A Robust Adaptive Digital Audio Watermarking Scheme Against MP3 Compression

Size: px
Start display at page:

Download "A Robust Adaptive Digital Audio Watermarking Scheme Against MP3 Compression"

Transcription

1 ½ 33 ½ 3 Þ Vol. 33, No ACTA AUTOMATICA SINICA March, 7 è ¹ MP3 ß å 1, Ä 1 1 ý  Åè ó ó ß Ì ß ñ1) Ä Ǒ ² ÂÔÅ þíò) û Ð (Discrete wavelet transform, DWT) Ð ßÙ (Discrete cosine transform, DCT) Í Í Å Âò3) ¹ ó ùþđ ÂÔÅ Đ ò4) Ý Đ Ǒ ÝÅ Ù å Ä Â ß Đ Þ Í á Ð þ Ç» Ì ß Ù Ǒ MP3 þ Ö ¹ Í (ðô ³ ) ³ MP3 ÞĐ TP391 A Robust Adaptive Digital Audio Watermarking Scheme Against MP3 Compression WANG Xiang-Yang 1, YANG Hong-Ying 1 ZHAO Hong 1 Abstract In this paper, a robust adaptive digital audio watermarking scheme in the hybrid domain is presented. The features of the proposed algorithm are as follows: 1)More robust synchronization codes and a new embedded strategy are adopted to resist the attack effectively. )The multi-resolution characteristics of discrete wavelet transform(dwt) and the energy-compression characteristics of discrete cosine transform(dct) are combined to improve the transparency of digital watermark. 3)The adaptive quantization steps are identified according to human auditory masking. 4)The algorithm can extract the watermark without the help of the original digital audio signal. Experimental results show that the proposed watermarking algorithm is imperceptible and robust against various signal processings such as re-sampling, re-quantifying, noising adding, low pass filtering and cropping. Especially, our audio watermarking scheme is remarkably effective in resisting MP3 compression. Key words Digital watermarking, digital audio, MP3 compression, quantization step 1 Ý ß Ǒ þú 5-9- þ ÍÚ Received September, 5; in revised form June 3, 6 Û (31) ü ² ÒÁ û ( ) Ñè (53), ù (6J3JH), Ç ² Ò û ( ) Ñèáà (KJS6), ä Ò ä ² û (À ) Ñè (ZK514) á Support by the Natural Science Foundation of Liaoning Province of P.R.China (31), the Open Foundation of State Key Laboratory of Vision and Auditory Information Processing (Beijing University, 53), the Natural Science Foundation of Dalian City of P. R. China (6J3JH), the Open Foundation of Jiangsu Province Key Laboratory for Computer Information Processing Technology (Soochow University, KJS6), the Open Foundation of Key Laboratory of Image Processing and Image Communication (Nanjing University of Posts and Communications, ZK514) 1. Ûã Ç ² ü ² ÒÁ û School of Computer and Information Technique, Liaoning Normal University, Dalian State Key Laboratory of Vision and Auditory Information Processing, Beijing University, Beijing 1871 DOI: 1.136/aas-7-48 [1] èñ àß àß àß Å¾ ǑÅÙî DCT Í (Í ) Þ []  ² DCT Ù ùþ à ß Đ æ èí Ä î ðùóæ MPEG4 Á Ç Å Ô ü [3 7] Ý ß À ¹ ë Í Ö ( ÇðÔ ³ ) Þ [8]  Åè ß Ì ßÍÅ MP3 ÃǑ ² èùå Â Å Ö ë Í Đ Úñ1)  ² îá ² Ù Ë ò) ß Ó Ã (p,ε,q,d) Á ½ «ò3) ù ÃǑÅ Đ ò4) á Ð þí

2 3 å ñè ¹ MP3 ß 49  Åè ó ó ß Ì ßü Ǒ 16 Ò Ǒ ÁÈ û Ä Í Ç î ¹ ó Þ ² ó Ë Ǒñ èñ Ë ² ó (DCT DWT) Ë ² ² Ǒ A = {a(i), i < Length} Length Ǒ a(i) {,1,,,( p 1)} ð½ i p ǑÄ Þ ³ äǒ W = {w(i,j), i < M, j < N} w(i,j) {,1} ãä ä ½ i ½ ½ j ä Ǒ F = {f(i), i < Lsyn} f(i) {,1} (Ǒ Å Ù Ô Ò ½ß +1, 1 1) Lsyn Ǒ Đ Ã ó ó Ä (³ ù).1 Ò ǑÅî ä ä èñ ³ Â Ô Ë Í è Í ù» ä ½è ç Ǒ Arnold ä W è ç ǑË Å W 1 W 1 = {w 1 (i,j), i < M, j < N} Ǒ èâô¹ Ð þí ûä Í Ý Ù ß ² ½ Ò ¾ Þ Đ ĐǑ L 1 L û Ç ² ½ i Ä Ǒ A(i) = {a(il + k), k < L}( i < Length / L ) Ô L = L 1 + L, L 1 = Lsyn n, L = M N H+1, H Ǒ n Ǒ ( ü Ǒ 5) Ǒ A (ĐǑ L 1 L Ǒ A 1 A ) à ² Ä. ǑÅ Ý Đ Í (n ) àß ² Ç ÆùǑñ 1) A 1 Í Đ Lsyn Lsyn Þ è PA 1(m) õ n PA 1 (m) = { pa 1 (m)(i) = a 1 (i + m n), i < n, m < Lsyn} ) Ç PA 1(m) PA 1(m) = 1 n 1 pa n 1(m)(i),( m < Lsyn) i= 3) Þàß Þè PA 1(m) Í PA 1(m) è Í Ǒ pa 1 (m)(i) = pa 1(m)(i) + (PA 1 (m) PA 1(m)) (m)(i), i < n} Ǒ Í 1 = {pa 1 (m)(i), i < n} Ǒ Í PA 1 (m) = {pa 1 PA PA 1 ( (m) = IQ(PA 1 (m)) S 1 + S 1/,  Q(PA 1 (m)) = f(m) IQ(PA 1 (m)) S1 S 1/,  Q(PA 1 (m)) f(m) IQ(PA 1 (m)) = PA 1 (m). S 1 Q(PA 1 (m)) = mod(iq(pa 1 (m)),) mod Ǒ S 1 ǑÞĐ.3 ² 1) ( ) DWT Þ A ½ H û A H,DH,DH 1,,D 1 A H Ǒ A ½ H Õ D 1,,D H 1,D ÇǑ H A ½ 1 H ) Õ DCT Đ Õ ÍÅ ¹ä Ôü H Õ A H ½ DCT A HC = DCT(A H ) = {a (t) HC, t < L / H } 3) ² Ǒ Ý Đ ¹ Þ ² DCT ÞÆë M N DCT A HC A HC = { a (t)hc, t < M N a (t) HC, M N t < L / H

