Faster Image Encryption: A Semi-Tensor Product Approach

Size: px
Start display at page:

Download "Faster Image Encryption: A Semi-Tensor Product Approach"

Transcription

1 207 Internatonal Conference on Computer Scence and Applcaton Engneerng (CSAE 207) ISBN: Faster Image Encrypton: A Sem-Tensor Product Approach Shpng Ye, Jnmng Wang *, Zhenyu Xu and Chaoxang Chen Zhejang Shuren Unversty, 3005 Hangzhou, Chna ABSTRACT Due to the large-scale of the mages, they suffer from a long tme to fnsh the process of encrypton and decrypton. In ths paper, we propose a novel mage-encrypton algorthm to mprove the performance of processng tme based on the sem-tensor product (STP). The STP s a novel matrx product that works by extendng the conventonal matrx product n cases of unequal dmensons. In paper, we construct a small reversble key matrx by usng the Kronecker product. Then, we use ths key matrx to change the values of pxels n the orgnal mage by applyng the sem-tensor product. As a result, the dmensons of the orgnal mage are much larger than the dmensons of the key matrx, and the amount of data that s calculated durng the encrypton and decrypton process s effectvely reduced. Meanwhle, the proposed algorthm can be used to encrypt and decrypt mages of dfferent szes. Experments were carred out usng mages of varous szes. The expermental results were compared wth prevous methods and the proposed method outperformed the others n terms of securty and processng tme. INTRODUCTION Wth the development of multmeda communcaton technology, dgtal data transmsson through wred and wreless networks has ncreased sgnfcantly. Such data nclude audo, vdeo, mages, and fles, and they have prompted a surge n traffc volume and network nfrastructure n recent years. Thus, securty problems durng transmsson and storage have also ncreased, and due to the large-scale of the mages, they suffer from a long tme to fnsh the process of encrypton and decrypton. Consequently, t needs a tradeoff between encrypton and computaton durng ts transmsson and storage. Many researchers have focused on the securty of mage-data transmsson, and several mage-encrypton algorthms have been proposed based on matrx transformatons [, 2], chaos theory [4-8], and transformaton domans [9-2]. Meanwhle, the Kronecker product has been used to mprove the transformaton performance [3-6]. The Kronecker product s a product of one element to a whole matrx, whch can quckly construct a large-dmenson matrx by some small-dmenson matrces. Such as, a transform matrx was generated usng the Kronecker product of two 6 6 matrces, whch s helpful for fast computaton and effcent constructon. The sem-tensor product (STP) s the product of one element and a block from the other matrx, and t s a novel matrx product that works by extendng the conventonal matrx product n cases of unequal dmensons. In [7], the 72

2 STP was used to provde a Boolean network representaton n a lnear system for nonlnear feedback-shft regsters (NFSR), and ths research demonstrates that the STP approach s helpful n desgnng NFSR for stream cphers n cryptography. Thus, nspred by the successful applcaton of the Kronecker product and the STP, and to mprove the effcency of mage encrypton, we propose a new algorthm for mage encrypton. The proposed algorthm s less computatonally expensve durng the encrypton and decrypton process. Furthermore, t offers lossless decrypton and robustness, avods expandng the transmtted data, and needs less tme to process. The proposed algorthm uses a small encrypton matrx to encrypt the mage wth the large-scale mage matrx. Our proposal s advantageous for several reasons. Frst, the algorthm effectvely reduces data computaton durng the encrypton and decrypton process. Consequently, the encrypton and decrypton operaton s more effcent, owng to the use of a small encrypton matrx to encrypt or decrypt a large-scale mage matrx. Second, the proposed algorthm can be appled for the encrypton of mages of dfferent szes for secure transmsson and storage. Fnally, our proposal ntroduces several key parameters, such as the dmensons of the encrypton matrx, the dfferent elements of the encrypton matrx, and the number of encrypton teratons. These parameters mprove the robustness of the encrypted mage. To verfy the accuracy and effectveness of the proposed mage-encrypton algorthm, we tested t usng DICOM medcal mages, and gray-scale mages. After usng the STP algorthm to encrypt the mages wth an 8 8 encrypton matrx, we compared the hstogram of the orgnal wth the encrypted mage, and we studed the correlaton of adjacent pxels, nformaton entropy, tme consumed, and ts susceptblty to dfferental attacks. The results of these tests demonstrate that the algorthm proposed here offers secure nformaton protecton and satsfes the processng tme requred by standard applcatons. Moreover, several encrypton keys are generated durng the mageencrypton process, and ths greatly enhances the space of the keys and mproves the robustness of the encrypted mage. The remander of ths paper s organzed as follows. In Secton II, the prelmnares of the Kronecker product and the STP are ntroduced. In Secton III, we descrbe the proposed algorthm for mage encrypton and decrypton. In Secton IV, we present the expermental results. Secton V offers a dscusson of these results. Fnally, Secton VI concludes the paper and dscusses future research. PRELIMINARIES In ths secton, we dscuss some necessary prelmnares to the Kronecker product and the STP, whch are adopted n the subsequent sectons. The Kronecker product s a product of one element to a whole matrx, whch can quckly construct a large-dmenson matrx by some small-dmenson matrces. The STP of matrces was ntroduced by Cheng [8]. It s a generalzaton of the conventonal matrx product. 73

3 Kronecker Product Defnton : For the Kronecker product of matrces (also called the tensor product ), f A ( aj ) M m n, B ( bj ) M p q, then the Kronecker product s defned as follows [9]: a B a B a B 2 n A B, () a B a B a B m m2 mn where s the Kronecker product for matrces, ab j ( 2,,,m, j 2,,,n) s tself a p q matrx, and A B s the set of mp nq matrces. Hence, the followng theorem can be proved: Theorem : Suppose C ( Ckl ) M m n,,2, K. Accordng to the defnton of the Kronecker product, we have K K C C, (2) K f m m, K K n n, then C Mm n. 2 2 Proof: By Def., when K =2, C C C holds, where C s a matrx of 2 2 m n. 2 k k k k Let C C C2 C k, 2 k K, where C s a m n matrx. k By Def., there exsts C k = (C Ck) Ck, where C s a k k K m n matrx. Then, C Mm n holds (when k K). The theorem s thus proved. Corollary If all C are nvertble, such that, 2, K, M m n, then Sem-tensor Product C K K ( C ) C M. (3) mn In [8], the STP s presented as an extenson of the conventonal matrx product. For a conventonal matrx product, f the column number of A (Col(A)) s equal to the lne number of B (Row(B)), then matrces A and B are multplcatve. The STP of matrces, on the other hand, extends the conventonal matrx product n cases of unequal dmensons. That s, Col(A) Row(B). Frst, we consder the conventonal matrx product. Let U and V be m- and n-dmensonal vector spaces, respectvely. Assume F L(U V, ). That s, F s a blnear mappng from U V to. Denote by { u,,u m } and { v,,v n } the bases of U and V, respectvely. We call S = ( s j ) the structure matrx of F, where sj F( u,v j ), (4) and where 2,,,m, j 2,,,n. m If we let X x uu, otherwse wrtten as X ( x,, x ) T m U, and f n Y yvv, otherwse wrtten as Y ( y,, y ) T m V, then 74

4 F( X,Y) T X T SY (5) Followng ths, and denotng the rows of S by S, m, and S, we can alternatvely calculate F n two steps: 2 m Step : Calculate xs, xs 2,, xms and take ther sum. m Step 2: Multply xs by Y (whch s a standard nner product). It s easy to check whether ths algorthm produces the same result. In the frst step, t seems that we have ( S n S ) X. Ths calculaton motvates the STP, defned as follows. Defnton 2: Let T be an np -dmensonal row vector and let X be a p - dmensonal column vector. Splt T nto p equal blocks, named T, p, T, whch are n matrces. Defne a left sem-tensor product, denoted by, as follows: T X p T x n. (6) Defnton 3: Let X ( x,, x s ) be a row vector, and let Y be a column vector Y ( y,, y ) T t. Case : If t s a factor of s,.e., f s t n, then the n - dmensonal row vector defned as X Y t k X yk n (7) k s called the left sem-tensor nner product of X and Y, where ( t n X X,, X ), X,,,t. Case 2: If s s a factor of t,.e., f t s n, then the n - dmensonal column vector defned by X t k k n Y : x Y (8) k s called the left sem-tensor nner product of X and Y, where Y ((Y ) T,,( Y t ) T ) T n, X,,,t. mn pq Defnton 4: Let A and B. If ether n s a factor of p.e., f nt p (denoted as A t B) or f p s a factor of n.e., n pt (denoted as A t B) then the (left) STP of A and B can be denoted by C { C j } A B, as follows: C conssts of m q blocks, and each block s defned as j C A B,,, m, j,, q, j where A s the -th row of A, and B j s the j-th column of B. In comparng the conventonal matrx product wth the Kronecker product and the STP of matrces, t s easy to see that there are sgnfcant dfferences between them. For the conventonal matrx product, the product s element-toelement. The Kronecker product s a product of one element to a whole matrx, and the STP s the product of one element and a block from the other matrx. The STP of matrces s a generalzaton of the conventonal matrx product. That mn pq s, f A, B, and n p, then A B AB. 75

