ntercepts the cpher data Manuscrpt receved June 4, 2012; revsed July 25, Ths work was supported by Asa Unversty under Grant No. 100-asa-33. Y.-C. Chou s wth the Department of Computer Scence and Informaton Engneerng, Asa Unversty, Tachung 41354, Tawan (Correspondng author e-mal: yungchen@asa.edu.tw H.-C. L s wth the Department of Computer Scence and Informaton Engneerng, Asa Unversty, Tachung 41354, Tawan (e-mal: st @gmal.com Dgtal Object Identfer: /j.ssn X transmsson. Because the unexpected user s nterested n the cphertext even t looks lke meanngless random nose. Steganography s another method of secret data delvery. The man concept of steganography s to use a cover medum to cover the cpher data and delver the stego medum to the recever va publc computer networks. The beneft of steganography s that an unexpected user wll see a meanngful stego medum wth mperceptble dstorton. Thus, the unexpected user wll be deceved. From ths pont of vew, the nconspcuous dfferences are one of the most mportant factors for desgnng a data hdng scheme. Several dfferent meda can play the cover medum n the steganography technque. Generally, a cover medum can be the text, audo, HTML fle, vdeo, mage, or program code. Here, we use an mage as the cover medum n the proposed data hdng scheme. Steganography technques can be brefly classfed nto spatal nconspcuous dfferences, frequency doman, and compresson doman. The spatal doman method tres to conceal secret data nto a dgtal mage by modfyng pxels values n a cover mage for mplyng secret messages [1]. Spatal doman data embeddng s easy to mplement and carres a low computaton cost. The frequency doman data hdng scheme focuses on modfyng coeffcents for mplyng secret data. Generate the mage s coeffcents by applyng transformaton functons (e.g., dscrete cosne transform, dscrete wavelet transform, etc. to transform pxel values nto coeffcents. The frequency doman s tme consumng and the embeddng payload s lmted. But one of the benefts of the frequency doman data hdng technque s that the stego mages have better vsual qualty than the spatal doman data hdng method. To save the storage cost and transmsson bandwdth, data compresson can sgnfcantly reduce the sze of dgtal mages. The compresson doman data hdng technque modfes the compresson procedure for mplyng the secret data n the compresson code [2],[3]. Reversblty s an mportant aspect of secret data delvery n recent years. In some nsttutons, such as mltary and dstance medcal treatment, applcatons requre restorng the orgnal cover mage. Thus, reversble data hdng means a cover mage carryng some secret message va a reversblty scheme. Then the recever not only can extract the secret message, but also can fully restore the cover mage back to the orgnal one [4] [7].

2 10 JOURNAL OF ELECTRONIC SCIENCE AND TECHNOLOGY, VOL. 11, NO. 1, MARCH 2013 Several strateges can acheve the goal of data hdng reversblty. These strateges can be classfed nto frequency transformaton, dfferences expanson, and hstogram shftng. Vleeschouwer et al. used hstogram shftng to conceal secret data nto a cover mage [7]. Vleeschouwer et al. s method classfes pxels n a cover mage nto two sets of crcularly nterpolatng hstograms, and then shfts the hstograms to conceal secret data. N et al. presented a reversble data hdng method that analyzes the pxel dstrbuton n a cover mage to generate the pxel hstogram [8]. And, peak and zero ponts were found by scannng the hstogram then shftng the hstogram for concealng secret data. Hwang et al. proposed a data hdng technque wth reversblty by extendng N et al. s method [9]. Hwang et al. s method utlzed extra nformaton to remember the restorng nformaton, thus the cover mage stll can be restored. Ln and Hsueh proposed a reversble data hdng technque by usng bn exchange to modfy hstograms [10]. Ln and Hsueh s successful method ncreased the pure embeddng payload and acheved lower dstorton of stego mages. Further, Km et al. presented a reversble data hdng scheme by selectng two peak ponts and two zero ponts to mprove the embeddng payload performance [5]. Then, Luo et al. utlzed the pxel predcton strategy to generate predcted pxels to ncrease the heght of peak n predcton error hstograms [11]. Because the predcton error s sgnfcantly narrowed down n a lmted range, the heght of peak pont has been ncreased and the embeddng payload has been mproved. However, the embeddng payload of Luo et al. s method can stll be mproved. The embeddng payload of hstogram shftng data hdng schemes s hghly related to the heght of peak pont and the number of peak ponts they use. On the other hand, for achevng reversblty, some extra nformaton (.e., peak ponts and zero ponts needs to be stored. The proposed method uses a dfference segmentaton strategy and predcton error to ncrease the heght of peak pont n order to obtan a hgher embeddng payload. Also, the proposed method does not need to remember any peak pont or zero pont nformaton. 2. Related Works Luo et al. presented a data hdng technque usng hstogram shftng, n whch the secret data s embedded nto a cover mage by applyng a hstogram modfcaton strategy [11]. Luo et al. s man dea s usng predefned sample pxels to predct pxels for generatng predcton error. The key steps of Luo et al. s method are descrbed as follows. For smplcty, a cover mage s denoted as I={p, j =1, 2,, H, j=1, 2,, W} and p, j {0, 1,, 255}, where H and W represent the heght and wdth of the cover mage I, respectvely. Frst, the margnal pxels n the cover mage are reserved for concealng the extra data used for secret data extracton and mage restoraton. The extra data s concealed nto the margnal pxels by usng least sgnfcant bts (LSB replacement. Because the margnal pxels wll be modfed, thus the orgnal LSB data of margnal pxels are collected for concealng nto sample pxels. Second, Luo et al. s method generates predcton three tmes, namely Level 1 predcton, Level 2 predcton, and Sample pxel predcton. Note that all of the predcton processes are just for the remanng pxels (.e., all pxels except margnal pxels. The frst predcton focuses on Level 1 pxels, whch are predcted by usng ts neghborng sample pxels. The sample pxels come from ts 45 and 135 drectons. For example, let the current Level 1 pxel be p, j and predcted value p, j s generated by adoptng (1 (5: p, j= w45μ45 + w135μ135 (1 μ45 = ( p 1, j+ 1 + p+ 1, j 1 2 μ135 = ( p 1, j 1 + p+ 1, j+ 1 2 (2 μ = ( μ45 + μ135 2 (3 w45 = σ45 ( σ45 + σ135 w135 = σ135 ( σ45 + σ135 (4 σ45 = ( p 1, j+ 1 μ + ( p+ 1, j 1 μ σ135 = ( p 1, j 1 μ + ( p+ 1, j+ 1 μ (5 where μ 45 and μ 135 represent the mean values of sample pxels n 45 and 135 drectons correspondng to p, j, respectvely. Then, after the Level 1 pxels predcton has been done, the Level 2 pxels can be predcted by referrng to ts neghborng sample pxels and Level 1 predcted pxels usng (6 (10: p, j= w90μ90 + w180μ 180 (6 μ90 = ( p 1, j + p+ 1, j 2 μ180 = ( p, j 1 + p, j+ 1 2 (7 μ = ( μ90 + μ180 2 (8 w90 = σ90 ( σ90 + σ180 w180 = σ180 ( σ90 + σ180 (9 σ90 = ( p 1, j μ + ( p+ 1, j μ σ180 = ( p, j 1 μ + ( p, j+ 1 μ (10 where μ 90 and μ 180 represent the mean values pxels of 90 and 180 drectons correspondng to p, j, respectvely. Then, the predcton error s the dfference between the orgnal pxel and the predcted pxel. When the predcton errors have been calculated, the next step s analyzng the dfferences to generate a hstogram. After that, secret data