3 5 Þ 33 Þ Ã ñ a (t) HC = ( IQ(a (t) HC ) S + S /, ÂQ(a (t) HC ) = w 1(i, j) IQ(a (t) HC ) S S /, ÂQ(a (t) HC ) w 1(i, j) t = (i 1) N + j i < M j < N S ǑÞĐ j IQ(a (t) HC ) = (a (t) HC ) k S Q(a (t) HC ) = mod(iq(a (t) HC ),) Ô mod ð 4) DCT A HC DCT A H = IDCT(A HC ) 5) DWT A H ãç A H û ½ H DWT õ ² A 3 ÞĐ ó ü ÙÞ à Þ Đ ü æ³ ǑÞĐ Ö ç ³ ÞĐ Đ Í ( îǒ Æð ä) ü ùþđ û Đ ü ¹ Ý à [4] À Å Þ è ÞĐ ÂÞĐ Ã ÃǑ þ ò ÂÞĐ Ã ïá ÃǑ ½Æ à ÞĐ Í ³  ǑÅ Þ Đ Ú îó ß Ë ( Þ ùè ÞĐ Ç ) î Ë ËÆ ùþđ S 1 Ë ËÆ ùþđ S î ¹ ù ÞĐ S 1 ( Ù ) S 1 = log sa ( Ǒå ø ), s a = A s a = A Ä A ( ô ) ¹ ó ùþđ S ( Ù ² ) ÆùǑ 1) A (A õþ ) DWT A ½ H û A H,D H,D H 1,,D 1 A H Ǒ A ½ H Õ D H,DH 1,,D ÇǑ 1 A ½ 1 H ) Õ DCT Ôü H Õ A H ½ DCT A HC = DCT(A H ) = {a (t)hc, t < L / H } 3) ÞĐ S ó ü Ù ² DCT M N Ë ǑÅ Â Ä ÍÅ Ç ÞĐ ËÆû DCT M N ó ùþđ S S = log s b ( Ǒå ø ), s b = ÂHC = L / H 1 t=m N a (t) HC M N 4  ó ó ß Ù ß Ù ² î Á ½Æ 4.1 Ù Ô Ù ð ÙÁí ( Ǒ L 1 ) Ëð õ ² ùǒñ 1) Í ½ 3 ù ó ù Þ Đ S 1 ) Í ½. ù ÇÇ ( Áí ) n m PA (m) PA (m) PA (m) = {pa (m)(i) = a (i + m n), i < n, m < Lsyn} 3)  ² F  Ǒ F = {f (m) = PA (m). S1 mod, m < Lsyn} 4) ǑÅ í ÝæÙµ Å ² Ú ³ àß ù   F F ÃǑ Ù ² 4. ² Â Ô ²  ð Ð (¹Ì Ǒ A ĐǑ L ) Ë ² ùǒñ

4 3 å ñè ¹ MP3 ß 51 1) Í ½ 3 ù A ËÆ ó ù ÞĐ S ) A ½ H DWT A HC H H 1,D,D,,D A H 3) Õ A H DCT H = DCT(A ) = {a (t) HC, t < / L H} 4)  ²  Ǒ W = w (i,j) = ŵ (i,j) = a (t) HC / S 1 mod Ô w r(i,j) W r, ŵ (i,j) Ŵ 5  { 1 Âwr (i,j) è ( õè ) Ǒ 1 à ǑÅ Ý ß Ô ½ÅÙ Íý þíý û Þ [8] ß ½Å ³ ü ½Æð Ǒ 44.1 khz Ǒ 16 ³ ĐǑ 9.75 ² Å Daubechies-1 ü Ǒ H = ûü Å ĐǑ 16 Ò Ǒ ² Ù ð ü  ² Æð Ç Ä 1 Å ß Þ [8] ß þ Í Â (íµ Â ä èþ ³ NC ä BER ( i < M, j < N,t = (i 1) N + j) 5)  ² W ½ è ç ä W = {w (i,j), i < M, j < N} Á ð Ù ² Å ÙÄ Â ä Wr Á èí Ã Ç Ŵ Ä 1 þ ¹ Í Table 1 The watermark detection results for various attacks (r = 1,,,R) Ǒ (r = 1,,,R) ô ² ³ PSNR)  Åè ó ó ß Ì ßÍÅ Äü Ǒ 16 Ò Ǒ ÁÈ ËÆ ó ù ÞĐ Ç æ ² ó Ë Ë î å Ä Â ß Đ Í Þ á Ð Ò þ Ç» Ì ß Ù Ǒ MP3 þ Ö ¹ Í ( ðô ³ ) ß Ç ß Æð Ý îá ½Æ ÇÖÅ Ù MP3 Ï Ó éþ Þ Ô Ð Ð Ñ Mp3 Mp3 Mp3 Mp3 Mp3 Mp3.5kHz 11.5kHz 8kHz 1% 1% 3k 56k 11k 64k 48k 3k Þ NC [8] BER ß PSNR NC ß BER PSNR

5 5 Þ 33 References 1 Kim H J. Audio watermarking techniques. In: Proceedings of Pacific Rim Workshop on Digital Steganography, Kyushu Institute of Technology, Kitakyushu, Japan, July 3 4, 3 Lie W N, Chang L C. Robust and high-quality time-domain audio watermarking subject to psycho acoustic masking. In: Proceedings of the IEEE International Symposium on Circuits and Systems. Arizona, USA,. : Yeo Kwon, Kim H J. Modified patchwork algorithm: A novel audio watermarking scheme. IEEE Transactions on Speech and Audio Processing, 3, 11(6): Li Wei, Yuan Yi-Qun, Li Xiao-Qiang, Xue Xiang-Yang, Lu Pei-Zhong. Overview of digital audio watermarking. Journal on Communications, 5, 6(): (Óå, è, Ó Ö, å, ö. Ò. ², 5, 6(): ) 5 Xu C, Wu J, Sun Q, Xin K. Applications of digital watermarking technology in audio signals. Journal of the Audio Engineering Society, 1999, 47(1): Swanson D., Zhu B., Tewfik H. Robust audio watermarking using perceptual masking. Signal Processing, 1998, 66(6): Zhao Chun-Hui, Li Fu-Chang. A blind audio watermark algorithm based on DWT and DCT. Journal of Electronics & Information Technology, 3, 5(11): ( ËÞ, Ó. è DWT DCT ß. ², 3, 5(11): ) 8 Megías D, Herrera-joancomartí J, Minguillón J. A robust audio watermarking scheme based on MPEG 1 layer ¼ compression. Communications and Multimedia Security - CMS 3, Springer-Verlag, LNCS 963: å Ûã Ç ² íµ ² Ë ÜƲ Ò. ². wxy37@63.net (WANG Xiang-Yang Professor. His research interest covers information security and multimedia processing. Corresponding author of this paper.) Ä Ûã Ç ² íµ Ü Æ Ç. (YANG Hong-Ying Associate professor. Her research interest covers multimedia technique and CAI.) Ûã Ç ² µ íµ². (ZHAO Hong Master student at Liaoning Normal University. Her research interest covers information security and digital watermarking.)

â, Đ (Very Long Baseline Interferometry, VLBI)

â, Đ (Very Long Baseline Interferometry, VLBI) ½ 55 ½ 5 Í Vol.55 No.5 2014 9 ACTA ASTRONOMICA SINICA Sep., 2014» Á Çý è 1,2 1,2 å 1,2 Ü ô 1,2 ï 1,2 ï 1,2 à 1,3 Æ Ö 3 ý (1 Á Í 200030) (2 Á Í û À 210008) (3 541004) ÇÅè 1.5 GHz Á è, î Í, û ÓÆ Å ò ½Ò ¼ï.

More information

! " # $! % & '! , ) ( + - (. ) ( ) * + / 0 1 2 3 0 / 4 5 / 6 0 ; 8 7 < = 7 > 8 7 8 9 : Œ Š ž P P h ˆ Š ˆ Œ ˆ Š ˆ Ž Ž Ý Ü Ý Ü Ý Ž Ý ê ç è ± ¹ ¼ ¹ ä ± ¹ w ç ¹ è ¼ è Œ ¹ ± ¹ è ¹ è ä ç w ¹ ã ¼ ¹ ä ¹ ¼ ¹ ±

More information

Pose Determination from a Single Image of a Single Parallelogram

Pose Determination from a Single Image of a Single Parallelogram Ê 32 Ê 5 ¾ Vol.32, No.5 2006 9 ACTA AUTOMATICA SINICA September, 2006 Û Ê 1) 1, 2 2 1 ( ÔÅ Æ 100041) 2 (Ñ Ò º 100037 ) (E-mail: fmsun@163.com) ¼ÈÙ Æ Ü Äµ ÕÑ ÅÆ ¼ÈÙ ÆÄ Ä Äº ¼ÈÙ ÆÄ Ü ÜÓ µ É» Ì É»²ÂÄÎ ¼ÐÅÄÕ

