Data Hiding and Image Authentication for Color-Palette Images

Size: px
Start display at page:

Download "Data Hiding and Image Authentication for Color-Palette Images"

Transcription

1 Data Hdng and Image Authentcaton for Color-Palette Images Chh-Yang Yn ( 殷志揚 ) and Wen-Hsang Tsa ( 蔡文祥 ) Department of Computer & Informaton Scence Natonal Chao Tung Unversty 00 Ta Hsueh Rd., Hsnchu, Tawan 300, R.O.C. Tel: Emal:whtsa@cs.nctu.edu.tw Abstract In ths paper, a novel method for smultaneously embeddng bnary data and fragle watermark sgnal wthn dgtal color-palette mages s proposed. The color-palette of an mage s frst re-sorted from dark-to-brght, whch makes the palette colors n the unque order even when the mage s re-saved by other applcatons. Moreover a data hdng method for replacng the palette ndex s desgned. The even-odd relaton between two pxels s utlzed for hdng any form of bnary data. Fnally, a novel method that embeds fragle watermark sgnals wthn color-palette mages s also proposed n ths study. The fragle watermark sgnals are embedded n the central pxel of every 3 3 block. Expermental results show the feasblty and practcablty of the proposed approaches. (KEYWORD: Data Hdng, Image Authentcaton, Fragle Watermark, Color-Palette Image). Introducton Wth the rapd growth of dgtal technques, the lfe-style of human bengs, the socal structures, and the contents of cvlzaton, have changed hugely. It s just started, and s unstoppable and unavodable. In the transton from the old age to the dgtal world, the dgtzaton of a cvlzaton s asset has become a very mportant ssue. Dgtzaton does provde many advantages. Frst, dgtal data could be preserved permanently wthout any degradaton. And data dstrbuton va the Internet s easy and fast. The management of dgtal data s easy, too, whch facltates people to quckly fnd what they want. But dgtzaton, on the other hand, does reveal some new problems, too. Generally speakng, t s dffcult to determne the fdelty or ntegrty of dgtal vsual data because the development of dgtal processng technologes has made producton of forgery an easy job. The problem orgnates from the ntrnsc features of dgtal nformaton: () makng copes s easy and cheap; () each copy s exactly the same as the orgnal one; (3) dstrbuton va the Internet s easy and fast. The ease of copyng and edtng facltates unauthorzed use, msappropraton, and msrepresentaton, whch have brought un-estmated ntellectual property losses. Thus, there s a great nterest n developng technologes that help to protect the ntegrty of a dgtal medum and the copyrght of ts owner. Many technques have been developed for resolvng the problem. Data hdng n mages s one of the technques that embed nformaton nsde an mage, called the cover mage n ths study, to provde data securty. The goal of data hdng s to embed a secret message nto a cover mage wthout makng perceptual changes to the cover mage under human observaton. An authorzed user can extract the secret message from the processed cover mage, called the stego-mage n ths study. An unauthorzed user cannot even sense the exstence of the secret message n the stego-mage, and message protecton s hence acheved. Many dfferent mage data hdng methods have been proposed durng the last few years

2 [][5][6][8][3][4] and most of them can be seen as substtuton systems. Such methods try to substtute redundant parts of the mage wth the secret message. The man dsadvantage s the relatve weakness aganst modfcatons. Recently, the development of new robust watermarkng technques led to advances n the constructon of robust and secure mage data hdng systems. Image authentcaton, on the contrary, s a technque for verfyng the ntegrty and fdelty of an mage. The uses of fragle watermarks and sem-fragle watermarks are two of the technques developed for mage authentcaton. A fragle watermark s a knd of watermark that s desgned to be easly destroyed f the watermarked mage s manpulated n the slghtest manner. Image authentcaton can be acheved by nspectng whether the embedded sgnal s destroyed. But n some applcatons, on the other hand, nformaton preservng operatons (such as JPEG lossy compresson) should be consdered as legal operatons. A sem-fragle watermark, whch tells the dfference between an nformaton preservng operaton and an nformaton alterng one (such as feature replacement), s hence desgned to pont out real tamperng and gnore legal operatons n the authentcaton process. In the recent years, proposed systems that are used for verfyng the authentcty of a dgtal mage may be categorzed nto two types, the sgnature system [4] and the fragle watermark system. In a sgnature system, a dgest of the data to be authentcated s obtaned by the use of cryptographc hash functons. The recpent verfes the sgnature by examnng the dgest of the data and usng a verfcaton algorthm to determne f the data are authentc. A dsadvantage of the sgnature system s that the addtonal sgnature must be stored and transmtted separately from the protected mage. A fragle watermark system, on the contrary, embeds the authentcaton nformaton nsde the mage and provdes the ablty to localze the altered areas wthn the mage. Fragle watermark systems can be classfed nto two types, spatal-doman fragle watermarkng system [][0][][] or transformed-doman watermarkng one [3][7][9]. In ths study, we propose a novel method for smultaneously embeddng bnary data and fragle watermark sgnal wthn dgtal color-palette mages.. Characterstcs of Color-palette Images and a Palette-sortng Algorthm In order to hde nformaton wthn a color-palette mage, some characterstcs of them must be dentfed:. every color-palette mage contans at most 56 colors;. a color palette s used for storng 56 colors used n the mage; 3. every pxel can be thought as an ndex number, whch s a reference to the color palette, and so every pxel needs one byte of storage. In ths study, the proposed method s closely dependent on the pxel s ndex number wthn the color palette. But almost every mage processng software has a dfferent method to store the palette data. Even when we just re-save the same mage by dfferent software, the palette data may be dfferent from the orgnal one. As a result, we wll frst sort the color palette before the hdng process to make t n the dark-to-brght order. After sortng, we may reference the same palette data. Ths wll facltate the subsequent hdng process. Let p = R, G, B ) be the -th color wthn ( the color palette, where palette colors, we frst calculate To sort the µ ( p ) = ω R + ω G + ω B () for every color n the palette, where ω, ω, and ω are weghtng values that make color such as 3 (40,30,0) to be dfferent from (30,40,0), and ω ω ω. Then we sort 3 µ ( p ) n a 3

3 descendng order to obtan a sorted palette. Fg. (a) shows a color palette before sortng and Fg. (b) shows the sorted result of Fg. (a). µ ( β x, β y ) = ( Rx Ry ) + ( Gx Gy ) + ( Bx By ), () Ⅰ Ⅰ Ⅱ Ⅳ Ⅱ Ⅳ Ⅲ Ⅲ Fgure. A 3 3 block. (a) (b) Fgure. The color palette before and after sortng. (a) The color palette before sortng. (b) The color palette after sortng. 3. Data Hdng Scheme by Palette Index Replacement In ths secton, the proposed method for embeddng and extractng bnary data nformaton wll be descrbed. An even-odd relatonshp between two pxels s utlzed to embed or extract a bnary bt. The embeddng process wll be descrbed n Secton 3.. And the extractng process wll be descrbed n Secton 3.. Some expermental results wll be shown n Secton Proposed Data Hdng Method Let C be a cover mage of sze M N. Let S be the annotaton that wll be hdden nto C, whch has L characters n length. And let β be the sorted palette, wth β ( 0 ι 55 ) beng a color ι nsde β that has ndex ι. Before the embeddng process, S must frst be converted nto a bnary form S = s s s8 sl * 8 sl*8 accordng to the ASCII codes of the characters n S. As Fg. shows, we hde the bnary data nto the four marked area (Ⅰ, Ⅱ, Ⅲ, and Ⅳ) of every 3x3 block n C, and leave the central pxel unchanged, whch wll be used for hdng fragle nformaton as descrbed n Secton 4. colors be Let the Eucldean dstance between the two where 0 x, y 55.The algorthm for embeddng a bt of annotaton, say as follows. s, can be expressed brefly Step : Select a two-pxel block (Ⅰ,Ⅱ,Ⅲ or Ⅳ) Step: Step3: frst from a 3x3 block. Name the two nvolved pxels as α and α. By vewng every pxel as an ndex number n the color-palette mage, get the color ndces ι and ι of the two selected pxels α and α from the sorted palette β, respectvely. Use the followng rule to judge whether ι and ι are even or odd numbers: true f ι mod = 0; seven ( ι) = (3) false f ι mod =. Step4: In the case that s = and seven ι ) seven( ), modfy one of ( ι the pxels by another color n β to make the two ndces ether both even or both odd n a qualty preservng fashon. Let and be two canddate βr β r colors that wll be used to replace α or α, respectvely. Choose the color to β r be the one among β that has mnmal Eucldean dstance to α and satsfy the condton. On the other hand, choose the canddate color β r seven( ι ) seven( r ) to be the one among β that has mnmal Eucldean dstance to α and satsfy the condton that