3 CHOU et al.: Hgh Payload Reversble Data Hdng Scheme Usng Dfference Segmentaton and Hstogram Shftng 11 can be embedded by applyng the hstogram modfcaton strategy. Further, the predcted values of sample pxels are predcted by referrng to stego Level 1 and Level 2 pxels. Here, sample pxels are used to conceal the nformaton about reserved LSB bts of the margnal pxels. Agan, the predcton works by usng (6 (10. The embeddng procedure for sample pxels stll adopts hstogram modfcaton. Because the hstogram shftng strategy requres rememberng the peak and the zero ponts, the extra nformaton s embedded nto the reserved margnal pxels by usng LSB replacement. For data extracton on the recever sde, the rght recever can extract the secret data from the stego mage wth the secret data extractng procedure. Frst, the extra nformaton s extracted by drectly takng LSB from the margnal pxels. Then, the same predcton method s adopted to generate the predcton values for sample pxels. After the sample pxels predcton, the error hstogram has been generated, and then the orgnal margnal LSB data can be extracted by referrng to the extra nformaton. Accordng to the property of hstogram modfcaton, the sample pxels can be fully reconstructed. Then, the Level 1 and Level 2 pxels predcton procedures are adopted to generate the predcton pxels. Agan, the predcton error hstogram of Level 1 and Level 2 pxels wth the extra nformaton s used to extract secret data. The Level 1 and Level 2 pxels can be fully restored, too. 3. Proposed Method 3.1 Data Embeddng The property of a natural mage contans a local area wth smlar pxels dstrbuton, so the predcton error wll be narrowed down to a small range, whch wll help ncrease the heght of the hstogram. In other words, the heght of the peak pont wll be ncreased. The proposed method contans three man phases, namely: pxel adjustment, predcton error generaton, and data embeddng. Pxel adjustment s needed to prevent ambguous results on the data extractng sde. Then, pseudo pxels are generated by calculatng the mean values of segments n a block. Here, the segments wll be generated by segmentng the dfference between the mum value and mnmum value n a block. Then, the predcton error s generated by calculatng the dfference between the pxel value and pseudo pxel value. After the predcton errors have been generated, secret data s embedded nto the cover mage by applyng the hstogram shftng strategy. Because the local area has smlar pxels dstrbuton, the proposed method dvdes a cover mage nto non-overlappng blocks wth the sze of n n. For smple descrpton, let the cover mage I={p =1, 2,, H W}, where H and W are the heght and wdth of the mage and p {0, 1,, 255}. After dvson, the mage s also represented as I={B =1, 2,, NB}, where NB refers to the total number of mage blocks and B ={x j j =1, 2,, n n}. For achevng securty, the secret data wll be encrypted as cpher text by usng any crypto system. Thus, the unexpected user can not read real secret messages even f the user has extracted secret nformaton from the stego mage. The cpher text s denoted as M={b =1, 2,, NM}, where NM s the total bts of cpher text and b {0, 1}. Actually, the fnal embedded data S concatenate NE, M, and RB together, also denoted as S=NE M RB, where s the concatenate operaton. Here, NE and RB are the non-embeddable blocks nformaton and frst block s LSB data. To avod the underflow and overflow problems, some blocks wll be defned as non-embeddable blocks. Here, the underflow problem occurred when the pxel value s close to 0, and the pxel value mght become a negatve value due to secret data embeddng. The overflow problem occurrs when the pxel value s closest to the mum gray value (.e., the mum value of a 8-bts gray pxel s 255 and the pxel value mght become greater than the mum gray value due to secret data embeddng. If a block satsfes one of followng cases, then the block s a non-embeddable block that wll not be used for concealng secret data. Let the block s mum pxel value and mnmum pxel value be generated by B = { x B } and j mn B = mn{ x j B }, respectvely. The dfference between the mum value and mnmum value s generated by mn D = B B. N seg s the number of segments. Case 1: f D N seg, then do nothng. Case 2: f mn mn B 3Nseg 2, then add B nto mn extra nformaton and set B as 0. Case 3: B 255 3Nseg 2, then add (255 B nto extra nformaton and set B as 255. If a block satsfes Case 1, then the block s a smooth block wth smlar pxels dstrbuton and the block wll do nothng. Case 2 and Case 3 are the cases of underflow and overflow, thus the block wll not be used for concealng secret data. For an embeddable block, calculate the dfference D and segment D nto N seg segments. In order to prevent ambguous results n the data extractng phase, pxel adjustment s needed. Frst, a new mnmum B mn and new mum respectvely. B B are calculated by usng (11 and (12, B = B 3N 2 (11 mn mn mn B 3Nseg 2 1, f mod( Nseg, 2==1 = (12 mn B 3Nseg 2, otherwse. seg

4 12 JOURNAL OF ELECTRONIC SCIENCE AND TECHNOLOGY, VOL. 11, NO. 1, MARCH 2013 Fg. 1. Illustrate of hstogram shftng. The orgnal pxels can also be adjusted nto new pxel values. The start pxel value of the frst segment s mn B +3. The end pxel value of last segment s B 2. Otherwse, create a gap (.e., the gap s 4 between two segments. Then, the length of the segment s determned by mn ( B B N seg. The pseudo pxel y k of the kth mn segment s determned by yk = ( segk + segk 2, mn where seg k and seg k are the mum and mnmum values n the segment, respectvely. Next, generate the predcton error by calculatng the dfference between the pxel and correspondng pseudo pxel values. After all of the predcton errors have been generated, create the predcton error hstogram by countng the dfference values from the whole mage. To observe the result of dfference hstogram, we found that the three hghest peaks are 1, 0, and 1. Thus, 1, 0, and 1 are set as the default peaks. Then, the predcton error s less than or equal to 2 s decreased by two. The predcton error that s equal to 1 s shfted to 2. The predcton error greater than or equal to 2 s ncreased by one. Fg. 1 llustrates the hstogram adjustment concept. After that, f the predcton error s equal to 2, 0, or 1 and secret bt b =0, then do nothng. If b =1, and the predcton error s equal to 2, 0, or 1, then adjust the predcton error to 3, 1, and 2, respectvely. If the predcton error s not equal to 2, 0, or 1, then keep the predcton error wthout any change. And generate the stego pxel by usng a pxel s correspondng pseudo pxel plus the predcton error. Fnally, the nformaton regardng the number of non-embeddable blocks s remembered n the frst block by usng LSB (least sgnfcant bts replacement. 3.2 Data Extractng Data extractng s a reverse process of data embeddng. Frst, extract the non-embeddable block numbers from the frst block s LSB. Then, extract data from the remanng blocks. Every remanng block must belong to one of followng cases. mn Case I. If D = ( B B Nseg, then no secret data can be extracted. Case II. If B mn = 0, then no secret data can be extracted and restore bts from S. B mn by takng log2( 3Nseg 2 Case III. If B = 255, then no secret data can be extracted and restore log 3N 2 B by takng 2( seg bts from S. Case IV. The block does not belong to any of the above three cases. For a block belongs to Case IV (.e., an embeddable block, calculate D and segment D nto N seg segments. Then, calculate each segment s pseudo pxel and generate the predcton error by calculatng the dfference between the stego pxel and pseudo pxel. After that, secret data can be extracted by usng followng rules. Rule 1. If the predcton error s equal to 3, then output a secret bt 1 and restore the predcton error as 1. Rule 2. If the predcton error s equal to 2, then output a secret bt 0 and restore the predcton error as 1. Rule 3. If the predcton error s equal to 1, then output a secret bt 1 and restore the predcton error as 0. Rule 4. If the predcton error s equal to 0, then output a secret bt 0. Rule 5. If the predcton error s equal to 2, then output a secret bt 1 and restore the predcton error as 1. Rule 6. If the predcton error s equal to 1, then output a secret bt 0. Rule 7. If the predcton error s smaller than or equal to 4, then no secret data can be extracted, so restore the predcton error by addng 2 to the predcton error. Rule 8. If the predcton error s greater than or equal to 3, then no secret data can be extracted, so restore the predcton error by subtractng 1 from the predcton error. Further, the frst block s LSB s restored by referrng to 2 bts of the extracted secret data. Fnally, the rght recever wth a decrypton key wll gan the real secret data by decryptng the extract message. Also, the stego mage can be fully restored. the least log ( n n 4. Expermental Results To evaluate the performance of the proposed method, the proposed method and Luo et al. s method are mplemented usng Octave v3.24 software works on a Lnux platform. In order to test the effect of the proposed method for dfferent mages, nne commonly tested mages are used n our smulatons. Fg. 2 shows the test gray-scale mages szed pxels. The vsual qualty of stego mage and embeddng payload are the two most mportant factors for evaluatng the performance of a data hdng technque. As we know, evaluatng the vsual qualty through humans eyes s effectve, but t s very subjectve. To avod observaton bas, we use the peak sgnal-to-nose rato (PSNR for evaluaton, whch s an objectve vsual qualty measurement. Normally, a hgh PSNR ndcates that the