5 Consequently, when the conventonal matrx product s extended to the STP, almost all of ts propertes are nevertheless mantaned. Ths s a sgnfcant advantage to usng the STP [8]. We provde the followng theorems and corollares. mn Defnton 5: Suppose A( a j ). If A s a square matrx ( m n), and A exsts, then by Def. 4 and notcng that have mn mn mn mtp ( A B) A B (see [8]), we A A I. (9) p p p p Defnton 6: Suppose A( a j ), B( b j ), and F ( f j ). The STP satsfes the assocatve law: ( A B) F A ( B F). (0) The STP has a wde range of applcatons: n nonlnear systems control for structural analyss and control of Boolean networks, n systems bology as a soluton to Morgan s Problem, etc. [8]. Furthermore, there are also applcatons for the STP n the feld of data encrypton and decrypton. To change the elements n A, whch are defned n Def. 4, we can use the conventonal matrx product or the STP. By comparng the two dfferent matrx products, we can show that less computaton s needed for the STP than the conventonal matrx product. Ths encourages us to adopt the STP for mage encrypton and decrypton on systems wth constraned resources. ALGORITHM DESCRIPTION In ths secton, we frst ntroduce the encrypton algorthm, whch uses a small key matrx to encrypt an mage wth a large-scale mage matrx. We then explan the decrypton algorthm by the nverse key matrx. Encrypton Algorthm Consder a dgtal mage PM Nwth M pxels n the row and N pxels n the column, and let P, j( {,2,, M}, j {,2,, N} ) be any pxel from the mage. If there exsts an nverse rectangular matrx Sn n, then take N nt and use Def. 4 to derve the STP. Thus, the followng equaton holds: QM N PM N Sn n, () where QM Ns the encrypted mage matrx after changng the value from each pxel n PM N. Multplcaton then expands Eq. (), such that the followng holds:,,2, n 2, 2,2 2, n QM N PM N Sn n PM nt Sn n, (2) M, M,2 M, n n k, where P s sk j S k, n n, and P can be determned as,,, j k k. j k, P { p, p,, p } P, (3),( k ) t,( k ) t2, kt 76

6 k, where P s the k-th block of the -th lne, and each block has t pxels, M, k n. Gven the characterstcs of the mage, each pxel value can be denoted wth a sngle byte for both gray-scale and color mages, whch means that the value of pxel ranges from 0 to 255. If the mage s a medcal mage whether magnetc resonance (MR), computed radology (CR), or those classfed by DICOM as other (OT) the pxel value can be expressed n 6 bts, 2 bts, and 0 bts, respectvely. In ths case, we modfy Eq. (2) to obtan the fnal encrypton results wth the followng matrx: mod(,, Mmax B ) mod(, n, Mmax B ) QM N, (4) mod( M,, Mmax B ) mod( M, n, Mmax B ) where M max B denotes the maxmum value per pxel, derved as follows: 256, f bt-depth 8 024, f bt-depth 0 M max B. 4096, f bt-depth , f bt-depth 6 By Theorem, we can assume that nvertble matrces for Sl lexst such that the nverse rectangular matrx Sn n can be quckly constructed as follows: k Snn Sl l (5) k where l n. Ths s helpful for an effcent constructon and for speedng up the encrypton process. To mprove and contrast the encrypton securty of the encrypted mage, we encrypt the orgnal mage K rounds, as follows: Q P S S S P S. (6) M N M N nn nn nn M N nn Above all, ths algorthm encrypts dgtal mages usng the encrypton matrx Sn n at much smaller dmensons than the mage matrx PM N. Sgnfcantly less data s needed, and the computatonal complexty of the encrypton algorthm s reduced. Decrypton Algorthm To decrypt the encrypted mage QM N, the frst step nvolves ensurng that S n n exsts. Notng that ( A B) A B (see [8]), we can use Eq. () such that PM N QM N Sn n, and from PM N ( PM N Sn n) S nn, by Defnton 5, we can obtan PM N PM N ( Sn n S nn ). Usng Defnton 5, we have K 77

7 PM N PM N In n PM N. (7) Thus, we obtan the decrypted mage. By Theorem, Corollary, and Eq. (5), then, the nverse matrx S n n of Sn n can be obtaned quckly wth the followng equaton: k ( ) Snn Sl l, (8) k where l n, and ( S l ) l s the nverse matrx of S l l, 2,,,k. From the above descrpton, t s clear that once an nverse matrx S n n wth the approprate dmensons s constructed, then the dgtal mage can be encrypted and decrypted. After generatng the nverse matrx S n n by Eq. (8), we can use the prncple n Eq. () and the matrx calculaton n Eq. (2). Next, the characterstcs of the mage pxel values can be combned. Referrng to Eq. (4) durng the encrypton process, we can obtan the decrypted mage PM N as follows: mod(,, Mmax B ) mod(, n, Mmax B ) PM N, (9) mod( M,, Mmax B ) mod( M, n, Mmax B ) where, s, n k,, j Q s k k, j S k j n n, k, k, Q s defned as P, and M, k n. Thus, the process of encryptng and decryptng the orgnal mage are completed wth an encrypton matrx of smaller dmensons than the orgnal mage. There are two mportant and unque features to the proposed algorthm. Frst, the amount of data that s calculated durng the encrypton and decrypton process s effectvely reduced by usng data from a smaller matrx to encrypt and decrypt a large matrx mage. Second, the proposed algorthm can be used to encrypt and decrypt mages of dfferent szes. As explaned above, f we are gven an n-dmensonal matrx Sn n, then n s sutable for the number of columns n the orgnal mage PM N, provded that N n t, where t s a postve nteger. Thus, f the number of columns and rows PM' N' changes, such that N ' n t', where t' s also a postve nteger, the algorthm proposed here proceeds n the same manner, wthout any need for modfcatons. Constructng the Key Matrx Gven ther senstvty to the ntal condtons and control parameters, chaotc maps had been wdely used n data encrypton [4-8]. However, there are dsadvantages to chaotc maps, ncludng lmted precson, perod loops, and dffculty measurng the cycle. The decmal representatons of rratonal numbers are nether perodc nor termnatng, and that the next uncalculated decmal unt mght be any number between 0 and 9. In such cases, t s sad to be sutably chaotc [20]. Thus, we adopt rratonal numbers when constructng the key matrx. For = , let I ( d, L) [ ( d, L ), ( d2, L2 ), ( d, L ), ] be a set of ntegers from the rratonal number I, where L s the length of a segment chosen from I, whle 78

8 the ntal dgt of the segment s d dgts away from the decmal pont. Usng the defnton of I ( dl, ), we can obtan the followng: ( dl, ) [ (3,4), (5,3), (8,2), ], (20) where (3,4) =592, (5,3) =926, and (8,2) =53, etc. The parameters L and d can be determned by the sender and the recever together, where d, L, and [, ). From the above descrpton, let { u, v} ( d, L). The encrypton matrx S2 2 can be derved as follows: u S2 2 v uv, where S2 2s an nverse matrx. That s, det( S) 2 2. Usng Eq. (6), we can derve S4 4, S88, and, as follows: S S S u u u v ( uv ) uv u( uv ) v uv ( uv ) u( uv ), 2 2 v v( uv ) v( uv ) ( uv ) 44 and then we can obtan S88 by S2 2 S4 4 Therefore, we know that f we use dfferent { u, v} ( d, L), the elements S2 2, S4 4, and S88 wll change accordngly. Wth Eq. (9), we can quckly obtan S as follows: 88 uv u S2 2 v, S S S ( uv ) u( uv ) u( uv ) u v( uv ) ( uv ) uv u v( uv ) uv ( uv ) u, 2 v v v 44 and then we can obtan S 88 by S2 2 S4 4 Thus, we construct the encrypton matrx Sn n usng the above procedure. Indeed, there are other ways to construct Sn n, and the reader s nvted to generate the matrx usng any such procedure. Durng the data transmsson, there s no need to transmt the encrypton matrx or any parameters. Rather, the recever can merely use the rule of common agreement between the sender and recever to construct the decrypton matrx. EXPERIMENTAL RESULTS To verfy the proposed mage-encrypton method, gray-scale mages of dfferent dmensons and bt-depths were used, ncludng a CR chest mage 79

9 (hereafter CR-Chest ) (dmensons: ) obtaned from [2], Lena (dmensons: 52 52), Peppers (dmensons: ), Mandrll (dmensons: ), and Boats (dmensons: ). The CR-Chest has a bt-depth of 0, whereas the others have a bt-depth of 8. In ths paper, we conducted an expermental analyss of the proposed encrypton algorthm usng the followng gray-scale mages: CR-Chest, Lena, Peppers, Mandrll, and Boats. All of these mages were encrypted wth the matrx S88 and decrypted by. From Eq. (7), let K=4. Then, S 88 Q P S S S S P S. M N M N M N 88 Once the mages are encrypted, they can be decrypted as follows: PM N QM N S8 8 S8 8 S8 8 S8 8 QM N S8 8. The experments were conducted as follows: Encrypton procedure: Input: the n-dmenson of the key matrx; the source mage PM N; the number of encrypton rounds K; and the varables L and d for the key matrx. Output: Returns encrypted mage QM N. Step. The elements u and v from the set ( dl, ) are obtaned wth Eq. (20), and the matrx S2 2 s constructed. Step 2. The n n encrypton matrx Sn n s obtaned by Eq. (5). Step 3 The varables of t for the block of the source mage PM N are calculated by t N n, whch s defned n Def. 4. Step 4: The source mage PM Ns encrypted nto the cphered mage QM Nn Eqs. (2) and (4). If the current round s not the fnal round of encrypton, Step 4 s repeated. Otherwse, the encrypton process s complete. Decrypton procedure: Input: The varables L and d for the key matrx; the n-dmenson of the key matrx; the encrypted mage QM N; and the number of encrypton rounds K. Output: Returns decrypted mage PM N. Step. The n n encrypton matrx S n n s obtaned by Eqs. (20) and (8). Step 2. The varables of t for the block of the encrypted mage QM Nare calculated by t N n, whch s defned n Def. 4. Step 3: The encrypted mage QM Ns decrypted nto the decrypton QM Nn Eq. (7) and (9). If the current round s not the fnal round of encrypton, repeat Step 3 agan. Otherwse, the encrypton process s complete. The expermental results are provded n Fgs. 3, where the elements of the encrypton and decrypton matrces were obtaned as follows: u (6,2) =26, v (0,2) =58, where d =6, L =2, d 2 =0, and L 2 =2. In Fgures. -3, Frame (a) shows the orgnal mage. Frame (c) shows the encrypted mage from the orgnal n Frame (a) usng the key S88. Frame (e) shows the decrypted mage. Frames (b), (d), and (f) are the hstograms for (a), (c), and (e), respectvely. 4 80