4 seven ι ) seven( ). And then ( r modfy one of the pxels by followng condton: f f µ ( α, β ) > µ ( α, β ) r µ ( α, β ) < µ ( α, β ) r r r Otherwse, n the case that seven ( ι ) = seven( ι), just leave the two pxels unchanged. seven ( ι ) = seven( ι), modfy one of canddate colors β r and r seven( ι ) seven( ι), just leave the ι replaceα by β, r replaceα by β. s = r and (4) Step5: In another case that s = 0 and the pxels to make one of the ndex be even and the other be odd. Perform smlar operatons n Step 4 to obtan two β from β and use them to replace α or α accordng to the condton lsted n Eq. (4). Otherwse, f s and = 0 two pxels unchanged. In the proposed method, the even-odd relatonshp of the two chosen pxels s utlzed to embed a bnary bt of annotaton nformaton. The ndces ι and are tuned up to become both even or both odd to represent the fact that a s embedded. On the contrary, a 0 s embedded by adjustng the ndces of the two chosen pxels to become dfferent n the even-odd relaton, that s, for one ndex to become even and the other to become s odd. There s a good chance that the orgnal ndces just ft these two constrants. In ths knd of stuaton, what we have to do s just to leave the two pxels unchanged. On the other hand, when the ndces of the two pxels do not meet the constrants, a color wth ts ndex satsfyng to the constrants descrbed n Step 4 and Step 5 must be found to replace the correspondng pxel. In order to preserve the qualty of the stego-mage, the color wth the mnmal Eucldean dstance to the correspondng pxel s the best canddate for replacement. 3. Data Extracton Process In some conventonal methods, besdes the embeddng result, an extracton process needs ether a lookup table or the source mage to obtan the secret message. Ths s nconvenent for the recever to get the secret message because the user has to keep the source mage or a table. In our proposed method, only the stego-mage s needed to extract the annotaton message. Because the annotaton embedded n the mage can be any knd of descrpton wth an unfxed length, n our mplementaton the length of the annotaton s frst embedded before the annotaton content s treated. As a result, the length nformaton must frst be extracted n the extracton process so that we can know how many blocks should be examned before endng the process. Let E be the stego-mage to be processed, β be the sorted palette of E, and be the -th extracted bt of the annotaton data. The process of extractng a bt from the stego-mage s descrbed below: Step: Choose a two-pxel block (see Fgure ) from a 3 3 block of E. And name the two nvolved pxels α and α. Step: Get the ndces and ι ι of α and α, respectvely, from β accordng to Step3: the frst ther RGB values. The annotaton s can be determned by the followng rule: f ι and ι are both even s = or both odd; (5) 0 otherwse. In the entre extracton process, we frst extract l bts of the data that compose a number that s the value of the length of the annotaton embedded n E. Then we can know how many two-pxel blocks we should examne and after repeatng the above-mentoned process by s l 8 tmes, we can get the bnary form of the extracted annotaton S = s s s8 s l *8 s l*8. Accordng to the ASCII codes, S s then converted nto character form that fnally results n the embedded annotaton.

5 3.3 Expermental Results In our experments, the mages Lena, Baboon, and Pepper wth sze 5 5, whch are shown n Fg. 3(a), (b), and (c), are used as the cover mages. And Fg. 3(d), (e), and (f) are the stego-mages after embeddng 0,000 characters. The PSNR values of the stego-mages are lsted n Table. The PSNR values are hgh, whch mean that only lttle perceptual effect s created durng the annotaton embeddng process. And the embedded annotaton can be extracted wthout any error, accordng to the expermental results. Table. The PSNR values after embeddng 0,000 characters. Lena Baboon Pepper PSNR Authentcaton Scheme by Nearest Palette Color Replacement Method In ths secton, a novel method for authentcatng the ntegrty and fdelty of the color-palette mage s proposed. Alternatons to the watermarked mage can be detected and localzed. And the verfcaton processes can be proceeded wthout referencng the orgnal mage. In Secton 3, the secret data s embedded n the surroundng eght pxels of a block and the central pxel s left unchanged. In the proposed method, the central pxel of every block s utlzed to embed the fragle watermark. The fragle watermark embeddng process wll be shown n Secton 4.. The authentcatng process wll be descrbed n Secton 4.. And several expermental results are shown n Secton Proposed Fragle Watermark Embeddng Method Let C be a cover mage of sze M N, β be the sorted palette of C, and β ( 0 55 β be the -th color n ). The cover mage C s frst dvded nto non-overlappng 3 3 mage blocks, lke the one shown below. Ⅰ Ⅰ Ⅱ Ⅳ Ⅱ Ⅳ Ⅲ Ⅲ We utlze the surroundng four two-pxel blocks (I, II, III and IV) to embed the secret data by usng the method descrbed n Secton 3. After embeddng, every block s central pxel s stll unchanged. Ths pxel s hence used for embeddng the fragle watermark. To embed the fragle watermark nto a 3 3 block B, the algorthm can be shown as the followng steps: Step : Calculate the mean value µ of B, whch can generally represent the color feature of a block. And the central pxel of the block s supposed to be close to µ n color. Snce µ s the mean color of a block, there s a good chance that t s not contaned n β. Step: Fnd a color β from β that s closest k to µ accordng to the Eucldean Step3: dstance of the RGB values, and k mod Q = 0 strength factor.. Here Q s a watermark Replace the color value of central pxel of the block by β. k The magntude of Q n Step s a tradeoff between the probablty to prove the tamperng and the qualty of the stego-mage. When Q s a small value, the qualty of stego-mage s relatvely hgher because the canddate colors could be more so that we can fnd a closer color for replacng the central pxel of every 3 3 block. But the opportunty of provng and localzng the tamperng wll became relatvely lower. On the contrary, f Q s large, the mage qualty wll become poorer but the probablty of detectng tamperng wll become hgher. The detaled data about the nfluence of Q and some dscussons wll be shown n Secton 4.3.

6 (a) (d) (b) (e) (c) (f) Fgure 3. The cover mages and stego-mage wth 0,000 characters embedded. (a) Cover mage Lena. (b) Cover mage Baboon. (c) Cover mage Pepper. (d) Stego-mage Lena wth 0,000 characters embedded. (e) Stego-mage Baboon wth 0,000 characters embedded. (f) Stego-mage Pepper wth 0,000 characters embedded.

