WATERMARKING BASED ON THE HYPERANALYTIC WAVELET TRANSFORM

Size: px
Start display at page:

Download "WATERMARKING BASED ON THE HYPERANALYTIC WAVELET TRANSFORM"

Transcription

1 Voume 49, Number, 8 Eectronics and Teecommunications WATERMARKING BASED ON THE HYPERANALYTIC WAVELET TRANSFORM Corina NAFORNITA Aeandru ISAR Eectronics and Communications Facuty, Poitehnica University, Bd. V. Parvan, Timisoara, 45647, (corina.nafornita, aeandru.isar)@etc.upt.ro Abstract: In this paper we present a new technique for watermarking in the hyperanaytic waveet domain. This has the advantage of better directiona seectivity and shift invariance compared to the cassica waveet fiter. The watermark is inserted into a eves of decomposition using a perceptua mask conceived by the authors. We compare this technique with two systems in the DWT domain, and show its superiority. We study the resistance of the three watermarking systems against various signa processing attacks. A three methods successfuy detect the watermark. This eads to the concusion that the Hyperanaytic Waveet Transform (HWT) increases the payoad and robustness. Key words: HWT, watermarking, perceptua mask, capacity. I. INTRODUCTION The idea of digita watermarking has been proposed as a means to protect the copyright of digita images. The majority of watermarking agorithms operate based on the spread spectrum (SS) communication principe. A pseudorandom sequence is added to the host image in some criticay samped domain and the watermarked image is obtained by inverse transforming the modified image coefficients. Typica transform domains are the Discrete Waveet Transform (DWT), the Discrete Cosine Transform (DCT) and the Discrete Fourier Transform (DFT). Numerous Waveet Transforms (WTs) can be used to embed the watermark. The first one was the DWT, [1]. The DWT based agorithms usuay produce watermarked images with the best baance between visua quaity and robustness due to the absence of bocking artifacts. It has three main disadvantages, []: ack of shift invariance, ack of symmetry of the mother waveets and poor directiona seectivity. Due to the poor directiona seectivity for diagona features of the DWT the watermarking capacity is sma. The most important parameters of a watermarking system are robustness against attacks and capacity. These parameters must be maimized. The DWT s disadvantages can be diminished using a compe waveet transform [, ]. In this paper, we present a new technique based on a simpe impementation of the HWT, and compare its performance with two DWT based methods. We study the resistance of the three mutiresoution framework watermarking systems against various signa processing attacks. The paper is organized as foows. In the net two sections are described the HWT impementation and the proposed watermarking system. Net section is dedicated to simuation resuts and finay some remarks are drawn. II. THE HWT IMPLEMENTATION If the function ψ is a mother waveets then the functions jh{ψ} and ψ a ψ+ jh{ψ} are aso mother waveets, where H is the Hibert transform. This waveet pair (ψ, jh{ψ}) defines a compe discrete waveet transform (CDWT). A compe waveet coefficient is obtained by interpreting the waveet coefficient from one DWT tree as its rea part, whereas the corresponding coefficient from the other tree is imaginary part. The dua tree compe waveet transform (DTCWT) [] is a quadrature pair of DWT trees, simiar to the CDWT. The DTCWT coefficients may be interpreted as arising from the DWT associated with a quasi-anaytic waveet. Both DTCWT and CDWT are invertibe and quasi shift-invariant; however the design of these quadrature waveet pairs is quite compicated and it can ony be done through approimations. In the new impementation of the HWT we first appy a Hibert transform to the data. The rea waveet transform is then appied to the anaytica signa associated to the input data, obtaining compe coefficients. The two impementations of the CDWT are equivaent: d m, n t, ψ t + ih ψ t { } [ ] ( ) m, n ( ) m, n ( ) ( t), ψ m, n ( t) i ( t), H{ ψ m, n ( t) } ( t), ψ m, n ( t) + i H{ ( t) }, ψ m, n ( t) ( t) + ih{ ( t) }, ψ ( t) d [ m, n] DTCWT m, n HWT In the foowing we wi use the definition of the anaytic signa associated to a D rea signa named hyper-compe signa. So, the hyper-compe mother waveet associated to (1) Manuscript received September 1, 8; revised October 5, 8 1

2 Voume 49, Number, 8 Eectronics and Teecommunications the rea mother waveet (, ψ a (, ψ(, + ih (, + + jh (, + kh H { ψ(, } y ψ is defined as: { } y () where i j k and ij ji k, [7]. The HWT of the image f (, is: HWT{ f (, } f (,, ψ (,. () Taking into account reation () it can be written: a HWT + jdwt f a { f (, } DWT{ f (, } + idwt { H { f (, } { H y { f (, } + kdwt { H y { H { f (, } (,, ψ(, DWT{ f (, }. The D-HWT of the image ( a (4) f, can be computed with the aid of the D-DWT of its associated hyper-compe image. The new HWT impementation, [6, 8] (fig. 1), uses four trees, each one impementing a D-DWT. The first tree is appied to the input image. The second and the third trees are appied to 1D discrete Hibert transforms computed across the ines ( H ) or coumns ( H y ) of the input image. The fourth tree is appied to the resut obtained after the computation of the two 1D discrete Hibert transforms of the input image. The enhancement of the directiona seectivity of the D-HWT is reaized as in the case of the D- DTCWT, [, 4], by inear combinations of detai Figure 1. The new D-HWT impementation architecture. coefficients beonging to each subband of each of the four D-DWTs. The HWT detai images are oriented foowing the directions: ± atan(1/), ± π/4 and ± atan(). For eampe, this new impementation makes the difference between the two principa diagonas or between the directions ± atan(1/) whereas the DWT cannot make such differences. The coefficients z + r and z r are used in the foowing simuations for the watermark embedding. A possibe representation of the HWT s organization based on these two types of coefficients that highights the anges aready mentioned, for the first decomposition eve is given in Fig.a). This structure corresponds to the eampe in Fig.b), where the coefficients z + r and z r of the HWT Figure a. Representation of the rea coefficients in which the watermark is embedded (detai sub-images on. Figure b. An eampe for the representation in fig. a) in the case of test image Lena, for three eves of decomposition.

3 Voume 49, Number, 8 Eectronics and Teecommunications of the image Lena are represented. It must be mentioned that the sub-images corresponding to the category of coefficients z were horizontay mirrored. r III. WATERMARKING BASED ON THE NEW IMPLEMENTATION OF THE HWT The watermark capacity was studied in [9] where an information-theoretic mode for image watermarking and data hiding is presented. The ack of shift invariance of the DWT and its poor directiona seectivity are reasons to embed the watermark in the fied of another WT. To maimize the robustness and the capacity, the roe of the redundancy of the transform used must be highighted first. An eampe of redundant WT is represented by the tight frame decomposition. In [1] are anayzed the watermarking systems based on tight frame decompositions. The anaysis indicates that a tight frame offers no inherent performance advantage over an orthonorma transform (DWT) in the watermark detection process. This anaytica observation shoud be tempered with the fact that spread-spectrum watermarking is often depoyed in conjunction with an image-adaptive weighting mask to take into account the human visua system (HVS) and to improve perceptua performance. Another redundant WT, the DT-CWT, was aready used for watermarking, [11]. The authors of this paper prove that the capacity of a watermarking system based on a compe waveet transform is higher than the capacity of a simiar system that embeds the watermark in the DWT domain. Many authors (e.g. Daugman [1]) have suggested that the processing of visua data inside our visua corte resembes fitering by an array of Gabor fiters of different orientations and scaes. We have aready proved that the proposed impementation of HWT is efficient, has ony a modest amount of redundancy, it provides approimate shift invariance, it has better directiona seectivity than the D DWT and it can be observed that the corresponding basis functions cosey approimate the Gabor functions. So, the spread spectrum watermarking based on the use of an image adaptive weighting mask appied in the D-HWT domain is potentiay a robust soution that increases the capacity. We propose the embedding of the watermark in the images z +r and z -r, using a perceptua mask; whie the bind detection is made on the coupe (z +r, z -r ). This approach is compared with the cassica approach in the DWT domain, from Barni s method [1] and the method proposed in [14]. Perceptua Watermarks Embedded in the DWT Domain One of the quaities required to a watermark is its imperceptibiity. This can be achieved by embedding the watermark in coefficients of known robustness (usuay arge coefficients) or perceptuay significant regions, i.e. contours and tetures of an image. This can be done empiricay, seecting arger coefficients or using a threshoding scheme in the transform domain [16, 17]. Another approach is to insert the watermark in a coefficients of a transform, using a variabe strength for each coefficient [1, 14]. Hybrid techniques, based on compression schemes, embed the watermark using a threshoding scheme and variabe strength [16]. Specificay we wi ony refer to the techniques presented in [1] and [14]. The watermark is masked according to the characteristics of the HVS, taking into account the teture and the uminance content of a the image subbands [1, 14]. For coefficients corresponding to contours of the image a higher strength is used, for tetures a medium strength is used and for regions with high reguarity a ower strength is used, in accordance with the anaogy water-fiing and watermarking proposed by Kundur in [15]. Barni s method [1] is quite robust against common signa processing attacks ike fitering, compression, cropping etc. However, because embedding is made ony in the highest resoution eve, the watermark information can be easiy erased by a potentia attacker. In [14], a new piewise mask was used in the DWT domain that modes the HVS behavior in a better way thus aowing embedding of the watermark in a resoution eves, ecept the ast one. At the detection, since the threshod is image dependent, the ratio between correation and threshod was used; hence the detection function becomes noninear with a fied detection threshod. Three types of detectors are being used, to take advantage of the waveet hierarchica decomposition. The watermark presence is detected 1) from a resoution eves, ) separatey, considering the maimum detector response from each eve and ) separatey, considering the maimum detector response from each subband. Evauating correations separatey per resoution eve or subband is sometimes advantageous. Layers or subbands with ower detector responses are discarded. This type of embedding combined with new detectors is more attack resiient to a possibe erasure of the three subbands. At the embedding process [1], the image I, of size M N, is decomposed into four eves using Daubechies-6 waveet mother, where I is the subband from eve {,1,,}, and orientation {,1,,} (corresponding to horizonta, diagona and vertica detai subbands, and approimation subband). A binary watermark j is embedded in a coefficients from the subbands from eve by addition: I I + αw, (5) where α is the embedding strength and w ( a weighting function. The mask (or equivaenty the weighting function) is buit pie by pie, and it gives the maimum amount of modifications that can be appied to the corresponding DWT coefficient in the detai band without compromising watermark invisibiity. This weighting function is a haf of the quantization step, which is computed in [1] as the product of three factors: q. Θ(, ) Λ(, Ξ(,, (6)

