A Lossless Watermarking Scheme for Halftone Image Authentication

Size: px
Start display at page:

Download "A Lossless Watermarking Scheme for Halftone Image Authentication"

Transcription

1 IJCSNS Internatonal Journal of Computer Scence and Network Securty, VOL.6 No.2B, February A Lossless Watermarkng Scheme for Halftone Image Authentcaton Jeng-Shyang Pan, Hao Luo, and Zhe-Mng Lu, Department of Electronc Engneerng, Natonal Kaohsung Unversty of Appled Scences, Kaohsung, Tawan Harbn Insttute of Technology Shenzhen Graduate School, Shenzhen, Chna Unversty of Freburg, Freburg, Germany Summary Nowadays, halftone mages appear routnely n books, magaznes, prnter outputs, and fax documents. It s desrable to embed data n halftone mages for copyrght protecton and content authentcaton. Ths paper proposes a novel watermarkng scheme for halftone mage authentcaton, explotng mage hash as a fragle watermark. After pxel blockng and orderng, a lookup table s constructed accordng to blocks frequency of occurrence. Watermark embeddng s to dsplace the orgnal blocks wth the correspondng smlar blocks n the lookup table, and n the reverse process watermark s extracted. Some extra blocks are randomly selected wth a secret key for the lookup table embeddng, and the orgnal data of these blocks are also nserted nto the mage. In mage authentcaton, the lookup table s reconstructed frst wth the secret key, and then a smple table-look-up procedure s employed to extract the watermark hash, fnally we only need to compare the watermark hash wth the hash of recovered mage: f they are equal, the orgnal mage suffers no alteraton; otherwse t s changed. As a lossless technque, the orgnal mage can be perfectly recovered by performng the reverse process of the watermark embeddng f the watermarked mage s ntact. It s necessary to keep the content of orgnal host mage unchanged n some specfc applcatons, where content accuracy of the host mage must be guaranteed, e.g. mltary maps, medcal mages, great works of art, etc. As a fragle watermarkng, even one pxel togglng can be detected. Because of the small quantty of watermark, low qualty dstorton s ntroduced to the halftone mage. Experment results demonstrate the effectveness of the scheme. Key words: Halftone mage, Lossless watermarkng, Hash sequence, Image authentcaton 1. Introducton Dgtal halftonng s a technque to transform mult-tone mages nto two-tone mages, e.g. 8-bt grayscale mages nto 1-bt bnary mages. The halftone mages can resemble the orgnal mages when vewng from a dstance by the low-pass flterng n the human vsual system. Most popular halftonng methods can be dvded nto three categores: ordered dtherng [1], error dffuson [2], and drect bnary search [3]. Among these, error dffuson acheves a preferable tradeoff between good vsual qualty and reasonable computatonal complexty. Wth halftone mages wdely used, content authentcaton, changes localzaton and copyrght protecton for ths knd of mages are recevng an ncreasng nterest among researchers wth dgtal watermarkng technques. Many watermarkng technques are proposed for mult-tone mages, and those for halftone mages are developed n recent years. In contrast, qute a small number of authentcaton watermarkng approaches are avalable for halftone mages. In the lterature, most methods cannot perfectly restore the orgnal mage n watermark extracton or detecton. Exstng watermarkng usually ntroduces rreversble degradaton to the host medum. Although the degradaton s slght, t cannot satsfy the requrement of some specfc stuatons, where content accuracy of the host mage must be guaranteed, e.g., mltary maps, medcal mages, great works of art, etc. Therefore, t s qute necessary to develop a lossless watermarkng method for authentcatng halftone mages. However, tll the present tme, there has been lttle attenton pad to the lossless watermarkng technques for halftone mages. Ths paper proposes a watermarkng scheme for halftone mages combnng the above two characterstcs, namely, lossless and for authentcaton purpose. In mage authentcaton, we only need to compare two hash sequences: the extracted watermark hash and the hash of the restored mage. If the two sequences are equal, the halftone mage suffers no alteraton; otherwse t s changed ntentonally or unntentonally. The rest of the paper s organzed as follows. Secton 2 revews the prevous work on halftone mage watermarkng, n partcular for secure authentcaton. Secton 3 extensvely descrbes the proposed scheme ncludng watermark embeddng and extracton, and meanwhle the authentcaton process. In Secton 4, expermental results are presented for the demonstraton of ts effectveness. Secton 5 concludes the paper. 2. Prevous work Manuscrpt revsed January 2006.

2 148 IJCSNS Internatonal Journal of Computer Scence and Network Securty, VOL.6 No.2B, February 2006 Dfferent from grayscale or color mages, there are manly three challenges to embed data n halftone mages. The frst one s less nformaton redundancy for each pxel value has only one bt. Consequently many watermarkng approaches cannot be drectly transplanted to halftone mages. Another challenge s vsual qualty degradaton. To nsert data n halftone mages, change of the pxel value s ether from black to whte or from whte to black. Usually, human vsual system s senstve to the abrupt change, e.g. the whte cross and the black cross. The thrd challenge s lower embeddng capacty. Hgh capacty s one of the key factors to evaluate the performance of watermarkng technques. Actually, for halftone mages, ths challenge s closely related to the former two challenges. It s expected that a large quantty of data cannot be embedded nto halftone mages consderng vsual qualty degradaton, for less nformaton redundancy can be explored. Avalable data hdng methods for halftone mages can be dvded nto three classes: (1) Pxel-based: ths knd of methods s to change the values of ndvdual pxels, usually randomly selected [4] [5]. (2) Block-based: these methods dvde the host mage nto blocks and modfy characterstc of some blocks [6] [7]. (3) Hybrd-based: they nsert data by combnng the characterstcs of pxel-based and block-based [8]. Km and Aff ntroduce an authentcaton watermark AWST (authentcaton watermarkng by self togglng) for halftone mages n [9]. It conssts of followng steps: choosng a set of pseudo-random pxels n the mage, clearng them, computng the message authentcaton code (MAC) or the dgtal sgnature (DS) of the random-pxels-cleared mage, and nsertng the resultng code nto the selected random pxels. One dsadvantage of the AWST s t cannot obtan the orgnal mage n watermark extracton and mage authentcaton when the host mage s not changed, because t clears some pxels randomly selected and never can be recovered. However, our scheme overcomes ths problem: the host mage can be perfectly restored as long as t suffers no alteraton, otherwse even a sngle pxel change can be detected. The scheme can only smply detect the change wthout spatally locatng them. Fg. 1 Block dagram of watermark embeddng. 3.1 Watermark embeddng The block dagram of watermark embeddng s as shown n Fg. 1, and each step s detaled descrbed below. Watermark generaton Our scheme explots mage hash as a fragle watermark. Image hashng s known as the problem of mappng an mage to a short bnary strng. Image hash functon has the propertes that perceptually dentcal mages have the same hash value wth hgh probablty, whle perceptually dfferent mages have ndependent hash values. In addton, the hash functon s secure, so that an attacker cannot predct the hash value of a known mage. Image hashng s one-way, collson-free and relatvely easy to compute for any gven mage. Hence, the watermark can be vewed as adaptve for ts senstvty to change of the mage. Our scheme generates the watermark hash W H of the orgnal mage usng hash functons. Suppose W H s an L-bt 0-1 sequence, thus we need L blocks to embed data for each block can be nserted nto 1-bt data. Image blockng The scheme starts wth dvdng the halftone mage nto dsont pxel blocks. Suppose the sze of the halftone mage I and a block B are M N and m n respectvely, and I s segmented nto b blocks B 1, B 2, B b. Snce each pxel s ether black or whte, an m n block has totally 2 m n dfferent patterns. Some patterns never occur n I, whle some occur many tmes. 3. Proposed scheme Exstng watermarkng technques [10] can be classfed nto three categores: robust, fragle and sem-fragle. Among them, fragle watermarks are easly corrupted by mage processng operatons, and thus often used for checkng mage ntegrty and authentcaton. Authentcaton watermark s a hdden data nserted nto an mage that can be appled to detect any unauthorzed change of the mage. Our scheme s a block-based method. Fg. 2 An example of an orgnal block and ts smlar blocks. Block classfcaton and orderng Ths step ams to select approprate blocks to embed data. To all blocks n I, we count ther occurrence respectvely, and then rank the frequency of occurrence. Sorted n descendng order, suppose t 1, t 2, t ( 2 m n ) denotes the occurrence tmes