More information

This document has been prepared by Sunder Kidambi with the blessings of

This document has been prepared by Sunder Kidambi with the blessings of Ö À Ö Ñ Ø Ò Ñ ÒØ Ñ Ý Ò Ñ À Ö Ñ Ò Ú º Ò Ì ÝÊ À Å Ú Ø Å Ê ý Ú ÒØ º ÝÊ Ú Ý Ê Ñ º Å º ² ºÅ ý ý ý ý Ö Ð º Ñ ÒÜ Æ Å Ò Ñ Ú «Ä À ý ý This document has been prepared by Sunder Kidambi with the blessings of Ö º

More information

An Example file... log.txt

An Example file... log.txt # ' ' Start of fie & %$ " 1 - : 5? ;., B - ( * * B - ( * * F I / 0. )- +, * ( ) 8 8 7 /. 6 )- +, 5 5 3 2( 7 7 +, 6 6 9( 3 5( ) 7-0 +, => - +< ( ) )- +, 7 / +, 5 9 (. 6 )- 0 * D>. C )- +, (A :, C 0 )- +,

More information

A Double-objective Rank Level Classifier Fusion Method

A Double-objective Rank Level Classifier Fusion Method ½ 33 ½ 2 Þ Vol. 33, No. 2 2007 2 ACTA AUTOMATICA SINICA December, 2007 è Î Á Ë Ãàß Ñ ý Melnik  Åè Ë Ã, ÃÄ É Æ, Õ Ë Â è²². ð Melnik  Ãàß, á Ç ÇĐ, Ç î µá»â Ã. Melnik Ù,  Åè Ãàß, Ìàß Ë ÆÆ, ÍÅ» Ý Melnik

More information

Price discount model for coordination of dual-channel supply chain under e-commerce

Price discount model for coordination of dual-channel supply chain under e-commerce ½ 27 ½ 3 2012 6 JOURNAL OF SYSTEMS ENGINEERING Vol.27 No.3 Jun. 2012 ô Î ÆÆ î º žâ, Ê ( ï Ä Ò, ï 400044) ý : ô íûđ Î, ë Ǒ à Stackelberg, ÅÍÅÆÆÎ î º. ÝÅ îææ ë,ǒ ÍÅÇ Î, ðë ëä.ǒ, ÇÅè ëë ÍÅ ÎÁ., Ä Ù Å Ç ÆÆ

More information

EXTRACT THE PLASTIC PROPERTIES OF METALS US- ING REVERSE ANALYSIS OF NANOINDENTATION TEST

EXTRACT THE PLASTIC PROPERTIES OF METALS US- ING REVERSE ANALYSIS OF NANOINDENTATION TEST 47 3 Vol.47 No.3 211 Ê 3 321 326 ACTA METALLURGICA SINICA Mar. 211 pp.321 326 ±Á Æ ½ Å³Æ ¹ 1 Î 1 ÏÍ 1 1 Ì 2 Ë 1 1 ¾ Þº, ¾ 324 2 ¾ ³» Í Þº, ¾ 324 Æ ± Ó Ó ÆÏÞØ,  ¼ ± È Á ÅÛ ÖÝÛ, Ó Ó Ï ¼ ±. º Ì Ï, Á ÅÛ ÖÝÛ

More information

Adaptive Audio Watermarking via the Optimization. Point of View on the Wavelet-Based Entropy

Adaptive Audio Watermarking via the Optimization. Point of View on the Wavelet-Based Entropy Adaptive Audio Watermarking via the Optimization Point of View on the Wavelet-Based Entropy Shuo-Tsung Chen, Huang-Nan Huang 1 and Chur-Jen Chen Department of Mathematics, Tunghai University, Taichung

More information

Ä D C Ã F D {f n } F,

Ä D C à F D {f n } F, 2016, 37A(2):233 242 DOI: 1016205/jcnkicama20160020 Í Æ ß È Õ Ä Ü È Ø Ó Đ * 1 2 3 Ð Ã µ½ ¹Ï ½» ÒÄà µ½ Í ÞÞ Ï Å ¹Ï µ½ MR (2010) Î 30D35, 30D45 Ð ÌÎ O17452 Ñ A ÛÁ 1000-8314(2016)02-0233-10 1 Ú Ö Ä D C Ã

More information

Surface Modification of Nano-Hydroxyapatite with Silane Agent

Surface Modification of Nano-Hydroxyapatite with Silane Agent ß 23 ß 1 «Ã Vol. 23, No. 1 2008 Ç 1 Journal of Inorganic Materials Jan., 2008» : 1000-324X(2008)01-0145-05 Þ¹ Ò À Đ³ Ù Å Ð (ÎÄÅ Ç ÂÍ ËÊÌÏÁÉ È ÃÆ 610064) Ì É (KH-560) ¼ ³ (n-ha) ³ ËØ ÌË n-ha KH-560 Õ Ì»Þ

More information

Vectors. Teaching Learning Point. Ç, where OP. l m n

Vectors. Teaching Learning Point. Ç, where OP. l m n Vectors 9 Teaching Learning Point l A quantity that has magnitude as well as direction is called is called a vector. l A directed line segment represents a vector and is denoted y AB Å or a Æ. l Position

More information

A Modified Moment-Based Image Watermarking Method Robust to Cropping Attack

A Modified Moment-Based Image Watermarking Method Robust to Cropping Attack A Modified Moment-Based Watermarking Method Robust to Cropping Attack Tianrui Zong, Yong Xiang, and Suzan Elbadry School of Information Technology Deakin University, Burwood Campus Melbourne, Australia

More information

ADVANCES IN MATHEMATICS(CHINA)

ADVANCES IN MATHEMATICS(CHINA) Æ Ý ¹ ADVANCES IN MATHEMATICS(CHINA) 0 median Đ Ó ( ºÕ ³,, ÓÚ, 330013) doi: 10.11845/sxjz.2012080b : u,v ¹ w G, z ÁÇÉ Ë½ ±, È z À u,v ¹ w Ä median. G À²Ï median, G Î Å Ì ÆÄ median. à ²Ï median µ» ÂÍ, ¾

More information

Thermal Conductivity of Electric Molding Composites Filled with β-si 3 N 4

Thermal Conductivity of Electric Molding Composites Filled with β-si 3 N 4 22 Ê 6  ŠVol. 22, No. 6 2007 11 à Journal of Inorganic Materials Nov., 2007 Ð ¹: 1000-324X(200706-1201-05 β-si 3 N 4 / ¾Ú Đ Â ÉÓÅÖ ¼» 1, ³ º 1, µ² 2, ¹ 3 (1. ÅƱ 100084; 2. 100081; 3. ««210016 Û«º β-si

More information

2008, hm 2. ( Commodity Bundle) [ 6], 25 4 Vol. 25 No JOURNAL OF NATURAL RESOURCES Apr., , 2, 3, 1, 2 3*,

2008, hm 2. ( Commodity Bundle) [ 6], 25 4 Vol. 25 No JOURNAL OF NATURAL RESOURCES Apr., , 2, 3, 1, 2 3*, 25 4 Vol. 25 No. 4 2010 4 JOURNAL OF NATURAL RESOURCES Apr., 2010 1, 2, 3, 3*, 3, 3, 1, 2 ( 1., 100101; 2., 100049; 3., 100193) :,,,,, ;, 2005, 12 7 5, 2005 :,,, : ; ; ; ; : F301. 21 : A : 1000-3037( 2010)

More information

Audio Zero-Watermarking Based on Discrete Hartley Transform and Non-Negative Matrix Factorization

Audio Zero-Watermarking Based on Discrete Hartley Transform and Non-Negative Matrix Factorization IJCSNS International Journal of Computer Science and Networ Security, VOL7 No8, August 207 Audio Zero-Watermaring Based on Discrete Hartley Transform and Non-Negative Matrix Factorization Pranab Kumar

