An LSB Data Hiding Technique Using Prime Numbers
|
|
- Gyles Thomas
- 6 years ago
- Views:
Transcription
1 An LSB Data Hdng Technque Usng Prme Numbers Sandan Dey (), Aj Abraham (), Sugata Sanya (3) Anshn Software Prvate Lmted, Kokata 79 Centre for Quantfabe Quaty of Servce n Communcaton Systems Norwegan Unversty of Scence and Technoogy, Norway 3 Schoo of Technoogy and Comuter Scence, Tata Insttute of Fundamenta Research, Inda sandandey@gmacom, ajabraham@eeeorg, sanya@tfrresn Abstract In s aer, a nove data hdng technque s roosed, as an mrovement over e Fbonacc LSB data-hdng technque roosed by Battst et a [] Frst we maematcay mode and generaze our aroach Then we roose our nove technque, based on decomoston of a number (xe-vaue) n sum of rme numbers The artcuar reresentaton generates a dfferent set of (vrtua) bt-anes atogeer, sutabe for embeddng uroses They not ony aow one to embed secret message n hgher btanes but aso do t wout much dstorton, w a much better stego-mage quaty, and n a reabe and secured manner, guaranteeng effcent retreva of secret message A comaratve erformance study between e cassca Least Sgnfcant Bt (LSB) meod, e Fbonacc LSB data-hdng technque and our roosed schemes has been done Anayss ndcates at mage quaty of e stego-mage hdden by e technque usng Fbonacc decomoston mroves aganst at usng sme LSB substtuton meod, whe e same usng e rme decomoston meod mroves drastcay aganst at usng Fbonacc decomoston technque Exermenta resuts show at, e stego-mage s vsuay ndstngushabe from e orgna cover-mage Introducton Data hdng technque s a new knd of secret communcaton technoogy Whe crytograhy scrambes e message so at t can t be understood, steganograhy hdes e data so at t can t be observed In s aer, we dscuss about a new decomoston meod for cassca LSB data-hdng technque, n order to make e technque more secure and hence ess redctabe We generate a new set of (vrtua) bt anes usng our decomoston technque and embed data bt n ese bt anes Fbonacc LSB Data Hdng Technque The am of s artcuar technque (roosed by Battst et a) s to nvestgate decomoston nto dfferent bt-anes, based on Fbonacc -sequences, F () = F () = F ( n) = F ( n ) F ( n ), n, n Ν and embed a secret message-bt nto a xe f t asses e Zeckendorf condton, en durng extracton, foow e reverse rocedure 3 A Generazed LSB Data Hdng and e Prme Decomoston Technque Fgure Generazed data-hdng technque If we have k-bt cover mage, ony k bt-anes are avaabe to embed secret data Dstorton ncreases exonentay w ncreasng bt-ane, t becomes mossbe to embed data n hgher bt-anes So, our rmary target here s to ncrease e tota number of avaabe (and embeddabe) bt anes wout much dstorton To do s, we try to fnd a functon f at ncreases e number of bt-anes (for a k-bt mage) from k to n, n k, by convertng to some oer bnary number system w dfferent weghts, ensurng at number of bts taken to reresent e
2 same xe s greater an at of cassca bnary (ese extra bt-anes are referred to as vrtua bt-anes), aso ensurng ess abrut change n xe vaue w ncreasng bt ane It aows hgher (vrtua) bt anes to be used to embed data w much ess dstorton Fgures and exan s concet Fgure Iustraton of embeddng secret data-bt 3 The Number System We defne a number system by defnng: A constant, caed base or radx r (dgts of e,, r number system { } A functon, caed weght functon W (), where W () denotes weght corresondng to bt, Hence, e ar ( r, W ()) defnes a number system cometey A number havng reresentaton dk dk dd n number system ( r, W ()) w have k vaue D = d W ( ), where, d {,,, k } n decma Aso, we may have more an one reresentaton for e same number n our number system, we must be abe to emnate s redundancy and reresent one number unquey We use e foowng strategy - from mute reresentatons of e same vaue, choose e one w excograhca hghest vaue, dscard a oers For cassca bnary number system, we have, W () = ( ) W : W ( ) =, Z { } corresondng to a, number (e xe-vaue) k k C = b bt-ane ( LSB = bt) A k-bt, where, b k s reresented as, C {,} Now, f converts / s k to some vrtua xe n w n (vrtua) btanes, n k, to exand number of bt anes To fnd such an f s equvaent to fndng a new weght functon (), e, W ( ), {,, n } W, so at W () denotes weght of vrtua bt-ane n e new / / / = b W ( ), b,, number system { } n C our new decomoston, satsfyng ' ) = ( k () (, ) n (, w()) Aso, W () must have ess abrut changes w resect to ncreasng an at n case of Moreover, we must ensure at e functon f must be njectve, e, nvertbe, oerwse we sha not be abe to extract e embedded message recsey 3 Number System Usng Fbonacc -Sequence Decomoston The weght functon roosed by Battst et a s, n N, e, W () = Fb (), number system to F n mode vrtua bt-anes s, F ()) To ensure ( nvertbty, nstead of Zeckendorf s eorem, we refer to use excograhcay hgher roerty n case of Fbonacc as we, smar to what we sha use n case of our rme decomoston technque Fgure 3 Fbonacc (-sequence) decomoston for 8-bt mage yedng vrtua bt-anes 33 Proosed Prme Number Decomoston We defne a new number system, denoted as (, P ()), where e weght functon P() s defned as: P() =, P( ) =, Z, = =, =, = 3, 3 = 5, C Pr me,