3 IJCSNS Internatonal Journal of Computer Scence and Network Securty, VOL.6 No.2B, February of block pattern p 1, p 2, p, respectvely. It s clear that Formula (1) s satsfed. t = b (1) l l= 1 Lookup table constructon A lookup table T s made up of orgnal blocks O 1, O 2, O u, smlar blocks S 1, S 2, S u, and frequency of occurrence of O 1, O 2, O u. S (1 u) s the correspondng smlar block of O. Smlar blocks that never occur n the mage are used to dsplace orgnal blocks for watermark embeddng. In the context, two blocks wth the same sze are consdered smlar f the Hammng dstance between them s 1, namely, only one pxel value s dfferent. Therefore each block has 2 m n smlar blocks. As an example a 4 4 block and ts 16 smlar blocks are shown n Fg. 2. Accordng to the frequency of occurrence, we select k block patterns wth hghest k occurrence t 1, t 2, t k as a canddate block set. To a block n the set, f all of ts smlar ones occur at least once n I, then the block s dscarded from the canddate set. If one or more smlar blocks do not occur, we randomly select one as ts smlar block. All canddate blocks are nvestgated lke ths, and orgnal blocks and correspondng smlar blocks are recorded n T. Besdes ths, we need to record the frequency of occurrence for computng embeddng capacty. So far a lookup table s constructed. It s essental that each smlar block n T must be dfferent from any other blocks. More detals of the lookup table constructon can be seen n [11]. Fg. 3 An example of a lookup table. As an example shown n Fg. 3, the lookup table s constructed on the halftone Lena mage, wth the sze of the Lena and a block and 4 4 pxels, respectvely. Only 5 blocks wth hghest frequency of occurrence and ther smlar blocks are gven. Watermark embeddng To embed data, we compare the block B (1 b) wth O 1, O 2, O u one by one. If B s the same as O, 1-bt data can be nserted wth the rule: If 0 s to be embedded, we do not change B, f 1 s to be embedded, we dsplace B wth S. The operaton as shown n Formula (2) s repeated for all blocks B 1, B 2, B b. B = O f WH = 0 B = S f WH = 1 Overhead nformaton embeddng In [11], the lookup table needs extra storage space for watermark embeddng and extracton. Snce dfferent mage has dfferent lookup table, no unversal table s sutable for all mages. Besdes, the lookup table s also need to be protected. Our scheme overcomes the dsadvantage successfully by embeddng the lookup table n the host mage as overhead nformaton. The overhead nformaton s embedded as follows. () Use a pseudo-random number generator wth a secret key K to choose a set of non-repeatng blocks G n I. Note these blocks must not concde wth the watermarked blocks. () Embed G n I. An m n block of G s rearranged to a 0-1 strng and embedded as the same way of watermark embeddng. The process s repeated for all blocks n G. Snce a block dsplacement can embed one bt, Formula (3) must be satsfed. In Formula (3), 2umn s the total bts of the lookup table T. k l= 1 (2) tl WH+ 2umn (1 k ) (3) () Dsplace blocks n G wth blocks n T drectly. 3.2 Watermark extracton and mage authentcaton The block dagram of watermark extracton and mage authentcaton s as shown n Fg. 4. Lookup table reconstructon The watermarked mage I s segmented nto m n blocks B (0 b). Before watermark extracton, the lookup table must be reconstructed frst. We use the same key K to fnd out the blocks G, and thus T can be recovered by extractng G drectly. Watermark extracton Let W denotes the nformaton H extracted. Accordng to the lookup table T the watermark s extracted as shown n Formula (4). We compare the block B (1 b) wth blocks n T. If B s the same as O (1 u), 0 s extracted; f B s the same as S (1 u), 1 s extracted. W H = 0 f B = O W H = 1 f B = S (4)

4 150 IJCSNS Internatonal Journal of Computer Scence and Network Securty, VOL.6 No.2B, February 2006 The extracted nformaton W conssts of the extracted H watermark H 1 and the orgnal data of G. If 0 extracted, we do not change the block; f 1 extracted, we dsplace S wth B. After we recover G, the restored mage R s obtaned. Image authentcaton The same hash functon s used to compute the hash sequence H2 of R. Thus mage authentcaton s reduced to a task of comparng H1 and H2. On one hand, f the host mage I suffers no alteraton, H1 s equal to H2, otherwse dfferent. On the other hand, I suffers no alteraton f H1 s equal to H2. In a word, f H1 s dfferent from H2, I s changed, at least a sngle pxel. Fg. 4 Block dagram of watermark extracton and mage authentcaton. Fg. 6 Expermental results on halftone Baboon Image. (a) Orgnal Baboon, (b) Watermarked Baboon wthout alteraton, (c) Restored Baboon of (b), (d) Watermarked Baboon wth alteraton, (e) Restored Baboon of (d), (f) Orgnal watermark, (g) Watermark extracted from (b), (h) hash of (c), () Watermark extracted from (d), () hash of (e). 4. Expermental results Fg. 5 Expermental results on halftone Lena Image. (a) Orgnal Lena, (b) Watermarked Lena wthout alteraton, (c) Restored Lena of (b), (d) Watermarked Lena wth alteraton, (e) Restored Lena of (d), (f) Orgnal watermark, (g) Watermark extracted from (b), (h) hash of (c), () Watermark extracted from (d), () hash of (e). In the experment, halftone Lena mage and Baboon mage are selected to test the effectveness of the method. As shown n Fg. 5(a), the halftone Lena mage s dvded nto 4 4 blocks. The orgnal watermark,.e. the hash sequence of Lena, s computed by the MD5 hash functon. After translatng the strng nto 0-1 sequence, 128-bt dgest s obtaned. In authentcaton, we compare the watermark extracted from the watermarked mage, and the hash sequence computed from the restored mage. When the two

