A Lossless Watermarking Scheme for Halftone Image Authentication
|
|
- Reynold Hampton
- 5 years ago
- Views:
Transcription
1 IJCSNS Internatonal Journal of Computer Scence and Network Securty, VOL.6 No.2B, February A Lossless Watermarkng Scheme for Halftone Image Authentcaton Jeng-Shyang Pan, Hao Luo, and Zhe-Mng Lu, Department of Electronc Engneerng, Natonal Kaohsung Unversty of Appled Scences, Kaohsung, Tawan Harbn Insttute of Technology Shenzhen Graduate School, Shenzhen, Chna Unversty of Freburg, Freburg, Germany Summary Nowadays, halftone mages appear routnely n books, magaznes, prnter outputs, and fax documents. It s desrable to embed data n halftone mages for copyrght protecton and content authentcaton. Ths paper proposes a novel watermarkng scheme for halftone mage authentcaton, explotng mage hash as a fragle watermark. After pxel blockng and orderng, a lookup table s constructed accordng to blocks frequency of occurrence. Watermark embeddng s to dsplace the orgnal blocks wth the correspondng smlar blocks n the lookup table, and n the reverse process watermark s extracted. Some extra blocks are randomly selected wth a secret key for the lookup table embeddng, and the orgnal data of these blocks are also nserted nto the mage. In mage authentcaton, the lookup table s reconstructed frst wth the secret key, and then a smple table-look-up procedure s employed to extract the watermark hash, fnally we only need to compare the watermark hash wth the hash of recovered mage: f they are equal, the orgnal mage suffers no alteraton; otherwse t s changed. As a lossless technque, the orgnal mage can be perfectly recovered by performng the reverse process of the watermark embeddng f the watermarked mage s ntact. It s necessary to keep the content of orgnal host mage unchanged n some specfc applcatons, where content accuracy of the host mage must be guaranteed, e.g. mltary maps, medcal mages, great works of art, etc. As a fragle watermarkng, even one pxel togglng can be detected. Because of the small quantty of watermark, low qualty dstorton s ntroduced to the halftone mage. Experment results demonstrate the effectveness of the scheme. Key words: Halftone mage, Lossless watermarkng, Hash sequence, Image authentcaton 1. Introducton Dgtal halftonng s a technque to transform mult-tone mages nto two-tone mages, e.g. 8-bt grayscale mages nto 1-bt bnary mages. The halftone mages can resemble the orgnal mages when vewng from a dstance by the low-pass flterng n the human vsual system. Most popular halftonng methods can be dvded nto three categores: ordered dtherng [1], error dffuson [2], and drect bnary search [3]. Among these, error dffuson acheves a preferable tradeoff between good vsual qualty and reasonable computatonal complexty. Wth halftone mages wdely used, content authentcaton, changes localzaton and copyrght protecton for ths knd of mages are recevng an ncreasng nterest among researchers wth dgtal watermarkng technques. Many watermarkng technques are proposed for mult-tone mages, and those for halftone mages are developed n recent years. In contrast, qute a small number of authentcaton watermarkng approaches are avalable for halftone mages. In the lterature, most methods cannot perfectly restore the orgnal mage n watermark extracton or detecton. Exstng watermarkng usually ntroduces rreversble degradaton to the host medum. Although the degradaton s slght, t cannot satsfy the requrement of some specfc stuatons, where content accuracy of the host mage must be guaranteed, e.g., mltary maps, medcal mages, great works of art, etc. Therefore, t s qute necessary to develop a lossless watermarkng method for authentcatng halftone mages. However, tll the present tme, there has been lttle attenton pad to the lossless watermarkng technques for halftone mages. Ths paper proposes a watermarkng scheme for halftone mages combnng the above two characterstcs, namely, lossless and for authentcaton purpose. In mage authentcaton, we only need to compare two hash sequences: the extracted watermark hash and the hash of the restored mage. If the two sequences are equal, the halftone mage suffers no alteraton; otherwse t s changed ntentonally or unntentonally. The rest of the paper s organzed as follows. Secton 2 revews the prevous work on halftone mage watermarkng, n partcular for secure authentcaton. Secton 3 extensvely descrbes the proposed scheme ncludng watermark embeddng and extracton, and meanwhle the authentcaton process. In Secton 4, expermental results are presented for the demonstraton of ts effectveness. Secton 5 concludes the paper. 2. Prevous work Manuscrpt revsed January 2006.
2 148 IJCSNS Internatonal Journal of Computer Scence and Network Securty, VOL.6 No.2B, February 2006 Dfferent from grayscale or color mages, there are manly three challenges to embed data n halftone mages. The frst one s less nformaton redundancy for each pxel value has only one bt. Consequently many watermarkng approaches cannot be drectly transplanted to halftone mages. Another challenge s vsual qualty degradaton. To nsert data n halftone mages, change of the pxel value s ether from black to whte or from whte to black. Usually, human vsual system s senstve to the abrupt change, e.g. the whte cross and the black cross. The thrd challenge s lower embeddng capacty. Hgh capacty s one of the key factors to evaluate the performance of watermarkng technques. Actually, for halftone mages, ths challenge s closely related to the former two challenges. It s expected that a large quantty of data cannot be embedded nto halftone mages consderng vsual qualty degradaton, for less nformaton redundancy can be explored. Avalable data hdng methods for halftone mages can be dvded nto three classes: (1) Pxel-based: ths knd of methods s to change the values of ndvdual pxels, usually randomly selected [4] [5]. (2) Block-based: these methods dvde the host mage nto blocks and modfy characterstc of some blocks [6] [7]. (3) Hybrd-based: they nsert data by combnng the characterstcs of pxel-based and block-based [8]. Km and Aff ntroduce an authentcaton watermark AWST (authentcaton watermarkng by self togglng) for halftone mages n [9]. It conssts of followng steps: choosng a set of pseudo-random pxels n the mage, clearng them, computng the message authentcaton code (MAC) or the dgtal sgnature (DS) of the random-pxels-cleared mage, and nsertng the resultng code nto the selected random pxels. One dsadvantage of the AWST s t cannot obtan the orgnal mage n watermark extracton and mage authentcaton when the host mage s not changed, because t clears some pxels randomly selected and never can be recovered. However, our scheme overcomes ths problem: the host mage can be perfectly restored as long as t suffers no alteraton, otherwse even a sngle pxel change can be detected. The scheme can only smply detect the change wthout spatally locatng them. Fg. 1 Block dagram of watermark embeddng. 