5 CHOU et al.: Hgh Payload Reversble Data Hdng Scheme Usng Dfference Segmentaton and Hstogram Shftng 13 stego mage s the most smlar to ts orgnal mage. Contrarly, a small PSNR value ndcates that the stego mage contans large dstortons that are dssmlar to ts orgnal cover mage. Generally, t s hard for a user to dentfy the dstorton from the stego mage by eyes when the PSNR value s greater than 30 db. Further, the embeddng payload s used to evaluate the total number of secret bts embedded n a cover mage. A data hdng scheme wth a small embeddng payload needs to send more dfferent stego mages than a hgh embeddng payload scheme for the same secret data sze. Sendng too many dfferent stego mages wll attract unexpected users to pay more attenton on transmsson. Here, the embeddng payload s used to count the total bts embedded nto a cover mage, defned as ep= S. Because the proposed method needs to remember the nformaton of non-embeddable blocks, the pure embeddng payload s calculated by ep p =ep NE, where the operaton s calculatng the total bts and NE represents the extra nformaton of non-embeddng blocks. Fg. 3 shows the PSNR comparson for testng dfferent segment numbers. From the expermental result, Luo et al. s method has better PSNR outcomes, whch s reasonable because t conceals more secret data than the proposed method. Also, all of PSNR values of stego mages are hgher than 30 db. Further, usng lesser segments wll get better PSNR outcomes. Fg. 4 shows the embeddng payload comparson results for testng dfferent segment numbers. From expermental results, complex content mages (e.g., Baboon acheve a hgher embeddng payload when the segment number s ncreased. Contrary, smooth content mages wll get a lower embeddng payload when the segment number s ncreased. Ths stuaton s reasonable, because a smooth content mage contans more smooth blocks, thus the number of non-embeddable blocks wll be ncreased when ncreasng the segment number. For the expermental results, we can conclude that 4 or 5 are the sutable segment number. (a (b (c (d (e (f (g (h ( Fg. 2. Test mages: (a Baboon, (b Barbara, (c Boat, (d Goldhll, (e Jet(F16, (f Lena, (g Salboat, (h Tffany, and ( Zelda. PSNR Luo et al. N seg =2 N seg =3 N seg =4 N seg =5 N seg =6 25 Baboon Barbara Boat Goldhll Jet(F16 Lena Salboat Tffany Zelda Images Fg. 3. PSNR comparson for dfferent segment numbers (block sze 4 4 pxels Pure embedded bts Luo et al. N seg =2 N seg =3 N seg =4 N seg =5 N seg =6 0 Baboon Barbara Boat Goldhll Jet(F16 Lena Salboat Tffany Zelda Images Fg. 4. Embeddng capacty comparson for dfferent segment numbers (block sze 4 4 pxels N seg =2 N seg =3 5 N seg =4 N seg =5 N seg =6 4 Number of non-embeddable blocks Baboon Barbara Boat Goldhll Jet(F16 Lena Salboat Tffany Zelda Images Fg. 5. Non-embeddable blocks comparson for dfferent segment numbers (block sze 4 4 pxels. Fg. 5 shows analyss results of non-embeddable blocks n dfferent segment number settngs. Generally, ncreasng the number of segments wll acheve a hgher embeddng payload. From the expermental results we found that the complex content mage (e.g., Baboon has a lower mpact n changng the number of segment settng. On the contrary, a smooth content mage (e.g., Jet(F16 s sgnfcantly mpacted by changng the number of segment settngs.

6 14 JOURNAL OF ELECTRONIC SCIENCE AND TECHNOLOGY, VOL. 11, NO. 1, MARCH Conclusons Data hdng technques make t easer to deceve the unexpected user for achevng the goal of secret data delvery. The proposed reversble data embeddng technque utlzes dfference segmentaton to dvde the dfference between the mum pxel and mnmum pxel nto several segments. Thus, the hstogram of predcton error wll be sgnfcantly ncreased, whch helps ncrease the embeddng payload performance. Also, the proposed method does not need to remember the nformaton about the peak and zero ponts because the peak ponts are fxed as 1, 0, and 1. The expermental results show that the proposed method has hgher embeddng payload performance than Luo et al. s method. References [1] Y.-C. Chou, C.-C. Chang, and K.-M. L, A large payload data embeddng technque for color mages, Fundamenta Informatcae, vol. 88, no. 1 2, pp , [2] C.-C. Chang, T.-D. Keu, and Y.-C. Chou, Reversble nformaton hdng for VQ ndces based on locally adaptve codng, Journal of Vsual Communcaton and Image Representaton, vol. 20, no. 1, pp , Jan [3] Y.-C. Chou and H.-H. Chang, A hgh payload data hdng scheme for color mage based on BTC compresson technque, n Proc. of the 4th Int. Conf. on Genetc and Evolutonary Computng, Shenzhen, 2010, pp [4] J. M. Barton, Method and apparatus for embeddng authentcaton nformaton wthn dgtal data, U.S. Patent , [5] K. S. Km, M. J. Lee, H. Y. Lee, and H. K. Lee, Reversble data hdng explotng spatal correlaton between sub-sampled mages, Pattern Recognton, vol. 42, no. 11, pp , [6] C.-Y. Ln and C.-C. Chang, Hdng data n VQ-Compressed mages usng dssmlar pars, Journal of Computers, vol. 17, no. 2, pp. 3 10, [7] C. D. Vleeschouwer, J. F. Delagle, and B. Macq, Crcular nterpretaton of bjectve transformaton n lossless watermarkng for meda as management, IEEE Trans. on Multmeda, vol. 5, no. 1, pp , [8] Z. N, Y. Q. Sh, N. Ansar, and S. We, Reversble data hdng, IEEE Trans. on Crcuts System Vdeo Technology, vol. 16, no. 3, pp , [9] J. Hwang, J.-W. Km, and J.-U. Cho, A reversble watermarkng based on hstogram shftng, n Proc. of Int. Workshop on Dgtal Watermarkng, Sprnger-Verlag, Jeju Island, 2006, pp [10] C.-C. Ln and N.-L. Hsueh, A lossless data hdng scheme based on three-pxel block dfferences, Pattern Recognton, vol. 41, no. 4, pp , [11] L. Luo, Z. Chen, M. Chen, X. Zeng, and Z. Xong, Reversble mage watermarkng usng nterpolaton technque, IEEE Trans. on Informaton Forenscs and Securty, vol. 5, no. 1, pp , Yung-Chen Chou receved the B.S. degree n management nformaton systems from Natonal Pngtung Unversty of Scence & Technology, Pngtung, Tawan n 1998, and the M.S. degree n nformaton management from Chaoyang Unversty of Technology, Tachung, Tawan n He receved the Ph.D. degree n computer scence and nformaton engneerng from the Natonal Chung Cheng Unversty, Chay, Tawan n Snce February 2009, he has been an assstant professor wth Asa Unversty, Tachung, Tawan. Hs current research nterests nclude steganography, watermarkng, and mage processng. Huang-Chng L was born n Tawan. He currently s pursung the B.S. degree wth the Department of Computer Scence and Informaton Engneerng, Asa Unversty, Tachung, Tawan. Hs research nterests nclude mage processng and steganography.