5 IJCSNS Internatonal Journal of Computer Scence and Network Securty, VOL.6 No.2B, February sequences are equal, as shown n Fg. 5(g) and Fg. 5(h), we can confrm the watermarked Lena suffers no alteraton. Both of them are equal to the orgnal watermark, as shown n Fg. 5(e). Whle f the watermarked Lena s tampered by a mark KUAS HIT (Fg. 5(d)), the two sequences are dfferent, as shown n Fg. 5() and Fg. 5(). Therefore, we can make a udgment by vrtue of the two sequences are equal or not: f equal, the mage suffers no alteraton; otherwse changed. The Baboon mage s also dvded nto 4 4 blocks. As shown n Fg. 6, expermental results also verfy effectveness of the scheme. 4. Concluson Ths paper presents a lossless watermarkng scheme for halftone mage authentcaton. The hash sequence of the mage s embedded as an adaptve fragle watermark. To udge weather the orgnal mage s changed or not, we only need to compare the extracted watermark and the hash sequence of the restored mage. If they are exactly the same, the mage suffers no alteraton; otherwse t s changed. As long as the watermarked mage s not unauthorzed changed, the orgnal mage can be perfected recovered. Besdes, no nformaton needs to be saved except a secret key. Acknowledgment The authors would lke to express ther thanks to Dr. Ban Yang for hs valuable advce. References [1] R. A. Ulchney, Dgtal Halftonng, Cambrdge, MA: MIT Press, [2] R. W. Floyd and L. Stenberg, An adaptve algorthm for spatal gray scale, Proc. SID 75 Dgest. Socety for nformaton Dsplay, pp , [3] D. Leberman and J. Allebach, Dgtal halftonng usng drect bnary search, Proc. of st IEEE Int. Conf. on Hgh technology, pp , September 1996 [4] M.S. Fu, and O.C. Au, Data Hdng by Smart Par Togglng for Halftone Images, IEEE Int Conf Acoustcs Speech and Sgnal Processng, vol. 4, pp , 2000 [5] M.S. Fu, and O.C. Au, Data Hdng Watermarkng for Halftone Images, IEEE Trans Image Processng, pp [6] Z. Baharav, and D. Shaked, Watermarkng of Dther Halftone Images, Hewlett-Packard Labs Tech Rep, HPL-98-32, [7] H. Z. Hel-Or, Watermarkng and Copyrght Labelng of Prnted Images, Journal of Electronc Imagng, pp [8] S.C. Pe, and J.M. Guo, Hybrd Pxel-Based Data Hdng and Block-Based Watermarkng for Error-Dffused Halftone Images, IEEE Trans Crcuts and Systems for Vdeo Technology, pp , 2003 [9] H.Y. Km, and A. Aff, Secure Authentcaton Watermarkng for Bnary Images, Proc Brazlan Symp on Computer Graphcs and Image Processng, pp , 2003 [10] J. S. Pan, H. C. Huang and L. C. Jan, Intellgent Watermarkng Technques, World Scentfc, [11] P. S. Lao, J. S. Pan, Y. H. Chen and B. Y. Lao, A Lossless Watermarkng Technque for Halftone Image, Internatonal Workshop on Intellgent Informaton Hdng and Multmeda Sgnal Processng, Melbourne, Australa, May 15, Jeng-Shyang Pan receved the B. S. degree n Electronc Engneerng from the Natonal Tawan Unversty of Scence and Technology, Tawan n 1986, the M. S. degree n Communcaton Engneerng from the Natonal Chao Tung Unversty, Tawan n 1988, and the Ph.D. degree n Electrcal Engneerng from the Unversty of Ednburgh, U.K. n Currently, he s a Professor n the Department of Electronc Engneerng, Natonal Kaohsung Unversty of Appled Scences, Tawan. Professor Pan has publshed more than 50 ournal papers and 120 conference papers. He onts the edtoral board for LNCS Transactons on Data Hdng and Multmeda Securty, Sprnger, Internatonal Journal of Knowledge-Based Intellgent Engneerng Systems, IOS Press, and Internatonal Journal of Hybrd Intellgent System, Advanced Knowledge Internatonal. He s the Co-Edtors-n-Chef for Internatonal Journal of Innovatve Computng, Informaton and Control. Hs current research nterests nclude data mnng, nformaton securty and mage processng. Hao Luo receved the B. S. degree and the M. S. degree from Harbn Insttute of Technology (HIT), Harbn, Chna n 2002 and 2004, respectvely. He s a Ph.D canddate n the School of Electronc Engneerng n HIT. Hs research nterests are manly n nformaton securty and mesh retreval. Zhe-Mng Lu receved the B.S., M.S. and Ph. D. degrees n Electrcal Engneerng from Harbn Insttute of Technology n 1995, 1997 and 2001, respectvely. He was the Alexander von Humboldt Research Fellow n Unversty of Freburg n Germany, from Oct., 2004 to Jan He has publshed more than 110 papers and four books. He has been program commttee members n several nternatonal conferences. He s now the Professor and Drector of the Vsual Informaton Analyss and Processng Research Center, Harbn Insttute of Technology Shenzhen Graduate School. Hs research nterests are mage processng, pattern recognton, nformaton hdng and vsual nformaton retreval.

A Binarization Algorithm specialized on Document Images and Photos

A Binarization Algorithm specialized on Document Images and Photos A Bnarzaton Algorthm specalzed on Document mages and Photos Ergna Kavalleratou Dept. of nformaton and Communcaton Systems Engneerng Unversty of the Aegean kavalleratou@aegean.gr Abstract n ths paper, a

More information

Related-Mode Attacks on CTR Encryption Mode

Related-Mode Attacks on CTR Encryption Mode Internatonal Journal of Network Securty, Vol.4, No.3, PP.282 287, May 2007 282 Related-Mode Attacks on CTR Encrypton Mode Dayn Wang, Dongda Ln, and Wenlng Wu (Correspondng author: Dayn Wang) Key Laboratory

More information

Data Hiding and Image Authentication for Color-Palette Images

Data Hiding and Image Authentication for Color-Palette Images Data Hdng and Image Authentcaton for Color-Palette Images Chh-Yang Yn ( 殷志揚 ) and Wen-Hsang Tsa ( 蔡文祥 ) Department of Computer & Informaton Scence Natonal Chao Tung Unversty 00 Ta Hsueh Rd., Hsnchu, Tawan

More information

Enhanced Watermarking Technique for Color Images using Visual Cryptography

Enhanced Watermarking Technique for Color Images using Visual Cryptography Informaton Assurance and Securty Letters 1 (2010) 024-028 Enhanced Watermarkng Technque for Color Images usng Vsual Cryptography Enas F. Al rawashdeh 1, Rawan I.Zaghloul 2 1 Balqa Appled Unversty, MIS

More information

Hybrid Non-Blind Color Image Watermarking

Hybrid Non-Blind Color Image Watermarking Hybrd Non-Blnd Color Image Watermarkng Ms C.N.Sujatha 1, Dr. P. Satyanarayana 2 1 Assocate Professor, Dept. of ECE, SNIST, Yamnampet, Ghatkesar Hyderabad-501301, Telangana 2 Professor, Dept. of ECE, AITS,

More information

Improvement of Spatial Resolution Using BlockMatching Based Motion Estimation and Frame. Integration

Improvement of Spatial Resolution Using BlockMatching Based Motion Estimation and Frame. Integration Improvement of Spatal Resoluton Usng BlockMatchng Based Moton Estmaton and Frame Integraton Danya Suga and Takayuk Hamamoto Graduate School of Engneerng, Tokyo Unversty of Scence, 6-3-1, Nuku, Katsuska-ku,

More information

Key-Selective Patchwork Method for Audio Watermarking

Key-Selective Patchwork Method for Audio Watermarking Internatonal Journal of Dgtal Content Technology and ts Applcatons Volume 4, Number 4, July 2010 Key-Selectve Patchwork Method for Audo Watermarkng 1 Ch-Man Pun, 2 Jng-Jng Jang 1, Frst and Correspondng

More information

Content Based Image Retrieval Using 2-D Discrete Wavelet with Texture Feature with Different Classifiers

Content Based Image Retrieval Using 2-D Discrete Wavelet with Texture Feature with Different Classifiers IOSR Journal of Electroncs and Communcaton Engneerng (IOSR-JECE) e-issn: 78-834,p- ISSN: 78-8735.Volume 9, Issue, Ver. IV (Mar - Apr. 04), PP 0-07 Content Based Image Retreval Usng -D Dscrete Wavelet wth

More information

Semi-Fragile Watermarking Scheme for Authentication of JPEG Images

Semi-Fragile Watermarking Scheme for Authentication of JPEG Images Tamkang Journal of Scence and Engneerng, Vol. 10, No 1, pp. 5766 (2007) 57 Sem-Fragle Watermarkng Scheme for Authentcaton of JPEG Images Chh-Hung n 1 *, Tung-Shh Su 2 and Wen-Shyong Hseh 2,3 1 Department