3.1 Watermark embeddng The block dagram of watermark embeddng s as shown n Fg. 1, and each step s detaled descrbed below. Watermark generaton Our scheme explots mage hash as a fragle watermark. Image hashng s known as the problem of mappng an mage to a short bnary strng. Image hash functon has the propertes that perceptually dentcal mages have the same hash value wth hgh probablty, whle perceptually dfferent mages have ndependent hash values. In addton, the hash functon s secure, so that an attacker cannot predct the hash value of a known mage. Image hashng s one-way, collson-free and relatvely easy to compute for any gven mage. Hence, the watermark can be vewed as adaptve for ts senstvty to change of the mage. Our scheme generates the watermark hash W H of the orgnal mage usng hash functons. Suppose W H s an L-bt 0-1 sequence, thus we need L blocks to embed data for each block can be nserted nto 1-bt data. Image blockng The scheme starts wth dvdng the halftone mage nto dsont pxel blocks. Suppose the sze of the halftone mage I and a block B are M N and m n respectvely, and I s segmented nto b blocks B 1, B 2, B b. Snce each pxel s ether black or whte, an m n block has totally 2 m n dfferent patterns. Some patterns never occur n I, whle some occur many tmes. 3. Proposed scheme Exstng watermarkng technques [10] can be classfed nto three categores: robust, fragle and sem-fragle. Among them, fragle watermarks are easly corrupted by mage processng operatons, and thus often used for checkng mage ntegrty and authentcaton. Authentcaton watermark s a hdden data nserted nto an mage that can be appled to detect any unauthorzed change of the mage. Our scheme s a block-based method. Fg. 2 An example of an orgnal block and ts smlar blocks. Block classfcaton and orderng Ths step ams to select approprate blocks to embed data. To all blocks n I, we count ther occurrence respectvely, and then rank the frequency of occurrence. Sorted n descendng order, suppose t 1, t 2, t ( 2 m n ) denotes the occurrence tmes
3 IJCSNS Internatonal Journal of Computer Scence and Network Securty, VOL.6 No.2B, February of block pattern p 1, p 2, p, respectvely. It s clear that Formula (1) s satsfed. t = b (1) l l= 1 Lookup table constructon A lookup table T s made up of orgnal blocks O 1, O 2, O u, smlar blocks S 1, S 2, S u, and frequency of occurrence of O 1, O 2, O u. S (1 u) s the correspondng smlar block of O. Smlar blocks that never occur n the mage are used to dsplace orgnal blocks for watermark embeddng. In the context, two blocks wth the same sze are consdered smlar f the Hammng dstance between them s 1, namely, only one pxel value s dfferent. Therefore each block has 2 m n smlar blocks. As an example a 4 4 block and ts 16 smlar blocks are shown n Fg. 2. Accordng to the frequency of occurrence, we select k block patterns wth hghest k occurrence t 1, t 2, t k as a canddate block set. To a block n the set, f all of ts smlar ones occur at least once n I, then the block s dscarded from the canddate set. If one or more smlar blocks do not occur, we randomly select one as ts smlar block. All canddate blocks are nvestgated lke ths, and orgnal blocks and correspondng smlar blocks are recorded n T. Besdes ths, we need to record the frequency of occurrence for computng embeddng capacty. So far a lookup table s constructed. It s essental that each smlar block n T must be dfferent from any other blocks. More detals of the lookup table constructon can be seen n [11]. Fg. 3 An example of a lookup table. As an example shown n Fg. 3, the lookup table s constructed on the halftone Lena mage, wth the sze of the Lena and a block and 4 4 pxels, respectvely. Only 5 blocks wth hghest frequency of occurrence and ther smlar blocks are gven. Watermark embeddng To embed data, we compare the block B (1 b) wth O 1, O 2, O u one by one. If B s the same as O, 1-bt data can be nserted wth the rule: If 0 s to be embedded, we do not change B, f 1 s to be embedded, we dsplace B wth S. The operaton as shown n Formula (2) s repeated for all blocks B 1, B 2, B b. B = O f WH = 0 B = S f WH = 1 Overhead nformaton embeddng In [11], the lookup table needs extra storage space for watermark embeddng and extracton. Snce dfferent mage has dfferent lookup table, no unversal table s sutable for all mages. Besdes, the lookup table s also need to be protected. Our scheme overcomes the dsadvantage successfully by embeddng the lookup table n the host mage as overhead nformaton. The overhead nformaton s embedded as follows. () Use a pseudo-random number generator wth a secret key K to choose a set of non-repeatng blocks G n I. Note these blocks must not concde wth the watermarked blocks. () Embed G n I. An m n block of G s rearranged to a 0-1 strng and embedded as the same way of watermark embeddng. The process s repeated for all blocks n G. Snce a block dsplacement can embed one bt, Formula (3) must be satsfed. In Formula (3), 2umn s the total bts of the lookup table T. k l= 1 (2) tl WH+ 2umn (1 k ) (3) () Dsplace blocks n G wth blocks n T drectly. 3.2 Watermark extracton and mage authentcaton The block dagram of watermark extracton and mage authentcaton s as shown n Fg. 4. Lookup table reconstructon The watermarked mage I s segmented nto m n blocks B (0 b). Before watermark extracton, the lookup table must be reconstructed frst. We use the same key K to fnd out the blocks G, and thus T can be recovered by extractng G drectly. Watermark extracton Let W denotes the nformaton H extracted. Accordng to the lookup table T the watermark s extracted as shown n Formula (4). We compare the block B (1 b) wth blocks n T. If B s the same as O (1 u), 0 s extracted; f B s the same as S (1 u), 1 s extracted. W H = 0 f B = O W H = 1 f B = S (4)