3 Snce e weght functon here s comosed of rme numbers, we name s number system as rme number system and e decomoston as rme decomoston If any vaue has more an one reresentaton n s number system, we aways take e excograhcay hghest of em, to assert nvertbe roerty (eg, e number 3 has dfferent reresentatons n 3-bt rme number system, namey, and, snce we have, = 3 = 3 = 3 = 3 But s excograhcay (from eft to rght) hgher an, we choose to be vad reresentaton for 3 n our rme number system and us dscard as an nvad reresentaton 3 max (,) excogahc Hence, e vad reresentatons are:,,, 3, 4, 5, 6 Now, we embed a secret data bt nto a (vrtua) btane by smy reacng e corresondng bt by e data bt, ony f we fnd at after embeddng e resutng reresentaton s a vad reresentaton n our number system, oerwse we don t embed, just sk Ths s ony to guarantee e exstence of e nverse functon and correctness for extracton of our secret embedded message bt we need to do s to fnd an n such at n k, snce e hghest number at can be reresented n n-bt rme number system s ) After fndng e rmes, we create a ma of k-bt (cassca bnary decomoston) to n-bt numbers (rme decomoston), n > k, markng a e vad reresentatons n our rme number system For an 8-bt mage, art of xe vaue vs rme decomoston ma s shown n Fgure 5 Fgure 4 Error n not guaranteeng unqueness As evdent from Fgure-4, t s cear at one shoud embed secret data bt ony to ose xes, where, after embeddng, we get a vad reresentaton n e number system 34 Embeddng Agorm Frst we fnd e set of a rme numbers at are requred to decomose a xe vaue n a k-bt covermage, e, we need to fnd a number n Ν such at a ossbe xe vaues n e range [, ] can be reresented usng frst n rmes n our n-bt rme number system, so at we get n vrtua bt-anes after decomoston Usng Godbach conjecture etc, at a xe-vaues n e range [, ] can be k m reresented n our m-bt rme number system, so a Fgure-5 Prme decomoston for 8-bt mage yedng 5 vrtua bt-anes Next, for each xe of cover mage choose a (vrtua) bt ane, say bt-ane ( < n), embed secret data bt nto at artcuar bt ane, by reacng e corresondng bt by e data bt, ff we fnd at after embeddng e data bt, e resutng sequence s a vad reresentaton n n-bt rme number system, e, exsts n e ma After embeddng e secret message bt, we convert e resutant sequence n rme number system back to ts vaue (n cassca bnary number system) and get our stego-mage The extracton agorm s exacty e reverse From stego-mage, we convert each xe w embedded data bt to ts corresondng rme decomoston and from bt-ane extract secret message bt Combne a bts to get e secret message
4 35 Comarson Between Standard Bnary, Fbonacc and Prme Decomoston By Tchebychef eorem [5], we have, π ( x)n( x) 9 < < 5, x, x where π (x) = number of rmes not exceedng x, whch eads to e very famous Prme Number π ( n) Theorem m = Now, from s, one can n ( n / n( n)) n show at m = n nn( n) = θ n n( n) n, f n be e n rme, A Lower Bound for e Fbonacc Numbers If α be a ostve root of e quadratc equaton 5 α α =, e, α =, t s easy to show (eg, by maematca nducton) at, F( n) > α, n >, n Ν Snce 5 36, we get, F( n) > (6834), n > We can easy generaze e above defnton of Fbonacc sequence nto Fbonacc -sequence, F () = F () = F ( n) = F ( n ) F ( n ), n, n Ν For =, we obtan Fbonacc -sequence, as defned above Smary, for oer vaues of, one can easy derve (by smar nducton) some exonenta owerbounds, and t s qute obvous at e base of e exonenta ower bound w decrease graduay w ncreasng eg, for =, f α be a ostve root of 3 e equatonα α =, sovng (eg, by Newton- Rahson) we getα = , and t s easy to show by nducton at F ( n) > (465575), n >, From above, we can generaze, for Fbonacc - sequence, f α be a ostve root of e equatonα α =, we have e nequaty, F ( n) > α > α ( α ) 5 α R, α = = 6834, α = , α = 3878, α = 3478, The sequence, 3, α s decreasng n 4 36 Performance Measures Mean Squared Error and SNR: We have e foowng test statstcs for erformance measures, MSE M = N = j = ( f g ) j MN L PSNR = og MSE where M and N are e number of rows and number of coumns resectvey of e cover mage, f j s e xe vaue from e cover mage, g s e xe vaue from e stego-mage, and L s e eak sgna vaue of e cover mage (for 8-bt mages, L=55) Sgna to nose rato quantfes e mercetbty, by regardng e message as e sgna and e message as e nose Here, we use a sghty dfferent test-statstc, namey, Worst-case-Mean-Square-Error (WMSE) and e corresondng PSNR (er xe) as our test-statstcs We defne WMSE as foows: If e secret data-bt s embedded n e bt ane of a xe, e worst-case error-square-er-xe ( ) W = WSE = W ( ) =, e case when e corresondng bt n cover-mage togges n stegomage, after embeddng e secret data-bt (eg, worstcase error-square-er-xe for embeddng n bt ane for a xe n cassca bnary decomoston s = = 4 If e grayscae cover-mage has sze w x h, we defne, ( W ) ) = w h WSE WMSE = w h ( Here, we try to mnmze s WMSE (hence WSE) and maxmze e corresondng PSNR, where L PSNR = og WSE 36 Proosed Prme Decomoston generates More (vrtua) Bt-anes Usng Cassca bnary decomoston, for a k-bt cover mage, we get ony k bt-anes er xe, where we can embed our secret data bt Now, we have, = θ n n( n) and n α R n n( n) = o : F n ( α ) ( n) > ( α ) drecty mes o F ( n) j j n = The maxmum (hghest) number at can be reresented n n-bt number system usng our rme decomoston s, and n case of n-bt number system usng Fbonacc -sequence decomoston
5 s F Now, t s easy to rove at n Ν : n n, we have, n = n F > So, usng same number of bts t s ossbe to reresent more numbers n case of rme decomoston an n case of Fbonacc - sequence decomoston, when number of bts s greater an some reshod Ths n turn mes at number of (vrtua) bt-anes generated n case of rme decomoston w be eventuay (after some n) more an e corresondng number of (vrtua) btanes generated by Fbonacc -Sequence decomoston Fgure 6 ustrates s cam 36 Prme Decomoston gves ess dstorton n hgher bt-anes Here we assume e secret message eng (n bts) s same as mage sze, for evauaton of our test-statstcs For message w dfferent eng, e same can smary be derved n a straght-forward manner In case of our Prme Decomoston, WMSE for embeddng secret message bt ony n (vrtua) btane of each xe (after exressng a xe n our rme number system, usng rme decomoston technque) =, because change n bt ane of a xe smy mes changng of e xe