More information

Cluster Analysis of Electrical Behavior

Cluster Analysis of Electrical Behavior Journal of Computer and Communcatons, 205, 3, 88-93 Publshed Onlne May 205 n ScRes. http://www.scrp.org/ournal/cc http://dx.do.org/0.4236/cc.205.350 Cluster Analyss of Electrcal Behavor Ln Lu Ln Lu, School

More information

A Fast Content-Based Multimedia Retrieval Technique Using Compressed Data

A Fast Content-Based Multimedia Retrieval Technique Using Compressed Data A Fast Content-Based Multmeda Retreval Technque Usng Compressed Data Borko Furht and Pornvt Saksobhavvat NSF Multmeda Laboratory Florda Atlantc Unversty, Boca Raton, Florda 3343 ABSTRACT In ths paper,

More information

Research of Multiple Text Watermarks Technique in Electric Power System Texts

Research of Multiple Text Watermarks Technique in Electric Power System Texts Sensors & Transducers 203 by IFSA http://www.sensorsportal.com Research of Multple Text atermarks Technque n Electrc Power System Texts Xao-X XING, Qng CHEN, 2 Lan-X FU School of Optcal-Electrcal and Computer

More information

Article Reversible Dual-Image-Based Hiding Scheme Using Block Folding Technique

Article Reversible Dual-Image-Based Hiding Scheme Using Block Folding Technique Artcle Reversble Dual-Image-Based Hdng Scheme Usng Block Foldng Technque Tzu-Chuen Lu, * and Hu-Shh Leng Department of Informaton Management, Chaoyang Unversty of Technology, Tachung 4349, Tawan Department

More information

Robust Blind Video Watermark Algorithm in Transform Domain Combining with 3D Video Correlation

Robust Blind Video Watermark Algorithm in Transform Domain Combining with 3D Video Correlation JOURNAL OF MULTIMEDIA, VOL. 8, NO. 2, APRIL 2013 161 Robust Blnd Vdeo Watermark Algorthm n Transform Doman Combnng wth 3D Vdeo Correlaton DING Ha-yang 1,3 1. Informaton Securty Center, Bejng Unversty of

More information

Available online at Available online at Advanced in Control Engineering and Information Science

Available online at   Available online at   Advanced in Control Engineering and Information Science Avalable onlne at wwwscencedrectcom Avalable onlne at wwwscencedrectcom Proceda Proceda Engneerng Engneerng 00 (2011) 15000 000 (2011) 1642 1646 Proceda Engneerng wwwelsevercom/locate/proceda Advanced

More information

An Optimal Algorithm for Prufer Codes *

An Optimal Algorithm for Prufer Codes * J. Software Engneerng & Applcatons, 2009, 2: 111-115 do:10.4236/jsea.2009.22016 Publshed Onlne July 2009 (www.scrp.org/journal/jsea) An Optmal Algorthm for Prufer Codes * Xaodong Wang 1, 2, Le Wang 3,

More information

Security Enhanced Dynamic ID based Remote User Authentication Scheme for Multi-Server Environments

Security Enhanced Dynamic ID based Remote User Authentication Scheme for Multi-Server Environments Internatonal Journal of u- and e- ervce, cence and Technology Vol8, o 7 0), pp7-6 http://dxdoorg/07/unesst087 ecurty Enhanced Dynamc ID based Remote ser Authentcaton cheme for ult-erver Envronments Jun-ub

More information

Research Article High Capacity Reversible Watermarking for Audio by Histogram Shifting and Predicted Error Expansion

Research Article High Capacity Reversible Watermarking for Audio by Histogram Shifting and Predicted Error Expansion e Scentfc World Journal, Artcle ID 656251, 7 pages http://dx.do.org/1.1155/214/656251 Research Artcle Hgh Capacty Reversble Watermarkng for Audo by Hstogram Shftng and Predcted Error Expanson Fe Wang,

More information

A Robust Webpage Information Hiding Method Based on the Slash of Tag

A Robust Webpage Information Hiding Method Based on the Slash of Tag Advanced Engneerng Forum Onlne: 2012-09-26 ISSN: 2234-991X, Vols. 6-7, pp 361-366 do:10.4028/www.scentfc.net/aef.6-7.361 2012 Trans Tech Publcatons, Swtzerland A Robust Webpage Informaton Hdng Method Based

More information

A NEW AUDIO WATERMARKING METHOD BASED

A NEW AUDIO WATERMARKING METHOD BASED A NEW AUDIO WATERMARKING METHOD BASED ON DISCRETE COSINE TRANSFORM WITH A GRAY IMAGE Mohammad Ibrahm Khan 1, Md. Iqbal Hasan Sarker 2, Kaushk Deb 3 and Md. Hasan Furhad 4 1,2,3 Department of Computer Scence

More information

Learning the Kernel Parameters in Kernel Minimum Distance Classifier

Learning the Kernel Parameters in Kernel Minimum Distance Classifier Learnng the Kernel Parameters n Kernel Mnmum Dstance Classfer Daoqang Zhang 1,, Songcan Chen and Zh-Hua Zhou 1* 1 Natonal Laboratory for Novel Software Technology Nanjng Unversty, Nanjng 193, Chna Department

More information

A Hybrid Semi-Blind Gray Scale Image Watermarking Algorithm Based on DWT-SVD using Human Visual System Model

A Hybrid Semi-Blind Gray Scale Image Watermarking Algorithm Based on DWT-SVD using Human Visual System Model A Hybrd Sem-Blnd Gray Scale Image Watermarkng Algorthm Based on DWT-SVD usng Human Vsual System Model Rajesh Mehta r Scence & Engneerng, USICT Guru Gobnd Sngh Indrarprastha Unversty New Delh, Inda rajesh00ust@gmal.com

More information

Enhanced AMBTC for Image Compression using Block Classification and Interpolation

Enhanced AMBTC for Image Compression using Block Classification and Interpolation Internatonal Journal of Computer Applcatons (0975 8887) Volume 5 No.0, August 0 Enhanced AMBTC for Image Compresson usng Block Classfcaton and Interpolaton S. Vmala Dept. of Comp. Scence Mother Teresa

More information

Shape-adaptive DCT and Its Application in Region-based Image Coding

Shape-adaptive DCT and Its Application in Region-based Image Coding Internatonal Journal of Sgnal Processng, Image Processng and Pattern Recognton, pp.99-108 http://dx.do.org/10.14257/sp.2014.7.1.10 Shape-adaptve DCT and Its Applcaton n Regon-based Image Codng Yamn Zheng,

More information

Research and Application of Fingerprint Recognition Based on MATLAB

Research and Application of Fingerprint Recognition Based on MATLAB Send Orders for Reprnts to reprnts@benthamscence.ae The Open Automaton and Control Systems Journal, 205, 7, 07-07 Open Access Research and Applcaton of Fngerprnt Recognton Based on MATLAB Nng Lu* Department

More information

A New Feature of Uniformity of Image Texture Directions Coinciding with the Human Eyes Perception 1

A New Feature of Uniformity of Image Texture Directions Coinciding with the Human Eyes Perception 1 A New Feature of Unformty of Image Texture Drectons Concdng wth the Human Eyes Percepton Xng-Jan He, De-Shuang Huang, Yue Zhang, Tat-Mng Lo 2, and Mchael R. Lyu 3 Intellgent Computng Lab, Insttute of Intellgent

More information

High Payload Reversible Data Hiding Scheme Using Difference Segmentation and Histogram Shifting

High Payload Reversible Data Hiding Scheme Using Difference Segmentation and Histogram Shifting JOURNAL OF ELECTRONIC SCIENCE AND TECHNOLOGY, VOL. 11, NO. 1, MARCH 2013 9 Hgh Payload Reversble Data Hdng Scheme Usng Dfference Segmentaton and Hstogram Shftng Yung-Chen Chou and Huang-Chng L Abstract

