Faster Image Encryption: A Semi-Tensor Product Approach
|
|
- Godfrey Hood
- 5 years ago
- Views:
Transcription
1 207 Internatonal Conference on Computer Scence and Applcaton Engneerng (CSAE 207) ISBN: Faster Image Encrypton: A Sem-Tensor Product Approach Shpng Ye, Jnmng Wang *, Zhenyu Xu and Chaoxang Chen Zhejang Shuren Unversty, 3005 Hangzhou, Chna ABSTRACT Due to the large-scale of the mages, they suffer from a long tme to fnsh the process of encrypton and decrypton. In ths paper, we propose a novel mage-encrypton algorthm to mprove the performance of processng tme based on the sem-tensor product (STP). The STP s a novel matrx product that works by extendng the conventonal matrx product n cases of unequal dmensons. In paper, we construct a small reversble key matrx by usng the Kronecker product. Then, we use ths key matrx to change the values of pxels n the orgnal mage by applyng the sem-tensor product. As a result, the dmensons of the orgnal mage are much larger than the dmensons of the key matrx, and the amount of data that s calculated durng the encrypton and decrypton process s effectvely reduced. Meanwhle, the proposed algorthm can be used to encrypt and decrypt mages of dfferent szes. Experments were carred out usng mages of varous szes. The expermental results were compared wth prevous methods and the proposed method outperformed the others n terms of securty and processng tme. INTRODUCTION Wth the development of multmeda communcaton technology, dgtal data transmsson through wred and wreless networks has ncreased sgnfcantly. Such data nclude audo, vdeo, mages, and fles, and they have prompted a surge n traffc volume and network nfrastructure n recent years. Thus, securty problems durng transmsson and storage have also ncreased, and due to the large-scale of the mages, they suffer from a long tme to fnsh the process of encrypton and decrypton. Consequently, t needs a tradeoff between encrypton and computaton durng ts transmsson and storage. Many researchers have focused on the securty of mage-data transmsson, and several mage-encrypton algorthms have been proposed based on matrx transformatons [, 2], chaos theory [4-8], and transformaton domans [9-2]. Meanwhle, the Kronecker product has been used to mprove the transformaton performance [3-6]. The Kronecker product s a product of one element to a whole matrx, whch can quckly construct a large-dmenson matrx by some small-dmenson matrces. Such as, a transform matrx was generated usng the Kronecker product of two 6 6 matrces, whch s helpful for fast computaton and effcent constructon. The sem-tensor product (STP) s the product of one element and a block from the other matrx, and t s a novel matrx product that works by extendng the conventonal matrx product n cases of unequal dmensons. In [7], the 72
2 STP was used to provde a Boolean network representaton n a lnear system for nonlnear feedback-shft regsters (NFSR), and ths research demonstrates that the STP approach s helpful n desgnng NFSR for stream cphers n cryptography. Thus, nspred by the successful applcaton of the Kronecker product and the STP, and to mprove the effcency of mage encrypton, we propose a new algorthm for mage encrypton. The proposed algorthm s less computatonally expensve durng the encrypton and decrypton process. Furthermore, t offers lossless decrypton and robustness, avods expandng the transmtted data, and needs less tme to process. The proposed algorthm uses a small encrypton matrx to encrypt the mage wth the large-scale mage matrx. Our proposal s advantageous for several reasons. Frst, the algorthm effectvely reduces data computaton durng the encrypton and decrypton process. Consequently, the encrypton and decrypton operaton s more effcent, owng to the use of a small encrypton matrx to encrypt or decrypt a large-scale mage matrx. Second, the proposed algorthm can be appled for the encrypton of mages of dfferent szes for secure transmsson and storage. Fnally, our proposal ntroduces several key parameters, such as the dmensons of the encrypton matrx, the dfferent elements of the encrypton matrx, and the number of encrypton teratons. These parameters mprove the robustness of the encrypted mage. To verfy the accuracy and effectveness of the proposed mage-encrypton algorthm, we tested t usng DICOM medcal mages, and gray-scale mages. After usng the STP algorthm to encrypt the mages wth an 8 8 encrypton matrx, we compared the hstogram of the orgnal wth the encrypted mage, and we studed the correlaton of adjacent pxels, nformaton entropy, tme consumed, and ts susceptblty to dfferental attacks. The results of these tests demonstrate that the algorthm proposed here offers secure nformaton protecton and satsfes the processng tme requred by standard applcatons. Moreover, several encrypton keys are generated durng the mageencrypton process, and ths greatly enhances the space of the keys and mproves the robustness of the encrypted mage. The remander of ths paper s organzed as follows. In Secton II, the prelmnares of the Kronecker product and the STP are ntroduced. In Secton III, we descrbe the proposed algorthm for mage encrypton and decrypton. In Secton IV, we present the expermental results. Secton V offers a dscusson of these results. Fnally, Secton VI concludes the paper and dscusses future research. PRELIMINARIES In ths secton, we dscuss some necessary prelmnares to the Kronecker product and the STP, whch are adopted n the subsequent sectons. The Kronecker product s a product of one element to a whole matrx, whch can quckly construct a large-dmenson matrx by some small-dmenson matrces. The STP of matrces was ntroduced by Cheng [8]. It s a generalzaton of the conventonal matrx product. 73
3 Kronecker Product Defnton : For the Kronecker product of matrces (also called the tensor product ), f A ( aj ) M m n, B ( bj ) M p q, then the Kronecker product s defned as follows [9]: a B a B a B 2 n A B, () a B a B a B m m2 mn where s the Kronecker product for matrces, ab j ( 2,,,m, j 2,,,n) s tself a p q matrx, and A B s the set of mp nq matrces. Hence, the followng theorem can be proved: Theorem : Suppose C ( Ckl ) M m n,,2, K. Accordng to the defnton of the Kronecker product, we have K K C C, (2) K f m m, K K n n, then C Mm n. 2 2 Proof: By Def., when K =2, C C C holds, where C s a matrx of 2 2 m n. 2 k k k k Let C C C2 C k, 2 k K, where C s a m n matrx. k By Def., there exsts C k = (C Ck) Ck, where C s a k k K m n matrx. Then, C Mm n holds (when k K). The theorem s thus proved. Corollary If all C are nvertble, such that, 2, K, M m n, then Sem-tensor Product C K K ( C ) C M. (3) mn In [8], the STP s presented as an extenson of the conventonal matrx product. For a conventonal matrx product, f the column number of A (Col(A)) s equal to the lne number of B (Row(B)), then matrces A and B are multplcatve. The STP of matrces, on the other hand, extends the conventonal matrx product n cases of unequal dmensons. That s, Col(A) Row(B). Frst, we consder the conventonal matrx product. Let U and V be m- and n-dmensonal vector spaces, respectvely. Assume F L(U V, ). That s, F s a blnear mappng from U V to. Denote by { u,,u m } and { v,,v n } the bases of U and V, respectvely. We call S = ( s j ) the structure matrx of F, where sj F( u,v j ), (4) and where 2,,,m, j 2,,,n. m If we let X x uu, otherwse wrtten as X ( x,, x ) T m U, and f n Y yvv, otherwse wrtten as Y ( y,, y ) T m V, then 74