vaue by at most rme number From above, (treatng magesze as constant) we concude, ( WMSE ) = w h = θ( og( )) bt aneprme Decomost on whereas WMSE n case of cassca (tradtona) bnary (LSB) data hdng technque s gven by, WMSE = θ 4 bt ane Bnary Decomoston The above resut mes at e dstorton n case of rme decomoston s much ess (oynoma) an for cassca bnary (exonenta)now, et s cacuate e WMSE for e embeddng technque usng Fbonacc -sequence decomoston In s case, WMSE for embeddng secret message bt ony n (vrtua) bt-ane of each xe (exressng t usng Fbonacc--sequence decomoston) = ( F ) (), because change n bt ane of a xe mes changng of xe vaue by at most Fbonacc number For =, ( WMSE ) bt ane Fbonacc Sequence Decomost on = w h ( F ( )) ( F ( )) ) ( 68 ) = θ > θ Smary, for oer vaues of, one can easy derve (by nducton) some exonenta ower-bounds, whch are defntey better an e exonenta bound obtaned n case of cassca bnary decomoston, but st ey are exonenta n nature, even f e base of e exonenta ower bound w decrease graduay w ncreasng Generazng, we get, WMSE > θ α, bt ane Fbonacc Sequence Decomost on T 5 α R, α =, α > α, he sequence α s decreasng n Obvousy, e Fbonacc--sequence decomoston, deste beng better an cassca bnary decomoston, s st exonenta and causes muchmore dstorton n e hgher bt-anes, an our rme decomoston, n whch case WMSE s oynoma (and not exonenta!) n nature The ot shown n Fgure-6 roves our cam, t vndcates oynoma nature of e weght functon n case of rme decomoston and exonenta nature of cassca bnary and Fbonacc decomoston Fgure6 Wt functons for dfferent decomostons At a gance, e resut of our test-statstcs, ( WMSE ) = θ ( 4 ) bt ane Cassca Bnary Decomoston ( WMSE ) = θ ( og ( ) ) bt ane Pr me Decomoston ( WMSE ) = θ ( c ) ), c bt ane Fbonacc Decomoston R,68 > c > c,, w ( WMSE ) = θ ( 68) bt ane Fbonacc Decomoston
6 k ( ) og PSNR worst Cassca Bnary Decomost on = ( ) k ( ) og PSNR worst Pr me Decomost on =, ( c og ( ) ) k ( ) og PSNR = worst Fbonacc Decomost on, ( c ) α R, α = 68, α > β,, w k ( ) og PSNR = worst Fbonacc Decomost on 4 Exerment Resuts ( 68 ) c R We have, as nut, an 8-bt gray-eve cover mage of Lena Secret message eng = cover mage sze, (message strng sandan reeated mute tmes to f e cover mage sze)the secret message bts are embedded n chosen bt-ane The test message s hdden nto e chosen bt-ane usng e cassca bnary (LSB) technque, Fbonacc (-sequence) decomoston and Prme decomoston technque searatey and comared Fgure 7 Resuts of embeddng data n dfferent btanes usng dfferent data-hdng technques Fgure 7 ustrates at we get 8, and 5 (vrtua) bt-anes usng cassca LSB, Fbonacc and Prme decomoston data-hdng technque resectvey (hghest 5 vrtua bt-anes for Prme) Data-hdng technque usng e rme decomoston has a better erformance an at of Fbonacc decomoston, e ater beng more effcent an cassca bnary decomoston, when judged n terms of embeddng secret data bt nto hgher bt-anes causng east dstorton, ereby east chance of beng detected To embed n more an one vrtua bt-ane, one may use varabe de embeddng [] 5 Concusons Ths aer resented very sme meod of data hdng technque usng rme numbers It s shown (bo eoretcay and exermentay) at e data-hdng technque usng rme decomoston outerforms e famous LSB data hdng technque usng cassca bnary decomoston, and at usng Fbonacc - sequence decomoston We have exermented usng e famous Lena mage, but snce our eoretca dervaton ustrates at e test-statstc vaue (WMSE, PSNR) s ndeendent of e robabty mass functon of e gray eves of e nut mage, e (worst-case) resuts w be smar f we use any grayeve mage as nut, nstead of e Lena mage References [] F Battst, M Car, A Ner, K Egazaran, A Generazed Fbonacc LSB Data Hdng Technque, 3rd Internatona Conference on Comuters and Devces for Communcaton (CODEC-6), Insttute of Rado Physcs and Eectroncs, Unversty of Cacutta, December 8-, 6 [] C Shao-Hu, Y Tan-Hang, G Hong-Xun, Wen, A varabe de LSB data hdng technque n mages, Internatona Conference on Machne Learnng and Cybernetcs, 4,, Vo 7, , 4 [3] A K Jan, Advances n maematca modes for mage rocessng, Proceedngs of e IEEE, 69(5):5 58, May 98 [4] Jessca Frdrch, Mrosav Gojan and Ru Du Detectng LSB steganograhy n coor and grayscae mages, Magazne of IEEE Mutmeda, Seca Issue on Securty, -8, [5] Teang S G, Number Theory, Tata McGraw-H, ISBN , Frst Rernt, 999, 67-63
An LSB Data Hiding Technique Using Natural Numbers
An LSB Data Hdng Technque Usng Natural Numbers Sandan Dey (1), Aj Abraham (), Sugata Sanyal (3) 1 Anshn Software Prvate Lmted, Kolata 700091 Centre for Quantfable Qualty of Servce n Communcaton Systems
More informationXin Li Department of Information Systems, College of Business, City University of Hong Kong, Hong Kong, CHINA
RESEARCH ARTICLE MOELING FIXE OS BETTING FOR FUTURE EVENT PREICTION Weyun Chen eartment of Educatona Informaton Technoogy, Facuty of Educaton, East Chna Norma Unversty, Shangha, CHINA {weyun.chen@qq.com}
More informationDmitry A. Zaitsev Odessa National Telecommunication Academy Kuznechnaya, 1, Odessa, Ukraine
th Worksho on Agorthms and Toos for Petr Nets, Setember - October, 4, Unversty of Paderborn, Germany, 75-8 Sovng the fundamenta equaton of Petr net usng the decomoston nto functona subnets Dmtry A Zatsev
More informationwe have E Y x t ( ( xl)) 1 ( xl), e a in I( Λ ) are as follows:
APPENDICES Aendx : the roof of Equaton (6 For j m n we have Smary from Equaton ( note that j '( ( ( j E Y x t ( ( x ( x a V ( ( x a ( ( x ( x b V ( ( x b V x e d ( abx ( ( x e a a bx ( x xe b a bx By usng
More informationHiding data in images by simple LSB substitution
Pattern Recognton 37 (004) 469 474 www.elsever.com/locate/patcog Hdng data n mages by smple LSB substtuton Ch-Kwong Chan, L.M. Cheng Department of Computer Engneerng and Informaton Technology, Cty Unversty