4 150 IJCSNS Internatonal Journal of Computer Scence and Network Securty, VOL.6 No.2B, February 2006 The extracted nformaton W conssts of the extracted H watermark H 1 and the orgnal data of G. If 0 extracted, we do not change the block; f 1 extracted, we dsplace S wth B. After we recover G, the restored mage R s obtaned. Image authentcaton The same hash functon s used to compute the hash sequence H2 of R. Thus mage authentcaton s reduced to a task of comparng H1 and H2. On one hand, f the host mage I suffers no alteraton, H1 s equal to H2, otherwse dfferent. On the other hand, I suffers no alteraton f H1 s equal to H2. In a word, f H1 s dfferent from H2, I s changed, at least a sngle pxel. Fg. 4 Block dagram of watermark extracton and mage authentcaton. Fg. 6 Expermental results on halftone Baboon Image. (a) Orgnal Baboon, (b) Watermarked Baboon wthout alteraton, (c) Restored Baboon of (b), (d) Watermarked Baboon wth alteraton, (e) Restored Baboon of (d), (f) Orgnal watermark, (g) Watermark extracted from (b), (h) hash of (c), () Watermark extracted from (d), () hash of (e). 4. Expermental results Fg. 5 Expermental results on halftone Lena Image. (a) Orgnal Lena, (b) Watermarked Lena wthout alteraton, (c) Restored Lena of (b), (d) Watermarked Lena wth alteraton, (e) Restored Lena of (d), (f) Orgnal watermark, (g) Watermark extracted from (b), (h) hash of (c), () Watermark extracted from (d), () hash of (e). In the experment, halftone Lena mage and Baboon mage are selected to test the effectveness of the method. As shown n Fg. 5(a), the halftone Lena mage s dvded nto 4 4 blocks. The orgnal watermark,.e. the hash sequence of Lena, s computed by the MD5 hash functon. After translatng the strng nto 0-1 sequence, 128-bt dgest s obtaned. In authentcaton, we compare the watermark extracted from the watermarked mage, and the hash sequence computed from the restored mage. When the two
5 IJCSNS Internatonal Journal of Computer Scence and Network Securty, VOL.6 No.2B, February sequences are equal, as shown n Fg. 5(g) and Fg. 5(h), we can confrm the watermarked Lena suffers no alteraton. Both of them are equal to the orgnal watermark, as shown n Fg. 5(e). Whle f the watermarked Lena s tampered by a mark KUAS HIT (Fg. 5(d)), the two sequences are dfferent, as shown n Fg. 5() and Fg. 5(). Therefore, we can make a udgment by vrtue of the two sequences are equal or not: f equal, the mage suffers no alteraton; otherwse changed. The Baboon mage s also dvded nto 4 4 blocks. As shown n Fg. 6, expermental results also verfy effectveness of the scheme. 4. Concluson Ths paper presents a lossless watermarkng scheme for halftone mage authentcaton. The hash sequence of the mage s embedded as an adaptve fragle watermark. To udge weather the orgnal mage s changed or not, we only need to compare the extracted watermark and the hash sequence of the restored mage. If they are exactly the same, the mage suffers no alteraton; otherwse t s changed. As long as the watermarked mage s not unauthorzed changed, the orgnal mage can be perfected recovered. Besdes, no nformaton needs to be saved except a secret key. Acknowledgment The authors would lke to express ther thanks to Dr. Ban Yang for hs valuable advce. References [1] R. A. Ulchney, Dgtal Halftonng, Cambrdge, MA: MIT Press, [2] R. W. Floyd and L. Stenberg, An adaptve algorthm for spatal gray scale, Proc. SID 75 Dgest. Socety for nformaton Dsplay, pp , [3] D. Leberman and J. Allebach, Dgtal halftonng usng drect bnary search, Proc. of st IEEE Int. Conf. on Hgh technology, pp , September 1996 [4] M.S. Fu, and O.C. Au, Data Hdng by Smart Par Togglng for Halftone Images, IEEE Int Conf Acoustcs Speech and Sgnal Processng, vol. 4, pp , 2000 [5] M.S. Fu, and O.C. Au, Data Hdng Watermarkng for Halftone Images, IEEE Trans Image Processng, pp [6] Z. Baharav, and D. Shaked, Watermarkng of Dther Halftone Images, Hewlett-Packard Labs Tech Rep, HPL-98-32, [7] H. Z. Hel-Or, Watermarkng and Copyrght Labelng of Prnted Images, Journal of Electronc Imagng, pp [8] S.C. Pe, and J.M. Guo, Hybrd Pxel-Based Data Hdng and Block-Based Watermarkng for Error-Dffused Halftone Images, IEEE Trans Crcuts and Systems for Vdeo Technology, pp , 2003 [9] H.Y. Km, and A. Aff, Secure Authentcaton Watermarkng for Bnary Images, Proc Brazlan Symp on Computer Graphcs and Image Processng, pp , 2003 [10] J. S. Pan, H. C. Huang and L. C. Jan, Intellgent Watermarkng Technques, World Scentfc, [11] P. S. Lao, J. S. Pan, Y. H. Chen and B. Y. Lao, A Lossless Watermarkng Technque for Halftone Image, Internatonal Workshop on Intellgent Informaton Hdng and Multmeda Sgnal Processng, Melbourne, Australa, May 15, Jeng-Shyang Pan receved the B. S. degree n Electronc Engneerng from the Natonal Tawan Unversty of Scence and Technology, Tawan n 1986, the M. S. degree n Communcaton Engneerng from the Natonal Chao Tung Unversty, Tawan n 1988, and the Ph.D. degree n Electrcal Engneerng from the Unversty of Ednburgh, U.K. n Currently, he s a Professor n the Department of Electronc Engneerng, Natonal Kaohsung Unversty of Appled Scences, Tawan. Professor Pan has publshed more than 50 ournal papers and 120 conference papers. He onts the edtoral board for LNCS Transactons on Data Hdng and Multmeda Securty, Sprnger, Internatonal Journal of Knowledge-Based Intellgent Engneerng Systems, IOS Press, and Internatonal Journal of Hybrd Intellgent System, Advanced Knowledge Internatonal. He s the Co-Edtors-n-Chef for Internatonal Journal of Innovatve Computng, Informaton and Control. Hs current research nterests nclude data mnng, nformaton securty and mage processng. Hao Luo receved the B. S. degree and the M. S. degree from Harbn Insttute of Technology (HIT), Harbn, Chna n 2002 and 2004, respectvely. He s a Ph.D canddate n the School of Electronc Engneerng n HIT. Hs research nterests are manly n nformaton securty and mesh retreval. Zhe-Mng Lu receved the B.S., M.S. and Ph. D. degrees n Electrcal Engneerng from Harbn Insttute of Technology n 1995, 1997 and 2001, respectvely. He was the Alexander von Humboldt Research Fellow n Unversty of Freburg n Germany, from Oct., 2004 to Jan He has publshed more than 110 papers and four books. He has been program commttee members n several nternatonal conferences. He s now the Professor and Drector of the Vsual Informaton Analyss and Processng Research Center, Harbn Insttute of Technology Shenzhen Graduate School. Hs research nterests are mage processng, pattern recognton, nformaton hdng and vsual nformaton retreval.