4 Voume 49, Number, 8 Eectronics and Teecommunications and the embedding takes pace ony in the first eve of decomposition, for. The first factor is the sensitivity to noise depending on the orientation and on the eve of detai: 1, 1. 1 Θ (, ) 1, otherwise.16.1 The second factor takes into account the oca brightness based on the gray eve vaues of the ow pass version of the image: where: and: L (, 1+ L' (,, (7) Λ (8) L(,, L(, (,, 1 <.5 L '(, (9) L otherwise 1 ( I ( 1+ i /,1 + j / ), (1) 56 The integer part operator from the right hand side is used to I modify the size of the image in accordance with the requirements of the previous decomposition eves. It produces an interpoation of the initia image by mutipe repetitions of each row and coumn. The third factor is computed as foows: Ξ (, Var I 1 1 k 16 I k y i 1+ y + k + j,1 + + i y + k, y,1 j, + k subimage from eve, denoted S. Normaization is aso required since the teture vaues obtained are too high. This is normaized to the oca mean, aso compressed in the waveet domain, U. Ξ S 1 k k k (, 16 [ I ( y + i /, + j / )] k, y / U k + (1) The second difference between [1] and [14] is that the uminance mask is computed on the approimation image from eve, where the watermark is embedded. The DWT of the origina image using decomposition eves was computed and the approimation sub-image corresponding at eve was separated, obtaining the image I. Reation (1) was repaced in [14] by: L (, I / 56. (1) Since both factors aready described are more dependent on the resoution eve in the method proposed in [14], the noise sensitivity function is aso repaced by: { }, 1 1,,1 Θ (, ) 1, otherwise.66, (14) In [1], detection is made using the correation between the marked DWT coefficients and the watermarking sequence to be tested for presence, for eve : ρ M / 1 N / 1 4 MN ( ) I i j (15) (11) and it gives a measure of teture activity in the neighborhood of the pie. This factor is composed by the product of two contributions; the first is the oca mean square vaue of the DWT coefficients in a detai subbands, whie the second is the oca variance of the ow-pass subband. Both these contributions are computed in a sma neighborhood corresponding to the ocation ( of the pie. The first contribution is the distance from the edges, whereas the second one the teture. This oca variance estimation is not so precise, because it is computed with a ow resoution. In [14], the second factor from Eq. (11) is repaced by the oca standard deviation of the image, computed on a window of 7 7, which has a higher resoution. This is compressed in the waveet domain to have the same size as the subband where the watermark is to be inserted. The required mask wi be the approimation 4 The correation is compared to a threshod T ρ(), computed to grant a given probabiity of fase positive detection, using the Neyman-Pearson criterion. For eampe, if P f 1-8, the threshod is Tρ( ).97 σρ( ), with σ ρ ( ) the variance of the waveet coefficients, if the image was watermarked with a code Y other than X: σ ρ 4 MN M / 1 N / 1 ( ) ( ) I i j. (16) In [14] was considered the ratio between the correation ρ() in Eq. (16) and the image dependent threshod T ρ(), hence the detector was viewed as a noninear function with a fied threshod. Three detectors are being used. The first detector evauates the watermark s presence on a resoution eves: d ρ d T (17) 1 1 / d1

5 Voume 49, Number, 8 Eectronics and Teecommunications where the correation ρ d1 is given by: ρ M / 1 N / 1 1 d1 I,, i j MN The threshod for P f 1-8 is T σ 4 d1 ( i ρd1.97 σ, with: M / 1 N / 1 1 ρd 1,, j MN 4 ( I ( i ) (18) (19) The second detector considers the responses from different eves, as d()ρ()/t ρ(), with {,1,}, and discards the detector responses with ower vaues: { d( ) } d ma () The third detector considers the responses from different subbands and eves, as d(,) ρ(,)/t(,), with, {,1,}, and discards the detector responses with ower vaues: d ma d, (1) { ( )}, where ρ(,) and T(,) are the correations and threshods for each subband. For P f 1-8, the threshod is T (, ).97 σρ(, ) ρ(, ) coefficients from the subband (,): and:, with σ the variance of waveet M / 1 N / 1 ρ () (, ) 4 I /( MN ) i j ( ) ( MN ) M / 1 N / 1, / ( ) 16 σ ρ i j I () Perceptua Watermarks Embedded in the HWT Domain Adapting the strategy aready described in the previous paragraph to the case of HWT, we have decided to use the first three waveet decomposition eves. We have embedded the watermark into the coefficients z + r and z r. In this case the reations aready described in the previous paragraph were used independenty for each of these two images. The same message was embedded in both images, using the mask from [14]. The difference is that the orientations or preferentia directions are in this case: atan(1/), π/4, atan() (respectivey for,1,), for the image z + and -atan(1/), -π/4, -atan(), (,1,) for the r image z r. At the detection side, we consider the pair of images ( z + r, z r ), thus having twice as much coefficients than the standard approach, and takes a the possibe vaues, ± atan(1/), ± π/4, ± atan(). IV. SIMULATION RESULTS Some simuation resuts, obtained using the image Lena, of size 5151, are reported in the foowing. For α 1.5, and a watermark inserted in a eves:, 1 and, the image watermarked in the HWT domain has a peak signa-to-noise ratio (PSNR) of 5.6 db, and a weighted PSNR of 5 db (see tabe 1). The peak signa-to-noise ratio, PSNR is defined as: 55 ( ) ( ) PSNR I, I 1og1 [db], 1 i I i Ii N where I is the host signa, I % is the watermarked signa, i is the particuar pie position, and N is the number of pies in I or I %. Another measure is the weighted PSNR (WPSNR); where weighting is performed according to the contrast sensitivity function, CSF, of vision as defined in [18]. The origina image, the corresponding watermarked image and the difference image are presented in Figure. We have eposed our watermarked images at some common attacks: JPEG compression with different quaity factors (Q), shifting, median fitering with different window sizes WS, resizing with different scae factors, cropping with different areas remaining, gamma correction with different vaues of γ, burring with a specified point spread function (PSF) and perturbation with AWGN with different variances and we have studied the robustness of the new watermarking method. The PSF is specified with the aid of two parameters: ength L and ange β. Resistance to unintentiona attacks, for watermarked image Lena, for our new method, can be compared to the resuts obtained using the watermarking methods reported in [1] and [14] anayzing tabe. In the simuation corresponding to the watermarking method proposed in [14], we use the same watermark strength, 1.5 and we embed the watermark in a three waveet decomposition eves, resuting in a PSNR of 6.86 db and a weighted PSNR of 5. db. For the simuation corresponding to the watermarking method proposed in [1], we use the watermark strength. and the embedding is made ony in the first resoution eve, resuting in a simiar quaity of the images in terms of cassica PSNR vaue (PSNR6.9 db, weighted PSNR. db). Specia attention was paid to the shifting attack. First the watermarked image was circuary shifted with i ines and co coumns, obtaining the attacked image ( I t ). Supposing that the numbers i and co are known, the messages at eve are circuary shifted with i/ ines and co/ coumns obtaining the new messages ( ) t. Net the 5