7 4. Authentcaton Process The authentcaton process can proceed wthout referencng the orgnal mage n our proposed method. Let T be the mage that s suspcous of beng tampered. And let β be the sorted palette of T, and β be the -th color n β (0 55 ). To authentcate whether T has been tampered, we frst dvde T nto 3 3 non-overlappng blocks. For every block, we focus on the central pxel p and get the palette ndex k of p from β, where the RGB values of β k are equal to those of p. In the embeddng process descrbed n Secton 4., the central pxel of every block s replaced by the color whose ndex s a multple of Q. Therefore, k should be a multple of Q f ths block has not been tampered wth. That s, f k s a multple of Q, the block s judged as not beng tampered wth. On the other hand, the block s decded as beng tampered wth f k s not a multple of Q. For vsualzaton, we replace the block by ts nverse color f the authentcaton result ndcates the block has been altered. Ths wll help us to localze the tamperng area n the suspcous mage. 4.3 Expermental Results In our experments, we use three cover mages as shown n Fg. 4(a), (b), and (c) wth sze 5 5. And Fg. 4 (d), (e), (f) are the mages after embeddng a fragle watermark wth Q = 8. We almost cannot tell the dfference between the cover and the stego-mages. The PSNR values are shown n Table. Table. PSNR values of watermarked mages. Jet Lena Pepper PSNR Fgs. 5(a), (b), and (c) are the mages that have been tampered. And the authentcaton results are shown n Fgs. 5(d), (e), and (f). In Fg. 5(a), we tampered the stego-mage by rubbng the characters and the flag on the body of the arplane. In Fg. 5(b), we altered Lena s har color and paste some wg on her hat. In Fg. 5(c), we cropped two green peppers and pasted them onto dfferent parts of the stego-mage. The expermental results showed that the altered areas are accurately marked out. Fg. 6 are the embedded results of Lena by applyng dfferent Q values. When Q becomes larger, the qualty of the stego-mage goes down. In Fg. 6 (c) and Fg. 6 (d), we can fnd some false contourng effect on the grl s shoulder and cheek because there are only 4 or colors can be used for replacng the central pxel of every 3x3 block. The relaton between the sze of Q and the PSNR values of the stego-mage s shown n Table 3. Table 3. The PSNR values of stego-mage by applyng dfferent Q values. Q=6 Q=3 Q=64 Q=8 PSNR Dscussons In ths thess, a system that embeds annotaton data and a fragle watermark smultaneously wthn the color-palette mage has been proposed. The color-palette mage contans a palette wth all the colors used n that mage. In order to reference the palette n the same order, the color palette s frst reordered from dark to brght. In the embeddng process, the annotatons are embedded n the eght surroundng pxels of a 3 3 block. To embed a bt of data, two pxels are frst selected and the ndces of these two pxels are obtaned from the color palette. The ndces are tuned up to become both even or both odd f a s to be embedded. Otherwse, the ndces are tuned up to become dfferent n the even-odd relaton, that s, wth one even and the other odd. To embed the fragle watermark, the mean value of every 3 3 block s calculated. And the central pxel s replaced by a color that s closest to the mean value of the block. And the magntude of the ndex of ths color must be a multple tmes of the value of a predefned watermark strength factor.

8 (a) (d) (b) (e) (c) (f) Fgure 4. The cover mages and the fragle watermarked mages (a) Cover mage Jet. (b) Cover mage Lena. (c) Cover mage Pepper. (d) Watermarked mage Jet. (e) Watermarked mage Lena. (f) Watermarked mage Pepper.

9 (a) (d) (b) (e) (c) (f) Fgure 5. The suspcous mages and ther verfcaton results. (a) Tampered Jet. (b) Tampered Lena. (c) Tampered Pepper. (d) Verfcaton result of tampered Jet. (e) Verfcaton result of tampered Lena. (f) Verfcaton result of tampered Pepper.

10 (a) Q = 6 (b) Q = 3 (c) Q = 64 (d) Q = 8 Fgure 6. The watermarked mage wth dfferent Q values. (a) Watermarked mage wth Q = 6. (b) Watermarked mage wth Q = 3. (c) Watermarked mage wth Q = 64. (d) Watermarked mage wth Q = 8. References: [] D. C. Wu and W. H. Tsa, Embeddng of Any Type of Data n Images Based on a Human Vsual Model and Multple-Based Number Converson, accepted and to appear n Pattern Recognton Letters. [] D. C. Wu and W. H. Tsa, A Method for Creatng Perceptually Based Fragle Watermarks for Dgtal Image Verfcaton, submtted to IEEE Transactons on Multmeda. [3] D. Kundur and D. Hanznakos, Towards a Tell- Tale Watermarkng Technque for Tamper-Proofng, n Proc. IEEE Internatonal Conference on Image Processng, vol., pp , Chcago, Illnos, 998. [4] D. Stnson, Cryptography Theory and Practce, CRC Press, Boca Raton, 995. [5] E. H. Adelson, Dgtal sgnal encodng and decodng apparatus, U.S. Patent ,990. [6] H. Y. Chang, Data hdng and watermarkng n color mages by wavelet transforms, Master thess, Department of Computer and Informaton Scence, Natonal Chao Tung Unversty, Tawan, Republc of Chna, 999. [7] J. Frdrch, Image watermarkng for tamper detecton, n Proc. IEEE Internatonal Conference on Image Processng, vol. II, 998, pp

11 [8] M. S. Law and L. H. Chen, "An effectve data hdng method," n Proc. IPPR Conf. on Computer Vson, Graphcs, and Image Processng, Tawan, R.O.C., 997, pp [9] M. Wu and B. Lu, Watermarkng for mage authentcaton, n Proc. IEEE Internatonal Conference on Image Processng, vol. II, pp , Chcago, Illnos, October 998. [0] P. W. Wong, A publc key watermark for mage verfcaton and authentcaton, n Proc. IEEE Internatonal Conference on Image Processng, vol. II, 998, pp [] R. van Schyndel, A. Trkel, and C. Osborne, A Dgtal Watermark, Proceedng of the IEEE Internatonal Conference on Image Processng, vol, pp , Auston, Texas, November 994. [] S. Walton, Informaton authentcaton for a slppery new age, Dr. Dobbs Journal, vol. 0, no. 4, pp. 8-6, Aprl 995. [3] T. K. Yen, Image hdng by random bt replacement and frequency transformatons, Master thess, Department of Computer and Informaton Scence, Natonal Chao Tung Unversty, Tawan, Republc of Chna, 998. [4] T. S. Chen, C. C. Chang, and M. S. Hwang, A vrtual mage cryptosystem based upon vector quantzaton, IEEE Transactons on Image Processng, vol. 7, no. 0, pp , 998.

A Lossless Watermarking Scheme for Halftone Image Authentication

A Lossless Watermarking Scheme for Halftone Image Authentication IJCSNS Internatonal Journal of Computer Scence and Network Securty, VOL.6 No.2B, February 2006 147 A Lossless Watermarkng Scheme for Halftone Image Authentcaton Jeng-Shyang Pan, Hao Luo, and Zhe-Mng Lu,

More information

Semi-Fragile Watermarking Scheme for Authentication of JPEG Images

Semi-Fragile Watermarking Scheme for Authentication of JPEG Images Tamkang Journal of Scence and Engneerng, Vol. 10, No 1, pp. 5766 (2007) 57 Sem-Fragle Watermarkng Scheme for Authentcaton of JPEG Images Chh-Hung n 1 *, Tung-Shh Su 2 and Wen-Shyong Hseh 2,3 1 Department

More information

Hybrid Non-Blind Color Image Watermarking

Hybrid Non-Blind Color Image Watermarking Hybrd Non-Blnd Color Image Watermarkng Ms C.N.Sujatha 1, Dr. P. Satyanarayana 2 1 Assocate Professor, Dept. of ECE, SNIST, Yamnampet, Ghatkesar Hyderabad-501301, Telangana 2 Professor, Dept. of ECE, AITS,

More information

Enhanced Watermarking Technique for Color Images using Visual Cryptography

Enhanced Watermarking Technique for Color Images using Visual Cryptography Informaton Assurance and Securty Letters 1 (2010) 024-028 Enhanced Watermarkng Technque for Color Images usng Vsual Cryptography Enas F. Al rawashdeh 1, Rawan I.Zaghloul 2 1 Balqa Appled Unversty, MIS

More information

High Payload Reversible Data Hiding Scheme Using Difference Segmentation and Histogram Shifting

High Payload Reversible Data Hiding Scheme Using Difference Segmentation and Histogram Shifting JOURNAL OF ELECTRONIC SCIENCE AND TECHNOLOGY, VOL. 11, NO. 1, MARCH 2013 9 Hgh Payload Reversble Data Hdng Scheme Usng Dfference Segmentaton and Hstogram Shftng Yung-Chen Chou and Huang-Chng L Abstract

More information

Enhanced AMBTC for Image Compression using Block Classification and Interpolation