10 Fgure. Comparson of (a) the Orgnal CR-Chest Image wth (c) the Encrypted Image, and (e) the Decrypted Image, and ther Correspondng Hstograms (Dmensons: , Bt-depth: 0). Fgure 2. Comparson of (a) the Orgnal Lena Image wth (c) the Encrypted Image, and (e) the Decrypted Image, and ther Correspondng Hstograms (Dmensons: 52 52, Bt-depth: 8). Fgure 3. Comparson of (a) the Orgnal Peppers Image wth (c) the Encrypted Image, and (e) the Decrypted Image, and ther Correspondng Hstograms (Dmensons: , Bt-depth: 8). 8

11 EXPERIMENTAL ANALYSIS Statstcal Analyss HISTOGRAM FOR ENCRYPTED IMAGE An mage hstogram llustrates how the pxels n an mage are dstrbuted, and ths s done by graphng the number of pxels n terms of ther ntensty. We calculated and analyzed the hstograms for the encrypted and orgnal mages to reveal how ther respectve content dffers. The hstograms are shown n Fgures. 3. In Frames (b) and (d) for these fgures, t s clear that the hstograms of the encrypted mage are farly unform, and that they dffer sgnfcantly from the hstograms of the orgnal mage. Meanwhle, we employ varances of hstograms to evaluate the unformty of the encrypted mages. The varance of hstograms s shown as follows: n n 2 Var( Z) ( ) 2 z z j, 2 n j where n denotes the gray values n the hstogram, and z and z j are the number of pxels wth gray values equal to and j, respectvely. As shown n TABLE I, lower varance to the encrypted mages ndcates hgher unformty, and the decrypted mages have the same varance as the orgnal, ndcatng that there s no dstorton between the orgnal and the decrypted mage. TABLE I. VARIANCES OF THE HISTOGRAMS. mage (Dmenson, Bt-depth) orgnal encrypted decrypted CR-Chest ( , 0) 5.406e e e+7 Lena (52 52, 8) 7.475e+5.823e e+5 Peppers ( , 8).3500e e e+6 Mandrll ( , 8) e e e+6 Boats ( , 8) e e e+6 All the orgnal mages of dfferng szes were encrypted wth the same encrypton matrx S88. Consequently, the algorthm proposed here s compatble wth dfferent-szed mages nsofar as the dmensons of Sn n are sutable for the number of columns n the orgnal mage. RELEVANCE OF ADJACENT ELEMENTS To test the correlaton of pxels (vz., vertcal, horzontal, and dagonal), we randomly selected 2,000 pars of adjacent pxels from both the orgnal and the encrypted mage, and calculated the correlaton coeffcents of pxels. TABLE II lsts the correlaton coeffcents calculated from the orgnal mages and ther correspondng mages cphered wth the proposed algorthm. From TABLE II, we can see that the correlaton coeffcents are always hgh. Whereas they are very close to n the plan-text mages, they are sgnfcantly reduced n the cphered mages. It s clear that our algorthm effectvely reduces the correlaton between adjacent pxels. 82

12 TABLE II. CORRELATION COEFFICIENTS OF CR-CHEST, LENA, PEPPERS, MANDRILL, BOATS AND THEIR ENCRYPTED IMAGES IN THE PROPOSED ALGORITHM. Orgnal CR-Chest Orgnal Lena Orgnal Peppers Orgnal Mandrll Orgnal Boats Vertcal Horzontal Dagonal Encrypted CR-Chest Encrypted Lena Encrypted Peppers Encrypted Mandrll Encrypted Boats Vertcal Horzontal Dagonal The correlaton comparson tests wth other encrypton algorthms are lsted n TABLE III. From TABLE III, we can see that the correlaton coeffcents from the proposed algorthm are lower than other schemes, except HC-DNA. These results confrm that our proposed encrypton s resstant to statstcal attacks amed at dscoverng the correlatons between adjacent pxels. TABLE III. COMPARING THE CORRELATION COEFFICIENTS OF CR-CHEST, LENA, PEPPERS, MANDRILL, AND BOATS. Image Ref. [4] Ref. [5] Ref. [8] AES HC- [22] DNA[24] Proposed CR-Chest Vertcal Horzontal Dagonal Lena Vertcal Horzontal Dagonal Peppers Vertcal Horzontal Dagonal Mandrll Vertcal Horzontal Dagonal Boats Vertcal Horzontal Dagonal

13 Informaton Entropy Analyss Informaton entropy s thought to be one of the most mportant features n randomness [23]. The nformaton entropy Hm ( ) s calculated wth the followng formula: 2 n H( m) p( m ) log p( m ) (2) 0 2 TABLE IV. THE INFORMATION ENTROPY OF ORIGINAL AND ENCRYPTED IMAGE. CR-Chest Lena Peppers Mandrll Boats Orgnal Image Encrypted Image where m s the message, p( m )= M max B ( M max B s derved from Eq. (5)) represents the probablty of symbol m, and the entropy s expressed n bts. Suppose that a message s such that each symbol s encoded wth eght bts. For randomness, the entropy value should be eght, deally. However, the entropy value of the message s often less than eght, though t should nonetheless come close to ths deal. For messages where each symbol s encoded wth ten bts, we can reach the deal Hm= ( ) 0. Ths deal entropy was acheved wth the CR- Chest mage, for nstance. We used Eq. (2) to calculate the nformaton entropy for the encrypted mages. TABLE IV shows the entropy for the gray-scale values, whch all come close to the deal value. Ths ndcates that the proposed scheme has successfully hdden the nformaton randomly, such that the probablty of accdental nformaton leakage s very low. TABLE V provdes a comparson of the proposed method wth other algorthms n terms of the nformaton entropy. The values obtaned from the proposed scheme are much closer to the deal and other algorthms, and thus the nformaton hdden wth the proposed scheme s more random than t s wth other schemes. TABLE V. COMPARING THE INFORMATION ENTROPY OF CR-CHEST, LENA, PEPPERS, MANDRILL, AND BOATS. Image Bts/pxel Ref. [4] Ref. [5] Ref. [8] AES [22] HC- DNA[24] Proposed CR-Chest Lena Peppers Mandrll Boats Dfferental Attack As a general requrement for all mage-encrypton schemes, the encrypted mage should dffer consderably from ts orgnal form. Such dfferences can be measured by means of two crtera namely, the number of pxel change rate (NPCR) and the unfed average changng ntensty (UACI) [8]. 84

14 Let C (, j) and C 2 (, j) be the gray level of the pxels at the -th row and j-th column of the encrypted mages, respectvely before and after a pxel from the orgnal mage changes (sze: M N pxels). The NPCR for these two mages s defned as M N NPCR [ D(, j)] 00%, (22) M N j where D(, j) s defned as 0, f C(, j) C2(, j) D(, j)., f C(, j) C2(, j) The UACI s calculated as follows: M N C(, j) C2(, j) UACI [ ] 00%, (23) M N M j max B where M max B s derved from Eq. (4). We measured the NPCR and the UACI for the orgnal and encrypted mages. The results are shown n TABLE VI. The results show that our algorthm s robust aganst dfferental attacks. TABLE VI. NPCR AND UACI OF THE ENCRYPTED IMAGES. Image Ref. [4] Ref. [5] Ref. [8] AES [22] Proposed NPCR(%) CR-Chest Lena Peppers Mandrll Boats UACI(%) CR-Chest Lena Peppers Mandrll Boats Key Space and Senstvty Analyss KEY SPACE The key space should be suffcently large to render brute-force attacks unfeasble. In the proposed algorthm, the keys consst of the followng: () the elements of the key matrx, (2) the n-dmenson of the key matrx, and (3) the K 64 number of encrypton rounds. Gven a precson of 2 and takng an M N - szed mage as an example f the same key matrx s used n dfferent encrypton rounds, the key space can be calculated as follows: 64 (2 ) n S n t, where n n denotes the elements of the key matrx, and t s the varable for the block of the source mage PM N, defned as t N n. If n =2, S = t 2. However, f we construct a larger key matrx, such as an 8 8 key matrx, then the key space S s t 2. If dfferent key matrces are used n dfferent encrypton rounds, the key space would be: 64 nn K S [(2 ) t], 85

15 where K s the number of encrypton rounds, meanng that the key space S s much larger than t was formerly. Thus, the proposed algorthm wth such a large key space s suffcent for relable and practcal use. KEY SENSITIVITY To test the key senstvty of the proposed algorthm, we agan used the NPCR. The key matrx S2 2 was constructed followng the detals provded n the secton Constructon of Key Matrx. Then, we constructed S88. The expermental results are provded n Fg. 4, where the parameters u and v range from 0 to 00, and the parameter dfference was u [0,] and v [0,]. Further, the encrypton rounds were, 2, and 4 tmes, and the same key matrx was used durng each encrypton round. Seen from the Fgure 4, the senstvty remans above 99% regardless of the parameters or encrypton rounds. Ths shows that our algorthm has a hgh level of senstvty to the ntal key. Ths guarantees the securty of the proposed algorthm aganst brute-force attacks to some extent. Fgure 4. Key-senstvty Test for the Proposed Algorthm: Boats mage (Dmensons: , Bt-depth: 8). Speed and Complexty Analyses To evaluate the runnng speed, we performed tests on the encrypton speed of the proposed algorthm, comparng t wth [5], [7], and the AES. The proposed algorthm was mplemented n Vsual C on an Intel laptop, runnng Wndows 8. The CPU tmes requred for the encrypton and decrypton processes are shown n TABLE VII. In all cases, the processng tme was merely a few seconds, but the processng tme nevertheless ncreased as the dmensons of the mage grew. These results show that the proposed algorthm runs faster than the AES algorthm, [5], and [7]. To analyze the executon tme of the encrypton process, we studed the tme consumed durng the multplcatons and addtons. Let the orgnal mage be PM N, and let the key matrx be Sn n, where n N. 86