A Binarization Algorithm specialized on Document Images and Photos
A Bnarzaton Algorthm specalzed on Document mages and Photos Ergna Kavalleratou Dept. of nformaton and Communcaton Systems Engneerng Unversty of the Aegean kavalleratou@aegean.gr Abstract n ths paper, a
More informationRelated-Mode Attacks on CTR Encryption Mode
Internatonal Journal of Network Securty, Vol.4, No.3, PP.282 287, May 2007 282 Related-Mode Attacks on CTR Encrypton Mode Dayn Wang, Dongda Ln, and Wenlng Wu (Correspondng author: Dayn Wang) Key Laboratory
More informationData Hiding and Image Authentication for Color-Palette Images
Data Hdng and Image Authentcaton for Color-Palette Images Chh-Yang Yn ( 殷志揚 ) and Wen-Hsang Tsa ( 蔡文祥 ) Department of Computer & Informaton Scence Natonal Chao Tung Unversty 00 Ta Hsueh Rd., Hsnchu, Tawan
More informationEnhanced Watermarking Technique for Color Images using Visual Cryptography
Informaton Assurance and Securty Letters 1 (2010) 024-028 Enhanced Watermarkng Technque for Color Images usng Vsual Cryptography Enas F. Al rawashdeh 1, Rawan I.Zaghloul 2 1 Balqa Appled Unversty, MIS
More informationHybrid Non-Blind Color Image Watermarking
Hybrd Non-Blnd Color Image Watermarkng Ms C.N.Sujatha 1, Dr. P. Satyanarayana 2 1 Assocate Professor, Dept. of ECE, SNIST, Yamnampet, Ghatkesar Hyderabad-501301, Telangana 2 Professor, Dept. of ECE, AITS,
More informationImprovement of Spatial Resolution Using BlockMatching Based Motion Estimation and Frame. Integration
Improvement of Spatal Resoluton Usng BlockMatchng Based Moton Estmaton and Frame Integraton Danya Suga and Takayuk Hamamoto Graduate School of Engneerng, Tokyo Unversty of Scence, 6-3-1, Nuku, Katsuska-ku,
More informationKey-Selective Patchwork Method for Audio Watermarking
Internatonal Journal of Dgtal Content Technology and ts Applcatons Volume 4, Number 4, July 2010 Key-Selectve Patchwork Method for Audo Watermarkng 1 Ch-Man Pun, 2 Jng-Jng Jang 1, Frst and Correspondng
More informationContent Based Image Retrieval Using 2-D Discrete Wavelet with Texture Feature with Different Classifiers
IOSR Journal of Electroncs and Communcaton Engneerng (IOSR-JECE) e-issn: 78-834,p- ISSN: 78-8735.Volume 9, Issue, Ver. IV (Mar - Apr. 04), PP 0-07 Content Based Image Retreval Usng -D Dscrete Wavelet wth
More informationSemi-Fragile Watermarking Scheme for Authentication of JPEG Images
Tamkang Journal of Scence and Engneerng, Vol. 10, No 1, pp. 5766 (2007) 57 Sem-Fragle Watermarkng Scheme for Authentcaton of JPEG Images Chh-Hung n 1 *, Tung-Shh Su 2 and Wen-Shyong Hseh 2,3 1 Department
More informationCluster Analysis of Electrical Behavior
Journal of Computer and Communcatons, 205, 3, 88-93 Publshed Onlne May 205 n ScRes. http://www.scrp.org/ournal/cc http://dx.do.org/0.4236/cc.205.350 Cluster Analyss of Electrcal Behavor Ln Lu Ln Lu, School
More informationA Fast Content-Based Multimedia Retrieval Technique Using Compressed Data
A Fast Content-Based Multmeda Retreval Technque Usng Compressed Data Borko Furht and Pornvt Saksobhavvat NSF Multmeda Laboratory Florda Atlantc Unversty, Boca Raton, Florda 3343 ABSTRACT In ths paper,
More informationResearch of Multiple Text Watermarks Technique in Electric Power System Texts
Sensors & Transducers 203 by IFSA http://www.sensorsportal.com Research of Multple Text atermarks Technque n Electrc Power System Texts Xao-X XING, Qng CHEN, 2 Lan-X FU School of Optcal-Electrcal and Computer
More informationArticle Reversible Dual-Image-Based Hiding Scheme Using Block Folding Technique
Artcle Reversble Dual-Image-Based Hdng Scheme Usng Block Foldng Technque Tzu-Chuen Lu, * and Hu-Shh Leng Department of Informaton Management, Chaoyang Unversty of Technology, Tachung 4349, Tawan Department
More informationRobust Blind Video Watermark Algorithm in Transform Domain Combining with 3D Video Correlation
JOURNAL OF MULTIMEDIA, VOL. 8, NO. 2, APRIL 2013 161 Robust Blnd Vdeo Watermark Algorthm n Transform Doman Combnng wth 3D Vdeo Correlaton DING Ha-yang 1,3 1. Informaton Securty Center, Bejng Unversty of
More informationAvailable online at Available online at Advanced in Control Engineering and Information Science
Avalable onlne at wwwscencedrectcom Avalable onlne at wwwscencedrectcom Proceda Proceda Engneerng Engneerng 00 (2011) 15000 000 (2011) 1642 1646 Proceda Engneerng wwwelsevercom/locate/proceda Advanced
More informationAn Optimal Algorithm for Prufer Codes *
J. Software Engneerng & Applcatons, 2009, 2: 111-115 do:10.4236/jsea.2009.22016 Publshed Onlne July 2009 (www.scrp.org/journal/jsea) An Optmal Algorthm for Prufer Codes * Xaodong Wang 1, 2, Le Wang 3,
More informationSecurity Enhanced Dynamic ID based Remote User Authentication Scheme for Multi-Server Environments
Internatonal Journal of u- and e- ervce, cence and Technology Vol8, o 7 0), pp7-6 http://dxdoorg/07/unesst087 ecurty Enhanced Dynamc ID based Remote ser Authentcaton cheme for ult-erver Envronments Jun-ub
More informationResearch Article High Capacity Reversible Watermarking for Audio by Histogram Shifting and Predicted Error Expansion
e Scentfc World Journal, Artcle ID 656251, 7 pages http://dx.do.org/1.1155/214/656251 Research Artcle Hgh Capacty Reversble Watermarkng for Audo by Hstogram Shftng and Predcted Error Expanson Fe Wang,
More informationA Robust Webpage Information Hiding Method Based on the Slash of Tag
Advanced Engneerng Forum Onlne: 2012-09-26 ISSN: 2234-991X, Vols. 6-7, pp 361-366 do:10.4028/www.scentfc.net/aef.6-7.361 2012 Trans Tech Publcatons, Swtzerland A Robust Webpage Informaton Hdng Method Based
More informationA NEW AUDIO WATERMARKING METHOD BASED
A NEW AUDIO WATERMARKING METHOD BASED ON DISCRETE COSINE TRANSFORM WITH A GRAY IMAGE Mohammad Ibrahm Khan 1, Md. Iqbal Hasan Sarker 2, Kaushk Deb 3 and Md. Hasan Furhad 4 1,2,3 Department of Computer Scence
More informationLearning the Kernel Parameters in Kernel Minimum Distance Classifier