6 Voume 49, Number, 8 Eectronics and Teecommunications watermark was detected using the image ( I ) t and the messages ( ) t. The vaues obtained for i18 and co18 are presented in tabe. The robustness of the watermarking method against the shifting attack is given by two properties: the shift invariance degree of the WT used and the masking abiity. Anayzing tabe, the abiity of masking seems to be more important than the shift invariance degree of the WT used for the conception of counter-measures against the shifting attack, when the numbers of ines and coumns used for the attack are aready known. Finay, we have submitted the watermarked images to the recenty proposed oca desynchronization attack (DA), namey the oca permutation with canceation and dupication (LPCD) DAs [5]. The parameters used in the attack were the ones that visuay damage the image ess indicated by the authors, N5 and L6. The watermark is successfuy detected each time, for each method. Two eampes for the attack corresponding at the ast ine in tabe are presented in figures 4, 5 and 6. From the resuts, it is cear that embedding in the rea parts of the HWT transform yieds in a higher capacity at the same visua impact and robustness. In fact the resuts obtained for the new method are sighty better than the resuts obtained with the methods described in [1] and [14] for JPEG compression, median fitering with WS, resizing and gamma correction. For the other attacks the resuts, obtained using the new method, are simiar with the resuts of the watermarking methods based on DWT. Tabe 1. Comparison of invisibiity for the proposed method and the methods [1], [14]. Measure of Method Barni s Proposed invisibiity vs. methods proposed in [14] method [1] HWT method PSNR 6.86 db 6.9 db 5.6 db Weighted PSNR 5. db. db 5. db Figure. Origina (eft) and watermarked (midde) images with the new method, for α 1.5, PSNR5.6 db; (right) Difference image, ampified 8 times. Tabe. Comparison of robustness for different attacks. The HWT method proposed here, as we as the traditiona approaches from [1] and [14] are compared. Attacks vs. detector response A eves Method proposed in [14] ma eve Ma subband Barni s method [1] a eves Proposed HWT method ma eve ma subband Before attack JPEG, Q JPEG, Q JPEG, Q Shift, i18, co Median fitering, WS Median fitering, WS Resizing, Resizing, Cropping, Cropping, Cropping, Gamma correct., γ Gamma correct., γ Bur, L1, β LPCD attack, N5,L

7 Voume 49, Number, 8 Eectronics and Teecommunications Figure 4: (eft): Watermarked image for the method in [14], having a PSNR6.86 db and a weighted PSNR5. db compared to the origina Lena, (midde): Distorted watermarked with the LPCD attack N5 and L6 with PSNR9. db, weighted PSNR8.41 db. (right): Difference between the two images, magnified 1 times. Figure 5: (eft): Watermarked image for Barni s method [1], having a PSNR6.9 db and a weighted PSNR. db compared to the origina Lena, (midde): Distorted watermarked with the LPCD attack N5 and L6 with PSNR.68 db, weighted PSNR.8 db. (right): Difference between the two images, magnified 1 times. Figure 6: (eft): Watermarked image for the HWT based method, having a PSNR5.6 db and a weighted PSNR5 db compared to the origina Lena, (midde): Distorted watermarked with the LPCD attack N5 and L6 with PSNR8.16 db, weighted PSNR7.87 db, (right): Difference between the two images, magnified 1 times. V. CONCLUSION The HWT is a very modern WT as it has been formaized ony two years ago. In this paper we have used a very simpe impementation of this transform, which permits the epoitation of the mathematica resuts and of the agorithms previousy obtained in the evoution of waveets theory. It does not require the construction of any specia waveet fiter. It has a very feibe structure, as we can use any orthogona or bi-orthogona rea mother waveets for the computation of the HWT. The proposed impementation eads to both a high degree of shift-invariance and to an enhanced directiona seectivity in the D case. We have proposed a new type of pie-wise masking for robust image watermarking in the HWT domain. Modifications were made to two eisting watermarking techniques proposed in [1] and in [14], based on DWT. These techniques were seected for their good robustness 7 against the usua attacks. In fact, to be efficient, an attack must aso be transparent. The majority of the attacks presented in tabe are more severe, their parameters seection was made to highight the great robustness of the anayzed watermarking systems. The method proposed in [14] was inspired by the method proposed in [1], but it contains some modifications. The first modification is in computing the estimate of the variance, which gives a better measure of the teture activity. An improvement is aso owed to the use of a better uminance mask. The third improvement proposed in [14] is to embed the watermark in the detai coefficients at a resoutions, ecept the coarsest eve; this can be particuary usefu against erasure of high frequency subbands containing the mark in the watermarking system proposed in [1]. A noninear detector with fied threshod as ratio between correation and the image dependent threshod-has been conceived. Using it,

8 Voume 49, Number, 8 Eectronics and Teecommunications three watermark detectors were derived in [14]: 1) from a resoution eves, ) separatey, considering the maimum detector response for each eve and ) separatey, considering the maimum detector response for each subband. We have transformed here, a these usefu modifications proposed in [14], for the case of the HWT. A new embedding mechanism specific for this transform is proposed, epoiting the coefficients z + r and z r. The simuation resuts presented in this paper iustrate the effectiveness of the proposed agorithm. We tested the robustness of our method against a great diversity of attacks (with different parameters), and found out that it is very good being simiar or better than the robustness of the methods described in [1] and [14] in the case of the image Lena. Our watermarking method has superior capacity than the method proposed in [1] and even [14]. Of course, we wi repeat in the future these eperiments on an entire image database (ike for eampe that used in [14]), to statisticay vaidate the resuts obtained using the image Lena. There are good reasons to beieve that these resuts wi be good enough taking into account the high variabiity into different regions of this prototype image. Another future research direction is the anaysis of the new watermark detectors proposed in [14] and appied here in the fied of HWT. The anaysis of tabe shows, from the detectors point of view, an important difference between the DWT and the HWT. In the DWT domain the best is the ma subband detector whie in the HWT domain the best is the ma eve detector. The theoretica anaysis of those detectors seems to be very chaenging. The goa is to find the most robust detector that coud be based on a combination of a those detectors. Other embedding mechanisms can aso be conceived. Anayzing figure it can be observed that the coefficients z + i and z i are not epoited yet. So, the redundancy of the embedding can be increased epoiting the quaternions ( z+ r, z r, z+ i, z i ). Another embedding mechanism can use compe images of the form z + z+ r + jz+ i or z z r + jz i. The watermark can be embedded in the absoute vaue or in the phase of those images. We have aready tried the embedding in the absoute vaues, [19], obtaining simiar resuts with those presented in this paper. The observation that most of the information contained into a compe image is carried by its phase component can be taken into account in the future. REFERENCES [1] D. L. Donoho, I. M. Johnstone, Idea spatia adaptation by waveet shrinkage, Biometrika, 81() : , [] N. Kingsbury, Compe Waveets for Shift Invariant Anaysis and Fitering of Signas, Appied and Comp. Harm. Ana. 1, 1, 4-5. [] N. G. Kingsbury, A Dua-Tree Compe Waveet Transform with improved orthogonaity and symmetry properties, Proc. IEEE Conf. on Image Processing, Vancouver,, paper 149. [4] I. W. Seesnick, R. G. Baraniuk, and N. G. Kingsbury, The dua-tree compe waveet transform, IEEE Signa Processing Magazine, vo. (6), 5, [5] Angea D'Angeo, Mauro Barn and Neri Merhav, Stochastic Image Warping for Improved Watermark Desynchronization, EURASIP Journa on Information Security, vo. 8, Artice ID 45184, 14 pages, 8. [6] I. Adam, C. Nafornita, J-M Boucher, A. Isar, A New Impementation of the Hyperanaytic Waveet Transform, Proc. of IEEE Symposium ISSCS 7, Ias Romania, 7, [7] C. Davenport, Commutative Hypercompe Mathematics, [8] I. Adam, C. Nafornita, J-M Boucher and A. Isar, A Bayesian Approach of Hyperanaytic Waveet Transform Based Denoising, Proc. IEEE Internationa Conference WISP 7, Acaa de Henares, Spain, 7, 7-4. [9] Pierre Mouin and M. Kivanc Mihcak, A Framework for Evauating the Data-Hiding Capacity of Image Sources, IEEE Trans. Image Processing, 11(9),, [1] Li Hua and James E. Fower, A Performance Anaysis of Spread-Spectrum Watermarking Based on Redundant Transforms, Proc. IEEE Int. Conf. on Mutimedia and Epo, Lausanne, Switzerand,, vo., [11] Patrick Loo, Nick Kingsbury, Digita Watermarking Using Compe Waveets, ICIP. [1] J. Daugman, Two-dimensiona spectra anaysis of cortica receptive fied profies, Vision Res.,, 8, [1] M. Barn F. Bartoini and A. Piva, Improved waveetbased watermarking through pie-wise masking, IEEE Trans. Image Processing, 1, 1, [14] C. Nafornita, A New Pie-Wise Mask for Watermarking, Proc. ACM Mutimedia and Security MM&Sec, Daas, Sept 7, 1-8. [15] D. Kundur, Water-fiing for Watermarking? Proc. IEEE Int. Conf. Mutimedia and Epo, NY,, [16] C. Podichuk and W. Zeng, Image-Adaptive Watermarking Using Visua Modes, IEEE Journa on Seected Areas in Communications, 16, 4, May 98, [17] C. Nafornita, A. Isar and M. Borda, Image Watermarking Based on the Discrete Waveet Transform Statistica Characteristics, Proc. IEEE EUROCON 5, Serbia & Montenegro, [18] Miyahara, M.; Kotan K.; Agaz V.R., Objective Picture Quaity Scae (PQS) for Image Coding, IEEE Trans. on Comm., Vo 46, No.9, 98. [19] C. Nafornita, I. Firoiu, J-M Boucher, and A. Isar A new watermarking method based on the use of the hyperanaytic waveet transform, Proc. SPIE Vo. 7, 7W (Apr. 5, 8). 8