More information

Ú Bruguieres, A. Virelizier, A. [4] Á «Î µà Monoidal

Ú Bruguieres, A. Virelizier, A. [4] Á «Î µà Monoidal 40 2 Æ Vol.40, No.2 2011 4 ADVANCES IN MATHEMATICS April, 2011 273165) T- ÆÖ Ñ Ó 1,, 2 (1. È Ä È 832003; 2. È Ä È Ì. ½ A- (coring) T- (comonad) ( ± A º ¼ T º (monad)).» ³¹ (firm) µ ³ Frobenius ² ¾ ³ ¾

More information

Planning for Reactive Behaviors in Hide and Seek

Planning for Reactive Behaviors in Hide and Seek University of Pennsylvania ScholarlyCommons Center for Human Modeling and Simulation Department of Computer & Information Science May 1995 Planning for Reactive Behaviors in Hide and Seek Michael B. Moore

More information

F O R SOCI AL WORK RESE ARCH

F O R SOCI AL WORK RESE ARCH 7 TH EUROPE AN CONFERENCE F O R SOCI AL WORK RESE ARCH C h a l l e n g e s i n s o c i a l w o r k r e s e a r c h c o n f l i c t s, b a r r i e r s a n d p o s s i b i l i t i e s i n r e l a t i o n

More information

Digital Image Watermarking Algorithm Based on Wavelet Packet

Digital Image Watermarking Algorithm Based on Wavelet Packet www.ijcsi.org 403 Digital Image ing Algorithm Based on Wavelet Packet 1 A.Geetha, 2 B.Vijayakumari, 3 C.Nagavani, 4 T.Pandiselvi 1 3 4 Faculty of Kamaraj College of Engineering and Technology Department

More information

Research Article Effect of Different Places in Applying Laplacian Filter on the Recovery Algorithm in Spatial Domain Watermarking

Research Article Effect of Different Places in Applying Laplacian Filter on the Recovery Algorithm in Spatial Domain Watermarking Research Journal of Applied Sciences, Engineering and Technology 7(24): 5157-5162, 2014 DOI:10.19026/rjaset.7.912 ISSN: 2040-7459; e-issn: 2040-7467 2014 Maxwell Scientific Publication Corp. Submitted:

More information

Application of ICA and PCA to extracting structure from stock return

Application of ICA and PCA to extracting structure from stock return 2014 3 Å 28 1 Ð Mar. 2014 Communication on Applied Mathematics and Computation Vol.28 No.1 DOI 10.3969/j.issn.1006-6330.2014.01.012 Ç ÖÇ Ú ¾Ä Î Þ Ý ( 200433) Ç È ß ³ Õº º ÅÂÞÐÆÈÛ CAC40 Õ Û ËÛ ¾ ÆÄ (ICA)

More information

Framework for functional tree simulation applied to 'golden delicious' apple trees

Framework for functional tree simulation applied to 'golden delicious' apple trees Purdue University Purdue e-pubs Open Access Theses Theses and Dissertations Spring 2015 Framework for functional tree simulation applied to 'golden delicious' apple trees Marek Fiser Purdue University

More information

ETIKA V PROFESII PSYCHOLÓGA

ETIKA V PROFESII PSYCHOLÓGA P r a ž s k á v y s o k á š k o l a p s y c h o s o c i á l n í c h s t u d i í ETIKA V PROFESII PSYCHOLÓGA N a t á l i a S l o b o d n í k o v á v e d ú c i p r á c e : P h D r. M a r t i n S t r o u

More information

APPARENT AND PHYSICALLY BASED CONSTITUTIVE ANALYSES FOR HOT DEFORMATION OF AUSTENITE IN 35Mn2 STEEL

APPARENT AND PHYSICALLY BASED CONSTITUTIVE ANALYSES FOR HOT DEFORMATION OF AUSTENITE IN 35Mn2 STEEL 49 6 Vol49 No6 213 6 731 738 ACTA METALLURGICA SINICA Jun 213 pp731 738 º à 35Mn2 ³Í Ê Ü 1) ĐÛ 1,2) 1) Æ Ý 2) 1) ű± ± ±, 183 2) ű Û¼± ¼», 183 Ð Ê µ ¼ 3 Æ ² Ù, ÛÎ 35Mn2 Æ ²µÛ ºÐ Î Ç Đ ¹Ù ² ¾ ÜÜĐ ², Ù

More information

" #$ P UTS W U X [ZY \ Z _ `a \ dfe ih j mlk n p q sr t u s q e ps s t x q s y i_z { U U z W } y ~ y x t i e l US T { d ƒ ƒ ƒ j s q e uˆ ps i ˆ p q y

 #$ P UTS W U X [ZY \ Z _ `a \ dfe ih j mlk n p q sr t u s q e ps s t x q s y i_z { U U z W } y ~ y x t i e l US T { d ƒ ƒ ƒ j s q e uˆ ps i ˆ p q y " #$ +. 0. + 4 6 4 : + 4 ; 6 4 < = =@ = = =@ = =@ " #$ P UTS W U X [ZY \ Z _ `a \ dfe ih j mlk n p q sr t u s q e ps s t x q s y i_z { U U z W } y ~ y x t i e l US T { d ƒ ƒ ƒ j s q e uˆ ps i ˆ p q y h

More information

General Neoclassical Closure Theory: Diagonalizing the Drift Kinetic Operator

General Neoclassical Closure Theory: Diagonalizing the Drift Kinetic Operator General Neoclassical Closure Theory: Diagonalizing the Drift Kinetic Operator E. D. Held eheld@cc.usu.edu Utah State University General Neoclassical Closure Theory:Diagonalizing the Drift Kinetic Operator

More information

LA PRISE DE CALAIS. çoys, çoys, har - dis. çoys, dis. tons, mantz, tons, Gas. c est. à ce. C est à ce. coup, c est à ce

LA PRISE DE CALAIS. çoys, çoys, har - dis. çoys, dis. tons, mantz, tons, Gas. c est. à ce. C est à ce. coup, c est à ce > ƒ? @ Z [ \ _ ' µ `. l 1 2 3 z Æ Ñ 6 = Ð l sl (~131 1606) rn % & +, l r s s, r 7 nr ss r r s s s, r s, r! " # $ s s ( ) r * s, / 0 s, r 4 r r 9;: < 10 r mnz, rz, r ns, 1 s ; j;k ns, q r s { } ~ l r mnz,

More information

Study of Wavelet Functions of Discrete Wavelet Transformation in Image Watermarking

Study of Wavelet Functions of Discrete Wavelet Transformation in Image Watermarking Study of Wavelet Functions of Discrete Wavelet Transformation in Image Watermarking Navdeep Goel 1,a, Gurwinder Singh 2,b 1ECE Section, Yadavindra College of Engineering, Talwandi Sabo 2Research Scholar,

More information

Wavelet-based Audio Watermarking Techniques: Robustness and Fast Synchronization

Wavelet-based Audio Watermarking Techniques: Robustness and Fast Synchronization Wavelet-based Audio Watermarking Techniques: Robustness and Fast Synchronization Hong Oh Kim Bae Keun Lee Nam-Yong Lee Abstract This paper describes a novel technique for embedding watermark bits into

More information

Affine-invariant Shape Recognition Using Grassmann Manifold

Affine-invariant Shape Recognition Using Grassmann Manifold ½ 38 ½ 2 Þ Vol. 38, No. 2 2012 2 ACTA AUTOMATICA SINICA February, 2012 Ù Grassmann» å» Ç 1, 2, 3, 4 Ó¾å 5 Ä ý Kendall» èñò ó Ù Õ, ää ÁÙµ» ì»î Ì å ǑÜ. Ù Grassmann»Ò, Åå» èñ ê,  Š٠Grassmann» å» Ç ß. ß

More information

$%! & (, -3 / 0 4, 5 6/ 6 +7, 6 8 9/ 5 :/ 5 A BDC EF G H I EJ KL N G H I. ] ^ _ ` _ ^ a b=c o e f p a q i h f i a j k e i l _ ^ m=c n ^