Enhanced AMBTC for Image Compression using Block Classification and Interpolation Internatonal Journal of Computer Applcatons (0975 8887) Volume 5 No.0, August 0 Enhanced AMBTC for Image Compresson usng Block Classfcaton and Interpolaton S. Vmala Dept. of Comp. Scence Mother Teresa

More information

Key-Selective Patchwork Method for Audio Watermarking

Key-Selective Patchwork Method for Audio Watermarking Internatonal Journal of Dgtal Content Technology and ts Applcatons Volume 4, Number 4, July 2010 Key-Selectve Patchwork Method for Audo Watermarkng 1 Ch-Man Pun, 2 Jng-Jng Jang 1, Frst and Correspondng

More information

A Secured Method for Image Steganography Based On Pixel Values

A Secured Method for Image Steganography Based On Pixel Values A Secured Method for Image Steganography Based On Pxel Values Tarun Gulat #, Sanskrt Gupta * # Assocate Professor, Electroncs and Communcaton Engneerng Department, MMEC, M.M.U., Mullana, Ambala, Haryana,

More information

A Fast Content-Based Multimedia Retrieval Technique Using Compressed Data

A Fast Content-Based Multimedia Retrieval Technique Using Compressed Data A Fast Content-Based Multmeda Retreval Technque Usng Compressed Data Borko Furht and Pornvt Saksobhavvat NSF Multmeda Laboratory Florda Atlantc Unversty, Boca Raton, Florda 3343 ABSTRACT In ths paper,

More information

Article Reversible Dual-Image-Based Hiding Scheme Using Block Folding Technique

Article Reversible Dual-Image-Based Hiding Scheme Using Block Folding Technique Artcle Reversble Dual-Image-Based Hdng Scheme Usng Block Foldng Technque Tzu-Chuen Lu, * and Hu-Shh Leng Department of Informaton Management, Chaoyang Unversty of Technology, Tachung 4349, Tawan Department

More information

Improvement of Spatial Resolution Using BlockMatching Based Motion Estimation and Frame. Integration

Improvement of Spatial Resolution Using BlockMatching Based Motion Estimation and Frame. Integration Improvement of Spatal Resoluton Usng BlockMatchng Based Moton Estmaton and Frame Integraton Danya Suga and Takayuk Hamamoto Graduate School of Engneerng, Tokyo Unversty of Scence, 6-3-1, Nuku, Katsuska-ku,

More information

Research of Multiple Text Watermarks Technique in Electric Power System Texts

Research of Multiple Text Watermarks Technique in Electric Power System Texts Sensors & Transducers 203 by IFSA http://www.sensorsportal.com Research of Multple Text atermarks Technque n Electrc Power System Texts Xao-X XING, Qng CHEN, 2 Lan-X FU School of Optcal-Electrcal and Computer

More information

A Comparison between Digital Images Watermarking in Tow Different Color Spaces Using DWT2*

A Comparison between Digital Images Watermarking in Tow Different Color Spaces Using DWT2* A Comparson between Dgtal s ng n Tow Dfferent Color Spaces Usng DWT* Mehd Khall Natonal Academy of Scence of Armena Yerevan, Armena e-mal: khall.mehd@yahoo.com ABSTRACT A novel dgtal watermarkng for ownershp

More information

Using Counter-propagation Neural Network for Digital Audio Watermarking

Using Counter-propagation Neural Network for Digital Audio Watermarking Usng Counter-propagaton Neural Network for Dgtal Audo Watermarkng Chuan-Yu Chang and Wen-Chh Shen Graduate School of Computer Scence and Informaton Engneerng Natonal Yunln Unversty of Scence & Technology

More information

Robust Watermarking for Text Images Based on Arnold Scrambling and DWT-DCT

Robust Watermarking for Text Images Based on Arnold Scrambling and DWT-DCT Internatonal Conference on Mechatroncs Electronc Industral and Control Engneerng (MEIC 015) Robust Watermarkng for Text Images Based on Arnold Scramblng and DWT-DCT Fan Wu College of Informaton Scence

More information

A Hybrid Semi-Blind Gray Scale Image Watermarking Algorithm Based on DWT-SVD using Human Visual System Model

A Hybrid Semi-Blind Gray Scale Image Watermarking Algorithm Based on DWT-SVD using Human Visual System Model A Hybrd Sem-Blnd Gray Scale Image Watermarkng Algorthm Based on DWT-SVD usng Human Vsual System Model Rajesh Mehta r Scence & Engneerng, USICT Guru Gobnd Sngh Indrarprastha Unversty New Delh, Inda rajesh00ust@gmal.com

More information

Research Article Hamming Code Based Watermarking Scheme for 3D Model Verification

Research Article Hamming Code Based Watermarking Scheme for 3D Model Verification Mathematcal Problems n Engneerng, Artcle ID 241093, 7 pages http://dx.do.org/10.1155/2014/241093 Research Artcle Hammng Code Based Watermarkng Scheme for 3D Model Verfcaton Jen-Tse Wang, 1 Y-Chng Chang,

More information

A NEW AUDIO WATERMARKING METHOD BASED

A NEW AUDIO WATERMARKING METHOD BASED A NEW AUDIO WATERMARKING METHOD BASED ON DISCRETE COSINE TRANSFORM WITH A GRAY IMAGE Mohammad Ibrahm Khan 1, Md. Iqbal Hasan Sarker 2, Kaushk Deb 3 and Md. Hasan Furhad 4 1,2,3 Department of Computer Scence

More information

MULTISPECTRAL IMAGES CLASSIFICATION BASED ON KLT AND ATR AUTOMATIC TARGET RECOGNITION

MULTISPECTRAL IMAGES CLASSIFICATION BASED ON KLT AND ATR AUTOMATIC TARGET RECOGNITION MULTISPECTRAL IMAGES CLASSIFICATION BASED ON KLT AND ATR AUTOMATIC TARGET RECOGNITION Paulo Quntlano 1 & Antono Santa-Rosa 1 Federal Polce Department, Brasla, Brazl. E-mals: quntlano.pqs@dpf.gov.br and

More information

Content Based Image Retrieval Using 2-D Discrete Wavelet with Texture Feature with Different Classifiers

Content Based Image Retrieval Using 2-D Discrete Wavelet with Texture Feature with Different Classifiers IOSR Journal of Electroncs and Communcaton Engneerng (IOSR-JECE) e-issn: 78-834,p- ISSN: 78-8735.Volume 9, Issue, Ver. IV (Mar - Apr. 04), PP 0-07 Content Based Image Retreval Usng -D Dscrete Wavelet wth

More information

A Fast Visual Tracking Algorithm Based on Circle Pixels Matching

A Fast Visual Tracking Algorithm Based on Circle Pixels Matching A Fast Vsual Trackng Algorthm Based on Crcle Pxels Matchng Zhqang Hou hou_zhq@sohu.com Chongzhao Han czhan@mal.xjtu.edu.cn Ln Zheng Abstract: A fast vsual trackng algorthm based on crcle pxels matchng

More information

Pattern Recognition 43 (2010) Contents lists available at ScienceDirect. Pattern Recognition. journal homepage:

Pattern Recognition 43 (2010) Contents lists available at ScienceDirect. Pattern Recognition. journal homepage: Pattern Recognton 43 (2010) 397 -- 404 Contents lsts avalable at ScenceDrect Pattern Recognton ournal homepage: www.elsever.com/locate/pr Secret mage sharng based on cellular automata and steganography

More information

KEYWORDS: Digital Image Watermarking, Discrete Wavelet Transform, General Regression Neural Network, Human Visual System. 1.