4 F( X,Y) T X T SY (5) Followng ths, and denotng the rows of S by S, m, and S, we can alternatvely calculate F n two steps: 2 m Step : Calculate xs, xs 2,, xms and take ther sum. m Step 2: Multply xs by Y (whch s a standard nner product). It s easy to check whether ths algorthm produces the same result. In the frst step, t seems that we have ( S n S ) X. Ths calculaton motvates the STP, defned as follows. Defnton 2: Let T be an np -dmensonal row vector and let X be a p - dmensonal column vector. Splt T nto p equal blocks, named T, p, T, whch are n matrces. Defne a left sem-tensor product, denoted by, as follows: T X p T x n. (6) Defnton 3: Let X ( x,, x s ) be a row vector, and let Y be a column vector Y ( y,, y ) T t. Case : If t s a factor of s,.e., f s t n, then the n - dmensonal row vector defned as X Y t k X yk n (7) k s called the left sem-tensor nner product of X and Y, where ( t n X X,, X ), X,,,t. Case 2: If s s a factor of t,.e., f t s n, then the n - dmensonal column vector defned by X t k k n Y : x Y (8) k s called the left sem-tensor nner product of X and Y, where Y ((Y ) T,,( Y t ) T ) T n, X,,,t. mn pq Defnton 4: Let A and B. If ether n s a factor of p.e., f nt p (denoted as A t B) or f p s a factor of n.e., n pt (denoted as A t B) then the (left) STP of A and B can be denoted by C { C j } A B, as follows: C conssts of m q blocks, and each block s defned as j C A B,,, m, j,, q, j where A s the -th row of A, and B j s the j-th column of B. In comparng the conventonal matrx product wth the Kronecker product and the STP of matrces, t s easy to see that there are sgnfcant dfferences between them. For the conventonal matrx product, the product s element-toelement. The Kronecker product s a product of one element to a whole matrx, and the STP s the product of one element and a block from the other matrx. The STP of matrces s a generalzaton of the conventonal matrx product. That mn pq s, f A, B, and n p, then A B AB. 75
5 Consequently, when the conventonal matrx product s extended to the STP, almost all of ts propertes are nevertheless mantaned. Ths s a sgnfcant advantage to usng the STP [8]. We provde the followng theorems and corollares. mn Defnton 5: Suppose A( a j ). If A s a square matrx ( m n), and A exsts, then by Def. 4 and notcng that have mn mn mn mtp ( A B) A B (see [8]), we A A I. (9) p p p p Defnton 6: Suppose A( a j ), B( b j ), and F ( f j ). The STP satsfes the assocatve law: ( A B) F A ( B F). (0) The STP has a wde range of applcatons: n nonlnear systems control for structural analyss and control of Boolean networks, n systems bology as a soluton to Morgan s Problem, etc. [8]. Furthermore, there are also applcatons for the STP n the feld of data encrypton and decrypton. To change the elements n A, whch are defned n Def. 4, we can use the conventonal matrx product or the STP. By comparng the two dfferent matrx products, we can show that less computaton s needed for the STP than the conventonal matrx product. Ths encourages us to adopt the STP for mage encrypton and decrypton on systems wth constraned resources. ALGORITHM DESCRIPTION In ths secton, we frst ntroduce the encrypton algorthm, whch uses a small key matrx to encrypt an mage wth a large-scale mage matrx. We then explan the decrypton algorthm by the nverse key matrx. Encrypton Algorthm Consder a dgtal mage PM Nwth M pxels n the row and N pxels n the column, and let P, j( {,2,, M}, j {,2,, N} ) be any pxel from the mage. If there exsts an nverse rectangular matrx Sn n, then take N nt and use Def. 4 to derve the STP. Thus, the followng equaton holds: QM N PM N Sn n, () where QM Ns the encrypted mage matrx after changng the value from each pxel n PM N. Multplcaton then expands Eq. (), such that the followng holds:,,2, n 2, 2,2 2, n QM N PM N Sn n PM nt Sn n, (2) M, M,2 M, n n k, where P s sk j S k, n n, and P can be determned as,,, j k k. j k, P { p, p,, p } P, (3),( k ) t,( k ) t2, kt 76
6 k, where P s the k-th block of the -th lne, and each block has t pxels, M, k n. Gven the characterstcs of the mage, each pxel value can be denoted wth a sngle byte for both gray-scale and color mages, whch means that the value of pxel ranges from 0 to 255. If the mage s a medcal mage whether magnetc resonance (MR), computed radology (CR), or those classfed by DICOM as other (OT) the pxel value can be expressed n 6 bts, 2 bts, and 0 bts, respectvely. In ths case, we modfy Eq. (2) to obtan the fnal encrypton results wth the followng matrx: mod(,, Mmax B ) mod(, n, Mmax B ) QM N, (4) mod( M,, Mmax B ) mod( M, n, Mmax B ) where M max B denotes the maxmum value per pxel, derved as follows: 256, f bt-depth 8 024, f bt-depth 0 M max B. 4096, f bt-depth , f bt-depth 6 By Theorem, we can assume that nvertble matrces for Sl lexst such that the nverse rectangular matrx Sn n can be quckly constructed as follows: k Snn Sl l (5) k where l n. Ths s helpful for an effcent constructon and for speedng up the encrypton process. To mprove and contrast the encrypton securty of the encrypted mage, we encrypt the orgnal mage K rounds, as follows: Q P S S S P S. (6) M N M N nn nn nn M N nn Above all, ths algorthm encrypts dgtal mages usng the encrypton matrx Sn n at much smaller dmensons than the mage matrx PM N. Sgnfcantly less data s needed, and the computatonal complexty of the encrypton algorthm s reduced. Decrypton Algorthm To decrypt the encrypted mage QM N, the frst step nvolves ensurng that S n n exsts. Notng that ( A B) A B (see [8]), we can use Eq. () such that PM N QM N Sn n, and from PM N ( PM N Sn n) S nn, by Defnton 5, we can obtan PM N PM N ( Sn n S nn ). Usng Defnton 5, we have K 77
7 PM N PM N In n PM N. (7) Thus, we obtan the decrypted mage. By Theorem, Corollary, and Eq. (5), then, the nverse matrx S n n of Sn n can be obtaned quckly wth the followng equaton: k ( ) Snn Sl l, (8) k where l n, and ( S l ) l s the nverse matrx of S l l, 2,,,k. From the above descrpton, t s clear that once an nverse matrx S n n wth the approprate dmensons s constructed, then the dgtal mage can be encrypted and decrypted. After generatng the nverse matrx S n n by Eq. (8), we can use the prncple n Eq. () and the matrx calculaton n Eq. (2). Next, the characterstcs of the mage pxel values can be combned. Referrng to Eq. (4) durng the encrypton process, we can obtan the decrypted mage PM N as follows: mod(,, Mmax B ) mod(, n, Mmax B ) PM N, (9) mod( M,, Mmax B ) mod( M, n, Mmax B ) where, s, n k,, j Q s k k, j S k j n n, k, k, Q s defned as P, and M, k n. Thus, the process of encryptng and decryptng the orgnal mage are completed wth an encrypton matrx of smaller dmensons than the orgnal mage. There are two mportant and unque features to the proposed algorthm. Frst, the amount of data that s calculated durng the encrypton and decrypton process s effectvely reduced by usng data from a smaller matrx to encrypt and decrypt a large matrx mage. Second, the proposed algorthm can be used to encrypt and decrypt mages of dfferent szes. As explaned above, f we are gven an n-dmensonal matrx Sn n, then n s sutable for the number of columns n the orgnal mage PM N, provded that N n t, where t s a postve nteger. Thus, f the number of columns and rows PM' N' changes, such that N ' n t', where t' s also a postve nteger, the algorthm proposed here proceeds n the same manner, wthout any need for modfcatons. Constructng the Key Matrx Gven ther senstvty to the ntal condtons and control parameters, chaotc maps had been wdely used n data encrypton [4-8]. However, there are dsadvantages to chaotc maps, ncludng lmted precson, perod loops, and dffculty measurng the cycle. The decmal representatons of rratonal numbers are nether perodc nor termnatng, and that the next uncalculated decmal unt mght be any number between 0 and 9. In such cases, t s sad to be sutably chaotc [20]. Thus, we adopt rratonal numbers when constructng the key matrx. For = , let I ( d, L) [ ( d, L ), ( d2, L2 ), ( d, L ), ] be a set of ntegers from the rratonal number I, where L s the length of a segment chosen from I, whle 78