$%! & (, -3 / 0 4, 5 6/ 6 +7, 6 8 9/ 5 :/ 5 A BDC EF G H I EJ KL N G H I. ] ^ _ ` _ ^ a b=c o e f p a q i h f i a j k e i l _ ^ m=c n ^ ! #" $%! & ' ( ) ) (, -. / ( 0 1#2 ' ( ) ) (, -3 / 0 4, 5 6/ 6 7, 6 8 9/ 5 :/ 5 ;=? @ A BDC EF G H I EJ KL M @C N G H I OPQ ;=R F L EI E G H A S T U S V@C N G H IDW G Q G XYU Z A [ H R C \ G ] ^ _ `

More information

Rotation, scale and translation invariant digital image watermarking. O'RUANAIDH, Joséph John, PUN, Thierry. Abstract

Rotation, scale and translation invariant digital image watermarking. O'RUANAIDH, Joséph John, PUN, Thierry. Abstract Proceedings Chapter Rotation, scale and translation invariant digital image watermarking O'RUANAIDH, Joséph John, PUN, Thierry Abstract A digital watermark is an invisible mark embedded in a digital image

More information

Geometric Invariant Semi-fragile Image Watermarking Using Real Symmetric Matrix

Geometric Invariant Semi-fragile Image Watermarking Using Real Symmetric Matrix Tamkang Journal of Science and Engineering, Vol. 10, No. 3, pp. 211220 (2007) 211 Geometric Invariant Semi-fragile Image Watermarking Using Real Symmetric Matrix Ching-Tang Hsieh 1 *, Yeh-Kuang Wu 1 and

More information

UNIQUE FJORDS AND THE ROYAL CAPITALS UNIQUE FJORDS & THE NORTH CAPE & UNIQUE NORTHERN CAPITALS

UNIQUE FJORDS AND THE ROYAL CAPITALS UNIQUE FJORDS & THE NORTH CAPE & UNIQUE NORTHERN CAPITALS Q J j,. Y j, q.. Q J & j,. & x x. Q x q. ø. 2019 :. q - j Q J & 11 Y j,.. j,, q j q. : 10 x. 3 x - 1..,,. 1-10 ( ). / 2-10. : 02-06.19-12.06.19 23.06.19-03.07.19 30.06.19-10.07.19 07.07.19-17.07.19 14.07.19-24.07.19

More information

Periodic monopoles and difference modules

Periodic monopoles and difference modules Periodic monopoles and difference modules Takuro Mochizuki RIMS, Kyoto University 2018 February Introduction In complex geometry it is interesting to obtain a correspondence between objects in differential

More information

T T V e g em D e j ) a S D } a o "m ek j g ed b m "d mq m [ d, )

T T V e g em D e j ) a S D } a o m ek j g ed b m d mq m [ d, ) . ) 6 3 ; 6 ;, G E E W T S W X D ^ L J R Y [ _ ` E ) '" " " -, 7 4-4 4-4 ; ; 7 4 4 4 4 4 ;= : " B C CA BA " ) 3D H E V U T T V e g em D e j ) a S D } a o "m ek j g ed b m "d mq m [ d, ) W X 6 G.. 6 [ X

More information

LATTICE VECTOR QUANTIZATION FOR IMAGE CODING USING EXPANSION OF CODEBOOK

LATTICE VECTOR QUANTIZATION FOR IMAGE CODING USING EXPANSION OF CODEBOOK LATTICE VECTOR QUANTIZATION FOR IMAGE CODING USING EXPANSION OF CODEBOOK R. R. Khandelwal 1, P. K. Purohit 2 and S. K. Shriwastava 3 1 Shri Ramdeobaba College Of Engineering and Management, Nagpur richareema@rediffmail.com

More information

Anti-synchronization of a new hyperchaotic system via small-gain theorem

Anti-synchronization of a new hyperchaotic system via small-gain theorem Anti-synchronization of a new hyperchaotic system via small-gain theorem Xiao Jian( ) College of Mathematics and Statistics, Chongqing University, Chongqing 400044, China (Received 8 February 2010; revised

More information

Wavelet Packet Based Digital Image Watermarking

Wavelet Packet Based Digital Image Watermarking Wavelet Packet Based Digital Image ing A.Adhipathi Reddy, B.N.Chatterji Department of Electronics and Electrical Communication Engg. Indian Institute of Technology, Kharagpur 72 32 {aar, bnc}@ece.iitkgp.ernet.in

More information

Radiative Electroweak Symmetry Breaking with Neutrino Effects in Supersymmetric SO(10) Unifications

Radiative Electroweak Symmetry Breaking with Neutrino Effects in Supersymmetric SO(10) Unifications KEKPH06 p.1/17 Radiative Electroweak Symmetry Breaking with Neutrino Effects in Supersymmetric SO(10) Unifications Kentaro Kojima Based on the work with Kenzo Inoue and Koichi Yoshioka (Department of Physics,

More information

Double Sided Watermark Embedding and Detection with Perceptual Analysis

Double Sided Watermark Embedding and Detection with Perceptual Analysis DOUBLE SIDED WATERMARK EMBEDDIG AD DETECTIO WITH PERCEPTUAL AALYSIS Double Sided Watermark Embedding and Detection with Perceptual Analysis Jidong Zhong and Shangteng Huang Abstract In our previous work,

More information

On the average diameter of directed loop networks

On the average diameter of directed loop networks 34 2 Vol.34 No. 2 203 2 Journal on Communications February 203 doi:0.3969/j.issn.000-436x.203.02.07 2. 243002 2. 24304 L- 4 a b p q 2 L- TP393.0 B 000-436X(203)02-038-09 On the average diameter of directed

More information

TELEMATICS LINK LEADS

TELEMATICS LINK LEADS EEAICS I EADS UI CD PHOE VOICE AV PREIU I EADS REQ E E A + A + I A + I E B + E + I B + E + I B + E + H B + I D + UI CD PHOE VOICE AV PREIU I EADS REQ D + D + D + I C + C + C + C + I G G + I G + I G + H

More information

QUESTIONS ON QUARKONIUM PRODUCTION IN NUCLEAR COLLISIONS

QUESTIONS ON QUARKONIUM PRODUCTION IN NUCLEAR COLLISIONS International Workshop Quarkonium Working Group QUESTIONS ON QUARKONIUM PRODUCTION IN NUCLEAR COLLISIONS ALBERTO POLLERI TU München and ECT* Trento CERN - November 2002 Outline What do we know for sure?

More information

Examination paper for TFY4240 Electromagnetic theory

Examination paper for TFY4240 Electromagnetic theory Department of Physics Examination paper for TFY4240 Electromagnetic theory Academic contact during examination: Associate Professor John Ove Fjærestad Phone: 97 94 00 36 Examination date: 16 December 2015

More information

Efficient Estimation for the Partially Linear Models with Random Effects

Efficient Estimation for the Partially Linear Models with Random Effects A^VÇÚO 1 33 ò 1 5 Ï 2017 c 10 Chinese Journal of Applied Probability and Statistics Oct., 2017, Vol. 33, No. 5, pp. 529-537 doi: 10.3969/j.issn.1001-4268.2017.05.009 Efficient Estimation for the Partially

More information

Max. Input Power (W) Input Current (Arms) Dimming. Enclosure

Max. Input Power (W) Input Current (Arms) Dimming. Enclosure Product Overview XI025100V036NM1M Input Voltage (Vac) Output Power (W) Output Voltage Range (V) Output urrent (A) Efficiency@ Max Load and 70 ase Max ase Temp. ( ) Input urrent (Arms) Max. Input Power