16 2 For K encrypton rounds, the proposed algorthm requres O( Mn K ) teratons for multplcaton and O( Mn( n ) K) teratons for addton, whereas for the 2 conventonal matrx product, the teratons are O( MN K ) and O( MN( N ) K), respectvely. Therefore, the proposed algorthm s relatvely fast. TABLE VII. TIME-CONSUMING COMPARISONS. Image AES [22] (ms) Ref. [5] (ms) Ref. [7] (ms) Proposed (ms) CR-Chest ( ) Lena (52 52) Peppers ( ) Mandrll( ) Boats ( ) Test on another Images To further test the effectveness and performance of the proposed algorthm, we used another 33 mages: medcal mages obtaned from [2] and other mages obtaned from [25]. As shown n TABLE, the column Corr. s the average correlaton of the encrypted mage n three drectons; the column Ds. s the dstorton rato between the orgnal and the encrypted mage; and all of the expermental results were obtaned after four encrypton rounds wth S88. From TABLE VIII, we can see that the proposed algorthm performs well and that t s effectve for mage encrypton. TABLE VIII. MORE TEST ON THE PROPOSED ALGORITHM. Orgnal mage NPCR UACI Tme Corr. Entropy (Dmenson, Bt-depth) (%) (%) (ms) Ds. CT-abdo (52 52, 8) OT-a7 (52 52, 8) OT-colon (52 52, 8) OT-hp (52 52, 8) MR-an2 ( , 2) MR-an (52 52, 2) CT-bran (52 52, 6) CT-ort (52 52, 6) MR-head ( , 6) MR-knee ( , 6) nemacb ( , 8) nemacl ( , 8) nemacl2 ( , 8) CONCLUSIONS In ths paper, we proposed a small encrypton matrx to encrypt and decrypt mages, where the dmensons of the orgnal mage are larger than the key matrx. We carred out statstcal analyses, and we measured the processng tme, nformaton entropy, NPCR, and UACI of the proposed algorthm. The results from these experments demonstrate the securty and hgh-performance of the proposed mage-encrypton procedure. The proposed algorthm s unque n a number of ways. Frst, a small matrx s used to encrypt and decrypt mages from a relatvely large matrx. Thus, the 87

17 computatons of the data are effectvely reduced, and the operatonal effcency of encrypton process s enhanced. Second, ths algorthm s compatble wth mages of dfferent dmensons usng the same encrypton matrx. Thrd, the ntroducton of the key s smple: by varyng the elements of the key matrx Sn n, the dmenson n, and K encrypton rounds, a suffcently large key space can be generated, whch s useful for ncreasng the securty of the algorthm. Fnally, an nverse encrypton matrx Sn n and ts nverse matrx S n n can be constructed quckly usng the tensor product, whch s helpful for decreasng the tme consumed by the proposed algorthm. Thus, the algorthm s smple, effcent, and easly mplemented. In future work, we plan to analyze the securty of the proposed algorthm theoretcally, execute the securty experments of brute-force attack, knownplan-text attack, and chosen-cpher-text attack, etc. We also plan to study the STP n conjuncton wth chaotc dynamc symbols to facltate the encrypton of color mages. ACKNOWLEDGMENT The authors wsh to thank the anonymous revewers for ther valuable comments and for ther help n fndng errors. We apprecate ther assstance n mprovng the qualty and the clarty of the manuscrpt. Ths work was supported by the Scence and technology project of Zhejang Provnce, Chna (Grant No. 204C33058, 205C33074, 205C33083). REFERENCES. L. L. Zhao, Z. L. Fang, and Z. C. Gu Novel algorthm of dgtal mage scramblng and encrypton based on magc cube transformaton, Journal of Optoelectroncs Laser, 9(): J. George, S. Varma, and M. Chatterjee, 204. Color mage watermarkng usng DWT-SVD and Arnold transform, Inda Conference (INDICON), 204 Annual IEEE, Pune, Inda, December -3, D. M. Chen A feasble chaotc encrypton scheme for mage, Proc of Internatonal Workshop on Chaos-Fractals Theores and Applcaton, Shenyang, Chna, November 6-8, Abdo, S. Lan, I. A. Ismal, and M. Amn, etc A cryptosystem based on elementary cellular automata, Communcatons n Nonlnear Scence and Numercal Smulaton, 8(): Kanso, and M. A. Ghebleh A novel mage encrypton algorthm based on a 3D chaotc map, Communcatons n Nonlnear Scence and Numercal Smulaton, 7(7): H. J. L, and X. Y. Wang. 20. Color mage encrypton usng spatal bt-level permutaton and hgh-dmenson chaotc system, Optcs Communcatons, 284: Y. Q. Zhang, and X. Y. Wang A symmetrc mage encrypton algorthm based on mxed lnear nonlnear coupled map lattce, Informaton Scences, 273: X. Wang, and D. Luan A novel mage encrypton algorthm usng chaos and reversble cellular automata, Communcatons n Nonlnear Scence and Numercal Smulaton, 8(): K. Yadav, S. Vashsth, H. Sngh, and K. Sngh A phase-mage watermarkng scheme n gyrator doman usng devl's vortex Fresnel lens as a phase mask, Optcs Communcatons, 344():

18 0. Mehra, and N. K. Nshchal Optcal asymmetrc watermarkng usng modfed wavelet fuson and dffractve magng, Optcs and Lasers n Engneerng, 68: T. Banch, A. Pva, and M. Barn On the mplementaton of the dscrete Fourer transform n the encrypted doman, IEEE Trans. Inf. Forenscs Securty, 4(): K. Kab, B. J. Saha, and C. Pradhan Enhanced dgtal watermarkng scheme usng fractal mages n wavelets, Computng, Communcaton and Networkng Technologes (ICCCNT), 204 Internatonal Conference on, IEEE, Hefe, Chna, July -3, M. H. Lee, B. S. Rajan, and J. Y. Park A generalzed reverse jacket transform, Crcuts and Systems II: Analog and Dgtal Sgnal Processng, IEEE Transactons on, 48(7): M. H. Lee, X. D. Zhang, and X. Jang Fast parametrc recprocal-orthogonal jacket transforms, EURASIP Journal on Advances n Sgnal Processng, : H. B. Kekre, T. Sarode, and S. Natu Performance analyss of watermarkng usng Kronecker product of orthogonal transforms and wavelet transforms, Internatonal Journal of Scentfc & Engneerng Research, 5(2): S. Bouguezel A recprocal-orthogonal parametrc transform and ts fast algorthm, Sgnal Processng Letters, IEEE, 9(): Zhong and D. Ln On maxmum length nonlnear feedback shft regsters usng a Boolean network approach, Control Conference (CCC), rd Chnese. IEEE, Nanjng, Chna, July 28-30, D. Z. Chen, H. S. Q, and Z. Q. L. 20. Analyss and Control of Boolean Networks: A Semtensor Product Approach. Sprnger, London, pp N. Vartak On an applcaton of Kronecker product of matrces to statstcal desgns, The Annals of Mathematcal Statstcs, 26(3): Prasad, and K. L. Sudha. 20. Chaos mage encrypton usng pxel shufflng, Computer Scence & Informaton Technology, 4(): S. Barr Medcal mage samples. [Onlne]. Avalable: Natonal Insttute of Standards and Technology FIPS 97: Advanced Encrypton Standard [Onlne]. Avalable: csrc.nst.gov/publcatons/fps/fps97/fps-97.pdf. 23. Awad, and D. Awad Effcent mage chaotc encrypton algorthm wth no propagaton error, ETRI journal, 32(5): Zhan K, We D, and Sh J, et al Cross-utlzng hyperchaotc and DNA sequences for mage encrypton, Journal of Electronc Imagng, 26(): Test Images. [Onlne]. Avalable: 89

Chapter 5. Solution of System of Linear Equations. Module No. 6. Solution of Inconsistent and Ill Conditioned Systems

Chapter 5. Solution of System of Linear Equations. Module No. 6. Solution of Inconsistent and Ill Conditioned Systems Numercal Analyss by Dr. Anta Pal Assstant Professor Department of Mathematcs Natonal Insttute of Technology Durgapur Durgapur-713209 emal: anta.bue@gmal.com 1 . Chapter 5 Soluton of System of Lnear Equatons

More information

A New Scrambling Evaluation Scheme based on Spatial Distribution Entropy and Centroid Difference of Bit-plane

A New Scrambling Evaluation Scheme based on Spatial Distribution Entropy and Centroid Difference of Bit-plane A New Scramblng Evaluaton Scheme based on Spatal Dstrbuton Entropy and Centrod Dfference of Bt-plane Lang Zhao *, Avshek Adhkar Kouch Sakura * * Graduate School of Informaton Scence and Electrcal Engneerng,

More information

Module 3 LOSSY IMAGE COMPRESSION SYSTEMS. Version 2 ECE IIT, Kharagpur

Module 3 LOSSY IMAGE COMPRESSION SYSTEMS. Version 2 ECE IIT, Kharagpur Module 3 LOSSY IMAGE COMPRESSION SYSTEMS Verson ECE IIT, Kharagpur Lesson 6 Theory of Quantzaton Verson ECE IIT, Kharagpur Instructonal Objectves At the end of ths lesson, the students should be able to:

More information

The Synchronous 8th-Order Differential Attack on 12 Rounds of the Block Cipher HyRAL

The Synchronous 8th-Order Differential Attack on 12 Rounds of the Block Cipher HyRAL The Synchronous 8th-Order Dfferental Attack on 12 Rounds of the Block Cpher HyRAL Yasutaka Igarash, Sej Fukushma, and Tomohro Hachno Kagoshma Unversty, Kagoshma, Japan Emal: {garash, fukushma, hachno}@eee.kagoshma-u.ac.jp

More information

Department of Mathematics, Shantou University, Shantou, Guangdong, , China.