More informationMARKOV CHAIN AND HIDDEN MARKOV MODEL
MARKOV CHAIN AND HIDDEN MARKOV MODEL JIAN ZHANG JIANZHAN@STAT.PURDUE.EDU Markov chan and hdden Markov mode are probaby the smpest modes whch can be used to mode sequenta data,.e. data sampes whch are not
More informationResearch on Complex Networks Control Based on Fuzzy Integral Sliding Theory
Advanced Scence and Technoogy Letters Vo.83 (ISA 205), pp.60-65 http://dx.do.org/0.4257/ast.205.83.2 Research on Compex etworks Contro Based on Fuzzy Integra Sdng Theory Dongsheng Yang, Bngqng L, 2, He
More informationQuality-of-Service Routing in Heterogeneous Networks with Optimal Buffer and Bandwidth Allocation
Purdue Unversty Purdue e-pubs ECE Technca Reorts Eectrca and Comuter Engneerng -6-007 Quaty-of-Servce Routng n Heterogeneous Networs wth Otma Buffer and Bandwdth Aocaton Waseem Sheh Purdue Unversty, waseem@urdue.edu
More informationAn application of generalized Tsalli s-havrda-charvat entropy in coding theory through a generalization of Kraft inequality
Internatonal Journal of Statstcs and Aled Mathematcs 206; (4): 0-05 ISS: 2456-452 Maths 206; (4): 0-05 206 Stats & Maths wwwmathsjournalcom Receved: 0-09-206 Acceted: 02-0-206 Maharsh Markendeshwar Unversty,
More informationKernel Methods and SVMs Extension
Kernel Methods and SVMs Extenson The purpose of ths document s to revew materal covered n Machne Learnng 1 Supervsed Learnng regardng support vector machnes (SVMs). Ths document also provdes a general
More informationNonextensibility of energy in Tsallis statistics and the zeroth law of
Nonextensbty of energy n Tsas statstcs and the zeroth a of thermodynamcs onge Ou and Jncan hen* T Word Laboratory, P. O. 870, eng 00080, Peoe s Reubc of hna and Deartment of Physcs, Xamen nversty, Xamen
More informationImage Classification Using EM And JE algorithms
Machne earnng project report Fa, 2 Xaojn Sh, jennfer@soe Image Cassfcaton Usng EM And JE agorthms Xaojn Sh Department of Computer Engneerng, Unversty of Caforna, Santa Cruz, CA, 9564 jennfer@soe.ucsc.edu
More informationOptimum Selection Combining for M-QAM on Fading Channels
Optmum Seecton Combnng for M-QAM on Fadng Channes M. Surendra Raju, Ramesh Annavajjaa and A. Chockangam Insca Semconductors Inda Pvt. Ltd, Bangaore-56000, Inda Department of ECE, Unversty of Caforna, San
More informationModule 3 LOSSY IMAGE COMPRESSION SYSTEMS. Version 2 ECE IIT, Kharagpur
Module 3 LOSSY IMAGE COMPRESSION SYSTEMS Verson ECE IIT, Kharagpur Lesson 6 Theory of Quantzaton Verson ECE IIT, Kharagpur Instructonal Objectves At the end of ths lesson, the students should be able to:
More informationNeural network-based athletics performance prediction optimization model applied research
Avaabe onne www.jocpr.com Journa of Chemca and Pharmaceutca Research, 04, 6(6):8-5 Research Artce ISSN : 0975-784 CODEN(USA) : JCPRC5 Neura networ-based athetcs performance predcton optmzaton mode apped
More informationFoundations of Arithmetic
Foundatons of Arthmetc Notaton We shall denote the sum and product of numbers n the usual notaton as a 2 + a 2 + a 3 + + a = a, a 1 a 2 a 3 a = a The notaton a b means a dvdes b,.e. ac = b where c s an
More informationA finite difference method for heat equation in the unbounded domain
Internatona Conerence on Advanced ectronc Scence and Technoogy (AST 6) A nte derence method or heat equaton n the unbounded doman a Quan Zheng and Xn Zhao Coege o Scence North Chna nversty o Technoogy
More informationAlgorithms for factoring
CSA E0 235: Crytograhy Arl 9,2015 Instructor: Arta Patra Algorthms for factorng Submtted by: Jay Oza, Nranjan Sngh Introducton Factorsaton of large ntegers has been a wdely studed toc manly because of
More informationANSWERS. Problem 1. and the moment generating function (mgf) by. defined for any real t. Use this to show that E( U) var( U)
Econ 413 Exam 13 H ANSWERS Settet er nndelt 9 deloppgaver, A,B,C, som alle anbefales å telle lkt for å gøre det ltt lettere å stå. Svar er gtt . Unfortunately, there s a prntng error n the hnt of
More informationManaging Capacity Through Reward Programs. on-line companion page. Byung-Do Kim Seoul National University College of Business Administration
Managng Caacty Through eward Programs on-lne comanon age Byung-Do Km Seoul Natonal Unversty College of Busness Admnstraton Mengze Sh Unversty of Toronto otman School of Management Toronto ON M5S E6 Canada
More informationCyclic Codes BCH Codes
Cycc Codes BCH Codes Gaos Feds GF m A Gaos fed of m eements can be obtaned usng the symbos 0,, á, and the eements beng 0,, á, á, á 3 m,... so that fed F* s cosed under mutpcaton wth m eements. The operator
More informationDr. Shalabh Department of Mathematics and Statistics Indian Institute of Technology Kanpur
Analyss of Varance and Desgn of Exerments-I MODULE III LECTURE - 2 EXPERIMENTAL DESIGN MODELS Dr. Shalabh Deartment of Mathematcs and Statstcs Indan Insttute of Technology Kanur 2 We consder the models
More informationAssociative Memories
Assocatve Memores We consder now modes for unsupervsed earnng probems, caed auto-assocaton probems. Assocaton s the task of mappng patterns to patterns. In an assocatve memory the stmuus of an ncompete
More informationA Lower Bound on SINR Threshold for Call Admission Control in Multiple-Class CDMA Systems with Imperfect Power-Control
A ower Bound on SIR Threshold for Call Admsson Control n Multple-Class CDMA Systems w Imperfect ower-control Mohamed H. Ahmed Faculty of Engneerng and Appled Scence Memoral Unversty of ewfoundland St.
More informationExample: Suppose we want to build a classifier that recognizes WebPages of graduate students.