KEYWORDS: Digital Image Watermarking, Discrete Wavelet Transform, General Regression Neural Network, Human Visual System. 1. An Adaptve Dgtal Image Watermarkng Based on Image Features n Dscrete Wavelet Transform Doman and General Regresson Neural Network Ayoub Taher Group of IT Engneerng, Payam Noor Unversty, Broujen, Iran ABSTRACT:

More information

Robust Blind Video Watermark Algorithm in Transform Domain Combining with 3D Video Correlation

Robust Blind Video Watermark Algorithm in Transform Domain Combining with 3D Video Correlation JOURNAL OF MULTIMEDIA, VOL. 8, NO. 2, APRIL 2013 161 Robust Blnd Vdeo Watermark Algorthm n Transform Doman Combnng wth 3D Vdeo Correlaton DING Ha-yang 1,3 1. Informaton Securty Center, Bejng Unversty of

More information

An Optimal Algorithm for Prufer Codes *

An Optimal Algorithm for Prufer Codes * J. Software Engneerng & Applcatons, 2009, 2: 111-115 do:10.4236/jsea.2009.22016 Publshed Onlne July 2009 (www.scrp.org/journal/jsea) An Optmal Algorthm for Prufer Codes * Xaodong Wang 1, 2, Le Wang 3,

More information

Local Quaternary Patterns and Feature Local Quaternary Patterns

Local Quaternary Patterns and Feature Local Quaternary Patterns Local Quaternary Patterns and Feature Local Quaternary Patterns Jayu Gu and Chengjun Lu The Department of Computer Scence, New Jersey Insttute of Technology, Newark, NJ 0102, USA Abstract - Ths paper presents

More information

Research in Algorithm of Image Processing Used in Collision Avoidance Systems

Research in Algorithm of Image Processing Used in Collision Avoidance Systems Sensors & Transducers, Vol 59, Issue, November 203, pp 330-336 Sensors & Transducers 203 by IFSA http://wwwsensorsportalcom Research n Algorthm of Image Processng Used n Collson Avodance Systems Hu Bn

More information

Related-Mode Attacks on CTR Encryption Mode

Related-Mode Attacks on CTR Encryption Mode Internatonal Journal of Network Securty, Vol.4, No.3, PP.282 287, May 2007 282 Related-Mode Attacks on CTR Encrypton Mode Dayn Wang, Dongda Ln, and Wenlng Wu (Correspondng author: Dayn Wang) Key Laboratory

More information

A Background Subtraction for a Vision-based User Interface *

A Background Subtraction for a Vision-based User Interface * A Background Subtracton for a Vson-based User Interface * Dongpyo Hong and Woontack Woo KJIST U-VR Lab. {dhon wwoo}@kjst.ac.kr Abstract In ths paper, we propose a robust and effcent background subtracton

More information

Parallelism for Nested Loops with Non-uniform and Flow Dependences

Parallelism for Nested Loops with Non-uniform and Flow Dependences Parallelsm for Nested Loops wth Non-unform and Flow Dependences Sam-Jn Jeong Dept. of Informaton & Communcaton Engneerng, Cheonan Unversty, 5, Anseo-dong, Cheonan, Chungnam, 330-80, Korea. seong@cheonan.ac.kr

More information

Private Information Retrieval (PIR)

Private Information Retrieval (PIR) 2 Levente Buttyán Problem formulaton Alce wants to obtan nformaton from a database, but she does not want the database to learn whch nformaton she wanted e.g., Alce s an nvestor queryng a stock-market

More information

Steps for Computing the Dissimilarity, Entropy, Herfindahl-Hirschman and. Accessibility (Gravity with Competition) Indices

Steps for Computing the Dissimilarity, Entropy, Herfindahl-Hirschman and. Accessibility (Gravity with Competition) Indices Steps for Computng the Dssmlarty, Entropy, Herfndahl-Hrschman and Accessblty (Gravty wth Competton) Indces I. Dssmlarty Index Measurement: The followng formula can be used to measure the evenness between

More information

Mobile Application Security for Video Streaming Authentication and Data Integrity Combining Digital Signature and Watermarking Techniques

Mobile Application Security for Video Streaming Authentication and Data Integrity Combining Digital Signature and Watermarking Techniques Moble Applcaton Securty for Vdeo Streamng Authentcaton and Data Integrty Combnng Dgtal Sgnature and Watermarkng Technques Stefano Chessa, Roberto D Petro, Erna Ferro, Gaetano Gunta, Gabrele Olger ISTI-CNR,

More information

Virtual Machine Migration based on Trust Measurement of Computer Node

Virtual Machine Migration based on Trust Measurement of Computer Node Appled Mechancs and Materals Onlne: 2014-04-04 ISSN: 1662-7482, Vols. 536-537, pp 678-682 do:10.4028/www.scentfc.net/amm.536-537.678 2014 Trans Tech Publcatons, Swtzerland Vrtual Machne Mgraton based on

More information

A New Feature of Uniformity of Image Texture Directions Coinciding with the Human Eyes Perception 1

A New Feature of Uniformity of Image Texture Directions Coinciding with the Human Eyes Perception 1 A New Feature of Unformty of Image Texture Drectons Concdng wth the Human Eyes Percepton Xng-Jan He, De-Shuang Huang, Yue Zhang, Tat-Mng Lo 2, and Mchael R. Lyu 3 Intellgent Computng Lab, Insttute of Intellgent

More information

FEATURE EXTRACTION. Dr. K.Vijayarekha. Associate Dean School of Electrical and Electronics Engineering SASTRA University, Thanjavur

FEATURE EXTRACTION. Dr. K.Vijayarekha. Associate Dean School of Electrical and Electronics Engineering SASTRA University, Thanjavur FEATURE EXTRACTION Dr. K.Vjayarekha Assocate Dean School of Electrcal and Electroncs Engneerng SASTRA Unversty, Thanjavur613 41 Jont Intatve of IITs and IISc Funded by MHRD Page 1 of 8 Table of Contents

More information

VISUAL cryptography (VC) is a technique that encrypts a

VISUAL cryptography (VC) is a technique that encrypts a 4336 IEEE TRANSACTIONS ON IMAGE PROCESSING, VOL. 23, NO. 10, OCTOBER 2014 Sharng Vsual Secrets n Sngle Image Random Dot Stereograms Ka-Hu Lee and Pe-Lng Chu Abstract Vsual cryptography schemes (VCSs generate

More information

An Image Compression Algorithm based on Wavelet Transform and LZW

An Image Compression Algorithm based on Wavelet Transform and LZW An Image Compresson Algorthm based on Wavelet Transform and LZW Png Luo a, Janyong Yu b School of Chongqng Unversty of Posts and Telecommuncatons, Chongqng, 400065, Chna Abstract a cylpng@63.com, b y27769864@sna.cn

More information

Using Fuzzy Logic to Enhance the Large Size Remote Sensing Images

Using Fuzzy Logic to Enhance the Large Size Remote Sensing Images Internatonal Journal of Informaton and Electroncs Engneerng Vol. 5 No. 6 November 015 Usng Fuzzy Logc to Enhance the Large Sze Remote Sensng Images Trung Nguyen Tu Huy Ngo Hoang and Thoa Vu Van Abstract

More information

Reversible Dual-Image-Based Hiding Scheme Using Block Folding Technique

Reversible Dual-Image-Based Hiding Scheme Using Block Folding Technique S S symmetry Artcle Reversble Dual-Image-Based Hdng Scheme Usng Block Foldng Technque Tzu-Chuen Lu Tzu-Chuen Lu 1, 1, * and Hu-Shh Leng * ID and Hu-Shh Leng 1 Department Informaton Management, Chaoyang

More information

Cluster Analysis of Electrical Behavior

Cluster Analysis of Electrical Behavior Journal of Computer and Communcatons, 205, 3, 88-93 Publshed Onlne May 205 n ScRes. http://www.scrp.org/ournal/cc http://dx.do.org/0.4236/cc.205.350 Cluster Analyss of Electrcal Behavor Ln Lu Ln Lu, School

More information

Identify the Attack in Embedded Image with Steganalysis Detection Method by PSNR and RGB Intensity

Identify the Attack in Embedded Image with Steganalysis Detection Method by PSNR and RGB Intensity Internatonal Journal of Computer Systems (ISSN: 394-1065), Volume 03 Issue 07, July, 016 Avalable at http://www.jcsonlne.com/ Identfy the Attack n Embedded Image wth Steganalyss Detecton Method by PSNR