Learnng the Kernel Parameters n Kernel Mnmum Dstance Classfer Daoqang Zhang 1,, Songcan Chen and Zh-Hua Zhou 1* 1 Natonal Laboratory for Novel Software Technology Nanjng Unversty, Nanjng 193, Chna Department
More informationA Hybrid Semi-Blind Gray Scale Image Watermarking Algorithm Based on DWT-SVD using Human Visual System Model
A Hybrd Sem-Blnd Gray Scale Image Watermarkng Algorthm Based on DWT-SVD usng Human Vsual System Model Rajesh Mehta r Scence & Engneerng, USICT Guru Gobnd Sngh Indrarprastha Unversty New Delh, Inda rajesh00ust@gmal.com
More informationEnhanced AMBTC for Image Compression using Block Classification and Interpolation
Internatonal Journal of Computer Applcatons (0975 8887) Volume 5 No.0, August 0 Enhanced AMBTC for Image Compresson usng Block Classfcaton and Interpolaton S. Vmala Dept. of Comp. Scence Mother Teresa
More informationShape-adaptive DCT and Its Application in Region-based Image Coding
Internatonal Journal of Sgnal Processng, Image Processng and Pattern Recognton, pp.99-108 http://dx.do.org/10.14257/sp.2014.7.1.10 Shape-adaptve DCT and Its Applcaton n Regon-based Image Codng Yamn Zheng,
More informationResearch and Application of Fingerprint Recognition Based on MATLAB
Send Orders for Reprnts to reprnts@benthamscence.ae The Open Automaton and Control Systems Journal, 205, 7, 07-07 Open Access Research and Applcaton of Fngerprnt Recognton Based on MATLAB Nng Lu* Department
More informationA New Feature of Uniformity of Image Texture Directions Coinciding with the Human Eyes Perception 1
A New Feature of Unformty of Image Texture Drectons Concdng wth the Human Eyes Percepton Xng-Jan He, De-Shuang Huang, Yue Zhang, Tat-Mng Lo 2, and Mchael R. Lyu 3 Intellgent Computng Lab, Insttute of Intellgent
More informationHigh Payload Reversible Data Hiding Scheme Using Difference Segmentation and Histogram Shifting
JOURNAL OF ELECTRONIC SCIENCE AND TECHNOLOGY, VOL. 11, NO. 1, MARCH 2013 9 Hgh Payload Reversble Data Hdng Scheme Usng Dfference Segmentaton and Hstogram Shftng Yung-Chen Chou and Huang-Chng L Abstract
More informationParallelism for Nested Loops with Non-uniform and Flow Dependences
Parallelsm for Nested Loops wth Non-unform and Flow Dependences Sam-Jn Jeong Dept. of Informaton & Communcaton Engneerng, Cheonan Unversty, 5, Anseo-dong, Cheonan, Chungnam, 330-80, Korea. seong@cheonan.ac.kr
More informationA fast algorithm for color image segmentation
Unersty of Wollongong Research Onlne Faculty of Informatcs - Papers (Arche) Faculty of Engneerng and Informaton Scences 006 A fast algorthm for color mage segmentaton L. Dong Unersty of Wollongong, lju@uow.edu.au
More informationA Secured Method for Image Steganography Based On Pixel Values
A Secured Method for Image Steganography Based On Pxel Values Tarun Gulat #, Sanskrt Gupta * # Assocate Professor, Electroncs and Communcaton Engneerng Department, MMEC, M.M.U., Mullana, Ambala, Haryana,
More informationUsing Fuzzy Logic to Enhance the Large Size Remote Sensing Images
Internatonal Journal of Informaton and Electroncs Engneerng Vol. 5 No. 6 November 015 Usng Fuzzy Logc to Enhance the Large Sze Remote Sensng Images Trung Nguyen Tu Huy Ngo Hoang and Thoa Vu Van Abstract
More informationLoad Balancing for Hex-Cell Interconnection Network
Int. J. Communcatons, Network and System Scences,,, - Publshed Onlne Aprl n ScRes. http://www.scrp.org/journal/jcns http://dx.do.org/./jcns.. Load Balancng for Hex-Cell Interconnecton Network Saher Manaseer,
More informationTsinghua University at TAC 2009: Summarizing Multi-documents by Information Distance
Tsnghua Unversty at TAC 2009: Summarzng Mult-documents by Informaton Dstance Chong Long, Mnle Huang, Xaoyan Zhu State Key Laboratory of Intellgent Technology and Systems, Tsnghua Natonal Laboratory for
More informationLocal Quaternary Patterns and Feature Local Quaternary Patterns
Local Quaternary Patterns and Feature Local Quaternary Patterns Jayu Gu and Chengjun Lu The Department of Computer Scence, New Jersey Insttute of Technology, Newark, NJ 0102, USA Abstract - Ths paper presents
More informationProblem Definitions and Evaluation Criteria for Computational Expensive Optimization
Problem efntons and Evaluaton Crtera for Computatonal Expensve Optmzaton B. Lu 1, Q. Chen and Q. Zhang 3, J. J. Lang 4, P. N. Suganthan, B. Y. Qu 6 1 epartment of Computng, Glyndwr Unversty, UK Faclty
More informationPrivate Information Retrieval (PIR)
2 Levente Buttyán Problem formulaton Alce wants to obtan nformaton from a database, but she does not want the database to learn whch nformaton she wanted e.g., Alce s an nvestor queryng a stock-market
More informationDetection of an Object by using Principal Component Analysis
Detecton of an Object by usng Prncpal Component Analyss 1. G. Nagaven, 2. Dr. T. Sreenvasulu Reddy 1. M.Tech, Department of EEE, SVUCE, Trupath, Inda. 2. Assoc. Professor, Department of ECE, SVUCE, Trupath,
More informationA Fast Visual Tracking Algorithm Based on Circle Pixels Matching
A Fast Vsual Trackng Algorthm Based on Crcle Pxels Matchng Zhqang Hou hou_zhq@sohu.com Chongzhao Han czhan@mal.xjtu.edu.cn Ln Zheng Abstract: A fast vsual trackng algorthm based on crcle pxels matchng
More informationFEATURE EXTRACTION. Dr. K.Vijayarekha. Associate Dean School of Electrical and Electronics Engineering SASTRA University, Thanjavur
FEATURE EXTRACTION Dr. K.Vjayarekha Assocate Dean School of Electrcal and Electroncs Engneerng SASTRA Unversty, Thanjavur613 41 Jont Intatve of IITs and IISc Funded by MHRD Page 1 of 8 Table of Contents
More informationEdge Detection in Noisy Images Using the Support Vector Machines
Edge Detecton n Nosy Images Usng the Support Vector Machnes Hlaro Gómez-Moreno, Saturnno Maldonado-Bascón, Francsco López-Ferreras Sgnal Theory and Communcatons Department. Unversty of Alcalá Crta. Madrd-Barcelona
More informationTN348: Openlab Module - Colocalization