More information

PART IV LIVESTOCK, POULTRY AND FISH PRODUCTION

PART IV LIVESTOCK, POULTRY AND FISH PRODUCTION ! " $#%(' ) PART IV LIVSTOCK, POULTRY AND FISH PRODUCTION Table (93) MAIN GROUPS OF ANIMAL PRODUCTS Production 1000 M.T Numbers 1000 Head Type 2012 Numbers Cattle 54164.5 53434.6 Buffaloes 4304.51 4292.51

More information

An improved algorithm for scheduling two identical machines with batch delivery consideration

An improved algorithm for scheduling two identical machines with batch delivery consideration 01c $ Ê Æ Æ 117ò 11Ï March, 01 Operations Research Transactions Vol.17 No.1 1$ÑüÓ.ÅüS KU?Ž{ [ 1 4Šz 1, Á ïä 1$ÑüÓ.ÅüS K. T K ó üó.åþ\ó óó d ýnþ z $Ñ r. ùpbó køóônœ 8I žml kó xˆ r Åì žm Ñ ( 14 + ε)-cq 9

More information

Two-stage Pedestrian Detection Based on Multiple Features and Machine Learning

Two-stage Pedestrian Detection Based on Multiple Features and Machine Learning 38 3 Vol. 38, No. 3 2012 3 ACTA AUTOMATICA SINICA March, 2012 1 1 1, (Adaboost) (Support vector machine, SVM). (Four direction features, FDF) GAB (Gentle Adaboost) (Entropy-histograms of oriented gradients,

More information

Unit 3. Digital encoding

Unit 3. Digital encoding Unit 3. Digital encoding Digital Electronic Circuits (Circuitos Electrónicos Digitales) E.T.S.I. Informática Universidad de Sevilla 9/2012 Jorge Juan 2010, 2011, 2012 You are free to

More information

OC330C. Wiring Diagram. Recommended PKH- P35 / P50 GALH PKA- RP35 / RP50. Remarks (Drawing No.) No. Parts No. Parts Name Specifications

OC330C. Wiring Diagram. Recommended PKH- P35 / P50 GALH PKA- RP35 / RP50. Remarks (Drawing No.) No. Parts No. Parts Name Specifications G G " # $ % & " ' ( ) $ * " # $ % & " ( + ) $ * " # C % " ' ( ) $ * C " # C % " ( + ) $ * C D ; E @ F @ 9 = H I J ; @ = : @ A > B ; : K 9 L 9 M N O D K P D N O Q P D R S > T ; U V > = : W X Y J > E ; Z

More information

u x + u y = x u . u(x, 0) = e x2 The characteristics satisfy dx dt = 1, dy dt = 1

u x + u y = x u . u(x, 0) = e x2 The characteristics satisfy dx dt = 1, dy dt = 1 Õ 83-25 Þ ÛÐ Þ Ð ÚÔÜØ Þ ÝÒ Þ Ô ÜÞØ ¹ 3 Ñ Ð ÜÞ u x + u y = x u u(x, 0) = e x2 ÝÒ Þ Ü ÞØ º½ dt =, dt = x = t + c, y = t + c 2 We can choose c to be zero without loss of generality Note that each characteristic

More information

An Introduction to Optimal Control Applied to Disease Models

An Introduction to Optimal Control Applied to Disease Models An Introduction to Optimal Control Applied to Disease Models Suzanne Lenhart University of Tennessee, Knoxville Departments of Mathematics Lecture1 p.1/37 Example Number of cancer cells at time (exponential

More information

2016 xó ADVANCES IN MATHEMATICS(CHINA) xxx., 2016

2016 xó ADVANCES IN MATHEMATICS(CHINA) xxx., 2016 µ45 µx ½ Ù Vol.45, No.x 206 xó ADVANCES IN MATHEMATICS(CHINA) xxx., 206 doi: 0.845/sxjz.2050b ²Â» µ ¼ Ulam È ( Ų¼ Ò¼ Ã,,, 747000) : ÉÐ Ì Õ ÎÏÓ, ÊÔ Í - Í Ë 6f(x+y) 6f(x y)+4f(3y) = 3f(x+2y) 3f(x 2y)+9f(2y)

More information

Spread Spectrum Watermarking. Information Technologies for IPR Protection

Spread Spectrum Watermarking. Information Technologies for IPR Protection Spread Spectrum Watermarking Information Technologies for IPR Protection Spread Spectrum Communication A Narrow-band signal is transmitted over a much larger bandwidth such that the signal energy presented

More information

I118 Graphs and Automata

I118 Graphs and Automata I8 Graphs and Automata Takako Nemoto http://www.jaist.ac.jp/ t-nemoto/teaching/203--.html April 23 0. Û. Û ÒÈÓ 2. Ø ÈÌ (a) ÏÛ Í (b) Ø Ó Ë (c) ÒÑ ÈÌ (d) ÒÌ (e) É Ö ÈÌ 3. ÈÌ (a) Î ÎÖ Í (b) ÒÌ . Û Ñ ÐÒ f

More information

Applications of Discrete Mathematics to the Analysis of Algorithms

Applications of Discrete Mathematics to the Analysis of Algorithms Applications of Discrete Mathematics to the Analysis of Algorithms Conrado Martínez Univ. Politècnica de Catalunya, Spain May 2007 Goal Given some algorithm taking inputs from some set Á, we would like

More information

Quantization Index Modulation using the E 8 lattice

Quantization Index Modulation using the E 8 lattice 1 Quantization Index Modulation using the E 8 lattice Qian Zhang and Nigel Boston Dept of Electrical and Computer Engineering University of Wisconsin Madison 1415 Engineering Drive, Madison, WI 53706 Email:

More information

A Low Data Complexity Attack on the GMR-2 Cipher Used in the Satellite Phones

A Low Data Complexity Attack on the GMR-2 Cipher Used in the Satellite Phones A Low Data Complexity Attack on the GMR-2 Cipher Used in the atellite Phones Ruilin Li, Heng Li, Chao Li, Bing un National University of Defense Technology, Changsha, China FE 2013, ingapore 11 th ~13

More information

New method for solving nonlinear sum of ratios problem based on simplicial bisection

New method for solving nonlinear sum of ratios problem based on simplicial bisection V Ù â ð f 33 3 Vol33, No3 2013 3 Systems Engineering Theory & Practice Mar, 2013 : 1000-6788(2013)03-0742-06 : O2112!"#$%&')(*)+),-))/0)1)23)45 : A 687:9 1, ;:= 2 (1?@ACBEDCFHCFEIJKLCFFM, NCO 453007;

More information

A New Quantum Watermarking Based on Quantum Wavelet Transforms

A New Quantum Watermarking Based on Quantum Wavelet Transforms Commun. Theor. Phys. 67 207 732 742 Vol. 67, No. 6, June, 207 A New Quantum Watermarking Based on Quantum Wavelet Transforms Shahrokh Heidari, Mosayeb Naseri, 2, Reza Gheibi, 3 Masoud Baghfalaki, 4 Mohammad

More information

3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 REDCLIFF MUNICIPAL PLANNING COMMISSION FOR COMMENT/DISCUSSION DATE: TOPIC: April 27 th, 2018 Bylaw 1860/2018, proposed amendments to the Land Use Bylaw regarding cannabis

More information

A Study on the Analysis of Measurement Errors of Specific Gravity Meter

A Study on the Analysis of Measurement Errors of Specific Gravity Meter HWAHAK KONGHAK Vol. 40, No. 6, December, 2002, pp. 676-680 (2001 7 2, 2002 8 5 ) A Study on the Analysis of Measurement Errors of Specific Gravity Meter Kang-Jin Lee, Jae-Young Her, Young-Cheol Ha, Seung-Hee

More information

ÇÙÐ Ò ½º ÅÙÐ ÔÐ ÔÓÐÝÐÓ Ö Ñ Ò Ú Ö Ð Ú Ö Ð ¾º Ä Ò Ö Ö Ù Ð Ý Ó ËÝÑ ÒÞ ÔÓÐÝÒÓÑ Ð º Ì ÛÓ¹ÐÓÓÔ ÙÒÖ Ö Ô Û Ö Ö ÖÝ Ñ ¹ ÝÓÒ ÑÙÐ ÔÐ ÔÓÐÝÐÓ Ö Ñ