Article Reversible Dual-Image-Based Hiding Scheme Using Block Folding Technique

Article Reversible Dual-Image-Based Hiding Scheme Using Block Folding Technique Artcle Reversble Dual-Image-Based Hdng Scheme Usng Block Foldng Technque Tzu-Chuen Lu, * and Hu-Shh Leng Department of Informaton Management, Chaoyang Unversty of Technology, Tachung 4349, Tawan Department

More information

Reversible Dual-Image-Based Hiding Scheme Using Block Folding Technique

Reversible Dual-Image-Based Hiding Scheme Using Block Folding Technique S S symmetry Artcle Reversble Dual-Image-Based Hdng Scheme Usng Block Foldng Technque Tzu-Chuen Lu Tzu-Chuen Lu 1, 1, * and Hu-Shh Leng * ID and Hu-Shh Leng 1 Department Informaton Management, Chaoyang

More information

A Binarization Algorithm specialized on Document Images and Photos

A Binarization Algorithm specialized on Document Images and Photos A Bnarzaton Algorthm specalzed on Document mages and Photos Ergna Kavalleratou Dept. of nformaton and Communcaton Systems Engneerng Unversty of the Aegean kavalleratou@aegean.gr Abstract n ths paper, a

More information

A Fast Visual Tracking Algorithm Based on Circle Pixels Matching

A Fast Visual Tracking Algorithm Based on Circle Pixels Matching A Fast Vsual Trackng Algorthm Based on Crcle Pxels Matchng Zhqang Hou hou_zhq@sohu.com Chongzhao Han czhan@mal.xjtu.edu.cn Ln Zheng Abstract: A fast vsual trackng algorthm based on crcle pxels matchng

More information

Hybrid Non-Blind Color Image Watermarking

Hybrid Non-Blind Color Image Watermarking Hybrd Non-Blnd Color Image Watermarkng Ms C.N.Sujatha 1, Dr. P. Satyanarayana 2 1 Assocate Professor, Dept. of ECE, SNIST, Yamnampet, Ghatkesar Hyderabad-501301, Telangana 2 Professor, Dept. of ECE, AITS,

More information

Related-Mode Attacks on CTR Encryption Mode

Related-Mode Attacks on CTR Encryption Mode Internatonal Journal of Network Securty, Vol.4, No.3, PP.282 287, May 2007 282 Related-Mode Attacks on CTR Encrypton Mode Dayn Wang, Dongda Ln, and Wenlng Wu (Correspondng author: Dayn Wang) Key Laboratory

More information

Enhanced AMBTC for Image Compression using Block Classification and Interpolation

Enhanced AMBTC for Image Compression using Block Classification and Interpolation Internatonal Journal of Computer Applcatons (0975 8887) Volume 5 No.0, August 0 Enhanced AMBTC for Image Compresson usng Block Classfcaton and Interpolaton S. Vmala Dept. of Comp. Scence Mother Teresa

More information

Improvement of Spatial Resolution Using BlockMatching Based Motion Estimation and Frame. Integration

Improvement of Spatial Resolution Using BlockMatching Based Motion Estimation and Frame. Integration Improvement of Spatal Resoluton Usng BlockMatchng Based Moton Estmaton and Frame Integraton Danya Suga and Takayuk Hamamoto Graduate School of Engneerng, Tokyo Unversty of Scence, 6-3-1, Nuku, Katsuska-ku,

More information

Parallelism for Nested Loops with Non-uniform and Flow Dependences

Parallelism for Nested Loops with Non-uniform and Flow Dependences Parallelsm for Nested Loops wth Non-unform and Flow Dependences Sam-Jn Jeong Dept. of Informaton & Communcaton Engneerng, Cheonan Unversty, 5, Anseo-dong, Cheonan, Chungnam, 330-80, Korea. seong@cheonan.ac.kr

More information

A Secured Method for Image Steganography Based On Pixel Values

A Secured Method for Image Steganography Based On Pixel Values A Secured Method for Image Steganography Based On Pxel Values Tarun Gulat #, Sanskrt Gupta * # Assocate Professor, Electroncs and Communcaton Engneerng Department, MMEC, M.M.U., Mullana, Ambala, Haryana,

More information

A Fast Content-Based Multimedia Retrieval Technique Using Compressed Data

A Fast Content-Based Multimedia Retrieval Technique Using Compressed Data A Fast Content-Based Multmeda Retreval Technque Usng Compressed Data Borko Furht and Pornvt Saksobhavvat NSF Multmeda Laboratory Florda Atlantc Unversty, Boca Raton, Florda 3343 ABSTRACT In ths paper,

More information

An Image Compression Algorithm based on Wavelet Transform and LZW

An Image Compression Algorithm based on Wavelet Transform and LZW An Image Compresson Algorthm based on Wavelet Transform and LZW Png Luo a, Janyong Yu b School of Chongqng Unversty of Posts and Telecommuncatons, Chongqng, 400065, Chna Abstract a cylpng@63.com, b y27769864@sna.cn

More information

Research Article Improved Encrypted-Signals-Based Reversible Data Hiding Using Code Division Multiplexing and Value Expansion

Research Article Improved Encrypted-Signals-Based Reversible Data Hiding Using Code Division Multiplexing and Value Expansion Securty and Communcaton Networks Volume 2018, Artcle ID 1326235, 9 pages https://do.org/10.1155/2018/1326235 Research Artcle Improved Encrypted-Sgnals-Based Reversble Data Hdng Usng Code Dvson Multplexng

More information

A Lossless Watermarking Scheme for Halftone Image Authentication

A Lossless Watermarking Scheme for Halftone Image Authentication IJCSNS Internatonal Journal of Computer Scence and Network Securty, VOL.6 No.2B, February 2006 147 A Lossless Watermarkng Scheme for Halftone Image Authentcaton Jeng-Shyang Pan, Hao Luo, and Zhe-Mng Lu,

More information

Enhanced Watermarking Technique for Color Images using Visual Cryptography

Enhanced Watermarking Technique for Color Images using Visual Cryptography Informaton Assurance and Securty Letters 1 (2010) 024-028 Enhanced Watermarkng Technque for Color Images usng Vsual Cryptography Enas F. Al rawashdeh 1, Rawan I.Zaghloul 2 1 Balqa Appled Unversty, MIS

More information

Key-Selective Patchwork Method for Audio Watermarking

Key-Selective Patchwork Method for Audio Watermarking Internatonal Journal of Dgtal Content Technology and ts Applcatons Volume 4, Number 4, July 2010 Key-Selectve Patchwork Method for Audo Watermarkng 1 Ch-Man Pun, 2 Jng-Jng Jang 1, Frst and Correspondng

More information

Research Article High Capacity Reversible Watermarking for Audio by Histogram Shifting and Predicted Error Expansion

Research Article High Capacity Reversible Watermarking for Audio by Histogram Shifting and Predicted Error Expansion e Scentfc World Journal, Artcle ID 656251, 7 pages http://dx.do.org/1.1155/214/656251 Research Artcle Hgh Capacty Reversble Watermarkng for Audo by Hstogram Shftng and Predcted Error Expanson Fe Wang,

More information

An efficient method to build panoramic image mosaics

An efficient method to build panoramic image mosaics An effcent method to buld panoramc mage mosacs Pattern Recognton Letters vol. 4 003 Dae-Hyun Km Yong-In Yoon Jong-Soo Cho School of Electrcal Engneerng and Computer Scence Kyungpook Natonal Unv. Abstract

More information

Semi-Fragile Watermarking Scheme for Authentication of JPEG Images

Semi-Fragile Watermarking Scheme for Authentication of JPEG Images Tamkang Journal of Scence and Engneerng, Vol. 10, No 1, pp. 5766 (2007) 57 Sem-Fragle Watermarkng Scheme for Authentcaton of JPEG Images Chh-Hung n 1 *, Tung-Shh Su 2 and Wen-Shyong Hseh 2,3 1 Department

More information

Using Fuzzy Logic to Enhance the Large Size Remote Sensing Images

Using Fuzzy Logic to Enhance the Large Size Remote Sensing Images Internatonal Journal of Informaton and Electroncs Engneerng Vol. 5 No. 6 November 015 Usng Fuzzy Logc to Enhance the Large Sze Remote Sensng Images Trung Nguyen Tu Huy Ngo Hoang and Thoa Vu Van Abstract

More information

Content Based Image Retrieval Using 2-D Discrete Wavelet with Texture Feature with Different Classifiers

Content Based Image Retrieval Using 2-D Discrete Wavelet with Texture Feature with Different Classifiers IOSR Journal of Electroncs and Communcaton Engneerng (IOSR-JECE) e-issn: 78-834,p- ISSN: 78-8735.Volume 9, Issue, Ver. IV (Mar - Apr. 04), PP 0-07 Content Based Image Retreval Usng -D Dscrete Wavelet wth

More information

Learning the Kernel Parameters in Kernel Minimum Distance Classifier

Learning the Kernel Parameters in Kernel Minimum Distance Classifier Learnng the Kernel Parameters n Kernel Mnmum Dstance Classfer Daoqang Zhang 1,, Songcan Chen and Zh-Hua Zhou 1* 1 Natonal Laboratory for Novel Software Technology Nanjng Unversty, Nanjng 193, Chna Department

More information

A Hybrid Semi-Blind Gray Scale Image Watermarking Algorithm Based on DWT-SVD using Human Visual System Model