More information

Subspace clustering. Clustering. Fundamental to all clustering techniques is the choice of distance measure between data points;

Subspace clustering. Clustering. Fundamental to all clustering techniques is the choice of distance measure between data points; Subspace clusterng Clusterng Fundamental to all clusterng technques s the choce of dstance measure between data ponts; D q ( ) ( ) 2 x x = x x, j k = 1 k jk Squared Eucldean dstance Assumpton: All features

More information

A Binarization Algorithm specialized on Document Images and Photos

A Binarization Algorithm specialized on Document Images and Photos A Bnarzaton Algorthm specalzed on Document mages and Photos Ergna Kavalleratou Dept. of nformaton and Communcaton Systems Engneerng Unversty of the Aegean kavalleratou@aegean.gr Abstract n ths paper, a

More information

Research Article Improved Encrypted-Signals-Based Reversible Data Hiding Using Code Division Multiplexing and Value Expansion

Research Article Improved Encrypted-Signals-Based Reversible Data Hiding Using Code Division Multiplexing and Value Expansion Securty and Communcaton Networks Volume 2018, Artcle ID 1326235, 9 pages https://do.org/10.1155/2018/1326235 Research Artcle Improved Encrypted-Sgnals-Based Reversble Data Hdng Usng Code Dvson Multplexng

More information

Shape-adaptive DCT and Its Application in Region-based Image Coding

Shape-adaptive DCT and Its Application in Region-based Image Coding Internatonal Journal of Sgnal Processng, Image Processng and Pattern Recognton, pp.99-108 http://dx.do.org/10.14257/sp.2014.7.1.10 Shape-adaptve DCT and Its Applcaton n Regon-based Image Codng Yamn Zheng,

More information

A new remote user authentication scheme for multi-server architecture

A new remote user authentication scheme for multi-server architecture Future Generaton Computer Systems 19 (2003) 13 22 A new remote user authentcaton scheme for mult-server archtecture Iuon-Chang Ln a, Mn-Shang Hwang b,, L-Hua L b a Department of Computer Scence and Informaton

More information

Parallel Inverse Halftoning by Look-Up Table (LUT) Partitioning

Parallel Inverse Halftoning by Look-Up Table (LUT) Partitioning Parallel Inverse Halftonng by Look-Up Table (LUT) Parttonng Umar F. Sddq and Sadq M. Sat umar@ccse.kfupm.edu.sa, sadq@kfupm.edu.sa KFUPM Box: Department of Computer Engneerng, Kng Fahd Unversty of Petroleum

More information

Information Hiding Watermarking Detection Technique by PSNR and RGB Intensity

Information Hiding Watermarking Detection Technique by PSNR and RGB Intensity www..org 3 Informaton Hdng Watermarkng Detecton Technque by PSNR and RGB Intensty 1 Neha Chauhan, Akhlesh A. Waoo, 3 P. S. Patheja 1 Research Scholar, BIST, Bhopal, Inda.,3 Assstant Professor, BIST, Bhopal,

More information

Tsinghua University at TAC 2009: Summarizing Multi-documents by Information Distance

Tsinghua University at TAC 2009: Summarizing Multi-documents by Information Distance Tsnghua Unversty at TAC 2009: Summarzng Mult-documents by Informaton Dstance Chong Long, Mnle Huang, Xaoyan Zhu State Key Laboratory of Intellgent Technology and Systems, Tsnghua Natonal Laboratory for

More information

Research and Application of Fingerprint Recognition Based on MATLAB

Research and Application of Fingerprint Recognition Based on MATLAB Send Orders for Reprnts to reprnts@benthamscence.ae The Open Automaton and Control Systems Journal, 205, 7, 07-07 Open Access Research and Applcaton of Fngerprnt Recognton Based on MATLAB Nng Lu* Department

More information

Novel Pattern-based Fingerprint Recognition Technique Using 2D Wavelet Decomposition

Novel Pattern-based Fingerprint Recognition Technique Using 2D Wavelet Decomposition Mathematcal Methods for Informaton Scence and Economcs Novel Pattern-based Fngerprnt Recognton Technque Usng D Wavelet Decomposton TUDOR BARBU Insttute of Computer Scence of the Romanan Academy T. Codrescu,,

More information

Security Enhanced Dynamic ID based Remote User Authentication Scheme for Multi-Server Environments

Security Enhanced Dynamic ID based Remote User Authentication Scheme for Multi-Server Environments Internatonal Journal of u- and e- ervce, cence and Technology Vol8, o 7 0), pp7-6 http://dxdoorg/07/unesst087 ecurty Enhanced Dynamc ID based Remote ser Authentcaton cheme for ult-erver Envronments Jun-ub

More information

An Image Fusion Approach Based on Segmentation Region

An Image Fusion Approach Based on Segmentation Region Rong Wang, L-Qun Gao, Shu Yang, Yu-Hua Cha, and Yan-Chun Lu An Image Fuson Approach Based On Segmentaton Regon An Image Fuson Approach Based on Segmentaton Regon Rong Wang, L-Qun Gao, Shu Yang 3, Yu-Hua

More information

A Hybrid Digital Image Watermarking based on Discrete Wavelet Transform, Discrete Cosine Transform, and General Regression Neural Network

A Hybrid Digital Image Watermarking based on Discrete Wavelet Transform, Discrete Cosine Transform, and General Regression Neural Network A Hybrd Dgtal Image Watermarkng based on Dscrete Wavelet Transform, Dscrete Cosne Transform, and General Regresson Neural Network Ayoub Taher ; ABSTRACT In ths paper, a new hybrd dgtal watermarkng technque

More information

Digital Video Watermarking using Discrete Wavelet Transform and Principal Component Analysis

Digital Video Watermarking using Discrete Wavelet Transform and Principal Component Analysis Internatonal Journal of Wsdom Based Computng, Vol. 1 (2), August 2011 7 Dgtal Vdeo Watermarkng usng Dscrete Wavelet Transform and Prncpal Component Analyss Sanjana Snha, Prajnat Bardhan, Swarnal Pramanck,

More information

Distortion Function Designing for JPEG Steganography with Uncompressed Side-image

Distortion Function Designing for JPEG Steganography with Uncompressed Side-image Dstorton Functon Desgnng for JPEG Steganography wth Uncompressed Sde-mage Fangjun Huang School of Informaton Scence and Technology, Sun Yat-Sen Unversty, GD 56, Chna huangfj@mal.sysu.edu.cn Jwu Huang School

More information

Corner-Based Image Alignment using Pyramid Structure with Gradient Vector Similarity

Corner-Based Image Alignment using Pyramid Structure with Gradient Vector Similarity Journal of Sgnal and Informaton Processng, 013, 4, 114-119 do:10.436/jsp.013.43b00 Publshed Onlne August 013 (http://www.scrp.org/journal/jsp) Corner-Based Image Algnment usng Pyramd Structure wth Gradent

More information

Robust Video Watermarking Using Image Normalization, Motion Vector and Perceptual Information

Robust Video Watermarking Using Image Normalization, Motion Vector and Perceptual Information Robust Vdeo Watermarkng Usng Image ormalzaton, Moton Vector and Perceptual Informaton Cedllo-Hernández Antono 1, Cedllo-Hernández Manuel 1, akano-myatake Marko 1, García-Vázquez Mreya S. 2 1 Postgraduate

More information

Robust and Reversible Relational Database Watermarking Algorithm Based on Clustering and Polar Angle Expansion

Robust and Reversible Relational Database Watermarking Algorithm Based on Clustering and Polar Angle Expansion Robust and Reversble Relatonal Database Watermarkng Algorthm Based on Clusterng and Polar Angle Expanson Zhyong L, Junmn Lu and Wecheng Tao College of Informaton Scence and Engneerng, Hunan Unversty, Changsha,

More information

Research Article High Capacity Reversible Watermarking for Audio by Histogram Shifting and Predicted Error Expansion