Exampe: Suppose we want to bud a cassfer that recognzes WebPages of graduate students. How can we fnd tranng data? We can browse the web and coect a sampe of WebPages of graduate students of varous unverstes.
More information( ) 2 ( ) ( ) Problem Set 4 Suggested Solutions. Problem 1
Problem Set 4 Suggested Solutons Problem (A) The market demand functon s the soluton to the followng utlty-maxmzaton roblem (UMP): The Lagrangean: ( x, x, x ) = + max U x, x, x x x x st.. x + x + x y x,
More informationFuzzy approach to solve multi-objective capacitated transportation problem
Internatonal Journal of Bonformatcs Research, ISSN: 0975 087, Volume, Issue, 00, -0-4 Fuzzy aroach to solve mult-objectve caactated transortaton roblem Lohgaonkar M. H. and Bajaj V. H.* * Deartment of
More informationPop-Click Noise Detection Using Inter-Frame Correlation for Improved Portable Auditory Sensing
Advanced Scence and Technology Letters, pp.164-168 http://dx.do.org/10.14257/astl.2013 Pop-Clc Nose Detecton Usng Inter-Frame Correlaton for Improved Portable Audtory Sensng Dong Yun Lee, Kwang Myung Jeon,
More informationSimulated Power of the Discrete Cramér-von Mises Goodness-of-Fit Tests
Smulated of the Cramér-von Mses Goodness-of-Ft Tests Steele, M., Chaselng, J. and 3 Hurst, C. School of Mathematcal and Physcal Scences, James Cook Unversty, Australan School of Envronmental Studes, Grffth
More informationLINEAR REGRESSION ANALYSIS. MODULE IX Lecture Multicollinearity
LINEAR REGRESSION ANALYSIS MODULE IX Lecture - 30 Multcollnearty Dr. Shalabh Department of Mathematcs and Statstcs Indan Insttute of Technology Kanpur 2 Remedes for multcollnearty Varous technques have
More informationReconstruction History. Image Reconstruction. Radon Transform. Central Slice Theorem (I)
Reconstructon Hstory wth Bomedca Acatons EEG-475/675 Prof. Barner Reconstructon methods based on Radon s wor 97 cassc mage reconstructon from roectons aer 97 Hounsfed deveo the frst commerca x-ray CT scanner
More information2-Adic Complexity of a Sequence Obtained from a Periodic Binary Sequence by Either Inserting or Deleting k Symbols within One Period
-Adc Comlexty of a Seuence Obtaned from a Perodc Bnary Seuence by Ether Insertng or Deletng Symbols wthn One Perod ZHAO Lu, WEN Qao-yan (State Key Laboratory of Networng and Swtchng echnology, Bejng Unversty
More informationThe Minimum Universal Cost Flow in an Infeasible Flow Network
Journal of Scences, Islamc Republc of Iran 17(2): 175-180 (2006) Unversty of Tehran, ISSN 1016-1104 http://jscencesutacr The Mnmum Unversal Cost Flow n an Infeasble Flow Network H Saleh Fathabad * M Bagheran
More informationOne-sided finite-difference approximations suitable for use with Richardson extrapolation
Journal of Computatonal Physcs 219 (2006) 13 20 Short note One-sded fnte-dfference approxmatons sutable for use wth Rchardson extrapolaton Kumar Rahul, S.N. Bhattacharyya * Department of Mechancal Engneerng,
More informationPhysics 2A Chapter 3 HW Solutions
Phscs A Chapter 3 HW Solutons Chapter 3 Conceptual Queston: 4, 6, 8, Problems: 5,, 8, 7, 3, 44, 46, 69, 70, 73 Q3.4. Reason: (a) C = A+ B onl A and B are n the same drecton. Sze does not matter. (b) C
More informationErrors for Linear Systems
Errors for Lnear Systems When we solve a lnear system Ax b we often do not know A and b exactly, but have only approxmatons  and ˆb avalable. Then the best thng we can do s to solve ˆx ˆb exactly whch
More informationHomework 10 Stat 547. Problem ) Z D!
Homework 0 Stat 547 Problem 74 Notaton: h s the hazard rate for the aneulod grou, h s the hazard rate for the dlod grou (a Log-rank test s erformed: H 0 : h (t = h (t Sgnfcance level α = 005 Test statstc
More informationController Design of Nonlinear TITO Systems with Uncertain Delays via Neural Networks and Error Entropy Minimization
Controer Desgn of Nonnear TITO Systes wth Uncertan Deays va Neura Networs Error Entroy Mnzaton J. H. Zhang A. P. Wang* H. Wang** Deartent of Autoaton North Chna Eectrc Power Unversty Bejng 6 P. R. Chna
More informationLinear Classification, SVMs and Nearest Neighbors
1 CSE 473 Lecture 25 (Chapter 18) Lnear Classfcaton, SVMs and Nearest Neghbors CSE AI faculty + Chrs Bshop, Dan Klen, Stuart Russell, Andrew Moore Motvaton: Face Detecton How do we buld a classfer to dstngush
More informationMultilayer Perceptrons and Backpropagation. Perceptrons. Recap: Perceptrons. Informatics 1 CG: Lecture 6. Mirella Lapata
Multlayer Perceptrons and Informatcs CG: Lecture 6 Mrella Lapata School of Informatcs Unversty of Ednburgh mlap@nf.ed.ac.uk Readng: Kevn Gurney s Introducton to Neural Networks, Chapters 5 6.5 January,
More informationAppendix for An Efficient Ascending-Bid Auction for Multiple Objects: Comment For Online Publication
Appendx for An Effcent Ascendng-Bd Aucton for Mutpe Objects: Comment For Onne Pubcaton Norak Okamoto The foowng counterexampe shows that sncere bddng by a bdders s not aways an ex post perfect equbrum
More informationMultispectral Remote Sensing Image Classification Algorithm Based on Rough Set Theory
Proceedngs of the 2009 IEEE Internatona Conference on Systems Man and Cybernetcs San Antono TX USA - October 2009 Mutspectra Remote Sensng Image Cassfcaton Agorthm Based on Rough Set Theory Yng Wang Xaoyun
More informationThe Use of Principal Components Analysis in the Assessment of Process Capability Indices
Jont Statstca Meetngs - Secton on Physca & Engneerng Scences (SPES) The Use of Prnca omonents Anayss n the Assessment of Process aabty Indces Evdoka Xekaak Mchae Peraks Deartment of Statstcs Athens Unversty
More informationDr. Shalabh Department of Mathematics and Statistics Indian Institute of Technology Kanpur
Analyss of Varance and Desgn of Exerments-I MODULE II LECTURE - GENERAL LINEAR HYPOTHESIS AND ANALYSIS OF VARIANCE Dr. Shalabh Deartment of Mathematcs and Statstcs Indan Insttute of Technology Kanur 3.