8 the ntal dgt of the segment s d dgts away from the decmal pont. Usng the defnton of I ( dl, ), we can obtan the followng: ( dl, ) [ (3,4), (5,3), (8,2), ], (20) where (3,4) =592, (5,3) =926, and (8,2) =53, etc. The parameters L and d can be determned by the sender and the recever together, where d, L, and [, ). From the above descrpton, let { u, v} ( d, L). The encrypton matrx S2 2 can be derved as follows: u S2 2 v uv, where S2 2s an nverse matrx. That s, det( S) 2 2. Usng Eq. (6), we can derve S4 4, S88, and, as follows: S S S u u u v ( uv ) uv u( uv ) v uv ( uv ) u( uv ), 2 2 v v( uv ) v( uv ) ( uv ) 44 and then we can obtan S88 by S2 2 S4 4 Therefore, we know that f we use dfferent { u, v} ( d, L), the elements S2 2, S4 4, and S88 wll change accordngly. Wth Eq. (9), we can quckly obtan S as follows: 88 uv u S2 2 v, S S S ( uv ) u( uv ) u( uv ) u v( uv ) ( uv ) uv u v( uv ) uv ( uv ) u, 2 v v v 44 and then we can obtan S 88 by S2 2 S4 4 Thus, we construct the encrypton matrx Sn n usng the above procedure. Indeed, there are other ways to construct Sn n, and the reader s nvted to generate the matrx usng any such procedure. Durng the data transmsson, there s no need to transmt the encrypton matrx or any parameters. Rather, the recever can merely use the rule of common agreement between the sender and recever to construct the decrypton matrx. EXPERIMENTAL RESULTS To verfy the proposed mage-encrypton method, gray-scale mages of dfferent dmensons and bt-depths were used, ncludng a CR chest mage 79
9 (hereafter CR-Chest ) (dmensons: ) obtaned from [2], Lena (dmensons: 52 52), Peppers (dmensons: ), Mandrll (dmensons: ), and Boats (dmensons: ). The CR-Chest has a bt-depth of 0, whereas the others have a bt-depth of 8. In ths paper, we conducted an expermental analyss of the proposed encrypton algorthm usng the followng gray-scale mages: CR-Chest, Lena, Peppers, Mandrll, and Boats. All of these mages were encrypted wth the matrx S88 and decrypted by. From Eq. (7), let K=4. Then, S 88 Q P S S S S P S. M N M N M N 88 Once the mages are encrypted, they can be decrypted as follows: PM N QM N S8 8 S8 8 S8 8 S8 8 QM N S8 8. The experments were conducted as follows: Encrypton procedure: Input: the n-dmenson of the key matrx; the source mage PM N; the number of encrypton rounds K; and the varables L and d for the key matrx. Output: Returns encrypted mage QM N. Step. The elements u and v from the set ( dl, ) are obtaned wth Eq. (20), and the matrx S2 2 s constructed. Step 2. The n n encrypton matrx Sn n s obtaned by Eq. (5). Step 3 The varables of t for the block of the source mage PM N are calculated by t N n, whch s defned n Def. 4. Step 4: The source mage PM Ns encrypted nto the cphered mage QM Nn Eqs. (2) and (4). If the current round s not the fnal round of encrypton, Step 4 s repeated. Otherwse, the encrypton process s complete. Decrypton procedure: Input: The varables L and d for the key matrx; the n-dmenson of the key matrx; the encrypted mage QM N; and the number of encrypton rounds K. Output: Returns decrypted mage PM N. Step. The n n encrypton matrx S n n s obtaned by Eqs. (20) and (8). Step 2. The varables of t for the block of the encrypted mage QM Nare calculated by t N n, whch s defned n Def. 4. Step 3: The encrypted mage QM Ns decrypted nto the decrypton QM Nn Eq. (7) and (9). If the current round s not the fnal round of encrypton, repeat Step 3 agan. Otherwse, the encrypton process s complete. The expermental results are provded n Fgs. 3, where the elements of the encrypton and decrypton matrces were obtaned as follows: u (6,2) =26, v (0,2) =58, where d =6, L =2, d 2 =0, and L 2 =2. In Fgures. -3, Frame (a) shows the orgnal mage. Frame (c) shows the encrypted mage from the orgnal n Frame (a) usng the key S88. Frame (e) shows the decrypted mage. Frames (b), (d), and (f) are the hstograms for (a), (c), and (e), respectvely. 4 80
10 Fgure. Comparson of (a) the Orgnal CR-Chest Image wth (c) the Encrypted Image, and (e) the Decrypted Image, and ther Correspondng Hstograms (Dmensons: , Bt-depth: 0). Fgure 2. Comparson of (a) the Orgnal Lena Image wth (c) the Encrypted Image, and (e) the Decrypted Image, and ther Correspondng Hstograms (Dmensons: 52 52, Bt-depth: 8). Fgure 3. Comparson of (a) the Orgnal Peppers Image wth (c) the Encrypted Image, and (e) the Decrypted Image, and ther Correspondng Hstograms (Dmensons: , Bt-depth: 8). 8
11 EXPERIMENTAL ANALYSIS Statstcal Analyss HISTOGRAM FOR ENCRYPTED IMAGE An mage hstogram llustrates how the pxels n an mage are dstrbuted, and ths s done by graphng the number of pxels n terms of ther ntensty. We calculated and analyzed the hstograms for the encrypted and orgnal mages to reveal how ther respectve content dffers. The hstograms are shown n Fgures. 3. In Frames (b) and (d) for these fgures, t s clear that the hstograms of the encrypted mage are farly unform, and that they dffer sgnfcantly from the hstograms of the orgnal mage. Meanwhle, we employ varances of hstograms to evaluate the unformty of the encrypted mages. The varance of hstograms s shown as follows: n n 2 Var( Z) ( ) 2 z z j, 2 n j where n denotes the gray values n the hstogram, and z and z j are the number of pxels wth gray values equal to and j, respectvely. As shown n TABLE I, lower varance to the encrypted mages ndcates hgher unformty, and the decrypted mages have the same varance as the orgnal, ndcatng that there s no dstorton between the orgnal and the decrypted mage. TABLE I. VARIANCES OF THE HISTOGRAMS. mage (Dmenson, Bt-depth) orgnal encrypted decrypted CR-Chest ( , 0) 5.406e e e+7 Lena (52 52, 8) 7.475e+5.823e e+5 Peppers ( , 8).3500e e e+6 Mandrll ( , 8) e e e+6 Boats ( , 8) e e e+6 All the orgnal mages of dfferng szes were encrypted wth the same encrypton matrx S88. Consequently, the algorthm proposed here s compatble wth dfferent-szed mages nsofar as the dmensons of Sn n are sutable for the number of columns n the orgnal mage. RELEVANCE OF ADJACENT ELEMENTS To test the correlaton of pxels (vz., vertcal, horzontal, and dagonal), we randomly selected 2,000 pars of adjacent pxels from both the orgnal and the encrypted mage, and calculated the correlaton coeffcents of pxels. TABLE II lsts the correlaton coeffcents calculated from the orgnal mages and ther correspondng mages cphered wth the proposed algorthm. From TABLE II, we can see that the correlaton coeffcents are always hgh. Whereas they are very close to n the plan-text mages, they are sgnfcantly reduced n the cphered mages. It s clear that our algorthm effectvely reduces the correlaton between adjacent pxels. 82
12 TABLE II. CORRELATION COEFFICIENTS OF CR-CHEST, LENA, PEPPERS, MANDRILL, BOATS AND THEIR ENCRYPTED IMAGES IN THE PROPOSED ALGORITHM. Orgnal CR-Chest Orgnal Lena Orgnal Peppers Orgnal Mandrll Orgnal Boats Vertcal Horzontal Dagonal Encrypted CR-Chest Encrypted Lena Encrypted Peppers Encrypted Mandrll Encrypted Boats Vertcal Horzontal Dagonal The correlaton comparson tests wth other encrypton algorthms are lsted n TABLE III. From TABLE III, we can see that the correlaton coeffcents from the proposed algorthm are lower than other schemes, except HC-DNA. These results confrm that our proposed encrypton s resstant to statstcal attacks amed at dscoverng the correlatons between adjacent pxels. TABLE III. COMPARING THE CORRELATION COEFFICIENTS OF CR-CHEST, LENA, PEPPERS, MANDRILL, AND BOATS. Image Ref. [4] Ref. [5] Ref. [8] AES HC- [22] DNA[24] Proposed CR-Chest Vertcal Horzontal Dagonal Lena Vertcal Horzontal Dagonal Peppers Vertcal Horzontal Dagonal Mandrll Vertcal Horzontal Dagonal Boats Vertcal Horzontal Dagonal