More information

Parallelism for Nested Loops with Non-uniform and Flow Dependences

Parallelism for Nested Loops with Non-uniform and Flow Dependences Parallelsm for Nested Loops wth Non-unform and Flow Dependences Sam-Jn Jeong Dept. of Informaton & Communcaton Engneerng, Cheonan Unversty, 5, Anseo-dong, Cheonan, Chungnam, 330-80, Korea. seong@cheonan.ac.kr

More information

A fast algorithm for color image segmentation

A fast algorithm for color image segmentation Unersty of Wollongong Research Onlne Faculty of Informatcs - Papers (Arche) Faculty of Engneerng and Informaton Scences 006 A fast algorthm for color mage segmentaton L. Dong Unersty of Wollongong, lju@uow.edu.au

More information

A Secured Method for Image Steganography Based On Pixel Values

A Secured Method for Image Steganography Based On Pixel Values A Secured Method for Image Steganography Based On Pxel Values Tarun Gulat #, Sanskrt Gupta * # Assocate Professor, Electroncs and Communcaton Engneerng Department, MMEC, M.M.U., Mullana, Ambala, Haryana,

More information

Using Fuzzy Logic to Enhance the Large Size Remote Sensing Images

Using Fuzzy Logic to Enhance the Large Size Remote Sensing Images Internatonal Journal of Informaton and Electroncs Engneerng Vol. 5 No. 6 November 015 Usng Fuzzy Logc to Enhance the Large Sze Remote Sensng Images Trung Nguyen Tu Huy Ngo Hoang and Thoa Vu Van Abstract

More information

Load Balancing for Hex-Cell Interconnection Network

Load Balancing for Hex-Cell Interconnection Network Int. J. Communcatons, Network and System Scences,,, - Publshed Onlne Aprl n ScRes. http://www.scrp.org/journal/jcns http://dx.do.org/./jcns.. Load Balancng for Hex-Cell Interconnecton Network Saher Manaseer,

More information

Tsinghua University at TAC 2009: Summarizing Multi-documents by Information Distance

Tsinghua University at TAC 2009: Summarizing Multi-documents by Information Distance Tsnghua Unversty at TAC 2009: Summarzng Mult-documents by Informaton Dstance Chong Long, Mnle Huang, Xaoyan Zhu State Key Laboratory of Intellgent Technology and Systems, Tsnghua Natonal Laboratory for

More information

Local Quaternary Patterns and Feature Local Quaternary Patterns

Local Quaternary Patterns and Feature Local Quaternary Patterns Local Quaternary Patterns and Feature Local Quaternary Patterns Jayu Gu and Chengjun Lu The Department of Computer Scence, New Jersey Insttute of Technology, Newark, NJ 0102, USA Abstract - Ths paper presents

More information

Problem Definitions and Evaluation Criteria for Computational Expensive Optimization

Problem Definitions and Evaluation Criteria for Computational Expensive Optimization Problem efntons and Evaluaton Crtera for Computatonal Expensve Optmzaton B. Lu 1, Q. Chen and Q. Zhang 3, J. J. Lang 4, P. N. Suganthan, B. Y. Qu 6 1 epartment of Computng, Glyndwr Unversty, UK Faclty

More information

Private Information Retrieval (PIR)

Private Information Retrieval (PIR) 2 Levente Buttyán Problem formulaton Alce wants to obtan nformaton from a database, but she does not want the database to learn whch nformaton she wanted e.g., Alce s an nvestor queryng a stock-market

More information

Detection of an Object by using Principal Component Analysis

Detection of an Object by using Principal Component Analysis Detecton of an Object by usng Prncpal Component Analyss 1. G. Nagaven, 2. Dr. T. Sreenvasulu Reddy 1. M.Tech, Department of EEE, SVUCE, Trupath, Inda. 2. Assoc. Professor, Department of ECE, SVUCE, Trupath,

More information

A Fast Visual Tracking Algorithm Based on Circle Pixels Matching

A Fast Visual Tracking Algorithm Based on Circle Pixels Matching A Fast Vsual Trackng Algorthm Based on Crcle Pxels Matchng Zhqang Hou hou_zhq@sohu.com Chongzhao Han czhan@mal.xjtu.edu.cn Ln Zheng Abstract: A fast vsual trackng algorthm based on crcle pxels matchng

More information

FEATURE EXTRACTION. Dr. K.Vijayarekha. Associate Dean School of Electrical and Electronics Engineering SASTRA University, Thanjavur

FEATURE EXTRACTION. Dr. K.Vijayarekha. Associate Dean School of Electrical and Electronics Engineering SASTRA University, Thanjavur FEATURE EXTRACTION Dr. K.Vjayarekha Assocate Dean School of Electrcal and Electroncs Engneerng SASTRA Unversty, Thanjavur613 41 Jont Intatve of IITs and IISc Funded by MHRD Page 1 of 8 Table of Contents

More information

Edge Detection in Noisy Images Using the Support Vector Machines

Edge Detection in Noisy Images Using the Support Vector Machines Edge Detecton n Nosy Images Usng the Support Vector Machnes Hlaro Gómez-Moreno, Saturnno Maldonado-Bascón, Francsco López-Ferreras Sgnal Theory and Communcatons Department. Unversty of Alcalá Crta. Madrd-Barcelona

More information

TN348: Openlab Module - Colocalization

TN348: Openlab Module - Colocalization TN348: Openlab Module - Colocalzaton Topc The Colocalzaton module provdes the faclty to vsualze and quantfy colocalzaton between pars of mages. The Colocalzaton wndow contans a prevew of the two mages

More information

Robust Video Watermarking Using Image Normalization, Motion Vector and Perceptual Information

Robust Video Watermarking Using Image Normalization, Motion Vector and Perceptual Information Robust Vdeo Watermarkng Usng Image ormalzaton, Moton Vector and Perceptual Informaton Cedllo-Hernández Antono 1, Cedllo-Hernández Manuel 1, akano-myatake Marko 1, García-Vázquez Mreya S. 2 1 Postgraduate

More information

Reversible Dual-Image-Based Hiding Scheme Using Block Folding Technique

Reversible Dual-Image-Based Hiding Scheme Using Block Folding Technique S S symmetry Artcle Reversble Dual-Image-Based Hdng Scheme Usng Block Foldng Technque Tzu-Chuen Lu Tzu-Chuen Lu 1, 1, * and Hu-Shh Leng * ID and Hu-Shh Leng 1 Department Informaton Management, Chaoyang

More information

Adaptive digital watermarking of images using Genetic Algorithm

Adaptive digital watermarking of images using Genetic Algorithm Adaptve dgtal watermarkng of mages usng Genetc Algorthm Bushra Skander, Muhammad Ishtaq, M. Arfan Jaffar, Muhammad Tarq, Anwar M. Mrza Department of Computer Scence, Natonal Unversty of Computer and Emergng

More information

PCA Based Gait Segmentation

PCA Based Gait Segmentation Honggu L, Cupng Sh & Xngguo L PCA Based Gat Segmentaton PCA Based Gat Segmentaton Honggu L, Cupng Sh, and Xngguo L 2 Electronc Department, Physcs College, Yangzhou Unversty, 225002 Yangzhou, Chna 2 Department

More information

A Deflected Grid-based Algorithm for Clustering Analysis

A Deflected Grid-based Algorithm for Clustering Analysis A Deflected Grd-based Algorthm for Clusterng Analyss NANCY P. LIN, CHUNG-I CHANG, HAO-EN CHUEH, HUNG-JEN CHEN, WEI-HUA HAO Department of Computer Scence and Informaton Engneerng Tamkang Unversty 5 Yng-chuan