Complex Wavelet Transform: application to denoising

Complex Wavelet Transform: application to denoising Ioana ADAM Thesis Advisors : Jean-Marc BOUCHER Alexandru ISAR 1 / 44 Contents 1 Introduction 2 Wavelet Transforms 3 Complex Wavelet Transforms 4 Denoising 5 Speckle Reduction 6 Conclusions 2 / 44 Introduction

More information

Translation Microscopy (TRAM) for super-resolution imaging.

Translation Microscopy (TRAM) for super-resolution imaging. ransation Microscopy (RAM) for super-resoution imaging. Zhen Qiu* 1,,3, Rhodri S Wison* 1,3, Yuewei Liu 1,3, Aison Dun 1,3, Rebecca S Saeeb 1,3, Dongsheng Liu 4, Coin Ricman 1,3, Rory R Duncan 1,3,5, Weiping

More information

Melodic contour estimation with B-spline models using a MDL criterion

Melodic contour estimation with B-spline models using a MDL criterion Meodic contour estimation with B-spine modes using a MDL criterion Damien Loive, Ney Barbot, Oivier Boeffard IRISA / University of Rennes 1 - ENSSAT 6 rue de Kerampont, B.P. 80518, F-305 Lannion Cedex

More information

Stochastic Variational Inference with Gradient Linearization

Stochastic Variational Inference with Gradient Linearization Stochastic Variationa Inference with Gradient Linearization Suppementa Materia Tobias Pötz * Anne S Wannenwetsch Stefan Roth Department of Computer Science, TU Darmstadt Preface In this suppementa materia,

More information

A Robust Voice Activity Detection based on Noise Eigenspace Projection

A Robust Voice Activity Detection based on Noise Eigenspace Projection A Robust Voice Activity Detection based on Noise Eigenspace Projection Dongwen Ying 1, Yu Shi 2, Frank Soong 2, Jianwu Dang 1, and Xugang Lu 1 1 Japan Advanced Institute of Science and Technoogy, Nomi

More information

Wavelet Packet Based Digital Image Watermarking

Wavelet Packet Based Digital Image Watermarking Wavelet Packet Based Digital Image ing A.Adhipathi Reddy, B.N.Chatterji Department of Electronics and Electrical Communication Engg. Indian Institute of Technology, Kharagpur 72 32 {aar, bnc}@ece.iitkgp.ernet.in

More information

Haar Decomposition and Reconstruction Algorithms

Haar Decomposition and Reconstruction Algorithms Jim Lambers MAT 773 Fa Semester 018-19 Lecture 15 and 16 Notes These notes correspond to Sections 4.3 and 4.4 in the text. Haar Decomposition and Reconstruction Agorithms Decomposition Suppose we approximate

More information

Study on Fusion Algorithm of Multi-source Image Based on Sensor and Computer Image Processing Technology

Study on Fusion Algorithm of Multi-source Image Based on Sensor and Computer Image Processing Technology Sensors & Transducers 3 by IFSA http://www.sensorsporta.com Study on Fusion Agorithm of Muti-source Image Based on Sensor and Computer Image Processing Technoogy Yao NAN, Wang KAISHENG, 3 Yu JIN The Information

More information

Optimality of Inference in Hierarchical Coding for Distributed Object-Based Representations

Optimality of Inference in Hierarchical Coding for Distributed Object-Based Representations Optimaity of Inference in Hierarchica Coding for Distributed Object-Based Representations Simon Brodeur, Jean Rouat NECOTIS, Département génie éectrique et génie informatique, Université de Sherbrooke,

More information

Alberto Maydeu Olivares Instituto de Empresa Marketing Dept. C/Maria de Molina Madrid Spain

Alberto Maydeu Olivares Instituto de Empresa Marketing Dept. C/Maria de Molina Madrid Spain CORRECTIONS TO CLASSICAL PROCEDURES FOR ESTIMATING THURSTONE S CASE V MODEL FOR RANKING DATA Aberto Maydeu Oivares Instituto de Empresa Marketing Dept. C/Maria de Moina -5 28006 Madrid Spain Aberto.Maydeu@ie.edu

More information

Cryptanalysis of PKP: A New Approach

Cryptanalysis of PKP: A New Approach Cryptanaysis of PKP: A New Approach Éiane Jaumes and Antoine Joux DCSSI 18, rue du Dr. Zamenhoff F-92131 Issy-es-Mx Cedex France eiane.jaumes@wanadoo.fr Antoine.Joux@ens.fr Abstract. Quite recenty, in

More information

ASummaryofGaussianProcesses Coryn A.L. Bailer-Jones

ASummaryofGaussianProcesses Coryn A.L. Bailer-Jones ASummaryofGaussianProcesses Coryn A.L. Baier-Jones Cavendish Laboratory University of Cambridge caj@mrao.cam.ac.uk Introduction A genera prediction probem can be posed as foows. We consider that the variabe

More information

Multilayer Kerceptron

Multilayer Kerceptron Mutiayer Kerceptron Zotán Szabó, András Lőrincz Department of Information Systems, Facuty of Informatics Eötvös Loránd University Pázmány Péter sétány 1/C H-1117, Budapest, Hungary e-mai: szzoi@csetehu,

More information

A Solution to the 4-bit Parity Problem with a Single Quaternary Neuron

A Solution to the 4-bit Parity Problem with a Single Quaternary Neuron Neura Information Processing - Letters and Reviews Vo. 5, No. 2, November 2004 LETTER A Soution to the 4-bit Parity Probem with a Singe Quaternary Neuron Tohru Nitta Nationa Institute of Advanced Industria

More information

FORECASTING TELECOMMUNICATIONS DATA WITH AUTOREGRESSIVE INTEGRATED MOVING AVERAGE MODELS

FORECASTING TELECOMMUNICATIONS DATA WITH AUTOREGRESSIVE INTEGRATED MOVING AVERAGE MODELS FORECASTING TEECOMMUNICATIONS DATA WITH AUTOREGRESSIVE INTEGRATED MOVING AVERAGE MODES Niesh Subhash naawade a, Mrs. Meenakshi Pawar b a SVERI's Coege of Engineering, Pandharpur. nieshsubhash15@gmai.com

More information

TWO DENOISING SURE-LET METHODS FOR COMPLEX OVERSAMPLED SUBBAND DECOMPOSITIONS

TWO DENOISING SURE-LET METHODS FOR COMPLEX OVERSAMPLED SUBBAND DECOMPOSITIONS TWO DENOISING SUE-ET METHODS FO COMPEX OVESAMPED SUBBAND DECOMPOSITIONS Jérôme Gauthier 1, aurent Duva 2, and Jean-Christophe Pesquet 1 1 Université Paris-Est Institut Gaspard Monge and UM CNS 8049, 77454

More information

Efficient Visual-Inertial Navigation using a Rolling-Shutter Camera with Inaccurate Timestamps

Efficient Visual-Inertial Navigation using a Rolling-Shutter Camera with Inaccurate Timestamps Efficient Visua-Inertia Navigation using a Roing-Shutter Camera with Inaccurate Timestamps Chao X. Guo, Dimitrios G. Kottas, Ryan C. DuToit Ahmed Ahmed, Ruipeng Li and Stergios I. Roumeiotis Mutipe Autonomous

More information

(This is a sample cover image for this issue. The actual cover is not yet available at this time.)