13 Informaton Entropy Analyss Informaton entropy s thought to be one of the most mportant features n randomness [23]. The nformaton entropy Hm ( ) s calculated wth the followng formula: 2 n H( m) p( m ) log p( m ) (2) 0 2 TABLE IV. THE INFORMATION ENTROPY OF ORIGINAL AND ENCRYPTED IMAGE. CR-Chest Lena Peppers Mandrll Boats Orgnal Image Encrypted Image where m s the message, p( m )= M max B ( M max B s derved from Eq. (5)) represents the probablty of symbol m, and the entropy s expressed n bts. Suppose that a message s such that each symbol s encoded wth eght bts. For randomness, the entropy value should be eght, deally. However, the entropy value of the message s often less than eght, though t should nonetheless come close to ths deal. For messages where each symbol s encoded wth ten bts, we can reach the deal Hm= ( ) 0. Ths deal entropy was acheved wth the CR- Chest mage, for nstance. We used Eq. (2) to calculate the nformaton entropy for the encrypted mages. TABLE IV shows the entropy for the gray-scale values, whch all come close to the deal value. Ths ndcates that the proposed scheme has successfully hdden the nformaton randomly, such that the probablty of accdental nformaton leakage s very low. TABLE V provdes a comparson of the proposed method wth other algorthms n terms of the nformaton entropy. The values obtaned from the proposed scheme are much closer to the deal and other algorthms, and thus the nformaton hdden wth the proposed scheme s more random than t s wth other schemes. TABLE V. COMPARING THE INFORMATION ENTROPY OF CR-CHEST, LENA, PEPPERS, MANDRILL, AND BOATS. Image Bts/pxel Ref. [4] Ref. [5] Ref. [8] AES [22] HC- DNA[24] Proposed CR-Chest Lena Peppers Mandrll Boats Dfferental Attack As a general requrement for all mage-encrypton schemes, the encrypted mage should dffer consderably from ts orgnal form. Such dfferences can be measured by means of two crtera namely, the number of pxel change rate (NPCR) and the unfed average changng ntensty (UACI) [8]. 84
14 Let C (, j) and C 2 (, j) be the gray level of the pxels at the -th row and j-th column of the encrypted mages, respectvely before and after a pxel from the orgnal mage changes (sze: M N pxels). The NPCR for these two mages s defned as M N NPCR [ D(, j)] 00%, (22) M N j where D(, j) s defned as 0, f C(, j) C2(, j) D(, j)., f C(, j) C2(, j) The UACI s calculated as follows: M N C(, j) C2(, j) UACI [ ] 00%, (23) M N M j max B where M max B s derved from Eq. (4). We measured the NPCR and the UACI for the orgnal and encrypted mages. The results are shown n TABLE VI. The results show that our algorthm s robust aganst dfferental attacks. TABLE VI. NPCR AND UACI OF THE ENCRYPTED IMAGES. Image Ref. [4] Ref. [5] Ref. [8] AES [22] Proposed NPCR(%) CR-Chest Lena Peppers Mandrll Boats UACI(%) CR-Chest Lena Peppers Mandrll Boats Key Space and Senstvty Analyss KEY SPACE The key space should be suffcently large to render brute-force attacks unfeasble. In the proposed algorthm, the keys consst of the followng: () the elements of the key matrx, (2) the n-dmenson of the key matrx, and (3) the K 64 number of encrypton rounds. Gven a precson of 2 and takng an M N - szed mage as an example f the same key matrx s used n dfferent encrypton rounds, the key space can be calculated as follows: 64 (2 ) n S n t, where n n denotes the elements of the key matrx, and t s the varable for the block of the source mage PM N, defned as t N n. If n =2, S = t 2. However, f we construct a larger key matrx, such as an 8 8 key matrx, then the key space S s t 2. If dfferent key matrces are used n dfferent encrypton rounds, the key space would be: 64 nn K S [(2 ) t], 85
15 where K s the number of encrypton rounds, meanng that the key space S s much larger than t was formerly. Thus, the proposed algorthm wth such a large key space s suffcent for relable and practcal use. KEY SENSITIVITY To test the key senstvty of the proposed algorthm, we agan used the NPCR. The key matrx S2 2 was constructed followng the detals provded n the secton Constructon of Key Matrx. Then, we constructed S88. The expermental results are provded n Fg. 4, where the parameters u and v range from 0 to 00, and the parameter dfference was u [0,] and v [0,]. Further, the encrypton rounds were, 2, and 4 tmes, and the same key matrx was used durng each encrypton round. Seen from the Fgure 4, the senstvty remans above 99% regardless of the parameters or encrypton rounds. Ths shows that our algorthm has a hgh level of senstvty to the ntal key. Ths guarantees the securty of the proposed algorthm aganst brute-force attacks to some extent. Fgure 4. Key-senstvty Test for the Proposed Algorthm: Boats mage (Dmensons: , Bt-depth: 8). Speed and Complexty Analyses To evaluate the runnng speed, we performed tests on the encrypton speed of the proposed algorthm, comparng t wth [5], [7], and the AES. The proposed algorthm was mplemented n Vsual C on an Intel laptop, runnng Wndows 8. The CPU tmes requred for the encrypton and decrypton processes are shown n TABLE VII. In all cases, the processng tme was merely a few seconds, but the processng tme nevertheless ncreased as the dmensons of the mage grew. These results show that the proposed algorthm runs faster than the AES algorthm, [5], and [7]. To analyze the executon tme of the encrypton process, we studed the tme consumed durng the multplcatons and addtons. Let the orgnal mage be PM N, and let the key matrx be Sn n, where n N. 86
16 2 For K encrypton rounds, the proposed algorthm requres O( Mn K ) teratons for multplcaton and O( Mn( n ) K) teratons for addton, whereas for the 2 conventonal matrx product, the teratons are O( MN K ) and O( MN( N ) K), respectvely. Therefore, the proposed algorthm s relatvely fast. TABLE VII. TIME-CONSUMING COMPARISONS. Image AES [22] (ms) Ref. [5] (ms) Ref. [7] (ms) Proposed (ms) CR-Chest ( ) Lena (52 52) Peppers ( ) Mandrll( ) Boats ( ) Test on another Images To further test the effectveness and performance of the proposed algorthm, we used another 33 mages: medcal mages obtaned from [2] and other mages obtaned from [25]. As shown n TABLE, the column Corr. s the average correlaton of the encrypted mage n three drectons; the column Ds. s the dstorton rato between the orgnal and the encrypted mage; and all of the expermental results were obtaned after four encrypton rounds wth S88. From TABLE VIII, we can see that the proposed algorthm performs well and that t s effectve for mage encrypton. TABLE VIII. MORE TEST ON THE PROPOSED ALGORITHM. Orgnal mage NPCR UACI Tme Corr. Entropy (Dmenson, Bt-depth) (%) (%) (ms) Ds. CT-abdo (52 52, 8) OT-a7 (52 52, 8) OT-colon (52 52, 8) OT-hp (52 52, 8) MR-an2 ( , 2) MR-an (52 52, 2) CT-bran (52 52, 6) CT-ort (52 52, 6) MR-head ( , 6) MR-knee ( , 6) nemacb ( , 8) nemacl ( , 8) nemacl2 ( , 8) CONCLUSIONS In ths paper, we proposed a small encrypton matrx to encrypt and decrypt mages, where the dmensons of the orgnal mage are larger than the key matrx. We carred out statstcal analyses, and we measured the processng tme, nformaton entropy, NPCR, and UACI of the proposed algorthm. The results from these experments demonstrate the securty and hgh-performance of the proposed mage-encrypton procedure. The proposed algorthm s unque n a number of ways. Frst, a small matrx s used to encrypt and decrypt mages from a relatvely large matrx. Thus, the 87
17 computatons of the data are effectvely reduced, and the operatonal effcency of encrypton process s enhanced. Second, ths algorthm s compatble wth mages of dfferent dmensons usng the same encrypton matrx. Thrd, the ntroducton of the key s smple: by varyng the elements of the key matrx Sn n, the dmenson n, and K encrypton rounds, a suffcently large key space can be generated, whch s useful for ncreasng the securty of the algorthm. Fnally, an nverse encrypton matrx Sn n and ts nverse matrx S n n can be constructed quckly usng the tensor product, whch s helpful for decreasng the tme consumed by the proposed algorthm. Thus, the algorthm s smple, effcent, and easly mplemented. In future work, we plan to analyze the securty of the proposed algorthm theoretcally, execute the securty experments of brute-force attack, knownplan-text attack, and chosen-cpher-text attack, etc. We also plan to study the STP n conjuncton wth chaotc dynamc symbols to facltate the encrypton of color mages. ACKNOWLEDGMENT The authors wsh to thank the anonymous revewers for ther valuable comments and for ther help n fndng errors. We apprecate ther assstance n mprovng the qualty and the clarty of the manuscrpt. Ths work was supported by the Scence and technology project of Zhejang Provnce, Chna (Grant No. 204C33058, 205C33074, 205C33083). REFERENCES. L. L. Zhao, Z. L. Fang, and Z. C. Gu Novel algorthm of dgtal mage scramblng and encrypton based on magc cube transformaton, Journal of Optoelectroncs Laser, 9(): J. George, S. Varma, and M. Chatterjee, 204. Color mage watermarkng usng DWT-SVD and Arnold transform, Inda Conference (INDICON), 204 Annual IEEE, Pune, Inda, December -3, D. M. Chen A feasble chaotc encrypton scheme for mage, Proc of Internatonal Workshop on Chaos-Fractals Theores and Applcaton, Shenyang, Chna, November 6-8, Abdo, S. Lan, I. A. Ismal, and M. Amn, etc A cryptosystem based on elementary cellular automata, Communcatons n Nonlnear Scence and Numercal Smulaton, 8(): Kanso, and M. A. Ghebleh A novel mage encrypton algorthm based on a 3D chaotc map, Communcatons n Nonlnear Scence and Numercal Smulaton, 7(7): H. J. L, and X. Y. Wang. 20. Color mage encrypton usng spatal bt-level permutaton and hgh-dmenson chaotc system, Optcs Communcatons, 284: Y. Q. Zhang, and X. Y. Wang A symmetrc mage encrypton algorthm based on mxed lnear nonlnear coupled map lattce, Informaton Scences, 273: X. Wang, and D. Luan A novel mage encrypton algorthm usng chaos and reversble cellular automata, Communcatons n Nonlnear Scence and Numercal Smulaton, 8(): K. Yadav, S. Vashsth, H. Sngh, and K. Sngh A phase-mage watermarkng scheme n gyrator doman usng devl's vortex Fresnel lens as a phase mask, Optcs Communcatons, 344():