ÇÙÐ Ò ½º ÅÙÐ ÔÐ ÔÓÐÝÐÓ Ö Ñ Ò Ú Ö Ð Ú Ö Ð ¾º Ä Ò Ö Ö Ù Ð Ý Ó ËÝÑ ÒÞ ÔÓÐÝÒÓÑ Ð º Ì ÛÓ¹ÐÓÓÔ ÙÒÖ Ö Ô Û Ö Ö ÖÝ Ñ ¹ ÝÓÒ ÑÙÐ ÔÐ ÔÓÐÝÐÓ Ö Ñ ÅÙÐ ÔÐ ÔÓÐÝÐÓ Ö Ñ Ò ÝÒÑ Ò Ò Ö Ð Ö Ò Ó Ò Ö ÀÍ ÖÐ Òµ Ó Ò ÛÓÖ Û Ö Ò ÖÓÛÒ Ö Ú ½ ¼¾º ¾½ Û Åº Ä Ö Ö Ú ½ ¼¾º ¼¼ Û Äº Ñ Ò Ëº Ï ÒÞ ÖÐ Å ÒÞ ½ º¼ º¾¼½ ÇÙÐ Ò ½º ÅÙÐ ÔÐ ÔÓÐÝÐÓ Ö Ñ Ò Ú Ö Ð Ú Ö Ð ¾º Ä Ò Ö Ö Ù Ð Ý Ó ËÝÑ

More information

Matrices and Determinants

Matrices and Determinants Matrices and Determinants Teaching-Learning Points A matri is an ordered rectanguar arra (arrangement) of numbers and encosed b capita bracket [ ]. These numbers are caed eements of the matri. Matri is

More information

Halftone Image Watermarking by Content Aware Double-sided Embedding Error Diffusion

Halftone Image Watermarking by Content Aware Double-sided Embedding Error Diffusion 1 Halftone Image Watermarking by Content Aware Double-sided Embedding Error Diffusion Yuanfang Guo, Member, IEEE, Oscar C. Au, Fellow, IEEE, Rui Wang, Member, IEEE, Lu Fang, Member, IEEE, Xiaochun Cao,

More information

h : sh +i F J a n W i m +i F D eh, 1 ; 5 i A cl m i n i sh» si N «q a : 1? ek ser P t r \. e a & im a n alaa p ( M Scanned by CamScanner

h : sh +i F J a n W i m +i F D eh, 1 ; 5 i A cl m i n i sh» si N «q a : 1? ek ser P t r \. e a & im a n alaa p ( M Scanned by CamScanner m m i s t r * j i ega>x I Bi 5 n ì r s w «s m I L nk r n A F o n n l 5 o 5 i n l D eh 1 ; 5 i A cl m i n i sh» si N «q a : 1? { D v i H R o s c q \ l o o m ( t 9 8 6) im a n alaa p ( M n h k Em l A ma

More information

Pharmacological and genomic profiling identifies NF-κB targeted treatment strategies for mantle cell lymphoma

Pharmacological and genomic profiling identifies NF-κB targeted treatment strategies for mantle cell lymphoma CORRECTION NOTICE Nat. Med. 0, 87 9 (014) Pharmacoogica and genomic profiing identifies NF-κB targeted treatment strategies for mante ce ymphoma Rami Raha, Mareie Fric, Rodrigo Romero, Joshua M Korn, Robert

More information

arxiv: v1 [astro-ph.im] 25 Apr 2014

arxiv: v1 [astro-ph.im] 25 Apr 2014 CPC(HEP & NP), 9, 33(X): 5 Chinese Physics C Vol. 33, No. X, Xxx, 9 A linear calibration method on DNL error for energy spectrum * arxiv:44.633v [astro-ph.im] 5 Apr 4 LU Bo() ;) FU Yan-Hong(), CHEN Yong()

More information

ACS AKK R0125 REV B 3AKK R0125 REV B 3AKK R0125 REV C KR Effective : Asea Brown Boveri Ltd.

ACS AKK R0125 REV B 3AKK R0125 REV B 3AKK R0125 REV C KR Effective : Asea Brown Boveri Ltd. ACS 100 Í ACS 100 Í 3AKK R0125 REV B 3AKK R0125 REV B 3AKK R0125 REV C KR Effective : 1999.9 1999 Asea Brown Boveri Ltd. 2 ! ACS100 { { ä ~.! ACS100 i{ ~. Õ 5 ˆ Ã ACS100 À Ãåä.! ˆ [ U1, V1, W1(L,N), U2,

More information

Singing voice enhancement for monaural music recordings with a cascade two-stage algorithm

Singing voice enhancement for monaural music recordings with a cascade two-stage algorithm 2018 Ñ 9 Ð Ô 32 Ô 3 Ý Sept. 2018 Communication on Applied Mathematics and Computation Vol.32 No.3 DOI 10.3969/j.issn.1006-6330.2018.03.007 ÂßÑÀ¹ÏÇ ²Å ( 200444) É Ë³Ó²±ĐÀΠе±Ü»Ð À Đ Ñ Ö ÓÛ ¼Ú Í Ð ß ÐÁ

More information

Soil-Water Characteristics of Huai-an Expensive Soil

Soil-Water Characteristics of Huai-an Expensive Soil 20 2 2014 4 JOURNAL OF SHANGHAI UNIVERSITY (NATURAL SCIENCE) Vol. 20 No. 2 Apr. 2014 DOI: 10.3969/j.issn.1007-2861.2013.07.007, (, 200072) :, 3,, 0 378 MPa.,,, 100 MPa, ;., 1 000 MPa.,,, ;,. : ; ; ; ;

More information

Reduced-Error Constant Correction Truncated Multiplier

Reduced-Error Constant Correction Truncated Multiplier This article has been accepted and published on J-STAGE in advance of copyediting. Content is final as presented. IEICE Electronics Express, Vol.*, No.*, 1 8 Reduced-Error Constant Correction Truncated

More information

On solution of Klein-Gordon equation in scalar and vector potentials

On solution of Klein-Gordon equation in scalar and vector potentials On solution of Klein-Gordon equation in salar and vetor potentials Liu Changshi Physis division, Department of mehanial and eletrial engineering, Jiaxing College, Zhejiang, 314001, P. R. China Lius4976@sohu.om

More information

The University of Bath School of Management is one of the oldest established management schools in Britain. It enjoys an international reputation for

The University of Bath School of Management is one of the oldest established management schools in Britain. It enjoys an international reputation for The University of Bath School of Management is one of the oldest established management schools in Britain. It enjoys an international reputation for the quality of its teaching and research. Its mission

More information

Experimental and numerical simulation studies of the squeezing dynamics of the UBVT system with a hole-plug device

Experimental and numerical simulation studies of the squeezing dynamics of the UBVT system with a hole-plug device Experimental numerical simulation studies of the squeezing dynamics of the UBVT system with a hole-plug device Wen-bin Gu 1 Yun-hao Hu 2 Zhen-xiong Wang 3 Jian-qing Liu 4 Xiao-hua Yu 5 Jiang-hai Chen 6

More information

Face Recognition Using Global Gabor Filter in Small Sample Case *

Face Recognition Using Global Gabor Filter in Small Sample Case * ISSN 1673-9418 CODEN JKYTA8 E-mail: fcst@public2.bta.net.cn Journal of Frontiers of Computer Science and Technology http://www.ceaj.org 1673-9418/2010/04(05)-0420-06 Tel: +86-10-51616056 DOI: 10.3778/j.issn.1673-9418.2010.05.004

More information

hal , version 1-27 Mar 2014

hal , version 1-27 Mar 2014 Author manuscript, published in "2nd Multidisciplinary International Conference on Scheduling : Theory and Applications (MISTA 2005), New York, NY. : United States (2005)" 2 More formally, we denote by