A Hybrid Semi-Blind Gray Scale Image Watermarking Algorithm Based on DWT-SVD using Human Visual System Model A Hybrd Sem-Blnd Gray Scale Image Watermarkng Algorthm Based on DWT-SVD usng Human Vsual System Model Rajesh Mehta r Scence & Engneerng, USICT Guru Gobnd Sngh Indrarprastha Unversty New Delh, Inda rajesh00ust@gmal.com

More information

Robust Blind Video Watermark Algorithm in Transform Domain Combining with 3D Video Correlation

Robust Blind Video Watermark Algorithm in Transform Domain Combining with 3D Video Correlation JOURNAL OF MULTIMEDIA, VOL. 8, NO. 2, APRIL 2013 161 Robust Blnd Vdeo Watermark Algorthm n Transform Doman Combnng wth 3D Vdeo Correlaton DING Ha-yang 1,3 1. Informaton Securty Center, Bejng Unversty of

More information

FEATURE EXTRACTION. Dr. K.Vijayarekha. Associate Dean School of Electrical and Electronics Engineering SASTRA University, Thanjavur

FEATURE EXTRACTION. Dr. K.Vijayarekha. Associate Dean School of Electrical and Electronics Engineering SASTRA University, Thanjavur FEATURE EXTRACTION Dr. K.Vjayarekha Assocate Dean School of Electrcal and Electroncs Engneerng SASTRA Unversty, Thanjavur613 41 Jont Intatve of IITs and IISc Funded by MHRD Page 1 of 8 Table of Contents

More information

Shape-adaptive DCT and Its Application in Region-based Image Coding

Shape-adaptive DCT and Its Application in Region-based Image Coding Internatonal Journal of Sgnal Processng, Image Processng and Pattern Recognton, pp.99-108 http://dx.do.org/10.14257/sp.2014.7.1.10 Shape-adaptve DCT and Its Applcaton n Regon-based Image Codng Yamn Zheng,

More information

Simulation: Solving Dynamic Models ABE 5646 Week 11 Chapter 2, Spring 2010

Simulation: Solving Dynamic Models ABE 5646 Week 11 Chapter 2, Spring 2010 Smulaton: Solvng Dynamc Models ABE 5646 Week Chapter 2, Sprng 200 Week Descrpton Readng Materal Mar 5- Mar 9 Evaluatng [Crop] Models Comparng a model wth data - Graphcal, errors - Measures of agreement

More information

Video Proxy System for a Large-scale VOD System (DINA)

Video Proxy System for a Large-scale VOD System (DINA) Vdeo Proxy System for a Large-scale VOD System (DINA) KWUN-CHUNG CHAN #, KWOK-WAI CHEUNG *# #Department of Informaton Engneerng *Centre of Innovaton and Technology The Chnese Unversty of Hong Kong SHATIN,

More information

Robust Watermarking for Text Images Based on Arnold Scrambling and DWT-DCT

Robust Watermarking for Text Images Based on Arnold Scrambling and DWT-DCT Internatonal Conference on Mechatroncs Electronc Industral and Control Engneerng (MEIC 015) Robust Watermarkng for Text Images Based on Arnold Scramblng and DWT-DCT Fan Wu College of Informaton Scence

More information

Specifications in 2001

Specifications in 2001 Specfcatons n 200 MISTY (updated : May 3, 2002) September 27, 200 Mtsubsh Electrc Corporaton Block Cpher Algorthm MISTY Ths document shows a complete descrpton of encrypton algorthm MISTY, whch are secret-key

More information

TN348: Openlab Module - Colocalization

TN348: Openlab Module - Colocalization TN348: Openlab Module - Colocalzaton Topc The Colocalzaton module provdes the faclty to vsualze and quantfy colocalzaton between pars of mages. The Colocalzaton wndow contans a prevew of the two mages

More information

Steps for Computing the Dissimilarity, Entropy, Herfindahl-Hirschman and. Accessibility (Gravity with Competition) Indices

Steps for Computing the Dissimilarity, Entropy, Herfindahl-Hirschman and. Accessibility (Gravity with Competition) Indices Steps for Computng the Dssmlarty, Entropy, Herfndahl-Hrschman and Accessblty (Gravty wth Competton) Indces I. Dssmlarty Index Measurement: The followng formula can be used to measure the evenness between

More information

Data Hiding and Image Authentication for Color-Palette Images

Data Hiding and Image Authentication for Color-Palette Images Data Hdng and Image Authentcaton for Color-Palette Images Chh-Yang Yn ( 殷志揚 ) and Wen-Hsang Tsa ( 蔡文祥 ) Department of Computer & Informaton Scence Natonal Chao Tung Unversty 00 Ta Hsueh Rd., Hsnchu, Tawan

More information

A NEW AUDIO WATERMARKING METHOD BASED

A NEW AUDIO WATERMARKING METHOD BASED A NEW AUDIO WATERMARKING METHOD BASED ON DISCRETE COSINE TRANSFORM WITH A GRAY IMAGE Mohammad Ibrahm Khan 1, Md. Iqbal Hasan Sarker 2, Kaushk Deb 3 and Md. Hasan Furhad 4 1,2,3 Department of Computer Scence

More information

Simulation Based Analysis of FAST TCP using OMNET++

Simulation Based Analysis of FAST TCP using OMNET++ Smulaton Based Analyss of FAST TCP usng OMNET++ Umar ul Hassan 04030038@lums.edu.pk Md Term Report CS678 Topcs n Internet Research Sprng, 2006 Introducton Internet traffc s doublng roughly every 3 months

More information

A Robust Webpage Information Hiding Method Based on the Slash of Tag

A Robust Webpage Information Hiding Method Based on the Slash of Tag Advanced Engneerng Forum Onlne: 2012-09-26 ISSN: 2234-991X, Vols. 6-7, pp 361-366 do:10.4028/www.scentfc.net/aef.6-7.361 2012 Trans Tech Publcatons, Swtzerland A Robust Webpage Informaton Hdng Method Based

More information

An Image Fusion Approach Based on Segmentation Region

An Image Fusion Approach Based on Segmentation Region Rong Wang, L-Qun Gao, Shu Yang, Yu-Hua Cha, and Yan-Chun Lu An Image Fuson Approach Based On Segmentaton Regon An Image Fuson Approach Based on Segmentaton Regon Rong Wang, L-Qun Gao, Shu Yang 3, Yu-Hua

More information

Research and Application of Fingerprint Recognition Based on MATLAB

Research and Application of Fingerprint Recognition Based on MATLAB Send Orders for Reprnts to reprnts@benthamscence.ae The Open Automaton and Control Systems Journal, 205, 7, 07-07 Open Access Research and Applcaton of Fngerprnt Recognton Based on MATLAB Nng Lu* Department

More information

Subspace clustering. Clustering. Fundamental to all clustering techniques is the choice of distance measure between data points;

Subspace clustering. Clustering. Fundamental to all clustering techniques is the choice of distance measure between data points; Subspace clusterng Clusterng Fundamental to all clusterng technques s the choce of dstance measure between data ponts; D q ( ) ( ) 2 x x = x x, j k = 1 k jk Squared Eucldean dstance Assumpton: All features

More information

Steganography System using Slantlet Transform

Steganography System using Slantlet Transform ISSN:43-6999 Journal of Inmaton Communcaton and Intellgence Systems (JICIS) Volume Issue February 06 Steganography System usng Slantlet Transm Ryadh Bassl Abduljabbar Abstract An approach hdng nmaton has

More information

An Optimal Algorithm for Prufer Codes *

An Optimal Algorithm for Prufer Codes * J. Software Engneerng & Applcatons, 2009, 2: 111-115 do:10.4236/jsea.2009.22016 Publshed Onlne July 2009 (www.scrp.org/journal/jsea) An Optmal Algorthm for Prufer Codes * Xaodong Wang 1, 2, Le Wang 3,

More information

Deep learning is a good steganalysis tool when embedding key is reused for different images, even if there is a cover source-mismatch

Deep learning is a good steganalysis tool when embedding key is reused for different images, even if there is a cover source-mismatch Deep learnng s a good steganalyss tool when embeddng key s reused for dfferent mages, even f there s a cover source-msmatch Lonel PIBRE 2,3, Jérôme PASQUET 2,3, Dno IENCO 2,3, Marc CHAUMONT 1,2,3 (1) Unversty