18 0. Mehra, and N. K. Nshchal Optcal asymmetrc watermarkng usng modfed wavelet fuson and dffractve magng, Optcs and Lasers n Engneerng, 68: T. Banch, A. Pva, and M. Barn On the mplementaton of the dscrete Fourer transform n the encrypted doman, IEEE Trans. Inf. Forenscs Securty, 4(): K. Kab, B. J. Saha, and C. Pradhan Enhanced dgtal watermarkng scheme usng fractal mages n wavelets, Computng, Communcaton and Networkng Technologes (ICCCNT), 204 Internatonal Conference on, IEEE, Hefe, Chna, July -3, M. H. Lee, B. S. Rajan, and J. Y. Park A generalzed reverse jacket transform, Crcuts and Systems II: Analog and Dgtal Sgnal Processng, IEEE Transactons on, 48(7): M. H. Lee, X. D. Zhang, and X. Jang Fast parametrc recprocal-orthogonal jacket transforms, EURASIP Journal on Advances n Sgnal Processng, : H. B. Kekre, T. Sarode, and S. Natu Performance analyss of watermarkng usng Kronecker product of orthogonal transforms and wavelet transforms, Internatonal Journal of Scentfc & Engneerng Research, 5(2): S. Bouguezel A recprocal-orthogonal parametrc transform and ts fast algorthm, Sgnal Processng Letters, IEEE, 9(): Zhong and D. Ln On maxmum length nonlnear feedback shft regsters usng a Boolean network approach, Control Conference (CCC), rd Chnese. IEEE, Nanjng, Chna, July 28-30, D. Z. Chen, H. S. Q, and Z. Q. L. 20. Analyss and Control of Boolean Networks: A Semtensor Product Approach. Sprnger, London, pp N. Vartak On an applcaton of Kronecker product of matrces to statstcal desgns, The Annals of Mathematcal Statstcs, 26(3): Prasad, and K. L. Sudha. 20. Chaos mage encrypton usng pxel shufflng, Computer Scence & Informaton Technology, 4(): S. Barr Medcal mage samples. [Onlne]. Avalable: Natonal Insttute of Standards and Technology FIPS 97: Advanced Encrypton Standard [Onlne]. Avalable: csrc.nst.gov/publcatons/fps/fps97/fps-97.pdf. 23. Awad, and D. Awad Effcent mage chaotc encrypton algorthm wth no propagaton error, ETRI journal, 32(5): Zhan K, We D, and Sh J, et al Cross-utlzng hyperchaotc and DNA sequences for mage encrypton, Journal of Electronc Imagng, 26(): Test Images. [Onlne]. Avalable: 89
Chapter 5. Solution of System of Linear Equations. Module No. 6. Solution of Inconsistent and Ill Conditioned Systems
Numercal Analyss by Dr. Anta Pal Assstant Professor Department of Mathematcs Natonal Insttute of Technology Durgapur Durgapur-713209 emal: anta.bue@gmal.com 1 . Chapter 5 Soluton of System of Lnear Equatons
More informationA New Scrambling Evaluation Scheme based on Spatial Distribution Entropy and Centroid Difference of Bit-plane
A New Scramblng Evaluaton Scheme based on Spatal Dstrbuton Entropy and Centrod Dfference of Bt-plane Lang Zhao *, Avshek Adhkar Kouch Sakura * * Graduate School of Informaton Scence and Electrcal Engneerng,
More informationModule 3 LOSSY IMAGE COMPRESSION SYSTEMS. Version 2 ECE IIT, Kharagpur
Module 3 LOSSY IMAGE COMPRESSION SYSTEMS Verson ECE IIT, Kharagpur Lesson 6 Theory of Quantzaton Verson ECE IIT, Kharagpur Instructonal Objectves At the end of ths lesson, the students should be able to:
More informationThe Synchronous 8th-Order Differential Attack on 12 Rounds of the Block Cipher HyRAL
The Synchronous 8th-Order Dfferental Attack on 12 Rounds of the Block Cpher HyRAL Yasutaka Igarash, Sej Fukushma, and Tomohro Hachno Kagoshma Unversty, Kagoshma, Japan Emal: {garash, fukushma, hachno}@eee.kagoshma-u.ac.jp
More informationDepartment of Mathematics, Shantou University, Shantou, Guangdong, , China.
205 Internatonal Conference on Computer Scence and Communcaton Engneerng (CSCE 205) ISN: 978--60595-249-9 A Novel Color Image Encrypton Scheme ased on Permutaton-substtuton Archtecture Ru-Song Ye,a, Mng
More informationFormulas for the Determinant
page 224 224 CHAPTER 3 Determnants e t te t e 2t 38 A = e t 2te t e 2t e t te t 2e 2t 39 If 123 A = 345, 456 compute the matrx product A adj(a) What can you conclude about det(a)? For Problems 40 43, use
More informationA Novel Feistel Cipher Involving a Bunch of Keys supplemented with Modular Arithmetic Addition
(IJACSA) Internatonal Journal of Advanced Computer Scence Applcatons, A Novel Festel Cpher Involvng a Bunch of Keys supplemented wth Modular Arthmetc Addton Dr. V.U.K Sastry Dean R&D, Department of Computer
More informationAn Image Encryption Scheme Based on Hybrid Orbit of Hyper-chaotic Systems
I. J. Computer Network and Informaton Securty 5 5 5-33 Publshed Onlne Aprl 5 n MECS (http://www.mecs-press.org/) DOI:.585/jcns.5.5.4 An Image Encrypton Scheme Based on Hybrd Orbt of Hyper-chaotc Systems
More informationKayhan CELİK. Erol KURT. x ' ay ax. y ' xz rx y. z ' xy bz
ECAI 216 - Internatonal Conference 8th Edton Electroncs, Computers and Artfcal Intellgence 3 June -2 July, 216, Bucharest, ROMÂIA A ew Image Encrypton Algorthm Based on Lorenz System Kayhan CELİK Gaz Unversty,
More informationCOMPARISON OF SOME RELIABILITY CHARACTERISTICS BETWEEN REDUNDANT SYSTEMS REQUIRING SUPPORTING UNITS FOR THEIR OPERATIONS
Avalable onlne at http://sck.org J. Math. Comput. Sc. 3 (3), No., 6-3 ISSN: 97-537 COMPARISON OF SOME RELIABILITY CHARACTERISTICS BETWEEN REDUNDANT SYSTEMS REQUIRING SUPPORTING UNITS FOR THEIR OPERATIONS
More informationThe Order Relation and Trace Inequalities for. Hermitian Operators
Internatonal Mathematcal Forum, Vol 3, 08, no, 507-57 HIKARI Ltd, wwwm-hkarcom https://doorg/0988/mf088055 The Order Relaton and Trace Inequaltes for Hermtan Operators Y Huang School of Informaton Scence
More informationImage Encryption Using Chaotic Signal and Max Heap Tree
Image Encrypton Usng Chaotc Sgnal and Max Heap Tree Farborz Mahmoud 1, Rasul Enayatfar 2, and Mohsen Mrzashaer 1 1 Electrcal and Computer Engneerng Department, Islamc Azad Unversty, Qazvn Branch, Iran
More informationPop-Click Noise Detection Using Inter-Frame Correlation for Improved Portable Auditory Sensing
Advanced Scence and Technology Letters, pp.164-168 http://dx.do.org/10.14257/astl.2013 Pop-Clc Nose Detecton Usng Inter-Frame Correlaton for Improved Portable Audtory Sensng Dong Yun Lee, Kwang Myung Jeon,
More informationSpeeding up Computation of Scalar Multiplication in Elliptic Curve Cryptosystem
H.K. Pathak et. al. / (IJCSE) Internatonal Journal on Computer Scence and Engneerng Speedng up Computaton of Scalar Multplcaton n Ellptc Curve Cryptosystem H. K. Pathak Manju Sangh S.o.S n Computer scence
More informationHongyi Miao, College of Science, Nanjing Forestry University, Nanjing ,China. (Received 20 June 2013, accepted 11 March 2014) I)ϕ (k)
ISSN 1749-3889 (prnt), 1749-3897 (onlne) Internatonal Journal of Nonlnear Scence Vol.17(2014) No.2,pp.188-192 Modfed Block Jacob-Davdson Method for Solvng Large Sparse Egenproblems Hongy Mao, College of
More informationReport on Image warping
Report on Image warpng Xuan Ne, Dec. 20, 2004 Ths document summarzed the algorthms of our mage warpng soluton for further study, and there s a detaled descrpton about the mplementaton of these algorthms.