TN348: Openlab Module - Colocalzaton Topc The Colocalzaton module provdes the faclty to vsualze and quantfy colocalzaton between pars of mages. The Colocalzaton wndow contans a prevew of the two mages
More informationRobust Video Watermarking Using Image Normalization, Motion Vector and Perceptual Information
Robust Vdeo Watermarkng Usng Image ormalzaton, Moton Vector and Perceptual Informaton Cedllo-Hernández Antono 1, Cedllo-Hernández Manuel 1, akano-myatake Marko 1, García-Vázquez Mreya S. 2 1 Postgraduate
More informationReversible Dual-Image-Based Hiding Scheme Using Block Folding Technique
S S symmetry Artcle Reversble Dual-Image-Based Hdng Scheme Usng Block Foldng Technque Tzu-Chuen Lu Tzu-Chuen Lu 1, 1, * and Hu-Shh Leng * ID and Hu-Shh Leng 1 Department Informaton Management, Chaoyang
More informationAdaptive digital watermarking of images using Genetic Algorithm
Adaptve dgtal watermarkng of mages usng Genetc Algorthm Bushra Skander, Muhammad Ishtaq, M. Arfan Jaffar, Muhammad Tarq, Anwar M. Mrza Department of Computer Scence, Natonal Unversty of Computer and Emergng
More informationPCA Based Gait Segmentation
Honggu L, Cupng Sh & Xngguo L PCA Based Gat Segmentaton PCA Based Gat Segmentaton Honggu L, Cupng Sh, and Xngguo L 2 Electronc Department, Physcs College, Yangzhou Unversty, 225002 Yangzhou, Chna 2 Department
More informationA Deflected Grid-based Algorithm for Clustering Analysis
A Deflected Grd-based Algorthm for Clusterng Analyss NANCY P. LIN, CHUNG-I CHANG, HAO-EN CHUEH, HUNG-JEN CHEN, WEI-HUA HAO Department of Computer Scence and Informaton Engneerng Tamkang Unversty 5 Yng-chuan
More informationParallel Inverse Halftoning by Look-Up Table (LUT) Partitioning
Parallel Inverse Halftonng by Look-Up Table (LUT) Parttonng Umar F. Sddq and Sadq M. Sat umar@ccse.kfupm.edu.sa, sadq@kfupm.edu.sa KFUPM Box: Department of Computer Engneerng, Kng Fahd Unversty of Petroleum
More informationAn Image Compression Algorithm based on Wavelet Transform and LZW
An Image Compresson Algorthm based on Wavelet Transform and LZW Png Luo a, Janyong Yu b School of Chongqng Unversty of Posts and Telecommuncatons, Chongqng, 400065, Chna Abstract a cylpng@63.com, b y27769864@sna.cn
More informationProblem Set 3 Solutions
Introducton to Algorthms October 4, 2002 Massachusetts Insttute of Technology 6046J/18410J Professors Erk Demane and Shaf Goldwasser Handout 14 Problem Set 3 Solutons (Exercses were not to be turned n,
More informationPattern Recognition 43 (2010) Contents lists available at ScienceDirect. Pattern Recognition. journal homepage:
Pattern Recognton 43 (2010) 397 -- 404 Contents lsts avalable at ScenceDrect Pattern Recognton ournal homepage: www.elsever.com/locate/pr Secret mage sharng based on cellular automata and steganography
More informationA Modified Median Filter for the Removal of Impulse Noise Based on the Support Vector Machines
A Modfed Medan Flter for the Removal of Impulse Nose Based on the Support Vector Machnes H. GOMEZ-MORENO, S. MALDONADO-BASCON, F. LOPEZ-FERRERAS, M. UTRILLA- MANSO AND P. GIL-JIMENEZ Departamento de Teoría
More informationA Clustering Algorithm for Key Frame Extraction Based on Density Peak
Journal of Computer and Communcatons, 2018, 6, 118-128 http://www.scrp.org/ournal/cc ISSN Onlne: 2327-5227 ISSN Prnt: 2327-5219 A Clusterng Algorthm for Key Frame Extracton Based on Densty Peak Hong Zhao
More informationAn Image Fusion Approach Based on Segmentation Region
Rong Wang, L-Qun Gao, Shu Yang, Yu-Hua Cha, and Yan-Chun Lu An Image Fuson Approach Based On Segmentaton Regon An Image Fuson Approach Based on Segmentaton Regon Rong Wang, L-Qun Gao, Shu Yang 3, Yu-Hua
More informationA Background Subtraction for a Vision-based User Interface *
A Background Subtracton for a Vson-based User Interface * Dongpyo Hong and Woontack Woo KJIST U-VR Lab. {dhon wwoo}@kjst.ac.kr Abstract In ths paper, we propose a robust and effcent background subtracton
More informationEditorial Manager(tm) for International Journal of Pattern Recognition and
Artfcal Intellgence Edtoral Manager(tm) for Internatonal Journal of Pattern Recognton and Manuscrpt Draft Manuscrpt Number: Ttle: TEXT LOCALIZATION IN COMPLEX COLOR DOCUMENTS Artcle Type: Research Paper
More informationVISUAL cryptography (VC) is a technique that encrypts a
4336 IEEE TRANSACTIONS ON IMAGE PROCESSING, VOL. 23, NO. 10, OCTOBER 2014 Sharng Vsual Secrets n Sngle Image Random Dot Stereograms Ka-Hu Lee and Pe-Lng Chu Abstract Vsual cryptography schemes (VCSs generate
More informationThe Research of Support Vector Machine in Agricultural Data Classification
The Research of Support Vector Machne n Agrcultural Data Classfcaton Le Sh, Qguo Duan, Xnmng Ma, Me Weng College of Informaton and Management Scence, HeNan Agrcultural Unversty, Zhengzhou 45000 Chna Zhengzhou
More informationResearch Article Hamming Code Based Watermarking Scheme for 3D Model Verification
Mathematcal Problems n Engneerng, Artcle ID 241093, 7 pages http://dx.do.org/10.1155/2014/241093 Research Artcle Hammng Code Based Watermarkng Scheme for 3D Model Verfcaton Jen-Tse Wang, 1 Y-Chng Chang,
More informationAn efficient method to build panoramic image mosaics
An effcent method to buld panoramc mage mosacs Pattern Recognton Letters vol. 4 003 Dae-Hyun Km Yong-In Yoon Jong-Soo Cho School of Electrcal Engneerng and Computer Scence Kyungpook Natonal Unv. Abstract
More informationResearch in Algorithm of Image Processing Used in Collision Avoidance Systems
Sensors & Transducers, Vol 59, Issue, November 203, pp 330-336 Sensors & Transducers 203 by IFSA http://wwwsensorsportalcom Research n Algorthm of Image Processng Used n Collson Avodance Systems Hu Bn
More informationDigital Video Watermarking using Discrete Wavelet Transform and Principal Component Analysis
Internatonal Journal of Wsdom Based Computng, Vol. 1 (2), August 2011 7 Dgtal Vdeo Watermarkng usng Dscrete Wavelet Transform and Prncpal Component Analyss Sanjana Snha, Prajnat Bardhan, Swarnal Pramanck,