More information

Performance Analysis of Data Hiding in MPEG-4 AAC Audio *

Performance Analysis of Data Hiding in MPEG-4 AAC Audio * TSINGHUA SCIENCE AND TECHNOLOGY ISSNll1007-0214ll07/21llpp55-61 Volume 14, Number 1, February 2009 Performance Analyss of Data Hdng n MPEG-4 AAC Audo * XU Shuzheng ( ) **, ZHANG Peng ( ), WANG Pengjun

More information

Dynamic Code Block Size for JPEG 2000

Dynamic Code Block Size for JPEG 2000 Dynamc Code Block Sze for JPEG 2000 Png-Sng Tsa a, Yann LeCornec b a Dept. of Computer Scence, Unv. of Texas Pan Amercan, 1201 W. Unv. Dr., Ednburg, TX USA 78539-2999; b Sgma Desgns, Inc., 1778 McCarthy

More information

Load Balancing for Hex-Cell Interconnection Network

Load Balancing for Hex-Cell Interconnection Network Int. J. Communcatons, Network and System Scences,,, - Publshed Onlne Aprl n ScRes. http://www.scrp.org/journal/jcns http://dx.do.org/./jcns.. Load Balancng for Hex-Cell Interconnecton Network Saher Manaseer,

More information

An Improved Image Segmentation Algorithm Based on the Otsu Method

An Improved Image Segmentation Algorithm Based on the Otsu Method 3th ACIS Internatonal Conference on Software Engneerng, Artfcal Intellgence, Networkng arallel/dstrbuted Computng An Improved Image Segmentaton Algorthm Based on the Otsu Method Mengxng Huang, enjao Yu,

More information

Distortion Function Designing for JPEG Steganography with Uncompressed Side-image

Distortion Function Designing for JPEG Steganography with Uncompressed Side-image Dstorton Functon Desgnng for JPEG Steganography wth Uncompressed Sde-mage Fangjun Huang School of Informaton Scence and Technology, Sun Yat-Sen Unversty, GD 56, Chna huangfj@mal.sysu.edu.cn Jwu Huang School

More information

Identify the Attack in Embedded Image with Steganalysis Detection Method by PSNR and RGB Intensity

Identify the Attack in Embedded Image with Steganalysis Detection Method by PSNR and RGB Intensity Internatonal Journal of Computer Systems (ISSN: 394-1065), Volume 03 Issue 07, July, 016 Avalable at http://www.jcsonlne.com/ Identfy the Attack n Embedded Image wth Steganalyss Detecton Method by PSNR

More information

Pattern Recognition 43 (2010) Contents lists available at ScienceDirect. Pattern Recognition. journal homepage:

Pattern Recognition 43 (2010) Contents lists available at ScienceDirect. Pattern Recognition. journal homepage: Pattern Recognton 43 (2010) 397 -- 404 Contents lsts avalable at ScenceDrect Pattern Recognton ournal homepage: www.elsever.com/locate/pr Secret mage sharng based on cellular automata and steganography

More information

Classifier Selection Based on Data Complexity Measures *

Classifier Selection Based on Data Complexity Measures * Classfer Selecton Based on Data Complexty Measures * Edth Hernández-Reyes, J.A. Carrasco-Ochoa, and J.Fco. Martínez-Trndad Natonal Insttute for Astrophyscs, Optcs and Electroncs, Lus Enrque Erro No.1 Sta.

More information

Shape Representation Robust to the Sketching Order Using Distance Map and Direction Histogram

Shape Representation Robust to the Sketching Order Using Distance Map and Direction Histogram Shape Representaton Robust to the Sketchng Order Usng Dstance Map and Drecton Hstogram Department of Computer Scence Yonse Unversty Kwon Yun CONTENTS Revew Topc Proposed Method System Overvew Sketch Normalzaton

More information

Module Management Tool in Software Development Organizations

Module Management Tool in Software Development Organizations Journal of Computer Scence (5): 8-, 7 ISSN 59-66 7 Scence Publcatons Management Tool n Software Development Organzatons Ahmad A. Al-Rababah and Mohammad A. Al-Rababah Faculty of IT, Al-Ahlyyah Amman Unversty,

More information

Local Quaternary Patterns and Feature Local Quaternary Patterns

Local Quaternary Patterns and Feature Local Quaternary Patterns Local Quaternary Patterns and Feature Local Quaternary Patterns Jayu Gu and Chengjun Lu The Department of Computer Scence, New Jersey Insttute of Technology, Newark, NJ 0102, USA Abstract - Ths paper presents

More information

Robust and Reversible Relational Database Watermarking Algorithm Based on Clustering and Polar Angle Expansion

Robust and Reversible Relational Database Watermarking Algorithm Based on Clustering and Polar Angle Expansion Robust and Reversble Relatonal Database Watermarkng Algorthm Based on Clusterng and Polar Angle Expanson Zhyong L, Junmn Lu and Wecheng Tao College of Informaton Scence and Engneerng, Hunan Unversty, Changsha,

More information

A Comparison between Digital Images Watermarking in Tow Different Color Spaces Using DWT2*

A Comparison between Digital Images Watermarking in Tow Different Color Spaces Using DWT2* A Comparson between Dgtal s ng n Tow Dfferent Color Spaces Usng DWT* Mehd Khall Natonal Academy of Scence of Armena Yerevan, Armena e-mal: khall.mehd@yahoo.com ABSTRACT A novel dgtal watermarkng for ownershp

More information

Robust Video Watermarking Using Image Normalization, Motion Vector and Perceptual Information

Robust Video Watermarking Using Image Normalization, Motion Vector and Perceptual Information Robust Vdeo Watermarkng Usng Image ormalzaton, Moton Vector and Perceptual Informaton Cedllo-Hernández Antono 1, Cedllo-Hernández Manuel 1, akano-myatake Marko 1, García-Vázquez Mreya S. 2 1 Postgraduate

More information

Cluster Analysis of Electrical Behavior

Cluster Analysis of Electrical Behavior Journal of Computer and Communcatons, 205, 3, 88-93 Publshed Onlne May 205 n ScRes. http://www.scrp.org/ournal/cc http://dx.do.org/0.4236/cc.205.350 Cluster Analyss of Electrcal Behavor Ln Lu Ln Lu, School

More information

A Novel Adaptive Descriptor Algorithm for Ternary Pattern Textures

A Novel Adaptive Descriptor Algorithm for Ternary Pattern Textures A Novel Adaptve Descrptor Algorthm for Ternary Pattern Textures Fahuan Hu 1,2, Guopng Lu 1 *, Zengwen Dong 1 1.School of Mechancal & Electrcal Engneerng, Nanchang Unversty, Nanchang, 330031, Chna; 2. School

More information

IAJIT First Online Publication

IAJIT First Online Publication Content Protecton n Vdeo Data Based on Robust Dgtal Watermarkng Resstant to Intentonal and Unntentonal Attacks Mad Masoum and Shervn Amr Department of Electrcal Engneerng, Islamc Azad Unversty Qazvn Branch,

More information

Computer Generated Integral Imaging (II) System Using Depth-Camera

Computer Generated Integral Imaging (II) System Using Depth-Camera Computer Generated Integral Imagng (II) System Usng Depth-Camera Md. Sharful Islam 1, Md. Tarquzzaman 2 1,2 Department of Informaton and Communcaton Engneerng, Islamc Unversty, Kushta-7003, Bangladesh

More information

Research of Multiple Text Watermarks Technique in Electric Power System Texts

Research of Multiple Text Watermarks Technique in Electric Power System Texts Sensors & Transducers 203 by IFSA http://www.sensorsportal.com Research of Multple Text atermarks Technque n Electrc Power System Texts Xao-X XING, Qng CHEN, 2 Lan-X FU School of Optcal-Electrcal and Computer

More information

Fuzzy C-Means Initialized by Fixed Threshold Clustering for Improving Image Retrieval

Fuzzy C-Means Initialized by Fixed Threshold Clustering for Improving Image Retrieval Fuzzy -Means Intalzed by Fxed Threshold lusterng for Improvng Image Retreval NAWARA HANSIRI, SIRIPORN SUPRATID,HOM KIMPAN 3 Faculty of Informaton Technology Rangst Unversty Muang-Ake, Paholyotn Road, Patumtan,

More information

A DCVS Reconstruction Algorithm for Mine Video Monitoring Image Based on Block Classification

A DCVS Reconstruction Algorithm for Mine Video Monitoring Image Based on Block Classification 1 3 4 5 6 7 8 9 10 11 1 13 14 15 16 17 18 19 0 1 Artcle A DCVS Reconstructon Algorthm for Mne Vdeo Montorng Image Based on Block Classfcaton Xaohu Zhao 1,, Xueru Shen 1,, *, Kuan Wang 1, and Wanme L 1,

More information

KEYWORDS: Digital Image Watermarking, Discrete Wavelet Transform, General Regression Neural Network, Human Visual System. 1.