(This is a sample cover image for this issue. The actual cover is not yet available at this time.) (This is a sampe cover image for this issue The actua cover is not yet avaiabe at this time) This artice appeared in a journa pubished by Esevier The attached copy is furnished to the author for interna

More information

Radar/ESM Tracking of Constant Velocity Target : Comparison of Batch (MLE) and EKF Performance

Radar/ESM Tracking of Constant Velocity Target : Comparison of Batch (MLE) and EKF Performance adar/ racing of Constant Veocity arget : Comparison of Batch (LE) and EKF Performance I. Leibowicz homson-csf Deteis/IISA La cef de Saint-Pierre 1 Bd Jean ouin 7885 Eancourt Cede France Isabee.Leibowicz

More information

DIGITAL FILTER DESIGN OF IIR FILTERS USING REAL VALUED GENETIC ALGORITHM

DIGITAL FILTER DESIGN OF IIR FILTERS USING REAL VALUED GENETIC ALGORITHM DIGITAL FILTER DESIGN OF IIR FILTERS USING REAL VALUED GENETIC ALGORITHM MIKAEL NILSSON, MATTIAS DAHL AND INGVAR CLAESSON Bekinge Institute of Technoogy Department of Teecommunications and Signa Processing

More information

Lobontiu: System Dynamics for Engineering Students Website Chapter 3 1. z b z

Lobontiu: System Dynamics for Engineering Students Website Chapter 3 1. z b z Chapter W3 Mechanica Systems II Introduction This companion website chapter anayzes the foowing topics in connection to the printed-book Chapter 3: Lumped-parameter inertia fractions of basic compiant

More information

Reconstructions that Combine Cell Average Interpolation with Least Squares Fitting

Reconstructions that Combine Cell Average Interpolation with Least Squares Fitting App Math Inf Sci, No, 7-84 6) 7 Appied Mathematics & Information Sciences An Internationa Journa http://dxdoiorg/8576/amis/6 Reconstructions that Combine Ce Average Interpoation with Least Squares Fitting

More information

An Algorithm for Pruning Redundant Modules in Min-Max Modular Network

An Algorithm for Pruning Redundant Modules in Min-Max Modular Network An Agorithm for Pruning Redundant Modues in Min-Max Moduar Network Hui-Cheng Lian and Bao-Liang Lu Department of Computer Science and Engineering, Shanghai Jiao Tong University 1954 Hua Shan Rd., Shanghai

More information

WAVELET BASED UNSUPERVISED VARIATIONAL BAYESIAN IMAGE RECONSTRUCTION APPROACH

WAVELET BASED UNSUPERVISED VARIATIONAL BAYESIAN IMAGE RECONSTRUCTION APPROACH 3rd European Signa Processing Conference (EUSIPCO WAVELET BASED UNSUPERVISED VARIATIONAL BAYESIAN IMAGE RECONSTRUCTION APPROACH Yuing Zheng, Auréia Fraysse, Thomas Rodet LIGM, Université Paris-Est, CNRS,

More information

First-Order Corrections to Gutzwiller s Trace Formula for Systems with Discrete Symmetries

First-Order Corrections to Gutzwiller s Trace Formula for Systems with Discrete Symmetries c 26 Noninear Phenomena in Compex Systems First-Order Corrections to Gutzwier s Trace Formua for Systems with Discrete Symmetries Hoger Cartarius, Jörg Main, and Günter Wunner Institut für Theoretische

More information

8 Digifl'.11 Cth:uits and devices

8 Digifl'.11 Cth:uits and devices 8 Digif'. Cth:uits and devices 8. Introduction In anaog eectronics, votage is a continuous variabe. This is usefu because most physica quantities we encounter are continuous: sound eves, ight intensity,

More information

HYDROGEN ATOM SELECTION RULES TRANSITION RATES

HYDROGEN ATOM SELECTION RULES TRANSITION RATES DOING PHYSICS WITH MATLAB QUANTUM PHYSICS Ian Cooper Schoo of Physics, University of Sydney ian.cooper@sydney.edu.au HYDROGEN ATOM SELECTION RULES TRANSITION RATES DOWNLOAD DIRECTORY FOR MATLAB SCRIPTS

More information

Unconditional security of differential phase shift quantum key distribution

Unconditional security of differential phase shift quantum key distribution Unconditiona security of differentia phase shift quantum key distribution Kai Wen, Yoshihisa Yamamoto Ginzton Lab and Dept of Eectrica Engineering Stanford University Basic idea of DPS-QKD Protoco. Aice

More information

WAVELET FREQUENCY DOMAIN APPROACH FOR TIME-SERIES MODELING

WAVELET FREQUENCY DOMAIN APPROACH FOR TIME-SERIES MODELING 1. Introduction WAVELET FREQUENCY DOMAIN APPROACH FOR TIME-SERIES MODELING Ranit Kumar Pau Indian Agricutura Statistics Research Institute Library Avenue, New Dehi 11001 ranitstat@iasri.res.in Autoregressive

More information

Bright and Dark Solitons in Optical Fibers with Parabolic Law Nonlinearity

Bright and Dark Solitons in Optical Fibers with Parabolic Law Nonlinearity SERBIAN JOURNAL OF ELECTRICAL ENGINEERING Vo. 0, No. 3, October 03, 365-370 UDK: 666.89. DOI: 0.98/SJEE3084009M Bright Dark Soitons in Optica Fibers with Paraboic Law Noninearity Daniea Miović, Anjan Biswas

More information

Soft Clustering on Graphs

Soft Clustering on Graphs Soft Custering on Graphs Kai Yu 1, Shipeng Yu 2, Voker Tresp 1 1 Siemens AG, Corporate Technoogy 2 Institute for Computer Science, University of Munich kai.yu@siemens.com, voker.tresp@siemens.com spyu@dbs.informatik.uni-muenchen.de

More information

International Journal of Mass Spectrometry

International Journal of Mass Spectrometry Internationa Journa of Mass Spectrometry 280 (2009) 179 183 Contents ists avaiabe at ScienceDirect Internationa Journa of Mass Spectrometry journa homepage: www.esevier.com/ocate/ijms Stark mixing by ion-rydberg

More information

MATH 172: MOTIVATION FOR FOURIER SERIES: SEPARATION OF VARIABLES

MATH 172: MOTIVATION FOR FOURIER SERIES: SEPARATION OF VARIABLES MATH 172: MOTIVATION FOR FOURIER SERIES: SEPARATION OF VARIABLES Separation of variabes is a method to sove certain PDEs which have a warped product structure. First, on R n, a inear PDE of order m is

More information

A proposed nonparametric mixture density estimation using B-spline functions

A proposed nonparametric mixture density estimation using B-spline functions A proposed nonparametric mixture density estimation using B-spine functions Atizez Hadrich a,b, Mourad Zribi a, Afif Masmoudi b a Laboratoire d Informatique Signa et Image de a Côte d Opae (LISIC-EA 4491),

More information

Research of Data Fusion Method of Multi-Sensor Based on Correlation Coefficient of Confidence Distance

Research of Data Fusion Method of Multi-Sensor Based on Correlation Coefficient of Confidence Distance Send Orders for Reprints to reprints@benthamscience.ae 340 The Open Cybernetics & Systemics Journa, 015, 9, 340-344 Open Access Research of Data Fusion Method of Muti-Sensor Based on Correation Coefficient

More information

SHEARLET-BASED INVERSE HALFTONING

SHEARLET-BASED INVERSE HALFTONING Journa of Theoretica and Appied Information Technoog 3 st March 3. Vo. 49 No.3 5-3 JATIT & LLS. A rights reserved. ISSN: 99-8645 www.atit.org E-ISSN: 87-395 SHEARLET-BASED INVERSE HALFTONING CHENGZHI DENG,