More informationA Fast Computer Aided Design Method for Filters
2017 Asa-Pacfc Engneerng and Technology Conference (APETC 2017) ISBN: 978-1-60595-443-1 A Fast Computer Aded Desgn Method for Flters Gang L ABSTRACT *Ths paper presents a fast computer aded desgn method
More informationPower law and dimension of the maximum value for belief distribution with the max Deng entropy
Power law and dmenson of the maxmum value for belef dstrbuton wth the max Deng entropy Bngy Kang a, a College of Informaton Engneerng, Northwest A&F Unversty, Yanglng, Shaanx, 712100, Chna. Abstract Deng
More informationOperating conditions of a mine fan under conditions of variable resistance
Paper No. 11 ISMS 216 Operatng condtons of a mne fan under condtons of varable resstance Zhang Ynghua a, Chen L a, b, Huang Zhan a, *, Gao Yukun a a State Key Laboratory of Hgh-Effcent Mnng and Safety
More informationScroll Generation with Inductorless Chua s Circuit and Wien Bridge Oscillator
Latest Trends on Crcuts, Systems and Sgnals Scroll Generaton wth Inductorless Chua s Crcut and Wen Brdge Oscllator Watcharn Jantanate, Peter A. Chayasena, and Sarawut Sutorn * Abstract An nductorless Chua
More informationCONTRAST ENHANCEMENT FOR MIMIMUM MEAN BRIGHTNESS ERROR FROM HISTOGRAM PARTITIONING INTRODUCTION
CONTRAST ENHANCEMENT FOR MIMIMUM MEAN BRIGHTNESS ERROR FROM HISTOGRAM PARTITIONING N. Phanthuna 1,2, F. Cheevasuvt 2 and S. Chtwong 2 1 Department of Electrcal Engneerng, Faculty of Engneerng Rajamangala
More informationStructure and Drive Paul A. Jensen Copyright July 20, 2003
Structure and Drve Paul A. Jensen Copyrght July 20, 2003 A system s made up of several operatons wth flow passng between them. The structure of the system descrbes the flow paths from nputs to outputs.
More informationOutline. Communication. Bellman Ford Algorithm. Bellman Ford Example. Bellman Ford Shortest Path [1]
DYNAMIC SHORTEST PATH SEARCH AND SYNCHRONIZED TASK SWITCHING Jay Wagenpfel, Adran Trachte 2 Outlne Shortest Communcaton Path Searchng Bellmann Ford algorthm Algorthm for dynamc case Modfcatons to our algorthm
More informationMicrowave Diversity Imaging Compression Using Bioinspired
Mcrowave Dversty Imagng Compresson Usng Bonspred Neural Networks Youwe Yuan 1, Yong L 1, Wele Xu 1, Janghong Yu * 1 School of Computer Scence and Technology, Hangzhou Danz Unversty, Hangzhou, Zhejang,
More informationIMAGE DENOISING USING NEW ADAPTIVE BASED MEDIAN FILTER
Sgnal & Image Processng : An Internatonal Journal (SIPIJ) Vol.5, No.4, August 2014 IMAGE DENOISING USING NEW ADAPTIVE BASED MEDIAN FILTER Suman Shrestha 1, 2 1 Unversty of Massachusetts Medcal School,
More informationInner Product. Euclidean Space. Orthonormal Basis. Orthogonal
Inner Product Defnton 1 () A Eucldean space s a fnte-dmensonal vector space over the reals R, wth an nner product,. Defnton 2 (Inner Product) An nner product, on a real vector space X s a symmetrc, blnear,
More information4DVAR, according to the name, is a four-dimensional variational method.
4D-Varatonal Data Assmlaton (4D-Var) 4DVAR, accordng to the name, s a four-dmensonal varatonal method. 4D-Var s actually a drect generalzaton of 3D-Var to handle observatons that are dstrbuted n tme. The
More informationResource Allocation with a Budget Constraint for Computing Independent Tasks in the Cloud
Resource Allocaton wth a Budget Constrant for Computng Independent Tasks n the Cloud Wemng Sh and Bo Hong School of Electrcal and Computer Engneerng Georga Insttute of Technology, USA 2nd IEEE Internatonal
More informationEEE 241: Linear Systems
EEE : Lnear Systems Summary #: Backpropagaton BACKPROPAGATION The perceptron rule as well as the Wdrow Hoff learnng were desgned to tran sngle layer networks. They suffer from the same dsadvantage: they
More informationResearch Article Green s Theorem for Sign Data
Internatonal Scholarly Research Network ISRN Appled Mathematcs Volume 2012, Artcle ID 539359, 10 pages do:10.5402/2012/539359 Research Artcle Green s Theorem for Sgn Data Lous M. Houston The Unversty of
More informationRotation Invariant Shape Contexts based on Feature-space Fourier Transformation
Fourth Internatonal Conference on Image and Graphcs Rotaton Invarant Shape Contexts based on Feature-space Fourer Transformaton Su Yang 1, Yuanyuan Wang Dept of Computer Scence and Engneerng, Fudan Unversty,
More informationUncertainty in measurements of power and energy on power networks
Uncertanty n measurements of power and energy on power networks E. Manov, N. Kolev Department of Measurement and Instrumentaton, Techncal Unversty Sofa, bul. Klment Ohrdsk No8, bl., 000 Sofa, Bulgara Tel./fax:
More informationModule 9. Lecture 6. Duality in Assignment Problems
Module 9 1 Lecture 6 Dualty n Assgnment Problems In ths lecture we attempt to answer few other mportant questons posed n earler lecture for (AP) and see how some of them can be explaned through the concept
More informationPulse Coded Modulation
Pulse Coded Modulaton PCM (Pulse Coded Modulaton) s a voce codng technque defned by the ITU-T G.711 standard and t s used n dgtal telephony to encode the voce sgnal. The frst step n the analog to dgtal
More information3.1 Expectation of Functions of Several Random Variables. )' be a k-dimensional discrete or continuous random vector, with joint PMF p (, E X E X1 E X
Statstcs 1: Probablty Theory II 37 3 EPECTATION OF SEVERAL RANDOM VARIABLES As n Probablty Theory I, the nterest n most stuatons les not on the actual dstrbuton of a random vector, but rather on a number
More informationComposite Hypotheses testing
Composte ypotheses testng In many hypothess testng problems there are many possble dstrbutons that can occur under each of the hypotheses. The output of the source s a set of parameters (ponts n a parameter
More informationOne-sided finite-difference approximations suitable for use with Richardson extrapolation
Journal of Computatonal Physcs 219 (2006) 13 20 Short note One-sded fnte-dfference approxmatons sutable for use wth Rchardson extrapolaton Kumar Rahul, S.N. Bhattacharyya * Department of Mechancal Engneerng,
More informationOn the Interval Zoro Symmetric Single-step Procedure for Simultaneous Finding of Polynomial Zeros
Appled Mathematcal Scences, Vol. 5, 2011, no. 75, 3693-3706 On the Interval Zoro Symmetrc Sngle-step Procedure for Smultaneous Fndng of Polynomal Zeros S. F. M. Rusl, M. Mons, M. A. Hassan and W. J. Leong
More informationVQ widely used in coding speech, image, and video
at Scalar quantzers are specal cases of vector quantzers (VQ): they are constraned to look at one sample at a tme (memoryless) VQ does not have such constrant better RD perfomance expected Source codng
More informationNegative Binomial Regression
STATGRAPHICS Rev. 9/16/2013 Negatve Bnomal Regresson Summary... 1 Data Input... 3 Statstcal Model... 3 Analyss Summary... 4 Analyss Optons... 7 Plot of Ftted Model... 8 Observed Versus Predcted... 10 Predctons...