More information

Parallel Inverse Halftoning by Look-Up Table (LUT) Partitioning

Parallel Inverse Halftoning by Look-Up Table (LUT) Partitioning Parallel Inverse Halftonng by Look-Up Table (LUT) Parttonng Umar F. Sddq and Sadq M. Sat umar@ccse.kfupm.edu.sa, sadq@kfupm.edu.sa KFUPM Box: Department of Computer Engneerng, Kng Fahd Unversty of Petroleum

More information

An Image Compression Algorithm based on Wavelet Transform and LZW

An Image Compression Algorithm based on Wavelet Transform and LZW An Image Compresson Algorthm based on Wavelet Transform and LZW Png Luo a, Janyong Yu b School of Chongqng Unversty of Posts and Telecommuncatons, Chongqng, 400065, Chna Abstract a cylpng@63.com, b y27769864@sna.cn

More information

Problem Set 3 Solutions

Problem Set 3 Solutions Introducton to Algorthms October 4, 2002 Massachusetts Insttute of Technology 6046J/18410J Professors Erk Demane and Shaf Goldwasser Handout 14 Problem Set 3 Solutons (Exercses were not to be turned n,

More information

Pattern Recognition 43 (2010) Contents lists available at ScienceDirect. Pattern Recognition. journal homepage:

Pattern Recognition 43 (2010) Contents lists available at ScienceDirect. Pattern Recognition. journal homepage: Pattern Recognton 43 (2010) 397 -- 404 Contents lsts avalable at ScenceDrect Pattern Recognton ournal homepage: www.elsever.com/locate/pr Secret mage sharng based on cellular automata and steganography

More information

A Modified Median Filter for the Removal of Impulse Noise Based on the Support Vector Machines

A Modified Median Filter for the Removal of Impulse Noise Based on the Support Vector Machines A Modfed Medan Flter for the Removal of Impulse Nose Based on the Support Vector Machnes H. GOMEZ-MORENO, S. MALDONADO-BASCON, F. LOPEZ-FERRERAS, M. UTRILLA- MANSO AND P. GIL-JIMENEZ Departamento de Teoría

More information

A Clustering Algorithm for Key Frame Extraction Based on Density Peak

A Clustering Algorithm for Key Frame Extraction Based on Density Peak Journal of Computer and Communcatons, 2018, 6, 118-128 http://www.scrp.org/ournal/cc ISSN Onlne: 2327-5227 ISSN Prnt: 2327-5219 A Clusterng Algorthm for Key Frame Extracton Based on Densty Peak Hong Zhao

More information

An Image Fusion Approach Based on Segmentation Region

An Image Fusion Approach Based on Segmentation Region Rong Wang, L-Qun Gao, Shu Yang, Yu-Hua Cha, and Yan-Chun Lu An Image Fuson Approach Based On Segmentaton Regon An Image Fuson Approach Based on Segmentaton Regon Rong Wang, L-Qun Gao, Shu Yang 3, Yu-Hua

More information

A Background Subtraction for a Vision-based User Interface *

A Background Subtraction for a Vision-based User Interface * A Background Subtracton for a Vson-based User Interface * Dongpyo Hong and Woontack Woo KJIST U-VR Lab. {dhon wwoo}@kjst.ac.kr Abstract In ths paper, we propose a robust and effcent background subtracton

More information

Editorial Manager(tm) for International Journal of Pattern Recognition and

Editorial Manager(tm) for International Journal of Pattern Recognition and Artfcal Intellgence Edtoral Manager(tm) for Internatonal Journal of Pattern Recognton and Manuscrpt Draft Manuscrpt Number: Ttle: TEXT LOCALIZATION IN COMPLEX COLOR DOCUMENTS Artcle Type: Research Paper

More information

VISUAL cryptography (VC) is a technique that encrypts a

VISUAL cryptography (VC) is a technique that encrypts a 4336 IEEE TRANSACTIONS ON IMAGE PROCESSING, VOL. 23, NO. 10, OCTOBER 2014 Sharng Vsual Secrets n Sngle Image Random Dot Stereograms Ka-Hu Lee and Pe-Lng Chu Abstract Vsual cryptography schemes (VCSs generate

More information

The Research of Support Vector Machine in Agricultural Data Classification

The Research of Support Vector Machine in Agricultural Data Classification The Research of Support Vector Machne n Agrcultural Data Classfcaton Le Sh, Qguo Duan, Xnmng Ma, Me Weng College of Informaton and Management Scence, HeNan Agrcultural Unversty, Zhengzhou 45000 Chna Zhengzhou

More information

Research Article Hamming Code Based Watermarking Scheme for 3D Model Verification

Research Article Hamming Code Based Watermarking Scheme for 3D Model Verification Mathematcal Problems n Engneerng, Artcle ID 241093, 7 pages http://dx.do.org/10.1155/2014/241093 Research Artcle Hammng Code Based Watermarkng Scheme for 3D Model Verfcaton Jen-Tse Wang, 1 Y-Chng Chang,

More information

An efficient method to build panoramic image mosaics

An efficient method to build panoramic image mosaics An effcent method to buld panoramc mage mosacs Pattern Recognton Letters vol. 4 003 Dae-Hyun Km Yong-In Yoon Jong-Soo Cho School of Electrcal Engneerng and Computer Scence Kyungpook Natonal Unv. Abstract

More information

Research in Algorithm of Image Processing Used in Collision Avoidance Systems

Research in Algorithm of Image Processing Used in Collision Avoidance Systems Sensors & Transducers, Vol 59, Issue, November 203, pp 330-336 Sensors & Transducers 203 by IFSA http://wwwsensorsportalcom Research n Algorthm of Image Processng Used n Collson Avodance Systems Hu Bn

More information

Digital Video Watermarking using Discrete Wavelet Transform and Principal Component Analysis

Digital Video Watermarking using Discrete Wavelet Transform and Principal Component Analysis Internatonal Journal of Wsdom Based Computng, Vol. 1 (2), August 2011 7 Dgtal Vdeo Watermarkng usng Dscrete Wavelet Transform and Prncpal Component Analyss Sanjana Snha, Prajnat Bardhan, Swarnal Pramanck,

More information

Identify the Attack in Embedded Image with Steganalysis Detection Method by PSNR and RGB Intensity

Identify the Attack in Embedded Image with Steganalysis Detection Method by PSNR and RGB Intensity Internatonal Journal of Computer Systems (ISSN: 394-1065), Volume 03 Issue 07, July, 016 Avalable at http://www.jcsonlne.com/ Identfy the Attack n Embedded Image wth Steganalyss Detecton Method by PSNR

More information

Robust Watermarking for Text Images Based on Arnold Scrambling and DWT-DCT

Robust Watermarking for Text Images Based on Arnold Scrambling and DWT-DCT Internatonal Conference on Mechatroncs Electronc Industral and Control Engneerng (MEIC 015) Robust Watermarkng for Text Images Based on Arnold Scramblng and DWT-DCT Fan Wu College of Informaton Scence

More information

Mobile Application Security for Video Streaming Authentication and Data Integrity Combining Digital Signature and Watermarking Techniques

Mobile Application Security for Video Streaming Authentication and Data Integrity Combining Digital Signature and Watermarking Techniques Moble Applcaton Securty for Vdeo Streamng Authentcaton and Data Integrty Combnng Dgtal Sgnature and Watermarkng Technques Stefano Chessa, Roberto D Petro, Erna Ferro, Gaetano Gunta, Gabrele Olger ISTI-CNR,

More information

Term Weighting Classification System Using the Chi-square Statistic for the Classification Subtask at NTCIR-6 Patent Retrieval Task