KEYWORDS: Digital Image Watermarking, Discrete Wavelet Transform, General Regression Neural Network, Human Visual System. 1. An Adaptve Dgtal Image Watermarkng Based on Image Features n Dscrete Wavelet Transform Doman and General Regresson Neural Network Ayoub Taher Group of IT Engneerng, Payam Noor Unversty, Broujen, Iran ABSTRACT:

More information

Maximum Variance Combined with Adaptive Genetic Algorithm for Infrared Image Segmentation

Maximum Variance Combined with Adaptive Genetic Algorithm for Infrared Image Segmentation Internatonal Conference on Logstcs Engneerng, Management and Computer Scence (LEMCS 5) Maxmum Varance Combned wth Adaptve Genetc Algorthm for Infrared Image Segmentaton Huxuan Fu College of Automaton Harbn

More information

Efficient Video Coding with R-D Constrained Quadtree Segmentation

Efficient Video Coding with R-D Constrained Quadtree Segmentation Publshed on Pcture Codng Symposum 1999, March 1999 Effcent Vdeo Codng wth R-D Constraned Quadtree Segmentaton Cha-Wen Ln Computer and Communcaton Research Labs Industral Technology Research Insttute Hsnchu,

More information

Coding Artifact Reduction Using Edge Map Guided Adaptive and Fuzzy Filter

Coding Artifact Reduction Using Edge Map Guided Adaptive and Fuzzy Filter MEL A MITSUBISHI ELECTIC ESEACH LABOATOY http://www.merl.com Codng Artfact educton Usng Edge Map Guded Adaptve and Fuzzy Flter Hao-Song Kong Yao Ne Anthony Vetro Hufang Sun Kenneth E. Barner T-2004-056

More information

Vol. 5, No. 3 March 2014 ISSN Journal of Emerging Trends in Computing and Information Sciences CIS Journal. All rights reserved.

Vol. 5, No. 3 March 2014 ISSN Journal of Emerging Trends in Computing and Information Sciences CIS Journal. All rights reserved. Journal of Emergng Trends n Computng and Informaton Scences 009-03 CIS Journal. All rghts reserved. http://www.csjournal.org Unhealthy Detecton n Lvestock Texture Images usng Subsampled Contourlet Transform

More information

2 optmal per-pxel estmate () whch we had proposed for non-scalable vdeo codng [5] [6]. The extended s shown to accurately account for both temporal an

2 optmal per-pxel estmate () whch we had proposed for non-scalable vdeo codng [5] [6]. The extended s shown to accurately account for both temporal an Scalable Vdeo Codng wth Robust Mode Selecton Ru Zhang, Shankar L. Regunathan and Kenneth Rose Department of Electrcal and Computer Engneerng Unversty of Calforna Santa Barbara, CA 906 Abstract We propose

More information

A Modified Median Filter for the Removal of Impulse Noise Based on the Support Vector Machines

A Modified Median Filter for the Removal of Impulse Noise Based on the Support Vector Machines A Modfed Medan Flter for the Removal of Impulse Nose Based on the Support Vector Machnes H. GOMEZ-MORENO, S. MALDONADO-BASCON, F. LOPEZ-FERRERAS, M. UTRILLA- MANSO AND P. GIL-JIMENEZ Departamento de Teoría

More information

Information Hiding Watermarking Detection Technique by PSNR and RGB Intensity

Information Hiding Watermarking Detection Technique by PSNR and RGB Intensity www..org 3 Informaton Hdng Watermarkng Detecton Technque by PSNR and RGB Intensty 1 Neha Chauhan, Akhlesh A. Waoo, 3 P. S. Patheja 1 Research Scholar, BIST, Bhopal, Inda.,3 Assstant Professor, BIST, Bhopal,

More information

Codebook Generation for Vector Quantization using Interpolations to Compress Gray Scale Images

Codebook Generation for Vector Quantization using Interpolations to Compress Gray Scale Images Internatonal Journal of Computer Applcatons (097 8887) Volume No.9, March 0 Codebook Generaton for Vector Quantzaton usng Interpolatons to Compress Gray Scale Images S.Vmala Dept. of Comp. Sc. Mother Teresa

More information

Brushlet Features for Texture Image Retrieval

Brushlet Features for Texture Image Retrieval DICTA00: Dgtal Image Computng Technques and Applcatons, 1 January 00, Melbourne, Australa 1 Brushlet Features for Texture Image Retreval Chbao Chen and Kap Luk Chan Informaton System Research Lab, School

More information

S1 Note. Basis functions.

S1 Note. Basis functions. S1 Note. Bass functons. Contents Types of bass functons...1 The Fourer bass...2 B-splne bass...3 Power and type I error rates wth dfferent numbers of bass functons...4 Table S1. Smulaton results of type

More information

A new remote user authentication scheme for multi-server architecture

A new remote user authentication scheme for multi-server architecture Future Generaton Computer Systems 19 (2003) 13 22 A new remote user authentcaton scheme for mult-server archtecture Iuon-Chang Ln a, Mn-Shang Hwang b,, L-Hua L b a Department of Computer Scence and Informaton

More information

Image Representation & Visualization Basic Imaging Algorithms Shape Representation and Analysis. outline

Image Representation & Visualization Basic Imaging Algorithms Shape Representation and Analysis. outline mage Vsualzaton mage Vsualzaton mage Representaton & Vsualzaton Basc magng Algorthms Shape Representaton and Analyss outlne mage Representaton & Vsualzaton Basc magng Algorthms Shape Representaton and

More information

A Deflected Grid-based Algorithm for Clustering Analysis

A Deflected Grid-based Algorithm for Clustering Analysis A Deflected Grd-based Algorthm for Clusterng Analyss NANCY P. LIN, CHUNG-I CHANG, HAO-EN CHUEH, HUNG-JEN CHEN, WEI-HUA HAO Department of Computer Scence and Informaton Engneerng Tamkang Unversty 5 Yng-chuan

More information

A Computer Vision System for Automated Container Code Recognition

A Computer Vision System for Automated Container Code Recognition A Computer Vson System for Automated Contaner Code Recognton Hsn-Chen Chen, Chh-Ka Chen, Fu-Yu Hsu, Yu-San Ln, Yu-Te Wu, Yung-Nen Sun * Abstract Contaner code examnaton s an essental step n the contaner

More information

Tsinghua University at TAC 2009: Summarizing Multi-documents by Information Distance

Tsinghua University at TAC 2009: Summarizing Multi-documents by Information Distance Tsnghua Unversty at TAC 2009: Summarzng Mult-documents by Informaton Dstance Chong Long, Mnle Huang, Xaoyan Zhu State Key Laboratory of Intellgent Technology and Systems, Tsnghua Natonal Laboratory for

More information

Query Clustering Using a Hybrid Query Similarity Measure

Query Clustering Using a Hybrid Query Similarity Measure Query clusterng usng a hybrd query smlarty measure Fu. L., Goh, D.H., & Foo, S. (2004). WSEAS Transacton on Computers, 3(3), 700-705. Query Clusterng Usng a Hybrd Query Smlarty Measure Ln Fu, Don Hoe-Lan

More information

Modular PCA Face Recognition Based on Weighted Average

Modular PCA Face Recognition Based on Weighted Average odern Appled Scence odular PCA Face Recognton Based on Weghted Average Chengmao Han (Correspondng author) Department of athematcs, Lny Normal Unversty Lny 76005, Chna E-mal: hanchengmao@163.com Abstract