More information

TOPOLOGICAL ENTROPY FOR DIFFERENTIABLE MAPS OF INTERVALS

TOPOLOGICAL ENTROPY FOR DIFFERENTIABLE MAPS OF INTERVALS Chung, Y-.M. Osaka J. Math. 38 (200), 2 TOPOLOGICAL ENTROPY FOR DIFFERENTIABLE MAPS OF INTERVALS YONG MOO CHUNG (Received February 9, 998) Let Á be a compact interval of the real line. For a continuous

More information

ISeCure. Nowadays, copyright infringement, unauthorized. The ISC Int'l Journal of Information Security

ISeCure. Nowadays, copyright infringement, unauthorized. The ISC Int'l Journal of Information Security The ISC Int'l Journal of Information Security July 216, Volume 8, Number 2 (pp. 131 139) http://www.isecure-journal.org Optimum Decoder for Multiplicative Spread Spectrum Image Watermarking with Laplacian

More information

Evaluation on source rocks and the oil-source correlation in Bayanhushu sag of Hailaer Basin

Evaluation on source rocks and the oil-source correlation in Bayanhushu sag of Hailaer Basin 30 2 2011 6 GLOBAL GEOLOGY Vol. 30 No. 2 Jun. 2011 1004-5589 2011 02-0231 - 07 163712 3 7 Ⅰ Ⅱ1 3 - - P618. 130 A doi 10. 3969 /j. issn. 1004-5589. 2011. 02. 011 Evaluation on source rocks and the oil-source

More information

ARX System identification of a positioning stage based on theoretical modeling and an ARX model WANG Jing-shu 1 GUO Jie 2 ZHU Chang-an 2

ARX System identification of a positioning stage based on theoretical modeling and an ARX model WANG Jing-shu 1 GUO Jie 2 ZHU Chang-an 2 DOI:10.13465/j.cnki.jvs.2013.13.026 32 13 JOURNAL OF VIBRATION AND SHOCK Vol. 32 No. 13 2013 ARX 1 2 2 1. 400054 2. 230027 ARX ARX ARX TH113 A System identification of a positioning stage based on theoretical

More information

Adaptive synchronization of chaotic neural networks with time delays via delayed feedback control

Adaptive synchronization of chaotic neural networks with time delays via delayed feedback control 2017 º 12 È 31 4 ½ Dec. 2017 Communication on Applied Mathematics and Computation Vol.31 No.4 DOI 10.3969/j.issn.1006-6330.2017.04.002 Adaptive synchronization of chaotic neural networks with time delays

More information

1. INTRODUCTION. Yen-Chung Chiu. Wen-Hsiang Tsai.

1. INTRODUCTION. Yen-Chung Chiu. Wen-Hsiang Tsai. Copyright Protection by Watermarking for Color Images against Rotation and Scaling Attacks Using Coding and Synchronization of Peak Locations in DFT Domain Yen-Chung Chiu Department of Computer and Information

More information

B œ c " " ã B œ c 8 8. such that substituting these values for the B 3 's will make all the equations true

B œ c   ã B œ c 8 8. such that substituting these values for the B 3 's will make all the equations true System of Linear Equations variables Ð unknowns Ñ B" ß B# ß ÞÞÞ ß B8 Æ Æ Æ + B + B ÞÞÞ + B œ, "" " "# # "8 8 " + B + B ÞÞÞ + B œ, #" " ## # #8 8 # ã + B + B ÞÞÞ + B œ, 3" " 3# # 38 8 3 ã + 7" B" + 7# B#

More information

This is a repository copy of The effect of quality scalable image compression on robust watermarking.

This is a repository copy of The effect of quality scalable image compression on robust watermarking. This is a repository copy of The effect of quality scalable image compression on robust watermarking. White Rose Research Online URL for this paper: http://eprints.whiterose.ac.uk/7613/ Conference or Workshop

More information

QISLSQb: A Quantum Image Steganography Scheme Based on Least Significant Qubit

QISLSQb: A Quantum Image Steganography Scheme Based on Least Significant Qubit 06 International Conference on Mathematical, Computational and Statistical Sciences and Engineering (MCSSE 06) ISBN: 978--60595-396-0 QISLSQb: A Quantum Image Steganography Scheme Based on Least Significant

More information

Study on form distribution of soil iron in western Jilin and its correlation with soil properties

Study on form distribution of soil iron in western Jilin and its correlation with soil properties 35 2 2016 6 GLOBAL GEOLOGY Vol. 35 No. 2 Jun. 2016 1004 5589 2016 02 0593 08 1 1 2 1 1 1. 130061 2. 130012 50 A > B > C > D > E > F > G A A CEC B ph C E A C D G B C D P595 S151. 9 A doi 10. 3969 /j. issn.

More information

Finding small factors of integers. Speed of the number-field sieve. D. J. Bernstein University of Illinois at Chicago

Finding small factors of integers. Speed of the number-field sieve. D. J. Bernstein University of Illinois at Chicago The number-field sieve Finding small factors of integers Speed of the number-field sieve D. J. Bernstein University of Illinois at Chicago Prelude: finding denominators 87366 22322444 in R. Easily compute

More information

A Beamforming Method for Blind Calibration of Time-Interleaved A/D Converters

A Beamforming Method for Blind Calibration of Time-Interleaved A/D Converters A Beamforming Method for Blind Calibration of Time-nterleaved A/D Converters Bernard C. Levy University of California, Davis Joint wor with Steve Huang September 30, 200 Outline 1 Motivation Problem Formulation

More information

Laser on-line Thickness Measurement Technology Based on Judgment and Wavelet De-noising

Laser on-line Thickness Measurement Technology Based on Judgment and Wavelet De-noising Sensors & Transducers, Vol. 168, Issue 4, April 214, pp. 137-141 Sensors & Transducers 214 by IFSA Publishing, S. L. http://www.sensorsportal.com Laser on-line Thickness Measurement Technology Based on

More information

One-way Hash Function Based on Neural Network

One-way Hash Function Based on Neural Network One-way Hash Function Based on Neural Network Shiguo Lian, Jinsheng Sun, Zhiquan Wang Department of Automation, Nanjing University of Science & echnology, Nanjing, 294, China, sg_lian@63.com Abstract A

More information

Optimal Time and Random Inspection Policies for Computer Systems

Optimal Time and Random Inspection Policies for Computer Systems Appl. Math. Inf. Sci. 8, No. 1L, 413-417 214) 413 Applied Mathematics & Information Sciences An International Journal http://dx.doi.org/1.12785/amis/81l51 Optimal Time and Random Inspection Policies for

More information

Fast and Automatic Watermark Resynchronization based on Zernike. Moments

Fast and Automatic Watermark Resynchronization based on Zernike. Moments Fast and Automatic Watermark Resynchronization based on Zernike Moments Xiangui Kang a, Chunhui Liu a, Wenjun Zeng b, Jiwu Huang a, Congbai Liu a a Dept. of ECE., Sun Yat-Sen Univ. (Zhongshan Univ.), Guangzhou

More information

Improved Adaptive LSB Steganography based on Chaos and Genetic Algorithm

Improved Adaptive LSB Steganography based on Chaos and Genetic Algorithm Improved Adaptive LSB Steganography based on Chaos and Genetic Algorithm Lifang Yu, Yao Zhao 1, Rongrong Ni, Ting Li Institute of Information Science, Beijing Jiaotong University, BJ 100044, China Abstract

More information

SCOTT PLUMMER ASHTON ANTONETTI

SCOTT PLUMMER ASHTON ANTONETTI 2742 A E E E, UE, AAAMA 3802 231 EE AEA 38,000-cre dversfed federl cmus 41,000 emloyees wth 72+ dfferent gences UE roosed 80-cre mster-lnned develoment 20 home stes 3,000F of vllgestyle retl 100,000 E

More information