More informationThe Synchronous 8th-Order Differential Attack on 12 Rounds of the Block Cipher HyRAL
The Synchronous 8th-Order Dfferental Attack on 12 Rounds of the Block Cpher HyRAL Yasutaka Igarash, Sej Fukushma, and Tomohro Hachno Kagoshma Unversty, Kagoshma, Japan Emal: {garash, fukushma, hachno}@eee.kagoshma-u.ac.jp
More informationAdvanced Topics in Optimization. Piecewise Linear Approximation of a Nonlinear Function
Advanced Tocs n Otmzaton Pecewse Lnear Aroxmaton of a Nonlnear Functon Otmzaton Methods: M8L Introducton and Objectves Introducton There exsts no general algorthm for nonlnear rogrammng due to ts rregular
More informationFor now, let us focus on a specific model of neurons. These are simplified from reality but can achieve remarkable results.
Neural Networks : Dervaton compled by Alvn Wan from Professor Jtendra Malk s lecture Ths type of computaton s called deep learnng and s the most popular method for many problems, such as computer vson
More informationP exp(tx) = 1 + t 2k M 2k. k N
1. Subgaussan tals Defnton. Say that a random varable X has a subgaussan dstrbuton wth scale factor σ< f P exp(tx) exp(σ 2 t 2 /2) for all real t. For example, f X s dstrbuted N(,σ 2 ) then t s subgaussan.
More informationNested case-control and case-cohort studies
Outne: Nested case-contro and case-cohort studes Ørnuf Borgan Department of Mathematcs Unversty of Oso NORBIS course Unversty of Oso 4-8 December 217 1 Radaton and breast cancer data Nested case contro
More informationOn the Power Function of the Likelihood Ratio Test for MANOVA
Journa of Mutvarate Anayss 8, 416 41 (00) do:10.1006/jmva.001.036 On the Power Functon of the Lkehood Rato Test for MANOVA Dua Kumar Bhaumk Unversty of South Aabama and Unversty of Inos at Chcago and Sanat
More informationCOMPARISON OF SOME RELIABILITY CHARACTERISTICS BETWEEN REDUNDANT SYSTEMS REQUIRING SUPPORTING UNITS FOR THEIR OPERATIONS
Avalable onlne at http://sck.org J. Math. Comput. Sc. 3 (3), No., 6-3 ISSN: 97-537 COMPARISON OF SOME RELIABILITY CHARACTERISTICS BETWEEN REDUNDANT SYSTEMS REQUIRING SUPPORTING UNITS FOR THEIR OPERATIONS
More informationOn the set of natural numbers
On the set of natural numbers by Jalton C. Ferrera Copyrght 2001 Jalton da Costa Ferrera Introducton The natural numbers have been understood as fnte numbers, ths wor tres to show that the natural numbers
More informationMaximizing the number of nonnegative subsets
Maxmzng the number of nonnegatve subsets Noga Alon Hao Huang December 1, 213 Abstract Gven a set of n real numbers, f the sum of elements of every subset of sze larger than k s negatve, what s the maxmum
More informationarxiv: v1 [math.co] 1 Mar 2014
Unon-ntersectng set systems Gyula O.H. Katona and Dánel T. Nagy March 4, 014 arxv:1403.0088v1 [math.co] 1 Mar 014 Abstract Three ntersecton theorems are proved. Frst, we determne the sze of the largest
More informationDynamic Programming. Preview. Dynamic Programming. Dynamic Programming. Dynamic Programming (Example: Fibonacci Sequence)
/24/27 Prevew Fbonacc Sequence Longest Common Subsequence Dynamc programmng s a method for solvng complex problems by breakng them down nto smpler sub-problems. It s applcable to problems exhbtng the propertes
More informationWAVELET DOMAIN VIDEO INFORMATION EMBEDDING
WAVELET DOMAIN VIDEO INFORMATION EMBEDDING Mng Yang, Monca Trfas, Candce Trutt, and Guoun Xong Department of Mathematca and Computer Scences Jacksonve State Unversty, Jacksonve, AL 3665 {myang, atrfas,
More informationA New Scrambling Evaluation Scheme based on Spatial Distribution Entropy and Centroid Difference of Bit-plane
A New Scramblng Evaluaton Scheme based on Spatal Dstrbuton Entropy and Centrod Dfference of Bt-plane Lang Zhao *, Avshek Adhkar Kouch Sakura * * Graduate School of Informaton Scence and Electrcal Engneerng,
More informationfind (x): given element x, return the canonical element of the set containing x;
COS 43 Sprng, 009 Dsjont Set Unon Problem: Mantan a collecton of dsjont sets. Two operatons: fnd the set contanng a gven element; unte two sets nto one (destructvely). Approach: Canoncal element method:
More informationLecture 3: Shannon s Theorem
CSE 533: Error-Correctng Codes (Autumn 006 Lecture 3: Shannon s Theorem October 9, 006 Lecturer: Venkatesan Guruswam Scrbe: Wdad Machmouch 1 Communcaton Model The communcaton model we are usng conssts
More informationNumerical Investigation of Power Tunability in Two-Section QD Superluminescent Diodes
Numerca Investgaton of Power Tunabty n Two-Secton QD Superumnescent Dodes Matta Rossett Paoo Bardea Ivo Montrosset POLITECNICO DI TORINO DELEN Summary 1. A smpfed mode for QD Super Lumnescent Dodes (SLD)
More informationHidden Markov Model Cheat Sheet
Hdden Markov Model Cheat Sheet (GIT ID: dc2f391536d67ed5847290d5250d4baae103487e) Ths document s a cheat sheet on Hdden Markov Models (HMMs). It resembles lecture notes, excet that t cuts to the chase
More informationSwitching Median Filter Based on Iterative Clustering Noise Detection
Swtchng Medan Flter Based on Iteratve Clusterng Nose Detecton Chngakham Neeta Dev 1, Kesham Prtamdas 2 1 Deartment of Comuter Scence and Engneerng, Natonal Insttute of Technology, Manur, Inda 2 Deartment
More informationA Note On the Bounds for the Generalized Fibonacci-p-Sequence and its Application in Data-Hiding
International Journal of Comuter Science and Alications c Technomathematics Research Foundation Vol. 7 No. 4,. 1-15, 010 A Note On the Bounds for the Generalized Fibonacci--Sequence and its Alication in