More information

3D vector computer graphics

3D vector computer graphics 3D vector computer graphcs Paolo Varagnolo: freelance engneer Padova Aprl 2016 Prvate Practce ----------------------------------- 1. Introducton Vector 3D model representaton n computer graphcs requres

More information

Pictures at an Exhibition

Pictures at an Exhibition 1 Pctures at an Exhbton Stephane Kwan and Karen Zhu Department of Electrcal Engneerng Stanford Unversty, Stanford, CA 9405 Emal: {skwan1, kyzhu}@stanford.edu Abstract An mage processng algorthm s desgned

More information

Compiler Design. Spring Register Allocation. Sample Exercises and Solutions. Prof. Pedro C. Diniz

Compiler Design. Spring Register Allocation. Sample Exercises and Solutions. Prof. Pedro C. Diniz Compler Desgn Sprng 2014 Regster Allocaton Sample Exercses and Solutons Prof. Pedro C. Dnz USC / Informaton Scences Insttute 4676 Admralty Way, Sute 1001 Marna del Rey, Calforna 90292 pedro@s.edu Regster

More information

Evaluation of an Enhanced Scheme for High-level Nested Network Mobility

Evaluation of an Enhanced Scheme for High-level Nested Network Mobility IJCSNS Internatonal Journal of Computer Scence and Network Securty, VOL.15 No.10, October 2015 1 Evaluaton of an Enhanced Scheme for Hgh-level Nested Network Moblty Mohammed Babker Al Mohammed, Asha Hassan.

More information

Grading Image Retrieval Based on DCT and DWT Compressed Domains Using Low-Level Features

Grading Image Retrieval Based on DCT and DWT Compressed Domains Using Low-Level Features Journal of Communcatons Vol. 0 No. January 0 Gradng Image Retreval Based on DCT and DWT Compressed Domans Usng Low-Level Features Chengyou Wang Xnyue Zhang Rongyang Shan and Xao Zhou School of echancal

More information

Circuit Analysis I (ENGR 2405) Chapter 3 Method of Analysis Nodal(KCL) and Mesh(KVL)

Circuit Analysis I (ENGR 2405) Chapter 3 Method of Analysis Nodal(KCL) and Mesh(KVL) Crcut Analyss I (ENG 405) Chapter Method of Analyss Nodal(KCL) and Mesh(KVL) Nodal Analyss If nstead of focusng on the oltages of the crcut elements, one looks at the oltages at the nodes of the crcut,

More information

Virtual Machine Migration based on Trust Measurement of Computer Node

Virtual Machine Migration based on Trust Measurement of Computer Node Appled Mechancs and Materals Onlne: 2014-04-04 ISSN: 1662-7482, Vols. 536-537, pp 678-682 do:10.4028/www.scentfc.net/amm.536-537.678 2014 Trans Tech Publcatons, Swtzerland Vrtual Machne Mgraton based on

More information

Digital Video Watermarking using Discrete Wavelet Transform and Principal Component Analysis

Digital Video Watermarking using Discrete Wavelet Transform and Principal Component Analysis Internatonal Journal of Wsdom Based Computng, Vol. 1 (2), August 2011 7 Dgtal Vdeo Watermarkng usng Dscrete Wavelet Transform and Prncpal Component Analyss Sanjana Snha, Prajnat Bardhan, Swarnal Pramanck,

More information

MULTISPECTRAL IMAGES CLASSIFICATION BASED ON KLT AND ATR AUTOMATIC TARGET RECOGNITION

MULTISPECTRAL IMAGES CLASSIFICATION BASED ON KLT AND ATR AUTOMATIC TARGET RECOGNITION MULTISPECTRAL IMAGES CLASSIFICATION BASED ON KLT AND ATR AUTOMATIC TARGET RECOGNITION Paulo Quntlano 1 & Antono Santa-Rosa 1 Federal Polce Department, Brasla, Brazl. E-mals: quntlano.pqs@dpf.gov.br and

More information

Object-Based Techniques for Image Retrieval

Object-Based Techniques for Image Retrieval 54 Zhang, Gao, & Luo Chapter VII Object-Based Technques for Image Retreval Y. J. Zhang, Tsnghua Unversty, Chna Y. Y. Gao, Tsnghua Unversty, Chna Y. Luo, Tsnghua Unversty, Chna ABSTRACT To overcome the

More information

IMPLEMENTATION OF QIM BASED AUDIO WATERMARKING USING HYBRID TRANSFORM OF SWT-DCT-SVD METHODS OPTIMIZED WITH GENETIC ALORITHM

IMPLEMENTATION OF QIM BASED AUDIO WATERMARKING USING HYBRID TRANSFORM OF SWT-DCT-SVD METHODS OPTIMIZED WITH GENETIC ALORITHM IMPLEMENTATION OF QIM BASED AUDIO WATERMARKING USING HYBRID TRANSFORM OF SWT-DCT-SVD METHODS OPTIMIZED WITH GENETIC ALORITHM Ryan Amnullah 1, Gelar Budman 2, Irma Saftr 3 1, 2, 3 FakultasTeknk Elektro,

More information

Discrete Cosine Transform Optimization in Image Compression Based on Genetic Algorithm

Discrete Cosine Transform Optimization in Image Compression Based on Genetic Algorithm 015 8th Internatonal Congress on Image and Sgnal Processng (CISP 015) Dscrete Cosne Transform Optmzaton n Image Compresson Based on Genetc Algorthm LIU Yuan-yuan 1 CHE He-xn 1 College of Communcaton Engneerng,

More information

Joint Example-based Depth Map Super-Resolution

Joint Example-based Depth Map Super-Resolution Jont Example-based Depth Map Super-Resoluton Yanje L 1, Tanfan Xue,3, Lfeng Sun 1, Janzhuang Lu,3,4 1 Informaton Scence and Technology Department, Tsnghua Unversty, Bejng, Chna Department of Informaton

More information

Term Weighting Classification System Using the Chi-square Statistic for the Classification Subtask at NTCIR-6 Patent Retrieval Task

Term Weighting Classification System Using the Chi-square Statistic for the Classification Subtask at NTCIR-6 Patent Retrieval Task Proceedngs of NTCIR-6 Workshop Meetng, May 15-18, 2007, Tokyo, Japan Term Weghtng Classfcaton System Usng the Ch-square Statstc for the Classfcaton Subtask at NTCIR-6 Patent Retreval Task Kotaro Hashmoto

More information

Statistical Steganalyis of Images Using Open Source Software

Statistical Steganalyis of Images Using Open Source Software Statstcal Steganalys of Images Usng Open Source Software Bhargav Kapa, Stefan A. Robla Department of Computer Scence Montclar State Unversty Montclar, NJ 07043 roblas@mal.montclar.edu Abstract In ths paper

More information

VISUAL cryptography (VC) is a technique that encrypts a

VISUAL cryptography (VC) is a technique that encrypts a 4336 IEEE TRANSACTIONS ON IMAGE PROCESSING, VOL. 23, NO. 10, OCTOBER 2014 Sharng Vsual Secrets n Sngle Image Random Dot Stereograms Ka-Hu Lee and Pe-Lng Chu Abstract Vsual cryptography schemes (VCSs generate

More information

Face Recognition University at Buffalo CSE666 Lecture Slides Resources:

Face Recognition University at Buffalo CSE666 Lecture Slides Resources: Face Recognton Unversty at Buffalo CSE666 Lecture Sldes Resources: http://www.face-rec.org/algorthms/ Overvew of face recognton algorthms Correlaton - Pxel based correspondence between two face mages Structural

More information

Reducing Frame Rate for Object Tracking

Reducing Frame Rate for Object Tracking Reducng Frame Rate for Object Trackng Pavel Korshunov 1 and We Tsang Oo 2 1 Natonal Unversty of Sngapore, Sngapore 11977, pavelkor@comp.nus.edu.sg 2 Natonal Unversty of Sngapore, Sngapore 11977, oowt@comp.nus.edu.sg

More information

Wishing you all a Total Quality New Year!

Wishing you all a Total Quality New Year! Total Qualty Management and Sx Sgma Post Graduate Program 214-15 Sesson 4 Vnay Kumar Kalakband Assstant Professor Operatons & Systems Area 1 Wshng you all a Total Qualty New Year! Hope you acheve Sx sgma

More information