More informationIdentify the Attack in Embedded Image with Steganalysis Detection Method by PSNR and RGB Intensity
Internatonal Journal of Computer Systems (ISSN: 394-1065), Volume 03 Issue 07, July, 016 Avalable at http://www.jcsonlne.com/ Identfy the Attack n Embedded Image wth Steganalyss Detecton Method by PSNR
More informationRobust Watermarking for Text Images Based on Arnold Scrambling and DWT-DCT
Internatonal Conference on Mechatroncs Electronc Industral and Control Engneerng (MEIC 015) Robust Watermarkng for Text Images Based on Arnold Scramblng and DWT-DCT Fan Wu College of Informaton Scence
More informationMobile Application Security for Video Streaming Authentication and Data Integrity Combining Digital Signature and Watermarking Techniques
Moble Applcaton Securty for Vdeo Streamng Authentcaton and Data Integrty Combnng Dgtal Sgnature and Watermarkng Technques Stefano Chessa, Roberto D Petro, Erna Ferro, Gaetano Gunta, Gabrele Olger ISTI-CNR,
More informationTerm Weighting Classification System Using the Chi-square Statistic for the Classification Subtask at NTCIR-6 Patent Retrieval Task
Proceedngs of NTCIR-6 Workshop Meetng, May 15-18, 2007, Tokyo, Japan Term Weghtng Classfcaton System Usng the Ch-square Statstc for the Classfcaton Subtask at NTCIR-6 Patent Retreval Task Kotaro Hashmoto
More informationIAJIT First Online Publication
Content Protecton n Vdeo Data Based on Robust Dgtal Watermarkng Resstant to Intentonal and Unntentonal Attacks Mad Masoum and Shervn Amr Department of Electrcal Engneerng, Islamc Azad Unversty Qazvn Branch,
More informationPositive Semi-definite Programming Localization in Wireless Sensor Networks
Postve Sem-defnte Programmng Localzaton n Wreless Sensor etworks Shengdong Xe 1,, Jn Wang, Aqun Hu 1, Yunl Gu, Jang Xu, 1 School of Informaton Scence and Engneerng, Southeast Unversty, 10096, anjng Computer
More informationBrushlet Features for Texture Image Retrieval
DICTA00: Dgtal Image Computng Technques and Applcatons, 1 January 00, Melbourne, Australa 1 Brushlet Features for Texture Image Retreval Chbao Chen and Kap Luk Chan Informaton System Research Lab, School
More informationThe Research of Ellipse Parameter Fitting Algorithm of Ultrasonic Imaging Logging in the Casing Hole
Appled Mathematcs, 04, 5, 37-3 Publshed Onlne May 04 n ScRes. http://www.scrp.org/journal/am http://dx.do.org/0.436/am.04.584 The Research of Ellpse Parameter Fttng Algorthm of Ultrasonc Imagng Loggng
More informationKEYWORDS: Digital Image Watermarking, Discrete Wavelet Transform, General Regression Neural Network, Human Visual System. 1.
An Adaptve Dgtal Image Watermarkng Based on Image Features n Dscrete Wavelet Transform Doman and General Regresson Neural Network Ayoub Taher Group of IT Engneerng, Payam Noor Unversty, Broujen, Iran ABSTRACT:
More informationUsing Counter-propagation Neural Network for Digital Audio Watermarking
Usng Counter-propagaton Neural Network for Dgtal Audo Watermarkng Chuan-Yu Chang and Wen-Chh Shen Graduate School of Computer Scence and Informaton Engneerng Natonal Yunln Unversty of Scence & Technology
More informationOpen Access Early Fire Smoke Image Segmentation in a Complex Large Space
Send Orders for Reprnts to reprnts@benthamscence.ae The Open Constructon and Buldng Technology Journal, 2015, 9, 27-31 27 Open Access Early Fre Smoke Image Segmentaton n a Complex Large Space Hu Yan 1,2,*,
More informationA PATTERN RECOGNITION APPROACH TO IMAGE SEGMENTATION
1 THE PUBLISHING HOUSE PROCEEDINGS OF THE ROMANIAN ACADEMY, Seres A, OF THE ROMANIAN ACADEMY Volume 4, Number 2/2003, pp.000-000 A PATTERN RECOGNITION APPROACH TO IMAGE SEGMENTATION Tudor BARBU Insttute
More informationHigh-Boost Mesh Filtering for 3-D Shape Enhancement
Hgh-Boost Mesh Flterng for 3-D Shape Enhancement Hrokazu Yagou Λ Alexander Belyaev y Damng We z Λ y z ; ; Shape Modelng Laboratory, Unversty of Azu, Azu-Wakamatsu 965-8580 Japan y Computer Graphcs Group,
More informationBIN XIA et al: AN IMPROVED K-MEANS ALGORITHM BASED ON CLOUD PLATFORM FOR DATA MINING
An Improved K-means Algorthm based on Cloud Platform for Data Mnng Bn Xa *, Yan Lu 2. School of nformaton and management scence, Henan Agrcultural Unversty, Zhengzhou, Henan 450002, P.R. Chna 2. College
More informationRobust visual tracking based on Informative random fern
5th Internatonal Conference on Computer Scences and Automaton Engneerng (ICCSAE 205) Robust vsual trackng based on Informatve random fern Hao Dong, a, Ru Wang, b School of Instrumentaton Scence and Opto-electroncs
More informationTwo-Factor User Authentication in Multi-Server Networks
Internatonal Journal of ecurty and Its Applcatons Vol. 6, No., Aprl, 0 Two-Factor ser Authentcaton n Mult-erver Networks Chun-Ta L, Ch-Yao Weng,* and Chun-I Fan Department of Informaton Management, Tanan
More informationPerformance Analysis of Data Hiding in MPEG-4 AAC Audio *
TSINGHUA SCIENCE AND TECHNOLOGY ISSNll1007-0214ll07/21llpp55-61 Volume 14, Number 1, February 2009 Performance Analyss of Data Hdng n MPEG-4 AAC Audo * XU Shuzheng ( ) **, ZHANG Peng ( ), WANG Pengjun
More information3D Virtual Eyeglass Frames Modeling from Multiple Camera Image Data Based on the GFFD Deformation Method
NICOGRAPH Internatonal 2012, pp. 114-119 3D Vrtual Eyeglass Frames Modelng from Multple Camera Image Data Based on the GFFD Deformaton Method Norak Tamura, Somsangouane Sngthemphone and Katsuhro Ktama
More informationComputer Generated Integral Imaging (II) System Using Depth-Camera
Computer Generated Integral Imagng (II) System Usng Depth-Camera Md. Sharful Islam 1, Md. Tarquzzaman 2 1,2 Department of Informaton and Communcaton Engneerng, Islamc Unversty, Kushta-7003, Bangladesh
More informationUser Authentication Based On Behavioral Mouse Dynamics Biometrics