More information

Geometric Invariant Semi-fragile Image Watermarking Using Real Symmetric Matrix

Geometric Invariant Semi-fragile Image Watermarking Using Real Symmetric Matrix Proceedings of the 5th WSEAS Internationa Conference on Signa Processing, Istanbu, Turkey, May 27-29, 2006 (pp70-75) Geometric Invariant Semi-fragie Image Watermarking Using Rea Symmetric Matrix Ching-Tang

More information

DYNAMIC RESPONSE OF CIRCULAR FOOTINGS ON SATURATED POROELASTIC HALFSPACE

DYNAMIC RESPONSE OF CIRCULAR FOOTINGS ON SATURATED POROELASTIC HALFSPACE 3 th Word Conference on Earthquake Engineering Vancouver, B.C., Canada August -6, 4 Paper No. 38 DYNAMIC RESPONSE OF CIRCULAR FOOTINGS ON SATURATED POROELASTIC HALFSPACE Bo JIN SUMMARY The dynamic responses

More information

TWO DISTRIBUTED ALGORITHMS FOR THE DECONVOLUTION OF LARGE RADIO-INTERFEROMETRIC MULTISPECTRAL IMAGES

TWO DISTRIBUTED ALGORITHMS FOR THE DECONVOLUTION OF LARGE RADIO-INTERFEROMETRIC MULTISPECTRAL IMAGES WO DISRIBUED ALGORIHMS FOR HE DECONVOLUION OF LARGE RADIO-INERFEROMERIC MULISPECRAL IMAGES Céine Meiier, Pasca Bianchi, Waid Hachem LCI, CNRS, eecom Paristech, Université Paris-Sacay, 73, Paris, France

More information

Sparse canonical correlation analysis from a predictive point of view

Sparse canonical correlation analysis from a predictive point of view Sparse canonica correation anaysis from a predictive point of view arxiv:1501.01231v1 [stat.me] 6 Jan 2015 Ines Wims Facuty of Economics and Business, KU Leuven and Christophe Croux Facuty of Economics

More information

In-plane shear stiffness of bare steel deck through shell finite element models. G. Bian, B.W. Schafer. June 2017

In-plane shear stiffness of bare steel deck through shell finite element models. G. Bian, B.W. Schafer. June 2017 In-pane shear stiffness of bare stee deck through she finite eement modes G. Bian, B.W. Schafer June 7 COLD-FORMED STEEL RESEARCH CONSORTIUM REPORT SERIES CFSRC R-7- SDII Stee Diaphragm Innovation Initiative

More information

Digital Image Watermarking Algorithm Based on Wavelet Packet

Digital Image Watermarking Algorithm Based on Wavelet Packet www.ijcsi.org 403 Digital Image ing Algorithm Based on Wavelet Packet 1 A.Geetha, 2 B.Vijayakumari, 3 C.Nagavani, 4 T.Pandiselvi 1 3 4 Faculty of Kamaraj College of Engineering and Technology Department

More information

Worst Case Analysis of the Analog Circuits

Worst Case Analysis of the Analog Circuits Proceedings of the 11th WSEAS Internationa Conference on CIRCUITS, Agios Nikoaos, Crete Isand, Greece, Juy 3-5, 7 9 Worst Case Anaysis of the Anaog Circuits ELENA NICULESCU*, DORINA-MIOARA PURCARU* and

More information

1. Measurements and error calculus

1. Measurements and error calculus EV 1 Measurements and error cacuus 11 Introduction The goa of this aboratory course is to introduce the notions of carrying out an experiment, acquiring and writing up the data, and finay anayzing the

More information

Improved Min-Sum Decoding of LDPC Codes Using 2-Dimensional Normalization

Improved Min-Sum Decoding of LDPC Codes Using 2-Dimensional Normalization Improved Min-Sum Decoding of LDPC Codes sing -Dimensiona Normaization Juntan Zhang and Marc Fossorier Department of Eectrica Engineering niversity of Hawaii at Manoa Honouu, HI 968 Emai: juntan, marc@spectra.eng.hawaii.edu

More information

A Brief Introduction to Markov Chains and Hidden Markov Models

A Brief Introduction to Markov Chains and Hidden Markov Models A Brief Introduction to Markov Chains and Hidden Markov Modes Aen B MacKenzie Notes for December 1, 3, &8, 2015 Discrete-Time Markov Chains You may reca that when we first introduced random processes,

More information

https://doi.org/ /epjconf/

https://doi.org/ /epjconf/ HOW TO APPLY THE OPTIMAL ESTIMATION METHOD TO YOUR LIDAR MEASUREMENTS FOR IMPROVED RETRIEVALS OF TEMPERATURE AND COMPOSITION R. J. Sica 1,2,*, A. Haefee 2,1, A. Jaai 1, S. Gamage 1 and G. Farhani 1 1 Department

More information

$, (2.1) n="# #. (2.2)

$, (2.1) n=# #. (2.2) Chapter. Eectrostatic II Notes: Most of the materia presented in this chapter is taken from Jackson, Chap.,, and 4, and Di Bartoo, Chap... Mathematica Considerations.. The Fourier series and the Fourier

More information

A. Distribution of the test statistic

A. Distribution of the test statistic A. Distribution of the test statistic In the sequentia test, we first compute the test statistic from a mini-batch of size m. If a decision cannot be made with this statistic, we keep increasing the mini-batch

More information

Statistical Learning Theory: A Primer

Statistical Learning Theory: A Primer Internationa Journa of Computer Vision 38(), 9 3, 2000 c 2000 uwer Academic Pubishers. Manufactured in The Netherands. Statistica Learning Theory: A Primer THEODOROS EVGENIOU, MASSIMILIANO PONTIL AND TOMASO

More information

A Statistical Framework for Real-time Event Detection in Power Systems

A Statistical Framework for Real-time Event Detection in Power Systems 1 A Statistica Framework for Rea-time Event Detection in Power Systems Noan Uhrich, Tim Christman, Phiip Swisher, and Xichen Jiang Abstract A quickest change detection (QCD) agorithm is appied to the probem

More information

Wavelet Methods for Time Series Analysis. Wavelet-Based Signal Estimation: I. Part VIII: Wavelet-Based Signal Extraction and Denoising

Wavelet Methods for Time Series Analysis. Wavelet-Based Signal Estimation: I. Part VIII: Wavelet-Based Signal Extraction and Denoising Waveet Methods for Time Series Anaysis Part VIII: Waveet-Based Signa Extraction and Denoising overview of key ideas behind waveet-based approach description of four basic modes for signa estimation discussion

More information

Wavelet Galerkin Solution for Boundary Value Problems

Wavelet Galerkin Solution for Boundary Value Problems Internationa Journa of Engineering Research and Deveopment e-issn: 2278-67X, p-issn: 2278-8X, www.ijerd.com Voume, Issue 5 (May 24), PP.2-3 Waveet Gaerkin Soution for Boundary Vaue Probems D. Pate, M.K.

More information

Seasonal Time Series Data Forecasting by Using Neural Networks Multiscale Autoregressive Model

Seasonal Time Series Data Forecasting by Using Neural Networks Multiscale Autoregressive Model American ourna of Appied Sciences 7 (): 372-378, 2 ISSN 546-9239 2 Science Pubications Seasona Time Series Data Forecasting by Using Neura Networks Mutiscae Autoregressive Mode Suhartono, B.S.S. Uama and

More information

Module 2. Analysis of Statically Indeterminate Structures by the Matrix Force Method. Version 2 CE IIT, Kharagpur

Module 2. Analysis of Statically Indeterminate Structures by the Matrix Force Method. Version 2 CE IIT, Kharagpur odue 2 naysis of Staticay ndeterminate Structures by the atri Force ethod Version 2 E T, Kharagpur esson 12 The Three-oment Equations- Version 2 E T, Kharagpur nstructiona Objectives fter reading this

More information

Target Location Estimation in Wireless Sensor Networks Using Binary Data

Target Location Estimation in Wireless Sensor Networks Using Binary Data Target Location stimation in Wireess Sensor Networks Using Binary Data Ruixin Niu and Pramod K. Varshney Department of ectrica ngineering and Computer Science Link Ha Syracuse University Syracuse, NY 344

More information

Explicit overall risk minimization transductive bound

Explicit overall risk minimization transductive bound 1 Expicit overa risk minimization transductive bound Sergio Decherchi, Paoo Gastado, Sandro Ridea, Rodofo Zunino Dept. of Biophysica and Eectronic Engineering (DIBE), Genoa University Via Opera Pia 11a,

More information

12.2. Maxima and Minima. Introduction. Prerequisites. Learning Outcomes

12.2. Maxima and Minima. Introduction. Prerequisites. Learning Outcomes Maima and Minima 1. Introduction In this Section we anayse curves in the oca neighbourhood of a stationary point and, from this anaysis, deduce necessary conditions satisfied by oca maima and oca minima.