Term Weighting Classification System Using the Chi-square Statistic for the Classification Subtask at NTCIR-6 Patent Retrieval Task Proceedngs of NTCIR-6 Workshop Meetng, May 15-18, 2007, Tokyo, Japan Term Weghtng Classfcaton System Usng the Ch-square Statstc for the Classfcaton Subtask at NTCIR-6 Patent Retreval Task Kotaro Hashmoto

More information

IAJIT First Online Publication

IAJIT First Online Publication Content Protecton n Vdeo Data Based on Robust Dgtal Watermarkng Resstant to Intentonal and Unntentonal Attacks Mad Masoum and Shervn Amr Department of Electrcal Engneerng, Islamc Azad Unversty Qazvn Branch,

More information

Positive Semi-definite Programming Localization in Wireless Sensor Networks

Positive Semi-definite Programming Localization in Wireless Sensor Networks Postve Sem-defnte Programmng Localzaton n Wreless Sensor etworks Shengdong Xe 1,, Jn Wang, Aqun Hu 1, Yunl Gu, Jang Xu, 1 School of Informaton Scence and Engneerng, Southeast Unversty, 10096, anjng Computer

More information

Brushlet Features for Texture Image Retrieval

Brushlet Features for Texture Image Retrieval DICTA00: Dgtal Image Computng Technques and Applcatons, 1 January 00, Melbourne, Australa 1 Brushlet Features for Texture Image Retreval Chbao Chen and Kap Luk Chan Informaton System Research Lab, School

More information

The Research of Ellipse Parameter Fitting Algorithm of Ultrasonic Imaging Logging in the Casing Hole

The Research of Ellipse Parameter Fitting Algorithm of Ultrasonic Imaging Logging in the Casing Hole Appled Mathematcs, 04, 5, 37-3 Publshed Onlne May 04 n ScRes. http://www.scrp.org/journal/am http://dx.do.org/0.436/am.04.584 The Research of Ellpse Parameter Fttng Algorthm of Ultrasonc Imagng Loggng

More information

KEYWORDS: Digital Image Watermarking, Discrete Wavelet Transform, General Regression Neural Network, Human Visual System. 1.

KEYWORDS: Digital Image Watermarking, Discrete Wavelet Transform, General Regression Neural Network, Human Visual System. 1. An Adaptve Dgtal Image Watermarkng Based on Image Features n Dscrete Wavelet Transform Doman and General Regresson Neural Network Ayoub Taher Group of IT Engneerng, Payam Noor Unversty, Broujen, Iran ABSTRACT:

More information

Using Counter-propagation Neural Network for Digital Audio Watermarking

Using Counter-propagation Neural Network for Digital Audio Watermarking Usng Counter-propagaton Neural Network for Dgtal Audo Watermarkng Chuan-Yu Chang and Wen-Chh Shen Graduate School of Computer Scence and Informaton Engneerng Natonal Yunln Unversty of Scence & Technology

More information

Open Access Early Fire Smoke Image Segmentation in a Complex Large Space

Open Access Early Fire Smoke Image Segmentation in a Complex Large Space Send Orders for Reprnts to reprnts@benthamscence.ae The Open Constructon and Buldng Technology Journal, 2015, 9, 27-31 27 Open Access Early Fre Smoke Image Segmentaton n a Complex Large Space Hu Yan 1,2,*,

More information

A PATTERN RECOGNITION APPROACH TO IMAGE SEGMENTATION

A PATTERN RECOGNITION APPROACH TO IMAGE SEGMENTATION 1 THE PUBLISHING HOUSE PROCEEDINGS OF THE ROMANIAN ACADEMY, Seres A, OF THE ROMANIAN ACADEMY Volume 4, Number 2/2003, pp.000-000 A PATTERN RECOGNITION APPROACH TO IMAGE SEGMENTATION Tudor BARBU Insttute

More information

High-Boost Mesh Filtering for 3-D Shape Enhancement

High-Boost Mesh Filtering for 3-D Shape Enhancement Hgh-Boost Mesh Flterng for 3-D Shape Enhancement Hrokazu Yagou Λ Alexander Belyaev y Damng We z Λ y z ; ; Shape Modelng Laboratory, Unversty of Azu, Azu-Wakamatsu 965-8580 Japan y Computer Graphcs Group,

More information

BIN XIA et al: AN IMPROVED K-MEANS ALGORITHM BASED ON CLOUD PLATFORM FOR DATA MINING

BIN XIA et al: AN IMPROVED K-MEANS ALGORITHM BASED ON CLOUD PLATFORM FOR DATA MINING An Improved K-means Algorthm based on Cloud Platform for Data Mnng Bn Xa *, Yan Lu 2. School of nformaton and management scence, Henan Agrcultural Unversty, Zhengzhou, Henan 450002, P.R. Chna 2. College

More information

Robust visual tracking based on Informative random fern

Robust visual tracking based on Informative random fern 5th Internatonal Conference on Computer Scences and Automaton Engneerng (ICCSAE 205) Robust vsual trackng based on Informatve random fern Hao Dong, a, Ru Wang, b School of Instrumentaton Scence and Opto-electroncs

More information

Two-Factor User Authentication in Multi-Server Networks

Two-Factor User Authentication in Multi-Server Networks Internatonal Journal of ecurty and Its Applcatons Vol. 6, No., Aprl, 0 Two-Factor ser Authentcaton n Mult-erver Networks Chun-Ta L, Ch-Yao Weng,* and Chun-I Fan Department of Informaton Management, Tanan

More information

Performance Analysis of Data Hiding in MPEG-4 AAC Audio *

Performance Analysis of Data Hiding in MPEG-4 AAC Audio * TSINGHUA SCIENCE AND TECHNOLOGY ISSNll1007-0214ll07/21llpp55-61 Volume 14, Number 1, February 2009 Performance Analyss of Data Hdng n MPEG-4 AAC Audo * XU Shuzheng ( ) **, ZHANG Peng ( ), WANG Pengjun

More information

3D Virtual Eyeglass Frames Modeling from Multiple Camera Image Data Based on the GFFD Deformation Method

3D Virtual Eyeglass Frames Modeling from Multiple Camera Image Data Based on the GFFD Deformation Method NICOGRAPH Internatonal 2012, pp. 114-119 3D Vrtual Eyeglass Frames Modelng from Multple Camera Image Data Based on the GFFD Deformaton Method Norak Tamura, Somsangouane Sngthemphone and Katsuhro Ktama

More information

Computer Generated Integral Imaging (II) System Using Depth-Camera

Computer Generated Integral Imaging (II) System Using Depth-Camera Computer Generated Integral Imagng (II) System Usng Depth-Camera Md. Sharful Islam 1, Md. Tarquzzaman 2 1,2 Department of Informaton and Communcaton Engneerng, Islamc Unversty, Kushta-7003, Bangladesh

More information

User Authentication Based On Behavioral Mouse Dynamics Biometrics

User Authentication Based On Behavioral Mouse Dynamics Biometrics User Authentcaton Based On Behavoral Mouse Dynamcs Bometrcs Chee-Hyung Yoon Danel Donghyun Km Department of Computer Scence Department of Computer Scence Stanford Unversty Stanford Unversty Stanford, CA

More information

A Computer Vision System for Automated Container Code Recognition

A Computer Vision System for Automated Container Code Recognition A Computer Vson System for Automated Contaner Code Recognton Hsn-Chen Chen, Chh-Ka Chen, Fu-Yu Hsu, Yu-San Ln, Yu-Te Wu, Yung-Nen Sun * Abstract Contaner code examnaton s an essental step n the contaner

More information

Collaboratively Regularized Nearest Points for Set Based Recognition

Collaboratively Regularized Nearest Points for Set Based Recognition Academc Center for Computng and Meda Studes, Kyoto Unversty Collaboratvely Regularzed Nearest Ponts for Set Based Recognton Yang Wu, Mchhko Mnoh, Masayuk Mukunok Kyoto Unversty 9/1/013 BMVC 013 @ Brstol,