More informationOdd/Even Scroll Generation with Inductorless Chua s and Wien Bridge Oscillator Circuits
Watcharn Jantanate, Peter A. Chayasena, Sarawut Sutorn Odd/Even Scroll Generaton wth Inductorless Chua s and Wen Brdge Oscllator Crcuts Watcharn Jantanate, Peter A. Chayasena, and Sarawut Sutorn * School
More informationTutorial 2. COMP4134 Biometrics Authentication. February 9, Jun Xu, Teaching Asistant
Tutoral 2 COMP434 ometrcs uthentcaton Jun Xu, Teachng sstant csjunxu@comp.polyu.edu.hk February 9, 207 Table of Contents Problems Problem : nswer the questons Problem 2: Power law functon Problem 3: Convoluton
More informationEcon107 Applied Econometrics Topic 3: Classical Model (Studenmund, Chapter 4)
I. Classcal Assumptons Econ7 Appled Econometrcs Topc 3: Classcal Model (Studenmund, Chapter 4) We have defned OLS and studed some algebrac propertes of OLS. In ths topc we wll study statstcal propertes
More informationThe L(2, 1)-Labeling on -Product of Graphs
Annals of Pure and Appled Mathematcs Vol 0, No, 05, 9-39 ISSN: 79-087X (P, 79-0888(onlne Publshed on 7 Aprl 05 wwwresearchmathscorg Annals of The L(, -Labelng on -Product of Graphs P Pradhan and Kamesh
More informationCHAPTER 5 NUMERICAL EVALUATION OF DYNAMIC RESPONSE
CHAPTER 5 NUMERICAL EVALUATION OF DYNAMIC RESPONSE Analytcal soluton s usually not possble when exctaton vares arbtrarly wth tme or f the system s nonlnear. Such problems can be solved by numercal tmesteppng
More informationGrover s Algorithm + Quantum Zeno Effect + Vaidman
Grover s Algorthm + Quantum Zeno Effect + Vadman CS 294-2 Bomb 10/12/04 Fall 2004 Lecture 11 Grover s algorthm Recall that Grover s algorthm for searchng over a space of sze wors as follows: consder the
More information2016 Wiley. Study Session 2: Ethical and Professional Standards Application
6 Wley Study Sesson : Ethcal and Professonal Standards Applcaton LESSON : CORRECTION ANALYSIS Readng 9: Correlaton and Regresson LOS 9a: Calculate and nterpret a sample covarance and a sample correlaton
More informationComparison of Wiener Filter solution by SVD with decompositions QR and QLP
Proceedngs of the 6th WSEAS Int Conf on Artfcal Intellgence, Knowledge Engneerng and Data Bases, Corfu Island, Greece, February 6-9, 007 7 Comparson of Wener Flter soluton by SVD wth decompostons QR and
More informationAn efficient algorithm for multivariate Maclaurin Newton transformation
Annales UMCS Informatca AI VIII, 2 2008) 5 14 DOI: 10.2478/v10065-008-0020-6 An effcent algorthm for multvarate Maclaurn Newton transformaton Joanna Kapusta Insttute of Mathematcs and Computer Scence,
More informationTransform Coding. Transform Coding Principle
Transform Codng Prncple of block-wse transform codng Propertes of orthonormal transforms Dscrete cosne transform (DCT) Bt allocaton for transform coeffcents Entropy codng of transform coeffcents Typcal
More informationMMA and GCMMA two methods for nonlinear optimization
MMA and GCMMA two methods for nonlnear optmzaton Krster Svanberg Optmzaton and Systems Theory, KTH, Stockholm, Sweden. krlle@math.kth.se Ths note descrbes the algorthms used n the author s 2007 mplementatons
More informationA PROBABILITY-DRIVEN SEARCH ALGORITHM FOR SOLVING MULTI-OBJECTIVE OPTIMIZATION PROBLEMS
HCMC Unversty of Pedagogy Thong Nguyen Huu et al. A PROBABILITY-DRIVEN SEARCH ALGORITHM FOR SOLVING MULTI-OBJECTIVE OPTIMIZATION PROBLEMS Thong Nguyen Huu and Hao Tran Van Department of mathematcs-nformaton,
More informationThe Study of Teaching-learning-based Optimization Algorithm
Advanced Scence and Technology Letters Vol. (AST 06), pp.05- http://dx.do.org/0.57/astl.06. The Study of Teachng-learnng-based Optmzaton Algorthm u Sun, Yan fu, Lele Kong, Haolang Q,, Helongang Insttute
More informationApplication of Nonbinary LDPC Codes for Communication over Fading Channels Using Higher Order Modulations
Applcaton of Nonbnary LDPC Codes for Communcaton over Fadng Channels Usng Hgher Order Modulatons Rong-Hu Peng and Rong-Rong Chen Department of Electrcal and Computer Engneerng Unversty of Utah Ths work
More informationOn the correction of the h-index for career length
1 On the correcton of the h-ndex for career length by L. Egghe Unverstet Hasselt (UHasselt), Campus Depenbeek, Agoralaan, B-3590 Depenbeek, Belgum 1 and Unverstet Antwerpen (UA), IBW, Stadscampus, Venusstraat
More informationAppendix B: Resampling Algorithms
407 Appendx B: Resamplng Algorthms A common problem of all partcle flters s the degeneracy of weghts, whch conssts of the unbounded ncrease of the varance of the mportance weghts ω [ ] of the partcles
More informationAN ADAPTIVE WATERMARKING ALGORITHM FOR DEM BASED ON DFT
AN ADAPTIVE WATERMARKING ALGORITHM FOR DEM BASED ON DFT Changqng Zhu 1 Zhwe Wang 2 Y Long 1 Chengsong Yang 2 1 Key Laboratory of Vrtual Geographc Envronment, Nanjng Normal Unversty, Nanjng 210054;2 Insttute
More informationComparison of Regression Lines
STATGRAPHICS Rev. 9/13/2013 Comparson of Regresson Lnes Summary... 1 Data Input... 3 Analyss Summary... 4 Plot of Ftted Model... 6 Condtonal Sums of Squares... 6 Analyss Optons... 7 Forecasts... 8 Confdence
More informationCollege of Computer & Information Science Fall 2009 Northeastern University 20 October 2009
College of Computer & Informaton Scence Fall 2009 Northeastern Unversty 20 October 2009 CS7880: Algorthmc Power Tools Scrbe: Jan Wen and Laura Poplawsk Lecture Outlne: Prmal-dual schema Network Desgn:
More informationMathematical Preparations
1 Introducton Mathematcal Preparatons The theory of relatvty was developed to explan experments whch studed the propagaton of electromagnetc radaton n movng coordnate systems. Wthn expermental error the
More informationRegularized Discriminant Analysis for Face Recognition
1 Regularzed Dscrmnant Analyss for Face Recognton Itz Pma, Mayer Aladem Department of Electrcal and Computer Engneerng, Ben-Guron Unversty of the Negev P.O.Box 653, Beer-Sheva, 845, Israel. Abstract Ths
More information5 The Rational Canonical Form
5 The Ratonal Canoncal Form Here p s a monc rreducble factor of the mnmum polynomal m T and s not necessarly of degree one Let F p denote the feld constructed earler n the course, consstng of all matrces
More informationCHAPTER-5 INFORMATION MEASURE OF FUZZY MATRIX AND FUZZY BINARY RELATION
CAPTER- INFORMATION MEASURE OF FUZZY MATRI AN FUZZY BINARY RELATION Introducton The basc concept of the fuzz matr theor s ver smple and can be appled to socal and natural stuatons A branch of fuzz matr
More informationHiding data in images by simple LSB substitution
Pattern Recognton 37 (004) 469 474 www.elsever.com/locate/patcog Hdng data n mages by smple LSB substtuton Ch-Kwong Chan, L.M. Cheng Department of Computer Engneerng and Informaton Technology, Cty Unversty
More informationDifference Equations
Dfference Equatons c Jan Vrbk 1 Bascs Suppose a sequence of numbers, say a 0,a 1,a,a 3,... s defned by a certan general relatonshp between, say, three consecutve values of the sequence, e.g. a + +3a +1
More informationReal-Time Systems. Multiprocessor scheduling. Multiprocessor scheduling. Multiprocessor scheduling
Real-Tme Systems Multprocessor schedulng Specfcaton Implementaton Verfcaton Multprocessor schedulng -- -- Global schedulng How are tasks assgned to processors? Statc assgnment The processor(s) used for
More informationExponential Type Product Estimator for Finite Population Mean with Information on Auxiliary Attribute
Avalable at http://pvamu.edu/aam Appl. Appl. Math. ISSN: 193-9466 Vol. 10, Issue 1 (June 015), pp. 106-113 Applcatons and Appled Mathematcs: An Internatonal Journal (AAM) Exponental Tpe Product Estmator
More information8.4 COMPLEX VECTOR SPACES AND INNER PRODUCTS
SECTION 8.4 COMPLEX VECTOR SPACES AND INNER PRODUCTS 493 8.4 COMPLEX VECTOR SPACES AND INNER PRODUCTS All the vector spaces you have studed thus far n the text are real vector spaces because the scalars
More informationCOMPLEX NUMBERS AND QUADRATIC EQUATIONS
COMPLEX NUMBERS AND QUADRATIC EQUATIONS INTRODUCTION We know that x 0 for all x R e the square of a real number (whether postve, negatve or ero) s non-negatve Hence the equatons x, x, x + 7 0 etc are not
More informationAnnexes. EC.1. Cycle-base move illustration. EC.2. Problem Instances
ec Annexes Ths Annex frst llustrates a cycle-based move n the dynamc-block generaton tabu search. It then dsplays the characterstcs of the nstance sets, followed by detaled results of the parametercalbraton
More informationAPPENDIX A Some Linear Algebra
APPENDIX A Some Lnear Algebra The collecton of m, n matrces A.1 Matrces a 1,1,..., a 1,n A = a m,1,..., a m,n wth real elements a,j s denoted by R m,n. If n = 1 then A s called a column vector. Smlarly,
More informationGeneral theory of fuzzy connectedness segmentations: reconciliation of two tracks of FC theory
General theory of fuzzy connectedness segmentatons: reconclaton of two tracks of FC theory Krzysztof Chrs Ceselsk Department of Mathematcs, West Vrgna Unversty and MIPG, Department of Radology, Unversty
More informationLOW BIAS INTEGRATED PATH ESTIMATORS. James M. Calvin
Proceedngs of the 007 Wnter Smulaton Conference S G Henderson, B Bller, M-H Hseh, J Shortle, J D Tew, and R R Barton, eds LOW BIAS INTEGRATED PATH ESTIMATORS James M Calvn Department of Computer Scence
More informationLINEAR REGRESSION ANALYSIS. MODULE IX Lecture Multicollinearity
LINEAR REGRESSION ANALYSIS MODULE IX Lecture - 30 Multcollnearty Dr. Shalabh Department of Mathematcs and Statstcs Indan Insttute of Technology Kanpur 2 Remedes for multcollnearty Varous technques have
More informationThe equation of motion of a dynamical system is given by a set of differential equations. That is (1)
Dynamcal Systems Many engneerng and natural systems are dynamcal systems. For example a pendulum s a dynamcal system. State l The state of the dynamcal system specfes t condtons. For a pendulum n the absence
More informationA Hybrid Variational Iteration Method for Blasius Equation
Avalable at http://pvamu.edu/aam Appl. Appl. Math. ISSN: 1932-9466 Vol. 10, Issue 1 (June 2015), pp. 223-229 Applcatons and Appled Mathematcs: An Internatonal Journal (AAM) A Hybrd Varatonal Iteraton Method
More informationPsychology 282 Lecture #24 Outline Regression Diagnostics: Outliers
Psychology 282 Lecture #24 Outlne Regresson Dagnostcs: Outlers In an earler lecture we studed the statstcal assumptons underlyng the regresson model, ncludng the followng ponts: Formal statement of assumptons.