More informationVQ widely used in coding speech, image, and video
at Scalar quantzers are specal cases of vector quantzers (VQ): they are constraned to look at one sample at a tme (memoryless) VQ does not have such constrant better RD perfomance expected Source codng
More informationAnalysis of Bipartite Graph Codes on the Binary Erasure Channel
Anayss of Bpartte Graph Codes on the Bnary Erasure Channe Arya Mazumdar Department of ECE Unversty of Maryand, Coege Par ema: arya@umdedu Abstract We derve densty evouton equatons for codes on bpartte
More informationLower bounds for the Crossing Number of the Cartesian Product of a Vertex-transitive Graph with a Cycle
Lower bounds for the Crossng Number of the Cartesan Product of a Vertex-transtve Graph wth a Cyce Junho Won MIT-PRIMES December 4, 013 Abstract. The mnmum number of crossngs for a drawngs of a gven graph
More informationFinding Dense Subgraphs in G(n, 1/2)
Fndng Dense Subgraphs n Gn, 1/ Atsh Das Sarma 1, Amt Deshpande, and Rav Kannan 1 Georga Insttute of Technology,atsh@cc.gatech.edu Mcrosoft Research-Bangalore,amtdesh,annan@mcrosoft.com Abstract. Fndng
More informationQUARTERLY OF APPLIED MATHEMATICS
QUARTERLY OF APPLIED MATHEMATICS Voume XLI October 983 Number 3 DIAKOPTICS OR TEARING-A MATHEMATICAL APPROACH* By P. W. AITCHISON Unversty of Mantoba Abstract. The method of dakoptcs or tearng was ntroduced
More information6. Hamilton s Equations
6. Hamlton s Equatons Mchael Fowler A Dynamcal System s Path n Confguraton Sace and n State Sace The story so far: For a mechancal system wth n degrees of freedom, the satal confguraton at some nstant
More informationChapter 5. Solution of System of Linear Equations. Module No. 6. Solution of Inconsistent and Ill Conditioned Systems
Numercal Analyss by Dr. Anta Pal Assstant Professor Department of Mathematcs Natonal Insttute of Technology Durgapur Durgapur-713209 emal: anta.bue@gmal.com 1 . Chapter 5 Soluton of System of Lnear Equatons
More informationSupplementary Material: Learning Structured Weight Uncertainty in Bayesian Neural Networks
Shengyang Sun, Changyou Chen, Lawrence Carn Suppementary Matera: Learnng Structured Weght Uncertanty n Bayesan Neura Networks Shengyang Sun Changyou Chen Lawrence Carn Tsnghua Unversty Duke Unversty Duke
More information10.40 Appendix Connection to Thermodynamics and Derivation of Boltzmann Distribution
10.40 Appendx Connecton to Thermodynamcs Dervaton of Boltzmann Dstrbuton Bernhardt L. Trout Outlne Cannoncal ensemble Maxmumtermmethod Most probable dstrbuton Ensembles contnued: Canoncal, Mcrocanoncal,
More informationA Local Variational Problem of Second Order for a Class of Optimal Control Problems with Nonsmooth Objective Function
A Local Varatonal Problem of Second Order for a Class of Optmal Control Problems wth Nonsmooth Objectve Functon Alexander P. Afanasev Insttute for Informaton Transmsson Problems, Russan Academy of Scences,
More informationTemperature. Chapter Heat Engine
Chapter 3 Temperature In prevous chapters of these notes we ntroduced the Prncple of Maxmum ntropy as a technque for estmatng probablty dstrbutons consstent wth constrants. In Chapter 9 we dscussed the
More informationA parametric Linear Programming Model Describing Bandwidth Sharing Policies for ABR Traffic
parametrc Lnear Programmng Mode Descrbng Bandwdth Sharng Poces for BR Traffc I. Moschoos, M. Logothets and G. Kokknaks Wre ommuncatons Laboratory, Dept. of Eectrca & omputer Engneerng, Unversty of Patras,
More informationON AUTOMATIC CONTINUITY OF DERIVATIONS FOR BANACH ALGEBRAS WITH INVOLUTION
European Journa of Mathematcs and Computer Scence Vo. No. 1, 2017 ON AUTOMATC CONTNUTY OF DERVATONS FOR BANACH ALGEBRAS WTH NVOLUTON Mohamed BELAM & Youssef T DL MATC Laboratory Hassan Unversty MORO CCO
More informationSMARANDACHE-GALOIS FIELDS
SMARANDACHE-GALOIS FIELDS W. B. Vasantha Kandasamy Deartment of Mathematcs Indan Insttute of Technology, Madras Chenna - 600 036, Inda. E-mal: vasantak@md3.vsnl.net.n Abstract: In ths aer we study the
More information2E Pattern Recognition Solutions to Introduction to Pattern Recognition, Chapter 2: Bayesian pattern classification
E395 - Pattern Recognton Solutons to Introducton to Pattern Recognton, Chapter : Bayesan pattern classfcaton Preface Ths document s a soluton manual for selected exercses from Introducton to Pattern Recognton
More informationWAVELET-BASED IMAGE COMPRESSION USING SUPPORT VECTOR MACHINE LEARNING AND ENCODING TECHNIQUES
WAVELE-BASED IMAGE COMPRESSION USING SUPPOR VECOR MACHINE LEARNING AND ENCODING ECHNIQUES Rakb Ahmed Gppsand Schoo of Computng and Informaton echnoogy Monash Unversty, Gppsand Campus Austraa. Rakb.Ahmed@nfotech.monash.edu.au
More informationOutline and Reading. Dynamic Programming. Dynamic Programming revealed. Computing Fibonacci. The General Dynamic Programming Technique
Outlne and Readng Dynamc Programmng The General Technque ( 5.3.2) -1 Knapsac Problem ( 5.3.3) Matrx Chan-Product ( 5.3.1) Dynamc Programmng verson 1.4 1 Dynamc Programmng verson 1.4 2 Dynamc Programmng
More informationUsing T.O.M to Estimate Parameter of distributions that have not Single Exponential Family
IOSR Journal of Mathematcs IOSR-JM) ISSN: 2278-5728. Volume 3, Issue 3 Sep-Oct. 202), PP 44-48 www.osrjournals.org Usng T.O.M to Estmate Parameter of dstrbutons that have not Sngle Exponental Famly Jubran