User Authentcaton Based On Behavoral Mouse Dynamcs Bometrcs Chee-Hyung Yoon Danel Donghyun Km Department of Computer Scence Department of Computer Scence Stanford Unversty Stanford Unversty Stanford, CA
More informationA Computer Vision System for Automated Container Code Recognition
A Computer Vson System for Automated Contaner Code Recognton Hsn-Chen Chen, Chh-Ka Chen, Fu-Yu Hsu, Yu-San Ln, Yu-Te Wu, Yung-Nen Sun * Abstract Contaner code examnaton s an essental step n the contaner
More informationCollaboratively Regularized Nearest Points for Set Based Recognition
Academc Center for Computng and Meda Studes, Kyoto Unversty Collaboratvely Regularzed Nearest Ponts for Set Based Recognton Yang Wu, Mchhko Mnoh, Masayuk Mukunok Kyoto Unversty 9/1/013 BMVC 013 @ Brstol,
More informationIR-HARQ vs. Joint Channel-Network coding for Cooperative Wireless Communication
Cyber Journals: ultdscplnary Journals n Scence and Technology, Journal of Selected Areas n Telecommuncatons (JSAT), August Edton, 2 IR-HARQ vs. Jont Channel-Network codng for Cooperatve Wreless Communcaton
More informationReal-time Motion Capture System Using One Video Camera Based on Color and Edge Distribution
Real-tme Moton Capture System Usng One Vdeo Camera Based on Color and Edge Dstrbuton YOSHIAKI AKAZAWA, YOSHIHIRO OKADA, AND KOICHI NIIJIMA Graduate School of Informaton Scence and Electrcal Engneerng,
More informationThe Shortest Path of Touring Lines given in the Plane
Send Orders for Reprnts to reprnts@benthamscence.ae 262 The Open Cybernetcs & Systemcs Journal, 2015, 9, 262-267 The Shortest Path of Tourng Lnes gven n the Plane Open Access Ljuan Wang 1,2, Dandan He
More informationA Novel Adaptive Descriptor Algorithm for Ternary Pattern Textures
A Novel Adaptve Descrptor Algorthm for Ternary Pattern Textures Fahuan Hu 1,2, Guopng Lu 1 *, Zengwen Dong 1 1.School of Mechancal & Electrcal Engneerng, Nanchang Unversty, Nanchang, 330031, Chna; 2. School
More informationMULTISPECTRAL IMAGES CLASSIFICATION BASED ON KLT AND ATR AUTOMATIC TARGET RECOGNITION
MULTISPECTRAL IMAGES CLASSIFICATION BASED ON KLT AND ATR AUTOMATIC TARGET RECOGNITION Paulo Quntlano 1 & Antono Santa-Rosa 1 Federal Polce Department, Brasla, Brazl. E-mals: quntlano.pqs@dpf.gov.br and
More informationA Gradient Difference based Technique for Video Text Detection
A Gradent Dfference based Technque for Vdeo Text Detecton Palaahnakote Shvakumara, Trung Quy Phan and Chew Lm Tan School of Computng, Natonal Unversty of Sngapore {shva, phanquyt, tancl }@comp.nus.edu.sg
More informationResearch Article Improved Encrypted-Signals-Based Reversible Data Hiding Using Code Division Multiplexing and Value Expansion
Securty and Communcaton Networks Volume 2018, Artcle ID 1326235, 9 pages https://do.org/10.1155/2018/1326235 Research Artcle Improved Encrypted-Sgnals-Based Reversble Data Hdng Usng Code Dvson Multplexng
More informationPalmprint Feature Extraction Using 2-D Gabor Filters
Palmprnt Feature Extracton Usng 2-D Gabor Flters Wa Kn Kong Davd Zhang and Wenxn L Bometrcs Research Centre Department of Computng The Hong Kong Polytechnc Unversty Kowloon Hong Kong Correspondng author:
More informationA Gradient Difference based Technique for Video Text Detection
2009 10th Internatonal Conference on Document Analyss and Recognton A Gradent Dfference based Technque for Vdeo Text Detecton Palaahnakote Shvakumara, Trung Quy Phan and Chew Lm Tan School of Computng,
More informationSum of Linear and Fractional Multiobjective Programming Problem under Fuzzy Rules Constraints
Australan Journal of Basc and Appled Scences, 2(4): 1204-1208, 2008 ISSN 1991-8178 Sum of Lnear and Fractonal Multobjectve Programmng Problem under Fuzzy Rules Constrants 1 2 Sanjay Jan and Kalash Lachhwan
More informationSkew Angle Estimation and Correction of Hand Written, Textual and Large areas of Non-Textual Document Images: A Novel Approach
Angle Estmaton and Correcton of Hand Wrtten, Textual and Large areas of Non-Textual Document Images: A Novel Approach D.R.Ramesh Babu Pyush M Kumat Mahesh D Dhannawat PES Insttute of Technology Research
More informationAn Improved User Authentication and Key Agreement Scheme Providing User Anonymity
35 JOURNAL OF ELECTRONIC SCIENCE AND TECHNOLOGY, VOL. 9, NO. 4, DECEMBER 0 An Improved User Authentcaton and Key Agreement Scheme Provdng User Anonymty Ya-Fen Chang and Pe-Yu Chang Abstract When accessng
More informationSecurity Vulnerabilities of an Enhanced Remote User Authentication Scheme
Contemporary Engneerng Scences, Vol. 7, 2014, no. 26, 1475-1482 HIKARI Ltd, www.m-hkar.com http://dx.do.org/10.12988/ces.2014.49186 Securty Vulnerabltes of an Enhanced Remote User Authentcaton Scheme Hae-Soon
More informationPYTHON IMPLEMENTATION OF VISUAL SECRET SHARING SCHEMES
PYTHON IMPLEMENTATION OF VISUAL SECRET SHARING SCHEMES Ruxandra Olmd Faculty of Mathematcs and Computer Scence, Unversty of Bucharest Emal: ruxandra.olmd@fm.unbuc.ro Abstract Vsual secret sharng schemes
More informationRobust and Reversible Relational Database Watermarking Algorithm Based on Clustering and Polar Angle Expansion
Robust and Reversble Relatonal Database Watermarkng Algorthm Based on Clusterng and Polar Angle Expanson Zhyong L, Junmn Lu and Wecheng Tao College of Informaton Scence and Engneerng, Hunan Unversty, Changsha,
More informationAn Improved Image Segmentation Algorithm Based on the Otsu Method
3th ACIS Internatonal Conference on Software Engneerng, Artfcal Intellgence, Networkng arallel/dstrbuted Computng An Improved Image Segmentaton Algorthm Based on the Otsu Method Mengxng Huang, enjao Yu,
More informationVol. 5, No. 3 March 2014 ISSN Journal of Emerging Trends in Computing and Information Sciences CIS Journal. All rights reserved.
Journal of Emergng Trends n Computng and Informaton Scences 009-03 CIS Journal. All rghts reserved. http://www.csjournal.org Unhealthy Detecton n Lvestock Texture Images usng Subsampled Contourlet Transform
More information