Research Article High Capacity Reversible Watermarking for Audio by Histogram Shifting and Predicted Error Expansion e Scentfc World Journal, Artcle ID 656251, 7 pages http://dx.do.org/1.1155/214/656251 Research Artcle Hgh Capacty Reversble Watermarkng for Audo by Hstogram Shftng and Predcted Error Expanson Fe Wang,

More information

Adaptive digital watermarking of images using Genetic Algorithm

Adaptive digital watermarking of images using Genetic Algorithm Adaptve dgtal watermarkng of mages usng Genetc Algorthm Bushra Skander, Muhammad Ishtaq, M. Arfan Jaffar, Muhammad Tarq, Anwar M. Mrza Department of Computer Scence, Natonal Unversty of Computer and Emergng

More information

Video Watermarking Algorithm Based on Relative Relationship of DCT Coefficients

Video Watermarking Algorithm Based on Relative Relationship of DCT Coefficients 756 JOURAL OF COPUTERS, VOL. 8, O., OVEBER 03 Vdeo Watermarkng Algorthm Based on Relatve Relatonshp of DCT Coeffcents Cheng ngzh, Du Yanpng, Wang Yan Bejng Insttute of Graphc Communcaton, Bejng, Chna Emal:

More information

A Robust Webpage Information Hiding Method Based on the Slash of Tag

A Robust Webpage Information Hiding Method Based on the Slash of Tag Advanced Engneerng Forum Onlne: 2012-09-26 ISSN: 2234-991X, Vols. 6-7, pp 361-366 do:10.4028/www.scentfc.net/aef.6-7.361 2012 Trans Tech Publcatons, Swtzerland A Robust Webpage Informaton Hdng Method Based

More information

Concurrent Apriori Data Mining Algorithms

Concurrent Apriori Data Mining Algorithms Concurrent Apror Data Mnng Algorthms Vassl Halatchev Department of Electrcal Engneerng and Computer Scence York Unversty, Toronto October 8, 2015 Outlne Why t s mportant Introducton to Assocaton Rule Mnng

More information

Security Vulnerabilities of an Enhanced Remote User Authentication Scheme

Security Vulnerabilities of an Enhanced Remote User Authentication Scheme Contemporary Engneerng Scences, Vol. 7, 2014, no. 26, 1475-1482 HIKARI Ltd, www.m-hkar.com http://dx.do.org/10.12988/ces.2014.49186 Securty Vulnerabltes of an Enhanced Remote User Authentcaton Scheme Hae-Soon

More information

Detection of an Object by using Principal Component Analysis

Detection of an Object by using Principal Component Analysis Detecton of an Object by usng Prncpal Component Analyss 1. G. Nagaven, 2. Dr. T. Sreenvasulu Reddy 1. M.Tech, Department of EEE, SVUCE, Trupath, Inda. 2. Assoc. Professor, Department of ECE, SVUCE, Trupath,

More information

SLAM Summer School 2006 Practical 2: SLAM using Monocular Vision

SLAM Summer School 2006 Practical 2: SLAM using Monocular Vision SLAM Summer School 2006 Practcal 2: SLAM usng Monocular Vson Javer Cvera, Unversty of Zaragoza Andrew J. Davson, Imperal College London J.M.M Montel, Unversty of Zaragoza. josemar@unzar.es, jcvera@unzar.es,

More information

Palmprint Feature Extraction Using 2-D Gabor Filters

Palmprint Feature Extraction Using 2-D Gabor Filters Palmprnt Feature Extracton Usng 2-D Gabor Flters Wa Kn Kong Davd Zhang and Wenxn L Bometrcs Research Centre Department of Computng The Hong Kong Polytechnc Unversty Kowloon Hong Kong Correspondng author:

More information

Learning the Kernel Parameters in Kernel Minimum Distance Classifier

Learning the Kernel Parameters in Kernel Minimum Distance Classifier Learnng the Kernel Parameters n Kernel Mnmum Dstance Classfer Daoqang Zhang 1,, Songcan Chen and Zh-Hua Zhou 1* 1 Natonal Laboratory for Novel Software Technology Nanjng Unversty, Nanjng 193, Chna Department

More information

Problem Set 3 Solutions

Problem Set 3 Solutions Introducton to Algorthms October 4, 2002 Massachusetts Insttute of Technology 6046J/18410J Professors Erk Demane and Shaf Goldwasser Handout 14 Problem Set 3 Solutons (Exercses were not to be turned n,

More information

Efficient Video Coding with R-D Constrained Quadtree Segmentation

Efficient Video Coding with R-D Constrained Quadtree Segmentation Publshed on Pcture Codng Symposum 1999, March 1999 Effcent Vdeo Codng wth R-D Constraned Quadtree Segmentaton Cha-Wen Ln Computer and Communcaton Research Labs Industral Technology Research Insttute Hsnchu,

More information

Coding Artifact Reduction Using Edge Map Guided Adaptive and Fuzzy Filter

Coding Artifact Reduction Using Edge Map Guided Adaptive and Fuzzy Filter MEL A MITSUBISHI ELECTIC ESEACH LABOATOY http://www.merl.com Codng Artfact educton Usng Edge Map Guded Adaptve and Fuzzy Flter Hao-Song Kong Yao Ne Anthony Vetro Hufang Sun Kenneth E. Barner T-2004-056

More information

Brushlet Features for Texture Image Retrieval

Brushlet Features for Texture Image Retrieval DICTA00: Dgtal Image Computng Technques and Applcatons, 1 January 00, Melbourne, Australa 1 Brushlet Features for Texture Image Retreval Chbao Chen and Kap Luk Chan Informaton System Research Lab, School

More information

A Novel Adaptive Descriptor Algorithm for Ternary Pattern Textures

A Novel Adaptive Descriptor Algorithm for Ternary Pattern Textures A Novel Adaptve Descrptor Algorthm for Ternary Pattern Textures Fahuan Hu 1,2, Guopng Lu 1 *, Zengwen Dong 1 1.School of Mechancal & Electrcal Engneerng, Nanchang Unversty, Nanchang, 330031, Chna; 2. School

More information

Fuzzy Filtering Algorithms for Image Processing: Performance Evaluation of Various Approaches

Fuzzy Filtering Algorithms for Image Processing: Performance Evaluation of Various Approaches Proceedngs of the Internatonal Conference on Cognton and Recognton Fuzzy Flterng Algorthms for Image Processng: Performance Evaluaton of Varous Approaches Rajoo Pandey and Umesh Ghanekar Department of

More information

USING GRAPHING SKILLS

USING GRAPHING SKILLS Name: BOLOGY: Date: _ Class: USNG GRAPHNG SKLLS NTRODUCTON: Recorded data can be plotted on a graph. A graph s a pctoral representaton of nformaton recorded n a data table. t s used to show a relatonshp

More information

R s s f. m y s. SPH3UW Unit 7.3 Spherical Concave Mirrors Page 1 of 12. Notes

R s s f. m y s. SPH3UW Unit 7.3 Spherical Concave Mirrors Page 1 of 12. Notes SPH3UW Unt 7.3 Sphercal Concave Mrrors Page 1 of 1 Notes Physcs Tool box Concave Mrror If the reflectng surface takes place on the nner surface of the sphercal shape so that the centre of the mrror bulges

More information

College of Information & Computer, Anhui Agricultural University, Hefei, Anhui, , China

College of Information & Computer, Anhui Agricultural University, Hefei, Anhui, , China 4th Internatonal Conference on Mechatroncs Materals Chemstry and Computer Engneerng (ICMMCCE 15) Improved retnex mage enhancement algorthm based on blateral flterng Ya nan Yang 1 a Zhaohu Jang 1 b * Chunhe

More information

TN348: Openlab Module - Colocalization

TN348: Openlab Module - Colocalization TN348: Openlab Module - Colocalzaton Topc The Colocalzaton module provdes the faclty to vsualze and quantfy colocalzaton between pars of mages. The Colocalzaton wndow contans a prevew of the two mages