More information

Fitting affine and orthogonal transformations between two sets of points

Fitting affine and orthogonal transformations between two sets of points Mathematica Communications 9(2004), 27-34 27 Fitting affine and orthogona transformations between two sets of points Hemuth Späth Abstract. Let two point sets P and Q be given in R n. We determine a transation

More information

Improving the Reliability of a Series-Parallel System Using Modified Weibull Distribution

Improving the Reliability of a Series-Parallel System Using Modified Weibull Distribution Internationa Mathematica Forum, Vo. 12, 217, no. 6, 257-269 HIKARI Ltd, www.m-hikari.com https://doi.org/1.12988/imf.217.611155 Improving the Reiabiity of a Series-Parae System Using Modified Weibu Distribution

More information

Two view learning: SVM-2K, Theory and Practice

Two view learning: SVM-2K, Theory and Practice Two view earning: SVM-2K, Theory and Practice Jason D.R. Farquhar jdrf99r@ecs.soton.ac.uk Hongying Meng hongying@cs.york.ac.uk David R. Hardoon drh@ecs.soton.ac.uk John Shawe-Tayor jst@ecs.soton.ac.uk

More information

Introduction. Figure 1 W8LC Line Array, box and horn element. Highlighted section modelled.

Introduction. Figure 1 W8LC Line Array, box and horn element. Highlighted section modelled. imuation of the acoustic fied produced by cavities using the Boundary Eement Rayeigh Integra Method () and its appication to a horn oudspeaer. tephen Kirup East Lancashire Institute, Due treet, Bacburn,

More information

Wavelet shrinkage estimators of Hilbert transform

Wavelet shrinkage estimators of Hilbert transform Journa of Approximation Theory 163 (2011) 652 662 www.esevier.com/ocate/jat Fu ength artice Waveet shrinkage estimators of Hibert transform Di-Rong Chen, Yao Zhao Department of Mathematics, LMIB, Beijing

More information

Computing Spherical Transform and Convolution on the 2-Sphere

Computing Spherical Transform and Convolution on the 2-Sphere Computing Spherica Transform and Convoution on the 2-Sphere Boon Thye Thomas Yeo ythomas@mit.edu May, 25 Abstract We propose a simpe extension to the Least-Squares method of projecting sampes of an unknown

More information

STABILITY OF A PARAMETRICALLY EXCITED DAMPED INVERTED PENDULUM 1. INTRODUCTION

STABILITY OF A PARAMETRICALLY EXCITED DAMPED INVERTED PENDULUM 1. INTRODUCTION Journa of Sound and Vibration (996) 98(5), 643 65 STABILITY OF A PARAMETRICALLY EXCITED DAMPED INVERTED PENDULUM G. ERDOS AND T. SINGH Department of Mechanica and Aerospace Engineering, SUNY at Buffao,

More information

arxiv: v1 [cs.lg] 31 Oct 2017

arxiv: v1 [cs.lg] 31 Oct 2017 ACCELERATED SPARSE SUBSPACE CLUSTERING Abofaz Hashemi and Haris Vikao Department of Eectrica and Computer Engineering, University of Texas at Austin, Austin, TX, USA arxiv:7.26v [cs.lg] 3 Oct 27 ABSTRACT

More information

ESTIMATION OF SAMPLING TIME MISALIGNMENTS IN IFDMA UPLINK

ESTIMATION OF SAMPLING TIME MISALIGNMENTS IN IFDMA UPLINK ESTIMATION OF SAMPLING TIME MISALIGNMENTS IN IFDMA UPLINK Aexander Arkhipov, Michae Schne German Aerospace Center DLR) Institute of Communications and Navigation Oberpfaffenhofen, 8224 Wessing, Germany

More information

Algorithms to solve massively under-defined systems of multivariate quadratic equations

Algorithms to solve massively under-defined systems of multivariate quadratic equations Agorithms to sove massivey under-defined systems of mutivariate quadratic equations Yasufumi Hashimoto Abstract It is we known that the probem to sove a set of randomy chosen mutivariate quadratic equations

More information

FRST Multivariate Statistics. Multivariate Discriminant Analysis (MDA)

FRST Multivariate Statistics. Multivariate Discriminant Analysis (MDA) 1 FRST 531 -- Mutivariate Statistics Mutivariate Discriminant Anaysis (MDA) Purpose: 1. To predict which group (Y) an observation beongs to based on the characteristics of p predictor (X) variabes, using

More information

Approach to Identifying Raindrop Vibration Signal Detected by Optical Fiber

Approach to Identifying Raindrop Vibration Signal Detected by Optical Fiber Sensors & Transducers, o. 6, Issue, December 3, pp. 85-9 Sensors & Transducers 3 by IFSA http://www.sensorsporta.com Approach to Identifying Raindrop ibration Signa Detected by Optica Fiber ongquan QU,

More information

Research Article On the Lower Bound for the Number of Real Roots of a Random Algebraic Equation

Research Article On the Lower Bound for the Number of Real Roots of a Random Algebraic Equation Appied Mathematics and Stochastic Anaysis Voume 007, Artice ID 74191, 8 pages doi:10.1155/007/74191 Research Artice On the Lower Bound for the Number of Rea Roots of a Random Agebraic Equation Takashi

More information

The influence of temperature of photovoltaic modules on performance of solar power plant

The influence of temperature of photovoltaic modules on performance of solar power plant IOSR Journa of Engineering (IOSRJEN) ISSN (e): 2250-3021, ISSN (p): 2278-8719 Vo. 05, Issue 04 (Apri. 2015), V1 PP 09-15 www.iosrjen.org The infuence of temperature of photovotaic modues on performance

More information

Math 124B January 31, 2012

Math 124B January 31, 2012 Math 124B January 31, 212 Viktor Grigoryan 7 Inhomogeneous boundary vaue probems Having studied the theory of Fourier series, with which we successfuy soved boundary vaue probems for the homogeneous heat

More information

Formulas for Angular-Momentum Barrier Factors Version II

Formulas for Angular-Momentum Barrier Factors Version II BNL PREPRINT BNL-QGS-06-101 brfactor1.tex Formuas for Anguar-Momentum Barrier Factors Version II S. U. Chung Physics Department, Brookhaven Nationa Laboratory, Upton, NY 11973 March 19, 2015 abstract A

More information

Tracking Control of Multiple Mobile Robots

Tracking Control of Multiple Mobile Robots Proceedings of the 2001 IEEE Internationa Conference on Robotics & Automation Seou, Korea May 21-26, 2001 Tracking Contro of Mutipe Mobie Robots A Case Study of Inter-Robot Coision-Free Probem Jurachart

More information

Spring Gravity Compensation Using the Noncircular Pulley and Cable For the Less-Spring Design

Spring Gravity Compensation Using the Noncircular Pulley and Cable For the Less-Spring Design The 14th IFToMM Word Congress, Taipei, Taiwan, October 25-30, 2015 DOI Number: 10.6567/IFToMM.14TH.WC.PS3.010 Spring Gravity Compensation Using the Noncircuar Puey and Cabe For the Less-Spring Design M.C.

More information

Data Mining Technology for Failure Prognostic of Avionics

Data Mining Technology for Failure Prognostic of Avionics IEEE Transactions on Aerospace and Eectronic Systems. Voume 38, #, pp.388-403, 00. Data Mining Technoogy for Faiure Prognostic of Avionics V.A. Skormin, Binghamton University, Binghamton, NY, 1390, USA

More information

Traffic data collection

Traffic data collection Chapter 32 Traffic data coection 32.1 Overview Unike many other discipines of the engineering, the situations that are interesting to a traffic engineer cannot be reproduced in a aboratory. Even if road

More information

Nonlinear Analysis of Spatial Trusses

Nonlinear Analysis of Spatial Trusses Noninear Anaysis of Spatia Trusses João Barrigó October 14 Abstract The present work addresses the noninear behavior of space trusses A formuation for geometrica noninear anaysis is presented, which incudes

More information

Color Seamlessness in Multi-Projector Displays using Constrained Gamut Morphing

Color Seamlessness in Multi-Projector Displays using Constrained Gamut Morphing Coor Seamessness in Muti-Projector Dispays using Constrained Gamut Morphing IEEE Transactions on Visuaization and Computer Graphics, Vo. 15, No. 6, 2009 Behzad Sajadi, Maxim Lazarov, Aditi Majumder, and