Department of Mathematics, Shantou University, Shantou, Guangdong, , China. 205 Internatonal Conference on Computer Scence and Communcaton Engneerng (CSCE 205) ISN: 978--60595-249-9 A Novel Color Image Encrypton Scheme ased on Permutaton-substtuton Archtecture Ru-Song Ye,a, Mng

More information

Formulas for the Determinant

Formulas for the Determinant page 224 224 CHAPTER 3 Determnants e t te t e 2t 38 A = e t 2te t e 2t e t te t 2e 2t 39 If 123 A = 345, 456 compute the matrx product A adj(a) What can you conclude about det(a)? For Problems 40 43, use

More information

A Novel Feistel Cipher Involving a Bunch of Keys supplemented with Modular Arithmetic Addition

A Novel Feistel Cipher Involving a Bunch of Keys supplemented with Modular Arithmetic Addition (IJACSA) Internatonal Journal of Advanced Computer Scence Applcatons, A Novel Festel Cpher Involvng a Bunch of Keys supplemented wth Modular Arthmetc Addton Dr. V.U.K Sastry Dean R&D, Department of Computer

More information

An Image Encryption Scheme Based on Hybrid Orbit of Hyper-chaotic Systems

An Image Encryption Scheme Based on Hybrid Orbit of Hyper-chaotic Systems I. J. Computer Network and Informaton Securty 5 5 5-33 Publshed Onlne Aprl 5 n MECS (http://www.mecs-press.org/) DOI:.585/jcns.5.5.4 An Image Encrypton Scheme Based on Hybrd Orbt of Hyper-chaotc Systems

More information

Kayhan CELİK. Erol KURT. x ' ay ax. y ' xz rx y. z ' xy bz

Kayhan CELİK. Erol KURT. x ' ay ax. y ' xz rx y. z ' xy bz ECAI 216 - Internatonal Conference 8th Edton Electroncs, Computers and Artfcal Intellgence 3 June -2 July, 216, Bucharest, ROMÂIA A ew Image Encrypton Algorthm Based on Lorenz System Kayhan CELİK Gaz Unversty,

More information

COMPARISON OF SOME RELIABILITY CHARACTERISTICS BETWEEN REDUNDANT SYSTEMS REQUIRING SUPPORTING UNITS FOR THEIR OPERATIONS

COMPARISON OF SOME RELIABILITY CHARACTERISTICS BETWEEN REDUNDANT SYSTEMS REQUIRING SUPPORTING UNITS FOR THEIR OPERATIONS Avalable onlne at http://sck.org J. Math. Comput. Sc. 3 (3), No., 6-3 ISSN: 97-537 COMPARISON OF SOME RELIABILITY CHARACTERISTICS BETWEEN REDUNDANT SYSTEMS REQUIRING SUPPORTING UNITS FOR THEIR OPERATIONS

More information

The Order Relation and Trace Inequalities for. Hermitian Operators

The Order Relation and Trace Inequalities for. Hermitian Operators Internatonal Mathematcal Forum, Vol 3, 08, no, 507-57 HIKARI Ltd, wwwm-hkarcom https://doorg/0988/mf088055 The Order Relaton and Trace Inequaltes for Hermtan Operators Y Huang School of Informaton Scence

More information

Image Encryption Using Chaotic Signal and Max Heap Tree

Image Encryption Using Chaotic Signal and Max Heap Tree Image Encrypton Usng Chaotc Sgnal and Max Heap Tree Farborz Mahmoud 1, Rasul Enayatfar 2, and Mohsen Mrzashaer 1 1 Electrcal and Computer Engneerng Department, Islamc Azad Unversty, Qazvn Branch, Iran

More information

Pop-Click Noise Detection Using Inter-Frame Correlation for Improved Portable Auditory Sensing

Pop-Click Noise Detection Using Inter-Frame Correlation for Improved Portable Auditory Sensing Advanced Scence and Technology Letters, pp.164-168 http://dx.do.org/10.14257/astl.2013 Pop-Clc Nose Detecton Usng Inter-Frame Correlaton for Improved Portable Audtory Sensng Dong Yun Lee, Kwang Myung Jeon,

More information

Speeding up Computation of Scalar Multiplication in Elliptic Curve Cryptosystem

Speeding up Computation of Scalar Multiplication in Elliptic Curve Cryptosystem H.K. Pathak et. al. / (IJCSE) Internatonal Journal on Computer Scence and Engneerng Speedng up Computaton of Scalar Multplcaton n Ellptc Curve Cryptosystem H. K. Pathak Manju Sangh S.o.S n Computer scence

More information

Hongyi Miao, College of Science, Nanjing Forestry University, Nanjing ,China. (Received 20 June 2013, accepted 11 March 2014) I)ϕ (k)

Hongyi Miao, College of Science, Nanjing Forestry University, Nanjing ,China. (Received 20 June 2013, accepted 11 March 2014) I)ϕ (k) ISSN 1749-3889 (prnt), 1749-3897 (onlne) Internatonal Journal of Nonlnear Scence Vol.17(2014) No.2,pp.188-192 Modfed Block Jacob-Davdson Method for Solvng Large Sparse Egenproblems Hongy Mao, College of

More information

Report on Image warping

Report on Image warping Report on Image warpng Xuan Ne, Dec. 20, 2004 Ths document summarzed the algorthms of our mage warpng soluton for further study, and there s a detaled descrpton about the mplementaton of these algorthms.

More information

A Fast Computer Aided Design Method for Filters

A Fast Computer Aided Design Method for Filters 2017 Asa-Pacfc Engneerng and Technology Conference (APETC 2017) ISBN: 978-1-60595-443-1 A Fast Computer Aded Desgn Method for Flters Gang L ABSTRACT *Ths paper presents a fast computer aded desgn method

More information

Power law and dimension of the maximum value for belief distribution with the max Deng entropy

Power law and dimension of the maximum value for belief distribution with the max Deng entropy Power law and dmenson of the maxmum value for belef dstrbuton wth the max Deng entropy Bngy Kang a, a College of Informaton Engneerng, Northwest A&F Unversty, Yanglng, Shaanx, 712100, Chna. Abstract Deng

More information

Operating conditions of a mine fan under conditions of variable resistance

Operating conditions of a mine fan under conditions of variable resistance Paper No. 11 ISMS 216 Operatng condtons of a mne fan under condtons of varable resstance Zhang Ynghua a, Chen L a, b, Huang Zhan a, *, Gao Yukun a a State Key Laboratory of Hgh-Effcent Mnng and Safety

More information

Scroll Generation with Inductorless Chua s Circuit and Wien Bridge Oscillator

Scroll Generation with Inductorless Chua s Circuit and Wien Bridge Oscillator Latest Trends on Crcuts, Systems and Sgnals Scroll Generaton wth Inductorless Chua s Crcut and Wen Brdge Oscllator Watcharn Jantanate, Peter A. Chayasena, and Sarawut Sutorn * Abstract An nductorless Chua

More information

CONTRAST ENHANCEMENT FOR MIMIMUM MEAN BRIGHTNESS ERROR FROM HISTOGRAM PARTITIONING INTRODUCTION

CONTRAST ENHANCEMENT FOR MIMIMUM MEAN BRIGHTNESS ERROR FROM HISTOGRAM PARTITIONING INTRODUCTION CONTRAST ENHANCEMENT FOR MIMIMUM MEAN BRIGHTNESS ERROR FROM HISTOGRAM PARTITIONING N. Phanthuna 1,2, F. Cheevasuvt 2 and S. Chtwong 2 1 Department of Electrcal Engneerng, Faculty of Engneerng Rajamangala

More information

Structure and Drive Paul A. Jensen Copyright July 20, 2003

Structure and Drive Paul A. Jensen Copyright July 20, 2003 Structure and Drve Paul A. Jensen Copyrght July 20, 2003 A system s made up of several operatons wth flow passng between them. The structure of the system descrbes the flow paths from nputs to outputs.

More information

Outline. Communication. Bellman Ford Algorithm. Bellman Ford Example. Bellman Ford Shortest Path [1]

Outline. Communication. Bellman Ford Algorithm. Bellman Ford Example. Bellman Ford Shortest Path [1] DYNAMIC SHORTEST PATH SEARCH AND SYNCHRONIZED TASK SWITCHING Jay Wagenpfel, Adran Trachte 2 Outlne Shortest Communcaton Path Searchng Bellmann Ford algorthm Algorthm for dynamc case Modfcatons to our algorthm

More information

Microwave Diversity Imaging Compression Using Bioinspired

Microwave Diversity Imaging Compression Using Bioinspired Mcrowave Dversty Imagng Compresson Usng Bonspred Neural Networks Youwe Yuan 1, Yong L 1, Wele Xu 1, Janghong Yu * 1 School of Computer Scence and Technology, Hangzhou Danz Unversty, Hangzhou, Zhejang,

More information

IMAGE DENOISING USING NEW ADAPTIVE BASED MEDIAN FILTER

IMAGE DENOISING USING NEW ADAPTIVE BASED MEDIAN FILTER Sgnal & Image Processng : An Internatonal Journal (SIPIJ) Vol.5, No.4, August 2014 IMAGE DENOISING USING NEW ADAPTIVE BASED MEDIAN FILTER Suman Shrestha 1, 2 1 Unversty of Massachusetts Medcal School,

More information

Inner Product. Euclidean Space. Orthonormal Basis. Orthogonal

Inner Product. Euclidean Space. Orthonormal Basis. Orthogonal Inner Product Defnton 1 () A Eucldean space s a fnte-dmensonal vector space over the reals R, wth an nner product,. Defnton 2 (Inner Product) An nner product, on a real vector space X s a symmetrc, blnear,

More information

4DVAR, according to the name, is a four-dimensional variational method.