More information

Secure and Fast Fingerprint Authentication on Smart Card

Secure and Fast Fingerprint Authentication on Smart Card SETIT 2005 3 rd Internatonal Conference: Scences of Electronc, Technologes of Informaton and Telecommuncatons March 27-31, 2005 TUNISIA Secure and Fast Fngerprnt Authentcaton on Smart Card Y. S. Moon*,

More information

Detecting MP3Stego using Calibrated Side Information Features

Detecting MP3Stego using Calibrated Side Information Features 2628 JOURNAL OF SOFTWARE, VOL. 8, NO. 10, OCTOBER 2013 Detectng P3Stego usng Calbrated Sde Informaton Features Xanmn Yu School of Informaton Scence and Engneerng, Nngbo Unversty Emal: mlhappy1016@163.com

More information

Two-Factor User Authentication in Multi-Server Networks

Two-Factor User Authentication in Multi-Server Networks Internatonal Journal of ecurty and Its Applcatons Vol. 6, No., Aprl, 0 Two-Factor ser Authentcaton n Mult-erver Networks Chun-Ta L, Ch-Yao Weng,* and Chun-I Fan Department of Informaton Management, Tanan

More information

Face Recognition Method Based on Within-class Clustering SVM

Face Recognition Method Based on Within-class Clustering SVM Face Recognton Method Based on Wthn-class Clusterng SVM Yan Wu, Xao Yao and Yng Xa Department of Computer Scence and Engneerng Tong Unversty Shangha, Chna Abstract - A face recognton method based on Wthn-class

More information

Background Removal in Image indexing and Retrieval

Background Removal in Image indexing and Retrieval Background Removal n Image ndexng and Retreval Y Lu and Hong Guo Department of Electrcal and Computer Engneerng The Unversty of Mchgan-Dearborn Dearborn Mchgan 4818-1491, U.S.A. Voce: 313-593-508, Fax:

More information

3D Virtual Eyeglass Frames Modeling from Multiple Camera Image Data Based on the GFFD Deformation Method

3D Virtual Eyeglass Frames Modeling from Multiple Camera Image Data Based on the GFFD Deformation Method NICOGRAPH Internatonal 2012, pp. 114-119 3D Vrtual Eyeglass Frames Modelng from Multple Camera Image Data Based on the GFFD Deformaton Method Norak Tamura, Somsangouane Sngthemphone and Katsuhro Ktama

More information

The Research of Ellipse Parameter Fitting Algorithm of Ultrasonic Imaging Logging in the Casing Hole

The Research of Ellipse Parameter Fitting Algorithm of Ultrasonic Imaging Logging in the Casing Hole Appled Mathematcs, 04, 5, 37-3 Publshed Onlne May 04 n ScRes. http://www.scrp.org/journal/am http://dx.do.org/0.436/am.04.584 The Research of Ellpse Parameter Fttng Algorthm of Ultrasonc Imagng Loggng

More information

For instance, ; the five basic number-sets are increasingly more n A B & B A A = B (1)

For instance, ; the five basic number-sets are increasingly more n A B & B A A = B (1) Secton 1.2 Subsets and the Boolean operatons on sets If every element of the set A s an element of the set B, we say that A s a subset of B, or that A s contaned n B, or that B contans A, and we wrte A

More information

Type-2 Fuzzy Non-uniform Rational B-spline Model with Type-2 Fuzzy Data

Type-2 Fuzzy Non-uniform Rational B-spline Model with Type-2 Fuzzy Data Malaysan Journal of Mathematcal Scences 11(S) Aprl : 35 46 (2017) Specal Issue: The 2nd Internatonal Conference and Workshop on Mathematcal Analyss (ICWOMA 2016) MALAYSIAN JOURNAL OF MATHEMATICAL SCIENCES

More information

Deep learning is a good steganalysis tool when embedding key is reused for different images, even if there is a cover source-mismatch

Deep learning is a good steganalysis tool when embedding key is reused for different images, even if there is a cover source-mismatch Deep learnng s a good steganalyss tool when embeddng key s reused for dfferent mages, even f there s a cover source-msmatch Lonel PIBRE 2,3, Jérôme PASQUET 2,3, Dno IENCO 2,3, Marc CHAUMONT 1,2,3 (1) Unversty

More information

A Clustering Algorithm for Key Frame Extraction Based on Density Peak

A Clustering Algorithm for Key Frame Extraction Based on Density Peak Journal of Computer and Communcatons, 2018, 6, 118-128 http://www.scrp.org/ournal/cc ISSN Onlne: 2327-5227 ISSN Prnt: 2327-5219 A Clusterng Algorthm for Key Frame Extracton Based on Densty Peak Hong Zhao

More information

A fast algorithm for color image segmentation

A fast algorithm for color image segmentation Unersty of Wollongong Research Onlne Faculty of Informatcs - Papers (Arche) Faculty of Engneerng and Informaton Scences 006 A fast algorthm for color mage segmentaton L. Dong Unersty of Wollongong, lju@uow.edu.au

More information

Performance Analysis of Data Hiding in MPEG-4 AAC Audio *

Performance Analysis of Data Hiding in MPEG-4 AAC Audio * TSINGHUA SCIENCE AND TECHNOLOGY ISSNll1007-0214ll07/21llpp55-61 Volume 14, Number 1, February 2009 Performance Analyss of Data Hdng n MPEG-4 AAC Audo * XU Shuzheng ( ) **, ZHANG Peng ( ), WANG Pengjun

More information

Simulation Based Analysis of FAST TCP using OMNET++

Simulation Based Analysis of FAST TCP using OMNET++ Smulaton Based Analyss of FAST TCP usng OMNET++ Umar ul Hassan 04030038@lums.edu.pk Md Term Report CS678 Topcs n Internet Research Sprng, 2006 Introducton Internet traffc s doublng roughly every 3 months

More information

New Region Incrementing Visual Cryptography Scheme

New Region Incrementing Visual Cryptography Scheme New Regon Incrementng Vsual Cryptography Scheme Chng-Nung Yang Hsang-Wen Shh Yu-Yng Chu Len Harn CSIE Dept Natonal Dong Hwa Unversty Hualen Tawan CSEE Dept Unversty of Mssour-Kansas Cty Kansas Mssour USA

More information

Object-Based Techniques for Image Retrieval

Object-Based Techniques for Image Retrieval 54 Zhang, Gao, & Luo Chapter VII Object-Based Technques for Image Retreval Y. J. Zhang, Tsnghua Unversty, Chna Y. Y. Gao, Tsnghua Unversty, Chna Y. Luo, Tsnghua Unversty, Chna ABSTRACT To overcome the

More information

Constructing Minimum Connected Dominating Set: Algorithmic approach

Constructing Minimum Connected Dominating Set: Algorithmic approach Constructng Mnmum Connected Domnatng Set: Algorthmc approach G.N. Puroht and Usha Sharma Centre for Mathematcal Scences, Banasthal Unversty, Rajasthan 304022 usha.sharma94@yahoo.com Abstract: Connected

More information

Steganography System using Slantlet Transform

Steganography System using Slantlet Transform ISSN:43-6999 Journal of Inmaton Communcaton and Intellgence Systems (JICIS) Volume Issue February 06 Steganography System usng Slantlet Transm Ryadh Bassl Abduljabbar Abstract An approach hdng nmaton has

More information

Learning-Based Top-N Selection Query Evaluation over Relational Databases

Learning-Based Top-N Selection Query Evaluation over Relational Databases Learnng-Based Top-N Selecton Query Evaluaton over Relatonal Databases Lang Zhu *, Wey Meng ** * School of Mathematcs and Computer Scence, Hebe Unversty, Baodng, Hebe 071002, Chna, zhu@mal.hbu.edu.cn **

More information

Clustering Algorithm of Similarity Segmentation based on Point Sorting

Clustering Algorithm of Similarity Segmentation based on Point Sorting Internatonal onference on Logstcs Engneerng, Management and omputer Scence (LEMS 2015) lusterng Algorthm of Smlarty Segmentaton based on Pont Sortng Hanbng L, Yan Wang*, Lan Huang, Mngda L, Yng Sun, Hanyuan

More information