More information

IR-HARQ vs. Joint Channel-Network coding for Cooperative Wireless Communication

IR-HARQ vs. Joint Channel-Network coding for Cooperative Wireless Communication Cyber Journals: ultdscplnary Journals n Scence and Technology, Journal of Selected Areas n Telecommuncatons (JSAT), August Edton, 2 IR-HARQ vs. Jont Channel-Network codng for Cooperatve Wreless Communcaton

More information

Real-time Motion Capture System Using One Video Camera Based on Color and Edge Distribution

Real-time Motion Capture System Using One Video Camera Based on Color and Edge Distribution Real-tme Moton Capture System Usng One Vdeo Camera Based on Color and Edge Dstrbuton YOSHIAKI AKAZAWA, YOSHIHIRO OKADA, AND KOICHI NIIJIMA Graduate School of Informaton Scence and Electrcal Engneerng,

More information

The Shortest Path of Touring Lines given in the Plane

The Shortest Path of Touring Lines given in the Plane Send Orders for Reprnts to reprnts@benthamscence.ae 262 The Open Cybernetcs & Systemcs Journal, 2015, 9, 262-267 The Shortest Path of Tourng Lnes gven n the Plane Open Access Ljuan Wang 1,2, Dandan He

More information

A Novel Adaptive Descriptor Algorithm for Ternary Pattern Textures

A Novel Adaptive Descriptor Algorithm for Ternary Pattern Textures A Novel Adaptve Descrptor Algorthm for Ternary Pattern Textures Fahuan Hu 1,2, Guopng Lu 1 *, Zengwen Dong 1 1.School of Mechancal & Electrcal Engneerng, Nanchang Unversty, Nanchang, 330031, Chna; 2. School

More information

MULTISPECTRAL IMAGES CLASSIFICATION BASED ON KLT AND ATR AUTOMATIC TARGET RECOGNITION

MULTISPECTRAL IMAGES CLASSIFICATION BASED ON KLT AND ATR AUTOMATIC TARGET RECOGNITION MULTISPECTRAL IMAGES CLASSIFICATION BASED ON KLT AND ATR AUTOMATIC TARGET RECOGNITION Paulo Quntlano 1 & Antono Santa-Rosa 1 Federal Polce Department, Brasla, Brazl. E-mals: quntlano.pqs@dpf.gov.br and

More information

A Gradient Difference based Technique for Video Text Detection

A Gradient Difference based Technique for Video Text Detection A Gradent Dfference based Technque for Vdeo Text Detecton Palaahnakote Shvakumara, Trung Quy Phan and Chew Lm Tan School of Computng, Natonal Unversty of Sngapore {shva, phanquyt, tancl }@comp.nus.edu.sg

More information

Research Article Improved Encrypted-Signals-Based Reversible Data Hiding Using Code Division Multiplexing and Value Expansion

Research Article Improved Encrypted-Signals-Based Reversible Data Hiding Using Code Division Multiplexing and Value Expansion Securty and Communcaton Networks Volume 2018, Artcle ID 1326235, 9 pages https://do.org/10.1155/2018/1326235 Research Artcle Improved Encrypted-Sgnals-Based Reversble Data Hdng Usng Code Dvson Multplexng

More information

Palmprint Feature Extraction Using 2-D Gabor Filters

Palmprint Feature Extraction Using 2-D Gabor Filters Palmprnt Feature Extracton Usng 2-D Gabor Flters Wa Kn Kong Davd Zhang and Wenxn L Bometrcs Research Centre Department of Computng The Hong Kong Polytechnc Unversty Kowloon Hong Kong Correspondng author:

More information

A Gradient Difference based Technique for Video Text Detection

A Gradient Difference based Technique for Video Text Detection 2009 10th Internatonal Conference on Document Analyss and Recognton A Gradent Dfference based Technque for Vdeo Text Detecton Palaahnakote Shvakumara, Trung Quy Phan and Chew Lm Tan School of Computng,

More information

Sum of Linear and Fractional Multiobjective Programming Problem under Fuzzy Rules Constraints

Sum of Linear and Fractional Multiobjective Programming Problem under Fuzzy Rules Constraints Australan Journal of Basc and Appled Scences, 2(4): 1204-1208, 2008 ISSN 1991-8178 Sum of Lnear and Fractonal Multobjectve Programmng Problem under Fuzzy Rules Constrants 1 2 Sanjay Jan and Kalash Lachhwan

More information

Skew Angle Estimation and Correction of Hand Written, Textual and Large areas of Non-Textual Document Images: A Novel Approach

Skew Angle Estimation and Correction of Hand Written, Textual and Large areas of Non-Textual Document Images: A Novel Approach Angle Estmaton and Correcton of Hand Wrtten, Textual and Large areas of Non-Textual Document Images: A Novel Approach D.R.Ramesh Babu Pyush M Kumat Mahesh D Dhannawat PES Insttute of Technology Research

More information

An Improved User Authentication and Key Agreement Scheme Providing User Anonymity

An Improved User Authentication and Key Agreement Scheme Providing User Anonymity 35 JOURNAL OF ELECTRONIC SCIENCE AND TECHNOLOGY, VOL. 9, NO. 4, DECEMBER 0 An Improved User Authentcaton and Key Agreement Scheme Provdng User Anonymty Ya-Fen Chang and Pe-Yu Chang Abstract When accessng

More information

Security Vulnerabilities of an Enhanced Remote User Authentication Scheme

Security Vulnerabilities of an Enhanced Remote User Authentication Scheme Contemporary Engneerng Scences, Vol. 7, 2014, no. 26, 1475-1482 HIKARI Ltd, www.m-hkar.com http://dx.do.org/10.12988/ces.2014.49186 Securty Vulnerabltes of an Enhanced Remote User Authentcaton Scheme Hae-Soon

More information

PYTHON IMPLEMENTATION OF VISUAL SECRET SHARING SCHEMES

PYTHON IMPLEMENTATION OF VISUAL SECRET SHARING SCHEMES PYTHON IMPLEMENTATION OF VISUAL SECRET SHARING SCHEMES Ruxandra Olmd Faculty of Mathematcs and Computer Scence, Unversty of Bucharest Emal: ruxandra.olmd@fm.unbuc.ro Abstract Vsual secret sharng schemes

More information

Robust and Reversible Relational Database Watermarking Algorithm Based on Clustering and Polar Angle Expansion

Robust and Reversible Relational Database Watermarking Algorithm Based on Clustering and Polar Angle Expansion Robust and Reversble Relatonal Database Watermarkng Algorthm Based on Clusterng and Polar Angle Expanson Zhyong L, Junmn Lu and Wecheng Tao College of Informaton Scence and Engneerng, Hunan Unversty, Changsha,

More information

An Improved Image Segmentation Algorithm Based on the Otsu Method

An Improved Image Segmentation Algorithm Based on the Otsu Method 3th ACIS Internatonal Conference on Software Engneerng, Artfcal Intellgence, Networkng arallel/dstrbuted Computng An Improved Image Segmentaton Algorthm Based on the Otsu Method Mengxng Huang, enjao Yu,

More information

Vol. 5, No. 3 March 2014 ISSN Journal of Emerging Trends in Computing and Information Sciences CIS Journal. All rights reserved.

Vol. 5, No. 3 March 2014 ISSN Journal of Emerging Trends in Computing and Information Sciences CIS Journal. All rights reserved. Journal of Emergng Trends n Computng and Informaton Scences 009-03 CIS Journal. All rghts reserved. http://www.csjournal.org Unhealthy Detecton n Lvestock Texture Images usng Subsampled Contourlet Transform

More information