4DVAR, according to the name, is a four-dimensional variational method. 4D-Varatonal Data Assmlaton (4D-Var) 4DVAR, accordng to the name, s a four-dmensonal varatonal method. 4D-Var s actually a drect generalzaton of 3D-Var to handle observatons that are dstrbuted n tme. The

More information

Resource Allocation with a Budget Constraint for Computing Independent Tasks in the Cloud

Resource Allocation with a Budget Constraint for Computing Independent Tasks in the Cloud Resource Allocaton wth a Budget Constrant for Computng Independent Tasks n the Cloud Wemng Sh and Bo Hong School of Electrcal and Computer Engneerng Georga Insttute of Technology, USA 2nd IEEE Internatonal

More information

EEE 241: Linear Systems

EEE 241: Linear Systems EEE : Lnear Systems Summary #: Backpropagaton BACKPROPAGATION The perceptron rule as well as the Wdrow Hoff learnng were desgned to tran sngle layer networks. They suffer from the same dsadvantage: they

More information

Research Article Green s Theorem for Sign Data

Research Article Green s Theorem for Sign Data Internatonal Scholarly Research Network ISRN Appled Mathematcs Volume 2012, Artcle ID 539359, 10 pages do:10.5402/2012/539359 Research Artcle Green s Theorem for Sgn Data Lous M. Houston The Unversty of

More information

Rotation Invariant Shape Contexts based on Feature-space Fourier Transformation

Rotation Invariant Shape Contexts based on Feature-space Fourier Transformation Fourth Internatonal Conference on Image and Graphcs Rotaton Invarant Shape Contexts based on Feature-space Fourer Transformaton Su Yang 1, Yuanyuan Wang Dept of Computer Scence and Engneerng, Fudan Unversty,

More information

Uncertainty in measurements of power and energy on power networks

Uncertainty in measurements of power and energy on power networks Uncertanty n measurements of power and energy on power networks E. Manov, N. Kolev Department of Measurement and Instrumentaton, Techncal Unversty Sofa, bul. Klment Ohrdsk No8, bl., 000 Sofa, Bulgara Tel./fax:

More information

Module 9. Lecture 6. Duality in Assignment Problems

Module 9. Lecture 6. Duality in Assignment Problems Module 9 1 Lecture 6 Dualty n Assgnment Problems In ths lecture we attempt to answer few other mportant questons posed n earler lecture for (AP) and see how some of them can be explaned through the concept

More information

Pulse Coded Modulation

Pulse Coded Modulation Pulse Coded Modulaton PCM (Pulse Coded Modulaton) s a voce codng technque defned by the ITU-T G.711 standard and t s used n dgtal telephony to encode the voce sgnal. The frst step n the analog to dgtal

More information

3.1 Expectation of Functions of Several Random Variables. )' be a k-dimensional discrete or continuous random vector, with joint PMF p (, E X E X1 E X

3.1 Expectation of Functions of Several Random Variables. )' be a k-dimensional discrete or continuous random vector, with joint PMF p (, E X E X1 E X Statstcs 1: Probablty Theory II 37 3 EPECTATION OF SEVERAL RANDOM VARIABLES As n Probablty Theory I, the nterest n most stuatons les not on the actual dstrbuton of a random vector, but rather on a number

More information

Composite Hypotheses testing

Composite Hypotheses testing Composte ypotheses testng In many hypothess testng problems there are many possble dstrbutons that can occur under each of the hypotheses. The output of the source s a set of parameters (ponts n a parameter

More information

One-sided finite-difference approximations suitable for use with Richardson extrapolation

One-sided finite-difference approximations suitable for use with Richardson extrapolation Journal of Computatonal Physcs 219 (2006) 13 20 Short note One-sded fnte-dfference approxmatons sutable for use wth Rchardson extrapolaton Kumar Rahul, S.N. Bhattacharyya * Department of Mechancal Engneerng,

More information

On the Interval Zoro Symmetric Single-step Procedure for Simultaneous Finding of Polynomial Zeros

On the Interval Zoro Symmetric Single-step Procedure for Simultaneous Finding of Polynomial Zeros Appled Mathematcal Scences, Vol. 5, 2011, no. 75, 3693-3706 On the Interval Zoro Symmetrc Sngle-step Procedure for Smultaneous Fndng of Polynomal Zeros S. F. M. Rusl, M. Mons, M. A. Hassan and W. J. Leong

More information

VQ widely used in coding speech, image, and video

VQ widely used in coding speech, image, and video at Scalar quantzers are specal cases of vector quantzers (VQ): they are constraned to look at one sample at a tme (memoryless) VQ does not have such constrant better RD perfomance expected Source codng

More information

Negative Binomial Regression

Negative Binomial Regression STATGRAPHICS Rev. 9/16/2013 Negatve Bnomal Regresson Summary... 1 Data Input... 3 Statstcal Model... 3 Analyss Summary... 4 Analyss Optons... 7 Plot of Ftted Model... 8 Observed Versus Predcted... 10 Predctons...

More information

Odd/Even Scroll Generation with Inductorless Chua s and Wien Bridge Oscillator Circuits

Odd/Even Scroll Generation with Inductorless Chua s and Wien Bridge Oscillator Circuits Watcharn Jantanate, Peter A. Chayasena, Sarawut Sutorn Odd/Even Scroll Generaton wth Inductorless Chua s and Wen Brdge Oscllator Crcuts Watcharn Jantanate, Peter A. Chayasena, and Sarawut Sutorn * School

More information

Tutorial 2. COMP4134 Biometrics Authentication. February 9, Jun Xu, Teaching Asistant

Tutorial 2. COMP4134 Biometrics Authentication. February 9, Jun Xu, Teaching Asistant Tutoral 2 COMP434 ometrcs uthentcaton Jun Xu, Teachng sstant csjunxu@comp.polyu.edu.hk February 9, 207 Table of Contents Problems Problem : nswer the questons Problem 2: Power law functon Problem 3: Convoluton

More information

Econ107 Applied Econometrics Topic 3: Classical Model (Studenmund, Chapter 4)

Econ107 Applied Econometrics Topic 3: Classical Model (Studenmund, Chapter 4) I. Classcal Assumptons Econ7 Appled Econometrcs Topc 3: Classcal Model (Studenmund, Chapter 4) We have defned OLS and studed some algebrac propertes of OLS. In ths topc we wll study statstcal propertes

More information

The L(2, 1)-Labeling on -Product of Graphs

The L(2, 1)-Labeling on -Product of Graphs Annals of Pure and Appled Mathematcs Vol 0, No, 05, 9-39 ISSN: 79-087X (P, 79-0888(onlne Publshed on 7 Aprl 05 wwwresearchmathscorg Annals of The L(, -Labelng on -Product of Graphs P Pradhan and Kamesh

More information

CHAPTER 5 NUMERICAL EVALUATION OF DYNAMIC RESPONSE

CHAPTER 5 NUMERICAL EVALUATION OF DYNAMIC RESPONSE CHAPTER 5 NUMERICAL EVALUATION OF DYNAMIC RESPONSE Analytcal soluton s usually not possble when exctaton vares arbtrarly wth tme or f the system s nonlnear. Such problems can be solved by numercal tmesteppng

More information

Grover s Algorithm + Quantum Zeno Effect + Vaidman

Grover s Algorithm + Quantum Zeno Effect + Vaidman Grover s Algorthm + Quantum Zeno Effect + Vadman CS 294-2 Bomb 10/12/04 Fall 2004 Lecture 11 Grover s algorthm Recall that Grover s algorthm for searchng over a space of sze wors as follows: consder the

More information

2016 Wiley. Study Session 2: Ethical and Professional Standards Application

2016 Wiley. Study Session 2: Ethical and Professional Standards Application 6 Wley Study Sesson : Ethcal and Professonal Standards Applcaton LESSON : CORRECTION ANALYSIS Readng 9: Correlaton and Regresson LOS 9a: Calculate and nterpret a sample covarance and a sample correlaton

More information

Comparison of Wiener Filter solution by SVD with decompositions QR and QLP

Comparison of Wiener Filter solution by SVD with decompositions QR and QLP Proceedngs of the 6th WSEAS Int Conf on Artfcal Intellgence, Knowledge Engneerng and Data Bases, Corfu Island, Greece, February 6-9, 007 7 Comparson of Wener Flter soluton by SVD wth decompostons QR and

More information

An efficient algorithm for multivariate Maclaurin Newton transformation

An efficient algorithm for multivariate Maclaurin Newton transformation Annales UMCS Informatca AI VIII, 2 2008) 5 14 DOI: 10.2478/v10065-008-0020-6 An effcent algorthm for multvarate Maclaurn Newton transformaton Joanna Kapusta Insttute of Mathematcs and Computer Scence,

More information

Transform Coding. Transform Coding Principle

Transform Coding. Transform Coding Principle Transform Codng Prncple of block-wse transform codng Propertes of orthonormal transforms Dscrete cosne transform (DCT) Bt allocaton for transform coeffcents Entropy codng of transform coeffcents Typcal

More information

MMA and GCMMA two methods for nonlinear optimization

MMA and GCMMA two methods for nonlinear optimization MMA and GCMMA two methods for nonlnear optmzaton Krster Svanberg Optmzaton and Systems Theory, KTH, Stockholm, Sweden. krlle@math.kth.se Ths note descrbes the algorthms used n the author s 2007 mplementatons