More informationLecture Notes on Linear Regression
Lecture Notes on Lnear Regresson Feng L fl@sdueducn Shandong Unversty, Chna Lnear Regresson Problem In regresson problem, we am at predct a contnuous target value gven an nput feature vector We assume
More informationThe Decibel and its Usage
The Decbel and ts Usage Consder a two-stage amlfer system, as shown n Fg.. Each amlfer rodes an ncrease of the sgnal ower. Ths effect s referred to as the ower gan,, of the amlfer. Ths means that the sgnal
More informationLine Drawing and Clipping Week 1, Lecture 2
CS 43 Computer Graphcs I Lne Drawng and Clppng Week, Lecture 2 Davd Breen, Wllam Regl and Maxm Peysakhov Geometrc and Intellgent Computng Laboratory Department of Computer Scence Drexel Unversty http://gcl.mcs.drexel.edu
More informationReview of Taylor Series. Read Section 1.2
Revew of Taylor Seres Read Secton 1.2 1 Power Seres A power seres about c s an nfnte seres of the form k = 0 k a ( x c) = a + a ( x c) + a ( x c) + a ( x c) k 2 3 0 1 2 3 + In many cases, c = 0, and the
More informationModel Reference Adaptive Temperature Control of the Electromagnetic Oven Process in Manufacturing Process
RECENT ADVANCES n SIGNAL PROCESSING, ROBOTICS and AUTOMATION Model Reference Adatve Temerature Control of the Electromagnetc Oven Process n Manufacturng Process JIRAPHON SRISERTPOL SUPOT PHUNGPHIMAI School
More informationA Novel Quality Measure for Information Hiding in Images
A Novel Qualty Measure for Informaton Hdng n s KA Navas Aravnd M SasKumar M Asstant rofessor G student rofessor College Of Engneerng College of Engneerng Maran Engneerng College Trvandrum,Inda Trvandrum,Inda
More informationFall 2012 Analysis of Experimental Measurements B. Eisenstein/rev. S. Errede
Fall 0 Analyss of Expermental easurements B. Esensten/rev. S. Errede We now reformulate the lnear Least Squares ethod n more general terms, sutable for (eventually extendng to the non-lnear case, and also
More informationL-Edge Chromatic Number Of A Graph
IJISET - Internatona Journa of Innovatve Scence Engneerng & Technoogy Vo. 3 Issue 3 March 06. ISSN 348 7968 L-Edge Chromatc Number Of A Graph Dr.R.B.Gnana Joth Assocate Professor of Mathematcs V.V.Vannaperuma
More informationAN ASYMMETRIC GENERALIZED FGM COPULA AND ITS PROPERTIES
Pa. J. Statst. 015 Vol. 31(1), 95-106 AN ASYMMETRIC GENERALIZED FGM COPULA AND ITS PROPERTIES Berzadeh, H., Parham, G.A. and Zadaram, M.R. Deartment of Statstcs, Shahd Chamran Unversty, Ahvaz, Iran. Corresondng
More informationPower-sum problem, Bernoulli Numbers and Bernoulli Polynomials.
Power-sum roblem, Bernoull Numbers and Bernoull Polynomals. Arady M. Alt Defnton 1 Power um Problem Fnd the sum n : 1... n where, n N or, usng sum notaton, n n n closed form. Recurrence for n Exercse Usng
More informationResource Allocation with a Budget Constraint for Computing Independent Tasks in the Cloud
Resource Allocaton wth a Budget Constrant for Computng Independent Tasks n the Cloud Wemng Sh and Bo Hong School of Electrcal and Computer Engneerng Georga Insttute of Technology, USA 2nd IEEE Internatonal
More informationThe lower and upper bounds on Perron root of nonnegative irreducible matrices
Journal of Computatonal Appled Mathematcs 217 (2008) 259 267 wwwelsevercom/locate/cam The lower upper bounds on Perron root of nonnegatve rreducble matrces Guang-Xn Huang a,, Feng Yn b,keguo a a College
More informationGreyworld White Balancing with Low Computation Cost for On- Board Video Capturing
reyword Whte aancng wth Low Computaton Cost for On- oard Vdeo Capturng Peng Wu Yuxn Zoe) Lu Hewett-Packard Laboratores Hewett-Packard Co. Pao Ato CA 94304 USA Abstract Whte baancng s a process commony
More informationLINEAR REGRESSION ANALYSIS. MODULE VIII Lecture Indicator Variables
LINEAR REGRESSION ANALYSIS MODULE VIII Lecture - 7 Indcator Varables Dr. Shalabh Department of Maematcs and Statstcs Indan Insttute of Technology Kanpur Indcator varables versus quanttatve explanatory
More informationLecture 10 Support Vector Machines II
Lecture 10 Support Vector Machnes II 22 February 2016 Taylor B. Arnold Yale Statstcs STAT 365/665 1/28 Notes: Problem 3 s posted and due ths upcomng Frday There was an early bug n the fake-test data; fxed
More informationOn the Repeating Group Finding Problem
The 9th Workshop on Combnatoral Mathematcs and Computaton Theory On the Repeatng Group Fndng Problem Bo-Ren Kung, Wen-Hsen Chen, R.C.T Lee Graduate Insttute of Informaton Technology and Management Takmng
More informationChapter 8 Indicator Variables
Chapter 8 Indcator Varables In general, e explanatory varables n any regresson analyss are assumed to be quanttatve n nature. For example, e varables lke temperature, dstance, age etc. are quanttatve n
More informationPHYS 450 Spring semester Lecture 02: Dealing with Experimental Uncertainties. Ron Reifenberger Birck Nanotechnology Center Purdue University
PHYS 45 Sprng semester 7 Lecture : Dealng wth Expermental Uncertantes Ron Refenberger Brck anotechnology Center Purdue Unversty Lecture Introductory Comments Expermental errors (really expermental uncertantes)
More informationSingle-Source/Sink Network Error Correction Is as Hard as Multiple-Unicast
Snge-Source/Snk Network Error Correcton Is as Hard as Mutpe-Uncast Wentao Huang and Tracey Ho Department of Eectrca Engneerng Caforna Insttute of Technoogy Pasadena, CA {whuang,tho}@catech.edu Mchae Langberg
More information