More informationThe lower and upper bounds on Perron root of nonnegative irreducible matrices
Journal of Computatonal Appled Mathematcs 217 (2008) 259 267 wwwelsevercom/locate/cam The lower upper bounds on Perron root of nonnegatve rreducble matrces Guang-Xn Huang a,, Feng Yn b,keguo a a College
More informationNumerical Heat and Mass Transfer
Master degree n Mechancal Engneerng Numercal Heat and Mass Transfer 06-Fnte-Dfference Method (One-dmensonal, steady state heat conducton) Fausto Arpno f.arpno@uncas.t Introducton Why we use models and
More informationISSN: ISO 9001:2008 Certified International Journal of Engineering and Innovative Technology (IJEIT) Volume 3, Issue 1, July 2013
ISSN: 2277-375 Constructon of Trend Free Run Orders for Orthogonal rrays Usng Codes bstract: Sometmes when the expermental runs are carred out n a tme order sequence, the response can depend on the run
More informationGEMINI GEneric Multimedia INdexIng
GEMINI GEnerc Multmeda INdexIng Last lecture, LSH http://www.mt.edu/~andon/lsh/ Is there another possble soluton? Do we need to perform ANN? 1 GEnerc Multmeda INdexIng dstance measure Sub-pattern Match
More informationChapter 3 Describing Data Using Numerical Measures
Chapter 3 Student Lecture Notes 3-1 Chapter 3 Descrbng Data Usng Numercal Measures Fall 2006 Fundamentals of Busness Statstcs 1 Chapter Goals To establsh the usefulness of summary measures of data. The
More informationNovel Pre-Compression Rate-Distortion Optimization Algorithm for JPEG 2000
Novel Pre-Compresson Rate-Dstorton Optmzaton Algorthm for JPEG 2000 Yu-We Chang, Hung-Ch Fang, Chung-Jr Lan, and Lang-Gee Chen DSP/IC Desgn Laboratory, Graduate Insttute of Electroncs Engneerng Natonal
More informationCOMPUTATIONALLY EFFICIENT WAVELET AFFINE INVARIANT FUNCTIONS FOR SHAPE RECOGNITION. Erdem Bala, Dept. of Electrical and Computer Engineering,
COMPUTATIONALLY EFFICIENT WAVELET AFFINE INVARIANT FUNCTIONS FOR SHAPE RECOGNITION Erdem Bala, Dept. of Electrcal and Computer Engneerng, Unversty of Delaware, 40 Evans Hall, Newar, DE, 976 A. Ens Cetn,
More informationDesign and Optimization of Fuzzy Controller for Inverse Pendulum System Using Genetic Algorithm
Desgn and Optmzaton of Fuzzy Controller for Inverse Pendulum System Usng Genetc Algorthm H. Mehraban A. Ashoor Unversty of Tehran Unversty of Tehran h.mehraban@ece.ut.ac.r a.ashoor@ece.ut.ac.r Abstract:
More informationarxiv:cs.cv/ Jun 2000
Correlaton over Decomposed Sgnals: A Non-Lnear Approach to Fast and Effectve Sequences Comparson Lucano da Fontoura Costa arxv:cs.cv/0006040 28 Jun 2000 Cybernetc Vson Research Group IFSC Unversty of São
More informationChapter 13: Multiple Regression
Chapter 13: Multple Regresson 13.1 Developng the multple-regresson Model The general model can be descrbed as: It smplfes for two ndependent varables: The sample ft parameter b 0, b 1, and b are used to
More informationGeneral viscosity iterative method for a sequence of quasi-nonexpansive mappings
Avalable onlne at www.tjnsa.com J. Nonlnear Sc. Appl. 9 (2016), 5672 5682 Research Artcle General vscosty teratve method for a sequence of quas-nonexpansve mappngs Cuje Zhang, Ynan Wang College of Scence,
More informationU.C. Berkeley CS294: Spectral Methods and Expanders Handout 8 Luca Trevisan February 17, 2016
U.C. Berkeley CS94: Spectral Methods and Expanders Handout 8 Luca Trevsan February 7, 06 Lecture 8: Spectral Algorthms Wrap-up In whch we talk about even more generalzatons of Cheeger s nequaltes, and
More informationLecture 5 Decoding Binary BCH Codes
Lecture 5 Decodng Bnary BCH Codes In ths class, we wll ntroduce dfferent methods for decodng BCH codes 51 Decodng the [15, 7, 5] 2 -BCH Code Consder the [15, 7, 5] 2 -code C we ntroduced n the last lecture
More informationSalmon: Lectures on partial differential equations. Consider the general linear, second-order PDE in the form. ,x 2
Salmon: Lectures on partal dfferental equatons 5. Classfcaton of second-order equatons There are general methods for classfyng hgher-order partal dfferental equatons. One s very general (applyng even to
More informationMultiple Sound Source Location in 3D Space with a Synchronized Neural System
Multple Sound Source Locaton n D Space wth a Synchronzed Neural System Yum Takzawa and Atsush Fukasawa Insttute of Statstcal Mathematcs Research Organzaton of Informaton and Systems 0- Mdor-cho, Tachkawa,
More informationFFT Based Spectrum Analysis of Three Phase Signals in Park (d-q) Plane
Proceedngs of the 00 Internatonal Conference on Industral Engneerng and Operatons Management Dhaka, Bangladesh, January 9 0, 00 FFT Based Spectrum Analyss of Three Phase Sgnals n Park (d-q) Plane Anuradha
More informationFor now, let us focus on a specific model of neurons. These are simplified from reality but can achieve remarkable results.
Neural Networks : Dervaton compled by Alvn Wan from Professor Jtendra Malk s lecture Ths type of computaton s called deep learnng and s the most popular method for many problems, such as computer vson
More informationUsing T.O.M to Estimate Parameter of distributions that have not Single Exponential Family
IOSR Journal of Mathematcs IOSR-JM) ISSN: 2278-5728. Volume 3, Issue 3 Sep-Oct. 202), PP 44-48 www.osrjournals.org Usng T.O.M to Estmate Parameter of dstrbutons that have not Sngle Exponental Famly Jubran
More informationFeb 14: Spatial analysis of data fields
Feb 4: Spatal analyss of data felds Mappng rregularly sampled data onto a regular grd Many analyss technques for geophyscal data requre the data be located at regular ntervals n space and/or tme. hs s
More informationInductance Calculation for Conductors of Arbitrary Shape
CRYO/02/028 Aprl 5, 2002 Inductance Calculaton for Conductors of Arbtrary Shape L. Bottura Dstrbuton: Internal Summary In ths note we descrbe a method for the numercal calculaton of nductances among conductors
More informationImproved Lossless Data Hiding for JPEG Images Based on Histogram Modification
Copyrght 2018 Tech Scence Press CMC, vol.55, no.3, pp.495-507, 2018 Improved Lossless Data Hdng for JPEG Images Based on Hstogram Modfcaton Yang Du 1, Zhaoxa Yn 1, 2, * and Xnpeng Zhang 3 Abstract: Ths
More informationAn Improved multiple fractal algorithm
Advanced Scence and Technology Letters Vol.31 (MulGraB 213), pp.184-188 http://dx.do.org/1.1427/astl.213.31.41 An Improved multple fractal algorthm Yun Ln, Xaochu Xu, Jnfeng Pang College of Informaton
More informationCHAPTER IV RESEARCH FINDING AND DISCUSSIONS
CHAPTER IV RESEARCH FINDING AND DISCUSSIONS A. Descrpton of Research Fndng. The Implementaton of Learnng Havng ganed the whole needed data, the researcher then dd analyss whch refers to the statstcal data
More information