More information

Implementation of Operators via Filter Banks

Implementation of Operators via Filter Banks APPLIED AND COMPUTATIONAL HARMONIC ANALYSIS 3, 164 185 (1996) ARTICLE NO. 0014 Impementation of Operators via Fiter Banks Hardy Waveets and Autocorreation She G. Beykin Program in Appied Mathematics, University

More information

An Information Geometrical View of Stationary Subspace Analysis

An Information Geometrical View of Stationary Subspace Analysis An Information Geometrica View of Stationary Subspace Anaysis Motoaki Kawanabe, Wojciech Samek, Pau von Bünau, and Frank C. Meinecke Fraunhofer Institute FIRST, Kekuéstr. 7, 12489 Berin, Germany Berin

More information

Multiple Beam Interference

Multiple Beam Interference MutipeBeamInterference.nb James C. Wyant 1 Mutipe Beam Interference 1. Airy's Formua We wi first derive Airy's formua for the case of no absorption. ü 1.1 Basic refectance and transmittance Refected ight

More information

Some Measures for Asymmetry of Distributions

Some Measures for Asymmetry of Distributions Some Measures for Asymmetry of Distributions Georgi N. Boshnakov First version: 31 January 2006 Research Report No. 5, 2006, Probabiity and Statistics Group Schoo of Mathematics, The University of Manchester

More information

arxiv: v3 [math.sp] 2 Nov 2017

arxiv: v3 [math.sp] 2 Nov 2017 A Fast Agorithm for Computing the Fourier Spectrum of a Fractiona Period arxiv:1604.01589v3 [math.sp] 2 Nov 2017 Jiasong Wang 1, Changchuan Yin 2, 1.Department of Mathematics, Nanjing University, Nanjing,

More information

Joel Broida UCSD Fall 2009 Phys 130B QM II. Homework Set 2 DO ALL WORK BY HAND IN OTHER WORDS, DON T USE MATHEMAT- ICA OR ANY CALCULATORS.

Joel Broida UCSD Fall 2009 Phys 130B QM II. Homework Set 2 DO ALL WORK BY HAND IN OTHER WORDS, DON T USE MATHEMAT- ICA OR ANY CALCULATORS. Joe Broida UCSD Fa 009 Phys 30B QM II Homework Set DO ALL WORK BY HAND IN OTHER WORDS, DON T USE MATHEMAT- ICA OR ANY CALCULATORS. You may need to use one or more of these: Y 0 0 = 4π Y 0 = 3 4π cos Y

More information

3D and 6D Fast Rotational Matching

3D and 6D Fast Rotational Matching 3D and 6D Fast Rotationa Matching Juio Kovacs, Ph.D. Department of Moecuar Bioogy The Scripps Research Institute 10550 N. Torrey Pines Road, Mai TPC6 La Joa, Caifornia, 9037 Situs Modeing Workshop, San

More information

Incremental Reformulated Automatic Relevance Determination

Incremental Reformulated Automatic Relevance Determination IEEE TRANSACTIONS ON SIGNAL PROCESSING, VOL. 60, NO. 9, SEPTEMBER 22 4977 Incrementa Reformuated Automatic Reevance Determination Dmitriy Shutin, Sanjeev R. Kukarni, and H. Vincent Poor Abstract In this

More information

A SIMPLIFIED DESIGN OF MULTIDIMENSIONAL TRANSFER FUNCTION MODELS

A SIMPLIFIED DESIGN OF MULTIDIMENSIONAL TRANSFER FUNCTION MODELS A SIPLIFIED DESIGN OF ULTIDIENSIONAL TRANSFER FUNCTION ODELS Stefan Petrausch, Rudof Rabenstein utimedia Communications and Signa Procesg, University of Erangen-Nuremberg, Cauerstr. 7, 958 Erangen, GERANY

More information

Partial permutation decoding for MacDonald codes

Partial permutation decoding for MacDonald codes Partia permutation decoding for MacDonad codes J.D. Key Department of Mathematics and Appied Mathematics University of the Western Cape 7535 Bevie, South Africa P. Seneviratne Department of Mathematics

More information

D. Prémel, J.M. Decitre and G. Pichenot. CEA, LIST, F Gif-sur-Yvette, France

D. Prémel, J.M. Decitre and G. Pichenot. CEA, LIST, F Gif-sur-Yvette, France SIMULATION OF EDDY CURRENT INSPECTION INCLUDING MAGNETIC FIELD SENSOR SUCH AS A GIANT MAGNETO-RESISTANCE OVER PLANAR STRATIFIED MEDIA COMPONENTS WITH EMBEDDED FLAWS D. Préme, J.M. Decitre and G. Pichenot

More information

FFTs in Graphics and Vision. Spherical Convolution and Axial Symmetry Detection

FFTs in Graphics and Vision. Spherical Convolution and Axial Symmetry Detection FFTs in Graphics and Vision Spherica Convoution and Axia Symmetry Detection Outine Math Review Symmetry Genera Convoution Spherica Convoution Axia Symmetry Detection Math Review Symmetry: Given a unitary

More information

Lecture 6 Povh Krane Enge Williams Properties of 2-nucleon potential

Lecture 6 Povh Krane Enge Williams Properties of 2-nucleon potential Lecture 6 Povh Krane Enge Wiiams Properties of -nuceon potentia 16.1 4.4 3.6 9.9 Meson Theory of Nucear potentia 4.5 3.11 9.10 I recommend Eisberg and Resnik notes as distributed Probems, Lecture 6 1 Consider

More information

A Simple and Efficient Algorithm of 3-D Single-Source Localization with Uniform Cross Array Bing Xue 1 2 a) * Guangyou Fang 1 2 b and Yicai Ji 1 2 c)

A Simple and Efficient Algorithm of 3-D Single-Source Localization with Uniform Cross Array Bing Xue 1 2 a) * Guangyou Fang 1 2 b and Yicai Ji 1 2 c) A Simpe Efficient Agorithm of 3-D Singe-Source Locaization with Uniform Cross Array Bing Xue a * Guangyou Fang b Yicai Ji c Key Laboratory of Eectromagnetic Radiation Sensing Technoogy, Institute of Eectronics,

More information

Substructuring Preconditioners for the Bidomain Extracellular Potential Problem

Substructuring Preconditioners for the Bidomain Extracellular Potential Problem Substructuring Preconditioners for the Bidomain Extraceuar Potentia Probem Mico Pennacchio 1 and Vaeria Simoncini 2,1 1 IMATI - CNR, via Ferrata, 1, 27100 Pavia, Itay mico@imaticnrit 2 Dipartimento di

More information

Lower Bounds for the Relative Greedy Algorithm for Approximating Steiner Trees

Lower Bounds for the Relative Greedy Algorithm for Approximating Steiner Trees This paper appeared in: Networks 47:2 (2006), -5 Lower Bounds for the Reative Greed Agorithm for Approimating Steiner Trees Stefan Hougard Stefan Kirchner Humbodt-Universität zu Berin Institut für Informatik

More information

<C 2 2. λ 2 l. λ 1 l 1 < C 1

<C 2 2. λ 2 l. λ 1 l 1 < C 1 Teecommunication Network Contro and Management (EE E694) Prof. A. A. Lazar Notes for the ecture of 7/Feb/95 by Huayan Wang (this document was ast LaT E X-ed on May 9,995) Queueing Primer for Muticass Optima

More information

LECTURE NOTES 9 TRACELESS SYMMETRIC TENSOR APPROACH TO LEGENDRE POLYNOMIALS AND SPHERICAL HARMONICS

LECTURE NOTES 9 TRACELESS SYMMETRIC TENSOR APPROACH TO LEGENDRE POLYNOMIALS AND SPHERICAL HARMONICS MASSACHUSETTS INSTITUTE OF TECHNOLOGY Physics Department Physics 8.07: Eectromagnetism II October 7, 202 Prof. Aan Guth LECTURE NOTES 9 TRACELESS SYMMETRIC TENSOR APPROACH TO LEGENDRE POLYNOMIALS AND SPHERICAL

More information

II. PROBLEM. A. Description. For the space of audio signals

II. PROBLEM. A. Description. For the space of audio signals CS229 - Fina Report Speech Recording based Language Recognition (Natura Language) Leopod Cambier - cambier; Matan Leibovich - matane; Cindy Orozco Bohorquez - orozcocc ABSTRACT We construct a rea time

More information

Introduction to LMTO method

Introduction to LMTO method 1 Introduction to MTO method 24 February 2011; V172 P.Ravindran, FME-course on Ab initio Modeing of soar ce Materias 24 February 2011 Introduction to MTO method Ab initio Eectronic Structure Cacuations

More information