More information

A PROBABILITY-DRIVEN SEARCH ALGORITHM FOR SOLVING MULTI-OBJECTIVE OPTIMIZATION PROBLEMS

A PROBABILITY-DRIVEN SEARCH ALGORITHM FOR SOLVING MULTI-OBJECTIVE OPTIMIZATION PROBLEMS HCMC Unversty of Pedagogy Thong Nguyen Huu et al. A PROBABILITY-DRIVEN SEARCH ALGORITHM FOR SOLVING MULTI-OBJECTIVE OPTIMIZATION PROBLEMS Thong Nguyen Huu and Hao Tran Van Department of mathematcs-nformaton,

More information

The Study of Teaching-learning-based Optimization Algorithm

The Study of Teaching-learning-based Optimization Algorithm Advanced Scence and Technology Letters Vol. (AST 06), pp.05- http://dx.do.org/0.57/astl.06. The Study of Teachng-learnng-based Optmzaton Algorthm u Sun, Yan fu, Lele Kong, Haolang Q,, Helongang Insttute

More information

Application of Nonbinary LDPC Codes for Communication over Fading Channels Using Higher Order Modulations

Application of Nonbinary LDPC Codes for Communication over Fading Channels Using Higher Order Modulations Applcaton of Nonbnary LDPC Codes for Communcaton over Fadng Channels Usng Hgher Order Modulatons Rong-Hu Peng and Rong-Rong Chen Department of Electrcal and Computer Engneerng Unversty of Utah Ths work

More information

On the correction of the h-index for career length

On the correction of the h-index for career length 1 On the correcton of the h-ndex for career length by L. Egghe Unverstet Hasselt (UHasselt), Campus Depenbeek, Agoralaan, B-3590 Depenbeek, Belgum 1 and Unverstet Antwerpen (UA), IBW, Stadscampus, Venusstraat

More information

Appendix B: Resampling Algorithms

Appendix B: Resampling Algorithms 407 Appendx B: Resamplng Algorthms A common problem of all partcle flters s the degeneracy of weghts, whch conssts of the unbounded ncrease of the varance of the mportance weghts ω [ ] of the partcles

More information

AN ADAPTIVE WATERMARKING ALGORITHM FOR DEM BASED ON DFT

AN ADAPTIVE WATERMARKING ALGORITHM FOR DEM BASED ON DFT AN ADAPTIVE WATERMARKING ALGORITHM FOR DEM BASED ON DFT Changqng Zhu 1 Zhwe Wang 2 Y Long 1 Chengsong Yang 2 1 Key Laboratory of Vrtual Geographc Envronment, Nanjng Normal Unversty, Nanjng 210054;2 Insttute

More information

Comparison of Regression Lines

Comparison of Regression Lines STATGRAPHICS Rev. 9/13/2013 Comparson of Regresson Lnes Summary... 1 Data Input... 3 Analyss Summary... 4 Plot of Ftted Model... 6 Condtonal Sums of Squares... 6 Analyss Optons... 7 Forecasts... 8 Confdence

More information

College of Computer & Information Science Fall 2009 Northeastern University 20 October 2009

College of Computer & Information Science Fall 2009 Northeastern University 20 October 2009 College of Computer & Informaton Scence Fall 2009 Northeastern Unversty 20 October 2009 CS7880: Algorthmc Power Tools Scrbe: Jan Wen and Laura Poplawsk Lecture Outlne: Prmal-dual schema Network Desgn:

More information

Mathematical Preparations

Mathematical Preparations 1 Introducton Mathematcal Preparatons The theory of relatvty was developed to explan experments whch studed the propagaton of electromagnetc radaton n movng coordnate systems. Wthn expermental error the

More information

Regularized Discriminant Analysis for Face Recognition

Regularized Discriminant Analysis for Face Recognition 1 Regularzed Dscrmnant Analyss for Face Recognton Itz Pma, Mayer Aladem Department of Electrcal and Computer Engneerng, Ben-Guron Unversty of the Negev P.O.Box 653, Beer-Sheva, 845, Israel. Abstract Ths

More information

5 The Rational Canonical Form

5 The Rational Canonical Form 5 The Ratonal Canoncal Form Here p s a monc rreducble factor of the mnmum polynomal m T and s not necessarly of degree one Let F p denote the feld constructed earler n the course, consstng of all matrces

More information

CHAPTER-5 INFORMATION MEASURE OF FUZZY MATRIX AND FUZZY BINARY RELATION

CHAPTER-5 INFORMATION MEASURE OF FUZZY MATRIX AND FUZZY BINARY RELATION CAPTER- INFORMATION MEASURE OF FUZZY MATRI AN FUZZY BINARY RELATION Introducton The basc concept of the fuzz matr theor s ver smple and can be appled to socal and natural stuatons A branch of fuzz matr

More information

Hiding data in images by simple LSB substitution

Hiding data in images by simple LSB substitution Pattern Recognton 37 (004) 469 474 www.elsever.com/locate/patcog Hdng data n mages by smple LSB substtuton Ch-Kwong Chan, L.M. Cheng Department of Computer Engneerng and Informaton Technology, Cty Unversty

More information

Difference Equations

Difference Equations Dfference Equatons c Jan Vrbk 1 Bascs Suppose a sequence of numbers, say a 0,a 1,a,a 3,... s defned by a certan general relatonshp between, say, three consecutve values of the sequence, e.g. a + +3a +1

More information

Real-Time Systems. Multiprocessor scheduling. Multiprocessor scheduling. Multiprocessor scheduling

Real-Time Systems. Multiprocessor scheduling. Multiprocessor scheduling. Multiprocessor scheduling Real-Tme Systems Multprocessor schedulng Specfcaton Implementaton Verfcaton Multprocessor schedulng -- -- Global schedulng How are tasks assgned to processors? Statc assgnment The processor(s) used for

More information

Exponential Type Product Estimator for Finite Population Mean with Information on Auxiliary Attribute

Exponential Type Product Estimator for Finite Population Mean with Information on Auxiliary Attribute Avalable at http://pvamu.edu/aam Appl. Appl. Math. ISSN: 193-9466 Vol. 10, Issue 1 (June 015), pp. 106-113 Applcatons and Appled Mathematcs: An Internatonal Journal (AAM) Exponental Tpe Product Estmator

More information

8.4 COMPLEX VECTOR SPACES AND INNER PRODUCTS

8.4 COMPLEX VECTOR SPACES AND INNER PRODUCTS SECTION 8.4 COMPLEX VECTOR SPACES AND INNER PRODUCTS 493 8.4 COMPLEX VECTOR SPACES AND INNER PRODUCTS All the vector spaces you have studed thus far n the text are real vector spaces because the scalars

More information

COMPLEX NUMBERS AND QUADRATIC EQUATIONS

COMPLEX NUMBERS AND QUADRATIC EQUATIONS COMPLEX NUMBERS AND QUADRATIC EQUATIONS INTRODUCTION We know that x 0 for all x R e the square of a real number (whether postve, negatve or ero) s non-negatve Hence the equatons x, x, x + 7 0 etc are not

More information

Annexes. EC.1. Cycle-base move illustration. EC.2. Problem Instances

Annexes. EC.1. Cycle-base move illustration. EC.2. Problem Instances ec Annexes Ths Annex frst llustrates a cycle-based move n the dynamc-block generaton tabu search. It then dsplays the characterstcs of the nstance sets, followed by detaled results of the parametercalbraton

More information

APPENDIX A Some Linear Algebra

APPENDIX A Some Linear Algebra APPENDIX A Some Lnear Algebra The collecton of m, n matrces A.1 Matrces a 1,1,..., a 1,n A = a m,1,..., a m,n wth real elements a,j s denoted by R m,n. If n = 1 then A s called a column vector. Smlarly,

More information

General theory of fuzzy connectedness segmentations: reconciliation of two tracks of FC theory

General theory of fuzzy connectedness segmentations: reconciliation of two tracks of FC theory General theory of fuzzy connectedness segmentatons: reconclaton of two tracks of FC theory Krzysztof Chrs Ceselsk Department of Mathematcs, West Vrgna Unversty and MIPG, Department of Radology, Unversty

More information

LOW BIAS INTEGRATED PATH ESTIMATORS. James M. Calvin

LOW BIAS INTEGRATED PATH ESTIMATORS. James M. Calvin Proceedngs of the 007 Wnter Smulaton Conference S G Henderson, B Bller, M-H Hseh, J Shortle, J D Tew, and R R Barton, eds LOW BIAS INTEGRATED PATH ESTIMATORS James M Calvn Department of Computer Scence

More information

LINEAR REGRESSION ANALYSIS. MODULE IX Lecture Multicollinearity

LINEAR REGRESSION ANALYSIS. MODULE IX Lecture Multicollinearity LINEAR REGRESSION ANALYSIS MODULE IX Lecture - 30 Multcollnearty Dr. Shalabh Department of Mathematcs and Statstcs Indan Insttute of Technology Kanpur 2 Remedes for multcollnearty Varous technques have

More information

The equation of motion of a dynamical system is given by a set of differential equations. That is (1)

The equation of motion of a dynamical system is given by a set of differential equations. That is (1) Dynamcal Systems Many engneerng and natural systems are dynamcal systems. For example a pendulum s a dynamcal system. State l The state of the dynamcal system specfes t condtons. For a pendulum n the absence

More information

A Hybrid Variational Iteration Method for Blasius Equation

A Hybrid Variational Iteration Method for Blasius Equation Avalable at http://pvamu.edu/aam Appl. Appl. Math. ISSN: 1932-9466 Vol. 10, Issue 1 (June 2015), pp. 223-229 Applcatons and Appled Mathematcs: An Internatonal Journal (AAM) A Hybrd Varatonal Iteraton Method

More information

Psychology 282 Lecture #24 Outline Regression Diagnostics: Outliers

Psychology 282 Lecture #24 Outline Regression Diagnostics: Outliers Psychology 282 Lecture #24 Outlne Regresson Dagnostcs: Outlers In an earler lecture we studed the statstcal assumptons underlyng the regresson model, ncludng the followng ponts: Formal statement of assumptons.

More information

The lower and upper bounds on Perron root of nonnegative irreducible matrices

The lower and upper bounds on Perron root of nonnegative irreducible matrices Journal of Computatonal Appled Mathematcs 217 (2008) 259 267 wwwelsevercom/locate/cam The lower upper bounds on Perron root of nonnegatve rreducble matrces Guang-Xn Huang a,, Feng Yn b,keguo a a College

More information

Numerical Heat and Mass Transfer

Numerical Heat and Mass Transfer Master degree n Mechancal Engneerng Numercal Heat and Mass Transfer 06-Fnte-Dfference Method (One-dmensonal, steady state heat conducton) Fausto Arpno f.arpno@uncas.t Introducton Why we use models and

More information

ISSN: ISO 9001:2008 Certified International Journal of Engineering and Innovative Technology (IJEIT) Volume 3, Issue 1, July 2013

ISSN: ISO 9001:2008 Certified International Journal of Engineering and Innovative Technology (IJEIT) Volume 3, Issue 1, July 2013 ISSN: 2277-375 Constructon of Trend Free Run Orders for Orthogonal rrays Usng Codes bstract: Sometmes when the expermental runs are carred out n a tme order sequence, the response can depend on the run

More information

GEMINI GEneric Multimedia INdexIng

GEMINI GEneric Multimedia INdexIng GEMINI GEnerc Multmeda INdexIng Last lecture, LSH http://www.mt.edu/~andon/lsh/ Is there another possble soluton? Do we need to perform ANN? 1 GEnerc Multmeda INdexIng dstance measure Sub-pattern Match

More information

Chapter 3 Describing Data Using Numerical Measures

Chapter 3 Describing Data Using Numerical Measures Chapter 3 Student Lecture Notes 3-1 Chapter 3 Descrbng Data Usng Numercal Measures Fall 2006 Fundamentals of Busness Statstcs 1 Chapter Goals To establsh the usefulness of summary measures of data. The

More information

Novel Pre-Compression Rate-Distortion Optimization Algorithm for JPEG 2000

Novel Pre-Compression Rate-Distortion Optimization Algorithm for JPEG 2000 Novel Pre-Compresson Rate-Dstorton Optmzaton Algorthm for JPEG 2000 Yu-We Chang, Hung-Ch Fang, Chung-Jr Lan, and Lang-Gee Chen DSP/IC Desgn Laboratory, Graduate Insttute of Electroncs Engneerng Natonal

More information

COMPUTATIONALLY EFFICIENT WAVELET AFFINE INVARIANT FUNCTIONS FOR SHAPE RECOGNITION. Erdem Bala, Dept. of Electrical and Computer Engineering,

COMPUTATIONALLY EFFICIENT WAVELET AFFINE INVARIANT FUNCTIONS FOR SHAPE RECOGNITION. Erdem Bala, Dept. of Electrical and Computer Engineering, COMPUTATIONALLY EFFICIENT WAVELET AFFINE INVARIANT FUNCTIONS FOR SHAPE RECOGNITION Erdem Bala, Dept. of Electrcal and Computer Engneerng, Unversty of Delaware, 40 Evans Hall, Newar, DE, 976 A. Ens Cetn,

More information

Design and Optimization of Fuzzy Controller for Inverse Pendulum System Using Genetic Algorithm

Design and Optimization of Fuzzy Controller for Inverse Pendulum System Using Genetic Algorithm Desgn and Optmzaton of Fuzzy Controller for Inverse Pendulum System Usng Genetc Algorthm H. Mehraban A. Ashoor Unversty of Tehran Unversty of Tehran h.mehraban@ece.ut.ac.r a.ashoor@ece.ut.ac.r Abstract:

More information

arxiv:cs.cv/ Jun 2000

arxiv:cs.cv/ Jun 2000 Correlaton over Decomposed Sgnals: A Non-Lnear Approach to Fast and Effectve Sequences Comparson Lucano da Fontoura Costa arxv:cs.cv/0006040 28 Jun 2000 Cybernetc Vson Research Group IFSC Unversty of São

More information

Chapter 13: Multiple Regression

Chapter 13: Multiple Regression Chapter 13: Multple Regresson 13.1 Developng the multple-regresson Model The general model can be descrbed as: It smplfes for two ndependent varables: The sample ft parameter b 0, b 1, and b are used to

More information

General viscosity iterative method for a sequence of quasi-nonexpansive mappings

General viscosity iterative method for a sequence of quasi-nonexpansive mappings Avalable onlne at www.tjnsa.com J. Nonlnear Sc. Appl. 9 (2016), 5672 5682 Research Artcle General vscosty teratve method for a sequence of quas-nonexpansve mappngs Cuje Zhang, Ynan Wang College of Scence,

More information

U.C. Berkeley CS294: Spectral Methods and Expanders Handout 8 Luca Trevisan February 17, 2016

U.C. Berkeley CS294: Spectral Methods and Expanders Handout 8 Luca Trevisan February 17, 2016 U.C. Berkeley CS94: Spectral Methods and Expanders Handout 8 Luca Trevsan February 7, 06 Lecture 8: Spectral Algorthms Wrap-up In whch we talk about even more generalzatons of Cheeger s nequaltes, and

More information

Lecture 5 Decoding Binary BCH Codes

Lecture 5 Decoding Binary BCH Codes Lecture 5 Decodng Bnary BCH Codes In ths class, we wll ntroduce dfferent methods for decodng BCH codes 51 Decodng the [15, 7, 5] 2 -BCH Code Consder the [15, 7, 5] 2 -code C we ntroduced n the last lecture

More information

Salmon: Lectures on partial differential equations. Consider the general linear, second-order PDE in the form. ,x 2

Salmon: Lectures on partial differential equations. Consider the general linear, second-order PDE in the form. ,x 2 Salmon: Lectures on partal dfferental equatons 5. Classfcaton of second-order equatons There are general methods for classfyng hgher-order partal dfferental equatons. One s very general (applyng even to

More information

Multiple Sound Source Location in 3D Space with a Synchronized Neural System

Multiple Sound Source Location in 3D Space with a Synchronized Neural System Multple Sound Source Locaton n D Space wth a Synchronzed Neural System Yum Takzawa and Atsush Fukasawa Insttute of Statstcal Mathematcs Research Organzaton of Informaton and Systems 0- Mdor-cho, Tachkawa,

More information

FFT Based Spectrum Analysis of Three Phase Signals in Park (d-q) Plane

FFT Based Spectrum Analysis of Three Phase Signals in Park (d-q) Plane Proceedngs of the 00 Internatonal Conference on Industral Engneerng and Operatons Management Dhaka, Bangladesh, January 9 0, 00 FFT Based Spectrum Analyss of Three Phase Sgnals n Park (d-q) Plane Anuradha

More information

For now, let us focus on a specific model of neurons. These are simplified from reality but can achieve remarkable results.

For now, let us focus on a specific model of neurons. These are simplified from reality but can achieve remarkable results. Neural Networks : Dervaton compled by Alvn Wan from Professor Jtendra Malk s lecture Ths type of computaton s called deep learnng and s the most popular method for many problems, such as computer vson

More information

Using T.O.M to Estimate Parameter of distributions that have not Single Exponential Family

Using T.O.M to Estimate Parameter of distributions that have not Single Exponential Family IOSR Journal of Mathematcs IOSR-JM) ISSN: 2278-5728. Volume 3, Issue 3 Sep-Oct. 202), PP 44-48 www.osrjournals.org Usng T.O.M to Estmate Parameter of dstrbutons that have not Sngle Exponental Famly Jubran

More information

Feb 14: Spatial analysis of data fields

Feb 14: Spatial analysis of data fields Feb 4: Spatal analyss of data felds Mappng rregularly sampled data onto a regular grd Many analyss technques for geophyscal data requre the data be located at regular ntervals n space and/or tme. hs s

More information

Inductance Calculation for Conductors of Arbitrary Shape

Inductance Calculation for Conductors of Arbitrary Shape CRYO/02/028 Aprl 5, 2002 Inductance Calculaton for Conductors of Arbtrary Shape L. Bottura Dstrbuton: Internal Summary In ths note we descrbe a method for the numercal calculaton of nductances among conductors

More information

Improved Lossless Data Hiding for JPEG Images Based on Histogram Modification

Improved Lossless Data Hiding for JPEG Images Based on Histogram Modification Copyrght 2018 Tech Scence Press CMC, vol.55, no.3, pp.495-507, 2018 Improved Lossless Data Hdng for JPEG Images Based on Hstogram Modfcaton Yang Du 1, Zhaoxa Yn 1, 2, * and Xnpeng Zhang 3 Abstract: Ths

More information

An Improved multiple fractal algorithm

An Improved multiple fractal algorithm Advanced Scence and Technology Letters Vol.31 (MulGraB 213), pp.184-188 http://dx.do.org/1.1427/astl.213.31.41 An Improved multple fractal algorthm Yun Ln, Xaochu Xu, Jnfeng Pang College of Informaton

More information

CHAPTER IV RESEARCH FINDING AND DISCUSSIONS

CHAPTER IV RESEARCH FINDING AND DISCUSSIONS CHAPTER IV RESEARCH FINDING AND DISCUSSIONS A. Descrpton of Research Fndng. The Implementaton of Learnng Havng ganed the whole needed data, the researcher then dd analyss whch refers to the statstcal data

More information